Summary of Contents for Bull 1GB Intel Ethernet Switch Module
Page 5
NovaScale Blade safety and regulatory information ✏ NOTE The service procedures are designed to help you isolate problems. They are written with the assumption that you have model-specific training on all computers, or that you are familiar with the computers, functions, terminology, and service information provided in this manual. Important Safety Instructions Read all caution and safety statements in this document before performing any of the instructions.
General Safety Follow these rules to ensure general safety: • Observe good housekeeping in the area of the machines during and after maintenance. • When lifting any heavy object: 1. Ensure you can stand safely without slipping. 2. Distribute the weight of the object equally between your feet. 3.
Electrical Safety CAUTION: Electrical current from power, telephone, and communication cables can be hazardous. To avoid personal injury or equipment damage, disconnect the server system power cords, telecommunication systems, networks, and modems before you open the server covers, unless instructed otherwise in the installation and configuration procedures. ✏...
• Do not use worn or broken tools and testers. • Never assume that power has been disconnected from a circuit. First, check that it has been powered-off. • Always look carefully for possible hazards in your work area. Examples of these hazards are moist floors, nongrounded power extension cables, power surges, and missing safety grounds.
Page 9
Use an ESD common ground or reference point when working on a double-insulated or battery-operated system. You can use coax or connector-outside shells on these systems. Use the round ground-prong of the AC plug on AC-operated computers. DANGER Electrical current from power, telephone and communication cables is hazardous. To avoid a shock hazard: Do not connect or disconnect any cables or perform installation, maintenance, or •...
Page 10
CAUTION: If your system has a module containing a lithium battery, replace it only with the same or an equivalent type battery recommended by the manufacturer. If your system has a module containing a lithium battery, replace it only with the same module type made by the same manufacturer. The battery contains lithium and can explode if not properly used, handled, or disposed of.
Page 11
≥18 kg (37 lbs) ≥32 kg (70.5 lbs) ≥55 kg (121.2 lbs) CAUTION: Use safe practices when lifting. CAUTION: The power control button on the device and the power switch on the power supply do not turn off the electrical current supplied to the device. The device also might have more than one power cord.
Page 12
CAUTION: Do not place any object weighing more then 82 kg (180lbs.) on top of rack-mounted devices. CAUTION: To avoid personal injury, before lifting the unit, remove all the blades to reduce the weight. CAUTION: Hazardous energy is present when the blade is connected to the power source. Always replace the blade cover before installing the blade.
Page 13
Electromagnetic compatibility (ECM) USA: FCC CFR 47 Part 2 and 15, Verified Class A Limit Canada: IC ICES-003 Class A Limit Europe: EMC Directive, 89/336/EEC EN55022, Class A Limit, Radiated & Conducted Emissions EN55024 ITE Specific Immunity Standard EN61000-4-2 ESD Immunity (Level 2 Contact Discharge, Level 3 Air Discharge) EN61000-4-3 Radiated Immunity (Level 2) EN61000-4-4 Electrical Fast Transient (Level 2) EN61000-4-5 AC Surge...
Page 14
✏ NOTE Class A device definition: If a Class A device is installed within the is system, then the system is to be considered a Class A system. In this configuration, operation of this equipment in a residential area is likely to cause harmful interference. ✏...
Page 15
RRL Korea: English translation of the notice above: Device User’s Information Class A device This device complies with RRL EMC and is operated in commercial environment so that distributors or users pay attention to this point. If the product is sold or purchased improperly, please exchange this product to what can be used at home.
Page 16
<This page intentionally left blank> NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
1 Introducing the NovaScale Blade 1 GB Intel® Ethernet Switch Module Thank you for purchasing a NovaScale Blade 1 GB Intel® Ethernet Switch Module. This Installation and User’s Guide contains information about: • Setting up and installing your switch module •...
Record your product information in this table. Product name NovaScale Blade 1 GB Intel® Ethernet Switch Module Type _________________________________________________ Model number _________________________________________________ Serial number _________________________________________________ Media access _________________________________________________ control (MAC) address Verify that the shipping carton contains a NovaScale Blade 1 GB Intel® Ethernet Switch Module. If the switch module is missing or damaged, contact your local reseller for replacement.
Notices and statements used in this book The caution and danger statements that appear in this book are also in the multilingual NovaScale Blade Safety Information Book on the CD-ROM NovaScale Blade Chassis Resource CD. Each statement is numbered to refer to the corresponding statement in the Safety Information Book. The following notices and statements are used in this book: •...
For more information about the components of the information panel, see Chapter 3 “Information Panel LEDs and External Ports” on page 17. For more information about the MAC address, see “IP addresses and SNMP community names” on page 20. Specifications and features The following section provides a summary of the specifications and features for your NovaScale Blade 1GB Intel®...
Page 31
• Standards The following standards apply to the NovaScale Blade 1GB Intel® Ethernet Switch Module. — Switching Support – IEEE 802.3 10BASE-T Ethernet – IEEE 802.3 Auto-negotiation – IEEE 802.3u 100BASE-TX Fast Ethernet – IEEE 802.3z Gigabit Ethernet – IEEE 802.3ab 1000BASE-T –...
Page 32
– Advanced Layer 2 Functionality: • Broadcast Storm Recovery • Multicast Storm Recovery • Independent VLAN Learning (IVL) support • Port Mirroring • IGMP Snooping • Static MAC Filtering – System Facilities • Event and Error Logging Facility • Run-time and Configuration Download Capability •...
2 Installing and Removing the NovaScale Blade 1 GB Intel® Ethernet Switch Module The following illustration shows the I/O module bay locations in the NovaScale Blade Chassis platform. Attention: To maintain proper system cooling, each I/O module bay must contain either a module or a filler module;...
I/O module Switch-module function Connection 1 (Ethernet Link 1) for all blade servers in the NovaScale Blade Chassis Connection 2 (Ethernet Link 2) for all blade servers in the NovaScale Blade Chassis Connection 3 (from all blade server interface options in the NovaScale Blade Chassis) Connection 4 (from all blade server interface options in the NovaScale Blade Chassis) For additional information, see the NovaScale Blade Chassis Installation and User’s Guide on the CD-ROM NovaScale Blade Chassis Resource CD.
• Limit your movement. Movement can cause static electricity to build up around you. • Handle the device carefully, holding it by its edges or its frame. • Do not touch solder joints, pins, or exposed printed circuitry. • Do not leave the device where others can handle and possibly damage it. •...
Page 38
NovaScale Blade Chassis Complete the following steps to install the NovaScale Blade 1GB Intel® Ethernet Switch Module. 1. Review the information in “NovaScale Blade safety and regulatory information” on page iii and in “Installation guidelines” on page 10 through “Handling static-sensitive devices” on page 10. 2.
Page 39
3. Select an I/O module bay in which to install the switch module, in accordance with the instructions in “Ethernet interface requirements” on page 9. 4. Remove the filler module from the selected I/O module bay. Store the filler module for future use.
Removing the NovaScale Blade 1GB Intel® Ethernet Switch Module Statement 8: xxCAUTION: Never remove the cover on a power supply or any part that has the following label attached. Hazardous voltage, current, and energy levels are present inside any component that has this label attached.
Page 41
NovaScale Blade Chassis 4. Slide the switch module out of the I/O module bay and set it aside. 5. Place either another switch module or a filler module in the I/O module bay within 1 minute. 6. If you placed another switch module in the I/O module bay, reconnect any cables that you unplugged in step 2.
3 Information Panel LEDs and External Ports This chapter describes the information panel and LEDs (also known as indicators) on the NovaScale Blade 1 GB Intel® Ethernet Switch Module. This chapter also identifies the external ports on the information panel. Information panel The information panel of the NovaScale Blade 1GB Intel®...
LEDs The LEDs on the information panel of the NovaScale Blade 1GB Intel® Ethernet Switch Module include OK, !, Ethernet link, and Ethernet activity. The following illustration shows the LEDs on the switch module. A description of each LED follows the illustration. Notes: 1.
4 Switch Management and Operating Concepts This chapter discusses many of the concepts and features used to manage the NovaScale Blade 1 GB Intel® Ethernet Switch Module and the concepts necessary to understand how it functions. In addition, this chapter explains many important points regarding these features. Configuring the switch module to implement these concepts and use its many features is discussed in detail in the following chapters.
the switch module through the 10/100 Mbps Ethernet port on the management module. You can use the four external 10/100/1000 Mbps Ethernet ports on the switch module for management and control of the module by selecting this mode as an option through the management module configuration utility program (see the NovaScale Blade Chassis Management Module Installation and User’s Guide publications on the CD-ROM NovaScale Blade Chassis Resource CD for more information).
Page 47
Table 1. Default IP addresses based on I/O module bay numbers I/O module bay number Default IP address Switch Module Bay 1 10.90.90.91 Switch Module Bay 2 10.90.90.92 Switch Module Bay 3 10.90.90.94 Switch Module Bay 4 10.90.90.97 The following illustration shows the I/O module bay locations. You can change the default switch module IP address to meet the requirements of your networking address scheme.
The switch MAC address can also be displayed using CLI command show inventory or from the Web Interface. In addition, you can also set an IP address for a gateway router. This becomes necessary when the network management station and switch modules are located on different IP networks, requiring management packets to go through a router to reach the network manager.
The following are trap types that the switch module can send to a trap recipient: Cold start This trap indicates that the switch module has been turned on and initialized such that software settings are reconfigured and hardware systems are restarted. A cold start is different from a factory reset in that configuration settings saved to nonvolatile random-access memory (NVRAM) are used to reconfigure the switch module.
Port mirroring The NovaScale Blade 1GB Intel® Ethernet Switch Module enables you to copy packets that were transmitted and received on a source port and to redirect the copies to another target port. The source port can be one of the four 10/100/1000 Mbps external ports, while the target port is where you will connect a monitoring/troubleshooting device, such as a sniffer or an RMON probe.
through port 2 only and transmits nothing through the other ports. Creating the table is referred to as learning the network topology. An aging timer is used to make sure that the table is updated if devices are moved. Dynamic entries, those learned by the switch by observing network traffic, are deleted from the table if they are not accessed within the aging time.
Intel® Ethernet Switch Module defaults to IEEE 802.1D operation, but can be configured to use the algorithm and protocols defined in IEEE 802.1w instead. IEEE 802.1D has been further revised in IEEE 802.1s, which incorporates IEEE 802.1w and defines a multiple Spanning Tree Protocol along with an IEEE 802.1D compatibility mode. The NovaScale Blade 1GB Intel®...
The NovaScale Blade 1GB Intel® Ethernet Switch Module implements IEEE 802.1Q VLANs, which require tagging. This enables them to span the entire network (provided that all switches on the network are IEEE 802.1Q-compliant). VLANs enable a network to be segmented to reduce the size of broadcast domains. All packets entering a VLAN will be forwarded (over IEEE 802.1Q enabled switches) only to the stations that are members of that VLAN.
IEEE 802.1Q Tag IEEE 802.1Q Tag Octets Destination Address (6 octets) Destination Address (6 octets) Source Address (6 octets) Source Address (6 octets) EtherType = 0x8100 EtherType = 0x8100 Tag Control Information Tag Control Information MAC Length/Type MAC Length/Type Begining of Data Begining of Data Cyclic Redundancy Check (4 octets) Cyclic Redundancy Check (4 octets)
Before the adoption of 802.1Q VLANs, port-based and MAC-based VLANs were in common use. These VLANs relied upon a port VLAN ID (PVID) to forward packets. A packet received on a given port would be assigned that port PVID and then be forwarded to the port that corresponded to the packet destination address (found in the switch forwarding table).
Protocol-based VLANs (PBVLANs) The main purpose of Protocol-based VLANs (PBVLANs) is to selectively process packets based on their upper-layer protocol by setting up protocol-based filters. Packets are bridged through user- specified ports based on their protocol. In PBVLANs, the VLAN classification of a packet is based on its protocol (IP, IPX, etc.). PBVLANs help optimize network traffic because protocol-specific broadcast messages are sent only to end stations using that protocol.
NOTE Even though the above discussion pertains to the forwarding database, MAC filters are not configured and displayed as part of the forwarding database; they are configured and displayed separately. Generic Attribute Registration Protocol (GARP) This protocol is used to exchange information between GARP participants to register and de-register attribute values within a bridged LAN.
When the switch module receives GMRP PDUs it will update the multicast table with a new entry or modify an existing entry with the new information. The switch module will forward multicast packets through only those ports for which GMRP has created a group registration entry (for that multicast address).
each of the remaining network segments in accordance with IEEE 802.1D. Eventually, the packet is made accessible to all nodes connected to the network. This approach works well for broadcast packets that are intended to be seen or processed by all connected nodes.
links have dropped out, the LAG will reconfigure itself with the new values from the received LACPDUs. It is important that when you configure LAGs, you should configure the LAGs and enable STP on both partner devices before connecting the cables. Distribution method Link aggregation, or port trunking, enables several ports to be grouped together and to act as a single link.
acknowledgment, the client must release its current configuration and then return to the initializing state. If your DHCP client uses more than one network adapter to connect to multiple networks, this protocol is followed for each adapter that you want to configure for TCP/IP. Multi-homed systems are selectively configured for any combination of system interfaces.
The NovaScale Blade 1GB Intel® Ethernet Switch Module operates in the authenticator role only. The authenticator PAE is responsible for submitting information received from the supplicant to the authentication server in order for the credentials to be checked, which will determine the authorization state of the port.
Table 3. Secure Sockets Layer Details SSL Feature Component Type SSL Protocol Versions • TLS 1.0 SSL 3.0 • Quality of Service (QoS) The Quality of Service (QoS) features of the NovaScale Blade 1 GB Intel® Ethernet Switch Module allow you to allocate network bandwidth according to the needs of the network users. This section will give you an overview of the methods available.
Traffic Class The definition of the traffic to which a set of rules will apply. A class is defined by specifying a VLAN Identifier and an interface number, along with the class priority. A default BAP, which you cannot modify, is assigned to all new TCs. Any given BAP may be assigned to multiple TCs.
5 Web-Based Network Management This chapter describes how to use the Web-based network management module to access and configure the internal switching software. Important: Before you configure your NovaScale Blade 1 GB Intel® Ethernet Switch Module, be sure that the management modules in your NovaScale Blade Chassis platform are properly configured.
Important: With this mode, the NovaScale Blade 1GB Intel® Ethernet Switch Module does not respond to remote-management commands through the four external Ethernet ports on the switch module. See the applicable Installation and User’s Guide on the Resource CD for additional instructions for configuring the switch module for this mode of operation.
Page 69
Click on Login, and a dialog box similar to the following will open: Enter “USERID” in the User name field and enter “PASSW0RD” (with a zero in place of the O) in the Password field. Click the OK button. This opens the main page in the management module. NOTE The User name and Password fields are case sensitive.
Page 70
If java mode is enabled for the switch (the default is enabled) the top panel shows a real-time information-panel display of the switch module, as shown below. You can change the java mode on the Network Connectivity Configuration menu (see 50). External port Blade server bays status...
When you first log on to the switch, you will see the System Description details in the center of the screen. For more details on the information displayed see 48. System The System menu provides access to the following panels and menus: •...
• Port • SNMP • Statistics • System utilities • Trap manager ARP cache This panel displays the connectivity between the switch and other devices. The ARP cache identifies the Media Access Control (MAC) addresses of the IP stations communicating with the switch. MAC Address A unicast MAC address of a device on a subnet attached to one of the switch's interfaces for which the switch has forwarding and/or filtering information.
Inventory information This panel displays inventory information for the switch. System Description The product name of this switch. Machine Type The machine type of this switch. Machine Model The model within the machine type. Serial Number The unique box serial number for this switch. FRU Number The field-replaceable unit number.
Software Version The release.version.maintenance number of the code currently running on the switch. Operating System The operating system currently running on the switch. Network Processing Device The network processor hardware. Additional Packages The list of optional software packages installed on the switch, if any. For example, Quality of Service.
Page 75
System Description The product name of this switch. System Name The name used to identify this switch. The range for name is from 1 to 31 alphanumeric characters. System Location The physical location of this switch. May be up to 31 alphanumeric characters. The factory default is blank.
Network connectivity This panel displays network configuration settings necessary for in-band connectivity. The network interface is the logical interface used for in-band connectivity with the switch via any of the switch's front panel ports. The configuration parameters associated with the switch's network interface do not affect the configuration of the front panel ports through which traffic is switched or routed.
Web Mode Specify whether the switch may be accessed from a web browser through TCP port 80. If you choose to Enable web mode you will be able to manage the switch from a web browser. The factory default is Enabled. Java Mode Enable or Disable the java applet that displays a picture of the switch at the top right of the screen.
User accounts Use this panel to reconfigure an existing user account or to create a new one. This panel is only available for the user with Read/Write privileges, herein referred to as admin. User Use this pull-down menu to select one of the existing accounts, or select Create to add a new one, provided the maximum of five Read-only accounts has not been reached.
retrieve parameter information. The SNMPv3 access mode may be different from the CLI and Web access mode. Authentication Protocol The protocol (if any) used to authenticate the user. This field specifies the protocol to be used to authenticate a user account. The valid authentication protocols are None, MD5 or SHA.
Page 80
Login Select the authentication login list you want to configure. Select Create to define a new login list. When you create a new login list, Local is set as the initial authentication method. Login Name If you are creating a new login list, enter the name you want to assign. It can be up to 15 alphanumeric characters long and is not case sensitive.
method, the third method will not be tried. Note that this parameter will not appear when you first create a new login list. Method 3 Use the pull-down menu to select the method, if any, that should appear third in the selected authentication login list.
Login summary This panel displays a list of all users set up for each authentication login list. Login Identifies the authentication login list summarized in this row. Method List The ordered list of methods configured for this login list. Login Users The users you assigned to this login list on the User Login Configuration screen.
Page 83
Each configured user is assigned to a login list that specifies how the user should be authenticated when attempting to access the switch or a port on the switch. After creating a new user account on the User Account screen, you should assign that user to a login list for the switch using this screen and, if necessary, to a login list for the ports using the Port Access Control User Login Configuration screen.
Forwarding database The first option on this menu is the Configuration panel, which allows you to configure the forwarding database aging interval. The second option is the Search panel, which displays the forwarding database entries specified by a MAC address or filter you enter. Configuration Use this panel to configure the forwarding database aging interval.
Page 85
Filter Specify the entries you want displayed from the pull-down menu. Once a choice is made the list is automatically refreshed with the selected filter. Filter choices are: Learned Only MAC addresses that have been learned will be displayed. The entire table will be displayed. MAC Address Search You may also search for an individual MAC address.
Management The value of the corresponding instance is also the value of an existing instance of dot1d StaticAddress. Currently this is used when enabling VLANs for routing. Self The MAC address of one of the switch’s physical interfaces. GMRP Learned The value of the corresponding instance was learned via GARP Multicast Registration Protocol (GMRP).
Time The time the event occurred, calculated from the time the switch was last reset, in days, hours, minutes and seconds. File The source code filename identifying the code that detected the event. Line The line number within the source file of the code that detected the event. Description An explanation of the problem being reported.
Entry The number of the entry within the event log. The most recent entry is first. Filename The source code filename identifying the code that detected the event. Line The line number within the source file of the code that detected the event. TaskID The OS-assigned ID of the task reporting the event.
Page 89
Port Selects the interface for which data is to be displayed or configured. Port Type For normal and LAG ports this field will be blank. Otherwise the possible values are: Probe Monitoring port, participating in Port Mirroring. Following is how this panel displays when the port type is Probe.
Page 90
Mirrored Port being mirrored. Member of a Link Aggregation (LAG) trunk. Following is how this panel displays when the port type is LAG. STP Mode Select the Spanning Tree Protocol (STP) Administrative Mode for the port or LAG. The possible values are Enabled and Disabled. Admin Mode Use the pull-down menu to select the port control administration state.
Link Status Indicates whether the Link is Up or Down. Following is how this panel displays when the link status is link up. Link Trap This object determines whether or not to send a trap when link status changes. The factory default is Enabled.
Page 92
Port Identifies the physical port. Port Type If not blank, this field indicates that this port is a special type of port. The possible values are: Mirrored Port being mirrored. Probe Probe port, participating in Port Mirroring. Member of a link aggregation trunk. STP Mode The Administrative Mode for the port or LAG.
Page 93
Control Mode Displays whether flow control is Enabled or Disabled on this port. The following displays the right side of the panel. Descriptions of these fields follow. LACP Mode Displays whether Link Aggregation Control Protocol (LACP) is Enabled or Disabled on this port. Physical Mode Displays the selected port speed and duplex mode.
Mirroring This panel displays the port mirroring information for the switch module. Port Mirroring Mode Select the Port Mirroring Mode by selecting the corresponding line on the pull- down entry field. The factory default is Disabled. Probe Port The interface you want to act as the Probe. Once configured there is no network connectivity on the probe port.
SNMP This menu provides access to the following Simple Network Management Protocol (SNMP) options: • Community configuration • Trap receiver configuration • Trap receiver summary • Supported MIBs Community configuration By default, two SNMP Communities exist: • private, with Read/Write privileges and status set to Enable •...
The SNMP agent of the switch complies with SNMPv1 (for more about the SNMP specification, see the SNMP RFCs). The SNMP agent sends traps through TCP/IP to an external SNMP manager based on the SNMP configuration (the trap receiver and other SNMP community parameters). Community Use this pull-down menu to select one of the existing community names, or select Create to add a new one.
Community This field adds an SNMP trap receiver community name and associated IP address. Name Enter the community string for the SNMP trap packet to be sent to the trap manager. This may be up to 16 characters and is case sensitive. IP Address Enter the IP address to receive SNMP traps from this device.
Community Displays the community string for the SNMP trap packet to be sent to the trap manager. Note that trap receiver communities and SNMP communities are separate and distinct. IP Address Displays the IP address to receive SNMP traps from this device. Status Indicates whether traps are currently Enabled for this community: Enable...
Name The RFC number if applicable and the name of the MIB. Description The RFC title or MIB description. Click the Refresh button to retrieve and display the database again starting with the first entry in the table. Statistics This menu provides access to menu options that display various switch statistics, including: •...
Page 100
ifIndex This object indicates the ifIndex of the interface table entry associated with the processor of this switch. Received Octets Received The total number of octets of data received by the processor (excluding framing bits but including FCS octets). Packets Received Without Error The total number of packets (including broadcast packets and multicast packets) received by the processor.
Page 101
Transmitted Octets Transmitted The total number of octets of data transmitted on the network including framing bits. Packets Transmitted Without Errors The total number of packets that have been transmitted on the network without an error occurring. Unicast Packets Transmitted The total number of packets that higher-level protocols requested be transmitted to a subnetwork-unicast address, including those that were discarded or not sent.
Time Since Counters Last Cleared: The elapsed time in days, hours, minutes and seconds since the statistics for this port were last cleared. Click the Clear Counters button to clear all the counters, resetting all summary and switch detailed statistics to defaults, except for the counts of discarded packets, which cannot be cleared. Click the Refresh button to refresh the data on the screen with the present state of the data in the switch.
Broadcast Packets Transmitted The total number of packets that higher-layer protocols requested to be transmitted to the broadcast address, including those that were discarded or not sent. Transmit Packet Errors The number of outbound packets that could not be transmitted because of errors. Address Entries Currently In Use The number of learned and static Forwarding Database Address Table entries currently in use by this switch module.
Page 104
Packets Received: Octets Received The total number of octets of data (including those in bad packets) received on the network (excluding framing bits but including FCS octets). This object can be used as a reasonable estimate of Ethernet utilization. If greater precision is desired, the etherStatsPkts and etherStatsOctets objects should be sampled before and after a common interval.
Page 105
Total Packets Received with MAC Errors Total Packets Received with MAC Errors The total number of inbound packets that contained errors that prevented them from being delivered to a higher-layer protocol. Jabbers Received The total number of packets received that were longer than 1518 octets (excluding framing bits, but including FCS octets), and had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error).
Page 106
Packets Transmitted 256-511 Octets The total number of packets (including bad packets) transmitted that were between 256 and 511 octets in length (excluding framing bits but including FCS octets). Packets Transmitted 512-1023 Octets The total number of packets (including bad packets) transmitted that were between 512 and 1023 octets in length (excluding framing bits but including FCS octets).
Page 107
Total Transmit Packets Discarded Total Transmit Packets Discarded The sum of single collision frames discarded, multiple collision frames discarded, and excessive collision frames discarded. Single Collision Frames The number of successfully transmitted packets which encountered exactly one collision. Multiple Collision Frames The number of successfully transmitted packets which encountered more than one collision.
Click the Clear Counters button to clear all the counters, resetting all statistics for this port to default values. Click the Clear All Counters button to clear all the counters for all ports, resetting all statistics for all ports to default values. Click the Refresh button to refresh the data on the screen with the present state of the data in the switch.
Page 109
Port Use this field to select the port for which to display statistics. Click the down arrow to display the list of ports from which to choose. ifIndex This object indicates the ifIndex of the interface table entry associated with this port on an adapter.
Click the Clear All Counters button to clear all the counters for all ports, resetting all statistics for all ports to default values. Click the Refresh button to refresh the data on the screen with the present state of the data in the switch.
Reset configuration to defaults Click the Reset button to reset the configuration of the switch module to the factory defaults. The switch is automatically reset when this command is processed. All configuration changes that you have made, including those saved to NVRAM, will be lost. You are prompted to confirm that the reset should proceed.
Download file to switch Use this panel to configure the information needed to download a file to the switch. File Type Specify the type of file to be downloaded to the switch: Code Specify code when you want to upgrade the operational flash. This is the factory default.
Configuration Specify configuration when you want to update the switch's configuration. If the file has errors the update will be stopped. TFTP Server IP Address Enter the IP address of the TFTP server. The factory default is 0.0.0.0. TFTP File Path This field specifies the directory path on the TFTP server where the file to be downloaded to the switch is located.
File Type This field sets the type of file to be uploaded from the switch. The datatype is one of the following: config Configuration file errorlog Error log msglog Message log TFTP Server IP Address Enter the IP address of the TFTP server. The factory default is 0.0.0.0. TFTP File Path This field specifies the directory path on the TFTP server where the file to be uploaded from the switch is to be located.
The switch can be pinged from any IP workstation with which the switch is connected through the default VLAN (VLAN 1), as long as there is a physical path between the switch and the workstation. IP Address Enter the IP address of the station you want the switch to ping. The initial value is blank.
Authentication Indicates whether authentication failure traps will be sent (Enable) or not (Disable). This field Enables or Disables the Authentication Flag, which determines whether a trap message is sent when the switch detects an authentication failure. The factory default is Enabled. Link Up/Down Indicates whether a trap will be sent when the link status changes from Up to Down or vice versa.
Number of Traps Since Last Reset The number of traps that have occurred since the last time the switch was reset. Number of Traps Since Log Last Viewed The number of traps that have occurred since the traps were last displayed. Displaying the traps by any method (terminal interface display, Web display, upload file from switch, etc.) will cause this counter to be cleared to 0.
• Multicast forwarding database • Spanning tree VLAN This menu provides access to Virtual Local Area Network (VLAN) configuration, displays status and displays summary information. Menu options are: • Configuration • Status • Port configuration • Port summary • Reset configuration Configuration This panel displays detailed information, including interface information, for a specific VLAN.
Page 119
VLAN Name A string associated with this VLAN as a convenience. It can be up to 16 alphanumeric characters long, including blanks. The default is blank. VLAN ID 1 always has a name of Default. Use this field to change an existing Name. This field is optional.
Participation Use the pull-down menu to configure the degree of participation of this port in this VLAN. The permissible values are: Include This port is always a member of this VLAN. This is equivalent to registration fixed in the IEEE 802.1Q standard. Exclude This port is never a member of this VLAN.
VLAN Type What type of VLAN this is. A VLAN can be: • the Default VLAN (VLAN ID = 1). • a static VLAN, one that you have created. • a Dynamic VLAN, one that is created by GVRP registration. In order to change a VLAN from Dynamic to Static, use the VLAN Configuration panel or the config vlan makestatic command.
Port VLAN ID Specify the VLAN ID you want assigned to untagged or priority tagged frames received on this port. The VLAN ID must be that of a VLAN you have already created. The factory default is 1. Acceptable Frame Types Specify how you want the port to handle untagged and priority tagged frames.
Port VLAN ID The VLAN ID that this port will assign to untagged frames or priority tagged frames received on this port if the acceptable frame types parameter is set to Admit All. The factory default is 1. Acceptable Frame Types The types of frames that may be received on this port.
Page 124
Group Use this pull-down menu to select one of the existing PBVLANs, or select Create to add a new one. A Group ID number will be assigned automatically when you create a new group. You can create up to 128 groups. Group Name Use this field to assign a name to a new group.
Click the Delete Group button to remove the protocol-based VLAN group identified by the value in the Group ID field. Again, if you want the switch to retain the deletion across a power cycle, you must perform a save. Summary This panel displays the protocol-based VLAN information for all groups.
Click the Refresh button to update the screen with the latest information. Filters This menu provides access to two MAC filter screens: • MAC filter configuration • MAC filter summary MAC filter configuration Use this panel to add a static MAC filter entry for a MAC address and VLAN pair, update existing filter information, or delete one or more configured filters.
VLAN ID The VLAN ID used with the MAC address to fully identify packets you want filtered. You can only change this field when you have selected the Create Filter option and you can only select a configured VLAN. Destination Port Mask Select the ports you want included in the filter from the pull-down menu.
GARP This menu provides access to the Generic Attribute Registration Protocol (GARP) summary and configuration panels. Menu options are: • Status • Switch configuration • Port configuration Status This screen shows the GARP Status for the switch and for the individual ports. Note that the timers are only relevant when the status for a port shows as Enabled.
Join Timer (centisecs) Specifies the time between the transmission of GARP PDUs registering (or re-registering) membership for a VLAN or multicast group in centiseconds. An instance of this timer exists for each GARP participant for each port. Permissible values are 10 to 100 centiseconds (0.1 to 1.0 seconds).
GMRP Mode Choose the GMRP administrative mode for the switch by selecting Enable or Disable from the pull-down menu. The factory default is Disable. Click the Apply button to update the switch with the values you enter. If you want the switch to retain the new values across a power cycle you must perform a save.
assert registration for the same attribute in order to maintain uninterrupted service. Enter a number between 20 and 600 (0.2 to 6.0 seconds). The factory default is 60 centiseconds (0.6 seconds). An instance of this timer exists for each GARP participant for each port. Leave All Timer (centisecs) The Leave All Timer controls how frequently LeaveAll PDUs are generated.
Admin Mode Select the administrative mode for IGMP snooping for the switch from the pull-down menu. The default is Disable. Group Membership Interval (secs) Specify the amount of time you want the switch to wait for a report for a particular group on a particular interface before it deletes that interface from the group.
Select the Ports to Enable for IGMP Snooping The multiple select box lists all physical and LAG interfaces. Those interfaces currently enabled for IGMP snooping are shown as selected. Select all the interfaces you want enabled and deselect all those you want Disabled. Click the Apply button to update the switch with the values you enter.
Link Trap Enables or Disables link trap notifications for the specified LAG. Administrative Mode This field Enables or Disables the specified LAG(s). Link Status Indicates whether the Link is Up or Down. STP Mode Sets the STP mode for the specified LAG(s). Port Identifies a physical port.
The logical port identifier of the LAG, in the format lag.port. LAG Name The name of this LAG. Admin Mode The administrative mode. The factory default is Enabled. Link State Indicates whether the link is Up or Down. STP Mode The Spanning Tree Protocol Administrative Mode associated with the LAG.
MAC Address Enter a MAC address and VLAN pair for which the switch has forwarding and/or filtering information. The format is two two-digit hexadecimal numbers representing the VLAN and six two-digit hexadecimal numbers representing the MAC address, separated by hyphens; for example, 00-01-00-23-45-67-89-AB. After you have entered a MAC address click the Search button and the data associated with the address will be displayed.
MAC Address A MAC address and VLAN pair for which the switch has forwarding and/or filtering information. The format is two two-digit hexadecimal numbers representing the VLAN and six two-digit hexadecimal numbers representing the MAC address, separated by hyphens; for example, 00-01-00-23-45-67-89-AB. Type Displays the type of the entry.
MAC Address A MAC address and VLAN pair for which the switch has forwarding and/or filtering information. The format is two two-digit hexadecimal numbers representing the VLAN and six two-digit hexadecimal numbers representing the MAC address, separated by hyphens; for example, 00-01-00-23-45-67-89-AB. Type Displays the type of the entry.
Max MFDB Table Entries Displays the total number of entries possible in the MFDB table. Most MFDB Entries Since Last Reset Displays the largest number of entries that have been present in the MFDB table since last reset. This value is also known as the MFDB high-water mark. Current Entries Displays the current number of entries in the MFDB table.
Spanning Tree Admin Mode Select Enable or Disable from the pull-down menu to specify whether spanning tree operation is Enabled on the switch. Force Protocol Version Specify the version of the Spanning Tree Protocol (STP) you want the switch to use. The options are IEEE 802.1D (standard) and IEEE 802.1w (Rapid Reconfiguration).
Page 141
Bridge Priority Specifies the bridge priority. The value may be between 0 and 61440. It is set in multiples of 4096. For example, if you enter any value between 0 and 4095, it will be set to 0. If you enter any value between 4096 and (2*4096-1) it will be set to 4096.
Topology Change The value of the topology change parameter for the switch indicating if a topology change is in progress on any port on the bridge. It takes a value if True or False. Designated Root The bridge identifier of the root bridge. Root Path Cost Path Cost to the Designated Root for this bridge instance.
Page 143
Port Priority Specify the priority for the selected port. The port priority is set in multiples of 16, and the range is 0 to 240. Admin Edge Port Select Enable to specify the port as an Edge Port within the CST. Disable is the default.
CST Path Cost Path Cost to the CST Regional Root. Click the Apply button to send the updated screen to the switch and cause the changes to take effect on the switch. If you want the switch to retain the new values across a power cycle you must perform a save.
Class of service This menu contains one option – 802.1p priority mapping. 802.1p priority mapping Use this panel to specify how IEEE 802.1p priority classes are to be mapped to the switch’s internal traffic classes. User Priority The 802.1p user priority to be mapped. Traffic Class Use the pull-down menus to select the internal traffic class for each user priority.
Port access control The Port Access Control menu provides access to configuration, status and summary screens: • Configuration • Port configuration • Port status • Port summary • Statistics • Login • Port access privileges • Port access summary Configuration Use this panel to enable or disable authentication support on the switch.
Port configuration Use this panel to begin the initialization or the reauthentication sequence on the selected port. Port Select the port to be configured. When the selection is changed, a screen refresh will occur causing all fields to be updated for the newly selected port. All physical interfaces are valid.
Transmit Period (secs) Configures the transmit period for the selected port. The transmit period is the value, in seconds, of the timer used by the authenticator state machine on the specified port to determine when to send an Extensible Authentication Protocol Over LAN (EAPOL) EAP Request/Identity frame to the supplicant.
Page 149
Port Select the port whose information will be displayed. When the selection is changed, a screen refresh will occur causing all fields to be updated for the newly selected port. All physical interfaces are valid. Control Mode Displays the configured control mode for the specified port. Options are: force unauthorized The authenticator port access entity (PAE) unconditionally sets the controlled port to unauthorized.
Page 150
specified port to determine when to send an EAPOL EAP Request/Identity frame to the supplicant. The transmit period range is 1 to 65535. Supplicant Timeout (secs) Displays the configured supplicant timeout for the selected port. The supplicant timeout is the value, in seconds, of the timer used by the authenticator state machine on this port to timeout the supplicant.
• Authenticated • Aborting • Held • Force Authorized • Force Unauthorized Backend State Displays the current state of the backend authentication state machine. Possible values are: • Request • Response • Success • Fail • Timeout • Initialize • Idle Click the Refresh button to update the information on the page.
Force Unauthorized The authenticator port access entity (PAE) unconditionally sets the controlled port to unauthorized. Force Authorized The authenticator PAE unconditionally sets the controlled port(s) to authorized mode. Auto The authenticator PAE sets the controlled port(s) mode to reflect the result of the authentication exchanges between the supplicant, authenticator and authentication server.
Page 153
Port Select the port whose information is to be displayed. When the selection is changed, a screen refresh occurs causing all fields to be updated for the newly selected port. All physical interfaces are valid. EAPOL Frames Received The number of valid EAPOL frames of any type that have been received by this authenticator.
EAP Request/ID Frames Transmitted The number of EAP request/identity frames that have been transmitted by this authenticator. EAP Request Frames Transmitted The number of EAP request frames (other than request/identity frames) that have been transmitted by this authenticator. Invalid EAPOL Frames Received The number of EAPOL frames that have been received by this authenticator with an invalid length.
Click the Refresh button to update the information on the page. Click the Apply button to send the updated screen to the switch and cause the changes to take effect on the switch. Port access privileges Use this panel to add the specified user to the list of users with access to the specified port(s). By default, a user is given access to all ports.
Port The port whose information is displayed on this line. Users The locally configured users with access to the specified port. Click the Refresh button to update the information on the page. RADIUS The Remote Authentication Dial-in User Service (RADIUS) menu provides access to the following panels: •...
times the timeout for all configured servers. If the RADIUS request was generated by a user login attempt, all user interfaces are blocked until the RADIUS application returns a response. Current Server IP Address The IP address of the current server. This field is blank if no servers are configured. Number of Configured Servers The number of RADIUS servers that have been configured.
Page 158
RADIUS Server IP Address Select the RADIUS Server to be configured. Select Add to add a new server. Port The User Datagram Protocol (UDP) port used by this server. The valid range is 0 - 65535. Secret The shared secret for this server. The data entered in this field will not be displayed. Apply The Secret is applied only if this box is checked.
RADIUS statistics This panel displays RADIUS statistics for the switch that are not associated with a specific server or accounting server. Invalid Server Addresses The number of RADIUS Access-Response packets received from unknown addresses. Click the Refresh button to update the information on the page. Server statistics This panel displays the statistics for a configured RADIUS server.
Page 160
RADIUS Server IP Address Select the IP address of the server whose information is to be displayed. Round Trip Time (secs) The time, in seconds, between the most recent RADIUS Access-Reply/Access- Challenge and the matching Access-Request from this RADIUS server. Access Requests The number of RADIUS Access-Request packets sent to this server, not including retransmissions.
Pending Requests The number of RADIUS Access-Request packets sent to this server that have not yet timed out or received a response. Timeouts The number of RADIUS packets sent to this server that have timed out. Unknown Types The number of RADIUS packets of unknown type received from this server. Packets Dropped The number of RADIUS packets received from this server dropped for a reason not otherwise included in this list.
Secret Configured Indicates whether the shared secret for this accounting server has been configured. Click the Apply button to send the updated screen to the switch and cause the changes to take effect on the switch. If you want the switch to retain the new values across a power cycle you must perform a save.
Malformed Accounting Responses Displays the number of malformed RADIUS Accounting-Response packets received from this server. Malformed packets include packets with an invalid length. Bad authenticators and unknown types are not included as malformed accounting responses. Bad Authenticators Displays the number of RADIUS Accounting-Response packets that contained invalid authenticators received from this accounting server.
Page 164
HTTPS Admin Mode Select Enable or Disable to turn the Administrative Mode of Secure HTTP on or off. The currently configured value is shown when the web page is displayed. The default value is Disable. TLS Version 1 Select Enable or Disable to turn Transport Layer Security (TLS) Version 1.0 on or off. The currently configured value is shown when the web page is displayed.
Secure Shell Secure Shell (SSH) is the standard encryption protocol used to provide a secure interactive login over a network. This Secure Shell menu provides access to the SSH configuration panel. Configuration Use this panel to configure SSH variables. Admin Mode Select Enable or Disable to turn the Administrative Mode of SSH on or off.
Click the Submit button to send the updated screen to the switch and have the changes take effect on the switch If you want the switch to retain the new values across a power cycle you must perform a save. Click the Refresh button to display the current page with the latest settings and status.
Page 167
Make a selection from the pull-down menu. You may create a new ACL or update the configuration of an existing ACL. ACL ID ACL ID must be a whole number between 1 and 100. Ports This dynamic multi-selector lists all available valid interfaces for ACL mapping. All non- routing physical interfaces and interfaces participating in LAGs that are not already assigned to an ACL are listed.
Summary This panel displays a summary of all ACLs on the switch. The ACL identifier. Rules The number of rules that are associated with this ACL. Ports The interfaces that are associated with this ACL. Direction The packet filtering direction for the ACL on the interface. Click the Refresh button to update the screen with the latest information.
Page 169
Use the pull-down menu to select the ACL for which you want to create or update a rule. Rule Enter a whole number in the range of 1 to 10 that will be used to identify the rule. An ACL may have up to 10 user-specified rules. Action Specify what action should be taken if a packet matches the rule’s criteria.
Page 170
Protocol Keyword Specify that a packet’s IP protocol is a match condition for the selected ACL rule. If you click Configure on this line you will be shown a new screen where you can select the protocol to be used as the match condition. The possible values are ICMP, IGMP, IP, TCP, and UDP.
Source L4 Port Keyword Specify that a packet’s source Layer 4 port is a match condition for the selected ACL rule. If you click Configure on this line you will be shown a new screen where you can select the port to be used as the match condition. The possible values are domain, echo, FTP, ftpdata, HTTP, SMTP, SNMP, Telnet, TFTP, and www.
Bandwidth Profile Select Create from the pull-down menu to configure a new bandwidth profile, or select one of the existing profiles to display and update its configuration. Bandwidth profile 1, named default, always exists and you cannot change or delete it. Name Enter the name you want to give to the bandwidth profile.
Bandwidth Profile Displays the number associated with the bandwidth profile. Name Displays the name of the bandwidth profile. Allocated Minimum Bandwidth Displays the sum of the minimum guaranteed bandwidth for all bandwidth profiles configured on this interface. Maximum Bandwidth Displays the sum of the maximum allowable bandwidth for all bandwidth profiles configured on this interface.
Page 174
Traffic Class Select Create from the pull-down menu to configure a new Traffic Class, or select one of the existing classes to display and update its configuration. Name Enter the name to be given to the Traffic Class. You may enter up to 15 alpha-numeric characters and may include the underscore _ or the dash -.
There is no restriction on the sum of the maximum bandwidth of all Traffic Classes associated with the same interface. When a Traffic Class is attached to a LAG interface, the bandwidth allocation profile minimum bandwidth parameter will not be applicable to the Traffic Class.
Interface allocation summary This panel displays the bandwidth allocated to the listed interfaces. The allocated minimum bandwidth does not exceed the capability of the interface unless the interface is a LAG. Interface The Port designation of an interface for which you have configured one or more traffic classes.
6 Command Line Interface Management Your NovaScale Blade 1 GB Intel® Ethernet Switch Module supports a management interface that you can use to set up and control your device over the network using the TCP/IP Telnet protocol. You can use this facility to perform the same network management functions that you can perform using the Web Interface.
Command name The following conventions apply to the command name: • The command name is displayed in this document in bold font and must be typed exactly as shown. • Once you have entered enough letters of a command name to uniquely identify the command, hitting the space bar or Tab key will cause the system to complete the word.
logical port This is used to identify a logical interface – a Link Aggregation Group or a VLAN. You enter a name and number separated by a period, for example: lag.3 identifies LAG 3 vlan.2 identifies VLAN 2 character strings Use double quotation marks to identify character strings, for example, “System Name with Spaces”.
Tab, <SPACE> command-line completion Exit go to next lower command prompt execute the most recent command execute the nth most recent command execute the nth command in history buffer !str execute the most recent command that starts with the string “str”. !*str execute the most recent command that contains the string “str”.
The two previously described modes are only applicable to the NovaScale Blade 1 GB Intel® Ethernet Switch Module. The management module can only be remotely accessed through the 10/100 Mbps Ethernet port on the management module. Connecting to the NovaScale Blade 1GB Intel® Ethernet Switch Module When you know the IP address for your switch module and have an existing network connection, you can use the Telnet program (in VT-100 compatible terminal mode) to access and control the...
There are two ways to change the configuration stored in NVRAM: • Save a new configuration using the save config command. • Reset all configuration values to the initial settings listed in Appendix C “Run-time Switching Software Default Settings” on page 233 by issuing the clear config command. This restores the configuration settings that were entered at the factory and causes a reboot.
NovaScale Blade 1GB Intel® Ethernet Switch Module system commands This section describes the commands that you use to configure and manage the switch. These commands include: • System information and statistics commands • System configuration commands • System description commands •...
show forwardingdb learned Use this command to display forwarding database entries for learned addresses. Format show forwardingdb learned show forwardingdb table Use this command to display the forwarding database entries. If the command is entered with no parameter, the entire table is displayed. This is the same as entering the optional <all> parameter. Alternatively, you can enter a MAC address to display the table entry for that address and all entries following it.
Maintenance Level The identification of the hardware change level. Manufacturer The two-octet code that identifies the manufacturer. Burnedin MAC Address The burned-in universally administered MAC address of this switch. Software Version The release.version.maintenance number of the code currently running on the switch.
Page 188
NOTE Message log information is not retained across a switch module reset and wraps after 512 entries. NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
Port commands System and configuration config port adminmode Use this command to enable or disable one or more ports. The port will only participate in the network when it is enabled. Default enable Format config port adminmode <port/listofports/all> <enable/disable> config port autoneg Use this command to enable or disable automatic negotiation on one or more ports.
Page 190
10BASE-T full duplex 10BASE-T half duplex show port Use this command to display port information. Format show port <port/listofports/all> Port The interface number of the physical port or LAG whose information is displayed on the line. Type If not blank, this field indicates that this port is a special type of port. The possible values are: Monitoring port, participating in Port Mirroring.
config mirroring delete Use this command to remove the port mirroring designation from both the probe port and the mirrored port. The probe port must be manually re-added to any desired VLANs. Format config mirroring delete config mirroring mode Use this command to configure the port mirroring mode. The possible values are enable and disable. The probe and mirrored ports must be configured before port mirroring can be enabled.
Page 192
Format config snmpcommunity create <name> config snmpcommunity delete Use this command to remove a name from the SNMP community table. Format config snmpcommunity delete <name> config snmpcommunity ipaddr Use this command to specify the IP address (or portion thereof) from which this device will accept SNMP packets with the associated community name.
Page 193
SNMP manager based on the SNMP configuration (the trap receiver and other SNMP community parameters). Format show snmpcommunity SNMP Community Name The community name of this row of the table. Client IP Address An IP address (or portion thereof) from which this device will accept SNMP packets with the associated community name.
Format config snmptrap mode <enable/disable> <name> <ipaddr> show snmptrap Use this command to display information about SNMP trap receivers. Trap messages are sent across the network to an SNMP Network Manager. These messages alert the manager to events occurring within the switch or on the network. Up to six trap receivers are supported at the same time. Format show snmptrap SNMP Trap Name...
Page 195
Default Gateway The default IP gateway address for this interface. The factory default value is 0.0.0.0. Burned In MAC Address The burned-in MAC address used for in-band connectivity if you choose not to configure a locally administered address. Network Configuration Protocol Current Indicates that the switch will transmit a DHCP request following power-up.
Page 196
show telnet Use this command to display Telnet settings. Format show telnet Telnet Login Timeout (minutes) The number of minutes of inactivity that will occur on a Telnet or SSH session before the switch logs off. A value of zero means there will be no timeout. Maximum Number of Telnet Sessions The number of simultaneous Telnet and SSH sessions allowed.
Page 197
config users snmpv3 authentication Use this command to specify the protocol to be used to authenticate a user account. The valid authentication protocols are none, md5 or sha. If md5 or sha are specified, the user login password will be used as the SNMPv3 authentication password. The <user> is the user account for which the specified authentication protocol will be used.
Format config loginsession close <sessionid/all> show loginsession Use this command to display currently active Telnet and serial port connections to the switch. Format show loginsession Login Session ID User Name The account name used to login via the serial port or Telnet. Connection From The IP address of the Telnet client machine or EIA-232 for the serial port connection.
Page 199
show stats port detailed Use this command to display detailed statistics for a specified port. Format show stats port detailed <port> Packets Received Octets Received The total number of octets of data (including those in bad packets) received on the network (excluding framing bits but including FCS octets).
Page 200
Broadcast Packets Received The number of packets received that were directed to a broadcast address. Note that this number does not include packets directed to the multicast address. Packets Received with MAC Errors Total Packets Received with MAC Errors The total number of inbound packets that contained errors that prevented them from being delivered to a higher-layer protocol.
Page 201
Packets Transmitted 128-255 Octets The total number of packets (including bad packets) transmitted that were between 128 and 255 octets in length (excluding framing bits but including FCS octets). Packets Transmitted 256-511 Octets The total number of packets (including bad packets) transmitted that were between 256 and 511 octets in length (excluding framing bits but including FCS octets).
Page 202
Transmit Discards Total Transmit Packet Discarded The sum of single collision frames discarded, multiple collision frames discarded, and excessive collision frames discarded. Single Collision Frames The number of successfully transmitted packets which encountered exactly one collision. Multiple Collision Frames The number of successfully transmitted packets which encountered more than one collision.
Page 203
Packets Received Without Error The total number of packets (including multicast and broadcast packets) received on this port. Packets Received With Error The number of inbound packets that contained errors that prevented them being delivered to a higher-layer protocol. Broadcast Packets Received The total number of packets received that were directed to the broadcast address.
Page 204
Transmitted Octets Transmitted The total number of octets of data transmitted on the network including framing bits. Packets Transmitted Without Errors The total number of packets that have been transmitted on the network. Unicast Packets Transmitted The total number of packets that higher-level protocols requested be transmitted to a subnetwork-unicast address, including those that were discarded or not sent.
Time Since Counters Last Cleared The elapsed time in days, hours, minutes and seconds since the statistics for this port were last cleared. show stats switch summary Use this command to display a summary of the statistics for all switch traffic. Format show stats switch summary Packets Received Without Error...
System Contact Text used to identify a contact person for the switch. May be up to 31 alphanumeric characters. The factory default is blank. System ObjectID The base object ID for the switch’s enterprise MIB. System Up Time The time in days, hours and minutes since the last reboot. MIBs Supported The list of MIBs supported by the management agent running on the switch.
Page 207
clear stats switch Use this command to clear the statistics for the switch. You will be prompted to confirm that you want to issue this command. Format clear stats switch clear transfer Use this command to reset the file transfer parameters to the factory defaults. You will be prompted to confirm that you want to issue this command.
Page 208
save config Use this command to permanently save configuration changes made since the previous save or reboot to Non-Volatile Random Access Memory (NVRAM). You are prompted to verify your choice. Format save config show history Use this command to show the contents of the command history buffer. The output will display the oldest command in the history buffer first and the show history command (the newest command) last.
Page 209
transfer download start Use this command to start a download transfer. After the current settings are displayed you will be prompted to confirm your decision. This command will close your connection to the host. Format transfer download start The following information fields are displayed: TFTP Server IP The IP address of the server where the file is to be downloaded.
Page 210
You may specify the file path as part of the file name if the string is less than 31 characters. Otherwise, use the transfer upload path command to specify the directory path. This command is valid only when the Transfer Mode is TFTP. See transfer upload mode. Format transfer upload filename <name>...
Trap manager config trapflags authentication Use this command to enable or disable the Authentication Flag, which determines whether a trap message is sent when the switch detects an authentication failure. Default enable Format config trapflags authentication <enable/disable> config trapflags linkmode Use this command to enable or disable Link Up/Down traps for the entire switch.
Number of Traps Since Last Reset The number of traps that have occurred since the last time the switch was reset. Number of Traps Since Log Last Viewed The number of traps that have occurred since the traps were last displayed. Displaying the traps by any method (terminal interface display, Web display, upload file from switch, etc.) will cause this counter to be cleared to 0.
will be disabled on that interface. GARP functionality will subsequently be re-enabled if routing is disabled or LAG membership is removed from an interface that previously had GARP enabled. Default disable Format config garp grmp interfacemode <port/listofports/all><enable/disable> config garp gvrp adminmode Use this command to enable or disable GVRP on the switch module.
show garp info Use this command to display GARP information for the NovaScale Blade 1GB Intel® Ethernet Switch Module. Format show garp info GMRP Admin Mode This displays the administrative mode of GMRP for the switch module. The default is disable. GVRP Admin Mode This displays the administrative mode of GVRP for the NovaScale Blade 1GB Intel®...
IGMP snooping commands config igmpsnooping adminmode Use this command to enable or disable IGMP Snooping on the switch module. Default disable Format config igmpsnooping adminmode <enable/disable> config igmpsnooping groupmembershipinterval Use this command to configure the IGMP Group Membership Interval time on the NovaScale Blade 1GB Intel®...
show igmpsnooping Use this command to display IGMP Snooping information for the NovaScale Blade 1GB Intel® Ethernet Switch Module. Configuration information is displayed whether or not IGMP Snooping is enabled. Status information is only displayed when IGMP Snooping is enabled. Format show igmpsnooping Admin Mode...
Format config lags deletelag <logical port/listofports/all> config lag deleteport Use this command to delete one or more ports from a LAG. The first interface parameter designates a configured LAG. The second interface number designates a port that is a member of the LAG. Use <all>...
MAC filter commands config macfilter adddest Use this command to add the <port> to the destination filter set for the MAC filter with the MAC address of <macaddr> and VLAN of <vlan>. The <macaddr> parameter must be specified as a 6- byte hexadecimal number in the format of 00-12-34-56-78-90.
show macfilter Use this command to display the Static MAC Filtering information. If <all> is selected as the first parameter, all the Static MAC Filters in the switch module are displayed. If a <macaddr> is entered, a VLAN ID must also be entered and the Static MAC Filter information will be displayed only for that MAC address and VLAN ID pair.
show mfdb staticfiltering Use this command to display the Static Filtering entries in the MFDB. Format show mfdb staticfiltering Mac Address A MAC address and VLAN pair for which the switch has forwarding and/or filtering information. The format is two, two-digit hexadecimal numbers, representing the VLAN and six, two-digit hexadecimal numbers, representing the MAC address, separated by hyphens;...
Forwarding Interfaces The forwarding list is derived from combining all the component’s forwarding interfaces and removing the interfaces that are listed as the static filtering interfaces. Protocol-based VLAN commands config protocol create Use this command to add a protocol-based VLAN group to the NovaScale Blade 1GB Intel® Ethernet Switch Module.
config protocol vlan add Use this command to attach a <vlan> to the protocol-based VLAN identified by <groupid>. A group may only be associated with one VLAN at a time, however the VLAN association can be changed. Format config protocol vlan add <groupid> <vlan> config protocol vlan remove Use this command to remove the <vlan>...
Page 223
config spanningtree bridge maxage Use this command to configure the Bridge Max Age parameter to a new value. This is the value that all bridges use for maxage when this bridge is acting as the root: A BPDU will be discarded when its age exceeds maxage.
Spanning tree Common Spanning Tree (CST) commands config spanningtree cst port edgeport Use this command to specify whether a port is an edge port within the Common Spanning Tree (CST). This will allow the port to transition to Forwarding State without delay. The <port> is the port to be affected.
Page 225
Root Port Max Age The maximum age of STP information learned from the network on any port before it is discarded. Root Port Bridge Forward Delay The value that all bridges use for forwarddelay when this bridge is acting as the root.
Hello Time The hello time in use for this port. Edge Port The configured value indicating if this port is an edge port. Edge Port Status The derived value of the edge port status. True if operating as an edge port; false otherwise.
Port Up Time Since Counters Last Cleared The time in days, hours, minutes, and seconds since the counters were last reset. STP BPDUs Transmitted The number of STP BPDUs sent by this port. STP BPDUs Received The number of STP BPDUs received by this port. RSTP BPDUs Transmitted The number of Rapid Reconfiguration STP BPDUs sent by this port.
Virtual Local Area Network (VLAN) commands config vlan bcaststorm Use this command to enable or disable broadcast storm control for a particular Virtual Local Area Network (VLAN). If broadcast storm control is enabled, storms are controlled by counting the number of broadcast packets within a certain time period. If the [packets per second] count limit is exceeded, the packets are discarded.
Participation options are: include The interface is always a member of this VLAN. This is equivalent to registration fixed. exclude The interface is never a member of this VLAN. This is equivalent to registration forbidden. auto The interface is dynamically registered in this VLAN by GVRP. The interface will not participate in this VLAN unless a join request is received on this interface.
show vlan detailed Use this command to display detailed information, including interface information, for a specific VLAN. Format show vlan detailed VLAN ID There is a VLAN Identifier (VLAN ID) associated with each VLAN. The range of the VLAN ID is 1 to 4094. VLAN Name A string associated with this VLAN as a convenience.
Untagged All frames transmitted for this VLAN will be untagged. show vlan port Use this command to display VLAN port information. Format show vlan port <port/listofports/all> Port Indicates which port is associated with the fields on this line. Port VLAN ID The VLAN ID that this port will assign to untagged frames or priority tagged frames received on this port if the acceptable frame types parameter is set to Admit All.
In order to change a VLAN from dynamic to static, use the config vlan makestatic command. BcastStorm This displays the administrative mode of broadcast storm control for this VLAN. If storm control is enabled, storms are controlled by counting the number of broadcast packets within a certain time period.
Security configuration commands This section describes the commands used to configure and manage the security features of the NovaScale Blade 1 GB Intel® Ethernet Switch Module. These features include: • Authentication commands • IEEE 802.1X Port-based network access control • Remote Authentication Dial-In User Service (RADIUS) •...
a specific user if the user is configured locally. If this value is not configured, users will be authenticated using local authentication only. Format config users defaultlogin <listname> config users login Use this command to assign the specified authentication login list to the specified user for system login.
IEEE 802.1X commands clear dot1x port stats Use this command to reset the IEEE 802.1X statistics for the specified port(s). Format clear dot1x port stats <port/all> config dot1x adminmode Use this command to enable or disable authentication support on the switch. The default value is disable.
Format config dot1x port initialize <port> config dot1x port maxrequests Use this command to configure the maximum number of times the authenticator state machine on the specified port will retransmit an Extensible Authentication Protocol Over LANs (EAPOL) EAP Request/Identity before timing out the supplicant. The maximum requests value must be in the range of 1 and 10.
config dot1x port supptimeout Use this command to configure the value, in seconds, of the timer used by the authenticator state machine on the specified port to timeout the supplicant. The supplicant timeout must be between 1 and 6553. Default Format config dot1x port supptimeout <port>...
Quiet Period (secs) The timer used by the authenticator state machine on this port to define periods of time in which it will not attempt to acquire a supplicant. The value is expressed in seconds and will be in the range 0 and 65535. Transmit Period (secs) The timer used by the authenticator state machine on the specified port to determine when to send an EAPOL EAP Request/Identity frame to the supplicant.
Last EAPOL Frame Version The protocol version number in the most recently received EAPOL frame. Last EAPOL Frame Source The source MAC address in the most recently received EAPOL frame. EAP Response/ID Frames Received The number of EAP response/identity frames that have been received by the authenticator port.
show dot1x summary Use this command to display a summary of the IEEE 802.1X configuration parameters for the switch. Format show dot1x summary Administrative mode Indicates whether authentication control is enabled on the switch. Remote Authentication Dial-In User Service (RADIUS) commands RADIUS accounting commands config radius accounting mode Use this command to enable or disable the RADIUS accounting function.
Round Trip Time The time, in hundredths of a second, between the most recent RADIUS accounting response and the matching accounting request from this RADIUS accounting server. Accounting Requests The number of RADIUS accounting request packets sent to this accounting server, not including retransmissions.
Page 242
Format clear radius stats config radius maxretransmit Use this command to configure the maximum number of times a request packet is retransmitted when no response is received from the RADIUS server. The maxretransmit value is an integer in the range of 1 and 15. Consideration should be given to the maximum delay time when configuring RADIUS maxretransmit and timeout values.
Timeout Duration (secs) The timeout value, in seconds, for request retransmissions. Accounting Mode Indicates whether accounting is currently enabled. RADIUS server commands config radius server add Use this command to configure the IP address used to connect to a RADIUS server. Up to three servers can be configured for each RADIUS client.
Page 244
Format config radius server secret <ipaddr> show radius server stats Use this command to display the statistics for a configured RADIUS server. Format show radius server stats <ipaddr> Server IP Address The IP address of the server whose information is displayed on this row. Round Trip Time The time, in seconds, between the most recent RADIUS access reply/access challenge and the matching access request from this RADIUS server.
IP Address The IP address of the authentication server. Port The port used to access the authentication server. Type Indicates whether the server is primary or secondary. Secret configured Indicates whether a secret has been configured for the authentication server. Secure Shell (SSH) commands config ssh adminmode Use this command to enable or disable SSH.
Default disable Format config http secureserver adminmode <enable\disable> show http info Displays the http settings for the switch. Format show http info Mode Privileged EXEC Secure-Server Administrative Mode Indicates whether the administrative mode of secure HTTP is enabled or disabled. Secure Protocol Level The protocol level may have the values of SSL3, TSL1 or both.
config acl interface remove Use this command to disassociate an ACL from an interface for the specified direction. The <direction> parameter can have the values of in or out. The <aclid> parameter specifies the ACL to remove. Format config acl interface remove <port> <direction> <aclid> config acl rule action Use this command to specify the action for the ACL and rule referenced by the parameters <aclid>...
must have a value equal to or greater than the starting port. The starting port, ending port and all ports in between will be part of the destination port range. Either this command or the config acl match destl4port keyword command may be used to specify a destination layer 4 port range as a match condition.
This command and the config acl match srcl4port number command are two methods of specifying the source layer 4 port range as a match condition. Either command can be used to configure or modify the source layer 4 port range. Format config acl rule match srcl4port keyword <aclid>...
Direction Displays the packet filtering direction for the ACL on the interface. The possible values displayed are inbound and outbound. Bandwidth provisioning commands BW provisioning BW allocation commands config bwprovisioning bwallocation create Use this command to create a bandwidth allocation profile. The <name> field is an alphanumeric string up to 15 characters.
Bandwidth Allocation Profile Name Displays the user-defined name of this bandwidth allocation profile. Minimum Bandwidth Displays the minimum guaranteed bandwidth of this bandwidth allocation profile in Mbps. Maximum Bandwidth Displays the maximum allowable bandwidth of this bandwidth allocation profile in Mbps.
Page 252
show bwprovisioning trafficclass allocatedbw Use this command to display the bandwidth allocated. The allocated minimum bandwidth should not exceed the interface bandwidth unless the interface is a LAG interface. Format show bwprovisioning trafficclass allocatedbw <port> Port The specified interface. Allocated Minimum Bandwidth Displays the sum of the minimum guaranteed bandwidth for all traffic classes configured on this interface.
Page 253
Bandwidth Allocation Profile Displays the bandwidth allocation profile associated with this traffic class. This field is blank when there is no bandwidth allocation profile associated with this traffic class. Command Line Interface Management...
A RJ-45 Pin Specifications The four external Ethernet ports of this switch module are auto-configuring and will work with straight-through or crossover cables when connected to other Ethernet equipment. Review the documentation that comes with the product you are connecting to for matching cable pin assignments.
B Cable Lengths Use the following table as a guide for the maximum cable lengths: Table 8. Maximum cable lengths Standard Data transmission rate Media type Maximum distance 1000BASE-T 1000 Mbps Category 5e UTP cable 100 meters (328.1 ft) Category 5 UTP cable 100BASE-TX 100 Mbps Category 5 UTP cable...
C Run-time Switching Software Default Settings The following table contains the default settings for the run-time switching software variables. Variables are separated by category and further by sub-headings (listed alphabetically within category). "Default value" is self-explanatory while "Command" lists the CLI command used to change the default setting.
Page 260
Table 9. Default settings for run-time switching software variables (continued) Sub- Heading heading Variable Default value Command Reauthentication Disable config dot1x port Sequence reauthenticate Server Timeout 30 seconds config dot1x port servertimeout Supplicant Time Out 30 seconds config dot1x port supptimeout Transmit Period 30 seconds...
Page 261
Table 9. Default settings for run-time switching software variables (continued) Sub- Heading heading Variable Default value Command Switching VLAN Switching Accept frame config vlan port acceptframe Broadcast Storm disable config vlan bcaststorm Default port VID config vlan port pvid Ingress filter Disable config vlan port ingressfilter...
Page 262
Table 9. Default settings for run-time switching software variables (continued) Sub- Heading heading Variable Default value Command MCRT Expiration 0 seconds config igmpsnooping Time mcrtexpiretime Mode Disable config igmpsnooping adminmode Link Aggregation LAG linktrap enable config lag linktrap Spannng Tree Protocol (STP) Bridge Forward Delay...
Page 263
Table 9. Default settings for run-time switching software variables (continued) Sub- Heading heading Variable Default value Command Port Mode Disable config spanningtree port mode System Auto log-out 10 min Configuration update Disable Default gateway 0.0.0.0 IP address 10.90.90.9x, where x depends on the number of the bay into which you have...
Page 264
Table 9. Default settings for run-time switching software variables (continued) Sub- Heading heading Variable Default value Command Web enable status Enable config network webmode SNMPcommunit IP address 0.0.0.0 config snmpcommunity ipaddr IP Mask 0.0.0.0 config snmpcommunity ipmask Mode Default private and config snmpcommunity public communities mode...
D CLI Command Tree This appendix presents the CLI command tree used in conjunction with the NovaScale Blade 1 GB Intel® Ethernet Switch Module. SWITCHING clear config igmpsnooping dot1x port stats pass radius stats stats port switch transfer traplog vlan config create delete...
E CLI Configuration Examples This appendix provides examples of using the CLI to configure the NovaScale Blade 1 GB Intel® Ethernet Switch Module for some key functions. Bridging configuration example This section provides sample CLI commands showing how to configure the NovaScale Blade 1 GB Intel®...
Page 278
default priority mapping provided by the switch. These commands affect all of the interfaces on the switch and leave the defaults unchanged for priority levels 3-7. config classofservice 802.1p mapping 0 0 config classofservice 802.1p mapping 1 2 config classofservice 802.1p mapping 2 1 The switch supports two protocols based on the Generic Attribute Registration Protocol (GARP) defined in IEEE 802.1D: GARP Multicast Registration Protocol (GMRP) and GARP VLAN Registration Protocol (GVRP).
IEEE 802.1w configuration example This section shows you how to configure the NovaScale Blade 1 GB Intel® Ethernet Switch Module to support rapid reconfiguration of the spanning tree topology. The IEEE 802.1w support specified in IEEE 802.1s defines a new configuration algorithm and protocol that provide significantly faster reconfiguration of the spanning tree than the original algorithm and protocol defined in the base IEEE 802.1D standard.
VLAN configuration example This section provides sample CLI commands showing how to configure the NovaScale Blade 1 GB Intel® Ethernet Switch Module to support IEEE 802.1Q VLANs. Configuring VLANs allows you to partition your network on a logical rather than physical basis. The only physical restriction is that both ends of a point-to-point link must be in the same VLAN.
Link aggregation configuration example This section provides sample CLI commands showing how to configure the NovaScale Blade 1 GB Intel® Ethernet Switch Module to support IEEE 802.3ad aggregated links. By defining a Link Aggregation Group (LAG) you can treat multiple physical links between two end-points as one logical link.
IGMP snooping configuration example This section provides sample CLI commands showing how to configure the NovaScale Blade 1 GB Intel® Ethernet Switch Module to support IGMP Snooping. Activating IGMP Snooping allows you to restrict the forwarding of multicast packets to network segments that need to see the packets. The switch uses information gained from examining IGMP packets to decide how to forward multicast packets.
Access Control List configuration example This section provides sample CLI commands showing how to configure the NovaScale Blade 1 GB Intel® Ethernet Switch Module to support Access Control Lists (ACLs). ACLs offer one way of adding Quality of Service support to your network. You define an ACL to control who can use your network or network resources by allowing or prohibiting access.
F Understanding and Troubleshooting the Spanning Tree Protocol This appendix provides details about how the Spanning Tree Protocol and Algorithm work and describes how to troubleshoot them. Spanning Tree Protocol (STP) operation Spanning Tree Protocol (STP) is used in a bridged LAN environment to reduce the physical network to a stable logical topology with no data loops that still allows for the existence of redundant connections.
Table 10. STP parameters – bridge Parameter Description Default value Bridge hello time The length of time between broadcasts of the hello 2 seconds message. Bridge maxage time The length of time before topology information or 20 seconds information from BPDUs is discarded because it has aged out.
The bridge sends BPDUs to communicate and construct the spanning-tree topology. All bridges connected to the LAN on which a packet is transmitted will receive the BPDU. BPDUs are not directly forwarded by the bridge, but the receiving bridge uses the information in the frame to calculate the topology and, if it changes, to initiate a BPDU transmission.
Forwarding The port is forwarding packets. For additional information, see “Forwarding state” on page 268. Disabled The port responds only to network management messages and must return to the discarding state first. For additional information, see “Disabled state” on page 270. Note that the STP port state of disabled applies only to the port’s role within the spanning tree, and should not be confused with the port’s administrative state of enabled or disabled.
Table 12. Relationship between IEEE 802.1D and IEEE 802.1w port states IEEE 802.1D port Admin. bridge IEEE 802.1w port Active topology port MAC operational state port state state role Included, root or Listening Enabled True Discarding designated Included, root or Learning Enabled True...
the discarding state to the forwarding state. For IEEE 802.1w operation this is the time that a designated port on the bridge spends in the learning state while moving from the disabled state to the forwarding state when both operPointToPointMAC and operEdgePort are false.
Page 291
LAN 1 LAN 1 Port Cost = 19 Port Cost = 19 Port 3 Port 3 Bridge ID = 15 Bridge ID = 15 Port 1 Port 1 Port 2 Port 2 Port Cost =4 Port Cost =4 Port Cost =4 Port Cost =4 Port Cost =4 Port Cost =4...
Note also that the example network topology is intended to provide redundancy to protect the network against a link or port failure, not a switch failure or removal. For example, a failure of bridge A would isolate LAN 1 from connecting to LAN 2 or LAN 3. Discarding state A port in the discarding state does not forward packets.
The following illustration shows the actions that occur when a port is in the discarding state. Learning state A port in the learning state prepares to participate in frame forwarding. The port enters the learning state from the discarding state. A port will move from learning to forwarding when its forward delay timer expires.
Forwarding state A port in the forwarding state forwards packets. The port enters the forwarding state from the learning state when the forward delay timer expires. A port in the forwarding state does the following: • Forwards packets received from the network segment to which it is attached. •...
Page 295
Understanding and Troubleshooting the Spanning Tree Protocol...
Disabled state A port in the disabled state does not participate in frame forwarding or STP. A port in the disabled state is virtually non-operational. Note that this STP port state should not be confused with the port’s administrative state. A disabled port does the following: •...
Troubleshooting STP This section describes how to troubleshoot the STP. Spanning Tree Protocol Failure A failure in the Spanning Tree Algorithm generally results in a bridging loop. This is caused by a port that should be in the discarding state but is instead forwarding packets. Root Port 1 Port 1...
Root Half-duplex Port 1 Port 1 Port 2 Port 2 Full-duplex Port 1 Port 1 Port 1 Port 1 Designated Port 2 Port 2 Port 2 Port 2 Blocked In the preceding example, port 1 on bridge B is configured as a full-duplex port and port 1 on bridge A is either configured as a half-duplex port or is left in auto-negotiation mode.
In this example, port 2 on bridge B can receive but not transmit packets. Port 2 on bridge C should be in the discarding state, but since it can no longer receive BPDUs from port 2 on bridge B, it will change to the forwarding state.
problem, if sufficient time is available. Connectivity will be restored immediately after disabling a data loop. Avoiding network problems To help your network operate more efficiently, you can avoid or minimize network problems, as described in this section. • Know where the root is located. Although the STP can elect a root bridge, a well-designed network has an identifiable root for each VLAN.
Page 301
This is a common network design. Through trunks, bridges C and D have redundant links to backbone bridges A and B. Trunks, by default, carry all the VLAN traffic from VLAN 1 and VLAN 2. Therefore, bridge C is not only receiving traffic for VLAN 1, but also unnecessary broadcast and multicast traffic for VLAN 2.
Page 302
Trunk VLAN 1 VLAN 1 VLAN 2 VLAN 2 Blocked Blocked VLAN 1 VLAN 1 VLAN 2 VLAN 2 VLAN 1 VLAN 1 VLAN 2 VLAN 2 In this example, the VLAN definitions are extended to bridges A and B. This gives only a single blocked port per VLAN and enables the removal of all redundant links by removing bridge A or B from the network.
You can solve many problems without outside assistance by following the troubleshooting procedures that Bull provides in the publications that are provided on the Resource CD that ships with your system and software. The documentation also describes the diagnostic tests that you can perform.
Need help?
Do you have a question about the 1GB Intel Ethernet Switch Module and is the answer not in the manual?
Questions and answers