01-Basic Management Configuration
01-Basic Management Configuration
Content
1
Basic Management Configuration Content
2
Basic Management Configuration Chapter 1 Switch Management
After purchasing the switch, the user needs to configure the switch for network
management. Switch provides two management options: in-band management and
out-of-band management.
1-1
Basic Management Configuration Chapter 1 Switch Management
Serial port cable One end attach to the RS-232 serial port, the other end to
the Console port.
Switch Functional Console port required.
1-2
Basic Management Configuration Chapter 1 Switch Management
1-3
Basic Management Configuration Chapter 1 Switch Management
The user can now enter commands to manage the switch. For a de tailed description
for the commands, please refer to the following chapters.
To manage the switch with Telnet, the following conditions should be met:
1) Switch has an IPv4/IPv6 address configured;
2) The host IP address (Telnet client) and the switch’s VLAN interface IPv4/IPv6
address is in the same network segment;
3) If 2) is not met, Telnet client can connect to an IPv4/IPv6 address of the switch via
other devices, such as a router.
The switch is a Layer 3 switch that can be configured with several IPv4/IPv6
addresses, the configuration method refers to the relative chapter. The following example
1-4
Basic Management Configuration Chapter 1 Switch Management
assumes the shipment status of the switch where only VLAN1 exists in the system.
The following describes the steps for a Telnet client to connect to the switch’s VLAN1
interface by Telnet(IPV4 address example):
Step 1: Configure the IP addresses for the switch and start the Telnet Server function on
the switch.
First is the configuration of host IP address. This should be within the same network
segment as the switch VLAN1 interface IP address. Suppose the switch VLAN1 interface
IP address is 10.1.128.251/24. Then, a possible host IP address is 10.1.128.252/24. Run
“ping 10.1.128.251” from the host and verify the result, check for reasons if ping failed.
The IP address configuration commands for VLAN1 interface are listed below. Before
in-band management, the switch must be configured with an IP address by out -of-band
management (i.e. Console mode), the configuration commands are as follows (All switch
configuration prompts are assumed to be “Switch” hereafter if not otherwise specified):
Switch>
Switch>enable
Switch#config
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.128.251 255.255.255.0
Switch(Config-if-Vlan1)#no shutdown
To enable the Telnet Server function, users should type the CLI command
telnet-server enable in the global mode as below:
Switch>enable
Switch#config
Switch(config)# telnet-server enable
1-5
Basic Management Configuration Chapter 1 Switch Management
Run Telnet client program included in Windows with the specified Telnet targe t.
Login to the Telnet configuration interface. Valid login name and password are
required, otherwise the switch will reject Telnet access. This is a method to protect th e
switch from unauthorized access. As a result, when Telnet is enabled for configuring and
managing the switch, username and password for authorized Telnet users must be
configured with the following command: username <username> privilege <privilege>
[password (0|7) <password>]. To open the local authentication style with the following
command: authentication line vty login local. Privilege option must exist and just is 15.
Assume an authorized user in the switch has a username of “test”, and password of “t est”,
the configuration procedure should like the following:
Switch>enable
Switch#config
Switch(config)#username test privilege 15 password 0 test
Switch(config)#authentication line vty login local
Enter valid login name and password in the Telnet configuration interface, Telnet user
will be able to enter the switch’s CLI configuration interface. The commands used in the
Telnet CLI interface after login is the same as that in the Console interface.
1-6
Basic Management Configuration Chapter 1 Switch Management
To manage the switch via HTTP, the following conditions should be met:
1) Switch has an IPv4/IPv6 address configured;
2) The host IPv4/IPv6 address (HTTP client) and the switch’s VLAN interface IPv4/IPv6
address are in the same network segment;
3) If 2) is not met, HTTP client should connect to an IPv4/IPv6 address of the switch via
other devices, such as a router.
Similar to management the switch via Telnet, as soon as the host succeeds to
ping/ping6 an IPv4/IPv6 address of the switch and to type the right login password, it can
access the switch via HTTP. The configuration list is as below:
Step 1: Configure the IP addresses for the switch and start the HTTP server function on
the switch.
For configuring the IP address on the switch through out-of-band management, see
the telnet management chapter.
To enable the WEB configuration, users should type the CLI command IP http server
in the global mode as below:
Switch>enable
Switch#config
1-7
Basic Management Configuration Chapter 1 Switch Management
Open the Web browser on the host and type the IP address of the switch, or run
directly the HTTP protocol on the Windows. For example, the IP address of the switch is
“10.1.128.251”;
Login to the Web configuration interface. Valid login name and password are required,
otherwise the switch will reject HTTP access. This is a method to protect the switch from
unauthorized access. As a result, when Telnet is enabled for configuring and managing
the switch, username and password for authorized Telnet users must be configured with
the following command: username <username> privilege <privilege> [password (0|7)
<password>]. To open the local authentication style with the following command:
authentication line web login local. Privilege option must exist and just is 15. Assume
an authorized user in the switch has a username of “admin”, and password of “admin”, the
configuration procedure should like the following:
Switch>enable
Switch#config
Switch(config)#username admin privilege 15 password 0 admin
Switch(config)#authentication line web login local
The Web login interface of CS6200-28X-P-EI is as below:
1-8
Basic Management Configuration Chapter 1 Switch Management
Software
1-9
Basic Management Configuration Chapter 1 Switch Management
The switch provides thress management interface for users: CLI (Command Line
Interface) interface, Web interface, Snmp netword management software. We will
introduce the CLI interface and Web configuration interface in details, Web interface is
familiar with CLI interface function and will not be covered, please refer to “Snmp network
management software user manual”.
CLI interface is familiar to most users. As aforementioned, out-of-band management
and Telnet login are all performed through CLI interface to manage the switch.
CLI Interface is supported by Shell program, which consists of a set of configuration
commands. Those commands are categorized according to their functions in switch
configuration and management. Each category represents a different configuration mode.
The Shell for the switch is described below:
Configuration Modes
Configuration Syntax
Shortcut keys
Help function
Input verification
Fuzzy match support
1-10
Basic Management Configuration Chapter 1 Switch Management
On entering the CLI interface, entering user entry system first. If as common user, it is
defaulted to User Mode. The prompt shown is “Switch>“, the symbol “>“ is the prompt for
User Mode. When exit command is run under Admin Mode, it will also return to the User
Mode.
Under User Mode, no configuration to the switch is allowed, only clock time and
version information of the switch can be queries.
To Admin Mode sees the following: In user entry system, if as Admin user, it is
defaulted to Admin Mode. Admin Mode prompt “Switch#” can be entered under the User
Mode by running the enable command and entering corresponding access levels admin
user password, if a password has been set. Or, when exit command is run under Global
Mode, it will also return to the Admin Mode. Switch also provides a shortcut key sequence
"Ctrl+z”, this allows an easy way to exit to Admin Mode from any configuration mode
(except User Mode).
Under Admin Mode, the user can query the switch configuration information,
connection status and traffic statistics of all ports; and the user can further enter the Global
Mode from Admin Mode to modify all configurations of the switch. For this reason, a
1-11
Basic Management Configuration Chapter 1 Switch Management
password must be set for entering Admin mode to prevent unauthorized access and
malicious modification to the switch.
Type the config command under Admin Mode will enter the Global Mode prompt
“Switch(config)#”. Use the exit command under other configuration modes such as Port
Mode, VLAN mode will return to Global Mode.
The user can perform global configuration settings under Global Mode, such as MAC
Table, Port Mirroring, VLAN creation, IGMP Snooping start and STP, etc. And the user can
go further to Port Mode for configuration of all the interfaces.
Interface Mode
Use the interface command under Global Mode can enter the interface mode
specified. Switch provides three interface type: 1. VLAN interface; 2. Ethernet port; 3.
port-channel, accordingly the three interface configuration modes.
Interface Entry Operates Exit
Type
VLAN Type interface vlan Configure switch Use the exit
Interface <Vlan-id> command under IPs, etc command to
Global Mode. return to Global
Mode.
Ethernet Port Type interface ethernet Configure Use the exit
<interface-list> command supported duplex command to
under Global Mode. mode, speed, etc. return to Global
of Ethernet Port. Mode.
port-channel Type interface port-channel Configure Use the exit
<port-channel-number> port-channel command to
command under Global Mode. related settings return to Global
such as duplex Mode.
mode, speed, etc.
VLAN Mode
Using the vlan <vlan-id> command under Global Mode can enter the corresponding
VLAN Mode. Under VLAN Mode the user can configure all member ports of the
corresponding VLAN. Run the exit command to exit the VLAN Mode to Global Mode.
1-12
Basic Management Configuration Chapter 1 Switch Management
Route Mode
Routing Protocol Entry Operates Exit
RIP Routing Type router rip Configure RIP Use the exit
Protocol command under protocol parameters. command to return
Global Mode. to Global Mode.
OSPF Routing Type router ospf Configure OSPF Use the exit
Protocol command under protocol parameters. command to return
Global Mode. to Global Mode.
BGP Routing Type router bgp Configure BGP Use the exit
Protocol <AS mumber> protocol parameters. command to return
command under to Global Mode.
Global Mode.
ACL Mode
ACL type Entry Operates Exit
Standard IP Type ip access-list Configure parameters Use the exit
ACL Mode standard command for Standard IP ACL command to return
under Global Mode. Mode. to Global Mode.
Extended IP Type ip access-list Configure parameters Use the exit
ACL Mode extanded command for Extended IP ACL command to return
under Global Mode. Mode. to Global Mode.
1-13
Basic Management Configuration Chapter 1 Switch Management
1-14
Basic Management Configuration Chapter 1 Switch Management
All commands entered through keyboards undergo syntax check by the Shell.
Nothing will be returned if the user entered a correct command under corresponding
modes and the execution is successful.
Returned Information: error
Output error message Explanation
Unrecognized command or illegal The entered command does not exist, or there is
parameter! error in parameter scope, type or format.
Ambiguous command At least two interpretations is possible basing on
the current input.
Invalid command or parameter The command is recognized, but no valid
parameter record is found.
This command is not exist in current The command is recognized, but this command
mode can not be used under current mode.
Please configure precursor The command is recognized, but the
command "*" at first! prerequisite command has not been configured.
syntax error : missing '"' before the Quotation marks are not used in pairs.
1-15
Basic Management Configuration Chapter 1 Switch Management
Switch shell support fuzzy match in searching command and keyword. Sh ell will
recognize commands or keywords correctly if the entered string causes no conflict.
For example:
1) For command “show interfaces status ethernet1/0/1”, typing “sh in status
ethernet1/0/1” will work.
2) However, for command “show running-config”, the system will report a “> Ambiguous
command!” error if only “show r” is entered, as Shell is unable to tell whether it is
“show run” or “show running-config”. Therefore, Shell will only recognize the
command if “sh ru” is entered.
1-16
Basic Management Configuration Chapter 2 Basic Switch Configuration
Basic switch configuration includes commands for entering and exiting the admin
mode, commands for entering and exiting interface mode, for configuring and displaying
the switch clock, for displaying the version information of the switch system, etc.
Command Explanation
Normal User Mode/ Admin Mode
The User uses enable command to step into
enable [<1-15>] admin mode from normal user mode or modify
disable the privilege level of the users. The disable
command is for exiting admin mode.
Admin Mode
config [terminal] Enter global mode from admin mode.
Various Modes
Exit current mode and enter previous mode,
such as using this command in global mode to
exit
go back to admin mode, and back to normal
user mode from admin mode.
show privilege Show privilege of the current users.
Except User Mode/ Admin Mode
Quit current mode and return to Admin mode
end
when not at User Mode/ Admin Mode.
Admin Mode
clock set <HH:MM:SS>
Set system date and time.
[YYYY.MM.DD]
show version Display version information of the switch.
set default Restore to the factory default.
Save current configuration parameters to
write
Flash Memory.
reload Hot reset the switch.
show cpu usage Show CPU usage rate.
show cpu utilization Show current CPU utilization rate.
show memory usage Show memory usage rate.
2-1
Basic Management Configuration Chapter 2 Basic Switch Configuration
Global Mode
Configure the information displayed when the
banner motd <LINE>
login authentication of a telnet or console user
no banner motd
is successful.
web-auth privilege <1-15> Configure the level of logging in the switch by
no web-auth privilege web.
2.2.1 Telnet
Telnet is a simple remote terminal protocol for remote login. Using Telnet, the user
can login to a remote host with its IP address of hostname fr om his own workstation.
Telnet can send the user’s keystrokes to the remote host and send the remote host output
to the user’s screen through TCP connection. This is a transparent service, as to the user,
the keyboard and monitor seems to be connected to the remote host directly.
Telnet employs the Client-Server mode, the local system is the Telnet client and the
remote host is the Telnet server. Switch can be either the Telnet Server or the Telnet client.
When switch is used as the Telnet server, the user can use the Telnet client program
included in Windows or the other operation systems to login to switch, as described earlier
in the In-band management section. As a Telnet server, switch allows up to 5 telnet client
TCP connections.
And as Telnet client, using telnet command under Admin Mode allows the user to
login to the other remote hosts. Switch can only establish TCP connection to one remote
host. If a connection to another remote host is desired, the current TCP connection must
be dropped.
2-2
Basic Management Configuration Chapter 2 Basic Switch Configuration
2-3
Basic Management Configuration Chapter 2 Basic Switch Configuration
web} exec
Configure command authorization
authorization line vty command <1-15> manner and authorization selection
{local | radius | tacacs} (none|) priority of login user with VTY (login
no authorization line vty command with Telnet and SSH). The no
<1-15> command recovers to be default
manner.
accounting line {console | vty}
command <1-15> {start-stop | stop-only |
none} method1 [method2…] Configure the accounting method list.
no accounting line {console | vty}
command <1-15>
Admin Mode
Display debug information for Telnet
terminal monitor client login to the switch; the no
terminal no monitor command disables the debug
information.
Show the user information who logs in
show users through telnet or ssh. It includes line
number, user name and user IP.
Delete the logged user information on
the appointed line, force user to get
clear line vty <0-31>
down the line who logs in through
telnet or ssh.
Command Explanation
Admin Mode
telnet [vrf <vrf-name>] {<ip-addr> | Login to a remote host with the Telnet
<ipv6-addr> | host <hostname>} [<port>] client included in the switch.
2.2.2 SSH
SSH (Secure Shell) is a protocol which ensures a secure remote access connection
to network devices. It is based on the reliable TCP/IP protocol. By conducting the
2-4
Basic Management Configuration Chapter 2 Basic Switch Configuration
mechanism such as key distribution, authentication and encryption between SSH server
and SSH client, a secure connection is established. The information transferred on this
connection is protected from being intercepted and decrypted. The switch meets the
requirements of SSH2.0. It supports SSH2.0 client software such as SSH Secure Client
and putty. Users can run the above software to manage the switch remotely.
The switch presently supports RSA authentication, 3DES cryptography protocol and
SSH user password authentication etc.
Command Explanation
Global Mode
ssh-server enable Enable SSH function on the switch; the
no ssh-server enable no command disables SSH function.
username <username> [privilege Configure the username and password of
<privilege>] [password [0 | 7] SSH client software for logging on the
<password>] switch; the no command deletes the
no username <username> username.
Configure timeout value for SSH
ssh-server timeout <timeout> authentication; the no command restores
no ssh-server timeout the default timeout value for SSH
authentication.
Configure the number of times for retrying
ssh-server authentication-retires
SSH authentication; the no command
<authentication-retires>
restores the default number of times for
no ssh-server authentication-retries
retrying SSH authentication.
ssh-server host-key create rsa Generate the new RSA host key on the
modulus <moduls> SSH server.
Admin Mode
Display SSH debug information on the
terminal monitor SSH client side; the no command stops
terminal no monitor displaying SSH debug information on the
SSH client side.
show crypto key Show the secret key of ssh.
crypto key clear rsa Clear the secret key of ssh.
Example1:
2-5
Basic Management Configuration Chapter 2 Basic Switch Configuration
Requirement: Enable SSH server on the switch, and run SSH2.0 client software such
as Secure shell client or putty on the terminal. Log on the switch by using the username
and password from the client.
Configure the IP address, add SSH user and enable SSH service on the switch.
SSH2.0 client can log on the switch by using the username and password to configure the
switch.
Switch(config)#ssh-server enable
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 100.100.100.200 255.255.255.0
Switch(Config-if-Vlan1)#exit
Switch(config)#username test privilege 15 password 0 test
In IPv6 networks, the terminal should run SSH client software which support IPv6,
such as putty6. Users should not modify the configuration of the switch except allocating
an IPv6 address for the local host.
All Ethernet ports of switch are default to Data Link layer ports and perform layer 2
forwarding. VLAN interface represent a Layer 3 interface function which can be assigned
an IP address, which is also the IP address of the switch. All VLAN interface related
configuration commands can be configured under VLAN Mode. Switch provides three IP
address configuration methods:
Manual
BOOTP
DHCP
Manual configuration of IP address is assign an IP address manually for the switch.
In BOOTP/DHCP mode, the switch operates as a BOOTP/DHCP client, send
broadcast packets of BOOTPRequest to the BOOTP/DHCP servers, and the
BOOTP/DHCP servers assign the address on receiving the request. In addition, switch
can act as a DHCP server, and dynamically assign network parameters such as IP
addresses, gateway addresses and DNS server addresses to DHCP clients DHCP Server
configuration is detailed in later chapters.
2-6
Basic Management Configuration Chapter 2 Basic Switch Configuration
4. DHCP configuration
2. Manual configuration
Command Explanation
VLAN Interface Mode
ip address <ip_address> <mask> Configure IP address of VLAN interface;
[secondary] the no command deletes IP address of
no ip address <ip_address> <mask> VLAN interface.
[secondary]
ipv6 address <ipv6-address / Configure IPv6 address, including
prefix-length> [eui-64] aggregation global unicast address, local
no ipv6 address <ipv6-address / site address and local link address. The no
prefix-length> command deletes IPv6 address.
3. BOOTP configuration
Command Explanation
VLAN Interface Mode
Enable the switch to be a BootP client and
obtain IP address and gateway address
ip bootp-client enable
through BootP negotiation; the no
no ip bootp-client enable
command disables the BootP client
function.
4. DHCP configuration
Command Explanation
VLAN Interface Mode
Enable the switch to be a DHCP client and
ip bootp-client enable obtain IP address and gateway address
no ip bootp-client enable through DHCP negotiation; the no
command disables the DHCP client
2-7
Basic Management Configuration Chapter 2 Basic Switch Configuration
function.
2-8
Basic Management Configuration Chapter 2 Basic Switch Configuration
triggered, Agents will send Trap messages or log the event according to the settings.
Inform-Request is mainly used for inter-NMS communication in the layered network
management.
USM ensures the transfer security by well-designed encryption and authentication.
USM encrypts the messages according to the user typed password. This mechanism
ensures that the messages can’t be viewed on transmission. And USM authentication
ensures that the messages can’t be changed on transmission. USM employs DES-CBC
cryptography. And HMAC-MD5 and HMAC-SHA are used for authentication.
VACM is used to classify the users’ access permission. It puts the users with the
same access permission in the same group. Users can’t conduct the operation which is
not authorized.
In this figure, the OID of the object A is 1.2.1.1. NMS can locate this object through
this unique OID and gets the standard variables of the object. MIB defines a set of
2-9
Basic Management Configuration Chapter 2 Basic Switch Configuration
2-10
Basic Management Configuration Chapter 2 Basic Switch Configuration
2-11
Basic Management Configuration Chapter 2 Basic Switch Configuration
4. Configure engine ID
Command Explanation
Global Mode
snmp-server engineid <engine-string> Configure the local engine ID on the switch.
no snmp-server engineid This command is used for SNMP v3.
5. Configure user
Command Explanation
Global Mode
snmp-server user <use-string>
<group-string> [{authPriv | authNoPriv}
auth {md5 | sha} <word>] [access
{<num-std>|<name>}] [ipv6-access Add a user to a SNMP group. This
{<ipv6-num-std>|<ipv6-name>}] command is used to configure USM for
no snmp-server user <user-string> SNMP v3.
[access {<num-std>|<name>}]
[ipv6-access
{<ipv6-num-std>|<ipv6-name>}]
6. Configure group
Command Explanation
Global Mode
snmp-server group <group-string>
{noauthnopriv|authnopriv|authpriv}
[[read <read-string>] [write
<write-string>] [notify <notify-string>]]
[access {<num-std>|<name>}]
Set the group information on the switch.
[ipv6-access
This command is used to configure VACM
{<ipv6-num-std>|<ipv6-name>}]
for SNMP v3.
no snmp-server group <group-string>
{noauthnopriv|authnopriv|authpriv}
[access {<num-std>|<name>}]
[ipv6-access
{<ipv6-num-std>|<ipv6-name>}]
7. Configure view
2-12
Basic Management Configuration Chapter 2 Basic Switch Configuration
Command Explanation
Global Mode
snmp-server view <view-string>
<oid-string> {include|exclude} Configure view on the switch. This
no snmp-server view <view-string> command is used for SNMP v3.
[<oid-string>]
8. Configuring TRAP
Command Explanation
Global Mode
snmp-server enable traps Enable the switch to send Trap message.
no snmp-server enable traps This command is used for SNMP v1/v2/v3.
snmp-server host { <host-ipv4-address>
Set the host IPv4/IPv6 address which is
| <host-ipv6-address> } {v1 | v2c | {v3
used to receive SNMP Trap information.
{noauthnopriv | authnopriv | authpriv}}}
For SNMP v1/v2, this command also
<user-string>
configures Trap community string; for
no snmp-server host
SNMP v3, this command also configures
{ <host-ipv4-address> |
Trap user name and security level. The
<host-ipv6-address> } {v1 | v2c | {v3
“no” form of this command cancels this
{noauthnopriv | authnopriv | authpriv}}}
IPv4 or IPv6 address.
<user-string>
snmp-server trap-source
{<ipv4-address> | <ipv6-address>} Set the source IPv4 or IPv6 address which
is used to send trap packet, the no
no snmp-server trap-source
command deletes the configuration.
{<ipv4-address> | <ipv6-address>}
Port mode
[no] switchport updown notification Enable/disable the function of sending the
enable
trap message to the port of UP/DOWN
event.
9. Enable/Disable RMON
Command Explanation
Global mode
rmon enable
Enable/disable RMON.
no rmon enable
2-13
Basic Management Configuration Chapter 2 Basic Switch Configuration
The IP address of the NMS is 1.1.1.5; the IP address of the switch (Agent) is 1.1.1.9.
Scenario 1: The NMS network administrative software uses SNMP protocol to obtain data
from the switch.
The configuration on the switch is listed below:
Switch(config)#snmp-server enable
Switch(config)#snmp-server community rw private
Switch(config)#snmp-server community ro public
Switch(config)#snmp-server securityip 1.1.1.5
The NMS can use private as the community string to access the switch with read-write
permission, or use public as the community string to access the switch with read-only
permission.
Scenario 2: NMS will receive Trap messages from the switch ( Note: NMS may have
community string verification for the Trap messages. In this scenario, the NMS uses a
Trap verification community string of usertrap).
The configuration on the switch is listed below:
Switch(config)#snmp-server enable
Switch(config)#snmp-server host 1.1.1.5 v1 usertrap
Switch(config)#snmp-server enable traps
Scenario 4: NMS wants to receive the v3Trap messages sent by the switch.
The configuration on the switch is listed below:
Switch(config)#snmp-server enable
Switch(config)#snmp-server host 10.1.1.2 v3 authpriv tester
Switch(config)#snmp-server enable traps
Scenario 5: The IPv6 address of the NMS is 2004:1:2:3::2; the IPv6 address of the switch
(Agent) is 2004:1:2:3::1. The NMS network administrative software uses SNMP protocol
to obtain data from the switch.
The configuration on the switch is listed below:
Switch(config)#snmp-server enable
2-14
Basic Management Configuration Chapter 2 Basic Switch Configuration
The NMS can use private as the community string to access the switch with read-write
permission, or use public as the community string to access the switch with read-only
permission.
Scenario 6: NMS will receive Trap messages from the switch (Note: NMS may have
community string verification for the Trap messages. In this scenario, the NMS uses a
Trap verification community string of usertrap).
The configuration on the switch is listed below:
Switch(config)#snmp-server host 2004:1:2:3::2 v1 usertrap
Switch(config)#snmp-server enable traps
2-15
Basic Management Configuration Chapter 2 Basic Switch Configuration
Switch provides two ways for switch upgrade: BootROM upgrade and the TFTP/FTP
upgrade under Shell.
The system files includes system image file and boot file. The updating of the switch
is to update the two files by overwrite the old files with the new ones.
The system image files refers to the compressed files of the switch hardware drivers,
and software support program, etc, namely what we usually call the IMG update file. The
IMG file can only be saved in the FLASH with a defined name of nos.img
The boot file is for initiating the switch, namely what we usually call the ROM update
file (It can be compressed into IMG file if it is of large size). In switch, the boot file is
allowed to save in ROM only. Switch mandates the name of the boot file to be boot.rom.
The update method of the system image file and the boot file is the same. The switch
supplies the user with two modes of updating: 1. BootROM mode; 2. TFTP and FTP
update at Shell mode. This two update method will be explained in details in following two
sections.
There is one method for BootROM upgrade: TFTP which can be configured at
BootROM command.
cable
Console cable
connection
connection
2-16
Basic Management Configuration Chapter 2 Basic Switch Configuration
to connect PC to the management port on the switch. The PC should have TFTP server
software installed and has the boot file required for the upgrade.
Step 2:
Press “ctrl+b” on switch boot up until the switch enters BootROM monitor mode. The
operation result is shown below:
[Boot]:
Step 3:
Under BootROM mode, run “setconfig” to set the IP address and mask of the switch under
BootROM mode, server IP address and mask. Suppose the switch address is 192.168.1.2,
and PC address is 192.168.1.66, and select TFTP upgrade, the configuration should like:
[Boot]: setconfig
Host IP Address: [10.1.1.1] 192.168.1.2
Server IP Address: [10.1.1.2] 192.168.1.66
[Boot]:
Step 4:
Enable TFTP server in the PC. run TFTP server program. Before start downloading
upgrade file to the switch, verify the connectivity between the server and the switch by
ping from the switch. If ping succeeds, run “load” command in the BootROM mode from
the switch; if it fails, perform troubleshooting to find out the cause.
The following update file boot.rom.
[Boot]: load boot.rom
TFTP from server 192.168.1.66; our IP address is 192.168.1.2
Filename 'boot.rom'.
Load address: 0x300000
Loading:
#################################################################
################################
done
Bytes transferred = 496240 (79270 hex)
[Boot]:
Step 5:
Execute write boot.rom in BootROM mode. The following saves the update file.
[Boot]: write boot.rom
2-17
Basic Management Configuration Chapter 2 Basic Switch Configuration
Writing flash:/boot.rom......
Write flash:/boot.rom OK.
[Boot]:
Step 6:
After successful upgrade, execute run or reboot command in BootROM mode to return
to CLI configuration interface.
[Boot]: run(or reboot)
1 file(s), 0 dir(s)
FTP(File Transfer Protocol)/TFTP(Trivial File Transfer Protocol) are both file transfer
protocols that belonging to fourth layer(application layer) of the TCP/IP protocol stack,
used for transferring files between hosts, hosts and switches. Both of them transfer files in
a client-server model. Their differences are listed below.
FTP builds upon TCP to provide reliable connection-oriented data stream transfer
service. However, it does not provide file access authorization and uses simple
authentication mechanism (transfers username and password in plain text for
authentication). When using FTP to transfer files, two connections need to be established
between the client and the server: a management connection and a data connection. A
transfer request should be sent by the FTP client to establish management connection on
port 21 in the server, and negotiate a data connection through the management
2-18
Basic Management Configuration Chapter 2 Basic Switch Configuration
connection.
There are two types of data connections: active connection and passive connection.
In active connection, the client transmits its address and port number for data
transmission to the server, the management connection maintains until data transfer is
complete. Then, using the address and port number provided by the client, the server
establishes data connection on port 20 (if not engaged) to transfer data; if port 20 is
engaged, the server automatically generates some other port number to establish data
connection.
In passive connection, the client, through management connection, notify the server
to establish a passive connection. The server then creates its own data listening port and
informs the client about the port, and the client establishes data connection to the
specified port.
As data connection is established through the specified address and port, there is a
third party to provide data connection service.
TFTP builds upon UDP, providing unreliable data stream transfer service with no user
authentication or permission-based file access authorization. It ensures correct data
transmission by sending and acknowledging mechanism and retransmission of time-out
packets. The advantage of TFTP over FTP is that it is a simple and low overhead file
transfer service.
Switch can operate as either FTP/TFTP client or server. When switch operates as a
FTP/TFTP client, configuration files or system files can be downloaded from the remote
FTP/TFTP servers (can be hosts or other switches) without affecting its normal operation.
And file list can also be retrieved from the server in ftp client mode. Of course, switch can
also upload current configuration files or system files to the remote FTP/TFTP servers
(can be hosts or other switches). When switch operates as a FTP/TFTP server, it can
provide file upload and download service for authorized FTP/TFTP clients, as file list
service as FTP server.
Here are some terms frequently used in FTP/TFTP.
ROM: Short for EPROM, erasable read-only memory. EPROM is repalced by FLASH
memory in switch.
SDRAM: RAM memory in the switch, used for system software operation and
configuration sequence storage.
FLASH: Flash memory used to save system file and configuration file.
System file: including system image file and boot file.
System image file: refers to the compressed file for switch hardware driver and software
support program, usually refer to as IMAGE upgrade file. In switch, the system image file
is allowed to save in FLASH only. Switch mandates the name of system image file to be
uploaded via FTP in Global Mode to be nos.img, other IMAGE system files will be
2-19
Basic Management Configuration Chapter 2 Basic Switch Configuration
rejected.
Boot file: refers to the file initializes the switch, also referred to as the ROM upgrade file
(Large size file can be compressed as IMAGE file). In switch, the boot file is allowed to
save in ROM only. Switch mandates the name of the boot file to be boot.rom.
Configuration file: including start up configuration file and running configuration file. The
distinction between start up configuration file and running configuration file can facilitate
the backup and update of the configurations.
Start up configuration file: refers to the configuration sequence used in switch startup.
Startup configuration file stores in nonvolatile storage, corresponding to the so-called
configuration save. If the device does not support CF, the configuration file stores in
FLASH only, if the device supports CF, the configuration file stores in FLASH or CF, if the
device supports multi-config file, names the configuration file to be .cfg file, the default is
startup.cfg. If the device does not support multi-config file, mandates the name of startup
configuration file to be startup-config.
Running configuration file: refers to the running configuration sequence use in the
switch. In switch, the running configuration file stores in the RAM. In the current version,
the running configuration sequence running-config can be saved from the RAM to FLASH
by write command or copy running-config startup-config command, so that the
running configuration sequence becomes the start up configuration file, which is called
configuration save. To prevent illicit file upload and easier con figuration, switch mandates
the name of running configuration file to be running-config.
Factory configuration file: The configuration file shipped with switch in the name of
factory-config. Run set default and write, and restart the switch, factory configuration file
will be loaded to overwrite current start up configuration file.
The configurations of switch as FTP and TFTP clients are almost the same, so the
configuration procedures for FTP and TFTP are described together in this manual.
2-20
Basic Management Configuration Chapter 2 Basic Switch Configuration
2-21
Basic Management Configuration Chapter 2 Basic Switch Configuration
The configuration is same for IPv4 address or IPv6 address. The example only for
IPv4 address.
10.1.1.2
10.1.1.1
Scenario 1: The switch is used as FTP/TFTP client. The switch connects from one of its
2-22
Basic Management Configuration Chapter 2 Basic Switch Configuration
ports to a computer, which is a FTP/TFTP server with an IP address of 10.1.1.1; the switch
acts as a FTP/TFTP client, the IP address of the switch management VLAN is 10.1.1.2.
Download “nos.img” file in the computer to the switch.
FTP Configuration
Computer side configuration:
Start the FTP server software on the computer and set the username “Switch”, and the
password “superuser”. Place the “12_30_nos.img” file to the appropriate FTP server
directory on the computer.
The configuration procedures of the switch are listed below:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-Vlan1)#no shut
Switch(Config-if-Vlan1)#exit
Switch(config)#exit
Switch#copy ftp: //Switch:[email protected]/12_30_nos.img nos.img
With the above commands, the switch will have the “nos.img” file in the computer
downloaded to the FLASH.
TFTP Configuration
Computer side configuration:
Start TFTP server software on the computer and place the “12_30_nos.img” file to the
appropriate TFTP server directory on the computer.
The configuration procedures of the switch are listed below:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-Vlan1)#no shut
Switch(Config-if-Vlan1)#exit
Switch(config)#exit
Switch#copy tftp: //10.1.1.1/12_30_nos.img nos.img
Scenario 2: The switch is used as FTP server. The switch operates as the FTP server
and connects from one of its ports to a computer, which is a FTP client. Transfer the
“nos.img” file in the switch to the computer and save as 12_25_nos.img.
The configuration procedures of the switch are listed below:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-Vlan1)#no shut
2-23
Basic Management Configuration Chapter 2 Basic Switch Configuration
Switch(Config-if-Vlan1)#exit
Switch(config)#ftp-server enable
Switch(config)# username Admin password 0 superuser
Scenario 3: The switch is used as TFTP server. The switch operates as the TFTP server
and connects from one of its ports to a computer, which is a TFTP client. Transfer the
“nos.img” file in the switch to the computer.
The configuration procedures of the switch are listed below:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-Vlan1)#no shut
Switch(Config-if-Vlan1)#exit
Switch(config)#tftp-server enable
Computer side configuration:
Login to the switch with any TFTP client software, use the “tftp” command to download
“nos.img” file from the switch to the computer.
Scenario 4: Switch acts as FTP client to view file list on the FTP server. Synchronization
conditions: The switch connects to a computer by an Ethernet port, the computer is a FTP
server with an IP address of 10.1.1.1; the switch acts as a FTP client, and the IP address
of the switch management VLAN1 interface is 10.1.1.2.
FTP Configuration:
PC side:
Start the FTP server software on the PC and set the username “ Switch”, and the password
“superuser”.
Switch:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-Vlan1)#no shut
Switch(Config-if-Vlan1)#exit
Switch#copy ftp: //Switch: [email protected]
220 Serv-U FTP-Server v2.5 build 6 for WinSock ready...
2-24
Basic Management Configuration Chapter 2 Basic Switch Configuration
When upload/download system file with FTP protocol, the connectivity of the link
must be ensured, i.e., use the “Ping” command to verify the connectivity between the FTP
client and server before running the FTP program. If ping fails, you will need to check for
appropriate troubleshooting information to recover the link connectivity.
The following is what the message displays when files are successfully transferred.
Otherwise, please verify link connectivity and retry “copy” command again.
220 Serv-U FTP-Server v2.5 build 6 for WinSock ready...
331 User name okay, need password.
230 User logged in, proceed.
200 PORT Command successful.
nos.img file length = 1526021
read file ok
send file
150 Opening ASCII mode data connection for nos.img.
226 Transfer complete.
close ftp client.
The following is the message displays when files are successfully received.
Otherwise, please verify link connectivity and retry “copy” command again.
220 Serv-U FTP-Server v2.5 build 6 for WinSock ready...
2-25
Basic Management Configuration Chapter 2 Basic Switch Configuration
When upload/download system file with TFTP protocol, the connectivity of the link
must be ensured, i.e., use the “Ping” command to verify the connectivity between the
TFTP client and server before running the TFTP program. If ping fails, you will need to
check for appropriate troubleshooting information to recover the link connectivity.
The following is the message displays when files are successfully transferred.
Otherwise, please verify link connectivity and retry “copy” command again.
nos.img file length = 1526021
read file ok
begin to send file, wait...
file transfers complete.
Close tftp client.
The following is the message displays when files are successfully received.
Otherwise, please verify link connectivity and retry “copy” command again.
begin to receive file, wait...
recv 1526037
************************
write ok
transfer complete
close tftp client.
If the switch is upgrading system file or system start up file through TFTP, the switch
must not be restarted until “close tftp client” is displayed, indicating upgrade is successful,
otherwise the switch may be rendered unable to start. If the system file and system start
up file upgrade through TFTP fails, please try upgrade again or use the BootROM mode to
2-26
Basic Management Configuration Chapter 2 Basic Switch Configuration
upgrade.
2-27
Basic Management Configuration Chapter 3 File System Operations
File storage devices used in switches mainly include FLASH cards. As the most
common storage device, FLASH is usually used to store system image files (IMG files),
system boot files (ROM files) and system configuration files (CFG files).
Flash can copy, delete, or rename files under Shell or Bootrom mode.
3-1
Basic Management Configuration Chapter 3 File System Operations
3-2
Basic Management Configuration Chapter 3 File System Operations
3.4 Troubleshooting
If errors occur when users try to implement file system operations, please check
whether they are caused by the following reasons
Whether file names or paths are entered correctly.
When renaming a file, whether it is in use or the new file name is already used by an
existing file or directory.
3-3
Basic Management Configuration Chapter 4 Cluster Configuration
4-1
Basic Management Configuration Chapter 4 Cluster Configuration
Command Explanation
Global Mode
cluster run [key <WORD>] [vid <VID>] Enable or disable cluster function
no cluster run in the switch.
2. Create a cluster
Command Explanation
Global Mode
cluster ip-pool <commander-ip> Configure the private IP address
no cluster ip-pool pool for cluster member devices.
cluster commander [<cluster_name>]
Create or delete a cluster.
no cluster commander
4-2
Basic Management Configuration Chapter 4 Cluster Configuration
Command Explanation
Global Mode
Enable or disable adding newly
cluster auto-add
discovered candidate switch to the
no cluster auto-add
cluster.
Change automatically added
cluster member auto-to-user members into manually added
ones.
cluster keepalive interval <second> Set the keep-alive interval of the
no cluster keepalive interval cluster.
Set the max number of lost
cluster keepalive loss-count <int>
keep-alive messages that can be
no cluster keepalive loss-count
tolerated in the cluster.
Admin mode
clear cluster nodes [nodes-sn
Clear nodes in the list of candidate
<candidate-sn-list> | mac-address
switches maintained by the switch.
<mac-addr>]
Command Explanation
Global Mode
cluster keepalive interval <second> Set the keep-alive interval of the
no cluster keepalive interval cluster.
Set the max number of lost
cluster keepalive loss-count <int>
keep-alive messages that can be
no cluster keepalive loss-count
tolerated in the clusters.
Command Explanation
4-3
Basic Management Configuration Chapter 4 Cluster Configuration
Admin Mode
In the commander switch, this
rcommand member <member-id> command is used to configure and
manage member switches.
In the member switch, this
rcommand commander command is used to configure the
commander switch.
In the commander switch, this
cluster reset member [id <member-id> |
command is used to reset the
mac-address <mac-addr>]
member switch.
In the commander switch, this
cluster update member <member-id> command is used to remotely
<src-url> <dst-filename>[ascii | binary] upgrade the member switch. It can
only upgrade nos.img file.
Command Explanation
Global Mode
Enable http function in commander
switch and member switch.
Notice: must insure the http
function be enabled in member
ip http server switch when commander switch
visiting member switch by web.
The commander switch visit
member switch via beat member
node in member cluster topology.
7. Manage cluster network with snmp
Command Explanation
Global Mode
4-4
Basic Management Configuration Chapter 4 Cluster Configuration
Scenario:
The four switches SW1-SW4, amongst the SW1 is the command switch and other
switches are member switch. The SW2 and SW4 is directly connected with the command
switch, SW3 connects to the command switch through SW2.
E1 E2 E1 E2 E1 E1
4-5
Basic Management Configuration Chapter 4 Cluster Configuration
When encountering problems in applying the cluster admin, please check the
following possible causes:
If the command switch is correctly configured and the auto adding function (cluster
auto-add) is enabled. If the ports connected the command switch and member switch
belongs to the cluster vlan.
After cluster commander is enabled in VLAN1 of the command switch, please don ’t
enable a routing protocol (RIP, OSPF, BGP) in this VLAN in order to prevent the
routing protocol from broadcasting the private cluster addresses in this VLAN to other
switches and cause routing loops.
Whether the connection between the command switch and the member switch is
correct. We can use the debug cluster packets to check if the command and the
member switches can receive and process related cluster admin packets correctly.
4-6