Home
Web User Manual
Contents
1. IP Address Auth port Retransmit Key 1 65535 default 1812 1 5 times 1 16 chars Acct port Timeout Confirm Key 1 65535 default 1813 3 10 sec Apply IC O O meat O L reran O er Total 0 Delete Table 9 40 Parameters of RADIUS Server Settings IP Address RADIUS authentication server address Set the UDP port on RADIUS authentication server Values range from 1 to 65535 Default is 1812 Set the UDP port on RADIUS account server Values range from 1 to 65535 Default is 1813 This value is the number of requests sent by switch when there is no response in authentication server If setting the sever parameter as Re sent switch will take the re sent parameters in global configuration as server default configuration Values range from 1 to 5 Enter the key on RADIUS server Values range from to 16 Confirm key Re enter the key on the RADIUS server Values range from 1 to 16 Enter the time in seconds for which The switch will wait the server host to response certificate request If setting the sever parameter as Time out switch will take the re sent parameters in global configuration as server default configuration Values range from 3 to 10 seconds Add RADIUS sever Step 1 Step 2 Step 3 Step 4 Issue 05 2012 10 25 Click Security gt RADIUS Click RADIUS Server Settings in Tab Set the parameters in RADIUS server Authentication Settings section Click Apply b
2. AF1 lt Apply Select service level mapped by this DSCP 7 4 IP Precedence Mapping Click QoS gt IP Precedence Mapping to configure mapping relationship of IP Precedence and service level the configuration page is shown as below Figure 7 5 IP Precedence Mapping o Current position QoS gt IP Precedence Mapping Jioiniasjwin 0o Table 7 4 Parameters of IP Precedence Mapping lt lt lt lt lt lt lt lt Apply Select the service level mapped by this IP Precedence Issue 05 2012 10 25 Huawei Proprietary and Confidential Copyright Huawei Technologies Co Ltd 101 S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration 7 5 Service Level Mapping Click QoS gt Service Level Mapping to configure mapping relationship of service level mapping and switch s hardware queues the configuration page is shown as the figure below Figure 7 6 Service Level Mapping o Current position QoS gt Service Level Mapping BE AF1 AF2 AF3 AF4 EF CS6 CS7 MMMM SN Om jj e jja MH O Apply Table 7 5 Parameters of Service Level Mapping level There are eight hardware priority queues for each port Select priority of hardware queue of switch mapped by this service 7 6 QoS Scheduler Click QoS gt QoS Scheduler to configure the scheduler mode of hardware queue on switch the co
3. Figure 9 40 Binding Table Information o Current position Security gt DHCP Snooping Global Interface State Settings Interface Trust Settings Interface Parameter Settings Binding Table Information File Name Browse Import Export binding table to the local unit Export Query All Query Total 0 Delete Table 9 27 Parameters of Binding Table Information Interface number belongs to host VLAN ID VLAN ID belongs to host IP Address Host IP address MAC Address Host MAC address Host IP address lease time Import binding table Step 1 Click Security gt DHCP Snooping Step 2 Click Binding Table Information in Tab Step 3 Click the Browse button and select the file from local PC which contains the binding table information Click the Import button to load the information to the switch End Export binding table Issue 05 2012 10 25 Huawei Proprietary and Confidential 153 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Step 1 Step 2 Step 3 Step 1 Step 2 Step 3 Step 1 Step 2 Step 3 9 9 IPSG 9 Security Click Security gt DHCP Snooping Click Binding Table Information in Tab Click the Export button to save the binding table to the local PC with a format of cfg End Search binding table Click Security gt DHCP Snooping Click Binding Table Information in Tab Choose the Search mode from
4. 1700 Managed Series Ethernet Switches V100R007C00 Web User Manual Issue 05 Date 2012 10 25 Wz HUAWEI TECHNOLOGIES CO LTD HUAWEI Copyright Huawei Technologies Co Ltd 2012 All rights reserved No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co Ltd Trademarks and Permissions SY Huawei and other Huawei trademarks are trademarks of Huawei Technologies Co Ltd All other trademarks and trade names mentioned in this document are the property of their respective holders Notice The purchased products services and features are stipulated by the contract made between Huawei and the customer All or part of the products services and features described in this document may not be within the purchase scope or the usage scope Unless otherwise specified in the contract all statements information and recommendations in this document are provided AS IS without warranties guarantees or representations of any kind either express or implied The information in this document is subject to change without notice Every effort has been made in the preparation of this document to ensure accuracy of the contents but all statements information and recommendations in this document do not constitute a warranty of any kind express or implied Huawei Technologies Co Ltd Address Huawei Industrial Base Bantian Longgang Shenz
5. Table 9 13 Parameters of Storm Suppression Display interface number Unicast Specify the storm suppression for the unicast traffic Multicast Specify the storm suppression for the multicast traffic Broadcast Specify the storm suppression for the broadcast traffic Enable or Disable traffic suppression The packet exceeding the specified threshold value will be dropped Threshold can be based on message rate kbps and Jo percentage of bandwidth Issue 05 2012 10 25 Huawei Proprietary and Confidential 136 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Configure Storm Suppression for Interface Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Click Security gt Storm Suppression Click Storm Suppression in Tab Click the checkbox on the left side of storm control interface to be configured then click Configure button to open interface storm suppression configuration page Figure 9 19 Configure Interface Storm Suppression X Close Oy GigabitEthernetO0 0 4 Interface Name Type Broadcast wt status Disable e Drop 0 1000000 Apply Cancel Select storm type to be suppressed from drop down menu of Type Enable or disable storm suppression in Status field Configure that switch drops the packet of exceeding the threshold value in Drop field Click Apply button to apply all the changes made End ZN caution Storm Suppre
6. Ethernet0 0 1 Down Disable Link Down Auto Auto Enable No Limit No Limit 1536 gog Ethernet0 0 2 Down Disable Link Down Auto Auto Enable No Limit No Limit 1536 O Ethernet0 0 3 Down Disable Link Down Auto Auto Enable No Limit No Limit 1536 Table 4 1 Parameters of Basic Attributes Search the basic attributes of the designated interface Interface Name Display the number of interface The operating status up or down on interface Issue 05 2012 10 25 Huawei Proprietary and Confidential 26 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 4 Interface Management ma o Flow Control Check 1f the flow control is enabled or disabled on the Configuration interface Flow Control Status Check whether the flow control is effective or not Display the operating speed and duplex mode of the interface Speed Set Display the current speed configuration on the interface Interface Attribute Configuration Step 1 Click Interface Management gt Ethernet Interface gt Basic Attributes Step 2 Choose the check box in the left hand column of the interface to be configured with attributes from the list and then click Configure button to manually configure status for the designated interface including negotiation interface speed duplex mode and flow control the configuration page is shown as the figure below Figure 4 2 Basic Attributes Configuration X Close GigabitEthernet0 0 4 Inte
7. Issue 05 2012 10 25 Huawei Proprietary and Confidential 162 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 52 Set the parameters of Two way Isolation X Close Etherneto 0 48 Interface Name Status Disable be Apply Cancel Step 4 Enable the Two way Isolation function in Status field Step 5 Click Apply button to apply all the changes made End 9 12 2 One way Isolation Click Security gt Interface Isolation gt One way Isolation the configuration page is displayed as follows Figure 9 53 One way Isolation o Current position Security gt Interface Isolation OAV AEG Eeg One way Isolation Query Interface Name All v Query Ethernet0 0 1 Ethernet0 0 2 Ethernet0 0 3 ooo Table 9 35 Parameters of One way Isolation Item Description Query Search the one way Isolation settings of specified interface in Interface Name Interface Name Interface number Isolated Interface List Isolated or not isolated target interface Deny or allow the specified interface to send data packets to the target interface Set the parameters of One way Isolation for interface Step 1 Click Security gt Interface Isolation Step 2 Click One way Isolation in Tab Step 3 Click the check box of the One way Isolation parameter on left side and then click Configure button to display the following page Issue 05 2012 10 25 Huawei Proprietar
8. Step4 Apply the configured traffic strategy to the specified objects including interface and VLAN 7 8 1 Traffic Classifier Click QoS gt Traffic Management gt Traffic Classifier to view the traffic classifier configured on switch the configuration page is shown as the figure below Figure 7 13 Traffic Classifier o Current position QoS gt Traffic Management Traffic Classifier Bie ite ree Mica a o a my B Classifier Name Total 0 New Delete B Rule Type Rule Value Table 7 10 Parameters of Traffic Classifier iem TN Classifier Name Classifier name Click classifier entry in list box and then rule types and rule value created by this entry will be displayed in rule list Rule Type Types of traffic classifier rules Rule Value Rule value of classifier Issue 05 2012 10 25 Huawei Proprietary and Confidential 107 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration Add a Rule for Traffic Classifier Step 1 Click QoS gt Traffic Management gt Traffic Classifier Step 2 Click Apply button to add a traffic classifier opening the configuration page shown as the figure below Figure 7 14 Add Traffic Classifier Classifier Name 1 32 chars Apply Cancel Step 3 Enter a name for traffic classifier in Traffic Classifier Name bar Step 4 Click Apply button to apply all the changes made The successfully created traffic classifier will be display
9. Click Security gt User Management page and then click Online User in Tab to check the current online user details on switch the configuration page is shown as the figure below Figure 9 4 Online User o Current position Security gt User Management MESA EEN Online Users Query User Name O Interface Name IPv4 Address i MAC Address IPv6 Address D UserName IPv4 Address IPv6 Address MAC Address Authentication Method Access Type A E HTTP 105 admin 192 168 1 78 Local Total 1 lt lt lt Kj gt Go User ID 105 the Other Information Acct Session ID Authorized Filter ID Authorized Data Filter Table 9 3 Parameters of Online User Query Query the current online users by one of the following four options as required name IP address port name and MAC address Display the online user ID Display the online user name IPv4 IPv6 Address Display the IP Address of online user MAC Address Display the MAC address of online user Issue 05 2012 10 25 Huawei Proprietary and Confidential 122 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Interface Name Display the interface number accessed by online user through Switch Authentication Display the authentication method of online user Method Access Type Display the access type of online user Acct Session ID The one and only accounting ID number for online users to identify
10. Ltd S1700 Managed Series Ethernet Switches Web User Manual System Management Set Device Name of Switch Step 1 Click System Management gt System Configuration to bounce a webpage as shown in Fig 3 5 Step 2 Enter the device name of switch into Device Name field Step 3 Click Apply button to apply all the changes made End 3 6 SNTP In network it is very important to configure time synchronization of entire network particularly the causality of event can be detected based on the time of log entry SNTP simple network time protocol is mainly applied to synchronizing clocks of computers in the network Click System Management gt SNTP to configure the system time the configuration page is shown as follows Figure 3 6 SNTP Configuration o Current position System Management gt SNTP SNTP Global O Enable Disable Apply SNTP Server Configuration SNTP Server Server List z Apply Apply Query Interval 720 30 99999 sec default 720 Apply Time Configuration Time Zone Greenwich standard time in London Casablanca Western European time v Apply System Current Time 2012 01 01 21 56 06 Date Year Month Day Time hour min sec Apply Table 3 6 Parameters of SNTP Configuration SNTP Global Choose to enable disable the SNTP function SNTP Server Server List Enter the IP addresses of the primary and Configuration secondary SNTP server from which the switch will obtain the time settings Query Interval This is the
11. SNMP Global Settings SNMP Community SNMP Host SNMP Group EUA ASE SUS crouptame ETT oniy view O public SNMPv1 NoAuthNoPriv CommunityView CommunityView 0 O public SNMPv2 NoAuthNoPriv CommunityView CommunityView 0 F initial SNMPv3 NoAuthNoPriv restricted restricted 0 O private SNMPv1 NoAuthNoPriv CommunityView CommunityView CommunityView 0 F private SNMPv2 NoAuthNoPriv CommunityView CommunityView CommunityView 0 Total 5 New Delete Table 10 5 Parameters of SNMP Group Up to 32 characters used to identify the SNMP user group Issue 05 2012 10 25 Huawei Proprietary and Confidential 181 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network CEN CEN User based Security Model SNMPvl specify the SNMPvl will be used SNMPv2c specify the SNMPv2c will be used SNMPv2c which supports the centralized and distributed network management strategies It includes the improvements of Management Structure of Management Information and adds some security features SNMPv3 specify the SNMPv3 SNMPv3 provides secure access for equipment by authenticating and encrypting the packets on the network Security Level NoAuthNoPriv specify NoAuthNoPriv security level which means authentication and encryption are not required by the packet between the specified switch and the remote SNMP manager AuthNoPriv specify AuthNoPriv security level which means only the authenticati
12. gt Authentication Settings to set the Authentication network and Authentication login the configuration page is displayed as follows e AAA Authentication Network authorized users can access network e AAA Authentication Login authenticated users can access the switch Issue 05 2012 10 25 Huawei Proprietary and Confidential 165 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 56 Authentication Settings o Current position Security gt AAA SU Authentication Settings Pirates r AAA Authentication Network Status Disable Method 1 Method 2 Apply AAA Authentication Login Name 1 15 chars Method 1 none Mi Method 2 Method 3 Method 4 Apply A ee e eas ea OO O emeas OOO O omean OOO neme O 2 default local Active Total 1 Active Configure Delete Table 9 37 Parameters of Authentication Settings AAA Authentication Network Status Enable Disable AAA network access authentication that is 802 1X authentication and MAC authentication Method 1 method 2 You can choose a variety of authentication methods but None and Local Authentication method can only set as the last kind of authentication In practice the certification order is from method 1 to method 2 It will go to the next authentication method only when the present authentication invalids The authentication options are as follow non
13. in Interface Name Interface Name Interface number Topology Change Whether to change the topology of notification interface Notification Status LLDP MED Capability TLV LLDP MED TLV type that supported by switch LLDP MED Network Policy The VLAN type VLAN ID and the priority that associated with L2 and L3 applications of the switch interface LLDP MED Inventory TLV The switch inventory information such as the hardware version software version serial number etc Configure parameters of interface Step 1 Click Network gt LLDP MED Step 2 Click Interface in tab Step 3 Click the check box on the left side of the interface which is to configure basic parameters and then click Configure to open the following page Issue 05 2012 10 25 Huawei Proprietary and Confidential 204 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Figure 10 40 Configure Local Interface X Close Interface GigabitEtherneto0 0 4 Interface Name wigebi erneto o Topology Change Notification Status Enable Disable Default Disable Capabilities Enable Disable Default Enable Network Policy Enable Disable Default Enable Inventory Enable Disable Default Enable Apply Cancel Step 4 Enable to publish the relevant parameter in the page Step 5 Click Apply button to apply all the changes made End 10 4 3 Local Click Network gt LLDP MED gt Local the c
14. stream forwarded from the corresponding interface Exclude means that if the source address is multicast data stream will be forwarded from the corresponding interface if it is not multicast data stream will not be forwarded from the corresponding interface Exp sec The aging time of multicast group Interface Name The interface for transmitting multicast service 5 6 7 Querier Click Service Management gt IGMP Snooping gt Querier to check querier information on switch the configuration page is shown as the figure below Figure 5 45 IGMP Snooping Querier o Current position Service Management gt IGMP Snooping Global VLAN Parameter Group Deny Group Policy Static Groups Querier Forwarding Table Total 0 Issue 05 2012 10 25 Huawei Proprietary and Confidential 78 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Table 5 32 Parameters of IGMP Snooping Querier VLAN The VLAN for transmitting multicast service Querier Role Display switch actions that transmits query packet Querier indicates switch sends IGMP query packet Non Querier indicates switch does not send IGMP inquiry packet Querier Expiry Time sec Timeout period of Querier and indicates that switch itself works as a querier 5 6 8 Mrouter Click Service Management gt IGMP Snooping gt Mrouter to check information of route interface on switch the configurat
15. 05 2012 10 25 Huawei Proprietary and Confidential 10 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches System Management About This Chapter Basic management and configuration functions of switch are introduced 3 1 Reset Factory 3 2 Reboot 3 3 Software Upgrade 3 4 File System Management 3 5 System Configuration 3 6 SNTP 3 7 IP Management 3 8 ARP 3 9 IPv6 Neighbor 3 1 Reset Factory Clicking System Management gt Reset Factory user can reset device to factory default configuration through this webpage The configuration page is shown as follows Figure 3 1 Reset Factory o Current position System Management gt Reset Factory Restore to factory default configuration may require a longer time during this period please be patient do not operate switches Reset Factory Resetto factory but keep IP address Apply Issue 05 2012 10 25 Huawei Proprietary and Confidential 11 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Step 1 Step 2 Step 3 3 System Management Table 3 1 Parameters of Reset Factory Reset Factory Reset switch to factory default configuration Reset to factory but keep IP Reset all configuration information of switch apart from address IP address Reset switch to factory settings Click System Management gt Reset Factory Click Reset Factory Click Apply button to apply all the ch
16. 186 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network 10 2 1 Statistic Statistics group provides continuously statistics for various traffic that pass through the interface currently only supports Ethernet interface statistics and the results are stored in Ethernet statistic tables in order to be viewed by management devices at any time The statistics information includes the count of conflicts CRC checksum error packets too small or large data packets broadcast multicast packets number of bytes received and packets received Use Network gt RMON gt Statistics to view the statistics information of ROMN group configured on the switch the configuration page is displayed as follows Figure 10 14 Statistic o Current position Network gt RMON CI O 1 13632122441 monitor O 2 13812122112 monitor O 3 136812 122113 monitor O 13612122114 monitor O 5 13612122115 monitor O 6 1 3 6 1 2 1 2 2 1 1 6 monitor O 7 13812122117 monitor O 8 13612122118 monitor O 9 13612122119 monitor O 10 136121221110 monitor Total 52 ma lt lt lt EE 2 3 gt gt gt Go New Delete Detail Info Table 10 9 Parameters of Statistic Create the user name of statistic group Create a RMON Statistic Group Step 1 Click Network gt RMON Step 2 Click Statistic in tab and click New to add a statistic group the configuration page is displayed as follows Figure 10 15 Create a Statisti
17. 1s 4 bytes 2 Rule needs to be established for the Chunk and Offset Offset bytes needed to be detected when creating ACL And it can not be modified but create again after deleting it Segment specified in the rule cannot exceed the range specified by ACL 4 Only 1 user define ACL can be created Figure 6 10 Definition of User Defined ACL Offset Offset MTS Offset Offset Offset Offset Offset Offset29 Offset Offset 30 Offset MITOS er B2 B5 B6 B9 B114 B117 B118 B121 B122 B125 Step 5 Configure the needed parameter Step 6 Click Apply button to apply all the changes made End 6 3 ACL Application ACL application will apply the rules created in ACL Profile to the specified interface or VLAN 6 3 1 Interface Application Click ACL gt ACL Application gt Interface Application to apply rules to specified interface the configuration page 1s shown as the figure below Figure 6 11 Interface Application o Current position ACL gt ACL Application Interface Application MYP UP S ure Ingress ACL Interface Name A III Ethernet0 0 1 Ethernet0 0 2 Ethernet0 0 3 Ethernet0 0 4 Ethernet0 0 5 Ethernet0 0 6 E n n n c V EJ Ki EJ E Ri Issue 05 2012 10 25 Huawei Proprietary and Confidential 93 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration Table 6 10 Parameters of Interface Application Interface Name Displays the inte
18. 4 Edit VLAN Member Attribute X Close Ethernet0 0 1 Interface Name Link Type Hybrid Ingress Checking Enable Disable Default Enable Native VLAN C Native VLAN VLAN ID 1 4094 Add Remove Add Remove Add Mode Untagged Tagged VLAN ID List 1 4094 example 1 3 5 7 9 Apply Cancel Step 3 Modify corresponding configuration item the parameters are as shown in Fig 5 2 Step 4 After configuration click Apply button to apply all the changes made End 5 2 MAC VLAN MAC VLAN is another partition method of VLAN which defines the VLAN membership according to the source MAC address of message and sends the specified message marked with VLAN Tag If the interface uses MAC VLAN partition mechanism it will take the following methods when the message arrives e The source MAC will try to match the MAC VLAN entry if the received message is untagged or priority tagged If the match succeeds the message will be tagged with specified VLAN ID in table If the match fails the message will be matched according to other principles Issue 05 2012 10 25 Huawei Proprietary and Confidential 40 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management e If the received message is tagged the same methods will be applied as port based VLAN if the port allows the message marked with VLAN tag to pass through then the message will be forwarded normally if n
19. 8 New Extension of MAC Rules ACLID 6300 Rule ID 1 65535 If not specified system to automatically assign Action Permit O Deny Match MAC Address GAIL Source MAC OSpecify Source MAC H H H Mask H H H GAI Destination MAC OSpecify Destination MAC H H H Mask H H H Match Ethernet Type Specify Ethernet Type Please Select v Ethernet Type Ox Ox600 0xF FFF Ethernet Type Mask Ox Ox0 OxF FFF 802 1 Priority Please Select v Time Range Name Please Select Apply Cancel Table 6 8 Parameters of Extending MAC Rule ACL ID ACL entry number that rule belongs to Action Specify switch to permit or deny data stream that matches to the rule Rule ID Enter rule number and the value ranges from 1 to 65535 If not specified the system will assign automatically Issue 05 2012 10 25 Huawei Proprietary and Confidential 90 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration CEN CST Match MAC Address Source MAC Address enter the source MAC address and the source MAC address mask in the corresponding Mask field Mask used to set the source MAC address range mask bit value of O corresponding to the MAC address bit is Independent Bit could be 0 or 1 mask bit value of 1 corresponding to the MAC address bit is Matching Bit must exactly match the source MAC address The MAC address will match the whole field 1f no mask entered Destination MAC Ad
20. C amp x O Et 2 lt gt and space e Password cannot be user name or user name in reverse order Confirm Password Enter the password again The value ranges from 6 to 64 characters Password Type Simple text display the entered password in the form of simple text within password field Cipher text display the entered password in the form of asterisk within password field User Level Specify the level of user 0 Normal 15 Privileged Normal level can only use some limited commands except empting database and recovering default configuration Privileged level provides full access to all commands Step 3 Specify user name password and select user level Step 4 Click Apply button to apply all the changes made End Modify User Account Step 1 Click Security gt User Management Step 2 Click Edit tag on the right of account entry to be modified opening configuration page of modifying account Issue 05 2012 10 25 Huawei Proprietary and Confidential 121 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 3 Modify user account User Name admin Password 6 16 chars Confirm Password 6 16 chars Password Type Simple Cipher User Level Please Select Apply Cancel Step 3 Modify user s password and select password type Step 4 Click Apply button to apply all the changes made End 9 1 2 Online User
21. CHADDR value exceeds alarm threshold value Alarm Threshold The maximum threshold value where the message can be changed by received CHADDR value Configure DHCP Snooping Parameter for Interface Step 1 Click Security gt DHCP Snooping Step 2 Click Interface Parameter Settings in Tab Step 3 Click the checkbox on the left side of DHCP Snooping parameter interface to be configured and then click Configure button the configuration page is displayed as follows Figure 9 39 Configure Interface Parameter X Close GigabitEthernet0 0 4 Interface Name Packet Limit Disable v Maximum Threshold 1 200 packet s default 100 Renewal Check Disable v Renewal Alarm Disable v Alarm threshold 1 200 packet s default 100 Chaddr Check Disable Chaddr Alarm Disable v Alarm threshold 1 200 packet s default 100 Apply Cancel Step 4 Configure the needed Parameter Issue 05 2012 10 25 Huawei Proprietary and Confidential 152 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Step 5 Click Apply button to apply the changes made End ZN caution DHCP Snooping function of the interface DHCP rate limit request packet check and Chaddr check can not be enabled on trunk member port 9 8 5 Binding Table Information Click Security gt DHCP Snooping gt Binding Table Information to view the binding information on switch the configuration page is displayed as follows
22. Click Network gt LLDP gt Remote to display LLDP advertisement of the device which connecting to an interface of switch or the basic information of the device which supports LLDP the configuration page is displayed as follows eo Figure 10 37 Remote o Current position Network gt LLDP Global Port Settings Address Management The Basis of TLVs Dot1 TLVs Dot3 TLVs System Statistics Remote Query Interface Name Ethernet0 0 1 Query C Entry ID Chassis ID Subtype Chassis ID Port ID Subtype interface ID Port Description Detail Info Table 10 21 Parameters of Remote Search the remote information of specified interface in Interface Name Entry ID LLDP information entry number of remote interface Chassis ID Subtype Device type of sending LLDP information Chassis ID Device ID sending LLDP information Port ID Subtype Interface type sending LLDP information Issue 05 2012 10 25 Huawei Proprietary and Confidential 202 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Interface ID Interface ID sending LLDP information Port Description It is the string describing the interface such as the interface unit interface number 10 4 LLDP MED 10 4 1 Global Configuration Click Network gt LLDP MED gt Global Configuration the configuration page is displayed as follows Figure 10 38 Global Configuration o Current position Network gt
23. Click Security gt AAA gt AAA Global Settings the configuration page is displayed as follows Issue 05 2012 10 25 Huawei Proprietary and Confidential 164 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 55 AAA Global Settings o Current position Security gt AAA AAA Global Settings Bestest eee Se AAA Global Settings AAA Status Enable w Apply Table 9 36 Parameters of AAA Global Settings Enable Disable AAA global settings 9 13 2 Authentication Settings Authentication Settings is designed to specify local or remote authentication mechanism Local authentication manages access authority by using the user name and password set on switch manually Remote Authentication manages access authority by using Remote Access Authentication Server based on RADIUS protocol e If using remote authentication server the user must set the related parameters for the authentication methods of RADIUS and group if there are multiple RADIUS servers the authentication order depends on the time of configuring server It will go to the next authentication server only when the current authentication server fails e Users can choose from four methods of authentication none local RADIUS and group The order depends on the time of configuring command It will go to the next authentication method only when the current authentication fails Click Security gt AAA
24. Create a SNMP User User Name SNMP Version 3 Auth Protocol by Password Priv Protocol by Password ACL X Close 1 32 chars Group Name admin 1 32 chars v SNMP V3 Encryption None v Password Password 1 3999 Apply Cancel Table 10 7 Parameters of Creating a SNMP User SNMP V3 Encryption Password Step 3 Enter the user name to be created in User Name field such as user1 None Indicates do not use the authentication protocol Password Usie password for authentication and encryption Authentication algorithm Select the authentication protocol which can be MD5 using HMAC MD5 96 Authentication Protocol or SHA HMAC SHA authentication protocol to use Encryption algorithm Select the encryption protocol which can be set as DES DES 56 bit encryption based CBC DES DES 56 bit standard or does not use any encryption protocol Specify the binding ACL ID If not specified which means it is not controlled by ACL Issue 05 2012 10 25 Huawei Proprietary and Confidential 184 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Step 4 Enter Group Name in the group to which user belong such as public created in the above example Step 5 Select Password from SNMP V3 Encryption list Step 6 Select the encryption protocol from Auth protocol by Password list and enter encryption password in Password field Step 7 Click Apply button to apply
25. Failure Topology Change and Broadcast Multicast Storm MIB The Switch in the Management Information Base MIB stores management and counter information The Switch uses the standard MIB Management Information Base module Consequently values for MIB objects can be retrieved from any SNMP based network management software 10 1 1 SNMP Global Settings Click Network gt SNMP gt SNMP Global Settings to set the SNMP global parameters on switch the configuration page is displayed as follows Figure 10 1 SNMP Global Settings SNMP Global Settings SNMP Community SNMP Host SNMP Group SNMP User SNMP Trap Settings r Global Configuration SNMP Status Disable Mi Device Name 1700 1 255 chars Contact 0 255 chars Location 0 255 chars Apply Engine ID Engine ID 800000ab03000102030400 10 64 chars chars 0 f Apply Table 10 1 Parameters of SNMP Global Settings SNMP status Enable Disable the global SNMP Status Enter a descriptive name for switch the length is 1 255 characters Contact Enter the contact person or organization of the management switch the length is O 255 characters Location Enter the physical location of the switch in order to identify the switch with different locations and the length is 0 255 characters Issue 05 2012 10 25 Huawei Proprietary and Confidential 176 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manua
26. Huawei Proprietary and Confidential 144 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security ZN caution MAC Authentication can not be enabled on the port when 802 1X is enabled MAC authentication cannot be enabled on the port when port security is enabled MAC Authentication can not be enabled on link aggregation member port Enable MAC authentication for Interface Step 1 Click Security gt MAC based Aceess Control Step 2 Click Interface in Tab Step 3 Click the checkbox on the left side of interface with MAC authentication to be configured and then click Configure button the configuration page is displayed as follows Figure 9 27 Configure MAC Authentication for Interface X Close Ethernet0 0 43 Interface Name Status Disable ho Aging Time 1440 1 1440 min default 1440 Quiet Period 60 0 300 sec default 60 Max User 256 1 512 default 256 Apply Cancel Step 4 Enable MAC authentication in Status field Step 5 Click Apply button to apply all the changes made End 9 6 3 MAC based Access Control Auth info Click Security gt MAC based Aceess Control gt MAC based Access Control Auth info to display MAC authentication information of switch interface the configuration page 1s displayed as follows Figure 9 28 MAC based Access Control Auth info o Current position Security gt MAC based Access Control Global interface MAC based Access Control Auth
27. Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security 9 12 Interface Isolation Isolation features of the interface are designed for security Network administrators can add certain interfaces Common Interface and Trunk port to isolation group The isolation interfaces within these groups cannot communicate directly and other communications will not be affected 9 12 1 Two way Isolation The interfaces that enable Two way Isolation cannot communicate directly other communications will not be affected Click Security gt Interface Isolation gt Two way Isolation the configuration page is displayed as follows Figure 9 51 Two way Isolation o Current position Security gt Interface Isolation Two way Isolation KOKAVE AES biter Query Interface Name All v Query o merico name O Ethernet0 0 1 Disable O Ethernet0 0 2 Disable Fi Ethernet0 0 3 Disable Table 9 34 Parameters of Two way Isolation Query Search the two way Isolation settings of specified interface in Interface Name Interface Name Interface number Enable or disable the interface isolation on appropriate interfaces Set the parameters of Two way Isolation for interface Step 1 Click Security gt Interface Isolation Step 2 Click Two way Isolation in Tab Step 3 Click the check box of the two way Isolation parameter on left side and then click Configure button to display the following page
28. Limit No Limit No Limit O Ethernet0 0 3 No Limit No Limit No Limit No Limit NoLimit No Limit No Limit No Limit No Limit No Limit No Limit No Limit No Limit No Limit No Limit No Limit Table 7 17 Parameters of Traffic Shaping Queue Hardware queue number on interface each interface has 8 hardware queues Minimum Rate The minimum speed of hardware queue The range is 64 100000 Kbps for FE port and 64 1000000 Kbps for GE port Maximum Rate The maximum speed of hardware queue The range is 128 100000 Kbps for FE port and 128 1000000 Kbps for GE port Issue 05 2012 10 25 Huawei Proprietary and Confidential 113 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration Configure Traffic Shaping for Interface Step 1 Click QoS gt Traffic Shaping Step 2 Click the checkbox on the left of the interface to be configured traffic shaping and click Configure button opening the configuration page shown as the figure below Figure 7 23 Traffic Shaping Configuration interface Name GigabitEthernetO0 0 4 Min Rate 64 1000000 Kbps Max Rate 128 1000000 Kbps Queued No Limit Queue No Limit Queue2 No Limit Queue3 No Limit Queue4 No Limit Queue5 No Limit Queue6 No Limit Queue7 No Limit Apply Cancel Note Granularity 64Kbps Min Max Actual Rate Granularity rate Granularity Step 3 Cancel checkbox of Unlimited on the right of queue and enter the speed rate r
29. MAC address which is selected Delete All Click this button to delete all the Blackhole MAC addresses in address table Add a Blackhole MAC Address Step 1 Click New button to add a Blackhole MAC address the configuration page is as shown in following figure Figure 5 22 Add Blackhole MAC Ah MAC Address H H H VLAN ID 1 4094 Apply Cancel Step 2 Enter the Blackhole MAC address information to be added in configuration page Step 3 Click Apply to apply all the changes made End Issue 05 2012 10 25 Huawei Proprietary and Confidential 53 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management 5 4 5 MAC Filter After this function is enabled only the data of the computer in static MAC address table can pass through the switch Click Service Management gt MAC gt MAC Filter page to open the page as shown in following figure which displays MAC filter status information of all the interfaces Figure 5 23 MAC Filter o Current position Service Management gt MAC MAC Address Table MAC Aging Time Static MAC Table Blackhole MAC Table MAC Filter LUCA ICH gt E O Ethernet0 0 1 Disable O Ethernet0 0 2 Disable O Ethernet0 0 3 Disable O Ethernet0 0 4 Disable O Ethernet0 0 5 Disable O Ethernet0 0 6 Disable O Ethernet0 0 7 Disable O Ethernet0 0 8 Disable MAC Filter Configuration Step 1 Choose the check box in the left hand colum
30. QoS gt SRED SRED Profile BSS GeuG AI RN Query Profile 1 128 Query m Profile Drop Mode Low Threshold Low Drop Rate High Threshold High Drop Rate fo 1 60 0 80 0 Not Drop Green Edit F 2 Not Drop Green 60 0 80 0 Edit Total 2 1 1 EN Go New Delete Create a SRED Profile Step 1 Click QoS gt SRED and then click SRED Profile in Tab Step 2 Click New button to open the following page Issue 05 2012 10 25 Huawei Proprietary and Confidential 103 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration Figure 7 9 New SRED Profile X Close Profile 2 128 Low Threshold BO 0 100 default 60 Low Drop Rate 0 0 7 default 0 High Threshold a0 0 100 default 80 High Drop Rate 0 0 7 default 0 Drop Mode Not Drop Green Apply Cancel Step 3 Enter the parameters of the new SRED profile in configuration page Click Apply button to apply all the changes made The new SRED profile will be displayed in SRED profile list Table 7 7 Parameters of SRED Profile Query Search configuration information of profile number specified in Profile SRED profile number Drop Mode Specify the SRED drop mode and the options are Not Drop Green and Drop Green Low Threshold When drop mode is Drop Green reaching this threshold it will begin to drop Yellow and Red message When drop mode is Not Drop Green it only drop Red message Low Drop Rate Specify drop rate of low t
31. Route gt IPv4 Static Default Route configure the configuration page is shown as the figure below Figure 8 2 IPv4 Routing o Current position IP Routing gt IPv4 Route IPv4 Route Table 1Pva Static Default Route Configure o Adesso procol Type Backup sime sons No data to display New Delete Table 8 2 Parameters of Configuring IPv4 Routing IP Address Mask The IP address mask of destination network segment of routing Gateway IP address The address of next hop Protocol Type Routing type Backup State Primary or secondary routing Status The routing is effective or not which means it can be used to conduct routing forwarding or not Create a Ipv4 Routing Step 1 Click IP Routing gt IPv4 Route gt IPv4 Static Default Route Configure Step 2 Click New button opening the configuration page shown as the figure below Figure 8 3 New IPv4 Routing X Close IP Address Default Route Mask Gateway Backup State Primary lt Apply Cancel Issue 05 2012 10 25 Huawei Proprietary and Confidential 116 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 8 IP Routing Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes made End 8 2 IPv6 Route 8 2 1 IPv6 Route Table Click IP Routing gt IPv6 Route gt IPv6 Route Table the configuration page 1s shown as the figure below Figure 8 4 IPv6 Route Table o Cur
32. S 1700 52FR 2T2P AC does not support EEE function so there is no EEE cofiguration option 11 6 Interface Mirror Click Device Management gt Interface Mirror page to manage CPU mirror flow mirror and interface mirror the configuration page is displayed as follows Issue 05 2012 10 25 Huawei Proprietary and Confidential 213 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 11 Device Management Figure 11 9 Interface Mirror o Current position Device Management gt Interface Mirror F CPU Mirror Enable Disable o ACL Name 1 32 chars Begin with a letter a z or A Z Frame Type Source Interface Destination Interface Interface List O O Press Ctrl or Shift selcet more ports Only select one port Add Apply No data to display Frame Type Source Interface Destination Interface No data to display Table 11 7 Parameters of Interface Mirror CPU Mirror Indicates that the switch copies all the frames received by CPU to destination interface and the mapped data are always VLAN tagged ACL Name Enter an ACL name and click Add or Apply button Flow mirror is based on an ACL name only and the ACL name can be non existent but cannot bind multiple ACL names at the same time The binding relation still does exist after ACL name is deleted Frame Type There are three options Both RX TX Use drop down menu to select these options Interface List Select
33. The adopted destination port number when virus attack occurs Attack Statistics Display this virus attack statistics detected by the switch Operation Edit or delete the virus prevent option or clear the attacking statistics The New Worm Prevent Step 1 Click Security gt Attack Prevent Step 2 Click Worm Prevent in Tab Step 3 Click New to add new worm features Issue 05 2012 10 25 Huawei Proprietary and Confidential 147 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 31 New Worm Features Virus Name 1 32 chars Protocol Type TCP hos Destination Port 0 65535 Apply Cancel Step 4 Enter the name of worm in Worm Name field Step 5 Select the protocol used by virus from Protocol Type drop down menu Step 6 Enter the interface number used by virus in Destination Interface Step 7 Click Apply to apply the changes made End 9 7 2 DoS Attack Prevent Click Security gt Attack Prevent gt DoS Attack Prevent the configuration page is displayed as follows Figure 9 32 DoS Attack Prevent o Current position Security gt Attack Prevent Worm Prevent DoS Attack Prevent DoS Type Land Attack Blat Attack Smurf Attack TCP Null Scan y Enable DoS Attack Prevent Step 1 Click Security gt Attack Prevent Configure Step 2 Click DoS Attack Prevent in Tab Step 3 To enable specific DoS Attack Prevent Click Enable check box on the left of th
34. add a history group the configuration page is displayed as follows Figure 10 18 Create a History Group Entry 1 65535 Data Source Ethernet0 0 1 w Owner 1 30 chars Buckets 8 1 8 default 8 Interval 1300 1 3600 sec default 1800 Apply Cancel Step 3 Enter the number of statistic group in Entry field Issue 05 2012 10 25 Huawei Proprietary and Confidential 189 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Step 4 Step 5 Step 6 Step 7 Step 8 Step 1 Step 2 Step 3 10 Network Enter MIB objet of the data statistic in Data Source field Enter a name in Owner field Enter maximum historical entries in Buckets field Enter the received message period accounted by history groups in Interval field Click Apply button to apply all the changes made End View the detail information of RMON History Group Click Network gt RMON Click History in Tab Click the detail information to be viewed in history list and click Detail Info button to view the information the configuration page is displayed as follows Figure 10 19 Details of History Entry 10 Data Source EF a montor Interval 800 Owner ontor sano ent tts Os Pt E Un CRAM SPA OEP omen bes Cans ir 136 244826 0 0 U g 4 U J 0 g J 137 246626 0 0 0 0 0 0 0 0 0 0 0 0 End 10 2 3 Alarm RMON alarm management specifies alarm variables such as the total number of pa
35. and Confidential 171 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 61 Configure RADIUS Group Sever IP address Group Server Name 1 IF Address Please Select E IP Address Delete Cancel Step 6 Click Add button to add RADIUS sever to RADIUS groups The successful configured RADIUS sever groups will be displayed in sever list End 9 14 4 RADIUS server Authorization Settings RADIUS Authorization Server is mainly used for service authorization when user selecting dynamic service Click Security gt RADIUS gt RADIUS server Authorization Settings to set the prameters of RADIUS authorization sever Figure 9 62 RADIUS server Authorization Settings o Current position Security gt RADIUS RADIUS Global Settings RADIUS server Settings RADIUS Group Server Settings RADIUS server Authorization Settings MI seit RADIU S server Authorization Settings IP Address Ack Reserved Interval 0 300 sec default 0 Key 1 16 chars Confirm Key o Pes A Key Total 0 Delete Table 9 42 Parameters of RADIUS server Authorization Settings IP address IP address of RADIUS authorization server Ack Reserved Interval Enter the response duration of ack reserved packets Values range from 0 to 300 seconds The default is 0 Key Enter the key of RADIUS authorization server Values range from 1 to 16 characters Confirm the key Re enter the k
36. ask for becoming the root bridge If the switch has the minimal bridge identifier it will become root bridge User can set the value from 6 40 seconds the default is 20 seconds 5 5 3 STP Interface Click the Service Management gt STP gt STP Interface page to configure attributes for specific interfaces including port priority path cost protection type and edge port You may use a different priority or path cost for ports of the same media type to indicate the preferred path Different link type indicates a point to point connection or shared media connection and different edge port indicates that the attached device can support fast forwarding Figure 5 28 STP Interface o Current position Service Management gt STP STP Information STP Global STP Interface Mi n O Ethernet0 0 1 Enable 0 None Auto 200000000 O Ethernet0 0 2 Enable 0 None Auto 200000000 O Ethernet0 0 3 Enable 0 None Auto 200000000 O Ethernet0 0 4 Enable 0 None Auto 200000000 O Ethernet0 0 5 Enable 0 None Auto 200000000 O Ethernet0 0 6 Enable 0 None Auto 200000000 Table 5 17 Parameters of STP Interface MSTP Enable disable STP on this interface Instance The instance numbers that runs on interface Issue 05 2012 10 25 Huawei Proprietary and Confidential 60 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Protection Type Whether to enable the appropriate protection on int
37. between two notifications successfully triggered by LLDP change The time is range from 5 3600 seconds Default is 5 seconds System Information Display the relative system information of switch 10 3 2 Port Settings Click Network gt LLDP gt Port Settings the configuration page is displayed as follows Issue 05 2012 10 25 Huawei Proprietary and Confidential 194 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Figure 10 25 Port Settings o Current position Network gt LLDP elm Port Settings Bites Venere ime MECO ee AMI ELORRIO SS eye lie Query Interface Name All v Query C O Ethernet0 0 1 Disable TX and RX O Ethernet0 0 2 Disable TX and RX O Ethernet0 0 3 Disable TX and RX O Ethernet0 0 4 Disable TX and RX O Ethernet0 0 5 Disable TX and RX O Ethernet0 0 6 Disable TX and RX Table 10 14 Parameters of Port Settings Admin Status Configure the Send and Receive mode of LLDP protocol data unit The options are send only receive only send and receive and disable IPv4 IPv6 Address Management address of interface Configure the basic parameters of the interface Step 1 Click Network gt LLDP Step 2 Click Port Settings in Tab Step 3 Select the check box at the left side of the parameter and click Configure button the configuration page 1s displayed as follows Figure 10 26 Parameters of LLDP Interface Interface GigabitEthe
38. dynamic MAC address entry Add to Static Table Select the checkbox from the left side of dynamic MAC address table and click this button then you can add the dynamic MAC address to static address table Clear Click this button and it will delete the learned dynamic MAC address entry that meets query conditions Clear All Click this button and it will delete all dynamic MAC addresses from address table 5 4 2 MAC Aging Time Use MAC Aging Time to set the remaining time of the learned MAC address in MAC address forwarding table If exceeds this time the switch will discard the MAC address forwarding records Click Service Management gt MAC gt MAC Aging Time page to view the configuration of MAC Aging Time Issue 05 2012 10 25 Huawei Proprietary and Confidential 50 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Figure 5 18 MAC Aging Time o Current position Service Management gt MAC MAC Address Table MAC Aging Time REA IE ad IE ee EE a Aging Time 300 0 10 1000000 sec default 300 0 indicates that entries never age Apply Table 5 11 Parameters of MAC Aging Time Aging Time Enter MAC address aging time Range 0 10 1000000 seconds default 300 seconds 0 means null aging time 5 4 3 Static MAC Table After the MAC address is bound to the assigned interface the crated static MAC table entry will not be aging in the addre
39. easter dd a OS 84 GAACL Appl CaO M era od ida losa labia loca osea 93 0o LINErec App HCA OM date adela deind ba decia 93 0 332 VELAN APP CaO de idas dioss 94 A ico stualaacod en ansanciNacatentniacs tact eawaserenssanai Uhoratel a a 96 7005 Configuratio tia ia 98 E Joye T es lel oe en Re Nee AER TR RD eT OnE SU EP Sr OTN eae Tn ne eR Tae en a eT RNA OP ee ae 98 DDO SIVA PDI soap O A O A te tea eats ae ann 100 MOIS IA MINS aged os occ tarnaetiinctcend sian A E A E A star 100 ATP Pieced ence IV Appin e dados 101 De EE VICE ES ol rel MINS AA e PR a nate orca A A E 102 TO QOS SEDEJO dada 102 Te Simple Random Early DeteclOna sa Paks 103 AAA o AA A O O O N 103 DS REO IO ARAN daba citada 105 TITS RED DOr EOI don 106 soe eri nora el A tM IM COME RO POP Ono o A A naan eae selene 107 KeA A enh CASS eea a tes aaron elon 107 Pz ATOMIC DEI A Peat oranda cates tad lets o di 109 AS ei TC OIC A A A A E E N 111 TOs ADDY amie OMG AA OE O Saussnt a e a 112 Te TALI SMA OL Siero vases tase canadien sioh das a Senaalst sonsiade Sanralse A 113 3 PROG Oss isaiai io 115 SEND ROME a a a seais 115 cd BUE ara EL vie PAD Ie PPP l o o nn e o e ro E 115 6 12 1Py4 Statio Detault Route Contenido Te 116 Bed A eins hae eee ace aac ntsc eee ait chee AA Seletea tes nade aeasee 117 LT Route Tables in slo 117 8 2 2 1PvG6 Static Detault Route Contes sordera clio bala 117 SECA en E vas otaaiuassasapaensaasaasencsauscasacauiessuceescnsesines ses ets san
40. gt RMON statistic History alarm e m entry Deseripton event type tasttimesend Ower Total 0 New Delete Detail Info Table 10 12 Parameters of Event Number of event group entries Description of event group Event Type None do not choose the event type Log Records the event information the time and the contents of event etc into the device event log table in RMON MIB in order to be viewed by the management device through SNMP GET operation Trap Sends a Trap message to network management station to inform the incident event Log and Trap Records the log into the device as well as to send Trap messages to the network management station Last Time Send The time that sends the event to the community at last Create the user name of alarm group Create a RMON Event Group Step 1 Click Network gt RMON Step 2 Click Event in Tab and click New to add an event the configuration page is displayed as follows Issue 05 2012 10 25 Huawei Proprietary and Confidential 192 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Figure 10 23 Add an Event Entry 1 65535 Description 1 127 chars Event Type None Owner 1 30 chars Apply Cancel Step 3 Enter the related information about the event in the page Step 4 Click Apply button to apply all the changes made End 10 3 LLDP Link Layer Discovery Protocol LLDP is used to discover the basi
41. in IGMP message header if enable this function then IGMP message s IP header received by the current VLAN must be attached to Router Alert IGMPv1 message excluded otherwise drop this message Send Router Alert Router Alert option includes whether to send router alert in IGMP message header Issue 05 2012 10 25 Huawei Proprietary and Confidential Copyright Huawei Technologies Co Ltd 42 S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management mm CE Last Member Query Interval Represents the time interval when IGMP receiving the IGMP leave group message sent by the host and sending IGMP specific group query message The unit is second Robustness Variable This value is adjusted by the expected packet loss ratio This value should be corresponding increased to adapt to the increasing packet loss if packet loss is high on LAN The value range is 2 5 the default is 2 Query Interval This value is used to set the time interval for transmitting IGMP query The range is 1 31744 second s the default is 125 seconds Step 3 Adjust the needed IGMP settings Step 4 Click Apply button to apply all the changes made End 5 6 3 Group Deny Click Service Management gt IGMP Snooping gt Group Deny to view interface s IGMP Snooping learning status shown as the figure below Figure 5 37 Group Deny o Current position Service Management gt IGMP Snooping CR UN ca Group Deny RAT ES Forw
42. in Table 5 3 Click Apply button to apply all the changes made End View Delete MAC VLAN Click Service Management gt MAC VLAN gt MAC VLAN to view the settings of MAC VLAN as shown in Fig 5 5 Choose the check box in the left hand column of the VLAN entry needed to be deleted Click Delete button to delete MAC VLAN End 5 2 2 Interface Click Service Management gt MAC VLAN gt Interface page to open the configuration page as shown below which displays all function status information of MAC VLAN on all interfaces Figure 5 7 Attribute of MAC VLAN Interface o Current position Service Management gt MAC VLAN ICI T O Ethernet0 0 1 Disable O Ethernet0 0 2 Disable oO Ethernet0 0 3 Disable O Ethernet0 0 4 Disable O Ethernet0 0 5 Disable O Ethernet0 0 6 Disable Fj Ethernet0 0 7 Disable Fj Ethernet0 0 8 Disable F Ethernet0 0 9 Disable F Ethernet0 0 10 Disable Fj Ethernet0 0 11 Disable Issue 05 2012 10 25 Huawei Proprietary and Confidential 42 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management View Enable MAC VLAN based on Interface or Interface Range Step 1 Step 2 Click Service Management gt MAC VLAN gt Interface to open the configuration page as shown in Fig 5 7 Choose the check box in the left hand column of the interface list needed to be edited and then click Configure button to modify the MAC VLAN attribute of interf
43. information on switch shown as the figure below Figure 5 48 IGMP Snooping Forwarding Table o Current position Service Management gt IGMP Snooping Global VLAN Parameter Group Deny Group Policy Static Groups Groups Querier Mrouter Forwarding Table VLAN Group Source IP Total 0 Forwarding Interface Table Group Source IP Interface Name Table 5 35 Parameters of IGMP Snooping Forwarding Table VLAN Specify the VLAN which used to transmite multicast service Issue 05 2012 10 25 Huawei Proprietary and Confidential 80 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Group Source IP Multicast server address that sends data stream to specified multicast Interface Name The downlink interfaces or interface aggregation of the specified multicast group that receives data stream which includes multicast router interface with dynamic or static configuration Issue 05 2012 10 25 Huawei Proprietary and Confidential 81 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration ACL Configuration About This Chapter In ACL configuration page user can create ACL based on IP MAC IPv6 and User default to control network traffic and realize network security access The whole ACL Control is divided into 3 steps Step 1 configure the effective period of ACL rule in the effecti
44. interface VLAN Issue 05 2012 10 25 Huawei Proprietary and Confidential 133 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 15 Configure Guest VLAN for Interface Interface Name Ethernet0 0 14 VLAN ID 1 4094 Apply Cancel Step 3 Select interface number of Guest VLAN to be configured from Interface Name Step 4 Enter specified Guest VLAN ID number for interface in VLAN ID Step 5 Click Apply button to apply all the changes made The successfully configured Guest VLAN entry of interface will display in Guest VLAN list End 9 4 Storm Suppression 9 4 1 Storm Control Use Storm Control page to configure multicast broadcast and unicast traffic control threshold Click Security gt Strom Suppression gt Storm Control the configuration page is displayed as follows Figure 9 16 Storm Control o Current position Security gt Storm Suppression Storm Control ESOL o Query Interval 5 1 300 sec default 5 Apply al merce Name O Ethernet0 0 1 Block O Ethernet0 0 2 Block O Ethernet0 0 3 Block O Ethernet0 0 4 Block Table 9 12 Parameters of Storm Control Query Interval The query interval sets the time that the unicast multicast and broadcast packet statistics transmitting from switch chip to storm control These packets statistics are the key factor to decide when the inbound packet exceeds the threshold value Range 1 300 sec
45. interval between requests for updated SNTP information Range 30 99999 Default 720 seconds Time Zone Set your local time zone System Current Time Display current time of switch Issue 05 2012 10 25 Huawei Proprietary and Confidential 16 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches CE CET Manually set the date of switch Y ear set the year Range 2010 2073 Month set the month Range 1 12 Day set the day Range 1 31 Manually set the time of switch Hour set the hour Range 0 23 Minute set the minute Range 0 59 Second set the second Range 0 59 Time configuration of Switch Step 1 Click System Management gt SNTP to bounce the webpage as shown in Fig 3 6 Step 2 Choose Enable from SNTP Global Step 3 Enter a SNTP server address in Server List field for example 192 168 22 44 Step 4 Click Apply button of SNTP Server Configuration to apply all changes made End 3 7 IP Management S1700 series switch has only two VLAN corresponding interface anytime to configure IP address and this VLAN is management VLAN If management for the switch is needed an IP address for VLAN interface of the switch must be configured 3 7 1 Management VLAN Click System Management gt IP Management gt Management VLAN page to configure the management VLAN for the switch the configuration page is shown as follows Figure 3 7 Management VLAN o Current position Sys
46. into EZO te Query interface Name All be Query a Interface Name Original VLAN Authorized Status Authorized VLAN Aging Time Block Time No data to display Total Authenticating Hosts 0 Total Authenticated Hosts 0 Total Blocked Hosts 0 Issue 05 2012 10 25 Huawei Proprietary and Confidential 145 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Table 9 20 Parameters of MAC based Access Control Auth info Query Search authentication address information of interface specified in Interface Name The authentication status of MAC address includes Authenticating Authenticated and Blocked Authorized VLAN The MAC address is assigned VLAN after it is authenticated Aging Time Block Aging Time The time that the user who passes the authentication remaining authentication status Authorized Status Block Time The time that the user who fails the authentication requiring the authentication again 9 6 4 MAC Format Configure Click Security gt MAC based Aceess Control gt MAC Format Configure to configure the format of MAC address the configuration page is displayed as follows Figure 9 29 MAC Format Configure o Current position Security gt MAC based Access Control Global interface MAC based Access Control Auth info MAC Format Configure Separator None Mi Separator Number Apply Table 9 21 Parameters of MAC
47. more the port will recover to its previous normal status Loop circuit protection On switch status of root ports and other blocking ports 1s maintained by continually receiving BPDU from up streaming switch When these ports receive no BPDU from up streaming switch by causes of link congestions or one way link failures the switch will select root ports again The previous root ports will turn to specified ports and previous congestion ports will shift to forwarding status thus causing loop circuit in exchanging network Loop circuit protection function will restrain such occurrence When enabling loop circuit protection function the root ports will be set to blocking status if these ports can not receive BPDU from upstream while the blocking ports will remain blocking status forwarding no message and thus causing no loop circuit in network TC protection When switch receiving TC BPDU it will implement delete operation of MAC address table and APR table If receiving frequently TC BPDU to conduct table delete action it will be overburdened for the device After configuring topology change protection on interface the frequent delete operation can be avoided and the transmitting TC BPDU can be avoid as well LC NOTE When Eth Trunk is used the STP attribute of Eth Trunk interface will follow the principles below 1 If Eth Trunk is created the STP attribute of Eth Trunk interface is set as default value 2 If added to Eth Trun
48. nora os nds doi E A cla 212 led POWEr oane Mana Se mentada ao 213 LIO Intert ace MITO e E ea cita 213 MTP A 8 waaheasseasahey a tana uaunigetaetcanousisalwnun taassuasveigoie tassanaisalvaua A 219 MSF oie O CS iiaa PO PEO E E E OE 215 TEJ 2 Tracee A AA ed otal A E A A op telete se eeeea beatae 216 EON Kesintorma OM ona E EA Docs 217 D2 Save R nning conti a 218 Issue 05 2012 10 25 Huawei Proprietary and Confidential K Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 1 Client Setting Client Setting About This Chapter Intuitive maintenance and configuration of device can be implemented with graphical interface through logon of Web network management client To know about the operation and function of this client quickly this chapter gives a brief introduction of basic operating knowledge of the Web network management client 1 1 Logon Web Network Management Client 1 2 Know About Client Interface 1 3 User Timeout Processing 1 4 Configuration Saving 1 5 Logout Web Network Management Client 1 1 Logon Web Network Management Client A logon is necessary for user to perform corresponding configuration of switch 1 1 1 Background Information Web network management client can access switch by HTTP Web network management client should support browsers after the versions of IE6 0 Firefox 3 5 6 and Google Chrome This manual describes with IE8 0 1 1 2 Operation Step
49. relationship The multicast data stream received on the switch will be flooding in VLAN when IGMP Snooping is disabled IGMP Snooping supports link aggregation If Ethernet port belong to trunk group the Ethernet port s IGMP snooping configuration can t take effect when Ethernet port leave trunk group the Ethernet port s IGMP Snooping configuration will take effect 5 6 1 Global Click Service Management gt IGMP Snooping gt Global to check switch s IGMP Snooping global configuration information the configuration page is shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 68 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Figure 5 34 IGMP Snooping Global Settings o Current position Service Management gt IGMP Snooping Global VLAN Parameter Group Deny Group Policy Static Groups Forwarding Table Global Global State O Enable Disable Default Disable Dynamic Mrouter Aging Time 1 1000 sec default 260 Group Membership Aging Time 200 1000 sec default 260 General Query Max Response Time 1 25 sec default 10 Specific Query Max Response Time 1 5 sec default 2 Drop Unknown State Enable Disable Default Disable Snooping L2 Forwarding Mode IP MAC Default IP Statistics VLAN Group Number IGMP Query IGMP Report IGMP Query IGMP Report IGMP Leave IGMP Leave Total 0 Clear Table 5 2
50. seriously affect the voice quality This switch allows user to specify a Voice VLAN for network and set the CoS priority for Voice VLAN traffic Voice VLAN traffic can detect the VoIP device connected to network through the source MAC address of packets When Voice VLAN traffic is detected on an Issue 05 2012 10 25 Huawei Proprietary and Confidential 43 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management interface the switch will automatically assign a Voice VLAN member tag for that interface In addition users can also connect the interface to Voice VLAN members manually 5 3 1 Global Parameter Configuration Click Service Management gt Voice VLAN gt Global page to configure Voice VLAN global parameters for switch the configuration page is shown as the figure below Figure 5 9 Voice VLAN Global Settings o Current position Service Management gt Voice VLAN Global Voice VLAN OUI Voice VLAN Device LLDP MED Voice Device Legacy Device Global State O Enable 3 Disable Default Disable VLAN ID 2 4094 VLAN Name 1 32 chars Apply Priority 6 v Aging Time 1440 5 43200 min default 1440 Static Member Interfaces Dynamic Member Interfaces Table 5 4 Parameters of Voice VLAN Global Settings Global State Enable automatic VoIP flow detection on the interface of switch the default is disable VLAN ID Set VLAN ID of enabled Voice VL
51. shown as the figure below Figure 9 7 Configure Interface Authentication Mode Etherneto 0 41 Interface Name Port Control Host based Apply Cancel Step 4 Select authentication mode in pull down menu of Interface Control Issue 05 2012 10 25 Huawei Proprietary and Confidential 125 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Step 5 Click Apply button to apply all the changes made End 9 2 3 Interface When 802 1X is enabled configure the parameters of the authentication process that runs between the client and the switch as well as the parameter of client identity which looks up on authentication server Click Security gt 802 1X gt Interface Configuration the configuration page is as follows Figure 9 8 Interface o Current position Security gt 802 1X A Fi mietocetiome Aan Port Coniro TK Pero ouiet Pers eres Renu penoa Reaun ias Handsnae er oO 30 60 30 30 2 3600 5 16 A Ethernet0 0 1 Both Auto Disable Authenticator Ethernet0 0 2 Both Auto 30 60 30 30 3600 Disable None 2 16 Ethernet0 0 3 Both Auto 30 50 30 30 2 3600 Disable None 2 2 16 16 16 Ethernet0 0 4 Both Auto 30 60 30 30 3600 Disable None Ethernet0 0 5 Both Auto 30 60 30 30 3600 Disable None h bh bh bh bh on nm mn o O O O O Table 9 6 Parameters of Interface Interface Number AdmDir There are two options RX or TX and RX If select RX only c
52. specify offset Offset in bytes See chapter Create a New User Defined Rules Step The starting number and distribution interval of automatically assigning rule number ACL Description Enter the description of ACL entry function Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes made End Create a Standard IP Rule Step 1 Click ACL gt ACL Profile Step 2 Click a created standard IP rule in ACL list and click New in the list box of ACL Rule to add a new rule opening the configuration page shown as the figure below Figure 6 5 Create Standard IP Rule X Close ACLID 1 Rule ID 1 65535 If not specified system to automatically assign Action Permit Deny Match IP Address All Source IP Specify Source IP Mask Time Range Name Please Select Apply Cancel Issue 05 2012 10 25 Huawei Proprietary and Confidential 86 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration Table 6 5 Parameters of Standard IP Rule ACL ID ACL entry ID that the rules belongs to Rule ID Enter an ID for rule and the range 1s 1 65535 If not specified the system according to rule step will distribute automatically Specify switch to permit or deny data stream that matches to the rule Match IP Address All Source IP specify this rule to be applied to all IP data packages Specify Source IP Mask specify this rule to be appl
53. the whole field if no mask entered If ACL doesn t select this segment it can not be set Chunk 3 Specify the user defined content of the third passage to be matched Content the data needed to be matched Mask used to set destination data range the location that mask with value of O corresponds to is difference then it can be 0 or 1 the location that mask with value 1 corresponds to is matching location then 1t should be matched accurately The content will match the whole field 1f no mask entered If ACL doesn t select this segment it can not be set Chunk 4 Specify the user defined content of the fourth passage to be matched Content the data needed to be matched Mask used to set destination data range the location that mask with value of 0 corresponds to is indifference then it can be O or 1 the location that mask with value 1 corresponds to is matching location then it should be matched accurately The content will match the whole field if no mask entered If ACL doesn t select this segment it can not be set Time Range Name Click Please Select button to specify effective time for the rule Issue 05 2012 10 25 Huawei Proprietary and Confidential 92 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration A The user defined ACL at least specifies a segment address and at most four segment addresses and each segment s length
54. the configuration page is displayed as follows Issue 05 2012 10 25 Huawei Proprietary and Confidential 168 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 58 RADIUS Global Settings Current position Security gt RADIUS RADIUS Global Settings By URES Sassi Be RSC RUE he am erect te eB IAS EO RADIUS Global Settings RADIUS server Retransmit 3 1 5 times default 3 RADIUS server Timeout 5 3 10 sec default 5 RADIUS server Key 1 16 chars Confirm Key NAS PortID Format New Format v NAS Port Format New Format v Apply Table 9 39 Parameters of RADIUS Global Settings mm oeo OOOO RADIUS server Retransmit This value is the number of requests sent by the switch when there is no response in authentication server Values range from 1 to 5 Default is 3 RADIUS server Timeout Enter the time in seconds for which the switch will wait the server host to response certificate request Values range from 3 to 10 Default is 5 RADIUS server Key Enter the key of RADIUS server Values range from 1 to 16 Confirm Key Re enter the key of RADIUS to ensure no error If the two domains do not match the switch will not modify the key Values range from 1 to 16 NAS Port ID Format NAS Port ID format is extended attributes within Huawei and is used among Huawei devices for interoperability and business cooperation NAS Port ID has
55. the device After configuring topology change protection on interface the frequent delete operation can be avoided and the transmitting TC BPDU can be avoid as well force true specifies ports as edge ports The edge ports connect directly to terminal affecting no network s connectivity thus getting quickly into Forwarding status When edge ports receiving configuration message BPDU Message the system will automatically set these ports as non edge ports and calculate spanning tree causing network s topology oscillation Point to Point Force true it represents point to point sharing link Point to point port is similar to edge port but point to point mode must be full duplex mode As the edge port point to point port can quickly turn into forwarding status to obtain RSTP advantages Force false it represents this interface does not own point to point status auto it represents that interface will change into point to point status whenever it is possible like status of point to point is force true If the interface cannot maintain this status like interface is forced operating half duplex mode the point to point status will be changed like status of point to point is force false This parameter default is set as auto Cost of this interface to CIST root path Issue 05 2012 10 25 Huawei Proprietary and Confidential 63 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet S
56. the member of Link Aggregation DAI untrust status cannot be configured and vice versa DAI ARP rate limit don t support Link Aggregation If port is the member of Link Aggregation DAI ARP rate limit cannot be enabled and vice versa 9 11 MAC Attack 9 11 1 Illegal Packet Settings Click Security gt MAC Attack gt Illegal Packet Settings the configuration page is displayed as follows Figure 9 50 legal Packet Settings o Current position Secunty gt MAC Attack legal Packet Settings legal Packet Discarded Disable e Apply Warning Illegal Packets Dropped Apply Table 9 33 Parameters of Illegal Packet Settings iem Depo Illegal Packet Discarded Enable Disable Illegal packet Discard If the switch receives message s source or destination MAC address with all illegal 0 it can perform this command and drop the illegal message Warning Illegal Packets Click this button to apply Illegal Packets Warning Discard If Dropped the switch receives the first message s source or destination MAC address with all illegal O it will drop this message and report an alarm to network manager If receiving illegal message subsequently the switch will only drop this massage and will not report the alarm By implementation of this command you can remove the last alarm including the dropped massage with illegal MAC address 0 to re trigger a new alarm Issue 05 2012 10 25 Huawei Proprietary and Confidential 161 Copyright
57. the new and old in two forms Depending on different configuration format there will be different forms of physical port where accessed user exists New Format slot XX subslot XX port XXX VLANID XXXX Slot range 0 15 Subslot range O 15 Port range 0 255 VLANID range 1 4094 Old Format port number two characters sub slot number two bytes card three bytes VLANID 9 characters NAS Port Format NAS Port ID format is extended attributes within Huawei and is used among Huawei devices for interoperability and business cooperation NAS Port has the new and old in two forms Depending on different configuration format there will be different forms of physical port where accessed user exists New Format slot number 8 sub slot number 4 port number 8 VLAN ID 12 bits Old Format slot number 12 port number 8 VLAN ID 12 bits Issue 05 2012 10 25 Huawei Proprietary and Confidential 169 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security 9 14 2 RADIUS Server Settings Click Security gt RADIUS gt RADIUS Server Settings to check the RADIUS server on switch the configuration page is displayed as follows Figure 9 59 RADIUS Server Settings Security gt RADIUS RADIUS Global Settings RADIUS server Settings EMISOR RUE ASS ier lie oti tom Be IRSE y RADIUS server Authentication Settings o Current position
58. the status of the control interface as Authorized or Unauthorized Authorized VLAN The assigned VLAN after successfully authenticated Check 801 X Authorized Status Step 1 Click Security gt 802 1X Step 2 Click Authorized Status in tab Step 3 Select the port to be checked in Interface Name and click Query button to check the 802 1X authorized status on interface End 9 2 5 Statistics Click Security gt 802 1X gt Statistics the configuration page is as follows Figure 9 11 Statistics o Current position Security gt 802 1X Query Interface Name All i Query Issue 05 2012 10 25 Huawei Proprietary and Confidential 129 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Table 9 8 Parameters of Statistics Query Search authentication status information of interface specified in Interface Name Interface Name Interface Number Frames Rx The total number of any type of EAPOL frames that have been received by Authenticator Frames Tx The total number of any type of EAPOL frames that have been transmitted by Authenticator Start RX The total number of EAPOL Start frames that have been received by Authenticator Reqld Tx The total number of EAP Req Id frames that have been transmitted by Authenticator Logoff Rx The total number of EAPOL Logoff frames that have been received by Authenticator Req TX The total number of EAP Response fr
59. used authentication method Time The time that the session starts from passing 802 1X authentication to now in second The cause that the authenticated session terminates The name of user who starts the authentication 9 2 7 Diagnostics Click Security gt 802 1X gt Diagnostics the configuration page is as follows Figure 9 13 Diagnostics o Current position Security gt 802 1X Global Mode Interface Authenticator Statistics Diagnostics a interface Name EntersConnecting EapLogoffsWhileConnecting EntersAuthenticating SuccessWhileAuthenticating Detail Info Query Interface Name All i Query Table 9 10 Parameters of Diagnostics Search session statistics information of interface specified in Interface Name Interface Name Interface Number EntersConnecting Times of 802 1X status machine entering CONNECTING from other status Issue 05 2012 10 25 Huawei Proprietary and Confidential 131 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security EapLogoffsWhileConnecting Times of receiving message EAPOL Logoff when 802 1X status machine in CONNECTING status EntersAuthenticating Times of 802 1X status machine migrating from CONNECTING to AUTHENTICATING for receiving message EAP Response Identity Success WhileAuthenticating Times of successfully authenticating 802 1X authentication Timeouts WhiltAuthenti
60. 00 Managed Series Ethernet Switches 3 7 3 IPv6 Click System Management gt IP Management gt IPv6 to configure an IPv6 address for the switch the configuration page is shown as follows Figure 3 10 IPv6 Address o Current position System Management gt IP Management Management LAN iva TS VLAN Name IPv6 Address IPv6 Type IPv6 Status Total 0 New Delete Table 3 10 Parameters of IPv6 Address List Display the relevant IP address information of the management VLAN Default management VLAN of switch does not enable IPv6 Address IPv6 Address Settings Step 1 Click System Management gt IP Management gt IPv6 to bounce the configuration page as shown in Fig 3 10 Step 2 Click New to add an IPv6 address for switch management VLAN to bounce the configuration page shown as follows Figure 3 11 IPv6 Address Settings IPv6 Status Enable Disable VLAN ID 1 we Apply IPv6 Address _JEUI JLink Local VLAN ID 1 v Apply Cancel Issue 05 2012 10 25 Huawei Proprietary and Confidential 20 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Step 3 Step 4 3 8 ARP 3 System Management Table 3 11 Parameters of IPv6 Address Settings IPv6 Status Choose to enable disable IPv6 function VLAN ID Choose management VLAN ID from following menu IPv6 Address Enter IPv6 address of VLAN interface EUI use interface ID to automatically generate latter 64bytes L
61. 1 Parameters of IGMP Snooping Global Setting Global State Select enabling or disabling IGMP Snooping global function Dynamic Mrouter Aging Time Configure the aging time globally for multicast router interface Group Membership Aging Time Configure the aging time globally for member interface General Query Max Response Time The maximum amount of time before sending IGMP response message when the host receives general query packet The range is 1 25 seconds and the default is 10 seconds Specific Query Max Response Time The maximum amount of time before sending IGMP response message when the host receives specific query packet The range of permissible time is 1 5 seconds and the default is 2 seconds Drop Unknown State Whether to drop the unknown multicast data stream Snooping L2 Forwarding Mode Set forwarding mode for multicast The default is IP mode IGMP Report The number of received sent report message of IGMP member Issue 05 2012 10 25 Huawei Proprietary and Confidential 69 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management IGMP Leave The number of received sent IGMP leave multicast group message Configure Global Parameter of IGMP Snooping Step 1 Click Service Management gt IGMP Snooping gt Global Step 2 Enabling Global State Step 3 Click Apply to apply all the changes made End 5 6 2 VLAN Parameter Click Service M
62. 10 25 Sub Menu HTTP ACL QoS Interface CoS Mapping DSCP Mapping IP Precedence Mapping Service Level Mapping QoS Scheduler SRED Traffic Management Traffic Shaping IPv4 Route IPv6 Route User Management 802 1X Guest VLAN Storm Suppression Port Security MAC based Access Control Attack Prevent DHCP Snooping IPSG MAC Attack iL EEE Interface Isolation 1 Client Setting Description Apply rules to HTTP protocol data of accessing switch Configure trust model and default CoS value of specified interface Perform mapping to CoS value and service grade Perform mapping to DSCP value and service grade Perform mapping to IP Precedence value and service grade Map different service grades to hardware queue of switch Configure QoS scheduling method and WRR weighted value Configure SRED Create different classes of flows to control network traffic Control the maximal transmission rate of interface and limit the output traffic of network Add and check static IPv4 routing Add and check static IPv6 routing Perform user account relevant configuration Perform 802 1X relevant configuration Configure Guest VLAN Perform the relevant configuration of storm control and suppression Control network access Authenticate MAC address of device to achieve authentication access Configure anti attack settings Perform DHCP Snooping configuration Perform IP source p
63. 10 25 Huawei Proprietary and Confidential 155 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 42 Configure Interface IPSG X Close Ethernet0 0 41 Interface Mame IPSG Status Dizable me IPSG Matching Options IP amp MAC w Apply Cancel Step 3 Enable IPSG Status for interface in IPSG Status field Step 4 Select binding policy matched interface from the drop down menu of IPSG Matching Options Step 5 Click Apply button to apply the changes made End 9 9 2 Static Binding Table Click Security gt IPSG gt Static Binding Table to add IPSG binding table manually the configuration page is displayed as follows Figure 9 43 Static Binding Table o Current position Security gt IP SG ser Es Static Binding Table RULE r Query All vw Query a nera Name vano Total 0 New Delete Table 9 29 Parameters of Static Binding Table Query Search the static binding table information on the specified interface in Interface Name Interface belongs to host VLAN ID VLAN ID belongs to host MAC Address Host MAC address IP Address Host IP Address Issue 05 2012 10 25 Huawei Proprietary and Confidential 156 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Create a Static Binding Table Entry Step 1 Click Security gt IPSG Step 2 Click Static Binding Table in Tab Step 3 Click New butto
64. 1700 Managed Series Ethernet Switches Web User Manual 4 Interface Management Add a Trunk Group Step 1 Click Interface Management gt Eth Trunk to display a page as shown in Figure 4 6 Step 2 Click New button and add a Trunk group to display a page as shown in following figure Figure 4 7 Add a Trunk Trunk ID 1 v Type Manual Trunk Static LACP Min Active Links 1 1 8 default 1 Max Active Links 8 1 8 default 8 Select Interface A RRA SRA E a R RE A ARARA RS RENO Napa nono olaaa sl Note Each trunk supports up to 8 member interfaces Apply Cancel Step 3 Enter corresponding parameters of Trunk on configuration page Step 4 Click Apply to apply all the changes made End Display Delete Trunk group Step 1 Click Interface Management gt Eth Trunk to display a page as shown in Figure 4 8 the list shows all Trunks created on switch Figure 4 8 Display Trunk List rmo type anaele exces Preem Delay Simo Prompt Delay Times I O 1 Manual Trunk 1 8 O 3 Static LACP 1 8 Disable 30 A Total 2 New Delete Step 2 Choose the check box in the left hand column of Trunk to be deleted then click Delete button to delete Trunk End Configure Trunk Attribute List Step 1 Click Interface Management gt Eth Trunk to display a page as shown in Figure 4 8 Step 2 Click Edit icon in the right hand column of Trunk to be configured Step 3 Configure the required Trunk parameters Step 4 Click Apply t
65. 1s displayed as follows Figure 9 64 SSL Settings o Current position Security gt SSL Settings SSL State Settings SSL Status OEnable Disable Default Disable Apply SSL Certificate Download Certiticate File Browse Name range is 1 64 chars Example s1700_cer crt Download File Key File Browse Name range is 1 64 chars Example s1700_key key Download File SSL Certificate Settings SSL Certificate None i Apply Delete Issue 05 2012 10 25 Huawei Proprietary and Confidential 173 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Table 9 44 Parameters of SSL Settings SSL Status Enable Unable the SSL function on switch SSL Certificate Certificate File Name Select certificate that you would like to Download download from local computer The file name should be only English characters and length should be from 64 characters the file cannot exceed 3K and uploaded certificate cannot be over 10 Certificate file contains user information for authentication and digital signature key The server and client must use the same certificate file to enable SSL Key file Select key that you would like to download from local computer The file name should be only English characters and length should be from 1 64 characters the file cannot exceed 2K Key file contains the exact encryption parameters for authentication session encry
66. 2T2P AC Quidway 1700 V100R001B18 Port 2 on Unit 1 0 52FR 2T2P AC Quidway 1700 V100R001B18 Port 3 on Unit 1 0 52FR 2T2P AC Quidway S1700 V100R001B18 Port 4 on Unit 1 0 52FR 2T2P AC Quidway 1700 V100R001B18 Port 5 on Unit 1 0 52FR 2T2P AC Quidway 1700 V100R001B18 Port 6 on Unit 1 Table 10 20 Parameter of LLDP Local Interface Search the LLDP local information of specified interface in Interface Name Interface Name Interface number Port ID Subtype Interface Type Interface ID Interface ID Port Description It is the string describing the interface such as the interface unit interface number Issue 05 2012 10 25 Huawei Proprietary and Confidential 201 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network View the details of interface Step 1 Click Network gt LLDP Step 2 Click Local in tab Step 3 Click the check box on the left side of the displaying Detail Info interface and then click Detail Info to open the following page Figure 10 36 The details of LLDP Local Interface LLDP Local Information Interface Name 52 PortID Subtype MAC Address Interface ID 0001 0203 0435 Huawei 1700 52FR 2T2P AC 1700 V100R007C00 GigabitEthernet0 0 4 Port PVID 1 Management Address Port Description 4 PPVID 0 VLAN 1 Protocal Identity 3 MAC PHY Configuration Detail Info Link Aggregation Detail Info Total Max Frames 1536 End 10 3 9 Remote
67. 36 Edit IGMP Snooping VLAN X Close r Modify IGMP Snooping VLAN Configuration VLAN 1 Querier Version 2 1 3 Status OEnable Disable Default Disable Querier State Enable Disable Default Disable Fast Leave OEnable Disable Default Disable Report suppression interval 2 0 300 sec deafult 2 Dynamic Mrouter Aging Time 1 1000 sec 0 indicates using global configure viaue General Query Max Response Time 1 25 sec 0 indicates using global configure viaue Specific Query Max Response Time 1 5 sec 0 indicates using global configure viaue Check Router Alert OEnable Disable Default Disable Send Router Alert Enable ODisable Default Enable Last Member Query Interval 1 1 5sec default 1 Robustness Variable 2 2 5 default 2 Query Interval 125 1 31744 sec default 125 Apply Cancel Issue 05 2012 10 25 Huawei Proprietary and Confidential 71 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Table 5 23 Parameters of Editing IGMP Snooping VLAN VLAN Querier Version Status Querier State Report Suppression Interval Dynamic Mrouter Aging Time General Query Max Response Time Specific Query Max Response Time Check Router Alert It is used to identify VLAN which configures IGMP Snooping Set the protocol version that is compatible with other devices on the internet The switch uses this IGMP version to send IGMP comm
68. 4 Port Description Enable System Name Enable is System Description Enabl y System Capablities Enable Apply Cancel Step 4 Enable to publish the relevant parameter Step 5 Click Apply button to apply all the changes made End 10 3 5 Dotl TLVs Click Network gt LLDP gt Dot1 TLVs to configure IEEE802 1 information of advertisement TLV the configuration page is displayed as follows Issue 05 2012 10 25 Huawei Proprietary and Confidential 197 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Figure 10 30 Dot1 TLVs o Current position Network gt LLDP O A AA A Dott TLVs DOER Rte eee Query Interface Name All _v Query iaj Interface Name PVID state VLAN Name State vD Protocal Identity State Protocal Identity Ethernet0 0 1 Enable Enable Enable EAPOL LACP STP MSTP RSTP Ethernet0 0 2 Enable Enable Enable EAPOL LACP STP MSTP RSTP O Ethernet0 0 3 Enable Enable Enable EAPOL LACP STP MSTP RSTP O Ethernet0 0 4 Enable Enable Enable EAPOL LACP STP MSTP RSTP O Ethernet0 0 5 Enable Enable Enable EAPOL LACP STP MSTP RSTP O Ethernet0 0 6 Enable Enable Enable EAPOL LACP STP MSTP RSTP O Ethernet0 0 7 Enable Enable Enable EAPOL LACP STP MSTP RSTP Table 10 17 Parameters of Dot TLVs Search the Dot TLVs settings of specified interface in Interface Name PVID State Whether to publish PVID of the interface Port VLAN ID Configure
69. 5 2012 10 25 Huawei Proprietary and Confidential 18 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches IPv4 Address Settings DHCP Step 1 Click System Management gt IP Management gt IPv4 to display the page as shown in Figure 3 8 Step 2 Click the Edit icon in the right hand column of Default item the configuration page is shown as follows Figure 3 9 IPv4 Address Settings X Close Management Mode Manual w VLAN ID Status Enable e IP Address 192 168 1 253 Subnet Mask 255 255 255 0 Pp Secondary Falze v Apply Cancel Table 3 9 Parameters of IPv4 Address Settings Management mode There are two ways to obtain IP address manual configuration and DHCP Default manual configuration VLAN ID Select management VLAN ID from the drop down menu Choose to enable disable this management interface IP Address The fixed IP management address that user can manually configure when IP address method is selected manual Valid IP addresses consist of four numbers 0 to 255 separated by periods Default 192 168 1 253 Subnet Mask This mask confirms the host address bits used for routing to specific subnets Default 255 255 255 0 The secondary IP address of the switch Step 3 Specified management mode is DHCP Step 4 Click Apply to apply all the changes made End Issue 05 2012 10 25 Huawei Proprietary and Confidential 19 Copyright Huawei Technologies Co Ltd S17
70. 5 Huawei Proprietary and Confidential 74 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Apply the ACL number on the interface The switch will use this ACL rule to deal with multicast message when receiving it Create an IGMP Group Policy Step 1 Click Service Management gt IGMP Snooping gt Group Policy Step 2 Click New button to open the configuration page shown as the figure below Figure 5 40 Add Group Policy r Add Group Policy VLAN Interface OEth Trunk List Press Ctrl or Shift selcet more ports ACLID 1 1999 Apply Cancel Table 5 27 Parameters of IGMP Snooping Group Policy VLAN Specify VLAN for transmitting multicast service if no specified interface or Eth Trunk this configuration is multicast policy based on VLAN otherwise the multicast policy based on interface Select Interface Eth Trunk List Select Trunk ACL ID When applying the ACL number on interface regardless of configuring VLAN multicast policy or configuring interface s multicast policy only one ACL rule can be configured Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes below End Issue 05 2012 10 25 Huawei Proprietary and Confidential 75 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management 5 6 5 Static Groups C
71. 75 DAT al SINNER Clas 176 OE sailor taanaen lod tment sidiaewonet Semmes E 177 KORSAN ME C o AAA O A 178 0 ASNME TT OS cog 8 dais doi 179 IOLO SNME GROUP aras 181 PO UIT A O A EE 183 WOT SINR Trap etnia ri a si tuaagte 185 2 MON toria loto 186 OR AUS AG nat cid coa 187 1O22 HISO A A aticnaniee 188 O SAT sarao 190 A O A A ate 192 W SEEDER ahaa a total saa a a a a 193 W EOD ea ORO 193 EA A AE II NAAA TEE A A E E A eaten E E NEE 194 LO 3 3 Address Mana SE meite nsiini ao 196 IOSA The Basis or T L Vinen e E E E 196 S DOTEN aa r a O a e A A 197 OSO DO ENS a dci lio 199 O ESE TINS LALIS 1CS EPA IE o O CR PER O OE AE T E A N 200 A II E cet pu neces NE cet pu tee e nao area ete cet pe tect eee ease 201 O O ae ere eer ere 202 IOA ECEDPEME Drain 203 1041 Global Comme uration see e lll id 203 IOA 2 ner eeo ii a oi ca tuanes 204 NA Tocina Sa 205 10 44 Remote Interface Information sta aa 206 TT Device Mana MENE cocioitanicana dai Ae DA RDA ISR dai IA iaa 207 Issue 05 2012 10 25 Huawei Proprietary and Confidential vii Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Contents Heey ce Mana sE mentre ilatina oli oirlo 207 WA LB OAC SAUS a A A A id 207 TLI A A E A 208 IEZ Dey ece Dacos Sea n A 208 11 21 Tnt rtace Loopback Testi dera idad 208 112 2 WET Cable Did SiO Stic Si a cias 209 A A AN 210 LA Tornado Center O A Si A A A A A ZE 210 11 41 Parameter Setinos ii a ino 210 HAZ EOS
72. 8 Traffic Policy o Current position QoS gt Traffic Management Traffic Classifier Traffic Behavior Traffic Policy Hide ites te lo Total 0 New Delete Note The class map in a particular policy map takes precedence over those added after it Table 7 14 Parameters of Traffic Policy Policy Name Name of policy profile Classifier Name Classifier profile name bound to this policy profile Behavior Name Bind to behavior profile of classifier profile designated by classifier name of this policy profile Add a Traffic Strategy Step 1 Click QoS gt Traffic Management gt Traffic Policy Step 2 Click New button to add a stream policy opening the configuration shown as the figure below Figure 7 19 New Traffic Policy Policy Name 1 32 chars Add Apply Cancel Step 3 Enter a name in Traffic Policy Name bar Step 4 Click Apply button to bind a pair of traffic classifier and traffic behavior for traffic policy Step 5 In pull down menu of Traffic Classifier and Traffic Behavior select respectively the traffic classifier profile and traffic behavior profile to be bound Step 6 Click Apply button to apply all the changes made End Issue 05 2012 10 25 Huawei Proprietary and Confidential 111 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration 7 8 4 Apply Traffic Policy Click QoS gt Traffic Management gt Apply Traffic Policy to apply traffic po
73. AE EPEA E OE OP O E E oo E IE T O N 42 O II ENA 43 Ml Global Ratameter Cont curo dnd dll rior tidiada 44 SRO IMS E 1e acetate usin ac E E E dc eee a ners prema nee T E eed aun te Re 45 zo Y O A O A eases 46 Dee DO A VEGAN DEVIC E PPP PEPE ana sa cantata tanec iacmine conten ast cnet nbite se E E a ea tain 47 SON EDP WMIED Voice Dori C Ene o 48 Ns tenecane teen a ne se eam sae ua teca se EE 49 ENAC as toes A T E T T RT 49 IAEF IMAC Address Table e a os o O 49 a IN A A O CE 50 SAS loi MAC e A E OE OO o sass toaualnecunad bsausatnadleaneascamansnscligndt tana 51 S44 Blackhole MAC Table e e 52 ENA CPE a a a a E EE 54 AO Mistate MAC Tablas a a a a Aa 54 TOTP e aca A A e O e 55 ASI ls A A EE E E AES NE E A NE E assets 55 IO AS ly AA o E E ON 57 A A AO e E E A S E E a Pere 60 IORN TER Oea a O Cree rm ae 66 OVP SO OPIS PAE OPERA OO AA RA 68 01 Global ad lan 68 DO MAN Parametros tiidmesauanans 70 30 0 Group DEM ad 73 56 4 GOUD PONCY ia id dde 74 Issue 05 2012 10 25 Huawei Proprietary and Confidential Vv Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Contents DO A A ta vatousiiedvnehbansansisaaebs O a 76 FOOGT O aa E A A EEE A eaeateeat 78 SOT OUE E enra a a E aus saumincos ann shunadteosonasueome poneua ad ceeaneuseataaiedGs 78 IONO MCE RR 79 De Pe ObWaAnGIN eG tables ii a da dis an 80 GAC T C One UraliOn wrasse nesta naiua ieee ae ees 82 AE EG A A O O A E 82 ODAC Te Protein
74. AN Voice VLAN is only enabled on one VLAN VLAN Name Set VLAN name of enabled Voice VLAN Voice VLAN is only enabled on one VLAN Priority Define CoS priority of interface in Voice VLAN When Voice VLAN is opened the interface will forward the data based on the CoS field in message Range 0 7 Default 6 Aging Time The interface will be deleted from Voice VLAN if it no longer receives the VoIP traffic during a certain time Range 5 43200 minutes Default 1440 minutes Configure VLAN ID of Voice VLAN as 2 Step 1 Click Service Management gt Voice VLAN gt Global Step 2 Choose Enable under Global State to enable Voice VLAN Step 3 Specified ID of VLAN ID is 2 Issue 05 2012 10 25 Huawei Proprietary and Confidential 44 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Step 4 Click Apply button to apply all the changes made End 5 3 2 Interface Click Service Management gt Voice VLAN gt Interface page to configure Voice VLAN based on interface the configuration page is shown as the figure below Figure 5 10 Voice VLAN Interface o Current position Service Management gt Voice VLAN CIA AZ ATI O Ethernet0 0 1 Disable Auto Enable Down O Ethernet0 0 2 Disable Auto Enable Down O Ethernet0 0 3 Disable Auto Enable Down O Ethernet0 0 4 Disable Auto Enable Down O Ethernet0 0 5 Disable Auto Enable Down O Ethernet0 0 6 Disable Auto Enable Down
75. Action Action executed by this behavior Permit or deny messages matched to classifier rule Traffic Statistics Whether to enable traffic statistics function for message matching to traffic classification rule When enabled click traffic policy in application of traffic policy to display Statistics Configure Traffic Policing Measure the matched traffic and color the classified traffic according to the specified Mode and corresponding parameters There are three modes Rate srTCM and trTCM Configure Re mark Action Remark the matched messages 802 1p priority Mark priority for message and make queue strategy according to this priority Local priority Specify local queue number IP precedence Marks priority of IP message DSCP priority Marks DSCP value of IP message Alternatively select 802 lp priority or local queue Alternatively select IP priority or DSCP priority Configure Redirection Redirect the matched message to specified interface Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes made End Issue 05 2012 10 25 Huawei Proprietary and Confidential 110 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration 7 8 3 Traffic Policy Click QoS gt Traffic Management gt Traffic Policy to view traffic policy configured on switch the configuration page is shown as the figure below Figure 7 1
76. Addr 1 1024 default 128 Apply Cancel Table 9 15 Parameters of Configuring Port Security Display interface number Enable or Disable port security on the interface Security Action Protect When the number of learned MAC address reaches the limitation number of interface the interface will drop the message whose source address 1s not included in MAC table Restrict When the number of the learned MAC address reaches the limitation number of interface the interface will drop the message whose source address is not included in MAC table and record it in the system log Shutdown When the number of the learned MAC address reaches the limitation number of interface the interface will execute Shutdown operation and record it in the system log Static Address Aging Enable or Disable static address aging Sticky Learning Sticky is used to convert the dynamic MAC address learned on the interface to static MAC address When the Maximum number of MAC reaches the upper limitation the interface will not learn new MAC address and only allow the security MAC to communicate with the switch which not only avoids the lost dynamic Mac s re learning after the device reboots but also prevents the untrusted MAC host from communicating with the switch through the interface Issue 05 2012 10 25 Huawei Proprietary and Confidential 139 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9
77. Click Apply button to apply all the changes made End 1 802 1X Authentication can not be enabled on the port with MAC authentication enabled 2 802 1X Authentication can not be enabled on port with port security enabled 3 802 1 X Authentication can not be enabled on link aggregation port 9 2 4 Authorized Status Click Security gt 802 1X gt Authorized Status to display 802 1X Authorized Status of interface on switch Figure 9 10 Authorized Status o Current position Security gt 802 1X Query Interface Name All v Query Interface Name MAC Address Original VLAN PAE State Backend State Authorized Status Authorized VLAN Total Authenticating Hosts 0 Total Authenticated Hosts 0 Issue 05 2012 10 25 Huawei Proprietary and Confidential 128 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Table 9 7 Parameters of Authorized Status Query Search authentication status information of interface specified in Interface Name Interface Number MAC Address MAC address of the client Original VLAN VLAN before authentication PAE State Display one of the following options of PAE status of authenticator Initialize Disconnected Connecting Authenticating Authenticated Aborting Held ForceAuth or ForceUnauth Backend State Display one of the following options of backend status Request Response Success Fail Timeout Idle or Initialize Authorized Status Display
78. Click a created extending IPv6 rule in ACL list and click New button in the list box of ACL Rule opening the configuration page shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 88 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration Figure 6 7 Create Rule of Extending IPv6 ACL ID 4000 Rule ID 1 65535 If not specified system to automatically assign Action Permit Deny Protocol Type TCP v Match IPv6 All Source IPv6 O Specify Source IPv6 Prefix Length All Detination IPv6 Specify Detination IPv6 Prefix Length Match Port Source Port Please Select vw 0 655 O f Destination Port Please Select v 0 65535 0 65535 Match Packets Traffic Class 0 255 Flow Label 0 1048575 TCP Flag C ack fin C psh C rst C syn C urg Time Range Name Please Select Apply Cancel Table 6 7 Parameters of Extending IPv6 Rule ACL ID ACL entry number that rule belongs to Rule ID Enter rule number and the value ranges from 1 to 65535 If not specified the system will assign automatically Specify switch to permit or deny data stream that matches to the rule Protocol Type Specify IP v6 protocol type to be matched with data Next Header Field Match IPv6 Source IPv6 address All source IPv6 specify this rule to be applied to all IP data packages Specify Source IP Prefix Length specify this rule to be applied to the IP data packa
79. Format Configuration Specify whether there are separators in MAC address or not Separator Number Specify the number of separator in MAC address 2 There are two hyphens in MAC address and the format of MAC address is HHHH HHHH HHHH 5 There are five hyphens in MAC address and the format of MAC address is HH HH HH HH HH HH Issue 05 2012 10 25 Huawei Proprietary and Confidential 146 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security 9 7 Attack Prevent 9 7 1 Worm Prevent Click Security gt Attack Prevent gt Worm Prevent the configuration page 1s displayed as follows Figure 9 30 Worm Prevent o Current position Security gt Attack Prevent Worm Prevent EKA eur ji mabe mane cams Destination Por atack Sites 4 O 135 Blaster TCP Edit Clear Delete 2 Fl Blaster TCP 139 Edit Clear Delete O Blaster TCP 445 Edit Clear Delete 4 O Blaster TCP 593 Edit Clear Delete 5 g NachiBlast TCP 707 Edit Clear Delete 6 O SQLSlammer TCP 1433 Edit Clear Delete 7 O SQLSlammer TCP 1434 Edit Clear Delete 8 O Phatbot TCP 4387 Edit Clear Delete 9 O Sasser TCP 5554 Edit Clear Delete 10 O Sasser TCP 9996 Edit Clear Delete Apply Refresh Total 17 KE gt gt gt Go New Table 9 22 Parameters of Worm Prevent Enable Select whether to enable the worm prevent or not Virus Name The name of Virus Protocol Type The Protocol used by virus Destination Port
80. INFO 6 Spanning Tree Protocol is enabled 6 2012 01 04 06 36 10 INFO 6 Link Aggregation Group 2 link up 7 2012 01 04 06 36 10 INFO 6 Ethernet0 0 48 attach to Link Aggregation Group 2 8 2012 01 04 05 48 13 INFO 6 Successful login through Web Username admin IP 192 168 0 5 9 2012 01 04 05 39 20 INFO 6 Successful login through Web Username admin IP 192 168 0 5 10 2012 01 04 05 00 09 INFO 6 Successful login through Web Username admin IP 192 168 0 78 Total 49 E23 gt gt gt Go Table 11 5 Parameters of Log Information Issue 05 2012 10 25 Huawei Proprietary and Confidential 212 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 11 Device Management 11 5 Power Saving Management Use Device Management gt Power Saving Management page to enable disable power saving function The switch supports IEEE 802 3az EEE power saving standard Figure 11 8 Power Saving Management a Current position Device Management gt Power Saving Management Power Saving O Enable Disable Default Disable EEE O Enable 5 Disable Default Disable Apply Table 11 6 Parameters of Power Saving Management Power Saving Select Enable to enable the function of power saving The default setting 1s Disable EEE The switch supports power saving standard of IEEE 802 3az Select Enable to enable the power saving function of EEE The default setting is Disable ZN caution S1700 28FR 2T2P AC
81. If the user response does not receive exceeding three times Request Identity the switch will disconnect automatically The range is 5 1024 and the default is 15 seconds Max User In Host based mode 1t means the maximum number of host to which the interface 1s connected Range 1 256 Default 16 In Port based mode the interface parameter MAX User cannot be set and the displayed value is insignificance Configure 802 1X of Interface Step 1 Click Security gt 802 1X Step 2 Click Interface Configuration in tab Step 3 Click checkbox on the left of interface to be configured to 802 1X and click Configure button opening configuration page of interface 802 1X Issue 05 2012 10 25 Huawei Proprietary and Confidential 127 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 9 Interface Settings Ethernet0 0 41 Interface Name Quiet Period 60 10 3600 sec default 60 Supp Timeout 30 1 120 sec default 30 Server Timeout 30 1 120 sec default 30 ReAuth Period 3600 60 7200 sec default 3600 TX Period 30 1 120 sec default 30 Handshake Period 15 5 1024 sec default 15 MaxReq 2 1 10 times default 2 Max User 16 1 256 default 16 ReAuthentication Disable v Port Control Auto i Port State Disable he AdmDir RX amp TX i Apply Cancel Step 4 Modify authentication setting for interface as needed Step 5
82. L entry Standard IP Extended IP Extended Ipv6 Extended MAC or User defined Standard IP indicate switch to detect source IP address for each packet s header Only can detect IPv4 Ether Type is 0x0800 Extended IP indicate switch to detect protocol type source destination IP address source destination interface member IP TOS priority or TCP mark for each packet header Only can detect IPv4 packet Ether Type is 0x0800 Extended IPv6 indicate switch detects protocol type source destination IPv6 address source destination Interface IP TOS priority or TCP tag for each IPv6 packet header Only can detect IPv6 packet Ether Type is Ox86DD Extended MAC Indicates the switch to detect each frame header s source destination MAC address Ethernet type or 802 1p priority Only can detect IP packets Ether Type non 0x0800 IPv4 and none Ox86DD IPv6 User defined user can specify the address and content of test kits please refer to user defined rule creation Step The starting number and distribution interval when the step automatically assigns rule number ACL Description Display functional description of ACL entry Issue 05 2012 10 25 Huawei Proprietary and Confidential 84 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration ACL Rule Rule ID Display rule number Action Permit indicates switch forwarding packets which match with the rule D
83. LLDP MED Global Configuration Remote Interface Information Global Configuration LLDP MED Log State OEnable Disable Default Disable Apply Fast Start Repeat Count 1 10 1 10 Apply r LLDP MED System Information Device Class Network Connectivity Device Hardware Revision Firmware Revision 1 00004 Software Revision 1700 V100R007C00 Serial Number Manufacturer Name Huawei Model Name S1700 52FR 2T2P AC AssetID Table 10 22 Parameters of Global Configuration Issue 05 2012 10 25 Huawei Proprietary and Confidential 203 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Asset ID The switch asset identifier which is used for directory managing and asset tracking 10 4 2 Interface Click Network gt LLDP MED gt Interface the configuration page is displayed as follows Figure 10 39 Interface o Current position Network gt LLDP MED A a ete Interface Remote Interface Information Query Interface Name All v Query m interface Name Topology Change Notification Status LLDP MED Capabilities TLV LLDP MED Network Policy TLV LLDP MED Inventory TLV O Ethernet0 0 1 Disable Enable Enable Enable Ethernet0 0 2 Disable Enable Enable Enable Ethernet0 0 3 Disable Enable Enable Enable Ethernet0 0 4 Disable Enable Enable Enable OOO Table 10 23 Parameters of Interface Query Search the LLDP MED information of specified interface
84. Loopback Test to select the interface which is to be diagnosed from the interface list and then click Start Diagnose button to diagnose the configuration page 1s displayed as follows Figure 11 3 Interface Loopback Test Current position Device Management gt Device Diagnostics Interface Loopback Test MUA AD LOE o Do Interface Name Loopback Test Result Ethernet0 0 1 Ethernet0 0 2 Ethernet0 0 3 Ethernet0 0 4 Ethernet0 0 5 Ao eo Issue 05 2012 10 25 Huawei Proprietary and Confidential 208 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 11 Device Management Table 11 1 Parameters of Interface Loopback Test Interface Name Name of Ethernet port Loopback Test Result Display the result of interface loopback test 11 2 2 VCT Cable Diagnostics Use VCT Cable Diagnostic to detect cable condition and error type Click Device Management gt Device Diagnostics gt VCT Cable Diagnostics to select the interface which is to be diagnosed from the interface list and then click Start Diagnose button to diagnose the configuration page is displayed as follows Figure 11 4 VCT Cable Diagnostics 0 Current position Device Management gt Device Diagnostics tates menses A VCT Cable Diagnostics B interface Name Connect Status Diagnostic Result Diagnose Status O Ethernet0 0 1 No Diagnose Ethernet0 0 2 No Diagnose Ethernet0 0 3 No Diagnose Ethernet0 0 4 No Diagnose E
85. O Ethernet0 0 7 Disable Auto Enable Down O Ethernet0 0 8 Disable Auto Enable Down O Ethernet0 0 9 Disable Auto Enable Down F Ethernet0 0 10 Disable Auto Enable Down Table 5 5 Parameters of Voice VLAN Interface Display if the Voice VLAN function will be enabled on interface Working Mode Specify if the interface will be added to the Voice VLAN when VoIP traffic is detected Auto the interface will be added as a tagged member to the Voice VLAN after traffic is detected Manual the interface will be manually added to the Voice VLAN after the Voice VLAN feature is enabled Security Mode Enable security filtering to ensure that only the VoIP traffic can be forwarded on Voice VLAN VoIP traffic is identified by source MAC addresses in Voice VLAN OUI list to discover the VoIP device Legacy Enable devices to recognize each other by friendly communication The switch will recognize its friendly device based on the message sent by the receiving device Configure Voice VLAN based on Interface or Interface Range Step 1 Click Service Management gt Voice VLAN gt Interface Issue 05 2012 10 25 Huawei Proprietary and Confidential 45 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Step 2 Choose the interface number to be configured from the interface list and then click Configure button to open the page as shown in following figure Figure 5 11 Configure Voice
86. Security Aging Type Inactivity The system will check whether there is a traffic coming from the security address every one minute If there is no traffic coming from the security address the security address will be automatically deleted and become the untrusted address after the specified time aging time Absolute The system will check whether there 1s a traffic coming from the security address every specified time aging time If there 1s no traffic coming from the security address the security address will be automatically deleted and become the untrusted address at once Aging Time Set the aging time of MAC address The value ranges from 1 to 1440 minutes The default is 0 which means always effective MaxsecureA ddr Maximum number of MAC address that the interface can learn the value ranges from 1 to 1024 and the default 1s 128 Step 4 Enable or disable port security in Port Security Step 5 Click Apply button to apply all the changes made End ZN caution Port security cannot be enabled on link aggregation member port Port security can not be enabled on the port when 802 1X is enabled Port security can not be enabled on the port when MAC based access control is enabled 9 5 2 Port Security Address Information Click Security gt Port Security gt Port Security Address Information to view security address and create static security address the configuration page 1s displayed as follows Figure 9 22 Port
87. Security Address Information o Current position Security gt Port Security A ca iio Port Security Address Information PHASE il Query Interface Name LAI w Query ICI TN Remang ume mr Total 0 New Delete Clear Issue 05 2012 10 25 Huawei Proprietary and Confidential 140 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Table 9 16 Parameters of Port Security Address Information Query security address information of interface specified in Interface Name Interface Number VLAN Bound VLAN number MAC Address Bound MAC address Type Bound type of MAC address Configured Statically configured bound entry Sticky Sticky entry Dynamic Dynamically learned entry Remaining Time The displayed in Remaining Time field is based on the following three conditions Firstly the aging time 1s not configured secondly the aging time is configured and the type of aging time is absolute thirdly the aging time is configured and the type of aging time is inactivity and there is traffic of the security address If the aging time is not configured the security address will never be automatically deleted Create a Security Address Entry Step 1 Click Security gt Port Security Step 2 Click Security Address Information in Tab Step 3 Click New button to add new security address information entry the configuration page is displayed as follows Figur
88. Step Length 4096 Advanced Configuration Issue 05 2012 10 25 Huawei Proprietary and Confidential 58 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Working Mode Specify types of spanning tree adopted on this switch STP select this parameter to set global spanning tree protocol on switch STP RSTP select this parameter to set global rapid spanning tree protocol on switch RSTP MSTP select this parameter to set global multiple spanning tree protocol on switch MSTP Bridge diameter Bridge diameter 2 7 in step of 1 calculate the default Forward Delay Hello Timer Max Age based on the different Network diameter Max Hops Set the device hops among the devices within spanning tree regions before the BPDU packets are discarded by the switch The number of hop will be reduced one when each packet passes through the switch until the hop count to zero At this point the switch will discard the BPDU packet and interface information in packet will be time out Value ranges from 6 to 40 default is 20 Pathcost Standard Choose the standard of path cost calculation The options are as follow dot1t dot1d 1998 and legacy BPDU Protection Under normal circumstances the edge interface will not receive a BPDU If someone attacks device maliciously with fake BPDU the switch will automatically set the edge interface to non edge interface and re calcul
89. T Chunk 4 Data Ox Ox0 Oxfifftit Mask Ox Ox0 Oveittt Time Range Name Please Select Apply Cancel Issue 05 2012 10 25 Huawei Proprietary and Confidential 91 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration Table 6 9 Parameters of User Defined Rule ACL ID ACL entry number that rule belongs to Rule ID Enter an ID for rule and the range of value is 1 65535 If not specified the system will distribute automatically Action Specify switch to permit or deny data stream that matches to the rule Chunk 1 Specify the user defined content of the first passage to be matched Content the data needed to be matched Mask used to set destination data range the location that mask with value of 0 corresponds to is indifference then it can be O or 1 the location that mask with value 1 corresponds to is matching location then it should be matched accurately The content will match the whole field if no mask entered If ACL doesn t select this segment it can not be set Chunk 2 Specify the user defined content of the second passage to be matched Content the data needed to be matched Mask used to set destination data range the location that mask with value of O corresponds to is difference then it can be 0 or 1 the location that mask with value 1 corresponds to is matching location then it should be matched accurately The content will match
90. Total 0 New Delete Table 6 12 Parameters VLAN Application VLAN Application Name Interface name of switch VLAN List Display VLAN ID of the application rules Bind ACL List Display ACL list that has been applied to VLAN Create a VLAN Application Name Step 1 Click ACL gt ACL Application gt VLAN Application Step 2 Click New button to create a application entry of VLAN rule opening the configuration page shown as the figure below End Figure 6 14 New VLAN Application X Close VLAN Application Name 1 32 chars Bind VLAN VLAN List 1 4094 Example 1 3 5 Apply Cancel Table 6 13 Parameters of New VLAN Application VLAN Application Name Specify name applied by VLAN Bind VLAN Specify VLAN ID number for the applied rule LU NOTE A VLAN ID can only be applied to one VLAN entry application Step 3 Click Application button to apply all the changes made Issue 05 2012 10 25 Huawei Proprietary and Confidential 95 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration Step 4 Click Edit button behind VLAN application name and apply ACL rule to VLAN application name Figure 6 15 Apply ACL Rule to VLAN Application X Close VLAN Application Name 1 Bind VLAN V LAN List 1 1 4094 Example 1 3 5 Apply Delete m Bind IP ACL IP ACL List Please Select Apply Delete r Bind MAC ACL MAC ACL List Please Sel
91. Total Max Frames Apply Cancel Step 4 Enable to publish the relevant parameter Step 5 Click Apply button to apply all the changes made End 10 3 7 System Statistics Click Network gt LLDP gt System Statistics to display LLDP information receiving and sending from local interface the configuration page 1s displayed as follows Figure 10 34 System Statistic o Current position Network gt LLDP Global Port Settings Address Management The Basis of TLVs Dot1 TLVs Dot3 TLVs System Statistics Query Interface Name Query All Mi Total Transmission Total Discard of Received Receive Error The Total Received Total Discard of Received Receiving Total Unknown The Total Time out Neighbor serena anes Frame Frame Frame Frame TLVs TLVs Information O 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Ethernet0 0 1 O Ethernet0 0 2 O Ethernet0 0 3 0 0 0 0 0 0 0 Table 10 19 Parameters of System Statistic Search the system statistics of specified interface in Interface Name Total Transmission Frame Total number of transmitted LLDP PDU frame Total Discard of Received The number of LLDP PDU frame that has been received but dropped due to property loss or insufficient memory or other reasons Receive Error Frame The received LLDP PDU frames contain one or more unknown error Issue 05 2012 10 25 Huawei Proprietary and Confidential 200 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet S
92. VLAN Interface Ethernet0 0 1 Interface Name Status Enable Disable Default Disable Working Mode Auto Manual Default Auto Security Mode Enable Disable Default Enable Legacy Up Close Default Down Apply Cancel Step 3 Set Voice VLAN parameters for interface Step 4 Click Apply button to apply all the changes made End LU NOTE When Eth Trunk is used the Voice VLAN attribute of Eth Trun interface will follow the principles below 1 If Eth Trunk is created the Voice VLAN attribute of Eth Trunk interface is set as default value 2 If added to Eth Trunk the interface will be not displayed in Voice VLAN interface list 3 Ifremoved from Eth Trunk the Voice VLAN attribute of original interface will recover 5 3 3 Voice VLAN OUI VoIP device connected to the switch can be identified by Organizational Unique Identifier OUI of manufacturer in the source MAC address of received packets OUI numbers are assigned to manufacturers and form the first three octets of device MAC addresses The MAC OUI numbers for VoIP equipment can be configured on the switch so that traffic from these devices is recognized as VoIP Click Service Management gt Voice VLAN gt Voice VLAN OUI page to set Voice VLAN OUT for switch Figure 5 12 Voice VLAN OUI o Current position Service Management gt Voice VLAN ICH IET E Deset Total 0 New Delete Issue 05 2012 10 25 Huawei Proprietary and Confidential 46 Copyright Hua
93. ace the configuration page is shown as the figure below Figure 5 8 Edit MAC VLAN Function of Interface X Close Ethernet0 0 1 Interface Name Status Enable Disable Default Disable Apply Cancel Step 3 Click Enable button to enable MAC VLAN function of the interface End LL NOTE MAC VLAN can be enabled only on hybrid interface When Eth Trunk is used the MAC VLAN attribute of Eth Trunk interface will follow the principles below 1 If Eth Trunk is created the MAC VLAN attribute of Eth Trunk interface is set as default value 2 If added to Eth Trunk the interface will be not displayed in MAC VLAN interface list 3 Ifremoved from Eth Trunk the MAC VLAN attribute of original interface will recover 5 3 Voice VLAN It is recommended that the VoIP network traffic should be separated from other data traffics when deploying IP technology in enterprise network Flow separation can prevent data packet delay packet loss and the blocking effect of voice through distributing all the VoIP traffic into an independent Voice VLAN thus ensures higher voice quality The usage of Voice VLAN can bring many benefits to users It provides a higher security by separating VoIP traffic from other traffics In network Voice VLAN ensures the necessary bandwidth to transmit voice by using end to end QoS policy and high priority VLAN separation also protects against the unnecessary broadcast and multicast traffic which will
94. ace name s acne pts O Ethernet0 0 1 Disable IP amp MAC O Ethernet0 0 2 Disable IP amp MAC O Ethernet0 0 3 Disable IP amp MAC Table 9 28 Parameters of IPSG Settings Query Search the IPSG settings of specified interface in Interface Name Interface Name Interface Number Status IPSG function status on interface Matching Options Display the binding policy on interface The switch will check if the packet conforms to the binding table configured on interface according to the Matching Options The options are as follows IP Match IP address only MAC Match MAC address only VLAN MatchVLAN ID only IP amp MAC Match IP and MAC address IP amp VLAN Match IP and VLAN ID MAC amp VLAN Match MAC address and VLAN ID IP amp MAC amp VLAN Match IP address MAC address and VLAN ID ZN caution After IPSG enabled if the interfaces do not configure any binding table interface will prevent all IP packets IPSG don t support DHCP snooping trust port If DHCP snooping port trust state is enabled IPSG cannot be enabled and vice versa IPSG don t support Link Aggregation If port is the member of Link Aggregation IPSG cannot be enabled and vice versa Configure IPSG Parameter for Interface Step 1 Click Security gt IPSG Step 2 Click the checkbox on the left side of IPSG parameter interface to be configured and then click Configure button the configuration page 1s displayed as follows Issue 05 2012
95. ace to be modified on attributes from Trunk Member list click Configure button of the list and edit attributes of the designated interface Figure 4 11 Edit Member Attributes Ethernet0 0 3 Interface Name LACP Timeout Short Long Default Short Working Mode O Active Passive Default Passive LACP Priority 32768 OHigh 65535Low default 32768 Apply Cancel Issue 05 2012 10 25 Huawei Proprietary and Confidential 34 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 4 Interface Management Table 4 6 Parameters of Member Attributes LACP Timeout Specify LACP message timeout selecting Short means three seconds selecting Long means ninety seconds Working Mode Specify LACP operation mode of interface LACP Priority Specify LACP priority of interface Range 0 65333 Default 32768 Step 4 Configure the parameters needed Step 5 Click Apply button to apply all the changes made End Issue 05 2012 10 25 Huawei Proprietary and Confidential 35 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Service Management About This Chapter This chapter mainly describes VLAN STP and IGMP Snooping relevant configurations of the switch 5 1 VLAN 5 2 MAC VLAN 5 3 Voice VLAN 5 4 MAC 5 5 STP 5 6 IGMP Snooping 5 1 VLAN VLAN Virtual Local Area Network means logically dividing a LAN Loc
96. ackets and the total number of packets History group is the statistics of periodic information about the interface to receive packets The length of period can be configured via the command line Use Network gt RMON gt History to view the information about ROMN history group configured on the switch the configuration page is displayed as follows Issue 05 2012 10 25 Huawei Proprietary and Confidential 188 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Figure 10 17 History o Current position Network gt RMON A O 1 13612122111 monitor 50 30 O 2 E a rl ly monitor 50 1800 O 3 13612122112 monitor 50 30 O 4 13612122112 monitor 50 1800 O 5 13612122113 monitor 50 30 O 6 13612 122113 monitor 50 1800 O 7 1 3 6 1 2 1 2 2 1 1 4 monitor 50 30 O 8 136812122114 monitor 50 1800 O 9 13612122115 monitor 50 30 O 10 T3612 122115 monitor 50 1800 Total 104 my lt lt lt B23 gt gt gt Go New Delete Detail Info Table 10 10 Parameters of History Buckets Specify the maximum entry count of history for storing sampled data each time If the history is full the new sampled data will replace the oldest one The range of this value is 1 8 and default value is 8 Interval Specify sampling interval in seconds within 1 3600 seconds The default value is 1800 seconds Create a RMON History Group Step 1 Click Network gt RMON Step 2 Click History in Tab and click New to
97. addresses from address table Add a Static MAC Address Step 1 Click New button to add a static MAC address the configuration page is shown as the figure below Figure 5 20 Add Static MAC Address X Close MAC Address H H H VLAN ID 1 4094 Interface Name Ethernet0 0 1 we Apply Cancel Step 2 Enter the static MAC address information to be added in configuration page Step 3 Click Apply button to apply all the changes made End 5 4 4 Blackhole MAC Table Click Service Management gt MAC gt Blackhole MAC Table page to open the page as shown in following figure which displays the information of Blackhole address table on switch Issue 05 2012 10 25 Huawei Proprietary and Confidential 52 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Figure 5 21 Blackhole MAC Table o Current position Service Management gt MAC MAC Address Table MAC Aging Time Static MAC Table Blackhole MAC Table i Ness cigs AA Flom Fle Query MAC Address VLAN ID Query ia MAC Address VLAN ID Total 0 New Delete Delete All Table 5 13 Parameters of Blackhole MAC Table Query Search the matched blackhole address entry in address table through MAC address and VLAN ID MAC Address MAC address in address table VLAN ID VLAN ID relevant to the above MAC address New Click this button to add a blackhole MAC address Delete Click this button to delete Blackhole
98. aees Total 0 New Delete Delete All Issue 05 2012 10 25 Huawei Proprietary and Confidential 21 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches 3 8 2 Dynamic ARP Click System Management gt ARP gt Dynamic ARP page to display the switch detected dynamic ARP entries and set the aging time for ARP cache entries the configuration page is shown as the figure below Figure 3 13 Dynamic ARP o Current position System Management gt ARP Sci Dynamic ARP Aging Time 20 0 65535 min default 20 Apply O vlan1 192 168 1 5 0016 7629 C7AA O vlan1 192 168 1 78 00E0 4C01 0412 O vlan1 192 168 1 89 001B 38B7 3AD3 Total 3 EM Go Delete Delete All Table 3 12 Parameters of Dynamic ARP Aging Time Set the aging time for dynamic entries in the ARP table Range 0 65535 minutes Default 20 minutes The ARP aging timeout can only be set globally for all VLANs IP Address Dynamically detected IP address MAC Address Dynamically detected MAC address Dynamic ARP Aging Time Configuration Step 1 Click System Management gt ARP gt Dynamic ARP Step 2 Set aging time in Aging Time field for ARP Step 3 Click Apply to apply all the changes made End 3 9 IPv6 Neighbor 3 9 1 Static Neighbor Click System Management gt IPv6 Neighbor gt Static Neighbor page to display and add IPv6 static neighborhood information the configuration page is shown as the figure below Issue 05 2012 10 25 Huawei Propriet
99. after Trap is configured Click Network gt SNMP gt SNMP host the configuration page is displayed as follows Issue 05 2012 10 25 Huawei Proprietary and Confidential 179 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Figure 10 6 SNMP Host o Current position Network gt SNMP OEZ User based Security Model Security Level Community String SNMPv3 User Name Total 0 New Delete Table 10 4 Parameters of SNMP Host Host IP The IP address of remote management site which serves as SNMP host of switch User based Security Model SNMPv1l Specify the version of SNMP that will be used SNMPv2c specify the version of SNMP that will be used SNMPv2c supports the centralized and distributed network management strategies It includes the improvements of Structure of Management Information and adds some security features SNMPv3 Specify the version of SNMP that will be used SNMPv3 provides secure access for equipment by authenticating and encrypting the packets on the network Security Level NoAuthNoPriv Specify NoAuthNoPriv security level which means the authentication and the encryption is not required by the packet between the specified switch and the remote SNMP manager AuthNoPriv Specify AuthNoPriv security level which means only the authentication is required by the packet between the specified switch and the remote SNMP manager AuthPriv Specify AuthPriv sec
100. aged Series Ethernet Switches Web User Manual 11 Device Management End 11 7 2 Tracert Tracert is a utility program used to confirm the route that IP packet will take to access the target Tracert determines the route from a host to another host in the network by sending ICMP error packets with time to live TTL values Click Device Management gt Tools gt Tracert the configuration page is displayed as follows Figure 11 11 Tracert o Current position Ping Test Tracert One Key Information Device Management gt Tools r IPv4 Tracert Test IP Address TTL 30 Timeout Probe Times 1 Start 1 60 sec default 30 1 65535 sec default 5 1 9 times default 1 IPv6 Tracert Test IP Address TH 30 Timeout Probe Times 1 1 60 sec default 30 1 65535 sec default 5 1 9 times default 1 Start Table 11 9 Parameters of Tracert IP Address Enter IP address which needs to do Tracert test TTL Enter the lifetime of IP packets Tracert determines the route by incrementing the TTL value by 1 on each subsequent transmission until the target responds or reaches the maximum TTL value Timeout Enter the maximum response time of Tracert test The test ignores the responding from the target if the value is exceeded then sends out the next testing message Probe Times Enter the value that is the retrying times after the failure of tracert test with the same TTL value Imple
101. al Area Network into many different subsets and each subset will form its own broadcast domain In short VLAN is a telecommunication technology dividing a physical LAN into many broadcast domains The hosts in VLAN can directly communicate with each other while VLANs can not directly intercommunicate Therefore the broadcast message is limited in a VLAN The network security is improved You can create edit or delete VLAN in Service Management gt VLAN gt VLAN to display members based on VLAN In the Service Management gt VLAN gt Interface page you can edit display members according to interface or interface range 5 1 1 VLAN Click Service Management gt VLAN gt VLAN page to view the configured VLAN on the switch the configuration page is shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 36 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Figure 5 1 Static VLAN List o Current position Service Management gt VLAN var Query VLAN ID Query VLAN ID VLAN Name O 1 default Edit Total 1 wah lt lt gt gt gt Go New Delete Batch Create Batch Delete Member Interfaces of VLAN ID Tagged Member Interfaces Untagged Member Interfaces Table 5 1 Parameters of Static VLAN List Search the designated VLAN information through VLAN ID VLAN ID VLAN ID numbers Up to 4094 VLAN groups can be defined VLAN 1
102. all the changes made End 10 1 7 SNMP Trap Settings Click Network gt SNMP gt SNMP Trap Settings the configuration page 1s displayed as follows Figure 10 12 SNMP Trap Settings o Current position Network gt SNMP SNMP Trap Enable ODisable SNMP Authentication Trap Enable ObDisable SNMP Link Change Trap Enable ODisable SNMP Warm Start Trap eEnable ODisable SNMP Cold Start Trap Enable ODisable SNMP New Root Trap Enable ODisable SNMP Topology Change Trap Enable ODisable SNMP DDM Trap OEnable Disable Apply Ethernet0 0 1 Enable Ethernet0 0 2 Enable Ethernet0 0 3 Enable CI O O O Table 10 8 Parameters of SNMP Trap Settings SNMP Trap Enable disable the global SNMP Trap function SNMP Authentication Trap The system sends SNMP notification while t detects SNMP Authentication Trap SNMP Link Change Trap The system sends SNMP notification while detects link changing SNMP Warm Start Trap The system sends SNMP notification while detects hot start of system SNMP Cold Start Trap The system sends SNMP notification while detects cold start of system SNMP New Root Trap The system sends SNMP notification while detects a new root bridge generated SNMP Topology Change The system sends SNMP notification while detects STP Trap topology changing SNMP DDM Trap The system sends SNMP notification while detects DDM plugging Issue 05 2012 10 25 Huawei Proprietary and Confidential 185 Copyright Huawei Technolo
103. ames other than Rq Id frames that have been transmitted by Authenticator Respld RX The total number of EAP Resp Id frames that have been received by Authenticator Resp Rx The total number of valid EAP Response frames other than Resp Id frames that have been received by Authenticator Invalid Rx The total number of EAPOL frames that have been received by Authenticator in which the frame type is not recognized Error Rx The total number of EAPOL frames that have been received by Authenticator in which the message body length field is invalid Last Version The protocol version number of EAPOL frame which has been received by Authenticator recently Last Source The source MAC address of EAPOL frame which has been received by Authenticator recently 9 2 6 Session Click Security gt 802 1X gt Session the configuration page is as follows Figure 9 12 Session o Current position Security gt 802 1X Global Mode Interface Moa iaa Session Query Interface Name All x Query minracetane oc ocak Framesi Frames X10 Autonet Issue 05 2012 10 25 Huawei Proprietary and Confidential 130 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Table 9 9 Parameters of Session Search session statistics information of interface specified in Interface Name The number of frames that have been transmitted on the interface Authentic Method The
104. anagement gt IGMP Snooping gt VLAN Parameter to view IGMP Snooping configuration information of VLAN the configuration page is shown as the figure below Figure 5 35 IGMP Snooping VLAN o Current position Service Management gt IGMP Snooping Global VLAN Parameter Merc am Ni Forwarding Table Querier Querier Fast Report Suppression Dynamic Mrouter Aging General Query Max Response Specific Query Max Response Check Router Send Router a v2 2 0 0 A Go 1 Disable Disable Disable Disable Enable Total 1 Em En Table 5 22 Parameters of IGMP Snooping VLAN VLAN Used to identify the VLAN configuration to IGMP Snooping function Whether to enable IGMP Snooping function Querier Version The version is compatible with other devices on Internet The switch uses this IGMP version to send IGMP common group query message Enable or disable transmitting IGMP query protocol packets Fast Leave Used to configure fast leave function for multicast members on VLAN After enabling it the switch receives an IGMP Leave Packet this function will allow multicast members to leave the group immediately the switch does not need to send IGMP specific group query Issue 05 2012 10 25 Huawei Proprietary and Confidential 70 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management CEN CET Report Suppression IGMP Snooping will hold the message with same content in a
105. ange of queue in Minimum Rate Maximum Rate bar Step 4 Click Apply button to apply all the changes made End Issue 05 2012 10 25 Huawei Proprietary and Confidential 114 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 8 IP Routing IP Routing About This Chapter Use this chapter to create static routing table on switch switch refers firstly to routing table when it forwarding data 8 1 IPv4 Route 8 2 IPv6 Route 8 1 IPv4 Route 8 1 1 IPv4 Route Table Click IP Routing gt IPv4 Route gt IPv4 Route table the configuration page is shown as the figure below Figure 8 1 IPv4 Route Table o Current position IP Routing gt IPv4 Route IPv4 Route Table HERAS TRA ies Query IP Address Network Mask CO Connected O Static O Count Count Display the number of active route 192 168 1 0 24 0 0 0 0 vian1 Connected Total 1 EJ Go Table 8 1 Parameters of IPv4 Route Table Search IPv4 Route Table according to IP address IP Address Mask The IP address mask of destination network segment of routing Gateway IP address The address of next hop Issue 05 2012 10 25 Huawei Proprietary and Confidential 115 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 8 IP Routing Interface VLAN number of static routing entry Protocol Type Routing Type 8 1 2 IPv4 Static Default Route Configure Click Routing gt IPv4
106. anges made End 3 2 Reboot Click System Management gt Reboot to bounce a device reboot webpage Select System Software and Configuration File options under the Next Startup File to set this switch to start next time the configuration page is as shown in Figure 3 2 Figure 3 2 Set Startup File o Current position System Management gt Reboot Current Startup File system Software flash3517004100R00 839 cc Configuration File Next Startup File system Sofware 51700V100R007B39 cc Configuration File Reboot Table 3 2 Parameters of Reboot Current Startup File It shows the system software and configuration files currently used by switch Next Startup File System Software select firmware version of next startup Configuration File select configuration file of next startup Issue 05 2012 10 25 Huawei Proprietary and Confidential 12 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Assignment of Switch Startup File Step 1 Step 2 Step 3 Click System Management gt Device Reboot to bounce a webpage as shown in Fig 3 2 Select corresponding startup file in Next Startup File Click Reboot button to apply all the changes made which will take effect next startup End 3 3 Software Upgrade This series of switch supports software upgrade by means of HTTP and FTP Click System Management gt Software Upgrade to upgrade software of the switch th
107. arding Table Total 0 New Delete Table 5 24 Parameters of Group Deny VLAN VLAN ID number Interface number in this VLAN Group Deny Learning status of interface Create IGMP Snooping Group Deny Step 1 Click Service Management gt IGMP Snooping gt Group Deny Step 2 Click New button to open the configuration page shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 73 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Figure 5 38 New Group Deny Add Group Deny VLAN interface OEth Trunk List Press Ctrl or Shift selcet more ports Group Deny GEnable ODisable Apply Cancel Table 5 25 Parameters of Group Deny Specify VLAN for transmitting multicast service Select Trunk Enable or disable interface s learning function Step 3 Configure the needed parameters Step 4 Click Apply button to apply all the changes made End 5 6 4 Group Policy Click Service Management gt IGMP Snooping gt Group Policy to check information of multicast policy on the switch shown as the figure below Figure 5 39 IGMP Group Policy o Current position Service Management gt IGMP Snooping Global VLAN Parameter Group Deny Group Policy Byeiteieyetits Forwarding Table Total 0 New Delete Table 5 26 Parameters of IGMP Group Policy Interface Name VLAN Interface name VLAN ID Issue 05 2012 10 2
108. ary and Confidential 22 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Figure 3 14 Static Neighbor o Current position System Management gt IPv6 Neighbor Static Neighbor BUTE Cielo SS a Neighbor Address Link Address Interface Name Total 0 New Delete Table 3 13 Parameters of Static Neighbor Neighbor Address IPv6 address of neighbor Link Address MAC address of neighbor Name of the interface Display the status of IPv6 neighbor address Static Neighbor Table Configuration Step 1 Click System Management gt IPv6 Neighbor gt Static Neighbor Step 2 Click New button to add new static neighborhood information as shown in following figure Figure 3 15 Edit Static Neighbor Interface Name 1 32 chars Neighbor Address Example FE80 1 Link Address H H H Apply Cancel Step 3 Enter relevant static neighborhood information Step 4 Click Apply to apply all the changes made End 3 9 2 Dynamic Neighbor Click System Management gt IPv6 Neighbor gt Dynamic Neighbor page to display the IPv6 dynamic neighbor information detected by switch the configuration page is shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 23 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Figure 3 16 Dynamic Neighbor o Current position System Management gt IPv6 Neighbor ea linea Dynamic Neighbor Bi licig te Tans
109. ate spanning tree to avoid network jitter when the edge interface receives BPDU When BPDU protection function is enabled on switch the edge interface will be shutdown when receiving the BPDU but the properties of the edge interface will be the same At the same time the network management system will be notified The shutdown edge port can only be restored by network manager manually the default is Disable Set Bridge Diameter and Timer Forward delay The setting range 1s 4 30 seconds default 15sec Each interface on the switch needs to wait double of forward delay time when the blocked status changes to forwarding status Hello Time Interval for root bridge s broadcast hello message hello message is used to detect whether the network topology is normal or not Issue 05 2012 10 25 Huawei Proprietary and Confidential 59 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Max age ensures that the old information will not be endlessly circled within the network s redundant path and thus stop the valid transmission of the new information The value is set by the root bridge to confirm that the spanning tree configuration value of the switch accords with the other devices on the bridge LAN If the value is timeout while the switch has not received the BPDU packet from root bridge the switch starts to send its BPDU to all the other switches to
110. ation the configuration page is displayed as follows Figure 10 42 Remote Interface Information o Current position Network gt LLDP MED Global Configuration Remote Interface Information Query Interface Name Ethernet0 0 1 Query EN Entry ID Chassis ID Subtype Chassis ID Port ID Subtype interface ID Detail Info Table 10 25 Parameters of Remote Interface Information Search the remote information of specified interface in Interface Name Entry ID LLDP MED information entry number of the remote interface Issue 05 2012 10 25 Huawei Proprietary and Confidential 206 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 11 Device Management 1 1 Device Management About This Chapter Device Management page of switch will display the current working status information and event debugging information of system to user to realize the maintenance and management of physical device status and communicating state Device management provides the following functions 11 1 Device Management 11 2 Device Diagnostics 11 3 DDM 11 4 Information Center 11 5 Power Saving Management 11 6 Interface Mirror 11 7 Tools 11 1 Device Management 11 1 1 Board Status Click Device Management gt Device Management gt Board Status to view the reason of rebooting device command switch the configuration page is displayed as follows Figure 11 1 Board Status o Curren
111. ayed as follows Figure 9 26 Interface o Current position Security gt MAC based Access Control Global Interface HAMAS ieee A A nee a race name sems Agno Time min Quiet Peroa sec A O 0 60 256 Ethernet0 0 1 Disabled 144 Ethernet0 0 2 Disabled 1440 60 256 Ethernet0 0 3 Disabled 1440 60 256 Ethernet0 0 4 Disabled 1440 60 256 Ethernet0 0 5 Disabled 1440 60 256 Ethernet0 0 6 Disabled 1440 60 256 22 0 00 Table 9 19 Parameters of Interface Interface Number Status The status of MAC authentication on interface NOTE if enabling 802 1X on an interface with MAC based VLAN disabled VLAN assignment works abnormally under host based mode Aging Time During the specified period the user who passes the authentication will always remain the authentication passed status and the authenticator will return to authentication failed status after a designated time The value ranges from 1 to 1440 and the default is 1440 minutes Quiet Period When the user fails the authentication within the specified period the user can not require the authentication again unless the status of user is manually cleared If the quiet period is set O which means the user who fails the authentication can repeatedly require authentication The value ranges from 0 to 300 and the default is 60 seconds Max User The allowed maximum number of access user on the interface The value ranges from 1 to 512 and the default 1s 256 Issue 05 2012 10 25
112. bB Neighbor Address Link Address Interface Name status Total 0 Delete 3 9 3 Router Advertise Click System Management gt IPv6 Neighbor gt Router Advertise page to configure the IPv6 router advertisement information detected by switch the configuration page is shown as the figure below Figure 3 17 Router Advertise o Current position System Management gt IPv6 Neighbor Router Advertise VLAN ID 1 v Neighbor Request Interval ms Reachable Time ms Min RA Interval sec Max RA Interval sec RA Life sec RA Hoplimit RA MTU Router Advertise Disable x Managed Config Flag Disable v Other Managed Flag Disable v Apply A ec Total 0 Table 3 14 Parameters of Router Advertise VLAN ID Select the VLAN to which the router advertisement is attached Neighbor Request Display the neighbor request interval of the router advertisement Interval in millisecond Reachable Time Display the neighbor reachable time of the router advertisement in millisecond and 1200000 milliseconds is the default value Min RA Interval Display the minimum interval of the router advertisement in second and 198 seconds is the default value Max RA Interval Display the maximum interval of the router advertisement in second and 600 seconds 1s the default value Display the lifetime of the router advertisement in second and 1800 seconds is the default value Issue 05 2012 10 25 Huawei Proprietary and Confi
113. c Group Entry 1 65535 Data Source Ethernet 00 1 Owner 1 30 chars Apply Cancel Issue 05 2012 10 25 Huawei Proprietary and Confidential 187 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Step 3 Enter the number of statistic group in Entry field Step 4 Enter MIB object of data statistic in Data Source field Step 5 Enter a name in Owner field Step 6 Click Apply button to apply all the changes made End View detail information of RMON statistic Step 1 Click Network gt RMON Step 2 Click Statistic in Tab Step 3 Click the entry that you want to view in statistic list and click Detail Info button to view the detail information the configuration page 1s displayed as follows Figure 10 16 Details of Statistic X Close Entry 10 AAA IA Entry 10 Data Source 136121221110 DropEvents o Octets 0 Pkts 0 BroadcastPkts 0 MulticastPkts 0 CRCAIignErrors 0 UndersizePkts 0 OversizePkts 0 Fragments 0 Jabbers 0 Collisions 0 Pkts64Octets 0 Pkts65to127Octets 0 Pkts128to2550ctets 0 Pkts256to511Octets 0 Pkts512to10230ctets o Pkts1024t015180ctets 0 Owner monitor End 10 2 2 History History group provides periodic statistics for different traffic information across the interface and store the statistics in the history table in order to be viewed by management equipment at any time Statistics include bandwidth utilization error p
114. c information of neighbor devices within the local broadcast domain LLDP is a layer 2 protocol that to send device information by periodic broadcast announcement Notice information records events in the format of length value TLV in IEEE 802 1ab standard including device identification load capacity configuration information and other details LLDP also defines how to collect the maintain information of the found neighbor node 10 3 1 Global Click Network gt LLDP gt Global the configuration page is displayed as follows Figure 10 24 Global Settings o Current position Network gt LLDP Transmission Interval 5 32768 sec default 30 To Maintain The Value Of Information 2 10 sec default4 Transmission Equipment Re enable The Delay Value 1 10 sec default 2 Transmission Delay 1 8192 sec default 2 Notification Interval 5 3600 sec default 5 System Information Chassis ID Subtype MAC Address Chassis ID 0001 0203 0400 System Name 1700 System Description S1700 52FR 2T2P AC Mainframe 48 10 100 1 System Capablities Bridge Table 10 13 Parameters of Global Settings LLDP State Enable Disable the global LLDP on switch Issue 05 2012 10 25 Huawei Proprietary and Confidential 193 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network LLDP Forward Message Whether to forward the received LLDP packets Transmission Interval Configure the sendin
115. can add log server Table 11 4 Severity Level List cores o semone O O pomos 6 worms meo O Issue 05 2012 10 25 Huawei Proprietary and Confidential 211 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 11 Device Management ZN caution Rules for filtering information serverity code of deny information is higher than the information outputting of the threshold 1 Set 0 as the value of severity level the system will only output emergencies information 2 Set 7 as the value of severity level the system will output all the information 11 4 2 Log Information View the system log in Log Information page according to the requirements Click Device Management gt Information Center gt Log Information the configuration page is displayed as follows Figure 11 7 Log Information o Current position Device Management gt Information Center Level All v Time Example 2005 1 1 2006 1 1 Query Clear Log Buffer Save Log A oa 1 2012 01 04 11 50 54 INFO 6 Authentication Policy is enabled Module AAA 2 2012 01 04 07 28 56 NOTI 5 Spanning Tree port status change Instance 0 Aggregateport 2 Learning Forwarding 3 2012 01 04 07 28 56 NOTI 5 Spanning Tree port status change Instance 0 Aggregateport 2 Discarding Learning 4 2012 01 04 07 28 53 INFO 6 Spanning Tree port role change Instance 0 Aggregateport 2 DisabledPort gt DesignatedP ort 5 2012 01 04 07 28 53
116. cating Timeout times of 802 1X status machine in AUTHENTICATING FailWhileAuthenticating Times of unsuccessfully authenticating 802 1X authentication ReauthsWhileAuthenticating Times of receiving re authentication of 802 1X status machine in AUTHENTICATING EapStartsWhileAuthenticating Times of receiving message EAPOL Start of 802 1 X status machine in AUTHENTICATING EapLogoffWhileAuthenticating Times of receiving message EAPOL Logoff of 802 1X status machine in AUTHENTICATING ReauthsWhileAuthenticated Times of receiving re authentication of 802 1X status machine in AUTHENTICATING EapStartsWhileAuthenticated Times of receiving message EAPOL Start of 802 1 X status machine in AUTHENTICATING EapLogoffWhileAuthenticated Times of receiving message EAPOL Logoff of 802 1X status machine in AUTHENTICATING BackendResponses Times of 802 1X backend status machine sending Access Request to the authenticated server BackendAccessChallenges Times of 802 1X backend status machine receiving Access Challenge from the authenticated server BackendOtherRequestsToSupplicant Times of status machine sending other Request message except Identity Notification Failure and Success BackendNonNakResponsesFromSup Times of status machine receiving other successfully authenticating BackendAuthFails Times of 802 1X backend status machine failing to authenticate BackenAuthSuccesse
117. ches Web User Manual 5 Service Management Figure 5 27 STP Global Settings o Current position Service Management gt STP Sida STP Global BSP Aires Bee oe O STP Enable O Disable Default Disable Apply Instance Instance 0 vw Root Type Not set lt 7 Apply Instance Instance 0 y Priority 32768 v Apply Advanced Configuration Working Mode RSTP v Bridge diameter 7 Y Max Hops 20 Pathcost Standard dott v BPDU Protection O Enable Disable Default Disable Note BPDU protection function takes effect on the force true edge por Apply Set Bridge Diameter and Timer Forward delay 15 4 30 sec default 15 Hello Time 2 1 2 sec default 2 Max age 20 6 40 sec default 20 Apply Table 5 16 Parameters of STP Global Settings Enable or disable STP on this switch default disable Instance Select instance number for the root types needed to configure Root Type The options for root type Not set Primary and Secondary Instance Select instance number for priority value needed to configure Priority Bridge priority is used in selecting the root device The device with the highest priority the smaller value the higher priority becomes the STP root device However if all devices have the same priority the device with the lowest MAC address will then become the root device note that lower numeric values indicate higher priority Default value 32768 Range 0 61440
118. ck Service Management gt STP gt MSTP Region Step 2 Click Add button to create a new MSTP Region the configuration is shown as the figure below Figure 5 32 Add CIST Instance 1 Apply Cancel Step 3 Select the instance number needed to add in Instance bar Step 4 Click Apply button to apply all the changes made End Issue 05 2012 10 25 Huawei Proprietary and Confidential 67 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Edit MSTP Instance Step 1 Click Service Management gt STP gt MSTP Region Step 2 Click the edit icon on the left of Instance the configuration page is shown as the figure below Figure 5 33 Edit CIST X Close Instance 1 Type VLAN 1 4094 example 1 3 5 7 9 By default all VLANS in the MST region are mapped to METIO Apply Cancel Step 3 In Type pull down menu select VLAN to add remove instance Step 4 In VLAN bar enter the VLAN ID needed to add remove Step 5 Click Apply button to apply all the changes made End 5 6 IGMP Snooping IGMP Snooping Internet Group Management Protocol Snooping is multicast management and control mechanism working on 2 layer Ethernet switch After IGMP Snooping is enabled switch establishes mapping relationship for switch s interface and multicast address through snooping IGMP message received on the interface forwarding multicast data stream according to the established mapping
119. ckets received by the interface for monitoring When user defines alarm entry the system will follow the defined period to obtain the value of the monitored alarm variable If the value of alarm variable is greater than or equal to the Rising threshold a raising of alarm event will be triggered If the value of alarm variable is less than or equal to the falling threshold a fall alarm event will be triggered and alarm management will make the appropriate treatment according to the definition of events Click Network gt RMON gt Alarm the configuration page is displayed as follows Figure 10 20 Alarm o Current position Network gt RMON arm W Entry interval Variable Sample Type Startup Alarm Rising Threshold Rising Event Index Falling Threshold Falling Event Index Total 0 New Delete Detail Info Issue 05 2012 10 25 Huawei Proprietary and Confidential 190 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Table 10 11 Parameters of Alarm Number of alarm group entries Up to 32 characters used to identify the MIB object groups Interval The interval for monitoring the MIB object Value ranges from 1 2147483647 Sample Type Delta specify the changes of MIB within the specified interval of alarm test Absolute Test the actual MIB values Rising Threshold Rising threshold generated by alarm events Value ranges from 0 2147483647 Rising Event Index Speci
120. create a logical interface for the connected device accessing the switch The switch takes the shared network segment connecting to the logical interface as a serial of the logical interfaces to handle and each interface must be solely authenticated and authorized by the authentication server The switch learns MAC address of each connected device and creates a logical interface so that the connected device can communicate with the switch through the logical interface 9 2 1 Global Click Security gt 802 1X gt Global to configure global authentication parameters of IEEE802 1X the configuration page is shown as follows Figure 9 5 802 1 X Global Settings o Current position Security gt 802 1X o tice rience autentcatr Ststes Session Diagnostics 802 1X State Disable v Handshake State Max User 1 256 default 256 Note Not all Supplicants can support this feature for the Supplicant that does not support handshake the switch can not get correct response from the Supplicant and wrongly forces the Supplicant logoff even if the Supplicantis online In this case the administrator should disable this feature Apply Table 9 4 Parameters of 802 1X Global Settings 802 1X State Enable or Disable 802 1X globally Default Disable Handshake State Enable Handshake State Max User The maximum number of hosts that can pass the 802 1X allowed by switch Range 1 256 Default 256 Enable Global 802 1X Step 1 Step 2 St
121. ded Save as filename to be saved after download The length of filename is not more than 64 characters illegal characters including lt gt and space Issue 05 2012 10 25 Huawei Proprietary and Confidential 14 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Upload File Upload the chosen files to local computer Delete the chosen files from switch ZN caution Those specified as startup files can not be deleted Delete System Files of Switch Step 1 Click System Management gt File Management the webpage as shown in Fig 3 4 appears Step 2 Choose system files to be deleted from list Step 3 Click Delete button End 3 5 System Configuration Click System Management gt System Configuration to set device name and HTTP connection timeout duration of switch the configuration page is as shown in Fig 3 5 Figure 3 5 System Configuration o Current position System Management gt System Configuration Device Name 1700 1 255 chars HTTP Connection Timeout 30 1 35791 min default 3 Apply Table 3 5 Parameters of System Configuration Device Name Enter the device name of switch with a maximal length of 255 characters HTTP Connection Enter the HTTP connection timeout duration of switch within Timeout Duration 1 35791 minutes default is 3 minutes Issue 05 2012 10 25 Huawei Proprietary and Confidential 15 Copyright Huawei Technologies Co
122. dential 24 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Managed Config Flag Choose to enable disable managed config flag Other Managed Flag Choose to enable disable other managed flag Prohibit Transmission of Router Advertisement Step 1 Click System Management gt IPv6 Neighbor gt Router Advertise Step 2 Select Enable in the pull down menu of RA Halt Step 3 Click Apply to halt router advertisement End Issue 05 2012 10 25 Huawei Proprietary and Confidential 25 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 4 Interface Management Interface Management About This Chapter This chapter describes the interface configuration function of the switch 4 1 Ethernet Interface 4 2 Eth Trunk 4 1 Ethernet Interface This section mainly describes how to configure and view interface connection 4 1 1 Basic Attributes Click Interface Management gt Ethernet Interface gt Basic Attributes page to check each interface status on switch the configuration page 1s shown as the figure below Figure 4 1 Basic Attributes o Current position Interface Management gt Ethernet Interface Basic Attributes tidad clas Query Interface Name All jj Query E interface Name Status Flow Control Configuration Flow Control Status Link Status Speed Set Duplex Set Negotiation Input Rate Limit Output Rate Limit O Es
123. dress enter the destination MAC address and the destination MAC address mask in the corresponding Mask field Mask used to set the destination MAC address range mask bit value of O corresponding to the MAC address bit is Independent Bit could be 0 or 1 mask bit value of 1 corresponding to the MAC address bit is Matching Bit must exactly match the destination MAC address The MAC address will match the whole field if no mask entered Match Ethernet Type Select or enter the message type to identify the protocol type used by link layer Its range will be hex 0x0600 OxFFFF and the mask rang will be 0x0 OxFFFF 802 1p Priority Specify the 802 1p priority field of data to be matched Time Range Name Click Please Select button to specify effective time for the rule Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes made End Create a User defined Rule Step 1 Click ACL gt ACL Profile Step 2 Create a user defined ACL in ACL list Step 3 Click the created user defined ACL entry in ACL list Step 4 Then click New button in the ACL Rule list box to add a new rule opening the configuration page shown as the figure below Figure 6 9 Create aUser Defined Rule ACLID 10005 Rule ID 1 65535 If not specified system to automatically assign Action Permit O Deny FJChunk 1 Data Ox 0x0 Ox Mask Ox 0x0 Damm Chunk 2 Data Ox 0x0 Mask Ox 0x0 Oir Chunk 3 Data Ox 00 A Mask Dx 0 0 Ox MA
124. dress list information of switch Issue 05 2012 10 25 Huawei Proprietary and Confidential 49 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Figure 5 17 MAC Address Table o Current position Service Management gt MAC MAC Address Table BLUR eB tiem Belen RE a eee ROA A IE Query MAC Type All K Interface Name Al he MAC Address VLAN ID Query B MAC Address VLAN ID interface Name MAC Type Aging Time s O 0000 E800 FDD1 1 Ethernet0 0 36 Dynamic 300 O 0000 E831 FD02 1 Ethernet0 0 36 Dynamic 300 0001 0203 0400 1 CPU Self O 0005 5DFE 9423 1 Ethernet0 0 36 Dynamic 300 O 000B 6AD4 1D3F 1 Ethernet0 0 36 Dynamic 300 F 000F EA07 29BD 1 Ethernet0 0 36 Dynamic 300 F 0011 0AF6 D9D9 1 Ethernet0 0 36 Dynamic 300 O 0015 E92D 5E74 1 Ethernet0 0 36 Dynamic 300 O 0015 E92D 6E74 1 Ethernet0 0 36 Dynamic 300 F 0015 E9DD 9098 1 Ethernet0 0 36 Dynamic 300 Total 31 B23 gt gt Go Add to Static Table Clear Clear All Table 5 10 Parameters of MAC Address Table Item Description Search the matched entry based on MAC Type Interface Name MAC Address or VLAN ID The MAC addresses in the address table VLAN ID that corresponds to the above MAC address Interface that corresponds to the above MAC address MAC Type The methods that switch discovers MAC address which includes Dynamic Self Blackhole or Static Aging Time Display the aging time of
125. e access network without authentication local local authenticated by switch RADIUS authenticated by RADIUS server AAA Authentication Login Enter the name of access method list for switch access authentication Method 1 method 2 You can choose a variety of authentication methods but None Method 3 Method 4 and Local Authentication method can only set as the last kind of authentication In practice the certification order is from method 1 to method 4 It will go to the next authentication method only when the present authentication invalids The authentication options are as follow none access network without authentication local local authenticated by the switch group authenticate by using the server groups set in RADIUS RADIUS authenticated by RADIUS server Issue 05 2012 10 25 Huawei Proprietary and Confidential 166 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security fnew epee SS Active Inactive Select a method list entry in Switch Access Authentication list and then click this button to activate inactivate the method list name for switch Web network manager login in Configure Select a method list entry in Switch Access Authentication list then click this button to configure the authentication method Add the AAA Authentication Login Step 1 Click Security gt AAA Step 2 Click Authentication Settings in Tab Step 3 Set
126. e configuration page is as shown in Fig 3 3 Figure 3 3 Software Upgrade o Current position System Management gt Software Upgrade HTTP FTP File Name Browse Note 1 Before software upgrade please save the current configuration Note 2 Software upgrade requires a long time Therefore before upgrading the software choose System Management gt System Configuration gt set HTTP Timeout Interval to 50 minutes or a greater value Start Table 3 3 Parameters of Software Upgrade Click Browse to choose firmware files to be upgraded which is stored in computer with a suffix of cc such as S1700V100R007B39 cc IPv4 address enter IPv4 address of FTP download server IPv6 address or enter IPv6 address of FTP download server Username password enter username and password of FTP download server TCP port enter TCP port number of FTP download server File name complete path and filename of firmware file Saved as firmware file name saved on switch after upgrade without slash the first character excluding point and length of filename is not more than 64 characters valid characters including A Z a z 0 9 and gt Click this button to upgrade software Issue 05 2012 10 25 Huawei Proprietary and Confidential 13 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches ZN caution due to a relatively long time needed for software upgrade please
127. e it represents point to point sharing link Point to point port is similar to edge port but point to point mode must be full duplex mode As the edge port point to point port can quickly turn into forwarding status to obtain RSTP advantages Force false 1t represents this interface does not own point to point status auto it represents that interface will change into point to point status whenever it is possible like status of point to point is force true If the interface can not maintain this status like interface is forced operating half duplex mode the point to point status will be changed like status of point to point is force false This parameter default is set as auto Issue 05 2012 10 25 Huawei Proprietary and Confidential 65 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management mm Joea OOO Protection Type The options for whether enable corresponding protection on interface are Root protection Root protection function protects root switch s location through maintaining specified port role Port configured to Root protection function all of its port value on instance is maintained as specified port When a port receives a higher priority BPDU the port role won t change into non specified port otherwise it changes into detecting status forwarding no message In a long enough periods if a port receives no higher BPDU any
128. e 9 23 New Security Address Information X Close Interface Name MAC Address H H H VLAN ID 1 4094 Apply Cancel Table 9 17 Parameters of New Security Address Information Interface Name Select the interface number which needs to be bound Issue 05 2012 10 25 Huawei Proprietary and Confidential 14 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security MAC Type Select MAC address type which needs to be bound MAC Address Enter the MAC address which needs to be bound VLAN ID Enter the VLAN number which needs to be bound Step 4 Configure the needed parameter Step 5 Click Apply button to apply all the changes made End 9 5 3 Address Table Import and Export Click Security gt Port Security gt Address Table Import and Export to Import and Export security address information from switch the configuration page is displayed as follows Figure 9 24 Import and Export Address Table o Current position Security gt Port Security Port Security Parameter Configuration Port Security Address Information Address Table Import and Export File Name Browse Import Export address table to the local unit Export Import Security Address Step 1 Step 2 Step 3 Click Security gt Port Security Click Address Table Import and Export in Tab Click Browse button to select profile of security address table information that will store in local co
129. e State CIS saeoiod dadubinns dbiuietas aeaebe e a ene Socteaees 149 98 5 IMtertace USES CIU td 150 Dio merac parameter Soule Sy nara iia a 151 9 5 3 Binding Table Ironman Ons scented abs coacoct A etaom adwoes 153 DD AES un AA 154 ODN ARS Cr SEMNE a A A A A A A A ia 154 O92 State Binding Table tos io nn A e AAE 156 A NO 157 AIDA at A ita 158 A Wad liccainess 3 Saaucensscu uses inamieses sauieoted aauiseeseaeubecd E e e 158 IIO 2 WIL CRT ACG liarla oro sio lil catas asii 159 Io A E PO O desu ssoandstatveldisaanestanGelemiavceasacates 161 A MS A A A ed buat a 161 OA EE A LS EAEE E T T E N nds asses en bbl anes viva TA oleae dd ease eae ee laces 162 EIS WO 2 Vs Ay SONAL Ode POPE OU ER E EE 162 9122 Oneway LS OVA ON os O 163 Issue 05 2012 10 25 Huawei Proprietary and Confidential vi Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Contents OL ANT O O 164 Oil Sl RA ODESSA A iaa 164 9132 Authentication Setini S a A na dala deletes A eed eed ee ee 165 Dl SSX CCOUMUNE SEUNG dd 167 DNAS AL SS add da aid cid 168 914 1 RADIUS Global Settings ai A edges edness atuoe 168 PARADIS Server Se UNOS olor lite lila rodas aisla 170 MAS RADIUS Group SETE CMI dates 171 9 14 4 RADIUS server Authorization Settings oooooccccccccnononononononnnnnnnnnnnnnnnnnnnnnnnnononnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnos 172 IAS RADIUS Saldo nO bn 173 ASES SAS UU tte 173 10 INCEWOEK aiii dai ias ica 175 A O A A A A 1
130. e em ile EAO LAT LECO Query Interface Name All v Query o nace name IN O Ethernet0 0 1 Untrust a Ethernet0 0 2 Untrust O Ethernet0 0 3 Untrust Table 9 25 Parameters of Interface Trust Settings Search the state settings of specified interface in Interface Name Interface Name Interface Number The trust status of Interface The switch only processes the DHCP message from trusted DHCP Server interface and then generates a dynamic host binding entry Issue 05 2012 10 25 Huawei Proprietary and Confidential 150 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Configure DHCP Snooping Trust Status for Interface Step 1 Click Security gt DHCP Snooping Step 2 Click Interface Trust Settings in Tab Step 3 Click the checkbox on the left side of DHCP Snooping trust interface to be configured and then click Configure button the configuration page is displayed as follows Figure 9 37 Configure Interface Trust Settings Ethernet 0 0 45 Interface Name Status Untrust Port se Apply Cancel Step 4 Select Trust Interface from Status field to configure switch trust DHCP Server message from the interface Step 5 Click Apply button to apply the changes made End Interface with IPSG enabled can not be set to DHCP Snooping trusted 9 8 4 Interface Parameter Settings Click Security gt DHCP Snooping gt Interface Parameter Settings the confi
131. e entry then click Apply button Enabled switch will prevent specific type of DoS attack End 9 8 DHCP Snooping DHCP Snooping is used to listen for DHCP messages and can extract and record the IP and MAC address information from the received DHCP Request or DHCP Ack message The switch only processes the DHCP message of trusted DHCP Server and then generates a dynamic host binding entry Issue 05 2012 10 25 Huawei Proprietary and Confidential 148 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security 9 8 1 Global Click Security gt DHCP Snooping gt Global the configuration page is displayed as follows Figure 9 33 DHCP Snooping Global Settings o Current position Security gt DHCP Snooping Global Interface State Settings Interface Trust Settings Interface Parameter Settings Binding Table Information DHCP Snooping Status Disable v Apply Table 9 23 Parameters of Global Settings mm CET DHCP Snooping Status Enable or disable DHCP Snooping function To guarantee the client can get IP address from a legitimate DHCP server when DHCP Snooping is enabled on the switch user must set the state of the Ethernet interface that connects to DHCP server as trusted state And the trusted interface must in the same VLAN with the interface connected to DHCP client 9 8 2 Interface State Settings Click Security gt DHCP Snooping gt Interface State Setting
132. ect Apply Delete Cancel Table 6 14 Parameters of New VLAN Application VLAN Application Nam Display name applied by VLAN Bind VLAN Add or delete the VLAN ID of the applied rules Bind MAC ACL Select to add or delete MAC ACL list that has been applied to VLAN maximum support 8 IP ACL Bind IP ACL Select to add or delete IP ACL list that has been applied to VLAN maximum support 8 IP ACL Step 5 Click corresponding Apply or Delete button to complete operation End 6 4 HTTP ACL Click ACL gt HTTP ACL to apply rules to HTTP protocol data accessing switch the configuration page is shown as the figure below Figure 6 16 HTTP ACL Configuration o Current position ACL gt HTTP ACL Note please check the bindings ofthe ACL rule avoid binding will cause administrators cannot access ACL ID 1 1999 Please Select Apply Delete Issue 05 2012 10 25 Huawei Proprietary and Confidential 96 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration Table 6 15 Parameters of HTTP ACL Configuration Click Please Select button to select ACL number that has been applied to HTTP protocol data and then click Apply button to implement configuration HTTP ACL only supports standard IP ACL not supporting other types of ACL Issue 05 2012 10 25 Huawei Proprietary and Confidential 97 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet S
133. ed in list of traffic classifier End Add a Rule for Traffic Classifier Step 1 Click QoS gt Traffic Management gt Traffic Classifier Step 2 In list of traffic classifier click the traffic classifier to be added rule and click New button in rule list box opening the configuration page shown as the figure below Figure 7 15 Add Rules for Traffic Classifier Classifier Name 2 C Match All Packets C Match Priority VLAN 802 1p 0 Match VLAN VLAN ID 1 4094 _ Match MAC Address Source MAC Address H H H Mask H H H C Mtach Ethernet Ethernet Type Ox 600 FFFF Match ACL ACL Number 1 10999 ACL Name Max 32 Chars Apply Cancel Table 7 11 Parameters of Adding Traffic Classifier Rules Traffic Classifier Name Classifier profile name Match All Packets Match all packets Issue 05 2012 10 25 Huawei Proprietary and Confidential 108 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration Match Priority Match messages of the specified priority in VLAN 802 1p Match VLAN Match messages of the specified VLAN in VLAN ID Match MAC Address Match messages of the specified MAC address in source MAC Address mask Match Ethernet Match Ethernet messages of the specified type in Ethernet type Match ACL Match messages specified in ACL number ACL name Step 3 Select the mode matched by traffic classifier to message S
134. eny indicates switch dropping packets which does not match with the rule Display the field viewed by the rule Time Range Name Display effective time of the ACL rule if no effective time is specified and then it takes effect with a rule and applies it to interface or VLAN time range Create an ACL Entry Step 1 Click ACL gt ACL Profile Step 2 Click New button to add a new ACL entry opening the configuration page shown as the figure below Figure 6 4 Edit ACL Profile ACL Type Standard IP ACL k ACL ID Enter the ACL number or ACL name ACLID 1 1999 ACL Name 1 32 chars Begin with a letter a zor A Z Step 10 wt ACL Description 1 255 chars Apply Cancel Table 6 4 Parameters of Editing ACL Profile ACL Type Select the matching types for ACL entry Standard IP Extended IP Extended IPv6 Extended MAC or User defined Issue 05 2012 10 25 Huawei Proprietary and Confidential 85 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration fnew epee ACL ID enter ACL entry ID 1 Standard IP 1 1999 2 Extended IP 2000 3999 3 Extended IPv6 4000 5999 4 Extended MAC 6000 7999 5 User defined 10000 10 999 ACL Name enter ACL entry name At least enter ACL number or ACL name if only enter one of them another one will be automatically created by the system Offset Chunk 1 4 Create segments Chunk needed for user defined ACL and
135. ep 3 Step 4 Click Security gt 802 1X Click Global Settings in tab bar Enable 802 1X State Click Apply to apply all the changes made End Issue 05 2012 10 25 Huawei Proprietary and Confidential 124 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security 9 2 2 Mode Click Security gt 802 1 X gt Mode the configuration page is as follows Figure 9 6 Interface Authentication Mode o Current position Security gt 802 1X Global mode Authenticator Statistics m O pop DOoOOoO Ethernet0 0 1 Ethernet0 0 2 Ethernet0 0 3 Ethernet0 0 4 Ethernet0 0 5 Ethernet0 0 6 Ethernet0 0 7 Host based Host based Host based Host based Host based Host based Host based Table 9 5 Parameters of Interface Authentication Mode Interface Number Port based In this mode once a host passes the authentication all the other hosts can obtain the privilege of accessing the network Similarly if one host fails the authentication or sends EAPOL exiting message all the other hosts cannot pass through the interface Host based In this mode the host passing through this interface must be authenticated respectively Configure Interface Authentication Mode Step 1 Click Security gt 802 1X Step 2 Click Mode in tab Step 3 Click checkbox on the left of interface to be configured authentication mode and click Configure button opening the configuration page
136. erface The options are as follow Root protection root protection function can protect the root switch position by maintaining the role of designated port By configuring the Root Protection on port all the port roles in instances will be kept as designated ports When the port receives a higher priority BPDU the port role will not be set as non designated port but turn into the listening state and stop forwarding packets If the port has no longer receives higher priority BPDU after a long time it will restore to its original normal state Loop Protection on the switch the status of root ports and other blocked ports are relying on the continuous BPDUs received from the upstream The switch will reselect root port when the BPDU from the upper switch can not be received because of network congestion or unidirectional link failure If the original root port becomes a designated port and the original blocked port moves to the forwarding state it will results in undesirable loops in Switch network Loop protection function can suppress this kind of loop After the loop protection started if the root port can not receive a BPDU from upstream it will be set in blocked state and the blocked ports will remain in blocking state and does not forward packets to the network to ensure that no loop can be formed TC Protection the switch will delete MAC address table and ARP table entry if TC BPDU is received The frequent deletion of table en
137. eriod Time Range Name Enter a name for effective period rule Periodic Time Range Week Select the day of the week to apply ACL rule Start Time Select the start time to apply ACL rule End Time Select the end time to apply ACL r Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes made The newly created effective period will be displayed in list of effective period ZN caution If the created effective period has been already existed 1t cannot be recreated Issue 05 2012 10 25 Huawei Proprietary and Confidential 83 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration 6 2 ACL Profile Creating an ACL rule is divided into two basic steps First must create an ACL and then specify the type name number and step of ACL Second must create frame matching criteria for switch in ACL Click ACL gt ACL Profile to configure ACL rule for switch the configuration page is shown as the figure below Figure 6 3 Configure ACL Profile o Current position ACL gt ACL Profile Query ACL Type Al ACLID ACL Name Query ri ACLID ACL Name ACL Type Step ACL Description Total 0 New Delete ACL Rule m raeo f aen e Tne Range name New Delete Table 6 3 Parameters of Configuring ACL Profile Search ACL entry by ACL Type ACL Number or ACL Name Display the match types for AC
138. ets Untrust port the switch can check the ARP packet on the interface with specified rate limitation Limited Speed Status Whether to restrict the DHCP ARP message of distrusted interface Conduct rate limits for ARP message If received ARP packets exceed this rate the switch will consider this interface is over speed 1 e attack At this point the switch will close the interface and no longer receive any messages to avoid it having the state of paralysis because of a large number of attacking packets Status The processing behaviors are conducted for ARP message by Interface Set Interface as Untrusted Interface Step 1 Click Security gt DAI Step 2 Click Interface in Tab Step 3 Click the checkbox on the left side of DAI parameter interface to be configured and then click Configure the configuration page 1s displayed as follows Figure 9 49 Configure Interface DAI X Close GigabitEthernet0 0 4 q Interface Name Trust Status Untrust Port Mi Limited Speed Status Disable Mi Limiting Rate 15 0 2048 pps default 15 Apply Cancel lt Issue 05 2012 10 25 Huawei Proprietary and Confidential 160 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Step 4 Select Untrust Port from drop down menu of Trust Status Step 5 Click Apply button to apply the changes made End ZN caution DAI untrust port don t support Link Aggregation If port is
139. ey of RADIUS authorization server Values range from 1 to 16 characters Issue 05 2012 10 25 Huawei Proprietary and Confidential 172 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security 9 14 5 RADIUS Statistic Click Security gt RADIUS gt RADIUS Statistic to display the RADIUS Statistic on switch the configuration page is displayed as follows Figure 9 63 RADIUS Statistic o Current position Security gt RADIUS Table 9 43 Parameters of RADIUS Statistic mm peaa O OO RADIU server The RADIUS server IP address to be Authentication Accounting authenticated accounted Address Auth port The authentication port number of RADIUS server Acct port The accounting port number of RADIUS severs Parameter Round Trip Time Access Requests Access Rejects Access Challenges Acct Request Acct Response Retransmissions Malformed Response Bad Authenticators Pending Requests Timeouts Unknown Types Packets Dropped 9 15 SSL Settings Secure Sockets Layer SSL uses authentication digital signature and encryption to provide secure communication between the host and chent When the SSL feature is enabled Web becomes disabled To manage the switch through Web Web browser must support SSL encryption and URL must begin with https for example https 192 168 1 253 Click Security gt SSL Settings to enable the SSL function on switch the configuration page
140. f not specified the system will distribute automatically Specify switch to permit or deny data stream that matches to the rule Protocol Type Specify IP protocol type that needs to be matched data Match IP Address Source IP address All Source IP specify this rule to be applied to all IP data packages Specify Source IP Mask specify this rule to be applied to the IP data package of specified IP address mask The IP address will match the whole field 1f no mask entered Destination IP address All Destination IP specify this rule to be applied to all IP data packages Specify Destination IP Mask specify this rule to be applied to the IP data package of specified IP address mask The IP address will match the whole field if no mask entered Match Port Specify the TCP UDP source port and destination port for data to be matched Match Priority Specify the IP priority and TOS fields for data to be matched TCP Flag Specify the TCP flag field for data to be matched Match ICMP Specify the matched data fields including the ICMP type and ICMP Message Code Fragments Use checkbox to specify whether to match packet fragmentation for this kind of protocol Time Range Name Click the Select button to specify the effective period of the rules Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes made End Create a Rule for Extending IPv6 Step 1 Click ACL gt ACL Profile Step 2
141. face transmits tagged frames marked the source VLAN Note that frames belonging to the interface s default VLAN are also transmitted as untagged frames Ingress Checking Determine how to process the tagged frame which is not included in this VLAN Default Enable Ingress filtering only affects tagged frames If ingress filtering is disabled and the interface receives a tagged frame which is not included in this VLAN these frames will be flooded to all other ports within this VLAN If ingress filtering 1s enabled and the interface receives a tagged frame which is not included in this VLAN then the frame will be dropped Ingress filtering does not affect VLAN independent BPDU frames such as GVRP or STP However they do affect VLAN associated BPDU frames such as GMRP Access VLAN If the displayed link type is Access the VLAN ID that the interface belongs to and the tagged or untagged frames received on the interface will be tagged with the VLAN ID default 1 The option can only be used when the link type is Access Trunk Allowed VLAN If the displayed link type is Trunk VLAN ID or list is allowed to pass through the interface This can only be used when the link type is Trunk Native VLAN The VLAN ID default 1 of untagged frame which is received on interface If the received frame is untagged frame the frame will be added default VLAN ID This can only be used when the link type are Trunk and Hybrid Hybrid U
142. ferent types of switches the switches must be compatible with Cisco EtherChannel standard Trunk members must be configured in the same mode including communication mode e g flow control and interface negotiation modes and CoS setting Any Giga interface of device front panel can be configured as Trunk including different media types of interfaces Interfaces of the same Trunk are all taken as a whole which can be added to a VLAN or completely deleted or moved from a VLAN Same STP VLAN and IGMP settings will be applied to all interfaces of the trunk 4 2 1 System Priority Configuration Click Interface Management gt Eth Trunk page to set Trunk the configuration page is shown as the figure below Figure 4 5 System Priority Configuration Priority 32768 OHigh 65535Low default 32768 Load Balancing Mode Source MAC we Table 4 4 Parameters of System Priority Configuration Item Issue 05 2012 10 25 32768 Set LACP priority level of switch Range 0 65535 Default Huawei Proprietary and Confidential 31 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 4 Interface Management ma Joan O O Load Balancing Mode Select the standard of flow distribution among member interfaces on Trunk group The options are Source MAC Destination MAC Source and Destination MAC Source IP Destination IP Source and Destination IP 4 2 2 Trunk Config
143. fy the entries that defined in the event group Falling Threshold Falling threshold generated by alarm events Value ranges from 0 2147483647 Falling Event Index Specify the entries defined in the event group Create the user name of alarm group Create a RMON Alarm Group Step 1 Click Network gt RMON Step 2 Click Alarm in Tab and click New to add an alarm group the configuration page is displayed as follows Figure 10 21 Create an Alarm Group X Close Entry 1 65535 Variable NUNN Interval 1 214 7483647 Sample Type Absolute Rising Threshold 0 2147483647 Rising Event Index 1 65535 Falling Threshold 0 214 7483647 Falling Event Index 1 65535 Owner 1 30 chars Apply Cancel Step 3 Enter the related information about the alarm in the page Issue 05 2012 10 25 Huawei Proprietary and Confidential 191 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Step 4 Click Apply button to apply all the changes made End 10 2 4 Event Event group is used to define the index number and event process mode The events that defined by event group is used in configuration items of alarm group and extend configuration items of alarm group When the monitored object reachs alarm conditions it will trigger the event Click Network gt RMON gt Event the configuration page 1s displayed as follows Figure 10 22 Event o Current position Network
144. g period of LLDP notice the range of the value is 5 32 768 seconds the default is 30 seconds This value must follow the following principles Send period gt 4 delay period To Maintain The Value Of According to the following formula to configure the Information Transmission lifetime of LLDP TTL that sending out notice values Equipment range from 2 to10 default is 4 Life time is the agent which receives LLDP to decide how long to maintain the LLDP information before receiving the LLDP updates TTL in seconds based on the following principles The default is TTL 4 30 120 seconds Re enable The Delay Value Configure the delay time from the LLDP interface disconnected to shut down or before re initialize the link the value range is 1 10 seconds the default 1s 2 seconds When a LLDP interface is re initializing the remote system LLDP MIB associated with this interface will be deleted Transmission Delay Configure the interval between the continuous sending notices which is caused by the change of LLDP MIB variables the value range is 1 8192 seconds default is 2 seconds Transmission interval is to prevent the local LLDP MIB objects rapidly change and continuously send LLDP in a short time LLDP is possible to send in a multiple rather than an LLDP MIB object changes This attribute must follow the following principles 4 send delay time lt sending period Notification Interval This is the interval
145. ge of specified IP address prefix length The IP address will match the whole field if no mask entered Destination IPv6 address All Destination IPv6 specify this rule to be applied to all IP data packages Specify Destination IP Prefix Length specify this rule to be applied to the IP data package of specified IP address prefix length The IP address will match the whole field if no mask entered Match Port Specify the TCP UDP source port and destination port for data to be matched Match Message Specify service level and Flow Label for data to be matched TCP Flag Specify the TCP flag field for data to be matched Match ICMP Specify the ICMP field including ICMP type and Message Code for data to be matched Fragments Use checkbox to specify whether to match packet fragmentation for this kind of protocol Issue 05 2012 10 25 Huawei Proprietary and Confidential 89 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration Time Range Name Click the Select button to specify the effective period of the rules Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes made End Create a Rule for Extension MAC Step 1 Click ACL gt ACL Profile Step 2 Click a created extending MAC rule in ACL list and click New button in the list box of ACL Rule to add a new rule opening the configuration shown page as below Figure 6
146. ght Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 1 Client Setting Figure 1 2 Device Summary a Y 1700 52GFR 4P AC Language 2 Help Logout HUAWEI Current User admin User Level Administrator D Next refresh in sec 60 v Refresh o Current position Device Summary Device Summary System Management 2 Device Panel PERSO Maa aaa JL inactive MN Active B Forcibly Disabled _ Electrical _ JOptical Switch Information Switch Health Interface Management Service Management ACL Qos IP Routin 9 Product ID 1700 52GFR 4P AC CPU Usage Temperature oi Device Name 1700 32 42 C Network Serial Number Device Management MAC Address 0001 0203 0400 3 ave Running config t 1 IP Address 192 168 1 253 Manual Software Version 1700 V100R007C00SPC100 AC 110 240V 0 day 0 hour 17 min 51 sec z Table 1 1 Device Summary Description 1 2 2 Navigation Tree The menu consists of following 11 items Device Summary System Management Interface Management Service Management ACL QoS IP Routing Security Network Device Management and Save Running config Each item comprises submenu as shown in Figure 1 2 Table 1 2 Description of Web Network Management Menu Items Device Device Summary Show front panel mimetic diagram information Summary and status of device System Reset Factory Reset setting of switch to factory defau
147. gies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Change Alarm of Interface Link Interface Name Interface number Status Use SNMP alarm when the switch interface disconnect To globally enable SNMP Trap function and Trap status on interface 1 Step 1 Click Network gt SNMP Step 2 Click SNMP Trap Settings in Tab Step 3 Enable SNMP Trap function Step 4 Select the check box at the left side of interface 1 and click Configure the configuration page is displayed as follows Figure 10 13 Configure SNMP Link Change Trap X Close Etherneto o0 38 Interface Name Status En able o v Apply Cancel Step 5 Select Enable from Status list Step 6 Click Apply button to apply all the changes made End 10 2 RMON RMON Remote Monitoring is the monitoring specification of IETF Internet Engineering Task Force Internet Engineering Task Force standard which allows various network monitors and console systems to exchange network monitoring data RMON probes placed on the network nodes The network management platform decides what information will be reported by these detectors such as the monitored statistics and the time of collecting historical information etc For example switches and routers and other network devices that act as a network node on the network are able to monitor the current node location through the function of RMON Issue 05 2012 10 25 Huawei Proprietary and Confidential
148. guration ZN caution When items configurations of webpage are completed configuration must be saved If not parameters will be lost when webpage changes or is refreshed When saving the configuration if this size of surplus memory is less than the current configuration size the saving process will fail Please delete the needless file via File System Management then execute configuration saving 1 5 Logout Web Network Management Client To ensure security of Web network management system user should timely logout after configuration Click button at the upper right of any webpage on Web Network Management Client to logout Issue 05 2012 10 25 Huawei Proprietary and Confidential 8 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 2 Device Summary Device Summary About This Chapter This chapter describes all components of logon homepage including device panel device information and device status etc 2 1 Device Panel 2 2 Device Information 2 3 Device Status 2 1 Device Panel This panel Display its main information as shown in Figure 2 1 Clicking Device Summary menu under navigation bar user can view Device Panel page the configuration page is shown as follows Figure 2 1 Device Panel Webpage Device Panel 2 14 Je Js Io iz MMe Ja 20 2 Js Jae 128 J S0 2 4 se Je Jao 42 44 Je Co iia C Inactive Ea L Active EN L Forcibly Disabled C Electr
149. guration Table 7 16 Parameters of Configuring Traffic Policy Select policy to apply on interface VLAN Policy Name The applied policy name Select Interface Select the interface number which applies traffic policy if the Application Object refers to Interface Select object applying traffic policy in pull down menu of Target Step 3 Enter the applied traffic name in Traffic Policy Name Step 4 Configure corresponding application object Step 5 Click Apply button to apply all the changes made The successfully configured traffic policy application entry will be displayed in list box of traffic policy application End 7 9 Traffic Shaping Traffic shaping allows network administrators to allocate the minimum guaranteed bandwidth and maximum limited bandwidth for each queue to achieve the purpose of improving network service quality based on rational allocation of resources Click QoS gt Traffic Shaping to view the traffic shaping data configured on switch interface the configuration page is shown as the figure below Figure 7 22 Traffic Shaping o Current position QoS gt Traffic Shaping E EEES Interface Name O oe ate Ethernet0 0 1 No Limit No Limit No Limit No Limit No Limit No Limit No Limit No Limit No Limit No Limit No Limit No Limit No Limit No Limit No Limit No Limit O Ethernet0 0 2 No Limit No Limit No Limit No Limit NoLimit No Limit No Limit No Limit NoLimit No Limit NoLimit No Limit No Limit No
150. guration page is displayed as follows Figure 9 38 Interface Parameter Settings o Current position Security gt DHCP Snooping Global Interface State Settings Interface Trust Settings Interface Parameter Settings SIL LEl ida Query Interface Name All Query m Interface Name Packet Limit Maximum Threshold Renewal Check Alarm threshold Chaddr Check Chaddr Alarm Alarm threshold O 0 0 0 Ethernet0 0 1 Disable Disable Disable Disable Disable oO Ethernet0 0 2 Disable 0 Disable Disable 0 Disable Disable 0 F Ethernet0 0 3 Disable 0 Disable Disable 0 Disable Disable 0 Issue 05 2012 10 25 Huawei Proprietary and Confidential 151 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Table 9 26 Parameters of Interface Parameter Settings Query Search the parameter settings of specified interface in Interface Name Interface Name Interface Number Packet Limit Prevent a large number of DHCP Request packets sent by attackers to attack switch Maximum Threshold Maximum threshold value received Renewal Check Avoid attacking DHCP Server through fake DHCP renewal packet sent by attacker Renewal Alarm Give an alarm when the received DHCP renewal message exceeds alarm threshold Alarm Threshold The maximum threshold value of received renewal packets Chaddr Check Avoid attacking DHCP Server by changing the CHADDR value Chaddr Alarm Give an alarm when the received
151. hat a switch interface waits for a response to an EAP request from a client before re transmit an EAP packet Range 1 120 Default 30 seconds Server Timeout Sets the time that a switch waits for a response to the authentication server to avoid re transmitting an EAP packet Range 1 120 Default 30 seconds MaxReq Sets the maximum number of times the switch interface will retransmit an EAP request packet to the client before it is out of the authentication session time Range 1 10 Default 2 ReAuth Period Sets the time interval after which a successful authentication client must be re authenticated Range 60 7200 Default 3600 seconds ReAuthentication After successful authentication switch allows the client to re authenticate Re authentication can check whether the current user is online or legal Status Check whether the interface is used to enable or disable authentication Authenticator indicates enabling the authentication function on the interface At this time only the user who passes the authentication process can access the network None indicates disabling 802 1 X on the interface Note if enabling 802 1X on an interface with MAC based VLAN disabled VLAN assignment works abnormally under host based mode Handshake After user authentication passes the handshake function 1s enabled the Period switch will send Request Identity to detect whether the user is online according to the configured handshake interval
152. hen 518129 People s Republic of China Website http enterprise huawei com S1700 Managed Series Ethernet Switches Web User Manual About This Document About This Document Intended Audience This document is divided into sections that describe the product settings and management of S1700 based on Web This document is intended for e Policy planning engineers e Installation and commissioning engineers e NM configuration engineers e Technical support engineers e FAE e Network monitoring engineers e System maintain engineers Conventions The symbols that may be found in this document are defined as follows AN Indicates a hazard with a high level of risk which if DANGER not avoided will result in death or serious injury A Indicates a hazard with a medium or low level of WARNING risk which if not avoided could result in minor or moderate injury A Indicates a potentially hazardous situation which if CAUTION not avoided could result in equipment damage data loss performance degradation or unexpected results 0 TIP Indicates a tip that may help you solve a problem or save time NOTE Provides additional information to emphasize or supplement important points of the main text Issue 05 2012 10 25 Huawei Proprietary and Confidential 11 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual About This Document Change History Changes between docume
153. hreshold The range is 0 7 100 6 25 3 125 1 5625 0 78125 0 390625 0 1953125 0 09765625 0 l 2 3 4 5 6 7 High Threshold When drop mode is Drop Green reaching this threshold it will begin to drop Green message When drop mode is Not Drop Green it drops Yellow message Issue 05 2012 10 25 Huawei Proprietary and Confidential 104 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration High Drop Rate Specify drop rate of high threshold The range is 0 7 0 100 1 6 25 233 125 3 1 5625 4 0 78125 5 0 390625 6 0 1953125 7 0 09765625 End 7 7 2 SRED Information Click QoS gt SRED gt SRED Information to configure SRED Profile applied to interface on switch the configuration page is shown as the figure below Figure 7 10 RED Information o Current position QoS gt SRED SRED Profile Profile SRED Information Information Ei RAN uewe aueves Queues cues Queues Queue7 interface Name SRED oe ee ai sao Status Profile SRED nn aoea Status E Sn Ethernet0 0 1 Disable Disable Disable Disable 1 Disable Disable Disable Disable 5 Ethernet0 0 2 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 O Ethernet0 0 3 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 O Ethernet0 0 4 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Di
154. ical El Optical Based on type of the switch connected the display area of Web network management panel can intuitively display information of the various interfaces of this switch the contents displayed including Interface amount Operating statuses of interfaces including activated state and interface type LC NoTE Place mouse on some interface to view number and connection rate of this interface Issue 05 2012 10 25 Huawei Proprietary and Confidential 9 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 2 Device Summary 2 2 Device Information It shows model device name serial number MAC address IP address system software version power and uptime of switch Click Device Summary menu under navigation bar and view the page of Device Information configuration page is shown as follows Figure 2 2 Device Information Page Switch Information Product ID 51700 52GFR 4P AC Device Name 51700 serial Number MAC Address 0001 0203 0400 IF Address 192 168 1 253 Manual Software Version 31700 V1I00R00 7COOSPC100 Power AC 110 240V Uptime 0 day 0 hour 25 min 35 sec 2 3 Device Status It shows current CPU usage factor and temperature information of switch Click Device Summary menu under navigation bar and view the page of Device Status configuration page 1s shown as follows Figure 2 3 Device Status Page switch Health CPU Usage Temperature 14 do Issue
155. ied to the IP data package of specified IP mask The IP address will match the whole field if no mask entered Time Range Name Click Please Select button to specify effective time for the rule Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes made End Create an Extending IP Rule Step 1 Click ACL gt ACL Profile Step 2 Click a created extending IP rule in the ACL list box and click New button in list box of ACL Rule to add a new rule opening the configuration page shown as the figure below Figure 6 6 Create Extended IP Rule X Close ACLID 2000 Rule ID 1 65535 If not specified system to automatically assign Action Permit Deny Protocol Type TCP v Match IP Address 3 All Source IP Specify Source IP Mask All Destination IP Specify Destination IP i i i Mask Match Port Source Port Please Select vw 0 65535 0 65535 Destination Port Please Select vw 0 65535 0 65535 Match Priority IP Precedence Please Select v TOS Please Select v TCP Flag C ack fin psh J rst syn urg Time Range Name Please Select Apply Cancel Issue 05 2012 10 25 Huawei Proprietary and Confidential 87 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration Table 6 6 Parameters of Extending IP Rules ACL ID ACL ID that entry rules belongs to Rule ID Enter an ID for rule and the range is 1 65535 I
156. ings of specified interface in Interface Name Interface Name Interface number MAC PHY Configuration Whether to publish the MAC PHY configuration status of interface MAC PHY configuration status is the speed and duplex state that supported by interfaces whether to support the interface speed auto negotiation whether to enable auto negotiation and the current speed and duplex status Whether to publish the interface POE POE refers to the power supply through interface Link Aggregation Whether to publish the link aggregation interface Link Aggregation refers to the interface whether to support link aggregation and whether to enable the link aggregation Total Max Frames Whether to publish the maximum frame length Maximum frame length is the maximum frame size supported by the interface and taken by the interface configuration MTU Max Transmission Unit Configure parameters of Dot3 TLVs for interface Step 1 Click Network gt LLDP Step 2 Click Dot3 TLVs in tab Issue 05 2012 10 25 Huawei Proprietary and Confidential 199 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Step 3 Click the check box on the left side of the configuring Dot3 TLVs parameter interface and then click Configure to open the following page Figure 10 33 Configure Dot3 TLVs parameter EthernetoO o 42 Interface Name MAC PHY Configuration ET Status Link Aggregation
157. interval certain time It supports the suppression to the member message of IGMPv1 IGMPv2 and IGMPv2 Leave 0 indicates disable message suppression function Dynamic Mrouter Aging The aging time for configuring dynamic route 0 represent the Time aging time of dynamic route with global configuration General Query Max The maximum permissible time of the host sending IGMP Response Time response message after receives general group query The range of permissible time is 1 25 seconds and the default is 10 seconds O indicates maximum response time of general group with global settings Specific Query Max The maximum permissible time of the host sending IGMP Response Time response message after receives specific group query The range of permissible time is 1 5 seconds O indicates maximum response time of specified group with global settings Check Router Alert Check the Router Alert options in IGMP message header if use this function then IGMP message s IP head received by the current VLAN must be attached to Router Alert GMPv1 message excluded otherwise drop this message Send Router Alert Router Alert option includes whether to send router alert in IGMP message header Set the parameters of Snooping VLAN Step 1 Click Service Management gt IGMP Snooping gt VLAN Parameter Step 2 Click the Edit icon on the right of VLAN entry of the parameter needed to modify opening the configuration page shown as below Figure 5
158. ion is enabled the switch will close these ports and notify the network management system at the same time if the edge port receives a BPDU The shut down port can only be restored manually by network manager Time Since Last TC The durative period after the spanning tree was configured last time Instance Information Instance Instance Number Path Cost Cost value of device path Priority Device priority Issue 05 2012 10 25 Huawei Proprietary and Confidential 56 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management STP Status Display this interface s status on the spanning tree Discarding port receives STP configuration messages but does not forward packets Learning port does not forward packets and starts to learn MAC address Forwarding port forwards packets and continues learning addresses Protection Type Options of protection types enabled on interfaces are Root protection root protection function can protect the root switch position by maintaining the role of designated port By configuring the Root Protection on port all the port roles in instances will be kept as designated ports When the port receives a higher priority BPDU the port role will not set as non designated port but turn into the listening state and stop forwarding packets If the port has no longer receives higher priority BPDU after a long time it will restore to its o
159. ion page is shown as the figure below Figure 5 46 IGMP Snooping Mrouter o Current position Service Management gt IGMP Snooping Global VLAN Parameter Group Deny Group Policy Static Groups Mrouter HE Interface Name VLAN Operation Total 0 New Delete Table 5 33 Parameters of IGMP Snooping Mrouter VLAN The VLAN for transmitting multicast service The static configuration of multicast router interface on switch The multicast router interface detected by the dynamic on switch Add IGMP Snooping Route Interface Step 1 Click Service Management gt IGMP Snooping gt Mrouter Step 2 Click New button opening the configuration page shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 79 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Figure 5 47 Create Mrouter Add IGMP Snooping Static Route Interface VLAN Static Interface Eth Trunk List Press Ctrl or Shift selcet more ports Apply Cancel Table 5 34 Parameters of IGMP Snooping Mrouter Specify VLAN for transmitting multicast service Specify interface to connect multicast router Specify Trunk to connect multicast router Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes made End 5 6 9 Forwarding Table Click Service Management gt IGMP Snooping gt Forwarding Table to check forwarding
160. is the default untagged VLAN VLAN Name Name of the VLAN Add a Static VLAN Step 1 Click Service Management gt VLAN gt VLAN the configuration page is as shown in Fig 5 1 Step 2 Click New button to add VLAN the configuration page is as shown in following figure Figure 5 2 Add VLAN Pe VLAN ID 2 4094 Ey VLAN Name 1 32 chars Apply Cancel Step 3 Enter VLAN ID and VLAN names parameters are as shown in Fig 5 1 Step 4 Click Apply to apply all the changes made End Issue 05 2012 10 25 Huawei Proprietary and Confidential 37 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Step 1 Step 2 Step 3 Step 1 Step 2 Step 3 5 Service Management ZN caution At most 4094 VLANs can be configured to this switch VLAN 1 is the default Untagged VLAN View Delete Static VLAN Click Service Management gt VLAN gt VLAN to view the settings of static VLAN the configuration page is as shown in Fig 5 1 Click the check box in the left hand column of VLAN entries to be deleted the member information of the VLAN is displayed in VLAN ID Member list Click Delete button to delete static VLAN End ZN caution VLAN 1 cannot be deleted Modify VLAN Click Service Management gt VLAN gt VLAN to modify the basic information of VLAN the configuration page is as shown in Fig 5 1 Choose the Edit button in the right hand column of VLAN en
161. k the interface will be not displayed in STP interface list If removed from Eth Trunk the STP attribute of original interface will recover 5 5 4 MSTP Region Click Service Management gt STP gt MSTP Region to view switch s domain information the configuration page is shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 66 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Figure 5 31 STP Region Information o Current position Service Management gt STP SI AAA cece MSTP Region Region Name 00 01 02 03 04 00 1 32 chars The default value is the MAC of the switch Revision Level 0 OHigh 65535Low default 0 Apply Instance VLAN Mapping Configuration CI O CIST 1 4094 Total 1 Add Delete Table 5 20 Parameters of MSTP Region Region Name Specify MST domain name joined by the switch the domain name can only identify MSTI Multiple Spanning Tree Instance If domain name is not set the MAC address of the device operating MSTP will be displayed Revision Level This value and domain name altogether identifies the MSTP protocol configured on switch The value range is 0 65535 default is 0 Instance Display the MST instance ID currently configured on switch The default CIST is common and internal spanning tree of MSTI Mapped VLANs Display VLAN ID mapped to specified MST instance Add MSTP Instance Step 1 Cli
162. l 10 Network Engine ID SNMP engine ID must be 16 hexadecimal digits is the unique identifier used to identify SNMP V3 which is used to identify the SNMP entity of switch on network Enable SNMP function Step 1 Click Network gt SNMP Step 2 Click SNMP Global Settings in Tab Step 3 Select the Enable in SNMP Status field to enable SNMP Global Settings Step 4 Click Apply button to apply all the changes made End 10 1 2 View Click Network gt SNMP gt View to set the SNMP view information the configuration page 1s displayed as follows o Figure 10 2 View o Current position Network gt SNMP SNMP Global Settings View SNMP Community SNMP Host SNMP Group SNMP User SNMP Trap Settings AT se View Tpe O restricted 13642701 Included O restricted 13 6 12 1 11 Included O restricted 1 3 6 1 6 3 10 2 1 Included O restricted 1 3 6 1 6 3 11 2 1 Included O restricted 1 3 6 1 6 3 15 1 1 Included O CommunityView 1 Included O CommunityView 1 3 6 1 6 3 Excluded O CommunityView 1 3 6 1 6 3 1 Included Total 8 New Delete Table 10 2 Parameters of View Up to 32 characters used to define a SNMP view Subtree The object identifier OID used to identify an object MIB tree This object tree can be accessed or denied by SNMP manager View Type Included means the SNMP manager can access the object tree while Excluded means the SNMP manager cannot access this object tree Issue 05 2012 10 25 Huawei Proprietary and Co
163. ldos 10 A E NT 10 oo ystem Management capis 11 A CCE ACCOM Y aana tid auauteagsud ea cwauunadnne sudan danicaw bibus Sadgacnsdundands a a 11 A asus ct vaya and dees neat toes etansastn eet esd eases op sae onc geese E cues sa anos eae danse Team E enn eanese Rae 12 DS OLLW ALCL Ye A I EE S A E E E bekeogatiaataltenerccss E S E 13 BA Pile System Mana eme N Enas tet cea catenin a al 14 System Conf eura Oisen a a E 15 FO N EP RA 16 Dag Me Mijate MEN edad 17 SL Management VLAN dad clio 17 ATAA VA O 18 PRIIP Orta ccs never sudigs dee cnetpan ea das tt cap dein Gad pain caimadpancatan ted und aus Soden tan a a 20 sO IRE ilar susie ule erica eins as a won tae a S 21 Dy Oe O O aa 21 EDO A A O A 22 Doo ME VO Nei A a A A A hi 22 Issue 05 2012 10 25 Huawei Proprietary and Confidential O iV Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Contents IE Stane NeT ADO iria 22 5 9 2 Dynan NE DDOR at A TA ias 23 5 OS Router AVES A aac Sot eaaade 24 A Interface Management a 26 A A tees 26 A Basto AMD iaa ibn 26 Ali Zo SUAUIS ts OM MLCT A A A ie 28 AD Pim O O A unasas desu edennenaaueciuaesad unas eiakonaaeeoaheneesaqsaaaseanaeuas 30 AZ System Pr ori CONN SUTA O tc A O bocasiassereeiehieete 31 AD TUNE COn UT ALON APP O NO O O O ER 32 SIDECLVICE Management 36 IEN EAN A E ea E EA EE 36 EAN RR 36 SA EA A E E A nea dana T AE E T A E AET E ET 38 INC A A O E E ETNE 40 NA VEAN ri A adds 41 A e O
164. le and IPSG static ARP table The illegal ARP messages will be discarded Functions are as follows 1 Use DHCP snooping table and IPSG static table to create a credible real and safe ARP cache library for resisting ARP spoofing 2 The non trusted interface ARP responses will be blocked and matched to check if the interface is matched otherwise the unmatched one should be discarded 3 The trusted interface will not be blocked and matched 4 Limit the ARP packet rate for non trusted interface 9 10 1 Global Click Security gt DAI gt Global the configuration page is displayed as follows Figure 9 46 Global Settings a Current position Security gt DAI r Restore Settings Auto Recovery Disable hs Auto Recovery Interval 300 30 86400 sec default300 Apply Manual Recovery Apply r Query Vi LAN ID Query O Tr IE O 1 Disable Total 1 1 1 EN Go Configure Issue 05 2012 10 25 Huawei Proprietary and Confidential 158 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Table 9 31 Parameters of Global Settings Auto Recovery The un trusted interface can be reset to enabled status when un trusted interface is closed for ARP message over speed Automatic Recovery Interval Enter the automatic recovery time Values range from 30 to 86400 seconds the default 1s 300 seconds Manual Recovery Click Apply button to restore the closed interface manua
165. lick Service Management gt IGMP Snooping gt Static Groups to view information of static groups on switch the configuration page is shown as the figure below Figure 5 41 IGMP Snooping Static Groups o Current position Service Management gt IGMP Snooping Global VLAN Parameter Group Deny Group Policy Static Groups Forwarding Table Total 0 New Batch Create Delete Static Group Interface Table Interface Name Table 5 28 Parameters of IGMP Snooping Static Groups VLAN ID Name VLAN ID number VLAN name Group Address IP address for static multicast group Add IGMP Snooping Static Group Step 1 Click Service Management gt IGMP Snooping gt Static Groups Step 2 Click New button opening the configuration page shown as the figure below Figure 5 42 Add IGMP Snooping Static Group Add IGMP Snooping Static Group VLAN Group Address sStatic Interface m OEth Trunk List Press Ctrl or Shift selcet more ports Apply Cancel Table 5 29 Parameters of IGMP Snooping Static Groups VLAN Specifiy VLAN for transmitting multicast service Group Address The IP address for the newly created static multicast group Issue 05 2012 10 25 Huawei Proprietary and Confidential 76 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Select interface for receiving this static multicast group Select Trunk for receiving this static multicast group da
166. licy configured on switch to interface or VLAN the configuration page is shown as the figure below Figure 7 20 Apply Traffic Policy o Current position QoS gt Traffic Management ci aa cias a al Apply Traffic Policy Query Interface Name All v VLAN ID 1 4094 Query mi morace or vo Paco Total 0 New Delete Table 7 15 Parameters of Applying Traffic Policy Query Query configuration information of traffic policy according to interface name VLAN ID Interface or VID Interface ID VLAN ID which applies policy Policy Name The applied policy name of interface The data direction of the applied policy name only supports ingress Add a Traffic Application Step 1 Click QoS gt Traffic Management gt Apply Traffic Policy Step 2 Click New button to add a traffic policy application opening the configuration shown as below Figure 7 21 Configure Traffic Policy Target Interface Policy Name Select Interface SelectAll Cancel All pa 2 3 fa 5 6 7 8 9 10 14 12 13 14 15 16 17 48 19 20 24 22 23 24 25 26 DNoOoOoooOoooooooooooooooooooo 27 28 29 30 34 32 33 34 35 36 37 38 39 40 at 42 43 aa 45 a6 a7 14811 2 1314 DODODDODODODODODODODODODOOO Apply Cancel Issue 05 2012 10 25 Huawei Proprietary and Confidential 112 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Confi
167. list and then click Configure button The configuration page is shown as below Figure 5 29 STP Settings Based on Interface X Close Interface Name GigabitEthernet0 0 1 STP Enable ODisable Default Enable r Instance 0 Instance 0 v Port Priority 128 Default 128 Internal Path Cost 0 0 200000000 default 0 0 means auto r Advanced Protection Type None Y Default None Edge auto Y Default auto Point To Point auto Y Default auto Path Cost 0 0 200000000 default 0 0 means auto Clear Detected Protocol Apply Cancel Table 5 18 Parameters of STP Settings Based on Interface Select instance number on interface Port Priority Definition of this interface s priority in spanning tree A higher priority will specify firstly interface to forwarding packet The lower number indicates the higher priority If all interfaces path cost 1s the same on this switch the higher priority interface will be configured as the active link in the spanning tree The default value is 128 range is 0 240 field is 16 Internal Path The root cost when switch reaching to CIST region Cost Issue 05 2012 10 25 Huawei Proprietary and Confidential 62 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Protection Type The options for whether to enable corresponding protection on interface are Root protection Root protection function protects ro
168. ll be ignored dropped The default community strings for the Switch used for SNMP v 1 and v 2c management access are e public Allow authorized management stations to read MIB objects e private Allow authorized management stations to read and write MIB objects Issue 05 2012 10 25 Huawei Proprietary and Confidential 175 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network SNMPv3 uses a more sophisticated authentication process that is divided into two parts The first part is to maintain a list of users and their attributes are allowed to act as SNMP managers The second part describes which user on that list can do as an SNMP manager The Switch allows groups of users to be listed and configured with a shared set of privileges The SNMP version may also be set for a listed group of SNMP managers Thus you may create a group of SNMP managers that are allowed to view read only information or receive traps using SNMPvl while assigning a higher level of security to another group granting read write privilege using SNMPv3 Traps Traps are messages that alert network personnel events that occur on the Switch The events can be as serious as a reboot someone accidentally turned OFF the Switch or less serious like a port status change The Switch generates traps and sends them to the trap recipient or network manager Typical traps include trap messages for Authentication
169. lly Query Search DAI status information of specified VLAN in VLAN ID VLAN ID VLAN ID number DAI configuration status on VLAN Enable DAI of VLAN Step 1 Click Security gt DAI Step 2 Click Global Parameter in Tab Step 3 Click the checkbox on the left side of VLAN of DAI function to be enabled and then click Configure button the configuration page 1s displayed as follows Figure 9 47 Enable VLAN DAI X Close VLAN ID Status Disable v Apply Cancel Step 4 Enable DAI status of VLAN in Status field Step 5 Click Apply button to apply the changes made End 9 10 2 Interface Click Security gt DAI gt Interface the configuration page is displayed as follows Issue 05 2012 10 25 Huawei Proprietary and Confidential 159 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 48 Interface o Current position Security gt DAI Global Interface Query Interface Name All Mj Query m Interface Name Trust Status Limited Speed Status Rate pps O Ethernet0 0 1 Enable Disable 15 Forward O Ethernet0 0 2 Enable Disable 15 Forward O Ethernet0 0 3 Enable Disable 15 Forward O Ethernet0 0 4 Enable Disable 15 Forward Table 9 32 Parameters of Interface Search the DAI settings of specified interface in Interface Name Trust Status The options of DAI trusted status of interface are Trust port the switch does not check the received ARP pack
170. lt Management l l Reboot Reboot switch with specified version of software and configuration files Software Upgrade Upgrade firmware version of switch in HTTP or FTP mode File System Upload download and delete files of device Management System Set device name and connection timeout duration Configuration Issue 05 2012 10 25 Huawei Proprietary and Confidential 3 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Interface Management Sub Menu SNTP IP Management ARP IPv6 Neighbor Ethernet Interface Eth Trunk Service VLAN Management MAC VLAN Voice VLAN MAC STP IGMP Snooping ACL Effective Period ACL Profile ACL Application Issue 05 2012 10 25 1 Client Setting SNTP Server Configuration set SNTP server parameters Time configuration manually configure time for system clock View and manage VLAN local management of IPv4 and IPv6 addresses Perform ARP configuration Configure static neighbor table view dynamic neighbor table configure and view router advertise Base attribute of interface display the connection status to configure relevant parameters for individual interface or a group of interfaces Interface traffic statistic display traffic statistic information of each interface Priority configure system priority Traffic sharing mode configure traffic sharing mode Trunk vie
171. ment Tracert Ping test Step 1 Click Device Management gt Tools Step 2 Click Tracert in tab Step 3 Enter target IP address to be tested in IP Address and then click Start button to test route from source address to destination address Step 4 The result will display in IPv4 Tracert Result field End Issue 05 2012 10 25 Huawei Proprietary and Confidential 216 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 11 Device Management 11 7 3 One Key Information Download Config Log and Error message of system in text file to local hard disk on One Key Information page Click Device Management gt Tools gt One Key Information the configuration page is displayed as follows Figure 11 12 One Key Information o Current position Device Management gt Tools Ping Test Tracert One Key Information One Key Information Download Config Log and Error message Download Issue 05 2012 10 25 Huawei Proprietary and Confidential 217 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 12 Save Running config Save Running config Click Save Running config menu to save the current configuration of switch in configuration file Issue 05 2012 10 25 Huawei Proprietary and Confidential 218 Copyright Huawei Technologies Co Ltd
172. mputer then click Import button to import information to switch End Export Security Address Step 1 Click Security gt Port Security Step 2 Click Address Table Import and Export in Tab Step 3 Click Export button to save the security address table information on switch as cfg file format to local computer End Issue 05 2012 10 25 Huawei Proprietary and Confidential 142 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security 9 6 MAC based Access Control Some devices connected to network do not support 802 1 X authentication possibly due to the limitation of hardware and software such as network printer IP phone and some wireless APs The switch allows this kind of network device to achieve authentication access by authenticating the MAC address of the device 9 6 1 Global Click Security gt MAC based Aceess Control gt Global to configure the global parameters of MAC Authentication the configuration page is displayed as follows Figure 9 25 Global Settings o Current position Secunty gt MAC based Access Control Global MAC based Access Control Auth info MAC Format Configure status Disable bl Password 1 16 chars User Mame Default 1 64 chars Max User 11 512 default 256 Note It will set user name as MAC address if you select default Apply Table 9 18 Parameters of Global Settings Configure the global function of MAC address authentication Pa
173. n of the interface list to be edited and then click Configure button to modify the MAC filter function for interface the configuration page 1s shown as the figure below Figure 5 24 MAC Filter Configuration GigabitEthernet0 0 4 Interface Name Status Enable Disable Default Disable Apply Cancel Step 2 Click Enable button to enable MAC filter function of the interface Step 3 Click Apply button to apply all the changes made End 5 4 6 Migrate MAC Table Migrate MAC Table lists the changed information of the same MAC address among the switch interfaces Issue 05 2012 10 25 Huawei Proprietary and Confidential 54 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 5 STP 5 Service Management Click Service Management gt MAC gt Migrate MAC Table page to open the page as shown in following figure which displays the information of all the MAC address migration Figure 5 25 Migrate MAC Table o Current position Service Management gt MAC Noe Ne ASESOR Ra eee Migrate MAC Table MAC Address VLAN ID Old Interface Name New Interface Name Total 0 Table 5 14 Parameters of Migrate MAC Table MAC Address MAC address in address table VLAN ID VLAN ID that corresponds to the above MAC address Old Interface Name The interface number from which the MAC address migrates New Interface Name The interface number to which the MAC address migrates Span
174. n to add a new binding table entry Figure 9 44 New Binding Table X Close Interface Name Ethernet 0 0 1 IP Address WAC Address 0000 0000 0000 H H H VLAN ID 1 1 4094 Apply Cancel Step 4 Enter relative information of static binding table in the page Step 5 Click Apply button to apply the changes made End 9 9 3 One Key Bind One Key Bind is used to add IPSG binding entry in ARP table on switch Click Security gt IPSG gt One Key Bind the configuration page is displayed as follows Figure 9 45 One Key Bind ECM ia NENE One Key Bind 1 Ethernet0 0 46 0016 7629 C7AA 192 168 1 5 Unbinding Bind Ethernet0 0 46 1 00E0 4C01 0412 192 168 1 78 Unbinding Bind Ethernet0 0 46 1 0011 2493 DCD3 192 168 1 79 Unbinding Bind Total 3 EN Go One Key Bind One Key Unbind Table 9 30 Parameters of One Key Bind VLAN ID Host VLAN ID Issue 05 2012 10 25 Huawei Proprietary and Confidential 157 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security One Key Bind One Key Bind button is used to set the entire Bind State field in entries to Bind State One Key Unbind One Key Unbind button is used to set the entire Bind State field in entries to Unbind State ZN caution To bind ARP entry as IPSG entry IPSG should be enabled on interface first 9 10 DAI DAI Dynamic ARP Inspection is used to check the legality of received packet by using the DHCP snooping tab
175. nable Enable Enable O Ethernet0 0 2 Enable Enable Enable Enable O Ethernet0 0 3 Enable Enable Enable Enable O Ethernet0 0 4 Enable Enable Enable Enable Issue 05 2012 10 25 Huawei Proprietary and Confidential 196 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Table 10 16 Parameters of The Basic TLVs Search the basic TLVs settings of specified interface in Interface Name Interface Name Interface number Port Description Whether to publish port description Port Description includes manufacturer product name and the hardware software version of interface System Name Whether to publish the distribution system name The system name contains the management name of the system System Description Whether to publish the description of distribution system System descriptions include the hardware type of system operating system version information of network software and full name System Capabilities Whether to publish system capabilities System capabilities include main function of system and enabled items Configure parameters of basic TLVs for interface Step 1 Click Network gt LLDP Step 2 Click the Basis of TLVs in tab Step 3 Click the check box on the left side of the configuring basic TLVs parameter interface and then click Configure to open the following page Figure 10 29 Configure The Basic TLVs Parameter X Close ee ena TE GicgabitEtherneto0 0
176. ne Log File Write Delay 0 0 65535 min default 0 0 means infinite Total 0 Add Delete Issue 05 2012 10 25 Huawei Proprietary and Confidential 210 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 11 Device Management Table 11 3 Parameters of Information Center Log State Select Enable to enable system log and select Disable to disable system log The default is Enable Buffer Log Level Buffer Log Level is divided into eight levels and the information can be filtered on basis of the levels The smaller the value level of system information the higher the degree of urgency should be For the detailed severity level please refer to 11 4 Severity Level List Trap Log Level Trap Log Level is divided into eight levels and the information can be filtered on basis of the levels The smaller the value level of system information the higher the degree of urgency should be For the detailed severity level please refer to 11 4 Severity Level List Select a device that sends out the system information Source IP Interface Select source IP interface of device used to send system information Log File Write Delay Refers to the interval used to save FLASH If the interval is 0 means unlimited time it should be saved to FLASH manually if the interval is 1 65535 the system will be saved to FLASH automatically according to the entering interval in minutes Log Server User
177. net Switches Web User Manual 5 Service Management 5 3 6 Legacy Device Click Service Management gt Voice VLAN gt Legacy Device page to view the legacy devices connected to the switch the configuration page is shown as the figure below Figure 5 16 Legacy Device o Current position Service Management gt Voice VLAN Global oe a CURA eRe SA A A eee Legacy Device Total 0 Table 5 9 Parameters of Legacy Device The list number for legacy device Name of legacy device Interface Name The local interface number communicating to legacy device MAC Address MAC address of legacy device The time when message 1s received from legacy device The remaining time that legacy device exists on switch 5 4 MAC Ethernet switch uses information of MAC address list to address and forward the message quickly in link data layer This article describes the configuring methods of MAC address 5 4 1 MAC Address Table MAC Address Table allows checking MAC address forwarding table of switch If switch learns a MAC address and its relevant interface number it will create an entry in forwarding table These entries are used in forwarding packets If the destination address of inbound traffic is in the database the packets will be directly forwarded to related interface or they will be forwarded to all interfaces Click Service Management gt MAC gt MAC Address Table page to open the page as shown in following figure which displays the ad
178. nfidential 177 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Create a View Step 1 Click Network gt SNMP Step 2 Click View in Tab and click New button to add a view the configuration page is displayed as follows Figure 10 3 Create a View View Name 1 32 chars Subtree NNN View Type Included Apply Cancel Step 3 Enter the name of view in View Name field such as all Step 4 Enter the view object in Sub tree field such as 1 Step 5 Select Included from View Type list Step 6 Click Apply button to apply all the changes made End 10 1 3 SNMP Community In this configuration page you can create a SNMP community string to define the relationship between SNMP manager and agent Community string acts as a password used to access the proxy of switch Click Network gt SNMP gt SNMP Community the configuration page is displayed as follows Figure 10 4 SNMP Community o Current position Network gt SNMP SNMP Global Settings view SNMP Community FU EAST ey ee RS Roo CIT vetoes access a O private CommunityView read_write 0 O public CommunityView read_only 0 Total 2 New Delete Table 10 3 Parameters of SNMP Community Community Name Up to 32 characters the community name is used to identify the SNMP community members SNMP manager uses this string to access the associated MIB objects of switch Issue 05 2012 10 25 Huawei Prop
179. nfiguration page is shown as the figure below Figure 7 7 QoS Scheduler o Current position QoS gt QoS Scheduler QoS Scheduler QoS Scheduler WRR Queue WRR Weight Queued 1 0 127 Queue1 1 0 127 Queue2 1 0 127 Queue3 1 0 127 Queue4 1 0 127 Queue5 1 0 127 Queues 1 0 127 Queue7 1 0 127 Apply Issue 05 2012 10 25 Huawei Proprietary and Confidential 102 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration Table 7 6 Parameters of QoS Scheduler QoS Scheduler Supports SP and WRR scheduler mode For SP mode the switch will firstly transmit data of high priority queue and transmit low priority queue packets only at the finishing time of empting high priority queue For WRR mode the packet that can be transmitted for each queue per time is decided by the set weight WRR Weight When schedule WRR range of this hardware queue weight is 0 127 Queue weight of 0 is scheduled with SP mode 7 7 Simple Random Early Detection SRED Simple Random Early Detection is a simple mechanism for avoiding congestion which randomly discards some specified color of message to actively manage queue to keep the queue size in a reasonable level to avoid congestion 7 7 1 SERD Profile Click QoS gt SRED gt SRED Profile to view SRED Profile on switch the configuration page is shown as the figure below Figure 7 8 SRED Profile o Current position
180. ning Tree Protocol STP is used to decrease link failure in network and provides protection for network by preventing loop circuit It is easy to generate unconscious loop broadcast storm in complex network construction It is disabled by default To enable this function you must enable STP RSTP MSTP function on each switch connected to network The switch supports three versions of Spanning Tree Protocol STP RSTP and MSTP 5 5 1 STP Information Click Service Management gt STP gt STP Information page to view the STP instance information on the switch as shown in the following figure Issue 05 2012 10 25 Huawei Proprietary and Confidential 55 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Figure 5 26 STP Information o Current position Service Management gt STP STP Information HAC AAA CAS A ol Instance 0 ae CST Global infollodeRSTPI CIST Bridge 32768 0001 0203 0400 Bridge Times Hello 2s MaxAge 20s FwDly 15s MaxHop 20 CIST RootERPC 0000 0000 0000 0000 0 CIST RegRootIRPC 0000 0000 0000 0000 0 CIST Root Port ID 0 BPDU Protection Disable Time Since Last TC 0d 0h 0m 0s Instance Information 0 0 32768 STP Brief 0 Ethernet0 0 36 NonStp Forwarding None Table 5 15 Parameters of STP Information CIST Bridge ID of CIST Bridge consists of priority value of CIST instance and MAC address of switch BPDU Protection When BPDU Protect
181. nt issues are cumulative Therefore the latest document issue contains all changes made in previous issues Issue 05 2012 10 25 Compare to Issue 04 2012 07 25 Optimize the content of version 04 Issue 04 2012 07 25 Compare to Issue 03 2012 05 24 S1700 factory default username is admin and password is Admin 123 Specify the user password in range of 6 16 characters The system Issue 03 2012 05 24 Compare to Issue 02 2012 04 26 Enter the contact person or organization of the management switch Issue 02 2012 04 26 Compare to Issue 01 2012 03 05 5 5 3 Figure 5 28 Issue 01 2012 03 05 Initial release Issue 05 2012 10 25 Huawei Proprietary and Confidential 111 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Contents Contents PDOUE TMs DOcHment Ad ii DCS AE Setas Aia 1 1 1 Logon Web Network Management Clients dado pdas l ABCdatos ed ad l Tl 22 PErAUlON Sle Pili aa E ES l EFE HOW NDOUL Client Merrie eoi dodo als 2 LLC ient Intertace Components si ads 2 rs y O e O E aateed incaantueaneeesunatentaeata 3 A Bao iera nheota tenn siete antes E steuma dened ones Laactase E staunadenscnan ses Lanctane abenses oe 6 12 41 0mmon nterface Ele Mens e eee oe as 7 SU Ser Eme OUL PLOCES SING na 7 LA Contour tons avion dls 8 LS Losout Web Network Viana cement Client a 8 2 Device Summary AA A AAA 9 2A DEVICE Panel td id ii ana eaeons 9 ALD yC TO MA OM tdi a di
182. ntagged VLAN If the link type is Hybrid the untagged VLAN ID or list is allowed to pass through the interface This can only be used when the link type is Hybrid Hybrid Tagged VLAN If the link type is Hybrid the Tagged VLAN ID or list is allowed to pass through the interface This can only be used when the link type is Hybrid Issue 05 2012 10 25 Huawei Proprietary and Confidential 39 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management LC NOTE VLAN 1 is the default untagged VLAN including all interfaces of switch and using Hybrid mode VLAN 1 is a default untagged VLAN including all the interfaces on the switch and using Hybrid mode When Eth Trunk is used the VLAN attribute of Eth Trun interface will follow the principles below 1 If Eth Trunk is created the VLAN attribute of Eth Trunk interface is set as default value 2 If added to Eth Trunk the interface will be not displayed in VLAN interface list 3 If removed from Eth Trunk the VLAN attribute of original interface will recover Edit VLAN Attribute based on Interface or Interface Range Step 1 Click Service Management gt VLAN gt Interface to open a page as shown in Fig 5 3 Step 2 Choose the check box in the left hand column of the interface to be edited and then click Configure button to modify the VLAN attribute of interface The configuration page is shown as the figure below Figure 5
183. nterface Profile ID for specified queue End 7 7 3 SRED Drop Counter Click QoS gt SRED gt SRED Drop Counter to view SRED drop statistics the configuration page 1s shown as the figure below Figure 7 12 7 9 SRED Drop Counter o Current position QoS gt SRED SRED Profile SRED Information SRED Drop Counter m Interface Name Red Drop Counter Yellow Drop Counter O 0 0 Ethernet0 0 1 Ethernet0 0 2 Ethernet0 0 3 Ethernet0 0 4 Ethernet0 0 5 Ethernet0 0 6 Aaa a a Issue 05 2012 10 25 Huawei Proprietary and Confidential 106 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration Table 7 9 Parameters of SRED Drop Counter Red Drop Counter Statistics of dropped red packet on the interface Yellow Drop Counter Statistics of dropped yellow packets on the interface 7 8 Traffic Management In configuration page of traffic management you can create different traffic policy to manage network traffic to achieve traffic management to properly distribute limited network resource The traffic management is divided into four steps Step 1 Create traffic classification profile and specify matching objects for traffic classification Step2 Create traffic behavior profile and configure action specified by matching traffic Step3 Create traffic strategy profile and binding the specified traffic classification profile and the corresponding traffic action profile
184. o account the data accessed by users AAA Accounting Exec Enter the method list name for AAA switch access accounting Method 1 Method 2 You can choose a variety of authentication methods but only method 1 not method 2 can match the None accounting method In practice the accounting order is from method 1 to method 2 It will go to the next accounting method only when the present accounting invalids The accounting options are as follow none not necessary to account the data accessed by users group the switch will send accounting message to RADIUS server which is used to account the data accessed by users RADIUS the switch will send accounting packets to the RADIUS server which is used to account the data accessed by users Active Inactive Select a method list entry in switch access accounting list and then click this button to activate inactivate the accounting Configure Select a method list entry in switch access accounting list and then click this button to configure this accounting method Add the Accounting Exec Step 1 Click Security gt AAA Step 2 Click Accounting Settings in Tab Step 3 Set the parameters in AAA Accounting Exec section Step 4 Click Apply button to apply all the changes made Step 5 Click the check box of AAA Accounting Exec list on left side and then click Active button End 9 14 RADIUS 9 14 1 RADIUS Global Settings Click Security gt RADIUS gt RADIUS Global Settings
185. o apply all the changes made End Issue 05 2012 10 25 Huawei Proprietary and Confidential 33 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 4 Interface Management Display Trunk Member List Step 1 Click Interface Management gt Eth Trunk to display a page as shown in Figure 4 8 Step 2 Click the Trunk entries to be viewed in Trunk list the detailed member information of the chosen Trunk will be displayed in lists of Trunk ID Member and Trunk ID Member Patner Information as shown in following figure Figure 4 9 Display Trunk Member List COI A TT Manual Trunk gt 3 Static LACP 1 8 Disable 30 Total 2 New Delete Member Interfaces of Trunk ID 3 A A cer Por Onn E Por Si O Ethernet0 0 3 Short Passive 32768 Down Total 1 Configure Member Interfaces of Trunk ID 3 Partner Information Ethernet0 0 3 Long Passive Down 0000 0000 00 Total 1 End Configure LACP Member Step 1 Click Interface Management gt Eth Trunk to display a page as shown in Figure 4 8 Step 2 Click the LACP entries to be viewed in Trunk list the detailed member information of the chosen Trunk will be displayed in Trunk ID Member list as shown in following figure Figure 4 10 Configure LACP Member Member Interfaces of Trunk ID 3 A A A A Por Sne Omwan ton Potties Pose Ethernet0 0 3 Short Passive 32768 Down Total 1 Configure Step 3 Click the check box in the left hand column of the interf
186. ocal Link configure a local link address VLAN ID Choose management VLAN ID from following menu Enter IPv6 address of VLAN interface into IPv6 Address field Click Apply button to apply all the changes made End Address Resolution Protocol ARP is applied to mapping an IP address to physical layer MAC address When sending an IP frame the switch firstly inquires MAC address related to objective IP address from ARP table If address is found the switch will write in this MAC address at the specified position of frame head and send the frame to the objective If corresponding MAC address is not found from ARP table the switch will broadcast an ARP request message to all devices of network When receiving this request these devices will discard the request message 1f the objective IP address of the message is different from their own IP address If they are same these devices write their own MAC address to the objective address section and return this message to source device When receiving a return message the source device write the objective IP address and corresponding MAC address in ARP table and forwards the IP traffic to the objective device 3 8 1 Static ARP Click System Management gt ARP gt Static ARP page to display static entries in the ARP table the configuration page is shown as the figure below Figure 3 12 Static ARP o Current position System Management gt ARP Static ARP D merecen O paes O caa
187. of common buttons can make user convenient to operate Web management system Functions of common buttons are shown as follows Table 1 3 Function Description of Common Buttons CI CEN Submit input information and confirm current information provided by system Issue 05 2012 10 25 Huawei Proprietary and Confidential 6 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 1 Client Setting Click to refresh statistic data on webpage 1 2 4 Common Interface Elements Common interface elements of Web network management client are introduced Common interface elements are shown as follows Table 1 4 Description of Common Interface Elements A Page Selection Button E nes Textbox File Name Pull down Menu Disable Enable 1 3 User Timeout Processing If the Web network management webpage is unused by user for a certain time and then this timeout webpage is clicked again system will log off because of timeout and return to Web logon dialog box as shown in Figure 1 1 if necessary please logon again to continue Issue 05 2012 10 25 Huawei Proprietary and Confidential 7 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 1 Client Setting LL NOTE Default timeout duration of Web page logon is 3 minutes 1 4 Configuration Saving When items configurations are completed click Parameter Saving link to save confi
188. on group query message Select enable or disable IGMP Snooping of VLAN When IGMP Snooping is enabled The switch will monitor IGMP message to judge which switches intend to receive multicast data stream When enabling this function this switch can working as querier and send IGMP query messages on this network Used to configure fast leave function for multicast members on VLAN After enabling it the switch receives an IGMP Leave Packet this function will allow multicast members to leave the group immediately the switch does not need to send IGMP specific group query In a period IGMP Snooping suppression to the messages of the same content supporting the suppression for IGMPvl member message IGMPv2 member message and IGMPv2 Leave message 0 indicates the function of disable message suppression The aging time for configuring dynamic route O represent the aging time of dynamic route with global configuration The maximum permissible time of the host sending IGMP response message after receives general group query The range of permissible time is 1 25 seconds and the default is 10 seconds 0 indicates maximum response time of general group with global settings The maximum permissible time of the host sending IGMP response message after receives specific group query The range of permissible time is 1 5 seconds 0 indicates maximum response time of specified group with global settings Check the Router Alert options
189. on is required by the packet between the specified switch and the remote SNMP manager AuthPriv specify AuthPriv security level which means the authentication and the encryption are both required by the packet between the specified switch and the remote SNMP manager Name of the read only view group Name of the writable amp readable view group Notify View Name of view which receives Trap information User of this group can receive SNMP Trap messages generated by SNMP agent of switch Specify the binding ACL ID If not specified which means it is not controlled by ACL Create a SNMP v3 Group named public Step 1 Click Network gt SNMP Step 2 Click SNMP Group in Tab and click New to add a SNMP group the configuration page is displayed as follows Issue 05 2012 10 25 Huawei Proprietary and Confidential 182 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Figure 10 9 Create a SNMP Group X Close Sroup Name 1 32 chars User based Security Model Security Level rl Read View 1 32 chars Write View 1 32 chars Notify View 1 32 chars ACL 1 3999 Apply Cancel Step 3 Enter the group name to be created in Group Name field Step 4 Select SNMPv3 from User based Security Model list Step 5 Enter Community View in Read View Write View and Notify View field Step 6 Click Apply button to apply all the changes made End 10 1 6 SNMP User Click Ne
190. onds Default 5 seconds Display the Interface Number Issue 05 2012 10 25 Huawei Proprietary and Confidential 134 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Type Unicast specify the storm control for the unicast traffic Multicast specify the storm control for the multicast traffic Broadcast specify the storm control for the broadcast traffic Enable or Disable storm control Action Specify which action the switch will take on the traffic after the storm control is triggered the options include Block Drop the specified types of packet entering the switch till the storm fades away Shutdown Directly close the interface None No action Note The above three actions will be recorded in the log Upper Enter an upper limit threshold value when the specified data per second exceeds the value the storm control will be triggered the value ranges from 0 to 1488100 pps Lower Enter a lower limit threshold value when the data per second is lower than the value the storm control will be stopped the value ranges from 0 to 1488100 pps Configure Storm Control for Interface Step 1 Click Security gt Storm Control Step 2 Click Storm Control in Tab Step 3 Click the checkbox on the left side of storm control interface to be configured then click Configure button to open configuration page of interface storm control Figure 9 17 Configure Interface St
191. onfiguration page is displayed as follows o Figure 10 41 Local o Current position Network gt LLDP MED Query Interface Name Ethernet0 0 1 v Query LLDP MED Capabilities Support Capabilities Support Network Policy Support Location Identification Not Support Extended Power Via MDI PSE Not Support Extended Power Via MDI PD Not Support Inventory Support Network Policy Application Type Voice VLAN ID 0 Priority 6 DSCP 46 Unknown False Tagged True Table 10 24 Parameters of Local Search the local information of specified interface in Interface Name LLDP MED Capabilities Support Capabilities The LLDP MED TLV type supported by switch Network Policy The VLAN type VLAN ID and the priority that associated with L2 and L3 applications of the switch interface Issue 05 2012 10 25 Huawei Proprietary and Confidential 205 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Location Identification Not supported Extended Power Via MDI Not supported PSE Extended Power Via MDI PD Not supported Inventory The switch inventory information such as the hardware version software version serial number etc Network Policy The application type VLAN ID and the priority that associated with L2 and L3 applications of the switch interface 10 4 4 Remote Interface Information Click Network gt LLDP MED gt Remote Interface Inform
192. online user session It exists in RADIUS accounting messages and its value is the only constant throughout the RADIUS accounting period Authorized Filter ID Online users bind the ACL number with RADIUS standard attribute Filter ID 11 The details can be found in ACL gt ACL Profile Authorized Online users bind the ACL rules with Huawei private RADIUS Data Filter attribute Data Filter 82 Click the Query button to expand the details of ACL rules 9 2 802 1X Switch can provide easy and open access to network resources for the connecting PC Although automatic configuration and access 1s a desirable feature 1t also leads unauthorized user to intrude and access to sensitive network data The IEEE 802 1X dot1X standard defines a port based access control procedure that prevents unauthorized user accessing the network by requiring users to first submit the authenticated message to authentication server Access to all switch interfaces in a network can be centrally controlled from a server which means that authorized users can use the same authenticated message for authentication from any point within the network This switch uses the Extensible Authentication Protocol over LANs EAPOL to exchange authentication messages between the client and RADIUS authentication server to verify user identity and access rights When a client 1 e Supplicant connects to a switch interface the switch 1 e Authenticator responds to an EAPOL iden
193. ontrol the inbound traffic on the interface If select TX and RX control both of inbound and outbound traffic on the interface Port Control Authentication mode is one of the following options Auto Enables 802 1X and allows the interface in unauthorized status and only allows sending EAPOL frame and receiving the corresponding response frame When the link status of the interface is changed from Disable to Enable or when receives EAPOL start frame authentication process starts then the switch requires the identity of the authentication client and relays the authentication information between client and authentication server Force Authorized Indicates the interface 1s always in authorized status Permit user to access network source without authorization Force Unauthorized Indicates the interface is always in unauthorized status no response to the user authentication request and the user is not permitted to access the network source Tx Period The period during an authentication session that the switch waits before re transmit an EAP packet Range 1 120 Default 30 seconds Quiet Period Period that the failed authentication between switch and client and then begin to authenticate Range 10 3600 Default 60 seconds Issue 05 2012 10 25 Huawei Proprietary and Confidential 126 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Supp Timeout Sets the time t
194. orm Control Xx Close GigabitEthernetO O 1 Interface Name Type Broadcast x Status Disable M Action Upper 0 1488100 pps Lower 0 1488100 pps Apply Cancel Step 4 Select storm type to be controlled from drop down menu of Type Step 5 Enable or disable storm control in Status field Issue 05 2012 10 25 Huawei Proprietary and Confidential 135 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Step 6 Select actions that will be taken to storm from drop down menu of Action field Step 7 Configure packet threshold value that switch will enable storm control in Upper and Lower field Step 8 Click Apply button to apply all the changes made End ZN caution Storm Control cannot be enabled on link aggregation member port 9 4 2 Storm Suppression Storm Suppression page is used to configure multicast broadcast and unknown unicast traffic control threshold The user can suppress the traffic storm by setting Drop Threshold Value and any packet exceeding the specified threshold will be dropped Click Security gt Storm Suppression gt Storm Suppression the configuration page is displayed as follows Figure 9 18 Storm Suppression o Current position Security gt Storm Suppression Storm Control Storm Suppression E Interface Name O Ethernet0 0 1 Ethernet0 0 2 Ethernet0 0 3 Ethernet0 0 4 Ethernet0 0 5 Ethernet0 0 6 Ethernet0 0 7 po pOooOo
195. ot allowed the message will be dropped 5 2 1 MAC VLAN Click Service Management gt MAC VLAN gt MAC VLAN page to check the list of MAC VLAN configured on the switch the configuration page is shown as the figure below Figure 5 5 MAC VLAN o Current position Service Management gt MAC VLAN MAC VLAN Query MAC Address VLAN ID Query COI mE Total 0 New Delete Delete All Table 5 3 Parameters of MAC VLAN Query Search the designated MAC VLAN information through MAC rre and VLAN ID MAC Address Address MAC address of the MAC address of the computer the format is H H the format is H H H VLAN ID The VLAN ID for this MAC address Priority value is 0 7 Type The manually established type is static and the type automatically established according to other protocols is dynamic Create a Static MAC VLAN Step 1 Click Service Management gt MAC VLAN gt MAC VLAN the configuration page is as shown in Fig 5 5 Step 2 Click New button to add MAC VLAN the configuration page is shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 41 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Step 3 Step 4 Step 1 Step 2 Step 3 5 Service Management Figure 5 6 Add MAC VLAN MAC Address H H H VLAN ID 1 4094 Priority Please Select Apply Cancel Enter MAC address VLAN ID and priority parameters are as shown
196. ot switch s location through maintaining specified port role Port configured to Root protection function all of its port value on instance is maintained as specified port When a port receives a higher priority BPDU the port role won t change into non specified port otherwise it changes into detecting status forwarding no message In a long enough periods if a port receives no higher BPDU any more the port will recover to its previous normal status Loop circuit protection on switch status of root ports and other blocking ports is maintained by continually receiving BPDU from up streaming switch When these ports receive no BPDU from up streaming switch by causes of link congestions or one way link failures the switch will select root ports again The previous root ports will turn to specified ports and previous congestion ports will shift to forwarding status thus causing loop circuit in exchanging network Loop circuit protection function will restrain such occurrence When enabling loop circuit protection function the root ports will be set to blocking status if these ports can not receive BPDU from upstream while the blocking ports will remain blocking status forwarding no message and thus causing no loop circuit in network TC protection when switch receiving TC BPDU it will implement delete operation of MAC address table and APR table If receiving frequently TC BPDU to conduct table delete action it will be overburdened for
197. parameters of Dot1 TLVs for interface Step 1 Click Network gt LLDP Step 2 Click Dot TLVs in tab Step 3 Click the check box on the left side of the configuring Dot TLVs parameter interface and then click Configure to open the following page Figure 10 31 Configure Dot TLVs parameter GicgabitEthernet0 0 4 Interface Name PVID state Enable VLAN Name State Enable VLAN ID w Protocal Identity State Enable EAPOL vi Apply Cancel Step 4 Enable to publish the relevant parameter Issue 05 2012 10 25 Huawei Proprietary and Confidential 198 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Step 5 Click Apply button to apply all the changes made End 10 3 6 Dot3 TLVs Click Network gt LLDP gt Dot3 TLVs to configure IEEE802 3 information of advertisement TLV the configuration page is displayed as follows e Figure 10 32 Dot3 TLVs o Current position Network gt LLDP DotS TLVs F Query Interface Name All v Query ri Interface Name MAC PHY Configuration Status NOS Link Aggregation Total Max Frames o Ethernet0 0 1 Enable Not Support Enable Enable Ethernet0 0 2 Enable Not Support Enable Enable Ethernet0 0 3 Enable Not Support Enable Enable Ethernet0 0 4 Enable Not Support Enable Enable Ethernet0 0 5 Enable Not Support Enable Enable 200 0 Table 10 18 Parameters of Dot3 TLV s Query Search the Dot3 TLVs sett
198. pping Disable 0 O Ethernet0 0 6 CoS Mapping Disable 0 F Ethernet0 0 7 CoS Mapping Disable 0 Table 7 1 Parameters QoS interface Trust Mode Trust mode is used to select way of mapping message priority to internal priority of device CoS use CoS to map The details are described in 7 2 Priority Mapping DSCP use DSCP to map The details are described in 7 3 DSCP Mapping IP Precedence use IP Precedence to map The details are described in 7 4 IP Precedence Mapping CFI Mapping When CFI mapping function on inbound port is enabled and the trust mode is COS it will be mapped to different internal colors according to CFI value in tag message That is CFIO mapping is green CFI 1 mapping is yellow When CFI mapping function on outbound port enabled the message will be sent through this port and the CFI value of red message is 1 the CFI value of others is Zero Default CoS Default priority of the specified interface Configure QoS Trust Mode and Default CoS Value for Interface Step 1 Click QoS gt QoS Interface Step 2 Click checkbox on the left of the interface to be edited and then click Configuration button opening the configuration page shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 99 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration Figure 7 2 QoS Interface configuration GicgabitEtherneto o 4 In
199. previously modify HTTP Connection Timeout Duration of System Management gt System Configuration page to 50 minutes or bigger Upgrade Firmware File of Switch by HTTP Step 1 Click System Management gt Software Upgrade to bounce a webpage as shown in Fig 3 3 Step 2 Click Browse to choose the firmware files to be upgraded Step 3 Click Start button to upgrade End 3 4 File System Management Click System Management gt File System Management to download or delete system and configuration files of switch or upload files to switch the configuration page is as shown in Figure 3 4 Figure 3 4 File System Management o Current position System Management gt File System Management O w 1700V100R007B38 cc flash 4236824 2064 01 01 00 06 48 O 1700V100R007B39 cc flash Tw 4237452 2012 01 01 12 06 48 O system flash d 0 2012 01 01 12 00 01 Total 3 Surplus 4 90 MB Used 8 46 MB Total Space 13 36 MB Selected 0 files Sum 0 MB Download File Upload File Delete Table 3 4 Parameters of File System Management mem pomm OOOO File List File list shows all files saved on current switch Filename system filename Path location of system files File Attributes Attributes read write of system files Size bytes size of system files in bytes Create Time creation time of system files Download File Click this button to download files to switch File Name of Download click Browse to choose the files to be downloa
200. ption algorithm and key size SSL Certificate Select from the drop down menu to apply or remove the SSL Settings certificate Select the None from drop down menu will remove the application of certificate file PO ne Files download tips Note the order of downloading files The certificate file must be downloaded firstly and then the key file The subsequent certificate file cannot continue download after the first certificate file downloaded at this time 1t will be prompted for a download key If the downloaded key and certificate do not match then this will also delete the downloaded certificate file and key file Enable SSL function Step 1 Step 2 Step 3 Step 4 Step 5 Click Security gt SSL Settings Click the Browse button in Certificate File field to select the Certificate to be uploaded and then click Download File to download the certificate Click the Browse button in Key File field to select the Key to be downded and then click Download File button to download the Key Select the applied certificate from SSL Certificate section and click Apply button Select Enable Disable SSL function in SSL Status field under the circumstances of applying SSL function without certificate a note will be prompted There 1s no available certificate applied in switch End Issue 05 2012 10 25 Huawei Proprietary and Confidential 174 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet S
201. r each interface statistics on interface is accounted after device startup completed the refresh frequency is 1 SEC Issue 05 2012 10 25 Huawei Proprietary and Confidential 28 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 4 Interface Management Figure 4 3 Statistics on Interface o Current position Interface Management gt Ethernet Interface Statistics on Interface ao interface Name Sent Rate pkt s Receive Rate pkt s Sent Packets Receive Packets O 0 0 0 0 0 Ethernet0 0 1 Ethernet0 0 2 0 Ethernet0 0 3 0 Ethernet0 0 4 Ethernet0 0 5 0 Ethernet0 0 6 0 Ethernet0 0 7 Ethernet0 0 8 0 0 0 0 0 0 8 34 30 Y A 000A aa 0 0 0 0 0 0 0 0 Table 4 3 Parameters of Statistics on Interface Sent Bytes Total bytes including frame characters sent on this interface Receive Rate Receive rate of the packet on this interface Received Packets Total packets received on this interface Receive Bytes Total bytes including frame characters received on this interface Alignments Error Packets Total Alignment error packets received on this interface Issue 05 2012 10 25 Huawei Proprietary and Confidential 29 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 4 Interface Management Collision on the Interface Total collision packets transmitted on this interface Giants Error Packets Total Giants er
202. rent position IP Routing gt IPv6 Route IPv6 Route Table MALEATE ro TIE Query IPv6 Address Prefix Length C Connected Static IPv6 Prefix Protocol Type Next Hop Interface Name No data to display Table 8 3 Parameters of IPv6 Route Table Search IPv6 Route Table according to IPv6 address prefix length IPv6 Prefix Prefix of destination IPv6 Protocol Type Routing type IPv6 address of the next hop gateway VLAN number of static routing entry 8 2 2 IPv6 Static Default Route Configure Click IP Routing gt IPv6 Route gt IPv6 Static Default Route Configure the configuration is shown as the figure below Figure 8 5 IPv6 Routing o Current position IP Routing gt IPv6 Route AE IPv6 Static Default Route Configure a IPv6 Prefix Protocol Type Next Hop Interface Name Backup State No data to display New Delete Issue 05 2012 10 25 Huawei Proprietary and Confidential 117 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 8 IP Routing Table 8 4 Parameters of IPv6 Routing Interface Name VLAN number of static routing entry Backup State Primary of secondary routing Status The routing is effective or not which means it can be used to conduct routing forwarding or not Create an IPv6 Routing Step 1 Click IP Routing gt IPv6 Route gt IPv6 Static Default Route Configure in tab bar Step 2 Click New button opening the configuration page shown as the figure belo
203. rface Name Admin Status Up O Close Flow Control Close K Negotiation Enable O Disable Duplex Full Half Speed Input Rate Limit 64 1000000 Kbps No Limit Output Rate Limit 64 1000000 Kbps No Limit Jumbo Frame 1536 1536 10240 default 1536 Description 1 32 chars Apply Cancel Issue 05 2012 10 25 Huawei Proprietary and Confidential 21 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 4 Interface Management SE niin Interface auto negotiation function must be disabled when user configures an interface working in specified speed duplex mode When auto negotiation function is used optimal configuration will be performed to link among interfaces according to capability of two ends Speed and duplex of Giga SFP interface are fixed as 1000full Table 4 2 Parameters of Basic Attributes Configuration Interface Name Display the Interface number Admin Status Enable Disable the interface spe e siaz o nko anon rise Emer cpio netee Jumbo Frame Specify the size of Jumbo frame on interface Description Enter the description about interface Step 3 Configure parameters of interface Step 4 After that click Apply to apply all the changes made Use Basic Attributes page to view status of valid switch interface End 4 1 2 Statistics on Interface Click Interface Management gt Ethernet Interface gt Statistics on Interface page to view statistics information fo
204. rface name of switch Ingress ACL ACL number applied on interface ACL Rules Applied on Interface Step 1 Click ACL gt ACL Application gt Interface Application Step 2 Click the Edit icon on the right of interface to be configured interface application opening the configuration page shown as the figure below Figure 6 12 Edit Interface Application X Close Interface Name GigabitEthernet0 0 1 Interface Type Ingress m Bind ACL ACL Type Please Select v ACL List Please Select Apply Delete Cancel Table 6 11 Parameters of Editing Interface Application Interface Name Displays the interface name of switch Interface Type Display the ACL data direction applied by interface Here is the Ingress ACL Type Select ACL type applied by interface ACL List Select specific ACL ID that the interface applied to Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes below End 6 3 2 VLAN Application Click ACL gt ACL Application gt VLAN Application to apply rules to specified VLAN the configuration page is shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 94 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration Figure 6 13 VLAN Application o Current position ACL gt ACL Application Mc ea VLAN Application m VLAN Application Name VLAN List Bind ACL List MA
205. rietary and Confidential 178 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network View Name Up to 32 characters used to identify the MIB object groups which allow the remote SNMP manager to access the switch MIB objects View name must be created in SNMP view table Access Right Read Only The community members that use SNMP community string can read the contents of the MIB on the switch Read Write The community members that use this SNMP community string can read and write MIB on the switch ACL Specify the binding ACL ID If it is not specified which means it is not controlled by ACL Create a SNMP Community Step 1 Click Network gt SNMP Step 2 Click SNMP Community in Tab and click New button to add a SNMP community the configuration page is displayed as follows Figure 10 5 Create a SNMP Community X Close Community Mame 1 32 chars View Name 1 32 chars Access Right My v ACL 1 3999 Apply Cancel Step 3 Enter a user defined community name in Community Name field such as comaccess Step 4 Enter the view name created in SNMP View in View Name field such as all Step 5 Select Ready Only from Access Right list Step 6 Click Apply button to apply all the changes made End 10 1 4 SNMP Host SNMP host list is used to set the IP address of device that receives the SNMP Trap information Only the host configured SNMP can receive Trap messages
206. riginal normal state Loop Protection on the switch the status of root ports and other blocked ports are relying on the continuous BPDUs received from the upstream switch The switch will reselect root port when the BPDU from the upper switch cannot be received because of network congestion or unidirectional link failure If the original root port becomes a designated port and the original blocked port moves to the forwarding state it will results in undesirable loops in switch network Loop protection function can suppress this kind of loop After the loop protection started if the root port cannot receive a BPDU from upstream it will be set in blocked state and the blocked ports will remain in blocking state and does not forward packets to the network to ensure that no loop can be formed TC Protection the switch will delete MAC address table and ARP table entry if TC BPDU is received The frequent deletion of table entry for receiving a large amount of TC BPDU will bring a great burden to device TC protection Configuration on interface can avoid frequent deletion operations and avoid the transmission of TC BPDU 5 5 2 STP Global Click Service Management gt STP gt STP Global page to configure the STP global parameters for the switch the configuration page is shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 57 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Swit
207. rne Name t0 0 4 Notification Disable Admin Status Subtype IPw4 w Status Address Apply Cancel Issue 05 2012 10 25 Huawei Proprietary and Confidential 195 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Step 4 Configure the related parameters Step 5 Click Apply button to apply all the changes made End 10 3 3 Address Management Click Network gt LLDP gt Address Management the configuration page 1s displayed as follows Figure 10 27 Address Management o Current position Network gt LLDP Global Address Management HIERE MICA LABIO Query All v Query IPv4 192 168 1 253 Ifindex 1 3 6 1 4 1 2011 2 23 186 Table 10 15 Parameters of Address Management Query Search the address management settings based on specified conditions Subtype Management addresses type IPv4 or IPv6 address IF Type The corresponding type for this interface OID The corresponding OID of address Notification port List Specify the notification port list Address Management addresses 10 3 4 The Basis of TLVs Click Network gt LLDP gt The Basis of TLVs to configure the information of the basis of TLVs of advertisement the configuration page is displayed as follows Figure 10 28 The Basis of TLVs o Current position Network gt LLDP E ASS al The Basis of TLVS MAMI ER MIAMI ER BS CBee Query Interface Name All Y Query CIC F Ethernet0 0 1 Enable E
208. ror packets transmitted on this interface CRC Error Packets Total CRC error packets transmitted on this interface Aborts Error Packets Total Aborts error packets transmitted on this interface Details of Statistics on Interface Step 1 Click Interface Management gt Ethernet Interface gt Statistics on Interface Step 2 Choose the check box in the left hand column of the interface to be viewed for details from the list and then click Details button to view the detailed statistics data of designated interface the configuration page is shown as the figure below Figure 4 4 Details of Statistics on Interface X Close Interface Name GigabitEthernet0 0 4 3 a e Received Packets Unicast Packets Broadcast Packets Multicast Packets Received Error Packets Runts Error Packets CRC Error Packets Frame Error Packets Alignments Error Packets Symbols Error Packets ei or or 01090100 O O aw Drop Packets Sent Packets O Step 3 Click Close to return to the configuration page of Statistics on Interface End 4 2 Eth Trunk This section describes a method to configure Eth Trunk User is allowed to set up multiple links among multiple switches Link Aggregation is a method of binding a group of physical interfaces as a logical interface to increase bandwidth At most 12 manual Trunks and static LACP can be set up at the same time This device supports manual Trunk and link aggregation control protocol onl
209. rotection configuration Perform dynamic address detection configuration Perform illegal message and MAC spoofing configurations Perform interface isolation configuration Huawei Proprietary and Confidential 5 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 1 Client Setting AAA Perform configuration of system authentication and charging Device Device View hardware information of device used for Management Management confirming whether system is at normal state or not when the product of Huawei leaves factory to guarantee the versions programmed by all products through strict inspection of Huawei are proper Interface loopback diagnostics perform loopback diagnostics to specified interface VCT cable diagnostics perform diagnostics to specified cable to detect cable faults Check parameters of optical interface Information Center Perform configuration management of system log Power Saving Enable or disable power saving management and Management EEE functions Device Diagnostics Interface Mirror Add mirroring source and objective interfaces and display the configured mirroring session Ping test perform Ping test Tracert perform routing test One key information one key download of configuration log and error information Save the modified parameters Running config Running config 1 2 3 Common Buttons Knowing about following introduction
210. s Step 1 Open IE browser Step 2 Input address field with default URL Universal Resource Locator address of Web network management client 192 168 1 253 then press Enter key after which logon dialog box appears on screen configuration page being as follows Issue 05 2012 10 25 Huawei Proprietary and Confidential 1 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 1 Client Setting Figure 1 1 Logon Dialog Box User Login NA User Name admin HUAWEI Password LELLE Verify Code EBTH Language English save my password Login Reset Step 3 Enter Username Password and Identifying Code into Logon Dialog Box then click Logon button ZN caution S1700 factory default username is admin and password is Admin 123 User can modify the password Please refer to the description in Security gt User Management Step 4 After successful logon of Web network management system home page of system appears Please refer to Figure 1 2 for introduction of home page End 1 2 Know About Client Interface Knowing about the client interface is helpful to quickly find operator site thus improve operating efficiency 1 2 1 Client Interface Components Layout of typical operating interface of Web network management client is described The typical operating interface of Web network management is as shown in Fig 1 2 Issue 05 2012 10 25 Huawei Proprietary and Confidential 2 Copyri
211. s the configuration page is displayed as follows Figure 9 34 Interface State Settings o Current position Security gt DHCP Snooping Global Interface State Settings PIVGiFCCE Tom cc ES egurlilen Query Interface Name All v Query O menace tam IE O Ethernet0 0 1 Disable O Ethernet0 0 2 Disable O Ethernet0 0 3 Disable Table 9 24 Parameters of Interface State Settings Search the state settings of specified interface in Interface Name DHCP Snooping status on interface Issue 05 2012 10 25 Huawei Proprietary and Confidential 149 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Enable DHCP Snooping for Interface Step 1 Click Security gt DHCP Snooping Step 2 Click Interface State Configure in Tab Step 3 Click checkbox on the left side of DHCP Snooping to be enabled and then click Configure button the configuration page is displayed as follows Figure 9 35 Interface State Settings X Close GigabitEthernet0 0 1 Interface Name Status Disable he Apply Cancel Step 4 Select Enable in Status bar Step 5 Click Apply to apply the changes made End 9 8 3 Interface Trust Settings Click Security gt DHCP Snooping gt Interface Trust Settings the configuration page is displayed as follows Figure 9 36 Interface Trust Settings o Current position Security gt DHCP Snooping Global cru Interface Trust Settings Hice es i
212. s Times of 802 1X backend status machine Issue 05 2012 10 25 Huawei Proprietary and Confidential 132 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security 9 3 Guest VLAN Application Scene During 802 1 X and MAC authentication when user authentication fails it will enter Guest VLAN Guest VLAN functions as access control Using Limit 1 With MAC based authentication Guest VLAN supports Hybrid port joining VLAN with untagged method while it is not effective on other types of interface 2 With Port based authentication Guest VLAN supports Hybrid port and Access port joining VLAN with untagged method while it is not effective on other types of interface 3 All the users on the port will offline for authentication port property changed when a user configuring Guest VLAN For 802 1X authentication Only when the interface control mode is auto mode the Guest VLAN can take effect Click Security gt Guest VLAN the configuration page is displayed as follows Figure 9 14 Guest VLAN o Current position Security gt Guest VLAN Query VLAN ID Query E VLAN ID Interface Name Total 0 New Delete Table 9 11 Parameters of Guest VLAN Search Guest VLAN information specified in VLAN ID VLAN ID Guest VLAN ID on this interface Create Guest VLAN for Interface Step 1 Click Security gt Guest VLAN Step 2 Click New button to open configuration page of
213. s can take advantage of these features to diagnose and detect network and analyze error information Click Device Management gt Tools gt Ping Test the configuration page is displayed as follows Figure 11 10 Ping Test o Current position Device Management gt Tools Ping Test One Key Information IPv4 Ping Test Target IP Address Infinite default Ping Times O 1 255 times Timeout 1 1 99 sec default 1 Source IP Address Start m IPv6 Ping Result Target IP Address Interface Name Infinite default Ping Times O 1 255 times default Timeout 1 1 99 sec default 1 Source IP Address Start Table 11 8 Parameters of IPv4 Ping Test Target IP Address Enter IP address which needs to do Ping test Select times of Ping test the default 1s Infinite Timeout Enter the timeout of ping test If the target IP does not respond to Ping test after the designated time the test will be canceled and will send the next testing message Source IP Address Enter IP address which is source IP Do IPv4 Ping test Step 1 Click Device Management gt Tools Step 2 Click Ping Test in tab Step 3 Enter target IP address which is to be tested in Target IP Address and the click Start button to do computer connectivity test Step 4 The result will display in IPv4 Ping Result field Issue 05 2012 10 25 Huawei Proprietary and Confidential 215 Copyright Huawei Technologies Co Ltd S1700 Man
214. sable 1 Disable 1 O Ethernet0 0 5 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 O Ethernet0 0 6 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 O Ethernet0 0 7 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 F Ethernet0 0 8 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Disable 1 Set SRED Information Step 1 Click QoS gt SRED and then click SRED Information in Tab Step 2 Click the SRED information needed and click Config button to open the following page Issue 05 2012 10 25 Huawei Proprietary and Confidential 105 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration Figure 7 11 Set SRED information GigabitEthernetO0 0 4 2 Interface Name Queue SRED Status Profile Queued Disable 1 128 Queue Disable Y 1 128 Queue2 Disable 1 128 Queue3 Disable l 1 128 Queue4 Disable 1 128 z Queue5 Disable 1 128 Queueb Disable Y l 1 128 Queue7 Disable 1 128 Apply Cancel Step 3 Enable or disable the SRED function on specified interface list Click Apply button to apply all the changes made The finished SRED information will be displayed in SRED information list Table 7 8 Parameters of SRED Information Interface number of profile applying SRED SRED Status Enable or disable SRED function on the specified queue of i
215. sdaus Goaeu cee asesueuaatens aes austen aaanss 119 AMB is A II A RTT 119 TAM User MA ee aa E tune tee ati daralacaaie Ee ata haeoa ay 119 SA NAS nors eroien oia i E E AAE E AA EE 122 Issue 05 2012 10 25 Huawei Proprietary and Confidential vi Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Contents A O ab saab T AET E A OT A E E A AA E A A ET A A T A A ATTE 123 A OW Al sas cdi del e e E E E N T E N T A TE A 124 OD Mode arae E E oa uuete Sodeesadaasaoedanieesed Sone toctuaees 125 2 S E ACC AC AA OO 126 KZ AAMO Ze GS AUIS io caer sacl dida ido 128 9 DD DUAUIS ICS sissies o In duloa ca acted neues aut aban Gade eesonemhacd E 129 a A A OA 130 A pal aedneaneia patadiea Ad ssecinepalaced puuincin datadted dauceceapalineadiiaxceatatanes 131 TO GUEST yV LAN areire a eE ici 133 Da SOTA SUP PLCS SO ae A NN A 134 VAN STOT COTO dan ido 134 942 Storm SUPpPresSSiON A A e 136 DIRON SECCU ria A 137 XIE Port Security Parameter Conf eura ON epasta a O aio 138 95 2 Port Security Address IOMA A a 140 92 3 Address Lable mportand Exportacion oca 142 DO MIA Dased ACCESS CONTO nad dad 143 A ODA les seaheses iaaucensstu e e 143 002 Metal oirlo loose isla 144 9 6 3 MACD cd Access CORTO LAUDO a 145 9 64 MAC Format CONTE As 146 ITAICE Provence ooo sicdaa 147 HE WO CPIE VONE siz la dd s 147 9 T 2 DOS Atlack Pr idas 148 98 DHCP SNOOP iii ia E T E te 148 IA EPR PO O OE II O O 149 9 82 Intertac
216. ss table If the address is discoverd by another interface it will be neglected and not be written into address table The address will not be learned by other interfaces unless the static address 1s deleted manually from address table Click Service Management gt MAC gt Static MAC Table page to open the page as shown in following figure which displays the information of static address table of switch Figure 5 19 Static MAC Table o Current position Service Management gt MAC MAC Address Table MAC Aging Time Static MAC Table MEA tte IE Nee sic CAE Query MAC Address VLAN ID Interface Name All Y Query CMT ATT TT 0001 0203 0400 1 CPU Total 1 1 1 EN Go New Delete Delete All Table 5 12 Parameters of Static MAC Table Query Search the matched entry based on Interface Name MAC Address or VLAN ID MAC Address MAC address in address table VLAN ID VLAN ID that corresponds to the above MAC address Issue 05 2012 10 25 Huawei Proprietary and Confidential 51 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Interface Name Interface that corresponds to the above MAC address Edit Click this button to modify MAC address New Click this button to add a static MAC address entry Delete Click this button to delete static MAC address entry that is selected from the address table Delete All Click this button to delete all the static MAC
217. ssion cannot be enabled on link aggregation member port 9 5 Port Security Port security is a kind of security protection mechanism used to control the network access Port security can remember the Ethernet MAC address connected to the interface of switch and only permit certain MAC address to communicate through the interface If any other MAC address tries to communicate through this interface it will be stopped with this function enabled Use the interface port security feature to prevent the specific device from accessing the network which enhance the security performance After configuring the port security on the interface the switch considers the following MAC is legal Issue 05 2012 10 25 Huawei Proprietary and Confidential 137 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security e Configured static MAC manually e Learned dynamic MAC before reaching the number limitation Source MAC which is not included in the above types will be considered illegal 9 5 1 Port Security Parameter Configuration Click Security gt Port Security gt Port Security Parameter Configuration the configuration page is displayed as follows Figure 9 20 Port Security Parameter Configuration o Current position Security gt Port Security Port Security Parameter Configuration HRS eter a egret met Cer lea ii o nertace Name Security Action O Ethernet0 0 1 128 0 Restrict Etherne
218. ssword Configure the password used to authenticate MAC address ranging from to 16 characters User Name Configure the user name used to configure MAC address authentication using MAC address as user name is default ranging from 1 to 64 characters Max User When the number of access user reaches the configured limitation number the device will not execute authentication and trigger action for the later accessed user thus those users can not normally access the network The value ranges from 1 to 512 and the default 1s 256 A CAUTION After configuring the user name use the MAC address as user name by default and password for MAC address authentication you must create an account in Security gt User Management To complete the MAC address authentication the user name and password should be the same as user name and password for MAC address authentication Issue 05 2012 10 25 Huawei Proprietary and Confidential 143 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Enable MAC based Access Control Step 1 Click Security gt MAC based Aceess Control Step 2 Click Global Parameter Configuration in Tab Step 3 Select Enable in Status field Step 4 Click Apply button to apply all the changes made End 9 6 2 Interface Click Security gt MAC based Aceess Control gt Interface to configure interface parameter with MAC Authentication the configuration page is displ
219. t position Device Management gt Device Management Board status Issue 05 2012 10 25 Huawei Proprietary and Confidential 207 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 11 Device Management 11 1 2 E label E Label also called permanent configuration data or files information 1s flashed into storage device during the process of the module debugging including the information about name production serial number module production or custom manufacturer Click Device Management gt Device Management gt E label to view E label information of switch the configuration page is displayed as Figure 11 2 Figure 11 2 E label o Current position Device Management gt Device Management Board status E Lable BoardType 1700 52FR 2T2P AC BarCode Item 1700 52FR 2T2P AC Mainframe 48 10 100 1000Base T and 2 1000Base T and 2 1000 BASE X SFP ports 1000 BASE X and AC Description 100 220V Manufactured VendorName Huawei IssueNumber CLEICode BOM 11 2 Device Diagnostics Use Device Diagnostics to test the interfaces and cables of the switch 11 2 1 Interface Loopback Test Interface Loop back Test is a very normal test If the interface receives a message which is sent by itself it means that there is loop back on the interface This test is used to diagnose and analyze the problem of interface and chip Click Device Management gt Device Diagnostics gt Interface
220. t0 0 2 128 0 Restrict Ethernet0 0 3 128 0 Restrict 0 Ethernet0 0 4 128 ooo Restrict Table 9 14 Parameters of Port Security Parameter Configuration Security Action Protect When the number of learned MAC address reaches the limitation number of interface the interface will drop the message whose source address 1s not included in MAC table Restrict When the number of the learned MAC address reaches the limitation number of interface the interface will drop the message whose source address is not included in MAC table and record it in the system log Shutdown When the number of the learned MAC address reaches the limitation number of interface the interface will execute Shutdown operation and record it in the system log Configure Port Security for Interface Step 1 Click Security gt Port Security Step 2 Click Port Security Parameter Configurations in Tab Step 3 Click the checkbox on the left side of port security interface to be configured then click Configure button to open port security configuration page Issue 05 2012 10 25 Huawei Proprietary and Confidential 138 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 21 Configure Port Security for Interface X Close Etherneto 0 43 Interface Name Port Security Disable Y Security Action Static Address Aging Sticky Learning Aging Type Aging Time 1 1440 min default MaxSecure
221. ta Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes made End Batch Create Static Groups Step 1 Click Service Management gt IGMP Snooping gt Static Groups Step 2 Click Batch Create button opening the configuration page shown as the figure below Figure 5 43 Batch Create Static Groups X Close r Batch Create IGMP Snooping Static Group t CCC SN Vi LAN Start Group Address End Group Address Static Interface OEth Trunk List Press Ctrl or Shift selcet more ports Apply Cancel Table 5 30 Parameters of IGMP Snooping Static Groups Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes made Issue 05 2012 10 25 Huawei Proprietary and Confidential T7 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management End 5 6 6 Groups Click gt Service Management gt IGMP Snooping gt Groups to check group information on switch the configuration page is shown as the figure below Figure 5 44 IGMP Snooping Groups o Current position Service Management gt IGMP Snooping Global VLAN Parameter Group Deny Group Policy Static Groups Groups Forwarding Table Total 0 Clear All Informations of Group Group Interface Table Table 5 31 Parameters of IGMP Snooping Groups Multicast group filter mode Include refers to the multicast data
222. tage Bias Current TX Power RX Power Optical Optical Wave Optical Transport Optical Transport Fiber Vendor interface Name CC V mA uW uw Mode Length nm Length m Type Bandwidth M Type SN GigabitEthernet0 0 3 z 2 z z z gt GigabitEthernet0 0 4 Note Transport Bandwidth The maximum transport bandwidth that the optical module supports N A The optical module doesnt support the digital diagnostic monitoring There is no optical module 11 4 Information Center The information center is an information hub of the system which can classify and manage all the systematic information The information center provides network manager and developer the ability of monitoring work conditions of network and diagnosing network failure through the combination with debug program debugging commands 11 4 1 Parameter Settings User can configure classification and management of switch system information in Parameter Settings page Click Device Management gt Information Center gt Parameter Settings the configuration page is displayed as follows Figure 11 6 Parameter Settings o Current position Device Management gt Information Center Parameter Settings ME LULO LLION Global State Log State Enable O Disable Default Enable Apply Parameter Settings Buffer Log Level 7 Debugging Trap Log Level 6 Informational Device Local Source IP Interface No
223. te Table 9 1 Parameters of User Management Access Type Display the access type of user ZN caution The default administrator name is admin password Admin 123 Guests own read authority of most of the configurable parameters Administrators own all write authority of all parameters User should distribute a new administrator admin as quickly as possible after enabling the device and save it in a safe place Create a User Account Step 1 Click Security gt User Management Step 2 Click New button to add a user account opening the configuration page shown as the figure Issue 05 2012 10 25 below Figure 9 2 Add User User Name 1 64 chars 6 16 chars 6 16 chars Simple Cipher Please Select i Apply Password Confirm Password Password Type User Level Cancel Huawei Proprietary and Confidential 120 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Table 9 2 Parameters of Adding User Specify a username The value ranges from 1 to 64 characters Password Specify the user password in range of 6 16 characters The system checks password complexity by default Password should at least meet the following requirements e Password length should be at least six characters e Password must contain at least two types of the following characters At least one lower case letter capital letter number and special character
224. tem Management gt IP Management Management VLAN 1Pv4 CS VLAN ID 2 4094 Apply RA vaname anagementintertacename as cesa 1 default vlan1 Enable Link Up Total 1 Delete Issue 05 2012 10 25 Huawei Proprietary and Confidential 17 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 3 7 2 IPv4 3 System Management Table 3 7 Parameters of Management VLAN VLAN ID Configure Management VLAN identifier 2 4094 the VLAN must be firstly created on the switch List Display all management VLANs of the switch The default management VLAN ID is 1 ZN caution Default management VLAN name of switch is Default Click System Management gt IP Management gt IPv4 to configure an IPv4 address for the switch the configuration 1s as shown as follows Figure 3 8 IPv4 Address o Current position System Management gt IP Management Management VLAN IPv4 EX VLAN Name suonet mask Seconda default 192 168 1 253 255 255 255 0 False A Total 1 Delete Table 3 8 Parameters of IPv4 Address Display the IP address of switch management VLAN Click the Edit icon in the right hand column to modify the VLAN IP address VLAN Name Name of the management VLAN IP Address IP management addresses Subnet Mask Subnet mask of IP address The secondary IP address of the switch ZN caution Default management VLAN of switch 1s Default for example 192 168 1 253 Issue 0
225. tep 4 Click Apply button to apply all the changes made End 7 8 2 Traffic Behavior Click QoS gt Traffic Management gt Traffic Behavior to view traffic behavior configured on switch the configuration figure 1s shown as below Figure 7 16 Traffic Behavior o Current position QoS gt Traffic Management cial Traffic Behavior Mica ae o e ios im A A O O Total 0 New Delete Table 7 12 Parameters of Traffic Behavior Behavior profile name Action executed by this behavior Add a Traffic Behavior Step 1 Click QoS gt Traffic Management gt Traffic Behavior Step 2 Click New button to add a traffic behavior opening the configuration page shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 109 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration Figure 7 17 New Traffic Behavior X Close A Behavior Name 1 32 chars Action Deny pPermit Traffic Statistics eEnable Disable r Configure Traffic Policing Mode Rate trTCM srTCM Rate 64 1000000 kbps Burst 4 16380 kbyte Unconform r C Configure Re mark Action 802 1p Priority Local Queue IP Precedence DSCP Priority 0 63 r Configure Redirection 127 28 29 30 34 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 1 2 3 4 Apply Cancel Table 7 13 Parameters of Configuring Traffic Behavior
226. terface Name a Trust Mode CoS Mapping CFI Mapping Disable Default CoS Apply Cancel Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes made End 7 2 CoS Mapping Click QoS gt Cos Mapping to configure the mapping relationship of CoS and service level the configuration page is shown as the figure below Figure 7 3 Cos Mapping o Current position QoS gt CoS Mapping Service Level BE AF1 AF2 AF3 AF4 EF CS6 CS7 ime n lt lt lt lt lt lt lt 0 1 2 3 4 5 6 7 Table 7 2 Parameters of Cos Mapping lt Apply Select service level mapped by this CoS 7 3 DSCP Mapping Click QoS gt DSCP Mapping to configure the mapping relationship between DSCP and service level the configuration page 1s shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 100 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Figure 7 4 DSCP Mapping o Current position QoS gt DSCP Mapping 7 QoS Configuration 0 oO on oOo M W HY lt oO 12 Table 7 3 Parameters of DHCP Mapping BE A BE BE BE BE BE BE BE AF 1 AF 1 AF 1 AF 1 lt lt lt lt lt ET EN EI ET lt lt lt
227. the drop down box click the Query button and the result will display on binding table list End Delete binding table Click Security gt DHCP Snooping Click Binding Table Information in Tab Click the Delete button on the lower right of the page choose the delete mode and input the specific parameter click the Delete button to apply End IPSG IP Source Guard is a filtering technology based on IP MAC VLAN interface traffic which can prevent the LAN IP address from spoofing attacks The switch has an internal IP source binding table which sets as the testing standard for the received packets in each interface Only the received IP packets correspond to the IP MAC VLAN mapping relationship in IP source binding table will these packets be forward by switch The remaining packets will be discarded by the switch IP source binding table can be added by user statically and obtained through Dynamic ARP or learned from DHCP Snooping binding table automatically 9 9 1 IPSG Settings Click Security gt IPSG gt IPSG Settings to configure IPSG for interface the configuration page is displayed as follows Issue 05 2012 10 25 Huawei Proprietary and Confidential 154 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 41 IPSG Settings o Current position Security gt IPSG IPSG Settings Beit earl ROA Query Interface Name All v Query o mor
228. the parameters in AAA Authentication Login section Step 4 Click Apply button to apply all the changes made Step 5 Click the check box of AAA Authentication Login list on left side and then click Active button to activate the authentication End 9 13 3 Accounting Settings Click Security gt AAA gt Accounting Settings the configuration page is displayed as follows e AAA Accounting Network account data generated from user for 802 1X authentication and MAC authentication user network access e AAA Accounting Exec account data generated from user for the Web user switch access Figure 9 57 Accounting Settings o Current position Security gt AAA IS oo suo Accounting Settings r AAA Accounting Network Start stop Group RADIUS Disable i Method 1 Apply y AAA Accounting Exec Name 1 15 chars Method 1 none Ni Method 2 Apply NONI IN EE TI NI ENT Total 0 Active Configure Delete Table 9 38 Parameters of Accounting Settings AAA Accounting Network Issue 05 2012 10 25 Huawei Proprietary and Confidential 167 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Start stop Group Enable Disable AAA Network Accounting RADIUS Method 1 Accounting options are as follow none not necessary to account the data accessed by users RADIUS the switch will send accounting message to RADIUS server which is used t
229. the source and destination interface to be imaged from the interface list Press Ctrl or Shift to select multiple source interfaces the destination interface can only be one all the source and destination interfaces can support Eth Trunk Click Add or Apply button after finished Interface mirror can support Eth Trunk but the trunk member cannot be configured independently The interface will recover original attribute after it is removed from trunk or trunk is deleted Mirror RX data of interface 1 to interface 2 Step 1 Click Device Management gt Interface Mirror Step 2 Click on the check box on the left side of the interface list and select RX in Frame Type drop down menu Step 3 Select source port of interface mirror in Source Interface here is Ethernet0 0 1 Step 4 Select destination port of interface mirror in Destination Interface here is Ethernet0 0 2 Step 5 Click Add or Apply button to apply all the changes made After successful configuration all the packets received by port 1 will be forwarded to port 2 End Issue 05 2012 10 25 Huawei Proprietary and Confidential 214 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 11 Device Management 11 7 Tools Tools section provides some useful function such as Ping test Tracert and One key information With these function user can implement normal network diagnosis and information collection 11 7 1 Ping Test User
230. thernet0 0 5 No Diagnose Ethernet0 0 6 No Diagnose OOoOoOooo0 Ethernet0 0 7 No Diagnose Table 11 2 Parameters of VCT Cable Diagnostics Name of Ethernet port Display the Ethernet connection type on interface Display connection status on interface Diagnostic Result Display VCT diagnosis result on Interface Display whether the interface will implement VCT diagnosis LL NOTE 1 The cable diagnosis results relate to cable quality and the poor quality results may have considerable errors 2 There may be an impact on interface normal service in a short time with the implementation of this function 3 The diagnosis results are not reliable if the state of test port or end to end port is enable or it works under the mode of non auto negotiation 4 The diagnosis results are not reliable if there is no cable connection on test port 5 There may be an impact on cable diagnosis results when power saving feature enabled Issue 05 2012 10 25 Huawei Proprietary and Confidential 209 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 11 Device Management 11 3 DDM DDM can test fiber ports on switch and display the parameters of the fiber ports such as temperature voltage receiving power and transmitting power Click Device Management gt DDM to show the following page Figure 11 5 DDM o Current position Device Management gt DDM a Work Temperature Work Vol
231. tity request The client provides its identity such as a user name in an EAPOL response to the switch which forwards to the RADIUS server The RADIUS server verifies the client identity and sends an allowed or rejected message The client can reject the authentication method and request another depending on the settings of client and RADIUS The RADIUS sends an accepted or a rejected message after verifying the content If authentication 1s successful the switch allows the client to access the network Otherwise non EAP traffic on the interface will be blocked Port based Access Control Under Port based access control once the connected device passes the authentication successfully the interface turns to authorized status and then all the traffic on this interface will not be limited to the access control until the interface becomes unauthorized Therefore if the network segment connected to the interface is a shared one in which multi network Issue 05 2012 10 25 Huawei Proprietary and Confidential 123 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security device are connected as long as only one device on this network segment passes the authentication all the devices can access the switch through this interface Obviously the control method is susceptible to attacks MAC Address based Access Control To take full advantage of 802 1 X authentication it is necessary to
232. tries to be modified to modify the name of VLAN After modification click Apply to apply all the changes made End 5 1 2 Interface Click Service Management gt VLAN gt Interface page to view edit VLAN members attribute as shown in Fig 5 3 Figure 5 3 Interface VLAN Attributes o Current position Service Management gt VLAN Fm merace ame uncTne nares Checking Access VAN TrnkAlowed VLAN Hate VLAN tb Untopged VLAN Hybrid Tapped VAN g Ethernet0 0 1 Hybrid Enable 1 1 O Ethernet0 0 2 Hybrid Enable 1 1 O Ethernet0 0 3 Hybrid Enable 1 1 Fi Ethernet0 0 4 Hybrid Enable 1 1 O Ethernet0 0 5 Hybrid Enable 1 1 O Ethernet0 0 6 Hybrid Enable 1 1 O Ethernet0 0 7 Hybrid Enable 1 1 O Ethernet0 0 8 Hybrid Enable 1 1 O Ethernet0 0 9 Hybrid Enable 1 1 Issue 05 2012 10 25 Huawei Proprietary and Confidential 38 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Table 5 2 Parameters of Interface VLAN Attributes Display a list of interface Link Type Indicate VLAN membership mode for an interface default Hybrid Access set the port as an Access VLAN interface The port transmits tagged or untagged frames on a single VLAN only Hybrid specify an interface as hybrid VLAN interface The port may transmit tagged or untagged frames Trunk specify an interface as VLAN Trunk interface A trunk is a direct link between two switches so the inter
233. try for receiving a large amount of TC BPDU will bring a great burden to device TC protection Configuration on interface can avoid frequent deletion operations and will avoid the transmission of TC BPDU Point to Point force true indicate a point to point share link Point to point interface is similar to the edge interface but the point to point interface mode must be full duplex mode Like the edge interface the point to point interface can transform to forwarding state quickly in order to gain the advantages of RSTP force false indicate the interface does not have a point to point state auto indicate the interface will transform to point to point state whenever it can be transformed just as the point to point state force true If the interface cannot remain in this state for example the interface was forced to run half duplex mode the state will be changed just as the state of force false The default parameter is set to auto Path Cost The associated cost for interface that forwards the packet to the designated interface list Parameters of Editing STP Interface GigabitEthernet 0 0 1 Step 1 Click Service Management gt STP gt STP Interface Issue 05 2012 10 25 Huawei Proprietary and Confidential 61 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Step 2 Select checkbox on the left of interface GigabitEthernet0 0 1 in interface
234. twork gt SNMP gt SNMP User the configuration page is displayed as follows Figure 10 10 SNMP User o Current position Network gt SNMP o Em snup Trap Settings DEA AZ F V3 initial 800000ab0300010 initial None None 0 Total 1 New Delete Table 10 6 Parameters of SNMP User User name up to 32 characters is used to identify the SNMP user Engine ID SNMP engine ID is the unique identifier to identify SNMP V3 and it is used to identify the SNMP entity of switch on network The SNMP group name that the user belongs to Security Level Specify SNMPv3 that will be used which provides securely access for equipment by authenticating and encrypting the packets on the network Auth Protocol The authentication protocol for MD5 using HMAC MD5 96 Authentication Protocol or SHA HMAC SHA authentication protocol to use Issue 05 2012 10 25 Huawei Proprietary and Confidential 183 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Priv Protocol The encryption protocol which can be set as DES DES 56 bit encryption based CBC DES DES 56 standard or does not use any encryption protocol Specify the binding ACL ID If not specified which means it is not controlled by ACL Create a new SNMP User Step 1 Click Network gt SNMP Step 2 Click SNMP User in Tab and click New to add a SNMP User the configuration page is displayed as follows Figure 10 11
235. uawei Proprietary and Confidential 47 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Figure 5 14 Voice VLAN Device o Current position Service Management gt Voice VLAN Global AR UI RO UB Voice VLAN Device BRR A DIAS om RD Interface Name Start Time Last Active Time Total 0 Table 5 7 Parameters of Voice VLAN Device The interface number of Voice device OUI address of Voice device Start Time Start time of Voice device Last Active Time Last active time of Voice device 5 3 5 LLDP MED Voice Device Click Service Management gt Voice VLAN gt LLDP MED Voice Device page to view voice device connected to switch through LLDP MED protocol the configuration page is shown as the figure below Figure 5 15 LLDP MED Voice Device o Current position Service Management gt Voice VLAN Global Voice VLAN OUI Voice VLAN Device LLDP MED Voice Device MR tw AAE EM Local Interface Chassis ID Subtype Chassis ID interface ID Subtype Interface ID Remain Time s Total 0 Table 5 8 Parameters of LLDP MED Voice Device Interface ID Subtype Interface types of LLDP MED device Interface ID Interface ID of LLDP MED device The start time when LLDP MED device joins the switch The remaining time that LLDP MED exists on switch Issue 05 2012 10 25 Huawei Proprietary and Confidential 48 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ether
236. uration Click Interface Management gt Eth Trunk to enter configuration page where Trunk can be set up to configure member interface number and configure connection parameters Figure 4 6 Trunk List m Trunk ID Min Active Links Max Active Links Preempt Delay State Preempt Delay Time s Total 0 New Delete Member Interfaces of Trunk ID CIAT opr Kes Total 0 Configure Member Interfaces of Trunk ID Partner Information Table 4 5 Parameters of Trunk List Trunk ID Configured trunk number Range 1 12 Types Manual Trunk or Static LACP mode supports 12 Trunks up to eight member interfaces in each group Min Active Links The minimum active interfaces in the group Max Active Links The maximum active interfaces in the group Preempt Delay State The active port with lower priority in LACP aggregation group can be replaced by the backup port with higher priority when LACP Preempt is enabled at this time the port with higher priority will become active port and the port with lower priority become the secondary port If LACP Preempt is disabled the replacement will not happen Preempt Delay Time s The backup port with higher priority replaces the active port with lower priority after a designated time It will only relevant when LACP Preempt is enabled Select interface The interface number set as Trunk member Issue 05 2012 10 25 Huawei Proprietary and Confidential 32 Copyright Huawei Technologies Co Ltd S
237. urity level which means the authentication and the encryption are both required by the packet between the specified switch and the remote SNMP manager Community String SNMPv3 Community string or SNMP V3 user name User Name Create a SNMP Host Step 1 Click Network gt SNMP Step 2 Click SNMP Host in Tab and click New to add a SNMP host the configuration page is displayed as follows Issue 05 2012 10 25 Huawei Proprietary and Confidential 180 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 10 Network Figure 10 7 Create a SNMP Host IPv4 Address IPv6 Address User based Security Model SNMPv1 E Security Level Community String SNMPv3 User Name 1 32 chars Apply Cancel Step 3 Enter IP address of SNMP host in IPv4 Address or IPv6 Address field Step 4 Select SNMP protocol version from User based Security Model list Step 5 Select type of encryption from Security Level list Step 6 Enter group name in Community String SNMPv3 User Name field Step 7 Click Apply button to apply all the changes made End 10 1 5 SNMP Group Create a SNMP group and user belong to SNMP group to create in the SNMP users table you can view or set the specified view These views must be created in SNMP View Click Network gt SNMP gt SNMP Group the configuration page is displayed as follows Figure 10 8 SNMP Group a Current position Network gt SNMP
238. utton to add RADIUS sever The successful configured RADIUS sever will be displayed in sever list End Huawei Proprietary and Confidential 170 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security 9 14 3 RADIUS Group Server Settings Click Security gt RADIUS gt RADIUS Group Server Settings to check the RADIUS group server on switch the configuration page is displayed as follows Figure 9 60 RADIUS Group Server Settings o Current position Security gt RADIUS ARS IL IAS RU ES RADIUS Group Server Settings LAMAS IAS RADIUS Group Server Settings Group Server Name 1 15 chars Add radius Total 1 Configure Delete Table 9 41 Parameters of RADIUS Group Server Settings Group Server Name The RADIUS server group name IP Address RADIUS server IP address on server groups ZN caution All the RADIUS servers are default as RADIUS group the order of the server group 1s based on the creating time Add the RADIUS Group Server Step 1 Step 2 Step 3 Step 4 Step 5 Click Security gt RADIUS Click RADIUS Group Server Settings in Tab Enter the name to be added in Group Server Name field and then click Add button to add the group sever Click the check box of group sever list on left side and then click Configure button Select the RADIUS group sever IP address to be added in drop down menu Issue 05 2012 10 25 Huawei Proprietary
239. ve period Step 2 configure matched object of ACL rules in ACL profile Step 3 apply the formed ACL rules to specified interface or VLAN 6 1 Effective Period 6 2 ACL Profile 6 3 ACL Application 6 4 HTTP ACL 6 1 Effective Period Effective Period configures the effective time of applying ACL rule Click ACL gt Effective Period the configuration page is shown as the figure below Figure 6 1 Configure Effective Period o Current position ACL gt Effective Period ENCINA Tine Range Ha sus Total 0 New Delete Periodic Time Range Periodic Time Range Table 6 1 Parameters of Configuring Effective Period Issue 05 2012 10 25 Huawei Proprietary and Confidential 82 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 6 ACL Configuration Status Disply whether this period is active Periodic Time Range Click an entry of time range from the lifetime list The periodic time range will display the entry lifetime in details Create an Effective Period Step 1 Click ACL gt Effective Period Step 2 Click New button to add an new effective period to open the configuration page shown as the figure below Figure 6 2 Edit Effective Period X Close Time Range Name 1 32 chars Periodic Time Range C Mon Tues C Wed Thurs Fri Sat C Sun start Time 00 00 w 00 End Time 123 w 59 w 59 v Apply Cancel Table 6 2 Parameters of Editing Effective P
240. w Figure 8 6 New IPv6 Routing X Close IPv6 Address Prefix Length Default Route Interface Name 1 12 chars Next Hop Example 3FFE 1 Backup State Primary b Apply Cancel Step 3 Configure the needed parameter Step 4 Click Apply button to apply all the changes made Issue 05 2012 10 25 Huawei Proprietary and Confidential 118 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Security About This Chapter 9 1 User Management 9 2 802 1X 9 3 Guest VLAN 9 4 Storm Suppression 9 5 Port Security 9 6 MAC based Access Control 9 7 Attack Prevent 9 8 DHCP Snooping 9 9 IPSG 9 10 DAI 9 11 MAC Attack 9 12 Interface Isolation 9 13 AAA 9 14 RADIUS 9 15 SSL Settings 9 1 User Management Through the user management function you can create modify and delete the users on switch and view the current online users 9 1 1 User Management Click Security gt User Management page and then click User Management in Tab to configure the user name and password configured by switch locally the configuration page is shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 119 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 1 User Management a Current position Security gt User Management User Management 15 All admin Total 1 New Dele
241. w and configure Trunk Trunk ID member peer to peer information check Trunk member information Create delete and edit VLAN edit display members based on VLAN and edit members according to interface interface range Create and delete MAC VLAN display MAC VLAN list based on VLAN or MAC address and enable disable MAC VLAN interface interface range according to Perform Voice VLAN relevant configuration MAC address list information display clear dynamic MAC address MAC ageing time configure MAC address ageing time Static MAC configuration create delete static MAC address Black hole MAC configuration create delete static black hole MAC address MAC filter configuration enable disable MAC filter at specified interface Address list information migration display MAC address migration information Relevant parameters of spanning tree can be configured in overall mode and based on interfaces Implement following configuration management global parameter VLAN parameter interface learning multicast group policy static multicast group multicast group querier routing interface and forwarding list Configure effective period of applying ACL rules Create AC rules Apply rules to specified interface or VLAN Huawei Proprietary and Confidential Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual Menu QoS IP Routing Security Issue 05 2012
242. wei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management Table 5 6 Parameters of Voice VLAN OUI OUI Address Specify a MAC address range to add to the list and the multicast MAC and broadcast MAC cannot be configured Enter the MAC address in format H H H MAC address range is obtained through Mask and Operation Identify a range of MAC addresses Selecting a mask of FFFF FF00 0000 identifies all devices with the same OUI the first three octets Other masks restrict the MAC address range Selecting FFFF FFFF FFFF specifies a single MAC address Description User defined text indicates the name of Voice VLAN device Add Voice VLAN OUI Step 1 Click Service Management gt Voice VLAN gt Voice VLAN OUI Step 2 Click New button to add Voice VLAN OUI to open the page as shown in following figure Figure 5 13 Add Voice VLAN OUI X Close OUI Address H H H Mask H H H Description 1 32 chars Apply Cancel Step 3 Specify OUI MAC address for VoIP device of network in OUI Address field Step 4 Enter a MAC address range in Mask field Step 5 Add a description for the device in Description field Step 6 Click Apply button to apply all the changes made End 5 3 4 Voice VLAN Device Click Service Management gt Voice VLAN gt Voice VLAN Device page to view Voice VLAN device connected to switch the configuration page is shown as the figure below Issue 05 2012 10 25 H
243. witches Web User Manual 10 Network The Total Received Frame Total number of received LLDP PDU frames Total Discard of Received TLVs The number of dropped packet which does not meet the general rule or special rule for particular TLV Receiving Total Unknown The received number of unrecognized TLV frames TLVs The Total Time out Neighbor Information The number of times that the neighbor information belonging to the MIB of the LLDP remote system is deleted The deletion action is triggered by the remote TTL time out Clear Count Click this button to clear statistics 10 3 8 Local Click Network gt LLDP gt Local to display Local information of switch the configuration page is displayed as follows Figure 10 35 LLDP Local Interface o Current position Network gt LLDP Global Port Settings Address Management The Basis of TLVs Dott TLVs Dot3 TLVs System Statistics Local Query Interface Name All Y Query ES interface Name Port ID Subtype Interface ID Port Description BO o 0 0 8 Ethernet0 0 1 Ethernet0 0 2 Ethernet0 0 3 Ethernet0 0 4 Ethernet0 0 5 Ethernet0 0 6 MAC Address MAC Address MAC Address MAC Address MAC Address MAC Address 0001 0203 0500 0001 0203 0501 0001 0203 0502 0001 0203 0503 0001 0203 0504 0001 0203 0505 Huawei 170 Huawei 170 Huawei S170 Huawei 170 Huawei 170 Huawei 170 0 52FR 2T2P AC Quidway 1700 V100R001B18 Port 1 on Unit 1 0 52FR
244. witches Web User Manual 10 Network 1 Network About This Chapter 10 1 SNMP 10 2 RMON 10 3 LLDP 10 4 LLDP MED 10 1 SNMP Simple Network Management Protocol SNMP is designed specifically for managing and monitoring network devices SNMP enables network management stations to read and modify the settings of gateways routers switches and other network devices Use SNMP to configure system features for proper operation monitor performance and detect potential problems in the Switch switch group or network Managed devices that support SNMP include software referred to as an agent which runs locally on the device A defined set of variables managed objects is maintained by the SNMP agent and used to manage the device These objects are defined in a Management Information Base MIB which provides a standard presentation of the information controlled by the on board SNMP agent SNMP defines both the format of the MIB specifications and the protocol used to access this information over the network This switch supports the SNMP versions 1 2c and 3 The three versions of SNMP vary in the level of security provided between management station and network device In SNMP v 1 and v 2c user authentication is accomplished by using Community Strings whose function like passwords The remote user SNMP application and the Switch SNMP must use the same community string SNMP packets from any station that has not been authenticated wi
245. witches Web User Manual 5 Service Management Step 3 Modify the needed parameter Step 4 Click Apply button to apply all the changes made End View STP Interface Details Step 1 Click Service Management gt STP gt STP Interface Step 2 Select the checkbox on the left side of interface in interface list and click Detail Info button displaying the specified interface details of STP configuration information the configuration page is shown as the figure below End Figure 5 30 Display STP Interface Details X Close Interface Name Eth Trunk 2 Instance Information 0 20000000 128 Instance 0 Port Protocol Enable Port State Disable Port Priority 128 Port Path Cost dot1t 20000000 Bridge Port 0000 0000 0000 0000 33666 Edge Auto Point To Point Auto Protection Type None Close Table 5 19 Parameters STP Interface Details Issue 05 2012 10 25 Huawei Proprietary and Confidential 64 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 5 Service Management mm Co force true specifies ports as edge ports The edge ports connect directly to terminal affecting no network s connectivity thus getting quickly into Forwarding status When edge ports receiving configuration message BPDU Message the system will automatically set these ports as non edge ports and calculate spanning tree causing network s topology oscillation Point to Point Force tru
246. witches Web User Manual 7 QoS Configuration QoS Configuration About This Chapter As a realization of IEE802 1p standard Qos allows network administrators to reserve bandwidth for important application and set higher priority for transmitting such as VoIP Voice Over Internet Protocol web browsing application profile server application or video session This function can not only reserve bandwidth but also limit other unimportant communication traffic On the switch each physical interface has 8 hardware queues which map different application packet and successively distinguish priority level 7 1 QoS Interface 7 2 CoS Mapping 7 3 DSCP Mapping 7 4 IP Precedence Mapping 7 5 Service Level Mapping 7 6 QoS Scheduler 7 7 Simple Random Early Detection 7 8 Traffic Management 7 9 Traffic Shaping 7 1 QoS Interface Click QoS gt QoS Interface to view each interface s default interface priority and trust mode on the switch the configuration page is shown as the figure below Issue 05 2012 10 25 Huawei Proprietary and Confidential 98 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 7 QoS Configuration Figure 7 1 QoS Interface o Current position QoS gt Qos Interface IC Trusto cmap Dat COS F Ethernet0 0 1 CoS Mapping Disable 0 F Ethernet0 0 2 CoS Mapping Disable 0 O Ethernet0 0 3 CoS Mapping Disable 0 O Ethernet0 0 4 CoS Mapping Disable 0 O Ethernet0 0 5 CoS Ma
247. y and Confidential 163 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 9 Security Figure 9 54 Set the parameters of One way Isolation Select Interface Status solate w Select All Cancel All aaa Apply Cancel Step 4 In Status field select to isolate not isolate the interface data flow specified in Interface List Step 5 Select the isolate not isolate interface Step 6 Click Apply button to apply all the changes made End 9 13 AAA Authentication authorization and accounting AAA function provide the main body of the switch access control framework Three security features can be briefly described as follows e Certification to identify the user who requests to access the network e Authorization to identify whether the client can access a particular service access e Accounting to account the network data accessed by users e AAA service needs RADIUS settings in network To configure AAA service on switch the user must follow the following general steps e Configure the access parameters of RADIUS server Please refer to section 9 14 RADIUS e Configure RADIUS Server ZN caution This guide assumes that RADIUS servers have already been configured to support AAA If the RADIUS configuration and server software is beyond the scope of this guide please refer to the documentations provided with the RADIUS and server software 9 13 1 AAA Global Settings
248. y supports static LACP Manual Trunk needs a manual setting of links at both ends and must be compatible with Cisco EtherChannel standard On the other hand a Trunk link can be connected between the LACP interface of a device and that of another device User 1s allowed to configure any member with an interface number of LACP as long as these numbers are not configured as Issue 05 2012 10 25 Huawei Proprietary and Confidential 30 Copyright Huawei Technologies Co Ltd S1700 Managed Series Ethernet Switches Web User Manual 4 Interface Management other Trunk links If the interface of another device is also configured as LACP thus a Trunk link can be set up between the switch and the device In addition to balancing load of each interface of Trunk link the member interfaces of Trunk link also provides a backup function to ensure Trunk operates properly in case that one interface of them fails But before automatic setup of any physical connection among devices it is necessary to specify the member interfaces at both ends of Trunk link by user interface When using the interface Trunk please note the following points Before connection of network cable user needs to configure interface Trunk to avoid forming of loop Up to 12 Trunks can be set up on one switch each of them including up to 8 interfaces Interfaces of connecting two ends must be configured as Trunk member interfaces When manual Trunks are configured on dif
Download Pdf Manuals
Related Search
Related Contents
Barco R5976519/00 Projector User Manual Introduction Installation Use Troubleshooting Hama 00062783 Manuale Utente - Vittorio Dell`Acqua Users Guide - Asso Air BOSS www.pullmanholtcorp.com Air BOSS Hand Dryer Betriebsanleitung UFR1001E Este símbolo tiene como finalidad prevenirle de la Samsung 22" SyncMaster SA350H LS22A350HS/EN Brugervejledning ZTE(C) Copyright © All rights reserved.
Failed to retrieve file