SMC Networks TigerAccess SMC7816M Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Software SMC Networks TigerAccess SMC7816M herunter. SMC Networks TigerAccess SMC7816M User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 962
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
TigerAccess
EE
6-Band VDSL2 Switch
16 VDSL Downlink Ports (1 RJ-21 Connector)
2 Gigabit Ethernet Combination Ports (RJ-45/SFP)
1 Fast Ethernet Management Port (RJ-45)
Non-blocking switching architecture
Spanning Tree Protocol, RSTP, and MSTP
Up to 12 LACP or static 8-port trunks
Layer 2/3/4 CoS support through eight priority queues
Layer 3/4 traffic priority with IP Precedence and IP DSCP
Full support for VLANs with GVRP
IGMP multicast filtering and snooping
Manageable via console, Web, SNMP/RMON
Security features: ACL, RADIUS, 802.1x
VDSL line configuration using Long-Reach Ethernet
(LRE) commands, line profiles, and alarm profiles
Management Guide
SMC7816M/VSW
Seitenansicht 0
1 2 3 4 5 6 ... 961 962

Inhaltsverzeichnis

Seite 1 - TigerAccess

TigerAccess™ EE6-Band VDSL2 Switch◆ 16 VDSL Downlink Ports (1 RJ-21 Connector)◆ 2 Gigabit Ethernet Combination Ports (RJ-45/SFP)◆ 1 Fast Ethernet Mana

Seite 2

TABLE OF CONTENTSx9 Port Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1Displaying Connection Status . . . . . . . . . .

Seite 3 - Management Guide

BASIC MANAGEMENT TASKS4-18Downloading System Software from a Server When downloading runtime code, you can specify the destination file name to replac

Seite 4 - Trademarks:

MANAGING FIRMWARE4-19If you download to a new destination file, go to the File Management, Set Start-Up menu, mark the operation code file used at sta

Seite 5

BASIC MANAGEMENT TASKS4-20To start the new firmware, enter the “reload” command or reboot the system.Saving or Restoring Configuration SettingsYou can

Seite 6

SAVING OR RESTORING CONFIGURATION SETTINGS4-21- running-config to file – Copies the running configuration to a file.- running-config to startup-config

Seite 7

BASIC MANAGEMENT TASKS4-22Downloading Configuration Settings from a ServerYou can download the configuration file under a new file name and then set i

Seite 8

SAVING OR RESTORING CONFIGURATION SETTINGS4-23If you download to a new file name using “tftp to startup-config” or “tftp to file,” the file is automat

Seite 9

BASIC MANAGEMENT TASKS4-24Console Port SettingsYou can access the onboard configuration program by attaching a VT100 compatible device to the switch’s

Seite 10

CONSOLE PORT SETTINGS4-25device connected to the serial port. (Range: 9600, 19200, 38400, 57600, or 115200 baud, Auto; Default: Auto)• Stop Bits – Set

Seite 11

BASIC MANAGEMENT TASKS4-26CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the curr

Seite 12

TELNET SETTINGS4-27• Login Timeout – Sets the interval that the system waits for a user to log into the CLI. If a login attempt is not detected within

Seite 13

TABLE OF CONTENTSxiConfiguring Interface Settings for MSTP . . . . . . . . . . . . . . . . . . . . . . 12-2713 VLAN Configuration . . . . . . . . .

Seite 14

BASIC MANAGEMENT TASKS4-28Web – Click System, Line, Telnet. Specify the connection parameters for Telnet access, then click Apply.Figure 4-14 Configu

Seite 15

CONFIGURING EVENT LOGGING4-29Configuring Event LoggingThe switch allows you to control the logging of error messages, including the type of events tha

Seite 16

BASIC MANAGEMENT TASKS4-30• RAM Level – Limits log messages saved to the switch’s temporary RAM memory for all levels up to the specified level. For e

Seite 17

CONFIGURING EVENT LOGGING4-31CLI – Enable system logging and then specify the level of messages to be logged to RAM and flash memory. Use the show log

Seite 18

BASIC MANAGEMENT TASKS4-32• Host IP Address – Specifies a new server IP address to add to the Host IP List.Web – Click System, Logs, Remote Logs. To a

Seite 19

CONFIGURING EVENT LOGGING4-33CLI – Enter the syslog server host IP address, choose the facility type and set the logging trap.Displaying Log MessagesU

Seite 20

BASIC MANAGEMENT TASKS4-34CLI – This example shows the event message stored in RAM.Sending Simple Mail Transfer Protocol AlertsTo alert system adminis

Seite 21

CONFIGURING EVENT LOGGING4-35Web – Click System, Log, SMTP. Enable SMTP, specify a source email address, and select the minimum severity level. To add

Seite 22

BASIC MANAGEMENT TASKS4-36CLI – Enter the IP address of at least one SMTP server, set the syslog severity level to trigger an email message, and speci

Seite 23

SETTING THE SYSTEM CLOCK4-37CLI – Use the reload command to restart the switch.Note: When restarting the system, it will always run the Power-On Self-

Seite 24

TABLE OF CONTENTSxii15 Quality of Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-1Configuring Quality of Service Parameters .

Seite 25

BASIC MANAGEMENT TASKS4-38• SNTP Server – Sets the IP address for up to three time servers. The switch attempts to update the time from the first serv

Seite 26

SETTING THE SYSTEM CLOCK4-39Setting the Time ZoneSNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based on the time

Seite 27

BASIC MANAGEMENT TASKS4-40

Seite 28

5-1CHAPTER 5SIMPLE NETWORKMANAGEMENT PROTOCOLSimple Network Management Protocol (SNMP) is a communication protocol designed specifically for managing

Seite 29

SIMPLE NETWORK MANAGEMENT PROTOCOL5-2Access to the switch using from clients using SNMPv3 provides additional security features that cover message int

Seite 30

5-3Note: The predefined default groups and view can be deleted from the system. You can then define customized groups and views for the SNMP clients t

Seite 31

SIMPLE NETWORK MANAGEMENT PROTOCOL5-4Enabling the SNMP AgentEnables SNMPv3 service for all management clients (i.e., versions 1, 2c, 3). Command Attri

Seite 32

SETTING COMMUNITY ACCESS STRINGS5-5• Community String – A community string that acts like a password and permits access to the SNMP protocol. Default

Seite 33

SIMPLE NETWORK MANAGEMENT PROTOCOL5-6Specifying Trap Managers and Trap TypesTraps indicating status changes are issued by the switch to specified trap

Seite 34

SPECIFYING TRAP MANAGERS AND TRAP TYPES5-7To send an inform to a SNMPv3 host, complete these steps:1. Enable the SNMP agent (page 5-4).2. Enable trap

Seite 35

TABLE OF CONTENTSxiiiConsole Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-1Telnet Connection . . . . . . . . .

Seite 36

SIMPLE NETWORK MANAGEMENT PROTOCOL5-8• Trap Inform – Notifications are sent as inform messages. Note that this option is only available for version 2c

Seite 37

SPECIFYING TRAP MANAGERS AND TRAP TYPES5-9Web – Click SNMP, Configuration. Enter the IP address and community string for each management station that

Seite 38

SIMPLE NETWORK MANAGEMENT PROTOCOL5-10Configuring SNMPv3 Management AccessTo configure SNMPv3 management access to the switch, follow these steps:1. I

Seite 39 - NTRODUCTION

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-11Web – Click SNMP, SNMPv3, Engine ID. Enter an ID of up to 26 hexadecimal characters and then click Save.Figure

Seite 40

SIMPLE NETWORK MANAGEMENT PROTOCOL5-12Web – Click SNMP, SNMPv3, Remote Engine ID. Enter an ID of up to 26 hexadecimal characters and then click Save.F

Seite 41

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-13- AuthPriv – SNMP communications use both authentication and encryption (only available for the SNMPv3 securit

Seite 42 - ESCRIPTION

SIMPLE NETWORK MANAGEMENT PROTOCOL5-14Web – Click SNMP, SNMPv3, Users. Click New to configure a user name. In the New User page, define a name and ass

Seite 43

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-15CLI – Use the snmp-server user command to configure a new user name and assign it to a group.Configuring Remot

Seite 44

SIMPLE NETWORK MANAGEMENT PROTOCOL5-16• Security Model – The user security model; SNMP v1, v2c or v3. (Default: v1)• Security Level – The security lev

Seite 45

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-17Web – Click SNMP, SNMPv3, Remote Users. Click New to configure a user name. In the New User page, define a nam

Seite 46

TABLE OF CONTENTSxivshow bme version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-10show cpu utilization . . . . . . . .

Seite 47 - System Defaults

SIMPLE NETWORK MANAGEMENT PROTOCOL5-18CLI – Use the snmp-server user command to configure a new user name and assign it to a group.Configuring SNMPv3

Seite 48

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-19• Notify View – The configured view for notifications. (Range: 1-64 characters)Table 5-2 Supported Notificati

Seite 49

SIMPLE NETWORK MANAGEMENT PROTOCOL5-20linkDown*1.3.6.1.6.3.1.1.5.3 A linkDown trap signifies that the SNMP entity, acting in an agent role, has detect

Seite 50

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-21RMON Events (V2)risingAlarm 1.3.6.1.2.1.16.0.1 The SNMP trap that is generated when an alarm entry crosses its

Seite 51

SIMPLE NETWORK MANAGEMENT PROTOCOL5-22swThermalRising Notification1.3.6.1.4.1.202.40.2.6.2.1.0.58 This trap is sent when the temperature exceeds the s

Seite 52 - ONNECTING

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-23Web – Click SNMP, SNMPv3, Groups. Click New to configure a new group. In the New Group page, define a name, as

Seite 53

SIMPLE NETWORK MANAGEMENT PROTOCOL5-24CLI – Use the snmp-server group command to configure a new group, specifying the security model and level, and r

Seite 54 - Basic Configuration

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-25Web – Click SNMP, SNMPv3, Views. Click New to configure a new view. In the New View page, define a name and sp

Seite 55 - Setting Passwords

SIMPLE NETWORK MANAGEMENT PROTOCOL5-26CLI – Use the snmp-server view command to configure a new view. This example view includes the MIB-2 interfaces

Seite 56 - Setting an IP Address

6-1CHAPTER 6USER AUTHENTICATIONYou can configure this switch to authenticate users logging into the system for management access using local or remote

Seite 57

TABLE OF CONTENTSxvSMTP Alert Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-48logging sendmail host . . . . . .

Seite 58 - Manual Configuration

USER AUTHENTICATION6-2The default guest name is “guest” with the password “guest.” The default administrator name is “admin” with the password “admin.

Seite 59 - Dynamic Configuration

CONFIGURING LOCAL/REMOTE LOGON AUTHENTICATION6-3CLI – Assign a user name to access-level 15 (i.e., administrator), then specify the password.Configuri

Seite 60

USER AUTHENTICATION6-4Command Usage• By default, management access is always checked against the authentication database stored on the local switch. I

Seite 61

CONFIGURING LOCAL/REMOTE LOGON AUTHENTICATION6-5- ServerIndex – Specifies one of five RADIUS servers that may be configured. The switch attempts authe

Seite 62 - Trap Receivers

USER AUTHENTICATION6-6Web – Click Security, Authentication Settings. To configure local or remote authentication preferences, specify the authenticati

Seite 63

CONFIGURING HTTPS6-7Configuring HTTPSYou can configure the switch to enable the Secure Hypertext Transfer Protocol (HTTPS) over the Secure Socket Laye

Seite 64 - Managing System Files

USER AUTHENTICATION6-8• The following web browsers and operating systems currently support HTTPS:• To specify a secure-site certificate, see “Replacin

Seite 65 - Saving Configuration Settings

CONFIGURING HTTPS6-9Replacing the Default Secure-site CertificateWhen you log onto the web interface using HTTPS (for secure access), a Secure Sockets

Seite 66

USER AUTHENTICATION6-10Configuring the Secure Shell The Berkley-standard includes remote access tools originally designed for Unix systems. Some of th

Seite 67

CONFIGURING THE SECURE SHELL6-11To use the SSH server, complete these steps:1. Generate a Host Key Pair – On the SSH Host Key Settings page, create a

Seite 68

TABLE OF CONTENTSxviAuthentication Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-5authentication login . . .

Seite 69

USER AUTHENTICATION6-126. Authentication – One of the following authentication methods is employed:Password Authentication (for SSH v1.5 or V2 Clients

Seite 70

CONFIGURING THE SECURE SHELL6-13Authenticating SSH v2 Clientsa. The client first queries the switch to determine if DSA public key authentication usin

Seite 71 - AVIGATING

USER AUTHENTICATION6-14• Host-Key Type – The key type used to generate the host key pair (i.e., public and private keys). (Range: RSA, DSA, Both: Defa

Seite 72 - Button Action

CONFIGURING THE SECURE SHELL6-15Web – Click Security, SSH, Host-Key Settings. Select the host-key type from the drop-down box, select the option to sa

Seite 73 - Table 3-2 Switch Main Menu

USER AUTHENTICATION6-16CLI – This example generates a host-key pair using both the RSA and DSA algorithms, stores the keys to flash memory, and then d

Seite 74

CONFIGURING THE SECURE SHELL6-17• SSH Authentication Retries – Specifies the number of authentication attempts that a client is allowed before authent

Seite 75

USER AUTHENTICATION6-18CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that the a

Seite 76

CONFIGURING 802.1X PORT AUTHENTICATION6-19Configuring 802.1X Port Authentication Network switches can provide open and easy access to network resource

Seite 77

USER AUTHENTICATION6-20releases. The client responds to the appropriate method with its credentials, such as a password or certificate. The RADIUS ser

Seite 78

CONFIGURING 802.1X PORT AUTHENTICATION6-21Displaying 802.1X Global SettingsThe 802.1X protocol provides port authentication. Command Attributes 802.1X

Seite 79

TABLE OF CONTENTSxviidot1x max-req . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-36dot1x port-control . . . . . .

Seite 80

USER AUTHENTICATION6-22Configuring 802.1X Global SettingsThe 802.1X protocol provides port authentication. The 802.1X protocol must be enabled globall

Seite 81

CONFIGURING 802.1X PORT AUTHENTICATION6-23Configuring Port Settings for 802.1XWhen 802.1X is enabled, you need to configure the parameters for the aut

Seite 82

USER AUTHENTICATION6-24• Re-authentication Period – Sets the time period after which a connected client must be re-authenticated. (Range: 1-65535 seco

Seite 83

CONFIGURING 802.1X PORT AUTHENTICATION6-25CLI – This example sets the 802.1X parameters on port 2. For a description of the additional fields displaye

Seite 84

USER AUTHENTICATION6-26Displaying 802.1X StatisticsThis switch can display statistics for dot1x protocol exchanges for any port. Reauthentication Stat

Seite 85

CONFIGURING 802.1X PORT AUTHENTICATION6-27Web – Select Security, 802.1X, Statistics. Select the required port and then click Query. Click Refresh to u

Seite 86

USER AUTHENTICATION6-28Filtering IP Addresses for Management AccessYou can create a list of up to 16 IP addresses or IP address groups that are allowe

Seite 87

FILTERING IP ADDRESSES FOR MANAGEMENT ACCESS6-29Web – Click Security, IP Filter. Enter the IP addresses or range of addresses that are allowed managem

Seite 88

USER AUTHENTICATION6-30

Seite 89

7-1CHAPTER 7CLIENT SECURITYThis switch supports many methods of segregating traffic for clients attached to each of the data ports, and for ensuring t

Seite 90

TABLE OF CONTENTSxviii24 Access Control List Commands . . . . . . . . . . . . . . . . . 24-1IP ACLs . . . . . . . . . . . . . . . . . . . . . . . .

Seite 91

CLIENT SECURITY7-2This switch provides client security using the following options:• Private VLANs – Provide port-based security and isolation between

Seite 92

CONFIGURING PORT SECURITY7-3To use port security, specify a maximum number of addresses to allow on the port and then let the switch dynamically learn

Seite 93

CLIENT SECURITY7-4• Max MAC Count – The maximum number of MAC addresses that can be learned on a port. (Range: 0 - 1024, where 0 means disabled)• Trun

Seite 94

CONFIGURING IP SOURCE GUARD7-5Configuring IP Source GuardIP Source Guard is a security feature that filters IP traffic on unsecure network interfaces

Seite 95

CLIENT SECURITY7-6• If the IP source guard is enabled, an inbound packet’s IP address (sip option) or both its IP address and corresponding MAC addres

Seite 96 - Using DHCP/BOOTP

CONFIGURING IP SOURCE GUARD7-7IP Source Guard Filter• Port – Port for which to filter static entries.• Source IP – Filters traffic based on IP address

Seite 97

CLIENT SECURITY7-8CLI – This example configures a static source-guard binding on port 1.Configuring DHCP SnoopingThe addresses assigned to DHCP client

Seite 98

CONFIGURING DHCP SNOOPING7-9• When DHCP snooping is enabled, DHCP messages entering an untrusted interface are filtered based upon dynamic entries lea

Seite 99

CLIENT SECURITY7-10• Additional considerations when the switch itself is a DHCP client – The port(s) through which the switch submits a client request

Seite 100 - ANAGEMENT

CONFIGURING DHCP SNOOPING7-11• DHCP Snooping Service Provider Mode – Once an IP address is assigned to the host by a DHCP server, the switch sets this

Seite 101

TABLE OF CONTENTSxixshow interfaces counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25-14show interfaces switchport

Seite 102 - Command Attributes

CLIENT SECURITY7-12Web – Click DHCP Snooping, DHCP Snooping Configuration. Enable DHCP snooping status globally, enable it for the required VLANs, sel

Seite 103 - ONFIGURATION

DISPLAYING DHCP SNOOPING INFORMATION7-13Displaying DHCP Snooping InformationThe configuration settings and binding table entries can be displayed on t

Seite 104

CLIENT SECURITY7-14Web – Click DHCP Snooping, DHCP Snooping Information.Figure 7-4 DHCP Snooping Information

Seite 105

CONFIGURING PACKET FILTERING7-15CLI – These examples show the DHCP snooping configuration settings and binding table entries.Configuring Packet Filter

Seite 106

CLIENT SECURITY7-16• Blocking NetBIOS traffic commonly used for resource sharing in a peer-to-peer environment to ensure that no privileged client dat

Seite 107 - 2. CLI only

CONFIGURING PACKET FILTERING7-17• NetBIOS – Blocks NetBIOS packets. (Default: Disabled)- NetBIOS is commonly used in local area networks to facilitate

Seite 108 - Telnet Settings

CLIENT SECURITY7-18Web – Click Security, Packet Filter, Base Filter Configuration. Select the type of service packets to filter, and click Apply.Figur

Seite 109 - 3. CLI only

CONFIGURING PACKET FILTERING7-19• This switch provides a total of 7 masks for filtering functions, including IP-MAC address packet filtering, NetBIOS

Seite 110

CLIENT SECURITY7-20

Seite 111 - 7 Debug Debugging messages

8-1CHAPTER 8ACCESS CONTROL LISTSAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 protocol port n

Seite 113 - Remote Log Configuration

TABLE OF CONTENTSxxlre interleave-max-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29-25lre datarate . . . . . . . . . . . . . .

Seite 114

ACCESS CONTROL LISTS8-2The following filtering modes are supported: • Standard IP ACL mode (STD-ACL) filters packets based on the source IP address. •

Seite 115 - Displaying Log Messages

CONFIGURING ACCESS CONTROL LISTS8-3• Egress MAC ACLs only work for destination-mac-known packets, not for multicast, broadcast, or destination-mac-unk

Seite 116

ACCESS CONTROL LISTS8-4Web – Click Security, ACL, Configuration. Enter an ACL name in the Name field, select the list type (IP Standard, IP Extended,

Seite 117 - ONFIGURING

CONFIGURING ACCESS CONTROL LISTS8-5Web – Specify the action (i.e., Permit or Deny). Select the address type (Any, Host, or IP). If you select “Host,”

Seite 118 - Resetting the System

ACCESS CONTROL LISTS8-6• Source/Destination Subnet Mask – Subnet mask for source or destination address. (See the description for SubMask on page 8-4.

Seite 119 - Console#reload 19-5

CONFIGURING ACCESS CONTROL LISTS8-7Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the addres

Seite 120

ACCESS CONTROL LISTS8-83. Permit all TCP packets from class C addresses 192.168.1.0 with the TCP control code set to “SYN.”Configuring a MAC ACLComman

Seite 121 - Console#

CONFIGURING ACCESS CONTROL LISTS8-9Command UsageEgress MAC ACLs only work for destination-mac-known packets, not for multicast, broadcast, or destinat

Seite 122

ACCESS CONTROL LISTS8-10Configuring ACL MasksYou must specify masks that control the order in which ACL rules are checked. ACL rules matching the firs

Seite 123

CONFIGURING ACCESS CONTROL LISTS8-11Web – Click Security, ACL, Mask Configuration. Click Edit for one of the basic mask types to open the configuratio

Seite 124

TABLE OF CONTENTSxxiDisplaying VDSL Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29-61show lre band-plan . . . . . . . .

Seite 125

ACCESS CONTROL LISTS8-12• Source/Destination Subnet Mask – Source or destination address of rule must match this bitmask. (See the description for Sub

Seite 126

CONFIGURING ACCESS CONTROL LISTS8-13Web – Configure the mask to match the required rules in the IP ingress or egress ACLs. Set the mask to check for a

Seite 127

ACCESS CONTROL LISTS8-14CLI – This shows that the entries in the mask override the precedence in which the rules are entered into the ACL. In the foll

Seite 128 - Command Usage

CONFIGURING ACCESS CONTROL LISTS8-15Web – Configure the mask to match the required rules in the MAC ingress or egress ACLs. Set the mask to check for

Seite 129

ACCESS CONTROL LISTS8-16CLI – This example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of the rules

Seite 130

BINDING A PORT TO AN ACCESS CONTROL LIST8-17• When an ACL is bound to an interface as an egress filter, all entries in the ACL must be deny rules. Oth

Seite 131

ACCESS CONTROL LISTS8-18CLI – This examples assigns an IP and MAC ingress ACL to port 1, and an IP ingress ACL to port 2.Console(config)#interface eth

Seite 132

9-1CHAPTER 9PORT CONFIGURATIONDisplaying Connection StatusYou can use the Port Information or Trunk Information pages to display the current connectio

Seite 133

PORT CONFIGURATION9-2Web – Click Port, Port Information or Trunk Information.Figure 9-1 Port - Port InformationField Attributes (CLI)Basic informatio

Seite 134

DISPLAYING CONNECTION STATUS9-3“Configuring Interface Connections” on page 3-48.) The following capabilities are supported. - 10half - Supports 10 Mbp

Seite 135

TABLE OF CONTENTSxxii31 Spanning Tree Commands . . . . . . . . . . . . . . . . . . . . 31-1spanning-tree . . . . . . . . . . . . . . . . . . . .

Seite 136

PORT CONFIGURATION9-4CLI – This example shows the connection status for Port 5.Configuring Interface Connections You can use the Port Configuration or

Seite 137

CONFIGURING INTERFACE CONNECTIONS9-5required operation modes must be specified in the capabilities list for an interface.• Auto-negotiation must be di

Seite 138

PORT CONFIGURATION9-6and IEEE 802.3x for full-duplex operation. (Avoid using flow control on a port connected to a hub unless it is actually required

Seite 139

CONFIGURING INTERFACE CONNECTIONS9-7Web – Click Port, Port Configuration or Trunk Configuration. Modify the required interface settings, and click App

Seite 140

PORT CONFIGURATION9-8Creating Trunk GroupsYou can create multiple links between devices that work as one virtual, aggregate link. A port trunk offers

Seite 141

CREATING TRUNK GROUPS9-9• The ports at both ends of a trunk must be configured in an identical manner, including communication mode (i.e., speed, dupl

Seite 142

PORT CONFIGURATION9-10Web – Click Port, Trunk Membership. Enter a trunk ID of 1-12 in the Trunk field, select any of the switch ports from the scroll-

Seite 143

CREATING TRUNK GROUPS9-11CLI – This example creates trunk 1 with ports 9 and 10. Just connect these ports to two static trunk ports on another switch

Seite 144

PORT CONFIGURATION9-12• A trunk formed with another switch using LACP will automatically be assigned the next available trunk ID. • If more than eight

Seite 145

CREATING TRUNK GROUPS9-13CLI – The following example enables LACP for ports 1 to 6. Just connect these ports to LACP-enabled trunk ports on another sw

Seite 146

TABLE OF CONTENTSxxiiivlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32-8Configuring VLAN Interf

Seite 147

PORT CONFIGURATION9-14Note: If the port channel admin key (lacp admin key, page 26-8) is not set (through the CLI) when a channel group is formed (i.e

Seite 148

CREATING TRUNK GROUPS9-15Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can o

Seite 149 - UTHENTICATION

PORT CONFIGURATION9-16CLI – The following example configures LACP parameters for ports 1-10. Ports 1-8 are used as active members of the LAG, ports 9

Seite 150

CREATING TRUNK GROUPS9-17Displaying LACP Port CountersYou can display statistics for LACP protocol messages. Web – Click Port, LACP, Port Counters Inf

Seite 151

PORT CONFIGURATION9-18CLI – The following example displays LACP counters for port channel 1.Displaying LACP Settings and Status for the Local SideYou

Seite 152

CREATING TRUNK GROUPS9-19LACPDUs InternalNumber of seconds before invalidating received LACPDU information.Admin State,Oper StateAdministrative or ope

Seite 153

PORT CONFIGURATION9-20Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 9-7 LA

Seite 154

CREATING TRUNK GROUPS9-21Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state for t

Seite 155 - Configuring HTTPS

PORT CONFIGURATION9-22Web – Click Port, LACP, Port Neighbors Information. Select a port channel to display the corresponding information.Figure 9-8 L

Seite 156

SETTING BROADCAST STORM THRESHOLDS9-23Setting Broadcast Storm ThresholdsBroadcast storms may occur when a device on your network is malfunctioning, or

Seite 157

TABLE OF CONTENTSxxivshow queue bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33-9show queue cos-map . . . . . . . . . .

Seite 158

PORT CONFIGURATION9-24Web – Click Port, Port Broadcast Control or Trunk Broadcast Control. Check the Enabled box for any interface, set the threshold,

Seite 159

CONFIGURING PORT MIRRORING9-25Configuring Port MirroringYou can mirror traffic from any source port to a target port for real-time analysis. You can t

Seite 160

PORT CONFIGURATION9-26Web – Click Port, Mirror Port Configuration. Specify the source port, the traffic type to be mirrored, and the monitor port, the

Seite 161 - Field Attributes

CONFIGURING RATE LIMITS9-27Note: You can also set an SNMP trap if traffic exceeds the configured rate limit using the CLI (see the “rate-limit trap-in

Seite 162

PORT CONFIGURATION9-28CLI - This example sets the rate limit for input and output traffic passing through port 1 to 64 Kbps.Configuring the Rate Limit

Seite 163 - Generate

SHOWING PORT STATISTICS9-29Showing Port StatisticsYou can display standard statistics on network traffic from the Interfaces Group and Ethernet-like M

Seite 164 - Configuring the SSH Server

PORT CONFIGURATION9-30Received Unknown PacketsThe number of packets received via the interface which were discarded because of an unknown or unsupport

Seite 165

SHOWING PORT STATISTICS9-31FCS Errors A count of frames received on a particular interface that are an integral number of octets in length but do not

Seite 166

PORT CONFIGURATION9-32RMON StatisticsDrop Events The total number of events in which packets were dropped due to lack of resources.Jabbers The total n

Seite 167 - 802.1X P

SHOWING PORT STATISTICS9-3364 Bytes Frames The total number of frames (including bad packets) received and transmitted that were 64 octets in length (

Seite 168

TABLE OF CONTENTSxxvip igmp snooping query-interval . . . . . . . . . . . . . . . . . . . . . . . . 35-9ip igmp snooping query-max-response-time .

Seite 169

PORT CONFIGURATION9-34Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at the bo

Seite 170

SHOWING PORT STATISTICS9-35CLI – This example shows statistics for port 12.Console#show interfaces counters ethernet 1/12 25-14Ethernet 1/12 Iftable s

Seite 171

PORT CONFIGURATION9-36

Seite 172

10-1CHAPTER 10VDSL CONFIGURATIONVDSL communication parameters can be set for individual ports, or multiple parameters can be defined in a profile and

Seite 173

VDSL CONFIGURATION10-2- Power Value – A power level for each of the PSD breakpoints. (Range: An integer from 0 to 255, which is used to calculate a po

Seite 174 - Displaying 802.1X Statistics

CONFIGURING GLOBAL SETTINGS FOR VDSL PORTS10-3the optimal transmission rate for the current conditions, setting the rate within the bounds defined by

Seite 175

VDSL CONFIGURATION10-4Upstream power back-off (UPBO) is used to mitigate far-end crosstalk caused by upstream transmissions from shorter to longer loo

Seite 176

CONFIGURING GLOBAL SETTINGS FOR VDSL PORTS10-5Web – Click VDSL, Global Configuration. Configure the required items, and click Apply. (Note that the pa

Seite 177 - Figure 6-10 IP Filter

VDSL CONFIGURATION10-6Figure 10-1 VDSL Global ConfigurationCLI – This example displays sample settings for some of the VDSL global configuration comm

Seite 178

CONFIGURING INTERFACE SETTINGS FOR VDSL PORTS10-7Configuring Interface Settings for VDSL PortsThis section describes how to configure communication pa

Seite 179

TABLE OF CONTENTSxxvi37 DHCP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . 37-1DHCP Client . . . . . . . . . . . . . . . . . . .

Seite 180 - Configuring Port Security

VDSL CONFIGURATION10-8Configuration Tables• Channel Mode – Sets the channel mode to fast or interleaved. (Default: Interleaved)Interleaving protects d

Seite 181

CONFIGURING INTERFACE SETTINGS FOR VDSL PORTS10-9• Region Ham Band – Sets the ham radio band that will be blocked to VDSL signals based on defined usa

Seite 182 - Console(config-if)#

VDSL CONFIGURATION10-10• PSD Breakpoints – See “Configuring Global Settings for VDSL Ports” on page 10-1.• PSD Mask Level – See “Configuring Global Se

Seite 183

CONFIGURING INTERFACE SETTINGS FOR VDSL PORTS10-11This minimum margin indicates the amount of increase in impulse noise that the system can tolerate u

Seite 184

VDSL CONFIGURATION10-12Web – Click VDSL, VDSL Port Configuration. Select one of the VDSL ports from the scroll-down list, set the required parameters,

Seite 185

CONFIGURING INTERFACE SETTINGS FOR VDSL PORTS10-13

Seite 187

CONFIGURING INTERFACE SETTINGS FOR VDSL PORTS10-15Figure 10-2 VDSL Port Configuration

Seite 188

VDSL CONFIGURATION10-16CLI – This example displays sample settings for some of the VDSL port configuration commands.Configuring Line ProfilesThis sect

Seite 189

CONFIGURING LINE PROFILES10-17Web – Click VDSL, Line Profile Configuration. Select a line profile from the drop-down list above the Line Profile table

Seite 190

TABLE OF CONTENTSxxviiSection IV AppendicesA Software Specifications . . . . . . . . . . . . . . . . . . . . . . . . A-1Software Features . . . . .

Seite 191

VDSL CONFIGURATION10-18

Seite 192

CONFIGURING LINE PROFILES10-19

Seite 193 - Configuring Packet Filtering

VDSL CONFIGURATION10-20Figure 10-3 Line Profile ConfigurationCLI – This example displays sample settings for a line profile.Console(config)#line-prof

Seite 194

DISPLAYING VDSL STATUS INFORMATION10-21Displaying VDSL Status InformationThis section describes the information displayed for VDSL configuration setti

Seite 195 - ILTERING

VDSL CONFIGURATION10-22LRE Rate Information – Data Rates for the VDSL lineAvg SNR Margin Average signal-to-noise margin above the SNR.Avg SNR Average

Seite 196

DISPLAYING VDSL STATUS INFORMATION10-23Web – Click VDSL, VDSL Status Information. Select a VDSL port from the drop-down list, and click Query. Figure

Seite 197 - 192.168.0.9 23-5

VDSL CONFIGURATION10-24CLI – This example displays connection status and data rates for the selected VDSL port.Console#show lre 1/1 29-79port 1 status

Seite 198

DISPLAYING VDSL PERFORMANCE STATISTICS10-25Displaying VDSL Performance StatisticsThis section describes the performance information displayed for VDSL

Seite 199

VDSL CONFIGURATION10-26Ethernet Transmit Performance CountersAlignment Errors Number of alignment errors (missynchronized data packets). Oversize Numb

Seite 200

DISPLAYING VDSL PERFORMANCE STATISTICS10-27High-Level Data-Link Control (H.D.L.C.) Performance CountersTable 10-6 H.D.L.C. Performance CountersParame

Seite 201

TABLE OF CONTENTSxxviii

Seite 202 - Console(config-std-acl)#

VDSL CONFIGURATION10-28Web – Click VDSL, VDSL Performance Statistics. Select a VDSL port from the drop-down list, and click Query. Figure 10-5 VDSL P

Seite 203

DISPLAYING VDSL PERFORMANCE STATISTICS10-29CLI – This example displays performance information for the selected VDSL port.Console#show lre perf 1/1 29

Seite 204

VDSL CONFIGURATION10-30Configuring an Alarm ProfileThis section describes how to configure a list of threshold values for error states which can be ap

Seite 205

CONFIGURING AN ALARM PROFILE10-31This parameter sets the threshold for the number of severely errored seconds within any 15 minute collection interval

Seite 206 - Configuring a MAC ACL

VDSL CONFIGURATION10-32interval reaches or exceeds this value, a vdslPerfLossThreshNotification notification will be generated. (Refer to RFC 3728 for

Seite 207 - Console(config-mac-acl)#

CONFIGURING AN ALARM PROFILE10-33• init-failure – Threshold for initialization failures that can occur within any given 15 minutes. (Range: 0-900 seco

Seite 208 - Specifying the Mask Type

VDSL CONFIGURATION10-34Web – Click VDSL, Alarm Profile Configuration. Select a profile from the drop-down list above the Alarm Profile table of thresh

Seite 209 - Configuring an IP ACL Mask

CONFIGURING AN ALARM PROFILE10-35Figure 10-6 Alarm Profile ConfigurationCLI – This example displays sample settings for an alarm profile.Console(conf

Seite 210

VDSL CONFIGURATION10-36Displaying CPE InformationThis section describes the information displayed for an attached CPE, including firmware module versi

Seite 211

DISPLAYING CPE INFORMATION10-37CPE Performance CountersTable 10-9 CPE Performance CountersParameter Descriptioncpe perfermance countersFeFEC_F Far en

Seite 212 - Configuring a MAC ACL Mask

xxixTABLESTable 1-1 Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Table 1-2 System Defaults . . . . . . .

Seite 213

VDSL CONFIGURATION10-38Web – Click VDSL, CPE Information. Select a VDSL port from the drop-down list, and click Query.

Seite 214

DISPLAYING CPE INFORMATION10-39Figure 10-7 CPE Information

Seite 215

VDSL CONFIGURATION10-40CLI – This example displays information about the CPE attached to the selected VDSL port.Console#show cpe-info 1/1Protocol ID:

Seite 216

CONFIGURING OAM FUNCTIONS AND UPGRADING CPE FIRMWARE10-41Configuring OAM Functions and Upgrading CPE FirmwareThis section describes operation and main

Seite 217 - Field Attributes (Web)

VDSL CONFIGURATION10-42CPE, and verifying that the signal is returned from the CPE without any errors.Upgrading CPE Firmware• Upgrade Firmware – Trans

Seite 218 - Configuration:

CONFIGURING OAM FUNCTIONS AND UPGRADING CPE FIRMWARE10-43Web – Click VDSL, VDSL OAM. Select a VDSL port from the drop-down list, and perform any of th

Seite 219 - Current status:

VDSL CONFIGURATION10-44CLI – This example shows how to perform common OAM functions, and how to download firmware to a CPE.Console(config)#interface e

Seite 220

11-1CHAPTER 11ADDRESS TABLE SETTINGSSwitches store the addresses for all known devices. This information is used to pass traffic directly between the

Seite 221

ADDRESS TABLE SETTINGS11-2Web – Click Address Table, Static Addresses. Specify the interface, the MAC address and VLAN, then click Add Static Address.

Seite 222

DISPLAYING THE ADDRESS TABLE11-3Command Attributes• Interface – Indicates a port or trunk.• MAC Address – Physical address associated with this interf

Seite 223 - ONNECTIONS

20 MasonIrvine, CA 92618Phone: (949) 679-8000TigerAccess™ EEManagement GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsJanuary 2007P

Seite 224

TABLESxxxTable 20-4 show bme version - display description . . . . . . . . . . . . . 20-11Table 20-5 show cpu utilization - display description . .

Seite 225

ADDRESS TABLE SETTINGS11-4CLI – This example also displays the address table entries for port 1.Changing the Aging TimeYou can set the aging time for

Seite 226

12-1CHAPTER 12SPANNING TREE ALGORITHMThe Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to provide backup links be

Seite 227

SPANNING TREE ALGORITHM12-2Once a stable network topology has been established, all bridges listen for Hello BPDUs (Bridge Protocol Data Units) transm

Seite 228

12-3maintain connectivity among each of the assigned VLAN groups. MSTP then builds a Internal Spanning Tree (IST) for the Region containing all common

Seite 229 - Configuring LACP Parameters

SPANNING TREE ALGORITHM12-4MSTP connects all bridges and LAN segments with a single Common and Internal Spanning Tree (CIST). The CIST is formed as a

Seite 230

DISPLAYING GLOBAL SETTINGS12-5make it return to a discarding state; otherwise, temporary data loops might result.• Designated Root – The priority and

Seite 231

SPANNING TREE ALGORITHM12-6configuration messages at regular intervals. If the root port ages out STA information (provided in the last configuration

Seite 232

DISPLAYING GLOBAL SETTINGS12-7CLI – This command displays global STA settings, followed by settings for each port. Note: The current root port and cur

Seite 233 - Displaying LACP Port Counters

SPANNING TREE ALGORITHM12-8Configuring Global SettingsGlobal settings apply to the entire switch.Command Usage• Spanning Tree Protocol13Uses RSTP for

Seite 234

CONFIGURING GLOBAL SETTINGS12-9- Be careful when switching between spanning tree modes. Changing modes stops all spanning-tree instances for the previ

Seite 235

TABLESxxxiTable 24-1 Access Control List Commands . . . . . . . . . . . . . . . . . . . . 24-1Table 24-2 IP ACL Commands . . . . . . . . . . . . . .

Seite 236

SPANNING TREE ALGORITHM12-10reconfigure. All device ports (except for designated ports) should receive configuration messages at regular intervals. An

Seite 237

CONFIGURING GLOBAL SETTINGS12-11Configuration Settings for MSTP • Max Instance Numbers – The maximum number of MSTP instances to which this switch can

Seite 238

SPANNING TREE ALGORITHM12-12Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply.Figure 12-2 STA Global Con

Seite 239

DISPLAYING INTERFACE SETTINGS12-13CLI – This example enables Spanning Tree Protocol, sets the mode to MST, and then configures the STA and MSTP parame

Seite 240

SPANNING TREE ALGORITHM12-14- If two ports of a switch are connected to the same segment and there is no other STA device attached to this segment, th

Seite 241

DISPLAYING INTERFACE SETTINGS12-15• Trunk Member – Indicates if a port is a member of a trunk. (STA Port Information only)These additional parameters

Seite 242

SPANNING TREE ALGORITHM12-16loops. Where more than one port is assigned the highest priority, the port with the lowest numeric identifier will be enab

Seite 243 - Command Attribute

DISPLAYING INTERFACE SETTINGS12-17CLI – This example shows the STA attributes for port 5. Console#show spanning-tree ethernet 1/5 31-25Eth 1/ 5 infor

Seite 244

SPANNING TREE ALGORITHM12-18Configuring Interface SettingsYou can configure RSTP and MSTP attributes for specific interfaces, including port priority,

Seite 245 - Showing Port Statistics

CONFIGURING INTERFACE SETTINGS12-19loops. Where more than one port is assigned the highest priority, the port with lowest numeric identifier will be e

Seite 246

TABLESxxxiiTable 32-5 Commands for Displaying VLAN Information . . . . . . 32-16Table 32-6 Private VLAN Commands . . . . . . . . . . . . . . . . .

Seite 247 - TATISTICS

SPANNING TREE ALGORITHM12-20• Admin Link Type – The link type attached to this interface.- Point-to-Point – A connection to exactly one other bridge.-

Seite 248

CONFIGURING INTERFACE SETTINGS12-21Web – Click Spanning Tree, STA, Port Configuration or Trunk Configuration. Modify the required attributes, then cli

Seite 249

SPANNING TREE ALGORITHM12-22Configuring Multiple Spanning Trees MSTP generates a unique spanning tree for each instance. This provides multiple pathwa

Seite 250 - Figure 9-13 Port Statistics

CONFIGURING MULTIPLE SPANNING TREES12-23• VLANs in MST Instance – VLANs assigned this instance.• MST ID – Instance identifier to configure. (Range: 0-

Seite 251

SPANNING TREE ALGORITHM12-24CLI – This displays STA settings for instance 1, followed by settings for each port. Console#show spanning-tree mst 1 31-2

Seite 252

DISPLAYING INTERFACE SETTINGS FOR MSTP12-25CLI – This example sets the priority for MSTI 1, and adds VLANs 1-5 to this MSTI. Displaying Interface Sett

Seite 253

SPANNING TREE ALGORITHM12-26CLI – This displays STA settings for instance 0, followed by settings for each port. The settings for instance 0 are globa

Seite 254

CONFIGURING INTERFACE SETTINGS FOR MSTP12-27Configuring Interface Settings for MSTPYou can configure the STA interface settings for an MST Instance us

Seite 255

SPANNING TREE ALGORITHM12-28• Admin MST Path Cost – This parameter is used by the MSTP to determine the best path between devices. Therefore, lower va

Seite 256

CONFIGURING INTERFACE SETTINGS FOR MSTP12-29Web – Click Spanning Tree, MSTP, Port Configuration or Trunk Configuration. Enter the priority and path co

Seite 257

xxxiiiFIGURESFigure 3-1 Home Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3Figure 3-2 Front Panel Indicators . .

Seite 258

SPANNING TREE ALGORITHM12-30

Seite 259

13-1CHAPTER 13VLAN CONFIGURATIONSelecting the VLAN Operation ModeThe system can be configured to operate in normal mode or one of the tunneling modes

Seite 260

VLAN CONFIGURATION13-2Web – Click VLAN, System Mode. Select the required mode, click Apply.Figure 13-1 Selecting the System ModeCLI – This example se

Seite 261

IEEE 802.1Q VLANS13-3VLANs provide greater network efficiency by reducing broadcast traffic, and allow you to make network changes without having to u

Seite 262

VLAN CONFIGURATION13-4VLAN Classification – When the switch receives a frame, it classifies the frame in one of two ways. If the frame is untagged, th

Seite 263

IEEE 802.1Q VLANS13-5forward the message to all other ports. When the message arrives at another switch that supports GVRP, it will also place the rec

Seite 264

VLAN CONFIGURATION13-6switches, you should create a VLAN for that group and enable tagging on all ports. Ports can be assigned to multiple tagged or u

Seite 265

IEEE 802.1Q VLANS13-7CLI – This example enables GVRP for the switch. Displaying Basic VLAN InformationThe VLAN Basic Information page displays basic i

Seite 266

VLAN CONFIGURATION13-8CLI – Enter the following command.Displaying Current VLANsThe VLAN Current Table shows the current port members of each VLAN and

Seite 267

IEEE 802.1Q VLANS13-9Web – Click VLAN, 802.1Q VLAN, Current Table. Select any ID from the scroll-down list.Figure 13-4 VLAN Current TableCommand Attr

Seite 268 - Configuring Line Profiles

FIGURESxxxivFigure 6-5 SSH Server Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-17Figure 6-6 802.1X Global Information . . . .

Seite 269

VLAN CONFIGURATION13-10CLI – Current VLAN information can be displayed with the following command.Creating VLANsUse the VLAN Static List to create or

Seite 270

IEEE 802.1Q VLANS13-11• Remove – Removes a VLAN group from the current list. If any port is assigned to this group as untagged, it will be reassigned

Seite 271

VLAN CONFIGURATION13-12Adding Static Members to VLANs (VLAN Index)Use the VLAN Static Table to configure port members for the selected VLAN index. Ass

Seite 272

IEEE 802.1Q VLANS13-13- Forbidden: Interface is forbidden from automatically joining the VLAN via GVRP. For more information, see “Automatic VLAN Regi

Seite 273

VLAN CONFIGURATION13-14Adding Static Members to VLANs (Port Index)Use the VLAN Static Membership by Port menu to assign VLAN groups to the selected in

Seite 274 - Table 10-2 Rate Status

IEEE 802.1Q VLANS13-15Configuring VLAN Behavior for InterfacesYou can configure VLAN behavior for specific interfaces, including the default VLAN iden

Seite 275 - NFORMATION

VLAN CONFIGURATION13-16- If ingress filtering is disabled and a port receives frames tagged for VLANs for which it is not a member, these frames will

Seite 276

IEEE 802.1Q VLANS13-17belonging to the port’s default VLAN (i.e., associated with the PVID) are also transmitted as tagged frames. - Hybrid – Specifie

Seite 277

VLAN CONFIGURATION13-18Configuring Private VLANsPrivate VLANs provide port-based security and isolation between ports within the assigned VLAN. Data t

Seite 278

CONFIGURING PRIVATE VLANS13-19Configuring Uplink and Downlink PortsUse the Private VLAN Link Status page to set ports as downlink or uplink ports. Por

Seite 279 - ERFORMANCE

FIGURESxxxvFigure 10-5 VDSL Performance Statistics . . . . . . . . . . . . . . . . . . . . 10-28Figure 10-6 Alarm Profile Configuration . . . . . .

Seite 280

VLAN CONFIGURATION13-20Configuring Protocol-Based VLANs The network devices required to support multiple protocols cannot be easily grouped into a com

Seite 281 - VDSL port

CONFIGURING PROTOCOL-BASED VLANS13-21Configuring Protocol GroupsCreate a protocol group for one or more protocols.Command Attributes• Protocol Group I

Seite 282

VLAN CONFIGURATION13-22Mapping Protocols to VLANsMap a protocol group to a VLAN for each interface that will participate in the group.Command Usage• W

Seite 283

CONFIGURING PROTOCOL-BASED VLANS13-23Web – Click VLAN, Protocol VLAN, Port Configuration. Select a a port or trunk, enter a protocol group ID, the cor

Seite 284

VLAN CONFIGURATION13-24Configuring IEEE 802.1Q TunnelingIEEE 802.1Q Tunneling (QinQ) is designed for service providers carrying traffic for multiple c

Seite 285

CONFIGURING IEEE 802.1Q TUNNELING13-25be added to this SPVLAN. The uplink port can be added to multiple SPVLANs to carry inbound traffic for different

Seite 286

VLAN CONFIGURATION13-26The ingress process does source and destination lookups. If both lookups are successful, the ingress process writes the packet

Seite 287

CONFIGURING IEEE 802.1Q TUNNELING13-27The ingress process does source and destination lookups. If both lookups are successful, the ingress process wri

Seite 288 - Displaying CPE Information

VLAN CONFIGURATION13-288. If the egress port is an untagged member of the SPVLAN, the outer tag will be stripped. If it is a tagged member, the outgoi

Seite 289 - CPE Performance Counters

CONFIGURING IEEE 802.1Q TUNNELING13-294. Set the Tag Protocol Identifier (TPID) value of the tunnel port. This step is required is the attached client

Seite 290

FIGURESxxxviFigure 14-10 IP Port Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-17Figure 15-1 Configuring Class Maps . .

Seite 291 - Figure 10-7 CPE Information

VLAN CONFIGURATION13-30Adding an Interface to a QinQ TunnelFollow the guidelines in the preceding section to set up a QinQ tunnel on the switch. Set t

Seite 292

CONFIGURING IEEE 802.1Q TUNNELING13-31necessary to support real-time services across the backbone network, then you may have to enable priority bit ma

Seite 293

VLAN CONFIGURATION13-32CLI – This example configures the switch to copy the priority bits from the inner to outer VLAN tag, it then sets port 2 to tun

Seite 294

CONFIGURING VLAN SWAPPING13-33Configuring VLAN SwappingQinQ tunneling uses double tagging to preserve the customer’s VLAN tags on traffic crossing the

Seite 295 - PGRADING

VLAN CONFIGURATION13-34Field Attributes • Entry Counts – The number of entries in the VLAN swapping table. • VLAN Swap Table – Contains each entry in

Seite 296

CONFIGURING VLAN SWAPPING13-35CLI – This example configures VLAN swapping for upstream traffic between port 1 and port 18, exchanging VLAN ID 1 for VL

Seite 297

VLAN CONFIGURATION13-36

Seite 298

14-1CHAPTER 14CLASS OF SERVICEClass of Service (CoS) allows you to specify which data packets have greater precedence when traffic is buffered in the

Seite 299

CLASS OF SERVICE14-2Command Attributes• Default Priority21 – The priority that is assigned to untagged frames received on the specified interface. (Ra

Seite 300 - Changing the Aging Time

LAYER 2 QUEUE SETTINGS14-3CLI – This example assigns a default priority of 5 to port 3.Mapping CoS Values to Egress QueuesThis switch processes Class

Seite 301 - LGORITHM

SECTION IGETTING STARTEDThis section provides an overview of the switch, and introduces some basic concepts about network switches. It also describes

Seite 302

CLASS OF SERVICE14-4The priority levels recommended in the IEEE 802.1p standard for various network applications are shown in the following table. How

Seite 303

LAYER 2 QUEUE SETTINGS14-5Web – Click Priority, Traffic Classes. Assign priorities to the traffic classes (i.e., output queues), then click Apply.Figu

Seite 304

CLASS OF SERVICE14-6Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traffic in a higher

Seite 305

LAYER 2 QUEUE SETTINGS14-7Web – Click Priority, Queue Mode. Select Strict or WRR, then click Apply.Figure 14-3 Queue ModeCLI – The following sets the

Seite 306

CLASS OF SERVICE14-8Command Attributes• WRR Setting Table23 – Displays a list of weights for each traffic class (i.e., queue).• Weight Value – Set a n

Seite 307

LAYER 3/4 PRIORITY SETTINGS14-9CLI – The following example shows how to assign WRR weights to priority queues 0-5, and strict priority to queues 6 and

Seite 308

CLASS OF SERVICE14-10Selecting IP Precedence/DSCP PriorityThe switch allows you to choose between using IP Precedence or DSCP priority. Select one of

Seite 309

LAYER 3/4 PRIORITY SETTINGS14-11Mapping IP PrecedenceThe Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight

Seite 310

CLASS OF SERVICE14-12Web – Click Priority, IP Precedence Priority. Select an entry from the IP Precedence Priority Table, enter a value in the Class o

Seite 311

LAYER 3/4 PRIORITY SETTINGS14-13Mapping DSCP PriorityThe DSCP is six bits wide, allowing coding for up to 64 different forwarding behaviors. The DSCP

Seite 312

GETTING STARTED

Seite 313 - Displaying Interface Settings

CLASS OF SERVICE14-14Web – Click Priority, IP DSCP Priority. Select an entry from the DSCP table, enter a value in the Class of Service Value field, t

Seite 314

LAYER 3/4 PRIORITY SETTINGS14-15Mapping IPv6 Traffic ClassesThe Traffic Class field in the IPv6 header may be used by originating nodes and/or forward

Seite 315

CLASS OF SERVICE14-16CLI – The following example maps the Traffic Class value of 1 to CoS value 0.Mapping IP Port PriorityYou can also map network app

Seite 316

LAYER 3/4 PRIORITY SETTINGS14-17Click Priority, IP Port Priority. Enter the port number for a network application in the IP Port Number box and the ne

Seite 317

CLASS OF SERVICE14-18

Seite 318

15-1CHAPTER 15QUALITY OF SERVICEThe commands described in this section are used to configure Quality of Service (QoS) classification criteria and serv

Seite 319

QUALITY OF SERVICE15-2Notes: 1. You can configure up to 16 rules per Class Map. You can also include multiple classes in a Policy Map.2. You should cr

Seite 320

CONFIGURING QUALITY OF SERVICE PARAMETERS15-3Configuring a Class MapA class map is used for matching packets to a specified class.Command Usage • To c

Seite 321

QUALITY OF SERVICE15-4Settings” page. Enter the criteria used to classify ingress traffic on this web page.• Remove Class – Removes the selected class

Seite 322

CONFIGURING QUALITY OF SERVICE PARAMETERS15-5Web – Click QoS, DiffServ, then click Add Class to create a new class, or Edit Rules to change the rules

Seite 323

1-1CHAPTER 1INTRODUCTIONThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to config

Seite 324

QUALITY OF SERVICE15-6Creating QoS PoliciesThis function creates a policy map that can be attached to multiple interfaces.Command Usage • To configure

Seite 325 - Console(config-mst)#

CONFIGURING QUALITY OF SERVICE PARAMETERS15-7Command AttributesPolicy Map• Modify Name and Description – Configures the name and a brief description o

Seite 326

QUALITY OF SERVICE15-8• Remove Class – Deletes a class.- Policy Options -• Class Name – Name of class map.• Action – Configures the service provided t

Seite 327

CONFIGURING QUALITY OF SERVICE PARAMETERS15-9Web – Click QoS, DiffServ, Policy Map to display the list of existing policy maps. To add a new policy ma

Seite 328

QUALITY OF SERVICE15-10CLI – This example creates a policy map called “rd-policy,” sets the average bandwidth the 1 Mbps, the burst rate to 1522 bps,

Seite 329 - Console(config-if)

CONFIGURING QUALITY OF SERVICE PARAMETERS15-11Web – Click QoS, DiffServ, Service Policy Settings. Check Enabled and choose a Policy Map for a port fro

Seite 330

QUALITY OF SERVICE15-12

Seite 331

16-1CHAPTER 16MULTICAST FILTERINGMulticasting is used to support real-time applications such as videoconferencing or streaming audio. A multicast serv

Seite 332

MULTICAST FILTERING16-2those ports only. It then propagates the service request up to any neighboring multicast switch/router to ensure that it will c

Seite 333 - IEEE 802.1Q VLAN

LAYER 2 IGMP (SNOOPING AND QUERY)16-3is forwarded to the hosts from each of these sources. IGMPv3 hosts may also request that service be forwarded fro

Seite 334

Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, n

Seite 335

KEY FEATURES1-2User AuthenticationConsole, Telnet, web – User name / password, RADIUS, TACACS+Web – HTTPSTelnet – SSHSNMP v1/2c - Community stringsSNM

Seite 336

MULTICAST FILTERING16-4Configuring IGMP Snooping and Query ParametersYou can configure the switch to forward multicast traffic intelligently. Based on

Seite 337

LAYER 2 IGMP (SNOOPING AND QUERY)16-5Command Attributes• IGMP Status — When enabled, the switch will monitor network traffic to determine which hosts

Seite 338 - Displaying Current VLANs

MULTICAST FILTERING16-6Web – Click IGMP Snooping, IGMP Configuration. Adjust the IGMP settings as required, and then click Apply. (The default setting

Seite 339 - Command Attributes (CLI)

LAYER 2 IGMP (SNOOPING AND QUERY)16-7Displaying Interfaces Attached to a Multicast RouterMulticast routers that are attached to ports on the switch us

Seite 340 - Creating VLANs

MULTICAST FILTERING16-8CLI – This example shows that Port 11 has been statically configured as a port attached to a multicast router.Specifying Static

Seite 341

LAYER 2 IGMP (SNOOPING AND QUERY)16-9CLI – This example configures port 11 as a multicast router port within VLAN 1.Displaying Port Members of Multica

Seite 342

MULTICAST FILTERING16-10Web – Click IGMP Snooping, IP Multicast Registration Table. Select a VLAN ID and the IP address for a multicast service from t

Seite 343

LAYER 2 IGMP (SNOOPING AND QUERY)16-11Assigning Ports to Multicast Services Multicast filtering can be dynamically configured using IGMP Snooping and

Seite 344

MULTICAST FILTERING16-12Web – Click IGMP Snooping, IGMP Member Port Table. Specify the interface attached to a multicast service (via an IGMP-enabled

Seite 345

LAYER 2 IGMP (SNOOPING AND QUERY)16-13Configuring Immediate Leave from Multicast GroupsThe switch can be configured to immediately delete a member por

Seite 346

INTRODUCTION1-3Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Flow control eliminates th

Seite 347

MULTICAST FILTERING16-14Web – Click IGMP Snooping, IGMP Immediate Leave Table. Select the VLAN interface to configure, set the status for immediate le

Seite 348 - Console(config)#pvlan 32-17

IGMP FILTERING AND THROTTLING16-15IGMP throttling sets a maximum number of multicast groups that a port can join at the same time. When the maximum nu

Seite 349

MULTICAST FILTERING16-16CLI – This example enables IGMP filtering and creates a profile number. It then displays the current status and the existing p

Seite 350

IGMP FILTERING AND THROTTLING16-17• Current Multicast Address Range List – Lists multicast groups currently included in the profile. Select an entry a

Seite 351

MULTICAST FILTERING16-18Configuring IGMP Filtering and Throttling for InterfacesOnce you have configured IGMP profiles, you can assign them to interfa

Seite 352

IGMP FILTERING AND THROTTLING16-19Web – Click IGMP Snooping, IGMP Filter/Throttling Port Configuration or IGMP Filter/Throttling Trunk Configuration.

Seite 353

MULTICAST FILTERING16-20Multicast VLAN RegistrationMulticast VLAN Registration (MVR) is a protocol that controls access to a single network-wide VLAN

Seite 354

MULTICAST VLAN REGISTRATION16-21General Configuration Guidelines for MVR1. Enable MVR globally on the switch, select the MVR VLAN, and add the multica

Seite 355 - IEEE 802.1Q T

MULTICAST FILTERING16-22Field Attributes•MVR Domain – An independent multicast domain. (Range: 1-3; Default: 1)• MVR Status – When MVR is enabled on b

Seite 356

MULTICAST VLAN REGISTRATION16-23Web – Click MVR, Configuration. Select the MVR domain, enable MVR globally on the switch, select the MVR VLAN, add the

Seite 357

DESCRIPTION OF SOFTWARE FEATURES1-4server to verify the client’s right to access the network via an authentication server (i.e., RADIUS server).Other

Seite 358

MULTICAST FILTERING16-24Displaying MVR Interface StatusYou can display information about the interfaces attached to the MVR VLAN.Field Attributes•MVR

Seite 359

MULTICAST VLAN REGISTRATION16-25CLI – This example shows information about interfaces attached to the MVR VLAN.Console#show mvr interface 35-29=======

Seite 360

MULTICAST FILTERING16-26Configuring MVR InterfacesEach interface that participates in the MVR VLAN must be configured as an MVR source port or receive

Seite 361

MULTICAST VLAN REGISTRATION16-27- Using immediate leave can speed up leave latency, but should only be enabled on a port attached to one multicast sub

Seite 362

MULTICAST FILTERING16-28Web – Click MVR, Port Configuration or Trunk Configuration.Figure 16-12 MVR Port ConfigurationCLI – This example configures a

Seite 363

MULTICAST VLAN REGISTRATION16-29Web – Click MVR, Group IP Information. Figure 16-13 MVR Group IP InformationCLI – This example following shows inform

Seite 364

MULTICAST FILTERING16-30Assigning Static Multicast Groups to InterfacesFor multicast streams that will run for a long term and be associated with a st

Seite 365 - 3 for VLAN ID 1

MULTICAST VLAN REGISTRATION16-31Web – Click MVR, Group Member Configuration. Select a port or trunk from the “Interface” field, and click Query to dis

Seite 366

MULTICAST FILTERING16-32

Seite 367

17-1CHAPTER 17DOMAIN NAME SERVICEThe Domain Naming System (DNS) service on this switch allows host names to be mapped to IP addresses using static tab

Seite 368

INTRODUCTION1-5Port Trunking – Ports can be combined into an aggregate connection. Trunks can be manually set up or dynamically configured using IEEE

Seite 369 - Queue 20134567

DOMAIN NAME SERVICE17-2• When more than one name server is specified, the servers are queried in the specified sequence until a response is received,

Seite 370

CONFIGURING GENERAL DNS SERVICE PARAMETERS17-3Web – Select DNS, General Configuration. Set the default domain name or list of domain names, specify on

Seite 371 - Figure 14-2 Traffic Classes

DOMAIN NAME SERVICE17-4CLI - This example sets a default domain name and a domain list. However, remember that if a domain list is specified, the defa

Seite 372

CONFIGURING STATIC DNS HOST TO ADDRESSENTRIES17-5Field Attributes• Host Name – Name of a host device that is mapped to one or more IP addresses. (Rang

Seite 373

DOMAIN NAME SERVICE17-6CLI - This example maps two address to a host name, and then configures an alias host name for the same addresses.Displaying th

Seite 374

DISPLAYING THE DNS CACHE17-7Web – Select DNS, Cache.Figure 17-3 DNS CacheCLI - This example displays all the resource records learned from the design

Seite 376

SECTION IIICOMMAND LINE INTERFACEThis section provides a detailed description of the Command Line Interface, along with examples for all of the comman

Seite 377 - Mapping IP Precedence

COMMAND LINE INTERFACEIP Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38-1

Seite 378

18-1CHAPTER 18OVERVIEW OF THECOMMAND LINE INTERFACEThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line Interface

Seite 379 - Mapping DSCP Priority

DESCRIPTION OF SOFTWARE FEATURES1-6Spanning Tree Algorithm – The switch supports these spanning tree protocols:Spanning Tree Protocol (STP, IEEE 802.1

Seite 380

OVERVIEW OF THE COMMAND LINE INTERFACE18-2After connecting to the system through the console port, the login screen displays:Telnet ConnectionTelnet o

Seite 381

ENTERING COMMANDS18-32. At the prompt, enter the user name and system password. The CLI will display the “Vty-n#” prompt for the administrator to show

Seite 382 - Mapping IP Port Priority

OVERVIEW OF THE COMMAND LINE INTERFACE18-4• To enter multiple commands, enter each command in the required order. For example, to enable Privileged Ex

Seite 383

ENTERING COMMANDS18-5Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for the current com

Seite 384

OVERVIEW OF THE COMMAND LINE INTERFACE18-6The command “show interfaces ?” will display the following information:Partial Keyword LookupIf you terminat

Seite 385

ENTERING COMMANDS18-7Using Command HistoryThe CLI maintains a history of commands that have been entered. You can scroll back through the history of c

Seite 386

OVERVIEW OF THE COMMAND LINE INTERFACE18-8Exec CommandsWhen you open a new console session on the switch with the user name and password “guest,” the

Seite 387

ENTERING COMMANDS18-9The configuration commands are organized into different modes:• Global Configuration - These commands modify the system level con

Seite 388

OVERVIEW OF THE COMMAND LINE INTERFACE18-10To enter the other modes, at the configuration prompt type one of the following commands. Use the exit or e

Seite 389 - Console(config-cmap)#

ENTERING COMMANDS18-11For example, you can use the following commands to enter interface configuration mode, and then return to Privileged Exec mode C

Seite 390

INTRODUCTION1-7• Simplify network management for node changes/moves by remotely configuring VLAN membership for any port, rather than having to manual

Seite 391

OVERVIEW OF THE COMMAND LINE INTERFACE18-12Command GroupsThe system commands can be broken down into the functional groups shown below.Esc-F Moves the

Seite 392

COMMAND GROUPS18-13Interface Configures the connection parameters for all Ethernet ports, aggregated links, and VLANs25-1Link Aggregation Statically

Seite 393 - ARAMETERS

OVERVIEW OF THE COMMAND LINE INTERFACE18-14The access mode shown in the following tables is indicated by these abbreviations: ACL (Access Control List

Seite 394

19-1CHAPTER 19GENERAL COMMANDSThese commands are used to control the command access mode, configuration mode, and other basic functions.Table 19-1 Ge

Seite 395

GENERAL COMMANDS19-2enableThis command activates Privileged Exec mode. In privileged mode, additional commands are available, and certain commands dis

Seite 396

DISABLE19-3disableThis command returns to Normal Exec mode from privileged mode. In normal access mode, you can only display basic information on the

Seite 397 - Multicast

GENERAL COMMANDS19-4Example Related Commands end (19-6)show historyThis command shows the contents of the command history buffer.Default Setting NoneC

Seite 398 - ULTICAST

RELOAD19-5The ! command repeats commands from the Execution command history buffer when you are in Normal Exec or Privileged Exec Mode, and commands f

Seite 399

GENERAL COMMANDS19-6promptThis command customizes the CLI prompt. Use the no form to restore the default prompt.Syntax prompt stringno promptstring -

Seite 400

EXIT19-7exitThis command returns to the previous configuration mode or exits the configuration program.Default Setting NoneCommand Mode AnyExample Thi

Seite 401

DESCRIPTION OF SOFTWARE FEATURES1-8Multicast Filtering – Specific multicast traffic can be assigned to its own VLAN to ensure that it does not interfe

Seite 402

GENERAL COMMANDS19-8Example This example shows how to quit a CLI session:Console#quitPress ENTER to start sessionUser Access VerificationUsername:

Seite 403

20-1CHAPTER 20SYSTEM MANAGEMENTCOMMANDSThese commands are used to control system logs, passwords, user names, management options, and display or confi

Seite 404

SYSTEM MANAGEMENT COMMANDS20-2Device Designation CommandsThis section describes commands used to configure information that uniquely identifies the sw

Seite 405

SYSTEM STATUS COMMANDS20-3System Status CommandsThis section describes commands used to display system information.show startup-configThis command dis

Seite 406

SYSTEM MANAGEMENT COMMANDS20-4This command displays settings for key command modes. Each mode group is separated by “!” symbols, and includes the conf

Seite 407

SYSTEM STATUS COMMANDS20-5Example Related Commandsshow running-config (20-6)Console#show startup-configbuilding startup-config, please wait...!<

Seite 408

SYSTEM MANAGEMENT COMMANDS20-6show running-configThis command displays the configuration information currently in use.Command Mode Privileged ExecComm

Seite 409

SYSTEM STATUS COMMANDS20-7Example Console#show running-configbuilding running-config, please wait...!<stackingDB>00</stackingDB>!<sta

Seite 410

SYSTEM MANAGEMENT COMMANDS20-8Related Commandsshow startup-config (20-3)show systemThis command displays system information.Default Setting NoneComman

Seite 411

SYSTEM STATUS COMMANDS20-9show usersShows all active console and Telnet sessions, including user name, idle time, and IP address of Telnet client.Defa

Seite 412

INTRODUCTION1-9System DefaultsThe switch’s system defaults are provided in the configuration file “Factory_Default_Config.cfg.” To reset the switch de

Seite 413 - HROTTLING

SYSTEM MANAGEMENT COMMANDS20-10show versionThis command displays hardware and software version information for the system.Command Mode Normal Exec, Pr

Seite 414

SYSTEM STATUS COMMANDS20-11Example show cpu utilizationThis command shows the CPU utilization parameters.Command Mode Normal Exec, Privileged ExecExam

Seite 415

SYSTEM MANAGEMENT COMMANDS20-12show memory statusThis command shows memory utilization parameters.Command Mode Normal Exec, Privileged ExecExample Tab

Seite 416 - Multicast VLAN Registration

SYSTEM MODE COMMANDS20-13System Mode CommandsThis section describes command used to configure the switch to operate in normal mode or QinQ mode.system

Seite 417

SYSTEM MANAGEMENT COMMANDS20-14Default Setting Normal operating modeCommand Mode Global ConfigurationCommand Usage Make sure that no dot1q-tunnel port

Seite 418

FRAME SIZE COMMANDS20-15Frame Size CommandsThis section describes commands used to configure the Ethernet frame size on the switch.jumbo frameThis com

Seite 419 - Console(config)#mvr 35-24

SYSTEM MANAGEMENT COMMANDS20-16Example File Management CommandsManaging FirmwareFirmware can be uploaded and downloaded to or from a TFTP server. By s

Seite 420

FILE MANAGEMENT COMMANDS20-17copy This command moves (upload/download) a code image or configuration file between the switch’s flash memory and a T

Seite 421 - MVR VLAN

SYSTEM MANAGEMENT COMMANDS20-18settings will be set to default values when the system is rebooted using this file.• firmware - Keyword that allows you

Seite 422

FILE MANAGEMENT COMMANDS20-19•Use the partial-running-config keyword to copy basic settings for the IP configuration, SNMP community strings, and CLI

Seite 423

SYSTEM DEFAULTS1-10Web Management HTTP Server EnabledHTTP Port Number 80HTTP Secure Server EnabledHTTP Secure Port Number 443SNMP SNMP Agent EnabledCo

Seite 424

SYSTEM MANAGEMENT COMMANDS20-20The following example shows how to copy the running configuration to a startup file.The following example shows how to

Seite 425 - EGISTRATION

FILE MANAGEMENT COMMANDS20-21This example shows how to copy a public-key used by SSH from an TFTP server. Note that public key authentication via SSH

Seite 426

SYSTEM MANAGEMENT COMMANDS20-22deleteThis command deletes a file or image.Syntax delete filenamefilename - Name of configuration file or code image.De

Seite 427

FILE MANAGEMENT COMMANDS20-23dirThis command displays a list of files in flash memory.Syntax dir {{boot-rom: | config: | opcode:} [filename]}The type

Seite 428

SYSTEM MANAGEMENT COMMANDS20-24Example The following example shows how to display all file information:whichbootThis command displays which files were

Seite 429

FILE MANAGEMENT COMMANDS20-25boot systemThis command specifies the file or image used to start up the system.Syntax boot system {boot-rom| config | op

Seite 430

SYSTEM MANAGEMENT COMMANDS20-26Line CommandsYou can access the onboard configuration program by attaching a VT100 compatible device to the server’s se

Seite 431

LINE COMMANDS20-27lineThis command identifies a specific line for configuration, and to process subsequent line configuration commands.Syntax line {co

Seite 432 - Address Entries

SYSTEM MANAGEMENT COMMANDS20-28loginThis command enables password checking at login. Use the no form to disable password checking and allow connection

Seite 433

LINE COMMANDS20-29Example Related Commandsusername (22-2)password (20-29)passwordThis command specifies the password for a line. Use the no form to re

Seite 434 - Displaying the DNS Cache

INTRODUCTION1-11Virtual LANs Default VLAN 1PVID 1Acceptable Frame Type AllIngress Filtering DisabledSwitchport Mode (Egress Mode)Hybrid: tagged/untagg

Seite 435 - Figure 17-3 DNS Cache

SYSTEM MANAGEMENT COMMANDS20-30configuration file from a TFTP server. There is no need for you to manually configure encrypted passwords.Example Relat

Seite 436

LINE COMMANDS20-31Example To set the timeout to two minutes, enter this command:exec-timeoutThis command sets the interval that the system waits until

Seite 437

SYSTEM MANAGEMENT COMMANDS20-32password-threshThis command sets the password intrusion threshold which limits the number of failed logon attempts. Use

Seite 438

LINE COMMANDS20-33silent-timeThis command sets the amount of time the management console is inaccessible after the number of unsuccessful logon attemp

Seite 439 - Accessing the CLI

SYSTEM MANAGEMENT COMMANDS20-34Default Setting 8 data bits per characterCommand Mode Line Configuration Command Usage The databits command can be used

Seite 440

LINE COMMANDS20-35Command Usage Communication protocols provided by devices such as terminals and modems often require a specific parity bit setting.E

Seite 441 - Password:

SYSTEM MANAGEMENT COMMANDS20-36Example To specify 57600 bps, enter this command:stopbitsThis command sets the number of the stop bits transmitted per

Seite 442 - Console#show startup-config

LINE COMMANDS20-37Command Usage Specifying session identifier “0” will disconnect the console connection. Specifying any other identifiers for an acti

Seite 443 - Showing Commands

SYSTEM MANAGEMENT COMMANDS20-38Example To show all lines, enter this command:Console#show line Console configuration: Password threshold: 3 times I

Seite 444

EVENT LOGGING COMMANDS20-39Event Logging CommandsThis section describes commands used to configure event logging on the switch.logging onThis command

Seite 445 - Understanding Command Modes

vLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Seite 446

SYSTEM DEFAULTS1-12Multicast Filtering IGMP Snooping Snooping: EnabledQuerier: DisabledIGMP Filtering/Throttling DisabledMulticast VLAN Registration D

Seite 447 - Console#configure

SYSTEM MANAGEMENT COMMANDS20-40command to control the type of error messages that are stored in memory. You can use the logging trap command to contro

Seite 448 - Privileged Exec mode

EVENT LOGGING COMMANDS20-41Default Setting Flash: errors (level 3 - 0)RAM: warnings (level 7 - 0)Command Mode Global ConfigurationCommand Usage The me

Seite 449 - Command Line Processing

SYSTEM MANAGEMENT COMMANDS20-42Command Mode Global ConfigurationCommand Usage • Use this command more than once to build up a list of host IP addresse

Seite 450 - Command Groups

EVENT LOGGING COMMANDS20-43logging trapThis command enables the logging of system messages to a remote server, or limits the syslog messages saved to

Seite 451

SYSTEM MANAGEMENT COMMANDS20-44clear logThis command clears messages from the log buffer.Syntax clear log [flash | ram]• flash - Event history stored

Seite 452

EVENT LOGGING COMMANDS20-45show loggingThis command displays the configuration settings for logging messages to local switch memory, to an SMTP event

Seite 453 - Table 19-1 General Commands

SYSTEM MANAGEMENT COMMANDS20-46ExampleThe following example shows that system logging is enabled, the message level for flash memory is “errors” (i.e.

Seite 454

EVENT LOGGING COMMANDS20-47Related Commandsshow logging sendmail (20-52)show logThis command displays the log messages stored in local memory.Syntax s

Seite 455 - Console>

SYSTEM MANAGEMENT COMMANDS20-48SMTP Alert CommandsThese commands configure SMTP event handling, and forwarding of alert messages to the specified SMTP

Seite 456

SMTP ALERT COMMANDS20-49• To send email alerts, the switch first opens a connection, sends all the email alerts waiting in the queue one by one, and f

Seite 457 - Console#reload

2-1CHAPTER 2INITIAL CONFIGURATIONConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent offer

Seite 458 - Console(config-if)#end

SYSTEM MANAGEMENT COMMANDS20-50logging sendmail source-emailThis command sets the email address used for the “From” field in alert messages. Syntaxlog

Seite 459 - Username:

SMTP ALERT COMMANDS20-51Command Usage You can specify up to five recipients for alert messages. However, you must enter a separate command to specify

Seite 460 - Console#quit

SYSTEM MANAGEMENT COMMANDS20-52show logging sendmailThis command displays the settings for the SMTP event handler.Command Mode Normal Exec, Privileged

Seite 461

TIME COMMANDS20-53Time CommandsThe system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP). Maintaining an accura

Seite 462 - Device Designation Commands

SYSTEM MANAGEMENT COMMANDS20-54Command Usage • The time acquired from time servers is used to record accurate dates and times for log events. Without

Seite 463 - System Status Commands

TIME COMMANDS20-55Command Mode Global ConfigurationCommand Usage This command specifies time servers from which the switch will poll for time updates

Seite 464

SYSTEM MANAGEMENT COMMANDS20-56Related Commandssntp client (20-53)show sntpThis command displays the current time and configuration settings for the S

Seite 465 - Related Commands

TIME COMMANDS20-57clock timezoneThis command sets the time zone for the switch’s internal clock.Syntax clock timezone name hour hours minute minutes {

Seite 466

SYSTEM MANAGEMENT COMMANDS20-58calendar setThis command sets the system clock. It may be used if there is no time server on your network, or if you ha

Seite 467

TIME COMMANDS20-59Example Console#show calendar 15:12:34 February 1 2002Console#

Seite 468

CONNECTING TO THE SWITCH2-2The switch’s web interface, CLI configuration program, and SNMP agent allow you to perform the following management functio

Seite 469

SYSTEM MANAGEMENT COMMANDS20-60

Seite 470

21-1CHAPTER 21SNMP COMMANDSControls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as the

Seite 471 - Normal Exec, Privileged Exec

SNMP COMMANDS21-2snmp-serverThis command enables the SNMPv3 engine and services for all management clients (i.e., versions 1, 2c, 3). Use the no form

Seite 472

SHOW SNMP21-3show snmpThis command can be used to check the status of SNMP communications.Default Setting NoneCommand Mode Normal Exec, Privileged Exe

Seite 473 - System Mode Commands

SNMP COMMANDS21-4snmp-server communityThis command defines the SNMP v1 and v2c community access string. Use the no form to remove the specified commun

Seite 474

SNMP-SERVER CONTACT21-5snmp-server contactThis command sets the system contact string. Use the no form to remove the system contact information.Syntax

Seite 475 - Command Function Mode Page

SNMP COMMANDS21-6Command Mode Global ConfigurationExample Related Commandssnmp-server contact (21-5)snmp-server host This command specifies the recipi

Seite 476 - File Management Commands

SNMP-SERVER HOST21-7community command prior to using the snmp-server host command. (Maximum length: 32 characters)• version - Specifies whether to sen

Seite 477 - GC 20-25

SNMP COMMANDS21-8• Notifications are issued by the switch as trap messages by default. The recipient of a trap message does not send a response to the

Seite 478

SNMP-SERVER ENABLE TRAPS21-9user command. Otherwise, the authentication password and/or privacy password will not exist, and the switch will not autho

Seite 479

INITIAL CONFIGURATION2-3To connect a terminal to the console port, complete the following steps: 1. Connect the console cable to the serial port on a

Seite 480

SNMP COMMANDS21-10notifications are enabled. If you enter the command with a keyword, only the notification type related to that keyword is enabled. •

Seite 481

SNMP-SERVER ENGINE-ID21-11Command Mode Global ConfigurationCommand Usage • An SNMP engine is an independent SNMP agent that resides either on this swi

Seite 482 - Console#delete test2.cfg

SNMP COMMANDS21-12show snmp engine-idThis command shows the SNMP engine ID.Command Mode Privileged ExecExampleThis example shows the default engine ID

Seite 483

SNMP-SERVER VIEW21-13snmp-server viewThis command adds an SNMP view which controls user access to the MIB. Use the no form to remove an SNMP view.Synt

Seite 484

SNMP COMMANDS21-14This view includes the MIB-2 interfaces table, and the mask selects all index entries.show snmp viewThis command shows information o

Seite 485

SNMP-SERVER GROUP21-15snmp-server groupThis command adds an SNMP group, mapping SNMP users to SNMP views. Use the no form to remove an SNMP group.Synt

Seite 486 - Line Commands

SNMP COMMANDS21-16• For additional information on the notification messages supported by this switch, see Table 5-2, “Supported Notification Messages,

Seite 487 - Console(config-line)#

SHOW SNMP GROUP21-17Group Name: publicSecurity Model: v2cRead View: defaultviewWrite View: noneNotify View: noneStorage Type: volatileRow Status: acti

Seite 488

SNMP COMMANDS21-18snmp-server userThis command adds a user to an SNMP group, restricting the user to a specific SNMP Read, Write, or Notify View. Use

Seite 489

SNMP-SERVER USER21-19Command Usage • The SNMP engine ID is used to compute the authentication/privacy digests from the password. You should therefore

Seite 490

BASIC CONFIGURATION2-4Remote ConnectionsPrior to accessing the switch’s onboard agent via a network connection, you must first configure it with a val

Seite 491

SNMP COMMANDS21-20show snmp userThis command shows information on SNMP users.Command Mode Privileged ExecExample Console#show snmp userEngineId: 80000

Seite 492

22-1CHAPTER 22USER AUTHENTICATIONCOMMANDSYou can configure this switch to authenticate users logging into the system for management access using local

Seite 493

USER AUTHENTICATION COMMANDS22-2User Account CommandsThe basic commands required for management access are listed in this section. This switch also in

Seite 494

USER ACCOUNT COMMANDS22-3• password password - The authentication password for the user. (Maximum length: 8 characters plain text, 32 encrypted, case

Seite 495

USER AUTHENTICATION COMMANDS22-4enable passwordAfter initially logging onto the system, you should set the Privileged Exec password. Remember to recor

Seite 496

AUTHENTICATION SEQUENCE22-5Related Commandsenable (19-2)authentication enable (22-7)Authentication SequenceThree authentication methods can be specifi

Seite 497 - Console#disconnect 1

USER AUTHENTICATION COMMANDS22-6Command Usage • RADIUS uses UDP while TACACS+ uses TCP. UDP only offers best effort delivery, while TCP offers a conne

Seite 498

AUTHENTICATION SEQUENCE22-7authentication enableThis command defines the authentication method and precedence to use when changing from Exec command m

Seite 499 - Event Logging Commands

USER AUTHENTICATION COMMANDS22-8Example Related Commandsenable password - sets the password for changing command modes (22-4)RADIUS ClientRemote Authe

Seite 500 - Table 20-13 Logging Levels

RADIUS CLIENT22-9radius-server hostThis command specifies primary and backup RADIUS servers and authentication parameters that apply to each server. U

Seite 501

INITIAL CONFIGURATION2-5Access to both CLI levels are controlled by user names and passwords. The switch has a default user name and password for each

Seite 502

USER AUTHENTICATION COMMANDS22-10radius-server portThis command sets the RADIUS server network port. Use the no form to restore the default.Syntax rad

Seite 503

RADIUS CLIENT22-11Example radius-server retransmitThis command sets the number of retries. Use the no form to restore the default.Syntax radius-server

Seite 504 - Console#clear log

USER AUTHENTICATION COMMANDS22-12Command Mode Global ConfigurationExample show radius-serverThis command displays the current settings for the RADIUS

Seite 505

TACACS+ CLIENT22-13TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that uses software runn

Seite 506

USER AUTHENTICATION COMMANDS22-14tacacs-server portThis command specifies the TACACS+ server network port. Use the no form to restore the default.Synt

Seite 507

WEB SERVER COMMANDS22-15Example show tacacs-serverThis command displays the current settings for the TACACS+ server.Default Setting NoneCommand Mode P

Seite 508 - SMTP Alert Commands

USER AUTHENTICATION COMMANDS22-16ip http portThis command specifies the TCP port number used by the web browser interface. Use the no form to use the

Seite 509

WEB SERVER COMMANDS22-17Example Related Commandsip http port (22-16)ip http secure-serverThis command enables the secure hypertext transfer protocol (

Seite 510

USER AUTHENTICATION COMMANDS22-18• The client and server establish a secure encrypted connection.A padlock icon should appear in the status bar for In

Seite 511

WEB SERVER COMMANDS22-19Default Setting 443Command Mode Global ConfigurationCommand Usage • You cannot configure the HTTP and HTTPS servers to use the

Seite 512

BASIC CONFIGURATION2-64. Type “username admin password 0 password,” for the Privileged Exec level, where password is your new password. Press <Ente

Seite 513 - Time Commands

USER AUTHENTICATION COMMANDS22-20Telnet Server CommandsThis section describes commands used to configure Telnet management access to the switch.ip tel

Seite 514

SECURE SHELL COMMANDS22-21Secure Shell CommandsThis section describes the commands used to configure the SSH server. Note that you also need to instal

Seite 515 - Console(config)#sntp poll 60

USER AUTHENTICATION COMMANDS22-22Configuration GuidelinesThe SSH server on this switch supports both password and public key authentication. If passwo

Seite 516

SECURE SHELL COMMANDS22-231024 35 1341081685609893921040944920155425347631641921872958921143173880 055536161631051775940838686311092912322268285192543

Seite 517

USER AUTHENTICATION COMMANDS22-24c. If a match is found, the switch uses its secret key to generate a random 256-bit string as a challenge, encrypts t

Seite 518

SECURE SHELL COMMANDS22-25ip ssh serverThis command enables the Secure Shell (SSH) server on this switch. Use the no form to disable this service.Synt

Seite 519 - 15:12:34 February 1 2002

USER AUTHENTICATION COMMANDS22-26ip ssh timeoutThis command configures the timeout for the SSH server. Use the no form to restore the default setting.

Seite 520

SECURE SHELL COMMANDS22-27ip ssh authentication-retriesThis command configures the number of times the SSH server attempts to reauthenticate a user. U

Seite 521 - Table 21-1 SNMP Commands

USER AUTHENTICATION COMMANDS22-28Command Usage The server key is a private key that is never shared outside the switch. The host key is shared with th

Seite 522 - Console(config)#snmp-server

SECURE SHELL COMMANDS22-29Default Setting Generates both the DSA and RSA key pairs.Command Mode Privileged ExecCommand Usage • The switch uses only RS

Seite 523

INITIAL CONFIGURATION2-7Using the dedicated management port provides a back channel for troubleshooting when the switch cannot be reached through the

Seite 524

USER AUTHENTICATION COMMANDS22-30Command Mode Privileged ExecCommand Usage • This command clears the host key from volatile memory (RAM). Use the no i

Seite 525

SECURE SHELL COMMANDS22-31show ip sshThis command displays the connection settings used when authenticating client access to the SSH server.Command Mo

Seite 526

USER AUTHENTICATION COMMANDS22-32show public-keyThis command shows the public key for the specified user or for the host.Syntax show public-key [user

Seite 527

SECURE SHELL COMMANDS22-33Command Mode Privileged ExecCommand Usage • If no parameters are entered, all keys are displayed. If the user keyword is ent

Seite 528

USER AUTHENTICATION COMMANDS22-34802.1X Port AuthenticationThe switch supports IEEE 802.1X (dot1x) port-based access control that prevents unauthorize

Seite 529

802.1X PORT AUTHENTICATION22-35dot1x system-auth-controlThis command enables IEEE 802.1X port authentication globally on the switch. Use the no form t

Seite 530

USER AUTHENTICATION COMMANDS22-36dot1x max-reqThis command sets the maximum number of times the switch port will retransmit an EAP request/identity pa

Seite 531

802.1X PORT AUTHENTICATION22-37Defaultforce-authorizedCommand ModeInterface ConfigurationExampledot1x operation-modeThis command allows single or mult

Seite 532 - Privileged Exec

USER AUTHENTICATION COMMANDS22-38• In “multi-host” mode, only one host connected to a port needs to pass authentication for all other hosts to be gran

Seite 533

802.1X PORT AUTHENTICATION22-39dot1x re-authenticationThis command enables periodic re-authentication for a specified port. Use the no form to disable

Seite 534

BASIC CONFIGURATION2-89. Then follow the steps indicated in the next section to assign an IP address to this VLAN using manual configuration or automa

Seite 535 - 28. Maps to the defaultview

USER AUTHENTICATION COMMANDS22-40Default60 secondsCommand ModeInterface ConfigurationExampledot1x timeout re-authperiodThis command sets the time peri

Seite 536

802.1X PORT AUTHENTICATION22-41dot1x timeout tx-periodThis command sets the time that an interface on the switch waits during an authentication sessio

Seite 537

USER AUTHENTICATION COMMANDS22-42Command UsageThis command displays the following information:• Global 802.1X Parameters – Shows whether or not 802.1X

Seite 538

802.1X PORT AUTHENTICATION22-43- Port-control – Shows the dot1x mode on a port as auto, force-authorized, or force-unauthorized (page 22-36).- Supplic

Seite 539

USER AUTHENTICATION COMMANDS22-44ExampleConsole#show dot1xGlobal 802.1X Parameters system-auth-control: enable802.1X Port SummaryPort Name Status

Seite 540

MANAGEMENT IP FILTER COMMANDS22-45Management IP Filter CommandsThis section describes commands used to configure IP management access to the switch.ma

Seite 541

USER AUTHENTICATION COMMANDS22-46Command Usage • If anyone tries to access a management interface on the switch from an invalid address, the switch wi

Seite 542 - User Account Commands

MANAGEMENT IP FILTER COMMANDS22-47Command Mode Privileged ExecExampleConsole#show management all-clientManagement Ip Filter HTTP-Client: Start IP ad

Seite 543

USER AUTHENTICATION COMMANDS22-48

Seite 544

23-1CHAPTER 23CLIENT SECURITYCOMMANDSThis switch supports many methods of segregating traffic for clients attached to each of the data ports, and for

Seite 545 - Authentication Sequence

INITIAL CONFIGURATION2-9Before you can assign an IP address to the switch, you must obtain the following information from your network administrator:•

Seite 546

CLIENT SECURITY COMMANDS23-2Port Security CommandsThese commands can be used to enable port security on a port. When using port security, the switch s

Seite 547

PORT SECURITY COMMANDS23-3port securityThis command enables or configures port security. Use the no form without any keywords to disable port security

Seite 548 - RADIUS Client

CLIENT SECURITY COMMANDS23-4Command Usage • If you enable port security, the switch stops learning new MAC addresses on the specified port when it has

Seite 549 - 10 retransmit 5 key green

PACKET FILTERING COMMANDS23-5Packet Filtering CommandsThis section describes commands used to configure packet filtering for inbound traffic.Note: Pac

Seite 550

CLIENT SECURITY COMMANDS23-6Default Setting DisabledCommand Mode Global ConfigurationCommand Usage • Both the specified source MAC address and source

Seite 551

PACKET FILTERING COMMANDS23-7filter netbiosThis command filters NetBIOS30 packets entering the specified input port. Syntax filter netbios {add | del}

Seite 552

CLIENT SECURITY COMMANDS23-8• This switch provides a total of 7 masks for filtering functions, including IP-MAC address packet filtering, NetBIOS pack

Seite 553 - TACACS+ Client

PACKET FILTERING COMMANDS23-9packet filtering if enabled on any interface. This mask will be released for use by other filtering functions if DHCP pac

Seite 554

CLIENT SECURITY COMMANDS23-10for use by other filtering functions if DHCP packet filtering is disabled on all interfaces.Exampleshow filterThis comman

Seite 555 - Web Server Commands

IP SOURCE GUARD COMMANDS23-11IP Source Guard CommandsIP Source Guard is a security feature that filters IP traffic on network interfaces based on manu

Seite 556

viWARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE, CUSTOMER’S SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT OF THE PRODUCT IN

Seite 557

BASIC CONFIGURATION2-10To automatically configure the switch by communicating with BOOTP or DHCP address allocation servers on the network, complete t

Seite 558

CLIENT SECURITY COMMANDS23-12Default Setting DisabledCommand ModeInterface Configuration (Ethernet)Command Usage • Source guard is used to filter traf

Seite 559

IP SOURCE GUARD COMMANDS23-13found in the binding table and the entry type is static IP source guard binding, the packet will be forwarded.- If the DH

Seite 560 - Telnet Server Commands

CLIENT SECURITY COMMANDS23-14ip source-guard bindingThis command adds a static address to the source-guard binding table. Use the no form to remove a

Seite 561 - Secure Shell Commands

IP SOURCE GUARD COMMANDS23-15- If there is an entry with same VLAN ID and MAC address, and the type of entry is static IP source guard binding, then t

Seite 562

CLIENT SECURITY COMMANDS23-16show ip source-guard bindingThis command shows the source guard binding table.Command Mode Privileged ExecExampleConsole#

Seite 563

DHCP SNOOPING COMMANDS23-17DHCP Snooping CommandsDHCP snooping allows a switch to protect a network from rogue DHCP servers or other devices which sen

Seite 564

CLIENT SECURITY COMMANDS23-18ip dhcp snoopingThis command enables DHCP snooping globally. Use the no form to restore the default setting.Syntax [no] i

Seite 565 - Console(config)#ip ssh server

DHCP SNOOPING COMMANDS23-19forwarded for a trusted port. If the received packet is a DHCP ACK message, a dynamic DHCP snooping entry is also added to

Seite 566

CLIENT SECURITY COMMANDS23-20from a DHCP server, any packets received from untrusted ports are dropped.ExampleThis example enables DHCP snooping globa

Seite 567

DHCP SNOOPING COMMANDS23-21• When DHCP snooping is globally enabled, configuration changes for specific VLANs have the following effects:- If DHCP sno

Seite 568

INITIAL CONFIGURATION2-11Enabling SNMP Management Access The switch can be configured to accept management commands from Simple Network Management Pro

Seite 569

CLIENT SECURITY COMMANDS23-22Related Commands ip dhcp snooping (23-18)ip dhcp snooping vlan (23-20)ip dhcp snooping trust (23-24)ip dhcp snooping data

Seite 570

DHCP SNOOPING COMMANDS23-23Command Usage • This command applies to all VDSL ports. When set, it will automatically convert an address assigned to an a

Seite 571 - Server key size: 768 bits

CLIENT SECURITY COMMANDS23-24acknowledgement packets sent by the DHCP server in response to host requests will be blocked by the switch. ExampleThis e

Seite 572

DHCP SNOOPING COMMANDS23-25• Additional considerations when the switch itself is a DHCP client – The port(s) through which it submits a client request

Seite 573

CLIENT SECURITY COMMANDS23-26show ip dhcp snooping bindingThis command shows the DHCP snooping binding table entries.Command Mode Privileged ExecExamp

Seite 574 - 802.1X Port Authentication

24-1CHAPTER 24ACCESS CONTROL LISTCOMMANDSAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 protoc

Seite 575 - 802.1X P

ACCESS CONTROL LIST COMMANDS24-2IP ACLsThe commands in this section configure ACLs based on IP addresses, TCP/UDP port number, protocol type, and TCP

Seite 576

IP ACLS24-3access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. Use the no form to remov

Seite 577

ACCESS CONTROL LIST COMMANDS24-4permit, deny (Standard IP ACL) This command adds a rule to a Standard IP ACL. The rule sets a filter condition for pac

Seite 578 - Console#dot1x re-authenticate

IP ACLS24-5permit, deny (Extended IP ACL) This command adds a rule to an Extended IP ACL. The rule sets a filter condition for packets with specific s

Seite 579

BASIC CONFIGURATION2-12To prevent unauthorized access to the switch from SNMP version 1 or 2c clients, it is recommended that you change the default c

Seite 580

ACCESS CONTROL LIST COMMANDS24-6• control-flags – Decimal number (representing a bit string) that specifies flag bits in byte 14 of the TCP header. (R

Seite 581

IP ACLS24-7ExampleThis example accepts any incoming packets if the source address is within subnet 10.7.1.x. For example, if the rule is matched; i.e.

Seite 582

ACCESS CONTROL LIST COMMANDS24-8Example Related Commandspermit, deny 24-4ip access-group (24-14)access-list ip mask-precedence This command changes to

Seite 583

IP ACLS24-9Example Related Commandsmask (IP ACL) (24-9)ip access-group (24-14)mask (IP ACL)This command defines a mask for IP ACLs. This mask defines

Seite 584

ACCESS CONTROL LIST COMMANDS24-10Default SettingNoneCommand ModeIP MaskCommand Usage• Packets crossing a port are checked against all the rules in the

Seite 585 - Management IP Filter Commands

IP ACLS24-11This shows that the entries in the mask override the precedence in which the rules are entered into the ACL. In the following example, pac

Seite 586

ACCESS CONTROL LIST COMMANDS24-12This shows how to create an extended ACL with an egress mask to drop packets leaving network 171.69.198.0 when the La

Seite 587

IP ACLS24-13This is a more comprehensive example. It denies any TCP packets in which the SYN bit is ON, and permits all other packets. It then sets th

Seite 588

ACCESS CONTROL LIST COMMANDS24-14show access-list ip mask-precedence This command shows the ingress or egress rule masks for IP ACLs.Syntaxshow access

Seite 589

IP ACLS24-15Command Usage• A port can only be bound to one ACL.• If a port is already bound to an ACL and you bind it to a different ACL, the switch w

Seite 590 - Port Security Commands

INITIAL CONFIGURATION2-13Then press <Enter>. For a more detailed description of these parameters, see “snmp-server host” on page 21-6. The follo

Seite 591

ACCESS CONTROL LIST COMMANDS24-16MAC ACLsThe commands in this section configure ACLs based on hardware addresses, packet format, and Ethernet type. To

Seite 592

MAC ACLS24-17access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form to remove the specified ACL.Sy

Seite 593 - Packet Filtering Commands

ACCESS CONTROL LIST COMMANDS24-18permit, deny (MAC ACL)This command adds a rule to a MAC ACL. The rule filters packets matching a specified MAC source

Seite 594

MAC ACLS24-19• source – Source MAC address.• destination – Destination MAC address range with bitmask.• address-bitmask33 – Bitmask for MAC address (i

Seite 595

ACCESS CONTROL LIST COMMANDS24-20show mac access-list This command displays the rules for configured MAC ACLs.Syntaxshow mac access-list [acl_name]acl

Seite 596

MAC ACLS24-21Command Usage• You must configure a mask for an ACL rule before you can bind it to a port or set the queue or frame priorities associated

Seite 597

ACCESS CONTROL LIST COMMANDS24-22• ethertype – Check the Ethernet type field.• ethertype-bitmask – Ethernet type of rule must match this bitmask.Defau

Seite 598

MAC ACLS24-23ExampleThis example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of the rules have been

Seite 599 - IP Source Guard Commands

ACCESS CONTROL LIST COMMANDS24-24This example creates an Egress MAC ACL.show access-list mac mask-precedence This command shows the ingress or egress

Seite 600

MAC ACLS24-25mac access-groupThis command binds a port to a MAC ACL. Use the no form to remove the port.Syntaxmac access-group acl_name in• acl_name –

Seite 601

MANAGING SYSTEM FILES2-14Managing System FilesThe switch’s flash memory supports three types of system files that can be managed by the CLI program, w

Seite 602

ACCESS CONTROL LIST COMMANDS24-26show mac access-groupThis command shows the ports assigned to MAC ACLs.Command ModePrivileged ExecExample Related Com

Seite 603

ACL INFORMATION24-27Example show access-groupThis command shows the port assignments of IP ACLs.Command ModePrivileged ExecutiveExample Console#show a

Seite 604

ACCESS CONTROL LIST COMMANDS24-28

Seite 605 - DHCP Snooping Commands

25-1CHAPTER 25INTERFACE COMMANDSThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or VLAN. Tab

Seite 606

INTERFACE COMMANDS25-2interfaceThis command configures an interface type and enter interface configuration mode. Use the no form to remove a trunk.Syn

Seite 607

DESCRIPTION25-3descriptionThis command adds a description to an interface. Use the no form to remove the description.Syntax description stringno descr

Seite 608

INTERFACE COMMANDS25-4Default Setting • Auto-negotiation is permanently disabled on Ports 1-16, and enabled by default on Ports 17-19. • When auto-neg

Seite 609

NEGOTIATION25-5negotiationThis command enables autonegotiation for a given interface. Use the no form to disable autonegotiation.Syntax [no] negotiati

Seite 610

INTERFACE COMMANDS25-6capabilitiesThis command advertises the port capabilities of a given interface during autonegotiation. Use the no form with para

Seite 611

FLOWCONTROL25-7manually specify the link attributes with the speed-duplex and flowcontrol commands.Example The following example configures Ethernet p

Seite 612

INITIAL CONFIGURATION2-15In the system flash memory, one file of each type must be set as the start-up file. During a system boot, the diagnostic and

Seite 613

INTERFACE COMMANDS25-8• To force flow control on or off (with the flowcontrol or no flowcontrol command), use the no negotiation command to disable au

Seite 614

SWITCHPORT MDIX25-9• copper-forced - Always uses the built-in RJ-45 port.• sfp-forced - Always uses the SFP port (even if module not installed).• sfp-

Seite 615

INTERFACE COMMANDS25-10Command Mode Interface Configuration (Ethernet - Port 17-18)Command Usage Auto-negotiation must be enabled to use the “auto” op

Seite 616 - Table 24-2 IP ACL Commands

SWITCHPORT PACKET-RATE25-11Example The following example disables port 5.switchport packet-rateThis command configures broadcast and multicast and unk

Seite 617

INTERFACE COMMANDS25-12Example The following shows how to configure broadcast storm control at 600 packets per second: clear countersThis command clea

Seite 618

SHOW INTERFACES STATUS25-13show interfaces statusThis command displays the status for an interface.Syntax show interfaces status [interface]interface

Seite 619

INTERFACE COMMANDS25-14Example show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]interfac

Seite 620

SHOW INTERFACES COUNTERS25-15Command Mode Normal Exec, Privileged ExecCommand Usage If no interface is specified, information on all interfaces is dis

Seite 621

INTERFACE COMMANDS25-16show interfaces switchportThis command displays the administrative and operational status of the specified interfaces.Syntax sh

Seite 622 - permit host 10.1.1.21

SHOW INTERFACES SWITCHPORT25-17Table 25-2 show interfaces switchport - display descriptionField DescriptionBroadcast threshold Shows if broadcast sto

Seite 623 - Console(config-ip-mask-acl)#

MANAGING SYSTEM FILES2-16To save the current configuration settings, enter the following command:1. From the Privileged Exec mode prompt, type “copy r

Seite 624

INTERFACE COMMANDS25-18

Seite 625

26-1CHAPTER 26LINK AGGREGATIONCOMMANDSPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth of a network conn

Seite 626

LINK AGGREGATION COMMANDS26-2Guidelines for Creating TrunksGeneral Guidelines –• Finish configuring port trunks before you connect the corresponding n

Seite 627

CHANNEL-GROUP26-3• If the port channel admin key (lacp admin key - Port Channel) is not set when a channel group is formed (i.e., it has the null valu

Seite 628 - mask 255.255.255.0 any

LINK AGGREGATION COMMANDS26-4Example The following example creates trunk 1 and then adds port 11:lacpThis command enables 802.3ad Link Aggregation Con

Seite 629

LACP26-5ExampleThe following shows LACP enabled on ports 10-12. Because LACP has also been enabled on the ports at the other end of the links, the sho

Seite 630 - Table 24-3 MAC ACL Commands

LINK AGGREGATION COMMANDS26-6lacp system-priorityThis command configures a port's LACP system priority. Use the no form to restore the default se

Seite 631

LACP ADMIN-KEY (ETHERNET INTERFACE)26-7lacp admin-key (Ethernet Interface)This command configures a port's LACP administration key. Use the no fo

Seite 632

LINK AGGREGATION COMMANDS26-8lacp admin-key (Port Channel)This command configures a port channel's LACP administration key string. Use the no for

Seite 633

LACP PORT-PRIORITY26-9lacp port-priorityThis command configures LACP port priority. Use the no form to restore the default setting.Syntax lacp {actor

Seite 634 - MAC access-list jerry:

SECTION IISWITCH MANAGEMENTThis section describes the basic switch features, along with a detailed description of how to configure each feature via a

Seite 635 - Console(config-mac-mask-acl)#

LINK AGGREGATION COMMANDS26-10show lacpThis command displays LACP information.Syntax show lacp [port-channel] {counters | internal | neighbors | sys-i

Seite 636

SHOW LACP26-11Table 26-2 show lacp counters - display descriptionField DescriptionLACPDUs Sent Number of valid LACPDUs transmitted from this channel

Seite 637

LINK AGGREGATION COMMANDS26-12LACPDUs InternalNumber of seconds before invalidating received LACPDU information.LACP System PriorityLACP system priori

Seite 638

SHOW LACP26-13Console#show lacp 1 neighborsPort channel 1 neighbors-------------------------------------------------------------------Eth 1/1---------

Seite 639

LINK AGGREGATION COMMANDS26-14Console#show lacp sysidPort Channel System Priority System MAC Address-------------------------------------------

Seite 640

27-1CHAPTER 27MIRROR PORT COMMANDSThis section describes how to mirror traffic from a source port to a target port. port monitorThis command configure

Seite 641 - Privileged Executive

MIRROR PORT COMMANDS27-2Command Usage • You can mirror traffic from any source port to a destination port for real-time analysis. You can then attach

Seite 642

SHOW PORT MONITOR27-3Command Usage This command displays the currently configured source port, destination port, and mirror mode (i.e., RX, TX, RX/TX)

Seite 643

MIRROR PORT COMMANDS27-4

Seite 644

28-1CHAPTER 28RATE LIMIT COMMANDSThis function allows the network manager to control the maximum rate for traffic transmitted or received on an interf

Seite 645

SWITCH MANAGEMENT

Seite 646

RATE LIMIT COMMANDS28-2rate-limitThis command defines the rate limit for a specific interface. Use this command without specifying a rate to restore t

Seite 647

RATE-LIMIT TRAP-INPUT28-3rate-limit trap-inputThis command sets an SNMP trap if traffic exceeds the configured rate limit. Use the no form to restore

Seite 648

RATE LIMIT COMMANDS28-4• For further information on the type of notification messages that can be sent by the system, refer to the information about t

Seite 649

29-1CHAPTER 29VDSL COMMANDSVDSL communication parameters can be set for individual ports, or multiple parameters can be defined in a profile and appli

Seite 650

VDSL COMMANDS29-2Long-Reach Ethernet CommandsThis section describes how to configure communication parameters for VDSL ports such as specifying data b

Seite 651

LONG-REACH ETHERNET COMMANDS29-3lre max-power Sets the maximum aggregate downstream or upstream powerGC/IC 29-22lre min-protection Configures the mini

Seite 652

VDSL COMMANDS29-4lre band-planThis command sets the frequency bands used for VDSL signals based on a set of predefined plans. Use the no form to resto

Seite 653 - Console(config-if)#shutdown

LONG-REACH ETHERNET COMMANDS29-5ExampleThis example sets the band plan to 998-640-30000.Related Commandsshow lre (29-79)Table 29-3 VDSL2 Band PlansIn

Seite 654

VDSL COMMANDS29-6lre option-bandThis command sets the frequencies to be used for the optional Upstream Band 0 (US0). Use the no form to restore the de

Seite 655 - INTERFACES

LONG-REACH ETHERNET COMMANDS29-7lre ham-bandThis command sets the Handheld Amateur Radio (HAM) band that will be blocked to VDSL signals based on defi

Seite 656

3-1CHAPTER 3CONFIGURING THE SWITCHUsing the Web InterfaceThis switch provides an embedded HTTP web agent. Using a web browser you can configure the sw

Seite 657 - COUNTERS

VDSL COMMANDS29-84 RFI-BAND04 3.500 - 3.575 MHz ANNEX F5 RFI-BAND05 3.500 - 3.800 MHz ETSI6 RFI-BAND06 3.500 - 4.000 MHz T1E17 RFI-BAND07 3.747 - 3.75

Seite 658

LONG-REACH ETHERNET COMMANDS29-9ExampleThis example sets a HAM band notch in the transmitted power spectrum in the 10.000 - 10.150 MHz transmission ba

Seite 659 - SWITCHPORT

VDSL COMMANDS29-10• Using a HAM band mask prevents interference with other systems (e.g., amateur radio) that use narrow band transmission in the VDSL

Seite 660

LONG-REACH ETHERNET COMMANDS29-1118 RFI-BAND18 10.005 - 10.100 MHz Aeronautical Communications19 RFI-BAND19 10.100 - 10.150 MHz Amateur Radio20 RFI-BA

Seite 661 - GGREGATION

VDSL COMMANDS29-12ExampleThis example sets a HAM band notch in the transmitted power spectrum to avoid interference with CB radios.Related Commandssho

Seite 662

LONG-REACH ETHERNET COMMANDS29-13PSD Mask required for compliance with local regulations, or set mask limits for upstream power backoff. The methods u

Seite 663

VDSL COMMANDS29-14Command Mode Global ConfigurationInterface Configuration (VDSL Port)Command Usage • Enter this command in global configuration mode

Seite 664 - Console(config-if)#exit

LONG-REACH ETHERNET COMMANDS29-15lre psd-valueThis command defines a power level for each of the PSD breakpoints. Use the no form to restore the defau

Seite 665

VDSL COMMANDS29-16ExampleThe following sets a PSD value for the frequency band bounded by breakpoints 1 and 2 to -20 dBm/Hz on VDSL port 1.Related Com

Seite 666

LONG-REACH ETHERNET COMMANDS29-17• The following table lists the predefined band plans.ExampleThe following specifies a predefined mask based on Annex

Seite 667

viiTABLE OF CONTENTSSection I Getting Started1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1Key Features . .

Seite 668

CONFIGURING THE SWITCH3-2Notes: 1. You are allowed three attempts to enter the correct password; on the third failed attempt the current connection is

Seite 669 - PRIORITY

VDSL COMMANDS29-18lre pbo-configThis command sets a mask to reduce the power spectral density (PSD) of transmitted signals at specified frequency brea

Seite 670

LONG-REACH ETHERNET COMMANDS29-19• The transceiver will adjust its transmitted signal to conform to the power limitations set by the lre pbo-config co

Seite 671

VDSL COMMANDS29-20Command Usage • Enter this command in global configuration mode to enable upstream power backoff for all VDSL ports, or in interface

Seite 672

LONG-REACH ETHERNET COMMANDS29-21lre toneThis command disables VDSL signals at frequencies less than or equal to 640 KHz, 1.1 MHz or 2.2 MHz. Use the

Seite 673

VDSL COMMANDS29-22ExampleThe following disables all tone beneath 640 kHz on the upstream band plan.Related Commandsshow lre tone (29-71)lre max-powerT

Seite 674

LONG-REACH ETHERNET COMMANDS29-23ExampleThe following sets the maximum downstream power on port 1 to 14.5 dBm.lre min-protectionThis command configure

Seite 675

VDSL COMMANDS29-24• Note that this parameter only applies to interleaved channels. Refer to ITU-T G.993.2 for a full description of the methods used t

Seite 676

LONG-REACH ETHERNET COMMANDS29-25Related Commandslre interleave-max-delay (29-25)lre interleave-max-delayThis command sets the maximum interleave dela

Seite 677

VDSL COMMANDS29-26Related Commandslre channel (29-24)show lre interleave-max-delay (29-72)lre datarateThis command specifies the minimum and maximum d

Seite 678

LONG-REACH ETHERNET COMMANDS29-27ExampleThe following sets the minimum and maximum data rates for the downstream fast channel on port 1.Related Comman

Seite 679

NAVIGATING THE WEB BROWSER INTERFACE3-3Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and pa

Seite 680

VDSL COMMANDS29-28Related Commandslre datarate (29-26)lre noise-mgn targetThis command configures the targeted signal-to-noise margin that VDSL ports

Seite 681

LONG-REACH ETHERNET COMMANDS29-29lre noise-mgn minThis command configures the minimum acceptable signal-to-noise margin. Use the no form to restore th

Seite 682

VDSL COMMANDS29-30lre shutdownThis command shuts down a VDSL port. Use the no form to re-enabled a port.Syntax[no] lre shutdownDefault Setting All VDS

Seite 683 - Table 29-1 VDSL Commands

LONG-REACH ETHERNET COMMANDS29-31Command Mode Interface Configuration (VDSL Port)Command Usage Use this command to troubleshoot VDSL connection or per

Seite 684 - Long-Reach Ethernet Commands

VDSL COMMANDS29-32Related Commandslre datarate (29-26)lre retrainingThis command manually initiates the rate adaptation method to find the optimal tra

Seite 685

LONG-REACH ETHERNET COMMANDS29-33lre rate-adaptionThis command enables automatic line rate adaptation, which can set the optimal transmission rate bas

Seite 686

VDSL COMMANDS29-34Related Commandslre datarate (29-26)show lre rate-adaption (29-75)lre applyThis command applies all global VDSL settings to each VDS

Seite 687

LINE PROFILE COMMANDS29-35Line Profile Commands This section describes how to configure a list of communication parameters such as data rates and acce

Seite 688

VDSL COMMANDS29-36line-profileThis command enters VDSL Line Profile configuration mode. Syntaxline-profile profile-nameprofile-name – Name of the prof

Seite 689 - Table 29-4 HAM Band Notches

LINE PROFILE COMMANDS29-37ExampleThe following creates a VDSL line profile named southport.Related Commandsshow lre line-profile (29-77)lre line-profi

Seite 690

CONFIGURING THE SWITCH3-4Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration change has been made

Seite 691

VDSL COMMANDS29-38ExampleThe following applies the line profile named southport to all VDSL ports.band-planThis command sets the frequency bands used

Seite 692

LINE PROFILE COMMANDS29-39option-bandThis command sets the frequencies to be used for optional Upstream Band 0 (US0). Use the no form to restore the d

Seite 693

VDSL COMMANDS29-40ham-bandThis command sets the Handheld Amateur Radio (HAM) band that will be blocked to VDSL signals based on defined frequencies. U

Seite 694

LINE PROFILE COMMANDS29-41region-ham-bandThis command sets the ham radio band that will be blocked to VDSL signals based on defined usage types. Use t

Seite 695

VDSL COMMANDS29-42toneThis command disables VDSL signals at frequencies less than or equal to 640 KHz, 1.1 MHz or 2.2 MHz. Use the no form to restore

Seite 696

LINE PROFILE COMMANDS29-43ExampleThe following disables all tone beneath 640 kHz on the upstream band plan.Related Commandslre tone (29-21)max-powerTh

Seite 697

VDSL COMMANDS29-44min-protectionThis command configures the minimum level of impulse noise protection for all bearer channels. Use the no form to rest

Seite 698

LINE PROFILE COMMANDS29-45Related Commandslre min-protection (29-23)channelThis command sets the channel mode to fast or interleaved. Use the no form

Seite 699 - Table 29-6 PSD Mask Options

VDSL COMMANDS29-46down/up-max-inter-delayThese commands set the maximum interleave delay on a downstream/upstream channel. Use the no form to restore

Seite 700

LINE PROFILE COMMANDS29-47Related Commandslre interleave-max-delay (29-25)down/up-fast/slow-max/min-datarateThese commands set the maximum/minimum dat

Seite 701

NAVIGATING THE WEB BROWSER INTERFACE3-5Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all

Seite 702 - Console(config-if)#lre upbo

VDSL COMMANDS29-48ExampleThe following sets the minimum and maximum data rates for the downstream fast channel on port 1.Related Commandslre datarate

Seite 703

LINE PROFILE COMMANDS29-49ExampleThe following sets an SNR of 12 dB for the downstream channels and 18 dB for the upstream channels.Related Commandslr

Seite 704 - Console(config)#lre tone tx 2

VDSL COMMANDS29-50• When rate adaptation is enabled (see Command Usage, page 29-32), the signal-to-noise ratio (SNR) is an indicator of link quality.

Seite 705

ALARM PROFILE COMMANDS29-51Alarm Profile CommandsThis section describes how to configure a list of threshold values for error states which can be appl

Seite 706

VDSL COMMANDS29-52alarm-profileThis command enters VDSL Alarm Profile configuration mode. Use the no form to delete an alarm profile.Syntax[no] alarm-

Seite 707

ALARM PROFILE COMMANDS29-53Command Usage First create a profile of VDSL alarm thresholds using the other commands described in this section, then ente

Seite 708

VDSL COMMANDS29-54the status of remote transceivers is obtained via the embedded operation channel (EOC), this information may be unavailable for unit

Seite 709

ALARM PROFILE COMMANDS29-55Command Usage • An Errored Second is a one-second interval containing one or more CRC anomalies, or one or more Loss of Sig

Seite 710

VDSL COMMANDS29-56Command Usage This command sets the threshold for the number of seconds during which there is loss of framing within any 15 minute c

Seite 711

ALARM PROFILE COMMANDS29-57notification will be generated. (Refer to RFC 3728 for information on this notification message.) No more than one notifica

Seite 712

CONFIGURING THE SWITCH3-6Reset Restarts the switch 4-36SNTP 4-37Configuration Configures SNTP client settings, including a specified list of servers4-

Seite 713

VDSL COMMANDS29-58ExampleThe following sets the LOSs threshold to 15.thresh-15min-lprsThis command sets the threshold for Loss of Power Seconds (LPRs)

Seite 714

ALARM PROFILE COMMANDS29-59thresh-15min-sessThis command sets the threshold for Severely Errored Seconds (SESs) that can occur within any given 15 min

Seite 715

VDSL COMMANDS29-60thresh-15min-uassThis command sets the threshold for Unavailable Seconds (UASs) that can occur within any given 15 minutes. Use the

Seite 716 - Console(config-if)#lre apply

DISPLAYING VDSL INFORMATION29-61Displaying VDSL InformationThis section describes the commands used to display information on VDSL configuration setti

Seite 717 - Line Profile Commands

VDSL COMMANDS29-62show lre band-planThis command displays the frequency bands used for VDSL signals.Syntaxshow lre band-plan [unit/port]• unit - Stack

Seite 718

DISPLAYING VDSL INFORMATION29-63Command Usage • Use this command without the interface parameter to display the band plans used for all VDSL ports on

Seite 719

VDSL COMMANDS29-64Command Usage • Use this command without the interface parameter to display the optional US0 band used for all VDSL ports on the swi

Seite 720 - Console(config-line-profile)#

DISPLAYING VDSL INFORMATION29-65ExampleThis example shows that the HAM band in the 1.810 - 1.825 MHz range is blocked to VDSL signals for Port 1.Relat

Seite 721

VDSL COMMANDS29-66Command Usage • Use this command without the interface parameter to display the HAM band usage filter used for all VDSL ports on the

Seite 722

DISPLAYING VDSL INFORMATION29-67Related Commandslre region-ham-band (29-9)show lre psdThis command displays the power level set for each of the PSD br

Seite 723

NAVIGATING THE WEB BROWSER INTERFACE3-7 802.1X Port authentication 6-19Information Displays global configuration settings 6-21Configuration Configure

Seite 724

VDSL COMMANDS29-68Related Commandslre psd-breakpoints (29-12)lre psd-frequencies (29-13)lre psd-value (29-15)show lre psd-mask-levelThis command displ

Seite 725

DISPLAYING VDSL INFORMATION29-69Command Usage • Use this command without the interface parameter to display the predefined PSD mask used for all VDSL

Seite 726

VDSL COMMANDS29-70ExampleThis example shows that the UPBO mask used for all upstream traffic. Related Commandslre pbo-config (29-18)show lre upboThis

Seite 727

DISPLAYING VDSL INFORMATION29-71transceiver will automatically control upstream power backoff based on default values set by the DSP engine.ExampleThi

Seite 728

VDSL COMMANDS29-72Related Commandslre tone (29-21)show lre interleave-max-delayThis command displays the maximum interleave-delay that can be used for

Seite 729

DISPLAYING VDSL INFORMATION29-73show lre datarateThis command displays the minimum and maximum data rate for downstream and upstream fast or slow (int

Seite 730

VDSL COMMANDS29-74show lre noise-mgnThis command displays the targeted signal-to-noise margin that VDSL ports must achieve to successfully complete in

Seite 731

DISPLAYING VDSL INFORMATION29-75show lre rate-adaptionThis command shows if line rate adaptation which sets the optimal transmission rate based on exi

Seite 732

VDSL COMMANDS29-76show lre configThis command shows the VDSL configuration settings for an interface.Syntaxshow lre config [unit/port]• unit - Stack u

Seite 733 - Alarm Profile Commands

DISPLAYING VDSL INFORMATION29-77Related Commandslre apply (29-34)show lre line-profileThis command displays a specified line profile which may be appl

Seite 734

CONFIGURING THE SWITCH3-8Trunk Configuration Configures trunk connection settings 9-4Trunk Membership Specifies ports to group into static trunks 9-9

Seite 735

VDSL COMMANDS29-78Related Commandsline-profile (29-36)lre line-profile (29-37)show lre alarm-profileThis command displays a specified alarm profile wh

Seite 736

DISPLAYING VDSL INFORMATION29-79show lreThis command displays the communication status of the VDSL line.Syntaxshow lre unit/port• unit - Stack unit. (

Seite 737

VDSL COMMANDS29-80show lre phys-infoThis command displays physical layer information about the VDSL line.Syntaxshow lre phys-info unit/port• unit - St

Seite 738

DISPLAYING VDSL INFORMATION29-81Exampleshow lre rate-infoThis command displays rate information for the VDSL line.Syntaxshow lre rate-info [unit/port]

Seite 739

VDSL COMMANDS29-82Exampleshow lre perfThis command displays performance information including common error conditions over predefined intervals for th

Seite 740

DISPLAYING VDSL INFORMATION29-83Command Usage Use this command without the interface parameter to show performance information for all VDSL ports on t

Seite 741

VDSL COMMANDS29-84Loss of power Number of seconds during which there was loss of powerErrored seconds Number of seconds during which there was one or

Seite 742

DISPLAYING VDSL INFORMATION29-85Ethernet Transmit Performance Counters Frames Number of frames (unicast, broadcast and multicast) transmitted.Bytes Nu

Seite 743 - Displaying VDSL Information

VDSL COMMANDS29-86CPE ConfigurationThis section describes operation and maintenance (OAM) functions for remote customer premises equipment (CPE), incl

Seite 744

CPE CONFIGURATION29-87Exampleefm remote eeprom-writeThis command enables firmware upgrade on the CPE. Syntax efm remote eeprom-write {enable | disable

Seite 745

NAVIGATING THE WEB BROWSER INTERFACE3-9VDSL 10-1Global Configuration Configures global VDSL variables which can be applied to all ports10-1VDSL Port

Seite 746

VDSL COMMANDS29-88ExampleThis example shows how to copy BME firmware for CPEs to a reserved buffer on the switch, copy this firmware to a remote CPE,

Seite 747

CPE CONFIGURATION29-89Console#configureConsole(config)#interface ethernet 1/16Console(config-if)#oam remote upgrade firmwareConsole(config)#endConsole

Seite 748

VDSL COMMANDS29-90Related Commandsoam remote upgrade firmware (page 29-90)oam remote firmware active (page 29-90)oam remote upgrade firmwareThis comma

Seite 749

CPE CONFIGURATION29-91Command Usage • BME indicates the Burst Mode Engine used for digital signal processing.• This command activates the firmware ver

Seite 750

VDSL COMMANDS29-92ExampleConsole#show cpe-info 1/1Protocol ID: Ikanos EOC ProtocolProtocol Version - Major: 01Protocol Version - Minor:

Seite 751

30-1CHAPTER 30ADDRESS TABLE COMMANDSThese commands are used to configure the address table for filtering specified addresses, displaying current entri

Seite 752

ADDRESS TABLE COMMANDS30-2mac-address-table staticThis command maps a static address to a destination port in a VLAN. Use the no form to remove an add

Seite 753

CLEAR MAC-ADDRESS-TABLE DYNAMIC30-3• A static address cannot be learned on another port until the address is removed with the no form of this command.

Seite 754

ADDRESS TABLE COMMANDS30-4show mac-address-tableThis command shows classes of entries in the bridge-forwarding database.Syntax show mac-address-table

Seite 755

MAC-ADDRESS-TABLE AGING-TIME30-5• The maximum number of address entries is 8191.Examplemac-address-table aging-timeThis command sets the aging time fo

Seite 756

CONFIGURING THE SWITCH3-10Spanning Tree 12-1STA Information Displays STA values used for the bridge 12-4Configuration Configures global bridge settin

Seite 757

ADDRESS TABLE COMMANDS30-6show mac-address-table aging-timeThis command shows the aging time for entries in the address table.Default Setting NoneComm

Seite 758

31-1CHAPTER 31SPANNING TREE COMMANDSThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the switch, and comma

Seite 759

SPANNING TREE COMMANDS31-2revision Configures the revision number for the multiple spanning treeMST 31-14max-hops Configures the maximum number of hop

Seite 760

SPANNING-TREE31-3spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Syntax [no] span

Seite 761

SPANNING TREE COMMANDS31-4spanning-tree modeThis command selects the spanning tree mode for this switch. Use the no form to restore the default.Syntax

Seite 762

SPANNING-TREE FORWARD-TIME31-5restarts the migration delay timer and begins using RSTP BPDUs on that port.• Multiple Spanning Tree Protocol- To allow

Seite 763

SPANNING TREE COMMANDS31-6Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., discar

Seite 764

SPANNING-TREE MAX-AGE31-7Related Commandsspanning-tree forward-time (31-5)spanning-tree max-age (31-7)spanning-tree max-ageThis command configures the

Seite 765 - Field Description

SPANNING TREE COMMANDS31-8Related Commandsspanning-tree forward-time (31-5)spanning-tree hello-time (31-6)spanning-tree priorityThis command configure

Seite 766

SPANNING-TREE PATHCOST METHOD31-9spanning-tree pathcost methodThis command configures the path cost method used for Rapid Spanning Tree and Multiple S

Seite 767

NAVIGATING THE WEB BROWSER INTERFACE3-11Static Membership by PortConfigures membership type for interfaces, including tagged, untagged or forbidden13-

Seite 768 - CPE Configuration

SPANNING TREE COMMANDS31-10spanning-tree transmission-limitThis command configures the minimum interval between the transmission of consecutive RSTP/M

Seite 769

MST VLAN31-11Related Commands mst vlan (31-11)mst priority (31-12)name (31-13)revision (31-14)max-hops (31-14)mst vlanThis command adds VLANs to a spa

Seite 770

SPANNING TREE COMMANDS31-12instance (on each bridge) with the same set of VLANs. Also, note that RSTP treats each MSTI region as a single node, connec

Seite 771

NAME31-13Example nameThis command configures the name for the multiple spanning tree region in which this switch is located. Use the no form to clear

Seite 772

SPANNING TREE COMMANDS31-14revisionThis command configures the revision number for this multiple spanning tree configuration of this switch. Use the n

Seite 773

SPANNING-TREE SPANNING-DISABLED31-15Default Setting 20Command Mode MST ConfigurationCommand Usage An MSTI region is treated as a single node by the ST

Seite 774

SPANNING TREE COMMANDS31-16Example This example disables the spanning tree algorithm for port 5.spanning-tree costThis command configures the spanning

Seite 775

SPANNING-TREE COST31-17Default Setting By default, the system automatically detects the speed and duplex mode used on each port, and configures the pa

Seite 776

SPANNING TREE COMMANDS31-18spanning-tree port-priorityThis command configures the priority for the specified interface. Use the no form to restore the

Seite 777

SPANNING-TREE PORTFAST31-19Default Setting DisabledCommand Mode Interface Configuration (Ethernet, Port Channel)Command Usage • You can enable this op

Seite 778

TABLE OF CONTENTSviiiMain Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-54 Basic Management Tasks . .

Seite 779

CONFIGURING THE SWITCH3-12IPv6 Mapping Assigns IPv6 traffic classes to one of the Class-of-Service values14-15IP Port Priority Status Globally enable

Seite 780 - Aging time: 300 sec

SPANNING TREE COMMANDS31-20Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • This command is used to enable/disable the fas

Seite 781

SPANNING-TREE LINK-TYPE31-21spanning-tree link-typeThis command configures the link type for Rapid Spanning Tree and Multiple Spanning Tree. Use the n

Seite 782

SPANNING TREE COMMANDS31-22spanning-tree mst costThis command configures the path cost on a spanning instance in the Multiple Spanning Tree. Use the n

Seite 783 - Console(config)#spanning-tree

SPANNING-TREE MST PORT-PRIORITY31-23should be assigned to interfaces attached to faster media, and higher values assigned to interfaces with slower me

Seite 784 -

SPANNING TREE COMMANDS31-24Where more than one interface is assigned the highest priority, the interface with lowest numeric identifier will be enable

Seite 785

SHOW SPANNING-TREE31-25Example show spanning-treeThis command shows the configuration for the common spanning tree (CST) or for an instance within the

Seite 786

SPANNING TREE COMMANDS31-26description of the items displayed for specific interfaces, see “Displaying Interface Settings” on page 12-13.ExampleConsol

Seite 787

SHOW SPANNING-TREE MST CONFIGURATION31-27show spanning-tree mst configurationThis command shows the configuration of the multiple spanning tree.Comman

Seite 788

SPANNING TREE COMMANDS31-28

Seite 789

32-1CHAPTER 32VLAN COMMANDSA VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong to the same p

Seite 790 - Console(config-mstp)#

NAVIGATING THE WEB BROWSER INTERFACE3-13IGMP Filter/Throttling Trunk ConfigurationAssigns IGMP filter profiles to trunk interfaces and sets throttle m

Seite 791

VLAN COMMANDS32-2GVRP and Bridge Extension CommandsGARP VLAN Registration Protocol defines a way for switches to exchange VLAN information in order to

Seite 792

GVRP AND BRIDGE EXTENSION COMMANDS32-3Command Usage GVRP defines a way for switches to exchange VLAN information in order to register VLAN members on

Seite 793

VLAN COMMANDS32-4switchport gvrpThis command enables GVRP for a port. Use the no form to disable it.Syntax [no] switchport gvrpDefault Setting Disable

Seite 794

GVRP AND BRIDGE EXTENSION COMMANDS32-5garp timerThis command sets the values for the join, leave and leaveall timers. Use the no form to restore the t

Seite 795

VLAN COMMANDS32-6Example Related Commandsshow garp timer (32-6)show garp timerThis command shows the GARP timers for the selected interface.Syntax sho

Seite 796

EDITING VLAN GROUPS32-7Editing VLAN Groupsvlan databaseThis command enters VLAN database mode. All commands in this mode will take effect immediately.

Seite 797 - SPANNING

VLAN COMMANDS32-8vlanThis command configures a VLAN. Use the no form to restore the default settings or delete a VLAN.Syntax vlan vlan-id [name vlan-n

Seite 798

CONFIGURING VLAN INTERFACES32-9Related Commands show vlan (32-16)Configuring VLAN Interfacesinterface vlanThis command enters interface configuration

Seite 799

VLAN COMMANDS32-10Default Setting NoneCommand Mode Global ConfigurationExample The following example shows how to set the interface configuration mode

Seite 800

CONFIGURING VLAN INTERFACES32-11Example The following shows how to set the configuration mode to port 1, and then set the switchport mode to hybrid:Re

Seite 801

CONFIGURING THE SWITCH3-14

Seite 802

VLAN COMMANDS32-12Related Commandsswitchport mode (32-10)switchport ingress-filtering This command enables ingress filtering for an interface. Use the

Seite 803

CONFIGURING VLAN INTERFACES32-13switchport native vlanThis command configures the PVID (i.e., default VLAN ID) for a port. Use the no form to restore

Seite 804

VLAN COMMANDS32-14switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the default.Syntax

Seite 805

CONFIGURING VLAN INTERFACES32-15• If a VLAN on the forbidden list for an interface is manually added to that interface, the VLAN is automatically remo

Seite 806

VLAN COMMANDS32-16Example The following example shows how to prevent port 1 from being added to VLAN 3:Displaying VLAN InformationThis section describ

Seite 807

CONFIGURING PRIVATE VLANS32-17Example The following example shows how to display information for VLAN 1:Configuring Private VLANsPrivate VLANs provide

Seite 808

VLAN COMMANDS32-18Default Setting No private VLANs are defined.No default group exists.Command Mode Global ConfigurationCommand Usage• A private VLAN

Seite 809 - Table 32-1 VLAN Commands

CONFIGURING PRIVATE VLANS32-19show pvlanThis command displays the configured private VLAN.Command Mode Privileged ExecExampleThis example shows the in

Seite 810

VLAN COMMANDS32-20Configuring Protocol-based VLANsThe network devices required to support multiple protocols cannot be easily grouped into a common VL

Seite 811 - XTENSION

CONFIGURING PROTOCOL-BASED VLANS32-213. Then map the protocol for each interface to the appropriate VLAN using the protocol-vlan protocol-group comman

Seite 812

4-1CHAPTER 4BASIC MANAGEMENT TASKSThis chapter describes the basic functions required to set up management access to the switch, display or upgrade op

Seite 813

VLAN COMMANDS32-22protocol-vlan protocol-group (Configuring Interfaces)This command maps a protocol group to a VLAN for the current interface. Use the

Seite 814

CONFIGURING PROTOCOL-BASED VLANS32-23Example The following example maps the traffic entering Port 1 which matches the protocol type specified in proto

Seite 815 - Editing VLAN Groups

VLAN COMMANDS32-24show interfaces protocol-vlan protocol-groupThis command shows the mapping from protocol groups to VLANs for the selected interfaces

Seite 816 - Console(config-vlan)#

CONFIGURING IEEE 802.1Q TUNNELING32-25Configuring IEEE 802.1Q TunnelingQinQ tunneling uses a single Service Provider VLAN (SPVLAN) for customers who h

Seite 817 - Configuring VLAN Interfaces

VLAN COMMANDS32-265. Configure the QinQ tunnel port to join the SPVLAN as an untagged member (switchport allowed vlan, page 32-14).6. Configure the SP

Seite 818

CONFIGURING IEEE 802.1Q TUNNELING32-27• The packet must have a standard ethertype value of 0x8100 for this command to take effect. Otherwise, the prio

Seite 819 - NTERFACES

VLAN COMMANDS32-28to the service provider’s outer tag. The Tag Protocol Identifier (TPID) of the tunnel port is used for the outer tag. The default is

Seite 820

CONFIGURING IEEE 802.1Q TUNNELING32-29switchport dot1q-ethertypeThis command sets the Tag Protocol Identifier (TPID) value of a tunnel port. Use the n

Seite 821

VLAN COMMANDS32-30ExampleRelated Commandsshow interfaces switchport (page 25-16)Configuring VLAN SwappingQinQ tunneling uses double tagging to preser

Seite 822

CONFIGURING VLAN SWAPPING32-31uplink port (using the command parameters – input VLAN ID, output VLAN ID, and uplink interface). 3. Enter Interface C

Seite 823

BASIC MANAGEMENT TASKS4-2• Web Secure Server Port – Shows the TCP port used by the HTTPS interface.• Telnet Server – Shows if management access via Te

Seite 824 - Displaying VLAN Information

VLAN COMMANDS32-32• VLAN swapping only supports one-to-one mapping of VLAN IDs between a VDSL port and an uplink port.• VLAN IDs must be mapped for bo

Seite 825

CONFIGURING VLAN SWAPPING32-33ExampleConsole#show vlan swapvlan-swap enableethernet 1/1 invlan outvlan outport 1 100 1/18et

Seite 827

33-1CHAPTER 33CLASS OF SERVICE COMMANDSThe commands described in this section allow you to specify which data packets have greater precedence when tra

Seite 828

CLASS OF SERVICE COMMANDS33-2priority bitsThis command sets the priority bits in the VLAN tag of packets sent by the CPU. Use the no form to restore t

Seite 829

PRIORITY COMMANDS (LAYER 2)33-3Levels,” on page 33-8 for information on how CoS values are mapped to the output queues.Example queue modeThis command

Seite 830

CLASS OF SERVICE COMMANDS33-4• Weighted Round-Robin (WRR) specifies a relative weight of each queue that determines the percentage of service time the

Seite 831

PRIORITY COMMANDS (LAYER 2)33-5Related Commandspriority bits (33-2)priority ipv6 (33-17)show queue modeThis command shows the current queue mode.Defau

Seite 832

CLASS OF SERVICE COMMANDS33-6Command Usage • The precedence for priority mapping is IP Port, IP Precedence or IP DSCP, and default switchport priority

Seite 833

PRIORITY COMMANDS (LAYER 2)33-7queue bandwidth This command assigns weighted round-robin (WRR) weights to the eight class of service (CoS) priority qu

Seite 834

DISPLAYING SYSTEM INFORMATION4-3CLI – Specify the hostname, location and contact information.Console(config)#hostname R&D 5 20-2Console(config)#sn

Seite 835

CLASS OF SERVICE COMMANDS33-8Example This example assign WRR weights to priority queues 0-5, and strict priority to queues 6 and 7:Related Commandsque

Seite 836

PRIORITY COMMANDS (LAYER 2)33-9Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage CoS values assigned at the ingress port are

Seite 837

CLASS OF SERVICE COMMANDS33-10Example show queue cos-mapThis command shows the class of service priority map.Syntax show queue cos-map [interface]inte

Seite 838 - Configuring VLAN Swapping

PRIORITY COMMANDS (LAYER 3 AND 4)33-11Priority Commands (Layer 3 and 4)This section describes commands used to configure Layer 3 and Layer 4 traffic p

Seite 839

CLASS OF SERVICE COMMANDS33-12map ip port (Global Configuration)This command enables IP port mapping (i.e., class of service mapping for TCP/UDP socke

Seite 840

PRIORITY COMMANDS (LAYER 3 AND 4)33-13Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • The precedence for priority mapping

Seite 841

CLASS OF SERVICE COMMANDS33-14Example The following example shows how to enable IP precedence mapping globally:map ip precedence (Interface Configurat

Seite 842

PRIORITY COMMANDS (LAYER 3 AND 4)33-15Example The following example shows how to map IP precedence value 1 to CoS value 0:map ip dscp (Global Configur

Seite 843 - Priority Commands (Layer 2)

CLASS OF SERVICE COMMANDS33-16map ip dscp (Interface Configuration)This command sets IP DSCP priority (i.e., Differentiated Services Code Point priori

Seite 844

PRIORITY COMMANDS (LAYER 3 AND 4)33-17Example The following example shows how to map IP DSCP value 1 to CoS value 0:priority ipv6This command assigns

Seite 845 - Console(config)#priority bits

BASIC MANAGEMENT TASKS4-4Displaying System Health Use the System Health Information page to display the status of the fans, internal temperature, main

Seite 846

CLASS OF SERVICE COMMANDS33-18Example The following example maps the Traffic Class value of 1 to CoS value 0:show map ip portThis command shows the IP

Seite 847 - Wrr status: Enabled

PRIORITY COMMANDS (LAYER 3 AND 4)33-19show map ip precedenceThis command shows the IP precedence priority map.Syntax show map ip precedence [interface

Seite 848

CLASS OF SERVICE COMMANDS33-20show map ip dscpThis command shows the IP DSCP priority map.Syntax show map ip dscp [interface]interface • ethernet unit

Seite 849

34-1CHAPTER 34QUALITY OF SERVICECOMMANDSThe commands described in this section are used to configure Differentiated Services (DiffServ) classification

Seite 850

QUALITY OF SERVICE COMMANDS34-2To create a service policy for a specific category of ingress traffic, follow these steps:1. Use the class-map command

Seite 851

CLASS-MAP34-3Notes: 1. You can configure up to 16 rules per Class Map. You can also include multiple classes in a Policy Map.2. You should create a Cl

Seite 852

QUALITY OF SERVICE COMMANDS34-4• The class map is used with a policy map (page 34-6) to create a service policy (page 34-10) for a specific interface

Seite 853

MATCH34-5command to specify the fields within ingress packets that must match to qualify for this class map. • Only one match command can be entered p

Seite 854 - Console(config)#map ip port

QUALITY OF SERVICE COMMANDS34-6policy-mapThis command creates a policy map that can be attached to multiple interfaces, and enters Policy Map configur

Seite 855

CLASS34-7classThis command defines a traffic classification upon which a policy can act, and enters Policy Map Class configuration mode. Use the no fo

Seite 856 - CoS Value 01234567

DISPLAYING SYSTEM HEALTH4-5• Free Amount – Amount of memory currently free for use.• Freed / Total – Percentage of free memory compared to total memor

Seite 857 - Console(config)#map ip dscp

QUALITY OF SERVICE COMMANDS34-8Example This example creates a policy called “rd_policy,” uses the class command to specify the previously defined “rd_

Seite 858

POLICE34-9police command to limit the average bandwidth to 100,000 Kbps, the burst rate to 1522 bytes, and configure the response to drop any violatin

Seite 859

QUALITY OF SERVICE COMMANDS34-10Example This example creates a policy called “rd_policy,” uses the class command to specify the previously defined “rd

Seite 860

SHOW CLASS-MAP34-11Example This example applies a service policy to an ingress interface.show class-mapThis command displays the QoS class maps which

Seite 861

QUALITY OF SERVICE COMMANDS34-12show policy-map This command displays the QoS policy maps which define classification criteria for incoming traffic, a

Seite 862

SHOW POLICY-MAP INTERFACE34-13Command Mode Privileged ExecExampleConsole#show policy-map interface ethernet 1/5Service-policy rd_policy inputConsole#

Seite 863

QUALITY OF SERVICE COMMANDS34-14

Seite 864

35-1CHAPTER 35MULTICAST FILTERINGCOMMANDSThis switch uses IGMP (Internet Group Management Protocol) to query for any attached hosts that want to recei

Seite 865

MULTICAST FILTERING COMMANDS35-2IGMP Snooping CommandsThis section describes commands used to configure IGMP snooping on the switch. ip igmp snoopingT

Seite 866

IGMP SNOOPING COMMANDS35-3Example The following example enables IGMP snooping.ip igmp snooping vlan staticThis command adds a port to a multicast grou

Seite 867

BASIC MANAGEMENT TASKS4-6CLI – Use the following commands to display the status of the CPU and system memory. Console#show cpu utilization 20-11 CPU c

Seite 868 - Console(config-pmap-c)#

MULTICAST FILTERING COMMANDS35-4ip igmp snooping versionThis command configures the IGMP snooping version. Use the no form to restore the default.Synt

Seite 869

IGMP SNOOPING COMMANDS35-5ip igmp snooping immediate-leaveThis command immediately deletes a member port of a multicast service if a leave packet is r

Seite 870

MULTICAST FILTERING COMMANDS35-6show ip igmp snoopingThis command shows the IGMP snooping configuration.Default Setting NoneCommand Mode Privileged Ex

Seite 871

IGMP QUERY COMMANDS35-7Command Mode Privileged ExecCommand Usage Member types displayed include IGMP or USER, depending on selected options.Example Th

Seite 872

MULTICAST FILTERING COMMANDS35-8ip igmp snooping querierThis command enables the switch as an IGMP querier. Use the no form to disable it.Syntax [no]

Seite 873

IGMP QUERY COMMANDS35-9Command Usage The query count defines how long the querier waits for a response from a multicast client before taking action. I

Seite 874

MULTICAST FILTERING COMMANDS35-10ip igmp snooping query-max-response-timeThis command configures the query report delay. Use the no form to restore th

Seite 875

IGMP QUERY COMMANDS35-11ip igmp snooping router-port-expire-timeThis command configures the query timeout. Use the no form to restore the default.Synt

Seite 876

MULTICAST FILTERING COMMANDS35-12Static Multicast Routing CommandsThis section describes commands used to configure static multicast routing on the sw

Seite 877

STATIC MULTICAST ROUTING COMMANDS35-13Example The following shows how to configure port 11 as a multicast router port within VLAN 1:show ip igmp snoop

Seite 878

DISPLAYING HARDWARE/SOFTWARE VERSIONS4-7Displaying Hardware/Software Versions Use the Switch Information page to display hardware/firmware version num

Seite 879

MULTICAST FILTERING COMMANDS35-14IGMP Filtering and Throttling CommandsIn certain switch applications, the administrator may want to control the multi

Seite 880

IGMP FILTERING AND THROTTLING COMMANDS35-15ip igmp filter (Global Configuration)This command globally enables IGMP filtering and throttling on the swi

Seite 881

MULTICAST FILTERING COMMANDS35-16ip igmp profileThis command creates an IGMP filter profile number and enters IGMP profile configuration mode. Use the

Seite 882

IGMP FILTERING AND THROTTLING COMMANDS35-17Command Usage • Each profile has only one access mode; either permit or deny.• When the access mode is set

Seite 883 - IGMP Query Commands

MULTICAST FILTERING COMMANDS35-18ip igmp filter (Interface Configuration)This command assigns an IGMP filtering profile to an interface on the switch.

Seite 884

IGMP FILTERING AND THROTTLING COMMANDS35-19Default Setting 64Command Mode Interface ConfigurationCommand Usage • IGMP throttling sets a maximum number

Seite 885

MULTICAST FILTERING COMMANDS35-20Command Usage When the maximum number of groups is reached on a port, the switch can take one of two actions; either

Seite 886

IGMP FILTERING AND THROTTLING COMMANDS35-21Example show ip igmp profileThis command displays IGMP filtering profiles created on the switch. Syntax sho

Seite 887

MULTICAST FILTERING COMMANDS35-22show ip igmp throttle interfaceThis command displays the interface settings for IGMP throttling. Syntax show ip igmp

Seite 888

MULTICAST VLAN REGISTRATION COMMANDS35-23Multicast VLAN Registration CommandsThis section describes commands used to configure Multicast VLAN Registra

Seite 889

TABLE OF CONTENTSixSetting SNMPv3 Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-246 User Authentication . . . . . . . . .

Seite 890

BASIC MANAGEMENT TASKS4-8These additional parameters are displayed for the CLI.• Unit ID – Unit number in stack.• BME firmware version – Version numbe

Seite 891

MULTICAST FILTERING COMMANDS35-24mvr (Global Configuration)This command enables Multicast VLAN Registration (MVR) globally on the switch, enables a sp

Seite 892 - Console(config-igmp-profile)#

MULTICAST VLAN REGISTRATION COMMANDS35-25•Use the mvr group command to statically configure all multicast group addresses that will join an MVR VLAN.

Seite 893

MULTICAST FILTERING COMMANDS35-26mvr (Interface Configuration)This command configures an interface as a static member of an MVR domain using the group

Seite 894

MULTICAST VLAN REGISTRATION COMMANDS35-27groups within an MVR VLAN. Multicast groups can also be statically assigned to a receiver port using the grou

Seite 895

MULTICAST FILTERING COMMANDS35-28mvr immediateThis command causes the switch to immediately removes an interface from a multicast stream as soon as it

Seite 896

MULTICAST VLAN REGISTRATION COMMANDS35-29show mvr This command shows information about the global MVR configuration settings when entered without any

Seite 897

MULTICAST FILTERING COMMANDS35-30Example The following shows the global MVR settings:Console#show mvr================================MVR domain : 1MVR

Seite 898

MULTICAST VLAN REGISTRATION COMMANDS35-31The following displays information about the interfaces attached to the MVR VLAN:Console#show mvr interface==

Seite 899

MULTICAST FILTERING COMMANDS35-32The following shows information about the interfaces associated with multicast groups assigned to the MVR VLAN:Consol

Seite 900

36-1CHAPTER 36DOMAIN NAME SERVICECOMMANDSThese commands are used to configure Domain Naming System (DNS) services. You can manually configure entries

Seite 901 - Console(config)#mvr

DISPLAYING BRIDGE EXTENSION CAPABILITIES4-9CLI – Use the following command to display version information.Displaying Bridge Extension CapabilitiesThe

Seite 902

DOMAIN NAME SERVICE COMMANDS36-2ip hostThis command creates a static entry in the DNS table that maps a host name to an IP address. Use the no form to

Seite 903

CLEAR HOST36-3Example This example maps two address to a host name.clear hostThis command deletes entries from the DNS table.Syntax clear host {name |

Seite 904

DOMAIN NAME SERVICE COMMANDS36-4ip domain-nameThis command defines the default domain name appended to incomplete host names (i.e., host names passed

Seite 905

IP DOMAIN-LIST36-5ip domain-listThis command defines a list of domain names that can be appended to incomplete host names (i.e., host names passed fro

Seite 906

DOMAIN NAME SERVICE COMMANDS36-6ExampleThis example adds two domain names to the current list and then displays the list.Related Commands ip domain-na

Seite 907 - MVR VLAN:

IP DOMAIN-LOOKUP36-7ExampleThis example adds two domain-name servers to the list and then displays the list.Related Commands ip domain-name (36-4)ip d

Seite 908

DOMAIN NAME SERVICE COMMANDS36-8ExampleThis example enables DNS and then displays the configuration.Related Commands ip domain-name (36-4)ip name-serv

Seite 909 - Table 36-1 DNS Commands

SHOW DNS36-9show dnsThis command displays the configuration of the DNS service.Command Mode Privileged ExecExampleshow dns cacheThis command displays

Seite 910

DOMAIN NAME SERVICE COMMANDS36-10clear dns cacheThis command clears all entries in the DNS cache.Command Mode Privileged ExecExampleTable 36-2 show d

Seite 911

37-1CHAPTER 37DHCP COMMANDSThese commands are used to configure Dynamic Host Configuration Protocol (DHCP) client and relay functions. You can configu

Seite 912

BASIC MANAGEMENT TASKS4-10• Configurable PVID Tagging – This switch allows you to override the default Port VLAN ID (PVID used in frame tags) and egre

Seite 913

DHCP COMMANDS37-2Command Usage • This command issues a BOOTP or DHCP client request for any IP interface that has been set to BOOTP or DHCP mode via t

Seite 914

DHCP RELAY37-3ip dhcp relay serverThis command enables DHCP relay service, and specifies the address of the server to use. Use the no form to clear a

Seite 915

DHCP COMMANDS37-4Example ip dhcp information option This command enables DHCP Option 82 information relay, and specifies the frame format to use when

Seite 916

DHCP RELAY37-5• If Option 82 is enabled on the switch, client information will be included in any relayed request packet received through the manageme

Seite 917

DHCP COMMANDS37-6the reply packet was received. If the DHCP packet’s broadcast flag is off, the switch uses the Option 82 information to identify the

Seite 918

DHCP RELAY37-7address (when DHCP snooping or relay is enabled), and unicast the packet to the DHCP server.Default Setting replaceCommand ModeGlobal Co

Seite 919 - DHCP Client

DHCP COMMANDS37-8Example Related Commands ip dhcp relay server (37-3)Console#show ip dhcp relay server Ip Dhcp Relay Status: Enable Ip Dhcp Relay S

Seite 920 - DHCP Relay

38-1CHAPTER 38IP INTERFACE COMMANDSAn IP address may be used for management access to the switch over your network. An IP address is obtained via DHCP

Seite 921

IP INTERFACE COMMANDS38-2ip address This command sets the IP address for the currently selected VLAN interface. Use the no form to restore the default

Seite 922

BASIC IP CONFIGURATION38-3Notes: 1. Only one VLAN interface can be assigned an IP address (the default is VLAN 1). This defines the management VLAN, t

Seite 923

SETTING THE SWITCH’S IP ADDRESS4-11CLI – Enter the following command. Setting the Switch’s IP Address This section describes how to configure an IP in

Seite 924

IP INTERFACE COMMANDS38-4Example The following example defines a default gateway for this device:Related Commands show ip redirects (38-4)show ip inte

Seite 925

BASIC IP CONFIGURATION38-5pingThis command sends ICMP echo request packets to another node on the network.Syntax ping host [count count][size size]• h

Seite 926

IP INTERFACE COMMANDS38-6Example Related Commands interface (25-2)Console#ping 10.1.0.9Type ESC to abort.PING to 10.1.0.9, by 5 32-byte payload ICMP p

Seite 927

SECTION IVAPPENDICESThis section provides additional information on the following topics. Software Specifications . . . . . . . . . . . . . . . . .

Seite 928

APPENDICES

Seite 929

A-1APPENDIX ASOFTWARE SPECIFICATIONSSoftware FeaturesAuthenticationLocal, RADIUS, TACACS+, Port (802.1X), HTTPS, SSH, Port SecurityAccess Control List

Seite 930

SOFTWARE SPECIFICATIONSA-2Rate LimitsInput/output limitRange (configured per port)Port TrunkingStatic trunks (Cisco EtherChannel compliant)Dynamic tru

Seite 931

MANAGEMENT FEATURESA-33 OAM channels (IB, eoc, VOC) between VTU-C and VTU-RHDLC or 802.3ah EFM framingUpstream power back offCPE firmware-upgrade via

Seite 932

SOFTWARE SPECIFICATIONSA-4IEEE 802.1Q VLANIEEE 802.1v Protocol-based VLANsIEEE 802.1s Multiple Spanning Tree ProtocolIEEE 802.1w Rapid Spanning Tree P

Seite 933 - PPENDICES

MANAGEMENT INFORMATION BASESA-5Entity MIB (RFC 2737)Ether-like MIB (RFC 2665)Extended Bridge MIB (RFC 2674)Extensible SNMP Agents MIB (RFC 2742)Forwar

Seite 934

BASIC MANAGEMENT TASKS4-12will not function until a reply has been received from the server. Requests will be broadcast periodically by the switch for

Seite 935 - PECIFICATIONS

SOFTWARE SPECIFICATIONSA-6

Seite 936

B-1APPENDIX BTROUBLESHOOTINGProblems Accessing the Management Interface Table B-1 Troubleshooting ChartSymptom ActionCannot connect using Telnet, we

Seite 937 - Standards

TROUBLESHOOTINGB-2Cannot connect using Secure Shell• If you cannot connect using SSH, you may have exceeded the maximum number of concurrent Telnet/SS

Seite 938 - Management Information Bases

USING SYSTEM LOGSB-3Using System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually cau

Seite 939

TROUBLESHOOTINGB-4

Seite 940

Glossary-1GLOSSARYAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Seite 941 - ROUBLESHOOTING

GLOSSARYGlossary-2marked for different kinds of forwarding. The DSCP bits are mapped to the Class of Service categories, and then into the output queu

Seite 942

GLOSSARYGlossary-3Generic Multicast Registration Protocol (GMRP)GMRP allows network devices to register end stations with multicast groups. GMRP requi

Seite 943 - Using System Logs

GLOSSARYGlossary-4IEEE 802.3acDefines frame extensions for VLAN tagging.IEEE 802.3xDefines Ethernet frame start/stop requests and timers used for flow

Seite 944

GLOSSARYGlossary-5IP PrecedenceThe Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight different priority lev

Seite 945 - Glossary-1

SETTING THE SWITCH’S IP ADDRESS4-13CLI – Specify the management interface, IP address and default gateway.This example first sets up a dedicated VLAN

Seite 946 - Glossary-2

GLOSSARYGlossary-6Multicast SwitchingA process whereby the switch filters incoming multicast frames for services for which no attached host has regist

Seite 947 - Glossary-3

GLOSSARYGlossary-7Private Branch Exchange (PBX)A telephone exchange local to a particular organization who use, rather than provide, telephone service

Seite 948 - Glossary-4

GLOSSARYGlossary-8Secure Shell (SSH)A secure replacement for remote access functions, including Telnet. SSH can authenticate users with a cryptographi

Seite 949 - Glossary-5

GLOSSARYGlossary-9Terminal Access Controller Access Control System Plus (TACACS+)TACACS+ is a logon authentication protocol that uses software running

Seite 950 - Glossary-6

GLOSSARYGlossary-10Very high data rate Digital Subscriber Line 2 (VDSL2)VDSL2 as defined in ITU-T Recommendation G.993.2 is an enhancement to the firs

Seite 951 - Glossary-7

Index-1Numerics802.1Q tunnel 13-24, 32-25description 13-24interface configuration 13-30, 32-27–32-29mode selection 13-30, 32-10, 32-27TPID 13-30, 32-2

Seite 952 - Glossary-8

INDEXIndex-2verifying MAC addresses 7-10, 23-21VLAN configuration 7-10, 23-20Differentiated Code Point Service See DSCPDifferentiated Services See

Seite 953 - Glossary-9

INDEXIndex-3Layer 2 16-2, 35-2query 16-2, 35-8query, Layer 2 16-4, 35-7snooping 16-2, 35-2snooping, configuring 16-4, 35-2snooping, setting immediate

Seite 954 - Glossary-10

INDEXIndex-4MVRassigning static multicast groups 16-30, 35-26setting interface type 16-26, 35-26, 35-28setting multicast groups 16-21, 35-24specifying

Seite 955 - Numerics

INDEXIndex-5groups 5-18, 21-15user configuration 5-12, 5-15, 21-18views 5-24, 21-13softwaredisplaying version 4-7, 20-10downloading 4-18, 20-17Spannin

Seite 956

BASIC MANAGEMENT TASKS4-14Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the switch to be dynamically configured by

Seite 957

INDEXIndex-6ham band notch 10-8, 29-7ham band region/usage notch 10-9, 29-9impulse noise protection 10-10, 29-23interface settings 10-7, 29-2line prof

Seite 959

20 MasonIrvine, CA 92618Phone: (949) 679-8000Model Numbers: SMC7800A/VCPPub. Number: 149100012100H E012007/ST-R01FOR TECHNICAL SUPPORT, CALL:From U.S.

Seite 960

SETTING THE SWITCH’S IP ADDRESS4-15This example first sets up a dedicated VLAN for management access. It adds Port 19 (the management port) to that VL

Seite 961

BASIC MANAGEMENT TASKS4-16Configuring Support for Jumbo FramesThe switch provides more efficient throughput for large sequential data transfers by sup

Seite 962

MANAGING FIRMWARE4-17Managing FirmwareYou can upload/download firmware to or from a TFTP server. By saving runtime code to a file on a TFTP server, th

Kommentare zu diesen Handbüchern

Keine Kommentare