Home
LevelOne GEP-5070
Contents
1. LLDP MED This mode is similar to the Class mode expect that each port determines the amount power it reserves by exchanging PoE information using the LLDP protocol and reserves power accordingly If no LLDP information is available for a port the port will reserve power using the class mode In this mode the Maximum Power fields have no effect For all modes if a port uses more power than the power reserved for that port it is shut down Power Management Mode There are two modes for configuring when to shut down the ports Actual Consumption Ports are shut down when actual power consumption for all ports exceeds the amount of power that the power supply can deliver or if the actual power consumption for a given port exceeds the power reserved for that port The ports are shut down according to port priority If two ports have the same priority the port with the highest port number is shut down Reserved Power Ports are shut down when total reserved powered exceeds the amount of power that the power supply can deliver In this mode the port power is not turned on if the PD requests more power than available from the power supply Primary Power Supply The power budget for the switch If devices connected to the switch require more power than the switch s budget the port power priority settings are used to control the supplied power Range 0 190 Watts Port Port identifier PoE Mode The PoE operating mode fo
2. SHOWING IGMP Use the IGMP Snooping Group Information page to display the port SNOOPING GROUP members of each service group INFORMATION PATH Monitor IPMC IGMP Snooping Group Information PARAMETERS These parameters are displayed VLAN ID VLAN Identifier Groups The IP address for a specific multicast service Port Members The ports assigned to the listed VLAN which propagate a specific multicast service WEB INTERFACE To display the port members of each service group click Monitor IGMP Snooping Group Information Figure 134 IGMP Snooping Group Information IGMP Snooping Group Information Auto refresh Refresh I lt gt gt Start from VLAN 1 and group address 224 0 0 0 with 20 entries per page Port Members ESTEET z iota 1 1 VLAN ID Groups 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 1 239 255 255 250 y SHOWING IPv4 SFM Use the IGMP SFM Information page to display IGMP Source Filtered INFORMATION Multicast information including group filtering mode include or exclude source address and type allow or deny PATH Monitor IPMC IGMP Snooping IPv4 SFM Information 263 CHAPTER 5 Monitoring the Switch Showing MLD Snooping Information PARAMETERS These parameters are displayed VLAN ID VLAN identifier Group The IP address of a mult
3. CHAPTER 1 Introduction Description of Software Fea tures Table 1 Key Features Continued Feature Description Spanning Tree Algorithm Supports standard STP Rapid Spanning Tree Protocol RSTP and Multiple Spanning Trees MSTP Virtual LANs Up to 4K using IEEE 802 1Q port based protocol based private VLANs and voice VLANs and QinQ tunnel Traffic Prioritization Queue mode and CoS configured by Ethernet type VLAN ID TCP UDP port DSCP ToS bit VLAN tag priority or port Qualify of Service Supports Differentiated Services DiffServ and DSCP remarking Link Layer Discovery Used to discover basic information about neighboring devices Protocol Multicast Filtering Supports IGMP snooping and query MLD snooping and Multicast VLAN Registration DESCRIPTION OF SOFTWARE FEATURES CONFIGURATION BACKUP AND RESTORE AUTHENTICATION The switch provides a wide range of advanced performance enhancing features Flow control eliminates the loss of packets due to bottlenecks caused by port saturation Storm suppression prevents broadcast multicast and unknown unicast traffic storms from engulfing the network Untagged port based tagged and protocol based VLANs provide traffic security and efficient use of network bandwidth CoS priority queueing ensures the minimum delay for moving real time multimedia data across the network While multicast filtering provides support for real time network applications Some of th
4. CHAPTER 4 Configuring the Switch Configuring Security CONFIGURING USER ACCOUNTS addresses assigned to DHCP clients can also be carefully controlled using static or dynamic bindings with DHCP Snooping and IP Source Guard commands ARP Inspection can also be used to validate the MAC address bindings for ARP packets providing protection against ARP traffic with invalid MAC to IP address bindings which forms the basis for man in the middle attacks Use the User Configuration page to control management access to the switch based on manually configured user names and passwords PATH Advanced Configuration Security Switch Users COMMAND USAGE The default guest name is guest with the password guest The default administrator name is admin with the password admin The guest only has read access for most configuration parameters However the administrator has write access for all parameters governing the onboard agent You should therefore assign a new administrator password as soon as possible and store it in a safe place The administrator has a privilege level of 15 with access to all process groups and full control over the device If the privilege level is set to any other value the system will refer to each group privilege level The user s privilege should be same or greater than the group privilege level to have the access of a group By default most of the group privilege levels are
5. Location Identification Extended Power via MDI PSE Extended Power vis MDI PD Inventory Reserved Application Type The primary function of the application s defined for this network policy and advertised by an Endpoint or Network Connectivity Device The possible application types are described under Configuring LLDP MED TLVs on page 162 Policy This field displays one of the following values Unknown The network policy for the specified application type is currently unknown Defined The network policy is defined Tag Indicates whether the specified application type is using a tagged or an untagged VLAN VLAN ID The VLAN identifier VID for the port as defined in IEEE 802 1Q 2003 A value of 1 through 4094 is used to define a valid VLAN ID A value of 0 Priority Tagged is used if the device is using priority tagged frames as defined by IEEE 802 1Q 2003 meaning that only the IEEE 802 1D priority level is significant and the default PVID of the ingress port is used instead Priority The Layer 2 priority to be used for the specified application type Range 0 7 DSCP The value to be used to provide Diffserv node behavior for the specified application type as defined in IETF RFC 2474 Range 0 63 Location The physical location of the device attached to an interface including items such as the country city street number building and room information Auto negotiation Shows if MAC
6. Port based 802 1X Requires a dot1x aware client to be authorized by the authentication server Clients that are not dotix aware will be denied access Single 802 1X At most one supplicant can get authenticated on the port at a time If more than one supplicant is connected to a port the one that comes first when the port s link comes up will be the first one considered If that supplicant doesn t provide valid credentials within a certain amount of time another supplicant will get a chance Once a supplicant is successfully authenticated only that supplicant will be allowed access This is the most secure of all the supported modes In this mode the Port Security module is used to secure a supplicant s MAC address once successfully authenticated Multi 802 1X One or more supplicants can get authenticated on the same port at the same time Each supplicant is authenticated individually and secured in the MAC table using the Port Security module In Multi 802 1X it is not possible to use the multicast BPDU MAC address as the destination MAC address for EAPOL frames sent from the switch towards the supplicant since that would cause all supplicants attached to the port to reply to requests sent from the switch Instead the switch uses the supplicant s MAC address which is obtained from the first EAPOL Start or EAPOL Response Identity frame sent by the supplicant An exception to this is when no supplicants are attached In this case
7. Use the LLDP Port Statistics page to display statistics on LLDP global counters and control frames PATH Monitor LLDP Port Statistics PARAMETERS These parameters are displayed Global Counters Neighbor entries were last changed at The time the LLDP neighbor entry list was last updated It also shows the time elapsed since last change was detected Total Neighbors Entries Added Shows the number of new entries added since the switch was rebooted and for which the remote TTL has not yet expired 273 CHAPTER 5 Monitoring the Switch Displaying LLDP Information Total Neighbors Entries Deleted The number of LLDP neighbors which have been removed from the LLDP remote systems MIB for any reason Total Neighbors Entries Dropped The number of times which the remote database on this switch dropped an LLDPDU because the entry table was full Total Neighbors Entries Aged Out The number of times that a neighbor s information has been deleted from the LLDP remote systems MIB because the remote TTL timer has expired LLDP Statistics Local Port Port Identifier Tx Frames Number of LLDP PDUs transmitted Rx Frames Number of LLDP PDUs received Rx Errors The number of received LLDP frames containing some kind of error Frames Discarded Number of frames discarded because they did not conform to the general validation rules as well as any specific usage rules defined for the parti
8. Group The IP address of a multicast group detected on this interface Port Port identifier Mode The filtering mode maintained per VLAN ID port number and Group Address It can be either Include or Exclude Source Address IP Address of the source Currently the system limits the total number of IP source addresses for filtering to be 128 Different source addresses belong to the same group are treated as single entry 266 CHAPTER 5 Monitoring the Switch Displaying LLDP Information Type Indicates the Type It can be either Allow or Deny Hardware Filter Switch Indicates whether the data plane destined to the specific group address from the source IPv4 address can be handled by the chip or not WEB INTERFACE To display MLD Source Filtered Multicast information click Monitor MLD Snooping IPv6 SFM Information Figure 138 IPv6 SFM Information MLD SFM Information Auto refresh l Refresh k lt gt gt Start from VLAN 1 and Group froo with 20 entries per page VLAN ID Port Mode Source Address Type Hardware Filter Switch No more entries DISPLAYING LLDP INFORMATION DISPLAYING LLDP NEIGHBOR INFORMATION Use the monitor pages for LLDP to display information advertised by LLDP neighbors and statistics on LLDP control frames Use the LLDP Neighbor Information page to display information about devices connected directly to the switch s ports which are advertising inf
9. PARAMETERS The following parameters are displayed ID Index to this entry Range 1 65535 Data Source Port identifier WEB INTERFACE To enable regular sampling of statistics on a port 1 Click Advanced Configuration Security Switch RMON Statistics 2 Click Add New Entry 3 Enter the index identifier and port number 4 Click Save Figure 25 RMON Statistics Configuration RMON Statistics Configuration ID Data Source 1 1 36 1 21221 1 1 Delete 1361212211 0 Add New Entry Reset CONFIGURING RMON History SAMPLES Use the RMON History Configuration page to collect statistics on a physical interface to monitor network utilization packet types and errors A historical record of activity can be used to track down intermittent problems The record can be used to establish normal baseline activity which may reveal problems associated with high traffic levels broadcast storms or other unusual events It can also be used to predict network 298 3 CHAPTER 4 Configuring the Switch Configuring Security growth and plan for expansion before your network becomes too overloaded PATH Advanced Configuration Security RMON History COMMAND USAGE The information collected for each sample includes drop events input octets packets broadcast packets multicast packets CRC alignment errors undersize packets oversize packets fragments jabbers collisions and network utilization PARAMETERS T
10. S port For service ports the EtherType of all received frames is changed to 0x88a8 to indicate that double tagged frames are being forwarded across the switch The switch will pass these frames on to the VLAN indicated in the outer tag It will not strip the outer tag nor change any components of the tag other than the EtherType field S custom port For custom service ports the EtherType of all received frames is changed to value set in the Ethertype for Custom S ports field to indicate that double tagged frames are being forwarded across the switch The switch will pass these frames on to the VLAN indicated in the outer tag It will not strip the outer tag nor change any components of the tag other than the EtherType field Unaware All frames are classified to the Port VLAN ID and tags are not removed Ingress Filtering Determines how to process frames tagged for VLANs for which the ingress port is not a member Default Disabled Ingress filtering only affects tagged frames If ingress filtering is enabled and a port receives frames tagged for VLANs for which it is not a member these frames will be discarded If ingress filtering is disabled and a port receives frames tagged for VLANs for which it is not a member these frames will be flooded to all other ports Ingress filtering does not affect VLAN independent BPDU frames such as GVRP or STP However they do affect VLAN dependent BPDU frames such
11. SIP Filter Specifies the source IP filter for this rule Options Any no source IP filter is specified Host specifies the source IP address in the SIP Address field Network specifies the source IP address and source IP mask in the SIP Address and SIP Mask fields Default Any 104 CHAPTER 4 Configuring the Switch Configuring Security DIP Filter Specifies the destination IP filter for this rule Options Any no destination IP filter is specified Host specifies the destination IP address in the DIP Address field Network specifies the destination IP address and destination IP mask in the DIP Address and DIP Mask fields Default Any Response to take when a rule is matched Action Permits or denies a frame based on whether it matches an ACL rule Default Permit Rate Limiter Specifies a rate limiter page 98 to apply to the port Range 1 16 Default Disabled Port Redirect Port to which frames matching the ACE are redirected Default Disabled Mirror Mirrors matching frames from this port Default Disabled See Configuring Local Port Mirroring on page 207 ACL based port mirroring set by this parameter and port mirroring set on the general Mirror Configuration page are implemented independently To use ACL based mirroring enable the Mirror parameter on the ACE Configuration page Then open the Mirror Configuration page set the Port to mirror on field to the required de
12. 153 CHAPTER 4 Configuring the Switch MLD Snooping The leave proxy feature does not function when a switch is set as the querier When the switch is a non querier the receiving port is not the last dynamic member port in the group and the receiving port is not a router port the switch will generate and send a group specific GS query to the member port which received the leave message and then start the last member query timer for that port When the conditions in the preceding item all apply except that the receiving port is a router port then the switch will not send a GS query but will immediately start the last member query timer for that port Proxy Enabled Configures the switch to issue MLD host report messages on behalf of hosts discovered through standard MLD interfaces Default Disabled When MLD proxy is enabled the switch exchanges MLD messages with the router on its upstream interface and performs the host portion of the MLD task on the upstream interface as follows When queried it sends multicast listener reports to the group m When a host joins a multicast group to which no other host belongs it sends unsolicited multicast listener reports to that group When the last host in a particular multicast group leaves it sends an unsolicited multicast listener done report to the all routers address FFO2 2 for MLDvi Port Related Configuration Port Port identifier Router Port Sets a
13. 3 Use Auto refresh to automatically refresh the page at regular intervals Refresh to update system log entries starting from the current entry ID or Clear to flush all system log entries Use the arrow buttons to scroll through the log messages lt lt updates the system log entries starting from the first available entry ID lt lt updates the system log entries ending at the last entry currently displayed gt gt updates the system log entries starting from the last entry currently displayed and gt gt updates the system log entries ending at the last available entry ID Figure 99 System Log Information System Log Information Auto refresh I Refresh Clear I lt lt lt lt gt gt gt gt Clear Level All z The total number of entries is 3 for the given level Start from ID ft with 20 entries per page ID Level Time Message 4 Info 1970 01 01T00 00 01 00 00 Switch just made a cold boot 2 Info 1970 01 01T00 00 05 00 00 Link up on port 3 Error 1970 01 01T00 00 06 00 00 VLAN Port Configuration UVID Coni ee CHAPTER 5 Monitoring the Switch Displaying Information About Ports DISPLAYING LOG Use the Detailed Log page to view the full text of specific log messages DETAILS PATH Monitor System Detailed Log WEB INTERFACE To display the text of a specific log message click Monitor System Detailed Log 1 Enter a log identifier in the ID field and click Refresh Figure
14. Configuring PoE Settings MAC Address Table Configuration VLAN Membership Configuration VLAN Port Configuration 4A 98 99 106 109 110 113 114 116 117 119 122 125 126 127 128 128 132 134 135 138 139 140 143 145 149 151 152 155 157 158 161 167 170 172 174 176 Figure 68 Figure 69 Figure 70 Figure 71 Figure 72 Figure 73 Figure 74 Figure 75 Figure 76 Figure 77 Figure 78 Figure 79 Figure 80 Figure 81 Figure 82 Figure 83 Figure 84 Figure 85 Figure 86 Figure 87 Figure 88 Figure 89 Figure 90 Figure 91 Figure 92 Figure 93 Figure 94 Figure 95 Figure 96 Figure 97 Figure 98 Figure 99 Figure 100 Figure 101 Figure 102 Figure 103 Port Isolation Configuration Configuring MAC Based VLANs Configuring Protocol VLANs Assigning Ports to Protocol VLANs Assigning Ports to an IP Subnet based VLAN Configuring Global and Port Settings for a Voice VLAN Configuring an OUI Telephony List Configuring Ingress Port QoS Classification Configuring Ingress Port Policing Displaying Egress Port Schedulers Configuring Egress Port Schedulers and Shapers Displaying Egress Port Shapers Displaying Port Tag Remarking Mode Configuring Port Tag Remarking Mode Configuring Port DSCP Translation and Rewriting Configuring DSCP based QoS Ingress Classification Configuring DSCP Translation and Re mapping Mapping DSCP to QoS QoS Control List Configuration Storm Control
15. Default Disabled WEB INTERFACE To configure flow sampling 1 Click Advanced Configuration sFlow 2 Set the parameters for flow receiver flow sampler and counter poller 3 Click Save 216 CHAPTER 4 Configuring the Switch Configuring sFlow Figure 96 sFlow Configuration sFlow Configuration Receiver Configuration lt Configured through local management gt Release IP Address Hostname fis2 168 0 99 UDP Port e343 Timeout os98696 seconds Max Datagram Size Port Configuration Flow Sampler Counter Poller Enabled Sampling Rate Max Header Enabled Interval E y E CHAPTER 4 Configuring the Switch Configuring sFlow 218 MONITORING THE SWITCH This chapter describes how to monitor all of the basic functions configure or view system logs and how to view traffic status or the address table DISPLAYING BASIC INFORMATION ABOUT THE SYSTEM You can use the Monitor System menu to display a basic description of the switch log messages or statistics on traffic used in managing the switch DISPLAYING SYSTEM Use the System Information page to identify the system by displaying the INFORMATION device name location and contact information PATH Monitor System Information PARAMETERS These parameters are displayed System To configure the following items see Configuring System Information on page 45 Contact Administrator responsible for the system Name
16. GEP 5070 48 GE PoE Plus 2 GE SFP L2 Managed Switch User Manual User Manual GEP 5070 Layer 2 Gigabit Ethernet Switch with 48 10 100 1000BASE T PoE Plus Ports RJ 45 and 2 Gigabit Ethernet SFP Ports GEP 5070 E042013 ST RO1 PURPOSE AUDIENCE CONVENTIONS As A RELATED PUBLICATIONS REVISION HISTORY ABOUT THIS GUIDE This guide gives specific information on how to operate and use the management functions of the switch The guide is intended for use by network administrators who are responsible for operating and maintaining network equipment consequently it assumes a basic working knowledge of general switch functions the Internet Protocol IP and Simple Network Management Protocol SNMP The following conventions are used throughout this guide to show information Note Emphasizes important information or calls your attention to related features or instructions CauTION Alerts you to a potential hazard that could cause loss of data or damage the system or equipment WARNING Alerts you to a potential hazard that could cause personal injury The following publication details the hardware features of the switch including the physical and performance related characteristics and how to install the switch The Installation Guide Also as part of the switch s software there is an online web based help that describes all management related features This section summari
17. Log messages are processed based on the current configuration settings for event logging see Configuring Remote Log Messages on page 53 snmptrap Sends a trap message to all configured trap managers see Configuring SNMP System and Trap Settings on page 68 logandtrap Logs the event and sends a trap message Community A password like community string sent with the trap operation to SNMP v1 and v2c hosts Although the community string can be set on this configuration page it is recommended that it be defined on the SNMP trap configuration page see Setting SNMPv3 Community Access Strings on page 72 prior to configuring it here Range 0 127 characters Last Event Time The value of sysUpTime when an event was last generated for this entry WEB INTERFACE To configure an RMON event 1 Click Advanced Configuration Security Switch RMON Event 2 Click Add New Entry 3 Enter an index number a brief description of the event the type of event to initiate and the community string to send with trap messages 4 Click Save 825 CONFIGURING PORT Limit CONTROLS CHAPTER 4 Configuring the Switch Configuring Security Figure 28 RMON Event Configuration RMON Event Configuration oun oem coon mj 1 for software group logandtrap_ public 1935766625 Add New Entry Reset Use the Port Security Limit Control Configuration page to limit the number of users accessing a given port A user
18. Name assigned to the switch system Location Specifies the system location Hardware MAC Address The physical layer address for this switch Time System Date The current system time and date The time is obtained through an SNTP Server if configured see Setting an IP Address on page 46 System Uptime Length of time the management agent has been up Software Software Version Version number of runtime code es AON me CHAPTER 5 Monitoring the Switch Displaying Basic Information About the System DISPLAYING CPU UTILIZATION Software Date Release date of the switch software Code Revision Version control identifier of the switch software WEB INTERFACE To view System Information click Monitor System Information Figure 97 System Information System Information Contact Name GEP 5070 Location LevelOne Hardware MAC Address 78 cd 8e af 69 7c Time System Date 1970 01 01T07 44 49 00 00 System Uptime Od 07 44 49 Software Software Version GEP 5070 standalone v1 0 0 4 2013 03 28T04 09 34 04 00 Software Date 2013 03 28T04 09 34 04 00 Use the CPU Load page to display information on CPU utilization The load is averaged over the last 100ms 1sec and 10 seconds intervals The last 120 samples are graphed In order to display the graph your browser must support the Scalable Vector Graphics format Consult SVG Wiki for more information on browser support Depending on your br
19. Options Any any value is allowed 0 TCP frames where the ACK field is set must not match this entry 1 TCP frames where the ACK field is set must match this entry Default Any TCP URG Specifies the TCP Urgent Pointer field significant URG value for this rule Options Any any value is allowed 0 TCP frames where the URG field is set must not match this entry 1 TCP frames where the URG field is set must match this entry Default Any IP TTL Specifies the time to Live settings for this rule Options Any any value is allowed Non zero IPv4 frames with a TTL field greater than zero must match this entry Zero IPv4 frames with a TTL field greater than zero must not match this entry Default Any IP Fragment Specifies the fragment offset settings for this rule This involves the settings for the More Fragments MF bit and the Fragment Offset FRAG OFFSET field for an IPv4 frame Options Any any value is allowed Yes IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must match this entry No IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must not match this entry Default Any IP Option Specifies the options flag setting for this rule Options Any any value is allowed Yes IPv4 frames where the options flag is set must match this entry No IPv4 frames where the options flag is set must not match this entry Default Any
20. Port VLAN ID The VLAN in which NAS has placed this port This field is blank if the Port VLAN ID is not overridden by NAS If the VLAN ID is assigned by the RADIUS server RADIUS assigned is appended to the VLAN ID Refer to RADIUS Assigned VLAN Enabled for a description of this attribute see page 85 If the port is moved to the Guest VLAN Guest is appended to the VLAN ID Refer to Guest VLAN Enabled for a description of this attribute see page 85 WEB INTERFACE To display port status for authentication services click Monitor Security Network NAS Switch Figure 109 Network Access Server Switch Status Network Access Server Switch Status Auto refresh Refresh Force Authorized Globally Disabled Force Authorized Globally Disabled Force Authorized Globally Disabled Force Authorized Globally Disabled Force Authorized Globally Disabled Force Authorized Globally Disabled Force Authorized Globally Disabled Force Authorized Globally Disabled Force Authorized Globally Disabled Force Authorized Globally Disabled 1 2 3 4 5 6 8 g 10 DISPLAYING PORT Use the NAS Statistics Port selection page to display authentication STATISTICS FOR statistics for the selected port either for 802 1X protocol or for the 802 1X oR REMoTE emote authentication server depending on the authentication method AUTHENTICATION This page provides detailed NAS statistics for a specific switch port runni
21. Range 1 1440 251 CHAPTER 4 Configuring the Switch Configuring the Time Zone and Daylight Savings Time Non Recurring Sets the start end and offset times of summer time for the switch on a one time basis From Start time for summer time To End time for summer time Offset The number of minutes to add during Daylight Saving Time Range 1 1440 WEB INTERFACE To set the time zone or Daylight Savings Time 1 Click Configuration System Time 2 Select one of the predefined time zones 3 Select the Daylight Savings Time mode and then set the start end and offset times 4 Click Save Figure 7 Time Zone and Daylight Savings Time Configuration Time Zone Configuration Time Zone Configuration Time Zone None 7 Acronym 0 16 characters Daylight Saving Time Configuration Daylight Saving Time Mode Daylight Saving Time Disabled Hours Minutes Offset settings _Save _Reset Boe CHAPTER 4 Configuring the Switch Configuring Remote Log Messages CONFIGURING REMOTE LOG MESSAGES Use the System Log Configuration page to send log messages to syslog servers or other management stations You can also limit the event messages sent to specified types PATH Basic Advanced Configuration System Log COMMAND USAGE When remote logging is enabled system log messages are sent to the designated server The syslog protocol is based on UDP and received on UD
22. Remarks matching egress frames with the specified Priority Code Point or User Priority value Range 0 7 Default 0 DEI Remarks matching egress frames with the specified Drop Eligible Indicator Range 0 1 Default 0 WEB INTERFACE To show the QoS Egress Port Tag Remarking mode used for each port 1 Click Advanced Configuration QoS Port Tag Remarking 2 Click on any enter under the Port field to configure the Port Tag Remarking mode Figure 80 Displaying Port Tag Remarking Mode QoS Egress Port Tag Remarking Classified Classified Classified Classified i 2 3 Classified 4 5 To configure the tag remarking mode 1 Click Configuration QoS Port Tag Remarking 2 Click on any of the entries in the Port field 3 Set the tag remarking mode and any parameters associated with the selected mode 4 Click Save 194 CHAPTER 4 Configuring the Switch Quality of Service Figure 81 Configuring Port Tag Remarking Mode QoS Egress Port Tag Remarking Port 1 SEC mc cm Classified ve l Save JI Reset J Cancel QoS Egress Port Tag Remarking Port 1 SCG race Default 4 PCPIDEI Configuration Default PCP DEEA Default DE o Save J Reset I Cancel QoS Egress Port Tag Remarking Port 1 PCr ice Mapped QoS class DP level to PCP DEI Mapping ese oer T on 0 Si SI SII SN S14 ol leol lel lol lle ZIER REER RER fai i GiGi i NESSES
23. The global unicast address can be automatically configured by taking the network prefix from router advertisements observed on the local interface and using the modified EUI 64 form of the interface identifier to automatically create the host portion of the address This option can be selected by enabling the Auto Configuration option m You can also manually configure the global unicast address by entering the full address and prefix length The management VLAN to which the IPv6 address is assigned must be specified on the IP Configuration page See Setting an IPv4 Address on page 46 PARAMETERS These parameters are displayed Auto Configuration Enables stateless autoconfiguration of IPv6 addresses on an interface and enables IPv6 functionality on the SAB is CHAPTER 4 Configuring the Switch Setting an IP Address interface The network portion of the address is based on prefixes received in IPv6 router advertisement messages and the host portion is automatically generated using the modified EUI 64 form of the interface identifier i e the switch s MAC address Default Disabled Address Manually configures a global unicast address by specifying the full address and network prefix length in the Prefix field Default 192 168 1 1 Prefix Defines the prefix length as a decimal value indicating how many contiguous bits starting at the left of the address comprise the prefix i e the network portion of
24. Uplink ports to intermediate switches MAC Table learning must be disabled on intermediate ports Destination Port Specifies the destination port to monitor the traffic mirrored from source ports A destination port can be configured on more than one switch for the same session Also note that a destination port can still send and receive switched traffic and participate in any Layer 2 protocols to which it has been assigned WEB INTERFACE To configure remote port mirroring for an RSPAN source switch 1 2 4 Click Basic Advanced Configuration Mirroring amp RSPAN Set the Mode to Enabled and the Type to Source Set the Remote VLAN ID the Reflector port connecting to the RSPAN VLAN the type of traffic to mirror from the Source ports and the intermediate ports through which all mirrored traffic will be forwarded to other switches Click Save Figure 92 Mirror Configuration Source Mirroring amp RSPAN Configuration Session Number C Mode Enabled Type Source VLAN ID fo Reflector Port Pott Port Source Intermediate Destination E 1 Disabled Z 2 Disabled gt m 3 Disabled m r 4 Disabled m m 5 Disabled z O c 2A E CHAPTER 4 Configuring the Switch Configuring Remote Port Mirroring To configure remote port mirroring for an RSPAN intermediate switch 1 2 3 4 Click Basic Advanced Configuration Mirroring amp RSPAN Set the Mode t
25. but for IGMPv3 hosts it may include a specific address when requested Only IGMPv3 hosts can request service from a specific multicast source When downstream hosts request service from a specific source for a multicast service these sources are all placed in the Include list and traffic is forwarded to the hosts from each of these sources IGMPv3 hosts may also request that service be forwarded from any source except for those specified In this case traffic is filtered from sources in the Exclude list and forwarded from all other available sources Leave Proxy Enabled Suppresses leave messages unless received from the last member port in the group Default Disabled IGMP leave proxy suppresses all unnecessary IGMP leave messages so that a non querier switch forwards an IGMP leave packet only when the last dynamic member port leaves a multicast group The leave proxy feature does not function when a switch is set as the querier When the switch is a non querier the receiving port is not the last dynamic member port in the group the receiving port is not a router port and no IGMPv1 member port exists in the group the switch will generate and send a group specific GS query to the member port which received the leave message and then start the last member query timer for that port When the conditions in the preceding item all apply except that the receiving port is a router port then the switch will not send a GS query b
26. 29 22 23 24 25 26 27 2B ZB 30 31 32 33134 35 38 37 38 39 40 41 42 43 44 45 46 47 48 49 50 m c co or RP OO CCC OCCCOCOCOCOeeCeoeccecerererrecerereececeoecrcoerenececrcecncr Ada New Static Entry Sze Reset IEEE 802 1Q VLANs In large networks routers are used to isolate broadcast traffic for each subnet into separate domains This switch provides a similar service at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains VLANs confine broadcast traffic to the originating group and can eliminate broadcast storms in large networks This also provides a more secure and cleaner network environment An IEEE 802 1Q VLAN is a group of ports that can be located anywhere in the network but communicate as though they belong to the same physical segment VLANs help to simplify network management by allowing you to move devices to a new VLAN without having to change any physical connections VLANs can be easily organized to reflect departmental groups such as Marketing or R amp D usage groups such as e mail or multicast groups used for multimedia applications such as videoconferencing VLANs provide greater network efficiency by reducing broadcast traffic and allow you to make network changes without having to update IP addresses or IP subnets VLANs inherently provide a high level of network security since traffic must pass through a configured Layer 3 link to reach a diffe
27. CLI System Reboot System Restore Default System Password Configuration Save Configuration Load and Firmware Load Web Users Privilege Levels and everything in Maintenance Debug Only present in CLI Privilege levels Every privilege level group can be configured to access the following modules or system settings Configuration Read only Configuration Execute Read write Status Statistics Read only and Status Statistics Read write e g clearing statistics The default settings provide four access levels 1 Read access of port status and statistics 5 Read access of all system functions except for maintenance and debugging 10 read and write access of all system functions except for maintenance and debugging 15 read and write access of all system functions including maintenance and debugging WEB INTERFACE To configure privilege levels 1 Click Advanced Configuration Security Switch Privilege Levels 2 Set the required privilege level for any software module or functional group 60 CONFIGURING THE AUTHENTICATION METHOD FoR MANAGEMENT ACCESS CHAPTER 4 Configuring the Switch Configuring Security 3 Click Save Figure 13 Configuring Privilege Levels Privilege Level Configuration Privilege Levels Configuration Configuration Execute Status Statistics Status Statistics Read only Read write Read only Read write 10 L15 0 10 v v v v Wy v v v
28. Click Save Figure 76 Configuring Ingress Port Policing QoS Ingress Port Policers Port Enabled Rate Unit Flow Control O gt z kps z kbps z kbps kbps 1 D 2 rc 5 3 D kbps 4 O 5 5 Use the QoS Egress Port Schedulers page to show an overview of the QoS Egress Port Schedulers including the queue mode and weight Click on any of the entries in the Port field to configure egress queue mode queue shaper rate and access to excess bandwidth and port shaper PATH Advanced Configuration QoS Port Scheduler 189 CHAPTER 4 Configuring the Switch Quality of Service PARAMETERS These parameters are displayed Displaying QoS Egress Port Schedulers Port Port identifier Mode Shows the scheduling mode for this port Weight Shows the weight of each egress queue used by the port Configuring QoS Egress Port Scheduler Queue Scheduler and Port Shapers Scheduler Mode The switch can be set to service the queues based on a strict rule that requires all traffic in a higher priority queue to be processed before the lower priority queues are serviced or Deficit Weighted Round Robin DWRR queuing which specifies a scheduling weight for each queue Options Strict Weighted Default Strict DWRR services the queues in a manner similar to WRR but the next queue is serviced only when the queue s Deficit Counter becomes smaller than the packet size to be transm
29. Enabled Enabled Enabled Enabled Enabled 2 3 alll 5 6 A il 8 g 10 lt S S K SJ SI 8 II I IK S LS LS LS LS S SI SI I RINNE SENNA EK S S SIS WS SIS IS IS SJ SI S SI S K K lt S 161 CHAPTER 4 Configuring the Switch Link Layer Discovery Protocol CONFIGURING LLDP MED TLVs Use the LLDP MED Configuration page to set the device information which is advertised for end point devices LLDP MED Link Layer Discovery Protocol Media Endpoint Discovery is an extension of LLDP intended for managing endpoint devices such as Voice over IP phones and network switches The LLDP MED TLVs advertise information such as network policy power inventory and device location details Both LLDP and LLDP MED information can be used by SNMP applications to simplify troubleshooting enhance network management and maintain an accurate network topology PATH Advanced Configuration LLDP MED PARAMETERS These parameters are displayed Fast Start Repeat Count Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a critically important aspect of VoIP systems in general In addition it is best to advertise only those pieces of information which are specifically relevant to particular endpoint type
30. MSTI Maand CIST m hd MSTI 32768 MSTI2 32768 usti3 32768 msti4 32768 ustis 32768 gt msti 32768 usti7 32768 gt _ Save Reset Use the CIST Ports Configuration page to configure STA attributes for interfaces when the spanning tree mode is set to STP or RSTP or for interfaces in the CIST STA interface attributes include path cost port priority edge port for fast forwarding automatic detection of an edge port and point to point link type You may use a different priority or path cost for ports of the same media type to indicate the preferred path edge port to indicate if the attached device can support fast forwarding or link type to indicate a point to point connection or shared media connection References to ports in this section means interfaces which includes both ports and trunks PATH Basic Advanced Configuration Spanning Tree CIST Ports PARAMETERS These parameters are displayed Port Port identifier This field is not applicable to static trunks or dynamic trunks created through LACP Also note that only one set of interface configuration settings can be applied to all trunks STP Enabled Sets the interface to enable STA disable STA or disable STA with BPDU transparency Default Enabled BPDU transparency is commonly used to support BPDU tunneling passing BPDUs across a service provider s network without any changes thereby combining remo
31. No MAC addresses attached is displayed 23i CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings DISPLAYING PORT STATUS FOR AUTHENTICATION SERVICES VLAN ID The VLAN ID seen on this port State Indicates whether the corresponding MAC address is blocked or forwarding In the blocked state it will not be allowed to transmit or receive traffic Time of Addition Shows the date and time when this MAC address was first seen on the port Age Hold If at least one user module has decided to block this MAC address it will stay in the blocked state until the hold time measured in seconds expires If all user modules have decided to allow this MAC address to forward and aging is enabled the Port Security module will periodically check that this MAC address is still forwarding traffic If the age period measured in seconds expires and no frames have been seen the MAC address will be removed from the MAC table Otherwise a new age period will begin If aging is disabled or a user module has decided to hold the MAC address indefinitely a dash will be shown WEB INTERFACE To display information about the MAC address learning through the Port Security module click Monitor Security Network Port Security Port Figure 108 Port Security Port Status Port Security Port Status Port3 Pot3 Auto refresh Refresh MAC Address VLAN ID State Time of Addition Age
32. Pt 128 128 128 128 128 128 v i28 128 v 128 iv 128 R E E R R RE 139 CHAPTER 4 Configuring the Switch Multicast VLAN Registration MULTICAST VLAN REGISTRATION CONFIGURING GENERAL MVR SETTINGS Multicast VLAN Registration MVR is a protocol that controls access to a single network wide VLAN most commonly used for transmitting multicast traffic such as television channels or video on demand across a service provider s network Any multicast traffic entering an MVR VLAN is sent to all attached subscribers This protocol can significantly reduce to processing overhead required to dynamically monitor and establish the distribution tree for a normal multicast VLAN This makes it possible to support common multicast services over a wide part of the network without having to use any multicast routing protocol MVR maintains the user isolation and data security provided by VLAN segregation by passing only multicast traffic into other VLANs to which the subscribers belong Even though common multicast streams are passed onto different VLAN groups from the MVR VLAN users in different IEEE 802 1Q or private VLANs cannot exchange any information except through upper level routing services Figure 53 MVR Concept gt x Le _ Ko a Multicast Router Satellite Services eee See Service Network Multicast Server Layer
33. Quality of Service Configuring Port Classification Configuring Port Policiers Configuring Egress Port Scheduler Configuring Egress Port Shaper Configuring Port Remarking Mode Configuring Port DSCP Translation and Rewriting Configuring DSCP based QoS Ingress Classification Configuring DSCP Translation Configuring DSCP Classification Configuring QoS Control Lists Configuring Storm Control Configuring WRED Configuring Congestion Management 155 158 158 159 162 167 170 172 173 174 177 177 179 179 181 182 183 184 186 187 188 188 189 192 193 195 196 198 199 199 204 205 206 CONTENTS Configuring Local Port Mirroring Configuring Remote Port Mirroring Configuring UPnP Configuring sFlow MONITORING THE SWITCH Displaying Basic Information About the System Displaying System Information Displaying CPU Utilization Displaying Log Messages Displaying Log Details Displaying Information About Ports Displaying Port Status On the Front Panel Displaying an Overview of Port Statistics Displaying QoS Statistics Displaying QCL Status Displaying Detailed Port Statistics Displaying Information About Security Settings Displaying Access Management Statistics Displaying Information About Switch Settings for Port Security Displaying Information About Learned MAC Addresses Displaying Port Status for Authentication Services Displaying Port Statistics for 802 1X or Remote Authentication Service Displaying ACL Status Di
34. RMON Statistics RMON History Overview RMON Alarm Overview RMON Event Overview LACP System Status LACP Port Status LACP Port Statistics Loop Protection Status Spanning Tree Bridge Status Spanning Tree Detailed Bridge Status Spanning Tree Port Status Spanning Tree Port Statistics MVR Statistics MVR Group Information MVR SFM Information IGMP Snooping Status IGMP Snooping Group Information IPv4 SFM Information MLD Snooping Status MLD Snooping Group Information IPv6 SFM Information LLDP Neighbor Information 16 226 228 229 231 232 233 237 238 240 241 242 242 243 247 249 250 251 251 252 253 254 254 257 257 258 259 260 261 261 263 263 264 265 266 267 268 Figure 140 Figure 141 Figure 142 Figure 143 Figure 144 Figure 145 Figure 146 Figure 147 Figure 148 Figure 149 Figure 150 Figure 151 Figure 152 Figure 153 Figure 154 Figure 155 Figure 156 Figure 157 LLDP MED Neighbor Information LLDP Neighbor PoE Information LLDP Neighbor EEE Information LLDP Port Statistics Power over Ethernet Status MAC Address Table Showing VLAN Members Showing VLAN Port Status Showing MAC based VLAN Membership Status Showing sFlow Statistics ICMP Ping VeriPHY Cable Diagnostics Restart Device Factory Defaults Software Upload Software Image Selection Configuration Save Configuration Upload 17 FIGURES 271 272 273 275 276 277 278 279 280 282 284 2
35. Security Network DHCP Snooping Statistics PARAMETERS These parameters are displayed Rx Tx Discover The number of discover option 53 with value 1 packets received and transmitted Rx Tx Offer The number of offer option 53 with value 2 packets received and transmitted Rx Tx Request The number of request option 53 with value 3 packets received and transmitted Rx Tx Decline The number of decline option 53 with value 4 packets received and transmitted Rx Tx ACK The number of ACK option 53 with value 5 packets received and transmitted Rx Tx NAK The number of NAK option 53 with value 6 packets received and transmitted Rx Tx Release The number of release option 53 with value 7 packets received and transmitted Rx Tx Inform The number of inform option 53 with value 8 packets received and transmitted Rx Tx Lease Query The number of lease query option 53 with value 10 packets received and transmitted Rx Tx Lease Unassigned The number of lease unassigned option 53 with value 11 packets received and transmitted Rx Tx Lease Unknown The number of lease unknown option 53 with value 12 packets received and transmitted Rx Tx Lease Active The number of lease active option 53 with value 13 packets received and transmitted WEB INTERFACE To display DHCP Snooping Port Statistics iP 2 Click Monitor Security Network DHOP Snooping Statistics Select a port from
36. The precise terms and conditions for copying distribution and modification follow 301 APPENDIX C License Information The GNU General Public License GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 1 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a work containing the Program or a portion of it either verbatim or with modifications and or translated into another language Hereinafter translation is included without limitation in the term modification Each licensee is addressed as you Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running the Program is not restricted and the output from the Program is covered only if its contents constitute a work based on the Program independent of having been made by running the Program Whether that is true depends on what the Program does You may copy and distribute verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice
37. User Datagram Protocol UDP provides a datagram mode for packet switched communications It uses IP as the underlying transport mechanism to provide access to IP like services UDP packets are delivered just like IP packets connection less datagrams that may be discarded before reaching their targets UDP is useful when TCP would be too complex too slow or just unnecessary Universal Time Coordinate UTC is a time scale that couples Greenwich Mean Time based solely on the Earth s rotation rate with highly accurate atomic time The UTC does not have daylight saving time Virtual LAN A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network A VLAN serves as a logical workgroup with no physical barriers and allows users to share information and resources as though located on the same LAN 7 311 GLOSSARY S12 INDEX A acceptable frame type 175 Access Control List See ACL ACL 96 binding to a port 96 address table 170 aging time 171 address management access 31 ARP inspection 114 B BPDU guard 137 shut down port on receipt 137 broadcast storm threshold 204 C community string 69 72 configuration files restoring 290 restoring defaults 290 saving 290 configuration settings restoring 290 saving 290 saving or restoring 290 congestion management based on destination port loading 206 control
38. assigning all VoIP traffic to a single Voice VLAN The use of a Voice VLAN has several advantages It provides security by isolating the VoIP traffic from other data traffic End to end QoS policies and high priority can be applied to VoIP VLAN traffic across the network guaranteeing the bandwidth it needs VLAN isolation also protects against disruptive broadcast and multicast traffic that can seriously affect voice quality The switch allows you to specify a Voice VLAN for the network and set a service priority for the VoIP traffic VoIP traffic can be detected on switch ports by using the source MAC address of packets or by using LLDP IEEE 802 1ab to discover connected VoIP devices When VoIP traffic is detected on a configured port the switch automatically assigns the port as a tagged member the Voice VLAN Alternatively switch ports can be manually configured 183 CHAPTER 4 Configuring the Switch Managing VoIP Traffic CONFIGURING VolP Use the Voice VLAN Configuration page to configure the switch for VoIP TRAFFIC traffic First enable automatic detection of VoIP devices attached to the switch ports then set the Voice VLAN ID for the network The Voice VLAN aging time can also be set to remove a port from the Voice VLAN when VoIP traffic is no longer received on the port PATH Advanced Configuration Voice VLAN Configuration PARAMETERS These parameters are displayed Global Configuration Mode Enab
39. messages the trap function must also be enabled and the destination host specified PATH Advanced Configuration Security Switch SNMP System PARAMETERS These parameters are displayed SNMP System Configuration Mode Enables or disables SNMP service Default Disabled 68 CHAPTER 4 Configuring the Switch Configuring Security Version Specifies the SNMP version to use Options SNMP v1 SNMP v2c SNMP v3 Default SNMP v2c Read Community The community used for read only access to the SNMP agent Range 0 255 characters ASCII characters 33 126 only Default public This parameter only applies to SNMPv1i and SNMPv2c SNMPv3 uses the User based Security Model USM for authentication and privacy This community string is associated with SNMPv1 or SNMPv2 clients in the SNMPv3 Communities table page 72 Write Community The community used for read write access to the SNMP agent Range 0 255 characters ASCII characters 33 126 only Default private This parameter only applies to SNMPv1 and SNMPv2c SNMPv3 uses the User based Security Model USM for authentication and privacy This community string is associated with SNMPv1 or SNMPv2 clients in the SNMPv3 Communities table page 72 Engine ID The SNMPv3 engine ID Range 10 64 hex digits excluding a string of all 0 s or all F s Default 800007e5017f000001 An SNMPv3 engine is an independent SNMP agent that resides on the switch This engi
40. mirroring remote traffic 208 multicast storm threshold 204 speed 55 unknown unicast storm threshold 204 power reduction configuring 54 EEE 54 problems troubleshooting 299 protocol VLANs 179 configuring 179 configuring groups 179 configuring interfaces 181 group configuration 179 interface configuration 181 public key 64 Q QCE quality control list entry 200 INDEX QCL status monitoring 225 QoS 187 class 188 control lists 199 drop precedence 188 DSCP classification 199 DSCP rewriting 195 DSCP translation 195 198 egress port scheduler 189 ingress classification 196 ingress port classification 188 port classification 188 port policier 188 port remarking 193 port shaper 190 192 QCE 200 QCL status 225 queue scheduler 190 R RADIUS logon authentication 118 settings 117 118 Random Early Detectionl See WRED remote logging 53 restarting the system 287 RMON 77 alarm setting thresholds 80 response to alarm setting 82 statistics history collection 78 statistics collection 78 RSTP 127 global settings displaying 129 132 interface settings 135 settings configuring 129 132 S secure shell 64 configuration 64 security configuring 57 sFlow flow information displaying 280 flow sampling 214 Simple Network Management Protocol See SNMP SNMP 67 community string 69 72 enabling traps 69 filtering IP addresses 66 trap destination 69 trap manager 69 SNMPv3 engine identifier local 69 engine identifier
41. of forwarding 187 CHAPTER 4 Configuring the Switch Quality of Service CONFIGURING PORT CLASSIFICATION CONFIGURING PORT POLICIERS Use the QoS Ingress Port Classification page to set the basic QoS parameters for a port including the default traffic class DP level IEEE 802 1p and DSCP based QoS classification PATH Advanced Configuration QoS Port Classification PARAMETERS These parameters are displayed QoS Ingress Port Classification Port Port identifier QoS class Controls the default QoS class i e the QoS class for frames not classified in any other way There is a one to one mapping between QoS class queue and priority A QoS class of 0 zero has the lowest priority Range 0 7 Default 0 DP level Controls the default drop priority for frames not classified in any other way Range 0 1 Default 0 DSCP Based Click to Enable DSCP Based QoS Ingress Port Classification see page 196 WEB INTERFACE To set the basic QoS parameters for a port 1 Click Advanced Configuration QoS Port Classification 2 Set any of the ingress port QoS classification parameters 3 Click Save Figure 75 Configuring Ingress Port QoS Classification QoS Ingress Port Classification Port QoS class DP level DSCP Based s e o gt 1 2 3 4 5 Use the QoS Ingress Port Policers page to limit the bandwidth of frames entering the ingress queue This function allows the network manag
42. of the remote link partner s respective values When a local link partner receives its echoed values from the remote link partner it can determine whether or not the remote link partner has received registered and processed its most recent values For example if the local link partner receives echoed parameters that do not match the values in its local MIB then the local link partner infers that the remote link partner s request was based on stale information Echo Rx Tw The link partner s Echo Rx Tw value Resolved Tx Tw The resolved Tx Tw for this link not the link partner The resolved value that is the actual tx wakeup time used for this link based on EEE information exchanged via LLDP Resolved Rx Tw The resolved Rx Tw for this link not the link partner The resolved value that is the actual tx wakeup time used for this link based on EEE information exchanged via LLDP EEE in Sync Shows whether the switch and the link partner have agreed on wake times Red Switch and link partner have not agreed on wakeup times a Green Switch and link partner have agreed on wakeup times WEB INTERFACE To display LLDP neighbor EEE information click Monitor LLDP EEE Figure 142 LLDP Neighbor EEE Information LLDP Neighbors EEE Information Auto refresh Refresh Rx Tw Fallback Receive Tw Echo Tx Tw Echo Rx Tw Resolved Tx Tw Resolved Rx Tw EEE in Sync No LLDP EEE information found
43. remote 73 groups 74 user configuration 73 views 75 g5 s INDEX software displaying version 219 downloading 288 Spanning Tree Protocol See STA specifications software 295 SSH 64 configuring 64 server configuring 64 STA 127 BPDU shutdown 137 edge port 137 global settings displaying 129 132 interface settings 135 link type 138 path cost 136 139 port priority 136 139 transmission hold count 131 transmission limit 131 standards IEEE 297 static addresses setting 171 statistics port 224 STP 129 130 global settings displaying 132 settings configuring 132 STP Also see STA summer time setting 51 switch settings restoring 290 saving 290 system clock setting 50 setting the time zone 51 summer time setting 51 system information configuring 45 displaying 219 system logs 221 displaying 221 system software alternate image 289 downloading 288 T TACACS logon authentication 61 118 settings 117 118 Telnet SSH filtering IP addresses 66 throttling IGMP 148 MLD 155 throttling IGMP 155 time zone setting 51 time setting 50 trap destination 69 trap manager 69 troubleshooting 299 trunk configuration 120 123 LACP 123 static 120 Type Length Value See LLDP TLV See LLDP MED TLV U unknown unicast storm threshold 204 upgrading software 288 UPnP advertisements 214 configuration 213 enabling advertisements 214 user account 58 name 58 password 58 V VLANS acceptable frame type 1
44. the switch sends EAPOL Request Identity frames using the BPDU multicast MAC address as the destination to wake up any supplicants that might be on the port The maximum number of supplicants that can be attached to a port can be limited using the Port Security Limit Control functionality MAC based Auth Enables MAC based authentication on the port The switch does not transmit or accept EAPOL frames on the port Flooded frames and broadcast traffic will be transmitted on the port whether or not clients are authenticated on the port whereas unicast traffic from an unsuccessfully authenticated client will be dropped Clients that are not or not yet successfully authenticated will not be allowed to transmit frames of any kind The switch acts as the supplicant on behalf of clients The initial frame any kind of frame sent by a client is snooped by the switch which in turn uses the client s MAC address as both user name and 93 CHAPTER 4 Configuring the Switch Configuring Security password in the subsequent EAP exchange with the RADIUS server The 6 byte MAC address is converted to a string on the following form XXx XX XX XX XX XX that is a dash is used as separator between the lower cased hexadecimal digits The switch only supports the MD5 Challenge authentication method so the RADIUS server must be configured accordingly When authentication is complete the RADIUS server sends a success or failure indic
45. 0 DPL Drop Precedence Level to which the corresponding DSCP value is classified for ingress processing Range 0 1 where 1 is the higher drop priority Default 0 WEB INTERFACE To configure DSCP based QoS ingress classification settings 1 2 3 Click Advanced Configuration QoS DSCP Based QoS Specify whether the DSCP value is trusted and set the corresponding QoS value and DP level used for ingress processing Click Save Figure 83 Configuring DSCP based QoS Ingress Classification DSCP Based QoS Ingress Classification Auto refresh L ose rece O BE 1 2 3 4 5 6 7 16 CS2 0 0 0 0 0 0 0 0 C51 0 0 0 D 0 0 0 0 v v v r Oy CHAPTER 4 Configuring the Switch Quality of Service CONFIGURING DSCP Use the DSCP Translation page to configure DSCP translation for ingress TRANSLATION traffic or DSCP re mapping for egress traffic PATH Advanced Configuration QoS DSCP Translation PARAMETERS These parameters are displayed DSCP DSCP value Range 0 63 Ingress Translate Enables ingress translation of DSCP values based on the specified classification method Ingress Classify Enable Classification at ingress side as defined in the QoS Port DSCP Configuration table see page 195 Egress Remap Re maps the selected DSCP value WEB INTE
46. 0 0 0 2 0 3 0 4 0 5 0 282 PERFORMING BASIC DIAGNOSTICS This chapter describes how to test network connectivity using Ping for IPv4 or IPv6 and how to test network cables PINGING AN IPv4 or IPv6 ADDRESS The Ping page is used to send ICMP echo request packets to another node on the network to determine if it can be reached PATH Diagnostics Ping Diagnostics Ping6 PARAMETERS These parameters are displayed on the Ping page IP Address IPv4 or IPv6 address of the host An IPv4 address consists of 4 numbers 0 to 255 separated by periods An IPv6 address consists of 8 colon separated 16 bit hexadecimal values One double colon may be used in the address to indicate the appropriate number of zeros required to fill the undefined fields Ping Length The payload size of the ICMP packet Range 2 1452 bytes Ping Count The number of ICMP packet to send Range 1 60 Ping Interval The interval at which to send ICMP packets Range 0 30 seconds WEB INTERFACE To ping another device on the network 1 2 Click Diagnostics Ping or Ping6 Enter the IP address of the target device Specify the packet size count and interval Click Start 263 CHAPTER 6 Performing Basic Diagnostics Pinging an IPv4 or IPv6 Address After you press Start the sequence number and round trip time are displayed upon reception of a reply The page refreshes automatically until re
47. 2 Switch Source J Port l MZ Receiver Ports Set top Box Set top Box Fc dE dEV m Use the MVR Configuration page to enable MVR globally on the switch select the VLAN that will serve as the sole channel for common multicast streams supported by the service provider and to configure each interface that participates in the MVR protocol as a source port or receiver port PATH Advanced Configuration MVR COMMAND USAGE General Configuration Guidelines for MVR 1 Enable MVR globally on the switch and select the MVR VLAN 140 CHAPTER 4 Configuring the Switch Multicast VLAN Registration 2 Set the interfaces that will join the MVR as source ports or receiver ports 3 If you are sure that only one subscriber attached to an interface is receiving multicast services you can enable the immediate leave function Although MVR operates on the underlying mechanism of IGMP snooping the two features operate independently of each other One can be enabled or disabled without affecting the behavior of the other However if IGMP snooping and MVR are both enabled MVR reacts only to join and leave messages from multicast groups configured under MVR Join and leave messages from all other multicast groups are managed by IGMP snooping Also note that only IGMP version 2 or 3 hosts can issue multicast leave messages Immediate leave therefore cannot be used for IGMP version 1 clients PARAMETERS These paramete
48. Access Management 2 Set the Mode to Enabled 3 Click Add new entry 4 Enter the start and end of an address range 66 USING SIMPLE NETWORK MANAGEMENT PROTOCOL CHAPTER 4 Configuring the Switch Configuring Security 5 Mark the protocols to restrict based on the specified address range The following example shows how to restrict management access for all protocols to a specific address range 6 Click Save Figure 18 Access Management Configuration Access Management Configuration mode Disabled v Start IP Address End IP Address HTTP HTTPS SNMP TELNET SSH Add new entry Simple Network Management Protocol SNMP is a communication protocol designed specifically for managing devices on a network Equipment commonly managed with SNMP includes switches routers and host computers SNMP is typically used to configure these devices for proper operation in a network environment as well as to monitor them to evaluate performance or detect potential problems Managed devices supporting SNMP contain software which runs locally on the device and is referred to as an agent A defined set of variables known as managed objects is maintained by the SNMP agent and used to manage the device These objects are defined in a Management Information Base MIB that provides a standard presentation of the information controlled by the agent SNMP defines both the format of the MIB specifications and th
49. Aggregation 5 amp Debug 15 Diagnostics 5 amp DualCPU 5 iv 5 E 5 v IPMC_Snooping 5 wl LACP 5 LLDP 5 LLDP_MED 5 MAC_Table 5 MVR 5 E Maintenance 15 i jn 10 10 4 10 10 4 10 y 10 10 10 15 7 10 10 10 10 10 4 10 y 10 10 10 10 10 v 10 4 10 4 10 m aja an aia an MEME IEI a alfalfa cacao Mirroring 5 lv POE 5 lv Port_Security 5 E Ports 5 Private_VLANs QoS SNMP Security oa a n S 41 114 Spanning_Tree System UPnP YCL VLANs Voice VLAN ele ey EIEII Use the Authentication Method Configuration page to specify the authentication method for controlling management access through the console Telnet SSH or HTTP HTTPS Access can be based on the local user name and password configured on the switch or can be controlled with a RADIUS or TACACS remote access authentication server Note that the RADIUS servers used to authenticate client access for IEEE 802 1X port authentication are also configured on this page see page 85 Remote Authentication Dial in User Service RADIUS and Terminal Access Controller Access Control System Plus TACACS are logon authentication protocols that use software running on a central server to control access to RADIUS aware or TACACS aware devices on the network An authentication server contains a database of multiple user name password pairs wit
50. Auto refresh I _ Refresh Start from VLAN 1 with 20 entries per page lt lt gt gt Port Members T T VLAN ID 1 2 3 4 5 6 7 8 9 10 11 42 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 1 SEC CCR RTP ERRAR F F 2 BMOOMDOOOOOOODOOOOOOOOOOOOOOOOOOOoOOOOoOOoOooOoOo00000H Use the VLAN Port Status page to show the VLAN attributes of port members for all VLANs configured by a selected software module including PVID VLAN aware ingress filtering frame type egress filtering and UVID Refer to the preceding section for a description of the software modules that use VLAN management services PATH Monitor VLANs VLAN Port PARAMETERS These parameters are displayed VLAN User A software module that uses VLAN management services to configure VLAN membership and VLAN port settings such as the PVID or untagged VLAN ID Refer to the preceding section for a description of the software modules that use VLAN management services Port Port Identifier PVID The native VLAN assigned to untagged frames entering this port Port Type Shows whether or not a port processes the VLAN ID in ingress frames Aware or Unaware If a port is not VLAN aware all frames are assigned to the default VLAN as specified by the Port VLAN ID and tags are not removed If a port is VLAN aware each fra
51. Disabled Disabled Disabled Discard z Disabled Discard Disabled Discard Disabled Discard Disabled Discard Disabled Discard Disabled Configured Current Rx Current Tx Configured 4aii a il ajja 4jlajl a 4 dit z 4 ii 4 4 x KKKKKKKK KKK KKK KKK KKK KKKKKKKKK KKK KKK qo vit t g CONFIGURING SECURITY You can configure this switch to authenticate users logging into the system for management access or to control client access to the data ports Management Access Security Switch menu Management access to the switch can be controlled through local authentication of user names and passwords stored on the switch or remote authentication of users via a RADIUS or TACACS server Additional authentication methods includes Secure Shell SSH Secure Hypertext Transfer Protocol HTTPS over the Secure Socket Layer SSL static configuration of client addresses and SNMP General Security Measures Network menu This switch supports many methods of segregating traffic for clients attached to each of the data ports and for ensuring that only authorized clients gain access to the network Private VLANs and port based authentication using IEEE 802 1X are commonly used for these purposes In addition to these methods several other options of providing client security are supported by this switch These include limiting the number of users accessing a port The 57
52. Displays status of configured RADIUS authentication and 243 Overview accounting servers RADIUS Details Displays the traffic and status associated with each 244 configured RADIUS server Switch RMON Remote Monitoring 247 Statistics Shows sampled data for each entry in the statistics group 247 History Shows sampled data for each entry in the history group 249 Alarm Shows all configured alarms 250 Event Shows all logged events 291 LACP Link Aggregation Control Protocol 252 System Status Displays administration key and associated local ports for 252 each partner Port Status Displays administration key LAG ID partner ID and partner 252 ports for each local port Port Statistics Displays statistics for LACP protocol messages 253 Loop Protection i settings current status and time of last detected 254 Spanning Tree 255 Bridge Status Displays global bridge and port settings for STA 295 Port Status Displays STA role state and uptime for each port 257 Port Statistics Displays statistics for RSTP STP and TCN protocol packets 258 MVR Multicast VLAN Registration 259 Statistics Shows statistics for IGMP protocol messages used by MVR 259 MVR Channel Shows information about the interfaces associated with 260 Groups multicast groups assigned to the MVR VLAN MVR SFM Displays MVR Source Filtered Multicast information including 261 Information group filtering mode include or exclude source address and type allow or deny IPMC IP Multica
53. Dynamic ARP Inspection on a given port Only when both Global Mode and Port Mode on a given port are enabled will ARP Inspection be enabled on a given port Default Disabled WEB INTERFACE To configure global and port settings for ARP Inspection 1 Click Advanced Configuration Security Network ARP Inspection Configuration 2 Enable ARP inspection globally and on any ports where it is required 3 Click Save Figure 39 Configuring Global and Port Settings for ARP Inspection ARP Inspection Configuration mode Disabled z Translate dynamic to static Port Mode Configuration 1 Disabled 2 Disabled v 3 Disabled v 4 Disabled 7 Disabled CONFIGURING STATIC BINDINGS FOR ARP INSPECTION Use the Static ARP Inspection Table to bind a static address to a port Table entries include a port identifier VLAN identifier source MAC address in ARP request packets and source IP address in ARP request packets ARP Inspection uses the DHCP snooping bindings database for the list of valid IP to MAC address bindings Static ARP entries take precedence over entries in the DHCP snooping bindings database The switch first compares ARP packets to any entries specified in the static ARP table If no static entry matches the packets then the DHCP snooping bindings database determines their validity PATH Advanced Configuration Security Network ARP Inspection Static Table PARAMETERS These parameters are display
54. Group Name The name assigned to the Protocol VLAN Group This name must be a unique 16 character long string which consists of a combination of alphabetic characters a z or A Z or integers 0 9 Note Traffic which matches IP Protocol Ethernet Frames is mapped to the VLAN VLAN 1 by default that has been configured with the switch s administrative IP IP Protocol Ethernet traffic must not be mapped to another VLAN or you will lose administrative network connectivity to the switch If lost in this manner network access can be regained by using the Reset button to restore the factory default settings WEB INTERFACE To configure a protocol group 1 Click Configuration VCL Protocol based VLANs Protocol to Group 2 Click add new entry 3 Fill in the frame type value and group name 4 Click Save Figure 70 Configuring Protocol VLANs Protocol to Group Mapping Table Auto refresh Refresh Ethernet Etype 0x 0800 180 CHAPTER 4 Configuring the Switch Protocol VLANs MAPPING PROTOCOL Use the Group Name to VLAN Mapping Table to map a protocol group to a GRouPS TO Ports VLAN for each interface that will participate in the group PATH Advanced Configuration VCL Protocol based VLANs Group to VLAN COMMAND USAGE When creating a protocol based VLAN only assign interfaces using this configuration screen If you assign interfaces using any of the other VLAN menus such as the VLAN Static tab
55. IGMP querier Host Version IGMP version used when used by this switch when serving as a host in IGMP proxy mode Querier Status Shows the Querier status as ACTIVE or IDLE When enabled the switch can serve as the Querier which is responsible for asking hosts if they want to receive multicast traffic Querier Transmitted The number of transmitted Querier messages Querier Received The number of received Querier messages V1 Reports Received The number of received IGMP Version 1 reports V2 Reports Received The number of received IGMP Version 2 reports V3 Reports Received The number of received IGMP Version 3 reports V2 Leaves Received The number of received IGMP Version 2 leave reports Router Port Port Port Identifier Status Ports connected to multicast routers may be dynamically discovered by this switch or statically assigned to an interface on this switch 262 CHAPTER 5 Monitoring the Switch Showing IGMP Snooping Information WEB INTERFACE To display IGMP snooping status information click Monitor IGMP Snooping Status Figure 133 IGMP Snooping Status IGMP Snooping Status Auto refresh Refresh Clear Statistics VLAN Querier Host Querier Queries Queries V1 Reports V2 Reports V3 Reports V2 Leaves ID Version Version Status Transmitted Received Received Received Received Received Router Port 1 2 3 4 5
56. MAC based authentication are globally enabled or disabled on the switch If globally disabled all ports are allowed to forward frames Reauthentication Enabled Sets clients to be re authenticated after an interval specified by the Re authentication Period Re authentication can be used to detect if a new device is plugged into a switch port Default Disabled For MAC based ports reauthentication is only useful if the RADIUS server configuration has changed It does not involve communication 87 amp CHAPTER 4 Configuring the Switch Configuring Security between the switch and the client and therefore does not imply that a client is still present on a port see Age Period below Reauthentication Period Sets the time period after which a connected client must be re authenticated Range 1 3600 seconds Default 3600 seconds EAPOL Timeout Sets the time the switch waits for a supplicant response during an authentication session before retransmitting a Request Identify EAPOL packet Range 1 255 seconds Default 30 seconds Aging Period The period used to calculate when to age out a client allowed access to the switch through Single 802 1X Multi 802 1X and MAC based authentication as described below Range 10 1000000 seconds Default 300 seconds When the NAS module uses the Port Security module to secure MAC addresses the Port Security module needs to check for activity on the MAC address in question at
57. Membership Status for User Static Static Auto efresh Refresh Port Members t r yy MAC Address VLAN ID 1 2 3 4 5 6 7 8 9 10 41 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 pem No data exists for the user DISPLAYING INFORMATION ABOUT FLOW SAMPLING Use the sFlow Statistics page to display information on sampled traffic including the owner receiver address remaining sampling time and statistics for UDP control packets and sampled traffic PATH Monitor sFlow 260i CHAPTER 5 Monitoring the Switch Displaying Information About Flow Sampling PARAMETERS These parameters are displayed Receiver Statistics Owner This field shows the current owner of the sFlow configuration It assumes one of three values as follows If sFlow is currently unconfigured unclaimed Owner shows lt none gt If sFlow is currently configured through Web Owner shows lt Configured through local management gt If sFlow is currently configured through SNMP Owner shows a string identifying the sFlow receiver IP Address Hostname The IP address or host name of the sFlow receiver Timeout The number of seconds remaining before sampling stops and the current sFlow owner is released Tx Successes The number of UDP datagrams successfully sent to the sFlow receiver Tx Errors The number of UDP datagrams that has
58. Monitoring the Switch Displaying MVR Information DISPLAYING MVR GROUP INFORMATION IGMPvi Joins Received Number of received IGMPv1 Joins IGMPv2 MLDv1 Reports Received Number of received IGMPv2 Joins and MLDv1 Reports respectively IGMPv3 MLDv2 Reports Received Number of received IGMPvi Joins and MLDv2 Reports respectively IGMPv2 MLDvi Leaves Received Number of received IGMPv2 Leaves and MLDv1 Dones respectively WEB INTERFACE To display information for MVR statistics click Monitor MVR Statistics Figure 130 MVR Statistics MVR Statistics Auto refresh Refresh Clear IGMP MLD IGMP MLD IGMPv1 IGMPv2 MLDv1 IGMPv3 MLDv2 IGMPv2 MLDv1 VLAN ID Queries Received Queries Transmitted Joins Received Reports Received Reports Received Leaves Received 2 0 0 0 0 0 0 0 0 0 0 0 Use the MVR Group Information page to display statistics for IGMP protocol messages used by MVR and to shows information about the interfaces associated with multicast groups assigned to the MVR VLAN PATH Monitor MVR Group Information PARAMETERS These parameters are displayed Statistics VLAN ID Identifier of the VLAN that serves as the channel for streaming multicast services using MVR Vi Reports Received The number of IGMP V1 reports received V2 Reports Received The number of IGMP V2 reports received V3 Reports Received The number of IGMP V3 reports received 6 V2 Leaves Receiv
59. STP RSTP and MSTP 129 also configures edge port settings for BPDU filtering BPDU guard and port error recovery MSTI Mapping Maps VLANs to a specific MSTP instance 132 MSTI Priorities Configures the priority for the CIST and each MISTI 134 CIST Ports Configures interface settings for STA 135 MSTI Ports Configures interface settings for an MST instance 138 MAC Table Configures address aging dynamic learning and static 170 addresses VLANs Virtual LANs 172 VLAN Membership Configures VLAN groups 173 Ports Specifies default PVID and VLAN attributes 174 Mirroring amp RSPAN Sets source and target ports for local or remote mirroring 207 Advanced Configuration System2 Information Configures system contact name and location 45 IP Configures IPv4 and SNTP settings 46 IPv6 Configures IPv6 and SNTP settings 48 NTP Enables NTP and configures a list of NTP servers 50 Time Configures the time zone and daylight savings time 5i Log Configures the logging of messages to a remote logging 53 process specifies the remote log server and limits the type of system log messages sent Power Reduction 54 EEE Configures Energy Efficient Ethernet for specified queues 54 and specifies urgent queues which are to transmit data after maximum latency expires regardless queue length Ports2 Configures port connection settings 55 Security 57 Switch 57 Users Configures user names passwords and access levels 58 Privilege Levels Configures privilege level for specific fu
60. This is only possible if the Authentication Method is set to something else than none or local WEB INTERFACE To configure authentication for management access 1 2 3 Click Advanced Configuration Security Switch Auth Method Configure the authentication method for management client types and specify whether or not to fallback to local authentication if no remote authentication server is available Click Save Figure 15 Authentication Method for Management Access Authentication Method Configuration Authentication Method Fallback telnet local bd la ssh local E B E web local Reset 63 CHAPTER 4 Configuring the Switch Configuring Security CONFIGURING SSH Use the SSH Configuration page to configure access to the Secure Shell SSH management interface SSH provides remote management access to this switch as a secure replacement for Telnet When the client contacts the switch via the SSH protocol the switch generates a public key that the client uses along with a local user name and password for access authentication SSH also encrypts all data transfers passing between the switch and SSH enabled management station clients and ensures that data traveling over the network arrives unaltered PATH Advanced Configuration Security Switch SSH USAGE GUIDELINES You need to install an SSH client on the management station to access the switch for management via the SSH p
61. WEB INTERFACE To display statistics for configured authentication and accounting servers click Monitor Security AAA RADIUS Details Figure 117 RADIUS Details RADIUS Authentication Statistics for Server 1 Server 1 T Auto refresh l Refresh Clear Receive Packets Transmit Packets Access Accepts 0 Access Requests Access Rejects 0 Access Retransmissions Access Challenges 0 Pending Requests Malformed Access Responses 0 Timeouts Bad Authenticators 0 Unknown Types 0 Packets Dropped 0 Other Info 0 0 0 0 1812 State Disabled Round Trip Time Oms RADIUS Accounting Statistics for Server 1 Receive Packets Transmit Packets Responses 0 Requests Malformed Responses 0 Retransmissions Bad Authenticators 0 Pending Requests Unknown Types 0 Timeouts Packets Dropped 0 Other Info 0 0 0 0 1813 State Disabled Round Trip Time 0 ms DISPLAYING INFORMATION ON RMON DISPLAYING RMON STATISTICS Use the monitor pages for RMON to display information on RMON statistics alarms and event responses Use the RMON Statistics Status Overview page to view a broad range of interface statistics including a total count of different frame types and sizes passing through each port All values displayed have been accumulated since the last system reboot and are shown as counts per second Statistics are refreshed every 60 seconds by default PATH Monitor Security Switch RMON Statistics 247 CHAPTER 5 Monitoring the Switch Displaying
62. a hash algorithm to calculate an output link number in the trunk However depending on the device to which a trunk is connected and the traffic flows in the network this load balance algorithm may result in traffic being distributed mostly on one port in a trunk To ensure that the switch traffic load is distributed evenly across all links in a trunk the hash method used in the load balance calculation can be selected to provide the best result for trunk connections The switch provides four load balancing modes as described in the following section Aggregation Mode Configuration also applies to LACP see Configuring LACP on page 123 PARAMETERS These parameters are displayed Aggregation Mode Configuration Hash Code Contributors Selects the load balance method to apply to all trunks on the switch If more than one option is selected each factor is used in the hash algorithm to determine the port member within the trunk to which a frame will be assigned The following options are supported Source MAC Address All traffic with the same source MAC address is output on the same link in a trunk This mode works best for switch to switch trunk links where traffic through the switch is received from many different hosts One of the defaults Destination MAC Address All traffic with the same destination MAC address is output on the same link in a trunk This mode works best for switch to switch trunk links where traffic t
63. adjust the control frame transmission interval and shutdown time as required Enable loop protection for the port to be monitored set the response to take is a loop is detected and select whether or not the port will actively transmit control frames Click Save Figure 44 Loop Protection Configuration Loop Protection Configuration General Settings Global Configuration Enable Loop Protection Disable gt Shutdown Time 180 seconds Port Configuration Pereme ten ete ad lt gt xj lt gt X aa XI aa XI 126 CHAPTER 4 Configuring the Switch Configuring the Spanning Tree Algorithm CONFIGURING THE SPANNING TREE ALGORITHM The Spanning Tree Algorithm STA can be used to detect and disable network loops and to provide backup links between switches bridges or routers This allows the switch to interact with other bridging devices that is an STA compliant switch bridge or router in your network to ensure that only one route exists between any two stations on the network and provide backup links which automatically take over when a primary link goes down The spanning tree algorithms supported by this switch include these versions STP Spanning Tree Protocol IEEE 802 1D RSTP Rapid Spanning Tree Protocol IEEE 802 1w MSTP Multiple Spanning Tree Protocol IEEE 802 1s STP STP uses a distributed algorithm to select a bridging device STP compliant switch bridge or router tha
64. and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and give any other recipients of the Program a copy of this License along with the Program You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee You may modify your copy or copies of the Program or any portion of it thus forming a work based on the Program and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change b You must cause any work that you distribute or publish that in whole or in part contains or is derived from the Program or any part thereof to be licensed as a whole at no charge to all third parties under the terms of this License c Ifthe modified program normally reads commands interactively when run you must cause it when started running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redistribute the program under these conditions and telling the user how to view a copy of this License Exception if the Program itself is interacti
65. and provide historical information about the event If it cannot connect to the management agent it will continue to perform any specified tasks and pass data back to the management station the next time it is contacted The switch supports mini RMON which consists of the Statistics History Event and Alarm groups When RMON is enabled the system gradually builds up information about its physical interfaces storing this information in the relevant RMON database group A management agent then periodically communicates with the switch using the SNMP protocol However if the switch encounters a critical event it can automatically send a trap message to the management agent which can then respond to the event if so configured 77 CHAPTER 4 Configuring the Switch Configuring Security CONFIGURING RMON STATISTICAL SAMPLES Use the RMON Statistics Configuration page to collect statistics on a port which can subsequently be used to monitor the network for common errors and overall traffic rates PATH Advanced Configuration Security RMON Statistics COMMAND USAGE If statistics collection is already enabled on an interface the entry must be deleted before any changes can be made The information collected for each entry includes drop events input octets packets broadcast packets multicast packets CRC alignment errors undersize packets oversize packets fragments jabbers collisions and frames of various sizes
66. are detected by the switch before power is supplied If the power required by a device exceeds the power budget of the port or the whole switch power is not supplied Ports can be set to one of four power priority levels critical high medium or low To control the power supply within the switch s budget ports set at critical to medium priority have power enabled in preference to those ports set at low priority For example when a device connected to a port is set to critical priority the switch supplies the required power if necessary by denying power to ports set for a lower priority during bootup Note For more information on using the PoE provided by this switch refer to the Installation Guide PATH Advanced Configuration PoE PARAMETERS These parameters are displayed Reserved Power determined by There are three modes for configuring how the ports or attached Powered Devices PD may reserve power Class Each port automatically determines how much power to reserve according to the class to which the connected PD belongs 168 CHAPTER 4 Configuring the Switch Power over Ethernet and reserves power accordingly Four different port classes exist including 4 7 15 4 or 34 2 Watts In this mode the Maximum Power fields have no effect Allocation The amount of power that each port may reserve is specified The allocated reserved power for each port PD is specified in the Maximum Power fields
67. are matched in static entries for a given port Default Unlimited WEB INTERFACE To set the IP Source Guard filter for ports 1 Click Advanced Configuration Security Network IP Source Guard Configuration 2 Enable or disable IP Source Guard globally and for any given ports 3 Set the maximum number of dynamic clients for any port 4 Click Save 1 dae CHAPTER 4 Configuring the Switch Configuring Security Figure 37 Configuring Global and Port based Settings for IP Source Guard IP Source Guard Configuration Mode Disabled z Translate dynamic to static Port Mode Configuration rg Max Dynamic Clients lt gt vil lt gt 7 1 Disabled Unlimited Z 2 Disabled Uniimited 2 3 Disabled gt Unlimited z 4 Disabled z Unlimited 5 Disabled Uniimited CONFIGURING STATIC BINDINGS FOR IP SOURCE GUARD Use the Static IP Source Guard Table to bind a static address to a port Table entries include a port identifier VLAN identifier IP address and subnet mask All static entries are configured with an infinite lease time PATH Advanced Configuration Security Network IP Source Guard Static Table COMMAND USAGE Static addresses entered in the source guard binding table are automatically configured with an infinite lease time Dynamic entries learned via DHCP snooping are configured by the DHCP server itself Static bindings are processed as follows If there is no entry
68. classes and allows switches to transmit packets based on the tagged priority value An IEEE standard for the Multiple Spanning Tree Protocol MSTP which provides independent spanning trees for VLAN groups An IEEE standard for the Rapid Spanning Tree Protocol RSTP which reduces the convergence time for network topology changes to about 10 of that required by the older IEEE 802 1D STP standard Now incorporated in IEEE 802 1D 2004 Port Authentication controls access to the switch ports by requiring users to first enter a user ID and password for authentication Defines frame extensions for VLAN tagging Defines Ethernet frame start stop requests and timers used for flow control on full duplex links Now incorporated in IEEE 802 3 2002 Internet Group Management Protocol A protocol through which hosts can register with their local router for multicast services If there is more than one multicast switch router on a given subnetwork one of the devices is made the querier and assumes responsibility for keeping track of group membership 307 GLOSSARY IGMP QUERY IGMP PROXY IGMP SNOOPING IN BAND MANAGEMENT IP MULTICAST FILTERING IP PRECEDENCE LACP LAYER 2 LINK AGGREGATION LLDP On each subnetwork one IGMP capable device will act as the querier that is the device that asks all hosts to report on the IP multicast groups they wish to join or to which they already belong The elected querier
69. either a service host or a neighbor running MLD snooping Fast Leave does not apply to a port if the switch has learned that a multicast router is attached to it Fast Leave can improve bandwidth usage for a network which frequently experiences many MLD host add and leave requests Throttling Limits the number of multicast groups to which a port can belong Range 1 10 Default unlimited MLD throttling sets a maximum number of multicast groups that a port can join at the same time When the maximum number of groups is reached on a port any new MLD listener reports will be dropped WEB INTERFACE To configure global and port related settings for MLD Snooping 1 Click Configuration IPMC MLD Snooping Basic Configuration 2 Adjust the MLD settings as required 3 Click Save Figure 59 Configuring Global and Port related Settings for MLD Snooping MLD Snooping Configuration Global Configuration Snooping Enabled Unregistered IPMCv6 Flooding Enabled I MLD SSM Range fe 96 Leave Proxy Enabled Proxy Enabled Port Related Configuration Port Router Port Fast Leave Throttling o m gt xl E unlimited O O unlimited D unlimited 0 r m m unlimited CONFIGURING VLAN Use the MLD Snooping VLAN Configuration page to configure MLD snooping SETTINGS FOR MLD and query for a VLAN interface SNOOPING AND QUERY PATH Advanced Configuration IPMC MLD Snooping VLAN Configuration PARAMETERS
70. failed transmission The most common source of errors is invalid sFlow receiver IP host name configuration To diagnose paste the receiver s IP address host name into the Ping Web page Diagnostics gt Ping Ping6 Flow Samples The total number of flow samples sent to the sFlow receiver Counter Samples The total number of counter samples sent to the sFlow receiver Port Statistics Port Port identifier Rx TX Flow Samples The number of flow samples sent to the sFlow receiver originating from this port Here flow samples are divided into Rx and Tx flow samples where Rx flow samples contain the number of packets that were sampled upon reception ingress on the port and Tx flow samples contains the number of packets that were sampled upon transmission egress on the port Counter Samples The total number of counter samples sent to the sFlow receiver originating from this port 281 CHAPTER 5 Monitoring the Switch Displaying Information About Flow Sampling WEB INTERFACE 1 To display information on sampled traffic click Monitor sFlow Figure 149 Showing sFlow Statistics sFlow Statistics Auto refresh l Refresh Clear Receiver Clear Ports Receiver Statistics Owner lt Configured through local management gt LECU CEEE 192 0 2 99 Timeout Tx Successes Tx Errors Flow Samples Counter Samples Port Statistics Port Rx Flow Samples Tx Flow Samples Counter Samples 1 0 0 0
71. feature should only be enabled for ports connected to an end node device Default Non Edge Auto Edge Controls whether automatic edge detection is enabled on a bridge port When enabled the bridge can determine that a port is at the edge of the network if no BPDU s are received on the port Default Enabled Restricted Role If enabled this causes the port not to be selected as Root Port for the CIST or any MSTI even if it has the best spanning tree priority Such a port will be selected as an Alternate Port after the Root Port has been selected If set this can cause a lack of spanning tree connectivity It can be set by a network administrator to prevent bridges external to a core region of the network influencing the spanning tree active topology possibly because those bridges are not under the full control of the administrator This feature is also know as Root Guard Restricted TCN If enabled this causes the port not to propagate received topology change notifications and topology changes to other ports TCN messages can cause temporary loss of connectivity after changes in a spanning tree s active topology as a result of persistent incorrectly learned station location information TCN messages can be restricted by a network administrator to prevent bridges external to a core region of the network from causing address flushing in that region possibly because those bridges are not under the full control of the administrator
72. frames based on any destination MAC address for unicast broadcast or multicast or based on VLAN ID or VLAN tag priority ACLs can by used to improve performance by blocking unnecessary network traffic or to implement security controls by restricting access to specific network resources or protocols Policies can be used to differentiate service for client ports server ports network ports or guest ports They can also be used to strictly control network traffic by only allowing incoming frames that match the source MAC and source IP on specific port You can manually configure the speed and duplex mode and flow control used on specific ports or use auto negotiation to detect the connection settings used by the attached device Use the full duplex mode on ports whenever possible to double the throughput of switch connections Flow control should also be enabled to control network traffic during periods of congestion and prevent the loss of packets when port buffer thresholds are exceeded The switch supports flow control based on the IEEE 802 3x standard now incorporated in IEEE 802 3 2002 This feature controls the maximum rate for traffic transmitted or received on an interface Rate limiting is configured on interfaces at the edge of a network to limit traffic into or out of the network Traffic that falls within the rate limit is transmitted while packets that exceed the acceptable amount of traffic are dropped The switch can unobtru
73. frequently experiences many IGMP host add and leave requests Throttling Limits the number of multicast groups to which a port can belong Range 1 10 Default unlimited IGMP throttling sets a maximum number of multicast groups that a port can join at the same time When the maximum number of groups is reached on a port any new IGMP join reports will be dropped 148 CHAPTER 4 Configuring the Switch IGMP Snooping WEB INTERFACE To configure global and port related settings for IGMP Snooping 1 Click Configuration IPMC IGMP Snooping Basic Configuration 2 Adjust the IGMP settings as required 3 Click Save Figure 56 Configuring Global and Port related Settings for IGMP Snooping IGMP Snooping Configuration Global Configuration Snooping Enabled Unregistered IPMCv4 Flooding Enabled I IGMP SSM Range 224 0 0 0 32 Leave Proxy Enabled Proxy Enabled Port Related Configuration Port Router Port Fast Leave Throttling m o gt gt 1 D O unlimited 2 r r unlimited 3 m m unlimited 4 D D unlimited 5 m o unlimited gt CONFIGURING VLAN Use the IGMP Snooping VLAN Configuration page to configure IGMP SETTINGS FOR IGMP snooping and query for a VLAN interface SNOOPING AND QUERY PATH Advanced Configuration IPMC IGMP Snooping VLAN Configuration PARAMETERS These parameters are displayed VLAN ID VLAN Identifier Snooping Enabled When enabled the switch will moni
74. from other ports which are not in the same PVLAN Port Isolation can be used to prevent communications between ports within the same PVLAN An isolated port cannot forward any unicast multicast or broadcast traffic to any other ports in the same PVLAN PATH Advanced Configuration Private VLANs Port Isolation PARAMETERS These parameters are displayed Port Number Port identifier WEB INTERFACE To configure isolated ports 1 Click Configuration Private VLANs Port Isolation 2 Mark the ports which are to be isolated from each other 3 Click Save Figure 68 Port Isolation Configuration Port Isolation Configuration Auto sefresh Refresh Port Number 3 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 OH CCOCOOC COD oC Oooo oo co poe co oiBio CONFIGURING MAC BASED VLANS Use the MAC based VLAN Membership Configuration page to configure VLAN based on MAC addresses The MAC based VLAN feature assigns VLAN IDs to ingress untagged frames according to the source MAC addresses When MAC based VLAN classification is enabled untagged frames received by a port are assigned to the VLAN which is mapped to the frame s source MAC address When no MAC address is matched untagged frames are assigned to the receiving port s native VLAN ID PVID PATH Advanced Configuration VCL MAC based VLANs 177 CHAPTER 4 Configuring the Switch Configuring MAC based
75. has indicated that the limit is exceeded No MAC addresses can be learned on the port until it is administratively re opened on the Limit Control configuration Web page MAC Count The two columns indicate the number of currently learned MAC addresses forwarding as well as blocked and the maximum number of MAC addresses that can be learned on the port respectively If no user modules are enabled on the port the Current column will show a dash If the Limit Control user module is not enabled on the port the Limit column will show a dash WEB INTERFACE To display information about switch level settings for the Port Security module click Monitor Security Network Port Security Switch Figure 107 Port Security Switch Status Port Security Switch Status Auto refresh Refresh User Module Legend User Module Name Abbr Limit Control 802 1X DHCP Snooping Voice VLAN Port Status eer Sme 10 1 109 IN ure eme Disabled Disabled Disabled Disabled Disabled DISPLAYING Use the Port Security Port Status page to show the entries authorized by INFORMATION ABOuT port security services including MAC address VLAN ID time added to LEARNED MAC table age and hold state ADDRESSES PATH Monitor Security Network Port Security Port PARAMETERS These parameters are displayed MAC Address The MAC address seen on this port If no MAC addresses are learned a single row stating
76. have IP media capabilities however may or may not be associated with a particular end user Capabilities include all of the capabilities defined for the previous Generic Endpoint Class Class I and are extended to include aspects related to media streaming Example product categories expected to adhere to this class include but are not limited to Voice Media Gateways Conference Bridges Media Servers and similar Discovery services defined in this class include media type specific network layer policy discovery LLDP MED Communication Endpoint Class III Applicable to all endpoint products that act as end user communication appliances supporting IP media Capabilities include all of the capabilities defined for the previous Generic Endpoint Class I 269 CHAPTER 5 Monitoring the Switch Displaying LLDP Information and Media Endpoint Class II classes and are extended to include aspects related to end user devices Example product categories expected to adhere to this class include but are not limited to end user communication appliances such as IP Phones PC based softphones or other communication appliances that directly support the end user Discovery services defined in this class include provision of location identifier including ECS E911 information embedded L2 switch support inventory management Capabilities The neighbor unit s LLDP MED capabilities LLDP MED capabilities Network Policy
77. indicator classification mode for tagged frames and DSCP based QoS classification Controls the bandwidth provided for frames entering the ingress queue of specified ports Provides overview of QoS Egress Port Schedulers including the queue mode and weight also configures egress queue mode queue shaper rate and access to excess bandwidth and port shaper Provides overview of QoS Egress Port Shapers including the rate for each queue and port also configures egress queue mode queue shaper rate and access to excess bandwidth and port shaper Provides overview of QoS Egress Port Tag Remarking also sets the remarking mode classified PCP DEI values default PCP DEI values or mapped versions of QoS class and drop priority Configures ingress translation and classification settings and egress re writing of DSCP values Configures DSCP based QoS ingress classification settings Configures DSCP translation for ingress traffic or DSCP re mapping for egress traffic Maps DSCP values to a QoS class and drop precedence level Configures QoS policies for handling ingress packets based on Ethernet type VLAN ID TCP UDP port DSCP ToS or VLAN priority tag Sets limits for broadcast multicast and unknown unicast traffic 2 AOS 177 177 179 179 181 182 183 184 186 187 188 188 189 192 193 195 196 198 199 199 204 CHAPTER 3 Using the Web Interface Navigating the We
78. is identified by a MAC address and VLAN ID If Limit Control is enabled on a port the maximum number of users on the port is restricted to the specified limit If this number is exceeded the switch makes the specified response PATH Advanced Configuration Security Network Limit Control PARAMETERS The following parameters are displayed System Configuration Mode Enables or disables Limit Control is globally on the switch If globally disabled other modules may still use the underlying functionality but limit checks and corresponding actions are disabled Aging Enabled If enabled secured MAC addresses are subject to aging as discussed under Aging Period With aging enabled a timer is started once the end host gets secured When the timer expires the switch starts looking for frames from the end host and if such frames are not seen within the next Aging Period the end host is assumed to be disconnected and the corresponding resources are freed on the switch Aging Period If Aging Enabled is checked then the aging period is controlled with this parameter If other modules are using the underlying port security for securing MAC addresses they may have other requirements for the aging period The underlying port security will use the shortest requested aging period of all modules that use this functionality Range 10 10 000 000 seconds Default 3600 seconds Port Configuration Port Port identifier Mo
79. multicast streams associated with a stable set of hosts Only IGMP version 2 or 3 hosts can issue multicast join or leave messages If MVR must be configured for an IGMP version 1 host the multicast groups must be statically assigned using this configuration page The IPv4 address range from 224 0 0 0 to 239 255 255 255 is used for multicast streams MVR group addresses cannot fall within the reserved IP multicast address range of 224 0 0 x All IPv6 addresses must be specified according to RFC 2373 IPv6 Addressing Architecture using 8 colon separated 16 bit hexadecimal values One double colon may be used in the address to indicate the appropriate number of zeros required to fill the undefined fields Note that the IP address ff02 X is reserved PARAMETERS These parameters are displayed VLAN ID Displays the Multicast VLAN identifier VLAN Name Displays the Multicast VLAN name Start Address The starting IPv4 IPv6 Multicast Group Address that will be used as a streaming channel End Address The ending IPv4 IPv6 Multicast Group Address that will be used as a streaming channel Channel Name An optional attribute used to indicate the name of an channel or multicast group assigned to an MVR VLAN Range 1 32 alphanumeric characters containing at least one alphabetic character WEB INTERFACE To display or configure MVR channel settings 1 2 Click Advanced Configuration MVR Click the edi
80. number of accounting timeouts to the server After a timeout the client may retry to the same server send to a different server or give up A retry to the same server is counted as a retransmit as well as a timeout A send to a different server is counted as a Request as well as a timeout Other Info IP Address IP address and UDP port for the accounting server State The current state of the server It takes one of the following values Disabled The server is disabled Not Ready The server is enabled but IP communication is not yet up and running Ready The server is enabled IP communication is up and running and the RADIUS module is ready to accept accounting attempts Dead X seconds left Accounting attempts were made to this server but it did not reply within the configured timeout The server has temporarily been disabled but will get re enabled when the dead time expires The number of seconds left before this occurs is displayed in parentheses This state is only reachable when more than one server is enabled Round Trip Time The time interval measured in milliseconds between the most recent Response and the Request that matched it from the RADIUS accounting server The granularity of this measurement is 100 ms A value of 0 ms indicates that there hasn t been round trip communication with the server yet 246 CHAPTER 5 Monitoring the Switch Displaying Information on RMON
81. of Service ToS octet or the number of the TCP UDP port When these services are enabled the priorities are mapped to a Class of Service value by the switch and the traffic then sent to the corresponding output queue 27 CHAPTER 1 Introduction System Defaults QUALITY OF SERVICE MULTICAST FILTERING SYSTEM DEFAULTS Differentiated Services DiffServ provides policy based management mechanisms used for prioritizing network resources to meet the requirements of specific traffic types on a per hop basis Each packet is classified upon entry into the network based on access lists DSCP values or VLAN lists Using access lists allows you select traffic based on Layer 2 Layer 3 or Layer 4 information contained in each packet Based on network policies different kinds of traffic can be marked for different kinds of forwarding Specific multicast traffic can be assigned to its own VLAN to ensure that it does not interfere with normal network traffic and to guarantee real time delivery by setting the required priority level for the designated VLAN The switch uses IGMP Snooping and Query to manage multicast group registration for IPv4 traffic and MLD Snooping for IPv6 traffic It also supports Multicast VLAN Registration MVR which allows common multicast traffic such as television channels to be transmitted across a single network wide multicast VLAN shared by hosts residing in other standard or private VLAN groups while preser
82. of frames received with errors and the number of incomplete transmissions Drops Received Transmitted The number of frames discarded due to ingress or egress congestion Filtered Received The number of received frames filtered by the forwarding process WEB INTERFACE To display a summary of port statistics click Monitor Ports Traffic Overview Figure 102 Port Statistics Overview Port Statistics Overview Auto refresh Refresh Clear s o m ts ame re 0 0 0 0 0 0 0 0 0 0 0 0 a 0 oooo0oo0oo0oo0o gt 604 1259 148110 139236 0 0 19 Sjo ojojojqjojo o ojojojolojojojojo olololojojlojojojo olojojojojojojojo 1 2 3 4 5 6 8 g 10 2 0 0 0 0 0 DISPLAYING QOS Use the Queuing Counters page to display the number of packets STATISTICS processed by each service queue PATH Monitor Ports QoS Statistics PARAMETERS These parameters are displayed Port Port identifier 2 224 DISPLAYING QCL STATUS CHAPTER 5 Monitoring the Switch Displaying Information About Ports Q Receive Transmit The number of packets received and transmitted through the indicated queue WEB INTERFACE To display the queue counters click Monitor Ports QoS Statistics Figure 103 Queueing Counters Queuing Counters Auto refresh L aE Ea ENE LEE Sea Pe a ee 0 0 0 a a 0 a 0 0 0 0 oooooooo0oo0oo0o olojojlojojlojojojojo ojlojojojojojojojojo olojolololojojojojo ooo
83. of the rate limiters select the maximum ingress rate that will be supported on a port once a match has been found in an assigned ACL 3 Click Save 98 CHAPTER 4 Configuring the Switch Configuring Security Figure 33 ACL Rate Limiter Configuration ACL Rate Limiter Configuration a pd 3 oF 4 oNoneuwne Eo a kd a v 4 ad od od N a oO TE C4 4 C4 C4 EE o 7 C7 a C4 Ma _Save Reset CONFIGURING ACCESS CONTROL LISTS Use the Access Control List Configuration page to define filtering rules for an ACL policy for a specific port or for all ports Rules applied to a port take effect immediately while those defined for a policy must be mapped to one or more ports using the ACL Ports Configuration menu page 96 PATH Advanced Configuration Security Network ACL Access Control List USAGE GUIDELINES Rules within an ACL are checked in the configured order from top to bottom A packet will be accepted as soon as it matches a permit rule or dropped as soon as it matches a deny rule If no rules match the frame is accepted The maximum number of ACL rules that can be configured on the switch is 128 The maximum number of ACL rules that can be bound to a port is 10 ACLs provide frame filtering based on any of the following criteria Any frame type based on MAC address VLAN ID VLAN priority Ethernet type based o
84. parameters to ports 96 Rate Limiters Configures rate limit policies 98 Access Control Configures ACLs based on frame type destination MAC type 99 List VLAN ID VLAN priority tag and the action to take for matching packets DHCP Dynamic Host Configuration Protocol Snooping Enables DHCP snooping globally and sets the trust mode for 107 each port Relay Configures DHCP relay information status and policy 109 IP Source Guard Filters IP traffic based on static entries in the IP Source 111 Guard table or dynamic entries in the DHCP Snooping table Configuration Enables IP source guard and sets the maximum number of 111 clients that can learned dynamically Static Table Adds a static addresses to the source guard binding table 113 ARP Inspection Address Resolution Protocol Inspection 114 Configuration Enables inspection globally and per port 115 Static Table Adds static entries based on port VLAN ID and source MAC 116 address and IP address in ARP request packets AAA Configures RADIUS authentication server RADIUS 117 accounting server and TACACS authentication server settings 3gs CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface Table 4 Main Menu Continued Menu Description Page Aggregation2 119 Static Specifies ports to group into static trunks 120 LACP Allows ports to dynamically join trunks 123 Loop Protection Detects general loopback conditions caused by hardware 125 problems or faulty protocol se
85. port to function as a router port which leads towards a Layer 3 multicast device or MLD querier Default Disabled If MLD snooping cannot locate the MLD querier you can manually designate a port which is connected to a known MLD querier i e a multicast router switch This interface will then join all the current multicast groups supported by the attached router switch to ensure that multicast traffic is passed to all appropriate interfaces within the switch Fast Leave Immediately deletes a member port of a multicast service if a leave packet is received at that port Default Disabled The switch can be configured to immediately delete a member port of a multicast service if a leave packet is received at that port and the Fast Leave function is enabled This allows the switch to remove a port from the multicast forwarding table without first having to send an MLD group specific GS query to that interface If Fast Leave is not used a multicast router or querier will send a GS query message when a group leave message is received The router querier stops forwarding traffic for that group only if no host replies to the query within the specified timeout period If Fast Leave is enabled the switch assumes that only one host is connected to the interface Therefore Fast Leave should only be 154 CHAPTER 4 Configuring the Switch MLD Snooping enabled on an interface if it is connected to only one MLD enabled device
86. putting it into the spanning tree discarding state In a valid configuration configured edge ports should not receive BPDUs If an edge port receives a BPDU an invalid configuration exists such as a connection to an unauthorized device The BPDU guard feature provides a secure response to invalid configurations because an administrator must manually enable the port Default Disabled Port Error Recovery Controls whether a port in the error disabled state will be automatically enabled after a certain time If recovery is not enabled ports have to be disabled and re enabled for normal STA operation The condition is also cleared by a system reboot Port Error Recovery Timeout The time that has to pass before a port in the error disabled state can be enabled Range 30 86400 seconds or 24 hours Ee ae CHAPTER 4 Configuring the Switch Configuring the Spanning Tree Algorithm WEB INTERFACE To configure global settings for STA 1 Click Configuration Spanning Tree Bridge Settings 2 Modify the required attributes 3 Click Save Figure 48 STA Bridge Configuration STP Bridge Configuration Basic Settings a ern E rd Advanced Settings CONFIGURING Use the MSTI Mapping page to add VLAN groups to an MSTP instance MULTIPLE SPANNING MSTI or to designate the name and revision of the VLAN to MSTI TREES Mapping used on this switch PATH Basic Advanced C
87. received transmitted on a port 250 CHAPTER 5 Monitoring the Switch Displaying MVR Information RSTP The number of RSTP Configuration BPDU s received transmitted on a port STP The number of legacy STP Configuration BPDU s received transmitted on a port TCN The number of legacy Topology Change Notification BPDU s received transmitted on a port Discarded Unknown The number of unknown Spanning Tree BPDU s received and discarded on a port Discarded Illegal The number of illegal Spanning Tree BPDU s received and discarded on a port WEB INTERFACE To display information on spanning port statistics click Monitor Spanning Tree Port Statistics Figure 129 Spanning Tree Port Statistics STP Statistics Auto refresh L 3 0 3135 0 0 0 0 0 0 0 0 DISPLAYING MVR INFORMATION DISPLAYING MVR STATISTICS Use the monitor pages for MVR to display information on MVR statistics and active multicast groups Use the MVR Statistics page to display statistics for IGMP protocol messages used by MVR PATH Monitor MVR Statistics PARAMETERS These parameters are displayed VLAN ID Identifier of the VLAN that serves as the channel for streaming multicast services using MVR IGMP MLD Queries Received Number of received queries for IGMP and MLD respectively IGMP MLD Queries Transmitted Number of transmitted queries for IGMP and MLD respectively 259 om CHAPTER 5
88. switch 287 Factory Defaults Restores factory default settings 288 Software Upload Updates software on the switch with a file specified on the 288 management station Image Select Displays information about the active and alternate backup 289 firmware images in the switch and allows you to revert to the alternate image Configuration 290 Save Saves configuration settings to a file on the management 290 station Upload Restores configuration settings from a file on the 290 management station 1 The Basic Configuration menu is a subset of Advanced Configuration The following configuration chapter is therefore structured on the Advanced Configuration menu 2 These menus are repeated from the Basic Configuration folder 3 These menus are only provided for PoE switches 2 AA CONFIGURING THE SWITCH This chapter describes all of the basic configuration tasks CONFIGURING SYSTEM INFORMATION Use the System Information Configuration page to identify the system by configuring contact information system name and the location of the switch PATH Basic Advanced Configuration System Information PARAMETERS These parameters are displayed System Contact Administrator responsible for the system Maximum length 255 characters System Name Name assigned to the switch system Maximum length 255 characters System Location Specifies the system location Maximum length 255 characters WEB INTERFACE
89. take when excessive transmit collisions are detected on a port Discard Discards a frame after 16 collisions default Restart Restarts the backoff algorithm after 16 collisions Power Control Adjusts the power provided to ports based on the length of the cable used to connect to other devices Only sufficient power is used to maintain connection requirements IEEE 802 3 defines the Ethernet standard and subsequent power requirements based on cable connections operating at 100 meters Enabling power saving mode can significantly reduce power used for cable lengths of 20 meters or less and continue to ensure signal integrity The following options are supported Disabled All power savings mechanisms disabled default Enabled Both link up and link down power savings enabled ActiPHY Link down power savings enabled PerfectReach Link up power savings enabled 56 CHAPTER 4 Configuring the Switch Configuring Security WEB INTERFACE To configure port connection settings 1 Click Configuration Ports 2 Make any required changes to the connection settings 3 Click Save Figure 10 Port Configuration Port Configuration Speed Flow Control P Maximum Excessive Power Frame Size Collision Mode Control 960 lt gt lt gt Discard Disabled Discard Disabled Discard Disabled Discard Disabled Discard Disabled Discard Disabled Discard
90. the configuration of the client software and the RADIUS server The encryption method used by IEEE 802 1X to pass authentication messages can be MD5 Message Digest 5 TLS Transport Layer Security PEAP Protected Extensible Authentication Protocol or TTLS Tunneled Transport Layer Security However note that the only encryption method supported by MAC Based authentication is MD5 The client responds to the appropriate method with its credentials such as a password or certificate The RADIUS server verifies the client credentials and responds with an accept or reject packet If authentication is successful the switch allows the client to access the network Otherwise network access is denied and the port remains blocked The operation of 802 1X on the switch requires the following The switch must have an IP address assigned see page 46 RADIUS authentication must be enabled on the switch and the IP address of the RADIUS server specified Backend RADIUS servers are configured on the Authentication Configuration page see page 117 86 CHAPTER 4 Configuring the Switch Configuring Security 802 1X MAC based authentication must be enabled globally for the switch The Admin State for each switch port that requires client authentication must be set to 802 1X or MAC based When using 802 1X authentication Each client that needs to be authenticated must have dot1x client software installed and properly config
91. the address Default 96 bits Note that the default prefix length of 96 bits specifies that the first six colon separated values comprise the network portion of the address Router Sets the IPv6 address of the default next hop router An IPv6 default gateway must be defined if the management station is located in a different IPv6 segment An IPv6 default gateway can only be successfully set when a network interface that directly connects to the gateway has been configured on the switch WEB INTERFACE To configure an IPv6 address 1 2 3 Click Configuration System IPv6 Specify the IPv6 settings The information shown below provides a example of how to manually configure an IPv6 address Click Save Figure 5 IPv6 Configuration Auto Configuration Address 2001 db8 2222 7272 72 IPv6 Configuration 2001 db8 2222 7272 72 Link Local Address fe80 201 c1ff fe01 203 Prefix 96 96 sgos CHAPTER 4 Configuring the Switch Configuring NTP Service CONFIGURING NTP SERVICE Use the NTP Configuration page to specify the Network Time Protocol NTP servers to query for the current time NTP allows the switch to set its internal clock based on periodic updates from an NTP time server Maintaining an accurate time on the switch enables the system log to record meaningful dates and times for event entries If the clock is not set the switch will only record the time from the f
92. the basis for identifying the QoS Class in an Access Accept packet Only the first occurrence of the attribute in the packet will be considered To be valid all 8 octets in the attribute s value must be identical and consist of ASCII characters in the range 0 3 which translates into the desired QoS Class in the range 0 3 QoS assignments to be applied to a switch port for an authenticated user may be configured on the RADIUS server as described below a The Filter ID attribute attribute 11 can be configured on the RADIUS server to pass the following QoS information Table 7 Dynamic QoS Profiles Profile Attribute Syntax Example DiffServ service policy in policy map name_service policy in p1 Rate Limit rate limit input rate rate limit input 100 in units of Kbps 802 1p switchport priority default va ue switchport priority default 2 m Multiple profiles can be specified in the Filter ID attribute by using a semicolon to separate each profile For example the attribute service policy in pp1 rate limit input 100 specifies that the diffserv profile name is ppi and the ingress rate limit profile value is 100 kbps If duplicate profiles are passed in the Filter ID attribute then only the first profile is used For example if the attribute is service policy in p1 service policy in p2 then the switch applies only the DiffServ profile p1 Any unsupported profiles in the Filter ID a
93. the engine ID if SNMP version 3 is used 3 In the SNMP Trap Configuration table enable the Trap Mode to allow the switch to send SNMP traps Specify the trap version trap community and IP address of the management station that will receive trap messages either as an IPv4 or IPv6 address Select the trap types to issue and set the trap inform settings for SNMP v2c or v3 clients For SNMP v3 clients configure the security engine ID and security name used in v3 trap and inform messages 4 Click Save Figure 19 SNMP System Configuration SNMP System Configuration Enabled SNMP vc Read Community public CRT UTE private Trap Mode Disabled Trap Version SNMP v1 Trap Community public Trap Destination Address Trap Destination IPv6 Address Trap Authentication Failure Enabled Trap Link up and Link down Enabled abled m Trap Inform Mode Trap Inform Timeout seconds fi 5 Trap Inform Retry Times 71 CHAPTER 4 Configuring the Switch Configuring Security SETTING SNMPv3 COMMUNITY ACCESS STRINGS Use the SNMPv3 Community Configuration page to set community access strings All community strings used to authorize access by SNMP v1 and v2c clients should be listed in the SNMPv3 Communities Configuration table For security reasons you should consider removing the default strings PATH Advanced Configuration Security Switch SNMP Communities PARAMETERS These parameter
94. the remapped DSCP value The remapped DSCP value is always taken from the DSCP Translation table Egress Remap DPO field see page 198 WEB INTERFACE To configure ingress translation and classification settings and egress re writing of DSCP values 1 Click Advanced Configuration QoS Port DSCP 2 Set the required ingress translation and egress re writing parameters 3 Click Save Figure 82 Configuring Port DSCP Translation and Rewriting QoS Port DSCP Configuration Auto refresh Refresh Port ingress Egress rn cn tee Disable Disable Disable Disable Disable Disable 1 2 Disable Disable 4 5 Disable Disable CONFIGURING DSCP Use the DSCP Based QoS Ingress Classification page to configure DSCP BASED QoS INGRESS based QoS ingress classification settings CLASSIFICATION 196 CHAPTER 4 Configuring the Switch Quality of Service PATH Advanced Configuration QoS DSCP Based QoS PARAMETERS These parameters are displayed DSCP DSCP value in ingress packets Range 0 63 Trust Controls whether a specific DSCP value is trusted Only frames with trusted DSCP values are mapped to a specific QoS class and drop level DPL Frames with untrusted DSCP values are treated as non IP frames QoS Class QoS value to which the corresponding DSCP value is classified for ingress processing Range 0 7 Default
95. the response to a match 4 Click Save Figure 86 QoS Control List Configuration QoS Control List Configuration Action QCE Port Frame Type SMAC DMAC VID PCP DEI Class DPL DSCP QCE Configuration Port Members 23 24 25 26 27 128 Default gt Default _Save _Reset Cancel S203 CHAPTER 4 Configuring the Switch Quality of Service CONFIGURING STORM Use the Storm Control Configuration page to set limits on broadcast CONTROL multicast and unknown unicast traffic to control traffic storms which may occur when a network device is malfunctioning the network is not properly configured or application programs are not well designed or properly configured Traffic storms caused by any of these problems can severely degrade performance or bring your network to a complete halt You can protect your network from traffic storms by setting a threshold for broadcast multicast or unknown unicast traffic Any packets exceeding the specified threshold will then be dropped Note that the limit specified on this page applies to each port PATH Configuration QoS Storm Control PARAMETERS These parameters are displayed Port Port identifier Frame Type Specifies broadcast multicast or unknown unicast traffic Enable Enables or disables storm control Default Disabled Rate The threshold above which packets are dropped Options kbps Mbps fps kfps Defaul
96. the scroll down list 239 CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings Figure 112 DHCP Snooping Statistics DHCP Snooping Port Statistics Port 1 Port Auto refresh Refresh Clear Rx Discover Tx Discover 0 Rx Offer Tx Offer 0 Rx Request Tx Request 0 Rx Decline Tx Decline 0 Rx ACK Tx ACK Rx NAK Tx NAK Rx Release Tx Release Rx Inform Tx Inform Rx Lease Query Tx Lease Query Rx Lease Unassigned Tx Lease Unassigned Rx Lease Unknown Tx Lease Unknown Rx Lease Active Tx Lease Active DISPLAYING DHCP Use the DHCP Relay Statistics page to display statistics for the DHCP relay RELAY STATISTICS service supported by this switch and DHCP relay clients PATH Monitor Security Network DHCP Relay Statistics PARAMETERS These parameters are displayed Server Statistics Transmit to Server The number of packets relayed from the client to the server Transmit Error The number of packets containing errors that were sent to clients Receive from Server The number of packets received from the server Receive Missing Agent Option The number of packets that were received without agent information options Receive Missing Circuit ID The number of packets that were received with the Circuit ID option missing Receive Missing Remote ID The number of packets that were received with the Remote ID option missing Receive Bad Circuit ID The n
97. this IPv6 address as the query source address The querier will not start or will disable itself after having started if it detects an IPv6 multicast router on the network Compatibility Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of MLD operating on these devices within a network Range MLD Auto Forced MLDv1 Forced MLDv2 Default MLD Auto RV The Robustness Variable allows tuning for the expected packet loss on a network A port will be removed from receiving a multicast service when no MLD reports are detected in response to a number of MLD queries The robustness variable sets the number of queries on ports for which there is no report Range 1 255 Default 2 Routers adopt the robustness value from the most recently received query If the querier s robustness variable QRV is zero indicating that the QRV field does not contain a declared robustness value the switch will set the robustness variable to the value statically configured by this command If the QRV exceeds 7 the maximum value of the QRV field the robustness value is set to zero meaning that this device will not advertise a QRV in any query messages it subsequently sends QI The Query Interval is the interval at which General Queries are sent by the Querier Range 1 255 seconds Default 125 seconds An MLD general query message is sent by the switch at the interval specified by this attribute When
98. this message is received by downstream hosts all receivers build an IGMP report for the multicast groups they have joined 156 CHAPTER 4 Configuring the Switch MLD Snooping QRI The Query Response Interval is the Max Response Time advertised in periodic General Queries The QRI applies when the switch is serving as the querier and is used to inform other devices of the maximum time this system waits for a response to general queries Range 10 31744 tenths of a second Default 10 seconds LLQI The Last Listener Query Interval RFC 3810 MLDv2 for IP sets the interval to wait for a response to a group specific or group and source specific query message The overall time to wait for a response Last Member Query Time is the value assigned to LLQI multiplied by the Last Member Query Count which is fixed at 2 Range 1 31744 tenths of a second in multiples of 10 Default 1 second When a multicast host leaves a group it sends an MLD leave message When the leave message is received by the switch it checks to see if this host is the last to leave the group by sending out an MLD group specific or group and source specific query message and starts a timer If no reports are received before the timer expires the group record is deleted and a report is sent to the upstream multicast router A reduced value will result in reduced time to detect the loss of the last member of a group or source but may generate more b
99. to the root bridge i e root port connecting a LAN through the bridge to the root bridge i e designated port or is an alternate or backup port that may provide connectivity if other bridges bridge ports or LANs fail or are removed State Displays the current state of this port in the Spanning Tree Blocking Port receives STA configuration messages but does not forward packets a Learning Port has transmitted configuration messages for an interval set by the Forward Delay parameter without receiving contradictory information Port address table is cleared and the port begins learning addresses Forwarding Port forwards packets and continues learning addresses Path Cost The contribution of this port to the path cost of paths towards the spanning tree root which include this port This will either be a value computed from the Auto setting or any explicitly configured value Edge The current RSTP port operational Edge Flag An Edge Port is a switch port to which no bridges are attached The flag may be automatically computed or explicitly configured Each Edge Port transitions directly to the Forwarding Port State since there is no possibility of it participating in a loop Point to Point Indicates a connection to exactly one other bridge The flag may be automatically computed or explicitly configured The point to point properties of a port affect how fast it can transition RSTP states Uptime The
100. valid or invalid received from this server Access Rejects The number of RADIUS Access Reject packets valid or invalid received from this server Access Challenges The number of RADIUS Access Challenge packets valid or invalid received from this server Malformed Access Responses The number of malformed RADIUS Access Response packets received from this server Malformed packets include packets with an invalid length Bad authenticators or Message Authenticator attributes or unknown types are not included as malformed access responses Bad Authenticators The number of RADIUS Access Response packets containing invalid authenticators or Message Authenticator attributes received from this server Unknown Types The number of RADIUS packets of unknown type that were received from this server on the authentication port Packets Dropped The number of RADIUS packets that were received from this server on the authentication port and dropped for some other reason Transmit Packets Access Requests The number of RADIUS Access Request packets sent to this server This does not include retransmissions Access Retransmissions The number of RADIUS Access Request packets retransmitted to this RADIUS authentication server Pending Requests The number of RADIUS Access Request packets destined for the server that have not yet timed out or received a response This variable is incremented when an Access R
101. way the switch can discover the ports that want to join a multicast group and set its filters accordingly If there is no multicast router attached to the local subnet multicast traffic and query messages may not be received by the switch In this case Layer 2 IGMP Query can be used to actively ask the attached hosts if they want to receive a specific multicast service IGMP Query thereby identifies the ports containing hosts requesting to join the service and sends data out to those ports only It then propagates the service request up to any neighboring multicast switch router to ensure that it will continue to receive the multicast service The purpose of IP multicast filtering is to optimize a switched network s performance so multicast packets will only be forwarded to those ports containing multicast group hosts or multicast routers switches instead of flooding traffic to all ports in the subnet VLAN Use the IGMP Snooping Configuration page to configure global and port related settings which control the forwarding of multicast traffic Based on the IGMP query and report messages the switch forwards traffic only to the ports that request multicast traffic This prevents the switch from broadcasting the traffic to all ports and possibly disrupting network performance If multicast routing is not supported on other switches in your network you can use IGMP Snooping and IGMP Query to monitor IGMP service requests 145 CHA
102. your time zone is east before or west after of UTC You can choose one of the 80 predefined time zone definitions or your can manually configure the parameters for your local time zone Daylight Savings Time In some countries or regions clocks are adjusted through the summer months so that afternoons have more daylight and mornings have less This is known as Daylight Savings Time or Summer Time Typically clocks are adjusted forward one hour at the start of spring and then adjusted backward in autumn PATH Basic Advanced Configuration System Time PARAMETERS These parameters are displayed Time Zone Configuration Time Zone A drop down box provides access to the 80 predefined time zone configurations Each choice indicates it s offset from UTC and lists at least one major city or location covered by the time zone Acronym Sets the acronym of the time zone Range Up to 16 alphanumeric characters as well as the symbols _ or Daylight Saving Time Configuration Mode Selects one of the following configuration modes Disabled Daylight Savings Time is not used Recurring Sets the start end and offset times of summer time for the switch on a recurring basis This mode sets the summer time zone relative to the currently configured time zone From Start time for summer time To End time for summer time Offset The number of minutes to add during Daylight Saving Time
103. 0 9 5 9 9 9 9 9 9819 9 9 9 9 91519 9 016 5 0 5 5 9 0 9 9 9 9 9 919 5 0 9 5 9 9 5 5 9 5 0 4 8 0 GO 8 0 0 5 9 8 8 8 9 8 3 8 0 3 8 9 8 5 9 3 0 5 5 0 9 9 9 9 9 9 8 8 8 8 9 9 9 98 8 9 9 9 9 8 919 5 0 9 5 9 9 9 9 9 9 9 919 5 9 919 915 95 915 0 5 5 0 6 OS 8 8 9 3 0 8 3 0 8 3 8 0 8 8 9 8 8 3 3 0 O 6 0 O 5 1 8 OO amp O 9 0 3 8 OO 8 0 0 5 0 9 9 9 9 9 5 9 0 9 9 9 9 8 9 9 9 9 9 9 8 9 amp 6 9 8 0 8 5 GO 9 8 8 8 8 G9 8 6 98 8 9 9 9 9 5 9 5 0 8 0 OS OO 8 OO amp amp GO 8 0 8 8 0 3 8 6 9 5 0 9 5 9 9 5 9 9 9 9 9 9 8 9 9 9 9 0 9 8 9 9 9 9 9 0 59 9 9 9 5 9 9 5 5 915 8 9 919 9 9 5 9 915 0 4 5 3 O15 0 8 8 9 9 8 O19 9 81 8 8 8 3 8 9 0 91 8 GO 8 8 GO 8 9 GG 8 0 G8 6 9 8 0 0 3 0 0 5 5 0 8 8 9 8 9 1 9 9 8 8 8 8 8 9 9 8 9 9 919 919 0 3 8 0 8 3 9 3 8 5 0 8 8 8 8 8 0 9 9 9 9 99 5 0 4 0 GO amp GO 87S amp 6 OG amp 8 1S 0 3 8 8 0 5 8 65 3 9 9 5 9 9 9 9 9 9 9 8 9 3 8 9 9 9 9 9 9 9 5 5 5 019 5 9 0 6 5 0 9 9 9 8 9 9 0 9 9 9 5 9 9 o 010 9 0 019 9 01919 019 9 91919 9 91919191919 919 0 9 5 0 9 5S 8 amp 9 5 8 8 8 8 3 3 9 0 8 8 8 0 8 0 5 5 0 9 5 9 0 59 9 9 9 5
104. 1 CHAPTER 4 Configuring the Switch Quality of Service other than 00 00 00 then valid value of the PID will be any value from 0x0000 to Oxffff IPv4 IPv4 frame type includes the following settings Protocol IP protocol number Options Any UDP TCP or Other 0 255 Source IP Source IP address Options Any Specific To configure a specific source IP address enter both the address and mask format The address and mask must be in the format x y z w where x y z and w are decimal numbers between 0 and 255 When the mask is converted to a 32 bit binary string and read from left to right all bits following the first zero must also be zero IP Fragment Indicates whether or not fragmented packets are accepted Options Any Yes No Default Any Datagrams may be fragmented to ensure they can pass through a network device which uses a maximum transfer unit smaller than the original packet s size DSCP Diffserv Code Point value Options Any specific value of 0 63 BE CS1 CS7 EF or AF1i1 AF43 or Range Default Any IPv6 IPv6 frame type includes the following settings Protocol IP protocol number Options Any UDP TCP or Other 0 255 Source IP Source IP address Options Any Specific When configuring a specific IPv6 source address enter the least significant 32 bits a b c d using the same type of mask as that used for an IPv4 address DSCP Diffserv Code Point v
105. 100 Detailed System Log Information Detailed System Log Information Refresh lt lt g Message Level Info Time 1970 01 01T00 13 01 00 00 Message Link down on port 3 DISPLAYING INFORMATION ABOUT PORTS You can use the Monitor Port menu to display a graphic image of the front panel which indicates the connection status of each port basic statistics on the traffic crossing each port the number of packets processed by each service queue or detailed statistics on port traffic DISPLAYING PORT Use the Port State Overview page to display an image of the switch s ports STATUS ON THE Clicking on the image of a port opens the Detailed Port Statistics page as FRONT PANEL described on page 226 PATH Monitor Ports State WEB INTERFACE To display an image of the switch s ports click Monitor Ports State Figure 101 Port State Overview Port State Overview Auto refresh Refresh 223 CHAPTER 5 Monitoring the Switch Displaying Information About Ports DISPLAYING AN Use the Port Statistics Overview page to display a summary of basic OVERVIEW OF Port information on the traffic crossing each port STATISTICS PATH Monitor Ports Traffic Overview PARAMETERS These parameters are displayed Packets Received Transmitted The number of packets received and transmitted Bytes Received Transmitted The number of bytes received and transmitted Errors Received Transmitted The number
106. 31 744 tenths of a second Default 5 tenths of a second Interface Channel Setting When the MVR VLAN is created click the Edit symbol to expand the corresponding multicast channel settings for the specific MVR VLAN Summary about the Interface Channel Setting of the MVR VLAN will be shown besides the Edit symbol Port Port identifier Role Click the Role symbol to configure a port to one of the following MVR roles Inactive I The designated port does not participate in MVR operations This is the default Source S Configures uplink ports to receive and send multicast data as source ports Subscribers cannot be directly connect to source ports Also note that MVR source ports should not overlap ports in the management Receiver R Configures a port as a receiver port if it is a subscriber port and should only receive multicast data It does not receive data unless it becomes a member of the multicast group by issuing IGMP MLD messages Mode Sets the MVR operational mode for any port MVR must also be globally enabled on the switch for this setting to take effect MVR only needs to be enabled on a receiver port if there are subscribers receiving multicast traffic from one of the MVR groups Default Disabled Type The following interface types are supported Source An uplink port that can send and receive multicast data for the groups assigned to the MVR VLAN Note that the source port must be m
107. 75 adding static members 173 creating 173 description 172 displaying port members 174 egress mode 175 ingress filtering 175 interface configuration 174 176 IP subnet based 182 MAC based 177 MAC based configuring 177 port isolation 177 protocol 179 protocol configuring 179 protocol configuring groups 179 protocol configuring interfaces 181 protocol group configuration 179 protocol interface configuration 181 voice 183 voice VLANs 183 enabling for ports 184 identifying client devices 186 VoIP traffic 183 telephony OUI configuring 186 voice VLAN configuring 184 VoIP detecting devices 185 W web interface configuration buttons 36 home page 35 menu list 36 panel display 36 Weighted Random Early Detection See WRED WRED configuring drop probabilities 205 316 GEP 5070 E042013 ST RO1
108. 85 287 288 289 289 290 291 FIGURES S ga Table 1 Table 2 Table 3 Table 4 Table 5 Table 6 Table 7 Table 8 Table 9 Table 10 Table 11 Table 12 Table 13 Table 14 TABLES Key Features System Defaults Web Page Configuration Buttons Main Menu HTTPS System Support SNMP Security Models and Levels Dynamic QoS Profiles QCE Modification Buttons Recommended STA Path Cost Range Recommended STA Path Costs Default STA Path Costs QCE Modification Buttons System Capabilities Troubleshooting Chart S fOe 23 28 36 36 65 68 89 100 136 136 136 200 268 299 TABLES 20 5 SECTION I GETTING STARTED This section provides an overview of the switch and introduces some basic concepts about network switches It also describes the basic settings required to access the management interface This section includes these chapters Introduction on page 23 Initial Switch Configuration on page 31 Spire SECTION Getting Started 2 Bo KEY FEATURES INTRODUCTION This switch provides a broad range of features for Layer 2 switching It includes a management agent that allows you to configure the features listed in this manual The default configuration can be used for most of the features provided by this switch However there are many options that you should configure to maximize the switch s performance for your particular network environment Table 1 Ke
109. 9 5 5 0 9 5 9 9 9 59 5 010 9 0 9 9 9 4 59 9 9 9 59 9 915 919 9 919 O19 9 0 019 90 9 919 9 91919 9 9 9 91 919 9 91919 91 919 919 9519 9 9 5 9 9 5 9 9 9 9 9 9 9 9 0 9 9 9 9 9 9 5 0919 3 9 919 9 9 919 919 9 919 9 9 919 9 91 919 91 9 01019 91019 9 919 9 90 90 90 9 019 9 01919 01019 910 0 9 9 0 amp 8 8 8 9 9 8 3 9 8 91 8 8 3 3 9 9 9 9 3 019 9 9 919 919191919139 9 9 9 93 91 9 919 91919 919 01019 90 019 9191919 019 9 9 919 9 901919 91919 919 01919 9919 911 0 9 9 8 O 8 8 GS 8 0 8 8 9 9 9 8 3 5 9 3 0 9 9 0 9 53 9 9 9 9 9 9 5 0 9159 9 919 959 919 019 9 9 9 9 9 9019 9 9 9 9 91919 9 91919 91919 9 90 g E A22 CHAPTER 4 Configuring the Switch Creating Trunk Groups CONFIGURING LACP Use the LACP Port Configuration page to enable LACP on selected ports configure the administrative key and the protocol initiation mode PATH Basic Advanced Configuration Aggregation LACP USAGE GUIDELINES To avoid creating a loop in the network be sure you enable LACP before connecting the ports and also disconnect the ports before disabling LACP If the target switch has also enabled LACP on the connected ports the trunk will be activated automatically A trunk formed with another switch using LACP will automatically be assigned the next available trunk ID If more than eight ports attached to the same target switch have LACP enabled the additional ports will be placed in standby m
110. A root device However if all devices have the same priority the device with the lowest MAC address will then become the root device Note that lower numeric values indicate higher priority Default 128 Range 0 240 in steps of 16 Options 0 16 32 48 64 80 96 112 128 144 160 176 192 208 224 240 Forward Delay The maximum time in seconds this device will wait before changing states i e discarding to learning to forwarding This delay is required because every device must receive information about topology changes before it starts to forward frames In addition each port needs time to listen for conflicting information that would make it return to a discarding state otherwise temporary data loops might result Minimum The higher of 4 or Max Message Age 2 1 Maximum 30 Default 15 Max Age The maximum time in seconds a device can wait without receiving a configuration message before attempting to reconfigure All device ports except for designated ports should receive configuration messages at regular intervals Any port that ages out STA information provided in the last configuration message becomes the designated port for the attached LAN If it is a root port a new root port is selected 130 CHAPTER 4 Configuring the Switch Configuring the Spanning Tree Algorithm from among the device ports attached to the network Note that references to ports in this section m
111. ARRANTY and is subject to the copyrights of one or more authors For details refer to the section The GNU General Public License below or refer to the applicable license as included in the source code archive THE GNU GENERAL PUBLIC LICENSE GNU GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright C 1989 1991 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This General Public License applies to most of the Free Software Foundation s software and to any other program whose authors commit to using it Some other Free Software Foundation software is covered by the GNU Library General Public License instead You can apply it to your programs too When we speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that
112. Configuration WRED Configuration Congestion Management Configuration Mirror Configuration Configuring Remote Port Mirroring Mirror Configuration Source Mirror Configuration Intermediate Mirror Configuration Destination UPnP Configuration sFlow Configuration System Information CPU Load System Log Information Detailed System Log Information Port State Overview Port Statistics Overview Queueing Counters A jers FIGURES 177 178 180 182 183 186 187 188 189 191 192 193 194 195 196 197 198 199 203 204 206 207 208 209 211 212 213 214 217 220 221 222 223 223 224 225 FIGURES Figure 104 Figure 105 Figure 106 Figure 107 Figure 108 Figure 109 Figure 110 Figure 111 Figure 112 Figure 113 Figure 114 Figure 115 Figure 116 Figure 117 Figure 118 Figure 119 Figure 120 Figure 121 Figure 122 Figure 123 Figure 124 Figure 125 Figure 126 Figure 127 Figure 128 Figure 129 Figure 130 Figure 131 Figure 132 Figure 133 Figure 134 Figure 135 Figure 136 Figure 137 Figure 138 Figure 139 QoS Control List Status Detailed Port Statistics Access Management Statistics Port Security Switch Status Port Security Port Status Network Access Server Switch Status NAS Statistics for Specified Port ACL Status DHCP Snooping Statistics DHCP Relay Statistics Dynamic ARP Inspection Table Dynamic IP Source Guard Table RADIUS Overview RADIUS Details
113. D 2004 Rapid Spanning Tree Protocol RSTP IEEE 802 1D 2004 Multiple Spanning Tree Protocol MSTP IEEE 802 1D 2004 S295 APPENDIX A Software Specifications Management Features VLAN SUPPORT CLASS OF SERVICE QUALITY OF SERVICE MULTICAST FILTERING ADDITIONAL FEATURES Up to 128 groups port based protocol based tagged 802 1Q private VLANs voice VLANs MAC based VLANs and IP subnet based VLANs Supports four levels of priority Strict Weighted Round Robin Queue mode and CoS configured by Ethernet type VLAN ID TCP UDP port DSCP ToS bit VLAN tag priority or port Layer 3 4 priority mapping IP DSCP remarking DiffServ supports DSCP remarking ingress traffic policing and egress traffic shaping IGMP Snooping IPv4 MLD Snooping IPv6 Multicast VLAN Registration DHCP Client Relay Option 82 DNS Client Proxy Flow Sampling sFlow LLDP Link Layer Discover Protocol Loop Protection Remote Port Mirroring RMON Remote Monitoring groups 1 2 3 9 SMTP Email Alerts SNMP Simple Network Management Protocol SNTP Simple Network Time Protocol UPnP MANAGEMENT FEATURES IN BAND MANAGEMENT SOFTWARE LOADING SNMP Web based HTTP or HTTPS or SNMP manager Secure Shell or Telnet HTTP or TFTP in band Management access via MIB database Trap management to specified hosts 296 STANDARDS APPENDIX A Software Specifications Standards RMON Groups 1 2 3 9 Statistics H
114. DHCP client packet information with the switch s relay information This is the default Keep Retains the client s DHCP information Drop Drops the packet when it receives a DHCP message that already contains relay information WEB INTERFACE To configure DHCP Relay 1 2 3 Click Advanced Configuration Security Network DHCP Relay Enable the DHCP relay function specify the DHCP server s IP address enable Option 82 information mode and set the policy by which to handle relay information found in client packets Click Save Figure 36 DHCP Relay Configuration DHCP Relay Configuration Relay Mode Disabled Relay Server 0 0 0 0 Relay Information Mode Disabled Relay Information Policy Replace p dali CONFIGURING IP SOURCE GUARD CHAPTER 4 Configuring the Switch Configuring Security IP Source Guard is a security feature that filters IP traffic on network interfaces based on manually configured entries in the IP Source Guard table or dynamic entries in the DHCP Snooping table when enabled see Configuring DHCP Snooping IP source guard can be used to prevent traffic attacks caused when a host tries to use the IP address of a neighbor to access the network CONFIGURING GLOBAL AND PORT SETTINGS FOR IP SOURCE GUARD Use the IP Source Guard Configuration page to filter traffic on an insecure port which receives messages from outside the network or fire wall and therefore may be subj
115. Enabled Disabled Loop 1970 01 01T03 33 45 00 00 254 CHAPTER 5 Monitoring the Switch Displaying Information on the Spanning Tree DISPLAYING INFORMATION ON THE SPANNING TREE DISPLAYING BRIDGE STATUS FOR STA Use the monitor pages for Spanning Tree to display information on spanning tree bridge status the functional status of participating ports and statistics on spanning tree protocol packets Use the Bridge Status page to display STA information on the global bridge i e this switch and individual ports PATH Monitor Spanning Tree Bridge Status PARAMETERS These parameters are displayed STA Bridges MSTI The Bridge Instance This is also a link to the STP Detailed Bridge Status Bridge ID A unique identifier for this bridge consisting of the bridge priority and MAC address where the address is taken from the switch system Root ID The priority and MAC address of the device in the Spanning Tree that this switch has been accepted as the root device Root Port The number of the port on this switch that is closest to the root This switch communicates with the root device through this port If there is no root port then this switch has been accepted as the root device of the Spanning Tree network Root Cost The path cost from the root port on this switch to the root device For the root bridge this is zero For all other bridges it is the sum of the port path costs on the least cost p
116. Entity PSE or Power Device PD If the Type is unknown it is represented as Reserved Power Source The Source represents the power source being utilized by a PSE or PD device For a PSE device it can run on its Primary Power Source or Backup Power Source If it is unknown what power supply the PSE device is using this is indicated as Unknown For a PD device it can run on its local power supply or use the PSE as a power source It can also use both its local power supply and the PSE a2 CHAPTER 5 Monitoring the Switch Displaying LLDP Information DISPLAYING LLDP NEIGHBOR EEE INFORMATION If it is unknown what power supply the PD device is using this is indicated as Unknown Power Priority Power Priority represents the priority of the PD device or the power priority associated with the PSE type device s port that is sourcing the power There are three levels of power priority The three levels Critical High and Low If the power priority is unknown this is indicated as Unknown Maximum Power The maximum power in watts required by a PD device from a PSE device or the minimum power a PSE device is capable of sourcing over a maximum length cable based on its current configuration WEB INTERFACE To display LLDP neighbor PoE information click Monitor LLDP PoE Figure 141 LLDP Neighbor PoE Information LLDP Neighbour Power Over Ethernet Information Auto refresh T Refresh Loc
117. FC 1060 A few of the more common types include 0800 IP 0806 ARP 8137 IPX ARP MAC Parameters SMAC Filter The type of source MAC address Options Any Specific user defined Default Any DMAC Filter The type of destination MAC address Options Any MC multicast BC broadcast UC unicast Default Any ARP Parameters ARP RARP Specifies the type of ARP packet Options Any no ARP RARP opcode flag is specified ARP frame must have ARP O 1 CHAPTER 4 Configuring the Switch Configuring Security RARP opcode set to ARP RARP frame must have ARP RARP opcode set to RARP Other frame has unknown ARP RARP opcode flag Default Any Request Reply Specifies whether the packet is an ARP request reply or either type Options Any no ARP RARP opcode flag is specified Request frame must have ARP Request or RARP Request opcode flag set Reply frame must have ARP Reply or RARP Reply opcode flag Default Any Sender IP Filter Specifies the sender s IP address Options Any no sender IP filter is specified Host specifies the sender IP address in the SIP Address field Network specifies the sender IP address and sender IP mask in the SIP Address and SIP Mask fields Default Any Target IP Filter Specifies the destination IP address Options Any no target IP filter is specified Host specifies the target IP address in the Target IP Address field Network specifie
118. Figure 119 RMON History Overview RMON History Overview Auto refresh Refresh I lt lt gt gt Start from Control Index fo and Sample Index fo with 20 entries per page 7 T History Sample Sample Broad Multi CRC Under Over Pas Index ar Start Octets ane ca ee Se Frag Jabb Coll Utilization 760837 7627 7645 7663 7681 7699 7717 7735 7753 7771 7789 7807 7825 7843 7861 7879 7897 7915 oooooooooo0oo0oo0oo0oo0oo0o0o0o0 1 1 4 1 1 4 1 1 a Cl 1 4 a A a 1 1 DISPLAYING RMON Use the RMON Alarm Overview page to display configured alarm settings ALARM SETTINGS PATH Monitor Security Switch RMON Alarm PARAMETERS These parameters are displayed ID Index of Alarm control entry Interval Interval in seconds for sampling and comparing the rising and falling threshold Variable MIB object to be sampled Sample Type The method of sampling the selected variable and calculating the value to be compared against the thresholds For more information see Configuring RMON Alarms on page 80 Value The value of the statistic during the last sampling period Startup Alarm The alarm that may be triggered when this entry is first set to valid Rising Threshold If the current value is greater than the rising threshold and the last sample value was less than this threshold then an alarm will be generated Rising Index The ind
119. Figure 51 Figure 52 Figure 53 Figure 54 Figure 55 Figure 56 Figure 57 Figure 58 Figure 59 Figure 60 Figure 61 Figure 62 Figure 63 Figure 64 Figure 65 Figure 66 Figure 67 ACL Port Configuration ACL Rate Limiter Configuration Access Control List Configuration DHCP Snooping Configuration DHCP Relay Configuration Configuring Global and Port based Settings for IP Source Guard Configuring Static Bindings for IP Source Guard Configuring Global and Port Settings for ARP Inspection Configuring Static Bindings for ARP Inspection Authentication Configuration Static Trunk Configuration LACP Port Configuration Loop Protection Configuration STP Root Ports and Designated Ports MSTP Region Internal Spanning Tree Multiple Spanning Tree Common Internal Spanning Tree Common Spanning Tree Internal Spanning Tree STA Bridge Configuration Adding a VLAN to an MST Instance Configuring STA Bridge Priorities STP RSTP CIST Port Configuration MSTI Port Configuration MVR Concept Configuring General MVR Settings Configuring MVR Channel Settings Configuring Global and Port related Settings for IGMP Snooping Configuring VLAN Settings for IGMP Snooping and Query IGMP Snooping Port Group Filtering Configuration Configuring Global and Port related Settings for MLD Snooping Configuring VLAN Settings for MLD Snooping and Query MLD Snooping Port Group Filtering Configuration LLDP Configuration LLDP MED Configuration
120. G SNMPv3 GROUPS Use the SNMPv3 Group Configuration page to configure SNMPv3 groups An SNMPv3 group defines the access policy for assigned users restricting them to specific read and write views as defined on the SNMPv3 Access Configuration page page 76 You can use the pre defined default groups or create a new group and the views authorized for that group PATH Advanced Configuration Security Switch SNMP Groups PARAMETERS These parameters are displayed Security Model The user security model Options SNMP v1 v2c or the User based Security Model usm Security Name The name of a user connecting to the SNMP agent Range 1 32 characters ASCII characters 33 126 only The options displayed for this parameter depend on the selected Security Model For SNMP vi and v2c the switch displays the names configured on the SNMPv3 Communities Configuration menu see page 72 For USM or SNMPv3 the switch displays the names configured with the local engine ID in the SNMPv3 Users Configuration 274 CHAPTER 4 Configuring the Switch Configuring Security menu see page 73 To modify an entry for USM the current entry must first be deleted Group Name The name of the SNMP group Range 1 32 characters ASCII characters 33 126 only WEB INTERFACE To configure SNMPv3 groups 1 Click Advanced Configuration Security Switch SNMP Groups 2 Click Add new group to set up a new group 3 Select a s
121. HE WEB BROWSER INTERFACE HOME PAGE To access the web browser interface you must first enter a user name and password The administrator has Read Write access to all configuration parameters and statistics The default user name and password for the administrator is admin When your web browser connects with the switch s web agent the home page is displayed as shown below The home page displays the Main Menu on the left side of the screen and an image of the front panel on the right side The Main Menu links are used to navigate to other menus and display configuration parameters and statistics Figure 1 Home Page levelone GEP 5070 48 GE PoE Plus 2 GE SFP L2 Managed Switch BEEEER CUE EEE FEEFFE FEEFFE c c 35 CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface CONFIGURATION OPTIONS PANEL DISPLAY MAIN MENU Configurable parameters have a dialog box or a drop down list Once a configuration change has been made on a page be sure to click on the Save button to confirm the new setting The following table summarizes the web page configuration buttons Table 3 Web Page Configuration Buttons Button Action Save Sets specified values to the system Reset Cancels specified values and restores current values prior to pressing Save Logs out of the management interface Displays help for the selected page The web agent displays an image of the switch s ports The r
122. ING PROTOCOL VLAN GROUPS CHAPTER 4 Configuring the Switch Protocol VLANs The network devices required to support multiple protocols cannot be easily grouped into a common VLAN This may require non standard devices to pass traffic between different VLANs in order to encompass all the devices participating in a specific protocol This kind of configuration deprives users of the basic benefits of VLANs including security and easy accessibility To avoid these problems you can configure this switch with protocol based VLANs that divide the physical network into logical VLAN groups for each required protocol When a frame is received at a port its VLAN membership can then be determined based on the protocol type being used by the inbound packets COMMAND USAGE To configure protocol based VLANs follow these steps 1 First configure VLAN groups for the protocols you want to use page 173 Although not mandatory we suggest configuring a separate VLAN for each major protocol running on your network Do not add port members at this time 2 Create a protocol group for each of the protocols you want to assign to a VLAN using the Configure Protocol Add page 3 Then map the protocol for each interface to the appropriate VLAN using the Configure Interface Add page When MAC based IP subnet based and protocol based VLANs are supported concurrently priority is applied in this sequence and then port based VLANs last Use
123. Information on RMON PARAMETERS These parameters are displayed ID Index of Statistics entry Data Source ifIndex Port ID to monitor Drop The total number of events in which packets were dropped by the probe due to lack of resources Octets The total number of octets of data including those in bad packets received on the network Pkts The total number of packets including bad packets broadcast packets and multicast packets received Broadcast The total number of good packets received that were directed to the broadcast address Multicast The total number of good packets received that were directed to a multicast address CRC Errors The total number of packets received that had a length excluding framing bits but including FCS octets of between 64 and 1518 octets Undersize The total number of packets received that were less than 64 octets Oversize The total number of packets received that were longer than 1518 octets Frag The number of frames which size is less than 64 octets received with invalid CRC Jabb The number of frames which size is larger than 64 octets received with invalid CRC 64 Bytes The total number of packets including bad packets received that were 64 octets in length x y The total number of packets including bad packets received that were between x to y octets in length 2a DISPLAYING RMON HISTORICAL SAMPLES CHAPTER 5 Monitori
124. LDP MED 2 Modify any of the timing parameters as required 3 Set the fast start repeat count descriptive information for the end point device and policies applied to selected ports 4 Click Save Figure 63 LLDP MED Configuration LLDP MED Configuration Fast Start Repeat Count er Coordinates Location Civic Address Location Country code State City City district CL I lt 1 amp Street Leading street direction CSCtCS lt amp Y Trailing street suffix Street suffix House no ees Landmark emcee arm Zip code Building feaaen Floor Room no Place type Postal community name P O Box iiciin code Emergency Call Service Policies Delete PolicyID Application Type Tag VLAN ID L2 Priority DSCP r o Voce z Ms z ft p p Add New Policy Policy Port Configuration 0 r r r r r 1 2 3 4 5 POWER OVER ETHERNET Use the Power Over Ethernet Configuration page to set the maximum PoE power provided to a port the maximum power budget for the switch power available to all RJ 45 ports the port PoE operating mode power allocation priority and the maximum power allocated to each port If the power demand from devices connected to the switch exceeds the power budget the switch uses port power priority settings to limit the supplied power COMMAND USAGE The switch can provide DC power to a wide range of connected devices eliminating the need
125. Loop Protection Enables loopback detection globally on the switch Default Disabled Loopback detection must be enabled globally for the switch and enabled for a specific port for this function to take effect Transmission Time The transmission interval for loopback detection control frames Range 1 10 seconds Shutdown Time The interval to wait before the switch automatically releases an interface from shutdown state Range 1 604 800 seconds or 0 to disable automatic recovery If the recovery time is set to zero any ports placed in shutdown state will remain in that state until the switch is reset 125 CHAPTER 4 Configuring the Switch Configuring Loop Protection When the loop protection mode is changed any ports placed in shutdown state by the loopback detection process will be immediately restored to operation regardless of the remaining recover time Port Configuration Port Port identifier Enable Enables loopback detection on a port Default Enabled Action Configures the response to take when a loop is detected on a port Options Shutdown Port Shutdown Port and Log Log Only Tx Mode Controls whether the port is actively generating loop protection PDUs or whether it is just passively looking for looped PDUs Default Enabled WEB INTERFACE To configure loop protection 1 2 4 Click Advanced Configuration Loop Protection Enable loop protection globally and
126. Members 6 7 40 14 12 13 44 95 96 47 18 19 20 21 22 25 26 27 28 29 90 34 132133 34 35 36 37 3839 40 41 42 43 44 45 46 47 48 49 50 CCCP CCPC CCC CCC orc cciciciciticcccsiliocccericiticiticccic CONFIGURING IP SUBNET BASED VLANS Use the IP Subnet based VLAN Membership Configuration page to map untagged ingress frames to a specified VLAN if the source address is found in the IP subnet to VLAN mapping table When using port based classification all untagged frames received by a port are classified as belonging to the VLAN whose VID PVID is associated with that port When IP subnet based VLAN classification is enabled the source address of untagged ingress frames are checked against the IP subnet to VLAN mapping table If an entry is found for that subnet these frames are assigned to the VLAN indicated in the entry If no IP subnet is matched the untagged frames are classified as belonging to the receiving port s VLAN ID PVID PATH Advanced Configuration VCL IP Subnet based VLAN COMMAND USAGE Each IP subnet can be mapped to only one VLAN ID An IP subnet consists of an IP address and a mask The specified VLAN need not be an existing VLAN When an untagged frame is received by a port the source IP address is checked against the IP subnet to VLAN mapping table and if an entry is found the corresponding VLAN ID is assigned to the frame If no mapping is found the PVID of the receiving port is assig
127. NIN OO Gn es Be ww Nne oo x e CIECIES o o o o0o 0 0 0 jejeli Ee S Ie ASEAN Save II Reset I Cancel CONFIGURING PORT Use the QoS Port DSCP Configuration page to configure ingress translation DSCP TRANSLATION AND REWRITING and classification settings and egress re writing of DSCP values PATH Advanced Configuration QoS Port DSCP PARAMETERS These parameters are displayed Port Port identifier Ingress Translate Enables ingress translation of DSCP values based on the specified classification method Ingress Classify Specifies the classification method A95 CHAPTER 4 Configuring the Switch Quality of Service Disable No Ingress DSCP Classification is performed DSCP O0O Classify if incoming DSCP is 0 Selected Classify only selected DSCP for which classification is enabled in DSCP Translation table see page 198 All Classify all DSCP Egress Rewrite Configures port egress rewriting of DSCP values Disable Egress rewriting is not performed Enable Egress rewriting is performed without remapping Remap DP Aware Frame with DSCP from analyzer is remapped and remarked with the remapped DSCP value Depending on the frame s DP level the remapped DSCP value is either taken from the DSCP Translation table Egress Remap DPO or DP1 field see page 198 Remap DP Unaware Frame with DSCP from analyzer is remapped and remarked with
128. P port 514 UDP is a connectionless protocol and does not provide acknowledgments The syslog packet will always be sent out even if the syslog server does not exist PARAMETERS These parameters are displayed Server Mode Enables disables the logging of debug or error messages to the remote logging process Default Disabled Server Address Specifies the IPv4 address or alias of a remote server which will be sent syslog messages Syslog Level Limits log messages that are sent to the remote syslog server for the specified types Messages options include the following Info Send informations warnings and errors Default setting Warning Send warnings and errors Error Send errors WEB INTERFACE To configure the logging of error messages to remote servers 1 Click Configuration System Log 2 Enable remote logging enter the IP address of the remote server and specify the type of syslog messages to send 3 Click Apply Figure 8 Configuring Settings for Remote Logging of Error Messages System Log Configuration Server Address Syslog Level Info 53 CHAPTER 4 Configuring the Switch Configuring Power Reduction CONFIGURING POWER REDUCTION The switch provides power saving methods including powering down the circuitry for port queues when not in use REDUCING POWER TO IDLE QUEUE CIRCUITS Use the EEE Configuration page to configure Energy Efficient Ethernet EEE for specified
129. P support system capabilities but the CDP capabilities cover capabilities that are not part of LLDP These capabilities are shown as others in the LLDP neighbors table If all ports have CDP awareness disabled the switch forwards CDP frames received from neighbor devices If at least one port has CDP awareness enabled all CDP frames are terminated by the switch When CDP awareness for a port is disabled the CDP information is not removed immediately but will be removed when the hold time is exceeded Optional TLVs Configures the information included in the TLV field of advertised messages Port Descr The port description is taken from the ifDescr object in RFC 2863 which includes information about the manufacturer the product name and the version of the interface hardware software Sys Name The system name is taken from the sysName object in RFC 3418 which contains the system s administratively assigned name To configure the system name see page 45 Sys Descr The system description is taken from the sysDescr object in RFC 3418 which includes the full name and version identification of the system s hardware type software operating system and networking software Sys Capa The system capabilities identifies the primary function s of the system and whether or not these primary functions are enabled The information advertised by this TLV is described in IEEE 802 1AB Mgmt Addr The management addre
130. PAN destination port monitoring the RSPAN VLAN as shown in the figure below 208 CHAPTER 4 Configuring the Switch Configuring Remote Port Mirroring Figure 91 Configuring Remote Port Mirroring Intermediate Switch RPSAN VLAN SSR r L E A AEA Uplink Port Uplink Port Destination Switch Source Switch GSS Aa ARERR LLR A imi cm em wf CMAR AARAA Uplink Port Destination Port Source Port Uplink Port Ingress or egress traffic Tagged or untagged traffic is mirrored onto the RSPAN By from the RSPAN VLAN is VLAN from here wy analyzed at this port PATH Basic Advanced Configuration Mirroring amp RSPAN COMMAND USAGE Configuration Guidelines Take the following step to configure an RSPAN session 1 Set up the source switch on the Mirroring amp RSPAN configuration page by specifying the switch s Type Source the RSPAN VLAN ID the Reflector port4 through which mirrored traffic is passed on to the RSPAN VLAN the traffic type to monitor Rx Tx or Both on the source port s and the intermediate or uplink ports 2 Set up all intermediate switches on the RSPAN configuration page specifying the switch type Intermediate the RSPAN VLAN and the intermediate ports 3 Set up the destination switch on the Mirroring amp RSPAN configuration page by speci
131. PHY auto negotiation is supported by the link partner 270 CHAPTER 5 Monitoring the Switch Displaying LLDP Information Auto negotiation Status Auto negotiation status identifies if auto negotiation is currently enabled at the link partner If Auto negotiation is supported and Auto negotiation status is disabled the 802 3 PMD operating mode will be determined the operational MAU type field value rather than by auto negotiation Auto negotiation Capabilities Shows the link partners MAC PHY capabilities MAU Type The operational MAU type of the sending device WEB INTERFACE To display information about LLDP MED neighbors click Monitor LLDP LLDP MED Neighbors Figure 140 LLDP MED Neighbor Information LLDP MED Neighbour Information Device Type Capabilities Network Connectivity LLDP MED Capabilities Network Policy Location Identification Extended Power via MDI PSE Inventory Location Country code TW Supported Enabled 10BaseFP Passive fiber MAU DISPLAYING LLDP Use the LLDP Neighbor Power Over Ethernet Information page to display NEIGHBOR PoE the status of all LLDP PoE neighbors including power device type PSE or INFORMATION PDP Source of power power priority and maximum required power PATH Monitor LLDP PoE PARAMETERS These parameters are displayed Local Port The port on this switch which received the LLDP frame Power Type Shows whether the device is a Power Sourcing
132. PORT STATISTICS Conflict Displays QCE status It may happen that resources required to add a QCE may not available in that case it shows conflict status as Yes otherwise it is always shows No Please note that conflict can be resolved by releasing the resource required by the QCE and pressing Refresh button WEB INTERFACE To display the show the status of QCE entries 1 Click Monitor Ports QCL Status 2 Select the user type to display from the drop down list at the top of the page 3 If any of the entries display a conflict click Resolve Conflict to release the resource required by a QCE Then click Refresh to verify that the conflict has been resolved Figure 104 QoS Control List Status QoS Control List Status Combined Y Auto refresh Resolve Conflict Refresh SA Tain Se No entries Use the Detailed Port Statistics page to display detailed statistics on network traffic This information can be used to identify potential problems with the switch such as a faulty port or unusually heavy loading All values displayed have been accumulated since the last system reboot and are shown as counts per second Statistics are refreshed every 60 seconds by default PATH Monitor Ports Detailed Statistics PARAMETERS These parameters are displayed Receive Transmit Total Packets The number of received and transmitted packets good and bad Octets The number of received and transmit
133. PS Configuration Enabled BCE cic Disabled Y FILTERING IP Use the Access Management Configuration page to create a list of up to 16 ADDRESSES FOR IP addresses or IP address groups that are allowed management access to MANAGEMENT ACCESS the switch through the web interface or SNMP or Telnet The management interfaces are open to all IP addresses by default Once you add an entry to a filter list access to that interface is restricted to the specified addresses If anyone tries to access a management interface on the switch from an invalid address the switch will reject the connection PATH Advanced Configuration Security Switch Access Management PARAMETERS These parameters are displayed Mode Enables or disables filtering of management access based on configured IP addresses Default Disabled Start IP Address The starting address of a range End IP Address The ending address of a range HTTP HTTPS Filters IP addresses for access to the web interface over standard HTTP or over HTTPS which uses the Secure Socket Layer SSL protocol to provide an encrypted connection SNMP Filters IP addresses for access through SNMP TELNET SSH Filters IP addresses for access through Telnet or through Secure Shell which provides authentication and encryption WEB INTERFACE To configure addresses allowed access to management interfaces on the switch 1 Click Advanced Configuration Security Switch
134. PTER 4 Configuring the Switch IGMP Snooping passing between multicast clients and servers and dynamically configure the switch ports which need to forward multicast traffic Multicast routers use information from IGMP snooping and query reports along with a multicast routing protocol such as DVMRP or PIM to support IP multicasting across the Internet PATH Advanced Configuration IPMC IGMP Snooping Basic Configuration PARAMETERS These parameters are displayed Global Configuration Snooping Enabled When enabled the switch will monitor network traffic to determine which hosts want to receive multicast traffic Default Enabled This switch can passively snoop on IGMP Query and Report packets transferred between IP multicast routers switches and IP multicast host groups to identify the IP multicast group members It simply monitors the IGMP packets passing through it picks out the group registration information and configures the multicast filters accordingly Unregistered IPMC Flooding Enabled Floods unregistered multicast traffic into the attached VLAN Default Disabled Once the table used to store multicast entries for IGMP snooping is filled no new entries are learned If no router port is configured in the attached VLAN and Unregistered IPMC Flooding is disabled any subsequent multicast traffic not found in the table is dropped otherwise it is flooded throughout the VLAN IGMP SSM Range The Sourc
135. RFACE To configure DSCP translation or re mapping 1 Click Advanced Configuration QoS DSCP Translation 2 Set the required ingress translation and egress re mapping parameters 3 Click Save Figure 84 Configuring DSCP Translation and Re mapping DSCP Translation Ingress Egress Translate Classify Remap lt gt 0 BE i 4 0 BE fo BE JU JUTE 4 x 4 jjaja sicst 8 cst 9 E 7 10 AF11 10 AF11 z 1 In 12 AF12 12 AF12 13 p 14 AF13 14 AF13 15 15 16 cs2 16 cs2 17 i7 Af f a se wc Wiht 7 2x jla lla lla Ai 0a 0 00 0 0 0 0 0 0 0 0 000000 17 198 CONFIGURING DSCP CLASSIFICATION CONFIGURING QoS CONTROL LISTS CHAPTER 4 Configuring the Switch Quality of Service Use the DSCP Classification page to map DSCP values to a QoS class and drop precedence level PATH Advanced Configuration QoS DSCP Classification PARAMETERS These parameters are displayed QoS Class Shows the mapping options for QoS class values DSCP DSCP value Range 0 63 WEB INTERFACE To map DSCP values to a QoS class 1 Click Advanced Configuration QoS DSCP Classification 2 Map key DSCP values to a corresponding QoS class 3 Click Save Figure 85 Mapping DSCP to QoS DSCP Classification lt gt fo 66 0 BE 0 BE 0 BE 0 BE 0 BE 0 BE 0 BE _Save _Reset 4ii z z z
136. RL that you specify in your browser https device port number When you start HTTPS the connection is established in this way The client authenticates the server using the server s digital certificate The client and server negotiate a set of security protocols to use for the connection The client and server generate session keys for encrypting and decrypting data The client and server establish a secure encrypted connection A padlock icon should appear in the status bar for Internet Explorer 5 x or above and Mozilla Firefox 2 0 0 0 or above The following web browsers and operating systems currently support HTTPS Table 5 HTTPS System Support Web Browser Operating System Internet Explorer 5 0 or later Windows 98 NT with service pack 6a Windows 2000 XP Vista 7 8 Mozilla Firefox 2 0 0 0 or later Windows 2000 XP Vista 7 8 Linux PARAMETERS These parameters are displayed Mode Enables HTTPS service on the switch Default Enabled Automatic Redirect Sets the HTTPS redirect mode operation When enabled management access to the HTTP web interface for the switch are automatically redirected to HTTPS Default Disabled WEB INTERFACE To configure HTTPS 1 Click Advanced Configuration HTTPS 2 Enable HTTPS if required and set the Automatic Redirect mode 3 Click Save 65 CHAPTER 4 Configuring the Switch Configuring Security Figure 17 HTTPS Configuration HTT
137. Received Received Received Received Router Port 1 2 3 4 5 2600 CHAPTER 5 Monitoring the Switch Showing MLD Snooping Information SHOWING MLD SNOOPING GROUP INFORMATION SHOWING IPV6 SFM INFORMATION Use the MLD Snooping Group Information page to display the port members of each service group PATH Monitor IPMC MLD Snooping Group Information PARAMETERS These parameters are displayed VLAN ID VLAN Identifier Groups The IP address for a specific multicast service Port Members The ports assigned to the listed VLAN which propagate a specific multicast service WEB INTERFACE To display the port members of each service group click Monitor MLD Snooping Group Information Figure 137 MLD Snooping Group Information MLD Snooping Group Information Auto efresh Refresh lt lt gt gt Start from VLAN 1 and group address ff00 with 20 entries per page Port Members r y y 1 1 VLAN ID Groups 1 2 3 4 5 6 7 8 9 10 41 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 alas 42 43 44145146 47 48 49 50 E Use the MLD SFM Information page to display MLD Source Filtered Multicast information including group filtering mode include or exclude source address and type allow or deny PATH Monitor IPMC MLD Snooping IPv6 SFM Information PARAMETERS These parameters are displayed VLAN ID VLAN Identifier
138. Rx Q0 0 Tx a0 Rx Q1 0 1x1 Rx Q2 0 Tx a2 Rx Q3 Tx 03 Rx 04 Tx 04 Rx 05 Tx 05 Rx 06 0 Tx 06 Rx 07 0 Tx a7 Rx Drops 0 Tx Drops 0 Rx CRC Alignment 0 Tx Late Exc Coll 0 Rx Undersize 0 Rx Oversize Rx Fragments Rx Jabber Rx Filtered 228 CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings DISPLAYING INFORMATION ABOUT SECURITY SETTINGS DISPLAYING ACCESS MANAGEMENT STATISTICS You can use the Monitor Security menu to display statistics on management traffic security controls for client access to the data ports and the status of remote authentication access servers Use the Access Management Statistics page to view statistics on traffic used in managing the switch PATH Monitor Security Access Management Statistics USAGE GUIDELINES Statistics will only be displayed on this page if access management is enabled on the Access Management Configuration menu see page 66 and traffic matching one of the entries is detected PARAMETERS These parameters are displayed Interface Network protocols used to manage the switch Protocols HTTP HTTPS SNMP TELNET SSH Received Packets The number of management packets received Allowed Packets The number of management packets accepted Discarded Packets The number of management packets discarded WEB INTERFACE To display the information on management packets click Monitor System Access Management Statistic
139. Status 264 CHAPTER 5 Monitoring the Switch Showing MLD Snooping Information PARAMETERS These parameters are displayed Statistics VLAN ID VLAN Identifier Querier Version MLD version used by the switch when serving as the MLD querier Host Version MLD version used when used by this switch when serving as a host in MLD proxy mode Querier Status Shows the Querier status as ACTIVE or IDLE When enabled and selected through the bidding process the switch can serve as the Querier which is responsible for asking hosts if they want to receive multicast traffic Queries Transmitted The number of transmitted Querier messages Queries Received The number of received Querier messages V1 Reports Received The number of received MLD Version 1 reports V2 Reports Received The number of received MLD Version 2 reports Vi Leaves Received The number of received MLD Version 1 leave reports Router Port Port Port Identifier Status Ports connected to multicast routers may be dynamically discovered by this switch or statically assigned to an interface on this switch WEB INTERFACE To display MLD snooping status information click Monitor MLD Snooping Status Figure 136 MLD Snooping Status MLD Snooping Status Auto refresh Refresh Clear Statistics VLAN Querier Querier Queries Queries V1 Reports V2 Reports V1 Leaves ID Version Status Transmitted
140. T RELATED SETTINGS FOR MLD SNOOPING WEB INTERFACE To configure IGMP Snooping Port Group Filtering 1 Click Configuration IGMP Snooping Port Group Filtering 2 Click Add New Filtering Group to display a new entry in the table 3 Select the port to which the filter will be applied 4 Enter the IP address of the multicast service to be filtered 5 Click Save Figure 58 IGMP Snooping Port Group Filtering Configuration IGMP Snooping Port Group Filtering Configuration Delete Port Filtering Groups 1 v Multicast Listener Discovery MLD snooping operates on IPv6 traffic and performs a similar function to IGMP snooping for IPv4 That is MLD snooping dynamically configures switch ports to limit IPv6 multicast traffic so that it is forwarded only to ports with users that want to receive it This reduces the flooding of IPv6 multicast packets in the specified VLANs This switch supports MLD protocol version 1 MLDv1 control packets include Listener Query Listener Report and Listener Done messages equivalent to IGMPv2 query report and leave messages Remember that IGMP Snooping and MLD Snooping are independent functions and can therefore both function at the same time Use the MLD Snooping Configuration page to configure global and port related settings which control the forwarding of multicast traffic Based on the MLD query and report messages the switch forwards traffic only to the ports that request multicast
141. These parameters are displayed VLAN ID VLAN Identifier 155 CHAPTER 4 Configuring the Switch MLD Snooping Snooping Enabled When enabled the switch will monitor network traffic on the indicated VLAN interface to determine which hosts want to receive multicast traffic Default Disabled When MLD snooping is enabled globally the per VLAN interface settings for MLD snooping take precedence When MLD snooping is disabled globally snooping can still be configured per VLAN interface but the interface settings will not take effect until snooping is re enabled globally MLD Querier When enabled the switch can serve as the MLDv2 Querier if selected in the bidding process with other competing multicast routers switches and if selected will be responsible for asking hosts if they want to receive multicast traffic Default Disabled A router or multicast enabled switch can periodically ask their hosts if they want to receive multicast traffic If there is more than one router switch on the LAN performing IP multicasting one of these devices is elected querier and assumes the role of querying the LAN for group members It then propagates the service requests on to any upstream multicast router switch to ensure that it will continue to receive the multicast service An IPv6 address must be configured on the VLAN interface from which the querier will act if elected When serving as the querier the switch uses
142. To configure System Information 1 Click Configuration System Information 2 Specify the contact information for the system administrator as well as the name and location of the switch Click Save Figure 3 System Information Configuration System Information Configuration System Contact System Name GEP 5070 System Location LevelOne 2 ABS CHAPTER 4 Configuring the Switch Setting an IP Address SETTING AN IP ADDRESS SETTING AN IPv4 ADDRESS This section describes how to configure an IP interface for management access to the switch over the network This switch supports both IP Version 4 and Version 6 and can be managed simultaneously through either of these address types You can manually configure a specific IPv4 or IPv6 address or direct the switch to obtain an IPv4 address from a DHCP server when it is powered on An IPv6 address can either be manually configured or dynamically generated Use the IP Configuration page to configure an IPv4 address for the switch The IP address for the switch is obtained via DHCP by default for VLAN 1 To manually configure an address you need to change the switch s default settings to values that are compatible with your network You may also need to a establish a default gateway between the switch and management stations that exist on another network segment Note An IPv4 address for this switch is obtained via DHCP by default If the switch does not receive a res
143. VLANs COMMAND USAGE Source MAC addresses can be mapped to only one VLAN ID Configured MAC addresses cannot be broadcast or multicast addresses When MAC based and protocol based VLANs are both enabled priority is applied in this sequence and then port based VLANs last PARAMETERS These parameters are displayed MAC Address A source MAC address which is to be mapped to a specific VLAN The MAC address must be specified in the format xx xx XX XX XX XX VLAN ID VLAN to which ingress traffic matching the specified source MAC address is forwarded Range 1 4093 Port Members The ports assigned to this VLAN WEB INTERFACE To map a MAC address to a VLAN 1 2 3 4 5 Click Configuration VCL MAC based VLANs Enter an address in the MAC Address field Enter an identifier in the VLAN field Note that the specified VLAN need not already be configured Specify the ports assigned to this VLAN Click Save Figure 69 Configuring MAC Based VLANs MAC based VLAN Membership Configuration Autorefresh Refresh k lt gt gt Port Members Delete MAC Address VLAN ID 1 4 5 6 7 8 9 10 19 12 93 4 95 96 47 98 19 20 21 22 23 24 25 26 27 28 29 30 34 32 33 34 35 96 37 38 39 40 41 az as 44 45 46 47 48 49 50 w oos wrrrreereeereerererrerrerrereeererererereererereerererererererereeeeereeeeeeeee Add New Entry Sen Reset 178 PROTOCOL VLANS CONFIGUR
144. WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS 304 ACL ARP CoS DHCP DHCP OPTION 82 DHCP SNOOPING GLOSSARY Access Control List ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for certain IP or MAC i e Layer 2 information Address Resolution Protocol converts between IP addresses and MAC hardware addresses ARP is used to locate the MAC address corresponding to a given IP address This allows the switch to use IP addresses for routing decisions and the corresponding MAC addresses to forward packets from one hop to the next Class of Service is supported by prioritizing packets based on the required level of service and then placing them in the appropriate output queue Data is transmitted from the queues using weighted round robin service to enforce priority service and prevent blockage of lower level queues Priority may be set according to the
145. X LH 1000full 55 CHAPTER 4 Configuring the Switch Configuring Port Connections Note The 1000BASE T standard does not support forced mode Auto negotiation should always be used to establish a connection over any 1000BASE T port or trunk If not used the success of the link process cannot be guaranteed when connecting to other types of switches Flow Control Flow control can eliminate frame loss by blocking traffic from end stations or segments connected directly to the switch when its buffers fill When enabled back pressure is used for half duplex operation and IEEE 802 3 2005 formally IEEE 802 3x for full duplex operation Default Disabled When auto negotiation is used this parameter indicates the flow control capability advertised to the link partner When the speed and duplex mode are manually set the Current Rx field indicates whether pause frames are obeyed by this port and the Current Tx field indicates if pause frames are transmitted from this port Avoid using flow control on a port connected to a hub unless it is actually required to solve a problem Otherwise back pressure jamming signals may degrade overall performance for the segment attached to the hub Maximum Frame Size Sets the maximum transfer unit for traffic crossing the switch Packets exceeding the maximum frame size are dropped Range 9600 1518 bytes Default 9600 bytes Excessive Collision Mode Sets the response to
146. a method for detecting VoIP traffic either OUI or LLDP 802 1ab MSTP must be disabled before the Voice VLAN is enabled see Configuring Global Settings for STA on page 129 or the Voice VLAN port mode is set to Auto or Forced This prevents the spanning tree s ingress filter from dropping VoIP traffic tagged for the Voice VLAN 184 CHAPTER 4 Configuring the Switch Managing VoIP Traffic When OUI is selected be sure to configure the MAC address ranges in the Telephony OUI list Forced The Voice VLAN feature is enabled on the port Security Enables security filtering that discards any non VoIP packets received on the port that are tagged with the voice VLAN ID VoIP traffic is identified by source MAC addresses configured in the Telephony OUI list or through LLDP which is used to discover VoIP devices attached to the switch Packets received from non VoIP sources are dropped Default Disabled Discovery Protocol Selects a method to use for detecting VoIP traffic on the port Default OUI m OUI Traffic from VoIP devices is detected by the Organizationally Unique Identifier OUI of the source MAC address OUI numbers are assigned to manufacturers and form the first three octets of a device MAC address MAC address OUI numbers must be configured in the Telephony OUI list so that the switch recognizes the traffic as being from a VoIP device LLDP Uses LLDP IEEE 802 1ab to discover VoIP devices
147. achine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or 302 APPENDIX C License Information The GNU General Public License b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of physically performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as to the offer to distribute corresponding source code This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the executable However as a special exception the source code distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executabl
148. actory default set at the last bootup When the NTP client is enabled the switch periodically sends a request for a time update to a configured time server You can configure up to five time server IP addresses The switch will attempt to poll each server in the configured sequence PATH Basic Advanced Configuration System NTP PARAMETERS These parameters are displayed Mode Enables or disables NTP client requests Server Sets the IPv4 or IPv6 address for up to five time servers The switch attempts to update the time from the first server if this fails it attempts an update from the next server in the sequence The polling interval is fixed at 15 minutes WEB INTERFACE To configure the NTP servers 1 Click Configuration System NTP 2 Enter the IP address of up to five time servers 3 Click Save Figure 6 NTP Configuration NTP Configuration 50s CHAPTER 4 Configuring the Switch Configuring the Time Zone and Daylight Savings Time CONFIGURING THE TIME ZONE AND DAYLIGHT SAVINGS TIME Use the Time Zone and Daylight Savings Time page to set the time zone and Daylight Savings Time Time Zone NTP SNTP uses Coordinated Universal Time or UTC formerly Greenwich Mean Time or GMT based on the time at the Earth s prime meridian zero degrees longitude which passes through Greenwich England To display a time corresponding to your local time you must indicate the number of hours and minutes
149. advertise the multitude of network policies that frequently run on an aggregated link interior to the LAN Policy ID ID for the policy This is auto generated and will be used when selecting the polices that will be mapped to the specific ports Application Type Intended use of the application types Voice For use by dedicated IP Telephony handsets and other similar appliances supporting interactive voice services These devices are typically deployed on a separate VLAN for ease of deployment and enhanced security by isolation from data applications Voice Signaling conditional For use in network topologies that require a different policy for the voice signaling than for the voice media This application type should not be advertised if all the same network policies apply as those advertised in the Voice application policy Guest Voice Support a separate limited feature set voice service for guest users and visitors with their own IP Telephony handsets and other similar appliances supporting interactive voice services m Guest Voice Signaling conditional For use in network topologies that require a different policy for the guest voice signaling than for the guest voice media This application type should not be advertised if all the same network policies apply as those advertised in the Guest Voice application policy Softphone Voice For use by softphone applications on typical data centric devices s
150. al Port Power Type Power Source Power Priority Maximum Power 6 PSE Device Primary Power Supply Low 0 w Use the LLDP Neighbors EEE Information page to displays Energy Efficient Ethernet information advertised through LLDP messages PATH Monitor LLDP EEE PARAMETERS These parameters are displayed Local Port The port on this switch which received the LLDP frame Tx Tw The link partner s maximum time that the transmit path can hold off sending data after de assertion of Lower Power Idle LPI mode Tw indicates Wake State Time Rx Tw The link partner s time the receiver would like the transmitter to hold off to allow time for it to wake from sleep Fallback Receive Tw The link partner s fallback receive Tw A receiving link partner may inform the transmitter of an alternate desired Tw_sys_tx Since a receiving link partner is likely to have discrete levels for savings this provides the transmitter with additional information that it may use for a more efficient allocation Systems that do not implement this option use a default that is the same as that of the Receive Tw_sys_tx Refer to IEEE 802 3az for further information on these system variables Echo Tx Tw The link partner s Echo Tx Tw value RIA DISPLAYING LLDP PORT STATISTICS CHAPTER 5 Monitoring the Switch Displaying LLDP Information The respective echo values shall be defined as the local link partner s reflection echo
151. alue Options Any specific value of 0 63 BE CS1 CS7 EF or AFi1 AF43 or Range Default Any Sport Source TCP UDP port Any Specific Range 0 65535 Dport Destination TCP UDP port Any Specific Range 0 65535 Action Parameters Indicates the classification action taken on ingress frame if the configured parameters are matched in the frame s content If a frame matches the QCE the following actions will be taken Class Classified QoS Class If a frame matches the QCE it will be put in the queue corresponding to the specified QoS class or placed in 202 CHAPTER 4 Configuring the Switch Quality of Service a queue based on basic classification rules Options 0 7 Default use basic classification Default setting 0 DPL The drop precedence level will be set to the specified value or left unchanged Options 0 1 Default Default setting Default DSCP The DSCP value will be set to the specified value or left unchanged Options 0 63 BE CS1 CS7 Default not changed Default setting Default WEB INTERFACE To configure QoS Control Lists 1 Click Advanced Configuration QoS QoS Control List 2 Click the button to add a new QCE or use the other QCE modification buttons to specify the editing action i e edit delete or moving the relative position of entry in the list 3 When editing an entry on the QCE Configuration page specify the relevant criteria to be matched and
152. anually configured as a member of the MVR VLAN see Assigning Ports to VLANs on page 173 Receiver A subscriber port that can receive multicast data sent through the MVR VLAN Any port configured as a receiver port will be dynamically added to the MVR VLAN when it forwards an IGMP report or join message from an attached host requesting any of the designated multicast services supported by the MVR VLAN Immediate Leave Setting Port Port identifier Immediate Leave Configures the switch to immediately remove an interface from a multicast stream as soon as it receives a leave message for that group This option only applies to an interface configured as an MVR receiver Just remember that only IGMP version 2 or 3 hosts can issue multicast leave messages If a version 1 host is receiving multicast traffic the 142 CHAPTER 4 Configuring the Switch Multicast VLAN Registration switch can only remove the interface from the multicast stream after the host responds to a periodic request for a membership report Note that immediate leave should only be enabled on receiver ports to which only one subscriber is attached Otherwise service to other active receivers will be affected WEB INTERFACE To configure global and interface settings for MVR 1 Click Advanced Configuration MVR 2 Enable MVR globally on the switch 3 Click Add New MVR VLAN enter MVR VLAN ID set the operating mode to control whether o
153. are received from an outside source DHCP snooping is used to filter DHCP messages received on a non secure interface from outside the network or fire wall When DHCP snooping is enabled globally and enabled on a VLAN interface DHCP messages received on an untrusted interface from a device not listed in the DHCP snooping table will be dropped Table entries are only learned for trusted interfaces An entry is added or removed dynamically to the DHCP snooping table when a client receives or releases an IP address from a DHCP server Each entry includes a MAC address IP address lease time VLAN identifier and port identifier When DHCP snooping is enabled DHCP messages entering an untrusted interface are filtered based upon dynamic entries learned via DHCP snooping Filtering rules are implemented as follows If the global DHCP snooping is disabled all DHCP packets are forwarded If DHCP snooping is enabled globally all DHCP packets are forwarded for a trusted port If the received packet is a DHCP ACK message a dynamic DHCP snooping entry is also added to the binding table If DHCP snooping is enabled globally but the port is not trusted it is processed as follows If the DHCP packet is a reply packet from a DHCP server including OFFER ACK or NAK messages the packet is dropped If a DHCP DECLINE or RELEASE message is received from a client the switch forwards the packet only if the corresponding entry i
154. arned addresses and the maximum number of secure addresses allowed Port Shows the entries authorized by port security services Zo including MAC address VLAN ID the service state time added to table age and hold state NAS Shows global and port settings for IEEE 802 1X Switch Shows port status for authentication services including 232 802 1X security state last source address used for authentication and last ID Port Displays authentication statistics for the selected port 233 either for 802 1X protocol or for the remote authentication server depending on the authentication method ACL Status Shows the status for different security modules which use 237 ACL filtering including ingress port frame type and forwarding action sA CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface Table 4 Main Menu Continued Menu Description Page DHCP Dynamic Host Configuration Protocol Snooping Shows statistics for various types of DHCP protocol packets 239 Statistics Relay Displays server and client statistics for packets affected by 240 Statistics the relay information policy ARP Inspection Displays entries in the ARP inspection table sorted first by 241 port then VLAN ID MAC address and finally IP address IP Source Guard Displays entries in the IP Source Guard table sorted first by 242 port then VLAN ID MAC address and finally IP address AAA Authentication Authorization and Accounting 243 RADIUS
155. as GMRP Frame Type Sets the interface to accept all frame types including tagged or untagged frames only tagged frames or only untagged frames When set to receive all frame types any received frames that are untagged are assigned to the default VLAN When set to receive only tagged frames all untagged frames received on the interface are discarded Option All Tagged Untagged Default All Port VLAN Mode Determines how to process VLAN tags for ingress and egress traffic Options None Specific Default Specific None The ID for the VLAN to which this frame has been assigned is inserted in frames transmitted from the port The assigned VLAN ID can be based on the ingress tag for tagged frames or the default PVID for untagged ingress frames Note that this mode is normally used for ports connected to VLAN aware switches Specific A Port VLAN ID can be configured as described below Untagged frames received on the port are classified to the Port VLAN ID If Port Type is Unaware all frames received on the port 175 CHAPTER 4 Configuring the Switch IEEE 802 1Q VLANs are classified to the Port VLAN ID If the classified VLAN ID of a frame transmitted on the port is different from the Port VLAN ID a VLAN tag with the classified VLAN ID is inserted in the frame When forwarding a frame from this switch along a path that contains any VLAN aware devices the switch should include VLAN tags When forwardi
156. ath to the root bridge Topology Flag The current state of the Topology Change Notification flag TCN for this bridge instance Topology Change Last Time since the Spanning Tree was last reconfigured STP Detailed Bridge Status Click on a bridge instance under the MSTI field to display detailed information on the selected entry The following additional information is displayed Bridge Instance The Bridge instance CIST MST1 Regional Root The Bridge ID of the currently elected regional root bridge inside the MSTP region of this bridge This parameter only applies to the CIST instance 255 CHAPTER 5 Monitoring the Switch Displaying Information on the Spanning Tree Internal Root Cost The Regional Root Path Cost For the Regional Root Bridge this is zero For all other CIST instances in the same MSTP region it is the sum of the Internal Port Path Costs on the least cost path to the Internal Root Bridge This parameter only applies to the CIST instance Topology Change Count The number of times the Spanning Tree has been reconfigured during a one second interval CIST Ports amp Aggregations State Port Port Identifier Port ID The port identifier as used by the RSTP protocol This consists of the priority part and the logical port index of the bridge port Role Roles are assigned according to whether the port is part of the active topology connecting the bridge
157. ation which in turn causes the switch to open up or block traffic for that particular client using the Port Security module Only then will frames from the client be forwarded on the switch There are no EAPOL frames involved in this authentication and therefore MAC based Authentication has nothing to do with the 802 1X standard The advantage of MAC based authentication over port based 802 1X is that several clients can be connected to the same port e g through a 3rd party switch or a hub and still require individual authentication and that the clients don t need special supplicant software to authenticate The advantage of MAC based authentication over 802 1X based authentication is that the clients don t need special supplicant software to authenticate The disadvantage is that MAC addresses can be spoofed by malicious users equipment whose MAC address is a valid RADIUS user can be used by anyone Also only the MD5 Challenge method is supported The maximum number of clients that can be attached to a port can be limited using the Port Security Limit Control functionality Further Guidelines for Port Admin State Port Admin state can only be set to Force Authorized for ports participating in the Spanning Tree algorithm see page 135 m When 802 1X authentication is enabled on a port the MAC address learning function for this interface is disabled and the addresses dynamically learned on this port are removed from the common ad
158. attached to the port LLDP checks that the telephone bit in the system capability TLV is turned on See Link Layer Discovery Protocol for more information on LLDP Both Both OUI table lookup and LLDP are used to detect VoIP traffic on a port This option only works when the detection mode is set to Auto LLDP should also be enabled before setting the discovery protocol to LLDP or Both Note that changing the discovery protocol to OUI or LLDP will restart auto detection process WEB INTERFACE To configure VoIP traffic settings 1 2 Click Advanced Configuration Voice VLAN Configuration Configure any required changes to the VoIP settings for the switch or for a specific port Click Save 185 CHAPTER 4 Configuring the Switch Managing VoIP Traffic CONFIGURING TELEPHONY OUI Figure 73 Configuring Global and Port Settings for a Voice VLAN Voice VLAN Configuration VLAN ID 1000 Ove cme 86400 seconds UCULASEEJ 7 High x Port Configuration Port Mode Security Discovery Protocol gt 5 Disabled Use the Voice VLAN OUI Table to identify VoIP devices attached to the switch VoIP devices can be identified by the manufacturer s Organizational Unique Identifier OUI in the source MAC address of received packets OUI numbers are assigned to manufacturers and form the first three octets of device MAC addresses The MAC OUI numbers for VoIP equipme
159. b Browser Interface Table 4 Main Menu Continued Menu Description Page WRED Sets drop probabilities for congested queues 205 Congestion Prevents traffic from being forwarded if destination portis 206 Management congested Mirroring amp RSPAN2 Sets source and target ports for local or remote mirroring 207 UPnP Enables UPNP and defines timeout values 213 sFlow Samples traffic flows and forwards data to designated 214 collector Monitor 219 System 219 Information Displays basic system description switch s MAC address 219 system time and software version CPU Load Displays graphic scale of CPU utilization 220 Log Displays logged messages based on severity 221 Detailed Log Displays detailed information on each logged message 223 Ports 223 State Displays a graphic image of the front panel indicating active 223 port connections Traffic Overview Shows basic Ethernet port statistics 224 QoS Statistics Shows the number of packets entering and leaving the 224 egress queues QCL Status Shows the status of QoS Control List entries 225 Detailed Statistics Shows detailed Ethernet port statistics 226 Security 229 Access Displays the number of packets used to manage the switch 229 Management via HTTP HTTPS and SNMP Telnet and SSH Statistics Network Port Security Switch Shows information about MAC address learning for each 230 port including the software module requesting port security services the service state the current number of le
160. ble or client right most table Possible retransmissions are not counted 235 CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings Last Supplicant Info MAC Address The MAC address of the last supplicant client VLAN ID The VLAN ID on which the last frame from the last supplicant client was received Version 802 1X based The protocol version number carried in the most recently received EAPOL frame MAC based Not applicable Identity m 802 1X based The user name supplicant identity carried in the most recently received Response Identity EAPOL frame MAC based Not applicable Selected Counters This table is visible when the port is one of the following administrative states Multi 802 1X or MAC based Auth The table is identical to and is placed next to the Port Counters table and will be empty if no MAC address is currently selected To populate the table select one of the attached MAC Addresses from the table Attached MAC Addresses Identity Shows the identity of the supplicant as received in the Response Identity EAPOL frame Clicking the link causes the supplicant s EAPOL and Backend Server counters to be shown in the Selected Counters table If no supplicants are attached it shows No supplicants attached This column is not available for MAC based Auth MAC Address For Multi 802 1X this column holds the MAC address of the a
161. c Advanced Configuration VLANs VLAN Membership PARAMETERS These parameters are displayed VLAN ID VLAN Identifier Range 1 4095 VLAN Name The name of a VLAN Range 1 32 alphanumeric characters Port Members Port identifier Port overlapping can be used to allow access to commonly shared network resources among different VLAN groups such as file servers or printers Note that if you implement VLANs which do not overlap but still need to communicate you must connect them through a router 173 CHAPTER 4 Configuring the Switch IEEE 802 1Q VLANs CONFIGURING VLAN ATTRIBUTES FOR PORT MEMBERS WEB INTERFACE To configure IEEE 802 1Q VLAN groups 1 Click Configuration VLANs VLAN Membership 2 Change the ports assigned to the default VLAN VLAN 1 if required 3 To configure a new VLAN click Add New VLAN enter the VLAN ID and then mark the ports to be assigned to the new group 4 Click Save Figure 66 VLAN Membership Configuration VLAN Membership Configuration Start fom VLAN 1 with 20 entries per page Delete VLAN ID VLAN Name 1 2 3 4 5 6 7 8 9 10 99 12 43 04 95 96 97 18 19 20 29 22 23 24 25 26 27 28 29 90 94 32 33 34 95 36 37 38 99 40 41 47 43 44 45 46 47 48 4950 r 1 da a aval a a al aa Add New VLAN Soe _Reset Use the VLAN Port Configuration page to configure VLAN attributes for specific interfaces inclu
162. cations This is the default for SNMPv3 Auth NoPriv SNMP communications use authentication but the data is not encrypted Auth Priv SNMP communications use both authentication and encryption Authentication Protocol The method used for user authentication Options None MD5 SHA Default MD5 Authentication Password A plain text string identifying the authentication pass phrase Range 1 32 characters for MD5 8 40 characters for SHA 293 amp CHAPTER 4 Configuring the Switch Configuring Security Privacy Protocol The encryption algorithm use for data privacy only 56 bit DES is currently available Options None DES Default DES Privacy Password A string identifying the privacy pass phrase Range 8 40 characters ASCII characters 33 126 only WEB INTERFACE To configure SNMPv3 users 1 Click Advanced Configuration Security Switch SNMP Users 2 Click Add new user to configure a user name 3 Enter a remote Engine ID of up to 64 hexadecimal characters 4 Define the user name security level authentication and privacy settings 5 Click Save Figure 21 SNMPv3 User Configuration SNMPv3 User Configuration Delete Engine ID Security Authentication Authentication Privacy Privacy s Level Protocol Password Protocol Password 800007e5017f000001 default_user NoAuth NoPriv None None None None l Add new user Save i Reset CONFIGURIN
163. ce networks UPnP achieves this by issuing UPnP device control protocols designed upon open Internet based communication standards COMMAND USAGE The first step in UPnP networking is discovery When a device is added to the network the UPnP discovery protocol allows that device to broadcast its services to control points on the network Similarly when a control point is added to the network the UPnP discovery protocol allows that control point to search for UPnP enabled devices on the network Once a control point has discovered a device its next step is to learn more about the device and its capabilities by retrieving the device s description from the URL provided by the device in the discovery message After a control point has retrieved a description of the device it can send actions to the device s service To do this a control point sends a suitable control message to the control URL for the service provided in the device description When a device is known to the control point periodic event notification messages are sent A UPnP description for a service includes a list of actions the service responds to and a list of variables that model the state of the service at run time If a device has a URL for presentation then the control point can retrieve a page from this URL load the page into a web browser and depending on the capabilities of the page allow a user to control the device and or view device status Using UPnP un
164. ch This interface will then join all the current multicast groups supported by the attached router switch to ensure that multicast traffic is passed to all appropriate interfaces within the switch Fast Leave Immediately deletes a member port of a multicast service if a leave packet is received at that port Default Disabled The switch can be configured to immediately delete a member port of a multicast service if a leave packet is received at that port and the Fast Leave function is enabled This allows the switch to remove a port from the multicast forwarding table without first having to send an IGMP group specific GS query to that interface If Fast Leave is not used a multicast router or querier will send a GS query message when an IGMPv2 v3 group leave message is received The router querier stops forwarding traffic for that group only if no host replies to the query within the specified timeout period If Fast Leave is enabled the switch assumes that only one host is connected to the interface Therefore Fast Leave should only be enabled on an interface if it is connected to only one IGMP enabled device either a service host or a neighbor running IGMP snooping Fast Leave is only effective if IGMP snooping is enabled and IGMPv2 or IGMPv3 snooping is used Fast Leave does not apply to a port if the switch has learned that a multicast router is attached to it Fast Leave can improve bandwidth usage for a network which
165. created through LACP Also note that only one set of interface configuration settings can be applied to all trunks Path Cost This parameter is used by the STA to determine the best path between devices Therefore lower values should be assigned to ports attached to faster media and higher values assigned to ports with slower media Path cost takes precedence over port priority By default the system automatically detects the speed and duplex mode used on each port and configures the path cost according to the values shown in Table 9 Table 10 and Table 11 Priority Defines the priority used for this port in the Spanning Tree Algorithm If the path cost for all ports on a switch are the same the port with the highest priority i e lowest value will be configured as an active link in the Spanning Tree This makes a port with higher priority less likely to be blocked if the Spanning Tree Algorithm is detecting network loops Where more than one port is assigned the highest priority the port with lowest numeric identifier will be enabled Range 0 240 in steps of 16 Default 128 WEB INTERFACE To configure settings for MSTP interfaces 1 Click Configuration Spanning Tree MIST Ports 2 Modify the required attributes 3 Click Save Figure 52 MSTI Port Configuration MST1 MSTI Port Configuration MSTI Aggregated Ports Configuration orl roncon Pi x 128 v MSTI Normal Ports Configuration Pon recon
166. cular Type Length Value TLV TLVs Discarded Each LLDP frame can contain multiple pieces of information known as TLVs If a TLV is malformed it is counted and discarded TLVs Unrecognized The number of well formed TLVs but with an unknown type value Org Discarded The number of organizational TLVs discarded Age Outs Each LLDP frame contains information about how long the LLDP information is valid age out time If no new LLDP frame is received within the age out time the LLDP information is removed and the Age Out counter is incremented 274 CHAPTER 5 Monitoring the Switch Displaying PoE Status WEB INTERFACE To display statistics on LLDP global counters and control frames click Monitor LLDP Port Statistics Figure 143 LLDP Port Statistics Global Counters Auto refresh Refresh Clear Neighbour entries were last changed at 1970 01 01702 45 50 00 00 1130 sec ago Total Neighbours Entries Added 2 Total Neighbours Entries Deleted f Total Neighbours Entries Dropped 0 Total Neighbours Entries Aged Out 0 LLDP Statistics Local Counters Locat Port Tx Frames Rx Frames Rx Errors Frames Discarded TLVs Discarded TLVs Unrecognized Org Discarded 1 69 68 0 0 0 0 0 0 0 0 0 0 0 0 2 0 3 359 0 0 4 0 0 0 5 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 DISPLAYING POE STATUS Use the Power Over Ethernet Status to display the status for all PoE ports including the PD c
167. de Controls whether Limit Control is enabled on this port Both this and the global Mode must be set to Enabled for Limit Control to be in effect Notice that other modules may still use the underlying port security features without enabling Limit Control on a given port 83 CHAPTER 4 Configuring the Switch Configuring Security Limit The maximum number of MAC addresses that can be secured on this port This number cannot exceed 1024 If the limit is exceeded the corresponding action is taken The switch is initialized with a total number of MAC addresses from which all ports draw whenever a new MAC address is seen on a Port Security enabled port Since all ports draw from the same pool it may happen that a configured maximum cannot be granted if the remaining ports have already used all available MAC addresses Action If Limit is reached the switch can take one of the following actions None Do not allow more than the specified Limit of MAC addresses on the port but take no further action Trap If Limit 1 MAC addresses is seen on the port send an SNMP trap If Aging is disabled only one SNMP trap will be sent but with Aging enabled new SNMP traps will be sent every time the limit is exceeded Shutdown If Limit 1 MAC addresses is seen on the port shut down the port This implies that all secured MAC addresses will be removed from the port and no new addresses will be learned Even if the link
168. der Windows XP To access or manage the switch with the aid of UPnP under Windows XP open My Network Places in the Explore file manager An entry for GEP 570 will appear in the list of discovered devices Double click on this entry to access the switch s web management 213 CHAPTER 4 Configuring the Switch Configuring sFlow interface Or right click on the entry and select Properties to display a list of device attributes advertised through UPnP PATH Advanced Configuration UPnP PARAMETERS These parameters are displayed Mode Enables disables UPnP on the device Default Disabled TTL Sets the time to live TTL value for UPnP messages transmitted by the switch Range 4 255 Default 4 Advertising Duration The duration carried in Simple Service Discover Protocol SSDP packets which informs a control point or control points how often it or they should receive a SSDP advertisement message from this switch Due to the unreliable nature of UDP the switch sends SSDP messages periodically at the interval one half of the advertising duration minus 30 seconds Range 100 86400 seconds Default 100 seconds WEB INTERFACE To configure UPnP 1 Click Configuration UPnP 2 Enable or disable UPnP then set the TTL and advertisement values 3 Click Save Figure 95 UPnP Configuration UPnP Configuration Disabled PVC m elm 100 Reset CONFIGURING SFLOW Use the sFlow Con
169. ders entering the Guest VLAN The interval between transmission of EAPOL Request Identity frames is configured with EAPOL Timeout If Allow Guest VLAN if EAPOL Seen is enabled the port will now be placed in the Guest VLAN If disabled the switch will first check its history to see if an EAPOL frame has previously been received on the port this history is cleared if the port link goes down or the port s Admin State is changed and if not the port will be placed in the Guest VLAN Otherwise it will not move to the Guest VLAN but continue transmitting EAPOL Request Identity frames at the rate given by EAPOL Timeout Once in the Guest VLAN the port is considered authenticated and all attached clients on the port are allowed access on this VLAN The switch will not transmit an EAPOL Success frame after entering the Guest VLAN While in the Guest VLAN the switch monitors the link for EAPOL frames and if one such frame is received the switch immediately takes the port out of the Guest VLAN and starts authenticating the supplicant according to the port mode If an EAPOL frame is received the port will never be able to go back into the Guest VLAN if the Allow Guest VLAN if EAPOL Seen is disabled Guest VLAN ID This is the value that a port s Port VLAN ID is set to if a port is moved into the Guest VLAN It is only changeable if the Guest VLAN option is globally enabled Range 1 4095 Max Reauth Count The number of times that
170. dex fo and Sample index fo with 20 entries per page Event T Index Logindex LogTime LogDescription No more entries e 251 CHAPTER 5 Monitoring the Switch Displaying Information on LACP DISPLAYING INFORMATION ON LACP Use the monitor pages for LACP to display information on LACP configuration settings the functional status of participating ports and statistics on LACP control packets DISPLAYING AN Use the LACP System Status page to display an overview of LACP groups OVERVIEW OF LACP GROUPS PATH Monitor LACP System Status PARAMETERS These parameters are displayed Aggr ID The Aggregation ID associated with this Link Aggregation Group LAG Partner System ID LAG partner s system ID MAC address Partner Key The Key that the partner has assigned to this LAG Last Changed The time since this LAG changed Local Ports Shows the local ports that are a part of this LAG WEB INTERFACE To display an overview of LACP groups active on this switch click Monitor LACP System Status Figure 122 LACP System Status LACP System Status Auto refresh L Agar ID Partner Last Local gg System ID Changed Ports No ports enabled or no existing partners DISPLAYING LACP Use the LACP Port Status page to display information on the LACP groups Port STATUS active on each port PATH Monitor LACP Port Status PARAMETERS These parameters are displayed Port Por
171. ding processing Queue in Queue frames with embedded tags enabling ingress filtering setting the accepted frame types and configuring the default VLAN identifier PVID PATH Basic Advanced Configuration VLANs Ports PARAMETERS These parameters are displayed Ethertype for Custom S ports When Port Type is set to S custom port the EtherType also called the Tag Protocol Identifier or TPID of all frames received on the port is changed to the specified value By default the EtherType is set to 0x88a8 IEEE 802 1ad IEEE 802 1ad outlines the operation of Queue in Queue tagging which allows a service provider to use a Virtual Bridged Local Area Network to provide separate VLAN instances to multiple independent customers over the same medium using double tagged frames When Port Type is set to S port or S custom port the port will change the EtherType of all frames received to indicate that double tagged frames are being forwarded across the switch The switch will pass these frames on to the VLAN indicated in the outer tag It will not strip the outer tag nor change any components of the tag other than the EtherType field Port Port identifier 174 CHAPTER 4 Configuring the Switch IEEE 802 1Q VLANs Port Type Configures how a port processes the VLAN ID in ingress frames Default Unaware C port For customer ports each frame is assigned to the VLAN indicated in the VLAN tag and the tag is removed
172. dress IP Address of the source The maximum number of IP source addresses available for filtering is 128 When there is no source filtering address None is shown in this field Type Indicates the Type either Allow or Deny Hardware Filter Switch Indicates whether the data plane destined to the specific group address from the source IPv4 address can be handled by the chip or not WEB INTERFACE To display MVR Source Filtered Multicast Information click Monitor MVR MVR SFM Information Figure 132 MVR SFM Information MVR SFM Information Auto refresh Refresh lt lt gt gt Start from VLAN 1 and Group Address with 20 entries per page VLAN ID Group Port Mode Source Address Type Hardware Filter Switch No more entries 261 CHAPTER 5 Monitoring the Switch Showing IGMP Snooping Information SHOWING IGMP SNOOPING INFORMATION SHOWING IGMP SNOOPING STATUS Use the IGMP Snooping pages to display IGMP snooping statistics port members of each service group and information on source specific groups Use the IGMP Snooping Status page to display IGMP querier status snooping statistics for each VLAN carrying IGMP traffic and the ports connected to an upstream multicast router switch PATH Monitor IPMC IGMP Snooping Status PARAMETERS These parameters are displayed Statistics VLAN ID VLAN Identifier Querier Version IGMP version used by the switch when serving as the
173. dress entries associated with the CPU and each port PATH Monitor MAC Address Table PARAMETERS These parameters are displayed Start from VLAN and MAC address with entries per page These input fields allow you to select the starting point in the table Type Indicates whether the entry is static or dynamic Dynamic MAC addresses are learned by monitoring the source address for traffic entering the switch To configure static addresses refer to Configuring the MAC Address Table on page 170 VLAN The VLAN containing this entry MAC Address Physical address associated with this interface Port Members The ports associated with this entry AO CHAPTER 5 Monitoring the Switch Displaying Information About VLANs WEB INTERFACE To display the address table click Monitor MAC Address Table Figure 145 MAC Address Table MAC Address Table Autorebesh T Rebesh Cear lt lt gt gt Start from VLAN t and MAC addeess 09 00 00 00 00 00 with 20 tetras per page Port Members Type VLAN MAC Address cpu 1 DISPLAYING INFORMATION ABOUT VLANS VLAN MEMBERSHIP Use the monitor pages for VLANs to display information about the port members of VLANs and the VLAN attributes assigned to each port Use the VLAN Membership Status page to display the current port members for all VLANs configured by a selected software module PATH Monitor VLANs VLAN Membership PARAMETERS These parameters ar
174. dress table m Authenticated MAC addresses are stored as dynamic entries in the switch s secure MAC address table Configured static MAC addresses are added to the secure address table when seen on a switch port see page 170 Static addresses are treated as authenticated without sending a request to a RADIUS server When port status changes to down all MAC addresses are cleared from the secure MAC address table Static VLAN assignments are not restored RADIUS Assigned QoS Enabled Enables or disables this feature for a given port Refer to the description of this feature under the System Configuration section RADIUS Assigned VLAN Enabled Enables or disables this feature for a given port Refer to the description of this feature under the System Configuration section O94 CHAPTER 4 Configuring the Switch Configuring Security Guest VLAN Enabled Enables or disables this feature for a given port Refer to the description of this feature under the System Configure section Port State The current state of the port Globally Disabled 802 1X and MAC based authentication are globally disabled This is the default state Link Down 802 1X or MAC based authentication is enabled but there is no link on the port Authorized The port is in Force Authorized mode or a single supplicant mode and the supplicant is authorized Unauthorized The port is in Force Unauthorized mode or a single supplicant mod
175. dvanced Configuration Security Switch Users Figure 11 Showing User Accounts Users Configuration Privilege Level admin 5 To configure a user account 1 Click Advanced Configuration Security Switch Users 2 Click Add new user 3 Enter the user name password and privilege level 4 Click Save Figure 12 Configuring User Accounts User Settings User Name Password Password again jj Privilege Level 1 l Save Il Reset I Cancel 2159 CHAPTER 4 Configuring the Switch Configuring Security CONFIGURING USER Use the Privilege Levels page to set the privilege level required to read or PRIVILEGE LEVELS configure specific software modules or system settings PATH Advanced Configuration Security Switch Privilege Levels PARAMETERS These parameters are displayed Group Name The name identifying a privilege group In most cases a privilege group consists of a single module e g LACP RSTP or QoS but a few groups contains more than one module The following describes the groups which contain multiple modules or access to various system settings System Contact Name Location Timezone Log Security Authentication System Access Management Port contains Dot1x port MAC based and the MAC Address Limit ACL HTTPS SSH ARP Inspection and IP source guard IP Everything except for ping Port Everything except for VeriPHY Diagnostics ping and VeriPHY Maintenance
176. e If the learning mode for a given port in the MAC Learning Table is grayed out another software module is in control of the mode so that it cannot be changed by the user An example of such a module is the MAC Based Authentication under 802 1X Static MAC Table Configuration VLAN ID VLAN Identifier Range 1 4095 MAC Address Physical address of a device mapped to a port A static address can be assigned to a specific port on this switch Static addresses are bound to the assigned port and will not be moved When a static address is seen on another port the address will be ignored and will not be written to the address table Port Members Port identifier WEB INTERFACE To configure the MAC Address Table 1 2 3 Click Configuration MAC Table Change the address aging time if required Specify the way in which MAC addresses are learned on any port AS CHAPTER 4 Configuring the Switch IEEE 802 1Q VLANs 4 Add any required static MAC addresses by clicking the Add New Static Entry button entering the VLAN ID and MAC address and marking the ports to which the address is to be mapped 5 Click Save Figure 65 MAC Address Table Configuration MAC Address Table Configuration Aging Configuration Auto FCC HGEREG amp G ows c cecceccecececcecccececercre cicicicicicicicicicicic Port Members Delete VLAN ID MAC Address 9 2 3 4 5 6 7 90 49 42 43 94 45 16 47 18 19 20
177. e 16 Figure 17 Figure 18 Figure 19 Figure 20 Figure 21 Figure 22 Figure 23 Figure 24 Figure 25 Figure 26 Figure 27 Figure 28 Figure 29 Figure 30 Figure 31 FIGURES Home Page Front Panel Indicators System Information Configuration IP Configuration IPv6 Configuration NTP Configuration Time Zone and Daylight Savings Time Configuration Configuring Settings for Remote Logging of Error Messages Configuring EEE Power Reduction Port Configuration Showing User Accounts Configuring User Accounts Configuring Privilege Levels Authentication Server Operation Authentication Method for Management Access SSH Configuration HTTPS Configuration Access Management Configuration SNMP System Configuration SNMPv3 Community Configuration SNMPv3 User Configuration SNMPv3 Group Configuration SNMPv3 View Configuration SNMPv3 Access Configuration RMON Statistics Configuration RMON History Configuration RMON Alarm Configuration RMON Event Configuration Port Limit Control Configuration Using Port Security Network Access Server Configuration S93 35 36 45 47 49 50 52 53 55 57 59 59 61 62 63 64 66 67 71 72 74 75 76 77 78 79 81 83 85 86 96 FIGURES Figure 32 Figure 33 Figure 34 Figure 35 Figure 36 Figure 37 Figure 38 Figure 39 Figure 40 Figure 41 Figure 42 Figure 43 Figure 44 Figure 45 Figure 46 Figure 47 Figure 48 Figure 49 Figure 50
178. e Specific Multicast Range allows SSM aware hosts and routers to run the SSM service model for groups in the specified address range Default 232 0 0 0 8 IPv4 addresses in the 232 0 0 0 to 232 255 255 255 range are currently designated by RFC 4607 as SSM destination addresses and are reserved for use by source specific applications and protocols SSM aware hosts and routers running the SSM service model can pass traffic for any group within the specified address range When using IGMPv3 snooping see the Compatibility parameter under Configuring VLAN Settings for IGMP Snooping and Query service requests from IGMP Version 1 2 or 3 hosts are all forwarded to the upstream router as IGMPv3 reports The primary enhancement provided by IGMPv3 snooping is in keeping track of information about the specific multicast sources which downstream IGMPv3 hosts have requested or refused The switch maintains information about both multicast groups and channels where a group indicates a multicast flow for which the hosts have not requested a specific source the only option for IGMPv1i and v2 hosts unless statically configured on the switch as described under Configuring IGMP Filtering and a channel indicates a flow for which the hosts have requested service from a 146 CHAPTER 4 Configuring the Switch IGMP Snooping specific source For IGMPvi v2 hosts the source address of a channel is always null indicating that any source is acceptable
179. e actual port status PATH Monitor Security Network Port Security Switch PARAMETERS These parameters are displayed User Module Legend User Module Name The full name of a module that may request Port Security services Abbr A one letter abbreviation of the user module This is used in the Users column in the port status table Port Status Port The port number for which the status applies Click the port number to see the status for this particular port Users Each of the user modules has a column that shows whether that module has enabled Port Security or not A means that the corresponding user module is not enabled whereas a letter indicates that the user module abbreviated by that letter has enabled port security State Shows the current state of the port It can take one of four values Disabled No user modules are currently using the Port Security service Ready The Port Security service is in use by at least one user module and is awaiting frames from unknown MAC addresses to arrive 230 CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings m Limit Reached The Port Security service is enabled by at least the Limit Control user module and that module has indicated that the limit is reached and no more MAC addresses should be taken in Shutdown The Port Security service is enabled by at least the Limit Control user module and that module
180. e allows tuning for the expected packet loss on a network A port will be removed from receiving a multicast service when no IGMP reports are detected in response to a number of IGMP queries The robustness variable sets the number of queries on ports for which there is no report Range 1 255 Default 2 Routers adopt the robustness value from the most recently received query If the querier s robustness variable QRV is zero indicating that the QRV field does not contain a declared robustness value the switch will set the robustness variable to the value statically configured by this command If the QRV exceeds 7 the maximum value of the QRV field the robustness value is set to zero meaning that this device will not advertise a QRV in any query messages it subsequently sends QI The Query Interval is the interval at which MLD General Queries are sent by the Querier Range 1 255 seconds Default 125 seconds An MLD general query message is sent by the switch at the interval specified by this attribute When this message is received by downstream hosts all receivers build an MLD report for the multicast groups they have joined QRI The Query Response Interval is the Max Response Time advertised in periodic General Queries The QRI applies when the switch is serving as the querier and is used to inform other devices of the maximum time this system waits for a response to general queries Range 10 31744 tenths of a second Defaul
181. e and the supplicant is not successfully authorized by the RADIUS server X Auth Y Unauth The port is in a multi supplicant mode X clients are currently authorized and Y are unauthorized Restart Restarts client authentication using one of the methods described below Note that the restart buttons are only enabled when the switch s authentication mode is globally enabled under System Configuration and the port s Admin State is an EAPOL based or MAC Based mode Clicking these buttons will not cause settings changed on the page to take effect Reauthenticate Schedules reauthentication to whenever the quiet period of the port runs out EAPOL based authentication For MAC based authentication reauthentication will be attempted immediately The button only has effect for successfully authenticated clients on the port and will not cause the clients to get temporarily unauthorized Reinitialize Forces a reinitialization of the clients on the port and thereby a reauthentication immediately The clients will transfer to the unauthorized state while the reauthentication is in progress WEB INTERFACE To configure 802 1X Port Security 1 Click Advanced Configuration Security Network NAS 2 Modify the required attributes 3 Click Save 05 CHAPTER 4 Configuring the Switch Configuring Security Figure 31 Network Access Server Configuration Network Access Server Configuration Disabled v Reauth
182. e displayed VLAN User A software module that uses VLAN management services to configure VLAN membership and VLAN port settings such as the PVID or untagged VLAN ID This switch supports the following VLAN user modules Static Ports statically assigned to a VLAN through the CLI Web or SNMP NAS Provides port based authentication which involves communications between a Supplicant Authenticator and an Authentication Server MVR Eliminates the need to duplicate multicast traffic for subscribers in each VLAN Multicast traffic for all channels is sent only on a single multicast VLAN Voice VLAN A VLAN configured specially for voice traffic typically originating from IP phones MSTP The 802 1s Multiple Spanning Tree protocol uses VLANs to create multiple spanning trees in a network which significantly improves network resource utilization while maintaining a loop free environment SRT CHAPTER 5 Monitoring the Switch Displaying Information About VLANs VLAN PORT STATUS Combined Shows information for all active user modules VLAN ID A VLAN which has created by one of the software modules Port Members The ports assigned to this VLAN WEB INTERFACE 1 To display VLAN members click Monitor VLANs VLAN Membership 2 Select a software module from the drop down list on the right side of the page Figure 146 Showing VLAN Members VLAN Membership Status for Combined users Combined
183. e management features are briefly described below You can save the current configuration settings to a file on the management station using the web interface or a TFTP server using the console interface through Telnet and later download this file to restore the switch configuration settings This switch authenticates management access via a web browser User names and passwords can be configured locally or can be verified via a remote authentication server i e RADIUS or TACACS Port based authentication is also supported via the IEEE 802 1X protocol This protocol uses Extensible Authentication Protocol over LANs EAPOL to request user credentials from the 802 1X client and then uses the EAP between the switch and the authentication server to verify the client s right to access the network via an authentication server i e RADIUS or TACACS server Other authentication options include HTTPS for secure management access via the web SSH for secure management access over a Telnet equivalent connection SNMP Version 3 IP address filtering for SNMP Telnet web management access and MAC address filtering for port access SAT amp ACCESS CONTROL Lists PORT CONFIGURATION RATE LIMITING PORT MIRRORING PORT TRUNKING STORM CONTROL STATIC ADDRESSES CHAPTER 1 Introduction Description of Software Features ACLs provide packet filtering for IP frames based on protocol TCP UDP port number or frame type or layer 2
184. e noted that LLDP MED and the LLDP MED Fast Start mechanism is only intended to run on links between LLDP MED Network Connectivity Devices and Endpoint Devices and as such does not apply to links between LAN infrastructure elements including between Network Connectivity Devices or to other types of links 162 CHAPTER 4 Configuring the Switch Link Layer Discovery Protocol Coordinates Location Latitude Normalized to within 0 90 degrees with a maximum of 4 digits It is possible to specify the direction to either North of the equator or South of the equator Longitude Normalized to within 0 180 degrees with a maximum of 4 digits It is possible to specify the direction to either East of the prime meridian or West of the prime meridian Altitude Normalized to within 32767 to 32767 with a maximum of 4 digits It is possible to select between two altitude types floors or meters Meters Representing meters of Altitude defined by the vertical datum specified Floors Representing altitude in a form more relevant in buildings which have different floor to floor dimensions An altitude 0 0 is meaningful even outside a building and represents ground level at the given latitude and longitude Inside a building 0 0 represents the floor level associated with ground level at the main entrance Map Datum The Map Datum used for the coordinates given in this Option WGS84 Geographical 3D World Geodesic Syste
185. e protocol used to access this information over the network The switch includes an onboard agent that supports SNMP versions 1 2c and 3 This agent continuously monitors the status of the switch hardware as well as the traffic passing through its ports A network management station can access this information using software such as HP OpenView Access to the onboard agent from clients using SNMP vi and v2c is controlled by community strings To communicate with the switch the management station must first submit a valid community string for authentication Access to the switch using from clients using SNMPv3 provides additional security features that cover message integrity authentication and encryption as well as controlling user access to specific areas of the MIB tree The SNMPv3 security structure consists of security models with each model having it s own security levels There are three security models defined SNMPv1 SNMPv2c and SNMPv3 Users are assigned to groups that are defined by a security model and specified security levels Each group also has a defined security access to set of MIB objects for reading and writing which are known as views The switch has a default view all 2 67s CHAPTER 4 Configuring the Switch Configuring Security MIB objects and default groups defined for security models v1 and v2c The following table shows the security models and levels available and the system default set
186. e runs unless that component itself accompanies the executable If distribution of executable or object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are not compelled to copy the source along with the object code You may not copy modify sublicense or distribute the Program except as expressly provided under this License Any attempt otherwise to copy modify sublicense or distribute the Program is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Program or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Program or works based on it Each time you redistribute the Program or any work based on the Program the recipient automatically receives a license from the original licensor to copy d
187. e the network connection Provide data security by restricting all traffic to the originating VLAN Use private VLANs to restrict traffic to pass only between data ports and the uplink ports thereby isolating adjacent ports within the same VLAN and allowing you to limit the total number of VLANs that need to be configured Use protocol VLANs to restrict traffic to specified interfaces based on protocol type This feature is designed for service providers carrying traffic for multiple customers across their networks QinQ tunneling is used to maintain customer specific VLAN and Layer 2 protocol configurations even when different customers use the same internal VLAN IDs This is accomplished by inserting Service Provider VLAN SPVLAN tags into the customer s frames when they enter the service provider s network and then stripping the tags when the frames leave the network This switch prioritizes each packet based on the required level of service using four priority queues with strict or Weighted Round Robin queuing It uses IEEE 802 1p and 802 1Q tags to prioritize incoming traffic based on input from the end station application These functions can be used to provide independent priorities for delay sensitive data and best effort data This switch also supports several common methods of prioritizing layer 3 4 traffic to meet application requirements Traffic can be prioritized based on the priority bits in the IP frame s Type
188. ean interfaces which includes both ports and trunks Minimum The higher of 6 or 2 x Hello Time 1 Maximum The lower of 40 or 2 x Forward Delay 1 Default 20 Max Hop Count The maximum number of hops allowed in the MST region before a BPDU is discarded Range 6 40 Default 20 An MST region is treated as a single node by the STP and RSTP protocols Therefore the message age for BPDUs inside an MST region is never changed However each spanning tree instance within a region and the common internal spanning tree CIST that connects these instances use a hop count to specify the maximum number of bridges that will propagate a BPDU Each bridge decrements the hop count by one before passing on the BPDU When the hop count reaches zero the message is dropped Transmit Hold Count The number of BPDU s a bridge port can send per second When exceeded transmission of the next BPDU will be delayed Range 1 10 Default 6 Advanced Settings Edge Port BPDU Filtering BPDU filtering allows you to avoid transmitting BPDUs on configured edge ports that are connected to end nodes By default STA sends BPDUs to all ports regardless of whether administrative edge is enabled on a port BDPU filtering is configured on a per port basis Default Disabled Edge Port BPDU Guard This feature protects edge ports from receiving BPDUs It prevents loops by shutting down an edge port when a BPDU is received instead of
189. echanisms such as traffic meters shapers droppers packet markers at the boundaries of the network Domain Name Service A system used for translating host names for network nodes into IP addresses Differentiated Services Code Point Service DSCP uses a six bit tag to provide for up to 64 different forwarding behaviors Based on network policies different kinds of traffic can be marked for different kinds of forwarding The DSCP bits are mapped to the Class of Service categories and then into the output queues Extensible Authentication Protocol over LAN EAPOL is a client authentication protocol used by this switch to verify the network access rights for any device that is plugged into the switch A user name and password is requested by the switch and then passed to an authentication server e g RADIUS for verification EAPOL is implemented as part of the IEEE 802 1X Port Authentication standard Extended Universal Identifier is an address format used by IPv6 to identify the host portion of the network address The interface identifier in EUI compatible addresses is based on the link layer MAC address of an interface Interface identifiers used in global unicast and other IPv6 address types are 64 bits long and may be constructed in the EUI 64 format The modified EUI 64 format interface ID is derived from a 48 bit link layer address by inserting the hexadecimal number FFFE between the upper three bytes OUI field and the lower 3 by
190. econd WEB INTERFACE To configure VLAN settings for IGMP snooping and query 1 Click Configuration IPMC IGMP Snooping VLAN Configuration 2 Adjust the IGMP settings as required 3 Click Save Figure 57 Configuring VLAN Settings for IGMP Snooping and Query IGMP Snooping VLAN Configuration Start from VLAN 1 with 20 entries per page Delete VLAN ID Snooping Enabled IGMP Querier Compatibility Qi sec QRI 0 1 sec LLQI 0 1 sec URI sec 5 1 IGMP Auto 5 100 10 f 1 Add New IGMP VLAN Reset Use the IGMP Snooping Port Group Filtering Configuration page to filter specific multicast traffic In certain switch applications the administrator may want to control the multicast services that are available to end users for example an IP TV service based on a specific subscription plan The IGMP filtering feature fulfills this requirement by denying access to specified multicast services on a switch port PATH Advanced Configuration IPMC IGMP Snooping Port Group Filtering PARAMETERS These parameters are displayed Port Port identifier Filtering Groups Multicast groups that are denied on a port When filter groups are defined IGMP join reports received on a port are checked against the these groups If a requested multicast group is denied the IGMP join report is dropped dol CHAPTER 4 Configuring the Switch MLD Snooping MLD SNOOPING CONFIGURING GLOBAL AND POR
191. ect to traffic attacks caused by a host trying to use the IP address of a neighbor IP Source Guard filters traffic type based on the source IP address and MAC address pairs found in the DHCP Snooping table or based upon static entries configured in the IP Source Guard Table PATH Advanced Configuration Security Network IP Source Guard Configuration COMMAND USAGE When IP Source Guard is enabled globally and on a port the switch checks the VLAN ID source IP address and port number against all entries in the DHCP Snooping binding table and IP Source Guard Static Table If no matching entry is found the packet is dropped Gi Note Multicast addresses cannot be used by IP Source Guard When enabled traffic is filtered based upon dynamic entries learned via DHCP snooping see Configuring DHCP Snooping or static addresses configured in the source guard binding table If IP source guard is enabled an inbound packet s IP address will be checked against the binding table If no matching entry is found the packet will be dropped Filtering rules are implemented as follows If DHCP snooping is disabled see page 107 IP source guard will check the VLAN ID source IP address and port number If a matching entry is found in the binding table and the entry type is static IP source guard binding the packet will be forwarded If DHCP snooping is enabled IP source guard will check the VLAN ID source IP address and p
192. ection is a security feature that validates the MAC Address bindings for Address Resolution Protocol packets It provides protection against ARP traffic with invalid MAC to IP address bindings which forms the basis for certain man in the middle attacks This is accomplished by intercepting all ARP requests and responses and verifying each of these packets before the local ARP cache is updated or the packet is forwarded to the appropriate destination Invalid ARP packets are dropped ARP Inspection determines the validity of an ARP packet based on valid IP to MAC address bindings stored in a trusted database the DHCP snooping binding database see Configuring DHCP Snooping This database is built by DHCP snooping if it is enabled globally on the switch and on the required ports ARP Inspection can also validate ARP packets against statically configured addresses COMMAND USAGE Enabling amp Disabling ARP Inspection ARP Inspection is controlled on a global and port basis 114 CHAPTER 4 Configuring the Switch Configuring Security By default ARP Inspection is disabled both globally and on all ports If ARP Inspection is globally enabled then it becomes active only on the ports where it has been enabled When ARP Inspection is enabled globally all ARP request and reply packets on inspection enabled ports are redirected to the CPU and their switching behavior handled by the ARP Inspection engine If ARP In
193. ecurity model 4 Select the security name For SNMP vi and v2c the security names displayed are based on the those configured in the SNMPv3 Communities menu For USM the security names displayed are based on the those configured in the SNMPv3 Users Configuration menu 5 Enter a group name Note that the views assigned to a group must be specified on the SNMP Accesses Configuration menu see page 76 6 Click Save Figure 22 SNMPv3 Group Configuration SNMPv3 Group Configuration v1 public default_ro_group private default_rw_group public default_ro_group private default_nw_group default_user default_nw_group Add new group Save Reset CONFIGURING SNMPv3 VIEWS Use the SNMPv3 View Configuration page to define views which restrict user access to specified portions of the MIB tree The predefined view default_view includes access to the entire MIB tree PARAMETERS These parameters are displayed View Name The name of the SNMP view Range 1 32 characters ASCII characters 33 126 only View Type Indicates if the object identifier of a branch within the MIB tree is included or excluded from the SNMP view Generally if the view type of an entry is excluded another entry of view type included 75 CHAPTER 4 Configuring the Switch Configuring Security should exist and its OID subtree should overlap the excluded view e
194. ed Port Port identifier VLAN ID ID of a configured VLAN Range 1 4094 116 SPECIFYING AUTHENTICATION SERVERS CHAPTER 4 Configuring the Switch Configuring Security MAC Address Allowed source MAC address in ARP request packets IP Address Allowed source IP address in ARP request packets WEB INTERFACE To configure the static ARP Inspection table 1 Click Advanced Configuration Network Security ARP Inspection Static Table 2 Click Add new entry 3 Enter the required bindings for a given port 4 Click Save Figure 40 Configuring Static Bindings for ARP Inspection Static ARP Inspection Table Delete Port VLAN ID MAC Address IP Address Dace 1 1 Use the Authentication Server Configuration page to control management access based on a list of user names and passwords configured on a RADIUS or TACACS remote access authentication server and to authenticate client access for IEEE 802 1X port authentication see page 85 Note This guide assumes that RADIUS and TACACS servers have already been configured to support AAA The configuration of RADIUS and TACACS server software is beyond the scope of this guide Refer to the documentation provided with the RADIUS and TACACS server software PATH Advanced Configuration Security Network AAA PARAMETERS These parameters are displayed Common Server Configuration Timeout The time the switch waits fo
195. ed public read only private read write Global disabled Authentication traps enabled Link up down events enabled View default_view Group default_rw_group Enabled Enabled Disabled Disabled None Disabled Broadcast Enabled 1 kpps Multicast disabled Unknown unicast disabled Enabled RSTP Defaults RSTP standard Enabled 300 seconds 1 1 All Disabled Access 0 Strict 01234567 Disabled in strict mode Queue Weight Disabled Disabled Disabled Disabled Disabled Disabled Enabled CHAPTER 1 Introduction System Defaults Table 2 System Defaults Continued Function Parameter Default IP Settings Management VLAN VLAN 1 IP Address 192 168 1 1 Multicast Filtering System Log console only NTP Subnet Mask Default Gateway DHCP DNS IGMP Snooping MLD Snooping Multicast VLAN Registration Status Messages Logged to Flash Clock Synchronization 36 255 255 255 0 0 0 0 0 Client Disabled Snooping Disabled Proxy service Disabled Snooping Disabled Querier Disabled Disabled Disabled Disabled All levels Disabled INITIAL SWITCH CONFIGURATION This chapter includes information on connecting to the switch and basic configuration procedures To make use of the management features of your switch you must first configure it with an IP address that is compatible with the network in which it is being installed This should be d
196. ed 4 Click Save Figure 32 ACL Port Configuration ACL Ports Configuration Refresh Clear Port Policy ID Action Rate Limiter ID Port Redirect Mirror Logging Shutdown State Counter lt gt z Pot 1 lt gt z lt X lt gt z Pon2 Disabled Port 1 Disabled Disabled Disabled gt Enabled 1558237199 Pot2 Z Pon2 Disabled Port 1 Disabled Disabled Disabled z Enabled Pot2 Disabled z Port 1 Disabled 7 Disabled 7 Disabled z Enabied Pot2 0 Permit Disabled z Port 1 Disabled z Disabled 7 Disabled z Enabled z Pot2 zj CONFIGURING RATE LIMITERS Use the ACL Rate Limiter Configuration page to define the rate limits applied to a port as configured either through the ACL Ports Configuration menu page 96 or the Access Control List Configuration menu page 99 PATH Advanced Configuration Security Network ACL Rate Limiters PARAMETERS These parameters are displayed Rate Limiter ID Rate limiter identifier Range 0 14 Default 1 Rate The threshold above which packets are dropped Options 0 100 pps Due to an ASIC limitation the enforced rate limits are slightly less than the listed options For example 1 Kpps translates into an enforced threshold of 1002 1 pps WEB INTERFACE To configure rate limits which can be applied to a port 1 Click Advanced Configuration Security Network ACL Rate Limiters 2 For any
197. ed RADIUS assigned VLAN provides a means to centrally control the VLAN on which a successfully authenticated supplicant is placed on the switch Incoming traffic will be classified to and switched on the RADIUS assigned VLAN The RADIUS server must be configured to transmit special RADIUS attributes to take advantage of this feature The RADIUS Assigned VLAN Enabled checkbox provides a quick way to globally enable disable RADIUS server assigned VLAN functionality When checked the individual port settings determine whether RADIUS assigned VLAN is enabled for that port When unchecked RADIUS server assigned VLAN is disabled for all ports When RADIUS Assigned VLAN is both globally enabled and enabled for a given port the switch reacts to VLAN ID information carried in the RADIUS Access Accept packet transmitted by the RADIUS server when a supplicant is successfully authenticated If present and valid the port s Port VLAN ID will be changed to this VLAN ID the port will be set to be a member of that VLAN ID and the port will be forced into VLAN unaware mode Once assigned all traffic arriving on the port will be classified and switched on the RADIUS assigned VLAN ID 90 CHAPTER 4 Configuring the Switch Configuring Security If re authentication fails or the RADIUS Access Accept packet no longer carries a VLAN ID or it s invalid or the supplicant is otherwise no longer present on the port the port s VLAN ID is immediat
198. ed The number of IGMP V2 leaves received Multicast Groups VLAN ID Identifier of the VLAN that serves as the channel for streaming multicast services using MVR Groups The present multicast groups A maximum of 128 groups are allowed in the multicast VLAN Port Members The ports that are members of the entry 200 DISPLAYING MVR SFM INFORMATION CHAPTER 5 Monitoring the Switch Displaying MVR Information WEB INTERFACE To display information for MVR statistics and multicast groups click Monitor MVR Group Information Figure 131 MVR Group Information MVR Channels Groups Information Auto efresh Refresh lt lt gt gt Start from VLAN 1 and Group Address Port Members VLAN ID Groups 1 2 314 5 6 7 8 9 140 11 12 13 14 45 16 17 48 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 35 37 38 39 40 41 42 43 44 45 46 47 48 49 50 Use the MVR SFM Information page to display MVR Source Filtered Multicast information including group filtering mode include or exclude source address and type allow or deny PATH Monitor MVR MVR SFM Information PARAMETERS These parameters are displayed VLAN ID VLAN identifier Group The IP address of a multicast group detected on this interface Port Port identifier Mode The filtering mode maintained per VLAN ID port number and Group Address It can be either Include or Exclude Source Ad
199. ed below Any Allow all types of frames Ethernet This option can only be used to filter Ethernet II formatted packets Options Any Specific 600 ffff hex Default ffff Note that 800 IPv4 and 86DD IPv6 are excluded A detailed listing of Ethernet protocol types can be found in RFC 1060 A few of the more common types include 0800 IP 0806 ARP 8137 IPX LLC Link Logical Control includes the following settings SSAP Address Source Service Access Point address Options Any Specific Ox00 Oxff Default Oxff DSAP Address Destination Service Access Point address Options Any Specific Ox00 Oxff Default Oxff Control Control field may contain command response or sequence information depending on whether the LLC frame type is Unnumbered Supervisory or Information Options Any Specific Ox00 Oxff Default Oxff SNAP SubNetwork Access Protocol can be distinguished by an OUI and a Protocol ID Options for PID Any Specific Ox00 Oxffff Default Any If the OUI is hexadecimal 000000 the protocol ID is the Ethernet type EtherType field value for the protocol running on top of SNAP If the OUI is that of a particular organization the protocol ID is a value assigned by that organization to the protocol running on top of SNAP In other words if value of the OUI field is 00 00 00 then value of the PID will be etherType 0x0600 Oxffff and if value of the OUI is 20
200. ed disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled Al 2 2 a 5 Use the QoS Egress Port Tag Remarking page to show an overview of QoS Egress Port Tag Remarking mode Click on any of the entries in the Port field to configure the remarking mode using classified PCP DEI values default PCP DEI values or mapped versions of QoS class and drop priority PATH Advanced Configuration QoS Port Tag Remarking PARAMETERS These parameters are displayed Displaying Port Remarking Mode Port Port identifier Mode Shows the tag remarking mode used by this port Classified Uses classified PCP Priority Code Point or User Priority and DEI Drop Eligible Indicator values Default Uses default PCP DEI values Mapped Uses mapped versions of QoS class and drop precedence level Configuring Port Remarking Mode Tag Remarking Mode Configures the tag remarking mode used by this port Classified Uses classified PCP DEI values Default Uses default PCP DEI values Range PCP 0 7 Default 0 DEI 0 1 Default 0 193 CHAPTER 4 Configuring the Switch Quality of Service Mapped Controls the mapping of the classified QoS class values and DP levels drop precedence to PCP DEI values QoS class DP level Shows the mapping options for QoS class values and DP levels drop precedence PCP
201. ed to the destination port 207 CHAPTER 4 Configuring the Switch Configuring Remote Port Mirroring Tx only Frames transmitted from this port are mirrored to the destination port Destination Traffic from all configured source ports is mirrored to this port Default Disabled WEB INTERFACE To configure local port mirroring 1 Click Basic Advanced Configuration Mirroring amp RSPAN 2 Set the Mode to Enabled and the Type to Mirror 3 Set the type of traffic to mirror on the Source ports to be monitored 4 Select to the Destination port to which all mirrored traffic will be sent 5 Click Save Figure 90 Mirror Configuration Mirroring amp RSPAN Configuration Session Number fi Mode Enabled z Type Mirror X VLAN ID Reflector Port t1 bd Port Source Intermediate Destination 1 Disabled T 2 Disabled r 3 Disabled z r 4 Disabled r 5 Disabled z D CONFIGURING REMOTE PORT MIRRORING Use the Mirroring amp RSPAN Configuration page to mirror traffic from remote switches for analysis at a destination port on the local switch This feature also called Remote Switched Port Analyzer RSPAN carries traffic generated on the specified source ports over a user specified VLAN dedicated to that RSPAN session in all participating switches Monitored traffic from one or more sources is copied onto the RSPAN VLAN through IEEE 802 1Q trunk or hybrid ports that carry it to any RS
202. efresh mode is disabled by default Click Auto refresh to refresh the data displayed on the screen approximately once every 5 seconds or click Refresh to refresh the screen right now Clicking on the image of a port opens the Detailed Statistics page as described on page 226 Figure 2 Front Panel Indicators Port State Overview Auto efresh Refresh Using the onboard web agent you can define system parameters manage and control the switch and all its ports or monitor network conditions The following table briefly describes the selections available from this program Table 4 Main Menu Menu Description Page Basic Configuration 45 System 45 Information Configures system contact name and location 45 IP Configures IPv4 and SNTP settings 46 IPv6 Configures IPv6 and SNTP settings 48 NTP Enables NTP and configures a list of NTP servers 50 Time Configures the time zone and daylight savings time 51 Log Configures the logging of messages to a remote logging 53 process specifies the remote log server and limits the type of system log messages sent Ports Configures port connection settings 55 36 CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface Table 4 Main Menu Continued Menu Description Page Aggregation 119 Static Specifies ports to group into static trunks 120 LACP Allows ports to dynamically join trunks 123 Spanning Tree 127 Bridge Settings Configures global bridge settings for
203. ely reverted to the original VLAN ID which may be changed by the administrator in the meanwhile without affecting the RADIUS assigned setting This option is only available for single client modes i e port based 802 1X and Single 802 1X Note For trouble shooting VLAN assignments use the Monitor gt VLANs gt VLAN Membership and VLAN Port pages These pages show which modules have temporarily overridden the current Port VLAN configuration RADIUS Attributes Used in Identifying a VLAN ID RFC 2868 and RFC 3580 form the basis for the attributes used in identifying a VLAN ID in an Access Accept packet The following criteria are used The Tunnel Medium Type Tunnel Type and Tunnel Private Group ID attributes must all be present at least once in the Access Accept packet The switch looks for the first set of these attributes that have the same Tag value and fulfil the following requirements if Tag 0 is used the Tunnel Private Group ID does not need to include a Tag m Value of Tunnel Medium Type must be set to IEEE 802 ordinal 6 Value of Tunnel Type must be set to VLAN ordinal 13 m Value of Tunnel Private Group ID must be a string of ASCII characters in the range 0 9 which is interpreted as a decimal string representing the VLAN ID Leading 0 s are discarded The final value must be in the range 1 4095 The VLAN list can contain multiple VLAN identifiers in the format 1u 2t 3u where
204. emote ID 0 0 0 0 0 0 0 0 Client Statistics Transmit Transmit Receive Receive Replace Keep Drop to Client Error from Client Agent Option Agent Option Agent Option Agent Option 0 0 0 0 0 0 0 Open the Dynamic ARP Inspection Table to display address entries sorted first by port then VLAN ID MAC address and finally IP address Each page shows up to 999 entries from the Dynamic ARP Inspection table default being 20 selected through the entries per page input field When first visited the web page will show the first 20 entries from the beginning of the Dynamic ARP Inspection Table PATH Monitor Security Network ARP Inspection 241 CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings DISPLAYING ENTRIES IN THE IP SOURCE GUARD TABLE WEB INTERFACE To display the Dynamic ARP Inspection Table click Monitor Security Network ARP Inspection Figure 114 Dynamic ARP Inspection Table Dynamic ARP Inspection Table Auto refresh L Start from Port VLAN 1 MAC address 00 00 00 00 00 00 and IP address 0 0 0 0 with 20 entries per page VLAN ID MAC Address IP Address No more entries Open the Dynamic IP Source Guard Table to display entries sorted first by port then VLAN ID MAC address and finally IP address Each page shows up to 999 entries from the Dynamic IP Source Guard table default being 20 selected through the entries per page input f
205. enges m 802 1X based Counts the number of times that the switch receives the first request from the backend server following the first response from the supplicant Indicates that the backend server has communication with the switch MAC based Counts all Access Challenges received from the backend server for this port left most table or client right most table Other Requests 802 1X based Counts the number of times that the switch sends an EAP Request packet following the first to the supplicant Indicates that the backend server chose an EAP method MAC based Not applicable Auth Successes 802 1X and MAC based Counts the number of times that the switch receives a success indication Indicates that the supplicant client has successfully authenticated to the backend server Auth Failures 802 1X and MAC based Counts the number of times that the switch receives a failure message This indicates that the supplicant client has not authenticated to the backend server Transmit Backend Server Counters Responses m 802 1X based Counts the number of times that the switch attempts to send a supplicant s first response packet to the backend server Indicates the switch attempted communication with the backend server Possible retransmissions are not counted MAC based Counts all the backend server packets sent from the switch towards the backend server for a given port left most ta
206. ent If a frame matches the QCE the following actions will be taken m Class Classified QoS Class If a frame matches the QCE it will be put in the queue corresponding to the specified QoS class DPL The drop precedence level will be set to the specified value DSCP The DSCP value will be set the specified value The following buttons are used to edit or move the QCEs Table 12 QCE Modification Buttons Button Description Inserts a new QCE before the current row Edits the QCE Moves the QCE up the list Moves the QCE down the list Deletes the QCE The lowest plus sign adds a new entry at the bottom of the list OOO QCE Configuration Port Members The ports assigned to this entry 200 CHAPTER 4 Configuring the Switch Quality of Service Key Parameters Tag VLAN tag type Options Any Tag Untag Default Any VID VLAN identifier Options Any Specific 1 4095 Range Default Any PCP Priority Code Point User Priority Options a specific value of 0 1 2 3 4 5 6 7 a range of 0 1 2 3 4 5 6 7 0 3 4 7 or Any Default 0 DEI Drop Eligible Indicator Options 0 1 or Any SMAC The OUI field of the source MAC address Enter the first three octets bytes of the MAC address or Any DMAC Type The type of destination MAC address Options Any BC Broadcast MC Multicast UC Unicast Frame Type The supported types are list
207. entication Enabled Reauthentication Period 0 seconds EAPOL Timeout fe seconds Aging Period 300 7 seconds Hold Time seconds RADIUS Assigned QoS Enabled RADIUS Assigned VLAN Enabled Guest VLAN Enabled Guest VLAN ID 7 Max Reauth Count Allow Guest VLAN if EAPOL Seen System Configuration Port Configuration RADIUS Assigned RADIUS Assigned Guest QoS Enabled VLAN Enabled VLAN Enabled 1 Force Authorized Globally Disabled Reauthenticate 2 Globally Disabled Pe 3 Force Authorized v Globally Disabled 4 5 lt lt Force Authorized v Globally Disabled Globally Disabled Reauthenticate Force Authorized FILTERING TRAFFIC An Access Control List ACL is a sequential list of permit or deny WITH Access conditions that apply to IP addresses MAC addresses or other more CONTROL LISTS specific criteria This switch tests ingress packets against the conditions in an ACL one by one A packet will be accepted as soon as it matches a permit rule or dropped as soon as it matches a deny rule If no rules match the frame is accepted Other actions can also be invoked when a matching packet is found including rate limiting copying matching packets to another port or to the system log or shutting down a port ASSIGNING ACL POLICIES AND RESPONSES Use the ACL Port Configuration page to define a port to which matching frames are copied enable loggi
208. equest is sent and decremented due to receipt of an Access 244 CHAPTER 5 Monitoring the Switch Displaying Information on Authentication Servers Accept Access Reject Access Challenge timeout or retransmission Timeouts The number of authentication timeouts to the server After a timeout the client may retry to the same server send to a different server or give up A retry to the same server is counted as a retransmit as well as a timeout A send to a different server is counted as a Request as well as a timeout Other Info IP Address IP address and UDP port for the authentication server State The current state of the server This field takes one of the following values Disabled The server is disabled Not Ready The server is enabled but IP communication is not yet up and running Ready The server is enabled IP communication is up and running and the RADIUS module is ready to accept access attempts Dead X seconds left Access attempts were made to this server but it did not reply within the configured timeout The server has been temporarily disabled but will be re enabled when the dead time expires The number of seconds left before this occurs is displayed in parentheses Round Trip Time The time interval measured in milliseconds between the most recent Access Reply Access Challenge and the Access Request that matched it from the RADIUS authentication server The granulari
209. er to control the maximum rate for traffic received on an port Port policing is configured on interfaces at the edge of a network to limit traffic into of the network Packets that exceed the acceptable amount of traffic are dropped Port policing can be applied to individual ports When an port is configured with this feature the traffic rate will be monitored by the hardware to 188 CONFIGURING EGRESS PORT SCHEDULER CHAPTER 4 Configuring the Switch Quality of Service verify conformity Non conforming traffic is dropped conforming traffic is forwarded without any changes PATH Advanced Configuration QoS Port Policing PARAMETERS These parameters are displayed Port Port identifier Enabled Enables or disables port policing on a port Rate Controls the maximum rate for frames entering the ingress queue for a port Range 100 1 000 000 kbps fps 1 3 300 Mbps kfps Default 500 for all units of measure Unit Controls the unit of measure for the policer rate as kbps Mbps fps or kfps The default value is kbps Flow Control If flow control is enabled and the port is in flow control mode then pause frames are sent instead of discarding frames WEB INTERFACE To configure ingress port policing 1 Click Advanced Configuration QoS Port Policing 2 Enable port policing as required for any port set the maximum ingress rate and unit of measure and then enable flow control if required 3
210. eset J Cancel CONFIGURING EGRESS Use the QoS Egress Port Shapers page to show an overview of the QoS Port SHAPER Egress Port Shapers including the rate for each queue and port Click on any of the entries in the Port field to configure egress queue mode queue shaper rate and access to excess bandwidth and port shaper PATH Advanced Configuration QoS Port Shaper PARAMETERS These parameters are displayed Displaying QoS Egress Port Schedulers Port Port identifier Shapers Shows the queue shaper rate and port shaper rate Configuring QoS Egress Port Scheduler Queue Scheduler and Port Shapers This configuration page can be access from the Port Scheduler or Port Shaper page Refer to the description of these parameters under Configuring Egress Port Scheduler OD CONFIGURING PORT REMARKING MODE CHAPTER 4 Configuring the Switch Quality of Service WEB INTERFACE To show an overview of the rate for each queue and port 1 Click Advanced Configuration QoS Port Shaper 2 Click on any enter under the Port field to configure the Port Scheduler and Shaper Figure 79 Displaying Egress Port Shapers QoS Egress Port Shapers i aed ee ote eat tea disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabl
211. ex of the event to use if an alarm is triggered by monitored variables crossing above the rising threshold 200 DISPLAYING RMON EVENT SETTINGS CHAPTER 5 Monitoring the Switch Displaying Information on RMON Falling Threshold If the current value is less than the falling threshold and the last sample value was greater than this threshold then an alarm will be generated Falling Index The index of the event to use if an alarm is triggered by monitored variables crossing below the falling threshold WEB INTERFACE To display RMON alarm settings click Monitor Security Switch RMON Alarm Figure 120 RMON Alarm Overview RMON Alarm Overview Auto efesh T Refresh _ic lt gt gt Start from Control Index 0 with 20 entries per page Alarm Threshold Index Threshold Index i 30 136121221103 Delta 0 Rising Or Falling 30 1 2 g hnal variable ey Value Startup Rising Rising Falling Falling Use the RMON Alarm Event page to display configured event settings PATH Monitor Security Switch RMON Event PARAMETERS These parameters are displayed Event Index Index of the event entry Log Index Index of the log entry Log Time Event log time Log Description Event description WEB INTERFACE To display RMON event settings click Monitor Security Switch RMON Event Figure 121 RMON Event Overview RMON Event Overview Auto refresh l Refresh I lt gt gt Start from Control In
212. f there is no corresponding entry in the event control table then no event will be generated Range 1 65535 WEB INTERFACE To configure an RMON alarm 1 Click Advanced Configuration Security Switch RMON Alarm 2 Click Add New Entry 3 Enter an index number the polling interval the MIB object to be polled etherStatsEntry n n the sample type the alarm startup type the thresholds and the event to trigger 4 Click Save Figure 27 RMON Alarm Configuration RMON Alarm Configuration Sample Value Startup Rising Rising Falling Falling Delete interval Variable Type Alarm Threshold Index Threshold Index 1 30 Delta gt 0 Rising po 100 30 1 2 Add New Entry Save Reset 281 2 CHAPTER 4 Configuring the Switch Configuring Security CONFIGURING RMON EVENTS Use the RMON Event Configuration page to set the action to take when an alarm is triggered The response can include logging the alarm or sending a message to a trap manager Alarms and corresponding events provide a way of immediately responding to critical network problems PATH Advanced Configuration Security RMON Event PARAMETERS The following parameters are displayed ID Index to this entry Range 1 65535 Desc A comment that describes this event Range 0 127 characters Type Specifies the type of event to initiate none No event is generated log Generates an RMON log entry when the event is triggered
213. figuration page to configure periodic sampling of traffic flows The flow sampling sFlow feature embedded on this switch together with a remote sFlow Collector can provide network administrators with an accurate detailed and real time overview of the types and levels of traffic present on their network The sFlow Agent samples 1 out of n packets from all data traversing the switch re encapsulates the samples as sFlow datagrams and transmits them to the sFlow Collector This sampling occurs at the internal hardware level where all traffic is seen whereas traditional probes will only have a partial view of traffic as it is sampled at 214 CHAPTER 4 Configuring the Switch Configuring sFlow the monitored interface Moreover the processor and memory load imposed by the sFlow agent is minimal since local analysis does not take place The wire speed transmission characteristic of the switch is thus preserved even at high traffic levels As the Collector receives streams from the various sFlow agents other switches or routers throughout the network a timely network wide picture of utilization and traffic flows is created Analysis of the sFlow stream s can reveal trends and information that can be leveraged in the following ways Detecting diagnosing and fixing network problems Real time congestion management Understanding application mix P2P Web DNS etc and changes Identification and tracing of unauthorized network acti
214. for an additional power source and cutting down 167 CHAPTER 4 Configuring the Switch Power over Ethernet on the amount of cables attached to each device Once configured to supply power an automatic detection process is initialized by the switch that is authenticated by a PoE signature from the connected device Detection and authentication prevent damage to non compliant devices IEEE 802 3af or 802 3at This switch supports both the IEEE 802 3af PoE and IEEE 802 3at 2009 PoE Plus standards To ensure that the correct power is supplied to powered devices PD compliant with these standards the first detection pulse from the switch is based on 802 3af to which the 802 3af PDs will respond normally It then sends a second PoE Plus pulse that causes an 802 3at PD to respond as a Class 4 device and draw Class 4 current Afterwards the switch exchanges information with the PD such as duty cycle peak and average power needs All the RJ 45 ports support both the IEEE 802 3af and IEEE 802 3at standards The total PoE power delivered by all ports cannot exceed the maximum power budget of 375W The switch s power management enables individual port power to be controlled within the switch s power budget Port power can be automatically turned on and off for connected devices and a per port power priority can be set so that the switch never exceeds its power budget When a device is connected to a switch port its power requirements
215. formation Displaying LLDP Neighbor PoE Information Displaying LLDP Neighbor EEE Information Displaying LLDP Port Statistics Displaying PoE Status Displaying the MAC Address Table Displaying Information About VLANs VLAN Membership VLAN Port Status Displaying Information About MAC based VLANs Displaying Information About Flow Sampling PERFORMING BASIC DIAGNOSTICS Pinging an IPv4 or IPv6 Address 11 CONTENTS 252 252 252 253 254 255 255 257 258 259 259 260 261 262 262 263 263 264 264 266 266 267 267 268 271 272 273 275 276 277 277 278 279 280 283 283 CONTENTS SECTION lli Running Cable Diagnostics PERFORMING SYSTEM MAINTENANCE Restarting the Switch Restoring Factory Defaults Upgrading Firmware Activating the Alternate Image Managing Configuration Files Saving Configuration Settings Restoring Configuration Settings APPENDICES SOFTWARE SPECIFICATIONS Software Features Management Features Standards Management Information Bases TROUBLESHOOTING Problems Accessing the Management Interface Using System Logs LICENSE INFORMATION The GNU General Public License GLOSSARY INDEX S 19 a 285 287 287 288 288 289 290 290 290 293 295 295 296 297 298 299 299 300 301 301 305 313 Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 Figure 6 Figure 7 Figure 8 Figure 9 Figure 10 Figure 11 Figure 12 Figure 13 Figure 14 Figure 15 Figur
216. fying switch type Destination the RSPAN VLAN intermediate ports and the destination port s where the mirrored traffic will be received RSPAN Limitations The following limitations apply to the use of RSPAN on this switch RSPAN Ports Only ports can be configured as an RSPAN source intermediate or destination type static and dynamic trunks are not allowed A port can only be configured as one type of RSPAN interface source intermediate or destination Only one mirror 4 The reflector port only applies to Source switch type MAC Table learning and STP must be disabled on the reflector port 209 CHAPTER 4 Configuring the Switch Configuring Remote Port Mirroring session is allowed either local or remote Also note that the source port and destination port cannot be configured on the same switch MAC address learning is not supported on RSPAN uplink ports Figure 91 when RSPAN is enabled on the switch Therefore even if spanning tree is enabled after RSPAN has been configured MAC address learning will still not be re started on RSPAN uplink ports PARAMETERS These parameters are displayed Session Number A number identifying this RSPAN session Only one mirror session is allowed including both local and remote mirroring If local mirroring is enabled see page 207 then no session can be configured for RSPAN Mode Enables or disabled RSPAN Type Specifies the role this switch performs in
217. g 152 snooping configuring 155 snooping fast leave 154 snooping source specific multicast 153 throttling 155 MSTP 127 132 global settings configuring 132 global settings displaying 129 132 max hop count 131 region name 133 region revision 133 settings configuring 129 132 multicast filtering 145 151 158 static router port 147 154 throttling 148 155 multicast groups 262 264 displaying 262 264 multicast services displaying 262 264 IGMP proxy 147 154 leave proxy 147 153 proxy 154 multicast storm threshold 204 Multicast VLAN Registration See MVR multicast filtering 151 158 MVR assigning static multicast groups 143 description 140 group information displaying 260 receiver groups displaying 143 setting interface type 142 setting multicast groups 143 314 static binding 143 statistics displaying 259 using immediate leave 142 N NTP specifying servers 50 P passwords 31 58 path cost 136 139 STA 136 139 PoE configuring 167 port power allocation 168 power budget 169 priority setting 169 shutdown modes 169 status displaying 275 port maximum frame size 56 statistics 224 port classification QOS 188 port isolation 177 port policer ingress rate limiter 188 port priority STA 136 139 port remarking mode 193 QoS 193 port shaper QoS 190 192 ports autonegotiation 55 broadcast storm threshold 204 capabilities 55 configuring 55 duplex mode 55 flow control 56 mirroring local traffic 207
218. g B a T a a a MST2 C gt _ lt T ig gt Gap An MST Region consists of a group of interconnected bridges that have the same MST Configuration Identifiers including the Region Name Revision Level and Configuration Digest see Configuring Multiple Spanning Trees on page 132 An MST Region may contain multiple MSTP Instances An Internal Spanning Tree IST is used to connect all the MSTP switches within an MST region A Common Spanning Tree CST interconnects all adjacent MST Regions and acts as a virtual bridge node for communications with STP or RSTP nodes in the global network Figure 47 Common Internal Spanning Tree Common Spanning Tree Internal Spanning Tree Region 1 Region 1 am g 7 A y CST IST n E 4 Region 4 N Region 3 Region 2 IY a CIST Region 3 Region 2 N Pa pi MSTP connects all bridges and LAN segments with a single Common and Internal Spanning Tree CIST The CIST is formed as a result of the 128 CONFIGURING GLOBAL SETTINGS FOR STA CHAPTER 4 Configuring the Switch Configuring the Spanning Tree Algorithm running spanning tree algorithm between switches that support the STP RSTP MSTP protocols Once you specify the VLANs to include in a Multiple Spanning Tree Instance MSTI the protocol will automatically build an MSTI tree to maintain connectivity among each of the VLANs MSTP maintains contact with the global network beca
219. g member the newly configured port will replace an existing port member that has a lower priority WEB INTERFACE To configure a dynamic trunk 1 2 Click Configuration Aggregation LACP Enable LACP on all of the ports to be used in an LAG Specify the LACP Admin Key to restrict a port to a specific LAG Set at least one of the ports in each LAG to Active initiation mode either at the near end or far end of the trunk Click Save 124 CHAPTER 4 Configuring the Switch Configuring Loop Protection Figure 43 LACP Port Configuration LACP Port Configuration Port LACP Enabled r 1 2 3 4 5 CONFIGURING LOOP PROTECTION Use the Loop Protection page to detect general loopback conditions caused by hardware problems or faulty protocol settings When enabled a control frame is transmitted on the participating ports and the switch monitors inbound traffic to see if the frame is looped back PATH Advanced Configuration Loop Protection USAGE GUIDELINES The default settings for the control frame transmit interval and recover time may be adjusted to improve performance for your specific environment The response mode may also need to be changed once you determine what kind of packets are being looped back Loopback detection must be enabled both globally and on an interface for loopback detection to take effect PARAMETERS These parameters are displayed Global Configuration Enable
220. gacy STP RSTP is also incorporated into MSTP RSTP achieves must faster reconfiguration i e around 1 to 3 seconds compared to 30 seconds or more for STP by reducing the number of state changes before active ports start learning predefining an alternate route that can be used when a node or port fails and retaining the forwarding database for ports insensitive to changes in the tree structure when reconfiguration occurs 127 CHAPTER 4 Configuring the Switch Configuring the Spanning Tree Algorithm MSTP When using STP or RSTP it may be difficult to maintain a stable path between all VLAN members Frequent changes in the tree structure can easily isolate some of the group members MSTP which is based on RSTP for fast convergence is designed to support independent spanning trees based on VLAN groups Using multiple spanning trees can provide multiple forwarding paths and enable load balancing One or more VLANs can be grouped into a Multiple Spanning Tree Instance MSTI MSTP builds a separate Multiple Spanning Tree MST for each instance to maintain connectivity among each of the assigned VLAN groups MSTP then builds a Internal Spanning Tree IST for the Region containing all commonly configured MSTP bridges Figure 46 MSTP Region Internal Spanning Tree Multiple Spanning Tree a ist MSTI D L for this Region L a gt L 7 lt Region j _ atl Aa ee oll aa js Q Q P AA C y ae C D i
221. gned according to whether the port is part of the active topology connecting the bridge to the root bridge i e root port connecting a LAN through the bridge to the root bridge i e designated port or is an alternate or backup port that may provide connectivity if other bridges bridge ports or LANs fail or are removed CIST State Displays current state of this port within the Spanning Tree Blocking Port receives STA configuration messages but does not forward packets Learning Port has transmitted configuration messages for an interval set by the Forward Delay parameter without receiving contradictory information Port address table is cleared and the port begins learning addresses Forwarding Port forwards packets and continues learning addresses Uptime The time since the bridge port was last initialized WEB INTERFACE To display information on spanning tree port status click Monitor Spanning Tree Port Status Figure 128 Spanning Tree Port Status STP Port Status Auto refresh L 1 Disabled Discarding 2 Disabled Discarding 3 DesignatedPort Forwarding Od 01 42 58 4 Disabled Discarding 5 Disabled Discarding Use the Port Statistics page to display statistics on spanning tree protocol packets crossing each port PATH Monitor Spanning Tree Port Statistics PARAMETERS These parameters are displayed Port Port Identifier MSTP The number of MSTP Configuration BPDU s
222. gured as part of a static trunk If ports on another device are also configured to use LACP the switch and the other device will negotiate a trunk between them If an LACP trunk consists of more than eight ports all other ports will be placed in standby mode Should one link in the trunk fail one of the standby ports will automatically be activated to replace it 11g CHAPTER 4 Configuring the Switch Creating Trunk Groups CONFIGURING STATIC TRUNKS USAGE GUIDELINES Besides balancing the load across each port in the trunk the other ports provide redundancy by taking over the load if a port in the trunk fails However before making any physical connections between devices configure the trunk on the devices at both ends When using a port trunk take note of the following points Finish configuring port trunks before you connect the corresponding network cables between switches to avoid creating a loop You can create up to 9 13 25 trunks on a switch with up to 18 26 50 ports per trunk for the 18 25 and 50 port models The ports at both ends of a connection must be configured as trunk ports When configuring static trunks on switches of different types they must be compatible with the Cisco EtherChannel standard The ports at both ends of a trunk must be configured in an identical manner including communication mode i e speed duplex mode and flow control VLAN assignments and CoS settings Any of the G
223. h associated privilege levels for each user that requires management access to the switch i CHAPTER 4 Configuring the Switch Configuring Security Figure 14 Authentication Server Operation Hanan LS FA Bo aE G Ed LE SE 4 Client attempts management access 2 Switch contacts authentication server 3 Authentication server challenges client 4 Client responds with proper password or key 5 Authentication server approves access 6 Switch grants management access RADIUS TACACS server PATH Advanced Configuration Security Switch Auth Method USAGE GUIDELINES The switch supports the following authentication services m Authorization of users that access the Telnet SSH the web or console management interfaces on the switch Accounting for users that access the Telnet SSH the web or console management interfaces on the switch m Accounting for IEEE 802 1X authenticated users that access the network through the switch This accounting can be used to provide reports auditing and billing for services that users have accessed By default management access is always checked against the authentication database stored on the local switch If a remote authentication server is used you must specify the authentication method and the corresponding parameters for the remote authentication protocol on the Network Access Server Configuration page L
224. he following parameters are displayed ID Index to this entry Range 1 65535 Data Source Port identifier Interval The polling interval Range 1 3600 seconds Default 1800 seconds Buckets The number of buckets requested for this entry Range 1 3600 Default 50 Buckets Granted The number of buckets granted WEB INTERFACE To periodically sample statistics on a port 1 Click Advanced Configuration Security Switch RMON History 2 Click Add New Entry 3 Enter the index identifier port number sampling interval and maximum number of buckets requested 4 Click Save Figure 26 RMON History Configuration RMON History Configuration ID Data Source Interval Buckets Buckets Granted 1 4 3 6 12 1 22 1 4 1 1800 50 50 Add New Entry Reset 79 CHAPTER 4 Configuring the Switch Configuring Security CONFIGURING RMON ALARMS Use the RMON Alarm Configuration page to define specific criteria that will generate response events Alarms can be set to test data over any specified time interval and can monitor absolute or changing values such as a statistical counter reaching a specific value or a statistic changing by a certain amount over the set interval Alarms can be set to respond to rising or falling thresholds However note that after an alarm is triggered it will not be triggered again until the statistical value crosses the opposite bounding threshold and then back ac
225. he integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 303 APPENDIX C License Information The GNU General Public License 10 11 If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License The Free Software Foundation may publish revised and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it a
226. he number of unknown or illegal LACP frames that have been discarded at each port 25o CHAPTER 5 Monitoring the Switch Displaying Information on Loop Protection WEB INTERFACE To display LACP statistics for local ports this switch click Monitor LACP Port Statistics Figure 124 LACP Port Statistics LACP Statistics Auto refresh Refresh Clear LACP LACP Discarded Received 1 0 0 cl ea 2 0 0 0 a 3 0 0 0 a 4 0 0 0 0 5 a 0 a 0 DISPLAYING INFORMATION ON LOOP PROTECTION Use the Loop Protection Status page to display information on loopback conditions PATH Monitor Loop Protection PARAMETERS These parameters are displayed Port Port identifier Action Configured port action i e the response to take when a loop is detected on a port Transmit Configured port transmit mode i e whether the port is actively generating loop protection PDUs Loops The number of loops detected on this port Status Current loop protection status of the port i e enabled or no Loop Whether a loop is currently detected on this port Time of Last Loop The time of the last loop event detected WEB INTERFACE To display loop protection status click Monitor Loop Protection Figure 125 Loop Protection Status Loop Protection Status Auto refresh Refresh EEES Shutdown Enabled Shutdown Enabled Shutdown Enabled ti Shutdown Enabled Down Shutdown
227. hrough the switch is destined for many different hosts Do not use this mode for switch to router trunk links where the destination MAC address is the same for all traffic IP Address All traffic with the same source and destination IP address is output on the same link in a trunk This mode works best for switch to router trunk links where traffic through the switch is destined for many different hosts Do not use this mode for switch to server trunk links where the destination IP address is the same for all traffic One of the defaults TCP UDP Port Number All traffic with the same source and destination TCP UDP port number is output on the same link in a trunk Avoid using his mode as a lone option It may overload a single port member of the trunk for application traffic of a specific type such as web browsing However it can be used effectively in combination with the IP Address option One of the defaults 12r CHAPTER 4 Configuring the Switch Creating Trunk Groups Aggregation Group Configuration Group ID Trunk identifier Port Members Port identifier WEB INTERFACE To configure a static trunk 1 Click Configuration Aggregation Static 2 Select one or more load balancing methods to apply to the configured trunks 3 Assign port members to each trunk that will be used 4 Click Save Figure 42 Static Trunk Configuration Aggregation Mode Configuration Hash Code Contributors S
228. ials for authentication from any point within the network 85 Configuring Security CHAPTER 4 Configuring the Switch Figure 30 Using Port Security J 802 1x client RRR nana SG 2 1 Client attempts to access a switch port 2 Switch sends client an identity request RADIUS 3 Client sends back identity information server 4 Switch forwards this to authentication server 5 Authentication server challenges client 6 Client responds with proper credentials 7 Authentication server approves access 8 Switch grants client access to this port This switch uses the Extensible Authentication Protocol over LANs EAPOL to exchange authentication protocol messages with the client and a remote RADIUS authentication server to verify user identity and access rights These backend servers are configured on the AAA menu see page 117 When a client i e Supplicant connects to a switch port the switch i e Authenticator responds with an EAPOL identity request The client provides its identity such as a user name in an EAPOL response to the switch which it forwards to the RADIUS server The RADIUS server verifies the client identity and sends an access challenge back to the client The EAP packet from the RADIUS server contains not only the challenge but the authentication method to be used The client can reject the authentication method and request another depending on
229. icast group detected on this interface Port Port identifier Mode The filtering mode maintained per VLAN ID port number and Group Address It can be either Include or Exclude Source Address IP Address of the source Currently the system limits the total number of IP source addresses for filtering to be 128 Different source addresses belong to the same group are treated as single entry Type Indicates the Type It can be either Allow or Deny Hardware Filter Switch Indicates whether the data plane destined to the specific group address from the source IPv4 address can be handled by the chip or not WEB INTERFACE To display IGMP Source Filtered Multicast information click Monitor IGMP Snooping IGMP SFM Information Figure 135 IPv4 SFM Information IGMP SFM Information Auto refresh l Refresh k lt gt gt Start from VLAN 1 and Group 224 0 0 0 with 20 entries per page VLAN ID Group Port Mode Source Address Type Hardware Filter Switch No more entries SHOWING MLD SNOOPING INFORMATION SHOWING MLD SNOOPING STATUS Use the MLD Snooping pages to display MLD snooping statistics port members of each service group and information on source specific groups Use the IGMP Snooping Status page to display MLD querier status and snooping statistics for each VLAN carrying multicast traffic and the ports connected to an upstream multicast router switch PATH Monitor IPMC MLD Snooping
230. ice Are you sure you want to perform a Restart 287 CHAPTER 7 Performing System Maintenance Restoring Factory Defaults RESTORING FACTORY DEFAULTS Use the Factory Defaults page to restore the original factory settings except for the management IP parameters CAUTION To restore the factory defaults for all settings including the management IP settings connect a cable from port 1 to port 2 and then reset power to the switch PATH Maintenance Restart Device WEB INTERFACE To restore factory defaults 1 Click Maintenance Factory Defaults 2 Click Yes The factory defaults are immediately restored which means that no reboot is necessary Figure 153 Factory Defaults Factory Defaults Are you sure you want to reset the configuration to Factory Defaults UPGRADING FIRMWARE Use the Software Upload page to upgrade the switch s system firmware by specifying a file provided by LevelOne You can download firmware files for your switch from the LevelOne web site PATH Maintenance Software Upload WEB INTERFACE To upgrade firmware 1 Click Maintenance Software Upload 2 Click the Browse button and select the firmware file 288 CHAPTER 7 Performing System Maintenance Activating the Alternate Image 3 Click the Upload button to upgrade the switch s firmware After the software image is uploaded a page announces that the firmware update has been initiated After about a
231. icts UnAware Disabled Untag_this 1 No UnAware Disabled Untag_this No UnAware Disabled Untag_this UnAware Disabled Untag this No No 1 1 2 1 1 3 1 UnAware Disabled Untag_this 1 No 4 1 1 5 1 1 DISPLAYING INFORMATION ABOUT MAC BASED VLANS Use the MAC based VLAN Membership Status page to display the MAC address to VLAN map entries PATH Monitor VCL MAC based VLAN es A CHAPTER 5 Monitoring the Switch Displaying Information About Flow Sampling PARAMETERS These parameters are displayed MAC based VLAN User A user or software module that uses VLAN management services to configure MAC based VLAN membership This switch supports the following VLAN user modules Static MAC addresses statically assigned to a VLAN and member port through the CLI Web or SNMP NAS Provides port based authentication which involves communications between a Supplicant Authenticator and an Authentication Server Combined Includes all entries MAC Address A source MAC address which is mapped to a specific VLAN VLAN ID VLAN to which ingress traffic matching the specified source MAC address is forwarded Port Members The ports assigned to this VLAN WEB INTERFACE 1 To display MAC based VLAN membership settings click Monitor VCL MAC based VLAN 2 Select a software module from the drop down list on the right side of the page Figure 148 Showing MAC based VLAN Membership Status MAC based VLAN
232. ield When first visited the web page will show the first 20 entries from the beginning of the Dynamic IP Source Guard Table PATH Monitor Security Network IP Source Guard WEB INTERFACE To display the Dynamic IP Source Guard Table click Monitor Security Network IP Source Guard Figure 115 Dynamic IP Source Guard Table Dynamic IP Source Guard Table Auto refresh L Start from Port ov WLAN 1 and IP address 0 0 0 0 with 20 entries per page ORE IP Address MAC Address No more entries DAR x CHAPTER 5 Monitoring the Switch Displaying Information on Authentication Servers DISPLAYING INFORMATION ON AUTHENTICATION SERVERS DISPLAYING A LIST OF AUTHENTICATION SERVERS Use the Monitor Authentication pages to display information on RADIUS authentication and accounting servers including the IP address and statistics for each server Use the RADIUS Overview page to display a list of configured authentication and accounting servers PATH Monitor Security AAA RADIUS Overview PARAMETERS These parameters are displayed IP Address The IP address and UDP port number of this server Status The current state of the server This field takes one of the following values Disabled The server is disabled Not Ready The server is enabled but IP communication is not yet up and running Ready The server is enabled IP communication is up and running and the RADIUS module is ready
233. igabit ports on the front panel can be trunked together including ports of different media types All the ports in a trunk have to be treated as a whole when moved from to added or deleted from a VLAN STP VLAN and IGMP settings can only be made for the entire trunk Use the Aggregation Mode Configuration page to configure the aggregation mode and members of each static trunk group PATH Basic Advanced Configuration Aggregation Static USAGE GUIDELINES When configuring static trunks you may not be able to link switches of different types depending on the manufacturer s implementation However note that the static trunks on this switch are Cisco EtherChannel compatible To avoid creating a loop in the network be sure you add a static trunk via the configuration interface before connecting the ports and also disconnect the ports before removing a static trunk via the configuration interface When incoming data frames are forwarded through the switch to a trunk the switch must determine to which port link in the trunk an outgoing frame should be sent To maintain the frame sequence of various traffic flows between devices in the network the switch also 120 CHAPTER 4 Configuring the Switch Creating Trunk Groups needs to ensure that frames in each conversation are mapped to the same trunk link To achieve this requirement and to distribute a balanced load across all links in a trunk the switch uses
234. ilters incoming multicast frames for services for which no attached host has registered or forwards them to all ports contained within the designated multicast VLAN group Multicast VLAN Registration is a method of using a single network wide multicast VLAN to transmit common services such as such as television channels or video on demand across a service provider s network MVR simplifies the configuration of multicast services by using a common VLAN for distribution while still preserving security and data isolation for subscribers residing in both the MVR VLAN and other standard or private VLAN groups Network Time Protocol provides the mechanisms to synchronize time across the network The time servers operate in a hierarchical master slave configuration in order to synchronize local clocks within the subnet and to national time standards via wire or radio See IEEE 802 1X A method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON probe This allows data on the target port to be studied unobstructively 309 GLOSSARY PORT TRUNK PRIVATE VLANS QinQ QoS RADIUS RMON RSTP SMTP SNMP SNTP Defines a network link aggregation and trunking method which specifies how to create a single high speed logical link that combines several lower speed physical links Private VLANs provide port based security and isolation between ports within the as
235. information about neighboring devices in the local broadcast domain by using periodic broadcasts to advertise information such as device identification capabilities and configuration settings 308 MD5 MLD SNOOPING MSTP MULTICAST SWITCHING MVR NTP PORT AUTHENTICATION PORT MIRRORING GLOSSARY MD5 Message Digest is an algorithm that is used to create digital signatures It is intended for use with 32 bit machines and is safer than the MD4 algorithm which has been broken MD5 is a one way hash function meaning that it takes a message and converts it into a fixed string of digits also called a message digest Management Information Base An acronym for Management Information Base It is a set of database objects that contains information about a specific device Multicast Listener Discovery MLD snooping dynamically configures switch ports to limit IPv6 multicast traffic so that it is forwarded only to ports with users that want to receive it This switch supports MLDv1 which includes Listener Query Listener Report and Listener Done messages equivalent to IGMPv2 query report and leave messages Multiple Spanning Tree Protocol can provide an independent spanning tree for different VLANs It simplifies network management provides for even faster convergence than RSTP by limiting the size of each region and prevents VLAN members from being segmented from the rest of the group A process whereby the switch f
236. ing threshold 80 CHAPTER 4 Configuring the Switch Configuring Security Rising or Falling Trigger alarm when the first value is larger than the rising threshold or less than the falling threshold default Rising Threshold If the current value is greater than the rising threshold and the last sample value was less than this threshold then an alarm will be generated After a rising event has been generated another such event will not be generated until the sampled value has fallen below the rising threshold reaches the falling threshold and again moves back up to the rising threshold Range 2147483647 to 2147483647 Rising Index The index of the event to use if an alarm is triggered by monitored variables crossing above the rising threshold If there is no corresponding entry in the event control table then no event will be generated Range 1 65535 Falling Threshold If the current value is less than the falling threshold and the last sample value was greater than this threshold then an alarm will be generated After a falling event has been generated another such event will not be generated until the sampled value has risen above the falling threshold reaches the rising threshold and again moves back down to the failing threshold Range 2147483647 to 2147483647 Falling Index The index of the event to use if an alarm is triggered by monitored variables crossing below the falling threshold I
237. ions and isolates a variety of common faults that can occur on Category 5 twisted pair cabling WEB INTERFACE To run cable diagnostics 1 Click Diagnostics VeriPHY 2 Select all ports or indicate a specific port for testing 3 Click Start If a specific port is selected the test will take approximately 5 seconds If all ports are selected it can run approximately 15 seconds When completed the page refreshes automatically and you can view the cable diagnostics results in the cable status table Note that VeriPHY is only accurate for cables 7 140 meters long Ports will be linked down while running VeriPHY Therefore running VeriPHY on a management port will cause the switch to stop responding until testing is completed Figure 151 VeriPHY Cable Diagnostics VeriPHY Cable Diagnostics Ea Open 0 Open O Open 0 Open 285 CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics 286 PERFORMING SYSTEM MAINTENANCE This chapter describes how to perform basic maintenance tasks including upgrading software restoring or saving configuration settings and resetting the switch RESTARTING THE SWITCH Use the Restart Device page to restart the switch PATH Maintenance Restart Device WEB INTERFACE To restart the switch 1 Click Maintenance Restart Device 2 Click Yes The reset will be complete when the user interface displays the login page Figure 152 Restart Device Restart Dev
238. is physically disconnected and reconnected on the port by disconnecting the cable the port will remain shut down There are three ways to re open the port Boot the switch Disable and re enable Limit Control on the port or the switch Click the Reopen button Trap amp Shutdown If Limit 1 MAC addresses is seen on the port both the Trap and the Shutdown actions described above will be taken State This column shows the current state of the port as seen from the Limit Control s point of view The state takes one of four values Disabled Limit Control is either globally disabled or disabled on the port Ready The limit is not yet reached This can be shown for all Actions Limit Reached Indicates that the limit is reached on this port This state can only be shown if Action is set to None or Trap Shutdown Indicates that the port is shut down by the Limit Control module This state can only be shown if Action is set to Shutdown or Trap amp Shutdown Re open If a port is shut down by this module you may reopen it by clicking this button which will only be enabled if this is the case For other methods refer to Shutdown in the Action section Note that clicking the Reopen button causes the page to be refreshed so non committed changes will be lost ey a CHAPTER 4 Configuring the Switch Configuring Security WEB INTERFACE To configure port limit controls 1 Click Advanced Configu
239. issue in VoIP environments that frequently result in voice quality degradation or loss of service Policies are only intended for use with applications that have specific real time network policy requirements such as interactive voice and or video services The network policy attributes advertised are Layer 2 VLAN ID IEEE 802 1Q 2003 m Layer 2 priority value IEEE 802 1D 2004 Layer 3 Diffserv code point DSCP value IETF RFC 2474 164 CHAPTER 4 Configuring the Switch Link Layer Discovery Protocol This network policy is potentially advertised and associated with multiple sets of application types supported on a given port The application types specifically addressed are m Voice m Guest Voice m Softphone Voice m Video Conferencing Streaming Video Control Signaling conditionally support a separate network policy for the media types above A large network may support multiple VoIP policies across the entire organization and different policies per application type LLDP MED allows multiple policies to be advertised per port each corresponding to a different application type Different ports on the same Network Connectivity Device may advertise different sets of policies based on the authenticated user identity or port configuration It should be noted that LLDP MED is not intended to run on links other than between Network Connectivity Devices and Endpoints and therefore does not need to
240. istory Alarm Event ANSI TIA 1057 LLDP for Media Endpoint Discovery LLDP MED IEEE 802 1AB Link Layer Discovery Protocol IEEE 802 1ad Provider Bridge IEEE 802 1D 2004 Spanning Tree Algorithm and traffic priorities Spanning Tree Protocol Rapid Spanning Tree Protocol Multiple Spanning Tree Protocol IEEE 802 1p Priority tags IEEE 802 1Q 2005 VLAN IEEE 802 1v Protocol based VLANs IEEE 802 1X Port Authentication IEEE 802 3 2005 Ethernet Fast Ethernet Gigabit Ethernet Link Aggregation Control Protocol LACP Full duplex flow control ISO IEC 8802 3 IEEE 802 3ac VLAN tagging ARP RFC 826 DHCP Client RFC 2131 DHCPv6 Client RFC 3315 HTTPS ICMP RFC 792 IGMP RFC 1112 IGMPv2 RFC 2236 IGMPv3 RFC 3376 partial support IPv4 IGMP RFC 3228 NTP RFC 1305 RADIUS RFC 2618 RMON RFC 2819 groups 1 2 3 9 SNMP RFC 1157 SNMPv2c RFC 2571 SNMPv3 RFC DRAFT 3414 3415 SNTP RFC 2030 SSH Version 2 0 TFTP RFC 1350 297 APPENDIX A Software Specifications Management Information Bases MANAGEMENT INFORMATION BASES Bridge MIB RFC 4188 DHCP Option for Civic Addresses Configuration Information RFC 4776 Differentiated Services MIB RFC 3289 DNS Resolver MIB RFC 1612 Entity MIB version 3 RFC 4133 Ether like MIB RFC 3635 Extended Bridge MIB RFC 2674 Extensible SNMP Agents MIB RFC 2742 Forwarding Table MIB RFC 2096 IGMP MIB RFC 2933 Interface Group MIB using SMI v2 RFC 2863 Interface
241. istribute or modify the Program subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties to this License If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Program at all For example if a patent license would not permit royalty free redistribution of the Program by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting t
242. itted Note that weighted scheduling uses a combination of weighted service for queues 0 6 and strict service for the high priority queues 7 and 8 Queue Shaper Controls whether queue shaping is enabled for this queue on this port Enable Enables or disables queue shaping Default Disabled Rate Controls the rate for the queue shaper The default value is 500 This value is restricted to 100 1000000 kbps or 1 3300 Mbps Unit Controls the unit of measure for the queue shaper rate as kbps or Mbps Default kbps Excess Controls whether the queue is allowed to use excess bandwidth Default Disabled Queue Scheduler When the Scheduler Mode is set to Weighted you need to specify a relative weight for each queue DWRR uses a predefined relative weight for each queue that determines the percentage of service time the switch services each queue before moving on to the next queue This prevents the head of line blocking that can occur with strict priority queuing m Weight A weight assigned to each of the queues and thereby to the corresponding traffic priorities This weight sets the frequency at which each queue is polled for service and subsequently affects the response time for software applications assigned a specific priority value Range 1 100 Default 17 Percent The weight as a percentage for this queue OO CHAPTER 4 Configuring the Switch Quality of Service Por
243. lHold No MAC addresses attached Use the Network Access Server Switch Status page to show the port status for authentication services including 802 1X security state last source address used for authentication and last ID PATH Monitor Security Network NAS Switch PARAMETERS These parameters are displayed Port The switch port number Click to navigate to detailed NAS statistics for this port Admin State The port s current administrative state Refer to NAS Admin State for a description of possible values see page 85 Port State The current state of the port Refer to NAS Port State for a description of the individual states see page 85 Last Source The source MAC address carried in the most recently received EAPOL frame for EAPOL based authentication and the most 2392 CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings recently received frame from a new client for MAC based authentication Last ID The user name supplicant identity carried in the most recently received Response Identity EAPOL frame for EAPOL based authentication and the source MAC address from the most recently received frame from a new client for MAC based authentication QoS Class The QoS class that NAS has assigned to this port This field is blank if the has not been assigned by NAS Refer to RADIUS Assigned QoS Enabled for a description of this attribute see page 85
244. lancing the traffic load preventing wide scale disruption when a bridge node in a single instance fails and allowing for faster convergence of a new topology for the failed instance To allow multiple spanning trees to operate over the network you must configure a related set of bridges with the same MSTP 1 STP and RSTP BPDUs are transmitted as untagged frames and will cross any VLAN boundaries DO CHAPTER 4 Configuring the Switch Configuring the Spanning Tree Algorithm configuration allowing them to participate in a specific set of spanning tree instances A Spanning tree instance can exist only on bridges that have compatible VLAN instance assignments Be careful when switching between spanning tree modes Changing modes stops all spanning tree instances for the previous mode and restarts the system in the new mode temporarily disrupting user traffic PARAMETERS These parameters are displayed Basic Settings Protocol Version Specifies the type of spanning tree used on this switch Options STP RSTP MSTP Default MSTP STP Spanning Tree Protocol IEEE 802 1D i e the switch will use RSTP set to STP forced compatibility mode RSTP Rapid Spanning Tree IEEE 802 1w MSTP Multiple Spanning Tree IEEE 802 1s This is the default Bridge Priority Bridge priority is used in selecting the root device root port and designated port The device with the highest priority becomes the ST
245. lass requested power allocated power power and current used and PoE priority PATH Monitor PoE PARAMETERS These parameters are displayed Local Port The port on this switch which received the LLDP frame PD class Each PD is classified according to the maximum power it will use The PD classes include Class 0 Max power 15 4 W Class 1 Max power 4 0 W Class 2 Max power 7 0 W Class 3 Max power 15 4 W Class 4 Max power 30 0 W Power Requested Amount of power the PD wants to be reserved Power Allocated Amount of power the switch has allocated for the PD Power Used How much power the PD is currently using 275 CHAPTER 5 Monitoring the Switch Displaying the MAC Address Table Current Used How much current the PD is currently using Priority The port s configured priority level see page 167 Port Status PoE service status for the attached device WEB INTERFACE To display the status for all PoE ports click Monitor PoE Figure 144 Power over Ethernet Status Power Over Ethernet Status Auto refresh Refresh 0 VW 0 VW 0 VW 0 mA Low No PD detected 0 Wy O Wy O Wy 0 ma Low No PD detected 0 0 3 D ow ow D w D mA Low No PD detected 4 o o w ow o w D mA Low No PD detected 5 o ow O VW OW D mA Low No PD detected DISPLAYING THE MAC ADDRESS TABLE Use the MAC Address Table to display dynamic and static ad
246. le page 173 these interfaces will admit traffic of any protocol type into the associated VLAN When a frame enters a port that has been assigned to a protocol VLAN it is processed in the following manner Ifthe frame is tagged it will be processed according to the standard rules applied to tagged frames If the frame is untagged and the protocol type matches the frame is forwarded to the appropriate VLAN If the frame is untagged but the protocol type does not match the frame is forwarded to the default VLAN for this interface PARAMETERS These parameters are displayed Group Name The name assigned to the Protocol VLAN Group This name must be a unique 16 character long string which consists of a combination of alphabetic characters a z or A Z or integers 0 9 VLAN ID VLAN to which matching protocol traffic is forwarded Range 1 4095 Port Members Ports assigned to this protocol VLAN WEB INTERFACE To map a protocol group to a VLAN for a port or trunk 1 2 Click Configuration VCL Protocol based VLANs Group to VLAN Enter the identifier for a protocol group Enter the corresponding VLAN to which the protocol traffic will be forwarded Select the ports which will be assigned to this protocol VLAN Click Save 18 CHAPTER 4 Configuring the Switch Configuring IP Subnet based VLANs Figure 71 Assigning Ports to Protocol VLANs Group Name to VLAN mapping Table Port
247. les or disables Voice VLAN operation on the switch Default Disabled VLAN ID Sets the Voice VLAN ID for the network Only one Voice VLAN is supported on the switch Range 1 4095 Default 1000 The Voice VLAN cannot be the same as that defined for any other function on the switch such as the management VLAN see Setting an IPv4 Address on page 46 the MVR VLAN see Multicast VLAN Registration on page 140 or the native VLAN assigned to any port see Configuring VLAN Attributes for Port Members on page 174 Aging Time The time after which a port is removed from the Voice VLAN when VoIP traffic is no longer received on the port Range 10 10 000 000 seconds Default 86400 seconds Traffic Class Defines a service priority for traffic on the Voice VLAN The priority of any received VoIP packet is overwritten with the new priority when the Voice VLAN feature is active on a port Range 0 7 Default 7 The switch provides eight priority queues for each port For information on how these queues are used see Configuring Egress Port Scheduler on page 189 Port Configuration Mode Specifies if the port will be added to the Voice VLAN Default Disabled Disabled The Voice VLAN feature is disabled on the port The port will not detect VoIP traffic or be added to the Voice VLAN Auto The port will be added as a tagged member to the Voice VLAN when VoIP traffic is detected on the port You must select
248. lists QOS 199 CPU status 220 utilization showing 220 D default IPv4 gateway configuring 47 default IPv6 gateway configuring 49 default settings system 28 DHCP 46 client 46 relay information option 110 relay information option policy 110 DHCP snooping 107 DNS server 47 Domain Name Service See DNS downloading software 288 using HTTP 288 using TFTP 288 drop precedence QoS 188 DSCP classification QOS 199 rewriting port 195 translation port 195 translation QoS 198 dynamic addresses displaying 171 276 E edge port STA 137 EEE LLDP neighbor information 272 egress port scheduler QoS 189 event logging 221 F firmware displaying version 219 upgrading 288 upgrading with HTTP 288 upgrading with TFTP 288 G gateway IPv4 default 47 IPv6 default 49 GNU license 301 H HTTP HTTPS filtering IP addresses 66 HTTPS 65 configuring 65 secure server 65 IEEE 802 1D 127 IEEE 802 1s 127 IEEE 802 1w 127 IGMP 145 fast leave status 148 filter parameters 151 filtering 151 groups displaying 262 264 proxy 147 querier configuring 149 query 149 313 INDEX snooping configuring 149 snooping description 145 snooping fast leave 148 throttling 148 ingress classification QOS 196 ingress filtering 175 ingress rate limiting 188 IP address setting 46 IP source guard configuring static entries 113 IPv4 address DHCP 46 setting 46 IPv6 address dynamic configuration global unicas
249. m 1984 CRS Code 4327 Prime Meridian Name Greenwich NAD83 NAVD88 North American Datum 1983 CRS Code 4269 Prime Meridian Name Greenwich The associated vertical datum is the North American Vertical Datum of 1988 NAVD88 This datum pair is to be used when referencing locations on land not near tidal water which would use Datum NAD83 MLLW NAD83 MLLW North American Datum 1983 CRS Code 4269 Prime Meridian Name Greenwich The associated vertical datum is Mean Lower Low Water MLLW This datum pair is to be used when referencing locations on water sea ocean Civic Address Location IETF Geopriv Civic Address based Location Configuration Information Civic Address LCI Country code The two letter ISO 3166 country code in capital ASCII letters Example DK DE or US State National subdivisions state canton region province prefecture County County parish gun Japan district m City City township shi Japan Example Copenhagen a City District City division borough city district ward chou Japan Block Neighborhood Neighborhood block Street Street Example Poppelvej Leading street direction Leading street direction Example N 163 CHAPTER 4 Configuring the Switch Link Layer Discovery Protocol Trailing street suffix Trailing street suffix Example SW Street suffix Street suffix Example Ave Platz House no House number Exa
250. m the System menu and either submit a request for an address from a local DHCPv6 server by marking the Auto Configuration check box or configure a static address by filling in the parameters for an address network prefix length and gateway router No other configuration changes are required at this stage but it is recommended that you change the administrator s password before Si 34 CHAPTER 2 Initial Switch Configuration logging out To change the password click Security and then Users Select admin from the User Configuration list fill in the Password fields and then click Save e oe SECTION Ill WEB CONFIGURATION This section describes the basic switch features along with a detailed description of how to configure each feature via a web browser This section includes these chapters Using the Web Interface on page 35 Configuring the Switch on page 45 Monitoring the Switch on page 219 Performing Basic Diagnostics on page 283 Performing System Maintenance on page 287 33 SECTION II Web Configuration svga ie USING THE WEB INTERFACE This switch provides an embedded HTTP web agent Using a web browser you can configure the switch and view statistics to monitor network activity The web agent can be accessed by any computer on the network using a standard web browser Internet Explorer 5 0 Mozilla Firefox 2 0 0 0 or more recent versions NAVIGATING T
251. match IPv4 frames which are not ICMP UDP or TCP Action Indicates the forwarding action of the ACE Permit Frames matching the ACE may be forwarded and learned Deny Frames matching the ACE are dropped Rate Limiter Indicates the rate limiter number implemented by the ACE The allowed range is 1 to 15 Port Redirect Indicates the port redirect operation implemented by the ACE Frames matching the ACE are redirected to the listed port CPU Forwards packet that matched the specific ACE to the CPU CPU Once Forwards first packet that matched the specific ACE to the CPU Counter The number of times the ACE was matched by a frame Conflict This field shows Yes if a specific ACE is not applied due to hardware limitations WEB INTERFACE To display ACL status 1 Click Monitor Security Network ACL Status 2 Select a software module from the scroll down list Figure 111 ACL Status ACL Status Combined v Auto refresh I _Reftesh _Refresh User Ingress Port Frame Type Action Rate Limiter CPU Once UPnP All IPv4 UDP 1900 Permit Disabled Disabled Yes No 5 No UPnP All IPv4 DIP 224 0 0 1 32 Permit Disabled Disabled Yes No 0 No 298 CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings DISPLAYING Use the DHCP Snooping Port Statistics page to show statistics for various STATISTICS FOR types of DHCP protocol packets DHCP SNOOPING PATH Monitor
252. me is assigned to the VLAN indicated in the VLAN tag and the tag is removed 278 CHAPTER 5 Monitoring the Switch Displaying Information About MAC based VLANs Ingress Filtering If ingress filtering is enabled and the ingress port is not a member of the classified VLAN of the frame the frame is discarded Frame Type Shows whether the port accepts all frames or only tagged frames If the port only accepts tagged frames untagged frames received on that port are discarded Tx Tag Shows egress filtering frame status indicating whether frames are transmitted as tagged or untagged UVID Shows the untagged VLAN ID A port s UVID determines the packet s behavior at the egress side If the VID of Ethernet frames leaving a port match the UVID these frames will be sent untagged Conflicts Shows whether conflicts exist or not When a software module requests to set VLAN membership or VLAN port configuration the following conflicts can occur Functional conflicts between features Conflicts due to hardware limitations Direct conflicts between user modules WEB INTERFACE 1 To display VLAN port status click Monitor VLANs VLAN Port 2 Select a software module from the drop down list on the right side of the page Figure 147 Showing VLAN Port Status VLAN Port Status for Static user Static v Auto refresh T Refresh Port PviD Port Type Ingress Filtering Frame Type Tx Tag UVID Confl
253. minute the firmware is updated and the switch is rebooted A CAUTION While the firmware is being updated Web access appears to be defunct The front LED flashes Green Off at a frequency of 10 Hz while the firmware update is in progress Do not reset or power off the device at this time or the switch may fail to function afterwards Figure 154 Software Upload Firmware Update owes Conte ACTIVATING THE ALTERNATE IMAGE Use the Software Image Selection page to display information about the active and alternate backup firmware images in the switch or revert to the alternate image PATH Maintenance Image Select WEB INTERFACE To activate the alternate image 1 Click Maintenance Image Select 2 Click Activate Alternate Image Figure 155 Software Image Selection Software Image Selection Active Image Image managed Version GEP 5070 standalone v1 0 0 4 2013 03 28T04 09 34 04 00 Date 2013 03 28T04 09 34 04 00 Alternate Image Image managed bk Version GEP 5070 standalone v1 0 0 4 2013 03 25T05 47 31 04 00 Date 2013 03 25T05 47 31 04 00 Activate Altemate Image Cancel 289 CHAPTER 7 Performing System Maintenance Managing Configuration Files MANAGING CONFIGURATION FILES SAVING CONFIGURATION SETTINGS RESTORING CONFIGURATION SETTINGS Use the Maintenance Configuration pages to save the current configuration to a file on your computer or to restore previously saved configura
254. mirroring traffic m Mirror Local port mirroring see Configuring Local Port Mirroring on page 207 Source Specifies this device as the source of remotely mirrored traffic Source port s reflector port and intermediate port s are located on this switch Intermediate Specifies this device as an intermediate switch transparently passing mirrored traffic from one or more sources to one or more destinations Intermediate ports are located on this switch Destination Specifies this device as a switch which is to receive mirrored traffic for this session Intermediate port s and destination port s are located on this switch VLAN ID The VLAN to which traffic mirrored from the source port will be flooded Only destination and uplink ports will be assigned by the switch as members of the RSPAN VLAN Ports cannot be manually assigned to an RSPAN VLAN through the VLAN Membership configuration page Nor can GVRP dynamically add port members to an RSPAN VLAN Reflector Port A port on a source switch through which mirrored traffic is passed on to the RSPAN VLAN The reflector port only applies to Source switch type MAC Table learning and STP must be disabled on the reflector port Port Port Identifier Source A port from which traffic is mirrored onto the RSPAN VLAN Options Disabled Both Rx only Tx only 210 CHAPTER 4 Configuring the Switch Configuring Remote Port Mirroring Intermediate
255. mple 21 House no suffix House number suffix Example A 1 2 Landmark Landmark or vanity address Example Columbia University u Additional location info Additional location information Example South Wing Name Name residence and office occupant Example Flemming Jahn Zip code Postal zip code Example 2791 Building Building structure Example Low Library Apartment Unit Apartment suite Example Apt 42 Floor Floor Example 4 Room no Room number Example 450F Place type Place type Example Office Postal community name Postal community name Example Leonia P O Box Post office box P O BOX Example 12345 Additional code Additional code Example 1320300003 Emergency Call Service Emergency Call Service e g 911 and others such as defined by TIA or NENA ELIN identifier data format is defined to carry the ELIN identifier as used during emergency call setup to a traditional CAMA or ISDN trunk based PSAP This format consists of a numerical digit string corresponding to the ELIN to be used for emergency calling Policies Network Policy Discovery enables the efficient discovery and diagnosis of mismatched issues with the VLAN configuration along with the associated Layer 2 and Layer 3 attributes which apply for a set of specific protocol applications on that port Improper network policy configurations are a very significant
256. n but the data is not encrypted 76 REMOTE MONITORING CHAPTER 4 Configuring the Switch Configuring Security Auth Priv SNMP communications use both authentication and encryption Read View Name The configured view for read access Range 1 32 characters ASCII characters 33 126 only Write View Name The configured view for write access Range 1 32 characters ASCII characters 33 126 only WEB INTERFACE To configure SNMPv3 group access rights 1 Click Advanced Configuration Security Switch SNMP Access 2 Click Add New Access to create a new entry 3 Specify the group name security settings read view and write view 4 Click Save Figure 24 SNMPv3 Access Configuration SNMPv3 Access Configuration Delete Group Name Security Model Security Level Read View Name default_ro_group any NoAuth NoPriv defaultview None default_rw_group any NoAuth NoPriv default_view default_view Add new access l Save Reset Remote Monitoring allows a remote device to collect information or respond to specified events on an independent basis This switch is an RMON capable device which can independently perform a wide range of tasks significantly reducing network management traffic It can continuously run diagnostics and log information on network performance If an event is triggered it can automatically notify the network administrator of a failure
257. n Ethernet type value MAC address VLAN ID VLAN priority ARP based on ARP RARP type request reply sender target IP hardware address matches ARP RARP MAC address ARP RARP hardware address length matches protocol address length matches this entry when ARP RARP hardware address is equal to Ethernet 99 CHAPTER 4 Configuring the Switch Configuring Security matches this entry when ARP RARP protocol address space setting is equal to IP 0x800 IPv4 frames based on destination MAC address protocol type TTL IP fragment IP option flag source destination IP VLAN ID VLAN priority PARAMETERS These parameters are displayed ACCESS CONTROL LIST CONFIGURATION Ingress Port The ingress port of the ACE All The ACE will match all ingress ports Port The ACE will match a specific ingress port Policy Bitmask The policy number and bitmask of the ACE Frame Type The type of frame to match Action Shows whether a frame is permitted or denied when it matches an ACL rule Rate Limiter Shows if rate limiting will be enabled or disabled when matching frames are found Port Redirect Port to which frames matching the ACE are redirected Mirror Mirrors matching frames from this port Default Disabled See Configuring Local Port Mirroring on page 207 Counter Shows he number of frames which have matched any of the rules defined for this ACL The following buttons are used to edit o
258. nctions 60 Auth Method Configures authentication method for management access 61 via local database RADIUS or TACACS SSH Configures the Secure Shell server 64 HTTPS Configures secure HTTP settings 65 x37 S CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface Table 4 Main Menu Continued Menu Description Page Access Sets IP addresses of clients allowed management access via 66 Management HTTP HTTPS and SNMP and Telnet SSH SNMP Simple Network Management Protocol 67 System Configures read only and read write community strings for 68 SNMP v1 v2c engine ID for SNMP v3 and trap parameters Communities Configures community strings 72 Users Configures SNMP v3 users on this switch 73 Groups Configures SNMP v3 groups 74 Views Configures SNMP v3 views Fis Access Assigns security model security level and read write views 76 to SNMP groups RMON Remote Monitoring 77 Statistics Enables collection of statistics on a physical interface 78 History Periodically samples statistics on a physical interface 78 Alarm Sets threshold bounds for a monitored variable 80 Event Creates a response for an alarm 82 Network Limit Control Configures port security limit controls including secure 83 address aging and per port security including maximum allowed MAC addresses and response for security breach NAS Configures global and port settings for IEEE 802 1X 85 ACL Access Control Lists 96 Ports Assigns ACL rate limiter and other
259. nd any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
260. ne protects against message replay delay and redirection The engine ID is also used in combination with user passwords to generate the security keys for authenticating and encrypting SNMPv3 packets A local engine ID is automatically generated that is unique to the switch This is referred to as the default engine ID If the local engine ID is deleted or changed all local SNMP users will be cleared You will need to reconfigure all existing users SNMP Trap Configuration Trap Mode Enables or disables SNMP traps Default Disabled You should enable SNMP traps so that key events are reported by this switch to your management station Traps indicating status changes can be issued by the switch to the specified trap manager by sending authentication failure messages and other trap messages Trap Version Indicates if the target user is running SNMP v1 v2c or v3 Default SNMP v1 Trap Community Specifies the community access string to use when sending SNMP trap packets Range 0 255 characters ASCII characters 33 126 only Default public Trap Destination Address IPv4 address of the management station to receive notification messages Trap Destination IPv6 Address IPv6 address of the management station to receive notification messages An IPv6 address must be formatted according to RFC 2373 IPv6 Addressing Architecture using e CHAPTER 4 Configuring the Switch Configuring Security 8 colon se
261. ned to the frame The IP subnet cannot be a broadcast or multicast IP address When MAC based IP subnet based and protocol based VLANs are supported concurrently priority is applied in this sequence and then port based VLANs last PARAMETERS These parameters are displayed VCE ID Index of the entry Range 0 256 where 0 auto generates the index number for an entry 182 CHAPTER 4 Configuring the Switch Managing VoIP Traffic IP Address The IP address for a subnet Valid IP addresses consist of four decimal numbers 0 to 255 separated by periods Mask Length The network mask length VLAN ID VLAN to which matching IP subnet traffic is forwarded Range 1 4095 Port Members Ports assigned to an IP subnet VLAN WEB INTERFACE To configure an IP Subnet based VLAN 1 Click Advanced Configuration VCL IP Subnet based VLAN 2 Enter the VCE identifier the network mask length and the VLAN identifier Then mark the ports which will be assigned to this VLAN 3 Click Save Figure 72 Assigning Ports to an IP Subnet based VLAN IP Subnet based VLAN Membership Configuration MANAGING VOIP TRAFFIC When IP telephony is deployed in an enterprise network it is recommended to isolate the Voice over IP VoIP network traffic from other data traffic Traffic isolation can provide higher voice quality by preventing excessive packet delays packet loss and jitter This is best achieved by
262. ng SERVICE EAPOL based IEEE 802 1X authentication For MAC based authenticated ports it shows statistics only for the backend server RADIUS Authentication Server PATH Monitor Security Network NAS Port A S CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings PARAMETERS These parameters are displayed Port State Admin State The port s current administrative state Refer to NAS Admin State for a description of possible values see page 85 Port State The current state of the port Refer to NAS Port State for a description of the individual states see page 85 QoS Class The QoS class assigned by the RADIUS server The field is blank if no QoS class is assigned Port VLAN ID The VLAN in which NAS has placed this port This field is blank if the Port VLAN ID is not overridden by NAS If the VLAN ID is assigned by the RADIUS server RADIUS assigned is appended to the VLAN ID Refer to RADIUS Assigned VLAN Enabled for a description of this attribute see page 85 If the port is moved to the Guest VLAN Guest is appended to the VLAN ID Refer to Guest VLAN Enabled for a description of this attribute see page 85 Port Counters Receive EAPOL Counters Total The number of valid EAPOL frames of any type that have been received by the switch Response ID The number of valid EAPOL Response Identity frames that have been recei
263. ng or shut down a port when a matching frame is seen Note that rate limiting configured with the Rate Limiter menu page 98 is implemented regardless of whether or not a matching packet is seen PATH Advanced Configuration Security Network ACL Ports PARAMETERS These parameters are displayed Port Port Identifier 96 CHAPTER 4 Configuring the Switch Configuring Security Policy ID An ACL policy configured on the ACE Configuration page page 101 Range 1 8 Default 1 which is undefined Action Permits or denies a frame based on whether it matches a rule defined in the assigned policy Default Permit Rate Limiter ID Specifies a rate limiter page 98 to apply to the port Range 1 15 Default Disabled Port Redirect Defines a port to which matching frames are re directed Range 1 28 Default Disabled To use this function Action must be set to Deny for the local port Mirror Mirrors matching frames from this port Default Disabled To use this function the destination port to which traffic is mirrored must be configured on the Mirror Configuration page see Configuring Local Port Mirroring on page 207 ACL based port mirroring set by this parameter and port mirroring set on the general Mirror Configuration page are implemented independently To use ACL based mirroring enable the Mirror parameter on the ACL Ports Configuration page Then open the Mirror Configuration page set
264. ng DHCP Snooping 107 Configuring DHCP Relay and Option 82 Information 109 Configuring IP Source Guard 111 Configuring ARP Inspection 114 Specifying Authentication Servers 117 Creating Trunk Groups 119 Configuring Static Trunks 120 Configuring LACP 123 Configuring Loop Protection 125 Configuring the Spanning Tree Algorithm 127 Configuring Global Settings for STA 129 Configuring Multiple Spanning Trees 132 Configuring Spanning Tree Bridge Priorities 134 Configuring STP RSTP CIST Interfaces 135 Configuring MIST Interfaces 138 Multicast VLAN Registration 140 Configuring General MVR Settings 140 Configuring MVR Channel Settings 143 IGMP Snooping 145 Configuring Global and Port Related Settings for IGMP Snooping 145 Configuring VLAN Settings for IGMP Snooping and Query 149 Configuring IGMP Filtering MLD Snooping CONTENTS 152 Configuring Global and Port Related Settings for MLD Snooping 152 Configuring VLAN Settings for MLD Snooping and Query Configuring MLD Filtering Link Layer Discovery Protocol Configuring LLDP Timing and TLVs Configuring LLDP MED TLVs Power over Ethernet Configuring the MAC Address Table IEEE 802 1Q VLANs Assigning Ports to VLANs Configuring VLAN Attributes for Port Members Using Port Isolation Configuring MAC based VLANs Protocol VLANs Configuring Protocol VLAN Groups Mapping Protocol Groups to Ports Configuring IP Subnet based VLANs Managing VoIP Traffic Configuring VoIP Traffic Configuring Telephony OUI
265. ng a frame from this switch along a path that does not contain any VLAN aware devices including the destination host the switch should first strip off the VLAN tag before forwarding the frame Port VLAN ID VLAN ID assigned to untagged frames received on the interface Range 1 4095 Default 1 The port must be a member of the same VLAN as the Port VLAN ID Tx Tag Determines egress tagging for a port Untag_pvid All VLANs except for the native VLAN that using the PVID will be tagged Tag_all All VLANs are tagged Untag_all All VLANs are untagged WEB INTERFACE To configure attributes for VLAN port members 1 Click Configuration VLANs Ports 2 Configure in the required settings for each interface 3 Click Save Figure 67 VLAN Port Configuration Ethertype for Custom S ports Ox saa8 Auto refresh Refresh VLAN Port Configuration Port VLAN Port Port Type Ingress Filtering Frame Type Mode ID lt gt hd 7 lt gt hd Unaware Specific 7 Untag_pvid Unaware ar Specitcs 1 Untag pia Aieeware far Specitcs 1 Untag_pad Unaware Specific 7 Untag_pvid v e J z z zl zl 1 2 3 4 5 4 176 CHAPTER 4 Configuring the Switch Using Port Isolation USING PORT ISOLATION Use the Port Isolation Configuration page to prevent communications between customer ports within the same private VLAN Ports within a private VLAN PVLAN are isolated
266. ng is filled no new entries are learned If no router port is configured in the attached VLAN and Unregistered IPMCv6 Flooding is disabled any subsequent multicast traffic not found in the table is dropped otherwise it is flooded throughout the VLAN MLD SSM Range The Source Specific Multicast Range allows SSM aware hosts and routers to run the SSM service model for groups in the specified address range Default ff3e 96 IPv6 addresses in the range FF3x 96 are currently designated by RFC 4607 as SSM destination addresses and are reserved for use by source specific applications and protocols SSM aware hosts and routers running the SSM service model can pass traffic for any group within the specified address range When downstream hosts request service from a specific source for a multicast service these sources are all placed in the Include list and traffic is forwarded to the hosts from each of these sources MLD hosts may also request that service be forwarded from any source except for those specified In this case traffic is filtered from sources in the Exclude list and forwarded from all other available sources Leave Proxy Enabled Suppresses leave messages unless received from the last member port in the group Default Disabled MLD leave proxy suppresses all unnecessary MLD leave messages so that a non querier switch forwards an MLD leave packet only when the last dynamic member port leaves a multicast group
267. ng the Switch Displaying Information on RMON WEB INTERFACE To display RMON statistics click Monitor Security Switch RMON Statistics Figure 118 RMON Statistics RMON Statistics Status Overview Auto efresh Refresh I lt gt gt Start from Control Index fo with 20 entries per page T T Data 65 128 256 512 1024 Source Drop Octets Pkts Prot p one pi pre Frag Jabb Coll Bat ifindex yt 127 255 511 1023 1588 0 0 0 0 0 0 1090874 5156 189 3601 Use the RMON History Overview page to view statistics on a physical interface including network utilization packet types and errors PATH Monitor Security Switch RMON History PARAMETERS These parameters are displayed History Index Index of History control entry Sample Index Index of the data entry associated with the control entry Sample Start The time at which this sample started expressed in seconds since the switch booted up Utilization The best estimate of the mean physical layer network utilization on this interface during this sampling interval in hundredths of a percent For a description of the other statistical parameters not included in this list see Displaying RMON Statistics on page 247 249 CHAPTER 5 Monitoring the Switch Displaying Information on RMON WEB INTERFACE To display RMON historical samples click Monitor Security Switch RMON History
268. ng this advertisement If the neighbor device allows management access clicking on an entry in this field will re direct the web browser to the neighbor s management interface WEB INTERFACE To display information about LLDP neighbors click Monitor LLDP Neighbors Figure 139 LLDP Neighbor Information LLDP Neighbour Information Auto refresh Refresh Local Port Chassis D Remote Port ID System Name Port Description System Capabilities Management Address 8 Port 8 Port 1 00 01 C1 01 02 05 Bridge 192 168 1 11 IPv4 Use the LLDP MED Neighbor Information page to display information about a remote device connected to a port on this switch which is advertising LLDP MED TLVs including network connectivity device endpoint device capabilities application type and policy PATH Monitor LLDP LLDP MED Neighbors PARAMETERS These parameters are displayed Port The port on which an LLDP frame was received 208 CHAPTER 5 Monitoring the Switch Displaying LLDP Information Device Type LLDP MED devices are comprised of two primary types LLDP MED Network Connectivity Devices as defined in TIA 1057 provide access to the IEEE 802 based LAN infrastructure for LLDP MED Endpoint Devices An LLDP MED Network Connectivity Device is a LAN access device based on any of the following technologies LAN Switch Router IEEE 802 1 Bridge IEEE 802 3 Repeater included for historical reas
269. ngine ID SNMPv3 Specifies whether or not to use the engine ID of the SNMP trap probe in trap and inform messages Default Enabled Trap Security Engine ID SNMPv3 Indicates the SNMP trap security engine ID SNMPv3 sends traps and informs using USM for authentication and privacy A unique engine ID for these traps and informs is needed When Trap Probe Security Engine ID is enabled the ID will be probed automatically Otherwise the ID specified in this field is used Range 10 64 hex digits excluding a string of all 0 s or all F s Note The Trap Probe Security Engine ID must be disabled before an engine ID can be manually entered in this field Trap Security Name SNMPv3 Indicates the SNMP trap security name SNMPv3 traps and informs use USM for authentication and privacy A unique security name is needed when SNMPv3 traps or informs are enabled 70s CHAPTER 4 Configuring the Switch Configuring Security NoTE To select a name from this field first enter an SNMPv3 user with the same Trap Security Engine ID in the SNMPv3 Users Configuration menu see Configuring SNMPv3 Users on page 73 WEB INTERFACE To configure SNMP system and trap settings 1 Click Advanced Configuration Security Switch SNMP System 2 In the SNMP System Configuration table set the Mode to Enabled to enable SNMP service on the switch specify the SNMP version to use change the community access strings if required and set
270. ngs PARAMETERS These parameters are displayed Configuration Identification Configuration Name The name for this MSTI Maximum length 32 characters Default switch s MAC address Configuration Revision The revision for this MSTI Range 0 65535 Default 0 MSTI Mapping MSTI Instance identifier to configure The CIST is not available for explicit mapping as it will receive the VLANs not explicitly mapped Range 1 7 VLANs Mapped VLANs to assign to this MST instance The VLANs must be separated with comma and or space A VLAN can only be mapped to one MSTI Range 1 4094 WEB INTERFACE To add VLAN groups to an MSTP instance Click Configuration Spanning Tree MSTI Mapping Enter the VLAN group to add to the instance in the VLANs Mapped column Note that the specified member does not have to be a 1 2 configured VLAN 3 Click Save 2 The MST name and revision number are both required to uniquely identify an MST region 133 CHAPTER 4 Configuring the Switch Configuring the Spanning Tree Algorithm Figure 49 Adding a VLAN to an MST Instance onfiguration Add VLANs separated by spaces or comma Unmapped VLANs are mapped to the CIST The default bridge instance Configuration Identification Configuration Name 00 01 c1 01 02 03 Configuration Revision i MSTI Mapping MSTI VLANs Mapped MSTI1 CONFIGURING Use the MSTI Priorities page t
271. nt can be configured on the switch so that traffic from these devices is recognized as VoIP Note Making any changes to the OUI table will restart the auto detection process for attached VoIP devices PATH Advanced Configuration Voice VLAN OUI PARAMETERS These parameters are displayed Telephony OUI Specifies a globally unique identifier assigned to a vendor by IEEE to identify VoIP equipment The OUI must be 6 characters long and the input format xx xx xx where x is a hexadecimal digit Description User defined text that identifies the VoIP devices WEB INTERFACE To configure MAC OUI numbers for VoIP equipment 1 Click Advanced Configuration Voice VLAN OUI 2 Click Add new entry 186 CHAPTER 4 Configuring the Switch Quality of Service 3 Enter a MAC address that specifies the OUI for VoIP devices in the network and enter a description for the devices 4 Click Save Figure 74 Configuring an OUI Telephony List Voice VLAN OUI Table 00 01 e3 Siemens AG phones 00 03 6b Cisco phones 00 0f e2 H3C phones 00 60 b9 Philips and NEC AG phones 00 d0 1e Pingtel phones 00 e0 75 Polycom phones 00 e0 bb 3Com phones QUALITY OF SERVICE All switches or routers that access the Internet rely on class information to provide the same forwarding treatment to packets in the same class Class information can be assigned by end hosts or s
272. nticated supplicant is assigned on the switch The RADIUS server must be configured to transmit special RADIUS attributes to take advantage of this feature The RADIUS Assigned QoS Enabled checkbox provides a quick way to globally enable disable RADIUS server assigned QoS Class functionality When checked the individual port settings determine 88 CHAPTER 4 Configuring the Switch Configuring Security whether RADIUS assigned QoS Class is enabled for that port When unchecked RADIUS server assigned QoS Class is disabled for all ports When RADIUS Assigned QoS is both globally enabled and enabled for a given port the switch reacts to QoS Class information carried in the RADIUS Access Accept packet transmitted by the RADIUS server when a supplicant is successfully authenticated If present and valid traffic received on the supplicant s port will be classified to the given QoS Class If re authentication fails or the RADIUS Access Accept packet no longer carries a QoS Class or it s invalid or the supplicant is otherwise no longer present on the port the port s QoS Class is immediately reverted to the original QoS Class which may be changed by the administrator in the meanwhile without affecting the RADIUS assigned setting This option is only available for single client modes i e port based 802 1X and Single 802 1X RADIUS Attributes Used in Identifying a QoS Class The User Priority Table attribute defined in RFC4675 forms
273. ntry OID Subtree Object identifiers of branches within the MIB tree Note that the first character must be a period Wild cards can be used to mask a specific portion of the OID string using an asterisk Length 1 128 WEB INTERFACE To configure SNMPv3 views 1 Click Advanced Configuration Security Switch SNMP Views 2 Click Add new view to set up a new view 3 Enter the view name view type and OID subtree 4 Click Save Figure 23 SNMPv3 View Configuration SNMPv3 View Configuration View Type OID Subtree al default_view included Add new view Save Reset CONFIGURING SNMPv3 GRouP ACCESS RIGHTS Use the SNMPv3 Access Configuration page to assign portions of the MIB tree to which each SNMPv3 group is granted access You can assign more than one view to a group to specify access to different portions of the MIB tree PATH Advanced Configuration Security Switch SNMP Access PARAMETERS These parameters are displayed Group Name The name of the SNMP group Range 1 32 characters ASCII characters 33 126 only Security Model The user security model Options any vi v2c or the User based Security Model usm Default any Security Level The security level assigned to the group a NoAuth NoPriv There is no authentication or encryption used in SNMP communications This is the default for SNMPv3 Auth NoPriv SNMP communications use authenticatio
274. o Enabled and the Type to Intermediate Select the intermediate ports through which all mirrored traffic will be forwarded to other switches Click Save Figure 93 Mirror Configuration Intermediate Mirroring amp RSPAN Configuration Session Number C Mode Enabled Type Intermediate VLAN ID Ro Reflector Port Pai E Port Source Intermediate Destination fosas r EEE Oo E m E r E E E Disa jv sabled To configure remote port mirroring for an RSPAN destination switch 1 2 Click Basic Advanced Configuration Mirroring amp RSPAN Set the Mode to Enabled and the Type to destination Select the intermediate ports to add to the RSPAN VLAN which will then pass traffic on to the destination ports Select the destination ports which are to monitor the traffic mirrored from the source switch through any intermediate switches and finally through the intermediate ports on the destination switch Click Save A CHAPTER 4 Configuring the Switch Configuring UPnP Figure 94 Mirror Configuration Destination Mirroring amp RSPAN Configuration Session Number fi oy Mode Enabled Type Destination VLAN ID Ro 8 F te Reflector Port Pott E Pon Source Intermediate Destination m La 5 z 5 z CONFIGURING UPNP Universal Plug and Play UPnP is a set of protocols that allows devices to connect seamlessly and simplifies the deployment of home and offi
275. o WRED A higher DP level assigned to a frame results in a higher probability that the frame is dropped during times of congestion Gi Note Neither Novell NetWare nor AppleTalk respond robustly to packet loss either ignoring the dropped packets or resending them at the same rate If a significant percentage of the network s traffic employs these protocols it is not advisable to enable RED PATH Configuration QoS WRED PARAMETERS These parameters are displayed Queue The ID of the priority queue Range 0 7 where 7 is the highest priority queue Enable Controls whether RED is enabled for this queue Min Threshold Sets the lower RED threshold as a percentage of queue capacity If the average queue loading is below this threshold the drop probability is zero Range 0 100 Max DP 1 3 Controls the drop probability for frames marked with Drop Precedence Level 1 3 when the average queue loading is 100 Range 0 100 Every incoming frame is classified to a Drop Precedence Level DP level which is used throughout the device for providing congestion control guarantees for the frame according to value configured for that specific DP level Inbound traffic is marked for drop precedence using a three color priority system Drop precedence is normally set from a lower to higher level for green DP1 yellow DP2 and then red DP3 The internal DSCP map is used to mark inbound traffic based on priority bits in
276. o configure the bridge priority for the CIST SPANNING TREE and any configured MSTI Remember that RSTP looks upon each MST BRIDGE Priorities Instance as a single bridge node PATH Basic Advanced Configuration Spanning Tree MSTI Properties PARAMETERS These parameters are displayed MSTI Instance identifier to configure Range CIST MIST1 7 Priority The priority of a spanning tree instance Range 0 240 in steps of 4096 Options 0 4096 8192 12288 16384 20480 24576 28672 32768 36864 40960 45056 49152 53284 57344 61440 Default 32768 Bridge priority is used in selecting the root device root port and designated port The device with the highest priority becomes the STA root device However if all devices have the same priority the device with the lowest MAC address will then become the root device Note that lower numeric values indicate higher priority The bridge priority plus the MSTI instance number concatenated with the 6 byte MAC address of the switch forms a Bridge Identifier 134 CONFIGURING STP RSTP CIST INTERFACES CHAPTER 4 Configuring the Switch Configuring the Spanning Tree Algorithm WEB INTERFACE To add VLAN groups to an MSTP instance 1 Click Configuration Spanning Tree MSTI Priorities 2 Set the bridge priority for the CIST or any configured MSTI 3 Click Save Figure 50 Configuring STA Bridge Priorities MSTI Configuration iggy MSTI Priority Configuration
277. ocal and remote logon authentication can be used to control management access via Telnet SSH a web browser or the console interface When using RADIUS or TACACS logon authentication the user name and password must be configured on the authentication server The encryption methods used for the authentication process must also be configured or negotiated between the authentication server and logon client This switch can pass authentication messages between the server and client that have been encrypted using MD5 Message Digest 5 TLS Transport Layer Security or TTLS Tunneled Transport Layer Security 262 CHAPTER 4 Configuring the Switch Configuring Security Note This guide assumes that RADIUS and TACACS servers have already been configured to support AAA The configuration of RADIUS and TACACS server software is beyond the scope of this guide Refer to the documentation provided with the RADIUS and TACACS server software PARAMETERS These parameters are displayed Client Specifies how the administrator is authenticated when logging into the switch via Telnet SSH or a web browser Authentication Method Selects the authentication method Options None Local RADIUS TACACS Default Local Selecting the option None disables access through the specified management interface Fallback Uses the local user database for authentication if none of the configured authentication servers are alive
278. ode and will only be enabled if one of the active links fails All ports on both ends of an LACP trunk must be configured for full duplex either by forced mode or auto negotiation Trunks dynamically established through LACP will be shown on the LACP System Status page page 252 and LACP Port Status page 252 pages under the Monitor menu Ports assigned to a common link aggregation group LAG must meet the following criteria Ports must have the same LACP Admin Key Using auto configuration of the Admin Key will avoid this problem One of the ports at either the near end or far end must be set to active initiation mode Aggregation Mode Configuration located under the Static Aggregation menu see Configuring Static Trunks on page 120 also applies to LACP PARAMETERS These parameters are displayed Port Port identifier LACP Enabled Controls whether LACP is enabled on this switch port LACP will form an aggregation when two or more ports are connected to the same partner LACP can form up to 12 LAGs per switch Key The LACP administration key must be set to the same value for ports that belong to the same LAG Range 0 65535 Default Auto 123 CHAPTER 4 Configuring the Switch Creating Trunk Groups Select the Specific option to manually configure a key Use the Auto selection to automatically set the key based on the actual link speed where 10Mb 1 100Mb 2 and 1Gb 3 Role C
279. on Files S292 SECTION Ill APPENDICES This section provides additional information and includes these items Software Specifications on page 295 Troubleshooting on page 299 License Information on page 301 293 SECTION lll Appendices 294 SOFTWARE SPECIFICATIONS SOFTWARE FEATURES MANAGEMENT AUTHENTICATION CLIENT ACCESS CONTROL PORT CONFIGURATION FLow CONTROL STORM CONTROL PORT MIRRORING RATE LIMITS PORT TRUNKING SPANNING TREE ALGORITHM Local RADIUS TACACS AAA Port Authentication 802 1 HTTPS SSH Port Security IP Filter DHCP Snooping Access Control Lists 128 rules per system Port Authentication 802 1X MAC Authentication Port Security DHCP Snooping IP Source Guard ARP Inspection 1LOOBASE TX 10 100 Mbps half full duplex 1LOOBASE FX 100 Mbps at full duplex SFP 1000BASE T 10 100 Mbps at half full duplex 1000 Mbps at full duplex 1000BASE SX LX LH 1000 Mbps at full duplex SFP Full Duplex IEEE 802 3 2005 Half Duplex Back pressure Broadcast multicast or unicast traffic throttled above a critical threshold 1 session multiple source port to one destination port local mirroring one source ports to multiple destination port remote mirroring Input limits per port manual setting or ACL Static trunks Cisco EtherChannel compliant Dynamic trunks Link Aggregation Control Protocol Spanning Tree Protocol STP IEEE 802 1
280. onds remaining before sampling stops the current sFlow owner is released and all sFlow parameters are reset Range 0 9999999 seconds where 0 indicates no time out The sFlow parameters affected by this command include the IP address and UDP port timeout maximum datagram size sampling rate and maximum header size While active the current time left can be updated by clicking the Refresh button If locally managed the timeout can be changed on the fly without affecting any other settings Max Datagram Size Maximum size of the sFlow datagram payload This should be set to a value that avoids fragmentation of the sFlow datagrams Range 200 1468 bytes Default 1400 bytes Port Configuration Port Port identifier Flow Sampler The following parameters apply to flow sampling Enabled Enables disables flow sampling on this port Sampling Rate The number of packets out of which one sample will be taken Range 1 4096 packets or 0 to disable sampling Default Disabled Max Header Maximum size of the sFlow datagram header Range 14 200 bytes Default 128 bytes If the maximum datagram size does not take into account the maximum header size samples may be dropped Counter Poller The following parameters apply to the counter Enabled Enables disables counter polling on this port Interval The interval at which the counters are updated Range 0 3600 seconds where 0 disables this feature
281. one before you permanently install the switch in the network Follow this procedure 1 Place the switch close to the PC that you intend to use for configuration It helps if you can see the front panel of the switch while working on your PC 2 Connect the Ethernet port of your PC to any port on the front panel of the switch Connect power to the switch and verify that you have a link by checking the front panel LEDs 3 Check that your PC has an IP address on the same subnet as the switch The default IP address of the switch is 192 168 1 1 and the subnet mask is 255 255 255 0 so the PC and switch are on the same subnet if they both have addresses that start 192 168 1 x If the PC and switch are not on the same subnet you must manually set the PC s IP address to 192 168 1 x where x is any number from 1 to 254 except 10 4 Open your web browser and enter the address http 192 168 1 1 If your PC is properly configured you will see the login page of the switch If you do not see the login page repeat step 3 5 Enter admin for the user name and password and then click on the Login button 6 From the menu click System and then IP To request an address from a local DHCP Server mark the DHCP Client check box To configure a static address enter the new IP Address IP Mask and other optional parameters for the switch and then click on the Save button If you need to configure an IPv6 address select IPv6 fro
282. onfiguration Spanning Tree MSTI Mapping COMMAND USAGE MSTP generates a unique spanning tree for each instance This provides multiple pathways across the network thereby balancing the traffic load preventing wide scale disruption when a bridge node in a single instance fails and allowing for faster convergence of a new topology for the failed instance By default all VLANs are assigned to the Common Internal Spanning Tree CIST or MST Instance 0 that connects all bridges and LANs within the MST region This switch supports up to 7 instances You should try to group VLANs which cover the same general area of your network However remember that you must configure all bridges that exist within the same MSTI Region with the same set of instances and the same instance on each bridge with the same set of VLANs Also note that RSTP treats each MSTI region as a single node connecting all regions to the CIST 2 To CHAPTER 4 Configuring the Switch Configuring the Spanning Tree Algorithm use multiple spanning trees Set the spanning tree type to MSTP page 129 Add the VLANs that will share this MSTI on the MSTI Mapping page Enter the spanning tree priority for the CIST and selected MST instance on the MSTI Priorities page Note All VLANs are automatically added to the CIST MST Instance 0 To ensure that the MSTI maintains connectivity across the network you must configure a related set of bridges with the same MSTI setti
283. onfiguration page to mirror traffic from any local source port to a target port on the same switch for real time ne ee analysis You can then attach a logic analyzer or poe ei RMON probe to the target port and study the oe a traffic crossing the source port in a completely unobtrusive manner PATH Basic Advanced Configuration Mirroring amp RSPAN COMMAND USAGE General port mirroring configured on the Mirroring amp RSPAN Configuration page and ACL based port mirroring are implemented independently When port mirroring is enabled on the Mirroring amp RSPAN Configuration page mirroring will occur regardless of any configuration settings made on the ACL Ports Configuration page see Filtering Traffic with Access Control Lists on page 96 or the ACE Configuration page see Configuring Access Control Lists on page 99 PARAMETERS These parameters are displayed Session Number A number identifying the mirror session This switch only supports one mirror session Mode Enables or disables port mirroring Type Select Mirror for local port mirroring Port Port identifier o Source Sets the source port from which traffic will be mirrored Select one of these options Disabled No frames are mirrored from this port Both Frames received and transmitted on this port are mirrored to the specified destination port Rx only Frames received on this port are mirror
284. onfigures active or passive LACP initiation mode Use Active initiation of LACP negotiation on a port to automatically send LACP negotiation packets once each second Use Passive initiation mode on a port to make it wait until it receives an LACP protocol packet from a partner before starting negotiations Timeout The timeout to wait for the next LACP data unit LACPDU The timeout is set in the LACP timeout bit of the Actor State field in transmitted LACPDUs When the partner switch receives an LACPDU set with a short timeout from the actor switch the partner adjusts the transmit LACPDU interval to 1 second When it receives an LACPDU set with a long timeout from the actor it adjusts the transmit LACPDU interval to 30 seconds Default Fast Fast Specifies a fast timeout of 3 seconds Slow Specifies a slow timeout of 90 seconds Prio If a link goes down LACP port priority is used to select a backup link Range 0 65535 Default 32768 Setting a lower value indicates a higher effective priority If an active port link goes down the backup port with the highest priority is selected to replace the downed link However if two or more ports have the same LACP port priority the port with the lowest physical port number will be selected as the backup port If an LAG already exists with the maximum number of allowed port members and LACP is subsequently enabled on another port using a higher priority than an existin
285. ons IEEE 802 11 Wireless Access Point Any device that supports the IEEE 802 1AB and MED extensions defined by TIA 1057 and can relay IEEE 802 frames via any method LLDP MED Endpoint Device Within this category the LLDP MED scheme is broken into further Endpoint Device Classes as defined in the following Each LLDP MED Endpoint Device Class is defined to build upon the capabilities defined for the previous Endpoint Device Class Fore example will any LLDP MED Endpoint Device claiming compliance as a Media Endpoint Class II also support all aspects of TIA 1057 applicable to Generic Endpoints Class I and any LLDP MED Endpoint Device claiming compliance as a Communication Device Class III will also support all aspects of TIA 1057 applicable to both Media Endpoints Class II and Generic Endpoints Class I LLDP MED Generic Endpoint Class I Applicable to all endpoint products that require the base LLDP discovery services defined in TIA 1057 however do not support IP media or act as an end user communication appliance Such devices may include but are not limited to IP Communication Controllers other communication related servers or any device requiring basic services as defined in TIA 1057 Discovery services defined in this class include LAN configuration device location network policy power management and inventory management LLDP MED Media Endpoint Class II Applicable to all endpoint products that
286. oooo0oo0oo0oo0o olojojojojojojojojo 0 0 9 0 09 9 0 09 0 ojojojojojojojojojo 1 2 3 4 5 6 Z 8 2 10 olojolojojojojojo goo00000000 oj0jojojojojojojo ol0ojoiojojojojojo Use the QoS Control List Status page to show the QCE entries configured for different users or software modules and whether or not there is a conflict PATH Monitor Ports QCL Status PARAMETERS These parameters are displayed User Indicates the user static entry software module or conflicting entry of this QCE The information displayed in this field depends on the option selected in the drop down list at the top of this page Combined Static Voice VLAN Conflict QCE QoS Control Entry index Frame Type Indicates the type of frame to look for in incoming frames Possible frame types are Any Ethernet LLC SNAP IPv4 IPv6 Port Port identifier Action Indicates the classification action taken on ingress frame if the configured parameters are matched in the frame s content If a frame matches the QCE the following actions will be taken a Class Classified QoS Class If a frame matches the QCE it will be put in the queue corresponding to the specified QoS class DP The drop precedence level will be set to the specified value DSCP The DSCP value will be set the specified value 225 CHAPTER 5 Monitoring the Switch Displaying Information About Ports DISPLAYING DETAILED
287. or management client types the common server timing parameters and address UDP port and secret key for each required RADIUS or TACACS server Click Save 118 CHAPTER 4 Configuring the Switch Creating Trunk Groups Figure 41 Authentication Configuration Authentication Server Configuration Common Server Configuration 15 seconds 300 seconds RADIUS Authentication Server Configuration Teme Pasonen on sem 1 812 RADIUS Accounting Server Configuration Sa sem 1 i i 1813 i 2 1813 TACACS Authentication Server Configuration Tenn Poannennne fot set 1 1 a i CREATING TRUNK GROUPS You can create multiple links between devices that work as one virtual aggregate link A port trunk offers a dramatic increase in bandwidth for network segments where bottlenecks exist as well as providing a fault tolerant link between two switches The switch supports both static trunking and dynamic Link Aggregation Control Protocol LACP Static trunks have to be manually configured at both ends of the link and the switches must comply with the Cisco EtherChannel standard On the other hand LACP configured ports can automatically negotiate a trunked link with LACP configured ports on another device You can configure any number of ports on the switch to use LACP as long as they are not already confi
288. or the physical link state for the attached LANs transitions frequently BPDU Guard This feature protects ports from receiving BPDUs It can prevent loops by shutting down an port when a BPDU is received instead of putting it into the spanning tree discarding state The BPDU guard feature provides a secure response to invalid configurations because an administrator must manually enable the port Default Disabled If enabled the port will disable itself upon receiving valid BPDU s Contrary to the similar bridge setting the port Edge status does not affect this setting A port entering error disabled state due to this setting is subject to the bridge Port Error Recovery setting as well see Configuring Global Settings for STA on page 129 137 CHAPTER 4 Configuring the Switch Configuring the Spanning Tree Algorithm Point to Point The link type attached to an interface can be set to automatically detect the link type or manually configured as point to point or shared medium Transition to the forwarding state is faster for point to point links than for shared media These options are described below Auto The switch automatically determines if the interface is attached to a point to point link or to shared medium This is the default setting When automatic detection is selected the switch derives the link type from the duplex mode A full duplex interface is considered a point to point link while a half duple
289. or this port excluding framing bits but including FCS octets and were otherwise well formed Rx Fragments The total number of frames received that were less than 64 octets in length excluding framing bits but including FCS octets and had either an FCS or alignment error Rx Jabber The total number of frames received that were longer than the configured maximum frame length for this port excluding framing bits but including FCS octets and had either an FCS or alignment error Rx Filtered The number of received frames filtered by the forwarding process Transmit Error Counters Tx Drops The number of frames dropped due to output buffer congestion Tx Late Exc Coll The number of frames dropped due to late or excessive collisions 227 CHAPTER 5 Monitoring the Switch Displaying Information About Ports WEB INTERFACE To display the detailed port statistics click Monitor Ports Detailed Statistics Figure 105 Detailed Port Statistics Detailed Port Statistics Port 1 Port Auto refresh L Rx Packets 0 Tx Packets Rx Octets 0 Tx Octets Rx Unicast 0 Tx Unicast Rx Multicast 0 Tx Multicast Rx Broadcast 0 Tx Broadcast Rx Pause 0 Tx Pause Rx 64 Bytes 0 Tx 64 Bytes Rx 65 127 Bytes 0 Tx 65 127 Bytes Rx 128 255 Bytes O Tx 128 255 Bytes Rx 256 511 Bytes 0 Tx 256 511 Bytes Rx 512 1023 Bytes O Tx 512 1023 Bytes Rx 1024 1526 Bytes O Tx 1024 1526 Bytes Rx 1527 Bytes 0 Tx 1527 Bytes
290. ormation through LLDP PATH Monitor LLDP Neighbors PARAMETERS These parameters are displayed Local Port The local port to which a remote LLDP capable device is attached Chassis ID An octet string indicating the specific identifier for the particular chassis in this system Remote Port ID A string that contains the specific identifier for the port from which this LLDPDU was transmitted System Name A string that indicates the system s assigned name Port Description A string that indicates the port s description If RFC 2863 is implemented the ifDescr object should be used for this field System Capabilities The capabilities that define the primary function s of the system as shown in the following table 267 CHAPTER 5 Monitoring the Switch Displaying LLDP Information DISPLAYING LLDP MED NEIGHBOR INFORMATION Table 13 System Capabilities ID Basis Reference Other Repeater IETF RFC 2108 Bridge IETF RFC 2674 WLAN Access Point IEEE 802 11 MIB Router IETF RFC 1812 Telephone IETF RFC 2011 DOCSIS cable IETF RFC 2669 and IETF RFC 2670 device Station only IETF RFC 2011 When a capability is enabled the capability is followed by If the capability is disabled the capability is followed by Management Address The IPv4 address of the remote device If no management address is available the address should be the MAC address for the CPU or for the port sendi
291. ort 167 MAC Table2 Configures address aging dynamic learning and static 170 addresses VLANs2 Virtual LANs 172 VLAN Membership Configures VLAN groups 173 Ports Specifies default PVID and VLAN attributes 174 gos CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface Table 4 Main Menu Continued Menu Description Page Private VLANs Port Isolation VCL MAC based VLAN Protocol based VLAN Protocol to Group Group to VLAN IP Subnet based VLAN Voice VLAN Configuration OUI QoS Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Port DSCP DSCP Based QoS DSCP Translation DSCP Classification QoS Control List Storm Control Prevents communications between designated ports within the same private VLAN VLAN Control List Maps traffic with specified source MAC address to a VLAN Creates a protocol group specifying supported protocols Maps a protocol group to a VLAN for specified ports Maps traffic for a specified IP subnet to a VLAN Configures global settings including status voice VLAN ID VLAN aging time and traffic priority also configures port settings including the way in which a port is added to the Voice VLAN and blocking non VoIP addresses Maps the OUI in the source MAC address of ingress packets to the VoIP device manufacturer Configures default traffic class drop priority user priority drop eligible
292. ort number If a matching entry is found in the binding table and the entry type is static IP source guard binding or dynamic DHCP snooping binding the packet will be forwarded If IP source guard if enabled on an interface for which IP source bindings have not yet been configured neither by static configuration in the IP source guard binding table nor dynamically learned from DHCP snooping the switch will drop all IP traffic on that port except for DHCP packets dad CHAPTER 4 Configuring the Switch Configuring Security PARAMETERS These parameters are displayed Global Configuration Mode Enables or disables IP Source Guard globally on the switch All configured ACEs will be lost when enabled Default Disabled Note DHCP snooping must be enabled for dynamic clients to be learned automatically Translate dynamic to static Click to translate all dynamic entries to static entries Port Mode Configuration Port Port identifier Mode Enables or disables IP Source Guard on the specified ports Only when both Global Mode and Port Mode on a given port are enabled will ARP Inspection take effect on a given port Default Disabled Max Dynamic Clients Specifies the maximum number of dynamic clients that can be learned on given ports This value can be 0 1 2 or unlimited If the port mode is enabled and the maximum number of dynamic clients is equal 0 the switch will only forward IP packets that
293. ource MAC Address Ga Destination MAC Address I IP Address F TCP UOP Port Number Ld Aggregation Group Configuration Port Members Group ID 1 3 5 0 6 24 25 26 27 28 29 30 3 38 39 40 41 gt a a a gt gt a gt a a a a a a gt gt a a gt a a a a a a gt a a a gt a a gt D g a gt gt a a d a a gt gt a gt a a a gt Normal S99 99 5999909595999 5909591919595 05 5 3 6 9 01 615 9 059 9 0 915 9 9151909 515 915 0 3 3 6 8 3 0 8 3 8 0 6 3 0 0 8 8 0 8 8 0 8 3 9 9 5 5 0 59 9 0 015 9 9 5 9 0 9 5 5 9 5 919 59 5 5915 019519 9 9019 9 919 9 9 9 9191919 9 9191919 919 9 9 0101919919191 OFS 8 0 amp amp OO 3 9 0 8 0 3 8 0 0 5 9 9 59 9 9 0 5 9 9 5 9 9 9 5 9 0 5 9199 9 915 919 9 9 919 9 9 919 91 9 9 9191 9 9 9 9 9 91919 919 019 9 9 019 9 019 9 9 919 91919 9 91919 91919 919 0 6 9 0 9 3 0 019 9 0 0 5 0 0 0 0 0 9 8 0 0 5 9 3 679 96 0 9 5 0 90 5 9 0 9 5 9 5 5 9 9 5 9 9 9 5 9 9 0 9 5 01 9159 9 0 0 5 9 9 9 9 09 5 9 919 5 9 0 5 9 5 0 5 53 0 0 9 0 0 9 9 0 919 0 0 0 91 919 919 5151915 0 5 8 0 8 5 8 8 9 5 8 8 8 8 8 8 9 8 8 8 08 SS 8 0 HS csosoo cso S89 9 5 5 959595905999 9 9 5 0 4 3 0 OS O 8 9 8 0 8 8 8 8 9 8 8 amp 8 8 8 9 9 0 8 8 0 8 S amp GO 8 0 3 0 G 1 0 0 amp 8 0 OO 8 6 75 5 0 9 5 9
294. owser version Microsoft Internet Explorer will need to have a plugin installed to support SVG PATH Monitor System CPU Load 220 CHAPTER 5 Monitoring the Switch Displaying Basic Information About the System WEB INTERFACE To display CPU utilization 1 Click System then CPU Load Figure 98 CPU Load Auto refresh O0Oms 0 1sec 0 10sec 0 all numbers running average DISPLAYING LOG Use the System Log Information page to scroll through the logged system MESSAGES and event messages PATH Monitor System Log PARAMETERS These parameters are displayed Display Filter Level Specifies the type of log messages to display m Info Informational messages only Warning Warning conditions Error Error conditions All All levels Clear Level Clears all log messages for the selected level Start from ID The error ID from which to start the display with entries per page The number of entries to display per page DO om CHAPTER 5 Monitoring the Switch Displaying Basic Information About the System Table Headings ID Error ID Level Error level as described above Time The time of the system log entry Message The message text of the system log entry WEB INTERFACE To display the system log 1 Click Monitor System Log 2 Specify the message level to display the starting message ID and the number of messages to display per page
295. parated 16 bit hexadecimal values One double colon may be used to indicate the appropriate number of zeros required to fill the undefined fields Trap Authentication Failure Issues a notification message to specified IP trap managers whenever authentication of an SNMP request fails Default Enabled Trap Link up and Link down Issues a notification message whenever a port link is established or broken Default Enabled Trap Inform Mode Enables or disables sending notifications as inform messages Note that this option is only available for version 2c and 3 hosts Default traps are used The recipient of a trap message does not send a response to the switch Traps are therefore not as reliable as inform messages which include a request for acknowledgement of receipt Informs can be used to ensure that critical information is received by the host However note that informs consume more system resources because they must be kept in memory until a response is received Informs also add to network traffic You should consider these effects when deciding whether to issue notifications as traps or informs Trap Inform Timeout The number of seconds to wait for an acknowledgment before resending an inform message Range 0 2147 seconds Default 1 second Trap Inform Retry Times The maximum number of times to resend an inform message if the recipient does not acknowledge receipt Range 0 255 Default 5 Trap Probe Security E
296. parent bridging The address table facilitates data switching by learning addresses and then filtering or forwarding traffic based on this information The address table supports up to 16K addresses The switch copies each frame into its memory before forwarding them to another port This ensures that all frames are a standard Ethernet size and have been verified for accuracy with the cyclic redundancy check CRC This prevents bad frames from entering the network and wasting bandwidth To avoid dropping frames on congested ports the switch provides 8 MB for frame buffering This buffer can queue packets awaiting transmission on congested networks The switch supports these spanning tree protocols Spanning Tree Protocol STP IEEE 802 1D Supported by using the STP backward compatible mode provided by RSTP STP provides loop detection When there are multiple physical paths between segments this protocol will choose a single path and disable all others to ensure that only one route exists between any two stations on the network This prevents the creation of network loops However if the chosen path should fail for any reason an alternate path will be activated to maintain the connection Rapid Spanning Tree Protocol RSTP IEEE 802 1w This protocol reduces the convergence time for network topology changes to about 3 to 5 seconds compared to 30 seconds or more for the older IEEE 802 1D STP standard It is intended as a comple
297. ponse from a DHCP server it will default to the IP address 192 168 1 1 and subnet mask 255 255 255 0 You can manually configure a specific IP address or direct the device to obtain an address from a DHCP server Valid IPv4 addresses consist of four decimal numbers 0 to 255 separated by periods Anything other than this format will not be accepted by the CLI program PATH Basic Advanced Configuration System IP PARAMETERS These parameters are displayed IP Configuration DHCP Client Specifies whether IP functionality is enabled via Dynamic Host Configuration Protocol DHCP If DHCP is enabled IP will not function until a reply has been received from the server Requests will be broadcast periodically by the switch for an IP address DHCP values can include the IP address subnet mask and default gateway Default Enabled IP Address Address of the VLAN specified in the VLAN ID field This should be the VLAN to which the management station is attached Valid IP addresses consist of four numbers 0 to 255 separated by periods Default 192 168 1 1 IP Mask This mask identifies the host address bits used for routing to specific subnets Default 255 255 255 0 AG CHAPTER 4 Configuring the Switch Setting an IP Address IP Router IP address of the gateway router between the switch and management stations that exist on other network segments VLAN ID ID of the configured VLAN By default all port
298. port default the packet s priority bit in the VLAN tag TCP UDP port number IP Precedence bit or DSCP priority bit Dynamic Host Control Protocol Provides a framework for passing configuration information to hosts on a TCP IP network DHCP is based on the Bootstrap Protocol BOOTP adding the capability of automatic allocation of reusable network addresses and additional configuration options A relay option for sending information about the requesting client or an intermediate relay agent in the DHCP request packets forwarded by the switch and in reply packets sent back from the DHCP server This information can be used by DHCP servers to assign fixed IP addresses or set other services or policies for clients A technique used to enhance network security by snooping on DHCP server messages to track the physical location of hosts ensure that hosts only use the IP addresses assigned to them and ensure that only authorized DHCP servers are accessible 205 GLOSSARY DIFFSERV DNS DSCP EAPOL EUI GARP Differentiated Services provides quality of service on large networks by employing a well defined set of building blocks from which a variety of aggregate forwarding behaviors may be built Each packet carries information DS byte used by each hop to give it a particular forwarding treatment or per hop behavior at each network node DiffServ allocates different levels of service to users on the network with m
299. ption 82 it allows compatible DHCP servers to use the information when assigning IP addresses or to set other services or policies for clients Using DHCP Relay Option 82 clients can be identified by the VLAN and switch port to which they are connected rather than just their MAC address DHCP client server exchange messages are then forwarded directly between the server and client without having to flood them to the entire VLAN In some cases the switch may receive DHCP packets from a client that already includes DHCP Option 82 information The switch can be configured to set the action policy for these packets Either the switch can drop packets that already contain Option 82 information keep the existing information or replace it with the switch s relay information PATH Advanced Configuration Security Network DHCP Relay 109 CHAPTER 4 Configuring the Switch Configuring Security PARAMETERS These parameters are displayed Relay Mode Enables or disables the DHCP relay function Default Disabled Relay Server IP address of DHCP server to be used by the switch s DHCP relay agent Relay Information Mode Enables or disables the DHCP Relay Option 82 support Note that Relay Mode must also be enabled for Relay Information Mode to take effect Default Disabled Relay Information Policy Sets the DHCP relay policy for DHCP client packets that include Option 82 information Replace Overwrites the
300. queues PATH Advanced Configuration Power Reduction EEE COMMAND USAGE EEE works by powering down circuits when there is no traffic When a port gets data to be transmitted all relevant circuits are powered up The time it takes to power up the circuits is call the wakeup time The default wakeup time is 17 us for 1 Gbps links and 30 us for other link speeds EEE devices must agree upon the value of the wakeup time in order to make sure that both the receiving and transmitting devices have all circuits powered up when traffic is transmitted The devices can exchange information about the device wakeup time using LLDP protocol To maximize power savings the circuit is not started as soon as data is ready to be transmitted from a port but instead waits until 3000 bytes of data is queued at the port To avoid introducing a large delay when the queued data is less then 3000 bytes data is always transmitted after 48 us giving a maximum latency of 48 us plus the wakeup time PARAMETERS These parameters are displayed Port Port identifier EEE Enabled Enables or disables EEE for the specified port WEB INTERFACE To configure the power reduction for idle queue circuits 1 2 3 Click Configuration Power Reduction EEE Select the circuits which will use EEE Click Save 254 CHAPTER 4 Configuring the Switch Configuring Port Connections Figure 9 Configuring EEE Power Reduction EEE Config
301. r a port includes these options Disabled PoE is disabled for the port PoE Enables PoE IEEE 802 3af Class 4 PDs limited to 15 4W PoE Enables PoE IEEE 802 3at Class 4 PDs limited to 34 2W Priority Port priority is used when remote devices require more power than the power supply can deliver In this case the port with the lowest priority will be turn off starting from the port with the highest port number 169 CHAPTER 4 Configuring the Switch Configuring the MAC Address Table Maximum Power The maximum power that can be delivered to a remote device Range 0 34 2 Watts depending on the PoE mode WEB INTERFACE To configure global and port specific PoE settings 1 Click Advanced Configuration PoE 2 Set the global PoE parameters including the method used to determine reserved port power the method by which port power is shut down and the switch s overall power budget 3 Specify the port PoE operating mode port power allocation priority and the port power budget 4 Click Save Figure 64 Configuring PoE Settings Power Over Ethernet Configuration PCa atm ym C Class Allocation C LLDP MED Power Management Mode Actual Consumption Reserved Power PoE Power Supply Configuration Primary Power Supply W 375 PoE Port Configuration Port PoE Mode Priority Maximum Power W lt gt z Low Low Low CONFIGURING THE MAC ADDRESS TABLE Use the MAC Addres
302. r a reply from an authentication server before it resends the request Range 3 3600 seconds Default 15 seconds day CHAPTER 4 Configuring the Switch Configuring Security Dead Time The time after which the switch considers an authentication server to be dead if it does not reply Range 0 3600 seconds Default 300 seconds Setting the Dead Time to a value greater than 0 zero will cause the authentication server to be ignored until the Dead Time has expired However if only one server is enabled it will never be considered dead RADIUS TACACS Server Configuration Enabled Enables the server specified in this entry IP Address Hostname IP address or IP alias of authentication server Port Network UDP port of authentication server used for authentication messages Range 1 65535 Default 0 If the UDP port is set to 0 zero the switch will use 1812 for RADIUS authentication servers 1813 for RADIUS accounting servers or 49 for TACACS authentication servers Secret Encryption key used to authenticate logon access for the client Maximum length 29 characters wa To set an empty secret use two quotes To use spaces in the secret enquote the secret Quotes in the secret are not allowed WEB INTERFACE To configure authentication for management access in the web interface 1 2 Click Advanced Configuration Security AAA Configure the authentication method f
303. r disables a port as a trusted source of DHCP messages Default Trusted WEB INTERFACE To configure DHCP Snooping 1 2 Click Advanced Configuration Security Network DHCP Snooping Set the status for the global DHCP snooping process and set any ports within the local network or firewall to trusted Click Apply 108 CONFIGURING DHCP RELAY AND OPTION 82 INFORMATION CHAPTER 4 Configuring the Switch Configuring Security Figure 35 DHCP Snooping Configuration DHCP Snooping Configuration Snooping Mode Disabled gt Port Mode Configuration 1 Trusted 2 Trusted 3 Trusted 4 Trusted Use the DHCP Relay Configuration page to configure DHCP relay service for attached host devices If a subnet does not include a DHCP server you can relay DHCP client requests to a DHCP server on another subnet When DHCP relay is enabled and the switch sees a DHCP request broadcast it inserts its own IP address into the request so that the DHCP server knows the subnet of the client then forwards the packet to the DHCP server When the server receives the DHCP request it allocates a free IP address for the DHCP client from its defined scope for the DHCP client s subnet and sends a DHCP response back to the switch The switch then broadcasts the DHCP response to the client DHCP also provides a mechanism for sending information about the switch and its DHCP clients to the DHCP server Known as DHCP O
304. r move the ACL entry ACE Table 8 QCE Modification Buttons Button Description Inserts a new ACE before the current row Edits the ACE Moves the ACE up the list Moves the ACE down the list Deletes the ACE O00000 The lowest plus sign adds a new entry at the bottom of the list 100 CHAPTER 4 Configuring the Switch Configuring Security ACE CONFIGURATION Ingress Port and Frame Type Ingress Port Any port port identifier or policy Options Any port Port 1 10 Policy 1 8 Default Any Policy Filter The policy number filter for this ACE Any No policy filter is specified i e don t care Specific If you want to filter a specific policy with this ACE choose this value Two fields for entering an policy value and bitmask appears Frame Type The type of frame to match Options Any Ethernet ARP IPv4 Default Any Filter Criteria Based on Selected Frame Type Ethernet MAC Parameters SMAC Filter The type of source MAC address Options Any Specific user defined Default Any DMAC Filter The type of destination MAC address Options Any MC multicast BC broadcast UC unicast Specific user defined Default Any Ethernet Type Parameters EtherType Filter This option can only be used to filter Ethernet II formatted packets Options Any Specific 600 ffff hex Default Any A detailed listing of Ethernet protocol types can be found in R
305. r not membership reports are sent from source ports specify whether or not control frames are tagged with the MVR ID set the priority and last member query interval 4 Optionally enable immediate leave on any receiver port to which only one subscriber is attached 5 Click Save Figure 54 Configuring General MVR Settings MVR Configurations CEO Drsabled v VLAN Interface Setting Role Inactive S Source R Receiver Delete MVR VIO MVR Name Mode Tagging Priority LLQI interface Channel Setting PPV Dynamic Tagged o f 5 1234567 8 910111213141516 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 M 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 Re YAN ON LE ON NN NE Add New MVR VLAN Immediate Leave Setting Port Immediate Leave 1 Disabied 3 2 Disabled 7 3 Disabea a a Dawes 5 i isabled Disabled 7 CONFIGURING MVR Use the MVR Channel Configuration page to view dynamic multicast group CHANNEL SETTINGS bindings for a multicast VLAN or to configure static bindings for a multicast VLAN PATH Advanced Configuration MVR MVR Channel Configuration COMMAND USAGE Use the Navigate Channel Setting fields to specify the MVR VLAN and number of entries to display per page Then use the arrow keys to scroll through the list of associated channels 143 CHAPTER 4 Configuring the Switch Multicast VLAN Registration Static bindings should only be used to receive long term
306. ration Security Network Limit Control 2 Set the system configuration parameters to globally enable or disable limit controls and configure address aging as required 3 Set limit controls for any port including status maximum number of addresses allowed and the response to a violation 4 Click Save Figure 29 Port Limit Control Configuration Port Security Limit Control Configuration System Configuration Aging Enabled Aging Period Disabled seconds Port Configuration CE Disabled Disabled Disabled Disabled Disabled Disabled 1 2 3 Disablea m 4 Disabled 4 5 Disabled Disabled CONFIGURING Network switches can provide open and easy access to network resources AUTHENTICATION by simply attaching a client PC Although this automatic configuration and THROUGH Nerwork 2CC SS is a desirable feature it also allows unauthorized personnel to easily ACCESS SERVERS intrude and possibly gain access to sensitive network data Use the Network Access Server Configuration page to configure IEEE 802 1X port based and MAC based authentication settings The 802 1X standard defines a port based access control procedure that prevents unauthorized access to a network by requiring users to first submit credentials for authentication Access to all switch ports in a network can be centrally controlled from a server which means that authorized users can use the same credent
307. regular intervals and free resources if no activity is seen within the given age period If reauthentication is enabled and the port is in a 802 1X based mode this is not so critical since supplicants that are no longer attached to the port will get removed upon the next reauthentication which will fail But if reauthentication is not enabled the only way to free resources is by aging the entries For ports in MAC based Auth mode reauthentication does not cause direct communication between the switch and the client so this will not detect whether the client is still attached or not and the only way to free any resources is to age the entry Hold Time The time after an EAP Failure indication or RADIUS timeout that a client is not allowed access This setting applies to ports running Single 802 1X Multi 802 1X or MAC based authentication Range 10 1000000 seconds Default 10 seconds If the RADIUS server denies a client access or a RADIUS server request times out according to the timeout specified on the AAA menu on page 117 the client is put on hold in the Unauthorized state In this state the hold timer does not count down during an on going authentication In MAC based Authentication mode the switch will ignore new frames coming from the client during the hold time RADIUS Assigned QoS Enabled RADIUS assigned QoS provides a means to centrally control the traffic class to which traffic coming from a successfully authe
308. rent VLAN This switch supports the following VLAN features Upto 256 VLANs based on the IEEE 802 1Q standard Distributed VLAN learning across multiple switches using explicit or implicit tagging Port overlapping allowing a port to participate in multiple VLANs A72 ASSIGNING PORTS TO VLANs CHAPTER 4 Configuring the Switch IEEE 802 1Q VLANs End stations can belong to multiple VLANs Passing traffic between VLAN aware and VLAN unaware devices Priority tagging Assigning Ports to VLANs Before enabling VLANs for the switch you must first assign each port to the VLAN group s in which it will participate By default all ports are assigned to VLAN 1 as untagged ports Add a port as a tagged port if you want it to carry traffic for one or more VLANs and any intermediate network devices or the host at the other end of the connection supports VLANs Then assign ports on the other VLAN aware network devices along the path that will carry this traffic to the same VLAN s either manually or dynamically using GVRP However if you want a port on this switch to participate in one or more VLANs but none of the intermediate network devices nor the host at the other end of the connection supports VLANs then you should add this port to the VLAN as an untagged port Use the VLAN Membership Configuration page to enable VLANs for this switch by assigning each port to the VLAN group s in which it will participate PATH Basi
309. reported in each transmission This attribute must comply with the rule 4 Transmission Delay lt Transmission Interval Tx Reinit Configures the delay before attempting to re initialize after LLDP ports are disabled or the link goes down Range 1 10 seconds Default 2 seconds When LLDP is re initialized on a port all information in the remote system s LLDP MIB associated with this port is deleted LLDP Interface Attributes Port Port identifier 159 CHAPTER 4 Configuring the Switch Link Layer Discovery Protocol Mode Enables LLDP message transmit and receive modes for LLDP Protocol Data Units Options Disabled Enabled TxRx Rx only Tx only Default Disabled CDP Aware Enables decoding of Cisco Discovery Protocol frames Default Disabled If enabled CDP TLVs that can be mapped into a corresponding field in the LLDP neighbors table are decoded all others are discarded CDP TLVs are mapped into LLDP neighbors table as shown below CDP TLV Device ID is mapped into the LLDP Chassis ID field CDP TLV Address is mapped into the LLDP Management Address field The CDP address TLV can contain multiple addresses but only the first address is shown in the LLDP neighbors table CDP TLV Port ID is mapped into the LLDP Port ID field CDP TLV Version and Platform is mapped into the LLDP System Description field Both the CDP and LLD
310. ross the trigger threshold PATH Advanced Configuration Security RMON Alarm PARAMETERS The following parameters are displayed ID Index to this entry Range 1 65535 Interval The polling interval Range 1 2531 seconds Variable The object identifier of the MIB variable to be sampled Only variables of the type ifEntry n n may be sampled Note that ifEntry n uniquely defines the MIB variable and ifEntry n n defines the MIB variable plus the iflndex For example 1 3 6 1 2 1 2 2 1 1 10 1 denotes iflnOctets plus the iflndex of 1 Possible variables ifEntry n where n 10 21 include InOctets InUcastPkts InNUcastPkts InDiscards InErrors InNUnknownProtos OutOctets OutUcastPkts OutNUcastPkts OutDiscards OutErrors and OutQLen Sample Type Tests for absolute or relative changes in the specified variable Absolute The variable is compared directly to the thresholds at the end of the sampling period Delta The last sample is subtracted from the current value and the difference is then compared to the thresholds Value The value of the statistic during the last sampling period Startup Alarm The method of sampling the selected variable and calculating the value to be compared against the thresholds Possible sample types include Rising Trigger alarm when the first value is larger than the rising threshold a Falling Trigger alarm when the first value is less than the fall
311. rotocol The switch supports both SSH Version 1 5 and 2 0 clients SSH service on this switch only supports password authentication The password can be authenticated either locally or via a RADIUS or TACACS remote authentication server as specified on the Auth Method menu page 61 To use SSH with password authentication the host public key must still be given to the client either during initial connection or manually entered into the known host file However you do not need to configure the client s keys The SSH service on the switch supports up to four client sessions The maximum number of client sessions includes both current Telnet sessions and SSH sessions PARAMETERS These parameters are displayed Mode Allows you to enable disable SSH service on the switch Default Enabled WEB INTERFACE To configure SSH 1 Click Advanced Configuration Security Switch SSH 2 Enable SSH if required 3 Click Save Figure 16 SSH Configuration SSH Configuration Mode Enabled 2 64 CHAPTER 4 Configuring the Switch Configuring Security CONFIGURING HTTPS Use the HTTPS Configuration page to enable the Secure Hypertext Transfer Protocol HTTPS over the Secure Socket Layer SSL HTTPS provides secure access i e an encrypted connection to the switch s web interface PATH Advanced Configuration Security Switch HTTPS USAGE GUIDELINES If you enable HTTPS you must indicate this in the U
312. rotocol in the Internet suite of protocols which offers network management services Simple Network Time Protocol allows a device to set its internal clock based on periodic updates from a Network Time Protocol NTP server Updates can be requested from a specific NTP server or can be received via broadcasts sent by NTP servers SU SSH STA TACACS TCP IP TELNET TFTP UDP UTC VLAN GLOSSARY Secure Shell is a secure replacement for remote access functions including Telnet SSH can authenticate users with a cryptographic key and encrypt data connections between management clients and the switch Spanning Tree Algorithm is a technology that checks your network for any loops A loop can often occur in complicated or backup linked network systems Spanning Tree detects and directs data along the shortest available path maximizing the performance and efficiency of the network Terminal Access Controller Access Control System Plus TACACS is a logon authentication protocol that uses software running on a central server to control access to TACACS compliant devices on the network Transmission Control Protocol Internet Protocol Protocol suite that includes TCP as the primary transport protocol and IP as the network layer protocol Defines a remote communication facility for interfacing to a terminal device over TCP IP Trivial File Transfer Protocol A TCP IP protocol commonly used for software downloads
313. rs are displayed MVR Configuration MVR Mode When MVR is enabled on the switch any multicast data associated with an MVR group is sent from all designated source ports to all receiver ports that have registered to receive data from that multicast group Default Disabled VLAN Interface Settings MVR VID Identifier of the VLAN that serves as the channel for streaming multicast services using MVR MVR source ports should be configured as members of the MVR VLAN but MVR receiver ports should not be manually configured as members of this VLAN Default 100 MVR Name An optional attribute used to indicate the name of a specific MVR VLAN Range 1 32 alphanumeric characters containing at least one alphabetic character Mode Specify the MVR mode of operation Dynamic MVR allows dynamic MVR membership reports on source ports This is the default Compatible MVR membership reports are forbidden on source ports Tagging Specifies whether the traversed IGMP MLD control frames will be sent untagged or tagged with the MVR VID Default Tagged Priority Specifies the priority for transmitting traversed IGMP MLD control frames Default 0 LLQI Last Listener Query Interval is the maximum time to wait for IGMP MLD report memberships on a receiver port before removing the 141 CHAPTER 4 Configuring the Switch Multicast VLAN Registration port from multicast group membership Range 0 to
314. rule Options Any Specific 0 65535 Range 0 65535 Default Any Dest Port Filter Specifies the TCP destination filter for this rule Options Any Specific 0 65535 Range 0 65535 Default Any TCP FIN Specifies the TCP No more data from sender FIN value for this rule Options Any any value is allowed 0 TCP frames where the FIN field is set must not match this entry 1 TCP frames where the FIN field is set must match this entry Default Any 103 CHAPTER 4 Configuring the Switch Configuring Security TCP SYN Specifies the TCP Synchronize sequence numbers SYN value for this rule Options Any any value is allowed 0 TCP frames where the SYN field is set must not match this entry 1 TCP frames where the SYN field is set must match this entry Default Any TCP RST Specifies the TCP Reset the connection RST value for this rule Options Any any value is allowed O TCP frames where the RST field is set must not match this entry 1 TCP frames where the RST field is set must match this entry Default Any TCP PSH Specifies the TCP Push Function PSH value for this rule Options Any any value is allowed 0 TCP frames where the PSH field is set must not match this entry 1 TCP frames where the PSH field is set must match this entry Default Any TCP ACK Specifies the TCP Acknowledgment field significant ACK value for this rule
315. ry Default Any Ethernet Specifies whether frames can be matched according to their ARP RARP protocol address space PRO settings Options Any any value is allowed 0 ARP RARP frames where the PRO is equal to IP 0x800 must not match this entry 1 ARP 102 IPv4 CHAPTER 4 Configuring the Switch Configuring Security RARP frames where the PRO is equal to IP 0x800 must match this entry Default Any MAC Parameters DMAC Filter The type of destination MAC address Options Any MC multicast BC broadcast UC unicast Default Any IP Parameters IP Protocol Filter Specifies the IP protocol to filter for this rule Options Any ICMP UDP TCP Other Default Any The following additional fields are displayed when these protocol filters are selected ICMP Parameters ICMP Type Filter Specifies the type of ICMP packet to filter for this rule Options Any Specific 0 255 Default Any ICMP Code Filter Specifies the ICMP code of an ICMP packet to filter for this rule Options Any Specific 0 255 Default Any UDP Parameters Source Port Filter Specifies the UDP source filter for this rule Options Any Specific 0 65535 Range 0 65535 Default Any Dest Port Filter Specifies the UDP destination filter for this rule Options Any Specific 0 65535 Range 0 65535 Default Any TCP Parameters Source Port Filter Specifies the TCP source filter for this
316. s Figure 106 Access Management Statistics Access Management Statistics Auto refresh Refresh Clear Received Packets Allowed Packets Discarded Packets HTTP 0 0 0 HTTPS 0 SNMP TELNET SSH 200 CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings DISPLAYING INFORMATION ABOUT SWITCH SETTINGS FOR PORT SECURITY Use the Port Security Switch Status page to show information about MAC address learning for each port including the software module requesting port security services the service state the current number of learned addresses and the maximum number of secure addresses allowed Port Security is a module with no direct configuration Configuration comes indirectly from other software modules the user modules When a user module has enabled port security on a port the port is set up for software based learning In this mode frames from unknown MAC addresses are passed on to the port security module which in turn asks all user modules whether to allow this new MAC address to be forwarded or blocked For a MAC address to be set in the forwarding state all enabled user modules must unanimously agree on allowing the MAC address to forward If only one chooses to block it it will be blocked until that user module decides otherwise The status page is divided into two sections one with a legend of user modules that may request port security services and one with th
317. s for example only advertise the voice network policy to permitted voice capable devices both in order to conserve the limited LLDPU space and to reduce security and system integrity issues that can come with inappropriate knowledge of the network policy With this in mind LLDP MED defines an LLDP MED Fast Start interaction between the protocol and the application layers on top of the protocol in order to achieve these related properties Initially a Network Connectivity Device will only transmit LLDP TLVs in an LLDPDU Only after an LLDP MED Endpoint Device is detected will an LLDP MED capable Network Connectivity Device start to advertise LLDP MED TLVs in outgoing LLDPDUs on the associated port The LLDP MED application will temporarily speed up the transmission of the LLDPDU to start within a second when a new LLDP MED neighbor has been detected in order share LLDP MED information as fast as possible to new neighbors Because there is a risk that a LLDP frame being lost during transmission between neighbors it is recommended to repeat the fast start transmission multiple times to increase the possibility for that the neighbors has received the LLDP frame With Fast start repeat count it is possible to specify the number of times the fast start transmission is repeated The recommended value is 4 times giving that 4 LLDP frames with a 1 second interval will be transmitted when a LLDP frame with new information is received It should b
318. s the target IP address and target IP mask in the Target IP Address and Target IP Mask fields Default Any ARP SMAC Match Specifies whether frames can be matched according to their sender hardware address SHA field settings Options Any any value is allowed 0 ARP frames where SHA is not equal to the SMAC address 1 ARP frames where SHA is equal to the SMAC address Default Any RARP DMAC Match Specifies whether frames can be matched according to their target hardware address THA field settings Options Any any value is allowed 0 RARP frames where THA is not equal to the DMAC address 1 RARP frames where THA is equal to the DMAC address Default Any IP Ethernet Length Specifies whether frames can be matched according to their ARP RARP hardware address length HLN and protocol address length PLN settings Options Any any value is allowed 0 ARP RARP frames where the HLN is equal to Ethernet 0x06 and the PLN is equal to IPv4 0x04 must not match this entry 1 ARP RARP frames where the HLN is equal to Ethernet 0x06 and the PLN is equal to IPv4 0x04 must match this entry Default Any IP Specifies whether frames can be matched according to their ARP RARP hardware address space HRD settings Options Any any value is allowed 0 ARP RARP frames where the HRD is equal to Ethernet 1 must not match this entry 1 ARP RARP frames where the HRD is equal to Ethernet 1 must match this ent
319. s Evolution MIB RFC 2863 IP MIB RFC 2011 IP Multicasting related MIBs IPV6 MIB RFC 2065 IPV6 ICMP MIB RFC 2066 IPV6 TCP MIB RFC 2052 IPV6 UDP MIB RFC 2054 MAU MIB RFC 3636 MIB II RFC 1213 P Bridge MIB RFC 2674P Port Access Entity MIB IEEE 802 1X Port Access Entity Equipment MIB Power Ethernet MIB RFC 3621 Private MIB Q Bridge MIB RFC 2674Q Quality of Service MIB RADIUS Accounting Server MIB RFC 4670 RADIUS Authentication Client MIB RFC 2621 RMON MIB RFC 2819 RMON II Probe Configuration Group RFC 2021 partial implementation SNMP Community MIB RFC 3584 SNMP Framework MIB RFC 3411 SNMP MPD MIB RFC 3412 SNMP Target MIB SNMP Notification MIB RFC 3413 SNMP User Based SM MIB RFC 3414 SNMP View Based ACM MIB RFC 3415 SNMPv2 IP MIB RFC 2011 TACACS Authentication Client MIB TCP MIB RFC 2012 Trap RFC 1215 UDP MIB RFC 2013 298 TROUBLESHOOTING PROBLEMS ACCESSING THE MANAGEMENT INTERFACE Table 14 Troubleshooting Chart Symptom Action Cannot connect using a web browser or SNMP software Forgot or lost the password Be sure the switch is powered up Check network cabling between the management station and the switch Check that you have a valid network connection to the switch and that the port you are using has not been disabled Be sure you have configured the VLAN interface through which the management station i
320. s Table Configuration page to configure dynamic address learning or to assign static addresses to specific ports Switches store the addresses for all known devices This information is used to pass traffic directly between the inbound and outbound ports All the addresses learned by monitoring traffic are stored in the dynamic address table You can also manually configure static addresses that are bound to a specific port PATH Basic Advanced Configuration MAC Table 170 CHAPTER 4 Configuring the Switch Configuring the MAC Address Table PARAMETERS These parameters are displayed Aging Configuration Disable Automatic Aging Disables the automatic aging of dynamic entries Address aging is enabled by default Aging Time The time after which a learned entry is discarded Range 10 1000000 seconds Default 300 seconds MAC Table Learning Auto Learning is done automatically as soon as a frame with an unknown source MAC address is received This is the default Disable No addresses are learned and stored in the MAC address table Secure Only static MAC address entries are used all other frames are dropped Make sure that the link used for managing the switch is added to the Static MAC Table before changing to secure learning mode Otherwise the management link will be lost and can only be restored by using another non secure port or by connecting to the switch via the serial interface Not
321. s are displayed Community Specifies the community strings which allow access to the SNMP agent Range 1 32 characters ASCII characters 33 126 only Default public private For SNMPv3 these strings are treated as a Security Name and are mapped as an SNMPv1 or SNMPv2 community string in the SNMPv3 Groups Configuration table see Configuring SNMPv3 Groups on page 74 Source IP Specifies the source address of an SNMP client Source Mask Specifies the address mask for the SNMP client WEB INTERFACE To configure SNMP community access strings 1 Click Advanced Configuration Security Switch SNMP Communities 2 Set the IP address and mask for the default community strings Otherwise you should consider deleting these strings for security reasons 3 Add any new community strings required for SNMPv1 or v2 clients that need to access the switch along with the source address and address mask for each client 4 Click Save Figure 20 SNMPv3 Community Configuration SNMPv3 Community Configuration oom comin sree sea public 0 0 0 0 0 0 0 0 private 0 0 0 0 0 0 0 0 Add new community Save I Reset 72 CHAPTER 4 Configuring the Switch Configuring Security CONFIGURING SNMPv3 USERS Use the SNMPv3 User Configuration page to define a unique name and remote engine ID for each SNMPv3 user Users must be configured with a specific security level and the
322. s connected with a valid IP address subnet mask and default gateway Be sure the management station has an IP address in the same subnet as the switch s IP interface to which it is connected If you are trying to connect to the switch via the IP address for a tagged VLAN group your management station and the ports connecting intermediate switches in the network must be configured with the appropriate tag Contact your local distributor g APPENDIX B Troubleshooting Using System Logs USING SYSTEM LOGS If a fault does occur refer to the Installation Guide to ensure that the problem you encountered is actually caused by the switch If the problem appears to be caused by the switch follow these steps 1 2 Enable logging Set the error messages reported to include all categories Enable SNMP Enable SNMP traps Designate the SNMP host that is to receive the error messages Repeat the sequence of commands or other actions that lead up to the error Make a list of the commands or circumstances that led to the fault Also make a list of any error messages displayed Contact your distributor s service engineer 300 LICENSE INFORMATION This product includes copyrighted third party software subject to the terms of the GNU General Public License GPL GNU Lesser General Public License LGPL or other related free software licenses The GPL code used in this product is distributed WITHOUT ANY W
323. s found in the binding table Jfa DHCP DISCOVER REQUEST or INFORM message is received from a client the packet is forwarded 107 CHAPTER 4 Configuring the Switch Configuring Security If the DHCP packet is not a recognizable type it is dropped If a DHCP packet from a client passes the filtering criteria above it will only be forwarded to trusted ports in the same VLAN If a DHCP packet is from server is received on a trusted port it will be forwarded to both trusted and untrusted ports in the same VLAN If the DHCP snooping is globally disabled all dynamic bindings are removed from the binding table Additional considerations when the switch itself is a DHCP client The port s through which the switch submits a client request to the DHCP server must be configured as trusted Note that the switch will not add a dynamic entry for itself to the binding table when it receives an ACK message from a DHCP server Also when the switch sends out DHCP client packets for itself no filtering takes place However when the switch receives any messages from a DHCP server any packets received from untrusted ports are dropped PARAMETERS These parameters are displayed Snooping Mode Enables DHCP snooping globally When DHCP snooping is enabled DHCP request messages will be forwarded to trusted ports and reply packets only allowed from trusted ports Default Disabled Port Port identifier Mode Enables o
324. s it discovers Use the LLDP Configuration page to set the timing attributes used for the transmission of LLDP advertisements and the device information which is advertised PATH Advanced Configuration LLDP PARAMETERS These parameters are displayed LLDP Timing Attributes Tx Interval Configures the periodic transmit interval for LLDP advertisements Range 5 32768 seconds Default 30 seconds This attribute must comply with the following rule Transmission Interval Transmission Hold Time lt 65536 and Transmission Interval gt 4 Transmission Delay Tx Hold Configures the time to live TTL value sent in LLDP advertisements as shown in the formula below Range 2 10 Default 3 The time to live tells the receiving LLDP agent how long to retain all information pertaining to the sending LLDP agent if it does not transmit updates in a timely manner TTL in seconds is based on the following rule Transmission Interval Transmission Hold Time lt 65536 Therefore the default TTL is 30 3 90 seconds Tx Delay Configures a delay between the successive transmission of advertisements initiated by a change in local LLDP MIB variables Range 1 8192 seconds Default 2 seconds The transmit delay is used to prevent a series of successive LLDP transmissions during a short period of rapid changes in local LLDP MIB objects and to increase the probability that multiple rather than single changes are
325. s on the switch are members of VLAN 1 However the management station can be attached to a port belonging to any VLAN as long as that VLAN has been assigned an IP address Range 1 4095 Default 1 DNS Server A Domain Name Server to which client requests for mapping host names to IP addresses are forwarded IP DNS Proxy Configuration DNS Proxy If enabled the switch maintains a local database based on previous responses to DNS queries forwarded on behalf of attached clients If the required information is not in the local database the switch forwards the DNS query to a DNS server stores the response in its local cache for future reference and passes the response back to the client WEB INTERFACE To configure an IP address 1 Click Configuration System IP 2 Specify the IPv4 settings and enable DNS proxy service if required 3 Click Save Figure 4 IP Configuration Rene DHCP Client D GECCE 19216811 192 168 1 1 255 255 255 0 255 255 255 0 IP Router foooo 0 0 0 0 4 v 0 3 E a Ed s VLAN ID DOER 0 0 0 0 z 2 2 v x o x lt i o 3 Q c S g o 53 DNS Proxy 2 ZAP CHAPTER 4 Configuring the Switch Setting an IP Address SETTING AN IPv6 Use the IPv6 Configuration page to configure an IPv6 address for ADDRESS Management access to the switch IPv6 includes two distinct address types link local unicast and global unica
326. s that the device is using the IEEE 802 1Q tagged frame format and that both the VLAN ID and the Layer 2 priority values are being used as well as the DSCP value The tagged format includes an additional field known as the tag header The tagged frame format also includes priority tagged frames as defined by IEEE 802 1Q 2003 VLAN ID VLAN identifier for the port Range 1 4095 L2 Priority Layer 2 priority used for the specified application type L2 Priority may specify one of eight priority levels 0 7 as defined by IEEE 802 1D 2004 A value of 0 represents use of the default priority as defined in IEEE 802 1D 2004 DSCP DSCP value used to provide Diffserv node behavior for the specified application type as defined in IETF RFC 2474 DSCP may contain one of 64 code point values 0 63 A value of 0 represents use of the default DSCP value as defined in RFC 2475 Policy Port Configuration Every port may advertise a unique set of network policies or different attributes for the same network policies based on the authenticated user identity or port configuration Port The port number for which the configuration applies Policy ID The set of policies that apply to a given port The set of policies is selected by marking the check boxes that correspond to the required policies 166 CHAPTER 4 Configuring the Switch Power over Ethernet WEB INTERFACE To configure LLDP MED TLVs 1 Click Configuration L
327. set the actions to take when a rule is matched such as Rate Limiter Port Copy Logging and Shutdown 4 Click Save Figure 34 Access Control List Configuration Access Control List Configuration Auto refresh l Refresh Clear Remove All T Ingress Port Policy Bitmask Frame Type Action Port Redirect Counter ACE Configuration Policy Filter jay H Rate Limiter Disabled Frame Type ay a Port Redirect Disabled gt Logging Disabled z Shutdown Disabled CO MAC Parameters VLAN Parameters DMAC Filter Any 7 VLAN ID Filter Tag Priority Save Reset Cancel 106 CHAPTER 4 Configuring the Switch Configuring Security CONFIGURING DHCP Use the DHCP Snooping Configuration page to filter IP traffic on insecure SNOOPING ports for which the source address cannot be identified via DHCP snooping The addresses assigned to DHCP clients on insecure ports can be carefully controlled using the dynamic bindings registered with DHCP Snooping or using the static bindings configured with IP Source Guard DHCP snooping allows a switch to protect a network from rogue DHCP servers or other devices which send port related information to a DHCP server This information can be useful in tracking an IP address back to a physical port PATH Advanced Configuration Security Network DHCP Snooping COMMAND USAGE DHCP Snooping Process Network traffic may be disrupted when malicious DHCP messages
328. set to 5 which provides read only access and privilege level 10 which also provides read write access To perform system maintenance software upload factory defaults etc the user s privilege level should be set to 15 Generally the privilege level 15 can be used for an administrator account privilege level 10 for a standard user account and privilege level 5 for a guest account PARAMETERS These parameters are displayed User Name The name of the user Maximum length 8 characters maximum number of users 16 Password Specifies the user password Range 0 8 characters plain text case sensitive Password again Re type the string entered in the previous field to ensure no errors were made The switch will not change the password if these two fields do not match 2 58 gt s CHAPTER 4 Configuring the Switch Configuring Security Privilege Level Specifies the user level Options 1 15 Access to specific functions are controlled through the Privilege Levels configuration page see page 60 The default settings provide four access levels 1 Read access of port status and statistics 5 Read access of all system functions except for maintenance and debugging 10 read and write access of all system functions except for maintenance and debugging 15 read and write access of all system functions including maintenance and debugging WEB INTERFACE To show user accounts 1 Click A
329. signed VLAN Data traffic on downlink ports can only be forwarded to and from uplink ports QinQ tunneling is designed for service providers carrying traffic for multiple customers across their networks It is used to maintain customer specific VLAN and Layer 2 protocol configurations even when different customers use the same internal VLAN IDs Quality of Service QoS refers to the capability of a network to provide better service to selected traffic flows using features such as data prioritization queuing congestion avoidance and traffic shaping These features effectively provide preferential treatment to specific flows either by raising the priority of one flow or limiting the priority of another flow Remote Authentication Dial in User Service RADIUS is a logon authentication protocol that uses software running on a central server to control access to RADIUS compliant devices on the network Remote Monitoring RMON provides comprehensive network monitoring capabilities It eliminates the polling required in standard SNMP and can set alarms on a variety of traffic conditions including specific error types Rapid Spanning Tree Protocol RSTP reduces the convergence time for network topology changes to about 10 of that required by the older IEEE 802 1D STP standard Simple Mail Transfer Protocol is a standard host to host mail transport protocol that operates over TCP port 25 Simple Network Management Protocol The application p
330. sively mirror traffic from any port to a monitor port You can then attach a protocol analyzer or RMON probe to this port to perform traffic analysis and verify connection integrity Ports can be combined into an aggregate connection Trunks can be manually set up or dynamically configured using Link Aggregation Control Protocol LACP IEEE 802 3 2005 The additional ports dramatically increase the throughput across any connection and provide redundancy by taking over the load if a port in the trunk should fail The switch supports up to 5 trunks Broadcast multicast and unknown unicast storm suppression prevents traffic from overwhelming the network When enabled on a port the level of broadcast traffic passing through the port is restricted If broadcast traffic rises above a pre defined threshold it will be throttled until the level falls back beneath the threshold A static address can be assigned to a specific interface on this switch Static addresses are bound to the assigned interface and will not be moved When a static address is seen on another interface the address will L 95S CHAPTER 1 Introduction Description of Software Features IEEE 802 1D BRIDGE STORE AND FORWARD SWITCHING SPANNING TREE ALGORITHM be ignored and will not be written to the address table Static addresses can be used to provide network security by restricting access for a known host to a specific port The switch supports IEEE 802 1D trans
331. spection is disabled globally then it becomes inactive for all ports including those where inspection is enabled When ARP Inspection is disabled all ARP request and reply packets will bypass the ARP Inspection engine and their switching behavior will match that of all other packets a Disabling and then re enabling global ARP Inspection will not affect the ARP Inspection configuration of any ports When ARP Inspection is disabled globally it is still possible to configure ARP Inspection for individual ports These configuration changes will only become active after ARP Inspection is enabled globally again ARP Inspection uses the DHCP snooping bindings database for the list of valid IP to MAC address bindings Note DHCP snooping must be enabled for dynamic clients to be learned automatically CONFIGURING GLOBAL AND PORT SETTINGS FOR ARP INSPECTION Use the ARP Inspection Configuration page to enable ARP inspection globally for the switch and for any ports on which it is required PATH Advanced Configuration Security Network ARP Inspection Configuration PARAMETERS These parameters are displayed Global Configuration Mode Enables Dynamic ARP Inspection globally Default Disabled Translate dynamic to static Click to translate all dynamic entries to static entries Port Mode Configuration Port Port identifier 1S CHAPTER 4 Configuring the Switch Configuring Security Mode Enables
332. splaying Statistics for DHCP Snooping Displaying DHCP Relay Statistics Displaying MAC Address Bindings for ARP Packets Displaying Entries in the IP Source Guard Table Displaying Information on Authentication Servers Displaying a List of Authentication Servers Displaying Statistics for Configured Authentication Servers Displaying Information on RMON Displaying RMON Statistics Displaying RMON Historical Samples Displaying RMON Alarm Settings Displaying RMON Event Settings amp s 207 208 213 214 219 219 219 220 221 223 223 223 224 224 225 226 229 229 230 231 232 233 237 239 240 241 242 243 243 244 247 247 249 250 251 Displaying Information on LACP Displaying an Overview of LACP Groups Displaying LACP Port Status Displaying LACP Port Statistics Displaying Information on Loop Protection Displaying Information on the Spanning Tree Displaying Bridge Status for STA Displaying Port Status for STA Displaying Port Statistics for STA Displaying MVR Information Displaying MVR Statistics Displaying MVR Group Information Displaying MVR SFM Information Showing IGMP Snooping Information Showing IGMP Snooping Status Showing IGMP Snooping Group Information Showing IPv4 SFM Information Showing MLD Snooping Information Showing MLD Snooping Status Showing MLD Snooping Group Information Showing IPv6 SFM Information Displaying LLDP Information Displaying LLDP Neighbor Information Displaying LLDP MED Neighbor In
333. sponses to all packets are received or until a timeout occurs Figure 150 ICMP Ping ICMP Ping IP Address 192 0 2 99 ey ocon Ping Interval fi Start ICMP Ping Output PING server 192 0 2 99 56 bytes of data 64 bytes from 192 0 2 99 icmp_seq 0 time 0ms 64 bytes from 192 0 2 99 icmp_seq 1 time 0ms 64 bytes from 192 0 2 99 icmp_seq 2 time 0ms 64 bytes from 192 0 2 99 icmp_seq 3 time 0ms 64 bytes from 192 0 2 99 icmp_seq 4 time 0ms Sent 5 packets received 5 OK 0 bad New Ping ICMPv6 Ping o on me sen ICMPv6 Ping Output PINGS server 2001 db8 2222 7272 72 72 bytes from 2001 db8 2222 7272 72 icmp_seq 0 time 0ms 72 bytes from 2001 db8 2222 7272 72 icmp_seq 1 time Oms 72 bytes from 2001 db8 2222 7272 72 icmp_seq 2 time Oms 72 bytes from 2001 db8 2222 7272 72 icmp_seq 3 time Oms 72 bytes from 2001 db8 2222 7272 72 icmp_seq 4 time Oms Sent 5 packets received 5 OK O bad 284 CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics RUNNING CABLE DIAGNOSTICS The VeriPHY page is used to perform cable diagnostics for all ports or selected ports to diagnose any cable faults short open etc and report the cable length PATH Diagnostics VeriPHY PARAMETERS These parameters are displayed on the VeriPHY Cable Diagnostics page Port Diagnostics can be performed on all ports or on a specific port Cable Status Shows the cable length operating condit
334. ss protocol packet includes the IPv4 address of the switch If no management address is available the address should be the MAC address for the CPU or for the port sending this advertisement 160 CHAPTER 4 Configuring the Switch Link Layer Discovery Protocol The management address TLV may also include information about the specific interface associated with this address and an object identifier indicating the type of hardware component or protocol entity associated with this address The interface number and OID are included to assist SNMP applications in the performance of network discovery by indicating enterprise specific or other starting points for the search such as the Interface or Entity MIB Since there are typically a number of different addresses associated with a Layer 3 device an individual LLDP PDU may contain more than one management address TLV WEB INTERFACE To configure LLDP timing and advertised TLVs 1 Click Configuration LLDP 2 Modify any of the timing parameters as required 3 Set the required mode for transmitting or receiving LLDP messages 4 Enable or disable decoding CDP frames 5 Specify the information to include in the TLV field of advertised messages 6 Click Save Figure 62 LLDP Configuration LLDP Configuration LLDP Parameters Tx Interval EI seconds Tx Hold 3 times Tx Delay 2 seconds ELECE 2 seconds Optional TLVs v v Enabled Enabled Enabled Enabled Enabled
335. st IGMP Snooping 262 Status Displays statistics related to IGMP packets passed upstream 262 to the IGMP Querier or downstream to multicast clients 204 amp CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface Table 4 Main Menu Continued Menu Description Page Group Displays active IGMP groups 263 Information IPv4 SFM Displays IGMP Source Filtered Multicast information 263 Information including group filtering mode include or exclude source address and type allow or deny MLD Snooping Multicast Listener Discovery Snooping 264 Status Displays MLD querier status and protocol statistics 264 Group Displays active MLD groups 266 Information IPv6 SFM Displays MLD Source Filtered Multicast information including 266 Information group filtering mode include or exclude source address and type allow or deny LLDP Link Layer Discovery Protocol 267 Neighbors Displays LLDP information about a remote device connected 267 to a port on this switch LLDP MED Displays information about a remote device connected toa 268 Neighbors port on this switch which is advertising LLDP MED TLVs including network connectivity device endpoint device capabilities application type and policy PoE3 Displays status of all LLDP PoE neighbors including power 271 device type PSE or PD source of power power priority and maximum required power EEE Displays Energy Efficient Ethernet information advertised Ea thro
336. st A link local address makes the switch accessible over IPv6 for all devices attached to the same local subnet Management traffic using this kind of address cannot be passed by any router outside of the subnet A link local address is easy to set up and may be useful for simple networks or basic troubleshooting tasks However to connect to a larger network with multiple segments the switch must be configured with a global unicast address A link local address must be manually configured but a global unicast address can either be manually configured or dynamically assigned PATH Basic Advanced Configuration System IPv6 USAGE GUIDELINES All IPv6 addresses must be formatted according to RFC 2373 IPv6 Addressing Architecture using 8 colon separated 16 bit hexadecimal values One double colon may be used in the address to indicate the appropriate number of zeros required to fill the undefined fields When configuring a link local address note that the prefix length is fixed at 64 bits and the host portion of the default address is based on the modified EUI 64 Extended Universal Identifier form of the interface identifier i e the physical MAC address You can manually configure a link local address by entering the full address with the network prefix FE80 To connect to a larger network with multiple subnets you must configure a global unicast address There are several alternatives to configuring this address type
337. stination port and leave the Mode field Disabled Logging Enables logging of matching frames to the system log Default Disabled Open the System Log Information menu page 221 to view any entries stored in the system log for this entry Related entries will be displayed under the Info or All logging levels Shutdown Shuts down a port when a macthing frame is seen Default Disabled Counter Shows he number of frames which have matched any of the rules defined for this ACL VLAN Parameters VLAN ID Filter Specifies the VLAN to filter for this rule Options Any Specific 1 4095 Default Any Tag Priority Specifies the User Priority value found in the VLAN tag 3 bits as defined by IEEE 802 1p to match for this rule Options Any Specific 0 7 Default Any 105 CHAPTER 4 Configuring the Switch Configuring Security WEB INTERFACE To configure an Access Control List for a port or a policy 1 Click Advanced Configuration Security Network ACL Access Control List 2 Click the button to add a new ACL or use the other ACL modification buttons to specify the editing action i e edit delete or moving the relative position of entry in the list 3 When editing an entry on the ACE Configuration page note that the items displayed depend on various selections such as Frame Type and IP Protocol Type Specify the relevant criteria to be matched for this rule and
338. t Port identifier Filtering Groups Multicast groups that are denied on a port When filter groups are defined MLD listener reports received on a port are checked against the these groups If a requested multicast group is denied the MLD report is dropped WEB INTERFACE To configure MLD Snooping Port Group Filtering 1 Click Configuration IPMC MLD Snooping Port Group Filtering 2 Click Add New Filtering Group to display a new entry in the table 3 Select the port to which the filter will be applied 4 Enter the IP address of the multicast service to be filtered 5 Click Save Figure 61 MLD Snooping Port Group Filtering Configuration MLD Snooping Port Group Filtering Configuration Delete Port Filtering Groups Dere 1 LINK LAYER DISCOVERY PROTOCOL Link Layer Discovery Protocol LLDP is used to discover basic information about neighboring devices on the local broadcast domain LLDP is a Layer 2 protocol that uses periodic broadcasts to advertise information about the sending device Advertised information is represented in Type Length Value TLV format according to the IEEE 802 1AB standard and can include details such as device identification capabilities and configuration settings 158 CONFIGURING LLDP TIMING AND TLVS CHAPTER 4 Configuring the Switch Link Layer Discovery Protocol LLDP also defines how to store and maintain information gathered about the neighboring network node
339. t 10 seconds LLQI The Last Listener Query Interval RFC 3810 MLDv2 for IP is used to configure the Last Member Query Interval for IGMP This attribute sets the interval to wait for a response to a group specific or group and source specific query message The overall time to wait for a response Last Member Query Time is the value assigned to LLQI multiplied by the Last Member Query Count which is fixed at 2 Range 1 31744 tenths of a second in multiples of 10 Default 1 second When a multicast host leaves a group it sends an IGMP leave message When the leave message is received by the switch it checks to see if this host is the last to leave the group by sending out an IGMP group specific or group and source specific query message and starts a timer If no reports are received before the timer expires the group record is deleted and a report is sent to the upstream multicast router A reduced value will result in reduced time to detect the loss of the last member of a group or source but may generate more burst traffic 150 CONFIGURING IGMP FILTERING CHAPTER 4 Configuring the Switch IGMP Snooping This attribute will take effect only if IGMP snooping proxy reporting is enabled see page 152 URI The Unsolicited Report Interval specifies how often the upstream interface should transmit unsolicited IGMP reports when report suppression proxy reporting is enabled Range 0 31744 seconds Default 1 s
340. t 48 dynamic configuration link local 48 EUI format 48 49 EUI 64 setting 48 49 global unicast 48 49 link local 48 manual configuration global unicast 48 49 manual configuration link local 48 setting 48 K key public 64 L LACP configuration 123 local parameters 252 partner parameters 252 protocol message statistics 253 protocol parameters 123 leave proxy 147 153 license information GNU 301 Link Aggregation Control Protocol See LACP Link Layer Discovery Protocol Media Endpoint Discovery See LLDP MED Link Layer Discovery Protocol See LLDP link type STA 138 LLDP 158 device statistics displaying 273 neighbor information EEE 272 remote information displaying 267 TLV 158 TLV management address 160 TLV port description 160 TLV system capabilities 160 TLV system description 160 TLV system name 160 LLDP MED 162 logging syslog traps 53 to syslog servers 53 log in web interface 35 logon authentication 58 encryption keys 118 RADIUS client 118 RADIUS server 118 settings 117 118 TACACS client 61 TACACS server 61 118 loopback detection non STA 125 M main menu 36 management access filtering IP addresses 66 management address setting 31 Management Information Bases MIBs 298 maximum frame size 56 mirror port configuring local traffic 207 configuring remote traffic 208 MLD 152 fast leave status 154 filter parameters 158 filtering 158 proxy 154 querier configuring 156 query 156 snoopin
341. t 500 kbps WEB INTERFACE To configure Storm Control 1 Click Configuration QoS Storm Control 2 Enable storm control for unknown unicast broadcast or multicast traffic by marking the Status box next to the required frame type 3 Select the control rate 4 Click Save Figure 87 Storm Control Configuration QoS Port Storm Control Unicast Frames Broadcast Frames Unknown Frames Port T T T Enabled Rate Unit Enabled Rate Unit Enabled Rate Unit D o g r e d r f wfe a kbps kbps 500 kbps kops E eo kops E kbps 500 kbps lt gt lt gt z z kbps z 0 kbps z kbps z 50 kbps 204 CHAPTER 4 Configuring the Switch Quality of Service CONFIGURING WRED Use the Storm Control Configuration page to control traffic congestion on its output queues using Weighted Random Early Detection WRED This method controls the average queue size by randomly dropping packets at a moderate rate as the network load moves above a specified minimum threshold and then at a more aggressive rate when it reaches the maximum threshold If the source is using TCP it will automatically decrease its transmission rate once it notes that packets are being dropped RED and TCP work together to cause hosts to adjust their transmissions to a rate the network can handle WRED provides preferential treatment of higher priority frames when traffic builds up within a queue A frame s DP level is used as input t
342. t Identifier 252 DISPLAYING LACP PORT STATISTICS CHAPTER 5 Monitoring the Switch Displaying Information on LACP LACP Shows LACP status Yes LACP is enabled and the port link is up No LACP is not enabled or the port link is down Backup The port could not join the aggregation group but will join if other port leaves Meanwhile it s LACP status is disabled Key Current operational value of the key for the aggregation port Note that only ports with the same key can aggregate together Aggr ID The Aggregation ID assigned to this LAG Partner System ID LAG partner s system ID assigned by the LACP protocol i e its MAC address Partner Port The partner port connected to this local port Partner Priority The partner port priority used to select a backup link WEB INTERFACE To display LACP status for local ports this switch click Monitor LACP Port Status Figure 123 LACP Port Status LACP Status Partner Partner Partner Port LACE Aggr ID SystemID Port Prio No 1 2 No 3 No 4 No 5 No Use the LACP Port Statistics page to display statistics on LACP control packets crossing on each port PATH Monitor LACP Port Statistics PARAMETERS These parameters are displayed Port Port Identifier LACP Transmitted The number of LACP frames sent from each port LACP Received The number of LACP frames received at each port Discarded T
343. t Shaper Sets the rate at which traffic can egress this queue Enable Enables or disables port shaping Default Disabled Rate Controls the rate for the port shaper The default value is 500 This value is restricted to 100 1000000 kbps or 1 3300 Mbps Unit Controls the unit of measure for the port shaper rate as kbps or Mbps Default kbps WEB INTERFACE To show an overview of the queue mode and weight used by egress ports 1 Click Configuration QoS Port Scheduler 2 Click on any enter under the Port field to configure the Port Scheduler and Shaper Figure 77 Displaying Egress Port Schedulers QoS Egress Port Schedulers 1 Strict Priority 2 Strict Priority 3 Strict Priority 4 Strict Priority 5 Strict Priority To configure the scheduler mode the egress queue mode queue shaper and port shaper used by egress ports 1 Click Advanced Configuration QoS Port Scheduler 2 Click on any of the entries in the Port field 3 Set the scheduler mode the queue shaper queue scheduler when the scheduler mode is set to Weighted and the port shaper 4 Click Save OM CHAPTER 4 Configuring the Switch Quality of Service Figure 78 Configuring Egress Port Schedulers and Shapers QoS Egress Port Scheduler and Shapers Port 1 SPCC Cit Strict Priority Queue Shaper Port Shaper SS EO a d O a Fl Fl a 2 70 i Save J R
344. t serves as the root of the spanning tree network It selects a root port on each bridging device except for the root device which incurs the lowest path cost when forwarding a packet from that device to the root device Then it selects a designated bridging device from each LAN which incurs the lowest path cost when forwarding a packet from that LAN to the root device All ports connected to designated bridging devices are assigned as designated ports After determining the lowest cost spanning tree it enables all root ports and designated ports and disables all other ports Network packets are therefore only forwarded between root ports and designated ports eliminating any possible network loops Figure 45 STP Root Ports and Designated Ports Designated AN A lt lt a N 7 x BENA Designated X poa _ de aera A rN gt Designated Port n AN N Nay _ Bridge Na Na Gy X Once a stable network topology has been established all bridges listen for Hello BPDUs Bridge Protocol Data Units transmitted from the Root Bridge If a bridge does not get a Hello BPDU after a predefined interval Maximum Age the bridge assumes that the link to the Root Bridge is down This bridge will then initiate negotiations with other bridges to reconfigure the network to reestablish a valid network topology RSTP RSTP is designed as a general replacement for the slower le
345. t symbol for a channel opening the MVR Channel Configuration page Enter the IP range for a multicast group and the channel name as required Click Save 144 IGMP SNOOPING CONFIGURING GLOBAL AND PORT RELATED SETTINGS FOR IGMP SNOOPING CHAPTER 4 Configuring the Switch IGMP Snooping Figure 55 Configuring MVR Channel Settings MVR Channel Configuration Navigate Channel Setting with MVR VID 2 byf20 entries per page Delete VLAN ID VLAN Name Start Address End Address Channel Name r 2 PPV 2240 10 r 2 PPV 224020 Add New MVR Channel eae Rese Multicasting is used to support real time applications such as videoconferencing or streaming audio A multicast server does not have to establish a separate connection with each client It merely broadcasts its service to the network and any hosts that want to receive the multicast register with their local multicast switch router Although this approach reduces the network overhead required by a multicast server the broadcast traffic must be carefully pruned at every multicast switch router it passes through to ensure that traffic is only passed on to the hosts which subscribed to this service This switch can use Internet Group Management Protocol IGMP to filter multicast traffic IGMP Snooping can be used to passively monitor or snoop on exchanges between attached hosts and an IGMP enabled device most commonly a multicast router In this
346. te network segments into a single 135 CHAPTER 4 Configuring the Switch Configuring the Spanning Tree Algorithm spanning tree As implemented on this switch BPDU transparency allows a port which is not participating in the spanning tree such as an uplink port to the service provider s network to forward BPDU packets to other ports instead of discarding these packets or attempting to process them Path Cost This parameter is used by the STA to determine the best path between devices Therefore lower values should be assigned to ports attached to faster media and higher values assigned to ports with slower media Path cost takes precedence over port priority By default the system automatically detects the speed and duplex mode used on each port and configures the path cost according to the values shown below Table 9 Recommended STA Path Cost Range Port Type IEEE 802 1D 1998 IEEE 802 1w 2001 Ethernet 50 600 200 000 20 000 000 Fast Ethernet 10 60 20 000 2 000 000 Gigabit Ethernet 3 10 2 000 200 000 Table 10 Recommended STA Path Costs Port Type Link Type IEEE 802 1D 1998 IEEE 802 1w 2001 Ethernet Half Duplex 100 2 000 000 Full Duplex 95 1 999 999 Trunk 90 1 000 000 Fast Ethernet Half Duplex 19 200 000 Full Duplex 18 100 000 Trunk 15 50 000 Gigabit Ethernet Full Duplex 4 10 000 Trunk 3 5 000 Table 11 Default STA Path Costs Port Type Link Type IEEE 802 1w 2001 Ethernet Half Duplex 2 000 000 Full D
347. te replacement for STP but can still interoperate with switches running the older standard by automatically reconfiguring ports to STP compliant mode if they detect STP protocol messages from attached devices Multiple Spanning Tree Protocol MSTP IEEE 802 1s This protocol is a direct extension of RSTP It can provide an independent spanning tree for different VLANs It simplifies network management provides for even faster convergence than RSTP by limiting the size of each region and prevents VLAN members from being segmented from the rest of the group as sometimes occurs with IEEE 802 1D STP 26 CHAPTER 1 Introduction Description of Software Features VIRTUAL LANS The switch supports up to 4096 VLANs A Virtual LAN is a collection of IEEE 802 1Q TUNNELING QINQ TRAFFIC PRIORITIZATION network nodes that share the same collision domain regardless of their physical location or connection point in the network The switch supports tagged VLANs based on the IEEE 802 1Q standard Members of VLAN groups can be manually assigned to a specific set of VLANs This allows the switch to restrict traffic to the VLAN groups to which a user has been assigned By segmenting your network into VLANs you can Eliminate broadcast storms which severely degrade performance in a flat network Simplify network management for node changes moves by remotely configuring VLAN membership for any port rather than having to manually chang
348. ted bytes good and bad including Frame Check Sequence but excluding framing bits Unicast The number of received and transmitted unicast packets good and bad Multicast The number of received and transmitted multicast packets good and bad 2267 CHAPTER 5 Monitoring the Switch Displaying Information About Ports Broadcast The number of received and transmitted broadcast packets good and bad Pause A count of the MAC Control frames received or transmitted on this port that have an opcode indicating a PAUSE operation Receive Transmit Size Counters The number of received and transmitted packets good and bad split into categories based on their respective frame sizes Receive Transmit Queue Counters The number of received and transmitted packets per input and output queue Receive Error Counters Rx Drops The number of inbound packets which were discarded even though no errors had been detected to prevent their being delivered to a higher layer protocol One possible reason for discarding such a packet could be to free up buffer space Rx CRC Alignment The number of frames received with CRC or alignment errors Rx Undersize The total number of frames received that were less than 64 octets long excluding framing bits but including FCS octets and were otherwise well formed Rx Oversize The total number of frames received that were longer than the configured maximum frame length f
349. ters Total 0 Total 1 Response ID 0 Request ID 0 Responses 0 Requests 0 Start 0 Logoff Invalid Type Invalid Length DISPLAYING ACL Use the ACL Status page to show the status for different security modules Status which use ACL filtering including ingress port frame type and forwarding action Each row describes a defined ACE see page 96 PATH Monitor Security Network ACL Status PARAMETERS These parameters are displayed User Indicates the ACL user see Configuring User Privilege Levels on page 60 for a list of software modules Ingress Port Indicates the ingress port to which the ACE applies Possible values are m Any The ACE will match any ingress port a Policy The ACE will match ingress ports with a specific policy R CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings Port The ACE will match a specific ingress port Frame Type Indicates the frame type to which the ACE applies Possible values are m Any The ACE will match any frame type EType The ACE will match Ethernet Type frames Note that an Ethernet Type based ACE will not get matched by IP and ARP frames ARP ACE will match ARP RARP frames IPv4 ACE will match all IPv4 frames IPv4 ICMP ACE will match IPv4 frames with ICMP protocol IPv4 UDP ACE will match IPv4 frames with UDP protocol IPv4 TCP ACE will match IPv4 frames with TCP protocol m Pv4 Other ACE will
350. tes serial number of the link layer address To ensure that the chosen address is from a unique Ethernet MAC address the 7th bit in the high order byte is set to 1 equivalent to the IEEE Global Local bit to indicate the uniqueness of the 48 bit address Generic Attribute Registration Protocol GARP is a protocol that can be used by endstations and switches to register and propagate multicast group membership information in a switched environment so that multicast data frames are propagated only to those parts of a switched LAN containing registered endstations Formerly called Group Address Registration Protocol 306 GMRP IEEE 802 1D IEEE 802 1Q IEEE 802 1P IEEE 802 1s IEEE 802 1w IEEE 802 1X IEEE 802 3ac IEEE 802 3x IGMP GLOSSARY Generic Multicast Registration Protocol GMRP allows network devices to register end stations with multicast groups GMRP requires that any participating network devices or end stations comply with the IEEE 802 1p standard Specifies a general method for the operation of MAC bridges including the Spanning Tree Protocol VLAN Tagging Defines Ethernet frame tags which carry VLAN information It allows switches to assign endstations to different virtual LANs and defines a standard way for VLANs to communicate across switched networks An IEEE standard for providing quality of service QoS in Ethernet networks The standard uses packet tags that define up to eight traffic
351. the Port to mirror on field to the required destination port and leave the Mode field Disabled Logging Enables logging of matching frames to the system log Default Disabled Open the System Log Information menu page 221 to view any entries stored in the system log for this entry Related entries will be displayed under the Info or All logging levels Shutdown Shuts down a port when a macthing frame is seen Default Disabled State Specify the port state Enabled To reopen ports by changing the port configuration in the ACL configuration pages This is the default Disabled To close ports by changing the volatile port configuration of the ACL user module Counter The number of frames which have matched any of the rules defined in the selected policy WEB INTERFACE To configure ACL policies and responses for a port 1 2 Click Advanced Configuration Security Network ACL Ports Assign an ACL policy configured on the ACE Configuration page specify the responses to invoke when a matching frame is seen including the filter mode copying matching frames to another port logging matching z 7 CHAPTER 4 Configuring the Switch Configuring Security frames or shutting down the port Note that the setting for rate limiting is implemented regardless of whether or not a matching packet is seen 3 Repeat the preceding step for each port to which an ACL will be appli
352. the Protocol to Group Mapping Table to create protocol groups PATH Advanced Configuration VCL Protocol based VLANs Protocol to Group PARAMETERS These parameters are displayed Frame Type Choose Ethernet LLC Logical Link Control or SNAP SubNetwork Access Protocol RFC 1042 as the frame type used by this protocol Value Values which define the specific protocol type The fields displayed depend on the selected frame type Ethernet EtherType value Range 0x0600 Oxffff Default 0x0800 AOE CHAPTER 4 Configuring the Switch Protocol VLANs LLC Includes the DSAP Destination Service Access Point and SSAP Source Service Access Point values Range 0x00 Oxff Default Oxff SNAP Includes OUI Organizationally Unique Identifier and PID Protocol ID values m OUI A value in the format of xx xx xx where each pair xx in the string is a hexadecimal value in the ranges of 0x00 Oxff PID If the OUI is hexadecimal 000000 the protocol ID is the Ethernet type EtherType field value for the protocol running on top of SNAP If the OUI is that of a particular organization the protocol ID is a value assigned by that organization to the protocol running on top of SNAP In other words if value of the OUI field is 00 00 00 then value of the PID will be etherType 0x0600 Oxffff and if value of the OUI is other than 00 00 00 then valid value of the PID will be any value from 0x0000 to Oxffff
353. the VLAN tag or Layer 2 traffic or the IP Precedence or DSCP value for Layer 3 traffic 205 CHAPTER 4 Configuring the Switch Quality of Service CONFIGURING CONGESTION MANAGEMENT WEB INTERFACE To configure WRED 1 Click Configuration QoS WRED 2 Enable WRED on the priority queues as required 3 Set the minimum threshold below which no packets are dropped 4 Set the drop probabilities for DP levels 1 through 3 as a percentage 5 Click Save Figure 88 WRED Configuration Weighted Random Early Detection Configuration Queue Enable Min Threshold Max DP 1 Max DP Use the Congestion Management page to specify whether or not to forward traffic when the destination port is congested Note that congestion Management does not apply to priority 6 and 7 which are always allowed to be forwarded PATH Configuration QoS Congestion Management PARAMETERS These parameters are displayed Mode Specifies whether to enable or disable congestion management Default Enabled WEB INTERFACE To configure WRED 1 Click Configuration QoS Congestion Management 2 Enable or disable congestion management as required 3 Click Save 206 CHAPTER 4 Configuring the Switch Configuring Local Port Mirroring Figure 89 Congestion Management Configuration Congestion Management Mose Enabled _Save Reset CONFIGURING LOCAL PORT MIRRORING Use the Mirroring amp RSPAN C
354. the switch transmits an EAPOL Request Identity frame without receiving a response before adding a port to the Guest VLAN The value can only be changed if the Guest VLAN option is globally enabled Range 1 255 Allow Guest VLAN if EAPOL Seen The switch remembers if an EAPOL frame has been received on the port for the lifetime of the port Once the switch considers whether to enter the Guest VLAN it will first check if this option is enabled or disabled If disabled the default the switch will only enter the Guest VLAN if an EAPOL frame has not been received on the port for the lifetime of the port If enabled the switch will consider entering the Guest VLAN even if an EAPOL frame has been received on the port for the lifetime of the port The value can only be changed if the Guest VLAN option is globally enabled Port Configuration Port Port identifier 2569S CHAPTER 4 Configuring the Switch Configuring Security Admin State If NAS is globally enabled this selection controls the port s authentication mode The following modes are available Force Authorized The switch sends one EAPOL Success frame when the port link comes up This forces the port to grant access to all clients either dot1x aware or otherwise This is the default setting Force Unauthorized The switch will send one EAPOL Failure frame when the port link comes up This forces the port to deny access to all clients either dotix aware or otherwise
355. time since the bridge port was last initialized 256 CHAPTER 5 Monitoring the Switch Displaying Information on the Spanning Tree WEB INTERFACE To display an overview of all STP bridge instances click Monitor Spanning Tree Bridge Status Figure 126 Spanning Tree Bridge Status STP Bridges Auto refresh Refresh CIST 80 00 00 01 01 01 02 03 80 00 00 01 C1 01 02 03 0 Steady To display detailed information on a single STP bridge instance along with port state for all active ports associated 1 Click Monitor Spanning Tree Bridge Status 2 Click on an entry in the STP Bridges page Figure 127 Spanning Tree Detailed Bridge Status STP Detailed Bridge Status Bridge Instance CIST Bridge ID 32768 78 CD 8E AF 69 7C Root ID 32768 00 E0 0C 10 90 00 Root Cost 200000 Root Port 1 Regional Root 32768 78 CD 8E AF 69 7C Internal Root Cost 0 Topology Flag Topology Change Count 6 Topology Change Last 0d 08 15 28 CIST Ports amp Aggregations State 14 128 001 RootPort Forwarding 200000 No Yes Od 08 15 34 DISPLAYING PORT Use the Port Status page to display the STA functional status of STATUS FOR STA Participating ports PATH Monitor Spanning Tree Port Status 257 CHAPTER 5 Monitoring the Switch Displaying Information on the Spanning Tree DISPLAYING PORT STATISTICS FOR STA PARAMETERS These parameters are displayed Port Port Identifier CIST Role Roles are assi
356. tings Table 6 SNMP Security Models and Levels Model Level Community String Group Read View Write View Security vi noAuth public default_ro_group default_view none Community string only NoPriv vi noAuth private default_rw_group default_view default_view Community string only NoPriv vi noAuth user defined user defined user defined user defined Community string only NoPriv v2c noAuth public default_ro_group default_view none Community string only NoPriv v2c noAuth private default_rw_group default_view default_view Community string only NoPriv v2c noAuth user defined user defined user defined user defined Community string only NoPriv v3 noAuth user defined default_rw_group default_view default_view A user name match only NoPriv v3 Auth user defined user defined user defined user defined Provides user authentication NoPriv via MD5 or SHA algorithms v3 Auth Priv user defined user defined user defined user defined Provides user authentication via MD5 or SHA algorithms and data privacy using DES 56 bit encryption Note The predefined default groups and view can be deleted from the system You can then define customized groups and views for the SNMP clients that require access CONFIGURING SNMP SYSTEM AND TRAP SETTINGS Use the SNMP System Configuration page to configure basic settings and traps for SNMP To manage the switch through SNMP you must first enable the protocol and configure the basic access parameters To issue trap
357. tion settings to the switch Use the Configuration Save page to save the current configuration settings to a file on your local management station PATH Maintenance Configuration Save WEB INTERFACE To save your current configuration settings 1 Click Maintenance Configuration Save 2 Click the Save configuration button 3 Specify the directory and name of the file under which to save the current configuration settings The configuration file is in XML format The configuration parameters are represented as attribute values When saving the configuration from the switch the entire configuration including syntax descriptions is included in the file The file may be modified using an editor and loaded to a switch Figure 156 Configuration Save Configuration Save Use the Configuration Upload page to restore previously saved configuration settings to the switch from a file on your local management station PATH Maintenance Configuration Upload WEB INTERFACE To restore your current configuration settings 1 Click Maintenance Configuration Upload 2 Click the Browse button and select the configuration file 3 Click the Upload button to restore the switch s settings 290 CHAPTER 7 Performing System Maintenance Managing Configuration Files Figure 157 Configuration Upload Configuration Upload reves a 291 CHAPTER 7 Performing System Maintenance Managing Configurati
358. to accept access attempts Dead X seconds left Access attempts were made to this server but it did not reply within the configured timeout The server has been temporarily disabled but will be re enabled when the dead time expires The number of seconds left before this occurs is displayed in parentheses WEB INTERFACE To display a list of configured authentication and accounting servers click Monitor Security AAA RADIUS Overview Figure 116 RADIUS Overview RADIUS Authentication Server Status Overview Auto refresh Refresh a a 0 0 0 0 1812 Disabled 0 0 0 0 1812 Disabled 0 0 0 0 1812 Disabled 0 0 0 0 1812 Disabled 0 0 0 0 1812 Disabled al 2 3 4 5 RADIUS Accounting Server Status Overview IP Address 0 0 0 0 1813 Disabled 0 0 0 0 1813 Disabled 0 0 0 0 1813 Disabled 0 0 0 0 1813 Disabled 0 0 0 0 1813 Disabled 109 gt 100 N e 243 CHAPTER 5 Monitoring the Switch Displaying Information on Authentication Servers DISPLAYING STATISTICS FOR CONFIGURED AUTHENTICATION SERVERS Use the RADIUS Details page to display statistics for configured authentication and accounting servers The statistics map closely to those specified in RFC4668 RADIUS Authentication Client MIB PATH Monitor Security AAA RADIUS Details PARAMETERS These parameters are displayed RADIUS Authentication Statistics Receive Packets Access Accepts The number of RADIUS Access Accept packets
359. tor network traffic on the indicated VLAN interface to determine which hosts want to receive multicast traffic Default Enabled When IGMP snooping is enabled globally the per VLAN interface settings for IGMP snooping take precedence When IGMP snooping is disabled globally snooping can still be configured per VLAN interface but the interface settings will not take effect until snooping is re enabled globally IGMP Querier When enabled the switch can serve as the Querier on the selected interface which is responsible for asking hosts if they want to receive multicast traffic Default Disabled A router or multicast enabled switch can periodically ask their hosts if they want to receive multicast traffic If there is more than one router switch on the LAN performing IP multicasting one of these devices is 149 CHAPTER 4 Configuring the Switch IGMP Snooping elected querier and assumes the role of querying the LAN for group members It then propagates the service requests on to any upstream multicast switch router to ensure that it will continue to receive the multicast service This feature is not supported for IGMPv3 snooping Compatibility Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of IGMP operating on these devices within a network Range IGMP Auto Forced IGMPv1 Forced IGMPv2 Forced IGMPv3 Default IGMP Auto RV The Robustness Variabl
360. traffic This prevents the switch from broadcasting the traffic to all ports and possibly disrupting network performance If multicast routing is not supported on other switches in your network you can use MLD Snooping and Query to monitor MLD service requests passing between multicast clients and servers and dynamically configure the switch ports which need to forward multicast traffic 152 CHAPTER 4 Configuring the Switch MLD Snooping Multicast routers use information from MLD snooping and query reports along with a multicast routing protocol such as PIMv6 to support IP multicasting across the Internet PATH Advanced Configuration IPMC MLD Snooping Basic Configuration PARAMETERS These parameters are displayed Global Configuration Snooping Enabled When enabled the switch will monitor network traffic to determine which hosts want to receive multicast traffic Default Disabled This switch can passively snoop on MLD Listener Query and Report packets transferred between IP multicast routers switches and IP multicast host groups to identify the IP multicast group members It simply monitors the MLD control packets passing through it picks out the group registration information and configures the multicast filters accordingly Unregistered IPMCv6 Flooding Enabled Floods unregistered multicast traffic into the attached VLAN Default Enabled Once the table used to store multicast entries for MLD snoopi
361. ttached supplicant For MAC based Auth this column holds the MAC address of the attached client Clicking the link causes the client s Backend Server counters to be shown in the Selected Counters table If no clients are attached it shows No clients attached VLAN ID This column holds the VLAN ID that the corresponding client is currently secured to through the Port Security module State The client can either be authenticated or unauthenticated In the authenticated state it is allowed to forward frames on the port and in the unauthenticated state it is blocked As long as the backend server has not successfully authenticated the client it is unauthenticated If an authentication fails for one or the other reason 290 CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings the client will remain in the unauthenticated state for Hold Time seconds see page 231 Last Authentication Shows the date and time of the last authentication of the client successful as well as unsuccessful WEB INTERFACE To display port Statistics for 802 1X or Remote Authentication Service 1 Click Monitor Security Network NAS Port 2 Select a port from the scroll down list Figure 110 NAS Statistics for Specified Port NAS Statistics Port 3 Port3 Auto refresh LI Port State Force Authorized Port State Authorized Port Counters Receive EAPOL Counters Transmit EAPOL Coun
362. ttings Spanning Tree2 127 Bridge Settings Configures global bridge settings for STP RSTP and MSTP 129 also configures edge port settings for BPDU filtering BPDU guard and port error recovery MSTI Mapping Maps VLANs to a specific MSTP instance 132 MSTI Priorities Configures the priority for the CIST and each MISTI 134 CIST Ports Configures interface settings for STA 135 MSTI Ports Configures interface settings for an MST instance 138 MVR Configures Multicast VLAN Registration including global 140 status MVR VLAN port mode and immediate leave IPMC IP Multicast IGMP Snooping Internet Group Management Protocol Snooping 145 Basic Configures global and port settings for multicast filtering 145 Configuration VLAN Configures IGMP snooping per VLAN interface 149 Configuration Port Group Configures multicast groups to be filtered on specified port 151 Filtering MLD Snooping Multicast Listener Discovery Snooping 152 Basic Configures global and port settings for multicast filtering 152 Configuration VLAN Configures MLD snooping per VLAN interface 155 Configuration Port Group Configures multicast groups to be filtered on specified port 158 Filtering LLDP Link Layer Discovery Protocol 158 LLDP Configures global LLDP timing parameters and port specific 159 TLV attributes LLDP MED Configures LLDP MED attributes including device location 162 emergency call server and network policy discovery PoE3 Configures Power over Ethernet settings for each p
363. ttribute are ignored 89 CHAPTER 4 Configuring the Switch Configuring Security For example if the attribute is map ip dscp 2 3 service policy in pi then the switch ignores the map ip dscp profile When authentication is successful the dynamic QoS information may not be passed from the RADIUS server due to one of the following conditions authentication result remains unchanged The Filter ID attribute cannot be found to carry the user profile The Filter ID attribute is empty m The Filter ID attribute format for dynamic QoS assignment is unrecognizable can not recognize the whole Filter ID attribute Dynamic QoS assignment fails and the authentication result changes from success to failure when the following conditions occur Illegal characters found in a profile value for example a non digital character in an 802 1p profile value Failure to configure the received profiles on the authenticated port When the last user logs off on a port with a dynamic QoS assignment the switch restores the original QoS configuration for the port When a user attempts to log into the network with a returned dynamic QoS profile that is different from users already logged on to the same port the user is denied access m While a port has an assigned dynamic QoS profile any manual QoS configuration changes only take effect after all users have logged off the port RADIUS Assigned VLAN Enabl
364. ty of this measurement is 100 ms A value of 0 ms indicates that there hasn t been round trip communication with the server yet RADIUS Accounting Statistics Receive Packets Responses The number of RADIUS packets valid or invalid received from the server Malformed Responses The number of malformed RADIUS packets received from the server Malformed packets include packets with an invalid length Bad authenticators or unknown types are not included as malformed access responses Bad Authenticators The number of RADIUS packets containing invalid authenticators received from the server 245 CHAPTER 5 Monitoring the Switch Displaying Information on Authentication Servers u Unknown Types The number of RADIUS packets of unknown types that were received from the server on the accounting port Packets Dropped The number of RADIUS packets that were received from the server on the accounting port and dropped for some other reason Transmit Packets Requests The number of RADIUS packets sent to the server This does not include retransmissions Retransmissions The number of RADIUS packets retransmitted to the RADIUS accounting server Pending Requests The number of RADIUS packets destined for the server that have not yet timed out or received a response This variable is incremented when a Request is sent and decremented due to receipt of a Response timeout or retransmission Timeouts The
365. types of authentication and privacy protocols to use Note Any user assigned through this page is associated with the group assigned to the USM Security Model on the SNMPv3 Groups Configuration page page 74 and the views assigned to that group in the SNMPv3 Access Configuration page page 76 PATH Advanced Configuration Security Switch SNMP Users PARAMETERS These parameters are displayed Engine ID The engine identifier for the SNMP agent on the remote device where the user resides Range 10 64 hex digits excluding a string of all O s or all F s To send inform messages to an SNMPv3 user on a remote device you must first specify the engine identifier for the SNMP agent on the remote device where the user resides The remote engine ID is used to compute the security digest for authenticating and encrypting packets sent to a user on the remote host SNMP passwords are localized using the engine ID of the authoritative agent For informs the authoritative SNMP agent is the remote agent You therefore need to configure the remote agent s SNMP engine ID before you can send proxy requests or informs to it See Configuring SNMP System and Trap Settings on page 68 User Name The name of user connecting to the SNMP agent Range 1 32 characters ASCII characters 33 126 only Security Level The security level assigned to the user NodAuth NoPriv There is no authentication or encryption used in SNMP communi
366. u indicates an untagged VLAN and t a tagged VLAN Guest VLAN Enabled A Guest VLAN is a special VLAN typically with limited network access on which 802 1X unaware clients are placed after a network administrator defined timeout The switch follows a set of rules for entering and leaving the Guest VLAN as listed below The Guest VLAN Enabled checkbox provides a quick way to globally enable disable Guest VLAN functionality When checked the individual port settings determine whether the port can be moved into Guest VLAN When unchecked the ability to move to the Guest VLAN is disabled for all ports When Guest VLAN is both globally enabled and enabled for a given port the switch considers moving the port into the Guest VLAN according to the rules outlined below This option is only available for EAPOL based modes i e Port based 802 1X Single 802 1X and Multi 802 1X O41 CHAPTER 4 Configuring the Switch Configuring Security Note For trouble shooting VLAN assignments use the Monitor gt VLANs gt VLAN Membership and VLAN Port pages These pages show which modules have temporarily overridden the current Port VLAN configuration Guest VLAN Operation When a Guest VLAN enabled port s link comes up the switch starts transmitting EAPOL Request Identity frames If the number of transmissions of such frames exceeds Max Reauth Count and no EAPOL frames have been received in the meanwhile the switch consi
367. uch as PCs or laptops This class of 165 CHAPTER 4 Configuring the Switch Link Layer Discovery Protocol endpoints frequently does not support multiple VLANs if at all and are typically configured to use an untagged VLAN ora single tagged data specific VLAN When a network policy is defined for use with an untagged VLAN see Tagged flag below then the L2 priority field is ignored and only the DSCP value has relevance Video Conferencing Streaming Video For use by broadcast or multicast based video content distribution and other similar applications supporting streaming video services that require specific network policy treatment Video applications relying on TCP with buffering would not be an intended use of this application type Video Signaling conditional For use in network topologies that require a separate policy for the video signaling than for the video media This application type should not be advertised if all the same network policies apply as those advertised in the Video Conferencing application policy Tag Tag indicating whether the specified application type is using a tagged or an untagged VLAN Untagged indicates that the device is using an untagged frame format and as such does not include a tag header as defined by IEEE 802 1Q 2003 In this case both the VLAN ID and the Layer 2 priority fields are ignored and only the DSCP value has relevance Tagged indicate
368. ugh LLDP messages Port Statistics Displays statistics for all connected remote devices and 273 statistics for LLDP protocol packets crossing each port PoE Displays the status for all PoE ports including the PD class 275 requested power allocated power power and current used and PoE priority MAC Table Displays dynamic and static address entries associated with 276 the CPU and each port VLANs Virtual LANs 277 VLAN Membership Shows the current port members for all VLANs configured by 277 a selected software module VLAN Port Shows the VLAN attributes of port members for all VLANs 278 configured by a selected software module which uses VLAN management including PVID VLAN aware ingress filtering frame type egress filtering and PVID VCL VLAN Control List MAC based VLAN Displays MAC address to VLAN map entries 279 sFlow Displays information on sampled traffic including the owner 280 receiver address remaining sampling time and statistics for UDP control packets and sampled traffic Diagnostics 283 Ping Tests specified path using IPv4 ping 283 Ping6 Tests specified path using IPv6 ping 283 VeriPHY Performs cable diagnostics for all ports or selected port to 285 diagnose any cable faults short open etc and report the cable length SAS CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface Table 4 Main Menu Continued Menu Description Page Maintenance 287 Restart Device Restarts the
369. umber of packets with a Circuit ID option that did not match a known circuit ID 240 lt DISPLAYING MAC ADDRESS BINDINGS FOR ARP PACKETS CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings Receive Bad Remote ID The number of packets with a Remote ID option that did not match a known remote ID Client Statistics Transmit to Client The number of packets that were relayed from the server to a client Transmit Error The number of packets containing errors that were sent to servers Receive from Client The number of packets received from clients Receive Agent Option The number of packets received where the switch Replace Agent Option The number of packets received where the DHCP client packet information was replaced with the switch s relay information Keep Agent Option The number of packets received where the DHCP client packet information was retained Drop Agent Option The number of packets that were dropped because they already contained relay information WEB INTERFACE To display DHCP relay statistics click Monitor DHCP Relay Statistics Figure 113 DHCP Relay Statistics DHCP Relay Statistics Auto refresh Refresh l Clear Server Statistics Transmit Transmit Receive Receive Missing Receive Missing Receive Missing Receive Bad Receive Bad to Server Error from Server Agent Option Circuit ID Remote ID Circuit ID R
370. uplex 1 000 000 Trunk 500 000 Fast Ethernet Half Duplex 200 000 Full Duplex 100 000 Trunk 50 000 Gigabit Ethernet Full Duplex 10 000 Trunk 5 000 Priority Defines the priority used for this port in the Spanning Tree Algorithm If the path cost for all ports on a switch are the same the port with the highest priority i e lowest value will be configured as an active link in the Spanning Tree This makes a port with higher priority less likely to be blocked if the Spanning Tree Algorithm is detecting network loops Where more than one port is assigned the 136 CHAPTER 4 Configuring the Switch Configuring the Spanning Tree Algorithm highest priority the port with lowest numeric identifier will be enabled Range 0 240 in steps of 16 Default 128 Admin Edge Fast Forwarding You can enable this option if an interface is attached to a LAN segment that is at the end of a bridged LAN or to an end node Since end nodes cannot cause forwarding loops they can pass directly through to the spanning tree forwarding state Specifying edge ports provides quicker convergence for devices such as workstations or servers retains the current forwarding database to reduce the amount of frame flooding required to rebuild address tables during reconfiguration events does not cause the spanning tree to initiate reconfiguration when the interface changes state and also overcomes other STA related timeout problems However remember that this
371. uration Port Enabled CONFIGURING PORT CONNECTIONS Use the Port Configuration page to configure the connection parameters for each port This page includes options for enabling auto negotiation or manually setting the speed and duplex mode enabling flow control setting the maximum frame size specifying the response to excessive collisions or enabling power saving mode PATH Basic Advanced Configuration Ports PARAMETERS These parameters are displayed Link Indicates if the link is up or down Speed Sets the port speed and duplex mode using auto negotiation or manual selection The following options are supported Disabled Disables the interface You can disable an interface due to abnormal behavior e g excessive collisions and then re enable it after the problem has been resolved You may also disable an interface for security reasons Auto Enables auto negotiation When using auto negotiation the optimal settings will be negotiated between the link partners based on their advertised capabilities 1Gbps FDX Supports 1 Gbps full duplex operation 100Mbps FDX Supports 100 Mbps full duplex operation 100Mbps HDX Supports 100 Mbps half duplex operation 10Mbps FDX Supports 10 Mbps full duplex operation 10Mbps HDX Supports 10 Mbps half duplex operation Default Autonegotiation enabled Advertised capabilities for RJ 45 LOOOBASE T i0half 10full LOOhalf 100full 1000full SFP 1000BASE SX L
372. ured m When using 802 1X authentication the RADIUS server and 802 1X client must support EAP The switch only supports EAPOL in order to pass the EAP packets from the server to the client The RADIUS server and client also have to support the same EAP authentication type MD5 PEAP TLS or TTLS Native support for these encryption methods is provided in Windows 7 Windows Vista Windows XP and in Windows 2000 with Service Pack 4 To support these encryption methods in Windows 95 and 98 you can use the AEGIS dot1x client or other comparable client software MAC based authentication allows for authentication of more than one user on the same port and does not require the user to have special 802 1X software installed on his system The switch uses the client s MAC address to authenticate against the backend server However note that intruders can create counterfeit MAC addresses which makes MAC based authentication less secure than 802 1X authentication PATH Advanced Configuration Security Network NAS USAGE GUIDELINES When 802 1X is enabled you need to configure the parameters for the authentication process that runs between the client and the switch i e authenticator as well as the client identity lookup process that runs between the switch and authentication server These parameters are described in this section PARAMETERS These parameters are displayed System Configuration Mode Indicates if 802 1X and
373. urst traffic This attribute will take effect only if MLD snooping proxy reporting is enabled see page 152 URI The Unsolicited Report Interval specifies how often the upstream interface should transmit unsolicited MLD reports when report suppression proxy reporting is enabled Range 0 31744 seconds Default 1 second WEB INTERFACE To configure VLAN settings for MLD snooping and query 1 Click Configuration IPMC MLD Snooping VLAN Configuration 2 Adjust the MLD settings as required 3 Click Save Figure 60 Configuring VLAN Settings for MLD Snooping and Query MLD Snooping VLAN Configuration Start from VLAN 1 with 20 entries per page Delete VLAN ID Snooping Enabled MLD Querier Compatibility RV QI sec QRI 0 1 sec LLQI 0 1 sec URI sec MLD Auto bd 2 125 100 157 CHAPTER 4 Configuring the Switch Link Layer Discovery Protocol CONFIGURING MLD Use the MLD Snooping Port Group Filtering Configuration page to filter FILTERING Specific multicast traffic In certain switch applications the administrator may want to control the multicast services that are available to end users for example an IP TV service based on a specific subscription plan The MLD filtering feature fulfills this requirement by denying access to specified multicast services on a switch port PATH Advanced Configuration IPMC MLD Snooping Port Group Filtering PARAMETERS These parameters are displayed Por
374. use each instance is treated as an RSTP node in the Common Spanning Tree CST Use the STP Bridge Settings page to configure settings for STA which apply globally to the switch PATH Basic Advanced Configuration Spanning Tree Bridge Settings COMMAND USAGE Spanning Tree Protocol Uses RSTP for the internal state machine but sends only 802 1D BPDUs This creates one spanning tree instance for the entire network If multiple VLANs are implemented on a network the path between specific VLAN members may be inadvertently disabled to prevent network loops thus isolating group members When operating multiple VLANs we recommend selecting the MSTP option Rapid Spanning Tree Protocol RSTP supports connections to either STP or RSTP nodes by monitoring the incoming protocol messages and dynamically adjusting the type of protocol messages the RSTP node transmits as described below STP Mode If the switch receives an 802 1D BPDU i e STP BPDU after a port s migration delay timer expires the switch assumes it is connected to an 802 1D bridge and starts using only 802 1D BPDUs RSTP Mode If RSTP is using 802 1D BPDUs on a port and receives an RSTP BPDU after the migration delay expires RSTP restarts the migration delay timer and begins using RSTP BPDUs on that port Multiple Spanning Tree Protocol MSTP generates a unique spanning tree for each instance This provides multiple pathways across the network thereby ba
375. ut will immediately start the last member query timer for that port Leave proxy is also included in the general proxy function described below Therefore if Leave Proxy Enabled is not selected but Proxy Enabled is selected leave proxy will still be performed Proxy Enabled Enables IGMP Snooping with Proxy Reporting Default Disabled When proxy reporting is enabled with this command the switch performs IGMP Snooping with Proxy Reporting as defined in DSL Forum TR 101 April 2006 including report suppression last leave and query suppression Report suppression intercepts absorbs and summarizes IGMP reports coming from downstream hosts Last leave sends out a proxy query when the last member leaves a multicast group and query suppression means that neither specific queries nor general queries are forwarded from an upstream multicast router to hosts downstream from this device When proxy reporting is disabled all IGMP reports received by the switch are forwarded natively to the upstream multicast routers Port Related Configuration Port Port identifier Router Port Sets a port to function as a router port which leads towards a Layer 3 multicast device or IGMP querier Default Disabled 147 CHAPTER 4 Configuring the Switch IGMP Snooping If IGMP snooping cannot locate the IGMP querier you can manually designate a port which is connected to a known IGMP querier i e a multicast router swit
376. ve but does not normally print such an announcement your work based on the Program is not required to print an announcement These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Program and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based on the Program with the Program or with a work based on the Program on a volume of a storage or distribution medium does not bring the other work under the scope of this License You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following a Accompany it with the complete corresponding m
377. ved by the switch Responses The number of valid EAPOL response frames other than Response Identity frames that have been received by the switch Start The number of EAPOL Start frames that have been received by the switch Logoff The number of valid EAPOL Logoff frames that have been received by the switch Invalid Type The number of EAPOL frames that have been received by the switch in which the frame type is not recognized Invalid Length The number of EAPOL frames that have been received by the switch in which the Packet Body Length field is invalid Transmit EAPOL Counters Total The number of EAPOL frames of any type that have been transmitted by the switch 234 CHAPTER 5 Monitoring the Switch Displaying Information About Security Settings Request ID The number of EAPOL Request Identity frames that have been transmitted by the switch Requests The number of valid EAPOL Request frames other than Request Identity frames that have been transmitted by the switch Receive Backend Server Counters For MAC based ports there are two tables containing backend server counters The left most shows a summary of all backend server counters on this port The right most shows backend server counters for the currently selected client or dashes if no client is selected or available A client can be selected from the list of authorized unauthorized clients below the two counter tables Access Chall
378. ving security and data isolation for normal traffic The switch s system defaults are stored in a non volitile memory To reset the switch defaults see Restoring Factory Defaults on page 288 The following table lists some of the basic system defaults Table 2 System Defaults Function Parameter Default Authentication User Name admin Password admin RADIUS Authentication Disabled TACACS Authentication Disabled 802 1X Port Authentication Disabled HTTPS Enabled SSH Enabled Port Security Disabled IP Filtering Disabled Web Management HTTP Server Enabled HTTP Port Number 80 HTTP Secure Server Disabled HTTP Secure Server Redirect Disabled 28 Table 2 System Defaults Continued Function Parameter CHAPTER 1 Introduction System Defaults Default SNMP Port Configuration Rate Limiting Port Trunking Storm Protection Spanning Tree Algorithm Address Table Virtual LANs Traffic Prioritization LLDP SNMP Agent Community Strings Traps SNMP V3 Admin Status Auto negotiation Flow Control Input and output limits Static Trunks LACP all ports Status Status Edge Ports Aging Time Default VLAN PVID Acceptable Frame Type Ingress Filtering Switchport Mode Egress Mode Ingress Port Priority Queue Mode Weighted Round Robin Ethernet Type VLAN ID VLAN Priority Tag ToS Priority IP DSCP Priority TCP UDP Port Priority Status 2 99h Disabl
379. vity Usage accounting gt Trending and capacity planning PATH Advanced Configuration UPnP PARAMETERS These parameters are displayed Receiver Configuration Owner sFlow can be configured in two ways Through local management using the Web interface or through SNMP This read only field shows the owner of the current sFlow configuration and assumes values as follows If sFlow is currently unconfigured unclaimed Owner shows lt none gt If sFlow is currently configured through the Web Owner shows lt Configured through local management gt If sFlow is currently configured through SNMP Owner contains a string identifying the sFlow receiver If sFlow is configured through SNMP all controls except for the Release button are disabled to avoid inadvertent reconfiguration The Release button can be used to release the current owner and disable sFlow sampling This button is disabled if sFlow is currently unconfigure If configured through SNMP the release must be confirmed a confirmation request will appear IP Address Hostname The IP address or host name of the sFlow receiver Both IPv4 and IPv6 addresses are supported 215 CHAPTER 4 Configuring the Switch Configuring sFlow UDP Port The UDP port on which the sFlow receiver is listening for sFlow datagrams If set to O zero the default port 6343 is used Range 0 65534 Default 6343 Timeout The number of sec
380. will be the device with the lowest IP address in the subnetwork Proxies multicast group membership information onto the upstream interface based on IGMP messages monitored on downstream interfaces and forwards multicast traffic based on that information There is no need for multicast routing protocols in an simple tree that uses IGMP Proxy Listening to IGMP Query and IGMP Report packets transferred between IP Multicast Routers and IP Multicast host groups to identify IP Multicast group members Management of the network from a station attached directly to the network A process whereby this switch can pass multicast traffic along to participating hosts The Type of Service ToS octet in the IPv4 header includes three precedence bits defining eight different priority levels ranging from highest priority for network control packets to lowest priority for routine traffic The eight values are mapped one to one to the Class of Service categories by default but may be configured differently to suit the requirements for specific network applications Link Aggregation Control Protocol Allows ports to automatically negotiate a trunked link with LACP configured ports on another device Data Link layer in the ISO 7 Layer Data Communications Protocol This is related directly to the hardware interface for network devices and passes on traffic based on MAC addresses See Port Trunk Link Layer Discovery Protocol is used to discover basic
381. witches or routers along the path Priority can then be assigned based on a general policy or a detailed examination of the packet However note that detailed examination of packets should take place close to the network edge so that core switches and routers are not overloaded Switches and routers along the path can use class information to prioritize the resources allocated to different traffic classes The manner in which an individual device handles traffic is called per hop behavior All devices along a path should be configured in a consistent manner to construct a consistent end to end Quality of Service QoS solution This section describes how to specify which data packets have greater precedence when traffic is buffered in the switch due to congestion This switch provides four priority queues for each port Data packets in a port s high priority queue will be transmitted before those in the lower priority queues You can set the default priority for each interface the queuing mode and queue weights The switch also allows you to configure QoS classification criteria and service policies The switch s resources can be prioritized to meet the requirements of specific traffic types on a per hop basis Each packet is classified upon entry into the network based on Ethernet type VLAN ID TCP UDP port DSCP ToS or its VLAN priority tag Based on configured network policies different kinds of traffic can be marked for different kinds
382. with the same VLAN ID and MAC address a new entry is added to the static IP source guard binding table If there is an entry with the same VLAN ID and MAC address and the type of entry is static IP source guard binding then the new entry will replace the old one If there is an entry with the same VLAN ID and MAC address and the type of the entry is dynamic DHCP snooping binding then the new entry will replace the old one and the entry type will be changed to static IP source guard binding Only unicast addresses are accepted for static bindings PARAMETERS These parameters are displayed Port The port to which a static entry is bound VLAN ID ID of a configured VLAN Range 1 4095 13 CHAPTER 4 Configuring the Switch Configuring Security CONFIGURING ARP INSPECTION IP Address A valid unicast IP address including classful types A B or C IP Mask This mask specifies the address bits used to identify the subnet and host Default 255 255 255 0 WEB INTERFACE To configure static bindings for IP Source Guard 1 Click Advanced Configuration Security Network IP Source Guard Static Table 2 Click Add new entry 3 Enter the required bindings for a given port 4 Click Save Figure 38 Configuring Static Bindings for IP Source Guard Static IP Source Guard Table EEA VLAN ID IP Address MAC address Delete 8 oY 192 168 1 223 00 11 22 33 44 55 1 v ARP Insp
383. x interface is assumed to be on a shared link Forced True A point to point connection to exactly one other bridge Forced False A shared connection to two or more bridges WEB INTERFACE To configure settings for STP RSTP CIST interfaces 1 Click Configuration Spanning Tree CIST Ports 2 Modify the required attributes 3 Click Save Figure 51 STP RSTP CIST Port Configuration STP CIST Port Configuration fe CIST Aggregated Port Configuration STP asane Point to Enabled Path Cost Admin Edge Auto Edge BPDU Guard point Role TCN Non Edge x F Forced True x Restricted r Point to Admin Edge Auto Edge BPDU Guard gt point Role TCN gt Non Edge gt Non Edge Non Edge Non Edge Non Edge CONFIGURING MIST Use the MIST Ports Configuration page to configure STA attributes for INTERFACES interfaces in a specific MSTI including path cost and port priority You may use a different priority or path cost for ports of the same media type to indicate the preferred path References to ports in this section means interfaces which includes both ports and trunks PATH Basic Advanced Configuration Spanning Tree MSTI Ports 138 CHAPTER 4 Configuring the Switch Configuring the Spanning Tree Algorithm PARAMETERS These parameters are displayed Port Port identifier This field is not applicable to static trunks or dynamic trunks
384. y Features Feature Description Configuration Backup and Restore Authentication General Security Measures Access Control Lists DHCP DNS Port Configuration Rate Limiting Port Mirroring Port Trunking Congestion Control Address Table IP Version 4 and 6 IEEE 802 1D Bridge Store and Forward Switching Backup to management station using Web Telnet Web user name password RADIUS TACACS Web HTTPS Telnet SSH SNMP vi 2c Community strings SNMP version 3 MD5 or SHA password Port IEEE 802 1X MAC address filtering Private VLANs Port Authentication Port Security DHCP Snooping with Option 82 relay information IP Source Guard Supports up to 512 rules Client Client and Proxy service Speed duplex mode flow control MTU response to excessive collisions power saving mode Input rate limiting per port manual setting or ACL 1 session multiple source ports to one analysis port local mirror or one source port to multiple destination ports remote mirror Supports up to 25 trunks static or dynamic trunking LACP Throttling for broadcast multicast unknown unicast storms 8K MAC addresses in the forwarding table 1000 static MAC addresses 1K L2 IGMP multicast groups and 128 MVR groups Supports IPv4 and IPv6 addressing management and QoS Supports dynamic data switching and addresses learning Supported to ensure wire speed switching while eliminating bad frames 299 2
385. you know you can do these things To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations Finally any free program is threatened constantly by software patents We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all
386. z z z 0 1 2 3 4 5 6 7 4 Use the QoS Control List Configuration page to configure Quality of Service policies for handling ingress packets based on Ethernet type VLAN ID TCP UDP port DSCP ToS or VLAN priority tag Once a QCE is mapped to a port traffic matching the first entry in the QoS Control List is assigned to the QoS class drop precedence level and DSCP value defined by that entry Traffic not matching any of the QCEs are classified to the default QoS Class for the port PATH Advanced Configuration QoS QoS Control List OO CHAPTER 4 Configuring the Switch Quality of Service PARAMETERS These parameters are displayed QoS Control List QCE Quality Control Entry index Port Port identifier Frame Type Indicates the type of frame to look for in incoming frames Possible frame types are Any Ethernet LLC SNAP IPv4 IPv6 SMAC The OUI field of the source MAC address i e the first three octets bytes of the MAC address DMAC The type of destination MAC address Possible values are Any Broadcast Multicast Unicast VID VLAN identifier Range 1 4095 PCP Priority Code Point User Priority Specific value 0 1 2 3 4 5 6 7 Range 0 1 2 3 4 5 6 7 0 3 4 7 or Any DEI Drop Eligible Indicator Options 0 1 or Any Action Indicates the classification action taken on ingress frame if the configured parameters are matched in the frame s cont
387. zes the changes in each revision of this guide APRIL 2012 REVISION This is the first version of this guide This guide is valid for software release v1 0 0 4 ABOUT THIS GUIDE SECTION SECTION II CONTENTS ABOUT THIS GUIDE CONTENTS FIGURES TABLES GETTING STARTED INTRODUCTION Key Features Description of Software Features System Defaults INITIAL SWITCH CONFIGURATION WEB CONFIGURATION USING THE WEB INTERFACE Navigating the Web Browser Interface Home Page Configuration Options Panel Display Main Menu CONFIGURING THE SWITCH Configuring System Information Setting an IP Address Setting an IPv4 Address Setting an IPv6 Address Configuring NTP Service Configuring the Time Zone and Daylight Savings Time Configuring Remote Log Messages 13 19 21 23 23 24 28 31 33 35 35 35 36 36 36 45 45 46 46 48 50 51 53 CONTENTS Configuring Power Reduction 54 Reducing Power to Idle Queue Circuits 54 Configuring Port Connections 55 Configuring Security 57 Configuring User Accounts 58 Configuring User Privilege Levels 60 Configuring The Authentication Method For Management Access 61 Configuring SSH 64 Configuring HTTPS 65 Filtering IP Addresses for Management Access 66 Using Simple Network Management Protocol 67 Remote Monitoring 77 Configuring Port Limit Controls 83 Configuring Authentication Through Network Access Servers 85 Filtering Traffic with Access Control Lists 96 Configuri
Download Pdf Manuals
Related Search
Related Contents
LEDP88031R dupli disc dvd 125 Manual user`s manual introduction fire safety tips before Sonim XP3.20 instrucciones AX20u Insignia NS-PDP50HD-09 Flat Panel Television User Manual Untitled - Audioline Kenwood TM-281E User's Manual Copyright © All rights reserved.
Failed to retrieve file