Microsens MS453490M Management Guide Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Accessoires de communication Microsens MS453490M Management Guide. Microsens MS453490M Management Guide User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 984
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
MICROSENS GmbH & Co. KG - Kueferstraße 16 - 59067 Hamm / Germany - Tel. +49 23 81/94 52-0 - FAX -100 - www.microsens.com
MS453490M
10 Port Fast Ethernet Switch
Management Guide
Vue de la page 0
1 2 3 4 5 6 ... 983 984

Résumé du contenu

Page 1 - Management Guide

MICROSENS GmbH & Co. KG - Kueferstraße 16 - 59067 Hamm / Germany - Tel. +49 23 81/94 52-0 - FAX -100 - www.microsens.comMS453490M10 Port Fast Ethe

Page 2 - ANAGEMENT

CONTENTS– 10 –ARP Inspection 313Configuring Global Settings for ARP Inspection 314Configuring VLAN Settings for ARP Inspection 316Configuring Int

Page 3 - ABOUT THIS GUIDE

CHAPTER 4 | Basic Management TasksManaging System Files– 100 –requested). However, keep in mind that the file systems of many operating systems su

Page 4

CHAPTER 4 | Basic Management TasksManaging System Files– 101 –The following syntax must be observed:tftp://host[/filedir]/ tftp:// – Defines TFTP

Page 5 - CONTENTS

CHAPTER 4 | Basic Management TasksManaging System Files– 102 – tftp://192.168.0.1/switches/opcode/The image file is in the “opcode” directory, whi

Page 6 - 4BASIC MANAGEMENT TASKS 89

CHAPTER 4 | Basic Management TasksSetting the System Clock– 103 –If a new image is found at the specified location, the following type of messages

Page 7 - 6 VLAN CONFIGURATION 155

CHAPTER 4 | Basic Management TasksSetting the System Clock– 104 –◆ Day – Sets the day of the month. (Range: 1-31; Default: 1)◆ Year – Sets the yea

Page 8

CHAPTER 4 | Basic Management TasksSetting the System Clock– 105 –WEB INTERFACETo set the polling interval for SNTP:1. Click System, then Time. 2.

Page 9 - 14 SECURITY MEASURES 257

CHAPTER 4 | Basic Management TasksSetting the System Clock– 106 –Figure 14: Specifying SNTP Time ServersSETTING THE TIMEZONEUse the System > T

Page 10 - – 10 –

CHAPTER 4 | Basic Management TasksConsole Port Settings– 107 –Figure 15: Setting the Time ZoneCONSOLE PORT SETTINGSUse the System > Console me

Page 11 - 18 MULTICAST FILTERING 441

CHAPTER 4 | Basic Management TasksConsole Port Settings– 108 –◆ Data Bits – Sets the number of data bits per character that are interpreted and ge

Page 12 - 20 GENERAL COMMANDS 485

CHAPTER 4 | Basic Management TasksTelnet Settings– 109 –TELNET SETTINGSUse the System > Telnet menu to configure parameters for accessing the C

Page 13 - YSTEM MANAGEMENT COMMANDS 493

CONTENTS– 11 –Specifying a Remote Engine ID 374Setting SNMPv3 Views 375Configuring SNMPv3 Groups 378Setting Community Access Strings 382Confi

Page 14 - – 14 –

CHAPTER 4 | Basic Management TasksDisplaying CPU Utilization– 110 –WEB INTERFACETo configure parameters for the console port:1. Click System, then

Page 15 - 22 SNMP COMMANDS 555

CHAPTER 4 | Basic Management TasksDisplaying Memory Utilization– 111 –Figure 18: Displaying CPU UtilizationDISPLAYING MEMORY UTILIZATIONUse the S

Page 16 - UTHENTICATION COMMANDS 583

CHAPTER 4 | Basic Management TasksResetting the System– 112 –RESETTING THE SYSTEMUse the System > Reset menu to restart the switch immediately,

Page 17 - – 17 –

CHAPTER 4 | Basic Management TasksResetting the System– 113 – Regularly – Specifies a periodic interval at which to reload the switch.Time HH - Th

Page 18 - ENERAL SECURITY MEASURES 637

CHAPTER 4 | Basic Management TasksResetting the System– 114 –Figure 21: Restarting the Switch (In)Figure 22: Restarting the Switch (At)

Page 19 - – 19 –

CHAPTER 4 | Basic Management TasksResetting the System– 115 –Figure 23: Restarting the Switch (Regularly)

Page 20 - 26 ACCESS CONTROL LISTS 683

CHAPTER 4 | Basic Management TasksResetting the System– 116 –

Page 21 - 27 INTERFACE COMMANDS 699

– 117 –5 INTERFACE CONFIGURATIONThis chapter describes the following topics:◆ Port Configuration – Configures connection settings, including auto-ne

Page 22 - 33 SPANNING TREE COMMANDS 757

CHAPTER 5 | Interface ConfigurationPort Configuration– 118 –◆ When using auto-negotiation, the optimal settings will be negotiated between the lin

Page 23 - 34 VLAN COMMANDS 781

CHAPTER 5 | Interface ConfigurationPort Configuration– 119 – Sym (Gigabit only) - Check this item to transmit and receive pause frames. FC - Flow

Page 24 - – 24 –

CONTENTS– 12 –Configuring IGMP Snooping and Query Parameters 444Specifying Static Interfaces for a Multicast Router 447Assigning Interfaces to Mul

Page 25 - LASS OF SERVICE COMMANDS 817

CHAPTER 5 | Interface ConfigurationPort Configuration– 120 –CONFIGURING BYPORT RANGEUse the Interface > Port > General (Configure by Port Ra

Page 26 - – 26 –

CHAPTER 5 | Interface ConfigurationPort Configuration– 121 –PARAMETERSThese parameters are displayed:◆ Port – Port identifier.◆ Type – Indicates t

Page 27 - 38 LLDP COMMANDS 883

CHAPTER 5 | Interface ConfigurationPort Configuration– 122 –CONFIGURING LOCALPORT MIRRORINGUse the Interface > Port > Mirror page to mirror

Page 28 - 41 IP INTERFACE COMMANDS 917

CHAPTER 5 | Interface ConfigurationPort Configuration– 123 –WEB INTERFACETo configure a local mirror session:1. Click Interface, Port, Mirror.2. S

Page 29 - SECTION IV APPENDICES 949

CHAPTER 5 | Interface ConfigurationPort Configuration– 124 –CONFIGURING REMOTEPORT MIRRORINGUse the Interface > Port > RSPAN page to mirror

Page 30 - – 30 –

CHAPTER 5 | Interface ConfigurationPort Configuration– 125 –3. Set up all intermediate switches on the RSPAN configuration page, entering the mirr

Page 31 - – 31 –

CHAPTER 5 | Interface ConfigurationPort Configuration– 126 –◆ Operation Status – Indicates whether or not RSPAN is currently functioning.◆ Switch

Page 32 - – 32 –

CHAPTER 5 | Interface ConfigurationPort Configuration– 127 –WEB INTERFACETo configure a remote mirror session:1. Click Interface, RSPAN.2. Set the

Page 33 - – 33 –

CHAPTER 5 | Interface ConfigurationPort Configuration– 128 –Figure 33: Configuring Remote Port Mirroring (Destination)SHOWING PORT ORTRUNK STATIS

Page 34 - – 34 –

CHAPTER 5 | Interface ConfigurationPort Configuration– 129 –Transmitted Errors The number of outbound packets that could not be transmitted becaus

Page 35 - – 35 –

CONTENTS– 13 –enable 487quit 488show history 488configure 489disable 490reload (Privileged Exec) 490show reload 491end 491exit 49121 SYSTEM MANAG

Page 36 - – 36 –

CHAPTER 5 | Interface ConfigurationPort Configuration– 130 –WEB INTERFACETo show a list of port statistics:1. Click Interface, Port, Statistics.2.

Page 37 - – 37 –

CHAPTER 5 | Interface ConfigurationPort Configuration– 131 –Figure 34: Showing Port Statistics (Table)To show a chart of port statistics:1. Click

Page 38 - – 38 –

CHAPTER 5 | Interface ConfigurationPort Configuration– 132 –PERFORMING CABLEDIAGNOSTICSUse the Interface > Port > Cable Test page to test th

Page 39 - – 39 –

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 133 –WEB INTERFACETo show a list of port statistics:1. Click Interface, Port, Cable Test.2

Page 40 - – 40 –

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 134 –COMMAND USAGEBesides balancing the load across each port in the trunk, the other port

Page 41 - – 41 –

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 135 –COMMAND USAGE◆ When configuring static trunks, you may not be able to link switches o

Page 42 - – 42 –

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 136 –To add member ports to a static trunk:1. Click Interface, Trunk, Static.2. Select Con

Page 43 - – 43 –

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 137 –To display trunk connection parameters:1. Click Interface, Trunk, Static.2. Select Co

Page 44 - – 44 –

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 138 –◆ All ports on both ends of an LACP trunk must be configured for full duplex, and aut

Page 45 - – 45 –

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 139 –NOTE: Configuring LACP settings for a port only applies to its administrative state,

Page 46 - – 46 –

CONTENTS– 14 –File Management 510boot system 511copy 512delete 515dir 515whichboot 516upgrade opcode auto 517upgrade opcode path 518Line 520lin

Page 47 - GETTING STARTED

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 140 –To enable LACP for a port:1. Click Interface, Trunk, Dynamic.2. Select Configure Aggr

Page 48 -

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 141 –To configure LACP parameters for group members:1. Click Interface, Trunk, Dynamic.2.

Page 49 - 1 INTRODUCTION

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 142 –To configure connection parameters for a dynamic trunk:1. Click Interface, Trunk, Dyn

Page 50 -

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 143 –DISPLAYING LACPPORT COUNTERSUse the Interface > Trunk > Dynamic (Configure Aggr

Page 51

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 144 –Figure 49: Displaying LACP Port CountersDISPLAYING LACPSETTINGS AND STATUSFOR THE LO

Page 52

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 145 –LACPDUs Interval Number of seconds before invalidating received LACPDU information.Ad

Page 53

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 146 –WEB INTERFACETo display LACP settings and status for the local side:1. Click Interfac

Page 54 - Table 2: System Defaults

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 147 –WEB INTERFACETo display LACP settings and status for the remote side:1. Click Interfa

Page 55

CHAPTER 5 | Interface ConfigurationSaving Power– 148 –SAVING POWERUse the Interface > Green Ethernet page to enable power savings mode on the s

Page 56

CHAPTER 5 | Interface ConfigurationSaving Power– 149 –PARAMETERSThese parameters are displayed:◆ Port – Power saving mode only applies to the Giga

Page 57 - NITIAL SWITCH CONFIGURATION

CONTENTS– 15 –logging sendmail source-email 539show logging sendmail 539Time 540sntp client 540sntp poll 541sntp server 542show sntp 542clock

Page 58 - Connecting to the Switch

CHAPTER 5 | Interface ConfigurationTraffic Segmentation– 150 –TRAFFIC SEGMENTATIONIf tighter security is required for passing traffic from differe

Page 59

CHAPTER 5 | Interface ConfigurationTraffic Segmentation– 151 –CONFIGURING UPLINKAND DOWNLINK PORTSUse the Interface > Traffic Segmentation (Con

Page 60 - Basic Configuration

CHAPTER 5 | Interface ConfigurationVLAN Trunking– 152 –VLAN TRUNKINGUse the Interface > VLAN Trunking page to allow unknown VLAN groups to pass

Page 61

CHAPTER 5 | Interface ConfigurationVLAN Trunking– 153 –PARAMETERSThese parameters are displayed:◆ Interface – Displays a list of ports or trunks.◆

Page 62

CHAPTER 5 | Interface ConfigurationVLAN Trunking– 154 –

Page 63

– 155 –6 VLAN CONFIGURATIONThis chapter includes the following topics:◆ IEEE 802.1Q VLANs – Configures static and dynamic VLANs.◆ IEEE 802.1Q Tunnel

Page 64

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 156 –since traffic must pass through a configured Layer 3 link to reach a different VLAN.This swi

Page 65

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 157 –VLAN Classification – When the switch receives a frame, it classifies the frame in one of tw

Page 66

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 158 –Figure 58: Using GVRPForwarding Tagged/Untagged FramesIf you want to create a small port-ba

Page 67

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 159 –Modify◆ VLAN ID – ID of configured VLAN (1-4093).◆ VLAN Name – Name of the VLAN (1 to 32 cha

Page 68

CONTENTS– 16 –show snmp engine-id 567show snmp group 568show snmp user 569show snmp view 570nlm 570snmp-server notify-filter 571show nlm oper-s

Page 69

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 160 –To modify the configuration settings for VLAN groups:1. Click VLAN, Static.2. Select Modify

Page 70

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 161 –a port as forbidden to prevent the switch from automatically adding it to a VLAN via the GVR

Page 71 - WEB CONFIGURATION

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 162 –◆ Ingress Filtering – Determines how to process frames tagged for VLANs for which the ingres

Page 72 -

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 163 –NOTE: The PVID, acceptable frame type, and ingress filtering parameters for each interface w

Page 73 - 3 USING THE WEB INTERFACE

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 164 –To configure static members by interface:1. Click VLAN, Static.2. Select Edit Member by Inte

Page 74 - Figure 1: Home Page

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 165 –Figure 64: Configuring Static VLAN Members by Interface RangeCONFIGURINGDYNAMIC VLANREGISTR

Page 75 - CONFIGURATION

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 166 – Join – The interval between transmitting requests/queries to participate in a VLAN group. (

Page 76 - Table 4: Switch Main Menu

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 167 –To configure GVRP status and timers on a port or trunk:1. Click VLAN, Dynamic.2. Select Conf

Page 77

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 168 –Figure 68: Showing the Members of a Dynamic VLANIEEE 802.1Q TUNNELINGIEEE 802.1Q Tunnel

Page 78

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 169 –for packet processing. When the packet exits another trunk port on the same core switch,

Page 79

CONTENTS– 17 –tacacs-server port 594show tacacs-server 594AAA 595aaa accounting commands 595aaa accounting dot1x 596aaa accounting exec 597aaa

Page 80

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 170 –3. After packet classification through the switching process, the packet is written to m

Page 81

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 171 –7. The switch sends the packet to the proper egress port.8. If the egress port is an unt

Page 82

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 172 –6. Configure the QinQ tunnel uplink port to Tunnel Uplink mode (see "Adding an Inte

Page 83

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 173 –Figure 70: Enabling QinQ TunnelingADDING AN INTERFACETO A QINQ TUNNELFollow the guideli

Page 84

CHAPTER 6 | VLAN ConfigurationProtocol VLANs– 174 –WEB INTERFACETo add an interface to a QinQ tunnel:1. Click VLAN, Tunnel.2. Select Configure Int

Page 85

CHAPTER 6 | VLAN ConfigurationProtocol VLANs– 175 –3. Then map the protocol for each interface to the appropriate VLAN using the Configure Interfa

Page 86

CHAPTER 6 | VLAN ConfigurationProtocol VLANs– 176 –WEB INTERFACETo configure a protocol group:1. Click VLAN, Protocol.2. Select Configure Protocol

Page 87

CHAPTER 6 | VLAN ConfigurationProtocol VLANs– 177 –MAPPING PROTOCOLGROUPS TOINTERFACESUse the VLAN > Protocol (Configure Interface - Add) page

Page 88

CHAPTER 6 | VLAN ConfigurationProtocol VLANs– 178 –WEB INTERFACETo map a protocol group to a VLAN for a port or trunk:1. Click VLAN, Protocol.2. S

Page 89 - 4 BASIC MANAGEMENT TASKS

CHAPTER 6 | VLAN ConfigurationConfiguring IP Subnet VLANs– 179 –CONFIGURING IP SUBNET VLANSUse the VLAN > IP Subnet page to configure IP subnet

Page 90 - Figure 3: System Information

CONTENTS– 18 –802.1X Port Authentication 619dot1x default 620dot1x eapol-pass-through 620dot1x system-auth-control 621dot1x intrusion-action 62

Page 91

CHAPTER 6 | VLAN ConfigurationConfiguring IP Subnet VLANs– 180 –WEB INTERFACETo map an IP subnet to a VLAN:1. Click VLAN, IP Subnet.2. Select Add

Page 92

CHAPTER 6 | VLAN ConfigurationConfiguring MAC-based VLANs– 181 –CONFIGURING MAC-BASED VLANSUse the VLAN > MAC-Based page to configure VLAN base

Page 93

CHAPTER 6 | VLAN ConfigurationConfiguring MAC-based VLANs– 182 –WEB INTERFACETo map a MAC address to a VLAN:1. Click VLAN, MAC-Based.2. Select Add

Page 94

CHAPTER 6 | VLAN ConfigurationConfiguring VLAN Mirroring– 183 –CONFIGURING VLAN MIRRORINGUse the VLAN > Mirror (Add) page to mirror traffic fro

Page 95

CHAPTER 6 | VLAN ConfigurationConfiguring VLAN Mirroring– 184 –WEB INTERFACETo configure VLAN mirroring:1. Click VLAN, Mirror.2. Select Add from t

Page 96 - Figure 7: Copy Firmware

– 185 –7 ADDRESS TABLE SETTINGSSwitches store the addresses for all known devices. This information is used to pass traffic directly between the inb

Page 97

CHAPTER 7 | Address Table SettingsConfiguring MAC Address Learning– 186 –◆ Also note that MAC address learning cannot be disabled if any of the fo

Page 98

CHAPTER 7 | Address Table SettingsSetting Static Addresses– 187 –SETTING STATIC ADDRESSESUse the MAC Address > Static page to configure static

Page 99

CHAPTER 7 | Address Table SettingsChanging the Aging Time– 188 –4. Click Apply.Figure 83: Configuring Static MAC AddressesTo show the static addr

Page 100 - Managing System Files

CHAPTER 7 | Address Table SettingsDisplaying the Dynamic Address Table– 189 –WEB INTERFACETo set the aging time for entries in the dynamic address

Page 101

CONTENTS– 19 –network-access link-detection link-down 647network-access link-detection link-up 647network-access link-detection link-up-down 648n

Page 102 - 5. Click Apply

CHAPTER 7 | Address Table SettingsClearing the Dynamic Address Table– 190 –WEB INTERFACETo show the dynamic address table:1. Click MAC Address, Dy

Page 103 - Setting the System Clock

CHAPTER 7 | Address Table SettingsConfiguring MAC Address Mirroring– 191 –2. Select Clear Dynamic MAC from the Action list.3. Select the method by

Page 104

CHAPTER 7 | Address Table SettingsConfiguring MAC Address Mirroring– 192 –matching packets will not be sent to target port specified for port mirr

Page 105

– 193 –8 SPANNING TREE ALGORITHM This chapter describes the following basic topics:◆ Loopback Detection – Configures detection and response to loopb

Page 106

CHAPTER 8 | Spanning Tree AlgorithmOverview– 194 –lowest cost spanning tree, it enables all root ports and designated ports, and disables all othe

Page 107 - Console Port Settings

CHAPTER 8 | Spanning Tree AlgorithmOverview– 195 –Figure 91: MSTP Region, Internal Spanning Tree, Multiple Spanning TreeAn MST Region consists of

Page 108

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Loopback Detection– 196 –CONFIGURING LOOPBACK DETECTIONUse the Spanning Tree > Loopback Detectio

Page 109 - Telnet Settings

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Global Settings for STA– 197 –WEB INTERFACETo configure loopback detection:1. Click Spanning Tree,

Page 110 - Displaying CPU Utilization

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Global Settings for STA– 198 –connected to an 802.1D bridge and starts using only 802.1D BPDUs. RS

Page 111 - Displaying Memory Utilization

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Global Settings for STA– 199 – Default: 32768 Range: 0-61440, in steps of 4096 Options: 0, 4096, 81

Page 112 - RESETTING THE SYSTEM

MANAGEMENT GUIDEMS453490M 10 PORT FAST ETHERNET SWITCHLayer 2 Switchwith 8 10/100BASE-TX (RJ-45) Ports,and 2 Gigabit Combination Ports (RJ-45/SFP)MS45

Page 113 - 4. Click Apply

CONTENTS– 20 –show ip source-guard 672show ip source-guard binding 672ARP Inspection 673ip arp inspection 674ip arp inspection filter 675ip arp

Page 114 - Resetting the System

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Global Settings for STA– 200 –Configuration Settings for MSTP ◆ Max Instance Numbers – The maximum

Page 115

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Global Settings for STA– 201 –Figure 95: Configuring Global Settings for STA (RSTP)Figure 96: Con

Page 116

CHAPTER 8 | Spanning Tree AlgorithmDisplaying Global Settings for STA– 202 –DISPLAYING GLOBAL SETTINGS FOR STAUse the Spanning Tree > STA (Conf

Page 117 - 5 INTERFACE CONFIGURATION

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for STA– 203 –Figure 97: Displaying Global Settings for STACONFIGURING INTERFAC

Page 118 - PARAMETERS

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for STA– 204 –port priority. (Range: 0 for auto-configuration, 1-65535 for the s

Page 119 - Port Configuration

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for STA– 205 –◆ Root Guard – STA allows a bridge with a lower bridge identifier

Page 120

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for STA– 206 –◆ BPDU Guard – This feature protects edge ports from receiving BPD

Page 121

CHAPTER 8 | Spanning Tree AlgorithmDisplaying Interface Settings for STA– 207 –DISPLAYING INTERFACE SETTINGS FOR STAUse the Spanning Tree > STA

Page 122 - PORT MIRRORING

CHAPTER 8 | Spanning Tree AlgorithmDisplaying Interface Settings for STA– 208 –◆ Oper Path Cost – The contribution of this port to the path cost o

Page 123

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Multiple Spanning Trees– 209 –WEB INTERFACETo display interface settings for STA:1. Click Spanning

Page 124 - CONFIGURING REMOTE

CONTENTS– 21 –27 INTERFACE COMMANDS 699interface 700alias 700capabilities 701description 702flowcontrol 703media-type 704negotiation 704shutdown 705

Page 125

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Multiple Spanning Trees– 210 –To use multiple spanning trees:1. Set the spanning tree type to MSTP

Page 126

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Multiple Spanning Trees– 211 –Figure 101: Creating an MST InstanceTo show the MSTP instances:1. Cl

Page 127

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Multiple Spanning Trees– 212 –To add additional VLAN groups to an MSTP instance:1. Click Spanning T

Page 128 - Table 5: Port Statistics

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for MSTP– 213 –CONFIGURING INTERFACE SETTINGS FOR MSTPUse the Spanning Tree >

Page 129

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for MSTP– 214 –The recommended range is listed in Table 9 on page 204.The recomm

Page 130

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for MSTP– 215 –Figure 106: Displaying MSTP Interface Settings

Page 131

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for MSTP– 216 –

Page 132 - DIAGNOSTICS

– 217 –9 RATE LIMIT CONFIGURATIONUse the Traffic > Rate Limit page to apply rate limiting to ingress or egress ports. This function allows the ne

Page 133 - Trunk Configuration

CHAPTER 9 | Rate Limit Configuration– 218 –WEB INTERFACETo configure rate limits:1. Click Traffic, Rate Limit.2. Enable the Rate Limit Status for

Page 134 - STATIC TRUNK

– 219 –10 STORM CONTROL CONFIGURATIONUse the Traffic > Storm Control page to configure broadcast storm control thresholds. Broadcast storms may o

Page 135

CONTENTS– 22 –no rspan session 734show rspan 73530 RATE LIMIT COMMANDS 737rate-limit 73731 AUTOMATIC TRAFFIC CONTROL COMMANDS 739auto-traffic-cont

Page 136

CHAPTER 10 | Storm Control Configuration– 220 –WEB INTERFACETo configure broadcast storm control:1. Click Traffic, Storm Control.2. Set the Status

Page 137 - DYNAMIC TRUNK

– 221 –11 CLASS OF SERVICEClass of Service (CoS) allows you to specify which data packets have greater precedence when traffic is buffered in the sw

Page 138

CHAPTER 11 | Class of ServiceLayer 2 Queue Settings– 222 –◆ If the output port is an untagged member of the associated VLAN, these frames are stri

Page 139

CHAPTER 11 | Class of ServiceLayer 2 Queue Settings– 223 –◆ The WRR algorithm used by this switch is known as Shaped Deficit Weighted Round Robin

Page 140

CHAPTER 11 | Class of ServiceLayer 2 Queue Settings– 224 –◆ Queue ID – The ID of the priority queue. (Range: 0-7)◆ Strict Mode – If “Strict and WR

Page 141

CHAPTER 11 | Class of ServiceLayer 2 Queue Settings– 225 –Figure 112: Setting the Queue Mode (Strict and WRR)MAPPING COS VALUESTO EGRESS QUEUESUs

Page 142

CHAPTER 11 | Class of ServiceLayer 2 Queue Settings– 226 –CLI REFERENCES◆ "qos map phb-queue" on page 825COMMAND USAGE ◆ Egress packets

Page 143 - Table 6: LACP Port Counters

CHAPTER 11 | Class of ServiceLayer 2 Queue Settings– 227 –Figure 113: Mapping CoS Values to Egress Queues To show the internal PHB to hardware qu

Page 144

CHAPTER 11 | Class of ServiceLayer 3/4 Priority Settings– 228 –LAYER 3/4 PRIORITY SETTINGSMapping Layer 3/4 Priorities to CoS ValuesThe switch sup

Page 145

CHAPTER 11 | Class of ServiceLayer 3/4 Priority Settings– 229 –PARAMETERSThese parameters are displayed:◆ Interface – Specifies a port or trunk.◆

Page 146

CONTENTS– 23 –spanning-tree priority 763spanning-tree mst configuration 763spanning-tree transmission-limit 764max-hops 764mst priority 765mst v

Page 147

CHAPTER 11 | Class of ServiceLayer 3/4 Priority Settings– 230 –COMMAND USAGE ◆ Enter per-hop behavior and drop precedence for any of the DSCP valu

Page 148 - Saving Power

CHAPTER 11 | Class of ServiceLayer 3/4 Priority Settings– 231 –WEB INTERFACETo map DSCP values to internal PHB/drop precedence:1. Click Traffic, P

Page 149

CHAPTER 11 | Class of ServiceLayer 3/4 Priority Settings– 232 –MAPPING COSPRIORITIES TOINTERNAL DSCPVALUESUse the Traffic > Priority > CoS t

Page 150 - Traffic Segmentation

CHAPTER 11 | Class of ServiceLayer 3/4 Priority Settings– 233 – WEB INTERFACETo map CoS/CFI values to internal PHB/drop precedence:1. Click Traffi

Page 151

CHAPTER 11 | Class of ServiceLayer 3/4 Priority Settings– 234 –To show the CoS/CFI to internal PHB/drop precedence map:1. Click Traffic, Priority,

Page 152 - VLAN Trunking

– 235 –12 QUALITY OF SERVICE This chapter describes the following tasks required to apply QoS policies:Class Map – Creates a map which identifies a

Page 153

CHAPTER 12 | Quality of ServiceConfiguring a Class Map– 236 –COMMAND USAGETo create a service policy for a specific category or ingress traffic, f

Page 154

CHAPTER 12 | Quality of ServiceConfiguring a Class Map– 237 –◆ Description – A brief description of a class map. (Range: 1-64 characters)Add Rule◆

Page 155 - 6 VLAN CONFIGURATION

CHAPTER 12 | Quality of ServiceConfiguring a Class Map– 238 –To show the configured class maps: 1. Click Traffic, DiffServ.2. Select Configure Cla

Page 156 - IEEE 802.1Q VLANs

CHAPTER 12 | Quality of ServiceCreating QoS Policies– 239 –To show the rules for a class map: 1. Click Traffic, DiffServ.2. Select Configure Class

Page 157

CONTENTS– 24 –vlan 787Configuring VLAN Interfaces 788interface vlan 789switchport acceptable-frame-types 789switchport allowed vlan 790switchpo

Page 158 - Figure 58: Using GVRP

CHAPTER 12 | Quality of ServiceCreating QoS Policies– 240 –Policing is based on a token bucket, where bucket depth (that is, the maximum burst bef

Page 159

CHAPTER 12 | Quality of ServiceCreating QoS Policies– 241 – if Te(t)-B ≥ 0, the packets is yellow and Te is decremented by B down to the minimum v

Page 160

CHAPTER 12 | Quality of ServiceCreating QoS Policies– 242 –respectively. The maximum size of the token bucket P is BP and the maximum size of the

Page 161

CHAPTER 12 | Quality of ServiceCreating QoS Policies– 243 –PARAMETERSThese parameters are displayed:Add◆ Policy Name – Name of policy map. (Range:

Page 162

CHAPTER 12 | Quality of ServiceCreating QoS Policies– 244 – Committed Burst Size (BC) – Burst in bytes. (Range: 4000-16000000 at a granularity of

Page 163

CHAPTER 12 | Quality of ServiceCreating QoS Policies– 245 – Conform – Specifies that traffic conforming to the maximum rate (CIR) will be transmit

Page 164

CHAPTER 12 | Quality of ServiceCreating QoS Policies– 246 – Committed Burst Size (BC) – Burst in bytes. (Range: 4000-16000000 at a granularity of

Page 165

CHAPTER 12 | Quality of ServiceCreating QoS Policies– 247 –WEB INTERFACETo configure a policy map: 1. Click Traffic, DiffServ.2. Select Configure

Page 166 - 3. Enable or disable GVRP

CHAPTER 12 | Quality of ServiceCreating QoS Policies– 248 –To edit the rules for a policy map: 1. Click Traffic, DiffServ.2. Select Configure Poli

Page 167

CHAPTER 12 | Quality of ServiceAttaching a Policy Map to a Port– 249 –To show the rules for a policy map: 1. Click Traffic, DiffServ.2. Select Con

Page 168 - IEEE 802.1Q Tunneling

CONTENTS– 25 –switchport voice vlan rule 813switchport voice vlan security 814show voice vlan 81535 CLASS OF SERVICE COMMANDS 817Priority Command

Page 169

CHAPTER 12 | Quality of ServiceAttaching a Policy Map to a Port– 250 –WEB INTERFACETo bind a policy map to a port: 1. Click Traffic, DiffServ.2. S

Page 170

– 251 –13 VOIP TRAFFIC CONFIGURATIONThis chapter covers the following topics:◆ Global Settings – Enables VOIP globally, sets the Voice VLAN, and the

Page 171

CHAPTER 13 | VoIP Traffic ConfigurationConfiguring VoIP Traffic– 252 –CLI REFERENCES◆ "Configuring Voice VLANs" on page 809PARAMETERSThe

Page 172

CHAPTER 13 | VoIP Traffic ConfigurationConfiguring Telephony OUI– 253 –CONFIGURING TELEPHONY OUIVoIP devices attached to the switch can be identif

Page 173 - A QINQ TUNNEL

CHAPTER 13 | VoIP Traffic ConfigurationConfiguring VoIP Traffic Ports– 254 –Figure 130: Configuring an OUI Telephony ListTo show the MAC OUI numb

Page 174 - Protocol VLANs

CHAPTER 13 | VoIP Traffic ConfigurationConfiguring VoIP Traffic Ports– 255 – Auto – The port will be added as a tagged member to the Voice VLAN wh

Page 175

CHAPTER 13 | VoIP Traffic ConfigurationConfiguring VoIP Traffic Ports– 256 –Figure 132: Configuring Port Settings for a Voice VLAN

Page 176

– 257 –14 SECURITY MEASURESYou can configure this switch to authenticate users logging into the system for management access using local or remote a

Page 177

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 258 –◆ DHCP Snooping – Filter IP traffic on insecure ports for which the source ad

Page 178

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 259 –3. Define a method name for each service to which you want to apply accountin

Page 179 - Configuring IP Subnet VLANs

CONTENTS– 26 –IGMP Snooping 849ip igmp snooping 850ip igmp snooping proxy-reporting 851ip igmp snooping querier 852ip igmp snooping router-alert

Page 180

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 260 – [authentication sequence] – User authentication is performed by up to three

Page 181 - Configuring MAC-based VLANs

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 261 –CLI REFERENCES◆ "RADIUS Client" on page 588◆ "TACACS+ Client&q

Page 182

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 262 – Set Key – Mark this box to set or modify the encryption key. Authentication

Page 183 - Configuring VLAN Mirroring

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 263 –3. Select RADIUS or TACACS+ server type.4. Select Global to specify the param

Page 184

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 264 –To configure the RADIUS or TACACS+ server groups to use for accounting and au

Page 185 - 7 ADDRESS TABLE SETTINGS

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 265 –Figure 138: Showing AAA Server GroupsCONFIGURING AAAACCOUNTINGUse the Securi

Page 186 -

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 266 –◆ Accounting Notice – Records user activity from log-in to log-off point.◆ Se

Page 187 - Setting Static Addresses

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 267 –WEB INTERFACETo configure global settings for AAA accounting: 1. Click Securi

Page 188 - Changing the Aging Time

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 268 –To show the accounting method applied to various service types and the assign

Page 189

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 269 –Figure 143: Configuring AAA Accounting Service for Exec ServiceTo display a

Page 190

CONTENTS– 27 –show ip igmp throttle interface 874Multicast VLAN Registration 875mvr 876mvr immediate-leave 877mvr type 878mvr vlan group 879s

Page 191

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 270 –CONFIGURING AAAAUTHORIZATIONUse the Security > AAA > Authorization page

Page 192

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 271 –◆ Interface - Displays the console or Telnet interface to which these rules a

Page 193 - 8 SPANNING TREE ALGORITHM

CHAPTER 14 | Security MeasuresAAA Authorization and Accounting– 272 –To configure the authorization method applied to local console, Telnet, or SS

Page 194 - Overview

CHAPTER 14 | Security MeasuresConfiguring User Accounts– 273 –CONFIGURING USER ACCOUNTSUse the Security > User Accounts page to control managem

Page 195 - Internal Spanning Tree

CHAPTER 14 | Security MeasuresWeb Authentication– 274 –Figure 150: Configuring User AccountsTo show user accounts: 1. Click Security, User Accoun

Page 196

CHAPTER 14 | Security MeasuresWeb Authentication– 275 –NOTE: RADIUS authentication must be activated and configured properly for the web authentic

Page 197

CHAPTER 14 | Security MeasuresWeb Authentication– 276 –Figure 152: Configuring Global Settings for Web AuthenticationCONFIGURINGINTERFACE SETTING

Page 198

CHAPTER 14 | Security MeasuresNetwork Access (MAC Address Authentication)– 277 –Figure 153: Configuring Interface Settings for Web Authentication

Page 199

CHAPTER 14 | Security MeasuresNetwork Access (MAC Address Authentication)– 278 –◆ Authenticated MAC addresses are stored as dynamic entries in the

Page 200

CHAPTER 14 | Security MeasuresNetwork Access (MAC Address Authentication)– 279 –◆ Any unsupported profiles in the Filter-ID attribute are ignored.

Page 201

CONTENTS– 28 –ip host 904ip name-server 905ipv6 host 906clear dns cache 906clear host 907show dns 907show dns cache 908show hosts 90840 DHCP

Page 202

CHAPTER 14 | Security MeasuresNetwork Access (MAC Address Authentication)– 280 –Authenticated MAC addresses are stored as dynamic entries in the s

Page 203

CHAPTER 14 | Security MeasuresNetwork Access (MAC Address Authentication)– 281 – Intrusion – Sets the port response to a host MAC authentication f

Page 204

CHAPTER 14 | Security MeasuresNetwork Access (MAC Address Authentication)– 282 –4. Make any configuration changes required to enable address authe

Page 205

CHAPTER 14 | Security MeasuresNetwork Access (MAC Address Authentication)– 283 –WEB INTERFACETo configure link detection on switch ports: 1. Click

Page 206

CHAPTER 14 | Security MeasuresNetwork Access (MAC Address Authentication)– 284 –◆ MAC Address Mask – The filter rule will check for the range of M

Page 207 - CLI REFERENCES

CHAPTER 14 | Security MeasuresNetwork Access (MAC Address Authentication)– 285 –DISPLAYING SECUREMAC ADDRESSINFORMATIONUse the Security > Netwo

Page 208 - Figure 99: STA Port Roles

CHAPTER 14 | Security MeasuresConfiguring HTTPS– 286 –Figure 159: Showing Addresses Authenticated for Network AccessCONFIGURING HTTPSYou can conf

Page 209

CHAPTER 14 | Security MeasuresConfiguring HTTPS– 287 –◆ The client and server establish a secure encrypted connection.A padlock icon should appear

Page 210

CHAPTER 14 | Security MeasuresConfiguring HTTPS– 288 –REPLACING THEDEFAULT SECURE-SITECERTIFICATEUse the Security > HTTPS (Copy Certificate) pa

Page 211

CHAPTER 14 | Security MeasuresConfiguring the Secure Shell– 289 –WEB INTERFACETo replace the default secure-site certificate: 1. Click Security, H

Page 212

CONTENTS– 29 –show ipv6 default-gateway 934show ipv6 interface 935show ipv6 mtu 936show ipv6 traffic 937clear ipv6 traffic 941ping6 942ipv6 nd

Page 213

CHAPTER 14 | Security MeasuresConfiguring the Secure Shell– 290 –COMMAND USAGEThe SSH server on this switch supports both password and public key

Page 214

CHAPTER 14 | Security MeasuresConfiguring the Secure Shell– 291 –5. Enable SSH Service – On the SSH Settings page, enable the SSH server on the sw

Page 215

CHAPTER 14 | Security MeasuresConfiguring the Secure Shell– 292 –checks whether the signature is correct. If both checks succeed, the client is au

Page 216

CHAPTER 14 | Security MeasuresConfiguring the Secure Shell– 293 –WEB INTERFACETo configure the SSH server: 1. Click Security, SSH.2. Select Config

Page 217 - 9 RATE LIMIT CONFIGURATION

CHAPTER 14 | Security MeasuresConfiguring the Secure Shell– 294 –client to select either DES (56-bit) or 3DES (168-bit) for data encryption.NOTE:

Page 218 -

CHAPTER 14 | Security MeasuresConfiguring the Secure Shell– 295 –To display or clear the SSH host key pair: 1. Click Security, SSH.2. Select Confi

Page 219 - TORM CONTROL CONFIGURATION

CHAPTER 14 | Security MeasuresConfiguring the Secure Shell– 296 –The SSH server uses RSA or DSA for key exchange when the client first establishes

Page 220

CHAPTER 14 | Security MeasuresAccess Control Lists– 297 –To display or clear the SSH user’s public key: 1. Click Security, SSH.2. Select Configure

Page 221 - 11 CLASS OF SERVICE

CHAPTER 14 | Security MeasuresAccess Control Lists– 298 –◆ An ACL can have up to 32 rules. However, due to resource restrictions, the average numb

Page 222 - Layer 2 Queue Settings

CHAPTER 14 | Security MeasuresAccess Control Lists– 299 –WEB INTERFACETo configure a time range: 1. Click Security, ACL.2. Select Configure Time R

Page 223

– 3 –ABOUT THIS GUIDEPURPOSE This guide gives specific information on how to operate and use the management functions of the switch.AUDIENCE The gui

Page 224

CONTENTS– 30 –

Page 225

CHAPTER 14 | Security MeasuresAccess Control Lists– 300 –6. Fill in the required parameters for the selected mode.7. Click Apply.Figure 169: Add

Page 226

CHAPTER 14 | Security MeasuresAccess Control Lists– 301 –SHOWING TCAMUTILIZAITONUse the Security > ACL (Configure ACL - Show TCAM) page to show

Page 227

CHAPTER 14 | Security MeasuresAccess Control Lists– 302 –Figure 171: Showing TCAM UtilizationSETTING THE ACLNAME AND TYPEUse the Security > AC

Page 228 - Layer 3/4 Priority Settings

CHAPTER 14 | Security MeasuresAccess Control Lists– 303 –WEB INTERFACETo configure the name and type of an ACL: 1. Click Security, ACL.2. Select C

Page 229

CHAPTER 14 | Security MeasuresAccess Control Lists– 304 –CONFIGURING ASTANDARD IPV4 ACLUse the Security > ACL (Configure ACL - Add Rule - IP St

Page 230

CHAPTER 14 | Security MeasuresAccess Control Lists– 305 –9. Click Apply. Figure 174: Configuring a Standard IPv4 ACLCONFIGURING ANEXTENDED IPV4 A

Page 231

CHAPTER 14 | Security MeasuresAccess Control Lists– 306 –◆ Source/Destination Port Bit Mask – Decimal number representing the port bits to match.

Page 232

CHAPTER 14 | Security MeasuresAccess Control Lists– 307 –WEB INTERFACETo add rules to an Extended IP ACL: 1. Click Security, ACL.2. Select Configu

Page 233

CHAPTER 14 | Security MeasuresAccess Control Lists– 308 –CONFIGURING A MACACLUse the Security > ACL (Configure ACL - Add Rule - MAC) page to co

Page 234

CHAPTER 14 | Security MeasuresAccess Control Lists– 309 –WEB INTERFACETo add rules to a MAC ACL: 1. Click Security, ACL.2. Select Configure ACL fr

Page 235 - 12 QUALITY OF SERVICE

– 31 –FIGURESFigure 1: Home Page 74Figure 2: Front Panel Indicators 75Figure 3: System Information 90Figure 4: General Switch Information 91Figure 5

Page 236 - Configuring a Class Map

CHAPTER 14 | Security MeasuresAccess Control Lists– 310 –CONFIGURING AN ARPACLUse the Security > ACL (Configure ACL - Add Rule - ARP) page to c

Page 237

CHAPTER 14 | Security MeasuresAccess Control Lists– 311 –WEB INTERFACETo add rules to an ARP ACL: 1. Click Security, ACL.2. Select Configure ACL f

Page 238

CHAPTER 14 | Security MeasuresAccess Control Lists– 312 –BINDING A PORT TO ANACCESS CONTROLLISTAfter configuring ACLs, use the Security > ACL (

Page 239 - Creating QoS Policies

CHAPTER 14 | Security MeasuresARP Inspection– 313 –WEB INTERFACETo bind an ACL to a port: 1. Click Security, ACL.2. Select Configure Interface fro

Page 240

CHAPTER 14 | Security MeasuresARP Inspection– 314 –COMMAND USAGEEnabling & Disabling ARP Inspection◆ ARP Inspection is controlled on a global

Page 241

CHAPTER 14 | Security MeasuresARP Inspection– 315 –with different MAC addresses are classified as invalid and are dropped. IP – Checks the ARP bod

Page 242 - COMMAND USAGE

CHAPTER 14 | Security MeasuresARP Inspection– 316 – Src-MAC – Validates the source MAC address in the Ethernet header against the sender MAC addre

Page 243

CHAPTER 14 | Security MeasuresARP Inspection– 317 –◆ ARP Inspection ACLs can be applied to any configured VLAN.◆ ARP Inspection uses the DHCP snoo

Page 244

CHAPTER 14 | Security MeasuresARP Inspection– 318 –Figure 180: Configuring VLAN Settings for ARP InspectionCONFIGURINGINTERFACE SETTINGSFOR ARP I

Page 245

CHAPTER 14 | Security MeasuresARP Inspection– 319 –WEB INTERFACETo configure interface settings for ARP Inspection: 1. Click Security, ARP Inspect

Page 246

FIGURES– 32 –Figure 32: Configuring Remote Port Mirroring (Intermediate) 127Figure 33: Configuring Remote Port Mirroring (Destination) 128Figure 34:

Page 247

CHAPTER 14 | Security MeasuresARP Inspection– 320 –WEB INTERFACETo display statistics for ARP Inspection: 1. Click Security, ARP Inspection.2. Sel

Page 248

CHAPTER 14 | Security MeasuresFiltering IP Addresses for Management Access– 321 –WEB INTERFACETo display the ARP Inspection log: 1. Click Security

Page 249

CHAPTER 14 | Security MeasuresFiltering IP Addresses for Management Access– 322 –◆ When entering addresses for the same group (i.e., SNMP, web or

Page 250

CHAPTER 14 | Security MeasuresConfiguring Port Security– 323 –To show a list of IP addresses authorized for management access: 1. Click Security,

Page 251 - 13 VOIP TRAFFIC CONFIGURATION

CHAPTER 14 | Security MeasuresConfiguring Port Security– 324 –COMMAND USAGE◆ A secure port has the following restrictions: It cannot be used as a

Page 252 - Configuring VoIP Traffic

CHAPTER 14 | Security MeasuresConfiguring 802.1X Port Authentication– 325 –Figure 186: Configuring Port SecurityCONFIGURING 802.1X PORT AUTHENTIC

Page 253 - Configuring Telephony OUI

CHAPTER 14 | Security MeasuresConfiguring 802.1X Port Authentication– 326 –hosts if one attached host fails re-authentication or sends an EAPOL lo

Page 254 - ONFIGURING VOIP TRAFFIC PORTS

CHAPTER 14 | Security MeasuresConfiguring 802.1X Port Authentication– 327 –PARAMETERSThese parameters are displayed:◆ Port Authentication Status –

Page 255 - 1. Click Traffic, VoIP

CHAPTER 14 | Security MeasuresConfiguring 802.1X Port Authentication– 328 –Figure 188: Configuring Global Settings for 802.1X Port Authentication

Page 256 - – 256 –

CHAPTER 14 | Security MeasuresConfiguring 802.1X Port Authentication– 329 –PARAMETERSThese parameters are displayed:◆ Port – Port number.◆ Status

Page 257 - 14 SECURITY MEASURES

FIGURES– 33 –Figure 68: Showing the Members of a Dynamic VLAN 168Figure 69: QinQ Operational Concept 169Figure 70: Enabling QinQ Tunneling 173Figure

Page 258 -

CHAPTER 14 | Security MeasuresConfiguring 802.1X Port Authentication– 330 –◆ Max-Request – Sets the maximum number of times the switch port will r

Page 259

CHAPTER 14 | Security MeasuresConfiguring 802.1X Port Authentication– 331 –◆ Current Identifier – Identifier sent in each EAP Success, Failure or

Page 260

CHAPTER 14 | Security MeasuresConfiguring 802.1X Port Authentication– 332 –Figure 189: Configuring Interface Settings for 802.1X Port Authenticat

Page 261

CHAPTER 14 | Security MeasuresConfiguring 802.1X Port Authentication– 333 –COMMAND USAGE◆ When devices attached to a port must submit requests to

Page 262 - WEB INTERFACE

CHAPTER 14 | Security MeasuresConfiguring 802.1X Port Authentication– 334 –WEB INTERFACETo configure port authenticator settings for 802.1X: 1. Cl

Page 263

CHAPTER 14 | Security MeasuresConfiguring 802.1X Port Authentication– 335 –Rx EAPOL Total The number of valid EAPOL frames of any type that have b

Page 264

CHAPTER 14 | Security MeasuresConfiguring 802.1X Port Authentication– 336 –WEB INTERFACETo display port authenticator statistics for 802.1X: 1. Cl

Page 265

CHAPTER 14 | Security MeasuresIP Source Guard– 337 –To display port supplicant statistics for 802.1X: 1. Click Security, Port Authentication.2. Se

Page 266

CHAPTER 14 | Security MeasuresIP Source Guard– 338 –COMMAND USAGE◆ Setting source guard mode to SIP (Source IP) or SIP-MAC (Source IP and MAC) ena

Page 267

CHAPTER 14 | Security MeasuresIP Source Guard– 339 – SIP-MAC – Enables traffic filtering based on IP addresses and corresponding MAC addresses sto

Page 268

FIGURES– 34 –Figure 104: Displaying Members of an MST Instance 212Figure 105: Configuring MSTP Interface Settings 214Figure 106: Displaying MSTP Int

Page 269

CHAPTER 14 | Security MeasuresIP Source Guard– 340 –new entry will replace the old one and the entry type will be changed to static IP source guar

Page 270

CHAPTER 14 | Security MeasuresIP Source Guard– 341 –To display static bindings for IP Source Guard: 1. Click Security, IP Source Guard, Static Con

Page 271

CHAPTER 14 | Security MeasuresDHCP Snooping– 342 –WEB INTERFACETo display the binding table for IP Source Guard: 1. Click Security, IP Source Guar

Page 272

CHAPTER 14 | Security MeasuresDHCP Snooping– 343 –◆ The rate limit for the number of DHCP messages that can be processed by the switch is 100 pack

Page 273 - Configuring User Accounts

CHAPTER 14 | Security MeasuresDHCP Snooping– 344 –DHCP server, any packets received from untrusted ports are dropped.DHCP Snooping Option 82◆ DHCP

Page 274 - Web Authentication

CHAPTER 14 | Security MeasuresDHCP Snooping– 345 –DHCP SNOOPINGCONFIGURATIONUse the IP Service > DHCP > Snooping (Configure Global) page to

Page 275

CHAPTER 14 | Security MeasuresDHCP Snooping– 346 –Figure 197: Configuring Global Settings for DHCP SnoopingDHCP SNOOPINGVLANCONFIGURATIONUse the

Page 276

CHAPTER 14 | Security MeasuresDHCP Snooping– 347 –WEB INTERFACETo configure global settings for DHCP Snooping: 1. Click Security, IP Source Guard,

Page 277

CHAPTER 14 | Security MeasuresDHCP Snooping– 348 –WEB INTERFACETo configure global settings for DHCP Snooping: 1. Click Security, IP Source Guard,

Page 278 - ” and the

CHAPTER 14 | Security MeasuresDHCP Snooping– 349 –◆ Store – Writes all dynamically learned snooping entries to flash memory. This function can be

Page 279 - NETWORK ACCESS

FIGURES– 35 –Figure 140: Configuring AAA Accounting Methods 267Figure 141: Showing AAA Accounting Methods 268Figure 142: Configuring AAA Accounting

Page 280

CHAPTER 14 | Security MeasuresDHCP Snooping– 350 –

Page 281

– 351 –15 BASIC ADMINISTRATION PROTOCOLSThis chapter describes basic administration tasks including:◆ Event Logging – Sets conditions for logging e

Page 282 - LINK DETECTION

CHAPTER 15 | Basic Administration ProtocolsConfiguring Event Logging– 352 –PARAMETERSThese parameters are displayed:◆ System Log Status – Enables/

Page 283

CHAPTER 15 | Basic Administration ProtocolsConfiguring Event Logging– 353 –Figure 201: Configuring Settings for System Memory LogsTo show the err

Page 284

CHAPTER 15 | Basic Administration ProtocolsConfiguring Event Logging– 354 –◆ Logging Facility – Sets the facility type for remote logging of syslo

Page 285 - INFORMATION

CHAPTER 15 | Basic Administration ProtocolsConfiguring Event Logging– 355 –SENDING SIMPLE MAILTRANSFER PROTOCOLALERTSUse the Administration > L

Page 286 - CONFIGURING HTTPS

CHAPTER 15 | Basic Administration ProtocolsLink Layer Discovery Protocol– 356 –Figure 204: Configuring SMTP Alert MessagesLINK LAYER DISCOVERY PR

Page 287 - Configuring HTTPS

CHAPTER 15 | Basic Administration ProtocolsLink Layer Discovery Protocol– 357 –This attribute must comply with the following rule:(Transmission In

Page 288

CHAPTER 15 | Basic Administration ProtocolsLink Layer Discovery Protocol– 358 –3. Enable LLDP, and modify any of the timing parameters as required

Page 289 - Configuring the Secure Shell

CHAPTER 15 | Basic Administration ProtocolsLink Layer Discovery Protocol– 359 –lldpStatsRemTableLastChangeTime to detect any lldpRemTablesChange n

Page 290

FIGURES– 36 –Figure 176: Configuring a MAC ACL 309Figure 177: Configuring a ARP ACL 311Figure 178: Binding a Port to an ACL 313Figure 179: Configuri

Page 291

CHAPTER 15 | Basic Administration ProtocolsLink Layer Discovery Protocol– 360 – VLAN ID – The port’s default VLAN identifier (PVID) indicates the

Page 292

CHAPTER 15 | Basic Administration ProtocolsLink Layer Discovery Protocol– 361 –Figure 206: Configuring LLDP Interface AttributesDISPLAYING LLDPLO

Page 293

CHAPTER 15 | Basic Administration ProtocolsLink Layer Discovery Protocol– 362 –◆ Chassis ID – An octet string indicating the specific identifier f

Page 294

CHAPTER 15 | Basic Administration ProtocolsLink Layer Discovery Protocol– 363 –Figure 207: Displaying Local Device Information for LLDP (General)

Page 295

CHAPTER 15 | Basic Administration ProtocolsLink Layer Discovery Protocol– 364 –◆ System Name – A string that indicates the system’s administrative

Page 296

CHAPTER 15 | Basic Administration ProtocolsLink Layer Discovery Protocol– 365 –◆ Management Address List – The management addresses for this devic

Page 297 - Access Control Lists

CHAPTER 15 | Basic Administration ProtocolsLink Layer Discovery Protocol– 366 –◆ Remote Port Auto-Neg Status – Shows whether port auto-negotiation

Page 298 - SETTING A TIME

CHAPTER 15 | Basic Administration ProtocolsLink Layer Discovery Protocol– 367 –◆ Remote Link Aggregation Port ID – This object contains the IEEE 8

Page 299

CHAPTER 15 | Basic Administration ProtocolsLink Layer Discovery Protocol– 368 –DISPLAYING DEVICESTATISTICSUse the Administration > LLDP (Show D

Page 300

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 369 –WEB INTERFACETo display statistics for LLDP-capable devices at

Page 301

FIGURES– 37 –Figure 212: Displaying LLDP Device Statistics (Port) 369Figure 213: Configuring Global Settings for SNMP 372Figure 214: Configuring the

Page 302 - NAME AND TYPE

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 370 –Managed devices supporting SNMP contain software, which runs l

Page 303 - Figure 172: Creating an ACL

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 371 –NOTE: The predefined default groups and view can be deleted fr

Page 304

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 372 –CONFIGURING GLOBALSETTINGS FOR SNMPUse the Administration >

Page 305

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 373 –SETTING THE LOCALENGINE IDUse the Administration > SNMP (Co

Page 306

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 374 –SPECIFYING A REMOTEENGINE IDUse the Administration > SNMP (

Page 307

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 375 –WEB INTERFACETo configure a remote SNMP engine ID:1. Click Adm

Page 308 - CONFIGURING A MAC

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 376 –PARAMETERSThese parameters are displayed:Add View◆ View Name –

Page 309

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 377 –To show the SNMP views of the switch’s MIB database:1. Click A

Page 310

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 378 –To show the OID branches configured for the SNMP views of the

Page 311

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 379 –◆ Read View – The configured view for read access. (Range: 1-6

Page 312

FIGURES– 38 –Figure 248: Pnging a Network Device 412Figure 249: Configuring a Static IPv4 Address 414Figure 250: Configuring a Dynamic IPv4 Address

Page 313 - ARP Inspection

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 380 –RMON Events (V2)risingAlarm 1.3.6.1.2.1.16.0.1 The SNMP trap t

Page 314 - SETTINGS FOR ARP

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 381 –WEB INTERFACETo configure an SNMP group:1. Click Administratio

Page 315

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 382 –Figure 222: Showing SNMP GroupsSETTING COMMUNITYACCESS STRING

Page 316

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 383 –WEB INTERFACETo set a community access string:1. Click Adminis

Page 317

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 384 –CONFIGURING LOCALSNMPV3 USERSUse the Administration > SNMP

Page 318

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 385 –WEB INTERFACETo configure a local SNMPv3 user:1. Click Adminis

Page 319

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 386 –Figure 226: Showing Local SNMPv3 UsersCONFIGURING REMOTESNMPV

Page 320

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 387 – AuthPriv – SNMP communications use both authentication and en

Page 321

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 388 –Figure 227: Configuring Remote SNMPv3 UsersTo show remote SNM

Page 322 - 1. Click Security, IP Filter

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 389 –SPECIFYING TRAPMANAGERSUse the Administration > SNMP (Confi

Page 323 - Configuring Port Security

FIGURES– 39 –Figure 284: Configuring IGMP Filtering and Throttling Interface Settings 463Figure 285: MVR Concept 464Figure 286: Configuring Globa

Page 324 - 3. Click Apply

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 390 –PARAMETERSThese parameters are displayed:SNMP Version 1◆ IP Ad

Page 325

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 391 –SNMP Version 3◆ IP Address – IP address of a new management st

Page 326

CHAPTER 15 | Basic Administration ProtocolsSimple Network Management Protocol– 392 –WEB INTERFACETo configure trap managers:1. Click Administratio

Page 327

CHAPTER 15 | Basic Administration ProtocolsRemote Monitoring– 393 –Figure 231: Configuring Trap Managers (SNMPv3)To show configured trap managers

Page 328

CHAPTER 15 | Basic Administration ProtocolsRemote Monitoring– 394 –The switch supports mini-RMON, which consists of the Statistics, History, Event

Page 329

CHAPTER 15 | Basic Administration ProtocolsRemote Monitoring– 395 –generated, another such event will not be generated until the sampled value has

Page 330

CHAPTER 15 | Basic Administration ProtocolsRemote Monitoring– 396 –Figure 233: Configuring an RMON AlarmTo show configured RMON alarms:1. Click A

Page 331

CHAPTER 15 | Basic Administration ProtocolsRemote Monitoring– 397 –CONFIGURING RMONEVENTSUse the Administration > RMON (Configure Global - Add

Page 332

CHAPTER 15 | Basic Administration ProtocolsRemote Monitoring– 398 –WEB INTERFACETo configure an RMON event:1. Click Administration, RMON.2. Select

Page 333

CHAPTER 15 | Basic Administration ProtocolsRemote Monitoring– 399 –To show configured RMON events:1. Click Administration, RMON.2. Select Configur

Page 335

FIGURES– 40 –

Page 336

CHAPTER 15 | Basic Administration ProtocolsRemote Monitoring– 400 –PARAMETERSThese parameters are displayed:◆ Port – The port number on the switch

Page 337 - IP Source Guard

CHAPTER 15 | Basic Administration ProtocolsRemote Monitoring– 401 –To show configured RMON history samples:1. Click Administration, RMON.2. Select

Page 338

CHAPTER 15 | Basic Administration ProtocolsRemote Monitoring– 402 –CONFIGURING RMONSTATISTICAL SAMPLESUse the Administration > RMON (Configure

Page 339 - SOURCE GUARD

CHAPTER 15 | Basic Administration ProtocolsRemote Monitoring– 403 –WEB INTERFACETo enable regular sampling of statistics on a port:1. Click Admini

Page 340

CHAPTER 15 | Basic Administration ProtocolsRemote Monitoring– 404 –Figure 241: Showing Configured RMON Statistical SamplesTo show collected RMON

Page 341

CHAPTER 15 | Basic Administration ProtocolsSwitch Clustering– 405 –SWITCH CLUSTERINGSwitch clustering is a method of grouping switches together to

Page 342 - DHCP Snooping

CHAPTER 15 | Basic Administration ProtocolsSwitch Clustering– 406 –PARAMETERSThese parameters are displayed:◆ Cluster Status – Enables or disables

Page 343

CHAPTER 15 | Basic Administration ProtocolsSwitch Clustering– 407 –CLUSTER MEMBERCONFIGURATIONUse the Administration > Cluster (Configure Membe

Page 344

CHAPTER 15 | Basic Administration ProtocolsSwitch Clustering– 408 –Figure 245: Showing Cluster MembersTo show cluster candidates:1. Click Adminis

Page 345

CHAPTER 15 | Basic Administration ProtocolsSwitch Clustering– 409 –◆ Operate – Remotely manage a cluster member.WEB INTERFACETo manage a cluster m

Page 346

– 41 –TABLESTable 1: Key Features 49Table 2: System Defaults 54Table 3: Web Page Configuration Buttons 75Table 4: Switch Main Menu 76Table 5: Po

Page 347

CHAPTER 15 | Basic Administration ProtocolsSwitch Clustering– 410 –

Page 348

– 411 –16 IP CONFIGURATIONThis chapter describes how to configure an IP interface for management access to the switch over the network. This switch

Page 349

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 4)– 412 – Destination does not respond - If the host does not respond, a

Page 350

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 4)– 413 –CLI REFERENCES◆ "DHCP Client" on page 911◆ "Basic

Page 351 - ASIC ADMINISTRATION PROTOCOLS

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 4)– 414 –WEB INTERFACETo set a static address for the switch:1. Click Sys

Page 352 - Table 22: Logging Levels

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 415 –NOTE: The switch will also broadcast a request for IP configurat

Page 353

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 416 – An IPv6 default gateway must be defined if the management stati

Page 354

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 417 –reachability information about the paths to active neighbors. Th

Page 355

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 418 – Duplicate address detection determines if a new unicast IPv6 ad

Page 356 - Link Layer Discovery Protocol

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 419 –3. Specify the VLAN to configure, enable address auto-configurat

Page 357

TABLES– 42 –Table 32: General Command Modes 478Table 33: Configuration Command Modes 480Table 34: Keystroke Commands 481Table 35: Command Group I

Page 358

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 420 –◆ To connect to a larger network with multiple subnets, you must

Page 359

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 421 –of the address comprise the prefix (i.e., the network portion of

Page 360

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 422 –Figure 253: Configuring an IPv6 AddressSHOWING IPV6ADDRESSESUse

Page 361 - Table 23: Chassis ID Subtype

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 423 –Note that the solicited-node multicast address (link-local scope

Page 362

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 424 –WEB INTERFACETo show neighboring IPv6 devices:1. Click IP, IPv6

Page 363

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 425 –SHOWING IPV6STATISTICSUse the IP > IPv6 Configuration (Show S

Page 364 - Table 25: Port ID Subtype

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 426 –Address Errors The number of input datagrams discarded because t

Page 365

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 427 –Generated Fragments The number of output datagram fragments that

Page 366

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 428 –Destination Unreachable MessagesThe number of ICMP Destination U

Page 367

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 429 –WEB INTERFACETo show the IPv6 statistics:1. Click IP, IPv6 Confi

Page 368

TABLES– 43 –Table 68: Telnet Server Commands 607Table 69: Secure Shell Commands 609Table 70: show ssh - display description 618Table 71: 802.1X P

Page 369

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 430 –Figure 258: Showing IPv6 Statistics (UDP)SHOWING THE MTUFOR RES

Page 370

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 431 –WEB INTERFACETo show the MTU reported from other devices:1. Clic

Page 371

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 432 –

Page 372 - SETTINGS FOR SNMP

– 433 –17 IP SERVICESThis chapter describes how to configure Domain Name Service (DNS) on this switch. For information on DHCP snooping which is inc

Page 373 - ENGINE ID

CHAPTER 17 | IP ServicesConfiguring a List of Domain Names– 434 –WEB INTERFACETo configure general settings for DNS:1. Click IP Service, DNS.2. Se

Page 374 - SPECIFYING A REMOTE

CHAPTER 17 | IP ServicesConfiguring a List of Domain Names– 435 –PARAMETERSThese parameters are displayed:Domain Name – Name of the host. Do not i

Page 375 - SETTING SNMPV3

CHAPTER 17 | IP ServicesConfiguring a List of Name Servers– 436 –CONFIGURING A LIST OF NAME SERVERSUse the IP Service > DNS - General (Add Name

Page 376

CHAPTER 17 | IP ServicesConfiguring Static DNS Host to Address Entries– 437 –To show the list name servers:1. Click IP Service, DNS.2. Select Show

Page 377 - – 377 –

CHAPTER 17 | IP ServicesConfiguring Static DNS Host to Address Entries– 438 –WEB INTERFACETo configure static entries in the DNS table:1. Click IP

Page 378 - SNMPV3 GROUPS

CHAPTER 17 | IP ServicesDisplaying the DNS Cache– 439 –DISPLAYING THE DNS CACHEUse the IP Service > DNS - Cache page to display entries in the

Page 379

TABLES– 44 –Table 104: GVRP and Bridge Extension Commands 782Table 105: Commands for Editing VLAN Groups 786Table 106: Commands for Configuring VL

Page 380

CHAPTER 17 | IP ServicesDisplaying the DNS Cache– 440 –

Page 381

– 441 –18 MULTICAST FILTERING This chapter describes how to configure the following multicast servcies:◆ IGMP – Configuring snooping and query param

Page 382 - ACCESS STRINGS

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 442 –device, most commonly a multicast router. In this way, the switch can disc

Page 383

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 443 –NOTE: When the switch is configured to use IGMPv3 snooping, the snooping v

Page 384 - SNMPV3 USERS

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 444 –CONFIGURING IGMPSNOOPING AND QUERYPARAMETERSUse the Multicast > IGMP Sn

Page 385

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 445 –◆ Proxy Reporting Status – Enables IGMP Snooping with Proxy Reporting. (De

Page 386

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 446 –When the root bridge in a spanning tree receives a TCN for a VLAN where IG

Page 387

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 447 –◆ IGMP Snooping Version – Sets the protocol version for compatibility with

Page 388 - – 388 –

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 448 –attached router. This can ensure that multicast traffic is passed to all t

Page 389 - MANAGERS

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 449 –Figure 271: Showing Static Interfaces Attached a Multicast RouterTo show

Page 390

TABLES– 45 –Table 140: show ipv6 interface - display description 935Table 141: show ipv6 mtu - display description 937Table 142: show ipv6 traffic

Page 391 - – 391 –

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 450 –COMMAND USAGE◆ Static multicast addresses are never aged out.◆ When a mult

Page 392

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 451 –Figure 274: Showing Static Interfaces Assigned to a Multicast ServiceTo s

Page 393 - Remote Monitoring

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 452 –COMMAND USAGEMulticast Router DiscoveryThere have been many mechanisms use

Page 394

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 453 –Advertisement and Termination messages are sent to the All-Snoopers multic

Page 395

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 454 –enabled on an interface if it is connected to only one IGMP-enabled device

Page 396

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 455 –◆ Query Response Interval – The maximum time the system waits for a respon

Page 397 - CONFIGURING RMON

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 456 –WEB INTERFACETo configure IGMP snooping on a VLAN:1. Click Multicast, IGMP

Page 398

CHAPTER 18 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 457 –Figure 277: Showing Interface Settings for IGMP Snooping DISPLAYINGMULTIC

Page 399

CHAPTER 18 | Multicast FilteringFiltering and Throttling IGMP Groups– 458 –WEB INTERFACETo show multicast groups learned through IGMP snooping:1.

Page 400

CHAPTER 18 | Multicast FilteringFiltering and Throttling IGMP Groups– 459 –ENABLING IGMPFILTERING ANDTHROTTLINGUse the Multicast > IGMP Snoopin

Page 401

TABLES– 46 –

Page 402

CHAPTER 18 | Multicast FilteringFiltering and Throttling IGMP Groups– 460 –PARAMETERSThese parameters are displayed:Add◆ Profile ID – Creates an I

Page 403

CHAPTER 18 | Multicast FilteringFiltering and Throttling IGMP Groups– 461 –3. Select Show from the Action list.Figure 281: Showing the IGMP Filte

Page 404

CHAPTER 18 | Multicast FilteringFiltering and Throttling IGMP Groups– 462 –To show the multicast groups configured for an IGMP filter profile:1. C

Page 405 - Switch Clustering

CHAPTER 18 | Multicast FilteringMulticast VLAN Registration– 463 –◆ Current Multicast Groups – Displays the current multicast groups the interface

Page 406

CHAPTER 18 | Multicast FilteringMulticast VLAN Registration– 464 –MVR maintains the user isolation and data security provided by VLAN segregation

Page 407

CHAPTER 18 | Multicast FilteringMulticast VLAN Registration– 465 –CONFIGURING GLOBALMVR SETTINGSUse the Multicast > MVR (Configure General) pag

Page 408

CHAPTER 18 | Multicast FilteringMulticast VLAN Registration– 466 –WEB INTERFACETo configure global settings for MVR:1. Click Multicast, MVR.2. Sel

Page 409

CHAPTER 18 | Multicast FilteringMulticast VLAN Registration– 467 –◆ One or more interfaces may be configured as MVR source ports. A source port is

Page 410

CHAPTER 18 | Multicast FilteringMulticast VLAN Registration– 468 –multicast traffic from one of the MVR groups, or a multicast group has been stat

Page 411 - 16 IP CONFIGURATION

CHAPTER 18 | Multicast FilteringMulticast VLAN Registration– 469 –WEB INTERFACETo assign a static MVR group to a port:1. Click Multicast, MVR.2. S

Page 412 - 1. Click IP, General, Ping

– 47 –SECTION IGETTING STARTEDThis section provides an overview of the switch, and introduces some basic concepts about network switches. It also de

Page 413 -

CHAPTER 18 | Multicast FilteringMulticast VLAN Registration– 470 –DISPLAYING MVRRECEIVER GROUPSUse the Multicast > MVR (Show Member) page to di

Page 414

– 471 –SECTION IIICOMMAND LINE INTERFACEThis section provides a detailed description of the Command Line Interface, along with examples for all of t

Page 415

SECTION III | Command Line Interface– 472 –◆ "Multicast Filtering Commands" on page 849◆ "LLDP Commands" on page 883◆ "Do

Page 416

– 473 –19 USING THE COMMAND LINE INTERFACEThis chapter describes how to use the Command Line Interface (CLI).ACCESSING THE CLIWhen accessing the man

Page 417

CHAPTER 19 | Using the Command Line InterfaceAccessing the CLI– 474 –TELNET CONNECTION Telnet operates over the IP transport protocol. In this env

Page 418

CHAPTER 19 | Using the Command Line InterfaceEntering Commands– 475 –NOTE: You can open up to four sessions to the device via Telnet.ENTERING COMM

Page 419

CHAPTER 19 | Using the Command Line InterfaceEntering Commands– 476 –GETTING HELP ONCOMMANDSYou can display a brief description of the help system

Page 420

CHAPTER 19 | Using the Command Line InterfaceEntering Commands– 477 – sntp Simple Network Time Protocol configuration spanning-

Page 421

CHAPTER 19 | Using the Command Line InterfaceEntering Commands– 478 –UNDERSTANDINGCOMMAND MODESThe command set is divided into Exec and Configurat

Page 422

CHAPTER 19 | Using the Command Line InterfaceEntering Commands– 479 –Username: guestPassword: [guest login password] CLI session with the MS45349

Page 423

SECTION I | Getting Started– 48 –

Page 424

CHAPTER 19 | Using the Command Line InterfaceEntering Commands– 480 –To enter the Global Configuration mode, enter the command configure in Privil

Page 425

CHAPTER 19 | Using the Command Line InterfaceEntering Commands– 481 –COMMAND LINEPROCESSINGCommands are not case sensitive. You can abbreviate com

Page 426

CHAPTER 19 | Using the Command Line InterfaceCLI Command Groups– 482 –CLI COMMAND GROUPSThe system commands can be broken down into the functional

Page 427

CHAPTER 19 | Using the Command Line InterfaceCLI Command Groups– 483 –The access mode shown in the following tables is indicated by these abbrevia

Page 428

CHAPTER 19 | Using the Command Line InterfaceCLI Command Groups– 484 –

Page 429

– 485 –20 GENERAL COMMANDSThese commands are used to control the command access mode, configuration mode, and other basic functions.prompt This comm

Page 430

CHAPTER 20 | General Commands– 486 –EXAMPLE Console(config)#prompt RD2RD2(config)#reload (GlobalConfiguration)This command restarts the system at

Page 431

CHAPTER 20 | General Commands– 487 –COMMAND USAGE ◆ This command resets the entire system. ◆ Any combination of reload options may be specified. I

Page 432

CHAPTER 20 | General Commands– 488 –EXAMPLE Console>enablePassword: [privileged level password]Console#RELATED COMMANDS disable (490)enable pas

Page 433 - 17 IP SERVICES

CHAPTER 20 | General Commands– 489 –EXAMPLE In this example, the show history command lists the contents of the command history buffer:Console#sho

Page 434 -

– 49 –1 INTRODUCTIONThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to configur

Page 435

CHAPTER 20 | General Commands– 490 –disable This command returns to Normal Exec mode from privileged mode. In normal access mode, you can only dis

Page 436

CHAPTER 20 | General Commands– 491 –show reload This command displays the current reload settings, and the time at which next scheduled reload wil

Page 437

CHAPTER 20 | General Commands– 492 –EXAMPLE This example shows how to return to the Privileged Exec mode from the Global Configuration mode, and t

Page 438

– 493 –21 SYSTEM MANAGEMENT COMMANDSThese commands are used to control system logs, passwords, user names, management options, and display or config

Page 439 - Displaying the DNS Cache

CHAPTER 21 | System Management CommandsBanner Information– 494 –hostname This command specifies or modifies the host name for this device. Use the

Page 440

CHAPTER 21 | System Management CommandsBanner Information– 495 –banner configure This command is used to interactively specify administrative info

Page 441 - 18 MULTICAST FILTERING

CHAPTER 21 | System Management CommandsBanner Information– 496 –Row: 7Rack: 29Shelf in this rack: 8Information about DC power supply.Floor: 2Row:

Page 442 -

CHAPTER 21 | System Management CommandsBanner Information– 497 –banner configuredc-power-infoThis command is use to configure DC power information

Page 443

CHAPTER 21 | System Management CommandsBanner Information– 498 –COMMAND MODEGlobal ConfigurationCOMMAND USAGE Input strings cannot contain spaces.

Page 444

CHAPTER 21 | System Management CommandsBanner Information– 499 –EXAMPLE Console(config)#banner configure equipment-info manufacturer-id MS453490M

Page 445

– 5 –CONTENTSABOUT THIS GUIDE 3CONTENTS 5FIGURES 31TABLES 41SECTION I GETTING STARTED 471INTRODUCTION 49Key Features 49Description of Software Feat

Page 446

CHAPTER 1 | IntroductionDescription of Software Features– 50 –DESCRIPTION OF SOFTWARE FEATURESThe switch provides a wide range of advanced perform

Page 447

CHAPTER 21 | System Management CommandsBanner Information– 500 –COMMAND MODEGlobal ConfigurationCOMMAND USAGE Input strings cannot contain spaces.

Page 448

CHAPTER 21 | System Management CommandsBanner Information– 501 –banner configuremanager-infoThis command is used to configure the manager contact

Page 449

CHAPTER 21 | System Management CommandsBanner Information– 502 –DEFAULT SETTING NoneCOMMAND MODEGlobal ConfigurationCOMMAND USAGE Input strings ca

Page 450

CHAPTER 21 | System Management CommandsSystem Status– 503 –show banner This command displays all banner information.COMMAND MODENormal Exec, Privi

Page 451

CHAPTER 21 | System Management CommandsSystem Status– 504 –show access-listtcam-utilizationThis command shows utilization parameters for TCAM (Ter

Page 452

CHAPTER 21 | System Management CommandsSystem Status– 505 –EXAMPLE Console#show process cpu CPU Utilization in the past 5 seconds : 3.98%Console#s

Page 453

CHAPTER 21 | System Management CommandsSystem Status– 506 –spanning-tree mst configuration!interface ethernet 1/1 switchport allowed vlan add 1 un

Page 454

CHAPTER 21 | System Management CommandsSystem Status– 507 –RELATED COMMANDSshow running-config (505)show system This command displays system infor

Page 455

CHAPTER 21 | System Management CommandsSystem Status– 508 –EXAMPLE Console#show users User Name Accounts: User Name Privilege Public-Key -------

Page 456

CHAPTER 21 | System Management CommandsFrame Size– 509 –FRAME SIZEThis section describes commands used to configure the Ethernet frame size on the

Page 457

CHAPTER 1 | IntroductionDescription of Software Features– 51 –ACCESS CONTROLLISTSACLs provide packet filtering for IP frames (based on address, pr

Page 458

CHAPTER 21 | System Management CommandsFile Management– 510 –FILE MANAGEMENTManaging FirmwareFirmware can be uploaded and downloaded to or from an

Page 459

CHAPTER 21 | System Management CommandsFile Management– 511 –boot system This command specifies the file or image used to start up the system.SYNT

Page 460

CHAPTER 21 | System Management CommandsFile Management– 512 –copy This command moves (upload/download) a code image or configuration file between

Page 461

CHAPTER 21 | System Management CommandsFile Management– 513 –◆ The Boot ROM and Loader cannot be uploaded or downloaded from the FTP/TFTP server.

Page 462

CHAPTER 21 | System Management CommandsFile Management– 514 –The following example shows how to download a configuration file: Console#copy tftp s

Page 463 - Multicast VLAN Registration

CHAPTER 21 | System Management CommandsFile Management– 515 –delete This command deletes a file or image.SYNTAX delete filenamefilename - Name of

Page 464 - Figure 285: MVR Concept

CHAPTER 21 | System Management CommandsFile Management– 516 –COMMAND USAGE ◆ If you enter the command dir without any parameters, the system displ

Page 465

CHAPTER 21 | System Management CommandsFile Management– 517 –EXAMPLEThis example shows the information displayed by the whichboot command. See the

Page 466

CHAPTER 21 | System Management CommandsFile Management– 518 –◆ Any changes made to the default setting can be displayed with the show running-conf

Page 467

CHAPTER 21 | System Management CommandsFile Management– 519 –◆ When specifying a TFTP server, the following syntax must be used, where filedir ind

Page 468

CHAPTER 1 | IntroductionDescription of Software Features– 52 –IEEE 802.1D BRIDGE The switch supports IEEE 802.1D transparent bridging. The address

Page 469

CHAPTER 21 | System Management CommandsLine– 520 –LINEYou can access the onboard configuration program by attaching a VT100 compatible device to t

Page 470

CHAPTER 21 | System Management CommandsLine– 521 –COMMAND MODE Global Configuration COMMAND USAGE Telnet is considered a virtual terminal connecti

Page 471 - COMMAND LINE INTERFACE

CHAPTER 21 | System Management CommandsLine– 522 –RELATED COMMANDS parity (523)exec-timeout This command sets the interval that the system waits u

Page 472 -

CHAPTER 21 | System Management CommandsLine– 523 –DEFAULT SETTING login localCOMMAND MODE Line Configuration COMMAND USAGE ◆ There are three authe

Page 473 - 19 USING THE COMMAND LINE

CHAPTER 21 | System Management CommandsLine– 524 –DEFAULT SETTING No parityCOMMAND MODE Line Configuration COMMAND USAGE Communication protocols p

Page 474 - Accessing the CLI

CHAPTER 21 | System Management CommandsLine– 525 –EXAMPLE Console(config-line)#password 0 secretConsole(config-line)#RELATED COMMANDSlogin (522)pa

Page 475 - Console#show startup-config

CHAPTER 21 | System Management CommandsLine– 526 –silent-time This command sets the amount of time the management console is inaccessible after th

Page 476

CHAPTER 21 | System Management CommandsLine– 527 –supported. If you select the “auto” option, the switch will automatically detect the baud rate c

Page 477

CHAPTER 21 | System Management CommandsLine– 528 –COMMAND MODE Line ConfigurationCOMMAND USAGE ◆ If a login attempt is not detected within the tim

Page 478

CHAPTER 21 | System Management CommandsEvent Logging– 529 –show line This command displays the terminal line’s parameters.SYNTAX show line [consol

Page 479

CHAPTER 1 | IntroductionDescription of Software Features– 53 –VIRTUAL LANS The switch supports up to 255 VLANs. A Virtual LAN is a collection of n

Page 480

CHAPTER 21 | System Management CommandsEvent Logging– 530 –logging facility This command sets the facility type for remote logging of syslog messa

Page 481 - Table 34: Keystroke Commands

CHAPTER 21 | System Management CommandsEvent Logging– 531 –logging history This command limits syslog messages saved to switch memory based on sev

Page 482 - Table 35: Command Group Index

CHAPTER 21 | System Management CommandsEvent Logging– 532 –logging host This command adds a syslog server host IP address that will receive loggin

Page 483

CHAPTER 21 | System Management CommandsEvent Logging– 533 –RELATED COMMANDSlogging history (531)logging trap (533)clear log (533)logging trap This

Page 484

CHAPTER 21 | System Management CommandsEvent Logging– 534 –COMMAND MODE Privileged ExecEXAMPLE Console#clear logConsole#RELATED COMMANDSshow log (

Page 485 - 20 GENERAL COMMANDS

CHAPTER 21 | System Management CommandsEvent Logging– 535 –show logging This command displays the configuration settings for logging messages to l

Page 486 -

CHAPTER 21 | System Management CommandsSMTP Alerts– 536 –REMOTELOG Level Type: Debugging messagesREMOTELOG server IP Address: 1.2.3.4REMOTE

Page 487

CHAPTER 21 | System Management CommandsSMTP Alerts– 537 –logging sendmail This command enables SMTP event handling. Use the no form to disable thi

Page 488

CHAPTER 21 | System Management CommandsSMTP Alerts– 538 –EXAMPLEConsole(config)#logging sendmail host 192.168.1.19Console(config)#logging sendmail

Page 489

CHAPTER 21 | System Management CommandsSMTP Alerts– 539 –COMMAND MODE Global ConfigurationCOMMAND USAGE You can specify up to five recipients for

Page 490

CHAPTER 1 | IntroductionSystem Defaults– 54 –QUALITY OF SERVICE Differentiated Services (DiffServ) provides policy-based management mechanisms use

Page 491

CHAPTER 21 | System Management CommandsTime– 540 –SMTP Minimum Severity Level: 7SMTP destination email addresses----------------------------------

Page 492

CHAPTER 21 | System Management CommandsTime– 541 –COMMAND USAGE ◆ The time acquired from time servers is used to record accurate dates and times f

Page 493 - 21 SYSTEM MANAGEMENT COMMANDS

CHAPTER 21 | System Management CommandsTime– 542 –RELATED COMMANDSsntp client (540)sntp server This command sets the IP address of the servers to

Page 494 - Table 39: Banner Commands

CHAPTER 21 | System Management CommandsTime– 543 –EXAMPLE Console#show sntpCurrent Time : Nov 5 18:51:22 2006Poll Interval : 16 secondsCurrent

Page 495

CHAPTER 21 | System Management CommandsTime– 544 –calendar set This command sets the system clock. It may be used if there is no time server on yo

Page 496

CHAPTER 21 | System Management CommandsTime Range– 545 –TIME RANGEThis section describes the commands used to sets a time range for use by other f

Page 497

CHAPTER 21 | System Management CommandsTime Range– 546 –absolute This command sets the time range for the execution of a command. Use the no form

Page 498

CHAPTER 21 | System Management CommandsTime Range– 547 –monday - Mondaysaturday - Saturdaysunday - Sundaythursday - Thursdaytuesday - Tuesdaywedne

Page 499

CHAPTER 21 | System Management CommandsSwitch Clustering– 548 –SWITCH CLUSTERINGSwitch Clustering is a method of grouping switches together to ena

Page 500

CHAPTER 21 | System Management CommandsSwitch Clustering– 549 –cluster This command enables clustering on the switch. Use the no form to disable c

Page 501

CHAPTER 1 | IntroductionSystem Defaults– 55 –Web Management HTTP Server EnabledHTTP Port Number 80HTTP Secure Server EnabledHTTP Secure Server Por

Page 502

CHAPTER 21 | System Management CommandsSwitch Clustering– 550 –COMMAND USAGE ◆ Once a switch has been configured to be a cluster Commander, it aut

Page 503 - System Status

CHAPTER 21 | System Management CommandsSwitch Clustering– 551 –cluster member This command configures a Candidate switch as a cluster Member. Use

Page 504

CHAPTER 21 | System Management CommandsSwitch Clustering– 552 –EXAMPLEConsole#rcommand id 1 CLI session with the MS453490M is opened. To

Page 505 - COMMAND MODE

CHAPTER 21 | System Management CommandsSwitch Clustering– 553 –show clustercandidatesThis command shows the discovered Candidate switches in the n

Page 506 - RELATED COMMANDS

CHAPTER 21 | System Management CommandsSwitch Clustering– 554 –

Page 507

– 555 –22 SNMP COMMANDSControls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as the e

Page 508

CHAPTER 22 | SNMP Commands– 556 –snmp-server This command enables the SNMPv3 engine and services for all management clients (i.e., versions 1, 2c,

Page 509 - Frame Size

CHAPTER 22 | SNMP Commands– 557 –snmp-servercommunityThis command defines community access strings used to authorize management access by clients

Page 510 - File Management

CHAPTER 22 | SNMP Commands– 558 –EXAMPLE Console(config)#snmp-server contact PaulConsole(config)#RELATED COMMANDSsnmp-server location (558)snmp-se

Page 511

CHAPTER 22 | SNMP Commands– 559 –Console#show snmpSNMP Agent : EnabledSNMP Traps : Authentication : Enabled Link-up-down : EnabledSNMP Communiti

Page 512

CHAPTER 1 | IntroductionSystem Defaults– 56 –Traffic Prioritization Ingress Port Priority 0Queue Mode WRRQueue Weight Queue: 0 1 2 3 Weight: 1

Page 513

CHAPTER 22 | SNMP Commands– 560 –no keywords, both authentication and link-up-down notifications are enabled. If you enter the command with a keyw

Page 514

CHAPTER 22 | SNMP Commands– 561 –prior to using the snmp-server host command. (Maximum length: 32 characters)version - Specifies whether to send n

Page 515

CHAPTER 22 | SNMP Commands– 562 –To send an inform to a SNMPv2c host, complete these steps:1. Enable the SNMP agent (page 556).2. Create a view wi

Page 516

CHAPTER 22 | SNMP Commands– 563 –snmp-serverengine-idThis command configures an identification string for the SNMPv3 engine. Use the no form to re

Page 517

CHAPTER 22 | SNMP Commands– 564 –RELATED COMMANDSsnmp-server host (560)snmp-server group This command adds an SNMP group, mapping SNMP users to SN

Page 518

CHAPTER 22 | SNMP Commands– 565 –EXAMPLEConsole(config)#snmp-server group r&d v3 auth write dailyConsole(config)#snmp-server user This command

Page 519

CHAPTER 22 | SNMP Commands– 566 –◆ Remote users (i.e., the command specifies a remote engine identifier) must be configured to identify the source

Page 520 - DEFAULT SETTING

CHAPTER 22 | SNMP Commands– 567 –COMMAND USAGE ◆ Views are used in the snmp-server group command to restrict user access to specified portions of

Page 521

CHAPTER 22 | SNMP Commands– 568 –show snmp group Four default groups are provided – SNMPv1 read-only access and read/write access, and SNMPv2c rea

Page 522 - Console(config-line)#

CHAPTER 22 | SNMP Commands– 569 –show snmp user This command shows information on SNMP users.COMMAND MODE Privileged ExecEXAMPLEConsole#show snmp

Page 523 - – 523 –

– 57 –2 INITIAL SWITCH CONFIGURATIONThis chapter includes information on connecting to the switch and basic configuration procedures.CONNECTING TO T

Page 524 - – 524 –

CHAPTER 22 | SNMP Commands– 570 –show snmp view This command shows information on the SNMP views.COMMAND MODE Privileged ExecEXAMPLEConsole#show s

Page 525

CHAPTER 22 | SNMP Commands– 571 –◆ Disabling logging with this command does not delete the entries stored in the notification log.EXAMPLEThis exam

Page 526 - – 526 –

CHAPTER 22 | SNMP Commands– 572 –◆ To avoid this problem, notification logging should be configured and enabled using the snmp-server notify-filte

Page 527

CHAPTER 22 | SNMP Commands– 573 –show snmp notify-filterThis command displays the configured notification logs.COMMAND MODE Privileged ExecEXAMPLE

Page 528

CHAPTER 22 | SNMP Commands– 574 –

Page 529 - Event Logging

– 575 –23 REMOTE MONITORING COMMANDSRemote Monitoring allows a remote device to collect information or respond to specified events on an independent

Page 530

CHAPTER 23 | Remote Monitoring Commands– 576 –rmon alarm This command sets threshold bounds for a monitored variable. Use the no form to remove an

Page 531 - Table 46: Logging Levels

CHAPTER 23 | Remote Monitoring Commands– 577 –such event will not be generated until the sampled value has risen above the falling threshold, reac

Page 532

CHAPTER 23 | Remote Monitoring Commands– 578 –COMMAND USAGE ◆ If an event is already defined for an index, the entry must be deleted before any ch

Page 533

CHAPTER 23 | Remote Monitoring Commands– 579 –EXAMPLEConsole(config)#interface ethenet 1/1Console(config-if)#rmon collection history 21 buckets 2

Page 534

CHAPTER 2 | Initial Switch ConfigurationConnecting to the Switch– 58 –◆ Control port access through IEEE 802.1X security or static address filteri

Page 535

CHAPTER 23 | Remote Monitoring Commands– 580 –show rmon alarm This command shows the settings for all configured alarms.COMMAND MODE Privileged Ex

Page 536 - SMTP Alerts

CHAPTER 23 | Remote Monitoring Commands– 581 – buckets requested = 8 buckets granted = 8 Interval = 30 Owner RMON_S

Page 537

CHAPTER 23 | Remote Monitoring Commands– 582 –

Page 538

– 583 –24 AUTHENTICATION COMMANDS You can configure this switch to authenticate users logging into the system for management access using local or r

Page 539

CHAPTER 24 | Authentication CommandsUser Accounts– 584 –enable password After initially logging onto the system, you should set the Privileged Exe

Page 540 - Table 50: Time Commands

CHAPTER 24 | Authentication CommandsUser Accounts– 585 –username This command adds named users, requires authentication at login, specifies or cha

Page 541

CHAPTER 24 | Authentication CommandsAuthentication Sequence– 586 –AUTHENTICATION SEQUENCEThree authentication methods can be specified to authenti

Page 542 - Console#

CHAPTER 24 | Authentication CommandsAuthentication Sequence– 587 –EXAMPLE Console(config)#authentication enable radiusConsole(config)#RELATED COMM

Page 543

CHAPTER 24 | Authentication CommandsRADIUS Client– 588 –RELATED COMMANDSusername - for setting the local user names and passwords (585)RADIUS CLIE

Page 544

CHAPTER 24 | Authentication CommandsRADIUS Client– 589 –radius-server auth-portThis command sets the RADIUS server network port. Use the no form t

Page 545 - Time Range

CHAPTER 2 | Initial Switch ConfigurationConnecting to the Switch– 59 – Set flow control to none. Set the emulation mode to VT100. When using Hyp

Page 546

CHAPTER 24 | Authentication CommandsRADIUS Client– 590 –DEFAULT SETTING auth-port - 1812acct-port - 1813timeout - 5 secondsretransmit - 2COMMAND M

Page 547

CHAPTER 24 | Authentication CommandsRADIUS Client– 591 –DEFAULT SETTING 2COMMAND MODE Global ConfigurationEXAMPLE Console(config)#radius-server re

Page 548

CHAPTER 24 | Authentication CommandsTACACS+ Client– 592 – Retransmit Times : 2 Request Timeout : 5Server 1: Server IP Address : 192.168.1

Page 549

CHAPTER 24 | Authentication CommandsTACACS+ Client– 593 –DEFAULT SETTING 10.11.12.13COMMAND MODE Global ConfigurationEXAMPLE Console(config)#tacac

Page 550

CHAPTER 24 | Authentication CommandsTACACS+ Client– 594 –EXAMPLE Console(config)#tacacs-server key greenConsole(config)#tacacs-server port This co

Page 551

CHAPTER 24 | Authentication CommandsAAA– 595 –AAAThe Authentication, Authorization, and Accounting (AAA) feature provides the main framework for c

Page 552

CHAPTER 24 | Authentication CommandsAAA– 596 –group - Specifies the server group to use.tacacs+ - Specifies all TACACS+ hosts configure with the t

Page 553

CHAPTER 24 | Authentication CommandsAAA– 597 –group - Specifies the server group to use.radius - Specifies all RADIUS hosts configure with the rad

Page 554

CHAPTER 24 | Authentication CommandsAAA– 598 –group - Specifies the server group to use.radius - Specifies all RADIUS hosts configure with the rad

Page 555 - 22 SNMP COMMANDS

CHAPTER 24 | Authentication CommandsAAA– 599 –◆ Using the command without specifying an interim interval enables updates, but does not change the

Page 556 -

CONTENTS– 6 –Configuration Options 57Required Connections 58Remote Connections 59Basic Configuration 60Console Connection 60Setting Passwords

Page 557

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 60 –BASIC CONFIGURATIONCONSOLECONNECTIONThe CLI program provides two different comman

Page 558

CHAPTER 24 | Authentication CommandsAAA– 600 –aaa group server Use this command to name a group of security server hosts. To remove a server group

Page 559

CHAPTER 24 | Authentication CommandsAAA– 601 –EXAMPLE Console(config)#aaa group server radius tpsConsole(config-sg-radius)#server 10.2.68.120Conso

Page 560

CHAPTER 24 | Authentication CommandsAAA– 602 –EXAMPLE Console(config)#line consoleConsole(config-line)#accounting exec tpsConsole(config-line)#exi

Page 561

CHAPTER 24 | Authentication CommandsWeb Server– 603 –statistics - Displays accounting records.user-name - Displays accounting records for a specif

Page 562

CHAPTER 24 | Authentication CommandsWeb Server– 604 –ip http port This command specifies the TCP port number used by the web browser interface. Us

Page 563

CHAPTER 24 | Authentication CommandsWeb Server– 605 –ip http secure-serverThis command enables the secure hypertext transfer protocol (HTTPS) over

Page 564 - 7. Maps to the defaultview

CHAPTER 24 | Authentication CommandsWeb Server– 606 –◆ To specify a secure-site certificate, see “Replacing the Default Secure-site Certificate” o

Page 565

CHAPTER 24 | Authentication CommandsTelnet Server– 607 –TELNET SERVERThis section describes commands used to configure Telnet management access to

Page 566

CHAPTER 24 | Authentication CommandsTelnet Server– 608 –ip telnet port This command specifies the TCP port number used by the Telnet interface. Us

Page 567

CHAPTER 24 | Authentication CommandsSecure Shell– 609 –show ip telnet This command displays the configuration settings for the Telnet server. COMM

Page 568

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 61 –Console#configureConsole(config)#username guest password 0 [password]Console(conf

Page 569

CHAPTER 24 | Authentication CommandsSecure Shell– 610 –Configuration GuidelinesThe SSH server on this switch supports both password and public key

Page 570

CHAPTER 24 | Authentication CommandsSecure Shell– 611 –4. Set the Optional Parameters – Set other optional parameters, including the authenticatio

Page 571

CHAPTER 24 | Authentication CommandsSecure Shell– 612 –c. The client sends a signature generated using the private key to the switch.d. When the s

Page 572

CHAPTER 24 | Authentication CommandsSecure Shell– 613 –COMMAND USAGE ◆ The SSH server supports up to four client sessions. The maximum number of c

Page 573

CHAPTER 24 | Authentication CommandsSecure Shell– 614 –ip ssh timeout This command configures the timeout for the SSH server. Use the no form to r

Page 574

CHAPTER 24 | Authentication CommandsSecure Shell– 615 –EXAMPLE Console#delete public-key admin dsaConsole#ip ssh crypto host-key generateThis comm

Page 575 - 23 REMOTE MONITORING COMMANDS

CHAPTER 24 | Authentication CommandsSecure Shell– 616 –ip ssh cryptozeroizeThis command clears the host key from memory (i.e. RAM). SYNTAX ip ssh

Page 576

CHAPTER 24 | Authentication CommandsSecure Shell– 617 –RELATED COMMANDSip ssh crypto host-key generate (615)show ip ssh This command displays the

Page 577

CHAPTER 24 | Authentication CommandsSecure Shell– 618 –1854900028313416250083487184495220874292122556916656552963281635169640408315547660664151657

Page 578 - Console(config)#

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 619 –802.1X PORT AUTHENTICATIONThe switch supports IEEE 802.1X (dot1x) port-based

Page 579

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 62 –4. To set the IP address of the default gateway for the network to which the swit

Page 580

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 620 –dot1x default This command sets all configurable dot1x global and port settin

Page 581

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 621 –EXAMPLEThis example instructs the switch to pass all EAPOL frame through to a

Page 582 - – 582 –

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 622 –EXAMPLEConsole(config)#interface eth 1/2Console(config-if)#dot1x intrusion-ac

Page 583 - 24 AUTHENTICATION COMMANDS

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 623 –DEFAULTSingle-hostCOMMAND MODEInterface ConfigurationCOMMAND USAGE ◆ The “max

Page 584 - User Accounts

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 624 –EXAMPLEConsole(config)#interface eth 1/2Console(config-if)#dot1x port-control

Page 585

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 625 –COMMAND MODEInterface ConfigurationEXAMPLEConsole(config)#interface eth 1/2Co

Page 586 - Authentication Sequence

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 626 –COMMAND USAGEThis command sets the timeout for EAP-request frames other than

Page 587

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 627 –COMMAND MODEPrivileged ExecCOMMAND USAGEThe re-authentication process verifie

Page 588 - RADIUS Client

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 628 –dot1x max-start This command sets the maximum number of times that a port sup

Page 589

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 629 –◆ A port cannot be configured as a dot1x supplicant if it is a member of a tr

Page 590

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 63 –ND retransmit interval is 1000 millisecondsConsole#Address for Multi-segment Netw

Page 591

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 630 –COMMAND MODEInterface ConfigurationEXAMPLEConsole(config)#interface eth 1/2Co

Page 592 - TACACS+ Client

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 631 –COMMAND USAGEThis command displays the following information:◆ Global 802.1X

Page 593

CHAPTER 24 | Authentication Commands802.1X Port Authentication– 632 – Current Identifier– The integer (0-255) used by the Authenticator to identif

Page 594

CHAPTER 24 | Authentication CommandsManagement IP Filter– 633 –Authenticator State MachineState : AuthenticatedReauth Count :

Page 595 - Table 65: AAA Commands

CHAPTER 24 | Authentication CommandsManagement IP Filter– 634 –COMMAND USAGE ◆ If anyone tries to access a management interface on the switch from

Page 596

CHAPTER 24 | Authentication CommandsManagement IP Filter– 635 –EXAMPLEConsole#show management all-clientManagement Ip Filter HTTP-Client: Start

Page 597

CHAPTER 24 | Authentication CommandsManagement IP Filter– 636 –

Page 598

– 637 –25 GENERAL SECURITY MEASURES This switch supports many methods of segregating traffic for clients attached to each of the data ports, and for

Page 599

CHAPTER 25 | General Security MeasuresPort Security– 638 –PORT SECURITY These commands can be used to enable port security on a port. When MAC add

Page 600

CHAPTER 25 | General Security MeasuresPort Security– 639 –◆ The mac-learning commands cannot be used if 802.1X Port Authentication has been global

Page 601

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 64 – 2001:DB8:2222:7272::/64, subnet is 2001:DB8:2222:7272::/64Joined group address(

Page 602

CHAPTER 25 | General Security MeasuresPort Security– 640 –addresses when it reaches a configured maximum number. Only incoming traffic with source

Page 603 - Web Server

CHAPTER 25 | General Security MeasuresNetwork Access (MAC Address Authentication)– 641 –NETWORK ACCESS (MAC ADDRESS AUTHENTICATION)Network Access

Page 604

CHAPTER 25 | General Security MeasuresNetwork Access (MAC Address Authentication)– 642 –network-accessagingUse this command to enable aging for au

Page 605

CHAPTER 25 | General Security MeasuresNetwork Access (MAC Address Authentication)– 643 –COMMAND MODE Global Configuration COMMAND USAGE◆ Specified

Page 606

CHAPTER 25 | General Security MeasuresNetwork Access (MAC Address Authentication)– 644 –network-accessdynamic-qosUse this command to enable the dy

Page 607 - Telnet Server

CHAPTER 25 | General Security MeasuresNetwork Access (MAC Address Authentication)– 645 –network-accessdynamic-vlanUse this command to enable dynam

Page 608

CHAPTER 25 | General Security MeasuresNetwork Access (MAC Address Authentication)– 646 –COMMAND MODEInterface ConfigurationCOMMAND USAGE◆ The VLAN

Page 609 - Secure Shell

CHAPTER 25 | General Security MeasuresNetwork Access (MAC Address Authentication)– 647 –network-accesslink-detection link-downUse this command to

Page 610

CHAPTER 25 | General Security MeasuresNetwork Access (MAC Address Authentication)– 648 –EXAMPLEConsole(config)#interface ethernet 1/1Console(confi

Page 611

CHAPTER 25 | General Security MeasuresNetwork Access (MAC Address Authentication)– 649 –COMMAND MODE Interface Configuration COMMAND USAGE The max

Page 612

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 65 –5. Then save your configuration changes by typing “copy running-config startup-co

Page 613

CHAPTER 25 | General Security MeasuresNetwork Access (MAC Address Authentication)– 650 –◆ When port status changes to down, all MAC addresses are

Page 614

CHAPTER 25 | General Security MeasuresNetwork Access (MAC Address Authentication)– 651 –mac-authenticationintrusion-actionUse this command to conf

Page 615

CHAPTER 25 | General Security MeasuresNetwork Access (MAC Address Authentication)– 652 –show network-accessUse this command to display the MAC aut

Page 616

CHAPTER 25 | General Security MeasuresNetwork Access (MAC Address Authentication)– 653 –show network-access mac-address-tableUse this command to d

Page 617

CHAPTER 25 | General Security MeasuresWeb Authentication– 654 –show network-access mac-filterUse this command to display information for entries i

Page 618

CHAPTER 25 | General Security MeasuresWeb Authentication– 655 –web-auth login-attemptsThis command defines the limit for failed web authentication

Page 619 - 802.1X Port Authentication

CHAPTER 25 | General Security MeasuresWeb Authentication– 656 –web-auth quiet-periodThis command defines the amount of time a host must wait after

Page 620

CHAPTER 25 | General Security MeasuresWeb Authentication– 657 –web-auth system-auth-controlThis command globally enables web authentication for th

Page 621

CHAPTER 25 | General Security MeasuresWeb Authentication– 658 –web-auth re-authenticate (Port)This command ends all web authentication sessions co

Page 622

CHAPTER 25 | General Security MeasuresWeb Authentication– 659 –show web-auth This command displays global web authentication parameters.COMMAND MO

Page 623

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 66 –To dynamically generate an IPv6 host address for the switch, complete the followi

Page 624

CHAPTER 25 | General Security MeasuresDHCP Snooping– 660 –show web-authsummaryThis command displays a summary of web authentication port parameter

Page 625

CHAPTER 25 | General Security MeasuresDHCP Snooping– 661 –ip dhcp snooping This command enables DHCP snooping globally. Use the no form to restore

Page 626

CHAPTER 25 | General Security MeasuresDHCP Snooping– 662 – If the DHCP packet is from a client, such as a DECLINE or RELEASE message, the switch f

Page 627

CHAPTER 25 | General Security MeasuresDHCP Snooping– 663 –ip dhcp snoopingdatabase flashThis command writes all dynamically learned snooping entri

Page 628

CHAPTER 25 | General Security MeasuresDHCP Snooping– 664 –◆ Use the ip dhcp snooping information option command to specify how to handle DHCP clie

Page 629

CHAPTER 25 | General Security MeasuresDHCP Snooping– 665 –ip dhcp snoopingverify mac-addressThis command verifies the client’s hardware address st

Page 630

CHAPTER 25 | General Security MeasuresDHCP Snooping– 666 –◆ When the DHCP snooping is globally disabled, DHCP snooping can still be configured for

Page 631

CHAPTER 25 | General Security MeasuresDHCP Snooping– 667 –◆ When an untrusted port is changed to a trusted port, all the dynamic DHCP snooping bin

Page 632

CHAPTER 25 | General Security MeasuresDHCP Snooping– 668 –show ip dhcpsnoopingThis command shows the DHCP snooping configuration settings.COMMAND

Page 633 - Management IP Filter

CHAPTER 25 | General Security MeasuresIP Source Guard– 669 –IP SOURCE GUARDIP Source Guard is a security feature that filters IP traffic on networ

Page 634

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 67 –COMMUNITY STRINGS (FOR SNMP VERSION 1 AND 2C CLIENTS)Community strings are used t

Page 635

CHAPTER 25 | General Security MeasuresIP Source Guard– 670 –◆ All static entries are configured with an infinite lease time, which is indicated wi

Page 636

CHAPTER 25 | General Security MeasuresIP Source Guard– 671 –COMMAND MODEInterface Configuration (Ethernet)COMMAND USAGE ◆ Source guard is used to

Page 637 - 25 GENERAL SECURITY MEASURES

CHAPTER 25 | General Security MeasuresIP Source Guard– 672 –EXAMPLEThis example enables IP source guard on port 5.Console(config)#interface ethern

Page 638 - Port Security

CHAPTER 25 | General Security MeasuresARP Inspection– 673 –EXAMPLEConsole#show ip source-guard bindingMacAddress IpAddress Lease(sec)

Page 639

CHAPTER 25 | General Security MeasuresARP Inspection– 674 –ip arp inspection This command enables ARP Inspection globally on the switch. Use the n

Page 640

CHAPTER 25 | General Security MeasuresARP Inspection– 675 –ip arp inspectionfilterThis command specifies an ARP ACL to apply to one or more VLANs.

Page 641

CHAPTER 25 | General Security MeasuresARP Inspection– 676 –ip arp inspectionlog-buffer logsThis command sets the maximum number of entries saved i

Page 642 - Console(config-if)#

CHAPTER 25 | General Security MeasuresARP Inspection– 677 –ip arp inspectionvalidateThis command specifies additional validation of address compon

Page 643

CHAPTER 25 | General Security MeasuresARP Inspection– 678 –DEFAULT SETTING Disabled on all VLANsCOMMAND MODEGlobal ConfigurationCOMMAND USAGE◆ Whe

Page 644

CHAPTER 25 | General Security MeasuresARP Inspection– 679 –COMMAND MODEInterface Configuration (Port)COMMAND USAGE◆ This command only applies to u

Page 645 - – 645 –

CHAPTER 2 | Initial Switch ConfigurationManaging System Files– 68 –authentication and privacy is used for v3 clients. Then press <Enter>. Fo

Page 646

CHAPTER 25 | General Security MeasuresARP Inspection– 680 –show ip arpinspectionconfigurationThis command displays the global configuration settin

Page 647 - – 647 –

CHAPTER 25 | General Security MeasuresARP Inspection– 681 –show ip arpinspection logThis command shows information about entries stored in the log

Page 648

CHAPTER 25 | General Security MeasuresARP Inspection– 682 –COMMAND MODEPrivileged ExecEXAMPLEConsole#show ip arp inspection vlan 1VLAN ID DAI

Page 649 - – 649 –

– 683 –26 ACCESS CONTROL LISTSAccess Control Lists (ACL) provide packet filtering for IPv4 frames (based on address, protocol, Layer 4 protocol port

Page 650

CHAPTER 26 | Access Control ListsIPv4 ACLs– 684 –access-list ip This command adds an IP access list and enters configuration mode for standard or

Page 651

CHAPTER 26 | Access Control ListsIPv4 ACLs– 685 –permit, deny(Standard IP ACL)This command adds a rule to a Standard IPv4 ACL. The rule sets a fil

Page 652

CHAPTER 26 | Access Control ListsIPv4 ACLs– 686 –permit, deny(Extended IPv4 ACL)This command adds a rule to an Extended IPv4 ACL. The rule sets a

Page 653

CHAPTER 26 | Access Control ListsIPv4 ACLs– 687 –port-bitmask – Decimal number representing the port bits to match. (Range: 0-65535)control-flags

Page 654

CHAPTER 26 | Access Control ListsIPv4 ACLs– 688 –EXAMPLEThis example accepts any incoming packets if the source address is within subnet 10.7.1.x.

Page 655

CHAPTER 26 | Access Control ListsIPv4 ACLs– 689 –COMMAND USAGE◆ Only one ACL can be bound to a port.◆ If an ACL is already bound to a port and you

Page 656

CHAPTER 2 | Initial Switch ConfigurationManaging System Files– 69 –“startup1.cfg” that contains system settings for switch initialization, includi

Page 657

CHAPTER 26 | Access Control ListsMAC ACLs– 690 –EXAMPLE Console#show ip access-list standardIP standard access-list david: permit host 10.1.1.21

Page 658

CHAPTER 26 | Access Control ListsMAC ACLs– 691 –◆ To remove a rule, use the no permit or no deny command followed by the exact text of a previousl

Page 659

CHAPTER 26 | Access Control ListsMAC ACLs– 692 –no {permit | deny} untagged-eth2{any | host source | source address-bitmask} {any | host destinati

Page 660

CHAPTER 26 | Access Control ListsMAC ACLs– 693 –COMMAND USAGE◆ New rules are added to the end of the list.◆ The ethertype option can only be used

Page 661

CHAPTER 26 | Access Control ListsMAC ACLs– 694 –EXAMPLE Console(config)#interface ethernet 1/2Console(config-if)#mac access-group jerry inConsole(

Page 662

CHAPTER 26 | Access Control ListsARP ACLs– 695 –ARP ACLSThe commands in this section configure ACLs based on the IP or MAC address contained in AR

Page 663

CHAPTER 26 | Access Control ListsARP ACLs– 696 –permit, deny (ARPACL)This command adds a rule to an ARP ACL. The rule filters packets matching a s

Page 664

CHAPTER 26 | Access Control ListsARP ACLs– 697 –EXAMPLE This rule permits packets from any source IP and MAC address to the destination subnet add

Page 665

CHAPTER 26 | Access Control ListsACL Information– 698 –ACL INFORMATIONThis section describes commands used to display ACL information.show access-

Page 666

– 699 –27 INTERFACE COMMANDSThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or VLAN; or pe

Page 667

CONTENTS– 7 –Console Port Settings 107Telnet Settings 109Displaying CPU Utilization 110Displaying Memory Utilization 111Resetting the System 11

Page 668

CHAPTER 2 | Initial Switch ConfigurationManaging System Files– 70 –To save the current configuration settings, enter the following command:1. From

Page 669

CHAPTER 27 | Interface Commands– 700 –interface This command configures an interface type and enter interface configuration mode. Use the no form

Page 670

CHAPTER 27 | Interface Commands– 701 –COMMAND USAGEThe alias is displayed in the running-configuration file. An example of the value which a netwo

Page 671

CHAPTER 27 | Interface Commands– 702 –manually specify the link attributes with the speed-duplex and flowcontrol commands.EXAMPLE The following ex

Page 672

CHAPTER 27 | Interface Commands– 703 –flowcontrol This command enables flow control. Use the no form to disable flow control.SYNTAX [no] flowcontr

Page 673

CHAPTER 27 | Interface Commands– 704 –media-type This command forces the port type selected for combination ports 9-10. Use the no form to restore

Page 674

CHAPTER 27 | Interface Commands– 705 –negotiation is disabled, you must manually specify the link attributes with the speed-duplex and flowcontrol

Page 675

CHAPTER 27 | Interface Commands– 706 –speed-duplex This command configures the speed and duplex mode of a given interface when auto-negotiation is

Page 676

CHAPTER 27 | Interface Commands– 707 –switchport packet-rateThis command configures broadcast, multicast and unknown unicast storm control. Use th

Page 677

CHAPTER 27 | Interface Commands– 708 –clear counters This command clears statistics on an interface.SYNTAX clear counters interfaceinterface ether

Page 678

CHAPTER 27 | Interface Commands– 709 –show interfacescountersThis command displays interface statistics. SYNTAX show interfaces counters [interfac

Page 679

– 71 –SECTION IIWEB CONFIGURATIONThis section describes the basic switch features, along with a detailed description of how to configure each featur

Page 680

CHAPTER 27 | Interface Commands– 710 – ===== RMON Stats ===== 0 Drop Events 16900558 Octets

Page 681

CHAPTER 27 | Interface Commands– 711 – Speed-duplex : Auto Capabilities : 10half, 10full, 100half, 100full Broadcast Storm

Page 682

CHAPTER 27 | Interface Commands– 712 – Egress Rate Limit : Disabled, 1000M bits per second VLAN Membership Mode : Hybrid Ingr

Page 683 - 26 ACCESS CONTROL LISTS

CHAPTER 27 | Interface Commands– 713 –test cable-diagnosticsThis command performs cable diagnostics on the specified port to diagnose any cable fa

Page 684 - IPv4 ACLs

CHAPTER 27 | Interface Commands– 714 –show cable-diagnosticsThis command shows the results of a cable diagnostics test.SYNTAX show cable-diagnosti

Page 685

CHAPTER 27 | Interface Commands– 715 –partner. If none is detected, the switch automatically turns off the transmitter, and most of the receive ci

Page 686

CHAPTER 27 | Interface Commands– 716 –EXAMPLE Console#show power-save interface ethernet 1/10 Power Saving Status : EnabledConsole#

Page 687

– 717 –28 LINK AGGREGATION COMMANDSPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth of a network conne

Page 688

CHAPTER 28 | Link Aggregation Commands– 718 –◆ Any of the Gigabit ports on the front panel can be trunked together, including ports of different m

Page 689

CHAPTER 28 | Link Aggregation Commands– 719 –EXAMPLE The following example creates trunk 1 and then adds port 10:Console(config)#interface port-ch

Page 690 - Table 83: MAC ACL Commands

SECTION II | Web Configuration– 72 –

Page 691

CHAPTER 28 | Link Aggregation Commands– 720 –Console#show interfaces status port-channel 1 Information of Trunk 1 Basic Information: Port Type

Page 692

CHAPTER 28 | Link Aggregation Commands– 721 –the partner only applies to its administrative state, not its operational state.EXAMPLEConsole(config

Page 693

CHAPTER 28 | Link Aggregation Commands– 722 –lacp system-priority This command configures a port's LACP system priority. Use the no form to r

Page 694

CHAPTER 28 | Link Aggregation Commands– 723 –DEFAULT SETTING 0COMMAND MODE Interface Configuration (Port Channel)COMMAND USAGE ◆ Ports are only al

Page 695 - Table 84: ARP ACL Commands

CHAPTER 28 | Link Aggregation Commands– 724 –EXAMPLEConsole#show lacp 1 countersPort Channel: 1---------------------------------------------------

Page 696

CHAPTER 28 | Link Aggregation Commands– 725 –Console#show lacp 1 neighborsPort Channel 1 neighbors------------------------------------------------

Page 697

CHAPTER 28 | Link Aggregation Commands– 726 – Console#show lacp sysidPort Channel System Priority System MAC Address-----------------------

Page 698 - ACL Information

– 727 –29 PORT MIRRORING COMMANDSData can be mirrored from a local port on the same switch or from a remote port on another switch for analysis at t

Page 699 - 27 INTERFACE COMMANDS

CHAPTER 29 | Port Mirroring CommandsLocal Port Mirroring Commands– 728 –mac-address - MAC address in the form of xx-xx-xx-xx-xx-xx or xxxxxxxxxxxx

Page 700 -

CHAPTER 29 | Port Mirroring CommandsRSPAN Mirroring Commands– 729 –show port monitor This command displays mirror information.SYNTAX show port mon

Page 701

– 73 –3 USING THE WEB INTERFACEThis switch provides an embedded HTTP web agent. Using a web browser you can configure the switch and view statistics

Page 702

CHAPTER 29 | Port Mirroring CommandsRSPAN Mirroring Commands– 730 –Configuration GuidelinesTake the following steps to configure an RSPAN session:

Page 703

CHAPTER 29 | Port Mirroring CommandsRSPAN Mirroring Commands– 731 –be configured. When RSPAN uplink ports are enabled on the switch, 802.1X cannot

Page 704

CHAPTER 29 | Port Mirroring CommandsRSPAN Mirroring Commands– 732 –◆ The source port and destination port cannot be configured on the same switch.

Page 705

CHAPTER 29 | Port Mirroring CommandsRSPAN Mirroring Commands– 733 –◆ A destination port can still send and receive switched traffic, and participa

Page 706

CHAPTER 29 | Port Mirroring CommandsRSPAN Mirroring Commands– 734 –COMMAND USAGE ◆ Only 802.1Q trunk or hybrid (i.e., general use) ports can be co

Page 707

CHAPTER 29 | Port Mirroring CommandsRSPAN Mirroring Commands– 735 –show rspan Use this command to displays the configuration settings for an RSPAN

Page 708

CHAPTER 29 | Port Mirroring CommandsRSPAN Mirroring Commands– 736 –

Page 709

– 737 –30 RATE LIMIT COMMANDSThis function allows the network manager to control the maximum rate for traffic transmitted or received on an interfac

Page 710

CHAPTER 30 | Rate Limit Commands– 738 –by the storm control command. It is therefore not advisable to use both of these commands on the same inter

Page 711

– 739 –31 AUTOMATIC TRAFFIC CONTROL COMMANDSAutomatic Traffic Control (ATC) configures bounding thresholds for broadcast and multicast storms which

Page 712

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 74 –forwarding (i.e., enable Admin Edge Port) to improve the switch’s res

Page 713

CHAPTER 31 | Automatic Traffic Control Commands– 740 –USAGE GUIDELINESATC includes storm control for broadcast or multicast traffic. The control r

Page 714

CHAPTER 31 | Automatic Traffic Control Commands– 741 –expires. When ingress traffic falls below this threshold, ATC sends a Storm Alarm Clear Trap

Page 715

CHAPTER 31 | Automatic Traffic Control Commands– 742 –DEFAULT SETTING 300 seconds COMMAND MODE Global ConfigurationCOMMAND USAGE After the apply t

Page 716

CHAPTER 31 | Automatic Traffic Control Commands– 743 –EXAMPLE This example sets the release timer to 800 seconds for all ports.Console(config)#aut

Page 717 - 28 LINK AGGREGATION COMMANDS

CHAPTER 31 | Automatic Traffic Control Commands– 744 –auto-traffic-controlactionThis command sets the control action to limit ingress traffic or s

Page 718

CHAPTER 31 | Automatic Traffic Control Commands– 745 –auto-traffic-controlalarm-clear-thresholdThis command sets the lower threshold for ingress t

Page 719

CHAPTER 31 | Automatic Traffic Control Commands– 746 –auto-traffic-controlalarm-fire-thresholdThis command sets the upper threshold for ingress tr

Page 720 - (Ethernet Interface)

CHAPTER 31 | Automatic Traffic Control Commands– 747 –COMMAND MODE Privileged ExecCOMMAND USAGE This command can be used to manually stop a contro

Page 721

CHAPTER 31 | Automatic Traffic Control Commands– 748 –EXAMPLEConsole(config)#interface ethernet 1/1Console(config-if)#snmp-server enable port-trap

Page 722 - (Port Channel)

CHAPTER 31 | Automatic Traffic Control Commands– 749 –EXAMPLEConsole(config)#interface ethernet 1/1Console(config-if)#snmp-server enable port-trap

Page 723 - – 723 –

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 75 –CONFIGURATIONOPTIONSConfigurable parameters have a dialog box or a dr

Page 724

CHAPTER 31 | Automatic Traffic Control Commands– 750 –EXAMPLEConsole(config)#interface ethernet 1/1Console(config-if)#snmp-server enable port-trap

Page 725

CHAPTER 31 | Automatic Traffic Control Commands– 751 –EXAMPLEConsole(config)#interface ethernet 1/1Console(config-if)#snmp-server enable port-trap

Page 726

CHAPTER 31 | Automatic Traffic Control Commands– 752 –Storm-control: Multicast Apply-timer(sec) : 300 release-timer(sec) : 900Console#show aut

Page 727 - 29 PORT MIRRORING COMMANDS

– 753 –32 ADDRESS TABLE COMMANDSThese commands are used to configure the address table for filtering specified addresses, displaying current entries

Page 728 - Local Port Mirroring Commands

CHAPTER 32 | Address Table Commands– 754 –mac-address-tablestaticThis command maps a static address to a destination port in a VLAN. Use the no fo

Page 729 - Table 95: RSPAN Commands

CHAPTER 32 | Address Table Commands– 755 –clear mac-address-table dynamicThis command removes any learned entries from the forwarding database.DEF

Page 730

CHAPTER 32 | Address Table Commands– 756 –example, a mask of 00-00-00-00-00-00 means an exact match, and a mask of FF-FF-FF-FF-FF-FF means “any.”◆

Page 731

– 757 –33 SPANNING TREE COMMANDSThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the switch, and command

Page 732

CHAPTER 33 | Spanning Tree Commands– 758 –spanning-tree This command enables the Spanning Tree Algorithm globally for the switch. Use the no form

Page 733

CHAPTER 33 | Spanning Tree Commands– 759 –spanning-treeforward-timeThis command configures the spanning tree bridge forward time globally for this

Page 734

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 76 –MAIN MENU Using the onboard web agent, you can define system paramete

Page 735

CHAPTER 33 | Spanning Tree Commands– 760 –EXAMPLE Console(config)#spanning-tree hello-time 5Console(config)#RELATED COMMANDSspanning-tree forward-

Page 736

CHAPTER 33 | Spanning Tree Commands– 761 –spanning-tree mode This command selects the spanning tree mode for this switch. Use the no form to resto

Page 737 - 30 RATE LIMIT COMMANDS

CHAPTER 33 | Spanning Tree Commands– 762 –restarts the system in the new mode, temporarily disrupting user traffic.EXAMPLE The following example c

Page 738 -

CHAPTER 33 | Spanning Tree Commands– 763 –spanning-treepriorityThis command configures the spanning tree priority globally for this switch. Use th

Page 739 - 31 AUTOMATIC TRAFFIC CONTROL

CHAPTER 33 | Spanning Tree Commands– 764 –revision (767)max-hops (764)spanning-treetransmission-limitThis command configures the minimum interval

Page 740 - USAGE GUIDELINES

CHAPTER 33 | Spanning Tree Commands– 765 –Each bridge decrements the hop count by one before passing on the BPDU. When the hop count reaches zero,

Page 741 - FUNCTIONAL LIMITATIONS

CHAPTER 33 | Spanning Tree Commands– 766 –mst vlan This command adds VLANs to a spanning tree instance. Use the no form to remove the specified VL

Page 742 - – 742 –

CHAPTER 33 | Spanning Tree Commands– 767 –COMMAND MODE MST ConfigurationCOMMAND USAGE The MST region name and revision number (page 767) are used

Page 743

CHAPTER 33 | Spanning Tree Commands– 768 –spanning-tree bpdu-filterThis command filters all BPDUs received on an edge port. Use the no form to dis

Page 744

CHAPTER 33 | Spanning Tree Commands– 769 –COMMAND USAGE ◆ An edge port should only be connected to end nodes which do not generate BPDUs. If a BPD

Page 745

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 77 –Chart Shows Interface, Etherlike, and RMON port statistics 128Cable T

Page 746 - – 746 –

CHAPTER 33 | Spanning Tree Commands– 770 –DEFAULT SETTING By default, the system automatically detects the speed and duplex mode used on each port

Page 747

CHAPTER 33 | Spanning Tree Commands– 771 –COMMAND USAGE ◆ You can enable this option if an interface is attached to a LAN segment that is at the e

Page 748

CHAPTER 33 | Spanning Tree Commands– 772 –EXAMPLE Console(config)#interface ethernet 1/5Console(config-if)#spanning-tree link-type point-to-points

Page 749

CHAPTER 33 | Spanning Tree Commands– 773 –COMMAND MODEInterface Configuration (Ethernet, Port Channel)COMMAND USAGE◆ If the port is configured for

Page 750

CHAPTER 33 | Spanning Tree Commands– 774 –spanning-tree mstcostThis command configures the path cost on a spanning instance in the Multiple Spanni

Page 751

CHAPTER 33 | Spanning Tree Commands– 775 –spanning-tree mstport-priorityThis command configures the interface priority on a spanning instance in t

Page 752

CHAPTER 33 | Spanning Tree Commands– 776 –COMMAND USAGE ◆ This command defines the priority for the use of a port in the Spanning Tree Algorithm.

Page 753 - 32 ADDRESS TABLE COMMANDS

CHAPTER 33 | Spanning Tree Commands– 777 –EXAMPLE Console(config)#interface ethernet ethernet 1/5Console(config-if)#spanning-tree edge-portConsole

Page 754 -

CHAPTER 33 | Spanning Tree Commands– 778 –EXAMPLE Console#spanning-tree loopback-detection release ethernet 1/1Console#spanning-treeprotocol-migra

Page 755

CHAPTER 33 | Spanning Tree Commands– 779 –show spanning-tree This command shows the configuration for the common spanning tree (CST) or for an ins

Page 756

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 78 –Configure Session Configures the uplink and down-link ports for a seg

Page 757 - 33 SPANNING TREE COMMANDS

CHAPTER 33 | Spanning Tree Commands– 780 – Root Forward Delay (sec.) : 15 Max. Hops : 20 Remaining Hops

Page 758 -

– 781 –34 VLAN COMMANDSA VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong to the same phy

Page 759

CHAPTER 34 | VLAN CommandsGVRP and Bridge Extension Commands– 782 –GVRP AND BRIDGE EXTENSION COMMANDSGARP VLAN Registration Protocol defines a way

Page 760

CHAPTER 34 | VLAN CommandsGVRP and Bridge Extension Commands– 783 –garp timer This command sets the values for the join, leave and leaveall timers

Page 761 -

CHAPTER 34 | VLAN CommandsGVRP and Bridge Extension Commands– 784 –switchportforbidden vlanThis command configures forbidden VLANs. Use the no for

Page 762

CHAPTER 34 | VLAN CommandsGVRP and Bridge Extension Commands– 785 –EXAMPLE Console(config)#interface ethernet 1/1Console(config-if)#switchport gvr

Page 763

CHAPTER 34 | VLAN CommandsEditing VLAN Groups– 786 –EXAMPLE Console#show garp timer ethernet 1/1Eth 1/ 1 GARP timer status: Join Timer: 20 cen

Page 764

CHAPTER 34 | VLAN CommandsEditing VLAN Groups– 787 –vlan database This command enters VLAN database mode. All commands in this mode will take effe

Page 765

CHAPTER 34 | VLAN CommandsConfiguring VLAN Interfaces– 788 –VLAN 1 (the switch’s default VLAN), nor VLAN 4093 (the VLAN used for switch clustering

Page 766

CHAPTER 34 | VLAN CommandsConfiguring VLAN Interfaces– 789 –interface vlan This command enters interface configuration mode for VLANs, which is us

Page 767

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 79 –MAC Address 185Learning Status Enables MAC address learning on select

Page 768

CHAPTER 34 | VLAN CommandsConfiguring VLAN Interfaces– 790 –tagged - The port only receives tagged frames. DEFAULT SETTING All frame typesCOMMAND

Page 769

CHAPTER 34 | VLAN CommandsConfiguring VLAN Interfaces– 791 –◆ If a trunk has switchport mode set to trunk (i.e., 1Q Trunk), then you can only assi

Page 770

CHAPTER 34 | VLAN CommandsConfiguring VLAN Interfaces– 792 –EXAMPLE The following example shows how to set the interface to port 1 and then enable

Page 771

CHAPTER 34 | VLAN CommandsConfiguring VLAN Interfaces– 793 –switchport nativevlanThis command configures the PVID (i.e., default VLAN ID) for a po

Page 772

CHAPTER 34 | VLAN CommandsConfiguring VLAN Interfaces– 794 –COMMAND USAGE ◆ Use this command to configure a tunnel across one or more intermediate

Page 773

CHAPTER 34 | VLAN CommandsDisplaying VLAN Information– 795 –Console(config)#interface ethernet 1/9Console(config-if)#vlan-trunkingConsole(config-i

Page 774

CHAPTER 34 | VLAN CommandsConfiguring IEEE 802.1Q Tunneling– 796 – Eth1/ 6(S) Eth1/ 7(S) Eth1/ 8(S) Eth1/ 9(S) Eth1/10(S)Cons

Page 775

CHAPTER 34 | VLAN CommandsConfiguring IEEE 802.1Q Tunneling– 797 –7. Configure the QinQ tunnel uplink port to dot1Q-tunnel uplink mode (switchport

Page 776

CHAPTER 34 | VLAN CommandsConfiguring IEEE 802.1Q Tunneling– 798 –switchport dot1q-tunnel modeThis command configures an interface as a QinQ tunne

Page 777

CHAPTER 34 | VLAN CommandsConfiguring IEEE 802.1Q Tunneling– 799 –switchport dot1q-tunnel tpidThis command sets the Tag Protocol Identifier (TPID)

Page 778

CONTENTS– 8 –Configuring IP Subnet VLANs 179Configuring MAC-based VLANs 181Configuring VLAN Mirroring 1837ADDRESS TABLE SETTINGS 185Configuring M

Page 779

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 80 –PriorityDefault Priority Sets the default priority for each port or t

Page 780

CHAPTER 34 | VLAN CommandsConfiguring Port-based Traffic Segmentation– 800 –Console(config-if)#interface ethernet 1/2Console(config-if)#switchport

Page 781 - 34 VLAN COMMANDS

CHAPTER 34 | VLAN CommandsConfiguring Port-based Traffic Segmentation– 801 –only be forwarded to, and from, the designated uplink port(s). Data ca

Page 782 -

CHAPTER 34 | VLAN CommandsConfiguring Protocol-based VLANs– 802 –CONFIGURING PROTOCOL-BASED VLANSThe network devices required to support multiple

Page 783

CHAPTER 34 | VLAN CommandsConfiguring Protocol-based VLANs– 803 –protocol-vlanprotocol-group(Configuring Groups)This command creates a protocol gr

Page 784

CHAPTER 34 | VLAN CommandsConfiguring Protocol-based VLANs– 804 –COMMAND MODE Interface Configuration (Ethernet, Port Channel)COMMAND USAGE ◆ When

Page 785

CHAPTER 34 | VLAN CommandsConfiguring Protocol-based VLANs– 805 –EXAMPLE This shows protocol group 1 configured for IP over Ethernet:Console#show

Page 786 - Editing VLAN Groups

CHAPTER 34 | VLAN CommandsConfiguring IP Subnet VLANs– 806 –CONFIGURING IP SUBNET VLANSWhen using IEEE 802.1Q port-based VLAN classification, all

Page 787

CHAPTER 34 | VLAN CommandsConfiguring IP Subnet VLANs– 807 –mapping is found, the PVID of the receiving port is assigned to the frame.◆ The IP sub

Page 788 - Configuring VLAN Interfaces

CHAPTER 34 | VLAN CommandsConfiguring MAC Based VLANs– 808 –CONFIGURING MAC BASED VLANSWhen using IEEE 802.1Q port-based VLAN classification, all

Page 789

CHAPTER 34 | VLAN CommandsConfiguring Voice VLANs– 809 –◆ When MAC-based, IP subnet-based, and protocol-based VLANs are supported concurrently, pr

Page 790

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 81 –Configure Interface Configures VoIP traffic settings for ports, inclu

Page 791

CHAPTER 34 | VLAN CommandsConfiguring Voice VLANs– 810 –voice vlan This command enables VoIP traffic detection and defines the Voice VLAN ID. Use

Page 792

CHAPTER 34 | VLAN CommandsConfiguring Voice VLANs– 811 –voice vlan aging This command sets the Voice VLAN ID time out. Use the no form to restore

Page 793

CHAPTER 34 | VLAN CommandsConfiguring Voice VLANs– 812 –COMMAND USAGE◆ VoIP devices attached to the switch can be identified by the manufacturer’s

Page 794

CHAPTER 34 | VLAN CommandsConfiguring Voice VLANs– 813 –EXAMPLE The following example sets port 1 to Voice VLAN auto mode.Console(config)#interfac

Page 795 - Displaying VLAN Information

CHAPTER 34 | VLAN CommandsConfiguring Voice VLANs– 814 –DEFAULT SETTINGOUI: EnabledLLDP: DisabledCOMMAND MODEInterface ConfigurationCOMMAND USAGE◆

Page 796

CHAPTER 34 | VLAN CommandsConfiguring Voice VLANs– 815 –EXAMPLE The following example enables security filtering on port 1.Console(config)#interfa

Page 797

CHAPTER 34 | VLAN CommandsConfiguring Voice VLANs– 816 –

Page 798

– 817 –35 CLASS OF SERVICE COMMANDSThe commands described in this section allow you to specify which data packets have greater precedence when traff

Page 799

CHAPTER 35 | Class of Service CommandsPriority Commands (Layer 2)– 818 –queue mode This command sets the scheduling mode used for processing each

Page 800

CHAPTER 35 | Class of Service CommandsPriority Commands (Layer 2)– 819 –preserving the overall weight ratios between the queues. This produces les

Page 801

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 82 –Network Access MAC address-based network access authentication 277Con

Page 802

CHAPTER 35 | Class of Service CommandsPriority Commands (Layer 2)– 820 –COMMAND USAGE ◆ This command shares bandwidth at the egress port by defini

Page 803

CHAPTER 35 | Class of Service CommandsPriority Commands (Layer 2)– 821 –frames that do not have VLAN tags are tagged with the input port's de

Page 804

CHAPTER 35 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 822 –PRIORITY COMMANDS (LAYER 3 AND 4)This section describes commands use

Page 805

CHAPTER 35 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 823 –DEFAULT SETTING. COMMAND MODE Interface Configuration (Port, Static

Page 806

CHAPTER 35 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 824 –qos map dscp-mutationThis command maps DSCP values in incoming packe

Page 807

CHAPTER 35 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 825 –map should be applied at the receiving port (ingress mutation) at th

Page 808 - Configuring MAC Based VLANs

CHAPTER 35 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 826 –EXAMPLE Console(config)#interface ethernet 1/5Console(config-if)#qos

Page 809 - Configuring Voice VLANs

CHAPTER 35 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 827 –show qos mapdscp-mutationThis command shows the ingress DSCP to inte

Page 810

CHAPTER 35 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 828 –COMMAND MODE Privileged ExecEXAMPLE Console#show qos map phb-queue i

Page 811

CHAPTER 35 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 829 –show qos map trust-modeThis command shows the QoS mapping mode.SYNTA

Page 812

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 83 –Show Rule Shows the rules specified for an ACL 302Configure Interface

Page 813

CHAPTER 35 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 830 –

Page 814

– 831 –36 QUALITY OF SERVICE COMMANDSThe commands described in this section are used to configure Differentiated Services (DiffServ) classification

Page 815

CHAPTER 36 | Quality of Service Commands– 832 –To create a service policy for a specific category of ingress traffic, follow these steps:1. Use th

Page 816

CHAPTER 36 | Quality of Service Commands– 833 –◆ One or more class maps can be assigned to a policy map (page 835). The policy map is then bound b

Page 817 - 35 CLASS OF SERVICE COMMANDS

CHAPTER 36 | Quality of Service Commands– 834 –match This command defines the criteria used to classify traffic. Use the no form to delete the mat

Page 818 - Priority Commands (Layer 2)

CHAPTER 36 | Quality of Service Commands– 835 –This example creates a class map call “rd-class#2,” and sets it to match packets marked for IP Prec

Page 819

CHAPTER 36 | Quality of Service Commands– 836 –COMMAND USAGE ◆ Use the policy-map command to specify the name of the policy map, and then use the

Page 820

CHAPTER 36 | Quality of Service Commands– 837 – police commands define parameters such as the maximum throughput, burst rate, and response to non-

Page 821

CHAPTER 36 | Quality of Service Commands– 838 –COMMAND MODE Policy Map Class ConfigurationCOMMAND USAGE ◆ You can configure up to 16 policers (i.e

Page 822

CHAPTER 36 | Quality of Service Commands– 839 –police srtcm-color This command defines an enforcer for classified traffic based on a single rate t

Page 823

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 84 –Show Local Device Information 361General Displays general information

Page 824

CHAPTER 36 | Quality of Service Commands– 840 –◆ The srTCM as defined in RFC 2697 meters a traffic stream and processes its packets according to t

Page 825

CHAPTER 36 | Quality of Service Commands– 841 –EXAMPLE This example creates a policy called “rd-policy,” uses the class command to specify the pre

Page 826

CHAPTER 36 | Quality of Service Commands– 842 –violate-action - Action to take when rate exceeds the PIR. (There are not enough tokens in bucket B

Page 827

CHAPTER 36 | Quality of Service Commands– 843 –When a packet of size B bytes arrives at time t, the following happens if trTCM is configured to op

Page 828

CHAPTER 36 | Quality of Service Commands– 844 –COMMAND USAGE ◆ The set cos command is used to set the CoS value in the VLAN tag for matching packe

Page 829

CHAPTER 36 | Quality of Service Commands– 845 –EXAMPLE This example creates a policy called “rd-policy,” uses the class command to specify the pre

Page 830 - – 830 –

CHAPTER 36 | Quality of Service Commands– 846 –show class-map This command displays the QoS class maps which define matching criteria used for cla

Page 831 - UALITY OF SERVICE COMMANDS

CHAPTER 36 | Quality of Service Commands– 847 –Description: class rd-class set phb 3 Console#show policy-map rd-policy class rd-classPolicy Map r

Page 832

CHAPTER 36 | Quality of Service Commands– 848 –

Page 833

– 849 –37 MULTICAST FILTERING COMMANDSThis switch uses IGMP (Internet Group Management Protocol) to check for any attached hosts that want to receiv

Page 834

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 85 –RMON Remote Monitoring 393Configure GlobalAddAlarm Sets threshold bou

Page 835

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 850 –ip igmp snooping This command enables IGMP snooping globally on the switch or on a se

Page 836

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 851 –DEFAULT SETTING DisabledCOMMAND MODE Global ConfigurationCOMMAND USAGE ◆ When IGMP sn

Page 837

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 852 –◆ If the IGMP proxy reporting is configured on a VLAN, this setting takes precedence

Page 838

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 853 –COMMAND USAGE As described in Section 9.1 of RFC 3376 for IGMP Version 3, the Router

Page 839

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 854 –ip igmp snoopingtcn-floodThis command enables flooding of multicast traffic if a span

Page 840 - – 840 –

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 855 –EXAMPLE The following example enables TCN flooding.Console(config)#ip igmp snooping t

Page 841

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 856 –COMMAND MODE Global ConfigurationCOMMAND USAGE Once the table used to store multicast

Page 842

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 857 –ip igmp snoopingversionThis command configures the IGMP snooping version. Use the no

Page 843

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 858 –DEFAULT SETTING Global: DisabledVLAN: Disabled COMMAND MODE Global ConfigurationCOMMA

Page 844

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 859 –ip igmp snoopingvlan immediate-leaveThis command immediately deletes a member port of

Page 845

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 86 –Show MTU Shows the maximum transmission unit (MTU) cache for destina

Page 846

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 860 –ip igmp snoopingvlan last-memb-query-countThis command configures the number of IGMP

Page 847

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 861 –COMMAND USAGE ◆ When a multicast host leaves a group, it sends an IGMP leave message.

Page 848 - – 848 –

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 862 –messages is not required and may be disabled using the no ip igmp snooping vlan mrd c

Page 849 - ULTICAST FILTERING COMMANDS

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 863 –EXAMPLE The following example sets the source address for proxied IGMP query messages

Page 850 - IGMP Snooping

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 864 –ip igmp snoopingvlan proxy-query-resp-intvlThis command configures the maximum time t

Page 851

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 865 –COMMAND USAGE ◆ Static multicast entries are never aged out.◆ When a multicast entry

Page 852

CHAPTER 37 | Multicast Filtering CommandsIGMP Snooping– 866 –..show ip igmpsnooping groupThis command shows known multicast group, source, and hos

Page 853

CHAPTER 37 | Multicast Filtering CommandsStatic Multicast Routing– 867 –STATIC MULTICAST ROUTINGThis section describes commands used to configure

Page 854

CHAPTER 37 | Multicast Filtering CommandsIGMP Filtering and Throttling– 868 –show ip igmpsnooping mrouterThis command displays information on stat

Page 855

CHAPTER 37 | Multicast Filtering CommandsIGMP Filtering and Throttling– 869 –ip igmp filter (GlobalConfiguration)This command globally enables IGM

Page 856

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 87 – Interface 451Configure Configures IGMP snooping per VLAN interface 4

Page 857

CHAPTER 37 | Multicast Filtering CommandsIGMP Filtering and Throttling– 870 –ip igmp profile This command creates an IGMP filter profile number an

Page 858

CHAPTER 37 | Multicast Filtering CommandsIGMP Filtering and Throttling– 871 –EXAMPLE Console(config)#ip igmp profile 19Console(config-igmp-profile

Page 859

CHAPTER 37 | Multicast Filtering CommandsIGMP Filtering and Throttling– 872 –COMMAND USAGE ◆ The IGMP filtering profile must first be created with

Page 860

CHAPTER 37 | Multicast Filtering CommandsIGMP Filtering and Throttling– 873 –ip igmp max-groupsactionThis command sets the IGMP throttling action

Page 861

CHAPTER 37 | Multicast Filtering CommandsIGMP Filtering and Throttling– 874 –EXAMPLE Console#show ip igmp filterIGMP filter enabledConsole#show ip

Page 862

CHAPTER 37 | Multicast Filtering CommandsMulticast VLAN Registration– 875 –DEFAULT SETTING NoneCOMMAND MODE Privileged ExecCOMMAND USAGE Using thi

Page 863

CHAPTER 37 | Multicast Filtering CommandsMulticast VLAN Registration– 876 –mvr This command enables Multicast VLAN Registration (MVR) globally on

Page 864

CHAPTER 37 | Multicast Filtering CommandsMulticast VLAN Registration– 877 –◆ IGMP snooping and MVR share a maximum number of 255 groups. Any multi

Page 865

CHAPTER 37 | Multicast Filtering CommandsMulticast VLAN Registration– 878 –mvr type This command configures an interface as an MVR receiver or sou

Page 866

CHAPTER 37 | Multicast Filtering CommandsMulticast VLAN Registration– 879 –mvr vlan group This command statically binds a multicast group to a por

Page 867 - Static Multicast Routing

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 88 –

Page 868 - IGMP Filtering and Throttling

CHAPTER 37 | Multicast Filtering CommandsMulticast VLAN Registration– 880 –show mvr This command shows information about the global MVR configurat

Page 869

CHAPTER 37 | Multicast Filtering CommandsMulticast VLAN Registration– 881 –The following displays information about the interfaces attached to the

Page 870

CHAPTER 37 | Multicast Filtering CommandsMulticast VLAN Registration– 882 –Source Address Indicates the source address of the multicast service, o

Page 871

– 883 –38 LLDP COMMANDSLink Layer Discovery Protocol (LLDP) is used to discover basic information about neighboring devices on the local broadcast d

Page 872

CHAPTER 38 | LLDP Commands– 884 –lldp This command enables LLDP globally on the switch. Use the no form to disable LLDP.SYNTAX[no] lldpDEFAULT SET

Page 873

CHAPTER 38 | LLDP Commands– 885 –DEFAULT SETTINGHoldtime multiplier: 4 TTL: 4*30 = 120 secondsCOMMAND MODEGlobal ConfigurationCOMMAND USAGEThe tim

Page 874

CHAPTER 38 | LLDP Commands– 886 –lldp refresh-interval This command configures the periodic transmit interval for LLDP advertisements. Use the no

Page 875

CHAPTER 38 | LLDP Commands– 887 –EXAMPLEConsole(config)#lldp reinit-delay 10Console(config)#lldp tx-delay This command configures a delay between

Page 876

CHAPTER 38 | LLDP Commands– 888 –DEFAULT SETTINGtx-rxCOMMAND MODEInterface Configuration (Ethernet, Port Channel)EXAMPLEConsole(config)#interface

Page 877

CHAPTER 38 | LLDP Commands– 889 –EXAMPLEConsole(config)#interface ethernet 1/1Console(config-if)#lldp basic-tlv management-ip-addressConsole(confi

Page 878

– 89 –4 BASIC MANAGEMENT TASKSThis chapter describes the following topics:◆ Displaying System Information – Provides basic system description, inclu

Page 879

CHAPTER 38 | LLDP Commands– 890 –EXAMPLEConsole(config)#interface ethernet 1/1Console(config-if)#lldp basic-tlv system-capabilitiesConsole(config-

Page 880

CHAPTER 38 | LLDP Commands– 891 –EXAMPLEConsole(config)#interface ethernet 1/1Console(config-if)#lldp basic-tlv system-nameConsole(config-if)#lldp

Page 881

CHAPTER 38 | LLDP Commands– 892 –EXAMPLEConsole(config)#interface ethernet 1/1Console(config-if)#no lldp dot1-tlv proto-vidConsole(config-if)#lldp

Page 882

CHAPTER 38 | LLDP Commands– 893 –EXAMPLEConsole(config)#interface ethernet 1/1Console(config-if)#no lldp dot1-tlv vlan-nameConsole(config-if)#lldp

Page 883 - 38 LLDP COMMANDS

CHAPTER 38 | LLDP Commands– 894 –EXAMPLEConsole(config)#interface ethernet 1/1Console(config-if)#no lldp dot3-tlv mac-phyConsole(config-if)#lldp d

Page 884 -

CHAPTER 38 | LLDP Commands– 895 –◆ SNMP trap destinations are defined using the snmp-server host command.◆ Information about additional changes in

Page 885

CHAPTER 38 | LLDP Commands– 896 – Eth 1/5 | Tx-Rx True...Console#show lldp config detail ethernet 1/1LLDP Port Configuration Detail Port

Page 886

CHAPTER 38 | LLDP Commands– 897 – Management Address : 192.168.0.101 (IPv4) LLDP Port Information Interface |PortID Type PortID P

Page 887

CHAPTER 38 | LLDP Commands– 898 – PortID Type : MAC Address PortID : 00-01-02-03-04-06 SysName : SysDescr

Page 888

CHAPTER 38 | LLDP Commands– 899 –EXAMPLEswitch#show lldp info statistics LLDP Device Statistics Neighbor Entries List Last Updated : 2450279 seco

Page 889

CONTENTS– 9 –Overview 251Configuring VoIP Traffic 251Configuring Telephony OUI 253Configuring VoIP Traffic Ports 25414 SECURITY MEASURES 257AAA A

Page 890

CHAPTER 4 | Basic Management TasksDisplaying Hardware/Software Versions– 90 –PARAMETERSThese parameters are displayed:◆ System Description – Brief

Page 891

CHAPTER 38 | LLDP Commands– 900 –

Page 892

– 901 –39 DOMAIN NAME SERVICE COMMANDSThese commands are used to configure Domain Naming System (DNS) services. Entries can be manually configured i

Page 893

CHAPTER 39 | Domain Name Service Commands– 902 –COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ Domain names are added to the end of the list one

Page 894

CHAPTER 39 | Domain Name Service Commands– 903 –◆ If all name servers are deleted, DNS will automatically be disabled.EXAMPLEThis example enables

Page 895

CHAPTER 39 | Domain Name Service Commands– 904 –Name Server List:Console#RELATED COMMANDS ip domain-list (901)ip name-server (905)ip domain-lookup

Page 896

CHAPTER 39 | Domain Name Service Commands– 905 –ip name-server This command specifies the address of one or more domain name servers to use for na

Page 897

CHAPTER 39 | Domain Name Service Commands– 906 –ipv6 host This command creates a static entry in the DNS table that maps a host name to an IPv6 ad

Page 898

CHAPTER 39 | Domain Name Service Commands– 907 –clear host This command deletes dynamic entries from the DNS table.SYNTAX clear host {name | *}nam

Page 899

CHAPTER 39 | Domain Name Service Commands– 908 –show dns cache This command displays entries in the DNS cache.COMMAND MODE Privileged ExecEXAMPLE

Page 900

CHAPTER 39 | Domain Name Service Commands– 909 –Table 132: show hosts - display description Field DescriptionNo. The entry number for each resour

Page 901 - OMAIN NAME SERVICE COMMANDS

CHAPTER 4 | Basic Management TasksDisplaying Hardware/Software Versions– 91 –PARAMETERSThe following parameters are displayed: Main Board Informat

Page 902

CHAPTER 39 | Domain Name Service Commands– 910 –

Page 903

– 911 –40 DHCP COMMANDSThese commands are used to configure Dynamic Host Configuration Protocol (DHCP) client functions. DHCP CLIENTUse the commands

Page 904

CHAPTER 40 | DHCP CommandsDHCP Client– 912 –ip dhcp clientclass-idThis command specifies the DCHP client vendor class identifier for the current i

Page 905

CHAPTER 40 | DHCP CommandsDHCP Client– 913 –COMMAND USAGE ◆ This command issues a BOOTP or DHCP client request for any IP interface that has been

Page 906

CHAPTER 40 | DHCP CommandsDHCP Client– 914 –◆ When the DHCP client process is enabled and a prefix is successfully acquired, the prefix is stored

Page 907

CHAPTER 40 | DHCP CommandsDHCP Client– 915 –show ipv6 dhcp vlan This command shows DHCPv6 information for the specified interface(s).SYNTAX show i

Page 908

CHAPTER 40 | DHCP CommandsDHCP Client– 916 –

Page 909

– 917 –41 IP INTERFACE COMMANDS An IP Version 4 and Version 6 address may be used for management access to the switch over the network. Both IPv4 or

Page 910 - – 910 –

CHAPTER 41 | IP Interface CommandsIPv4 Interface– 918 –BASIC IPV4CONFIGURATIONThis section describes commands used to configure IP addresses for V

Page 911 - 40 DHCP COMMANDS

CHAPTER 41 | IP Interface CommandsIPv4 Interface– 919 –broadcast periodically by the router in an effort to learn its IP address. (BOOTP and DHCP

Page 912 - DHCP Client

CHAPTER 4 | Basic Management TasksConfiguring Support for Jumbo Frames– 92 –CONFIGURING SUPPORT FOR JUMBO FRAMESUse the System > Capability pag

Page 913

CHAPTER 41 | IP Interface CommandsIPv4 Interface– 920 –show ip default-gatewayThis command shows the IPv4 default gateway configured for this devi

Page 914

CHAPTER 41 | IP Interface CommandsIPv4 Interface– 921 –COMMAND MODE Privileged ExecCOMMAND USAGE ◆ Use the traceroute command to determine the pat

Page 915

CHAPTER 41 | IP Interface CommandsIPv4 Interface– 922 –COMMAND MODE Normal Exec, Privileged ExecCOMMAND USAGE ◆ Use the ping command to see if ano

Page 916

CHAPTER 41 | IP Interface CommandsIPv4 Interface– 923 –ARP CONFIGURATION This section describes commands used to configure the Address Resolution

Page 917 - 41 IP INTERFACE COMMANDS

CHAPTER 41 | IP Interface CommandsIPv4 Interface– 924 –clear arp-cache This command deletes all dynamic entries from the Address Resolution Protoc

Page 918 - IPv4 Interface

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 925 –IPV6 INTERFACEThis switch supports the following IPv6 interface commands. Table 139: IPv6 C

Page 919

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 926 –ipv6 default-gatewayThis command sets an IPv6 default gateway to use when the destination i

Page 920

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 927 –ipv6 address This command configures an IPv6 global unicast address and enables IPv6 on an

Page 921

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 928 –Joined group address(es):FF02::1:FF00:72FF02::1:FF00:FDFF02::1IPv6 link MTU is 1500 bytesND

Page 922

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 929 –EXAMPLE This example assigns a dynamic global unicast address of 2001:DB8:2222:7272:2E0:CFF

Page 923

CHAPTER 4 | Basic Management TasksDisplaying Bridge Extension Capabilities– 93 –DISPLAYING BRIDGE EXTENSION CAPABILITIESUse the System > Capabi

Page 924

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 930 –COMMAND USAGE ◆ The prefix must be formatted according to RFC 2373 “IPv6 Addressing Archite

Page 925 - IPv6 Interface

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 931 –Global unicast address(es): 2001:DB8::1:2E0:CFF:FE00:FD/64, subnet is 2001:DB8::1:0:0:0:0/

Page 926

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 932 –EXAMPLE This example assigns a link-local address of FE80::269:3EF9:FE19:6779 to VLAN 1. No

Page 927

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 933 –◆ If a duplicate address is detected on the local segment, this interface will be disabled

Page 928

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 934 –COMMAND USAGE ◆ IPv6 routers do not fragment IPv6 packets forwarded from other routers. How

Page 929

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 935 –show ipv6 interface This command displays the usability and configured settings for IPv6 in

Page 930

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 936 –This example displays a brief summary of IPv6 addresses configured on the switch.Console#sh

Page 931

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 937 –EXAMPLE The following example shows the MTU cache for this device:Console#show ipv6 mtuMTU

Page 932

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 938 –ICMPv6 Statistics:ICMPv6 received input errors

Page 933

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 939 –unknown protocols The number of locally-addressed datagrams received successfully but disca

Page 934

CHAPTER 4 | Basic Management TasksManaging System Files– 94 –WEB INTERFACETo view Bridge Extension information:1. Click System, then Capability. F

Page 935

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 940 –ICMPv6 StatisticsICMPv6 receivedinput The total number of ICMP messages received by the int

Page 936

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 941 –clear ipv6 traffic This command resets IPv6 traffic counters.COMMAND MODE Privileged ExecCO

Page 937

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 942 –ping6 This command sends (IPv6) ICMP echo request packets to another node on the network.SY

Page 938

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 943 –response time: 0 ms [FE80::2E0:CFF:FE00:FC] seq_no: 4response time: 0 ms [FE80::2E0

Page 939

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 944 –◆ If the link-local address for an interface is changed, duplicate address detection is per

Page 940

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 945 –COMMAND USAGE ◆ This command specifies the interval between transmitting neighbor solicitat

Page 941

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 946 –COMMAND USAGE ◆ The time limit configured by this command allows the switch to detect unava

Page 942

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 947 –EXAMPLE The following shows all known IPv6 neighbors for this switch:Console#show ipv6 neig

Page 943

CHAPTER 41 | IP Interface CommandsIPv6 Interface– 948 –

Page 944

– 949 –SECTION IVAPPENDICESThis section provides additional information and includes these items:◆ "Software Specifications" on page 951◆

Page 945

CHAPTER 4 | Basic Management TasksManaging System Files– 95 –CLI REFERENCES◆ "copy" on page 512PARAMETERSThe following parameters are di

Page 946

SECTION IV | Appendices– 950 –

Page 947

– 951 –A SOFTWARE SPECIFICATIONSSOFTWARE FEATURESMANAGEMENTAUTHENTICATIONLocal, RADIUS, TACACS+, Port Authentication (802.1X), HTTPS, SSH, Port Secu

Page 948

APPENDIX A | Software SpecificationsManagement Features– 952 –VLAN SUPPORT Up to 256 groups; port-based, protocol-based, tagged (802.1Q),private V

Page 949 - APPENDICES

APPENDIX A | Software SpecificationsStandards– 953 –RMON Groups 1, 2, 3, 9 (Statistics, History, Alarm, Event)STANDARDSIEEE 802.1AB Link Layer Dis

Page 950 -

APPENDIX A | Software SpecificationsManagement Information Bases– 954 –Extended Bridge MIB (RFC 2674)Extensible SNMP Agents MIB (RFC 2742)Forwardi

Page 951 - A SOFTWARE SPECIFICATIONS

– 955 –B TROUBLESHOOTINGPROBLEMS ACCESSING THE MANAGEMENT INTERFACE Table 144: Troubleshooting ChartSymptom ActionCannot connect using Telnet, web b

Page 952 - Management Features

APPENDIX B | TroubleshootingUsing System Logs– 956 –USING SYSTEM LOGSIf a fault does occur, refer to the Installation Guide to ensure that the pro

Page 953 - Standards

– 957 –C LICENSE INFORMATIONThis product includes copyrighted third-party software subject to the terms of the GNU General Public License (GPL), GNU

Page 954 - Management Information Bases

APPENDIX C | License InformationThe GNU General Public License– 958 –GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND

Page 955 - B TROUBLESHOOTING

APPENDIX C | License InformationThe GNU General Public License– 959 –b). Accompany it with a written offer, valid for at least three years, to giv

Page 956 - Using System Logs

CHAPTER 4 | Basic Management TasksManaging System Files– 96 –3. Select FTP Upgrade, HTTP Upgrade, or TFTP Upgrade as the file transfer method.4. I

Page 957 - C LICENSE INFORMATION

APPENDIX C | License InformationThe GNU General Public License– 960 –9. If the distribution and/or use of the Program is restricted in certain cou

Page 958 -

– 961 –GLOSSARYACL Access Control List. ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for c

Page 959

GLOSSARY– 962 –DIFFSERV Differentiated Services provides quality of service on large networks by employing a well-defined set of building blocks fro

Page 960

GLOSSARY– 963 –GMRP Generic Multicast Registration Protocol. GMRP allows network devices to register end stations with multicast groups. GMRP requir

Page 961 - GLOSSARY

GLOSSARY– 964 –IGMP Internet Group Management Protocol. A protocol through which hosts can register with their local router for multicast services.

Page 962 - DiffServ allocates

GLOSSARY– 965 –MD5 MD5 Message-Digest is an algorithm that is used to create digital signatures. It is intended for use with 32 bit machines and is

Page 963 - – 963 –

GLOSSARY– 966 –PORT MIRRORING A method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON

Page 964 - – 964 –

GLOSSARY– 967 –SNTP Simple Network Time Protocol allows a device to set its internal clock based on periodic updates from a Network Time Protocol (N

Page 965 - UT-OF-BAND

GLOSSARY– 968 –VLAN Virtual LAN. A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical lo

Page 966 - DIUS is a logon

– 969 –COMMAND LISTAaaa accounting commands 595aaa accounting dot1x 596aaa accounting exec 597aaa accounting update 598aaa authorization exe

Page 967 - CACS+ is a logon

CHAPTER 4 | Basic Management TasksManaging System Files– 97 –◆ Destination File Name – Copy to the currently designated startup file, or to a new

Page 968 - – 968 –

– 970 –COMMAND LISTdot1x timeout start-period 630dot1x timeout supp-timeout 625dot1x timeout tx-period 626Eenable 487enable password 584en

Page 969 - OMMAND LIST

– 971 –COMMAND LISTipv6 enable 932ipv6 host 906ipv6 mtu 933ipv6 nd dad attempts 943ipv6 nd ns-interval 944ipv6 nd reachable-time 945Jjum

Page 970 - – 970 –

– 972 –COMMAND LISTport monitor 727port security 639power-save 714prompt 485protocol-vlan protocol-group (Configuring Groups) 803protocol-

Page 971 - – 971 –

– 973 –COMMAND LISTshow mac-address-table 755show mac-address-table aging-time 756show mac-vlan 809show management 634show memory 504show

Page 972 - – 972 –

– 974 –COMMAND LISTstopbits 527subnet-vlan 806switchport acceptable-frame-types 789switchport allowed vlan 790switchport dot1q-tunnel mode

Page 973 - – 973 –

– 975 –INDEXNUMERICS802.1Q tunnel 168, 796access 173, 798configuration, guidelines 171configuration, limitations 171description 168etherne

Page 974 - – 974 –

– 976 –INDEXCLIcommand modes 478showing commands 476clustering switches, management access 405, 549command line interface See CLIcommitted bur

Page 975 - NUMERICS

– 977 –INDEXencryptionDSA 293, 295, 615RSA 293, 295, 615engine ID 373, 374, 563event logging 351, 529excess burst size, QoS policy 244, 84

Page 976 - – 976 –

– 978 –INDEXglobal unicast 420, 927link-local 421, 928manual configuration (global unicast) 62, 420, 927manual configuration (link-local) 62

Page 977 - – 977 –

– 979 –INDEXdescription 463interface status, configuring 466, 877, 878interface status, displaying 468, 880setting interface type 467, 878se

Page 978 - – 978 –

CHAPTER 4 | Basic Management TasksManaging System Files– 98 –WEB INTERFACETo set a file to use for system initialization:1. Click System, then Fil

Page 979 - – 979 –

– 980 –INDEXRMON 393, 575alarm, displaying settings 396, 580alarm, setting thresholds 394, 576commands 575event settings, displaying 399,

Page 980 - – 980 –

– 981 –INDEXtime range, ACL 298, 545time zone, setting 106, 543time, setting 103, 540TPID 172, 799traffic segmentation 150, 800assigning p

Page 981 - – 981 –

– 982 –INDEX

Page 983

MS453490ME072010-CS-R01149xxxxxxxxxx

Page 984 - 149xxxxxxxxxx

CHAPTER 4 | Basic Management TasksManaging System Files– 99 –Figure 10: Displaying System FilesAUTOMATICOPERATION CODEUPGRADEUse the System >

Commentaires sur ces manuels

Pas de commentaire