Edge-Core Direk Tronik 24/48-Port Management Manual

Edge-Core Direk Tronik 24/48-Port Management Manual

24/48-port gigabit ethernet switch powered by accton
Table of Contents

Advertisement

ES4524D
ES4548D
24/48-Port
Gigabit Ethernet Switch
Powered by Accton
Management Guide
e-mail: info@direktronik.se
tel: 08-52 400 700 fax: 08-520 18121

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Direk Tronik 24/48-Port and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Edge-Core Direk Tronik 24/48-Port

  • Page 1 Powered by Accton ES4524D ES4548D 24/48-Port Gigabit Ethernet Switch Management Guide e-mail: info@direktronik.se tel: 08-52 400 700 fax: 08-520 18121...
  • Page 3: Management Guide

    Management Guide ES4524D Gigabit Ethernet Switch Layer 2 Switch with 20 10/100/1000BASE-T (RJ-45) Ports, and 4 Gigabit Combination Ports (RJ-45/SFP) ES4548D Gigabit Ethernet Switch Layer 2 Switch with 44 10/100/1000BASE-T (RJ-45) Ports, and 4 Gigabit Combination Ports (RJ-45/SFP)
  • Page 4 ES4524D ES4548D F0.0.0.4 E112006-CS-R01 149100030400A...
  • Page 5: Table Of Contents

    Contents Section I: Getting Started Chapter 1: Introduction Key Features Description of Software Features System Defaults Chapter 2: Initial Configuration Connecting to the Switch Configuration Options Required Connections Remote Connections Basic Configuration Console Connection Setting Passwords Setting an IP Address Manual Configuration Dynamic Configuration Enabling SNMP Management Access...
  • Page 6 Contents Chapter 5: Setting an IP Address Setting the Switch’s IP Address (IP Version 4) Manual Configuration Using DHCP/BOOTP Setting the Switch’s IP Address (IP Version 6) Configuring an IPv6 Address Configuring an IPv6 General Network Prefix Configuring the Neighbor Detection Protocol and Static Entries Chapter 6: Managing System Files Managing Firmware Downloading System Software from a Server...
  • Page 7 Configuring the SSH Server Filtering IP Addresses for Management Access Chapter 13: Configuring Port Security Chapter 14: Configuring 802.1X Port Authentication Displaying 802.1X Global Settings Configuring 802.1X Global Settings Configuring Port Settings for 802.1X Displaying 802.1X Statistics Chapter 15: Access Control Lists Overview Setting an ACL Name and Type Configuring a Standard IPv4 ACL...
  • Page 8 Contents Configuring Global Settings Displaying Interface Settings Configuring Interface Settings Configuring Multiple Spanning Trees Displaying Interface Settings for MSTP Configuring Interface Settings for MSTP Chapter 23: VLAN Configuration Assigning Ports to VLANs Enabling or Disabling GVRP (Global Setting) Displaying Basic VLAN Information Displaying Current VLANs Creating VLANs Adding Static Members to VLANs (VLAN Index)
  • Page 9 Chapter 28: Multicast Filtering Layer 2 IGMP (Snooping and Query) Configuring IGMP Snooping and Query Parameters Displaying Interfaces Attached to a Multicast Router Specifying Static Interfaces for a Multicast Router Displaying Port Members of Multicast Services Assigning Ports to Multicast Services Chapter 29: Configuring Domain Name Service Configuring General DNS Service Parameters Configuring Static DNS Host to Address Entries...
  • Page 10 Contents exit quit Chapter 34: System Management Commands hostname reload switch renumber jumbo frame show startup-config show running-config show system show users show version Chapter 35: File Management Commands copy delete whichboot boot system Chapter 36: Line Commands line login password timeout login response exec-timeout...
  • Page 11 Chapter 38: SMTP Alert Commands logging sendmail host logging sendmail level logging sendmail source-email logging sendmail destination-email logging sendmail show logging sendmail Chapter 39: Time Commands sntp client sntp server sntp poll show sntp clock timezone calendar set show calendar Chapter 40: SNMP Commands snmp-server show snmp...
  • Page 12 Contents radius-server timeout show radius-server TACACS+ Client tacacs-server host tacacs-server port tacacs-server key show tacacs-server Web Server Commands ip http port ip http server ip http secure-server ip http secure-port Telnet Server Commands ip telnet server Secure Shell Commands ip ssh server ip ssh timeout ip ssh authentication-retries ip ssh server-key size...
  • Page 13 Chapter 44: Access Control List Commands IPv4 ACLs access-list ip permit, deny (Standard IPv4 ACL) permit, deny (Extended IPv4 ACL) show ip access-list ip access-group show ip access-group IPv6 ACLs access-list ipv6 permit, deny (Standard IPv6 ACL) permit, deny (Extended IPv6 ACL) show ipv6 access-list ipv6 access-group show ipv6 access-group...
  • Page 14 Contents lacp port-priority show lacp show port-channel load-balance Chapter 47: Broadcast Storm Control Commands switchport broadcast packet-rate Chapter 48: Mirror Port Commands port monitor show port monitor Chapter 49: Rate Limit Commands rate-limit Chapter 50: Address Table Commands mac-address-table static clear mac-address-table dynamic show mac-address-table mac-address-table aging-time...
  • Page 15 Chapter 52: VLAN Commands GVRP and Bridge Extension Commands bridge-ext gvrp show bridge-ext switchport gvrp show gvrp configuration garp timer show garp timer Editing VLAN Groups vlan database vlan Configuring VLAN Interfaces interface vlan switchport mode switchport acceptable-frame-types switchport ingress-filtering switchport native vlan switchport allowed vlan switchport forbidden vlan...
  • Page 16 Contents Priority Commands (Layer 3 and 4) map ip port (Global Configuration) map ip port (Interface Configuration) map ip precedence (Global Configuration) map ip precedence (Interface Configuration) map ip dscp (Global Configuration) map ip dscp (Interface Configuration) show map ip port show map ip precedence show map ip dscp Chapter 56: Quality of Service Commands...
  • Page 17 ip domain-lookup show hosts show dns show dns cache clear dns cache Chapter 59: IPv4 Interface Commands ip address ip default-gateway ip dhcp restart show ip interface show ip redirects ping Chapter 60: IPv6 Interface Commands ipv6 enable ipv6 general-prefix show ipv6 general-prefix ipv6 address ipv6 address autoconfig...
  • Page 18 Contents Section IV: Appendices Appendix A: Software Specifications Software Features Management Features Standards Management Information Bases Appendix B: Troubleshooting Problems Accessing the Management Interface Using System Logs Glossary Index xviii...
  • Page 19 Tables Table 1-1 Key Features Table 1-2 System Defaults Table 3-1 Web Page Configuration Buttons Table 3-2 Switch Main Menu Table 9-1 Logging Levels Table 11-1 SNMPv3 Security Models and Levels Table 11-2 Supported Notification Messages Table 12-1 HTTPS System Support Table 14-1 802.1X Statistics Table 16-1...
  • Page 20 Tables Table 41-5 RADIUS Client Commands Table 41-6 TACACS+ Client Commands Table 41-7 Web Server Commands Table 41-8 HTTPS System Support Table 41-9 Telnet Server Commands Table 41-10 Secure Shell Commands Table 41-11 show ssh - display description Table 41-12 IP Filter Commands Table 42-1 Port Security Commands...
  • Page 21 Table 57-4 Static Multicast Routing Commands Table 58-1 DNS Commands Table 58-2 show dns cache - display description Table 59-1 IPv4 Configuration Commands Table 60-1 IPv6 Configuration Commands Table 60-2 show ipv6 interface - display description Table 60-3 show ipv6 mtu - display description Table 60-4 show ipv6 traffic - display description Table 60-5...
  • Page 22 Tables xxii...
  • Page 23 Figures Figure 3-1 Home Page Figure 3-2 Front Panel Indicators Figure 4-1 System Information Figure 4-2 Switch Information Figure 4-3 Displaying Bridge Extension Configuration Figure 4-4 Configuring Support for Jumbo Frames Figure 4-5 Renumbering the Stack Figure 4-6 Resetting the System Figure 5-1 IPv4 Interface Configuration - Manual Figure 5-2...
  • Page 24 Figures Figure 12-7 IP Filter Figure 13-1 Port Security Figure 14-1 802.1X Global Information Figure 14-2 802.1X Global Configuration Figure 14-3 802.1X Port Configuration Figure 14-4 802.1X Port Statistics Figure 15-1 Selecting ACL Type Figure 15-2 ACL Configuration - Standard IPv4 Figure 15-3 ACL Configuration - Extended IPv4 Figure 15-4...
  • Page 25 Figure 24-1 Private VLAN Status Figure 24-2 Private VLAN Link Status Figure 25-1 Protocol VLAN Configuration Figure 25-2 Protocol VLAN Port Configuration Figure 26-1 Default Port Priority Figure 26-2 Traffic Classes Figure 26-3 Queue Mode Figure 26-4 Queue Scheduling Figure 26-5 IP Precedence/DSCP Priority Status Figure 26-6 IP Precedence Priority...
  • Page 26 Figures xxvi...
  • Page 27: Section I: Getting Started

    Section I: Getting Started This section provides an overview of the switch, and introduces some basic concepts about network switches. It also describes the basic settings required to access the management interface. Introduction ..........1-1 Initial Configuration .
  • Page 28 Getting Started...
  • Page 29: Chapter 1: Introduction

    Chapter 1: Introduction This switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to configure the features listed in this manual. The default configuration can be used for most of the features provided by this switch.
  • Page 30: Description Of Software Features

    Introduction Feature Description Traffic Prioritization Default port priority, traffic class map, queue scheduling, IP Precedence, or Differentiated Services Code Point (DSCP), and TCP/UDP Port Qualify of Service Supports Differentiated Services (DiffServ) Multicast Filtering Supports IGMP snooping and query Switch Clustering Supports up to 36 member switches in a cluster Description of Software Features The switch provides a wide range of advanced performance enhancing features.
  • Page 31 Description of Software Features Port Configuration – You can manually configure the speed and duplex mode, and flow control used on specific ports, or use auto-negotiation to detect the connection settings used by the attached device. Use the full-duplex mode on ports whenever possible to double the throughput of switch connections.
  • Page 32 Introduction Spanning Tree Algorithm – The switch supports these spanning tree protocols: Spanning Tree Protocol (STP, IEEE 802.1D) – This protocol provides loop detection. When there are multiple physical paths between segments, this protocol will choose a single path and disable all others to ensure that only one route exists between any two stations on the network.
  • Page 33 Description of Software Features Traffic Prioritization – This switch prioritizes each packet based on the required level of service, using eight priority queues with strict or Weighted Round Robin Queuing. It uses IEEE 802.1p and 802.1Q tags to prioritize incoming traffic based on input from the end-station application.
  • Page 34: System Defaults

    Introduction System Defaults The switch’s system defaults are provided in the configuration file “Factory_Default_Config.cfg.” To reset the switch defaults, this file should be set as the startup configuration file (page 6-5). The following table lists some of the basic system defaults. Function Parameter Console Port...
  • Page 35 Table 1-2 System Defaults (Continued) Function Parameter SNMP SNMP Agent Community Strings Traps SNMP V3 Port Configuration Admin Status Auto-negotiation Flow Control Rate Limiting Input and output limits Port Trunking Static Trunks LACP (all ports) Broadcast Storm Status Protection Broadcast Limit Rate Spanning Tree Status Algorithm...
  • Page 36 Introduction Table 1-2 System Defaults (Continued) Function Parameter Traffic Prioritization Ingress Port Priority Queue Mode Weighted Round Robin IP Precedence Priority IP DSCP Priority IP Port Priority IP Settings Management. VLAN Router Redundancy IP Address Multicast Filtering Subnet Mask Default Gateway DHCP BOOTP IGMP Snooping...
  • Page 37: Chapter 2: Initial Configuration

    Chapter 2: Initial Configuration Connecting to the Switch Configuration Options The switch includes a built-in network management agent. The agent offers a variety of management options, including SNMP, RMON and a web-based interface. A PC may also be connected directly to the switch for configuration and monitoring via a command line interface (CLI).
  • Page 38: Required Connections

    Initial Configuration • Configure up to 32 static or LACP trunks per switch • Enable port mirroring • Set broadcast storm control on any port • Display system information and statistics Required Connections The switch provides an RS-232 serial port that enables a connection to a PC or terminal for monitoring and configuring the switch.
  • Page 39: Basic Configuration

    Note: This switch supports four concurrent Telnet/SSH sessions. After configuring the switch’s IP parameters, you can access the onboard configuration program from anywhere within the attached network. The onboard configuration program can be accessed using Telnet from any computer attached to the network.
  • Page 40: Setting An Ip Address

    Initial Configuration Type “username guest password 0 password,” for the Normal Exec level, where password is your new password. Press <Enter>. Type “username admin password 0 password,” for the Privileged Exec level, where password is your new password. Press <Enter>. Username: admin Password: CLI session with the 24/48 L2/L4 GE Switch is opened.
  • Page 41 Type “exit” to return to the global configuration mode prompt. Press <Enter>. To set the IP address of the default gateway for the network to which the switch belongs, type “ip default-gateway gateway,” where “gateway” is the IP address of the default gateway. Press <Enter>. Console(config)#interface vlan 1 Console(config-if)#ip address 192.168.1.5 255.255.255.0 Console(config-if)#exit...
  • Page 42 Initial Configuration To configure an IPv6 link local address for the switch, complete the following steps: From the Global Configuration mode prompt, type “interface vlan 1” to access the interface-configuration mode. Press <Enter>. Type “ipv6 address” followed by up to 8 colon-separated 16-bit hexadecimal values for the ipv6-address similar to that shown in the example, followed by the “link-local”...
  • Page 43 To generate an IPv6 global unicast address for the switch using a general network prefix, complete the following steps: From the Global Configuration mode prompt, type “ipv6 general prefix prefix-name ipv6-prefix/prefix-length,” where the “prefix-name” is a label identifying the network segment, “ipv6-prefix” specifies the high-order bits of the network address, and “prefix length”...
  • Page 44: Dynamic Configuration

    Initial Configuration Dynamic Configuration Obtaining an IPv4 Address If you select the “bootp” or “dhcp” option, IP will be enabled but will not function until a BOOTP or DHCP reply has been received. You therefore need to use the “ip dhcp restart”...
  • Page 45 Obtaining an IPv6 Address Link Local Address — There are several ways to dynamically configure IPv6 addresses. The simplest method is to automatically generate a “link local” address (identified by an address prefix of FE80). This address type makes the switch accessible over IPv6 for all devices attached to the same local subnet.
  • Page 46: Enabling Snmp Management Access

    Initial Configuration From the interface prompt, type “ipv6 address autoconfig” and press <Enter>. Console(config)#interface vlan 1 Console(config-if)#ipv6 address autoconfig Console(config-if)#end Console#show ipv6 interface Vlan 1 is up IPv6 is enable. Link-local address: FE80::212:CFFF:FE0B:4600/64 Global unicast address(es): 2005::212:CFFF:FE0B:4600, subnet is 2005:0:0:0::/64 3FFE:501:FFFF:100:212:CFFF:FE0B:4600, subnet is 3FFE:501:FFFF:100::/64 Joined group address(es):...
  • Page 47: Trap Receivers

    The default strings are: • public - with read-only access. Authorized management stations are only able to retrieve MIB objects. • private - with read-write access. Authorized management stations are able to both retrieve and modify MIB objects. To prevent unauthorized access to the switch from SNMP version 1 or 2c clients, it is recommended that you change the default community strings.
  • Page 48: Configuring Access For Snmp Version 3 Clients

    Initial Configuration Configuring Access for SNMP Version 3 Clients To configure management access for SNMPv3 clients, you need to first create a view that defines the portions of MIB that the client can read or write, assign the view to a group, and then assign the user to a group. The following example creates one view called “mib-2”...
  • Page 49: Saving Configuration Settings

    Due to the size limit of the flash memory, the switch supports only two operation code files. However, you can have as many diagnostic code files and configuration files as available flash memory space allows. The switch has a total of 32 Mbytes of flash memory for system files.
  • Page 50 Initial Configuration 2-14...
  • Page 51: Section Ii: Switch Management

    Section II: Switch Management This section describes the basic switch features, along with a detailed description of how to configure each feature via a web browser, and a brief example for the Command Line Interface. Configuring the Switch ......... 3-1 Basic System Settings .
  • Page 52 Switch Management Configuring Domain Name Service .......29-1 Switch Clustering ..........30-1...
  • Page 53: Chapter 3: Configuring The Switch

    Chapter 3: Configuring the Switch Using the Web Interface This switch provides an embedded HTTP web agent. Using a web browser you can configure the switch and view statistics to monitor network activity. The web agent can be accessed by any computer on the network using a standard web browser (Internet Explorer 5.0 or above, or Netscape 6.2 or above).
  • Page 54: Navigating The Web Browser Interface

    Configuring the Switch Navigating the Web Browser Interface To access the web-browser interface you must first enter a user name and password. The administrator has Read/Write access to all configuration parameters and statistics. The default user name and password “admin” is used for the administrator.
  • Page 55: Configuration Options

    Configuration Options Configurable parameters have a dialog box or a drop-down list. Once a configuration change has been made on a page, be sure to click on the Apply button to confirm the new setting. The following table summarizes the web page configuration buttons.
  • Page 56: Switch Main Menu

    Configuring the Switch Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, or monitor network conditions. The following table briefly describes the selections available from this program. Menu System System Information Switch Information...
  • Page 57 Table 3-2 Switch Main Menu (Continued) Menu SNMP Configuration Agent Status SNMPv3 Engine ID Remote Engine ID Users Remote Users Groups Views Security User Accounts Authentication Settings HTTPS Settings Settings Host-Key Settings Port Security 802.1X Information Configuration Port Configuration Statistics Configuration Port Binding IP Filter...
  • Page 58 Configuring the Switch Table 3-2 Switch Main Menu (Continued) Menu Trunk Membership LACP Configuration Aggregation Port Port Counters Information Port Internal Information Port Neighbors Information Displays settings and operational state for the remote side Port Broadcast Control Trunk Broadcast Control Mirror Port Configuration Rate Limit Input Port Configuration...
  • Page 59 Table 3-2 Switch Main Menu (Continued) Menu Port Configuration Trunk Configuration VLAN 802.1Q VLAN GVRP Status 802.1Q Tunnel Status Basic Information Current Table Static List Static Table Static Membership by Port Configures membership type for interfaces, including tagged, Port Configuration Trunk Configuration Tunnel Configuration Tunnel Trunk Configuration Adds trunks to a QinQ tunnel...
  • Page 60 Configuring the Switch Table 3-2 Switch Main Menu (Continued) Menu IP DSCP Priority IP Port Priority Status IP Port Priority DiffServ Class Map Policy Map Service Policy IGMP Snooping IGMP Configuration Multicast Router Port Information Static Multicast Router Port Configuration IP Multicast Registration Table IGMP Member Port Table...
  • Page 61: Chapter 4: Basic System Settings

    Chapter 4: Basic System Settings This chapter describes the basic functions required to set up management access to the switch, display or upgrade operating software, or reset the system. Displaying System Information You can easily identify the system by displaying the device name, location and contact information.
  • Page 62 Basic System Settings Web – Click System, System Information. Specify the system name, location, and contact information for the system administrator, then click Apply. (This page also includes a Telnet button that allows access to the Command Line Interface via Telnet.) Figure 4-1 System Information...
  • Page 63: Displaying Switch Hardware/Software Versions

    CLI – Specify the hostname, location and contact information. Console(config)#hostname R&D 5 Console(config)#snmp-server location WC 9 Console(config)#snmp-server contact Ted Console(config)#exit Console#show system 34-7 System Description: 24/48 L2/L4 IPV4/IPV6 GE Switch System OID String: 1.3.6.1.4.1.259.6.10.95 System Information System Up Time: System Name: System Location: System Contact: MAC Address (Unit1):...
  • Page 64 Basic System Settings • Boot-ROM Version – Version of Power-On Self-Test (POST) and boot code. • Operation Code Version – Version number of runtime code. • Role – Shows that this switch is operating as Master or Slave. These additional parameters are displayed for the CLI. •...
  • Page 65: Displaying Bridge Extension Capabilities

    Displaying Bridge Extension Capabilities The Bridge MIB includes extensions for managed devices that support Multicast Filtering, Traffic Classes, and Virtual LANs. You can access these extensions to display default settings for the key variables. Field Attributes • Extended Multicast Filtering Services – This switch does not support the filtering of individual multicast addresses based on GMRP (GARP Multicast Registration Protocol).
  • Page 66: Configuring Support For Jumbo Frames

    Basic System Settings CLI – Enter the following command. Console#show bridge-ext Max support VLAN numbers: Max support VLAN ID: Extended multicast filtering services: No Static entry individual port: VLAN learning: Configurable PVID tagging: Local VLAN capable: Traffic classes: Global GVRP status: GMRP: Console# Configuring Support for Jumbo Frames...
  • Page 67: Renumbering The Stack

    Renumbering the Stack If the units are no longer numbered sequentially after several topology changes or failures, you can reset the unit numbers using the “Renumbering” command. Just remember to save the new configuration settings to a startup configuration file prior to powering off the stack Master.
  • Page 68 Basic System Settings...
  • Page 69: Setting The Switch's Ip Address (Ip Version 4)

    Chapter 5: Setting an IP Address This chapter describes how to configure an IPv4 interface for management access over the network. This switch supports both IPv4 and IPv6, and can be managed through either of these address types. For information on configuring the switch with an IPv6 address, see “Setting the Switch’s IP Address (IP Version 6)”...
  • Page 70: Manual Configuration

    Setting an IP Address Manual Configuration Web – Click System, IP Configuration. Select the VLAN through which the management station is attached, set the IP Address Mode to “Static,” Enter the IP address, subnet mask and gateway, then click Apply. Figure 5-1 IPv4 Interface Configuration - Manual CLI –...
  • Page 71: Using Dhcp/Bootp

    Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the switch to be dynamically configured by these services. Web – Click System, IP Configuration. Specify the VLAN to which the management station is attached, set the IP Address Mode to DHCP or BOOTP. Click Apply to save your changes.
  • Page 72: Setting The Switch's Ip Address (Ip Version 6)

    Setting an IP Address Web – If the address assigned by DHCP is no longer functioning, you will not be able to renew the IP settings via the web interface. You can only restart DHCP service via the web interface if the current address is still available. CLI –...
  • Page 73 length, and using the EUI-64 form of the interface identifier to automatically create the low-order 64 bits in the host portion of the address. - You can also manually configure the global unicast address by entering the full address and prefix length. - Or you can include a general prefix for the network portion of the address (as described under “Configuring an IPv6 General Network Prefix”...
  • Page 74 Setting an IP Address IP Address • Auto Configuration – Enables stateless autoconfiguration of IPv6 addresses on an interface and enables IPv6 functionality on the interface. The network portion of the address is based on prefixes received in IPv6 router advertisement messages, and the host portion is automatically generated using the modified EUI-64 form of the interface identifier (i.e., the switch’s MAC address).
  • Page 75 length of the general prefix takes precedence, and some of the address bits entered in the IPv6 Address field will be ignored. • Address Type – Defines the address type configured for this interface. • Link Local – Configures an IPv6 link-local address. - The address prefix must be FE80.
  • Page 76 Setting an IP Address Current Address Table • IPv6 Address – IPv6 address assigned to this interface. In addition to the unicast addresses assigned to an interface, a node is required to join the all-nodes multicast addresses FF01::1 and FF02::1 for all IPv6 nodes within scope 1 (interface-local) and scope 2 (link-local), respectively.
  • Page 77 Setting the Switch’s IP Address (IP Version 6) Web – Click System, IPv6 Configuration, IPv6 Configuration. Set the IPv6 default gateway, specify the VLAN to configure, enable IPv6, and set the MTU. Then enter a global unicast or link-local address and click Add IPv6 Address. Figure 5-3 IPv6 Interface Configuration...
  • Page 78: Configuring An Ipv6 General Network Prefix

    Setting an IP Address CLI – This example configures an IPv6 gateway, specifies the management interface, configures a global unicast address, and then sets the MTU. Console#config Console(config)ipv6 default-gateway 2009:DB9:2229::240 Console(config)#interface vlan 1 Console(config-if)#ipv6 address rd 7279::79/64 Console(config-if)#ipv6 mtu 1280 Console(config-if)#end Console#show ipv6 default-gateway ipv6 default gateway:...
  • Page 79: Configuring The Neighbor Detection Protocol And Static Entries

    Web – Click System, IPv6 Configuration, IPv6 General Prefix. Click Add to open the editing fields for a prefix entry. Enter a name for the general prefix, the value for the general prefix, and the prefix length. Then click Add to enable the entry. Figure 5-4 IPv6 General Prefix Configuration CLI –...
  • Page 80 Setting an IP Address - Configuring a value of 0 disables duplicate address detection. - Duplicate address detection determines if a new unicast IPv6 address already exists on the network before it is assigned to an interface. - Duplicate address detection is stopped on any interface that has been suspended (see “Creating VLANs”...
  • Page 81 - PROBE - A reachability confirmation is actively sought by resending neighbor solicitation messages every RetransTimer interval until confirmation of reachability is received. - ???? - Unknown state. The following states are used for static entries: - INCMP (Incomplete) -The interface for this entry is down. - REACH (Reachable) - The interface for this entry is up.
  • Page 82 Setting an IP Address Web – Click System, IPv6 Configuration, IPv6 ND Neighbor. To configure the Neighbor Detection protocol settings, select a VLAN interface, set the number of attempts allowed for duplicate address detection, set the interval for neighbor solicitation messages, and click Apply. To configure static neighbor entries, click Add, fill in the IPv6 address, VLAN interface and hardware address.
  • Page 83: Managing Firmware

    Chapter 6: Managing System Files This chapter describes how to upgrade the switch operating software, save and restore switch configuration files, and set the system start-up files. Managing Firmware You can upload/download firmware to or from a TFTP server. By saving runtime code to a file on a TFTP server, that file can later be downloaded to the switch to restore operation.
  • Page 84: Downloading System Software From A Server

    Managing System Files Downloading System Software from a Server When downloading runtime code, you can specify the destination file name to replace the current image, or first download the file using a different name from the current runtime code file, and then set the new file as the startup file. Web –...
  • Page 85 To delete a file select System, File Management, Delete. Select the file name from the given list by checking the tick box and click Apply. Note that the file currently designated as the startup code cannot be deleted. CLI – To download new firmware form a TFTP server, enter the IP address of the TFTP server, select “config”...
  • Page 86: Saving Or Restoring Configuration Settings

    Managing System Files Saving or Restoring Configuration Settings You can upload/download configuration settings to/from a TFTP server. The configuration file can be later downloaded to restore the switch’s settings. Command Attributes • File Transfer Method – The configuration copy operation includes these options: - file to file –...
  • Page 87: Downloading Configuration Settings From A Server

    Saving or Restoring Configuration Settings Downloading Configuration Settings from a Server You can download the configuration file under a new file name and then set it as the startup file, or you can specify the current startup configuration file as the destination file to directly replace it.
  • Page 88 Managing System Files CLI – Enter the IP address of the TFTP server, specify the source file on the server, set the startup file name on the switch, and then restart the switch. Console#copy tftp startup-config TFTP server ip address: 192.168.1.19 Source configuration file name: config-1 Startup configuration file name [] : startup \Write to FLASH Programming.
  • Page 89: Chapter 7: Console Port Settings

    Chapter 7: Console Port Settings You can access the onboard configuration program by attaching a VT100 compatible device to the switch’s serial console port. Management access through the console port is controlled by various parameters, including a password, timeouts, and basic communication settings. These parameters can be configured via the web or CLI interface.
  • Page 90 Console Port Settings Web – Click System, Line, Console. Specify the console port connection parameters as required, then click Apply. Figure 7-1 Configuring the Console Port CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the current console port settings, use the show line command from the Normal Exec level.
  • Page 91: Chapter 8: Telnet Settings

    Chapter 8: Telnet Settings You can access the onboard configuration program over the network using Telnet (i.e., a virtual terminal). Management access via Telnet can be enabled/disabled and other various parameters set, including the TCP port number, timeouts, and a password.
  • Page 92 Telnet Settings Figure 8-1 Configuring the Telnet Interface CLI – Enter Line Configuration mode for a virtual terminal, then specify the connection parameters as required. To display the current virtual terminal settings, use the show line command from the Normal Exec level. Console(config)#line vty Console(config-line)#login local Console(config-line)#password 0 secret...
  • Page 93: System Log Configuration

    Chapter 9: Configuring Event Logging The switch allows you to control the logging of error messages, including the type of events that are recorded in switch memory, logging to a remote System Log (syslog) server, and displays a list of recent event messages. System Log Configuration The system allows you to enable or disable event logging, and specify which levels are logged to RAM or flash memory.
  • Page 94: Remote Log Configuration

    Configuring Event Logging Web – Click System, Logs, System Logs. Specify System Log Status, set the level of event messages to be logged to RAM and flash memory, then click Apply. CLI – Enable system logging and then specify the level of messages to be logged to RAM and flash memory.
  • Page 95: Logging Trap

    • Host IP Address – Specifies a new server IP address to add to the Host IP List. Web – Click System, Logs, Remote Logs. To add an IP address to the Host IP List, type the new IP address in the Host IP Address box, and then click Add. To delete an IP address, click the entry in the Host IP List, and then click Remove.
  • Page 96: Sending Simple Mail Transfer Protocol Alerts

    Configuring Event Logging Displaying Log Messages Use the Logs page to scroll through the logged system and event messages. The switch can store up to 2048 log entries in temporary random access memory (RAM; i.e., memory flushed on power reset) and up to 4096 entries in permanent flash memory.
  • Page 97 • SMTP Server List – Specifies a list of up to three recipient SMTP servers. The switch attempts to connect to the other listed servers if the first fails. Use the New SMTP Server text field and the Add/Remove buttons to configure the list. •...
  • Page 98 Configuring Event Logging CLI – Enter the IP address of at least one SMTP server, set the syslog severity level to trigger an email message, and specify the switch (source) and up to five recipient (destination) email addresses. Enable SMTP with the logging sendmail command to complete the configuration.
  • Page 99: Configuring Sntp

    Chapter 10: Setting the System Clock Simple Network Time Protocol (SNTP) allows the switch to set its internal clock based on periodic updates from a time server (SNTP or NTP). Maintaining an accurate time on the switch enables the system log to record meaningful dates and times for event entries.
  • Page 100: Setting The Time Zone

    Setting the System Clock CLI – This example configures the switch to operate as an SNTP client and then displays the current time and settings. Console(config)#sntp client Console(config)#sntp poll 16 Console(config)#sntp server 10.1.0.19 137.82.140.80 128.250.36.2 Console(config)#exit Console#show sntp Current time: 6 14:56:05 2004 Poll interval: 60 Current...
  • Page 101: Snmp Overview

    Chapter 11: Simple Network Management Protocol This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the switch. SNMP Overview SNMP is a communication protocol designed specifically for managing devices on a network. Equipment commonly managed with SNMP includes switches, routers and host computers.
  • Page 102: Enabling The Snmp Agent

    Simple Network Management Protocol security models v1 and v2c. The following table shows the security models and levels available and the system default settings. Table 11-1 SNMPv3 Security Models and Levels Model Level Group noAuthNoPriv public (read only) noAuthNoPriv private (read/write) noAuthNoPriv user defined user defined user defined user defined Community string only noAuthNoPriv public...
  • Page 103: Setting Community Access Strings

    CLI – The following example enables SNMP on the switch. Console(config)#snmp-server Console(config)# Setting Community Access Strings You may configure up to five community strings authorized for management access by clients using SNMP v1 and v2c. All community strings used for IP Trap Managers should be listed in this table.
  • Page 104: Specifying Trap Managers And Trap Types

    Simple Network Management Protocol Specifying Trap Managers and Trap Types Traps indicating status changes are issued by the switch to specified trap managers. You must specify trap managers so that key events are reported by this switch to your management station (using network management platforms such as HP OpenView).
  • Page 105 Version 1 or 2c clients), or define a corresponding “User Name” in the SNMPv3 Users page (for Version 3 clients). (Range: 1-32 characters, case sensitive) • Trap UDP Port – Specifies the UDP port number used by the trap manager. •...
  • Page 106: Configuring Snmpv3 Management Access

    Simple Network Management Protocol Web – Click SNMP, Configuration. Enter the IP address and community string for each management station that will receive trap messages, specify the UDP port, SNMP trap version, trap security level (for v3 clients), trap inform settings (for v2c/v3 clients), and then click Add.
  • Page 107: Specifying A Remote Engine Id

    Setting a Local Engine ID An SNMPv3 engine is an independent SNMP agent that resides on the switch. This engine protects against message replay, delay, and redirection. The engine ID is also used in combination with user passwords to generate the security keys for authenticating and encrypting SNMPv3 packets.
  • Page 108: Configuring Snmpv3 Users

    Simple Network Management Protocol The engine ID can be specified by entering 1 to 26 hexadecimal characters. If less than 26 characters are specified, trailing zeroes are added to the value. For example, the value “1234” is equivalent to “1234” followed by 22 zeroes. Web –...
  • Page 109 Configuring SNMPv3 Management Access • Authentication Password – A minimum of eight plain text characters is required. • Privacy Protocol – The encryption algorithm use for data privacy; only 56-bit DES is currently available. • Privacy Password – A minimum of eight plain text characters is required. •...
  • Page 110: Configuring Remote Snmpv3 Users

    Simple Network Management Protocol CLI – Use the snmp-server user command to configure a new user name and assign it to a group. Console(config)#snmp-server user chris group r&d v3 auth md5 greenpeace priv des56 einstien Console(config)#exit Console#show snmp user EngineId: 80000034030001f488f5200000 User Name: chris Authentication Protocol: md5 Privacy Protocol: des56...
  • Page 111 Configuring SNMPv3 Management Access • Privacy Protocol – The encryption algorithm use for data privacy; only 56-bit DES is currently available. • Privacy Password – A minimum of eight plain text characters is required. Web – Click SNMP, SNMPv3, Remote Users. Click New to configure a user name. In the New User page, define a name and assign it to a group, then click Add to save the configuration and return to the User Name list.
  • Page 112: Configuring Snmpv3 Groups

    Simple Network Management Protocol CLI – Use the snmp-server user command to configure a new user name and assign it to a group. Console(config)#snmp-server user mark group r&d remote 192.168.1.19 v3 auth md5 greenpeace priv des56 einstien Console(config)#exit Console#show snmp user No user exist.
  • Page 113: Supported Notification Messages

    Table 11-2 Supported Notification Messages Object Label Object ID RFC 1493 Traps newRoot 1.3.6.1.2.1.17.0.1 topologyChange 1.3.6.1.2.1.17.0.2 SNMPv2 Traps coldStart 1.3.6.1.6.3.1.1.5.1 warmStart 1.3.6.1.6.3.1.1.5.2 1.3.6.1.6.3.1.1.5.3 linkDown 1.3.6.1.6.3.1.1.5.4 linkUp 1.3.6.1.6.3.1.1.5.5 authenticationFailure RMON Events (V2) risingAlarm 1.3.6.1.2.1.16.0.1 fallingAlarm 1.3.6.1.2.1.16.0.2 Configuring SNMPv3 Management Access Description The newRoot trap indicates that the sending agent has become the new root of the Spanning Tree;...
  • Page 114 Simple Network Management Protocol Table 11-2 Supported Notification Messages (Continued) Object Label Object ID Private Traps - swPowerStatus 1.3.6.1.4.1.259.6.10.95.2.1.0.1 ChangeTrap swFanFailureTrap 1.3.6.1.4.1.259.6.10.95.2.1.0.17 This trap is sent when the fan fails. swFanRecoverTrap 1.3.6.1.4.1.259.6.10.95.2.1.0.18 This trap is sent when the fan failure has swPortSecurityTrap 1.3.6.1.4.1.259.6.10.95.2.1.0.36 This trap is sent when a port is intruded.
  • Page 115 Web – Click SNMP, SNMPv3, Groups. Click New to configure a new group. In the New Group page, define a name, assign a security model and level, and then select read, write, and notify views. Click Add to save the new group and return to the Groups list.
  • Page 116: Setting Snmpv3 Views

    Simple Network Management Protocol Setting SNMPv3 Views SNMPv3 views are used to restrict user access to specified portions of the MIB tree. The predefined view “defaultview” includes access to the entire MIB tree. Command Attributes • View Name – The name of the SNMP view. (Range: 1-64 characters) •...
  • Page 117: Table

    CLI – Use the snmp-server view command to configure a new view. This example view includes the MIB-2 interfaces table, and the wildcard mask selects all index entries. Console(config)#snmp-server view ifEntry.a 1.3.6.1.2.1.2.2.1.1.* included Console(config)#exit Console#show snmp view View Name: ifEntry.a Subtree OID: 1.3.6.1.2.1.2.2.1.1.* View Type: included Storage Type: nonvolatile...
  • Page 118 Simple Network Management Protocol 11-18...
  • Page 119: Configuring User Accounts

    Chapter 12: User Authentication This chapter describes how to configure the switch to authenticate users logging into the system for management access using local or remote authentication methods. The switch provides secure network management access using the following options: • User Accounts – Manually configure management access rights for users. •...
  • Page 120: Configuring Local/Remote Logon Authentication

    User Authentication Web – Click Security, User Accounts. To configure a new user account, enter the user name, access level, and password, then click Add. To change the password for a specific user, enter the user name and new password, confirm the password by entering it again, then click Apply.
  • Page 121 Telnet RADIUS/ TACACS+ server RADIUS uses UDP while TACACS+ uses TCP. UDP only offers best effort delivery, while TCP offers a connection-oriented transport. Also, note that RADIUS encrypts only the password in the access-request packet from the client to the server, while TACACS+ encrypts the entire body of the packet.
  • Page 122 User Authentication - ServerIndex – Specifies one of five RADIUS servers that may be configured. The switch attempts authentication using the listed sequence of servers. The process ends when a server either approves or denies access to a user. - Server IP Address – Address of authentication server. (Default: 10.1.0.1) - Server Port Number –...
  • Page 123: Configuring Https

    CLI – Specify all the required parameters to enable logon authentication. Console(config)#authentication login radius Console(config)#radius-server port 181 Console(config)#radius-server key green Console(config)#radius-server retransmit 5 Console(config)#radius-server timeout 10 Console(config)#radius-server 1 host 192.168.1.25 Console(config)#exit Console#show radius-server Remote RADIUS server configuration: Global settings: Communication key with RADIUS server: ***** Server port number: Retransmit times: Request timeout:...
  • Page 124: Https System Support

    User Authentication - The client and server generate session keys for encrypting and decrypting data. • The client and server establish a secure encrypted connection. A padlock icon should appear in the status bar for Internet Explorer 5.x or above and Netscape 6.2 or above.
  • Page 125 obtain a unique certificate and a private key and password from a recognized certification authority. Note: For maximum security, we recommend you obtain a unique Secure Sockets Layer certificate at the earliest opportunity. This is because the default certificate for the switch is not unique to the hardware you have purchased.
  • Page 126: Configuring The Secure Shell

    User Authentication Configuring the Secure Shell The Berkley-standard includes remote access tools originally designed for Unix systems. Some of these tools have also been implemented for Microsoft Windows and other environments. These tools, including commands such as rlogin (remote login), rsh (remote shell), and rcp (remote copy), are not secure from hostile attacks. The Secure Shell (SSH) includes server/client applications intended as a secure replacement for the older Berkley remote access tools.
  • Page 127 client’s granted management access to the switch. (Note that these clients must be configured locally on the switch via the User Accounts page as described on page 12-1.) The clients are subsequently authenticated using these keys. The current firmware only accepts public key files based on standard UNIX format as shown in the following example for an RSA key: 1024 35 1341081685609893921040944920155425347631641921872958921143173880 055536161631051775940838686311092912322268285192543746031009371877211996...
  • Page 128: Generating The Host Key Pair

    User Authentication Authenticating SSH v2 Clients a.The client first queries the switch to determine if DSA public key authentication using a preferred algorithm is acceptable. b.If the specified algorithm is supported by the switch, it notifies the client to proceed with the authentication process. Otherwise, it rejects the request. c.The client sends a signature generated using the private key to the switch.
  • Page 129 Web – Click Security, SSH, Host-Key Settings. Select the host-key type from the drop-down box, select the option to save the host key from memory to flash (if required) prior to generating the key, and then click Generate. CLI – This example generates a host-key pair using both the RSA and DSA algorithms, stores the keys to flash memory, and then displays the host’s public keys.
  • Page 130: Configuring The Ssh Server

    User Authentication Configuring the SSH Server The SSH server includes basic settings for authentication. Field Attributes • SSH Server Status – Allows you to enable/disable the SSH server on the switch. (Default: Disabled) • Version – The Secure Shell version number. Version 2.0 is displayed, but the switch supports management access via either SSH Version 1.5 or 2.0 clients.
  • Page 131: Filtering Ip Addresses For Management Access

    CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that the administrator has made a connection via SHH, and then disables this connection. Console(config)#ip ssh server Console(config)#ip ssh timeout 100 Console(config)#ip ssh authentication-retries 5 Console(config)#ip ssh server-key size 512 Console(config)#end Console#show ip ssh...
  • Page 132 User Authentication • End IP Address – The end address of a range. Web – Click Security, IP Filter. Enter the IP addresses or range of addresses that are allowed management access to an interface, and click Add IP Filtering Entry. CLI –...
  • Page 133: Table

    Chapter 13: Configuring Port Security Port security is a feature that allows you to configure a switch port with one or more device MAC addresses that are authorized to access the network through that port. When port security is enabled on a port, the switch stops learning new MAC addresses on the specified port when it has reached a configured maximum number.
  • Page 134 Configuring Port Security Web – Click Security, Port Security. Set the action to take when an invalid address is detected on a port, mark the checkbox in the Status column to enable security for a port, set the maximum number of MAC addresses allowed on a port, and click Apply. CLI –...
  • Page 135: Chapter 14: Configuring 802.1X Port Authentication

    Chapter 14: Configuring 802.1X Port Authentication Network switches can provide open and easy access to network resources by simply attaching a client PC. Although this automatic configuration and access is a desirable feature, it also allows unauthorized personnel to easily intrude and possibly gain access to sensitive network data.
  • Page 136: Displaying 802.1X Global Settings

    Configuring 802.1X Port Authentication The operation of dot1x on the switch requires the following: • The switch must have an IP address assigned. • The IP address of the RADIUS server must be specified. • 802.1X must be enabled globally for the switch. •...
  • Page 137: Configuring Port Settings For 802.1X

    Configuring 802.1X Global Settings The 802.1X protocol provides port authentication. The 802.1X protocol must be enabled globally for the switch system before port settings are active. Command Attributes 802.1X System Authentication Control – Sets the global setting for 802.1X. (Default: Disabled) Web –...
  • Page 138 Configuring 802.1X Port Authentication • Max Request – Sets the maximum number of times the switch port will retransmit an EAP request packet to the client before it times out the authentication session. (Range: 1-10; Default 2) • Quiet Period – Sets the time that a switch port waits after the Max Request count has been exceeded before attempting to acquire a new client.
  • Page 139 CLI – This example sets the 802.1X parameters on port 2. For a description of the additional fields displayed in this example, see “show dot1x” on page 43-6. Console(config)#interface ethernet 1/2 Console(config-if)#dot1x port-control auto Console(config-if)#dot1x re-authentication Console(config-if)#dot1x max-req 5 Console(config-if)#dot1x timeout quiet-period 40 Console(config-if)#dot1x timeout re-authperiod 5 Console(config-if)#dot1x timeout tx-period 40 Console(config-if)#end...
  • Page 140: Displaying 802.1X Statistics

    Configuring 802.1X Port Authentication Displaying 802.1X Statistics This switch can display statistics for dot1x protocol exchanges for any port. Parameter Description Rx EAPOL Start The number of EAPOL Start frames that have been received by this Authenticator. Rx EAPOL Logoff The number of EAPOL Logoff frames that have been received by this Authenticator.
  • Page 141 Web – Select Security, 802.1X, Statistics. Select the required port and then click Query. Click Refresh to update the statistics. CLI – This example displays the dot1x statistics for port 4. Console#show dot1x statistics interface ethernet 1/4 Eth 1/4 Rx: EAPOL EAPOL Start Logoff...
  • Page 142 Configuring 802.1X Port Authentication 14-8...
  • Page 143: Setting An Acl Name And Type

    Chapter 15: Access Control Lists Access Control Lists (ACL) provide packet filtering for IPv4 frames (based on address, protocol, Layer 4 protocol port number or TCP control code), IPv6 frames (based on address, next header type, or flow label), or any frames (based on MAC address or Ethernet type).
  • Page 144: Configuring A Standard Ipv4 Acl

    Access Control Lists the “TCP” protocol is specified, then you can also filter packets based on the TCP control code. • IPv6 Standard: IPv6 ACL mode that filters packets based on the source IPv6 address. • IPv6 Extended: IPv6 ACL mode that filters packets based on the destination IP address, as well as the type of the next header and the flow label (i.e., a request for special handling by IPv6 routers).
  • Page 145: Configuring An Extended Ipv4 Acl

    Web – Specify the action (i.e., Permit or Deny). Select the address type (Any, Host, or IP). If you select “Host,” enter a specific address. If you select “IP,” enter a subnet address and the mask for an address range. Then click Add. Figure 15-2 ACL Configuration - Standard IPv4 CLI –...
  • Page 146 Access Control Lists • Source/Destination Port – Source/destination port number for the specified protocol type. (Range: 0-65535) • Source/Destination Port Bit Mask – Decimal number representing the port bits to match. (Range: 0-65535) • Control Code – Decimal number (representing a bit string) that specifies flag bits in byte 14 of the TCP header.
  • Page 147 Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (Any, Host, or IP). If you select “Host,” enter a specific address. If you select “IP,” enter a subnet address and the mask for an address range.
  • Page 148: Configuring A Mac Acl

    Access Control Lists Configuring a MAC ACL Command Attributes • Action – An ACL can contain any combination of permit or deny rules. • Source/Destination Address Type – Use “Any” to include all possible addresses, “Host” to indicate a specific MAC address, or “MAC” to specify an address range with the Address and Bitmask fields.
  • Page 149: Configuring A Standard Ipv6 Acl

    Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (Any, Host, or MAC). If you select “Host,” enter a specific address (e.g., 11-22-33-44-55-66). If you select “MAC,” enter a base address and a hexidecimal bitmask for an address range. Set any other required criteria, such as VID, Ethernet type, or packet format.
  • Page 150: Configuring An Extended Ipv6 Acl

    Access Control Lists • Source Prefix-Length – A decimal value indicating how many contiguous bits (from the left) of the address comprise the prefix (i.e., the network portion of the address). Web – Specify the action (i.e., Permit or Deny). Select the address type (Any, Host, or IPv6-prefix).
  • Page 151 • Destination Prefix-Length – A decimal value indicating how many contiguous bits (from the left) of the address comprise the prefix (i.e., the network portion of the address). • Next Header – Identifies the type of header immediately following the IPv6 header. (Range: 0-255) Optional internet-layer information is encoded in separate headers that may be placed between the IPv6 header and the upper-layer header in a packet.
  • Page 152 Access Control Lists Web – Specify the action (i.e., Permit or Deny). Select the address type (Any or IPv6-prefix). If you select “IPv6-prefix,” enter a subnet address and prefix length. Set any other required criteria, such as next header, DSCP, or flow label. Then click Add. Figure 15-6 ACL Configuration - Extended IPv6 CLI –...
  • Page 153: Binding A Port To An Access Control List

    Binding a Port to an Access Control List After configuring the Access Control Lists (ACL), you should bind them to the ports that need to filter traffic. You can only bind a port to one ACL for each basic type – IPv4 ingress, MAC ingress, and IPv6 ingress.
  • Page 154 Access Control Lists 15-12...
  • Page 155: Displaying Connection Status

    Chapter 16: Port Configuration This chapter describes how to configure switch ports and display the current connection status. Displaying Connection Status You can use the Port Information or Trunk Information pages to display the current connection status, including link state, speed/duplex mode, flow control, and auto-negotiation.
  • Page 156 Port Configuration Field Attributes (CLI) Basic information: • Port type – Indicates the port type. (1000BASE-T or SFP) • MAC address – The physical layer address for this port. (To access this item on the web, see “Setting the Switch’s IP Address (IP Version 4)” on page 5-1.) Configuration: •...
  • Page 157 CLI – This example shows the connection status for Port 5. Console#show interfaces status ethernet 1/5 Information of Eth 1/13 Basic information: Port type: Mac address: Configuration: Name: Port admin: Speed-duplex: Capabilities: Broadcast storm: Broadcast storm limit: Flow control: LACP: Port security: Max MAC count: Port security action:...
  • Page 158: Configuring Interface Connections

    Port Configuration Configuring Interface Connections You can use the Port Configuration or Trunk Configuration page to enable/disable an interface, set auto-negotiation and the interface capabilities to advertise, or manually fix the speed and duplex mode. Command Attributes • Name – Allows you to label an interface. (Range: 1-64 characters) •...
  • Page 159 Web – Click Port, Port Configuration or Trunk Configuration. Modify the required interface settings, and click Apply. CLI – Select the interface, and then enter the required settings. Console(config)#interface ethernet 1/13 Console(config-if)#description RD SW#13 Console(config-if)#shutdown Console(config-if)#no shutdown Console(config-if)#no negotiation Console(config-if)#speed-duplex 100half Console(config-if)#negotiation Console(config-if)#capabilities 100half Console(config-if)#capabilities 100full...
  • Page 160: Showing Port Statistics

    Port Configuration Showing Port Statistics You can display standard statistics on network traffic from the Interfaces Group and Ethernet-like MIBs, as well as a detailed breakdown of traffic based on the RMON MIB. Interfaces and Ethernet-like statistics display errors on the traffic passing through each port.
  • Page 161 Table 16-1 Port Statistics (Continued) Parameter Transmit Discarded Packets Transmit Errors Etherlike Statistics Alignment Errors Late Collisions FCS Errors Excessive Collisions Single Collision Frames Internal MAC Transmit Errors Multiple Collision Frames Carrier Sense Errors SQE Test Errors Frames Too Long Deferred Transmissions Internal MAC Receive Errors RMON Statistics...
  • Page 162 Port Configuration Table 16-1 Port Statistics (Continued) Parameter Received Frames Broadcast Frames Multicast Frames CRC/Alignment Errors Undersize Frames Oversize Frames Fragments 64 Bytes Frames 65-127 Byte Frames 128-255 Byte Frames 256-511 Byte Frames 512-1023 Byte Frames 1024-1518 Byte Frames 1519-1536 Byte Frames 16-8 Description The total number of frames (bad, broadcast and multicast) received.
  • Page 163 Showing Port Statistics Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at the bottom of the page to update the screen. Figure 16-3 Port Statistics 16-9...
  • Page 164: Port Configuration

    Port Configuration CLI – This example shows statistics for port 12. Console#show interfaces counters ethernet 1/12 Ethernet 1/12 Iftable stats: Octets input: 868453, Octets output: 3492122 Unicast input: 7315, Unitcast output: 6658 Discard input: 0, Discard output: 0 Error input: 0, Error output: 0 Unknown protos input: 0, QLen output: 0 Extended iftable stats: Multi-cast input: 0, Multi-cast output: 17027...
  • Page 165: Chapter 17: Creating Trunk Groups

    Chapter 17: Creating Trunk Groups You can create multiple links between devices that work as one virtual, aggregate link. A port trunk offers a dramatic increase in bandwidth for network segments where bottlenecks exist, as well as providing a fault-tolerant link between two switches.
  • Page 166: Statically Configuring A Trunk

    Creating Trunk Groups Statically Configuring a Trunk Command Usage • When configuring static trunks, you may not be able to link switches of different types, depending on the manufacturer’s implementation. However, note that the static trunks on this switch are Cisco EtherChannel compatible.
  • Page 167: Setting A Load-Balance Mode For Trunks

    CLI – This example creates trunk 1 with ports 9 and 10. Just connect these ports to two static trunk ports on another switch to form a trunk. Console(config)#interface port-channel 1 Console(config-if)#exit Console(config)#interface ethernet 1/9 Console(config-if)#channel-group 1 Console(config-if)#exit Console(config)#interface ethernet 1/10 Console(config-if)#channel-group 1 Console(config-if)#end Console#show interfaces status port-channel 1...
  • Page 168: Command Attributes

    Creating Trunk Groups • Destination MAC Address: All traffic with the same destination MAC address is output on the same link in a trunk. This mode works best for switch-to-switch trunk links where traffic through the switch is destined for many different hosts. Do not use this mode for switch-to-router trunk links where the destination MAC address is the same for all traffic.
  • Page 169: Enabling Lacp On Selected Ports

    CLI – The following example sets the load-balance method to source and destination IP address. Console(config)#port-channel load-balance src-dst-ip Console(config)#exit Console#show port-channel load-balance Source and destination IP address Console# Enabling LACP on Selected Ports Command Usage • To avoid creating a loop in the network, be sure you enable LACP before connecting the ports, and also disconnect the ports before disabling LACP.
  • Page 170 Creating Trunk Groups Web – Click Port, LACP, Configuration. Select any of the switch ports from the scroll-down port list and click Add. After you have completed adding ports to the member list, click Apply. Figure 17-3 LACP Trunk Configuration CLI –...
  • Page 171: Configuring Lacp Parameters

    Configuring LACP Parameters Dynamically Creating a Port Channel – Ports assigned to a common port channel must meet the following criteria: • Ports must have the same LACP System Priority. • Ports must have the same LACP port Admin Key. •...
  • Page 172 Creating Trunk Groups Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can optionally configure these settings for the Port Partner. (Be aware that these settings only affect the administrative state of the partner, and will not take effect until the next time an aggregate link is formed with this device.) After you have completed setting the port LACP parameters, click Apply.
  • Page 173: Displaying Lacp Port Counters

    CLI – The following example configures LACP parameters for ports 1-10. Ports 1-8 are used as active members of the LAG, ports 9 and 10 are set to backup mode. Console(config)#interface ethernet 1/1 Console(config-if)#lacp actor system-priority 3 Console(config-if)#lacp actor admin-key 120 Console(config-if)#lacp actor port-priority 128 Console(config-if)#exit Console(config)#interface ethernet 1/10...
  • Page 174 Creating Trunk Groups Table 17-1 LACP Port Counters (Continued) Parameter Description Marker Unknown Pkts Number of frames received that either (1) Carry the Slow Protocols Ethernet Type value, but contain an unknown PDU, or (2) are addressed to the Slow Protocols group MAC Address, but do not carry the Slow Protocols Ethernet Type.
  • Page 175: Displaying Lacp Settings And Status For The Local Side

    Displaying LACP Settings and Status for the Local Side Displaying LACP Settings and Status for the Local Side You can display configuration settings and the operational state for the local side of an link aggregation. Table 17-2 LACP Internal Configuration Information Field Description Oper Key...
  • Page 176 Creating Trunk Groups Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information. Figure 17-6 LACP - Port Internal Information CLI – The following example displays the LACP configuration settings and operational state for the local side of port channel 1. Console#show lacp 1 internal Port channel: 1 -------------------------------------------------------------------------...
  • Page 177: Displaying Lacp Settings And Status For The Remote Side

    Displaying LACP Settings and Status for the Remote Side Displaying LACP Settings and Status for the Remote Side You can display configuration settings and the operational state for the remote side of an link aggregation. Table 17-3 LACP Neighbor Configuration Information Field Description Partner Admin System ID...
  • Page 178 Creating Trunk Groups CLI – The following example displays the LACP configuration settings and operational state for the remote side of port channel 1. Console#show lacp 1 neighbors Port channel 1 neighbors ------------------------------------------------------------------------- Eth 1/2 ------------------------------------------------------------------------- Partner Admin System ID: Partner Oper System ID: Partner Admin Port Number: 2 Partner Oper Port Number:...
  • Page 179: Setting Broadcast Storm Thresholds

    Chapter 18: Broadcast Storm Control Broadcast storms may occur when a device on your network is malfunctioning, or if application programs are not well designed or properly configured. If there is too much broadcast traffic on your network, performance can be severely degraded or everything can come to complete halt.
  • Page 180 Broadcast Storm Control CLI – Specify any interface, and then enter the threshold. The following disables broadcast storm control for port 1, and then sets broadcast suppression at 600 packets per second for port 2. Console(config)#interface ethernet 1/1 Console(config-if)#no switchport broadcast Console(config-if)#exit Console(config)#interface ethernet 1/2 Console(config-if)#switchport broadcast packet-rate 600...
  • Page 181: Chapter 19: Configuring Port Mirroring

    Chapter 19: Configuring Port Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner. Command Usage •...
  • Page 182 Configuring Port Mirroring Web – Click Port, Mirror Port Configuration. Specify the source port, the traffic type to be mirrored, and the monitor port, then click Add. CLI – Use the interface command to select the monitor port, then use the port monitor command to specify the source port.
  • Page 183: Chapter 20: Configuring Rate Limits

    Chapter 20: Configuring Rate Limits This function allows the network manager to control the maximum rate for traffic transmitted or received on an interface. Rate limiting is configured on interfaces at the edge of a network to limit traffic into or out of the switch. Traffic that falls within the rate limit is transmitted, while packets that exceed the acceptable amount of traffic are dropped.
  • Page 184 Configuring Rate Limits CLI - This example sets the rate limit for input and output traffic passing through port 1 to 600 Mbps. Console(config)#interface ethernet 1/1 Console(config-if)#rate-limit input 600 Console(config-if)#rate-limit output 600 Console(config-if)# 20-2 45-1 49-1...
  • Page 185: Setting Static Addresses

    Chapter 21: Address Table Settings Switches store the addresses for all known devices. This information is used to pass traffic directly between the inbound and outbound ports. All the addresses learned by monitoring traffic are stored in the dynamic address table. You can also manually configure static addresses that are bound to a specific port.
  • Page 186: Displaying The Address Table

    Address Table Settings CLI – This example adds an address to the static address table, but sets it to be deleted when the switch is reset. Console(config)#mac-address-table static 00-e0-29-94-34-de interface ethernet 1/1 vlan 1 delete-on-reset 50-1 Console(config)# Displaying the Address Table The Dynamic Address Table contains the MAC addresses learned by monitoring the source address for traffic entering the switch.
  • Page 187 Web – Click Address Table, Dynamic Addresses. Specify the search type (i.e., mark the Interface, MAC Address, or VLAN checkbox), select the method of sorting the displayed addresses, and then click Query. CLI – This example also displays the address table entries for port 1. Console#show mac-address-table interface ethernet 1/1 Interface Mac Address --------- ----------------- ---- -----------------...
  • Page 188: Changing The Aging Time

    Address Table Settings Changing the Aging Time You can set the aging time for entries in the dynamic address table. Command Attributes • Aging Status – Enables/disables the aging function. • Aging Time – The time after which a learned entry is discarded. (Range: 10-1000000 seconds;...
  • Page 189: Overview

    Chapter 22: Spanning Tree Algorithm Configuration The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices (that is, an STA-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
  • Page 190 Spanning Tree Algorithm Configuration alternate route that can be used when a node or port fails, and retaining the forwarding database for ports insensitive to changes in the tree structure when reconfiguration occurs. MSTP – When using STP or RSTP, it may be difficult to maintain a stable path between all VLAN members.
  • Page 191: Displaying Global Settings

    MSTP connects all bridges and LAN segments with a single Common and Internal Spanning Tree (CIST). The CIST is formed as a result of the running spanning tree algorithm between switches that support the STP, RSTP, MSTP protocols. Displaying Global Settings You can display a summary of the current bridge STA information that applies to the entire switch using the STA Information screen.
  • Page 192 Spanning Tree Algorithm Configuration These additional parameters are only displayed for the CLI: • Spanning tree mode – Specifies the type of spanning tree used on this switch: - STP: Spanning Tree Protocol (IEEE 802.1D) - RSTP: Rapid Spanning Tree (IEEE 802.1w) - MSTP: Multiple Spanning Tree (IEEE 802.1s) •...
  • Page 193 Web – Click Spanning Tree, STA, Information. CLI – This command displays global STA settings, followed by settings for each port. Console#show spanning-tree 51-18 Spanning-tree information --------------------------------------------------------------- Spanning tree mode: Spanning tree enable/disable: Instance: Vlans configuration: Priority: Bridge Hello Time (sec.): Bridge Max Age (sec.): Bridge Forward Delay (sec.): Root Hello Time (sec.):...
  • Page 194: Configuring Global Settings

    Spanning Tree Algorithm Configuration 1/ 1 information --------------------------------------------------------------- Admin status: Role: State: External admin path cost: 10000 Internal admin cost: External oper path cost: Internal oper path cost: Priority: Designated cost: Designated port: Designated root: Designated bridge: Fast forwarding: Forward transitions: Admin edge port: Oper edge port: Admin Link type:...
  • Page 195 • Multiple Spanning Tree Protocol - To allow multiple spanning trees to operate over the network, you must configure a related set of bridges with the same MSTP configuration, allowing them to participate in a specific set of spanning tree instances. - A spanning tree instance can exist only on bridges that have compatible VLAN instance assignments.
  • Page 196 Spanning Tree Algorithm Configuration • Forward Delay – The maximum time (in seconds) this device will wait before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames.
  • Page 197 Configuring Global Settings Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply. Figure 22-2 STA Global Configuration 22-9...
  • Page 198: Displaying Interface Settings

    Spanning Tree Algorithm Configuration CLI – This example enables Spanning Tree Protocol, sets the mode to MST, and then configures the STA and MSTP parameters. Console(config)#spanning-tree Console(config)#spanning-tree mode mstp Console(config)#spanning-tree priority 40000 Console(config)#spanning-tree hello-time 5 Console(config)#spanning-tree max-age 38 Console(config)#spanning-tree forward-time 20 Console(config)#spanning-tree pathcost method long Console(config)#spanning-tree transmission-limit 4 Console(config)#spanning-tree mst-configuration...
  • Page 199 • Designated Port – The port priority and number of the port on the designated bridging device through which this switch must communicate with the root of the Spanning Tree. • Oper Path Cost – The contribution of this port to the path cost of paths towards the spanning tree root which include this port.
  • Page 200 Spanning Tree Algorithm Configuration • External path cost – The path cost for the IST. This parameter is used by the STA to determine the best path between devices. Therefore, lower values should be assigned to ports attached to faster media, and higher values assigned to ports with slower media.
  • Page 201: Configuring Interface Settings

    CLI – This example shows the STA attributes for port 5. Console#show spanning-tree ethernet 1/5 1/ 5 information -------------------------------------------------------------- Admin status: Role: State: External admin path cost: 10000 Internal admin cost: External oper path cost: Internal oper path cost: Priority: Designated cost: Designated port: Designated root:...
  • Page 202 Spanning Tree Algorithm Configuration The following interface attributes can be configured: • Spanning Tree – Enables/disables STA on this interface. (Default: Enabled) • Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the Spanning Tree.
  • Page 203: Configuring Multiple Spanning Trees

    Migration button to manually re-check the appropriate BPDU format (RSTP or STP-compatible) to send on the selected interfaces. (Default: Disabled) Web – Click Spanning Tree, STA, Port Configuration or Trunk Configuration. Modify the required attributes, then click Apply. CLI – This example sets STA attributes for port 7. Console(config)#interface ethernet 1/7 Console(config-if)#no spanning-tree spanning-disabled Console(config-if)#spanning-tree port-priority 0...
  • Page 204 Spanning Tree Algorithm Configuration 3. Add the VLANs that will share this MSTI (MSTP VLAN Configuration). Note: All VLANs are automatically added to the IST (Instance 0). To ensure that the MSTI maintains connectivity across the network, you must configure a related set of bridges with the same MSTI settings. Command Attributes •...
  • Page 205 CLI – This displays STA settings for instance 1, followed by settings for each port. Console#show spanning-tree mst 1 Spanning-tree information --------------------------------------------------------------- Spanning tree mode: Spanning tree enabled/disabled: Instance: VLANs configuration: Priority: Bridge Hello Time (sec.): Bridge Max Age (sec.): Bridge Forward Delay (sec.): Root Hello Time (sec.): Root Max Age (sec.):...
  • Page 206: Displaying Interface Settings For Mstp

    Spanning Tree Algorithm Configuration Displaying Interface Settings for MSTP The MSTP Port Information and MSTP Trunk Information pages display the current status of ports and trunks in the selected MST instance. Field Attributes MST Instance ID – Instance identifier to configure. (Range: 0-4094; Default: 0) The other attributes are described under “Displaying Interface Settings,”...
  • Page 207: Configuring Interface Settings For Mstp

    --------------------------------------------------------------- 1/ 1 information --------------------------------------------------------------- Admin status: Role: State: External admin path cost: 10000 Internal admin path cost: 10000 External oper path cost: Internal oper path cost: Priority: Designated cost: Designated port: Designated root: Designated bridge: Fast forwarding: Forward transitions: Admin edge port: Oper edge port: Admin Link type:...
  • Page 208 Spanning Tree Algorithm Configuration • Default: 128 • Range: 0-240, in steps of 16 • Admin MST Path Cost – This parameter is used by the MSTP to determine the best path between devices. Therefore, lower values should be assigned to ports attached to faster media, and higher values assigned to ports with slower media.
  • Page 209: Assigning Ports To Vlans

    Chapter 23: VLAN Configuration In large networks, routers are used to isolate broadcast traffic for each subnet into separate domains. This switch provides a similar service at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains. VLANs confine broadcast traffic to the originating group, and can eliminate broadcast storms in large networks.
  • Page 210 VLAN Configuration Note: VLAN-tagged frames can pass through VLAN-aware or VLAN-unaware network interconnection devices, but the VLAN tags should be stripped off before passing it on to any end-node host that does not support VLAN tagging. tagged frames VLAN Classification – When the switch receives a frame, it classifies the frame in one of two ways.
  • Page 211: Forwarding Tagged/Untagged Frames

    these hosts, and core switches in the network, enable GVRP on the links between these devices. You should also determine security boundaries in the network and disable GVRP on the boundary ports to prevent advertisements from being propagated, or forbid those ports from joining restricted VLANs. Note: If you have host devices that do not support GVRP, you should configure static or untagged VLANs for the switch ports connected to these devices (as described in...
  • Page 212: Enabling Or Disabling Gvrp (Global Setting)

    VLAN Configuration Enabling or Disabling GVRP (Global Setting) GARP VLAN Registration Protocol (GVRP) defines a way for switches to exchange VLAN information in order to register VLAN members on ports across the network. VLANs are dynamically configured based on join messages issued by host devices and propagated throughout the network.
  • Page 213: Displaying Current Vlans

    CLI – Enter the following command. Console#show bridge-ext Max support VLAN numbers: Max support VLAN ID: Extended multicast filtering services: No Static entry individual port: VLAN learning: Configurable PVID tagging: Local VLAN capable: Traffic classes: Global GVRP status: GMRP: Console# Displaying Current VLANs The VLAN Current Table shows the current port members of each VLAN and whether or not the port supports VLAN tagging.
  • Page 214: Creating Vlans

    VLAN Configuration Command Attributes (CLI) • VLAN – ID of configured VLAN (1-4093, no leading zeroes). • Type – Shows how this VLAN was added to the switch. - Dynamic: Automatically learned via GVRP. - Static: Added as a static entry. •...
  • Page 215: Adding Static Members To Vlans (Vlan Index)

    Web – Click VLAN, 802.1Q VLAN, Static List. To create a new VLAN, enter the VLAN ID and VLAN name, mark the Enable checkbox to activate the VLAN, and then click Add. Figure 23-4 VLAN Static List - Creating VLANs CLI –...
  • Page 216 VLAN Configuration Command Attributes • VLAN – ID of configured VLAN (1-4093). • Name – Name of the VLAN (1 to 32 characters). • Status – Enables or disables the specified VLAN. - Enable: VLAN is operational. - Disable: VLAN is suspended; i.e., does not pass packets. •...
  • Page 217: Adding Static Members To Vlans (Port Index)

    CLI – The following example adds tagged and untagged ports to VLAN 2. Console(config)#interface ethernet 1/1 Console(config-if)#switchport allowed vlan add 2 tagged Console(config-if)#exit Console(config)#interface ethernet 1/2 Console(config-if)#switchport allowed vlan add 2 untagged Console(config-if)#exit Console(config)#interface ethernet 1/13 Console(config-if)#switchport allowed vlan add 2 tagged Console(config-if)# Adding Static Members to VLANs (Port Index) Use the VLAN Static Membership by Port menu to assign VLAN groups to the...
  • Page 218: Configuring Vlan Behavior For Interfaces

    VLAN Configuration Configuring VLAN Behavior for Interfaces You can configure VLAN behavior for specific interfaces, including the default VLAN identifier (PVID), accepted frame types, ingress filtering, GVRP status, and GARP timers. Command Usage • GVRP – GARP VLAN Registration Protocol defines a way for switches to exchange VLAN information in order to automatically register VLAN members on interfaces across the network.
  • Page 219 • GARP Leave Timer – The interval a port waits before leaving a VLAN group. This time should be set to more than twice the join time. This ensures that after a Leave or LeaveAll message has been issued, the applicants can rejoin before the port actually leaves the group.
  • Page 220: Configuring Ieee 802.1Q Tunneling

    VLAN Configuration CLI – This example sets port 3 to accept only tagged frames, assigns PVID 3 as the native VLAN ID, enables GVRP, sets the GARP timers, and then sets the switchport mode to hybrid. Console(config)#interface ethernet 1/3 Console(config-if)#switchport acceptable-frame-types tagged Console(config-if)#switchport ingress-filtering Console(config-if)#switchport native vlan 3 Console(config-if)#switchport gvrp...
  • Page 221 When a double-tagged packet enters another trunk port in an intermediate or core switch in the service provider’s network, the outer tag is stripped for packet processing. When the packet exits another trunk port on the same core switch, the same SPVLAN tag is again added to the packet.
  • Page 222 VLAN Configuration 3. After packet classification through the switching process, the packet is written to memory with one tag (an outer tag) or with two tags (both an outer tag and inner tag). 4. The switch sends the packet to the proper egress port. 5.
  • Page 223 Configuration Limitations for QinQ • The native VLAN of uplink ports should not be used as the SPVLAN. If the SPVLAN is the uplink port's native VLAN, the uplink port must be an untagged member of the SPVLAN. Then the outer SPVLAN tag will be stripped when the packets are sent out.
  • Page 224: Enabling Qinq Tunneling On The Switch

    VLAN Configuration Enabling QinQ Tunneling on the Switch The switch can be configured to operate in normal VLAN mode or IEEE 802.1Q (QinQ) tunneling mode which is used for passing Layer 2 traffic across a service provider’s metropolitan area network. Command Attributes 802.1Q Tunnel –...
  • Page 225: Adding An Interface To A Qinq Tunnel

    Adding an Interface to a QinQ Tunnel Follow the guidelines in the preceding section to set up a QinQ tunnel on the switch. Use the VLAN Port Configuration or VLAN Trunk Configuration screen to set the access port on the edge switch to 802.1Q Tunnel mode. Also set the Tag Protocol Identifier (TPID) value of the tunnel port if the attached client is using a nonstandard 2-byte ethertype to identify 802.1Q tagged frames.
  • Page 226: Vlan Configuration

    VLAN Configuration Figure 23-1 Tunnel Port Configuration CLI – This example sets port 1 to tunnel access mode, indicates that the TPID used for 802.1Q tagged frames is 9100 hexadecimal, and sets port 2 to tunnel uplink mode. Console(config)#interface ethernet 1/1 Console(config-if)#switchport dot1q-tunnel mode access Console(config-if)#switchport dot1q-tunnel tpid 9100 Console(config-if)#interface ethernet 1/2...
  • Page 227: Enabling Private Vlans

    Chapter 24: Configuring Private VLANs Private VLANs provide port-based security and isolation between ports within the assigned VLAN. Data traffic on downlink ports can only be forwarded to, and from, uplink ports. (Note that private VLANs and normal VLANs can exist simultaneously within the same switch.) Enabling Private VLANs Use the Private VLAN Status page to enable/disable the Private VLAN function.
  • Page 228: Configuring Uplink And Downlink Ports

    Configuring Private VLANs Configuring Uplink and Downlink Ports Use the Private VLAN Link Status page to set ports as downlink or uplink ports. Ports designated as downlink ports can not communicate with any other ports on the switch except for the uplink ports. Uplink ports can communicate with any other ports on the switch and with any designated downlink ports.
  • Page 229: Configuring Protocol Groups

    Chapter 25: Configuring Protocol-Based VLANs The network devices required to support multiple protocols cannot be easily grouped into a common VLAN. This may require non-standard devices to pass traffic between different VLANs in order to encompass all the devices participating in a specific protocol.
  • Page 230: Mapping Protocols To Vlans

    Configuring Protocol-Based VLANs Web – Click VLAN, Protocol VLAN, Configuration. Enter a protocol group ID, frame type and protocol type, then click Apply. Figure 25-1 Protocol VLAN Configuration CLI – The following creates protocol group 1, and then specifies Ethernet frames with IP and ARP protocol types.
  • Page 231 Web – Click VLAN, Protocol VLAN, Port Configuration. Select a a port or trunk, enter a protocol group ID, the corresponding VLAN ID, and click Apply. Figure 25-2 Protocol VLAN Port Configuration CLI – The following maps the traffic entering Port 1 which matches the protocol type specified in protocol group 1 to VLAN 3.
  • Page 232 Configuring Protocol-Based VLANs 25-4...
  • Page 233: Setting The Default Priority For Interfaces

    Chapter 26: Class of Service Configuration Class of Service (CoS) allows you to specify which data packets have greater precedence when traffic is buffered in the switch due to congestion. This switch supports CoS with eight priority queues for each port. Data packets in a port’s high-priority queue will be transmitted before those in the lower-priority queues.
  • Page 234: Table

    Class of Service Configuration Web – Click Priority, Default Port Priority or Default Trunk Priority. Modify the default priority for any interface, then click Apply. CLI – This example assigns a default priority of 5 to port 3. Console(config)#interface ethernet 1/3 Console(config-if)#switchport priority default 5 Console(config-if)#end Console#show interfaces switchport ethernet 1/3...
  • Page 235: Mapping Cos Values To Egress Queues

    Mapping CoS Values to Egress Queues This switch processes Class of Service (CoS) priority tagged traffic by using eight priority queues for each port, with service schedules based on strict or Weighted Round Robin (WRR). Up to eight separate traffic priorities are defined in IEEE 802.1p.
  • Page 236: Selecting The Queue Mode

    Class of Service Configuration Web – Click Priority, Traffic Classes. Assign priorities to the traffic classes (i.e., output queues), then click Apply. CLI – The following example shows how to change the CoS assignments to a one-to-one mapping. Console(config)#interface ethernet 1/1 Console(config)#queue cos-map 0 0 Console(config)#queue cos-map 1 1 Console(config)#queue cos-map 2 2...
  • Page 237: Setting The Service Weight For Traffic Classes

    Command Attributes • WRR - Weighted Round-Robin shares bandwidth at the egress ports by using scheduling weights 1, 2, 4, 6, 8, 10, 12, 14 for queues 0 through 7 respectively. (This is the default selection.) • Strict - Services the egress queues in sequential order, transmitting all traffic in the higher priority queues before servicing lower priority queues.
  • Page 238: Priority Queues

    Class of Service Configuration Web – Click Priority, Queue Scheduling. Select the interface, highlight a traffic class (i.e., output queue), enter a weight, then click Apply. CLI – The following example shows how to assign WRR weights to each of the priority queues.
  • Page 239: Mapping Layer 3/4 Priorities To Cos Values

    Layer 3/4 Priority Settings Mapping Layer 3/4 Priorities to CoS Values This switch supports several common methods of prioritizing layer 3/4 traffic to meet application requirements. Traffic priorities can be specified in the IP header of a frame, using the priority bits in the Type of Service (ToS) octet or the number of the TCP port.
  • Page 240: Mapping Ip Precedence

    Class of Service Configuration Mapping IP Precedence The Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight different priority levels ranging from highest priority for network control packets to lowest priority for routine traffic. The default IP Precedence values are mapped one-to-one to Class of Service values (i.e., Precedence value 0 maps to CoS value 0, and so forth).
  • Page 241: Mapping Dscp Priority

    CLI – The following example globally enables IP Precedence service on the switch, maps IP Precedence value 1 to CoS value 0 (on port 1), and then displays the IP Precedence settings. Console(config)#map ip precedence Console(config)#interface ethernet 1/1 Console(config-if)#map ip precedence 1 cos 0 Console(config-if)#end Console#show map ip precedence ethernet 1/1 Precedence mapping status: disabled...
  • Page 242 Class of Service Configuration Web – Click Priority, IP DSCP Priority. Select an entry from the DSCP table, enter a value in the Class of Service Value field, then click Apply. CLI – The following example globally enables DSCP Priority service on the switch, maps DSCP value 0 to CoS value 1 (on port 1), and then displays the DSCP Priority settings.
  • Page 243: Mapping Ip Port Priority

    Mapping IP Port Priority You can also map network applications to Class of Service values based on the IP port number (i.e., TCP/UDP port number) in the frame header. Some of the more common TCP service ports include: HTTP: 80, FTP: 21, Telnet: 23 and POP3: 110. Command Attributes •...
  • Page 244 Class of Service Configuration CLI – The following example globally enables IP Port Priority service on the switch, maps HTTP traffic (on port 1) to CoS value 0, and then displays the IP Port Priority settings. Console(config)#map ip port Console(config)#interface ethernet 1/1 Console(config-if)#map ip port 80 cos 0 Console(config-if)#end Console#show map ip port ethernet 1/5...
  • Page 245: Configuring Quality Of Service Parameters

    Chapter 27: Quality of Service The commands described in this section are used to configure Quality of Service (QoS) classification criteria and service policies. Differentiated Services (DiffServ) provides policy-based management mechanisms used for prioritizing network resources to meet the requirements of specific traffic types on a per hop basis. Each packet is classified upon entry into the network based on access lists, IP Precedence, DSCP values, or VLAN lists.
  • Page 246: Configuring A Class Map

    Quality of Service Configuring a Class Map A class map is used for matching packets to a specified class. Command Usage • To configure a Class Map, follow these steps: - Open the Class Map page, and click Add Class. - When the Class Configuration page opens, fill in the “Class Name”...
  • Page 247 Configuring a Class Map • IP Precedence – An IP Precedence value. (Range: 0-7) • VLAN – A VLAN. (Range:1-4093) • Add – Adds specified criteria to the class. Up to 16 items are permitted per class. • Remove – Deletes the selected criteria from the class. Web –...
  • Page 248: Creating Qos Policies

    Quality of Service CLI - This example creates a class map call “rd-class,” and sets it to match packets marked for DSCP service value 3. Console(config)#class-map rd_class match-any Console(config-cmap)#match ip dscp 3 Console(config-cmap)# Creating QoS Policies This function creates a policy map that can be attached to multiple interfaces. Command Usage •...
  • Page 249 • Add Policy – Opens the “Policy Configuration” page. Enter a policy name and description on this page, and click Add to open the “Policy Rule Settings” page. Enter the criteria used to service ingress traffic on this page. • Remove Policy – Deletes a specified policy. Policy Configuration •...
  • Page 250 Quality of Service Web – Click QoS, DiffServ, Policy Map to display the list of existing policy maps. To add a new policy map click Add Policy. To configure the policy rule settings click Edit Classes. Figure 27-2 Configuring Policy Maps 27-6...
  • Page 251: Attaching A Policy Map To Ingress Queues

    CLI – This example creates a policy map called “rd-policy,” sets the average bandwidth the 1 Mbps, the burst rate to 1522 bps, and the response to reduce the DSCP value for violating packets to 0. Console(config)#policy-map rd_policy#3 Console(config-pmap)#class rd_class#3 Console(config-pmap-c)#set ip dscp 4 Console(config-pmap-c)#police 100000 1522 exceed-action set ip dscp 0...
  • Page 252 Quality of Service 27-8...
  • Page 253: Layer 2 Igmp (Snooping And Query)

    Chapter 28: Multicast Filtering Multicasting is used to support real-time applications such as videoconferencing or streaming audio. A multicast server does not have to establish a separate connection with each client. It merely broadcasts its service to the network, and any hosts that want to receive the multicast register with their local multicast switch/ router.
  • Page 254: Configuring Igmp Snooping And Query Parameters

    Multicast Filtering router/switch to ensure that multicast traffic is passed to all appropriate interfaces within the switch. Static IGMP Host Interface – For multicast applications that you need to control more carefully, you can manually assign a multicast service to specific interfaces on the switch (page 28-7).
  • Page 255: Current Status

    • IGMP Version — Sets the protocol version for compatibility with other devices on the network. (Range: 1-2; Default: 2) Notes: 1. All systems on the subnet must support the same version. Some attributes are only enabled for IGMPv2, including IGMP Report Delay and IGMP Query Timeout.
  • Page 256: Displaying Interfaces Attached To A Multicast Router

    Multicast Filtering Displaying Interfaces Attached to a Multicast Router Multicast routers that are attached to ports on the switch use information obtained from IGMP, along with a multicast routing protocol such as DVMRP or PIM, to support IP multicasting across the Internet. These routers may be dynamically discovered by the switch or statically assigned to an interface on the switch.
  • Page 257: Specifying Static Interfaces For A Multicast Router

    Specifying Static Interfaces for a Multicast Router Depending on your network connections, IGMP snooping may not always be able to locate the IGMP querier. Therefore, if the IGMP querier is a known multicast router/ switch connected over the network to an interface (port or trunk) on your switch, you can manually configure the interface (and a specified VLAN) to join all the current multicast groups supported by the attached router.
  • Page 258: Displaying Port Members Of Multicast Services

    Multicast Filtering Displaying Port Members of Multicast Services You can display the port members associated with a specified VLAN and multicast service. Command Attribute • VLAN ID – Selects the VLAN for which to display port members. • Multicast IP Address – The IP address for a specific multicast service. •...
  • Page 259: Assigning Ports To Multicast Services

    Assigning Ports to Multicast Services Multicast filtering can be dynamically configured using IGMP Snooping and IGMP Query messages as described in “Configuring IGMP Snooping and Query Parameters” on page 28-2. For certain applications that require tighter control, you may need to statically configure a multicast service on the switch. First add all the ports attached to participating hosts to a common VLAN, and then assign the multicast service to that VLAN group.
  • Page 260 Multicast Filtering CLI – This example assigns a multicast address to VLAN 1, and then displays all the known multicast services supported on VLAN 1. Console(config)#ip igmp snooping vlan 1 static 224.1.1.12 ethernet 1/12 Console(config)#exit Console#show mac-address-table multicast vlan 1 VLAN M'cast IP addr.
  • Page 261: Configuring General Dns Service Parameters

    Chapter 29: Configuring Domain Name Service The Domain Naming System (DNS) service on this switch allows host names to be mapped to IP addresses using static table entries or by redirection to other name servers on the network. When a client device designates this switch as a DNS server, the client will attempt to resolve host names into IP addresses by forwarding DNS queries to the switch, and waiting for a response.
  • Page 262 Configuring Domain Name Service Web – Select DNS, General Configuration. Set the default domain name or list of domain names, specify one or more name servers to use to use for address resolution, enable domain lookup status, and click Apply. Figure 29-1 DNS General Configuration CLI - This example sets a default domain name and a domain list.
  • Page 263: Configuring Static Dns Host To Address Entries

    Configuring Static DNS Host to Address Entries You can manually configure static entries in the DNS table that are used to map domain names to IP addresses. Command Usage • Static entries may be used for local devices connected directly to the attached network, or for commonly used resources located elsewhere on the network.
  • Page 264 Configuring Domain Name Service Web – Select DNS, Static Host Table. Enter a host name and one or more corresponding addresses, then click Apply. CLI - This example maps two address to a host name, and then configures an alias host name for the same addresses.
  • Page 265: Displaying The Dns Cache

    Displaying the DNS Cache You can display entries in the DNS cache that have been learned via the designated name servers. Field Attributes • No – The entry number for each resource record. • Flag – The flag is always “4” indicating a cache entry and therefore unreliable. •...
  • Page 266 Configuring Domain Name Service CLI - This example displays all the resource records learned from the designated name servers. Console#show dns cache FLAG TYPE CNAME CNAME CNAME CNAME CNAME ALIAS CNAME ALIAS CNAME ALIAS CNAME Console# 29-6 207.46.134.222 207.46.134.190 207.46.134.155 207.46.249.222 207.46.249.27 POINTER TO:4...
  • Page 267: Chapter 30: Switch Clustering

    Chapter 30: Switch Clustering Switch Clustering is a method of grouping switches together to enable centralized management through a single unit. Switches that support clustering can be grouped together regardless of physical location or switch type, as long as they are connected to the same local network.
  • Page 268: Cluster Member Configuration

    Switch Clustering Web – Click Cluster, Configuration. CLI – This example first enables clustering on the switch, sets the switch as the cluster Commander, and then configures the cluster IP pool. Console(config)#cluster Console(config)#cluster commander Console(config)#cluster ip-pool 10.2.3.4 Console(config)# Cluster Member Configuration Adds Candidate switches to the cluster as Members.
  • Page 269: Cluster Member Information

    Web – Click Cluster, Member Configuration. Figure 30-2 Cluster Member Configuration CLI – This example creates a new cluster Member by specifying the Candidate switch MAC address and setting a Member ID. Console(config)#cluster member mac-address 00-12-34-56-78-9a id 5 Console(config)# Cluster Member Information Displays current cluster Member switch information.
  • Page 270: Cluster Candidate Information

    Switch Clustering CLI – This example shows information about cluster Member switches. Vty-0#show cluster members Cluster Members: Role: Active member IP Address: 10.254.254.2 MAC Address: 00-12-cf-23-49-c0 Description: 24/48 L2/L4 IPV4/IPV6 GE Switch Vty-0# Cluster Candidate Information Displays information about discovered switches in the network that are already cluster Members or are available to become cluster Members.
  • Page 271 Section III:Command Line Interface This section provides a detailed description of the Command Line Interface, along with examples for all of the commands. Using the Command Line Interface ......31-1 CLI Command Groups .
  • Page 272 Command Line Interface Domain Name Service Commands .......58-1 IPv4 Interface Commands ........59-1 IPv6 Interface Commands .
  • Page 273: Console Connection

    Chapter 31: Using the Command Line Interface This chapter describes how to use the Command Line Interface (CLI). Accessing the CLI When accessing the management interface for the switch over a direct connection to the server’s console port, or via a Telnet connection, the switch can be managed by entering command keywords and parameters at the prompt.
  • Page 274 Using the Command Line Interface To access the switch through a Telnet session, you must first set the IP address for the switch, and set the default gateway if you are managing the switch from a different IP subnet. For example, Console(config)#interface vlan 1 Console(config-if)#ip address 10.1.0.254 255.255.255.0 Console(config-if)#exit...
  • Page 275: Getting Help On Commands

    Entering Commands This section describes how to enter CLI commands. Keywords and Arguments A CLI command is a series of keywords and arguments. Keywords identify a command, and arguments specify configuration parameters. For example, in the command “show interfaces status ethernet 1/5,” show interfaces and status are keywords, ethernet is an argument that specifies the interface type, and 1/5 specifies the unit/port.
  • Page 276: Showing Commands

    Using the Command Line Interface Showing Commands If you enter a “?” at the command prompt, the system will display the first level of keywords for the current command class (Normal Exec or Privileged Exec) or configuration class (Global, ACL, DHCP, Interface, Line, Router, VLAN Database, or MSTP).
  • Page 277: Negating The Effect Of Commands

    Partial Keyword Lookup If you terminate a partial keyword with a question mark, alternatives that match the initial letters are provided. (Remember not to leave a space between the command and question mark.) For example “s?” shows all the keywords starting with “s.” Console#show s? snmp sntp...
  • Page 278: Understanding Command Modes

    Using the Command Line Interface Understanding Command Modes The command set is divided into Exec and Configuration classes. Exec commands generally display information on system status or clear statistical counters. Configuration commands, on the other hand, modify interface parameters or enable certain switching functions.
  • Page 279: Configuration Commands

    Username: guest Password: [guest login password] CLI session with the 24/48 L2/L4 GE Switch is opened. To end the CLI session, enter [Exit]. Console>enable Password: [privileged level password] Console# Configuration Commands Configuration commands are privileged level commands used to modify switch settings.
  • Page 280: Configuration Command Modes

    Using the Command Line Interface To enter the other modes, at the configuration prompt type one of the following commands. Use the exit or end command to return to the Privileged Exec mode. Table 31-2 Configuration Command Modes Mode Command Line line {console | vty} Access...
  • Page 281: Command Line Processing

    Command Line Processing Commands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough letters to differentiate them from any other currently available commands or parameters. You can use the Tab key to complete partial commands, or enter a partial command followed by the “?”...
  • Page 282 Using the Command Line Interface 31-10...
  • Page 283: Command Group Index

    Chapter 32: CLI Command Groups The system commands can be broken down into the functional groups shown below Command Group Description General Basic commands for entering privileged access mode, restarting the system, or quitting the CLI System Management Display and setting of system information, basic modes of operation, maximum frame size, and restarts the system File Management Downloads or saves software code and system configuration files...
  • Page 284 CLI Command Groups Table 32-1 Command Group Index (Continued) Command Group Description Class of Service Sets port priority for untagged frames, selects strict priority or weighted round robin, relative weight for each priority queue, also sets priority for TCP/UDP traffic types, IP precedence, and DSCP Quality of Service Configures Differentiated Services Multicast Filtering...
  • Page 285: Chapter 33: General Commands

    Chapter 33: General Commands This chapter describes general system commands that apply to using the CLI. Command Function enable Activates privileged mode disable Returns to normal mode from privileged mode configure Activates global configuration mode show history Shows the command history buffer prompt Customizes the CLI prompt Returns to Privileged Exec mode...
  • Page 286: Configure

    General Commands Example Console>enable Password: [privileged level password] Console# Related Commands disable (33-2) enable password (41-2) disable This command returns to Normal Exec mode from privileged mode. In normal access mode, you can only display basic information on the switch's configuration or Ethernet statistics.
  • Page 287: Show History

    Example Console#configure Console(config)# Related Commands end (33-4) show history This command shows the contents of the command history buffer. Default Setting None Command Mode Normal Exec, Privileged Exec Command Usage The history buffer size is fixed at 10 Execution commands and 10 Configuration commands.
  • Page 288: Prompt

    General Commands prompt This command customizes the CLI prompt. Use the no form to restore the default prompt. Syntax prompt string no prompt string - Any alphanumeric string to use for the CLI prompt. (Maximum length: 255 characters) Default Setting Console Command Mode Global Configuration...
  • Page 289: Quit

    Command Mode Example This example shows how to return to the Privileged Exec mode from the Global Configuration mode, and then quit the CLI session: Console(config)#exit Console#exit Press ENTER to start session User Access Verification Username: quit This command exits the configuration program. Default Setting None Command Mode...
  • Page 290 General Commands 33-6...
  • Page 291: Chapter 34: System Management Commands

    Chapter 34: System Management Commands This section describes commands used to configure information that uniquely identifies the switch, and display or configure a variety of other system information. Table 34-1 System Management Commands Command Function hostname Specifies the host name for the switch reload Restarts the system switch renumber...
  • Page 292: Switch Renumber

    System Management Commands reload This command restarts the system. Note: When the system is restarted, it will always run the Power-On Self-Test. It will also retain all configuration information stored in non-volatile memory by the copy running-config startup-config command. Default Setting None Command Mode Privileged Exec...
  • Page 293: Show Startup-Config

    jumbo frame This command enables support for jumbo frames. Use the no form to disable it. Syntax [no] jumbo frame Default Setting Disabled Command Mode Global Configuration Command Usage • This switch provides more efficient throughput for large sequential data transfers by supporting jumbo frames up to 9216 bytes.
  • Page 294: Command Usage

    System Management Commands Command Usage • Use this command in conjunction with the show running-config command to compare the information in running memory to the information stored in non-volatile memory. • This command displays settings for key command modes. Each mode group is separated by “!”...
  • Page 295: Show Running-Config

    VLAN database VLAN 1 name DefaultVlan media ethernet state active VLAN 4093 media ethernet state active spanning-tree MST configuration interface ethernet 1/1 switchport allowed vlan add 1 untagged switchport native vlan 1 switchport allowed vlan add 4093 tagged interface vlan 1 ip address dhcp line console line VTY...
  • Page 296: Related Commands

    System Management Commands - Multiple spanning tree instances (name and interfaces) - IP address - Layer 4 precedence settings - Spanning tree settings - Any configured settings for the console port and Telnet Example building running-config, please wait... !<stackingDB>00</stackingDB> !<stackingMac>01_00-12-cf-0b-47-a0_01</stackingMac> phymap 00-12-cf-0b-47-a0 SNTP server dot1q-tunnel system-tunnel-control...
  • Page 297: Show System

    show system This command displays system information. Default Setting None Command Mode Normal Exec, Privileged Exec Command Usage • For a description of the items shown by this command, refer to “Displaying System Information” on page 4-1. • The POST results should all display “PASS.” If any POST test indicates “FAIL,”...
  • Page 298: Show Version

    System Management Commands Command Mode Normal Exec, Privileged Exec Command Usage The session used to execute this command is indicated by a “*” symbol next to the Line (i.e., session) index number. Example Console#show users Username accounts: Username Privilege Public-Key -------- --------- ---------- admin guest...
  • Page 299 Example Console#show version Unit1 Serial Number: Hardware Version: EPLD Version: Number of Ports: Main Power Status: Redundant Power Status: Agent (master) Unit ID: Loader Version: Boot ROM Version: Operation Code Version: Console# 0000E8900000 1.02 Not present 0.0.0.2 0.0.0.2 0.0.0.4 show version 34-9...
  • Page 300 System Management Commands 34-10...
  • Page 301: Flash/File Commands

    Chapter 35: File Management Commands These commands are used to manage software and configuration files on the switch. Managing Firmware Firmware can be uploaded and downloaded to or from a TFTP server. By saving runtime code to a file on a TFTP server, that file can later be downloaded to the switch to restore operation.
  • Page 302: Copy

    File Management Commands copy This command moves (upload/download) a code image or configuration file between the switch’s flash memory and a TFTP server. When you save the system code or configuration settings to a file on a TFTP server, that file can later be downloaded to the switch to restore system operation.
  • Page 303 • To replace the startup configuration, you must use startup-config as the destination. • Use the copy file unit command to copy a local file to another switch in the stack. Use the copy unit file command to copy a file from another switch in the stack.
  • Page 304: Delete

    File Management Commands The following example shows how to download a configuration file: Console#copy tftp startup-config TFTP server ip address: 10.1.0.99 Source configuration file name: startup.01 Startup configuration file name [startup]: Write to FLASH Programming. \Write to FLASH finish. Success. Console# This example shows how to copy a secure-site certificate from an TFTP server.
  • Page 305 Command Mode Privileged Exec Command Usage • If the file type is used for system startup, then this file cannot be deleted. • “Factory_Default_Config.cfg” cannot be deleted. • A colon (:) is required after the specified unit number. Example This example shows how to delete the test2.cfg configuration file from flash memory. Console#delete test2.cfg Console# Related Commands...
  • Page 306: Whichboot

    File Management Commands • File information is shown below: Column Heading file name file type startup size Example The following example shows how to display all file information: Console#dir File name ------------------------------------- Unit1: D1007 V10028 Factory_Default_Config.cfg startup startup1.cfg --------------------------------------------------------------------------- Console# whichboot This command displays which files were booted when the system powered up.
  • Page 307: Boot System

    boot system This command specifies the file or image used to start up the system. Syntax boot system [unit:] {boot-rom| config | opcode}: filename The type of file or image to set as a default includes: • boot-rom* - Boot ROM. •...
  • Page 308 File Management Commands 35-8...
  • Page 309: Chapter 36: Line Commands

    Chapter 36: Line Commands You can access the onboard configuration program by attaching a VT100 compatible device to the server’s serial port. These commands are used to set communication parameters for the serial port or Telnet (i.e., a virtual terminal). Command Function line...
  • Page 310: Login

    Line Commands Command Mode Global Configuration Command Usage Telnet is considered a virtual terminal connection and will be shown as “VTY” in screen displays such as show users. However, the serial communication parameters (e.g., databits) do not affect Telnet connections. Example To enter console line mode, enter the following command: Console(config)#line console...
  • Page 311: Password

    • This command controls login authentication via the switch itself. To configure user names and passwords for remote authentication servers, you must use the RADIUS or TACACS software installed on those servers. Example Console(config-line)#login local Console(config-line)# Related Commands username (41-1) password (36-3) password This command specifies the password for a line.
  • Page 312: Timeout Login Response

    Line Commands Related Commands login (36-2) password-thresh (36-5) timeout login response This command sets the interval that the system waits for a user to log into the CLI. Use the no form to restore the default setting. Syntax timeout login response [seconds] no timeout login response seconds - Integer that specifies the timeout interval.
  • Page 313: Password-Thresh

    Default Setting CLI: No timeout Telnet: 10 minutes Command Mode Line Configuration Command Usage • If user input is detected within the timeout interval, the session is kept open; otherwise the session is terminated. • This command applies to both the local console and Telnet connections. •...
  • Page 314: Silent-Time

    Line Commands Related Commands silent-time (36-6) silent-time This command sets the amount of time the management console is inaccessible after the number of unsuccessful logon attempts exceeds the threshold set by the password-thresh command. Use the no form to remove the silent time value. Syntax silent-time [seconds] no silent-time...
  • Page 315: Parity

    Command Usage The databits command can be used to mask the high bit on input from devices that generate 7 data bits with parity. If parity is being generated, specify 7 data bits per character. If no parity is required, specify 8 data bits per character.
  • Page 316: Stopbits

    Line Commands speed This command sets the terminal line’s baud rate. This command sets both the transmit (to terminal) and receive (from terminal) speeds. Use the no form to restore the default setting. Syntax speed bps no speed bps - Baud rate in bits per second. (Options: 9600, 19200, 38400, 57600, 115200 bps, or auto) Default Setting auto...
  • Page 317: Disconnect

    Example To specify 2 stop bits, enter this command: Console(config-line)#stopbits 2 Console(config-line)# disconnect This command terminates an SSH, Telnet, or console connection. Syntax disconnect session-id session-id – The session identifier for an SSH, Telnet or console connection. (Range: 0-4) Command Mode Privileged Exec Command Usage Specifying session identifier “0”...
  • Page 318: Line Commands

    Line Commands Example To show all lines, enter this command: Console#show line Console configuration: Password threshold: Interactive timeout: Disabled Login timeout: Disabled Silent time: Baudrate: Databits: Parity: Stopbits: VTY configuration: Password threshold: Interactive timeout: 600 sec Login timeout: 300 sec Console# 36-10 3 times...
  • Page 319: Chapter 37: Event Logging Commands

    Chapter 37: Event Logging Commands This section describes commands used to configure event logging on the switch. Table 37-1 Event Logging Commands Command Function logging on Controls logging of error messages logging history Limits syslog messages saved to switch memory based on severity logging host Adds a syslog server host IP address that will receive logging...
  • Page 320: Logging History

    Event Logging Commands Related Commands logging history (37-2) logging trap (37-4) clear log (37-5) logging history This command limits syslog messages saved to switch memory based on severity. The no form returns the logging of syslog messages to the default level. Syntax logging history {flash | ram} level no logging history {flash | ram}...
  • Page 321: Logging Facility

    Example Console(config)#logging history ram 0 Console(config)# logging host This command adds a syslog server host IP address that will receive logging messages. Use the no form to remove a syslog server host. Syntax [no] logging host host_ip_address host_ip_address - The IP address of a syslog server. Default Setting None Command Mode...
  • Page 322: Logging Trap

    Event Logging Commands Command Usage The command specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect on the kind of messages reported by the switch. However, it may be used by the syslog server to sort messages or to store messages in the corresponding database.
  • Page 323: Show Logging

    clear log This command clears messages from the log buffer. Syntax clear log [flash | ram] • flash - Event history stored in flash memory (i.e., permanent memory). • ram - Event history stored in temporary RAM (i.e., memory flushed on power reset).
  • Page 324: Show Logging Flash/Ram - Display Description

    Event Logging Commands Example The following example shows that system logging is enabled, the message level for flash memory is “errors” (i.e., default level 3 - 0), and the message level for RAM is “debugging” (i.e., default level 7 - 0). Console#show logging flash Syslog logging: History logging in FLASH: level errors...
  • Page 325: Show Log

    show log This command displays the log messages stored in local memory. Syntax show log {flash | ram} • flash - Event history stored in flash memory (i.e., permanent memory). • ram - Event history stored in temporary RAM (i.e., memory flushed on power reset).
  • Page 326 Event Logging Commands 37-8...
  • Page 327: Chapter 38: Smtp Alert Commands

    Chapter 38: SMTP Alert Commands These commands configure SMTP event handling, and forwarding of alert messages to the specified SMTP servers and email recipients. Command Function logging sendmail host SMTP servers to receive alert messages logging sendmail level Severity threshold used to trigger alert messages logging sendmail Email address used for “From”...
  • Page 328: Logging Sendmail Source-Email

    SMTP Alert Commands Example Console(config)#logging sendmail host 192.168.1.19 Console(config)# logging sendmail level This command sets the severity threshold used to trigger alert messages. Syntax logging sendmail level level level - One of the system message levels (page 9-1). Messages sent include the selected level down to level 0.
  • Page 329: Logging Sendmail Destination-Email

    Command Usage You may use an symbolic email address that identifies the switch, or the address of an administrator responsible for the switch. Example Console(config)#logging sendmail source-email bill@this-company.com Console(config)# logging sendmail destination-email This command specifies the email recipients of alert messages. Use the no form to remove a recipient.
  • Page 330: Show Logging Sendmail

    SMTP Alert Commands Example Console(config)#logging sendmail Console(config)# show logging sendmail This command displays the settings for the SMTP event handler. Command Mode Normal Exec, Privileged Exec Example Console#show logging sendmail SMTP servers ----------------------------------------------- 192.168.1.19 SMTP minimum severity level: 7 SMTP destination email addresses ----------------------------------------------- ted@this-company.com SMTP source email address: bill@this-company.com...
  • Page 331: Chapter 39: Time Commands

    Chapter 39: Time Commands The system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP). Maintaining an accurate time on the switch enables the system log to record meaningful dates and times for event entries. If the clock is not set, the switch will only record the time from the factory default set at the last bootup.
  • Page 332: Sntp Server

    Time Commands Example Console(config)#sntp server 10.1.0.19 Console(config)#sntp poll 60 Console(config)#sntp client Console(config)#end Console#show sntp Current time: Dec 23 02:52:44 2002 Poll interval: 60 Current mode: unicast SNTP status : Enabled SNTP server 137.92.140.80 0.0.0.0 0.0.0.0 Current server: 137.92.140.80 Console# Related Commands sntp server (39-2) sntp poll (39-3) show sntp (39-3)
  • Page 333: Sntp Poll

    Related Commands sntp client (39-1) sntp poll (39-3) show sntp (39-3) sntp poll This command sets the interval between sending time requests when the switch is set to SNTP client mode. Use the no form to restore to the default. Syntax sntp poll seconds no sntp poll...
  • Page 334: Clock Timezone

    Time Commands Example Console#show sntp Current time: Dec 23 05:13:28 2002 Poll interval: 16 Current mode: unicast SNTP status : Enabled SNTP server 137.92.140.80 0.0.0.0 0.0.0.0 Current server: 137.92.140.80 Console# clock timezone This command sets the time zone for the switch’s internal clock. Syntax clock timezone name hour hours minute minutes {before-utc | after-utc} •...
  • Page 335: Show Calendar

    calendar set This command sets the system clock. It may be used if there is no time server on your network, or if you have not configured the switch to receive signals from a time server. Syntax calendar set hour min sec {day month year | month day year} •...
  • Page 336 Time Commands 39-6...
  • Page 337: Chapter 40: Snmp Commands

    Chapter 40: SNMP Commands Controls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as the error types sent to trap managers. SNMP Version 3 also provides security features that cover message integrity, authentication, and encryption;...
  • Page 338: Snmp-Server

    SNMP Commands snmp-server This command enables the SNMPv3 engine and services for all management clients (i.e., versions 1, 2c, 3). Use the no form to disable the server. Syntax [no] snmp-server Default Setting Enabled Command Mode Global Configuration Example Console(config)#snmp-server Console(config)# show snmp This command can be used to check the status of SNMP communications.
  • Page 339: Snmp-Server Community

    Example Console#show snmp SNMP Agent: enabled SNMP traps: Authentication: enable Link-up-down: enable SNMP communities: 1. private, and the privilege is read-write 2. public, and the privilege is read-only 0 SNMP packets input 0 Bad SNMP version errors 0 Unknown community name 0 Illegal operation for community name supplied 0 Encoding errors 0 Number of requested variables...
  • Page 340: Snmp-Server Location

    SNMP Commands • private - Read/write access. Authorized management stations are able to both retrieve and modify MIB objects. Command Mode Global Configuration Example Console(config)#snmp-server community alpha rw Console(config)# snmp-server contact This command sets the system contact string. Use the no form to remove the system contact information.
  • Page 341: Snmp-Server Host

    Command Mode Global Configuration Example Console(config)#snmp-server location WC-19 Console(config)# Related Commands snmp-server contact (40-4) snmp-server host This command specifies the recipient of a Simple Network Management Protocol notification operation. Use the no form to remove the specified host. Syntax snmp-server host host-addr [inform [retry retries | timeout seconds]] community-string [version {1 | 2c | 3 {auth | noauth | priv} [udp-port port]} no snmp-server host host-addr •...
  • Page 342 SNMP Commands • SNMP Version: 1 • UDP Port: 162 Command Mode Global Configuration Command Usage • If you do not enter an snmp-server host command, no notifications are sent. In order to configure the switch to send SNMP notifications, you must enter at least one snmp-server host command.
  • Page 343: Snmp-Server Enable Traps

    supports. If the snmp-server host command does not specify the SNMP version, the default is to send SNMP version 1 notifications. • If you specify an SNMP Version 3 host, then the community string is interpreted as an SNMP user name. If you use the V3 “auth” or “priv” options, the user name must first be defined with the snmp-server user command.
  • Page 344: Snmp-Server Engine-Id

    SNMP Commands conjunction with the corresponding entries in the Notify View assigned by the snmp-server group command (page 40-11). Example Console(config)#snmp-server enable traps link-up-down Console(config)# Related Commands snmp-server host (40-5) snmp-server engine-id This command configures an identification string for the SNMPv3 engine. Use the no form to restore the default.
  • Page 345: Show Snmp Engine-Id

    • A local engine ID is automatically generated that is unique to the switch. This is referred to as the default engine ID. If the local engine ID is deleted or changed, all SNMP users will be cleared. You will need to reconfigure all existing users (page 40-14).
  • Page 346: Snmp-Server View

    SNMP Commands snmp-server view This command adds an SNMP view which controls user access to the MIB. Use the no form to remove an SNMP view. Syntax snmp-server view view-name oid-tree {included | excluded} no snmp-server view view-name • view-name - Name of an SNMP view. (Range: 1-64 characters) •...
  • Page 347: Snmp-Server Group

    show snmp view This command shows information on the SNMP views. Command Mode Privileged Exec Example Console#show snmp view View Name: mib-2 Subtree OID: 1.2.2.3.6.2.1 View Type: included Storage Type: permanent Row Status: active View Name: defaultview Subtree OID: 1 View Type: included Storage Type: volatile Row Status: active...
  • Page 348: Default Setting

    SNMP Commands • writeview - Defines the view for write access. (1-64 characters) • notifyview - Defines the view for notifications. (1-64 characters) Default Setting • Default groups: public • readview - Every object belonging to the Internet OID space (1.3.6.1). •...
  • Page 349: Show Snmp Group

    show snmp group Four default groups are provided – SNMPv1 read-only access and read/write access, and SNMPv2c read-only access and read/write access. Command Mode Privileged Exec Example Console#show snmp group Group Name: r&d Security Model: v3 Read View: defaultview Write View: daily Notify View: none Storage Type: permanent Row Status: active...
  • Page 350: Snmp-Server User

    SNMP Commands Table 40-4 show snmp group - display description (Continued) Field Description security model The SNMP version. readview The associated read view. writeview The associated write view. notifyview The associated notify view. storage-type The storage type for this entry. Row Status The row status of this entry.
  • Page 351: Show Snmp User

    Command Usage • The SNMP engine ID is used to compute the authentication/privacy digests from the password. You should therefore configure the engine ID with the snmp-server engine-id command before using this configuration command. • Before you configure a remote user, use the snmp-server engine-id command (page 40-8) to specify the engine ID for the remote device where the user resides.
  • Page 352: Show Snmp User - Display Description

    SNMP Commands Table 40-5 show snmp user - display description Field Description EngineId String identifying the engine ID. User Name Name of user connecting to the SNMP agent. Authentication Protocol The authentication protocol used with SNMPv3. Privacy Protocol The privacy protocol used with SNMPv3. Storage Type The storage type for this entry.
  • Page 353: User Account Commands

    Chapter 41: User Authentication Commands You can configure this switch to authenticate users logging into the system for management access using local or remote authentication methods. Command Group Function User Accounts Configures the basic user names and passwords for management access Authentication Sequence Defines logon authentication method and precedence...
  • Page 354: Enable Password

    User Authentication Commands • access-level level - Specifies the user level. The device has two predefined privilege levels: 0: Normal Exec, 15: Privileged Exec. • nopassword - No password is required for this user to log in. • {0 | 7} - 0 means plain password, 7 means encrypted password. •...
  • Page 355: Authentication Sequence

    Default Setting • The default is level 15. • The default password is “super” Command Mode Global Configuration Command Usage • You cannot set a null password. You will have to enter a password to change the command mode from Normal Exec to Privileged Exec with the enable command (page 33-1).
  • Page 356: Authentication Enable

    User Authentication Commands • tacacs - Use TACACS server password. Default Setting Local Command Mode Global Configuration Command Usage • RADIUS uses UDP while TACACS+ uses TCP. UDP only offers best effort delivery, while TCP offers a connection-oriented transport. Also, note that RADIUS encrypts only the password in the access-request packet from the client to the server, while TACACS+ encrypts the entire body of the packet.
  • Page 357: Radius Client

    Command Usage • RADIUS uses UDP while TACACS+ uses TCP. UDP only offers best effort delivery, while TCP offers a connection-oriented transport. Also, note that RADIUS encrypts only the password in the access-request packet from the client to the server, while TACACS+ encrypts the entire body of the packet. •...
  • Page 358: Radius-Server Host

    User Authentication Commands radius-server host This command specifies primary and backup RADIUS servers and authentication parameters that apply to each server. Use the no form to restore the default values. Syntax [no] radius-server index host {host_ip_address | host_alias} [auth-port auth_port] [timeout timeout] [retransmit retransmit] [key key] •...
  • Page 359: Radius-Server Retransmit

    Command Mode Global Configuration Example Console(config)#radius-server port 181 Console(config)# radius-server key This command sets the RADIUS encryption key. Use the no form to restore the default. Syntax radius-server key key_string no radius-server key key_string - Encryption key used to authenticate logon access for client. Do not use blank spaces in the string.
  • Page 360: Radius-Server Timeout

    User Authentication Commands radius-server timeout This command sets the interval between transmitting authentication requests to the RADIUS server. Use the no form to restore the default. Syntax radius-server timeout number_of_seconds no radius-server timeout number_of_seconds - Number of seconds the switch waits for a reply before resending a request.
  • Page 361: Tacacs-Server Host

    TACACS+ Client Terminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that uses software running on a central server to control access to TACACS-aware devices on the network. An authentication server contains a database of multiple user name/password pairs with associated privilege levels for each user or group that require management access to a switch.
  • Page 362: Show Tacacs-Server

    User Authentication Commands Default Setting Command Mode Global Configuration Example Console(config)#tacacs-server port 181 Console(config)# tacacs-server key This command sets the TACACS+ encryption key. Use the no form to restore the default. Syntax tacacs-server key key_string no tacacs-server key key_string - Encryption key used to authenticate logon access for the client.
  • Page 363: Ip Http Server

    Web Server Commands This section describes commands used to configure web browser management access to the switch. Command Function ip http port Specifies the port to be used by the web browser interface ip http server Allows the switch to be monitored or configured from a browser GC ip http secure-server Enables HTTPS (HTTP/SSL) for encrypted communications ip http secure-port...
  • Page 364: Ip Http Secure-Server

    User Authentication Commands Command Mode Global Configuration Example Console(config)#ip http server Console(config)# Related Commands ip http port (41-11) ip http secure-server This command enables the secure hypertext transfer protocol (HTTPS) over the Secure Socket Layer (SSL), providing secure access (i.e., an encrypted connection) to the switch’s web interface.
  • Page 365: Ip Http Secure-Port

    • The following web browsers and operating systems currently support HTTPS: Web Browser Internet Explorer 5.0 or later Netscape 6.2 or later • To specify a secure-site certificate, see “Replacing the Default Secure-site Certificate” on page 12-6. Also refer to the copy command on page 35-2. Example Console(config)#ip http secure-server Console(config)#...
  • Page 366: Ip Telnet Server

    User Authentication Commands Related Commands ip http secure-server (41-12) Telnet Server Commands This section describes commands used to configure Telnet management access to the switch. Table 41-9 Telnet Server Commands Command Function ip telnet server Allows the switch to be monitored or configured from Telnet; also specifies the port to be used by the Telnet interface ip telnet server This command allows this device to be monitored or configured from Telnet.
  • Page 367: Secure Shell Commands

    Secure Shell Commands This section describes the commands used to configure the SSH server. Note that you also need to install a SSH client on the management station when using this protocol to configure the switch. Note: The switch supports both SSH Version 1.5 and 2.0 clients. Table 41-10 Secure Shell Commands Command Function...
  • Page 368 User Authentication Commands 2. Provide Host Public Key to Clients – Many SSH client programs automatically import the host public key during the initial connection setup with the switch. Otherwise, you need to manually create a known hosts file on the management station and place the host public key in it.
  • Page 369: Ip Ssh Server

    c.If a match is found, the switch uses its secret key to generate a random 256-bit string as a challenge, encrypts this string with the user’s public key, and sends it to the client. d.The client uses its private key to decrypt the challenge string, computes the MD5 checksum, and sends the checksum back to the switch.
  • Page 370: Ip Ssh Timeout

    User Authentication Commands Example Console#ip ssh crypto host-key generate dsa Console#configure Console(config)#ip ssh server Console(config)# Related Commands ip ssh crypto host-key generate (41-20) show ssh (41-22) ip ssh timeout This command configures the timeout for the SSH server. Use the no form to restore the default setting.
  • Page 371: Ip Ssh Authentication-Retries

    ip ssh authentication-retries This command configures the number of times the SSH server attempts to reauthenticate a user. Use the no form to restore the default setting. Syntax ip ssh authentication-retries count no ip ssh authentication-retries count – The number of authentication attempts permitted after which the interface is reset.
  • Page 372: Ip Ssh Crypto Host-Key Generate

    User Authentication Commands delete public-key This command deletes the specified user’s public key. Syntax delete public-key username [dsa | rsa] • username – Name of an SSH user. (Range: 1-8 characters) • dsa – DSA public key type. • rsa – RSA public key type. Default Setting Deletes both the DSA and RSA key.
  • Page 373: Ip Ssh Crypto Zeroize

    Related Commands ip ssh crypto zeroize (41-21) ip ssh save host-key (41-21) ip ssh crypto zeroize This command clears the host key from memory (i.e. RAM). Syntax ip ssh crypto zeroize [dsa | rsa] • dsa – DSA key type. •...
  • Page 374: Show Ssh

    User Authentication Commands Example Console#ip ssh save host-key dsa Console# Related Commands ip ssh crypto host-key generate (41-20) show ip ssh This command displays the connection settings used when authenticating client access to the SSH server. Command Mode Privileged Exec Example Console#show ip ssh SSH Enabled - version 2.0...
  • Page 375: Show Public-Key

    Table 41-11 show ssh - display description (Continued) Field Description Encryption The encryption method is automatically negotiated between the client and server. Options for SSHv1.5 include: DES, 3DES Options for SSHv2.0 can include different algorithms for the client-to-server (ctos) and server-to-client (stoc): aes128-cbc-hmac-sha1 aes192-cbc-hmac-sha1 aes256-cbc-hmac-sha1...
  • Page 376: Management

    User Authentication Commands Example Console#show public-key host Host: RSA: 1024 65537 13236940658254764031382795526536375927835525327972629521130241 0719421061655759424590939236096954050362775257556251003866130989393834523 1033280214988866192159556859887989191950588394018138744046890877916030583 7768185490002831341625008348718449522087429212255691665655296328163516964 0408315547660664151657116381 DSA: ssh-dss AAAB3NzaC1kc3MAAACBAPWKZTPbsRIB8ydEXcxM3dyV/yrDbKStIlnzD/Dg0h2Hxc YV44sXZ2JXhamLK6P8bvuiyacWbUW/a4PAtp1KMSdqsKeh3hKoA3vRRSy1N2XFfAKxl5fwFfv JlPdOkFgzLGMinvSNYQwiQXbKTBH0Z4mUZpE85PWxDZMaCNBPjBrRAAAAFQChb4vsdfQGNIjw bvwrNLaQ77isiwAAAIEAsy5YWDC99ebYHNRj5kh47wY4i8cZvH+/p9cnrfwFTMU01VFDly3IR 2G395NLy5Qd7ZDxfA9mCOfT/yyEfbobMJZi8oGCstSNOxrZZVnMqWrTYfdrKX7YKBw/Kjw6Bm iFq7O+jAhf1Dg45loAc27s6TLdtny1wRq/ow2eTCD5nekAAACBAJ8rMccXTxHLFAczWS7EjOy DbsloBfPuSAb4oAsyjKXKVYNLQkTLZfcFRu41bS2KV5LAwecsigF/+DjKGWtPNIQqabKgYCw2 o/dVzX4Gg+yqdTlYmGA7fHGm8ARGeiG4ssFKy4Z6DmYPXFum1Yg0fhLwuHpOSKdxT3kk475S7 Console# IP Filter Commands This section describes commands used to configure IP management access to the switch.
  • Page 377: Show Management

    Command Mode Global Configuration Command Usage • If anyone tries to access a management interface on the switch from an invalid address, the switch will reject the connection, enter an event message in the system log, and send a trap message to the trap manager. •...
  • Page 378: User Authentication Commands

    User Authentication Commands Example Console#show management all-client Management Ip Filter HTTP-Client: Start IP address ----------------------------------------------- 1. 192.168.1.19 2. 192.168.1.25 SNMP-Client: Start IP address ----------------------------------------------- 1. 192.168.1.19 2. 192.168.1.25 TELNET-Client: Start IP address ----------------------------------------------- 1. 192.168.1.19 2. 192.168.1.25 Console# 41-26 End IP address 192.168.1.19 192.168.1.30 End IP address...
  • Page 379: Chapter 42: Port Security Commands

    Chapter 42: Port Security Commands These commands can be used to enable port security on a port. When using port security, the switch stops learning new MAC addresses on the specified port when it has reached a configured maximum number. Only incoming traffic with source addresses already stored in the dynamic or static address table for this port will be authorized to access the network.
  • Page 380 Port Security Commands Command Usage • If you enable port security, the switch stops learning new MAC addresses on the specified port when it has reached a configured maximum number. Only incoming traffic with source addresses already stored in the dynamic or static address table will be accepted.
  • Page 381: Chapter 43: 802.1X Port Authentication

    Chapter 43: 802.1X Port Authentication The switch supports IEEE 802.1X (dot1x) port-based access control that prevents unauthorized access to the network by requiring users to first submit credentials for authentication. Client authentication is controlled centrally by a RADIUS server using EAP (Extensible Authentication Protocol). Table 43-1 802.1X Port Authentication Commands Command Function...
  • Page 382: Dot1X Port-Control

    802.1X Port Authentication dot1x default This command sets all configurable dot1x global and port settings to their default values. Command Mode Global Configuration Example Console(config)#dot1x default Console(config)# dot1x max-req This command sets the maximum number of times the switch port will retransmit an EAP request/identity packet to the client before it times out the authentication session.
  • Page 383: Dot1X Operation-Mode

    • force-authorized – Configures the port to grant access to all clients, either dot1x-aware or otherwise. • force-unauthorized – Configures the port to deny access to all clients, either dot1x-aware or otherwise. Default force-authorized Command Mode Interface Configuration Example Console(config)#interface eth 1/2 Console(config-if)#dot1x port-control auto Console(config-if)# dot1x operation-mode...
  • Page 384: Dot1X Re-Authentication

    802.1X Port Authentication Example Console(config)#interface eth 1/2 Console(config-if)#dot1x operation-mode multi-host max-count 10 Console(config-if)# dot1x re-authenticate This command forces re-authentication on all ports or a specific interface. Syntax dot1x re-authenticate [interface] interface • ethernet unit/port - unit - Stack unit. (Range: Always 1) - port - Port number.
  • Page 385: Dot1X Timeout Re-Authperiod

    • The connected client is re-authenticated after the interval specified by the dot1x timeout re-authperiod command. The default is 3600 seconds. Example Console(config)#interface eth 1/2 Console(config-if)#dot1x re-authentication Console(config-if)# Related Commands dot1x timeout re-authperiod (43-5) dot1x timeout quiet-period This command sets the time that a switch port waits after the Max Request Count has been exceeded before attempting to acquire a new client.
  • Page 386: Dot1X Timeout Tx-Period

    802.1X Port Authentication Command Mode Interface Configuration Example Console(config)#interface eth 1/2 Console(config-if)#dot1x timeout re-authperiod 300 Console(config-if)# dot1x timeout tx-period This command sets the time that an interface on the switch waits during an authentication session before re-transmitting an EAP packet. Use the no form to reset to the default value.
  • Page 387 Command Usage This command displays the following information: • Global 802.1X Parameters – Shows whether or not 802.1X port authentication is globally enabled on the switch. • 802.1X Port Summary – Displays the port access control parameters for each interface that has enabled 802.1X, including the following items: •...
  • Page 388 802.1X Port Authentication • Request Count– Number of EAP Request packets sent to the Supplicant without receiving a response. • Identifier(Server)– Identifier carried in the most recent EAP Success, Failure or Request packet received from the Authentication Server. • Reauthentication State Machine •...
  • Page 389: Chapter 44: Access Control List Commands

    Chapter 44: Access Control List Commands Access Control Lists (ACL) provide packet filtering for IPv4 frames (based on address, protocol, Layer 4 protocol port number or TCP control code), IPv6 frames (based on address, next header type, or flow label), or any frames (based on MAC address or Ethernet type).
  • Page 390: Permit, Deny (Standard Ipv4 Acl)

    Access Control List Commands access-list ip This command adds an IP access list and enters configuration mode for standard or extended IPv4 ACLs. Use the no form to remove the specified ACL. Syntax [no] access-list ip {standard | extended} acl_name •...
  • Page 391: Permit, Deny (Extended Ipv4 Acl)

    Default Setting None Command Mode Standard IPv4 ACL Command Usage • New rules are appended to the end of the list. • Address bitmasks are similar to a subnet mask, containing four integers from 0 to 255, each separated by a period. The binary mask uses 1 bits to indicate “match”...
  • Page 392 Access Control List Commands • host – Keyword followed by a specific IP address. • precedence – IP precedence level. (Range: 0-7) • tos – Type of Service level. (Range: 0-15) • dscp – DSCP priority level. (Range: 0-63) • sport – Protocol •...
  • Page 393: Show Ip Access-List

    Example This example accepts any incoming packets if the source address is within subnet 10.7.1.x. For example, if the rule is matched; i.e., the rule (10.7.1.0 & 255.255.255.0) equals the masked address (10.7.1.2 & 255.255.255.0), the packet passes through. Console(config-ext-acl)#permit 10.7.1.1 255.255.255.0 any Console(config-ext-acl)# This allows TCP packets from class C addresses 192.168.1.0 to any destination address when set for destination TCP port 80 (i.e., HTTP).
  • Page 394: Show Ip Access-Group

    Access Control List Commands ip access-group This command binds a port to an IPv4 ACL. Use the no form to remove the port. Syntax [no] ip access-group acl_name in • acl_name – Name of the ACL. (Maximum length: 16 characters) •...
  • Page 395: Access-List Ipv6

    IPv6 ACLs The commands in this section configure ACLs based on IPv6 addresses, next header type, and flow label. To configure IPv6 ACLs, first create an access list containing the required permit or deny rules, and then bind the access list to one or more ports Command Function...
  • Page 396: Permit, Deny (Standard Ipv6 Acl)

    Access Control List Commands Example Console(config)#access-list ipv6 standard david Console(config-std-ipv6-acl)# Related Commands permit, deny (44-8) ipv6 access-group (44-11) show ipv6 access-list (44-10) permit, deny (Standard IPv6 ACL) This command adds a rule to a Standard IPv6 ACL. The rule sets a filter condition for packets emanating from the specified source.
  • Page 397: Permit, Deny (Extended Ipv6 Acl)

    permit, deny (Extended IPv6 ACL) This command adds a rule to an Extended IPv6 ACL. The rule sets a filter condition for packets with specific destination IP addresses, next header type, or flow label. Use the no form to remove a rule. Syntax [no] {permit | deny} {any | destination-ipv6-address[/prefix-length]}...
  • Page 398: Show Ipv6 Access-List

    Access Control List Commands e.g., in a hop-by-hop option. A flow is uniquely identified by the combination of a source address and a non-zero flow label. Packets that do not belong to a flow carry a flow label of zero. •...
  • Page 399: Show Ipv6 Access-Group

    Command Mode Privileged Exec Example Console#show ipv6 access-list standard IPv6 standard access-list david: permit host 2009:DB9:2229::79 permit 2009:DB9:2229:5::/64 Console# Related Commands permit, deny (44-8) ipv6 access-group (44-11) ipv6 access-group This command binds a port to an IPv6 ACL. Use the no form to remove the port. Syntax [no] ipv6 access-group acl_name in •...
  • Page 400: Access-List Mac

    Access Control List Commands Example Console#show ip access-group Interface ethernet 1/2 IPv6 standard access-list david in Console# Related Commands ipv6 access-group (44-11) MAC ACLs The commands in this section configure ACLs based on hardware addresses, packet format, and Ethernet type. To configure MAC ACLs, first create an access list containing the required permit or deny rules, and then bind the access list to one or more ports Command...
  • Page 401: Permit, Deny (Mac Acl)

    • An ACL can contain up to 32 rules. Example Console(config)#access-list mac jerry Console(config-mac-acl)# Related Commands permit, deny (44-13) mac access-group (44-15) show mac access-list (44-14) permit, deny (MAC ACL) This command adds a rule to a MAC ACL. The rule filters packets matching a specified MAC source or destination address (i.e., physical layer address), or Ethernet protocol type.
  • Page 402: Show Mac Access-List

    Access Control List Commands • source – Source MAC address. • destination – Destination MAC address range with bitmask. • address-bitmask • vid – VLAN ID. (Range: 1-4093) • vid-bitmask – VLAN bitmask. (Range: 1-4093) • protocol – A specific Ethernet protocol number. (Range: 600-fff hex.) •...
  • Page 403: Show Mac Access-Group

    Example Console#show mac access-list MAC access-list jerry: permit any 00-e0-29-94-34-de ethertype 0800 Console# Related Commands permit, deny 44-13 mac access-group (44-15) mac access-group This command binds a port to a MAC ACL. Use the no form to remove the port. Syntax mac access-group acl_name in •...
  • Page 404: Show Access-Group

    Access Control List Commands Example Console#show mac access-group Interface ethernet 1/5 MAC access-list M5 in Console# Related Commands mac access-group (44-15) ACL Information This section describes commands used to display ACL information. Table 44-5 ACL Information Commands Command Function show access-list Show all IPv4 ACLs and associated rules show access-group Shows the IPv4 ACLs assigned to each port...
  • Page 405 Example Console#show access-group Interface ethernet 1/2 IP standard access-list david MAC access-list jerry Console# ACL Information 44-17...
  • Page 406 Access Control List Commands 44-18...
  • Page 407: Chapter 45: Interface Commands

    Chapter 45: Interface Commands These commands are used to display or set communication parameters for an Ethernet port, aggregated link, or VLAN. Command Function interface Configures an interface type and enters interface configuration mode description Adds a description to an interface configuration speed-duplex Configures the speed and duplex operation of a given interface when autonegotiation is disabled...
  • Page 408: Description

    Interface Commands Command Mode Global Configuration Example To specify port 4, enter the following command: Console(config)#interface ethernet 1/4 Console(config-if)# description This command adds a description to an interface. Use the no form to remove the description. Syntax description string no description string - Comment or a description to help you remember what is attached to this interface.
  • Page 409: Negotiation

    Default Setting • Auto-negotiation is enabled by default. • When auto-negotiation is disabled, the default speed-duplex setting is: -Gigabit Ethernet ports – 1000full (1 Gbps full-duplex) Command Mode Interface Configuration (Ethernet, Port Channel) Command Usage • To force operation to the speed and duplex mode specified in a speed-duplex command, use the no negotiation command to disable auto-negotiation on the selected interface.
  • Page 410: Capabilities

    Interface Commands • If autonegotiation is disabled, auto-MDI/MDI-X pin signal configuration will also be disabled for the RJ-45 ports. Example The following example configures port 11 to use autonegotiation. Console(config)#interface ethernet 1/11 Console(config-if)#negotiation Console(config-if)# Related Commands capabilities (45-4) speed-duplex (45-2) capabilities This command advertises the port capabilities of a given interface during autonegotiation.
  • Page 411: Flowcontrol

    Example The following example configures Ethernet port 5 capabilities to 100half and 100full. Console(config)#interface ethernet 1/5 Console(config-if)#capabilities 100half Console(config-if)#capabilities 100full Console(config-if)# Related Commands negotiation (45-3) speed-duplex (45-2) flowcontrol (45-5) flowcontrol This command enables flow control. Use the no form to disable flow control. Syntax [no] flowcontrol Default Setting...
  • Page 412: Media-Type

    Interface Commands Related Commands negotiation (45-3) capabilities (flowcontrol, symmetric) (45-4) media-type This command forces the port type selected for combination ports 21-24/45-48. Use the no form to restore the default mode. Syntax media-type mode no media-type • mode -copper-forced - Always uses the built-in RJ-45 port. -sfp-forced - Always uses the SFP port (even if module not installed).
  • Page 413: Clear Counters

    Command Usage This command allows you to disable a port due to abnormal behavior (e.g., excessive collisions), and then reenable it after the problem has been resolved. You may also want to disable a port for security reasons. Example The following example disables port 5. Console(config)#interface ethernet 1/5 Console(config-if)#shutdown Console(config-if)#...
  • Page 414: Show Interfaces Status

    Interface Commands show interfaces status This command displays the status for an interface. Syntax show interfaces status [interface] interface • ethernet unit/port - unit - Stack unit. (Range: Always 1) - port - Port number. (Range: 1-24/48) • port-channel channel-id (Range: 1-24) •...
  • Page 415: Show Interfaces Counters

    show interfaces counters This command displays interface statistics. Syntax show interfaces counters [interface] interface • ethernet unit/port - unit - Stack unit. (Range: Always 1) - port - Port number. (Range: 1-24/48) • port-channel channel-id (Range: 1-24) Default Setting Shows the counters for all interfaces. Command Mode Normal Exec, Privileged Exec Command Usage...
  • Page 416: Show Interfaces Switchport

    Interface Commands show interfaces switchport This command displays the administrative and operational status of the specified interfaces. Syntax show interfaces switchport [interface] interface • ethernet unit/port - unit - Stack unit. (Range: Always 1) - port - Port number. (Range: 1-24/48) •...
  • Page 417 Table 45-2 show interfaces switchport - display description (Continued) Field Description VLAN membership mode Indicates membership mode as Trunk or Hybrid (page 52-8). Ingress rule Shows if ingress filtering is enabled or disabled (page 52-9). Acceptable frame type Shows if acceptable VLAN frames include all types or tagged frames only (page 52-9).
  • Page 418 Interface Commands 45-12...
  • Page 419: Chapter 46: Link Aggregation Commands

    Chapter 46: Link Aggregation Commands Ports can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth of a network connection or to ensure fault recovery. Or you can use the Link Aggregation Control Protocol (LACP) to automatically negotiate a trunk link between this switch and another network device.
  • Page 420: Channel-Group

    Link Aggregation Commands • All the ports in a trunk have to be treated as a whole when moved from/to, added or deleted from a VLAN via the specified port-channel. • STP, VLAN, and IGMP settings can only be made for the entire trunk via the specified port-channel.
  • Page 421: Port Channel Load-Balance

    port channel load-balance This command sets the load-distribution method among ports in aggregated links (for both static and dynamic trunks). Use the no form to restore the default setting. Syntax port channel load-balance {dst-ip | dst-mac | src-dst-ip | src-dst-mac | src-ip | src-mac} no port channel load-balance •...
  • Page 422: Lacp

    Link Aggregation Commands - src-dst-ip: All traffic with the same source and destination IP address is output on the same link in a trunk. This mode works best for switch-to-router trunk links where traffic through the switch is received from and destined for many different hosts.
  • Page 423: Lacp System-Priority

    Example The following shows LACP enabled on ports 10-12. Because LACP has also been enabled on the ports at the other end of the links, the show interfaces status port-channel 1 command shows that Trunk1 has been established. Console(config)#interface ethernet 1/10 Console(config-if)#lacp Console(config-if)#exit Console(config)#interface ethernet 1/11...
  • Page 424: Lacp Admin-Key (Ethernet Interface)

    Link Aggregation Commands Command Mode Interface Configuration (Ethernet) Command Usage • Port must be configured with the same system priority to join the same LAG. • System priority is combined with the switch’s MAC address to form the LAG identifier. This identifier is used to indicate a specific LAG during LACP negotiations with other systems.
  • Page 425: Lacp Admin-Key (Port Channel)

    • Once the remote side of a link has been established, LACP operational settings are already in use on that side. Configuring LACP settings for the partner only applies to its administrative state, not its operational state, and will only take effect the next time an aggregate link is established with the partner.
  • Page 426: Lacp Port-Priority

    Link Aggregation Commands lacp port-priority This command configures LACP port priority. Use the no form to restore the default setting. Syntax lacp {actor | partner} port-priority priority no lacp {actor | partner} port-priority • actor - The local side an aggregate link. •...
  • Page 427: Show Lacp Counters - Display Description

    Default Setting Port Channel: all Command Mode Privileged Exec Example Console#show lacp 1 counters Port channel: 1 ------------------------------------------------------------------------- Eth 1/ 2 ------------------------------------------------------------------------- LACPDUs Sent: LACPDUs Receive: Marker Sent: Marker Receive: LACPDUs Unknown Pkts: 0 LACPDUs Illegal Pkts: 0 Table 46-2 show lacp counters - display description Field Description LACPDUs Sent...
  • Page 428: Show Lacp Neighbors - Display Description

    Link Aggregation Commands Table 46-3 show lacp internal - display description Field Description Oper Key Current operational value of the key for the aggregation port. Admin Key Current administrative value of the key for the aggregation port. LACPDUs Internal Number of seconds before invalidating received LACPDU information. LACP System Priority LACP system priority assigned to this port channel.
  • Page 429: Show Port-Channel Load-Balance

    Table 46-4 show lacp neighbors - display description (Continued) Field Description Partner Admin Current administrative value of the port number for the protocol Partner. Port Number Partner Oper Operational port number assigned to this aggregation port by the port’s protocol Port Number partner.
  • Page 430 Link Aggregation Commands Example Console#show port-channel load-balance Source and destination IP address Console# 46-12...
  • Page 431: Chapter 47: Broadcast Storm Control Commands

    Chapter 47: Broadcast Storm Control Commands These commands can be used to enable broadcast storm control on a port. You can protect your network from broadcast storms by setting a threshold for broadcast traffic for each port. Any broadcast packets exceeding the specified threshold will then be dropped.
  • Page 432 Broadcast Storm Control Commands 47-2...
  • Page 433: Chapter 48: Mirror Port Commands

    Chapter 48: Mirror Port Commands This section describes how to mirror traffic from a source port to a target port. Command Function port monitor Configures a mirror session show port monitor Shows the configuration for a mirror port port monitor This command configures a mirror session.
  • Page 434: Show Port Monitor

    Mirror Port Commands Example The following example configures the switch to mirror all packets from port 6 to 11: Console(config)#interface ethernet 1/11 Console(config-if)#port monitor ethernet 1/6 both Console(config-if)# show port monitor This command displays mirror information. Syntax show port monitor [interface] interface - ethernet unit/port (source port) •...
  • Page 435: Chapter 49: Rate Limit Commands

    Chapter 49: Rate Limit Commands This function allows the network manager to control the maximum rate for traffic transmitted or received on an interface. Rate limiting is configured on interfaces at the edge of a network to limit traffic into or out of the network. Traffic that falls within the rate limit is transmitted, while packets that exceed the acceptable amount of traffic are dropped.
  • Page 436 Rate Limit Commands 49-2...
  • Page 437: Chapter 50: Address Table Commands

    Chapter 50: Address Table Commands These commands are used to configure the address table for filtering specified addresses, displaying current entries, clearing the table, or setting the aging time. Table 50-1 Address Table Commands Command Function mac-address-table static Maps a static address to a port in a VLAN clear mac-address-table Removes any learned entries from the forwarding database PE dynamic...
  • Page 438: Clear Mac-Address-Table Dynamic

    Address Table Commands Command Usage The static address for a host device can be assigned to a specific port within a specific VLAN. Use this command to add static addresses to the MAC Address Table. Static addresses have the following characteristics: •...
  • Page 439: Show Mac-Address-Table

    show mac-address-table This command shows classes of entries in the bridge-forwarding database. Syntax show mac-address-table [address mac-address [mask]] [interface interface] [vlan vlan-id] [sort {address | vlan | interface}] • mac-address - MAC address. • mask - Bits to match in the address. •...
  • Page 440: Show Mac-Address-Table Aging-Time

    Address Table Commands mac-address-table aging-time This command sets the aging time for entries in the address table. Use the no form to restore the default aging time. Syntax mac-address-table aging-time seconds no mac-address-table aging-time seconds - Aging time. (Range: 10-1000000 seconds; 0 to disable aging) Default Setting 300 seconds Command Mode...
  • Page 441: Chapter 51: Spanning Tree Commands

    Chapter 51: Spanning Tree Commands This section includes commands that configure the Spanning Tree Algorithm (STA) globally for the switch, and commands that configure STA for the selected interface. Table 51-1 Spanning Tree Commands Command Function spanning-tree Enables the spanning tree protocol spanning-tree mode Configures STP, RSTP or MSTP mode spanning-tree forward-time...
  • Page 442: Spanning-Tree Mode

    Spanning Tree Commands spanning-tree This command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it. Syntax [no] spanning-tree Default Setting Spanning tree is enabled. Command Mode Global Configuration Command Usage The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers.
  • Page 443: Spanning-Tree Forward-Time

    Command Usage • Spanning Tree Protocol Uses RSTP for the internal state machine, but sends only 802.1D BPDUs. - This creates one spanning tree instance for the entire network. If multiple VLANs are implemented on a network, the path between specific VLAN members may be inadvertently disabled to prevent network loops, thus isolating group members.
  • Page 444: Spanning-Tree Hello-Time

    Spanning Tree Commands Default Setting 15 seconds Command Mode Global Configuration Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames.
  • Page 445: Spanning-Tree Priority

    spanning-tree max-age This command configures the spanning tree bridge maximum age globally for this switch. Use the no form to restore the default. Syntax spanning-tree max-age seconds no spanning-tree max-age seconds - Time in seconds. (Range: 6-40 seconds) The minimum value is the higher of 6 or [2 x (hello-time + 1)]. The maximum value is the lower of 40 or [2 x (forward-time - 1)].
  • Page 446: Spanning-Tree Pathcost Method

    Spanning Tree Commands Default Setting 32768 Command Mode Global Configuration Command Usage Bridge priority is used in selecting the root device, root port, and designated port. The device with the highest priority (i.e., lower numeric value) becomes the STA root device. However, if all devices have the same priority, the device with the lowest MAC address will then become the root device.
  • Page 447: Spanning-Tree Transmission-Limit

    spanning-tree transmission-limit This command configures the minimum interval between the transmission of consecutive RSTP/MSTP BPDUs. Use the no form to restore the default. Syntax spanning-tree transmission-limit count no spanning-tree transmission-limit count - The transmission limit in seconds. (Range: 1-10) Default Setting Command Mode Global Configuration Command Usage...
  • Page 448: Mst Vlan

    Spanning Tree Commands mst vlan This command adds VLANs to a spanning tree instance. Use the no form to remove the specified VLANs. Using the no form without any VLAN parameters to remove all VLANs. Syntax [no] mst instance_id vlan vlan-range •...
  • Page 449: Mst Priority

    mst priority This command configures the priority of a spanning tree instance. Use the no form to restore the default. Syntax mst instance_id priority priority no mst instance_id priority • instance_id - Instance identifier of the spanning tree. (Range: 0-4094) •...
  • Page 450: Revision

    Spanning Tree Commands Command Usage The MST region name and revision number (page 51-10) are used to designate a unique MST region. A bridge (i.e., spanning-tree compliant device such as this switch) can only belong to one MST region. And all bridges in the same region must be configured with the same MST instances.
  • Page 451: Spanning-Tree Spanning-Disabled

    max-hops This command configures the maximum number of hops in the region before a BPDU is discarded. Use the no form to restore the default. Syntax max-hops hop-number hop-number - Maximum hop number for multiple spanning tree. (Range: 1-40) Default Setting Command Mode MST Configuration Command Usage...
  • Page 452: Spanning-Tree Cost

    Spanning Tree Commands spanning-tree cost This command configures the spanning tree path cost for the specified interface. Use the no form to restore the default. Syntax spanning-tree cost cost no spanning-tree cost cost - The path cost for the port. (Range: 0 for auto-configuration, or 1-200,000,000) The recommended range is: •Ethernet: 200,000-20,000,000...
  • Page 453: Spanning-Tree Port-Priority

    spanning-tree port-priority This command configures the priority for the specified interface. Use the no form to restore the default. Syntax spanning-tree port-priority priority no spanning-tree port-priority priority - The priority for a port. (Range: 0-240, in steps of 16) Default Setting Command Mode Interface Configuration (Ethernet, Port Channel) Command Usage...
  • Page 454: Spanning-Tree Portfast

    Spanning Tree Commands cause forwarding loops, they can pass directly through to the spanning tree forwarding state. Specifying Edge Ports provides quicker convergence for devices such as workstations or servers, retains the current forwarding database to reduce the amount of frame flooding required to rebuild address tables during reconfiguration events, does not cause the spanning tree to initiate reconfiguration when the interface changes state, and also overcomes other STA-related timeout problems.
  • Page 455: Spanning-Tree Link-Type

    Example Console(config)#interface ethernet 1/5 Console(config-if)#bridge-group 1 portfast Console(config-if)# Related Commands spanning-tree edge-port (51-13) spanning-tree link-type This command configures the link type for Rapid Spanning Tree and Multiple Spanning Tree. Use the no form to restore the default. Syntax spanning-tree link-type {auto | point-to-point | shared} no spanning-tree link-type •...
  • Page 456: Spanning-Tree Mst Cost

    Spanning Tree Commands spanning-tree mst cost This command configures the path cost on a spanning instance in the Multiple Spanning Tree. Use the no form to restore the default. Syntax spanning-tree mst instance_id cost cost no spanning-tree mst instance_id cost •...
  • Page 457: Spanning-Tree Protocol-Migration

    spanning-tree mst port-priority This command configures the interface priority on a spanning instance in the Multiple Spanning Tree. Use the no form to restore the default. Syntax spanning-tree mst instance_id port-priority priority no spanning-tree mst instance_id port-priority • instance_id - Instance identifier of the spanning tree. (Range: 0-4094, no leading zeroes) •...
  • Page 458: Show Spanning-Tree

    Spanning Tree Commands Command Mode Privileged Exec Command Usage If at any time the switch detects STP BPDUs, including Configuration or Topology Change Notification BPDUs, it will automatically set the selected interface to forced STP-compatible mode. However, you can also use the spanning-tree protocol-migration command at any time to manually re-check the appropriate BPDU format to send on the selected interfaces (i.e., RSTP or STP-compatible).
  • Page 459 • For a description of the items displayed under “Spanning-tree information,” see “Configuring Global Settings” on page 22-6. For a description of the items displayed for specific interfaces, see “Displaying Interface Settings” on page 22-10. Example Console#show spanning-tree Spanning-tree information --------------------------------------------------------------- Spanning tree mode: Spanning tree enable/disable:...
  • Page 460: Show Spanning-Tree Mst Configuration

    Spanning Tree Commands show spanning-tree mst configuration This command shows the configuration of the multiple spanning tree. Command Mode Privileged Exec Example Console#show spanning-tree mst configuration Mstp Configuration Information -------------------------------------------------------------- Configuration name: R&D Revision level:0 Instance Vlans -------------------------------------------------------------- Console# 51-20...
  • Page 461: Chapter 52: Vlan Commands

    Chapter 52: VLAN Commands A VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong to the same physical segment. This section describes commands used to create VLAN groups, add port members, specify how VLAN tagging is used, and enable automatic VLAN registration for the selected interface.
  • Page 462: Bridge-Ext Gvrp

    VLAN Commands bridge-ext gvrp This command enables GVRP globally for the switch. Use the no form to disable it. Syntax [no] bridge-ext gvrp Default Setting Disabled Command Mode Global Configuration Command Usage GVRP defines a way for switches to exchange VLAN information in order to register VLAN members on ports across the network.
  • Page 463: Show Gvrp Configuration

    switchport gvrp This command enables GVRP for a port. Use the no form to disable it. Syntax [no] switchport gvrp Default Setting Disabled Command Mode Interface Configuration (Ethernet, Port Channel) Example Console(config)#interface ethernet 1/1 Console(config-if)#switchport gvrp Console(config-if)# show gvrp configuration This command shows if GVRP is enabled.
  • Page 464: Garp Timer

    VLAN Commands garp timer This command sets the values for the join, leave and leaveall timers. Use the no form to restore the timers’ default values. Syntax garp timer {join | leave | leaveall} timer_value no garp timer {join | leave | leaveall} •...
  • Page 465: Editing Vlan Groups

    show garp timer This command shows the GARP timers for the selected interface. Syntax show garp timer [interface] interface • ethernet unit/port - unit - Stack unit. (Range: Always 1) - port - Port number. (Range: 1-24/48) • port-channel channel-id (Range: 1-24) Default Setting Shows all GARP timers.
  • Page 466: Vlan

    VLAN Commands Command Usage • Use the VLAN database command mode to add, change, and delete VLANs. After finishing configuration changes, you can display the VLAN settings by entering the show vlan command. • Use the interface vlan command mode to define the port membership mode and add or remove ports from a VLAN.
  • Page 467: Configuring Vlan Interfaces

    Example The following example adds a VLAN, using VLAN ID 105 and name RD5. The VLAN is activated by default. Console(config)#vlan database Console(config-vlan)#vlan 105 name RD5 media ethernet Console(config-vlan)# Related Commands show vlan (52-17) Configuring VLAN Interfaces Table 52-4 Commands for Configuring VLAN Interfaces Command Function interface vlan...
  • Page 468: Switchport Mode

    VLAN Commands Example The following example shows how to set the interface configuration mode to VLAN 1, and then assign an IP address to the VLAN: Console(config)#interface vlan 1 Console(config-if)#ip address 192.168.1.254 255.255.255.0 Console(config-if)# Related Commands shutdown (45-6) switchport mode This command configures the VLAN membership mode for a port.
  • Page 469: Switchport Acceptable-Frame-Types

    switchport acceptable-frame-types This command configures the acceptable frame types for a port. Use the no form to restore the default. Syntax switchport acceptable-frame-types {all | tagged} no switchport acceptable-frame-types • all - The port accepts all frames, tagged or untagged. •...
  • Page 470: Switchport Native Vlan

    VLAN Commands • If ingress filtering is enabled and a port receives frames tagged for VLANs for which it is not a member, these frames will be discarded. • Ingress filtering does not affect VLAN independent BPDU frames, such as GVRP or STA.
  • Page 471: Switchport Allowed Vlan

    switchport allowed vlan This command configures VLAN groups on the selected interface. Use the no form to restore the default. Syntax switchport allowed vlan {add vlan-list [tagged | untagged] | remove vlan-list} no switchport allowed vlan • add vlan-list - List of VLAN identifiers to add. •...
  • Page 472: Switchport Forbidden Vlan

    VLAN Commands switchport forbidden vlan This command configures forbidden VLANs. Use the no form to remove the list of forbidden VLANs. Syntax switchport forbidden vlan {add vlan-list | remove vlan-list} no switchport forbidden vlan • add vlan-list - List of VLAN identifiers to add. •...
  • Page 473: Configuring Ieee 802.1Q Tunneling

    Configuring IEEE 802.1Q Tunneling IEEE 802.1Q tunneling (QinQ tunneling) uses a single Service Provider VLAN (SPVLAN) for customers who have multiple VLANs. Customer VLAN IDs are preserved and traffic from different customers is segregated within the service provider’s network even when they use the same customer-specific VLAN IDs. QinQ tunneling expands VLAN space by using a VLAN-in-VLAN hierarchy, preserving the customer’s original tagged packets, and adding SPVLAN tags to each frame (also called double tagging).
  • Page 474: Dot1Q-Tunnel System-Tunnel-Control

    VLAN Commands dot1q-tunnel system-tunnel-control This command sets the switch to operate in QinQ mode. Use the no form to disable QinQ operating mode. Syntax [no] dot1q-tunnel system-tunnel-control Default Setting Disabled Command Mode Global Configuration Command Usage QinQ tunnel mode must be enabled on the switch for QinQ interface settings to be functional.
  • Page 475: Switchport Dot1Q-Tunnel Tpid

    Example Console(config)#interface ethernet 1/1 Console(config-if)#switchport dot1q-tunnel mode access Console(config-if)# Related Commands show dot1q-tunnel (52-16) show interfaces switchport (45-10) switchport dot1q-tunnel tpid This command sets the Tag Protocol Identifier (TPID) value of a tunnel port. Use the no form to restore the default setting. Syntax switchport dot1q-tunnel tpid tpid no switchport dot1q-tunnel tpid...
  • Page 476: Displaying Vlan Information

    VLAN Commands show dot1q-tunnel This command displays information about QinQ tunnel ports. Command Mode Privileged Exec Example Console(config)#dot1q-tunnel system-tunnel-control Console(config)#interface ethernet 1/1 Console(config-if)#switchport dot1q-tunnel mode access Console(config-if)#interface ethernet 1/2 Console(config-if)#switchport dot1q-tunnel mode uplink Console(config-if)#end Console#show dot1q-tunnel Current double-tagged status of the system is Enabled The dot1q-tunnel mode of the set interface 1/1 is Access mode, TPID is 0x8100.
  • Page 477: Show Vlan

    show vlan This command shows VLAN information. Syntax show vlan [id vlan-id | name vlan-name] • id - Keyword to be followed by the VLAN ID. vlan-id - ID of the configured VLAN. (Range: 1-4093, no leading zeroes) • name - Keyword to be followed by the VLAN name. vlan-name - ASCII string from 1 to 32 characters.
  • Page 478 VLAN Commands 52-18...
  • Page 479: Chapter 53: Private Vlan Commands

    Chapter 53: Private VLAN Commands Private VLANs provide port-based security and isolation between ports within the assigned VLAN. This section describes commands used to configure private VlANs. Command Function pvlan Enables and configured private VLANS show pvlan Displays the configured private VLANS pvlan This command enables or configures a private VLAN.
  • Page 480: Show Pvlan

    Private VLAN Commands show pvlan This command displays the configured private VLAN. Command Mode Privileged Exec Example Console#show pvlan Private VLAN status: Enabled Up-link port: Ethernet 1/12 Down-link port: Ethernet 1/5 Ethernet 1/6 Ethernet 1/7 Ethernet 1/8 Console# 53-2...
  • Page 481: Chapter 54: Protocol-Based Vlan Commands

    Chapter 54: Protocol-based VLAN Commands The network devices required to support multiple protocols cannot be easily grouped into a common VLAN. This may require non-standard devices to pass traffic between different VLANs in order to encompass all the devices participating in a specific protocol.
  • Page 482: Protocol-Vlan Protocol-Group (Configuring Interfaces)

    Protocol-based VLAN Commands • protocol - Protocol type. The only option for the llc_other frame type is ipx_raw. The options for all other frames types include: ip, ipv6, arp, rarp, and user-defined (0801-FFFF hexadecimal). Default Setting No protocol groups are configured. Command Mode Global Configuration Example...
  • Page 483: Show Protocol-Vlan Protocol-Group

    - If the frame is untagged and the protocol type matches, the frame is forwarded to the appropriate VLAN. - If the frame is untagged but the protocol type does not match, the frame is forwarded to the default VLAN for this interface. Example The following example maps the traffic entering Port 1 which matches the protocol type specified in protocol group 1 to VLAN 2.
  • Page 484: Show Interfaces Protocol-Vlan Protocol-Group

    Protocol-based VLAN Commands show interfaces protocol-vlan protocol-group This command shows the mapping from protocol groups to VLANs for the selected interfaces. Syntax show interfaces protocol-vlan protocol-group [interface] interface • ethernet unit/port - unit - Stack unit. (Range: Always 1) - port - Port number. (Range: 1-24/48) •...
  • Page 485: Priority Commands

    Chapter 55: Class of Service Commands The commands described in this section allow you to specify which data packets have greater precedence when traffic is buffered in the switch due to congestion. This switch supports CoS with eight priority queues for each port. Data packets in a port’s high-priority queue will be transmitted before those in the lower-priority queues.
  • Page 486: Queue Mode

    Class of Service Commands queue mode This command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for the class of service (CoS) priority queues. Use the no form to restore the default value. Syntax queue mode {strict | wrr} no queue mode •...
  • Page 487: Switchport Priority Default

    switchport priority default This command sets a priority for incoming untagged frames. Use the no form to restore the default value. Syntax switchport priority default default-priority-id no switchport priority default default-priority-id - The priority number for untagged ingress traffic. The priority is a number from 0 to 7. Seven is the highest priority. Default Setting The priority is not set, and the default value for untagged frames received on the interface is zero.
  • Page 488: Queue Bandwidth

    Class of Service Commands queue bandwidth This command assigns weighted round-robin (WRR) weights to the eight class of service (CoS) priority queues. Use the no form to restore the default weights. Syntax queue bandwidth weight1...weight4 no queue bandwidth weight1...weight4 - The ratio of weights for queues 0 - 7 determines the weights used by the WRR scheduler.
  • Page 489: Show Queue Mode

    Default Setting This switch supports Class of Service by using eight priority queues, with Weighted Round Robin queuing for each port. Eight separate traffic classes are defined in IEEE 802.1p. The default priority levels are assigned according to recommendations in the IEEE 802.1p standard as shown below. Priority Queue Command Mode...
  • Page 490: Show Queue Bandwidth

    Class of Service Commands show queue bandwidth This command displays the weighted round-robin (WRR) bandwidth allocation for the eight priority queues. Default Setting None Command Mode Privileged Exec Example Console#show queue bandwidth Information of Eth 1/1 Queue ID Weight -------- ------ show queue cos-map This command shows the class of service priority map.
  • Page 491: Map Ip Port (Global Configuration)

    Priority Commands (Layer 3 and 4) This section describes commands used to configure Layer 3 and Layer 4 traffic priority on the switch. Table 55-4 Priority Commands (Layer 3 and 4) Command Function map ip port Enables TCP/UDP class of service mapping map ip port Maps TCP/UDP socket to a class of service map ip precedence...
  • Page 492: Map Ip Precedence (Global Configuration)

    Class of Service Commands map ip port (Interface Configuration) This command sets IP port priority (i.e., TCP/UDP port priority). Use the no form to remove a specific setting. Syntax map ip port port-number cos cos-value no map ip port port-number •...
  • Page 493: Map Ip Precedence (Interface Configuration)

    Example The following example shows how to enable IP precedence mapping globally: Console(config)#map ip precedence Console(config)# map ip precedence (Interface Configuration) This command sets IP precedence priority (i.e., IP Type of Service priority). Use the no form to restore the default table. Syntax map ip precedence ip-precedence-value cos cos-value no map ip precedence...
  • Page 494: Map Ip Dscp (Interface Configuration)

    Class of Service Commands map ip dscp (Global Configuration) This command enables IP DSCP mapping (i.e., Differentiated Services Code Point mapping). Use the no form to disable IP DSCP mapping. Syntax [no] map ip dscp Default Setting Disabled Command Mode Global Configuration Command Usage •...
  • Page 495: Show Map Ip Port

    Default Setting The DSCP default values are defined in the following table. Note that all the DSCP values that are not specified are mapped to CoS value 0. Table 55-6 Mapping IP DSCP to CoS Values IP DSCP Value 10, 12, 14, 16 18, 20, 22, 24 26, 28, 30, 32, 34, 36 38, 40, 42...
  • Page 496: Show Map Ip Precedence

    Class of Service Commands Default Setting None Command Mode Privileged Exec Example The following shows that HTTP traffic has been mapped to CoS value 0: Console#show map ip port TCP port mapping status: disabled Port Port no. COS --------- -------- --- Eth 1/ 5 Console# Related Commands...
  • Page 497: Show Map Ip Dscp

    Example Console#show map ip precedence ethernet 1/5 Precedence mapping status: disabled Port Precedence COS --------- ---------- --- Eth 1/ 5 Eth 1/ 5 Eth 1/ 5 Eth 1/ 5 Eth 1/ 5 Eth 1/ 5 Eth 1/ 5 Eth 1/ 5 Console# Related Commands map ip precedence (Global Configuration) (55-8)
  • Page 498 Class of Service Commands Related Commands map ip dscp (Global Configuration) (55-10) map ip dscp (Interface Configuration) (55-10) 55-14...
  • Page 499: Chapter 56: Quality Of Service Commands

    Chapter 56: Quality of Service Commands The commands described in this section are used to configure Differentiated Services (DiffServ) classification criteria and service policies. You can classify traffic based on access lists, IP Precedence or DSCP values, or VLANs. Using access lists allows you select traffic based on Layer 2, Layer 3, or Layer 4 information contained in each packet.
  • Page 500: Class-Map

    Quality of Service Commands Notes: 1. You can configure up to 16 rules per Class Map. You can also include multiple classes in a Policy Map. You should create a Class Map (page 56-2) before creating a Policy Map (page 56-4). Otherwise, you will not be able to specify a Class Map with the class command (page 56-4) after entering Policy-Map Configuration mode.
  • Page 501: Match

    match This command defines the criteria used to classify traffic. Use the no form to delete the matching criteria. Syntax [no] match {access-list acl-name | ip dscp dscp | ip precedence ip-precedence | vlan vlan} • acl-name - Name of the access control list. Any type of ACL can be specified, including standard or extended IP ACLs and MAC ACLs.
  • Page 502: Policy-Map

    Quality of Service Commands policy-map This command creates a policy map that can be attached to multiple interfaces, and enters Policy Map configuration mode. Use the no form to delete a policy map and return to Global configuration mode. Syntax [no] policy-map policy-map-name policy-map-name - Name of the policy map.
  • Page 503 Default Setting None Command Mode Policy Map Configuration Command Usage • Use the policy-map command to specify a policy map and enter Policy Map configuration mode. Then use the class command to enter Policy Map Class configuration mode. And finally, use the set and police commands to specify the match criteria, where the: - set command classifies the service that an IP packet will receive.
  • Page 504: Police

    Quality of Service Commands Command Mode Policy Map Class Configuration Example This example creates a policy called “rd_policy,” uses the class command to specify the previously defined “rd_class,” uses the set command to classify the service that incoming packets will receive, and then uses the police command to limit the average bandwidth to 100,000 Kbps, the burst rate to 1522 bytes, and configure the response to drop any violating packets.
  • Page 505: Service-Policy

    Example This example creates a policy called “rd_policy,” uses the class command to specify the previously defined “rd_class,” uses the set command to classify the service that incoming packets will receive, and then uses the police command to limit the average bandwidth to 100,000 Kbps, the burst rate to 1522 bytes, and configure the response to drop any violating packets.
  • Page 506: Show Policy-Map

    Quality of Service Commands show class-map This command displays the QoS class maps which define matching criteria used for classifying traffic. Syntax show class-map [class-map-name] class-map-name - Name of the class map. (Range: 1-16 characters) Default Setting Displays all class maps. Command Mode Privileged Exec Example...
  • Page 507: Show Policy-Map Interface

    Example Console#show policy-map Policy Map rd_policy class rd_class set ip dscp 3 Console#show policy-map rd_policy class rd_class Policy Map rd_policy class rd_class set ip dscp 3 Console# show policy-map interface This command displays the service policy assigned to the specified interface. Syntax show policy-map interface interface input interface...
  • Page 508 Quality of Service Commands 56-10...
  • Page 509: Chapter 57: Multicast Filtering Commands

    Chapter 57: Multicast Filtering Commands This switch uses IGMP (Internet Group Management Protocol) to query for any attached hosts that want to receive a specific multicast service. It identifies the ports containing hosts requesting a service and sends data out to those ports only. It then propagates the service request up to any neighboring multicast switch/router to ensure that it will continue to receive the multicast service.
  • Page 510: Ip Igmp Snooping Vlan Static

    Multicast Filtering Commands ip igmp snooping vlan static This command adds a port to a multicast group. Use the no form to remove the port. Syntax [no] ip igmp snooping vlan vlan-id static ip-address interface • vlan-id - VLAN ID (Range: 1-4093) •...
  • Page 511: Show Mac-Address-Table Multicast

    Example The following configures the switch to use IGMP Version 1: Console(config)#ip igmp snooping version 1 Console(config)# show ip igmp snooping This command shows the IGMP snooping configuration. Default Setting None Command Mode Privileged Exec Command Usage See “Configuring IGMP Snooping and Query Parameters” on page 28-2 for a description of the displayed items.
  • Page 512: Ip Igmp Snooping Querier

    Multicast Filtering Commands Example The following shows the multicast entries learned through IGMP snooping for VLAN 1: Console#show mac-address-table multicast vlan 1 igmp-snooping VLAN M'cast IP addr. Member ports Type ---- --------------- ------------ ------- 224.1.2.3 Console# IGMP Query Commands This section describes commands used to configure Layer 2 IGMP query on the switch.
  • Page 513: Ip Igmp Snooping Query-Interval

    ip igmp snooping query-count This command configures the query count. Use the no form to restore the default. Syntax ip igmp snooping query-count count no ip igmp snooping query-count count - The maximum number of queries issued for which there has been no response before the switch takes action to drop a client from the multicast group.
  • Page 514: Ip Igmp Snooping Query-Max-Response-Time

    Multicast Filtering Commands Example The following shows how to configure the query interval to 100 seconds: Console(config)#ip igmp snooping query-interval 100 Console(config)# ip igmp snooping query-max-response-time This command configures the query report delay. Use the no form to restore the default.
  • Page 515: Ip Igmp Snooping Router-Port-Expire-Time

    ip igmp snooping router-port-expire-time This command configures the query timeout. Use the no form to restore the default. Syntax ip igmp snooping router-port-expire-time seconds no ip igmp snooping router-port-expire-time seconds - The time the switch waits after the previous querier stops before it considers the router port (i.e., the interface which had been receiving query packets) to have expired.
  • Page 516: Table 57-4 Static Multicast Routing Commands

    Multicast Filtering Commands Static Multicast Routing Commands Table 57-4 Static Multicast Routing Commands Command Function ip igmp snooping vlan Adds a multicast router port mrouter show ip igmp snooping Shows multicast router ports mrouter ip igmp snooping vlan mrouter This command statically configures a multicast router port. Use the no form to remove the configuration.
  • Page 517: Show Ip Igmp Snooping Mrouter

    show ip igmp snooping mrouter This command displays information on statically configured and dynamically learned multicast router ports. Syntax show ip igmp snooping mrouter [vlan vlan-id] vlan-id - VLAN ID (Range: 1-4093) Default Setting Displays multicast router ports for all configured VLANs. Command Mode Privileged Exec Command Usage...
  • Page 518 Multicast Filtering Commands 57-10...
  • Page 519: Table 58-1 Dns Commands

    Chapter 58: Domain Name Service Commands These commands are used to configure Domain Naming System (DNS) services. You can manually configure entries in the DNS domain name to IP address mapping table, configure default domain names, or specify one or more name servers to use for domain name to address translation.
  • Page 520: Clear Host

    Domain Name Service Commands Command Usage Servers or other network devices may support one or more connections via multiple IP addresses. If more than one IP address is associated with a host name using this command, a DNS client can try each address in succession, until it establishes a connection with the target device.
  • Page 521: Ip Domain-Name

    ip domain-name This command defines the default domain name appended to incomplete host names (i.e., host names passed from a client that are not formatted with dotted notation). Use the no form to remove the current domain name. Syntax ip domain-name name no ip domain-name name - Name of the host.
  • Page 522: Ip Name-Server

    Domain Name Service Commands Default Setting None Command Mode Global Configuration Command Usage • Domain names are added to the end of the list one at a time. • When an incomplete host name is received by the DNS service on this switch, it will work through the domain list, appending each domain name in the list to the host name, and checking with the specified name servers for a match.
  • Page 523: Ip Domain-Lookup

    Command Usage The listed name servers are queried in the specified sequence until a response is received, or the end of the list is reached with no response. Example This example adds two domain-name servers to the list and then displays the list. Console(config)#ip domain-server 192.168.1.55 10.1.0.55 Console(config)#end Console#show dns...
  • Page 524: Show Hosts

    Domain Name Service Commands Example This example enables DNS and then displays the configuration. Console(config)#ip domain-lookup Console(config)#end Console#show dns Domain Lookup Status: DNS enabled Default Domain Name: .sample.com Domain Name List: .sample.com.jp .sample.com.uk Name Server List: 192.168.1.55 10.1.0.55 Related Commands ip domain-name (58-3) ip name-server (58-4) show hosts...
  • Page 525: Table 58-2 Show Dns Cache - Display Description

    show dns This command displays the configuration of the DNS service. Command Mode Privileged Exec Example Console#show dns Domain Lookup Status: DNS enabled Default Domain Name: sample.com Domain Name List: sample.com.jp sample.com.uk Name Server List: 192.168.1.55 10.1.0.55 Console# show dns cache This command displays entries in the DNS cache.
  • Page 526: Clear Dns Cache

    Domain Name Service Commands clear dns cache This command clears all entries in the DNS cache. Command Mode Privileged Exec Example Console#clear dns cache Console#show dns cache FLAG TYPE Console# 58-8 DOMAIN...
  • Page 527: Table 59-1 Ipv4 Configuration Commands

    Chapter 59: IPv4 Interface Commands An IP addresses may be used for management access to the switch over your network. An IPv4 address for this switch is obtained via DHCP by default. You can manually configure a specific IPv4 address or direct the device to obtain an address from a BOOTP or DHCP server when it is powered on.
  • Page 528: Ip Default-Gateway

    IPv4 Interface Commands numbers, 0 to 255, separated by periods. Anything outside this format will not be accepted by the configuration program. • If you select the bootp or dhcp option, IP is enabled but will not function until a BOOTP or DHCP reply has been received. Requests will be broadcast periodically by this device in an effort to learn its IP address.
  • Page 529: Ip Dhcp Restart

    • An default gateway can only be successfully set when a network interface that directly connects to the gateway has been configured on the switch. Example The following example defines a default gateway for this device: Console(config)#ip default-gateway 10.1.1.254 Console(config)# Related Commands show ip redirects (59-4) ipv6 default-gateway (60-12)
  • Page 530: Show Ip Interface

    IPv4 Interface Commands show ip interface This command displays the settings of an IPv4 interface. Command Mode Privileged Exec Example Console#show ip interface IP address and netmask: 192.168.1.54 255.255.255.0 on VLAN 1, and address mode: User specified. Console# Related Commands show ip redirects (59-4) show ipv6 interface (60-10) show ip redirects...
  • Page 531: Ping

    ping This command sends (IPv4) ICMP echo request packets to another node on the network. Syntax ping host [count count][size size] • host - IP address or IP alias of the host. • count - Number of packets to send. (Range: 1-16, default: 5) •...
  • Page 532 IPv4 Interface Commands 59-6...
  • Page 533: Table 60-1 Ipv6 Configuration Commands

    Chapter 60: IPv6 Interface Commands An IPv6 address can either be manually configured or dynamically generated. You may also need to a establish an IPv6 default gateway between this device and management stations that exist on another network segment. Both IP Version 4 and Version 6 addresses can be defined and used simultaneously to access the switch.
  • Page 534: Ipv6 Enable

    IPv6 Interface Commands ipv6 enable This command enables IPv6 on an interface that has not been configured with an explicit IPv6 address. Use the no form to disable IPv6 on an interface that has not been configured with an explicit IPv6 address. Syntax [no] ipv6 enable Default Setting...
  • Page 535: Ipv6 General-Prefix

    ipv6 general-prefix This command defines an IPv6 general prefix for the network address segment. Use the no form to remove the IPv6 general prefix. Syntax ipv6 general-prefix prefix-name ipv6-prefix/prefix-length no ipv6 general-prefix prefix-name • prefix-name - The label assigned to the general prefix. •...
  • Page 536: Show Ipv6 General-Prefix

    IPv6 Interface Commands show ipv6 general-prefix This command displays all configured IPv6 general prefixes. Command Mode Normal Exec, Privileged Exec Example This example displays a single IPv6 general prefix configured for the switch. Console#show ipv6 general-prefix IPv6 general prefix: rd 2009:DB9:2229::/48 Console# ipv6 address...
  • Page 537 Command Usage • The general prefix normally applies to all interfaces, and is therefore specified at the global configuration level. The subsequent network prefix bits normally apply to one or more specific interfaces, and are therefore specified by this command at the interface configuration level. •...
  • Page 538: Ipv6 Address Autoconfig

    IPv6 Interface Commands ipv6 address autoconfig This command enables stateless autoconfiguration of IPv6 addresses on an interface and enables IPv6 on the interface. The network portion of the address is based on prefixes received in IPv6 router advertisement messages; the host portion in based on the modified EUI-64 form of the interface identifier (i.e., the switch’s MAC address).
  • Page 539: Ipv6 Address Eui-64

    Related Commands ipv6 address (60-4) show ipv6 interface (60-10) ipv6 address eui-64 This command configures an IPv6 address for an interface using an EUI-64 interface ID in the low order 64 bits and enables IPv6 on the interface. Use the no form without any arguments to remove all manually configured IPv6 addresses from the interface.
  • Page 540 IPv6 Interface Commands universal/local bit in the address and inserting the hexadecimal number FFFE between the upper and lower three bytes of the of the MAC address. For example, if a device had an EUI-48 address of 28-9F-18-1C-82-35, the global/local bit must first be inverted to meet EUI-64 requirements (i.e., 1 for globally defined addresses and 0 for locally defined addresses), changing 28 to 2A.
  • Page 541: Ipv6 Address Link-Local

    ipv6 address link-local This command configures an IPv6 link-local address for an interface and enables IPv6 on the interface. Use the no form without any arguments to remove all manually configured IPv6 addresses from the interface. Use the no form with a specific address to remove it from the interface.
  • Page 542: Table 60-2 Show Ipv6 Interface - Display Description

    IPv6 Interface Commands Related Commands ipv6 enable (60-2) show ipv6 interface (60-10) show ipv6 interface This command displays the usability and configured settings for IPv6 interfaces. Syntax show ipv6 interface [brief [vlan vlan-id [ipv6-prefix/prefix-length]]] • brief - Displays a brief summary of IPv6 operational status and the addresses configured for each interface.
  • Page 543 Table 60-2 show ipv6 interface - display description Field Description IPv6 IPv6 is marked “enable” if the switch can send and receive IP traffic on this interface, “disable” if the switch cannot send and receive IP traffic on this interface, or “stalled”...
  • Page 544: Show Ipv6 Default-Gateway

    IPv6 Interface Commands ipv6 default-gateway This command sets an IPv6 default gateway to use when the management station in located on a different network segment. Use the no form to remove a previously configured default gateway. Syntax ipv6 default-gateway ipv6-address no ipv6 address ipv6-address - The IPv6 address of the default next hop router to use when the management station is located on a different network segment.
  • Page 545: Ipv6 Mtu

    Example The following shows the default gateway configured for this device: Console#show ipv6 default-gateway ipv6 default gateway: Console# Related Commands show ip redirects (59-4) ipv6 mtu This command sets the size of the maximum transmission unit (MTU) for IPv6 packets sent on an interface. Use the no form to restore the default setting. Syntax ipv6 mtu size no ipv6 mtu...
  • Page 546: Table 60-3 Show Ipv6 Mtu - Display Description

    IPv6 Interface Commands show ipv6 mtu This command displays the maximum transmission unit (MTU) cache for destinations that have returned an ICMP packet-too-big message along with an acceptable MTU to this switch. Command Mode Normal Exec, Privileged Exec Example The following example shows the MTU cache for this device: Console#show ipv6 mtu Since Destination Address...
  • Page 547 Example The following example shows statistics for all IPv6 unicast and multicast traffic, as well as ICMP, UDP and TCP statistics: Console#show ipv6 traffic IPv6 Statistics: Ipv6 rcvd rcvd total source routed truncated format errors hop count exceeded unknown protocol not a router fragments total reassembled...
  • Page 548: Table 60-4 Show Ipv6 Traffic - Display Description

    IPv6 Interface Commands router solicit router advert redirects neighbor solicit neighbor advert Ipv6 icmp output sent output unreach routing unreach admin unreach neighbor unreach address unreach port parameter error parameter header parameter option hopcount expired Reassembly timeout too big echo request echo reply group query group report...
  • Page 549 Table 60-4 show ipv6 traffic - display description Field Description hop count exceeded Number of packets discarded because its time-to-live (TTL) field was decremented to zero. unknown protocol The number of locally-addressed datagrams received successfully but discarded because of an unknown or unsupported protocol. This counter is incremented at the interface to which these datagrams were addressed which might not be necessarily the input interface for some of the datagrams.
  • Page 550 IPv6 Interface Commands Table 60-4 show ipv6 traffic - display description Field Description Ipv6 mcast mcast received The number of multicast packets received by the interface. mcast sent The number of multicast packets transmitted by the interface. ICMP Statistics Ipv6 icmp input input The total number of ICMP messages received by the interface which includes all those counted by ipv6IfIcmpInErrors.
  • Page 551 Table 60-4 show ipv6 traffic - display description Field Description router solicit The number of ICMP Router Solicit messages received by the interface. router advert The number of ICMP Router Advertisement messages received by the interface. redirects The number of Redirect messages received. neighbor solicit The number of ICMP Neighbor Solicitation messages received by the interface.
  • Page 552: Clear Ipv6 Traffic

    IPv6 Interface Commands Table 60-4 show ipv6 traffic - display description Field Description UDP Statistics input The total number of UDP datagrams delivered to UDP users. checksum errors The total number of UDP packet checksum errors. length errors The total number of UDP header length errors. no port The total number of received UDP datagrams for which there was no application at the destination port.
  • Page 553: Ping Ipv6

    ping ipv6 This command sends ICMP echo request packets to an IPv6 node on the network. ping ipv6 address {ipv6-address | host-name} [size datagram-size | repeat repeat-count | data hex-data-pattern | source source-address | timeout seconds | verbose] • ipv6-address - The IPv6 address of the device to ping. The address must be formatted according to RFC 2373 “IPv6 Addressing Architecture,”...
  • Page 554: Ipv6 Neighbor

    IPv6 Interface Commands Example Console# ping ipv6 2001:0DB8::3/64 repeat 5 Which outside interface [1]:1 Type ESC to abort. Sending 5, [100]-byte ICMP Echos to 2009:DB9:2229::80, timeout is 2 seconds. !!!!! Success rate is 100 percent round-trip min/max/avg = 10/30/14.000000 ms Console# Related Commands ping (59-5)
  • Page 555: Ipv6 Nd Dad Attempts

    • If the specified entry was dynamically learned through the IPv6 neighbor discovery process, and already exists in the neighbor discovery cache, it is converted to a static entry. Static entries in the IPv6 neighbor discovery cache are not modified if subsequently detected by the neighbor discovery process. •...
  • Page 556 IPv6 Interface Commands in a “pending” state. Duplicate address detection is automatically restarted when the interface is administratively re-activated. • An interface that is re-activated restarts duplicate address detection for all unicast IPv6 addresses on the interface. While duplicate address detection is performed on the interface’s link-local address, the other IPv6 addresses remain in a “tentative”...
  • Page 557: Ipv6 Nd Ns Interval

    ipv6 nd ns interval This command configures the interval between transmitting IPv6 neighbor solicitation messages on an interface. Use the no form to restore the default value. Syntax ipv6 nd ns-interval milliseconds no ipv6 nd ns-interval milliseconds - The interval between transmitting IPv6 neighbor solicitation messages.
  • Page 558: Table 60-5 Show Ipv6 Neighbors - Display Description

    IPv6 Interface Commands show ipv6 neighbors This command displays information in the IPv6 neighbor discovery cache. Syntax show ipv6 neighbors [vlan vlan-id | ipv6-address] • vlan-id - VLAN ID (Range: 1-4093) • ipv6-address - The IPv6 address of a neighbor device. You can specify either a link-local or global unicast address formatted according to RFC 2373 “IPv6 Addressing Architecture,”...
  • Page 559: Clear Ipv6 Neighbors

    Table 60-5 show ipv6 neighbors - display description Field Description State The following states are used for dynamic entries: • INCMP (Incomplete) - Address resolution is being carried out on the entry. A neighbor solicitation message has been sent to the multicast address of the target, but it has not yet returned a neighbor advertisement message.
  • Page 560 IPv6 Interface Commands 60-28...
  • Page 561: Cluster

    Chapter 61: Switch Cluster Commands Switch Clustering is a method of grouping switches together to enable centralized management through a single unit. A switch cluster has a “Commander” unit that is used to manage all other “Member” switches in the cluster. The management station uses Telnet to communicate directly with the Commander throught its IP address, and the Commander manages Member switches using cluster “internal”...
  • Page 562: Cluster Commander

    Switch Cluster Commands • Configured switch clusters are maintained across power resets and network changes. Example Console(config)#cluster Console(config)# cluster commander This command enables the switch as a cluster Commander. Use the no form to disable the switch as cluster Commander. Syntax [no] cluster commander Default Setting...
  • Page 563: Cluster Member

    Command Mode Global Configuration Command Usage • An “internal” IP address pool is used to assign IP addresses to Member switches in the cluster. Internal cluster IP addresses are in the form 10.x.x.member-ID. Only the base IP address of the pool needs to be set since Member IDs can only be between 1 and 36.
  • Page 564: Show Cluster

    Switch Cluster Commands rcommand This command provides access to a cluster Member CLI for configuration. Syntax rcommand id <member-id> member-id - The ID number of the Member switch. (Range: 1-36) Command Mode Privileged Exec Command Usage • This command only operates through a Telnet connection to the Commander switch.
  • Page 565: Show Cluster Candidates

    show cluster members This command shows the current switch cluster members. Command Mode Privileged Exec Example Console#show cluster members Cluster Members: Role: Active member IP Address: 10.254.254.2 MAC Address: 00-12-cf-23-49-c0 Description: 24/48 L2/L4 IPV4/IPV6 GE Switch Console# show cluster candidates This command shows the discovered Candidate switches in the network.
  • Page 566 Switch Cluster Commands 61-6...
  • Page 567: Section Iv:appendices

    Section IV:Appendices This section provides additional information on the following topics. Software Specifications ........A-1 Troubleshooting .
  • Page 568 Appendices...
  • Page 569: Appendix A: Software Specifications

    Appendix A: Software Specifications Software Features Authentication Local, RADIUS, TACACS+, Port (802.1X), HTTPS, SSH, Port Security Access Control Lists 32 ACLs (96 MAC rules, 96 IP rules, 96 IPv6 rules) DHCP Client BOOTP Client DNS Proxy Port Configuration 1000BASE-T: 10/100 Mbps at half/full duplex, 1000 Mbps at full duplex 1000BASE-SX/LX/LH - 1000 Mbps at full duplex (SFP), Flow Control Full Duplex: IEEE 802.3x...
  • Page 570: Management Features

    Software Specifications Multicast Filtering IGMP Snooping Switch Clustering 36 groups Additional Features CIDR (Classless Inter-Domain Routing) SNTP (Simple Network Time Protocol) SNMP (Simple Network Management Protocol) RMON (Remote Monitoring, groups 1,2,3,9) SMTP Email Alerts Management Features In-Band Management Telnet, web-based HTTP or HTTPS, SNMP manager, or Secure Shell Out-of-Band Management RS-232 DB-9 console port Software Loading...
  • Page 571: Management Information Bases

    Management Information Bases IGMPv2 (RFC 2236) IPv4 IGMP (RFC 3228) RADIUS+ (RFC 2618) RMON (RFC 2819 groups 1,2,3,9) SNMP (RFC 1157) SNMPv2c (RFC 2571) SNMPv3 (RFC DRAFT 3414, 3410, 2273, 3411, 3415) SNTP (RFC 2030) SSH (Version 2.0) TFTP (RFC 1350) Management Information Bases Bridge MIB (RFC 1493) DNS Resolver MIB (RFC 1612)
  • Page 572 Software Specifications TACACS+ Authentication Client MIB TCP MIB (RFC 2012) Trap (RFC 1215) UDP MIB (RFC 2013)
  • Page 573: Table B-1 Troubleshooting Chart

    Appendix B: Troubleshooting Problems Accessing the Management Interface Symptom Action Cannot connect using Telnet, • Be sure the switch is powered up. web browser, or SNMP • Check network cabling between the management station and the switch. software • Check that you have a valid network connection to the switch and that the •...
  • Page 574: Using System Logs

    Troubleshooting Using System Logs If a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually caused by the switch. If the problem appears to be caused by the switch, follow these steps: Enable logging.
  • Page 575 Glossary Access Control List (ACL) ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for certain IP or MAC (i.e., Layer 2) information. Boot Protocol (BOOTP) used to provide bootup information for network devices, including IP BOOTP is address information, the address of the TFTP server that contains the devices system files, and the name of the boot file.
  • Page 576 Glossary Extended Universal Identifier (EUI) An address format used by IPv6 to identify the host portion of the network address. The interface identifier in EUI compatible addresses is based on the link-layer (MAC) address of an interface. Interface identifiers used in global unicast and other IPv6 address types are 64 bits long and may be constructed in the EUI-64 format.
  • Page 577 Glossary IEEE 802.1Q VLAN Tagging—Defines Ethernet frame tags which carry VLAN information. It allows switches to assign endstations to different virtual LANs, and defines a standard way for VLANs to communicate across switched networks. IEEE 802.1p An IEEE standard for providing quality of service (QoS) in Ethernet networks. The standard uses packet tags that define up to eight traffic classes and allows switches to transmit packets based on the tagged priority value.
  • Page 578 Glossary IP Multicast Filtering A process whereby this switch can pass multicast traffic along to participating hosts. IP Precedence The Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight different priority levels ranging from highest priority for network control packets to lowest priority for routine traffic.
  • Page 579 Glossary Port Authentication See IEEE 802.1X. Port Mirroring A method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON probe. This allows data on the target port to be studied unobstructively. Port Trunk Defines a network link aggregation and trunking method which specifies how to create a single high-speed logical link that combines several lower-speed physical...
  • Page 580 Glossary Secure Shell (SSH) A secure replacement for remote access functions, including Telnet. SSH can authenticate users with a cryptographic key, and encrypt data connections between management clients and the switch. Simple Mail Transfer Protocol (SMTP) A standard host-to-host mail transport protocol that operates over TCP, port 25. Simple Network Management Protocol (SNMP) The application protocol in the Internet suite of protocols which offers network management services.
  • Page 581 Glossary User Datagram Protocol (UDP) provides a datagram mode for packet-switched communications. It uses IP as the underlying transport mechanism to provide access to IP-like services. UDP packets are delivered just like IP packets – connection-less datagrams that may be discarded before reaching their targets.
  • Page 582 Glossary Glossary-8...
  • Page 583 Index Numerics 802.1Q tunnel 23-12, 52-13 description 23-12 interface configuration 23-17, 52-14–52-15 mode selection 23-17 TPID 23-17, 52-15 802.1X, port authentication 14-1, 43-1 acceptable frame type 23-10, 52-9 Access Control List See ACL Extended IP (IPv4) 15-1, 15-3, 44-1, 44-3 IPv6 Extended 15-2, 15-8, 44-7, 44-9 IPv6 Standard 15-2, 15-7, 44-7,...
  • Page 584 Index edge port, STA 22-12, 22-14, 51-13 event logging 37-1 firmware displaying version 4-3, 34-8 upgrading 6-2, 35-2 GARP VLAN Registration Protocol See GVRP gateway, IPv4 default 5-1, 59-2 gateway, IPv6 default 5-5, 60-12 general network prefix, IPv6 60-3 GVRP global setting 23-4, 52-2 interface configuration 23-10, 52-3 hardware version, displaying 4-3, 34-8...
  • Page 585 TACACS+ server 12-2, 41-9 logon authentication, sequence 12-3, 41-3, 41-4 main menu 3-4 Management Information Bases (MIBs) A-3 mirror port, configuring 19-1, 48-1 MSTP 51-2 global settings 22-15, 51-1 interface settings 22-13, 51-1 MTU for IPv6 5-5, 60-13 multicast filtering 28-1, 30-1, 57-1 multicast groups 28-6, 57-3 displaying 57-3 static 28-6, 57-2, 57-3...
  • Page 586 Index path cost method 22-8, 51-6 port priority 22-12, 51-13 protocol migration 22-14, 51-17 transmission limit 22-8, 51-7 standards, IEEE A-2 startup files creating 6-5, 35-2 displaying 6-2, 34-3 setting 6-2, 35-7 static addresses, setting 21-1, 50-1 statistics port 16-6, 45-9 STP 22-6, 51-2 STP Also see STA switch settings, saving or...
  • Page 588 ES4524D ES4548D E112006-CS-R01 149100030400A...

This manual is also suitable for:

Es4524dEs4548d

Table of Contents