Summary of Contents for 3Com Baseline 2928 PWR Plus
Page 1
3Com Baseline Switch 2900 Family User Guide Baseline Switch 2920-SFP Plus Baseline Switch 2928-SFP Plus Baseline Switch 2952-SFP Plus Baseline Switch 2928-PWR Plus Baseline Switch 2928-HPWR Plus Manual Version: 6W102-20090810 www.3com.com 3Com Corporation 350 Campus Drive, Marlborough, MA, USA 01752 3064...
Page 2
Software is delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or as a “commercial item” as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov 1995) or FAR 52.227-14 (June 1987), whichever is applicable.
Back up the configuration file or upload the configuration file to be used at the next startup from the host of the current user to the device. 8 Configuration Save the current configuration to the configuration file to be used at Management the next startup.
Add, modify, and delete a PKI entity or a PKI domain. 39 PKI Generate a key pair, destroy a key pair, retrieve a certificate, request a certificate, and delete a certificate. Configure a port isolation group, and display port isolation group 40 Port Isolation Group information.
Page 5
Optional alternative items are grouped in square brackets and [ x | y | ... ] * separated by vertical bars. Many or none can be selected. The argument(s) before the ampersand (&) sign can be entered 1 to n &<1-n> times.
Page 6
This guide provides all the information you need to install Getting Started Guide and use the 3Com Baseline Switch 2900 Family. Obtaining Documentation You can access the most up-to-date 3Com product documentation on the World Wide Web at this URL: http://www.3com.com.
Page 7
Setting Up the Configuration Environment ······················································································3-1 Setting Terminal Parameters···········································································································3-2 Logging In to the CLI ·······················································································································3-6 CLI Commands ·······································································································································3-6 initialize············································································································································3-6 ipsetup ·············································································································································3-7 password ·········································································································································3-8 ping ··················································································································································3-8 quit ···················································································································································3-9 reboot···············································································································································3-9 summary········································································································································3-10 upgrade ·········································································································································3-11 Configuration Example for Upgrading the Host Software Through the CLI··········································3-12...
Overview The 3Com baseline switch 2900 family can be configured through the command line interface (CLI), web interface, and SNMP/MIB. These configuration methods are suitable for different application scenarios. The web interface supports all switch 2900 series configurations. The CLI provides some configuration commands to facilitate your operation. To perform other...
If the device is not connected to the network, or no DHCP server exists in the subnet where the device resides, you can get the default IP address of the device on the label on the right of the device rear...
If a DHCP server exists in the subnet where the device resides, the device will dynamically obtain its default IP address through the DHCP server. You can log in to the device through the console port, and execute the summary command to view the information of its default IP address.
After logging in to the Web interface, you can select Device > Users from the navigation tree, create a new user, and select Wizard or Network > VLAN interface to configure the IP address of the VLAN interface acting as the management interface. For detailed configuration, refer to the corresponding configuration manuals of these modules.
Body area: Allows you to configure and display features. Title area: Displays the path of the current configuration interface in the navigation tree; provides the Help button to display the Web related help information, and the Logout button to log out of the Web interface.
Page 13
User level in Table 2-2 indicates that users of this level or users of a higher level can perform the corresponding operations. Table 2-2 Description of Web-based NM functions Function menu Description User level Wizard IP Setup Perform quick configuration of the device.
Initialize Restore the factory default settings. Configure File File Manage files on the device, such as displaying the Manage Manageme file list, downloading a file, uploading a file, and Management ment removing a file.
SNMP Display SNMP user information. Monitor User Create, modify and delete an SNMP user. Configure Display the status of the SNMP trap function and Monitor information about target hosts. Trap Enable or disable the SNMP trap function, or Configure create, modify and delete a target host.
Display the addresses of the OUIs that can be Monitor Summary identified by voice VLAN. Add the address of an OUI that can be identified by OUI Add Configure voice VLAN. Remove the address of an OUI that can be...
Page 17
DHCP server DHCP Configure group, and enable/disable the DHCP relay agent on an interface. Display the status, trusted and untrusted ports and Monitor DHCP client information of DHCP snooping. DHCP Snooping Enable/disable DHCP snooping, and configure Configure DHCP snooping trusted and untrusted ports.
Page 18
Display the certificate information of PKI domains Monitor and view the contents of a certificate. Certificate Generate a key pair, destroy a key pair, retrieve a certificate, request a certificate, and delete a Configure certificate. Display the contents of the CRL.
Apply button Click the button to submit and apply the input information. Cancel button Click the button to cancel the input information. The page changes to the display page of the function or to the Device Info page. Search button Select an item to be queried, input the keyword, and click the Query button to display the items that meet the requirements.
Page 20
Click the button to remove the selected items. Select All button Click the button to select all the items in a list, or all the ports on the device panel. Select None button Click the button to deselect all the items in a list, or all the ports on the device panel.
Figure 2-7 About Sort display On the page, you can click the blue items of each column to sort and display the records based on the item you selected. Figure 2-8 Sort display Configuration Guidelines The Web-based console supports Microsoft Internet Explorer 6.0 SP2 and higher, but it does not support the Back, Next, Refresh buttons provided by the browser.
Page 22
If the software version of the device changes, when you log in to the device through the Web interface, you are recommended to delete the temporary Internet files of IE; otherwise, the Web page content may not be displayed correctly.
Set up the configuration environment as follows: Step1 Take the console cable out of the package. (A console cable is an 8-core shielded cable. One end of the cable is a crimped RJ-45 connector, which is connected to the console port of the switch, and the other end is a DB-9 female connector, which is connected to the serial port on the console terminal, as shown below.)
Figure 3-1 Console cable Step2 Plug the DB-9 female connector of the console cable to the serial port of the console terminal or PC. Step3 Connect the RJ-45 connector of the console cable to the console port of the switch. (as shown below)
Page 25
Figure 3-3 Connection description of the HyperTerminal Step2 Type the name of the new connection in the Name text box and click OK. The following dialog box appears. Select the serial port to be used from the Connect using drop-down list.
Page 26
Figure 3-4 Set the serial port used by the HyperTerminal connection Step3 Click OK after selecting a serial port. The following dialog box appears. Set Bits per second to 38400, Data bits to 8, Parity to None, Stop bits to 1, and Flow control to None.
Page 27
Figure 3-6 HyperTerminal window Step5 Click Properties in the HyperTerminal window to enter the Switch Properties dialog box. Click the Settings tab, set the emulation to VT100, and then click OK. Figure 3-7 Set terminal emulation in Switch Properties dialog box...
Logging In to the CLI The login process requires a user name and password. The default user name for first time configuration is admin, no password is required. User names and passwords are case sensitive. To logon to the CLI Interface: Step1 Press Enter.
Description Use the initialize command to delete the configuration file to be used at the next startup and reboot the device with the default configuration being used during reboot. Use the command with caution because this command deletes the configuration file to be used at the next startup and restores the factory default settings.
Syntax ping host Parameters host: Destination IP address (in dotted decimal notation), URL, or host name (a string of 1 to 20 characters). Description Use the ping command to ping a specified destination. You can enter Ctrl+C to terminate a ping operation.
= 1/41/205 ms The above information shows that IP address 1.1.2.2 is reachable and the echo replies are all returned from the destination. The minimum, average, and maximum roundtrip intervals are 1 millisecond, 41 milliseconds, and 205 milliseconds respectively.
In this case, you can specify a new main configuration file to reboot the device, or you can power off the device, and then power it on, and the system will automatically use the backup configuration file at the next startup.
Use the upgrade server-address source-filename runtime command to upgrade the boot file. If the boot file in the downloaded software package is not applicable, the original boot file is still used at the next startup.
# Download software package main.bin from the TFTP server and use the boot file in the package at the next startup. <Sysname> upgrade 192.168.20.41 main.bin runtime Configuration Example for Upgrading the Host Software Through the CLI Network requirements As shown in...
Page 35
File downloaded successfully. The specified file will be used as the boot file at the next reboot. # Reboot the switch. <Switch> reboot After getting the new application file, reboot the switch to have the upgraded application take effect. 3-13...
Page 36
Table of Contents 1 Configuration Wizard ································································································································1-1 Overview ·················································································································································1-1 Basic Service Setup ································································································································1-1 Entering the Configuration Wizard Homepage················································································1-1 Configuring System Parameters ·····································································································1-1 Configuring Management IP Address ·····························································································1-3 Finishing Configuration Wizard ·······································································································1-4...
From the navigation tree, select Wizard to enter the config uration wizard homepage, as shown in Figure 1-1. Figure 1-1 Configuration wizard homepage Conf iguring System Parameters In the wizard homepage, click Next to enter the system parameter configuration page, as shown in Figure 1-2...
Page 38
Specify the system name. The system name appears at the top of the navigation tree. Sysname You can also set the system name in the System Name page you enter by selecting Device > Basic. For details, refer to Device Basic Information Configuration.
Use the new management IP address to re-log in to the system. A management IP address is the IP address of a VLAN interface, which can be used to access the device. You can also set configure a VLAN interface and its IP address in the page you enter by selecting Network >...
When errors occurred on the VLAN interface, disable the interface and then enable the port to bring the port to work properly. By default, the VLAN interface is down if no Ethernet ports in the VLAN is up. The Admin VLAN is in the up state if one or more ports in the VLAN are up.
Page 41
Figure 1-4 Configuration finishe The page displays your configurations. Review the configurations and if you want to modify the settings click Back to go back to the page. Click Finish to confirm your settings and the system performs the configurations.
Page 42
Configuration Task List····················································································································1-2 Configuring Global Parameters of a Stack ······················································································1-3 Configuring Stack Ports···················································································································1-4 Displaying Topology Summary of a Stack·······················································································1-4 Displaying Device Summary of a Stack ··························································································1-5 Logging Into a Slave Device From the Master ················································································1-5 IRF Stack Configuration Example···········································································································1-6 Configuration Guidelines·······················································································································1-11...
Establishing a Stack An administrator can establish a stack as follows: Configure a private IP address pool for a stack and create the stack on the network device which is to be configured as the master device. Configure ports between the stack devices as stack ports.
The administrator can log in to any slave device from the master device of the stack, and perform various configurations for the slave device. Configuring an IRF Stack Configuration Task List Perform the tasks in Table 1-1 to configure an IRF stack.
Configuring Global Parameters of a Stack Select IRF from the navigation tree to enter the page shown in Figure 1-2. You can configure global parameters of a stack in the Global Settings area. Figure 1-2 Set up Table 1-2 describes configuration items of global parameters.
Port Settings area. Select the check box before a port name, and click Enable to configure the port as a stack port. Select the check box before a port name, and click Disable to configure the port as a non-stack port.
Return to Stack configuration task list. Logging Into a Slave Device From the Master Select IRF from the navigation tree, click the Device Summary tab, and click the tab of a slave device to enter the page shown in Figure 1-5.
1-6, Switch A, Switch B, Switch C, and Switch D are connected with one another. Create a stack, where Switch A is the master device, Switch B, Switch C, and Switch D are slave devices. An administrator can log in to Switch B, Switch C and Switch D through Switch A to perform remote configurations.
Page 49
Select Enable from the Build Stack drop-down list. Click Apply. Now, switch A becomes the master device. # Configure a stack port on Switch A. On the page of the Setup tab, perform the following configurations, as shown in Figure 1-8.
Page 50
1/0/1 connecting with Switch C, and GigabitEthernet 1/0/3 connecting with Switch D as stack ports. Select IRF from the navigation tree of Switch B to enter the page of the Setup tab, and then perform the following configurations, as shown in Figure 1-9.
Page 51
# On Switch C, configure local port GigabitEthernet 1/0/1 connecting with Switch B as a stack port. Select IRF from the navigation tree of Switch C to enter the page of the Setup tab, and then perform the following configurations, as shown in .
Page 52
# On Switch D, configure local port GigabitEthernet 1/0/1 connecting with Switch B as a stack port. Select IRF from the navigation tree of Switch D to enter the page of the Setup tab, and then perform the following configurations, as shown in Figure 1-10.
Configuration Guidelines When configuring an IRF stack, note that: If a device is already configured as the master device of a stack, you are not allowed to modify the private IP address pool on the device. If a device is already configured as a slave device of a stack, the Global Settings area on the slave device is grayed out.
Page 54
Table of Contents 1 Summary ····················································································································································1-1 Overview ·················································································································································1-1 Displaying Device Summary ···················································································································1-1 Displaying System Information········································································································1-1 Displaying Device Information·········································································································1-2...
The system information includes the basic system information, system resources state, and recent system operation logs. Displaying Device Summary Displaying System Information After you log in to the Web interface, the System Information page appears by default, as shown in Figure 1-1. Figure 1-1 System information Select from the Refresh Period drop-down list: If you select a certain period, the system refreshes the system information at the specified interval.
The Summary page displays up to five the most recent system operation logs about the login and logout events. For more system operation logs, you can click More to enter the Log List page. You can also enter this page by selecting Device > Syslog. For details, refer to Log Management Configuration.
Page 57
Figure 1-2 Device information Select from the Refresh Period drop-down list: If you select a certain period, the system refreshes the information at the specified interval. If you select Manual, the system refreshes the information only when you click the Refresh button.
Page 58
Table of Contents 1 Device Basic Information Configuration ·································································································1-1 Overview ·················································································································································1-1 Configuring Device Basic Information·····································································································1-1 Configuring System Name ··············································································································1-1 Configuring Idle Timeout Period······································································································1-1...
Set the system name of the device. The configured system name will be displayed on the top of the navigation bar. Set the idle timeout period for a logged-in user. That is, the system will log an idle user off the Web for security purpose after the configured period.
Page 60
Figure 1-2 Configuring idle timeout period Table 1-2 describes the idle timeout period configuration item. Table 1-2 Idle timeout period configuration item Item Description Idle timeout Set the idle timeout period for a logged-in user.
Page 61
Table of Contents 1 System Time Configuration······················································································································1-1 Overview ·················································································································································1-1 Configuring System Time························································································································1-1 System Time Configuration Example······································································································1-2 Configuration Guidelines·························································································································1-3...
System Time Configuration Overview The system time module allows you to display and set the device system time on the Web interface. The device supports setting system time through manual configuration and automatic synchronization of NTP server time. An administrator can by no means keep time synchronized among all the devices within a network by changing the system clock on each device, because this is a huge amount of workload and cannot guarantee the clock precision.
Figure 1-2, the local clock of Device A is set as the reference clock. Switch B works in the client mode, and uses Device A as the NTP server. Configure NTP authentication on Device A and Switch B. Figure 1-2 Network diagram for configuring system time 1.0.1.11/24...
Select NTP. Type 24 in the ID box, and type aNiceKey in the Key String text box for key 1. Type 1.0.1.11 in the NTP Server 1 text box and type 24 in the Reference Key ID text box. Click Apply.
Page 65
A device can act as a server to synchronize the clock of other devices only after its clock has been synchronized. If the clock of a server has a stratum level higher than or equal to that of a client’s clock, the client will not synchronize its clock to the server’s.
Display detailed information of system logs. Optional Setting Loghost Set the loghost that can receive system logs. Setting Syslog Related Parameters Select Device > Syslog from the navigation tree, and click the Logset tab to enter the syslog configuration page, as shown in Figure 1-1.
Page 68
Automatic: You can select to refresh the Web interface every 1 minute, 5 minutes, or 10 minutes. Return to Log management configuration task list. Displaying Syslog Select Device > Syslog from the navigation tree to enter the syslog display page, as shown in Figure 1-2.
Page 69
Click Sequential Display to change the order in which system logs are displayed, and then the Sequential Display button will be changed to Reverse Display. After you change the order in which system logs are displayed, the system logs are displayed in this order, unless you change it again.
Note: A smaller value represents a higher severity level. Return to Log management configuration task list. Setting Loghost Select Device > Syslog from the navigation tree, and click the Loghost tab to enter the loghost configuration page, as shown in Figure 1-3. Figure 1-3 Set loghost Table 1-5 describes the loghost configuration item.
Page 71
Table of Contents 1 Configuration Management ······················································································································1-1 Back Up Configuration ····························································································································1-1 Restore Configuration ·····························································································································1-1 Save Configuration··································································································································1-2 Initialize ···················································································································································1-3...
Open and view the configuration file (.cfg file or .xml file) for the next startup Back up the configuration file (.cfg file or .xml file) for the next startup to the host of the current user Select Device > Configuration from the navigation tree to enter the backup configuration page, as...
Figure 1-2 Configuration restore page After you click the upper Browse button in this figure, the file upload dialog box appears. You can select the .cfg file to be uploaded, and then click Apply. After you click the lower Browse button in this figure, the file upload dialog box appears. You can select the .xml file to be uploaded, and then click Apply.
This operation will restore the system to factory defaults, delete the current configuration file, and reboot the device. Select Device > Configuration from the navigation tree, and then click the Initialize tab to enter the initialize confirmation page as shown in Figure 1-4.
Page 75
Table of Contents 1 Device Maintenance ··································································································································1-1 Software Upgrade ···································································································································1-1 Device Reboot·········································································································································1-2 Electronic Label·······································································································································1-3 Diagnostic Information ····························································································································1-3...
A boot file, also known as the system software or device software, is an application file used to boot the device. A main boot file is used to boot a device and a backup boot file is used to boot a device only when the main boot file is unavailable.
Before rebooting the device, save the configuration; otherwise, all unsaved configuration will be lost after device reboot. After the device reboots, you need to re-log in to the Web interface. Select Device > Device Maintenance from the navigation tree, click the Reboot tab to enter the device reboot configuration page, as shown in Figure 1-2.
If the check succeeds, the system will reboot the device; if the check fails, a dialog box appears, telling you that the current configuration and the saved configuration are inconsistent, and the device will not be rebooted. In this case, you need to save the current configuration manually before you can reboot the device.
Page 79
Figure 1-5 The diagnostic information file is created Click Click to Download, and the File Download dialog box appears. You can select to open this file or save this file to the local host. The generation of the diagnostic file will take a period of time. During this process, do not perform any operation on the Web page.
Page 80
Table of Contents 1 File Management········································································································································1-1 Overview ·················································································································································1-1 File Management Configuration··············································································································1-1 Displaying File List···························································································································1-1 Downloading a File ··························································································································1-1 Uploading a File·······························································································································1-2 Removing a File·······························································································································1-2...
1-1. On the top of this page, select a disk from the Please select disk drop-down list, and the used space, available space, and capacity of the disk will be displayed at the right of the drop-down list. The area below the drop-down list displays all files (displayed in the format of path + filename) saved on the disk and their sizes.
1-1. In the Upload File area, select a disk from the Please select disk drop-down list to save the file, type the file path and filename in the File box, or click Browse to select a file. Click Apply to upload the file to the specified storage device.
Page 83
Table of Contents 1 Port Management Configuration··············································································································1-1 Overview ·················································································································································1-1 Configuring a Port ···································································································································1-1 Setting Operation Parameters for a Port ·························································································1-1 Viewing the Operation Parameters of a Port···················································································1-5 Port Management Configuration Example ······························································································1-6...
Port Management Configuration Overview You can use the port management feature to set and view the operation parameters of a Layer 2 Ethernet port, including but not limited to its state, rate, duplex mode, link type, PVID, MDI mode, flow control settings, MAC learning limit, and storm suppression ratios.
Page 85
For details, refer to VLAN Configuration. Link Type To change the link type of a port from trunk to hybrid or vice versa, you must first set its link type to access. Set the default VLAN ID of the interface. For details about setting the PVID, refer to VLAN Configuration.
Page 86
For an Ethernet port in normal mode, the pin roles are changed. Pin 1 and pin 2 are used for receiving signals; pin 3 and pin 6 are used for transmitting signals. To enable normal communication, you must connect the local transmit pins to the remote receive pins.
Page 87
Otherwise, the suppression result will be unpredictable. To set storm constrain for unicast traffic on a port, select Device > Storm Constrain. Port or ports that you have selected from the chassis front panel, and Selected Ports for which you have set operation parameters...
Page 88
Select Device > Port Management from the navigation tree. The Summary tab is displayed by default. Select the parameter you want to view by clicking the radio button before it to display the setting of this parameter for all the ports in the lower part of the page, as shown in Figure 1-2.
1-4: Server A, Server B, and Server C are connected to GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and GigabitEthernet 1/0/3 or the switch respectively. The rates of the network adapters of these servers are all 1000 Mbps. The switch connects to the external network through GigabitEthernet 1/0/4 whose rate is 1000 Mbps.
Page 90
Configuration procedure # Set the rate of GigabitEthernet 1/0/4 to 1000 Mbps. Select Device > Port Management from the navigation tree, click the Setup tab to enter the page shown in Figure 1-5, and make the following configurations: Figure 1-5 Configure the rate of GigabitEthernet 1/0/4 Select 100 in the Speed dropdown list.
Page 91
Figure 1-6 Batch configure port rate # Display the rate settings of ports. Click the Summary tab. Select the Speed option to display the rate information of all ports on the lower part of the page, as shown in Figure...
Page 92
Figure 1-7 Display the rate settings of ports...
Page 93
1 Port Mirroring Configuration ····················································································································1-1 Introduction to Port Mirroring ··················································································································1-1 Implementing Port Mirroring ············································································································1-1 Configuring Port Mirroring·······················································································································1-1 Configuration Task List····················································································································1-1 Creating a Mirroring Group··············································································································1-2 Configuring Ports for a Mirroring Group ··························································································1-3 Configuration Examples ··························································································································1-4 Local Port Mirroring Configuration Example····················································································1-4 Configuration Guidelines·························································································································1-7...
Port Mirroring Configuration Introduction to Port Mirroring Port mirroring is to copy the packets passing through a port (called a mirroring port) to another port (called the monitor port) connected with a monitoring device for packet analysis. You can select to port-mirror inbound, outbound, or bidirectional traffic on a port as needed.
Port. You can configure one only monitor port for a mirroring group. Creating a Mirroring Group Select Device > Port Mirroring from the navigation tree and click Create to enter the page for creating a mirroring group, as shown in Figure 1-2.
Local port mirroring configuration task list. Configuring Ports for a Mirroring Group Select Device > Port Mirroring from the navigation tree and click Modify Port to enter the page for configuring ports for a mirroring group, as shown in Figure 1-3.
Figure 1-4 Network diagram for local port mirroring configuration Configuration procedure # Create a local mirroring group. Select Device > Port Mirroring from the navigation tree and click Create to enter the page for creating mirroring groups, as shown in Figure...
Page 98
Type in mirroring group ID 1. Select Local in the Type drop-down list. Click Apply. # Configure the mirroring ports. Click Modify Port to enter the page for configuring ports for the mirroring group, as shown in Figure 1-6. Figure 1-6 Configure the mirroring ports...
Page 99
Figure 1-7 Configuration progress dialog box After the configuration process is complete, click Close. # Configure the monitor port. Click Modify Port to enter the page for configuring ports for the mirroring group, as shown in Figure 1-8. Figure 1-8 Configure the monitor port Select 1 –...
Pay attention to the following points during local port mirroring configuration: To ensure operation of your device, do not enable STP, MSTP, or RSTP on the monitor port. You can configure multiple mirroring ports but only one monitor port for a local mirroring group.
Page 101
Table of Contents 1 User Management······································································································································1-1 Overview ·················································································································································1-1 Users ·······················································································································································1-1 Creating a User ·······························································································································1-1 Setting the Super Password············································································································1-2 Switching the User Access Level to the Management Level ··························································1-3...
Switch the current Web user access level to the management level. Users Creating a User Select Device > Users from the navigation tree, and click the Create tab to enter the page for creating local users, as shown in Figure 1-1.
Page 103
Setting the Super Password In this part, users of the management level can specify the password for a lower-level user to switch from the current access level to the management level. If no such a password is configured, the switchover will fail.
Page 104
The access level switchover of a user is valid for the current login only. The access level configured for the user is not changed. When the user re-logs in to the Web interface, the access level of the user is still the original level.
Page 105
Figure 1-3 Switch to the management level.
Page 106
Table of Contents 1 Loopback Test Configuration···················································································································1-1 Overview ·················································································································································1-1 Loopback Operation································································································································1-1 Configuration Guidelines·························································································································1-2...
In an external loopback test, a loopback plug is used on the port. Packets forwarded by the port will be received by itself through the loopback plug. The external loopback test can be used to check whether there is a hardware failure on the port.
After selecting a testing type, you need to select a port on which you want to perform the loopback test from the chassis front panel. After that, click Test to start the loopback test, and you can see the test result in the Result text box, as shown in Figure 1-2.
Select Device > VCT from the navigation tree to enter the page for testing cable status. Select the port you want to test in the chassis front panel and then click Test. The test result is returned in less than 5...
Page 111
Status and length of the cable. The status of a cable can be normal, abnormal, abnormal(open), abnormal(short), or failure. When a cable is normal, the cable length displayed is the total length of the cable. Cable status When a cable is not normal, the cable length displayed is the length of the cable between the current port and the location where fault occurs.
Page 112
Table of Contents 1 Flow Interval Configuration ······················································································································1-1 Overview ·················································································································································1-1 Monitoring Port Traffic Statistics ·············································································································1-1 Setting the Traffic Statistics Generating Interval ·············································································1-1 Viewing Port Traffic Statistics··········································································································1-1...
Flow Interval Configuration Overview With the flow interval module, you can view the average receiving rate and average sending rate of a port over the specified interval. Monitoring Port Traffic Statistics Setting the Traffic Statistics Generating Interval Select Device > Flow interval from the navigation bar, and click the Interval Configuration tab to...
Device > Port Management. For details, refer to Port Management. With storm constrain enabled on a port, you can specify the system to act as follows when a certain type of traffic (broadcast, multicast, or unicast) exceeds the corresponding upper threshold: Block: Block the port.
Page 117
The traffic statistics generating interval set here is the interval used by the storm constrain function for measuring traffic against the traffic thresholds. It is different from the interval set in the flow interval module, which is used for measuring the average traffic sending and receiving rates over a specific interval.
Page 118
(in seconds) to collect traffic data, and analyzes the data in the next interval. Thus, it is normal that a period longer than one traffic statistics generating interval is waited for a control action to happen if you enable the function while the packet storm is present.
Page 119
Select or clear the option to enable or disable the system to output logs both when an upper threshold is crossed and when the corresponding lower threshold is crossed after that.
Page 120
Configuration Task List····················································································································1-3 Configuring a Statistics Entry ··········································································································1-5 Configuring a History Entry ·············································································································1-6 Configuring an Event Entry ·············································································································1-7 Configuring an Alarm Entry ·············································································································1-7 Displaying RMON Statistics Information ·························································································1-9 Displaying RMON History Sampling Information ··········································································1-11 Displaying RMON Event Logs·······································································································1-13 RMON Configuration Example··············································································································1-13...
The alarm function enables a managed device to monitor the value of a specified MIB variable, log the event and send a trap to the management device when the value reaches the threshold, such as the port rate reaches a certain value or the potion of broadcast packets received in the total packets reaches a certain value.
Log: Logging event related information (the time of the event occurred, contents of the event, and so on) in the event log table of the RMON MIB of the device, and thus the management device can check the logs through the SNMP GET operation.
Configuring the RMON statistics function RMON statistics function can be implemented by either the statistics group or the history group, but the objects of the statistics are different. You can choose to configure a statistics group or a history group accordingly.
Configuring the RMON alarm function If you need to configure that the managed device sends a trap to the NMS when it triggers an alarm event, you should configure the SNMP agent as described in SNMP Configuration before configuring the RMON alarm function.
Page 125
Configuring a Statistics Entry Select Device > RMON from the navigation tree to enter the page of the Statistics tab, as shown in Figure 1-1. Click Add to enter the page for adding a statistics entry, as shown in Figure 1-2.
Page 126
Configuring a History Entry Select Device > RMON from the navigation tree and click the History tab to enter the page, as shown Figure 1-3. Click Add to enter the page for adding a history entry, as shown in Figure 1-4.
Page 127
Configuring an Event Entry Select Device > RMON from the navigation tree and click the Event tab to enter the page, as shown in Figure 1-5. Click Add to enter the page for adding an event entry, as shown in Figure 1-6.
Page 128
Table 1-8 Alarm entry configuration items Item Description Set the traffic statistics that will be collected and monitored, see Table 1-9 Statics Item for details. Alarm variable Interface Set the name of the interface whose traffic statistics will be collected and Name monitored.
Page 129
RMON alarm configuration task list. Displaying RMON Statistics Information Select Device > RMON from the navigation tree to enter the page of the Statistics tab, as shown in Figure 1-1. Click the icon of a statistics entry to enter the page as shown in...
Page 130
RMON statistics. Table 1-9 Fields of RMON statistics Item Description Total number of octets received by the interface, Number of Received Bytes corresponding to the MIB node etherStatsOctets. Total number of packets received by the interface, Number of Received Packets corresponding to the MIB node etherStatsPkts.
Page 131
Display RMON running status. Displaying RMON History Sampling Information Select Device > RMON from the navigation tree and click the History tab to enter the page, as shown Figure 1-3. Click the icon of a history entry to enter the page as shown in...
Page 132
MIB node etherHistoryOversizePkts. Number of fragments received during the sampling period, corresponding to Fragments the MIB node etherHistoryFragments. Number of jabbers received during the sampling period (Support for the field Jabbers depends on the device model.), corresponding to the MIB node etherHistoryJabbers.
Displaying RMON Event Logs Select Device > RMON from the navigation tree and click the Log tab to enter the page, as shown in Figure 1-11, which displays log information for all event entries. Figure 1-11 Log Return to Display RMON running status.
Page 134
Figure 1-13 Add a statistics entry Select GigabitEthernet1/0/1 from the Interface Name drop-down box. Type user1-rmon in the text box of Owner. Click Apply. # Display RMON statistics for interface Ethernet 1/0/1. Click the icon corresponding to GigabitEthernet 1/0/1. You can view the information as shown in Figure 1-14.
Page 135
Figure 1-14 Display RMON statistics # Create an event to start logging after the event is triggered. Click the Event tab, click Add, and then perform the following configurations, as shown in Figure 1-15. Figure 1-15 Configure an event group...
Page 136
Type 1-rmon in the text box of Owner. Select the check box before Log. Click Apply. The page goes to the page displaying the event entry, and you can see that the entry index of the new event is 1, as shown in Figure 1-16.
Page 137
Select Number of Received Bytes from the Statics Item drop-down box. Select GigabitEthernet1/0/1 from the Interface Name drop-down box. Type 10 in the text box of Interval. Select Delta from the Simple Type drop-down box. Type 1-rmon in the text box of Owner.
Page 138
Table of Contents 1 Energy Saving Configuration ···················································································································1-1 Overview ·················································································································································1-1 Configuring Energy Saving on a Port······································································································1-1...
Energy Saving Configuration Overview Energy saving allows you to configure a port to work at the lowest transmission speed, disable PoE, or go down during a specified time range on certain days of a week. The port resumes working normally when the effective time period ends.
Page 140
Item Description Set the port to transmit data at the lowest speed. Lowest Speed If you configure the lowest speed limit on a port that does not support 10 Mbps, the configuration cannot take effect. Shut down the port. Shutdown An energy saving policy can have all the three energy saving schemes configured, of which the shutdown scheme takes the highest priority.
Page 141
SNMP Protocol Version···················································································································1-1 MIB Overview ··································································································································1-2 SNMP Configuration ·······························································································································1-3 Configuration Task List····················································································································1-3 Enabling SNMP ·······························································································································1-4 Configuring an SNMP View·············································································································1-5 Configuring an SNMP Community ··································································································1-7 Configuring an SNMP Group···········································································································1-8 Configuring an SNMP User ···········································································································1-10 Configuring SNMP Trap Function ·································································································1-11 SNMP Configuration Example ··············································································································1-13...
An SNMP enabled network comprises Network Management Station (NMS) and agent. An NMS is a station that runs the SNMP client software. It offers a user friendly interface, making it easier for network administrators to perform most network management tasks.
{1.2.1.1.5}. This string of numbers is the OID of the managed object A. A subtree can be identified by the OID of the root node of the subtree. For example, the OID of the subtree with the root node being B is the OID of node B –– {1.2.1.1}.
If the number of bits in the subtree mask is smaller than the number of nodes of the OID, the short bits of the subtree mask will be set to 1 during subtree mask-OID matching.
Select Device > SNMP from the navigation tree to enter the SNMP configuration page, as shown in Figure 1-4. On the upper part of the page, you can select to enable or disable SNMP and configure parameters such as SNMP version; on the lower part of the page, you can view the SNMP statistics,...
Set the SNMP version run by the system Return to SNMPv1 or SNMPv2c configuration task list SNMPv3 configuration task list. Configuring an SNMP View Select Device > SNMP from the navigation tree, and then click the View tab to enter the page as shown Figure 1-5.
Page 147
SNMP view. After configuring the parameters of a rule, click Add to add the rule into the list box at the lower part of the page. After configuring all rules, click Apply to crate an SNMP view. Note that the view will not be created if you click Cancel.
SNMPv3 configuration task list. Configuring an SNMP Community Select Device > SNMP from the navigation tree, then click the Community tab to enter the page as shown in Figure 1-9. Click Add to enter the Add SNMP Community page as shown in Figure 1-10.
SNMPv1 or SNMPv2c configuration task list. Configuring an SNMP Group Select Device > SNMP from the navigation tree, then click the Group tab to enter the page as shown in Figure 1-11. Click Add to enter the Add SNMP Group page as shown in Figure 1-12.
Page 150
Write View If no write view is configured, the NMS cannot perform the write operations to all MIB objects on the device. Select the notify view of the SNMP group, that is, the view that can send trap messages. Notify View If no notify view is configured, the agent does not send traps to the NMS.
SNMPv3 configuration task list. Configuring an SNMP User Select Device > SNMP from the navigation tree, then click the User tab to enter the page as shown in Figure 1-13. Click Add to enter the Add SNMP User page, as shown in Figure 1-14.
Configuring SNMP Trap Function Select Device > SNMP from the navigation tree, and click the Trap tab to enter the page as shown in Figure 1-15. On the upper part of the page, you can select to enable the SNMP trap function; on the lower part of the page, you can configure target hosts of the SNMP traps.
Page 153
The available security levels are: no authentication no privacy, authentication but no privacy, and authentication and privacy. Security Level When the security model is selected as v1 or v2c, the security level is no authentication no privacy, and cannot be modified. 1-12...
Configuration procedure Configure Agent # Configuration IP addresses for the interfaces. (Omitted) # Enable SNMP. Select Device > SNMP from the navigation tree, and you will enter the Setup page as shown in Figure 1-18. Figure 1-18 Enable SNMP Select the Enable radio box.
Page 155
Figure 1-19 Create an SNMP view (1) Type view1 in the text box. Click Apply to enter the SNMP rule configuration page, as shown in Figure 1-20. Figure 1-20 Create an SNMP view (2) Select the Included radio box. Type the MIB subtree OID interfaces.
Page 156
Click the Group tab and then click Add to enter the page as shown in Figure 1-22. Figure 1-22 Create an SNMP group Type group1 in the text box of Group Name. Select view1 from the Read View drop-down box.
Page 157
Click the Trap tab and enter the page as shown in Figure 1-24. Figure 1-24 Enable the agent to send SNMP traps Select the Enable SNMP Trap check-box. Click Apply. # Add target hosts of SNMP traps. Click Add to enter the page as shown in Figure 1-25.
Page 158
After the above configuration, the NMS can establish an SNMP connection with the agent and query and reconfigure values of objects in the agent MIB. If an idle interface on the agent is shut down or brought up, the NMS will receive a trap information sent by the agent.
Overview The interface statistics module displays statistics information about the packets received and sent through interfaces. Displaying Interface Statistics Select Device > Interface Statistics from the navigation tree to enter the interface statistics display page, as shown in Figure 1-1.
Page 161
Field Description OutUcastPkts Number of unicast packets sent through the interface. OutNUcastPkts Number of non-unicast packets sent through the interface. OutDiscards Number of valid packets discarded in the outbound direction. OutErrors Number of invalid packets sent through the interface.
Page 162
Table of Contents 1 VLAN Configuration ··································································································································1-1 Overview ·················································································································································1-1 Introduction to VLAN ·······················································································································1-1 How VLAN Works····························································································································1-1 VLAN Types ····································································································································1-2 Introduction to Port-Based VLAN ····································································································1-3 Configuring a VLAN ································································································································1-4 Configuration Task List····················································································································1-4 Creating VLANs·······························································································································1-4 Selecting VLANs······························································································································1-5 Modifying a VLAN····························································································································1-6 Modifying Ports································································································································1-8 VLAN Configuration Example ·················································································································1-9...
VLANs, that is, Layer 2 broadcast domains whereby frames are switched between ports assigned to the same VLAN. VLANs are isolated from each other at Layer 2. A VLAN is a bridging domain, and all broadcast traffic is contained within it, as shown in Figure 1-1.
The field is set to 0 by default. The 12-bit VLAN ID field identifies the VLAN the frame belongs to. The VLAN ID range is 0 to 4095. As 0 and 4095 are reserved by the protocol, the VLAN ID range available for assignment is 1 to 4094.
A trunk port allows only traffic of the default VLAN to pass through untagged. Default VLAN (PVID) By default, VLAN 1 is the default VLAN for all ports. However, you can change the default VLAN for a port as required. When doing this, follow these guidelines: Because an access port can join only one VLAN, its default VLAN is the VLAN to which it belongs and cannot be configured.
VLANs, or remove ports from VLANs; configure the link type and PVID of the ports. Creating VLANs Select Network > VLAN from the navigation tree and click Create to enter the page for creating VLANs, as shown in Figure 1-4.
VLAN configuration task list (approach Return to VLAN configuration task list (approach II). Selecting VLANs Select Network > VLAN from the navigation tree. The Select VLAN tab is displayed by default for you to select VLANs, as shown in Figure 1-5.
VLAN ID(s) to be displayed. Return to VLAN configuration task list (approach Modifying a VLAN Select Network > VLAN from the navigation tree and click Modify VLAN to enter the page for modifying a VLAN, as shown in Figure 1-6.
Page 169
VLANs. Modify the description string of the selected VLAN. Modify Description By default, the description string of a VLAN is its VLAN ID, such as VLAN 0001. Set the member type of the port to be modified in the VLAN...
Modifying Ports Select Network > VLAN from the navigation tree and click Modify Port to enter the page for modifying ports, as shown in Figure 1-7. Figure 1-7 The Modify Port tab Table 1-6 describes the configuration items of modifying ports.
Configure Switch A # Configure GigabitEthernet 1/0/1 as a trunk port and configure VLAN 100 as its default VLAN. Select Device > Port Management from the navigation tree and click Setup to enter the page for setting ports, as shown in Figure 1-9.
Page 172
Select GigabitEthernet 1/0/1 on the chassis front device panel. Click Apply. # Create VLAN 2, VLAN 6 through VLAN 50, and VLAN 100. Select Network > VLAN from the navigation tree and click Create to enter the page for creating VLANs, as shown in Figure 1-10.
Page 173
Click Select VLAN to enter the page for selecting VLANs, as shown in Figure 1-11. Figure 1-11 Set a VLAN range Select the radio button before Display a subnet of all configured VLANs and type 1-100 in the text box. 1-11...
Page 174
Click Select. Click Modify VLAN to enter the page for modifying the ports in a VLAN, as shown in Figure 1-12. Figure 1-12 Assign GigabitEthernet 1/0/1 to VLAN 100 as an untagged member Select 100 – VLAN 0100 in the Please select a VLAN to modify: drop-down list.
Click Modify Port to enter the page for modifying the VLANs to which a port belongs, as shown in Figure 1-14. Figure 1-14 Assign GigabitEthernet 1/0/1 to VLAN 2, and VLAN 6 through VLAN 50 as a tagged member Select GigabitEthernet 1/0/1 on the chassis front device panel.
Page 176
Table of Contents 1 VLAN Interface Configuration ··················································································································1-1 Overview ·················································································································································1-1 Configuring VLAN Interfaces ··················································································································1-1 Configuration Task List····················································································································1-1 Creating a VLAN Interface ··············································································································1-1 Modifying a VLAN Interface·············································································································1-3...
For each VLAN, you can create one VLAN interface. You can assign the VLAN interface an IP address and specify it as the gateway of the VLAN to forward the traffic destined for an IP network segment different from that of the VLAN.
Page 178
VLAN interface. Table 1-2 Configuration items of creating a VLAN interface Item Description Input the ID of the VLAN interface to be created. Before creating a VLAN Input a VLAN ID: interface, make sure that the corresponding VLAN exists. DHCP Configure the way in which the VLAN interface gets an IPv4 address.
Page 179
Apply button to submit the modification. After you change the IP address of the VLAN interface you are using to log in to the device, you will be disconnected from the device. You can use the changed IP address to re-log in.
Page 180
Manual option. Manual Select Up or Down in the Admin Status drop-down list to bring up or shut down the selected VLAN interface. When the VLAN interface fails, you can shut down and then bring up the Modif VLAN interface, which may restore it.
Page 181
Configuring Voice VLAN on a Port ··································································································1-6 Adding OUI Addresses to the OUI List····························································································1-7 Voice VLAN Configuration Examples ·····································································································1-8 Configuring Voice VLAN on a Port in Automatic Voice VLAN Assignment Mode···························1-8 Configuring a Voice VLAN on a Port in Manual Voice VLAN Assignment Mode··························1-13 Configuration Guidelines·······················································································································1-18...
Voice VLAN Assignment Modes A port connected to a voice device, an IP phone for example, can be assigned to a voice VLAN in one of these two modes: Automatic mode and manual mode. Ports on a same device can be assigned to...
Page 183
You can configure an aging timer for the voice VLAN. The system will remove the port from the voice VLAN when the aging timer expires if no voice packet is received on the port during the aging timer. Assigning ports to and removing ports from a voice VLAN are automatically performed.
MAC address against the OUI addresses configured for the device. If the default VLAN of the port is the voice VLAN and the port works in manual VLAN assignment mode, the port forwards all received untagged packets in the voice VLAN. In normal mode, the voice VLANs are vulnerable to traffic attacks.
Before configuring the voice VLAN, you must create the corresponding VLAN and configure the link type of each port to be assigned to the VLAN. As VLAN 1 is the system-default VLAN, you do not need to create it; however, you cannot configure it as the voice VLAN. For information about port link types, refer to Port Management Configuration.
Table 1-1. Configuring Voice VLAN Globally Select Network > Voice VLAN from the navigation tree, and click the Setup tab on the displayed page to enter the page shown in Figure 1-1. Figure 1-1 Configure voice VLAN Table 1-6 describes the global voice VLAN configuration items.
Configuring voice VLAN on a port working in manual voice VLAN assignment mode. Configuring Voice VLAN on a Port Select Network > Voice VLAN from the navigation tree, and click the Port Setup tab on the displayed page to enter the page shown in Figure 1-2.
Configuring voice VLAN on a port working in manual voice VLAN assignment mode. Adding OUI Addresses to the OUI List Select Network > Voice VLAN from the navigation tree and click the OUI Add tab on the displayed page to enter the page shown in Figure 1-3.
VLAN 2 GE1/0/1 GE1/0/3 VLAN 2 0755-2002 010-1001 OUI: 0011-2200-0000 Mask: ffff-ff00-0000 Configuration procedure # Create VLAN 2. Select Network > VLAN from the navigation tree, and click Create on the displayed page to enter the page shown in Figure 1-5.
Page 190
Figure 1-5 Create VLAN 2 Type in VLAN ID 2. Click Create. # Configure GigabitEthernet 1/0/1 as a hybrid port. Select Device > Port Management from the navigation tree, and click Setup on the displayed page to enter the page shown in Figure 1-6.
Page 191
Select GigabitEthernet 1/0/1 from the chassis front panel. Click Apply. # Configure the voice VLAN function globally. Select Network > Voice VLAN from the navigation tree and click the Setup tab on the displayed page to enter the page shown in Figure 1-7.
Page 192
Select Enable in the Voice VLAN security drop-down list. (You can skip this step, because the voice VLAN security mode is enabled by default) Set the voice VLAN aging timer to 30 minutes. Click Apply. # Configure voice VLAN on GigabitEthernet 1/0/1.
Page 193
Select FFFF-FF00-0000 in the Mask drop-down list. Type in description string test. Click Apply. Verify the configuration When the configurations described above are completed, the OUI Summary tab is displayed by default, as shown in Figure 1-10. You can view the information about the newly-added OUI address.
GE1/0/1 GE1/0/3 VLAN 2 0755-2002 010-1001 OUI: 0011-2200-0000 Mask: ffff-ff00-0000 Configuration procedure # Create VLAN 2. Select Network > VLAN from the navigation tree, and click Create on the displayed page to enter the page shown in Figure 1-13. 1-13...
Page 195
Type in VLAN ID 2. Click Create. # Configure GigabitEthernet 1/0/1 as a hybrid port and configure its default VLAN as VLAN 2. Select Device > Port Management from the navigation tree, and click Setup on the displayed page to enter the page shown in Figure 1-14.
Page 196
Select GigabitEthernet 1/0/1 from the chassis front panel. Click Apply. # Assign GigabitEthernet 1/0/1 to VLAN 2 as an untagged member. Select Network > VLAN from the navigation tree, and click Modify Port on the displayed page to enter the page shown in Figure 1-15.
Page 197
Figure 1-16 Configuration progress dialog box After the configuration process is complete, click Close. # Configure voice VLAN on GigabitEthernet 1/0/1. Select Network > Voice VLAN from the navigation tree, and click Port Setup on the displayed page to enter the page shown in Figure 1-17.
Page 198
Select GigabitEthernet 1/0/1 on the chassis front panel. Click Apply. # Add OUI addresses to the OUI list. Click the OUI Add tab to enter the page shown in Figure 1-18. Figure 1-18 Add OUI addresses to the OUI list Type in OUI address 0011-2200-0000.
1-20, where you can view the current voice VLAN information. Figure 1-20 Current voice VLAN information Configuration Guidelines When configuring the voice VLAN function, follow these guidelines: To remove a VLAN functioning as a voice VLAN, disable its voice VLAN function first. 1-18...
Page 200
In automatic voice VLAN assignment mode, a hybrid port can process only tagged voice traffic. However, the protocol-based VLAN function requires hybrid ports to process untagged traffic. Therefore, if a VLAN is configured as the voice VLAN and a protocol-based VLAN at the same time, the protocol-based VLAN cannot be associated with the port.
Page 201
Table of Contents 1 MAC Address Configuration ····················································································································1-1 Overview ·················································································································································1-1 Configuring MAC Addresses···················································································································1-2 Configuring a MAC Address Entry ··································································································1-2 Setting the Aging Time of MAC Address Entries ············································································1-4 MAC Address Configuration Example ····································································································1-5...
Dynamic entries can be manually configured or dynamically learned and will age out. The following is how your device learns a MAC address after it receives a frame from a port, port A for example: Checks the frame for the source MAC address (MAC-SOURCE for example).
Broadcast mode: If the device receives a frame with the destination address being all Fs, or no entry matches the destination MAC address, the device broadcasts the frame to all the ports except the receiving port. Figure 1-1 MAC address table of the device...
Page 204
Figure 1-2 The MAC tab Figure 1-3 Create a MAC address entry Table 1-1 shows the detailed configuration of creating a MAC address entry.
Set the port to which the MAC address belongs Setting the Aging Time of MAC Address Entries Select Network > MAC from the navigation tree, and then select the Setup tab to enter the page for setting the MAC address entry aging time, as shown in Figure 1-4.
MAC address 00e0-fc35-dc71 under GigabitEthernet 1/0/1 in VLAN 1. Configuration procedure # Create a static MAC address entry. Select Network > MAC from the navigation tree to enter the MAC tab, and then click Add, as shown in Figure 1-2. The page shown in Figure 1-5 appears.
Page 207
Implementation of MSTP on Devices ····························································································1-14 Protocols and Standards ···············································································································1-15 Configuring MSTP·································································································································1-15 Configuration Task List··················································································································1-15 Configuring an MST Region ··········································································································1-15 Configuring MSTP Globally ···········································································································1-16 Configuring MSTP on a Port ·········································································································1-19 Displaying MSTP Information of a Port ·························································································1-21 MSTP Configuration Example···············································································································1-23 Guidelines ·············································································································································1-28...
STP, RSTP, and MSTP and the relationship among them. Introduction to STP STP was developed based on the 802.1d standard of IEEE to eliminate loops at the data link layer in a local area network (LAN). Devices running this protocol detect loops in the network by exchanging information with one another and eliminate loops by selectively blocking certain ports to prune the loop structure into a loop-free tree structure.
Page 209
Root port On a non-root bridge, the port nearest to the root bridge is called the root port. The root port is responsible for communication with the root bridge. Each non-root bridge has one and only one root port. The root bridge has no root port.
Upon initialization of a device, each port generates a BPDU with itself as the root bridge, in which the root path cost is 0, designated bridge ID is the device ID, and the designated port is the local port. Selection of the optimum configuration BPDU Each device sends out its configuration BPDU and receives configuration BPDUs from other devices.
Page 211
If all the configuration BPDUs have the same root bridge ID, their root path costs are compared. Assume that the root path cost in a configuration BPDU plus the path cost of a receiving port is S. The configuration BPDU with the smallest S value has the highest priority.
Page 212
Figure 1-2, assume that the priority of Device A is 0, the priority of Device B is 1, the priority of Device C is 2, and the path costs of these links are 5, 10 and 4 respectively. Figure 1-2 Network diagram for the STP algorithm Initial state of each device The following table shows the initial state of each device.
Page 213
Port AP1 receives the configuration BPDU of Device B {1, 0, 1, BP1}. Device A finds that the configuration BPDU of the local port {0, 0, 0, AP1} is superior to the received configuration BPDU, and therefore discards the received configuration BPDU.
Page 214
Device B to Device C going down. After the comparison processes described in the table above, a spanning tree with Device A as the root bridge is established as shown in Figure 1-3.
Page 215
A path failure can cause spanning tree re-calculation to adapt the spanning tree structure to the change. However, the resulting new configuration BPDU cannot propagate throughout the network immediately. If the newly elected root ports and designated ports start to forward data right away, a temporary loop is likely to occur.
STP does not support rapid state transition of ports. A newly elected root port or designated port must wait twice the forward delay time before transiting to the forwarding state, even if it is a port on a point-to-point link or an edge port, which directly connects to a user terminal rather than to another device or a shared LAN segment.
VLAN 2,3 mapped to instance 2 Other VLANs mapped to CIST MST region A multiple spanning tree region (MST region) consists of multiple devices in a switched network and the network segments among them. These devices have the following characteristics: All are MSTP-enabled,...
Page 218
Regional root bridge The root bridge of the IST or an MSTI within an MST region is the regional root bridge of the IST or the MSTI. Based on the topology, different spanning trees in an MST region may have different regional roots.
Page 219
MST region to the common root bridge. If the region is seen as a node, the master port is the root port of the region on the CST. The master port is a root port on IST/CIST and still a master port on the other MSTIs.
Page 220
1-5, devices A, B, C, and D constitute an MST region. Port 1 and port 2 of device A are connected to the common root bridge, port 5 and port 6 of device C form a loop, port 3 and port 4 of Device D are connected downstream to the other MST regions.
The calculation of a CIST tree is also the process of configuration BPDU comparison. During this process, the device with the highest priority is elected as the root bridge of the CIST. MSTP generates an IST within each MST region through calculation, and, at the same time, MSTP regards each MST region as a single device and generates a CST among these MST regions through calculation.
Information of a Port port belongs, and the path cost and priority of the port. Configuring an MST Region Select Network > MSTP from the navigation tree to enter the page as shown in Figure 1-6. Figure 1-6 MST region...
MSTIs based on the modulo value. Return to MSTP configuration task list. Configuring MSTP Globally Select Network > MSTP from the navigation tree, and then click Global to enter the page for configuring MSTP globally, as shown in Figure 1-8. 1-16...
Page 224
STP-compatible mode when detecting that it is connected with a device running STP. The working mode is RSTP by default. Set the maximum number of hops in an MST region to restrict the region size. Max Hops The setting can take effect only when it is configured on the regional root bridge.
Page 225
Instance Set the role of the device in the MSTI or the bridge priority of the device, which is one of the factors deciding whether the device can be elected as the root bridge.
Configuring MSTP on a Port Select Network > MSTP from the navigation tree, and then click Port Setup to enter the page for configuring MSTP on ports, as shown in Figure 1-9. Figure 1-9 MSTP configuration on a port Table 1-10 describes the configuration items of configuring MSTP on a port.
Page 227
If a port is configured as connecting to a point-to-point link, the setting takes effect for the port in all MSTIs. If the physical link to which the port connects is not a point-to-point link and you force it to be a point-to-point link by configuration, the configuration may incur a temporary loop.
Return to MSTP configuration task list. Displaying MSTP Information of a Port Select Network > MSTP from the navigation tree, and then click Port Summary to enter the page shown in Figure 1-10. Figure 1-10 The Port Summary tab...
Page 229
MSTI 0 (when STP is enabled globally) or the STP status and statistics (when STP is not enabled globally), the MSTI to which the port belongs, and the path cost and priority of the port in the MSTI.
VLAN 10 and VLAN 20 are terminated on the distribution layer devices, and VLAN 30 is terminated on the access layer devices, so the root bridges of MSTI 1 and MSTI 2 are Switch A and Switch B respectively, while the root bridge of MSTI 3 is Switch C.
Page 231
Figure 1-11 Network diagram for MSTP configuration “Permit:“ next to a link in the figure is followed by the VLANs the packets of which are permitted to pass this link. Configuration procedure Configure Switch A. # Configure an MST region.
Page 232
Click Apply to map VLAN 10 to MSTI 1 and add the VLAN-to-MSTI mapping entry to the VLAN-to-MSTI mapping list. Repeat the steps above to map VLAN 20 to MSTI 2 and VLAN 30 to MSTI 3 and add the VLAN-to-MSTI mapping entries to the VLAN-to-MSTI mapping list.
Page 233
Set the Root Type field to Primary. Click Apply. Configure Switch B. # Configure an MST region. (The procedure here is the same as that of configuring an MST region on Switch A.) # Configure MSTP globally. Select Network > MSTP from the navigation tree, and then click Global to enter the page for configuring MSTP globally.
Page 234
Set the Root Type field to Primary. Click Apply. Configure Switch C. # Configure an MST region. (The procedure here is the same as that of configuring an MST region on Switch A.) # Configure MSTP globally. Select Network > MSTP from the navigation tree, and then click Global to enter the page for configuring MSTP globally.
If the device is not enabled with BPDU guard, when a boundary port receives a BPDU from another port, it transits into a non-boundary port. To restore its port role as a boundary port, you need to restart the port.
Page 236
Configure ports that are directly connected to terminals as boundary ports and enable BPDU guard for them. In this way, these ports can rapidly transit to the forwarding state, and the network security can be ensured. 1-29...
Page 237
1 Link Aggregation and LACP Configuration ····························································································1-1 Overview ·················································································································································1-1 Basic Concepts of Link Aggregation ·······························································································1-1 Link Aggregation Modes··················································································································1-3 Load Sharing Mode of an Aggregation Group ················································································1-4 Configuring Link Aggregation and LACP ································································································1-4 Configuration Task List····················································································································1-4 Creating a Link Aggregation Group·································································································1-5 Displaying Information of an Aggregate Interface ···········································································1-7...
If the aggregate interface is a Layer 2 interface, a Layer 2 aggregation group is created. You can assign only Layer 2 Ethernet interfaces to the group.
Page 239
The rate of an aggregate interface is the sum of the selected member ports’ rates. The duplex mode of an aggregate interface is consistent with that of the selected member ports. Note that all selected member ports use the same duplex mode.
A port that joins the aggregation group after the limit on the number of selected ports has been reached will not be placed in the selected state even if it should be in normal cases. This can prevent the ongoing traffic on the current selected ports from being interrupted.
Compare the system ID (comprising the system LACP priority and the system MAC address) of the actor with that of the partner. The system with the lower LACP priority wins out. If they are the same, compare the system MAC addresses. The system with the smaller MAC address wins out.
Displaying Information of LACP-Enabled Ports LACP-enabled ports and the corresponding remote (partner) ports. Creating a Link Aggregation Group Select Network > Link Aggregation from the navigation tree, and then click Create to enter the page as shown in Figure 1-1.
Page 243
Assign an ID to the link aggregation group to be created. Enter Link Aggregation Interface You can view the result in the Summary list box at the bottom of the page. Set the type of the link aggregation interface to be created:...
Return to Static aggregation group configuration task list. Return to Dynamic aggregation group configuration task list. Setting LACP Priority Select Network > LACP from the navigation tree, and then click Setup to enter the page shown in Figure 1-3.
Set the LACP priority of the local system Return to Dynamic aggregation group configuration task list. Displaying Information of LACP-Enabled Ports Select Network > LACP from the navigation tree. The Summary tab is displayed by default, as shown Figure 1-4.
Page 246
Figure 1-4 Display the information of LACP-enabled ports The upper part of the page displays a list of all LACP-enabled ports on the device and information about them. To view information about the partner port of a LACP-enabled port, select it in the port list, and then click View Details.
As shown in Figure 1-5, Switch A and Switch B are connected to each other through their Layer 2 Ethernet ports GigabitEthernet 1/0/1 through GigabitEthernet 1/0/3. Aggregate the ports on each device to form a link aggregation group, thus balancing incoming/outgoing traffic across the member ports.
Page 248
You can create a static or dynamic link aggregation group to achieve load balancing. Approach 1: Create a static link aggregation group # Create static link aggregation group 1. Select Network > Link Aggregation from the navigation tree, and then click Create to enter the page as shown in Figure 1-6.
Follow these guidelines when configuring a link aggregation group: In an aggregation group, the port to be a selected port must be the same as the reference port in port attributes, and class-two configurations. To keep these configurations consistent, you should configure the port manually.
Page 250
Reference port: Select a port as the reference port from the ports that are in up state and with the same class-two configurations as the corresponding aggregate interface. The selection order is as follows: full duplex/high speed, full duplex/low speed, half duplex/high speed, and half duplex/low speed, with full duplex/high speed being the most preferred.
Page 251
Configuring LLDP Settings on Ports································································································1-8 Configuring Global LLDP Setup ····································································································1-12 Displaying LLDP Information for a Port ·························································································1-14 Displaying Global LLDP Information ·····························································································1-19 Displaying LLDP Information Received from LLDP Neighbors ·····················································1-20 LLDP Configuration Examples··············································································································1-20 LLDP Basic Settings Configuration Example ················································································1-20 CDP-Compatible LLDP Configuration Example············································································1-25...
This calls for a standard configuration exchange platform. To address the needs, the IETF drafted the Link Layer Discovery Protocol (LLDP) in IEEE 802.1AB. The protocol operates on the data link layer to exchange device information between directly connected devices.
Page 253
Field Description The MAC address of the sending port. If the port does not have a MAC Source MAC address address, the MAC address of the sending bridge is used. Type The Ethernet type for the upper layer protocol. It is 0x88CC for LLDP.
Page 254
An LLDPDU can carry up 28 types of TLVs, of which the chassis ID TLV, port ID TLV, TTL TLV, and end of LLDPDU TLV (end TLV in the figure) are mandatory TLVs that must be carried and other TLVs are optional.
Page 255
LLDP-MED TLVs provide multiple advanced applications for voice over IP (VoIP), such as basic configuration, network policy configuration, and address and directory management. LLDP-MED TLVs satisfy the voice device vendors’ requirements for cost effectiveness, ease of deployment, and ease of management. In addition, LLDP-MED TLVs make deploying voice devices in Ethernet easier.
Disable mode. A port in this mode does not send or receive LLDPDUs. Each time the LLDP operating mode of a port changes, its LLDP protocol state machine re-initializes. To prevent LLDP from being initialized too frequently at times of frequent operating mode change, an initialization delay, which is user configurable, is introduced.
An LLDP-enabled port operating in TxRx mode or Rx mode checks the TLVs carried in every LLDPDU it receives for validity violation. If valid, the information is saved and an aging timer is set for it based on the time to live (TTL) TLV carried in the LLDPDU. If the TTL TLV is zero, the information is aged out immediately.
Figure 1-4. This tab displays the enabling status and operating mode of LLDP on a port. Select one or more ports and click Enable beneath the port list to enable LLDP on them. To disable LLDP on a port, select the port and click Disable.
Page 259
Return to LLDP Configuration Task List. Configuring LLDP Settings on Ports Select Network > LLDP from the navigation tree to enter the Port Setup tab, as shown in Figure 1-4. You can configure LLDP settings on ports individually or in batch.
Page 260
1-5, you can modify or view the LLDP settings of the port. Figure 1-5 The page for modifying LLDP settings on a port To configure LLDP settings on ports in batch, select one or more ports and click Modify Selected. The page shown in Figure 1-6...
Page 261
Figure 1-6 The page for modifying LLDP settings on ports in batch Table 1-8 describes the port LLDP configuration items. Table 1-8 Port LLDP configuration items Item Description Interface Name Displays the name of the port or ports you are configuring.
Page 262
To enable LLDP to be compatible with CDP on the port, you must enable CDP compatibility on the Global Setup tab and set the CDP operating mode on the port to TxRx. Enable LLDP polling and set the polling interval.
Page 263
Return to LLDP Configuration Task List. Configuring Global LLDP Setup Select Network > LLDP from the navigation tree and click Global Setup tab to enter the page shown in Figure 1-7. 1-12...
Page 264
Select from the dropdown list to enable or disable CDP compatibility of LLDP. To enable LLDP to be compatible with CDP on a port, you must set the CDP Compatibility CDP work mode (or the CDP operating mode) on the port to TxRx in addition to enabling CDP compatibility on the Global Setup tab.
Page 265
Select Network > LLDP from the navigation tree to enter the Port Setup tab, as shown in Figure 1-4. In the port list click a port name to display its LLDP information at the lower half of the page. The LLDP 1-14...
Page 266
Voice Voice signaling Guest voice Media policy type Guest voice signaling Soft phone voice Videoconferencing Streaming video Video signaling The type of PSE power source advertised by the local device, which can be PoE PSE power Primary source Backup 1-15...
Page 267
Chassis type MAC address Network address Interface name Locally assigned, namely, local configuration Chassis ID depending on the chassis type, which can be a MAC Chassis ID address of the device Port ID type, which can be Interface alias Port component...
Page 268
The support of the neighbor for link aggregation Link aggregation enabled The enable status of link aggregation on the neighbor Link aggregation group ID. It is 0 if the neighbor port is not assigned Aggregation port ID to any link aggregation group.
Page 269
Field Description Asset ID advertised by the neighbor. This ID is used for the purpose Asset tracking identifier of inventory management and asset tracking. The type of PSE power source advertised by the neighbor, which can PoE PSE power source...
Page 270
Displaying Global LLDP Information Select Network > LLDP from the navigation tree, and click the Global Summary tab to display global local LLDP information and statistics, as shown in Figure 1-12. Figure 1-12 The Global Summary tab Table 1-12 describes the global LLDP information.
Return to LLDP Configuration Task List. Displaying LLDP Information Received from LLDP Neighbors Select Network > LLDP from the navigation tree and click the Neighbor Summary tab to display the global LLDP neighbor information, as shown in Figure 1-13. Figure 1-13 The Neighbor Summary tab...
Page 272
Ethernet ports.) # Set the LLDP operating mode to Rx on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2. Select Network > LLDP from the navigation tree to enter the Port Setup tab, as shown in Figure 1-15. Select port GigabitEthernet1/0/1 and GigabitEthernet1/0/2 and click Modify Selected. The...
Page 273
Figure 1-16 The page for setting LLDP on multiple ports Select Rx from the LLDP Operating Mode dropdown list. Click Apply. # Enable global LLDP. Click the Global Setup tab, as shown in Figure 1-17. Figure 1-17 The Global Setup tab...
Page 274
# Enable LLDP on port GigabitEthernet 1/0/1. (Optional. By default, LLDP is enabled on Ethernet ports.) # Set the LLDP operating mode to Rx on GigabitEthernet 1/0/1. Select Network > LLDP from the navigation tree to enter the Port Setup tab, as shown in Figure 1-18.
Page 275
Click the GigabitEthernet1/0/2 port name in the port list. Click the Status Information tab at the lower half of the page. The output shows that port GigabitEthernet 1/0/2 is connected to a non-MED neighbor device, that is, Switch B, as shown in Figure 1-20.
1-22, port GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 of Switch A are each connected to a Cisco IP phone. On Switch A configure VLAN 2 as a voice VLAN and configure CDP-compatible LLDP to enable the Cisco IP phones to automatically configure the voice VLAN, thus confining their voice traffic within the voice VLAN to be separate from other types of traffic.
Page 277
# Configure the voice VLAN function on the two ports. Select Network > Voice VLAN from the navigation bar and click the Port Setup tab to enter the page for configuring the voice VLAN function on ports, as shown in Figure 1-25.
Page 278
# Enable LLDP on ports GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2. If LLDP is enabled (the default), skip this step. # Set both the LLDP operating mode and the CDP operating mode to TxRx on ports GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2.
Page 280
Figure 1-27 The page for modifying LLDP settings on ports Select TxRx from the LLDP Operating Mode dropdown list. Select TxRx from the CDP Operating Mode dropdown list. Click Apply. # Enable global LLDP and CDP compatibility of LLDP. Click the Global Setup tab, as shown in Figure 1-28.
Configuration verification # Display information about LLDP neighbors on Switch A. Display information about LLDP neighbors on Switch A after completing the configuration. You can see that Switch A has discovered the Cisco IP phones attached to ports GigabitEthernet1/0/1 and GigabitEthernet1/0/2 and obtained their device information.
1-1, when IGMP snooping is not running on the switch, multicast packets are flooded to all devices at Layer 2. However, when IGMP snooping is running on the switch, multicast packets for known multicast groups are multicast to the receivers, rather than broadcast to all hosts, at Layer 2.
IGMP snooping related ports include: Router port: A router port is a port on an Ethernet switch that leads the switch towards the Layer 3 multicast device (DR or IGMP querier). In the figure, GigabitEthernet 1/0/1 of Switch A and GigabitEthernet 1/0/1 of Switch B are router ports.
Page 285
The switch resets the aging timer for the receiving port if the port is in the router port list; The switch adds the receiving port to the router port list if it is not in the list and starts the aging timer for the port.
If the forwarding table entry does not exist or if its outgoing port list does not contain the port, the switch discards the IGMP leave group message instead of forwarding it to any port.
IGMP snooping is enabled in the VLAN. Display IGMP Snooping Optional Multicast Entry Information Enabling IGMP snooping Globally Select Network > IGMP Snooping in the navigation tree to enter the basic configuration page shown in Figure 1-3. Figure 1-3 Basic IGMP snooping configurations Table 1-2...
IGMP snooping configuration task list. Configuring IGMP Snooping in a VLAN Select Network > IGMP Snooping in the navigation tree to enter the basic configuration page shown in Figure 1-3. Click the icon corresponding to the VLAN to enter the page you can configure IGMP...
Return to IGMP snooping configuration task list. Configuring IGMP Snooping Port Functions Select Network > IGMP Snooping in the navigation tree to enter the basic configuration page and then click the Advanced tab to enter the page shown in Figure 1-5.
Fast Leave function helps improve bandwidth and resource usage. If fast leave is enabled for a port to which more than one host is attached, when one host leaves a multicast group, the other hosts listening to the same multicast group will fail to receive multicast data.
1-8, Router A connects to a multicast source (Source) through Ethernet 1/2, and to Switch A through Ethernet 1/1. The multicast source sends multicast data to group 224.1.1.1. Host A is a receiver of the multicast group. IGMPv2 runs on Router A and IGMP snooping version 2 runs on Switch A.
Configure Switch A # Create VLAN 100 and add GigabitEthernet 1/0/1 through GigabitEthernet 1/0/3 to VLAN 100. Select Network > VLAN in the navigation tree and click the Create tab to enter the configuration page shown in Figure 1-9.
Page 293
Figure 1-9 Create VLAN 100 Type the VLAN ID 100. Click Apply to complete the operation. Click the Modify Port tab to enter the configuration page shown in Figure 1-10. 1-11...
Page 294
Type the VLAN ID 100. Click Apply to complete the operation. # Enable IGMP snooping globally. Select Network > IGMP snooping in the navigation tree to enter the basic configuration page and perform the following as shown in Figure 1-11.
Page 295
Figure 1-11 Enable IGMP snooping globally Select Enable and click Apply to globally enable IGMP snooping. # In VLAN 100, enable IGMP snooping and the function of dropping unknown multicast data. Click the icon corresponding to VLAN 100 to enter its configuration page and perform the...
Page 296
Select Network > IGMP Snooping in the navigation tree to enter the basic configuration page. Click the plus sign (+) in front of Show Entries in the basic VLAN configuration page to display information about IGMP snooping multicast entries, as shown in Figure 1-14.
Page 297
(0.0.0.0, 224.1.1.1) to view details about this entry, as shown in Figure 1-15. Figure 1-15 Details about an IGMP snooping multicast entry As shown above, GigabitEthernet 1/0/3 of Switch A is listening to multicast streams destined for multicast group 224.1.1.1. 1-15...
Routing Table Routers forward packets through a routing table. Each entry in the table specifies which physical interface a packet should go out to reach the next hop (the next router) or the directly connected destination. Routes in a routing table fall into three categories by origin: Direct routes: Routes discovered by data link protocols, also known as interface routes.
A router selects the default route when it cannot find any matching entry in the routing table for a packet. If there is no default route, the packet will be discarded and an ICMP packet will be sent to the source to report that the destination is unreachable.
Creating an IPv4 Static Route Select Network > IPv4 Routing from the navigation tree and click the Create tab to enter the IPv4 static route configuration page, as shown in Figure 1-2.
Configuration outlines On Switch A, configure a default route with Switch B as the next hop. On Switch B, configure one static route with Switch A as the next hop and the other with Switch C as the next hop.
Page 303
# Configure a static route to Switch A and Switch C respectively on Switch B. After you log in to the Web interface of Switch B, select Network > IPv4 Routing from the navigation tree and then click the Create tab to enter the page shown in Figure 1-5.
Page 304
# Configure a default route to Switch B on Switch C. After you log in to the Web interface of Switch C, select Network > IPv4 Routing from the navigation tree and then click the Create tab to enter the page as shown in Figure 1-6.
Page 305
Verify the configuration # Display the route table. Enter the IPv4 route page of Switch A, Switch B, and Switch C respectively to verify that the newly configured static routes are displayed as active routes on the page. # Use the ping command for verification.
When configuring a static route, the static route does not take effect if you specify the next hop address first and then configure it as the IP address of a local interface, such as a VLAN interface. When specifying the output interface, note that: If NULL 0 interface is specified as the output interface, there is no need to configure the next hop address.
Page 307
Application Environment··················································································································2-1 Fundamentals··································································································································2-1 DHCP Relay Agent Configuration Task List ···························································································2-2 Enabling DHCP and Configuring Advanced Parameters for the DHCP Relay Agent ····························2-3 Creating a DHCP Server Group··············································································································2-4 Enabling the DHCP Relay Agent on an Interface ···················································································2-5 Configuring and Displaying Clients' IP-to-MAC Bindings ·······································································2-6 DHCP Relay Agent Configuration Example····························································································2-6...
Dynamic Host Configuration Protocol (DHCP) was introduced to solve these problems. DHCP is built on a client-server model, in which a client sends a configuration request and then the server returns a reply to send configuration parameters such as an IP address to the client.
Automatic allocation: DHCP assigns a permanent IP address to a client. Dynamic allocation: DHCP assigns an IP address to a client for a limited period of time, which is called a lease. Most DHCP clients obtain their addresses in this way.
The leftmost bit is defined as the BROADCAST (B) flag. If this flag is set to 0, the DHCP server sent a reply back by unicast; if this flag is set to 1, the DHCP server sent a reply back by broadcast.
Option 33: Static route option. It specifies a list of classful static routes (the destination addresses in these static routes are classful) that a client should add to its routing table. If Option 121 exists, Option 33 is ignored.
Option 82 is the relay agent option in the option field of the DHCP message. It records the location information of the DHCP client. When a DHCP relay agent or DHCP snooping device receives a client’s request, it adds Option 82 to the request message before forwarding the message to the server.
DHCP relay agent DHCP client DHCP client DHCP server No matter whether a relay agent exists or not, the DHCP server and client interact with each other in a similar way (see section Dynamic IP Address Allocation Process). The following describes the...
2-2, the DHCP relay agent works as follows: After receiving a DHCP-DISCOVER or DHCP-REQUEST broadcast message from a DHCP client, the DHCP relay agent fills the giaddr field of the message with its IP address and forwards the message to the designated DHCP server in unicast mode.
Enabling DHCP and Configuring Advanced Parameters for the DHCP Relay Agent Select Network > DHCP from the navigation tree to enter the default DHCP Relay page. Enable or disable DHCP in the DHCP Service field. Click Display Advanced Configuration to expand the...
DHCP Relay Agent Configuration Task List. Creating a DHCP Server Group Select Network > DHCP from the navigation tree to enter the default DHCP Relay page shown in Figure 2-3. In the Server Group field, click Add to enter the page shown in Figure 2-4.
List. Enabling the DHCP Relay Agent on an Interface Select Network > DHCP from the navigation tree to enter the default DHCP Relay page shown in Figure 2-3. In the Interface Config field, the DHCP relay agent state of interfaces is displayed. Click the...
Configuring and Displaying Clients' IP-to-MAC Bindings Select Network > DHCP from the navigation tree to enter the default DHCP Relay page shown in Figure 2-3. In the User Information field, click the User Information button to view static and dynamic...
Page 319
Configuration procedure Specify IP addresses for interfaces (omitted) Configure the DHCP relay agent # Enable DHCP. Select Network > DHCP from the navigation tree to enter the default DHCP Relay page. Perform the following operations, as shown in Figure 2-9.
Page 320
Click on the Enable radio button next to DHCP Service. Click Apply. # Configure a DHCP server group. In the Server Group field, click Add and then perform the following operations, as shown in Figure 2-10. Figure 2-10 Add a DHCP server group Type 1 for Server Group ID.
Page 321
Click on the Enable radio button next to DHCP Relay. Select 1 for Server Group ID. Click Apply. Because the DHCP relay agent and server are on different subnets, you need to configure a static route or dynamic routing protocol to make them reachable to each other.
A DHCP snooping enabled device does not work if it is between the DHCP relay agent and DHCP server, and it can work when it is between the DHCP client and relay agent or between the DHCP client and server.
3-1, a DHCP snooping device’s port that is connected to an authorized DHCP server should be configured as a trusted port to forward reply messages from the DHCP server, so that the DHCP client can obtain an IP address from the authorized DHCP server.
Option 82, if any. The handling strategies are described in the table below. If a reply returned by the DHCP server contains Option 82, the DHCP snooping device will remove the Option 82 before forwarding the reply to the client. If the reply contains no Option 82, the DHCP snooping device forwards it directly.
Display clients' IP-to-MAC bindings recorded by DHCP snooping. Bindings Enabling DHCP Snooping Select Network > DHCP from the navigation tree, and then click the DHCP Snooping tab to enter the page shown in Figure 3-3. You can enable or disable DHCP snooping in the DHCP Snooping field.
Configuring DHCP Snooping Functions on an Interface Select Network > DHCP from the navigation tree, and then click the DHCP Snooping tab to enter the page shown in Figure 3-3. You can view trusted and untrusted ports in the Interface Config field. Click...
DHCP-ACK messages received from a trusted port. Figure 3-6 Network diagram for DHCP snooping configuration Configuration procedure # Enable DHCP snooping. Select Network > DHCP from the navigation tree, and then click the DHCP Snooping tab. Perform the following operation, as shown in Figure 3-7.
Page 328
Click on the Enable radio button next to DHCP Snooping. # Configure DHCP snooping functions on GigabitEthernet 1/0/1. Click the icon of GigabitEthernet 1/0/1 on the interface list. Perform the following operations on the DHCP Snooping Interface Configuration page shown in Figure...
Page 329
Click on the Trust radio button next to Interface State. Click Apply. # Configure DHCP snooping functions on GigabitEthernet 1/0/2. Click the icon of GigabitEthernet 1/0/2 on the interface list. Perform the following operations on the DHCP Snooping Interface Configuration page shown in Figure 3-9.
Page 330
Click on the Untrust radio button for Interface State. Click on the Enable radio button next to Option 82 Support. Select Replace for Option 82 Strategy. Click Apply.
Table of Contents 1 Service Management ·································································································································1-1 Overview ·················································································································································1-1 Configuring Service Management···········································································································1-2...
The secure file transfer protocol (SFTP) is a new feature in SSH2.0. SFTP uses the SSH connection to provide secure data transfer. The device can serve as the SFTP server, allowing a remote user to log in to the SFTP server for secure file management and transfer. The device can also serve as an SFTP client, enabling a user to login from the device to a remote device for secure file transfer.
Encrypts the data exchanged between the HTTPS client and the device to ensure the data security and integrity, thus realizing the security management of the device; Defines certificate attribute-based access control policy for the device to control the access right of the client, in order to further avoid attacks from illegal clients.
Page 334
HTTP. Port Number HTTP When you modify a port, ensure that the port is not used by other service. Associates the HTTP service with an ACL. Only the clients that pass the ACL filtering are permitted to use the HTTP service.
Diagnostic Tools Overview Ping You can use the ping function to check whether a device with a specified address is reachable, and to examine network connectivity. A successful execution of the ping command involves the following steps: The source device sends an ICMP echo request (ECHO-REQUEST) to the destination device.
1-1. Figure 1-1 Ping configuration page Type the IPv4 address of the destination device in the Ping text box, and click Start to execute the ping command. You will see the result in the Summary area. Figure 1-2 Ping operation result...
1-3. Figure 1-3 Trace Route configuration page Type the destination IP address in the Trace Route text box, and click Start to execute the trace route command. You will see the result in the Result area, as shown in Figure 1-4.
The Address Resolution Protocol (ARP) is used to resolve an IP address into an Ethernet MAC address (or physical address). In an Ethernet LAN, when a device sends data to another device, it uses ARP to translate the IP address of the destination device to the corresponding MAC address.
1-2. The resolution process is as follows: Host A looks into its ARP table to see whether there is an ARP entry for Host B. If yes, Host A uses the MAC address in the entry to encapsulate the IP packet into a data link layer frame and sends the frame to Host B.
Static ARP entry A static ARP entry is manually configured and maintained. It cannot get aged or be overwritten by a dynamic ARP entry. Using static ARP entries enhances communication security. After a static ARP entry is specified, only a specific MAC address is associated with the specified IP address.
Creating a Static ARP Entry Select Network > ARP Management from the navigation tree to enter the default ARP Table page shown in Figure 1-3. Click Add to enter the New Static ARP Entry page. Select the Advanced Options checkbox to expand advanced configuration items, as shown in Figure 1-4.
Page 344
Figure 1-5 Network diagram for configuring static ARP entries Configuration procedure # Create VLAN 100. Select Network > VLAN from the navigation tree, click the Add tab, and then perform the following operations, as shown in Figure 1-6. Figure 1-6 Create VLAN 100 Type 100 for VLAN ID.
Page 345
Figure 1-8 Configuration progress dialog box After the configuration process is complete, click Close. # Create VLAN-interface 100. Select Network > VLAN Interface from the navigation tree, click the Create tab, and then perform the following operations, as shown in Figure...
Page 346
Select 24 (255.255.255.0) for Mask Length. Click Apply to complete the configuration. # Create a static ARP entry. Select Network > ARP Management from the navigation tree to enter the default ARP Table page. Click Add Perform the following operations, as shown in Figure 1-10.
Introduction to Gratuitous ARP In a gratuitous ARP packet, the sender IP address and the target IP address are both the IP address of the device issuing the packet, the sender MAC address is the MAC address of the device, and the target MAC address is the broadcast address ff:ff:ff:ff:ff:ff.
Page 348
To remove an interface from the Sending Interfaces(Period) list box, Periodical gratuitous ARP select the interface from the list box and click the >> button. packets sending settings This function takes effect only when the link of the interface goes up and an IP address has been assigned to the interface.
2-1, Host A communicates with Host C through a switch. After intercepting the traffic between Host A and Host C, a hacker (Host B) forwards forged ARP replies to Host A and Host C respectively. Upon receiving the ARP replies, the two hosts update the MAC address corresponding to the peer IP address in their ARP tables with the MAC address of Host B (MAC_B).
Page 350
Upon receiving an ARP packet from an ARP trusted port, the device does not check the ARP packet. If ARP detection is not enabled for the VLAN, the ARP packet is not checked even if it is received from an ARP untrusted port.
Page 351
ARP trusted/untrusted port, compares the source IP and MAC addresses of the ARP packet against the static IP-to-MAC bindings. If an entry with a matching IP address but a different MAC address is found, the ARP packet is considered invalid and discarded.
Configuring ARP Detection If both the ARP detection based on specified objects and the ARP detection based on static IP-to-MAC bindings/DHCP snooping entries/802.1X security entries are enabled, the former one applies first, and then the latter applies. Select Network > ARP Anti-Attack from the navigation tree to enter the default ARP Detection page...
If you select Using Static-Binding entries to anti fake gateway attack, you can configure static IP-to-MAC binding entries. To create a static binding entry, type an IP address and MAC address in the Static Bindings field, and then click Add, as shown in Figure 2-2.
Page 354
If an entry with a matching IP address but a different MAC address is found, the ARP packet is considered invalid and discarded. If an entry with both matching IP and MAC addresses is found, the ARP packet is considered valid and can pass the detection.
Page 355
Authentication Process of 802.1X ···································································································1-5 802.1X Timers ·································································································································1-8 802.1X Extensions···························································································································1-9 Features Working Together with 802.1X·························································································1-9 Configuring 802.1X ·······························································································································1-10 Configuration Task List··················································································································1-10 Configuring 802.1X Globally··········································································································1-11 Configuring 802.1X on a Port ········································································································1-12 Configuration Examples ························································································································1-14 802.1X Configuration Example······································································································1-14 ACL Assignment Configuration Example ······················································································1-20 Configuration Guidelines·······················································································································1-28...
Figure 1-1 Architecture of 802.1X Client is an entity seeking access to the LAN. It resides at one end of a LAN segment and is authenticated by Device at the other end of the LAN segment. Client is usually a user-end device such as a PC.
Controlled port and uncontrolled port A device provides ports for clients to access the LAN. Each port can be regarded as a unity of two logical ports: a controlled port and an uncontrolled port. Any packets arriving at the port are visible to both of the logical ports.
EAPOL-Logoff (a value of 0x02) device. Length: Length of the data, that is, length of the Packet body field, in bytes. If the value of this field is 0, no subsequent data field is present. Packet body: Content of the packet. The format of this field depends on the value of the Type field.
The value of the Type field is 79. The String field can be up to 253 bytes long. If the EAP packet is longer than 253 bytes, it can be fragmented and encapsulated into multiple EAP-Message attributes.
EAP relay EAP relay is defined in IEEE 802.1X. In this mode, EAP packets are carried in an upper layer protocol, such as RADIUS, so that they can go through complex networks and reach the authentication server.
Page 361
Port unauthorized When a user launches the 802.1X client software and enters the registered username and password, the 802.1X client software generates an EAPOL-Start frame and sends it to the device to initiate an authentication process. Upon receiving the EAPOL-Start frame, the device responds with an EAP-Request/Identity packet for the username of the client.
Page 362
EAP-Failure packet to the client. In EAP relay mode, a client must use the same authentication method as that of the RADIUS server. On the device, however, you only need to enable EAP relay.
RADIUS server for authentication. 802.1X Timers This section describes the timers used on an 802.1X device to guarantee that the client, the device, and the RADIUS server can interact with each other in a reasonable manner.
If the port link type is Hybrid, the assigned VLAN is allowed to pass the current port without carrying the tag. The default VLAN ID of the port is that of the assigned VLAN. Note that if the Hybrid port is...
With a Hybrid port, the VLAN assignment will fail if you have configured the assigned VLAN to carry tags. With a Hybrid port, you cannot configure an assigned VLAN to carry tags after the VLAN has been assigned. ACL assignment ACLs provide a way of controlling access to network resources and defining access rights.
Configuring 802.1X Globally From the navigation tree, select Authentication > 802.1X to enter the 802.1X configuration page. Click the expansion mark + before Advanced to display the complete 802.1X configuration page, as shown Figure 1-10. In the 802.1X Configuration area, you can view and configure the 802.1X feature globally.
802.1X configuration procedure. Configuring 802.1X on a Port From the navigation tree, select Authentication > 802.1X to enter the 802.1X configuration page, as shown in Figure 1-10. In the Ports With 802.1X Enabled area, the 802.1X configuration on ports are listed.
Page 368
Select the port to be enabled with 802.1X authentication. Port Only ports not enabled with 802.1X authentication are available. Specify the 802.1X port access control method for the port, which can be Port Control MAC Based or Port Based. Specify the 802.1X authorization mode for the port.
Specify the device to try up to five times at an interval of 5 seconds in transmitting a packet to the RADIUS server until it receives a response from the server, and to send real time accounting packets to the accounting server every 15 minutes.
Page 370
Select the check box before Enable 802.1X. Select the authentication method as CHAP. Click Apply to finish the operation. # Enable and configure 802.1X on port GigabitEthernet 1/0/1. In the Ports With 802.1X Enabled area, click Add. Figure 1-14 802.1X configuration of GigabitEthernet 1/0/1...
Page 371
# Configure the RADIUS authentication servers. From the navigation tree, select Authentication > RADIUS. The RADIUS server configuration page appears. Figure 1-15 RADIUS authentication server configuration Perform the following configurations as shown in Figure 1-15. Select Authentication Server as the server type.
Page 372
Select active as the secondary server’s status. Click Apply to finish the operation. # Configure the scheme used for communication between the device and the RADIUS servers. Select the RADIUS Setup tab to enter the RADIUS parameter configuration page. Perform the...
Page 373
From the navigation tree, select Authentication > AAA. The domain setup page appears. Perform the following configurations as shown in Figure 1-18. Figure 1-18 Create an ISP domain Enter test in the Domain Name textbox. Select Enable to use the domain as the default domain.
Page 374
Select system from the Name drop-down list to use it as the authentication scheme. Click Apply. A configuration progress dialog box appears, as shown in Figure 1-20. Figure 1-20 Configuration progress dialog box After the configuration process is complete, click Close.
Figure 1-23, the switch and the RADIUS authentication servers (iMC servers) work together to authenticate the host that is to access the Internet. An FTP server is on the Internet, and its IP address is 10.0.0.1. Configure the authentication server to assign ACL 3000.
Page 376
Configure the IP addresses of the interfaces. (Omitted) Configure the RADIUS scheme system # Configure the RADIUS authentication server. From the navigation tree, select Authentication > RADIUS. The RADIUS server configuration page appears. Figure 1-24 RADIUS authentication server configuration Perform the following configurations as shown in Figure 1-24.
Page 377
Select active as the primary server status. Click Apply to finish the operation. # Configure the scheme to be used for communication between the switch and the RADIUS servers. Select the RADIUS Setup tab to enter the RADIUS parameter configuration page.
Page 378
Click Apply to finish the operation. # Configure the AAA authentication method for the ISP domain. Select the Authentication tab. Figure 1-28 Configure the AAA authentication method for the ISP domain Perform the following configurations as shown in Figure 1-28.
Page 379
Select the Default AuthN checkbox and then select RADIUS as the authentication mode. Select system from the Name drop-down list to use it as the authentication scheme. Click Apply. The configuration progress dialog box appears, as shown in Figure 1-29.
Page 380
Configure an ACL # Create ACL 3000 that denies packets with destination IP address 10.0.0.1. From the navigation tree, select QoS > ACL IPv4 to enter the IPv4 ACL configuration page, and then select the Create tab. Figure 1-32 Create ACL 3000...
Page 381
Select the Rule ID check box, and enter 0 as the rule ID. Select Deny as the operation action. In the IP Address Filter area, select the Destination IP Address check box, and enter 10.0.0.1 in the text box. 1-26...
Page 382
Click Add to finish the operation. Configure the 802.1X feature # Enable the 802.1X feature globally. From the navigation tree, select Authentication > 802.1X to enter the 802.1X configuration page. Figure 1-34 Global 802.1X globally Perform the following configuration as shown in Figure 1-34.
Click Apply to finish the operation. Configuration verification # After the user passes authentication and gets online, use the ping command to test whether ACL 3000 takes effect. From the navigation tree, select Network > Diagnostic Tools. The ping page appears.
Page 384
Introduction to ISP Domain ·············································································································1-2 Configuring AAA······································································································································1-2 Configuration Prerequisites ·············································································································1-2 Configuration Task List····················································································································1-2 Configuring an ISP Domain ·············································································································1-3 Configuring Authentication Methods for the ISP Domain································································1-4 Configuring Authorization Methods for the ISP Domain··································································1-6 Configuring Accounting Methods for the ISP Domain·····································································1-7 AAA Configuration Example ···················································································································1-8...
Figure 1-1 AAA networking diagram When a user tries to establish a connection to the NAS and to obtain the rights to access other networks or some network resources, the NAS authenticates the user or the corresponding connection. The NAS takes the responsibility to transparently pass the user’s AAA information to the server (RADIUS server,...
AAA methods for the ISP domains. For the NAS, each user belongs to an ISP domain. If a user does not provide the ISP domain name, the system considers that the user belongs to the default ISP domain.
Command users. Methods for the ISP of users. Domain By default, all types of users use local accounting. Configuring an ISP Domain Select Authentication > AAA from the navigation tree. The Domain Setup page appears, as shown in Figure 1-2.
Page 388
Return to Configuration Task List. Configuring Authentication Methods for the ISP Domain Select Authentication > AAA from the navigation tree and then select the Authentication tab to enter the authentication method configuration page, as shown in Figure 1-3.
Page 389
Figure 1-3 Authentication method configuration page Table 1-3 describes the configuration items for specifying the authentication methods for an ISP domain. Table 1-3 Authentication method configuration items Item Description Select an ISP Select the ISP domain for which you want to specify authentication methods.
Page 390
Configuring Authorization Methods for the ISP Domain Select Authentication > AAA from the navigation tree and then select the Authorization tab to enter the authorization method configuration page, as shown in Figure 1-4. Figure 1-4 Authorization method configuration page Table 1-4 describes the configuration items for configuring the authorization methods for an ISP domain.
Page 391
Return to Configuration Task List. Configuring Accounting Methods for the ISP Domain Select Authentication > AAA from the navigation tree and then select the Accounting tab to enter the accounting method configuration page, as shown in Figure 1-5. Figure 1-5 Accounting method configuration page Table 1-5 describes the configuration items for configuring the accounting methods for an ISP domain.
Telnet users. Figure 1-6 Network diagram for AAA configuration example Configuration procedure Enable the Telnet server function, and configure the switch to use AAA for Telnet users. The configuration steps are omitted. # Configure IP addresses for the interfaces. (Omitted)
Page 393
Select Device > Users from the navigation tree and then select the Create tab to configure a local user as shown in Figure 1-7. Figure 1-7 Configure a local user Enter telnet as the username. Select Management as the access level.
Page 394
Enter test as the domain name. Click Apply. # Configure the ISP domain to use local authentication. Select Authentication > AAA from the navigation tree and then select the Authentication tab and configure AAA authentication as shown in Figure 1-9.
Page 395
Figure 1-10 Configuration progress dialog box After the configuration process is complete, click Close. # Configure the ISP domain to use local authorization. Select Authentication > AAA from the navigation tree and then select the Authorization tab and configure AAA authorization as shown in Figure 1-11.
Page 396
Click Apply. A configuration progress dialog box appears. After the configuration process is complete, click Close. Now, if you telnet to the switch and enter username telnet@test and password abcd, you should be serviced as a user in domain test.
Page 397
1 RADIUS ·······················································································································································1-1 Overview ·················································································································································1-1 Introduction to RADIUS ···················································································································1-1 Client/Server Model ·························································································································1-1 Security and Authentication Mechanisms ·······················································································1-2 Basic Message Exchange Process of RADIUS ··············································································1-2 RADIUS Packet Format···················································································································1-3 Extended RADIUS Attributes ··········································································································1-5 Protocols and Standards·························································································································1-6 Configuring RADIUS ·······························································································································1-6 Configuration Task List····················································································································1-6 Configuring RADIUS Servers ··········································································································1-7...
RADIUS uses UDP, and its packet format and message transfer mechanism are based on UDP. It uses UDP port 1812 for authentication and 1813 for accounting.
The RADIUS server returns a start-accounting response (Accounting-Response) and starts accounting. The user accesses the network resources. The host requests the RADIUS client to tear down the connection and the RADIUS client sends a stop-accounting request (Accounting-Request) to the RADIUS server.
The user stops access to network resources. RADIUS Packet Format RADIUS uses UDP to transmit messages. It ensures the smooth message exchange between the RADIUS server and the client through a series of mechanisms, including the timer management mechanism, retransmission mechanism, and slave server mechanism.
Page 401
4096. Bytes beyond the length are considered the padding and are neglected upon reception. If the length of a received packet is less than that indicated by the Length field, the packet is dropped. The Authenticator field (16-byte long) is used to authenticate replies from the RADIUS server, and is also used in the password hiding algorithm.
Extended RADIUS Attributes The RADIUS protocol features excellent extensibility. Attribute 26 (Vender-Specific) defined by RFC 2865 allows a vender to define extended attributes to implement functions that the standard RADIUS protocol does not provide. A vendor can encapsulate multiple type-length-value (TLV) sub-attributes in RADIUS packets for extension in applications.
Vendor-ID (four bytes): Indicates the ID of the vendor. Its most significant byte is 0 and the other three bytes contain a code complying with RFC 1700. Vendor-Type: Indicates the type of the sub-attribute. Vendor-Length: Indicates the length of the sub-attribute.
Configure the parameters that are necessary for information exchange Parameters between the device and RADIUS servers. Configuring RADIUS Servers From the navigation tree, select Authentication > RADIUS. The RADIUS server configuration page Figure 1-5. appears, as shown in Figure 1-5 RADIUS server configuration Table 1-4 lists the RADIUS server configuration items.
Page 405
IP address is to be removed, the status is blocked. Return to RADIUS configuration task list. Configuring RADIUS Parameters From the navigation tree, select Authentication > RADIUS and then select the RADIUS Setup tab to enter the RADIUS parameter configuration page, as shown in Figure 1-6.
Page 406
Confirm Accounting Shared Key Specify the source IP address for the device to use in RADIUS packets to be sent to the RADIUS server. It is recommended to use a loopback interface NAS-IP address instead of a physical interface address as the source IP address, because if the physical interface is down, the response packets from the server cannot reach the device.
Page 407
The product of the timeout value and the number of retransmission attempts Times cannot exceed 75. Set the real-time accounting interval, whose value must be n times 3 (n is an integer). To implement real-time accounting on users, it is necessary to set the real-time accounting interval.
On the switch, it is required to configure the shared key for packet exchange with the RADIUS server as expert, and configure the system to remove the domain name of a username before sending it to the RADIUS server.
Page 409
Enter 1813 as the UDP port of the primary accounting server. Select active as the primary server status. Click Apply. # Configure the parameters for communication between the switch and the RADIUS servers. Select the RADIUS Setup tab and perform the following configurations, as shown in Figure 1-10.
Page 410
Figure 1-10 Configure RADIUS parameters Select extended as the server type. Select the Authentication Server Shared Key check box and enter expert in the text box. Enter expert in the Confirm Authentication Shared Key text box. Select the Accounting Server Shared Key check box and enter expert in the text box.
Page 411
Select the domain name test. Select the Default AuthN checkbox and then select RADIUS as the authentication mode. Select system from the Name drop-down list to use it as the authentication scheme. Click Apply. A configuration progress dialog box appears, as shown in Figure 1-13.
Page 412
Select the domain name test. Select the Default AuthZ checkbox and then select RADIUS as the authorization mode. Select system from the Name drop-down list to use it as the authorization scheme. Click Apply. A configuration progress dialog box appears.
RADIUS does not support accounting for FTP users. If the iMC server is used as the RADIUS server, it is necessary to configure accounting as optional for users in the ISP domain because the iMC server does not respond to accounting packets.
Page 414
Table of Contents 1 Users···························································································································································1-1 Overview ·················································································································································1-1 Configuring Users ···································································································································1-1 Configuring a Local User ·················································································································1-1 Configuring a User Group ···············································································································1-3...
All local users in a user group inherit the user attributes of the group, but if you configure user attributes for a local user, the settings of the local user take precedence over the settings for the user group.
Page 416
(accessing through the Ethernet, such as 802.1x users), and SSH. Service-type If you do not specify any service type for a local user who uses local authentication, the user cannot pass authentication and therefore cannot log Specify an expiration time for the local user, in the format HH:MM:SS-YYYY/MM/DD.
Page 417
Currently, switch 2900 series do not support user-profile configuration. Configuring a User Group Select Authentication > Users from the navigation tree, and then select the User Group tab to display the existing user groups, as shown in Figure 1-3. Then, click Add to enter the user group configuration...
Page 418
Specify the VLAN to be authorized to users of the user group after the users VLAN pass authentication. Specify the ACL to be used by the access device to control the access of users of the user group after the users pass authentication. Specify the user profile for the user group.
Page 419
Generating an RSA Key Pair·········································································································1-10 Destroying the RSA Key Pair ········································································································1-11 Retrieving a Certificate ··················································································································1-11 Requesting a Local Certificate ······································································································1-13 Retrieving and Displaying a CRL ··································································································1-14 PKI Configuration Example···················································································································1-15 Configuring a PKI Entity to Request a Certificate from a CA ························································1-15 Configuration Guidelines·······················································································································1-20...
ITU-T_X.509. This manual involves two types of certificates: local certificate and CA certificate. A local certificate is a digital certificate signed by a CA for an entity, while a CA certificate, also known as a root certificate, is signed by the CA for itself.
Figure 1-1 PKI architecture Entity An entity is an end user of PKI products or services, such as a person, an organization, a device like a router or a switch, or a process running on a computer. A certificate authority (CA) is a trusted authority responsible for issuing and managing digital certificates.
Operation of PKI In a PKI-enabled network, an entity can request a local certificate from the CA and the device can check the validity of certificate. The following describes how it works: An entity submits a certificate request to the CA.
Required Create a PKI entity and configure the identity information. A certificate is the binding of a public key and an entity, where an entity is the collection of the identity information of a user. A CA identifies a certificate Creating a PKI applicant by entity.
Required Create a PKI entity and configure the identity information. A certificate is the binding of a public key and an entity, where an entity is the Creating a PKI collection of the identity information of a user. A CA identifies a certificate Entity applicant by entity.
Page 425
Displaying a CRL Retrieve a CRL and display its contents. Creating a PKI Entity Select Authentication > PKI from the navigation tree. The PKI entity list page is displayed by default, as shown in Figure 1-2. Click Add on the page to enter the PKI entity configuration page, as shown in Figure 1-3.
Page 426
Type the IP address of the entity. Type the fully qualified domain name (FQDN) for the entity. An FQDN is a unique identifier of an entity on the network. It consists of a host FQDN name and a domain name and can be resolved to an IP address. For example, www.whatever.com is an FQDN, where www indicates the host name and...
Page 427
CA Identifier responsibility of certificate registration, distribution, and revocation, and query. In offline mode, this item is optional; while in other modes, this item is required. Select the local PKI entity. When submitting a certificate request to a CA, an entity needs to show its Entity Name identity information.
Page 428
Item Description Type the URL of the RA. The entity will submit the certificate request to the server at this URL through the SCEP protocol. The SCEP protocol is intended for communication between an entity and an authentication authority. Requesting URL In offline mode, this item is optional;...
Page 429
Configuration task list for requesting a certificate automatically. Generating an RSA Key Pair Select Authentication > PKI from the navigation tree, and then select the Certificate tab to enter the page displaying existing PKI certificates, as shown in Figure 1-6. Then, click Create Key to enter RSA...
Page 430
You can download an existing CA certificate or local certificate from the CA server and save it locally. To do so, you can use two ways: online and offline. In offline mode, you need to retrieve a certificate by an out-of-band means like FTP, disk, e-mail and then import it into the local PKI system.
Page 431
If the certificate file is saved on the device, select Get File From Device and then specify the path of the file on the device. If the certificate file is saved on a local PC, select Get File From PC and. Get File From PC then specify the path to the file and select the partition of the device for saving the file.
Configuration task list for requesting a certificate automatically. Requesting a Local Certificate Select Authentication > PKI from the navigation tree, and then select the Certificate tab to enter the page displaying existing PKI certificates, as shown in Figure 1-6. Click Request Cert to enter the local...
Retrieving and Displaying a CRL Select Authentication > PKI from the navigation tree, and then select the CRL tab to enter the page displaying CRLs, as shown in Figure 1-13. Figure 1-13 CRL page Click Retrieve CRL to retrieve the CRL of a domain.
Configuration procedure Configure the CA server # Create a CA server named myca. In this example, you need to configure the basic attributes of Nickname and Subject DN on the CA server at first: Nickname: Name of the trusted CA.
Page 435
After the above configuration, make sure that the system clock of the Switch is synchronous to that of the CA, so that the Switch can request certificates and retrieve CRLs properly. Configure Switch # Create a PKI entity. Select Authentication > PKI from the navigation tree. The PKI entity list page is displayed by default.
Page 436
Select the Enable CRL Checking check box. Type http://4.4.4.133:447/myca.crl as the CRL URL. Click Apply. A dialog box appears, asking "Fingerprint of the root certificate not specified. No root certificate validation will occur. Continue?" Click OK. # Generate an RSA key pair.
Page 437
Select the Certificate tab, and then click Create Key, as shown in Figure 1-20, and perform the configuration as shown in Figure 1-21. Figure 1-20 Certificate list Figure 1-21 Generate an RSA key pair Click Apply to generate an RSA key pair.
Page 438
Select torsa as the PKI domain. Select CA as the certificate type. Click Apply. # Request a local certificate. Select the Certificate tab, and then click Request Cert, as shown in Figure 1-24, and then perform the following configurations as shown in Figure 1-25.
PKI entity identity information in a certificate request goes beyond a certain limit, the server will not respond to the certificate request. The SCEP plug-in is required when you use the Windows Server as the CA. In this case, you need to specify RA as the authority for certificate request when configuring the PKI domain.
Table of Contents 1 Port Isolation Group Configuration ·········································································································1-1 Overview ·················································································································································1-1 Configuring a Port Isolation Group··········································································································1-1 Port Isolation Group Configuration Example ··························································································1-2...
Configuring a Port Isolation Group Select Security > Port Isolate Group from the navigation tree and in the page that appears, click the Modify tab to enter the page shown in Figure 1-1.
GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, GigabitEthernet 1/0/3, and GigabitEthernet 1/0/4 belong to the same VLAN. It is required that Host A, Host B, and Host C can access the Internet while being isolated from one another. Figure 1-2 Networking diagram for port isolation group configuration...
Page 443
# View information about the isolation group. Click Summary. The page shown in Figure 1-4 appears. Figure 1-4 Information about port isolation group 1 As shown on the page, port isolation group 1 contains these isolated ports: GigabitEthernet 1/0/2, GigabitEthernet 1/0/3, and GigabitEthernet 1/0/4.
Table of Contents 1 Authorized IP Configuration·····················································································································1-1 Overview ·················································································································································1-1 Configuring Authorized IP ·······················································································································1-1 Authorized IP Configuration Example ·····································································································1-2 Authorized IP Configuration Example ·····························································································1-2...
Authorized IP Configuration Overview The authorized IP function is to associate the HTTP or Telnet service with an ACL to filter the requests of clients. Only the clients that pass the ACL filtering can access the device. Configuring Authorized IP Select Security >...
HTTP requests from Host B. Figure 1-2 Network diagram for authorized IP Configuration procedure # Create an ACL. Select QoS > ACL IPv4 from the navigation tree and then click the Create tab to enter the ACL configuration page shown in Figure 1-3.
Page 447
Type 0.0.0.0 in the Source Wildcard text box. Click Add. # Configure authorized IP. Select Security > Authorized IP from the navigation tree and then click the Setup tab to enter the authorized IP configuration page shown in Figure 1-5.
Page 448
Figure 1-5 Configure authorized IP Make the following configurations on the page: Select 2001 for IPv4 ACL in the Telnet field. Select 2001 for IPv4 ACL in the Web(HTTP) field. Click Apply.
Page 449
Creating an IPv4 ACL······················································································································1-5 Configuring a Rule for a Basic IPv4 ACL ························································································1-5 Configuring a Rule for an Advanced IPv4 ACL ···············································································1-7 Configuring a Rule for an Ethernet Frame Header ACL ·································································1-9 Configuration Guidelines·······················································································································1-11 2 QoS Configuration·····································································································································2-1 Introduction to QoS ·································································································································2-1 Networks Without QoS Guarantee ··································································································2-1...
(ACLs). An ACL is a set of rules (or a set of permit or deny statements) for determining which packets can pass and which ones should be rejected based on matching criteria such as source address, destination address, and port number.
As for the configuration of a rule of an IPv4 ACL, you can specify that the rule applies to non-first fragment packets only, and does not apply to non-fragment packets or the first fragment packets. ACL rules that do not contain this keyword is applicable to both non-fragment packets and fragment packets.
For example, with a step of five, if the biggest number is currently 28, the newly defined rule will get a number of 30. If the ACL has no rule defined already, the first defined rule will get a number of 0.
Configuring a Time Range Select QoS > Time Range from the navigation tree and then select the Create tab to enter the time range configuration page, as shown in Figure 1-1. Figure 1-1 The page for creating a time range Table 1-4 describes the configuration items for creating a time range.
Return to IPv4 ACL configuration task list. Creating an IPv4 ACL Select QoS > ACL IPv4 from the navigation tree and then select the Create tab to enter the IPv4 ACL configuration page, as shown in Figure 1-2. Figure 1-2 The page for creating an IPv4 ACL Table 1-5 describes the configuration items for creating an IPv4 ACL.
Page 455
Figure 1-3 The page for configuring an basic IPv4 ACL Table 1-6 describes the configuration items for creating a rule for a basic IPv4 ACL. Table 1-6 Configuration items for a basic IPv4 ACL rule Item Description Select the basic IPv4 ACL for which you want to configure rules.
Configuring a Rule for an Advanced IPv4 ACL Select QoS > ACL IPv4 from the navigation tree and then select the Advance Setup tab to enter the rule configuration page for an advanced IPv4 ACL, as shown in Figure 1-4.
Page 457
Table 1-7 describes the configuration items for creating a rule for an advanced IPv4 ACL. Table 1-7 Configuration items for an advanced IPv4 ACL rule Item Description Select the advanced IPv4 ACL for which you want to configure rules. Select Access Control List (ACL) Available ACLs are advanced IPv4 ACLs that have been configured.
Configuring a Rule for an Ethernet Frame Header ACL Select QoS > ACL IPv4 from the navigation tree and then select the Link Setup tab to enter the rule configuration page for an Ethernet frame header IPv4 ACL, as shown in Figure 1-5.
Page 459
Figure 1-5 The page for configuring a rule for an Ethernet frame header ACL Table 1-8 describes the configuration items for creating a rule for an Ethernet frame header IPv4 ACL. Table 1-8 Configuration items for an Ethernet frame header IPv4 ACL rule...
You can only modify the existing rules of an ACL that uses the match order of config. When modifying a rule of such an ACL, you may choose to change just some of the settings, in which case the other settings remain the same.
On traditional IP networks without QoS guarantee, devices treat all packets equally and handle them using the first in first out (FIFO) policy. All packets share the resources of the network and devices. How many resources the packets can obtain completely depends on the time they arrive. This service is called best-effort.
Page 462
(1) (2) The traffic enters a device from a high speed link and is forwarded over a low speed link. The packet flows enter a device from several incoming interfaces and are forwarded out an outgoing interface, whose rate is smaller than the total rate of these incoming interfaces.
Traffic Classification When defining match criteria for classifying traffic, you can use IP precedence bits in the type of service (ToS) field of the IP packet header, or other header information such as IP addresses, MAC addresses, IP protocol field and port numbers.
According to RFC 2474, the ToS field of the IP header is redefined as the differentiated services (DS) field, where a DSCP value is represented by the first six bits (0 to 5) and is in the range 0 to 63. The remaining two bits (6 and 7) are reserved.
Page 465
Class selector (CS) class: This class is derived from the IP ToS field and includes eight subclasses; Best effort (BE) class: This class is a special CS class that does not provide any assurance. AF traffic exceeding the limit is degraded to the BE class. Currently, all IP network traffic belongs to this class by default.
5 4 3 2 1 0 5 4 3 2 1 0 7 5 4 3 2 1 0 The priority in the 802.1Q tag header is called 802.1p precedence, because its use is defined in IEEE 802.1p. Table 2-3 presents the values for 802.1p precedence.
Page 467
SP queuing schedules the eight queues strictly according to the descending order of priority. It sends packets in the queue with the highest priority first. When the queue with the highest priority is empty, it sends packets in the queue with the second highest priority, and so on. Thus, you can assign...
(represented by w7, w6, w5, w4, w3, w2, w1, or w0) to decide the proportion of resources assigned to the queue. On a 100 Mbps port, you can set the weight values of WRR queuing to 50, 30, 10, 10, 50, 30, 10, and 10 (corresponding to w7, w6, w5, w4, w3, w2, w1, and w0 respectively).
CoS to DSCP: 802.1p-precedence-to-DSCP mapping table. CoS to Queue: 802.1p-precedence-to-local-precedence mapping table. DSCP to CoS: DSCP-to-802.1p-precedence mapping table, which is applicable to only IP packets. DSCP to DSCP: DSCP-to-DSCP mapping table, which is applicable to only IP packets. DSCP to Queue: DSCP-to-local-precedence mapping table, which is applicable to only IP packets.
You can apply a QoS policy to a port. Applies a QoS policy to a port to regulate the inbound traffic of the port. A QoS policy can be applied to multiple ports. Only one policy can be applied in inbound direction of a port.
Page 473
Configure a class in the QoS policy. policy Configuring Classifier-Behavior A class can be associated with only one Associations for the Policy traffic behavior in a QoS policy. Therefore, associating a class that is already associated with a traffic behavior will overwrite the old association.
Page 474
Configuring Priority Trust Mode on a Port Set the priority trust mode of a port. Creating a Class Select QoS > Classifier from the navigation tree and click Create to enter the page for creating a class, as shown in Figure 2-11.
Page 475
Return to QoS policy configuration task list. Configuring Classification Rules Select QoS > Classifier from the navigation tree and click Setup to enter the page for setting a class, as shown in Figure 2-12. Figure 2-12 The page for configuring classification rules...
Page 476
If multiple such rules are configured for a class, the new configuration Source MAC does not overwrite the previous one. A rule to match a source MAC address is significant only to Ethernet interfaces. Define a rule to match a destination MAC address.
Return to QoS policy configuration task list. Creating a Traffic Behavior Select QoS > Behavior from the navigation tree and click the Create tab to enter the page for creating a traffic behavior, as shown in Figure 2-13. Figure 2-13 The page for creating a traffic behavior Table 2-13 describes the configuration items of creating a behavior.
QoS policy configuration task list. Configuring Traffic Mirroring and Traffic Redirecting for a Traffic Behavior Select QoS > Behavior from the navigation tree and click Port Setup to enter the port setup page for a traffic behavior, as shown in Figure 2-14.
Configuring Other Actions for a Traffic Behavior Select QoS > Behavior from the navigation tree and click Setup to enter the page for setting a traffic behavior, as shown in Figure 2-15. Figure 2-15 The page for setting a traffic behavior Table 2-15 describes the configuration items of configuring other actions for a traffic behavior.
Specify a name for the policy to be created. Return to QoS policy configuration task list. Configuring Classifier-Behavior Associations for the Policy Select QoS > QoS Policy from the navigation tree and click Setup to enter the page for setting a policy, as shown in Figure 2-17. 2-20...
Return to QoS policy configuration task list. Applying a Policy to a Port Select QoS > Port Policy from the navigation tree and click Setup to enter the page for applying a policy to a port, as shown in Figure 2-18.
Return to QoS policy configuration task list. Configuring Queue Scheduling on a Port Select QoS > Queue from the navigation tree and click Setup to enter the queue scheduling configuration page, as shown in Figure 2-19. Figure 2-19 The page for configuring queue scheduling...
Not Set: Restores the default queuing algorithm on selected ports. Select the queue to be configured. Queue Its value range is 0 to 7, but only 0 to 3 is user configurable and 4 to 7 are reserved. Specify the group the current queue is to be assigned to.
Click the ports to be configured with line rate in the port list. You can select one or more ports. Return to Line rate configuration task list. Configuring Priority Mapping Tables Select QoS > Priority Mapping from the navigation tree to enter the page shown in Figure 2-21. 2-24...
Priority mapping table configuration task list. Configuring Priority Trust Mode on a Port Select QoS > Port Priority from the navigation tree to enter the page shown in Figure 2-23. Click the icon corresponding to a port to enter the page shown in Figure 2-24.
Page 486
The interface to be configured. Priority Set a local precedence value for the port. Select a priority trust mode for the port, which can be Untrust: where packet priority is not trusted. CoS: where the 802.1p precedence of the incoming packets is Trust Mode trusted and used for priority mapping.
When configuring QoS, note that: When an ACL is referenced to implement QoS, the actions defined in the ACL rules, deny or permit, do not take effect; actions to be taken on packets matching the ACL depend on the traffic behavior definition in QoS.
3-1, in the network, the FTP server at IP address 10.1.1.1/24 is connected to the Switch, and the clients access the FTP server through GigabitEthernet 1/0/1 of the Switch. Configure an ACL and a QoS policy as follows to prevent the hosts from accessing the FTP server from 8:00 to 18:00 every day: Create an ACL to prohibit the hosts from accessing the FTP server from 8:00 to 18:00 every day.
Page 489
Figure 3-2 Define a time range covering 8:00 to 18:00 every day Type the time range name test-time. Select the Periodic Time Range option, set the Start Time to 8:00 and the End Time to 18:00, and then select the checkboxes Sun through Sat.
Page 490
Figure 3-3 Create an advanced IPv4 ACL Type the ACL number 3000. Click Apply. # Define an ACL rule for traffic to the FTP server. Click Advance Setup. Perform configuration as shown in Figure 3-4.
Page 491
Select the Rule ID option, and type rule ID 2. Select Permit in the Operation drop-down list. Select the Destination IP Address option, and type IP address 10.1.1.1 and destination wildcard mask 0.0.0.0. Select test-time in the Time Range drop-down list.
Page 492
Select QoS > Classifier from the navigation tree and click Create. Perform configuration as shown Figure 3-5. Figure 3-5 Create a class Type the class name class1. Click Create. # Define classification rules. Click Setup. Perform configuration as shown in Figure 3-6.
Page 493
Figure 3-6 Define classification rules Select the class name class1 in the drop-down list. Select the ACL IPv4 option, and select ACL 3000 in the following drop-down list. Click Apply. A configuration progress dialog box appears, as shown in Figure...
Page 494
Figure 3-7 Configuration progress dialog box After the configuration is complete, click Close on the dialog box. # Create a traffic behavior. Select QoS > Behavior from the navigation tree and click Create. Perform configuration as shown Figure 3-8. Figure 3-8 Create a traffic behavior Type the behavior name behavior1.
Page 495
Click Apply. A configuration progress dialog box appears. After the configuration is complete, click Close on the dialog box. # Create a policy. Select QoS > QoS Policy from the navigation tree and click the Create tab. Perform configuration as shown in Figure...
Page 496
Select behavior1 in the Behavior Name drop-down list. Click Apply. # Apply the QoS policy in the inbound direction of GigabitEthernet 1/0/1. Select QoS > Port Policy from the navigation tree and click the Setup tab. Perform configuration as shown in Figure...
Page 497
Figure 3-12 Apply the QoS policy in the inbound direction of GigabitEthernet 1/0/1 Select policy1 in the Please select a policy drop-down list. Select Inbound in the Direction drop-down list. Select port GigabitEthernet 1/0/1. Click Apply. A configuration progress dialog box appears.
Page 498
Table of Contents 1 PoE Configuration ·····································································································································1-1 PoE Overview ·········································································································································1-1 Advantages······································································································································1-1 Composition·····································································································································1-1 Protocol Specification ······················································································································1-2 Configuring PoE ······································································································································1-2 Configuring PoE Ports ·····················································································································1-3 Displaying Information About PSE and PoE Ports··········································································1-4 PoE Configuration Example····················································································································1-5...
The whole PoE system is powered by the PoE power. A PSE is a device supplying power for PDs. A PSE can be built-in (Endpoint) or external (Midspan). A built-in PSE is integrated in a switch or router, and an external PSE is independent from a switch or router.
The PSE supplies power for a PoE interface in the following two modes: Over signal wires: The PSE uses the pairs (1, 2, 3, 6) for transmitting data in a category 3/5 twisted pair cable to supply DC power while transmitting data to PDs.
PoE port if the PoE port is not enabled with the PoE function. You are allowed to enable PoE for a PoE port if the PoE port will not result in PoE power overload; otherwise, you are not allowed to enable PoE for the PoE port.
Displaying Information About PSE and PoE Ports Select PoE > PoE from the navigation tree to enter the page of the Summary tab. The upper part of the page displays the PSE summary; Click a port on the chassis front panel, the configuration and power Figure 1-3.
GigabitEthernet 1/0/11 is connected to AP whose maximum power does not exceed 9000 milliwatts. The power supply priority of IP telephones is higher than that of AP; therefore, the PSE supplies power to IP telephones first when the PSE power is overloaded.
Page 504
Configuration procedure # Enable PoE on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2, and configure their power supply priority to critical. Select PoE > PoE from the navigation tree and click the Setup tab to perform the following configurations, as shown in Figure 1-5.
Page 505
Click to select port GigabitEthernet 1/0/11 from the chassis front panel. Select Enable from the Power State drop-down list. Select the check box before Power Max and type 9000. Click Apply. After the configuration takes effect, the IP telephones and AP are powered and can work normally.
Need help?
Do you have a question about the Baseline 2928 PWR Plus and is the answer not in the manual?
Questions and answers