Dell PowerConnect 5316M User Manual

Switch module
Hide thumbs Also See for PowerConnect 5316M:
Table of Contents

Advertisement

Quick Links

Dell PowerConnect 5316M Ethernet Switch Module
User's Guide
PC5316M
w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Advertisement

Table of Contents
loading

Summary of Contents for Dell PowerConnect 5316M

  • Page 1 Dell PowerConnect 5316M Ethernet Switch Module User’s Guide PC5316M w w w . d e l l . c o m | s u p p o r t . d e l l . c o m...
  • Page 2 Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
  • Page 3: Table Of Contents

    Introduction ..PowerConnect 5316M and the Dell Modular Server System Features ........
  • Page 4 Handling Static Sensitive Devices ..... Installing the Ethernet Switch Module into Dell Modular Server Chassis . . . Removing a Ethernet Switch Module .
  • Page 5 Software Download Through TFTP Server ....Using Dell OpenManage Switch Administrator Understanding the Interface ......
  • Page 6 Accessing the Ethernet Switch Module Through the CLI ... Console Connection ......Telnet Connection .
  • Page 7 Mapping Domain Host ..........Configuring ARP .
  • Page 8 Defining Port Mirroring Sessions ....Configuring Address Tables ......
  • Page 9 Viewing RMON Statistics ......Viewing RMON Statistics Group ....Viewing RMON History Control Statistics .
  • Page 10 Tables Table 1-1. Port Default Settings ....Table 2-2. RJ-45 Copper based 10/100/1000 Base-TLED ....Indications .
  • Page 11 Table 6-25. DHCP IP Interface CLI Commands ..Table 6-26. DNS Server CLI Commands ... Table 6-27. DNS Domain Name CLI Commands ..
  • Page 12 Table 7-53. Query and Sort CLI Commands ..Table 7-54. GARP Timer CLI Commands ... Table 7-55. STP Global Parameter CLI Commands .
  • Page 13 ..Figure 3-5. Ethernet Switch Module Components Figure 3-6. Dell Modular Server Chassis I/O Module Locations ....Figure 3-7.
  • Page 14 Figure 3-9. Inserting a Ethernet Switch Module into the ... Dell Modular Server Chassis Figure 3-10. Pull the release latch on the Ethernet Switch Module ... . .
  • Page 15 Figure 6-35. IP Interface Parameter Table ..Figure 6-36. DHCP IP Interface ....Figure 6-37. Domain Naming System (DNS) .
  • Page 16 Figure 6-63. Add RADIUS Server ....Figure 6-64. RADIUS Servers List ....Figure 6-65.
  • Page 17 Figure 7-91. Dynamic Addresses Table ... . Figure 7-92. GARP Timers ....Figure 7-93. STP Global Settings .
  • Page 18 Ethernet Switch Module Components ..Figure 3-6. Dell Modular Server Chassis I/O Module Locations ....
  • Page 19 Figure 6-16. Asset ..... . . Figure 6-17. Time Synchronization ....Figure 6-18.
  • Page 20 Figure 6-44. ARP Settings ....Figure 6-45. Integrated Cable Test for Copper Cables ..Figure 6-46. Access Profiles ....
  • Page 21 Figure 6-72. File Upload to Server ....Figure 6-73. Copy Files ....Figure 6-74.
  • Page 22 Figure 7-100. Protocol Group ....Figure 7-101. Protocol Port Table ....Figure 7-102.
  • Page 23: Contents

    Figure 9-128. CoS to Queue Mapping Table ..Figure 9-129. DSCP to Queue Mapping ... . Contents...
  • Page 24 Contents...
  • Page 25: Introduction

    PowerConnect 5316M and the Dell Modular Server System The Dell Modular Server System is based upon the chassis that integrates up to ten Server Modules, up to four I/O modules (including the Ethernet Switch Module), and one or two system management modules called the Dell Remote Access Controller / Modular Chassis (DRAC/MC).
  • Page 26: Features

    Figure 1-1. PowerConnect 5316M Front Panel Features This section describes the Ethernet Switch Module user-configured features. For a complete list of all updated Ethernet Switch Module features, see the latest software version Release Notes. General Features Head of Line Blocking Head of Line (HOL) blocking results in traffic delays and frame loss caused by traffic competing for the same egress port resources.
  • Page 27: Mac Address Supported Features

    Virtual Cable Testing (VCT) VCT detects and reports copper link cabling occurrences, such as open cables and cable shorts. MDI/MDIX Support The Ethernet Switch Module automatically detects whether the cable connected to an RJ-45 port is crossed or straight through. Standard wiring for end stations is Media-Dependent Interface (MDI) and the standard wiring for hubs and switches is known as Media-Dependent Interface with Crossover (MDIX).
  • Page 28: Layer 2 Features

    VLAN-aware MAC-based Switching The Ethernet Switch Module always performs VLAN-aware bridging. Classic bridging(IEEE802.1D) is not performed, where frames are forwarded based only on their destination MAC address. However, a similar functionality may be configured for untagged frames. Addresses are associated with ports by learning them from the incoming frames source address. This is done by the CPU.
  • Page 29: Vlan Supported Features

    VLAN Supported Features VLAN Support VLANs are collections of switching ports that comprise a single broadcast domain. Packets are classified as belonging to a VLAN based on either the VLAN tag or based on a combination of the ingress port and packet contents. Packets sharing common attributes can be grouped in the same VLAN.
  • Page 30: Link Aggregation

    Fast Link STP can take up to 30-60 seconds to converge. During this time, STP detects possible loops, allowing time for status changes to propagate and for relevant Ethernet Switch Modules to respond. 30-60 seconds is considered too long of a response time for many applications. The Fast Link option bypasses this delay, and can be used in network topologies where forwarding loops do not occur.
  • Page 31: Layer 3 Features

    Layer 3 Features Address Resolution Protocol (ARP) The Address Resolution Protocol (ARP) converts IP addresses into physical addresses, and maps the IP address to a MAC address. ARP allows a host to communicate with other hosts only when the IP address of its neighbors is known. For more information, see "Configuring ARP."...
  • Page 32: Figure

    Web Based Management With web based management, the system can be managed from any web browser. The system contains an Embedded Web Server (EWS), which serves HTML pages, through which the system can be monitored and configured. The system internally converts web-based input into configuration commands, MIB variable settings and other management-related settings.
  • Page 33: Security Features

    SNTP The Simple Network Time Protocol (SNTP) assures accurate network Ethernet Switch Module clock time synchronization up to the millisecond. Time synchronization is performed by a network SNTP server. Time sources are established by Stratums. Stratums define the distance from the reference clock.
  • Page 34: Port Default Settings

    Secure Shell (SSH) is a protocol that provides a secure, remote connection to a Ethernet Switch Module. SSH version 2 is currently supported. The SSH server feature enables an SSH client to establish a secure, encrypted connection with a Ethernet Switch Module. This connection provides functionality that is similar to an inbound telnet connection.
  • Page 35: Hardware Description

    Ethernet Switch Module Port Configurations PowerConnect 5316M Front Panel Port Description The PowerConnect 5316M Ethernet Switch Module contains 6 external Gigabit Ethernet 10/100/1000 Base-T ports on the front panel for connecting to a network, and 10 Gigabit Ethernet internal ports for connecting the embedded network controllers on the PowerEdge Server Modules.
  • Page 36: Led Definitions

    • Depth — 251.2 mm LED Definitions The front panel contains light emitting diodes (LED) that indicate the status of links, and switch diagnostics. Port LEDs 10/100/1000 Base-T Port LEDs Each 10/100/1000 Base-T port has two LEDs. Speed/link/activity is indicated on the left LED and the duplex mode is indicated on the right LED.
  • Page 37: Port Connections, Cables, And Pinout Information

    NOTE: If there is an error and the identification function is activated, the LED still functions as an identification LED. The LED can only be disabled by the DRAC/MC with a 255 seconds timeout. If an error occurs, the LED for error reporting will always be flashing and cannot be disabled. The following table describes the system LED indications.
  • Page 38: Rj-45 Pin Number Allocation For 10/100/1000 Base-T Ethernet Port

    Figure 2-4. RJ-45 Pin Numbers The RJ-45pin number allocation for the 10/100/1000 Base-T ports is listed in the following table. Table 2-5. RJ-45 Pin Number Allocation for 10/100/1000 Base-T Ethernet Port Pin No Function TxRx 1+ TxRx 1- TxRx 2+ TxRx 2- TxRx 3+ TxRx 3-...
  • Page 39: Installing The Ethernet Switch Module

    • Ensure that the Ethernet Switch Module is not exposed to radiators or heat sources. • Do not push foreign objects into the Dell Modular Server Chassis I/O Module bays, as it may cause a fire or electric shock. •...
  • Page 40: Unpacking

    232 serial port of the Dell Remote Access Controller / Modular Chassis (DRAC/MC) to the RS-232 serial port of the terminal or computer running the terminal emulation application, and finally configuring the Ethernet Switch Module. Once the DRAC/MC is connected to the console, the Ethernet Switch Module can be configured.
  • Page 41: Major Components Of The Ethernet Switch Module

    The illustrations in this document might differ slightly from the actual Ethernet Switch Module and Dell Modular Server Chassis. Figure 3-5. Ethernet Switch Module Components Installing and Removing a Ethernet Switch Module The following illustration shows the four bays reserved for the Dell Modular Server Chassis I/O modules. Installing the Ethernet Switch Module...
  • Page 42: Ethernet Controller Enumeration

    To maintain proper system cooling, each module bay must contain either a module or end-cap (blank plug). The four Chassis I/O module bays are located at the rear panel of the Dell Modular Server Chassis. Although Ethernet Switch Module can be inserted in every I/O module bay it is important to understand that not all of the bays are neccessarily intended for the Ethernet Switch Modules.
  • Page 43: System Reliability Considerations

    NOTICE: To help ensure proper cooling and system reliability, make sure that: • Each of the module bays on Dell Modular Server Chassis has either a module or end-cap (blank plug) installed. • A removed hot-swap module is replaced with an identical module or end-cap (blank plug) within 1 minute of removal.
  • Page 44: Installing The Ethernet Switch Module Into Dell Modular Server Chassis

    If not already done, touch the static-protective package that contains the Ethernet Switch Module to an unpainted metal part of Dell Modular Server Chassis for at least two seconds. Remove the Ethernet Switch Module from its static-protective package.
  • Page 45 Figure 3-9. Inserting a Ethernet Switch Module into the Installing the Ethernet Switch Module...
  • Page 46: Removing A Ethernet Switch Module

    Never remove the cover on a power supply or any part that has the following label attached. NOTE: Neither the Server Modules, nor the Dell Modular Server Chassis needs to be powered down to remove a Ethernet Switch Module. NOTE: By removing an Ethernet Switch Module, the connection to the network is broken.
  • Page 47: Pull The Release Latch On The Ethernet Switch Module

    Figure 3-10. Pull the release latch on the Ethernet Switch Module Slide the Ethernet Switch Module out of the Dell Modular Server Chassis and set it aside. Installing the Ethernet Switch Module...
  • Page 48: Accessing The Ethernet Switch Module Cli User Interface Via Drac/Mc Console Port

    To connect to the Ethernet Switch Module via DRAC/MC, perform the following: Connect the DB9 null-modem or cross over cable to the RS-232 serial port of the DRAC/MC in the Dell Modular Server Chassis to the RS-232 serial port of the terminal or computer running the terminal emulation application.
  • Page 49 For more information, see Dell Modular Server System User's Guide and Dell Remote Access Controller/Modular Chassis User’s Guide. If Dell Modular Server Chassis is off then power it on using the following DRAC/MC CLI command: racadm chassisaction -m chassis powerup...
  • Page 50 For further details on configuring and using the DRAC/MC see Dell Remote Access Controller / Modular Chassis User's Guide. Once the Ethernet Switch Module is connected to the console, wait until the Ethernet Switch Module is fully booted. Observe the booting information being outputted to the terminal window and wait for the Ethernet Switch Module CLI command prompt "console>"...
  • Page 51 Dram first block size is : 40960K bytes Dram first PTR is : 0x1800000 Flash size is: 16M Loading running configuration. Loading startup configuration. Device configuration: Prestera based system Slot 1 - PowerConnect 5316M Tapi Version: v1.2.10-P1_02 Installing the Ethernet Switch Module...
  • Page 52: Connecting Network To An Ethernet Switch Module

    If an error is displayed, or the green system LED is flashing, stop the installation process and contact Dell technical support. Connecting Network to an Ethernet Switch Module To connect to an uplink port, use Category 5 unshielded twisted-pair (UTP) cables with RJ-45 connectors at both ends.
  • Page 53: External Port Default Settings

    (MDI/MDIX) operation under auto-negotiation mode, so standard straight-through twisted-pair cables can be used to connect to any other network Ethernet module (systems, servers, switches or routers) that supports auto-negotiation. NOTE: Do not plug a phone jack connector into an RJ-45 port. This will damage the Ethernet Switch Module.
  • Page 54: Mdi/Mdix

    MDI/MDIX The Ethernet Switch Module supports auto-detection of straight through and crossed cables on all switching 10/100/1000 Base-T ports. The feature is enabled when Auto-negotiation is enabled, and auto MDI/MDIX is automatically disabled if the auto-negotiation is disabled. In this scenario, the correct cable must be used.
  • Page 55: Starting And Configuring The Ethernet Switch Module

    Before proceeding, read the release notes for this product. The release notes can be downloaded from support.dell.com. Introduction It’s important to understand the Ethernet Switch Module architecture and the Dell Modular Server System architecture when configuring the Ethernet Switch Module. See "PowerConnect 5316M and the Dell Modular Server System."...
  • Page 56: Configuration Overview

    Figure 4-12. Installation and Configuration Flow Configuration Overview Before assigning a static IP address to the Ethernet Switch Module, obtain the following information: • An IP address that has been allocated to the Ethernet Switch Module in order for it to be configured.
  • Page 57: Accessing Startup Menu

    "Software Download" on page 53. Initial Configuration NOTE: Before proceeding, read the release notes for this product. The release notes can be downloaded from Dell support website at support.dell.com. NOTE: The initial simple configuration uses the following assumptions: •...
  • Page 58: Static Ip Address And Subnet Mask

    • Configuring the static IP address and the default gateway. • Configuring the SNMP read/write access and community strings. Before applying the initial configuration procedure to the Ethernet Switch Module, the following information must be obtained from the network administrator: •...
  • Page 59: Verifying The Ip And Default Gateway Addresses

    console(config)# ip default-gateway 192.168.1.1 console(config)# snmp-server community private rw console(config)# exit console# Verifying the IP and Default Gateway Addresses Ensure that the IP address and the default gateway were properly assigned by executing the following command and examining its output: console# show ip interface vlan 1 Gateway IP Address Type...
  • Page 60: Snmp Community Strings

    SNMP Community Strings Simple Network Management Protocol (SNMP) provides a method for managing network Ethernet Switch Modules. Ethernet Switch Modules supporting SNMP run a local software (agent). The SNMP agents maintain a list of variables, used to manage the Ethernet Switch Module.
  • Page 61: Configuring Snmp

    Configuring SNMP To configure SNMP station IP address and community string(s) for the general Ethernet Switch Module router tables: At the console prompt, enter the command Enable. The prompt is displayed as #. Enter the command configure and press <Enter>. In the configuration mode, enter the SNMP configuration command with the parameters including community name (private), community access right (read and write) and IP address, as shown in the example below:...
  • Page 62: Advanced Configuration

    Trap-Rec-Address Trap-Rec-Community Version 176.16.8.9 public System Contact: Robert System Location: Marketing The configured parameters enable further Ethernet Switch Module configuration from any remote location. Advanced Configuration This section provides information about dynamic allocation of IP addresses and security management based on the authentication, authorization, and accounting (AAA) mechanism, and includes the following topics: •...
  • Page 63 console(config-if)# exit console(config)# • Assigning Dynamic IP Addresses (on a VLAN): console# configure console(config)# interface ethernet vlan 1 console(config-if)# ip address dhcp hostname Ethernet Switch Module console(config-if)# exit console(config)# To verify the IP address, enter the show ip interface command at the system prompt as shown in the following example.
  • Page 64: Receiving An Ip Address From A Bootp Server

    console# show ip interface Gateway IP Address Type Activity status --------------------- ------------ ------------------ 10.7.1.1 DHCP Active IP address Interface Type ------------------- ------------ ------------ 10.7.1.192/24 VLAN 1 DHCP 10.7.2.192/24 DHCP NOTE: It is not necessary to delete the Ethernet Switch Module configuration to retrieve an IP address from the DHCP server.
  • Page 65: Security Management And Password Configuration

    console# delete startup-config startup configuration file was deleted console# reload You haven’t saved your changes. Are you sure you want to continue (y/n) [n]? This command will reset the whole system and disconnect your current session. Do you want to continue (y/n) [n]? ****************************************************** /* the switch reboots */ To verify the IP address, enter the show ip interface command.
  • Page 66: Configuring An Initial Terminal Password

    NOTE: When creating a user name, the default priority is 1, which allows access but not configuration rights. A priority of 15 must be set to enable access and configuration rights to the Ethernet Switch Module. Although user names can be assigned privilege level 15 without a password, it is recommended to always assign a password.
  • Page 67: Configuring An Initial Http Password

    console(config)# line ssh console(config-line)# login authentication default console(config-line)# enable authentication default console(config-line)# password jones. • When initially logging onto a Ethernet Switch Module through a SSH session, enter jones at the password prompt. • When changing a Ethernet Switch Module’s mode to enable, enter jones. Configuring an Initial HTTP Password To configure an initial HTTP password, enter the following commands: console(config)# ip http authentication local...
  • Page 68 ------ Performing the Power-On Self Test (POST) ------ UART Channel Loopback Test......PASS Testing the System SDRAM......PASS Boot1 Checksum Test.......PASS Boot2 Checksum Test.......PASS Flash Image Validation Test.......PASS FRU Validation Test.......PASS BOOT Software Version x.x.x.x Built xx-xxx-200x 19:03:19 Processor: xxxxx , 64 MByte SDRAM. I-Cache 8 KB.
  • Page 69: Software Download

    Ethernet Switch Module and DRAC/MC. This speed is fixed to 9600 and must not be changed. See the Dell Remote Access Controller/Modular Chassis User’s Guide to determine the current baud rate settings of the DRAC/MC external console serial port.
  • Page 70: Password Recovery

    Enter config as the name of the flash file. The configuration is erased and the Ethernet Switch Module reboots. Repeat the Ethernet Switch Module initial configuration. Password Recovery If a password is lost, the Password Recovery procedure can be called from the Startup menu. The procedure enables entry to the Ethernet Switch Module once without password.
  • Page 71 console# show bootvar Images currently available on the Flash Image-1 active (selected for next boot) Image-2 not active Enter copy tftp://{tftp address}/{file name} image command to copy a new system image to the Ethernet Switch Module. When the new image is downloaded, it is saved in the area allocated for the other copy of system image (image-2, as given in the example).
  • Page 72 session. Do you want to continue (y/n) [n]? Enter y. The Ethernet Switch Module reboots. Boot Image Download Loading a new boot image from the TFTP server and programming it into the flash updates the boot image. The boot image is loaded when the Ethernet Switch Module is powered on. A user has no control over the boot image copies.
  • Page 73: Using Dell Openmanage Switch Administrator

    Switch Module View — Located on the right side of the home page, the Ethernet Switch Module view provides a view of the Ethernet Switch Module, an information or table area, and configuration instructions. Figure 5-13. Switch Administrator Components Table 5-6 lists the interface components with their corresponding numbers. Using Dell OpenManage Switch Administrator...
  • Page 74: Switch Module Representation

    The information buttons provide access to information about the Ethernet Switch Module and access to Dell Support. For more information, see "Information Buttons." Switch Module Representation The PowerConnect home page contains a graphical Switch Module representation of the front panel.
  • Page 75: Using The Openmanage Switch Administrator Buttons

    For example, if the IP Addressing page is open, the help topic for that page opens when Help is clicked. About Contains the version and build number and Dell copyright information. Using Dell OpenManage Switch Administrator...
  • Page 76: Ethernet Switch Module Management Buttons

    Enter the Ethernet Switch Module IP address (as defined in the CLI) in the address bar and press <Enter>. For information about assigning an IP address to the Ethernet Switch Module, see "Static IP Address and Subnet Mask." When the Enter Network Password window opens, enter a user name and password. Using Dell OpenManage Switch Administrator...
  • Page 77: Accessing The Ethernet Switch Module Through The Cli

    Passwords are both case sensitive and alpha-numeric. Click OK. The Dell PowerConnect OpenManage™ Switch Administrator home page opens. Accessing the Ethernet Switch Module Through the CLI The Ethernet Switch Module can be managed over a connection to the MMB console port or via a Telnet connection.
  • Page 78: Using The Cli

    Passwords are displayed in the ***** format on the screen, and are case sensitive. To access and list the Privileged EXEC Mode commands: At the prompt type enable and press <Enter>. When a password prompt displays, enter the password and press <Enter>. Using Dell OpenManage Switch Administrator...
  • Page 79: Global Configuration Mode

    To return from Global Configuration mode to Privileged EXEC mode, type the exit command or use the <Ctrl><Z>. The following example illustrates how to access Global Configuration Mode and return back to the Privileged EXEC Mode: console# console#configure console(config)#exit console# Using Dell OpenManage Switch Administrator...
  • Page 80: Interface Configuration Mode

    The following example shows how to create an access-list called "mlist", configure two management interfaces ethernet g11 and ethernet g16, and activates the access-list: console(config)# management access-list mlist console(config-macl)# permit ethernet g11 console(config-macl)# permit ethernet g16 console(config-macl)# exit Using Dell OpenManage Switch Administrator...
  • Page 81: Cli Examples

    CLI Examples CLI commands are provided as configuration examples. For a full description of the CLI commands, including examples, see the CLI Reference Guide included on the Documentation CD. Using Dell OpenManage Switch Administrator...
  • Page 82 Using Dell OpenManage Switch Administrator...
  • Page 83: Configuring System Information

    Configuring System Information This section provides information for defining system parameters including security features, downloading switch module software, and resetting the switch module. To open the System page, click System in the tree view. Figure 6-15. System Defining General Switch Module Information The General page contains links to pages for configuring switch module parameters.
  • Page 84: Asset

    Figure 6-16. Asset System Name (0-160 Characters) — Defines the user-defined switch module name. System Contact (0-160 Characters) — Specifies the name of the contact person. System Location (0-160 Characters) — The location where the system is currently running. MAC Address — Specifies the switch module MAC address. Sys Object ID —...
  • Page 85: Table 6-10. Asset Cli Commands

    Displays the service tag information. show system Displays system information. asset-tag text Sets the switch module asset tag. The following is an example of the CLI commands: console(config)# hostname dell console(config)# snmp-server contact Dell_Tech_Supp console(config)# snmp-server location New_York console(config)# exit Configuring System Information...
  • Page 86: Asset

    Address: Sys Object ID: 1.3.6.1.4.1.674.10895.30 Type: PowerConnect 5316M Defining System Time Settings The Time Synchronization page contains fields for defining system time parameters for both the local hardware clock, and the external SNTP clock. If the system time is kept using an external SNTP clock, and the external SNTP clock fails, the system time reverts to the local hardware clock.
  • Page 87 • Belarus — Last weekend of March until the last weekend of October. • Belgium — Last weekend of March until the last weekend of October. • Brazil — From the 3rd Sunday in October until the 3rd Saturday in March. During the period of Daylight Saving Time, Brazilian clocks go forward one hour in most of the Brazilian southeast.
  • Page 88 • Mexico — From the first Sunday in April at 02:00 to the last Sunday in October at 02:00. • Moldova — Last weekend of March until the last weekend of October. • Montenegro — Last weekend of March until the last weekend of October. •...
  • Page 89: Time Synchronization

    Figure 6-17. Time Synchronization Clock Source Clock Source — The source used to set the system clock. The possible field values: SNTP — Specifies that the system time is set via an SNTP server. For more information, see "Configuring SNTP Settings" on page 79. None —...
  • Page 90 European — The switch module switches to DST at 1:00 am on the last Sunday in March and reverts to standard time at 1:00 am on the last Sunday in October. The European option applies to EU members, and other European countries using the EU standard. Other —...
  • Page 91: Time Synchronization

    Day — The day of the week at which DST ends every year. The possible field range is Sunday- Saturday. Week — The week within the month at which DST ends every year. The possible field range is 1-5. Month — The month of the year in which DST ends every year. The possible field range is Jan-Dec.
  • Page 92: Viewing The Versions Page

    Table 6-11. Clock Setting CLI Commands Description clock source {sntp} Configures an external time source for the system clock. clock timezone hours-offset Sets the time zone for display purposes. [ minutes minutes- offset][zone acronym] clock summer-time Configures the system to automatically switch to summer time (Daylight Savings Time).
  • Page 93: Table 6-12. Versions Cli Commands

    Figure 6-18. Versions Software Version — The current software version running on the switch module. Boot Version — The current Boot version running on the Ethernet Switch Module. Hardware Version — The current Ethernet Switch Module hardware version. Displaying Switch Module Versions Using the CLI The following table summarizes the equivalent CLI commands for viewing fields displayed in the Versions page.
  • Page 94: Resetting The Switch Module

    console> show version SW version x.xxx (date 23-Jul-xxxx time 17:34:19) Boot version x.xxx (date 17-Jan-xxxx time 11:48:21) HW version x.x.x Resetting the Switch Module The Reset page enables the switch module to be reset from a remote location. To open the Reset →...
  • Page 95: Configuring Sntp Settings

    A confirmation message displays. Click OK. The switch module is reset. After the switch module is reset, a prompt for a user name and password displays. Enter a user name and password to reconnect to the Web Interface. Resetting the Switch Module Using the CLI The following table summarizes the equivalent CLI commands for performing a reset of the switch module via the CLI:.
  • Page 96: Polling For Unicast Time Information

    • Stratum 2 — The time source is distanced from the Stratum 1 server over a network path. For example, a Stratum 2 server receives the time over a network link, via NTP, from a Stratum 1 server. Information received from SNTP servers is evaluated based on the Time level and server type. SNTP time definitions are assessed and determined by the following time levels: •...
  • Page 97: Sntp Global Settings

    Figure 6-20. SNTP Global Settings Poll Interval (60-86400) — Defines the interval (in seconds) at which the SNTP server is polled for Unicast information. Receive Broadcast Servers Updates — Listens to the SNTP servers for Broadcast server time information on the selected interfaces, when enabled. Receive Anycast Servers Updates —...
  • Page 98: Defining Sntp Authentication Methods

    Defining SNTP Global Parameters Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the SNTP Global Settings page. Table 6-14. SNTP Global Parameters CLI Commands CLI Command Description sntp broadcast client enable Enables SNTP Broadcast clients sntp anycast client enable Enables SNTP anycast clients sntp unicast client enable...
  • Page 99: Sntp Authentication

    Figure 6-21. SNTP Authentication SNTP Authentication — Enables authenticating an SNTP session between the switch module and an SNTP server, when enabled. Encryption Key ID — Defines the Key Identification used to authenticate the SNTP server and switch module. The field value is up to 4294967295 characters. Authentication Key (1-8 Characters) —...
  • Page 100: Add Authentication Key

    Figure 6-22. Add Authentication Key Define the fields. Click Apply Changes. The SNTP Authentication Key is added, and the switch module is updated. Displaying the Authentication Key Table Open the SNTP Authentication page. Click Show All. The Authentication Key Table opens: Figure 6-23.
  • Page 101: Defining Sntp Servers

    Defining SNTP Authentication Settings Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the SNTP Authentication page. Table 6-15. SNTP Authentication CLI Commands CLI Command Description sntp authenticate Defines authentication for received Network Time Protocol traffic from servers.
  • Page 102: Sntp Servers

    Figure 6-24. SNTP Servers SNTP Server — Enter a user-defined SNTP server IP address. Up to eight SNTP servers can be defined. Poll Interval — Enables polling the selected SNTP Server for system time information, when enabled. Encryption Key ID — Specifies the Key Identification used to communicate between the SNTP server and switch module.
  • Page 103: Add Sntp Server

    Last Response — The last time a response was received from the SNTP server. Offset — Timestamp difference between the switch module local clock and the acquired time from the SNTP server. Delay — The amount of time it takes to reach the SNTP server. Remove —...
  • Page 104: Defining Sntp Interfaces

    Modifying an SNTP Server Open the SNTP Servers page. Click Show All. The SNTP Servers Table opens. Select an SNTP Server entry. Modify the relevant fields. Click Apply Changes. The SNTP Server information is updated. Deleting the SNTP Server Open the SNTP Servers page. Click Show All.
  • Page 105: Table 6-17. Sntp Broadcast Cli Commands

    The SNTP Broadcast Interface Table contains the following fields: Interface — Contains an interface list on which SNTP can be enabled. Receive Server Updates — Enables or disables SNTP on the specific interface. Remove — Removes SNTP from a specific interface, when selected. Adding an SNTP Interface Open the SNTP Broadcast Interface Table page.
  • Page 106: Managing Logs

    Unicast Clients Polling: Enabled. Server Polling Encryption Key ----------- -------- ----------------- 176.1.1.8 Enabled 176.1.8.179 Disabled Disabled Broadcast Clients: Enabled Broadcast Clients Poll: Enabled Broadcast Interfaces: g11, g13 Managing Logs → The Logs page contains links to various log pages. To open the Logs page, click System Logs in the tree view.
  • Page 107: Table 6-18. Log Severity Levels

    Provides switch module information. Debug Provides detailed information about the log. If a Debug error occurs, contact Dell Online Technical Support The Global Log Parameters page contains fields for defining which events are recorded to which logs. It contains fields for enabling logs globally, and parameters for defining log parameters. The Severity log messages are listed from the highest severity to the lowest.
  • Page 108: Global Log Parameters

    Figure 6-27. Global Log Parameters Logging — Enables switch module global logs for Cache, File, and Server Logs. Console logs are enabled by default. Severity — The following are the available severity logs: Emergency — The highest warning level. If the switch module is down or not functioning properly, an emergency log message is saved to the specified logging location.
  • Page 109: Table 6-19. Global Log Parameters Cli Commands

    NOTE: When a severity level is selected, all severity level choices above the selection are selected automatically. The Global Log Parameters page also contains check boxes which correspond to a distinct logging system: Console — The minimum severity level from which logs are sent to the console. RAM Logs —...
  • Page 110: Displaying Ram Log Table

    The following is an example of the CLI commands: console(config)# logging on console(config)# logging console errors console(config)# logging buffered debugging console(config)# logging file alerts console(config)# exit console(config)# clear logging console# clear logging file Clear Logging File [y/n]y Displaying RAM Log Table The RAM Log Table contains information about log entries kept in RAM, including the time the log was entered, the log severity, and a description of the log.
  • Page 111: Table 6-20. Ram Log Table Cli Commands

    Log Index — The log number in the RAM Log Table. Log Time — Specifies the time at which the log was entered into the RAM Log Table. Severity — Specifies the log severity. Description — The user-defined log description. Removing Log Information: Open the RAM Log Table.
  • Page 112: Displaying The Log File Table

    The following is an example of the CLI commands: console# show logging Logging is enabled. Console Logging: Level info. Console Messages: 0 Dropped. Buffer Logging: Level info. Buffer Messages: 26 Logged, 26 Displayed, 200 Max. File Logging: Level error. File Messages: 157 Logged, 26 Dropped.
  • Page 113: Table 6-21. Log File Table Cli Commands

    Figure 6-29. Log File Table Log Index — The log number in the Log File Table. Log Time — Specifies the time at which the log was entered in the Log File Table. Severity — Specifies the log severity. Description — The log message text. Displaying the Log File Table Using the CLI Commands The following table summarizes the equivalent CLI commands for viewing and setting fields displayed in the Log File Table.
  • Page 114: Configuring The Remote Log Server Settings Page

    The following is an example of the CLI commands: console# show logging file Logging is enabled. Console Logging: Level info. Console Messages: 0 Dropped. Buffer Logging: Level info. Buffer Messages: 62 Logged, 62 Displayed, 200 Max. File Logging: Level debug. File Messages: 11 Logged, 51 Dropped.
  • Page 115: Remote Log Server Settings

    Figure 6-30. Remote Log Server Settings Available Servers — Contains a list of servers to which logs can be sent. UDP Port (1-65535) — The UDP port to which the logs are sent for the selected server. The possible range is 1 - 65535. The default value is 514. Facility —...
  • Page 116: Add A Log Server

    Define the fields. Select the log severity in the Severity to Include check boxes. Click Apply Changes. The log settings are saved, and the switch module is updated. Defining a New Server: Open the Remote Log Server Settings page. Click Add. The Add a Log Server page opens: Figure 6-31.
  • Page 117: Table 6-22. Remote Log Server Cli Commands

    The Remote Log Servers Table page opens: Figure 6-32. Remote Log Servers Table Removing a Log Server from the Log Server Table Page: Open the Remote Log Server Settings page. Click Show All. The Remote Log Servers Table page opens. Select a Remote Log Servers Table entry.
  • Page 118: Defining Switch Module Ip Addresses

    The following is an example of the CLI commands: console> enable console# configure console(config) # logging 10.1.1.1 severity critical console(config)# end console# show logging Logging is enabled. Console Logging: Level debug. Console Messages: 5 Dropped. Buffer Logging: Level debug. Buffer Messages: 16 Logged, 16 Displayed, 200 Max.
  • Page 119: Defining Ip Interfaces

    Default Gateway — The Gateway Ethernet switch module IP address. Active — Indicates if the gateway is active. Remove — Removes Gateway Ethernet switch modules from the Default Gateway drop-down list, when selected Selecting a Gateway Ethernet Switch Module: Open the Default Gateway page. Select an IP address in the Default Gateway drop-down list.
  • Page 120: Ip Interface Parameters

    Figure 6-33. IP Interface Parameters IP Address — The interface IP address. Prefix Length — The number of bits that comprise the source IP address prefix, or the network mask of the source IP address. Interface — The interface type for which the IP address is defined. Select Port, LAG, or VLAN. Type —...
  • Page 121: Ip Interface Parameter Table

    Figure 6-34. Add a Static IP Interface Complete the fields on the page. Network Mask specifies the subnetwork mask of the source IP address. Click Apply Changes. The new interface is added, and the switch module is updated. Modifying IP Address Parameters Open the IP Interface Parameters page.
  • Page 122: Table 6-24. Ip Interface Parameters Cli Commands

    Click Apply Changes. The selected IP address is deleted, and the switch module is updated. Defining IP Interfaces Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the IP Interface Parameters page. Table 6-24. IP Interface Parameters CLI Commands CLI Command Description ip address ip-address {mask |...
  • Page 123: Defining Dhcp Ip Interface Parameters

    Defining DHCP IP Interface Parameters The DHCP IP Interface page contains fields for specifying the DHCP clients connected to the switch module. Click System→ IP Addressing→ DHCP IP Interface in the tree view. To open the DHCP IP Interface page. Figure 6-36.
  • Page 124: Configuring Domain Name Systems

    Modifying a DHCP IP Interface Open the DHCP IP Interface page. Modify the fields. Click Apply Changes. The entry is modified, and the switch module is updated. Deleting a DHCP IP Interface Open the DHCP IP Interface page. Click Show All. The DHCP Client Table opens.
  • Page 125: Add Dns Server

    Figure 6-37. Domain Naming System (DNS) DNS Status — Enables or disables translating DNS names into IP addresses. DNS Server — Contains a list of DNS servers. DNS servers are added in the Add DNS Server page. DNS Server Currently Active — The DNS server that is currently active. Remove DNS Server —...
  • Page 126: Dns Server Cli Commands

    DNS Server — DNS Server IP Address. Define the relevant fields. Click Apply Changes. The new DNS server is defined, and the switch module is updated. Displaying the DNS Servers Table Open the Domain Naming System (DNS) page. Click Show All. The DNS Server Table opens: Figure 6-39.
  • Page 127: Defining Default Domains

    Table 6-26. DNS Server CLI Commands CLI Command Description no ip name-server server- Removes a name server. address ip domain-name name Defines a default domain name that the software uses to complete unqualified host names. clear host {name | *} Deletes entries from the host name-to-address cache.
  • Page 128: Dns Domain Name Cli Commands

    Figure 6-40. Default Domain Name Default Domain Name (1-158 characters) — Contains a user-defined DNS domain name server. When selected, the DNS domain name is the default domain. Remove — When selected, removes a selected domain. Defining DNS Domain Names Using the CLI Commands The following table summarizes the CLI commands for configuring DNS domain names.
  • Page 129: Mapping Domain Host

    The following is an example of the CLI commands: console> enable console# configure console(config)# ip domain-name www.dell.com Mapping Domain Host The Host Name Mapping page provides parameters for assigning static host names IP addresses. The Host Name Mapping page provides one IP address per host. To open the Host Name Mapping page, click System→...
  • Page 130: Hosts Name Mapping Table

    Adding Host Domain Names Open the Host Name Mapping page. Click Add. The Add Host Name Mapping page opens: Figure 6-42. Add Host Name Mapping Define the relevant fields. Click Apply Changes. The IP address is mapped to the Host Name, and the switch module is updated. Displaying the Hosts Name Mapping Table Open the Host Name Mapping page.
  • Page 131: Configuring Arp

    Check the Remove checkbox. Click Apply Changes. The Host Mapping Table entry is deleted, and the switch module is updated. Mapping IP address to Domain Host Names Using the CLI Commands The following table summarizes the equivalent CLI commands for mapping Domain Host names to IP addresses.
  • Page 132: Arp Settings

    Figure 6-44. ARP Settings Global Settings — Select this option to activate the fields for ARP global settings. ARP Entry Age Out (1-40000000) — For all Ethernet switch module s, the amount of time (seconds) that passes between ARP requests about an ARP table entry. After this period, the entry is deleted from the table.
  • Page 133 Dynamic — The ARP entry is learned dynamically. Static — The ARP entry is a static entry. Remove ARP Entry — When selected, removes an ARP entry. Adding a Static ARP Table Entry: Open the ARP Settings page. Click Add. The Add ARP Entry page opens: Select an interface.
  • Page 134: Running Cable Diagnostics

    Configuring ARP Using the CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the ARP Settings page. Table 6-29. ARP Settings CLI Commands CLI Command Description arp ip_addr hw_addr Adds a permanent entry in the ARP cache. {ethernet interface-number | vlan vlan-id | port-channel number}...
  • Page 135: Viewing Copper Cable Diagnostics

    Viewing Copper Cable Diagnostics The Integrated Cable Test for Copper Cables page contains fields for performing tests on copper cables. Cable testing provides information about where errors occurred in the cable, the last time a cable test was performed, and the type of cable error which occurred. The tests use Time Domain Reflectometry (TDR) technology to test the quality and characteristics of a copper cable attached to a port.
  • Page 136: Copper Cable Test Cli Commands

    Approximate Cable Length — The approximate cable length. This test can only be performed when the port is up and operating at 1 Gbps. Performing a Cable Test Ensure that both ends of the copper cable are connected to a Ethernet switch module. Open the Integrated Cable Test for Copper Cables page.
  • Page 137: Managing Switch Module Security

    console> enable console# test copper-port tdr g11 Cable is open at 100 meters. console# show copper-ports tdr Port Result Length [meters] Date ---- ------ --------------- ---- 13:32:00 15 January 2004 Short 13:32:00 15 January 2004 Test has not been performed Open 13:32:00 15 January 2004 NOTE:...
  • Page 138: Access Profiles

    The Access Profiles page contains fields for configuring Management Lists and applying them to specific interfaces. To open the Access Profiles page, click System→ Management Security→ Access Profiles in the tree view. Figure 6-46. Access Profiles Access Profile — User-defined Access Profile lists. The Access Profile list contains a default value of Console Only.
  • Page 139: Add An Access Profile

    Adding an Access Profile Rules act as filters for determining rule priority, the switch module management method, interface type, source IP address and network mask, and the switch module management access action. Users can be blocked or permitted management access. Rule priority sets the order in which the rules are implemented.
  • Page 140: Add An Access Profile Rule

    Source IP Address — The interface source IP address for which the rule applies. This is an optional field and indicates that the rule is valid for a subnetwork. Network Mask — The IP subnetwork mask. Prefix Length — The number of bits that comprise the source IP address prefix, or the network mask of the source IP address.
  • Page 141: Access Profiles Cli Commands

    Viewing the Profile Rules Table: NOTE: The order in which rules appear in the Profile Rules Table is important. Packets are matched to the first rule which meets the rule criteria. Open the Access Profiles page. Click Show All. The Profile Rules Table page opens: Figure 6-49.
  • Page 142 Table 6-31. Access Profiles CLI Commands CLI Command Description permit [ethernet interface- Sets port permitting conditions for the number | vlan vlan-id | port- management access list. channel number] [service service] permit ip-source ip-address Sets port permitting conditions for the [mask mask | prefix-length] management access list, and the selected [ethernet interface-number |...
  • Page 143: Defining Authentication Profiles

    The following is an example of the CLI commands: console(config)# management access-list mlist console(config-macl)# permit ethernet g11 console(config-macl)# permit ethernet g12 console(config-macl)# deny ethernet g13 console(config-macl)# deny ethernet g14 console(config-macl)# exit console(config)# management access-class mlist console(config)# exit console# show management access-list mlist ----- permit ethernet g11...
  • Page 144: Authentication Profiles

    Figure 6-50. Authentication Profiles Authentication Profile Name — User-defined authentication profile lists to which user-defined authentication profiles are added. The defaults are Network Default and Console Default. Optional Methods — User authentication methods. Possible options are: None — No user authentication occurs. Local —...
  • Page 145: Add Authentication Profile

    Select the authentication method using the navigation arrows. Click Apply Changes. The user authentication profile is updated to the switch module. Adding an Authentication Profile: Open the Authentication Profiles page. Click Add. The Add Authentication Profile page opens: Figure 6-51. Add Authentication Profile Configure the profile.
  • Page 146: Authentication Profile Cli Commands

    Figure 6-52. Authentication Profiles Table Deleting an Authentication Profiles: Open the Authentication Profiles page. Click Show All. The Authentication Profile Table opens. Select an authentication profile. Select the Remove check box. Click Apply Changes. The selected authenticating profile is deleted. Configuring an Authentication Profile Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the Authentication Profiles page.
  • Page 147: Assigning Authentication Profiles

    Assigning Authentication Profiles After Authentication Profiles are defined, the Authentication Profiles can be applied to Management Access methods. For example, console users can be authenticated by Authentication Method List 1, while Telnet users are authenticated by Authentication Method List 2. To open the Select Authentication page, click System→...
  • Page 148 Applying an Authentication List to Console Sessions Open the Select Authentication page. Select an Authentication Profile in the Console field. Click Apply Changes. Console sessions are assigned an Authentication List. Applying an Authentication Profile to Telnet Sessions Open the Select Authentication page. Select an Authentication Profile in the Telnet field.
  • Page 149: Select Authentication Cli Commands

    Assigning Access Authentication Profiles or Sequences Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the Select Authentication page. Table 6-33. Select Authentication CLI Commands CLI Command Description enable authentication Specifies the authentication method list when [default | list-name] accessing a higher privilege level from a remote Telnet, Console or SSH.
  • Page 150 The following is an example of the CLI commands: console(config-line)# enable authentication default console(config-line)# login authentication default console(config-line)# exit console(config)# ip http authentication radius local console(config)# ip https authentication radius local console(config)# exit console# show authentication methods Login Authentication Method Lists --------------------------------- Default: Radius Local Line Console_Login: Line, None...
  • Page 151: Defining The Local User Databases

    Defining the Local User Databases The Local User Database page contains fields for defining users, passwords and access levels. To open the Local User Database page click System→ Management Security→ Local User Database in the tree view. Figure 6-54. Local User Database User Name —...
  • Page 152: Local User Table

    Defining a New User: Open the Local User Database page. Click Add. The Add User page opens: Figure 6-55. Add a User Name Define the fields. Click Apply Changes. The new user is defined, and the switch module is updated. Displaying the Local User Table: Open the Local User Database page.
  • Page 153: Defining Line Passwords

    Select a User Name. Select the Remove check box. Click Apply Changes. The selected user is deleted, and the switch module is updated. Assigning Users Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the Local User Database page.
  • Page 154: Line Password

    Figure 6-57. Line Password Line Password for Console/Telnet/Secure Telnet (0-159 Characters) — The line password for accessing the switch module via a console, Telnet, or Secure Telnet session. Passwords can contain a maximum of 159 characters. Confirm Password — Confirms the new line password. The password appears in the ***** format. Defining Line Passwords for Console Sessions Open the Line Password page Define the Console Line Password field.
  • Page 155: Defining Enable Password

    Specifies a password on a line. [encrypted] The following is an example of the CLI commands: console(config-line)# password dell Defining Enable Password The Enable Password page sets a local password to control access to Normal, Privilege, and Global Configuration. To open the Enable Password page, click System → Management Security →...
  • Page 156: Enable Password

    Figure 6-58. Enable Password Select Enable Access Level — Access level associated with the enable password. Possible field values are 1-15. Password (0-159 Characters) — The currently configured enable password. Enable passwords can contain a maximum of 159 characters. Confirm Password — Confirms the new enable password. The password appears in the ***** format.
  • Page 157: Defining Tacacs+ Settings

    Assigning Enable Passwords Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the Enable Password page. Table 6-36. Modify Enable Password CLI Commands CLI Command Description enable password [level level] Sets a local password to control access to user and password [encrypted] privilege levels.
  • Page 158: Tacacs+ Settings

    Figure 6-59. TACACS+ Settings Host IP Address — Specifies the TACACS+ Server IP address. Priority (0-65535) — Specifies the order in which the TACACS+ servers are used. The default is 0. Source IP Address — The switch module source IP address used for the TACACS+ session between the switch module and the TACACS+ server.
  • Page 159: Add Tacacs+ Host

    The TACACS+ default parameters are user-defined defaults. The default settings are applied to newly defined TACACS+ servers. If default values are not defined, the system defaults are applied to the new TACACS+ new servers. The following are the TACACS+ defaults: Source IP Address —...
  • Page 160: Tacacs+ Cli Commands

    Figure 6-61. TACACS+ Table Removing a TACACS+ Server Open the TACACS+ Settings page. Click Show All. The TACACS+ Table opens. Select a TACACS+ Table entry. Select the Remove check box. Click Apply Changes. The TACACS+ server is removed, and the switch module is updated. Defining TACACS+ Settings Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the TACACS+ Settings page.
  • Page 161: Configuring Radius Global Parameters

    Table 6-37. TACACS+ CLI Commands CLI Command Description tacacs-server timeout timeout Specifies the timeout value in seconds. (Range: 1 - 30.) tacacs-server source-ip source Specifies the source IP address. (Range: Valid IP Address.) show tacacs+ [ip-address] Displays configuration and statistics for a TACACS+ server.
  • Page 162: Radius Settings

    • Secure Telnet Access • Web Access • Console to switch module Access To open the RADIUS Settings page, click System → Management Security → RADIUS in the tree view. Figure 6-62. RADIUS Settings IP Address — The list of Authentication Server IP addresses. Priority (0-65535) —...
  • Page 163: Add Radius Server

    Key String (1-128 Characters) — The Key string used for authenticating and encrypting all RADIUS communications between the switch module and the RADIUS server. This key is encrypted. Source IP Address — Specifies the source IP address that is used for communication with RADIUS servers.
  • Page 164: Radius Servers List

    Figure 6-63. Add RADIUS Server Define the fields. Click Apply Changes. The new RADIUS server is added, and the switch module is updated. Displaying the RADIUS Server List: Open the RADIUS Settings page. Click Show All. The RADIUS Servers List page opens: Figure 6-64.
  • Page 165: Radius Settings Cli Commands

    Click Apply Changes. The RADIUS Server settings are modified, and the switch module is updated. Deleting a RADIUS Server for the RADIUS Servers List: Open the RADIUS Settings page. Click Show All. The RADIUS Servers List page opens. Select a RADIUS Server in the RADIUS Servers List. Select the Remove check box.
  • Page 166 The following is an example of the CLI commands: console(config)# radius-server timeout 5 console(config)# radius-server retransmit 5 console(config)# radius-server deadtime 10 console(config)# radius-server key dell-server console(config)# radius-server host 196.210.100.1 auth-port 1645 timeout 20 console# show radius-servers Port Auth Acct TimeOu...
  • Page 167: Defining Snmp Parameters

    Defining SNMP Parameters Simple Network Management Protocol (SNMP) provides a method for managing network Ethernet switch modules. Ethernet switch modules supporting SNMP run a local software (agent). The SNMP agents maintain a list of variables, which are used to manage the network device. The variables are defined in the Management Information Base (MIB).
  • Page 168: Add Snmp Community

    Community String — Functions as a password and used to authenticate the selected management station to the switch module. Access Mode — Defines the access rights of the community. The possible field values are: Read Only — The management access is restricted to read-only, for all MIBs except the community table, for which there is no access.
  • Page 169: Snmp Community Cli Commands

    Click Show All. The Community Table opens: Figure 6-67. Community Table Deleting Communities Open the SNMP Community page. Click Show All. The Community Table opens. Select a community from the Community Table. Select the Remove check box. Click Apply Changes. The selected community entry is deleted, and the switch module is updated.
  • Page 170: Defining Traps

    The following is an example of the CLI commands: console(config)# snmp-server community public_1 su 1.1.1.1 console(config)# snmp-server community public_2 rw 2.2.2.2 console(config)# snmp-server community public_3 ro 3.3.3.3 console(config)# snmp-server host 1.1.1.1 public_1 1 console(config)# snmp-server host 2.2.2.2 public_2 2 console(config)# end console# show snmp Community-String Community-Access...
  • Page 171: Snmp Trap Settings

    Figure 6-68. SNMP Trap Settings SNMP Trap — Enables sending SNMP traps or SNMP notifications from the switch module to defined trap recipients. Authentication Trap — Enables sending SNMP traps when authentication failed to define recipients. Select Recipient IP — Specifies the IP address to whom the traps are sent. Community String —...
  • Page 172: Add Trap Recipient

    SNMP traps are enabled on the switch module. Enabling Authentication Traps on the Switch Module Open the SNMP Trap Settings page. Select Enable in the Authentication Trap drop-down list. Define the fields. Click Apply Changes. Authentication traps are enabled on the switch module. Adding a New Trap Recipient: Open the SNMP Trap Settings page.
  • Page 173: Snmp Trap Settings Cli Commands

    Figure 6-70. Trap Recipient Table Deleting a Trap Manager Table Entry Open SNMP Trap Settings page. Click Show All. The Trap Recipient Table page opens. Select a Trap Recipient Table entry. Select the Remove check box. Click Apply Changes. The selected trap manager is deleted, and the switch module is updated. Configuring Traps Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the SNMP Trap Settings page.
  • Page 174: Managing Files

    console(config)# snmp-server enable traps console(config)# snmp-server trap authentication console(config)# snmp-server host 41.1.1.3 public 1 console# show snmp Community-String Community-Access IP address ------------------------------------- ----------------------------------- ----------------------- public_1 super 1.1.1.1 public_2 readwrite 2.2.2.2 public_3 readonly 3.3.3.3 Traps are enabled. Authentication-failure trap is enabled. Trap-Rec-Address Trap-Rec-Community Version...
  • Page 175: Downloading Files

    • Running Configuration File — Contains all Startup Configuration file commands, as well as all commands entered during the current session. After the switch module is powered down or rebooted, all commands stored in the Running Configuration file are lost. During the startup process, all commands in the Startup Configuration file are copied to the Running Configuration file and applied to the switch module.
  • Page 176: File Download From Server

    Figure 6-71. File Download From Server Firmware Download — The Firmware file is downloaded. If Firmware Download is selected, the Configuration Download fields are grayed out. Configuration Download — The Configuration file is downloaded. If Configuration Download is selected, the Firmware Download fields are grayed out. Firmware Download TFTP Server IP Address —...
  • Page 177: Uploading Files

    Running Configuration — Downloads commands into the Running Configuration file. Startup Configuration — Downloads the Startup Configuration file, and overwrites it. Backup Configuration — Downloads the Backup Configuration file, and overwrites it. Downloading Files: Open the File Download From Server page. Define the file type to download.
  • Page 178: File Upload To Server

    Figure 6-72. File Upload to Server Firmware Upload — The Firmware file is uploaded. If Firmware Upload is selected, the Configuration Upload fields are grayed out. Configuration Upload — The Configuration file is uploaded. If Configuration Upload is selected, the Software Image Upload fields are grayed out. Software Image Upload TFTP Server IP Address —...
  • Page 179: Copying Files

    Uploading Files Open the File Upload to Server page. Define the file type to upload. Define the fields. Click Apply Changes. The software is uploaded to the TFTP server. Uploading Files Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the File Upload to Server page.
  • Page 180: Copy Files

    Figure 6-73. Copy Files Copy Configuration — When selected, copies either the Running Configuration, Startup Configuration or Backup Configuration files. The possible field values are: Source — Copies either the Running Configuration, Startup Configuration or Backup Configuration files. Destination — The file to which the Running Configuration, Startup Configuration or Backup Configuration file is copied.
  • Page 181: Defining Advanced Settings

    Click Apply Changes. The company factory default settings are restored, and the switch module is updated. Copying and Deleting Files Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the Copy Files page. Table 6-42.
  • Page 182: General Settings

    Figure 6-74. General Settings Attribute — The general setting attribute. Current — The currently configured value. After Reset — The future (after reset) value. By entering a value in the After Reset column, memory is allocated to the field table. Max RAM Log Entries (20-400) —...
  • Page 183: General Settings Cli Commands

    Viewing RAM Log Entries Counter Using the CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the General Settings page. Table 6-43. General Settings CLI Commands CLI Command Description logging buffered size number Sets the number of syslog messages stored in the internal buffer (RAM).
  • Page 184 Configuring System Information...
  • Page 185: Configuring Switch Module Information

    Configuring Switch Module Information This section provides all system operations and general information for configuring network security, ports, address tables, GARP, VLANs, Spanning Tree, Port Aggregation, and Multicast Support. Configuring Network Security The switch module enables network security through both Access Control Lists and Locked Ports. To open the Network Security page select Switch →...
  • Page 186: Configuring Port Based Authentication

    Advanced Port Based Authentication also enables VLAN based authentication. Specific VLANs in the switch module are always available, even if specific ports attached to the VLAN are unauthorized. For example, Voice over IP does not require authentication, while data traffic requires authentication.
  • Page 187 Enable — Enables port based authentication on the switch module. Disable — Disables port based authentication on the switch module. Authentication Method — The Authentication method used. The possible field values are: RADIUS, None — Indicates that port authentication is performed first via RADIUS server. If the RADIUS server cannot be reached, then no authenication method is used.
  • Page 188: Port Based Authentication

    Supplicant Timeout (1-65535) — The amount of time that lapses before EAP requests are resent to the user. The field value is in seconds. The field default is 30 seconds. Max EAP Requests (1-10) — The total amount of EAP requests sent. If a response is not received after the defined period, the authentication process is restarted.
  • Page 189: Port Authentication Cli Commands

    Select the interface in the Copy Parameters from field. Select an interface in the Port Based Authentication Table. Select the Copy to check box to define the interfaces to which the Port based authentication parameters are copied. Click Apply Changes. The parameters are copied to the selected port in the Port Based Authentication Table, and the switch module is updated.
  • Page 190: Configuring Advanced Port Based Authentication

    Table 7-44. Port Authentication CLI Commands CLI Command Description switch module show dot1x [ethernet Displays 802.1X status for the interface] for the specified interface. switch module show dot1x users [username Displays 802.1X users for the username] The following is an example of the CLI commands: console>...
  • Page 191: Multiple Hosts

    Figure 7-77. Multiple Hosts Port — The port number for which Advanced Port Based Authentication is enabled. Multiple Hosts — Enables or disables a single host to authorize multiple hosts for system access. This setting must be enabled in order to either disable the ingress-filter, or to use port-lock security on the selected port.
  • Page 192: Multiple Hosts Cli Commands

    Not in auto mode — Indicates that the port control is Forced Authorized, and clients have full port access. Single-host Lock — Indicates that the port control is Auto and a single client has been authenticated via the port. No Single Host — Indicates that Multiple Host is enabled. Number of Violations —...
  • Page 193: Authenticating Users

    Console# configure Console(config)# interface ethernet g11 Console(config-if)# dot1x multiple-hosts Authenticating Users The Authenticated Users page displays user port access lists. To open the Authenticated Users page, click Switch → Network Security → Authenticated Users. Figure 7-79. Authenticated Users User Name — List of users authorized via the RADIUS Server. Port —...
  • Page 194: Configuring Port Security

    None — The user was not authenticated. MAC Address — The supplicant MAC address. Displaying the Authenticated Users Table Open the Authenticated Users page. Click Show All. The Authenticated Users Table opens: Figure 7-80. Authenticated Users Table Authenticating Users Using the CLI Commands The following table summarizes the equivalent CLI commands for authenticating users as displayed in the Authenticated Users page.
  • Page 195: Port Security

    is not tied to that port (either it was learned on a different port, or is unknown to the system), the protection mechanism is invoked, and can provide various options. Unauthorized packets arriving to a locked port are either: • Forwarded •...
  • Page 196 Locked — Locks Port. Action on Violation — The action to be applied to packets arriving on a locked port. The possible field values are: Forward — Forwards the packets from an unknown source, however, the MAC address is not learned.
  • Page 197: Port Security Cli Commands

    Figure 7-82. Port Security Table Configuring Locked Port Security with CLI Commands The following table summarizes the equivalent CLI commands for configuring Locked Port security as displayed in the Port Security page. Table 7-47. Port Security CLI Commands CLI Command Description shutdown Disables interfaces.
  • Page 198: Configuring Ports

    console # show ports security Port Status Action Trap Frequency Counter ----- ------- ------- ------- --------- -------- locked Discard Enable locked Discard, Disable Shutdown Unlocked Configuring Ports The Ports page contians links to port functionality pages including advanced features, such as Storm Control and Port Mirroring.
  • Page 199: Port Configuration

    Figure 7-83. Port Configuration Port — The port number for which port parameters are defined. Description — A brief interface description, such as Ethernet. Port Type — The type of port. Admin Status — Enables or disables traffic forwarding through the port. The new port status is displayed in the Current Port Status field.
  • Page 200 Admin Duplex — The port duplex mode can be either Full or Half. Full indicates that the interface supports transmission between the switch module and its link partner in both directions simultaneously. Half indicates that the interface supports transmission between the switch module and the client in only one direction at a time.
  • Page 201: Port Configuration Cli Commands

    Select a port in the Port Field. Modify the remaining fields. Click Apply Changes. The port parameters are saved to the switch module. Displaying the Port Configuration Table: Open the Port Configuration page. Click Show All. The Ports Configuration Table opens: Figure 7-84.
  • Page 202 Table 7-48. Port Configuration CLI Commands CLI Command Description description string Adds a description to an interface configuration. shutdown Disables interfaces that are part of the currently set context. set interface active {ethernet Reactivates an interface that is interface | port-channel port-channel- shutdown due to security reasons.
  • Page 203 The following is an example of the CLI commands: console(config)# interface ethernet g15 console(config-if)# description "RD SW#3" console(config-if)# shutdown console(config-if)# no shutdown console(config-if)# speed 100 console(config-if)# duplex full console(config-if)# negotiation console(config-if)# back-pressure console(config-if)# flowcontrol on console(config-if)# mdix auto console(config-if)# end console# show interfaces configuration ethernet g15 Port Type...
  • Page 204: Defining Lag Parameters

    Console# show interfaces status Port Type Duplex Speed Flow Link Back Mdix Control State Pressure Mode ---- ----- ------ ------ ---- ------ ----- ------ ---- Full Auto Enable Full 1000 Disable Type Duplex Speed Flow Back Link Control Pressure State ---- ----- -----...
  • Page 205: Lag Configuration

    Figure 7-85. LAG Configuration LAG — The LAG number. Description — Provides a user-defined description of the configured LAG. LAG Type — The port types that comprise the LAG. Admin Status — Enables or disables the selected LAG. Current LAG Status — Indicates if the LAG is currently operating. Re-Activate Suspended LAG —...
  • Page 206 Admin Flow Control — Enables/disables flow control, or enables the auto negotiation of flow control on the LAG. Flow Control mode is effective on the ports operating in Full Duplex in the LAG. Current Flow Control — The user-designated flow control setting. Defining LAG Parameters Open the LAG Configuration page.
  • Page 207: Lag Configuration Cli Commands

    Figure 7-86. LAG Configuration Table Configuring LAGs with CLI Commands The following table summarizes the equivalent CLI commands for configuring LAGs as displayed in the LAG Configuration page. Table 7-49. LAG Configuration CLI Commands CLI Command Description interface port-channel port- Enters the interface configuration mode of a channel-number specific port-channel.
  • Page 208 Table 7-49. LAG Configuration CLI Commands CLI Command Description show interfaces configuration Displays the configuration for all configured [ethernet interface| port-channel interfaces. port-channel-number] show interfaces status [ethernet Displays the status for all configured interface |port-channel port- interfaces. channel-number] show interfaces description Displays the description for all configured [ethernet interface |port-channel interfaces.
  • Page 209: Enabling Storm Control

    The following is an example of the CLI commands: console# console# configure console(config)# interface port-channel 2 console(config-if)# no negotiation console(config-if)# speed 100 console(config-if)# flowcontrol on console(config-if)# exit console(config)# interface port-channel 3 console(config-if)# shutdown console(config-if)# exit console(config)# interface port-channel 4 console(config-if)# back-pressure console(config-if)# description p4 console(config-if)# exit console# show interfaces port-channel...
  • Page 210: Storm Control

    The Storm Control page provides fields for enabling and configuring Storm Control. To open the Storm Control page, click Switch→ Ports→ Storm Control in the tree view. Figure 7-87. Storm Control Count Multicast with Broadcast — Counts Broadcast and Multicast traffic. The possible field values are: –...
  • Page 211: Storm Control Cli Commands

    Modifying Storm Control Port Parameters Open the Storm Control page. Modify the fields. Click Apply Changes The Storm Control port parameters are saved to the switch module. Displaying the Port Parameters Table Open the Storm Control page. Click Show All. The Storm Control Settings Table opens: Figure 7-88.
  • Page 212: Defining Port Mirroring Sessions

    Table 7-50. Storm Control CLI Commands CLI Command Description port storm-control Broadcast rate Configures the maximum Broadcast rate. rate show ports storm-control [ethernet Displays the storm control configuration. interface] The following is an example of the CLI commands: console> enable console# configure console(config)# port storm-control include-multicast console(config)# port storm-control broadcast rate 8000...
  • Page 213: Port Mirroring

    • IP interfaces are not configured on the port. • GVRP is not enabled on the port. • The port is not a VLAN member. • Only one destination port can be defined. The following restrictions apply to ports configured to be source ports: •...
  • Page 214: Port Mirroring Cli Commands

    Remove — When selected, removes the port mirroring session. Adding a Port Mirroring Session Open the Port Mirroring page. Click Add. The Add Source Port page opens. Select the destination port from the Destination Port drop-down menu. Select the source port from the Source Port drop-down menu. Define the Type field.
  • Page 215: Configuring Address Tables

    Configuring Address Tables MAC addresses are stored in either the Static Address or the Dynamic Address databases. A packet addressed to a destination stored in one of the databases is forwarded immediately to the port. The Dynamic Address Table can be sorted by interface, VLAN, and MAC Address. MAC addresses are dynamically learned as packets from sources arrive at the switch module.
  • Page 216: Static Mac Address

    Status — MAC address status. Possible values are: Secure — Used for defining static MAC Addresses for Locked ports. Permanent — The MAC address is permanent. Delete on Reset — The MAC address is deleted when the switch module is reset. Delete on Timeout —...
  • Page 217: Viewing Dynamic Addresses

    Configuring Static Address Parameters Using CLI Commands The following table summarizes the equivalent CLI commands for configuring static address parameters as displayed in the Static MAC Address page. Table 7-52. Static Address CLI Commands CLI Command Description bridge address mac-address [permanent Adds a static MAC-layer station source | delete-on-reset | delete-on-timeout | address to the bridge table.
  • Page 218: Dynamic Addresses Table

    Figure 7-91. Dynamic Addresses Table Address Aging (10-360) — Specifies the amount of time the MAC Address remains in the Dynamic Addresses Table before it is timed out if no traffic from the source is detected. The default value is 300 seconds. Interface —...
  • Page 219: Query And Sort Cli Commands

    Querying the Dynamic Address Table Open the Dynamic Addresses Table. Define the parameter by which to query the Dynamic Address Table. Entries can be queried by Port, MAC Address, or VLAN ID. Click Query. The Dynamic Addresses Table is queried. Sorting the Dynamic Address Table Open the Dynamic Addresses Table.
  • Page 220: Configuring Garp

    00:60:70:4C:73:FF dynamic 00:60:70:8C:73:FF dynamic 00:10:0D:48:37:FF static Configuring GARP Generic Attribute Registration Protocol (GARP) is a general-purpose protocol that registers any network connectivity or membership-style information. GARP defines a set of switch modules interested in a given network attribute, such as VLAN or Multicast address. When configuring GARP, ensure the following: •...
  • Page 221: Garp Timers

    Interface — Determines if enabled on a port or on a LAG. GARP Join Timer (10 - 2147483640) — Time, in milliseconds, that PDUs are transmitted. The default value is 200 msec. GARP Leave Timer (10 - 2147483640) — Time lapse, in milliseconds, that the switch module waits before leaving its GARP state.
  • Page 222: Configuring The Spanning Tree Protocol

    Table 7-54. GARP Timer CLI Commands CLI Command Description garp timer {join | leave | leaveall} Adjusts the GARP application join, leave, and leaveall GARP timer values. timer_value The following is an example of the CLI commands: console(config)# interface ethernet g11 console(config-if)# garp timer leave 900 console(config-if)# end console# show gvrp configuration ethernet g11...
  • Page 223: Defining Stp Global Settings

    • Classic STP — Provides a single path between end stations, avoiding and eliminating loops. For more information on configuring Classic STP, see "Defining STP Global Settings" on page 207. • Rapid STP — Detects and uses of network topologies that provide faster spanning tree convergence, without creating forwarding loops.
  • Page 224 Classic STP — Enables Classic STP on the switch module. This is the default value. Rapid STP — Enables Rapid STP on the switch module. Port Cost Method — Determines the Spanning Tree default path cost method. The possible field values are: Short —...
  • Page 225: Stp Global Parameter Cli Commands

    Defining STP Global Parameters Open the STP Global Settings page. Select the port that needs to be enabled from the Select a Port drop-down menu. Select Enable in the Spanning Tree State field. Select the STP mode in the STP Operation Mode field, and define the bridge settings. Click Apply Changes.
  • Page 226 Table 7-55. STP Global Parameter CLI Commands CLI Command Description show spanning-tree [detail] [active Displays spanning tree configuration | blockedports] information - detailed information or active ports or blocked ports. The following is an example of the CLI commands: console(config)# spanning-tree console(config)# spanning-tree mode rstp console(config)# spanning-tree priority 12288 console(config)# spanning-tree hello-time 5...
  • Page 227: Defining Stp Port Settings

    Interfaces Name State Prio. Cost Role PortFast Type ----- ------ ----- ---- ------ ------ --------- ------ enabled 128.1 DSBL Dsbl P2p (STP) enabled 128.2 DSBL Dsbl P2p (STP) enabled 128.3 DSBL Dsbl P2p (STP) Defining STP Port Settings The STP Port Settings page contains fields for assigning STP properties to individual ports. To open the STP Port Settings page, click Switch→...
  • Page 228 Port State — The current port STP state. If enabled, the port state determines what forwarding action is taken on traffic. Possible port states are: Disabled — The port link is currently down. Blocking — The port is currently blocked and cannot be used to forward traffic or learn MAC addresses.
  • Page 229: Stp Port Settings Cli Commands

    Enabling STP on a Port Open the STP Port Settings page. Select Enabled in the STP Port Status field. Define the Fast Link, Path Cost, and the Priority fields. Click Apply Changes. STP is enabled on the port. Modifying STP Port Properties Open the STP Port Settings page.
  • Page 230: Defining Stp Lag Settings

    console(config)# interface ethernet g15 console(config-if)# spanning-tree disable console(config-if)# spanning-tree cost 35000 console(config-if)# spanning-tree port-priority 96 console(config-if)# end console# show spanning-tree ethernet g15 Port g15 disabled Role: disabled State: disabled Port cost: 35000 Port id: 96.5 Port Fast: No (configured: No) Type: P2p (configured: Auto) Address: 00:e8:00:b4:c0:00...
  • Page 231: Stp Lag Settings

    Figure 7-95. STP LAG Settings Select a LAG — The user-defined LAG. For more information, see "Defining LAG Membership" on page 240. STP — Enables or disables STP on the LAG. Fast Link — Enables Fast Link mode for the LAG. If Fast Link mode is enabled for a LAG, the LAG State is automatically placed in the Forwarding state when the LAG is up.
  • Page 232: Stp Lag Settings Cli Commands

    Broken — The LAG is currently malfunctioning and cannot be used for forwarding traffic. Path Cost (1-200000000) — Amount the LAG contributes to the root path cost. The path cost is adjusted to a higher or lower value, and is used to forward traffic when a path being rerouted. The path cost has a value of 1 to 200000000.
  • Page 233: Configuring Rapid Spanning Tree

    Table 7-57. STP LAG Settings CLI Commands CLI Command Description show spanning-tree [detail] [active | Displays detailed spanning tree blockedports] information on active or blocked ports The following is an example of the CLI commands: console(config)# interface port-channel 1 console(config-if)# spanning-tree port-priority 16 Configuring Rapid Spanning Tree While Classic Spanning Tree guarantees preventing L2 forwarding loops in a general network topology, convergence can take up to 30-60 seconds.
  • Page 234: Rapid Spanning Tree (Rstp)

    Figure 7-96. Rapid Spanning Tree (RSTP) Interface — Port or LAG on which Rapid STP is enabled. Role — The port role assigned by the STP algorithm in order to provide to STP paths. The possible field values are: Root — Provides the lowest cost path to forward packets to root Ethernet switch module. Designated —...
  • Page 235: Rstp Settings Cli Command

    of the chosen network layer protocols has been configured, packets from each network layer protocol can be sent over the link. The link remains configured for communications until explicit LCP or NCP packets close the link, or until some external event occurs. This is the actual switch module port link type.
  • Page 236: Configuring Vlans

    Configuring VLANs VLANs are logical subgroups of a Local Area Network (LAN) created via software rather than defining a hardware solution. VLANs combine user stations and network devices into a single domain regardless of the physical LAN segment to which they are attached. VLANs allow network traffic to flow more efficiently within subgroups.
  • Page 237: Vlan Membership

    Figure 7-97. VLAN Membership This page contains the following fields: Show VLAN — Lists and displays specific VLAN information according to VLAN ID or VLAN name. VLAN Name — The user-defined VLAN name. Status — The VLAN type. Possible values are: Dynamic —...
  • Page 238: Vlan Membership Group Cli Commands

    The new VLAN is added, and the switch module is updated. Modifying VLAN Membership Groups Open the VLAN Membership page. Select a VLAN from the Show VLAN drop-down menu. Modify the fields as desired. Click Apply Changes. The VLAN membership information is modified, and the switch module is updated. Deleting VLANs Open the VLAN Membership page.
  • Page 239: Vlan Port Membership Table

    console(config)# vlan database console(config-vlan)# vlan 1972 console(config-vlan)# end console(config)# interface vlan 1972 console(config-if)# name Marketing console(config-if)# end console(config)# VLAN Port Membership Table The VLAN Port Membership Table contains a Port Table for assigning ports to VLANs. Ports are assigned VLAN membership by toggling through the Port Control settings. Ports can have the following values: Table 7-60.
  • Page 240: Port-To-Vlan Group Assignments Cli Commands

    Deleting a VLAN Open the VLAN Membership page. Click the VLAN ID or VLAN Name option button and select a VLAN from the drop-down menu. Select the Remove VLAN check box. Click Apply Changes. The selected VLAN is deleted, and the switch module is updated. Assigning Ports to VLAN Groups Using CLI Commands The following table summarizes the equivalent CLI commands for assigning ports to VLAN groups.
  • Page 241: Defining Vlan Ports Settings

    The following is an example of the CLI commands: console(config)# vlan database console(config-vlan)# vlan 23-25 console(config-vlan)# end console(config)# interface vlan 23 console(config-if)# name Marketing console(config-if)# end console(config)# interface ethernet g8 console(config-if)# switchport mode access console(config-if)# switchport access vlan 23 console(config-if)# end console(config)# interface ethernet g9 console(config-if)# switchport mode trunk console(config-if)# swithport mode trunk allowed vlan add...
  • Page 242: Vlan Port Settings

    Figure 7-98. VLAN Port Settings Port — The port number included in the VLAN. Port VLAN Mode — The port mode. Possible values are: General — The port belongs to VLANs, and each VLAN is user-defined as tagged or untagged (full 802.1Q mode).
  • Page 243: Vlan Port Cli Commands

    Reserve VLAN for Internal Use — The VLAN selected by the user to be the reserved VLAN if not in use by the system. Assigning Port Settings Open the VLAN Port Settings page. Select the port to which settings need to be assigned from the Port drop-down menu. Complete the remaining fields on the page Click Apply Changes.
  • Page 244: Defining Vlan Lag Settings

    Console (config)# interface range ethernet g11-16 Console (config-if)# switchport mode access Console (config-if)# switchport general pvid 234 Console (config-if)# switchport general allowed vlan add 1,2,5,6 tagged Console (config-if)# switchport general ingress-filtering disable Defining VLAN LAG Settings The VLAN LAG Setting page provides parameters for managing LAGs that are part of a VLAN. VLANs can either be composed of individual ports or of LAGs.
  • Page 245: Lag Vlan Assignments Cli Commands

    Access — The LAG belongs to a single, untagged VLAN. Trunk — The LAG belongs to VLANs in which all ports are tagged (except for an optional single native VLAN). PVID — Assigns a VLAN ID to untagged packets. The possible field values are 1-4095. VLAN 4095 is defined as per standard and industry practice, as the Discard VLAN.
  • Page 246 Table 7-63. LAG VLAN Assignments CLI Commands CLI Command Description switchport general pvid vlan-id Configure the LAG VLAN ID (PVID) when the interface is in general mode. switchport general allowed vlan Adds or removes VLANs from a general LAG. add vlan-list [tagged | untagged] switchport general acceptable- Discards untagged packets at ingress.
  • Page 247: Defining Vlan Protocol Groups

    Defining VLAN Protocol Groups The Protocol Group page provides parameters for configuring frame types to specific protocol groups. To open the Protocol Group page, click Switch→ VLAN→ Protocol Group in the tree view. NOTE: Mapping to a non-configured VLAN is possible. Figure 7-100.
  • Page 248: Adding Protocol Ports

    Click Apply Changes. The protocol group is assigned, and the switch module is updated. Assigning VLAN Protocol Group Settings Open the Protocol Group page. Complete the fields on the page. Click Apply Changes. The VLAN protocol group parameters are defined, and the switch module is updated. Removing Protocols From the Protocol Group Table Open the Protocol Group page.
  • Page 249: Protocol Port Table

    Figure 7-101. Protocol Port Table Interface — Port or LAG number assigned to a protocol group. Group ID — Protocol group ID to which the interface is assigned. Protocol group IDs are defined in the Protocol Group Table. VLAN ID — Attaches the interface to a user-defined VLAN ID. The VLAN ID is defined on the VLAN Membership page.
  • Page 250: Configuring Gvrp

    Defining Protocol Ports Using CLI Commands The following table summarizes the equivalent CLI command for defining Protocol Ports. Table 7-65. Protocol Port CLI Commands CLI Command Description switchport general map Sets a protocol-based classification rule. protocols-group group vlan vlan-id The following example sets a protocol-based classification rule of protocol group 1 to VLAN 8: console (config-if)# switchport general map protocols-group 1 vlan 8 Configuring GVRP GARP VLAN Registration Protocol (GVRP) is specifically provided for automatic distribution of...
  • Page 251: Gvrp Global Parameters Cli Commands

    GVRP Global Status — Enables or disables GVRP on the switch module. GVRP is disabled by default. Interface — The port or LAG for which GVRP is enabled. GVRP State — Enables or disables GVRP on an interface. Dynamic VLAN Creation — Enables or disables VLAN creation through GVRP. GVRP Registration —...
  • Page 252 Table 7-66. GVRP Global Parameters CLI Commands CLI Command Description show gvrp error-statistics [ethernet Displays GVRP error statistics. interface| port-channel port-channel- number] show gvrp statistics [ethernet Displays GVRP statistics. interface| port-channel port-channel- number] clear gvrp statistics [ethernet Clears all the GVRP statistics information. interface| port-channel port-channel- number] The following is an example of the CLI commands:...
  • Page 253: Aggregating Ports

    Aggregating Ports Port Aggregation optimizes port usage by linking a group of ports together to form a single Link Aggregated Groups (LAGs). Port Aggregation multiplies the bandwidth between the switch modules, increases port flexibility, and provides link redundancy. The switch module supports up to six LAGs per system, and six ports per LAG per switch module.
  • Page 254: Defining Lacp Parameters

    Defining LACP Parameters The LACP Parameters page contains fields for configuring LACP LAGs. Aggregate ports can be linked into link-aggregation port-groups. Each group is comprised of ports with the same speed. Aggregated Links can be manually setup or automatically established by enabling Link Aggregation Control Protocol (LACP) on the relevant links.
  • Page 255: Lacp Parameters Cli Commands

    Defining Link Aggregation Port Parameters Open the LACP Parameters page. Complete the fields in the Port Parameters area. Click Apply Changes. The parameters are defined, and the switch module is updated. Displaying the LACP Parameters Table Open the LACP Parameters page. Click Show All.
  • Page 256: Defining Lag Membership

    The following is an example of the CLI commands: Console (config)# lacp system-priority 120 Console (config)# interface ethernet g11 Console (config-if)# lacp port-priority 247 Console (config-if)# lacp timeout long Console (config-if)# end Console# show lacp ethernet g11 statistics Port g11 LACP Statistics: LACP PDUs sent:2 LACP PDUs received:2 Defining LAG Membership...
  • Page 257: Lag Membership

    Figure 7-104. LAG Membership LACP — Aggregates the port to a LAG, using LACP. LAG — Adds a port to a LAG, and indicates the specific LAG to which the port belongs. Configuring a Port to a LAG or LACP Open the LAG Membership page.
  • Page 258: Multicast Forwarding Support

    Table 7-68. LAG Membership CLI Commands CLI Command Description channel-group port- Associates a port with a port-channel. Use the channel-number mode no form of this command to remove the {on | auto} channel-group configuration from the interface. show interfaces port-channel Displays port-channel information.
  • Page 259: Multicast Global Parameters

    When IGMP snooping is enabled globally, the switching ASIC is programmed to forward all IGMP packets to the CPU. The CPU analyzes the incoming packets and determines which ports are to join which Multicast groups, which ports have Multicast routers generating IGMP queries, and what routing protocols are forwarding packets and Multicast traffic.
  • Page 260: Adding Bridge Multicast Address Members

    Select Enable in the IGMP Snooping Status field. Click Apply Changes. IGMP Snooping is enabled on the switch module. Enabling Multicast Forwarding and IGMP Snooping Using CLI Commands The following table summarizes the equivalent CLI commands for enabling Multicast forwarding and IGMP Snooping as displayed on the Multicast Global Parameters page.
  • Page 261: Igmp Port/Lag Members Table Control Settings

    Figure 7-106. Bridge Multicast Group VLAN ID — Identifies a VLAN and contains information about the Multicast group address. Bridge Multicast Address — Identifies the Multicast group MAC address/IP address. Remove — When selected, removes a Bridge Multicast address. Ports — Port that can be added to a Multicast service. LAGs —...
  • Page 262: Add Bridge Multicast Group

    Click Add. The Add Bridge Multicast Group page opens: Figure 7-107. Add Bridge Multicast Group Define the VLAN ID and New Bridge Multicast Address fields. Toggle a port to S to join the port to the selected Multicast group. Toggle a port to F to forbid adding specific Multicast addresses to a specific port. Click Apply Changes.
  • Page 263: Multicast Service Member Cli Commands

    Define the VLAN ID and the Bridge Multicast Address fields. Toggle the LAG to S to join the LAG to the selected Multicast group. Toggle the LAG to F to forbid adding specific Multicast addresses to a specific LAG. Click Apply Changes. The LAG is assigned to the Multicast group, and the switch module is updated.
  • Page 264: Assigning Multicast Forward All Parameters

    Forbidden ports for multicast addresses: Vlan MAC Address Ports ---- ----------- ---------- 0100.5e02.0203 0100.5e02.0208 console # show bridge multicast address-table format ip Vlan IP Address Type Ports ---- ----------- ----- ---------- 224-239.130|2.2.3 static g11, g12 224-239.130|2.2.8 static g11-16 224-239.130|2.2.8 dynamic g11-12 Forbidden ports for multicast addresses: Vlan...
  • Page 265: Bridge Multicast Forward All Router/Port Control Settings Table

    Figure 7-108. Bridge Multicast Forward All VLAN ID — Identifies a VLAN. Ports — Ports that can be added to a Multicast service. LAGs — LAGs that can be added to a Multicast service. The Bridge Multicast Forward All Router/Port Control Settings Table contains the settings for managing router and port settings.
  • Page 266: Cli Commands For Managing Lags And Ports Attached To Multicast Routers

    Click Apply Changes. The port is attached to the Multicast router or switch. Attaching a LAG to a Multicast Router or Switch Open Bridge Multicast Forward All page. Define the VLAN ID field. Select a port in the LAGs table, and assign the LAG a value. Click Apply Changes.
  • Page 267: Igmp Snooping

    Forbidden Filter Forward Forward(s) Forward(d) IGMP Snooping The IGMP Snooping page contains fields for enabling IGMP snooping per VLAN, and defining the aging time for packets. To open the IGMP Snooping page, click Switch→ Multicast Support→ IGMP Snooping in the tree view. Figure 7-109.
  • Page 268: Igmp Snooping Cli Commands

    Immediate Leave — Upon receiving a group-specific IGMPv2 leave message, IGMP snooping immediately removes the interface from the Layer 2 forwarding table entry for that Multicast group. Enabling IGMP Snooping on the Switch Module Open the IGMP Snooping page. Select the VLAN ID for the switch module on which IGMP snooping needs to be enabled. Select Enable in the IGMP Snooping Status field.
  • Page 269 Table 7-74. IGMP Snooping CLI Commands CLI Command Description show ip igmp snooping mrouter Displays information about [interface vlan-id] dynamically learned Multicast router interfaces. Configuring Switch Module Information...
  • Page 270 The following is an example of the CLI commands: console>enable console#config console(config)# ip igmp snooping console(config)# interface vlan 1 console(config-if)# ip igmp snooping mrouter learn-pim-dvmrp console(config-if)# ip igmp snooping host-time-out 300 Console(config-if)# ip igmp snooping mrouter-time-out 200 console(config-if)# ip igmp snooping leave-time-out 60 console(config-if)# end console# show ip igmp snooping groups Vlan...
  • Page 271: Viewing Statistics

    Viewing Statistics The Statistics pages contains Ethernet Switch Module information for interface, GVRP, Etherlike, RMON, and Ethernet Switch Module utilization. To open the Statistics page, click Statistics/RMON in the tree view. NOTE: CLI commands are not available for all the Statistics pages. Viewing Tables The Table Views page contains links for displaying statistics in a table form.
  • Page 272: Viewing Counter Summary

    Figure 8-110. Utilization Summary Refresh Rate — The amount of time that passes before the interface statistics are refreshed. Interface — The interface number. Interface Status — Status of the interface. % Interface Utilization — Network interface utilization percentage based on the duplex mode of the interface.
  • Page 273: Viewing Interface Statistics

    Figure 8-111. Counter Summary Refresh Rate — The amount of time that passes before the interface statistics are refreshed. Interface — The interface number. Interface Status — The interface status. Received Unicast Packets — Number of received Unicast packets on the interface. Transmit Unicast Packets —...
  • Page 274: Interface Statistics

    Figure 8-112. Interface Statistics Interface — Specifies whether statistics are displayed for a port or LAG. Refresh Rate — Amount of time that passes before the interface statistics are refreshed. Receive Statistics Total Bytes (Octets) — Number of octets received on the selected interface. Unicast Packets —...
  • Page 275: Interface Statistics Cli Commands

    Select an interface in the Interface field. The interface statistics are displayed. Resetting Interface Statistics Counters Open the Interface Statistics page. Click Reset All Counters. The interface statistics counters are reset. Viewing Interface Statistics Using the CLI Commands The following table summarizes the equivalent CLI commands for viewing interface statistics. Table 8-75.
  • Page 276: Viewing Etherlike Statistics

    InOctets InUcastPkts InMcastPkts InBcastPkts ------- ------------- ---------------- ---------------- ------------ 27889 OutOctets OutUcastPkts OutMcastPkts OutBcastPkts ------- ------------- ---------------- ---------------- ------------ 23739 Viewing Etherlike Statistics The Etherlike Statistics page contains interface statistics. To open the Etherlike Statistics page, click Statistics/RMON→ Table Views→ Etherlike Statistics in the tree view. Figure 8-113.
  • Page 277: Viewing Gvrp Statistics

    Late Collisions — Number of late collision frames received on the selected interface. Excessive Collisions — Number of excessive collisions received on the selected interface. Internal MAC Transmit Errors — Number of internal MAC transmit errors on the selected interface. Oversize Packets —...
  • Page 278 console# show interfaces counters ethernet g11 InMcastPkts InBcastPkts Port InOctets InUcastPkts ------- ------------- ---------------- ---------------- ------------ 183892 1289 OutMcastPkts OutBcastPkts Port OutOctets OutUcastPkts ------- ------------- ---------------- ---------------- ------------ 9188 FCS Errors: 8 Single Collision Frames: 0 Late Collisions: 0 Excessive Collisions: 0 Internal MAC Tx Errors: 0 Oversize Packets: 0 Internal MAC Rx Errors: 0...
  • Page 279: Gvrp Statistics

    Figure 8-114. GVRP Statistics Interface — Specifies whether statistics are displayed for a port or LAG. Refresh Rate — Amount of time that passes before the interface statistics are refreshed. Join Empty — Ethernet Switch Module GVRP Join Empty statistics. Empty —...
  • Page 280: Gvrp Statistics Cli Commands

    The interface’s GVRP statistics are displayed. Resetting GVRP Statistics Open the GVRP Statistics page. Click Reset All Counters. The GVRP counters are reset. Viewing GVRP Statistics Using the CLI Commands The following table summarizes the equivalent CLI commands for viewing GVRP statistics. Table 8-77.
  • Page 281 console# show gvrp error-statistics GVRP error statistics: ---------------------- Legend: INVPROT : Invalid Protocol Id INVPLEN : Invalid PDU Length INVATYP : Invalid Attribute Type INVALEN : Invalid Attribute Length INVAVAL : Invalid Attribute Value INVEVENT : Invalid Event Port INVPROT INVATYP INVAVAL INVALEN...
  • Page 282: Eap Statistics

    Figure 8-115. EAP Statistics Port — The port which is polled for statistics. Refresh Rate — Amount of time that passes before the interface statistics are refreshed. Frames Receive — The number of valid EAPOL frames received on the port. Frames Transmit —...
  • Page 283: Gvrp Statistics Cli Commands

    Last Frame Version — The protocol version number attached to the most recently received EAPOL frame. Last Frame Source — The source MAC address attached to the most recently received EAPOL frame. Displaying EAP statistics for a Port Open the EAP Statistics page. Select an interface in the Interface field.
  • Page 284: Viewing Rmon Statistics

    Viewing RMON Statistics Remote Monitoring (RMON) contains links for viewing network information from a remote location. To open the RMON page, click Statistics/RMON→ RMON in the tree view. Viewing RMON Statistics Group The RMON Statistics page contains fields for viewing information about Ethernet Switch Module utilization and errors that occurred on the Ethernet Switch Module.
  • Page 285 Received Packets — Number of packets received on the interface, including bad packets, Multicast and Broadcast packets, since the Ethernet Switch Module was last refreshed. Broadcast Packets Received — Number of good Broadcast packets received on the interface since the Ethernet Switch Module was last refreshed. This number does not include Multicast packets. Multicast Packets Received —...
  • Page 286: Rmon Statistics Cli Commands

    Table 8-79. RMON Statistics CLI Commands CLI Command Description show rmon statistics {ethernet Displays RMON Ethernet statistics. interface | port-channel port- channel-number} Viewing Statistics...
  • Page 287 The following is an example of the CLI commands: console# show rmon statistics ethernet g1 Port g1 Dropped: 0 Octets: 0 Packets: 0 Broadcast: 0 Multicast: 0 CRC Align Errors: 0 Collisions: 0 Undersize Pkts: 0 Oversize Pkts: 0 Fragments: 0 Jabbers: 0 64 Octets: 0 65 to 127 Octets: 0...
  • Page 288: Viewing Rmon History Control Statistics

    Viewing RMON History Control Statistics The RMON History Control page contains information about samples of data taken from ports. For example, the samples may include interface definitions or polling periods. To open the RMON History Control page, click Statistics/RMON→ RMON→ History Control in the tree view. Figure 8-117.
  • Page 289: Rmon History Cli Commands

    The Add History Entry page opens. Complete the fields in the dialog. Click Apply Changes. The entry is added to the History Control Table. Modifying a History Control Table Entry Open the RMON History Control page. Select an entry in the History Entry No. field. Modify the fields as required.
  • Page 290: Viewing Rmon History Table

    The following is an example of the CLI commands: console(config)# interface ethernet g8 console(config-if)# rmon collection history 1 interval 2400 console(config-if)# exit console(config)# Viewing RMON History Table The RMON History Table contains interface specific statistical network samplings. Each table entry represents all counter values compiled during a single sample. To open the RMON History Table, click Statistics/RMON→...
  • Page 291: Rmon History Control Cli Commands

    Broadcast Packets — The number of good Broadcast packets received during the sampling interval. Multicast Packets — The number of good Multicast packets received during the sampling interval. CRC Align Errors — The number of packets received during the sampling session with a length of 64-1518 octets, a bad Frame Check Sequence (FCS), and with an integral number of octets, or a bad FCS with a non-integral number of octets.
  • Page 292: Defining Ethernet Switch Module Rmon Events

    The following is an example of the CLI commands for displaying RMON ethernet statistics for throughput on index 1:. console# show rmon history 1 throughput Sample Set: 1 Owner: CLI Interface: g11 Interval: 1800 Requested samples: 50 Granted samples: 50 Maximum table size: 500 Time Octets...
  • Page 293: Rmon Events Control

    Figure 8-119. RMON Events Control Event Entry — The event. Community — User defined community to which the event belongs. Description — User-defined event description. Type — Describes the event type. Possible values are: Log — Event type is a log entry. Trap —...
  • Page 294: Rmon Event Definition Cli Commands

    Complete the information in the dialog and click Apply Changes. The event entry is added, and the Ethernet Switch Module is updated. Modifying an RMON Event Open the RMON Events Control page Select an entry in the Event Entry Field. Modify the fields in the dialog and click Apply Changes.
  • Page 295: Viewing The Rmon Events Log

    The following is an example of the CLI commands: console(config)# rmon event 1 log description error owner cli console(config)# exit console# show rmon events Index Description Type Community Owner Last time sent ----- ----------- -------- --------- ------- -------------------- Errors Jan 18 2002 23:58:17 High Broadcast Log-Trap router Manager...
  • Page 296: Defining Rmon Ethernet Switch Module Alarms

    Log Time — Time when the log entry was entered. Description — Describes the log entry. Defining RMON Events Using the CLI Commands The following table summarizes the equivalent CLI commands for viewing Ethernet Switch Module RMON events. Table 8-83. RMON Event Definition CLI Commands CLI Command Description show rmon log [event]...
  • Page 297: Rmon Alarms

    Figure 8-121. RMON Alarms Alarm Entry — Indicates a specific alarm. Interface — The interface for which RMON statistics are displayed. Counter Name — The selected MIB variable. Counter Value — The value of the selected MIB variable. Sample Type — Specifies the sampling method for the selected variable and comparing the value against the thresholds.
  • Page 298: Add An Alarm Entry

    Falling Threshold — The falling counter value that triggers the falling threshold alarm. The falling threshold is graphically presented on the bottom of the graph bars. Each monitored variable is designated a color. Startup Alarm — The trigger that activates the alarm generation. Rising is defined by crossing the threshold from a low-value threshold to a higher-value threshold.
  • Page 299: Rmon Alarm Cli Commands

    Modify the fields in the dialog as required. Click Apply Changes. The entry is modified, and the Ethernet Switch Module is updated. Displaying the Alarm Table Open the RMON Alarms page. Click Show All. The Alarms Table page opens. Deleting an Alarm Table Entry Open the RMON Alarms page.
  • Page 300 The following is an example of the CLI commands: console(config)# rmon alarm 1000 dell 360000 1000000 1000000 10 console(config)# end console# show rmon alarm-table Index Owner ------ ------------------- -------------- 1.3.6.1.2.1.2.2.1.1 1.3.6.1.2.1.2.2.1.1 Manager 1.3.6.1.2.1.2.2.1.1 console# show rmon alarm 2 Alarm Index 2 not found.
  • Page 301: Viewing Charts

    Viewing Charts The Chart page contains links for displaying statistics in a chart form. To open the page, click Statistics/RMON→ Charts in the tree view. Viewing Port Statistics The Port Statistics page contains fields for opening statistics in a chart form for port elements. To open the Port Statistics page, click Statistics/RMON →...
  • Page 302: Viewing Lag Statistics

    Click Draw. The graph for the selected statistic is displayed. Viewing Port Statistics Using the CLI Commands The following table summarizes the equivalent CLI commands for viewing port statistics. Port Statistic CLI Commands CLI Command Description show interfaces counters [ethernet Displays traffic seen by the physical interface | port-channel port-channel-...
  • Page 303: Lag Statistics

    Figure 8-124. LAG Statistics Interface Statistics — Selects the type of interface statistics to open. Etherlike Statistics — Selects the type of Etherlike statistics to open. RMON Statistics — Selects the type of RMON statistics to open. GVRP Statistics — Selects the type of GVRP statistics to open. Refresh Rate —...
  • Page 304: Lag Statistic Cli Commands

    Table 8-85. LAG Statistic CLI Commands CLI Command Description show interfaces counters [ethernet Displays traffic seen by the physical interface | port-channel port-channel- interface. number] show rmon statistics {ethernet interface | Displays RMON Ethernet port-channel port-channel-number} statistics. show gvrp statistics {ethernet interface | Displays GVRP statistics.
  • Page 305: Configuring Quality Of Service

    Configuring Quality of Service This section provides information for defining and configuring Quality of Service (QoS) parameters. To open the view, click Quality of Service in the tree view. Quality of Service (QoS) Overview Quality of Service (QoS) provides the ability to implement QoS and priority queuing within a network.
  • Page 306: Cos Services

    Table 9-86. CoS to Queue Mapping Table Default values CoS Value Forwarding Queue Values q4 (Highest Priority) Packets arriving untagged are assigned a default VPT value, which is set on a per port basis. The assigned VPT is used to map the packet to the egress queue. DSCP values can be mapped to priority queues.
  • Page 307: Configuring Qos Global Settings

    Configuring QoS Global Settings The QoS Global Settings page contains fields for enabling or disabling QoS. In addition, the Trust mode can be selected. The Trust mode relies on predefined fields within the packet to determine the egress queue. To open the QoS Global Settings page, click Quality of Service→ QoS Global Parameters →...
  • Page 308: Defining Qos Interface Settings

    Select Enable in the Quality of Service field. Click Apply Changes. Class of Service is enabled on the Ethernet Switch Module. Enabling the Trus Modet: Open the QoS Global Settings page. Define the Trust Mode field. Click Apply Changes. Trust mode is enabled on the Ethernet Switch Module. Enabling Trust Using the CLI Commands The following table summarizes the equivalent CLI commands for configuring fields in the QoS Global Settings page.
  • Page 309: Interface Settings

    Figure 9-126. Interface Settings Interface — The specific port or LAG to configure. Disable "Trust" Mode on Interface — Disables Trust mode on the specified interface. This setting overrides the Trust mode configured on the Ethernet Switch Module globally. Set Default CoS For Incoming Traffic To — Sets the default CoS tag value for untagged packets. The CoS tag values are 0-7.
  • Page 310: Defining Queue Settings

    Assigning CoS Interfaces Using the CLI Commands The following table summarizes the equivalent CLI commands for configuring fields in the Interface Settings page. Table 9-89. CoS Interface CLI Commands CLI Command Description qos trust Enables the trust mode. no qos trust Disables Trust state on each port.
  • Page 311: Global Queue Settings

    Figure 9-127. Global Queue Settings Queue — The Queue number. Strict Priority — Specifies if traffic scheduling is based strictly on the queue priority. This is the default value for queues. WRR — Specifies if traffic scheduling is based on the Weighted Round Robin (WRR) weights to assigned egress queues.
  • Page 312: Queue Settings Cli Commands

    Assigning Queue Setting Using the CLI Commands The following table summarizes the equivalent CLI commands for configuring fields in the Global Queue Settings page. Table 9-90. Queue Settings CLI Commands CLI Command Description priority-queue out num-of-queues Defines the number of queues used as SP queues.
  • Page 313: Mapping Cos Values To Queues

    weights Priority ----- -------- ----- ---------- Disable Disable Disable Disable Cos queue map: Cos qid Mapping CoS Values to Queues The CoS to Queue Mapping Table page contains fields for classifying CoS settings to traffic queues. To open the CoS to Queue Mapping Table page, click Quality of Service→ QoS Global Parameters→...
  • Page 314 Figure 9-128. CoS to Queue Mapping Table Class of Service — Specifies the CoS priority tag values, where zero is the lowest and 7 is the highest. Queue — The queue to which the CoS priority is mapped. Four traffic priority queues are supported.
  • Page 315: Mapping Dscp Values To Queues

    Table 9-91. CoS to Queue Settings CLI Commands CLI Command Description wrr-queue cos-map queue-id Maps assigned CoS values to the egress cos0..cos7 queues. The following is an example of the CLI commands: console(config)# wrr-queue cos-map 4 7 Mapping DSCP Values to Queues The DSCP to Queue Mapping page provides fields for defining egress queue to specific DSCP fields.
  • Page 316: Dscp Value To Queue Cli Commands

    Queue — The queue to which packets with the specific DSCP value is assigned. The values are 1- 4, where 1 is the lowest value and 4 is the highest. Mapping a DSCP value and assigning priority queue: Open the DSCP to Queue Mapping page. Select a value in the DSCP In column.
  • Page 317: Ethernet Switch Module Specifications

    Ethernet Switch Module Specifications This appendix includes the information regarding the Ethernet Switch Module. Feature Specifications VLAN • VLAN support for Tagging and Port Based as per IEEE 802.1Q • Up to 4094 VLANs Supported • Reserved VLANs for internal system use •...
  • Page 318: Additional Switching Features

    Additional Switching Features • Link Aggregation with support for up to six Aggregated Links per Ethernet Switch Module and up to six Ports per aggregated link (IEEE 802.3ad) • LACP Support • Supports Jumbo Frames up to 10K • Broadcast Storm Control •...
  • Page 319: Glossary

    Glossary This glossary contains key technical words of interest. Access Mode Specifies the method by which user access is granted to the system. Access Profiles Allows network managers to define profiles and rules for accessing the switch module. Access to management functions can be limited to user groups, which are defined by the following criteria: •...
  • Page 320 Auto-negotiation Allows 10/100 Mpbs or 10/100/1000 Mbps Ethernet ports to establish for the following features: • Duplex/ Half DuplexMode • Flow Control • Speed Back Pressure A mechanism used with Half Duplexmode that enables a port not to receive a message. Backplane The main BUS that carries information in the switch module.
  • Page 321 Bridge A Ethernet switch module that connect two networks. Bridges are hardware specific, however they are protocol independent. Bridges operate at Layer 1 and Layer 2 levels. Broadcast Domain Ethernet switch module sets that receive broadcast frames originating from any Ethernet switch module within a designated set.
  • Page 322 A group of computers and Ethernet switch modules on a network that are grouped with common rules and procedures. DRAC/MC Dell Remote Access Controller / Modular Chassis (DRAC/MC). Provides a single point of control for Dell Modular Server System components. Duplex Mode Permits simultaneous transmissions and reception of data.
  • Page 323 Flapping Flapping occurs when an interfaces state is constantly changing. For example, an STP port constantly changes from listening to learning to forwarding. This may cause traffic loss. Flow Control Enables lower speed Ethernet switch modules to communicate with higher speed Ethernet switch module s, that is, that the higher speed Ethernet switch module refrains from sending packets.
  • Page 324 ICMP Internet Control Message Protocol. Allows gateway or destination host to communicate with a source host, for example, to report a processing error. IEEE Institute of Electrical and Electronics Engineers. An Engineering organization that develops communications and networking standards. IEEE 802.1d Used in the Spanning Tree Protocol, IEEE 802.1d supports MAC bridging to avoid network loops.
  • Page 325 Link Aggregated Group. Aggregates ports or VLANs into a single virtual port or VLAN. For more information on LAGs, see Defining LAG Membership Local Area Networks. A network contained within a single room, building, campus or other limited geographical area. Layer 2 Data Link Layer or MAC Layer.
  • Page 326 Message Digest 5. An algorithm that produces a 128-bit hash. MD5 is a variation of MD4, and increases MD4 security. MD5 verifies the integrity of the communication, authenticates the origin of the communication. Media Dependent Interface. A cable used for end stations. MDIX Media Dependent Interface with Crossover (MDIX).
  • Page 327 PING Packet Internet Groper. Verifies if a specific IP address is available. A packet is sent to another IP address and waits for a reply. Port Physical ports provide connecting components that allow microprocessors to communicate with peripheral equipment. Port Mirroring Monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port.
  • Page 328 RSTP Rapid Spanning Tree Protocol. Detects and uses network topologies that allow a faster convergence of the spanning tree, without creating forwarding loops. Running Configuration File Contains all startup configuration file commands, as well as all commands entered during the current session. After the switch module is powered down or rebooted, all commands stored in the Running Configuration file are lost.
  • Page 329 Subnet Sub-network. Subnets are portions of a network that share a common address component. On TCP/IP networks, Ethernet switch modules that share a prefix are part of the same subnet. For example, all Ethernet switch modules with a prefix of 157.100.100.100 are part of the same subnet. Subnet Mask Used to mask all or part of an IP address used in a subnet address.
  • Page 330 Wide Area Networks. Networks that cover a large geographical area. Wildcard Mask Specifies which IP address bits are used, and which bits are ignored. A wild switch module mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits are important. For example, if the destination IP address 149.36.184.198 and the wildcard mask is 255.36.184.00, the first two bits of the IP address are used, while the last two bits are ignored.
  • Page 331: Index

    Index Numerics BPDU, 304 Default settings, 164 Bridge Protocol Data Defining device 802.1d, 13 Unit, 304 information, 67 802.1Q, 13, 226, 228 Broadcast, 79-81, 89 Device representation, 58 Buttons, 60 Device view, 57-58 DHCP, 15 Access mode, 152 Dimensions, 19 Access profiles, 121 DNS, 108 Cables, 118-119...
  • Page 332 HTTP, 121 HTTPS, 121 Fast Link, 14 L2TP, 309 Fast link, 211 LACP, 238 File Transfer Protocol, 308 LAG, 309 Filtering, 226, 229, 242 LAGs, 248 ICMP, 308 Firmware, 160 LCP, 218 IDRP, 308 Flow Control, 38 Light Emitting Diodes, 20 IEEE, 308 FTP, 308 Line, 128...
  • Page 333 Management Information Reset, 78, 102 Base., 310 RFC1042, 231 Package Contents, 24 Management methods, 123 RMON, 268-269, 272, 274, Package contents, 24 Management security, 121 Passwords, 61, 141 Master Election/Topology RMON History Control PDU, 311 Discovery Algorithm, 310 Page, 272 PING, 311 MD5, 80, 310 RSTP, 14, 312...
  • Page 334 SYSLOG RFC, 90 System, 67 UDP, 314 Understanding the interface, 57 Unicast, 79-81 T1, 80 Uploading files, 161 T2, 80 User Data Protocol, 314 T3, 80 T4, 80 TACACS, 128, 141 Virtual Local Area TCP, 15 Networks, 314 Telnet, 121, 131 VLAN, 220, 222, 225, 229, Terminal Access Controller 248, 314...

Table of Contents