SMC Networks L2-Lite Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Software SMC Networks L2-Lite herunter. SMC Networks L2-Lite User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 614
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
MANAGEMENT GUIDE
ta
TigerSwitch
TM
10/100/1000
L2-Lite SMB PoE Gigabit Switch
SMC8126PL2-F
Seitenansicht 0
1 2 3 4 5 6 ... 613 614

Inhaltsverzeichnis

Seite 1 - MANAGEMENT GUIDE

MANAGEMENT GUIDEtaTigerSwitchTM 10/100/1000L2-Lite SMB PoE Gigabit SwitchSMC8126PL2-F

Seite 2

ContentsxSetting a Switch Power Budget 3-136Displaying Port Power Status 3-136Configuring Port PoE Power 3-137Address Table Settings 3-139Setting

Seite 3 - Management Guide

Configuring the Switch3-523Setting SNMPv3 Views SNMPv3 views are used to restrict user access to specified portions of the MIB tree. The predefined vi

Seite 4

Simple Network Management Protocol3-533CLI – Use the snmp-server view command to configure a new view. This example view includes the MIB-2 interfaces

Seite 5 - About This Guide

Configuring the Switch3-543User AuthenticationYou can configure this switch to authenticate users logging into the system for management access using

Seite 6

User Authentication3-553Web – Click Security, User Accounts. To configure a new user account, specify a user name, select the user’s access level, the

Seite 7

Configuring the Switch3-563Configuring Local/Remote Logon AuthenticationUse the Authentication Settings menu to restrict management access based on sp

Seite 8

User Authentication3-573Command Attributes• Authentication – Select the authentication, or authentication sequence required:- Local – User authenticat

Seite 9

Configuring the Switch3-583Web – Click Security, Authentication Settings. To configure local or remote authentication preferences, specify the authent

Seite 10

User Authentication3-593CLI – Specify all the required parameters to enable logon authentication.Configuring Encryption KeysThe Encryption Key feature

Seite 11

Configuring the Switch3-603- Confirm Secret Text String – Re-type the string entered in the previous field to ensure no errors were made. The switch w

Seite 12

User Authentication3-613AAA Authorization and AccountingThe Authentication, authorization, and accounting (AAA) feature provides the main framework fo

Seite 13

ContentsxiQuality of Service 3-200Configuring Quality of Service Parameters 3-201Configuring a Class Map 3-201Creating QoS Policies 3-204Attachi

Seite 14

Configuring the Switch3-623Configuring AAA RADIUS Group SettingsThe AAA RADIUS Group Settings screen defines the configured RADIUS servers to use for

Seite 15

User Authentication3-633Configuring AAA TACACS+ Group SettingsThe AAA TACACS+ Group Settings screen defines the configured TACACS+ servers to use for

Seite 16

Configuring the Switch3-643The group names “radius” and “tacacs+” specifies all configured RADIUS and TACACS+ hosts (see "Configuring Local/Remot

Seite 17

User Authentication3-653AAA Accounting UpdateThis feature sets the interval at which accounting updates are sent to accounting servers.Command Attribu

Seite 18

Configuring the Switch3-663AAA Accounting 802.1X Port SettingsThis feature applies the specified accounting method to an interface.Command Attributes•

Seite 19

User Authentication3-673AAA Accounting Exec Command PrivilegesThis feature specifies a method name to apply to commands entered at specific CLI privil

Seite 20

Configuring the Switch3-683AAA Accounting Exec SettingsThis feature specifies a method name to apply to console and Telnet connections.Command Attribu

Seite 21

User Authentication3-693Web – Click Security, AAA, Summary. Figure 3-43 AAA Accounting Summary

Seite 22 - Contents

Configuring the Switch3-703CLI – Use the following command to display the currently applied accounting methods, and registered users.Authorization Set

Seite 23

User Authentication3-713Web – Click Security, AAA, Authorization, Settings. To configure a new authorization method, specify a method name and a group

Seite 24

ContentsxiiPartial Keyword Lookup 4-5Negating the Effect of Commands 4-5Using Command History 4-5Understanding Command Modes 4-6Exec Commands 4-6

Seite 25

Configuring the Switch3-723CLI – Specify the authorization method to use for Console and Telnet interfaces.Authorization SummaryThe Authorization Summ

Seite 26

User Authentication3-733Configuring HTTPSYou can configure the switch to enable the Secure Hypertext Transfer Protocol (HTTPS) over the Secure Socket

Seite 27

Configuring the Switch3-743Web – Click Security, HTTPS Settings. Enable HTTPS and specify the port number, then click Apply.Figure 3-47 HTTPS Setting

Seite 28

User Authentication3-753Configuring the Secure Shell The Berkley-standard includes remote access tools originally designed for Unix systems. Some of t

Seite 29

Configuring the Switch3-7633. Import Client’s Public Key to the Switch – Use the copy tftp public-key command (4-25) to copy a file containing the pub

Seite 30

User Authentication3-773Authenticating SSH v2 Clientsa. The client first queries the switch to determine if DSA public key authentication using a pref

Seite 31 - Chapter 1: Introduction

Configuring the Switch3-783Web – Click Security, SSH, Host-Key Settings. Select the host-key type from the drop-down box, select the option to save th

Seite 32 - Introduction

User Authentication3-793Configuring the SSH ServerThe SSH server includes basic settings for authentication. Note:You must first generate the host key

Seite 33

Configuring the Switch3-803CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that t

Seite 34

User Authentication3-813TLS (Transport Layer Security), PEAP (Protected Extensible Authentication Protocol), or TTLS (Tunneled Transport Layer Securit

Seite 35

Contentsxiiispeed 4-38stopbits 4-38disconnect 4-39show line 4-39Event Logging Commands 4-40logging on 4-41logging history 4-42logging host 4-43l

Seite 36 - System Defaults

Configuring the Switch3-823CLI – This example shows the default global setting for 802.1X. Configuring 802.1X Global SettingsThe 802.1X protocol provi

Seite 37

User Authentication3-833Configuring Port Settings for 802.1XWhen 802.1X is enabled, you need to configure the parameters for the authentication proces

Seite 38

Configuring the Switch3-843Web – Click Security, 802.1X, Port Configuration. Modify the parameters required, and click Apply.Figure 3-52 802.1X Port

Seite 39 - Connecting to the Switch

User Authentication3-853CLI – This example sets the 802.1X parameters on port 2. For a description of the additional fields displayed in this example,

Seite 40 - Required Connections

Configuring the Switch3-863Displaying 802.1X StatisticsThis switch can display statistics for dot1x protocol exchanges for any port. Web – Select Secu

Seite 41 - Basic Configuration

User Authentication3-873CLI – This example displays the 802.1X statistics for port 4. Filtering IP Addresses for Management AccessYou create a list of

Seite 42 - Setting an IP Address

Configuring the Switch3-883Web – Click Security, IP Filter. Enter the IP addresses or range of addresses that are allowed management access to an inte

Seite 43 - Dynamic Configuration

General Security Measures3-893General Security Measures This switch supports many methods of segregating traffic for clients attached to each of the d

Seite 44 - Initial Configuration

Configuring the Switch3-903Configuring Port SecurityPort security is a feature that allows you to configure a switch port with one or more device MAC

Seite 45 - Trap Receivers

Access Control Lists3-913Web – Click Security, Port Security. Set the action to take when an invalid address is detected on a port, mark the checkbox

Seite 46 - Managing System Files

Contentsxivsnmp-server engine-id 4-68show snmp engine-id 4-69snmp-server view 4-69show snmp view 4-71snmp-server group 4-71show snmp group 4-73s

Seite 47 - Saving Configuration Settings

Configuring the Switch3-923• When an ACL is bound to an interface as an egress filter, all entries in the ACL must be deny rules. Otherwise, the bind

Seite 48

Access Control Lists3-933Configuring a Standard IP ACLCommand Attributes• Action – An ACL can contain any combination of permit or deny rules.• Addres

Seite 49 - Using the Web Interface

Configuring the Switch3-943Configuring an Extended IP ACLCommand Attributes• Action – An ACL can contain any combination of permit or deny rules.• Sou

Seite 50 - Home Page

Access Control Lists3-953Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (An

Seite 51 - Panel Display

Configuring the Switch3-963Configuring a MAC ACLUse this page to configure ACLs based on hardware addresses, packet format, and Ethernet type.Command

Seite 52 - Main Menu

Access Control Lists3-973Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (An

Seite 53

Configuring the Switch3-983Binding a Port to an Access Control ListAfter configuring the Access Control Lists (ACL), you can bind the ports that need

Seite 54

Access Control Lists3-993CLI – This example assigns an IP access list to port 1, and an IP access list to port 3.Filtering IP Addresses for Management

Seite 55

Configuring the Switch3-1003Web – Click Security, IP Filter. Enter the IP addresses or range of addresses that are allowed management access to an int

Seite 56

Access Control Lists3-1013DHCP SnoopingThe addresses assigned to DHCP clients on insecure ports can be carefully controlled using the dynamic bindings

Seite 57

ContentsxvWeb Server Commands 4-99ip http port 4-99ip http server 4-100ip http secure-server 4-100ip http secure-port 4-101Telnet Server Commands

Seite 58

Configuring the Switch3-1023- If a DHCP packet from a client passes the filtering criteria above, it will only be forwarded to trusted ports in the sa

Seite 59

Access Control Lists3-1033DHCP Snooping VLAN ConfigurationUse the DHCP Snooping VLAN Configuration page to enable or disable DHCP snooping on specific

Seite 60

Configuring the Switch3-1043Command Usage• DHCP Snooping (see 3-102) must be enabled for Option 82 information to be inserted into request packets.• W

Seite 61

Access Control Lists3-1053CLI – This example enables DHCP Snooping Information Option, and sets the policy as replace.DHCP Snooping Port Configuration

Seite 62

Configuring the Switch3-1063Web – Click DHCP Snooping, Port Configuration. Set any ports within the local network or firewall to trusted, and click Ap

Seite 63

Access Control Lists3-1073• IP Address Type – Indicates an IPv4 address type.• Lease Time (Seconds) – The time for which this IP address is leased to

Seite 64

Configuring the Switch3-1083Command Usage• Setting source guard mode to SIP (Source IP) or SIP-MAC (Source IP and MAC) enables this function on the se

Seite 65 - Manual Configuration

Access Control Lists3-1093Web – Click IP Source Guard, Port Configuration. Set the required filtering type for each port and click Apply. Figure 3-67

Seite 66 - Using DHCP/BOOTP

Configuring the Switch3-1103- If there is an entry with the same VLAN ID and MAC address, and the type of the entry is dynamic DHCP snooping binding,

Seite 67 - Enabling Jumbo Frames

Access Control Lists3-1113Displaying Information for Dynamic IP Source Guard BindingsUse the Dynamic Information page to display the source-guard bind

Seite 68 - Managing Firmware

Contentsxvishow network-access mac-address-table 4-130DHCP Snooping Commands 4-131ip dhcp snooping 4-132ip dhcp snooping vlan 4-133ip dhcp snoopin

Seite 69

Configuring the Switch3-1123Port ConfigurationDisplaying Connection StatusYou can use the Port Information or Trunk Information pages to display the c

Seite 70

Port Configuration3-1133Configuration:• Name – Interface label.• Port admin – Shows if the interface is enabled or disabled (i.e., up or down).•Speed-

Seite 71

Configuring the Switch3-1143CLI – This example shows the connection status for Port 5.Configuring Interface ConnectionsYou can use the Port Configurat

Seite 72 - Console Port Settings

Port Configuration3-1153problem has been resolved. You may also disable an interface for security reasons.• Speed/Duplex – Allows you to manually set

Seite 73

Configuring the Switch3-1163CLI – Select the interface, and then enter the required settings.Creating Trunk GroupsYou can create multiple links betwee

Seite 74 - Telnet Settings

Port Configuration3-1173• The ports at both ends of a trunk must be configured in an identical manner, including communication mode (i.e., speed, dupl

Seite 75

Configuring the Switch3-1183CLI – This example creates trunk 2 with ports 1 and 2. Just connect these ports to two static trunk ports on another switc

Seite 76 - Configuring Event Logging

Port Configuration3-1193Command Attributes • Member List (Current) – Shows configured trunks (Port).• New – Includes entry fields for creating new tru

Seite 77 - Remote Log Configuration

Configuring the Switch3-1203CLI – The following example enables LACP for ports 1 to 6. Just connect these ports to LACP-enabled trunk ports on another

Seite 78

Port Configuration3-1213- System priority is combined with the switch’s MAC address to form the LAG identifier. This identifier is used to indicate a

Seite 79 - Simple Mail Transfer Protocol

Contentsxviishow interfaces switchport 4-165Link Aggregation Commands 4-167channel-group 4-168lacp 4-169lacp system-priority 4-170lacp admin-key

Seite 80

Configuring the Switch3-1223CLI – The following example configures LACP parameters for ports 1-4. Ports 1-4 are used as active members of the LAG.Disp

Seite 81 - Renumbering the System

Port Configuration3-1233Web – Click Port, LACP, Port Counters Information. Select a member port to display the corresponding information.Figure 3-75

Seite 82 - Resetting the System

Configuring the Switch3-1243Displaying LACP Settings and Status for the Local SideYou can display configuration settings and the operational state for

Seite 83 - Setting the System Clock

Port Configuration3-1253Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 3-76

Seite 84 - Setting the Time Zone

Configuring the Switch3-1263Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state fo

Seite 85 - Console(config)#

Port Configuration3-1273CLI – The following example displays the LACP configuration settings and operational state for the remote side of port channel

Seite 86

Configuring the Switch3-1283Web – Click Port, Port/Trunk Broadcast Control. Set the threshold, mark the Enabled field for the desired interface and cl

Seite 87 - Enabling the SNMP Agent

Port Configuration3-1293Web – Click Port, Mirror Port Configuration. Specify the source port, the traffic type to be mirrored, and the monitor port, t

Seite 88

Configuring the Switch3-1303Web – Click Port, Rate Limit, Input/Output Port/Trunk Configuration. Enable the Rate Limit Status for the required interfa

Seite 89

Port Configuration3-1313Received Multicast Packets The number of packets, delivered by this sub-layer to a higher (sub-)layer, which were addressed to

Seite 90

Contentsxviiimst priority 4-203name 4-204revision 4-205max-hops 4-205spanning-tree spanning-disabled 4-206spanning-tree cost 4-206spanning-tree por

Seite 91 - Setting the Local Engine ID

Configuring the Switch3-1323Multiple Collision Frames A count of successfully transmitted frames for which transmission is inhibited by more than one

Seite 92 - Specifying a Remote Engine ID

Port Configuration3-1333Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at the

Seite 93 - Configuring SNMPv3 Users

Configuring the Switch3-1343Figure 3-81 Port StatisticsCLI – This example shows statistics for port 13.Power Over Ethernet SettingsThe switch can pro

Seite 94

Power Over Ethernet Settings3-1353power, if necessary by dropping power to ports set for a lower priority. If power is dropped to some low-priority po

Seite 95

Configuring the Switch3-1363Setting a Switch Power BudgetA maximum PoE power budget for the switch (power available to all switch ports) can be define

Seite 96

Power Over Ethernet Settings3-1373re-enabled when the overload condition is no longer detected on the port. (Default: Disabled)Web – Click PoE, Power

Seite 97 - Configuring SNMPv3 Groups

Configuring the Switch3-1383• If a device is connected to a critical or high-priority port and causes the switch to exceed its budget, port power is t

Seite 98

Address Table Settings3-1393Address Table SettingsSwitches store the addresses for all known devices. This information is used to pass traffic directl

Seite 99

Configuring the Switch3-1403Displaying the Address TableThe Dynamic Address Table contains the MAC addresses learned by monitoring the source address

Seite 100 - Setting SNMPv3 Views

Address Table Settings3-1413CLI – This example also displays the address table entries for port 1.Changing the Aging TimeYou can set the aging time fo

Seite 101

ContentsxixConfiguring Private VLANs 4-235private-vlan 4-236private vlan association 4-237switchport mode private-vlan 4-238switchport private-vlan

Seite 102 - User Authentication

Configuring the Switch3-1423Spanning Tree Algorithm Configuration The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, a

Seite 103

Spanning Tree Algorithm Configuration3-1433MSTP – MSTP When using STP or RSTP, it may be difficult to maintain a stable path between all VLAN members.

Seite 104

Configuring the Switch3-1443Once you specify the VLANs to include in a Multiple Spanning Tree Instance (MSTI), the protocol will automatically build a

Seite 105

Spanning Tree Algorithm Configuration3-1453These additional parameters are only displayed for the CLI:• Spanning tree mode – Specifies the type of spa

Seite 106

Configuring the Switch3-1463Web – Click Spanning Tree, STA, Information.Figure 3-89 Displaying Spanning Tree InformationCLI – This command displays g

Seite 107 - Configuring Encryption Keys

Spanning Tree Algorithm Configuration3-1473Configuring Global Settings for STAGlobal settings apply to the entire switch.Command Usage• Spanning Tree

Seite 108

Configuring the Switch3-1483• Priority – Bridge priority is used in selecting the root device, root port, and designated port. The device with the hig

Seite 109

Spanning Tree Algorithm Configuration3-1493• Transmission Limit – The maximum transmission rate for BPDUs is specified by setting the minimum interval

Seite 110

Configuring the Switch3-1503Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply.Figure 3-90 Configuring Sp

Seite 111 - Configuring AAA Accounting

Spanning Tree Algorithm Configuration3-1513CLI – This example enables Spanning Tree Protocol, sets the mode to RSTP, and then configures the STA and R

Seite 113 - AAA Accounting Update

ContentsxxIGMP Snooping Commands 4-266ip igmp snooping 4-267ip igmp snooping vlan static 4-267ip igmp snooping version 4-268ip igmp snooping leave

Seite 114

Configuring the Switch3-1523• Designated Port – The port priority and number of the port on the designated bridging device through which this switch m

Seite 115

Spanning Tree Algorithm Configuration3-1533These additional parameters are only displayed for the CLI:• Admin Status – Shows if this interface is enab

Seite 116 - AAA Accounting Summary

Configuring the Switch3-1543CLI – This example shows the STA attributes for port 5. Configuring Interface Settings for STAYou can configure RSTP and M

Seite 117

Spanning Tree Algorithm Configuration3-1553The following interface attributes can be configured:• Spanning Tree – Enables/disables STA on this interfa

Seite 118 - Authorization Settings

Configuring the Switch3-1563• Admin Link Type – The link type attached to this interface.- Point-to-Point – A connection to exactly one other bridge.-

Seite 119 - Authorization EXEC Settings

Spanning Tree Algorithm Configuration3-1573Web – Click Spanning Tree, STA, Port Configuration or Trunk Configuration. Modify the required attributes,

Seite 120 - Authorization Summary

Configuring the Switch3-1583Configuring Multiple Spanning TreesMSTP generates a unique spanning tree for each instance. This provides multiple pathway

Seite 121 - Configuring HTTPS

Spanning Tree Algorithm Configuration3-1593Web – Click Spanning Tree, MSTP, VLAN Configuration. Select an instance identifier from the list, set the i

Seite 122

Configuring the Switch3-1603CLI – This displays STA settings for instance 1, followed by settings for each port.Console#show spanning-tree mst 1 4-213

Seite 123

Spanning Tree Algorithm Configuration3-1613Displaying Interface Settings for MSTPThe MSTP Port Information and MSTP Trunk Information pages display th

Seite 124

Contentsxxiip default-gateway 4-298ip dhcp restart 4-299show ip interface 4-299show ip redirects 4-300ping 4-300Appendix A: Software Specificatio

Seite 125 - Generating the Host Key Pair

Configuring the Switch3-1623CLI – This displays STA settings for instance 0, followed by settings for each port. The settings for instance 0 are globa

Seite 126

Spanning Tree Algorithm Configuration3-1633Configuring Interface Settings for MSTPYou can configure the STA interface settings for an MST Instance usi

Seite 127 - Configuring the SSH Server

Configuring the Switch3-1643Web – Click Spanning Tree, MSTP, Port Configuration or Trunk Configuration. Enter the priority and path cost for an interf

Seite 128

VLAN Configuration3-1653This switch supports the following VLAN features:• Up to 255 VLANs based on the IEEE 802.1Q standard• Distributed VLAN learnin

Seite 129

Configuring the Switch3-1663Untagged VLANs – Untagged (or static) VLANs are typically used to reduce broadcast traffic and to increase security. A gro

Seite 130

VLAN Configuration3-1673Forwarding Tagged/Untagged FramesIf you want to create a small port-based VLAN for devices attached directly to a single switc

Seite 131

Configuring the Switch3-1683Displaying Basic VLAN InformationThe VLAN Basic Information page displays basic information on the VLAN type supported by

Seite 132

VLAN Configuration3-1693Displaying Current VLANsThe VLAN Current Table shows the current port members of each VLAN and whether or not the port support

Seite 133

Configuring the Switch3-1703• Name – Name of the VLAN (1 to 32 characters).• Status – Shows if this VLAN is enabled or disabled. - Active: VLAN is ope

Seite 134 - Displaying 802.1X Statistics

VLAN Configuration3-1713Web – Click VLAN, 802.1Q VLAN, Static List. To create a new VLAN, enter the VLAN ID and VLAN name, mark the Enable checkbox to

Seite 135

Contentsxxii

Seite 136

Configuring the Switch3-1723CLI – This example creates a new VLAN.Console(config)#vlan database 4-220Console(config-vlan)#vlan 2 name R&D media et

Seite 137 - General Security Measures

VLAN Configuration3-1733Adding Static Members to VLANs (VLAN Index)Use the VLAN Static Table to configure port members for the selected VLAN index. As

Seite 138 - Configuring Port Security

Configuring the Switch3-1743Web – Click VLAN, 802.1Q VLAN, Static Table. Select a VLAN ID from the scroll-down list. Modify the VLAN name and status i

Seite 139 - Access Control Lists

VLAN Configuration3-1753Adding Static Members to VLANs (Port Index)Use the VLAN Static Membership by Port menu to assign VLAN groups to the selected i

Seite 140 - Setting the ACL Name and Type

Configuring the Switch3-1763Configuring VLAN Behavior for InterfacesYou can configure VLAN behavior for specific interfaces, including the default VLA

Seite 141 - Configuring a Standard IP ACL

VLAN Configuration3-1773• GARP Leave Timer13 – The interval a port waits before leaving a VLAN group. This time should be set to more than twice the j

Seite 142

Configuring the Switch3-1783Configuring IEEE 802.1Q TunnelingIEEE 802.1Q Tunneling (QinQ) is designed for service providers carrying traffic for multi

Seite 143

VLAN Configuration3-1793customer’s network. The packet is sent as a normal IEEE 802.1Q-tagged frame, preserving the original VLAN numbers used in the

Seite 144 - Configuring a MAC ACL

Configuring the Switch3-1803Layer 2 Flow for Packets Coming into a Tunnel Uplink PortAn uplink port receives one of the following packets:• Untagged•

Seite 145

VLAN Configuration3-1813• Static trunk port groups are compatible with QinQ tunnel ports as long as the QinQ configuration is consistent within a trun

Seite 146

xxiiiTablesTable 1-1 Key Features 1-1Table 1-2 System Defaults 1-6Table 3-1 Configuration Options 3-3Table 3-2 Main Menu 3-4Table 3-3 Logging Leve

Seite 147

Configuring the Switch3-1823incoming frames containing that ethertype are assigned to the VLAN contained in the tag following the ethertype field, as

Seite 148

VLAN Configuration3-1833the attached client is using a nonstandard 2-byte ethertype to identify 802.1Q tagged frames (see "Displaying Basic VLAN

Seite 149 - DHCP Snooping

Configuring the Switch3-1843Configuring Private VLANs Private VLANs provide port-based security and isolation between ports within the assigned VLAN.

Seite 150 - DHCP Snooping Configuration

VLAN Configuration3-1853Configuring Uplink and Downlink PortsUse the Private VLAN Link Status page to set ports as downlink or uplink ports. Ports des

Seite 151

Configuring the Switch3-1863Command UsageTo configure protocol-based VLANs, follow these steps:1. First configure VLAN groups for the protocols you wa

Seite 152

VLAN Configuration3-1873CLI – This example creates protocol group 1 for Ethernet frames using the IP protocol, and group 2 for Ethernet frames using t

Seite 153

Configuring the Switch3-1883Web – Click VLAN, Protocol VLAN, Port Configuration.Figure 3-108 Protocol VLAN Port ConfigurationCLI – The following maps

Seite 154

Class of Service Configuration3-1893Class of Service ConfigurationClass of Service (CoS) allows you to specify which data packets have greater precede

Seite 155 - IP Source Guard

Configuring the Switch3-1903Command Attributes• Default Priority14 – The priority that is assigned to untagged frames received on the specified interf

Seite 156

Class of Service Configuration3-1913Mapping CoS Values to Egress QueuesThis switch processes Class of Service (CoS) priority tagged traffic by using f

Seite 157

TablesxxivTable 4-25 Authentication Commands 4-76Table 4-24 show snmp user - display description 4-76Table 4-26 User Access Commands 4-77Table 4-27

Seite 158

Configuring the Switch3-1923Web – Click Priority, Traffic Classes. Select a port or trunk for the current mapping of CoS values to output queues to be

Seite 159

Class of Service Configuration3-1933Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traf

Seite 160 - Port Configuration

Configuring the Switch3-1943Setting the Service Weight for Traffic ClassesThis switch uses the Weighted Round Robin (WRR) algorithm to determine the f

Seite 161

Class of Service Configuration3-1953Layer 3/4 Priority SettingsMapping Layer 3/4 Priorities to CoS ValuesThis switch supports several common methods o

Seite 162

Configuring the Switch3-1963Mapping IP PrecedenceThe Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight diff

Seite 163

Class of Service Configuration3-1973CLI – The following example globally enables IP Precedence service on the switch, maps IP Precedence value 1 to Co

Seite 164 - Creating Trunk Groups

Configuring the Switch3-1983Command Attributes• DSCP Priority Table – Shows the DSCP Priority to CoS map.• Class of Service Value – Maps a CoS value t

Seite 165

Class of Service Configuration3-1993Mapping IP Port PriorityYou can also map network applications to Class of Service values based on the IP port numb

Seite 166

Configuring the Switch3-2003CLI* – The following example globally enables IP Port Priority service on the switch, maps HTTP traffic on port 5 to CoS v

Seite 167

Quality of Service3-2013Configuring Quality of Service Parameters To create a service policy for a specific category or ingress traffic, follow these

Seite 168

TablesxxvTable 4-76 Priority Commands 4-244Table 4-77 Priority Commands (Layer 2) 4-244Table 4-78 Default CoS Values to Egress Queues 4-248Table 4-

Seite 169

Configuring the Switch3-2023Class Configuration• Class Name – Name of the class map. (Range: 1-16 characters)• Type – Only one match command is permit

Seite 170 - Displaying LACP Port Counters

Quality of Service3-2033Web – Click QoS, DiffServ, then click Add Class to create a new class, or Edit Rules to change the rules of an existing class.

Seite 171

Configuring the Switch3-2043Creating QoS PoliciesThis function creates a policy map that can be attached to multiple interfaces.Command Usage • To con

Seite 172

Quality of Service3-2053Policy Rule Settings- Class Settings -• Class Name – Name of class map.• Action – Shows the service provided to ingress traffi

Seite 173

Configuring the Switch3-2063Web – Click QoS, DiffServ, Policy Map to display the list of existing policy maps. To add a new policy map click Add Polic

Seite 174

Quality of Service3-2073CLI – This example creates a policy map called “rd-policy,” sets the average bandwidth the 1 Mbps, the burst rate to 1522 bps,

Seite 175

Configuring the Switch3-2083CLI - This example applies a service policy to an ingress interface.Multicast Filtering Multicasting is used to support re

Seite 176

Multicast Filtering3-2093Layer 2 IGMP (Snooping and Query)IGMP Snooping and Query – If multicast routing is not supported on other switches in your ne

Seite 177 - Configuring Rate Limits

Configuring the Switch3-2103Configuring IGMP Snooping and Query ParametersYou can configure the switch to forward multicast traffic intelligently. Bas

Seite 178 - Showing Port Statistics

Multicast Filtering3-2113• Act as IGMP Querier — When enabled, the switch can serve as the Querier, which is responsible for asking hosts if they want

Seite 179

Tablesxxvi

Seite 180

Configuring the Switch3-2123CLI – This example modifies the settings for multicast filtering, and then displays the current status.Enabling IGMP Immed

Seite 181

Multicast Filtering3-2133Command Attributes• VLAN ID – ID of configured VLAN (1-4094).• Immediate Leave – Sets the status for immediate leave on the s

Seite 182 - Power Over Ethernet Settings

Configuring the Switch3-2143Displaying Interfaces Attached to a Multicast RouterMulticast routers that are attached to ports on the switch use informa

Seite 183 - Switch Power Status

Multicast Filtering3-2153Specifying Static Interfaces for a Multicast RouterDepending on your network connections, IGMP snooping may not always be abl

Seite 184 - Displaying Port Power Status

Configuring the Switch3-2163Displaying Port Members of Multicast Services You can display the port members associated with a specified VLAN and multic

Seite 185 - Configuring Port PoE Power

Multicast Filtering3-2173Assigning Ports to Multicast Services Multicast filtering can be dynamically configured using IGMP Snooping and IGMP Query me

Seite 186

Configuring the Switch3-2183CLI – This example assigns a multicast address to VLAN 1, and then displays all the known multicast services supported on

Seite 187 - Address Table Settings

Multicast Filtering3-2193Web – Click IGMP Snooping, IGMP Filter Configuration. Create a profile number by entering the number in text box and clicking

Seite 188 - Displaying the Address Table

Configuring the Switch3-2203• Access Mode – Sets the access mode of the profile; either permit or deny. (Default: Deny)• New Multicast Address Range L

Seite 189 - Changing the Aging Time

Multicast Filtering3-2213CLI – This example configures profile number 19 by setting the access mode to “permit” and then specifying a range of multica

Seite 190

xxviiFiguresFigure 3-1 Home Page 3-2Figure 3-2 Panel Display 3-3Figure 3-3 System Information 3-12Figure 3-4 Switch Information 3-13Figure 3-5 Bri

Seite 191

Configuring the Switch3-2223Web – Click IGMP Snooping, IGMP Filter/Throttling Port Configuration or IGMP Filter/Throttling Trunk Configuration. Select

Seite 192

Multicast Filtering3-2233Multicast VLAN Registration Multicast VLAN Registration (MVR) is a protocol that controls access to a single network-wide VLA

Seite 193

Configuring the Switch3-2243Configuring Global MVR Settings The global settings for Multicast VLAN Registration (MVR) include enabling or disabling MV

Seite 194

Multicast Filtering3-2253Web – Click MVR, Configuration. Enable MVR globally on the switch, select the MVR VLAN, add the multicast groups that will st

Seite 195

Configuring the Switch3-2263Displaying MVR Interface Status You can display information about the interfaces attached to the MVR VLAN.Field Attributes

Seite 196

Multicast Filtering3-2273Displaying Port Members of Multicast GroupsYou can display the multicast groups assigned to the MVR VLAN either through IGMP

Seite 197

Configuring the Switch3-2283Configuring MVR Interface Status Each interface that participates in the MVR VLAN must be configured as an MVR source port

Seite 198

Multicast Filtering3-2293- Non-MVR – An interface that does not participate in the MVR VLAN. (This is the default type.)• Immediate Leave – Configures

Seite 199

Configuring the Switch3-2303Assigning Static Multicast Groups to InterfacesFor multicast streams that will run for a long term and be associated with

Seite 200

Configuring Domain Name Service3-2313Configuring Domain Name Service The Domain Naming System (DNS) service on this switch allows host names to be map

Seite 201

FiguresxxviiiFigure 3-43 AAA Accounting Summary 3-69Figure 3-44 AAA Authorization Settings 3-71Figure 3-45 AAA Authorization Exec Settings 3-71Figu

Seite 202

Configuring the Switch3-2323Web – Select DNS, General Configuration. Set the default domain name or list of domain names, specify one or more name ser

Seite 203

Configuring Domain Name Service3-2333Configuring Static DNS Host to Address EntriesYou can manually configure static entries in the DNS table that are

Seite 204

Configuring the Switch3-2343Web – Select DNS, Static Host Table. Enter a host name and one or more corresponding addresses, then click Apply.Figure 3-

Seite 205

Configuring Domain Name Service3-2353Displaying the DNS CacheYou can display entries in the DNS cache that have been learned via the designated name s

Seite 206

Configuring the Switch3-2363Switch ClusteringSwitch Clustering is a method of grouping switches together to enable centralized management through a si

Seite 207 - Console(config-mst)#

Switch Clustering3-2373• Cluster IP Pool – An “internal” IP address pool that is used to assign IP addresses to Member switches in the cluster. Intern

Seite 208

Configuring the Switch3-2383Cluster Member ConfigurationAdds Candidate switches to the cluster as Members. Command Attributes• Member ID – Specify a M

Seite 209

Switch Clustering3-2393Displaying Information on Cluster MembersUse the Cluster Member Information page to display information on current cluster Memb

Seite 210

Configuring the Switch3-2403Cluster Candidate InformationUse the Cluster Candidate Information page to display information about discovered switches i

Seite 211

4-1Chapter 4: Command Line InterfaceThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceAccessing the C

Seite 212 - VLAN Configuration

FiguresxxixFigure 3-88 Setting the Address Aging Time 3-141Figure 3-89 Displaying Spanning Tree Information 3-146Figure 3-90 Configuring Spanning Tr

Seite 213 - Assigning Ports to VLANs

Command Line Interface4-24Telnet ConnectionTelnet operates over the IP transport protocol. In this environment, your management station and any networ

Seite 214

Entering Commands4-34Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keywords and

Seite 215

Command Line Interface4-44Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for the curren

Seite 216

Entering Commands4-54The command “show interfaces ?” will display the following information:Partial Keyword LookupIf you terminate a partial keyword w

Seite 217 - Displaying Current VLANs

Command Line Interface4-64Understanding Command ModesThe command set is divided into Exec and Configuration classes. Exec commands generally display i

Seite 218 - Creating VLANs

Entering Commands4-74Configuration CommandsConfiguration commands are privileged level commands used to modify switch settings. These commands modify

Seite 219

Command Line Interface4-84To enter the other modes, at the configuration prompt type one of the following commands. Use the exit or end command to ret

Seite 220

Entering Commands4-94Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough

Seite 221

Command Line Interface4-104Command GroupsThe system commands can be broken down into the functional groups shown below.Table 4-4 Command GroupsComman

Seite 222

General Commands4-114The access mode shown in the following tables is indicated by these abbreviations: ACL (Access Control List Configuration) NE (No

Seite 223

20 MasonIrvine, CA 92618Phone: (949) 679-8000TigerSwitch 10/100/1000Management GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsAugus

Seite 224

FiguresxxxFigure 3-133 MVR Port Configuration 3-229Figure 3-134 MVR Group Member Configuration 3-230Figure 3-135 DNS General Configuration 3-232Fig

Seite 225

Command Line Interface4-124Command ModeNormal ExecCommand Usage • “super” is the default password required to change the command mode from Normal Exec

Seite 226

General Commands4-134Example Related Commands end (4-14)show historyThis command shows the contents of the command history buffer.Command Mode Normal

Seite 227

Command Line Interface4-144Command Mode Privileged ExecCommand Usage • This command resets the entire system.• When the system is restarted, it will a

Seite 228

General Commands4-154exitThis command returns to the previous configuration mode or exit the configuration program.Command Mode AnyExample This exampl

Seite 229

Command Line Interface4-164System Management CommandsThese commands are used to control system logs, passwords, user names, browser configuration opti

Seite 230

System Management Commands4-174Example System Status CommandsThis section describes commands used to display system information.show startup-configThi

Seite 231

Command Line Interface4-184Example Related Commandsshow running-config (4-18)show running-configThis command displays the configuration information c

Seite 232 - Enabling Private VLANs

System Management Commands4-194Command Usage • Use this command in conjunction with the show startup-config command to compare the information in runn

Seite 233 - Protocol VLANs

Command Line Interface4-204Example Related Commandsshow startup-config (4-17)Console#show running-configbuilding startup-config, please wait...!<

Seite 234

System Management Commands4-214show systemThis command displays system information.Command Mode Normal Exec, Privileged ExecCommand Usage • For a desc

Seite 235 - Mapping Protocols to VLANs

1-1Chapter 1: IntroductionThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to conf

Seite 236

Command Line Interface4-224Example show versionThis command displays hardware and software version information for the system.Command Mode Normal Exec

Seite 237 - Layer 2 Queue Settings

System Management Commands4-234Frame Size Commandsjumbo frameThis command enables support for jumbo frames. Use the no form to disable it.Syntax [no]

Seite 238

Command Line Interface4-244File Management CommandsManaging FirmwareFirmware can be uploaded and downloaded to or from an TFTP server. By saving run-t

Seite 239 - 15. CLI shows Queue ID

System Management Commands4-254copyThis command moves (upload/download) a code image or configuration file between the switch’s flash memory and a TFT

Seite 240

Command Line Interface4-264• The Boot ROM and Loader cannot be uploaded or downloaded from the TFTP server. You must follow the instructions in the re

Seite 241 - Selecting the Queue Mode

System Management Commands4-274The following example shows how to download a configuration file: This example shows how to copy a secure-site certific

Seite 242

Command Line Interface4-284deleteThis command deletes a file or image.Syntax delete filenamefilename - Name of the configuration file or image name.Co

Seite 243 - Layer 3/4 Priority Settings

System Management Commands4-294• File information is shown below:Example The following example shows how to display all file information:whichbootThis

Seite 244 - Mapping IP Precedence

Command Line Interface4-304boot systemThis command specifies the image used to start up the system.Syntax boot system {boot-rom| config | opcode}: fil

Seite 245 - Mapping DSCP Priority

System Management Commands4-314Line CommandsYou can access the onboard configuration program by attaching a VT100 compatible device to the server’s se

Seite 246

Introduction1-21Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Flow control eliminates t

Seite 247 - Mapping IP Port Priority

Command Line Interface4-324Command Usage Telnet is considered a virtual terminal connection and will be shown as “Vty” in screen displays such as show

Seite 248 - Quality of Service

System Management Commands4-334Example Related Commandsusername (4-77)password (4-33)passwordThis command specifies the password for a line. Use the n

Seite 249 - Configuring a Class Map

Command Line Interface4-344timeout login responseThis command sets the interval that the system waits for a user to log into the CLI. Use the no form

Seite 250

System Management Commands4-354Command Mode Line ConfigurationCommand Usage • If user input is detected within the timeout interval, the session is ke

Seite 251

Command Line Interface4-364Related Commandssilent-time (4-36)timeout login response (4-13)silent-timeThis command sets the amount of time the manageme

Seite 252 - Creating QoS Policies

System Management Commands4-374Command Usage The databits command can be used to mask the high bit on input from devices that generate 7 data bits wit

Seite 253

Command Line Interface4-384speedThis command sets the terminal line’s baud rate. This command sets both the transmit (to terminal) and receive (from t

Seite 254

System Management Commands4-394Example To specify 2 stop bits, enter this command:disconnectThis command terminates an SSH, Telnet, or console connect

Seite 255

Command Line Interface4-404Example To show all lines, enter this command:Event Logging Commands Console#show line Console Configuration: Password Thr

Seite 256 - Multicast Filtering

System Management Commands4-414logging onThis command controls logging of error messages, sending debug or error messages to switch memory. The no for

Seite 257

Description of Software Features1-31Port Configuration – You can manually configure the speed, duplex mode, and flow control used on specific ports, o

Seite 258

Command Line Interface4-424logging historyThis command limits syslog messages saved to switch memory based on severity. The no form returns the loggin

Seite 259

System Management Commands4-434logging hostThis command adds a syslog server host IP address that will receive logging messages. Use the no form to re

Seite 260 - Enabling IGMP Immediate Leave

Command Line Interface4-444logging trapThis command enables the logging of system messages to a remote server, or limits the syslog messages saved to

Seite 261

System Management Commands4-454Related Commandsshow logging (4-45)show loggingThis command displays the configuration settings for logging messages to

Seite 262

Command Line Interface4-464The following example displays settings for the trap function. Related Commandsshow logging sendmail (4-50)show logThis com

Seite 263

System Management Commands4-474ExampleThe following example shows sample messages stored in RAM.SMTP Alert CommandsThese commands configure SMTP event

Seite 264

Command Line Interface4-484Command Mode Global ConfigurationCommand Usage • You can specify up to three SMTP servers for event handing. However, you m

Seite 265

System Management Commands4-494logging sendmail source-emailThis command sets the email address used for the “From” field in alert messages. Use the n

Seite 266 - IGMP Filtering and Throttling

Command Line Interface4-504logging sendmailThis command enables SMTP event handling. Use the no form to disable this function.Syntax[no] logging sendm

Seite 267

System Management Commands4-514Time CommandsThe system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP). Maintain

Seite 268

Introduction1-41(CRC). This prevents bad frames from entering the network and wasting bandwidth.To avoid dropping frames on congested ports, the switc

Seite 269

Command Line Interface4-524Example Related Commandssntp server (4-52)sntp poll (4-53)show sntp (4-53)sntp serverThis command sets the IP address of th

Seite 270

System Management Commands4-534sntp pollThis command sets the interval between sending time requests when the switch is set to SNTP client mode. Use t

Seite 271 - Multicast VLAN Registration

Command Line Interface4-544clock timezoneThis command sets the time zone for the switch’s internal clock.Syntax clock timezone name hour hours minute

Seite 272

System Management Commands4-554calendar setThis command sets the system clock. It may be used if there is no time server on your network, or if you ha

Seite 273

Command Line Interface4-564Switch Cluster CommandsSwitch Clustering is a method of grouping switches together to enable centralized management through

Seite 274

System Management Commands4-574Command Usage • To create a switch cluster, first be sure that clustering is enabled on the switch (the default is enab

Seite 275

Command Line Interface4-584cluster ip-poolThis command sets the cluster IP address pool. Use the no form to reset to the default address.Syntax cluste

Seite 276

System Management Commands4-594Command Usage • The maximum number of cluster Members is 16.• The maximum number of switch Candidates is 100.Examplerco

Seite 277

Command Line Interface4-604show cluster membersThis command shows the current switch cluster members.Command Mode Privileged ExecExampleshow cluster c

Seite 278

SNMP Commands4-614SNMP CommandsControls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as

Seite 279

Description of Software Features1-51Traffic Prioritization – This switch prioritizes each packet based on the required level of service, using four pr

Seite 280

Command Line Interface4-624snmp-serverThis command enables the SNMPv3 engine and services for all management clients (i.e., versions 1, 2c, 3). Use th

Seite 281

SNMP Commands4-634Examplesnmp-server communityThis command defines the SNMP v1 and v2c community access string. Use the no form to remove the specifie

Seite 282

Command Line Interface4-644Command Mode Global ConfigurationExample snmp-server contactThis command sets the system contact string. Use the no form to

Seite 283 - Figure 3-137 DNS Cache

SNMP Commands4-654Example Related Commandssnmp-server contact (4-64)snmp-server host This command specifies the recipient of a Simple Network Manageme

Seite 284 - Switch Clustering

Command Line Interface4-664Command Usage • If you do not enter an snmp-server host command, no notifications are sent. In order to configure the switc

Seite 285

SNMP Commands4-674exist, and the switch will not authorize SNMP access for the host. However, if you specify a V3 host with the “noauth” option, an SN

Seite 286 - Cluster Member Configuration

Command Line Interface4-684Related Commandssnmp-server host (4-65)snmp-server engine-idThis command configures an identification string for the SNMPv3

Seite 287 - SMC8126PL2-F

SNMP Commands4-694Related Commandssnmp-server host (4-65)show snmp engine-idThis command shows the SNMP engine ID.Command Mode Privileged ExecExampleT

Seite 288 - Cluster Candidate Information

Command Line Interface4-704Command Usage • Views are used in the snmp-server group command to restrict user access to specified portions of the MIB tr

Seite 289 - Console Connection

SNMP Commands4-714show snmp viewThis command shows information on the SNMP views.Command Mode Privileged ExecExample snmp-server groupThis command add

Seite 290 - Telnet Connection

Introduction1-61System DefaultsThe switch’s system defaults are provided in the configuration file “Factory_Default_Config.cfg.” To reset the switch d

Seite 291 - Entering Commands

Command Line Interface4-724Default Setting • Default groups: public20 (read only), private21 (read/write)• readview - Every object belonging to the In

Seite 292 - Showing Commands

SNMP Commands4-734show snmp groupFour default groups are provided – SNMPv1 read-only access and read/write access, and SNMPv2c read-only access and re

Seite 293 - Using Command History

Command Line Interface4-744snmp-server userThis command adds a user to an SNMP group, restricting the user to a specific SNMP Read, Write, or Notify V

Seite 294 - Exec Commands

SNMP Commands4-754Command Usage • The SNMP engine ID is used to compute the authentication/privacy digests from the password. You should therefore con

Seite 295 - Configuration Commands

Command Line Interface4-764Authentication Commands You can configure this switch to authenticate users logging into the system for management access u

Seite 296 - Command Line Interface

Authentication Commands4-774User Account and Privilege Level CommandsThe basic commands required for management access are listed in this section. Thi

Seite 297 - Command Line Processing

Command Line Interface4-784Command Mode Global ConfigurationCommand Usage • Privilege level 0 provides access to a limited number of the commands whic

Seite 298 - Command Groups

Authentication Commands4-794Example Related Commandsenable (4-11)authentication enable (4-82)privilegeThis command assigns a privilege level to specif

Seite 299 - General Commands

Command Line Interface4-804Command Usage Due to system limitations in the current software, privilege commands (page 4-79) entered during the current

Seite 300

Authentication Commands4-814authentication loginThis command defines the login authentication method and precedence. Use the no form to restore the de

Seite 301

System Defaults1-71SNMP SNMP Agent EnabledCommunity Strings “public” (read only), “private” (read/write) Traps Authentication traps: enabledLink-up-do

Seite 302

Command Line Interface4-824authentication enableThis command defines the authentication method and precedence to use when changing from Exec command m

Seite 303

Authentication Commands4-834RADIUS ClientRemote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software run

Seite 304 - System Management Commands

Command Line Interface4-844Example radius-server portThis command sets the RADIUS server network port. Use the no form to restore the default.Syntax r

Seite 305 - System Status Commands

Authentication Commands4-854radius-server retransmitThis command sets the number of retries. Use the no form to restore the default.Syntax radius-serv

Seite 306

Command Line Interface4-864Example TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that us

Seite 307

Authentication Commands4-874tacacs-server hostThis command specifies the TACACS+ server. Use the no form to restore the default.Syntax [no] tacacs-ser

Seite 308

Command Line Interface4-884Example tacacs-server keyThis command sets the TACACS+ encryption key. Use the no form to restore the default.Syntax tacacs

Seite 309

Authentication Commands4-894tacacs-server timeoutThis command sets the interval between transmitting authentication requests to the TACACS+ server. Us

Seite 310

Command Line Interface4-904AAA CommandsThe Authentication, authorization, and accounting (AAA) feature provides the main framework for configuring acc

Seite 311 - Frame Size Commands

Authentication Commands4-914Example serverThis command adds a security server to an AAA server group. Use the no form to remove the associated server

Seite 312 - File Management Commands

Introduction1-81IP Settings IP Address DHCP assignedSubnet Mask 255.255.255.0Default Gateway 0.0.0.0DHCP Client: EnabledDNS Client/Proxy service: Disa

Seite 313

Command Line Interface4-924aaa accounting dot1xThis command enables the accounting of requested 802.1X services for network access. Use the no form to

Seite 314

Authentication Commands4-934aaa accounting execThis command enables the accounting of requested Exec services for network access. Use the no form to d

Seite 315

Command Line Interface4-944aaa accounting commandsThis command enables the accounting of Exec mode commands. Use the no form to disable the accounting

Seite 316

Authentication Commands4-954aaa accounting updateThis command enables the sending of periodic updates to the accounting server. Use the no form to dis

Seite 317

Command Line Interface4-964Example accounting execThis command applies an accounting method to local console or Telnet connections. Use the no form to

Seite 318

Authentication Commands4-974Command Mode Line ConfigurationExample aaa authorization execThis command enables the authorization for Exec access. Use t

Seite 319 - Line Commands

Command Line Interface4-984authorization execThis command applies an authorization method to local console or Telnet connections. Use the no form to d

Seite 320

Authentication Commands4-994Command ModePrivileged ExecExample Web Server CommandsThis section describes commands used to configure web browser manage

Seite 321

Command Line Interface4-1004ExampleRelated Commandsip http server (4-100)ip http serverThis command allows this device to be monitored or configured f

Seite 322

Authentication Commands4-1014• When you start HTTPS, the connection is established in this way:- The client authenticates the server using the server’

Seite 323

2-1Chapter 2: Initial ConfigurationConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent off

Seite 324

Command Line Interface4-1024Command Usage • You cannot configure the HTTP and HTTPS servers to use the same port. • If you change the HTTPS port numbe

Seite 325

Authentication Commands4-1034Secure Shell CommandsThis section describes the commands used to configure the SSH server. However, note that you also ne

Seite 326

Command Line Interface4-1044Otherwise, you need to manually create a known hosts file on the management station and place the host public key in it. A

Seite 327

Authentication Commands4-1054d) The client uses its private key to decrypt the challenge string, computes the MD5 checksum, and sends the checksum bac

Seite 328 - Event Logging Commands

Command Line Interface4-1064Related Commandsip ssh crypto host-key generate (4-108)show ssh (4-110)ip ssh timeoutThis command configures the timeout f

Seite 329

Authentication Commands4-1074Command Mode Global ConfigurationExample Related Commandsshow ip ssh (4-109)ip ssh server-key sizeThis command sets the S

Seite 330

Command Line Interface4-1084Example ip ssh crypto host-key generateThis command generates the host key pair (i.e., public and private). Syntax ip ssh

Seite 331

Authentication Commands4-1094Default Setting Clears both the DSA and RSA key.Command Mode Privileged ExecCommand Usage • This command clears the host

Seite 332

Command Line Interface4-1104Example show sshThis command displays the current SSH server connections.Command Mode Privileged ExecExample Console#show

Seite 333

Authentication Commands4-1114show public-keyThis command shows the public key for the specified user or for the host.Syntax show public-key [user [use

Seite 334

Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, n

Seite 335 - SMTP Alert Commands

Initial Configuration2-22• Configure up to 32 static or LACP trunks• Enable port mirroring• Set broadcast, multicast or unknown unicast storm control

Seite 336

Command Line Interface4-1124802.1X Port AuthenticationThe switch supports IEEE 802.1X (dot1x) port-based access control that prevents unauthorized acc

Seite 337

Authentication Commands4-1134dot1x defaultThis command sets all configurable dot1x global and port settings to their default values.Command ModeGlobal

Seite 338

Command Line Interface4-1144Defaultforce-authorizedCommand ModeInterface ConfigurationExampledot1x operation-modeThis command allows single or multipl

Seite 339 - Time Commands

Authentication Commands4-1154dot1x re-authenticateThis command forces re-authentication on all ports or a specific interface.Syntaxdot1x re-authentica

Seite 340

Command Line Interface4-1164Related Commandsdot1x timeout re-authperiod (4-116)dot1x timeout quiet-periodThis command sets the time that a switch port

Seite 341

Authentication Commands4-1174dot1x timeout tx-periodThis command sets the time that an interface on the switch waits during an authentication session

Seite 342

Command Line Interface4-1184Exampleshow dot1xThis command shows general port authentication related settings on the switch or a specific interface.Syn

Seite 343

Authentication Commands4-1194- max-req – Maximum number of times a port will retransmit an EAP request/identity packet to the client before it times o

Seite 344 - Switch Cluster Commands

Command Line Interface4-1204ExampleConsole#show dot1xGlobal 802.1X Parameters system-auth-control: enable802.1X Port SummaryPort Name Status

Seite 345

Authentication Commands4-1214Management IP Filter CommandsThis section describes commands used to configure IP management access to the switch.managem

Seite 346

Basic Configuration2-32Remote ConnectionsPrior to accessing the switch’s onboard agent via a network connection, you must first configure it with a va

Seite 347

Command Line Interface4-1224ExampleThis example restricts management access to the indicated addresses.show managementThis command displays the client

Seite 348

General Security Measures4-1234General Security MeasuresThis switch supports many methods of segregating traffic for clients attached to each of the d

Seite 349 - SNMP Commands

Command Line Interface4-1244Port Security CommandsThese commands can be used to enable port security on a port. When using port security, the switch s

Seite 350

General Security Measures4-1254Command Usage • If you enable port security, the switch stops learning new MAC addresses on the specified port when it

Seite 351

Command Line Interface4-1264Network Access (MAC Address Authentication)Network Access authentication controls access to the network by authenticating

Seite 352

General Security Measures4-1274Command Usage The maximum number of MAC addresses per port is 2048, and the maximum number of secure MAC addresses supp

Seite 353

Command Line Interface4-1284indicates untagged VLAN and “t” tagged VLAN. The “Tunnel-Type” attribute should be set to “VLAN,” and the “Tunnel-Medium-T

Seite 354

General Security Measures4-1294Examplemac-authentication max-mac-countUse this command to set the maximum number of MAC addresses that can be authenti

Seite 355

Command Line Interface4-1304Example show network-access mac-address-tableUse this command to display secure MAC address table entries.Syntaxshow netwo

Seite 356

General Security Measures4-1314Example DHCP Snooping CommandsDHCP snooping allows a switch to protect a network from rogue DHCP servers or other devic

Seite 357

Initial Configuration2-42Setting PasswordsNote: If this is your first time to log into the CLI program, you should define new passwords for both defau

Seite 358

Command Line Interface4-1324ip dhcp snoopingThis command enables DHCP snooping globally. Use the no form to restore the default setting.Syntax [no] ip

Seite 359

General Security Measures4-1334MAC address verification is enabled, then the packet will only be forwarded if the client’s hardware address stored in

Seite 360

Command Line Interface4-1344packet filtering will be performed on any untrusted ports within the VLAN as specified by the ip dhcp snooping trust comma

Seite 361

General Security Measures4-1354• Additional considerations when the switch itself is a DHCP client – The port(s) through which it submits a client req

Seite 362

Command Line Interface4-1364ip dhcp snooping information optionThis command enables the DHCP Option 82 information relay for the switch. Use the no fo

Seite 363

General Security Measures4-1374ip dhcp snooping information policyThis command sets the DHCP snooping information option policy for DHCP client packet

Seite 364 - Authentication Commands

Command Line Interface4-1384show ip dhcp snoopingThis command shows the DHCP snooping configuration settings.Command Mode Privileged ExecExampleshow i

Seite 365

General Security Measures4-1394IP Source Guard CommandsIP Source Guard is a security feature that filters IP traffic on network interfaces based on ma

Seite 366

Command Line Interface4-1404• When enabled, traffic is filtered based upon dynamic entries learned via DHCP snooping, or static addresses configured i

Seite 367

General Security Measures4-1414ip source-guard bindingThis command adds a static address to the source-guard binding table. Use the no form to remove

Seite 368 - Authentication Sequence

Basic Configuration2-52Before you can assign an IP address to the switch, you must obtain the following information from your network administrator:•

Seite 369

Command Line Interface4-1424Related Commands ip source-guard (4-139)ip dhcp snooping (4-132)ip dhcp snooping vlan (4-133)show ip source-guardThis comm

Seite 370

Access Control List Commands4-1434Access Control List CommandsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, pro

Seite 371 - RADIUS Client

Command Line Interface4-1444access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. Use the

Seite 372

Access Control List Commands4-1454permit, deny (Standard ACL) This command adds a rule to a Standard IP ACL. The rule sets a filter condition for pack

Seite 373

Command Line Interface4-1464permit, deny (Extended ACL) This command adds a rule to an Extended IP ACL. The rule sets a filter condition for packets w

Seite 374 - TACACS+ Client

Access Control List Commands4-1474Command Usage• All new rules are appended to the end of the list.• Address bitmasks are similar to a subnet mask, co

Seite 375

Command Line Interface4-1484Related Commandsaccess-list ip (4-144)show ip access-list This command displays the rules for configured IP ACLs.Syntaxsho

Seite 376

Access Control List Commands4-1494Example Related Commandsshow ip access-list (4-148)show ip access-groupThis command shows the ports assigned to IP A

Seite 377

Command Line Interface4-1504access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form to remove the s

Seite 378 - AAA Commands

Access Control List Commands4-1514[no] {permit | deny} untagged-eth2{any|hostsource | source address-bitmask} {any|hostdestination | destination addre

Seite 379

Initial Configuration2-624. If network connections are normally slow, type “ip dhcp restart” to re-start broadcasting service requests. Press <Ente

Seite 380

Command Line Interface4-1524Example This rule permits packets from any source MAC address to the destination address 00-e0-29-94-34-de where the Ether

Seite 381

Access Control List Commands4-1534Example Related Commandsshow mac access-list (4-152)show mac access-groupThis command shows the ports assigned to MA

Seite 382

Command Line Interface4-1544ACL Informationshow access-listThis command shows all ACLs and associated rules.Command ModePrivileged ExecExample show ac

Seite 383

Interface Commands4-1554Interface CommandsThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or

Seite 384

Command Line Interface4-1564Command Mode Global Configuration Example To specify port 24, enter the following command:descriptionThis command adds a d

Seite 385

Interface Commands4-1574Default Setting • Auto-negotiation is enabled by default. • When auto-negotiation is disabled, the default speed-duplex settin

Seite 386

Command Line Interface4-1584Command Usage • When auto-negotiation is enabled the switch will negotiate the best settings for a link based on the capab

Seite 387 - Web Server Commands

Interface Commands4-1594Command Usage When auto-negotiation is enabled with the negotiation command, the switch will negotiate the best settings for a

Seite 388

Command Line Interface4-1604• Avoid using flow control on a port connected to a hub unless it is actually required to solve a problem. Otherwise back

Seite 389

Interface Commands4-1614Default Setting All interfaces are enabled.Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage This com

Seite 390 - Telnet Server Commands

Basic Configuration2-72The default strings are:• public - with read-only access. Authorized management stations are only able to retrieve MIB objects.

Seite 391 - Secure Shell Commands

Command Line Interface4-1624Example The following shows how to configure broadcast storm control at 500 packets per second: clear countersThis command

Seite 392

Interface Commands4-1634show interfaces statusThis command displays the status for an interface.Syntax show interfaces status [interface]interface • e

Seite 393

Command Line Interface4-1644show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]interface •

Seite 394

Interface Commands4-1654show interfaces switchportThis command displays the administrative and operational status of the specified interfaces.Syntax s

Seite 395

Command Line Interface4-1664 Private-VLAN Mode: NONE Private-VLAN host-association: NONE Private-VLAN Mapping: NONE 802.1Q-tunnel

Seite 396

Link Aggregation Commands4-1674Link Aggregation CommandsPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth

Seite 397

Command Line Interface4-1684Dynamically Creating a Port Channel –Ports assigned to a common port channel must meet the following criteria:• Ports must

Seite 398

Link Aggregation Commands4-1694lacpThis command enables 802.3ad Link Aggregation Control Protocol (LACP) for the current interface. Use the no form to

Seite 399

Command Line Interface4-1704ExampleThe following shows LACP enabled on ports 11-13. Because LACP has also been enabled on the ports at the other end o

Seite 400 - 802.1X Port Authentication

Link Aggregation Commands4-1714Command Mode Interface Configuration (Ethernet)Command Usage • Port must be configured with the same system priority to

Seite 401

Initial Configuration2-82Configuring Access for SNMP Version 3 ClientsTo configure management access for SNMPv3 clients, you need to first create a vi

Seite 402

Command Line Interface4-1724• Once the remote side of a link has been established, LACP operational settings are already in use on that side. Configur

Seite 403

Link Aggregation Commands4-1734lacp port-priorityThis command configures LACP port priority. Use the no form to restore the default setting.Syntax lac

Seite 404

Command Line Interface4-1744show lacpThis command displays LACP information.Syntax show lacp [port-channel] {counters | internal | neighbors | sysid}•

Seite 405

Link Aggregation Commands4-1754Console#show lacp 1 internalPort channel : 1-------------------------------------------------------------------------Op

Seite 406

Command Line Interface4-1764Console#show lacp 1 neighborsPort channel 1 neighbors---------------------------------------------------------------------

Seite 407

Link Aggregation Commands4-1774Console#show lacp sysidPort Channel System Priority System MAC Address------------------------------------------

Seite 408

Command Line Interface4-1784Mirror Port CommandsThis section describes how to mirror traffic from a source port to a target port. port monitorThis com

Seite 409 - Management IP Filter Commands

Mirror Port Commands4-1794Example The following example configures the switch to mirror received packets from port 6 to 11:show port monitorThis comma

Seite 410

Command Line Interface4-1804RSPAN Mirroring CommandsRemote Switched Port Analyzer (RSPAN) allows you to mirror traffic from remote switches for analys

Seite 411

RSPAN Mirroring Commands4-1814has been configured, MAC address learning will still not be re-started on the RSPAN uplink ports. • IEEE 802.1X – RSPAN

Seite 412 - Port Security Commands

Managing System Files2-92Due to the size limit of the flash memory, the switch supports only two operation code files. However, you can have as many d

Seite 413

Command Line Interface4-1824• The source port and destination port cannot be configured on the same switch.Example The following example configures th

Seite 414

RSPAN Mirroring Commands4-1834Example The following example configures port 4 to receive mirrored RSPAN traffic:rspan remote vlanUse this command to s

Seite 415

Command Line Interface4-1844switchport allowed vlan command (page 4-226). Nor can GVRP dynamically add port members to an RSPAN VLAN. Also, note that

Seite 416

Rate Limit Commands4-1854Command Mode Privileged ExecExample Rate Limit CommandsThis function allows the network manager to control the maximum rate f

Seite 417

Command Line Interface4-1864Command Mode Interface Configuration (Ethernet, Port Channel)ExamplePower over Ethernet CommandsThe commands in this group

Seite 418

Power over Ethernet Commands4-1874Default Setting 375 wattsCommand Mode Global ConfigurationCommand Usage • Setting a maximum power budget for the swi

Seite 419 - DHCP Snooping Commands

Command Line Interface4-1884Example power inlineThis command instructs the switch to automatically detect if a PoE-compliant device is connected to th

Seite 420

Power over Ethernet Commands4-1894power inline maximum allocationThis command limits the power allocated to specific ports. Use the no form to restore

Seite 421

Command Line Interface4-1904Command Usage • If the power demand from devices connected to the switch exceeds the power budget setting, the switch uses

Seite 422

Power over Ethernet Commands4-1914show power inline statusThis command displays the current power status for all ports or for specific ports.Syntax sh

Seite 423

Initial Configuration2-102

Seite 424

Command Line Interface4-1924show power mainpowerUse this command to display the current power status for the switch.Command Mode Privileged ExecExampl

Seite 425

Power over Ethernet Commands4-1934mac-address-table staticThis command maps a static address to a destination port in a VLAN. Use the no form to remov

Seite 426

Command Line Interface4-1944clear mac-address-table dynamicThis command removes any learned entries from the forwarding database and clears the transm

Seite 427 - IP Source Guard Commands

Power over Ethernet Commands4-1954means to match a bit and “1” means to ignore a bit. For example, a mask of 00-00-00-00-00-00 means an exact match, a

Seite 428

Command Line Interface4-1964Spanning Tree CommandsThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the swi

Seite 429

Spanning Tree Commands4-1974spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Synta

Seite 430

Command Line Interface4-1984Command Usage • Spanning Tree ProtocolUses RSTP for the internal state machine, but sends only 802.1D BPDUs. - This create

Seite 431 - Access Control List Commands

Spanning Tree Commands4-1994Default Setting 15 secondsCommand Mode Global ConfigurationCommand Usage This command sets the maximum time (in seconds) t

Seite 432

Command Line Interface4-2004spanning-tree max-ageThis command configures the spanning tree bridge maximum age globally for this switch. Use the no for

Seite 433

Spanning Tree Commands4-2014Default Setting 32768Command Mode Global ConfigurationCommand Usage Bridge priority is used in selecting the root device,

Seite 434

3-1Chapter 3: Configuring the SwitchUsing the Web InterfaceThis switch provides an embedded HTTP web agent. Using a web browser you can configure the

Seite 435

Command Line Interface4-2024spanning-tree transmission-limitThis command configures the minimum interval between the transmission of consecutive RSTP/

Seite 436

Spanning Tree Commands4-2034mst vlanThis command adds VLANs to a spanning tree instance. Use the no form to remove the specified VLANs. Using the no f

Seite 437 - MAC ACLs

Command Line Interface4-2044Default Setting 32768Command Mode MST ConfigurationCommand Usage • MST priority is used in selecting the root bridge and a

Seite 438

Spanning Tree Commands4-2054revisionThis command configures the revision number for this multiple spanning tree configuration of this switch. Use the

Seite 439

Command Line Interface4-2064bridge decrements the hop count by one before passing on the BPDU. When the hop count reaches zero, the message is dropped

Seite 440

Spanning Tree Commands4-2074Default Setting By default, the system automatically detects the speed and duplex mode used on each port, and configures t

Seite 441

Command Line Interface4-2084spanning-tree port-priorityThis command configures the priority for the specified interface. Use the no form to restore th

Seite 442 - ACL Information

Spanning Tree Commands4-2094devices such as workstations or servers, retains the current forwarding database to reduce the amount of frame flooding re

Seite 443 - Interface Commands

Command Line Interface4-2104Related Commandsspanning-tree edge-port (4-208)spanning-tree link-typeThis command configures the link type for Rapid Span

Seite 444

Spanning Tree Commands4-2114spanning-tree mst costThis command configures the path cost on a spanning instance in the Multiple Spanning Tree. Use the

Seite 445

vAbout This GuidePurposeThis guide gives specific information on how to operate and use the management functions of the switch.AudienceThe guide is in

Seite 446

Configuring the Switch3-23Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and password. The a

Seite 447

Command Line Interface4-2124spanning-tree mst port-priorityThis command configures the interface priority on a spanning instance in the Multiple Spann

Seite 448

Spanning Tree Commands4-2134Command Usage If at any time the switch detects STP BPDUs, including Configuration or Topology Change Notification BPDUs,

Seite 449

Command Line Interface4-2144ExampleConsole#show spanning-treeSpanning-tree information---------------------------------------------------------------

Seite 450

VLAN Commands4-2154show spanning-tree mst configurationThis command shows the configuration of the multiple spanning tree.Command Mode Privileged Exec

Seite 451

Command Line Interface4-2164GVRP and Bridge Extension CommandsGARP VLAN Registration Protocol defines a way for switches to exchange VLAN information

Seite 452

VLAN Commands4-2174show bridge-extThis command shows the configuration for bridge extension commands.Default Setting NoneCommand Mode Privileged ExecC

Seite 453

Command Line Interface4-2184show gvrp configurationThis command shows if GVRP is enabled.Syntax show gvrp configuration [interface]interface • etherne

Seite 454

VLAN Commands4-2194Command Usage • Group Address Registration Protocol is used by GVRP and GMRP to register or deregister client attributes for client

Seite 455 - Link Aggregation Commands

Command Line Interface4-2204Related Commandsgarp timer (4-218)Editing VLAN Groupsvlan databaseThis command enters VLAN database mode. All commands in

Seite 456

VLAN Commands4-2214vlanThis command configures a VLAN. Use the no form to restore the default settings or delete a VLAN.Syntax vlan vlan-id [name vlan

Seite 457

Navigating the Web Browser Interface3-33Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration chang

Seite 458

Command Line Interface4-2224Configuring VLAN Interfacesinterface vlanThis command enters interface configuration mode for VLANs, which is used to conf

Seite 459

VLAN Commands4-2234switchport modeThis command configures the VLAN membership mode for a port. Use the no form to restore the default.Syntax switchpor

Seite 460

Command Line Interface4-2244switchport acceptable-frame-types This command configures the acceptable frame types for a port. Use the no form to restor

Seite 461

VLAN Commands4-2254• If ingress filtering is disabled and a port receives frames tagged for VLANs for which it is not a member, these frames will be f

Seite 462

Command Line Interface4-2264switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the defau

Seite 463

VLAN Commands4-2274switchport forbidden vlanThis command configures forbidden VLANs. Use the no form to remove the list of forbidden VLANs.Syntax swit

Seite 464

Command Line Interface4-2284Displaying VLAN Informationshow vlanThis command shows VLAN information.Syntax show vlan [id vlan-id | name vlan-name | pr

Seite 465

VLAN Commands4-2294Configuring IEEE 802.1Q TunnelingIEEE 802.1Q tunneling (QinQ tunneling) uses a single Service Provider VLAN (SPVLAN) for customers

Seite 466 - Mirror Port Commands

Command Line Interface4-2304reconfigured to overcome a break in the tree. It is therefore advisable to disable spanning tree on these ports.dot1q-tunn

Seite 467

VLAN Commands4-2314• When a tunnel uplink port receives a packet from a customer, the customer tag (regardless of whether there are one or more tag la

Seite 468 - RSPAN Mirroring Commands

Configuring the Switch3-43Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, o

Seite 469

Command Line Interface4-2324ExampleRelated Commandsshow interfaces switchport (4-165)show dot1q-tunnelThis command displays information about QinQ tun

Seite 470

VLAN Commands4-2334Configuring Port-based Traffic SegmentationIf tighter security is required for passing traffic from different clients through downl

Seite 471

Command Line Interface4-2344Examplepvlan up-link/down-linkThis command configures uplink/downlink ports for traffic-segmentation client sessions. Use

Seite 472

VLAN Commands4-2354ExampleConfiguring Private VLANsPrivate VLANs provide port-based security and isolation of local ports contained within different p

Seite 473 - Rate Limit Commands

Command Line Interface4-2364To configure primary/community associated groups, follow these steps:1. Use the private-vlan command to designate one or m

Seite 474 - Power over Ethernet Commands

VLAN Commands4-2374Exampleprivate vlan associationUse this command to associate a primary VLAN with a secondary (i.e., community) VLAN. Use the no for

Seite 475

Command Line Interface4-2384switchport mode private-vlanUse this command to set the private VLAN mode for an interface. Use the no form to restore the

Seite 476

VLAN Commands4-2394Command UsageAll ports assigned to a secondary (i.e., community) VLAN can pass traffic between group members, but must communicate

Seite 477

Command Line Interface4-2404Default Setting NoneCommand Mode Privileged Executive ExampleConfiguring Protocol-based VLANsThe network devices required

Seite 478

VLAN Commands4-2414Ethernet traffic must not be mapped to another VLAN or you will lose administrative network connectivity to the switch. If lost in

Seite 479

Navigating the Web Browser Interface3-53SNMPv3 3-43Engine ID Sets the SNMP v3 engine ID on this switch 3-43Remote Engine ID Sets the SNMP v3 engine ID

Seite 480 - Address Table Commands

Command Line Interface4-2424Default Setting No protocol groups are mapped for any interface.Command Mode Interface Configuration (Ethernet, Port Chann

Seite 481

VLAN Commands4-2434Example This shows protocol group 1 configured for IP over Ethernet:show interfaces protocol-vlan protocol-groupThis command shows

Seite 482

Command Line Interface4-2444Class of Service CommandsThe commands described in this section allow you to specify which data packets have greater prece

Seite 483

Class of Service Commands4-2454queue modeThis command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for the class of service (C

Seite 484 - Spanning Tree Commands

Command Line Interface4-2464Default Setting The priority is not set, and the default value for untagged frames received on the interface is zero.Comma

Seite 485 -

Class of Service Commands4-2474Default Setting Weights 1, 2, 4, 8 are assigned to queues 0-3 respectively.Command Mode Interface Configuration (Ethern

Seite 486

Command Line Interface4-2484Default Setting This switch supports Class of Service by using four priority queues, with Weighted Round Robin queuing for

Seite 487

Class of Service Commands4-2494show queue bandwidthThis command displays the weighted round-robin (WRR) bandwidth allocation for the four priority que

Seite 488

Command Line Interface4-2504Priority Commands (Layer 3 and 4) map ip port (Global Configuration)This command enables IP port mapping (i.e., class of s

Seite 489

Class of Service Commands4-2514map ip port (Interface Configuration)This command sets IP port priority (i.e., TCP/UDP port priority). Use the no form

Seite 490

Configuring the Switch3-63 802.1X Port authentication 3-80Information Displays global configuration settings 3-82Configuration Configures the global

Seite 491

Command Line Interface4-2524Example The following example shows how to enable IP precedence mapping globally:map ip precedence (Interface Configuratio

Seite 492

Class of Service Commands4-2534Default Setting DisabledCommand Mode Global ConfigurationCommand Usage The precedence for priority mapping is IP DSCP,

Seite 493

Command Line Interface4-2544Command Usage • The precedence for priority mapping is IP DSCP, and default switchport priority. • DSCP priority values ar

Seite 494

Class of Service Commands4-2554show map ip precedenceThis command shows the IP precedence priority map.Syntax show map ip precedence [interface]interf

Seite 495

Command Line Interface4-2564Command Mode Privileged ExecExample Related Commands map ip dscp (Global Configuration) (4-252)map ip dscp (Interface Conf

Seite 496

Quality of Service Commands4-2574Quality of Service CommandsThe commands described in this section are used to configure Differentiated Services (Diff

Seite 497

Command Line Interface4-25845. Use the set command to modify the QoS value for matching traffic class, and use the policer command to monitor the aver

Seite 498

Quality of Service Commands4-2594matchThis command defines the criteria used to classify traffic. Use the no form to delete the matching criteria.Synt

Seite 499

Command Line Interface4-2604renameThis command redefines the name of a class map or policy map.Syntax rename map-namemap-name - Name of the class map

Seite 500

Quality of Service Commands4-2614policy-mapThis command creates a policy map that can be attached to multiple interfaces, and enters Policy Map config

Seite 501

Navigating the Web Browser Interface3-73Power Config Configures the power budget for the switch 3-136Power Port Status Displays the status of port pow

Seite 502

Command Line Interface4-2624Command Mode Policy Map ConfigurationCommand Usage • Use the policy-map command to specify a policy map and enter Policy M

Seite 503 - VLAN Commands

Quality of Service Commands4-2634incoming packets will receive, and then uses the police command to limit the average bandwidth to 100,000 Kbps, the b

Seite 504

Command Line Interface4-2644service-policyThis command applies a policy map defined by the policy-map command to the ingress queue of a particular int

Seite 505

Quality of Service Commands4-2654Exampleshow policy-map This command displays the QoS policy maps which define classification criteria for incoming tr

Seite 506

Command Line Interface4-2664Command Mode Privileged ExecExample Multicast Filtering CommandsThis switch uses IGMP (Internet Group Management Protocol)

Seite 507

Multicast Filtering Commands4-2674ip igmp snoopingThis command enables IGMP snooping on this switch. Use the no form to disable it.Syntax [no] ip igmp

Seite 508 - Editing VLAN Groups

Command Line Interface4-2684ip igmp snooping versionThis command configures the IGMP snooping version. Use the no form to restore the default.Syntax i

Seite 509

Multicast Filtering Commands4-2694• The IGMP snooping leave-proxy feature suppresses all unnecessary IGMP leave messages so that the non-querier switc

Seite 510 - Configuring VLAN Interfaces

Command Line Interface4-2704ExampleThe following shows how to enable immediate leave. show ip igmp snoopingThis command shows the IGMP snooping config

Seite 511

Multicast Filtering Commands4-2714Command Mode Privileged ExecCommand Usage Member types displayed include IGMP or USER, depending on selected options

Seite 512

Configuring the Switch3-83Trunk Configuration Specifies default trunk VID and VLAN attributes 3-176Tunnel Port Configuration Adds ports to a QinQ tun

Seite 513

Command Line Interface4-2724Command Usage • IGMP snooping querier is not supported for IGMPv3 snooping (see ip igmp snooping version, page 4-268).• If

Seite 514

Multicast Filtering Commands4-2734ip igmp snooping query-intervalThis command configures the query interval. Use the no form to restore the default.Sy

Seite 515

Command Line Interface4-2744Example The following shows how to configure the maximum response time to 20 seconds:Related Commands ip igmp snooping ver

Seite 516 - Displaying VLAN Information

Multicast Filtering Commands4-2754Static Multicast Routing CommandsThis section describes commands used to configure static multicast routing on the s

Seite 517

Command Line Interface4-2764show ip igmp snooping mrouter This command displays information on statically configured and dynamically learned multicast

Seite 518

Multicast Filtering Commands4-2774IGMP Filtering and Throttling CommandsIn certain switch applications, the administrator may want to control the mult

Seite 519

Command Line Interface4-2784• The IGMP filtering feature operates in the same manner when MVR is used to forward multicast traffic.Example ip igmp pro

Seite 520

Multicast Filtering Commands4-2794• When the access mode is set to permit, IGMP join reports are processed when a multicast group falls within the con

Seite 521

Command Line Interface4-2804Command Mode Interface ConfigurationCommand Usage • The IGMP filtering profile must first be created with the ip igmp prof

Seite 522

Multicast Filtering Commands4-2814Example ip igmp max-groups actionThis command sets the IGMP throttling action for an interface on the switch. Syntax

Seite 523

Navigating the Web Browser Interface3-93IGMP Immediate Leave Enables the immediate leave function 3-212Multicast Router Port InformationDisplays the p

Seite 524

Command Line Interface4-2824Command Mode Privileged ExecExample show ip igmp profileThis command displays IGMP filtering profiles created on the switc

Seite 525

Multicast Filtering Commands4-2834show ip igmp throttle interfaceThis command displays the interface settings for IGMP throttling. Syntax show ip igmp

Seite 526

Command Line Interface4-2844Multicast VLAN Registration CommandsThis section describes commands used to configure Multicast VLAN Registration (MVR). A

Seite 527

Multicast Filtering Commands4-2854Command Mode Global ConfigurationCommand Usage • Use the mvr group command to statically configure all multicast gro

Seite 528

Command Line Interface4-2864mvr (Interface Configuration)This command configures an interface as an MVR receiver or source port using the type keyword

Seite 529

Multicast Filtering Commands4-2874• Immediate leave applies only to receiver ports. When enabled, the receiver port is immediately removed from the mu

Seite 530

Command Line Interface4-2884Default Setting Displays global configuration settings for MVR when no keywords are used.Command Mode Privileged ExecComma

Seite 531

Multicast Filtering Commands4-2894The following shows information about the interfaces associated with multicast groups assigned to the MVR VLAN:Statu

Seite 532 - Class of Service Commands

Command Line Interface4-2904Domain Name Service CommandsThese commands are used to configure Domain Naming System (DNS) services. Entries can be manua

Seite 533

Domain Name Service Commands4-2914Command Usage Servers or other network devices may support one or more connections via multiple IP addresses. If mor

Seite 534

Configuring the Switch3-103Binding Information Displays the DHCP Snooping binding information 3-106IP Source Guard 3-107Port Configuration Enables IP

Seite 535

Command Line Interface4-2924Default Setting NoneCommand Mode Global ConfigurationExampleRelated Commands ip domain-list (4-292)ip name-server (4-293)i

Seite 536

Domain Name Service Commands4-2934ExampleThis example adds two domain names to the current list and then displays the list.Related Commands ip domain-

Seite 537

Command Line Interface4-2944ExampleThis example adds two domain-name servers to the list and then displays the list.Related Commands ip domain-name (4

Seite 538

Domain Name Service Commands4-2954Related Commands ip domain-name (4-291)ip name-server (4-293)show hostsThis command displays the static host name-to

Seite 539

Command Line Interface4-2964show dns cacheThis command displays entries in the DNS cache.Command Mode Privileged ExecExample clear dns cacheThis comma

Seite 540

IP Interface Commands4-2974IP Interface CommandsAn IP addresses may be used for management access to the switch over your network. The IP address for

Seite 541

Command Line Interface4-2984• If you select the bootp or dhcp option, IP is enabled but will not function until a BOOTP or DHCP reply has been receive

Seite 542

IP Interface Commands4-2994Related Commands show ip redirects (4-300)ip dhcp restart This command submits a BOOTP or DHCP client request.Default Setti

Seite 543

Command Line Interface4-3004Related Commands show ip redirects (4-300)show ip redirectsThis command shows the default gateway configured for this devi

Seite 544

IP Interface Commands4-3014• Press <Esc> to stop pinging.Example Related Commands interface (4-155)Console#ping 10.1.0.9Type ESC to abort.PING t

Seite 545 - Quality of Service Commands

Basic Configuration3-113Basic ConfigurationThis section describes the basic functions required to set up management access to the switch, display or u

Seite 546

Command Line Interface4-3024

Seite 547

A-1Appendix A: Software SpecificationsSoftware FeaturesAuthentication and General Security MeasuresLocal, RADIUS, TACACS, Port (802.1X, MAC Authentica

Seite 548

Software SpecificationsA-2AMulticast Filtering IGMP Snooping (Layer 2)Multicast VLAN RegistrationQuality of ServiceDiffServ supports class maps, polic

Seite 549

Management Information BasesA-3ADHCP Client (RFC 2131)DHCP Options (RFC 2132)HTTPS IGMP (RFC 1112)IGMPv2 (RFC 2236)IGMPv3 (RFC 3376) - partial support

Seite 550

Software SpecificationsA-4ASNMP View Based ACM MIB (RFC 3415)TACACS+ Authentication Client MIBTCP MIB (RFC 2013)Trap (RFC 1215)UDP MIB (RFC 2013)

Seite 551

B-1Appendix B: Troubleshooting Problems Accessing the Management Interface Table B-1 Troubleshooting ChartSymptom ActionCannot connect using Telnet,

Seite 552

TroubleshootingB-2BUsing System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually caus

Seite 553

Glossary-1GlossaryAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Seite 554 - Multicast Filtering Commands

GlossaryGlossary-2DHCP SnoopingA technique used to enhance network security by snooping on DHCP server messages to track the physical location of host

Seite 555

Glossary-3GlossaryIEEE 802.1pAn IEEE standard for providing quality of service (QoS) in Ethernet networks. The standard uses packet tags that define u

Seite 557

Configuring the Switch3-123Web – Click System, System Information. Specify the system name, location, and contact information for the system administr

Seite 558

GlossaryGlossary-4IP Multicast FilteringA process whereby this switch can pass multicast traffic along to participating hosts.IP PrecedenceThe Type of

Seite 559 - IGMP Query Commands (Layer 2)

Glossary-5GlossaryMultiple Spanning Tree Protocol (MSTP)MSTP can provide an independent spanning tree for different VLANs. It simplifies network manag

Seite 560

GlossaryGlossary-6Remote Monitoring (RMON)RMON provides comprehensive network monitoring capabilities. It eliminates the polling required in standard

Seite 561

Glossary-7GlossaryTransmission Control Protocol/Internet Protocol (TCP/IP)Protocol suite that includes TCP as the primary transport protocol, and IP a

Seite 562

GlossaryGlossary-8

Seite 563

Index-1Numerics802.1Q tunnel 3-178, 4-229access 3-183, 4-230configuration, guidelines 3-181configuration, limitations 3-180description 3-178ethernet t

Seite 564

Index-2IndexDdefault gateway, configuration 3-16, 4-298default priority, ingress port 3-189, 4-245default settings, system 1-6DHCP 3-18, 4-297client 3

Seite 565

Index-3IndexIGMPfilter profiles, configuration 3-219, 4-277filter, parameters 3-219, 4-277filtering & throttling, creating profile 3-218, 4-278fil

Seite 566

Index-4IndexMSTP 3-158, 4-197configuring 3-158, 4-202–4-213global settings, configuring 3-147, 3-158, 4-196, 4-203–4-205global settings, displaying 3-

Seite 567

Index-5Indexproblems, troubleshooting B-1profiles, IGMP filter 3-219, 4-278promiscuous ports 4-235protocol migration 3-156, 4-212protocol VLANs 3-185,

Seite 568

Basic Configuration3-133Displaying Switch Hardware/Software Versions Use the Switch Information page to display hardware/firmware version numbers for

Seite 569

Index-6IndexSTA 3-142, 4-196edge port 3-153, 3-156, 4-208global settings, configuring 3-147, 4-197–4-202global settings, displaying 3-144, 4-213interf

Seite 570

Index-7IndexVVLANs 3-164, 3-185, 3-189, 4-215, 4-228802.1Q tunnel mode 3-183, 4-230adding static members 3-173, 3-175, 4-226creating 3-170, 4-221descr

Seite 571

Index-8Index

Seite 573

149100000023A R01SMC8126PL2-F

Seite 574

Configuring the Switch3-143CLI – Use the following command to display version information.Console#show version 4-22Unit 1Unit 1 Serial Number:

Seite 575

Basic Configuration3-153Displaying Bridge Extension CapabilitiesThe Bridge MIB includes extensions for managed devices that support Multicast Filterin

Seite 576

Configuring the Switch3-163CLI – Enter the following command. Setting the Switch’s IP Address This section describes how to configure an IP interface

Seite 577

Basic Configuration3-173Manual ConfigurationWeb – Click System, IP Configuration. Select the VLAN through which the management station is attached, se

Seite 578 - Domain Name Service Commands

Configuring the Switch3-183Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the switch to be dynamically configured by

Seite 579

Basic Configuration3-193Renewing DCHP – DHCP may lease addresses to clients indefinitely or for a specific period of time. If the address expires or t

Seite 580

Configuring the Switch3-203Managing FirmwareJust specify the method of file transfer, along with the file type and file names as required. By saving r

Seite 581

Basic Configuration3-213Web –Click System, File Management, Copy Operation. Select “tftp to file” as the file transfer method, enter the IP address of

Seite 582

viiContents Chapter 1: Introduction 1-1Key Features 1-1Description of Software Features 1-2System Defaults 1-6Chapter 2: Initial Configuration 2

Seite 583

Configuring the Switch3-223CLI – To download new firmware form a TFTP server, enter the IP address of the TFTP server, select “opcode” as the file typ

Seite 584

Basic Configuration3-233Downloading Configuration Settings from a ServerYou can download the configuration file under a new file name and then set it

Seite 585 - IP Interface Commands

Configuring the Switch3-243CLI – Enter the IP address of the TFTP server, specify the source file on the server, set the startup file name on the swit

Seite 586

Basic Configuration3-253• Speed – Sets the terminal line’s baud rate for transmit (to terminal) and receive (from terminal). Set the speed to match th

Seite 587

Configuring the Switch3-263CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the cur

Seite 588

Basic Configuration3-273• Password2 – Specifies a password for the line connection. When a connection is started on a line with password protection, t

Seite 589

Configuring the Switch3-283Configuring Event LoggingThe switch allows you to control the logging of error messages, including the type of events that

Seite 590

Basic Configuration3-293Web – Click System, Log, System Logs. Specify System Log Status, set the level of event messages to be logged to RAM and flash

Seite 591 - Software Features

Configuring the Switch3-303• Host IP Address – Specifies a new server IP address to add to the Host IP List.Web – Click System, Log, Remote Logs. To a

Seite 592 - Standards

Basic Configuration3-313Displaying Log MessagesThe Logs page allows you to scroll through the logged system and event messages. The switch can store u

Seite 593 - Management Information Bases

ContentsviiiSaving or Restoring Configuration Settings 3-22Downloading Configuration Settings from a Server 3-23Console Port Settings 3-24Telnet Se

Seite 594 - Software Specifications

Configuring the Switch3-323• SMTP Server – Specifies a new SMTP server address to add to the SMTP Server List.• Email Destination Address List – Speci

Seite 595 - Appendix B: Troubleshooting

Basic Configuration3-333CLI – Enter the IP address of at least one SMTP server, set the syslog severity level to trigger an email message, and specify

Seite 596 - Using System Logs

Configuring the Switch3-343CLI – Use the reload command to restart the switch. When prompted, confirm that you want to reset the switch.When restartin

Seite 597 - Glossary

Basic Configuration3-353Setting the System ClockSimple Network Time Protocol (SNTP) allows the switch to set its internal clock based on periodic upda

Seite 598

Configuring the Switch3-363Web – Select SNTP, Configuration. Modify any of the required parameters, and click Apply.Figure 3-22 SNTP ConfigurationCLI

Seite 599

Simple Network Management Protocol3-373Web – Select SNTP, Clock Time Zone. Set the offset for your time zone relative to the UTC, and click Apply.Figu

Seite 600

Configuring the Switch3-383Access to the switch using from clients using SNMPv3 provides additional security features that cover message integrity, au

Seite 601

Simple Network Management Protocol3-393Enabling the SNMP AgentEnables SNMPv3 service for all management clients (i.e., versions 1, 2c, 3).Command Attr

Seite 602

Configuring the Switch3-403Web – Click SNMP, Configuration. Add new community strings as required, select the access rights from the Access Mode drop-

Seite 603

Simple Network Management Protocol3-413To send an inform to a SNMPv2c host, complete these steps:1. Enable the SNMP agent (3-39).2. Enable trap inform

Seite 604 - Glossary-8

ContentsixGenerating the Host Key Pair 3-77Configuring the SSH Server 3-79Configuring 802.1X Port Authentication 3-80Displaying 802.1X Global Sett

Seite 605 - Numerics

Configuring the Switch3-423• Enable Authentication Traps3 – Issues a notification message to specified IP trap managers whenever an invalid community

Seite 606

Simple Network Management Protocol3-433Configuring SNMPv3 Management AccessTo configure SNMPv3 management access to the switch, follow these steps:1.

Seite 607

Configuring the Switch3-443Specifying a Remote Engine IDTo send inform messages to an SNMPv3 user on a remote device, you must first specify the engin

Seite 608

Simple Network Management Protocol3-453Configuring SNMPv3 Users Each SNMPv3 user is defined by a unique name. Users must be configured with a specific

Seite 609

Configuring the Switch3-463Web – Click SNMP, SNMPv3, Users. Click New to configure a user name. In the New User page, define a name and assign it to a

Seite 610

Simple Network Management Protocol3-473Configuring Remote SNMPv3 Users Each SNMPv3 user is defined by a unique name. Users must be configured with a s

Seite 611

Configuring the Switch3-483Web – Click SNMP, SNMPv3, Remote Users. Click New to configure a user name. In the New User page, define a name and assign

Seite 612

Simple Network Management Protocol3-493Configuring SNMPv3 Groups An SNMPv3 group sets the access policy for its assigned users, restricting them to sp

Seite 613

Configuring the Switch3-503linkDown*1.3.6.1.6.3.1.1.5.3 A linkDown trap signifies that the SNMP entity, acting in an agent role, has detected that the

Seite 614

Simple Network Management Protocol3-513Web – Click SNMP, SNMPv3, Groups. Click New to configure a new group. In the New Group page, define a name, ass

Kommentare zu diesen Handbüchern

Keine Kommentare