SMC Networks TigerSwitch User Manual

Browse online or download User Manual for Network switches SMC Networks TigerSwitch. SMC Networks TigerSwitch User's Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 518
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
TigerSwitch 10/100
24-Port 10/100Mbps
Stackable Managed Switch
Management Guide
24 auto-MDI/MDI-X 10BASE-T/100BASE-TX ports
2 Gigabit RJ-45 ports shared with 2 SFP transceiver slots
2 Gigabit stacking ports that act as Ethernet ports in
standalone mode
Stacks up to 8 units
12.8 Gbps of aggregate bandwidth
Non-blocking switching architecture
Spanning Tree Protocol and Rapid STP
Up to four LACP or static 4-port trunks
RADIUS and TACACS+ authentication
Rate limiting for bandwidth management
CoS support for four-level priority
Full support for VLANs with GVRP
IP Multicasting with IGMP Snooping
Management Guide
SMC6224M
Page view 0
1 2 3 4 5 6 ... 517 518

Summary of Contents

Page 1 - TigerSwitch 10/100

TigerSwitch 10/10024-Port 10/100Mbps Stackable Managed SwitchManagement Guide◆ 24 auto-MDI/MDI-X 10BASE-T/100BASE-TX ports◆ 2 Gigabit RJ-45 ports shar

Page 2

CONTENTSviDisplaying Basic VLAN Information . . . . . . . . . . . . . . . 3-147Displaying Current VLANs . . . . . . . . . . . . . . . . . . . . . .

Page 3 - Management Guide

CONFIGURING THE SWITCH3-50CLI – Assign a user name to access-level 15 (i.e., administrator), then specify the password.Configuring Local/Remote Logon

Page 4

USER AUTHENTICATION3-51Command Usage• By default, management access is always checked against the authentication database stored on the local switch.

Page 5

CONFIGURING THE SWITCH3-52• RADIUS Settings-Global – Provides globally applicable RADIUS settings.-ServerIndex – Specifies one of five RADIUS servers

Page 6

USER AUTHENTICATION3-53Web – Click Security, Authentication Settings. To configure local or remote authentication preferences, specify the authenticat

Page 7

CONFIGURING THE SWITCH3-54CLI – Specify all the required parameters to enable logon authentication.Configuring HTTPSYou can configure the switch to en

Page 8

USER AUTHENTICATION3-55• If you enable HTTPS, you must indicate this in the URL that you specify in your browser: https://device[:port_number]• When y

Page 9

CONFIGURING THE SWITCH3-56Web – Click Security, HTTPS Settings. Enable HTTPS and specify the port number, then click Apply.Figure 3-26 HTTPS Settings

Page 10

USER AUTHENTICATION3-57When you have obtained these, place them on your TFTP server, and use the following command at the switch's command-line i

Page 11

CONFIGURING THE SWITCH3-58Command UsageThe SSH server on this switch supports both password and public key authentication. If password authentication

Page 12

USER AUTHENTICATION3-593. Import Client’s Public Key to the Switch – Use the copy tftp public-key command (page 4-89) to copy a file containing the pu

Page 13

CONTENTSviiTelnet Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2Entering Commands . . . . . . . . . . . .

Page 14

CONFIGURING THE SWITCH3-60e. The switch compares the decrypted bytes to the original bytes it sent. If the two sets match, this means that the client&

Page 15

USER AUTHENTICATION3-61the client to select either DES (56-bit) or 3DES (168-bit) for data encryption.• Save Host-Key from Memory to Flash – Saves the

Page 16

CONFIGURING THE SWITCH3-62CLI – This example generates a host-key pair using both the RSA and DSA algorithms, stores the keys to flash memory, and the

Page 17

USER AUTHENTICATION3-63• SSH Authentication Retries – Specifies the number of authentication attempts that a client is allowed before authentication f

Page 18

CONFIGURING THE SWITCH3-64CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that th

Page 19 - Glossary

USER AUTHENTICATION3-65already in the address table will be retained and will not age out. Any other device that attempts to use the port will be prev

Page 20

CONFIGURING THE SWITCH3-66Web – Click Security, Port Security. Set the action to take when an invalid address is detected on a port, mark the checkbox

Page 21

USER AUTHENTICATION3-67This switch uses the Extensible Authentication Protocol over LANs (EAPOL) to exchange authentication protocol messages with the

Page 22

CONFIGURING THE SWITCH3-68• The RADIUS server and 802.1X client support EAP. (The switch only supports EAPOL in order to pass the EAP packets from the

Page 23

USER AUTHENTICATION3-69CLI – This example shows the default global setting for 802.1X. Configuring 802.1X Global SettingsThe 802.1X protocol includes

Page 24

CONTENTSviiiquit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32System Management Commands . .

Page 25

CONFIGURING THE SWITCH3-70CLI – This example enables 802.1X globally for the switch.Configuring Port Settings for 802.1XWhen 802.1X is enabled, you ne

Page 26

USER AUTHENTICATION3-71• Max-Req – Sets the maximum number of times the switch port will retransmit an EAP request packet to the client before it time

Page 27 - NTRODUCTION

CONFIGURING THE SWITCH3-72CLI – This example sets the 802.1X parameters on port 2. For a description of the additional fields displayed in this exampl

Page 28 - Table 1-1 Key Features

USER AUTHENTICATION3-73Displaying 802.1X StatisticsThis switch can display statistics for dot1x protocol exchanges for any port. Table 3-5 802.1X Sta

Page 29 - ESCRIPTION

CONFIGURING THE SWITCH3-74Web – Select Security, 802.1X, Statistics. Select the required port and then click Query. Click Refresh to update the statis

Page 30

USER AUTHENTICATION3-75Filtering Addresses for Management AccessYou create a list of up to 16 IP addresses or IP address groups that are allowed manag

Page 31

CONFIGURING THE SWITCH3-76• Start IP Address – A single IP address, or the starting address of a range.• End IP Address – The end address of a range.•

Page 32

ACCESS CONTROL LISTS3-77CLI – This example allows SNMP access for a specific client.Access Control ListsAccess Control Lists (ACL) provide packet filt

Page 33 - System Defaults

CONFIGURING THE SWITCH3-78Command UsageThe following restrictions apply to ACLs:• Each ACL can have up to 32 rules.• The maximum number of ACLs is 88.

Page 34 - Table 1-2 System Defaults

ACCESS CONTROL LISTS3-79- MAC: MAC ACL mode that filters packets based on the source or destination MAC address and the Ethernet frame type (RFC 1060)

Page 35

CONTENTSixclear logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-64show logging . . . . . . . . . . . . . . . . .

Page 36

CONFIGURING THE SWITCH3-80Configuring a Standard IP ACLCommand Attributes• Action – An ACL can contain any combination of permit or deny rules.• Addre

Page 37

ACCESS CONTROL LISTS3-81Web – Specify the action (i.e., Permit or Deny). Select the address type (Any, Host, or IP). If you select “Host,” enter a spe

Page 38 - Required Connections

CONFIGURING THE SWITCH3-82to specify a range of addresses with the Address and SubMask fields. (Options: Any, Host, IP; Default: Any)• Source/Destinat

Page 39 - ONNECTING

ACCESS CONTROL LISTS3-83For example, use the code value and mask below to catch packets with the following flags set: - SYN flag valid, use control-co

Page 40 - Remote Connections

CONFIGURING THE SWITCH3-843. Permit all TCP packets from class C addresses 192.168.1.0 with the TCP control code set to “SYN.”Configuring a MAC ACLCom

Page 41 - Stack Operations

ACCESS CONTROL LISTS3-85Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (Any

Page 42 - Basic Configuration

CONFIGURING THE SWITCH3-86Binding a Port to an Access Control ListAfter configuring Access Control Lists (ACL), you should bind them to the ports that

Page 43 - Setting Passwords

ACCESS CONTROL LISTS3-87Web – Click Security, ACL, Port Binding. Mark the Enabled field for the port you want to bind to an ACL, select the required A

Page 44 - Setting an IP Address

CONFIGURING THE SWITCH3-88Port ConfigurationDisplaying Connection StatusYou can use the Port Information or Trunk Information pages to display the cur

Page 45 - Dynamic Configuration

PORT CONFIGURATION3-89Web – Click Port, Port Information or Trunk Information.Figure 3-40 Displaying Port/Trunk InformationField Attributes (CLI)Basi

Page 46

CONTENTSxRADIUS Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-99radius-server host . . . . . . . . . . . . .

Page 47 - Community Strings

CONFIGURING THE SWITCH3-90- 10full - Supports 10 Mbps full-duplex operation - 100half - Supports 100 Mbps half-duplex operation - 100full - Supports 1

Page 48 - Saving Configuration Settings

PORT CONFIGURATION3-91CLI – This example shows the connection status for Port 5.Configuring Interface ConnectionsYou can use the Port Configuration or

Page 49 - Managing System Files

CONFIGURING THE SWITCH3-92• Autonegotiation (Port Capabilities) – Allows auto-negotiation to be enabled/disabled. When auto-negotiation is enabled, yo

Page 50

PORT CONFIGURATION3-93Web – Click Port, Port Configuration or Trunk Configuration. Modify the required interface settings, and click Apply.Figure 3-41

Page 51

CONFIGURING THE SWITCH3-94automatically negotiate a trunked link with LACP-configured ports on another device. You can configure any number of ports o

Page 52

PORT CONFIGURATION3-95Statically Configuring a TrunkCommand Usage• When configuring static trunks, you may not be able to link switches of different t

Page 53 - AVIGATING

CONFIGURING THE SWITCH3-96Web – Click Port, Trunk Membership. Enter a trunk ID of 1-4 in the Trunk field, select any of the switch ports from the scro

Page 54 - The Mode can be

PORT CONFIGURATION3-97CLI – This example creates trunk 2 with ports 1 and 2. Just connect these ports to two static trunk ports on another switch to f

Page 55 - Main Menu

CONFIGURING THE SWITCH3-98• A trunk formed with another switch using LACP will automatically be assigned the next available trunk ID. • If more than e

Page 56

PORT CONFIGURATION3-99CLI – The following example enables LACP for ports 1 to 6. Just connect these ports to LACP-enabled trunk ports on another switc

Page 57

CONTENTSxiMAC ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-130access-list mac . . . . . . . . . . . . .

Page 58

CONFIGURING THE SWITCH3-100Note: If the port channel admin key (lacp admin key, page 4-171) is not set (through the CLI) when a channel group is forme

Page 59

PORT CONFIGURATION3-101Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can opt

Page 60

CONFIGURING THE SWITCH3-102CLI – The following example configures LACP parameters for ports 1-4. Ports 1-4 are used as active members of the LAG.Conso

Page 61

PORT CONFIGURATION3-103Displaying LACP Port CountersYou can display statistics for LACP protocol messages. Web – Click Port, LACP, Port Counters Infor

Page 62

CONFIGURING THE SWITCH3-104CLI – The following example displays LACP counters.Displaying LACP Settings and Status for the Local SideYou can display co

Page 63

PORT CONFIGURATION3-105LACP Port PriorityLACP port priority assigned to this interface within the channel group.Admin State,Oper StateAdministrative o

Page 64

CONFIGURING THE SWITCH3-106Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 3-

Page 65

PORT CONFIGURATION3-107Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state for the

Page 66

CONFIGURING THE SWITCH3-108Web – Click Port, LACP, Port Neighbors Information. Select a port channel to display the corresponding information.Figure 3

Page 67

PORT CONFIGURATION3-109Setting Broadcast Storm ThresholdsBroadcast storms may occur when a device on your network is malfunctioning, or if application

Page 68 - Manual Configuration

CONTENTSxiishow rate-limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-163Link Aggregation Commands . . . . . . . .

Page 69 - Using DHCP/BOOTP

CONFIGURING THE SWITCH3-110Web – Click Port, Port/Trunk Broadcast Control. Set the threshold, mark the Enabled field for the desired interface and cli

Page 70

PORT CONFIGURATION3-111CLI – Specify any interface, and then enter the threshold. The following disables broadcast storm control for port 1, and then

Page 71 - Managing Firmware

CONFIGURING THE SWITCH3-112Command Attributes• Mirror Sessions – Displays a list of current mirror sessions.• Source Unit – The unit whose port traffi

Page 72

PORT CONFIGURATION3-113Configuring Rate LimitsThis function allows the network manager to control the maximum rate for traffic transmitted or received

Page 73

CONFIGURING THE SWITCH3-114CLI - This example sets and displays Fast Ethernet and Gigabit Ethernet granularity.Rate Limit ConfigurationUse the rate li

Page 74

PORT CONFIGURATION3-115Web – Click Port, Rate Limit, Input/Output Port/Trunk Configuration. Enable the Rate Limit Status for the required interfaces,

Page 75

CONFIGURING THE SWITCH3-116Note: RMON groups 2, 3 and 9 can only be accessed using SNMP management software such as MC EliteView. Table 3-9 Port Stat

Page 76

PORT CONFIGURATION3-117Transmit Multicast PacketsThe total number of packets that higher-level protocols requested be transmitted, and which were addr

Page 77

CONFIGURING THE SWITCH3-118Multiple Collision FramesA count of successfully transmitted frames for which transmission is inhibited by more than one co

Page 78 - Console Port Settings

PORT CONFIGURATION3-119Multicast Frames The total number of good frames received that were directed to this multicast address.CRC/Alignment Errors The

Page 79

CONTENTSxiiiswitchport mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-202switchport acceptable-frame-types . . . . . . . .

Page 80 - Telnet Settings

CONFIGURING THE SWITCH3-120Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at t

Page 81

PORT CONFIGURATION3-121CLI – This example shows statistics for port 13.Console#show interfaces counters ethernet 1/13 4-155Ethernet 1/13 Iftable stats

Page 82

CONFIGURING THE SWITCH3-122Address Table SettingsSwitches store the addresses for all known devices. This information is used to pass traffic directly

Page 83 - Configuring Event Logging

ADDRESS TABLE SETTINGS3-123Web – Click Address Table, Static Addresses. Specify the interface, the MAC address and VLAN, then click Add Static Address

Page 84 - RAM. (Range: 0-7, Default: 6)

CONFIGURING THE SWITCH3-124• MAC Address – Physical address associated with this interface.• VLAN – ID of configured VLAN (1-4094).• Address Table Sor

Page 85 - Remote Log Configuration

SPANNING TREE ALGORITHM CONFIGURATION3-125Changing the Aging TimeYou can set the aging time for entries in the dynamic address table. Command Attribut

Page 86

CONFIGURING THE SWITCH3-126The spanning tree algorithms supported by this switch include these versions:• STP – Spanning Tree Protocol (IEEE 802.1D)•

Page 87

SPANNING TREE ALGORITHM CONFIGURATION3-127that can be used when a node or port fails, and retaining the forwarding database for ports insensitive to c

Page 88 - Displaying Log Messages

CONFIGURING THE SWITCH3-128• Designated Root – The priority and MAC address of the device in the Spanning Tree that this switch has accepted as the ro

Page 89

SPANNING TREE ALGORITHM CONFIGURATION3-129• Root Forward Delay – The maximum time (in seconds) this device will wait before changing states (i.e., dis

Page 90

CONTENTSxivmap ip dscp (Interface Configuration) . . . . . . . . . . . . . . . 4-233show map ip port . . . . . . . . . . . . . . . . . . . . . . . .

Page 91 - Resetting the System

CONFIGURING THE SWITCH3-130CLI – This command displays global STA settings, followed by settings for each port. Note: The current root port and curren

Page 92 - Setting the System Clock

SPANNING TREE ALGORITHM CONFIGURATION3-131Configuring Global SettingsGlobal settings apply to the entire switch.Command Usage• Spanning Tree Algorithm

Page 93

CONFIGURING THE SWITCH3-132• Priority – Bridge priority is used in selecting the root device, root port, and designated port. The device with the high

Page 94

SPANNING TREE ALGORITHM CONFIGURATION3-133• Forward Delay – The maximum time (in seconds) this device will wait before changing states (i.e., discardi

Page 95

CONFIGURING THE SWITCH3-134Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply.Figure 3-57 STA Configurati

Page 96

SPANNING TREE ALGORITHM CONFIGURATION3-135Displaying Interface SettingsThe STA Port Information and STA Trunk Information pages display the current st

Page 97

CONFIGURING THE SWITCH3-136• Designated Port – The port priority and number of the port on the designated bridging device through which this switch mu

Page 98 - User Authentication

SPANNING TREE ALGORITHM CONFIGURATION3-137• Trunk Member – Indicates if a port is a member of a trunk. (STA Port Information only)These additional par

Page 99

CONFIGURING THE SWITCH3-138• Admin Edge Port – You can enable this option if an interface is attached to a LAN segment that is at the end of a bridged

Page 100 - ONFIGURING

SPANNING TREE ALGORITHM CONFIGURATION3-139CLI – This example shows the STA attributes for port 5. Configuring Interface SettingsYou can configure RSTP

Page 101 - Command Attributes

CONTENTSxvGlossaryIndex

Page 102

CONFIGURING THE SWITCH3-140contradictory information. Port address table is cleared, and the port begins learning addresses.-Forwarding - Port forward

Page 103 - UTHENTICATION

SPANNING TREE ALGORITHM CONFIGURATION3-141- Default –- Ethernet – Half duplex: 2,000,000; full duplex: 1,000,000; trunk: 500,000- Fast Ethernet – H

Page 104 - Configuring HTTPS

CONFIGURING THE SWITCH3-142Web – Click Spanning Tree, STA, Port Configuration or Trunk Configuration. Modify the required attributes, then click Apply

Page 105

VLAN CONFIGURATION3-143VLANs help to simplify network management by allowing you to move devices to a new VLAN without having to change any physical c

Page 106

CONFIGURING THE SWITCH3-144Note: VLAN-tagged frames can pass through VLAN-aware or VLAN-unaware network interconnection devices, but the VLAN tags sho

Page 107 - Configuring the Secure Shell

VLAN CONFIGURATION3-145Automatic VLAN Registration – GVRP (GARP VLAN Registration Protocol) defines a system whereby the switch can automatically lear

Page 108

CONFIGURING THE SWITCH3-146Forwarding Tagged/Untagged FramesIf you want to create a small port-based VLAN for devices attached directly to a single sw

Page 109

VLAN CONFIGURATION3-147Enabling or Disabling GVRP (Global Setting) GARP VLAN Registration Protocol (GVRP) defines a way for switches to exchange VLAN

Page 110 - Field Attributes

CONFIGURING THE SWITCH3-148• Maximum Number of Supported VLANs – Maximum number of VLANs that can be configured on this switch.Web – Click VLAN, 802.1

Page 111

VLAN CONFIGURATION3-149• Status – Shows how this VLAN was added to the switch. - Dynamic GVRP: Automatically learned via GVRP.- Permanent: Added as a

Page 113

CONTENTSxvi

Page 114 - Configuring Port Security

CONFIGURING THE SWITCH3-150• Status – Shows if this VLAN is enabled or disabled. - Active: VLAN is operational.- Suspend: VLAN is suspended; i.e., doe

Page 115

VLAN CONFIGURATION3-151• State (CLI) – Enables or disables the specified VLAN. - Active: VLAN is operational.- Suspend: VLAN is suspended; i.e., does

Page 116

CONFIGURING THE SWITCH3-152Adding Static Members to VLANs (VLAN Index)Use the VLAN Static Table to configure port members for the selected VLAN index.

Page 117

VLAN CONFIGURATION3-153• Membership Type – Select VLAN membership for each interface by marking the appropriate radio button for a port or trunk: - Ta

Page 118

CONFIGURING THE SWITCH3-154Web – Click VLAN, 802.1Q VLAN, Static Table. Select a VLAN ID from the scroll-down list. Modify the VLAN name and status if

Page 119

VLAN CONFIGURATION3-155• Member – VLANs for which the selected interface is a tagged member.• Non-Member – VLANs for which the selected interface is n

Page 120

CONFIGURING THE SWITCH3-156Configuring VLAN Behavior for InterfacesYou can configure VLAN behavior for specific interfaces, including the default VLAN

Page 121

VLAN CONFIGURATION3-157- If ingress filtering is disabled and a port receives frames tagged for VLANs for which it is not a member, these frames will

Page 122

CONFIGURING THE SWITCH3-158• Mode – Indicates VLAN membership mode for an interface. (Default: Hybrid)- 1Q Trunk – Specifies a port as an end-point fo

Page 123 - Displaying 802.1X Statistics

VLAN CONFIGURATION3-159CLI – This example sets port 3 to accept only tagged frames, assigns PVID 3 as the native VLAN ID, enables GVRP, sets the GARP

Page 124

xviiTABLESTable 1-1 Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Table 1-2 System Defaults . . . . . . . .

Page 125

CONFIGURING THE SWITCH3-160To configure private VLANs, follow these steps:1. Use the Private VLAN Configuration menu (page 3-161) to designate one or

Page 126

VLAN CONFIGURATION3-161Web – Click VLAN, Private VLAN, Information. Select the desired port from the VLAN ID drop-down menu.Figure 3-67 Private VLAN

Page 127 - Access Control Lists

CONFIGURING THE SWITCH3-162• Type – There are three types of VLANs within a private VLAN:-Primary VLANs – Conveys traffic between promiscuous ports, a

Page 128 - Setting the ACL Name and Type

VLAN CONFIGURATION3-163Associating VLANsEach community or isolated VLAN must be associated with a primary VLAN.Command Attributes• Primary VLAN ID – I

Page 129 - Console(config-std-acl)#

CONFIGURING THE SWITCH3-164Displaying Private VLAN Interface InformationUse the Private VLAN Port Information and Private VLAN Trunk Information menus

Page 130 - Configuring a Standard IP ACL

VLAN CONFIGURATION3-165Web – Click VLAN, Private VLAN, Port Information or Trunk Information.Figure 3-70 Private VLAN Port InformationCLI – This exam

Page 131

CONFIGURING THE SWITCH3-166- Host – The port is a community port and can only communicate with other ports in its own community VLAN, and with the des

Page 132

VLAN CONFIGURATION3-167Web – Click VLAN, Private VLAN, Port Configuration or Trunk Configuration. Set the PVLAN Port Type for each port that will join

Page 133

CONFIGURING THE SWITCH3-168Class of Service ConfigurationClass of Service (CoS) allows you to specify which data packets have greater precedence when

Page 134 - Configuring a MAC ACL

CLASS OF SERVICE CONFIGURATION3-169Command Attributes• Default Priority9 – The priority that is assigned to untagged frames received on the specified

Page 135 - Console(config-mac-acl)#

TABLESxviiiTable 4-21 SMTP Alert Commands . . . . . . . . . . . . . . . . . . . . . . . . . 4-68Table 4-22 Time Commands . . . . . . . . . . . . .

Page 136

CONFIGURING THE SWITCH3-170Mapping CoS Values to Egress QueuesThis switch processes Class of Service (CoS) priority tagged traffic by using four prior

Page 137

CLASS OF SERVICE CONFIGURATION3-171Command Attributes• Priority – CoS value. (Range: 0-7, where 7 is the highest priority)• Traffic Class10 – Output q

Page 138 - Port Configuration

CONFIGURING THE SWITCH3-172Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traffic in a

Page 139 - Configuration:

CLASS OF SERVICE CONFIGURATION3-173Setting the Service Weight for Traffic ClassesThis switch uses the Weighted Round Robin (WRR) algorithm to determin

Page 140 - Current Status:

CONFIGURING THE SWITCH3-174CLI – The following example shows how to assign WRR weights to each of the priority queues.Layer 3/4 Priority SettingsMappi

Page 141

CLASS OF SERVICE CONFIGURATION3-175Selecting IP Precedence/DSCP Priority The switch allows you to choose between using IP Precedence or DSCP priority.

Page 142

CONFIGURING THE SWITCH3-176Command Attributes• IP Precedence Priority Table – Shows the IP Precedence to CoS map.• Class of Service Value – Maps a CoS

Page 143 - Creating Trunk Groups

CLASS OF SERVICE CONFIGURATION3-177CLI – The following example globally enables IP Precedence service on the switch, maps IP Precedence value 1 to CoS

Page 144

CONFIGURING THE SWITCH3-178Command Attributes• DSCP Priority Table – Shows the DSCP Priority to CoS map.• Class of Service Value – Maps a CoS value to

Page 145

CLASS OF SERVICE CONFIGURATION3-179CLI – The following example globally enables DSCP Priority service on the switch, maps DSCP value 0 to CoS value 1

Page 146

TABLESxixTable 4-58 Priority Commands (Layer 2) . . . . . . . . . . . . . . . . . . . . 4-222Table 4-59 Default CoS Priority Levels . . . . . . . .

Page 147

CONFIGURING THE SWITCH3-180Web – Click Priority, IP Port Priority Status. Set IP Port Priority Status to Enabled. Figure 3-79 IP Port Priority Status

Page 148

CLASS OF SERVICE CONFIGURATION3-181CLI – The following example globally enables IP Port Priority service on the switch, maps HTTP traffic on port 5 to

Page 149 - Configuring LACP Parameters

CONFIGURING THE SWITCH3-182• ACL CoS Priority Mapping – Displays the configured information.* For information on configuring ACLs, see page 3-77.Web –

Page 150

MULTICAST FILTERING3-183Multicast Filtering Multicasting is used to support real-time applications such as videoconferencing or streaming audio. A mul

Page 151 - ONFIGURATION

CONFIGURING THE SWITCH3-184Layer 2 IGMP (Snooping and Query)IGMP Snooping and Query – If multicast routing is not supported on other switches in your

Page 152

MULTICAST FILTERING3-185multicasting, one of these devices is elected “querier” and assumes the role of querying the LAN for group members. It then pr

Page 153 - Displaying LACP Port Counters

CONFIGURING THE SWITCH3-186Notes: 1. All systems on the subnet must support the same version. 2. Some attributes are only enabled for IGMPv2, includin

Page 154

MULTICAST FILTERING3-187Displaying Interfaces Attached to a Multicast RouterMulticast routers that are attached to ports on the switch use information

Page 155

CONFIGURING THE SWITCH3-188CLI – This example shows that Port 11 has been statically configured as a port attached to a multicast router.Specifying St

Page 156

MULTICAST FILTERING3-189Web – Click IGMP Snooping, Static Multicast Router Port Configuration. Specify the interfaces attached to a multicast router,

Page 157

FIGURESxxFIGURESFigure 3-1 Home Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3Figure 3-2 Panel Display . . . . . .

Page 158

CONFIGURING THE SWITCH3-190Web – Click IGMP Snooping, IP Multicast Registration Table. Select a VLAN ID and the IP address for a multicast service fro

Page 159

MULTICAST FILTERING3-191Assigning Ports to Multicast Services Multicast filtering can be dynamically configured using IGMP Snooping and IGMP Query mes

Page 160

CONFIGURING THE SWITCH3-192Web – Click IGMP Snooping, IGMP Member Port Table. Specify the interface attached to a multicast service (via an IGMP-enabl

Page 161 - Configuring Port Mirroring

4-1CHAPTER 4COMMAND LINE INTERFACEThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceAccessing the CLI

Page 162

COMMAND LINE INTERFACE4-2After connecting to the system through the console port, the login screen displays:Telnet ConnectionTelnet operates over the

Page 163 - Configuring Rate Limits

USING THE COMMAND LINE INTERFACE4-32. At the prompt, enter the user name and system password. The CLI will display the “Vty-n#” prompt for the adminis

Page 164 - Rate Limit Configuration

COMMAND LINE INTERFACE4-4Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keywords

Page 165 - Showing Port Statistics

ENTERING COMMANDS4-5Command CompletionIf you terminate input with a Tab key, the CLI will print the remaining characters of a partial keyword up to th

Page 166 - Table 3-9 Port Statistics

COMMAND LINE INTERFACE4-6Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for the current

Page 167

ENTERING COMMANDS4-7The command “show interfaces ?” will display the following information:Partial Keyword LookupIf you terminate a partial keyword wi

Page 168

FIGURESxxiFigure 3-37 ACL Configuration - Extended IP . . . . . . . . . . . . . . . . . 3-83Figure 3-38 ACL Configuration - MAC . . . . . . . . . . .

Page 169

COMMAND LINE INTERFACE4-8Understanding Command ModesThe command set is divided into Exec and Configuration classes. Exec commands generally display in

Page 170 - Figure 3-52 Port Statistics

ENTERING COMMANDS4-9Privileged Exec mode from within Normal Exec mode, by entering the enable command, followed by the privileged level password “supe

Page 171

COMMAND LINE INTERFACE4-10• Line Configuration - These commands modify the console port and Telnet configuration, and include command such as parity a

Page 172 - Address Table Settings

ENTERING COMMANDS4-11Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough

Page 173 - Displaying the Address Table

COMMAND LINE INTERFACE4-12Command GroupsThe system commands can be broken down into the functional groups shown below.Table 4-4 Command GroupsCommand

Page 174

COMMAND GROUPS4-13The access mode shown in the following tables is indicated by these abbreviations: NE (Normal Exec) IC (Interface Configuration) P

Page 175

COMMAND LINE INTERFACE4-14Line CommandsYou can access the onboard configuration program by attaching a VT100 compatible device to the server’s serial

Page 176

LINE COMMANDS4-15lineThis command identifies a specific line for configuration, and to process subsequent line configuration commands.Syntax line {con

Page 177

COMMAND LINE INTERFACE4-16loginThis command enables password checking at login. Use the no form to disable password checking and allow connections wit

Page 178

LINE COMMANDS4-17Example Related Commandsusername (4-36)password (4-17)passwordThis command specifies the password for a line. Use the no form to remo

Page 179 - LGORITHM

FIGURESxxiiFigure 3-74 Queue Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-172Figure 3-75 Configuring Queue Scheduling .

Page 180

COMMAND LINE INTERFACE4-18configuration file from a TFTP server. There is no need for you to manually configure encrypted passwords.Example Related Co

Page 181

LINE COMMANDS4-19Example To set the timeout to two minutes, enter this command:Related Commandssilent-time (4-21)exec-timeout (4-14)exec-timeoutThis c

Page 182

COMMAND LINE INTERFACE4-20Example To set the timeout to two minutes, enter this command:Related Commandssilent-time (4-21)timeout login response (4-13

Page 183

LINE COMMANDS4-21Example To set the password threshold to five attempts, enter this command:Related Commandssilent-time (4-21)timeout login response (

Page 184

COMMAND LINE INTERFACE4-22databitsThis command sets the number of data bits per character that are interpreted and generated by the console port. Use

Page 185

LINE COMMANDS4-23parityThis command defines the generation of a parity bit. Use the no form to restore the default setting.Syntax parity {none | even

Page 186

COMMAND LINE INTERFACE4-24Default Setting 9600Command Mode Line Configuration Command Usage Set the speed to match the baud rate of the device connect

Page 187

LINE COMMANDS4-25disconnectThis command terminates an SSH, Telnet, or console connection.Syntax disconnect session-idsession-id – The session identifi

Page 188

COMMAND LINE INTERFACE4-26Example To show all lines, enter this command:Console#show line Console configuration: Password threshold: 3 times Intera

Page 189

GENERAL COMMANDS4-27General CommandsenableThis command activates Privileged Exec mode. In privileged mode, additional commands are available, and cert

Page 190

1-1CHAPTER 1INTRODUCTIONThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to config

Page 191

COMMAND LINE INTERFACE4-28Command ModeNormal ExecCommand Usage • “super” is the default password required to change the command mode from Normal Exec

Page 192 - VLAN Configuration

GENERAL COMMANDS4-29Example Related Commands enable (4-27)configureThis command activates Global Configuration mode. You must enter this mode to modif

Page 193 - Assigning Ports to VLANs

COMMAND LINE INTERFACE4-30Command Usage The history buffer size is fixed at 10 Execution commands and 10 Configuration commands.Example In this exampl

Page 194

GENERAL COMMANDS4-31Command Mode Privileged ExecCommand Usage This command resets the entire system.Example This example shows how to reset the switch

Page 195

COMMAND LINE INTERFACE4-32Example This example shows how to return to the Privileged Exec mode from the Global Configuration mode, and then quit the C

Page 196

SYSTEM MANAGEMENT COMMANDS4-33System Management CommandsThese commands are used to control system logs, passwords, user names, browser configuration o

Page 197

COMMAND LINE INTERFACE4-34promptThis command customizes the CLI prompt. Use the no form to restore the default prompt.Syntax prompt stringno promptstr

Page 198 - Command Attributes (Web)

SYSTEM MANAGEMENT COMMANDS4-35Example User Access CommandsThe basic commands required for management access are listed in this section. This switch al

Page 199 - Command Attributes (CLI)

COMMAND LINE INTERFACE4-36usernameThis command adds named users, requires authentication at login, specifies or changes a user's password (or spe

Page 200 - Creating VLANs

SYSTEM MANAGEMENT COMMANDS4-37Command Usage The encrypted password is required for compatibility with legacy password settings (i.e., plain text or en

Page 201

INTRODUCTION1-2Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Flow control eliminates th

Page 202

COMMAND LINE INTERFACE4-38Command Usage • You cannot set a null password. You will have to enter a password to change the command mode from Normal Exe

Page 203

SYSTEM MANAGEMENT COMMANDS4-39managementThis command specifies the client IP addresses that are allowed management access to the switch through variou

Page 204

COMMAND LINE INTERFACE4-40• You can delete an address range just by specifying the start address, or by specifying both the start address and end addr

Page 205

SYSTEM MANAGEMENT COMMANDS4-41ExampleWeb Server CommandsConsole#show management all-clientManagement IP Filter HTTP-Client: Start IP address En

Page 206

COMMAND LINE INTERFACE4-42ip http portThis command specifies the TCP port number used by the web browser interface. Use the no form to use the default

Page 207

SYSTEM MANAGEMENT COMMANDS4-43Example Related Commandsip http port (4-42)ip http secure-serverThis command enables the secure hypertext transfer proto

Page 208

COMMAND LINE INTERFACE4-445.x and Netscape Navigator 6.2 or later versions.• The following web browsers and operating systems currently support HTTPS:

Page 209 - Private VLANs

SYSTEM MANAGEMENT COMMANDS4-45Command Mode Global ConfigurationCommand Usage • You cannot configure the HTTP and HTTPS servers to use the same port. •

Page 210

COMMAND LINE INTERFACE4-46Default Setting 23Command Mode Global ConfigurationExampleRelated Commandsip telnet server (4-46)ip telnet serverThis comman

Page 211 - Configuring Private VLANs

SYSTEM MANAGEMENT COMMANDS4-47Secure Shell CommandsThe Berkley-standard includes remote access tools originally designed for Unix systems. Some of the

Page 212

DESCRIPTION OF SOFTWARE FEATURES1-3Configuration Backup and Restore – You can save the current configuration settings to a file on a TFTP server, and

Page 213 - Associating VLANs

COMMAND LINE INTERFACE4-48The SSH server on this switch supports both password and public key authentication. If password authentication is specified

Page 214

SYSTEM MANAGEMENT COMMANDS4-492. Provide Host Public Key to Clients – Many SSH client programs automatically import the host public key during the ini

Page 215

COMMAND LINE INTERFACE4-50a. The client sends its public key to the switch. b. The switch compares the client's public key to those stored in mem

Page 216

SYSTEM MANAGEMENT COMMANDS4-51Example Related Commandsip ssh crypto host-key generate (4-53)show ssh (4-56)ip ssh timeoutThis command configures the t

Page 217

COMMAND LINE INTERFACE4-52ip ssh authentication-retriesThis command configures the number of times the SSH server attempts to reauthenticate a user. U

Page 218 - Layer 2 Queue Settings

SYSTEM MANAGEMENT COMMANDS4-53Command Usage • The server key is a private key that is never shared outside the switch. • The host key is shared with t

Page 219

COMMAND LINE INTERFACE4-54Command Mode Privileged ExecCommand Usage • This command stores the host key pair in memory (i.e., RAM). Use the ip ssh save

Page 220

SYSTEM MANAGEMENT COMMANDS4-55Command Usage • This command clears the host key from volatile memory (RAM). Use the no ip ssh save host-key command to

Page 221

COMMAND LINE INTERFACE4-56show ip sshThis command displays the connection settings used when authenticating client access to the SSH server.Command Mo

Page 222 - Selecting the Queue Mode

SYSTEM MANAGEMENT COMMANDS4-57show public-keyThis command shows the public key for the specified user or for the host.Syntax show public-key [user [us

Page 223

38 TeslaIrvine, CA 92618Phone: (949) 679-8000TigerSwitch 10/100Management GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsNovember 2

Page 224 - Layer 3/4 Priority Settings

INTRODUCTION1-4Rate Limiting – This feature controls the maximum rate for traffic transmitted or received on an interface. Rate limiting is configured

Page 225 - Mapping IP Precedence

COMMAND LINE INTERFACE4-58Command Mode Privileged ExecCommand Usage • If no parameters are entered, all keys are displayed. If the user keyword is ent

Page 226

SYSTEM MANAGEMENT COMMANDS4-59Event Logging Commands logging onThis command controls logging of error messages, sending debug or error messages to swi

Page 227 - Mapping DSCP Priority

COMMAND LINE INTERFACE4-60Example Related Commandslogging history (4-60)clear logging (4-64)logging historyThis command limits syslog messages saved t

Page 228

SYSTEM MANAGEMENT COMMANDS4-61Default Setting Flash: errors (level 3 - 0)RAM: warnings (level 7 - 0)Command Mode Global ConfigurationCommand Usage The

Page 229 - Mapping IP Port Priority

COMMAND LINE INTERFACE4-62Command Usage • By using this command more than once you can build up a list of host IP addresses.• The maximum number of ho

Page 230

SYSTEM MANAGEMENT COMMANDS4-63logging trapThis command enables the logging of system messages to a remote server, or limits the syslog messages saved

Page 231 - Mapping CoS Values to ACLs

COMMAND LINE INTERFACE4-64clear loggingThis command clears messages from the log buffer.Syntax clear logging [flash | ram]- flash - Event history stor

Page 232

SYSTEM MANAGEMENT COMMANDS4-65- sendmail - Displays settings for the SMTP event handler (page 4-71).- trap - Displays settings for the trap function.

Page 233 - Multicast Filtering

COMMAND LINE INTERFACE4-66The following example displays settings for the trap function. Related Commandsshow logging sendmail (4-71)show logThis comm

Page 234

SYSTEM MANAGEMENT COMMANDS4-67- tail - Shows event history starting from the most recent entry.- login - Shows the login record only.Default Setting N

Page 235

DESCRIPTION OF SOFTWARE FEATURES1-5Store-and-Forward Switching – The switch copies each frame into its memory before forwarding them to another port.

Page 236

COMMAND LINE INTERFACE4-68SMTP Alert CommandsThese commands configure SMTP event handling, and forwarding of alert messages to the specified SMTP serv

Page 237

SYSTEM MANAGEMENT COMMANDS4-69• To send email alerts, the switch first opens a connection, sends all the email alerts waiting in the queue one by one,

Page 238

COMMAND LINE INTERFACE4-70logging sendmail source-emailThis command sets the email address used for the “From” field in alert messages. Use the no for

Page 239

SYSTEM MANAGEMENT COMMANDS4-71Command Mode Global ConfigurationCommand Usage You can specify up to five recipients for alert messages. However, you mu

Page 240

COMMAND LINE INTERFACE4-72ExampleTime CommandsThe system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP). Mainta

Page 241

SYSTEM MANAGEMENT COMMANDS4-73sntp clientThis command enables SNTP client requests for time synchronization from NTP or SNTP time servers specified wi

Page 242

COMMAND LINE INTERFACE4-74sntp serverThis command sets the IP address of the servers to which SNTP time requests are issued. Use the this command with

Page 243 - NTERFACE

SYSTEM MANAGEMENT COMMANDS4-75sntp pollThis command sets the interval between sending time requests when the switch is set to SNTP client mode. Use th

Page 244 - Telnet Connection

COMMAND LINE INTERFACE4-76Example clock timezoneThis command sets the time zone for the switch’s internal clock.Syntax clock timezone name hour hours

Page 245

SYSTEM MANAGEMENT COMMANDS4-77Example Related Commandsshow sntp (4-75)calendar setThis command sets the system clock. It may be used if there is no ti

Page 246 - Entering Commands

INTRODUCTION1-6switch to restrict traffic to the VLAN groups to which a user has been assigned. By segmenting your network into VLANs, you can:• Elimi

Page 247 - Getting Help on Commands

COMMAND LINE INTERFACE4-78show calendarThis command displays the system clock.Default Setting NoneCommand Mode Normal Exec, Privileged ExecExample Sys

Page 248 - Showing Commands

SYSTEM MANAGEMENT COMMANDS4-79light unitThis command displays the unit ID of a switch using its front-panel LED indicators.Syntax light unit [unit]- u

Page 249

COMMAND LINE INTERFACE4-80• This command displays settings for key command modes. Each mode group is separated by “!” symbols, and includes the config

Page 250 - Table 4-1 Command Modes

SYSTEM MANAGEMENT COMMANDS4-81Example Related Commandsshow running-config (4-82)Console#show startup-configbuilding startup-config, please wait...!

Page 251 - Configuration Commands

COMMAND LINE INTERFACE4-82show running-configThis command displays the configuration information currently in use.Default Setting NoneCommand Mode Pri

Page 252

SYSTEM MANAGEMENT COMMANDS4-83Example Console#show running-configbuilding running-config, please wait...!phymap 5a-a5-aa-55-44-32 00-00-00-00-00-00

Page 253 - Command Line Processing

COMMAND LINE INTERFACE4-84Related Commandsshow startup-config (4-79)show systemThis command displays system information.Default Setting NoneCommand Mo

Page 254 - Command Groups

SYSTEM MANAGEMENT COMMANDS4-85Exampleshow usersShows all active console and Telnet sessions, including user name, idle time, and IP address of Telnet

Page 255

COMMAND LINE INTERFACE4-86Example show versionThis command displays hardware and software version information for the system.Default Setting NoneComma

Page 256 - Line Commands

SYSTEM MANAGEMENT COMMANDS4-87Example Frame Size Commandsjumbo frameThis command enables support for jumbo frames. Use the no form to disable it.Synta

Page 257 - Console(config-line)#

SYSTEM DEFAULTS1-7System DefaultsThe switch’s system defaults are provided in the configuration file “Factory_Default_Config.cfg.” To reset the switch

Page 258

COMMAND LINE INTERFACE4-88using jumbo frames significantly reduces the per-packet overhead required to process protocol encapsulation fields.• To use

Page 259

FLASH/FILE COMMANDS4-89copy This command moves (upload/download) a code image or configuration file between the switch’s flash memory and a TFTP se

Page 260

COMMAND LINE INTERFACE4-90• The destination file name should not contain slashes (\ or /), the leading letter of the file name should not be a period

Page 261

FLASH/FILE COMMANDS4-91The following example shows how to copy the running configuration to a startup file.The following example shows how to download

Page 262

COMMAND LINE INTERFACE4-92deleteThis command deletes a file or image.Syntax delete [unit:] filenamefilename - Name of the configuration file or image

Page 263

FLASH/FILE COMMANDS4-93- boot-rom - Boot ROM (or diagnostic) image file.- config - Switch configuration file.- opcode - Run-time operation code image

Page 264

COMMAND LINE INTERFACE4-94whichbootThis command displays which files were booted when the system powered up.Syntax whichboot [unit]unit - Specifies th

Page 265

AUTHENTICATION COMMANDS4-95- unit* - Specifies the unit number.* The colon (:) is required.Default Setting NoneCommand Mode Global ConfigurationComman

Page 266

COMMAND LINE INTERFACE4-96Authentication Sequenceauthentication loginThis command defines the login authentication method and precedence. Use the no f

Page 267 - Console#

AUTHENTICATION COMMANDS4-97access-request packet from the client to the server, while TACACS+ encrypts the entire body of the packet.• RADIUS and TACA

Page 268 - Example

INTRODUCTION1-8Web ManagementHTTP Server EnabledHTTP Port Number 80HTTP Secure Server EnabledHTTP Secure Port Number443SNMP Community Strings “public”

Page 269 - General Commands

COMMAND LINE INTERFACE4-98Command Mode Global ConfigurationCommand Usage • RADIUS uses UDP while TACACS+ uses TCP. UDP only offers best effort deliver

Page 270

AUTHENTICATION COMMANDS4-99RADIUS ClientRemote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software runn

Page 271 - Console(config)#

COMMAND LINE INTERFACE4-100• port_number - RADIUS server UDP port used for authentication messages. (Range: 1-65535)• timeout - Number of seconds the

Page 272

AUTHENTICATION COMMANDS4-101Example radius-server keyThis command sets the RADIUS encryption key. Use the no form to restore the default.Syntax radius

Page 273 - Console(config-if)#end

COMMAND LINE INTERFACE4-102Command Mode Global ConfigurationExample radius-server timeoutThis command sets the interval between transmitting authentic

Page 274

AUTHENTICATION COMMANDS4-103Example TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that u

Page 275 - System Management Commands

COMMAND LINE INTERFACE4-104tacacs-server hostThis command specifies the TACACS+ server. Use the no form to restore the default.Syntax tacacs-server ho

Page 276

AUTHENTICATION COMMANDS4-105Example tacacs-server keyThis command sets the TACACS+ encryption key. Use the no form to restore the default.Syntax tacac

Page 277 - User Access Commands

COMMAND LINE INTERFACE4-106Example Port Security CommandsThese commands can be used to enable port security on a port. When using port security, the s

Page 278

AUTHENTICATION COMMANDS4-107port securityThis command enables or configures port security. Use the no form without any keywords to disable port securi

Page 279 - ANAGEMENT

SYSTEM DEFAULTS1-9Virtual LANs Default VLAN 1PVID 1Acceptable Frame Type AllIngress Filtering DisabledSwitchport Mode (Egress Mode)Hybrid: tagged/unta

Page 280 - IP Filter Commands

COMMAND LINE INTERFACE4-108• You can also manually add secure addresses with the mac-address-table static command. • A secure port has the following r

Page 281

AUTHENTICATION COMMANDS4-109dot1x system-auth-controlThis command enables 802.1X port authentication globally on the switch. Use the no form to restor

Page 282

COMMAND LINE INTERFACE4-110Command ModeGlobal ConfigurationExampledot1x defaultThis command sets all configurable dot1x global and port settings to th

Page 283 - Web Server Commands

AUTHENTICATION COMMANDS4-111Exampledot1x port-controlThis command sets the dot1x mode on a port interface. Use the no form to restore the default.Synt

Page 284

COMMAND LINE INTERFACE4-112dot1x operation-modeThis command allows single or multiple hosts (clients) to connect to an 802.1X-authorized port. Use the

Page 285

AUTHENTICATION COMMANDS4-113dot1x re-authenticateThis command forces re-authentication on all ports or a specific interface.Syntaxdot1x re-authenticat

Page 286

COMMAND LINE INTERFACE4-114dot1x timeout quiet-periodThis command sets the time that a switch port waits after the Max Request Count has been exceeded

Page 287 - Telnet Server Commands

AUTHENTICATION COMMANDS4-115Exampledot1x timeout tx-periodThis command sets the time that an interface on the switch waits during an authentication se

Page 288

COMMAND LINE INTERFACE4-116Command ModePrivileged ExecCommand UsageThis command displays the following information:• Global 802.1X Parameters – Shows

Page 289 - Secure Shell Commands

AUTHENTICATION COMMANDS4-117- Max Count – The maximum number of hosts allowed to access this port (page 4-112).- Port-control – Shows the dot1x mode o

Page 290

INTRODUCTION1-10

Page 291

COMMAND LINE INTERFACE4-118ExampleConsole#show dot1xGlobal 802.1X Parameters system-auth-control: enable802.1X Port SummaryPort Name Status O

Page 292

ACCESS CONTROL LIST COMMANDS4-119Access Control List CommandsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, prot

Page 293

COMMAND LINE INTERFACE4-120• This switch supports ACLs for ingress filtering only. However, you can only bind one IP ACL to any port and one MAC ACL g

Page 294

ACCESS CONTROL LIST COMMANDS4-121access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. Us

Page 295

COMMAND LINE INTERFACE4-122Command Usage• When you create a new ACL or enter configuration mode for an existing ACL, use the permit or deny command to

Page 296

ACCESS CONTROL LIST COMMANDS4-123Command Usage• New rules are appended to the end of the list.• Address bitmasks are similar to a subnet mask, contain

Page 297

COMMAND LINE INTERFACE4-124[precedence precedence] [tos tos] [dscp dscp][source-port sport [end]] [destination-port dport [end]][control-flag control-

Page 298 - Console#show ssh

ACCESS CONTROL LIST COMMANDS4-125• The control-code bitmask is a decimal number (representing an equivalent bit mask) that is applied to the control c

Page 299

COMMAND LINE INTERFACE4-126Related Commandsaccess-list ip (4-121)show ip access-list This command displays the rules for configured IP ACLs.Syntaxshow

Page 300

ACCESS CONTROL LIST COMMANDS4-127Command ModeInterface Configuration (Ethernet)Command Usage• A port can only be bound to one ACL.• If a port is alrea

Page 301 - Event Logging Commands

2-1CHAPTER 2INITIAL CONFIGURATIONConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent offer

Page 302 - Table 4-18 Logging Levels

COMMAND LINE INTERFACE4-128map access-list ip This command sets the output queue for packets matching an ACL rule. The specified CoS value is only use

Page 303

ACCESS CONTROL LIST COMMANDS4-129show map access-list ip This command shows the CoS value mapped to an IP ACL for the current interface. (The CoS valu

Page 304

COMMAND LINE INTERFACE4-130MAC ACLs access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form to remo

Page 305

ACCESS CONTROL LIST COMMANDS4-131Command Usage• When you create a new ACL or enter configuration mode for an existing ACL, use the permit or deny comm

Page 306

COMMAND LINE INTERFACE4-132• address-bitmask2 – Bitmask for MAC address (in hexidecimal format). • vid – VLAN ID. (Range: 1-4094)• vid-end – Upper bou

Page 307

ACCESS CONTROL LIST COMMANDS4-133show mac access-list This command displays the rules for configured MAC ACLs.Syntaxshow mac access-list [acl_name]acl

Page 308

COMMAND LINE INTERFACE4-134Command Usage• A port can only be bound to one ACL.• If a port is already bound to an ACL and you bind it to a different AC

Page 309

ACCESS CONTROL LIST COMMANDS4-135Default SettingNoneCommand ModeInterface Configuration (Ethernet)Command Usage• You must configure an ACL mask before

Page 310 - SMTP Alert Commands

COMMAND LINE INTERFACE4-136Command ModePrivileged ExecExample Related Commandsmap access-list mac (4-134)ACL Informationshow access-listThis command s

Page 311

ACCESS CONTROL LIST COMMANDS4-137Example show access-groupThis command shows the port assignments of ACLs.Command ModePrivileged ExecutiveExample Cons

Page 312

INITIAL CONFIGURATION2-2The switch’s Web interface, CLI configuration program, and SNMP agent allow you to perform the following management functions:

Page 313

COMMAND LINE INTERFACE4-138SNMP CommandsControls access to this switch from management stations using the Simple Network Management Protocol (SNMP), a

Page 314 - Time Commands

SNMP COMMANDS4-139• rw - Specifies read/write access. Authorized management stations are able to both retrieve and modify MIB objects.Default Setting

Page 315

COMMAND LINE INTERFACE4-140Example Related Commandssnmp-server location (4-140)snmp-server locationThis command sets the system location string. Use t

Page 316

SNMP COMMANDS4-141snmp-server host This command specifies the recipient of a Simple Network Management Protocol notification operation. Use the no for

Page 317

COMMAND LINE INTERFACE4-142enable traps command and the snmp-server host command for that host must be enabled. • Some notification types cannot be co

Page 318

SNMP COMMANDS4-143Command Usage • If you do not enter an snmp-server enable traps command, no notifications controlled by this command are sent. In or

Page 319

COMMAND LINE INTERFACE4-144ExampleConsole#show snmpSystem Contact: JoeSystem Location: Room 23SNMP traps: Authentication: enabled Link-up-down: enab

Page 320 - System Status Commands

INTERFACE COMMANDS4-145Interface CommandsThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or

Page 321

COMMAND LINE INTERFACE4-146interfaceThis command configures an interface type and enter interface configuration mode. Use the no form to remove a trun

Page 322

4-147Command Mode Interface Configuration (Ethernet, Port Channel)Example The following example adds a description to port 24.speed-duplexThis command

Page 323 - Related Commands

CONNECTING TO THE SWITCH2-3Attach a VT100-compatible terminal, or a PC running a terminal emulation program to the switch. You can use the console cab

Page 324

COMMAND LINE INTERFACE4-148• When using the negotiation command to enable auto-negotiation, the optimal settings will be determined by the capabilitie

Page 325

4-149Example The following example configures port 11 to use autonegotiation.Related Commands capabilities (4 -149)speed-duplex (4 -147)capabilitiesTh

Page 326

COMMAND LINE INTERFACE4-150Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage When auto-negotiation is enabled with the negoti

Page 327

4-151Command Usage • Flow control can eliminate frame loss by “blocking” traffic from end stations or segments connected directly to the switch when i

Page 328

COMMAND LINE INTERFACE4-152Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage This command allows you to disable a port due to

Page 329 - Frame Size Commands

4-153Example The following shows how to configure broadcast storm control at 600 packets per second: clear countersThis command clears statistics on a

Page 330 - Flash/File Commands

COMMAND LINE INTERFACE4-154show interfaces statusThis command displays the status for an interface.Syntax show interfaces status [interface]interface

Page 331

4-155Example show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]interface • ethernet unit/

Page 332

COMMAND LINE INTERFACE4-156Command Usage If no interface is specified, information on all interfaces is displayed. For a description of the items disp

Page 333

4-157show interfaces switchportThis command displays the administrative and operational status of the specified interfaces.Syntax show interfaces swit

Page 334

Information furnished by SMC Networks, Inc. (SMC) is believed to be accu-rate and reliable. However, no responsibility is assumed by SMC for its use,

Page 335 - Column Heading Description

INITIAL CONFIGURATION2-4For a description of how to use the CLI, see “Using the Command Line Interface” on page 4-1. For a list of all the CLI command

Page 336

COMMAND LINE INTERFACE4-158Table 4-41 Interfaces Switchport StatisticsField DescriptionBroadcast threshold Shows if broadcast storm suppression is en

Page 337 - Authentication Commands

MIRROR PORT COMMANDS4-159Mirror Port CommandsThis section describes how to mirror traffic from a source port to a target port. port monitorThis comman

Page 338 - Authentication Sequence

COMMAND LINE INTERFACE4-160• The mirror port and monitor port speeds should match, otherwise traffic may be dropped from the monitor port.• You can on

Page 339

RATE LIMIT COMMANDS4-161Example The following shows mirroring configured from port 6 to port 11:Rate Limit CommandsThis function allows the network ma

Page 340

COMMAND LINE INTERFACE4-162rate-limitUse this command to define the rate limit level for a specific interface. Use this command without specifying a r

Page 341 - RADIUS Client

RATE LIMIT COMMANDS4-163• fastethernet – Fast Ethernet granularity• gigabitethernet – Gigabit Ethernet granularity• granularity – Sets rate limit gran

Page 342

COMMAND LINE INTERFACE4-164ExampleLink Aggregation CommandsPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwi

Page 343

LINK AGGREGATION COMMANDS4-165Guidelines for Creating TrunksGeneral Guidelines –• Finish configuring port trunks before you connect the corresponding

Page 344

COMMAND LINE INTERFACE4-166• However, if the port channel admin key is set, then the port admin key must be set to the same value for a port to be all

Page 345 - TACACS+ Client

LINK AGGREGATION COMMANDS4-167lacpThis command enables 802.3ad Link Aggregation Control Protocol (LACP) for the current interface. Use the no form to

Page 346

STACK OPERATIONS2-5Stack OperationsUp to eight switches can be stacked together as described in the Installation Guide. One unit in the stack acts as

Page 347

COMMAND LINE INTERFACE4-168ExampleThe following shows LACP enabled on ports 11-13. Because LACP has also been enabled on the ports at the other end of

Page 348 - Port Security Commands

LINK AGGREGATION COMMANDS4-169• priority - This priority is used to determine link aggregation group (LAG) membership, and to identify this device to

Page 349

COMMAND LINE INTERFACE4-170lacp admin-key (Ethernet Interface)This command configures a port's LACP administration key. Use the no form to restor

Page 350 - 802.1X Port Authentication

LINK AGGREGATION COMMANDS4-171lacp admin-key (Port Channel)This command configures a port channel's LACP administration key string. Use the no fo

Page 351

COMMAND LINE INTERFACE4-172lacp port-priorityThis command configures LACP port priority. Use the no form to restore the default setting.Syntax lacp {a

Page 352

LINK AGGREGATION COMMANDS4-173show lacpThis command displays LACP information.Syntax show lacp [port-channel] {counters | internal | neighbors | sysid

Page 353

COMMAND LINE INTERFACE4-174Table 4-45 show lacp counters - display descriptionField DescriptionLACPDUs Sent Number of valid LACPDUs transmitted from t

Page 354

LINK AGGREGATION COMMANDS4-175Console#show lacp 1 internalChannel group : 1-------------------------------------------------------------------Oper Key

Page 355

COMMAND LINE INTERFACE4-176Admin State,Oper StateAdministrative or operational values of the actor’s state parameters:• Expired – The actor’s receive

Page 356

LINK AGGREGATION COMMANDS4-177Console#show lacp 1 neighborsChannel group 1 neighbors------------------------------------------------------------------

Page 357

INITIAL CONFIGURATION2-6Resilient IP Interface for Management Access The stack functions as one integral system for management and configuration purpo

Page 358

COMMAND LINE INTERFACE4-178Address Table CommandsThese commands are used to configure the address table for filtering specified addresses, displaying

Page 359

ADDRESS TABLE COMMANDS4-179mac-address-table staticThis command maps a static address to a destination port in a VLAN. Use the no form to remove an ad

Page 360

COMMAND LINE INTERFACE4-180• A static address cannot be learned on another port until the address is removed with the no form of this command. Example

Page 361 - Access Control List Commands

ADDRESS TABLE COMMANDS4-181show mac-address-tableThis command shows classes of entries in the bridge-forwarding database.Syntax show mac-address-table

Page 362 - IP ACLs

COMMAND LINE INTERFACE4-182Examplemac-address-table aging-timeThis command sets the aging time for entries in the address table. Use the no form to re

Page 363 - Table 4-34 IP ACLs

SPANNING TREE COMMANDS4-183Command Mode Privileged ExecExample Spanning Tree CommandsThis section includes commands that configure the Spanning Tree A

Page 364

COMMAND LINE INTERFACE4-184spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Syntax

Page 365

SPANNING TREE COMMANDS4-185Example This example shows how to enable the Spanning Tree Algorithm for the switch:spanning-tree modeThis command selects

Page 366

COMMAND LINE INTERFACE4-186RSTP Mode – If RSTP is using 802.1D BPDUs on a port and receives an RSTP BPDU after the migration delay expires, RSTP resta

Page 367

SPANNING TREE COMMANDS4-187spanning-tree hello-timeThis command configures the spanning tree bridge hello time globally for this switch. Use the no fo

Page 368

BASIC CONFIGURATION2-73. At the Password prompt, also enter “admin.” (The password characters are not displayed on the console screen.)4. The session

Page 369

COMMAND LINE INTERFACE4-188Command Mode Global ConfigurationCommand Usage This command sets the maximum time (in seconds) a device can wait without re

Page 370 - 1,2 0,3 4,5 6,7

SPANNING TREE COMMANDS4-189Command Usage Bridge priority is used in selecting the root device, root port, and designated port. The device with the hig

Page 371 - Access-list ALS1 cos 0

COMMAND LINE INTERFACE4-190spanning-tree transmission-limitThis command configures the minimum interval between the transmission of consecutive RSTP B

Page 372 - MAC ACLs

SPANNING TREE COMMANDS4-191Default Setting • Ethernet – half duplex: 2,000,000; full duplex: 1,000,000; trunk: 500,000• Fast Ethernet – half duplex: 2

Page 373

COMMAND LINE INTERFACE4-192Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • This command defines the priority for the use

Page 374

SPANNING TREE COMMANDS4-193of frame flooding required to rebuild address tables during reconfiguration events, does not cause the spanning tree to ini

Page 375 - MAC access-list jerry:

COMMAND LINE INTERFACE4-194forwarding should only be enabled for ports connected to a LAN segment that is at the end of a bridged LAN or for an end-no

Page 376

SPANNING TREE COMMANDS4-195Command Usage • Specify a point-to-point link if the interface can only be connected to exactly one other bridge, or a shar

Page 377

COMMAND LINE INTERFACE4-196Example show spanning-treeThis command shows the configuration for the spanning tree.Syntax show spanning-tree [interface]•

Page 378 - ACL Information

SPANNING TREE COMMANDS4-197ExampleConsole#show spanning-treeSpanning-tree information--------------------------------------------------------------- S

Page 379 - Privileged Executive

INITIAL CONFIGURATION2-8Setting an IP AddressYou must establish IP address information for the switch to obtain management access through the network.

Page 380 - SNMP Commands

COMMAND LINE INTERFACE4-198VLAN CommandsA VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong

Page 381

VLAN COMMANDS4-199Command Mode Global ConfigurationCommand Usage • Use the VLAN database command mode to add, change, and delete VLANs. After finishin

Page 382

COMMAND LINE INTERFACE4-200• state - Keyword to be followed by the VLAN state. - active - VLAN is operational. - suspend - VLAN is suspended. Suspende

Page 383

VLAN COMMANDS4-201Configuring VLAN Interfacesinterface vlanThis command enters interface configuration mode for VLANs, which is used to configure VLAN

Page 384

COMMAND LINE INTERFACE4-202Example The following example shows how to set the interface configuration mode to VLAN 1, and then assign an IP address to

Page 385

VLAN COMMANDS4-203Example The following shows how to set the configuration mode to port 1, and then set the switchport mode to hybrid:Related Commands

Page 386

COMMAND LINE INTERFACE4-204Related Commandsswitchport mode (4 -202)switchport ingress-filtering This command enables ingress filtering for an interfac

Page 387 - Interface Commands

VLAN COMMANDS4-205switchport native vlanThis command configures the PVID (i.e., default VLAN ID) for a port. Use the no form to restore the default.Sy

Page 388

COMMAND LINE INTERFACE4-206switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the defaul

Page 389 - Console(config-if)#

VLAN COMMANDS4-207• If a VLAN on the forbidden list for an interface is manually added to that interface, the VLAN is automatically removed from the f

Page 390

BASIC CONFIGURATION2-93. Type “exit” to return to the global configuration mode prompt. Press <Enter>. 4. To set the IP address of the default g

Page 391

COMMAND LINE INTERFACE4-208Example The following example shows how to prevent port 1 from being added to VLAN 3:Displaying VLAN Informationshow vlanTh

Page 392

VLAN COMMANDS4-209Example The following example shows how to display information for VLAN 1:Configuring Private VLANsPrivate VLANs provide port-based

Page 393

COMMAND LINE INTERFACE4-210To configure private VLANs, follow these steps:1. Use the private-vlan command to designate one or more community VLANs and

Page 394

VLAN COMMANDS4-211VLANs, and serves to channel traffic between community VLANs and other locations.• isolated – Specifies an isolated VLAN. Ports assi

Page 395

COMMAND LINE INTERFACE4-212• primary-vlan-id - ID of primary VLAN.(Range: 1-4094, no leading zeroes).• secondary-vlan-id - ID of secondary (i.e, commu

Page 396

VLAN COMMANDS4-213switchport mode private-vlanUse this command to set the private VLAN mode for an interface. Use the no form to restore the default s

Page 397

COMMAND LINE INTERFACE4-214switchport private-vlan host-associationUse this command to associate an interface with a secondary VLAN. Use the no form t

Page 398

VLAN COMMANDS4-215Default Setting NoneCommand Mode Interface Configuration (Ethernet, Port Channel)Command UsagePromiscuous ports assigned to a primar

Page 399

COMMAND LINE INTERFACE4-216ExampleGVRP and Bridge Extension CommandsGARP VLAN Registration Protocol defines a way for switches to exchange VLAN inform

Page 400

GVRP AND BRIDGE EXTENSION COMMANDS4-217bridge-ext gvrpThis command enables GVRP globally for the switch. Use the no form to disable it.Syntax [no] bri

Page 401 - Mirror Port Commands

INITIAL CONFIGURATION2-10• To obtain IP settings via BOOTP, type “ip address bootp” and press <Enter>.3. Type “end” to return to the Privileged

Page 402

COMMAND LINE INTERFACE4-218Example switchport gvrpThis command enables GVRP for a port. Use the no form to disable it.Syntax [no] switchport gvrpDefau

Page 403 - Rate Limit Commands

GVRP AND BRIDGE EXTENSION COMMANDS4-219show gvrp configurationThis command shows if GVRP is enabled.Syntax show gvrp configuration [interface]interfac

Page 404 - Default Setting

COMMAND LINE INTERFACE4-220Default Setting • join: 20 centiseconds• leave: 60 centiseconds• leaveall: 1000 centisecondsCommand Mode Interface Configur

Page 405

GVRP AND BRIDGE EXTENSION COMMANDS4-221show garp timerThis command shows the GARP timers for the selected interface.Syntax show garp timer [interface]

Page 406 - Link Aggregation Commands

COMMAND LINE INTERFACE4-222Priority CommandsThe commands described in this section allow you to specify which data packets have greater precedence whe

Page 407 - GGREGATION

PRIORITY COMMANDS4-223queue modeThis command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for the class of service (CoS) prior

Page 408

COMMAND LINE INTERFACE4-224Example The following example sets the queue mode to strict priority service mode:switchport priority defaultThis command s

Page 409

PRIORITY COMMANDS4-225Therefore, any inbound frames that do not have priority tags will be placed in queue 0 of the output port. (Note that if the out

Page 410

COMMAND LINE INTERFACE4-226Related Commandsshow queue bandwidth (4 -227)queue cos-mapThis command assigns class of service (CoS) values to the priorit

Page 411

PRIORITY COMMANDS4-227Example The following example shows how to map CoS values 0, 1 and 2 to egress queue 0, value 3 to egress queue 1, values 4 and

Page 412

BASIC CONFIGURATION2-11Community StringsCommunity strings are used to control management access to SNMP stations, as well as to authorize SNMP station

Page 413

COMMAND LINE INTERFACE4-228Command Mode Privileged ExecExample show queue cos-mapThis command shows the class of service priority map.Syntax show queu

Page 414

PRIORITY COMMANDS4-229Priority Commands (Layer 3 and 4) map ip port (Global Configuration)This command enables IP port mapping (i.e., class of service

Page 415

COMMAND LINE INTERFACE4-230Default Setting DisabledCommand Mode Global ConfigurationCommand Usage The precedence for priority mapping is IP Port, IP P

Page 416

PRIORITY COMMANDS4-231Example The following example shows how to map HTTP traffic to CoS value 0:map ip precedence (Global Configuration)This command

Page 417

COMMAND LINE INTERFACE4-232map ip precedence (Interface Configuration)This command sets IP precedence priority (i.e., IP Type of Service priority). Us

Page 418

PRIORITY COMMANDS4-233map ip dscp (Global Configuration)This command enables IP DSCP mapping (i.e., Differentiated Services Code Point mapping). Use t

Page 419

COMMAND LINE INTERFACE4-234Default Setting The DSCP default values are defined in the following table. Note that all the DSCP values that are not spec

Page 420 - Address Table Commands

PRIORITY COMMANDS4-235show map ip portUse this command to show the IP port priority map.Syntax show map ip port [interface]interface • ethernet unit/p

Page 421

COMMAND LINE INTERFACE4-236show map ip precedenceThis command shows the IP precedence priority map.Syntax show map ip precedence [interface]interface

Page 422

PRIORITY COMMANDS4-237show map ip dscpThis command shows the IP DSCP priority map.Syntax show map ip dscp [interface]interface • ethernet unit/port -

Page 423

INITIAL CONFIGURATION2-12Trap ReceiversYou can also specify SNMP stations that are to receive traps from the switch.To configure a trap receiver, comp

Page 424

COMMAND LINE INTERFACE4-238Multicast Filtering CommandsThis switch uses IGMP (Internet Group Management Protocol) to query for any attached hosts that

Page 425 - Spanning Tree Commands

MULTICAST FILTERING COMMANDS4-239ip igmp snoopingThis command enables IGMP snooping on this switch. Use the no form to disable it.Syntax [no] ip igmp

Page 426

COMMAND LINE INTERFACE4-240Command Mode Global ConfigurationExample The following shows how to statically configure a multicast group on a port:ip igm

Page 427 - Console(config)#spanning-tree

MULTICAST FILTERING COMMANDS4-241show ip igmp snoopingThis command shows the IGMP snooping configuration.Default Setting NoneCommand Mode Privileged E

Page 428

COMMAND LINE INTERFACE4-242Command Mode Privileged ExecCommand Usage Member types displayed include IGMP or USER, depending on selected options.Exampl

Page 429

MULTICAST FILTERING COMMANDS4-243ip igmp snooping querierThis command enables the switch as an IGMP querier. Use the no form to disable it.Syntax [no]

Page 430

COMMAND LINE INTERFACE4-244Command Usage The query count defines how long the querier waits for a response from a multicast client before taking actio

Page 431

MULTICAST FILTERING COMMANDS4-245ip igmp snooping query-max-response-timeThis command configures the query report delay. Use the no form to restore th

Page 432

COMMAND LINE INTERFACE4-246ip igmp snooping router-port-expire-timeThis command configures the query timeout. Use the no form to restore the default.S

Page 433

MULTICAST FILTERING COMMANDS4-247Static Multicast Routing Commandsip igmp snooping vlan mrouterThis command statically configures a multicast router p

Page 434

MANAGING SYSTEM FILES2-132. Enter the name of the start-up file. Press <Enter>.Managing System FilesThe switch’s flash memory supports three typ

Page 435

COMMAND LINE INTERFACE4-248Example The following shows how to configure port 11 as a multicast router port within VLAN 1:show ip igmp snooping mrouter

Page 436

IP INTERFACE COMMANDS4-249IP Interface CommandsAn IP addresses may be used for management access to the switch over your network. The IP address for t

Page 437

COMMAND LINE INTERFACE4-250Default Setting DHCPCommand Mode Interface Configuration (VLAN)Command Usage • You must assign an IP address to this device

Page 438

IP INTERFACE COMMANDS4-251ip dhcp restart This command submits a BOOTP or DHCP client request.Default Setting NoneCommand Mode Privileged ExecCommand

Page 439

COMMAND LINE INTERFACE4-252ip default-gatewayThis command establishes a static route between this switch and devices that exist on another network seg

Page 440 - VLAN Commands

IP INTERFACE COMMANDS4-253Example Related Commands show ip redirects (4 -253)show ip redirectsThis command shows the default gateway configured for th

Page 441 - Console(config-vlan)#

COMMAND LINE INTERFACE4-254Default Setting This command has no default for the host.Command Mode Normal Exec, Privileged ExecCommand Usage • Use the p

Page 442

A-1APPENDIX ASOFTWARE SPECIFICATIONSSoftware FeaturesAuthenticationLocal, RADIUS, TACACS, Port (802.1X), HTTPS, SSH, Port SecurityAccess Control Lists

Page 443 - Configuring VLAN Interfaces

SOFTWARE SPECIFICATIONSA-2Spanning Tree ProtocolSpanning Tree Protocol (STP, IEEE 802.1D) Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) VLAN Suppor

Page 444

SOFTWARE SPECIFICATIONSA-3RMONGroups 1, 2, 3, 9 (Statistics, History, Alarm, Event)StandardsIEEE 802.1D Spanning Tree Protocol and traffic prioritiesI

Page 445

iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Page 446

INITIAL CONFIGURATION2-14Due to the size limit of the flash memory, the switch supports only two operation code files. However, you can have as many d

Page 447

SOFTWARE SPECIFICATIONSA-4Management Information BasesBridge MIB (RFC 1493)Entity MIB (RFC 2737)Ether-like MIB (RFC 2665)Extended Bridge MIB (RFC 2674

Page 448

B-1APPENDIX BTROUBLESHOOTINGProblems Accessing the Management Interface Table B-1 Troubleshooting ChartSymptom ActionCannot connect using Telnet, w

Page 449

TROUBLESHOOTINGB-2Cannot connect using Secure Shell• If you cannot connect using SSH, you may have exceeded the maximum number of concurrent Telnet/SS

Page 450 - Displaying VLAN Information

USING SYSTEM LOGSB-3Using System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually cau

Page 451

TROUBLESHOOTINGB-4

Page 452 - Command Function Mode Page

Glossary-1GLOSSARYAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Page 453

GLOSSARYGlossary-2Dynamic Host Control Protocol (DHCP)Provides a framework for passing configuration information to hosts on a TCP/IP network. DHCP is

Page 454

GLOSSARYGlossary-3IEEE 802.1DSpecifies a general method for the operation of MAC bridges, including the Spanning Tree Protocol.IEEE 802.1QVLAN Tagging

Page 455

GLOSSARYGlossary-4IGMP QueryOn each subnetwork, one IGMP-capable device will act as the querier — that is, the device that asks all hosts to report on

Page 456

GLOSSARYGlossary-5Link AggregationSee Port Trunk. Link Aggregation Control Protocol (LACP)Allows ports to automatically negotiate a trunked link with

Page 457

3-1CHAPTER 3CONFIGURING THE SWITCHUsing the Web InterfaceThis switch provides an embedded HTTP Web agent. Using a Web browser you can configure the sw

Page 458

GLOSSARYGlossary-6Port MirroringA method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON

Page 459 - XTENSION

GLOSSARYGlossary-7Simple Network Management Protocol (SNMP)The application protocol in the Internet suite of protocols which offers network management

Page 460

GLOSSARYGlossary-8User Datagram Protocol (UDP)UDP provides a datagram mode for packet-switched communications. It uses IP as the underlying transport

Page 461

Index-1Numerics802.1X, port authentication 3-66Aacceptable frame type 3-156, 4-203Access Control List See ACLACLExtended IP 3-78, 4-119, 4-120, 4-123

Page 462

INDEXIndex-2GGARP VLAN Registration Protocol See GVRPgateway, default 3-18, 4-252GVRPglobal setting 4-217interface configuration 3-157, 4-218GVRP, g

Page 463

INDEXIndex-3path cost 3-128, 3-137method 3-133, 4-189STA 3-128, 3-137, 4-189port authentication 3-66port priorityconfiguring 3-168, 4-222default ingre

Page 464 - Priority Commands

INDEXIndex-4STA 3-125, 4-183edge port 3-138, 3-141, 4-192global settings, configuring 3-131, 4-184–4-190global settings, displaying 3-127, 4-196interf

Page 466

38 TeslaIrvine, CA 92618Phone: (949) 679-8000FOR TECHNICAL SUPPORT, CALL:From U.S.A. and Canada (24 hours a day, 7 days a week)(800) SMC-4-YOU; Phn: (

Page 467

CONFIGURING THE SWITCH3-2Notes: 1. You are allowed three attempts to enter the correct password; on the third failed attempt the current connection is

Page 468 - 1, 20, 34, 56, 7

NAVIGATING THE WEB BROWSER INTERFACE3-3Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and pa

Page 469

CONFIGURING THE SWITCH3-4Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration change has been made

Page 470

MAIN MENU3-5Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, or monitor netw

Page 471 - [no] map ip port

CONFIGURING THE SWITCH3-6SNTP 3-42Configuration Configures SNTP client settings, including broadcast mode or a specified list of servers3-42Clock Tim

Page 472

MAIN MENU3-7IP Filter Sets IP addresses of clients allowed management access via the Web, SNMP, and Telnet3-75Port 3-88Port Information Displays port

Page 473

CONFIGURING THE SWITCH3-8Output Port Configuration Sets the output rate limit for each port 3-114Output Trunk Configuration Sets the output rate limit

Page 474 - CoS Value 01234567

MAIN MENU3-9Static Membership by PortConfigures membership type for interfaces, including tagged, untagged or forbidden3-154Port Configuration Specifi

Page 475 - Console(config)#map ip dscp

LIMITED WARRANTYiiWARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE, CUSTOMER’S SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT O

Page 476

CONFIGURING THE SWITCH3-10Queue Scheduling Configures Weighted Round Robin queueing 3-173IP Precedence/DSCP Priority Status Globally selects IP Preced

Page 477

BASIC CONFIGURATION3-11Basic ConfigurationDisplaying System InformationYou can easily identify the system by displaying the device name, location and

Page 478

CONFIGURING THE SWITCH3-12Web – Click System, System Information. Specify the system name, location, and contact information for the system administra

Page 479

BASIC CONFIGURATION3-13CLI – Specify the hostname, location and contact information.Displaying Switch Hardware/Software Versions Use the Switch Inform

Page 480 - Multicast Filtering Commands

CONFIGURING THE SWITCH3-14• Internal Power Status – Displays the status of the internal power supply.Management Software • Loader Version – Version nu

Page 481 - ILTERING

BASIC CONFIGURATION3-15CLI – Use the following command to display version information.Displaying Bridge Extension CapabilitiesThe Bridge MIB includes

Page 482

CONFIGURING THE SWITCH3-16• Configurable PVID Tagging – This switch allows you to override the default Port VLAN ID (PVID used in frame tags) and egre

Page 483

BASIC CONFIGURATION3-17CLI – Enter the following command. Setting the Switch’s IP Address This section describes how to configure an IP interface for

Page 484

CONFIGURING THE SWITCH3-18Requests will be broadcast periodically by the switch for an IP address. (DHCP/BOOTP values can include the IP address, subn

Page 485

BASIC CONFIGURATION3-19CLI – Specify the management interface, IP address and default gateway.Using DHCP/BOOTP If your network provides DHCP/BOOTP ser

Page 486

iiiCONTENTS1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1Key Features . . . . . . . . . . . . . . . . . . . .

Page 487

CONFIGURING THE SWITCH3-20CLI – Specify the management interface, and set the IP address mode to DHCP or BOOTP, and then enter the “ip dhcp restart” c

Page 488

BASIC CONFIGURATION3-21Managing FirmwareYou can upload/download firmware to or from a TFTP server, or copy files to and from switch units in a stack.

Page 489

CONFIGURING THE SWITCH3-22Downloading System Software from a ServerWhen downloading runtime code, you can specify the destination file name to replace

Page 490

BASIC CONFIGURATION3-23If you download to a new destination file, go to the System/File/Set Start-Up menu, mark the operation code file used at startu

Page 491 - IP Interface Commands

CONFIGURING THE SWITCH3-24CLI – To download new firmware form a TFTP server, enter the IP address of the TFTP server, select “opcode” as the file type

Page 492

BASIC CONFIGURATION3-25- running-config to startup-config – Copies the running config to the startup config.- running-config to tftp – Copies the runn

Page 493

CONFIGURING THE SWITCH3-26Downloading Configuration Settings from a ServerYou can download the configuration file under a new file name and then set i

Page 494

BASIC CONFIGURATION3-27If you download to a new file name using “tftp to startup-config” or “tftp to file,” the file is automatically set as the start

Page 495

CONFIGURING THE SWITCH3-28Console Port SettingsYou can access the onboard configuration program by attaching a VT100 compatible device to the switch’s

Page 496

BASIC CONFIGURATION3-29• Speed – Sets the terminal line’s baud rate for transmit (to terminal) and receive (from terminal). Set the speed to match the

Page 497 - PECIFICATIONS

CONTENTSivDisplaying Switch Hardware/Software Versions . . . . . . . . . . . 3-13Displaying Bridge Extension Capabilities . . . . . . . . . . . . .

Page 498 - Management Features

CONFIGURING THE SWITCH3-30CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the curr

Page 499 - Standards

BASIC CONFIGURATION3-31• Telnet Port Number – Sets the TCP port number for Telnet on the switch. (Default: 23)• Login Timeout – Sets the interval that

Page 500 - Management Information Bases

CONFIGURING THE SWITCH3-32Web – Click System, Line, Telnet. Specify the connection parameters for Telnet access, then click Apply.Figure 3-14 Enablin

Page 501 - ROUBLESHOOTING

BASIC CONFIGURATION3-33Configuring Event LoggingThe switch allows you to control the logging of error messages, including the type of events that are

Page 502

CONFIGURING THE SWITCH3-34• RAM Level – Limits log messages saved to the switch’s temporary RAM memory for all levels up to the specified level. For e

Page 503 - Using System Logs

BASIC CONFIGURATION3-35Web – Click System, Log, System Logs. Specify System Log Status, set the level of event messages to be logged to RAM and flash

Page 504

CONFIGURING THE SWITCH3-36The facility type is used by the syslog server to dispatch log messages to an appropriate service.The attribute specifies th

Page 505 - Glossary-1

BASIC CONFIGURATION3-37Web – Click System, Log, Remote Logs. To add an IP address to the Host IP List, type the new IP address in the Host IP Address

Page 506 - Glossary-2

CONFIGURING THE SWITCH3-38Displaying Log MessagesThe Logs page allows you to scroll through the logged system and event messages. The switch can store

Page 507 - Glossary-3

BASIC CONFIGURATION3-39Sending Simple Mail Transfer Protocol AlertsTo alert system administrators of problems, the switch can use SMTP (Simple Mail Tr

Page 508 - Glossary-4

CONTENTSvFiltering Addresses for Management Access . . . . . . . . . . . . . . . 3-75Access Control Lists . . . . . . . . . . . . . . . . . . . . . .

Page 509 - Glossary-5

CONFIGURING THE SWITCH3-40Web – Click System, Log, SMTP. Enable SMTP, specify a source email address, and select the minimum severity level. To add an

Page 510 - Glossary-6

BASIC CONFIGURATION3-41CLI – Enter the IP address of at least one SMTP server, set the syslog severity level to trigger an email message, and specify

Page 511 - Glossary-7

CONFIGURING THE SWITCH3-42CLI – Use the reload command to restart the switch. When prompted, confirm that you want to reset the switch.Note: When rest

Page 512 - Glossary-8

BASIC CONFIGURATION3-43• SNTP Server – Sets the IP address for up to three time servers. The switch attempts to update the time from the first server,

Page 513

CONFIGURING THE SWITCH3-44Setting the Time ZoneSNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based on the time a

Page 514

SIMPLE NETWORK MANAGEMENT PROTOCOL3-45Simple Network Management Protocol Simple Network Management Protocol (SNMP) is a communication protocol designe

Page 515

CONFIGURING THE SWITCH3-46• Access Mode -Read-Only – Specifies read-only access. Authorized management stations are only able to retrieve MIB objects.

Page 516

SIMPLE NETWORK MANAGEMENT PROTOCOL3-47Command Attributes• Trap Manager Capability – This switch supports up to five trap managers.• Current – Displays

Page 517

CONFIGURING THE SWITCH3-48CLI – This example adds a trap manager and enables both authentication and link-up, link-down traps.User AuthenticationYou c

Page 518

USER AUTHENTICATION3-49Command Attributes• Account List – Displays the current list of user accounts and associated access levels. (Defaults: admin, a

Comments to this Manuals

No comments