Starting the Web-based Configuration Utility Out-Of-Band Port Basic or Advanced Display Mode Quick Start Device Configuration Interface Naming Conventions Window Navigation Chapter 2: Cisco 350XG & 550XG Series 10G Stackable Managed Switches Dashboard Overview Grid Management System Health Resource Utilization...
Page 3
Traceroute Chapter 6: Administration: File Management System Files Firmware Operations File Operations File Directory DHCP Auto Configuration/Image Update Chapter 7: Administration: Stack Management Overview Types of Units in Stack Cisco 350XG and 550XG Series 10G Stackable Managed Switches Administration Guide...
Page 4
Time Range Recurring Time Range Chapter 9: Administration: Discovery Bonjour LLDP and CDP Configuring LLDP Configuring CDP CDP Statistics Chapter 10: Port Management Workflow Port Settings Error Recovery Settings Cisco 350XG and 550XG Series 10G Stackable Managed Switches Administration Guide...
Page 5
GVRP Settings VLAN Groups Voice VLAN Access Port Multicast TV VLAN Customer Port Multicast TV VLAN Chapter 13: Spanning Tree STP Flavors STP Status and Global Settings STP Interface Settings Cisco 350XG and 550XG Series 10G Stackable Managed Switches Administration Guide...
Page 6
IPv6 Multicast Configuration IGMP/MLD Snooping IP Multicast Group Multicast Router Ports Forward All Unregistered Multicast Chapter 16: IP Configuration Overview IPv4 Management and Interfaces IPv6 Management and Interfaces Domain Name System Cisco 350XG and 550XG Series 10G Stackable Managed Switches Administration Guide...
Page 7
Management Access Method Management Access Authentication SSL Server TCP/UDP Services Storm Control Port Security IP Source Guard ARP Inspection Denial of Service Prevention Chapter 20: Security: 802.1X Authentication Overview Properties Cisco 350XG and 550XG Series 10G Stackable Managed Switches Administration Guide...
Page 8
Chapter 23: Security: SSH Client Overview SSH User Authentication SSH Server Authentication Change User Password on the SSH Server Chapter 24: Security: IPv6 First Hop Security IPv6 First Hop Security Overview Cisco 350XG and 550XG Series 10G Stackable Managed Switches Administration Guide...
Page 9
ACL Binding Chapter 26: Quality of Service QoS Features and Components General QoS Basic Mode QoS Advanced Mode Managing QoS Statistics Chapter 27: SNMP Overview SNMP Engine ID Views Cisco 350XG and 550XG Series 10G Stackable Managed Switches Administration Guide...
Page 10
Contents Groups Users Communities Trap Settings Notification Recipients Notification Filter Cisco 350XG and 550XG Series 10G Stackable Managed Switches Administration Guide...
Browser Restrictions If you are using IPv6 interfaces on your management station, use the IPv6 global address and not the IPv6 link local address to access the device from your browser. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
OOB port, make sure the OOB port is connected to your network or PC. Logging In The default username/password is cisco/cisco. The first time that you log in with the default username and password, you are required to enter a new password.
Page 13
Language Menu described in Application Header. If this is the first time that you logged on with the default user ID (cisco) and the STEP 3 default password (cisco) or your password has expired, the Change Password Page appears.
Password Expiration The New Password page is displayed in the following cases: • The first time that you access the device with the default username cisco and password cisco. This page forces you to replace the factory default password. •...
This default IP address is used when no other address was assigned (dynamically or statically). This sub net is a reserved one and cannot be assigned on the in- band interfaces. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Configure Port Mirroring Port and VLAN Mirroring There are two hot links on the Getting Started page that take you to Cisco web pages for more information. Clicking on the Support link takes you to the device product support page, and clicking on the Forums link takes you to the Support Community page.
Configuration and sets the device parameters according to the data in the Running Configuration. Username Displays the name of the user logged on to the device. The default username is cisco. (The default password is cisco). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 19
SYSLOG Alert Status icon is no longer displayed. To display the page when there is not an active SYSLOG message, Click Status and Statistics > View Log > RAM Memory. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Click to clear the statistic counters for the selected Counters interface. Clear Logs Clears log files. Clear Table Clears table entries. Close Returns to main page. If any changes were not applied to the Running Configuration, a message appears. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 21
Enter the query filtering criteria and click Go. The results are displayed on the page. Refresh Click Refresh to refresh the counter values. Test Click Test to perform the related tests. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
This section describes the device dashboard. The dashboard consists of the following sections: • Overview • System Health • Resource Utilization • Identification • Latest Logs • Suspended Interfaces • Stack Topology Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Cisco 350XG & 550XG Series 10G Stackable Managed Switches Dashboard Overview Overview The dashboard is a collection of 8 squares, initially empty, that can be populated by various types of information., as shown below (only 4 of the 8 squares are...
Page 24
Cisco 350XG & 550XG Series 10G Stackable Managed Switches Dashboard Grid Management When opening the panel, the regular view of the modules in the screen is replaced by a wire frame view of the grid., as shown below (only 2 squares shown in the...
Cisco 350XG & 550XG Series 10G Stackable Managed Switches Dashboard System Health When you click Done (in the right-hand corner), the modules are populated by the relevant information., as shown below: The title bar of each module in the dashboard displays the title of the module and...
Cisco 350XG & 550XG Series 10G Stackable Managed Switches Dashboard Resource Utilization • Thermometer Icon Temperature is OK—Green with a nearly empty thermometer. Temperature generates a warning—Yellow with a half full thermometer. Temperature is critical—Red with a full thermometer. The following configuration options (right-hand corner) are available: •...
Cisco 350XG & 550XG Series 10G Stackable Managed Switches Dashboard Identification • CPU—Percentage of CPU being used. Each bar becomes red if the resource utilization is higher than 80 percent. Hovering over a bar displays a tooltip displaying the numeric utilization information (used resources/max available).
Cisco 350XG & 550XG Series 10G Stackable Managed Switches Dashboard Latest Logs • Firmware Version—Current firmware version running on device. • MAC Address (master unit)—MAC address of the unit. • Serial Number (master unit)—Serial number of the unit. • System Location (if configured)—Entered in the Getting Started Wizard.
Page 29
Cisco 350XG & 550XG Series 10G Stackable Managed Switches Dashboard Suspended Interfaces • View Logs—Click to open Memory. Suspended Interfaces This module displays interfaces that have been suspended:. When units are connected in a stack, a drop-down selector enables the user to select the device to be viewed.
Cisco 350XG & 550XG Series 10G Stackable Managed Switches Dashboard Stack Topology Auto-recovery current status—Has auto recovery been enable for the feature that caused the suspension. • Refresh Time—Green if the fan is operational; Red if the fan is faulty.
Host names cannot begin or end with a hyphen. No other symbols, punctuation characters, or blank spaces are permitted (as specified in RFC1033, 1034, 1035). Click Next. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches, Firmware Release 1.0.0.x...
Page 32
Clock Source—Select one of the following: Manual Settings—Select to enter the device system time. If this is selected, enter the Date and Time. Default SNTP Servers—Select to use the default SNTP servers. Cisco 350XG & 550XG Series 10G Stackable Managed Switches, Firmware Release 1.0.0.x...
VLAN (by clicking with mouse on the required ports in the graphical display). The trunk ports that are not selected in this step becomes tagged members of the VLAN. Cisco 350XG & 550XG Series 10G Stackable Managed Switches, Firmware Release 1.0.0.x...
Page 34
VLAN is untagged member of the VLAN. (by clicking with mouse on the required ports in the graphical display). Click Next to see the summary of the information that you entered. STEP 10 Click Apply. STEP 11 Cisco 350XG & 550XG Series 10G Stackable Managed Switches, Firmware Release 1.0.0.x...
Software Information: • Firmware Version (Active Image)—Firmware version number of the active image. In a stack, the Firmware Version number shown is based on the NOTE version of the master. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The device uses the Secure Core Technology (SCT) feature to ensure that the device receives and processes management and protocol traffic, no matter how much total traffic is received SCT is enabled by default on the device and cannot be disabled. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The Receive Statistics area displays information about incoming packets. • Total Bytes (Octets)—Octets received, including bad packets and FCS octets, but excluding framing bits. • Unicast Packets—Good Unicast packets received. • Multicast Packets—Good Multicast packets received. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Refresh Rate—Select the amount of time that passes before the Etherlike statistics are refreshed. The fields are displayed for the selected interface. • Frame Check Sequence (FCS) Errors—Received frames that failed the CRC (cyclic redundancy checks). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
To view GVRP statistics and/or set the refresh rate: Click Status and Statistics > GVRP. STEP 1 Enter the parameters. STEP 2 • Interface—Select the specific interface for which GVRP statistics are to be displayed. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The 802.1x EAP page displays detailed information regarding the EAP (Extensible Authentication Protocol) frames that were sent or received. To configure the 802.1X feature, see the Properties page. To view the EAP Statistics and/or set the refresh rate: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 42
EAPOL frame. To clear statistics counters: STEP 4 • Click Clear Interface Counters to clear the selected interfaces counters. • Click View All Interfaces Statistics to clear the counters of all interfaces. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The TCAM Utilization page shows the following fields: • Unit No—Unit in stack for which TCAM utilization appears. This is not displayed when the device is in not part of a stack. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 44
In Use—Number of TCAM entries used for non-IP rules. Maximum—Number of available TCAM entries that can be used for non- IP rules. To view how the allocation among various processes can be changed, see the Routing Resources section. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Warning If FAN status is OK, the ports are enabled. threshold - 2 °C). (On devices that support PoE) the PoE circuitry is enabled. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 46
Warning—The temperature is between the warning threshold to the critical threshold. Critical—Temperature is above the critical threshold. N/A—Not relevant. • Power Supply Status—The options are: Main—Displays one of the following: Active—Power supply is being used. Failure—Main power has failed. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
VLAN 23, VLAN 34, or both, and later on delete VLAN 34, the status in port mirroring is set to Not Ready, because the VLAN34 is no longer in the database and VLAN23 was not created manually. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 48
Rx Only—Port mirroring on incoming packets. Tx Only—Port mirroring on outgoing packets. Tx and Rx—Port mirroring on both incoming and outgoing packets. Click Apply. Port mirroring is added to the Running Configuration. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
After the test, the port returns to the Up state. It is not recommended that you run the copper port test on a port you are using to run the web-based switch configuration utility, because communications with that device are disrupted. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 50
Channel—Cable channel indicating whether the wires are straight or cross- over. • Polarity—Indicates if automatic polarity detection and correction has been activated for the wire pair. • Pair Skew—Difference in delay between wire pairs. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Optical Module Status. This page displays the following fields: • Port—Port number on which the SFP is connected. • Description—Description of optical transceiver. • Serial Number—Serial number of optical transceiver. • PID—VLAN ID. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Define interesting changes in counter values, such as “reached a certain number of late collisions” (defines the alarm), and then specify what action to perform when this event occurs (log, trap, or log and trap). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 53
Undersize Packets—Undersized packets (less than 64 octets) received. • Oversize Packets—Oversized packets (over 2000 octets) received. • Fragments—Fragments (packets with less than 64 octets, excluding framing bits, but including FCS octets) received. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The History page defines the sampling frequency, amount of samples to store and the port from which to gather the data. After the data is sampled and stored, it appears in the History Table page that can be viewed by clicking History Table. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The History page displays interface-specific statistical network samplings. The samples were configured in the History Control table described above. To view RMON history statistics: Click Status and Statistics > RMON > History. STEP 1 Click History Table. STEP 2 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 56
(FCS Error) or a bad FCS with a non-integral octet (Alignment Error) number. • Collisions—Collisions received. • Utilization—Percentage of current interface traffic compared to maximum traffic that the interface can handle. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Log and Trap—Add a log entry to the Event Log table and send a trap to the remote log server when the alarm goes off. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
One or more alarms are bound to an event, which indicates the action to be taken when the alarm occurs. Alarm counters can be monitored by either absolute values or changes (delta) in the counter values. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 59
Rising is defined by crossing the threshold from a low-value threshold to a higher-value threshold. Rising Alarm—A rising value triggers the rising threshold alarm. Falling Alarm—A falling value triggers the falling threshold alarm. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
This can be changed by clicking Edit by the field’s name. This page contains the following fields for every log file: • Log Index—Log entry number. • Log Time—Time when message was generated. • Severity—Event severity. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Log Index—Log entry number. • Log Time—Time when message was generated. • Severity—Event severity. • Description—Message text describing the event. To clear the messages, click Clear Logs. The messages are cleared. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
STEP 3 Console Settings (Autobaud Rate Support) The console port speed can be set to one of the following speeds: 4800, 9600, 19200, 38400, 57600, and 115200 or to Auto Detection. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
After adding a level 15 user (as described below), the default user is removed from the system. It is not permitted to delete all users. If all users are selected, the Delete button is NOTE disabled. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 66
CLI commands that change the device configuration. See the CLI Reference Guide for more information. Read/Write Management Access (15)—User can access the GUI, and can configure the device. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Time Settings Administration: Time Settings. System Log This section describes the system logging, which enables the device to generate multiple independent logs. Each log is a set of messages describing system events. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
• Debug—Detailed information about an event. You can select different severity levels for RAM and Flash logs. These logs are displayed in the RAM Memory page and Flash Memory page, respectively. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 69
RAM Memory Logging—Select the severity levels of the messages to be logged to the RAM. • Flash Memory Logging—Select the severity levels of the messages to be logged to the Flash memory. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 70
Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
You can back up the device configuration by using the File Operations page or clicking Save at the top of the window. You can also upload the configuration from a remote device in the same page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 72
This option can only be used if the system time has either been set NOTE manually or by SNTP. In—Reboot within the specified number of hours and minutes. The maximum amount of time that can pass is 24 days. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
If your router TCAM allocation is feasible, a message is displayed that an automatic reboot will be performed with the new settings. Routing resources can be modified incorrectly, in one of the following ways: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 74
Multicast routes recorded on the device and TCAM Entries is the number of TCAM entries being used for the Multicast routes. • Maximum Entries—Select one of the following options: Use Default—Use default values. User Defined—Enter a value. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 75
The following fields are displayed for each unit: • Maximum TCAM Entries for Routing and Multicast Routing—Number of TCAM entries available for routing and Multicast routing. • IPv4 Routing In Use—Number of TCAM entries utilized for IPv4 routing. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 76
A summary of the TCAM entries actually in use and available is displayed at the NOTE bottom of this page. For an explanation of the fields, see TCAM Utilization. Discovery - Bonjour See Bonjour. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IP addresses of the type specified in the IP Version field will be displayed. If the Auto option is selected, the system computes the source NOTE address based on the destination address. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 78
STEP 3 added to the list of messages, indicating the result of the ping operation. View the results of ping in the Ping Counters and Status section of the page. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Host—Displays a stop along the route to the destination. • Round Trip Time (1-3)—Displays the round trip Time in (ms) for the first through third frame and the Status of the first through third operation. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The configuration files are text files and can be edited in a text editor, such as Notepad after they are copied to an external device, such as a PC. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 81
Firmware—The program that controls the operations and functionality of the device. More commonly referred to as the image. • Language File—The dictionary that enables the web-based configuration utility windows to be displayed in the selected language. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Click Administration > File Management > Firmware Operations. STEP 1 The following fields are displayed: • Active Firmware File—Displays the current, active firmware file. • Active Firmware Version—Displays the version of the current, active firmware file. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 83
Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 84
Click System Credentials to go to the SSH User Authentication page where the user/password can be set once for all future use. • Use SSH Client One-Time Credentials—Enter the following: Username—Enter a username for this copy action. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 85
SCP server is trusted, the operation succeeds. If the SCP server is not trusted, the operation fails and an error is displayed. • If SSH server authentication is not enabled, the operation succeeds for any SCP server. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
When restoring a configuration file to the Startup Configuration, the new file replaces the previous file. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 87
Destination File Type—Select one of the configuration file types to update. • Copy Method—Select HTTP/HTTPS, USB or Internal Flash. • File Name—Enter name of file to be updated from (source file). Click Apply to begin the operation. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 88
Link Local Interface—Select the link local interface from the list. • Server IP Address/Name—Enter the IP address or name of the TFTP server. • Source File Name—Enter the update file name. Click Apply to begin the operation. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 89
Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 90
Click Administration > File Management > File Operations. STEP 1 Enter the following fields: STEP 2 • Operation Type—Select Backup. • Source File Type—Select one of the configuration file types to backup. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 91
Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 92
SSH user authentication method (password or public/private key), set a username and password on the device, if the password method is selected, and generate an RSA or DSA key if required. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 93
Plaintext—Include sensitive data in the backup in its plaintext form. The available sensitive data options are determined by the current NOTE user SSD rules. For details, refer to Secure Sensitive Data Management > SSD Rules page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
USG—Display files on the USB drive. Click Go to display the following fields: STEP 4 • File Name—Type of system file or actual name of file depending on the file type. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Auto-Update/Configuration enables quick installation of new devices on the network, since an out-of-the-box device is configured to retrieve its configuration file and software image from the network Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
SSH client authentication parameters are required to access the SSH server by the client (which is the device). The default SSH client authentication parameters are: • SSH authentication method: by username/password • SSH username: anonymous Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 97
• When using the SCP protocol, a SYSLOG message is generated informing that reboot is about to start. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 98
The copy protocol (SCP/TFTP) is selected, as described in Download Protocols (TFTP or SCP). • When downloading using SCP, the device accepts any specified SCP/SSH server (without authentication) if either of the following is true: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 99
When an IPv6-enabled interface is defined as a DHCPv6 stateless configuration client. When DHCPv6 messages are received from the server (for example, when you press the Restart button on IPv6 Interfaces page, When DHCPv6 information is refreshed by the device. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 100
The following defaults exist on the system: • Auto Configuration is enabled. • Auto Image Update is enabled. • The device is enabled as a DHCP client. • Remote SSH server authentication is disabled. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 101
(for example indirect-cisco.txt that contains cisco\cisco-version.ros). 3. Copy this indirect file to the TFTP/SCP server’s main directory DHCP Server Configure the DHCP server with the following options • DHCPv4—Option 125 (indirect file name) Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 102
• Image Auto Update Via DHCP—Select this field to enable update of the firmware image from the DHCP server. This feature is enabled by default, but can be disabled here. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 103
If a link local address exists on the interface, this entry replaces the address in the configuration. Global—The IPv6 address is a global Unicast IPV6 type that is visible and reachable from other networks. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 104
Backup Indirect Image File Name—Enter the indirect image file name to be a file that holds the path to the image. used. This is An example of an indirect image file name is: indirect-cisco.scp. This file contains the path and name of the firmware image. The following fields are displayed: •...
To stack two or more devices, reconfigure the desired network ports as stack ports in the devices and connect the devices with the resulting stack ports in a ring or chain topology. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 106
The stack system supports two types of topologies: chain and ring. In ring topology, if one of the stack ports fails, the stack continues to function in chain topology (see Stack Topology). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IDs greater than 4, the LED display is changed in accordance to the below definition: • Units 1-4: LEDs 1-4 are lit, respectively. • Unit 5: LED 1 and 4 are lit. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
• Ring Topology—Each unit is connected to the neighboring unit. The last unit is connected to the first unit. The following shows a ring topology of an eight-unit stack: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
During topology discovery, each unit in a stack exchanges packets, which contain topology information. After the topology discovery process is completed, each unit contains the stack mapping information of all units in the stack. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
ID. Unit 1 does not join the stack and is shut down. It did not win the master selection process between the master-enabled units (1 or 2). Duplicate Unit Shut Down Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 111
Duplication Between Two Units With Auto Number Unit ID If a new stack has more than the maximum number of units, all extra units are shut NOTE down. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
• The stack changes between ring and chain formation. When units are added or removed to and from a stack, it triggers topology changes, master election process, and/or unit ID assignment. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 113
The best unit is the unit with the higher uptime in segments of 10 minutes. The other unit is made the backup. Auto-numbered Master-enabled Unit Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
1. The newer Unit 1 does not join the stack and is shutdown. User-assigned Master-enabled Unit Unit Failure in Stack This section includes the following topics: • Failure of Master Unit • Master/Backup Switchover • Slave Unit Handling Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 115
When STP is used and the ports are in link up, the STP port’s state is temporarily NOTE Blocking, and it cannot forward traffic or learn MAC addresses. This is to prevent spanning tree loops between active units. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Each unit in a stack automatically downloads firmware and bootcode from the master unit if the firmware and/or boot code that the unit and the master are running is different. The unit automatically reboots itself to run the new version. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
One unit is connected to more than two neighboring units. Physical Constraints for Stack LAGs The following factors constrain the use of stack LAGs: • A stack LAG must contain ports of the same speed. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 118
A SYSLOG message (informational level) is displayed when the cable type is not recognized. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The operational status of a standalone device or a stack is displayed in the Stack Operational Status block. • Stack Topology—Displays whether the topology of the stack is chain or ring. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 120
When you hover over a port a tool tip displays the stacking port number, unit that it is connected to (if there is one), the port speed and its connection status. See an example of this in the following. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 121
Unit x Stack Connection Speed—Displays the speed of the stack connection. Click Apply and Reboot. The parameters are copied to the Running Configuration STEP 3 file and the stack is rebooted. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Daylight Savings Time (DST). It covers the following topics: • System Time Configuration • SNTP Modes • System Time • SNTP Unicast • SNTP Multicast/Anycast • SNTP Authentication • Time Range • Recurring Time Range Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
After the time has been set by any of the above sources, it is not set again by the browser. SNTP is the recommended method for time setting. NOTE Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The device supports having all of the above modes active at the same time and selects the best system time received from an SNTP server, according to an algorithm based on the closest stratum (distance from the reference clock). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Manual Settings—Set the date and time manually. The local time is used when there is no alternate source of time, such as an SNTP server: Date—Enter the system date. Local Time—Enter the system time. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 126
DST: • From—Day and time that DST starts. • To—Day and time that DST ends. Recurring Selecting allows different customization of the start and stop of DST: STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Unicast clients with Unicast SNTP servers. • IPv4 Source Interface—Select the IPv4 interface whose IPv4 address will be used as the source IPv4 address in messages used for communication with the SNTP server. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 128
Source—How the SNTP server was defined, for example: manually or from DHCPv6 server. • Interface—Interface on which packets are received. To add a Unicast SNTP server, enable SNTP Client Unicast. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 129
• Authentication—Select the check box to enable authentication. • Authentication Key ID—If authentication is enabled, select the value of the key ID. (Create the authentication keys using the SNTP Authentication page.) Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Click Add to select the interface for SNTP reception/transmission. STEP 3 Select an interface and select the reception/transmission options. Click Apply to save the settings to the Running Configuration file. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The SNTP server must send this key for the device to synchronize to it. • Trusted Key—Select to enable the device to receive synchronization information only from a SNTP server by using this authentication key. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Click Administration > Time Settings > Recurring Range. STEP 1 The existing recurring time ranges are displayed (filtered per a specific, absolute time range.) Select the absolute time range to which to add the recurring range. STEP 2 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 134
Recurring Ending Time—Enter the date and time that the Time Range ends on a recurring basis. Click Apply STEP 5 Click Time Range to access the Absolute Time Range page. STEP 6 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The Bonjour Discovery Interface Control Table shows interfaces with IP addresses that are associated with the Bonjour feature. Any Bonjour advertisement can only be broadcast to interfaces listed in this table. If a service is Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Apply). LLDP and CDP LLDP (Link Layer Discovery Protocol) and CDP (Cisco Discovery Protocol) are link layer protocols for directly-connected LLDP and CDP-capable neighbors to advertise themselves and their capabilities. By default, the device sends an LLDP/ CDP advertisement periodically to all its interfaces and processes incoming LLDP and CDP packets as required by the protocols.
Page 137
VLAN-aware flooding, then CDP/LLDP-capable devices can hear each other only if they are in the same VLAN. A CDP/LLDP-capable device may receive advertisements from more than one device if the CDP/LLDP-incapable devices flood the CDP/LLDP packets. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The LLDP protocol has an extension called LLDP Media Endpoint Discovery (LLDP-MED) that provides and accepts information from media endpoint devices such as VoIP phones and video phones. For further information about LLDP-MED, LLDP MED Network Policy. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Filtering —Delete the packet. Flooding —Forward the packet to all VLAN members. • TLV Advertise Interval—Enter the rate in seconds at which LLDP advertisement updates are sent, or use the default. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
TLVs that are sent in the LLDP PDU. The LLDP-MED TLVs to be advertised can be selected in the LLDP MED Port Settings page, and the management address TLV of the device may be configured. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 141
System Description—Description of the network entity (in alpha- numeric format). This includes the system's name and versions of the hardware, operating system, and networking software supported by the device. The value equals the sysDescr object. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 142
PVID—Select to advertise the PVID in the TLV. • Port & Protocol VLAN ID—Select to advertise the port and protocol VLAN ID. These are defined in the Protocol-based VLANs page. • VLAN ID—Select which VLANs will be advertised. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
It is the administrator's responsibility to manually create the VLANs and their port memberships according to the network policies and their associated interfaces. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 144
Click Apply. The network policy is defined. STEP 6 You must manually configure the interfaces to include the desired NOTE manually-defined network policies for the outgoing LLDP packets using the LLDP MED Port Settings. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
SNMP managing system, when there is a topology change. • Selected Optional TLVs—Select the TLVs that can be published by the device by moving them from the Available Optional TLVs list to the Selected Optional TLVs list. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 146
LLDP and LLDP-MED TLVs received from the port. • LLDP Port Status Global Information • LLDP Port Status Global Information Chassis ID Subtype—Type of chassis ID (for example, MAC address). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
To view the LLDP local port status advertised on a port: Click Administration > Discovery - LLDP > LLDP Local Information. STEP 1 Select the interface for which LLDP local information is to be displayed. STEP 2 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 148
Interface Subtype—Numbering method used for defining the interface number. • Interface Number—Specific interface associated with this management address. MAC/PHY Details • Auto-Negotiation Supported—Port speed auto-negotiation support status. • Auto-Negotiation Enabled—Port speed auto-negotiation active status. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 149
Rx value. MED Details • Capabilities Supported—MED capabilities supported on the port. • Current Capabilities—MED capabilities enabled on the port. • Device Class—LLDP-MED endpoint device class. The possible device classes are: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 150
VLAN ID—VLAN ID for which the network policy is defined. • VLAN Type—VLAN type for which the network policy is defined. The possible field values are: Tagged —Indicates the network policy is defined for tagged VLANs. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
System Name—Published name of the device. • Time to Live—Time interval (in seconds) after which the information for this neighbor is deleted. Select a local port, and click Details. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 152
Address Subtype—Managed address subtype; for example, MAC or IPv4. • Address—Managed address. • Interface Subtype—Port subtype. • Interface Number—Port number. MAC/PHY Details • Auto-Negotiation Supported—Port speed auto-negotiation support status. The possible values are True and False. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 153
802.3 Energy Efficient Ethernet (EEE) • Remote Tx—Indicates the time (in micro seconds) that the transmitting link partner waits before it starts transmitting data after leaving Low Power Idle (LPI mode). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 154
Hardware Revision –Hardware version. • Firmware Revision—Firmware version. • Software Revision—Software version. • Serial Number—Device serial number. • Manufacturer Name—Device manufacturer name. • Model Name—Device model name. • Asset ID—Asset ID. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 155
Application Type—Network policy application type, for example, Voice. • VLAN ID—VLAN ID for which the network policy is defined. • VLAN Type—VLAN type, Tagged or Untagged, for which the network policy is defined. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
—Total number of received TLVs that were discarded. Unrecognized —Total number of received TLVs that were unrecognized. • Neighbor's Information Deletion Count—Number of neighbor ageouts on the interface. Click Refresh to view the latest statistics. STEP 2 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Status—If the LLDP MED capabilities packets were sent, or if they were overloaded. • LLDP MED Location Size (Bytes) —Total LLDP MED location packets byte size. Status —If the LLDP MED locations packets were sent, or if they were overloaded. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 158
• Total Total (Bytes)—Total number of bytes of LLDP information in each packet Available Bytes Left—Total number of available bytes left to send for additional LLDP information in each packet. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
• CDP Statistics CDP Properties Similar to LLDP, the Cisco Discovery Protocol (CDP) is a link layer protocol for directly-connected neighbors to advertise themselves and their capabilities to each other. Unlike LLDP, CDP is a Cisco proprietary protocol. CDP Configuration Workflow The followings is sample workflow for configuring CDP on the device.
Page 160
Serial Number—Use the serial number of the device as the device ID. Hostname—Use the host name of the device as the device ID. • Source Interface—IP address to be used in the TLV of the frames. The following options are possible: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 161
Click Administration > Discovery - CDP > Interface Settings. STEP 1 This page displays the following CDP information for each interface including the OOB port. • CDP Status—CDP publishing option for the port. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 162
Enter the relevant information, and click Apply. The port settings are written to the STEP 3 Running Configuration. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 163
Version—Information about the software release on which the device is running. • Platform TLV Platform—Identifier of platform advertised in the platform TLV. • Native VLAN TLV Native VLAN—The native VLAN identifier advertised in the native VLAN TLV. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 164
A Power Requested TLV is received with a Request-ID field which is different from the last-received set (or when the first value is received) The interface transitions to Down Available Power—Amount of power consumed by port. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 165
• Capabilities—Capabilities advertised by neighbor. • Platform—Information from Platform TLV of neighbor. • Neighbor Interface—Outgoing interface of the neighbor. Select a device, and click Details. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The CDP Statistics page displays information regarding CDP frames that were sent or received from a port. CDP packets are received from devices attached to the switches interfaces, and are used for the Smartport feature. See Configuring for more information. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 167
To clear all counters on all interfaces, click Clear All Interface Counters. To clear STEP 2 all counters on an interface, select it and click Clear Interface Counters. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
4. Configure the LACP parameters for the ports that are members or candidates of a dynamic LAG by using the LACP page. 5. Configure Green Ethernet and 802.3 Energy Efficient Ethernet by using the Properties page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Copper Ports—Regular, not Combo, support the following values: 10M, 100M, and 1000M (type: Copper). Combo Ports Copper—Combo port connected with copper CAT6a cable, supports the following values: 10M, 100M, and 1000M (type: ComboC). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 170
Administrative Port Speed—Select the speed of the port. The port type determines which the available speeds. You can designate Administrative Speed only when port auto-negotiation is disabled. • Operational Port Speed—Displays the current port speed that is the result of negotiation. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 171
Back Pressure—Select the Back Pressure mode on the port (used with Half Duplex mode) to slow down the packet reception speed when the device is congested. It disables the remote port, preventing it from sending packets by jamming the signal. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 172
Member in LAG—If the port is a member of a LAG, the LAG number appears; otherwise this field is left blank. Click Apply. The Port Settings are written to the Running Configuration file. STEP 6 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Loopback Detection—Select to enable error recovery mechanism for ports shut down by loopback detection. Storm Control—Select to enable error recovery mechanism for ports shut down by storm control. Click Apply to update the global setting. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
LBD packets. The following conditions must be true for a port to be LBD active: • LBD is globally enabled. • LBD is enabled on the port. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 175
STEP 1 page (below). Enable Loopback Detection on access ports in the Loopback Detection Settings STEP 2 page (below). Enable Auto-Recovery for Loopback Detection in the Error Recovery Settings STEP 3 page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
This section describes how to configure LAGs. It covers the following topics: • Link Aggregation Overview • Default Settings and Configuration • Static and Dynamic LAG Workflow • LAG Management • LAG Settings • LACP Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
By MAC Addresses—Based on the destination and source MAC addresses of all packets. • By IP and MAC Addresses—Based on the destination and source IP addresses for IP packets, and destination and source MAC addresses for non-IP packets. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Members list. Select the load balancing algorithm for the LAG. Perform these actions in the LAG Management page. 2. Configure various aspects of the LAG, such as speed and flow control by using LAG Settings page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The following fields are displayed for each LAG (only fields not on the Edit page are described): • Link State—Whether port is up or down. • Active Member—Active ports in the LAG. • Standby Member—Candidate ports for this LAG. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Operational Status—Displays whether the LAG is currently operating. • Link Status SNMP Traps—Select to enable generation of SNMP traps notifying of changes to the link status of the ports in the LAG. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 181
The possible values are those specified in the Administrative Advertisement field. • Administrative Flow Control—Set Flow Control to either Enable or Disable or enable the Auto-Negotiation of Flow Control on the LAG. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 182
Any link operating at a different speed from the highest-speed active member or operating at half-duplex is made standby. All the active ports in a dynamic LAG operate at the same baud rate. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 183
Click Port Management > Link Aggregation > LACP. STEP 1 Enter the LACP System Priority. STEP 2 Select a port, and click Edit. STEP 3 Enter the values for the following fields: STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
In this case, the status of the link is set to undetermined. The user can configure whether ports in the undetermined state are shut down or merely trigger notifications. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 185
UDLD is enabled on a port when one of the following occurs: • The port is a fiber port and UDLD is enabled globally. • The port is a copper port and you specifically enable UDLD on it. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 186
ULDL message to the neighbors informing them that the port is down. When the port is brought up, the UDLD state is changed to Detection. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 187
Usage Guidelines Cisco does not recommend enabling UDLD on ports that are connected to devices on which UDLD is not supported or disabled. Sending UDLD packets on a port connected to a device that does not support UDLD causes more traffic on the port without providing benefits.
Page 188
Default expiration time is 45 seconds (3 times the message time). • Default port UDLD state: Fiber interfaces are in the global UDLD state. Non-fiber interfaces are in the disable state. Before You Start No preliminary tasks are required. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 189
The UDLD feature can be configured for all fiber ports at one time (in the UDLD Global Settings page) or per port (in the UDLD Interface Settings page). UDLD Global Settings The Fiber Port UDLD Default State is only applicable to fiber ports. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 190
Information is displayed for all ports on which UDLD is enabled, or, if you have filtered only a certain group of ports, information is displayed for that group of ports. • Port—The port identifier. • UDLD State—The possible states are: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 191
Click Apply to save the settings to the Running Configuration file. STEP 4 UDLD Neighbors To view all devices connected to the local device, click Port Management > UDLD > UDLD Neighbors. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 192
Neighbor Expiration Time (Sec.)—Displays the time that must pass before the device attempts to determine the port UDLD status. This is three times the Message Time. • Neighbor Message Time (Sec.)—Displays the time between UDLD messages. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
(available on GE models only). EEE is enabled globally by default. On a given port, if EEE is enabled, short reach mode be disabled. If Short Reach Mode is enabled, EEE be grayed out. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
This section describes the 802.3az Energy Efficient Ethernet (EEE) feature. It covers the following topics: • 802.3az EEE Overview • Advertise Capabilities Negotiation • Link Level Discovery for 802.3az EEE • Availability of 802.3az EEE Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 195
Negotiation provides a linked device with the capability to detect the abilities (modes of operation) supported by the device at the other end of the link, determine common abilities, and configure itself for joint operation. Auto- Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 196
• If the port speed on the GE port is changed to 10Mbit, 802.3az EEE is disabled. This is supported in GE models only. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 197
To enable Green Ethernet and EEE and view power savings: Click Port Management > Green Ethernet > Properties. STEP 1 Enter the values for the following fields: STEP 2 • Energy Detect Mode—Disabled by default. Click the checkbox to enable. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 198
EEE settings are only displayed for devices that have GE ports. EEE works only when ports are set to Auto negotiation. The exception is that EEE is still functional even when Auto Negotiation is disabled, but the port is at 1GB or higher. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 199
(advertisement of EEE capabilities through LLDP) if there are GE ports on the device. Click Apply. The Green Ethernet port settings are written to the Running STEP 5 Configuration file. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
How the Smartport Feature Works • Auto Smartport • Error Handling • Default Configuration • Relationships with Other Features • Common Smartport Tasks • Configuring Smartport Using The Web-based Interface • Built-in Smartport Macros Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The network access and QoS requirements vary if the interface is connected to an IP phone, a printer, or a router and/or Access Point (AP). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
CDP capabilities, LLDP system capabilities, and/or LLDP-MED capabilities. The following describes the relationship of Smartport types and Auto Smartport Smartport Type Supported by Auto Supported by Auto Smartport Smartport by default Unknown Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Auto Smartport Persistent, then its Smartport type is re-initialized to Default in the following cases: A link down/up operation is performed on the interface. The device is restarted. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Built-In—These are macros provided by the system. One macro applies the configuration profile and the other removes it. The macro names of the built- in Smartport macros and the Smartport type they are associated with as follows macro-name (for example: printer) Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
A Smartport macro might fail if there is a conflict between the existing configuration of the interface and a Smartport macro. When a Smartport macro fails, a SYSLOG message containing the following parameters is sent: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
When a device is detected from an interface, the Smartport macro, if any, that corresponds to the Smartport type of the attaching device is automatically applied. Auto Smartport is enabled by default globally, and at the interface level. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
In addition to enabling Auto Smartport globally, you must enable Auto Smartport at NOTE the desired interface as well. By default, Auto Smartport is enabled at all the interfaces. Voice VLAN for more information on enabling Auto Voice VLAN Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
If only the IP Phone and Host bits are set, then the Smartport type is NOTE ip_phone_desktop. Multiple Devices Attached to the Port The device derives the Smartport type of a connected device via the capabilities the device advertises in its CDP and/or LLDP packets. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The persistence of the Smartport types applied to the interfaces are effective NOTE between reboots only if the running configuration with the Smartport type applied at the interfaces is saved to the startup configuration file. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Select whether the device is to process CDP and/or LLDP advertisements from STEP 2 connected devices. Select which type of devices are to be detected in the Auto Smartport Device STEP 3 Detection field. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 212
Restore the parameter defaults to the factory settings. • Bind a user-defined macro pair (a macro and its corresponding anti-macro) to a Smartport type. 1. Open the Type Settings page. 2. Select the Smartport Type. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
CDP if Auto Smartport is to detect the Smartport type based on CDP advertisement. • Operational LLDP Status—Displays the operational status of LLDP. Enable LLDP if Auto Smartport is to detect the Smartport type based on LLDP/ LLDP-MED advertisement. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 215
Smartport type and click Edit. Enter the fields. STEP 4 • Port Type—Select a Smartport type. • Macro Name—Displays the name of the Smartport macro currently associated with the Smartport type. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 216
Statically apply a specific Smartport type to an interface with interface- specific values for the macro parameters. • Enable Auto Smartport on an interface. • Diagnose a Smartport macro that failed upon application, and caused the Smartport type to become Unknown. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 217
(it must be UP) and click Reapply to reapply the last macro that was applied to the interface. The Reapply action also adds the interface to all newly-created VLANs. Smartport Diagnostic. STEP 2 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 218
Persistent is applicable only if the Smartport Application of the interface is Auto Smartport. Enabling Persistent at an interface eliminates the device detection delay that otherwise occurs. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 222
[server] #macro description server #macro keywords $native_vlan $max_hosts Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 223
[host] #macro description host #macro keywords $native_vlan $max_hosts #macro key description: $native_vlan: The untag VLAN which will be configured on the port Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 224
[ip_camera] #macro description ip_camera #macro keywords $native_vlan #macro key description: $native_vlan: The untag VLAN which will be configured on the port Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 225
$native_vlan: The untag VLAN which will be configured on the port $voice_vlan: The voice VLAN ID $max_hosts: The maximum number of allowed devices on the port #Default Values are #$native_vlan = Default VLAN Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 228
#macro description router #macro keywords $native_vlan $voice_vlan #macro key description: $native_vlan: The untag VLAN which will be configured on the port $voice_vlan: The voice VLAN ID #Default Values are #$native_vlan = Default VLAN Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 229
[ap] #macro description ap #macro keywords $native_vlan $voice_vlan #macro key description: $native_vlan: The untag VLAN which will be configured on the port Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
VLAN if all packets destined for that port into the VLAN have a VLAN tag. A port can be a member of only one untagged VLAN but can be a member of multiple tagged VLANs. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 231
VLANs can communicate with each other only through Layer 3 routers. An IP router, for example, is required to route IP traffic between VLANs if each VLAN represents an IP subnet. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 232
An additional benefit of QinQ is that there is no need to configure customers' edge devices. QinQ is enabled in the Interface Settings page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Figure 1 Figure 2 for samples of how these VLANs are used. Host traffic is sent on isolated and community VLANs, while server and router traffic is sent on the primary VLAN. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 234
VLANs in the private VLAN. Inter-switch trunk ports send and receive tagged traffic of the private VLAN’s various VLANs (primary, isolated and the communities). The switch supports 16 primary VLANs and 256 secondary VLANs. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The following describes traffic flow from hosts to servers/routers or other hosts. Figure 1 Traffic from Hosts to Servers/Routers Server Promiscous Promiscous Isolated vlan Community Vlan Isolated Isolated Community Community Community Isolated 1 Isolated 2 Community 1 Community 1 Community 1 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 236
The following describes server/router traffic (reply to host). Figure 2 Server/Router Traffic to Hosts Server Promiscous Promiscous Primary VLAN Isolated Isolated Community Community Community Isolated 1 Isolated 2 Community 1 Community 1 Community 1 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 237
IP connectivity. IP connectivity requires traffic to pass on a primary VLAN. Features Not Supported on Private VLAN Port Modes The following features are not supported on private VLAN port modes: • GVRP Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 238
MSTP—All VLANs in a private VLAN must be assigned to the same MSTP instance. • IP Source Guard—Binding an ACL on IP source guard ports with private VLAN is not recommended due to the amount of TCAM resources needed. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
5. If required, configure VLAN groups as described in the MAC-based Groups Protocol-based VLANs sections. 6. If required, configure TV VLAN as described in the Access Port Multicast TV VLAN Customer Port Multicast TV VLAN sections. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 240
Information is displayed for all defined VLANs. The fields are defined below under the Add page. The following field is not on the Add page. • Originators—How the VLAN was created Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 241
Select an interface type (Port or LAG), and click Go. Ports or LAGs and their VLAN STEP 2 parameters are displayed. To configure a Port or LAG, select it and click Edit. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 242
Admit All—The interface accepts all types of frames: untagged frames, tagged frames, and priority tagged frames. Admit Tagged Only—The interface accepts only tagged frames. Admit Untagged Only—The interface accepts only untagged and priority frames. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 243
PVID on the ports between the two devices must be the same if the ports are to send and receive untagged packets to and from the VLAN. Otherwise, traffic might leak from one VLAN to another. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 244
MTV VLAN—The interface used for Digital TV using Multicast IP. The port joins the VLAN with a VLAN tag of Multicast TV VLAN. See Access Port Multicast TV VLAN for more information. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 245
Administrative VLANs—Drop-down list that displays all VLANs of which the interface might be a member. • Operational VLANs—Drop-down list that displays all VLANs of which the interface is currently a member. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 246
VLAN, enabling this option on the port makes the port part of internal VLAN 4095 (a reserved VID) General PVID—When the port is in General mode, it will be a member of these VLANs. • Customer Mode Membership Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
VLANs are used to allow Layer 2 connectivity from community ports to promiscuous ports and to community ports of the same community. Click Apply. The settings are modified and written to the Running Configuration STEP 4 file. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
• Interface—Select the interface (Port or LAG) to be edited. • GVRP State—Select to enable GVRP on this interface. • Dynamic VLAN Creation—Select to enable Dynamic VLAN Creation on this interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
MAC-based VLAN classification enable packets to be classified according to their source MAC address. You can then define MAC-to-VLAN mapping per interface. You can define several MAC-based VLAN groups, which each group containing different MAC addresses. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 250
Group ID—Enter a user-created VLAN group ID number. Click Apply. The MAC address is assigned to a VLAN group. STEP 4 MAC-Based Groups to VLAN Table 1 for a description of the availability of this feature. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 251
2. For each required interface, assign the protocol group to a VLAN (using Protocol-Based Groups to VLAN Mapping page). The interfaces must be in General mode and cannot have a Dynamic VLAN (DVA) assigned to it. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 252
Several groups can be bound to a single port, with each port being associated to its own VLAN. It is possible to map several groups to a single VLAN as well. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Voice VLAN Overview • Voice VLAN Configuration • Telephony OUI Voice VLAN Overview This section covers the following topics: • Dynamic Voice VLAN Modes • Auto Voice VLAN, Auto Smartports, CDP, and LLDP Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 254
The following are typical voice deployment scenarios with appropriate configurations: • UC3xx/UC5xx hosted: All Cisco phones and VoIP endpoints support this deployment model. For this model, the UC3xx/UC5xx, Cisco phones and VoIP endpoints reside in the same voice VLAN. The voice VLAN of UC3xx/ UC5xx defaults to VLAN 100.
Page 255
VLAN, manually configured, or learned from external devices such as UC3xx/5xx and from switches that advertise voice VLAN in CDP or VSDP. VSDP is a Cisco defined protocol for voice service discovery. Unlike Telephony OUI mode that detects voice devices based on telephony OUI, Auto Voice VLAN mode depends on Auto Smartport to dynamically add the ports to the voice VLAN.
Page 256
Voice VLAN Voice End-Points To have a voice VLAN work properly, the voice devices, such as Cisco phones and VoIP endpoints, must be assigned to the voice VLAN where it sends and receives its voice traffic. Some of the possible scenarios are as follows: •...
Page 257
Communication (UC) devices, are advertising their voice VLAN, the voice VLAN from the device with the lowest MAC address is used. If connecting the device to a Cisco UC device, you may need to NOTE configure the port on the UC device using the switchport voice vlan command to ensure the UC device advertises its voice VLAN in CDP at the port.
Page 258
802.1p values and using the remarking option under Telephony OUI. Voice VLAN Constraints The following constraints exist: • Only one Voice VLAN is supported. • A VLAN that is defined as a Voice VLAN cannot be removed Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 259
If the device is currently in Telephony OUI mode, you must disable it NOTE before you can configure Auto Voice Vlan Click Apply. STEP 5 Configure Smartports as described in the Common Smartport Tasks section. STEP 6 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
View how voice VLAN is currently configured. • Configure the VLAN ID of the Voice VLAN. • Configure voice VLAN QoS settings. • Configure the voice VLAN mode (Telephony OUI or Auto Voice VLAN). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 261
Dynamic Voice VLAN—Select this field to disable or enable voice VLAN feature in one of the following ways: Enable Auto Voice VLAN —Enable Dynamic Voice VLAN in Auto Voice VLAN mode. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 262
The Operation Status block on this page shows the information about the current voice VLAN and its source: • Auto Voice VLAN Status—Displays whether Auto Voice VLAN is enabled. • Voice VLAN ID—The identifier of the current voice VLAN Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 263
Static—User-defined voice VLAN configuration defined on the device. CDP—UC that advertised voice VLAN configuration is running CDP. LLDP—UC that advertised voice VLAN configuration is running LLDP. Voice VLAN ID—The identifier of the advertised or configured voice VLAN Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 264
Auto Membership Aging time can be configured. If the specified time period passes with no telephony activity, the port is removed from the Voice VLAN. Use the Telephony OUI page to view existing OUIs, and add new OUIs. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 265
Enter the values for the following fields: STEP 5 • Telephony OUI—Enter a new OUI. • Description—Enter an OUI name. Click Apply. The OUI is added to the Telephony OUI Table. STEP 6 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 266
All—QoS attributes are applied on all packets that are classified to the Voice VLAN. Telephony Source MAC Address—QoS attributes are applied only on packets from IP phones. Click Apply. The OUI is added. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
(see Interface Settings). The Multicast TV VLAN configuration is defined per port. Customer ports are configured to be member of Multicast TV VLANs using the Customer Port Multicast TV VLAN pages. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 268
VLAN. data VLAN. Group registration All Multicast group Groups must be associated registration is dynamic. to Multicast VLAN statically, but actual registration of station is dynamic. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 269
Click Add to associate a Multicast group to a VLAN. Any VLAN can be selected. STEP 2 When a VLAN is selected, it becomes a Multicast TV VLAN. Click Apply. Multicast TV VLAN settings are modified, and written to the Running STEP 3 Configuration file. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Packets from subscribers to the service provider network are forwarded as VLAN tagged frames, in order to distinguish between the service types, which mean that for each service type there is a unique VLAN ID in the CPE box. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 271
VLAN. CPE (internal) Multicast VLANs must be mapped to the Multicast provider (external) VLANs. After a CPE VLAN is mapped to a Multicast VLAN, it can participate in IGMP snooping. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 272
The Candidate Customer Ports list contains all access ports configured on the STEP 4 device. Move the required ports to the Member Customer Ports field. Click Apply. The new settings are modified, and written to the Running Configuration file. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Broadcast/Multicast storms and reduced network efficiency. STP provides a tree topology for any arrangement of switches and interconnecting links, by creating a unique path between end stations on a network, and thereby eliminating loops. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Click Spanning Tree > STP Status & Global Settings. STEP 1 Enter the parameters. STEP 2 Global Settings: • Spanning Tree State—Select to enable on the device. • STP Loopback Guard—Select to enable Loopback Guard on the device. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 275
Root Bridge. • Root Port—The port that offers the lowest cost path from this bridge to the Root Bridge. (This is significant when the bridge is not the root.) Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Fast Link optimizes the STP protocol convergence. The options are: Enable—Enables Fast Link immediately. Auto—Enables Fast Link a few seconds after the interface becomes active. This allows STP to resolve loops before enabling Fast Link. Disable—Disables Fast Link. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 277
Port Role—Displays the port or LAG role, per port or LAG per instance, assigned by the MSTP algorithm to provide STP paths: Root—Forwarding packets through this interface provides the lowest cost path for forwarding packets to the root device. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 278
MAC addresses. • Designated Bridge ID—Displays the bridge priority and the MAC address of the designated bridge. • Designated Port ID—Displays the priority and interface of the selected port. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
STP link, the device continues to communicate with it by using STP. Otherwise, if it has been migrated to RSTP or MSTP, the device communicates with it using RSTP or MSTP, respectively. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 280
Mode—Displays the current Spanning Tree mode: Classic STP or RSTP. • Fast Link Operational Status—Displays whether the Fast Link (Edge Port) is enabled, disabled, or automatic for the interface. The values are: Enabled —Fast Link is enabled. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
VLANs to a MSTP Instance section. Decide which MSTP instance be active in what VLAN, and associate these MSTP STEP 3 instances to VLAN(s) accordingly. Configure the MSTP attributes by: STEP 4 • MSTP Properties Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
STEP 4 • Region Name—Define an MSTP region name. • Revision—Define an unsigned 16-bit number that identifies the revision of the current MST configuration. The field range is from 0 to 65535. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
To add a VLAN to an MSTP instance, select the MST instance, and click Edit. STEP 2 Enter the parameters: STEP 3 • MSTP Instance ID—Select the MST instance. • VLANs—Define the VLANs being mapped to this MST instance. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
• Remaining Hops—Displays the number of hops remaining to the next destination. Click Apply. The MST Instance configuration is defined, and the Running STEP 3 Configuration file is updated. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Listening—The port on this instance is in Listening mode. The port cannot forward traffic, and cannot learn MAC addresses. Learning—The port on this instance is in Learning mode. The port cannot forward traffic, but it can learn new MAC addresses. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 286
RSTP or STP mode. Internal—The port is an internal port. • Designated Bridge ID—Displays the ID number of the bridge that connects the link or shared LAN to the root. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 287
Remain Hops—Displays the hops remaining to the next destination. • Forward Transitions—Displays the number of times the port has changed from the Forwarding state to the Blocking state. Click Apply. The Running Configuration file is updated. STEP 6 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
MAC address that is not found in the tables, they are transmitted/broadcasted to all the ports on the relevant VLAN. Such frames are referred to as unknown Unicast frames. The device supports a maximum of 8K static and dynamic MAC addresses. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Delete on timeout—The MAC address is deleted when aging occurs. Secure—The MAC address is secure when the interface is in classic locked mode (see Port Security). Click Apply. A new entry appears in the table. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
MAC Address—Enter the MAC address for which the table is queried. • Interface—Select the interface for which the table is queried. The query can search for specific unit/slot, ports, or LAGs. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Action—Select one of the following actions to be taken upon receiving a packet that matches the selected criteria: Bridge —Forward the packet to all VLAN members. Discard —Delete the packet. Click Apply. A new MAC address is reserved. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The data is sent only to relevant ports. Forwarding the data only to the relevant ports conserves bandwidth and host resources on links. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 293
(*.G), which is just the group ID. The device supports a maximum of 256 static and dynamic Multicast group addresses. Only one of filtering options can be configured per VLAN. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
When a device learns that a host is using IGMP/MLD messages to register to receive a Multicast stream, optionally from a specific source, the device adds the registration to the MFDB. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IGMP traffic (queries) detected from a Multicast router. In the presence of other IGMP Queriers, the device might (or might not) stop sending queries, based on the results of the standard querier selection process. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
For IPv6, this is mapped by taking the 32 low-order bits of the Multicast address, and adding the prefix of 33:33. For example, the IPv6 Multicast address FF00:1122:3344 is mapped to Layer 2 Multicast 33:33:11:22:33:44. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 297
• A proxy device drops Multicast packets received on a downstream interface if it is not the querier on the interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The MAC Group Address page has the following functions: • Query and view information from the Multicast Forwarding Data Base (MFDB), relating to a specific VLAN ID or a specific MAC address group. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 299
• VLAN ID—The VLAN ID of the Multicast group. • MAC Group Address—The MAC address of the group. Select either port or LAG from the Filter: Interface Type menu. STEP 7 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IP Version equals to—Select IPv6 or IPv4. • IP Multicast Group Address equals to—Define the IP address of the Multicast group to be displayed. This is only relevant when the Forwarding mode is (S,G). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 301
Forbidden—Specifies that this port is forbidden from joining this group on this VLAN. • None—Indicates that the port is not currently a member of this Multicast group on this VLAN. This is selected by default until Static or Forbidden is selected. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
(Administrative) and whether it is actually running on the VLAN (Operational). • IGMP Querier Status—Displays whether IGMP Querier was enabled (Administrative) and whether it is actually running on the VLAN (Operational). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 303
The IGMP Snooping Querier resumes sending General Query messages if it does hear another querier for a Query Passive interval that equals: Robustness * (Query Interval) + 0.5 * Query Response Interval. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Response Code inserted into the periodic General Queries. • Last Member Query Interval (msec)—Maximum Response Delay to be used if the device cannot read Max Response Time value from group- specific queries sent by the elected querier. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 305
• Last Member Query Interval (msec)—Enter the Maximum Response Delay to be used if the device cannot read Max Response Time value from group- specific queries sent by the elected querier. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
SSM range. These access lists are defined in Access Lists. Click Apply. The Running Configuration file is updated. STEP 3 To add protection to a VLAN, click Add and enter the following fields: STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 307
Uptime—Length of time in hours, minutes, and seconds that the entry has been in the IP Multicast routing table. • Expiry Time—Length of time in hours, minutes, and seconds until the entry is removed from the IP Multicast routing table. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Enable or disable the following features: STEP 2 • MLD Snooping Status—Select to enable MLD snooping globally on all interfaces. • MLD Querier Status—Select to enable MLD querier globally on all interfaces. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 309
The MLD Snooping Querier resumes sending General Query messages if it does hear another querier for a Query Passive interval that equals: Robustness * (Query Interval) + 0.5 * Query Response Interval. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 310
• Multicast TTL Threshold—Enter the Time-to-Live (TTL) threshold of packets being forwarded on an interface. Multicast packets with a TTL value less than the threshold are not forwarded on the interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 311
• Multicast TTL Threshold—Enter the Time-to-Live (TTL) threshold of packets being forwarded on an interface. Multicast packets with a TTL value less than the threshold are not forwarded on the interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
To add protection to a VLAN, click Add and enter the following fields: STEP 4 • Upstream Interface—Select the outgoing interface. • Downstream Interface—Select the incoming interface. • Downstream Protection—Select one of the following options: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 313
Uptime—Length of time in hours, minutes, and seconds that the entry has been in the IP Multicast routing table. • Expiry Time—Length of time in hours, minutes, and seconds until the entry is removed from the IP Multicast routing table. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Included Ports—The list of destination ports for the Multicast stream. • Excluded Ports—The list of ports not included in the group. • Compatibility Mode—The oldest IGMP/MLD version of registration from the hosts the device receives on the IP group address. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Mrouter is not learned on this port (i.e. MRouter Ports Auto-Learn is not enabled on this port). • None—The port is not currently a Multicast router port. Click Apply to update the device. STEP 5 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Forbidden—Ports cannot receive any Multicast streams, even if IGMP/MLD snooping designated the port to join a Multicast group. • None—The port is not currently a Forward All port. Click Apply. The Running Configuration file is updated. STEP 5 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Forwarding—Enables forwarding of unregistered Multicast frames to the selected interface. Filtering—Enables filtering (rejecting) of unregistered Multicast frames to the selected interface. Click Apply. The settings are saved, and the Running Configuration file is updated. STEP 5 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IP address collisions occur when the same IP address is used in the same IP subnet by more than one device. Address collisions require administrative actions on the DHCP server and/or the devices that collide with the device. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
A loopback interface does not support bridging; it cannot be a member of any VLAN, and no layer 2 protocol can be enabled on it. The IPv6 link-local interface identifier is 1. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
DHCP Server IPv4 Interface The IPv4 Interface page is used to configure IP addresses for device management. This IP address can be configured on a port, a LAG, VLAN or loopback interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 321
Valid—The IP address collision check was completed, and no IP address collision was detected. Valid-Duplicated—The IP address duplication check was completed, and a duplicate IP address was detected. Duplicated—A duplicated IP address was detected for the default IP address. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 322
When the system is in one of the stacking modes with a Backup Master present, CAUTION Cisco recommends configuring the IP address as a static address to prevent disconnecting from the network during a Stacking Master switchover. This is because when the backup master takes control of the stack, when using DHCP, it might receive a different IP address than the one that was received by the stack’s...
This is not relevant for static routes. • Outgoing Interface—Outgoing interface for this route. Click Add. STEP 2 Enter values for the following fields: STEP 3 • Destination IP Prefix—Enter the destination IP address prefix. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 324
Metric—Enter the administrative distance to the next hop. The range is 1– 255. Click Apply. The IP Static route is saved to the Running Configuration file. STEP 4 RIPv2 IP Configuration: RIPv2. Access Lists Access Lists VRRP IP Configuration: VRRP Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 325
IP device resides. • IP Address—The IP address of the IP device. • MAC Address—The MAC address of the IP device. • Status—Whether the entry was manually entered or dynamically learned. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Select ARP Proxy to enable the device to respond to ARP requests for remotely- STEP 2 located nodes with the device MAC address. Click Apply. The ARP proxy is enabled, and the Running Configuration file is STEP 3 updated. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 327
Click Apply. The UDP relay settings are written to the Running Configuration file. STEP 6 DHCPv4 Snooping/Relay This section covers the following topics: • Overview • Properties • Interface Settings • DHCP Snooping Trusted Interfaces • DHCP Snooping Binding Database Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 328
No need to enable Option 82 insertion. Option 82 Option 82 (DHCP Relay Agent Information Option) passes port and agent information to a central DHCP server, indicating where an assigned IP address physically connects to the network. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 329
Snooping is not enabled and DHCP Relay is enabled. DHCP Relay DHCP Relay VLAN with IP Address VLAN without IP Address Packet arrives Packet arrives Packet arrives Packet arrives without Option with Option without with Option Option 82 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 330
Option sent with the Option 82 discards the Disabled original packet Bridge – no Option 82 Option 82 is Bridge – Packet is sent inserted with the original Option 82 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 331
Snooping is disabled: DHCP Relay DHCP Relay VLAN with IP Address VLAN without IP Address Packet arrives Packet arrives Packet arrives Packet arrives without with Option without with Option Option 82 Option 82 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 332
Option 82 Option 82 Bridge – Packet is sent Bridge – Bridge – Packet is sent Packet is sent without with the Option 82 with the Option 82 Option 82 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 333
DHCP packets entering the device through trusted ports. The DHCP Snooping Binding database contains the following data: input port, input VLAN, MAC address of the client and IP address of the client if it exists. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 334
DHCPNAK to deny the address request. Device snoops packet. If an entry exists in the DHCP Snooping Binding table that STEP 5 matches the packet, the device replaces it with IP-MAC binding on receipt of DHCPACK. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 335
Otherwise the packet is forwarded to trusted interfaces only, and the entry is removed from database. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 336
To configure DHCP Relay and DHCP Snooping: Enable DHCP Snooping and/or DHCP Relay in the Properties page. STEP 1 Define the interfaces on which DHCP Snooping is enabled in the Interface STEP 2 Settings page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 337
Interface Settings DHCP Relay and Snooping can be enabled on any interface with an IP address and on VLANs with or without an IP address. To enable DHCP Snooping/Relay on specific interfaces: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 338
If a port is down, the entries for that port are not deleted. • When DHCP Snooping is disabled for a VLAN, the binding entries that were collected for that VLAN are removed. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 339
MAC Address—MAC address of packet. • IP Address—IP address of packet. • Interface—Unit/Slot/Interface on which packet is expected. • Type—The possible field values are: Dynamic —Entry has limited lease time. Static— Entry was statically configured. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
(that can be infinite). If the DHCP client does not renew the allocated IP Address, the IP address is revoked at the end of this period, and the client must request another IP address. This is done in the Network Pool page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 341
IP address from the configured pool. Do this in the IPv4 Interface page. View the allocated IP addresses using the Address Binding page. IP addresses STEP 7 can be deleted in this page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 342
If the message arrived via DHCP relay, the address used belongs to the IP subnet specified by minimum IP address and IP mask of the pool and the pool is a remote pool. Up to eight network pools can be defined. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 343
Minutes—The number of minutes in the lease. A days value and an hours value must be added before a minutes value can be added. • Default Router IP Address (Option 3)— Enter the default router for the DHCP client. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 344
File Server Host Name (sname/Option 66)—Enter the name of the TFTP/SCP server. • Configuration File Name (file/Option 67)—Enter the name of the file that is used as a configuration file. Click Apply. The Running Configuration file is updated. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 345
Host Name—Enter the host name, which can be a string of symbols and an integer. • Mask—Enter the static host’s network mask. Network Mask—Check and enter the static host’s network mask. Prefix Length—Check and enter the number of bits that comprise the address prefix. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 346
(if already configured) or select Other and enter the IP address of the time server for the DHCP client. • File Server IP Address (siaddr)—Enter the IP address of the TFTP/SCP server from which the configuration file is downloaded. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 347
DHCP option. A hex value can be provided in place of any other type of value. For instance, you can provide a hex value of an IP address instead of the IP address itself. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 348
MAC Address or in hexadecimal notation, e.g., 01b60819681172. • Lease Expiration—The lease expiration date and time of the host’s IP address or Infinite is such was the lease duration defined. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
This section covers the following topics: • Overview • IPv6 Global Configuration • IPv6 Interfaces • IPv6 Tunnel • IPv6 Addresses • IPv6 Router Configuration • IPv6 Default Router List • IPv6 Neighbors Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 350
(essentially) unchanged L3 packet received, with the next-hop device’s MAC address as the destination MAC address. The system uses Static Routing and Neighbor Discovery messages (similar to IPv4 ARP messages) to build the appropriate forwarding tables and next-hop addresses. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Each time a packet is forwarded to another router, the hop limit is reduced. When the hop limit becomes zero, the packet is discarded. This prevents packets from being transferred endlessly. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 352
This can be a previously-defined tunnel or other interface. Click Apply to configure default zone. STEP 3 Click Add to add a new interface on which interface IPv6 is enabled. STEP 4 Enter the field: STEP 5 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 353
Entering 1 in this field indicates a single transmission without follow-up transmissions. • Send ICMPv6 Messages—Enable generating unreachable destination messages. • MLD Version—IPv6 MLD version. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 354
Stateless Service—Is the client defined as stateless (receives configuration information from a DHCP server) or not. • DHCP Server Address—Address of DHCPv6 server. • DHCP Server DUID—Unique identifier of the DHCPv6 server. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
When configuring an ISATAP tunnel, the destination IPv4 address is provided by the router. Note the following: • An IPv6 link local address is assigned to the ISATAP interface. The initial IP address is assigned to the interface, which is then activated. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 356
6to4 is an automatic tunneling mechanism that uses the underlying IPv4 network as a non-Broadcast multiple-access link layer for IPv6. Only one 6to4 tunnel is supported on a device. The 6to4 tunnel is supported only when IPv6 Forwarding is supported. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 357
Interfaces page) in the IPv6 Tunnel Table and click Add. Enter the following fields: STEP 5 • Tunnel Name—Select a tunnel number. • Tunnel Type—Select a tunnel type: Manual, ISATAP and 6 to 4. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 358
ISATAP Router Name— (For ISATAP tunnels only) Select one of the following options to configure a global string that represents a specific automatic tunnel router domain name. Use Default—This is always ISATAP. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
If a link local address exists on the interface, this entry replaces the address in the configuration. Global—An IPv6 address that is a global Unicast IPV6 type that is visible and reachable from other networks. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 360
Click Apply. The Running Configuration file is updated. STEP 5 IPv6 Router Configuration The following sections describe how to configure IPv6 routers. It covers the following topics: • Router Advertisement • IPv6 Prefixes Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 361
If the Managed Address Configuration flag is set, an attached host can NOTE use stateful auto configuration to obtain the other (non address) information regardless of the setting of this flag. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 362
If required, enable the Filter field and click Go. The group of interfaces matching STEP 2 the filter are displayed. To add an interface, click Add. STEP 3 Select the required IPv6 Interface on which a prefix is to be added. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 363
An onlink prefix is inserted into the routing table as a connected prefix (L-bit set). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Default Router IPv6 Address—Link local IP address of the default router. • Type—The default router configuration that includes the following options: Static—The default router was manually added to this table through the Add button. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
This page displays the neighbors that were automatically detected or manually configured entries. Each entry displays to which interface the neighbor is connected, the neighbor’s IPv6 and MAC addresses, the entry type (static or dynamic), and the state of the neighbor. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 366
Router—Specifies whether the neighbor is a router (Yes or No). To add a neighbor to the table, click Add. STEP 2 Enter values for the following fields: STEP 3 • Interface—The neighboring IPv6 interface to be added. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 367
Lower Than arguments are entered, the range is between the values used for Greater Than and Greater Than. To create a prefix list: Click IP Configuration > IPv6 Management Interfaces > IPv6 Prefix List. STEP 1 Click Add. STEP 2 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 368
No Limit—No maximum prefix length to be used for matching. User Defined—Maximum prefix length to be matched. • Description—Enter a description of the prefix list. Click Apply to save the configuration to the Running Configuration file. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IPv6 routers by using ICMP redirect messages. This could happen when the default router the device uses is not the router for traffic to which the IPv6 subnets that the device wants to communicate. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
—The destination is an indirectly-attached (remote) IPv6 subnet address. The entry was obtained dynamically via the ND or ICMP protocol. Static —The entry was manually configured by a user. DHCPv6 Relay This section covers the following topics: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 371
The address type can be Link Local, Global or Multicast (All_DHCP_Relay_Agents_and_Servers). • DHCPv6 Server IP Address—Enter the address of the DHCPv6 server to which packets are forwarded. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Click Apply. The Running Configuration file is updated. STEP 3 Domain Name System The Domain Name System (DNS) translates domain names into IP addresses for the purpose of locating and addressing hosts. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
DNS server does not exist. • Polling Timeout—Enter the number of seconds that the device will wait for a response to a DNS query. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 374
Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
This cache can contain the following type of entries: • Static Entries—These are mapping pairs that were manually added to the cache. There can be up to 64 static entries. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 376
TTL (Sec)— If this is a dynamic entry, how long will it remain in the cache. • Remaining TTL (Sec)— If this is a dynamic entry, how much longer will it remain in the cache. To add a host mapping, click Add. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 377
• IP Address—Enter a single address or up to eight associated IP addresses (IPv4 or IPv6). Click Apply. The settings are saved to the Running Configuration file. STEP 5 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The device supports RIP version 2, which is based on the following standards: • RFC2453 RIP Version 2, November 1998 • RFC2082 RIP-2 MD5 Authentication, January 1997 • RFC1724 RIP Version 2 MIB Extension Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
In this way, the relative cost of the interfaces can be adjusted as desired. It is your responsibility to set the offset for each interface (1 by default). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
In this case, the router is passive, and only receives the updated RIP information on this interface. By default, transmission of routing updates on an IP interface is enabled. RIPv2 Settings for more information. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 381
These feature are disabled by default and can be enabled globally. If these features are enabled, rejected routes are advertised by routes with a metric of 16. The route configurations can be propagated using one of the following options: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 382
Static route configuration and connected interfaces must be taken into account when using RIP. This is shown in the following, which illustrates a network where some routers support RIP and others do not. A Network with RIP and non-RIP Routers Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 383
MD5 digest. RIP Statistical Counters You can monitor the RIP operation by checking statistical counters per IP interface. Displaying RIPv2 Statistic Counters for a description of these counters. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IP address list on the IP interface (see Access Lists). Advertise default route entries on the IP interface, using the RIPv2 Settings page. Enable RIP authentication on an IP Interface, using the RIPv2 Settings page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 385
If the metric value of a static route is greater than 15, the static route is not advertised to other routers using RIP. • User Defined Metric—Enter the value of the metric. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 386
IP interface. If this field is not enabled, RIP updates are not sent (passive). • Offset—Specifies the metric number of the specified IP interface. This reflects the additional cost of using this interface, based on the speed of the interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 387
• Key Chain—If MD5 was selected as the authentication mode, enter the key chain to be digested. This key chain is created as described in the Management section. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 388
0 or greater than 16 • Update Sent—Specifies the number of packets sent by RIP on the IP interface. To clear all interface counters, click Clear All Interface Counters. STEP 2 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
To create access lists, do the following: 1. Create an access list with a single IP address, using the Access Lists pages. 2. Add additional IP addresses if required, using the Source IPv4 Access List page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 390
Click IP Configuration > > IPv4 Management and Interfaces > Access List > STEP 1 Source IPv4 Address List. To modify the parameters of an access list, click Add and modify any of the STEP 2 following fields: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 391
Action—Action for the access list. The following options are available: Permit—Permit entry of packets from the IP address(es) in the access list. Deny—Reject entry of packets from the IP address(es) in the access list. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
VRRP also enables load sharing of traffic. Traffic can be shared equitably among available routers by configuring VRRP in such a way that traffic to and from LAN clients are shared by multiple routers. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Router B and C function as a virtual router backups. If the virtual router master fails, the router configured with the higher priority becomes the virtual router master and provides service to the LAN hosts with minimal interruption. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 394
1 through 4 and Routers A and B act as virtual router backups to each other if either router fails. Load Sharing VRRP Topology Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
VRRP supports up to 255 virtual routers (VRRP groups). VRRP Versions The device supports the following VRRP version types: • IPv4 VRRPv3 based on RFC5798. VRRPv3 messages are sent. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 396
One of the VRRP routers supporting the virtual router must be the owner of all the IP addresses of the virtual router. A VRRP router is the owner of the IP Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
VRRP router would perform as a backup to a virtual router defined in the VRRP router. If there are multiple backup VRRP routers for the virtual router, the priority determines which backup VRRP router is assigned as master if the current master fails. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
In VRRP version 2, the operational advertise interval is rounded down to the nearest second. The minimum operational value is 1 sec. Configuring VRRP This feature can be configured in the following pages. • Virtual Routers Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
100 is the default for a non-owner device. • Preempt Mode—Select true/false to enable/disable preempt mode, as described in VRRP Router Priority and Preemption. • Advertisement Interval—Enter time interval, as described in VRRP Advertisements. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 400
Advertisement Interval—Time interval, as described in VRRP Advertisements. Source IP Address—IP address to be used in VRRP messages. Master Parameters of master device: Priority—255 Advertisement Interval—Time interval, as described in VRRP Advertisements. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Select an interface. STEP 2 Click Clear Interface Counter to clear the counters for that interface. STEP 3 Click Clear All Interface Counters to clear all the counters. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
SSL Server • SSH Server • SSH Client Protection from attacks directed at the device CPU is described in the following sections: • TCP/UDP Services • Storm Control • Access Control Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The device can act as a TACACS+ client that uses the TACACS+ server for the following services: • Authentication—Provides authentication of users logging onto the device by using usernames and user-defined passwords. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 404
The user can enable accounting of login sessions using either a RADIUS or TACACS+ server. The user-configurable, TCP port used for TACACS+ server accounting is the same TCP port that is used for TACACS+ server authentication and authorization. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 405
Select TACACS+ in the Management Access Authentication page, so that when a STEP 3 user logs onto the device, authentication is performed on the TACACS+ server instead of in the local database. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 406
Add TACACS+ Server page for a specific server, the value is taken from this field. • Source IPv4 Interface—Select the device IPv4 source interface to be used in messages sent for communication with the TACACS+ server. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 407
Priority—Enter the order in which this TACACS+ server is used. Zero is the highest priority TACACS+ server and is the first server used. If it cannot establish a session with the high priority server, the device tries the next highest priority server. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
In this way, authentication and authorization can be handled on a single server for all devices in the organization. The device can act as a RADIUS client that uses the RADIUS server for the following services: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
If more than one RADIUS server has been configured, the device uses the NOTE configured priorities of the available RADIUS servers to select the RADIUS server to be used by the device. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 410
Source IPv4 Interface—Select the device IPv4 source interface to be used in messages for communication with the RADIUS server. • Source IPv6 Interface—Select the device IPv6 source interface to be used in messages for communication with the RADIUS server. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 411
RADIUS server. It can be entered in Encrypted or Plaintext format. If Use Default is selected, the device attempts to authenticate to the RADIUS server by using the default Key String. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 412
Click Apply. The RADIUS server definition is added to the Running Configuration STEP 6 file of the device. To display sensitive data in plaintext form on the page, click Display Sensitive STEP 7 Data As Plaintext. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Password Strength Password Strength The default username/password is cisco/cisco. The first time that you log in with the default username and password, you are required to enter a new password. Password complexity is enabled by default. If the password that you choose is not complex enough (Password Complexity Settings are enabled in the Password Strength page), you are prompted to create another password.
This section describes how to configure key chains for applications and protocols, such as RIP. See IP Configuration: RIPv2 for a description of how RIP uses key chain for authentication. It covers the following topics: • Key Chain • Key Settings Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Start Time—Enter the earliest time that the key-identifier is valid on the Start Date. • End Time—Specifies the last date that the key-identifier is valid. Select one of the following options. Infinite—No limit to the life of the key-identifier. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 416
Time. The Send Life Time has the same fields. • Accept Life Time—Specifies when packets with this key are accepted. Select one of the following options. Always Valid—No limit to the life of the key-identifier. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
• Access Profile • Profile Rules Access profiles determine how to authenticate and authorize users accessing the device through various access methods. Access Profiles can limit management access from specific sources. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
If no match is found, access is denied. When an attempt to access the device is in violation of the active access profile, the device generates a SYSLOG message to alert the system administrator of the attempt. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 419
One is the highest priority. • Management Method—Select the management method for which the rule is defined. The options are: All—Assigns all management methods to the rule. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 420
IP Version—Enter the version of the source IP address: Version 6 or Version • IP Address—Enter the source IP address. • Mask—Select the format for the subnet mask for the source IP address, and enter a value in one of the fields: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 421
• Management Method—Select the management method for which the rule is defined. The options are: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 422
Mask—Select the format for the subnet mask for the source IP address, and enter a value in one of the field: Network Mask—Select the subnet to which the source IP address belongs and enter the subnet mask in dotted decimal format. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
If the field is not selected, only authentication is performed. If Authorization is enabled, the read/write privileges of users are checked. This privilege level is set in the User Accounts page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Secure Sensitive Data Management Security: Secure Sensitive Data Management. SSL Server This section describes the Secure Socket Layer (SSL) feature. It covers the following topics: • SSL Overview • SSL Server Authentication Settings Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Valid To—Specifies the date up to which the certificate is valid. • Certificate Source—Specifies whether the certificate was generated by the system (Auto Generated) or the user (User Defined). Select an active certificate. STEP 2 Click Generate Certificate Request. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 426
Private Key (Encrypted)—Select and copy in the RSA private key in encrypted form. • Private Key (Plaintext)—Select and copy in the RSA private key in plain text form. Click Apply to apply the changes to the Running Configuration. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
HTTP—Enabled by factory default • HTTPS—Enabled by factory default • SNMP—Disabled by factory default • Telnet—Disabled by factory default • SSH—Disabled by factory default The active TCP connections are also displayed in this window. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 428
Service Name—Access method through which the device is offering the UDP service. • Type—IP protocol the service uses. • Local IP Address—Local IP address through which the device is offering the service. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Storm Control State—Select to enable Storm Control for Unicast packets. Rate Threshold—Enter the maximum rate at which unknown packets can be forwarded. This value can be entered by kbits/sec or by percentage of the total available bandwidth. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 430
Shutdown on Storm—Select to shutdown a port when a storm occurs on the port. If this is not selected extra traffic is discarded. Click Apply. Storm control is modified, and the Running Configuration file is STEP 4 updated. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
MAC addresses. The MAC addresses can be either dynamically learned or statically configured. Port security monitors received and learned packets. Access to locked ports is limited to users with specific MAC addresses. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 432
To configure port security: Click Security > Port Security. STEP 1 Select an interface to be modified, and click Edit. STEP 2 Enter the parameters. STEP 3 • Interface—Select the interface name. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 433
This is relevant for lock violations. For Classic Lock, this is any new address received. For Limited Dynamic Lock, this is any new address that exceeds the number of allowed addresses. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Interactions with Other Features • Filtering • IP Source Guard Work Flow • Properties • Interface Settings • Binding Database Interactions with Other Features The following points are relevant to IP Source Guard: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 435
If source IP address filtering is enabled: IPv4 traffic: Only traffic with a source IP address that is associated with the port is permitted. Non IPv4 traffic: Permitted (Including ARP packets). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 436
IPv4 traffic — Only IPv4 traffic with a source IP address that is associated with the specific port is permitted. • Non IPv4 traffic — All non-IPv4 traffic is permitted. Interactions with Other Features for more information about enabling IP Source Guard on interfaces. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Retry Frequency—The frequency with which the TCAM resources are checked. • Never-Never try to reactivate inactive addresses. Click Apply to save the above changes to the Running Configuration and/or Retry STEP 3 Now to check TCAM resources. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
ARP allows a gratuitous reply from a host even if an ARP request was not received. After the attack, all traffic from the device under attack flows through the attacker's computer and then to the router, switch, or host. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 439
This section describes ARP Inspection and covers the following topics: • How ARP Prevents Cache Poisoning • Interaction Between ARP Inspection and DHCP Snooping • ARP Defaults • ARP Inspection Work Flow Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
If a packet is valid, it is forwarded and the ARP cache is updated. If the ARP Packet Validation option is selected (Properties page), the following additional validation checks are performed: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
• Log Buffer Interval—Select one of the following options: Retry Frequency—Enable sending SYSLOG messages for dropped packets. Entered the frequency with which the messages are sent. Never—Disabled SYSLOG dropped packet messages. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 443
ARP Access Control Name—Enter a user-created name. • IP Address—IP address of packet. • MAC Address—MAC address of packet. Click Apply. The settings are defined, and the Running Configuration file is STEP 4 updated. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 444
VLAN number and select a previously-defined ARP Access Control Name. Click Apply. The settings are defined, and the Running Configuration file is STEP 4 updated. First Hop Security Security: IPv6 First Hop Security Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
One method of resisting DoS attacks employed by the device is the use of SCT. SCT is enabled by default on the device and cannot be disabled. The Cisco device is an advanced device that handles management traffic, protocol traffic and snooping traffic, in addition to end-user (TCP) traffic.
Invasor Trojan—A trojan enables the attacker to download a zombie agent (or the trojan may contain one). Attackers can also break into systems using automated tools that exploit flaws in programs that listen for connections Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
ACL is defined on the interface or if you attempt to define an ACL on an interface on which DoS Prevention is enabled. A SYN attack cannot be blocked if there is an ACL active on an interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
If System-Level Prevention or System-Level and Interface-Level Prevention is STEP 5 selected, enable one or more of the following DoS Prevention options: • Stacheldraht Distribution—Discards TCP packets with source TCP port equal to 16660. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Click Security > Denial of Service Prevention > SYN Protection. STEP 1 Enter the parameters. STEP 2 • Block SYN-FIN Packets—Select to enable the feature. All TCP packets with both SYN and FIN flags are dropped on all ports. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Addresses defined to be illegal in the Martian Addresses page. • Addresses that are illegal from the point of view of the protocol, such as loopback addresses, including addresses within the following ranges: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 451
—Enter the prefix of the IP address to define the range of IP addresses for which Denial of Service prevention is enabled. Click Apply. The Martian addresses are written to the Running Configuration file. STEP 5 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
To define SYN rate protection: Click Security > Denial of Service Prevention > SYN Rate Protection. STEP 1 This page appears the SYN rate protection currently defined per interface. Click Add. STEP 2 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
If you enter the IP address, enter either the mask or prefix length. • Network Mask—Select the format for the subnet mask for the source IP address, and enter a value in one of the field: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Prefix Length—Select the Prefix Length and enter the number of bits that comprise the source IP address prefix. Click Apply. The IP fragmentation is defined, and the Running Configuration file is STEP 4 updated. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 455
802.1x authentication restricts unauthorized clients from connecting to a LAN through publicity-accessible ports. 802.1x authentication is a client-server model. In this model, network devices have the following specific roles. • Client or supplicant • Authenticator • Authentication server Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
WEB-based—Supported only in multi-sessions modes. In 802.1x-based authentication, the authenticator extracts the EAP messages from the 802.1x messages (EAPOL packets) and passes them to the authentication server, using the RADIUS protocol. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
All of this is accomplished with no impact on end users or on network-attached hosts. Open Access can be activated in the Port Authentication page. Port Authentication States The port authentication state determines whether the client is granted access to the network. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 458
VLANs is bridged. When a port is authorized, untagged and tagged traffic from the authorized host is bridged based on the static VLAN membership port configuration. Traffic from other hosts is dropped. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 459
Tagged traffic is dropped unless it belongs to the RADIUS-assigned VLAN or to the unauthenticated VLANs. Radius VLAN assignment on a port is set in the Port Authentication page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
802.1x supplicants and authentication servers. The EAP messages between supplicants and the authenticator are encapsulated into the 802.1x messages, and the EAP messages between the authenticator and authentication servers are encapsulated into the RADIUS messages. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 461
Figure 2 MAC-Based Authentication RADIUS Protocol User Data EAP Protocol Client Authenticaticator Username = MAC address Authentication Server Password = MAC address . The method does not have any specific configuration. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 462
Figure 3 WEB-Based Authentication RADIUS Protocol HTTP EAP Protocol Client Authenticaticator Authentication Server Web-based authentication cannot be configured on a port that has the guest VLAN or RADIUS-Assigned VLAN feature enabled. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 463
The guest VLAN cannot be used as the Voice VLAN or an unauthenticated VLAN. RADIUS VLAN Assignment Support to see a summary of the modes in which guest VLAN is supported. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 464
The RADIUS server must authenticate the device and dynamically assign a VLAN to the device. You can set the RADIUS VLAN Assignment field to static in the Port Authentication page. This enables the host to be bridged according to static configuration. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 465
In single-host mode you can configure the action to be taken when an unauthorized host on authorized port attempts to access the interface. This is done in the Host and Session Authentication page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 466
A value of 0 specifies the unlimited number of login attempts. The duration of the quiet period and the maximum number of login attempts can be set in the Port Authentication page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 467
†—The port mode also supports the guest VLAN and RADIUS-VLAN assignment. N/S—The authentication method does not support the port mode. You can simulate the single-host mode by setting Max Hosts parameter to 1 in the NOTE Port Authentication page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 468
Frames are Frames Frames are Frames dropped bridged based multi- dropped on the static bridged sessions unless VLAN based on they configuration the static belongs VLAN to the configurat unauthent icated VLANs Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 469
Select a port, and click Edit. STEP 10 Set the Administrative Port Control field to Auto. STEP 11 Define the authentication methods. STEP 12 Click Apply, and the Running Configuration file is updated. STEP 13 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 470
Configure the Guest VLAN Timeout to be either Immediate or enter a value in the STEP 4 User defined field. Click Apply, and the Running Configuration file is updated. STEP 5 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
RADIUS—Authenticate the user on the RADIUS server. If no authentication is performed, the session is not permitted. None—Do not authenticate the user. Permit the session. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 472
To change Enable or Disable authentication on a VLAN, select it, click Edit and select either Enable or Disable. Click Apply. The 802.1X properties are written to the Running Configuration file. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Force Authorized—Authorizes the interface without authentication. • RADIUS VLAN Assignment—Select to enable Dynamic VLAN assignment on the selected port. Disable—Feature is not enabled. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 474
Reauthentication Period—Enter the number of seconds after which the selected port is reauthenticated. • Reauthenticate Now—Select to enable immediate port re-authentication. • Authenticator State—Displays the defined port authorization state. The options are: Initialize—In process of coming up. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 475
Supplicant Timeout—Enter the number of seconds that lapses before EAP requests are resent to the supplicant. • Server Timeout—Enter the number of seconds that lapses before the device resends a request to the authentication server. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Action on Violation—Select the action to be applied to packets arriving in Single Session/Single Host mode, from a host whose MAC address is not the supplicant MAC address. The options are: Protect (Discard)—Discards the packets. Restrict (Forward)—Forwards the packets. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
• Authentication Method—Method by which the last session was authenticated. • Authentication Server—RADIUS server. • MAC Address—Displays the supplicant MAC address. • VLAN ID—Port’s VLAN. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
To add a language for web-based authentication: Click Security > 802.1X/MAC/Web Authentication > Web Authentication STEP 1 Customization. Click Add. STEP 2 Select a language from the Language drop-down list. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
If the Custom color scheme is selected, the following options are available: Page Background Color—Enter the ASCII code of the background color. The selected color is shown in the Text field. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 480
• RADIUS Authentication—Displays whether RADIUS authentication is enabled. If so, the username and password must be included in the login page. • Username Textbox—Select for a username textbox to be displayed. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 481
Copyright Text—Enter the copyright text. Click Apply and the settings are saved to the Running Configuration file. STEP 12 Click Edit Success Page. STEP 13 Figure 5 The following page is displayed Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 482
To preview the login or success message, click Preview. To set the default language of the GUI interface as the default language for Web- based authentication, click Set Default Display Language. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
SSD provides users with the flexibility to configure the desired level of protection on their sensitive data; from no protection with sensitive data in plaintext, minimum protection with encryption based on the default passphrase, and better protection with encryption based on user-defined passphrase. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
A device grants a user the SSD read permission of the SSD rule that best matches the user identity/credential and the type of management channel from which the user is/will access the sensitive data. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
User Type will be applied). Specific—The rule applies to a specific user. Default User (cisco)—The rule applies to the default user (cisco). Level 15—The rule applies to users with privilege level 15. All—The rule applies to all users.
Page 486
Exclude—Do not allow reading sensitive data. Encrypted—Sensitive data is presented in encrypted form. Plaintext—Sensitive data is presented in plaintext form. Each management channel allows specific read presumptions. The following summarizes these. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 487
Changes in the default read mode and read permissions of a rule will become effective, and will be applied to the affected user(s) and channel of all active management sessions immediately, excluding the session making Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Default SSD Rules The device has the following factory default rules: Table 1 Rule Key Rule Action User Channel Read Default Read Mode Permission Level Secure XML Plaintext Only Plaintext SNMP Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
A user-defined passphrase can be configured manually in plain text. It can also be derived from a configuration file. (See Sensitive Data Zero-Touch Auto Configuration). A device always displays user-defined passphrases encrypted. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
This remains until the device is manually reconfigured with the user-defined passphrase, or learns the user-defined passphrase from a configuration file. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The configuration in a Startup Configuration file becomes the Running Configuration after reboot. Running and Startup Configuration files are formatted in internal format. Mirror, Backup, and the remote configuration files are text-based Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
A user can retrieve the sensitive data encrypted or in plaintext from a startup configuration file, subject to the SSD read permission and the current SSD read mode of the management session. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 494
If there is an SSD control block in the source configuration file and the file contains plaintext, sensitive data excluding the SSD configurations in the SSD control block, the file is accepted. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
A user can display, copy, and upload the complete mirror and backup configuration files, subject to SSD read permission, the current read mode in the session, and the file SSD indicator in the source file as follows: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 496
The device must be configured and instructed to: • Encrypt the sensitive data in the file Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Configuring SSD The SSD feature is configured in the following pages: • SSD properties are set in the SSD Properties page. • SSD rules are defined in the SSD Rules page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 499
Click Apply. The settings are saved to the Running Configuration file. STEP 2 SSD Rules Configuration Only users with SSD read permission of Plaintext-only or Both are allowed to set SSD rules. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 500
Specific User—Select and enter the specific user name to which this rule applies (this user does not necessarily have to be defined). Default User (cisco)—Indicates that this rule applies to the default user. Level 15—Indicates that this rule applies to all users with privilege level All—Indicates that this rule applies to all users.
Page 501
The following actions can be performed on selected rules: STEP 4 • Add, Edit or Delete rules • Restore All Rules to Default—Restore a user-modified default rule to the default rule. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
SSH server application, such as PuTTY. The public keys are entered in the device. The users can then open an SSH session on the device through the external SSH server application. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Enable Automatic Login by passing management authentication if required in the STEP 3 SSH User Authentication page. Add the users and their public key into to SSH User Authentication Table in the STEP 4 SSH User Authentication page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Management Access Authentication page. This page is optional. You do not have to work with user authentication in SSH. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 505
SSH User Name—User name of the active user. • SSH Version—Version of SSH used by the active user. • Cipher—Cipher of the active user. • Authentication Code—Authentication code of the active user. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
If the key is already being displayed as plaintext, you can click Display Sensitive Data as Encrypted. to display the text in encrypted form. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Secure Shell or SSH is a network protocol that enables data to be exchanged on a secure channel between an SSH client (in this case, the device) and an SSH server. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 508
Authentication information must be entered by the user, both on the device and on the SSH server, although this guide does not describe server operations. The following illustrates a typical network configuration in which the SCP feature might be used. Typical Network Configuration Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 509
SSH User Authentication When a device (SSH client) attempts to establish a SSH session to a SSH server, the SSH server uses various methods for client authentication. These are described below. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 510
In the key method, individual public/private keys must be created for each individual device, and these private keys cannot be copied directly from one device to another because of security considerations. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
SSH User Authentication page can be used. Set up a username/password or modify the password on the remote SSH server. STEP 3 This activity depends on the server and is not described here. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 513
STEP 1 Click Add to add a new server and enter its identifying information. STEP 2 Click Apply to add the server to the Trusted SSH Servers table. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The SSH User Key Table contains the following fields for each key: • Key Type—RSA or DSA. • Key Source—Auto Generated or User Defined. • Fingerprint—Fingerprint generated from the key. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
By name—If this is selected enter the name of the server in the Server IP Address/Name field. • IP Version—If you selected to specify the SSH server by IP address, select whether that IP address is an IPv4 or IPv6 address. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IP address is an IPv4 or IPv6 address. • IPv6 Address Type—If the SSH server IP address is an IPv6 address, select the IPv6 address type. The options are: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 517
Old Password—This must match the password on the server. • New Password—Enter the new password and confirm it in the Confirm Password field. Click Apply. The password on the SSH server is modified. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
• Attack Protection • Policies, Global Parameters and System Defaults • Common Tasks • Default Settings and Configuration • Before You Start • Configuring IPv6 First Hop Security through Web GUI Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
A separate and independent instance of IPv6 First Hop Security runs on each VLAN on which the feature is enabled. Abbreviations Name Description CPA message Certification Path Advertisement message CPS message Certification Path Solicitation message DAD-NS message Duplicate Address Detection Neighbor Solicitation message Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 520
VLAN that is not attached to a user-defined policy. These policies cannot be attached explicitly by the user. See Policies, Global Parameters and System Defaults. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 521
Trapped RS,CPS NS and NA messages are also passed to the ND Inspection feature. ND Inspection validates these messages, drops illegal messages, and passes legal messages to the IPv6 Source Guard feature. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 522
Security, and hosts and routers inside this perimeter are trusted devices. For example, in Figure 2 Switch B and Switch C are inner links inside the protected area. Figure 2 IPv6 First Hop Security Perimeter Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
FHS common component is enabled, a rate limited SYSLOG message is sent. Neighbor Discovery Inspection Neighbor Discovery (ND) Inspection supports the following functions: • Validation of received Neighbor Discovery protocol messages. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
If a message does not pass verification, it is dropped. If the logging packet drop configuration on the FHS common component is enabled, a rate limited SYSLOG message is sent. Neighbor Binding Integrity Neighbor Binding (NB) Integrity establishes binding of neighbors. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 525
An IPv6 First Hop Security switch can discover and record binding information by using the following methods: • NBI-NDP Method: Learning IPv6 addresses from the snooped Neighbor Discovery Protocol messages • NBI-DHCP method: By learning IPv6 addresses from the snooped DHCPv6 messages Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 526
NBI-NDP assumes that the new anchor is valid and changes the binding anchor. If the host is still reachable using the previously recorded binding anchor, the binding interface is not changed. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IPv6 addresses of NDP and DHCPv6 messages, regardless of whether IPv6 Source Guard is enabled. If IPv6 Source Guard is enabled together with NB Integrity, IPv6 Source Guard configures the TCAM to specify which IPv6 data Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Attack Protection The section describes attack protection provided by IPv6 First Hop Security Protection against IPv6 Router Spoofing An IPv6 host can use the received RA messages for: • IPv6 router discovery Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 529
If the given IPv6 address is known, the DAD_NS message is forwarded only on the interface where the IPv6 address is bound. • An NA message is dropped if the target IPv6 address is bound with another interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Policies contain the rules of verification that are performed on input packets. They can be attached to VLANs and also to ports and LAGs. If the feature is not enabled on a VLAN, the policies have no effect. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 531
The final set of rules that is applied to an input packet on an interface is built in the following way: • The rules configured in policies attached to the interface (port or LAG) on which the packet arrived are added to the set. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
If required, either configure a user-defined policy or add rules to the default STEP 3 policies for the feature. Attach the policy to a VLAN, port or LAG using either the Policy Attachment STEP 4 (VLAN) Policy Attachment (Port) pages. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 533
In this same page, set the global configuration values that are used if no values are STEP 2 set in a policy. If required, either configure a user-defined policy or add rules to the default STEP 3 policies for the feature. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Policy Attachment (Port) pages. Default Settings and Configuration If IPv6 First Hop Security is enabled on a VLAN, the switch traps the following messages by default: • Router Advertisement (RA) messages Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 536
First Hop Security. To attach this policy to an interface: STEP 5 • Attach Policy to VLAN—Click to jump to Policy Attachment (VLAN) page where you can attach this policy to a VLAN. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 537
Managed Address Configuration flag within an IPv6 RA Guard policy. Inherited—Feature is inherited from either the VLAN or system default (client). No Verification—Disables verification of the advertised Managed Address Configuration flag. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 538
User Defined—Verifies that the hop-count limit is greater than or equal to this value. • Maximal Hop Limit—Indicates if the RA Guard policy checks the maximum hop limit of the packet received. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 539
No Verification—Disables verification of the high boundary of Advertised Default Router Preference. Low—Specifies the maximum allowed Advertised Default Router Preference value. The following values are acceptable: low, medium and high (see RFC4191). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 540
Minimal Preference—This field indicates whether the DHCPv6 Guard policy will check the minimum advertised preference value of the packet received. No Verification—Disables verification of the minimum advertised preference value of the packet received. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 541
IPv6 address in received DHCP reply messages within a DHCPv6 Guard policy. Inherited—Value is inherited from either the VLAN or system default (no verification). No Verification—Disables verification of the DHCP server's and relay’s IPv6 address. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 542
Inspection feature on a specified group of VLANs and to set the global configuration values for this feature. If required, a policy can be added or the system-defined default ND Inspection policies can be configured in this page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 543
Enable—Enable dropping messages with no CGA or RSA Signature option within an IPv6 ND Inspection policy. Disable—Disable dropping messages with no CGA or RSA Signature option within an IPv6 ND Inspection policy. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 544
VLANs and to set the global configuration values for this feature. If required, a policy can be added or the system-defined default Neighbor Binding policies can be configured in this page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 545
Entries Per MAC Address—Specifies the neighbor binding limit per MAC address. Select either No Limit or enter a User Defined value. If required, click Add to create a Neighbor Binding policy. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 546
Any—Any configuration methods (stateless and manual) are allowed for global IPv6 bound from NDP messages Stateless—Only stateless auto configuration is allowed for global IPv6 bound from NDP messages. Disable—Binding from NDP messages is disabled. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 547
• Port Trust—Displays that by default the policies are for untrusted ports. This can be changed per policy. If required, click Add to create a First Hop Security policy. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 548
VLAN List—Select the VLANs to which the policy is attached. Select All VLANs or enter a range of VLANs. Click Apply to add the settings to the Running Configuration file. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 549
The following fields are displayed for each policy (only fields not on Add page are displayed: • Origin—Protocol that added the IPv6 address (only available for dynamic entries): Static—Added manually. NDP—Learnt from Neighbor Discovery Protocol messages. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 550
Dynamic Only—Clear only dynamic entries. • All Dynamic & Static—Clear static and dynamic entries. The following fields are displayed for the exiting entries: STEP 3 • VLAN ID—VLAN on which the prefixes are relevant. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 551
Device Role:—RA device role. Managed Configuration Flag—Is verification of the managed configuration flag enabled. Other Configuration Flag—Is verification of the other configuration flag enabled. RA Address List—RA address list to be matched. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 552
• Neighbor Binding Status Neighbor Binding State on Current VLAN—Is Neighbor Binding enabled on the current VLAN. Device Role—Neighbor Binding device role. Logging Binding—Is logging of Neighbor Binding table events enabled. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 553
Select an interface and display the following fields are displayed: STEP 4 • NDP (Neighbor Discovery Protocol) Messages—The number of received and dropped messages are displayed for the following types of messages: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 554
Feature— Type of message dropped (DHCPv6 Guard, RA Guard and so on). • Count—Number of messages dropped. • Reason—Reason that the messages were dropped. Click Clear Global Counters to clear the global overflow counters. STEP 5 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Either a DENY or PERMIT action is applied to frames whose contents match the filter. The device supports a maximum of 512 ACLs, and a maximum of 512 ACEs. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 556
If a frame matches the filter in an ACL, it is defined as a flow with the name of that ACL. In advanced QoS, these frames can be referred to using this Flow name, and QoS can be applied to these frames. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IP, destination IP address, protocol, DSCP value, ICMP type, ICMP code, and IGMP type. • For layer 4 packets the SYSLOG includes the information (if applicable): source port, destination port, and TCP flag. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IPv4-Based ACE page c. IPv6-based ACL by using the IPv6-Based ACL page and the IPv6-Based page 2. Associate the ACL with interfaces by using the ACL Binding (VLAN) Binding (Port) page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
This page contains a list of all currently-defined MAC-based ACLs. Click Add. STEP 2 Enter the name of the new ACL in the ACL Name field. ACL names are STEP 3 case-sensitive. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 560
Time ranges are defined in the System Time Configuration section. • Destination MAC Address—Select Any if all destination addresses are acceptable or User defined to enter a destination address or a range of destination addresses. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IPv4-based ACLs are used to check IPv4 packets, while other types of frames, such as ARPs, are not checked. The following fields can be matched: • IP protocol (by name for well-known protocols, or directly by value) • Source/destination ports for TCP/UDP traffic Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 562
To add rules (ACEs) to an IPv4-based ACL: Click Access Control > IPv4-Based ACE. STEP 1 Select an ACL, and click Go. All currently-defined IP ACEs for the selected ACL are STEP 2 displayed. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 563
—Internet Group Management Protocol IP in IP —IP in IP encapsulation —Transmission Control Protocol —Exterior Gateway Protocol —Interior Gateway Protocol —User Datagram Protocol —Host Mapping Protocol —Reliable Datagram Protocol. IDPR —Inter-Domain Policy Routing Protocol Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 564
1's). You need to translate the 1's to a decimal integer and you write 0 for each four zeros. In this example since 1111 1111 = 255, the mask would be written: as 0.0.0.255. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 565
QoS commitments. This model uses the 3 most significant bits of the service type byte in the IP header, as described in RFC 791 and RFC 1349. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IPv6 ACLs, which check pure IPv6-based traffic. IPv6 ACLs do not check IPv6-over-IPv4 or ARP packets. ACLs are also used as the building elements of flow definitions for per-flow QoS NOTE handling. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 567
Shutdown—Drop packets that meet the ACE criteria, and disable the port to which the packets were addressed. Ports are reactivated from the Error Recovery Settings page. • Logging—Select to enable logging ACL flows that match the ACL rule. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 568
Any—Match to all source ports. Single from list—Select a single TCP/UDP source port to which packets are matched. This field is active only if 800/6-TCP or 800/17-UDP is selected in the IP Protocol drop-down menu. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 569
ICMP Code—The ICMP messages may have a code field that indicates how to handle the message. Select one of the following options, to configure whether to filter on this code: Any—Accept all codes. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Select MAC-Based ACL—Select a MAC-based ACL to be bound to the interface. • Select IPv4-Based ACL—Select an IPv4-based ACL to be bound to the interface. • Select IPv6-Based ACL—Select an IPv6-based ACL to be bound to the interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 571
To unbind all ACLs from an interface, select the interface, and click NOTE Clear. Select an interface, and click Edit. STEP 4 Select one of the following: STEP 5 • Select MAC-Based ACL—Select a MAC-based ACL to be bound to the interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 572
Click Apply. The ACL binding is modified, and the Running Configuration file is STEP 6 updated. If no ACL is selected, the ACL(s) that is previously bound to the interface are NOTE unbound. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
This section covers the following topics: • QoS Features and Components • General • QoS Basic Mode • QoS Advanced Mode • Managing QoS Statistics Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
CoS/802.1p to a Queue page or the DSCP to Queue page (depending on whether the trust mode is CoS/802.1p or DSCP, respectively). Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
ACLs bonded directly to interfaces remain bonded. • When changing from QoS Basic mode to Advanced mode, the QoS Trust mode configuration in Basic mode is not retained. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Configure the selected mode by performing one of the following: STEP 8 a. Configure Basic mode, as described in Workflow to Configure Basic QoS Mode b. Configure Advanced mode, as described in Workflow to Configure Advanced Mode. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Advanced—QoS is enabled on the device in Advanced mode. Select Port/LAG and click GO to display/modify all ports/LAGs on the device and STEP 3 their CoS information. The following fields are displayed for all ports/LAGs: • Interface—Type of interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 578
(the higher the weight the more frames are sent). For example, if there are a maximum of four queues possible and all four queues are WRR and the default weights Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 579
—Displays the amount of bandwidth assigned to the queue. These values represent the percent of the WRR weight. Click Apply. The queues are configured, and the Running Configuration file is STEP 3 updated. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 580
Values (8 queues 1- (8 is the highest (0-7, 7 being 8, 8 is the priority used for the highest) highest stack control priority) traffic) Stack Background Best Effort Excellent Effort Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 581
Either four or eight egress queues are supported, where Queue 4 or Queue 8 is the highest priority egress queue and Queue1 is the lowest priority. For each 802.1p priority, select the Output Queue to which it is mapped. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
The device is in QoS Basic mode and DSCP is the trusted mode, or • The device is in QoS Advanced mode and the packets belongs to flows that is DSCP trusted Non-IP packets are always classified to the best-effort queue. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 583
The following tables describe the default DSCP to queue mapping for a 8-queue system where 7 is highest and 8 is used for stack control purposes. DSCP Queue DSCP Queue DSCP Queue Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 584
Quality of Service General DSCP Queue DSCP Queue DSCP Queue DSCP Queue DSCP Queue Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 585
Select the Output Queue (traffic forwarding queue) to which the DSCP value is STEP 2 mapped. Select Restore Defaults to restore the factory CoS default setting for this STEP 3 interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 586
• Ingress Rate Limit—Enter the maximum amount of bandwidth allowed on the interface. The two Ingress Rate Limit fields do not appear when the interface NOTE type is LAG. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 587
Select an interface type (Port or LAG), and click Go. STEP 2 Select a Port/LAG, and click Edit. STEP 3 This page enables shaping the egress for up to eight queues on each interface. Select the Interface. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 588
To define the VLAN ingress rate limit: Click Quality of Service > General > VLAN Ingress Rate Limit. STEP 1 This page displays the VLAN Ingress Rate Limit Table. Click Add. STEP 2 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
STEP 1 Click Enable to enable TCP congestion avoidance, and click Apply. STEP 2 QoS Basic Mode This section covers the following topics: • Overview • Global Settings • Interface Settings Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 590
Select the Trust Mode while the device is in Basic mode. If a packet CoS level and STEP 2 DSCP tag are mapped to separate queues, the Trust mode determines the queue to which the packet is assigned: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 591
QoS State of the Port is Enabled—Port prioritize traffic on ingress is based on the system wide configured trusted mode, which is either CoS/ 802.1p trusted mode or DSCP trusted mode. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
In QoS advanced mode, the device uses policies to support per flow QoS. A policy and its components have the following characteristics and relationships: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 593
• Definition of the actions to be applied to frames in each flow that match the rules. • Binding the combinations of rules and action to one or more interfaces. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Select the Trust Mode while the device is in Advanced mode. If a packet CoS STEP 2 level and DSCP tag are mapped to separate queues, the Trust mode determines the queue to which the packet is assigned: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 595
QoS-specified limits. The portion of the traffic that causes the flow to exceed its QoS limit is referred to as out-of-profile packets. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 596
Click Apply. The Running Configuration file is updated with the new DSCP STEP 3 Mapping table. Select Restore Defaults to restore the factory CoS default setting for this STEP 4 interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
—A packet must match either the IP based ACL or the MAC based ACL in the class map. • IP—Select the IPv4 based ACL or the IPv6 based ACL for the class map. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
An amount of traffic, measured in bytes, called a Committed Burst Size (CBS). This is traffic that is allowed to pass as a temporary burst even if it is above the defined maximum rate. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 599
Out of Profile DSCP—The DSCP values of packets exceeding the defined CIR value are remapped to a value based on the Out Of Profile DSCP Mapping Table. Click Apply. The Running Configuration file is updated. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
STEP 1 Select a policy in the Filter, and click Go. All class maps in that policy are STEP 2 displayed. To add a new class map, click Add. STEP 3 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 601
Aggregate—The policer for the policy is an aggregate policer. If Police Type is Aggregate, select the Aggregate Policer. STEP 5 If Police Type is Single, enter the following QoS parameters: STEP 6 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Select a Policy Name and Interface Type if required. STEP 2 Click Go. The policy is selected. STEP 3 Select the following for the policy/interface: STEP 4 • Binding—Select to bind the policy to the interface. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
• Out-of-Profile Bytes—Number of out-of-profile packets that were received. Click Add. STEP 2 Select an Aggregate Policer Name, one of the previously-created Aggregate STEP 3 Policers for which statistics are displayed. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Drop Precedence—Lowest drop precedence has the lowest probability of being dropped. • Total Packets—Number of packets forwarded or tail dropped. • Tail Drop Packets—Percentage of packets that were tail dropped. Click Add. STEP 2 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 606
Queue—Select the queue for which statistics are displayed. • Drop Precedence—Enter drop precedence that indicates the probability of being dropped. Click Apply. The Queue Statistics counter is added, and the Running Configuration STEP 4 file is updated. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
SNMP Workflow For security reasons, SNMP is disabled by default. Before you can manage the NOTE device via SNMP, you must enable SNMP on the TCP/UDP Services page. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 609
Define users by using the Users page where they can be associated with a group. STEP 4 If the SNMP Engine ID is not set, then users may not be created. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
ID is based on the device MAC address, and is defined per standard First 4 octets—First bit = 1, the rest is the IANA enterprise number. Fifth octet—Set to 3 to indicate the MAC address that follows. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 612
Link Local is selected) from the list. • Server IP Address/Name—Enter the IP address or domain name of the log server. • Engine ID—Enter the Engine ID. Click Apply. The Running Configuration file is updated. STEP 5 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
In order to verify your view configuration, select the user-defined views from the STEP 6 Filter: View Name list. The following views exist by default: • Default—Default SNMP view for read and read/write views. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Click SNMP > Groups. STEP 1 This page contains the existing SNMP groups and their security levels. Click Add. STEP 2 Enter the parameters. STEP 3 • Group Name—Enter a new group name. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 615
Otherwise, there is no restriction on the contents of the traps. This can only be selected for SNMPv3. Click Apply. The SNMP group is saved to the Running Configuration file. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Remote IP Address—User is connected to a different SNMP entity besides the local device. If the remote Engine ID is defined, remote devices receive inform messages, but cannot make requests for Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 617
Privacy Password—16 bytes are required (DES encryption key) if the DES privacy method was selected. This field must be exactly 32 hexadecimal characters. The Encrypted or Plaintext mode can be selected. Click Apply to save the settings. STEP 4 Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
IP device can access the SNMP community. • IP Version—Select either IPv4 or IPv6. • IPv6 Address Type—Select the supported IPv6 address type if IPv6 is used. The options are: Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 619
Advanced—Select this mode for a selected community. Group Name—Select an SNMP group that determines the access rights. Click Apply. The SNMP Community is defined, and the Running Configuration is STEP 4 updated. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
(traps or informs). The Add/Edit pop-ups enable configuring the attributes of the notifications. An SNMP notification is a message sent from the device to the SNMP management station indicating that a certain event has occurred, such as a link up/ down. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 621
• Server Definition—Select whether to specify the remote log server by IP address or name. • IP Version—Select either IPv4 or IPv6. • IPv6 Address Type—Select either Link Local or Global. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 622
Filter Name—Select the SNMP filter that defines the information contained in traps (defined in the Notification Filterpage). Click Apply. The SNMP Notification Recipient settings are written to the Running STEP 5 Configuration file. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 623
Global—The IPv6 address is a global Unicast IPV6 type that is visible and reachable from other networks. • Link Local Interface—Select the link local interface (if IPv6 Address Type Link Local is selected) from the pull-down list. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Page 624
Filter Name—Select the SNMP filter that defines the information contained in traps (defined in the Notification Filter page). Click Apply. The SNMP Notification Recipient settings are written to the Running STEP 4 Configuration file. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...
Select or deselect Include in filter. If this is selected, the selected MIBs are STEP 4 included in the filter, otherwise they are excluded. Click Apply. The SNMP views are defined and the running configuration is STEP 5 updated. Cisco 350XG & 550XG Series 10G Stackable Managed Switches...