Smc-networks 16 10BASE-T Bedienungsanleitung Seite 1

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Computerzubehör Smc-networks 16 10BASE-T herunter. SMC Networks 16 10BASE-T User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 384
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
TigerSwitch 10/100
16-Port Fast Ethernet Switch
16 10BASE-T/100BASE-TX ports
Optional 1000BASE-X or 100BASE-FX modules
8.8 Gbps of aggregate bandwidth
Non-blocking switching architecture
Spanning Tree Protocol
Up to four port trunks
RADIUS and TACACS+ authentication
Rate limiting for bandwidth management
QoS support for four-level priority
Full support for VLANs with GVRP
IP Multicasting with IGMP Snooping
Manageable via console, Web, SNMP/RMON
Management Guide
SMC6716AL2
Seitenansicht 0
1 2 3 4 5 6 ... 383 384

Inhaltsverzeichnis

Seite 1 - TigerSwitch 10/100

TigerSwitch 10/10016-Port Fast Ethernet Switch◆ 16 10BASE-T/100BASE-TX ports◆ Optional 1000BASE-X or 100BASE-FX modules◆ 8.8 Gbps of aggregate band

Seite 2

ContentsivConfiguring IGMP Snooping and Query Parameters 3-133Displaying Interfaces Attached to a Multicast Router 3-135Specifying Static Interfaces

Seite 3 - Installation Guide

Configuring the Switch3-643CLI – This example shows the connection status for Port 5.Configuring Interface ConnectionsYou can use the Port Configurati

Seite 4

Port Configuration3-653- Sym (Gigabit only) - Check this item to transmit and receive pause frames, or clear it to auto-negotiate the sender and recei

Seite 5

Configuring the Switch3-663Creating Trunk GroupsYou can create multiple links between devices that work as one virtual, aggregate link. A port trunk o

Seite 6

Port Configuration3-673Statically Configuring a TrunkCommand Usage• When configuring static trunks, you may not be able to link switches of different

Seite 7 - Contents

Configuring the Switch3-683CLI – This example creates trunk 2 with ports 1 and 2. Just connect these ports to two static trunk ports on another switch

Seite 8

Port Configuration3-693Web – Click Port, LACP, Configuration. Select any of the switch ports from the scroll-down port list and click Add. After you h

Seite 9

Configuring the Switch3-703Configuring LACP ParametersDynamically Creating a Port Channel –Ports assigned to a common port channel must meet the follo

Seite 10

Port Configuration3-713Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can opt

Seite 11

Configuring the Switch3-723CLI – The following example configures LACP parameters for ports 1-4. Ports 1-4 are used as active members of the LAG.Conso

Seite 12

Port Configuration3-733Displaying LACP Port CountersYou can display statistics for LACP protocol messages. Web – Click Port, LACP, Port Counters Infor

Seite 13

Contentsvreload 4-22end 4-22exit 4-23quit 4-23System Management Commands 4-24Device Designation Commands 4-24prompt 4-24hostname 4-25User Access Com

Seite 14

Configuring the Switch3-743Displaying LACP Settings and Status for the Local SideYou can display configuration settings and the operational state for

Seite 15

Port Configuration3-753Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 3-45.

Seite 16

Configuring the Switch3-763Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state for

Seite 17

Port Configuration3-773CLI – The following example displays the LACP configuration settings and operational state for the remote side of port channel

Seite 18

Configuring the Switch3-783Web – Click Port, Port/Trunk Broadcast Control. Set the threshold, mark the Enabled field for the desired interface and cli

Seite 19

Port Configuration3-793Configuring Port MirroringYou can mirror traffic from any source port to a target port for real-time analysis. You can then att

Seite 20

Configuring the Switch3-803Configuring Rate LimitsThis function allows the network manager to control the maximum rate for traffic transmitted or rece

Seite 21 - Chapter 1: Introduction

Port Configuration3-813Rate Limit ConfigurationUse the rate limit configuration pages to apply rate limiting.Command Usage• Input and output rate lim

Seite 22 - Introduction

Configuring the Switch3-823Showing Port StatisticsYou can display standard statistics on network traffic from the Interfaces Group and Ethernet-like M

Seite 23

Port Configuration3-833Transmit Discarded Packets The number of outbound packets which were chosen to be discarded even though no errors had been dete

Seite 24

Contentsvisntp server 4-51sntp poll 4-51show sntp 4-52clock timezone 4-52calendar set 4-53show calendar 4-53System Status Commands 4-54light un

Seite 25 - System Defaults

Configuring the Switch3-843Received Frames The total number of frames (bad, broadcast and multicast) received.Broadcast Frames The total number of goo

Seite 26

Port Configuration3-853Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at the b

Seite 27

Configuring the Switch3-863CLI – This example shows statistics for port 13.Address Table SettingsSwitches store the addresses for all known devices. T

Seite 28

Address Table Settings3-873Web – Click Address Table, Static Addresses. Specify the interface, the MAC address and VLAN, then click Add Static Address

Seite 29 - Connecting to the Switch

Configuring the Switch3-883Web – Click Address Table, Dynamic Addresses. Specify the search type (i.e., mark the Interface, MAC Address, or VLAN check

Seite 30 - Required Connections

Spanning Tree Algorithm Configuration3-893Changing the Aging TimeYou can set the aging time for entries in the dynamic address table. Command Attribut

Seite 31 - Basic Configuration

Configuring the Switch3-903Once a stable network topology has been established, all bridges listen for Hello BPDUs (Bridge Protocol Data Units) transm

Seite 32 - Setting an IP Address

Spanning Tree Algorithm Configuration3-913• Forward Delay – The maximum time (in seconds) the root device will wait before changing states (i.e., disc

Seite 33

Configuring the Switch3-923• Path Cost Method – The path cost is used to determine the best path between devices. The path cost method is used to dete

Seite 34 - Community Strings

Spanning Tree Algorithm Configuration3-933Configuring Global SettingsGlobal settings apply to the entire switch.Command Usage• Spanning Tree ProtocolU

Seite 35

Contentsviidot1x re-authenticate 4-80dot1x re-authentication 4-80dot1x timeout quiet-period 4-81dot1x timeout re-authperiod 4-81dot1x timeout tx-p

Seite 36 - Managing System Files

Configuring the Switch3-943• Maximum Age – The maximum time (in seconds) a device can wait without receiving a configuration message before attempting

Seite 37 - Using the Web Interface

Spanning Tree Algorithm Configuration3-953Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply.Figure 3-56.

Seite 38 - Home Page

Configuring the Switch3-963Displaying Interface SettingsThe STA Port Information and STA Trunk Information pages display the current status of ports a

Seite 39 - Panel Display

Spanning Tree Algorithm Configuration3-973• Trunk Member – Indicates if a port is a member of a trunk. (STA Port Information only)Figure 3-57. BPDU T

Seite 40 - Main Menu

Configuring the Switch3-983• Admin Edge Port – You can enable this option if an interface is attached to a LAN segment that is at the end of a bridged

Seite 41

Spanning Tree Algorithm Configuration3-993Configuring Interface SettingsYou can configure RSTP attributes for specific interfaces, including port prio

Seite 42

Configuring the Switch3-1003• Admin Link Type – The link type attached to this interface.- Point-to-Point – A connection to exactly one other bridge.-

Seite 43

VLAN Configuration3-1013VLAN ConfigurationIEEE 802.1Q VLANsIn large networks, routers are used to isolate broadcast traffic for each subnet into separ

Seite 44

Configuring the Switch3-1023Note: VLAN-tagged frames can pass through VLAN-aware or VLAN-unaware network interconnection devices, but the VLAN tags sh

Seite 45

VLAN Configuration3-1033To implement GVRP in a network, first add the host devices to the required VLANs (using the operating system or other applicat

Seite 46

Contentsviiishow interfaces counters 4-112show interfaces switchport 4-113Mirror Port Commands 4-115port monitor 4-115show port monitor 4-116Rate

Seite 47

Configuring the Switch3-1043Enabling or Disabling GVRP (Global Setting) GARP VLAN Registration Protocol (GVRP) defines a way for switches to exchange

Seite 48

VLAN Configuration3-1053CLI – Enter the following command.Displaying Current VLANsThe VLAN Current Table shows the current port members of each VLAN a

Seite 49 - Manual Configuration

Configuring the Switch3-1063Web – Click VLAN, 802.1Q VLAN, Current Table. Select any ID from the scroll-down list.Figure 3-62. Displaying Current VLA

Seite 50 - Using DHCP/BOOTP

VLAN Configuration3-1073CLI – Current VLAN information can be displayed with the following command.Creating VLANsUse the VLAN Static List to create or

Seite 51 - Console#ip dhcp restart 4-186

Configuring the Switch3-1083Web – Click VLAN, 802.1Q VLAN, Static List. To create a new VLAN, enter the VLAN ID and VLAN name, mark the Enable checkbo

Seite 52

VLAN Configuration3-1093Command Attributes• VLAN – ID of configured VLAN (1-4094, no leading zeroes).• Name – Name of the VLAN (1 to 32 characters).•

Seite 53

Configuring the Switch3-1103CLI – The following example adds tagged and untagged ports to VLAN 2.Adding Static Members to VLANs (Port Index)Use the VL

Seite 54

VLAN Configuration3-1113Configuring VLAN Behavior for InterfacesYou can configure VLAN behavior for specific interfaces, including the default VLAN id

Seite 55 - Console Port Settings

Configuring the Switch3-1123• GARP Leave Timer* – The interval a port waits before leaving a VLAN group. This time should be set to more than twice th

Seite 56 - * CLI only

VLAN Configuration3-1133CLI – This example sets port 3 to accept only tagged frames, assigns PVID 3 as the native VLAN ID, enables GVRP, sets the GARP

Seite 57 - Telnet Settings

Contentsixswitchport mode 4-148switchport acceptable-frame-types 4-148switchport ingress-filtering 4-149switchport native vlan 4-150switchport a

Seite 58

Configuring the Switch3-1143channeling all other traffic through a promiscuous port). Then assign any promiscuous ports to a primary VLAN and any host

Seite 59 - Configuring Event Logging

VLAN Configuration3-1153CLI – This example shows the switch configured with primary VLAN 5 and secondary VLAN 6. Port 3 has been configured as a promi

Seite 60

Configuring the Switch3-1163Web – Click VLAN, Private VLAN, Configuration. Enter the VLAN ID number, select Primary, Isolated or Community type, then

Seite 61 - Remote Logs Configuration

VLAN Configuration3-1173Web – Click VLAN, Private VLAN, Association. Select the required primary VLAN from the scroll-down box, highlight one or more

Seite 62 - Displaying Log Messages

Configuring the Switch3-1183Web – Click VLAN, Private VLAN, Port Information or Trunk Information.Figure 3-70. Displaying Private VLAN Port Informati

Seite 63 - Setting the System Clock

VLAN Configuration3-1193• Secondary VLAN – On this switch all secondary VLANs are community VLANs. A community VLAN conveys traffic between community

Seite 64 - Configuring SNTP

Configuring the Switch3-1203Class of Service ConfigurationClass of Service (CoS) allows you to specify which data packets have greater precedence when

Seite 65

Class of Service Configuration3-1213Web – Click Priority, Default Port Priority or Default Trunk Priority. Modify the default priority for any interfa

Seite 66

Configuring the Switch3-1223Mapping CoS Values to Egress QueuesThis switch processes Class of Service (CoS) priority tagged traffic by using four prio

Seite 67

Class of Service Configuration3-1233Web – Click Priority, Traffic Classes. Mark an interface and click Select to display the current mapping of CoS va

Seite 68 - User Authentication

Contentsxip igmp snooping version 4-178show ip igmp snooping 4-178show mac-address-table multicast 4-179IGMP Query Commands (Layer 2) 4-180ip ig

Seite 69

Configuring the Switch3-1243Command Attributes• WRR - Weighted Round-Robin shares bandwidth at the egress ports by using scheduling weights 1, 2, 4, 6

Seite 70

Class of Service Configuration3-1253Web – Click Priority, Queue Scheduling. Select the interface, highlight a traffic class (i.e., output queue), ente

Seite 71

Configuring the Switch3-1263Layer 3/4 Priority SettingsMapping Layer 3/4 Priorities to CoS ValuesThis switch supports several common methods of priori

Seite 72

Class of Service Configuration3-1273Mapping IP PrecedenceThe Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining ei

Seite 73 - Configuring HTTPS

Configuring the Switch3-1283CLI* – The following example globally enables IP Precedence service on the switch, maps IP Precedence value 1 to CoS value

Seite 74

Class of Service Configuration3-1293Command Attributes• DSCP Priority Table – Shows the DSCP Priority to CoS map.• Class of Service Value – Maps a CoS

Seite 75 - Configuring the Secure Shell

Configuring the Switch3-1303Mapping IP Port PriorityYou can also map network applications to Class of Service values based on the IP port number (i.e.

Seite 76

Class of Service Configuration3-1313CLI* – The following example globally enables IP Port Priority service on the switch, maps HTTP traffic on port 5

Seite 77 - Generating the Host Key Pair

Configuring the Switch3-1323Web – Click Priority, ACL CoS Priority. Enable mapping for any port, select an ACL from the scroll-down list, then click A

Seite 78

Multicast Filtering3-1333to those ports only. It then propagates the service request up to any neighboring multicast switch/router to ensure that it w

Seite 79 - Configuring the SSH Server

xiTablesTable 1-1. Key Features 1-1Table 1-2. System Defaults 1-5Table 3-1. Configuration Options 3-3Table 3-2. Main Menu 3-4Table 3-3. Logging Le

Seite 80 - Configuring Port Security

Configuring the Switch3-1343Command Attributes• IGMP Status — When enabled, the switch will monitor network traffic to determine which hosts want to r

Seite 81

Multicast Filtering3-1353CLI – This example modifies the settings for multicast filtering, and then displays the current status.Displaying Interfaces

Seite 82

Configuring the Switch3-1363CLI – This example shows that Port 11 has been statically configured as a port attached to a multicast router.Specifying S

Seite 83

Multicast Filtering3-1373Displaying Port Members of Multicast Services You can display the port members associated with a specified VLAN and multicast

Seite 84

Configuring the Switch3-1383Assigning Ports to Multicast Services Multicast filtering can be dynamically configured using IGMP Snooping and IGMP Query

Seite 85

Multicast Filtering3-1393CLI – This example assigns a multicast address to VLAN 1, and then displays all the known multicast services supported on VLA

Seite 86

Configuring the Switch3-1403

Seite 87 - Displaying 802.1x Statistics

4-1Chapter 4: Command Line InterfaceThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceAccessing the C

Seite 88

Command Line Interface4-24To access the switch through a Telnet session, you must first set the IP address for the switch, and set the default gateway

Seite 89 - Access Control Lists

Entering Commands4-34Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keywords and

Seite 90

TablesxiiTable 4-27. Authentication Sequence 4-67Table 4-28. RADIUS Client Commands 4-69Table 4-29. TACACS Commands 4-73Table 4-30. Port Security C

Seite 91

Command Line Interface4-44Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for the curren

Seite 92

Entering Commands4-54Partial Keyword LookupIf you terminate a partial keyword with a question mark, alternatives that match the initial letters are pr

Seite 93

Command Line Interface4-64Exec CommandsWhen you open a new console session on the switch with the user name and password “guest,” the system enters th

Seite 94 - Configuring a MAC ACL

Entering Commands4-74To enter the Global Configuration mode, enter the command configure in Privileged Exec mode. The system prompt will change to “Co

Seite 95

Command Line Interface4-84Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain e

Seite 96

Command Groups4-94Command GroupsThe system commands can be broken down into the functional groups shown below.The access mode shown in the following t

Seite 97

Command Line Interface4-104Line CommandsYou can access the onboard configuration program by attaching a VT100 compatible device to the server’s serial

Seite 98 - 2: Trunk Information only

Line Commands4-114Command Usage Telnet is considered a virtual terminal connection and will be shown as “Vty” in screen displays such as show users. H

Seite 99

Command Line Interface4-124Example Related Commandsusername (4-26)password (4-12)passwordThis command specifies the password for a line. Use the no fo

Seite 100 - Configuring the Switch

Line Commands4-134timeout login responseThis command sets the interval that the system waits for a user to log into the CLI. Use the no form to restor

Seite 101 - Port Configuration

xiiiFiguresFigure 3-1. Home Page 3-2Figure 3-2. Front Panel Indicators 3-3Figure 3-3. Displaying System Information 3-8Figure 3-4. Displaying Switc

Seite 102 - Creating Trunk Groups

Command Line Interface4-144Command Mode Line ConfigurationCommand Usage • If user input is detected within the timeout interval, the session is kept o

Seite 103

Line Commands4-154Related Commandssilent-time (4-15)timeout login response (4-13)silent-timeThis command sets the amount of time the management consol

Seite 104

Command Line Interface4-164Command Usage The databits command can be used to mask the high bit on input from devices that generate 7 data bits with pa

Seite 105

Line Commands4-174speedThis command sets the terminal line’s baud rate. This command sets both the transmit (to terminal) and receive (from terminal)

Seite 106 - Configuring LACP Parameters

Command Line Interface4-184disconnectThis command terminates an SSH, Telnet, or console connection.Syntax disconnect session-idsession-id – The sessio

Seite 107

General Commands4-194Example To show all lines, enter this command:General CommandsenableThis command activates Privileged Exec mode. In privileged mo

Seite 108

Command Line Interface4-204Default SettingLevel 15Command ModeNormal ExecCommand Usage • “super” is the default password required to change the comman

Seite 109 - Displaying LACP Port Counters

General Commands4-214configureThis command activates Global Configuration mode. You must enter this mode to modify any settings on the switch. You mus

Seite 110

Command Line Interface4-224The ! command repeats commands from the Execution command history buffer when you are in Normal Exec or Privileged Exec Mod

Seite 111

General Commands4-234exitThis command returns to the previous configuration mode or exit the configuration program.Default Setting NoneCommand Mode An

Seite 113

FiguresxivFigure 3-43. LACP Port Configuration 3-71Figure 3-44. Displaying LACP Port Counters 3-73Figure 3-45. Displaying LACP Port Internal Informa

Seite 114

Command Line Interface4-244System Management CommandsThese commands are used to control system logs, passwords, user names, browser configuration opti

Seite 115 - Configuring Port Mirroring

System Management Commands4-254Example hostnameThis command specifies or modifies the host name for this device. Use the no form to restore the defaul

Seite 116 - Configuring Rate Limits

Command Line Interface4-264usernameThis command adds named users, requires authentication at login, specifies or changes a user's password (or sp

Seite 117 - Console(config-if)#

System Management Commands4-274enable passwordAfter initially logging onto the system, you should set the Privileged Exec password. Remember to record

Seite 118 - Showing Port Statistics

Command Line Interface4-284IP Filter CommandsmanagementThis command specifies the client IP addresses that are allowed management access to the switch

Seite 119

System Management Commands4-294ExampleThis example restricts management access to the indicated addresses.show managementThis command displays the cli

Seite 120

Command Line Interface4-304Web Server Commandsip http portThis command specifies the TCP port number used by the web browser interface. Use the no for

Seite 121

System Management Commands4-314Example Related Commandsip http port (4-30)ip http secure-serverThis command enables the secure hypertext transfer prot

Seite 122 - Address Table Settings

Command Line Interface4-324Example Related Commandsip http secure-port (4-32)copy tftp https-certificate (4-61)ip http secure-portThis command specifi

Seite 123 - Console(config)#

System Management Commands4-334Telnet Server Commandsip telnet portThis command specifies the TCP port number used by the Telnet interface. Use the no

Seite 124

1-1Chapter 1: IntroductionThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to conf

Seite 125

Command Line Interface4-344Related Commandsip telnet port (4-33)Secure Shell CommandsThe Berkley-standard includes remote access tools originally desi

Seite 126 - Displaying Global Settings

System Management Commands4-354The SSH server on this switch supports both password and public key authentication. If password authentication is speci

Seite 127

Command Line Interface4-364corresponding to the public keys stored on the switch can gain access. The following exchanges take place during this proce

Seite 128

System Management Commands4-374ip ssh timeoutThis command configures the timeout for the SSH server. Use the no form to restore the default setting.Sy

Seite 129 - Configuring Global Settings

Command Line Interface4-384Example Related Commandsshow ip ssh (4-40)ip ssh server-key sizeThis command sets the SSH server key size. Use the no form

Seite 130

System Management Commands4-394Example ip ssh crypto host-key generateThis command generates the host key pair (i.e., public and private). Syntax ip s

Seite 131

Command Line Interface4-404Command Mode Privileged ExecCommand Usage • This command clears the host key from volatile memory (RAM). Use the no ip ssh

Seite 132 - Displaying Interface Settings

System Management Commands4-414Example show sshThis command displays the current SSH server connections.Command Mode Privileged ExecExample Console#sh

Seite 133

Command Line Interface4-424show public-keyThis command shows the public key for the specified user or for the host.Syntax show public-key [user [usern

Seite 134

System Management Commands4-434Event Logging Commands logging onThis command controls logging of error messages, sending debug or error messages to sw

Seite 135

Introduction1-21Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Flow control eliminates t

Seite 136

Command Line Interface4-444logging historyThis command limits syslog messages saved to switch memory based on severity. The no form returns the loggin

Seite 137 - VLAN Configuration

System Management Commands4-454logging hostThis command adds a syslog server host IP address that will receive logging messages. Use the no form to re

Seite 138

Command Line Interface4-464logging trapThis command enables the logging of system messages to a remote server, or limits the syslog messages saved to

Seite 139

System Management Commands4-474Related Commandsshow logging (4-48)show logThis command displays the system and event messages stored in memory.Syntax

Seite 140 - * Web Only

Command Line Interface4-484show loggingThis command displays the logging configuration.Syntax show logging {flash | ram | trap}• flash - Event history

Seite 141 - Displaying Current VLANs

System Management Commands4-494The following example displays settings for the trap function. Time CommandsThe system clock can be dynamically set by

Seite 142

Command Line Interface4-504sntp clientThis command enables SNTP client requests for time synchronization from NTP or SNTP time servers specified with

Seite 143 - Creating VLANs

System Management Commands4-514sntp serverThis command sets the IP address of the servers to which SNTP time requests are issued. Use the this command

Seite 144

Command Line Interface4-524Command Usage This command is only applicable when the switch is set to SNTP client mode.Example Related Commandssntp clien

Seite 145

System Management Commands4-534Command Usage This command sets the local time zone relative to the Coordinated Universal Time (UTC, formerly Greenwich

Seite 146

Description of Software Features1-31Port Mirroring – The switch can unobtrusively mirror traffic from any port to a monitor port. You can then attach

Seite 147

Command Line Interface4-544Command Mode Normal Exec, Privileged ExecExample System Status Commandslight unitThis command displays the unit ID of a swi

Seite 148

System Management Commands4-554show startup-configThis command displays the configuration file stored in non-volatile memory that is used to start up

Seite 149 - Private VLANs

Command Line Interface4-564Related Commandsshow running-config (4-56)show running-configThis command displays the configuration information currently

Seite 150

System Management Commands4-574Example Related Commandsshow startup-config (4-55)Console#show running-configbuilding running-config, please wait...!

Seite 151 - Configuring Private VLANs

Command Line Interface4-584show systemThis command displays system information.Default Setting NoneCommand Mode Normal Exec, Privileged ExecCommand Us

Seite 152 - Console(config-vlan)#

System Management Commands4-594Command Usage The session used to execute this command is indicated by a “*” symbol next to the Line (i.e., session) in

Seite 153

Command Line Interface4-604Example Frame Size Commandsjumbo frameThis command enables support for jumbo frames. Use the no form to disable it.Syntax [

Seite 154

Flash/File Commands4-614• Enabling jumbo frames will limit the maximum threshold for broadcast storm control to 64 packets per second. (See the switch

Seite 155

Command Line Interface4-624Default Setting NoneCommand Mode Privileged ExecCommand Usage • The system prompts for data required to complete the copy c

Seite 156 - Layer 2 Queue Settings

Flash/File Commands4-634The following example shows how to copy the running configuration to a startup file.The following example shows how to downloa

Seite 157

Introduction1-41Virtual LANs – The switch supports up to 255 VLANs. A Virtual LAN is a collection of network nodes that share the same collision domai

Seite 158 - Priority

Command Line Interface4-644deleteThis command deletes a file or image.Syntax delete [unit:] filenamefilename - Name of the configuration file or image

Seite 159 - Selecting the Queue Mode

Flash/File Commands4-654Command Mode Privileged ExecCommand Usage • If you enter the command dir without any parameters, the system displays all files

Seite 160

Command Line Interface4-664ExampleThis example shows the information displayed by the whichboot command. See the table under the dir command for a des

Seite 161

Authentication Commands4-674Authentication Commands You can configure this switch to authenticate users logging into the system for management access

Seite 162

Command Line Interface4-684• RADIUS and TACACS+ logon authentication assigns a specific privilege level for each user name and password pair. The user

Seite 163 - Mapping IP Precedence

Authentication Commands4-694• You can specify three authentication methods in a single command to indicate the authentication sequence. For example, i

Seite 164 - Mapping DSCP Priority

Command Line Interface4-704• timeout - Number of seconds the switch waits for a reply before resending a request. (Range: 1-65535)• retransmit - Numbe

Seite 165

Authentication Commands4-714radius-server keyThis command sets the RADIUS encryption key. Use the no form to restore the default.Syntax radius-server

Seite 166 - Mapping IP Port Priority

Command Line Interface4-724radius-server timeoutThis command sets the interval between transmitting authentication requests to the RADIUS server. Use

Seite 167 - Mapping CoS Values to ACLs

Authentication Commands4-734TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that uses soft

Seite 168

System Defaults1-51System DefaultsThe switch’s system defaults are provided in the configuration file “Factory_Default_Config.cfg.” To reset the switc

Seite 169 - Multicast Filtering

Command Line Interface4-744Command Mode Global ConfigurationExample tacacs-server keyThis command sets the TACACS+ encryption key. Use the no form to

Seite 170

Authentication Commands4-754Port Security CommandsThese commands can be used to enable port security on a port. When using port security, the switch s

Seite 171

Command Line Interface4-764Command Usage • If you enable port security, the switch stops learning new MAC addresses on the specified port when it has

Seite 172

Authentication Commands4-774802.1x Port AuthenticationThe switch supports IEEE 802.1x (dot1x) port-based access control that prevents unauthorized acc

Seite 173

Command Line Interface4-784dot1x defaultThis command sets all configurable dot1x global and port settings to their default values.Syntaxdot1x defaultC

Seite 174

Authentication Commands4-794dot1x port-controlThis command sets the dot1x mode on a port interface. Use the no form to restore the default.Syntaxdot1x

Seite 175

Command Line Interface4-804Exampledot1x re-authenticateThis command forces re-authentication on all ports or a specific interface.Syntaxdot1x re-authe

Seite 176

Authentication Commands4-814dot1x timeout quiet-periodThis command sets the time that a switch port waits after the Max Request Count has been exceede

Seite 177 - Telnet Connection

Command Line Interface4-824dot1x timeout tx-periodThis command sets the time that the switch waits during an authentication session before re-transmit

Seite 178 - Command Line Interface

Authentication Commands4-834• 802.1X Port Details – Displays the port access control parameters for each interface, including the following items:- re

Seite 179 - Entering Commands

Introduction1-61Port Configuration Admin Status EnabledAuto-negotiation EnabledFlow Control DisabledPort Capability 100BASE-TX –10 Mbps half duplex10

Seite 180 - Showing Commands

Command Line Interface4-844ExampleConsole#show dot1xGlobal 802.1X Parameters system-auth-control: enable802.1X Port SummaryPort Name Status O

Seite 181 - Console#

Access Control List Commands4-854Access Control List CommandsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, prot

Seite 182 - Configuration Commands

Command Line Interface4-864IP ACLs access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs.

Seite 183

Access Control List Commands4-874Command Usage• When you create a new ACL or enter configuration mode for an existing ACL, use the permit or deny comm

Seite 184 - Command Line Processing

Command Line Interface4-884Example This example configures one permit rule for the specific address 10.1.1.21 and another rule for the address range 1

Seite 185 - Command Groups

Access Control List Commands4-894Default SettingNoneCommand ModeExtended ACLCommand Usage• All new rules are appended to the end of the list.• Address

Seite 186 - Line Commands

Command Line Interface4-904This permits all TCP packets from class C addresses 192.168.1.0 with the TCP control code set to “SYN.”Related Commandsacce

Seite 187 - Console(config-line)#

Access Control List Commands4-914Command Usage• A port can only be bound to one ACL.• If a port is already bound to an ACL and you bind it to a differ

Seite 188

Command Line Interface4-924Command UsageA packet matching a rule within the specified ACL is mapped to one of the output queues as shown in the follow

Seite 189

Access Control List Commands4-934MAC ACLs access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form t

Seite 190

System Defaults1-71Traffic Prioritization Ingress Port Priority 0Weighted Round Robin Queue: 0 1 2 3 Weight: 1 2 4 6IP Precedence Priority DisabledI

Seite 191

Command Line Interface4-944Related Commandspermit, deny (MAC ACL) (4-94)mac access-group (4-95)show mac access-list (4-95)permit, deny (MAC ACL)This c

Seite 192

Access Control List Commands4-954Example This rule permits packets from any source MAC address to the destination address 00-e0-29-94-34-de where the

Seite 193

Command Line Interface4-964Command Usage• A port can only be bound to one ACL.• If a port is already bound to an ACL and you bind it to a different AC

Seite 194 - Console#disconnect 1

Access Control List Commands4-974Command Usage• You must configure an ACL mask before you can map CoS values to the rule.• A packet matching a rule wi

Seite 195 - General Commands

Command Line Interface4-984ACL Informationshow access-listThis command shows all ACLs and associated rules, as well as all the user-defined masks.Comm

Seite 196 - Console>

SNMP Commands4-994SNMP CommandsControls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as

Seite 197

Command Line Interface4-1004Example snmp-server contactThis command sets the system contact string. Use the no form to remove the system contact infor

Seite 198

SNMP Commands4-1014Related Commandssnmp-server contact (4-100)snmp-server host This command specifies the recipient of a Simple Network Management Pro

Seite 199

Command Line Interface4-1024Related Commandssnmp-server enable traps (4-102)snmp-server enable trapsThis command enables this device to send Simple Ne

Seite 200 - System Management Commands

SNMP Commands4-1034Command Usage This command provides information on the community access strings, counter information for SNMP input and output prot

Seite 202

Command Line Interface4-1044Interface CommandsThese commands are used to display or set communication parameters for an Ethernet port, aggregated link

Seite 203

Interface Commands4-1054Command Mode Global Configuration Example To specify port 16, enter the following command:descriptionThis command adds a descr

Seite 204 - IP Filter Commands

Command Line Interface4-1064Default Setting • Auto-negotiation is enabled by default. • When auto-negotiation is disabled, the default speed-duplex se

Seite 205

Interface Commands4-1074• If autonegotiation is disabled, auto-MDI/MDI-X pin signal configuration will also be disabled for the RJ-45 ports.Example Th

Seite 206

Command Line Interface4-1084Example The following example configures Ethernet port 5 capabilities to 100half, 100full and flow control.Related Command

Seite 207

Interface Commands4-1094ExampleThe following example enables flow control on port 5.Related Commands negotiation (4-106)capabilities (flowcontrol, sym

Seite 208

Command Line Interface4-1104switchport broadcast packet-rateThis command configures broadcast storm control. Use the no form to disable broadcast stor

Seite 209

Interface Commands4-1114Command Mode Privileged ExecCommand Usage Statistics are only initialized for a power reset. This command sets the base value

Seite 210 - Secure Shell Commands

Command Line Interface4-1124Example show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]int

Seite 211

Interface Commands4-1134Example show interfaces switchportThis command displays the administrative and operational status of the specified interfaces.

Seite 212 - Console(config)#ip ssh server

2-1Chapter 2: Initial ConfigurationConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent off

Seite 213

Command Line Interface4-1144Example This example shows the configuration setting for port 16. Console#show interfaces switchport ethernet 1/16 Broadca

Seite 214

Mirror Port Commands4-1154Mirror Port CommandsThis section describes how to mirror traffic from a source port to a target port. port monitorThis comma

Seite 215

Command Line Interface4-1164Example The following example configures the switch to mirror received packets from port 6 to 11:show port monitorThis com

Seite 216

Rate Limit Commands4-1174Rate Limit Commands This function allows the network manager to control the maximum rate for traffic transmitted or received

Seite 217

Command Line Interface4-1184Examplerate-limit granularityUse this command to define the rate limit granularity for the Fast Ethernet ports, and the Gi

Seite 218

Link Aggregation Commands4-1194Command Usage • For Fast Ethernet interfaces, the rate limit granularity is 512 Kbps, 1 Mbps, or 3.3 Mbps.• For Gigabit

Seite 219 - Console(config)#logging on

Command Line Interface4-1204Guidelines for Creating TrunksGeneral Guidelines –• Finish configuring port trunks before you connect the corresponding ne

Seite 220

Link Aggregation Commands4-1214Example The following example creates trunk 1 and then adds port 11:lacpThis command enables 802.3ad Link Aggregation C

Seite 221

Command Line Interface4-1224ExampleThe following shows LACP enabled on ports 11-13. Because LACP has also been enabled on the ports at the other end o

Seite 222 - Console#clear logging

Link Aggregation Commands4-1234Command Mode Interface Configuration (Ethernet)Command Usage • Port must be configured with the same system priority to

Seite 223

38 TeslaIrvine, CA 92618Phone: (949) 679-8000TigerSwitch 10/100Installation GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsJuly 200

Seite 224

Initial Configuration2-22• Configure up to 4 static or LACP trunks• Enable port mirroring• Set broadcast storm control on any port• Display system inf

Seite 225 - Time Commands

Command Line Interface4-1244• Once the remote side of a link has been established, LACP operational settings are already in use on that side. Configur

Seite 226

Link Aggregation Commands4-1254lacp port-priorityThis command configures LACP port priority. Use the no form to restore the default setting.Syntax lac

Seite 227

Command Line Interface4-1264Default Setting Port Channel: allCommand Mode Privileged ExecExample Console#show 1 lacp countersChannel group : 1 -

Seite 228

Link Aggregation Commands4-1274Console#show lacp 1 internalChannel group : 1-------------------------------------------------------------------------O

Seite 229

Command Line Interface4-1284Console#show lacp 1 neighborsChannel group 1 neighbors--------------------------------------------------------------------

Seite 230 - Console#light unit 1

Address Table Commands4-1294Address Table CommandsThese commands are used to configure the address table for filtering specified addresses, displaying

Seite 231

Command Line Interface4-1304mac-address-table staticThis command maps a static address to a destination port in a VLAN. Use the no form to remove an a

Seite 232

Address Table Commands4-1314clear mac-address-table dynamicThis command removes any learned entries from the forwarding database and clears the transm

Seite 233

Command Line Interface4-132400-00-00-00-00-00 means an exact match, and a mask of FF-FF-FF-FF-FF-FF means “any.”• The maximum number of address entrie

Seite 234

Spanning Tree Commands4-1334Spanning Tree CommandsThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the swi

Seite 235

Basic Configuration2-32Remote ConnectionsPrior to accessing the switch’s onboard agent via a network connection, you must first configure it with a va

Seite 236 - Frame Size Commands

Command Line Interface4-1344an STA-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations o

Seite 237 - Console(config)#jumbo frame

Spanning Tree Commands4-1354spanning-tree forward-timeThis command configures the spanning tree bridge forward time globally for this switch. Use the

Seite 238

Command Line Interface4-1364Command Usage This command sets the time interval (in seconds) at which the root device transmits a configuration message.

Seite 239 - Flash/File Commands

Spanning Tree Commands4-1374spanning-tree priorityThis command configures the spanning tree priority globally for this switch. Use the no form to rest

Seite 240 - Console#delete 1:test2.cfg

Command Line Interface4-1384Command Usage The path cost method is used to determine the best path between devices. Therefore, lower values should be a

Seite 241

Spanning Tree Commands4-1394Default Setting • Ethernet – half duplex: 2,000,000; full duplex: 1,000,000; trunk: 500,000• Fast Ethernet – half duplex:

Seite 242

Command Line Interface4-1404Example Related Commandsspanning-tree cost (4-138)spanning-tree edge-portThis command specifies an interface as an edge po

Seite 243 - Authentication Commands

Spanning Tree Commands4-1414spanning-tree portfastThis command sets an interface to fast forwarding. Use the no form to disable fast forwarding.Syntax

Seite 244

Command Line Interface4-1424Default Setting autoCommand Mode Interface Configuration (Ethernet, Port Channel)Command Usage • Specify a point-to-point

Seite 245

Spanning Tree Commands4-1434Example show spanning-treeThis command shows the configuration for the spanning tree.Syntax show spanning-tree [interface]

Seite 246 - 10 retransmit 5 key green

Initial Configuration2-42Setting PasswordsNote: If this is your first time to log into the CLI program, you should define new passwords for both defau

Seite 247

Command Line Interface4-1444ExampleConsole#show spanning-treeSpanning-tree information---------------------------------------------------------------

Seite 248

VLAN Commands4-1454VLAN CommandsA VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong to the s

Seite 249

Command Line Interface4-1464Example Related Commands show vlan (4-153)vlanThis command configures a VLAN. Use the no form to restore the default setti

Seite 250

VLAN Commands4-1474Configuring VLAN Interfacesinterface vlanThis command enters interface configuration mode for VLANs, which is used to configure VLA

Seite 251 - Port Security Commands

Command Line Interface4-1484switchport modeThis command configures the VLAN membership mode for a port. Use the no form to restore the default.Syntax

Seite 252

VLAN Commands4-1494Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage When set to receive all frame types, any received frames

Seite 253

Command Line Interface4-1504Example The following example shows how to set the interface to port 1 and then enable ingress filtering:switchport native

Seite 254 - Console(config)#dot1x default

VLAN Commands4-1514switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the default.Syntax

Seite 255

Command Line Interface4-1524switchport forbidden vlanThis command configures forbidden VLANs. Use the no form to remove the list of forbidden VLANs.Sy

Seite 256

VLAN Commands4-1534Displaying VLAN Informationshow vlanThis command shows VLAN information.Syntax show vlan [id vlan-id | name vlan-name | private-vla

Seite 257

Basic Configuration2-52Before you can assign an IP address to the switch, you must obtain the following information from your network administrator:•

Seite 258

Command Line Interface4-1544Configuring Private VLANsPrivate VLANs provide port-based security and isolation between ports within the assigned VLAN. T

Seite 259

VLAN Commands4-1554private-vlanUse this command to create a primary, isolated or community private VLAN. Use the no form to remove the specified priva

Seite 260

Command Line Interface4-1564private vlan associationUse this command to associate a primary VLAN with a secondary (i.e., community) VLAN. Use the no f

Seite 261 - Access Control List Commands

VLAN Commands4-1574Default Setting Normal VLANCommand Mode Interface Configuration (Ethernet, Port Channel) Command UsagePromiscuous ports assigned to

Seite 262 - IP ACLs

Command Line Interface4-1584switchport private-vlan mappingUse this command to map an interface to a primary VLAN. Use the no form to remove this mapp

Seite 263 - Console(config-std-acl)#

GVRP and Bridge Extension Commands4-1594ExampleGVRP and Bridge Extension CommandsGARP VLAN Registration Protocol defines a way for switches to exchang

Seite 264

Command Line Interface4-1604Example show bridge-extThis command shows the configuration for bridge extension commands.Default Setting NoneCommand Mode

Seite 265 - Console(config-ext-acl)#

GVRP and Bridge Extension Commands4-1614show gvrp configurationThis command shows if GVRP is enabled.Syntax show gvrp configuration [interface]interfa

Seite 266

Command Line Interface4-1624Command Usage • Group Address Registration Protocol is used by GVRP and GMRP to register or deregister client attributes f

Seite 267

Priority Commands4-1634Related Commandsgarp timer (4-161)Priority CommandsThe commands described in this section allow you to specify which data packe

Seite 268

Initial Configuration2-625. Wait a few minutes, and then check the IP configuration settings by typing the “show ip interface” command. Press <Ente

Seite 269 - Console(config-mac-acl)#

Command Line Interface4-1644queue modeThis command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for the class of service (CoS)

Seite 270

Priority Commands4-1654Default Setting Weights 1, 2, 4, 6 are assigned to queues 0-3 respectively.Queue 0 is non-configurable.Command Mode Global Conf

Seite 271

Command Line Interface4-1664• This switch provides eight priority queues for each port. It is configured to use Weighted Round Robin, which can be vie

Seite 272

Priority Commands4-1674Command Usage • CoS values assigned at the ingress port are also used at the egress port.• This command sets the CoS priority f

Seite 273

Command Line Interface4-1684Example show queue cos-mapThis command shows the class of service priority map.Syntax show queue cos-map [interface]interf

Seite 274 - ACL Information

Priority Commands4-1694Priority Commands (Layer 3 and 4) map ip port (Global Configuration)This command enables IP port mapping (i.e., class of servic

Seite 275 - SNMP Commands

Command Line Interface4-1704map ip port (Interface Configuration)This command sets IP port priority (i.e., TCP/UDP port priority). Use the no form to

Seite 276

Priority Commands4-1714Example The following example shows how to enable IP precedence mapping globally:map ip precedence (Interface Configuration)Thi

Seite 277

Command Line Interface4-1724map ip dscp (Global Configuration)This command enables IP DSCP mapping (i.e., Differentiated Services Code Point mapping).

Seite 278

Priority Commands4-1734Default Setting The DSCP default values are defined in the following table. Note that all the DSCP values that are not specifie

Seite 279

Basic Configuration2-72To configure a community string, complete the following steps:1. From the Privileged Exec level global configuration mode promp

Seite 280 - Interface Commands

Command Line Interface4-1744Default SettingNoneCommand Mode Privileged ExecExample The following shows that HTTP traffic has been mapped to CoS valu

Seite 281

Priority Commands4-1754Example Related Commands map ip port (Global Configuration) (4-169)map ip precedence (Interface Configuration) (4-171) show map

Seite 282

Command Line Interface4-1764Example Related Commands map ip dscp (Global Configuration) (4-172)map ip dscp (Interface Configuration) (4-172)Multicast

Seite 283

Multicast Filtering Commands4-1774ip igmp snoopingThis command enables IGMP snooping on this switch. Use the no form to disable it.Syntax [no] ip igmp

Seite 284

Command Line Interface4-1784ip igmp snooping versionThis command configures the IGMP snooping version. Use the no form to restore the default.Syntax i

Seite 285

Multicast Filtering Commands4-1794Example The following shows the current IGMP snooping configuration:show mac-address-table multicast This command sh

Seite 286

Command Line Interface4-1804IGMP Query Commands (Layer 2) ip igmp snooping querierThis command enables the switch as an IGMP querier. Use the no form

Seite 287

Multicast Filtering Commands4-1814Default Setting 2 timesCommand Mode Global ConfigurationCommand Usage The query count defines how long the querier w

Seite 288

Command Line Interface4-1824ip igmp snooping query-max-response-timeThis command configures the query report delay. Use the no form to restore the def

Seite 289

Multicast Filtering Commands4-1834Default Setting 300 secondsCommand Mode Global ConfigurationCommand Usage The switch must use IGMPv2 for this comman

Seite 290

Initial Configuration2-822. Enter the name of the start-up file. Press <Enter>.Managing System FilesThe switch’s flash memory supports three typ

Seite 291 - Mirror Port Commands

Command Line Interface4-1844Command Usage Depending on your network connections, IGMP snooping may not always be able to locate the IGMP querier. Ther

Seite 292

IP Interface Commands4-1854IP Interface CommandsAn IP addresses may be used for management access to the switch over your network. The IP address for

Seite 293 - Rate Limit Commands

Command Line Interface4-1864• If you select the bootp or dhcp option, IP is enabled but will not function until a BOOTP or DHCP reply has been receive

Seite 294

IP Interface Commands4-1874Related Commands ip address (4-185)ip default-gatewayThis command establishes a static route between this switch and manag

Seite 295 - Console#show rate-limit

Command Line Interface4-1884show ip redirectsThis command shows the default gateway configured for this device.Default Setting NoneCommand Mode Privil

Seite 296

IP Interface Commands4-1894Example Related Commands interface (4-104)Console#ping 10.1.0.9Type ESC to abort.PING to 10.1.0.9, by 5 32-byte payload ICM

Seite 297 - Console(config-if)#exit

Command Line Interface4-1904

Seite 298

A-1Appendix A: Software SpecificationsSoftware FeaturesAuthenticationLocal, RADIUS, TACACS, Port (802.1x), HTTPS, SSH, Port SecurityAccess Control Lis

Seite 299

Software SpecificationsA-2AAdditional FeaturesBOOTP clientCIDR (Classless Inter-Domain Routing)SNTP (Simple Network Time Protocol)SNMP (Simple Network

Seite 300

Management Information BasesA-3ASNMPv2 (RFC 2571)SNTP (RFC 2030)SSH (Version 2.0)TFTP (RFC 1350)Management Information BasesBridge MIB (RFC 1493)Entit

Seite 301 - Link Aggregation Commands

3-1Chapter 3: Configuring the SwitchUsing the Web InterfaceThis switch provides an embedded HTTP Web agent. Using a Web browser you can configure the

Seite 302

Software SpecificationsA-4A

Seite 303

B-1Appendix B: Troubleshooting Problems Accessing the Management Interface Table B-1. Troubleshooting ChartSymptom ActionCannot connect using Telnet

Seite 304

TroubleshootingB-2BUsing System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually caus

Seite 305 - Address Table Commands

Glossary-1GlossaryAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Seite 306

GlossaryGlossary-2GARP VLAN Registration Protocol (GVRP)Defines a way for switches to exchange VLAN information in order to register necessary VLAN me

Seite 307

Glossary-3GlossaryIGMP SnoopingListening to IGMP Query and IGMP Report packets transferred between IP Multicast Routers and IP Multicast host groups t

Seite 308

GlossaryGlossary-4Multicast SwitchingA process whereby the switch filters incoming multicast frames for services for which no attached host has regist

Seite 309 - Spanning Tree Commands

Glossary-5GlossarySecure Shell (SSH)A secure replacement for remote access functions, including Telnet. SSH can authenticate users with a cryptographi

Seite 310 - Console(config)#spanning-tree

GlossaryGlossary-6Virtual LAN (VLAN)A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical l

Seite 311

Index-1Numerics802.1x, port authentication 3-46, 4-77Aacceptable frame type 3-111, 4-148Access Control List See ACLACLExtended IP 3-54, 4-85, 4-86, 4

Seite 312

Configuring the Switch3-23Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and password. The a

Seite 313

Index-2IndexIGMPgroups, displaying 3-137, 4-179Layer 2 3-133, 4-176query 3-133, 4-180query, Layer 2 3-133, 4-180snooping 3-133, 4-177snooping, configu

Seite 314

Index-3IndexRRADIUS, logon authentication 4-69rate limits, setting 3-80, 4-117remote logging 4-46restarting the system 3-27, 4-22RSTP 3-89, 4-134globa

Seite 315

Index-4IndexWWeb interfaceaccess requirements 3-1configuration buttons 3-3home page 3-2menu list 3-4panel display 3-3

Seite 317

38 TeslaIrvine, CA 92618Phone: (949) 679-8000Model Number: SMC6716AL2Version Number: F2.2.3.9 E072004-R01Publication Number: 150000013500HFOR TECHNICA

Seite 318

Panel Display3-33Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration change has been made on a pa

Seite 319

Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, n

Seite 320

Configuring the Switch3-43Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, o

Seite 321 - VLAN Commands

Main Menu3-53SSH 3-39Settings Configures Secure Shell server settings 3-43Host-Key Settings Generates the host key pair (public and private) 3-41Port

Seite 322 - Console(config)#vlan database

Configuring the Switch3-63Input Trunk Configuration Sets the input rate limit for each trunk 3-81Output Port Configuration Sets the output rate limi

Seite 323

Main Menu3-73Port Information Shows VLAN port type, and associated primary or secondary VLANs3-117Port Configuration Sets the private VLAN interface

Seite 324

Configuring the Switch3-83Basic ConfigurationDisplaying System InformationYou can easily identify the system by displaying the device name, location a

Seite 325

Basic Configuration3-93CLI – Specify the hostname, location and contact information.Displaying Switch Hardware/Software Versions Use the Switch Inform

Seite 326

Configuring the Switch3-103These additional parameters are displayed for the CLI.• Unit ID – Unit number in stack.• Redundant Power Status – Displays

Seite 327

Basic Configuration3-113Displaying Bridge Extension CapabilitiesThe Bridge MIB includes extensions for managed devices that support Multicast Filterin

Seite 328

Configuring the Switch3-123CLI – Enter the following command. Setting the Switch’s IP Address This section describes how to configure an IP interface

Seite 329 - Displaying VLAN Information

Basic Configuration3-133Manual ConfigurationWeb – Click System, IP Configuration. Select the VLAN through which the management station is attached, se

Seite 330

iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Seite 331

Configuring the Switch3-143Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the switch to be dynamically configured by

Seite 332

Basic Configuration3-153Web – If the address assigned by DHCP is no longer functioning, you will not be able to renew the IP settings via the web inte

Seite 333

Configuring the Switch3-163Downloading System Software from a ServerWhen downloading runtime code, you can specify the destination file name to replac

Seite 334

Basic Configuration3-173To delete a file select System, File, Delete. Select the file name from the given list by checking the tick box and click Appl

Seite 335

Configuring the Switch3-183- startup-config to tftp – Copies the startup configuration to a TFTP server.- tftp to file – Copies a file from a TFTP ser

Seite 336

Basic Configuration3-193Note that you can also select any configuration file as the start-up configuration by using the System/File/Set Start-Up page.

Seite 337 - GVRP configuration: Enabled

Configuring the Switch3-203• Password Threshold – Sets the password intrusion threshold, which limits the number of failed logon attempts. When the lo

Seite 338

Basic Configuration3-213CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the curren

Seite 339 - Priority Commands

Configuring the Switch3-223• Password Threshold – Sets the password intrusion threshold, which limits the number of failed logon attempts. When the lo

Seite 340

Basic Configuration3-233CLI – Enter Line Configuration mode for a virtual terminal, then specify the connection parameters as required. To display the

Seite 341

iiWARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE, CUSTOMER’S SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT OF THE PRODUCT IN

Seite 342

Configuring the Switch3-243• RAM Level – Limits log messages saved to the switch’s temporary RAM memory for all levels up to the specified level. For

Seite 343

Basic Configuration3-253Remote Logs ConfigurationThe Remote Logs page allows you to configure the logging of messages that are sent to syslog servers

Seite 344

Configuring the Switch3-263CLI – Enter the syslog server host IP address, choose the facility type and set the logging trap.Displaying Log MessagesThe

Seite 345 - Console(config)#map ip port

Basic Configuration3-273CLI – This example shows that system logging is enabled, the message level for flash memory is “errors” (i.e., default level 3

Seite 346

Configuring the Switch3-283Configuring SNTPYou can configure the switch to send time synchronization requests to time servers.Command Attributes• SNTP

Seite 347

Simple Network Management Protocol3-293Setting the Time ZoneSNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based

Seite 348 - Console(config)#map ip dscp

Configuring the Switch3-303community string for authentication. The options for configuring community strings, trap functions, and restricting access

Seite 349

Simple Network Management Protocol3-313Specifying Trap Managers and Trap Types Traps indicating status changes are issued by the switch to specified t

Seite 350

Configuring the Switch3-323User AuthenticationYou can restrict management access to this switch using the following options:• User Accounts – Manually

Seite 351

User Authentication3-333Web – Click Security, User Accounts. To configure a new user account, specify a user name, select the user’s access level, the

Seite 352 - Multicast Filtering Commands

iContents Chapter 1: Introduction 1-1Key Features 1-1Description of Software Features 1-2System Defaults 1-5Chapter 2: Initial Configuration 2-

Seite 353

Configuring the Switch3-343Configuring Local/Remote Logon AuthenticationUse the Authentication Settings menu to restrict management access based on sp

Seite 354

User Authentication3-353Command Attributes• Authentication – Select the authentication, or authentication sequence required:- Local – User authenticat

Seite 355

Configuring the Switch3-363Web – Click Security, Authentication Settings. To configure local or remote authentication preferences, specify the authent

Seite 356

User Authentication3-373Configuring HTTPSYou can configure the switch to enable the Secure Hypertext Transfer Protocol (HTTPS) over the Secure Socket

Seite 357

Configuring the Switch3-383Web – Click Security, HTTPS Settings. Enable HTTPS and specify the port number, then click Apply.Figure 3-25. HTTPS Settin

Seite 358

User Authentication3-393Configuring the Secure Shell The Berkley-standard includes remote access tools originally designed for Unix systems. Some of t

Seite 359

Configuring the Switch3-4033. Import Client’s Public Key to the Switch – Use the copy tftp public-key command (page 4-61) to copy a file containing th

Seite 360

User Authentication3-413Generating the Host Key PairA host public/private key pair is used to provide secure communications between an SSH client and

Seite 361 - IP Interface Commands

Configuring the Switch3-423Web – Click Security, SSH, Host-Key Settings. Select the host-key type from the drop-down box, select the option to save th

Seite 362

User Authentication3-433Configuring the SSH ServerThe SSH server includes basic settings for authentication. Field Attributes• SSH Server Status – All

Seite 363

ContentsiiConsole Port Settings 3-19Telnet Settings 3-21Configuring Event Logging 3-23System Log Configuration 3-23Remote Logs Configuration 3-25

Seite 364 - IP default gateway 10.1.0.254

Configuring the Switch3-443CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that t

Seite 365

User Authentication3-453• If a port is disabled (shut down) due to a security violation, it must be manually re-enabled from the Port/Port Configurati

Seite 366

Configuring the Switch3-463Configuring 802.1x Port Authentication Network switches can provide open and easy access to network resources by simply att

Seite 367 - Software Features

User Authentication3-473• The RADIUS server and client also have to support the same EAP authentication type – MD5. (Some clients have native support

Seite 368 - Standards

Configuring the Switch3-483Configuring 802.1x Global SettingsThe 802.1x protocol provides client authentication. Command Attributes• 802.1x System Aut

Seite 369 - Management Information Bases

User Authentication3-493• Max-Req – Sets the maximum number of times the switch port will retransmit an EAP request packet to the client before it tim

Seite 370 - Software Specifications

Configuring the Switch3-503CLI – This example sets the 802.1x parameters on port 2. For a description of the additional fields displayed in this examp

Seite 371 - Appendix B: Troubleshooting

User Authentication3-513Displaying 802.1x StatisticsThis switch can display statistics for dot1x protocol exchanges for any port.Statistical Values Ta

Seite 372 - Using System Logs

Configuring the Switch3-523Web – Select Security, 802.1x, Statistics. Select the required port and then click Query. Click Refresh to update the stati

Seite 373 - Glossary

Access Control Lists3-533Access Control ListsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 pr

Seite 374

ContentsiiiSetting Broadcast Storm Thresholds 3-77Configuring Port Mirroring 3-79Configuring Rate Limits 3-80Rate Limit Granularity 3-80Rate Limit

Seite 375

Configuring the Switch3-543Setting the ACL Name and TypeUse the ACL Configuration page to designate the name and type of an ACL.Command Attributes• Na

Seite 376

Access Control Lists3-553Configuring a Standard IP ACLCommand Attributes• Action – An ACL can contain all permit rules or all deny rules. (Default: Pe

Seite 377

Configuring the Switch3-563Configuring an Extended IP ACLCommand Attributes• Action – An ACL can contain either all permit rules or all deny rules. (D

Seite 378 - Virtual LAN (VLAN)

Access Control Lists3-573Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (An

Seite 379

Configuring the Switch3-583Configuring a MAC ACLCommand Attributes• Action – An ACL can contain all permit rules or all deny rules. (Default: Permit r

Seite 380

Access Control Lists3-593CLI – This rule permits packets from any source MAC address to the destination address 00-e0-29-94-34-de where the Ethernet t

Seite 381

Configuring the Switch3-603Filtering Addresses for Management AccessYou create a list of up to 16 IP addresses or IP address groups that are allowed a

Seite 382

Filtering Addresses for Management Access3-613Web – Click Security, IP Filter. Enter the IP addresses or range of addresses, and click Add IP Filterin

Seite 383

Configuring the Switch3-623Port ConfigurationDisplaying Connection StatusYou can use the Port Information or Trunk Information pages to display the cu

Seite 384

Port Configuration3-633Field Attributes (CLI)Basic Information:• Port type – Indicates the port type. (100BASE-TX, 1000BASE-T, or SFP)• MAC address –

Verwandte Modelle: 100BASE-TX

Kommentare zu diesen Handbüchern

Keine Kommentare