Accton-technology ES4512C User Manual

Browse online or download User Manual for Computer Accessories Accton-technology ES4512C. Accton Technology ES4512C User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 426
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - Powered by Accton

www.edge-core.comManagement GuidePowered by AcctonES4512CES4524CES4548C12/24/48-Port GigabitIntelligent Switch

Page 2

Contentsvilogging facility 4-45logging trap 4-46clear logging 4-46show logging 4-47SMTP Alert Commands 4-48logging sendmail host 4-49logging sen

Page 3 - Installation Guide

Configuring the Switch3-623Configuring a MAC ACL MaskThis mask defines the fields to check in the packet header. Command UsageYou must configure a mas

Page 4 - E052005-R02

Access Control Lists3-633CLI – This example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of the rules

Page 5

Configuring the Switch3-643Web – Click Security, ACL, Port Binding. Mark the Enable field for the port you want to bind to an ACL for ingress or egres

Page 6

Port Configuration3-653• Forced Mode1 – Shows the forced/preferred port type to use for combination ports 21-24 or 45-48. (Copper-Forced, Copper-Prefe

Page 7

Configuring the Switch3-663• Broadcast storm – Shows if broadcast storm control is enabled or disabled.• Broadcast storm limit – Shows the broadcast s

Page 8

Port Configuration3-673Configuring Interface ConnectionsYou can use the Port Configuration or Trunk Configuration page to enable/disable an interface,

Page 9

Configuring the Switch3-683• Trunk – Indicates if a port is a member of a trunk. To create trunks and select port members, see “Creating Trunk Groups”

Page 10

Port Configuration3-693Creating Trunk GroupsYou can create multiple links between devices that work as one virtual, aggregate link. A port trunk offer

Page 11

Configuring the Switch3-703Statically Configuring a TrunkCommand Usage• When configuring static trunks, you may not be able to link switches of differ

Page 12

Port Configuration3-713CLI – This example creates trunk 2 with ports 1 and 2. Just connect these ports to two static trunk ports on another switch to

Page 13

Contentsviitacacs-server host 4-74tacacs-server port 4-74tacacs-server key 4-75show tacacs-server 4-75Port Security Commands 4-76port security 4

Page 14

Configuring the Switch3-723Web – Click Port, LACP, Configuration. Select any of the switch ports from the scroll-down port list and click Add. After y

Page 15

Port Configuration3-733Configuring LACP ParametersDynamically Creating a Port Channel –Ports assigned to a common port channel must meet the following

Page 16 - Contents

Configuring the Switch3-743Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can

Page 17

Port Configuration3-753CLI – The following example configures LACP parameters for ports 1-6. Ports 1-4 are used as active members of the LAG; ports 5

Page 18

Configuring the Switch3-763Displaying LACP Port CountersYou can display statistics for LACP protocol messages. Web – Click Port, LACP, Port Counters I

Page 19

Port Configuration3-773Displaying LACP Settings and Status for the Local SideYou can display configuration settings and the operational state for the

Page 20

Configuring the Switch3-783Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 3-

Page 21 - Figure 3-90. DNS Cache 3-150

Port Configuration3-793Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state for the

Page 22

Configuring the Switch3-803CLI – The following example displays the LACP configuration settings and operational state for the remote side of port chan

Page 23 - Chapter 1: Introduction

Port Configuration3-813Web – Click Port, Port/Trunk Broadcast Control. Check the Enabled box for any interface, set the threshold and click Apply.Figu

Page 24 - Introduction

ContentsviiiACL Information 4-111show access-list 4-111show access-group 4-111SNMP Commands 4-112snmp-server community 4-112snmp-server contact

Page 25

Configuring the Switch3-823Configuring Port MirroringYou can mirror traffic from any source port to a target port for real-time analysis. You can then

Page 26

Port Configuration3-833Configuring Rate LimitsThis function allows the network manager to control the maximum rate for traffic transmitted or received

Page 27 - System Defaults

Configuring the Switch3-843Showing Port StatisticsYou can display standard statistics on network traffic from the Interfaces Group and Ethernet-like M

Page 28

Port Configuration3-853Transmit Discarded Packets The number of outbound packets which were chosen to be discarded even though no errors had been dete

Page 29

Configuring the Switch3-863Received Frames The total number of frames (bad, broadcast and multicast) received.Broadcast Frames The total number of goo

Page 30

Port Configuration3-873Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at the b

Page 31 - Connecting to the Switch

Configuring the Switch3-883CLI – This example shows statistics for port 13.Address Table SettingsSwitches store the addresses for all known devices. T

Page 32 - Required Connections

Address Table Settings3-893Web – Click Address Table, Static Addresses. Specify the interface, the MAC address and VLAN, then click Add Static Address

Page 33 - Basic Configuration

Configuring the Switch3-903Web – Click Address Table, Dynamic Addresses. Specify the search type (i.e., mark the Interface, MAC Address, or VLAN check

Page 34 - Setting an IP Address

Spanning Tree Algorithm Configuration3-913Changing the Aging TimeYou can set the aging time for entries in the dynamic address table. Command Attribut

Page 35 - Dynamic Configuration

Contentsixlacp admin-key (Port Channel) 4-142lacp port-priority 4-142show lacp 4-143Address Table Commands 4-147mac-address-table static 4-148cle

Page 36 - Initial Configuration

Configuring the Switch3-923Once a stable network topology has been established, all bridges listen for Hello BPDUs (Bridge Protocol Data Units) transm

Page 37 - Saving Configuration Settings

Spanning Tree Algorithm Configuration3-933• Hello Time – Interval (in seconds) at which the root device transmits a configuration message. • Forward D

Page 38 - Managing System Files

Configuring the Switch3-943information that would make it return to a discarding state; otherwise, temporary data loops might result.• Root Hold Time

Page 39 - Using the Web Interface

Spanning Tree Algorithm Configuration3-953CLI – This command displays global STA settings, followed by settings for each port. Note:The current root p

Page 40 - Home Page

Configuring the Switch3-963• Multiple Spanning Tree Protocol- To allow multiple spanning trees to operate over the network, you must configure a relat

Page 41 - Panel Display

Spanning Tree Algorithm Configuration3-973• Forward Delay – The maximum time (in seconds) this device will wait before changing states (i.e., discardi

Page 42 - Main Menu

Configuring the Switch3-983Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply.Figure 3-55. STA Configurat

Page 43 - Table 3-2. Switch Main Menu

Spanning Tree Algorithm Configuration3-993CLI – This example enables Spanning Tree Protocol, sets the mode to MST, and then configures the STA and MST

Page 44

Configuring the Switch3-1003• Oper Link Type – The operational point-to-point status of the LAN segment attached to this interface. This parameter is

Page 45

Spanning Tree Algorithm Configuration3-1013• Priority – Defines the priority used for this port in the Spanning Tree Algorithm. If the path cost for a

Page 46

Contentsxswitchport allowed vlan 4-177switchport forbidden vlan 4-178Displaying VLAN Information 4-179show vlan 4-179Configuring Private VLANs 4-

Page 47

Configuring the Switch3-1023CLI – This example shows the STA attributes for port 5. Configuring Interface SettingsYou can configure RSTP and MSTP attr

Page 48

Spanning Tree Algorithm Configuration3-1033Protocol is detecting network loops. Where more than one port is assigned the highest priority, the port wi

Page 49

Configuring the Switch3-1043Web – Click Spanning Tree, STA, Port Configuration or Trunk Configuration. Modify the required attributes, then click Appl

Page 50

Spanning Tree Algorithm Configuration3-1053To ensure that the MSTI maintains connectivity across the network, you must configure a related set of brid

Page 51

Configuring the Switch3-1063CLI – This displays STA settings for instance 1, followed by settings for each port. CLI – This example sets the priority

Page 52 - Manual Configuration

Spanning Tree Algorithm Configuration3-1073Displaying Interface Settings for MSTPThe MSTP Port Information and MSTP Trunk Information pages display th

Page 53 - Using DHCP/BOOTP

Configuring the Switch3-1083Configuring Interface Settings for MSTPYou can configure the STA interface settings for an MST Instance using the MSTP Por

Page 54 - Managing Firmware

Spanning Tree Algorithm Configuration3-1093• MST Path Cost – This parameter is used by the MSTP to determine the best path between devices. Therefore,

Page 55

Configuring the Switch3-1103VLAN ConfigurationIEEE 802.1Q VLANsIn large networks, routers are used to isolate broadcast traffic for each subnet into s

Page 56

VLAN Configuration3-1113Note: VLAN-tagged frames can pass through VLAN-aware or VLAN-unaware network interconnection devices, but the VLAN tags should

Page 57 - Configuring Event Logging

ContentsxiIGMP Query Commands (Layer 2) 4-206ip igmp snooping querier 4-206ip igmp snooping query-count 4-206ip igmp snooping query-interval 4-20

Page 58 - Remote Log Configuration

Configuring the Switch3-1123these hosts, and core switches in the network, enable GVRP on the links between these devices. You should also determine s

Page 59

VLAN Configuration3-1133Enabling or Disabling GVRP (Global Setting) GARP VLAN Registration Protocol (GVRP) defines a way for switches to exchange VLAN

Page 60 - Displaying Log Messages

Configuring the Switch3-1143CLI – Enter the following command.Displaying Current VLANsThe VLAN Current Table shows the current port members of each VL

Page 61

VLAN Configuration3-1153Command Attributes (CLI)• VLAN – ID of configured VLAN (1-4094, no leading zeroes).• Type – Shows how this VLAN was added to t

Page 62

Configuring the Switch3-1163Web – Click VLAN, 802.1Q VLAN, Static List. To create a new VLAN, enter the VLAN ID and VLAN name, mark the Enable checkbo

Page 63 - Resetting the System

VLAN Configuration3-1173Command Attributes• VLAN – ID of configured VLAN (1-4094, no leading zeroes).• Name – Name of the VLAN (1 to 32 characters).•

Page 64 - Setting the System Clock

Configuring the Switch3-1183CLI – The following example adds tagged and untagged ports to VLAN 2.Adding Static Members to VLANs (Port Index)Use the VL

Page 65 - Setting the Time Zone

VLAN Configuration3-1193Configuring VLAN Behavior for InterfacesYou can configure VLAN behavior for specific interfaces, including the default VLAN id

Page 66

Configuring the Switch3-1203or LeaveAll message has been issued, the applicants can rejoin before the port actually leaves the group. (Range: 60-3000

Page 67

VLAN Configuration3-1213CLI – This example sets port 3 to accept only tagged frames, assigns PVID 3 as the native VLAN ID, enables GVRP, sets the GARP

Page 69

Configuring the Switch3-1223Configuring Uplink and Downlink PortsUse the Private VLAN Link Status page to set ports as downlink or uplink ports. Ports

Page 70

VLAN Configuration3-1233Configuring Protocol GroupsCreate a protocol group for one or more protocols.Command Attributes• Protocol Group ID – Group ide

Page 71

Configuring the Switch3-1243- If the frame is untagged and the protocol type matches, the frame is forwarded to the appropriate VLAN.- If the frame is

Page 72 - Configuring HTTPS

Class of Service Configuration3-1253Class of Service ConfigurationClass of Service (CoS) allows you to specify which data packets have greater precede

Page 73

Configuring the Switch3-1263Web – Click Priority, Default Port Priority or Default Trunk Priority. Modify the default priority for any interface, then

Page 74 - Configuring the Secure Shell

Class of Service Configuration3-1273Mapping CoS Values to Egress QueuesThis switch processes Class of Service (CoS) priority tagged traffic by using e

Page 75

Configuring the Switch3-1283Web – Click Priority, Traffic Classes. Mark an interface and click Select to display the current mapping of CoS values to

Page 76 - Generating the Host Key Pair

Class of Service Configuration3-1293Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traf

Page 77

Configuring the Switch3-1303Web – Click Priority, Queue Scheduling. Select the interface, highlight a traffic class (i.e., output queue), enter a weig

Page 78 - Configuring the SSH Server

Class of Service Configuration3-1313Layer 3/4 Priority SettingsMapping Layer 3/4 Priorities to CoS ValuesThis switch supports several common methods o

Page 79 - Configuring Port Security

xiiiTablesTable 1-1. Key Features 1-1Table 1-2. System Defaults 1-5Table 3-1. Web Page Configuration Buttons 3-3Table 3-2. Switch Main Menu 3-4Tab

Page 80

Configuring the Switch3-1323Mapping IP PrecedenceThe Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight diff

Page 81

Class of Service Configuration3-1333CLI – The following example globally enables IP Precedence service on the switch, maps IP Precedence value 1 to Co

Page 82

Configuring the Switch3-1343Web – Click Priority, IP DSCP Priority. Select an entry from the DSCP table, enter a value in the Class of Service Value f

Page 83

Class of Service Configuration3-1353Mapping IP Port PriorityYou can also map network applications to Class of Service values based on the IP port numb

Page 84

Configuring the Switch3-1363CLI – The following example globally enables IP Port Priority service on the switch, maps HTTP traffic on port 5 to CoS va

Page 85

Class of Service Configuration3-1373Web – Click Priority, ACL CoS Priority. Enable mapping for any port, select an ACL from the scroll-down list, then

Page 86 - Displaying 802.1x Statistics

Configuring the Switch3-1383Command Attributes• Port – Port identifier.•Name* – Name of ACL. • Type – Type of ACL (IP or MAC). • Precedence – IP Prece

Page 87

Multicast Filtering3-1393Multicast Filtering Multicasting is used to support real-time applications such as videoconferencing or streaming audio. A mu

Page 88

Configuring the Switch3-1403Configuring IGMP Snooping and Query ParametersYou can configure the switch to forward multicast traffic intelligently. Bas

Page 89

Multicast Filtering3-1413Web – Click IGMP Snooping, IGMP Configuration. Adjust the IGMP settings as required, and then click Apply. (The default setti

Page 90

xivTablesTable 4-27. Authentication Sequence Commands 4-69Table 4-28. RADIUS Client Commands 4-71Table 4-29. TACACS+ Client Commands 4-74Table 4-30

Page 91 - Configuring a Standard IP ACL

Configuring the Switch3-1423Displaying Interfaces Attached to a Multicast RouterMulticast routers that are attached to ports on the switch use informa

Page 92

Multicast Filtering3-1433Specifying Static Interfaces for a Multicast RouterDepending on your network connections, IGMP snooping may not always be abl

Page 93

Configuring the Switch3-1443Displaying Port Members of Multicast Services You can display the port members associated with a specified VLAN and multic

Page 94

Multicast Filtering3-1453Assigning Ports to Multicast Services Multicast filtering can be dynamically configured using IGMP Snooping and IGMP Query me

Page 95 - Configuring a MAC ACL

Configuring the Switch3-1463Configuring Domain Name ServiceThe Domain Naming System (DNS) service on this switch allows host names to be mapped to IP

Page 96

Configuring Domain Name Service3-1473Web – Select DNS, General Configuration. Set the default domain name or list of domain names, specify one or more

Page 97 - Configuring ACL Masks

Configuring the Switch3-1483Configuring Static DNS Host to Address EntriesYou can manually configure static entries in the DNS table that are used to

Page 98 - Configuring an IP ACL Mask

Configuring Domain Name Service3-1493Web – Select DNS, Static Host Table. Enter a host name and one or more corresponding addresses, then click Apply.

Page 99

Configuring the Switch3-1503Displaying the DNS CacheYou can display entries in the DNS cache that have been learned via the designated name servers.Fi

Page 100 - Configuring a MAC ACL Mask

Configuring Domain Name Service3-1513CLI - This example displays all the resource records learned from the designated name servers.Console#show dns ca

Page 101 - Access Control Lists

xvFiguresFigure 3-1. Home Page 3-2Figure 3-2. Front Panel Indicators 3-3Figure 3-3. System Information 3-9Figure 3-4. Switch Information 3-11Figur

Page 102 - Port Configuration

Configuring the Switch3-1523

Page 103

4-1Chapter 4: Command Line InterfaceThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceAccessing the C

Page 104

Command Line Interface4-24To access the switch through a Telnet session, you must first set the IP address for the switch, and set the default gateway

Page 105

Entering Commands4-34Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keywords and

Page 106

Command Line Interface4-44Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for the curren

Page 107 - Creating Trunk Groups

Entering Commands4-54Partial Keyword LookupIf you terminate a partial keyword with a question mark, alternatives that match the initial letters are pr

Page 108

Command Line Interface4-64Understanding Command ModesThe command set is divided into Exec and Configuration classes. Exec commands generally display i

Page 109

Entering Commands4-74Configuration CommandsConfiguration commands are privileged level commands used to modify switch settings. These commands modify

Page 110

Command Line Interface4-84To enter the other modes, at the configuration prompt type one of the following commands. Use the exit or end command to ret

Page 111 - Configuring LACP Parameters

Entering Commands4-94Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough

Page 113

FiguresxviFigure 3-43. LACP - Aggregation Port 3-74Figure 3-44. LACP - Port Counters Information 3-76Figure 3-45. LACP - Port Internal Information

Page 114 - Displaying LACP Port Counters

Command Line Interface4-104Command GroupsThe system commands can be broken down into the functional groups shown below.Table 4-4. Command Group Index

Page 115

Line Commands4-114The access mode shown in the following tables is indicated by these abbreviations: NE (Normal Exec) IC (Interface Configuration) P

Page 116

Command Line Interface4-124lineThis command identifies a specific line for configuration, and to process subsequent line configuration commands.Syntax

Page 117

Line Commands4-134Command Usage • There are three authentication modes provided by the switch itself at login:- login selects authentication by a sing

Page 118

Command Line Interface4-144number of times a user can enter an incorrect password before the system terminates the line connection and returns the ter

Page 119

Line Commands4-154password-threshThis command sets the password intrusion threshold which limits the number of failed logon attempts. Use the no form

Page 120 - Configuring Port Mirroring

Command Line Interface4-164Example To set the silent time to 60 seconds, enter this command:Related Commands password-thresh (4-15)databitsThis comman

Page 121 - Configuring Rate Limits

Line Commands4-174parityThis command defines the generation of a parity bit. Use the no form to restore the default setting.Syntax parity {none | even

Page 122 - Showing Port Statistics

Command Line Interface4-184Command Usage Set the speed to match the baud rate of the device connected to the serial port. Some baud rates available on

Page 123

Line Commands4-194Command Usage Specifying session identifier “0” will disconnect the console connection. Specifying any other identifiers for an acti

Page 124

FiguresxviiFigure 3-88. DNS General Configuration 3-147Figure 3-89. DNS Static Host Table 3-149Figure 3-90. DNS Cache 3-150

Page 125

Command Line Interface4-204General CommandsenableThis command activates Privileged Exec mode. In privileged mode, additional commands are available, a

Page 126 - Address Table Settings

General Commands4-214Example Related Commands disable (4-21)enable password (4-27)disableThis command returns to Normal Exec mode from privileged mode

Page 127 - Displaying the Address Table

Command Line Interface4-224Related Commands end (4-23)show historyThis command shows the contents of the command history buffer.Default Setting NoneCo

Page 128

General Commands4-234Command Mode Privileged ExecCommand Usage This command resets the entire system.Example This example shows how to reset the switc

Page 129 - Changing the Aging Time

Command Line Interface4-244quitThis command exits the configuration program.Default Setting NoneCommand Mode Normal Exec, Privileged ExecCommand Usage

Page 130 - Displaying Global Settings

System Management Commands4-254Device Designation CommandspromptThis command customizes the CLI prompt. Use the no form to restore the default prompt.

Page 131

Command Line Interface4-264Example User Access CommandsThe basic commands required for management access are listed in this section. This switch also

Page 132

System Management Commands4-274Command Mode Global ConfigurationCommand Usage The encrypted password is required for compatibility with legacy passwor

Page 133 - Configuring Global Settings

Command Line Interface4-284Example Related Commandsenable (4-20)IP Filter CommandsmanagementThis command specifies the client IP addresses that are al

Page 134

System Management Commands4-294• When entering addresses for the same group (i.e., SNMP, Web or Telnet), the switch will not accept overlapping addres

Page 135

Figuresxviii

Page 136

Command Line Interface4-304Web Server Commandsip http portThis command specifies the TCP port number used by the Web browser interface. Use the no for

Page 137 - Displaying Interface Settings

System Management Commands4-314Example Related Commandsip http port (4-30)ip http secure-serverThis command enables the secure hypertext transfer prot

Page 138

Command Line Interface4-324Example Related Commandsip http secure-port (4-32)copy tftp https-certificate (4-63)ip http secure-portThis command specifi

Page 139

System Management Commands4-334Telnet Server Commandsip telnet portThis command specifies the TCP port number used by the Telnet interface. Use the no

Page 140

Command Line Interface4-344Related Commandsip telnet port (4-33)Secure Shell CommandsThe Berkley-standard includes remote access tools originally desi

Page 141

System Management Commands4-354The SSH server on this switch supports both password and public key authentication. If password authentication is speci

Page 142

Command Line Interface4-364corresponding to the public keys stored on the switch can gain access. The following exchanges take place during this proce

Page 143 - Settings,” page 3-99

System Management Commands4-374ip ssh timeoutUse this command to configure the timeout for the SSH server. Use the no form to restore the default sett

Page 144

Command Line Interface4-384Example Related Commandsshow ip ssh (4-40)ip ssh server-key sizeUse this command to set the SSH server key size. Use the no

Page 145

System Management Commands4-394Example ip ssh crypto host-key generateUse this command to generate the host key pair (i.e., public and private). Synta

Page 146

1-1Chapter 1: IntroductionThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to conf

Page 147 - Console(config-if)

Command Line Interface4-404Command Mode Privileged ExecCommand Usage • This command clears the host key from volatile memory (RAM). Use the no ip ssh

Page 148 - VLAN Configuration

System Management Commands4-414Example show sshUse this command to display the current SSH server connections.Command Mode Privileged ExecExample Cons

Page 149

Command Line Interface4-424show public-keyUse this command to show the public key for the specified user or for the host.Syntax show public-key [user

Page 150

System Management Commands4-434Event Logging Commands logging onThis command controls logging of error messages, sending debug or error messages to sw

Page 151

Command Line Interface4-444logging historyThis command limits syslog messages saved to switch memory based on severity. The no form returns the loggin

Page 152 - Displaying Current VLANs

System Management Commands4-454logging hostThis command adds a syslog server host IP address that will receive logging messages. Use the no form to re

Page 153 - Creating VLANs

Command Line Interface4-464logging trapThis command enables the logging of system messages to a remote server, or limits the syslog messages saved to

Page 154

System Management Commands4-474Related Commandsshow logging (4-47)show loggingThis command displays the logging configuration, along with any system a

Page 155

Command Line Interface4-484The following example displays settings for the trap function. Related Commandsshow logging sendmail (4-51)SMTP Alert Comma

Page 156

System Management Commands4-494logging sendmail hostThis command specifies SMTP servers that will be sent alert messages. Use the no form to remove an

Page 157

Introduction1-21Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Flow control eliminates t

Page 158

Command Line Interface4-504Command Usage The specified level indicates an event threshold. All events at this level or higher will be sent to the conf

Page 159 - Configuring Private VLANs

System Management Commands4-514Command Usage You can specify up to five recipients for alert messages. However, you must enter a separate command to s

Page 160 - Console(config)#

Command Line Interface4-524Time CommandsThe system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP), or by using

Page 161 - Mapping Protocols to VLANs

System Management Commands4-534Example Related Commandssntp server (4-53)sntp poll (4-54)show sntp (4-54)sntp serverThis command sets the IP address o

Page 162

Command Line Interface4-544sntp pollThis command sets the interval between sending time requests when the switch is set to SNTP client mode. Use the n

Page 163 - Layer 2 Queue Settings

System Management Commands4-554clock timezoneThis command sets the time zone for the switch’s internal clock.Syntax clock timezone name hour hours min

Page 164

Command Line Interface4-564Default Setting NoneCommand Mode Privileged ExecExample This example shows how to set the system clock to 15:12:34, Februar

Page 165 - Priority

System Management Commands4-574System Status Commandsshow startup-configThis command displays the configuration file stored in non-volatile memory tha

Page 166

Command Line Interface4-584Example Related Commandsshow running-config (4-58)show running-configThis command displays the configuration information c

Page 167 - Selecting the Queue Mode

System Management Commands4-594- VLAN configuration settings for each interface- Multiple spanning tree instances (name and interfaces)- IP address co

Page 168

Description of Software Features1-31Port Mirroring – The switch can unobtrusively mirror traffic from any port to a monitor port. You can then attach

Page 169 - Layer 3/4 Priority Settings

Command Line Interface4-604Related Commandsshow startup-config (4-57)show systemThis command displays system information.Default Setting NoneCommand M

Page 170 - Mapping IP Precedence

System Management Commands4-614show usersShows all active console and Telnet sessions, including user name, idle time, and IP address of Telnet client

Page 171 - Mapping DSCP Priority

Command Line Interface4-624Example Frame Size Commandsjumbo frameThis command enables support for jumbo frames. Use the no form to disable it.Syntax [

Page 172

Flash/File Commands4-634Example Flash/File CommandsThese commands are used to manage the system code or configuration files.copy This command moves

Page 173 - Mapping IP Port Priority

Command Line Interface4-644Command Mode Privileged ExecCommand Usage • The system prompts for data required to complete the copy command. • The destin

Page 174 - Mapping CoS Values to ACLs

Flash/File Commands4-654The following example shows how to download a configuration file: This example shows how to copy a secure-site certificate fro

Page 175 - Console(config-if)#

Command Line Interface4-664Command Usage • If the file type is used for system startup, then this file cannot be deleted. • “Factory_Default_Config.cf

Page 176

Flash/File Commands4-674Example The following example shows how to display all file information:whichbootThis command displays which files were booted

Page 177 - Multicast

Command Line Interface4-684Default Setting NoneCommand Mode Global ConfigurationCommand Usage • A colon (:) is required after the specified file type.

Page 178

Authentication Commands4-694Authentication Sequenceauthentication loginThis command defines the login authentication method and precedence. Use the no

Page 179 - Multicast Filtering

Introduction1-41Multiple Spanning Tree Protocol (MSTP, IEEE 802.1s) – This protocol is a direct extension of RSTP. It can provide an independent spann

Page 180

Command Line Interface4-704authentication enableThis command defines the authentication method and precedence to use when changing from Exec command m

Page 181

Authentication Commands4-714RADIUS ClientRemote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software run

Page 182

Command Line Interface4-724Default Setting 1812Command Mode Global ConfigurationExample radius-server keyThis command sets the RADIUS encryption key.

Page 183

Authentication Commands4-734Example radius-server timeoutThis command sets the interval between transmitting authentication requests to the RADIUS ser

Page 184

Command Line Interface4-744TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that uses softw

Page 185

Authentication Commands4-754Command Mode Global ConfigurationExample tacacs-server keyThis command sets the TACACS+ encryption key. Use the no form to

Page 186

Command Line Interface4-764Port Security CommandsThese commands can be used to enable port security on a port. When using port security, the switch st

Page 187

Authentication Commands4-774Command Usage • If you enable port security, the switch stops learning new MAC addresses on the specified port when it has

Page 188 - Displaying the DNS Cache

Command Line Interface4-784802.1x Port AuthenticationThe switch supports IEEE 802.1x (dot1x) port-based access control that prevents unauthorized acce

Page 189

Authentication Commands4-794dot1x defaultThis command sets all configurable dot1x global and port settings to their default values.Syntaxdot1x default

Page 190

System Defaults1-51System DefaultsThe switch’s system defaults are provided in the configuration file “Factory_Default_Config.cfg.” To reset the switc

Page 191 - Telnet Connection

Command Line Interface4-804dot1x port-controlThis command sets the dot1x mode on a port interface. Use the no form to restore the default.Syntaxdot1x

Page 192 - Command Line Interface

Authentication Commands4-814Command Usage • The “max-count” parameter specified by this command is only effective if the dot1x mode is set to “auto” b

Page 193 - Entering Commands

Command Line Interface4-824dot1x timeout quiet-periodThis command sets the time that a switch port waits after the Max Request Count has been exceeded

Page 194 - Showing Commands

Authentication Commands4-834dot1x timeout tx-periodThis command sets the time that the switch waits during an authentication session before re-transmi

Page 195 - Using Command History

Command Line Interface4-844(page 4-79). It also displays the following global parameters which are set to a fixed value, including the following items

Page 196 - Exec Commands

Authentication Commands4-854ExampleConsole#show dot1xGlobal 802.1X Parameters reauth-enabled: yes reauth-period: 3600 quiet-period: 60 tx-period:

Page 197 - Configuration Commands

Command Line Interface4-864Access Control List CommandsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol,

Page 198

Access Control List Commands4-8743. User-defined rules in the Ingress MAC ACL for ingress ports.4. User-defined rules in the Ingress IP ACL for ingres

Page 199 - Command Line Processing

Command Line Interface4-884access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. Use the

Page 200 - Command Groups

Access Control List Commands4-894permit, deny (Standard ACL) This command adds a rule to a Standard IP ACL. The rule sets a filter condition for packe

Page 201 - Line Commands

Introduction1-61Port Configuration Admin Status EnabledAuto-negotiation EnabledFlow Control DisabledPort Capability 1000BASE-T –10 Mbps half duplex10

Page 202

Command Line Interface4-904permit, deny (Extended ACL) This command adds a rule to an Extended IP ACL. The rule sets a filter condition for packets wi

Page 203

Access Control List Commands4-914Command Usage• All new rules are appended to the end of the list.• Address bitmasks are similar to a subnet mask, con

Page 204

Command Line Interface4-924Related Commandsaccess-list ip (4-88)show ip access-list This command displays the rules for configured IP ACLs.Syntaxshow

Page 205

Access Control List Commands4-934Command Usage• A mask can only be used by all ingress ACLs or all egress ACLs.• The precedence of the ACL rules appli

Page 206

Command Line Interface4-944Command ModeIP MaskCommand Usage• Packets crossing a port are checked against all the rules in the ACL until a match is fou

Page 207

Access Control List Commands4-954This shows how to create a standard ACL with an ingress mask to deny access to the IP host 171.69.198.102, and permit

Page 208

Command Line Interface4-964This is a more comprehensive example. It denies any TCP packets in which the SYN bit is ON, and permits all other packets.

Page 209

Access Control List Commands4-974Related Commandsmask (IP ACL) (4-93)ip access-group This command binds a port to an IP ACL. Use the no form to remove

Page 210 - General Commands

Command Line Interface4-984Related Commandsip access-group (4-97)map access-list ip This command sets the output queue for packets matching an ACL rul

Page 211

Access Control List Commands4-994show map access-list ip This command shows the CoS value mapped to an IP ACL for the current interface. (The CoS valu

Page 212

System Defaults1-71IP Settings IP Address 0.0.0.0Subnet Mask 255.0.0.0Default Gateway 0.0.0.0DHCP Client: EnabledBOOTP DisabledDNS Server Lookup Disa

Page 213

Command Line Interface4-1004Command Usage• You must configure an ACL mask before you can change frame priorities based on an ACL rule.• Traffic priori

Page 214 - System Management Commands

Access Control List Commands4-1014MAC ACLs access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form

Page 215 - Device Designation Commands

Command Line Interface4-1024Example Related Commandspermit, deny 4-102mac access-group (4-107)show mac access-list (4-103)permit, deny (MAC ACL)This c

Page 216 - User Access Commands

Access Control List Commands4-1034• destination – Destination MAC address range with bitmask.• address-bitmask* – Bitmask for MAC address (in hexideci

Page 217

Command Line Interface4-1044Example Related Commandspermit, deny 4-102mac access-group (4-107)access-list mac mask-precedence This command changes to

Page 218 - IP Filter Commands

Access Control List Commands4-1054mask (MAC ACL)This command defines a mask for MAC ACLs. This mask defines the fields to check in the packet header.

Page 219

Command Line Interface4-1064ExampleThis example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of the r

Page 220 - Web Server Commands

Access Control List Commands4-1074show access-list mac mask-precedence This command shows the ingress or egress rule masks for MAC ACLs.Syntaxshow acc

Page 221

Command Line Interface4-1084Related Commandsshow mac access-list (4-103)show mac access-groupThis command shows the ports assigned to MAC ACLs.Command

Page 222

Access Control List Commands4-1094Example Related Commandsqueue cos-map (4-194)show map access-list mac (4-109) show map access-list mac This command

Page 223 - Telnet Server Commands

Installation GuideES4512C 12-Port Gigabit Intelligent SwitchLayer 2 Workgroup Switchwith 12 1000BASE-T (RJ-45) Ports,and 4 Combination (RJ-45/SFP) Por

Page 225

Command Line Interface4-1104match access-list mac This command changes the IEEE 802.1p priority of a Layer 2 frame matching the defined ACL rule. (Thi

Page 226

Access Control List Commands4-1114ACL Informationshow access-listThis command shows all ACLs and associated rules, as well as all the user-defined mas

Page 227

Command Line Interface4-1124SNMP CommandsControls access to this switch from management stations using the Simple Network Management Protocol (SNMP),

Page 228

SNMP Commands4-1134Example snmp-server contactThis command sets the system contact string. Use the no form to remove the system contact information.Sy

Page 229

Command Line Interface4-1144Related Commandssnmp-server contact (4-113)snmp-server host This command specifies the recipient of a Simple Network Manag

Page 230

SNMP Commands4-1154Related Commandssnmp-server enable traps (4-115)snmp-server enable trapsThis command enables this device to send Simple Network Man

Page 231

Command Line Interface4-1164Command Usage This command provides information on the community access strings, counter information for SNMP input and ou

Page 232

DNS Commands4-1174DNS CommandsThese commands are used to configure Domain Naming System (DNS) services. You can manually configure entries in the DNS

Page 233 - Event Logging Commands

Command Line Interface4-1184Command Usage Servers or other network devices may support one or more connections via multiple IP addresses. If more than

Page 234

DNS Commands4-1194Default Setting NoneCommand Mode Global ConfigurationExampleRelated Commands ip domain-list (4-119)ip name-server (4-120)ip domain-l

Page 235

2-1Chapter 2: Initial ConfigurationConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent off

Page 236

Command Line Interface4-1204ExampleThis example adds two domain names to the current list and then displays the list.Related Commands ip domain-name (

Page 237

DNS Commands4-1214ExampleThis example adds two domain-name servers to the list and then displays the list.Related Commands ip domain-name (4-118)ip do

Page 238 - SMTP Alert Commands

Command Line Interface4-1224ExampleThis example enables DNS and then displays the configuration.Related Commands ip domain-name (4-118)ip name-server

Page 239

DNS Commands4-1234show dnsThis command displays the configuration of the DNS server.Command Mode Privileged ExecExampleshow dns cacheThis command disp

Page 240

Command Line Interface4-1244clear dns cacheThis command clears all entries in the DNS cache.Command Mode Privileged ExecExampleConsole#clear dns cache

Page 241

Interface Commands4-1254Interface CommandsThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or

Page 242 - Time Commands

Command Line Interface4-1264Command Mode Global Configuration Example To specify port 24, enter the following command:descriptionThis command adds a d

Page 243

Interface Commands4-1274Default Setting • Auto-negotiation is enabled by default. • When auto-negotiation is disabled, the default speed-duplex settin

Page 244

Command Line Interface4-1284• If autonegotiation is disabled, auto-MDI/MDI-X pin signal configuration will also be disabled for the RJ-45 ports.Exampl

Page 245

Interface Commands4-1294Example The following example configures Ethernet port 5 capabilities to 100half, 100full and flow control.Related Commands ne

Page 246

Initial Configuration2-22• Enable port mirroring• Set broadcast storm control on any port• Display system information and statistics Required Connecti

Page 247 - System Status Commands

Command Line Interface4-1304ExampleThe following example enables flow control on port 5.Related Commands negotiation (4-127)capabilities (flowcontrol,

Page 248

Interface Commands4-1314Default Setting All interfaces are enabled.Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage This com

Page 249

Command Line Interface4-1324Example The following shows how to configure broadcast storm control at 600 packets per second: clear countersThis command

Page 250

Interface Commands4-1334show interfaces statusThis command displays the status for an interface.Syntax show interfaces status [interface]interface • e

Page 251

Command Line Interface4-1344show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]interface •

Page 252 - Frame Size Commands

Interface Commands4-1354show interfaces switchportThis command displays the administrative and operational status of the specified interfaces.Syntax s

Page 253 - Flash/File Commands

Command Line Interface4-1364Mirror Port CommandsThis section describes how to mirror traffic from a source port to a target port. port monitorThis com

Page 254

Mirror Port Commands4-1374Command Usage • You can mirror traffic from any source port to a destination port for real-time analysis. You can then attac

Page 255

Command Line Interface4-1384Example The following shows mirroring configured from port 6 to port 11:Rate Limit CommandsThis function allows the networ

Page 256

Link Aggregation Commands4-1394ExampleLink Aggregation CommandsPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the ba

Page 257

Basic Configuration2-32Remote ConnectionsPrior to accessing the switch’s onboard agent via a network connection, you must first configure it with a va

Page 258 - Authentication Commands

Command Line Interface4-1404• All the ports in a trunk have to be treated as a whole when moved from/to, added or deleted from a VLAN via the specifie

Page 259 - Authentication Sequence

Link Aggregation Commands4-1414lacpThis command enables 802.3ad Link Aggregation Control Protocol (LACP) for the current interface. Use the no form to

Page 260

Command Line Interface4-1424lacp system-priorityThis command configures a port's LACP system priority. Use the no form to restore the default set

Page 261 - RADIUS Client

Link Aggregation Commands4-1434lacp admin-key (Ethernet Interface)This command configures a port's LACP administration key. Use the no form to re

Page 262

Command Line Interface4-1444lacp admin-key (Port Channel)This command configures a port channel's LACP administration key string. Use the no form

Page 263

Link Aggregation Commands4-1454Command Mode Interface Configuration (Ethernet)Command Usage • Setting a lower value indicates a higher effective prior

Page 264 - TACACS+ Client

Command Line Interface4-1464ExampleConsole#show lacp 1 countersChannel group : 1 ---------------------------------------------------------------------

Page 265

Link Aggregation Commands4-1474Console#show lacp 1 internalChannel group : 1-------------------------------------------------------------------------O

Page 266 - Port Security Commands

Command Line Interface4-1484 Console#show lacp 1 neighborsChannel group 1 neighbors-------------------------------------------------------------------

Page 267

Address Table Commands4-1494Address Table CommandsThese commands are used to configure the address table for filtering specified addresses, displaying

Page 268 - 802.1x Port Authentication

Initial Configuration2-42Setting PasswordsNote: If this is your first time to log into the CLI program, you should define new passwords for both defau

Page 269

Command Line Interface4-1504mac-address-table staticThis command maps a static address to a destination port in a VLAN. Use the no form to remove an a

Page 270

Address Table Commands4-1514clear mac-address-table dynamicThis command removes any learned entries from the forwarding database and clears the transm

Page 271

Command Line Interface4-152400-00-00-00-00-00 means an exact match, and a mask of FF-FF-FF-FF-FF-FF means “any.”• The maximum number of address entrie

Page 272

Spanning Tree Commands4-1534Spanning Tree CommandsThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the swi

Page 273

Command Line Interface4-1544spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Synta

Page 274

Spanning Tree Commands4-1554Command Usage • Spanning Tree ProtocolUses RSTP for the internal state machine, but sends only 802.1D BPDUs. - This create

Page 275

Command Line Interface4-1564Default Setting 15 secondsCommand Mode Global ConfigurationCommand Usage This command sets the maximum time (in seconds) t

Page 276 - Access Control List Commands

Spanning Tree Commands4-1574spanning-tree max-ageThis command configures the spanning tree bridge maximum age globally for this switch. Use the no for

Page 277 - IP ACLs

Command Line Interface4-1584Command Mode Global ConfigurationCommand Usage Bridge priority is used in selecting the root device, root port, and design

Page 278

Spanning Tree Commands4-1594spanning-tree transmission-limitThis command configures the minimum interval between the transmission of consecutive RSTP/

Page 279

Basic Configuration2-52Before you can assign an IP address to the switch, you must obtain the following information from your network administrator:•

Page 280

Command Line Interface4-1604mst vlanThis command adds VLANs to a spanning tree instance. Use the no form to remove the specified VLANs. Using the no f

Page 281

Spanning Tree Commands4-1614mst priorityThis command configures the priority of a spanning tree instance. Use the no form to restore the default.Synta

Page 282

Command Line Interface4-1624Command Usage The MST region name and revision number (page 4-162) are used to designate a unique MST region. A bridge (i.

Page 283

Spanning Tree Commands4-1634max-hopsThis command configures the maximum number of hops in the region before a BPDU is discarded. Use the no form to re

Page 284

Command Line Interface4-1644spanning-tree costThis command configures the spanning tree path cost for the specified interface. Use the no form to rest

Page 285

Spanning Tree Commands4-1654Default Setting 128Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • This command defines the p

Page 286

Command Line Interface4-1664Example Related Commandsspanning-tree portfast (4-166)spanning-tree portfastThis command sets an interface to fast forward

Page 287

Spanning Tree Commands4-1674spanning-tree link-typeThis command configures the link type for Rapid Spanning Tree and Multiple Spanning Tree. Use the n

Page 288

Command Line Interface4-1684Default Setting • Ethernet – half duplex: 2,000,000; full duplex: 1,000,000; trunk: 500,000• Fast Ethernet – half duplex:

Page 289

Spanning Tree Commands4-1694interface with the highest priority (that is, lowest value) will be configured as an active link in the spanning tree. • W

Page 290

Initial Configuration2-625. Wait a few minutes, and then check the IP configuration settings by typing the “show ip interface” command. Press <Ente

Page 291 - MAC ACLs

Command Line Interface4-1704show spanning-treeThis command shows the configuration for the common spanning tree (CST) or for an instance within the mu

Page 292

Spanning Tree Commands4-1714ExampleConsole#show spanning-treeSpanning-tree information---------------------------------------------------------------

Page 293

Command Line Interface4-1724show spanning-tree mst configurationThis command shows the configuration of the multiple spanning tree.Syntax show spannin

Page 294

VLAN Commands4-1734Editing VLAN Groupsvlan databaseThis command enters VLAN database mode. All commands in this mode will take effect immediately.Defa

Page 295

Command Line Interface4-1744vlanThis command configures a VLAN. Use the no form to restore the default settings or delete a VLAN.Syntax vlan vlan-id [

Page 296

VLAN Commands4-1754Configuring VLAN Interfacesinterface vlanThis command enters interface configuration mode for VLANs, which is used to configure VLA

Page 297

Command Line Interface4-1764switchport modeThis command configures the VLAN membership mode for a port. Use the no form to restore the default.Syntax

Page 298

VLAN Commands4-1774Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage When set to receive all frame types, any received frames

Page 299

Command Line Interface4-1784Example The following example shows how to set the interface to port 1 and then enable ingress filtering:switchport native

Page 300

VLAN Commands4-1794switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the default.Syntax

Page 301 - ACL Information

Basic Configuration2-72To configure a community string, complete the following steps:1. From the Privileged Exec level global configuration mode promp

Page 302 - SNMP Commands

Command Line Interface4-1804switchport forbidden vlanThis command configures forbidden VLANs. Use the no form to remove the list of forbidden VLANs.Sy

Page 303

VLAN Commands4-1814Displaying VLAN Informationshow vlanThis command shows VLAN information.Syntax show vlan [id vlan-id | name vlan-name]• id - Keywor

Page 304

Command Line Interface4-1824Configuring Private VLANsPrivate VLANs provide port-based security and isolation between ports within the assigned VLAN. T

Page 305

VLAN Commands4-1834show pvlanThis command displays the configured private VLAN.Command Mode Privileged ExecExampleConfiguring Protocol-based VLANsThe

Page 306

Command Line Interface4-1844protocol-vlan protocol-group (Configuring Groups)This command creates a protocol group, or to add specific protocols to a

Page 307 - DNS Commands

VLAN Commands4-1854Command Usage • When creating a protocol-based VLAN, only assign interfaces via this command. If you assign interfaces using any of

Page 308

Command Line Interface4-1864show interfaces protocol-vlan protocol-groupThis command shows the mapping from protocol groups to VLANs for the selected

Page 309

GVRP and Bridge Extension Commands4-1874GVRP and Bridge Extension CommandsGARP VLAN Registration Protocol defines a way for switches to exchange VLAN

Page 310

Command Line Interface4-1884show bridge-extThis command shows the configuration for bridge extension commands.Default Setting NoneCommand Mode Privile

Page 311

GVRP and Bridge Extension Commands4-1894show gvrp configurationThis command shows if GVRP is enabled.Syntax show gvrp configuration [interface]interfa

Page 312

Initial Configuration2-822. Enter the name of the start-up file. Press <Enter>.Managing System FilesThe switch’s flash memory supports three typ

Page 313

Command Line Interface4-1904Command Usage • Group Address Registration Protocol is used by GVRP and GMRP to register or deregister client attributes f

Page 314

Priority Commands4-1914Related Commandsgarp timer (4-189)Priority CommandsThe commands described in this section allow you to specify which data packe

Page 315 - Interface Commands

Command Line Interface4-1924queue modeThis command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for the class of service (CoS)

Page 316

Priority Commands4-1934switchport priority defaultThis command sets a priority for incoming untagged frames. Use the no form to restore the default va

Page 317

Command Line Interface4-1944queue bandwidth This command assigns weighted round-robin (WRR) weights to the eight class of service (CoS) priority queue

Page 318

Priority Commands4-1954Default Setting This switch supports Class of Service by using eight priority queues, with Weighted Round Robin queuing for eac

Page 319

Command Line Interface4-1964Example show queue bandwidthThis command displays the weighted round-robin (WRR) bandwidth allocation for the eight priori

Page 320

Priority Commands4-1974Example Priority Commands (Layer 3 and 4) map ip port (Global Configuration)This command enables IP port mapping (i.e., class o

Page 321

Command Line Interface4-1984Example The following example shows how to enable TCP/UDP port mapping globally:map ip port (Interface Configuration)This

Page 322

Priority Commands4-1994Command Usage • The precedence for priority mapping is IP Port, IP Precedence or IP DSCP, and default switchport priority. • IP

Page 323

3-1Chapter 3: Configuring the SwitchUsing the Web InterfaceThis switch provides an embedded HTTP Web agent. Using a Web browser you can configure the

Page 324

Command Line Interface4-2004map ip dscp (Global Configuration)This command enables IP DSCP mapping (i.e., Differentiated Services Code Point mapping).

Page 325

Priority Commands4-2014Default Setting The DSCP default values are defined in the following table. Note that all the DSCP values that are not specifie

Page 326 - Mirror Port Commands

Command Line Interface4-2024Default Setting NoneCommand ModePrivileged ExecExample The following shows that HTTP traffic has been mapped to CoS value

Page 327

Priority Commands4-2034Example Related Commands map ip port (Global Configuration) (4-197)map ip precedence (Interface Configuration) (4-199) show map

Page 328 - Rate Limit Commands

Command Line Interface4-2044Example Related Commands map ip dscp (Global Configuration) (4-200)map ip dscp (Interface Configuration) (4-200)Multicast

Page 329 - Link Aggregation Commands

Multicast Filtering Commands4-2054ip igmp snoopingThis command enables IGMP snooping on this switch. Use the no form to disable it.Syntax [no] ip igmp

Page 330

Command Line Interface4-2064ip igmp snooping versionThis command configures the IGMP snooping version. Use the no form to restore the default.Syntax i

Page 331

Multicast Filtering Commands4-2074Example The following shows the current IGMP snooping configuration:show mac-address-table multicast This command sh

Page 332

Command Line Interface4-2084IGMP Query Commands (Layer 2) ip igmp snooping querierThis command enables the switch as an IGMP querier. Use the no form

Page 333

Multicast Filtering Commands4-2094Default Setting 2 timesCommand Mode Global ConfigurationCommand Usage The query count defines how long the querier w

Page 334

ES4512CES4524CES4548CE052005-R02

Page 335

Configuring the Switch3-23Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and password. The a

Page 336

Command Line Interface4-2104ip igmp snooping query-max-response-timeThis command configures the query report delay. Use the no form to restore the def

Page 337

Multicast Filtering Commands4-2114Default Setting 300 secondsCommand Mode Global ConfigurationCommand Usage The switch must use IGMPv2 for this comman

Page 338

Command Line Interface4-2124Command Usage Depending on your network connections, IGMP snooping may not always be able to locate the IGMP querier. Ther

Page 339 - Address Table Commands

IP Interface Commands4-2134IP Interface CommandsAn IP addresses may be used for management access to the switch over your network. The IP address for

Page 340

Command Line Interface4-2144• If you select the bootp or dhcp option, IP is enabled but will not function until a BOOTP or DHCP reply has been receive

Page 341

IP Interface Commands4-2154Related Commands ip address (4-213)ip default-gatewayThis command establishes a static route between this switch and manag

Page 342

Command Line Interface4-2164Related Commands show ip redirects (4-216)show ip redirectsThis command shows the default gateway configured for this devi

Page 343 - Spanning Tree Commands

IP Interface Commands4-2174- Network or host unreachable - The gateway found no corresponding entry in the route table. • Press <Esc> to stop pi

Page 344 -

Command Line Interface4-2184

Page 345

A-1Appendix A: Software SpecificationsSoftware FeaturesAuthenticationLocal, RADIUS, TACACS, Port (802.1x), HTTPS, SSH, Port SecurityAccess Control Lis

Page 346

Navigating the Web Browser Interface3-33Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration chang

Page 347

Software SpecificationsA-2AAdditional FeaturesBOOTP clientSNTP (Simple Network Time Protocol)SNMP (Simple Network Management Protocol)RMON (Remote Mon

Page 348

Management Information BasesA-3ARMON (RFC 1757 groups 1,2,3,9)SNMP (RFC 1157)SNMPv2 (RFC 1907)SNTP (RFC 2030)SSH (Version 2.0)TFTP (RFC 1350)Managemen

Page 349

Software SpecificationsA-4A

Page 350

B-1Appendix B: TroubleshootingProblems Accessing the Management Interface Table B-1 Troubleshooting ChartSymptom ActionCannot connect using Telnet,

Page 351

TroubleshootingB-2BUsing System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually caus

Page 352

Glossary-1GlossaryAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Page 353

GlossaryGlossary-2GARP VLAN Registration Protocol (GVRP)Defines a way for switches to exchange VLAN information in order to register necessary VLAN me

Page 354

Glossary-3GlossaryIEEE 802.3xDefines Ethernet frame start/stop requests and timers used for flow control on full-duplex links.IGMP SnoopingListening t

Page 355

GlossaryGlossary-4Management Information Base (MIB)An acronym for Management Information Base. It is a set of database objects that contains informati

Page 356

Glossary-5GlossaryRapid Spanning Tree Protocol (RSTP)RSTP reduces the convergence time for network topology changes to about 10% of that required by t

Page 357

Configuring the Switch3-43Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, o

Page 358

GlossaryGlossary-6User Datagram Protocol (UDP)UDP provides a datagram mode for packet-switched communications. It uses IP as the underlying transport

Page 359

Index-1Symbols3-31Numerics802.1x, port authentication 3-43, 4-78Aacceptable frame type 3-119, 4-174Access Control List See ACLACLExtended IP 3-53, 4-

Page 360

Index-2IndexHhardware version, displaying 3-10, 4-61HTTPS 3-34, 4-31HTTPS, secure server 3-34, 4-31IIEEE 802.1D 3-91, 4-152IEEE 802.1s 4-152IEEE 802.1

Page 361

Index-3IndexQqueue weights 3-129, 4-192RRADIUS, logon authentication 3-31, 4-71rate limits, setting 3-83, 4-136restarting the system 3-25, 4-22RSTP 3-

Page 362 - VLAN Commands

Index-4IndexWWeb interfaceaccess requirements 3-1configuration buttons 3-3home page 3-2menu list 3-3, 3-4panel display 3-3

Page 364

ES4512CES4524CES4548CE052005-R02

Page 365 - Configuring VLAN Interfaces

Navigating the Web Browser Interface3-53 802.1x Port authentication 3-43Information Displays global configuration settings 3-44Configuration Configu

Page 366

Configuring the Switch3-63Address Table 3-88Static Addresses Displays entries for interface, address or VLAN 3-88Dynamic Addresses Displays or edits

Page 367

Navigating the Web Browser Interface3-73Protocol VLAN 3-123Configuration Creates a protocol group, specifying the supported protocols 3-123Port Confi

Page 368

Configuring the Switch3-83DNS 3-146General Configuration Enables DNS; configures domain name and domain list; and specifies IP address of name servers

Page 369

Basic Configuration3-93Basic ConfigurationDisplaying System InformationYou can easily identify the system by displaying the device name, location and

Page 370

Configuring the Switch3-103CLI – Specify the hostname, location and contact information.Displaying Switch Hardware/Software Versions Use the Switch In

Page 371 - Displaying VLAN Information

Basic Configuration3-113• Redundant Power Status* – Displays the status of the redundant power supply.* CLI only.Management Software• Loader Version –

Page 372

iContents Chapter 1: Introduction 1-1Key Features 1-1Description of Software Features 1-2System Defaults 1-5Chapter 2: Initial Configuration 2-1

Page 373

Configuring the Switch3-123Displaying Bridge Extension CapabilitiesThe Bridge MIB includes extensions for managed devices that support Multicast Filte

Page 374

Basic Configuration3-133CLI – Enter the following command. Setting the Switch’s IP Address This section describes how to configure an IP interface for

Page 375

Configuring the Switch3-143Manual ConfigurationWeb – Click System, IP Configuration. Select the VLAN through which the management station is attached,

Page 376

Basic Configuration3-153Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the switch to be dynamically configured by th

Page 377

Configuring the Switch3-163CLI – Enter the following command to restart DHCP service.Managing FirmwareYou can upload/download firmware to or from a TF

Page 378

Basic Configuration3-173If you download to a new destination file, then select the file from the drop-down box for the operation code used at startup,

Page 379 - Console#

Configuring the Switch3-183Downloading Configuration Settings from a ServerYou can download the configuration file under a new file name and then set

Page 380

Basic Configuration3-193If you download the startup configuration file under a new file name, you can set this file as the startup file at a later tim

Page 381 - Priority Commands

Configuring the Switch3-203• RAM Level – Limits log messages saved to the switch’s temporary RAM memory for all levels up to the specified level. For

Page 382

Basic Configuration3-213• Logging Trap – Limits log messages that are sent to the remote syslog server for all levels up to the specified level. For e

Page 383

ContentsiiSystem Log Configuration 3-19Remote Log Configuration 3-20Displaying Log Messages 3-22Sending Simple Mail Transfer Protocol Alerts 3-23R

Page 384

Configuring the Switch3-223CLI – Enter the syslog server host IP address, choose the facility type and set the logging trap.Displaying Log MessagesUse

Page 385

Basic Configuration3-233CLI – This example shows that system logging is enabled, the message level for flash memory is “errors” (i.e., default level 3

Page 386

Configuring the Switch3-243Web – Click System, Log, SMTP. Enable SMTP, specify a source email address, and select the minimum severity level. To add a

Page 387

Basic Configuration3-253CLI – Enter the IP address of at least one SMTP server, set the syslog severity level to trigger an email message, and specify

Page 388

Configuring the Switch3-263Setting the System ClockSimple Network Time Protocol (SNTP) allows the switch to set its internal clock based on periodic u

Page 389

Basic Configuration3-273CLI – This example configures the switch to operate as an SNTP client and then displays the current time and settings.Setting

Page 390

Configuring the Switch3-283CLI - This example shows how to set the time zone for the system clock.Simple Network Management Protocol Simple Network Ma

Page 391

Simple Network Management Protocol3-293Web – Click SNMP, Configuration. Add new community strings as required, select the access rights from the Acces

Page 392

Configuring the Switch3-303Web – Click SNMP, Configuration. Fill in the IP address and community string for each trap manager that will receive these

Page 393

User Authentication3-313Command Attributes• User Name* – The name of the user. (Maximum length: 8 characters)• Access Level* – Specifies the user leve

Page 394 - Multicast Filtering Commands

ContentsiiiDisplaying LACP Settings and Status for the Local Side 3-77Displaying LACP Settings and Status for the Remote Side 3-79Setting Broadcast

Page 395

Configuring the Switch3-323RADIUS uses UDP while TACACS+ uses TCP. UDP only offers best effort delivery, while TCP offers a connection-oriented transp

Page 396

User Authentication3-333Note: The local switch user database has to be set up by manually entering user names and passwords using the CLI. (See “usern

Page 397

Configuring the Switch3-343CLI – Specify all the required parameters to enable logon authentication.Configuring HTTPSYou can configure the switch to e

Page 398

User Authentication3-353• The following web browsers and operating systems currently support HTTPS:• To specify a secure-site certificate, see “Replac

Page 399

Configuring the Switch3-363Caution: For maximum security, we recommend you obtain a unique Secure Sockets Layer certificate at the earliest opportunit

Page 400

User Authentication3-373To use the SSH server, complete these steps:1. Generate a Host Key Pair – On the SSH Host Key Settings page, create a host pub

Page 401

Configuring the Switch3-383e. The switch compares the decrypted bytes to the original bytes it sent. If the two sets match, this means that the client

Page 402

User Authentication3-393Web – Click Security, SSH Host-Key Settings. Select the host-key type from the drop-down box, select the option to save the ho

Page 403 - IP Interface Commands

Configuring the Switch3-403Configuring the SSH ServerThe SSH server includes basic settings for authentication. Field Attributes• SSH Server Status –

Page 404

User Authentication3-413CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that the

Page 405

ContentsivMapping CoS Values to ACLs 3-136Changing Priorities Based on ACL Rules 3-137Multicast Filtering 3-139Layer 2 IGMP (Snooping and Query)

Page 406

Configuring the Switch3-423• If a port is disabled (shut down) due to a security violation, it must be manually re-enabled from the Port/Port Configur

Page 407

User Authentication3-433CLI – This example selects the target port, sets the port security action to send a trap and disable the port, specifies a max

Page 408

Configuring the Switch3-443The operation of 802.1x on the switch requires the following:• The switch must have an IP address assigned.• RADIUS authent

Page 409 - Software Features

User Authentication3-453Web – Click Security, 802.1x, Information.Figure 3-26. 802.1x InformationCLI – This example shows the default protocol settin

Page 410 - Standards

Configuring the Switch3-463Configuring 802.1x Global SettingsThe dot1x protocol includes global parameters that control the client authentication proc

Page 411 - Management Information Bases

User Authentication3-473Web – Select Security, 802.1x, Configuration. Enable dot1x globally for the switch, modify any of the parameters required, and

Page 412 - Software Specifications

Configuring the Switch3-483• Authorized – - Yes – Connected client is authorized.- No – Connected client is not authorized.- Blank – Displays nothing

Page 413 - Appendix B: Troubleshooting

User Authentication3-493Web – Select Security, 802.1x, Statistics. Select the required port and then click Query. Click Refresh to update the statisti

Page 414 - Using System Logs

Configuring the Switch3-503CLI – This example displays the 802.1x statistics for port 4.Filtering IP Addresses for Management AccessYou can create a l

Page 415 - Glossary

User Authentication3-513Web – Click Security, IP Filter. Enter the addresses that are allowed management access to an interface, and click Add IP Filt

Page 416

Contentsvdisconnect 4-18show line 4-19General Commands 4-20enable 4-20disable 4-21configure 4-21show history 4-22reload 4-22end 4-23exit 4-23quit 4

Page 417

Configuring the Switch3-523Access Control ListsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4

Page 418

Access Control Lists3-533Setting the ACL Name and TypeUse the ACL Configuration page to designate the name and type of an ACL.Command Attributes• Name

Page 419

Configuring the Switch3-543The mask is bitwise ANDed with the specified source IP address, and compared with the address for each IP packet entering t

Page 420

Access Control Lists3-553Configuring an Extended IP ACLCommand Attributes• Action – An ACL can contain either all permit rules or all deny rules. (Def

Page 421

Configuring the Switch3-563Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (

Page 422

Access Control Lists3-573Configuring a MAC ACLCommand Attributes• Action – An ACL can contain all permit rules or all deny rules. (Default: Permit rul

Page 423

Configuring the Switch3-583Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (

Page 424

Access Control Lists3-593Configuring ACL MasksYou can specify optional masks that control the order in which ACL rules are checked. The switch include

Page 425

Configuring the Switch3-603Configuring an IP ACL MaskThis mask defines the fields to check in the IP header. Command Usage• Masks that include an entr

Page 426

Access Control Lists3-613Web – Configure the mask to match the required rules in the IP ingress or egress ACLs. Set the mask to check for any source o

Related models: ES4524C | ES4548C |

Comments to this Manuals

No comments