Accton-technology ES5508 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Počítačové příslušenství Accton-technology ES5508. Accton Technology ES5508 User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 446
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Powered by Accton

www.edge-core.comManagement GuidePowered by AcctonES55088 XFP Slot Layer 210 Gigabit Ethernet Switch

Strany 2

Contentsxip ssh authentication-retries 4-36ip ssh server-key size 4-36delete public-key 4-37ip ssh crypto host-key generate 4-37ip ssh crypto zero

Strany 3 - 10 Gigabit Ethernet Switch

Configuring the Switch3-603CLI – This example generates a host-key pair using both the RSA and DSA algorithms, stores the keys to flash memory, and th

Strany 4 - 149100022900A

User Authentication3-613Web – Click Security, SSH, Settings. Enable SSH and adjust the authentication parameters as required, then click Apply. Note t

Strany 5 - Contents

Configuring the Switch3-623Configuring Port SecurityPort security is a feature that allows you to configure a switch port with one or more device MAC

Strany 6

User Authentication3-633Web – Click Security, Port Security. Set the action to take when an invalid address is detected on a port, mark the checkbox i

Strany 7

Configuring the Switch3-643Configuring 802.1X Port Authentication Network switches can provide open and easy access to network resources by simply att

Strany 8

User Authentication3-653• The RADIUS server and client also have to support the same EAP authentication type – MD5. (Some clients have native support

Strany 9

Configuring the Switch3-663Configuring 802.1X Global SettingsThe 802.1X protocol provides port authentication. The 802.1X protocol must be enabled glo

Strany 10

User Authentication3-673• Max Request – Sets the maximum number of times the switch port will retransmit an EAP request packet to the client before it

Strany 11

Configuring the Switch3-683CLI – This example sets the 802.1X parameters on port 2. For a description of the additional fields displayed in this examp

Strany 12

User Authentication3-693Displaying 802.1X StatisticsThis switch can display statistics for dot1x protocol exchanges for any port. Table 3-7 802.1X S

Strany 13

Contentsxiwhichboot 4-67boot system 4-67Authentication Commands 4-68Authentication Sequence 4-69authentication login 4-69authentication enable 4-

Strany 14

Configuring the Switch3-703Web – Select Security, 802.1X, Statistics. Select the required port and then click Query. Click Refresh to update the stati

Strany 15

User Authentication3-713Filtering IP Addresses for Management AccessYou can create a list of up to 16 IP addresses or IP address groups that are allow

Strany 16

Configuring the Switch3-723Web – Click Security, IP Filter. Enter the IP addresses or range of addresses that are allowed management access to an inte

Strany 17

Access Control Lists3-733Access Control ListsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 pr

Strany 18

Configuring the Switch3-743Setting the ACL Name and TypeUse the ACL Configuration page to designate the name and type of an ACL.Command Attributes• Na

Strany 19

Access Control Lists3-753and compared with the address for each IP packet entering the port(s) to which this ACL has been assigned.Web – Specify the a

Strany 20

Configuring the Switch3-763• Protocol – Specifies the protocol type to match as TCP, UDP or Others, where others indicates a specific protocol number

Strany 21

Access Control Lists3-773Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (An

Strany 22

Configuring the Switch3-783Configuring a MAC ACLCommand Attributes• Action – An ACL can contain any combination of permit or deny rules.• Source/Desti

Strany 23

Access Control Lists3-793Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (An

Strany 24

Contentsxiishow map access-list ip 4-98match access-list ip 4-99show marking 4-100MAC ACLs 4-100access-list mac 4-101permit, deny (MAC ACL) 4-

Strany 25 - Chapter 1: Introduction

Configuring the Switch3-803Configuring ACL MasksYou must specify masks that control the order in which ACL rules are checked. The switch includes two

Strany 26 - Introduction

Access Control Lists3-813Configuring an IP ACL MaskThis mask defines the fields to check in the IP header. Command Usage• Masks that include an entry

Strany 27

Configuring the Switch3-823Web – Configure the mask to match the required rules in the IP ingress or egress ACLs. Set the mask to check for any source

Strany 28 - System Defaults

Access Control Lists3-833Configuring a MAC ACL MaskThis mask defines the fields to check in the packet header. Command UsageYou must configure a mask

Strany 29

Configuring the Switch3-843CLI – This example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of the rul

Strany 30

Port Configuration3-853Web – Click Security, ACL, Port Binding. Mark the Enable field for the port you want to bind to an ACL for ingress or egress tr

Strany 31 - Connecting to the Switch

Configuring the Switch3-863• Autonegotiation – Shows if auto-negotiation is enabled for disabled. (This setting is fixed at “Disabled” for all 10G por

Strany 32 - Required Connections

Port Configuration3-873• LACP – Shows if LACP is enabled or disabled.• Port security – Shows if port security is enabled or disabled.• Max MAC count –

Strany 33 - Basic Configuration

Configuring the Switch3-883Configuring Interface Connections You can use the Port Configuration or Trunk Configuration page to enable/disable an inter

Strany 34 - Setting Passwords

Port Configuration3-893Web – Click Port, Port Configuration or Trunk Configuration. Modify the required interface settings, and click Apply.Figure 3-5

Strany 35 - Console(config-if)#exit

Contentsxiiishow interfaces switchport 4-132Mirror Port Commands 4-134port monitor 4-134show port monitor 4-135Rate Limit Commands 4-136rate-limi

Strany 36 - Initial Configuration

Configuring the Switch3-903Creating Trunk GroupsYou can create multiple links between devices that work as one virtual, aggregate link. A port trunk o

Strany 37

Port Configuration3-913Statically Configuring a TrunkCommand Usage• When configuring static trunks, you may not be able to link switches of different

Strany 38 - Saving Configuration Settings

Configuring the Switch3-923CLI – This example creates trunk 1 with ports 1 and 2. Just connect these ports to two static trunk ports on another switch

Strany 39 - Managing System Files

Port Configuration3-933Command Attributes• Member List (Current) – Shows configured trunks (Unit, Port).• New – Includes entry fields for creating ne

Strany 40

Configuring the Switch3-943Configuring LACP ParametersDynamically Creating a Port Channel –Ports assigned to a common port channel must meet the follo

Strany 41 - Using the Web Interface

Port Configuration3-953Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can opt

Strany 42 - Home Page

Configuring the Switch3-963CLI – The following example configures LACP parameters for ports 1-6. Ports 1-4 are used as active members of the LAG, port

Strany 43 - Panel Display

Port Configuration3-973Displaying LACP Port CountersYou can display statistics for LACP protocol messages. Web – Click Port, LACP, Port Counters Infor

Strany 44 - Main Menu

Configuring the Switch3-983Displaying LACP Settings and Status for the Local SideYou can display configuration settings and the operational state for

Strany 45

Port Configuration3-993Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 3-58

Strany 46

Contentsxivshow spanning-tree mst configuration 4-168VLAN Commands 4-168Editing VLAN Groups 4-168vlan database 4-169vlan 4-169Configuring VLAN Int

Strany 47

Configuring the Switch3-1003Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state fo

Strany 48

Port Configuration3-1013CLI – The following example displays the LACP configuration settings and operational state for the remote side of port channel

Strany 49

Configuring the Switch3-1023Web – Click Port, Port Broadcast Control or Trunk Broadcast Control. Check the Enabled box for any interface, set the thre

Strany 50

Port Configuration3-1033Configuring Port MirroringYou can mirror traffic from any source port to a target port for real-time analysis. You can then at

Strany 51

Configuring the Switch3-1043Configuring Rate LimitsThis function allows the network manager to control the maximum rate for traffic transmitted or rec

Strany 52

Port Configuration3-1053Showing Port StatisticsYou can display standard statistics on network traffic from the Interfaces Group and Ethernet-like MIBs

Strany 53

Configuring the Switch3-1063Transmit Discarded Packets The number of outbound packets which were chosen to be discarded even though no errors had been

Strany 54 - Manual Configuration

Port Configuration3-1073Received Frames The total number of frames (bad, broadcast and multicast) received.Broadcast Frames The total number of good f

Strany 55 - Using DHCP/BOOTP

Configuring the Switch3-1083Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at

Strany 56

Address Table Settings3-1093CLI – This example shows statistics for port 12.Address Table Settings Switches store the addresses for all known devices.

Strany 57 - Managing Firmware

Contentsxvmap ip dscp (Interface Configuration) 4-194show map ip port 4-195show map ip precedence 4-196show map ip dscp 4-196Multicast Filtering C

Strany 58

Configuring the Switch3-1103Web – Click Address Table, Static Addresses. Specify the interface, the MAC address and VLAN, then click Add Static Addres

Strany 59

Address Table Settings3-1113Web – Click Address Table, Dynamic Addresses. Specify the search type (i.e., mark the Interface, MAC Address, or VLAN chec

Strany 60

Configuring the Switch3-1123Changing the Aging TimeYou can set the aging time for entries in the dynamic address table. Command Attributes• Aging Stat

Strany 61

Spanning Tree Algorithm Configuration3-1133Once a stable network topology has been established, all bridges listen for Hello BPDUs (Bridge Protocol Da

Strany 62 - Console Port Settings

Configuring the Switch3-1143new root port is selected from among the device ports attached to the network. (References to “ports” in this section mean

Strany 63

Spanning Tree Algorithm Configuration3-1153• Root Forward Delay – The maximum time (in seconds) this device will wait before changing states (i.e., di

Strany 64 - Telnet Settings

Configuring the Switch3-1163Note: The current root port and current root cost display as zero when this device is not connected to the network.Configu

Strany 65

Spanning Tree Algorithm Configuration3-1173• Multiple Spanning Tree Protocol- To allow multiple spanning trees to operate over the network, you must c

Strany 66 - Configuring Event Logging

Configuring the Switch3-1183• Forward Delay – The maximum time (in seconds) this device will wait before changing states (i.e., discarding to learning

Strany 67 - Remote Log Configuration

Spanning Tree Algorithm Configuration3-1193Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply.Figure 3-68

Strany 68

ContentsxviAppendix A: Software Specifications A-1Software Features A-1Management Features A-2Standards A-2Management Information Bases A-3Appendi

Strany 69 - Displaying Log Messages

Configuring the Switch3-1203CLI – This example enables Spanning Tree Protocol, sets the mode to MST, and then configures the STA and MSTP parameters.

Strany 70

Spanning Tree Algorithm Configuration3-1213• Designated Port – The port priority and number of the port on the designated bridging device through whic

Strany 71 - Resetting the System

Configuring the Switch3-1223These additional parameters are only displayed for the CLI:• Admin status – Shows if this interface is enabled.• External

Strany 72 - Setting the System Clock

Spanning Tree Algorithm Configuration3-1233CLI – This example shows the STA attributes for port 5. Configuring Interface SettingsYou can configure RST

Strany 73 - Setting the Time Zone

Configuring the Switch3-1243The following interface attributes can be configured:• Spanning Tree – Enables/disables STA on this interface. (Default: E

Strany 74

Spanning Tree Algorithm Configuration3-1253• Migration – If at any time the switch detects STP BPDUs, including Configuration or Topology Change Notif

Strany 75 - Enabling the SNMP Agent

Configuring the Switch3-1263To use multiple spanning trees:1. Set the spanning tree type to MSTP (STA Configuration, page 3-116).2. Enter the spanning

Strany 76

Spanning Tree Algorithm Configuration3-1273Web – Click Spanning Tree, MSTP, VLAN Configuration. Select an instance identifier from the list, set the i

Strany 77

Configuring the Switch3-1283CLI – This example sets the priority for MSTI 1, and adds VLANs 1-5 to this MSTI. ----------------------------------------

Strany 78

Spanning Tree Algorithm Configuration3-1293Displaying Interface Settings for MSTPThe MSTP Port Information and MSTP Trunk Information pages display th

Strany 79

xviiTablesTable 1-1 Key Features 1-1Table 1-2 System Defaults 1-4Table 3-1 Web Page Configuration Buttons 3-3Table 3-2 Switch Main Menu 3-4Table 3

Strany 80 - Specifying a Remote Engine ID

Configuring the Switch3-1303Configuring Interface Settings for MSTPYou can configure the STA interface settings for an MST Instance using the MSTP Por

Strany 81 - Configuring SNMPv3 Users

Spanning Tree Algorithm Configuration3-1313Protocol is detecting network loops. Where more than one port is assigned the highest priority, the port wi

Strany 82

Configuring the Switch3-1323VLAN ConfigurationIEEE 802.1Q VLANsIn large networks, routers are used to isolate broadcast traffic for each subnet into s

Strany 83

VLAN Configuration3-1333Note: VLAN-tagged frames can pass through VLAN-aware or VLAN-unaware network interconnection devices, but the VLAN tags should

Strany 84

Configuring the Switch3-1343these hosts, and core switches in the network, enable GVRP on the links between these devices. You should also determine s

Strany 85 - Configuring SNMPv3 Groups

VLAN Configuration3-1353Enabling or Disabling GVRP (Global Setting) GARP VLAN Registration Protocol (GVRP) defines a way for switches to exchange VLAN

Strany 86

Configuring the Switch3-1363CLI – Enter the following command.Displaying Current VLANsThe VLAN Current Table shows the current port members of each VL

Strany 87

VLAN Configuration3-1373Command Attributes (CLI)• VLAN – ID of configured VLAN (1-4094, no leading zeroes).• Type – Shows how this VLAN was added to t

Strany 88

Configuring the Switch3-1383Web – Click VLAN, 802.1Q VLAN, Static List. To create a new VLAN, enter the VLAN ID and VLAN name, mark the Enable checkbo

Strany 89 - Setting SNMPv3 Views

VLAN Configuration3-1393• Trunk – Trunk identifier.• Membership Type – Select VLAN membership for each interface by marking the appropriate radio butt

Strany 90

xviiiTablesTable 4-24 Frame Size Commands 4-62Table 4-25 Flash/File Commands 4-63Table 4-26 File Directory Information 4-66Table 4-27 Authenticatio

Strany 91

Configuring the Switch3-1403CLI – The following example adds tagged and untagged ports to VLAN 2.Adding Static Members to VLANs (Port Index)Use the VL

Strany 92

VLAN Configuration3-1413Configuring VLAN Behavior for InterfacesYou can configure VLAN behavior for specific interfaces, including the default VLAN id

Strany 93

Configuring the Switch3-1423Leave or LeaveAll message has been issued, the applicants can rejoin before the port actually leaves the group. (Range: 60

Strany 94

VLAN Configuration3-1433CLI – This example sets port 3 to accept only tagged frames, assigns PVID 3 as the native VLAN ID, enables GVRP, sets the GARP

Strany 95 - Configuring HTTPS

Configuring the Switch3-1443Configuring Uplink and Downlink PortsUse the Private VLAN Link Status page to set ports as downlink or uplink ports. Ports

Strany 96

VLAN Configuration3-1453Command UsageTo configure protocol-based VLANs, follow these steps:1. First configure VLAN groups for the protocols you want t

Strany 97 - Configuring the Secure Shell

Configuring the Switch3-1463Mapping Protocols to VLANsMap a protocol group to a VLAN for each interface that will participate in the group.Command Usa

Strany 98 - Generating the Host Key Pair

Class of Service Configuration3-1473Class of Service ConfigurationClass of Service (CoS) allows you to specify which data packets have greater precede

Strany 99

Configuring the Switch3-1483Web – Click Priority, Default Port Priority or Default Trunk Priority. Modify the default priority for any interface, then

Strany 100 - Configuring the SSH Server

Class of Service Configuration3-1493Mapping CoS Values to Egress QueuesThis switch processes Class of Service (CoS) priority tagged traffic by using e

Strany 101 - User Authentication

xixTablesTable 4-69 IGMP Snooping Commands 4-198Table 4-70 IGMP Query Commands (Layer 2) 4-201Table 4-71 Static Multicast Routing Commands 4-204Tab

Strany 102 - Configuring Port Security

Configuring the Switch3-1503Web – Click Priority, Traffic Classes. Assign priorities to the traffic classes (i.e., output queues), then click Apply.Fi

Strany 103

Class of Service Configuration3-1513Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traf

Strany 104

Configuring the Switch3-1523Web – Click Priority, Queue Scheduling. Select the interface, highlight a traffic class (i.e., output queue), enter a weig

Strany 105

Class of Service Configuration3-1533Layer 3/4 Priority SettingsMapping Layer 3/4 Priorities to CoS ValuesThis switch supports several common methods o

Strany 106

Configuring the Switch3-1543Mapping IP PrecedenceThe Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight diff

Strany 107

Class of Service Configuration3-1553CLI – The following example globally enables IP Precedence service on the switch, maps IP Precedence value 1 to Co

Strany 108

Configuring the Switch3-1563Web – Click Priority, IP DSCP Priority. Select an entry from the DSCP table, enter a value in the Class of Service Value f

Strany 109 - Displaying 802.1X Statistics

Class of Service Configuration3-1573Mapping IP Port PriorityYou can also map network applications to Class of Service values based on the IP port numb

Strany 110

Configuring the Switch3-1583CLI – The following example globally enables IP Port Priority service on the switch, maps HTTP traffic (on port 1) to CoS

Strany 111

Multicast Filtering3-1593Web – Click Priority, ACL CoS Priority. Select a port, select an ACL rule, specify a CoS priority, then click Add.Figure 3-94

Strany 114 - Configuring a Standard IP ACL

Configuring the Switch3-1603multicast switch/router to ensure that it will continue to receive the multicast service. This procedure is called multica

Strany 115

Multicast Filtering3-1613Configuring IGMP Snooping and Query ParametersYou can configure the switch to forward multicast traffic intelligently. Based

Strany 116

Configuring the Switch3-1623Web – Click IGMP Snooping, IGMP Configuration. Adjust the IGMP settings as required, and then click Apply. (The default se

Strany 117

Multicast Filtering3-1633Displaying Interfaces Attached to a Multicast RouterMulticast routers that are attached to ports on the switch use informatio

Strany 118 - Configuring a MAC ACL

Configuring the Switch3-1643Specifying Static Interfaces for a Multicast RouterDepending on your network connections, IGMP snooping may not always be

Strany 119

Multicast Filtering3-1653Displaying Port Members of Multicast Services You can display the port members associated with a specified VLAN and multicast

Strany 120 - Configuring ACL Masks

Configuring the Switch3-1663Assigning Ports to Multicast Services Multicast filtering can be dynamically configured using IGMP Snooping and IGMP Query

Strany 121 - Configuring an IP ACL Mask

Configuring Domain Name Service3-1673Configuring Domain Name ServiceThe Domain Naming System (DNS) service on this switch allows host names to be mapp

Strany 122

Configuring the Switch3-1683Web – Select DNS, General Configuration. Set the default domain name or list of domain names, specify one or more name ser

Strany 123 - Configuring a MAC ACL Mask

Configuring Domain Name Service3-1693Configuring Static DNS Host to Address EntriesYou can manually configure static entries in the DNS table that are

Strany 124

xxiFiguresFigure 3-1 Home Page 3-2Figure 3-2 Front Panel Indicators 3-3Figure 3-3 System Information 3-9Figure 3-4 Switch Information 3-11Figure 3

Strany 125 - Port Configuration

Configuring the Switch3-1703Web – Select DNS, Static Host Table. Enter a host name and one or more corresponding addresses, then click Apply.Figure 3-

Strany 126

Configuring Domain Name Service3-1713Displaying the DNS CacheYou can display entries in the DNS cache that have been learned via the designated name s

Strany 127

Configuring the Switch3-1723CLI - This example displays all the resource records learned from the designated name servers.Console#show dns cache 4-216

Strany 128

4-1Chapter 4: Command Line InterfaceThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceAccessing the C

Strany 129

Command Line Interface4-24To access the switch through a Telnet session, you must first set the IP address for the switch, and set the default gateway

Strany 130 - Creating Trunk Groups

Entering Commands4-34Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keywords and

Strany 131

Command Line Interface4-44Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for the curren

Strany 132

Entering Commands4-54Partial Keyword LookupIf you terminate a partial keyword with a question mark, alternatives that match the initial letters are pr

Strany 133

Command Line Interface4-64Exec CommandsWhen you open a new console session on the switch with the user name and password “guest,” the system enters th

Strany 134 - Configuring LACP Parameters

Entering Commands4-74To enter the Global Configuration mode, enter the command configure in Privileged Exec mode. The system prompt will change to “Co

Strany 135

xxiiFiguresFigure 3-42 802.1X Port Statistics 3-70Figure 3-43 IP Filter 3-72Figure 3-44 Selecting ACL Type 3-74Figure 3-45 ACL Configuration - Stan

Strany 136

Command Line Interface4-84Command GroupsThe system commands can be broken down into the functional groups shown below.Ctrl-L Repeats current command l

Strany 137 - Displaying LACP Port Counters

Line Commands4-94The access mode shown in the following tables is indicated by these abbreviations: PE (Privileged Exec) VC (VLAN Database Configurat

Strany 138

Command Line Interface4-104lineThis command identifies a specific line for configuration, and to process subsequent line configuration commands.Syntax

Strany 139

Line Commands4-114loginThis command enables password checking at login. Use the no form to disable password checking and allow connections without a p

Strany 140

Command Line Interface4-124passwordThis command specifies the password for a line. Use the no form to remove the password.Syntax password {0 | 7} pass

Strany 141

Line Commands4-134Default Setting • CLI: Disabled (0 seconds)• Telnet: 600 secondsCommand Mode Line ConfigurationCommand Usage • If a login attempt is

Strany 142

Command Line Interface4-144password-threshThis command sets the password intrusion threshold which limits the number of failed logon attempts. Use the

Strany 143 - Configuring Port Mirroring

Line Commands4-154Example To set the silent time to 60 seconds, enter this command:Related Commands password-thresh (4-14)databitsThis command sets th

Strany 144 - Configuring Rate Limits

Command Line Interface4-164parityThis command defines the generation of a parity bit. Use the no form to restore the default setting.Syntax parity {no

Strany 145 - Showing Port Statistics

Line Commands4-174Command Usage Set the speed to match the baud rate of the device connected to the serial port. Some baud rates available on devices

Strany 146

xxiiiFiguresFigure 3-87 Queue Mode 3-151Figure 3-88 Queue Scheduling 3-152Figure 3-89 IP Precedence/DSCP Priority Status 3-153Figure 3-90 IP Preced

Strany 147

Command Line Interface4-184Example Related Commandsshow ssh (4-39)show users (4-61)show lineThis command displays the terminal line’s parameters.Synta

Strany 148

General Commands4-194General CommandsenableThis command activates Privileged Exec mode. In privileged mode, additional commands are available, and cer

Strany 149 - Address Table Settings

Command Line Interface4-204Related Commands disable (4-20)enable password (4-26)disableThis command returns to Normal Exec mode from privileged mode.

Strany 150 - Displaying the Address Table

General Commands4-214show historyThis command shows the contents of the command history buffer.Default Setting NoneCommand Mode Normal Exec, Privilege

Strany 151

Command Line Interface4-224Command Usage This command resets the entire system.Example This example shows how to reset the switch:endThis command retu

Strany 152 - Changing the Aging Time

System Management Commands4-234quitThis command exits the configuration program.Default Setting NoneCommand Mode Normal Exec, Privileged ExecCommand U

Strany 153 - Displaying Global Settings

Command Line Interface4-244Device Designation CommandspromptThis command customizes the CLI prompt. Use the no form to restore the default prompt.Synt

Strany 154

System Management Commands4-254Example User Access CommandsThe basic commands required for management access are listed in this section. This switch a

Strany 155 - Figure 3-67 STA Information

Command Line Interface4-264Command Mode Global ConfigurationCommand Usage The encrypted password is required for compatibility with legacy password se

Strany 156 - Configuring Global Settings

System Management Commands4-274Example Related Commandsenable (4-19)authentication enable (4-70)IP Filter CommandsmanagementThis command specifies the

Strany 157

xxivFigures

Strany 158

Command Line Interface4-284• When entering addresses for the same group (i.e., SNMP, web or Telnet), the switch will not accept overlapping address ra

Strany 159

System Management Commands4-294Web Server Commandsip http portThis command specifies the TCP port number used by the web browser interface. Use the no

Strany 160 - Displaying Interface Settings

Command Line Interface4-304Example Related Commandsip http port (4-29)ip http secure-serverThis command enables the secure hypertext transfer protocol

Strany 161

System Management Commands4-314Example Related Commandsip http secure-port (4-31)copy tftp https-certificate (4-63)ip http secure-portThis command spe

Strany 162

Command Line Interface4-324Telnet Server Commandsip telnet serverThis command allows this device to be monitored or configured from Telnet. It also sp

Strany 163

System Management Commands4-334This section describes the commands used to configure the SSH server. However, note that you also need to install a SSH

Strany 164

Command Line Interface4-344station and place the host public key in it. An entry for a public key in the known hosts file would appear similar to the

Strany 165

System Management Commands4-354ip ssh serverThis command enables the Secure Shell (SSH) server on this switch. Use the no form to disable this service

Strany 166

Command Line Interface4-364Command Usage The timeout specifies the interval the switch will wait for a response from the client during the SSH negotia

Strany 167

System Management Commands4-374Default Setting 768 bitsCommand Mode Global ConfigurationCommand Usage • The server key is a private key that is never

Strany 168

1-1Chapter 1: IntroductionThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to conf

Strany 169

Command Line Interface4-384Command Usage • This command stores the host key pair in memory (i.e., RAM). Use the ip ssh save host-key command to save t

Strany 170

System Management Commands4-394ip ssh save host-keyThis command saves the host key from RAM to flash memory. Syntax ip ssh save host-key [dsa | rsa]•

Strany 171 - Console(config-if)

Command Line Interface4-404show public-keyThis command shows the public key for the specified user or for the host.Syntax show public-key [user [usern

Strany 172 - VLAN Configuration

System Management Commands4-414• When an RSA key is displayed, the first field indicates the size of the host key (e.g., 1024), the second field is th

Strany 173 - VU: VLAN Unaware

Command Line Interface4-424logging onThis command controls logging of error messages, sending debug or error messages to switch memory. The no form di

Strany 174

System Management Commands4-434• level - One of the levels listed below. Messages sent include the selected level down to level 0. (Range: 0-7)Default

Strany 175

Command Line Interface4-444Command Usage • By using this command more than once you can build up a list of host IP addresses.• The maximum number of h

Strany 176 - Displaying Current VLANs

System Management Commands4-454Default Setting • Disabled• Level 7 - 0Command Mode Global ConfigurationCommand Usage • Using this command with a speci

Strany 177 - Creating VLANs

Command Line Interface4-464show loggingThis command displays the configuration settings for logging messages to local switch memory, to an SMTP event

Strany 178

System Management Commands4-474The following example displays settings for the trap function. Related Commandsshow logging sendmail (4-51)show logThis

Strany 179

Introduction1-21Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Broadcast storm suppressi

Strany 180

Command Line Interface4-484ExampleThe following example shows the event message stored in RAM. SMTP Alert CommandsThese commands configure SMTP event

Strany 181

System Management Commands4-494• To open a connection, the switch first selects the server that successfully sent mail during the last connection, or

Strany 182

Command Line Interface4-504Command Mode Global ConfigurationCommand Usage You may use an symbolic email address that identifies the switch, or the add

Strany 183 - Configuring Private VLANs

System Management Commands4-514Exampleshow logging sendmailThis command displays the settings for the SMTP event handler.Command Mode Normal Exec, Pri

Strany 184

Command Line Interface4-524sntp clientThis command enables SNTP client requests for time synchronization from NTP or SNTP time servers specified with

Strany 185 - Configuring Protocol Groups

System Management Commands4-534Default Setting NoneCommand Mode Global ConfigurationCommand Usage This command specifies time servers from which the s

Strany 186 - Mapping Protocols to VLANs

Command Line Interface4-544show sntpThis command displays the current time and configuration settings for the SNTP client, and indicates whether or no

Strany 187 - Layer 2 Queue Settings

System Management Commands4-554Related Commandsshow sntp (4-54)calendar setThis command sets the system clock. It may be used if there is no time serv

Strany 188

Command Line Interface4-564System Status Commandsshow startup-configThis command displays the configuration file stored in non-volatile memory that is

Strany 189 - Priority

System Management Commands4-574Example Related Commandsshow running-config (4-58)Console#show startup-config!<stackingDB>00</stackingDB>!

Strany 190

Description of Software Features1-31Broadcast Storm Control – Broadcast suppression prevents broadcast traffic from overwhelming the network. When ena

Strany 191 - Selecting the Queue Mode

Command Line Interface4-584show running-configThis command displays the configuration information currently in use.Default Setting NoneCommand Mode Pr

Strany 192

System Management Commands4-594Example Related Commandsshow startup-config (4-56)Console#show running-configbuilding running-config, please wait...!&l

Strany 193 - Layer 3/4 Priority Settings

Command Line Interface4-604show systemThis command displays system information.Default Setting NoneCommand Mode Normal Exec, Privileged ExecCommand Us

Strany 194 - Mapping IP Precedence

System Management Commands4-614show usersShows all active console and Telnet sessions, including user name, idle time, and IP address of Telnet client

Strany 195 - Mapping DSCP Priority

Command Line Interface4-624Example Frame Size Commandsjumbo frameThis command enables support for jumbo frames. Use the no form to disable it.Syntax [

Strany 196

Flash/File Commands4-634Example Flash/File CommandsThese commands are used to manage the system code or configuration files.copy This command moves

Strany 197 - Mapping IP Port Priority

Command Line Interface4-644Command Mode Privileged ExecCommand Usage • The system prompts for data required to complete the copy command. • The destin

Strany 198

Flash/File Commands4-654The following example shows how to download a configuration file: This example shows how to copy a secure-site certificate fro

Strany 199 - Multicast

Command Line Interface4-664Command Usage • If the file type is used for system startup, then this file cannot be deleted. • “Factory_Default_Config.cf

Strany 200 - IGMP Protocol

Flash/File Commands4-674Example The following example shows how to display all file information:whichbootThis command displays which files were booted

Strany 201 - Multicast Filtering

Introduction1-41learned via GVRP, or ports can be manually assigned to a specific set of VLANs. This allows the switch to restrict traffic to the VLAN

Strany 202

Command Line Interface4-684Command Mode Global ConfigurationCommand Usage • A colon (:) is required after the specified unit number and file type. • I

Strany 203

Authentication Commands4-694Authentication Sequenceauthentication loginThis command defines the login authentication method and precedence. Use the no

Strany 204

Command Line Interface4-704authentication enableThis command defines the authentication method and precedence to use when changing from Exec command m

Strany 205

Authentication Commands4-714RADIUS ClientRemote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software run

Strany 206

Command Line Interface4-724Example radius-server portThis command sets the RADIUS server network port. Use the no form to restore the default.Syntax r

Strany 207

Authentication Commands4-734radius-server retransmitThis command sets the number of retries. Use the no form to restore the default.Syntax radius-serv

Strany 208

Command Line Interface4-744Example TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that us

Strany 209

Authentication Commands4-754Example tacacs-server portThis command specifies the TACACS+ server network port. Use the no form to restore the default.S

Strany 210

Command Line Interface4-764show tacacs-serverThis command displays the current settings for the TACACS+ server.Default Setting NoneCommand Mode Privil

Strany 211 - Displaying the DNS Cache

Authentication Commands4-774port securityThis command enables or configures port security. Use the no form without any keywords to disable port securi

Strany 212

System Defaults1-51Authentication Privileged Exec Level Username “admin”Password “admin”Normal Exec Level Username “guest”Password “guest”Enable Privi

Strany 213 - Telnet Connection

Command Line Interface4-784Example The following example enables port security for port 5, and sets the response to a security violation to issue a tr

Strany 214 - Command Line Interface

Authentication Commands4-794dot1x system-auth-controlThis command enables IEEE 802.1X port authentication globally on the switch. Use the no form to r

Strany 215 - Entering Commands

Command Line Interface4-804dot1x port-controlThis command sets the dot1x mode on a port interface. Use the no form to restore the default.Syntaxdot1x

Strany 216 - Showing Commands

Authentication Commands4-814Command Usage • The “max-count” parameter specified by this command is only effective if the dot1x mode is set to “auto” b

Strany 217 - Understanding Command Modes

Command Line Interface4-824dot1x timeout quiet-periodThis command sets the time that a switch port waits after the Max Request Count has been exceeded

Strany 218 - Console#

Authentication Commands4-834dot1x timeout tx-periodThis command sets the time that an interface on the switch waits during an authentication session b

Strany 219 - Command Line Processing

Command Line Interface4-844• 802.1X Port Details – Displays the port access control parameters for each interface, including the following items:- re

Strany 220 - Command Groups

Authentication Commands4-854ExampleConsole#show dot1xGlobal 802.1X Parameterssystem-auth-control: enable802.1X Port SummaryPort Name Status Operation

Strany 221 - Line Commands

Command Line Interface4-864Access Control List CommandsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol,

Strany 222

Access Control List Commands4-874The order in which active ACLs are checked is as follows:1. User-defined rules in the Egress MAC ACL for egress ports

Strany 223

Management Guide10 Gigabit Ethernet SwitchLayer 2 Standalone Switch with8 10GBASE XFP Slots, and1 10/100BASE-TX RJ-45 Management Port

Strany 224

Introduction1-61Address Table Aging Time 300 secondsVirtual LANs Default VLAN 1PVID 1Acceptable Frame Type AllIngress Filtering DisabledSwitchport Mod

Strany 225

Command Line Interface4-884access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. Use the

Strany 226

Access Control List Commands4-894access-list ip extended fragment-auto-maskThis command automatically creates extra masks to support fragmented ACL en

Strany 227

Command Line Interface4-904Example This example configures one permit rule for the specific address 10.1.1.21 and another rule for the address range 1

Strany 228

Access Control List Commands4-914Default SettingNoneCommand ModeExtended ACLCommand Usage• All new rules are appended to the end of the list.• Address

Strany 229

Command Line Interface4-924This permits all TCP packets from class C addresses 192.168.1.0 with the TCP control code set to “SYN.”Related Commandsacce

Strany 230

Access Control List Commands4-934Command Usage• A mask can only be used by all ingress ACLs or all egress ACLs.• The precedence of the ACL rules appli

Strany 231

Command Line Interface4-944Command ModeIP MaskCommand Usage• Packets crossing a port are checked against all the rules in the ACL until a match is fou

Strany 232

Access Control List Commands4-954This shows how to create a standard ACL with an ingress mask to deny access to the IP host 171.69.198.102, and permit

Strany 233 - Console(config)#

Command Line Interface4-964This is a more comprehensive example. It denies any TCP packets in which the SYN bit is ON, and permits all other packets.

Strany 234 - Console(config-if)#end

Access Control List Commands4-974Related Commandsmask (IP ACL) (4-93)ip access-group This command binds a port to an IP ACL. Use the no form to remove

Strany 235 - System Management Commands

2-1Chapter 2: Initial ConfigurationConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent off

Strany 236 - Device Designation Commands

Command Line Interface4-984map access-list ip This command sets the output queue for packets matching an ACL rule. The specified CoS value is only use

Strany 237 - User Access Commands

Access Control List Commands4-994Command ModePrivileged ExecExample Related Commandsmap access-list ip (4-98)match access-list ip This command changes

Strany 238

Command Line Interface4-1004Example Related Commands show marking (4-100)show marking This command displays the current configuration for packet marki

Strany 239 - IP Filter Commands

Access Control List Commands4-1014access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form to remove

Strany 240

Command Line Interface4-1024permit, deny (MAC ACL)This command adds a rule to a MAC ACL. The rule filters packets matching a specified MAC source or d

Strany 241 - Web Server Commands

Access Control List Commands4-1034Command ModeMAC ACLCommand Usage• New rules are added to the end of the list.•The ethertype option can only be used

Strany 242

Command Line Interface4-1044access-list mac mask-precedence This command changes to MAC Mask mode used to configure access control masks. Use the no f

Strany 243

Access Control List Commands4-1054• vid-bitmask – VLAN ID of rule must match this bitmask.• ethertype – Check the Ethernet type field.• ethertype-bitm

Strany 244 - Telnet Server Commands

Command Line Interface4-1064This example creates an Egress MAC ACL.show access-list mac mask-precedence This command shows the ingress or egress rule

Strany 245

Access Control List Commands4-1074mac access-groupThis command binds a port to a MAC ACL. Use the no form to remove the port.Syntaxmac access-group ac

Strany 246

Initial Configuration2-22• Enable port mirroring• Set broadcast storm control on any port• Display system information and statistics Required Connecti

Strany 247

Command Line Interface4-1084map access-list mac This command sets the output queue for packets matching an ACL rule. The specified CoS value is only u

Strany 248

Access Control List Commands4-1094Command ModePrivileged ExecExample Related Commandsmap access-list mac (4-108)match access-list mac This command cha

Strany 249

Command Line Interface4-1104ACL Informationshow access-listThis command shows all ACLs and associated rules, as well as all the user-defined masks.Com

Strany 250

SNMP Commands4-1114SNMP CommandsControls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well a

Strany 251

Command Line Interface4-1124Exampleshow snmpThis command can be used to check the status of SNMP communications.Default Setting NoneCommand Mode Norma

Strany 252

SNMP Commands4-1134snmp-server communityThis command defines the SNMP v1 and v2c community access string. Use the no form to remove the specified comm

Strany 253 - Event Logging Commands

Command Line Interface4-1144Related Commandssnmp-server location (4-114)snmp-server locationThis command sets the system location string. Use the no f

Strany 254

SNMP Commands4-1154to using the snmp-server host command. (Maximum length: 32 characters)• version - Specifies whether to send notifications as SNMP V

Strany 255

Command Line Interface4-1164To send an inform to a SNMPv3 host, complete these steps:1. Enable the SNMP agent (page 4-111).2. Allow the switch to send

Strany 256

SNMP Commands4-1174Command Usage • If you do not enter an snmp-server enable traps command, no notifications controlled by this command are sent. In o

Strany 257

Basic Configuration2-32Remote ConnectionsPrior to accessing the switch’s onboard agent via a network connection, you must first configure it with a va

Strany 258

Command Line Interface4-1184passwords to generate the security keys for authenticating and encrypting SNMPv3 packets. • A remote engine ID is required

Strany 259

SNMP Commands4-1194snmp-server viewThis command adds an SNMP view which controls user access to the MIB. Use the no form to remove an SNMP view.Syntax

Strany 260 - SMTP Alert Commands

Command Line Interface4-1204show snmp viewThis command shows information on the SNMP views.Command Mode Privileged ExecExample snmp-server groupThis c

Strany 261

SNMP Commands4-1214Default Setting • Default groups: public27 (read only), private28 (read/write)• readview - Every object belonging to the Internet O

Strany 262

Command Line Interface4-1224snmp-server userThis command adds a user to an SNMP group, restricting the user to a specific SNMP Read, Write, or Notify

Strany 263 - Time Commands

SNMP Commands4-1234• ip-address - The Internet address of the remote device.• v1 | v2c | v3 - Use SNMP version 1, 2c or 3.• encrypted - Accepts the pa

Strany 264

Command Line Interface4-1244show snmp userThis command shows information on SNMP users.Command Mode Privileged ExecExample Console#show snmp userEngin

Strany 265

Interface Commands4-1254Interface CommandsThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or

Strany 266

Command Line Interface4-1264Command Mode Global Configuration Example To specify port 4, enter the following command:descriptionThis command adds a de

Strany 267

Interface Commands4-1274Default Setting • Auto-negotiation is enabled by default. • When auto-negotiation is disabled, the default speed-duplex settin

Strany 268 - System Status Commands

Initial Configuration2-424. The session is opened and the CLI displays the “Console#” prompt indicating you have access at the Privileged Exec level.

Strany 269

Command Line Interface4-1284disabled, you must manually specify the link attributes with the speed-duplex and flowcontrol commands.• If autonegotiatio

Strany 270

Interface Commands4-1294Related Commands negotiation (4-127)speed-duplex (4-126)shutdown This command disables an interface. To restart a disabled int

Strany 271

Command Line Interface4-1304Example The following shows how to configure broadcast storm control at 600 packets per second: clear countersThis command

Strany 272

Interface Commands4-1314Default Setting Shows the status for all interfaces.Command Mode Normal Exec, Privileged ExecCommand Usage If no interface is

Strany 273

Command Line Interface4-1324Command Mode Normal Exec, Privileged ExecCommand Usage If no interface is specified, information on all interfaces is disp

Strany 274 - Frame Size Commands

Interface Commands4-1334Command Mode Normal Exec, Privileged ExecCommand Usage If no interface is specified, information on all interfaces is displaye

Strany 275 - Flash/File Commands

Command Line Interface4-1344Mirror Port CommandsThis section describes how to mirror traffic from a source port to a target port. port monitorThis com

Strany 276

Mirror Port Commands4-1354Example The following example configures the switch to mirror all packets from port 6 to 8:show port monitorThis command dis

Strany 277

Command Line Interface4-1364Rate Limit CommandsThis function allows the network manager to control the maximum rate for traffic transmitted or receive

Strany 278 - Console#delete test2.cfg

Link Aggregation Commands4-1374Link Aggregation CommandsPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth

Strany 279

Basic Configuration2-52Before you can assign an IP address to the switch, you must obtain the following information from your network administrator:•

Strany 280 - Authentication Commands

Command Line Interface4-1384Dynamically Creating a Port Channel –Ports assigned to a common port channel must meet the following criteria:• Ports must

Strany 281 - Authentication Sequence

Link Aggregation Commands4-1394lacpThis command enables 802.3ad Link Aggregation Control Protocol (LACP) for the current interface. Use the no form to

Strany 282

Command Line Interface4-1404lacp system-priorityThis command configures a port's LACP system priority. Use the no form to restore the default set

Strany 283 - RADIUS Client

Link Aggregation Commands4-1414lacp admin-key (Ethernet Interface)This command configures a port's LACP administration key. Use the no form to re

Strany 284

Command Line Interface4-1424Default Setting 0Command Mode Interface Configuration (Port Channel)Command Usage • Ports are only allowed to join the sam

Strany 285

Link Aggregation Commands4-1434Example show lacpThis command displays LACP information.Syntax show lacp [port-channel] {counters | internal | neighbor

Strany 286 - TACACS+ Client

Command Line Interface4-1444Console#show lacp 1 internalPort channel: 1-------------------------------------------------------------------------Oper K

Strany 287

Link Aggregation Commands4-1454Console#show lacp 1 neighborsPort channel 1 neighbors------------------------------------------------------------------

Strany 288 - Port Security Commands

Command Line Interface4-1464Address Table CommandsThese commands are used to configure the address table for filtering specified addresses, displaying

Strany 289

Address Table Commands4-1474mac-address-table staticThis command maps a static address to a destination port in a VLAN. Use the no form to remove an a

Strany 290 - 802.1X Port Authentication

Initial Configuration2-625. Wait a few minutes, and then check the IP configuration settings by typing the “show ip interface” command. Press <Ente

Strany 291

Command Line Interface4-1484clear mac-address-table dynamicThis command removes any learned entries from the forwarding database and clears the transm

Strany 292

Address Table Commands4-1494means to match a bit and “1” means to ignore a bit. For example, a mask of 00-00-00-00-00-00 means an exact match, and a m

Strany 293

Command Line Interface4-1504Spanning Tree CommandsThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the swi

Strany 294

Spanning Tree Commands4-1514spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Synta

Strany 295

Command Line Interface4-1524members may be inadvertently disabled to prevent network loops, thus isolating group members. When operating multiple VLAN

Strany 296

Spanning Tree Commands4-1534Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., disc

Strany 297

Command Line Interface4-1544Default Setting 20 secondsCommand Mode Global ConfigurationCommand Usage This command sets the maximum time (in seconds) a

Strany 298 - Access Control List Commands

Spanning Tree Commands4-1554spanning-tree pathcost methodThis command configures the path cost method used for Rapid Spanning Tree and Multiple Spanni

Strany 299 - IP ACLs

Command Line Interface4-1564spanning-tree mst-configuration This command changes to Multiple Spanning Tree (MST) configuration mode. Default Setting •

Strany 300

Spanning Tree Commands4-1574and the same instance (on each bridge) with the same set of VLANs. Also, note that RSTP treats each MSTI region as a singl

Strany 301

Basic Configuration2-72The default strings are:• public - with read-only access. Authorized management stations are only able to retrieve MIB objects.

Strany 302

Command Line Interface4-1584Default Setting Switch’s MAC addressCommand Mode MST ConfigurationCommand Usage The MST region name and revision number (p

Strany 303

Spanning Tree Commands4-1594max-hopsThis command configures the maximum number of hops in the region before a BPDU is discarded. Use the no form to re

Strany 304

Command Line Interface4-1604spanning-tree costThis command configures the spanning tree path cost for the specified interface. Use the no form to rest

Strany 305

Spanning Tree Commands4-1614spanning-tree port-priorityThis command configures the priority for the specified interface. Use the no form to restore th

Strany 306

Command Line Interface4-1624devices such as workstations or servers, retains the current forwarding database to reduce the amount of frame flooding re

Strany 307

Spanning Tree Commands4-1634Related Commandsspanning-tree edge-port (4-161)spanning-tree link-typeThis command configures the link type for Rapid Span

Strany 308

Command Line Interface4-1644The recommended range is -- Ethernet: 200,000-20,000,000- Fast Ethernet: 20,000-2,000,000- Gigabit Ethernet: 2,000-200,000

Strany 309

Spanning Tree Commands4-1654Command Mode Interface Configuration (Ethernet Ports 1-8, Port Channel)Command Usage • This command defines the priority f

Strany 310

Command Line Interface4-1664show spanning-treeThis command shows the configuration for the common spanning tree (CST) or for an instance within the mu

Strany 311

Spanning Tree Commands4-1674ExampleConsole#show spanning-treeSpanning-tree information---------------------------------------------------------------S

Strany 312 - MAC ACLs

Initial Configuration2-82Configuring Access for SNMP Version 3 ClientsTo configure management access for SNMPv3 clients, you need to first create a vi

Strany 313

Command Line Interface4-1684show spanning-tree mst configurationThis command shows the configuration of the multiple spanning tree.Command Mode Privil

Strany 314

VLAN Commands4-1694vlan databaseThis command enters VLAN database mode. All commands in this mode will take effect immediately.Default Setting NoneCom

Strany 315

Command Line Interface4-1704Command Usage • no vlan vlan-id deletes the VLAN. • no vlan vlan-id name removes the VLAN name. • no vlan vlan-id state re

Strany 316

VLAN Commands4-1714Example The following example shows how to set the interface configuration mode to VLAN 1, and then assign an IP address to the VLA

Strany 317

Command Line Interface4-1724switchport acceptable-frame-types This command configures the acceptable frame types for a port. Use the no form to restor

Strany 318

VLAN Commands4-1734• If ingress filtering is enabled and a port receives frames tagged for VLANs for which it is not a member, these frames will be di

Strany 319

Command Line Interface4-1744switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the defau

Strany 320

VLAN Commands4-1754switchport forbidden vlanThis command configures forbidden VLANs. Use the no form to remove the list of forbidden VLANs.Syntax swit

Strany 321

Command Line Interface4-1764show vlanThis command shows VLAN information.Syntax show vlan [id vlan-id | name vlan-name]• id - Keyword to be followed b

Strany 322 - ACL Information

VLAN Commands4-1774Configuring Private VLANsPrivate VLANs provide port-based security and isolation between ports within the assigned VLAN. This secti

Strany 323 - SNMP Commands

Managing System Files2-92Managing System FilesThe switch’s flash memory supports three types of system files that can be managed by the CLI program, w

Strany 324

Command Line Interface4-1784show pvlanThis command displays the configured private VLAN.Command Mode Privileged ExecExampleConfiguring Protocol-based

Strany 325

VLAN Commands4-1794protocol-vlan protocol-group (Configuring Groups)This command creates a protocol group, or to add specific protocols to a group. Us

Strany 326

Command Line Interface4-1804Command Usage • When creating a protocol-based VLAN, only assign interfaces via this command. If you assign interfaces usi

Strany 327

GVRP and Bridge Extension Commands4-1814show interfaces protocol-vlan protocol-groupThis command shows the mapping from protocol groups to VLANs for t

Strany 328

Command Line Interface4-1824bridge-ext gvrpThis command enables GVRP globally for the switch. Use the no form to disable it.Syntax [no] bridge-ext gvr

Strany 329

GVRP and Bridge Extension Commands4-1834switchport gvrpThis command enables GVRP for a port. Use the no form to disable it.Syntax [no] switchport gvrp

Strany 330

Command Line Interface4-1844garp timerThis command sets the values for the join, leave and leaveall timers. Use the no form to restore the timers’ def

Strany 331

Priority Commands4-1854show garp timerThis command shows the GARP timers for the selected interface.Syntax show garp timer [interface]interface • ethe

Strany 332

Command Line Interface4-1864Priority Commands (Layer 2)queue modeThis command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for

Strany 333

Priority Commands4-1874Example The following example sets the queue mode to strict priority service mode:switchport priority defaultThis command sets

Strany 334

ES5508F3.0.0.3 E042005-R01149100022900A

Strany 335

Initial Configuration2-102

Strany 336

Command Line Interface4-1884queue bandwidth This command assigns weighted round-robin (WRR) weights to the eight class of service (CoS) priority queue

Strany 337 - Interface Commands

Priority Commands4-1894Default Setting This switch supports Class of Service by using eight priority queues, with Weighted Round Robin queuing for eac

Strany 338

Command Line Interface4-1904show queue bandwidthThis command displays the weighted round-robin (WRR) bandwidth allocation for the eight priority queue

Strany 339

Priority Commands4-1914Priority Commands (Layer 3 and 4) map ip port (Global Configuration)This command enables IP port mapping (i.e., class of servic

Strany 340

Command Line Interface4-1924Default Setting NoneCommand Mode Interface Configuration (Ethernet Ports 1-8, Port Channel)Command Usage • The precedence

Strany 341

Priority Commands4-1934map ip precedence (Interface Configuration)This command sets IP precedence priority (i.e., IP Type of Service priority). Use th

Strany 342

Command Line Interface4-1944Command Usage • The precedence for priority mapping is IP Port, IP Precedence or IP DSCP, and default switchport priority.

Strany 343

Priority Commands4-1954• DSCP priority values are mapped to default Class of Service values according to recommendations in the IEEE 802.1p standard,

Strany 344

Command Line Interface4-1964show map ip precedenceThis command shows the IP precedence priority map.Syntax show map ip precedence [interface]interface

Strany 345

Multicast Filtering Commands4-1974Default Setting NoneCommand Mode Privileged ExecExample Related Commands map ip dscp (Global Configuration) (4-193)m

Strany 346 - Mirror Port Commands

3-1Chapter 3: Configuring the SwitchUsing the Web InterfaceThis switch provides an embedded HTTP web agent. Using a web browser you can configure the

Strany 347

Command Line Interface4-1984IGMP Snooping Commands ip igmp snoopingThis command enables IGMP snooping on this switch. Use the no form to disable it.Sy

Strany 348 - Rate Limit Commands

Multicast Filtering Commands4-1994Example The following shows how to statically configure a multicast group on a port:ip igmp snooping versionThis com

Strany 349 - Link Aggregation Commands

Command Line Interface4-2004Example The following shows the current IGMP snooping configuration:show mac-address-table multicast This command shows kn

Strany 350

Multicast Filtering Commands4-2014IGMP Query Commands (Layer 2) ip igmp snooping querierThis command enables the switch as an IGMP querier. Use the no

Strany 351

Command Line Interface4-2024Command Mode Global ConfigurationCommand Usage The query count defines how long the querier waits for a response from a mu

Strany 352

Multicast Filtering Commands4-2034Default Setting 10 secondsCommand Mode Global ConfigurationCommand Usage• The switch must be using IGMPv2 for this c

Strany 353

Command Line Interface4-2044Example The following shows how to configure the default timeout to 300 seconds:Related Commands ip igmp snooping version

Strany 354

IP Interface Commands4-2054Example The following shows how to configure port 1 as a multicast router port within VLAN 1:show ip igmp snooping mrouter

Strany 355

Command Line Interface4-2064ip address This command sets the IP address for the currently selected VLAN interface. Use the no form to restore the defa

Strany 356

IP Interface Commands4-2074ExampleIn the following example, the device is assigned an address in VLAN 1.Related Commandsip dhcp restart (4-207)ip defa

Strany 357

Configuring the Switch3-23Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and password. The a

Strany 358 - Address Table Commands

Command Line Interface4-2084• DHCP requires the server to reassign the client’s last address if available. • If the BOOTP or DHCP server has been move

Strany 359

IP Interface Commands4-2094Related Commands ip default-gateway (4-207)pingThis command sends ICMP echo request packets to another node on the network.

Strany 360

Command Line Interface4-2104DNS CommandsThese commands are used to configure Domain Naming System (DNS) services. You can manually configure entries i

Strany 361

DNS Commands4-2114Command Usage Servers or other network devices may support one or more connections via multiple IP addresses. If more than one IP ad

Strany 362 - Spanning Tree Commands

Command Line Interface4-2124Default Setting NoneCommand Mode Global ConfigurationExampleRelated Commands ip domain-list (4-212)ip name-server (4-213)i

Strany 363 -

DNS Commands4-2134ExampleThis example adds two domain names to the current list and then displays the list.Related Commands ip domain-name (4-211)ip n

Strany 364

Command Line Interface4-2144ExampleThis example adds two domain-name servers to the list and then displays the list.Related Commands ip domain-name (4

Strany 365

DNS Commands4-2154Related Commands ip domain-name (4-211)ip name-server (4-213)show hostsThis command displays the static host name-to-address mapping

Strany 366

Command Line Interface4-2164show dns cacheThis command displays entries in the DNS cache.Command Mode Privileged ExecExample clear dns cacheThis comma

Strany 367

A-1Appendix A: Software SpecificationsSoftware FeaturesAuthenticationLocal, RADIUS, TACACS, Port (802.1X), HTTPS, SSH, Port SecurityAccess Control Lis

Strany 368

Navigating the Web Browser Interface3-33Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration chang

Strany 369

Software SpecificationsA-2AAdditional FeaturesBOOTP clientSNTP (Simple Network Time Protocol)SNMP (Simple Network Management Protocol)RMON (Remote Mon

Strany 370

Management Information BasesA-3ASNTP (RFC 2030)SSH (Version 2.0)TFTP (RFC 1350)Management Information BasesBridge MIB (RFC 1493)Entity MIB (RFC 2737)E

Strany 371

Software SpecificationsA-4A

Strany 372

B-1Appendix B: TroubleshootingProblems Accessing the Management Interface Table B-1 Troubleshooting ChartSymptom ActionCannot connect using Telnet,

Strany 373

TroubleshootingB-2BUsing System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually caus

Strany 374

Glossary-1GlossaryAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Strany 375

GlossaryGlossary-2Extensible Authentication Protocol over LAN (EAPOL) EAPOL is a client authentication protocol used by this switch to verify the netw

Strany 376

Glossary-3GlossaryIEEE 802.1XPort Authentication controls access to the switch ports by requiring users to first enter a user ID and password for auth

Strany 377

GlossaryGlossary-4Link Aggregation Control Protocol (LACP)Allows ports to automatically negotiate a trunked link with LACP-configured ports on another

Strany 378

Glossary-5GlossaryQuality of Service (QoS)QoS refers to the capability of a network to provide better service to selected traffic flows using features

Strany 379

Configuring the Switch3-43Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, o

Strany 380 - VLAN Commands

GlossaryGlossary-6TelnetDefines a remote communication facility for interfacing to a terminal device over TCP/IP.Terminal Access Controller Access Con

Strany 381

Index-1Numerics802.1X, port authentication 3-64, 4-78Aacceptable frame type 3-141, 4-172Access Control List See ACLACLExtended IP 3-74, 4-86, 4-87, 4

Strany 382 - Configuring VLAN Interfaces

Index-2IndexHhardware version, displaying 3-10, 4-61HTTPS 3-55, 4-30HTTPS, secure server 3-55, 4-30IIEEE 802.1D 3-112, 4-151IEEE 802.1s 4-151IEEE 802.

Strany 383

Index-3Indexcapabilities 3-88, 4-128duplex mode 3-88, 4-126speed 3-88, 4-126ports, configuring 3-85, 4-125ports, mirroring 3-103, 4-134priority, defau

Strany 384

Index-4Indexdisplaying port members 3-136, 4-176egress mode 3-142, 4-171interface configuration 3-141, 4-172–4-175private 3-143, 4-177protocol 3-144,

Strany 386

ES5508E042005-R01149100022900A

Strany 387 - Displaying VLAN Information

Navigating the Web Browser Interface3-53SNMPv3 3-39Engine ID Sets the SNMP v3 engine ID 3-40Remote Engine ID Sets the SNMP v3 engine ID on a remote de

Strany 388

Configuring the Switch3-63LACP 3-90Configuration Allows ports to dynamically join trunks 3-92Aggregation Port Configures parameters for link aggrega

Strany 389

Navigating the Web Browser Interface3-73Trunk Configuration Configures trunk settings for a specified MST instance 3-130VLAN 3-132802.1Q VLANGVRP Stat

Strany 390

Configuring the Switch3-83ACL CoS Priority Sets the CoS value and corresponding output queue for packets matching an ACL rule3-158IGMP Snooping 3-159I

Strany 391

Basic Configuration3-93Basic ConfigurationDisplaying System InformationYou can easily identify the system by displaying the device name, location and

Strany 392

vContents Chapter 1: Introduction 1-1Key Features 1-1Description of Software Features 1-2System Defaults 1-4Chapter 2: Initial Configuration 2-

Strany 393 - Eth 1/1 1 vlan2

Configuring the Switch3-103CLI – Specify the hostname, location and contact information.Displaying Switch Hardware/Software Versions Use the Switch In

Strany 394

Basic Configuration3-113These additional parameters are displayed for the CLI.• Unit ID – Unit number in stack.• Redundant Power Status – Displays the

Strany 395

Configuring the Switch3-123Displaying Bridge Extension CapabilitiesThe Bridge MIB includes extensions for managed devices that support Multicast Filte

Strany 396 - Console(config-if)#

Basic Configuration3-133CLI – Enter the following command. Setting the Switch’s IP Address An IP address may be used for management access to the swit

Strany 397 - Priority Commands

Configuring the Switch3-143• MAC Address – The MAC address of this switch.• Restart DHCP – Requests a new IP address from the DHCP server.Manual Confi

Strany 398 - Priority Commands (Layer 2)

Basic Configuration3-153Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the switch to be dynamically configured by th

Strany 399

Configuring the Switch3-163Web – If the address assigned by DHCP is no longer functioning, you will not be able to renew the IP settings via the web i

Strany 400

Basic Configuration3-173Managing FirmwareYou can upload/download firmware to or from a TFTP server, or copy files to and from switch units in a stack.

Strany 401

Configuring the Switch3-183Downloading System Software from a Server When downloading runtime code, you can specify the destination file name to repla

Strany 402

Basic Configuration3-193To delete a file select System, File Management, Delete. Select the file name from the given list by checking the tick box and

Strany 403

ContentsviSaving or Restoring Configuration Settings 3-20Downloading Configuration Settings from a Server 3-21Console Port Settings 3-22Telnet Sett

Strany 404

Configuring the Switch3-203Saving or Restoring Configuration SettingsYou can upload/download configuration settings to/from a TFTP server, or copy fil

Strany 405

Basic Configuration3-213Downloading Configuration Settings from a ServerYou can download the configuration file under a new file name and then set it

Strany 406

Configuring the Switch3-223CLI – Enter the IP address of the TFTP server, specify the source file on the server, set the startup file name on the swit

Strany 407

Basic Configuration3-233• Speed – Sets the terminal line’s baud rate for transmit (to terminal) and receive (from terminal). Set the speed to match th

Strany 408

Configuring the Switch3-243CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the cur

Strany 409 - Multicast Filtering Commands

Basic Configuration3-253• Password5 – Specifies a password for the line connection. When a connection is started on a line with password protection, t

Strany 410 - IGMP Snooping Commands

Configuring the Switch3-263Configuring Event LoggingThe switch allows you to control the logging of error messages, including the type of events that

Strany 411

Basic Configuration3-273Web – Click System, Logs, System Logs. Specify System Log Status, set the level of event messages to be logged to RAM and flas

Strany 412

Configuring the Switch3-283Web – Click System, Logs, Remote Logs. To add an IP address to the Host IP List, type the new IP address in the Host IP Add

Strany 413

Basic Configuration3-293Displaying Log MessagesUse the Logs page to scroll through the logged system and event messages. The switch can store up to 20

Strany 414

ContentsviiConfiguring ACL Masks 3-80Specifying the Mask Type 3-80Configuring an IP ACL Mask 3-81Configuring a MAC ACL Mask 3-83Binding a Port to

Strany 415

Configuring the Switch3-303• SMTP Server List – Specifies a list of up to three recipient SMTP servers. The switch attempts to connect to the other li

Strany 416

Basic Configuration3-313CLI – Enter the IP address of at least one SMTP server, set the syslog severity level to trigger an email message, and specify

Strany 417 - IP Interface Commands

Configuring the Switch3-323Setting the System ClockSimple Network Time Protocol (SNTP) allows the switch to set its internal clock based on periodic u

Strany 418

Basic Configuration3-333CLI – This example configures the switch to operate as an SNTP client and then displays the current time and settings.Setting

Strany 419

Configuring the Switch3-343Simple Network Management Protocol Simple Network Management Protocol (SNMP) is a communication protocol designed specifica

Strany 420

Simple Network Management Protocol3-353security models v1 and v2c. The following table shows the security models and levels available and the system d

Strany 421

Configuring the Switch3-363CLI – The following example enables SNMP on the switch.Setting Community Access Strings You may configure up to five commun

Strany 422 - DNS Commands

Simple Network Management Protocol3-373Specifying Trap Managers and Trap TypesTraps indicating status changes are issued by the switch to specified tr

Strany 423

Configuring the Switch3-383Version 1 or 2c clients), or define a corresponding “User Name” in the SNMPv3 Users page (for Version 3 clients). (Range: 1

Strany 424

Simple Network Management Protocol3-393Web – Click SNMP, Configuration. Enter the IP address and community string for each management station that wil

Strany 425

ContentsviiiMapping Protocols to VLANs 3-146Class of Service Configuration 3-147Layer 2 Queue Settings 3-147Setting the Default Priority for Interf

Strany 426

Configuring the Switch3-403Setting a Local Engine IDAn SNMPv3 engine is an independent SNMP agent that resides on the switch. This engine protects aga

Strany 427

Simple Network Management Protocol3-413The engine ID can be specified by entering 10 to 64 hexadecimal characters. If less than 26 characters are spec

Strany 428

Configuring the Switch3-423• Privacy Protocol – The encryption algorithm use for data privacy; only 56-bit DES is currently available.• Privacy Passwo

Strany 429 - Software Features

Simple Network Management Protocol3-433CLI – Use the snmp-server user command to configure a new user name and assign it to a group.Configuring Remote

Strany 430 - Standards

Configuring the Switch3-443• Privacy Protocol – The encryption algorithm use for data privacy; only 56-bit DES is currently available.• Privacy Passwo

Strany 431 - Management Information Bases

Simple Network Management Protocol3-453CLI – Use the snmp-server user command to configure a new user name and assign it to a group.Configuring SNMPv3

Strany 432 - Software Specifications

Configuring the Switch3-463Table 3-5 Supported Notification MessagesObject Label Object ID DescriptionRFC 1493 TrapsnewRoot 1.3.6.1.2.1.17.0.1 The n

Strany 433 - Appendix B: Troubleshooting

Simple Network Management Protocol3-473Private TrapsswPowerStatus ChangeTrap1.3.6.1.4.1.259.6.10.76.2.1.0.1 This trap is sent when the power state cha

Strany 434 - Using System Logs

Configuring the Switch3-483Web – Click SNMP, SNMPv3, Groups. Click New to configure a new group. In the New Group page, define a name, assign a securi

Strany 435 - Glossary

Simple Network Management Protocol3-493Setting SNMPv3 ViewsSNMPv3 views are used to restrict user access to specified portions of the MIB tree. The pr

Strany 436

ContentsixCommand Line Processing 4-7Command Groups 4-8Line Commands 4-9line 4-10login 4-11password 4-12timeout login response 4-12exec-timeout 4-

Strany 437

Configuring the Switch3-503CLI – Use the snmp-server view command to configure a new view. This example view includes the MIB-2 interfaces table, and

Strany 438

User Authentication3-513Command Attributes• Account List – Displays the current list of user accounts and associated access levels. (Defaults: admin,

Strany 439

Configuring the Switch3-523Configuring Local/Remote Logon Authentication Use the Authentication Settings menu to restrict management access based on s

Strany 440

User Authentication3-533• RADIUS Settings- Global – Provides globally applicable RADIUS settings.- ServerIndex – Specifies one of five RADIUS servers

Strany 441

Configuring the Switch3-543Web – Click Security, Authentication Settings. To configure local or remote authentication preferences, specify the authent

Strany 442

User Authentication3-553Configuring HTTPSYou can configure the switch to enable the Secure Hypertext Transfer Protocol (HTTPS) over the Secure Socket

Strany 443

Configuring the Switch3-563Web – Click Security, HTTPS Settings. Enable HTTPS and specify the port number, then click Apply.Figure 3-35 HTTPS Settin

Strany 444

User Authentication3-573Configuring the Secure Shell The Berkley-standard includes remote access tools originally designed for Unix systems. Some of t

Strany 445

Configuring the Switch3-583be configured locally on the switch via the User Accounts page as described on page 3-50.) The clients are subsequently aut

Strany 446 - E042005-R01

User Authentication3-593Field Attributes• Public-Key of Host-Key – The public key for the host.- RSA (Version 1): The first field indicates the size o

Komentáře k této Příručce

Žádné komentáře