SMC Networks SMC6824M User Manual

Browse online or download User Manual for Network switches SMC Networks SMC6824M. SMC Networks SMC6824M User's Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 608
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
TigerStack III 10/100
24-
Port Fast Ethernet Swi
tch
24 auto-MDI/MDI-X 10BASE-T/100BASE-TX ports
10BASE-T/100BASE-TX ports support PoE capabilities*
2 Gigabit combo ports (RJ-45/SFP)
8.8 Gbps of aggregate bandwidth
Stacks up to 8 units
Non-blocking switching architecture
Spanning Tree Protocol, RSTP, and MSTP
Up to six LACP or static 4-port trunks
RADIUS and TACACS+ authentication
Rate limiting for bandwidth management
CoS support for four-level priority
Full support for VLANs with GVRP
IP Multicasting with IGMP Snooping
Manageable via console, Web, SNMP/RMON
Management Guide
SMC6824M
SMC6824MPE*
SMC6826MPE*
Page view 0
1 2 3 4 5 6 ... 607 608

Summary of Contents

Page 1 - TigerStack III 10/100

TigerStack III 10/10024-Port Fast Ethernet Switch◆ 24 auto-MDI/MDI-X 10BASE-T/100BASE-TX ports◆ 10BASE-T/100BASE-TX ports support PoE capabilities*◆ 2

Page 2

TABLE OF CONTENTSviPower Over Ethernet Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-145Switch Power Status . . . . . . .

Page 3 - Management Guide

CONFIGURING THE SWITCH3-44Web – Select SNTP, Configuration. Modify any of the required parameters and click Apply.Figure 3-20 SNTP Configuration CLI

Page 4

SIMPLE NETWORK MANAGEMENT PROTOCOL3-45• Hours (0-13) – The number of hours before UTC (0-12) or after UTC (0-13).• Minutes (0-59) – The number of minu

Page 5

CONFIGURING THE SWITCH3-46Information Base (MIB) that provides a standard presentation of the information controlled by the agent. SNMP defines both t

Page 6

SIMPLE NETWORK MANAGEMENT PROTOCOL3-47Note: The predefined default groups and view can be deleted from the system. You can then define customized grou

Page 7

CONFIGURING THE SWITCH3-48Enabling the SNMP Agent Enables SNMPv3 service for all management clients (i.e., versions 1, 2c, 3).Command AttributesSNMP A

Page 8

SIMPLE NETWORK MANAGEMENT PROTOCOL3-49• Access Mode – Specifies the access rights for the community string:- Read-Only – Authorized management station

Page 9

CONFIGURING THE SWITCH3-50Specifying Trap Managers and Trap Types Traps indicating status changes are issued by the switch to specified trap managers.

Page 10

SIMPLE NETWORK MANAGEMENT PROTOCOL3-513. Create a view with the required notification messages (page 3-67).4. Create a group that includes the require

Page 11

CONFIGURING THE SWITCH3-52- Retry times – The maximum number of times to resend an inform message if the recipient does not acknowledge receipt. (Rang

Page 12

SIMPLE NETWORK MANAGEMENT PROTOCOL3-53Configuring SNMPv3 Management AccessTo configure SNMPv3 management access to the switch, follow these steps:1. I

Page 13

TABLE OF CONTENTSviiMapping CoS Values to Egress Queues . . . . . . . . . . . . . 3-204Selecting the Queue Mode . . . . . . . . . . . . . . . . .

Page 14

CONFIGURING THE SWITCH3-54Web – Click SNMP, SNMPv3, Engine ID. Enter an ID of up to 26 hexadecimal characters and then click Save.Figure 3-25 Setting

Page 15

SIMPLE NETWORK MANAGEMENT PROTOCOL3-55Web – Click SNMP, SNMPv3, Remote Engine ID. Enter an ID of up to 26 hexadecimal characters and then click Save.F

Page 16

CONFIGURING THE SWITCH3-56- AuthPriv – SNMP communications use both authentication and encryption (only available for the SNMPv3 security model).• Aut

Page 17

SIMPLE NETWORK MANAGEMENT PROTOCOL3-57Web – Click SNMP, SNMPv3, Users. Click New to configure a user name. In the New User page, define a name and ass

Page 18

CONFIGURING THE SWITCH3-58CLI – Use the snmp-server user command to configure a new user name and assign it to a group.Configuring Remote SNMPv3 Users

Page 19

SIMPLE NETWORK MANAGEMENT PROTOCOL3-59Command Attributes• User Name – The name of user connecting to the SNMP agent. (Range: 1-32 characters)• Group N

Page 20

CONFIGURING THE SWITCH3-60Web – Click SNMP, SNMPv3, Remote Users. Click New to configure a user name. In the New User page, define a name and assign i

Page 21 - APPENDICES:

SIMPLE NETWORK MANAGEMENT PROTOCOL3-61CLI – Use the snmp-server user command to configure a new user name and assign it to a group.Configuring SNMPv3

Page 22

CONFIGURING THE SWITCH3-62• Notify View – The configured view for notifications. (Range: 1-64 characters)Table 3-5 Supported Notification MessagesObj

Page 23

SIMPLE NETWORK MANAGEMENT PROTOCOL3-63warmStart 1.3.6.1.6.3.1.1.5.2 A warmStart trap signifies that the SNMPv2 entity, acting in an agent role, is rei

Page 24

TABLE OF CONTENTSviiiNegating the Effect of Commands . . . . . . . . . . . . . . . . . . . . . . . 4-6Using Command History . . . . . . . . . . . .

Page 25

CONFIGURING THE SWITCH3-64authenticationFailure*1.3.6.1.6.3.1.1.5.5 An authenticationFailure trap signifies that the SNMPv2 entity, acting in an agent

Page 26

SIMPLE NETWORK MANAGEMENT PROTOCOL3-65swIpFilterRejectTrap 1.3.6.1.4.1.202.20.28.63.2.1.0.401.3.6.1.4.1.202.20.41.63.2.1.0.401.3.6.1.4.1.202.20.53.63.

Page 27

CONFIGURING THE SWITCH3-66Web – Click SNMP, SNMPv3, Groups. Click New to configure a new group. In the New Group page, define a name, assign a securit

Page 28

SIMPLE NETWORK MANAGEMENT PROTOCOL3-67CLI – Use the snmp-server group command to configure a new group, specifying the security model and level, and r

Page 29

CONFIGURING THE SWITCH3-68Web – Click SNMP, SNMPv3, Views. Click New to configure a new view. In the New View page, define a name and specify OID subt

Page 30

USER AUTHENTICATION3-69CLI – Use the snmp-server view command to configure a new view. This example view includes the MIB-2 interfaces table, and the

Page 31 - NTRODUCTION

CONFIGURING THE SWITCH3-70Configuring User AccountsThe guest only has read access for most configuration parameters. However, the administrator has wr

Page 32 - Table 1-1 Key Features

USER AUTHENTICATION3-71Web – Click Security, User Accounts. To configure a new user account, enter the user name, access level, and password, then cli

Page 33 - ESCRIPTION

CONFIGURING THE SWITCH3-72Configuring Local/Remote Logon AuthenticationUse the Authentication Settings menu to restrict management access based on spe

Page 34

USER AUTHENTICATION3-73• You can specify up to three authentication methods for any user to indicate the authentication sequence. For example, if you

Page 35

TABLE OF CONTENTSixenable password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-36IP Filter Commands . . . . . . . . . . . .

Page 36

CONFIGURING THE SWITCH3-74• TACACS Settings- Server IP Address – Address of the TACACS+ server. (Default: 10.11.12.13)- Server Port Number – Network (

Page 37 - System Defaults

USER AUTHENTICATION3-75CLI – Specify all the required parameters to enable logon authentication.Configuring HTTPSYou can configure the switch to enabl

Page 38

CONFIGURING THE SWITCH3-76• If you enable HTTPS, you must indicate this in the URL that you specify in your browser: https://device[:port_number]• Whe

Page 39

USER AUTHENTICATION3-77Web – Click Security, HTTPS Settings. Enable HTTPS and specify the port number, then click Apply.Figure 3-33 HTTPS SettingsCLI

Page 40

CONFIGURING THE SWITCH3-78When you have obtained these, place them on your TFTP server, and use the following command at the switch's command-lin

Page 41

USER AUTHENTICATION3-79Command UsageThe SSH server on this switch supports both password and public key authentication. If password authentication is

Page 42

CONFIGURING THE SWITCH3-80only accepts public key files based on standard UNIX format as shown in the following example for an RSA Version 1 key:1024

Page 43 - ONNECTING

USER AUTHENTICATION3-81Notes: 1. To use SSH with only password authentication, the host public key must still be given to the client, either during in

Page 44 - Remote Connections

CONFIGURING THE SWITCH3-82• Generate – This button is used to generate the host key pair. Note that you must first generate the host key pair before y

Page 45 - Stack Operations

USER AUTHENTICATION3-83CLI – This example generates a host-key pair using both the RSA and DSA algorithms, stores the keys to flash memory, and then d

Page 46 - Basic Configuration

TABLE OF CONTENTSxlogging sendmail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-67show logging sendmail . . . . . . . . . . .

Page 47 - Setting an IP Address

CONFIGURING THE SWITCH3-84• SSH Server-Key Size – Specifies the SSH server key size. (Range: 512-896 bits: Default: 768)- The server key is a private

Page 48

USER AUTHENTICATION3-85Configuring Port SecurityPort security is a feature that allows you to configure a switch port with one or more device MAC addr

Page 49

CONFIGURING THE SWITCH3-86• If a port is disabled (shut down) due to a security violation, it must be manually re-enabled from the Port/Port Configura

Page 50

USER AUTHENTICATION3-87Web – Click Security, Port Security. Set the action to take when an invalid address is detected on a port, mark the checkbox in

Page 51

CONFIGURING THE SWITCH3-88Configuring 802.1X Port Authentication Network switches can provide open and easy access to network resources by simply atta

Page 52

USER AUTHENTICATION3-89allows the client to access the network. Otherwise, network access is denied and the port remains blocked.The operation of 802.

Page 53 - Saving Configuration Settings

CONFIGURING THE SWITCH3-90CLI – This example shows the default global setting for 802.1X.Configuring 802.1X Global SettingsThe 802.1X protocol provide

Page 54 - Managing System Files

USER AUTHENTICATION3-91Configuring Port Settings for 802.1XWhen 802.1X is enabled, you need to configure the parameters for the authentication process

Page 55

CONFIGURING THE SWITCH3-92• Re-authentication Period – Sets the time period after which a connected client must be re-authenticated. (Range: 1-65535 s

Page 56

USER AUTHENTICATION3-93Console#show dot1x 4-116Global 802.1X Parameters system-auth-control: enable802.1X Port SummaryPort Name Status Operat

Page 57 - CONFIGURING THE SWITCH

TABLE OF CONTENTSxiradius-server key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-102radius-server retransmit . . . . . . . .

Page 58

CONFIGURING THE SWITCH3-94Displaying 802.1X StatisticsThis switch can display statistics for dot1x protocol exchanges for any port.Table 3-7 802.1X S

Page 59 - AVIGATING

USER AUTHENTICATION3-95Web – Select Security, 802.1X, Statistics. Select the required port and then click Query. Click Refresh to update the statistic

Page 60 - Configuration Options

CONFIGURING THE SWITCH3-96Filtering IP Addresses for Management AccessYou can create a list of up to 16 IP addresses or IP address groups that are all

Page 61

USER AUTHENTICATION3-97Web – Click Security, IP Filter. Enter the IP addresses or range of addresses that are allowed management access to an interfac

Page 62 - Main Menu

CONFIGURING THE SWITCH3-98Access Control ListsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 p

Page 63

ACCESS CONTROL LISTS3-99• When an ACL is bound to an interface as an egress filter, all entries in the ACL must be deny rules. Otherwise, the bind ope

Page 64

CONFIGURING THE SWITCH3-100Web – Click Security, ACL, Configuration. Enter an ACL name in the Name field, select the list type (IP Standard, IP Extend

Page 65

ACCESS CONTROL LISTS3-101Web – Specify the action (i.e., Permit or Deny). Select the address type (Any, Host, or IP). If you select “Host,” enter a sp

Page 66

CONFIGURING THE SWITCH3-102• Source/Destination Subnet Mask – Subnet mask for source or destination address. (See the description for SubMask on page

Page 67

ACCESS CONTROL LISTS3-103Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (An

Page 68

TABLE OF CONTENTSxiimatch access-list ip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-137show marking . . . . . . . . . . . . . . .

Page 69

CONFIGURING THE SWITCH3-104CLI – This example adds three rules:1. Accept any incoming packets if the source address is in subnet 10.7.1.x. For example

Page 70 - Line Interface via Telnet.)

ACCESS CONTROL LISTS3-105• Ethernet Type Bitmask – Protocol bitmask. (Range: 600-fff hex.)• Packet Format – This attribute includes the following pack

Page 71

CONFIGURING THE SWITCH3-106Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (

Page 72

ACCESS CONTROL LISTS3-107Configuring ACL MasksYou must specify masks that control the order in which ACL rules are checked. The switch includes two sy

Page 73

CONFIGURING THE SWITCH3-108Web – Click Security, ACL, Mask Configuration. Click Edit for one of the basic mask types to open the configuration page.Fi

Page 74

ACCESS CONTROL LISTS3-109• Source/Destination Subnet Mask – Subnet mask for source or destination address. (See the description for SubMask on page 3-

Page 75 - Setting the IP Address

CONFIGURING THE SWITCH3-110CLI – This shows that the entries in the mask override the precedence in which the rules are entered into the ACL. In the f

Page 76

ACCESS CONTROL LISTS3-111Web – Configure the mask to match the required rules in the MAC ingress or egress ACLs. Set the mask to check for any source

Page 77 - Manual Configuration

CONFIGURING THE SWITCH3-112CLI – This example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of the rul

Page 78 - Using DHCP/BOOTP

ACCESS CONTROL LISTS3-113• When an ACL is bound to an interface as an egress filter, all entries in the ACL must be deny rules. Otherwise, the bind op

Page 79

TABLE OF CONTENTSxiiinegotiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-173capabilities . . . . . . . .

Page 80

CONFIGURING THE SWITCH3-114CLI – This example assigns an IP and MAC ingress ACL to port 1, and an IP ingress ACL to port 2.Port ConfigurationDisplayin

Page 81

PORT CONFIGURATION3-115Web – Click Port, Port Information or Trunk Information. Figure 3-50 Port - Port InformationField Attributes (CLI)Basic inform

Page 82

CONFIGURING THE SWITCH3-116- 100full - Supports 100 Mbps full-duplex operation - 1000full - Supports 1000 Mbps full-duplex operation - Sym - Transmits

Page 83

PORT CONFIGURATION3-117CLI – This example shows the connection status for Port 13.Configuring Interface ConnectionsYou can use the Port Configuration

Page 84

CONFIGURING THE SWITCH3-118the capabilities to be advertised. When auto-negotiation is disabled, you can force the settings for speed, mode, and flow

Page 85

PORT CONFIGURATION3-119Web – Click Port, Port Configuration or Trunk Configuration. Modify the required interface settings, and click Apply.Figure 3-5

Page 86

CONFIGURING THE SWITCH3-120Creating Trunk GroupsYou can create multiple links between devices that work as one virtual, aggregate link. A port trunk o

Page 87

PORT CONFIGURATION3-121• When configuring static trunks on switches of different types, they must be compatible with the Cisco EtherChannel standard.•

Page 88

CONFIGURING THE SWITCH3-122Web – Click Port, Trunk Membership. Enter a trunk ID of 1-6 in the Trunk field, select any of the switch ports from the scr

Page 89

PORT CONFIGURATION3-123Enabling LACP on Selected PortsCommand Usage• To avoid creating a loop in the network, be sure you enable LACP before connectin

Page 90

TABLE OF CONTENTSxivspanning-tree transmission-limit . . . . . . . . . . . . . . . . . . . . . . . 4-213spanning-tree backup-root . . . . . . . . .

Page 91 - System Log Configuration

CONFIGURING THE SWITCH3-124Command Attributes• Member List (Current) – Shows configured trunks (Unit, Port).• New – Includes entry fields for creatin

Page 92

PORT CONFIGURATION3-125Configuring LACP ParametersDynamically Creating a Port Channel –Ports assigned to a common port channel must meet the following

Page 93 - Remote Log Configuration

CONFIGURING THE SWITCH3-126Command Attributes Set Port Actor – This menu sets the local side of an aggregate link; i.e., the ports on this switch.• Po

Page 94

PORT CONFIGURATION3-127Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can opt

Page 95 - Displaying Log Messages

CONFIGURING THE SWITCH3-128CLI – The following example configures LACP parameters for ports 1-6. Ports 1-4 are used as active members of the LAG; port

Page 96

PORT CONFIGURATION3-129Displaying LACP Port CountersYou can display statistics for LACP protocol messages. Web – Click Port, LACP, Port Counters Infor

Page 97

CONFIGURING THE SWITCH3-130CLI – The following example displays LACP counters for port channel 1.Displaying LACP Settings and Status for the Local Sid

Page 98 - Resetting the System

PORT CONFIGURATION3-131Admin State,Oper StateAdministrative or operational values of the actor’s state parameters:• Expired – The actor’s receive mach

Page 99 - Configuring SNTP

CONFIGURING THE SWITCH3-132Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 3-

Page 100 - Command Attributes

PORT CONFIGURATION3-133Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state for the

Page 101 - ANAGEMENT

TABLE OF CONTENTSxvswitchport private-vlan host-association . . . . . . . . . . . . . 4-246switchport private-vlan mapping . . . . . . . . . . . . .

Page 102 - ONFIGURING

CONFIGURING THE SWITCH3-134Web – Click Port, LACP, Port Neighbors Information. Select a port channel to display the corresponding information.Figure 3

Page 103

PORT CONFIGURATION3-135Setting Broadcast Storm ThresholdsBroadcast storms may occur when a device on your network is malfunctioning, or if application

Page 104

CONFIGURING THE SWITCH3-136CLI – Specify any interface, and then enter the threshold. The following disables broadcast storm control for port 1, and t

Page 105

PORT CONFIGURATION3-137Command Attributes• Mirror Sessions – Displays a list of current mirror sessions.• Source Unit – The unit whose port traffic wi

Page 106 - Command Usage

CONFIGURING THE SWITCH3-138Configuring Rate LimitsThis function allows the network manager to control the maximum rate for traffic transmitted or rece

Page 107

PORT CONFIGURATION3-139CLI - This example sets the rate limit for input and output traffic passing through port 1 to 60 Mbps.Showing Port StatisticsYo

Page 108

CONFIGURING THE SWITCH3-140Received Discarded PacketsThe number of inbound packets which were chosen to be discarded even though no errors had been de

Page 109 - Setting the Local Engine ID

PORT CONFIGURATION3-141Etherlike StatisticsAlignment Errors The number of alignment errors (missynchronized data packets). Late Collisions The number

Page 110 - Specifying a Remote Engine ID

CONFIGURING THE SWITCH3-142Internal MAC Receive ErrorsA count of frames for which reception on a particular interface fails due to an internal MAC sub

Page 111 - Configuring SNMPv3 Users

PORT CONFIGURATION3-14364 Bytes Frames The total number of frames (including bad packets) received and transmitted that were 64 octets in length (excl

Page 113

TABLE OF CONTENTSxviIGMP Query Commands (Layer 2) . . . . . . . . . . . . . . . . . . . . 4-273ip igmp snooping querier . . . . . . . . . . . . .

Page 114

CONFIGURING THE SWITCH3-144Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at t

Page 115

POWER OVER ETHERNET SETTINGS3-145CLI – This example shows statistics for port 13.Power Over Ethernet SettingsThe SMC6824MPE and SMC6826MPE can provide

Page 116

CONFIGURING THE SWITCH3-146the power required by a device exceeds the power budget of the port or the whole switch, power is not supplied.Ports can be

Page 117 - Configuring SNMPv3 Groups

POWER OVER ETHERNET SETTINGS3-147Web – Click PoE, Power Status.Figure 3-62 Displaying the Global PoE StatusCLI – This example displays the current po

Page 118

CONFIGURING THE SWITCH3-148Web – Click PoE, Power Config. Specify the desired power budget for the switch. Click Apply.Figure 3-63 Setting the Switch

Page 119

POWER OVER ETHERNET SETTINGS3-149Web – Click PoE, Power Port Status.Figure 3-64 Displaying Port PoE StatusCLI – This example displays the PoE status

Page 120

CONFIGURING THE SWITCH3-150• If a device is connected to a critical or high-priority port and causes the switch to exceed its budget, port power is tu

Page 121

ADDRESS TABLE SETTINGS3-151CLI – This example sets the PoE power budget for port 1 to 8 watts, the priority to high (2), and then enables the power.Ad

Page 122

CONFIGURING THE SWITCH3-152Web – Click Address Table, Static Addresses. Specify the interface, the MAC address and VLAN, then click Add Static Address

Page 123 - Setting SNMPv3 Views

ADDRESS TABLE SETTINGS3-153• VLAN – ID of configured VLAN (1-4093).• Address Table Sort Key – You can sort the information displayed based on MAC addr

Page 124

TABLE OF CONTENTSxviiAPPENDICES:A Software Specifications . . . . . . . . . . . . . . . . . . . . . . . . .A-1Software Features . . . . . . . . . . .

Page 125 - User Authentication

CONFIGURING THE SWITCH3-154Changing the Aging TimeYou can change the aging time for entries in the dynamic address table. Command Attributes• Aging St

Page 126

SPANNING TREE ALGORITHM CONFIGURATION3-155The spanning tree algorithms supported by this switch include these versions:• STP – Spanning Tree Protocol

Page 127 - UTHENTICATION

CONFIGURING THE SWITCH3-156start learning, predefining an alternate route that can be used when a node or port fails, and retaining the forwarding dat

Page 128

SPANNING TREE ALGORITHM CONFIGURATION3-157• Forward Delay – The maximum time (in seconds) the root device will wait before changing states (i.e., disc

Page 129

CONFIGURING THE SWITCH3-158• Priority – Bridge priority is used in selecting the root device, root port, and designated port. The device with the high

Page 130

SPANNING TREE ALGORITHM CONFIGURATION3-159Web – Click Spanning Tree, STA Information.Figure 3-69 Displaying the Spanning Tree AlgorithmCLI – This com

Page 131

CONFIGURING THE SWITCH3-160Note: The current root port and current root cost display as zero when this device is not connected to the network.Configur

Page 132

SPANNING TREE ALGORITHM CONFIGURATION3-161• Rapid Spanning Tree Protocol8RSTP supports connections to either STP or RSTP nodes by monitoring the incom

Page 133

CONFIGURING THE SWITCH3-162- RSTP: Rapid Spanning Tree (IEEE 802.1w) RSTP is the default.- MSTP: Multiple Spanning Tree (IEEE 802.1s)• Default Priorit

Page 134 - Configuring the Secure Shell

SPANNING TREE ALGORITHM CONFIGURATION3-163• Forward Delay – The maximum time (in seconds) this device will wait before changing states (i.e., discardi

Page 135

TABLE OF CONTENTSxviii

Page 136

CONFIGURING THE SWITCH3-164Web – Click Spanning Tree, STA Configuration. Modify the required attributes, and click Apply.Figure 3-70 Configuring the

Page 137 - Field Attributes

SPANNING TREE ALGORITHM CONFIGURATION3-165CLI – This example enables Spanning Tree Protocol, sets the mode to MST, and then configures the STA and MST

Page 138

CONFIGURING THE SWITCH3-166- If two ports of a switch are connected to the same segment and there is no other STA device attached to this segment, the

Page 139 - Configuring the SSH Server

SPANNING TREE ALGORITHM CONFIGURATION3-167bridges, bridge ports, or LANs fail or are removed. The role is set to disabled (i.e., disabled port) if a p

Page 140

CONFIGURING THE SWITCH3-168likely to be blocked if the Spanning Tree Algorithm is detecting network loops. Where more than one port is assigned the hi

Page 141

SPANNING TREE ALGORITHM CONFIGURATION3-169CLI – This example shows general STA configuration and attributes for port 5. Configuring Interface Settings

Page 142

CONFIGURING THE SWITCH3-170- Learning - Port has transmitted configuration messages for an interval set by the Forward Delay parameter without receivi

Page 143

SPANNING TREE ALGORITHM CONFIGURATION3-171• Admin Link Type – The link type attached to this interface.- Point-to-Point – A connection to exactly one

Page 144

CONFIGURING THE SWITCH3-172CLI – This example sets STA attributes for port 5. Configuring Multiple Spanning Trees MSTP generates a unique spanning tre

Page 145

SPANNING TREE ALGORITHM CONFIGURATION3-173Command Attributes• MST Instance – Instance identifier of this spanning tree. (Default: 0)• Priority – The p

Page 146

xixTABLESTable 1-1 Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Table 1-2 System Defaults . . . . . . . . .

Page 147

CONFIGURING THE SWITCH3-174CLI – This displays STA settings for instance 1, followed by settings for each port. Console#show spanning-tree mst 1 4-227

Page 148

SPANNING TREE ALGORITHM CONFIGURATION3-175CLI – This example sets the priority for MSTI 1, and adds VLANs 1-5 to this MSTI. Displaying Interface Setti

Page 149

CONFIGURING THE SWITCH3-176CLI – This displays STA settings for instance 0, followed by settings for each port. The settings for instance 0 are global

Page 150 - Displaying 802.1X Statistics

SPANNING TREE ALGORITHM CONFIGURATION3-177Configuring Interface Settings for MSTPYou can configure the STA interface settings for an MST Instance usin

Page 151

CONFIGURING THE SWITCH3-178when the Path Cost Method is set to short (page 3-63), the maximum path cost is 65,535.By default, the system automatically

Page 152

VLAN CONFIGURATION3-179VLAN ConfigurationIEEE 802.1Q VLANsIn large networks, routers are used to isolate broadcast traffic for each subnet into separa

Page 153

CONFIGURING THE SWITCH3-180Assigning Ports to VLANsBefore enabling VLANs for the switch, you must first assign each port to the VLAN group(s) in which

Page 154

VLAN CONFIGURATION3-181Port Overlapping – Port overlapping can be used to allow access to commonly shared network resources among different VLAN group

Page 155 - Setting the ACL Name and Type

CONFIGURING THE SWITCH3-182should also determine security boundaries in the network and disable GVRP on ports to prevent advertisements being propagat

Page 156 - Configuring a Standard IP ACL

VLAN CONFIGURATION3-183by the frame tag. However, when this switch receives an untagged frame from a VLAN-unaware device, it first decides where to fo

Page 157

TABLESxxTable 4-19 show logging flash/ram - display description . . . . . . . . 4-62Table 4-20 show logging trap - display description . . . . . .

Page 158

CONFIGURING THE SWITCH3-184Displaying Basic VLAN InformationThe VLAN Basic Information page displays basic information on the VLAN type supported by t

Page 159

VLAN CONFIGURATION3-185Displaying Current VLANsThe VLAN Current Table shows the current port members of each VLAN and whether or not the port supports

Page 160 - Configuring a MAC ACL

CONFIGURING THE SWITCH3-186Command Attributes (CLI)• VLAN – ID of configured VLAN (1-4093, no leading zeroes).• Type – Shows how this VLAN was added t

Page 161

VLAN CONFIGURATION3-187• VLAN ID – ID of configured VLAN (1-4093, no leading zeroes).• VLAN Name – Name of the VLAN (1 to 32 characters).• Status (Web

Page 162

CONFIGURING THE SWITCH3-188CLI – This example creates a new VLAN.Adding Static Members to VLANs (VLAN Index)Use the VLAN Static Table to configure por

Page 163 - Specifying the Mask Type

VLAN CONFIGURATION3-189Command Attributes• VLAN – ID of configured VLAN (1-4093).• Name – Name of the VLAN (1 to 32 characters).• Status – Enables or

Page 164 - Configuring an IP ACL Mask

CONFIGURING THE SWITCH3-190Web – Click VLAN, 802.1Q VLAN, Static Table. Select a VLAN ID from the scroll-down list. Modify the VLAN name and status if

Page 165

VLAN CONFIGURATION3-191• Non-Member – VLANs for which the selected interface is not a tagged member.Web – Click VLAN, 802.1Q VLAN, Static Membership b

Page 166 - Configuring a MAC ACL Mask

CONFIGURING THE SWITCH3-192• GARP – Group Address Registration Protocol is used by GVRP to register or deregister client attributes for client service

Page 167

VLAN CONFIGURATION3-193• GARP Join Timer15 – The interval between transmitting requests/queries to participate in a VLAN group. (Range: 20-1000 centis

Page 168

TABLESxxiTable 4-56 Spanning Tree Commands . . . . . . . . . . . . . . . . . . . . . . 4-204Table 4-57 VLAN Commands . . . . . . . . . . . . . . .

Page 169

CONFIGURING THE SWITCH3-194Web – Click VLAN, 802.1Q VLAN, Port Configuration or Trunk Configuration. Fill in the required settings for each interface,

Page 170 - Command Attributes (Web)

VLAN CONFIGURATION3-195VLAN, and with their designated promiscuous ports. (Note that private VLANs and normal VLANs can exist simultaneously within th

Page 171 - Configuration:

CONFIGURING THE SWITCH3-196• Primary VLAN – The primary VLAN with which the selected VLAN is associated. (Note that this displays as VLAN 0 if the sel

Page 172 - Current status:

VLAN CONFIGURATION3-197Configuring Private VLANs The Private VLAN Configuration page is used to create/remove primary or community VLANs.Command Attri

Page 173

CONFIGURING THE SWITCH3-198Associating Community VLANsEach community VLAN must be associated with a primary VLAN.Command Attributes• Primary VLAN ID –

Page 174

VLAN CONFIGURATION3-199Displaying Private VLAN Interface InformationUse the Private VLAN Port Information and Private VLAN Trunk Information menus to

Page 175 - ONFIGURATION

CONFIGURING THE SWITCH3-200CLI – This example shows the switch configured with primary VLAN 5 and secondary VLAN 6. Port 3 has been configured as a pr

Page 176

VLAN CONFIGURATION3-201promiscuous ports. If PVLAN Port Type is “Host,” then specify the associated secondary VLAN.Web – Click Private VLAN, Private V

Page 177

CONFIGURING THE SWITCH3-202Class of Service Configuration Class of Service (CoS) allows you to specify which data packets have greater precedence when

Page 178

CLASS OF SERVICE CONFIGURATION3-203Web – Click Priority, Default Port Priority or Default Trunk Priority. Modify the default priority for any interfac

Page 179

TABLESxxii

Page 180

CONFIGURING THE SWITCH3-204Mapping CoS Values to Egress QueuesThis switch processes Class of Service (CoS) priority tagged traffic by using four prior

Page 181 - Configuring LACP Parameters

CLASS OF SERVICE CONFIGURATION3-205Web18 – Click Priority, Traffic Classes. Mark an interface and click Select to display the current mapping of CoS v

Page 182

CONFIGURING THE SWITCH3-206Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traffic in a

Page 183

CLASS OF SERVICE CONFIGURATION3-207Setting the Service Weight for Traffic ClassesThis switch uses the Weighted Round Robin (WRR) algorithm to determin

Page 184

CONFIGURING THE SWITCH3-208CLI – The following example shows how to assign WRR weights of 1, 4, 16 and 64 to the CoS priority queues 0, 1, 2 and 3.Lay

Page 185 - Displaying LACP Port Counters

CLASS OF SERVICE CONFIGURATION3-209• IP Precedence – Maps layer 3/4 priorities using IP Precedence.• IP DSCP – Maps layer 3/4 priorities using Differe

Page 186

CONFIGURING THE SWITCH3-210Command Attributes• IP Precedence Priority Table – Shows the IP Precedence to CoS map.• Class of Service Value – Maps a CoS

Page 187

CLASS OF SERVICE CONFIGURATION3-211Mapping DSCP PriorityThe DSCP is six bits wide, allowing coding for up to 64 different forwarding behaviors. The DS

Page 188

CONFIGURING THE SWITCH3-212Command Attributes• DSCP Priority Table – Shows the DSCP Priority to CoS map.• Class of Service Value – Maps a CoS value to

Page 189

CLASS OF SERVICE CONFIGURATION3-213CLI21 – The following example globally enables DSCP Priority service on the switch, maps DSCP value 0 to CoS value

Page 190

xxiiiFIGURESFigure 3-1 Home Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3Figure 3-2 Front Panel Indicators . .

Page 191

CONFIGURING THE SWITCH3-214Web – Click Priority, IP Port Status. Set IP Port Priority Status to Enabled. Figure 3-95 Globally Enabling the IP Port Pr

Page 192

CLASS OF SERVICE CONFIGURATION3-215CLI22 – The following example globally enables IP Port Priority service on the switch, maps HTTP traffic (on port 5

Page 193

CONFIGURING THE SWITCH3-216Web – Click Priority, Copy Settings. Select the source priority settings to be copied, enter the source port or trunk numbe

Page 194 - Command Attribute

CLASS OF SERVICE CONFIGURATION3-217Command UsageYou must configure an ACL mask before you can map CoS values to the rule.Command Attributes• Port – Po

Page 195 - Showing Port Statistics

CONFIGURING THE SWITCH3-218Changing Priorities Based on ACL RulesYou can change traffic priorities for frames matching the defined ACL rule. (This fea

Page 196

CLASS OF SERVICE CONFIGURATION3-219Web – Click Priority, ACL Marker. Select a port and an ACL rule. To specify a ToS priority, mark the Precedence/DSC

Page 197

CONFIGURING THE SWITCH3-220Multicast Filtering Multicasting is used to support real-time applications such as videoconferencing or streaming audio. A

Page 198

MULTICAST FILTERING3-221multicast host registration protocol that allows any host to inform its local router that it wants to receive transmissions ad

Page 199

CONFIGURING THE SWITCH3-222Static IGMP Host Interface – For multicast applications that you need to control more carefully, you can manually assign a

Page 200 - Figure 3-61 Port Statistics

MULTICAST FILTERING3-223• IGMP Query Count — Sets the maximum number of queries issued for which there has been no response before the switch takes ac

Page 201 - Power Over Ethernet Settings

FIGURESxxivFigure 3-37 802.1X Global Information . . . . . . . . . . . . . . . . . . . . . . 3-89Figure 3-38 802802.1X Global Configuration . . . .

Page 202

CONFIGURING THE SWITCH3-224CLI – This example modifies the settings for multicast filtering, and then displays the current status.Displaying Interface

Page 203

MULTICAST FILTERING3-225Web – Click IGMP Snooping, Multicast Router Port Information. Select the required VLAN ID from the scroll-down list to display

Page 204

CONFIGURING THE SWITCH3-226• Port or Trunk – Specifies the interface attached to a multicast router.Web – Click IGMP Snooping, Static Multicast Router

Page 205

MULTICAST FILTERING3-227• Multicast Group Port List – Shows the interfaces that have already been assigned to the selected VLAN to propagate a specifi

Page 206

CONFIGURING THE SWITCH3-228Assigning Ports to Multicast ServicesMulticast filtering can be dynamically configured using IGMP Snooping and IGMP Query m

Page 207

CONFIGURING DOMAIN NAME SERVICE3-229CLI – This example assigns a multicast address to VLAN 1, and then displays all the known multicast services suppo

Page 208

CONFIGURING THE SWITCH3-230through the domain list, appending each domain name in the list to the host name, and checking with the specified name serv

Page 209

CONFIGURING DOMAIN NAME SERVICE3-231Web – Select DNS, General Configuration. Set the default domain name or list of domain names, specify one or more

Page 210

CONFIGURING THE SWITCH3-232CLI - This example sets a default domain name and a domain list. However, remember that if a domain list is specified, the

Page 211 - LGORITHM

CONFIGURING DOMAIN NAME SERVICE3-233• Alias – Displays the host names that are mapped to the same address(es) as a previously configured entry.Web – S

Page 212

FIGURESxxvFigure 3-74 MSTP Port Information . . . . . . . . . . . . . . . . . . . . . . . . 3-175Figure 3-75 MSTP Port Configuration . . . . . . . .

Page 213

CONFIGURING THE SWITCH3-234CLI - This example maps two address to a host name, and then configures an alias host name for the same addresses.Displayin

Page 214

CONFIGURING DOMAIN NAME SERVICE3-235Web – Select DNS, Cache.Figure 3-107 Displaying the DNS CacheCLI - This example displays all the resource records

Page 215

CONFIGURING THE SWITCH3-236

Page 216

4-1CHAPTER 4COMMAND LINE INTERFACEThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceAccessing the CLI

Page 217

USING THE COMMAND LINE INTERFACE4-2After connecting to the system through the console port, the login screen displays:Telnet ConnectionTelnet operates

Page 218

COMMAND LINE INTERFACE4-3After you configure the switch with an IP address, you can open a Telnet session by performing these steps.1. From the remote

Page 219

ENTERING COMMANDS4-4You can enter commands as follows:• To enter a simple command, enter the command keyword. • To enter multiple commands, enter each

Page 220

COMMAND LINE INTERFACE4-5Database). You can also display a list of valid keywords for a specific command. For example, the command “show ?” displays a

Page 221

ENTERING COMMANDS4-6Partial Keyword LookupIf you terminate a partial keyword with a question mark, alternatives that match the initial letters are pro

Page 222

COMMAND LINE INTERFACE4-7mode. You can always enter a question mark “?” at the prompt to display a list of the commands available for the current mode

Page 223

38 TeslaIrvine, CA 92618Phone: (949) 679-8000TigerStack III 10/100Management GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsJune 20

Page 224

FIGURESxxvi

Page 225

ENTERING COMMANDS4-8Configuration CommandsConfiguration commands are privileged level commands used to modify switch settings. These commands modify t

Page 226

COMMAND LINE INTERFACE4-9To enter the other modes, at the configuration prompt type one of the following commands. Use the exit or end command to retu

Page 227

ENTERING COMMANDS4-10Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough

Page 228

COMMAND LINE INTERFACE4-11Command GroupsThe system commands can be broken down into the functional groups shown below.Table 4-4 Command Group IndexC

Page 229

COMMAND GROUPS4-12The access mode shown in the following tables is indicated by these abbreviations: NE (Normal Exec) IC (Interface Configuration) PE

Page 230

COMMAND LINE INTERFACE4-13Line CommandsYou can access the onboard configuration program by attaching a VT100 compatible device to the switch’s serial

Page 231

LINE COMMANDS4-14lineThis command identifies a specific line for configuration, and to process subsequent line configuration commands.Syntax line {con

Page 232

COMMAND LINE INTERFACE4-15loginThis command enables password checking at login. Use the no form to disable password checking and allow connections wit

Page 233

LINE COMMANDS4-16Related Commandsusername (4-34)password (4-16)passwordThis command specifies the password for a line. Use the no form to remove the p

Page 234

COMMAND LINE INTERFACE4-17Related Commandslogin (4-15)password-thresh (4-19)timeout login responseThis command sets the interval that the system waits

Page 235 - VLAN Configuration

1-1CHAPTER 1INTRODUCTIONThese switches provide a broad range of features for Layer 2 switching. They include a management agent that allows you to con

Page 236 - Assigning Ports to VLANs

LINE COMMANDS4-18exec-timeoutThis command sets the interval that the system waits until user input is detected. Use the no form to restore the default

Page 237

COMMAND LINE INTERFACE4-19password-threshThis command sets the password intrusion threshold which limits the number of failed logon attempts. Use the

Page 238

LINE COMMANDS4-20silent-timeThis command sets the amount of time the management console is inaccessible after the number of unsuccessful logon attempt

Page 239

COMMAND LINE INTERFACE4-21Default Setting 8 data bits per characterCommand Mode Line Configuration Command Usage The databits command can be used to m

Page 240

LINE COMMANDS4-22Command Usage Communication protocols provided by devices such as terminals and modems often require a specific parity bit setting.Ex

Page 241 - Displaying Current VLANs

COMMAND LINE INTERFACE4-23stopbitsThis command sets the number of the stop bits transmitted per byte. Use the no form to restore the default setting.S

Page 242 - Creating VLANs

LINE COMMANDS4-24Example Related Commandsshow ssh (4-53)show users (4-80)show lineThis command displays the terminal line’s parameters.Syntax show lin

Page 243

COMMAND LINE INTERFACE4-25General CommandsenableThis command activates Privileged Exec mode. In privileged mode, additional commands are available, an

Page 244

GENERAL COMMANDS4-26Command Usage • “super” is the default password required to change the command mode from Normal Exec to Privileged Exec. (To set t

Page 245

COMMAND LINE INTERFACE4-27configureThis command activates Global Configuration mode. You must enter this mode to modify any settings on the switch. Yo

Page 246

INTRODUCTION1-2Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Flow control eliminates th

Page 247

GENERAL COMMANDS4-28Example In this example, the show history command lists the contents of the command history buffer:The ! command repeats commands

Page 248

COMMAND LINE INTERFACE4-29Example This example shows how to reset the switch:endThis command returns to Privileged Exec mode.Default Setting NoneComma

Page 249

GENERAL COMMANDS4-30Example This example shows how to return to the Privileged Exec mode from the Global Configuration mode, and then quit the CLI ses

Page 250 - Private VLANs

COMMAND LINE INTERFACE4-31System Management CommandsThese commands are used to control system logs, passwords, user names, browser configuration optio

Page 251

SYSTEM MANAGEMENT COMMANDS4-32Device Designation CommandspromptThis command customizes the CLI prompt. Use the no form to revert to the default prompt

Page 252

COMMAND LINE INTERFACE4-33hostnameThis command specifies or modifies the host name for this device. Use the no form to restore the default host name.S

Page 253 - Configuring Private VLANs

SYSTEM MANAGEMENT COMMANDS4-34User Access CommandsThe basic commands required for management access are listed in this section. This switch also inclu

Page 254 - Associating Community VLANs

COMMAND LINE INTERFACE4-35Default Setting • The default access level is Normal Exec. • The factory defaults for the user names and passwords are: Comm

Page 255

SYSTEM MANAGEMENT COMMANDS4-36enable passwordAfter initially logging onto the system, you should set the Privileged Exec password. Remember to record

Page 256

COMMAND LINE INTERFACE4-37Related Commandsenable (4-25)authentication enable (4-99)IP Filter CommandsmanagementThis command specifies the client IP ad

Page 257

DESCRIPTION OF SOFTWARE FEATURES1-3priority queueing ensures the minimum delay for moving real-time multimedia data across the network. While multicas

Page 258

SYSTEM MANAGEMENT COMMANDS4-38Command Usage • If anyone tries to access a management interface on the switch from an invalid address, the switch will

Page 259

COMMAND LINE INTERFACE4-39ExampleWeb Server CommandsConsole#show management all-clientManagement Ip Filter Http-Client: Start ip address End ip

Page 260

SYSTEM MANAGEMENT COMMANDS4-40ip http portThis command specifies the TCP port number used by the web browser interface. Use the no form to use the def

Page 261

COMMAND LINE INTERFACE4-41ExampleRelated Commandsip http port (4-40)ip http secure-serverThis command enables the secure hypertext transfer protocol (

Page 262 - Selecting the Queue Mode

SYSTEM MANAGEMENT COMMANDS4-42• The following web browsers and operating systems currently support HTTPS:• To specify a secure-site certificate, see “

Page 263

COMMAND LINE INTERFACE4-43Command Usage • You cannot configure the HTTP and HTTPS servers to use the same port. • If you change the HTTPS port number,

Page 264

SYSTEM MANAGEMENT COMMANDS4-44Default Setting •Server: Enabled• Server Port: 23Command Mode Global ConfigurationExampleSecure Shell Commands The Berkl

Page 265 - Mapping IP Precedence

COMMAND LINE INTERFACE4-45The SSH server on this switch supports both password and public key authentication. If password authentication is specified

Page 266

SYSTEM MANAGEMENT COMMANDS4-46switch as described in the following section. Note that regardless of whether you use public key or password authenticat

Page 267 - Mapping DSCP Priority

COMMAND LINE INTERFACE4-475. Enable SSH Service – Use the ip ssh server command to enable the SSH server on the switch.6. Configure Challenge-Response

Page 268

INTRODUCTION1-4switch connections. Flow control should also be enabled to control network traffic during periods of congestion and prevent the loss of

Page 269 - Mapping IP Port Priority

SYSTEM MANAGEMENT COMMANDS4-48Command Usage • The SSH server supports up to four client sessions. The maximum number of client sessions includes both

Page 270

COMMAND LINE INTERFACE4-49Command Usage The timeout specifies the interval the switch will wait for a response from the client during the SSH negotiat

Page 271 - Copy Settings

SYSTEM MANAGEMENT COMMANDS4-50ip ssh server-key sizeThis command sets the SSH server key size. Use the no form to restore the default setting.Syntax i

Page 272 - Mapping CoS Values to ACLs

COMMAND LINE INTERFACE4-51Example ip ssh crypto host-key generateUse this command to generate the host key pair (i.e., public and private). Syntax ip

Page 273

SYSTEM MANAGEMENT COMMANDS4-52ip ssh crypto zeroizeThis command clears the host key from memory (i.e. RAM). Syntax ip ssh crypto zeroize [dsa | rsa]•

Page 274

COMMAND LINE INTERFACE4-53Default Setting Saves both the DSA and RSA key.Command Mode Privileged ExecExample Related Commandsip ssh crypto host-key ge

Page 275

SYSTEM MANAGEMENT COMMANDS4-54Table 4-16 show ssh - display descriptionField DescriptionSession The session number. (Range: 0-3)Version The Secure S

Page 276 - Multicast Filtering

COMMAND LINE INTERFACE4-55show public-keyThis command shows the public key for the specified user or for the host.Syntax show public-key [user [userna

Page 277 - ILTERING

SYSTEM MANAGEMENT COMMANDS4-56Example Event Logging Commands Console#show public-key hostHost:RSA:1024 35 15684995401867669259333946775054617325313674

Page 278

COMMAND LINE INTERFACE4-57logging onThis command controls logging of error messages, sending debug or error messages to switch memory. The no form dis

Page 279

DESCRIPTION OF SOFTWARE FEATURES1-5IEEE 802.1D Bridge – The switch supports IEEE 802.1D transparent bridging. The address table facilitates data switc

Page 280

SYSTEM MANAGEMENT COMMANDS4-58• ram - Event history stored in temporary RAM (i.e., memory flushed on power reset). • level - One of the syslog severit

Page 281

COMMAND LINE INTERFACE4-59logging hostThis command adds a syslog server host IP address that will receive logging messages. Use the no form to remove

Page 282

SYSTEM MANAGEMENT COMMANDS4-60Command Usage The command specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effe

Page 283

COMMAND LINE INTERFACE4-61clear logUse this command to clear messages from the log buffer.Syntax clear log [flash | ram]• flash - Event history stored

Page 284

SYSTEM MANAGEMENT COMMANDS4-62Default Setting NoneCommand Mode Privileged ExecExampleThe following example shows that system logging is enabled, the m

Page 285

COMMAND LINE INTERFACE4-63Related Commandsshow logging sendmail (4-68)show logThis command displays the log messages stored in local memory.Syntax sho

Page 286

SYSTEM MANAGEMENT COMMANDS4-64ExampleThe following example shows the event message stored in RAM. SMTP Alert CommandsConfigures SMTP event handling, a

Page 287 - Figure 3-105 Configuring DNS

COMMAND LINE INTERFACE4-65Default Setting NoneCommand Mode Global ConfigurationCommand Usage • You can specify up to three SMTP servers for event hand

Page 288

SYSTEM MANAGEMENT COMMANDS4-66Command Usage The specified level indicates an event threshold. All events at this level or higher will be sent to the c

Page 289

COMMAND LINE INTERFACE4-67logging sendmail destination-emailThis command specifies the email recipients of alert messages. Use the no form to remove a

Page 290

INTRODUCTION1-6for different VLANs. It simplifies network management, provides for even faster convergence than RSTP by limiting the size of each regi

Page 291 - Web – Select DNS, Cache

SYSTEM MANAGEMENT COMMANDS4-68Exampleshow logging sendmailThis command displays the settings for the SMTP event handler.Command Mode Normal Exec, Priv

Page 292

COMMAND LINE INTERFACE4-69sntp clientThis command enables SNTP client requests for time synchronization from NTP or SNTP time servers specified with t

Page 293 - Console Connection

SYSTEM MANAGEMENT COMMANDS4-70ExampleRelated Commandssntp server (4-70)sntp poll (4-71)show sntp (4-72)sntp serverThis command sets the IP address of

Page 294 - Telnet Connection

COMMAND LINE INTERFACE4-71Command Usage This command specifies time servers from which the switch will poll for time updates when set to SNTP client m

Page 295 - Keywords and Arguments

SYSTEM MANAGEMENT COMMANDS4-72Related Commandssntp client (4-69)show sntpThis command displays the current time and configuration settings for the SNT

Page 296 - Showing Commands

COMMAND LINE INTERFACE4-73clock timezoneThis command sets the time zone for the switch’s internal clock.Syntaxclock timezone name hour hours minute mi

Page 297 - NTERFACE

SYSTEM MANAGEMENT COMMANDS4-74calendar setThis command sets the system clock. It may be used if there is no time server on your network, or if you hav

Page 298 - Understanding Command Modes

COMMAND LINE INTERFACE4-75ExampleThis example shows how to display the current system clock setting. System Status Commandsshow startup-configThis com

Page 299 - Exec Commands

SYSTEM MANAGEMENT COMMANDS4-76• This command displays settings for key command modes. Each mode group is separated by “!” symbols, and includes the co

Page 300 - Configuration Commands

COMMAND LINE INTERFACE4-77Related Commandsshow running-config (4-77)show running-configThis command displays the configuration information currently i

Page 301 - Privileged Exec mode

SYSTEM DEFAULTS1-7priorities are mapped to a Class of Service value by the switch, and the traffic then sent to the corresponding output queue. Multic

Page 302 - Command Line Processing

SYSTEM MANAGEMENT COMMANDS4-78ExampleRelated Commandsshow startup-config (4-75)Console#show running-config!IP address DHCP!phymap 00-04-e2-b3-16-c0 00

Page 303 - Command Groups

COMMAND LINE INTERFACE4-79show systemThis command displays system information.Default Setting NoneCommand Mode Normal Exec, Privileged ExecCommand Usa

Page 304

SYSTEM MANAGEMENT COMMANDS4-80show usersShows all active console and Telnet sessions, including user name, idle time, and IP address of Telnet client.

Page 305 - Line Commands

COMMAND LINE INTERFACE4-81Command Mode Normal Exec, Privileged ExecCommand Usage See “Displaying Switch Hardware/Software Versions” on page 3-15 for d

Page 306 - Console(config-line)#

FLASH/FILE COMMANDS4-82copy Use this command to move (upload/download) a code image or configuration file between the switch’s flash memory and a TFTP

Page 307

COMMAND LINE INTERFACE4-83Command Usage • The system prompts for data required to complete the copy command. • The destination file name should not co

Page 308

FLASH/FILE COMMANDS4-84Example The following example shows how to upload the configuration settings to a file on the TFTP server.The following example

Page 309

COMMAND LINE INTERFACE4-85This example shows how to copy a public-key used by SSH from an TFTP server. Note that public key authentication via SSH is

Page 310

FLASH/FILE COMMANDS4-86deleteThis command deletes a file or image.Syntax delete [unit:] filenamefilename - Name of the configuration file or image nam

Page 311

COMMAND LINE INTERFACE4-87dirThis command displays a list of files in flash memory.Syntax dir [unit:] {{boot-rom: | config: | opcode:} [filename]}The

Page 312

INTRODUCTION1-8Authentication Privileged Exec Level Username “admin”Password “admin”Normal Exec Level Username “guest”Password “guest”Enable Privilege

Page 313

FLASH/FILE COMMANDS4-88ExampleThe following example shows how to display all file information: whichbootThis command displays which files were booted

Page 314

COMMAND LINE INTERFACE4-89boot systemUse this command to specify the file or image used to start up the system.Syntax boot system [unit:] {boot-rom| c

Page 315

POWER OVER ETHERNET COMMANDS4-90Power over Ethernet CommandsThe commands in this group control the power that can be delivered to attached PoE devices

Page 316

COMMAND LINE INTERFACE4-91power mainpower maximum allocationThis command defines a power budget for the switch (i.e., the power available to all switc

Page 317 - General Commands

POWER OVER ETHERNET COMMANDS4-92Default Setting DisabledCommand Mode Global ConfigurationCommand Usage • The switch automatically detects attached PoE

Page 318 - Console>

COMMAND LINE INTERFACE4-93power inlineThis command instructs the switch to automatically detect if a PoE-compliant device is connected to the specifie

Page 319

POWER OVER ETHERNET COMMANDS4-94Command Mode Interface ConfigurationCommand Usage If a device is connected to a switch port and the switch detects tha

Page 320

COMMAND LINE INTERFACE4-95• Power is dropped from low-priority ports in sequence starting from port number 1.ExampleRelated Commandspower mainpower ma

Page 321

POWER OVER ETHERNET COMMANDS4-96show power mainpowerUse this command to display the current power status for the switch.Command Mode Privileged ExecEx

Page 322

COMMAND LINE INTERFACE4-97Authentication Commands You can configure this switch to authenticate users logging into the system for management access us

Page 323 - System Management Commands

SYSTEM DEFAULTS1-9Power over Ethernet*Status Enabled (all ports)Rate Limiting Input and output limits DisabledPort Trunking Static Trunks NoneLACP Dis

Page 324 - Device Designation Commands

AUTHENTICATION COMMANDS4-98authentication loginThis command defines the login authentication method and precedence. Use the no form to restore the def

Page 325

COMMAND LINE INTERFACE4-99Example Related Commandsusername - for setting the local user names and passwords (4-34)authentication enableThis command de

Page 326 - User Access Commands

AUTHENTICATION COMMANDS4-100• You can specify three authentication methods in a single command to indicate the authentication sequence. For example, i

Page 327

COMMAND LINE INTERFACE4-101radius-server hostThis command specifies primary and backup RADIUS servers and authentication parameters that apply to each

Page 328

AUTHENTICATION COMMANDS4-102radius-server portThis command sets the RADIUS server network port. Use the no form to restore the default.Syntax radius-s

Page 329 - IP Filter Commands

COMMAND LINE INTERFACE4-103Example radius-server retransmitThis command sets the number of retries. Use the no form to restore the default.Syntax radi

Page 330

AUTHENTICATION COMMANDS4-104Command Mode Global ConfigurationExample show radius-serverThis command displays the current settings for the RADIUS serve

Page 331 - Web Server Commands

COMMAND LINE INTERFACE4-105TACACS+ Client Terminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that uses soft

Page 332

AUTHENTICATION COMMANDS4-106tacacs-server portThis command specifies the TACACS+ server network port. Use the no form to restore the default.Syntax ta

Page 333

COMMAND LINE INTERFACE4-107Example show tacacs-serverThis command displays the current settings for the TACACS+ server.Default Setting NoneCommand Mod

Page 334

Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, n

Page 335 - Telnet Server Commands

INTRODUCTION1-10IP Settings Management VLAN 1IP Address 0.0.0.0Subnet Mask 255.0.0.0Default Gateway 0.0.0.0DHCP EnabledBOOTP DisabledMulticast Filteri

Page 336 - Secure Shell Commands

AUTHENTICATION COMMANDS4-108port securityThis command enables or configures port security. Use the no form without any keywords to disable port securi

Page 337

COMMAND LINE INTERFACE4-109Command Usage • If you enable port security, the switch stops learning new MAC addresses on the specified port when it has

Page 338

AUTHENTICATION COMMANDS4-110802.1X Port Authentication The switch supports IEEE 802.1X (dot1x) port-based access control that prevents unauthorized ac

Page 339

COMMAND LINE INTERFACE4-111dot1x system-auth-controlThis command enables IEEE 802.1X port authentication globally on the switch. Use the no form to re

Page 340

AUTHENTICATION COMMANDS4-112Default2 Command ModeInterface ConfigurationExampledot1x port-controlThis command sets the dot1x mode on a port interface.

Page 341

COMMAND LINE INTERFACE4-113dot1x operation-modeThis command allows single or multiple hosts (clients) to connect to an 802.1X-authorized port. Use the

Page 342

AUTHENTICATION COMMANDS4-114dot1x re-authenticateThis command forces re-authentication on all ports or a specific interface.Syntaxdot1x re-authenticat

Page 343

COMMAND LINE INTERFACE4-115dot1x timeout quiet-periodThis command sets the time that a switch port waits after the Max Request Count has been exceeded

Page 344

AUTHENTICATION COMMANDS4-116Exampledot1x timeout tx-periodThis command sets the time that an interface on the switch waits during an authentication se

Page 345 - Console#show ssh

COMMAND LINE INTERFACE4-117Command ModePrivileged ExecCommand UsageThis command displays the following information: • Global 802.1X Parameters – Shows

Page 346

2-1CHAPTER 2INITIAL CONFIGURATIONConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent offer

Page 347

AUTHENTICATION COMMANDS4-118- Supplicant– MAC address of authorized client.- Current Identifier– The integer (0-255) used by the Authenticator to iden

Page 348 - Event Logging Commands

COMMAND LINE INTERFACE4-119Access Control List CommandsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol,

Page 349

ACCESS CONTROL LIST COMMANDS4-120soon as it matches a deny rule. If no rules match for a list of all permit rules, the packet is dropped; and if no ru

Page 350 - Table 4-18 Logging Levels

COMMAND LINE INTERFACE4-121• Egress MAC ACLs only work for destination-mac-known packets, not for multicast, broadcast, or destination-mac-unknown pac

Page 351

ACCESS CONTROL LIST COMMANDS4-122IP ACLs Table 4-36 IP ACL CommandsCommand Function Mode Pageaccess-list ip Creates an IP ACL and enters configurati

Page 352

COMMAND LINE INTERFACE4-123access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. Use the

Page 353

ACCESS CONTROL LIST COMMANDS4-124access-list ip extended fragment-auto-maskThis command automatically creates extra masks to support fragmented ACL en

Page 354

COMMAND LINE INTERFACE4-125Command ModeStandard ACLCommand Usage• New rules are appended to the end of the list.• Address bitmasks are similar to a su

Page 355

ACCESS CONTROL LIST COMMANDS4-126[no] {permit | deny} tcp {any | source address-bitmask | host source} {any | destination address-bitmask | host desti

Page 356 - SMTP Alert Commands

COMMAND LINE INTERFACE4-127with the address for each IP packet entering the port(s) to which this ACL has been assigned.• You can specify both Precede

Page 357

INITIAL CONFIGURATION2-2The switch’s CLI configuration program, web interface, and SNMP agent allow you to perform the following management functions:

Page 358

ACCESS CONTROL LIST COMMANDS4-128This permits all TCP packets from class C addresses 192.168.1.0 with the TCP control code set to “SYN.”Related Comman

Page 359

COMMAND LINE INTERFACE4-129access-list ip mask-precedence This command changes to the IP Mask mode used to configure access control masks. Use the no

Page 360 - Time Commands

ACCESS CONTROL LIST COMMANDS4-130mask (IP ACL)This command defines a mask for IP ACLs. This mask defines the fields to check in the IP header. Use the

Page 361

COMMAND LINE INTERFACE4-131determined by the mask, and not the order in which the ACL rules were entered.• First create the required ACLs and ingress

Page 362

ACCESS CONTROL LIST COMMANDS4-132This shows how to create a standard ACL with an ingress mask to deny access to the IP host 171.69.198.102, and permit

Page 363

COMMAND LINE INTERFACE4-133This is a more comprehensive example. It denies any TCP packets in which the SYN bit is ON, and permits all other packets.

Page 364

ACCESS CONTROL LIST COMMANDS4-134Example Related Commandsmask (IP ACL) (4-130)ip access-group This command binds a port to an IP ACL. Use the no form

Page 365

COMMAND LINE INTERFACE4-135Related Commandsshow ip access-list (4-128)show ip access-groupThis command shows the ports assigned to IP ACLs.Command Mod

Page 366

ACCESS CONTROL LIST COMMANDS4-136• A packet matching a rule within the specified ACL is mapped to one of the output queues as shown in the following t

Page 367 - System Status Commands

COMMAND LINE INTERFACE4-137Related Commandsmap access-list ip (4-135)match access-list ip This command changes the IEEE 802.1p priority, IP Precedence

Page 368

CONNECTING TO THE SWITCH2-3Required ConnectionsThe switch provides an RS-232 serial port that enables a connection to a PC or terminal for monitoring

Page 369

ACCESS CONTROL LIST COMMANDS4-138IP frame header can include either the IP Precedence or DSCP priority type.• The precedence for priority mapping by t

Page 370 - Related Commands

COMMAND LINE INTERFACE4-139access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form to remove the sp

Page 371

ACCESS CONTROL LIST COMMANDS4-140Command Usage• An egress ACL must contain all deny rules.• When you create a new ACL or enter configuration mode for

Page 372

COMMAND LINE INTERFACE4-141[no] {permit | deny} untagged-eth2{any | host source | source address-bitmask} {any | host destination | destination addres

Page 373 - Flash/File Commands

ACCESS CONTROL LIST COMMANDS4-142• A detailed listing of Ethernet protocol types can be found in RFC 1060. A few of the more common types include the

Page 374

COMMAND LINE INTERFACE4-143access-list mac mask-precedence This command changes to MAC Mask mode used to configure access control masks. Use the no fo

Page 375

ACCESS CONTROL LIST COMMANDS4-144mask (MAC ACL)This command defines a mask for MAC ACLs. This mask defines the fields to check in the packet header. U

Page 376

COMMAND LINE INTERFACE4-145ExampleThis example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of the ru

Page 377

ACCESS CONTROL LIST COMMANDS4-146show access-list mac mask-precedence This command shows the ingress or egress rule masks for MAC ACLs.Syntaxshow acce

Page 378 - Console#delete test2.cfg

COMMAND LINE INTERFACE4-147• If a port is already bound to an ACL and you bind it to a different ACL, the switch will replace the old binding with the

Page 379 - Column Heading Description

INITIAL CONFIGURATION2-4Notes: 1. When using HyperTerminal with Microsoft® Windows® 2000, make sure that you have Windows 2000 Service Pack 2 or later

Page 380

ACCESS CONTROL LIST COMMANDS4-148Default SettingNoneCommand ModeInterface Configuration (Ethernet)Command Usage• You must configure an ACL mask before

Page 381

COMMAND LINE INTERFACE4-149Command ModePrivileged ExecExample Related Commandsmap access-list mac (4-147)match access-list mac This command changes th

Page 382 - Power over Ethernet Commands

ACCESS CONTROL LIST COMMANDS4-150Related Commands show marking (4-138)ACL Informationshow access-listThis command shows all ACLs and associated rules,

Page 383

COMMAND LINE INTERFACE4-151show access-groupThis command shows the port assignments of ACLs.Command ModePrivileged ExecutiveExample SNMP CommandsContr

Page 384

SNMP COMMANDS4-152snmp-serverThis command enables the SNMPv3 engine and services for all management clients (i.e., versions 1, 2c, 3). Use the no form

Page 385

COMMAND LINE INTERFACE4-153show snmpThis command can be used to check the status of SNMP communications.Default Setting NoneCommand Mode Normal Exec,

Page 386 - Console(config-if)#

SNMP COMMANDS4-154snmp-server communityThis command defines the SNMP v1 and v2c community access string. Use the no form to remove the specified commu

Page 387

COMMAND LINE INTERFACE4-155Default Setting NoneCommand Mode Global ConfigurationExampleRelated Commandssnmp-server location (4-155)snmp-server locatio

Page 388 - Privileged Exec

SNMP COMMANDS4-156snmp-server hostThis command specifies the recipient of a Simple Network Management Protocol notification operation. Use the no form

Page 389 - Authentication Sequence

COMMAND LINE INTERFACE4-157Default Setting • Host Address: None• Notification Type: Traps•SNMP Version: 1• UDP Port: 162Command Mode Global Configurat

Page 390

STACK OPERATIONS2-5Note: The onboard program only provides access to basic configuration functions. To access the full range of SNMP management functi

Page 391

SNMP COMMANDS4-1583. Specify the target host that will receive inform messages with the snmp-server host command as described in this section.4. Creat

Page 392 - RADIUS Client

COMMAND LINE INTERFACE4-159snmp-server enable trapsThis command enables this device to send Simple Network Management Protocol traps or informs (i.e.,

Page 393

SNMP COMMANDS4-160ExampleRelated Commandssnmp-server host (4-156)snmp-server engine-idThis command configures an identification string for the SNMPv3

Page 394

COMMAND LINE INTERFACE4-161the engine ID of the authoritative agent. For informs, the authoritative SNMP agent is the remote agent. You therefore need

Page 395

SNMP COMMANDS4-162snmp-server viewThis command adds an SNMP view which controls user access to the MIB. Use the no form to remove an SNMP view.Syntax

Page 396

COMMAND LINE INTERFACE4-163ExamplesThis view includes MIB-2.This view includes the MIB-2 interfaces table, ifDescr. The wild card is used to select al

Page 397 - TACACS+ Client

SNMP COMMANDS4-164snmp-server groupThis command adds an SNMP group, mapping SNMP users to SNMP views. Use the no form to remove an SNMP group.Syntax s

Page 398

COMMAND LINE INTERFACE4-165Command Usage • A group sets the access policy for the assigned users.• When authentication is selected, the MD5 or SHA alg

Page 399 - Port Security Commands

SNMP COMMANDS4-166Group Name: publicSecurity Model: v2cRead View: defaultviewWrite View: noneNotify View: noneStorage Type: volatileRow Status: active

Page 400

COMMAND LINE INTERFACE4-167snmp-server userThis command adds a user to an SNMP group, restricting the user to a specific SNMP Read and a Write View. U

Page 401

INITIAL CONFIGURATION2-6Resilient IP Interface for Management Access The stack functions as one integral system for management and configuration purpo

Page 402 - 802.1X Port Authentication

SNMP COMMANDS4-168ID with the snmp-server engine-id command before using this configuration command.• Before you configure a remote user, use the snmp

Page 403

COMMAND LINE INTERFACE4-169show snmp userThis command shows information on SNMP users.Command Mode Privileged ExecExample Console#show snmp userEngine

Page 404

INTERFACE COMMANDS4-170Interface CommandsThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or

Page 405

COMMAND LINE INTERFACE4-171interfaceThis command configures an interface type and enter interface configuration mode. Use the no form to remove a trun

Page 406

INTERFACE COMMANDS4-172Default Setting NoneCommand Mode Interface Configuration (Ethernet, Port Channel)Example The following example adds a descripti

Page 407

COMMAND LINE INTERFACE4-173•When using the negotiation command to enable auto-negotiation, the optimal settings will be determined by the capabilities

Page 408

INTERFACE COMMANDS4-174Example The following example configures port 11 to use autonegotiationRelated Commands negotiation (4-173)speed-duplex (4-172)

Page 409

COMMAND LINE INTERFACE4-175Command Usage When auto-negotiation is enabled with the negotiation command, the switch will negotiate the best settings fo

Page 410

INTERFACE COMMANDS4-176• To force flow control on or off (with the flowcontrol or no flowcontrol command), use the no negotiation command to disable a

Page 411 - Access Control List Commands

COMMAND LINE INTERFACE4-177Example The following example disables port 5.switchport broadcast packet-rateThis command configures broadcast storm contr

Page 412

BASIC CONFIGURATION2-74. The session is opened and the CLI displays the “Console#” prompt indicating you have access at the Privileged Exec level. Set

Page 413

INTERFACE COMMANDS4-178clear countersThis command clears statistics on an interface.Syntaxclear counters interfaceinterface • ethernet unit/port- unit

Page 414 - IP ACLs

COMMAND LINE INTERFACE4-179show interfaces statusThis command displays the status for an interface.Syntax show interfaces status [interface]interface

Page 415

INTERFACE COMMANDS4-180Example show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]interfac

Page 416 - Console(config)#

COMMAND LINE INTERFACE4-181Command Usage If no interface is specified, information on all interfaces is displayed. For a description of the items disp

Page 417

INTERFACE COMMANDS4-182show interfaces switchportThis command displays the administrative and operational status of the specified interfaces.Syntax sh

Page 418

COMMAND LINE INTERFACE4-183Table 4-47 show interfaces switchport - display descriptionField DescriptionBroadcast threshold Shows if broadcast storm

Page 419

MIRROR PORT COMMANDS4-184Mirror Port CommandsThis section describes how to mirror traffic from a source port to a target port.port monitorThis command

Page 420

COMMAND LINE INTERFACE4-185• The destination port is set by specifying an Ethernet interface. • The mirror port and monitor port speeds should match,

Page 421

RATE LIMIT COMMANDS4-186Example The following shows mirroring configured from port 6 to port 11:Rate Limit CommandsThis function allows the network ma

Page 422

COMMAND LINE INTERFACE4-187rate-limitThis command defines the rate limit for a specific interface. Use this command without specifying a rate to resto

Page 423

INITIAL CONFIGURATION2-8Dynamic — The switch sends IP configuration requests to BOOTP or DHCP address allocation servers on the network. Note: Only on

Page 424

LINK AGGREGATION COMMANDS4-188Link Aggregation CommandsPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth

Page 425

COMMAND LINE INTERFACE4-189Guidelines for Creating TrunksGeneral Guidelines –• Finish configuring port trunks before you connect the corresponding net

Page 426

LINK AGGREGATION COMMANDS4-190channel-group This command adds a port to a trunk. Use the no form to remove a port from a trunk.Syntax channel-group ch

Page 427

COMMAND LINE INTERFACE4-191Command Mode Interface Configuration (Ethernet)Command Usage • The ports on both ends of an LACP trunk must be configured f

Page 428 - Priority 1,2 0,3 4,5 6,7

LINK AGGREGATION COMMANDS4-192lacp system-priorityThis command configures a port's LACP system priority. Use the no form to restore the default s

Page 429

COMMAND LINE INTERFACE4-193• Once the remote side of a link has been established, LACP operational settings are already in use on that side. Configuri

Page 430 - MAC ACLs

LINK AGGREGATION COMMANDS4-194• Once the remote side of a link has been established, LACP operational settings are already in use on that side. Config

Page 431

COMMAND LINE INTERFACE4-195Examplelacp port-priorityThis command configures LACP port priority. Use the no form to restore the default setting.Syntax

Page 432 - Console(config-mac-acl)#

LINK AGGREGATION COMMANDS4-196show lacpThis command displays LACP information.Syntax show lacp [port-channel] {counters | internal | neighbors | sys-i

Page 433

COMMAND LINE INTERFACE4-197Marker Received Number of valid Marker PDUs received by this channel group.LACPDUs Unknown PktsNumber of frames received th

Page 434

BASIC CONFIGURATION2-94. To set the IP address of the default gateway for the network to which the switch belongs, type “ip default-gateway gateway,”

Page 435

LINK AGGREGATION COMMANDS4-198LACP Port PriorityLACP port priority assigned to this interface within the channel group.Admin State,Oper StateAdministr

Page 436

COMMAND LINE INTERFACE4-199Console#show lacp 1 neighborsChannel group 1 neighbors---------------------------------------------------------------------

Page 437

ADDRESS TABLE COMMANDS4-200Address Table CommandsThese commands are used to configure the address table for filtering specified addresses, displaying

Page 438 - MAC egress mask ACL:

COMMAND LINE INTERFACE4-201mac-address-table staticThis command maps a static address to a destination port in a VLAN. Use the no form to remove an ad

Page 439

ADDRESS TABLE COMMANDS4-202Exampleclear mac-address-table dynamicThis command removes any learned entries from the forwarding database and clears the

Page 440 - Priority 1,2 3 4,5 6,7

COMMAND LINE INTERFACE4-203Default Setting NoneCommand Mode Privileged ExecCommand Usage • The MAC Address Table contains the MAC addresses associated

Page 441

SPANNING TREE COMMANDS4-204Command Mode Global ConfigurationCommand Usage The aging time is used to age out dynamically learned forwarding information

Page 442 - ACL Information

COMMAND LINE INTERFACE4-205spanning-tree hello-time Configures the spanning tree bridge hello time GC 4-209spanning-tree max-age Configures the spann

Page 443 - SNMP Commands

SPANNING TREE COMMANDS4-206spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Syntax

Page 444 - Console(config)#snmp-server

COMMAND LINE INTERFACE4-207ensure that only one route exists between any two stations on the network, and provide backup links which automatically tak

Page 445

iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Page 446

INITIAL CONFIGURATION2-104. Type “ip dhcp restart” to begin broadcasting service requests. Press <Enter>.5. Wait a few minutes, and then check t

Page 447

SPANNING TREE COMMANDS4-208• Rapid Spanning Tree ProtocolRSTP supports connections to either STP or RSTP nodes by monitoring the incoming protocol mes

Page 448

COMMAND LINE INTERFACE4-209Default Setting 15 secondsCommand Mode Global ConfigurationCommand Usage This command sets the maximum time (in seconds) th

Page 449

SPANNING TREE COMMANDS4-210Examplespanning-tree max-ageThis command configures the spanning tree bridge maximum age globally for this switch. Use the

Page 450

COMMAND LINE INTERFACE4-211spanning-tree default priorityUse this command to configure the spanning-tree priority to use increments specified by IEEE

Page 451

SPANNING TREE COMMANDS4-212Default Setting 32768Command Mode Global ConfigurationCommand Usage Bridge priority is used in selecting the root device, r

Page 452

COMMAND LINE INTERFACE4-213Command Usage The path cost method is used to determine the best path between devices. Therefore, lower values should be as

Page 453

SPANNING TREE COMMANDS4-214spanning-tree backup-root This command adjusts the bridge priority in an attempt to take over as the new root bridge if it

Page 454

COMMAND LINE INTERFACE4-215Related Commands mst vlan (4-215)mst priority (4-216)name (4-217)revision (4-218)max-hops (4-218)mst vlanThis command adds

Page 455 - Field Description

SPANNING TREE COMMANDS4-216MSTI region as a single node, connecting all regions to the Common Spanning Tree.Example mst priorityThis command configure

Page 456

COMMAND LINE INTERFACE4-217Example nameThis command configures the name for the multiple spanning tree region in which this switch is located. Use the

Page 457

BASIC CONFIGURATION2-11entire MIB tree. However, you may assign new views to version 1 or 2c community strings that suit your specific security requir

Page 458

SPANNING TREE COMMANDS4-218revisionThis command configures the revision number for this multiple spanning tree configuration of this switch. Use the n

Page 459

COMMAND LINE INTERFACE4-219Default Setting 20Command Mode MST ConfigurationCommand Usage An MSTI region is treated as a single node by the STP and RST

Page 460

SPANNING TREE COMMANDS4-220spanning-tree cost This command configures the spanning tree path cost for the specified interface. Use the no form to rest

Page 461 - Example

COMMAND LINE INTERFACE4-221spanning-tree port-priority Use this command to configure the priority for the specified interface. Use the no form to rest

Page 462 - Interface Commands

SPANNING TREE COMMANDS4-222Default Setting DisabledCommand Mode Interface Configuration (Ethernet, Port Channel)Command Usage • You can enable this op

Page 463

COMMAND LINE INTERFACE4-223Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • This command is used to enable/disable the fas

Page 464

SPANNING TREE COMMANDS4-224Default SettingautoCommand Mode Interface Configuration (Ethernet, Port Channel)Command Usage • Specify a point-to-point li

Page 465

COMMAND LINE INTERFACE4-225Default Setting • Ethernet – half duplex: 2,000,000; full duplex: 1,000,000; trunk: 500,000• Fast Ethernet – half duplex: 2

Page 466

SPANNING TREE COMMANDS4-226Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • This command defines the priority for the use

Page 467

COMMAND LINE INTERFACE4-227Command Usage If at any time the switch detects STP BPDUs, including Configuration or Topology Change Notification BPDUs, i

Page 468

INITIAL CONFIGURATION2-12community strings. If there are no community strings, then SNMP management access from SNMP v1 and v2c clients is disabled.Tr

Page 469

SPANNING TREE COMMANDS4-228•Use the show spanning-tree interface command to display the spanning tree configuration for an interface within the Common

Page 470

COMMAND LINE INTERFACE4-229show spanning-tree mst configurationThis command shows the configuration of the multiple spanning tree.Command Mode Privile

Page 471

VLAN COMMANDS4-230VLAN CommandsA VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong to the sa

Page 472

COMMAND LINE INTERFACE4-231Command Mode Global ConfigurationCommand Usage • Use the VLAN database command mode to add, change, and delete VLANs. After

Page 473 - Statistics” on page 3-139

VLAN COMMANDS4-232Command Mode VLAN Database ConfigurationCommand Usage • no vlan vlan-id deletes the VLAN. • no vlan vlan-id name removes the VLAN na

Page 474

COMMAND LINE INTERFACE4-233interface vlanThis command enters interface configuration mode for VLANs, which is used to configure VLAN parameters for a

Page 475

VLAN COMMANDS4-234switchport mode This command configures the VLAN membership mode for a port. Use the no form to restore the default.Syntax switchpor

Page 476 - Mirror Port Commands

COMMAND LINE INTERFACE4-235switchport acceptable-frame-typesThis command configures the acceptable frame types for a port. Use the no form to restore

Page 477

VLAN COMMANDS4-236switchport ingress-filteringThis command enables ingress filtering for an interface. Use the no form to restore the default.Syntax [

Page 478 - Rate Limit Commands

COMMAND LINE INTERFACE4-237switchport native vlanThis command configures the PVID (i.e., default VLAN ID) for a port. Use the no form to restore the d

Page 479

BASIC CONFIGURATION2-13used for authentication, provides the password “greenpeace” for authentication, and the password “einstien” for encryption.For

Page 480 - Link Aggregation Commands

VLAN COMMANDS4-238switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the default.Syntax

Page 481

COMMAND LINE INTERFACE4-239• If a VLAN on the forbidden list for an interface is manually added to that interface, the VLAN is automatically removed f

Page 482 - GGREGATION

VLAN COMMANDS4-240Example The following example shows how to prevent port 1 from being added to VLAN 3:Displaying VLAN Informationshow vlanThis comman

Page 483

COMMAND LINE INTERFACE4-241Example The following example shows how to display information for VLAN 1:Configuring Private VLANsPrivate VLANs provide po

Page 484

VLAN COMMANDS4-242To configure private VLANs, follow these steps:1. Use the private-vlan command to designate one or more community VLANs and the prim

Page 485

COMMAND LINE INTERFACE4-243private-vlanUse this command to create a primary or secondary (i.e., community) private VLAN. Use the no form to remove the

Page 486

VLAN COMMANDS4-244private-vlan associationUse this command to associate a primary VLAN with a secondary (i.e., community) VLAN. Use the no form to rem

Page 487

COMMAND LINE INTERFACE4-245switchport mode private-vlanUse this command to set the private VLAN mode for an interface. Use the no form to restore the

Page 488

VLAN COMMANDS4-246switchport private-vlan host-associationUse this command to associate an interface with a secondary VLAN. Use the no form to remove

Page 489 - (Continued)

COMMAND LINE INTERFACE4-247Default Setting NoneCommand Mode Interface Configuration (Ethernet, Port Channel) Command UsagePromiscuous ports assigned t

Page 490

INITIAL CONFIGURATION2-14Managing System FilesThe switch’s flash memory supports three types of system files that can be managed by the CLI program, w

Page 491

GVRP AND BRIDGE EXTENSION COMMANDS4-248ExampleGVRP and Bridge Extension Commands GARP VLAN Registration Protocol defines a way for switches to exchang

Page 492 - Address Table Commands

COMMAND LINE INTERFACE4-249bridge-ext gvrpThis command enables GVRP globally for the switch. Use the no form to disable it.Syntax [no] bridge-ext gvrp

Page 493

GVRP AND BRIDGE EXTENSION COMMANDS4-250Exampleswitchport gvrpThis command enables GVRP for a port. Use the no form to disable it.Syntax [no] switchpor

Page 494

COMMAND LINE INTERFACE4-251Default Setting Shows both global and interface-specific configuration.Command Mode Normal Exec, Privileged ExecExamplegarp

Page 495

GVRP AND BRIDGE EXTENSION COMMANDS4-252unless you are experiencing difficulties with GMRP or GVRP registration/deregistration.• Timer values are appli

Page 496 - Spanning Tree Commands

COMMAND LINE INTERFACE4-253ExampleRelated Commandsgarp timer (4-251)Priority CommandsThe commands described in this section allow you to specify which

Page 497

PRIORITY COMMANDS4-254Priority Commands (Layer 2) queue modeThis command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for the

Page 498

COMMAND LINE INTERFACE4-255Command Mode Global ConfigurationCommand Usage You can set the switch to service the queues based on a strict rule that req

Page 499 -

PRIORITY COMMANDS4-256Command Usage WRR controls bandwidth sharing at the egress port by defining scheduling weights.Example The following example sho

Page 500

COMMAND LINE INTERFACE4-257the incoming frame is an IEEE 802.1Q VLAN tagged frame, the IEEE 802.1p User Priority bits will be used. • This switch prov

Page 501

CONFIGURING POWER OVER ETHERNET2-15Configuring Power over EthernetThe 24 10/100 Mbps ports on the SMC6824MPE and SMC6826MPE support the IEEE 802.3af P

Page 502

PRIORITY COMMANDS4-258Default Setting This switch supports Class of Service by using eight priority queues, with Weighted Round Robin queuing for each

Page 503

COMMAND LINE INTERFACE4-259show queue modeThis command shows the current queue mode.Default Setting NoneCommand Mode Privileged ExecExample show queue

Page 504

PRIORITY COMMANDS4-260show queue cos-mapThis command shows the class of service priority map.Syntax show queue cos-map [interface]interface • ethernet

Page 505

COMMAND LINE INTERFACE4-261map ip port (Global Configuration)This command enables IP port mapping (i.e., class of service mapping for TCP/UDP sockets)

Page 506 - Console(config-mstp)#

PRIORITY COMMANDS4-262map ip port (Interface Configuration)This command sets IP port priority (i.e., TCP/UDP port priority). Use the no form to remove

Page 507

COMMAND LINE INTERFACE4-263Command Mode Global ConfigurationCommand Usage • The precedence for priority mapping is IP Port, IP Precedence or IP DSCP,

Page 508

PRIORITY COMMANDS4-264Command Usage • The precedence for priority mapping is IP Port, IP Precedence or IP DSCP, and default switchport priority.• IP P

Page 509

COMMAND LINE INTERFACE4-265Example The following example shows how to enable IP DSCP mapping globally:map ip dscp (Interface Configuration)This comman

Page 510

PRIORITY COMMANDS4-266• DSCP priority values are mapped to default Class of Service values according to recommendations in the IEEE 802.1p standard, a

Page 511

COMMAND LINE INTERFACE4-267Related Commands map ip port (Global Configuration) (4-261)map ip port (Interface Configuration) (4-262) show map ip preced

Page 512

INITIAL CONFIGURATION2-16

Page 513

PRIORITY COMMANDS4-268show map ip dscpThis command shows the IP DSCP priority map.Syntax show map ip dscp [interface]interface • ethernet unit/port -

Page 514

COMMAND LINE INTERFACE4-269Multicast Filtering Commands This switch uses IGMP (Internet Group Management Protocol) to query for any attached hosts tha

Page 515

MULTICAST FILTERING COMMANDS4-270ip igmp snoopingThis command enables IGMP snooping on this switch. Use the no form to disable it.Syntax [no] ip igmp

Page 516

COMMAND LINE INTERFACE4-271Example The following shows how to statically configure a multicast group on a port:ip igmp snooping versionThis command co

Page 517

MULTICAST FILTERING COMMANDS4-272show ip igmp snoopingThis command shows the IGMP snooping configuration.Default Setting NoneCommand Mode Privileged E

Page 518

COMMAND LINE INTERFACE4-273Command Mode Privileged ExecCommand Usage Member types displayed include IGMP or USER, depending on selected options.Exampl

Page 519

MULTICAST FILTERING COMMANDS4-274Default Setting EnabledCommand Mode Global ConfigurationCommand Usage If enabled, the switch will serve as querier if

Page 520

COMMAND LINE INTERFACE4-275query-max- response-time. If the countdown finishes, and the client still has not responded, then that client is considered

Page 521

MULTICAST FILTERING COMMANDS4-276ip igmp snooping query-max-response-timeThis command configures the snooping report delay. Use the no form of this co

Page 522 - Editing VLAN Groups

COMMAND LINE INTERFACE4-277ip igmp snooping router-port-expire-timeThis command configures the query timeout. Use the no form to restore the default.S

Page 523

3-1CHAPTER 3CONFIGURING THE SWITCHUsing the Web InterfaceThis switch provides an embedded HTTP Web agent. Using a Web browser you can configure the sw

Page 524 - Configuring VLAN Interfaces

MULTICAST FILTERING COMMANDS4-278Static Multicast Routing Commandsip igmp snooping vlan mrouterThis command statically configures a multicast router p

Page 525

COMMAND LINE INTERFACE4-279Example The following shows how to configure port 11 as a multicast router port within VLAN 1:show ip igmp snooping mrouter

Page 526

IP INTERFACE COMMANDS4-280IP Interface CommandsAn IP addresses may be used for management access to the switch over your network. The IP address for t

Page 527

COMMAND LINE INTERFACE4-281Default Setting DHCPCommand Mode Interface Configuration (VLAN)Command Usage • You must assign an IP address to this device

Page 528

IP INTERFACE COMMANDS4-282ip default-gatewayThis command establishes a static route between this switch and devices that exist on another network segm

Page 529

COMMAND LINE INTERFACE4-283Command Usage • This command issues a BOOTP or DHCP client request for any IP interface that has been set to BOOTP or DHCP

Page 530

IP INTERFACE COMMANDS4-284show ip redirectsThis command shows the default gateway configured for this device.Default Setting NoneCommand Mode Privileg

Page 531

COMMAND LINE INTERFACE4-285• Following are some results of the ping command: - Normal response -The normal response occurs in one to ten seconds, depe

Page 532 - Displaying VLAN Information

DNS COMMANDS4-286DNS CommandsThese commands are used to configure Domain Naming System (DNS) services. You can manually configure entries in the DNS d

Page 533

COMMAND LINE INTERFACE4-287ip hostThis command creates a static entry in the DNS table that maps a host name to an IP address. Use the no form to remo

Page 534 - Command Function Mode Page

CONFIGURING THE SWITCH3-2Notes: 1. You are allowed three attempts to enter the correct password; on the third failed attempt the current connection is

Page 535

DNS COMMANDS4-288clear hostThis command deletes entries from the DNS table.Syntax clear host {name | *}• name - Name of the host. (Range: 1-255 charac

Page 536

COMMAND LINE INTERFACE4-289ExampleRelated Commands ip domain-list (4-289)ip name-server (4-290)ip domain-lookup (4-291)ip domain-listThis command defi

Page 537

DNS COMMANDS4-290• If there is no domain list, the domain name specified with the ip domain-name command is used. If there is a domain list, the defau

Page 538

COMMAND LINE INTERFACE4-291Command Usage The listed name servers are queried in the specified sequence until a response is received, or the end of the

Page 539

DNS COMMANDS4-292ExampleThis example enables DNS and then displays the configuration.Related Commands ip domain-name (4-288)ip name-server (4-290)show

Page 540 - XTENSION

COMMAND LINE INTERFACE4-293show dnsThis command displays the configuration of the DNS server.Command Mode Privileged ExecExampleshow dns cacheThis com

Page 541

DNS COMMANDS4-294clear dns cacheThis command clears all entries in the DNS cache.Command Mode Privileged ExecExampleTable 4-75 Show DNS Output Descr

Page 542

A-1APPENDIX ASOFTWARE SPECIFICATIONSSoftware FeaturesAuthenticationLocal, RADIUS, TACACS, Port (802.1X), HTTPS (HTTP/SSL), SSH, Port SecurityAccess Co

Page 543

SOFTWARE SPECIFICATIONSA-2Port TrunkingStatic trunks (Cisco EtherChannel compliant)Dynamic trunks (Link Aggregation Control Protocol)Spanning Tree Pro

Page 544

SOFTWARE SPECIFICATIONSA-3SNMPv3Management access via MIB databaseTrap management to specified hostsRMONGroups 1, 2, 3, 9 (Statistics, History, Alarm,

Page 545 - Priority Commands

NAVIGATING THE WEB BROWSER INTERFACE3-3Navigating the Web Browser InterfaceTo access the Web-browser interface you must first enter a user name and pa

Page 546 - Priority Commands (Layer 2)

SOFTWARE SPECIFICATIONSA-4Management Information BasesBridge MIB (RFC 1493)Entity MIB (RFC 2737)Ether-like MIB (RFC 2665)Extended Bridge MIB (RFC 2674

Page 547

B-1APPENDIX BTROUBLESHOOTINGProblems Accessing the Management InterfaceTable B-1 Troubleshooting ChartSymptom ActionCannot connect using Telnet, web

Page 548

TROUBLESHOOTINGB-2Cannot connect using Secure Shell• If you cannot connect using SSH, you may have exceeded the maximum number of concurrent Telnet/SS

Page 549

USING SYSTEM LOGSB-3Using System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually cau

Page 551

Glossary-1GLOSSARYAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Page 552 - Information of Eth 1/1

GLOSSARYGlossary-2Dynamic Host Control Protocol (DHCP)Provides a framework for passing configuration information to hosts on a TCP/IP network. DHCP is

Page 553

GLOSSARYGlossary-3IEEE 802.1QVLAN Tagging—Defines Ethernet frame tags which carry VLAN information. It allows switches to assign endstations to differ

Page 554

GLOSSARYGlossary-4IGMP QueryOn each subnetwork, one IGMP-capable device will act as the querier — that is, the device that asks all hosts to report on

Page 555 - CoS Value 01234567

GLOSSARYGlossary-5Link AggregationSee Port Trunk. Link Aggregation Control Protocol (LACP)Allows ports to automatically negotiate a trunked link with

Page 556

LIMITED WARRANTYiiWARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE, CUSTOMER’S SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT O

Page 557

CONFIGURING THE SWITCH3-4Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration change has been made

Page 558

GLOSSARYGlossary-6Port TrunkDefines a network link aggregation and trunking method which specifies how to create a single high-speed logical link that

Page 559

GLOSSARYGlossary-7Simple Network Time Protocol (SNTP)SNTP allows a device to set its internal clock based on periodic updates from a Network Time Prot

Page 560

GLOSSARYGlossary-8Virtual LAN (VLAN)A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical l

Page 561 - IGMP Snooping Commands

Index-1Numerics802.1Xconfigure 3-88, 4-110port authentication 3-88, 4-110AAccess Control Lists See ACLACLconfiguration guidelines 3-98, 4-119Extended

Page 562

INDEXIndex-2Hhardware version, displaying 3-15, 4-80HTTPS, secure server 3-75, 4-41IIEEE 802.1D 3-155, 4-207IEEE 802.1s 3-155, 4-207IEEE 802.1w 3-155,

Page 563

INDEXIndex-3power budgetsport 3-147, 4-93port priority 3-150, 4-94Power over Ethernetconfiguring 2-15priority, default port ingress 3-202, 4-256priori

Page 564

INDEXIndex-4WWeb interfaceaccess requirements 3-1configuration buttons 3-4home page 3-3menu list 3-6panel display 3-5

Page 566

38 TeslaIrvine, CA 92618Phone: (949) 679-8000Model Numbers: SMC6824M (F2.4.2.13)SMC6824MPE (F 2.4.2.11)SMC6826MPE (F2.4.2.11)Pub.Number: 150200037700A

Page 567

NAVIGATING THE WEB BROWSER INTERFACE3-5Panel DisplayThe web agent displays an image of the switch’s ports. The Mode can be set to display different in

Page 568

CONFIGURING THE SWITCH3-6Main MenuUsing the onboard Web agent, you can define system parameters, manage and control the switch, and all its ports, or

Page 569

NAVIGATING THE WEB BROWSER INTERFACE3-7SNTP 3-43Configuration Configures SNTP client settings, including broadcast mode or a specified list of server

Page 570

CONFIGURING THE SWITCH3-8 802.1X Port authentication 3-88Information Displays the global configuration setting 3-89Configuration Configures the glob

Page 571

NAVIGATING THE WEB BROWSER INTERFACE3-9Broadcast Control Sets the broadcast storm threshold for each port3-135Mirror Port Configuration Sets the sourc

Page 572 - IP Interface Commands

CONFIGURING THE SWITCH3-10Trunk Configuration Configures individual trunk settings for STA 3-169MSTP VLAN Configuration Configures priority and VLANs

Page 573

NAVIGATING THE WEB BROWSER INTERFACE3-11Private VLAN 3-194Information Shows private VLANs and associated ports 3-195Configuration Configures private

Page 574

CONFIGURING THE SWITCH3-12Copy Settings Enables mapping IP Precedence and DSCP Priority settings to ports, or trunks.3-215ACL CoS Priority Sets the C

Page 575

BASIC CONFIGURATION3-13Basic ConfigurationDisplaying System InformationYou can easily identify the system by providing a descriptive name, location an

Page 576

iiiTABLE OF CONTENTS1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Key Features . . . . . . . . . . . . . . . .

Page 577

CONFIGURING THE SWITCH3-14Web – Click System, System Information. Specify the system name, location, and contact information for the system administra

Page 578 - DNS Commands

BASIC CONFIGURATION3-15CLI – Specify the hostname, location and contact information.Displaying Switch Hardware/Software Versions Use the Switch Inform

Page 579

CONFIGURING THE SWITCH3-16• Internal Power Status – Displays the status of the internal power supply.Management Software• Loader Version – Version num

Page 580 - Console(config)#clear host *

BASIC CONFIGURATION3-17Web – Click System, Switch Information.Figure 3-4 General Switch InformationCLI – Use the following command to display version

Page 581

CONFIGURING THE SWITCH3-18Displaying Bridge Extension CapabilitiesThe Bridge MIB includes extensions for managed devices that support Multicast Filter

Page 582

BASIC CONFIGURATION3-19Web – Click System, Bridge Extension.Figure 3-5 Displaying Bridge Extension ConfigurationCLI – Enter the following command.Set

Page 583

CONFIGURING THE SWITCH3-20You can manually configure a specific IP address, or direct the device to obtain an address from a BOOTP or DHCP server. Val

Page 584

BASIC CONFIGURATION3-21Manual ConfigurationWeb – Click System, IP Configuration. Select the VLAN through which the management station is attached, set

Page 585

CONFIGURING THE SWITCH3-22Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the switch to be dynamically configured by

Page 586

BASIC CONFIGURATION3-23Renewing DCHP – DHCP may lease addresses to clients indefinitely or for a specific period of time. If the address expires or th

Page 587 - PECIFICATIONS

TABLE OF CONTENTSivBasic Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13Displaying System Informa

Page 588 - Management Features

CONFIGURING THE SWITCH3-24• File Name – The file name should not contain slashes (\ or /), the leading letter of the file name should not be a period

Page 589 - Standards

BASIC CONFIGURATION3-25If you download to a new destination file, go to the File, Set Start-Up menu, mark the operation code file used at startup, and

Page 590 - Management Information Bases

CONFIGURING THE SWITCH3-26CLI – To download new firmware form a TFTP server, enter the IP address of the TFTP server, select “opcode” as the file type

Page 591 - ROUBLESHOOTING

BASIC CONFIGURATION3-27- file to startup-config - Copies a file in the switch to the startup configuration.- file to tftp - Copies a file from the swi

Page 592

CONFIGURING THE SWITCH3-28Downloading Configuration Settings from a ServerYou can download the configuration file under a new file name and then set i

Page 593 - Using System Logs

BASIC CONFIGURATION3-29If you download to a new file name using “tftp to startup-config” or “tftp to file,” the file is automatically set as the start

Page 594

CONFIGURING THE SWITCH3-30This example shows how to download a PoE controller file from a TFTP server.This example shows how to copy a PoE controller

Page 595 - Glossary-1

BASIC CONFIGURATION3-31• Password Threshold – Sets the password intrusion threshold, which limits the number of failed logon attempts. When the logon

Page 596 - Glossary-2

CONFIGURING THE SWITCH3-32Web – Click System, Line, Console. Specify the console port connection parameters as required, then click Apply.Figure 3-13

Page 597 - Glossary-3

BASIC CONFIGURATION3-33Telnet SettingsYou can access the onboard configuration program over the network using Telnet (i.e., a virtual terminal). Manag

Page 598 - Glossary-4

TABLE OF CONTENTSvReplacing the Default Secure-site Certificate . . . . . . . . . . 3-77Configuring the Secure Shell . . . . . . . . . . . . . . .

Page 599 - Glossary-5

CONFIGURING THE SWITCH3-34Web – Click System, Line, Telnet. Specify the connection parameters for Telnet access, then click Apply.Figure 3-14 Configu

Page 600 - Glossary-6

BASIC CONFIGURATION3-35Configuring Event LoggingThe switch allows you to control the logging of error messages, including the type of events that are

Page 601 - Glossary-7

CONFIGURING THE SWITCH3-36Command Attributes• System Log Status – Enables/disables the logging of debug or error messages to the logging process.• Fla

Page 602 - Glossary-8

BASIC CONFIGURATION3-37Web – Click System, Log, System Logs. Specify the System Log Status, set the level of event messages to be logged to RAM and fl

Page 603

CONFIGURING THE SWITCH3-38This attribute specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect on the kind

Page 604

BASIC CONFIGURATION3-39CLI – Enter the syslog server host IP address, choose the facility type and set the minimum level of messages to be logged.Disp

Page 605

CONFIGURING THE SWITCH3-40CLI – This example shows the event message stored in RAM.Sending Simple Mail Transfer Protocol AlertsTo alert system adminis

Page 606

BASIC CONFIGURATION3-41Web – Click System, Log, SMTP. Enable SMTP, specify a source email address, and select the minimum severity level. To add an IP

Page 607

CONFIGURING THE SWITCH3-42CLI – Enter the IP address of at least one SMTP server, set the syslog severity level to trigger an email message, and speci

Page 608

BASIC CONFIGURATION3-43CLI – Use the reload command to reboot the system.Note:When restarting the system, it always runs the Power-On Self-Test.Settin

Comments to this Manuals

No comments