SMCGS10P-Smart MG
SMCGS10P-Smart MG
EZ Switch™ 10/100/1000
Web Smart 10-Port Gigabit Ethernet PoE Switch
SMCGS10P-Smart
Web Smart 10-Port GE PoE Switch
Management Guide
Copyright © 2012 by
Trademarks:
SMC is a registered trademark; and Barricade, EZ Switch, TigerStack, TigerSwitch, and TigerAccess
are trademarks of SMC Networks, Inc. Other product and company names are trademarks or
registered trademarks of their respective holders.
WARRANTY AND PRODUCT REGISTRATION
To register SMC products and to review the detailed warranty statement,
please refer to the Support Section of the SMC Website at http://
www.smc.com.
– 4 –
ABOUT THIS GUIDE
PURPOSE This guide gives specific information on how to operate and use the
management functions of the switch.
AUDIENCE The guide is intended for use by network administrators who are
responsible for operating and maintaining network equipment;
consequently, it assumes a basic working knowledge of general switch
functions, the Internet Protocol (IP), and Simple Network Management
Protocol (SNMP).
CONVENTIONS The following conventions are used throughout this guide to show
information:
CAUTION: Alerts you to a potential hazard that could cause loss of data, or
damage the system or equipment.
WARNING: Alerts you to a potential hazard that could cause personal injury.
RELATED PUBLICATIONS The following publication details the hardware features of the switch,
including the physical and performance-related characteristics, and how to
install the switch:
– 5 –
ABOUT THIS GUIDE
REVISION HISTORY This section summarizes the changes in each revision of this guide.
– 6 –
CONTENTS
– 7 –
CONTENTS
– 8 –
CONTENTS
– 9 –
CONTENTS
– 10 –
CONTENTS
– 11 –
CONTENTS
B TROUBLESHOOTING 270
Problems Accessing the Management Interface 270
Using System Logs 271
C LICENSE INFORMATION 272
The GNU General Public License 272
GLOSSARY 276
INDEX 284
– 12 –
FIGURES
– 13 –
FIGURES
– 14 –
FIGURES
Figure 68: Configuring Global and Port Settings for a Voice VLAN 174
Figure 69: Configuring an OUI Telephony List 175
Figure 70: Configuring Ingress Port QoS Classification 177
Figure 71: Configuring Ingress Port Tag Classification 178
Figure 72: Displaying Egress Port Schedulers 180
Figure 73: Configuring Egress Port Schedulers and Shapers 180
Figure 74: Displaying Egress Port Shapers 181
Figure 75: Displaying Port Tag Remarking Mode 183
Figure 76: Configuring Port Tag Remarking Mode 184
Figure 77: Configuring Port DSCP Translation and Rewriting 186
Figure 78: Configuring DSCP-based QoS Ingress Classification 187
Figure 79: Configuring DSCP Translation and Re-mapping 188
Figure 80: Mapping DSCP to CoS/DPL Values 189
Figure 81: QoS Control List Configuration 193
Figure 82: Storm Control Configuration 194
Figure 83: Mirror Configuration 195
Figure 84: UPnP Configuration 197
Figure 85: System Information 200
Figure 86: CPU Load 201
Figure 87: System Log Information 202
Figure 88: Detailed System Log Information 203
Figure 89: Thermal Protection Status 204
Figure 90: Port State Overview 204
Figure 91: Port Statistics Overview 205
Figure 92: Queueing Counters 206
Figure 93: QoS Control List Status 207
Figure 94: Detailed Port Statistics 209
Figure 95: Access Management Statistics 210
Figure 96: Port Security Switch Status 212
Figure 97: Port Security Port Status 213
Figure 98: Network Access Server Switch Status 215
Figure 99: NAS Statistics for Specified Port 219
Figure 100: ACL Status 220
Figure 101: DHCP Snooping Statistics 222
Figure 102: DHCP Relay Statistics 223
Figure 103: Dynamic ARP Inspection Table 224
– 15 –
FIGURES
– 16 –
TABLES
– 17 –
TABLES
– 18 –
SECTION I
GETTING STARTED
This section provides an overview of the switch, and introduces some basic
concepts about network switches. It also describes the basic settings
required to access the management interface.
◆ "Introduction" on page 20
– 19 –
1 INTRODUCTION
KEY FEATURES
Table 1: Key Features
Feature Description
DHCP Client
Port Configuration Speed, duplex mode, flow control, MTU, response to excessive
collisions, power saving mode
Rate Limiting Input rate limiting per port (manual setting or ACL)
Port Mirroring 1 sessions, up to 10 source port to one analysis port per session
Address Table 8K MAC addresses in the forwarding table, 1000 static MAC
addresses, 1K L2 IGMP multicast groups and 128 MVR groups
IP Version 4 and 6 Supports IPv4 and IPv6 addressing, management, and QoS
IEEE 802.1D Bridge Supports dynamic data switching and addresses learning
– 20 –
CHAPTER 1 | Introduction
Description of Software Features
Feature Description
Spanning Tree Algorithm Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and
Multiple Spanning Trees (MSTP)
Traffic Prioritization Queue mode and CoS configured by Ethernet type, VLAN ID, TCP/
UDP port, DSCP, ToS bit, VLAN tag priority, or port
Link Layer Discovery Used to discover basic information about neighboring devices
Protocol
Multicast Filtering Supports IGMP snooping and query, MLD snooping, and Multicast
VLAN Registration
CONFIGURATION You can save the current configuration settings to a file on the
BACKUP AND management station (using the web interface) or a TFTP server (using the
RESTORE console interface through Telnet), and later download this file to restore
the switch configuration settings.
AUTHENTICATION This switch authenticates management access via a web browser. User
names and passwords can be configured locally or can be verified via a
remote authentication server (i.e., RADIUS or TACACS+). Port-based
authentication is also supported via the IEEE 802.1X protocol. This protocol
uses Extensible Authentication Protocol over LANs (EAPOL) to request user
credentials from the 802.1X client, and then uses the EAP between the
switch and the authentication server to verify the client’s right to access
the network via an authentication server (i.e., RADIUS or TACACS+
server).
– 21 –
CHAPTER 1 | Introduction
Description of Software Features
ACCESS CONTROL ACLs provide packet filtering for IP frames (based on protocol, TCP/UDP
LISTS port number or frame type) or layer 2 frames (based on any destination
MAC address for unicast, broadcast or multicast, or based on VLAN ID or
VLAN tag priority). ACLs can by used to improve performance by blocking
unnecessary network traffic or to implement security controls by restricting
access to specific network resources or protocols. Policies can be used to
differentiate service for client ports, server ports, network ports or guest
ports. They can also be used to strictly control network traffic by only
allowing incoming frames that match the source MAC and source IP on
specific port.
PORT CONFIGURATION You can manually configure the speed and duplex mode, and flow control
used on specific ports, or use auto-negotiation to detect the connection
settings used by the attached device. Use the full-duplex mode on ports
whenever possible to double the throughput of switch connections. Flow
control should also be enabled to control network traffic during periods of
congestion and prevent the loss of packets when port buffer thresholds are
exceeded. The switch supports flow control based on the IEEE 802.3x
standard (now incorporated in IEEE 802.3-2002).
RATE LIMITING This feature controls the maximum rate for traffic transmitted or received
on an interface. Rate limiting is configured on interfaces at the edge of a
network to limit traffic into or out of the network. Traffic that falls within
the rate limit is transmitted, while packets that exceed the acceptable
amount of traffic are dropped.
PORT MIRRORING The switch can unobtrusively mirror traffic from any port to a monitor port.
You can then attach a protocol analyzer or RMON probe to this port to
perform traffic analysis and verify connection integrity.
PORT TRUNKING Ports can be combined into an aggregate connection. Trunks can be
manually set up or dynamically configured using Link Aggregation Control
Protocol (LACP – IEEE 802.3-2005). The additional ports dramatically
increase the throughput across any connection, and provide redundancy by
taking over the load if a port in the trunk should fail. The switch supports
up to 5 trunks.
STORM CONTROL Broadcast, multicast and unknown unicast storm suppression prevents
traffic from overwhelming the network.When enabled on a port, the level of
broadcast traffic passing through the port is restricted. If broadcast traffic
rises above a pre-defined threshold, it will be throttled until the level falls
back beneath the threshold.
STATIC ADDRESSES A static address can be assigned to a specific interface on this switch.
Static addresses are bound to the assigned interface and will not be
moved. When a static address is seen on another interface, the address will
– 22 –
CHAPTER 1 | Introduction
Description of Software Features
be ignored and will not be written to the address table. Static addresses
can be used to provide network security by restricting access for a known
host to a specific port.
IEEE 802.1D BRIDGE The switch supports IEEE 802.1D transparent bridging. The address table
facilitates data switching by learning addresses, and then filtering or
forwarding traffic based on this information. The address table supports up
to 16K addresses.
STORE-AND-FORWARD The switch copies each frame into its memory before forwarding them to
SWITCHING another port. This ensures that all frames are a standard Ethernet size and
have been verified for accuracy with the cyclic redundancy check (CRC).
This prevents bad frames from entering the network and wasting
bandwidth.
– 23 –
CHAPTER 1 | Introduction
Description of Software Features
VIRTUAL LANS The switch supports up to 4096 VLANs. A Virtual LAN is a collection of
network nodes that share the same collision domain regardless of their
physical location or connection point in the network. The switch supports
tagged VLANs based on the IEEE 802.1Q standard. Members of VLAN
groups can be manually assigned to a specific set of VLANs. This allows the
switch to restrict traffic to the VLAN groups to which a user has been
assigned. By segmenting your network into VLANs, you can:
◆ Use private VLANs to restrict traffic to pass only between data ports
and the uplink ports, thereby isolating adjacent ports within the same
VLAN, and allowing you to limit the total number of VLANs that need to
be configured.
IEEE 802.1Q This feature is designed for service providers carrying traffic for multiple
TUNNELING (QINQ) customers across their networks. QinQ tunneling is used to maintain
customer-specific VLAN and Layer 2 protocol configurations even when
different customers use the same internal VLAN IDs. This is accomplished
by inserting Service Provider VLAN (SPVLAN) tags into the customer’s
frames when they enter the service provider’s network, and then stripping
the tags when the frames leave the network.
TRAFFIC This switch prioritizes each packet based on the required level of service,
PRIORITIZATION using four priority queues with strict or Weighted Round Robin queuing. It
uses IEEE 802.1p and 802.1Q tags to prioritize incoming traffic based on
input from the end-station application. These functions can be used to
provide independent priorities for delay-sensitive data and best-effort data.
This switch also supports several common methods of prioritizing layer 3/4
traffic to meet application requirements. Traffic can be prioritized based on
the priority bits in the IP frame’s Type of Service (ToS) octet or the number
of the TCP/UDP port. When these services are enabled, the priorities are
mapped to a Class of Service value by the switch, and the traffic then sent
to the corresponding output queue.
– 24 –
CHAPTER 1 | Introduction
System Defaults
MULTICAST FILTERING Specific multicast traffic can be assigned to its own VLAN to ensure that it
does not interfere with normal network traffic and to guarantee real-time
delivery by setting the required priority level for the designated VLAN. The
switch uses IGMP Snooping and Query to manage multicast group
registration for IPv4 traffic, and MLD Snooping for IPv6 traffic. It also
supports Multicast VLAN Registration (MVR) which allows common
multicast traffic, such as television channels, to be transmitted across a
single network-wide multicast VLAN shared by hosts residing in other
standard or private VLAN groups, while preserving security and data
isolation for normal traffic.
SYSTEM DEFAULTS
The switch’s system defaults are provided in the configuration file
“Factory_Default_Config.cfg.” To reset the switch defaults, this file should
be set as the startup configuration file.
Password “admin”
HTTPS Enabled
SSH Enabled
IP Filtering Disabled
– 25 –
CHAPTER 1 | Introduction
System Defaults
Auto-negotiation Enabled
PVID 1
VLAN ID Disabled
– 26 –
CHAPTER 1 | Introduction
System Defaults
IP Address 192.168.1.10
– 27 –
2 INITIAL SWITCH CONFIGURATION
To make use of the management features of your switch, you must first
configure it with an IP address that is compatible with the network in which
it is being installed. This should be done before you permanently install the
switch in the network.
1. Place the switch close to the PC that you intend to use for configuration.
It helps if you can see the front panel of the switch while working on
your PC.
2. Connect the Ethernet port of your PC to any port on the front panel of
the switch. Connect power to the switch and verify that you have a link
by checking the front-panel LEDs.
5. Enter “admin” for the user name and password, and then click on the
Login button.
6. From the menu, click System, and then IP. To request an address from
a local DHCP Server, mark the DHCP Client check box. To configure a
static address, enter the new IP Address, IP Mask, and other optional
parameters for the switch, and then click on the Save button.
If you need to configure an IPv6 address, select IPv6 from the System
menu, and either submit a request for an address from a local DHCPv6
server by marking the Auto Configuration check box, or configure a
static address by filling in the parameters for an address, network
prefix length, and gateway router.
– 28 –
CHAPTER 2 | Initial Switch Configuration
logging out. To change the password, click Security and then Users. Select
“admin” from the User Configuration list, fill in the Password fields, and
then click Save.
– 29 –
SECTION II
WEB CONFIGURATION
This section describes the basic switch features, along with a detailed
description of how to configure each feature via a web browser.
– 30 –
3 USING THE WEB INTERFACE
This switch provides an embedded HTTP web agent. Using a web browser
you can configure the switch and view statistics to monitor network
activity. The web agent can be accessed by any computer on the network
using a standard web browser (Internet Explorer 5.0, Netscape 6.2, Mozilla
Firefox 2.0.0.0, or more recent versions).
HOME PAGE When your web browser connects with the switch’s web agent, the home
page is displayed as shown below. The home page displays the Main Menu
on the left side of the screen and an image of the front panel on the right
side. The Main Menu links are used to navigate to other menus, and display
configuration parameters and statistics.
– 31 –
CHAPTER 3 | Using the Web Interface
Navigating the Web Browser Interface
Button Action
PANEL DISPLAY The web agent displays an image of the switch’s ports. The refresh mode is
disabled by default. Click Auto-refresh to refresh the data displayed on the
screen approximately once every 5 seconds, or click Refresh to refresh the
screen right now. Clicking on the image of a port opens the Detailed
Statistics page as described on page 207.
– 32 –
CHAPTER 3 | Using the Web Interface
Navigating the Web Browser Interface
MAIN MENU Using the onboard web agent, you can define system parameters, manage
and control the switch, and all its ports, or monitor network conditions. The
following table briefly describes the selections available from this program.
Configuration 41
System
Power Reduction 48
Security 55
Switch 55
Network
– 33 –
CHAPTER 3 | Using the Web Interface
Navigating the Web Browser Interface
Access Control Configures ACLs based on frame type, destination MAC type, 91
List VLAN ID, VLAN priority tag; and the action to take for
matching packets
Snooping Enables DHCP snooping globally; and sets the trust mode for 99
each port
IP Source Guard Filters IP traffic based on static entries in the IP Source 102
Guard table, or dynamic entries in the DHCP Snooping table
Configuration Enables IP source guard and sets the maximum number of 103
clients that can learned dynamically
Static Table Adds a static addresses to the source-guard binding table 105
Static Table Adds static entries based on port, VLAN ID, and source MAC 108
address and IP address in ARP request packets
Aggregation 111
Bridge Settings Configures global bridge settings for STP, RSTP and MSTP; 118
also configures edge port settings for BPDU filtering, BPDU
guard, and port error recovery
MSTI Priorities Configures the priority for the CIST and each MISTI 124
IPMC IP Multicast
Basic Configures global and port settings for multicast filtering 134
Configuration
– 34 –
CHAPTER 3 | Using the Web Interface
Navigating the Web Browser Interface
Basic Configures global and port settings for multicast filtering 140
Configuration
MAC Table Configures address aging, dynamic learning, and static 158
addresses
Private VLANs
MAC-based VLAN Maps traffic with specified source MAC address to a VLAN 167
Protocol-based 168
VLAN
Group to VLAN Maps a protocol group to a VLAN for specified ports 170
Configuration Configures global settings, including status, voice VLAN ID, 172
VLAN aging time, and traffic priority; also configures port
settings, including the way in which a port is added to the
Voice VLAN, and blocking non-VoIP addresses
OUI Maps the OUI in the source MAC address of ingress packets 174
to the VoIP device manufacturer
QoS 175
Port Classification Configures default traffic class, drop priority, user priority, 176
drop eligible indicator, classification mode for tagged frames,
and DSCP-based QoS classification
– 35 –
CHAPTER 3 | Using the Web Interface
Navigating the Web Browser Interface
Port Scheduler Provides overview of QoS Egress Port Schedulers, including 178
the queue mode and weight; also configures egress queue
mode, queue shaper (rate and access to excess bandwidth),
and port shaper
Port Shaping Provides overview of QoS Egress Port Shapers, including the 181
rate for each queue and port; also configures egress queue
mode, queue shaper (rate and access to excess bandwidth),
and port shaper
Port Tag Provides overview of QoS Egress Port Tag Remarking; also 181
Remarking sets the remarking mode (classified PCP/DEI values, default
PCP/DEI values, or mapped versions of QoS class and drop
priority)
Port DSCP Configures ingress translation and classification settings and 184
egress re-writing of DSCP values
DSCP Translation Configures DSCP translation for ingress traffic or DSCP re- 187
mapping for egress traffic
DSCP Maps DSCP values to a QoS class and drop precedence level 188
Classification
QoS Control List Configures QoS policies for handling ingress packets based 189
on Ethernet type, VLAN ID, TCP/UDP port, DSCP, ToS, or
VLAN priority tag
Storm Control Sets limits for broadcast, multicast, and unknown unicast 193
traffic
Monitor 199
System 199
Ports 204
State Displays a graphic image of the front panel indicating active 204
port connections
QoS Statistics Shows the number of packets entering and leaving the 205
egress queues
QCL Status Shows the status of QoS Control List entries 206
Security 210
Access Displays the number of packets used to manage the switch 210
Management via HTTP, HTTPS, and SNMP, Telnet, and SSH
Statistics
Network
– 36 –
CHAPTER 3 | Using the Web Interface
Navigating the Web Browser Interface
Port Security
Switch Shows information about MAC address learning for each 211
port, including the software module requesting port security
services, the service state, the current number of learned
addresses, and the maximum number of secure addresses
allowed
ACL Status Shows the status for different security modules which use 219
ACL filtering, including ingress port, frame type, and
forwarding action
Snooping Shows statistics for various types of DHCP protocol packets 221
Statistics
Relay Displays server and client statistics for packets affected by 222
Statistics the relay information policy
ARP Inspection Displays entries in the ARP inspection table, sorted first by 223
port, then VLAN ID, MAC address, and finally IP address
IP Source Guard Displays entries in the IP Source Guard table, sorted first by 224
port, then VLAN ID, MAC address, and finally IP address
RADIUS Details Displays the traffic and status associated with each 226
configured RADIUS server
System Status Displays administration key and associated local ports for 229
each partner
Port Status Displays administration key, LAG ID, partner ID, and partner 230
ports for each local port
Bridge Status Displays global bridge and port settings for STA 232
Port Status Displays STA role, state, and uptime for each port 234
Port Statistics Displays statistics for RSTP, STP and TCN protocol packets 235
Statistics Shows statistics for IGMP protocol messages used by MVR 236
Group Information Shows information about the interfaces associated with 237
multicast groups assigned to the MVR VLAN
– 37 –
CHAPTER 3 | Using the Web Interface
Navigating the Web Browser Interface
IPMC IP Multicast
PoE Displays status of all LLDP PoE neighbors, including power 250
device type (PSE or PD), source of power, power priority, and
maximum required power
Port Statistics Displays statistics for all connected remote devices, and 249
statistics for LLDP protocol packets crossing each port
PoE Displays the status for all PoE ports, including the PD class, 251
requested power, allocated power, power and current used,
and PoE priority
MAC Table Displays dynamic and static address entries associated with 252
the CPU and each port
VLAN Membership Shows the current port members for all VLANs configured by 253
a selected software module
VLAN Port Shows the VLAN attributes of port members for all VLANs 254
configured by a selected software module which uses VLAN
management, including PVID, VLAN aware, ingress filtering,
frame type, egress filtering, and PVID
Diagnostics 257
– 38 –
CHAPTER 3 | Using the Web Interface
Navigating the Web Browser Interface
VeriPHY Performs cable diagnostics for all ports or selected port to 258
diagnose any cable faults (short, open etc.) and report the
cable length
Maintenance 261
Software Upload Updates software on the switch with a file specified on the 262
management station
Configuration 263
– 39 –
CHAPTER 3 | Using the Web Interface
Navigating the Web Browser Interface
– 40 –
4 CONFIGURING THE SWITCH
PATH
Configuration, System, Information
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure System Information:
3. Click Save.
– 41 –
CHAPTER 4 | Configuring the Switch
Setting an IP Address
SETTING AN IP ADDRESS
This section describes how to configure an IP interface for management
access to the switch over the network. This switch supports both IP Version
4 and Version 6, and can be managed simultaneously through either of
these address types. You can manually configure a specific IPv4 or IPv6
address or direct the switch to obtain an IPv4 address from a DHCP server
when it is powered on. An IPv6 address can either be manually configured
or dynamically generated.
SETTING AN IPV4 Use the IP Configuration page to configure an IPv4 address for the switch.
ADDRESS The IP address for the switch is obtained via DHCP by default for VLAN 1.
To manually configure an address, you need to change the switch's default
settings to values that are compatible with your network. You may also
need to a establish a default gateway between the switch and management
stations that exist on another network segment.
NOTE: An IPv4 address for this switch is obtained via DHCP by default. If
the switch does not receive a response from a DHCP server, it will default
to the IP address 192.168.2.10 and subnet mask 255.255.255.0.
PATH
Configuration, System, IP
PARAMETERS
These parameters are displayed:
IP Configuration
– 42 –
CHAPTER 4 | Configuring the Switch
Setting an IP Address
will not function until a reply has been received from the server.
Requests will be broadcast periodically by the switch for an IP address.
DHCP values can include the IP address, subnet mask, and default
gateway. (Default: Enabled)
◆ IP Mask – This mask identifies the host address bits used for routing
to specific subnets. (Default: 255.255.255.0)
WEB INTERFACE
To configure an IP address:
2. Specify the IPv4 settings, and enable DNS proxy service if required.
3. Click Save.
– 43 –
CHAPTER 4 | Configuring the Switch
Setting an IP Address
Figure 4: IP Configuration
SETTING AN IPV6 Use the IPv6 Configuration page to configure an IPv6 address for
ADDRESS management access to the switch.
IPv6 includes two distinct address types - link-local unicast and global
unicast. A link-local address makes the switch accessible over IPv6 for all
devices attached to the same local subnet. Management traffic using this
kind of address cannot be passed by any router outside of the subnet. A
link-local address is easy to set up, and may be useful for simple networks
or basic troubleshooting tasks. However, to connect to a larger network
with multiple segments, the switch must be configured with a global
unicast address. A link-local address must be manually configured, but a
global unicast address can either be manually configured or dynamically
assigned.
PATH
Configuration, System, IPv6
USAGE GUIDELINES
◆ All IPv6 addresses must be formatted according to RFC 2373 “IPv6
Addressing Architecture,” using 8 colon-separated 16-bit hexadecimal
values. One double colon may be used in the address to indicate the
appropriate number of zeros required to fill the undefined fields.
– 44 –
CHAPTER 4 | Configuring the Switch
Setting an IP Address
PARAMETERS
These parameters are displayed:
Note that the default prefix length of 96 bits specifies that the first six
colon-separated values comprise the network portion of the address.
◆ Router – Sets the IPv6 address of the default next hop router.
An IPv6 default gateway must be defined if the management station is
located in a different IPv6 segment.
An IPv6 default gateway can only be successfully set when a network
interface that directly connects to the gateway has been configured on
the switch.
WEB INTERFACE
To configure an IPv6 address:
3. Click Save.
– 45 –
CHAPTER 4 | Configuring the Switch
Configuring NTP Service
When the NTP client is enabled, the switch periodically sends a request for
a time update to a configured time server. You can configure up to five time
server IP addresses. The switch will attempt to poll each server in the
configured sequence.
PATH
Configuration, System, NTP
PARAMETERS
These parameters are displayed:
◆ Server – Sets the IPv4 or IPv6 address for up to five time servers. The
switch attempts to update the time from the first server, if this fails it
attempts an update from the next server in the sequence. The polling
interval is fixed at 15 minutes.
WEB INTERFACE
To configure the NTP servers:
3. Click Save.
– 46 –
CHAPTER 4 | Configuring the Switch
Configuring Remote Log Messages
PATH
Configuration, System, Log
COMMAND USAGE
When remote logging is enabled, system log messages are sent to the
designated server. The syslog protocol is based on UDP and received on
UDP port 514. UDP is a connectionless protocol and does not provide
acknowledgments. The syslog packet will always be sent out even if the
syslog server does not exist.
PARAMETERS
These parameters are displayed:
◆ Syslog Level – Limits log messages that are sent to the remote syslog
server for the specified types. Messages options include the following:
■ Info – Send informations, warnings and errors. (Default setting)
■ Warning – Send warnings and errors.
■ Error – Send errors.
– 47 –
CHAPTER 4 | Configuring the Switch
Configuring Power Reduction
WEB INTERFACE
To configure the logging of error messages to remote servers:
2. Enable remote logging, enter the IP address of the remote server, and
specify the type of syslog messages to send.
3. Click Apply.
CONTROLLING LED Use the LED Power Reduction Configuration page to reduces LED intensity
INTENSITY during specified hours.
PATH
Configuration, Power Reduction, LED
COMMAND USAGE
◆ The LEDs power consumption can be reduced by lowering the intensity.
LED intensity could for example be lowered during night time, or turned
completely off. It is possible to set the LEDs intensity for each of the 24
hours of the day.
– 48 –
CHAPTER 4 | Configuring the Switch
Configuring Power Reduction
PARAMETERS
These parameters are displayed:
Maintenance
WEB INTERFACE
To configure LED intensity:
2. Set LED intensity for any required hour of the day. Click Add Time to set
additional entries.
4. Specify whether or not to use full intensity when a link error occurs.
5. Click Apply.
– 49 –
CHAPTER 4 | Configuring the Switch
Configuring Power Reduction
REDUCING POWER TO Use the EEE Configuration page to configure Energy Efficient Ethernet
IDLE QUEUE CIRCUITS (EEE) for specified queues, and to specify urgent queues which are to
transmit data after maximum latency expires regardless of queue length.
PATH
Configuration, Power Reduction, EEE
COMMAND USAGE
◆ EEE works by powering down circuits when there is no traffic. When a
port gets data to be transmitted all relevant circuits are powered up.
The time it takes to power up the circuits is call the wakeup time. The
default wakeup time is 17 µs for 1 Gbps links and 30 µs for other link
speeds. EEE devices must agree upon the value of the wakeup time in
order to make sure that both the receiving and transmitting devices
have all circuits powered up when traffic is transmitted. The devices
can exchange information about the device wakeup time using LLDP
protocol.
To maximize power savings, the circuit is not started as soon as data is
ready to be transmitted from a port, but instead waits until 3000 bytes
of data is queued at the port. To avoid introducing a large delay when
the queued data is less then 3000 bytes, data is always transmitted
after 48 µs, giving a maximum latency of 48 µs plus the wakeup time.
PARAMETERS
These parameters are displayed:
◆ EEE Urgent Queues – Specifies which are to transmit data after the
maximum latency expires regardless queue length.
WEB INTERFACE
To configure the power reduction for idle queue circuits:
4. Click Save.
– 50 –
CHAPTER 4 | Configuring the Switch
Configuring Thermal Protection
PATH
Configuration, Thermal Protection
COMMAND USAGE
Thermal protection is used to protect the switch ASIC from overheating.
When the internal temperature of the switch exceeds a specified protection
level, ports can be turned off to decrease power consumption. Port shut
down can be prioritized based on assigned temperatures.
PARAMETERS
These parameters are displayed:
Port priorities
◆ Priority – The priority level at which to shut down a port. (Range: 0-3)
– 51 –
CHAPTER 4 | Configuring the Switch
Configuring Port Connections
WEB INTERFACE
To configure the thermal protection:
4. Click Save.
PATH
Configuration, Ports
PARAMETERS
These parameters are displayed:
– 52 –
CHAPTER 4 | Configuring the Switch
Configuring Port Connections
◆ Speed – Sets the port speed and duplex mode using auto-negotiation
or manual selection. The following options are supported:
■ Disabled - Disables the interface. You can disable an interface due
to abnormal behavior (e.g., excessive collisions), and then re-
enable it after the problem has been resolved. You may also disable
an interface for security reasons.
■ Auto - Enables auto-negotiation. When using auto-negotiation, the
optimal settings will be negotiated between the link partners based
on their advertised capabilities.
■ 1Gbps FDX - Supports 1 Gbps full-duplex operation
■ 100Mbps FDX - Supports 100 Mbps full-duplex operation
■ 100Mbps HDX - Supports 100 Mbps half-duplex operation
■ 10Mbps FDX - Supports 10 Mbps full-duplex operation
■ 10Mbps HDX - Supports 10 Mbps half-duplex operation
(Default: Autonegotiation enabled; Advertised capabilities for
RJ-45: 1000BASE-T - 10half, 10full, 100half, 100full, 1000full;
SFP: 1000BASE-SX/LX/LH - 1000full)
NOTE: The 1000BASE-T standard does not support forced mode. Auto-
negotiation should always be used to establish a connection over any
1000BASE-T port or trunk. If not used, the success of the link process
cannot be guaranteed when connecting to other types of switches.
◆ Maximum Frame Size – Sets the maximum transfer unit for traffic
crossing the switch. Packets exceeding the maximum frame size are
dropped. (Range: 9600-1518 bytes; Default: 9600 bytes)
– 53 –
CHAPTER 4 | Configuring the Switch
Configuring Port Connections
WEB INTERFACE
To configure port connection settings:
3. Click Save.
– 54 –
CHAPTER 4 | Configuring the Switch
Configuring Security
CONFIGURING SECURITY
You can configure this switch to authenticate users logging into the system
for management access or to control client access to the data ports.
CONFIGURING USER Use the User Configuration page to control management access to the
ACCOUNTS switch based on manually configured user names and passwords.
PATH
Configuration, Security, Switch, Users
COMMAND USAGE
◆ The default guest name is “guest” with the password “guest.” The
default administrator name is “admin” with the password “admin.”
◆ The guest only has read access for most configuration parameters.
However, the administrator has write access for all parameters
governing the onboard agent. You should therefore assign a new
administrator password as soon as possible, and store it in a safe place.
◆ The administrator has a privilege level of 15, with access to all process
groups and full control over the device. If the privilege level is set to
any other value, the system will refer to each group privilege level. The
user's privilege should be same or greater than the group privilege
level to have the access of a group. By default, most of the group
privilege levels are set to 5 which provides read-only access and
privilege level 10 which also provides read/write access. To perform
system maintenance (software upload, factory defaults, etc.) the user’s
privilege level should be set to 15. Generally, the privilege level 15 can
– 55 –
CHAPTER 4 | Configuring the Switch
Configuring Security
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To show user accounts:
4. Click Save.
– 56 –
CHAPTER 4 | Configuring the Switch
Configuring Security
CONFIGURING USER Use the Privilege Levels page to set the privilege level required to read or
PRIVILEGE LEVELS configure specific software modules or system settings.
PATH
Configuration, Security, Switch, Privilege Levels
PARAMETERS
These parameters are displayed:
– 57 –
CHAPTER 4 | Configuring the Switch
Configuring Security
WEB INTERFACE
To configure privilege levels:
2. Set the required privilege level for any software module or functional
group.
3. Click Save.
– 58 –
CHAPTER 4 | Configuring the Switch
Configuring Security
CONFIGURING THE Use the Authentication Method Configuration page to specify the
AUTHENTICATION authentication method for controlling management access through the
METHOD FOR console, Telnet, SSH or HTTP/HTTPS. Access can be based on the (local)
user name and password configured on the switch, or can be controlled
MANAGEMENT ACCESS with a RADIUS or TACACS+ remote access authentication server. Note that
the RADIUS servers used to authenticate client access for IEEE 802.1X port
authentication are also configured on this page (see page 77).
Web
PATH
Configuration, Security, Switch, Auth Method
USAGE GUIDELINES
◆ The switch supports the following authentication services:
■ Authorization of users that access the Telnet, SSH, the web, or
console management interfaces on the switch.
■ Accounting for users that access the Telnet, SSH, the web, or
console management interfaces on the switch.
■ Accounting for IEEE 802.1X authenticated users that access the
network through the switch. This accounting can be used to provide
reports, auditing, and billing for services that users have accessed.
– 59 –
CHAPTER 4 | Configuring the Switch
Configuring Security
NOTE: This guide assumes that RADIUS and TACACS+ servers have already
been configured to support AAA. The configuration of RADIUS and
TACACS+ server software is beyond the scope of this guide. Refer to the
documentation provided with the RADIUS and TACACS+ server software.
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure authentication for management access:
3. Click Save.
– 60 –
CHAPTER 4 | Configuring the Switch
Configuring Security
CONFIGURING SSH Use the SSH Configuration page to configure access to the Secure Shell
(SSH) management interface. SSH provides remote management access to
this switch as a secure replacement for Telnet. When the client contacts the
switch via the SSH protocol, the switch generates a public-key that the
client uses along with a local user name and password for access
authentication. SSH also encrypts all data transfers passing between the
switch and SSH-enabled management station clients, and ensures that
data traveling over the network arrives unaltered.
PATH
Configuration, Security, Switch, SSH
USAGE GUIDELINES
◆ You need to install an SSH client on the management station to access
the switch for management via the SSH protocol. The switch supports
both SSH Version 1.5 and 2.0 clients.
◆ The SSH service on the switch supports up to four client sessions. The
maximum number of client sessions includes both current Telnet
sessions and SSH sessions.
PARAMETERS
These parameters are displayed:
– 61 –
CHAPTER 4 | Configuring the Switch
Configuring Security
WEB INTERFACE
To configure SSH:
3. Click Save.
CONFIGURING HTTPS Use the HTTPS Configuration page to enable the Secure Hypertext Transfer
Protocol (HTTPS) over the Secure Socket Layer (SSL). HTTPS provides
secure access (i.e., an encrypted connection) to the switch's web interface.
PATH
Configuration, Security, Switch, HTTPS
USAGE GUIDELINES
◆ If you enable HTTPS, you must indicate this in the URL that you specify
in your browser: https://device[:port-number]
– 62 –
CHAPTER 4 | Configuring the Switch
Configuring Security
Internet Explorer 5.0 or later Windows 98,Windows NT (with service pack 6a),
Windows 2000, Windows XP, Windows Vista, Windows 7
Mozilla Firefox 2.0.0.0 or later Windows 2000, Windows XP, Windows Vista, Linux
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure HTTPS:
3. Click Save.
PATH
Configuration, Security, Switch, Access Management
– 63 –
CHAPTER 4 | Configuring the Switch
Configuring Security
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure addresses allowed access to management interfaces on the
switch:
5. Mark the protocols to restrict based on the specified address range. The
following example shows how to restrict management access for all
protocols to a specific address range.
6. Click Save.
– 64 –
CHAPTER 4 | Configuring the Switch
Configuring Security
The switch includes an onboard agent that supports SNMP versions 1, 2c,
and 3. This agent continuously monitors the status of the switch hardware,
as well as the traffic passing through its ports. A network management
station can access this information using software such as HP OpenView.
Access to the onboard agent from clients using SNMP v1 and v2c is
controlled by community strings. To communicate with the switch, the
management station must first submit a valid community string for
authentication.
Access to the switch using from clients using SNMPv3 provides additional
security features that cover message integrity, authentication, and
encryption; as well as controlling user access to specific areas of the MIB
tree.
Model Level Community String Group Read View Write View Security
v1 noAuth user defined user defined user defined user defined Community string only
NoPriv
v2c noAuth user defined user defined user defined user defined Community string only
NoPriv
– 65 –
CHAPTER 4 | Configuring the Switch
Configuring Security
Model Level Community String Group Read View Write View Security
v3 noAuth user defined default_rw_group default_view default_view A user name match only
NoPriv
v3 Auth user defined user defined user defined user defined Provides user authentication
NoPriv via MD5 or SHA algorithms
v3 Auth Priv user defined user defined user defined user defined Provides user authentication
via MD5 or SHA algorithms
and data privacy using DES
56-bit encryption
NOTE: The predefined default groups and view can be deleted from the
system. You can then define customized groups and views for the SNMP
clients that require access.
PATH
Configuration, Security, Switch, SNMP, System
PARAMETERS
These parameters are displayed:
– 66 –
CHAPTER 4 | Configuring the Switch
Configuring Security
◆ Trap Version - Indicates if the target user is running SNMP v1, v2c, or
v3. (Default: SNMP v1)
– 67 –
CHAPTER 4 | Configuring the Switch
Configuring Security
NOTE: To select a name from this field, first enter an SNMPv3 user with the
same Trap Security Engine ID in the SNMPv3 Users Configuration menu
(see "Configuring SNMPv3 Users" on page 70).
WEB INTERFACE
To configure SNMP system and trap settings:
– 68 –
CHAPTER 4 | Configuring the Switch
Configuring Security
3. In the SNMP Trap Configuration table, enable the Trap Mode to allow
the switch to send SNMP traps. Specify the trap version, trap
community, and IP address of the management station that will receive
trap messages either as an IPv4 or IPv6 address. Select the trap types
to issue, and set the trap inform settings for SNMP v2c or v3 clients.
For SNMP v3 clients, configure the security engine ID and security
name used in v3 trap and inform messages.
4. Click Save.
PATH
Configuration, Security, Switch, SNMP, Communities
PARAMETERS
These parameters are displayed:
– 69 –
CHAPTER 4 | Configuring the Switch
Configuring Security
◆ Source Mask - Specifies the address mask for the SNMP client.
WEB INTERFACE
To configure SNMP community access strings:
2. Set the IP address and mask for the default community strings.
Otherwise, you should consider deleting these strings for security
reasons.
3. Add any new community strings required for SNMPv1 or v2 clients that
need to access the switch, along with the source address and address
mask for each client.
4. Click Save.
NOTE: Any user assigned through this page is associated with the group
assigned to the USM Security Model on the SNMPv3 Groups Configuration
page (page 72), and the views assigned to that group in the SNMPv3
Access Configuration page (page 74).
PATH
Configuration, Security, Switch, SNMP, Users
– 70 –
CHAPTER 4 | Configuring the Switch
Configuring Security
PARAMETERS
These parameters are displayed:
◆ Engine ID - The engine identifier for the SNMP agent on the remote
device where the user resides. (Range: 10-64 hex digits, excluding a
string of all 0’s or all F’s)
To send inform messages to an SNMPv3 user on a remote device, you
must first specify the engine identifier for the SNMP agent on the
remote device where the user resides. The remote engine ID is used to
compute the security digest for authenticating and encrypting packets
sent to a user on the remote host.
SNMP passwords are localized using the engine ID of the authoritative
agent. For informs, the authoritative SNMP agent is the remote agent.
You therefore need to configure the remote agent's SNMP engine ID
before you can send proxy requests or informs to it. (See "Configuring
SNMP System and Trap Settings" on page 66.)
◆ Privacy Protocol - The encryption algorithm use for data privacy; only
56-bit DES is currently available. (Options: None, DES; Default: DES)
WEB INTERFACE
To configure SNMPv3 users:
– 71 –
CHAPTER 4 | Configuring the Switch
Configuring Security
5. Click Save.
PATH
Configuration, Security, Switch, SNMP, Groups
PARAMETERS
These parameters are displayed:
◆ Security Model - The user security model. (Options: SNMP v1, v2c, or
the User-based Security Model – usm).
◆ Group Name - The name of the SNMP group. (Range: 1-32 characters,
ASCII characters 33-126 only)
WEB INTERFACE
To configure SNMPv3 groups:
– 72 –
CHAPTER 4 | Configuring the Switch
Configuring Security
4. Select the security name. For SNMP v1 and v2c, the security names
displayed are based on the those configured in the SNMPv3
Communities menu. For USM, the security names displayed are based
on the those configured in the SNMPv3 Users Configuration menu.
5. Enter a group name. Note that the views assigned to a group must be
specified on the SNMP Accesses Configuration menu (see page 74).
6. Click Save.
CLI REFERENCES
"SNMP Commands" on page 330
PARAMETERS
These parameters are displayed:
◆ View Name - The name of the SNMP view. (Range: 1-32 characters,
ASCII characters 33-126 only)
◆ View Type - Indicates if the object identifier of a branch within the MIB
tree is included or excluded from the SNMP view. Generally, if the view
type of an entry is “excluded,” another entry of view type “included”
should exist and its OID subtree should overlap the “excluded” view
entry.
◆ OID Subtree - Object identifiers of branches within the MIB tree. Note
that the first character must be a period (.). Wild cards can be used to
mask a specific portion of the OID string using an asterisk.
(Length: 1-128)
– 73 –
CHAPTER 4 | Configuring the Switch
Configuring Security
WEB INTERFACE
To configure SNMPv3 views:
4. Click Save.
PATH
Configuration, Security, Switch, SNMP, Access
PARAMETERS
These parameters are displayed:
◆ Group Name - The name of the SNMP group. (Range: 1-32 characters,
ASCII characters 33-126 only)
◆ Security Model - The user security model. (Options: any, v1, v2c, or
the User-based Security Model – usm; Default: any)
◆ Read View Name - The configured view for read access. (Range: 1-32
characters, ASCII characters 33-126 only)
– 74 –
CHAPTER 4 | Configuring the Switch
Configuring Security
WEB INTERFACE
To configure SNMPv3 group access rights:
3. Specify the group name, security settings, read view, and write view.
4. Click Save.
CONFIGURING PORT Use the Port Security Limit Control Configuration page to limit the number
LIMIT CONTROLS of users accessing a given port. A user is identified by a MAC address and
VLAN ID. If Limit Control is enabled on a port, the maximum number of
users on the port is restricted to the specified limit. If this number is
exceeded, the switch makes the specified response.
PATH
Configuration, Security, Network, Limit Control
PARAMETERS
The following parameters are displayed on the Port Limit Control
Configuration page:
System Configuration
– 75 –
CHAPTER 4 | Configuring the Switch
Configuring Security
Port Configuration
◆ Action – If Limit is reached, the switch can take one of the following
actions:
■ None: Do not allow more than the specified Limit of MAC addresses
on the port, but take no further action.
■ Trap: If Limit + 1 MAC addresses is seen on the port, send an SNMP
trap. If Aging is disabled, only one SNMP trap will be sent, but with
Aging enabled, new SNMP traps will be sent every time the limit is
exceeded.
■ Shutdown: If Limit + 1 MAC addresses is seen on the port, shut
down the port. This implies that all secured MAC addresses will be
removed from the port, and no new addresses will be learned. Even
if the link is physically disconnected and reconnected on the port
(by disconnecting the cable), the port will remain shut down. There
are three ways to re-open the port:
■ Boot the switch,
■ Disable and re-enable Limit Control on the port or the switch,
■ Click the Reopen button.
■ Trap & Shutdown: If Limit + 1 MAC addresses is seen on the port,
both the “Trap” and the “Shutdown” actions described above will be
taken.
◆ State – This column shows the current state of the port as seen from
the Limit Control's point of view. The state takes one of four values:
■ Disabled: Limit Control is either globally disabled or disabled on the
port.
– 76 –
CHAPTER 4 | Configuring the Switch
Configuring Security
■ Ready: The limit is not yet reached. This can be shown for all
Actions.
■ Limit Reached: Indicates that the limit is reached on this port. This
state can only be shown if Action is set to None or Trap.
■ Shutdown: Indicates that the port is shut down by the Limit Control
module. This state can only be shown if Action is set to Shutdown or
Trap & Shutdown.
WEB INTERFACE
To configure port limit controls:
3. Set limit controls for any port, including status, maximum number of
addresses allowed, and the response to a violation.
4. Click Save.
CONFIGURING Network switches can provide open and easy access to network resources
AUTHENTICATION by simply attaching a client PC. Although this automatic configuration and
THROUGH NETWORK access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
ACCESS SERVERS
Use the Network Access Server Configuration page to configure IEEE
802.1X port-based and MAC-based authentication settings. The 802.1X
– 77 –
CHAPTER 4 | Configuring the Switch
Configuring Security
802.1x
client
This switch uses the Extensible Authentication Protocol over LANs (EAPOL)
to exchange authentication protocol messages with the client, and a
remote RADIUS authentication server to verify user identity and access
rights. These backend servers are configured on the AAA menu (see
page 109).
When a client (i.e., Supplicant) connects to a switch port, the switch (i.e.,
Authenticator) responds with an EAPOL identity request. The client
provides its identity (such as a user name) in an EAPOL response to the
switch, which it forwards to the RADIUS server. The RADIUS server verifies
the client identity and sends an access challenge back to the client. The
EAP packet from the RADIUS server contains not only the challenge, but
the authentication method to be used. The client can reject the
authentication method and request another, depending on the
configuration of the client software and the RADIUS server. The encryption
method used by IEEE 802.1X to pass authentication messages can be MD5
(Message-Digest 5), TLS (Transport Layer Security), PEAP (Protected
Extensible Authentication Protocol), or TTLS (Tunneled Transport Layer
Security). However, note that the only encryption method supported by
MAC-Based authentication is MD5. The client responds to the appropriate
method with its credentials, such as a password or certificate. The RADIUS
server verifies the client credentials and responds with an accept or reject
packet. If authentication is successful, the switch allows the client to
access the network. Otherwise, network access is denied and the port
remains blocked.
– 78 –
CHAPTER 4 | Configuring the Switch
Configuring Security
◆ The Admin State for each switch port that requires client authentication
must be set to 802.1X or MAC-based.
■ The RADIUS server and client also have to support the same EAP
authentication type - MD5, PEAP, TLS, or TTLS. (Native support for
these encryption methods is provided in Windows 7, Windows Vista,
Windows XP, and in Windows 2000 with Service Pack 4. To support
these encryption methods in Windows 95 and 98, you can use the
AEGIS dot1x client or other comparable client software.)
PATH
Configuration, Security, Network, NAS
USAGE GUIDELINES
When 802.1X is enabled, you need to configure the parameters for the
authentication process that runs between the client and the switch (i.e.,
authenticator), as well as the client identity lookup process that runs
between the switch and authentication server. These parameters are
described in this section.
PARAMETERS
These parameters are displayed:
– 79 –
CHAPTER 4 | Configuring the Switch
Configuring Security
System Configuration
◆ Mode - Indicates if 802.1X and MAC-based authentication are globally
enabled or disabled on the switch. If globally disabled, all ports are
allowed to forward frames.
◆ EAPOL Timeout - Sets the time the switch waits for a supplicant
response during an authentication session before retransmitting a
Request Identify EAPOL packet. (Range: 1-255 seconds; Default: 30
seconds)
◆ Aging Period - The period used to calculate when to age out a client
allowed access to the switch through Single 802.1X, Multi 802.1X, and
MAC-based authentication as described below. (Range: 10-1000000
seconds; Default: 300 seconds)
When the NAS module uses the Port Security module to secure MAC
addresses, the Port Security module needs to check for activity on the
MAC address in question at regular intervals and free resources if no
activity is seen within the given age period.
If reauthentication is enabled and the port is in a 802.1X-based mode,
this is not so critical, since supplicants that are no longer attached to
the port will get removed upon the next reauthentication, which will
fail. But if reauthentication is not enabled, the only way to free
resources is by aging the entries.
For ports in MAC-based Auth. mode, reauthentication does not cause
direct communication between the switch and the client, so this will not
detect whether the client is still attached or not, and the only way to
free any resources is to age the entry.
– 80 –
CHAPTER 4 | Configuring the Switch
Configuring Security
– 81 –
CHAPTER 4 | Configuring the Switch
Configuring Security
■ When the last user logs off on a port with a dynamic QoS
assignment, the switch restores the original QoS configuration for
the port.
■ While a port has an assigned dynamic QoS profile, any manual QoS
configuration changes only take effect after all users have logged
off the port.
– 82 –
CHAPTER 4 | Configuring the Switch
Configuring Security
NOTE: For trouble-shooting VLAN assignments, use the Monitor > VLANs >
VLAN Membership and VLAN Port pages. These pages show which modules
have (temporarily) overridden the current Port VLAN configuration.
– 83 –
CHAPTER 4 | Configuring the Switch
Configuring Security
NOTE: For trouble-shooting VLAN assignments, use the Monitor > VLANs >
VLAN Membership and VLAN Port pages. These pages show which modules
have (temporarily) overridden the current Port VLAN configuration.
◆ Guest VLAN ID - This is the value that a port's Port VLAN ID is set to if
a port is moved into the Guest VLAN. It is only changeable if the Guest
VLAN option is globally enabled. (Range: 1-4095)
◆ Max. Reauth. Count - The number of times that the switch transmits
an EAPOL Request Identity frame without receiving a response before
adding a port to the Guest VLAN. The value can only be changed if the
Guest VLAN option is globally enabled. (Range: 1-255)
– 84 –
CHAPTER 4 | Configuring the Switch
Configuring Security
Port Configuration
◆ Port – Port identifier.
– 85 –
CHAPTER 4 | Configuring the Switch
Configuring Security
– 86 –
CHAPTER 4 | Configuring the Switch
Configuring Security
WEB INTERFACE
To configure 802.1X Port Security:
– 87 –
CHAPTER 4 | Configuring the Switch
Configuring Security
3. Click Save.
FILTERING TRAFFIC An Access Control List (ACL) is a sequential list of permit or deny
WITH ACCESS conditions that apply to IP addresses, MAC addresses, or other more
CONTROL LISTS specific criteria. This switch tests ingress packets against the conditions in
an ACL one by one. A packet will be accepted as soon as it matches a
permit rule, or dropped as soon as it matches a deny rule. If no rules
match, the frame is accepted. Other actions can also be invoked when a
matching packet is found, including rate limiting, copying matching packets
to another port or to the system log, or shutting down a port.
PATH
Configuration, Security, Network, ACL, Ports
– 88 –
CHAPTER 4 | Configuring the Switch
Configuring Security
PARAMETERS
These parameters are displayed:
◆ Counter - The number of frames which have matched any of the rules
defined in the selected policy.
WEB INTERFACE
To configure ACL policies and responses for a port:
– 89 –
CHAPTER 4 | Configuring the Switch
Configuring Security
3. Repeat the preceding step for each port to which an ACL will be applied.
4. Click Save.
PATH
Configuration, Security, Network, ACL, Rate Limiters
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure rate limits which can be applied to a port:
2. For any of the rate limiters, select the maximum ingress rate that will
be supported on a port once a match has been found in an assigned
ACL.
3. Click Save.
– 90 –
CHAPTER 4 | Configuring the Switch
Configuring Security
PATH
Configuration, Security, Network, ACL, Access Control List
USAGE GUIDELINES
◆ Rules within an ACL are checked in the configured order, from top to
bottom. A packet will be accepted as soon as it matches a permit rule,
or dropped as soon as it matches a deny rule. If no rules match, the
frame is accepted.
◆ The maximum number of ACL rules that can be bound to a port is 10.
■ Any frame type (based on MAC address, VLAN ID, VLAN priority)
– 91 –
CHAPTER 4 | Configuring the Switch
Configuring Security
PARAMETERS
These parameters are displayed:
◆ Port Copy - Shows the port to which matching frames are copied.
The following buttons are used to edit or move the ACL entry (ACE):
Button Description
The lowest plus sign adds a new entry at the bottom of the list.
– 92 –
CHAPTER 4 | Configuring the Switch
Configuring Security
ACE CONFIGURATION
◆ Ingress Port - Any port, port identifier, or policy. (Options: Any port,
Port 1-10, Policy 1-8; Default: Any)
◆ Ethernet:
MAC Parameters
◆ ARP:
MAC Parameters
ARP Parameters
– 93 –
CHAPTER 4 | Configuring the Switch
Configuring Security
opcode flag set, Reply - frame must have ARP Reply or RARP Reply
opcode flag; Default: Any)
– 94 –
CHAPTER 4 | Configuring the Switch
Configuring Security
◆ IPv4:
MAC Parameters
IP Parameters
ICMP Parameters
UDP Parameters
■ Source Port Filter - Specifies the UDP source filter for this rule.
(Options: Any, Specific (0-65535), Range (0-65535);
Default: Any)
■ Dest. Port Filter - Specifies the UDP destination filter for this
rule. (Options: Any, Specific (0-65535), Range (0-65535);
Default: Any)
TCP Parameters
■ Source Port Filter - Specifies the TCP source filter for this rule.
(Options: Any, Specific (0-65535), Range (0-65535);
Default: Any)
■ Dest. Port Filter - Specifies the TCP destination filter for this
rule. (Options: Any, Specific (0-65535), Range (0-65535);
Default: Any)
■ TCP FIN - Specifies the TCP “No more data from sender” (FIN)
value for this rule. (Options: Any - any value is allowed, 0 - TCP
frames where the FIN field is set must not match this entry,
1 - TCP frames where the FIN field is set must match this entry;
Default: Any)
– 95 –
CHAPTER 4 | Configuring the Switch
Configuring Security
entry, 1 - TCP frames where the SYN field is set must match this
entry; Default: Any)
■ TCP RST - Specifies the TCP “Reset the connection” (RST) value
for this rule. (Options: Any - any value is allowed, 0 - TCP
frames where the RST field is set must not match this entry, 1 -
TCP frames where the RST field is set must match this entry;
Default: Any)
■ TCP PSH - Specifies the TCP “Push Function” (PSH) value for
this rule. (Options: Any - any value is allowed, 0 - TCP frames
where the PSH field is set must not match this entry, 1 - TCP
frames where the PSH field is set must match this entry;
Default: Any)
■ IP Option - Specifies the options flag setting for this rule. (Options:
Any - any value is allowed, Yes - IPv4 frames where the options flag
is set must match this entry, No - IPv4 frames where the options
flag is set must not match this entry; Default: Any)
– 96 –
CHAPTER 4 | Configuring the Switch
Configuring Security
◆ Rate Limiter - Specifies a rate limiter (page 90) to apply to the port.
(Range: 1-16; Default: Disabled)
VLAN Parameters
◆ Tag Priority - Specifies the User Priority value found in the VLAN tag
(3 bits as defined by IEEE 802.1p) to match for this rule. (Options: Any,
Specific (0-7); Default: Any)
– 97 –
CHAPTER 4 | Configuring the Switch
Configuring Security
WEB INTERFACE
To configure an Access Control List for a port or a policy:
2. Click the button to add a new ACL, or use the other ACL
modification buttons to specify the editing action (i.e., edit, delete, or
moving the relative position of entry in the list).
3. When editing an entry on the ACE Configuration page, note that the
items displayed depend on various selections, such as Frame Type and
IP Protocol Type. Specify the relevant criteria to be matched for this
rule, and set the actions to take when a rule is matched (such as Rate
Limiter, Port Copy, Logging, and Shutdown).
4. Click Save.
– 98 –
CHAPTER 4 | Configuring the Switch
Configuring Security
CONFIGURING DHCP Use the DHCP Snooping Configuration page to filter IP traffic on insecure
SNOOPING ports for which the source address cannot be identified via DHCP snooping.
The addresses assigned to DHCP clients on insecure ports can be carefully
controlled using the dynamic bindings registered with DHCP Snooping (or
using the static bindings configured with IP Source Guard). DHCP snooping
allows a switch to protect a network from rogue DHCP servers or other
devices which send port-related information to a DHCP server. This
information can be useful in tracking an IP address back to a physical port.
PATH
Configuration, Security, Network, DHCP, Snooping
COMMAND USAGE
DHCP Snooping Process
◆ Table entries are only learned for trusted interfaces. An entry is added
or removed dynamically to the DHCP snooping table when a client
receives or releases an IP address from a DHCP server. Each entry
includes a MAC address, IP address, lease time, VLAN identifier, and
port identifier.
– 99 –
CHAPTER 4 | Configuring the Switch
Configuring Security
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure DHCP Snooping:
2. Set the status for the global DHCP snooping process, and set any ports
within the local network or firewall to trusted.
3. Click Apply
– 100 –
CHAPTER 4 | Configuring the Switch
Configuring Security
CONFIGURING DHCP Use the DHCP Relay Configuration page to configure DHCP relay service for
RELAY AND OPTION 82 attached host devices. If a subnet does not include a DHCP server, you can
INFORMATION relay DHCP client requests to a DHCP server on another subnet.
When DHCP relay is enabled and the switch sees a DHCP request
broadcast, it inserts its own IP address into the request (so that the DHCP
server knows the subnet of the client), then forwards the packet to the
DHCP server. When the server receives the DHCP request, it allocates a
free IP address for the DHCP client from its defined scope for the DHCP
client's subnet, and sends a DHCP response back to the switch. The switch
then broadcasts the DHCP response to the client.
DHCP also provides a mechanism for sending information about the switch
and its DHCP clients to the DHCP server. Known as DHCP Option 82, it
allows compatible DHCP servers to use the information when assigning IP
addresses, or to set other services or policies for clients.
Using DHCP Relay Option 82, clients can be identified by the VLAN and
switch port to which they are connected rather than just their MAC
address. DHCP client-server exchange messages are then forwarded
directly between the server and client without having to flood them to the
entire VLAN.
In some cases, the switch may receive DHCP packets from a client that
already includes DHCP Option 82 information. The switch can be configured
to set the action policy for these packets. Either the switch can drop
packets that already contain Option 82 information, keep the existing
information, or replace it with the switch's relay information.
PATH
Configuration, Security, Network, DHCP, Relay
– 101 –
CHAPTER 4 | Configuring the Switch
Configuring Security
PARAMETERS
These parameters are displayed:
◆ Relay Information Policy - Sets the DHCP relay policy for DHCP
client packets that include Option 82 information.
■ Replace - Overwrites the DHCP client packet information with the
switch's relay information. (This is the default.)
■ Keep - Retains the client's DHCP information.
■ Drop - Drops the packet when it receives a DHCP message that
already contains relay information.
WEB INTERFACE
To configure DHCP Relay:
2. Enable the DHCP relay function, specify the DHCP server’s IP address,
enable Option 82 information mode, and set the policy by which to
handle relay information found in client packets.
3. Click Save.
– 102 –
CHAPTER 4 | Configuring the Switch
Configuring Security
PATH
Configuration, Security, Network, IP Source Guard, Configuration
COMMAND USAGE
◆ When IP Source Guard is enabled globally and on a port, the switch
checks the VLAN ID, source IP address, and port number against all
entries in the DHCP Snooping binding table and IP Source Guard Static
Table. If no matching entry is found, the packet is dropped.
◆ When enabled, traffic is filtered based upon dynamic entries learned via
DHCP snooping (see "Configuring DHCP Snooping"), or static addresses
configured in the source guard binding table.
PARAMETERS
These parameters are displayed:
– 103 –
CHAPTER 4 | Configuring the Switch
Configuring Security
WEB INTERFACE
To set the IP Source Guard filter for ports:
2. Enable or disable IP Source Guard globally and for any given ports.
4. Click Save.
Figure 34: Configuring Global and Port-based Settings for IP Source Guard
– 104 –
CHAPTER 4 | Configuring the Switch
Configuring Security
PATH
Configuration, Security, Network, IP Source Guard, Static Table
COMMAND USAGE
◆ Static addresses entered in the source guard binding table are
automatically configured with an infinite lease time. Dynamic entries
learned via DHCP snooping are configured by the DHCP server itself.
■ If there is no entry with the same VLAN ID and MAC address, a new
entry is added to the static IP source guard binding table.
■ If there is an entry with the same VLAN ID and MAC address, and
the type of entry is static IP source guard binding, then the new
entry will replace the old one.
■ If there is an entry with the same VLAN ID and MAC address, and
the type of the entry is dynamic DHCP snooping binding, then the
new entry will replace the old one and the entry type will be
changed to static IP source guard binding.
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure static bindings for IP Source Guard:
4. Click Save.
– 105 –
CHAPTER 4 | Configuring the Switch
Configuring Security
CONFIGURING ARP ARP Inspection is a security feature that validates the MAC Address
INSPECTION bindings for Address Resolution Protocol packets. It provides protection
against ARP traffic with invalid MAC-to-IP address bindings, which forms
the basis for certain “man-in-the-middle” attacks. This is accomplished by
intercepting all ARP requests and responses and verifying each of these
packets before the local ARP cache is updated or the packet is forwarded to
the appropriate destination. Invalid ARP packets are dropped.
COMMAND USAGE
Enabling & Disabling ARP Inspection
■ When ARP Inspection is enabled globally, all ARP request and reply
packets on inspection-enabled ports are redirected to the CPU and
their switching behavior handled by the ARP Inspection engine.
■ When ARP Inspection is disabled, all ARP request and reply packets
will bypass the ARP Inspection engine and their switching behavior
will match that of all other packets.
■ Disabling and then re-enabling global ARP Inspection will not affect
the ARP Inspection configuration of any ports.
– 106 –
CHAPTER 4 | Configuring the Switch
Configuring Security
◆ ARP Inspection uses the DHCP snooping bindings database for the list
of valid IP-to-MAC address bindings.
PATH
Configuration, Security, Network, ARP Inspection, Configuration
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure global and port settings for ARP Inspection:
3. Click Save.
– 107 –
CHAPTER 4 | Configuring the Switch
Configuring Security
Figure 36: Configuring Global and Port Settings for ARP Inspection
ARP Inspection uses the DHCP snooping bindings database for the list of
valid IP-to-MAC address bindings. Static ARP entries take precedence over
entries in the DHCP snooping bindings database. The switch first compares
ARP packets to any entries specified in the static ARP table. If no static
entry matches the packets, then the DHCP snooping bindings database
determines their validity.
PATH
Configuration, Security, Network, ARP Inspection, Static Table
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure the static ARP Inspection table:
– 108 –
CHAPTER 4 | Configuring the Switch
Configuring Security
4. Click Save.
NOTE: This guide assumes that RADIUS and TACACS+ servers have already
been configured to support AAA. The configuration of RADIUS and
TACACS+ server software is beyond the scope of this guide. Refer to the
documentation provided with the RADIUS and TACACS+ server software.
PATH
Configuration, Security, Network, AAA
PARAMETERS
These parameters are displayed:
◆ Timeout – The time the switch waits for a reply from an authentication
server before it resends the request. (Range: 3-3600 seconds;
Default: 15 seconds)
– 109 –
CHAPTER 4 | Configuring the Switch
Configuring Security
WEB INTERFACE
To configure authentication for management access in the web interface:
3. Click Save.
– 110 –
CHAPTER 4 | Configuring the Switch
Creating Trunk Groups
The switch supports both static trunking and dynamic Link Aggregation
Control Protocol (LACP). Static trunks have to be manually configured at
both ends of the link, and the switches must comply with the Cisco
EtherChannel standard. On the other hand, LACP configured ports can
automatically negotiate a trunked link with LACP-configured ports on
another device. You can configure any number of ports on the switch to use
LACP, as long as they are not already configured as part of a static trunk. If
ports on another device are also configured to use LACP, the switch and the
other device will negotiate a trunk between them. If an LACP trunk consists
of more than eight ports, all other ports will be placed in standby mode.
Should one link in the trunk fail, one of the standby ports will automatically
be activated to replace it.
USAGE GUIDELINES
Besides balancing the load across each port in the trunk, the other ports
provide redundancy by taking over the load if a port in the trunk fails.
However, before making any physical connections between devices,
configure the trunk on the devices at both ends. When using a port trunk,
take note of the following points:
◆ Any of the Gigabit ports on the front panel can be trunked together,
including ports of different media types.
◆ STP, VLAN, and IGMP settings can only be made for the entire trunk.
– 111 –
CHAPTER 4 | Configuring the Switch
Creating Trunk Groups
CONFIGURING STATIC Use the Aggregation Mode Configuration page to configure the aggregation
TRUNKS mode and members of each static trunk group.
PATH
Configuration, Aggregation, Static
USAGE GUIDELINES
◆ When configuring static trunks, you may not be able to link switches of
different types, depending on the manufacturer's implementation.
However, note that the static trunks on this switch are Cisco
EtherChannel compatible.
◆ To avoid creating a loop in the network, be sure you add a static trunk
via the configuration interface before connecting the ports, and also
disconnect the ports before removing a static trunk via the
configuration interface.
PARAMETERS
These parameters are displayed:
■ Source MAC Address – All traffic with the same source MAC
address is output on the same link in a trunk. This mode works best
for switch-to-switch trunk links where traffic through the switch is
received from many different hosts. (One of the defaults.)
– 112 –
CHAPTER 4 | Configuring the Switch
Creating Trunk Groups
■ TCP/UDP Port Number – All traffic with the same source and
destination TCP/UDP port number is output on the same link in a
trunk. Avoid using his mode as a lone option. It may overload a
single port member of the trunk for application traffic of a specific
type, such as web browsing. However, it can be used effectively in
combination with the IP Address option. (One of the defaults.)
WEB INTERFACE
To configure a static trunk:
4. Click Save.
– 113 –
CHAPTER 4 | Configuring the Switch
Creating Trunk Groups
CONFIGURING LACP Use the LACP Port Configuration page to enable LACP on selected ports,
configure the administrative key, and the protocol initiation mode.
PATH
Configuration, Aggregation, LACP
USAGE GUIDELINES
◆ To avoid creating a loop in the network, be sure you enable LACP before
connecting the ports, and also disconnect the ports before disabling
LACP.
◆ If the target switch has also enabled LACP on the connected ports, the
trunk will be activated automatically.
◆ If more than eight ports attached to the same target switch have LACP
enabled, the additional ports will be placed in standby mode, and will
only be enabled if one of the active links fails.
◆ All ports on both ends of an LACP trunk must be configured for full
duplex, either by forced mode or auto-negotiation.
– 114 –
CHAPTER 4 | Configuring the Switch
Creating Trunk Groups
■ Ports must have the same LACP Admin Key. Using auto-
configuration of the Admin Key will avoid this problem.
■ One of the ports at either the near end or far end must be set to
active initiation mode.
PARAMETERS
These parameters are displayed:
◆ Key – The LACP administration key must be set to the same value for
ports that belong to the same LAG. (Range: 0-65535; Default: Auto)
Select the Specific option to manually configure a key. Use the Auto
selection to automatically set the key based on the actual link speed,
where 10Mb = 1, 100Mb = 2, and 1Gb = 3.
WEB INTERFACE
To configure a dynamic trunk:
4. Set at least one of the ports in each LAG to Active initiation mode,
either at the near end or far end of the trunk.
5. Click Save.
– 115 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
– 116 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
x x Root
x Designated
Designated
Port
Port
x Bridge
x
Once a stable network topology has been established, all bridges listen for
Hello BPDUs (Bridge Protocol Data Units) transmitted from the Root Bridge.
If a bridge does not get a Hello BPDU after a predefined interval (Maximum
Age), the bridge assumes that the link to the Root Bridge is down. This
bridge will then initiate negotiations with other bridges to reconfigure the
network to reestablish a valid network topology.
Figure 42: MSTP Region, Internal Spanning Tree, Multiple Spanning Tree
– 117 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
CIST CST
Region 4 Region 4
IST
MSTP connects all bridges and LAN segments with a single Common and
Internal Spanning Tree (CIST). The CIST is formed as a result of the
running spanning tree algorithm between switches that support the STP,
RSTP, MSTP protocols.
Once you specify the VLANs to include in a Multiple Spanning Tree Instance
(MSTI), the protocol will automatically build an MSTI tree to maintain
connectivity among each of the VLANs. MSTP maintains contact with the
global network because each instance is treated as an RSTP node in the
Common Spanning Tree (CST).
CONFIGURING GLOBAL Use the STP Bridge Settings page to configure settings for STA which apply
SETTINGS FOR STA globally to the switch.
PATH
Configuration, Spanning Tree, Bridge Settings
COMMAND USAGE
◆ Spanning Tree Protocol1
Uses RSTP for the internal state machine, but sends only 802.1D
BPDUs. This creates one spanning tree instance for the entire network.
If multiple VLANs are implemented on a network, the path between
specific VLAN members may be inadvertently disabled to prevent
network loops, thus isolating group members. When operating multiple
VLANs, we recommend selecting the MSTP option.
– 118 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
■ STP Mode – If the switch receives an 802.1D BPDU (i.e., STP BPDU)
after a port’s migration delay timer expires, the switch assumes it is
connected to an 802.1D bridge and starts using only 802.1D
BPDUs.
MSTP generates a unique spanning tree for each instance. This provides
multiple pathways across the network, thereby balancing the traffic
load, preventing wide-scale disruption when a bridge node in a single
instance fails, and allowing for faster convergence of a new topology for
the failed instance.
PARAMETERS
These parameters are displayed:
Basic Settings
1. STP and RSTP BPDUs are transmitted as untagged frames, and will cross any VLAN
boundaries.
– 119 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
◆ Forward Delay – The maximum time (in seconds) this device will wait
before changing states (i.e., discarding to learning to forwarding). This
delay is required because every device must receive information about
topology changes before it starts to forward frames. In addition, each
port needs time to listen for conflicting information that would make it
return to a discarding state; otherwise, temporary data loops might
result.
Minimum: The higher of 4 or [(Max. Message Age / 2) + 1]
Maximum: 30
Default: 15
◆ Max Age – The maximum time (in seconds) a device can wait without
receiving a configuration message before attempting to reconfigure. All
device ports (except for designated ports) should receive configuration
messages at regular intervals. Any port that ages out STA information
(provided in the last configuration message) becomes the designated
port for the attached LAN. If it is a root port, a new root port is selected
from among the device ports attached to the network. (Note that
references to “ports” in this section mean “interfaces,” which includes
both ports and trunks.)
Minimum: The higher of 6 or [2 x (Hello Time + 1)]
Maximum: The lower of 40 or [2 x (Forward Delay - 1)]
Default: 20
◆ Transmit Hold Count – The number of BPDU's a bridge port can send
per second. When exceeded, transmission of the next BPDU will be
delayed. (Range: 1-10; Default: 6)
◆ Max Hop Count – The maximum number of hops allowed in the MST
region before a BPDU is discarded. (Range: 6-40; Default: 20)
An MST region is treated as a single node by the STP and RSTP
protocols. Therefore, the message age for BPDUs inside an MST region
is never changed. However, each spanning tree instance within a
region, and the common internal spanning tree (CIST) that connects
these instances use a hop count to specify the maximum number of
bridges that will propagate a BPDU. Each bridge decrements the hop
count by one before passing on the BPDU. When the hop count reaches
zero, the message is dropped.
– 120 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
Advanced Settings
◆ Edge Port BPDU Guard – This feature protects edge ports from
receiving BPDUs. It prevents loops by shutting down an edge port when
a BPDU is received instead of putting it into the spanning tree
discarding state. In a valid configuration, configured edge ports should
not receive BPDUs. If an edge port receives a BPDU, an invalid
configuration exists, such as a connection to an unauthorized device.
The BPDU guard feature provides a secure response to invalid
configurations because an administrator must manually enable the
port. (Default: Disabled)
◆ Port Error Recovery Timeout – The time that has to pass before a
port in the error-disabled state can be enabled. (Range: 30-86400
seconds or 24 hours)
WEB INTERFACE
To configure global settings for STA:
3. Click Save.
– 121 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
CONFIGURING Use the MSTI Mapping page to add VLAN groups to an MSTP instance
MULTIPLE SPANNING (MSTI), or to designate the name and revision of the VLAN-to-MSTI
TREES mapping used on this switch.
PATH
Configuration, Spanning Tree, MSTI Mapping
COMMAND USAGE
MSTP generates a unique spanning tree for each instance. This provides
multiple pathways across the network, thereby balancing the traffic load,
preventing wide-scale disruption when a bridge node in a single instance
fails, and allowing for faster convergence of a new topology for the failed
instance.
By default all VLANs are assigned to the Common Internal Spanning Tree
(CIST, or MST Instance 0) that connects all bridges and LANs within the
MST region. This switch supports up to 7 instances. You should try to group
VLANs which cover the same general area of your network. However,
remember that you must configure all bridges that exist within the same
MSTI Region with the same set of instances, and the same instance (on
each bridge) with the same set of VLANs. Also, note that RSTP treats each
MSTI region as a single node, connecting all regions to the CIST.
2. Add the VLANs that will share this MSTI on the MSTI Mapping page.
– 122 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
3. Enter the spanning tree priority for the CIST and selected MST instance
on the MSTI Priorities page.
NOTE: All VLANs are automatically added to the CIST (MST Instance 0).
To ensure that the MSTI maintains connectivity across the network, you
must configure a related set of bridges with the same MSTI settings.
PARAMETERS
These parameters are displayed:
Configuration Identification
MSTI Mapping
WEB INTERFACE
To add VLAN groups to an MSTP instance:
2. Enter the VLAN group to add to the instance in the VLANs Mapped
column. Note that the specified member does not have to be a
configured VLAN.
3. Click Save
2. The MST name and revision number are both required to uniquely identify an MST region.
– 123 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
CONFIGURING Use the MSTI Priorities page to configure the bridge priority for the CIST
SPANNING TREE and any configured MSTI. Remember that RSTP looks upon each MST
BRIDGE PRIORITIES Instance as a single bridge node.
PATH
Configuration, Spanning Tree, MSTI Properties
PARAMETERS
These parameters are displayed:
– 124 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
WEB INTERFACE
To add VLAN groups to an MSTP instance:
2. Set the bridge priority for the CIST or any configured MSTI.
3. Click Save
CONFIGURING Use the CIST Ports Configuration page to configure STA attributes for
STP/RSTP/CIST interfaces when the spanning tree mode is set to STP or RSTP, or for
INTERFACES interfaces in the CIST. STA interface attributes include path cost, port
priority, edge port (for fast forwarding), automatic detection of an edge
port, and point-to-point link type.
You may use a different priority or path cost for ports of the same media
type to indicate the preferred path, edge port to indicate if the attached
device can support fast forwarding, or link type to indicate a point-to-point
connection or shared-media connection. (References to “ports” in this
section means “interfaces,” which includes both ports and trunks.)
PATH
Configuration, Spanning Tree, CIST Ports
PARAMETERS
These parameters are displayed:
– 125 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
◆ Path Cost – This parameter is used by the STA to determine the best
path between devices. Therefore, lower values should be assigned to
ports attached to faster media, and higher values assigned to ports
with slower media. (Path cost takes precedence over port priority.)
By default, the system automatically detects the speed and duplex
mode used on each port, and configures the path cost according to the
values shown below.
◆ Priority – Defines the priority used for this port in the Spanning Tree
Algorithm. If the path cost for all ports on a switch are the same, the
port with the highest priority (i.e., lowest value) will be configured as
an active link in the Spanning Tree. This makes a port with higher
priority less likely to be blocked if the Spanning Tree Algorithm is
– 126 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
detecting network loops. Where more than one port is assigned the
highest priority, the port with lowest numeric identifier will be enabled.
(Range: 0-240, in steps of 16; Default: 128)
– 127 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
WEB INTERFACE
To configure settings for STP/RSTP/CIST interfaces:
3. Click Save.
– 128 –
CHAPTER 4 | Configuring the Switch
Configuring the Spanning Tree Algorithm
CONFIGURING MIST Use the MIST Ports Configuration page to configure STA attributes for
INTERFACES interfaces in a specific MSTI, including path cost, and port priority. You may
use a different priority or path cost for ports of the same media type to
indicate the preferred path. (References to “ports” in this section means
“interfaces,” which includes both ports and trunks.)
PATH
Configuration, Spanning Tree, MSTI Ports
PARAMETERS
These parameters are displayed:
◆ Path Cost – This parameter is used by the STA to determine the best
path between devices. Therefore, lower values should be assigned to
ports attached to faster media, and higher values assigned to ports
with slower media. (Path cost takes precedence over port priority.)
By default, the system automatically detects the speed and duplex
mode used on each port, and configures the path cost according to the
values shown in Table 9, Table 10 and Table 11.
◆ Priority – Defines the priority used for this port in the Spanning Tree
Algorithm. If the path cost for all ports on a switch are the same, the
port with the highest priority (i.e., lowest value) will be configured as
an active link in the Spanning Tree. This makes a port with higher
priority less likely to be blocked if the Spanning Tree Algorithm is
detecting network loops. Where more than one port is assigned the
highest priority, the port with lowest numeric identifier will be enabled.
(Range: 0-240, in steps of 16; Default: 128)
WEB INTERFACE
To configure settings for MSTP interfaces:
3. Click Save.
– 129 –
CHAPTER 4 | Configuring the Switch
Multicast VLAN Registration
MVR maintains the user isolation and data security provided by VLAN
segregation by passing only multicast traffic into other VLANs to which the
subscribers belong. Even though common multicast streams are passed
onto different VLAN groups from the MVR VLAN, users in different IEEE
802.1Q or private VLANs cannot exchange any information (except through
upper-level routing services).
– 130 –
CHAPTER 4 | Configuring the Switch
Multicast VLAN Registration
Multicast Router
Satellite Services
Service
Network
Multicast Server Layer 2 Switch Source
Port
Receiver
Ports
TV TV
PC
PATH
Configuration, MVR
COMMAND USAGE
◆ General Configuration Guidelines for MVR:
1. Enable MVR globally on the switch, and select the MVR VLAN.
2. Set the interfaces that will join the MVR as source ports or receiver
ports.
3. If you are sure that only one subscriber attached to an interface is
receiving multicast services, you can enable the immediate leave
function.
◆ Although MVR operates on the underlying mechanism of IGMP
snooping, the two features operate independently of each other. One
can be enabled or disabled without affecting the behavior of the other.
However, if IGMP snooping and MVR are both enabled, MVR reacts only
to join and leave messages from multicast groups configured under
MVR. Join and leave messages from all other multicast groups are
managed by IGMP snooping. Also, note that only IGMP version 2 or 3
hosts can issue multicast leave messages. Immediate leave therefore
cannot be used for IGMP version 1 clients.
PARAMETERS
These parameters are displayed:
MVR Configuration
◆ MVR Status – When MVR is enabled on the switch, any multicast data
associated with an MVR group is sent from all designated source ports,
to all receiver ports that have registered to receive data from that
multicast group. (Default: Disabled)
– 131 –
CHAPTER 4 | Configuring the Switch
Multicast VLAN Registration
◆ MVR VLAN – Identifier of the VLAN that serves as the channel for
streaming multicast services using MVR. MVR source ports should be
configured as members of the MVR VLAN, but MVR receiver ports
should not be manually configured as members of this VLAN.
(Default: 100)
Port Configuration
◆ Mode – Sets the MVR operational mode for any port. MVR must also be
globally enabled on the switch for this setting to take effect. MVR only
needs to be enabled on a receiver port if there are subscribers receiving
multicast traffic from one of the MVR groups. (Default: Disabled)
WEB INTERFACE
To configure global and interface settings for MVR:
2. Enable MVR globally on the switch, and select the MVR VLAN.
3. Set each port that will participate in the MVR protocol as a source port
or receiver port, and optionally enable Immediate Leave on any
receiver port to which only one subscriber is attached.
4. Click Save.
– 132 –
CHAPTER 4 | Configuring the Switch
IGMP Snooping
IGMP SNOOPING
Multicasting is used to support real-time applications such as
videoconferencing or streaming audio. A multicast server does not have to
establish a separate connection with each client. It merely broadcasts its
service to the network, and any hosts that want to receive the multicast
register with their local multicast switch/router. Although this approach
reduces the network overhead required by a multicast server, the
broadcast traffic must be carefully pruned at every multicast switch/router
it passes through to ensure that traffic is only passed on to the hosts which
subscribed to this service.
This switch can use Internet Group Management Protocol (IGMP) to filter
multicast traffic. IGMP Snooping can be used to passively monitor or
“snoop” on exchanges between attached hosts and an IGMP-enabled
device, most commonly a multicast router. In this way, the switch can
discover the ports that want to join a multicast group, and set its filters
accordingly.
– 133 –
CHAPTER 4 | Configuring the Switch
IGMP Snooping
CONFIGURING GLOBAL Use the IGMP Snooping Configuration page to configure global and port-
AND PORT-RELATED related settings which control the forwarding of multicast traffic. Based on
SETTINGS FOR IGMP the IGMP query and report messages, the switch forwards traffic only to
the ports that request multicast traffic. This prevents the switch from
SNOOPING broadcasting the traffic to all ports and possibly disrupting network
performance.
Multicast routers use information from IGMP snooping and query reports,
along with a multicast routing protocol such as DVMRP or PIM, to support
IP multicasting across the Internet.
PATH
Configuration, IPMC, IGMP Snooping, Basic Configuration
PARAMETERS
These parameters are displayed:
Global Configuration
◆ Snooping Enabled - When enabled, the switch will monitor network
traffic to determine which hosts want to receive multicast traffic.
(Default: Enabled)
This switch can passively snoop on IGMP Query and Report packets
transferred between IP multicast routers/switches and IP multicast host
groups to identify the IP multicast group members. It simply monitors
the IGMP packets passing through it, picks out the group registration
information, and configures the multicast filters accordingly.
– 134 –
CHAPTER 4 | Configuring the Switch
IGMP Snooping
last dynamic member port in the group, the receiving port is not a
router port, and no IGMPv1 member port exists in the group, the switch
will generate and send a group-specific (GS) query to the member port
which received the leave message, and then start the last member
query timer for that port.
When the conditions in the preceding item all apply, except that the
receiving port is a router port, then the switch will not send a GS-query,
but will immediately start the last member query timer for that port.
Leave proxy is also included in the general proxy function described
below. Therefore if Leave Proxy Enabled is not selected, but Proxy
Enabled is selected, leave proxy will still be performed.
– 135 –
CHAPTER 4 | Configuring the Switch
IGMP Snooping
If Fast Leave is enabled, the switch assumes that only one host is
connected to the interface. Therefore, Fast Leave should only be
enabled on an interface if it is connected to only one IGMP-enabled
device, either a service host or a neighbor running IGMP snooping.
Fast Leave is only effective if IGMP snooping is enabled, and IGMPv2 or
IGMPv3 snooping is used.
Fast Leave does not apply to a port if the switch has learned that a
multicast router is attached to it.
Fast Leave can improve bandwidth usage for a network which
frequently experiences many IGMP host add and leave requests.
WEB INTERFACE
To configure global and port-related settings for IGMP Snooping:
3. Click Save.
Figure 51: Configuring Global and Port-related Settings for IGMP Snooping
– 136 –
CHAPTER 4 | Configuring the Switch
IGMP Snooping
CONFIGURING VLAN Use the IGMP Snooping VLAN Configuration page to configure IGMP
SETTINGS FOR IGMP snooping and query for a VLAN interface
SNOOPING AND QUERY
PATH
Configuration, IPMC, IGMP Snooping, VLAN Configuration
PARAMETERS
These parameters are displayed:
◆ IGMP Querier - When enabled, the switch can serve as the Querier
(on the selected interface), which is responsible for asking hosts if they
want to receive multicast traffic. (Default: Disabled)
A router, or multicast-enabled switch, can periodically ask their hosts if
they want to receive multicast traffic. If there is more than one router/
switch on the LAN performing IP multicasting, one of these devices is
elected “querier” and assumes the role of querying the LAN for group
members. It then propagates the service requests on to any upstream
multicast switch/router to ensure that it will continue to receive the
multicast service. This feature is not supported for IGMPv3 snooping.
– 137 –
CHAPTER 4 | Configuring the Switch
IGMP Snooping
◆ LLQI - The Last Member Query Interval (RFC 3810 – MLDv2 for IP) is
used to configure the Last Member Query Interval for IGMP. This
attribute sets the interval to wait for a response to a group-specific or
group-and-source-specific query message. The overall time to wait for
a response (Last Member Query Time) is the value assigned to LLQI,
multiplied by the Last Member Query Count (which is fixed at 2).
(Range: 1-31744 tenths of a second in multiples of 10;
Default: 1 second)
When a multicast host leaves a group, it sends an IGMP leave message.
When the leave message is received by the switch, it checks to see if
this host is the last to leave the group by sending out an IGMP group-
specific or group-and-source-specific query message, and starts a
timer. If no reports are received before the timer expires, the group
record is deleted, and a report is sent to the upstream multicast router.
A reduced value will result in reduced time to detect the loss of the last
member of a group or source, but may generate more burst traffic.
This attribute will take effect only if IGMP snooping proxy reporting is
enabled (see page 140).
◆ URI - The Unsolicited Report Interval specifies how often the upstream
interface should transmit unsolicited IGMP reports when report
suppression/proxy reporting is enabled. (Range: 0-31744 seconds,
Default: 1 second)
WEB INTERFACE
To configure VLAN settings for IGMP snooping and query:
3. Click Save.
Figure 52: Configuring VLAN Settings for IGMP Snooping and Query
– 138 –
CHAPTER 4 | Configuring the Switch
IGMP Snooping
CONFIGURING IGMP Use the IGMP Snooping Port Group Filtering Configuration page to filter
FILTERING specific multicast traffic. In certain switch applications, the administrator
may want to control the multicast services that are available to end users;
for example, an IP/TV service based on a specific subscription plan. The
IGMP filtering feature fulfills this requirement by denying access to
specified multicast services on a switch port.
PATH
Configuration, IPMC, IGMP Snooping, Port Group Filtering
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure IGMP Snooping Port Group Filtering:
2. Click Add New Filtering Group to display a new entry in the table.
5. Click Save.
– 139 –
CHAPTER 4 | Configuring the Switch
MLD Snooping
MLD SNOOPING
Multicast Listener Discovery (MLD) snooping operates on IPv6 traffic and
performs a similar function to IGMP snooping for IPv4. That is, MLD
snooping dynamically configures switch ports to limit IPv6 multicast traffic
so that it is forwarded only to ports with users that want to receive it. This
reduces the flooding of IPv6 multicast packets in the specified VLANs.
CONFIGURING GLOBAL Use the MLD Snooping Configuration page to configure global and port-
AND PORT-RELATED related settings which control the forwarding of multicast traffic. Based on
SETTINGS FOR MLD the MLD query and report messages, the switch forwards traffic only to the
ports that request multicast traffic. This prevents the switch from
SNOOPING broadcasting the traffic to all ports and possibly disrupting network
performance.
Multicast routers use information from MLD snooping and query reports,
along with a multicast routing protocol such as PIMv6, to support IP
multicasting across the Internet.
PATH
Configuration, IPMC, MLD Snooping, Basic Configuration
PARAMETERS
These parameters are displayed:
Global Configuration
◆ Snooping Enabled - When enabled, the switch will monitor network
traffic to determine which hosts want to receive multicast traffic.
(Default: Disabled)
This switch can passively snoop on MLD Listener Query and Report
packets transferred between IP multicast routers/switches and IP
multicast host groups to identify the IP multicast group members. It
simply monitors the MLD control packets passing through it, picks out
the group registration information, and configures the multicast filters
accordingly.
– 140 –
CHAPTER 4 | Configuring the Switch
MLD Snooping
Once the table used to store multicast entries for MLD snooping is
filled, no new entries are learned. If no router port is configured in the
attached VLAN, and Unregistered IPMCv6 Flooding is disabled, any
subsequent multicast traffic not found in the table is dropped,
otherwise it is flooded throughout the VLAN.
– 141 –
CHAPTER 4 | Configuring the Switch
MLD Snooping
WEB INTERFACE
To configure global and port-related settings for MLD Snooping:
3. Click Save.
– 142 –
CHAPTER 4 | Configuring the Switch
MLD Snooping
Figure 54: Configuring Global and Port-related Settings for MLD Snooping
CONFIGURING VLAN Use the MLD Snooping VLAN Configuration page to configure MLD snooping
SETTINGS FOR MLD and query for a VLAN interface
SNOOPING AND QUERY
PATH
Configuration, IPMC, MLD Snooping, VLAN Configuration
PARAMETERS
These parameters are displayed:
◆ MLD Querier - When enabled, the switch can serve as the MLDv2
Querier if selected in the bidding process with other competing
multicast routers/switches, and if selected will be responsible for asking
hosts if they want to receive multicast traffic. (Default: Disabled)
A router, or multicast-enabled switch, can periodically ask their hosts if
they want to receive multicast traffic. If there is more than one router/
switch on the LAN performing IP multicasting, one of these devices is
elected “querier” and assumes the role of querying the LAN for group
members. It then propagates the service requests on to any upstream
– 143 –
CHAPTER 4 | Configuring the Switch
MLD Snooping
◆ LLQI - The Last Member Query Interval (RFC 3810 – MLDv2 for IP)
sets the interval to wait for a response to a group-specific or group-
and-source-specific query message. The overall time to wait for a
response (Last Member Query Time) is the value assigned to LLQI,
multiplied by the Last Member Query Count (which is fixed at 2).
(Range: 1-31744 tenths of a second in multiples of 10;
Default: 1 second)
When a multicast host leaves a group, it sends an MLD leave message.
When the leave message is received by the switch, it checks to see if
this host is the last to leave the group by sending out an MLD group-
specific or group-and-source-specific query message, and starts a
timer. If no reports are received before the timer expires, the group
record is deleted, and a report is sent to the upstream multicast router.
A reduced value will result in reduced time to detect the loss of the last
member of a group or source, but may generate more burst traffic.
– 144 –
CHAPTER 4 | Configuring the Switch
MLD Snooping
This attribute will take effect only if MLD snooping proxy reporting is
enabled (see page 140).
◆ URI - The Unsolicited Report Interval specifies how often the upstream
interface should transmit unsolicited MLD reports when report
suppression/proxy reporting is enabled. (Range: 0-31744 seconds,
Default: 1 second)
WEB INTERFACE
To configure VLAN settings for MLD snooping and query:
3. Click Save.
Figure 55: Configuring VLAN Settings for MLD Snooping and Query
CONFIGURING MLD Use the MLD Snooping Port Group Filtering Configuration page to filter
FILTERING specific multicast traffic. In certain switch applications, the administrator
may want to control the multicast services that are available to end users;
for example, an IP/TV service based on a specific subscription plan. The
MLD filtering feature fulfills this requirement by denying access to specified
multicast services on a switch port.
PATH
Configuration, IPMC, MLD Snooping, Port Group Filtering
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure MLD Snooping Port Group Filtering:
– 145 –
CHAPTER 4 | Configuring the Switch
Link Layer Discovery Protocol
2. Click Add New Filtering Group to display a new entry in the table.
5. Click Save.
CONFIGURING LLDP Use the LLDP Configuration page to set the timing attributes used for the
TIMING AND TLVS transmission of LLDP advertisements, and the device information which is
advertised.
PATH
Configuration, LLDP
PARAMETERS
These parameters are displayed:
– 146 –
CHAPTER 4 | Configuring the Switch
Link Layer Discovery Protocol
◆ Mode – Enables LLDP message transmit and receive modes for LLDP
Protocol Data Units. (Options: Disabled, Enabled - TxRx, Rx only,
Tx only; Default: Disabled)
– 147 –
CHAPTER 4 | Configuring the Switch
Link Layer Discovery Protocol
If all ports have CDP awareness disabled, the switch forwards CDP
frames received from neighbor devices. If at least one port has CDP
awareness enabled, all CDP frames are terminated by the switch.
When CDP awareness for a port is disabled, the CDP information is not
removed immediately, but will be removed when the hold time is
exceeded.
◆ Port Descr – The port description is taken from the ifDescr object in
RFC 2863, which includes information about the manufacturer, the
product name, and the version of the interface hardware/software.
◆ Sys Name – The system name is taken from the sysName object in
RFC 3418, which contains the system's administratively assigned
name. To configure the system name, see page 41.
◆ Sys Descr – The system description is taken from the sysDescr object
in RFC 3418, which includes the full name and version identification of
the system's hardware type, software operating system, and
networking software.
WEB INTERFACE
To configure LLDP timing and advertised TLVs:
– 148 –
CHAPTER 4 | Configuring the Switch
Link Layer Discovery Protocol
6. Click Save.
CONFIGURING LLDP- Use the LLDP-MED Configuration page to set the device information which
MED TLVS is advertised for end-point devices.
LLDP-MED (Link Layer Discovery Protocol - Media Endpoint Discovery) is an
extension of LLDP intended for managing endpoint devices such as Voice
over IP phones and network switches. The LLDP-MED TLVs advertise
information such as network policy, power, inventory, and device location
details. Both LLDP and LLDP-MED information can be used by SNMP
applications to simplify troubleshooting, enhance network management,
and maintain an accurate network topology.
PATH
Configuration, LLDP-MED
PARAMETERS
These parameters are displayed:
◆ Fast Start Repeat Count – Rapid startup and Emergency Call Service
Location Identification Discovery of endpoints is a critically important
aspect of VoIP systems in general.In addition, it is best to advertise
only those pieces of information which are specifically relevant to
particular endpoint types (for example only advertise the voice network
policy to permitted voice-capable devices), both in order to conserve
– 149 –
CHAPTER 4 | Configuring the Switch
Link Layer Discovery Protocol
the limited LLDPU space and to reduce security and system integrity
issues that can come with inappropriate knowledge of the network
policy.
With this in mind LLDP-MED defines an LLDP-MED Fast Start interaction
between the protocol and the application layers on top of the protocol,
in order to achieve these related properties. Initially, a Network
Connectivity Device will only transmit LLDP TLVs in an LLDPDU. Only
after an LLDP-MED Endpoint Device is detected, will an LLDP-MED
capable Network Connectivity Device start to advertise LLDP-MED TLVs
in outgoing LLDPDUs on the associated port. The LLDP-MED application
will temporarily speed up the transmission of the LLDPDU to start
within a second, when a new LLDP-MED neighbor has been detected in
order share LLDP-MED information as fast as possible to new
neighbors.
Because there is a risk that a LLDP frame being lost during transmission
between neighbors, it is recommended to repeat the fast start
transmission multiple times to increase the possibility for that the
neighbors has received the LLDP frame. With Fast start repeat count it
is possible to specify the number of times the fast start transmission is
repeated. The recommended value is 4 times, giving that 4 LLDP
frames with a 1 second interval will be transmitted, when a LLDP frame
with new information is received.
It should be noted that LLDP-MED and the LLDP-MED Fast Start
mechanism is only intended to run on links between LLDP-MED
Network Connectivity Devices and Endpoint Devices, and as such does
not apply to links between LAN infrastructure elements, including
between Network Connectivity Devices, or to other types of links.
Coordinates Location
– 150 –
CHAPTER 4 | Configuring the Switch
Link Layer Discovery Protocol
◆ Map Datum – The Map Datum used for the coordinates given in this
Option.
■ WGS84: (Geographical 3D) - World Geodesic System 1984, CRS
Code 4327, Prime Meridian Name: Greenwich.
■ NAD83/NAVD88: North American Datum 1983, CRS Code 4269,
Prime Meridian Name: Greenwich; The associated vertical datum is
the North American Vertical Datum of 1988 (NAVD88). This datum
pair is to be used when referencing locations on land, not near tidal
water (which would use Datum = NAD83/MLLW).
■ NAD83/MLLW: North American Datum 1983, CRS Code 4269,
Prime Meridian Name: Greenwich; The associated vertical datum is
Mean Lower Low Water (MLLW). This datum pair is to be used when
referencing locations on water/sea/ocean.
– 151 –
CHAPTER 4 | Configuring the Switch
Link Layer Discovery Protocol
A large network may support multiple VoIP policies across the entire
organization, and different policies per application type. LLDP-MED
allows multiple policies to be advertised per port, each corresponding to
a different application type. Different ports on the same Network
Connectivity Device may advertise different sets of policies, based on
the authenticated user identity or port configuration.
It should be noted that LLDP-MED is not intended to run on links other
than between Network Connectivity Devices and Endpoints, and
therefore does not need to advertise the multitude of network policies
that frequently run on an aggregated link interior to the LAN.
– 152 –
CHAPTER 4 | Configuring the Switch
Link Layer Discovery Protocol
– 153 –
CHAPTER 4 | Configuring the Switch
Link Layer Discovery Protocol
Tagged indicates that the device is using the IEEE 802.1Q tagged
frame format, and that both the VLAN ID and the Layer 2 priority
values are being used, as well as the DSCP value. The tagged
format includes an additional field, known as the tag header. The
tagged frame format also includes priority tagged frames as defined
by IEEE 802.1Q-2003.
■ DSCP – DSCP value used to provide Diffserv node behavior for the
specified application type as defined in IETF RFC 2474. DSCP may
contain one of 64 code point values (0 - 63). A value of 0 represents
use of the default DSCP value as defined in RFC 2475.
WEB INTERFACE
To configure LLDP-MED TLVs:
3. Set the fast start repeat count, descriptive information for the end-
point device, and policies applied to selected ports.
4. Click Save.
– 154 –
CHAPTER 4 | Configuring the Switch
Power over Ethernet
COMMAND USAGE
◆ The switch can provide DC power to a wide range of connected devices,
eliminating the need for an additional power source and cutting down
on the amount of cables attached to each device. Once configured to
supply power, an automatic detection process is initialized by the switch
that is authenticated by a PoE signature from the connected device.
Detection and authentication prevent damage to non-compliant devices
(IEEE 802.3af or 802.3at).
◆ This switch supports both the IEEE 802.3af PoE and IEEE 802.3at-2009
PoE Plus standards. To ensure that the correct power is supplied to
powered devices (PD) compliant with these standards, the first
detection pulse from the switch is based on 802.3af to which the
802.3af PDs will respond normally. It then sends a second PoE Plus
pulse that causes an 802.3at PD to respond as a Class 4 device and
– 155 –
CHAPTER 4 | Configuring the Switch
Power over Ethernet
◆ All the RJ-45 ports support both the IEEE 802.3af and IEEE 802.3at
standards. The total PoE power delivered by all ports cannot exceed the
maximum power budget of 80W.
◆ Ports can be set to one of four power priority levels, critical, high,
medium, or low. To control the power supply within the switch’s budget,
ports set at critical to medium priority have power enabled in
preference to those ports set at low priority. For example, when a
device connected to a port is set to critical priority, the switch supplies
the required power, if necessary by denying power to ports set for a
lower priority during bootup.
NOTE: For more information on using the PoE provided by this switch refer
to the Installation Guide.
PATH
Configuration, PoE
PARAMETERS
These parameters are displayed:
– 156 –
CHAPTER 4 | Configuring the Switch
Power over Ethernet
For all modes, if a port uses more power than the power reserved for
that port, it is shut down.
◆ Primary Power Supply - The power budget for the switch. If devices
connected to the switch require more power than the switch’s budget,
the port power priority settings are used to control the supplied power.
(Range: 0-80 Watts)
◆ PoE Mode – The PoE operating mode for a port includes these options:
WEB INTERFACE
To configure global and port-specific PoE settings:
2. Set the global PoE parameters, including the method used to determine
reserved port power, the method by which port power is shut down,
and the switch’s overall power budget.
– 157 –
CHAPTER 4 | Configuring the Switch
Configuring the MAC Address Table
3. Specify the port PoE operating mode, port power allocation priority, and
the port power budget.
4. Click Save.
PATH
Configuration, MAC Table
PARAMETERS
These parameters are displayed:
Aging Configuration
◆ Disable Automatic Aging - Disables the automatic aging of dynamic
entries. (Address aging is enabled by default.)
– 158 –
CHAPTER 4 | Configuring the Switch
Configuring the MAC Address Table
◆ Secure - Only static MAC address entries are used, all other frames are
dropped.
Make sure that the link used for managing the switch is added to the
Static MAC Table before changing to secure learning mode. Otherwise
the management link will be lost, and can only be restored by using
another non-secure port or by connecting to the switch via the serial
interface.
NOTE: If the learning mode for a given port in the MAC Learning Table is
grayed out, another software module is in control of the mode, so that it
cannot be changed by the user. An example of such a module is the MAC-
Based Authentication under 802.1X.
WEB INTERFACE
To configure the MAC Address Table:
3. Specify the way in which MAC addresses are learned on any port.
4. Add any required static MAC addresses by clicking the Add New Static
Entry button, entering the VLAN ID and MAC address, and marking the
ports to which the address is to be mapped.
5. Click Save.
– 159 –
CHAPTER 4 | Configuring the Switch
IEEE 802.1Q VLANs
– 160 –
CHAPTER 4 | Configuring the Switch
IEEE 802.1Q VLANs
Before enabling VLANs for the switch, you must first assign each port to
the VLAN group(s) in which it will participate. By default all ports are
assigned to VLAN 1 as untagged ports. Add a port as a tagged port if you
want it to carry traffic for one or more VLANs, and any intermediate
network devices or the host at the other end of the connection supports
VLANs. Then assign ports on the other VLAN-aware network devices along
the path that will carry this traffic to the same VLAN(s), either manually or
dynamically using GVRP. However, if you want a port on this switch to
participate in one or more VLANs, but none of the intermediate network
devices nor the host at the other end of the connection supports VLANs,
then you should add this port to the VLAN as an untagged port.
ASSIGNING PORTS TO Use the VLAN Membership Configuration page to enable VLANs for this
VLANS switch by assigning each port to the VLAN group(s) in which it will
participate.
PATH
Configuration, VLANs, VLAN Membership
PARAMETERS
These parameters are displayed:
– 161 –
CHAPTER 4 | Configuring the Switch
IEEE 802.1Q VLANs
WEB INTERFACE
To configure IEEE 802.1Q VLAN groups:
3. To configure a new VLAN, click Add New VLAN, enter the VLAN ID, and
then mark the ports to be assigned to the new group.
4. Click Save.
CONFIGURING VLAN Use the VLAN Port Configuration page to configure VLAN attributes for
ATTRIBUTES FOR PORT specific interfaces, including processing Queue-in-Queue frames with
MEMBERS embedded tags, enabling ingress filtering, setting the accepted frame
types, and configuring the default VLAN identifier (PVID).
PATH
Configuration, VLANs, Ports
PARAMETERS
These parameters are displayed:
– 162 –
CHAPTER 4 | Configuring the Switch
IEEE 802.1Q VLANs
◆ Frame Type - Sets the interface to accept all frame types, including
tagged or untagged frames, only tagged frames, or only untagged
frames. When set to receive all frame types, any received frames that
are untagged are assigned to the default VLAN. When set to receive
only tagged frames, all untagged frames received on the interface are
discarded. (Option: All, Tagged, Untagged; Default: All)
◆ Port VLAN Mode - Determines how to process VLAN tags for ingress
and egress traffic. (Options: None, Specific; Default: Specific)
■ None - The ID for the VLAN to which this frame has been assigned
is inserted in frames transmitted from the port. The assigned VLAN
ID can be based on the ingress tag for tagged frames, or the default
PVID for untagged ingress frames. Note that this mode is normally
used for ports connected to VLAN-aware switches.
– 163 –
CHAPTER 4 | Configuring the Switch
IEEE 802.1Q VLANs
When forwarding a frame from this switch along a path that contains
any VLAN-aware devices, the switch should include VLAN tags. When
forwarding a frame from this switch along a path that does not contain
any VLAN-aware devices (including the destination host), the switch
should first strip off the VLAN tag before forwarding the frame.
WEB INTERFACE
To configure attributes for VLAN port members:
3. Click Save.
– 164 –
CHAPTER 4 | Configuring the Switch
Configuring Private VLANs
PATH
Configuration, Private VLANs, PVLAN Membership
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure VLAN port members for private VLANs:
2. Add or delete members of any existing PVLAN, or click Add New Private
VLAN and mark the port members.
3. Click Save.
– 165 –
CHAPTER 4 | Configuring the Switch
Using Port Isolation
Ports within a private VLAN (PVLAN) are isolated from other ports which
are not in the same PVLAN. Port Isolation can be used to prevent
communications between ports within the same PVLAN. An isolated port
cannot forward any unicast, multicast, or broadcast traffic to any other
ports in the same PVLAN.
PATH
Configuration, Private VLANs, Port Isolation
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure isolated ports:
3. Click Save.
– 166 –
CHAPTER 4 | Configuring the Switch
Configuring MAC-based VLANs
PATH
Configuration, VCL, MAC-based VLANs
COMMAND USAGE
◆ Source MAC addresses can be mapped to only one VLAN ID.
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To map a MAC address to a VLAN:
3. Enter an identifier in the VLAN field. Note that the specified VLAN need
not already be configured.
5. Click Save.
– 167 –
CHAPTER 4 | Configuring the Switch
Protocol VLANs
PROTOCOL VLANS
The network devices required to support multiple protocols cannot be
easily grouped into a common VLAN. This may require non-standard
devices to pass traffic between different VLANs in order to encompass all
the devices participating in a specific protocol. This kind of configuration
deprives users of the basic benefits of VLANs, including security and easy
accessibility.
To avoid these problems, you can configure this switch with protocol-based
VLANs that divide the physical network into logical VLAN groups for each
required protocol. When a frame is received at a port, its VLAN
membership can then be determined based on the protocol type being
used by the inbound packets.
COMMAND USAGE
◆ To configure protocol-based VLANs, follow these steps:
1. First configure VLAN groups for the protocols you want to use
(page 161). Although not mandatory, we suggest configuring a
separate VLAN for each major protocol running on your network.
Do not add port members at this time.
2. Create a protocol group for each of the protocols you want to assign
to a VLAN using the Configure Protocol (Add) page.
3. Then map the protocol for each interface to the appropriate VLAN
using the Configure Interface (Add) page.
– 168 –
CHAPTER 4 | Configuring the Switch
Protocol VLANs
CONFIGURING Use the Protocol to Group Mapping Table to create protocol groups.
PROTOCOL VLAN
GROUPS PATH
Configuration, VCL, Protocol-based VLANs, Protocol to Group
PARAMETERS
These parameters are displayed:
◆ Value – Values which define the specific protocol type. The fields
displayed depend on the selected frame type:
LLC – Includes the DSAP (Destination Service Access Point) and SSAP
(Source Service Access Point) values. (Range: 0x00-0xff; Default: 0xff)
■ OUI – A value in the format of xx-xx-xx where each pair (xx) in the
string is a hexadecimal value in the ranges of 0x00-0xff.
◆ Group Name – The name assigned to the Protocol VLAN Group. This
name must be a unique 16-character long string which consists of a
combination of alphabetic characters (a-z or A-Z) or integers (0-9).
– 169 –
CHAPTER 4 | Configuring the Switch
Protocol VLANs
WEB INTERFACE
To configure a protocol group:
4. Click Save.
MAPPING PROTOCOL Use the Group Name to VLAN Mapping Table to map a protocol group to a
GROUPS TO PORTS VLAN for each interface that will participate in the group.
PATH
Configuration, VCL, Protocol-based VLANs, Group to VLAN
COMMAND USAGE
◆ When creating a protocol-based VLAN, only assign interfaces using this
configuration screen. If you assign interfaces using any of the other
VLAN menus such as the VLAN Static table (page 161), these interfaces
will admit traffic of any protocol type into the associated VLAN.
◆ When a frame enters a port that has been assigned to a protocol VLAN,
it is processed in the following manner:
■ If the frame is tagged, it will be processed according to the standard
rules applied to tagged frames.
■ If the frame is untagged and the protocol type matches, the frame
is forwarded to the appropriate VLAN.
■ If the frame is untagged but the protocol type does not match, the
frame is forwarded to the default VLAN for this interface.
PARAMETERS
These parameters are displayed:
◆ Group Name – The name assigned to the Protocol VLAN Group. This
name must be a unique 16-character long string which consists of a
combination of alphabetic characters (a-z or A-Z) or integers (0-9).
– 170 –
CHAPTER 4 | Configuring the Switch
Managing VoIP Traffic
WEB INTERFACE
To map a protocol group to a VLAN for a port or trunk:
5. Click Save.
The switch allows you to specify a Voice VLAN for the network and set a
service priority for the VoIP traffic. VoIP traffic can be detected on switch
ports by using the source MAC address of packets, or by using LLDP (IEEE
802.1ab) to discover connected VoIP devices. When VoIP traffic is detected
on a configured port, the switch automatically assigns the port as a tagged
– 171 –
CHAPTER 4 | Configuring the Switch
Managing VoIP Traffic
CONFIGURING VOIP Use the Voice VLAN Configuration page to configure the switch for VoIP
TRAFFIC traffic. First enable automatic detection of VoIP devices attached to the
switch ports, then set the Voice VLAN ID for the network. The Voice VLAN
aging time can also be set to remove a port from the Voice VLAN when
VoIP traffic is no longer received on the port.
PATH
Configuration, Voice VLAN, Configuration
PARAMETERS
These parameters are displayed:
Global Configuration
◆ Aging Time – The time after which a port is removed from the Voice
VLAN when VoIP traffic is no longer received on the port. (Range: 10-
10,000,000 seconds; Default: 86400 seconds)
◆ Traffic Class – Defines a service priority for traffic on the Voice VLAN.
The priority of any received VoIP packet is overwritten with the new
priority when the Voice VLAN feature is active on a port. (Range: 0-7;
Default: 7)
The switch provides eight priority queues for each port. For information
on how these queues are used, see "Configuring Egress Port Scheduler"
on page 178.
Port Configuration
■ Disabled – The Voice VLAN feature is disabled on the port. The port
will not detect VoIP traffic or be added to the Voice VLAN.
3. MSTP must be disabled before the Voice VLAN is enabled (see "Configuring Global
Settings for STA" on page 118), or the Voice VLAN port mode is set to Auto or Forced.
This prevents the spanning tree’s ingress filter from dropping VoIP traffic tagged for the
Voice VLAN.
– 172 –
CHAPTER 4 | Configuring the Switch
Managing VoIP Traffic
■ Both – Both OUI table lookup and LLDP are used to detect VoIP
traffic on a port.
This option only works when the detection mode is set to “Auto.” LLDP
should also be enabled before setting the discovery protocol to “LLDP”
or “Both.” Note that changing the discovery protocol to “OUI” or “LLDP”
will restart auto detection process.
WEB INTERFACE
To configure VoIP traffic settings:
2. Configure any required changes to the VoIP settings for the switch or
for a specific port.
3. Click Save.
– 173 –
CHAPTER 4 | Configuring the Switch
Managing VoIP Traffic
Figure 68: Configuring Global and Port Settings for a Voice VLAN
CONFIGURING Use the Voice VLAN OUI Table to identify VoIP devices attached to the
TELEPHONY OUI switch. VoIP devices can be identified by the manufacturer’s Organizational
Unique Identifier (OUI) in the source MAC address of received packets. OUI
numbers are assigned to manufacturers and form the first three octets of
device MAC addresses. The MAC OUI numbers for VoIP equipment can be
configured on the switch so that traffic from these devices is recognized as
VoIP.
NOTE: Making any changes to the OUI table will restart the auto-detection
process for attached VoIP devices.
PATH
Configuration, Voice VLAN, OUI
PARAMETERS
These parameters are displayed:
– 174 –
CHAPTER 4 | Configuring the Switch
Quality of Service
WEB INTERFACE
To configure MAC OUI numbers for VoIP equipment:
3. Enter a MAC address that specifies the OUI for VoIP devices in the
network, and enter a description for the devices.
4. Click Save.
QUALITY OF SERVICE
All switches or routers that access the Internet rely on class information to
provide the same forwarding treatment to packets in the same class. Class
information can be assigned by end hosts, or switches or routers along the
path. Priority can then be assigned based on a general policy, or a detailed
examination of the packet. However, note that detailed examination of
packets should take place close to the network edge so that core switches
and routers are not overloaded.
Switches and routers along the path can use class information to prioritize
the resources allocated to different traffic classes. The manner in which an
individual device handles traffic is called per-hop behavior. All devices
along a path should be configured in a consistent manner to construct a
consistent end-to-end Quality of Service (QoS) solution.
This section describes how to specify which data packets have greater
precedence when traffic is buffered in the switch due to congestion. This
switch provides four priority queues for each port. Data packets in a port's
high-priority queue will be transmitted before those in the lower-priority
queues. You can set the default priority for each interface, the queuing
mode, and queue weights.
– 175 –
CHAPTER 4 | Configuring the Switch
Quality of Service
The switch also allows you to configure QoS classification criteria and
service policies. The switch’s resources can be prioritized to meet the
requirements of specific traffic types on a per hop basis. Each packet is
classified upon entry into the network based on Ethernet type, VLAN ID,
TCP/UDP port, DSCP, ToS, or its VLAN priority tag. Based on configured
network policies, different kinds of traffic can be marked for different kinds
of forwarding.
CONFIGURING PORT Use the QoS Ingress Port Classification page to set the basic QoS
CLASSIFICATION parameters for a port, including the default traffic class, DP level (IEEE
802.1p), user priority, drop eligible indicator, classification mode for tagged
frames, and DSCP-based QoS classification.
PATH
Configuration, QoS, Port Classification
PARAMETERS
These parameters are displayed:
◆ QoS class – Controls the default QoS class, i.e., the QoS class for
frames not classified in any other way. There is a one to one mapping
between QoS class, queue and priority. A QoS class of 0 (zero) has the
lowest priority. (Range: 0-7; Default: 0)
◆ DP level – Controls the default drop priority for frames not classified in
any other way. (Range: 0-1; Default: 0)
◆ PCP – Controls the default Priority Code Point (or User Priority) for
untagged frames. (Range: 0-7; Default: 0)
◆ DEI – Controls the default Drop Eligible Indicator for untagged frames.
(Range: 0-1; Default: 0)
◆ Tag Class. – Shows classification mode for tagged frames on this port:
■ Disabled – Uses the default QoS class and DP level for tagged
frames.
■ Enabled – Uses the mapped versions of PCP and DEI for tagged
frames.
Click on the mode in order to configure the mode and/or mapping.
– 176 –
CHAPTER 4 | Configuring the Switch
Quality of Service
◆ QoS class – Controls the mapping of classified (PCP, DEI) to QoS class
values when Tag Classification is Enabled. (Range: 0-7; Default: 0)
WEB INTERFACE
To set the basic QoS parameters for a port:
3. Click Save.
– 177 –
CHAPTER 4 | Configuring the Switch
Quality of Service
3. Set the tag classification mode to Disabled to use the default QoS class
and DP level for tagged frames, or to Enabled to use the mapped
versions of PCP and DEI for tagged frames.
4. Click Save.
CONFIGURING EGRESS Use the QoS Egress Port Schedulers page to show an overview of the QoS
PORT SCHEDULER Egress Port Schedulers, including the queue mode and weight. Click on any
of the entries in the Port field to configure egress queue mode, queue
shaper (rate and access to excess bandwidth), and port shaper.
PATH
Configuration, QoS, Port Scheduler
PARAMETERS
These parameters are displayed:
◆ Weight – Shows the weight of each egress queue used by the port.
Configuring QoS Egress Port Scheduler, Queue Scheduler and Port Shapers
◆ Scheduler Mode – The switch can be set to service the queues based
on a strict rule that requires all traffic in a higher priority queue to be
– 178 –
CHAPTER 4 | Configuring the Switch
Quality of Service
■ Rate – Controls the rate for the queue shaper. The default value is
500. This value is restricted to 100-1000000 kbps, or 1-3300 Mbps.
■ Unit – Controls the unit of measure for the queue shaper rate as
“kbps” or “Mbps.” (Default: kbps)
◆ Port Shaper – Sets the rate at which traffic can egress this queue.
■ Rate – Controls the rate for the port shaper. The default value is
500. This value is restricted to 100-1000000 kbps, or 1-3300 Mbps
■ Unit – Controls the unit of measure for the port shaper rate as
“kbps” or “Mbps.” (Default: kbps)
WEB INTERFACE
To show an overview of the queue mode and weight used by egress ports:
– 179 –
CHAPTER 4 | Configuring the Switch
Quality of Service
2. Click on any enter under the Port field to configure the Port Scheduler
and Shaper.
To configure the scheduler mode, the egress queue mode, queue shaper,
and port shaper used by egress ports:
3. Set the scheduler mode, the queue shaper, queue scheduler (when the
scheduler mode is set to Weighted), and the port shaper.
4. Click Save.
– 180 –
CHAPTER 4 | Configuring the Switch
Quality of Service
CONFIGURING EGRESS Use the QoS Egress Port Shapers page to show an overview of the QoS
PORT SHAPER Egress Port Shapers, including the rate for each queue and port. Click on
any of the entries in the Port field to configure egress queue mode, queue
shaper (rate and access to excess bandwidth), and port shaper
PATH
Configuration, QoS, Port Shaper
PARAMETERS
These parameters are displayed:
◆ Shapers – Shows the queue shaper rate and port shaper rate.
Configuring QoS Egress Port Scheduler, Queue Scheduler and Port Shapers
This configuration page can be access from the Port Scheduler or Port
Shaper page. Refer to the description of these parameters under
"Configuring Egress Port Scheduler".
WEB INTERFACE
To show an overview of the rate for each queue and port:
2. Click on any enter under the Port field to configure the Port Scheduler
and Shaper.
CONFIGURING PORT Use the QoS Egress Port Tag Remarking page to show an overview of QoS
REMARKING MODE Egress Port Tag Remarking mode. Click on any of the entries in the Port
field to configure the remarking mode using classified PCP/DEI values,
default PCP/DEI values, or mapped versions of QoS class and drop priority.
PATH
Configuration, QoS, Port Tag Remarking
– 181 –
CHAPTER 4 | Configuring the Switch
Quality of Service
PARAMETERS
These parameters are displayed:
■ QoS class/DP level – Shows the mapping options for QoS class
values and DP levels (drop precedence).
WEB INTERFACE
To show the QoS Egress Port Tag Remarking mode used for each port:
2. Click on any enter under the Port field to configure the Port Tag
Remarking mode.
– 182 –
CHAPTER 4 | Configuring the Switch
Quality of Service
3. Set the tag remarking mode and any parameters associated with the
selected mode.
4. Click Save.
– 183 –
CHAPTER 4 | Configuring the Switch
Quality of Service
CONFIGURING PORT Use the QoS Port DSCP Configuration page to configure ingress translation
DSCP TRANSLATION and classification settings and egress re-writing of DSCP values.
AND REWRITING
PATH
Configuration, QoS, Port DSCP
PARAMETERS
These parameters are displayed:
– 184 –
CHAPTER 4 | Configuring the Switch
Quality of Service
WEB INTERFACE
To configure ingress translation and classification settings and egress re-
writing of DSCP values:
3. Click Save.
– 185 –
CHAPTER 4 | Configuring the Switch
Quality of Service
CONFIGURING DSCP- Use the DSCP-Based QoS Ingress Classification page to configure DSCP-
BASED QOS INGRESS based QoS ingress classification settings.
CLASSIFICATION
PATH
Configuration, QoS, DSCP-Based QoS
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To configure DSCP-based QoS ingress classification settings:
2. Specify whether the DSCP value is trusted, and set the corresponding
QoS value and DP level used for ingress processing.
3. Click Save.
– 186 –
CHAPTER 4 | Configuring the Switch
Quality of Service
...
CONFIGURING DSCP Use the DSCP Translation page to configure DSCP translation for ingress
TRANSLATION traffic or DSCP re-mapping for egress traffic.
PATH
Configuration, QoS, DSCP Translation
PARAMETERS
These parameters are displayed:
◆ Egress Remap DP0 – Re-maps DP0 field to selected DSCP value. DP0
indicates a drop precedence with a low priority.
◆ Egress Remap DP1 – Re-maps DP1 field to selected DSCP value. DP1
indicates a drop precedence with a high priority.
– 187 –
CHAPTER 4 | Configuring the Switch
Quality of Service
WEB INTERFACE
To configure DSCP translation or re-mapping:
3. Click Save.
...
CONFIGURING DSCP Use the DSCP Classification page to map DSCP values to a QoS class and
CLASSIFICATION drop precedence level.
PATH
Configuration, QoS, DSCP Classification
PARAMETERS
These parameters are displayed:
◆ QoS class/DPL – Shows the mapping options for QoS class values and
DP (drop precedence) levels.
– 188 –
CHAPTER 4 | Configuring the Switch
Quality of Service
WEB INTERFACE
To map DSCP values to a QoS class and drop precedence level:
3. Click Save.
CONFIGURING QOS Use the QoS Control List Configuration page to configure Quality of Service
CONTROL LISTS policies for handling ingress packets based on Ethernet type, VLAN ID,
TCP/UDP port, DSCP, ToS, or VLAN priority tag.
Once a QCE is mapped to a port, traffic matching the first entry in the QoS
Control List is assigned to the QoS class, drop precedence level, and DSCP
value defined by that entry. Traffic not matching any of the QCEs are
classified to the default QoS Class for the port.
PATH
Configuration, QoS, QoS Control List
PARAMETERS
These parameters are displayed:
– 189 –
CHAPTER 4 | Configuring the Switch
Quality of Service
◆ SMAC - The OUI field of the source MAC address, i.e. the first three
octets (bytes) of the MAC address.
◆ DMAC - The type of destination MAC address. Possible values are: Any,
Broadcast, Multicast, Unicast.
■ DPL – The drop precedence level will be set to the specified value.
Button Description
The lowest plus sign adds a new entry at the bottom of the list.
QCE Configuration
◆ Port Members – The ports assigned to this entry.
Key Parameters
◆ Tag – VLAN tag type. (Options: Any, Tag, Untag; Default: Any)
◆ SMAC – The OUI field of the source MAC address. Enter the first three
octets (bytes) of the MAC address, or Any.
– 190 –
CHAPTER 4 | Configuring the Switch
Quality of Service
– 191 –
CHAPTER 4 | Configuring the Switch
Quality of Service
■ IPv6 – IPv6 frame type includes the same settings as those used
for IPv4, except for the Source IP. When configuring a specific IPv6
source address, enter the least significant 32 bits (a.b.c.d) using
the same type of mask as that used for an IPv4 address.
Action Parameters
◆ Action – Indicates the classification action taken on ingress frame if
the configured parameters are matched in the frame's content. If a
frame matches the QCE, the following actions will be taken:
◆ DPL – The drop precedence level will be set to the specified value or
left unchanged. (Options: 0-1, Default; Default setting: Default)
◆ DSCP – The DSCP value will be set to the specified value or left
unchanged. (Options: 0-63, BE, CS1-CS7, Default (not changed);
Default setting: Default)
WEB INTERFACE
To configure QoS Control Lists:
2. Click the button to add a new QCE, or use the other QCE
modification buttons to specify the editing action (i.e., edit, delete, or
moving the relative position of entry in the list).
4. Click Save.
– 192 –
CHAPTER 4 | Configuring the Switch
Quality of Service
CONFIGURING STORM Use the Storm Control Configuration page to set limits on broadcast,
CONTROL multicast and unknown unicast traffic to control traffic storms which may
occur when a network device is malfunctioning, the network is not properly
configured, or application programs are not well designed or properly
configured. Traffic storms caused by any of these problems can severely
degrade performance or bring your network to a complete halt.
You can protect your network from traffic storms by setting a threshold for
broadcast, multicast, or unknown unicast traffic. Any packets exceeding
the specified threshold will then be dropped. Note that the limit specified
on this page applies to each port.
PATH
Configuration, QoS, Storm Control
PARAMETERS
These parameters are displayed:
– 193 –
CHAPTER 4 | Configuring the Switch
Configuring Port Mirroring
◆ Rate (pps) - The threshold above which packets are dropped. This limit
can be set by specifying a value of 2n packets per second (pps), or by
selecting one of the options in Kpps (i.e., marked with the suffix “K”).
(Options: 2n pps where n = 1, 2, 4, 8, 16, 32, 64, 128, 256, 512; or 1,
2, 4, 8, 16, 32, 64, 128, 256, 512, 1024 Kpps; Default: 2 pps)
Due to an ASIC limitation, the enforced rate limits are slightly less than
the listed options. For example: 1 Kpps translates into an enforced
threshold of 1002.1 pps.
WEB INTERFACE
To configure Storm Control:
4. Click Save.
PATH
Configuration, Mirroring
COMMAND USAGE
General port mirroring configured on the Mirror Configuration page and
ACL-based port mirroring are implemented independently. When port
– 194 –
CHAPTER 4 | Configuring the Switch
Configuring Port Mirroring
PARAMETERS
These parameters are displayed:
◆ Port to mirror on - The destination port that will mirror the traffic
from the source port. All mirror sessions must share the same
destination port. (Default: Disabled)
◆ Port - The port whose traffic will be monitored.
◆ Mode - Specifies which traffic to mirror to the target port.
(Options: Disabled, Enabled (receive and transmit), Rx only (receive),
Tx only (transmit); Default: Disabled)
WEB INTERFACE
To configure port mirroring:
2. Select the destination port to which all mirrored traffic will be sent.
4. Click Save.
– 195 –
CHAPTER 4 | Configuring the Switch
Configuring UPnP
CONFIGURING UPNP
Universal Plug and Play (UPnP) is a set of protocols that allows devices to
connect seamlessly and simplifies the deployment of home and office
networks. UPnP achieves this by issuing UPnP device control protocols
designed upon open, Internet-based communication standards.
Once a control point has discovered a device its next step is to learn more
about the device and its capabilities by retrieving the device's description
from the URL provided by the device in the discovery message. After a
control point has retrieved a description of the device, it can send actions
to the device's service. To do this, a control point sends a suitable control
message to the control URL for the service (provided in the device
description).
If a device has a URL for presentation, then the control point can retrieve a
page from this URL, load the page into a web browser, and depending on
the capabilities of the page, allow a user to control the device and/or view
device status.
Using UPnP under Windows XP - To access or manage the switch with the
aid of UPnP under Windows XP, open My Network Places in the Explore file
manager. An entry for “SMCGS10P-Smart” will appear in the list of
discovered devices. Double-click on this entry to access the switch's web
management interface. Or right-click on the entry and select “Properties”
to display a list of device attributes advertised through UPnP.
PARAMETERS
These parameters are displayed:
◆ TTL - Sets the time-to-live (TTL) value for UPnP messages transmitted
by the switch. (Range: 4-255; Default: 4)
– 196 –
CHAPTER 4 | Configuring the Switch
Configuring UPnP
WEB INTERFACE
To configure UPnP:
2. Enable or disable UPnP, then set the TTL and advertisement values.
3. Click Save.
– 197 –
CHAPTER 4 | Configuring the Switch
Configuring UPnP
– 198 –
5 MONITORING THE SWITCH
This chapter describes how to monitor all of the basic functions, configure
or view system logs, and how to view traffic status or the address table.
DISPLAYING SYSTEM Use the System Information page to identify the system by displaying the
INFORMATION device name, location and contact information.
PATH
Monitor, System, Information
PARAMETERS
These parameters are displayed:
Hardware
Time
◆ System Date – The current system time and date. The time is
obtained through an SNTP Server if configured (see "Setting an IP
Address" on page 42.)
◆ System Uptime – Length of time the management agent has been up.
– 199 –
CHAPTER 5 | Monitoring the Switch
Displaying Basic Information About the System
Software
WEB INTERFACE
To view System Information, click Monitor, System, Information.
DISPLAYING CPU Use the CPU Load page to display information on CPU utilization.
UTILIZATION
The load is averaged over the last 100ms, 1sec and 10 seconds intervals.
The last 120 samples are graphed.
In order to display the graph, your browser must support the Scalable
Vector Graphics format. Consult SVG Wiki for more information on browser
support. Depending on your browser version, Microsoft Internet Explorer
will need to have a plugin installed to support SVG.
PATH
Monitor, System, CPU Load
– 200 –
CHAPTER 5 | Monitoring the Switch
Displaying Basic Information About the System
WEB INTERFACE
To display CPU utilization:
DISPLAYING LOG Use the System Log Information page to scroll through the logged system
MESSAGES and event messages.
PATH
Monitor, System, CPU Load
PARAMETERS
These parameters are displayed:
Display Filter
◆ with # entries per page – The number of entries to display per page.
Table Headings
◆ ID – Error ID.
– 201 –
CHAPTER 5 | Monitoring the Switch
Displaying Basic Information About the System
WEB INTERFACE
To display the system log:
2. Specify the message level to display, the starting message ID, and the
number of messages to display per page.
– 202 –
CHAPTER 5 | Monitoring the Switch
Displaying Thermal Protection
DISPLAYING LOG Use the Detailed Log page to view the full text of specific log messages.
DETAILS
PATH
Monitor, System, CPU Load
WEB INTERFACE
To display the text of a specific log message, click Monitor, System,
Detailed Log.
PATH
Monitor, Thermal Protection
PARAMETERS
These parameters are displayed:
– 203 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Ports
WEB INTERFACE
To display the current chip temperature, click Monitor, Thermal Protection.
DISPLAYING PORT Use the Port State Overview page to display an image of the switch's ports.
STATUS ON THE Clicking on the image of a port opens the Detailed Port Statistics page as
FRONT PANEL described on page 207.
PATH
Monitor, Ports, State
WEB INTERFACE
To display an image of the switch's ports, click Monitor, Ports, State.
– 204 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Ports
DISPLAYING AN Use the Port Statistics Overview page to display a summary of basic
OVERVIEW OF PORT information on the traffic crossing each port.
STATISTICS
PATH
Monitor, Ports, Traffic Overview
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To display a summary of port statistics, click Monitor, Ports, Traffic
Overview.
DISPLAYING QOS Use the Queuing Counters page to display the number of packets
STATISTICS processed by each service queue.
PATH
Monitor, Ports, QoS Statistics
– 205 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Ports
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To display the queue counters, click Monitor, Ports, QoS Statistics.
DISPLAYING QCL Use the QoS Control List Status page to show the QCE entries configured
STATUS for different users or software modules, and whether or not there is a
conflict.
PATH
Monitor, Ports, QCL Status
PARAMETERS
These parameters are displayed:
– 206 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Ports
WEB INTERFACE
To display the show the status of QCE entries
2. Select the user type to display from the drop-down list at the top of the
page.
DISPLAYING DETAILED Use the Detailed Port Statistics page to display detailed statistics on
PORT STATISTICS network traffic. This information can be used to identify potential problems
with the switch (such as a faulty port or unusually heavy loading).
All values displayed have been accumulated since the last system reboot,
and are shown as counts per second. Statistics are refreshed every 60
seconds by default.
PATH
Monitor, Ports, Detailed Statistics
PARAMETERS
These parameters are displayed:
◆ Receive/Transmit Total
■ Packets – The number of received and transmitted packets (good
and bad).
– 207 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Ports
– 208 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Ports
WEB INTERFACE
To display the detailed port statistics, click Monitor, Ports, Detailed
Statistics.
– 209 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
DISPLAYING ACCESS Use the Access Management Statistics page to view statistics on traffic
MANAGEMENT used in managing the switch.
STATISTICS
PATH
Monitor, Security, Access Management Statistics
USAGE GUIDELINES
Statistics will only be displayed on this page if access management is
enabled on the Access Management Configuration menu (see page 63),
and traffic matching one of the entries is detected.
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To display the information on management packets, click Monitor, System,
Access Management Statistics.
– 210 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
DISPLAYING Use the Port Security Switch Status page to show information about MAC
INFORMATION ABOUT address learning for each port, including the software module requesting
SWITCH SETTINGS FOR port security services, the service state, the current number of learned
addresses, and the maximum number of secure addresses allowed.
PORT SECURITY
Port Security is a module with no direct configuration. Configuration comes
indirectly from other software modules – the user modules. When a user
module has enabled port security on a port, the port is set up for software-
based learning. In this mode, frames from unknown MAC addresses are
passed on to the port security module, which in turn asks all user modules
whether to allow this new MAC address to be forwarded or blocked. For a
MAC address to be set in the forwarding state, all enabled user modules
must unanimously agree on allowing the MAC address to forward. If only
one chooses to block it, it will be blocked until that user module decides
otherwise.
The status page is divided into two sections – one with a legend of user
modules that may request port security services, and one with the actual
port status.
PATH
Monitor, Security, Network, Port Security, Switch
PARAMETERS
These parameters are displayed:
◆ User Module Name – The full name of a module that may request Port
Security services.
Port Status
◆ Port – The port number for which the status applies. Click the port
number to see the status for this particular port.
◆ Users – Each of the user modules has a column that shows whether
that module has enabled Port Security or not. A '-' means that the
corresponding user module is not enabled, whereas a letter indicates
that the user module abbreviated by that letter has enabled port
security.
◆ State – Shows the current state of the port. It can take one of four
values:
■ Disabled: No user modules are currently using the Port Security
service.
■ Ready: The Port Security service is in use by at least one user
module, and is awaiting frames from unknown MAC addresses to
arrive.
– 211 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
WEB INTERFACE
To display information about switch-level settings for the Port Security
module, click Monitor, Security, Network, Port Security, Switch.
– 212 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
DISPLAYING Use the Port Security Port Status page to show the entries authorized by
INFORMATION ABOUT port security services, including MAC address, VLAN ID, time added to
LEARNED MAC table, age, and hold state.
ADDRESSES
PATH
Monitor, Security, Network, Port Security, Port
PARAMETERS
These parameters are displayed:
◆ Time Added – Shows the date and time when this MAC address was
first seen on the port.
◆ Age/Hold – If at least one user module has decided to block this MAC
address, it will stay in the blocked state until the hold time (measured
in seconds) expires. If all user modules have decided to allow this MAC
address to forward, and aging is enabled, the Port Security module will
periodically check that this MAC address is still forwarding traffic. If the
age period (measured in seconds) expires and no frames have been
seen, the MAC address will be removed from the MAC table. Otherwise
a new age period will begin.
If aging is disabled or a user module has decided to hold the MAC
address indefinitely, a dash (-) will be shown.
WEB INTERFACE
To display information about the MAC address learning through the Port
Security module, click Monitor, Security, Network, Port Security, Port.
– 213 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
DISPLAYING PORT Use the Network Access Server Switch Status page to show the port status
STATUS FOR for authentication services, including 802.1X security state, last source
AUTHENTICATION address used for authentication, and last ID.
SERVICES
PATH
Monitor, Security, Network, NAS, Switch
PARAMETERS
These parameters are displayed:
◆ Port State – The current state of the port. Refer to NAS Port State for
a description of the individual states (see page 77).
◆ Last Source – The source MAC address carried in the most recently
received EAPOL frame for EAPOL-based authentication, and the most
recently received frame from a new client for MAC-based
authentication.
◆ QoS Class – The QoS class that NAS has assigned to this port. This
field is blank if the has not been assigned by NAS. Refer to “RADIUS-
Assigned QoS Enabled” for a description of this attribute (see page 77).
◆ Port VLAN ID – The VLAN in which NAS has placed this port. This field
is blank if the Port VLAN ID is not overridden by NAS.
If the VLAN ID is assigned by the RADIUS server, “(RADIUS-assigned)”
is appended to the VLAN ID. Refer to “RADIUS-Assigned VLAN Enabled”
for a description of this attribute (see page 77).
If the port is moved to the Guest VLAN, “(Guest)” is appended to the
VLAN ID. Refer to “Guest VLAN Enabled” for a description of this
attribute (see page 77).
– 214 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
WEB INTERFACE
To display port status for authentication services, click Monitor, Security,
Network, NAS, Switch.
DISPLAYING PORT Use the NAS Statistics Port selection page to display authentication
STATISTICS FOR statistics for the selected port – either for 802.1X protocol or for the
802.1X OR REMOTE remote authentication server depending on the authentication method.
AUTHENTICATION This page provides detailed NAS statistics for a specific switch port running
SERVICE EAPOL-based IEEE 802.1X authentication. For MAC-based authenticated
ports, it shows statistics only for the backend server (RADIUS
Authentication Server).
PATH
Monitor, Security, Network, NAS, Port
PARAMETERS
These parameters are displayed:
Port State
◆ Port State – The current state of the port. Refer to NAS Port State for
a description of the individual states (see page 77).
◆ QoS Class – The QoS class assigned by the RADIUS server. The field is
blank if no QoS class is assigned.
◆ Port VLAN ID – The VLAN in which NAS has placed this port. This field
is blank if the Port VLAN ID is not overridden by NAS.
If the VLAN ID is assigned by the RADIUS server, “(RADIUS-assigned)”
is appended to the VLAN ID. Refer to “RADIUS-Assigned VLAN Enabled”
for a description of this attribute (see page 77).
If the port is moved to the Guest VLAN, “(Guest)” is appended to the
VLAN ID. Refer to “Guest VLAN Enabled” for a description of this
attribute (see page 77).
– 215 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
Port Counters
◆ Start – The number of EAPOL Start frames that have been received by
the switch.
◆ Logoff – The number of valid EAPOL Logoff frames that have been
received by the switch.
◆ Invalid Type – The number of EAPOL frames that have been received
by the switch in which the frame type is not recognized.
Receive Backend Server Counters – For MAC-based ports there are two
tables containing backend server counters. The left-most shows a
summary of all backend server counters on this port. The right-most shows
backend server counters for the currently selected client, or dashes if no
client is selected or available. A client can be selected from the list of
authorized/unauthorized clients below the two counter tables.
◆ Access Challenges –
■ 802.1X-based: Counts the number of times that the switch receives
the first request from the backend server following the first
response from the supplicant. Indicates that the backend server has
communication with the switch.
■ MAC-based: Counts all Access Challenges received from the
backend server for this port (left-most table) or client (right-most
table).
– 216 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
◆ Other Requests –
■ 802.1X-based: Counts the number of times that the switch sends
an EAP Request packet following the first to the supplicant.
Indicates that the backend server chose an EAP-method.
■ MAC-based: Not applicable.
◆ Auth. Successes –
■ 802.1X- and MAC-based: Counts the number of times that the
switch receives a success indication. Indicates that the supplicant/
client has successfully authenticated to the backend server.
◆ Auth. Failures –
■ 802.1X- and MAC-based: Counts the number of times that the
switch receives a failure message. This indicates that the
supplicant/client has not authenticated to the backend server.
◆ VLAN ID – The VLAN ID on which the last frame from the last
supplicant/client was received.
◆ Version –
■ 802.1X-based: The protocol version number carried in the most
recently received EAPOL frame.
■ MAC-based: Not applicable.
◆ Identity –
■ 802.1X-based: The user name (supplicant identity) carried in the
most recently received Response Identity EAPOL frame.
■ MAC-based: Not applicable.
– 217 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
Selected Counters
This table is visible when the port is one of the following administrative
states: Multi 802.1X or MAC-based Auth.
The table is identical to and is placed next to the Port Counters table, and
will be empty if no MAC address is currently selected. To populate the
table, select one of the attached MAC Addresses from the table.
◆ MAC Address – For Multi 802.1X, this column holds the MAC address
of the attached supplicant.
For MAC-based Auth., this column holds the MAC address of the
attached client.
Clicking the link causes the client's Backend Server counters to be
shown in the Selected Counters table. If no clients are attached, it
shows “No clients attached.”
WEB INTERFACE
To display port Statistics for 802.1X or Remote Authentication Service:
– 218 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
DISPLAYING ACL Use the ACL Status page to show the status for different security modules
STATUS which use ACL filtering, including ingress port, frame type, and forwarding
action. Each row describes a defined ACE (see page 88).
PATH
Monitor, Security, Network, ACL Status
PARAMETERS
These parameters are displayed:
◆ User – Indicates the ACL user (see "Configuring User Privilege Levels"
on page 57 for a list of software modules).
◆ Ingress Port – Indicates the ingress port to which the ACE applies.
Possible values are:
■ Any: The ACE will match any ingress port.
■ Policy: The ACE will match ingress ports with a specific policy.
■ Port: The ACE will match a specific ingress port.
◆ Frame Type – Indicates the frame type to which the ACE applies.
Possible values are:
■ Any: The ACE will match any frame type.
■ EType: The ACE will match Ethernet Type frames. Note that an
Ethernet Type based ACE will not get matched by IP and ARP
frames.
■ ARP: ACE will match ARP/RARP frames.
■ IPv4: ACE will match all IPv4 frames.
– 219 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
◆ CPU – Forwards packet that matched the specific ACE to the CPU.
◆ CPU Once – Forwards first packet that matched the specific ACE to the
CPU.
◆ Conflict – This field shows “Yes” if a specific ACE is not applied due to
hardware limitations.
WEB INTERFACE
To display ACL status:
– 220 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
DISPLAYING Use the DHCP Snooping Port Statistics page to show statistics for various
STATISTICS FOR types of DHCP protocol packets.
DHCP SNOOPING
PATH
Monitor, Security, Network, DHCP, Snooping Statistics
PARAMETERS
These parameters are displayed:
WEB INTERFACE
To display DHCP Snooping Port Statistics:
– 221 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
DISPLAYING DHCP Use the DHCP Relay Statistics page to display statistics for the DHCP relay
RELAY STATISTICS service supported by this switch and DHCP relay clients.
PATH
Monitor, Security, Network, DHCP, Relay Statistics
PARAMETERS
These parameters are displayed:
Server Statistics
– 222 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
Client Statistics
WEB INTERFACE
To display DHCP relay statistics, click Monitor, DHCP, Relay Statistics.
DISPLAYING MAC Open the Dynamic ARP Inspection Table to display address entries sorted
ADDRESS BINDINGS first by port, then VLAN ID, MAC address, and finally IP address.
FOR ARP PACKETS
Each page shows up to 999 entries from the Dynamic ARP Inspection table,
default being 20, selected through the “entries per page” input field. When
first visited, the web page will show the first 20 entries from the beginning
of the Dynamic ARP Inspection Table.
PATH
Monitor, Security, Network, ARP Inspection
– 223 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About Security Settings
WEB INTERFACE
To display the Dynamic ARP Inspection Table, click Monitor, Security,
Network, ARP Inspection.
DISPLAYING ENTRIES Open the Dynamic IP Source Guard Table to display entries sorted first by
IN THE IP SOURCE port, then VLAN ID, MAC address, and finally IP address.
GUARD TABLE
Each page shows up to 999 entries from the Dynamic IP Source Guard
table, default being 20, selected through the “entries per page” input field.
When first visited, the web page will show the first 20 entries from the
beginning of the Dynamic IP Source Guard Table.
PATH
Monitor, Security, Network, IP Source Guard
WEB INTERFACE
To display the Dynamic IP Source Guard Table, click Monitor, Security,
Network, IP Source Guard.
– 224 –
CHAPTER 5 | Monitoring the Switch
Displaying Information on Authentication Servers
DISPLAYING A LIST OF Use the RADIUS Overview page to display a list of configured
AUTHENTICATION authentication and accounting servers.
SERVERS
PATH
Monitor, Security, AAA, RADIUS Overview
PARAMETERS
These parameters are displayed:
◆ Status – The current state of the server. This field takes one of the
following values:
WEB INTERFACE
To display a list of configured authentication and accounting servers, click
Monitor, Security, AAA, RADIUS Overview.
– 225 –
CHAPTER 5 | Monitoring the Switch
Displaying Information on Authentication Servers
DISPLAYING Use the RADIUS Details page to display statistics for configured
STATISTICS FOR authentication and accounting servers. The statistics map closely to those
CONFIGURED specified in RFC4668 - RADIUS Authentication Client MIB.
AUTHENTICATION
SERVERS PATH
Monitor, Security, AAA, RADIUS Details
PARAMETERS
These parameters are displayed:
◆ Receive Packets
◆ Transmit Packets
– 226 –
CHAPTER 5 | Monitoring the Switch
Displaying Information on Authentication Servers
◆ Other Info
■ State – The current state of the server. This field takes one of the
following values:
◆ Receive Packets
– 227 –
CHAPTER 5 | Monitoring the Switch
Displaying Information on Authentication Servers
◆ Transmit Packets
◆ Other Info
■ State – The current state of the server. It takes one of the following
values:
– 228 –
CHAPTER 5 | Monitoring the Switch
Displaying Information on LACP
WEB INTERFACE
To display statistics for configured authentication and accounting servers,
click Monitor, Authentication, RADIUS Details.
DISPLAYING AN Use the LACP System Status page to display an overview of LACP groups.
OVERVIEW OF LACP
GROUPS PATH
Monitor, LACP, System Status
PARAMETERS
These parameters are displayed:
– 229 –
CHAPTER 5 | Monitoring the Switch
Displaying Information on LACP
◆ Partner Key – The Key that the partner has assigned to this LAG.
◆ Local Ports – Shows the local ports that are a part of this LAG.
WEB INTERFACE
To display an overview of LACP groups active on this switch, click Monitor,
LACP, System Status.
DISPLAYING LACP Use the LACP Port Status page to display information on the LACP groups
PORT STATUS active on each port.
PATH
Monitor, LACP, Port Status
PARAMETERS
These parameters are displayed:
◆ Key – Current operational value of the key for the aggregation port.
Note that only ports with the same key can aggregate together.
– 230 –
CHAPTER 5 | Monitoring the Switch
Displaying Information on LACP
WEB INTERFACE
To display LACP status for local ports this switch, click Monitor, LACP, Port
Status.
DISPLAYING LACP Use the LACP Port Statistics page to display statistics on LACP control
PORT STATISTICS packets crossing on each port.
PATH
Monitor, LACP, Port Statistics
PARAMETERS
These parameters are displayed:
◆ LACP Transmitted – The number of LACP frames sent from each port.
WEB INTERFACE
To display LACP statistics for local ports this switch, click Monitor, LACP,
Port Statistics.
– 231 –
CHAPTER 5 | Monitoring the Switch
Displaying Information on the Spanning Tree
DISPLAYING BRIDGE Use the Bridge Status page to display STA information on the global bridge
STATUS FOR STA (i.e., this switch) and individual ports.
PATH
Monitor, Spanning Tree, Bridge Status
PARAMETERS
These parameters are displayed:
STA Bridges
◆ MSTI – The Bridge Instance. This is also a link to the STP Detailed
Bridge Status.
◆ Root ID – The priority and MAC address of the device in the Spanning
Tree that this switch has been accepted as the root device.
◆ Root Port – The number of the port on this switch that is closest to the
root. This switch communicates with the root device through this port.
If there is no root port, then this switch has been accepted as the root
device of the Spanning Tree network.
◆ Root Cost – The path cost from the root port on this switch to the root
device. For the root bridge this is zero. For all other bridges, it is the
sum of the port path costs on the least cost path to the root bridge.
◆ Topology Change Last – Time since the Spanning Tree was last
reconfigured.
STP Detailed Bridge Status – Click on a bridge instance under the MSTI
field to display detailed information on the selected entry. The following
additional information is displayed.
– 232 –
CHAPTER 5 | Monitoring the Switch
Displaying Information on the Spanning Tree
◆ Internal Root Cost – The Regional Root Path Cost. For the Regional
Root Bridge this is zero. For all other CIST instances in the same MSTP
region, it is the sum of the Internal Port Path Costs on the least cost
path to the Internal Root Bridge. (This parameter only applies to the
CIST instance.)
◆ Role – Roles are assigned according to whether the port is part of the
active topology connecting the bridge to the root bridge (i.e., root
port), connecting a LAN through the bridge to the root bridge (i.e.,
designated port); or is an alternate or backup port that may provide
connectivity if other bridges, bridge ports, or LANs fail or are removed.
◆ State – Displays the current state of this port in the Spanning Tree:
■ Blocking – Port receives STA configuration messages, but does not
forward packets.
■ Learning – Port has transmitted configuration messages for an
interval set by the Forward Delay parameter without receiving
contradictory information. Port address table is cleared, and the
port begins learning addresses.
■ Forwarding – Port forwards packets, and continues learning
addresses.
◆ Path Cost – The contribution of this port to the path cost of paths
towards the spanning tree root which include this port. This will either
be a value computed from the Auto setting, or any explicitly configured
value.
◆ Edge – The current RSTP port (operational) Edge Flag. An Edge Port is
a switch port to which no bridges are attached. The flag may be
automatically computed or explicitly configured. Each Edge Port
transitions directly to the Forwarding Port State, since there is no
possibility of it participating in a loop.
◆ Uptime – The time since the bridge port was last initialized.
– 233 –
CHAPTER 5 | Monitoring the Switch
Displaying Information on the Spanning Tree
WEB INTERFACE
To display an overview of all STP bridge instances, click Monitor, Spanning
Tree, Bridge Status.
DISPLAYING PORT Use the Port Status page to display the STA functional status of
STATUS FOR STA participating ports.
PATH
Monitor, Spanning Tree, Port Status
PARAMETERS
These parameters are displayed:
– 234 –
CHAPTER 5 | Monitoring the Switch
Displaying Information on the Spanning Tree
◆ CIST Role – Roles are assigned according to whether the port is part of
the active topology connecting the bridge to the root bridge (i.e., root
port), connecting a LAN through the bridge to the root bridge (i.e.,
designated port); or is an alternate or backup port that may provide
connectivity if other bridges, bridge ports, or LANs fail or are removed.
◆ CIST State – Displays current state of this port within the Spanning
Tree:
■ Blocking – Port receives STA configuration messages, but does not
forward packets.
■ Learning – Port has transmitted configuration messages for an
interval set by the Forward Delay parameter without receiving
contradictory information. Port address table is cleared, and the
port begins learning addresses.
■ Forwarding – Port forwards packets, and continues learning
addresses.
◆ Uptime – The time since the bridge port was last initialized.
WEB INTERFACE
To display information on spanning tree port status, click Monitor, Spanning
Tree, Port Status.
DISPLAYING PORT Use the Port Statistics page to display statistics on spanning tree protocol
STATISTICS FOR STA packets crossing each port.
PATH
Monitor, Spanning Tree, Port Statistics
PARAMETERS
These parameters are displayed:
– 235 –
CHAPTER 5 | Monitoring the Switch
Displaying MVR Information
WEB INTERFACE
To display information on spanning port statistics, click Monitor, Spanning
Tree, Port Statistics.
DISPLAYING MVR Use the MVR Statistics page to display statistics for IGMP protocol
STATISTICS messages used by MVR.
PATH
Monitor, MVR, Statistics
PARAMETERS
These parameters are displayed:
– 236 –
CHAPTER 5 | Monitoring the Switch
Displaying MVR Information
WEB INTERFACE
To display information for MVR statistics, click Monitor, MVR, Statistics.
DISPLAYING MVR Use the MVR Group Information page to display statistics for IGMP protocol
GROUP INFORMATION messages used by MVR; and to shows information about the interfaces
associated with multicast groups assigned to the MVR VLAN.
PATH
Monitor, MVR, Group Information
PARAMETERS
These parameters are displayed:
Statistics
Multicast Groups
– 237 –
CHAPTER 5 | Monitoring the Switch
Showing IGMP Snooping Information
WEB INTERFACE
To display information for MVR statistics and multicast groups, click
Monitor, MVR, Group Information.
SHOWING IGMP Use the IGMP Snooping Status page to display IGMP querier status,
SNOOPING STATUS snooping statistics for each VLAN carrying IGMP traffic, and the ports
connected to an upstream multicast router/switch.
PATH
Monitor, IPMC, IGMP Snooping, Status
PARAMETERS
These parameters are displayed:
Statistics
◆ VLAN ID – VLAN Identifier.
◆ Host Version – IGMP version used when used by this switch when
serving as a host in IGMP proxy mode.
– 238 –
CHAPTER 5 | Monitoring the Switch
Showing IGMP Snooping Information
Router Port
◆ Port – Port Identifier.
WEB INTERFACE
To display IGMP snooping status information, click Monitor, IGMP Snooping,
Status.
SHOWING IGMP Use the IGMP Snooping Group Information page to display the port
SNOOPING GROUP members of each service group.
INFORMATION
PATH
Monitor, IPMC, IGMP Snooping, Group Information
PARAMETERS
These parameters are displayed:
– 239 –
CHAPTER 5 | Monitoring the Switch
Showing IGMP Snooping Information
WEB INTERFACE
To display the port members of each service group, click Monitor, IGMP
Snooping, Group Information.
SHOWING IPV4 SSM Use the IGMP SSM Information page to display IGMP Source-Specific
INFORMATION Information including group, filtering mode (include or exclude), source
address, and type (allow or deny).
PATH
Monitor, IPMC, IGMP Snooping, IPv4 SSM Information
PARAMETERS
These parameters are displayed:
◆ Mode – The filtering mode maintained per VLAN ID, port number, and
Group Address. It can be either Include or Exclude.
– 240 –
CHAPTER 5 | Monitoring the Switch
Showing MLD Snooping Information
WEB INTERFACE
To display IGMP Source-Specific Information, click Monitor, IGMP Snooping,
IGMP SSM Information.
SHOWING MLD Use the IGMP Snooping Status page to display MLD querier status and
SNOOPING STATUS snooping statistics for each VLAN carrying multicast traffic, and the ports
connected to an upstream multicast router/switch.
PATH
Monitor, IPMC, MLD Snooping, Status
PARAMETERS
These parameters are displayed:
Statistics
◆ VLAN ID – VLAN Identifier.
◆ Host Version – MLD version used when used by this switch when
serving as a host in MLD proxy mode.
– 241 –
CHAPTER 5 | Monitoring the Switch
Showing MLD Snooping Information
Router Port
◆ Port – Port Identifier.
◆ Status – Ports connected to multicast routers may be dynamically
discovered by this switch or statically assigned to an interface on this
switch.
WEB INTERFACE
To display MLD snooping status information, click Monitor, MLD Snooping,
Status.
SHOWING MLD Use the MLD Snooping Group Information page to display the port
SNOOPING GROUP members of each service group.
INFORMATION
PATH
Monitor, IPMC, MLD Snooping, Group Information
PARAMETERS
These parameters are displayed:
– 242 –
CHAPTER 5 | Monitoring the Switch
Showing MLD Snooping Information
WEB INTERFACE
To display the port members of each service group, click Monitor, MLD
Snooping, Group Information.
SHOWING IPV6 SSM Use the MLD SSM Information page to display MLD Source-Specific
INFORMATION Information including group, filtering mode (include or exclude), source
address, and type (allow or deny).
PATH
Monitor, IPMC, MLD Snooping, IPv6 SSM Information
PARAMETERS
These parameters are displayed:
◆ Mode – The filtering mode maintained per VLAN ID, port number, and
Group Address. It can be either Include or Exclude.
WEB INTERFACE
To display MLD Source-Specific Information, click Monitor, MLD Snooping,
IPv6 SSM Information.
– 243 –
CHAPTER 5 | Monitoring the Switch
Displaying LLDP Information
DISPLAYING LLDP Use the LLDP Neighbor Information page to display information about
NEIGHBOR devices connected directly to the switch’s ports which are advertising
INFORMATION information through LLDP.
PATH
Monitor, LLDP, Neighbors
PARAMETERS
These parameters are displayed:
◆ Remote Port ID – A string that contains the specific identifier for the
port from which this LLDPDU was transmitted.
ID Basis Reference
Other –
– 244 –
CHAPTER 5 | Monitoring the Switch
Displaying LLDP Information
WEB INTERFACE
To display information about LLDP neighbors, click Monitor, LLDP,
Neighbors.
DISPLAYING LLDP- Use the LLDP-MED Neighbor Information page to display information about
MED NEIGHBOR a remote device connected to a port on this switch which is advertising
INFORMATION LLDP-MED TLVs, including network connectivity device, endpoint device,
capabilities, application type, and policy.
PATH
Monitor, LLDP, LLDP-MED Neighbors
PARAMETERS
These parameters are displayed:
– 245 –
CHAPTER 5 | Monitoring the Switch
Displaying LLDP Information
– 246 –
CHAPTER 5 | Monitoring the Switch
Displaying LLDP Information
◆ VLAN ID – The VLAN identifier (VID) for the port as defined in IEEE
802.1Q-2003. A value of 1 through 4094 is used to define a valid VLAN
ID. A value of 0 (Priority Tagged) is used if the device is using priority
tagged frames as defined by IEEE 802.1Q-2003, meaning that only the
IEEE 802.1D priority level is significant and the default PVID of the
ingress port is used instead.
◆ DSCP – The value to be used to provide Diffserv node behavior for the
specified application type as defined in IETF RFC 2474. (Range: 0-63)
WEB INTERFACE
To display information about LLDP-MED neighbors, click Monitor, LLDP,
LLDP-MED Neighbors.
DISPLAYING LLDP Use the LLDP Neighbors EEE Information page to displays Energy Efficient
NEIGHBOR EEE Ethernet information advertised through LLDP messages.
INFORMATION
PATH
Monitor, LLDP, EEE
PARAMETERS
These parameters are displayed:
◆ Local Port – The port on this switch which received the LLDP frame.
– 247 –
CHAPTER 5 | Monitoring the Switch
Displaying LLDP Information
◆ Tx Tw – The link partner's maximum time that the transmit path can
hold off sending data after de-assertion of Lower Power Idle (LPI)
mode. (Tw indicates Wake State Time)
◆ Rx Tw – The link partner's time the receiver would like the transmitter
to hold off to allow time for it to wake from sleep.
WEB INTERFACE
To display LLDP neighbor EEE information, click Monitor, LLDP, EEE.
– 248 –
CHAPTER 5 | Monitoring the Switch
Displaying LLDP Information
DISPLAYING LLDP Use the LLDP Port Statistics page to display statistics on LLDP global
PORT STATISTICS counters and control frames.
PATH
Monitor, LLDP, Port Statistics
PARAMETERS
These parameters are displayed:
Global Counters
LLDP Statistics
– 249 –
CHAPTER 5 | Monitoring the Switch
Displaying LLDP Information
◆ Age-Outs – Each LLDP frame contains information about how long the
LLDP information is valid (age-out time). If no new LLDP frame is
received within the age-out time, the LLDP information is removed, and
the Age-Out counter is incremented.
WEB INTERFACE
To display statistics on LLDP global counters and control frames, click
Monitor, LLDP, Port Statistics.
DISPLAYING LLDP Use the LLDP Neighbor Power Over Ethernet Information page to display
NEIGHBOR POE the status of all LLDP PoE neighbors, including power device type (PSE or
INFORMATION PD), source of power, power priority, and maximum required power.
PATH
Monitor, LLDP, PoE
PARAMETERS
These parameters are displayed:
◆ Local Port – The port on this switch which received the LLDP frame.
– 250 –
CHAPTER 5 | Monitoring the Switch
Displaying PoE Status
For a PD device, it can run on its local power supply or use the PSE as a
power source. It can also use both its local power supply and the PSE.
If it is unknown what power supply the PD device is using, this is
indicated as “Unknown.”
◆ Power Priority – Power Priority represents the priority of the PD
device, or the power priority associated with the PSE type device's port
that is sourcing the power. There are three levels of power priority. The
three levels (Critical, High and Low). If the power priority is unknown,
this is indicated as “Unknown.”
WEB INTERFACE
To display LLDP neighbor PoE information, click Monitor, LLDP, PoE.
PATH
Monitor, PoE
PARAMETERS
These parameters are displayed:
◆ Local Port – The port on this switch which received the LLDP frame.
– 251 –
CHAPTER 5 | Monitoring the Switch
Displaying the MAC Address Table
◆ Power Allocated – Amount of power the switch has allocated for the
PD.
WEB INTERFACE
To display the status for all PoE ports, click Monitor, PoE.
PATH
Monitor, MAC Address Table
PARAMETERS
These parameters are displayed:
◆ Start from VLAN # and MAC address # with # entries per page –
These input fields allow you to select the starting point in the table.
– 252 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About VLANs
WEB INTERFACE
To display the address table, click Monitor, MAC Address Table.
VLAN MEMBERSHIP Use the VLAN Membership Status page to display the current port
members for all VLANs configured by a selected software module.
PATH
Monitor, VLANs, VLAN Membership
PARAMETERS
These parameters are displayed:
– 253 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About VLANs
WEB INTERFACE
1. To display VLAN members, click Monitor, VLANs, VLAN Membership.
2. Select a software module from the drop-down list on the right side of
the page.
VLAN PORT STATUS Use the VLAN Port Status page to show the VLAN attributes of port
members for all VLANs configured by a selected software module, including
PVID, VLAN aware, ingress filtering, frame type, egress filtering, and UVID.
PATH
Monitor, VLANs, VLAN Port
PARAMETERS
These parameters are displayed:
– 254 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About VLANs
◆ Frame Type – Shows whether the port accepts all frames or only
tagged frames. If the port only accepts tagged frames, untagged
frames received on that port are discarded.
◆ UVID – Shows the untagged VLAN ID. A port's UVID determines the
packet's behavior at the egress side. If the VID of Ethernet frames
leaving a port match the UVID, these frames will be sent untagged.
WEB INTERFACE
1. To display VLAN port status, click Monitor, VLANs, VLAN Port.
2. Select a software module from the drop-down list on the right side of
the page.
– 255 –
CHAPTER 5 | Monitoring the Switch
Displaying Information About MAC-based VLANs
PATH
Monitor, VCL, MAC-based VLAN
PARAMETERS
These parameters are displayed:
WEB INTERFACE
1. To display MAC-based VLAN membership settings, click Monitor, VCL,
MAC-based VLAN.
2. Select a software module from the drop-down list on the right side of
the page.
– 256 –
6 PERFORMING BASIC DIAGNOSTICS
This chapter describes how to test network connectivity using Ping for IPv4
or IPv6, and how to test network cables.
PATH
◆ Diagnostics, Ping
◆ Diagnostics, Ping6
PARAMETERS
These parameters are displayed on the Ping page:
WEB INTERFACE
To ping another device on the network:
4. Click Start.
After you press Start, five ICMP packets are transmitted, and the sequence
number and round-trip time are displayed upon reception of a reply. The
page refreshes automatically until responses to all packets are received, or
until a timeout occurs.
– 257 –
CHAPTER 6 | Performing Basic Diagnostics
Running Cable Diagnostics
PATH
Diagnostics, VeriPHY
PARAMETERS
These parameters are displayed on the VeriPHY Cable Diagnostics page:
– 258 –
CHAPTER 6 | Performing Basic Diagnostics
Running Cable Diagnostics
WEB INTERFACE
To run cable diagnostics:
3. Click Start.
Ports will be linked down while running VeriPHY. Therefore, running VeriPHY
on a management port will cause the switch to stop responding until
testing is completed.
– 259 –
CHAPTER 6 | Performing Basic Diagnostics
Running Cable Diagnostics
– 260 –
7 PERFORMING SYSTEM MAINTENANCE
PATH
Maintenance, Restart Device
WEB INTERFACE
To restart the switch
2. Click Yes.
The reset will be complete when the user interface displays the login page.
– 261 –
CHAPTER 7 | Performing System Maintenance
Restoring Factory Defaults
PATH
Maintenance, Restart Device
CLI REFERENCES
"system restore default" on page 275
WEB INTERFACE
To restore factory defaults:
2. Click Yes.
The factory defaults are immediately restored, which means that no reboot
is necessary.
UPGRADING FIRMWARE
Use the Software Upload page to upgrade the switch’s system firmware by
specifying a file provided by SMC/Edge-Core. You can download firmware
files for your switch from the Support section of the SMC/Edge-Core web
site.
PATH
Maintenance, Software Upload
WEB INTERFACE
To upgrade firmware:
– 262 –
CHAPTER 7 | Performing System Maintenance
Managing Configuration Files
After the software image is uploaded, a page announces that the firmware
update has been initiated. After about a minute, the firmware is updated
and the switch is rebooted.
SAVING Use the Configuration Save page to save the current configuration settings
CONFIGURATION to a file on your local management station.
SETTINGS
PATH
Maintenance, Configuration, Save
WEB INTERFACE
To save your current configuration settings:
3. Specify the directory and name of the file under which to save the
current configuration settings.
– 263 –
CHAPTER 7 | Performing System Maintenance
Managing Configuration Files
WEB INTERFACE
To restore your current configuration settings:
– 264 –
SECTION III
APPENDICES
– 265 –
A SOFTWARE SPECIFICATIONS
SOFTWARE FEATURES
MANAGEMENT Local, RADIUS, TACACS+, AAA, Port Authentication (802.1X), HTTPS, SSH,
AUTHENTICATION Port Security, IP Filter, DHCP Snooping
CLIENT ACCESS Access Control Lists (128 rules per system), Port Authentication (802.1X),
CONTROL MAC Authentication, Port Security, DHCP Snooping, IP Source Guard, ARP
Inspection
STORM CONTROL Broadcast, multicast, or unicast traffic throttled above a critical threshold
– 266 –
APPENDIX A | Software Specifications
Management Features
QUALITY OF SERVICE DiffServ supports DSCP remarking, ingress traffic policing, and egress
traffic shaping
MANAGEMENT FEATURES
IN-BAND MANAGEMENT Web-based HTTP or HTTPS, or SNMP manager, Secure Shell, or Telnet
– 267 –
APPENDIX A | Software Specifications
Standards
STANDARDS
ANSI/TIA-1057 LLDP for Media Endpoint Discovery - LLDP-MED
IEEE 802.1AB Link Layer Discovery Protocol
IEEE-802.1ad Provider Bridge
IEEE 802.1D-2004 Spanning Tree Algorithm and traffic priorities
Spanning Tree Protocol
Rapid Spanning Tree Protocol
Multiple Spanning Tree Protocol
IEEE 802.1p Priority tags
IEEE 802.1Q-2005 VLAN
IEEE 802.1v Protocol-based VLANs
IEEE 802.1X Port Authentication
IEEE 802.3-2005
Ethernet, Fast Ethernet, Gigabit Ethernet
Link Aggregation Control Protocol (LACP)
Full-duplex flow control (ISO/IEC 8802-3)
IEEE 802.3ac VLAN tagging
ARP (RFC 826)
DHCP Client (RFC 2131)
DHCPv6 Client (RFC 3315)
HTTPS
ICMP (RFC 792)
IGMP (RFC 1112)
IGMPv2 (RFC 2236)
IGMPv3 (RFC 3376) - partial support
IPv4 IGMP (RFC 3228)
NTP (RFC 1305)
RADIUS+ (RFC 2618)
RMON (RFC 2819 groups 1,2,3,9)
SNMP (RFC 1157)
SNMPv2c (RFC 2571)
SNMPv3 (RFC DRAFT 3414, 3415)
SNTP (RFC 2030)
SSH (Version 2.0)
TFTP (RFC 1350)
– 268 –
APPENDIX A | Software Specifications
Management Information Bases
– 269 –
B TROUBLESHOOTING
Symptom Action
– 270 –
APPENDIX B | Troubleshooting
Using System Logs
1. Enable logging.
3. Enable SNMP.
7. Make a list of the commands or circumstances that led to the fault. Also
make a list of any error messages displayed.
– 271 –
C LICENSE INFORMATION
This product includes copyrighted third-party software subject to the terms of the GNU General Public
License (GPL), GNU Lesser General Public License (LGPL), or other related free software licenses.
The GPL code used in this product is distributed WITHOUT ANY WARRANTY and is subject to the
copyrights of one or more authors. For details, refer to the section "The GNU General Public License"
below, or refer to the applicable license as included in the source-code archive.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public License is intended to guarantee your freedom to share and
change free software--to make sure the software is free for all its users. This General Public License
applies to most of the Free Software Foundation's software and to any other program whose authors
commit to using it. (Some other Free Software Foundation software is covered by the GNU Library
General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses
are designed to make sure that you have the freedom to distribute copies of free software (and
charge for this service if you wish), that you receive source code or can get it if you want it, that you
can change the software or use pieces of it in new free programs; and that you know you can do
these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to
ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you
distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the
recipients all the rights that you have. You must make sure that they, too, receive or can get the
source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which
gives you legal permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that
there is no warranty for this free software. If the software is modified by someone else and passed on,
we want its recipients to know that what they have is not the original, so that any problems introduced
by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger
that redistributors of a free program will individually obtain patent licenses, in effect making the
program proprietary. To prevent this, we have made it clear that any patent must be licensed for
everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
– 272 –
APPENDIX C | License Information
The GNU General Public License
GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION
AND MODIFICATION
1. This License applies to any program or other work which contains a notice placed by the
copyright holder saying it may be distributed under the terms of this General Public License. The
"Program", below, refers to any such program or work, and a "work based on the Program"
means either the Program or any derivative work under copyright law: that is to say, a work
containing the Program or a portion of it, either verbatim or with modifications and/or translated
into another language. (Hereinafter, translation is included without limitation in the term
"modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they
are outside its scope. The act of running the Program is not restricted, and the output from the
Program is covered only if its contents constitute a work based on the Program (independent of
having been made by running the Program). Whether that is true depends on what the Program
does.
2. You may copy and distribute verbatim copies of the Program's source code as you receive it, in
any medium, provided that you conspicuously and appropriately publish on each copy an
appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to
this License and to the absence of any warranty; and give any other recipients of the Program a
copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer
warranty protection in exchange for a fee.
3. You may modify your copy or copies of the Program or any portion of it, thus forming a work
based on the Program, and copy and distribute such modifications or work under the terms of
Section 1 above, provided that you also meet all of these conditions:
a). You must cause the modified files to carry prominent notices stating that you changed the
files and the date of any change.
b). You must cause any work that you distribute or publish, that in whole or in part contains or is
derived from the Program or any part thereof, to be licensed as a whole at no charge to all
third parties under the terms of this License.
c). If the modified program normally reads commands interactively when run, you must cause
it, when started running for such interactive use in the most ordinary way, to print or display
an announcement including an appropriate copyright notice and a notice that there is no
warranty (or else, saying that you provide a warranty) and that users may redistribute the
program under these conditions, and telling the user how to view a copy of this License.
(Exception: if the Program itself is interactive but does not normally print such an
announcement, your work based on the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work
are not derived from the Program, and can be reasonably considered independent and separate
works in themselves, then this License, and its terms, do not apply to those sections when you
distribute them as separate works. But when you distribute the same sections as part of a whole
which is a work based on the Program, the distribution of the whole must be on the terms of this
License, whose permissions for other licensees extend to the entire whole, and thus to each and
every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written
entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or
collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or
with a work based on the Program) on a volume of a storage or distribution medium does not
bring the other work under the scope of this License.
4. You may copy and distribute the Program (or a work based on it, under Section 2) in object code
or executable form under the terms of Sections 1 and 2 above provided that you also do one of
the following:
a). Accompany it with the complete corresponding machine-readable source code, which must
be distributed under the terms of Sections 1 and 2 above on a medium customarily used for
software interchange; or,
– 273 –
APPENDIX C | License Information
The GNU General Public License
b). Accompany it with a written offer, valid for at least three years, to give any third party, for a
charge no more than your cost of physically performing source distribution, a complete
machine-readable copy of the corresponding source code, to be distributed under the terms
of Sections 1 and 2 above on a medium customarily used for software interchange; or,
c). Accompany it with the information you received as to the offer to distribute corresponding
source code. (This alternative is allowed only for noncommercial distribution and only if you
received the program in object code or executable form with such an offer, in accord with
Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it.
For an executable work, complete source code means all the source code for all modules it
contains, plus any associated interface definition files, plus the scripts used to control
compilation and installation of the executable. However, as a special exception, the source code
distributed need not include anything that is normally distributed (in either source or binary form)
with the major components (compiler, kernel, and so on) of the operating system on which the
executable runs, unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated
place, then offering equivalent access to copy the source code from the same place counts as
distribution of the source code, even though third parties are not compelled to copy the source
along with the object code.
5. You may not copy, modify, sublicense, or distribute the Program except as expressly provided
under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program
is void, and will automatically terminate your rights under this License. However, parties who
have received copies, or rights, from you under this License will not have their licenses
terminated so long as such parties remain in full compliance.
6. You are not required to accept this License, since you have not signed it. However, nothing else
grants you permission to modify or distribute the Program or its derivative works. These actions
are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the
Program (or any work based on the Program), you indicate your acceptance of this License to do
so, and all its terms and conditions for copying, distributing or modifying the Program or works
based on it.
7. Each time you redistribute the Program (or any work based on the Program), the recipient
automatically receives a license from the original licensor to copy, distribute or modify the
Program subject to these terms and conditions. You may not impose any further restrictions on
the recipients' exercise of the rights granted herein. You are not responsible for enforcing
compliance by third parties to this License.
8. If, as a consequence of a court judgment or allegation of patent infringement or for any other
reason (not limited to patent issues), conditions are imposed on you (whether by court order,
agreement or otherwise) that contradict the conditions of this License, they do not excuse you
from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your
obligations under this License and any other pertinent obligations, then as a consequence you
may not distribute the Program at all. For example, if a patent license would not permit royalty-
free redistribution of the Program by all those who receive copies directly or indirectly through
you, then the only way you could satisfy both it and this License would be to refrain entirely from
distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance,
the balance of the section is intended to apply and the section as a whole is intended to apply in
other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right
claims or to contest validity of any such claims; this section has the sole purpose of protecting
the integrity of the free software distribution system, which is implemented by public license
practices. Many people have made generous contributions to the wide range of software
distributed through that system in reliance on consistent application of that system; it is up to the
author/donor to decide if he or she is willing to distribute software through any other system and
a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the
rest of this License.
– 274 –
APPENDIX C | License Information
The GNU General Public License
9. If the distribution and/or use of the Program is restricted in certain countries either by patents or
by copyrighted interfaces, the original copyright holder who places the Program under this
License may add an explicit geographical distribution limitation excluding those countries, so
that distribution is permitted only in or among countries not thus excluded. In such case, this
License incorporates the limitation as if written in the body of this License.
10. The Free Software Foundation may publish revised and/or new versions of the General Public
License from time to time. Such new versions will be similar in spirit to the present version, but
may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version
number of this License which applies to it and "any later version", you have the option of
following the terms and conditions either of that version or of any later version published by the
Free Software Foundation. If the Program does not specify a version number of this License,
you may choose any version ever published by the Free Software Foundation.
11. If you wish to incorporate parts of the Program into other free programs whose distribution
conditions are different, write to the author to ask for permission. For software which is
copyrighted by the Free Software Foundation, write to the Free Software Foundation; we
sometimes make exceptions for this. Our decision will be guided by the two goals of preserving
the free status of all derivatives of our free software and of promoting the sharing and reuse of
software generally.
NO WARRANTY
1. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH
YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
NECESSARY SERVICING, REPAIR OR CORRECTION.
2. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING
BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR
LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO
OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY
HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
– 275 –
GLOSSARY
ACL Access Control List. ACLs can limit network traffic and restrict access to
certain users or devices by checking each packet for certain IP or MAC (i.e.,
Layer 2) information.
DHCP OPTION 82 A relay option for sending information about the requesting client (or an
intermediate relay agent) in the DHCP request packets forwarded by the
switch and in reply packets sent back from the DHCP server. This
information can be used by DHCP servers to assign fixed IP addresses, or
set other services or policies for clients.
DHCP SNOOPING A technique used to enhance network security by snooping on DHCP server
messages to track the physical location of hosts, ensure that hosts only use
the IP addresses assigned to them, and ensure that only authorized DHCP
servers are accessible.
– 276 –
GLOSSARY
DNS Domain Name Service. A system used for translating host names for
network nodes into IP addresses.
DSCP Differentiated Services Code Point Service. DSCP uses a six-bit tag to
provide for up to 64 different forwarding behaviors. Based on network
policies, different kinds of traffic can be marked for different kinds of
forwarding. The DSCP bits are mapped to the Class of Service categories,
and then into the output queues.
GARP Generic Attribute Registration Protocol. GARP is a protocol that can be used
by endstations and switches to register and propagate multicast group
membership information in a switched environment so that multicast data
frames are propagated only to those parts of a switched LAN containing
registered endstations. Formerly called Group Address Registration
Protocol.
– 277 –
GLOSSARY
IEEE 802.1D Specifies a general method for the operation of MAC bridges, including the
Spanning Tree Protocol.
IEEE 802.1Q VLAN Tagging—Defines Ethernet frame tags which carry VLAN information.
It allows switches to assign endstations to different virtual LANs, and
defines a standard way for VLANs to communicate across switched
networks.
IEEE 802.1P An IEEE standard for providing quality of service (QoS) in Ethernet
networks. The standard uses packet tags that define up to eight traffic
classes and allows switches to transmit packets based on the tagged
priority value.
IEEE 802.1S An IEEE standard for the Multiple Spanning Tree Protocol (MSTP) which
provides independent spanning trees for VLAN groups.
IEEE 802.1W An IEEE standard for the Rapid Spanning Tree Protocol (RSTP) which
reduces the convergence time for network topology changes to about 10%
of that required by the older IEEE 802.1D STP standard. (Now incorporated
in IEEE 802.1D-2004)
IEEE 802.1X Port Authentication controls access to the switch ports by requiring users to
first enter a user ID and password for authentication.
IEEE 802.3X Defines Ethernet frame start/stop requests and timers used for flow control
on full-duplex links. (Now incorporated in IEEE 802.3-2002)
IGMP Internet Group Management Protocol. A protocol through which hosts can
register with their local router for multicast services. If there is more than
one multicast switch/router on a given subnetwork, one of the devices is
made the “querier” and assumes responsibility for keeping track of group
membership.
– 278 –
GLOSSARY
IGMP QUERY On each subnetwork, one IGMP-capable device will act as the querier —
that is, the device that asks all hosts to report on the IP multicast groups
they wish to join or to which they already belong. The elected querier will
be the device with the lowest IP address in the subnetwork.
IGMP PROXY Proxies multicast group membership information onto the upstream
interface based on IGMP messages monitored on downstream interfaces,
and forwards multicast traffic based on that information. There is no need
for multicast routing protocols in an simple tree that uses IGMP Proxy.
IGMP SNOOPING Listening to IGMP Query and IGMP Report packets transferred between IP
Multicast Routers and IP Multicast host groups to identify IP Multicast
group members.
IN-BAND MANAGEMENT Management of the network from a station attached directly to the
network.
IP MULTICAST FILTERING A process whereby this switch can pass multicast traffic along to
participating hosts.
IP PRECEDENCE The Type of Service (ToS) octet in the IPv4 header includes three
precedence bits defining eight different priority levels ranging from highest
priority for network control packets to lowest priority for routine traffic. The
eight values are mapped one-to-one to the Class of Service categories by
default, but may be configured differently to suit the requirements for
specific network applications.
LAYER 2 Data Link layer in the ISO 7-Layer Data Communications Protocol. This is
related directly to the hardware interface for network devices and passes
on traffic based on MAC addresses.
LLDP Link Layer Discovery Protocol is used to discover basic information about
neighboring devices in the local broadcast domain by using periodic
broadcasts to advertise information such as device identification,
capabilities and configuration settings.
– 279 –
GLOSSARY
MLD SNOOPING Multicast Listener Discovery (MLD) snooping dynamically configures switch
ports to limit IPv6 multicast traffic so that it is forwarded only to ports with
users that want to receive it. This switch supports MLDv1, which includes
Listener Query, Listener Report, and Listener Done messages (equivalent
to IGMPv2 query, report, and leave messages).
MSTP Multiple Spanning Tree Protocol can provide an independent spanning tree
for different VLANs. It simplifies network management, provides for even
faster convergence than RSTP by limiting the size of each region, and
prevents VLAN members from being segmented from the rest of the group.
MULTICAST SWITCHING A process whereby the switch filters incoming multicast frames for services
for which no attached host has registered, or forwards them to all ports
contained within the designated multicast VLAN group.
PORT MIRRORING A method whereby data on a target port is mirrored to a monitor port for
troubleshooting with a logic analyzer or RMON probe. This allows data on
the target port to be studied unobstructively.
– 280 –
GLOSSARY
PORT TRUNK Defines a network link aggregation and trunking method which specifies
how to create a single high-speed logical link that combines several lower-
speed physical links.
PRIVATE VLANS Private VLANs provide port-based security and isolation between ports
within the assigned VLAN. Data traffic on downlink ports can only be
forwarded to, and from, uplink ports.
QINQ QinQ tunneling is designed for service providers carrying traffic for multiple
customers across their networks. It is used to maintain customer-specific
VLAN and Layer 2 protocol configurations even when different customers
use the same internal VLAN IDs.
RSTP Rapid Spanning Tree Protocol. RSTP reduces the convergence time for
network topology changes to about 10% of that required by the older IEEE
802.1D STP standard.
SNTP Simple Network Time Protocol allows a device to set its internal clock based
on periodic updates from a Network Time Protocol (NTP) server. Updates
can be requested from a specific NTP server, or can be received via
broadcasts sent by NTP servers.
– 281 –
GLOSSARY
SSH Secure Shell is a secure replacement for remote access functions, including
Telnet. SSH can authenticate users with a cryptographic key, and encrypt
data connections between management clients and the switch.
STA Spanning Tree Algorithm is a technology that checks your network for any
loops. A loop can often occur in complicated or backup linked network
systems. Spanning Tree detects and directs data along the shortest
available path, maximizing the performance and efficiency of the network.
TACACS+ Terminal Access Controller Access Control System Plus. TACACS+ is a logon
authentication protocol that uses software running on a central server to
control access to TACACS-compliant devices on the network.
TFTP Trivial File Transfer Protocol. A TCP/IP protocol commonly used for software
downloads.
UDP User Datagram Protocol. UDP provides a datagram mode for packet-
switched communications. It uses IP as the underlying transport
mechanism to provide access to IP-like services. UDP packets are delivered
just like IP packets – connection-less datagrams that may be discarded
before reaching their targets. UDP is useful when TCP would be too
complex, too slow, or just unnecessary.
UTC Universal Time Coordinate. UTC is a time scale that couples Greenwich
Mean Time (based solely on the Earth’s rotation rate) with highly accurate
atomic time. The UTC does not have daylight saving time.
VLAN Virtual LAN. A Virtual LAN is a collection of network nodes that share the
same collision domain regardless of their physical location or connection
point in the network. A VLAN serves as a logical workgroup with no
physical barriers, and allows users to share information and resources as
though located on the same LAN.
– 282 –
GLOSSARY
– 283 –
INDEX
– 284 –
INDEX
– 285 –
INDEX
– 286 –
INDEX
U
unknown unicast storm, threshold 193
upgrading software 262
UPnP
advertisements 196
configuration 196
enabling advertisements 196
user
account 55
name 55
password 55
– 287 –
Headquarters & SMC NETWORKS TECHNICAL SUPPORT
Sub-Sahara Africa Office From Singapore in English and (Mon.-Fri. 9 AM to 5 PM)
Tel: +65-63387667, Ext. 4
No. 1, Creation Rd. III
Hsinchu Science Park From the United Arab Emirates in English (Sun.-Thu. 9 AM to 6 PM)
Tel: +971 800 222866/+971 4 3564810
Taiwan 30077
Tel: +886 3 5770270 From U.S.A. and Canada (24 hours a day, 7 days a week)
Fax: +886 3 5780764 Tel: +1 (800) SMC-4-YOU/+1 (949) 679-8000 Fax: +1 (949) 679-1481
SMCGS10P-Smart
www.edge-core.com / www.smc.com