SMC Networks TigerSwitch Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Switche sieciowe SMC Networks TigerSwitch. SMC Networks TigerSwitch User's Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 518
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
TigerSwitch 10/100
24-Port 10/100Mbps
Stackable Managed Switch
Management Guide
24 auto-MDI/MDI-X 10BASE-T/100BASE-TX ports
2 Gigabit RJ-45 ports shared with 2 SFP transceiver slots
2 Gigabit stacking ports that act as Ethernet ports in
standalone mode
Stacks up to 8 units
12.8 Gbps of aggregate bandwidth
Non-blocking switching architecture
Spanning Tree Protocol and Rapid STP
Up to four LACP or static 4-port trunks
RADIUS and TACACS+ authentication
Rate limiting for bandwidth management
CoS support for four-level priority
Full support for VLANs with GVRP
IP Multicasting with IGMP Snooping
Management Guide
SMC6224M
Przeglądanie stron 0
1 2 3 4 5 6 ... 517 518

Podsumowanie treści

Strona 1 - TigerSwitch 10/100

TigerSwitch 10/10024-Port 10/100Mbps Stackable Managed SwitchManagement Guide◆ 24 auto-MDI/MDI-X 10BASE-T/100BASE-TX ports◆ 2 Gigabit RJ-45 ports shar

Strona 2

CONTENTSviDisplaying Basic VLAN Information . . . . . . . . . . . . . . . 3-147Displaying Current VLANs . . . . . . . . . . . . . . . . . . . . . .

Strona 3 - Management Guide

CONFIGURING THE SWITCH3-50CLI – Assign a user name to access-level 15 (i.e., administrator), then specify the password.Configuring Local/Remote Logon

Strona 4

USER AUTHENTICATION3-51Command Usage• By default, management access is always checked against the authentication database stored on the local switch.

Strona 5

CONFIGURING THE SWITCH3-52• RADIUS Settings-Global – Provides globally applicable RADIUS settings.-ServerIndex – Specifies one of five RADIUS servers

Strona 6

USER AUTHENTICATION3-53Web – Click Security, Authentication Settings. To configure local or remote authentication preferences, specify the authenticat

Strona 7

CONFIGURING THE SWITCH3-54CLI – Specify all the required parameters to enable logon authentication.Configuring HTTPSYou can configure the switch to en

Strona 8

USER AUTHENTICATION3-55• If you enable HTTPS, you must indicate this in the URL that you specify in your browser: https://device[:port_number]• When y

Strona 9

CONFIGURING THE SWITCH3-56Web – Click Security, HTTPS Settings. Enable HTTPS and specify the port number, then click Apply.Figure 3-26 HTTPS Settings

Strona 10

USER AUTHENTICATION3-57When you have obtained these, place them on your TFTP server, and use the following command at the switch's command-line i

Strona 11

CONFIGURING THE SWITCH3-58Command UsageThe SSH server on this switch supports both password and public key authentication. If password authentication

Strona 12

USER AUTHENTICATION3-593. Import Client’s Public Key to the Switch – Use the copy tftp public-key command (page 4-89) to copy a file containing the pu

Strona 13

CONTENTSviiTelnet Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2Entering Commands . . . . . . . . . . . .

Strona 14

CONFIGURING THE SWITCH3-60e. The switch compares the decrypted bytes to the original bytes it sent. If the two sets match, this means that the client&

Strona 15

USER AUTHENTICATION3-61the client to select either DES (56-bit) or 3DES (168-bit) for data encryption.• Save Host-Key from Memory to Flash – Saves the

Strona 16

CONFIGURING THE SWITCH3-62CLI – This example generates a host-key pair using both the RSA and DSA algorithms, stores the keys to flash memory, and the

Strona 17

USER AUTHENTICATION3-63• SSH Authentication Retries – Specifies the number of authentication attempts that a client is allowed before authentication f

Strona 18

CONFIGURING THE SWITCH3-64CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that th

Strona 19 - Glossary

USER AUTHENTICATION3-65already in the address table will be retained and will not age out. Any other device that attempts to use the port will be prev

Strona 20

CONFIGURING THE SWITCH3-66Web – Click Security, Port Security. Set the action to take when an invalid address is detected on a port, mark the checkbox

Strona 21

USER AUTHENTICATION3-67This switch uses the Extensible Authentication Protocol over LANs (EAPOL) to exchange authentication protocol messages with the

Strona 22

CONFIGURING THE SWITCH3-68• The RADIUS server and 802.1X client support EAP. (The switch only supports EAPOL in order to pass the EAP packets from the

Strona 23

USER AUTHENTICATION3-69CLI – This example shows the default global setting for 802.1X. Configuring 802.1X Global SettingsThe 802.1X protocol includes

Strona 24

CONTENTSviiiquit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32System Management Commands . .

Strona 25

CONFIGURING THE SWITCH3-70CLI – This example enables 802.1X globally for the switch.Configuring Port Settings for 802.1XWhen 802.1X is enabled, you ne

Strona 26

USER AUTHENTICATION3-71• Max-Req – Sets the maximum number of times the switch port will retransmit an EAP request packet to the client before it time

Strona 27 - NTRODUCTION

CONFIGURING THE SWITCH3-72CLI – This example sets the 802.1X parameters on port 2. For a description of the additional fields displayed in this exampl

Strona 28 - Table 1-1 Key Features

USER AUTHENTICATION3-73Displaying 802.1X StatisticsThis switch can display statistics for dot1x protocol exchanges for any port. Table 3-5 802.1X Sta

Strona 29 - ESCRIPTION

CONFIGURING THE SWITCH3-74Web – Select Security, 802.1X, Statistics. Select the required port and then click Query. Click Refresh to update the statis

Strona 30

USER AUTHENTICATION3-75Filtering Addresses for Management AccessYou create a list of up to 16 IP addresses or IP address groups that are allowed manag

Strona 31

CONFIGURING THE SWITCH3-76• Start IP Address – A single IP address, or the starting address of a range.• End IP Address – The end address of a range.•

Strona 32

ACCESS CONTROL LISTS3-77CLI – This example allows SNMP access for a specific client.Access Control ListsAccess Control Lists (ACL) provide packet filt

Strona 33 - System Defaults

CONFIGURING THE SWITCH3-78Command UsageThe following restrictions apply to ACLs:• Each ACL can have up to 32 rules.• The maximum number of ACLs is 88.

Strona 34 - Table 1-2 System Defaults

ACCESS CONTROL LISTS3-79- MAC: MAC ACL mode that filters packets based on the source or destination MAC address and the Ethernet frame type (RFC 1060)

Strona 35

CONTENTSixclear logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-64show logging . . . . . . . . . . . . . . . . .

Strona 36

CONFIGURING THE SWITCH3-80Configuring a Standard IP ACLCommand Attributes• Action – An ACL can contain any combination of permit or deny rules.• Addre

Strona 37

ACCESS CONTROL LISTS3-81Web – Specify the action (i.e., Permit or Deny). Select the address type (Any, Host, or IP). If you select “Host,” enter a spe

Strona 38 - Required Connections

CONFIGURING THE SWITCH3-82to specify a range of addresses with the Address and SubMask fields. (Options: Any, Host, IP; Default: Any)• Source/Destinat

Strona 39 - ONNECTING

ACCESS CONTROL LISTS3-83For example, use the code value and mask below to catch packets with the following flags set: - SYN flag valid, use control-co

Strona 40 - Remote Connections

CONFIGURING THE SWITCH3-843. Permit all TCP packets from class C addresses 192.168.1.0 with the TCP control code set to “SYN.”Configuring a MAC ACLCom

Strona 41 - Stack Operations

ACCESS CONTROL LISTS3-85Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (Any

Strona 42 - Basic Configuration

CONFIGURING THE SWITCH3-86Binding a Port to an Access Control ListAfter configuring Access Control Lists (ACL), you should bind them to the ports that

Strona 43 - Setting Passwords

ACCESS CONTROL LISTS3-87Web – Click Security, ACL, Port Binding. Mark the Enabled field for the port you want to bind to an ACL, select the required A

Strona 44 - Setting an IP Address

CONFIGURING THE SWITCH3-88Port ConfigurationDisplaying Connection StatusYou can use the Port Information or Trunk Information pages to display the cur

Strona 45 - Dynamic Configuration

PORT CONFIGURATION3-89Web – Click Port, Port Information or Trunk Information.Figure 3-40 Displaying Port/Trunk InformationField Attributes (CLI)Basi

Strona 46

CONTENTSxRADIUS Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-99radius-server host . . . . . . . . . . . . .

Strona 47 - Community Strings

CONFIGURING THE SWITCH3-90- 10full - Supports 10 Mbps full-duplex operation - 100half - Supports 100 Mbps half-duplex operation - 100full - Supports 1

Strona 48 - Saving Configuration Settings

PORT CONFIGURATION3-91CLI – This example shows the connection status for Port 5.Configuring Interface ConnectionsYou can use the Port Configuration or

Strona 49 - Managing System Files

CONFIGURING THE SWITCH3-92• Autonegotiation (Port Capabilities) – Allows auto-negotiation to be enabled/disabled. When auto-negotiation is enabled, yo

Strona 50

PORT CONFIGURATION3-93Web – Click Port, Port Configuration or Trunk Configuration. Modify the required interface settings, and click Apply.Figure 3-41

Strona 51

CONFIGURING THE SWITCH3-94automatically negotiate a trunked link with LACP-configured ports on another device. You can configure any number of ports o

Strona 52

PORT CONFIGURATION3-95Statically Configuring a TrunkCommand Usage• When configuring static trunks, you may not be able to link switches of different t

Strona 53 - AVIGATING

CONFIGURING THE SWITCH3-96Web – Click Port, Trunk Membership. Enter a trunk ID of 1-4 in the Trunk field, select any of the switch ports from the scro

Strona 54 - The Mode can be

PORT CONFIGURATION3-97CLI – This example creates trunk 2 with ports 1 and 2. Just connect these ports to two static trunk ports on another switch to f

Strona 55 - Main Menu

CONFIGURING THE SWITCH3-98• A trunk formed with another switch using LACP will automatically be assigned the next available trunk ID. • If more than e

Strona 56

PORT CONFIGURATION3-99CLI – The following example enables LACP for ports 1 to 6. Just connect these ports to LACP-enabled trunk ports on another switc

Strona 57

CONTENTSxiMAC ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-130access-list mac . . . . . . . . . . . . .

Strona 58

CONFIGURING THE SWITCH3-100Note: If the port channel admin key (lacp admin key, page 4-171) is not set (through the CLI) when a channel group is forme

Strona 59

PORT CONFIGURATION3-101Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can opt

Strona 60

CONFIGURING THE SWITCH3-102CLI – The following example configures LACP parameters for ports 1-4. Ports 1-4 are used as active members of the LAG.Conso

Strona 61

PORT CONFIGURATION3-103Displaying LACP Port CountersYou can display statistics for LACP protocol messages. Web – Click Port, LACP, Port Counters Infor

Strona 62

CONFIGURING THE SWITCH3-104CLI – The following example displays LACP counters.Displaying LACP Settings and Status for the Local SideYou can display co

Strona 63

PORT CONFIGURATION3-105LACP Port PriorityLACP port priority assigned to this interface within the channel group.Admin State,Oper StateAdministrative o

Strona 64

CONFIGURING THE SWITCH3-106Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 3-

Strona 65

PORT CONFIGURATION3-107Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state for the

Strona 66

CONFIGURING THE SWITCH3-108Web – Click Port, LACP, Port Neighbors Information. Select a port channel to display the corresponding information.Figure 3

Strona 67

PORT CONFIGURATION3-109Setting Broadcast Storm ThresholdsBroadcast storms may occur when a device on your network is malfunctioning, or if application

Strona 68 - Manual Configuration

CONTENTSxiishow rate-limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-163Link Aggregation Commands . . . . . . . .

Strona 69 - Using DHCP/BOOTP

CONFIGURING THE SWITCH3-110Web – Click Port, Port/Trunk Broadcast Control. Set the threshold, mark the Enabled field for the desired interface and cli

Strona 70

PORT CONFIGURATION3-111CLI – Specify any interface, and then enter the threshold. The following disables broadcast storm control for port 1, and then

Strona 71 - Managing Firmware

CONFIGURING THE SWITCH3-112Command Attributes• Mirror Sessions – Displays a list of current mirror sessions.• Source Unit – The unit whose port traffi

Strona 72

PORT CONFIGURATION3-113Configuring Rate LimitsThis function allows the network manager to control the maximum rate for traffic transmitted or received

Strona 73

CONFIGURING THE SWITCH3-114CLI - This example sets and displays Fast Ethernet and Gigabit Ethernet granularity.Rate Limit ConfigurationUse the rate li

Strona 74

PORT CONFIGURATION3-115Web – Click Port, Rate Limit, Input/Output Port/Trunk Configuration. Enable the Rate Limit Status for the required interfaces,

Strona 75

CONFIGURING THE SWITCH3-116Note: RMON groups 2, 3 and 9 can only be accessed using SNMP management software such as MC EliteView. Table 3-9 Port Stat

Strona 76

PORT CONFIGURATION3-117Transmit Multicast PacketsThe total number of packets that higher-level protocols requested be transmitted, and which were addr

Strona 77

CONFIGURING THE SWITCH3-118Multiple Collision FramesA count of successfully transmitted frames for which transmission is inhibited by more than one co

Strona 78 - Console Port Settings

PORT CONFIGURATION3-119Multicast Frames The total number of good frames received that were directed to this multicast address.CRC/Alignment Errors The

Strona 79

CONTENTSxiiiswitchport mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-202switchport acceptable-frame-types . . . . . . . .

Strona 80 - Telnet Settings

CONFIGURING THE SWITCH3-120Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at t

Strona 81

PORT CONFIGURATION3-121CLI – This example shows statistics for port 13.Console#show interfaces counters ethernet 1/13 4-155Ethernet 1/13 Iftable stats

Strona 82

CONFIGURING THE SWITCH3-122Address Table SettingsSwitches store the addresses for all known devices. This information is used to pass traffic directly

Strona 83 - Configuring Event Logging

ADDRESS TABLE SETTINGS3-123Web – Click Address Table, Static Addresses. Specify the interface, the MAC address and VLAN, then click Add Static Address

Strona 84 - RAM. (Range: 0-7, Default: 6)

CONFIGURING THE SWITCH3-124• MAC Address – Physical address associated with this interface.• VLAN – ID of configured VLAN (1-4094).• Address Table Sor

Strona 85 - Remote Log Configuration

SPANNING TREE ALGORITHM CONFIGURATION3-125Changing the Aging TimeYou can set the aging time for entries in the dynamic address table. Command Attribut

Strona 86

CONFIGURING THE SWITCH3-126The spanning tree algorithms supported by this switch include these versions:• STP – Spanning Tree Protocol (IEEE 802.1D)•

Strona 87

SPANNING TREE ALGORITHM CONFIGURATION3-127that can be used when a node or port fails, and retaining the forwarding database for ports insensitive to c

Strona 88 - Displaying Log Messages

CONFIGURING THE SWITCH3-128• Designated Root – The priority and MAC address of the device in the Spanning Tree that this switch has accepted as the ro

Strona 89

SPANNING TREE ALGORITHM CONFIGURATION3-129• Root Forward Delay – The maximum time (in seconds) this device will wait before changing states (i.e., dis

Strona 90

CONTENTSxivmap ip dscp (Interface Configuration) . . . . . . . . . . . . . . . 4-233show map ip port . . . . . . . . . . . . . . . . . . . . . . . .

Strona 91 - Resetting the System

CONFIGURING THE SWITCH3-130CLI – This command displays global STA settings, followed by settings for each port. Note: The current root port and curren

Strona 92 - Setting the System Clock

SPANNING TREE ALGORITHM CONFIGURATION3-131Configuring Global SettingsGlobal settings apply to the entire switch.Command Usage• Spanning Tree Algorithm

Strona 93

CONFIGURING THE SWITCH3-132• Priority – Bridge priority is used in selecting the root device, root port, and designated port. The device with the high

Strona 94

SPANNING TREE ALGORITHM CONFIGURATION3-133• Forward Delay – The maximum time (in seconds) this device will wait before changing states (i.e., discardi

Strona 95

CONFIGURING THE SWITCH3-134Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply.Figure 3-57 STA Configurati

Strona 96

SPANNING TREE ALGORITHM CONFIGURATION3-135Displaying Interface SettingsThe STA Port Information and STA Trunk Information pages display the current st

Strona 97

CONFIGURING THE SWITCH3-136• Designated Port – The port priority and number of the port on the designated bridging device through which this switch mu

Strona 98 - User Authentication

SPANNING TREE ALGORITHM CONFIGURATION3-137• Trunk Member – Indicates if a port is a member of a trunk. (STA Port Information only)These additional par

Strona 99

CONFIGURING THE SWITCH3-138• Admin Edge Port – You can enable this option if an interface is attached to a LAN segment that is at the end of a bridged

Strona 100 - ONFIGURING

SPANNING TREE ALGORITHM CONFIGURATION3-139CLI – This example shows the STA attributes for port 5. Configuring Interface SettingsYou can configure RSTP

Strona 101 - Command Attributes

CONTENTSxvGlossaryIndex

Strona 102

CONFIGURING THE SWITCH3-140contradictory information. Port address table is cleared, and the port begins learning addresses.-Forwarding - Port forward

Strona 103 - UTHENTICATION

SPANNING TREE ALGORITHM CONFIGURATION3-141- Default –- Ethernet – Half duplex: 2,000,000; full duplex: 1,000,000; trunk: 500,000- Fast Ethernet – H

Strona 104 - Configuring HTTPS

CONFIGURING THE SWITCH3-142Web – Click Spanning Tree, STA, Port Configuration or Trunk Configuration. Modify the required attributes, then click Apply

Strona 105

VLAN CONFIGURATION3-143VLANs help to simplify network management by allowing you to move devices to a new VLAN without having to change any physical c

Strona 106

CONFIGURING THE SWITCH3-144Note: VLAN-tagged frames can pass through VLAN-aware or VLAN-unaware network interconnection devices, but the VLAN tags sho

Strona 107 - Configuring the Secure Shell

VLAN CONFIGURATION3-145Automatic VLAN Registration – GVRP (GARP VLAN Registration Protocol) defines a system whereby the switch can automatically lear

Strona 108

CONFIGURING THE SWITCH3-146Forwarding Tagged/Untagged FramesIf you want to create a small port-based VLAN for devices attached directly to a single sw

Strona 109

VLAN CONFIGURATION3-147Enabling or Disabling GVRP (Global Setting) GARP VLAN Registration Protocol (GVRP) defines a way for switches to exchange VLAN

Strona 110 - Field Attributes

CONFIGURING THE SWITCH3-148• Maximum Number of Supported VLANs – Maximum number of VLANs that can be configured on this switch.Web – Click VLAN, 802.1

Strona 111

VLAN CONFIGURATION3-149• Status – Shows how this VLAN was added to the switch. - Dynamic GVRP: Automatically learned via GVRP.- Permanent: Added as a

Strona 113

CONTENTSxvi

Strona 114 - Configuring Port Security

CONFIGURING THE SWITCH3-150• Status – Shows if this VLAN is enabled or disabled. - Active: VLAN is operational.- Suspend: VLAN is suspended; i.e., doe

Strona 115

VLAN CONFIGURATION3-151• State (CLI) – Enables or disables the specified VLAN. - Active: VLAN is operational.- Suspend: VLAN is suspended; i.e., does

Strona 116

CONFIGURING THE SWITCH3-152Adding Static Members to VLANs (VLAN Index)Use the VLAN Static Table to configure port members for the selected VLAN index.

Strona 117

VLAN CONFIGURATION3-153• Membership Type – Select VLAN membership for each interface by marking the appropriate radio button for a port or trunk: - Ta

Strona 118

CONFIGURING THE SWITCH3-154Web – Click VLAN, 802.1Q VLAN, Static Table. Select a VLAN ID from the scroll-down list. Modify the VLAN name and status if

Strona 119

VLAN CONFIGURATION3-155• Member – VLANs for which the selected interface is a tagged member.• Non-Member – VLANs for which the selected interface is n

Strona 120

CONFIGURING THE SWITCH3-156Configuring VLAN Behavior for InterfacesYou can configure VLAN behavior for specific interfaces, including the default VLAN

Strona 121

VLAN CONFIGURATION3-157- If ingress filtering is disabled and a port receives frames tagged for VLANs for which it is not a member, these frames will

Strona 122

CONFIGURING THE SWITCH3-158• Mode – Indicates VLAN membership mode for an interface. (Default: Hybrid)- 1Q Trunk – Specifies a port as an end-point fo

Strona 123 - Displaying 802.1X Statistics

VLAN CONFIGURATION3-159CLI – This example sets port 3 to accept only tagged frames, assigns PVID 3 as the native VLAN ID, enables GVRP, sets the GARP

Strona 124

xviiTABLESTable 1-1 Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Table 1-2 System Defaults . . . . . . . .

Strona 125

CONFIGURING THE SWITCH3-160To configure private VLANs, follow these steps:1. Use the Private VLAN Configuration menu (page 3-161) to designate one or

Strona 126

VLAN CONFIGURATION3-161Web – Click VLAN, Private VLAN, Information. Select the desired port from the VLAN ID drop-down menu.Figure 3-67 Private VLAN

Strona 127 - Access Control Lists

CONFIGURING THE SWITCH3-162• Type – There are three types of VLANs within a private VLAN:-Primary VLANs – Conveys traffic between promiscuous ports, a

Strona 128 - Setting the ACL Name and Type

VLAN CONFIGURATION3-163Associating VLANsEach community or isolated VLAN must be associated with a primary VLAN.Command Attributes• Primary VLAN ID – I

Strona 129 - Console(config-std-acl)#

CONFIGURING THE SWITCH3-164Displaying Private VLAN Interface InformationUse the Private VLAN Port Information and Private VLAN Trunk Information menus

Strona 130 - Configuring a Standard IP ACL

VLAN CONFIGURATION3-165Web – Click VLAN, Private VLAN, Port Information or Trunk Information.Figure 3-70 Private VLAN Port InformationCLI – This exam

Strona 131

CONFIGURING THE SWITCH3-166- Host – The port is a community port and can only communicate with other ports in its own community VLAN, and with the des

Strona 132

VLAN CONFIGURATION3-167Web – Click VLAN, Private VLAN, Port Configuration or Trunk Configuration. Set the PVLAN Port Type for each port that will join

Strona 133

CONFIGURING THE SWITCH3-168Class of Service ConfigurationClass of Service (CoS) allows you to specify which data packets have greater precedence when

Strona 134 - Configuring a MAC ACL

CLASS OF SERVICE CONFIGURATION3-169Command Attributes• Default Priority9 – The priority that is assigned to untagged frames received on the specified

Strona 135 - Console(config-mac-acl)#

TABLESxviiiTable 4-21 SMTP Alert Commands . . . . . . . . . . . . . . . . . . . . . . . . . 4-68Table 4-22 Time Commands . . . . . . . . . . . . .

Strona 136

CONFIGURING THE SWITCH3-170Mapping CoS Values to Egress QueuesThis switch processes Class of Service (CoS) priority tagged traffic by using four prior

Strona 137

CLASS OF SERVICE CONFIGURATION3-171Command Attributes• Priority – CoS value. (Range: 0-7, where 7 is the highest priority)• Traffic Class10 – Output q

Strona 138 - Port Configuration

CONFIGURING THE SWITCH3-172Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traffic in a

Strona 139 - Configuration:

CLASS OF SERVICE CONFIGURATION3-173Setting the Service Weight for Traffic ClassesThis switch uses the Weighted Round Robin (WRR) algorithm to determin

Strona 140 - Current Status:

CONFIGURING THE SWITCH3-174CLI – The following example shows how to assign WRR weights to each of the priority queues.Layer 3/4 Priority SettingsMappi

Strona 141

CLASS OF SERVICE CONFIGURATION3-175Selecting IP Precedence/DSCP Priority The switch allows you to choose between using IP Precedence or DSCP priority.

Strona 142

CONFIGURING THE SWITCH3-176Command Attributes• IP Precedence Priority Table – Shows the IP Precedence to CoS map.• Class of Service Value – Maps a CoS

Strona 143 - Creating Trunk Groups

CLASS OF SERVICE CONFIGURATION3-177CLI – The following example globally enables IP Precedence service on the switch, maps IP Precedence value 1 to CoS

Strona 144

CONFIGURING THE SWITCH3-178Command Attributes• DSCP Priority Table – Shows the DSCP Priority to CoS map.• Class of Service Value – Maps a CoS value to

Strona 145

CLASS OF SERVICE CONFIGURATION3-179CLI – The following example globally enables DSCP Priority service on the switch, maps DSCP value 0 to CoS value 1

Strona 146

TABLESxixTable 4-58 Priority Commands (Layer 2) . . . . . . . . . . . . . . . . . . . . 4-222Table 4-59 Default CoS Priority Levels . . . . . . . .

Strona 147

CONFIGURING THE SWITCH3-180Web – Click Priority, IP Port Priority Status. Set IP Port Priority Status to Enabled. Figure 3-79 IP Port Priority Status

Strona 148

CLASS OF SERVICE CONFIGURATION3-181CLI – The following example globally enables IP Port Priority service on the switch, maps HTTP traffic on port 5 to

Strona 149 - Configuring LACP Parameters

CONFIGURING THE SWITCH3-182• ACL CoS Priority Mapping – Displays the configured information.* For information on configuring ACLs, see page 3-77.Web –

Strona 150

MULTICAST FILTERING3-183Multicast Filtering Multicasting is used to support real-time applications such as videoconferencing or streaming audio. A mul

Strona 151 - ONFIGURATION

CONFIGURING THE SWITCH3-184Layer 2 IGMP (Snooping and Query)IGMP Snooping and Query – If multicast routing is not supported on other switches in your

Strona 152

MULTICAST FILTERING3-185multicasting, one of these devices is elected “querier” and assumes the role of querying the LAN for group members. It then pr

Strona 153 - Displaying LACP Port Counters

CONFIGURING THE SWITCH3-186Notes: 1. All systems on the subnet must support the same version. 2. Some attributes are only enabled for IGMPv2, includin

Strona 154

MULTICAST FILTERING3-187Displaying Interfaces Attached to a Multicast RouterMulticast routers that are attached to ports on the switch use information

Strona 155

CONFIGURING THE SWITCH3-188CLI – This example shows that Port 11 has been statically configured as a port attached to a multicast router.Specifying St

Strona 156

MULTICAST FILTERING3-189Web – Click IGMP Snooping, Static Multicast Router Port Configuration. Specify the interfaces attached to a multicast router,

Strona 157

FIGURESxxFIGURESFigure 3-1 Home Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3Figure 3-2 Panel Display . . . . . .

Strona 158

CONFIGURING THE SWITCH3-190Web – Click IGMP Snooping, IP Multicast Registration Table. Select a VLAN ID and the IP address for a multicast service fro

Strona 159

MULTICAST FILTERING3-191Assigning Ports to Multicast Services Multicast filtering can be dynamically configured using IGMP Snooping and IGMP Query mes

Strona 160

CONFIGURING THE SWITCH3-192Web – Click IGMP Snooping, IGMP Member Port Table. Specify the interface attached to a multicast service (via an IGMP-enabl

Strona 161 - Configuring Port Mirroring

4-1CHAPTER 4COMMAND LINE INTERFACEThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceAccessing the CLI

Strona 162

COMMAND LINE INTERFACE4-2After connecting to the system through the console port, the login screen displays:Telnet ConnectionTelnet operates over the

Strona 163 - Configuring Rate Limits

USING THE COMMAND LINE INTERFACE4-32. At the prompt, enter the user name and system password. The CLI will display the “Vty-n#” prompt for the adminis

Strona 164 - Rate Limit Configuration

COMMAND LINE INTERFACE4-4Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keywords

Strona 165 - Showing Port Statistics

ENTERING COMMANDS4-5Command CompletionIf you terminate input with a Tab key, the CLI will print the remaining characters of a partial keyword up to th

Strona 166 - Table 3-9 Port Statistics

COMMAND LINE INTERFACE4-6Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for the current

Strona 167

ENTERING COMMANDS4-7The command “show interfaces ?” will display the following information:Partial Keyword LookupIf you terminate a partial keyword wi

Strona 168

FIGURESxxiFigure 3-37 ACL Configuration - Extended IP . . . . . . . . . . . . . . . . . 3-83Figure 3-38 ACL Configuration - MAC . . . . . . . . . . .

Strona 169

COMMAND LINE INTERFACE4-8Understanding Command ModesThe command set is divided into Exec and Configuration classes. Exec commands generally display in

Strona 170 - Figure 3-52 Port Statistics

ENTERING COMMANDS4-9Privileged Exec mode from within Normal Exec mode, by entering the enable command, followed by the privileged level password “supe

Strona 171

COMMAND LINE INTERFACE4-10• Line Configuration - These commands modify the console port and Telnet configuration, and include command such as parity a

Strona 172 - Address Table Settings

ENTERING COMMANDS4-11Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough

Strona 173 - Displaying the Address Table

COMMAND LINE INTERFACE4-12Command GroupsThe system commands can be broken down into the functional groups shown below.Table 4-4 Command GroupsCommand

Strona 174

COMMAND GROUPS4-13The access mode shown in the following tables is indicated by these abbreviations: NE (Normal Exec) IC (Interface Configuration) P

Strona 175

COMMAND LINE INTERFACE4-14Line CommandsYou can access the onboard configuration program by attaching a VT100 compatible device to the server’s serial

Strona 176

LINE COMMANDS4-15lineThis command identifies a specific line for configuration, and to process subsequent line configuration commands.Syntax line {con

Strona 177

COMMAND LINE INTERFACE4-16loginThis command enables password checking at login. Use the no form to disable password checking and allow connections wit

Strona 178

LINE COMMANDS4-17Example Related Commandsusername (4-36)password (4-17)passwordThis command specifies the password for a line. Use the no form to remo

Strona 179 - LGORITHM

FIGURESxxiiFigure 3-74 Queue Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-172Figure 3-75 Configuring Queue Scheduling .

Strona 180

COMMAND LINE INTERFACE4-18configuration file from a TFTP server. There is no need for you to manually configure encrypted passwords.Example Related Co

Strona 181

LINE COMMANDS4-19Example To set the timeout to two minutes, enter this command:Related Commandssilent-time (4-21)exec-timeout (4-14)exec-timeoutThis c

Strona 182

COMMAND LINE INTERFACE4-20Example To set the timeout to two minutes, enter this command:Related Commandssilent-time (4-21)timeout login response (4-13

Strona 183

LINE COMMANDS4-21Example To set the password threshold to five attempts, enter this command:Related Commandssilent-time (4-21)timeout login response (

Strona 184

COMMAND LINE INTERFACE4-22databitsThis command sets the number of data bits per character that are interpreted and generated by the console port. Use

Strona 185

LINE COMMANDS4-23parityThis command defines the generation of a parity bit. Use the no form to restore the default setting.Syntax parity {none | even

Strona 186

COMMAND LINE INTERFACE4-24Default Setting 9600Command Mode Line Configuration Command Usage Set the speed to match the baud rate of the device connect

Strona 187

LINE COMMANDS4-25disconnectThis command terminates an SSH, Telnet, or console connection.Syntax disconnect session-idsession-id – The session identifi

Strona 188

COMMAND LINE INTERFACE4-26Example To show all lines, enter this command:Console#show line Console configuration: Password threshold: 3 times Intera

Strona 189

GENERAL COMMANDS4-27General CommandsenableThis command activates Privileged Exec mode. In privileged mode, additional commands are available, and cert

Strona 190

1-1CHAPTER 1INTRODUCTIONThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to config

Strona 191

COMMAND LINE INTERFACE4-28Command ModeNormal ExecCommand Usage • “super” is the default password required to change the command mode from Normal Exec

Strona 192 - VLAN Configuration

GENERAL COMMANDS4-29Example Related Commands enable (4-27)configureThis command activates Global Configuration mode. You must enter this mode to modif

Strona 193 - Assigning Ports to VLANs

COMMAND LINE INTERFACE4-30Command Usage The history buffer size is fixed at 10 Execution commands and 10 Configuration commands.Example In this exampl

Strona 194

GENERAL COMMANDS4-31Command Mode Privileged ExecCommand Usage This command resets the entire system.Example This example shows how to reset the switch

Strona 195

COMMAND LINE INTERFACE4-32Example This example shows how to return to the Privileged Exec mode from the Global Configuration mode, and then quit the C

Strona 196

SYSTEM MANAGEMENT COMMANDS4-33System Management CommandsThese commands are used to control system logs, passwords, user names, browser configuration o

Strona 197

COMMAND LINE INTERFACE4-34promptThis command customizes the CLI prompt. Use the no form to restore the default prompt.Syntax prompt stringno promptstr

Strona 198 - Command Attributes (Web)

SYSTEM MANAGEMENT COMMANDS4-35Example User Access CommandsThe basic commands required for management access are listed in this section. This switch al

Strona 199 - Command Attributes (CLI)

COMMAND LINE INTERFACE4-36usernameThis command adds named users, requires authentication at login, specifies or changes a user's password (or spe

Strona 200 - Creating VLANs

SYSTEM MANAGEMENT COMMANDS4-37Command Usage The encrypted password is required for compatibility with legacy password settings (i.e., plain text or en

Strona 201

INTRODUCTION1-2Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Flow control eliminates th

Strona 202

COMMAND LINE INTERFACE4-38Command Usage • You cannot set a null password. You will have to enter a password to change the command mode from Normal Exe

Strona 203

SYSTEM MANAGEMENT COMMANDS4-39managementThis command specifies the client IP addresses that are allowed management access to the switch through variou

Strona 204

COMMAND LINE INTERFACE4-40• You can delete an address range just by specifying the start address, or by specifying both the start address and end addr

Strona 205

SYSTEM MANAGEMENT COMMANDS4-41ExampleWeb Server CommandsConsole#show management all-clientManagement IP Filter HTTP-Client: Start IP address En

Strona 206

COMMAND LINE INTERFACE4-42ip http portThis command specifies the TCP port number used by the web browser interface. Use the no form to use the default

Strona 207

SYSTEM MANAGEMENT COMMANDS4-43Example Related Commandsip http port (4-42)ip http secure-serverThis command enables the secure hypertext transfer proto

Strona 208

COMMAND LINE INTERFACE4-445.x and Netscape Navigator 6.2 or later versions.• The following web browsers and operating systems currently support HTTPS:

Strona 209 - Private VLANs

SYSTEM MANAGEMENT COMMANDS4-45Command Mode Global ConfigurationCommand Usage • You cannot configure the HTTP and HTTPS servers to use the same port. •

Strona 210

COMMAND LINE INTERFACE4-46Default Setting 23Command Mode Global ConfigurationExampleRelated Commandsip telnet server (4-46)ip telnet serverThis comman

Strona 211 - Configuring Private VLANs

SYSTEM MANAGEMENT COMMANDS4-47Secure Shell CommandsThe Berkley-standard includes remote access tools originally designed for Unix systems. Some of the

Strona 212

DESCRIPTION OF SOFTWARE FEATURES1-3Configuration Backup and Restore – You can save the current configuration settings to a file on a TFTP server, and

Strona 213 - Associating VLANs

COMMAND LINE INTERFACE4-48The SSH server on this switch supports both password and public key authentication. If password authentication is specified

Strona 214

SYSTEM MANAGEMENT COMMANDS4-492. Provide Host Public Key to Clients – Many SSH client programs automatically import the host public key during the ini

Strona 215

COMMAND LINE INTERFACE4-50a. The client sends its public key to the switch. b. The switch compares the client's public key to those stored in mem

Strona 216

SYSTEM MANAGEMENT COMMANDS4-51Example Related Commandsip ssh crypto host-key generate (4-53)show ssh (4-56)ip ssh timeoutThis command configures the t

Strona 217

COMMAND LINE INTERFACE4-52ip ssh authentication-retriesThis command configures the number of times the SSH server attempts to reauthenticate a user. U

Strona 218 - Layer 2 Queue Settings

SYSTEM MANAGEMENT COMMANDS4-53Command Usage • The server key is a private key that is never shared outside the switch. • The host key is shared with t

Strona 219

COMMAND LINE INTERFACE4-54Command Mode Privileged ExecCommand Usage • This command stores the host key pair in memory (i.e., RAM). Use the ip ssh save

Strona 220

SYSTEM MANAGEMENT COMMANDS4-55Command Usage • This command clears the host key from volatile memory (RAM). Use the no ip ssh save host-key command to

Strona 221

COMMAND LINE INTERFACE4-56show ip sshThis command displays the connection settings used when authenticating client access to the SSH server.Command Mo

Strona 222 - Selecting the Queue Mode

SYSTEM MANAGEMENT COMMANDS4-57show public-keyThis command shows the public key for the specified user or for the host.Syntax show public-key [user [us

Strona 223

38 TeslaIrvine, CA 92618Phone: (949) 679-8000TigerSwitch 10/100Management GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsNovember 2

Strona 224 - Layer 3/4 Priority Settings

INTRODUCTION1-4Rate Limiting – This feature controls the maximum rate for traffic transmitted or received on an interface. Rate limiting is configured

Strona 225 - Mapping IP Precedence

COMMAND LINE INTERFACE4-58Command Mode Privileged ExecCommand Usage • If no parameters are entered, all keys are displayed. If the user keyword is ent

Strona 226

SYSTEM MANAGEMENT COMMANDS4-59Event Logging Commands logging onThis command controls logging of error messages, sending debug or error messages to swi

Strona 227 - Mapping DSCP Priority

COMMAND LINE INTERFACE4-60Example Related Commandslogging history (4-60)clear logging (4-64)logging historyThis command limits syslog messages saved t

Strona 228

SYSTEM MANAGEMENT COMMANDS4-61Default Setting Flash: errors (level 3 - 0)RAM: warnings (level 7 - 0)Command Mode Global ConfigurationCommand Usage The

Strona 229 - Mapping IP Port Priority

COMMAND LINE INTERFACE4-62Command Usage • By using this command more than once you can build up a list of host IP addresses.• The maximum number of ho

Strona 230

SYSTEM MANAGEMENT COMMANDS4-63logging trapThis command enables the logging of system messages to a remote server, or limits the syslog messages saved

Strona 231 - Mapping CoS Values to ACLs

COMMAND LINE INTERFACE4-64clear loggingThis command clears messages from the log buffer.Syntax clear logging [flash | ram]- flash - Event history stor

Strona 232

SYSTEM MANAGEMENT COMMANDS4-65- sendmail - Displays settings for the SMTP event handler (page 4-71).- trap - Displays settings for the trap function.

Strona 233 - Multicast Filtering

COMMAND LINE INTERFACE4-66The following example displays settings for the trap function. Related Commandsshow logging sendmail (4-71)show logThis comm

Strona 234

SYSTEM MANAGEMENT COMMANDS4-67- tail - Shows event history starting from the most recent entry.- login - Shows the login record only.Default Setting N

Strona 235

DESCRIPTION OF SOFTWARE FEATURES1-5Store-and-Forward Switching – The switch copies each frame into its memory before forwarding them to another port.

Strona 236

COMMAND LINE INTERFACE4-68SMTP Alert CommandsThese commands configure SMTP event handling, and forwarding of alert messages to the specified SMTP serv

Strona 237

SYSTEM MANAGEMENT COMMANDS4-69• To send email alerts, the switch first opens a connection, sends all the email alerts waiting in the queue one by one,

Strona 238

COMMAND LINE INTERFACE4-70logging sendmail source-emailThis command sets the email address used for the “From” field in alert messages. Use the no for

Strona 239

SYSTEM MANAGEMENT COMMANDS4-71Command Mode Global ConfigurationCommand Usage You can specify up to five recipients for alert messages. However, you mu

Strona 240

COMMAND LINE INTERFACE4-72ExampleTime CommandsThe system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP). Mainta

Strona 241

SYSTEM MANAGEMENT COMMANDS4-73sntp clientThis command enables SNTP client requests for time synchronization from NTP or SNTP time servers specified wi

Strona 242

COMMAND LINE INTERFACE4-74sntp serverThis command sets the IP address of the servers to which SNTP time requests are issued. Use the this command with

Strona 243 - NTERFACE

SYSTEM MANAGEMENT COMMANDS4-75sntp pollThis command sets the interval between sending time requests when the switch is set to SNTP client mode. Use th

Strona 244 - Telnet Connection

COMMAND LINE INTERFACE4-76Example clock timezoneThis command sets the time zone for the switch’s internal clock.Syntax clock timezone name hour hours

Strona 245

SYSTEM MANAGEMENT COMMANDS4-77Example Related Commandsshow sntp (4-75)calendar setThis command sets the system clock. It may be used if there is no ti

Strona 246 - Entering Commands

INTRODUCTION1-6switch to restrict traffic to the VLAN groups to which a user has been assigned. By segmenting your network into VLANs, you can:• Elimi

Strona 247 - Getting Help on Commands

COMMAND LINE INTERFACE4-78show calendarThis command displays the system clock.Default Setting NoneCommand Mode Normal Exec, Privileged ExecExample Sys

Strona 248 - Showing Commands

SYSTEM MANAGEMENT COMMANDS4-79light unitThis command displays the unit ID of a switch using its front-panel LED indicators.Syntax light unit [unit]- u

Strona 249

COMMAND LINE INTERFACE4-80• This command displays settings for key command modes. Each mode group is separated by “!” symbols, and includes the config

Strona 250 - Table 4-1 Command Modes

SYSTEM MANAGEMENT COMMANDS4-81Example Related Commandsshow running-config (4-82)Console#show startup-configbuilding startup-config, please wait...!

Strona 251 - Configuration Commands

COMMAND LINE INTERFACE4-82show running-configThis command displays the configuration information currently in use.Default Setting NoneCommand Mode Pri

Strona 252

SYSTEM MANAGEMENT COMMANDS4-83Example Console#show running-configbuilding running-config, please wait...!phymap 5a-a5-aa-55-44-32 00-00-00-00-00-00

Strona 253 - Command Line Processing

COMMAND LINE INTERFACE4-84Related Commandsshow startup-config (4-79)show systemThis command displays system information.Default Setting NoneCommand Mo

Strona 254 - Command Groups

SYSTEM MANAGEMENT COMMANDS4-85Exampleshow usersShows all active console and Telnet sessions, including user name, idle time, and IP address of Telnet

Strona 255

COMMAND LINE INTERFACE4-86Example show versionThis command displays hardware and software version information for the system.Default Setting NoneComma

Strona 256 - Line Commands

SYSTEM MANAGEMENT COMMANDS4-87Example Frame Size Commandsjumbo frameThis command enables support for jumbo frames. Use the no form to disable it.Synta

Strona 257 - Console(config-line)#

SYSTEM DEFAULTS1-7System DefaultsThe switch’s system defaults are provided in the configuration file “Factory_Default_Config.cfg.” To reset the switch

Strona 258

COMMAND LINE INTERFACE4-88using jumbo frames significantly reduces the per-packet overhead required to process protocol encapsulation fields.• To use

Strona 259

FLASH/FILE COMMANDS4-89copy This command moves (upload/download) a code image or configuration file between the switch’s flash memory and a TFTP se

Strona 260

COMMAND LINE INTERFACE4-90• The destination file name should not contain slashes (\ or /), the leading letter of the file name should not be a period

Strona 261

FLASH/FILE COMMANDS4-91The following example shows how to copy the running configuration to a startup file.The following example shows how to download

Strona 262

COMMAND LINE INTERFACE4-92deleteThis command deletes a file or image.Syntax delete [unit:] filenamefilename - Name of the configuration file or image

Strona 263

FLASH/FILE COMMANDS4-93- boot-rom - Boot ROM (or diagnostic) image file.- config - Switch configuration file.- opcode - Run-time operation code image

Strona 264

COMMAND LINE INTERFACE4-94whichbootThis command displays which files were booted when the system powered up.Syntax whichboot [unit]unit - Specifies th

Strona 265

AUTHENTICATION COMMANDS4-95- unit* - Specifies the unit number.* The colon (:) is required.Default Setting NoneCommand Mode Global ConfigurationComman

Strona 266

COMMAND LINE INTERFACE4-96Authentication Sequenceauthentication loginThis command defines the login authentication method and precedence. Use the no f

Strona 267 - Console#

AUTHENTICATION COMMANDS4-97access-request packet from the client to the server, while TACACS+ encrypts the entire body of the packet.• RADIUS and TACA

Strona 268 - Example

INTRODUCTION1-8Web ManagementHTTP Server EnabledHTTP Port Number 80HTTP Secure Server EnabledHTTP Secure Port Number443SNMP Community Strings “public”

Strona 269 - General Commands

COMMAND LINE INTERFACE4-98Command Mode Global ConfigurationCommand Usage • RADIUS uses UDP while TACACS+ uses TCP. UDP only offers best effort deliver

Strona 270

AUTHENTICATION COMMANDS4-99RADIUS ClientRemote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software runn

Strona 271 - Console(config)#

COMMAND LINE INTERFACE4-100• port_number - RADIUS server UDP port used for authentication messages. (Range: 1-65535)• timeout - Number of seconds the

Strona 272

AUTHENTICATION COMMANDS4-101Example radius-server keyThis command sets the RADIUS encryption key. Use the no form to restore the default.Syntax radius

Strona 273 - Console(config-if)#end

COMMAND LINE INTERFACE4-102Command Mode Global ConfigurationExample radius-server timeoutThis command sets the interval between transmitting authentic

Strona 274

AUTHENTICATION COMMANDS4-103Example TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that u

Strona 275 - System Management Commands

COMMAND LINE INTERFACE4-104tacacs-server hostThis command specifies the TACACS+ server. Use the no form to restore the default.Syntax tacacs-server ho

Strona 276

AUTHENTICATION COMMANDS4-105Example tacacs-server keyThis command sets the TACACS+ encryption key. Use the no form to restore the default.Syntax tacac

Strona 277 - User Access Commands

COMMAND LINE INTERFACE4-106Example Port Security CommandsThese commands can be used to enable port security on a port. When using port security, the s

Strona 278

AUTHENTICATION COMMANDS4-107port securityThis command enables or configures port security. Use the no form without any keywords to disable port securi

Strona 279 - ANAGEMENT

SYSTEM DEFAULTS1-9Virtual LANs Default VLAN 1PVID 1Acceptable Frame Type AllIngress Filtering DisabledSwitchport Mode (Egress Mode)Hybrid: tagged/unta

Strona 280 - IP Filter Commands

COMMAND LINE INTERFACE4-108• You can also manually add secure addresses with the mac-address-table static command. • A secure port has the following r

Strona 281

AUTHENTICATION COMMANDS4-109dot1x system-auth-controlThis command enables 802.1X port authentication globally on the switch. Use the no form to restor

Strona 282

COMMAND LINE INTERFACE4-110Command ModeGlobal ConfigurationExampledot1x defaultThis command sets all configurable dot1x global and port settings to th

Strona 283 - Web Server Commands

AUTHENTICATION COMMANDS4-111Exampledot1x port-controlThis command sets the dot1x mode on a port interface. Use the no form to restore the default.Synt

Strona 284

COMMAND LINE INTERFACE4-112dot1x operation-modeThis command allows single or multiple hosts (clients) to connect to an 802.1X-authorized port. Use the

Strona 285

AUTHENTICATION COMMANDS4-113dot1x re-authenticateThis command forces re-authentication on all ports or a specific interface.Syntaxdot1x re-authenticat

Strona 286

COMMAND LINE INTERFACE4-114dot1x timeout quiet-periodThis command sets the time that a switch port waits after the Max Request Count has been exceeded

Strona 287 - Telnet Server Commands

AUTHENTICATION COMMANDS4-115Exampledot1x timeout tx-periodThis command sets the time that an interface on the switch waits during an authentication se

Strona 288

COMMAND LINE INTERFACE4-116Command ModePrivileged ExecCommand UsageThis command displays the following information:• Global 802.1X Parameters – Shows

Strona 289 - Secure Shell Commands

AUTHENTICATION COMMANDS4-117- Max Count – The maximum number of hosts allowed to access this port (page 4-112).- Port-control – Shows the dot1x mode o

Strona 290

INTRODUCTION1-10

Strona 291

COMMAND LINE INTERFACE4-118ExampleConsole#show dot1xGlobal 802.1X Parameters system-auth-control: enable802.1X Port SummaryPort Name Status O

Strona 292

ACCESS CONTROL LIST COMMANDS4-119Access Control List CommandsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, prot

Strona 293

COMMAND LINE INTERFACE4-120• This switch supports ACLs for ingress filtering only. However, you can only bind one IP ACL to any port and one MAC ACL g

Strona 294

ACCESS CONTROL LIST COMMANDS4-121access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. Us

Strona 295

COMMAND LINE INTERFACE4-122Command Usage• When you create a new ACL or enter configuration mode for an existing ACL, use the permit or deny command to

Strona 296

ACCESS CONTROL LIST COMMANDS4-123Command Usage• New rules are appended to the end of the list.• Address bitmasks are similar to a subnet mask, contain

Strona 297

COMMAND LINE INTERFACE4-124[precedence precedence] [tos tos] [dscp dscp][source-port sport [end]] [destination-port dport [end]][control-flag control-

Strona 298 - Console#show ssh

ACCESS CONTROL LIST COMMANDS4-125• The control-code bitmask is a decimal number (representing an equivalent bit mask) that is applied to the control c

Strona 299

COMMAND LINE INTERFACE4-126Related Commandsaccess-list ip (4-121)show ip access-list This command displays the rules for configured IP ACLs.Syntaxshow

Strona 300

ACCESS CONTROL LIST COMMANDS4-127Command ModeInterface Configuration (Ethernet)Command Usage• A port can only be bound to one ACL.• If a port is alrea

Strona 301 - Event Logging Commands

2-1CHAPTER 2INITIAL CONFIGURATIONConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent offer

Strona 302 - Table 4-18 Logging Levels

COMMAND LINE INTERFACE4-128map access-list ip This command sets the output queue for packets matching an ACL rule. The specified CoS value is only use

Strona 303

ACCESS CONTROL LIST COMMANDS4-129show map access-list ip This command shows the CoS value mapped to an IP ACL for the current interface. (The CoS valu

Strona 304

COMMAND LINE INTERFACE4-130MAC ACLs access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form to remo

Strona 305

ACCESS CONTROL LIST COMMANDS4-131Command Usage• When you create a new ACL or enter configuration mode for an existing ACL, use the permit or deny comm

Strona 306

COMMAND LINE INTERFACE4-132• address-bitmask2 – Bitmask for MAC address (in hexidecimal format). • vid – VLAN ID. (Range: 1-4094)• vid-end – Upper bou

Strona 307

ACCESS CONTROL LIST COMMANDS4-133show mac access-list This command displays the rules for configured MAC ACLs.Syntaxshow mac access-list [acl_name]acl

Strona 308

COMMAND LINE INTERFACE4-134Command Usage• A port can only be bound to one ACL.• If a port is already bound to an ACL and you bind it to a different AC

Strona 309

ACCESS CONTROL LIST COMMANDS4-135Default SettingNoneCommand ModeInterface Configuration (Ethernet)Command Usage• You must configure an ACL mask before

Strona 310 - SMTP Alert Commands

COMMAND LINE INTERFACE4-136Command ModePrivileged ExecExample Related Commandsmap access-list mac (4-134)ACL Informationshow access-listThis command s

Strona 311

ACCESS CONTROL LIST COMMANDS4-137Example show access-groupThis command shows the port assignments of ACLs.Command ModePrivileged ExecutiveExample Cons

Strona 312

INITIAL CONFIGURATION2-2The switch’s Web interface, CLI configuration program, and SNMP agent allow you to perform the following management functions:

Strona 313

COMMAND LINE INTERFACE4-138SNMP CommandsControls access to this switch from management stations using the Simple Network Management Protocol (SNMP), a

Strona 314 - Time Commands

SNMP COMMANDS4-139• rw - Specifies read/write access. Authorized management stations are able to both retrieve and modify MIB objects.Default Setting

Strona 315

COMMAND LINE INTERFACE4-140Example Related Commandssnmp-server location (4-140)snmp-server locationThis command sets the system location string. Use t

Strona 316

SNMP COMMANDS4-141snmp-server host This command specifies the recipient of a Simple Network Management Protocol notification operation. Use the no for

Strona 317

COMMAND LINE INTERFACE4-142enable traps command and the snmp-server host command for that host must be enabled. • Some notification types cannot be co

Strona 318

SNMP COMMANDS4-143Command Usage • If you do not enter an snmp-server enable traps command, no notifications controlled by this command are sent. In or

Strona 319

COMMAND LINE INTERFACE4-144ExampleConsole#show snmpSystem Contact: JoeSystem Location: Room 23SNMP traps: Authentication: enabled Link-up-down: enab

Strona 320 - System Status Commands

INTERFACE COMMANDS4-145Interface CommandsThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or

Strona 321

COMMAND LINE INTERFACE4-146interfaceThis command configures an interface type and enter interface configuration mode. Use the no form to remove a trun

Strona 322

4-147Command Mode Interface Configuration (Ethernet, Port Channel)Example The following example adds a description to port 24.speed-duplexThis command

Strona 323 - Related Commands

CONNECTING TO THE SWITCH2-3Attach a VT100-compatible terminal, or a PC running a terminal emulation program to the switch. You can use the console cab

Strona 324

COMMAND LINE INTERFACE4-148• When using the negotiation command to enable auto-negotiation, the optimal settings will be determined by the capabilitie

Strona 325

4-149Example The following example configures port 11 to use autonegotiation.Related Commands capabilities (4 -149)speed-duplex (4 -147)capabilitiesTh

Strona 326

COMMAND LINE INTERFACE4-150Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage When auto-negotiation is enabled with the negoti

Strona 327

4-151Command Usage • Flow control can eliminate frame loss by “blocking” traffic from end stations or segments connected directly to the switch when i

Strona 328

COMMAND LINE INTERFACE4-152Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage This command allows you to disable a port due to

Strona 329 - Frame Size Commands

4-153Example The following shows how to configure broadcast storm control at 600 packets per second: clear countersThis command clears statistics on a

Strona 330 - Flash/File Commands

COMMAND LINE INTERFACE4-154show interfaces statusThis command displays the status for an interface.Syntax show interfaces status [interface]interface

Strona 331

4-155Example show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]interface • ethernet unit/

Strona 332

COMMAND LINE INTERFACE4-156Command Usage If no interface is specified, information on all interfaces is displayed. For a description of the items disp

Strona 333

4-157show interfaces switchportThis command displays the administrative and operational status of the specified interfaces.Syntax show interfaces swit

Strona 334

Information furnished by SMC Networks, Inc. (SMC) is believed to be accu-rate and reliable. However, no responsibility is assumed by SMC for its use,

Strona 335 - Column Heading Description

INITIAL CONFIGURATION2-4For a description of how to use the CLI, see “Using the Command Line Interface” on page 4-1. For a list of all the CLI command

Strona 336

COMMAND LINE INTERFACE4-158Table 4-41 Interfaces Switchport StatisticsField DescriptionBroadcast threshold Shows if broadcast storm suppression is en

Strona 337 - Authentication Commands

MIRROR PORT COMMANDS4-159Mirror Port CommandsThis section describes how to mirror traffic from a source port to a target port. port monitorThis comman

Strona 338 - Authentication Sequence

COMMAND LINE INTERFACE4-160• The mirror port and monitor port speeds should match, otherwise traffic may be dropped from the monitor port.• You can on

Strona 339

RATE LIMIT COMMANDS4-161Example The following shows mirroring configured from port 6 to port 11:Rate Limit CommandsThis function allows the network ma

Strona 340

COMMAND LINE INTERFACE4-162rate-limitUse this command to define the rate limit level for a specific interface. Use this command without specifying a r

Strona 341 - RADIUS Client

RATE LIMIT COMMANDS4-163• fastethernet – Fast Ethernet granularity• gigabitethernet – Gigabit Ethernet granularity• granularity – Sets rate limit gran

Strona 342

COMMAND LINE INTERFACE4-164ExampleLink Aggregation CommandsPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwi

Strona 343

LINK AGGREGATION COMMANDS4-165Guidelines for Creating TrunksGeneral Guidelines –• Finish configuring port trunks before you connect the corresponding

Strona 344

COMMAND LINE INTERFACE4-166• However, if the port channel admin key is set, then the port admin key must be set to the same value for a port to be all

Strona 345 - TACACS+ Client

LINK AGGREGATION COMMANDS4-167lacpThis command enables 802.3ad Link Aggregation Control Protocol (LACP) for the current interface. Use the no form to

Strona 346

STACK OPERATIONS2-5Stack OperationsUp to eight switches can be stacked together as described in the Installation Guide. One unit in the stack acts as

Strona 347

COMMAND LINE INTERFACE4-168ExampleThe following shows LACP enabled on ports 11-13. Because LACP has also been enabled on the ports at the other end of

Strona 348 - Port Security Commands

LINK AGGREGATION COMMANDS4-169• priority - This priority is used to determine link aggregation group (LAG) membership, and to identify this device to

Strona 349

COMMAND LINE INTERFACE4-170lacp admin-key (Ethernet Interface)This command configures a port's LACP administration key. Use the no form to restor

Strona 350 - 802.1X Port Authentication

LINK AGGREGATION COMMANDS4-171lacp admin-key (Port Channel)This command configures a port channel's LACP administration key string. Use the no fo

Strona 351

COMMAND LINE INTERFACE4-172lacp port-priorityThis command configures LACP port priority. Use the no form to restore the default setting.Syntax lacp {a

Strona 352

LINK AGGREGATION COMMANDS4-173show lacpThis command displays LACP information.Syntax show lacp [port-channel] {counters | internal | neighbors | sysid

Strona 353

COMMAND LINE INTERFACE4-174Table 4-45 show lacp counters - display descriptionField DescriptionLACPDUs Sent Number of valid LACPDUs transmitted from t

Strona 354

LINK AGGREGATION COMMANDS4-175Console#show lacp 1 internalChannel group : 1-------------------------------------------------------------------Oper Key

Strona 355

COMMAND LINE INTERFACE4-176Admin State,Oper StateAdministrative or operational values of the actor’s state parameters:• Expired – The actor’s receive

Strona 356

LINK AGGREGATION COMMANDS4-177Console#show lacp 1 neighborsChannel group 1 neighbors------------------------------------------------------------------

Strona 357

INITIAL CONFIGURATION2-6Resilient IP Interface for Management Access The stack functions as one integral system for management and configuration purpo

Strona 358

COMMAND LINE INTERFACE4-178Address Table CommandsThese commands are used to configure the address table for filtering specified addresses, displaying

Strona 359

ADDRESS TABLE COMMANDS4-179mac-address-table staticThis command maps a static address to a destination port in a VLAN. Use the no form to remove an ad

Strona 360

COMMAND LINE INTERFACE4-180• A static address cannot be learned on another port until the address is removed with the no form of this command. Example

Strona 361 - Access Control List Commands

ADDRESS TABLE COMMANDS4-181show mac-address-tableThis command shows classes of entries in the bridge-forwarding database.Syntax show mac-address-table

Strona 362 - IP ACLs

COMMAND LINE INTERFACE4-182Examplemac-address-table aging-timeThis command sets the aging time for entries in the address table. Use the no form to re

Strona 363 - Table 4-34 IP ACLs

SPANNING TREE COMMANDS4-183Command Mode Privileged ExecExample Spanning Tree CommandsThis section includes commands that configure the Spanning Tree A

Strona 364

COMMAND LINE INTERFACE4-184spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Syntax

Strona 365

SPANNING TREE COMMANDS4-185Example This example shows how to enable the Spanning Tree Algorithm for the switch:spanning-tree modeThis command selects

Strona 366

COMMAND LINE INTERFACE4-186RSTP Mode – If RSTP is using 802.1D BPDUs on a port and receives an RSTP BPDU after the migration delay expires, RSTP resta

Strona 367

SPANNING TREE COMMANDS4-187spanning-tree hello-timeThis command configures the spanning tree bridge hello time globally for this switch. Use the no fo

Strona 368

BASIC CONFIGURATION2-73. At the Password prompt, also enter “admin.” (The password characters are not displayed on the console screen.)4. The session

Strona 369

COMMAND LINE INTERFACE4-188Command Mode Global ConfigurationCommand Usage This command sets the maximum time (in seconds) a device can wait without re

Strona 370 - 1,2 0,3 4,5 6,7

SPANNING TREE COMMANDS4-189Command Usage Bridge priority is used in selecting the root device, root port, and designated port. The device with the hig

Strona 371 - Access-list ALS1 cos 0

COMMAND LINE INTERFACE4-190spanning-tree transmission-limitThis command configures the minimum interval between the transmission of consecutive RSTP B

Strona 372 - MAC ACLs

SPANNING TREE COMMANDS4-191Default Setting • Ethernet – half duplex: 2,000,000; full duplex: 1,000,000; trunk: 500,000• Fast Ethernet – half duplex: 2

Strona 373

COMMAND LINE INTERFACE4-192Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • This command defines the priority for the use

Strona 374

SPANNING TREE COMMANDS4-193of frame flooding required to rebuild address tables during reconfiguration events, does not cause the spanning tree to ini

Strona 375 - MAC access-list jerry:

COMMAND LINE INTERFACE4-194forwarding should only be enabled for ports connected to a LAN segment that is at the end of a bridged LAN or for an end-no

Strona 376

SPANNING TREE COMMANDS4-195Command Usage • Specify a point-to-point link if the interface can only be connected to exactly one other bridge, or a shar

Strona 377

COMMAND LINE INTERFACE4-196Example show spanning-treeThis command shows the configuration for the spanning tree.Syntax show spanning-tree [interface]•

Strona 378 - ACL Information

SPANNING TREE COMMANDS4-197ExampleConsole#show spanning-treeSpanning-tree information--------------------------------------------------------------- S

Strona 379 - Privileged Executive

INITIAL CONFIGURATION2-8Setting an IP AddressYou must establish IP address information for the switch to obtain management access through the network.

Strona 380 - SNMP Commands

COMMAND LINE INTERFACE4-198VLAN CommandsA VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong

Strona 381

VLAN COMMANDS4-199Command Mode Global ConfigurationCommand Usage • Use the VLAN database command mode to add, change, and delete VLANs. After finishin

Strona 382

COMMAND LINE INTERFACE4-200• state - Keyword to be followed by the VLAN state. - active - VLAN is operational. - suspend - VLAN is suspended. Suspende

Strona 383

VLAN COMMANDS4-201Configuring VLAN Interfacesinterface vlanThis command enters interface configuration mode for VLANs, which is used to configure VLAN

Strona 384

COMMAND LINE INTERFACE4-202Example The following example shows how to set the interface configuration mode to VLAN 1, and then assign an IP address to

Strona 385

VLAN COMMANDS4-203Example The following shows how to set the configuration mode to port 1, and then set the switchport mode to hybrid:Related Commands

Strona 386

COMMAND LINE INTERFACE4-204Related Commandsswitchport mode (4 -202)switchport ingress-filtering This command enables ingress filtering for an interfac

Strona 387 - Interface Commands

VLAN COMMANDS4-205switchport native vlanThis command configures the PVID (i.e., default VLAN ID) for a port. Use the no form to restore the default.Sy

Strona 388

COMMAND LINE INTERFACE4-206switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the defaul

Strona 389 - Console(config-if)#

VLAN COMMANDS4-207• If a VLAN on the forbidden list for an interface is manually added to that interface, the VLAN is automatically removed from the f

Strona 390

BASIC CONFIGURATION2-93. Type “exit” to return to the global configuration mode prompt. Press <Enter>. 4. To set the IP address of the default g

Strona 391

COMMAND LINE INTERFACE4-208Example The following example shows how to prevent port 1 from being added to VLAN 3:Displaying VLAN Informationshow vlanTh

Strona 392

VLAN COMMANDS4-209Example The following example shows how to display information for VLAN 1:Configuring Private VLANsPrivate VLANs provide port-based

Strona 393

COMMAND LINE INTERFACE4-210To configure private VLANs, follow these steps:1. Use the private-vlan command to designate one or more community VLANs and

Strona 394

VLAN COMMANDS4-211VLANs, and serves to channel traffic between community VLANs and other locations.• isolated – Specifies an isolated VLAN. Ports assi

Strona 395

COMMAND LINE INTERFACE4-212• primary-vlan-id - ID of primary VLAN.(Range: 1-4094, no leading zeroes).• secondary-vlan-id - ID of secondary (i.e, commu

Strona 396

VLAN COMMANDS4-213switchport mode private-vlanUse this command to set the private VLAN mode for an interface. Use the no form to restore the default s

Strona 397

COMMAND LINE INTERFACE4-214switchport private-vlan host-associationUse this command to associate an interface with a secondary VLAN. Use the no form t

Strona 398

VLAN COMMANDS4-215Default Setting NoneCommand Mode Interface Configuration (Ethernet, Port Channel)Command UsagePromiscuous ports assigned to a primar

Strona 399

COMMAND LINE INTERFACE4-216ExampleGVRP and Bridge Extension CommandsGARP VLAN Registration Protocol defines a way for switches to exchange VLAN inform

Strona 400

GVRP AND BRIDGE EXTENSION COMMANDS4-217bridge-ext gvrpThis command enables GVRP globally for the switch. Use the no form to disable it.Syntax [no] bri

Strona 401 - Mirror Port Commands

INITIAL CONFIGURATION2-10• To obtain IP settings via BOOTP, type “ip address bootp” and press <Enter>.3. Type “end” to return to the Privileged

Strona 402

COMMAND LINE INTERFACE4-218Example switchport gvrpThis command enables GVRP for a port. Use the no form to disable it.Syntax [no] switchport gvrpDefau

Strona 403 - Rate Limit Commands

GVRP AND BRIDGE EXTENSION COMMANDS4-219show gvrp configurationThis command shows if GVRP is enabled.Syntax show gvrp configuration [interface]interfac

Strona 404 - Default Setting

COMMAND LINE INTERFACE4-220Default Setting • join: 20 centiseconds• leave: 60 centiseconds• leaveall: 1000 centisecondsCommand Mode Interface Configur

Strona 405

GVRP AND BRIDGE EXTENSION COMMANDS4-221show garp timerThis command shows the GARP timers for the selected interface.Syntax show garp timer [interface]

Strona 406 - Link Aggregation Commands

COMMAND LINE INTERFACE4-222Priority CommandsThe commands described in this section allow you to specify which data packets have greater precedence whe

Strona 407 - GGREGATION

PRIORITY COMMANDS4-223queue modeThis command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for the class of service (CoS) prior

Strona 408

COMMAND LINE INTERFACE4-224Example The following example sets the queue mode to strict priority service mode:switchport priority defaultThis command s

Strona 409

PRIORITY COMMANDS4-225Therefore, any inbound frames that do not have priority tags will be placed in queue 0 of the output port. (Note that if the out

Strona 410

COMMAND LINE INTERFACE4-226Related Commandsshow queue bandwidth (4 -227)queue cos-mapThis command assigns class of service (CoS) values to the priorit

Strona 411

PRIORITY COMMANDS4-227Example The following example shows how to map CoS values 0, 1 and 2 to egress queue 0, value 3 to egress queue 1, values 4 and

Strona 412

BASIC CONFIGURATION2-11Community StringsCommunity strings are used to control management access to SNMP stations, as well as to authorize SNMP station

Strona 413

COMMAND LINE INTERFACE4-228Command Mode Privileged ExecExample show queue cos-mapThis command shows the class of service priority map.Syntax show queu

Strona 414

PRIORITY COMMANDS4-229Priority Commands (Layer 3 and 4) map ip port (Global Configuration)This command enables IP port mapping (i.e., class of service

Strona 415

COMMAND LINE INTERFACE4-230Default Setting DisabledCommand Mode Global ConfigurationCommand Usage The precedence for priority mapping is IP Port, IP P

Strona 416

PRIORITY COMMANDS4-231Example The following example shows how to map HTTP traffic to CoS value 0:map ip precedence (Global Configuration)This command

Strona 417

COMMAND LINE INTERFACE4-232map ip precedence (Interface Configuration)This command sets IP precedence priority (i.e., IP Type of Service priority). Us

Strona 418

PRIORITY COMMANDS4-233map ip dscp (Global Configuration)This command enables IP DSCP mapping (i.e., Differentiated Services Code Point mapping). Use t

Strona 419

COMMAND LINE INTERFACE4-234Default Setting The DSCP default values are defined in the following table. Note that all the DSCP values that are not spec

Strona 420 - Address Table Commands

PRIORITY COMMANDS4-235show map ip portUse this command to show the IP port priority map.Syntax show map ip port [interface]interface • ethernet unit/p

Strona 421

COMMAND LINE INTERFACE4-236show map ip precedenceThis command shows the IP precedence priority map.Syntax show map ip precedence [interface]interface

Strona 422

PRIORITY COMMANDS4-237show map ip dscpThis command shows the IP DSCP priority map.Syntax show map ip dscp [interface]interface • ethernet unit/port -

Strona 423

INITIAL CONFIGURATION2-12Trap ReceiversYou can also specify SNMP stations that are to receive traps from the switch.To configure a trap receiver, comp

Strona 424

COMMAND LINE INTERFACE4-238Multicast Filtering CommandsThis switch uses IGMP (Internet Group Management Protocol) to query for any attached hosts that

Strona 425 - Spanning Tree Commands

MULTICAST FILTERING COMMANDS4-239ip igmp snoopingThis command enables IGMP snooping on this switch. Use the no form to disable it.Syntax [no] ip igmp

Strona 426

COMMAND LINE INTERFACE4-240Command Mode Global ConfigurationExample The following shows how to statically configure a multicast group on a port:ip igm

Strona 427 - Console(config)#spanning-tree

MULTICAST FILTERING COMMANDS4-241show ip igmp snoopingThis command shows the IGMP snooping configuration.Default Setting NoneCommand Mode Privileged E

Strona 428

COMMAND LINE INTERFACE4-242Command Mode Privileged ExecCommand Usage Member types displayed include IGMP or USER, depending on selected options.Exampl

Strona 429

MULTICAST FILTERING COMMANDS4-243ip igmp snooping querierThis command enables the switch as an IGMP querier. Use the no form to disable it.Syntax [no]

Strona 430

COMMAND LINE INTERFACE4-244Command Usage The query count defines how long the querier waits for a response from a multicast client before taking actio

Strona 431

MULTICAST FILTERING COMMANDS4-245ip igmp snooping query-max-response-timeThis command configures the query report delay. Use the no form to restore th

Strona 432

COMMAND LINE INTERFACE4-246ip igmp snooping router-port-expire-timeThis command configures the query timeout. Use the no form to restore the default.S

Strona 433

MULTICAST FILTERING COMMANDS4-247Static Multicast Routing Commandsip igmp snooping vlan mrouterThis command statically configures a multicast router p

Strona 434

MANAGING SYSTEM FILES2-132. Enter the name of the start-up file. Press <Enter>.Managing System FilesThe switch’s flash memory supports three typ

Strona 435

COMMAND LINE INTERFACE4-248Example The following shows how to configure port 11 as a multicast router port within VLAN 1:show ip igmp snooping mrouter

Strona 436

IP INTERFACE COMMANDS4-249IP Interface CommandsAn IP addresses may be used for management access to the switch over your network. The IP address for t

Strona 437

COMMAND LINE INTERFACE4-250Default Setting DHCPCommand Mode Interface Configuration (VLAN)Command Usage • You must assign an IP address to this device

Strona 438

IP INTERFACE COMMANDS4-251ip dhcp restart This command submits a BOOTP or DHCP client request.Default Setting NoneCommand Mode Privileged ExecCommand

Strona 439

COMMAND LINE INTERFACE4-252ip default-gatewayThis command establishes a static route between this switch and devices that exist on another network seg

Strona 440 - VLAN Commands

IP INTERFACE COMMANDS4-253Example Related Commands show ip redirects (4 -253)show ip redirectsThis command shows the default gateway configured for th

Strona 441 - Console(config-vlan)#

COMMAND LINE INTERFACE4-254Default Setting This command has no default for the host.Command Mode Normal Exec, Privileged ExecCommand Usage • Use the p

Strona 442

A-1APPENDIX ASOFTWARE SPECIFICATIONSSoftware FeaturesAuthenticationLocal, RADIUS, TACACS, Port (802.1X), HTTPS, SSH, Port SecurityAccess Control Lists

Strona 443 - Configuring VLAN Interfaces

SOFTWARE SPECIFICATIONSA-2Spanning Tree ProtocolSpanning Tree Protocol (STP, IEEE 802.1D) Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) VLAN Suppor

Strona 444

SOFTWARE SPECIFICATIONSA-3RMONGroups 1, 2, 3, 9 (Statistics, History, Alarm, Event)StandardsIEEE 802.1D Spanning Tree Protocol and traffic prioritiesI

Strona 445

iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Strona 446

INITIAL CONFIGURATION2-14Due to the size limit of the flash memory, the switch supports only two operation code files. However, you can have as many d

Strona 447

SOFTWARE SPECIFICATIONSA-4Management Information BasesBridge MIB (RFC 1493)Entity MIB (RFC 2737)Ether-like MIB (RFC 2665)Extended Bridge MIB (RFC 2674

Strona 448

B-1APPENDIX BTROUBLESHOOTINGProblems Accessing the Management Interface Table B-1 Troubleshooting ChartSymptom ActionCannot connect using Telnet, w

Strona 449

TROUBLESHOOTINGB-2Cannot connect using Secure Shell• If you cannot connect using SSH, you may have exceeded the maximum number of concurrent Telnet/SS

Strona 450 - Displaying VLAN Information

USING SYSTEM LOGSB-3Using System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually cau

Strona 451

TROUBLESHOOTINGB-4

Strona 452 - Command Function Mode Page

Glossary-1GLOSSARYAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Strona 453

GLOSSARYGlossary-2Dynamic Host Control Protocol (DHCP)Provides a framework for passing configuration information to hosts on a TCP/IP network. DHCP is

Strona 454

GLOSSARYGlossary-3IEEE 802.1DSpecifies a general method for the operation of MAC bridges, including the Spanning Tree Protocol.IEEE 802.1QVLAN Tagging

Strona 455

GLOSSARYGlossary-4IGMP QueryOn each subnetwork, one IGMP-capable device will act as the querier — that is, the device that asks all hosts to report on

Strona 456

GLOSSARYGlossary-5Link AggregationSee Port Trunk. Link Aggregation Control Protocol (LACP)Allows ports to automatically negotiate a trunked link with

Strona 457

3-1CHAPTER 3CONFIGURING THE SWITCHUsing the Web InterfaceThis switch provides an embedded HTTP Web agent. Using a Web browser you can configure the sw

Strona 458

GLOSSARYGlossary-6Port MirroringA method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON

Strona 459 - XTENSION

GLOSSARYGlossary-7Simple Network Management Protocol (SNMP)The application protocol in the Internet suite of protocols which offers network management

Strona 460

GLOSSARYGlossary-8User Datagram Protocol (UDP)UDP provides a datagram mode for packet-switched communications. It uses IP as the underlying transport

Strona 461

Index-1Numerics802.1X, port authentication 3-66Aacceptable frame type 3-156, 4-203Access Control List See ACLACLExtended IP 3-78, 4-119, 4-120, 4-123

Strona 462

INDEXIndex-2GGARP VLAN Registration Protocol See GVRPgateway, default 3-18, 4-252GVRPglobal setting 4-217interface configuration 3-157, 4-218GVRP, g

Strona 463

INDEXIndex-3path cost 3-128, 3-137method 3-133, 4-189STA 3-128, 3-137, 4-189port authentication 3-66port priorityconfiguring 3-168, 4-222default ingre

Strona 464 - Priority Commands

INDEXIndex-4STA 3-125, 4-183edge port 3-138, 3-141, 4-192global settings, configuring 3-131, 4-184–4-190global settings, displaying 3-127, 4-196interf

Strona 466

38 TeslaIrvine, CA 92618Phone: (949) 679-8000FOR TECHNICAL SUPPORT, CALL:From U.S.A. and Canada (24 hours a day, 7 days a week)(800) SMC-4-YOU; Phn: (

Strona 467

CONFIGURING THE SWITCH3-2Notes: 1. You are allowed three attempts to enter the correct password; on the third failed attempt the current connection is

Strona 468 - 1, 20, 34, 56, 7

NAVIGATING THE WEB BROWSER INTERFACE3-3Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and pa

Strona 469

CONFIGURING THE SWITCH3-4Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration change has been made

Strona 470

MAIN MENU3-5Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, or monitor netw

Strona 471 - [no] map ip port

CONFIGURING THE SWITCH3-6SNTP 3-42Configuration Configures SNTP client settings, including broadcast mode or a specified list of servers3-42Clock Tim

Strona 472

MAIN MENU3-7IP Filter Sets IP addresses of clients allowed management access via the Web, SNMP, and Telnet3-75Port 3-88Port Information Displays port

Strona 473

CONFIGURING THE SWITCH3-8Output Port Configuration Sets the output rate limit for each port 3-114Output Trunk Configuration Sets the output rate limit

Strona 474 - CoS Value 01234567

MAIN MENU3-9Static Membership by PortConfigures membership type for interfaces, including tagged, untagged or forbidden3-154Port Configuration Specifi

Strona 475 - Console(config)#map ip dscp

LIMITED WARRANTYiiWARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE, CUSTOMER’S SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT O

Strona 476

CONFIGURING THE SWITCH3-10Queue Scheduling Configures Weighted Round Robin queueing 3-173IP Precedence/DSCP Priority Status Globally selects IP Preced

Strona 477

BASIC CONFIGURATION3-11Basic ConfigurationDisplaying System InformationYou can easily identify the system by displaying the device name, location and

Strona 478

CONFIGURING THE SWITCH3-12Web – Click System, System Information. Specify the system name, location, and contact information for the system administra

Strona 479

BASIC CONFIGURATION3-13CLI – Specify the hostname, location and contact information.Displaying Switch Hardware/Software Versions Use the Switch Inform

Strona 480 - Multicast Filtering Commands

CONFIGURING THE SWITCH3-14• Internal Power Status – Displays the status of the internal power supply.Management Software • Loader Version – Version nu

Strona 481 - ILTERING

BASIC CONFIGURATION3-15CLI – Use the following command to display version information.Displaying Bridge Extension CapabilitiesThe Bridge MIB includes

Strona 482

CONFIGURING THE SWITCH3-16• Configurable PVID Tagging – This switch allows you to override the default Port VLAN ID (PVID used in frame tags) and egre

Strona 483

BASIC CONFIGURATION3-17CLI – Enter the following command. Setting the Switch’s IP Address This section describes how to configure an IP interface for

Strona 484

CONFIGURING THE SWITCH3-18Requests will be broadcast periodically by the switch for an IP address. (DHCP/BOOTP values can include the IP address, subn

Strona 485

BASIC CONFIGURATION3-19CLI – Specify the management interface, IP address and default gateway.Using DHCP/BOOTP If your network provides DHCP/BOOTP ser

Strona 486

iiiCONTENTS1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1Key Features . . . . . . . . . . . . . . . . . . . .

Strona 487

CONFIGURING THE SWITCH3-20CLI – Specify the management interface, and set the IP address mode to DHCP or BOOTP, and then enter the “ip dhcp restart” c

Strona 488

BASIC CONFIGURATION3-21Managing FirmwareYou can upload/download firmware to or from a TFTP server, or copy files to and from switch units in a stack.

Strona 489

CONFIGURING THE SWITCH3-22Downloading System Software from a ServerWhen downloading runtime code, you can specify the destination file name to replace

Strona 490

BASIC CONFIGURATION3-23If you download to a new destination file, go to the System/File/Set Start-Up menu, mark the operation code file used at startu

Strona 491 - IP Interface Commands

CONFIGURING THE SWITCH3-24CLI – To download new firmware form a TFTP server, enter the IP address of the TFTP server, select “opcode” as the file type

Strona 492

BASIC CONFIGURATION3-25- running-config to startup-config – Copies the running config to the startup config.- running-config to tftp – Copies the runn

Strona 493

CONFIGURING THE SWITCH3-26Downloading Configuration Settings from a ServerYou can download the configuration file under a new file name and then set i

Strona 494

BASIC CONFIGURATION3-27If you download to a new file name using “tftp to startup-config” or “tftp to file,” the file is automatically set as the start

Strona 495

CONFIGURING THE SWITCH3-28Console Port SettingsYou can access the onboard configuration program by attaching a VT100 compatible device to the switch’s

Strona 496

BASIC CONFIGURATION3-29• Speed – Sets the terminal line’s baud rate for transmit (to terminal) and receive (from terminal). Set the speed to match the

Strona 497 - PECIFICATIONS

CONTENTSivDisplaying Switch Hardware/Software Versions . . . . . . . . . . . 3-13Displaying Bridge Extension Capabilities . . . . . . . . . . . . .

Strona 498 - Management Features

CONFIGURING THE SWITCH3-30CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the curr

Strona 499 - Standards

BASIC CONFIGURATION3-31• Telnet Port Number – Sets the TCP port number for Telnet on the switch. (Default: 23)• Login Timeout – Sets the interval that

Strona 500 - Management Information Bases

CONFIGURING THE SWITCH3-32Web – Click System, Line, Telnet. Specify the connection parameters for Telnet access, then click Apply.Figure 3-14 Enablin

Strona 501 - ROUBLESHOOTING

BASIC CONFIGURATION3-33Configuring Event LoggingThe switch allows you to control the logging of error messages, including the type of events that are

Strona 502

CONFIGURING THE SWITCH3-34• RAM Level – Limits log messages saved to the switch’s temporary RAM memory for all levels up to the specified level. For e

Strona 503 - Using System Logs

BASIC CONFIGURATION3-35Web – Click System, Log, System Logs. Specify System Log Status, set the level of event messages to be logged to RAM and flash

Strona 504

CONFIGURING THE SWITCH3-36The facility type is used by the syslog server to dispatch log messages to an appropriate service.The attribute specifies th

Strona 505 - Glossary-1

BASIC CONFIGURATION3-37Web – Click System, Log, Remote Logs. To add an IP address to the Host IP List, type the new IP address in the Host IP Address

Strona 506 - Glossary-2

CONFIGURING THE SWITCH3-38Displaying Log MessagesThe Logs page allows you to scroll through the logged system and event messages. The switch can store

Strona 507 - Glossary-3

BASIC CONFIGURATION3-39Sending Simple Mail Transfer Protocol AlertsTo alert system administrators of problems, the switch can use SMTP (Simple Mail Tr

Strona 508 - Glossary-4

CONTENTSvFiltering Addresses for Management Access . . . . . . . . . . . . . . . 3-75Access Control Lists . . . . . . . . . . . . . . . . . . . . . .

Strona 509 - Glossary-5

CONFIGURING THE SWITCH3-40Web – Click System, Log, SMTP. Enable SMTP, specify a source email address, and select the minimum severity level. To add an

Strona 510 - Glossary-6

BASIC CONFIGURATION3-41CLI – Enter the IP address of at least one SMTP server, set the syslog severity level to trigger an email message, and specify

Strona 511 - Glossary-7

CONFIGURING THE SWITCH3-42CLI – Use the reload command to restart the switch. When prompted, confirm that you want to reset the switch.Note: When rest

Strona 512 - Glossary-8

BASIC CONFIGURATION3-43• SNTP Server – Sets the IP address for up to three time servers. The switch attempts to update the time from the first server,

Strona 513

CONFIGURING THE SWITCH3-44Setting the Time ZoneSNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based on the time a

Strona 514

SIMPLE NETWORK MANAGEMENT PROTOCOL3-45Simple Network Management Protocol Simple Network Management Protocol (SNMP) is a communication protocol designe

Strona 515

CONFIGURING THE SWITCH3-46• Access Mode -Read-Only – Specifies read-only access. Authorized management stations are only able to retrieve MIB objects.

Strona 516

SIMPLE NETWORK MANAGEMENT PROTOCOL3-47Command Attributes• Trap Manager Capability – This switch supports up to five trap managers.• Current – Displays

Strona 517

CONFIGURING THE SWITCH3-48CLI – This example adds a trap manager and enables both authentication and link-up, link-down traps.User AuthenticationYou c

Strona 518

USER AUTHENTICATION3-49Command Attributes• Account List – Displays the current list of user accounts and associated access levels. (Defaults: admin, a

Komentarze do niniejszej Instrukcji

Brak uwag