Dell??? PowerConnect???
28xx Systems
User Guide
w w w . d e l l . c o m | s u p p o r t . d e l l . c o m
Notes, Notices, and Cautions
NOTE: A NOTE indicates important information that helps you make better use of your computer.
NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
CAUTION: A CAUTION indicates a potential for property damage, personal injury, or death.
____________________
Information in this document is subject to change without notice. ?? 2008 Dell Inc. All rights reserved.
Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell, Dell OpenManage, the DELL logo, Inspiron, Dell Precision, Dimension, OptiPlex, PowerConnect,
PowerApp, PowerVault, Axim, DellNet, and Latitude are trademarks of Dell Inc. Microsoft and Windows are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
Contents
Contents 3
Contents 5
Contents 7
8 Contents
1
Introduction
This User???s Guide contains the information needed for installing, configuring and maintaining the PowerConnect 2808, PowerConnect 2816, PowerConnect 2824, and PowerConnect 2848 Web- managed Gigabit Ethernet switches.
The PowerConnect 28xx switches can be used to connect workstations and other network devices, such as:
???Servers
???Hubs
???Routers
The PowerConnect devices are primarily designated for the Small Office/Home Office (SOHO) that require high performance edge connectivity. These PowerConnect devices are ideal for the small to medium business that requires high performance network connectivity along with advanced web management features. The PowerConnect management features are designed to minimize administrative management effort, while enhancing and improving network traffic control.
System Description
This section describes the hardware configurations of the PowerConnect 28xx. The switches are managed by Dell???s OpenManage Switch Administrator.
PowerConnect 2808
The following figure illustrates the PowerConnect 2808 front panel.
Figure
The PowerConnect 2808 supports the following ports:
???8 Gigabit Ethernet copper ports
PowerConnect 2816
The following figure illustrates the PowerConnect 2816 front panel.
Figure
The PowerConnect 2816 supports the following ports:
???16 Gigabit Ethernet copper ports
PowerConnect 2824
The following figure illustrates the PowerConnect 2824 front panel.
Figure
The PowerConnect 2824 supports the following ports:
???24 Gigabit Ethernet copper ports
???2 SFP combo ports
PowerConnect 2848
The following figure illustrates the PowerConnect 2848 front panel.
Figure
The PowerConnect 2848 supports the following ports:
???48 Gigabit Ethernet copper ports
???4 SFP combo ports
10 Dell PowerConnect 28xx Systems User Guide
Summary of PowerConnect Models
The following table summarizes the PowerConnect models.
Table
Features
General Features
Management Modes
The device supports the following modes:
???Managed Mode ??? Provides switch management through the web interface.
???Unmanaged Mode ??? In this mode, the device operates as a hub with default configuration, and configuration cannot be changed.
???Secure Mode ??? This mode keeps the existing configuration active, but it prevents users from making configuration changes by removing the IP address of the device so that it becomes inaccessible for configuration.
For more information about the management modes, see "Management Modes" on page 49.
Head of Line Blocking Prevention
Head of Line (HOL) blocking results in traffic delays and frame loss caused by traffic competing for the same egress port resources. HOL blocking queues packets, and the packets at the head of the queue are forwarded before packets at the end of the queue. By default, the device is configured so that the HOL blocking prevention mechanism is active at all times, except when QoS (Quality of Service), Flow Control or Back Pressure is active on a port where the HOL blocking prevention mechanism is disabled on the whole system.
Back Pressure Support
On
Auto Negotiation
Auto negotiation allows an Ethernet switch to advertise modes of operation. The auto negotiation function provides the means to exchange information between two Ethernet switches that share a point-
Jumbo Frames Support
Jumbo frames are frames with an MTU (Maximum Transmission Unit) size of up to 10K bytes. The Jumbo Frames Support feature, utilizes the network optimally by transporting the same data using less frames.
The main benefits of this facility are reduced transmission overhead and reduced host processing overhead. Jumbo frames are used for
AutoMDI/MDIX Support
The switch automatically detects whether the cable connected to an
Standard wiring for end stations is
Auto MDI/MDIX works on
Flow Control Support (IEEE802.3X)
On Full Duplex links (FDX), the flow control mechanism allows the receiving side to signal to the sending side that transmission must be halted temporarily, in order to prevent buffer overflows. Flow control is enabled by default.
Virtual Cable Testing (VCT)
VCT technology provides the mechanism to detect and report potential cabling issues, such as cable opens and cable shorts on copper links.
Cable analysis is available on Copper Cables
???Cable Type and Status
???Cable Length
???
12 Dell PowerConnect 28xx Systems User Guide
MAC Address Supported Features
MAC Address Capacity Support
The PowerConnect 2808, 2816, 2824 switches support a total of 8K MAC addresses, and the PowerConnect 2848 supports a total of 16K MAC addresses.
The switch enables MAC address
Automatic Aging for MAC Addresses
MAC addresses from which no traffic is received for a given period of time are aged out. This prevents the Bridging Table from overflowing.
In Managed or Secure mode, the switch system always performs
802.1D Bridging in Unmanaged Mode
In Unmanaged Mode, the switch performs classic bridging. Frames are forwarded based on their destination MAC address only, regardless of the VLAN tag.
MAC Multicast Support
Multicast service is a limited broadcast service, which allows
Layer 2 Features
Green Ethernet
Green Ethernet, also known as Energy Efficient Ethernet, is an effort to make networking equipment environmentally friendly, specifically by reducing power usage of Ethernet connections. The following methods are supported by the device:
???
???
IGMP Snooping
Internet Group Membership Protocol (IGMP) Snooping examines IGMP frame contents, when they are forwarded by the device from work stations to an upstream Multicast router. From the frame, the device identifies work stations configured for Multicast sessions, and which Multicast routers are sending Multicast frames.
Port Mirroring
The port mirroring mechanism monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from a monitored port to a monitoring port. Users can specify which target port receives copies of all traffic passing through one or more source ports.
Storm Control
Storm Control enables limiting the amount of Multicast, Broadcast and Unknown Unicast frames accepted and forwarded by the switch. When Layer 2 frames are forwarded, Broadcast and Multicast frames are flooded to all ports on the relevant VLAN. All nodes connected to these ports accept and attempt to process these frames, thus placing load on both the network links and the host operating system.
Dynamic VLAN Assignment (DVA)
Dynamic VLAN Assignment allows automatic assignment of users to VLANs during the RADIUS server authentication. When a user is authenticated by the RADIUS server, the user is automatically joined to the VLAN configured on the RADIUS server.
VLAN Supported Features
VLAN Support
VLANs are collections of switching ports that comprise a single broadcast domain. Packets are classified as belonging to a VLAN based on either the VLAN tag or based on a combination of the ingress port and package contents. Packets sharing common attributes can be grouped in the same VLAN.
Port Based Virtual LANs (VLANs)
Link Aggregation
The PowerConnect 28xx switches support up to six aggregated links. Each of the six aggregated links may be defined with up to four member ports to form a single Link Aggregated Group (LAG).
The benefits of this facility are:
???Fault tolerance protection from physical link disruption
14 Dell PowerConnect 28xx Systems User Guide
???Higher bandwidth connections
???Improved bandwidth granularity
???High bandwidth server connectivity
A LAG is composed of ports with the same speed set to
DHCP Server
Dynamic Host Configuration Protocol is a method of managing network parameter assignment from a single DHCP server. The Dynamic Host Configuration Protocol (DHCP) automates the assignment of IP addresses, subnet masks, default gateway, and other IP parameters.
BootP and DHCP Clients
DHCP (Dynamic Host Configuration Protocol) enables additional setup parameters to be received from a network server upon system startup. DHCP service is an
The BootP client is operational if there is a corrupted or invalid software image. The BootP client then continuously attempts to find a BootP server, by sending BootP requests to all ports on the default VLAN, until a BootP server replies. The information replied is then used to provide the switch system with a TFTP server IP address and a download file name. The switch can then configure these values to the TFTP client and try to download a valid runtime image.
Spanning Tree Protocol Features
Spanning Tree Protocol (STP)
802.1d Spanning tree is a standard Layer 2 switch requirement that allows bridges to automatically prevent and resolve L2 forwarding loops. Switches exchange configuration messages using specifically formatted frames and selectively enable and disable forwarding on ports.
Fast Link
STP can take up to
IEEE 802.1w Rapid Spanning Tree
Spanning Tree can take
STP Root Guard
Root guard restricts the interface from functioning as the root port for the switch
Class of Service (CoS) Features
The PowerConnect 28xx system enables users to define various services for traffic classes of service. The underlying mechanism for supporting bandwidth management and control is based on the use of multiple priority queues for classifying traffic. The switches support four queues per port.
A CoS is defined by the user, whereby packets are related to the same Class of Service. After a packet has been classified, it is assigned to one of the queues. The PowerConnect 28xx system can classify according to IPv4 information (DSCP).
Class of Service 802.1p Support
The IEEE 802.1p signaling technique is an OSI Layer 2 standard for marking and prioritizing network traffic at the data link/MAC
Ethernet Switch Management Features
With a
TFTP Trivial File Transfer Protocol
The PowerConnect 28xx switches support software boot image and software download through TFTP.
Remote Monitoring
Remote Monitoring (RMON) is an extension to the Simple Network Management Protocol (SNMP), which provides network traffic statistics. RMON defines current and historical
16 Dell PowerConnect 28xx Systems User Guide
2
Hardware Description
Switch Port Configurations
PowerConnect 28xx Front and Back Panel Port Description
The Dell??? PowerConnect??? 28xx switches use
The Gigabit Ethernet ports can operate at 10, 100 or 1000 Mbps. These ports support auto- negotiation, duplex mode (Half or Full duplex), and flow control. The combo 1000 Mbps optical ports can only operate at 1000 Mbps,
The following figures illustrate the front panels and back panels of the PowerConnect 28xx switches.
Figure
On the front panel there are eight ports which are numbered 1 to 8, top down and left to right. On each port there are LEDs (Light Emitting Diode) to indicate the port status.
On the left side of the front panel is the Managed Mode LED which indicates the Ethernet switch operational status and the management mode. The Power LED on the front panel indicates whether the device is powered on or not. A Mode
Figure
Figure
On the front panel there are 16 ports which are numbered 1 to 16, top down and left to right. On each port there are LEDs to indicate the port status.
On the left side of the front panel is the Managed Mode LED which indicates the Ethernet switch operational status and the management mode. The Power LED on the front panel indicates whether the device is powered on or not. A Mode
Figure
18 Dell PowerConnect 28xx Systems User Guide
Figure
On the front panel there are 24 ports which are numbered 1 to 24, top down and left to right. On each port there are LEDs to indicate the port status. There are two SFP (Small
???An
???An SFP port for swappable optical transceiver, which offers
NOTE: Only one of the two physical connections of a combo port can be used at any one time. Port features and port controls are determined by the physical connection used. The system automatically detects the media used on a combo port, and utilizes the information in all the control interfaces.
NOTE: The system can switch from the
On the front panel is the Managed Mode LED which indicates the Ethernet switch operational status and the management mode. The Fan LED indicates the device fan operations status, and the Power LED on the front panel indicates whether the device is powered on or not. A Mode
Figure
Figure
On the front panel there are 48 ports, which are numbered 1 to 48, top down and left to right. On each port, there are LEDs to indicate the port status. There are four SFP (Small
???An
???An SFP port for swappable optical transceiver, which offers
NOTE: Only one of the two physical connections of a combo port can be used at any one time. Port features and port controls are determined by the physical connection used. The system automatically detects the media used on a combo port, and utilizes the information in all the control interfaces.
NOTE: The system can switch from the
On the top right side of the front panel is the Managed Mode LED which indicates the Ethernet switch operational status and the management mode. The Fan LED indicates the device fan operations status, and the Power LED on the front panel indicates whether the device is powered on or not. A Mode push-
20 Dell PowerConnect 28xx Systems User Guide
button, located on the right side on the front panel is used to transition between management modes and to reset the device. For more information about management modes and transitioning between them, see "Management Modes" on page 49.
Fans are provided on the side panel. The back panel contains an AC Power Supply Interface. The following figure illustrates the back panel of the PowerConnect 2848 device.
Figure
Physical Dimensions
The PowerConnect 2808 switch has the following physical dimensions:
???Height ??? 43.2 mm (1.7008 in.)
???Width ??? 256 mm (10.079 in.)
???Depth ??? 161.7 mm (6.366 in.)
The PowerConnect 2816 and PowerConnect 2824 switches have the following physical dimensions:
???Height ??? 43.2 mm (1.7008 in.)
???Width ??? 330 mm (12.992 in.)
???Depth ??? 230.50 mm (9.075 in.)
The PowerConnect 2848 switch has the following physical dimensions:
???Height ??? 43.2 mm (1.70 in.)
???Width ??? 440 mm (17.32 in)
???Depth ??? 255 mm (10.04 in.)
LED Definitions
The front panel contains LEDs that indicate the status of links, power supply, fan status, and Managed Mode status.
Power LED
On the PowerConnect 28xx front panel there is a Power LED. The following table describes the Power Supply status LED indications.
Table
Managed Mode LED
On the PowerConnect 28xx front panel there is a Managed Mode LED monitoring the switch node as well as indicating diagnostic test results. The following table describes the Managed Mode LED indications. For more information about management modes and transitioning between them, see "Management Modes" on page 49.
Table
Fan LED (2824/2848 only)
On the PowerConnect 2824 and PowerConnect 2848 front panel there is a fan LED. The following table describes the fan status LED indications.
Table
Port LEDs
Each
The following figure illustrates the
22 Dell PowerConnect 28xx Systems User Guide
Figure
The
Table
SFP Port LED
The following table describes the SFP LED indications.
Table
Managed Mode Button
The PowerConnect 28xx has a Mode push button on the front panel. The Mode button is for changing between Managed Mode and Unmanaged (or Secure) Mode and for resetting the device. To transition between modes, press the button normally. To reset the device, press and hold the button for at least 7 sec- onds. For more information about management modes and transitioning between them, see "Management Modes" on page 49.
Switch Ventilation Fan
The PowerConnect 2848 switch has three fans and the PowerConnect 2824 switch has one fan for system ventilation. The PowerConnect 2808 and PowerConnect 2816 devices have no internal fans.
Cables, Port Connections, and Pinout Information
This section explains the switch physical interfaces, and provides information about cables and port connections. Copper cable diagnostics are supported.
All Category 5 UTP cables that are used for
The
Table
The following figure illustrates the
Figure
The
Table
Pin No Function
1TxRx 1+
2TxRx 1-
3TxRx 2+
4TxRx 2-
5TxRx 3+
24 Dell PowerConnect 28xx Systems User Guide
Table
Pin No Function
6TxRx 3-
7TxRx 4+
8TxRx 4-
SFP Ports
The PowerConnect 2824 switch supports two SFP transceivers combo ports, and the PowerConnect 2848 switch supports four SFP transceivers combo ports for various
PowerConnect 2824 switch supports SFP diagnostics. The optical transceiver provides access to a set of parameters that can be monitored and displayed to the system administrator.
NOTE: If both
The pin number allocation for the SFP ports is listed in the following table.
Table
Pin No Use
1Transmitter ground (common with receiver ground)
2Transmitter fault
3Transmitter disable; laser output disabled on high or open.
4Module definition 2; data line for serial ID.
5Module definition 1; clock line for serial ID.
6Module definition 0; grounded within the module.
7Rate select; no connection required.
8Loss of signal indication; logic 0 indicates normal operation.
9Receiver ground (common with transmitter ground)
10Receiver ground (common with transmitter ground)
11Receiver ground (common with transmitter ground)
12Receiver inverted data out; AC coupled.
13Receiver
14Receiver ground (common with transmitter ground)
Table
Pin No Use
15Receiver power supply
16Transmitter power supply
17Transmitter ground (common with receiver ground)
18Transmitter
19Transmitter inverted data in
20Transmitter ground (common with receiver ground)
Power Connectors
The PowerConnect 28xx is powered by using the AC internal power supply.
Internal Power Supply Connector
The PowerConnect 28xx supports a single internal power supply to provide power for switching operations. The internal power supply supports input voltages between 100 and 240 VAC. The AC power connector is located on the back panel of the switch.
26 Dell PowerConnect 28xx Systems User Guide
3
Installing the PowerConnect Device
This section contains information about device unpacking, location, installation, and cable connections.
Installation Precautions
CAUTION Before performing any of the following procedures, read and follow the safety instructions located in the System Information Guide included in the Dell Documentation.
CAUTION Observe the following points before performing the procedures in this section:
???Ensure that the rack or cabinet housing the device is adequately secured to prevent it from becoming unstable and/or falling over.
???Ensure that the power source circuits are properly grounded.
???Observe and follow the service markings. Do not service any device except as explained in the system documentation. Opening or removing covers marked with a triangular symbol with a lighting bolt may cause electrical shock. These components are to be serviced by trained service technicians only.
???Ensure that the power cable, extension cable, and/or plug is not damaged.
???Ensure that the device is not exposed to water.
???Ensure that the device is not exposed to radiators and/or heat sources.
???Ensure that the cooling vents are not blocked.
???Do not push foreign objects into the device, as it may cause a fire or electric shock.
???Use the device only with approved equipment.
???Allow the device to cool before removing covers or touching internal equipment.
???Ensure that the device does not overload the power circuits, wiring, and
???Do not install the device in an environment where the operating ambient temperature might exceed 45??C (113??F).
???Ensure that the airflow around the front, sides, and back of the device is not restricted.
Site Requirements
The PowerConnect 28xx can be mounted in a standard equipment rack, placed on a tabletop, or mounted on the wall.
Before installing the device, verify that the site selected for the device meets the following site requirements:
???Power ??? The device is installed within 1.5 m (5 feet) of a grounded, easily accessible outlet 220/110 VAC, 50/60 Hz. If the device has two power supplies, the site should have two power outlets with different power feeders.
???General ??? Ensure that the power supply is correctly installed.
???Clearance ??? There is adequate frontal clearance for operator access. Allow clearance for cabling, power connections, and ventilation.
???Cabling ??? Cabling is routed to avoid sources of electrical noise such as radio transmitters, broadcast amplifiers, power lines, and fluorescent lighting fixtures.
???Ambient Requirements ??? The ambient device operating temperature range is 0 to 45 ??C (32 to
113 ??F) at a relative humidity of up to 95%,
Unpacking
Package Contents
While unpacking the device, ensure that the following items are included:
???The device
???AC power cable
???
???
???Documentation CD
???Product Information Guide
Unpacking the Device
To unpack the PowerConnect device:
NOTE: Before unpacking the device, inspect the packaging and report any evidence of damage.
1Place the box on a clean flat surface.
2Open the box or remove the box top.
3Carefully remove the device from the package and place it on a secure, stable and clean surface.
4Remove all packing material.
28 Dell PowerConnect 28xx Systems User Guide
5 Inspect the product for damage. Report any damage immediately.
Mounting the Device
Overview
There are three device mounting options:
???Installing in a Rack
???Installing on a Flat Surface
???Installing on a Wall
Device Rack Installation
CAUTION Read the safety information in the Product Information Guide as well as the safety information for other devices that connect to or support the switch.
CAUTION Disconnect all cables from the device before mounting the device in a rack or cabinet. CAUTION When mounting multiple devices into a rack, mount the devices from the bottom up.
Install the device in a rack as follows:
1Place the supplied
Figure
2Insert the supplied screws into the rack mounting holes and tighten with a screwdriver.
3Repeat the process for the
4Insert the device into the rack, ensuring the
5Secure the device to the rack with the rack screws (not provided). Fasten the lower pair of screws before the upper pair of screws. Ensure that the ventilation holes are not obstructed.
Installing on a Flat Surface
The device must be installed on a flat surface if it is not installed on a rack. The surface must be able to support the weight of the device and the device cables.
1Attach the
2Set the device on a flat surface, while leaving 2 inches (5.08 cm) on each side and 5 inches (12.7 cm) at the back.
3Ensure that the device has proper ventilation.
30 Dell PowerConnect 28xx Systems User Guide
Installing on a Wall
To mount the device on a wall:
1Ensure that the mounting location meets the following requirements:
???The surface of the wall must be capable of supporting the device.
???Allow at least 2 inches (5.1 cm) space on the sides for proper ventilation and 5 inches (12.7 cm) at the back for power cable clearance.
???The location must not be exposed to direct sunlight.
???The location must be at least 2 feet (61 cm) away from any heating vents, and no
???The location must be ventilated to prevent heat buildup.
???Do not locate the device near any data or electrical cabling.
???The power cable must be able to reach an outlet.
2Place the supplied
Figure
3Insert the supplied screws into the
4Repeat the process for the
5Place the device on the wall in the location where the device is being installed.
6On the wall mark the locations where the screws to hold the device must be prepared.
7On the marked locations, drill the holes and place all plugs (not provided) in the holes.
8Secure the device to the wall with screws (not provided). Ensure that the ventilation holes are not obstructed.
Figure
Connecting the Device
To configure the device, the device must be connected to a terminal.
Connecting the Device to the Network
To connect to an uplink port, use Category 5 Unshielded
32 Dell PowerConnect 28xx Systems User Guide
NOTE: Do not plug a phone jack connector into an
NOTE: If auto negotiation is turned off on the ports, a straight through cable must be used.
To connect the device to the network:
1Attach one end of a
2Make sure each twisted pair cable does not exceed 328 feet (100 meters) in length.
As each connection is made, the link LED corresponding to each port on the device is illuminated (green or amber) indicating that the connection is valid.
Connecting the Terminal to the Device
The device provides an external console port in models 28016/24/48. The console port enables a connection to a terminal desktop system running terminal emulation software for monitoring and configuring the device.
The Console port connector is a male
To use the Console port, the following is required:
???VT100 compatible terminal or a desktop or portable system with a serial port and running VT100 terminal emulation software.
???An
To connect a terminal to the device Console port, perform the following:
1Connect the supplied
2Ensure that the terminal emulation software is set as follows:
a Select the appropriate serial port (serial port 1 or serial port 2) to connect to the console. b Set the data rate to 9600 baud.
c Set the data format to 8 data bits, 1 stop bit, and no parity. d Set flow control to none.
e Under Properties, select VT100 for Emulation mode.
f Select Terminal keys for Function, Arrow, and Ctrl keys. Ensure that the setting is for Terminal keys (not Windows keys).
NOTE: When using HyperTerminal with Microsoft?? Windows 2000, Windows XP, or Windows Vista, ensure that you have the latest service packs installed. With Windows 2000 Service Pack 2, the arrow keys function properly in HyperTerminal???s VT100 emulation. Go to www.microsoft.com for information on Windows 2000, Windows XP, and Windows Vista service packs.
3Connect the female connector of the
Connecting to Console Port
Connecting a Device to a Power Supply
1Connect the supplied standard AC power cable to the AC connector on the back panel.
2Do not connect the power cable to a grounded AC outlet at this time. Connect the device to a power source in the steps detailed in Starting and Configuring the Device.
Figure
3After connecting the device to a power source, confirm that the device is connected and operating correctly by examining the LEDs on the front panel.
34 Dell PowerConnect 28xx Systems User Guide
Port Connections, Cables, and Pinout Information
This section explains the device???s physical interfaces, and provides information about port connections. Connector types, ports and cables are summarized in Ports, Connectors, and Cables. Copper Cable and Optical Transceiver Diagnostics are supported.
The 10/100/1000BaseT ports are copper
To establish a link for the
When selecting cables to connect the device ports to their networking peers, straight through cables must be used to connect the device to a station, and crossover cables must be used to connect one transmission device (switch or hub) to another. Both the straight through and crossover cables are category 5.
After a port is connected, its LINK indication LED is lit.
Table
The
Table
Pin No Function
1TxRx 1+
2TxRx 1-
3TxRx 2+
4TxRx 2-
5TxRx 3+
6TxRx 3-
7TxRx 4+
8TxRx 4-
Port Default Settings
The general information for configuring the device ports includes the short description of the auto- negotiation mechanism and the default settings for switching ports.
If connecting a NIC that does not support
If the station on the other side of the link attempts to
MDI/MDIX
The device supports
When the MDI/MDIX (Media Dependent Interface with Crossover) is enabled, the automatic correction of errors in cable selection is possible, making the distinction between a straight through cable and a crossover cable irrelevant. (The standard wiring for end stations is known as MDI (Media Dependent Interface), and the standard wiring for hubs and switches is known as MDIX.)
Flow Control
The device supports 802.3x Flow Control for ports configured with the Full Duplex mode. By default, this feature is enabled. It can be enabled per port. The flow control mechanism allows the receiving side to signal to the transmitting side that transmission must temporarily be halted to prevent buffer overflow.
Back Pressure
The device supports back pressure for ports configured to half duplex mode. By default, this feature is disabled. It can be enabled per port. The back pressure mechanism prevents the transmitting side from transmitting additional traffic temporarily. The receiving side may occupy a link so it becomes unavailable for additional traffic.
36 Dell PowerConnect 28xx Systems User Guide
Switching Port Default Settings
The following table gives the port default settings.
Table
38 Dell PowerConnect 28xx Systems User Guide
4
Starting and Configuring the Device
After completing all external connections, procede as follows:
???If the device is to be used as an unmanaged switch, there is no need for a terminal connection.
???A terminal connection is required if the device is to be used in a managed mode.
NOTE: The PowerConnect 2808 has an internal serial port.
NOTE: Before proceeding, read the release notes for this product. The release notes can be downloaded from http://support.dell.com.
NOTE: It is recommended that you obtain the most recent revision of the user documentation from the Dell support website at http://support.dell.com.
After completing all external connections, connect a terminal to the device to configure the device and for other procedures. For initial configuration, the standard device configuration is performed.
Figure
Hardware
Setup
Standard
Device
Installation
Advanced
Device
Installation
Booting the Device - Managed Mode
The procedure described in this section refers to the device when set to operate as a managed switch. The PowerConnect 2808/16/24/48 models include a
Once the device is set to operate as a managed switch the boot procedure can be monitored on the connected terminal as follows:
1Ensure that the device console port is connected to a VT100 terminal device or VT100 terminal emulator via the
2Locate an AC power receptacle.
40 Dell PowerConnect 28xx Systems User Guide
3Deactivate the AC power receptacle.
4Connect the device to the AC receptacle.
5Activate the AC power receptacle.
When the power is turned on with the local terminal already connected, the device goes through Power On Self Test (POST). POST runs every time the device is initialized and checks hardware components to determine if the device is fully operational before completely booting. If a critical problem is detected, the program flow stops. If POST passes successfully, a valid executable image is loaded into RAM. POST messages are displayed on the terminal and indicate test success or failure.
The boot process runs less than 45 seconds when in unmanaged mode (and approximately 90 seconds when in other modes.
Initial Configuration - Managed Mode
The information and procedures described in this section apply to the dewvice when set as a Managed Mode switch.
NOTE: The switch is
NOTE: The initial simple configuration uses the following assumptions:
???The PowerConnect device was never configured before, and is in the same state as when you received it.
???The PowerConnect device booted successfully.
???The console connection is established and the console prompt is displayed on the screen of a VT100 terminal device. (Press the <Enter> key several times to verify that the prompt displays correctly.)
The initial device configuration is through the Serial port. After the initial configuration, the device can then be managed either from the already connected Serial port or remotely through an interface defined during the initial configuration.
The system prompts you to use the
NOTE: Obtain the following information from your network administrator before configuring the device:
???SNMP Community String and SNMP Management System IP address (optional).
???Username and Password.
???The IP address to be assigned to the VLAN 1 interface through which the device is to be managed (by default, every external and internal port is a member of the VLAN 1)
???The IP subnet mask for the network
???The default gateway (next hop router) IP address for configuring the default route.
The Setup Wizard guides you through the initial device configuration, and gets the system up and running as quickly as possible. You can skip using the setup wizard and configure the device manually through the device CLI mode (see "Managing the Device Using the CLI" on page 157.
The Setup Wizard configures the following fields.
???SNMP Community String and SNMP Management System IP address (optional)
???Username and Password
???Device IP address
???IP subnet mask
???Default Gateway IP address
The Setup Wizard displays the following information:
Welcome to Dell Easy Setup Wizard.
The Setup Wizard guides you through the initial switch configuration, and gets you up and running as quickly as possible. You can skip the setup wizard, and enter CLI mode to manually configure the switch.
The system will prompt you with a default answer; by pressing enter, you accept the default. You must respond to the next question to run the setup wizard within 60 seconds, otherwise the system will continue with normal operation using the default system configuration.
Would you like to enter the setup wizard (you must answer this question within 60 seconds)? (Y/N)[Y] Y
NOTE: If you select not to use the Setup Wizard, you can access the Web inteface by using the default IP address/mask (192.168.2.1/255.255.255.0).
NOTE: You can exit the Setup Wizard at any time by entering [Ctrl+Z].
Wizard Step 1
The following information displays:
The system is not setup for SNMP management by default.
To manage the switch using SNMP (required for Dell Network Manager) you can:
*Setup the initial SNMP Version 2 account now
*Return later and setup additional SNMP v1/v2 accounts
For more information on setting up SNMP accounts, please see the user documentation.
Would you like to setup the SNMP management interface now? (Y/N)[Y] Y
Enter [N] to skip to Step 2.
Enter [Y] to continue the
42 Dell PowerConnect 28xx Systems User Guide
To setup the SNMP management account you must specify the management system IP address and the "community string" or password that the particular management system uses to access the switch. The wizard automatically assigns the highest access level [Privilege Level 15] to this account.
You can use Dell Network Manager or CLI to change this setting, and to add additional management systems. For more information on adding management systems, see the user documentation.
To add a management station:
Please enter the SNMP community string to be used: [Dell_Network_Manager]
Please enter the IP address of the Management System (A.B.C.D) or wildcard(0.0.0.0) to manage from any Management Station:[0.0.0.0]
Wizard Step 2
The following information displays:
Now we need to setup your initial privilege (Level 15) user account.
This account is used to login to the CLI, Telnet and Web interface.
You may setup other accounts and change privilege levels later.
For more information on setting up user accounts and changing privilege levels,see the user documentation.
To setup a user account:
Enter the user
Please enter the user password:*****
Please reenter the user password:*****
Wizard Step 3
The following information displays:
Next, an IP address is setup.
The IP address is defined on the default VLAN ,(VLAN #2) . This is the IP address you use to access the Telnet, Web interface, or SNMP interface for the switch. To setup an IP address:
Please enter the IP address of the device (A.B.C.D):10.6.22.100
Please enter the IP subnet mask (A.B.C.D or nn):[255.255.255.224]
Wizard Step 4
The following information displays:
Finally, setup the default gateway.
Please enter the IP address of the gateway from which this network is reachable(e.g. 192.168.1.1).Default gateway (A.B.C.D):[10.6.22.97]
Enter the default gateway.
Press Enter. The following is displayed (as per the example parameters described):
This is the configuration information that has been collected:
==============================================================
SNMP Interface = Dell_Network_Manager@0.0.0.0
User Account setup = admin
Password = **********
Management IP address = 10.6.22.100 255.255.255.224
Default Gateway is 10.6.22.97
==============================================================
Wizard Step 5
The following information displays:
If the information is correct, please select (Y) to save the configuration, and copy to the
Configuring SNMP management interface.
Configuring user account.......
Configuring IP and subnet......
Thank you for using Dell Easy Setup Wizard.
Advanced Configuration
This section provides information about dynamic allocation of IP addresses.
When configuring/receiving IP addresses through DHCP, the configuration received from the server includes the IP address, and may include subnet mask and default gateway.
44 Dell PowerConnect 28xx Systems User Guide
Retrieving an IP Address From a DHCP Server
When using the DHCP protocol to retrieve an IP address, the device acts as a DHCP client. When the device is reset, the DHCP command is saved in the configuration file, but not the IP address. To configure the device so it will retrieve an IP address from a DHCP server, use the web interface (see "Defining DHCP Server Settings" on page 83).
NOTE: It is not necessary to delete the device configuration to retrieve an IP address from the DHCP server.
Startup Procedures
Startup Menu Procedures
The procedures called from the Startup menu cover software download, flash handling and password recovery. The diagnostics procedures are for use by technical support personnel only and are not disclosed in the document.
The Startup menu can be entered when booting the device ??? a user input must be entered immediately after the POST test.
To enter the Startup menu:
1 Turn the power on and watch for the
**************************************************
***************** SYSTEM RESET *****************
**************************************************
BOOT Software Version 1.0.0.20 Built
Processor: FireFox 88E6218
Autoboot in 2 seconds - press RETURN or Esc. to abort and enter prom.
Preparing to decompress...
2When the
[1]Download Software
[2]Erase Flash File
[3]Password Recovery Procedure
[4]Enter Diagnostic Mode
[5]Set Terminal
[6]Back
Enter your choice or press 'ESC' to exit
The following sections describe the available Startup menu options.
NOTE: When selecting an option form the Startup menu, time out must be taken into account: if no selection is made within 35 seconds (default), the device times out. This default value can be changed through CLI.
Software Download
The software download procedure is performed when a new version must be downloaded to replace the corrupted files, update or upgrade the system software. To download software from the Startup menu:
1From the Startup menu, press [1]. The following prompt appears:
Downloading code using XMODEM
2When using the HyperTerminal, click Transfer on the HyperTerminal Menu Bar.
3In the Filename field, enter the file path for the file to be downloaded.
4Ensure that the Xmodem protocol is selected in the Protocol field.
5Press Send. The software is downloaded.
NOTE: After software download, the device reboots automatically.
NOTE: The length of time taken by the download varies according to the tool used.
Erase FLASH File
In some cases, the device configuration must be erased. If the configuration is erased, all parameters configured via CLI, EWS or SNMP must be reconfigured.
46 Dell PowerConnect 28xx Systems User Guide
Erasing the Device Configuration
1From the Startup menu, press [2] within two seconds to erase flash file. The following message is displayed:
Warning! About to erase a Flash file.
Are you sure (Y/N)? y
2Press Y. The following message is displayed.
Write Flash file name (Up to 8 characters, Enter for none.):config File config (if present) will be erased after system initialization
======== Press Enter To Continue ========
3Enter config as the name of the flash file. The configuration is erased and the device reboots.
4Repeat the device initial configuration.
Password Recovery
If a password is lost, the Password Recovery procedure can be called from the Startup menu. The procedure enables entry to the device once without password.
To recover a lost password for the local terminal only:
1From the Startup menu, type 3 and press <Enter>. The password is deleted.
NOTE: To ensure device security, reconfigure passwords for applicable management methods.
Software Download Through TFTP Server
This section contains instructions for downloading device software (system and boot images) through a TFTP server. The TFTP server must be configured before beginning to download the software.
System Image Download
The device boots and runs when decompressing the system image from the flash memory area where a copy of the system image is stored. When a new image is downloaded, it is saved in the other area allocated for the other system image copy.
On the next boot, the device will decompress and run the currently active system image unless chosen otherwise.
To download a system image through the TFTP server:
1Ensure that an IP address is configured on one of the device ports and pings can be sent to a TFTP server.
2Make sure that the file to be downloaded is saved on the TFTP server (the ros file).
3Enter copy tftp://{tftp address}/{file name} image to copy a new system image to the device. When the new image is downloaded, it is saved in the area allocated for the other copy of system image. The following is an example of the information that appears:
console# copy tftp://176.215.31.3/file1.ros image Accessing file ???file1??? on 176.215.31.3??
Loading file1 from 176.215.31.3:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Copy took 00:01:11 [hh:mm:ss]
Exclamation symbols indicate that a copying process is in progress. Each symbol (!) corresponds to 512 bytes transferred successfully. A period indicates that the copying process is timed out. Many periods in a row indicate that the copying process failed.
4Enter the reload command. The following message is displayed:
console# reload
This command will reset the whole system and disconnect your current
session. Do you want to continue (y/n) [n]?
5 Enter y. The device reboots.
Boot Image Download
Loading a new boot image from the TFTP server and programming it into the flash updates the boot image. The boot image is loaded when the device is powered on. A user has no control over the boot image copies. To download a boot image through the TFTP server:
1Ensure that an IP address is configured on one of the device ports and pings can be sent to a TFTP server.
2Ensure that the file to be downloaded is saved on the TFTP server (the rfb file).
3Enter copy tftp://{tftp address}/{file name} boot to copy the boot image to the device. The following is an example of the information that appears:
console# copy
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Copy: 2739187 bytes copied in 00:01:13 [hh:mm:ss]
4Enter the reload command. The following message is displayed: console# reload
This command will reset the whole system and disconnect your current
48 Dell PowerConnect 28xx Systems User Guide
session. Do you want to continue (y/n) [n]?
5Enter y.
The device reboots.
Management Modes
The device supports the following modes:
???Managed Mode ??? Provides switch management through the web interface. From Managed mode, you can move to Unmanaged mode by pressing the Mode button on the device, or you can move to Secure mode using the web interface (see "Entering Secure Mode" on page 63). Before leaving Managed mode it is highly recommended to save the configuration (see "Uploading Files" on page 82).
???Unmanaged Mode ??? In this mode, the device does not have an IP address; STP is disabled; there is no web management interface, the CLI works in debug mode only; and there is no configuration in the
???Secure Mode ??? This mode keeps the existing configuration active, but it prevents users from making configuration changes by removing the IP address of the device so that it becomes inaccessible for configuration. In this mode, no web management interface is available, and CLI works in debug mode only. From this mode, you can return to Managed mode by pressing the Mode button on the device.
All modes are maintained through power cycles. The Managed Mode LED provides an indication of the current mode (see "On the PowerConnect 28xx front panel there is a Managed Mode LED monitoring the switch node as well as indicating diagnostic test results. The following table describes the Managed Mode LED indications. For more information about management modes and transitioning between them, see "Management Modes" on page 50." on page 22).
Default Values
The factory default values, used when the device is in Unmanaged mode, include:
???IP Address ??? 192.168.2.1
???Netmask ??? 255.255.255.0
???Username ??? admin
???Permission ??? R/W privilege
???DHCP Client ??? Off
???Flow Control ??? On
???STP ??? Off
Transitioning Between Modes
The following diagram summarizes movement between modes:
Figure
50 Dell PowerConnect 28xx Systems User Guide
Returning to Managed Mode
When returning to Managed mode from either Unmanaged or Secure mode, the Restore Saved Configuration page appears. This page can be used to retrieve a saved configuration. You can also change the device IP address using this page.
Figure
???Local Configuration ??? No saved configuration is loaded.
???Server IP Address/File Name ??? Loads a previously saved configuration.
???Use Saved IP/User Name/Password ??? When restoring local configuration, this option uses the IP address, user name and password that were automatically saved when you exited Managed mode. When restoring a saved configuration, this option uses the IP address, user name and password inside the saved configuration.
???Use Current IP/User Name/Password ??? When restoring local configuration, this option uses the system default IP address, user name and password.
???Apply Changes ??? The selected configuration is restored and the device reboots.
52 Dell PowerConnect 28xx Systems User Guide
5
Using Dell OpenManage Switch Administrator
This section provides an introduction to the user interface.
Understanding the Interface
The home page contains the following views:
???Tree View ??? Located on the left side of the home page, the tree view provides an expandable view of the features and their components.
???Device View ??? Located on the right side of the home page, the device view provides a view of the device, an information or table area, and configuration instructions.
Figure
Table
Table
Support. For more information, see "Information
Device Representation
The PowerConnect home page contains a graphical device representation of the front panel.
Figure
54 Dell PowerConnect 28xx Systems User Guide
The port coloring indicates if a specific port is currently active. Ports can be the following colors:
Table
Component Name
NOTE: The Port LEDs are not reflected in PowerConnect front panel in the PowerConnect OpenManage Switch Administrator. LED status can only be determined by viewing the actual device. For more information about LEDs, see "LED Definitions" on page 21.
Using the Switch Administrator Buttons
This section describes the buttons found on the OpenManage Switch Administrator interface.
Information Buttons
Information buttons provide access to
Table
Device Management Buttons
Device Management buttons provide an easy method of configuring device information, and includes the following:
Table
Starting the Application
1Open a web browser.
2Enter the device???s IP address (as defined in the CLI) in the address bar and press <Enter>.
For information about assigning an IP address to a device, see "Static IP Address and Subnet Mask."
3When the Enter Network Password window opens, enter a user name and password.
NOTE: The device is not configured with a default password, and can be configured without entering a password. For information about recovering a lost password, see ???Password Recovery.
NOTE: Passwords are both case sensitive and
NOTE: The device can be managed via web interface only in Managed mode. For more information about management modes, see "Management Modes" on page 49.
4Click OK.
The Dell PowerConnect OpenManage??? Switch Administrator home page opens.
Access Levels
When you login to the device, you are automatically assigned one of the following modes, based upon the access level assigned to you:
56 Dell PowerConnect 28xx Systems User Guide
???Management ??? This is a
???Monitor ??? This is a
For more information about setting the access level, see ("Defining the Local User Databases" on page 69).
58 Dell PowerConnect 28xx Systems User Guide
6
Configuring System Information
This section provides information for defining system parameters including security features, downloading device software, and resetting the device. To open the System page, click System in the tree view.
Figure
Defining General Device Information
The General page contains links to pages for configuring device parameters.
Viewing Device Information
The Asset page contains parameters for configuring general device information, including the system name, location, and contact, the system MAC Address, System Object ID, date, time, and System Up Time. To open the Asset page, click System ??? General ??? Asset in the tree view.
Figure
???System Name
???System Contact
???System Location
???MAC Address ??? Specifies the device MAC address.
???Sys Object ID ??? Specifies the vendor's authoritative identification of the network management subsystem contained in the entity.
???Service Tag ??? Specifies the service reference number used when servicing the device.
???Asset Tag
???Serial No. ??? Specifies the device serial number.
???Date (DD/MMM/YY) ??? Specifies the current date. The format is day, month, year, for example, 10/NOV/02 is November 10, 2002.
???Time (HH:MM:SS) ??? Specifies the time. The format is hour, minute, second, for example, 20:12:03 is eight twelve and three seconds in the evening.
???System Up Time ??? Specifies the amount of time since the last device reset. The system time is displayed in the following format: Days, Hours, Minutes and Seconds. For example, 41 days, 2 hours, 22 minutes and 15 seconds.
60 Update with your book title
Defining System Information:
1Open the Asset page.
2Define the relevant fields.
3Click Apply Changes.
The system parameters are defined, and the device is updated.
Initiating a Telnet Session:
1Open the Asset page.
2Click Telnet.
A Telnet session is initiated.
Viewing the Versions Page
The Versions page contains information about the hardware and software versions currently running. To open the Versions page, click System??? General??? Versions in the tree view.
Figure
???Software Version ??? The current software version running on the device.
???Boot Version ??? The current Boot version running on the device.
???Hardware Version ??? The current hardware version.
Resetting the Device
The Reset page enables the device to be reset from a remote location. For more information about saved Configuration files, see "Managing Files" on page 80. To open the Reset page, click System ??? General ??? Reset in the tree view.
Figure
Resetting the Device
1Open the Reset page
2Click reset.
A confirmation message displays.
3Click OK.
The device is reset. After the device is reset, a prompt for a user name and password displays.
4Enter a user name and password to reconnect to the Web Interface.
62 Update with your book title
Entering Secure Mode
The Secure Mode page allows you to put the device in the Secure management mode. Once enabled, it prevents users from making any further configuration changes to the switch. This is done by removing the IP address of the switch so that it becomes inaccessible. In Secure Mode the switch retains configuration through power cycles just like in Managed Mode.
To use Secure Mode, configure the device in Managed Mode, and then switch to Secure Mode via the web interface. To exit Secure Mode, press the Managed Mode button on the device to enter the Managed Mode default configuration with the default IP address of 192.168.2.1. For information about management modes, see "Management Modes" on page 49. For information about saving Configuration files, see "Managing Files" on page 80.
To open the Secure Mode page, click System ??? General ??? Secure Mode in the tree view.
Figure
Entering Secure Mode
1Open the Secure Mode page.
2Click Secure.
A confirmation message displays.
3Click OK.
The device enters Secure mode.
Defining Device IP Addresses
The IP Addressing page contains links for assigning interface and default gateway IP addresses, and enabling or disabling DHCP.
To open the IP Addressing page, click System ??? IP Addressing in the tree view.
Defining IP Interface Parameters
The IP Interface Parameters page is used to select whether the device IP address, mask and/or gateway is assigned statically, or dynamically using DHCP. The page is also used to make static assignments, and to approve dynamic assignments received from the DHCP server before they go into affect (until approval, the old address is used).
To open the IP Interface Parameters page, click System??? IP Addressing ??? IP Interface Parameters in the tree view.
Figure
???DHCP ??? The DHCP client can be enabled to acquire the network configuration dynamically. The DHCP default value is Disable. This field enables the DHCP client.
???IP Address ??? Specifies the static IP Address currently assigned to the device.
???Subnet Mask??? Specifies the subnet mask of the static IP Address, currently assigned to the device.
???Default Gateway ??? Specifies the static Default Gateway Address, currently assigned to the device.
???DHCP IP Address ??? Specifies the IP Address received from the DHCP server.
???DHCP Subnet Mask ??? Specifies the Subnet Mask received from the DHCP server.
64 Update with your book title
???DHCP Default Gateway ??? Defines the Default Gateway Address received from the DHCP server.
???Apply DHCP Address ??? Activates the IP Address, Subnet Mask Address, and Default Gateway Address, received from the DHCP server.
Enabling DHCP:
1Open the IP Interface Parameters page.
2Set DHCP to Enable.
3Click the Apply DHCP Address checkbox.
4Click Apply Changes.
DHCP is enabled and the device is updated.
Setting static IP Interface parameters:
1Open the IP Interface Parameters page.
2Set DHCP to Disable.
3Set the IP Address, Subnet Mask and Default Gateway.
4Click Apply Changes.
The static interface parameters are set and the device is updated.
Running Cable Diagnostics
The Diagnostics page contains links to pages for performing virtual cable tests on copper and fiber optics cables.To open the Diagnostics page, click System ??? Diagnostics in the tree view.
Viewing Copper Cable Diagnostics
The Integrated Cable Test for Copper Cables page contains fields for performing tests on copper cables. Cable testing provides information about where errors occurred in the cable, the last time a cable test was performed, and the type of cable error which occurred. The tests use Time Domain Reflectometry (TDR) technology to test the quality and characteristics of a copper cable attached to a port. Cables up to 120 meters long can be tested. Cables are tested when the ports are in the down state, with the exception of the Approximated Cable Length test. The cable length returned is an approximation in the ranges of up to 50 meters,
To open the Integrated Cable Test for Copper Cables page, click System??? Diagnostics??? Integrated Cable Test in the tree view.
Figure
???Port ??? The port to which the cable is connected.
???Test Result ??? The cable test results. Possible values are:
???No Cable ??? There is no cable connected to the port.
???Open Cable ??? The cable is connected on only one side.
???Short Cable ??? The cable is 2 meters long.
???OK ??? The cable passed the test.
???Fiber Cable ??? A fiber cable is connected to the port.
???Cable Fault Distance ??? The distance from the port where the cable error occurred.
???Last Update ??? The last time the port was tested.
???Approximate Cable Length ??? The approximate cable length. This test can only be performed when the port is up and operating at 1 Gbps.
Performing a Cable Test
1Ensure that both ends of the copper cable are connected to a device.
2Open the Integrated Cable Test for Copper Cables page.
3Click Test Now.
The copper cable test is performed, and the results are displayed on the Integrated Cable Test for Copper Cables page.
66 Update with your book title
Displaying Virtual Cable Test Results Table
1Open the Integrated Cable Test for Copper Cables page.
2Click Show All.
The Virtual Cable Test Results Table opens.
Viewing Optical Transceiver Diagnostics
The Optical Transceiver Diagnostics page contains fields for performing tests on Fiber Optic cables. Optical transceiver diagnostics can be performed only when the link is present. To open the Optical Transceiver Diagnostics page, click System??? Diagnostics??? Optical Transceiver Diagnostics in the tree view.
Figure
???Port ??? The port to which the fiber cable is connected.
???Temperature ??? The temperature (in Celsius) at which the cable is operating.
???Voltage ??? The voltage at which the cable is operating.
???Current ??? The current at which the cable is operating.
???Output Power ??? The rate at which the output power is transmitted.
???Input Power ??? The rate at which the input power is transmitted.
???Transmitter Fault ??? Indicates if a fault occurred during transmission.
???Loss of Signal ??? Indicates if a signal loss occurred in the cable.
???Data Ready ??? The transceiver has achieved power up and data is ready.
Displaying Optical Transceiver Diagnostics Test Results Table
1Open the Optical Transceiver Diagnostics page.
2Click Show All.
The test is run and the Virtual Cable Test Results Table opens with the following columns:
???Temp ??? Internally measured transceiver temperature.
???Voltage ??? Internally measured supply voltage.
???Current ??? Measured TX bias current.
???Output Power ??? Measured TX output power in milliwatts.
???Input Power ??? Measured RX received power in milliwatts.
???TX Fault ??? Transmitter fault.
Finisair transceivers do not support the transmitter fault diagnostic testing.
???LOS ??? Loss of signal.
???Data Ready ??? The transceiver has archived power up and data is ready.
???N/A ??? Not Available, N/S - Not Supported, W - Warning, E - Error.
Fiber Optic analysis feature works only on SFPs that support the digital diagnostic standard
68 Update with your book title
Managing Device Security
The Management Security page provides access to security pages that contain fields for setting security parameters for user database, password and RADIUS security. To open the Management Security page, click System???Management Security in the tree view.
Defining the Local User Databases
The Local User Database page contains fields for defining users, passwords and access levels. To open the
Local User Database page, click System??? Management Security??? Local User Database in the tree view.
Figure
???User Name ??? List of users.
???Access Level ??? User access level. The lowest user access level is 1 and 15 is the highest user access level. Users with access level 15 are Privileged Users, and only they can access and edit all pages of the OpenManage Switch Administrator.
???Password
???Confirm Password ??? Confirms the
???Remove ??? Removes users from the User Name list, when selected.
Assigning Access Rights to a User:
1Open the Local User Database page.
2Select a user in the User Name field.
3Define the fields.
4Click Apply Changes.
The user access rights and passwords are defined, and the device is updated.
Defining a New User:
1Open the Local User Database page.
2Click Add.
The Add User page opens:
Figure
3Define the fields.
4Click Apply Changes.
The new user is defined, and the device is updated.
Displaying the Local User Table:
1Open the Local User Database page.
2Click Show All.
The Local User Table opens:
Figure
Deleting Users:
1 Open the Local User Database page.
70 Update with your book title
2Click Show All.
The Local User Table opens.
3Select a User Name.
4Select the Remove check box.
5Click Apply Changes.
The selected user is deleted and the device is updated.
Configuring RADIUS Global Parameters
Remote Authorization
???Telnet Access
???Web Access
???Console to Device Access
To open the RADIUS Settings page, click System ??? Management Security ??? RADIUS in the tree view.
Figure
???IP Address ??? The list of Authentication Server IP addresses.
???Priority
???Authentication Port ??? Identifies the authentication port. The authentication port is used to verify the RADIUS server authentication.
???Number of Retries
???Timeout for Reply
???Dead Time
???Key String
???Source IP Address ??? Specifies the source IP address that is used for communication with RADIUS servers.
If
???Default Retries
???Default Timeout for Reply
???Default Dead time
???Default Key String
???Source Address ??? Specifies the source IP address that is used for communication with RADIUS servers.
Defining RADIUS Parameters:
1Open the RADIUS Settings page.
2Define the fields.
3Click Apply Changes.
The RADIUS setting are updated to the device.
Adding a RADIUS Server:
1 Open the RADIUS Settings page.
72 Update with your book title
2Click Add.
The Add RADIUS Server page opens:
Figure
3Define the fields.
4Click Apply Changes.
The new RADIUS server is added, and the device is updated.
Displaying the RADIUS Server List:
1Open the RADIUS Settings page.
2Click Show All.
The Show all RADIUS Servers page opens:
Figure
Modifying the RADIUS Server Settings:
1 Open the RADIUS Settings page.
2Click Show All.
The RADIUS Servers List page opens.
3Modify the relevant fields.
4Click Apply Changes.
The RADIUS Server settings are modified, and the device is updated.
Deleting a RADIUS Server for the RADIUS Servers List:
1Open the RADIUS Settings page.
2Click Show All.
The RADIUS Servers List page opens.
3Select a RADIUS Server in the RADIUS Servers List.
4Select the Remove check box.
5Click Apply Changes.
The RADIUS server is removed from the RADIUS Servers List.
Defining SNMP Parameters
Simple Network Management Protocol (SNMP) provides a method for managing network devices. Devices supporting SNMP run a local software (agent).
The SNMP agents maintain a list of variables, which are used to manage the device. The variables are defined in the Management Information Base (MIB). The MIB contains the variables controlled by the agent. The SNMP protocol defines the MIB specification format, as well as the format used to access the information over the network.
Access rights to the SNMP agents are controlled by access strings. To communicate with the device, the Embedded Web Server submits a valid community string for authentication. To open the SNMP page, click System ??? SNMP in the tree view.
This section contains information for managing the SNMP configuration.
74 Update with your book title
Defining SNMP Global Parameters
The SNMP Global Parameters page permits enabling both SNMP and Authentication notifications.To open the SNMP Global Parameters page, click System ??? SNMP ??? Global Parameters in the tree view.
Figure
???SNMP Notifications ??? Enables or disables the device sending SNMP notifications.
???Authentication Notifications ??? Enables or disables the device sending SNMP traps when authentication fails.
Enabling SNMP Notifications
1Open the SNMP Global Parameters page.
2Select Enable in the SNMP Notifications field.
3Click Apply Changes.
SNMP notifications are enabled, and the device is updated.
Enabling Authentication Notifications
1Open the SNMP Global Parameters page.
2Select Enable in the Authentication Notifications field.
3Click Apply Changes.
Defining Communities
Access rights are managed by defining communities in the Community Table. When the community names are changed, access rights are also changed.To open the SNMP Community page, click System ??? SNMP ??? Community in the tree view.
Figure
???SNMP Management Station ??? A list of management station IP addresses.
???Community String ??? Functions as a password and used to authenticate the selected management station to the device.
???Access Mode ??? Defines the access rights of the community. The possible field values are:
???Read Only ??? The management access is restricted to
???Read Write ??? The management access is
???SNMP Admin ??? The management access is
???Remove ??? Removes a community, when selected.
Defining a New Community
1Open the SNMP Community page.
2Click Add.
The Add SNMP Community page opens:
76 Update with your book title
Figure
3Select one of the following:
???SNMP Management Station ??? Defines an SNMP community for a specific management station.
???All ??? Defines an SNMP community for all management stations.
4Define the remaining fields.
5Click Apply Changes.
The new community is saved, and the device is updated.
Displaying all Communities
1Open the SNMP Community page.
2Click Show All.
The Community Table opens:
Figure
Deleting Communities
1Open the Community Table page.
2Click Show All.
The Community Table opens.
3Select a community from the Community Table.
4Select the Remove check box.
5Click Apply Changes.
The selected community entry is deleted, and the device is updated.
Defining SNMP Notification Recipients
The Notification Recipients page contains information for defining filters that determine whether traps are sent to specific users, and the trap type sent. SNMP notification filters provide the following services:
???Identifying Management Trap Targets
???Trap Filtering
???Selecting Trap Generation Parameters
???Providing Access Control Checks
To open the Notification Recipients page, click System ??? SNMP ??? Notification Recipient in the tree view.
Figure
???Recipient IP ??? Indicates the IP address to whom the traps are sent.
???Community String ??? Functions as a password and used to authenticate the selected management station to the device.
???Notification Version ??? Determines the trap type. The possible field values are:
??? SNMPv1 ??? SNMP Version 1 traps are sent.
78 Update with your book title
??? SNMPv2 ??? SNMP Version 2 traps are sent.
???Remove Notification Recipient ??? When checked, removes selected notification recipients.
Adding a new Trap Recipients
1Open Notification Recipients page.
2Click Add.
The Add Notification Recipients page opens:
3Define the relevant fields.
4Click Apply Changes.
The notification recipient is added, and the device is updated.
Displaying Notification Recipients Tables
1Open Notification Recipients page.
2Click Show All.
The Notification Recipients Tables page opens:
Figure
Deleting Notification Recipients
1 Open Notification Recipients page.
2 Click Show All.
The Notification Recipients Tables page opens.
3Select a notification recipient.
4Check the Remove checkbox.
5Click Apply Changes. The recipient is deleted, and the device is updated.
Managing Files
The File Management page contains fields for managing device software, the Image Files, and the Configuration Files. Files can be downloaded from a TFTP server.
The configuration file structure consists of the following configuration files:
???Startup Configuration File ??? Contains the commands required to reconfigure the device to the same settings as when the device is powered down or rebooted.
???Running Configuration File ??? Contains all Startup file commands, as well as all commands entered during the current session. After the device is powered down or rebooted, all commands stored in the Running Configuration file are lost. During the startup process, all commands in the Startup file are copied to the Running Configuration File and applied to the device. During the session, all new commands entered are added to the commands existing in the Running Configuration file. Commands are not overwritten.
???Image File ??? System file images are saved in a Flash File called an image. The device boots and runs from the image.
To open the File Management page, click System ??? File Management in the tree view.
Downloading Files
The File Download From Server page contains fields for downloading system image and Configuration files from the TFTP server or HTTP client to the device. To open the File Download From Server page, click System ??? File Management ??? File Download in the tree view.
80 Update with your book title
Figure
???Firmware Download ??? The Firmware file is downloaded. If Firmware Download is selected, the
Configuration Download fields are grayed out.
???Configuration Download ??? The Configuration file is downloaded. If Configuration Download is selected, the Firmware Download fields are grayed out.
???Download via TFTP ??? Enables initiating an image download via the TFTP server.
???Download via HTTP ??? Enables initiating an image download via the HTTP server.
Firmware Download
???Server IP Address ??? The Server IP Address from which the firmware files are downloaded.
???Source File Name ??? Indicates the file to be downloaded.
???Destination File Name??? The destination file to which the configuration file is downloaded. The possible field values are:
???Software Image ??? Downloads the software image file.
???Boot Code ??? Downloads the boot file.
Configuration Download
???Server IP Address ??? The Server IP Address from which the configuration files are downloaded.
??? Source File Name
Downloading Files
1Open the File Download From Server page.
2Define the fields.
3Click Apply Changes.
The software is downloaded to the device.
Uploading Files
The File Upload to Server page contains fields for uploading the Configuration file from the device to the TFTP server. To open the File Upload to Server page, click System ??? File Management ??? File Upload in the tree view.
Figure
The File Upload to Server page contains the following fields:
???Upload via TFTP ??? Enables initiating a configuration file upload via the TFTP server.
???Upload via HTTP ??? Enables initiating a configuration file upload via the FTP server.
???TFTP Server IP Address ??? The Server IP Address to which the file is uploaded.
???Destination File Name
82 Update with your book title
Uploading Files
1Open the File Upload to Server page.
2Define the fields.
3Click Apply Changes.
The software is uploaded to the device.
Restoring Default Settings
The Restore Defaults page allows you to restore the device settings to their factory default values. To open the Restore Defaults page, click System ??? File Management ??? Restore Defaults in the tree view.
Figure
The Restore Defaults page contains the following field:
???Restore Configuration Factory Defaults ??? Sets the device settings to their factory default values.
Restoring Default Settings
1Open the Restore Defaults page.
2Check the Restore Configuration Factory Defaults checkbox.
3Click Apply Changes. The settings are restored.
Defining DHCP Server Settings
The DHCP server is used mainly for centralized control over assignment of IP addresses to attached hosts.
A switch can operate as either a DHCP client (obtaining its own IP from a DHCP server) and as a DHCP server.
The DHCP server uses a defined pool of IP addresses
The DHCP server can allocate IP addresses in three configuration modes:
???Static allocation ??? The network administrator maps the hardware address of a host to an IP address on the DHCP server.
???Permanent allocation ??? An IP address received through a standard
???Dynamic allocation ??? A network device obtains a leased IP address for a specified period of time. The IP address is revoked at the end of this period and the switch must request another IP address.
This section contains information for configuring a DHCP server on a
Configuring DHCP Properties
The DHCP Server Properties page contains fields for enabling the DHCP server and configuring pinging capability. The DHCP Server pings a pool address before assigning this address to a requesting client. If the ping is unanswered, the DHCP Server assumes (with a high probaility) that the address is not in use and assigns the address to the requesting client. To open the DHCP Server Properties page, click System
??? DHCP Server ??? DHCP Server Properties in the tree view.
Figure
???DHCP Server Status ??? Indicates if the DHCP server is enabled. The possible field values are:
???Enable ??? Enables the DHCP server.
???Disable ??? Disables the DHCP server. This is the default value.
84 Update with your book title
???DHCP Ping ??? Indicates if the DHCP server is set to ping the offered IP address before responding to a client request, to ensure that the address is not in use. The possible field values are:
???Enable ??? Enables ping on the DHCP server.
???Disable ??? Disables ping on the DHCP server. This is the default value.
???DHCP Ping Retries??? Optionally specifies the number of pings that are sent before an IP address can be assigned to a requesting client. The range is 1 to 10 and the default value is two.
???Use Default ??? Reverts to the default Ping Retries setting (2 retries).
???DHCP Ping Timeout??? Optionally specifies the amount of time (in milliseconds) the DHCP server waits for a ping reply before it stops attempting to reach a pool address, prior to assigning this address to a requesting client. Default timeout is 500 milliseconds.
???Use Default ??? Reverts to the default Ping Timeout (500 milliseconds).
Enabling the DHCP Server
1Open the DHCP Server Properties page.
2Select Enable in the DHCP Server Status field.
3Optionally, select Enable in the DHCP Ping field to enable ping globally.
4Define the number of ping retries in the DHCP Ping Retries field, or click Use Default to select the default number of two retries.
5Define the amount of time (in milliseconds) the DHCP server waits for a ping reply in the DHCP Ping Timeout field, or click Use Default to select the default timeout of 500 milliseconds.
6Click Apply Changes. The server is enabled.
Defining Network Pool
The Network Pool page displays the DHCP Server's created pool name. The pool name, which is typically assigned to a network segment, consists of an IP address range from which the DHCP Server allocates IP addresses to DHCP clients. You can define the lease duration of the network pool.
To open the Network Pool page, click System ??? DHCP Server ??? Network Pool in the tree view.
Figure
???Subnet IP Address ??? Specifies the IP address of the subnet in which the network pool resides.
???Network Mask ??? Specifies the pool???s network mask.
???Prefix Length ??? Specifies the number of bits that comprise the address prefix.
???Address Pool Start ??? Specifies the first IP address in the range of the network pool.
???Address Pool End ??? Specifies the last IP address in the range of the network pool.
???Lease Duration ??? Specifies the amount of time a DHCP client can use an IP address from this pool. The total lease duration is 4294967295 seconds, i.e. 49710.2696 days. Thus a lease of 49710 days, 0 hours, 0 minutes and 0 seconds is a legal value, while a lease of 49710 days, 23 hours, 59 minutes and 59 seconds results in an Out of Range alert.
???Days ??? Specifies the duration of the lease in number of days. The range is 0 to 49710 days.
???Hours ??? Specifies the number of hours in the lease. A days value must be supplied before an hours value can be added. The range is 0 to 23 hours.
???Minutes ??? Specifies the number of minutes in the lease. A days value and an hours value must be added before a minutes value can be added. The range is 0 to 59 minutes.
???Infinite ??? Specifies that the duration of the lease is unlimited.
???Used Pool???s Addresses ??? Specifies the number of the pool???s addresses that are currently used.
???Default Router ??? Specifies the default router for the DHCP client.
???Domain Name Server ??? Specifies the DNS server available to the DHCP client.
86 Update with your book title
???Domain Name ??? Specifies the domain name for a DHCP client. The domain name may contain up to 32 characters.
???NetBIOS WINS Server ??? Specifies the NetBIOS WINS name server available to a DHCP client.
???NetBIOS Node Type ??? A parameter that informs the workstation how to resolve the NetBIOS name. Valid node types are:
???Blank ??? The workstation is not informed as to what type of NetBIOS node the client is.
???Broadcast ??? IP broadcast messages are used to register and resolve NetBIOS names to IP addresses.
???
???Mixed ??? A combination (mix) of
???Hybrid ??? A hybrid combination of
???SNTP Server ??? Specifies the time server for the DHCP client.
???Next Server ??? Specifies the IP address of the next server in the boot process of a DHCP client. If the next server in the boot process is not configured, the DHCP Server uses inbound interface helper addresses as boot servers.
???Next Server Name ??? Specifies the name of the next server in the boot process. The server name may contain up to 64 characters.
???Image File Name ??? Specifies the name of the file that is used as a boot image. The file name may contain up to 128 characters.
Excluding Addresses
By default, the DHCP Server assumes that all pool addresses may be assigned to DHCP clients. The user can specify IP addresses that must not be used. These addresses are referred to as excluded addresses. A single IP address or a range of IP addresses can be excluded.
The Excluded Addresses page lists the excluded addresses. To open the Excluded Addresses page, click
System ??? DHCP Server ??? Excluded Addresses in the tree view.
Figure
???Start IP Address ??? Displays the first IP address in the range of excluded IP addresses.
???End IP Address ??? Displays the last IP address in the range of excluded IP addresses.
Adding an Excluded Address
1Open the Excluded Addresses page.
2Click Add.
The Add Excluded page opens:
Figure
3Define the relevant fields.
4Click Apply Changes.
The address is excluded, and the device is updated.
Deleting Excluded Addresses
1Open the Excluded Addresses page.
2Check the Remove checkbox next to an address.
3Click Apply Changes. The address is deleted, and the device is updated.
88 Update with your book title
Manually Allocating IP Addresses (Static Hosts)
The Static Hosts page is used to manually allocate IP addresses to network hosts. To open the Static Hosts page, click System ??? DHCP Server ??? Static Hosts in the tree view.
Figure
???Host Name ??? Indicates the host pool name, which can be a string of symbols and an integer (for example, piy4). The range is up to 32 characters.
???IP Address ??? Specifies the IP address that was statically assigned to the host.
???Network Mask ??? Specifies the pool???s network mask.
???Prefix Length ??? Specifies the number of bits that comprise the address prefix.
???Client Identifier ??? A unique identification of the client specified in dotted hexadecimal notation, e.g., 01b6.0819.6811.72.
???MAC Address ??? Specifies the MAC Address of DHCP static host.
???Client Name ??? Specifies the name of the client, using a standard set of ASCII characters. The client name must not include the domain name. The range is up to 32 characters.
???Default Router ??? Specifies the default router for the DHCP static host.
???Domain Name Server ??? Specifies the DNS server available to the DHCP client.
???Domain Name ??? Specifies the domain name for a DHCP static host. The domain name may contain up to 32 characters.
???NetBIOS WINS Server ??? Specifies the NetBIOS WINS name server available to a Microsoft DHCP static host.
???NetBIOS Node Type ??? Informs the workstation how to resolve the NetBIOS name. Valid node types are:
???Blank ??? The workstation is not informed as to which type of NetBIOS node the client is.
???Broadcast ??? IP broadcast messages are used to register and resolve NetBIOS names to IP addresses.
???
???Mixed ??? A combination (mix) of
???Hybrid ??? A hybrid combination of
???SNTP Server ??? Specifies the time server for the DHCP static host.
???Next Server ??? Specifies the IP address of the next server in the boot process of a DHCP client. If the next server in the boot process is not configured, the DHCP Server uses inbound interface helper addresses as boot servers.
???Next Server Name ??? Specifies the name of the next server in the boot process. The server name may contain up to 64 characters.
???Image File Name ??? Specifies the name of the file that is used as a boot image. The file name may contain up to 128 characters.
Adding a new Static Host
1Open the Static Hosts page.
2Click Add.
The Add Static Host page opens:
90 Update with your book title
Figure
3Define the relevant fields.
4Click Apply Changes.
The static host is added, and the device is updated.
Displaying Static Hosts Tables
1Open the Static Hosts page.
2Click Show All.
The Static Hosts Table page opens:
Figure
Deleting Static Hosts
1Open the Static Hosts page.
2Click Show All.
The Static Hosts Table page opens.
3Check the Remove checkbox next to a static host.
4Click Apply Changes. The host is deleted, and the device is updated.
Configuring Address Binding
The Address Binding page displays a list of the DHCP server???s allocated IP addresses and each IP address???s client identifier, lease expiration time, and allocation type. Open the Address Binding page, click System ??? DHCP Server ??? Address Binding in the tree view.
Figure
???IP Address ??? Displays the IP addresses of the clients whose bindings are displayed.
???Client Identifier ??? A unique identification of the client specified in dotted hexadecimal notation, e.g., 01b6.0819.6811.72.
???Lease Expiration ??? Displays the lease expiration date and time of the host???s IP address.
???Type ??? Displays the manner in which the IP address was assigned to the host:
???Static allocation ??? The network administrator maps the hardware address of a host to an IP address on the DHCP server.
???Permanent allocation ??? An IP address received through a standard
???Dynamic allocation ??? A network device obtains a leased IP address for a specified period of time. The IP address is revoked at the end of this period and the switch must request another IP address.
92 Update with your book title
Defining Advanced Settings
The Advanced Settings page contains information for configuring general settings. Use Advanced Settings to set miscellaneous global attributes for the device. The changes to these attributes are applied only after the device is reset. To open the Advanced Settings page, click System ??? Advanced Settings in the tree view.
Configuring General Device Parameters
The General Settings page provides information for defining general device parameters.To open the
General Settings page, click System ??? Advanced Settings ??? General in the tree view.
Figure
???Attribute ??? The general setting attribute.
???Current ??? The currently configured value.
???After Reset ??? The future (after reset) value.
???Jumbo Frames ??? Enables or disables the Jumbo Frames feature. Jumbo Frames enable the transportation of identical data in fewer frames. This ensures less overhead, lower processing time, and fewer interrupts.
94 Update with your book title
7
Configuring Device Switching
This section provides all system operation and general information for configuring network security, ports, Address tables, GARP, VLANs, Spanning Tree, Port Aggregation, and Multicast Support.
Configuring Network Security
The device enables network security through both Access Control Lists and Locked Ports.
Port Based Authentication (802.1x)
Port based authentication enables authenticating system users on a
???Authenticators ??? Specifies the port that is authenticated before permitting system access.
???Supplicants ??? Specifies host connected to the authenticated port requesting to access the system services.
???Authentication Server ??? Specifies the external server, for example, the RADIUS server that performs the authentication on behalf of the authenticator, and indicates whether the user is authorized to access system services.
Port based authentication creates two access states:
???Controlled Access ??? Permits communication between the user and the system, if the user is authorized.
???Uncontrolled Access ??? Permits uncontrolled communication regardless of the port state. The device currently supports Port Based Authentication via RADIUS servers.
Advanced Port Based Authentication
Advanced Port Based Authentication enables multiple hosts to be attached to a single port. Advanced Port Based Authentication requires only one host to be authorized for all hosts to have system access. If the port is unauthorized all attached hosts are denied access to the network.
Advanced Port Based Authentication also enables user based authentication. Specific VLANs in the device are always available, even if specific ports attached to the VLAN are unauthorized. For example, Voice over IP does not require authentication, while data traffic requires authentication. VLANs for which authorization is not required can be defined. Unauthenticated VLANs are available to users, even if the ports attached to the VLAN are defined as authorized.
Advanced Port Based Authentication is implemented in the following modes:
???Single Host Mode ??? Enables only the authorized host for
???Multiple Host Mode ??? Enables multiple hosts to be attached to a single port, for
???Multiple Session Mode ??? Enables only the authorized host for
???Guest VLANs ??? Provides limited network access to unauthorized ports. If a port is denied network access via
To open the Network Security page select Switch ??? Network Security.
Configuring Port Based Authentication
The Port Based Authentication page contains fields for configuring port based authentication and for enabling Guest VLANs. To open the Port Based Authentication page, click Switch ??? Network Security ??? Port Based Authentication.
Figure
???Port Based Authentication State ??? Permits port based authentication on the device. The possible field values are:
???Enable ??? Enables port based authentication on the device.
???Disable ??? Disables port based authentication on the device.
???Authentication Method ??? The Authentication method used. The possible field values are:
96 Update with your book title
???None ??? No authentication method is used to authenticate the port.
???RADIUS ??? Port authentication is performed using the RADIUS server.
???RADIUS, None ??? Port authentication is performed first using the RADIUS server. If the port is not authenticated, then no authentication method is used, and the session is permitted.
???Guest VLAN ??? Specifies whether the Guest VLAN is enabled on the device. The possible field values are:
???Enable ??? Enables using a Guest VLAN for unauthorized ports. If a Guest VLAN is enabled, the unauthorized port automatically joins the VLAN selected in the VLAN List field.
???Disable ??? Disables using a Guest VLAN for unauthorized ports. This is the default.
???VLAN List ??? When Guest VLAN is enabled, this field specifies which VLAN the guest will belong to.
???Interface ??? Contains an interface list.
???User Name ??? The user name as configured in the RADIUS server.
???Admin Interface Control ??? Defines the port authorization state. The possible field values are:
???Auto ??? Enables
???ForceAuthorized ??? Indicates the interface is in an authorized state without being authenticated. The interface
???ForceUnauthorized ??? Denies the selected interface system access by moving the interface into unauthorized state. The device cannot provide authentication services to the client through the interface.
???Current Interface Control ??? The currently configured port authorization state.
???Authentication Type ??? Specifies the type of authentication on the port. The possible field values are:
???802.1x Only ??? Sets the authentication type to 802.1x based authentication only.
???MAC Only ??? Sets the authentication type to MAC based authentication only.
???802.1x & MAC ??? Sets the authentication type to 802.1x based authentication and MAC based authentication.
???Dynamic VLAN Assignment ??? Indicates whether dynamic VLAN assignment is enabled for this port. This feature allows network administrators to automatically assign users to VLANs during the RADIUS server authentication. When a user is authenticated by the RADIUS server, the user is automatically joined to the VLAN configured on the RADIUS server.
???Port Lock and Port Monitor should be disabled when DVA is enabled.
???Dynamic VLAN Assignment (DVA) can occur only if a RADIUS server is configured, and port authentication is enabled and set to 802.1x
???If the Radius Accept Message doesn???t contain the supplicant???s VLAN, the supplicant is rejected.
???Authenticated ports are added to the supplicant VLAN as untagged.
???Authenticated ports remain unauthenticated VLAN and Guest VLAN members. Static VLAN configuration is not applied to the port.
???The following list of VLANs cannot participate in DVA: an Unauthenticated VLAN, a Dynamic VLAN that was created by GVRP, a Voice VLAN, a Default VLAN and a Guest VLAN.
???Network administrators can delete the supplicant VLAN while the supplicant is logged in. The supplicant is authorized during the next
???Guest VLAN ??? Specifies whether the Guest VLAN is enabled on the interface.
???Periodic Reauthentication ??? Reauthenticates the selected port periodically, when enabled. The reauthentication period is defined in the Reauthentication Period
???Reauthentication Period
???Reauthenticate Now ??? Permits immediate port reauthentication, when selected.
???Authentication Server Timeout
???Resending EAP Identity Request
???Quiet Period
???Supplicant Timeout
???Max EAP Requests
Displaying the Port Based Authentication Table
1Display the Port Based Authentication page.
2Click Show All.
The Port Based Authentication Table opens:
98 Update with your book title
Figure
Termination Cause ??? The reason for which the port authentication was terminated. Copy To Checkbox ??? Copies port parameters from one port to the selected ports.
Select All ??? Selects all ports in the Port Based Authentication Table.
Copying Parameters in the Port Based Authentication Table
1Open the Port Based Authentication page.
2Click Show All.
The Port Based Authentication Table opens.
3Select the interface in the Copy Parameters from field.
4Select an interface in the Port Based Authentication Table.
5Select the Copy to check box to define the interfaces to which the Port based authentication parameters are copied.
6Click Apply Changes.
The parameters are copied to the selected port in the Port Based Authentication Table, and the device is updated.
Configuring Advanced Port Based Authentication
The Multiple Hosts page provides information for defining advanced port based authentication settings for specific ports. To open the Multiple Hosts, click Switch ???Network Security ??? Multiple Hosts.
Figure
???Port ??? The port number for which Advanced Port Based Authentication is enabled.
???Host Authentication ??? Defines the host authentication type. The possible fields are:
???Single ??? Enables a single authorized host for
???Multiple Host ??? Enables a single host to authorize multiple hosts for
???Multiple Session ??? Enables a single authorized host for
???Action on Single Host Violation ??? Defines the action to be applied to packets arriving in
???Forward ??? Forwards the packets from an unknown source, however, the MAC address is not learned.
???Discard ??? Discards the packets from any unlearned source. This is the default value.
???Shutdown ??? Discards the packet from any unlearned source and locks the port. Ports remain locked until they are activated, or the device is reset.
???Traps ??? Enables or disables sending traps to the host if a violation occurs.
100 Update with your book title
???Trap Frequency
???Status ??? The host status. The possible field values are:
???Unauthorized ??? Clients (supplicants) have full port access.
???Authorized ??? Cents (supplicants) have limited port access.
???Number of Violations ??? The number of packets that arrived on the interface in
Displaying the Multiple Hosts Table
1Open the Multiple Hosts page.
2Click Show All.
The Multiple Hosts Table opens:
Figure
Authenticating Users
The Authenticated Users page displays user port access lists. To open the Authenticated Users page, click Switch ??? Network Security ??? Authenticated Users.
Figure
???User Name ??? List of users authorized via the RADIUS Server.
???Port ??? The port number(s) used for authentication - per user name.
???Session Time ??? The amount of time the user was logged on to the device. The field format is Day:Hour:Minute:Seconds, for example, 3 days: 2 hours: 4 minutes: 39 seconds.
???Authentication Method ??? The method by which the last session was authenticated. The possible field values are:
???Remote ??? The user was authenticated from a remote server.
???None ??? The user was not authenticated.
???MAC Address ??? The client (supplicant) MAC address.
Displaying the Authenticated Users Table
1Open the Add User Name page.
2Click Show All.
The Authenticated Users Table opens:
Figure
102 Update with your book title
Configuring Ports
The Ports page contains links to port functionality pages including advanced features, such as Green Ethernet, Storm Control and Port Mirroring. To open the Ports page, click Switch ??? Ports.
Defining Port Parameters
The Port Configuration page contains fields for defining port parameters. To open the Port Configuration page, click Switch ??? Ports ??? Port Configuration in the tree view.
Figure
???Port ??? The port number for which port parameters are defined.
???Description
???Port Type ??? The type of port.
???Admin Status ??? Enables or disables traffic forwarding through the port. The new port status is displayed in the Current Port Status field.
???Current Port Status ??? Specifies whether the port is currently operational or
???Operational Status ??? The port operational status. Possible field values are:
???Active ??? The port is currently active and is currently receiving and transmitting traffic.
???Disable ??? The port is currently disabled, and is not currently receiving or transmitting traffic.
???Admin Speed ??? The configured rate for the port. The port type determines what speed setting options are available. Admin speed can only be designated when auto negotiation is disabled on the configured port.
???Current Port Speed ??? The actual currently configured port speed (bps).
???Admin Duplex ??? The port duplex mode can be either Full or Half. Full indicates that the interface supports transmission between the device and its link partner in both directions simultaneously. Half indicates that the interface supports transmission between the device and the client in only one direction at a time.
???Current Duplex Mode ??? The currently configured port duplex mode.
???Auto Negotiation ??? Enables Auto Negotiation on the port. Auto Negotiation is a protocol between two link partners that enables a port to advertise its transmission rate, duplex mode and flow control abilities to its partner.
???Current Auto Negotiation ??? The currently configured Auto Negotiation setting.
???Admin Advertisement ??? The speed that the port advertises. Options include Maximum Capacity, 10 10 MB
???Current Advertisement ??? The port advertises its speed to its neighbor port to start the negotiation process. The possible field values are those specified in the Admin Advertisement field.
???Neighbor Advertisement ??? Indicates the neighboring port???s advertisement settings. The field values are identical to the Admin Advertisement field values.
???Back Pressure ??? Enables Back Pressure mode on the port. Back Pressure mode is used with Half Duplex mode to disable ports from receiving messages.
???Current Back Pressure ??? The currently configured Back Pressure setting.
???Flow Control ??? Enables or disables flow control or enables the auto negotiation of flow control on the port. Operates when port is in Full duplex mode.
???Current Flow Control ??? The currently configured Flow Control setting.
???MDI/MDIX ??? Allows the device to decipher between crossed and uncrossed cables.
Hubs and switches are deliberately wired opposite the way end stations are wired, so that when a hub or switch is connected to an end station, a straight through Ethernet cable can be used, and the pairs are match up properly. When two hubs/switches are connected to each other, or two end stations are connected to each other, a crossover cable is used ensure that the correct pairs are connected. The possible field values are:
???Auto ??? Used to automatically detect the cable type.
???MDI (Media Dependent Interface) ??? Used for end stations.
???MDIX (Media Dependent Interface with Crossover) ??? Used for hubs and switches.
???Current MDI/MDIX??? The currently configured device MDI/MDIX settings.
???LAG ??? Specifies if the port is part of a LAG.
104 Update with your book title
Defining Port Parameters
1Open the Port Configuration page.
2Select a port in the Port Field.
3Define the remaining fields.
4Click Apply Changes.
The port parameters are saved to the device.
Modifying Port Parameters
1Open the Port Configuration page.
2Select a port in the Port Field.
3Modify the remaining fields.
4Click Apply Changes.
The port parameters are saved to the device.
Displaying the Port Configuration Table:
1Open the Port Configuration page.
2Click Show All.
The Ports Configuration Table opens:
Figure
Aggregating Ports
Load Balancing enables the even distribution of data and/or processing packets across available network resources. For example, load balancing may distribute the incoming packets evenly to all servers, or redi- rect the packets to the next available server. Load Balancing is configured on the "LAG Configuration" on page 106 page.
LAGs can be configured according to the following load balancing types: Layer 2, or Layer 2 and Layer 3 or Layer3.
The LAG Configuration page contains fields for configuring parameters for configured LAGs. The device supports up to four LAGs, each having six members.
For information about Link Aggregated Groups and assigning ports to LAGs, refer to Aggregating Ports.
To open the LAG Configuration page, click Switch??? Ports??? LAG Configuration in the tree view.
If port configuration is modified while the port is a LAG member, the configuration change is only effective after the port is removed from the LAG.
Figure
The LAG Configuration page contains the following fields:
???Load Balance ??? Indicates the load balancing type enabled on the LAG. The possible field values are:
???Layer 2 ??? Enables load balancing based on static and dynamic MAC addresses.
???Layer 3 ??? Enables load balancing based on source and destination IP addresses.
???Layer
???LAG ??? The LAG number.
???LAG Mode ??? Indicates that the LAG mode is static.
???Description
???LAG Type ??? The port types that comprise the LAG.
106 Update with your book title
???Admin Status ??? Enables or disables traffic forwarding through the selected LAG.
???Current LAG Status ??? Indicates if the LAG is currently operating.
???Operational Status ??? Operational status of the LAG.
???Admin Auto Negotiation ??? Enables or disables Auto Negotiation on the LAG.
???Current Auto Negotiation ??? The currently configured Auto Negotiation setting.
???Admin Speed ??? The speed at which the LAG is operating.
???Current LAG Speed ??? The currently configured speed at which the LAG is operating.
???Admin Advertisement ??? The speed that the LAG advertises. Options include Maximum Capacity, 10 MB
???Current Advertisement ??? The port advertises its speed to its neighbor port to start the negotiation process. The possible field values are those specified in the Admin Advertisement field.
???Neighbor Advertisement ??? Indicates the neighboring port???s advertisement settings. The field values are identical to the Admin Advertisement field values.
???Admin Flow Control ??? Enables/disables flow control, or enables the auto negotiation of flow control on the LAG.
???Current Flow Control ??? The
Defining LAG Parameters
1Open the LAG Configuration page.
2Select a LAG in the LAG field.
3Define the fields.
4Click Apply Changes.
The LAG parameters are saved to the device.
Modifying LAG Parameters
1Open the LAG Configuration page.
2Select a LAG in the LAG field.
3Modify the fields.
4Click Apply Changes.
The LAG parameters are saved to the device.
Displaying the LAG Configuration Table:
1Open the LAG Configuration page.
2Click Show All.
The LAG Configuration Table opens:
Figure
Configuring Green Ethernet
Green Ethernet, also known as Energy Efficient Ethernet, is an effort to make networking equipment environmentally friendly, specifically by reducing power usage of Ethernet connections. The following methods are supported by the device:
???
???
These methods are relevant for copper cables only, and are incompatible with fiber cable or when the link is set to
The
To open the Green Ethernet Configuration page, click Switch??? Ports??? Green Ethernet Configuration in the tree view.
108 Update with your book title
Figure
???Cumulative Energy Saved ??? The total amount of energy saved since the last reset. This amount is equal to the saved power multiplied by the time period in hours.
??? Reset ??? Click to set the Cumulative Power Saved counter back to 0.
???Link Down Energy Saving Mode ??? Indicates whether the
???Link
???Current Power Consumption ??? The power currently consumed by all ports (including both those with links up and links down).
???Power Saving ??? The percentage of power saved. For example, a Power Saving value of 14% indicates that just 86% of the power that would normally be used (without Green Ethernet) is currently being used.
The Green Ethernet Ports Table includes the following port energy saving information:
???Port ??? Indicates the port.
???
???Admin ??? Whether the
???Oper ??? Whether
???Reason ??? If Admin indicates that
???
???Admin ??? Whether the
???Oper ??? Whether
???Reason ??? If Admin indicates that
???Cable Length ??? The
Enabling Green Ethernet on the Device
1Open the Green Ethernet Configuration page.
2Enable the desired energy saving methods.
3Click Apply Changes.
Green Ethernet is enabled on the device.
Enabling Storm Control
A Broadcast Storm is a result of an excessive amount of broadcast messages simultaneously transmitted across a network by a single port. Forwarded message responses are heaped onto the network, straining network resources or causing the network to time out.
The system measures the incoming unknown Unicast, Broadcast and Multicast frame rate separately on each port, and discard frames when the rate exceeds a
The Storm Control page provides fields for enabling and configuring Storm Control. To open the Storm Control page, click Switch??? Ports??? Storm Control in the tree view.
110 Update with your book title
Figure
???Port ??? The port from which storm control is enabled.
???Broadcast Control ??? Enables or disables forwarding broadcast packet types on the device.
???Mode ??? Specifies the Broadcast mode currently enabled on the device. The possible field value are:
???Unknown Unicast, Multicast & Broadcast ??? Counts unknown Unicast, Multicast, and Broadcast traffic.
???Multicast & Broadcast ??? Counts Broadcast and Multicast traffic together.
???Broadcast Only ??? Counts only Broadcast traffic.
???Rate Threshold
Enabling Storm Control on the Device
1Open the Storm Control page.
2Select an interface on which to implement storm control.
3Define the fields.
4Click Apply Changes.
The Storm Control is enabled on the device.
Displaying the Storm Control Table
1Open the Storm Control page.
2Click Show All.
The Storm Control Table opens:
Figure
Defining Port Mirroring Sessions
Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port or a number of ports (source port or ports) to a monitoring (destination) port.
Port mirroring is configured by selecting a specific port to copy all packets, and different ports from which the packets copied. Before configuring Port Mirroring, note the following:
When a port is set to be a target port for a
Before configuring Port Mirroring, note the following:
???Monitored port cannot operate faster than the monitoring port.
???All the RX/TX packets should be monitored to the same port.
The following restrictions apply to ports configured to be destination ports:
???Ports cannot be configured as a source port.
???Ports cannot be a LAG member.
???IP interfaces are not configured on the port.
???GVRP is not enabled on the port.
???The port is not a VLAN member.
???Only one destination port can be defined.
112 Update with your book title
The following restrictions apply to ports configured to be source ports:
???Source Ports cannot be a LAG member.
???Ports cannot be configured as a destination port.
???All packets are transmitted tagged from the destination port.
???Monitored all RX/TX packets to the same port.
To open the Port Mirroring page, click Switch??? Ports??? Port Mirroring in the tree view.
Figure
???Destination Port ??? The port number to which port traffic is copied.
???Source Port ??? Defines the port number from which port traffic is mirrored.
???Type ??? Indicates if the source port is RX, TX, or both RX and TX.
???Status ??? Indicates if the port is currently monitored (Active) or not monitored (notReady). There are four monitoring sessions.
???Remove ??? When selected, removes the port mirroring session.
Adding a Port Mirroring Session
1Open the Port Mirroring page.
2Click Add.
The Add Source Port page opens.
3Select the destination port from the Destination Port
4Select the source port from the Source Port
5Define the Type field.
6Click Apply Changes.
The new source port is defined, and the device is updated.
Deleting a Copy Port from a Port Mirroring Session
1Open the Port Mirroring page.
2Select the Remove check box.
3Click Apply Changes.
The selected port mirroring session is deleted, and the device is updated.
Configuring Address Tables
MAC addresses are stored in the Dynamic Address database. A packet addressed to a destination stored in the database is forwarded immediately to the port. The Dynamic Address Table can be sorted by interface, VLAN, and interface type. MAC addresses are dynamically learned as packets from sources arrive at the device. Addresses are associated with ports by learning the ports from the frame???s source address. Frames addressed to a destination MAC address that is not associated with any port are flooded to all ports of the relevant VLAN. In order to prevent the bridging table from overflowing, dynamic MAC addresses, from which no traffic is seen for a certain period, are erased. To open the Address Tables page, click Switch??? Address Table in the tree view.
Viewing Dynamic Addresses
The Dynamic Address Table contains fields for querying information in the dynamic address table, including the interface type, MAC addresses, VLAN, and table sorting. Packets forwarded to an address stored in the address table are forwarded directly to those ports.
The Dynamic Address Table also contains information about the aging time before a dynamic MAC address is erased, and includes parameters for querying and viewing the Dynamic Address list. The Current Address Table contains dynamic address parameters by which packets are directly forwarded to the ports.
To open the Dynamic Address Table, click Switch??? Address Table??? Dynamic Addresses Table in the tree view.
114 Update with your book title
Figure
???Address Aging
???Interface ??? Specifies the interface for which the table is queried. There are two interface types from which to select.
???Port ??? Specifies the port numbers for which the table is queried.
???LAG ??? Specifies the LAG for which the table is queried.
???MAC Address ??? Specifies the MAC address for which the table is queried.
???VLAN ID ??? Specifies the VLAN ID for which the table is queried.
???Address Table Sort Key ??? Specifies the means by which the Dynamic Address Table is sorted.
Redefining the Aging Time
1Open the Dynamic Address Table.
2Define the Aging Time field.
3Click Apply Changes.
The aging time is modified, and the device is updated.
Querying the Dynamic Address Table
1Open the Dynamic Address Table.
2Define the parameter by which to query the Dynamic Address Table. Entries can be queried by Port, MAC Address, or VLAN ID.
3Click Query.
The Dynamic Address Table is queried.
Sorting the Dynamic Address Table
1Open the Dynamic Address Table.
2From the Address Table Sort Key
3Click Query.
The Dynamic Address Table is sorted.
Configuring the Spanning Tree Protocol
Spanning Tree Protocol (STP) provides tree topography for any arrangement of bridges. STP also provides one path between end stations on a network, eliminating loops.
Loops occur when alternate paths exist between hosts. Loops in an extended network can cause bridges to forward traffic indefinitely, resulting in increased traffic and reducing network efficiency.
The devices support the following Spanning Tree protocols:
???Classic STP ??? Provides a single path between end stations, avoiding and eliminating loops. For more information on configuring Classic STP, see "Defining STP Global Settings" on page 116.
???Rapid STP ??? Detects and uses of network topologies that provide faster spanning tree convergence, without creating forwarding loops. For more information on configuring Rapid STP, see "Configuring Rapid Spanning Tree" on page 124.
To open the Spanning Tree pages, click Switch??? Spanning Tree in the tree view.
Defining STP Global Settings
The STP Global Settings page contains parameters for enabling and configuring STP operation on the device. To open the STP Global Settings page, click Switch??? Spanning Tree ??? Global Settings in the tree view.
116 Update with your book title
Figure
???Spanning Tree State ??? Enables or disables Spanning Tree on the device. The possible field values are:
???Enable ??? Enables Spanning Tree
???Disable ??? Disables Spanning Tree
???STP Operation Mode ??? The STP mode by which STP is enabled on the device. The possible field values are:
???Classic STP ??? Enables Classic STP on the device. This is the default value.
???Rapid STP ??? Enables Rapid STP on the device.
???BPDU Handling ??? Determines how BPDU packets are managed when STP is disabled on the port/ device. BPDUs are used to transmit spanning tree information. The possible field values are:
???Filtering ??? Filters BPDU packets when spanning tree is disabled on an interface.
???Flooding ??? Floods BPDU packets when spanning tree is disabled on an interface. This is the default value.
???Port Cost Default Values ??? Determines the Spanning Tree default path cost method. The possible field values are:
???Short ??? Specifies 1 through 65535 range for port path costs. This is the default value.
???Long ??? Specifies 1 through 200000000 range for port path costs.
???Priority
???Hello Time
???Max Age
???Forward Delay
???Bridge ID ??? Identifies the Bridge priority and MAC address.
???Root Bridge ID ??? Identifies the Root Bridge priority and MAC address.
???Root Port ??? The port number that offers the lowest cost path from this bridge to the Root Bridge. It is significant when the Bridge is not the Root. The default is zero.
???Root Path Cost ??? The cost of the path from this bridge to the root.
???Topology Changes Counts ??? Specifies the total amount of STP state changes that have occurred since the last reboot.
???Last Topology Change ??? The amount of time that has elapsed since the bridge was initialized or reset, and the last topographic change occurred. The time is displayed in a day hour minute second format, for example, 0 day 1 hour 34 minutes and 38 seconds.
Defining STP Global Parameters
1Open the STP Global Settings page.
2Select the port that needs to be enabled from the Select a Port
3Select Enable in the Spanning Tree State field.
4Select the STP mode in the STP Operation Mode field, and define the bridge settings.
5Click Apply Changes.
STP is enabled on the device.
Modifying STP Global Parameters
1Open the STP Global Settings page.
2Define the fields in the dialog.
3Click Apply Changes.
The STP parameters are modified, and the device is updated.
118 Update with your book title
Defining STP Port Settings
The STP Port Settings page contains fields for assigning STP properties to individual ports. To open the
STP Port Settings page, click Switch??? Spanning Tree??? Port Settings in the tree view.
Figure
???Select a Port ??? Port on which STP is enabled.
???STP ??? Enables or disables STP on the port.
???Fast Link ??? When selected, enables Fast Link mode for the port. If Fast Link mode is enabled for a port, the Port State is automatically placed in the Forwarding state when the port link is up. Fast Link mode optimizes the time it takes for the STP protocol to converge. STP convergence can take
???Root Guard ??? When checked, prevents devices outside the network core from being assigned the spanning tree root.
???Port State ??? The current port STP state. If enabled, the port state determines what forwarding action is taken on traffic. Possible port states are:
???Disabled ??? The port link is currently down.
???Blocking ??? The port is currently blocked and cannot be used to forward traffic or learn MAC addresses. Blocking is displayed when Classic STP is enabled.
???Listening ??? The port is currently in the listening mode. The port cannot forward traffic nor can it learn MAC addresses.
???Learning ??? The port is currently in the learning mode. The port cannot forward traffic however it can learn new MAC addresses.
???Forwarding ??? The port is currently in the forwarding mode. The port can forward traffic and learn new MAC addresses.
???Role ??? Displays the port role assigned by the STP algorithm to provide to STP paths. The possible field values are:
???Root ??? Provides the lowest cost path to forward packets to the root switch.
???Designated ??? Indicates the port or LAG through which the designated switch is attached to the LAN.
???Alternate ??? Provides an alternate path to the root switch from the root interface.
???Backup ??? Provides a backup path to the designated port path toward the Spanning Tree leaves. Backup ports occur only when two ports are connected in a loop by a
???Disabled ??? The port is not participating in the Spanning Tree.
???Speed ??? Speed at which the port is operating.
???Path Cost
???Default Path Cost ??? The default path cost of the port is automatically set by the port speed and the default path cost method.
The default values for long path costs are:
???Ethernet - 2000000
???Fast Ethernet - 200000
???Gigabit Ethernet - 20000
The default values for short path costs (short path costs are the default) are:
???Ethernet - 100
???Fast Ethernet - 19
???Gigabit Ethernet - 4
120 Update with your book title
???Priority
???Designated Bridge ID ??? The bridge priority and the MAC Address of the designated bridge.
???Designated Port ID ??? The selected port???s priority and interface.
???Designated Cost ??? The cost of the port participating in the STP topology. Ports with a lower cost are less likely to be blocked if STP detects loops.
???Forward Transitions ??? The number of times the port has changed from the Blocking state to the
Forwarding state.
???LAG ??? The LAG to which the port is attached.
Enabling STP on a Port
1Open the STP Port Settings page.
2Select Enabled in the STP Port Status field.
3Define the Fast Link, Path Cost, and the Priority fields.
4Click Apply Changes. STP is enabled on the port.
Modifying STP Port Properties
1Open the STP Port Settings page.
2Modify the Priority, Fast Link, Path Cost, and the Fast Link fields.
3Click Apply Changes.
The STP port parameters are modified, and the device is updated.
Displaying the STP Port Table
1Open the STP Port Settings page.
2Click Show All.
The STP Port Table opens.
Defining STP LAG Settings
The STP LAG Settings page contains fields for assigning STP aggregating port parameters. To open the
STP LAG Settings page, click Switch??? Spanning Tree??? LAG Settings in the tree view.
Figure
???Select a LAG ??? The
???STP ??? Enables or disables STP on the LAG.
???Fast Link ??? Enables Fast Link mode for the LAG. If Fast Link mode is enabled for a LAG, the LAG State is automatically placed in the Forwarding state when the LAG is up. Fast Link mode optimizes the time it takes for the STP protocol to converge. STP convergence can take
???Root Guard ??? When checked, prevents devices outside the network core from being assigned the spanning tree root.
122 Update with your book title
???LAG State ??? Current STP state of a LAG. If enabled, the LAG state determines what forwarding action is taken on traffic. If the bridge discovers a malfunctioning LAG, the LAG is placed in the Broken state. Possible LAG states are:
???Disabled ??? The LAG link is currently down.
???Blocking ??? The LAG is blocked and cannot be used to forward traffic or learn MAC addresses.
???Listening ??? The LAG is in the listening mode and cannot forward traffic or learn MAC addresses.
???Learning ??? The LAG is in the learning mode and cannot forward traffic, but it can learn new MAC addresses.
???Forwarding ??? The LAG is currently in the forwarding mode, and it can forward traffic and learn new MAC addresses.
???Broken ??? The LAG is currently malfunctioning and cannot be used for forwarding traffic.
???Role ??? Displays the port role assigned by the STP algorithm to provide to STP paths. The possible field values are:
???Root ??? Provides the lowest cost path to forward packets to the root switch.
???Designated ??? Indicates the port or LAG through which the designated switch is attached to the LAN.
???Alternate ??? Provides an alternate path to the root switch from the root interface.
???Backup ??? Provides a backup path to the designated port path toward the Spanning Tree leaves. Backup ports occur only when two ports are connected in a loop by a
???Disabled ??? The port is not participating in the Spanning Tree.
???Path Cost
???Default Path Cost ??? When selected, the LAG path cost returns to its default value.
???Priority ??? The priority value of the LAG. The priority value influences the LAG choice when a bridge has two looped ports. The priority value is between
???Designated Bridge ID ??? The bridge priority and the MAC Address of the designated bridge.
???Designated Port ID ??? The port priority and interface number of the designated port.
???Designated Cost ??? The cost of the designated bridge.
???Forward Transitions ??? The number of times the LAG State has changed from the Blocking state to a
Forwarding state.
Modifying the LAG STP Parameters
1Open the STP LAG Settings page.
2Select a LAG from the Select a LAG
3Modify the fields as desired.
4Click Apply Changes.
The STP LAG parameters are modified, and the device is updated.
Configuring Rapid Spanning Tree
While Classic Spanning Tree guarantees preventing L2 forwarding loops in a general network topology, convergence can take up to
RSTP has the following port states:
???Disabled
???Learning
???Discarding
???Forwarding
Rapid Spanning Tree is enabled on the STP Global Settings page. To open the Rapid Spanning Tree (RSTP) page, click Switch??? Spanning Tree??? Rapid Spanning Tree in the tree view.
124 Update with your book title
Figure
???Interface ??? Port or LAG on which Rapid STP is enabled.
???Role ??? The port role assigned by the STP algorithm in order to provide to STP paths. The possible field values are:
???Root ??? Provides the lowest cost path to forward packets to root device.
???Designated ??? The port or LAG via which the designated device is attached to the LAN.
???Alternate ??? Provides an alternate path to the root device from the root interface.
???Backup ??? Provides a backup path to the designated port path toward the Spanning Tree leaves. Backup ports occur only when two ports are connected in a loop. Backup ports also occur when a LAN has two or more connections connected to a shared segment.
???Disabled ??? The port is not participating in the Spanning Tree (the port???s link is down).
???Mode ??? Displays the STP mode by which STP is enabled on the device. The possible field values are:
???Classic STP ??? Enables Classic STP on the device. This is the default value.
???Rapid STP ??? Enables Rapid STP on the device.
???Multiple STP ??? Enables Multiple STP on the device.
???Fast Link Operational Status ??? Indicates if Fast Link is enabled or disabled for the port or LAG. If Fast Link is enabled for a port, the port is automatically placed in the forwarding state.
???
???Enable ??? Enables the device to establish
???Disable ??? Device establishes shared, half duplex links.
???Auto ??? Device automatically determines the state.
???
???Activate Protocol Migration Test ??? Select to run a Protocol Migration Test. The test identifies the STP mode of the interface connected to the selected interface.
???Checked ??? Runs a Protocol Migration Test on the interface after you click the Apply button.
???Unchecked ??? Does not run a Protocol Migration Test.
Enabling RSTP
1Open the Rapid Spanning Tree (RSTP) page.
2Define the
3Click Apply Changes.
Rapid STP is enabled, and the device is updated.
Configuring VLANs
VLANs are logical subgroups of a Local Area Network (LAN) created via software rather than defining a hardware solution. VLANs combine user stations and network devices into a single domain regardless of the physical LAN segment to which they are attached. VLANs allow network traffic to flow more efficiently within subgroups. VLANs managed through software reduces the amount of time in which network changes are implemented.
VLANs have no minimum number of ports, and can be created per device or any other logical connection combination, as VLANs are software based and not defined by physical attributes.
VLANs function at Layer 2. Since VLANs isolate traffic within the VLAN, a Layer 3 router functioning router is needed to allows traffic flow between VLANs. Layer 3 routers identify segments and coordinate with VLANs. VLANs are broadcast and Multicast domains. Broadcast and Multicast traffic is transmitted only in the VLAN in which the traffic is generated.
VLAN tagging provides a method of transferring VLAN information between VLAN groups. VLAN tagging attaches a tag to packet headers. The VLAN tag indicates to which VLAN the packet belongs. VLAN tags are attached to the packet by either the end station or by the network device. VLAN tags also contains VLAN network priority information. Combining VLANs and GVRP enables the automatic dispersal of VLAN information. To open the VLAN page, click Switch??? VLAN in the tree view.
Defining VLAN Members
The VLAN Membership page contains fields for defining port membership in the VLAN. The device supports 64 VLANs. All ports must have a defined PVID. If no other value is configured the default VLAN PVID is used. VLAN number 1 is the default VLAN, and cannot be deleted from the system. To open the VLAN Membership page, click Switch??? VLAN??? VLAN Membership in the tree view.
126 Update with your book title
Figure
???Show VLAN ??? Lists and displays specific VLAN information according to VLAN ID or VLAN name.
???VLAN Name ??? The
???Unauthorized Users ??? Enables or disables unauthorized users from accessing a VLAN.
???Remove VLAN ??? When selected, removes the VLAN from the VLAN Membership Table.
Adding New VLANs
1Open the VLAN Membership page.
2Click Add.
The Create New VLAN page opens.
Figure
3Enter the VLAN ID and name.
4Click Apply Changes.
The new VLAN is added, and the device is updated.
Modifying VLAN Membership Groups
1Open the VLAN Membership page.
2Select a VLAN from the Show VLAN
3Modify the fields as desired.
4Click Apply Changes.
The VLAN membership information is modified, and the device is updated.
Deleting VLAN Membership Groups
1 Open the VLAN Membership page.
2 Select a VLAN in the Show VLAN field.
3 Select the Remove VLAN check box.
4 Click Apply Changes.
The selected VLAN is deleted, and the device is updated.
VLAN Port Membership Table
The VLAN Port Membership Table contains a Port Table for assigning ports to VLANs. Ports are assigned VLAN membership by toggling through the Port Control settings. Ports can have the following values:
Table
The VLAN Port Membership Table displays the ports and the ports states, as well as LAGs. Ports which are LAG members are not displayed in the VLAN Port Membership Table.
Assigning Ports to a VLAN Group
1Open the VLAN Membership page.
2Click the VLAN ID or VLAN Name option button and select a VLAN from the
3Select a port in the Port Membership Table, and assign the port a value.
4Click Apply Changes.
The port is assigned to the VLAN group, and the device is updated.
Deleting a VLAN
1Open the VLAN Membership page.
2Click the VLAN ID or VLAN Name option button and select a VLAN from the
3Select the Remove VLAN check box.
4Click Apply Changes.
The selected VLAN is deleted, and the device is updated.
Defining VLAN Ports Settings
The VLAN Port Settings page contains fields for managing ports that are part of a VLAN. The port default VLAN ID (PVID) is configured on the VLAN Port Settings page. All untagged packets arriving to the device are tagged by the ports PVID.
To open the VLAN Port Settings page, click Switch??? VLAN??? Port Settings in the tree view.
Figure
???Port ??? The port number included in the VLAN.
???PVID
???Frame Type ??? Packet type accepted on the port. Possible values are:
???Admit Tag Only ??? Only tagged packets are accepted on the port.
???Admit All ??? Both tagged and untagged packets are accepted on the port.
???Ingress Filtering ??? Enables or disables Ingress filtering on the port. Ingress filtering discards packets that are destined to VLANs of which the specific port is not a member.
Assigning Port Settings
1Open the VLAN Port Settings page.
2Select the port to which settings need to be assigned from the Port
3Complete the remaining fields on the page
4Click Apply Changes.
The VLAN port settings are defined, and the device is updated.
130 Update with your book title
Displaying the VLAN Port Table
1Open the VLAN Port Settings page.
2Click Show All.
The VLAN Port Table opens.
Figure
Defining VLAN LAG Settings
The VLAN LAG Setting page provides parameters for managing LAGs that are part of a VLAN. VLANs can either be composed of individual ports or of LAGs. Untagged packets entering the device are tagged with the LAGs ID specified by the PVID. To open the VLAN LAG Setting page, click Switch??? VLAN??? LAG Settings in the tree view.
Figure
???LAG ??? The LAG number included in the VLAN.
???PVID ??? Assigns a VLAN ID to untagged packets. The possible field values are
???Frame Type ??? Packet type accepted by the LAG. Possible values are:
???Admit Tag Only ??? Only tagged packets are accepted by the LAG.
???Admit All ??? Tagged and untagged packets are both accepted by the LAG.
???Ingress Filtering ??? Enables or disables Ingress filtering by the LAG. Ingress filtering discards packets that are destined to VLANs of which the specific LAG is not a member.
Assigning VLAN LAG Settings:
1Open the VLAN LAG Setting page.
2Select a LAG from the LAG
3Click Apply Changes.
The VLAN LAG parameters are defined, and the device is updated.
Displaying the VLAN LAG Table
1Open the VLAN LAG Setting page.
2Click Show All.
The VLAN LAG Table opens.
132 Update with your book title
Aggregating Ports
Port Aggregation optimizes port usage by linking a group of ports together to form a single Link Aggregated Group (LAG). Port Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. The device supports up to four LAGs, each having six members.
Each LAG is composed of ports of the same speed, set to
The device provides LAG Load Balancing based on both source MAC addresses and destination MAC addresses.
Aggregated Links are treated by the system as a single logical port. Specifically, the Aggregated Link has similar port attributes to a
The following guidelines should be followed when adding ports to a LAG:
???There is no Layer 3 interface defined on the port.
???The port does not belong to any VLAN.
???The port does not belong to any other LAG.
???The port is not a mirrored port.
???The port's 802.1p priority is equal to LAGs 802.1p priority.
???QoS Trust is not disabled on the port.
???GVRP is not enabled.
The device uses a hash function to determine which frames are carried on which
Each Aggregated Link has an Aggregated Link Port Type, including Gigabit Ethernet ports. Ports can be added to an Aggregated Link only if they are the same port type. When ports are removed from an Aggregated Links, the ports revert to the original port settings. To open the Link Aggregation page, click
Switch??? Link Aggregation in the tree view.
Defining LAG Membership
The LAG Membership page contains fields for assigning ports to LAGs. LAGs can include up to 6 ports. When a port is added to a LAG, the port acquires the LAG???s properties. If the port cannot be configured with the LAG properties, a trap is generated and the port operates with its default settings.
The LAG Membership page contains fields for assigning ports to LAGs. To open the LAG Membership page, click Switch??? Link Aggregation??? LAG Membership in the tree view.
Figure
???LAG ??? Adds a port to a LAG, and indicates the specific LAG to which the port belongs.
Configuring a Port to a LAG
1Open the LAG Membership page.
2In the LAG row (the second row), toggle the button to a specific number to aggregate or remove the port to that LAG number.
3Click Apply Changes.
The port is added to the LAG, and the device is updated.
Multicast Forwarding Support
Multicast forwarding allows a single packet to be forwarded to multiple destinations. L2 Multicast service is based on L2 switch receiving a single packet addressed to a specific Multicast address. Multicast forwarding creates copies of the packet, and transmits the packets to the relevant ports.
Filtering L2 Multicast packets enables forwarding of Layer 2 packets to interfaces. If Multicast filtering is disabled, Multicast packets are flooded to all relevant ports. Forwarding L2 Multicast packets is enabled by default, and not configurable. The system supports Multicast filtering for 64 Multicast groups.
To open the Multicast Support page, click Switch??? Multicast Support in the tree view.
134 Update with your book title
Defining Multicast Global Parameters
Layer 2 switching forwards Multicast packets to all relevant VLAN ports by default, treating the packet as a Multicast transmission. While this is functional, in the sense that all relevant ports/nodes receive a copy of the frame, it is potentially wasteful as ports/nodes may receive irrelevant frames only needed by a subset of the ports of that VLAN. Multicast forwarding filters enable forwarding of Layer 2 packets to port subsets, defined in the Multicast filter database.
When IGMP snooping is enabled globally, the switching ASIC is programmed to forward all IGMP packets to the CPU. The CPU analyzes the incoming packets and determines which ports are to join which Multicast groups, which ports have Multicast routers generating IGMP queries, and what routing protocols are forwarding packets and Multicast traffic. Ports requesting to join a specific Multicast group issues an IGMP report specifying that Multicast group. This results in the creation of the Multicast filtering database.
The Multicast Global Parameters page contains fields for enabling Bridge Multicast Filtering and IGMP Snooping on the device. To open the Multicast Global Parameters page, click Switch??? Multicast Support??? Global Parameters in the tree view.
Figure
???Bridge Multicast Filtering ??? Enables or disables bridge Multicast filtering. Disabled is the default value. IGMP Snooping can be enabled only if Bridge Multicast Filtering is enabled.
???IGMP Snooping Status ??? Enables or disables IGMP Snooping on the device. Disabled is the default value.
Enabling Bridge Multicast Filtering on the Device
1Open the Multicast Global Parameters page.
2Select Enable in the Bridge Multicast Filtering field.
3Click Apply Changes.
Bridge Multicast is enabled on the device.
Enabling IGMP Snooping on the Device
1Open the Multicast Global Parameters page.
2Select Enable in the IGMP Snooping Status field.
3Click Apply Changes.
IGMP Snooping is enabled on the device.
Adding Bridge Multicast Address Members
The Bridge Multicast Group page displays the ports and LAGs attached to the Multicast service group in the Ports and LAGs tables. The Port and LAG tables also reflect the manner in which the port or LAGs joined the Multicast group. Ports can be added either to existing groups or to new Multicast service groups. The Bridge Multicast Group page permits new Multicast service groups to be created. The Bridge Multicast Group page also assigns ports to a specific Multicast service address group.
To open the Bridge Multicast Group page, click Switch??? Multicast Support??? Bridge Multicast Group in the tree view.
Figure
???VLAN ID ??? Identifies a VLAN and contains information about the Multicast group address.
???Bridge Multicast Address ??? Identifies the Multicast group MAC address/IP address.
???Remove ??? When selected, removes a Bridge Multicast address.
136 Update with your book title
???Ports ??? Port that can be added to a Multicast service.
???LAGs ??? LAGs that can be added to a Multicast service.
The following table contains the IGMP port and LAG members management settings:
Adding Bridge Multicast Addresses
1Open the Bridge Multicast Group page.
2Click Add.
The Add Bridge Multicast Group page opens:
Figure
3 Define the VLAN ID and New Bridge Multicast Address fields.
4Toggle a port to S to join the port to the selected Multicast group.
5Toggle a port to F to forbid adding specific Multicast addresses to a specific port.
6Click Apply Changes.
The bridge Multicast address is assigned to the Multicast group, and the device is updated.
Defining Ports to Receive Multicast Service
1Open the Bridge Multicast Group page.
2Define the VLAN ID and the Bridge Multicast Address fields.
3Toggle a port to S to join the port to the selected Multicast group.
4Toggle a port to F to forbid adding specific Multicast addresses to a specific port.
5Click Apply Changes.
The port is assigned to the Multicast group, and the device is updated.
Assigning LAGs to Receive Multicast Service
1Open the Bridge Multicast Group page.
2Define the VLAN ID and the Bridge Multicast Address fields.
3Toggle the LAG to S to join the LAG to the selected Multicast group.
4Toggle the LAG to F to forbid adding specific Multicast addresses to a specific LAG.
5Click Apply Changes.
The LAG is assigned to the Multicast group, and the device is updated.
Assigning Multicast Forward All Parameters
The Bridge Multicast Forward All page contains fields for attaching ports or LAGs to a device that is attached to a neighboring Multicast router/switch. Once IGMP Snooping is enabled, Multicast packets are forwarded to the appropriate port or VLAN.
To open the Bridge Multicast Forward All page, click Switch??? Multicast Support??? Bridge Multicast Forward All page in the tree view.
138 Update with your book title
Figure
???VLAN ID ??? Identifies a VLAN.
???Ports ??? Ports that can be added to a Multicast service.
???LAGs ??? LAGs that can be added to a Multicast service. The contains the settings for managing router and port settings.
Attaching a Port to a Multicast Router or Switch
1Open Bridge Multicast Forward All page.
2Define the VLAN ID field.
3Select a port in the Ports table, and assign the port a value.
4Click Apply Changes.
The port is attached to the Multicast router or switch.
Attaching a LAG to a Multicast Router or Switch
1Open Bridge Multicast Forward All page.
2Define the VLAN ID field.
3Select a port in the LAGs table, and assign the LAG a value.
4Click Apply Changes.
The LAG is attached to the Multicast router or switch.
140 Update with your book title
IGMP Snooping
The IGMP Snooping page contains fields for adding IGMP members. To open the IGMP Snooping page, click Switch??? Multicast Support??? IGMP Snooping in the tree view.
Figure
???VLAN ID ??? Specifies the VLAN ID.
???IGMP Snooping Status ??? Enables or disables IGMP snooping on the VLAN.
???Auto Learn ??? Enables or disables Auto Learn on the device.
???IGMP Querier Status ??? Enables or disables the IGMP Querier. The IGMP Querier simulates the behavior of a multicast router, allowing snooping of the layer 2 multicast domain even though there is no multicast router.
???Querier IP Address ??? IP address of the IGMP Querier. Use either use the VLAN???s IP Interface address or define a unique IP address which will be used as a source address of Querier.
???Host Timeout
???Multicast Router Timeout
???Leave Timeout
Enabling IGMP Snooping on the Device
1Open the IGMP Snooping page.
2Select the VLAN ID for the device on which IGMP snooping needs to be enabled.
3Select Enable in the IGMP Snooping Status field.
4Complete the fields on the page.
5Click Apply Changes.
IGMP snooping is enabled on the device.
Displaying the IGMP Snooping Table
1Open the IGMP Snooping.
2Click Show All.
The IGMP Snooping Table opens.
Figure
142 Update with your book title
8
Viewing Statistics
The Statistic pages contains links to device information for RMON, and CPU utilization.
Viewing RMON Statistics
Remote Monitoring (RMON) contains links for viewing network information from a remote location. To open the RMON page, click Statistics/RMON??? RMON in the tree view.
Viewing RMON Statistics Group
The RMON Statistics Group page contains fields for viewing information about device utilization and errors that occurred on the device. To open the RMON Statistics Group page, click Statistics/RMON??? RMON??? Statistics in the tree view.
Figure
144 Update with your book title
???Interface ??? Specifies the port or LAG for which statistics are displayed.
???Refresh Rate ??? Amount of time that passes before the statistics are refreshed.
???Drop Events ??? Number of dropped events that have occurred on the interface since the device was last refreshed.
???Received Bytes (Octets) ??? Number of octets received on the interface since the device was last refreshed. This number includes bad packets and FCS octets, but excludes framing bits.
???Received Packets ??? Number of packets received on the interface, including bad packets, Multicast and broadcast packets, since the device was last refreshed.
???Broadcast Packets Received ??? Number of good broadcast packets received on the interface since the device was last refreshed. This number does not include Multicast packets.
???Multicast Packets Received ??? Number of good Multicast packets received on the interface since the device was last refreshed.
???CRC & Align Errors ??? Number of CRC and Align errors that have occurred on the interface since the device was last refreshed.
???Undersize Packets ??? Number of undersized packets (less than 64 octets) received on the interface since the device was last refreshed.
???Oversize Packets ??? Number of oversized packets (over 1518 octets) received on the interface since the device was last refreshed.
???Fragments ??? Number of fragments (packets with less than 64 octets, excluding framing bits, but including FCS octets) received on the interface since the device was last refreshed.
???Jabbers ??? Number of jabbers (packets longer than 1518 octets) received on the interface since the device was last refreshed.
???Collisions ??? Number of collisions received on the interface since the device was last refreshed.
???Frames of xx Bytes ??? Number of
Viewing Interface Statistics
1Open the RMON Statistics Group page.
2Select an interface type and number in the Interface field. The interface statistics are displayed.
Viewing Charts
The Chart page contains links for displaying statistics in a chart form. To open the page, click
Statistics??? Charts in the tree view.
Viewing the CPU Utilization
The CPU Utilization page contains information about the system???s CPU utilization and percentage of CPU resources consumed by each stacking member. Each stacking member is assigned a color on the graph.
The range of the utilization reading is from 0 to 200%. The maximum reading of 200% for a full duplex connection indicates that 100% of bandwidth of incoming and outgoing connections is used by the traffic traveling through the interface. The maximum reading for a half duplex connection is 100%.
To open the CPU Utilization page, click Statistics/RMON??? Charts??? CPU Utilization in the tree view.
Figure
The CPU Utilization page contains the following information:
???Refresh Rate ??? Amount of time that passes before the statistics are refreshed.
146 Update with your book title
9
Configuring Quality of Service
This section provides information for defining and configuring Quality of Service (QoS) parameters. To open the Quality of Service page, click Quality of Service in the tree view.
An implementation example that requires QoS includes certain types of traffic such as Voice, Video and
QoS is defined by:
???Classification ??? Specifies which packet fields are matched to specific values. All packets matching the
???Action ??? Defines traffic management where packets being forwarded are based on packet information, and packet field values such as VLAN priority (VPT) and DSCP (DiffServ Code Point).
VPT Tag Classification Information
VLAN Priority Tags are used to classify the packets by mapping packets to one of the output queues. VLAN Priority Tag to queue assignments are
Table
Packets arriving untagged are assigned a default VPT that is set on a per port basis. The assigned VPT is used to map the packet to the output queue and as the egress VPT.
DSCP values can be mapped to priority queues. The following table contains the default DSCP mapping to forwarding queue values:
Table
DSCP mapping is enabled on a
CoS Services
After packets are assigned to a specific queue, CoS services can be assigned to the queue(s). Output queues are configured with a scheduling scheme by one of the following methods:
???Strict Priority ??? Ensures that
For example, under Strict Priority, voice over IP traffic is forwarded before FTP or
The strict priority queue is emptied before the traffic in the remaining queues is forwarded.
???Weighted Round Robin ??? Ensures that a single application does not dominate the device forwarding capacity. Weighted Round Robin (WRR) forwards entire queues in a Round Robin order. Queue priorities are defined by the queue length. The longer the queue length, the higher the queue's forwarding priority.
For example, if four queues have queue weights of 1, 2, 4 and 8, packets with the highest forwarding priority are assigned to queue 4, and packets with the lowest forwarding priority assigned to queue 1. By providing highest forwarding priorities across 4 queues, WRR processes higher priority traffic, and ensures that
The scheduling scheme is enabled
148 Update with your book title
Defining CoS Global Parameters
Class of Service (CoS) global parameters are set from the CoS Settings page.
To open the CoS Settings page, click Quality of Service??? CoS Global Parameters ??? CoS Settings in the tree view.
Figure
???Cos Mode ??? Enables or disables managing network traffic using Quality of Service.
???Trust Mode ??? Determines which packet fields to use for classifying packets entering the device. When no rules are defined, the traffic containing the predefined packet field (CoS or DSCP) is mapped according to the relevant trust modes table. Traffic not containing a predefined packet field is mapped to best effort. The possible Trust mode field values are:
???CoS (802.1P) ??? The output queue assignment is determined by the IEEE802.1p VLAN priority tag (VPT) or by the default VPT assigned to a port.
???DSCP ??? The output queue assignment is determined by the DSCP field. Interface Trust settings override the global Trust mode setting.
Enabling Quality of Service:
1Open the CoS Settings page.
2Select Enable in the CoS Mode field.
3Click Apply Changes.
Class of Service is enabled on the device.
Selecting Trust:
1Open the CoS Settings page.
2Select Trust in the Trust Mode field.
3Click Apply Changes.
Trust is selected.
Defining QoS Interface Settings
The Interface Settings page contains fields for defining, per interface, if the selected Trust mode is to be activated. The default priority for incoming untagged packets is also selected in the Interface Settings page. To open the Interface Settings page, click Quality of Service ??? CoS Global Parameters???
Interface Settings in the tree view.
Figure
???Interface ??? The specific port or LAG to configure.
???Disable "Trust" Mode on Interface ??? Disables the Trust mode on the specified interface. This setting overrides the Trust mode configured on the device globally.
???Set Default CoS For Incoming Traffic To ??? Sets the default CoS value for packets with no value in VPT field. The CoS tag values are
Assigning QoS/CoS settings for an interface:
1Open the Interface Settings page.
2Select an interface in the Interface field.
3Define the fields.
4Click Apply Changes.
The CoS settings are assigned to the interface.
Displaying the QoS Interface Settings Table:
1 Open the Interface Settings page.
150 Update with your book title
2Click Show All.
The QoS Interface Settings Table page opens:
Figure
Defining Queue Settings
The QoS Queue Settings page contains fields for configuring the scheduling method by which the queues are maintained. To open the QoS Queue Settings page click Quality of Service??? CoS Global Parameters??? Queue Settings in the tree view.
Figure
???Queues ??? The Queue number.
???Strict Priority ??? Specifies if traffic scheduling is based strictly on the queue priority. The default is enabled.
???WRR ??? Specifies if traffic scheduling is based on the Weighted Round Robin (WRR) weights to egress queues. The default values are:
???8 for Queue 1
???4 for Queue 2
???2 for Queue 3
???1 for Queue 4
???WRR Weights ??? The WRR weight assigned to each queue.
???WRR Percentage ??? The WRR percentage of each queue.
Defining the Queue Settings
When Strict Priority and Weighted Round Robin are both used, begin Strict Priority assignment from the queues with the highest priority.
1Open the QoS Queue Settings page.
2Define the fields.
3Click Apply Changes.
The queue settings are defined, and the device is updated.
152 Update with your book title
Mapping CoS Values to Queues
The CoS to Queue Mapping Table page contains fields for classifying CoS settings to traffic queues. To open the CoS to Queue Mapping Table page, click Quality of Service??? CoS Global Parameters??? CoS to Queue in the tree view.
Figure
???Class of Service ??? Specifies the CoS priority tag values, where zero is the lowest value and 7 is the highest value.
???Queue ??? The traffic forwarding queue to which the CoS priority is mapped. Four traffic priority queues are supported.
???Restore Defaults ??? Restores the device factory defaults for mapping CoS values to a forwarding queue.
Mapping a CoS value to a Queue
1Open the CoS to Queue Mapping Table page.
2Select a CoS entry.
3Define the queue number in the Queue field.
4Click Apply Changes.
The CoS value is mapped to a queue, and the device is updated.
Mapping DSCP Values to Queues
The DSCP to Queue page provides fields for defining output queue to specific DSCP fields. For the list of the DSCP default queue settings, see "DSCP to Queue Mapping Table Default Values" on page 148. To open the DSCP to Queue page, click Quality of Service??? CoS Global Parameters??? DSCP to Queue in the tree view.
Figure
???DSCP In ??? The values of the DSCP field within the incoming packet.
???Queue ??? The queue to which packets with the specific DSCP value is assigned. The values are
Mapping a DSCP value and assigning priority queue:
1Open the DSCP to Queue page.
2Select a value in the DSCP In column.
3Define the Queue fields.
4Click Apply Changes.
The DSCP is overwritten, and the value is assigned to a forwarding queue.
Restoring default values:
154 Update with your book title
1Open the DSCP to Queue page.
2Check the Restore Defaults checkbox.
3Click Apply Changes.
The default values are restored.
156 Update with your book title
A
Managing the Device Using the CLI
A limited number of CLI commands are available for managing the device. These commands are a subset of the options available via the web interface.
Accessing the Device Through the CLI
The device can be managed over a direct connection to the console port or via a Telnet connection. Using the CLI is similar to entering commands on a Linux system. If access is via a Telnet connection, ensure the device has an IP address defined and that the workstation used to access the device is connected to the device prior to beginning using CLI commands.
For information about configuring an initial IP Address, see "Static IP Address and Subnet Mask."
NOTE: Ensure the client is loaded, before using the CLI.
NOTE: CLI can be used to manage the device only when the device is in Managed mode. For more information about management modes, see "Management Modes" on page 49.
Console Connection
1Power on the device and wait until the startup is complete.
2When the Console> prompt displays, type enable and press <Enter>.
3Configure the device and enter the necessary commands to complete the required tasks.
4When finished, exit the session with the quit or exit command.
NOTE: If a different user logs into the system in the Privilege EXEC command mode, the current user is logged off and the new user is logged in.
Telnet Connection
Telnet is a terminal emulation TCP/IP protocol. ASCII terminals can be virtually connected to the local device through a TCP/IP protocol network. Telnet is an alternative to a local login terminal where a remote login is required.
The device supports up to four simultaneous Telnet sessions. All CLI commands can be used over a telnet session.
To start a Telnet session:
1Select Start > Run. The Run window opens.
2 In the Run window, type Telnet <IP address> in the Open field. 3 Click OK to begin the Telnet session.
Using the CLI
This section provides information for using the CLI.
Command Mode Overview
The CLI is divided into command modes. Each command mode has a specific command set. Entering a question mark at the console prompt displays a list of commands available for that particular command mode.
In each mode, a specific command is used to navigate from one command mode to another.
During the CLI session initialization, the CLI mode is the User EXEC mode. Only a limited subset of commands are available in the User EXEC mode. This level is reserved for tasks that do not change the console configuration and is used to access configuration
The Privileged EXEC mode provides access to the device global configuration. For specific global configurations within the device, enter the next level, Global Configuration mode. A password is not required.
The Global Configuration mode manages the device configuration on a global level.
The Interface Configuration mode configures the device at the physical interface level. Interface commands which require subcommands have another level called the Subinterface Configuration mode. A password is not required.
User EXEC Mode
After logging into the device, the EXEC command mode is enabled. The
console>
NOTE: The default host name is console unless it has been modified during initial configuration.
The user EXEC commands permit connecting to remote devices, changing terminal settings on a temporary basis, performing basic tests, and listing system information.
To list the user EXEC commands, enter a question mark at the command prompt.
158 Dell PowerConnect 28xx Systems User Guide
Privileged EXEC Mode
Privileged access can be protected to prevent unauthorized access and ensure operating parameters. Passwords are displayed in the ***** format on the screen, and are case sensitive.
To access and list the Privileged EXEC Mode commands:
1At the prompt type enable and press <Enter>.
2When a password prompt displays, enter the password and press <Enter>.
The Privileged EXEC mode prompt displays as the device host name followed by #. For example: console#
To list the Privileged EXEC commands, type a question mark at the command prompt and press <Enter>.
To return from Privileged EXEC Mode to User EXEC Mode use any of the following commands: disable, exit/end, or <Ctrl><Z>.
The following example illustrates accessing privileged EXEC mode and then returning to the User EXEC mode:
console>enable
Enter Password: ******
console#
console#disable
console>
Use the exit command to move back to a previous mode. For example, from Interface Configuration mode to Global Configuration mode, and from Global Configuration mode to Privileged EXEC mode.
Global Configuration Mode
Global Configuration commands apply to system features, rather than a specific protocol or interface.
To access Global Configuration mode, at the Privileged EXEC Mode prompt, type configure and press <Enter>. The Global Configuration Mode displays as the device host name followed by (config) and the pound sign #.
console(config)#
To list the Global Configuration commands, enter a question mark at the command prompt.
To return from Global Configuration mode to Privileged EXEC mode, type the exit command or use the <Ctrl><Z> command.
The following example illustrates how to access Global Configuration Mode and return back to the Privileged EXEC Mode:
console#
console#configure
console(config)#exit
console#
Interface Configuration Mode
Interface configuration commands modify specific IP interface settings, including
Interface Mode
The Interface mode contains commands that configure the interface. The Global Configuration mode command interface ethernet is used to enter the interface configuration mode. The following is an example of the Interface mode prompt:
console> enable
console# configure
console(config)# interface ethernet g18
VLAN Mode
The VLAN mode contains commands to create and configure a VLAN as a whole, for example, to create a VLAN and apply an IP address to the VLAN. The following is an example of the VLAN mode prompt:
Console (config)# interface vlan 1
Console
Port Channel Mode
The Port Channel mode contains commands for configuring Link Aggregation Groups (LAG). The following is an example of the Port Channel mode prompt:
Console (config)# interface
Console
160 Dell PowerConnect 28xx Systems User Guide
CLI Commands
Command:
To specify the device???s asset tag, use the
Syntax Description
???
Parameters range
???
Command: copy
To copy any file from a source to a destination, use the copy Privileged EXEC command. copy
Syntax Description
???
???
Parameters Range
???
???
The following table shows keywords and URL prefixes:
Table
Command Mode
Privileged EXEC
Usage Guidelines
The location of a file system dictates the format of the source or destination URL.
The entire copying process may take several minutes and differs from protocol to protocol and from network to network.
If the egress interface is not specified, the default interface will be selected. Specifying interface zone=0 is equal to not defining an egress interface.
Understanding Invalid Combinations of Source and Destination
Some invalid combinations of source and destination exist. Specifically, you cannot copy the following:
???If the source file and destination file are the same file.
???xmodem: can't be destination. Can be copied to image, boot and null: only.
???tftp: can't be source and destination on the same copy.
???*.prv files can't be copied.
???Copy to or from the slave units is for image and boot files only.
copy Character Descriptions
Table
Command:
To switch to debug mode, use the
Syntax Description
This command has no arguments or keywords.
Command Mode
Privileged EXEC
162 Dell PowerConnect 28xx Systems User Guide
Command: do
To execute an
do command
Syntax Description
command ??? The EXEC command to be executed.
Command modes
All configuration modes
Command: end
To end the current configuration session and return to privileged EXEC mode, use the end global configuration command.
end
Syntax Description
This command has no arguments or key words
Command Mode
All configuration modes
Default value
This command has no default setting.
Example
Console#
Command: exit (configuration)
To exit any configuration mode to the next highest mode in the CLI mode hierarchy, use the exit command in any configuration mode.
exit
Syntax Description
This command has no arguments or key words
Command Mode
All configuration modes
Default value
This command has no default setting.
Examples
Console(config)# exit
Console#
Command: exit (EXEC)
To close an active terminal session by logging off the router, use the exit command in EXEC mode.
exit
Syntax Description
This command has no arguments or key words
Command Mode
EXEC
Default value
This command has no default setting.
Example
Console> exit
Command: help
To display a brief description of the help system, enter the help command.
help
Syntax Description
This command has no arguments or key words
Command Mode
All command modes.
164 Dell PowerConnect 28xx Systems User Guide
Default value
This command has no default setting.
Command: interface ethernet
To configure an interface type and enter interface configuration mode, use the interface ethernet global configuration command.
interface ethernet interface
Syntax Description
???interface ??? The full syntax is: port.
Parameters range
???interface ??? Valid Ethernet port.
Command Modes
Global Configuration
Example
Console(config)# interface ethernet g1
Command: interface
To configure a
interface
Syntax Description
???
Parameters range
???
Command Modes
Global configuration
Usage Guidelines
Commands under the interface range context are executed independently on each interface in the range: If the command returns an error on one of the interfaces, it will not stop the execution of the command on other interfaces.
Example
Console (config)# interface
Console
Command: interface vlan
To configure a vlan type and enter interface configuration mode, use the interface vlan global configuration command.
interface vlan
Syntax Description
???
Parameters range
???
Command Modes
Global Configuration
Usage Guidelines
In case the VLAN doesn't exist ("ghost VLAN") only partial list of the commands would be available under the interface VLAN context.
The commands that are supported for VLAN that doesn't exist are:
1IGMP snooping control
2Bridge multicast configuration "Example
In the following example, for VLAN 1, the address is 131.108.1.27 and the subnet mask is 255.255.255.0:
Console (config)# interface vlan 1
Console
Command: ip address
To set the IP address of a device interface, use the ip address interface configuration command.
ip address
Syntax Description
???
166 Dell PowerConnect 28xx Systems User Guide
Parameters range
???
Command: ip
To define a default gateway (router), use the ip
ip
Syntax Description
Parameters range
Defaults
No default gateway is defined.
Command Modes
Global configuration
Interface configuration
Command: login
To change a login username, use the login command in EXEC mode.
login
Syntax Description
This command has no arguments or keywords.
Command Mode
EXEC
Command: ping
Use the ping command to send ICMP echo request packets to another node on the network. ping
Syntax Description
???
???hostname ??? Hostname to ping.
???packet_size ??? Number of bytes in a packet. The default is 56 bytes. The actual packet size will be eight bytes larger than the size specified because the switch adds header information.
???packet_count ??? Number of packets to send, from 1 to 65535 packets. The default is 4 packets. If 0 is entered it pings until stopped.
???time_out ??? Timeout in milliseconds to wait for each reply, from 50 to 65535 milliseconds. The default is 2000 milliseconds.
Parameters range
???hostname ??? 1 - 158 characters (Max label size: 63)
???packet_size ??? IPv4: 56 - 1472
???packet_count ??? 0 - 65535
???time_out ??? 50 - 65535
Command Mode
EXEC
Default value
This command has no default setting.
Usage Guidelines
Press Esc to stop pinging. Following are sample results of the ping command:
Destination does not
Destination
Examples
Console> ping 10.1.1.1
Pinging 10.1.1.1 with 64 bytes of data:
64 bytes from 10.1.1.1: icmp_seq=0. time=11 ms
64 bytes from 10.1.1.1: icmp_seq=1. time=8 ms
64 bytes from 10.1.1.1: icmp_seq=2. time=8 ms
64 bytes from 10.1.1.1: icmp_seq=3. time=7 ms
168 Dell PowerConnect 28xx Systems User Guide
4 packets transmitted, 4 packets received, 0% packet loss
Console> ping yahoo.com
Pinging yahoo.com [66.218.71.198] with 64 bytes of data:
64 bytes from 10.1.1.1: icmp_seq=0. time=11 ms
64 bytes from 10.1.1.1: icmp_seq=1. time=8 ms
64 bytes from 10.1.1.1: icmp_seq=2. time=8 ms
64 bytes from 10.1.1.1: icmp_seq=3. time=7 ms
4 packets transmitted, 4 packets received, 0% packet loss
Command: reload
To reload the operating system, use the reload EXEC command.
reload
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Default value
This command has no default setting.
Command: show
To display system and configuration information you can provide to the Technical Assistance Center when reporting a problem, use the show
show
Syntax Description
???memory ??? (Optional) Displays memory and processor state data.
???config ??? (Optional) Displays switch configuration within the CLI commands supported on the device.
Defaults
By default, this command displays the output for
Command Modes
EXEC
Usage Guidelines
NOTE: Avoid running multiple show
The show
If you specify the config keyword, the show
show clock show system show version
show system mode show ip interface
show interfaces configuration show interfaces status
show interfaces
show interfaces switchport show spanning tree
show bridge multicast
show dot1x users
170 Dell PowerConnect 28xx Systems User Guide
show interfaces counters show users
show sessions show logging file show logging
If you specify the memory keyword, the show
buffers info (like print os buff) memory info (like print os mem) proc info (like print os tasks)
Command:
Use the
Syntax Description
???community ??? Community string that acts like a password and permits access to the SNMP protocol.
???ro ??? Specifies
???rw ??? Specifies
???su ??? Specifies SNMP administrator access
???
Parameters range
???community ??? 1 - 20 chars
???
Default
No community is defined
Command Mode
Global configuration
Usage Guidelines
The logical key of the command is the pair (community,
Examples
Switch(conf)#
Command: username
To establish a
username name [password password] [level level] [encrypted] no username name
Syntax Description
???name ??? The name of the user.
???password ??? The authentication password for the user.
???level ??? Specifies the user level. If not specified the privilege level is 1.
???encrypted ??? Encrypted password you enter, copied from another device configuration.
Parameters range
???name ??? 1 - 20 characters.
???password ??? 1 - 159
???level ??? 1 - 15
Default
No user is defined.
Command modes
Global Configuration
Example
Console (config)# username bob password lee privilege 15
172 Dell PowerConnect 28xx Systems User Guide
Glossary
This glossary contains key technical words of interest.
A B C D E F G H I J L M N O P Q R S T U V W
A
Access Mode
Specifies the method by which user access is granted to the system.
Access Profiles
Allows network managers to define profiles and rules for accessing the device. Access to management functions can be limited to user groups, which are defined by the following criteria:
???Ingress interfaces
???Source IP address and/or Source IP subnets
ARP
Address Resolution Protocol. A TCP/IP protocol that converts IP addresses into physical addresses.
ASIC
Application Specific Integrated Circuit. A custom
chip designed for a specific application.
Asset Tag
Specifies the
Authentication Profiles
Sets of rules which that enables login to and authentication of users and applications.
Allows 10/100 Mpbs or 10/100/1000 Mbps Ethernet ports to establish for the following features:
???Duplex/ Half Duplex Mode
???Flow Control
???Speed
B
Back Pressure
A mechanism used with Half Duplex mode that enables a port not to receive a message.
Backplane
The main BUS that carries information in the device.
Bandwidth
Bandwidth specifies the amount of data that can be transmitted in a fixed amount of time. For digital devices, bandwidth is defined in Bits per Second (bps) or Bytes per Second.
Bandwidth Assignments
The amount of bandwidth assigned to a specific application, user, and/or interface.
Glossary 173
Baud
The number of signaling elements transmitted each second.
Best Effort
Traffic is assigned to the lowest priority queue, and packet delivery is not guaranteed.
Boot Version
The boot version.
BootP
Bootstrap Protocol. Enables a workstation to discover its IP address, an IP address of a BootP server on a network, or a configuration file loaded into the boot of a device.
BPDU
Bridge Protocol Data Unit. Provide bridging information in a message format. BPDUs are sent across device information with in Spanning Tree configuration. BPDU packets contain information on ports, addresses, priorities, and forwarding costs.
Bridge
A device that connect two networks. Bridges are hardware specific, however they are protocol independent. Bridges operate at Layer 1 and Layer 2 levels.
Broadcast Domain
Devices sets that receive broadcast frames originating from any device within a designated set. Routers bind Broadcast domains, because routers do not forward broadcast frames.
Broadcasting
A method of transmitting packets to all ports on a network.
Broadcast Storm
An excessive amount of broadcast messages simultaneously transmitted across a network by a single port. Forwarded message responses are heaped onto the network, overloading network resources or causing the network to time out.
For more information about broadcast storms, see "Configuring Load Balancing".
C
CDB
Configuration Data Base. A file containing a device???s configuration information.
Class of Service
Class of Service (CoS). Class of Service is the 802.1p priority scheme. CoS provides a method for tagging packets with priority information. A CoS value between
A overlapping transmission of two or more packets that collide. The data transmitted cannot be used, and the session is restarted.
Combo Ports
A single logical port with two physical connections, including an
174 Glossary
CLI
Command Line Interface. A set of line commands used to configure the system.
Communities
Specifies a group of users which retains the same system access rights.
CPU
Central Processing Unit. The part of a computer that processes information. CPUs are composed of a control unit and an ALU.
D
DHCP Client
An Internet host using DHCP to obtain configuration parameters, such as a network address.
DSCP
DiffServe Code Point (DSCP). DSCP provides a method of tagging IP packets with QoS priority information.
Domain
A group of computers and devices on a network that are grouped with common rules and procedures.
Duplex Mode
Permits simultaneous transmissions and reception of data. There are two different types of duplex mode:
???Full Duplex Mode ??? Permits for bisynchronous communication, for example, a telephone. Two parties can transmit information at the same time.
???Half Duplex Mode ??? Permits asynchronous communication, for example, a
Dynamic VLAN Assignment (DVA)
Allows automatic assignment of users to VLANs during the RADIUS server authentication. When a user is authenticated by the RADIUS server, the user is automatically joined to the VLAN configured on the RADIUS server.
E
Egress Ports
Ports from which network traffic is transmitted.
End System
An end user device on a network.
Ethernet
Ethernet is standardized as per IEEE 802.3. Ethernet is the most common implemented LAN standard. Supports data transfer rates of Mpbs, where 10, 100 or 1000 Mbps is supported.
EWS
Embedded Web Server. Provides device management via a standard web browser. Embedded Web Servers are used in addition to or in place of a CLI or NMS.
Glossary 175
F
FFT
Fast Forward Table. Provides information about forwarding routes. If a packet arrives to a device with a known route, the packet is forwarded via a route listed in the FFT. If there is not a known route, the CPU forwards the packet and updates the FFT.
FIFO
First In First Out. A queuing process where the first packet in the queue is the first packet out of the packet.
Flapping
Flapping occurs when an interfaces state is constantly changing. For example, an STP port constantly changes from listening to learning to forwarding. This may cause traffic loss.
Flow Control
Enables lower speed devices to communicate with higher speed devices, that is, that the higher speed device refrains from sending packets.
Fragment
Ethernet packets smaller than 576 bits.
Frame
Packets containing the header and trailer information required by the physical medium.
G
GARP
General Attributes Registration Protocol. Registers client stations into a Multicast domain.
Gigabit Ethernet
Gigabit Ethernet transmits at 1000 Mbps, and is compatible with existing 10/100 Mbps Ethernet standards.
GVRP
GARP VLAN Registration Protocol. Registers client stations into a VLANs.
H
HOL
Head of Line. Packets are queued. Packets at the head of the queue are forwarded before packets at the end of the line.
Host
A computer that acts as a source of information or services to other computers.
HTTP
HyperText Transport Protocol. Transmits HTML documents between servers and clients on the internet.
I
IC
Integrated Circuit. Integrated Circuits are small electronic devices composed from semiconductor material.
ICMP
Internet Control Message Protocol. Allows gateway or destination host to communicate with a source host, for example, to report a processing error.
176 Glossary
IEEE
Institute of Electrical and Electronics Engineers. An Engineering organization that develops communications and networking standards.
IEEE 802.1d
Used in the Spanning Tree Protocol, IEEE 802.1d supports MAC bridging to avoid network loops.
IEEE 802.1p
Prioritizes network traffic at the
IEEE 802.1Q
Defines the operation of VLAN Bridges that permit the definition, operation, and administration of VLANs within Bridged LAN infrastructures.
Image File
The system image is saved in a Flash sector called image.
Ingress Port
Ports on which network traffic is received.
IP
Internet Protocol. Specifies the format of packets and there addressing method. IP addresses packets and forwards the packets to the correct port.
IP Address
Internet Protocol Address. A unique address assigned to a network device with two or more interconnected LANs or WANs.
IPX
Internetwork Packet Exchange. Transmits connectionless communications.
J
Jumbo Frames
Enables transporting the identical data in fewer frames. Jumbo Frames reduce overhead, lower processing time, and ensures fewer interrupts.
L
LAG
Link Aggregated Group. Aggregates ports or VLANs into a single virtual port or VLAN.
For more information on LAGs, see Defining LAG Membership.
LAN
Local Area Networks. A network contained within a single room, building, campus or other limited geographical area.
Layer 2
Data Link Layer or MAC Layer. Contains the physical address of a client or server station. Layer 2 processing is faster than Layer 3 processing because there is less information to process.Layer 4
Establishes a connections and ensures that all data arrives to their destination. Packets inspected at the Layer 4 level are analyzed and forwarding decisions based on their applications.
Glossary 177
Load Balancing
Enables the even distribution of data and/or processing packets across available network resources. For example, load balancing may distribute the incoming packets evenly to all servers, or redirect the packets to the next available server.
M
MAC Address
Media Access Control Address. The MAC Address is a hardware specific address that identifies each network node.
MAC Address Learning
MAC Address Learning characterizes a learning bridge, in which the packet???s source MAC address is recorded. Packets destined for that address are forwarded only to the bridge interface on which that address is located. Packets addressed to unknown addresses are forwarded to every bridge interface. MAC Address Learning minimizes traffic on the attached LANs.
MAC Layer
A
Mask
A filter that includes or excludes certain values, for example parts of an IP address.
For example, Unit 2 is inserted in the first minute of a
MD5
Message Digest 5. An algorithm that produces a
MDI
Media Dependent Interface. A cable used for end stations.
MDIX
Media Dependent Interface with Crossover (MDIX). A cable used for hubs and switches.
MIB
Management Information Base. MIBs contain information describing specific aspects of network components.
Multicast
Transmits copies of a single packet to multiple ports.
N
NMS
Network Management System. An interface that provides a method of managing a system.
Node
A network connection endpoint or a common junction for multiple network lines. Nodes include:
???Processors
???Controllers
???Workstations
178 Glossary
O
OID
Object Identifier. Used by SNMP to identify managed objects. In the SNMP Manager/ Agent network management paradigm, each managed object must have an OID to identify it.
P
Packets
Blocks of information for transmission in packet switched systems.
PDU
Protocol Data Unit. A data unit specified in a layer protocol consisting of protocol control information and layer user data.
PING
Packet Internet Groper. Verifies if a specific IP address is available. A packet is sent to another IP address and waits for a reply.
Port
Physical ports provide connecting components that allow microprocessors to communicate with peripheral equipment.
Port Mirroring
Monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port.
Port Speed
Indicates port speed of the port. Port speeds include:
???Ethernet 10 Mbps
???Fast Ethernet 100Mbps
???Gigabit Ethernet 1000 Mbps
Protocol
A set of rules that governs how devices exchange information across networks.
Q
QoS
Quality of Service. QoS allows network managers to decide how and what network traffic is forwarded according to priorities, application types, and source and destination addresses.
Query
Extracts information from a database and presents the information for use.
R
RADIUS
Remote Authentication
RMON
Remote Monitoring. Provides network information to be collected from a single workstation.
Router
A device that connects to separate networks. Routers forward packets between two or more networks. Routers operate at a Layer 3 level.
Glossary 179
RSTP
Rapid Spanning Tree Protocol. Detects and uses network topologies that allow a faster convergence of the spanning tree, without creating forwarding loops.
Running Configuration File
Contains all Startup file commands, as well as all commands entered during the current session. After the device is powered down or rebooted, all commands stored in the Running Configuration file are lost.
S
Segmentation
Divides LANs into separate LAN segments for bridging and routing. Segmentation eliminates LAN bandwidth limitations.
Server
A central computer that provides services to other computers on a network. Services may include file storage and access to applications.
SNMP
Simple Network Management Protocol. Manages LANs. SNMP based software communicates with network devices with embedded SNMP agents.
SNMP agents gather network activity and device status information, and send the information back to a workstation.
SNTP
Simple Network Time Protocol. SNTP assures accurate network switch clock time synchronization up to the millisecond.
SoC
System on a Chip. An ASIC that contains an entire system. For example, a telecom SoC application can contain a microprocessor, digital signal processor, RAM, and ROM.
Spanning Tree Protocol
Prevents loops in network traffic. The Spanning Tree Protocol (STP) provides tree topography for any arrangement of bridges. STP provides one path between end stations on a network, eliminating loops.
Startup Configuration
Retains the exact device configuration when the device is powered down or rebooted.
Subnet
Subnet Mask
Used to mask all or part of an IP address used in a subnet address.
Switch
Filters and forwards packets between LAN segments. Switches support any packet protocol type.
180 Glossary
T
TCP/IP
Transmissions Control Protocol. Enables two hosts to communicate and exchange data streams. TCP guarantees packet delivery, and guarantees packets are transmitted and received in the order their sent.
Telnet
Terminal Emulation Protocol. Enables system users to log in and use resources on remote networks.
TFTP
Trivial File Transfer Protocol. Uses User Data Protocol (UDP) without security features to transfer files.
Trap
A message sent by the SNMP that indicates that system event has occurred.
Trunking
Link Aggregation. Optimizes port usage by linking a group of ports together to form a single trunk (aggregated groups).
U
UDP
User Data Protocol. Transmits packets but does not guarantee their delivery.
Unicast
A form of routing that transmits one packet to one user.
V
VLAN
Virtual Local Area Networks. Logical subgroups with a Local Area Network (LAN) created via software rather than defining a hardware solution.
W
WAN
Wide Area Networks. Networks that cover a large geographical area.
Wildcard Mask
Specifies which IP address bits are used, and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits are important.
Glossary 181
182 Glossary
D
Defining device information, 59
Device installation, 30 Device representation, 54 Device view,
Dimensions, 21 Downloading software, 80 DSCP, 147, 175 DVMRPl, 175
E
F
Index 183
IEEE 802.1d, 177 IEEE 802.1p, 177 IEEE 802.1Q, 177 IGMP, 177
Image File, 80, 177 Ingress, 177 Interface mode, 160
J
L
M
Management Information Base., 178
Master Election/Topology Discovery Algorithm, 178
MDI, 12, 104, 178 MDI/MDIX, 36 MDIX, 12, 104, 178 MDU, 178
Message Digest 5, 178 MIB, 74, 178 Multicast, 138
N
System., 178 Network security, 95
O
P
184 Index
Index 185
186 Index