Bull 1GB Intel Ethernet Switch Module Installation And User Manual

1gb intel ethernet switch module
Table of Contents

Advertisement

Quick Links

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 1GB Intel Ethernet Switch Module and is the answer not in the manual?

Questions and answers

Summary of Contents for Bull 1GB Intel Ethernet Switch Module

  • Page 5 NovaScale Blade safety and regulatory information ✏ NOTE The service procedures are designed to help you isolate problems. They are written with the assumption that you have model-specific training on all computers, or that you are familiar with the computers, functions, terminology, and service information provided in this manual. Important Safety Instructions Read all caution and safety statements in this document before performing any of the instructions.
  • Page 6: General Safety

    General Safety Follow these rules to ensure general safety: • Observe good housekeeping in the area of the machines during and after maintenance. • When lifting any heavy object: 1. Ensure you can stand safely without slipping. 2. Distribute the weight of the object equally between your feet. 3.
  • Page 7: Electrical Safety

    Electrical Safety CAUTION: Electrical current from power, telephone, and communication cables can be hazardous. To avoid personal injury or equipment damage, disconnect the server system power cords, telecommunication systems, networks, and modems before you open the server covers, unless instructed otherwise in the installation and configuration procedures. ✏...
  • Page 8: Handling Electrostatic Discharge-Sensitive Devices

    • Do not use worn or broken tools and testers. • Never assume that power has been disconnected from a circuit. First, check that it has been powered-off. • Always look carefully for possible hazards in your work area. Examples of these hazards are moist floors, nongrounded power extension cables, power surges, and missing safety grounds.
  • Page 9 Use an ESD common ground or reference point when working on a double-insulated or battery-operated system. You can use coax or connector-outside shells on these systems. Use the round ground-prong of the AC plug on AC-operated computers. DANGER Electrical current from power, telephone and communication cables is hazardous. To avoid a shock hazard: Do not connect or disconnect any cables or perform installation, maintenance, or •...
  • Page 10 CAUTION: If your system has a module containing a lithium battery, replace it only with the same or an equivalent type battery recommended by the manufacturer. If your system has a module containing a lithium battery, replace it only with the same module type made by the same manufacturer. The battery contains lithium and can explode if not properly used, handled, or disposed of.
  • Page 11 ≥18 kg (37 lbs) ≥32 kg (70.5 lbs) ≥55 kg (121.2 lbs) CAUTION: Use safe practices when lifting. CAUTION: The power control button on the device and the power switch on the power supply do not turn off the electrical current supplied to the device. The device also might have more than one power cord.
  • Page 12 CAUTION: Do not place any object weighing more then 82 kg (180lbs.) on top of rack-mounted devices. CAUTION: To avoid personal injury, before lifting the unit, remove all the blades to reduce the weight. CAUTION: Hazardous energy is present when the blade is connected to the power source. Always replace the blade cover before installing the blade.
  • Page 13 Electromagnetic compatibility (ECM) USA: FCC CFR 47 Part 2 and 15, Verified Class A Limit Canada: IC ICES-003 Class A Limit Europe: EMC Directive, 89/336/EEC EN55022, Class A Limit, Radiated & Conducted Emissions EN55024 ITE Specific Immunity Standard EN61000-4-2 ESD Immunity (Level 2 Contact Discharge, Level 3 Air Discharge) EN61000-4-3 Radiated Immunity (Level 2) EN61000-4-4 Electrical Fast Transient (Level 2) EN61000-4-5 AC Surge...
  • Page 14 ✏ NOTE Class A device definition: If a Class A device is installed within the is system, then the system is to be considered a Class A system. In this configuration, operation of this equipment in a residential area is likely to cause harmful interference. ✏...
  • Page 15 RRL Korea: English translation of the notice above: Device User’s Information Class A device This device complies with RRL EMC and is operated in commercial environment so that distributors or users pay attention to this point. If the product is sold or purchased improperly, please exchange this product to what can be used at home.
  • Page 16 <This page intentionally left blank> NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 17: Table Of Contents

    Contents Safety Information ........... . iii General Safety .
  • Page 18 Static MAC filtering..........31 Generic Attribute Registration Protocol (GARP) .
  • Page 19 Supported Management Information Bases (MIB) ....72 Statistics ............73 Switch detailed .
  • Page 20 CST port configuration/status ....... . . 116 Statistics ..........118 Class of service.
  • Page 21 6 Command Line Interface Management ....... . 153 Command Line Interface (CLI) conventions......153 Format .
  • Page 22 config lag deletelag ......... 190 config lag deleteport .
  • Page 23 Class of Service commands ......... 206 config classofservice 802.1pmapping .
  • Page 24 Quality of Service (QoS) commands ........220 Access Control List (ACL) commands .
  • Page 25 Spanning Tree Protocol Failure ........271 Full/half duplex mismatch.
  • Page 26 xxiv NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 27: Introducing The Novascale Blade 1 Gb Intel® Ethernet Switch Module

    1 Introducing the NovaScale Blade 1 GB Intel® Ethernet Switch Module Thank you for purchasing a NovaScale Blade 1 GB Intel® Ethernet Switch Module. This Installation and User’s Guide contains information about: • Setting up and installing your switch module •...
  • Page 28: Related Publications

    Record your product information in this table. Product name NovaScale Blade 1 GB Intel® Ethernet Switch Module Type _________________________________________________ Model number _________________________________________________ Serial number _________________________________________________ Media access _________________________________________________ control (MAC) address Verify that the shipping carton contains a NovaScale Blade 1 GB Intel® Ethernet Switch Module. If the switch module is missing or damaged, contact your local reseller for replacement.
  • Page 29: Notices And Statements Used In This Book

    Notices and statements used in this book The caution and danger statements that appear in this book are also in the multilingual NovaScale Blade Safety Information Book on the CD-ROM NovaScale Blade Chassis Resource CD. Each statement is numbered to refer to the corresponding statement in the Safety Information Book. The following notices and statements are used in this book: •...
  • Page 30: Specifications And Features

    For more information about the components of the information panel, see Chapter 3 “Information Panel LEDs and External Ports” on page 17. For more information about the MAC address, see “IP addresses and SNMP community names” on page 20. Specifications and features The following section provides a summary of the specifications and features for your NovaScale Blade 1GB Intel®...
  • Page 31 • Standards The following standards apply to the NovaScale Blade 1GB Intel® Ethernet Switch Module. — Switching Support – IEEE 802.3 10BASE-T Ethernet – IEEE 802.3 Auto-negotiation – IEEE 802.3u 100BASE-TX Fast Ethernet – IEEE 802.3z Gigabit Ethernet – IEEE 802.3ab 1000BASE-T –...
  • Page 32 – Advanced Layer 2 Functionality: • Broadcast Storm Recovery • Multicast Storm Recovery • Independent VLAN Learning (IVL) support • Port Mirroring • IGMP Snooping • Static MAC Filtering – System Facilities • Event and Error Logging Facility • Run-time and Configuration Download Capability •...
  • Page 33 – Context sensitive help – Multi-session Telnet Server — RFC 854 - Telnet — RFC 855 - Telnet Option — RFC 1155 - SMI v1 — RFC 1157 - SNMP — RFC 1212 - Concise MIB Definitions — RFC 1901 - Community-based SNMP v2 —...
  • Page 34 — MIBs Supported – Switching MIBs • RFC 1213 - MIB-II • RFC 1493 - Bridge MIB • RFC 1643 - Ethernet-like MIB • RFC 2674 - VLAN MIB • RFC 2618 - RADIUS Authentication Client MIB • RFC 2620 - RADIUS Accounting MIB •...
  • Page 35: Module

    2 Installing and Removing the NovaScale Blade 1 GB Intel® Ethernet Switch Module The following illustration shows the I/O module bay locations in the NovaScale Blade Chassis platform. Attention: To maintain proper system cooling, each I/O module bay must contain either a module or a filler module;...
  • Page 36: Installation Guidelines

    I/O module Switch-module function Connection 1 (Ethernet Link 1) for all blade servers in the NovaScale Blade Chassis Connection 2 (Ethernet Link 2) for all blade servers in the NovaScale Blade Chassis Connection 3 (from all blade server interface options in the NovaScale Blade Chassis) Connection 4 (from all blade server interface options in the NovaScale Blade Chassis) For additional information, see the NovaScale Blade Chassis Installation and User’s Guide on the CD-ROM NovaScale Blade Chassis Resource CD.
  • Page 37: Installing The Novascale Blade 1Gb Intel® Ethernet Switch Module

    • Limit your movement. Movement can cause static electricity to build up around you. • Handle the device carefully, holding it by its edges or its frame. • Do not touch solder joints, pins, or exposed printed circuitry. • Do not leave the device where others can handle and possibly damage it. •...
  • Page 38 NovaScale Blade Chassis Complete the following steps to install the NovaScale Blade 1GB Intel® Ethernet Switch Module. 1. Review the information in “NovaScale Blade safety and regulatory information” on page iii and in “Installation guidelines” on page 10 through “Handling static-sensitive devices” on page 10. 2.
  • Page 39 3. Select an I/O module bay in which to install the switch module, in accordance with the instructions in “Ethernet interface requirements” on page 9. 4. Remove the filler module from the selected I/O module bay. Store the filler module for future use.
  • Page 40: Removing The Novascale Blade 1Gb Intel® Ethernet Switch Module

    Removing the NovaScale Blade 1GB Intel® Ethernet Switch Module Statement 8: xxCAUTION: Never remove the cover on a power supply or any part that has the following label attached. Hazardous voltage, current, and energy levels are present inside any component that has this label attached.
  • Page 41 NovaScale Blade Chassis 4. Slide the switch module out of the I/O module bay and set it aside. 5. Place either another switch module or a filler module in the I/O module bay within 1 minute. 6. If you placed another switch module in the I/O module bay, reconnect any cables that you unplugged in step 2.
  • Page 42 NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 43: Information Panel Leds And External Ports

    3 Information Panel LEDs and External Ports This chapter describes the information panel and LEDs (also known as indicators) on the NovaScale Blade 1 GB Intel® Ethernet Switch Module. This chapter also identifies the external ports on the information panel. Information panel The information panel of the NovaScale Blade 1GB Intel®...
  • Page 44: Leds

    LEDs The LEDs on the information panel of the NovaScale Blade 1GB Intel® Ethernet Switch Module include OK, !, Ethernet link, and Ethernet activity. The following illustration shows the LEDs on the switch module. A description of each LED follows the illustration. Notes: 1.
  • Page 45: Switch Management And Operating Concepts

    4 Switch Management and Operating Concepts This chapter discusses many of the concepts and features used to manage the NovaScale Blade 1 GB Intel® Ethernet Switch Module and the concepts necessary to understand how it functions. In addition, this chapter explains many important points regarding these features. Configuring the switch module to implement these concepts and use its many features is discussed in detail in the following chapters.
  • Page 46: Switch Module Management And Control

    the switch module through the 10/100 Mbps Ethernet port on the management module. You can use the four external 10/100/1000 Mbps Ethernet ports on the switch module for management and control of the module by selecting this mode as an option through the management module configuration utility program (see the NovaScale Blade Chassis Management Module Installation and User’s Guide publications on the CD-ROM NovaScale Blade Chassis Resource CD for more information).
  • Page 47 Table 1. Default IP addresses based on I/O module bay numbers I/O module bay number Default IP address Switch Module Bay 1 10.90.90.91 Switch Module Bay 2 10.90.90.92 Switch Module Bay 3 10.90.90.94 Switch Module Bay 4 10.90.90.97 The following illustration shows the I/O module bay locations. You can change the default switch module IP address to meet the requirements of your networking address scheme.
  • Page 48: Traps

    The switch MAC address can also be displayed using CLI command show inventory or from the Web Interface. In addition, you can also set an IP address for a gateway router. This becomes necessary when the network management station and switch modules are located on different IP networks, requiring management packets to go through a router to reach the network manager.
  • Page 49: Management Information Bases (Mib)

    The following are trap types that the switch module can send to a trap recipient: Cold start This trap indicates that the switch module has been turned on and initialized such that software settings are reconfigured and hardware systems are restarted. A cold start is different from a factory reset in that configuration settings saved to nonvolatile random-access memory (NVRAM) are used to reconfigure the switch module.
  • Page 50: Port Mirroring

    Port mirroring The NovaScale Blade 1GB Intel® Ethernet Switch Module enables you to copy packets that were transmitted and received on a source port and to redirect the copies to another target port. The source port can be one of the four 10/100/1000 Mbps external ports, while the target port is where you will connect a monitoring/troubleshooting device, such as a sniffer or an RMON probe.
  • Page 51: Spanning Tree Protocol (Stp)

    through port 2 only and transmits nothing through the other ports. Creating the table is referred to as learning the network topology. An aging timer is used to make sure that the table is updated if devices are moved. Dynamic entries, those learned by the switch by observing network traffic, are deleted from the table if they are not accessed within the aging time.
  • Page 52: Virtual Local Area Networks (Vlan)

    Intel® Ethernet Switch Module defaults to IEEE 802.1D operation, but can be configured to use the algorithm and protocols defined in IEEE 802.1w instead. IEEE 802.1D has been further revised in IEEE 802.1s, which incorporates IEEE 802.1w and defines a multiple Spanning Tree Protocol along with an IEEE 802.1D compatibility mode. The NovaScale Blade 1GB Intel®...
  • Page 53: Ieee 802.1Q Vlan Packet Forwarding

    The NovaScale Blade 1GB Intel® Ethernet Switch Module implements IEEE 802.1Q VLANs, which require tagging. This enables them to span the entire network (provided that all switches on the network are IEEE 802.1Q-compliant). VLANs enable a network to be segmented to reduce the size of broadcast domains. All packets entering a VLAN will be forwarded (over IEEE 802.1Q enabled switches) only to the stations that are members of that VLAN.
  • Page 54: Ieee 802.1Q Vlan Tags

    802.1Q Packet Forwarding 802.1Q Packet Forwarding Packet Packet Packet Packet Transmit Transmit Receive Receive Ingress Ingress Egress Egress Ingress Ingress Rules Rules Rules Rules Filtering Filtering Forwarding Forwarding Process Process Filtering Filtering PVID to VID PVID to VID Database Database VLAN Table VLAN Table Port State...
  • Page 55: Port Vlan Id

    IEEE 802.1Q Tag IEEE 802.1Q Tag Octets Destination Address (6 octets) Destination Address (6 octets) Source Address (6 octets) Source Address (6 octets) EtherType = 0x8100 EtherType = 0x8100 Tag Control Information Tag Control Information MAC Length/Type MAC Length/Type Begining of Data Begining of Data Cyclic Redundancy Check (4 octets) Cyclic Redundancy Check (4 octets)
  • Page 56: Tagging And Untagging

    Before the adoption of 802.1Q VLANs, port-based and MAC-based VLANs were in common use. These VLANs relied upon a port VLAN ID (PVID) to forward packets. A packet received on a given port would be assigned that port PVID and then be forwarded to the port that corresponded to the packet destination address (found in the switch forwarding table).
  • Page 57: Protocol-Based Vlans (Pbvlans)

    Protocol-based VLANs (PBVLANs) The main purpose of Protocol-based VLANs (PBVLANs) is to selectively process packets based on their upper-layer protocol by setting up protocol-based filters. Packets are bridged through user- specified ports based on their protocol. In PBVLANs, the VLAN classification of a packet is based on its protocol (IP, IPX, etc.). PBVLANs help optimize network traffic because protocol-specific broadcast messages are sent only to end stations using that protocol.
  • Page 58: Generic Attribute Registration Protocol (Garp)

    NOTE Even though the above discussion pertains to the forwarding database, MAC filters are not configured and displayed as part of the forwarding database; they are configured and displayed separately. Generic Attribute Registration Protocol (GARP) This protocol is used to exchange information between GARP participants to register and de-register attribute values within a bridged LAN.
  • Page 59: Internet Group Management Protocol (Igmp) Snooping

    When the switch module receives GMRP PDUs it will update the multicast table with a new entry or modify an existing entry with the new information. The switch module will forward multicast packets through only those ports for which GMRP has created a group registration entry (for that multicast address).
  • Page 60: Link Aggregation (Lag)

    each of the remaining network segments in accordance with IEEE 802.1D. Eventually, the packet is made accessible to all nodes connected to the network. This approach works well for broadcast packets that are intended to be seen or processed by all connected nodes.
  • Page 61: Distribution Method

    links have dropped out, the LAG will reconfigure itself with the new values from the received LACPDUs. It is important that when you configure LAGs, you should configure the LAGs and enable STP on both partner devices before connecting the cables. Distribution method Link aggregation, or port trunking, enables several ports to be grouped together and to act as a single link.
  • Page 62: Security

    acknowledgment, the client must release its current configuration and then return to the initializing state. If your DHCP client uses more than one network adapter to connect to multiple networks, this protocol is followed for each adapter that you want to configure for TCP/IP. Multi-homed systems are selectively configured for any combination of system interfaces.
  • Page 63: Local Authentication

    The NovaScale Blade 1GB Intel® Ethernet Switch Module operates in the authenticator role only. The authenticator PAE is responsible for submitting information received from the supplicant to the authentication server in order for the credentials to be checked, which will determine the authorization state of the port.
  • Page 64: Secure Socket Layer (Ssl)

    Table 2. Secure Shell Feature Details SSH Feature Component Type Connection Type Interactive Login Authentication Method Password Ciphers • 3DES-CBC • Blowfish-CBC • Twofish128-CBC • AES128-CBC Hash Algorithms • SHA-1 • SHA-1-96 • Key Exchange Methods Diffie-Hellman Compression Algorithms • zlib •...
  • Page 65: Quality Of Service (Qos)

    Table 3. Secure Sockets Layer Details SSL Feature Component Type SSL Protocol Versions • TLS 1.0 SSL 3.0 • Quality of Service (QoS) The Quality of Service (QoS) features of the NovaScale Blade 1 GB Intel® Ethernet Switch Module allow you to allocate network bandwidth according to the needs of the network users. This section will give you an overview of the methods available.
  • Page 66: Access Control Lists (Acl)

    Traffic Class The definition of the traffic to which a set of rules will apply. A class is defined by specifying a VLAN Identifier and an interface number, along with the class priority. A default BAP, which you cannot modify, is assigned to all new TCs. Any given BAP may be assigned to multiple TCs.
  • Page 67: Web-Based Network Management

    5 Web-Based Network Management This chapter describes how to use the Web-based network management module to access and configure the internal switching software. Important: Before you configure your NovaScale Blade 1 GB Intel® Ethernet Switch Module, be sure that the management modules in your NovaScale Blade Chassis platform are properly configured.
  • Page 68: Getting Started

    Important: With this mode, the NovaScale Blade 1GB Intel® Ethernet Switch Module does not respond to remote-management commands through the four external Ethernet ports on the switch module. See the applicable Installation and User’s Guide on the Resource CD for additional instructions for configuring the switch module for this mode of operation.
  • Page 69 Click on Login, and a dialog box similar to the following will open: Enter “USERID” in the User name field and enter “PASSW0RD” (with a zero in place of the O) in the Password field. Click the OK button. This opens the main page in the management module. NOTE The User name and Password fields are case sensitive.
  • Page 70 If java mode is enabled for the switch (the default is enabled) the top panel shows a real-time information-panel display of the switch module, as shown below. You can change the java mode on the Network Connectivity Configuration menu (see 50). External port Blade server bays status...
  • Page 71: System

    When you first log on to the switch, you will see the System Description details in the center of the screen. For more details on the information displayed see 48. System The System menu provides access to the following panels and menus: •...
  • Page 72: Arp Cache

    • Port • SNMP • Statistics • System utilities • Trap manager ARP cache This panel displays the connectivity between the switch and other devices. The ARP cache identifies the Media Access Control (MAC) addresses of the IP stations communicating with the switch. MAC Address A unicast MAC address of a device on a subnet attached to one of the switch's interfaces for which the switch has forwarding and/or filtering information.
  • Page 73: Inventory Information

    Inventory information This panel displays inventory information for the switch. System Description The product name of this switch. Machine Type The machine type of this switch. Machine Model The model within the machine type. Serial Number The unique box serial number for this switch. FRU Number The field-replaceable unit number.
  • Page 74: Configuration

    Software Version The release.version.maintenance number of the code currently running on the switch. Operating System The operating system currently running on the switch. Network Processing Device The network processor hardware. Additional Packages The list of optional software packages installed on the switch, if any. For example, Quality of Service.
  • Page 75 System Description The product name of this switch. System Name The name used to identify this switch. The range for name is from 1 to 31 alphanumeric characters. System Location The physical location of this switch. May be up to 31 alphanumeric characters. The factory default is blank.
  • Page 76: Network Connectivity

    Network connectivity This panel displays network configuration settings necessary for in-band connectivity. The network interface is the logical interface used for in-band connectivity with the switch via any of the switch's front panel ports. The configuration parameters associated with the switch's network interface do not affect the configuration of the front panel ports through which traffic is switched or routed.
  • Page 77: Telnet

    Web Mode Specify whether the switch may be accessed from a web browser through TCP port 80. If you choose to Enable web mode you will be able to manage the switch from a web browser. The factory default is Enabled. Java Mode Enable or Disable the java applet that displays a picture of the switch at the top right of the screen.
  • Page 78: User Accounts

    User accounts Use this panel to reconfigure an existing user account or to create a new one. This panel is only available for the user with Read/Write privileges, herein referred to as admin. User Use this pull-down menu to select one of the existing accounts, or select Create to add a new one, provided the maximum of five Read-only accounts has not been reached.
  • Page 79: Login Configuration

    retrieve parameter information. The SNMPv3 access mode may be different from the CLI and Web access mode. Authentication Protocol The protocol (if any) used to authenticate the user. This field specifies the protocol to be used to authenticate a user account. The valid authentication protocols are None, MD5 or SHA.
  • Page 80 Login Select the authentication login list you want to configure. Select Create to define a new login list. When you create a new login list, Local is set as the initial authentication method. Login Name If you are creating a new login list, enter the name you want to assign. It can be up to 15 alphanumeric characters long and is not case sensitive.
  • Page 81: Login Session

    method, the third method will not be tried. Note that this parameter will not appear when you first create a new login list. Method 3 Use the pull-down menu to select the method, if any, that should appear third in the selected authentication login list.
  • Page 82: Login Summary

    Login summary This panel displays a list of all users set up for each authentication login list. Login Identifies the authentication login list summarized in this row. Method List The ordered list of methods configured for this login list. Login Users The users you assigned to this login list on the User Login Configuration screen.
  • Page 83 Each configured user is assigned to a login list that specifies how the user should be authenticated when attempting to access the switch or a port on the switch. After creating a new user account on the User Account screen, you should assign that user to a login list for the switch using this screen and, if necessary, to a login list for the ports using the Port Access Control User Login Configuration screen.
  • Page 84: Forwarding Database

    Forwarding database The first option on this menu is the Configuration panel, which allows you to configure the forwarding database aging interval. The second option is the Search panel, which displays the forwarding database entries specified by a MAC address or filter you enter. Configuration Use this panel to configure the forwarding database aging interval.
  • Page 85 Filter Specify the entries you want displayed from the pull-down menu. Once a choice is made the list is automatically refreshed with the selected filter. Filter choices are: Learned Only MAC addresses that have been learned will be displayed. The entire table will be displayed. MAC Address Search You may also search for an individual MAC address.
  • Page 86: Logs

    Management The value of the corresponding instance is also the value of an existing instance of dot1d StaticAddress. Currently this is used when enabling VLANs for routing. Self The MAC address of one of the switch’s physical interfaces. GMRP Learned The value of the corresponding instance was learned via GARP Multicast Registration Protocol (GMRP).
  • Page 87: Event Log

    Time The time the event occurred, calculated from the time the switch was last reset, in days, hours, minutes and seconds. File The source code filename identifying the code that detected the event. Line The line number within the source file of the code that detected the event. Description An explanation of the problem being reported.
  • Page 88: Port

    Entry The number of the entry within the event log. The most recent entry is first. Filename The source code filename identifying the code that detected the event. Line The line number within the source file of the code that detected the event. TaskID The OS-assigned ID of the task reporting the event.
  • Page 89 Port Selects the interface for which data is to be displayed or configured. Port Type For normal and LAG ports this field will be blank. Otherwise the possible values are: Probe Monitoring port, participating in Port Mirroring. Following is how this panel displays when the port type is Probe.
  • Page 90 Mirrored Port being mirrored. Member of a Link Aggregation (LAG) trunk. Following is how this panel displays when the port type is LAG. STP Mode Select the Spanning Tree Protocol (STP) Administrative Mode for the port or LAG. The possible values are Enabled and Disabled. Admin Mode Use the pull-down menu to select the port control administration state.
  • Page 91: Summary

    Link Status Indicates whether the Link is Up or Down. Following is how this panel displays when the link status is link up. Link Trap This object determines whether or not to send a trap when link status changes. The factory default is Enabled.
  • Page 92 Port Identifies the physical port. Port Type If not blank, this field indicates that this port is a special type of port. The possible values are: Mirrored Port being mirrored. Probe Probe port, participating in Port Mirroring. Member of a link aggregation trunk. STP Mode The Administrative Mode for the port or LAG.
  • Page 93 Control Mode Displays whether flow control is Enabled or Disabled on this port. The following displays the right side of the panel. Descriptions of these fields follow. LACP Mode Displays whether Link Aggregation Control Protocol (LACP) is Enabled or Disabled on this port. Physical Mode Displays the selected port speed and duplex mode.
  • Page 94: Mirroring

    Mirroring This panel displays the port mirroring information for the switch module. Port Mirroring Mode Select the Port Mirroring Mode by selecting the corresponding line on the pull- down entry field. The factory default is Disabled. Probe Port The interface you want to act as the Probe. Once configured there is no network connectivity on the probe port.
  • Page 95: Snmp

    SNMP This menu provides access to the following Simple Network Management Protocol (SNMP) options: • Community configuration • Trap receiver configuration • Trap receiver summary • Supported MIBs Community configuration By default, two SNMP Communities exist: • private, with Read/Write privileges and status set to Enable •...
  • Page 96: Trap Receiver Configuration

    The SNMP agent of the switch complies with SNMPv1 (for more about the SNMP specification, see the SNMP RFCs). The SNMP agent sends traps through TCP/IP to an external SNMP manager based on the SNMP configuration (the trap receiver and other SNMP community parameters). Community Use this pull-down menu to select one of the existing community names, or select Create to add a new one.
  • Page 97: Trap Receiver Summary

    Community This field adds an SNMP trap receiver community name and associated IP address. Name Enter the community string for the SNMP trap packet to be sent to the trap manager. This may be up to 16 characters and is case sensitive. IP Address Enter the IP address to receive SNMP traps from this device.
  • Page 98: Supported Management Information Bases (Mib)

    Community Displays the community string for the SNMP trap packet to be sent to the trap manager. Note that trap receiver communities and SNMP communities are separate and distinct. IP Address Displays the IP address to receive SNMP traps from this device. Status Indicates whether traps are currently Enabled for this community: Enable...
  • Page 99: Statistics

    Name The RFC number if applicable and the name of the MIB. Description The RFC title or MIB description. Click the Refresh button to retrieve and display the database again starting with the first entry in the table. Statistics This menu provides access to menu options that display various switch statistics, including: •...
  • Page 100 ifIndex This object indicates the ifIndex of the interface table entry associated with the processor of this switch. Received Octets Received The total number of octets of data received by the processor (excluding framing bits but including FCS octets). Packets Received Without Error The total number of packets (including broadcast packets and multicast packets) received by the processor.
  • Page 101 Transmitted Octets Transmitted The total number of octets of data transmitted on the network including framing bits. Packets Transmitted Without Errors The total number of packets that have been transmitted on the network without an error occurring. Unicast Packets Transmitted The total number of packets that higher-level protocols requested be transmitted to a subnetwork-unicast address, including those that were discarded or not sent.
  • Page 102: Switch Summary

    Time Since Counters Last Cleared: The elapsed time in days, hours, minutes and seconds since the statistics for this port were last cleared. Click the Clear Counters button to clear all the counters, resetting all summary and switch detailed statistics to defaults, except for the counts of discarded packets, which cannot be cleared. Click the Refresh button to refresh the data on the screen with the present state of the data in the switch.
  • Page 103: Port Detailed

    Broadcast Packets Transmitted The total number of packets that higher-layer protocols requested to be transmitted to the broadcast address, including those that were discarded or not sent. Transmit Packet Errors The number of outbound packets that could not be transmitted because of errors. Address Entries Currently In Use The number of learned and static Forwarding Database Address Table entries currently in use by this switch module.
  • Page 104 Packets Received: Octets Received The total number of octets of data (including those in bad packets) received on the network (excluding framing bits but including FCS octets). This object can be used as a reasonable estimate of Ethernet utilization. If greater precision is desired, the etherStatsPkts and etherStatsOctets objects should be sampled before and after a common interval.
  • Page 105 Total Packets Received with MAC Errors Total Packets Received with MAC Errors The total number of inbound packets that contained errors that prevented them from being delivered to a higher-layer protocol. Jabbers Received The total number of packets received that were longer than 1518 octets (excluding framing bits, but including FCS octets), and had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error).
  • Page 106 Packets Transmitted 256-511 Octets The total number of packets (including bad packets) transmitted that were between 256 and 511 octets in length (excluding framing bits but including FCS octets). Packets Transmitted 512-1023 Octets The total number of packets (including bad packets) transmitted that were between 512 and 1023 octets in length (excluding framing bits but including FCS octets).
  • Page 107 Total Transmit Packets Discarded Total Transmit Packets Discarded The sum of single collision frames discarded, multiple collision frames discarded, and excessive collision frames discarded. Single Collision Frames The number of successfully transmitted packets which encountered exactly one collision. Multiple Collision Frames The number of successfully transmitted packets which encountered more than one collision.
  • Page 108: Port Summary

    Click the Clear Counters button to clear all the counters, resetting all statistics for this port to default values. Click the Clear All Counters button to clear all the counters for all ports, resetting all statistics for all ports to default values. Click the Refresh button to refresh the data on the screen with the present state of the data in the switch.
  • Page 109 Port Use this field to select the port for which to display statistics. Click the down arrow to display the list of ports from which to choose. ifIndex This object indicates the ifIndex of the interface table entry associated with this port on an adapter.
  • Page 110: System Utilities

    Click the Clear All Counters button to clear all the counters for all ports, resetting all statistics for all ports to default values. Click the Refresh button to refresh the data on the screen with the present state of the data in the switch.
  • Page 111: Reset Configuration To Defaults

    Reset configuration to defaults Click the Reset button to reset the configuration of the switch module to the factory defaults. The switch is automatically reset when this command is processed. All configuration changes that you have made, including those saved to NVRAM, will be lost. You are prompted to confirm that the reset should proceed.
  • Page 112: Download File To Switch

    Download file to switch Use this panel to configure the information needed to download a file to the switch. File Type Specify the type of file to be downloaded to the switch: Code Specify code when you want to upgrade the operational flash. This is the factory default.
  • Page 113: Upload File From Switch

    Configuration Specify configuration when you want to update the switch's configuration. If the file has errors the update will be stopped. TFTP Server IP Address Enter the IP address of the TFTP server. The factory default is 0.0.0.0. TFTP File Path This field specifies the directory path on the TFTP server where the file to be downloaded to the switch is located.
  • Page 114: Ping

    File Type This field sets the type of file to be uploaded from the switch. The datatype is one of the following: config Configuration file errorlog Error log msglog Message log TFTP Server IP Address Enter the IP address of the TFTP server. The factory default is 0.0.0.0. TFTP File Path This field specifies the directory path on the TFTP server where the file to be uploaded from the switch is to be located.
  • Page 115: Trap Manager

    The switch can be pinged from any IP workstation with which the switch is connected through the default VLAN (VLAN 1), as long as there is a physical path between the switch and the workstation. IP Address Enter the IP address of the station you want the switch to ping. The initial value is blank.
  • Page 116: Trap Log

    Authentication Indicates whether authentication failure traps will be sent (Enable) or not (Disable). This field Enables or Disables the Authentication Flag, which determines whether a trap message is sent when the switch detects an authentication failure. The factory default is Enabled. Link Up/Down Indicates whether a trap will be sent when the link status changes from Up to Down or vice versa.
  • Page 117: Switching

    Number of Traps Since Last Reset The number of traps that have occurred since the last time the switch was reset. Number of Traps Since Log Last Viewed The number of traps that have occurred since the traps were last displayed. Displaying the traps by any method (terminal interface display, Web display, upload file from switch, etc.) will cause this counter to be cleared to 0.
  • Page 118: Vlan

    • Multicast forwarding database • Spanning tree VLAN This menu provides access to Virtual Local Area Network (VLAN) configuration, displays status and displays summary information. Menu options are: • Configuration • Status • Port configuration • Port summary • Reset configuration Configuration This panel displays detailed information, including interface information, for a specific VLAN.
  • Page 119 VLAN Name A string associated with this VLAN as a convenience. It can be up to 16 alphanumeric characters long, including blanks. The default is blank. VLAN ID 1 always has a name of Default. Use this field to change an existing Name. This field is optional.
  • Page 120: Status

    Participation Use the pull-down menu to configure the degree of participation of this port in this VLAN. The permissible values are: Include This port is always a member of this VLAN. This is equivalent to registration fixed in the IEEE 802.1Q standard. Exclude This port is never a member of this VLAN.
  • Page 121: Port Configuration

    VLAN Type What type of VLAN this is. A VLAN can be: • the Default VLAN (VLAN ID = 1). • a static VLAN, one that you have created. • a Dynamic VLAN, one that is created by GVRP registration. In order to change a VLAN from Dynamic to Static, use the VLAN Configuration panel or the config vlan makestatic command.
  • Page 122: Port Summary

    Port VLAN ID Specify the VLAN ID you want assigned to untagged or priority tagged frames received on this port. The VLAN ID must be that of a VLAN you have already created. The factory default is 1. Acceptable Frame Types Specify how you want the port to handle untagged and priority tagged frames.
  • Page 123: Reset Configuration

    Port VLAN ID The VLAN ID that this port will assign to untagged frames or priority tagged frames received on this port if the acceptable frame types parameter is set to Admit All. The factory default is 1. Acceptable Frame Types The types of frames that may be received on this port.
  • Page 124 Group Use this pull-down menu to select one of the existing PBVLANs, or select Create to add a new one. A Group ID number will be assigned automatically when you create a new group. You can create up to 128 groups. Group Name Use this field to assign a name to a new group.
  • Page 125: Summary

    Click the Delete Group button to remove the protocol-based VLAN group identified by the value in the Group ID field. Again, if you want the switch to retain the deletion across a power cycle, you must perform a save. Summary This panel displays the protocol-based VLAN information for all groups.
  • Page 126: Filters

    Click the Refresh button to update the screen with the latest information. Filters This menu provides access to two MAC filter screens: • MAC filter configuration • MAC filter summary MAC filter configuration Use this panel to add a static MAC filter entry for a MAC address and VLAN pair, update existing filter information, or delete one or more configured filters.
  • Page 127: Mac Filter Summary

    VLAN ID The VLAN ID used with the MAC address to fully identify packets you want filtered. You can only change this field when you have selected the Create Filter option and you can only select a configured VLAN. Destination Port Mask Select the ports you want included in the filter from the pull-down menu.
  • Page 128: Garp

    GARP This menu provides access to the Generic Attribute Registration Protocol (GARP) summary and configuration panels. Menu options are: • Status • Switch configuration • Port configuration Status This screen shows the GARP Status for the switch and for the individual ports. Note that the timers are only relevant when the status for a port shows as Enabled.
  • Page 129: Switch Configuration

    Join Timer (centisecs) Specifies the time between the transmission of GARP PDUs registering (or re-registering) membership for a VLAN or multicast group in centiseconds. An instance of this timer exists for each GARP participant for each port. Permissible values are 10 to 100 centiseconds (0.1 to 1.0 seconds).
  • Page 130: Port Configuration

    GMRP Mode Choose the GMRP administrative mode for the switch by selecting Enable or Disable from the pull-down menu. The factory default is Disable. Click the Apply button to update the switch with the values you enter. If you want the switch to retain the new values across a power cycle you must perform a save.
  • Page 131: Igmp Snooping

    assert registration for the same attribute in order to maintain uninterrupted service. Enter a number between 20 and 600 (0.2 to 6.0 seconds). The factory default is 60 centiseconds (0.6 seconds). An instance of this timer exists for each GARP participant for each port. Leave All Timer (centisecs) The Leave All Timer controls how frequently LeaveAll PDUs are generated.
  • Page 132: Interface Configuration

    Admin Mode Select the administrative mode for IGMP snooping for the switch from the pull-down menu. The default is Disable. Group Membership Interval (secs) Specify the amount of time you want the switch to wait for a report for a particular group on a particular interface before it deletes that interface from the group.
  • Page 133: Lag

    Select the Ports to Enable for IGMP Snooping The multiple select box lists all physical and LAG interfaces. Those interfaces currently enabled for IGMP snooping are shown as selected. Select all the interfaces you want enabled and deselect all those you want Disabled. Click the Apply button to update the switch with the values you enter.
  • Page 134: Status

    Link Trap Enables or Disables link trap notifications for the specified LAG. Administrative Mode This field Enables or Disables the specified LAG(s). Link Status Indicates whether the Link is Up or Down. STP Mode Sets the STP mode for the specified LAG(s). Port Identifies a physical port.
  • Page 135: Mfdb

    The logical port identifier of the LAG, in the format lag.port. LAG Name The name of this LAG. Admin Mode The administrative mode. The factory default is Enabled. Link State Indicates whether the link is Up or Down. STP Mode The Spanning Tree Protocol Administrative Mode associated with the LAG.
  • Page 136: Gmrp Table

    MAC Address Enter a MAC address and VLAN pair for which the switch has forwarding and/or filtering information. The format is two two-digit hexadecimal numbers representing the VLAN and six two-digit hexadecimal numbers representing the MAC address, separated by hyphens; for example, 00-01-00-23-45-67-89-AB. After you have entered a MAC address click the Search button and the data associated with the address will be displayed.
  • Page 137: Igmp Snooping Table

    MAC Address A MAC address and VLAN pair for which the switch has forwarding and/or filtering information. The format is two two-digit hexadecimal numbers representing the VLAN and six two-digit hexadecimal numbers representing the MAC address, separated by hyphens; for example, 00-01-00-23-45-67-89-AB. Type Displays the type of the entry.
  • Page 138: Stats

    MAC Address A MAC address and VLAN pair for which the switch has forwarding and/or filtering information. The format is two two-digit hexadecimal numbers representing the VLAN and six two-digit hexadecimal numbers representing the MAC address, separated by hyphens; for example, 00-01-00-23-45-67-89-AB. Type Displays the type of the entry.
  • Page 139: Spanning Tree

    Max MFDB Table Entries Displays the total number of entries possible in the MFDB table. Most MFDB Entries Since Last Reset Displays the largest number of entries that have been present in the MFDB table since last reset. This value is also known as the MFDB high-water mark. Current Entries Displays the current number of entries in the MFDB table.
  • Page 140: Common Spanning Tree (Cst) Configuration/Status

    Spanning Tree Admin Mode Select Enable or Disable from the pull-down menu to specify whether spanning tree operation is Enabled on the switch. Force Protocol Version Specify the version of the Spanning Tree Protocol (STP) you want the switch to use. The options are IEEE 802.1D (standard) and IEEE 802.1w (Rapid Reconfiguration).
  • Page 141 Bridge Priority Specifies the bridge priority. The value may be between 0 and 61440. It is set in multiples of 4096. For example, if you enter any value between 0 and 4095, it will be set to 0. If you enter any value between 4096 and (2*4096-1) it will be set to 4096.
  • Page 142: Cst Port Configuration/Status

    Topology Change The value of the topology change parameter for the switch indicating if a topology change is in progress on any port on the bridge. It takes a value if True or False. Designated Root The bridge identifier of the root bridge. Root Path Cost Path Cost to the Designated Root for this bridge instance.
  • Page 143 Port Priority Specify the priority for the selected port. The port priority is set in multiples of 16, and the range is 0 to 240. Admin Edge Port Select Enable to specify the port as an Edge Port within the CST. Disable is the default.
  • Page 144: Statistics

    CST Path Cost Path Cost to the CST Regional Root. Click the Apply button to send the updated screen to the switch and cause the changes to take effect on the switch. If you want the switch to retain the new values across a power cycle you must perform a save.
  • Page 145: Class Of Service

    Class of service This menu contains one option – 802.1p priority mapping. 802.1p priority mapping Use this panel to specify how IEEE 802.1p priority classes are to be mapped to the switch’s internal traffic classes. User Priority The 802.1p user priority to be mapped. Traffic Class Use the pull-down menus to select the internal traffic class for each user priority.
  • Page 146: Port Access Control

    Port access control The Port Access Control menu provides access to configuration, status and summary screens: • Configuration • Port configuration • Port status • Port summary • Statistics • Login • Port access privileges • Port access summary Configuration Use this panel to enable or disable authentication support on the switch.
  • Page 147: Port Configuration

    Port configuration Use this panel to begin the initialization or the reauthentication sequence on the selected port. Port Select the port to be configured. When the selection is changed, a screen refresh will occur causing all fields to be updated for the newly selected port. All physical interfaces are valid.
  • Page 148: Port Status

    Transmit Period (secs) Configures the transmit period for the selected port. The transmit period is the value, in seconds, of the timer used by the authenticator state machine on the specified port to determine when to send an Extensible Authentication Protocol Over LAN (EAPOL) EAP Request/Identity frame to the supplicant.
  • Page 149 Port Select the port whose information will be displayed. When the selection is changed, a screen refresh will occur causing all fields to be updated for the newly selected port. All physical interfaces are valid. Control Mode Displays the configured control mode for the specified port. Options are: force unauthorized The authenticator port access entity (PAE) unconditionally sets the controlled port to unauthorized.
  • Page 150 specified port to determine when to send an EAPOL EAP Request/Identity frame to the supplicant. The transmit period range is 1 to 65535. Supplicant Timeout (secs) Displays the configured supplicant timeout for the selected port. The supplicant timeout is the value, in seconds, of the timer used by the authenticator state machine on this port to timeout the supplicant.
  • Page 151: Port Summary

    • Authenticated • Aborting • Held • Force Authorized • Force Unauthorized Backend State Displays the current state of the backend authentication state machine. Possible values are: • Request • Response • Success • Fail • Timeout • Initialize • Idle Click the Refresh button to update the information on the page.
  • Page 152: Statistics

    Force Unauthorized The authenticator port access entity (PAE) unconditionally sets the controlled port to unauthorized. Force Authorized The authenticator PAE unconditionally sets the controlled port(s) to authorized mode. Auto The authenticator PAE sets the controlled port(s) mode to reflect the result of the authentication exchanges between the supplicant, authenticator and authentication server.
  • Page 153 Port Select the port whose information is to be displayed. When the selection is changed, a screen refresh occurs causing all fields to be updated for the newly selected port. All physical interfaces are valid. EAPOL Frames Received The number of valid EAPOL frames of any type that have been received by this authenticator.
  • Page 154: Login

    EAP Request/ID Frames Transmitted The number of EAP request/identity frames that have been transmitted by this authenticator. EAP Request Frames Transmitted The number of EAP request frames (other than request/identity frames) that have been transmitted by this authenticator. Invalid EAPOL Frames Received The number of EAPOL frames that have been received by this authenticator with an invalid length.
  • Page 155: Port Access Privileges

    Click the Refresh button to update the information on the page. Click the Apply button to send the updated screen to the switch and cause the changes to take effect on the switch. Port access privileges Use this panel to add the specified user to the list of users with access to the specified port(s). By default, a user is given access to all ports.
  • Page 156: Radius

    Port The port whose information is displayed on this line. Users The locally configured users with access to the specified port. Click the Refresh button to update the information on the page. RADIUS The Remote Authentication Dial-in User Service (RADIUS) menu provides access to the following panels: •...
  • Page 157: Server Configuration

    times the timeout for all configured servers. If the RADIUS request was generated by a user login attempt, all user interfaces are blocked until the RADIUS application returns a response. Current Server IP Address The IP address of the current server. This field is blank if no servers are configured. Number of Configured Servers The number of RADIUS servers that have been configured.
  • Page 158 RADIUS Server IP Address Select the RADIUS Server to be configured. Select Add to add a new server. Port The User Datagram Protocol (UDP) port used by this server. The valid range is 0 - 65535. Secret The shared secret for this server. The data entered in this field will not be displayed. Apply The Secret is applied only if this box is checked.
  • Page 159: Radius Statistics

    RADIUS statistics This panel displays RADIUS statistics for the switch that are not associated with a specific server or accounting server. Invalid Server Addresses The number of RADIUS Access-Response packets received from unknown addresses. Click the Refresh button to update the information on the page. Server statistics This panel displays the statistics for a configured RADIUS server.
  • Page 160 RADIUS Server IP Address Select the IP address of the server whose information is to be displayed. Round Trip Time (secs) The time, in seconds, between the most recent RADIUS Access-Reply/Access- Challenge and the matching Access-Request from this RADIUS server. Access Requests The number of RADIUS Access-Request packets sent to this server, not including retransmissions.
  • Page 161: Accounting Server Configuration

    Pending Requests The number of RADIUS Access-Request packets sent to this server that have not yet timed out or received a response. Timeouts The number of RADIUS packets sent to this server that have timed out. Unknown Types The number of RADIUS packets of unknown type received from this server. Packets Dropped The number of RADIUS packets received from this server dropped for a reason not otherwise included in this list.
  • Page 162: Accounting Server Statistics

    Secret Configured Indicates whether the shared secret for this accounting server has been configured. Click the Apply button to send the updated screen to the switch and cause the changes to take effect on the switch. If you want the switch to retain the new values across a power cycle you must perform a save.
  • Page 163: Clear Statistics

    Malformed Accounting Responses Displays the number of malformed RADIUS Accounting-Response packets received from this server. Malformed packets include packets with an invalid length. Bad authenticators and unknown types are not included as malformed accounting responses. Bad Authenticators Displays the number of RADIUS Accounting-Response packets that contained invalid authenticators received from this accounting server.
  • Page 164 HTTPS Admin Mode Select Enable or Disable to turn the Administrative Mode of Secure HTTP on or off. The currently configured value is shown when the web page is displayed. The default value is Disable. TLS Version 1 Select Enable or Disable to turn Transport Layer Security (TLS) Version 1.0 on or off. The currently configured value is shown when the web page is displayed.
  • Page 165: Secure Shell

    Secure Shell Secure Shell (SSH) is the standard encryption protocol used to provide a secure interactive login over a network. This Secure Shell menu provides access to the SSH configuration panel. Configuration Use this panel to configure SSH variables. Admin Mode Select Enable or Disable to turn the Administrative Mode of SSH on or off.
  • Page 166: Qos

    Click the Submit button to send the updated screen to the switch and have the changes take effect on the switch If you want the switch to retain the new values across a power cycle you must perform a save. Click the Refresh button to display the current page with the latest settings and status.
  • Page 167 Make a selection from the pull-down menu. You may create a new ACL or update the configuration of an existing ACL. ACL ID ACL ID must be a whole number between 1 and 100. Ports This dynamic multi-selector lists all available valid interfaces for ACL mapping. All non- routing physical interfaces and interfaces participating in LAGs that are not already assigned to an ACL are listed.
  • Page 168: Summary

    Summary This panel displays a summary of all ACLs on the switch. The ACL identifier. Rules The number of rules that are associated with this ACL. Ports The interfaces that are associated with this ACL. Direction The packet filtering direction for the ACL on the interface. Click the Refresh button to update the screen with the latest information.
  • Page 169 Use the pull-down menu to select the ACL for which you want to create or update a rule. Rule Enter a whole number in the range of 1 to 10 that will be used to identify the rule. An ACL may have up to 10 user-specified rules. Action Specify what action should be taken if a packet matches the rule’s criteria.
  • Page 170 Protocol Keyword Specify that a packet’s IP protocol is a match condition for the selected ACL rule. If you click Configure on this line you will be shown a new screen where you can select the protocol to be used as the match condition. The possible values are ICMP, IGMP, IP, TCP, and UDP.
  • Page 171: Bandwidth Provisioning

    Source L4 Port Keyword Specify that a packet’s source Layer 4 port is a match condition for the selected ACL rule. If you click Configure on this line you will be shown a new screen where you can select the port to be used as the match condition. The possible values are domain, echo, FTP, ftpdata, HTTP, SMTP, SNMP, Telnet, TFTP, and www.
  • Page 172: Bandwidth Profile Summary

    Bandwidth Profile Select Create from the pull-down menu to configure a new bandwidth profile, or select one of the existing profiles to display and update its configuration. Bandwidth profile 1, named default, always exists and you cannot change or delete it. Name Enter the name you want to give to the bandwidth profile.
  • Page 173: Traffic Class Configuration

    Bandwidth Profile Displays the number associated with the bandwidth profile. Name Displays the name of the bandwidth profile. Allocated Minimum Bandwidth Displays the sum of the minimum guaranteed bandwidth for all bandwidth profiles configured on this interface. Maximum Bandwidth Displays the sum of the maximum allowable bandwidth for all bandwidth profiles configured on this interface.
  • Page 174 Traffic Class Select Create from the pull-down menu to configure a new Traffic Class, or select one of the existing classes to display and update its configuration. Name Enter the name to be given to the Traffic Class. You may enter up to 15 alpha-numeric characters and may include the underscore _ or the dash -.
  • Page 175: Traffic Class Summary

    There is no restriction on the sum of the maximum bandwidth of all Traffic Classes associated with the same interface. When a Traffic Class is attached to a LAG interface, the bandwidth allocation profile minimum bandwidth parameter will not be applicable to the Traffic Class.
  • Page 176: Interface Allocation Summary

    Interface allocation summary This panel displays the bandwidth allocated to the listed interfaces. The allocated minimum bandwidth does not exceed the capability of the interface unless the interface is a LAG. Interface The Port designation of an interface for which you have configured one or more traffic classes.
  • Page 177 Web-Based Network Management...
  • Page 178 NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 179: Command Line Interface Management

    6 Command Line Interface Management Your NovaScale Blade 1 GB Intel® Ethernet Switch Module supports a management interface that you can use to set up and control your device over the network using the TCP/IP Telnet protocol. You can use this facility to perform the same network management functions that you can perform using the Web Interface.
  • Page 180: Command Name

    Command name The following conventions apply to the command name: • The command name is displayed in this document in bold font and must be typed exactly as shown. • Once you have entered enough letters of a command name to uniquely identify the command, hitting the space bar or Tab key will cause the system to complete the word.
  • Page 181: Comments

    logical port This is used to identify a logical interface – a Link Aggregation Group or a VLAN. You enter a name and number separated by a period, for example: lag.3 identifies LAG 3 vlan.2 identifies VLAN 2 character strings Use double quotation marks to identify character strings, for example, “System Name with Spaces”.
  • Page 182: Remotely Managing The Novascale Blade 1Gb Intel® Ethernet Switch Module

    Tab, <SPACE> command-line completion Exit go to next lower command prompt execute the most recent command execute the nth most recent command execute the nth command in history buffer !str execute the most recent command that starts with the string “str”. !*str execute the most recent command that contains the string “str”.
  • Page 183: Connecting To The Novascale Blade 1Gb Intel® Ethernet Switch Module

    The two previously described modes are only applicable to the NovaScale Blade 1 GB Intel® Ethernet Switch Module. The management module can only be remotely accessed through the 10/100 Mbps Ethernet port on the management module. Connecting to the NovaScale Blade 1GB Intel® Ethernet Switch Module When you know the IP address for your switch module and have an existing network connection, you can use the Telnet program (in VT-100 compatible terminal mode) to access and control the...
  • Page 184: Managing User Accounts

    There are two ways to change the configuration stored in NVRAM: • Save a new configuration using the save config command. • Reset all configuration values to the initial settings listed in Appendix C “Run-time Switching Software Default Settings” on page 233 by issuing the clear config command. This restores the configuration settings that were entered at the factory and causes a reboot.
  • Page 185: Novascale Blade 1Gb Intel® Ethernet Switch Module System Commands

    NovaScale Blade 1GB Intel® Ethernet Switch Module system commands This section describes the commands that you use to configure and manage the switch. These commands include: • System information and statistics commands • System configuration commands • System description commands •...
  • Page 186: Inventory Information

    show forwardingdb learned Use this command to display forwarding database entries for learned addresses. Format show forwardingdb learned show forwardingdb table Use this command to display the forwarding database entries. If the command is entered with no parameter, the entire table is displayed. This is the same as entering the optional <all> parameter. Alternatively, you can enter a MAC address to display the table entry for that address and all entries following it.
  • Page 187: Logs

    Maintenance Level The identification of the hardware change level. Manufacturer The two-octet code that identifies the manufacturer. Burnedin MAC Address The burned-in universally administered MAC address of this switch. Software Version The release.version.maintenance number of the code currently running on the switch.
  • Page 188 NOTE Message log information is not retained across a switch module reset and wraps after 512 entries. NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 189: Port Commands

    Port commands System and configuration config port adminmode Use this command to enable or disable one or more ports. The port will only participate in the network when it is enabled. Default enable Format config port adminmode <port/listofports/all> <enable/disable> config port autoneg Use this command to enable or disable automatic negotiation on one or more ports.
  • Page 190 10BASE-T full duplex 10BASE-T half duplex show port Use this command to display port information. Format show port <port/listofports/all> Port The interface number of the physical port or LAG whose information is displayed on the line. Type If not blank, this field indicates that this port is a special type of port. The possible values are: Monitoring port, participating in Port Mirroring.
  • Page 191: Simple Network Management Protocol (Snmp)

    config mirroring delete Use this command to remove the port mirroring designation from both the probe port and the mirrored port. The probe port must be manually re-added to any desired VLANs. Format config mirroring delete config mirroring mode Use this command to configure the port mirroring mode. The possible values are enable and disable. The probe and mirrored ports must be configured before port mirroring can be enabled.
  • Page 192 Format config snmpcommunity create <name> config snmpcommunity delete Use this command to remove a name from the SNMP community table. Format config snmpcommunity delete <name> config snmpcommunity ipaddr Use this command to specify the IP address (or portion thereof) from which this device will accept SNMP packets with the associated community name.
  • Page 193 SNMP manager based on the SNMP configuration (the trap receiver and other SNMP community parameters). Format show snmpcommunity SNMP Community Name The community name of this row of the table. Client IP Address An IP address (or portion thereof) from which this device will accept SNMP packets with the associated community name.
  • Page 194: System Configuration

    Format config snmptrap mode <enable/disable> <name> <ipaddr> show snmptrap Use this command to display information about SNMP trap receivers. Trap messages are sent across the network to an SNMP Network Manager. These messages alert the manager to events occurring within the switch or on the network. Up to six trap receivers are supported at the same time. Format show snmptrap SNMP Trap Name...
  • Page 195 Default Gateway The default IP gateway address for this interface. The factory default value is 0.0.0.0. Burned In MAC Address The burned-in MAC address used for in-band connectivity if you choose not to configure a locally administered address. Network Configuration Protocol Current Indicates that the switch will transmit a DHCP request following power-up.
  • Page 196 show telnet Use this command to display Telnet settings. Format show telnet Telnet Login Timeout (minutes) The number of minutes of inactivity that will occur on a Telnet or SSH session before the switch logs off. A value of zero means there will be no timeout. Maximum Number of Telnet Sessions The number of simultaneous Telnet and SSH sessions allowed.
  • Page 197 config users snmpv3 authentication Use this command to specify the protocol to be used to authenticate a user account. The valid authentication protocols are none, md5 or sha. If md5 or sha are specified, the user login password will be used as the SNMPv3 authentication password. The <user> is the user account for which the specified authentication protocol will be used.
  • Page 198: System Description

    Format config loginsession close <sessionid/all> show loginsession Use this command to display currently active Telnet and serial port connections to the switch. Format show loginsession Login Session ID User Name The account name used to login via the serial port or Telnet. Connection From The IP address of the Telnet client machine or EIA-232 for the serial port connection.
  • Page 199 show stats port detailed Use this command to display detailed statistics for a specified port. Format show stats port detailed <port> Packets Received Octets Received The total number of octets of data (including those in bad packets) received on the network (excluding framing bits but including FCS octets).
  • Page 200 Broadcast Packets Received The number of packets received that were directed to a broadcast address. Note that this number does not include packets directed to the multicast address. Packets Received with MAC Errors Total Packets Received with MAC Errors The total number of inbound packets that contained errors that prevented them from being delivered to a higher-layer protocol.
  • Page 201 Packets Transmitted 128-255 Octets The total number of packets (including bad packets) transmitted that were between 128 and 255 octets in length (excluding framing bits but including FCS octets). Packets Transmitted 256-511 Octets The total number of packets (including bad packets) transmitted that were between 256 and 511 octets in length (excluding framing bits but including FCS octets).
  • Page 202 Transmit Discards Total Transmit Packet Discarded The sum of single collision frames discarded, multiple collision frames discarded, and excessive collision frames discarded. Single Collision Frames The number of successfully transmitted packets which encountered exactly one collision. Multiple Collision Frames The number of successfully transmitted packets which encountered more than one collision.
  • Page 203 Packets Received Without Error The total number of packets (including multicast and broadcast packets) received on this port. Packets Received With Error The number of inbound packets that contained errors that prevented them being delivered to a higher-layer protocol. Broadcast Packets Received The total number of packets received that were directed to the broadcast address.
  • Page 204 Transmitted Octets Transmitted The total number of octets of data transmitted on the network including framing bits. Packets Transmitted Without Errors The total number of packets that have been transmitted on the network. Unicast Packets Transmitted The total number of packets that higher-level protocols requested be transmitted to a subnetwork-unicast address, including those that were discarded or not sent.
  • Page 205: Show Sysinfo

    Time Since Counters Last Cleared The elapsed time in days, hours, minutes and seconds since the statistics for this port were last cleared. show stats switch summary Use this command to display a summary of the statistics for all switch traffic. Format show stats switch summary Packets Received Without Error...
  • Page 206: System Utilities

    System Contact Text used to identify a contact person for the switch. May be up to 31 alphanumeric characters. The factory default is blank. System ObjectID The base object ID for the switch’s enterprise MIB. System Up Time The time in days, hours and minutes since the last reboot. MIBs Supported The list of MIBs supported by the management agent running on the switch.
  • Page 207 clear stats switch Use this command to clear the statistics for the switch. You will be prompted to confirm that you want to issue this command. Format clear stats switch clear transfer Use this command to reset the file transfer parameters to the factory defaults. You will be prompted to confirm that you want to issue this command.
  • Page 208 save config Use this command to permanently save configuration changes made since the previous save or reboot to Non-Volatile Random Access Memory (NVRAM). You are prompted to verify your choice. Format save config show history Use this command to show the contents of the command history buffer. The output will display the oldest command in the history buffer first and the show history command (the newest command) last.
  • Page 209 transfer download start Use this command to start a download transfer. After the current settings are displayed you will be prompted to confirm your decision. This command will close your connection to the host. Format transfer download start The following information fields are displayed: TFTP Server IP The IP address of the server where the file is to be downloaded.
  • Page 210 You may specify the file path as part of the file name if the string is less than 31 characters. Otherwise, use the transfer upload path command to specify the directory path. This command is valid only when the Transfer Mode is TFTP. See transfer upload mode. Format transfer upload filename <name>...
  • Page 211: Trap Manager

    Trap manager config trapflags authentication Use this command to enable or disable the Authentication Flag, which determines whether a trap message is sent when the switch detects an authentication failure. Default enable Format config trapflags authentication <enable/disable> config trapflags linkmode Use this command to enable or disable Link Up/Down traps for the entire switch.
  • Page 212: Switching Configuration Commands

    Number of Traps Since Last Reset The number of traps that have occurred since the last time the switch was reset. Number of Traps Since Log Last Viewed The number of traps that have occurred since the traps were last displayed. Displaying the traps by any method (terminal interface display, Web display, upload file from switch, etc.) will cause this counter to be cleared to 0.
  • Page 213: Config Garp Gvrp Adminmode

    will be disabled on that interface. GARP functionality will subsequently be re-enabled if routing is disabled or LAG membership is removed from an interface that previously had GARP enabled. Default disable Format config garp grmp interfacemode <port/listofports/all><enable/disable> config garp gvrp adminmode Use this command to enable or disable GVRP on the switch module.
  • Page 214: Show Garp Info

    show garp info Use this command to display GARP information for the NovaScale Blade 1GB Intel® Ethernet Switch Module. Format show garp info GMRP Admin Mode This displays the administrative mode of GMRP for the switch module. The default is disable. GVRP Admin Mode This displays the administrative mode of GVRP for the NovaScale Blade 1GB Intel®...
  • Page 215: Igmp Snooping Commands

    IGMP snooping commands config igmpsnooping adminmode Use this command to enable or disable IGMP Snooping on the switch module. Default disable Format config igmpsnooping adminmode <enable/disable> config igmpsnooping groupmembershipinterval Use this command to configure the IGMP Group Membership Interval time on the NovaScale Blade 1GB Intel®...
  • Page 216: Show Igmpsnooping

    show igmpsnooping Use this command to display IGMP Snooping information for the NovaScale Blade 1GB Intel® Ethernet Switch Module. Configuration information is displayed whether or not IGMP Snooping is enabled. Status information is only displayed when IGMP Snooping is enabled. Format show igmpsnooping Admin Mode...
  • Page 217: Config Lag Deleteport

    Format config lags deletelag <logical port/listofports/all> config lag deleteport Use this command to delete one or more ports from a LAG. The first interface parameter designates a configured LAG. The second interface number designates a port that is a member of the LAG. Use <all>...
  • Page 218: Mac Filter Commands

    MAC filter commands config macfilter adddest Use this command to add the <port> to the destination filter set for the MAC filter with the MAC address of <macaddr> and VLAN of <vlan>. The <macaddr> parameter must be specified as a 6- byte hexadecimal number in the format of 00-12-34-56-78-90.
  • Page 219: Show Macfilter

    show macfilter Use this command to display the Static MAC Filtering information. If <all> is selected as the first parameter, all the Static MAC Filters in the switch module are displayed. If a <macaddr> is entered, a VLAN ID must also be entered and the Static MAC Filter information will be displayed only for that MAC address and VLAN ID pair.
  • Page 220: Show Mfdb Staticfiltering

    show mfdb staticfiltering Use this command to display the Static Filtering entries in the MFDB. Format show mfdb staticfiltering Mac Address A MAC address and VLAN pair for which the switch has forwarding and/or filtering information. The format is two, two-digit hexadecimal numbers, representing the VLAN and six, two-digit hexadecimal numbers, representing the MAC address, separated by hyphens;...
  • Page 221: Protocol-Based Vlan Commands

    Forwarding Interfaces The forwarding list is derived from combining all the component’s forwarding interfaces and removing the interfaces that are listed as the static filtering interfaces. Protocol-based VLAN commands config protocol create Use this command to add a protocol-based VLAN group to the NovaScale Blade 1GB Intel® Ethernet Switch Module.
  • Page 222: Config Protocol Vlan Add

    config protocol vlan add Use this command to attach a <vlan> to the protocol-based VLAN identified by <groupid>. A group may only be associated with one VLAN at a time, however the VLAN association can be changed. Format config protocol vlan add <groupid> <vlan> config protocol vlan remove Use this command to remove the <vlan>...
  • Page 223 config spanningtree bridge maxage Use this command to configure the Bridge Max Age parameter to a new value. This is the value that all bridges use for maxage when this bridge is acting as the root: A BPDU will be discarded when its age exceeds maxage.
  • Page 224: Spanning Tree Common Spanning Tree (Cst) Commands

    Spanning tree Common Spanning Tree (CST) commands config spanningtree cst port edgeport Use this command to specify whether a port is an edge port within the Common Spanning Tree (CST). This will allow the port to transition to Forwarding State without delay. The <port> is the port to be affected.
  • Page 225 Root Port Max Age The maximum age of STP information learned from the network on any port before it is discarded. Root Port Bridge Forward Delay The value that all bridges use for forwarddelay when this bridge is acting as the root.
  • Page 226: Spanning Tree Port Commands

    Hello Time The hello time in use for this port. Edge Port The configured value indicating if this port is an edge port. Edge Port Status The derived value of the edge port status. True if operating as an edge port; false otherwise.
  • Page 227: Spanning Tree Summary Commands

    Port Up Time Since Counters Last Cleared The time in days, hours, minutes, and seconds since the counters were last reset. STP BPDUs Transmitted The number of STP BPDUs sent by this port. STP BPDUs Received The number of STP BPDUs received by this port. RSTP BPDUs Transmitted The number of Rapid Reconfiguration STP BPDUs sent by this port.
  • Page 228: Virtual Local Area Network (Vlan) Commands

    Virtual Local Area Network (VLAN) commands config vlan bcaststorm Use this command to enable or disable broadcast storm control for a particular Virtual Local Area Network (VLAN). If broadcast storm control is enabled, storms are controlled by counting the number of broadcast packets within a certain time period. If the [packets per second] count limit is exceeded, the packets are discarded.
  • Page 229: Config Vlan Port Acceptframe

    Participation options are: include The interface is always a member of this VLAN. This is equivalent to registration fixed. exclude The interface is never a member of this VLAN. This is equivalent to registration forbidden. auto The interface is dynamically registered in this VLAN by GVRP. The interface will not participate in this VLAN unless a join request is received on this interface.
  • Page 230: Show Vlan Detailed

    show vlan detailed Use this command to display detailed information, including interface information, for a specific VLAN. Format show vlan detailed VLAN ID There is a VLAN Identifier (VLAN ID) associated with each VLAN. The range of the VLAN ID is 1 to 4094. VLAN Name A string associated with this VLAN as a convenience.
  • Page 231: Show Vlan Port

    Untagged All frames transmitted for this VLAN will be untagged. show vlan port Use this command to display VLAN port information. Format show vlan port <port/listofports/all> Port Indicates which port is associated with the fields on this line. Port VLAN ID The VLAN ID that this port will assign to untagged frames or priority tagged frames received on this port if the acceptable frame types parameter is set to Admit All.
  • Page 232: Class Of Service Commands

    In order to change a VLAN from dynamic to static, use the config vlan makestatic command. BcastStorm This displays the administrative mode of broadcast storm control for this VLAN. If storm control is enabled, storms are controlled by counting the number of broadcast packets within a certain time period.
  • Page 233: Security Configuration Commands

    Security configuration commands This section describes the commands used to configure and manage the security features of the NovaScale Blade 1 GB Intel® Ethernet Switch Module. These features include: • Authentication commands • IEEE 802.1X Port-based network access control • Remote Authentication Dial-In User Service (RADIUS) •...
  • Page 234: Config Users Login

    a specific user if the user is configured locally. If this value is not configured, users will be authenticated using local authentication only. Format config users defaultlogin <listname> config users login Use this command to assign the specified authentication login list to the specified user for system login.
  • Page 235: Ieee 802.1X Commands

    IEEE 802.1X commands clear dot1x port stats Use this command to reset the IEEE 802.1X statistics for the specified port(s). Format clear dot1x port stats <port/all> config dot1x adminmode Use this command to enable or disable authentication support on the switch. The default value is disable.
  • Page 236: Config Dot1X Port Maxrequests

    Format config dot1x port initialize <port> config dot1x port maxrequests Use this command to configure the maximum number of times the authenticator state machine on the specified port will retransmit an Extensible Authentication Protocol Over LANs (EAPOL) EAP Request/Identity before timing out the supplicant. The maximum requests value must be in the range of 1 and 10.
  • Page 237: Config Dot1X Port Supptimeout

    config dot1x port supptimeout Use this command to configure the value, in seconds, of the timer used by the authenticator state machine on the specified port to timeout the supplicant. The supplicant timeout must be between 1 and 6553. Default Format config dot1x port supptimeout <port>...
  • Page 238: Show Dot1X Port Stats

    Quiet Period (secs) The timer used by the authenticator state machine on this port to define periods of time in which it will not attempt to acquire a supplicant. The value is expressed in seconds and will be in the range 0 and 65535. Transmit Period (secs) The timer used by the authenticator state machine on the specified port to determine when to send an EAPOL EAP Request/Identity frame to the supplicant.
  • Page 239: Show Dot1X Port Summary

    Last EAPOL Frame Version The protocol version number in the most recently received EAPOL frame. Last EAPOL Frame Source The source MAC address in the most recently received EAPOL frame. EAP Response/ID Frames Received The number of EAP response/identity frames that have been received by the authenticator port.
  • Page 240: Show Dot1X Summary

    show dot1x summary Use this command to display a summary of the IEEE 802.1X configuration parameters for the switch. Format show dot1x summary Administrative mode Indicates whether authentication control is enabled on the switch. Remote Authentication Dial-In User Service (RADIUS) commands RADIUS accounting commands config radius accounting mode Use this command to enable or disable the RADIUS accounting function.
  • Page 241: Radius Configuration / Summary Commands

    Round Trip Time The time, in hundredths of a second, between the most recent RADIUS accounting response and the matching accounting request from this RADIUS accounting server. Accounting Requests The number of RADIUS accounting request packets sent to this accounting server, not including retransmissions.
  • Page 242 Format clear radius stats config radius maxretransmit Use this command to configure the maximum number of times a request packet is retransmitted when no response is received from the RADIUS server. The maxretransmit value is an integer in the range of 1 and 15. Consideration should be given to the maximum delay time when configuring RADIUS maxretransmit and timeout values.
  • Page 243: Radius Server Commands

    Timeout Duration (secs) The timeout value, in seconds, for request retransmissions. Accounting Mode Indicates whether accounting is currently enabled. RADIUS server commands config radius server add Use this command to configure the IP address used to connect to a RADIUS server. Up to three servers can be configured for each RADIUS client.
  • Page 244 Format config radius server secret <ipaddr> show radius server stats Use this command to display the statistics for a configured RADIUS server. Format show radius server stats <ipaddr> Server IP Address The IP address of the server whose information is displayed on this row. Round Trip Time The time, in seconds, between the most recent RADIUS access reply/access challenge and the matching access request from this RADIUS server.
  • Page 245: Secure Shell (Ssh) Commands

    IP Address The IP address of the authentication server. Port The port used to access the authentication server. Type Indicates whether the server is primary or secondary. Secret configured Indicates whether a secret has been configured for the authentication server. Secure Shell (SSH) commands config ssh adminmode Use this command to enable or disable SSH.
  • Page 246: Show Http Info

    Default disable Format config http secureserver adminmode <enable\disable> show http info Displays the http settings for the switch. Format show http info Mode Privileged EXEC Secure-Server Administrative Mode Indicates whether the administrative mode of secure HTTP is enabled or disabled. Secure Protocol Level The protocol level may have the values of SSL3, TSL1 or both.
  • Page 247: Config Acl Interface Remove

    config acl interface remove Use this command to disassociate an ACL from an interface for the specified direction. The <direction> parameter can have the values of in or out. The <aclid> parameter specifies the ACL to remove. Format config acl interface remove <port> <direction> <aclid> config acl rule action Use this command to specify the action for the ACL and rule referenced by the parameters <aclid>...
  • Page 248: Config Acl Rule Match Every

    must have a value equal to or greater than the starting port. The starting port, ending port and all ports in between will be part of the destination port range. Either this command or the config acl match destl4port keyword command may be used to specify a destination layer 4 port range as a match condition.
  • Page 249: Config Acl Rule Match Srcl4Port Number

    This command and the config acl match srcl4port number command are two methods of specifying the source layer 4 port range as a match condition. Either command can be used to configure or modify the source layer 4 port range. Format config acl rule match srcl4port keyword <aclid>...
  • Page 250: Bandwidth Provisioning Commands

    Direction Displays the packet filtering direction for the ACL on the interface. The possible values displayed are inbound and outbound. Bandwidth provisioning commands BW provisioning BW allocation commands config bwprovisioning bwallocation create Use this command to create a bandwidth allocation profile. The <name> field is an alphanumeric string up to 15 characters.
  • Page 251: Bw Provisioning Traffic Class Commands

    Bandwidth Allocation Profile Name Displays the user-defined name of this bandwidth allocation profile. Minimum Bandwidth Displays the minimum guaranteed bandwidth of this bandwidth allocation profile in Mbps. Maximum Bandwidth Displays the maximum allowable bandwidth of this bandwidth allocation profile in Mbps.
  • Page 252 show bwprovisioning trafficclass allocatedbw Use this command to display the bandwidth allocated. The allocated minimum bandwidth should not exceed the interface bandwidth unless the interface is a LAG interface. Format show bwprovisioning trafficclass allocatedbw <port> Port The specified interface. Allocated Minimum Bandwidth Displays the sum of the minimum guaranteed bandwidth for all traffic classes configured on this interface.
  • Page 253 Bandwidth Allocation Profile Displays the bandwidth allocation profile associated with this traffic class. This field is blank when there is no bandwidth allocation profile associated with this traffic class. Command Line Interface Management...
  • Page 254 NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 255: A Rj-45 Pin Specifications

    A RJ-45 Pin Specifications The four external Ethernet ports of this switch module are auto-configuring and will work with straight-through or crossover cables when connected to other Ethernet equipment. Review the documentation that comes with the product you are connecting to for matching cable pin assignments.
  • Page 256 NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 257: B Cable Lengths

    B Cable Lengths Use the following table as a guide for the maximum cable lengths: Table 8. Maximum cable lengths Standard Data transmission rate Media type Maximum distance 1000BASE-T 1000 Mbps Category 5e UTP cable 100 meters (328.1 ft) Category 5 UTP cable 100BASE-TX 100 Mbps Category 5 UTP cable...
  • Page 258 NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 259: C Run-Time Switching Software Default Settings

    C Run-time Switching Software Default Settings The following table contains the default settings for the run-time switching software variables. Variables are separated by category and further by sub-headings (listed alphabetically within category). "Default value" is self-explanatory while "Command" lists the CLI command used to change the default setting.
  • Page 260 Table 9. Default settings for run-time switching software variables (continued) Sub- Heading heading Variable Default value Command Reauthentication Disable config dot1x port Sequence reauthenticate Server Timeout 30 seconds config dot1x port servertimeout Supplicant Time Out 30 seconds config dot1x port supptimeout Transmit Period 30 seconds...
  • Page 261 Table 9. Default settings for run-time switching software variables (continued) Sub- Heading heading Variable Default value Command Switching VLAN Switching Accept frame config vlan port acceptframe Broadcast Storm disable config vlan bcaststorm Default port VID config vlan port pvid Ingress filter Disable config vlan port ingressfilter...
  • Page 262 Table 9. Default settings for run-time switching software variables (continued) Sub- Heading heading Variable Default value Command MCRT Expiration 0 seconds config igmpsnooping Time mcrtexpiretime Mode Disable config igmpsnooping adminmode Link Aggregation LAG linktrap enable config lag linktrap Spannng Tree Protocol (STP) Bridge Forward Delay...
  • Page 263 Table 9. Default settings for run-time switching software variables (continued) Sub- Heading heading Variable Default value Command Port Mode Disable config spanningtree port mode System Auto log-out 10 min Configuration update Disable Default gateway 0.0.0.0 IP address 10.90.90.9x, where x depends on the number of the bay into which you have...
  • Page 264 Table 9. Default settings for run-time switching software variables (continued) Sub- Heading heading Variable Default value Command Web enable status Enable config network webmode SNMPcommunit IP address 0.0.0.0 config snmpcommunity ipaddr IP Mask 0.0.0.0 config snmpcommunity ipmask Mode Default private and config snmpcommunity public communities mode...
  • Page 265 Table 9. Default settings for run-time switching software variables (continued) Sub- Heading heading Variable Default value Command Transfer Blank transfer Upload/download upload/download path Path Trap Management Authenticate Enable config trapflags Trapflags authentication Trapflags Linkmode Enable config trapflags linkmode Trapflags Multiusers Enable config trapflags multiusers...
  • Page 266 NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 267: D Cli Command Tree

    D CLI Command Tree This appendix presents the CLI command tree used in conjunction with the NovaScale Blade 1 GB Intel® Ethernet Switch Module. SWITCHING clear config igmpsnooping dot1x port stats pass radius stats stats port switch transfer traplog vlan config create delete...
  • Page 268 srcip srcl4port keyword number authentication login create delete bwprovisionin bwallocation create delete maxbandwidth trafficclass bwallocation create delete port vlan weight classofservice 802.1mapping dot1x adminmode defaultlogin login port controlmode initialize maxrequests quietperiod reauthenabled reauthenticate reauthperiod servertimeout supptimeout transmitperiod users remove NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 269 forwardingdb agetime garp gmrp adminmode interfacemode gvrp adminmode interfacemode jointimer leavealltimer leavetimer http secureport secureprotocol secureserver adminmode igmpsnooping adminmode groupmember- shipinterval interfacemode maxresponse mcrtexpiretime addport adminmode create deletelag deleteport linktrap name loginsession close macfilter adddest create deldest remove mirroring create delete mode CLI Command Tree...
  • Page 270 network javamode webmode port adminmode autoneg flowcontrol lacpmode linktrap physicalmode prompt protocol create delete interface remove protocol remove vlan remove radius accounting mode server port remove secret maxretransmit server msgauth port primary remove secret timeout snmpcommuni accessmode NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 271 create delete ipaddr ipmask mode snmptrap create delete ipaddr mode spanningtree adminmode bridge forwarddelay hellotime maxage priority port edgeport pathcost priority forceversion port migrationchec mode adminmode protocol syscontact syslocation sysname telnet maxsessions mode timeout trapflags authentication linkmode multiusers CLI Command Tree...
  • Page 272 stpmode users defaultlogin delete login passwd snmpv3 accessmode authentication encryption vlan bcaststorm create delete makestatic mcaststorm name participation port acceptframe ingressfilter priority pvid tagging help logout ping reset system save config show detailed summary switch authentication login info users NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 273 bwprovisionin bwallocation detailed summary trafficclass allocatedbw detailed summary classofservice 802.1pmappin dot1x port detailed stats summary user summary eventlog forwardingdb agetime learned table garp info interface history http info igmpsnooping inventory loginsession macfilter mfdb gmrp igmpsnooping staticfiltering stats table mirroring CLI Command Tree...
  • Page 274 msglog network port protocol radius accounting stats summary server stats summary stats summary snmpcommuni snmptrap spanningtree bridge detailed port detailed summary port summary info stats port detailed summary switch detailed summary sysinfo telnet trapflags traplog users authentication info vlan detailed port NovaScale Blade 1 GB Intel®...
  • Page 275 summary transfer download datatype filename path serverip start upload datatype filename path serverip start CLI Command Tree...
  • Page 276 NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 277: E Cli Configuration Examples

    E CLI Configuration Examples This appendix provides examples of using the CLI to configure the NovaScale Blade 1 GB Intel® Ethernet Switch Module for some key functions. Bridging configuration example This section provides sample CLI commands showing how to configure the NovaScale Blade 1 GB Intel®...
  • Page 278 default priority mapping provided by the switch. These commands affect all of the interfaces on the switch and leave the defaults unchanged for priority levels 3-7. config classofservice 802.1p mapping 0 0 config classofservice 802.1p mapping 1 2 config classofservice 802.1p mapping 2 1 The switch supports two protocols based on the Generic Attribute Registration Protocol (GARP) defined in IEEE 802.1D: GARP Multicast Registration Protocol (GMRP) and GARP VLAN Registration Protocol (GVRP).
  • Page 279: Ieee 802.1W Configuration Example

    IEEE 802.1w configuration example This section shows you how to configure the NovaScale Blade 1 GB Intel® Ethernet Switch Module to support rapid reconfiguration of the spanning tree topology. The IEEE 802.1w support specified in IEEE 802.1s defines a new configuration algorithm and protocol that provide significantly faster reconfiguration of the spanning tree than the original algorithm and protocol defined in the base IEEE 802.1D standard.
  • Page 280: Vlan Configuration Example

    VLAN configuration example This section provides sample CLI commands showing how to configure the NovaScale Blade 1 GB Intel® Ethernet Switch Module to support IEEE 802.1Q VLANs. Configuring VLANs allows you to partition your network on a logical rather than physical basis. The only physical restriction is that both ends of a point-to-point link must be in the same VLAN.
  • Page 281: Link Aggregation Configuration Example

    Link aggregation configuration example This section provides sample CLI commands showing how to configure the NovaScale Blade 1 GB Intel® Ethernet Switch Module to support IEEE 802.3ad aggregated links. By defining a Link Aggregation Group (LAG) you can treat multiple physical links between two end-points as one logical link.
  • Page 282: Igmp Snooping Configuration Example

    IGMP snooping configuration example This section provides sample CLI commands showing how to configure the NovaScale Blade 1 GB Intel® Ethernet Switch Module to support IGMP Snooping. Activating IGMP Snooping allows you to restrict the forwarding of multicast packets to network segments that need to see the packets. The switch uses information gained from examining IGMP packets to decide how to forward multicast packets.
  • Page 283: Access Control List Configuration Example

    Access Control List configuration example This section provides sample CLI commands showing how to configure the NovaScale Blade 1 GB Intel® Ethernet Switch Module to support Access Control Lists (ACLs). ACLs offer one way of adding Quality of Service support to your network. You define an ACL to control who can use your network or network resources by allowing or prohibiting access.
  • Page 284 config acl interface add ext.2 inbound 1 config acl interface add ext.3 inbound 1 config acl interface add ext.4 inbound 1 NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 285: F Understanding And Troubleshooting The Spanning Tree Protocol

    F Understanding and Troubleshooting the Spanning Tree Protocol This appendix provides details about how the Spanning Tree Protocol and Algorithm work and describes how to troubleshoot them. Spanning Tree Protocol (STP) operation Spanning Tree Protocol (STP) is used in a bridged LAN environment to reduce the physical network to a stable logical topology with no data loops that still allows for the existence of redundant connections.
  • Page 286: Creating A Stable Topology

    Table 10. STP parameters – bridge Parameter Description Default value Bridge hello time The length of time between broadcasts of the hello 2 seconds message. Bridge maxage time The length of time before topology information or 20 seconds information from BPDUs is discarded because it has aged out.
  • Page 287: Ieee 802.1D Stp Port States

    The bridge sends BPDUs to communicate and construct the spanning-tree topology. All bridges connected to the LAN on which a packet is transmitted will receive the BPDU. BPDUs are not directly forwarded by the bridge, but the receiving bridge uses the information in the frame to calculate the topology and, if it changes, to initiate a BPDU transmission.
  • Page 288: Ieee 802.1W Stp Port States

    Forwarding The port is forwarding packets. For additional information, see “Forwarding state” on page 268. Disabled The port responds only to network management messages and must return to the discarding state first. For additional information, see “Disabled state” on page 270. Note that the STP port state of disabled applies only to the port’s role within the spanning tree, and should not be confused with the port’s administrative state of enabled or disabled.
  • Page 289: Setting User-Changeable Stp Parameters

    Table 12. Relationship between IEEE 802.1D and IEEE 802.1w port states IEEE 802.1D port Admin. bridge IEEE 802.1w port Active topology port MAC operational state port state state role Included, root or Listening Enabled True Discarding designated Included, root or Learning Enabled True...
  • Page 290: Illustration Of Stp

    the discarding state to the forwarding state. For IEEE 802.1w operation this is the time that a designated port on the bridge spends in the learning state while moving from the disabled state to the forwarding state when both operPointToPointMAC and operEdgePort are false.
  • Page 291 LAN 1 LAN 1 Port Cost = 19 Port Cost = 19 Port 3 Port 3 Bridge ID = 15 Bridge ID = 15 Port 1 Port 1 Port 2 Port 2 Port Cost =4 Port Cost =4 Port Cost =4 Port Cost =4 Port Cost =4 Port Cost =4...
  • Page 292: Discarding State

    Note also that the example network topology is intended to provide redundancy to protect the network against a link or port failure, not a switch failure or removal. For example, a failure of bridge A would isolate LAN 1 from connecting to LAN 2 or LAN 3. Discarding state A port in the discarding state does not forward packets.
  • Page 293: Learning State

    The following illustration shows the actions that occur when a port is in the discarding state. Learning state A port in the learning state prepares to participate in frame forwarding. The port enters the learning state from the discarding state. A port will move from learning to forwarding when its forward delay timer expires.
  • Page 294: Forwarding State

    Forwarding state A port in the forwarding state forwards packets. The port enters the forwarding state from the learning state when the forward delay timer expires. A port in the forwarding state does the following: • Forwards packets received from the network segment to which it is attached. •...
  • Page 295 Understanding and Troubleshooting the Spanning Tree Protocol...
  • Page 296: Disabled State

    Disabled state A port in the disabled state does not participate in frame forwarding or STP. A port in the disabled state is virtually non-operational. Note that this STP port state should not be confused with the port’s administrative state. A disabled port does the following: •...
  • Page 297: Troubleshooting Stp

    Troubleshooting STP This section describes how to troubleshoot the STP. Spanning Tree Protocol Failure A failure in the Spanning Tree Algorithm generally results in a bridging loop. This is caused by a port that should be in the discarding state but is instead forwarding packets. Root Port 1 Port 1...
  • Page 298: Unidirectional Link

    Root Half-duplex Port 1 Port 1 Port 2 Port 2 Full-duplex Port 1 Port 1 Port 1 Port 1 Designated Port 2 Port 2 Port 2 Port 2 Blocked In the preceding example, port 1 on bridge B is configured as a full-duplex port and port 1 on bridge A is either configured as a half-duplex port or is left in auto-negotiation mode.
  • Page 299: Packet Corruption

    In this example, port 2 on bridge B can receive but not transmit packets. Port 2 on bridge C should be in the discarding state, but since it can no longer receive BPDUs from port 2 on bridge B, it will change to the forwarding state.
  • Page 300: Avoiding Network Problems

    problem, if sufficient time is available. Connectivity will be restored immediately after disabling a data loop. Avoiding network problems To help your network operate more efficiently, you can avoid or minimize network problems, as described in this section. • Know where the root is located. Although the STP can elect a root bridge, a well-designed network has an identifiable root for each VLAN.
  • Page 301 This is a common network design. Through trunks, bridges C and D have redundant links to backbone bridges A and B. Trunks, by default, carry all the VLAN traffic from VLAN 1 and VLAN 2. Therefore, bridge C is not only receiving traffic for VLAN 1, but also unnecessary broadcast and multicast traffic for VLAN 2.
  • Page 302 Trunk VLAN 1 VLAN 1 VLAN 2 VLAN 2 Blocked Blocked VLAN 1 VLAN 1 VLAN 2 VLAN 2 VLAN 1 VLAN 1 VLAN 2 VLAN 2 In this example, the VLAN definitions are extended to bridges A and B. This gives only a single blocked port per VLAN and enables the removal of all redundant links by removing bridge A or B from the network.
  • Page 303: G Getting Help And Technical Assistance

    You can solve many problems without outside assistance by following the troubleshooting procedures that Bull provides in the publications that are provided on the Resource CD that ships with your system and software. The documentation also describes the diagnostic tests that you can perform.
  • Page 304 NovaScale Blade 1 GB Intel® Ethernet Switch Module: Installation and User’s Guide...
  • Page 306 _ _ _ _ [ _ _ ] _ _ _ _ [ _ _ ] _ _ _ _ [ _ _ ] _ _ _ _ [ _ _ ] _ _ _ _ [ _ _ ] _ _ _ _ [ _ _ ] _ _ _ _...

This manual is also suitable for:

Novascale blade

Table of Contents