Accton-technology ES4512C Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Akcesoria komputerowe Accton-technology ES4512C. Accton Technology ES4512C User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Powered by Accton

www.edge-core.comManagement GuidePowered by AcctonES4512CES4524CES4548C12/24/48-Port GigabitIntelligent Switch

Strona 2

Contentsvilogging facility 4-45logging trap 4-46clear logging 4-46show logging 4-47SMTP Alert Commands 4-48logging sendmail host 4-49logging sen

Strona 3 - Installation Guide

Configuring the Switch3-623Configuring a MAC ACL MaskThis mask defines the fields to check in the packet header. Command UsageYou must configure a mas

Strona 4 - E052005-R02

Access Control Lists3-633CLI – This example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of the rules

Strona 5

Configuring the Switch3-643Web – Click Security, ACL, Port Binding. Mark the Enable field for the port you want to bind to an ACL for ingress or egres

Strona 6

Port Configuration3-653• Forced Mode1 – Shows the forced/preferred port type to use for combination ports 21-24 or 45-48. (Copper-Forced, Copper-Prefe

Strona 7

Configuring the Switch3-663• Broadcast storm – Shows if broadcast storm control is enabled or disabled.• Broadcast storm limit – Shows the broadcast s

Strona 8

Port Configuration3-673Configuring Interface ConnectionsYou can use the Port Configuration or Trunk Configuration page to enable/disable an interface,

Strona 9

Configuring the Switch3-683• Trunk – Indicates if a port is a member of a trunk. To create trunks and select port members, see “Creating Trunk Groups”

Strona 10

Port Configuration3-693Creating Trunk GroupsYou can create multiple links between devices that work as one virtual, aggregate link. A port trunk offer

Strona 11

Configuring the Switch3-703Statically Configuring a TrunkCommand Usage• When configuring static trunks, you may not be able to link switches of differ

Strona 12

Port Configuration3-713CLI – This example creates trunk 2 with ports 1 and 2. Just connect these ports to two static trunk ports on another switch to

Strona 13

Contentsviitacacs-server host 4-74tacacs-server port 4-74tacacs-server key 4-75show tacacs-server 4-75Port Security Commands 4-76port security 4

Strona 14

Configuring the Switch3-723Web – Click Port, LACP, Configuration. Select any of the switch ports from the scroll-down port list and click Add. After y

Strona 15

Port Configuration3-733Configuring LACP ParametersDynamically Creating a Port Channel –Ports assigned to a common port channel must meet the following

Strona 16 - Contents

Configuring the Switch3-743Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can

Strona 17

Port Configuration3-753CLI – The following example configures LACP parameters for ports 1-6. Ports 1-4 are used as active members of the LAG; ports 5

Strona 18

Configuring the Switch3-763Displaying LACP Port CountersYou can display statistics for LACP protocol messages. Web – Click Port, LACP, Port Counters I

Strona 19

Port Configuration3-773Displaying LACP Settings and Status for the Local SideYou can display configuration settings and the operational state for the

Strona 20

Configuring the Switch3-783Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 3-

Strona 21 - Figure 3-90. DNS Cache 3-150

Port Configuration3-793Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state for the

Strona 22

Configuring the Switch3-803CLI – The following example displays the LACP configuration settings and operational state for the remote side of port chan

Strona 23 - Chapter 1: Introduction

Port Configuration3-813Web – Click Port, Port/Trunk Broadcast Control. Check the Enabled box for any interface, set the threshold and click Apply.Figu

Strona 24 - Introduction

ContentsviiiACL Information 4-111show access-list 4-111show access-group 4-111SNMP Commands 4-112snmp-server community 4-112snmp-server contact

Strona 25

Configuring the Switch3-823Configuring Port MirroringYou can mirror traffic from any source port to a target port for real-time analysis. You can then

Strona 26

Port Configuration3-833Configuring Rate LimitsThis function allows the network manager to control the maximum rate for traffic transmitted or received

Strona 27 - System Defaults

Configuring the Switch3-843Showing Port StatisticsYou can display standard statistics on network traffic from the Interfaces Group and Ethernet-like M

Strona 28

Port Configuration3-853Transmit Discarded Packets The number of outbound packets which were chosen to be discarded even though no errors had been dete

Strona 29

Configuring the Switch3-863Received Frames The total number of frames (bad, broadcast and multicast) received.Broadcast Frames The total number of goo

Strona 30

Port Configuration3-873Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at the b

Strona 31 - Connecting to the Switch

Configuring the Switch3-883CLI – This example shows statistics for port 13.Address Table SettingsSwitches store the addresses for all known devices. T

Strona 32 - Required Connections

Address Table Settings3-893Web – Click Address Table, Static Addresses. Specify the interface, the MAC address and VLAN, then click Add Static Address

Strona 33 - Basic Configuration

Configuring the Switch3-903Web – Click Address Table, Dynamic Addresses. Specify the search type (i.e., mark the Interface, MAC Address, or VLAN check

Strona 34 - Setting an IP Address

Spanning Tree Algorithm Configuration3-913Changing the Aging TimeYou can set the aging time for entries in the dynamic address table. Command Attribut

Strona 35 - Dynamic Configuration

Contentsixlacp admin-key (Port Channel) 4-142lacp port-priority 4-142show lacp 4-143Address Table Commands 4-147mac-address-table static 4-148cle

Strona 36 - Initial Configuration

Configuring the Switch3-923Once a stable network topology has been established, all bridges listen for Hello BPDUs (Bridge Protocol Data Units) transm

Strona 37 - Saving Configuration Settings

Spanning Tree Algorithm Configuration3-933• Hello Time – Interval (in seconds) at which the root device transmits a configuration message. • Forward D

Strona 38 - Managing System Files

Configuring the Switch3-943information that would make it return to a discarding state; otherwise, temporary data loops might result.• Root Hold Time

Strona 39 - Using the Web Interface

Spanning Tree Algorithm Configuration3-953CLI – This command displays global STA settings, followed by settings for each port. Note:The current root p

Strona 40 - Home Page

Configuring the Switch3-963• Multiple Spanning Tree Protocol- To allow multiple spanning trees to operate over the network, you must configure a relat

Strona 41 - Panel Display

Spanning Tree Algorithm Configuration3-973• Forward Delay – The maximum time (in seconds) this device will wait before changing states (i.e., discardi

Strona 42 - Main Menu

Configuring the Switch3-983Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply.Figure 3-55. STA Configurat

Strona 43 - Table 3-2. Switch Main Menu

Spanning Tree Algorithm Configuration3-993CLI – This example enables Spanning Tree Protocol, sets the mode to MST, and then configures the STA and MST

Strona 44

Configuring the Switch3-1003• Oper Link Type – The operational point-to-point status of the LAN segment attached to this interface. This parameter is

Strona 45

Spanning Tree Algorithm Configuration3-1013• Priority – Defines the priority used for this port in the Spanning Tree Algorithm. If the path cost for a

Strona 46

Contentsxswitchport allowed vlan 4-177switchport forbidden vlan 4-178Displaying VLAN Information 4-179show vlan 4-179Configuring Private VLANs 4-

Strona 47

Configuring the Switch3-1023CLI – This example shows the STA attributes for port 5. Configuring Interface SettingsYou can configure RSTP and MSTP attr

Strona 48

Spanning Tree Algorithm Configuration3-1033Protocol is detecting network loops. Where more than one port is assigned the highest priority, the port wi

Strona 49

Configuring the Switch3-1043Web – Click Spanning Tree, STA, Port Configuration or Trunk Configuration. Modify the required attributes, then click Appl

Strona 50

Spanning Tree Algorithm Configuration3-1053To ensure that the MSTI maintains connectivity across the network, you must configure a related set of brid

Strona 51

Configuring the Switch3-1063CLI – This displays STA settings for instance 1, followed by settings for each port. CLI – This example sets the priority

Strona 52 - Manual Configuration

Spanning Tree Algorithm Configuration3-1073Displaying Interface Settings for MSTPThe MSTP Port Information and MSTP Trunk Information pages display th

Strona 53 - Using DHCP/BOOTP

Configuring the Switch3-1083Configuring Interface Settings for MSTPYou can configure the STA interface settings for an MST Instance using the MSTP Por

Strona 54 - Managing Firmware

Spanning Tree Algorithm Configuration3-1093• MST Path Cost – This parameter is used by the MSTP to determine the best path between devices. Therefore,

Strona 55

Configuring the Switch3-1103VLAN ConfigurationIEEE 802.1Q VLANsIn large networks, routers are used to isolate broadcast traffic for each subnet into s

Strona 56

VLAN Configuration3-1113Note: VLAN-tagged frames can pass through VLAN-aware or VLAN-unaware network interconnection devices, but the VLAN tags should

Strona 57 - Configuring Event Logging

ContentsxiIGMP Query Commands (Layer 2) 4-206ip igmp snooping querier 4-206ip igmp snooping query-count 4-206ip igmp snooping query-interval 4-20

Strona 58 - Remote Log Configuration

Configuring the Switch3-1123these hosts, and core switches in the network, enable GVRP on the links between these devices. You should also determine s

Strona 59

VLAN Configuration3-1133Enabling or Disabling GVRP (Global Setting) GARP VLAN Registration Protocol (GVRP) defines a way for switches to exchange VLAN

Strona 60 - Displaying Log Messages

Configuring the Switch3-1143CLI – Enter the following command.Displaying Current VLANsThe VLAN Current Table shows the current port members of each VL

Strona 61

VLAN Configuration3-1153Command Attributes (CLI)• VLAN – ID of configured VLAN (1-4094, no leading zeroes).• Type – Shows how this VLAN was added to t

Strona 62

Configuring the Switch3-1163Web – Click VLAN, 802.1Q VLAN, Static List. To create a new VLAN, enter the VLAN ID and VLAN name, mark the Enable checkbo

Strona 63 - Resetting the System

VLAN Configuration3-1173Command Attributes• VLAN – ID of configured VLAN (1-4094, no leading zeroes).• Name – Name of the VLAN (1 to 32 characters).•

Strona 64 - Setting the System Clock

Configuring the Switch3-1183CLI – The following example adds tagged and untagged ports to VLAN 2.Adding Static Members to VLANs (Port Index)Use the VL

Strona 65 - Setting the Time Zone

VLAN Configuration3-1193Configuring VLAN Behavior for InterfacesYou can configure VLAN behavior for specific interfaces, including the default VLAN id

Strona 66

Configuring the Switch3-1203or LeaveAll message has been issued, the applicants can rejoin before the port actually leaves the group. (Range: 60-3000

Strona 67

VLAN Configuration3-1213CLI – This example sets port 3 to accept only tagged frames, assigns PVID 3 as the native VLAN ID, enables GVRP, sets the GARP

Strona 69

Configuring the Switch3-1223Configuring Uplink and Downlink PortsUse the Private VLAN Link Status page to set ports as downlink or uplink ports. Ports

Strona 70

VLAN Configuration3-1233Configuring Protocol GroupsCreate a protocol group for one or more protocols.Command Attributes• Protocol Group ID – Group ide

Strona 71

Configuring the Switch3-1243- If the frame is untagged and the protocol type matches, the frame is forwarded to the appropriate VLAN.- If the frame is

Strona 72 - Configuring HTTPS

Class of Service Configuration3-1253Class of Service ConfigurationClass of Service (CoS) allows you to specify which data packets have greater precede

Strona 73

Configuring the Switch3-1263Web – Click Priority, Default Port Priority or Default Trunk Priority. Modify the default priority for any interface, then

Strona 74 - Configuring the Secure Shell

Class of Service Configuration3-1273Mapping CoS Values to Egress QueuesThis switch processes Class of Service (CoS) priority tagged traffic by using e

Strona 75

Configuring the Switch3-1283Web – Click Priority, Traffic Classes. Mark an interface and click Select to display the current mapping of CoS values to

Strona 76 - Generating the Host Key Pair

Class of Service Configuration3-1293Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traf

Strona 77

Configuring the Switch3-1303Web – Click Priority, Queue Scheduling. Select the interface, highlight a traffic class (i.e., output queue), enter a weig

Strona 78 - Configuring the SSH Server

Class of Service Configuration3-1313Layer 3/4 Priority SettingsMapping Layer 3/4 Priorities to CoS ValuesThis switch supports several common methods o

Strona 79 - Configuring Port Security

xiiiTablesTable 1-1. Key Features 1-1Table 1-2. System Defaults 1-5Table 3-1. Web Page Configuration Buttons 3-3Table 3-2. Switch Main Menu 3-4Tab

Strona 80

Configuring the Switch3-1323Mapping IP PrecedenceThe Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight diff

Strona 81

Class of Service Configuration3-1333CLI – The following example globally enables IP Precedence service on the switch, maps IP Precedence value 1 to Co

Strona 82

Configuring the Switch3-1343Web – Click Priority, IP DSCP Priority. Select an entry from the DSCP table, enter a value in the Class of Service Value f

Strona 83

Class of Service Configuration3-1353Mapping IP Port PriorityYou can also map network applications to Class of Service values based on the IP port numb

Strona 84

Configuring the Switch3-1363CLI – The following example globally enables IP Port Priority service on the switch, maps HTTP traffic on port 5 to CoS va

Strona 85

Class of Service Configuration3-1373Web – Click Priority, ACL CoS Priority. Enable mapping for any port, select an ACL from the scroll-down list, then

Strona 86 - Displaying 802.1x Statistics

Configuring the Switch3-1383Command Attributes• Port – Port identifier.•Name* – Name of ACL. • Type – Type of ACL (IP or MAC). • Precedence – IP Prece

Strona 87

Multicast Filtering3-1393Multicast Filtering Multicasting is used to support real-time applications such as videoconferencing or streaming audio. A mu

Strona 88

Configuring the Switch3-1403Configuring IGMP Snooping and Query ParametersYou can configure the switch to forward multicast traffic intelligently. Bas

Strona 89

Multicast Filtering3-1413Web – Click IGMP Snooping, IGMP Configuration. Adjust the IGMP settings as required, and then click Apply. (The default setti

Strona 90

xivTablesTable 4-27. Authentication Sequence Commands 4-69Table 4-28. RADIUS Client Commands 4-71Table 4-29. TACACS+ Client Commands 4-74Table 4-30

Strona 91 - Configuring a Standard IP ACL

Configuring the Switch3-1423Displaying Interfaces Attached to a Multicast RouterMulticast routers that are attached to ports on the switch use informa

Strona 92

Multicast Filtering3-1433Specifying Static Interfaces for a Multicast RouterDepending on your network connections, IGMP snooping may not always be abl

Strona 93

Configuring the Switch3-1443Displaying Port Members of Multicast Services You can display the port members associated with a specified VLAN and multic

Strona 94

Multicast Filtering3-1453Assigning Ports to Multicast Services Multicast filtering can be dynamically configured using IGMP Snooping and IGMP Query me

Strona 95 - Configuring a MAC ACL

Configuring the Switch3-1463Configuring Domain Name ServiceThe Domain Naming System (DNS) service on this switch allows host names to be mapped to IP

Strona 96

Configuring Domain Name Service3-1473Web – Select DNS, General Configuration. Set the default domain name or list of domain names, specify one or more

Strona 97 - Configuring ACL Masks

Configuring the Switch3-1483Configuring Static DNS Host to Address EntriesYou can manually configure static entries in the DNS table that are used to

Strona 98 - Configuring an IP ACL Mask

Configuring Domain Name Service3-1493Web – Select DNS, Static Host Table. Enter a host name and one or more corresponding addresses, then click Apply.

Strona 99

Configuring the Switch3-1503Displaying the DNS CacheYou can display entries in the DNS cache that have been learned via the designated name servers.Fi

Strona 100 - Configuring a MAC ACL Mask

Configuring Domain Name Service3-1513CLI - This example displays all the resource records learned from the designated name servers.Console#show dns ca

Strona 101 - Access Control Lists

xvFiguresFigure 3-1. Home Page 3-2Figure 3-2. Front Panel Indicators 3-3Figure 3-3. System Information 3-9Figure 3-4. Switch Information 3-11Figur

Strona 102 - Port Configuration

Configuring the Switch3-1523

Strona 103

4-1Chapter 4: Command Line InterfaceThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceAccessing the C

Strona 104

Command Line Interface4-24To access the switch through a Telnet session, you must first set the IP address for the switch, and set the default gateway

Strona 105

Entering Commands4-34Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keywords and

Strona 106

Command Line Interface4-44Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for the curren

Strona 107 - Creating Trunk Groups

Entering Commands4-54Partial Keyword LookupIf you terminate a partial keyword with a question mark, alternatives that match the initial letters are pr

Strona 108

Command Line Interface4-64Understanding Command ModesThe command set is divided into Exec and Configuration classes. Exec commands generally display i

Strona 109

Entering Commands4-74Configuration CommandsConfiguration commands are privileged level commands used to modify switch settings. These commands modify

Strona 110

Command Line Interface4-84To enter the other modes, at the configuration prompt type one of the following commands. Use the exit or end command to ret

Strona 111 - Configuring LACP Parameters

Entering Commands4-94Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough

Strona 113

FiguresxviFigure 3-43. LACP - Aggregation Port 3-74Figure 3-44. LACP - Port Counters Information 3-76Figure 3-45. LACP - Port Internal Information

Strona 114 - Displaying LACP Port Counters

Command Line Interface4-104Command GroupsThe system commands can be broken down into the functional groups shown below.Table 4-4. Command Group Index

Strona 115

Line Commands4-114The access mode shown in the following tables is indicated by these abbreviations: NE (Normal Exec) IC (Interface Configuration) P

Strona 116

Command Line Interface4-124lineThis command identifies a specific line for configuration, and to process subsequent line configuration commands.Syntax

Strona 117

Line Commands4-134Command Usage • There are three authentication modes provided by the switch itself at login:- login selects authentication by a sing

Strona 118

Command Line Interface4-144number of times a user can enter an incorrect password before the system terminates the line connection and returns the ter

Strona 119

Line Commands4-154password-threshThis command sets the password intrusion threshold which limits the number of failed logon attempts. Use the no form

Strona 120 - Configuring Port Mirroring

Command Line Interface4-164Example To set the silent time to 60 seconds, enter this command:Related Commands password-thresh (4-15)databitsThis comman

Strona 121 - Configuring Rate Limits

Line Commands4-174parityThis command defines the generation of a parity bit. Use the no form to restore the default setting.Syntax parity {none | even

Strona 122 - Showing Port Statistics

Command Line Interface4-184Command Usage Set the speed to match the baud rate of the device connected to the serial port. Some baud rates available on

Strona 123

Line Commands4-194Command Usage Specifying session identifier “0” will disconnect the console connection. Specifying any other identifiers for an acti

Strona 124

FiguresxviiFigure 3-88. DNS General Configuration 3-147Figure 3-89. DNS Static Host Table 3-149Figure 3-90. DNS Cache 3-150

Strona 125

Command Line Interface4-204General CommandsenableThis command activates Privileged Exec mode. In privileged mode, additional commands are available, a

Strona 126 - Address Table Settings

General Commands4-214Example Related Commands disable (4-21)enable password (4-27)disableThis command returns to Normal Exec mode from privileged mode

Strona 127 - Displaying the Address Table

Command Line Interface4-224Related Commands end (4-23)show historyThis command shows the contents of the command history buffer.Default Setting NoneCo

Strona 128

General Commands4-234Command Mode Privileged ExecCommand Usage This command resets the entire system.Example This example shows how to reset the switc

Strona 129 - Changing the Aging Time

Command Line Interface4-244quitThis command exits the configuration program.Default Setting NoneCommand Mode Normal Exec, Privileged ExecCommand Usage

Strona 130 - Displaying Global Settings

System Management Commands4-254Device Designation CommandspromptThis command customizes the CLI prompt. Use the no form to restore the default prompt.

Strona 131

Command Line Interface4-264Example User Access CommandsThe basic commands required for management access are listed in this section. This switch also

Strona 132

System Management Commands4-274Command Mode Global ConfigurationCommand Usage The encrypted password is required for compatibility with legacy passwor

Strona 133 - Configuring Global Settings

Command Line Interface4-284Example Related Commandsenable (4-20)IP Filter CommandsmanagementThis command specifies the client IP addresses that are al

Strona 134

System Management Commands4-294• When entering addresses for the same group (i.e., SNMP, Web or Telnet), the switch will not accept overlapping addres

Strona 135

Figuresxviii

Strona 136

Command Line Interface4-304Web Server Commandsip http portThis command specifies the TCP port number used by the Web browser interface. Use the no for

Strona 137 - Displaying Interface Settings

System Management Commands4-314Example Related Commandsip http port (4-30)ip http secure-serverThis command enables the secure hypertext transfer prot

Strona 138

Command Line Interface4-324Example Related Commandsip http secure-port (4-32)copy tftp https-certificate (4-63)ip http secure-portThis command specifi

Strona 139

System Management Commands4-334Telnet Server Commandsip telnet portThis command specifies the TCP port number used by the Telnet interface. Use the no

Strona 140

Command Line Interface4-344Related Commandsip telnet port (4-33)Secure Shell CommandsThe Berkley-standard includes remote access tools originally desi

Strona 141

System Management Commands4-354The SSH server on this switch supports both password and public key authentication. If password authentication is speci

Strona 142

Command Line Interface4-364corresponding to the public keys stored on the switch can gain access. The following exchanges take place during this proce

Strona 143 - Settings,” page 3-99

System Management Commands4-374ip ssh timeoutUse this command to configure the timeout for the SSH server. Use the no form to restore the default sett

Strona 144

Command Line Interface4-384Example Related Commandsshow ip ssh (4-40)ip ssh server-key sizeUse this command to set the SSH server key size. Use the no

Strona 145

System Management Commands4-394Example ip ssh crypto host-key generateUse this command to generate the host key pair (i.e., public and private). Synta

Strona 146

1-1Chapter 1: IntroductionThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to conf

Strona 147 - Console(config-if)

Command Line Interface4-404Command Mode Privileged ExecCommand Usage • This command clears the host key from volatile memory (RAM). Use the no ip ssh

Strona 148 - VLAN Configuration

System Management Commands4-414Example show sshUse this command to display the current SSH server connections.Command Mode Privileged ExecExample Cons

Strona 149

Command Line Interface4-424show public-keyUse this command to show the public key for the specified user or for the host.Syntax show public-key [user

Strona 150

System Management Commands4-434Event Logging Commands logging onThis command controls logging of error messages, sending debug or error messages to sw

Strona 151

Command Line Interface4-444logging historyThis command limits syslog messages saved to switch memory based on severity. The no form returns the loggin

Strona 152 - Displaying Current VLANs

System Management Commands4-454logging hostThis command adds a syslog server host IP address that will receive logging messages. Use the no form to re

Strona 153 - Creating VLANs

Command Line Interface4-464logging trapThis command enables the logging of system messages to a remote server, or limits the syslog messages saved to

Strona 154

System Management Commands4-474Related Commandsshow logging (4-47)show loggingThis command displays the logging configuration, along with any system a

Strona 155

Command Line Interface4-484The following example displays settings for the trap function. Related Commandsshow logging sendmail (4-51)SMTP Alert Comma

Strona 156

System Management Commands4-494logging sendmail hostThis command specifies SMTP servers that will be sent alert messages. Use the no form to remove an

Strona 157

Introduction1-21Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Flow control eliminates t

Strona 158

Command Line Interface4-504Command Usage The specified level indicates an event threshold. All events at this level or higher will be sent to the conf

Strona 159 - Configuring Private VLANs

System Management Commands4-514Command Usage You can specify up to five recipients for alert messages. However, you must enter a separate command to s

Strona 160 - Console(config)#

Command Line Interface4-524Time CommandsThe system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP), or by using

Strona 161 - Mapping Protocols to VLANs

System Management Commands4-534Example Related Commandssntp server (4-53)sntp poll (4-54)show sntp (4-54)sntp serverThis command sets the IP address o

Strona 162

Command Line Interface4-544sntp pollThis command sets the interval between sending time requests when the switch is set to SNTP client mode. Use the n

Strona 163 - Layer 2 Queue Settings

System Management Commands4-554clock timezoneThis command sets the time zone for the switch’s internal clock.Syntax clock timezone name hour hours min

Strona 164

Command Line Interface4-564Default Setting NoneCommand Mode Privileged ExecExample This example shows how to set the system clock to 15:12:34, Februar

Strona 165 - Priority

System Management Commands4-574System Status Commandsshow startup-configThis command displays the configuration file stored in non-volatile memory tha

Strona 166

Command Line Interface4-584Example Related Commandsshow running-config (4-58)show running-configThis command displays the configuration information c

Strona 167 - Selecting the Queue Mode

System Management Commands4-594- VLAN configuration settings for each interface- Multiple spanning tree instances (name and interfaces)- IP address co

Strona 168

Description of Software Features1-31Port Mirroring – The switch can unobtrusively mirror traffic from any port to a monitor port. You can then attach

Strona 169 - Layer 3/4 Priority Settings

Command Line Interface4-604Related Commandsshow startup-config (4-57)show systemThis command displays system information.Default Setting NoneCommand M

Strona 170 - Mapping IP Precedence

System Management Commands4-614show usersShows all active console and Telnet sessions, including user name, idle time, and IP address of Telnet client

Strona 171 - Mapping DSCP Priority

Command Line Interface4-624Example Frame Size Commandsjumbo frameThis command enables support for jumbo frames. Use the no form to disable it.Syntax [

Strona 172

Flash/File Commands4-634Example Flash/File CommandsThese commands are used to manage the system code or configuration files.copy This command moves

Strona 173 - Mapping IP Port Priority

Command Line Interface4-644Command Mode Privileged ExecCommand Usage • The system prompts for data required to complete the copy command. • The destin

Strona 174 - Mapping CoS Values to ACLs

Flash/File Commands4-654The following example shows how to download a configuration file: This example shows how to copy a secure-site certificate fro

Strona 175 - Console(config-if)#

Command Line Interface4-664Command Usage • If the file type is used for system startup, then this file cannot be deleted. • “Factory_Default_Config.cf

Strona 176

Flash/File Commands4-674Example The following example shows how to display all file information:whichbootThis command displays which files were booted

Strona 177 - Multicast

Command Line Interface4-684Default Setting NoneCommand Mode Global ConfigurationCommand Usage • A colon (:) is required after the specified file type.

Strona 178

Authentication Commands4-694Authentication Sequenceauthentication loginThis command defines the login authentication method and precedence. Use the no

Strona 179 - Multicast Filtering

Introduction1-41Multiple Spanning Tree Protocol (MSTP, IEEE 802.1s) – This protocol is a direct extension of RSTP. It can provide an independent spann

Strona 180

Command Line Interface4-704authentication enableThis command defines the authentication method and precedence to use when changing from Exec command m

Strona 181

Authentication Commands4-714RADIUS ClientRemote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software run

Strona 182

Command Line Interface4-724Default Setting 1812Command Mode Global ConfigurationExample radius-server keyThis command sets the RADIUS encryption key.

Strona 183

Authentication Commands4-734Example radius-server timeoutThis command sets the interval between transmitting authentication requests to the RADIUS ser

Strona 184

Command Line Interface4-744TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that uses softw

Strona 185

Authentication Commands4-754Command Mode Global ConfigurationExample tacacs-server keyThis command sets the TACACS+ encryption key. Use the no form to

Strona 186

Command Line Interface4-764Port Security CommandsThese commands can be used to enable port security on a port. When using port security, the switch st

Strona 187

Authentication Commands4-774Command Usage • If you enable port security, the switch stops learning new MAC addresses on the specified port when it has

Strona 188 - Displaying the DNS Cache

Command Line Interface4-784802.1x Port AuthenticationThe switch supports IEEE 802.1x (dot1x) port-based access control that prevents unauthorized acce

Strona 189

Authentication Commands4-794dot1x defaultThis command sets all configurable dot1x global and port settings to their default values.Syntaxdot1x default

Strona 190

System Defaults1-51System DefaultsThe switch’s system defaults are provided in the configuration file “Factory_Default_Config.cfg.” To reset the switc

Strona 191 - Telnet Connection

Command Line Interface4-804dot1x port-controlThis command sets the dot1x mode on a port interface. Use the no form to restore the default.Syntaxdot1x

Strona 192 - Command Line Interface

Authentication Commands4-814Command Usage • The “max-count” parameter specified by this command is only effective if the dot1x mode is set to “auto” b

Strona 193 - Entering Commands

Command Line Interface4-824dot1x timeout quiet-periodThis command sets the time that a switch port waits after the Max Request Count has been exceeded

Strona 194 - Showing Commands

Authentication Commands4-834dot1x timeout tx-periodThis command sets the time that the switch waits during an authentication session before re-transmi

Strona 195 - Using Command History

Command Line Interface4-844(page 4-79). It also displays the following global parameters which are set to a fixed value, including the following items

Strona 196 - Exec Commands

Authentication Commands4-854ExampleConsole#show dot1xGlobal 802.1X Parameters reauth-enabled: yes reauth-period: 3600 quiet-period: 60 tx-period:

Strona 197 - Configuration Commands

Command Line Interface4-864Access Control List CommandsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol,

Strona 198

Access Control List Commands4-8743. User-defined rules in the Ingress MAC ACL for ingress ports.4. User-defined rules in the Ingress IP ACL for ingres

Strona 199 - Command Line Processing

Command Line Interface4-884access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. Use the

Strona 200 - Command Groups

Access Control List Commands4-894permit, deny (Standard ACL) This command adds a rule to a Standard IP ACL. The rule sets a filter condition for packe

Strona 201 - Line Commands

Introduction1-61Port Configuration Admin Status EnabledAuto-negotiation EnabledFlow Control DisabledPort Capability 1000BASE-T –10 Mbps half duplex10

Strona 202

Command Line Interface4-904permit, deny (Extended ACL) This command adds a rule to an Extended IP ACL. The rule sets a filter condition for packets wi

Strona 203

Access Control List Commands4-914Command Usage• All new rules are appended to the end of the list.• Address bitmasks are similar to a subnet mask, con

Strona 204

Command Line Interface4-924Related Commandsaccess-list ip (4-88)show ip access-list This command displays the rules for configured IP ACLs.Syntaxshow

Strona 205

Access Control List Commands4-934Command Usage• A mask can only be used by all ingress ACLs or all egress ACLs.• The precedence of the ACL rules appli

Strona 206

Command Line Interface4-944Command ModeIP MaskCommand Usage• Packets crossing a port are checked against all the rules in the ACL until a match is fou

Strona 207

Access Control List Commands4-954This shows how to create a standard ACL with an ingress mask to deny access to the IP host 171.69.198.102, and permit

Strona 208

Command Line Interface4-964This is a more comprehensive example. It denies any TCP packets in which the SYN bit is ON, and permits all other packets.

Strona 209

Access Control List Commands4-974Related Commandsmask (IP ACL) (4-93)ip access-group This command binds a port to an IP ACL. Use the no form to remove

Strona 210 - General Commands

Command Line Interface4-984Related Commandsip access-group (4-97)map access-list ip This command sets the output queue for packets matching an ACL rul

Strona 211

Access Control List Commands4-994show map access-list ip This command shows the CoS value mapped to an IP ACL for the current interface. (The CoS valu

Strona 212

System Defaults1-71IP Settings IP Address 0.0.0.0Subnet Mask 255.0.0.0Default Gateway 0.0.0.0DHCP Client: EnabledBOOTP DisabledDNS Server Lookup Disa

Strona 213

Command Line Interface4-1004Command Usage• You must configure an ACL mask before you can change frame priorities based on an ACL rule.• Traffic priori

Strona 214 - System Management Commands

Access Control List Commands4-1014MAC ACLs access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form

Strona 215 - Device Designation Commands

Command Line Interface4-1024Example Related Commandspermit, deny 4-102mac access-group (4-107)show mac access-list (4-103)permit, deny (MAC ACL)This c

Strona 216 - User Access Commands

Access Control List Commands4-1034• destination – Destination MAC address range with bitmask.• address-bitmask* – Bitmask for MAC address (in hexideci

Strona 217

Command Line Interface4-1044Example Related Commandspermit, deny 4-102mac access-group (4-107)access-list mac mask-precedence This command changes to

Strona 218 - IP Filter Commands

Access Control List Commands4-1054mask (MAC ACL)This command defines a mask for MAC ACLs. This mask defines the fields to check in the packet header.

Strona 219

Command Line Interface4-1064ExampleThis example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of the r

Strona 220 - Web Server Commands

Access Control List Commands4-1074show access-list mac mask-precedence This command shows the ingress or egress rule masks for MAC ACLs.Syntaxshow acc

Strona 221

Command Line Interface4-1084Related Commandsshow mac access-list (4-103)show mac access-groupThis command shows the ports assigned to MAC ACLs.Command

Strona 222

Access Control List Commands4-1094Example Related Commandsqueue cos-map (4-194)show map access-list mac (4-109) show map access-list mac This command

Strona 223 - Telnet Server Commands

Installation GuideES4512C 12-Port Gigabit Intelligent SwitchLayer 2 Workgroup Switchwith 12 1000BASE-T (RJ-45) Ports,and 4 Combination (RJ-45/SFP) Por

Strona 225

Command Line Interface4-1104match access-list mac This command changes the IEEE 802.1p priority of a Layer 2 frame matching the defined ACL rule. (Thi

Strona 226

Access Control List Commands4-1114ACL Informationshow access-listThis command shows all ACLs and associated rules, as well as all the user-defined mas

Strona 227

Command Line Interface4-1124SNMP CommandsControls access to this switch from management stations using the Simple Network Management Protocol (SNMP),

Strona 228

SNMP Commands4-1134Example snmp-server contactThis command sets the system contact string. Use the no form to remove the system contact information.Sy

Strona 229

Command Line Interface4-1144Related Commandssnmp-server contact (4-113)snmp-server host This command specifies the recipient of a Simple Network Manag

Strona 230

SNMP Commands4-1154Related Commandssnmp-server enable traps (4-115)snmp-server enable trapsThis command enables this device to send Simple Network Man

Strona 231

Command Line Interface4-1164Command Usage This command provides information on the community access strings, counter information for SNMP input and ou

Strona 232

DNS Commands4-1174DNS CommandsThese commands are used to configure Domain Naming System (DNS) services. You can manually configure entries in the DNS

Strona 233 - Event Logging Commands

Command Line Interface4-1184Command Usage Servers or other network devices may support one or more connections via multiple IP addresses. If more than

Strona 234

DNS Commands4-1194Default Setting NoneCommand Mode Global ConfigurationExampleRelated Commands ip domain-list (4-119)ip name-server (4-120)ip domain-l

Strona 235

2-1Chapter 2: Initial ConfigurationConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent off

Strona 236

Command Line Interface4-1204ExampleThis example adds two domain names to the current list and then displays the list.Related Commands ip domain-name (

Strona 237

DNS Commands4-1214ExampleThis example adds two domain-name servers to the list and then displays the list.Related Commands ip domain-name (4-118)ip do

Strona 238 - SMTP Alert Commands

Command Line Interface4-1224ExampleThis example enables DNS and then displays the configuration.Related Commands ip domain-name (4-118)ip name-server

Strona 239

DNS Commands4-1234show dnsThis command displays the configuration of the DNS server.Command Mode Privileged ExecExampleshow dns cacheThis command disp

Strona 240

Command Line Interface4-1244clear dns cacheThis command clears all entries in the DNS cache.Command Mode Privileged ExecExampleConsole#clear dns cache

Strona 241

Interface Commands4-1254Interface CommandsThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or

Strona 242 - Time Commands

Command Line Interface4-1264Command Mode Global Configuration Example To specify port 24, enter the following command:descriptionThis command adds a d

Strona 243

Interface Commands4-1274Default Setting • Auto-negotiation is enabled by default. • When auto-negotiation is disabled, the default speed-duplex settin

Strona 244

Command Line Interface4-1284• If autonegotiation is disabled, auto-MDI/MDI-X pin signal configuration will also be disabled for the RJ-45 ports.Exampl

Strona 245

Interface Commands4-1294Example The following example configures Ethernet port 5 capabilities to 100half, 100full and flow control.Related Commands ne

Strona 246

Initial Configuration2-22• Enable port mirroring• Set broadcast storm control on any port• Display system information and statistics Required Connecti

Strona 247 - System Status Commands

Command Line Interface4-1304ExampleThe following example enables flow control on port 5.Related Commands negotiation (4-127)capabilities (flowcontrol,

Strona 248

Interface Commands4-1314Default Setting All interfaces are enabled.Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage This com

Strona 249

Command Line Interface4-1324Example The following shows how to configure broadcast storm control at 600 packets per second: clear countersThis command

Strona 250

Interface Commands4-1334show interfaces statusThis command displays the status for an interface.Syntax show interfaces status [interface]interface • e

Strona 251

Command Line Interface4-1344show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]interface •

Strona 252 - Frame Size Commands

Interface Commands4-1354show interfaces switchportThis command displays the administrative and operational status of the specified interfaces.Syntax s

Strona 253 - Flash/File Commands

Command Line Interface4-1364Mirror Port CommandsThis section describes how to mirror traffic from a source port to a target port. port monitorThis com

Strona 254

Mirror Port Commands4-1374Command Usage • You can mirror traffic from any source port to a destination port for real-time analysis. You can then attac

Strona 255

Command Line Interface4-1384Example The following shows mirroring configured from port 6 to port 11:Rate Limit CommandsThis function allows the networ

Strona 256

Link Aggregation Commands4-1394ExampleLink Aggregation CommandsPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the ba

Strona 257

Basic Configuration2-32Remote ConnectionsPrior to accessing the switch’s onboard agent via a network connection, you must first configure it with a va

Strona 258 - Authentication Commands

Command Line Interface4-1404• All the ports in a trunk have to be treated as a whole when moved from/to, added or deleted from a VLAN via the specifie

Strona 259 - Authentication Sequence

Link Aggregation Commands4-1414lacpThis command enables 802.3ad Link Aggregation Control Protocol (LACP) for the current interface. Use the no form to

Strona 260

Command Line Interface4-1424lacp system-priorityThis command configures a port's LACP system priority. Use the no form to restore the default set

Strona 261 - RADIUS Client

Link Aggregation Commands4-1434lacp admin-key (Ethernet Interface)This command configures a port's LACP administration key. Use the no form to re

Strona 262

Command Line Interface4-1444lacp admin-key (Port Channel)This command configures a port channel's LACP administration key string. Use the no form

Strona 263

Link Aggregation Commands4-1454Command Mode Interface Configuration (Ethernet)Command Usage • Setting a lower value indicates a higher effective prior

Strona 264 - TACACS+ Client

Command Line Interface4-1464ExampleConsole#show lacp 1 countersChannel group : 1 ---------------------------------------------------------------------

Strona 265

Link Aggregation Commands4-1474Console#show lacp 1 internalChannel group : 1-------------------------------------------------------------------------O

Strona 266 - Port Security Commands

Command Line Interface4-1484 Console#show lacp 1 neighborsChannel group 1 neighbors-------------------------------------------------------------------

Strona 267

Address Table Commands4-1494Address Table CommandsThese commands are used to configure the address table for filtering specified addresses, displaying

Strona 268 - 802.1x Port Authentication

Initial Configuration2-42Setting PasswordsNote: If this is your first time to log into the CLI program, you should define new passwords for both defau

Strona 269

Command Line Interface4-1504mac-address-table staticThis command maps a static address to a destination port in a VLAN. Use the no form to remove an a

Strona 270

Address Table Commands4-1514clear mac-address-table dynamicThis command removes any learned entries from the forwarding database and clears the transm

Strona 271

Command Line Interface4-152400-00-00-00-00-00 means an exact match, and a mask of FF-FF-FF-FF-FF-FF means “any.”• The maximum number of address entrie

Strona 272

Spanning Tree Commands4-1534Spanning Tree CommandsThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the swi

Strona 273

Command Line Interface4-1544spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Synta

Strona 274

Spanning Tree Commands4-1554Command Usage • Spanning Tree ProtocolUses RSTP for the internal state machine, but sends only 802.1D BPDUs. - This create

Strona 275

Command Line Interface4-1564Default Setting 15 secondsCommand Mode Global ConfigurationCommand Usage This command sets the maximum time (in seconds) t

Strona 276 - Access Control List Commands

Spanning Tree Commands4-1574spanning-tree max-ageThis command configures the spanning tree bridge maximum age globally for this switch. Use the no for

Strona 277 - IP ACLs

Command Line Interface4-1584Command Mode Global ConfigurationCommand Usage Bridge priority is used in selecting the root device, root port, and design

Strona 278

Spanning Tree Commands4-1594spanning-tree transmission-limitThis command configures the minimum interval between the transmission of consecutive RSTP/

Strona 279

Basic Configuration2-52Before you can assign an IP address to the switch, you must obtain the following information from your network administrator:•

Strona 280

Command Line Interface4-1604mst vlanThis command adds VLANs to a spanning tree instance. Use the no form to remove the specified VLANs. Using the no f

Strona 281

Spanning Tree Commands4-1614mst priorityThis command configures the priority of a spanning tree instance. Use the no form to restore the default.Synta

Strona 282

Command Line Interface4-1624Command Usage The MST region name and revision number (page 4-162) are used to designate a unique MST region. A bridge (i.

Strona 283

Spanning Tree Commands4-1634max-hopsThis command configures the maximum number of hops in the region before a BPDU is discarded. Use the no form to re

Strona 284

Command Line Interface4-1644spanning-tree costThis command configures the spanning tree path cost for the specified interface. Use the no form to rest

Strona 285

Spanning Tree Commands4-1654Default Setting 128Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • This command defines the p

Strona 286

Command Line Interface4-1664Example Related Commandsspanning-tree portfast (4-166)spanning-tree portfastThis command sets an interface to fast forward

Strona 287

Spanning Tree Commands4-1674spanning-tree link-typeThis command configures the link type for Rapid Spanning Tree and Multiple Spanning Tree. Use the n

Strona 288

Command Line Interface4-1684Default Setting • Ethernet – half duplex: 2,000,000; full duplex: 1,000,000; trunk: 500,000• Fast Ethernet – half duplex:

Strona 289

Spanning Tree Commands4-1694interface with the highest priority (that is, lowest value) will be configured as an active link in the spanning tree. • W

Strona 290

Initial Configuration2-625. Wait a few minutes, and then check the IP configuration settings by typing the “show ip interface” command. Press <Ente

Strona 291 - MAC ACLs

Command Line Interface4-1704show spanning-treeThis command shows the configuration for the common spanning tree (CST) or for an instance within the mu

Strona 292

Spanning Tree Commands4-1714ExampleConsole#show spanning-treeSpanning-tree information---------------------------------------------------------------

Strona 293

Command Line Interface4-1724show spanning-tree mst configurationThis command shows the configuration of the multiple spanning tree.Syntax show spannin

Strona 294

VLAN Commands4-1734Editing VLAN Groupsvlan databaseThis command enters VLAN database mode. All commands in this mode will take effect immediately.Defa

Strona 295

Command Line Interface4-1744vlanThis command configures a VLAN. Use the no form to restore the default settings or delete a VLAN.Syntax vlan vlan-id [

Strona 296

VLAN Commands4-1754Configuring VLAN Interfacesinterface vlanThis command enters interface configuration mode for VLANs, which is used to configure VLA

Strona 297

Command Line Interface4-1764switchport modeThis command configures the VLAN membership mode for a port. Use the no form to restore the default.Syntax

Strona 298

VLAN Commands4-1774Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage When set to receive all frame types, any received frames

Strona 299

Command Line Interface4-1784Example The following example shows how to set the interface to port 1 and then enable ingress filtering:switchport native

Strona 300

VLAN Commands4-1794switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the default.Syntax

Strona 301 - ACL Information

Basic Configuration2-72To configure a community string, complete the following steps:1. From the Privileged Exec level global configuration mode promp

Strona 302 - SNMP Commands

Command Line Interface4-1804switchport forbidden vlanThis command configures forbidden VLANs. Use the no form to remove the list of forbidden VLANs.Sy

Strona 303

VLAN Commands4-1814Displaying VLAN Informationshow vlanThis command shows VLAN information.Syntax show vlan [id vlan-id | name vlan-name]• id - Keywor

Strona 304

Command Line Interface4-1824Configuring Private VLANsPrivate VLANs provide port-based security and isolation between ports within the assigned VLAN. T

Strona 305

VLAN Commands4-1834show pvlanThis command displays the configured private VLAN.Command Mode Privileged ExecExampleConfiguring Protocol-based VLANsThe

Strona 306

Command Line Interface4-1844protocol-vlan protocol-group (Configuring Groups)This command creates a protocol group, or to add specific protocols to a

Strona 307 - DNS Commands

VLAN Commands4-1854Command Usage • When creating a protocol-based VLAN, only assign interfaces via this command. If you assign interfaces using any of

Strona 308

Command Line Interface4-1864show interfaces protocol-vlan protocol-groupThis command shows the mapping from protocol groups to VLANs for the selected

Strona 309

GVRP and Bridge Extension Commands4-1874GVRP and Bridge Extension CommandsGARP VLAN Registration Protocol defines a way for switches to exchange VLAN

Strona 310

Command Line Interface4-1884show bridge-extThis command shows the configuration for bridge extension commands.Default Setting NoneCommand Mode Privile

Strona 311

GVRP and Bridge Extension Commands4-1894show gvrp configurationThis command shows if GVRP is enabled.Syntax show gvrp configuration [interface]interfa

Strona 312

Initial Configuration2-822. Enter the name of the start-up file. Press <Enter>.Managing System FilesThe switch’s flash memory supports three typ

Strona 313

Command Line Interface4-1904Command Usage • Group Address Registration Protocol is used by GVRP and GMRP to register or deregister client attributes f

Strona 314

Priority Commands4-1914Related Commandsgarp timer (4-189)Priority CommandsThe commands described in this section allow you to specify which data packe

Strona 315 - Interface Commands

Command Line Interface4-1924queue modeThis command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for the class of service (CoS)

Strona 316

Priority Commands4-1934switchport priority defaultThis command sets a priority for incoming untagged frames. Use the no form to restore the default va

Strona 317

Command Line Interface4-1944queue bandwidth This command assigns weighted round-robin (WRR) weights to the eight class of service (CoS) priority queue

Strona 318

Priority Commands4-1954Default Setting This switch supports Class of Service by using eight priority queues, with Weighted Round Robin queuing for eac

Strona 319

Command Line Interface4-1964Example show queue bandwidthThis command displays the weighted round-robin (WRR) bandwidth allocation for the eight priori

Strona 320

Priority Commands4-1974Example Priority Commands (Layer 3 and 4) map ip port (Global Configuration)This command enables IP port mapping (i.e., class o

Strona 321

Command Line Interface4-1984Example The following example shows how to enable TCP/UDP port mapping globally:map ip port (Interface Configuration)This

Strona 322

Priority Commands4-1994Command Usage • The precedence for priority mapping is IP Port, IP Precedence or IP DSCP, and default switchport priority. • IP

Strona 323

3-1Chapter 3: Configuring the SwitchUsing the Web InterfaceThis switch provides an embedded HTTP Web agent. Using a Web browser you can configure the

Strona 324

Command Line Interface4-2004map ip dscp (Global Configuration)This command enables IP DSCP mapping (i.e., Differentiated Services Code Point mapping).

Strona 325

Priority Commands4-2014Default Setting The DSCP default values are defined in the following table. Note that all the DSCP values that are not specifie

Strona 326 - Mirror Port Commands

Command Line Interface4-2024Default Setting NoneCommand ModePrivileged ExecExample The following shows that HTTP traffic has been mapped to CoS value

Strona 327

Priority Commands4-2034Example Related Commands map ip port (Global Configuration) (4-197)map ip precedence (Interface Configuration) (4-199) show map

Strona 328 - Rate Limit Commands

Command Line Interface4-2044Example Related Commands map ip dscp (Global Configuration) (4-200)map ip dscp (Interface Configuration) (4-200)Multicast

Strona 329 - Link Aggregation Commands

Multicast Filtering Commands4-2054ip igmp snoopingThis command enables IGMP snooping on this switch. Use the no form to disable it.Syntax [no] ip igmp

Strona 330

Command Line Interface4-2064ip igmp snooping versionThis command configures the IGMP snooping version. Use the no form to restore the default.Syntax i

Strona 331

Multicast Filtering Commands4-2074Example The following shows the current IGMP snooping configuration:show mac-address-table multicast This command sh

Strona 332

Command Line Interface4-2084IGMP Query Commands (Layer 2) ip igmp snooping querierThis command enables the switch as an IGMP querier. Use the no form

Strona 333

Multicast Filtering Commands4-2094Default Setting 2 timesCommand Mode Global ConfigurationCommand Usage The query count defines how long the querier w

Strona 334

ES4512CES4524CES4548CE052005-R02

Strona 335

Configuring the Switch3-23Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and password. The a

Strona 336

Command Line Interface4-2104ip igmp snooping query-max-response-timeThis command configures the query report delay. Use the no form to restore the def

Strona 337

Multicast Filtering Commands4-2114Default Setting 300 secondsCommand Mode Global ConfigurationCommand Usage The switch must use IGMPv2 for this comman

Strona 338

Command Line Interface4-2124Command Usage Depending on your network connections, IGMP snooping may not always be able to locate the IGMP querier. Ther

Strona 339 - Address Table Commands

IP Interface Commands4-2134IP Interface CommandsAn IP addresses may be used for management access to the switch over your network. The IP address for

Strona 340

Command Line Interface4-2144• If you select the bootp or dhcp option, IP is enabled but will not function until a BOOTP or DHCP reply has been receive

Strona 341

IP Interface Commands4-2154Related Commands ip address (4-213)ip default-gatewayThis command establishes a static route between this switch and manag

Strona 342

Command Line Interface4-2164Related Commands show ip redirects (4-216)show ip redirectsThis command shows the default gateway configured for this devi

Strona 343 - Spanning Tree Commands

IP Interface Commands4-2174- Network or host unreachable - The gateway found no corresponding entry in the route table. • Press <Esc> to stop pi

Strona 344 -

Command Line Interface4-2184

Strona 345

A-1Appendix A: Software SpecificationsSoftware FeaturesAuthenticationLocal, RADIUS, TACACS, Port (802.1x), HTTPS, SSH, Port SecurityAccess Control Lis

Strona 346

Navigating the Web Browser Interface3-33Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration chang

Strona 347

Software SpecificationsA-2AAdditional FeaturesBOOTP clientSNTP (Simple Network Time Protocol)SNMP (Simple Network Management Protocol)RMON (Remote Mon

Strona 348

Management Information BasesA-3ARMON (RFC 1757 groups 1,2,3,9)SNMP (RFC 1157)SNMPv2 (RFC 1907)SNTP (RFC 2030)SSH (Version 2.0)TFTP (RFC 1350)Managemen

Strona 349

Software SpecificationsA-4A

Strona 350

B-1Appendix B: TroubleshootingProblems Accessing the Management Interface Table B-1 Troubleshooting ChartSymptom ActionCannot connect using Telnet,

Strona 351

TroubleshootingB-2BUsing System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually caus

Strona 352

Glossary-1GlossaryAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Strona 353

GlossaryGlossary-2GARP VLAN Registration Protocol (GVRP)Defines a way for switches to exchange VLAN information in order to register necessary VLAN me

Strona 354

Glossary-3GlossaryIEEE 802.3xDefines Ethernet frame start/stop requests and timers used for flow control on full-duplex links.IGMP SnoopingListening t

Strona 355

GlossaryGlossary-4Management Information Base (MIB)An acronym for Management Information Base. It is a set of database objects that contains informati

Strona 356

Glossary-5GlossaryRapid Spanning Tree Protocol (RSTP)RSTP reduces the convergence time for network topology changes to about 10% of that required by t

Strona 357

Configuring the Switch3-43Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, o

Strona 358

GlossaryGlossary-6User Datagram Protocol (UDP)UDP provides a datagram mode for packet-switched communications. It uses IP as the underlying transport

Strona 359

Index-1Symbols3-31Numerics802.1x, port authentication 3-43, 4-78Aacceptable frame type 3-119, 4-174Access Control List See ACLACLExtended IP 3-53, 4-

Strona 360

Index-2IndexHhardware version, displaying 3-10, 4-61HTTPS 3-34, 4-31HTTPS, secure server 3-34, 4-31IIEEE 802.1D 3-91, 4-152IEEE 802.1s 4-152IEEE 802.1

Strona 361

Index-3IndexQqueue weights 3-129, 4-192RRADIUS, logon authentication 3-31, 4-71rate limits, setting 3-83, 4-136restarting the system 3-25, 4-22RSTP 3-

Strona 362 - VLAN Commands

Index-4IndexWWeb interfaceaccess requirements 3-1configuration buttons 3-3home page 3-2menu list 3-3, 3-4panel display 3-3

Strona 364

ES4512CES4524CES4548CE052005-R02

Strona 365 - Configuring VLAN Interfaces

Navigating the Web Browser Interface3-53 802.1x Port authentication 3-43Information Displays global configuration settings 3-44Configuration Configu

Strona 366

Configuring the Switch3-63Address Table 3-88Static Addresses Displays entries for interface, address or VLAN 3-88Dynamic Addresses Displays or edits

Strona 367

Navigating the Web Browser Interface3-73Protocol VLAN 3-123Configuration Creates a protocol group, specifying the supported protocols 3-123Port Confi

Strona 368

Configuring the Switch3-83DNS 3-146General Configuration Enables DNS; configures domain name and domain list; and specifies IP address of name servers

Strona 369

Basic Configuration3-93Basic ConfigurationDisplaying System InformationYou can easily identify the system by displaying the device name, location and

Strona 370

Configuring the Switch3-103CLI – Specify the hostname, location and contact information.Displaying Switch Hardware/Software Versions Use the Switch In

Strona 371 - Displaying VLAN Information

Basic Configuration3-113• Redundant Power Status* – Displays the status of the redundant power supply.* CLI only.Management Software• Loader Version –

Strona 372

iContents Chapter 1: Introduction 1-1Key Features 1-1Description of Software Features 1-2System Defaults 1-5Chapter 2: Initial Configuration 2-1

Strona 373

Configuring the Switch3-123Displaying Bridge Extension CapabilitiesThe Bridge MIB includes extensions for managed devices that support Multicast Filte

Strona 374

Basic Configuration3-133CLI – Enter the following command. Setting the Switch’s IP Address This section describes how to configure an IP interface for

Strona 375

Configuring the Switch3-143Manual ConfigurationWeb – Click System, IP Configuration. Select the VLAN through which the management station is attached,

Strona 376

Basic Configuration3-153Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the switch to be dynamically configured by th

Strona 377

Configuring the Switch3-163CLI – Enter the following command to restart DHCP service.Managing FirmwareYou can upload/download firmware to or from a TF

Strona 378

Basic Configuration3-173If you download to a new destination file, then select the file from the drop-down box for the operation code used at startup,

Strona 379 - Console#

Configuring the Switch3-183Downloading Configuration Settings from a ServerYou can download the configuration file under a new file name and then set

Strona 380

Basic Configuration3-193If you download the startup configuration file under a new file name, you can set this file as the startup file at a later tim

Strona 381 - Priority Commands

Configuring the Switch3-203• RAM Level – Limits log messages saved to the switch’s temporary RAM memory for all levels up to the specified level. For

Strona 382

Basic Configuration3-213• Logging Trap – Limits log messages that are sent to the remote syslog server for all levels up to the specified level. For e

Strona 383

ContentsiiSystem Log Configuration 3-19Remote Log Configuration 3-20Displaying Log Messages 3-22Sending Simple Mail Transfer Protocol Alerts 3-23R

Strona 384

Configuring the Switch3-223CLI – Enter the syslog server host IP address, choose the facility type and set the logging trap.Displaying Log MessagesUse

Strona 385

Basic Configuration3-233CLI – This example shows that system logging is enabled, the message level for flash memory is “errors” (i.e., default level 3

Strona 386

Configuring the Switch3-243Web – Click System, Log, SMTP. Enable SMTP, specify a source email address, and select the minimum severity level. To add a

Strona 387

Basic Configuration3-253CLI – Enter the IP address of at least one SMTP server, set the syslog severity level to trigger an email message, and specify

Strona 388

Configuring the Switch3-263Setting the System ClockSimple Network Time Protocol (SNTP) allows the switch to set its internal clock based on periodic u

Strona 389

Basic Configuration3-273CLI – This example configures the switch to operate as an SNTP client and then displays the current time and settings.Setting

Strona 390

Configuring the Switch3-283CLI - This example shows how to set the time zone for the system clock.Simple Network Management Protocol Simple Network Ma

Strona 391

Simple Network Management Protocol3-293Web – Click SNMP, Configuration. Add new community strings as required, select the access rights from the Acces

Strona 392

Configuring the Switch3-303Web – Click SNMP, Configuration. Fill in the IP address and community string for each trap manager that will receive these

Strona 393

User Authentication3-313Command Attributes• User Name* – The name of the user. (Maximum length: 8 characters)• Access Level* – Specifies the user leve

Strona 394 - Multicast Filtering Commands

ContentsiiiDisplaying LACP Settings and Status for the Local Side 3-77Displaying LACP Settings and Status for the Remote Side 3-79Setting Broadcast

Strona 395

Configuring the Switch3-323RADIUS uses UDP while TACACS+ uses TCP. UDP only offers best effort delivery, while TCP offers a connection-oriented transp

Strona 396

User Authentication3-333Note: The local switch user database has to be set up by manually entering user names and passwords using the CLI. (See “usern

Strona 397

Configuring the Switch3-343CLI – Specify all the required parameters to enable logon authentication.Configuring HTTPSYou can configure the switch to e

Strona 398

User Authentication3-353• The following web browsers and operating systems currently support HTTPS:• To specify a secure-site certificate, see “Replac

Strona 399

Configuring the Switch3-363Caution: For maximum security, we recommend you obtain a unique Secure Sockets Layer certificate at the earliest opportunit

Strona 400

User Authentication3-373To use the SSH server, complete these steps:1. Generate a Host Key Pair – On the SSH Host Key Settings page, create a host pub

Strona 401

Configuring the Switch3-383e. The switch compares the decrypted bytes to the original bytes it sent. If the two sets match, this means that the client

Strona 402

User Authentication3-393Web – Click Security, SSH Host-Key Settings. Select the host-key type from the drop-down box, select the option to save the ho

Strona 403 - IP Interface Commands

Configuring the Switch3-403Configuring the SSH ServerThe SSH server includes basic settings for authentication. Field Attributes• SSH Server Status –

Strona 404

User Authentication3-413CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that the

Strona 405

ContentsivMapping CoS Values to ACLs 3-136Changing Priorities Based on ACL Rules 3-137Multicast Filtering 3-139Layer 2 IGMP (Snooping and Query)

Strona 406

Configuring the Switch3-423• If a port is disabled (shut down) due to a security violation, it must be manually re-enabled from the Port/Port Configur

Strona 407

User Authentication3-433CLI – This example selects the target port, sets the port security action to send a trap and disable the port, specifies a max

Strona 408

Configuring the Switch3-443The operation of 802.1x on the switch requires the following:• The switch must have an IP address assigned.• RADIUS authent

Strona 409 - Software Features

User Authentication3-453Web – Click Security, 802.1x, Information.Figure 3-26. 802.1x InformationCLI – This example shows the default protocol settin

Strona 410 - Standards

Configuring the Switch3-463Configuring 802.1x Global SettingsThe dot1x protocol includes global parameters that control the client authentication proc

Strona 411 - Management Information Bases

User Authentication3-473Web – Select Security, 802.1x, Configuration. Enable dot1x globally for the switch, modify any of the parameters required, and

Strona 412 - Software Specifications

Configuring the Switch3-483• Authorized – - Yes – Connected client is authorized.- No – Connected client is not authorized.- Blank – Displays nothing

Strona 413 - Appendix B: Troubleshooting

User Authentication3-493Web – Select Security, 802.1x, Statistics. Select the required port and then click Query. Click Refresh to update the statisti

Strona 414 - Using System Logs

Configuring the Switch3-503CLI – This example displays the 802.1x statistics for port 4.Filtering IP Addresses for Management AccessYou can create a l

Strona 415 - Glossary

User Authentication3-513Web – Click Security, IP Filter. Enter the addresses that are allowed management access to an interface, and click Add IP Filt

Strona 416

Contentsvdisconnect 4-18show line 4-19General Commands 4-20enable 4-20disable 4-21configure 4-21show history 4-22reload 4-22end 4-23exit 4-23quit 4

Strona 417

Configuring the Switch3-523Access Control ListsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4

Strona 418

Access Control Lists3-533Setting the ACL Name and TypeUse the ACL Configuration page to designate the name and type of an ACL.Command Attributes• Name

Strona 419

Configuring the Switch3-543The mask is bitwise ANDed with the specified source IP address, and compared with the address for each IP packet entering t

Strona 420

Access Control Lists3-553Configuring an Extended IP ACLCommand Attributes• Action – An ACL can contain either all permit rules or all deny rules. (Def

Strona 421

Configuring the Switch3-563Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (

Strona 422

Access Control Lists3-573Configuring a MAC ACLCommand Attributes• Action – An ACL can contain all permit rules or all deny rules. (Default: Permit rul

Strona 423

Configuring the Switch3-583Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (

Strona 424

Access Control Lists3-593Configuring ACL MasksYou can specify optional masks that control the order in which ACL rules are checked. The switch include

Strona 425

Configuring the Switch3-603Configuring an IP ACL MaskThis mask defines the fields to check in the IP header. Command Usage• Masks that include an entr

Strona 426

Access Control Lists3-613Web – Configure the mask to match the required rules in the IP ingress or egress ACLs. Set the mask to check for any source o

Powiązane modele: ES4524C | ES4548C |

Komentarze do niniejszej Instrukcji

Brak uwag