Powerconnect-5224 User's Guide En-Us
Powerconnect-5224 User's Guide En-Us
Powerconnect-5224 User's Guide En-Us
NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
CAUTION: A CAUTION indicates a potential for property damage, personal injury, or death.
Reproduction in any manner whatsoever without the written permission of Dell Computer Corporation is strictly forbidden.
Trademarks used in this text: Dell, the DELL logo, PowerConnect, Dimension, Inspiron, Dell Precision, OptiPlex, Latitude, and DellNet are trademarks of Dell Computer Corporation;
Microsoft and Windows are registered trademarks of Microsoft Corporation.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Computer Corporation
disclaims any proprietary interest in trademarks and trade names other than its own.
Introduction
Dell™ PowerConnect™ 5224 Systems User's Guide
Features
Front-Panel Components
Back-Panel Descriptions
Management
Features
The Dell™ PowerConnect™ 5224 Gigabit Ethernet Managed Switch offers the following features:
l Four 10/100/1000BASE-T ports operate in combination with four Small Form Factor Pluggable (SFP) transceiver slots
l IEEE 802.1p Class of Service (CoS) through four priority queues for each port
l Port mirroring
l MAC addresses lookup based on port, VLAN ID, and MAC addresses
l Standard 1U chassis
l 19-inch rack-mountable
Management Features
l W e b-based management with embedded HTTP server
l Text-based management through four in-band Telnet sessions, and an out-of-band RS-232 console port (VT100)
l Simple network management protocol (SNMP)-based network management through an SNMP management console program
l Supports Boot Protocol (BOOTP) and Dynamic Host Configuration Protocol (DHCP) for IP address assignment
PWR LED
The PWR (power) LED shows the general operating status of the system. Indicator states include:
RPS LED
The RPS LED shows the operating status of a connected redundant power unit. Indicator states include:
DIAG LED
The diagnostic (DIAG) LED shows the status of the system diagnostics during initialization. Indicator states include:
Console Port
You can access the console interface from the RS-232 serial port or a Telnet connection. The console port uses a standard null-modem cable. For instructions
on configuring your switch using the console, see "Management Interface."
Port LEDs
Two of the LEDs show the operating status of each Gigabit Ethernet port, and the other LED shows the operating status of each SFP transceiver slot. Details
of the LED indications are provided in each of the following sections.
AC Power Receptacle
The switch automatically adjusts its power setting to any supply voltage in the range of 90 to 240 V alternating current (VAC).
RPS Connector
Connect the optional RPS to the RPS connector. If the switch's internal power unit fails, the redundant power system automatically supplies power to the
switch for uninterrupted operation.
The switch supports the Dell PowerConnect RPS-600 external redundant power system.
CAUTION: Do not use this switch with any redundant power system other than the Dell PowerConnect RPS-600.
Management
The following sections describe options for managing the switch.
Web-Based Interface
NOTE: To access the switch through a web browser, the computer running the web browser must have IP-based network access to the switch.
After you have successfully installed the switch, you can configure the switch, monitor the LED panel, and display statistics graphically using a web browser,
such as Netscape Navigator (version 6.2 and higher) or Microsoft® Internet Explorer (version 5.0).
SNMP-Based Management
You can manage the switch with an SNMP-compatible console program. The switch is compatible with SNMP version 1.0.
The SNMP agent decodes the incoming SNMP messages and responds to requests with MIB objects stored in the database. The SNMP agent updates the MIB
objects every 5 seconds to generate statistics and counters.
Installation
Dell™ PowerConnect™ 5224 Systems User's Guide
Package Contents
Before you begin installing the switch, confirm that your package contains the following items:
l Switch
l AC power cable
l Documentation CD
Before you connect to the network, you must install the switch on a flat surface or in a rack, set up a terminal emulation program, plug in the power cord, and
then set up a password and IP address.
The switch is supplied with rubber feet for stationing it on a flat surface and mounting brackets and screws for mounting the switch in a rack.
1. Set the switch on a flat surface and check for proper ventilation.
Allow at least 2 inches (5.1 centimeters [cm]) on each side of the switch and 5 inches (12.7 cm) at the back for the power cable.
2. Attach the rubber feet on the marked locations on the bottom of the chassis.
The rubber feet, although optional, are recommended to keep the unit from slipping.
NOTE: For racks that are not prethreaded, cage nuts are provided.
1. Use the supplied screws to attach a mounting bracket to each side of the switch.
2. Align the holes in the mounting bracket with the holes in the rack.
3. Insert and tighten two screws through each of the mounting brackets.
CAUTION: Do not use the switch with any redundant power system other than the Dell PowerConnect RPS-600.
l A terminal or a computer with both a serial port and the ability to emulate a terminal
l A null modem or crossover RS-232 cable with a female DB-9 connector for the console port on the switch
1. Connect the female connector of the RS-232 cable directly to the console port on the switch, and tighten the captive retaining screws.
2. Connect the other end of the cable to a terminal or to the serial connector of a computer running terminal emulation software.
a. Select the appropriate serial port (COM port 1 or COM port 2).
c. Set the data format to 8 data bits, 1 stop bit, and no parity.
f. Select Terminal keys for Function, Arrow, and Ctrl keys. Ensure that you select Terminal keys (not Windows keys).
NOTICE: When you use HyperTerminal with the Microsoft® Windows® 2000 operating system, ensure that you have Windows 2000 Service Pack 2 or
later installed. Windows 2000 Service Pack 2 allows you to use arrow keys in HyperTerminal's VT100 emulation. See www.microsoft.com for
information on Windows 2000 service packs.
3. After you have correctly set up the terminal, plug the power cable into the power receptacle on the back of the switch. The boot sequence appears in
the terminal.
4. After the boot sequence completes, the console login screen displays. If you have not logged into the command line interface (CLI) program, the default
user names are admin and guest, and the corresponding passwords are admin and guest.
l If you log in as guest, the CLI displays the Console> prompt to indicate that you are using the CLI in normal access (Normal Exec) mode.
l If you log in as admin, the CLI displays the Console# prompt to indicate that you are using the CLI in privileged access (Privileged Exec) mode.
5. Enter the commands to complete your desired tasks. Many commands require Privileged Exec-level access.
CLI commands for most common tasks are provided in "Management Interface." See the Command Line Reference on the documentation CD for a list of
all commands and additional information on using the CLI.
6. When you have completed your tasks, exit the session with the Quit command.
Password Protection
To proceed through the CLI initial login screen, you must enter a password. If you have not logged into the CLI program, the default user names are admin
and guest, and the corresponding passwords are admin and guest. If you log in as guest, you have access to the Normal Exec level. If you log in as admin, you
have access to the Privileged Exec level.
Username: admin
Password:
Console#
After your initial login, define new passwords for both default user names to prevent unauthorized access to the switch, and record the passwords for future
reference.
1. At the CLI login prompt, enter admin as the user name and password for the Privileged Exec level. Press <Enter>.
3. To set the Normal Exec level password, type username guest password 0 password, where password is your new password (up to eight characters).
Press <Enter>.
4. To set the Privileged Exec level password, type username admin password 0 password, where password is your new password (up to eight characters).
Press <Enter>.
5. To save your configuration changes, type copy running-config startup-config and then press <Enter>.
NOTICE: CLI configuration commands only modify the running configuration file and are not saved when the switch is rebooted. To save all your
configuration changes in nonvolatile storage, you must use the copy command to copy the running configuration file to the startup configuration.
SNMP Settings
Simple Network Management Protocol (SNMP) is a protocol designed specifically for managing devices on a network. Network equipment, such as hubs,
switches, and routers, use SNMP to configure system features for proper operation, as well as to monitor their performance and detect potential problems.
Managed devices that support SNMP include software (referred to as an agent), which runs locally on the device. A defined set of variables (managed objects)
is maintained by the SNMP agent and used to manage the device. These objects are defined in a Management Information Base (MIB), which provides a
standard presentation of the information controlled by the agent. SNMP defines both the format of the MIB specifications and the protocol used to access this
information over the network.
The PowerConnect 5224 switch includes an on-board SNMP agent that monitors the status of the switch hardware, as well as the traffic passing through the
ports. A computer on the network running SNMP-based management software, called a Network Management Station (NMS), can be used to access this
information. Access rights to the SNMP agent are controlled by community strings. To communicate with the switch, the NMS must first submit a valid
community string for authentication.
l private — Allows authorized management stations to retrieve and modify MIB objects.
If you do not intend to utilize SNMP, delete both of the default community strings. SNMP management access to the switch is disabled if no community strings
exist. To delete the strings:
1. If you are not already in the Privileged Exec level global configuration mode, type configure and press <Enter>.
2. To delete the private community string, type no snmp-server community private and then press <Enter>.
3. To delete the public community string, type no snmp-server community public and then press <Enter>.
4. To save your configuration changes, type copy running-config startup-config and then press <Enter>.
If you do intend to utilize SNMP, change the default community strings to prevent unauthorized access to the switch:
1. If you are not already in the Privileged Exec level global configuration mode, type configure and press <Enter>.
2. To delete the existing private community string, type no snmp- server community private and then press <Enter>.
3. Type snmp-server community string rw, where string is your new community string (case sensitive) for read-write access. Press <Enter>.
4. To delete the existing public community string, type no snmp- server community public and then press <Enter>
5. Type snmp-server community string ro, where string is your new community string (case sensitive) for read-only access. Press <Enter>.
6. To save your configuration changes, type copy running-config startup-config and then press <Enter>.
IP Address Assignment
You must assign an IP address to the switch to gain management access over the network. You may also need to a establish a default gateway between the
switch and management stations that exist on another network segment. You can statically configure a specific IP address or direct the switch to obtain an
address from a Boot Protocol (BOOTP) or Dynamic Host Configuration Protocol (DHCP) server when it is powered on. Valid IP addresses consist of four decimal
numbers, 0 to 255, separated by periods. Anything outside this format is not accepted by the CLI program.
If you select the bootp or dhcp option, IP is enabled but does not function until a BOOTP or DHCP reply has been received. Requests are broadcast periodically
by the switch in an effort to learn its IP address. (BOOTP and DHCP values can include the IP address, default gateway, and subnet mask).
1. From the Privileged Exec or Normal Exec level mode, type show ip interface and press <Enter>.
2. From the Privileged Exec mode, type show ip redirects to display the assigned gateway IP address. Press <Enter>.
The following example displays IP settings assigned by bootp or dhcp using the CLI.
Console#show ip interface
Console#
Before you can assign a static IP address to the switch, you must obtain the following information from your network administrator:
1. From the Privileged Exec level global configuration mode prompt, type interface vlan 1 to access the interface-configuration mode. Press <Enter>.
2. Type ip address ip-address netmask, where ip-address is the switch IP address and netmask is the network mask for the network.
3. Type exit to return to the global configuration mode prompt. Press <Enter>.
4. To set the IP address of the default gateway for the network to which the switch belongs, type ip default-gateway gateway, where gateway is the IP
address of the default gateway. Press <Enter>.
5. To save your configuration changes, type copy running-config startup-config and then press <Enter>.
NOTICE: Only one VLAN can be assigned an IP address. If you assign an address to any other VLAN, the new address overrides the original IP
address.
The following example shows how to set a static IP address using the CLI.
Console(config-if)# exit
Console(config)#
1. From the Privileged Exec level global configuration mode prompt, type interface vlan 1 to access the interface-configuration mode. Press <Enter>.
3. Press <Enter>.
4. To save your configuration changes, type copy running-config startup-config, and then press <Enter>.
NOTICE: If autonegotiation is disabled for an RJ-45 port, the auto- MDI/MDI-X pin signal configuration is also disabled.
2. Insert the SFP transceiver (sold separately) into the SFP transceiver slot. The slot's LED indicator turns on to confirm that it is correctly installed.
3. Use the appropriate network cabling to connect a device to the connectors on the SFP transceiver.
NOTICE: When the SFP transceiver acquires a link, the associated integrated 10/100/1000BASE-T port is disabled.
Management Interface
Dell™ PowerConnect™ 5224 Systems User's Guide
With web-based management, you can configure the PowerConnect 5224 Gigabit Ethernet Managed Switch and monitor the system using a web browser.
l Refresh — Displays the current values for the system related to the page that is open.
l Apply Changes — Makes changes to the system and refreshes the page.
NOTICE: For configuration changes to persist beyond the current session, you must either save the running-config file from the Switch/Configuration
page or use the command line interface (CLI) command copy running-config startup-config.
Web Pages
When you connect to the management mode of the switch with a web browser, a login screen is displayed. Enter a user name and password to access the
switch's management mode.
NOTE: The default user names are admin and guest, and the corresponding passwords are admin and guest. If you log in as guest (Normal Exec level),
you can only view page information and change the guest password. If you log in as admin (Privileged Exec level), you can apply changes on all pages.
l Switch
l Ports
l Address Table
l Spanning Tree
l VLAN
l Class of Service
l Link Aggregation
l SNMP
l Multicast Support
l Statistics
System
The System page contains a dynamic switch applet that displays the current status of the switch ports. The color of each switch port icon indicates its link
status:
l General — Allows you to view general system information and perform general administration.
l Security — Allows you to set the password for your login username.
General Information
The General page contains links to the following pages:
l Asset
l Health
l Versions
l Logs
Asset
l MAC Address
l SNMP Object ID
l System Up Time
l System Name
l System Contact
l System Location
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Switch/General/Asset page.
Command Usage
show system Displays system information
hostname name Specifies or modifies the system name for this device
snmp-server contact string Sets the system contact (sysContact) string
snmp-server location text Sets the system location string
Example
Console(config)#exit
Console#show system
System information
POST result :
Console#
Health
CLI Commands
The following table summarizes the equivalent CLI command for items in the Switch/General/Health page.
Command Usage
show Displays hardware and software version information for the system, as well as the unit's
version power status
Example
Console#show version
Unit1
Service tag :3
Agent(master)
Unit id :1
Console#
Versions
l Microcode Version
l Loader Version
l Boot-ROM Version
l Role
l Service Tag
l Serial Number
CLI Commands
The following table summarizes the equivalent CLI command for items in the Switch/General/Versions page.
Command Usage
show Displays hardware and software version information for the system, as well as the unit's
version power status
Example
Console#show version
Unit1
Service tag :3
Agent(master)
Unit id :1
Console#
Logs
The Logs page allows you to scroll through the logged system and event messages. The switch can store up to 2 kilobytes (KB) of log entries in temporary
random access memory (RAM) (memory flushed on power reset) and up to 4 KB of entries in permanent flash memory.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Switch/General/Logs page.
Command Usage
show logging {flash | ram} Displays the logging configuration for system and event messages
ram — event history stored in temporary RAM (memory flushed on power reset)
NOTE: The CLI allows you to configure and limit system messages that are logged to flash or RAM memory. The show logging command only displays
the current logging configuration.
The system log messages are categorized by severity into eight levels, from 0 (Emergencies) to 7 (Debugging). The CLI command logging history allows you
to specify which messages are logged to RAM or flash memory. The default is for messages with severity levels of 0 to 3 to be logged to flash and levels 0 to 7
to be logged to RAM.
Severe error messages that are logged to flash memory are permanently stored in the switch to assist in troubleshooting network problems. Up to 4 KB of
message entries can be stored in the flash memory, with older messages being overwritten first when this memory capacity has been exceeded.
Example
Console#
IP Address
The IP Address page contains links to the following pages:
l IP Address
l DHCP
IP Address
From the IP Address page, you can manage the IP-related information about the system. The page includes the following editable fields:
l Management VLAN — Sets the virtual local area network (VLAN) interface that allows management access to the switch. You can set the IP
address for only one VLAN interface.
l IP Address Mode — Sets whether IP functionality is enabled through manual (Static) configuration or set by Dynamic Host Configuration Protocol
(DHCP) or Boot Protocol (BOOTP).
l IP Address — Identifies the IP address of the VLAN interface that allows management access to the switch.
l Subnet Mask — Identifies the subnet mask that determines the host address bits used for routing to specific subnets.
l Gateway IP Address — Identifies the IP address of the gateway router between the switch and management stations that exist on other
network segments.
NOTICE: When DHCP or BOOTP has been used to set the IP information, the IP Address, Subnet Mask, and Gateway IP Address fields display the
assigned values.
The Management VLAN is the only VLAN through which you can gain management access to the switch. By default, all ports on the switch are members of
VLAN 1, so a management station can be connected to any port on the switch. If other VLANs are configured and you change the Management VLAN, you may
lose management access to the switch. In this case, you should reconnect the management station to a port that is a member of the Management VLAN. For
more information on the Management VLAN, see "Management VLAN Access."
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Switch/IP Address page.
Command Usage
ip address {ip-address Sets the primary IP address for this device. Use the no form command to
netmask | bootp | dhcp} remove the IP address, or to disable IP address assignment through BOOTP or
DHCP.
ip default-gateway Establishes a static route between the switch and management stations that
gateway exist on another network segment.
show ip interface Displays the usability status of an IP interface.
show ip redirects Shows the default gateway configured for this device.
Example
Console(config)#interface vlan 1
Console(config-if)#exit
Console(config)#
DHCP
In the DHCP page, click Restart DHCP to release the current IP address and obtain a new one through DHCP.
NOTICE: If Restart DHCP is selected when IP settings have been configured statically, a warning message indicating that the IP Address Mode is not
set to DHCP displays.
CLI Commands
The following table summarizes the equivalent CLI command for items in the Switch/IP Address/DHCP page.
Command Usage
ip dhcp restart Resubmits a DCHP client request
Security
The Security page contains links to the following information:
l Passwords
l RADIUS Settings
Passwords
You should change the default passwords to be sure that your system is secure:
NOTE: The default user names are admin and guest, and the corresponding passwords are admin and guest. If you log in as guest (Normal Exec level),
you can only view page information and change the guest password. If you log in as admin (Privileged Exec level), you can apply changes on all pages.
l New Password — Type the new password. Passwords are limited to eight characters and are case sensitive.
l Confirm Password — Type the new password a second time to verify that you have typed it correctly.
The password entered is encrypted on the screen and is displayed as a sequence of asterisks (*).
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Switch/Security/Passwords page.
Command Usage
enable password [level Use this command to control access to the Privileged Exec level from the Normal
level] {0 | 7} password Exec level. For the {0 | 7} parameter, 0 means plain password and 7 means
encrypted password. The Privileged Exec level is 15 and the default password is
super.
username name {access- Use this command to configure user name authentication at login. Use the no
level level | nopassword | form command to remove a user name. The device has two predefined privilege
password {0 | 7} levels: 0: Normal Exec and 15: Privileged Exec. The default user names are
password} admin for the Privileged Exec level, and guest for the Normal Exec level.
NOTE: Only the CLI allows user names to be created and deleted.
Example
Console(config)#
RADIUS Settings
Remote Authentication Dial-in User Service (RADIUS) is a system that uses a central server running RADIUS software to control access to RADIUS-aware
switches on the network. A RADIUS server can be used to create a database of multiple user name/password pairs with associated privilege levels for each
user or group that require management access to a switch using the console port, Telnet, or Internet.
When you are setting up privilege levels on the RADIUS server, level 0 allows Normal Exec access to the switch, and level 15 allows Privileged Exec access.
¡ Radius, Local — A RADIUS server attempts to authenticate the user first, and then the switch attempts to authenticate the user.
¡ Local, Radius — The switch attempts to authenticate the user first, and then a RADIUS server attempts to authenticate the user.
l Server Port Number — Identifies the User Datagram Protocol (UDP) port number used by the RADIUS server.
l Secret Text String — Specifies the text string that is shared between the switch and the RADIUS server.
l Number of Server Transmits — Specifies the number of request transmits to the RADIUS server before failure.
l Timeout for a reply (sec)— Specifies the number of seconds the switch waits for a reply from the RADIUS server before it resends the request.
NOTE: The local switch user database must be set up through the CLI by manually entering user names and passwords.
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Switch/Security/RADIUS Settings page.
Command Usage
authentication login {radius | local | Defines the login authentication method and precedence.
radius local | local radius}
radius-server host host_ip_address Specifies the RADIUS server IP address.
radius-server port port_number Sets the RADIUS server UDP port number.
radius-server key key_string Sets the RADIUS encryption key (up to 20 characters).
radius-server retransmit Sets the number of times the switch attempts to authenticate
number_of_retries logon access through the RADIUS server. (The range is 1–30.)
radius-server timeout Sets the number of seconds the switch waits for a reply before
number_of_seconds resending a request. (The range is 1–65535.)
Example
Console(config)#radius-server retransmit 5
Console(config)#radius-server timeout 10
Console(config)#
Jumbo Frame
From the Jumbo Frame page, you can enable and disable jumbo frame support on the switch.
The switch provides more efficient large sequential data transfers by supporting jumbo frames up to 9000 bytes. Compared to standard Ethernet frames that
run only up to 1500 bytes, using jumbo frames significantly reduces the per-packet overhead required to process protocol encapsulation fields.
To use jumbo frames, both the source and destination end nodes (such as a computer or server) must support jumbo frames. In addition, when the
connection is operating at full duplex, all switches in the network between the two end nodes must be able to accept the extended frame size. For half-duplex
connections, all devices in the collision domain must support jumbo frames.
To enable jumbo frame support on the switch, set the Jumbo Frame Support Status to Enabled.
NOTICE: Enabling jumbo frames on the switch limits the maximum threshold for broadcast storm control to 64 packets per second.
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI command for items in the Switch/Jumbo Frame page.
Command Usage
jumbo Use this command to enable jumbo frames to be forwarded through the switch. Use the no
frame form to disable jumbo frames.
Example
Console(config)#jumbo frame
Console(config)#
Firmware Upgrade
From the Firmware page, you can configure the system to download a new version of the management software. The switch can contain two software code
files, one of which is set as the Start-Up file. This allows you to try a new version of the software without overwriting the previous version.
NOTE: The switch is shipped with one software code file installed (the filename is similar to PC5224_v1.00.00.00), which is set as the start- up file.
l TFTP Server IP Address — Specifies the server from which the system must retrieve the new version of the software.
l Source File Name — Specifies the path and name of the software file to download.
l Remove Operation Code Image File — Deletes a software file from the switch.
l Start-Up Operation Code File Name — Indicates which Operation Code file you want to run. Select the filename from the drop-down menu.
1. In the Transfer Operation Code Image File to Server field, enter the IP address of the Trivial File Transfer Protocol (TFTP) server in the TFTP Server
IP Address field.
2. In the Source File Name field, select the file to upload from the drop- down menu.
3. In the Destination File Name field, type a name for the file.
1. In the Transfer Operation Code Image File from Server field, enter the IP address of the TFTP server in the TFTP Server IP Address field.
2. In the Source File Name field, type the filename of the software code file to download.
3. For the Destination File Name, select a filename from the drop-down menu to replace an existing file, or specify a new filename (with no more than 32
characters). Filenames are case sensitive and cannot contain spaces. The switch can contain only two software code files. You cannot download a third
file; you must first replace an existing file or remove a file.
1. In the Remove Operation Code Image File field, select the file to delete from the drop-down menu.
1. In the Start-Up Operation Code Image File field, select the start-up code file from the drop-down menu.
The following table summarizes the equivalent CLI commands for items in the Switch/Firmware page.
Command Usage
copy tftp file Downloads a code image to the switch's flash memory from a
TFTP server
boot system {boot-rom | config | opcode}: Specifies the file or image used to start up the system
filename
dir [boot-rom | config | opcode [:filename]] Displays a list of files in flash memory
NOTE: You cannot upload and download Boot-ROM files to a TFTP server using the CLI. You must use a direct terminal connection to the switch's
console port and press <Ctrl><f> after the diagnostic test results. See "Downloading Firmware Through the Console Port."
Example
Console#
Configuration
From the Configuration page you can save and restore switch configuration settings.
NOTE: The switch is shipped with one default configuration file (Factory_Default_
Config.cfg) installed, which is set as the start- up file. This file cannot be removed from the system.
l Transfer Configuration from Server — Copies a switch configuration file from a TFTP server.
l Remove Configuration File — Deletes a configuration file from the switch (selected from the drop-down menu).
l Start-Up Configuration File — Selects the configuration file to be used after a system start-up (selected from the drop-down menu).
l Copy Running Config to File — Saves the current session configuration settings. Specifies a new filename or the name of an existing file to be replaced.
NOTICE: For configuration changes to persist beyond the current session, you must save the running-config file from this page, or use the CLI
command copy running-config startup-config.
1. In the Transfer Configuration File to Server field, enter the IP address of the TFTP server in the TFTP Server IP Address field.
2. In the Source File Name field, select the configuration file to upload from the drop-down menu.
3. For the Destination File Name, type a filename to identify the configuration file on the TFTP server.
1. Under Transfer Configuration File from Server, enter the IP address of the TFTP server in the TFTP Server IP Address field.
2. In the Source File Name field, type the filename of the configuration file to download.
3. In the Destination File Name field, select a configuration file to replace from the drop-down menu, or specify a new filename (with no more than 32
characters). Filenames are case sensitive and cannot contain spaces. The switch can contain any number of configuration files, limited only by available
flash memory space. You can use the dir command in the CLI to check the available flash memory space.
NOTE: The CLI also allows you to copy files within the switch and replace a running configuration file without performing a reset.
1. In the Remove Configuration File field, select the file to delete from the drop-down menu.
1. In the Start-Up Configuration File field, select the start-up configuration file from the drop-down menu.
1. In the Copy Running Config to File field, specify a filename for the configuration file (with no more than 32 characters). If the filename already exists, it
replaces the file. The filename cannot be the same as the factory default configuration file, Factory_Default_Config.cfg.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Switch/Configuration web page.
Command Usage
copy file {file | running-config | startup- Uploads/downloads a configuration file to/from the switch's flash
config | tftp} memory to a TFTP server
boot system {boot-rom| config | Specifies the file or image used to start up the system
opcode}: filename
Example
Console#
Reset
Click Reset to reboot the switch. When prompted, confirm that you want to reset the switch.
CLI Commands
The following table summarizes the equivalent CLI command for items in the Switch/Reset page.
Command Usage
reload Restarts the system
Example
Console#reload
Console#
Ports
The Port Manager contains links to the following options:
l Port Configuration
l Trunk Configuration
l Broadcast Control
l Port Mirroring
Port Configuration
On the Port Configuration page, you can view and edit port parameters. For each port number listed in the Port column, you can change the following
parameters listed by column name on the screen:
l Name/Type — Allows a user-defined label for the port and indicates the type of port:
l Admin/Oper — Allows the network administrator to manually disable a port and indicates the status of the link: up or down.
l Speed/Duplex Mode — Allows the manual selection of port speed and duplex mode and indicates the current port speed and mode.
l Flow Control — Allows automatic or manual selection of support for flow control and indicates the type of flow control currently in use.
l Autonegotiation/Port Capabilities — Allows autonegotiation to be enabled/disabled and indicates the capabilities of the port that are advertised during
autonegotiation:
¡ Sym — Supports symmetric operation of full-duplex flow control. The port can transmit and receive pause frames for flow control (gigabit ports
only).
NOTICE: If autonegotiation is disabled for an RJ-45 port, the auto- MDI/MDI-X pin signal configuration is also disabled.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Ports/Port Configuration page.
Command Usage
interface ethernet unit/port Configures an Ethernet port interface and enters interface
configuration mode.
NOTICE: Flow control only works for ports connected to the same internal switch chip (ports 1 to 12 and ports 13 to 24). Cross-chip flow control does
not work.
Example
Console(config-if)#description RD SW#3
Console(config-if)#no negotiation
Console(config-if)#speed-duplex 100half
Console(config-if)#flowcontrol
Trunk Configuration
On the Trunk Configuration page, you can enable and disable the aggregate port links that have been created on the switch. To set up trunks and select port
members, use the Link Aggregation page.
For each trunk number listed in the Trunk column, you can change the following parameters listed by column name on the screen:
l Name/Type — Allows a user-defined label for the trunk and also indicates the type of ports in the trunk
l Admin/Oper — Allows the network administrator to manually disable a trunk and also indicates the status of the link: up or down
l Speed/Duplex Mode — Allows the manual selection of port speed and duplex mode and also indicates the current speed and mode of member ports
l Flow Control — Allows automatic or manual selection of support for flow control and also indicates the type of flow control currently in use
l Autonegotiation/Port Capabilities — Allows autonegotiation to be enabled/disabled for all ports in the trunk and also indicates the capabilities of the
port members
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Ports/Trunks Configuration page.
Command Usage
interface port-channel channel-id Configures a trunk and enters interface configuration
mode.
shutdown Disables a trunk interface.
Example
Console(config)#interface port-channel 1
Console(config-if)#
Console(config-if)#description RD SW#3
Console(config-if)#no negotiation
Console(config-if)#speed-duplex 100half
Console(config-if)#flowcontrol
Broadcast Control
In the Broadcast Control page, you can enable and disable broadcast control for all ports on the switch.
l Port Number
l Port Type:
The Broadcast Control page also contains the following editable fields:
l Protect Status — Allows you to enable/disable broadcast storm control for ports on the switch. When enabled, the switch employs a broadcast-control
mechanism if the packet-per-second threshold on a port is exceeded. (The default is enabled.)
l Threshold (16,64,128,256) — The packet-per-second threshold for broadcast packets received on a port. Possible values are 16, 64, 128, or 256
packets per second. (The default is 256 packets per second.) If jumbo frames are enabled on the switch, the maximum threshold for broadcast storm
control is limited to 64 pps.
NOTICE: You can enable/disable broadcast storm control on a per-port basis, but the selected packet-per-second threshold applies to all ports on the
switch.
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI command for items in the Ports/Broadcast Control web page.
Command Usage
switchport broadcast packet-rate rate Configures broadcast storm control (applies to all ports)
Example
Console(config-if)#
Port Mirroring
From the Port Mirroring page, you can configure a port mirror session by setting a source and destination port pair. Port mirroring helps you debug a network.
NOTICE: You can configure only one port mirror session on the switch. The source and destination port have to be either both in the port range of 1 to
12 or both in the port range of 13 to 24.
l Type — Allows you to select which traffic to mirror to the destination port: Rx, Tx, or Both
l Destination Port — Specifies the port that receives a copy of all traffic that the source port receives or transmits
NOTE: The source port and destination port speeds must match. Otherwise traffic may be dropped from the destination port.
To add a new mirror session to the Sessions Table, first delete the current mirror session by selecting the session in the table and clicking Remove Mirror
Session. Select the new source port, destination port, and traffic type, and then click Add Mirror Session.
NOTE: The source and destination ports must both either be in the range of 1 to 12 or 13 to 24.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Ports/Port Mirroring page.
Command Usage
Example
Console(config-if)#
Address Table
The Address Table page includes links to the following pages:
l Static Addresses
l Dynamic Addresses
l Address Aging
Static Addresses
From the Static Addresses page, you can specify the Media Access Control (MAC) address and port number of systems that are to remain available to the
switch for an indeterminate amount of time.
l Static Address Counts — Indicates the total number of static addresses configured on the switch
l Interface — Allows you to select the port or trunk associated with the system you want to set as static
l MAC Address — Allows you to enter the MAC address of a system you want to set as static
l VLAN — Allows you to select the VLAN associated with the interface
To add a new address to the table, select the interface, MAC address, and VLAN, and then click Add Static Address. To delete an address from the table,
select the table entry in the list box, and then click Remove Static Address.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Address Table/Static Addresses page.
Command Usage
bridge bridge-group address mac-address vlan vlan-id forward Maps a static address to a port in a VLAN
interface [action]
The action parameters are:
show bridge bridge-group [interface] [address [mask]] [vlan Allows you to view classes of entries in the
vlan-id] [sort {address | vlan | interface}] bridge-forwarding database
Example
Console(config)#
Dynamic Addresses
The Dynamic Address lookup table allows you to view the MAC addresses that are currently in the address database. When addresses are in the database,
the packets intended for those addresses are forwarded directly to those ports. You can sort the table by interface, VLAN, and MAC address by selecting the
sort key from the drop-down menu.
The Dynamic Addresses page contains the following options for querying the dynamic MAC address table:
l Interface — Check the option box and select a port or trunk from the drop-down menus.
l MAC Address — Check the option box and type the address in the box provided.
l VLAN — Check the option box and select the appropriate VLAN from the drop-down menu.
l Address Table Sort Key — Select the key from the drop-down menu to sort the displayed table entries.
l Query button — Click this button to execute the query once you have selected the criteria for the query.
CLI Commands
The following table summarizes the equivalent CLI command for items in the Address Table/Dynamic Addresses page.
Command Usage
show bridge bridge-group [interface] [address [mask]] [vlan Allows you to view classes of entries in the
vlan-id] [sort {address | vlan | interface}] bridge-forwarding database
Example
Console#show bridge 1
Console#
Address Aging
In the Address Aging page, you can specify the length of time an address stays available to the switch if it is not configured as static.
The Aging Time option sets the time before an address is purged from the system. You can change this value to any number between 17 and 2184. (The
default is 300 seconds.)
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI command for items in the Address Tabled/Address Aging page.
Command Usage
bridge-group bridge-group aging-time seconds Sets the aging time for entries in the address table
Example
Console(config)#
Spanning Tree
The Spanning Tree page contains links to pages that allow you to specify the parameters of the Spanning Tree Protocol:
l Bridge Settings
l Port Settings
l Trunk Settings
Bridge Settings
The Bridge Settings page contains the following information:
l Bridge ID — Identifies a unique identifier for the switch in the Spanning Tree. The ID is calculated using the defined Spanning Tree priority of the switch
and its MAC address. The lower the Bridge ID, the more likely the switch will act as the root.
l Max Age — Specifies the maximum time (in seconds) that the switch waits before attempting to reconfigure (if it has not received a configuration
message).
l Hello Time — Specifies the time interval (in seconds) at which the root device transmits a configuration message.
l Forward Delay — Specifies the maximum time (in seconds) the root device waits before changing states (from listening to learning to forwarding).
l Designated Root — Identifies the priority and MAC address of the device in the Spanning Tree that the switch has accepted as the root device.
l Root Port — Specifies the port number on the switch that is closest to the root. The switch communicates with the root device through this port. If there
is no root port, the switch has been accepted as the root device of the Spanning Tree network.
l Root Path Cost — Identifies the path cost from the root port on the switch to the root device.
l Configuration Changes — Specifies the number of times the Spanning Tree has been reconfigured.
l Last Topology Change — Identifies the time since the Spanning Tree was last reconfigured.
From the Bridge Settings page, under Attributes, you can also enable and configure the following Spanning Tree parameters:
l Spanning Tree State — Enables or disables the Spanning Tree. If you enable the Spanning Tree, you must complete the other fields.
l Priority — Sets the priority setting among other switches in the Spanning Tree. (The range is 0 to 65535.)
l Hello Time — Sets the interval between configuration messages sent by the Spanning Tree Protocol. (The range is 1 to 10 seconds.)
l Maximum Age — Sets the amount of time before the system discards a configuration message. (The range is 6 to 40 seconds.)
l Forward Delay — Sets the amount of time the system spends in learning and listening states. (The range is 4 to 30 seconds.)
To save any changes you make in this page for the current session, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Spanning Tree/Bridge Settings page.
Command Usage
bridge bridge-group spanning-tree Enables the spanning tree algorithm globally for the switch.
bridge bridge-group forward-time Configures the spanning tree bridge forward time globally for the
seconds switch.
bridge bridge-group hello-time time Configures the spanning tree bridge hello time globally for the
switch.
bridge bridge-group max-age seconds Configures the spanning tree bridge maximum age globally for the
switch.
bridge bridge-group priority priority Configures the spanning tree priority globally for the switch.
show bridge group bridge-group Shows the spanning tree configuration.
[interface]
Example
Console(config)#bridge 1 spanning-tree
Console(config)#bridge 1 forward-time 15
Console(config)#bridge 1 hello-time 2
Console(config)#bridge 1 max-age 20
Port Settings
In the Port Settings page, you can specify Spanning Tree parameters for each port. For each port number listed in the Port column, the following information
is available:
l Type — Specifies the type of port, indicates one of the following:
l State — Displays the current state of the port within the Spanning Tree:
¡ Disabled — Port has been disabled by the user or has failed diagnostics.
¡ Blocking — Port receives Spanning Tree configuration messages, but does not forward packets.
¡ Listening — Port leaves blocking state due to topology change, starts transmitting configuration messages, but does not forward packets.
¡ Learning — Port has transmitted configuration messages for an interval set by the Forward Delay parameter without receiving contradictory
information. The port address table is cleared, and the port begins learning addresses.
The Port Settings page also contains the following editable fields:
l Priority — Indicates the priority assigned to the port for the Spanning Tree Protocol (0 to 255). A port with a higher priority is less likely to be blocked if
the Spanning Tree Protocol detects network loops. Low numeric value indicates a high priority.
l Path Cost — Specifies the cost assigned to this port for the Spanning Tree Protocol (1 to 65535). A port with a lower cost is less likely to be blocked if
the Spanning Tree Protocol detects network loops.
NOTE: Use Fast Link if a device is connected to a port that requires network access immediately when the link comes up and cannot wait for a Spanning
Tree resolution.
l Fast Link — Immediately enables the port in forwarding state when a link comes up. The port is not part of the Spanning Tree at that time, but will
participate in future Spanning Tree resolutions.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Spanning Tree/Port Settings page.
Command Usage
bridge-group bridge-group path-cost cost Configures the spanning tree path cost for the specified port
bridge-group bridge-group priority priority Configures the priority for the specified port
Example
Console(config-if)#bridge-group 1 path-cost 50
Console(config-if)#bridge-group 1 priority 0
Console(config-if)#bridge-group 1 portfast
Trunk Settings
On the Trunk Settings page, you can specify Spanning Tree parameters for each trunk. For each port number listed in the Trunk column, the following fields
are available:
l Priority — Indicates the priority assigned to the trunk for the Spanning Tree Protocol (0 to 255). A trunk with a higher priority is less likely to be blocked
if the Spanning Tree Protocol detects network loops. Low numeric value indicates a high priority.
l Path Cost — Specifies the cost assigned to the trunk for the Spanning Tree Protocol (1 to 65535). A trunk with a lower cost is less likely to be blocked if
the Spanning Tree Protocol detects network loops.
NOTE: Use Fast Link if a device is connected to a trunk that requires network access immediately when the link comes up and cannot wait for a
Spanning Tree resolution.
l Fast Link — Immediately enables the trunk in forwarding state when a link comes up. The trunk is not part of the Spanning Tree at that time, but will
participate in future Spanning Tree resolutions.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Spanning Tree/Trunk Settings page.
Command Usage
bridge-group bridge-group path-cost cost Configures the spanning tree path cost for the specified trunk
bridge-group bridge-group priority priority Configures the priority for the specified trunk
Example
Console(config)#interface port-channel 1
Console(config-if)#bridge-group 1 path-cost 50
Console(config-if)#bridge-group 1 priority 0
Console(config-if)#bridge-group 1 portfast
VLAN
You can use virtual LANs (VLANs) to assign ports on the switch to any of up to 255 LAN groups. In conventional networks with routers, broadcast and multicast
traffic is split up into separate domains. Switches do not inherently support broadcast domains, which can lead to broadcast storms in large networks. By
using IEEE 802.1Q-compliant VLANs and GARP VLAN Registration Protocol (GVRP), you can organize any group of network nodes into separate broadcast
domains, confining broadcast and multicast traffic to the originating group. This also provides a more secure and cleaner network environment. For more
information on how to use VLANs, see "VLANs."
l VLAN Membership
l Port Settings
l Trunk Settings
l GVRP
VLAN Membership
On the VLAN Membership page, you define VLAN groups. The following options are available:
l Show VLAN — Select the VLAN for which you want to edit the membership setting.
l Creation — Indicates whether the VLAN has been created as a permanent (static) VLAN or has been dynamically created through GVRP.
l Port/Trunk toggle buttons — Allows you to select VLAN membership for each port or trunk by toggling the value of the Port/Trunk button:
¡ 'U': Port is a member of the VLAN. All packets transmitted by the port will be untagged, that is, not carry a tag and therefore not carry VLAN or
CoS information.
¡ 'T': Port is a member of the VLAN. All packets transmitted by the port will be tagged, that is, carry a tag and, therefore, carry VLAN or CoS
information.
¡ 'F': Port is forbidden from automatically joining the VLAN through GVRP. For more information, see "GVRP."
¡ 'BLANK': Port is not a member of the VLAN. Packets associated with this VLAN will not be transmitted by the port.
The VLAN tagging option is a standard set by the IEEE to facilitate the spanning of VLANs across multiple switches. For more information, see "VLANs" and the
IEEE Std 802.1Q-1998 Virtual Bridged Local Area Networks.
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
1. Select Add a new VLAN from the Show VLAN drop-down menu.
NOTE: If you remove a VLAN group with existing port members, the ports will rejoin the default VLAN in untagged mode.
1. Select the VLAN that you want to remove from the Show VLAN drop- down menu.
2. Check the Remove VLAN box for the VLAN that you want to remove.
1. Select the VLAN that you want to edit from the Show VLAN drop- down menu.
2. Change the VLAN member by clicking the port icon until the desired state [T (tagged) or U (untagged)] or a blank appears.
1. Select the VLAN that you want to edit under the Show VLAN drop- down menu.
2. Change the VLAN member by clicking the port icon until the filed is blank.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the VLAN/VLAN Membership page.
Command Usage
Example
Console(config)#vlan database
Console(config-vlan)#exit
Console(config-if)#exit
Console(config)#exit
Console#
Port Settings
On the Port Settings page, you can specify the default port VLAN ID (PVID) for each port on your switch. All untagged packets entering the switch are tagged
by default with the ID specified by the port's PVID.
The Port Settings page is set up in a table format. For each port listed in the Port column, the following options are available:
l PVID — Specifies the VLAN ID assigned to untagged frames received on the port. To assign a VLAN ID as the port's PVID, the port must be an untagged
VLAN member.
l Acceptable Frame Type — Allows you to set the switch port to accept all frame types, including VLAN tagged or VLAN untagged frames, or only tagged
frames.
l Ingress Filtering — Discards incoming frames for VLANS that do not include the ingress port in their member set, if enabled.
l GVRP Status — Enables/disables GVRP (GARP VLAN Registration Protocol) for the port. GVRP defines a way for switches to exchange VLAN information to
automatically register VLAN members on ports across the network. GVRP must be globally enabled for the switch before you can individually enable
GVRP for a specific port. For more information, see "GVRP."
l GARP Join Timer — Specifies the interval (in centiseconds) between transmitting requests/queries to participate in a VLAN group. (The range is 20 to
1000 centiseconds.)
l GARP Leave Timer — Specifies the interval (in centiseconds) a port waits before leaving a VLAN group. This time should be set to more than twice the
join time. This interval ensures that after a Leave or LeaveAll message has been issued, the applicants can rejoin before the port actually leaves the
group. (The range is 60 to 3000 centiseconds.)
l GARP LeaveAll Timer — Specifies the interval (in centiseconds) between sending out a LeaveAll query message for VLAN group participants and the
port leaving the group. This interval should be considerably larger than the Leave Time to minimize the amount of traffic generated by nodes rejoining
the group. (The range is 500 to 18000 centiseconds.)
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the VLAN/Port Settings page.
Command Usage
switchport native vlan vlan-id Configures the PVID (default VLAN ID) for a port
switchport acceptable-frame-types {all | Configures the acceptable frame types for a port
tagged}
switchport ingress-filtering Enables ingress filtering for a port
switchport gvrp Enables GVRP for a port
garp timer {join | leave | leaveall} timer_value Sets the values for the GVRP join, leave, and leaveall
timers
show gvrp configuration [interface] Shows whether GVRP is enabled
Example
Console(config-if)#switchport ingress-filtering
Console(config-if)#
Trunk Settings
On the Trunk Settings page, you can specify the default port VLAN ID (PVID) for ports that are configured as trunk members. When an untagged packet
enters the switch, it is, by default, tagged with the ID specified by the port's PVID.
For each trunk listed in the Trunk column, the following options are available:
l PVID — Identifies the VLAN ID assigned to untagged frames that are received on each trunk port. To assign a VLAN ID as the port's PVID, the port must
be an untagged VLAN member.
l Acceptable Frame Type — Sets the switch trunk ports to accept either both tagged and untagged frames or only tagged frames.
l Ingress Filtering — Discards incoming frames for VLANs that do not include the trunk in their member set at the ingress ports, if enabled.
l GVRP Status — Enables/disables GARP VLAN Registration Protocol (GVRP) for the trunk. GVRP defines a way for switches to exchange VLAN information
to automatically register VLAN members on ports across the network. GVRP must be globally enabled for the switch before you can individually enable
GVRP for a specific trunk. For more information, see "GVRP."
l GARP Join Timer — Specifies the interval (in centiseconds) between transmitting requests/queries to participate in a VLAN group. (The range is 20 to
1000 centiseconds.)
l GARP Leave Timer — Specifies the interval (in centiseconds) that a trunk waits before leaving a VLAN group. GARP Leave Timer should be set to more
than twice the join time. This interval ensures that after a Leave or LeaveAll message has been issued, the applicants can rejoin before the trunk
actually leaves the group. (The range is 60 to 3000 centiseconds.)
l GARP LeaveAll Timer —Specifies the interval (in centiseconds) between when a LeaveAll query message for VLAN group participants is sent and when
the trunk leaves the group. This interval should be considerably larger than the Leave Time to minimize the amount of traffic generated by nodes
rejoining the group. (The range is 500 to 18000 centiseconds.)
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
GVRP
The GVRP page allows you to globally enable GVRP (GARP VLAN Registration Protocol) for the switch. GVRP defines a way for switches to exchange VLAN
information to register VLAN members on ports across the network. You can use GVRP to set up VLANs in the network without having to manually configure
the VLANs on each switch. GVRP can reduce the possibility of errors and ensure consistency in VLAN configuration throughout the network.
If you enable GVRP on a port with a tagged or untagged static VLAN, GVRP sends advertisements (GVRP Bridge Protocol Data Units [BPDUs]) containing the
VLAN's ID. Any connected GVRP-aware port receiving the advertisements can dynamically join the advertised VLAN. All GVRP dynamically-learned VLANs
operate as tagged VLANs. A GVRP-enabled port only joins a VLAN when an advertisement for that VLAN is received on that specific port. A GVRP-enabled port
forwards advertisements from other ports on the switch but does not join the advertised VLAN.
To implement GVRP in a network, you must first configure the static VLANs required on switches that are connected to computers, servers, and other devices,
so that these VLANs can be propagated across the network. For other core switches in the network, enable GVRP on the links between these devices. You
should also determine security boundaries in the network and configure GVRP settings to limit the VLAN propagation.
When GVRP is globally enabled for the switch, the default setting allows all the ports to transmit and receive VLAN advertisements, as well as automatically
join VLANs. To control and limit the VLAN propagation in a network, you can disable GVRP on ports to prevent advertisements from being propagated, or to
forbid ports from joining specific VLANs. The VLAN Membership page allows you to set ports as Forbidden, which prevents them from joining a VLAN through
GVRP.
NOTICE: GVRP-learned VLANs on the switch do not have assigned IP addresses. Therefore, the management VLAN must be statically configured on all
switches in the network before you implement GVRP.
NOTICE: GVRP must be globally enabled for the switch before you can individually enable GVRP for a specific port or trunk.
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the VLAN/GVRP page.
Command Usage
bridge-ext gvrp Enables GVRP for the switch.
Example
Console(config)#bridge-ext gvrp
Console(config)#
Class of Service
Class of Service (CoS) allows you to assign priority to data packets when traffic in the switch is buffered due to congestion. This switch supports CoS by using
four priority queues for each port. Data packets in a port's high-priority queue will be transmitted before packets in the lower-priority queues.
The Class of Service page allows you to set the default priority for each port or trunk, and to configure the mapping of frame priority tags to the switch's four
priority queues. The page includes links to the following options:
l Traffic Classes — Configures the mapping of IEEE 802.1p priority tags to the switch's four traffic class queues
l Queue Scheduling — Configures Weighted Round Robin (WRR) queueing for the switch ports
l Layer 3/4 Priority — Configures the mapping of IP Precedence/DSCP values or IP TCP/UDP port numbers to the switch's four priority queues
NOTICE: The IEEE 802.1p tags specify eight levels of priority, from the lowest (0) to the highest (7). IP Precedence or IP DSCP values are mapped to
these priority tag levels, and the priority levels are mapped directly to the switch's four traffic class queues.
Port Settings
In the Port Settings page, you can specify the default port priority for each port on the switch. All packets entering the switch that are untagged (do not
already have a priority value) are tagged with the specified default port priority and then sorted into the appropriate priority queue at the output port.
For each port listed in the Port column, you can assign the default port priority (from 0 to 7) to untagged frames received on the port. The default setting for
ports is 0.
CLI Commands
The following table summarizes the equivalent CLI command for items in the Class of Service/Port Settings page.
Command Usage
switchport priority default Sets a priority for the incoming untagged frames or the priority of frames
default-priority-id received by the device connected to the specified interface
Example
Trunk Settings
On the Trunk Settings page, you can specify the default port priority for each port in a switch trunk. All packets entering the switch that are untagged (do not
already have a priority value) are tagged with the specified default port priority and then sorted into the appropriate priority queue at the output port.
For each trunk listed in the Trunk column, you can assign the default port priority (from 0 to 7) to untagged frames received on any port in the trunk. The
default setting is 0.
CLI Commands
The following table summarizes the equivalent CLI command for items in the Class of Service/Trunk Settings page.
Command Usage
switchport priority default Sets a priority for the incoming untagged frames or the priority of frames
default-priority-id received by the device connected to the specified interface
Example
Console(config)#interface port-channel 2
Traffic Classes
On the Traffic Classes page, you can configure the mapping of frame priority tags to each port's four CoS priority queues.
Each IEEE 802.1p priority level (from 0 to 7) listed in the Priority column can be mapped to one of the switch's four traffic class queues (from 0 to 3). The
number 0 represents a low priority and higher values represent higher priorities.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Class of Service/Traffic Classes page.
Command Usage
queue cos-map queue_id [cos1 ... cosn] Assigns traffic class values to the CoS priority queues.
Use the no form command to set the CoS map to the default values.
show queue cos-map [interface] Shows the CoS priority map.
Example
Console(config)#queue cos-map 0 0 1 2
Console(config)#queue cos-map 1 3
Console(config)#queue cos-map 2 4 5
Console(config)#queue cos-map 3 6 7
-------- -------------
0 0 1 2
1 3
2 4 5
3 6 7
Queue Scheduling
In the Queue Scheduling page, you can configure Weighted Round Robin (WRR) queueing for the switch ports.
l WRR Setting Table — Displays a list of weight values for each switch CoS queue
To change a table setting, select the entry in the WRR Setting Table, type the new weight in the Weight Value box, and then click Apply Changes. If you
don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Class of Service/Queue Scheduling page.
Command Usage
queue bandwidth weight1...weight4 Assigns WRR weights to the four CoS priority queues.
Example
Console(config)#queue bandwidth 1 4 16 64
Console(config)#exit
Queue ID Weight
-------- ------
0 1
1 4
2 16
3 64
Console#
The following figure shows the ToS field structure for IP Precedence and IP DSCP.
NOTE: The switch allows you to choose between IP Precedence or DSCP priority. Select one of the methods or disable this feature.
IP Precedence
From the IP Precedence section, you can map IP Precedence values to traffic class values. These settings apply to all ports on the switch.
l IP Precedence Priority Table — Displays a list of IP Precedence values with mapped CoS values.
l Class of Service Value — Maps a CoS value to an IP Precedence value. The number 0 represents low priority and 7 represents high priority.
Click IP Precedence in the IP Precedence/DSCP Priority Status field to enable this feature.
Each IP Precedence value (from 0 to 7) is mapped to one CoS value (from 0 to 7). The number 0 represents the lowest priority and 7 represents the highest
priority.
2 2
3 3
4 4
5 5
6 6
7 7
To change a table setting, click the entry in the IP Precedence Priority Table, type the new CoS value in the Class of Service Value box, and then click Apply
Changes. If you don't want to save the changes, click Refresh.
DSCP Priority
In the IP DSCP Priority section, you can map DSCP values to traffic class values. These settings apply to all ports on the switch.
l DSCP Priority Table — Displays a list of DSCP values mapped to CoS values.
l Class of Service Value — Sets a new CoS for a DSCP value. The number 0 represents low priority and 7 represents high priority.
Click IP DSCP in the IP Precedence/DSCP Priority Status field to enable this feature.
Each IP DSCP value (from 0 to 63) is mapped to one CoS value (from 0 to 7). The number 0 represents the lowest priority and 7 represents the highest
priority.
The following table shows the default priority mapping. All of the DSCP values that are not specified are mapped to CoS value 0.
To change a table setting, select the entry in the DSCP Priority Table, type the new CoS value in the Class of Service Value box, and then click Apply
Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Class of Service/IP Precedence web page.
Command Usage
map ip precedence Enables IP precedence mapping (IP ToS) for the switch
map ip precedence ip-precedence-value Sets IP precedence priority (IP ToS priority) for a port or trunk
cos cos-value interface (applies to all ports)
show map ip precedence [interface] Shows the IP precedence priority map
map ip dscp Enables IP DSCP mapping for the switch
map ip dscp dscp-value cos cos-value Sets IP DSCP priority for a port or trunk interface (applies to all
ports)
show map ip dscp [interface] Shows the IP DSCP priority map
Example
Console(config)#map ip precedence
Console(config-if)#exit
Console(config)#map ip dscp
Console(config-if)#exit
Console(config)#exit
Eth 1/ 1 0 0
Eth 1/ 1 1 0
Eth 1/ 1 2 0
Eth 1/ 1 3 0
Eth 1/ 1 61 0
Eth 1/ 1 62 0
Eth 1/ 1 63 0
Console(config)#
Link Aggregation
From the Link Aggregation page, you can create multiple links between switches that work as one virtual, aggregate link. You can create up to six trunks at a
time, with each trunk containing up to four ports. A port trunk offers a dramatic increase in bandwidth for network segments where bottlenecks exist and
provides a fault-tolerant link between two devices.
The switch supports two types of link aggregation—static and Link Aggregation Control Protocol (LACP).
LACP-configured ports automatically negotiate a trunked link with LACP-configured ports on another device. You can configure any number of ports on the
switch as LACP, as long as they are not already configured as part of another trunk. If ports on another device are also configured as LACP, the switch and
the other device negotiate a trunk link between them. If an LACP trunk consists of four ports, all other ports are placed in a standby mode. If one link in the
trunk fails, one of the standby ports is automatically activated to replace it.
l Finish configuring port trunks before you connect the corresponding network cables between switches.
l You can configure up to six trunk groups, with up to four ports as a trunk group.
l All ports in the same trunk must consist of the same media type (for example, twisted-pair or fiber).
l The ports on both ends of the trunk must be configured for the same VLAN, speed, duplex mode, flow control, and CoS settings.
l If the target switch has also enabled LACP on the connected ports, the trunk will automatically activate.
l If more than four ports attached to the same target switch have LACP enabled, the additional ports enter standby mode and will only be enabled if one
of the active links fails.
l STP, VLAN, and IGMP settings can only be made for the entire trunk through the specified port-channel.
To add a port to a static trunk, click the Static toggle button below the port number until the correct trunk number appears. To make a port available for an
LACP trunk, click the LACP toggle button below the port number until an L appears.
NOTICE: All ports on both ends of an LACP trunk must be configured for full duplex, either by forced mode or auto-negotiation.
NOTICE: All ports participating in a trunk should have the same VLAN and CoS settings.
NOTICE: In order for a port to join an existing trunk through LACP, the port's Flow Control, Speed and Duplex Mode, and Autonegotiation settings must
match those of the existing trunk.
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Link Aggregation/Trunk Settings page.
Command Usage
channel-group channel-id Adds a port to a trunk.
lacp Enables 802.3ad LACP for the current port or trunk interface.
show interfaces status port-channel channel-id Displays the status of an enabled trunk interface.
Example
Console(config)#interface port-channel 1
Console(config-if)#exit
Console(config-if)#channel-group 1
Console(config-if)#exit
Console(config-if)#lacp
Console(config-if)#
SNMP
The SNMP page contains links to the following pages:
l Communities
l Traps
Communities
On the Communities page, you can create different communities and customize access. The public string has read-only privileges by default.
The following options are available:
l SNMP Community Capability — Indicates that the switch supports up to five community strings.
l Community List — Displays a list of the community strings currently configured. Default strings are public (read-only access) and private (read/write
access).
l Community String — Allows you to name a new community. Community strings are case sensitive.
l Access Mode — Sets the access rights for the new community that you are creating. Access rights are either read-only or read/write.
To add an SNMP community, type the new name in the Community String box, select the access rights from the Access Mode drop-down menu, and then click
Add Community String. To delete a community, click the entry in the Community List, and then click Remove Community String.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the SNMP/Communities page.
Command Usage
snmp-server community Defines the community access string for the Simple Network Management Protocol.
string [ro|rw] Read-only access is specified by ro, and read-write access is specified by rw.
Example
Console(config)#
Traps
On the Traps page, you can specify management stations that receive authentication failure messages and other trap messages from the switch.
NOTICE: The switch does not prevent IP addresses that are not in the Trap Manager list from accessing the switch through SNMP. You only need a
valid community string for access.
l Trap Manager Capability — Indicates that the switch supports up to five trap managers
l Trap Manager List — Displays a list of the trap managers currently configured
l IP address — Specifies the IP address of a new management station to receive trap messages
l Community String — Identifies the community string for the new trap manager you are creating
To add a trap manager, type the new IP address in the IP Address box, type the appropriate SNMP community in the Community String box, and then click
Add Trap Manager. To delete a trap manager, click the entry in the Trap Manager List, and then click Remove Trap Manager.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the SNMP/Traps page.
Command Usage
snmp-server host host-addr community-string Specifies the recipient of a SNMP notification
operation
snmp-server enable traps [authentication | link-up- Enables the device to send SNMP traps
down]
Example
Console(config)#
Multicast Support
Multicasting is used to support real-time programs such as video conferencing or streaming audio. A multicast server does not have to establish a separate
connection with each client. Instead, it broadcasts its service to the network and to any hosts that are supposed to receive the multicast register with their
local multicast routers/switches. This approach reduces the network overhead required by a multicast server. However, each time the broadcast traffic passes
through a multicast router/switch, the traffic must be carefully queried to ensure that only hosts that subscribe to the service receive the broadcast.
The switch uses the Internet Group Management Protocol (IGMP) to determine if any attached hosts are supposed to receive a specific IP multicast service.
IGMP runs between hosts and their adjacent multicast routers/switches. IGMP is a multicast host registration protocol that allows any host to inform its local
router that the host is supposed to receive transmissions addressed to a specific multicast group.
IGMP requires one device to act as the querier on each LAN subnetwork. The querier is the IGMP-enabled device that periodically sends query messages to all
hosts asking them if they want to receive multicast traffic. Hosts respond with report messages, indicating to multicast groups that they wish to join or to
which group they already belong. The querier then propagates the service requests on to any adjacent multicast switch/router to ensure that it continues to
receive the multicast services.
IGMP-enabled devices prune multicast traffic on the network by passively snooping on IGMP report messages passing through their ports. The devices monitor
host report messages, pick out the multicast group registration information, and then configure filters accordingly so that multicast traffic for particular groups
is not forwarded on to ports that do not require it. This capability significantly reduces the multicast traffic on the network.
l IGMP Setting
IGMP Setting
With IGMP Snooping, you can configure the switch to forward multicast traffic intelligently. Based on the IGMP query and report messages, the switch forwards
traffic only to the ports that request multicast traffic. This querying prevents the switch from broadcasting the traffic to all ports and possibly disrupting
network performance.
NOTE: IGMP requires a router that learns about the presence of multicast groups on its subnets and keeps track of group membership.
l IGMP Status — Enables IGMP. When IGMP is enabled, the switch monitors network traffic to determine which hosts are supposed to receive multicast
traffic.
l Act as IGMP Querier — Enables the switch as Querier. When Querier is enabled, the switch can serve as the Querier, which is responsible for asking
hosts if they are supposed to receive multicast traffic.
l IGMP Query Count (2–10) — Sets the maximum number of queries issued for which there has been no response before the switch takes action to
solicit reports. (The range is 2 to 10.)
l IGMP Query Interval (60–125) — Sets the frequency at which the switch sends IGMP host-query messages. (The range is 60 to 125.)
l IGMP Report Delay (5–30) — Sets the time (in seconds) between receiving an IGMP Report for an IP multicast address on a port before the switch
sends an IGMP Query out of that port and removes the entry from its list. (The range is 5 to 30.)
l IGMP Query Timeout (300–500) — Sets the time the switch waits after the previous querier has stopped querying before it takes over as the querier.
(The range is 300 to 500.)
l IGMP Version — Sets the protocol version for compatibility with other devices on the network (1 or 2).
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Multicast Support/IGMP Setting page.
Command Usage
ip igmp snooping Enables IGMP snooping on the switch
Example
Console(config)#exit
Query count: 10
Console#
l Multicast IP Address — Allows you to select or add the IP address for a specific multicast service
l Port/Trunk Toggle Buttons — Allows you to select ports or trunks to receive the specified multicast service by toggling the value of the port/trunk
button:
¡ 'S' — Statically sets a port or trunk as a group member of the multicast service
¡ 'D' — Indicates that a port or trunk has been dynamically set as a group member of the multicast service
¡ 'BLANK' — Indicates that the port or trunk is not a group member of the multicast service
NOTICE: You must set at least one port or trunk as a static member before you add a new multicast IP address. If you remove all static members from
a group, the IP address is also removed.
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following tables summarize the equivalent CLI commands for items in the Multicast Support/IGMP Member Port Table page.
Command Usage
ip igmp snooping vlan vlan-id static ip-address interface Adds a port to a multicast group
show bridge bridge-group multicast [vlan vlan-id] [user | igmp- Shows the multicast list with MAC and IP
snooping] addresses
Example
Console(config)#exit
Console#
l Port/Trunk Toggle Buttons — Allows you to select ports or trunks that are attached to a neighboring multicast router/switch by toggling the value of
the port/trunk button:
¡ 'D' — Indicates that a port or trunk has been dynamically attached to a multicast router/switch
¡ 'BLANK' — Indicates that the port or trunk is not attached to a multicast router/switch
To save any changes you make in this page, click Apply Changes. If you don't want to save the changes, click Refresh.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Multicast Support/Multicast Router Port Settings page.
Command Usage
ip igmp snooping vlan vlan-id mrouter Statically configures a multicast router port
interface
show ip igmp snooping mrouter [vlan Displays information on statically configured and dynamically learned
vlan-id] multicast router ports
Example
Console(config)#exit
1 Eth 1/ 5 Static
Console#
Statistics
From the Statistics page, you can chart a variety of system data. You can see the value of each bar or line in the chart by clicking the bar. For each chart, after
you have set all the variables, click Draw.
NOTE: Rates are displayed as counts per second. Counters are cumulative from the last time the system was booted.
l Chart
l Table
Chart
The Chart page compares one type of statistic across all ports or trunks. You must define the following variables:
Table
The Table page lists, in table format, all statistics counters for a specific port or trunk. You must specify the port or trunk from the drop-down menus, and then
click Query.
CLI Commands
The following table summarizes the equivalent CLI commands for items in the Statistics/Table page.
Command Usage
Example
Ethernet 1/17
Iftable stats:
Ether-like stats:
RMON stats:
Fragments: 0, Jabbers: 0
Packet size <= 64 octets: 2584, Packet size 65 to 127 octets: 211
Packet size 128 to 255 octets: 198, Packet size 256 to 511 octets: 317
Packet size 512 to 1023 octets: 95, Packet size 1024 to 1518 octets: 25
Console#
Console#configure
VLANs
Dell™ PowerConnect™ 5224 Systems User's Guide
With frame tagging, a four-byte data tag field is attached to frames that cross the network. The tag identifies to which VLAN the frame belongs. The tag may
be added to the frame by the end station itself or by a network device, such as a switch. In addition to VLAN information, the relative priority of the frame in
the network can be specified by the tag.
VLANs provide greater network efficiency by reducing broadcast traffic, and they also allow you to make network changes without having to update IP
addresses or IP subnets. VLANs inherently provide a high level of network security, since traffic must pass through a Layer 3 switch or a router to reach a
different VLAN.
l Distributed VLAN learning across multiple switches using explicit or implicit tagging and GVRP (GARP VLAN Registration Protocol)
VLAN Configuration
By default, VLAN operation on the switch is enabled. Therefore, all frames are transferred internally through the switch with a VLAN tag. This tag may already
be on the frame entering the switch, or added to the frame by the switch. VLAN information already existing on frames entering the switch is automatically
handled by the switch. The switch learns VLAN information from tagged frames and appropriately switches frames out the proper ports based on this
information. The configuration of VLANs for frames entering the switch without tags must be made by the user of the switch. This configuration can be made
either through the web or console interface, or through Simple Network Management Protocol (SNMP).
Port-based VLANs are tied to specific ports. The switch's forwarding determination is based on the destination MAC address and its associated port. Therefore,
to make valid forwarding and flooding decisions, the switch learns the relationship of the MAC address to its related port (and to the VLAN) at run-time.
VLAN Classification
Packets that the switch receives are treated in the following ways:
l When an untagged packet enters a port, the system automatically tags it with the port's default VLAN ID tag number. Each port has a default VLAN ID
setting that is user configurable. The default setting is 1. You can change the default VLAN ID setting for each port from the VLAN Port Settings page.
l When a tagged packet enters a port, the default VLAN ID setting has no effect on the tag.
¡ The packet proceeds to the VLAN specified by its VLAN ID tag number.
¡ If the port in which the packet entered does not belong to the VLAN specified by the packet's VLAN ID tag, the system drops the packet.
NOTE: You can change port VLAN membership settings in the VLAN Membership page.
¡ If the port belongs to the VLAN specified by the packet's VLAN ID, the system can send the packet to other ports with the same VLAN ID.
l Packets leaving the switch are either tagged or untagged depending on that port's membership properties.
l In the VLAN Membership page, if a U is assigned to a port and VLAN, packets leaving the switch from that port and VLAN are untagged. If a T is
assigned to a port and VLAN, packets leaving the switch from that port and VLAN are tagged with the respective ID for the VLAN to which that port
belongs.
Port Overlapping
Port overlapping can be used to allow access to commonly shared network resources among different VLAN groups, such as file servers or printers. If you
implement VLANs that do not overlap but still need to communicate, you must connect them using a router or Layer 3 switch.
GVRP uses GVRP Bridge Protocol Data Units (GVRP BPDUs) to advertise static VLANs to other switches in the network. Any GVRP-enabled device receiving the
advertisements can dynamically join the advertised VLAN. All GVRP-dynamically learned VLANs operate as tagged VLANs. A GVRP-enabled port only joins a
VLAN when an advertisement for that VLAN is received on that specific port. A GVRP-enabled port forwards advertisements from other ports on the switch but
does not join the advertised VLAN.
Hosts, such as computers and servers, can be connected to switch ports that are part of a statically configured VLAN. If GVRP is enabled on the switch, these
VLANs are advertised to the rest of the network. If a host (or its network adapter) supports GVRP, it can directly indicate the VLAN groups that it is supposed
to join. When the attached GVRP-enabled switch receives the VLAN advertisements, it automatically places the receiving port in the specified VLANs and then
forwards the advertisements to all other ports. When the advertisements arrive at another GVRP-enabled switch, the switch places the receiving port in the
specified VLANs, and passes the advertisements on to all other ports. As a result, VLAN requirements are spread throughout the network, which allows GVRP-
compliant devices to be automatically configured for VLAN groups based solely on host requests.
The following figure shows how GVRP can propagate VLANs across a network.
VLAN Examples
The following four examples demonstrate typical web-interface VLAN configurations for the switch.
l Example 2 demonstrates a more elaborate setup, illustrating all possible scenarios for a comprehensive understanding of tagged VLANs.
l Examples 3 and 4 show how GVRP can be used to automatically propagate VLANs across a network.
Example 1
Example 1 illustrates a simple two-group VLAN setup.
1. In the VLAN Membership page, select Add a new VLAN from the Show VLAN drop-down menu.
Because there are no ports in the new VLAN, all the port and trunk toggle buttons are blank.
6. Click the toggle buttons in the Static row under the port/trunk numbers to select the desired port members of the new VLAN.
8. To allow untagged packets to participate in the new VLAN, change the Port VLAN IDs for the relevant ports in the Port Settings page.
9. Click Apply Changes to save any changes. Click Refresh if you don't want to save the changes.
Example 2
Example 2 illustrates a more complicated setup and demonstrates several scenarios for configuring VLANs.
2. Set up the Port VLAN IDs (PVIDs), as shown in the following figure:
The specific ports shown in the previous figure have the following PVID settings. The PVID settings for each port are configured in the Port Settings
page.
Port 01: 2 Port 05: 5 Port 09: 1 Port 13: 1
The PVID of a port must be set to a VLAN ID of which the port is an untagged member.
NOTE: Port 9 cannot be removed from VLAN 1 because its PVID is set to VLAN 1.
3. Return to the VLAN Membership page and remove the ports configured in this example (1, 2, 4, 5, 10, 11, 12, 14) from VLAN 1.
The VLANs set up in the this example procedure produce the following results:
l If an untagged packet enters Port 4, the switch tags it with a VLAN tag value of 5. The packet can be forwarded to Port 5 and/or 1. As the packet leaves
Port 5 and/or 1, it is stripped of its tag and becomes an untagged packet.
l If a tagged packet with a VLAN tag value 5 enters Port 4, the packet has access to Ports 5 and 1. If the packet leaves Port 5 and/or 1, it is stripped of
its tag as it leaves the switch and becomes an untagged packet.
l If a tagged packet with a VLAN tag value 10 enters Port 9, it can be forwarded to Ports 1, 10, 11, and 12. If the packet leaves Port 1 or 10, it is tagged
with a VLAN ID value of 10. If the packet leaves Port 11 or 12, it leaves as an untagged packet.
l If a tagged packet with a VLAN tag value 15 enters Port 9, it is forwarded to ports in VLAN 15, even though Port 9 is not a member of VLAN 15. The
tagged packet enters Port 9 because the Ingress Filtering parameter for Port 9 is set to disabled (the default). If Ingress Filtering is disabled, a tagged
packet is forwarded if its VLAN tag value matches a VLAN ID already configured on the switch, otherwise it is dropped.
l If a tagged packet with a VLAN tag value of 1 enters Port 10, it is dropped because Port 10 is not a member of VLAN 1 and its Ingress Filtering
parameter is set to enabled.
Example 3
Example 3 illustrates how GVRP is implemented where VLANs configured in a core aggregation switch are automatically learned by wiring-closet switches.
1. Set up static VLANs in the core switch, as shown in the following table.
3. For the other three switches, ensure that GVRP is enabled globally in the VLAN/GVRP page, as well as on ports connecting to the core switch in the
VLAN/Port Settings page.
With GVRP enabled on the core switch, GVRP advertisements for the three static VLANs are sent from all ports on the switch. When the three wiring-closet
switches receive the advertisements, they dynamically create the VLANs and the receiving ports join these VLANs.
The clouds connected to the wiring closet switches in the previous figure represent other switches and end-users on that network segment. By setting one
VLAN as forbidden on the connecting port, the core switch limits each network segment to only two of the VLANs. For example, users attached to Switch 3
have access to VLANs 11 and 22, but not to VLAN 33. End-user requests enable ports on Switch 3 to join VLAN 33, but these users do not have access to the
rest of the network.
Example 4
Example 4 illustrates how GVRP is implemented where VLANs configured in wiring-closet switches are automatically recognized by a core aggregation switch.
5. For each of the three wiring-closet switches, ensure that GVRP is disabled for each port in the VLAN/Port Settings page.
6. For the core switch, ensure that GVRP is enabled globally in the VLAN/GVRP page, as well as on ports connecting to the wiring-closet switches in the
VLAN/Port Settings page.
With GVRP enabled on the wiring closet switches, GVRP advertisements for the configured static VLANs are sent to the core switch. When the core switch
receives the advertisements, it dynamically creates the VLANs and places the receiving ports in these VLANs.
The GVRP port settings on the wiring-closet switches need to be set to disabled. This setting prevents these switches from dynamically creating other VLANs,
or adding port members to the existing static VLANs. The global GVRP switch setting still enables the static VLANs to be advertised to the rest of the network.
For example, users attached to Switch 3 have access to VLANs 11 and 22, but not to VLAN 33. VLAN 33 cannot be created on Switch 3, even though
advertisements are received on Port 1 from other switches in the network.
Appendix
Dell™ PowerConnect™ 5224 Systems User's Guide
Troubleshooting
Downloading Firmware Through the Console Port
Technical Specifications
Getting Help
Regulatory Notices
Troubleshooting
This section explains how to isolate and diagnose problems with the switch. If you have a problem that is not listed here and you cannot solve it, contact Dell
(see "Getting Help").
LEDs
l All light-emitting diode (LEDs) are off.
Ensure that:
¡ You are using an RJ-45 (network) cable and not an RJ-11 (telephone) cable to connect to the switch.
¡ The power cable is firmly connected to the relevant switch unit and to the supply outlet. If the connection is secure and there is still no power, you
may have a faulty power cable.
¡ The switch has sufficient space for adequate airflow on both sides.
NOTICE: Operating temperature for the switch must not exceed 40ºC (104°F). Do not place the switch in the direct sunlight or near warm air exhausts
or heaters.
l When the switch powers on, the Diag LED lights are red.
¡ The relevant switch unit failed its power on self-test because of an internal problem. See "Getting Help" for more information.
Ports
l The port does not function.
Ensure that:
¡ The cable connections are secure and the cables are connected to the correct ports at both ends of the link.
¡ The port status is set to Enable and the autonegotiation feature is enabled at the switch. See "Port Configuration" for more information.
Management Access
l The terminal cannot access the switch.
Ensure that:
¡ You have set the terminal emulator program to VT100-compatible, 8 data bits, 1 stop bit, no parity and 9600 bps. See "Connecting the Console
Port" for more information.
Ensure that:
¡ You have configured the switch's management virtual local area network (VLAN) with a valid Internet Protocol (IP) address, subnet mask, and
default gateway.
¡ Your management station has management VLAN access (see "Management VLAN Access").
¡ You have a valid network connection to the switch and the port you are using has not been disabled.
¡ You have not exceeded the maximum number of concurrent Telnet sessions permitted. Try connecting again at a later time.
Ensure that:
¡ You have configured the switch's management VLAN with a valid IP address, subnet mask, and default gateway.
¡ Your management station has management VLAN access (see "Management VLAN Access").
¡ The switch is powered up.
¡ You have a valid network connection to the switch and the port you are using has not been disabled.
l Simple Network Management Protocol (SNMP) management software cannot access the switch.
Ensure that:
¡ You have configured the switch's management VLAN with a valid IP address, subnet mask, and default gateway.
¡ Your management station has management VLAN access (see "Management VLAN Access").
¡ SNMP is enabled on the switch and community strings have been set with the appropriate access rights.
¡ You have a valid network connection to the switch and the port you are using has not been disabled.
If you are having problems setting up management access in a network where there are only Layer 2 switch connections to the management station, use the
following example to troubleshoot the problem.
Example 1
Three switches, which form three VLANs, are interconnected to a fourth core switch. Network administrators who are connected to one switch need to be able
to access all switches. The VLAN port memberships should be set up as shown in the following figure.
In the preceding figure, the management VLAN is VID 2 and all inter-switch ports are configured as tagged ports. The ports that interconnect the switches
must be configured as members of the management VLAN, and the management station must be connected to a port that is also a member of the same VLAN.
l You have configured the switch's management VLAN with a valid IP address and subnet mask.
l The management station has an IP address in the same subnet as the management VLAN.
l The management station is connected to a switch port that is a member of the management VLAN, and the port VLAN ID (PVID) is also configured as the
management VLAN.
l Ports that interconnect switches in the network are tagged and are members of the management VLAN.
If you are having problems setting up management access in a network where there are Layer 3 switch connections to the management station, use the
following example to troubleshoot the problem.
Example 2
Three Layer 2 switches, which form three VLANs, are interconnected to a fourth Layer 3 switch. Network administrators who are connected to one Layer 2
switch need to be able to access all switches for management. The VLAN port memberships should be set up as shown in the following figure.
In the preceding figure, the management VLAN is different on each switch, with the Layer 3 switch interconnecting the VLANs. The ports that interconnect the
switches are configured as tagged ports. The ports on the Layer 3 switch that connect to the other switches must be configured as members of the
management VLAN for each switch.
l You have configured the switch's management VLAN with a valid IP address, subnet mask, and default gateway.
l The management station has a valid IP address, subnet mask and default gateway.
l The management station is connected to a switch port that is a member of the management VLAN, and the PVID is also configured as the management
VLAN.
l Ports that interconnect switches, including the Layer 3 switch in the network, are tagged and are members of the management VLAN.
NOTICE: Use the switch's web interface to download the runtime code through TFTP (see "Firmware Upgrade"). Downloading large runtime code files
through TFTP is normally much faster than downloading files through the switch's serial port.
You can upgrade switch firmware by connecting a computer directly to the serial console port on the switch's front panel and using VT100 terminal emulation
software that supports the XModem protocol. (See "Connecting the Console Port.")
To download firmware:
1. Connect a computer to the switch's console port using a null-modem or crossover RS-232 cable with a female DB-9 connector.
2. Configure the terminal emulation software's communication parameters to 9600 baud, 8 data bits, 1 stop bit, and no parity. Set flow control to none.
4. To enter firmware-download mode, press <Ctrl><f> immediately after the diagnostic test results appear in the switch initialization screen.
$logfile_1 0 3 64 00:00:07
$logfile_2 0 3 64 00:00:12
Select>
5. Press <c> to change the baud rate of the switch's serial connection.
6. Press <b> to select the option for 115200 baud.
There are two baud rate settings available: 9600 and 115200. Using the higher baud rate minimizes the time required to download firmware code files.
7. Set your computer's terminal emulation software to match the 115200 baud rate. Press <Enter> to reset communications with the switch.
Select>
8. Before you download the firmware, ensure that the switch has sufficient flash memory space for the new code file.
You can store up to two runtime and two diagnostic code files in the switch's flash memory. Use the [D]elete File command to remove a runtime or
diagnostic file that is not set as the startup file (the S/Up setting for the file is 0).
If you are using Windows HyperTerminal, click Transfer and then click Send File. Select the XModem Protocol and use the Browse button to find the
required firmware code file on your computer.
The Xmodem file send window displays the progress of the download procedure.
NOTICE: The download file must be a PowerConnect 5224 binary software file from Dell.
10. After the file has been downloaded, press <r> for runtime code or <d> for diagnostic code when Update Image File: appears.
11. Specify a name for the downloaded code file. Filenames can be up to 32 characters, are case sensitive, and cannot contain spaces.
The following figure shows an example of the download procedure for a runtime code file:
Select>x
[R]untime
[D]iagnostic
12. To set the new downloaded file as the startup file, click the [S]et Startup File menu option.
13. When you have finished downloading code files, click the [C]hange Baudrate menu option to change the baud rate of the switch's serial connection
back to 9600 baud.
14. Set your computer's terminal emulation software baud rate back to 9600 baud. Press <Enter> to reset communications with the switch.
15. Press <q> to quit the firmware-download mode and boot the switch.
Technical Specifications
Standards
Ethernet types supported IEEE 802.3 Type 10Base-T, IEEE 802.3u Type
100Base-TX, IEEE 802.3z, IEEE 803.ab
Other standards supported IEEE 802.3x, IEEE 802.1D, IEEE 802.1Q, IEEE 802.1p,
IEEE 802.3ac, IEEE 802.3ad
Interfaces
10/100/1000BASE-T ports 24
Port LEDs:
10/100/1000BASE-T ports 2 per port
SFP transceiver slots 1 per slot
Power
Input 100-240 VAC 50-60 Hz
Physical
Dimensions 440 x 324 x 43 mm
(17.3 x 12.8 x 1.7 inches)
Getting Help
Technical Assistance
If you need help with a technical problem, Dell is ready to assist you.
2. Use Dell's extensive suite of online services available at Dell Support (support.dell.com) for help with installation and troubleshooting procedures.
3. If the preceding steps have not resolved the problem, contact Dell.
NOTE: Call technical support from a telephone near or at the computer so that technical support can assist you with any necessary procedures.
NOTE: Dell's Express Service Code system may not be available in all countries.
When prompted by Dell's automated telephone system, enter your Express Service Code to route the call directly to the proper support personnel. If
you do not have an Express Service Code, open the Dell Accessories folder, double-click the Express Service Code icon, and follow the directions.
For instructions on using the technical support service, see "Technical Support Service."
NOTE: Some of the following services are not always available in all locations outside the continental U.S. Call your local Dell representative for information on
availability.
Online Services
You can access Dell Support at support.dell.com. Select your region on the WELCOME TO DELL SUPPORT page, and fill in the requested details to access
help tools and information.
www.dell.com/
ftp.dell.com/
Log in as user: anonymous, and use your e-mail address as your password.
AutoTech Service
Dell's automated technical support service—AutoTech—provides recorded answers to the questions most frequently asked by Dell customers about their
portable and desktop computers.
When you call AutoTech, use your touch-tone telephone to select the subjects that correspond to your questions.
The AutoTech service is available 24 hours a day, 7 days a week. You can also access this service through the technical support service. For the telephone
number to call, see the contact numbers for your region.
To check on the status of any Dell products that you have ordered, you can go to support.dell.com, or you can call the automated order-status service. A
recording prompts you for the information needed to locate and report on your order. For the telephone number to call, see the contact numbers for your
region.
Dell's technical support service is available 24 hours a day, 7 days a week, to answer your questions about Dell hardware. Our technical support staff uses
computer-based diagnostics to provide fast, accurate answers.
To contact Dell's technical support service, see "Before You Call" and then call the number for your country as listed in "Contacting Dell."
Product Information
If you need information about additional products available from Dell, or if you would like to place an order, visit the Dell website at www.dell.com. For the
telephone number to call to speak to a sales specialist, see the contact numbers for your region.
1. Call Dell to obtain a Return Material Authorization Number, and write it clearly and prominently on the outside of the box.
For the telephone number to call, see the contact numbers for your region.
2. Include a copy of the invoice and a letter describing the reason for the return.
3. Include a copy of the Diagnostics Checklist indicating the tests you have run and any error messages reported by the Dell Diagnostics.
4. Include any accessories that belong with the item(s) being returned (power cables, software floppy disks, guides, and so on) if the return is for credit.
5. Pack the equipment to be returned in the original (or equivalent) packing materials.
You are responsible for paying shipping expenses. You are also responsible for insuring any product returned, and you assume the risk of loss during shipment
to Dell. Collect On Delivery (C.O.D.) packages are not accepted.
Returns that are missing any of the preceding requirements will be refused at Dell's receiving dock and returned to you.
Remember to fill out the Diagnostics Checklist. If possible, turn on your computer before you call Dell for technical assistance and call from a telephone at or
near the computer. You may be asked to type some commands at the keyboard, relay detailed information during operations, or try other troubleshooting
steps possible only at the computer itself. Ensure that the computer documentation is available.
Diagnostics Checklist
Name:
Date:
Address:
Phone number:
Service tag (bar code on the back of the switch):
Express Service Code:
Contacting Dell
To contact Dell electronically, you can access the following websites:
l www.dell.com
l premiersupport.dell.com (technical support for educational, government, healthcare, and medium/large business customers, including Premier,
Platinum, and Gold customers)
For specific web addresses for your country, find the appropriate country section in the table below.
NOTE: Toll-free numbers are for use within the country for which they are listed.
When you need to contact Dell, use the electronic addresses, telephone numbers, and codes provided in the following table. If you need assistance in
determining which codes to use, contact a local or an international operator.
Country Code: 56
City Code: 2
China (Xiamen) Tech Support website: support.ap.dell.com/china
Corporate
Technical Support 0825 004 719
Customer Care 0825 338 339
Switchboard 01 55 94 71 00
Sales 01 55 94 71 00
Fax 01 55 94 71 01
E-mail: [email protected]
International Access Code: 16
Ireland Technical Support 1850 543 543
Country Code: 353
U.K. Technical Support (dial within U.K. only) 0870 908 0800
U.K. Customer Care (dial within U.K. only) 0870 906 0010
Corporate Customer Care 01 204 4003
E-mail: support.euro.dell.com/it/it/emaildell/
International Access Code: 00
Home and Small Business
Country Code: 39
Technical Support 02 577 826 90
City Code: 44 Technical Support outside of Japan (Dimension and Inspiron) 81-44-520-1435
Public Sales (government agencies, educational institutions, and medical 044 556-1469
institutions)
Latin America Customer Technical Support (Austin, Texas, U.S.A.) 512 728-4093
Customer Service (Austin, Texas, U.S.A.) 512 728-3619
Fax (Technical Support and Customer Service) (Austin, Texas, U.S.A.) 512 728-3883
or 512 728-3772
Luxembourg Website: support.euro.dell.com
E-mail: [email protected]
International Access Code: 00
Technical Support (Brussels, Belgium) 02 481 92 88
Country Code: 352 Home/Small Business Sales (Brussels, Belgium) toll-free: 080016884
Sales 50-81-8800
Country Code: 52
or 01-800-888-3355
Customer Service 001-877-384-8979
or 001-877-269-3383
Main 50-81-8800
or 01-800-888-3355
Montserrat General Support toll-free: 1-866-278-6822
E-mail: support.euro.dell.com/nl/nl/emaildell/
International Access Code: 00
Technical Support 020 674 45 00
Country Code: 31 Home/Small and Medium Business 020 674 55 00
[email protected]
E-mail Support (servers):
[email protected]
Technical Support 671 16882
E-mail: [email protected]
International Access Code: 011
Customer Service Phone 57 95 700
Country Code: 48 Customer Care 57 95 999
Switchboard 57 95 999
Portugal E-mail: support.euro.dell.com/es/es/emaildell/
121 422 07 10
Fax 121 424 01 12
Puerto Rico General Support 1-800-805-7545
St. Kitts and Nevis General Support toll-free: 1-877-441-4731
E-mail: [email protected]
International Access Code:
Technical Support 011 709 7710
09/091 Customer Care 011 709 7707
Southeast Asian and Pacific Customer Technical Support, Customer Service, and Sales (Penang, Malaysia) 604 633 4810
Countries
Switchboard 91 722 92 00
Fax 91 722 95 83
E-mail: [email protected]
International Access Code: 00
E-mail for French-speaking HSB and Corporate Customers:
Country Code: 41 support.euro.dell.com/ch/fr/emaildell/
Taiwan Technical Support (portable and desktop computers) toll-free: 00801 86 1011
or 0800 33 555
City Code: 1344 Technical Support (direct/PAD and general) 0870 908 0800
(1-877-335-5638)
Business (businesses with <400 employees; businesses with 400+ employees and their employees)
or toll-free: 1-800-879-3355
(1-877-335-5889)
Regulatory Notices
The equipment has been tested and found to comply with the limits for a Class A computing device in accordance with the specifications in Subpart B of Part 15
of FCC rules, which are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that
interference will not occur in a particular installation.
To determine if this equipment is causing interference, perform the following test: Turn your Ethernet switch on and off while your radio or TV is showing
interference. If the interference disappears when you turn the switch off and reappears when you turn it back on, the switch is causing interference.
l Reorient the receiving radio or TV antenna where this may be done safely.
l Plug the Ethernet switch into a different power outlet so that the switch and the receiver are on different branch circuits.
l If necessary, consult the place of purchase or an experienced radio/television technician for additional suggestions.
CAUTION: Do not use a RJ-11 (telephone) cable to connect your network equipment.
Class A
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of the FCC Rules. These limits are designed
to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses,
and can radiate radio frequency energy and, if not installed and used in accordance with the manufacturer's instruction manual, may cause harmful
interference with radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case you will be
required to correct the interference at your own expense.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
l This device must accept any interference received, including interference that may cause undesired operation.
Marking by the symbol indicates compliance of this Dell computer to the EMC Directive and the Low Voltage Directive of the European Union. Such marking
is indicative that this Dell system meets the following technical standards:
l EN 55022 — "Information Technology Equipment — Radio Disturbance Characteristics — Limits and Methods of Measurement."
l EN 55024 — "Information Technology Equipment - Immunity Characteristics - Limits and Methods of Measurement."
l EN 61000-3-2 — "Electromagnetic Compatibility (EMC) - Part 3: Limits - Section 2: Limits for Harmonic Current Emissions (Equipment Input Current Up to
and Including 16 A Per Phase)."
l EN 61000-3-3 — "Electromagnetic Compatibility (EMC) - Part 3: Limits - Section 3: Limitation of Voltage Fluctuations and Flicker in Low-Voltage Supply
Systems for Equipment With Rated Current Up to and Including 16 A."
For –48 volt-direct-current (VDC) powered systems, the following set of standards applies. See the "Declaration of Conformity" to determine whether a
particular system meets EN 50082-1 or EN 50082-2 requirements.
l EN 55022 — "Information Technology Equipment — Radio Disturbance Characteristics — Limits and Methods of Measurement."
l EN 50082-1 — "Electromagnetic Compatibility - Generic Immunity Standard - Part 1: Residential, Commercial and Light Industry."
RF INTERFERENCE WARNING: This is a Class A product. In a domestic environment this product may cause radio frequency (RF) interference, in which
case the user may be required to take adequate measures.
A "Declaration of Conformity" in accordance with the preceding directives and standards has been made and is on file at Dell Computer Corporation Products
Europe BV, Limerick, Ireland.
Class A ITE
This is a Class A product based on the standard of the Voluntary Control Council for Interference (VCCI) for information technology equipment. If this
equipment is used in a domestic environment, radio disturbance may arise. When such trouble occurs, the user may be required to take corrective actions.
If the regulatory label includes the following marking, your computer is a Class A product:
Frequency: 50–60 Hz
Input current rating: 1.5 A
Use the following safety guidelines to ensure your own personal safety and to help protect your system from potential damage.
General
l Observe and follow service markings. Do not service any product except as explained in your system documentation. Opening or removing covers that
are marked with the triangular symbol with a lightning bolt may expose you to electrical shock. Components inside these compartments should be
serviced only by a trained service technician.
l If any of the following conditions occur, unplug the product from the electrical outlet and replace the part or contact your trained service provider:
¡ The product does not operate correctly when you follow the operating instructions.
l Keep your system away from radiators and heat sources. Also, do not block cooling vents.
l Do not spill food or liquids on your system components, and never operate the product in a wet environment. If the system gets wet, see the
appropriate section in your troubleshooting guide or contact your trained service provider.
l Do not push any objects into the openings of your system. Doing so can cause fire or electric shock by shorting out interior components.
l Allow the product to cool before removing covers or touching internal components.
l Operate the product only from the type of external power source indicated on the electrical ratings label. If you are not sure of the type of power
source required, consult your service provider or local power company.
l Use only approved power cable(s). If you have not been provided with a power cable for your system or for any AC-powered option intended for your
system, purchase a power cable that is approved for use in your country. The power cable must be rated for the product and for the voltage and
current marked on the product's electrical ratings label. The voltage and current rating of the cable should be greater than the ratings marked on the
product.
l To help prevent electric shock, plug the system and peripheral power cables into properly grounded electrical outlets. These cables are equipped with
three-prong plugs to help ensure proper grounding. Do not use adapter plugs or remove the grounding prong from a cable. If you must use an
extension cable, use a 3-wire cable with properly grounded plugs.
l Observe extension cable and power strip ratings. Make sure that the total ampere rating of all products plugged into the extension cable or power
strip does not exceed 80 percent of the ampere ratings limit for the extension cable or power strip.
l To help protect your system from sudden, transient increases and decreases in electrical power, use a surge suppressor, line conditioner, or
uninterruptible power supply (UPS).
l Position system cables and power cables carefully; route cables so that they cannot be stepped on or tripped over. Be sure that nothing rests on any
cables.
l Do not modify power cables or plugs. Consult a licensed electrician or your power company for site modifications. Always follow your local/national
wiring rules.
l When connecting or disconnecting power to hot-pluggable power supplies, if offered with your system, observe the following guidelines:
¡ Install the power supply before connecting the power cable to the power supply.
¡ If the system has multiple sources of power, disconnect power from the system by unplugging all power cables from the power supplies.
l Move products with care; ensure that all casters and/or stabilizers are firmly connected to the system. Avoid sudden stops and uneven surfaces.
Observe the following precautions for rack stability and safety. Also refer to the rack installation documentation accompanying the system and the rack for
specific caution statements and procedures.
Systems are considered to be components in a rack. Thus, "component" refers to any system as well as to various peripherals or supporting hardware.
CAUTION: Installing systems in a rack without the front and side stabilizers installed could cause the rack to tip over, potentially resulting in
bodily injury under certain circumstances. Therefore, always install the stabilizers before installing components in the rack.
After installing system/components in a rack, never pull more than one component out of the rack on its slide assemblies at one time. The
weight of more than one extended component could cause the rack to tip over and may result in serious injury.
NOTE: Your system is safety-certified as a free-standing unit and as a component for use in a Dell rack cabinet using the customer rack kit. The installation of
your system and rack kit in any other rack cabinet has not been approved by any safety agencies. It is your responsibility to have the final combination of
system and rack kit in a rack cabinet evaluated for suitability by a certified safety agency. Dell disclaims all liability and warranties in connection with such
combinations.
l System rack kits are intended to be installed in a rack by trained service technicians. If you install the kit in any other rack, be sure that the rack meets
the specifications of a Dell rack.
CAUTION: Do not move racks by yourself. Due to the height and weight of the rack, a minimum of two people should accomplish this task.
l Before working on the rack, make sure that the stabilizers are secured to the rack, extended to the floor, and that the full weight of the rack rests on
the floor. Install front and side stabilizers on a single rack or front stabilizers for joined multiple racks before working on the rack.
l Always load the rack from the bottom up, and load the heaviest item in the rack first.
l Make sure that the rack is level and stable before extending a component from the rack.
l Use caution when pressing the component rail release latches and sliding a component into or out of a rack; the slide rails can pinch your fingers.
l After a component is inserted into the rack, carefully extend the rail into a locking position, and then slide the component into the rack.
l Do not overload the AC supply branch circuit that provides power to the rack. The total rack load should not exceed 80 percent of the branch circuit
rating.
l Do not step on or stand on any component when servicing other components in a rack.
CAUTION: A qualified electrician must perform all connections to DC power and to safety grounds. All electrical wiring must comply with
applicable local or national codes and practices.
CAUTION: Never defeat the ground conductor or operate the equipment in the absence of a suitably installed ground conductor. Contact the
appropriate electrical inspection authority or an electrician if you are uncertain that suitable grounding is available.
CAUTION: The system chassis must be positively grounded to the rack cabinet frame. Do not attempt to connect power to the system until
grounding cables are connected. Completed power and safety ground wiring must be inspected by a qualified electrical inspector. An energy
hazard will exist if the safety ground cable is omitted or disconnected.
l Do not connect or use a modem during a lightning storm. There may be a risk of electrical shock from lightning.
l Do not plug a modem or telephone cable into the network interface controller (NIC) receptacle.
l Disconnect the modem cable before opening a product enclosure, touching or installing internal components, or touching an uninsulated modem cable
or jack.
Static electricity can harm delicate components inside your system. To prevent static damage, discharge static electricity from your body before you touch any
of the electronic components, such as the microprocessor. You can do so by periodically touching an unpainted metal surface on the chassis.
You can also take the following steps to prevent damage from electrostatic discharge (ESD):
l When unpacking a static-sensitive component from its shipping carton, do not remove the component from the antistatic packing material until you are
ready to install the component in your system. Just before unwrapping the antistatic packaging, be sure to discharge static electricity from your body.
l Handle all sensitive components in a static-safe area. If possible, use antistatic floor pads and workbench pads and an antistatic grounding strap.
NOTE: Your system may also include circuit cards or other components that contain batteries. These batteries must also be disposed of in a battery deposit
site. For information about such batteries, refer to the documentation for the specific card or component.