EdgeSwitch AdminGuide
EdgeSwitch AdminGuide
Table of Contents
Accounting Selection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Authentication Selection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Last Password Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Denial of Service Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
CLI Banner Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Basic Switch Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Switch Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Managing Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Log Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Buffered Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Event Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Logging Hosts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56
Syslog Source Interface Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Persistent Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Configuring Email Alerts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Email Alert Global Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Email Alert Server Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Email Alert Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Email Alert Subject Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Email Alert To Address Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Viewing Device Port Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Port Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Port Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Cable Test. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Mirroring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Configuring a Port Mirroring Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Configuring Port Mirroring Source Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Configuring the Port Mirroring Destination. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Defining SNMP Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
SNMP v1 and v2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
SNMP v3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
SNMP Community Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
SNMP v1/v2 Trap Receivers Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
SNMP v3 Trap Receivers Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
SNMP Access Control Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
SNMP User Security Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
SNMP Trap Source Interface Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Viewing System Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Switch Detailed Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Port Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Port Detailed Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Network Port DHCPv6 Client Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Document Organization
This guide contains the following sections:
• “Chapter 1: Getting Started” on page 10 contains information about performing the initial system
configuration and accessing the user interface.
• “Chapter 3: Configuring System Information” on page 19 describes how to configure administrative
features such as SNMP, system users, and port information.
• “Chapter 4: Configuring Switching Information” on page 126 describes how to manage and monitor
the Layer-2 switching features.
• “Chapter 5: Configuring Routing” on page 187 describes how to configure the Layer-3 routing features.
• “Chapter 6: Managing Device Security” on page 204 contains information about configuring switch
security information such as port access control, TACACS+, and RADIUS server settings.
• “Chapter 7: Configuring Quality of Service” on page 229 describes how to manage the EdgeSwitch
software ACLs, and how to configure the Differentiated Services and Class of Service features.
• “Appendix A: Configuration Examples” on page 259 describes how to configure selected features on
the switch using either the EdgeSwitch UI, command-line interface, and/or Simple Network Management
Protocol (SNMP).
Related Documents
• EdgeSwitch CLI Command Reference
• EdgeSwitch Quick Start Guide
For additional information, refer to the EdgeSwitch community website: community.ubnt.com/edgemax
Typographical Conventions
The following table lists typographical conventions used throughout this document.
Typographical Conventions
Convention Indicates Example
Bold User selection Select VLAN 2 from the VLAN ID list; Click Submit
User-entered text enter 3 to assign VLAN 3 as the default VLAN
Italic Name of a field delete the existing name in the Username field
Name of UI page, dialog box, window, etc. Use the IP Address Conflict Detection page
> Order of navigation selections to access a page To access the Session page, click System > Users > Session
Courier font CLI commands and their output show network
2. Type the User Name and Password into the fields on the login screen, and then click Login.
The user name and password are the same as those you use to log on to the command-line interface. By
default, the user name is ubnt, and the password is ubnt. Passwords are case-sensitive.
3. If this is your first login to the UI, read the license agreement. Then, click the I agree to the terms of this
License Agreement check box and click Log In.
4. After the system authenticates you, the System Description page is displayed.
EdgeSwitch UI Page Layout
The following illustration shows the layout of a page in the EdgeSwitch UI. Each UI page contains three main
areas: the device view, the navigation menu, and the configuration and status fields. Each page also provides
buttons that let you perform operations on the displayed information, access a context-specific help page, or
log out of the system.
Device View Navigation Menu Logout Button
Device View
The Device View shown in the illustration below is a Java® applet that displays the ports on the switch. This
graphic at the top of each UI page provides an alternate way to navigate to port-related configuration and
monitoring options. The graphic also provides information about device ports, current configuration and
status, table information, and feature components.
Navigation Menu
The navigation menu, located at the top right of each UI page, lists the device’s main features: PoE, System,
Switching, Routing, Security, and QoS. You can access each feature’s UI pages using a series of cascading
menus.
To access an individual UI page, click the corresponding feature tab in the navigation menu to display a
menu of subcategories. Select a subcategory and repeat this process until you see the desired page, and
then select the page to display it in the main window.
For example, the following illustration shows how to access the IPv6 Network Connectivity page: first, select
the main feature (System tab); then, the appropriate subcategory (Connectivity); and finally, the desired
page (IPv6).
Each menu option (subcategory or page name) that you select is highlighted (the color changes to a lighter
shade of gray). When you select a page, the navigation menus and submenus are again hidden, and the
selected page appears in the main window.
In addition to the navigation menu, you can use the tabs at the top left of each page to quickly navigate
among related pages. For example, from the System Resource Configuration page, simply click the ARP Cache
or Resource Status tabs to display those pages without having to access the navigation menu, as shown in the
following illustration.
Page Selection Tabs
Command Buttons
Many UI pages also contain command buttons. These buttons, which typically appear at the bottom of a
page but can also appear in the configuration and status field area, are labeled with either text or icons. The
following table lists the common command buttons found throughout the UI pages.
Common Command Buttons
Button Text 1, 2
Icon Function
Add Adds a new entry to a table.
Clear – Removes all entries from a table, resets statistical counters to the default value, or clears all the statistics
counters and resets all switch summary and detailed statistics to default values.
Delete Removes the selected entry from the running configuration.
Initialize Resets the 802.1X state machine on the associated interface to the initialization state.
Refresh Refreshes the page with the most current information, or refreshes the DHCP lease.
Submit – Sends the updated configuration to the switch. Configuration changes take effect immediately, but
changes are not retained across a power cycle unless you save them to the system configuration file.
IMPORTANT: To retain changes across a power cycle (reboot), you must save the configuration to
non‑volatile memory, by navigating to System > Configuration Storage > Save and clicking Save.
Upload Uploads data.
1
This is either the text label on a button, or the text that appears when hovering over a button labeled with an icon.
2
Button names may include additional text, such as: Add Vendor Option, Clear Entries, Remove Last Rule, etc.
Table Sorting
All tables on UI pages can be sorted by columns. By default, the information in a table is sorted in ascending
order, using the leftmost column as primary sort. To change the default sort order, click the heading above
the column you want to sort the table by. Successive clicks on the heading toggle between ascending and
descending order.
For example, the following illustration shows the Event Log page in its default sort order (sorted by Log Index).
To sort the table entries (rows) by the Event Time field, simply click the Event Time heading.
Click to sort by Event Time
Table Filtering
This feature allows you to specify a filter that limits which rows are displayed in a table. This is useful to
reduce the contents of a long table to a specific set of items or even one particular item. To use this feature,
type a string of one or more characters into the Filter field at the upper-right corner of the table, as shown in
the following illustration. If any field of a table row contains a match for the filter string, that row is displayed
in the table. Matching is not case-sensitive.
Enter filter string here
Help Icon
User-Defined Fields
User-defined fields can contain 1-159 characters, unless otherwise noted on the configuration UI page.
All characters may be used except for the following (unless specifically noted in the feature’s Help page):
\ < / > * | ?
For more information about the CLI, see the EdgeSwitch CLI Command Reference Guide.
The EdgeSwitch CLI Command Reference lists each command available from the CLI by the command name
and provides a brief description of the command. Each command reference also contains the following
information:
• The command keywords and the required and optional parameters.
• The command mode you must be in to access the command.
• The default value, if any, of a configurable setting on the device.
Each show command in this document also includes a description of the information displayed by the
command.
Configuring PoE
This page displays information about the PoE settings on the switch’s interfaces and allows you to configure
those settings.
To access the Power Over Ethernet page, click PoE > PoE Configuration in the navigation menu.
ARP Cache
Click Refresh to refresh the page with the most current data from the switch.
System Description
After a successful login, the System Description page displays. Use this page to configure and view general
device information.
To display the System Description page, click System > Summary > Description in the navigation menu.
System Description
Static IPv6 Addresses The configured static IPv6 addresses. Use the buttons to perform the following:
Click this button to add an IPv6 address by configuring the New IPv6 Address and EUI Flag fields in
the Add IPv6 Address dialog box.
To remove an IPv6 address, select it and then click this button. To remove all IPv6 addresses, click
this button in the heading row.
HTTP Configuration
SSH Configuration
DSA Key Status The status of the SSH‑2 Digital Signature Algorithm (DSA) key file (PEM Encoded) on the device, which
might be Present, Absent, or Generation in Progress. Use the buttons as follows:
Click to download an SSH‑2 DSA key file from a remote system. In the Download Certificate dialog
box, select the file type to download, browse to the file location on the remote system, select the
file, and click Begin Transfer. The Status field provides information about the file transfer.
Click to manually generate a DSA key on the device.
Click to delete a DSA key downloaded to the device or manually generated on the device.
Note: Only a user with read/write privileges may alter data on this screen.
To access the User Accounts page, click System > Users > Accounts in the navigation menu.
User Accounts
The User Accounts page also provides the capability to add, edit, and remove user accounts:
• To add a user, click Add. The Add new user dialog box opens; specify the new account information in the
available fields, and click Submit to create the new account.
• To edit an existing user, select the user’s check box or click the row to select the account and click Edit.
The Edit existing user dialog box opens; modify the account information as needed, and click Submit to
apply the changes.
• To remove one or more user accounts, select one or more table entries, click Remove, and click OK to
delete the selected entries.
To retain the changes across the switch’s next power cycle, click System > Configuration Storage > Save.
The following table describes the fields in the Add new user and Edit existing user dialog boxes.
Add New User and Edit Existing User Dialog Box Fields
Field Description
User Name The unique name for the account. Configurable only from the Add new user dialog box. Valid user
names can contain up to 32 alphanumeric characters, plus “-” (hyphen) and ‘_’ (underscore), and are
not case-sensitive.
Password Enter the optional new or changed password for the account. The password characters are not
displayed on the page, but are disguised in a browser-specific manner. Passwords must be from 8 to
64 characters in length, and are case-sensitive.
Confirm Enter the password again, to confirm that you entered it correctly. The password characters are not
displayed on the page, but are disguised in a browser-specific manner.
Add New User and Edit Existing User Dialog Box Fields (Continued)
Field Description
Access Level Indicates the access or privilege level for this user. The options are:
• Read Write The user can view and modify the configuration.
• Read Only The user can view the configuration but cannot modify any fields.
• Suspended The user exists but is not permitted to log on to the device.
Lockout Status (Edit existing user dialog box only) Displays a user’s current lockout status (True if user is locked out of
the system after failing to log in successfully within the configured number of login attempts).
Unlock User Account (Edit existing user dialog box only) Select this option to unlock a user account that has been locked out
(Lockout Status is True).
Password Override Identifies the password override complexity status for this user.
• Enable The system does not check the strength of the password.
• Disable When configuring a password, it is checked against the Strength Check rules configured
for passwords.
Password Strength Indicates the date when the user’s password will expire. This is determined by the date the password
was created and the number of days specified in the Aging setting on the Password Rules page.
Encrypted password Select this option to encrypt the password before it is stored on the device.
Note: The preconfigured users, admin and guest, are assigned to a pre-configured list named
defaultList, which you cannot delete. All newly created users are also assigned to the defaultList until
you specifically assign them to a different list.
You can create a text file that contains a list of IAS users to add to the database and then download the file to
the switch. The following script is an example of an IAS user text file that contains three users:
configure
aaa ias-user username client-1
password my-password1
exit
aaa ias-user username client-2
password aa5c6c251fe374d5e306c62496c3bcf6 encrypted
exit
aaa ias-user username client-3
password 1f3ccb1157
exit
After the download completes, client-1, client-2, and client-3 are added to the IAS database. The password
for client-2 is encrypted.
When 802.1X authentication is enabled on the ports and the authentication method is LOCAL, port access is
allowed only to users in this database that provide the correct name and password.
To access the Auth Server Users page, click System > Users > Auth Server Users in the navigation menu.
The Auth Server Users page lists the users (User Name field) in the authentication server user database.
The following table describes the fields in the Add new user and Edit existing user dialog boxes.
Add New User and Edit Existing User Fields
Field Description
User Name A unique name used to identify the user account. Configurable only from the Add new user dialog box.
Password Required Select this option to indicate that the user must enter a password to be authenticated. If this option is
cleared, the user is required only to enter a valid user name.
Password Specify the password to associate with the user name (if required).
Confirm Re-enter the password to confirm the entry.
Encrypted Select this option to encrypt the password before it is stored on the device.
Logged in Sessions
The Logged In Sessions page identifies the users that are logged in to the management interface of the
device. The page also provides information about their connections.
To access the page, click System > Users > Sessions in the navigation menu.
Logged In Sessions
Accounting List
Accounting Selection
The following table shows the fields for the Authentication List Configuration page.
Authentication List Configuration Fields
Field Description
List Name The name of the authentication list. This field can be configured only when adding a new
authentication list.
Access Type How the user accesses the system. This field can be configured only when a new authentication list is
added, and only the Login and Enable access types can be selected. The access types are as follows:
• Login User EXEC-level management access to the command-line interface (CLI) using a Telnet
or SSH session. Access at this level has a limited number of CLI commands available to view or
configure the system.
• Enable Privileged EXEC-level management access to the CLI using a Telnet or SSH session. In
Privileged EXEC mode, read-write users have access to all CLI commands.
• HTTP Management-level access to the web‑based user interface using HTTP.
• HTTPS Management-level access to the web‑based user interface using secure HTTP.
• Dot1x Port-based access to the network through a switch port that is controlled by IEEE 802.1X.
Method Options The method(s) used to authenticate a user who attempts to access the management interface or
network. The possible methods are as follows:
• Enable Uses the locally configured Enable password to verify the user’s credentials.
• Local Uses the ID and password in the Local User database to verify the user’s credentials.
• RADIUS Sends the user’s ID and password to the configured RADIUS server to verify the user’s
credentials.
• TACACS+ Sends the user’s ID and password to the configured TACACS+ server to verify the user’s
credentials.
• None No authentication is used.
• IAS Uses the local Internal Authentication Server (IAS) database for 802.1X port-based
authentication.
List Type The type of list, which is one of the following:
• Default The list is preconfigured on the system. This type of list cannot be deleted, and only the
Method Options are configurable.
• Configured The list has been added by a user.
Access Line The access method(s) that use the list for authentication. The settings for this field are configured on
the Authentication Selection page.
Authentication Methods – This section of the Add New Authentication List dialog box contains the fields that you use to configure the
authentication methods for the authentication list.
Available Methods The authentication methods that can be used for the authentication list.
To set the authentication method, select the method from the Available Methods field and click to
move it to the Selected Methods field.
Selected Methods The authentication methods currently configured for the list. If this field lists multiple methods, the
methods are applied in the order listed – if user authentication fails using the first method, the device
tries again using the second method, and so on. If the current method is None, no authentication is
performed (user is granted unconditional access); therefore, None must be the last method in the list.
To remove a method from the list, select it and click to return it to the Available Methods field.
Authentication Selection
Use the Authentication Selection page to associate an authentication list with each CLI-based access method
(Telnet and SSH). Each access method has the following two authentication lists associated with it:
• Login – The authentication list to use for User EXEC-level management access to the CLI. Access at this
level has a limited number of CLI commands available to view or configure the system. The available
options include the default Login authentication lists as well as any user-configured Login lists.
• Enable – The authentication list to use for Privileged EXEC-level management access to the CLI. In
Privileged EXEC mode, read-write users have access to all CLI commands. The options available in this
menu include the default Enable authentication lists as well as any user-configured Enable lists.
To access this page, click System > AAA > Authentication Selection in the navigation menu.
Authentication Selection
The following table shows the fields for the Authentication Selection page.
Authentication Selection Fields
Field Description
Console The Login authentication list and the Enable authentication list to apply to users who attempt to
access the CLI using a connection to the console port.
Telnet The Login authentication list and the Enable authentication list to apply to users who attempt to
access the CLI using a Telnet session.
SSH The Login authentication list and the Enable authentication list to apply to users who attempt to
access the CLI using a secure shell (SSH) session.
Password Rules
Click Refresh to refresh the page with the most current data from the switch.
Switch Configuration
Note: IEEE 802.1D recommends a default of 300 seconds, which is the factory default.
Managing Logs
The switch may generate messages in response to events, faults, or errors occurring on the platform as well
as changes in configuration or other occurrences. These messages are stored both locally on the platform
and forwarded to one or more centralized points of collection for monitoring purposes as well as long term
archival storage. Local and remote configuration of the logging capability includes filtering of messages
logged or forwarded based on severity and generating component.
The in-memory log stores messages in memory based upon the settings for message component and
severity. On stackable systems, this log exists only on the management unit. Other platforms in the
stack forward their messages to the management unit log. Access to in-memory logs on other than the
management unit is not supported.
Log Configuration
The Log Configuration page allows administrators with the appropriate privilege level to configure the
administrative mode and various settings for logging features on the switch.
To access the Log Configuration page, click System > Logs > Configuration in the navigation menu.
Log Configuration
Buffered Log
The log messages the device generates in response to events, faults, errors, and configuration changes are
stored locally on the device in the RAM (cache). This collection of log files is called the RAM log or buffered
log. When the buffered log file reaches the configured maximum size, the oldest message is deleted from the
RAM when a new message is added. If the system restarts, all messages are cleared.
To access the Buffered Log page, click System > Logs > Buffered Log in the navigation menu.
Buffered Log
Event Log
Use the Event Log page to display the event log, which is used to hold error messages for catastrophic events.
After the event is logged and the updated log is saved in flash memory, the switch will be reset. The log
can hold at least 2,000 entries (the actual number depends on the platform and OS), and is erased when an
attempt is made to add an entry after it is full. The event log is preserved across system resets.
To access the Event Log page, click System > Logs > Event Log in the navigation menu.
Event Log
Logging Hosts
Use the Logging Hosts page to configure remote logging hosts to which the switch can send logs.
To access the Logging Hosts page, click System > Logs > Hosts in the navigation menu. The Logging Hosts
page is shown below.
Logging Hosts
Persistent Log
Use the Persistent Log page to view the persistent log messages.
To access the Persistent Log page, click System > Log > Persistent Log in the navigation menu.
Persistent Log
Port Summary
Port Description
Use the Port Description page to configure a human-readable description of the port.
To access the Port Description page, click System > Port > Description in the navigation menu.
Port Description
Cable Test
The cable test feature enables you to determine the cable connection status on a selected port. You can also
obtain an estimate of the length of the cable connected to the port, if the PHY on the ports supports this
functionality.
Note: The cable test feature is supported only for copper cable. It is not supported for optical fiber cable.
To access the Cable Test feature, click System > Port > Cable Test.
The page displays additional fields when you click Test Cable. The fields that are displayed depend on the
cable test results.
Cable Test
Select a port from the Interface drop-down menu and click Test Cable to display its status.
If the port has an active link while the cable test is run, the link can go down for the duration of the test.
The test may take several seconds to run. The command returns a cable length estimate if this feature is
supported by the PHY for the current link speed.
Note: If the link is down and a cable is attached to a 10/100 Ethernet adapter, the displayed Cable
Status may be Open or Short because some Ethernet adapters leave unused wire pairs unterminated or
grounded.
Mirroring
Port mirroring selects the network traffic for analysis by a network analyzer. This is done for specific ports
of the switch. As such, many switch ports are configured as source ports and one switch port is configured
as a destination port. You have the ability to configure how traffic is mirrored on a source port. Packets that
are received on the source port, that are transmitted on a port, or are both received and transmitted, can be
mirrored to the destination port.
The packet that is copied to the destination port is in the same format as the original packet on the wire.
This means that if the mirror is copying a received packet, the copied packet is VLAN tagged or untagged as
it was received on the source port. If the mirror is copying a transmitted packet, the copied packet is VLAN
tagged or untagged as it is being transmitted on the source port.
Use the Multiple Port Mirroring page to define port mirroring sessions. To access the Multiple Port Mirroring
page, click System > Port > Mirroring in the navigation menu.
Note: A port will be removed from a VLAN or LAG when it becomes a destination mirror.
1. From the Port Mirroring page, click Configure Session to display the Session Configuration dialog box.
2. In the Mode field, select Enable to enable port mirroring.
To retain the changes across the switch’s next power cycle, click System > Configuration Storage > Save.
Configuring Port Mirroring Source Ports
1. From the Port Mirroring page, click Configure Source to display the Source Configuration dialog box.
2. Configure the fields shown in the table below.
Multiple Port Mirroring – Source Configuration Fields
Field Description
Session ID Specifies the monitoring session.
Type The type of interface to use as the source:
• None The source is not configured.
• Remote VLAN The VLAN configured as the RSPAN VLAN is the source. In an RSPAN configuration,
the remote VLAN is the source on the destination device that has a physical port connected to the
network traffic analyzer.
• VLAN Traffic to and from a configured VLAN is mirrored; that is, all packets sent and received on
all physical ports that are members of the VLAN are mirrored.
• Interface Traffic is mirrored from one or more physical ports on the device.
Remote VLAN The VLAN that is configured as the RSPAN VLAN.
VLAN ID The VLAN to use as the source. Traffic from all physical ports that are members of this VLAN is
mirrored. This field is available only when the selected Type is VLAN.
Available Source Port(s) The physical port or ports to use as the source. Press and hold CTRL to select multiple ports. This field
is available only when the selected Type is Interface.
Direction Select the type traffic monitored on the source port, which can be one of the following:
• Tx/Rx Monitors transmitted and received packets.
• Rx Monitors received packets only.
• Tx Monitors transmitted packets only.
Switch Statistics
Port Summary
The Port Summary Statistics page shows statistical information about the packets received and transmitted
by each port and LAG.
To access the page, click System > Statistics > System > Port Summary in the navigation menu.
Rule Id The number that identifies the flow-based statistics collection rule.
Time Range The name of the periodic or absolute time range to use for data collection. The time range is configured
using the Time Range Entry Summary page (see “Time Range Entry Configuration” on page 111).
The time range must be configured on the system before the time-based statistics can be collected.
Match Conditions The criteria that a packet must meet to match the rule.
Interfaces The interface or interfaces on which the flow-based rule is applied. Only traffic on the specified
interfaces is checked against the rule.
When you click Add, the Time Based Flow Configuration dialog box opens and allows you to configure a rule for traffic flow statistics.
The match conditions are optional, but the rule must specify at least one match condition. The match conditions are as follows:
Match All Select this option to indicate that all traffic matches the rule and is counted in the statistics. This
option is exclusive to all other match criteria, so if Match All is selected, no other match criteria can be
configured.
Source IP The source IP address to match in the IPv4 packet header.
Destination IP The destination IP address to match in the IPv4 packet header.
Source MAC The source MAC address to match in the ingress frame header.
Destination MAC The destination MAC address to match in the ingress frame header.
Source TCP Port The TCP source port to match in the TCP header.
Destination TCP Port The TCP destination port to match in the TCP header.
Source UDP Port The UDP source port to match in the UDP header.
Destination UDP Port The UDP destination port to match in the UDP header.
Time-Based Statistics
Use this page to view time-based statistics collected for the configured traffic groups and flow-based rules.
To access the Time-Based Statistics page, click System > Statistics > Time Based > Statistics in the
navigation menu.
Time-Based Statistics
Click Refresh to refresh the data on the screen with the present state of the data in the switch.
System Reset
Click Reset to initiate the system reset. If you have not saved the changes that you submitted since the last
system reset, the changes will not be applied to the system after the reset.
Ping
Use the Ping page to tell the switch to send a Ping request to a specified IP address. You can use this feature
to check whether the switch can communicate with a particular network host.
To access the Ping page, click System > Utilities > Ping in the navigation menu.
Ping
Ping Fields
Field Description
Host Name or IP Address Enter the IP address or the host name of the station you want the switch to ping. The initial value is
blank. This information is not retained across a power cycle.
Count The number of ICMP echo request packets to send to the host.
Interval The number of seconds to wait between sending ping packets.
Size The size of the ping packet, in bytes. Changing the size allows you to troubleshoot connectivity issues
with a variety of packet sizes, such as large or very large packets.
Source The source IP address or interface to use when sending the echo request packets. If source is not
required, select None as the Source option.
IP Address The source IP address to use when sending the Echo requests packets. This field is enabled when the
Source option is set to IP Address.
Interface The interface to use when sending the Echo requests packets. This field is enabled when the Source
option is set to Interface.
Status Displays the results of the ping.
Results The results of the ping test, which includes information about the reply (if any) received from the host.
Ping IPv6
Click Submit to send the specified number of pings. The results are displayed in the Results box.
TraceRoute
Use this page to determine the Layer-3 path a packet takes from the device to a specific IP address or
hostname. When you initiate the traceroute command by clicking the Start button, the device sends a
series of traceroute probes toward the destination. The results list the IP address of each Layer-3 device a
probe passes through until it reaches its destination – or fails to reach its destination and is discarded. The
information you enter on this page is not saved as part of the device configuration.
To access the TraceRoute page, click System > Utilities > TraceRoute in the navigation menu.
TraceRoute
Traceroute Fields
Field Description
Host Name or IP Address The DNS-resolvable hostname or IP address of the system to attempt to reach.
Probes Per Hop Traceroute works by sending UDP packets with increasing Time-To-Live (TTL) values. Specify the
number of probes sent with each TTL.
MaxTTL The maximum Time-To-Live (TTL). The traceroute terminates after sending probes that can be Layer-3
forwarded this number of times. If the destination is further away, the traceroute will not reach it.
InitTTL The initial Time-To-Live (TTL). This value controls the maximum number of Layer-3 hops that the first
set of probes may travel.
File Transfer
Uploading Files
When you click , the File Upload window appears. The following information describes the fields in the File
Upload window for all protocols.
File Upload Fields
Field Description
File Type Specify the type of file to transfer from the device to a remote system.
• Code Select this option to transfer an image.
• Configuration Select this option to transfer a copy of the stored configuration file (startup‑config)
to a remote system.
• Backup Configuration Select this option to transfer a copy of the stored backup configuration
(backup‑config) from the device to a remote system.
• Script File Select this option to transfer a custom text configuration script from the device to a
remote system.
• CLI Banner Select this option to transfer the file containing the text to be displayed on the CLI
before the login prompt to a remote system.
• Crash Log Select this option to transfer the system crash log to a remote system.
• Operational Log Select this option to transfer the system operational log to a remote system.
• Startup Log Select this option to transfer the system startup log to a remote system.
• Trap Log Select this option to transfer the system trap records to a remote system.
• Factory Defaults Select this option to transfer the factory default configuration file to a remote
system.
• Error Log Select this option to transfer the system error (persistent) log, which is also known as
the event log, to a remote system.
• Buffered Log Select this option to transfer the system buffered (in-memory) log to a remote
system.
Image If the selected File Type is Code, specify whether to transfer the Active or Backup image to a remote
system.
Server Address Specify the IPv4 address, IPv6 address, or DNS-resolvable hostname of the remote server that will
receive the file.
File Path Specify the path on the server where you want to put the file.
File Name Specify the name that the file will have on the remote server.
User Name For FTP transfers, if the server requires authentication, specify the user name for remote login to the
server that will receive the file.
Password For FTP transfers, if the server requires authentication, specify the password for remote login to the
server that will receive the file.
Progress Represents the completion percentage of the file transfer.
The file transfer begins after you complete the required fields and click to the right of this field.
Digital Signature Verification For Code and Configuration file types this option, when checked, will verify the file download with the
digital signature.
Status Provides information about the status of the file transfer.
To retain the changes across the switch’s next power cycle, click System > Configuration Storage > Save.
Downloading Files
When you click , the File Download window appears. The following information describes the fields in the
File Download window for all protocols.
File Download Fields
Field Description
File Type Specify the type of file to transfer to the device:
• Code Select this option to transfer a new image to the device. The code file is stored as the
backup image.
• Configuration Select this option to update the stored configuration file (startup-config). If the file
has errors, the update will be stopped.
• Script File Select this option to transfer a text-based configuration script to the device. You must
use the command-line interface (CLI) to validate and activate the script.
• CLI Banner Select this option to transfer the CLI banner file to the device. This file contains the
text to be displayed on the CLI before the login prompt.
• IAS Users Select this option to transfer an Internal Authentication Server (IAS) users database file
to the device. The IAS user database stores a list of user name and (optional) password values for
local port-based user authentication.
• SSH-1 RSA Key File Select this option to transfer an SSH-1 Rivest-Shamir-Adleman (RSA) key file
to the device. SSH key files contain information to authenticate SSH sessions for remote CLI-based
access to the device.
• SSH-2 RSA Key PEM File Select this option to transfer an SSH-2 Rivest-Shamir-Adleman (RSA) key
file (PEM Encoded) to the device.
• SSH-2 DSA Key PEM File Select this option to transfer an SSH-2 Digital Signature Algorithm (DSA)
key file (PEM Encoded) to the device.
• SSL Trusted Root Certificate PEM File Select this option to transfer an SSL Trusted Root
Certificate file (PEM Encoded) to the device. SSL files contain information to encrypt, authenticate,
and validate HTTPS sessions.
• SSL Server Certificate PEM File Select this option to transfer an SSL Server Certificate file (PEM
Encoded) to the device.
• SSL DH Weak Encryption Parameter PEM File Select this option to transfer an SSL Diffie‑Hellman
Weak Encryption Parameter file (PEM Encoded) to the device.
• SSL DH Strong Encryption Parameter PEM File Select this option to transfer an SSL
Diffie‑Hellman Strong Encryption Parameter file (PEM Encoded) to the device.
Note:
• To download SSH key files, SSH must be administratively disabled, and there can be no active SSH
sessions.
• To download SSL related files, HTTPS must be administratively disabled.
Select File If the Transfer Protocol is set to HTTP, browse to the directory where the file is located and select the file
to transfer to the device. This field is not present if the Transfer Protocol is TFTP or FTP.
Server Address For TFTP or FTP transfers, specify the IPv4 address, IPv6 address, or DNS-resolvable hostname of the
remote server.
File Path For TFTP or FTP transfers, specify the path on the server where the file is located.
File Name For TFTP or FTP transfers, specify the name of the file you want to transfer to the device.
User Name For FTP transfers, if the server requires authentication, specify the user name for remote login to the
server where the file resides.
Password For FTP transfers, if the server requires authentication, specify the password for remote login to the
server that will receive the file.
Progress Represents the completion percentage of the file transfer.
The file transfer begins after you complete the required fields and click to the right of this field.
Digital Signature Verification For Code and Configuration file types this option, when checked, will verify the file download with the
digital signature.
Status Provides information about the status of the file transfer.
To retain the changes across the switch’s next power cycle, click System > Configuration Storage > Save.
AutoInstall
The AutoInstall feature enables the configuration of a switch automatically whenever the device is turned
on and no configuration file is found in device storage during the boot process. By communicating with a
DHCP server, AutoInstall obtains an IP address for the switch and an IP address for a TFTP server. AutoInstall
attempts to download a configuration file from the TFTP server and install it on the switch.
The DHCP server that the switch communicates with must provide the following information:
• The IP address and subnet mask (option 1) to be assigned to the switch.
• The IP address of a default gateway (option 3), if needed for IP communication.
• The identification of the TFTP server from which to obtain the boot file. This is given by any of the
following fields, in the priority shown (highest to lowest):
• The sname field of the DHCP reply.
• The hostname of the TFTP server (option 66). Either the TFTP address or name is specified – not both
– in most network configurations. If a TFTP hostname is given, a DNS server is required to translate the
name to an IP address.
• The IP address of the TFTP server (option 150).
• The address of the TFTP server supplied in the siaddr field.
• The name of the configuration file (boot file or option 67) to be downloaded from the TFTP server. The
boot file name must have a file type of *.cfg.
• The IP addresses of DNS name servers (option 6). The IP addresses of DNS name servers should be
returned from the DHCP server only if the DNS server is in the same LAN as the switch performing
AutoInstall. A DNS server is needed to resolve the IP address of the TFTP server if only the “sname” or
option 66 values are returned to the switch.
After obtaining IP addresses for both the switch and the TFTP server, the AutoInstall feature attempts to
download a host-specific configuration file using the boot file name specified by the DHCP server. If the
switch fails to obtain the file, it will retry indefinitely.
To display the AutoInstall Configuration page, click System > Firmware> AutoInstall.
AutoInstall Configuration
The fields available on the System Trap Flags page depends on the packages installed on your system. For
example, if your system does not have the BGP4 package installed, the BGP Traps field is not available. The
illustration above and the table below show the fields that are available on a system with all packages
installed.
System Trap Flags Fields
Field Description
Authentication When selected, this option enables activation of authentication failure traps by selecting the
corresponding line on the pulldown entry field. This feature is enabled by default.
Link Up/Down When selected, this option enables activation of link status traps by selecting the corresponding line
on the pulldown entry field. This feature is enabled by default.
Multiple Users When selected, this option enables activation of multiple user traps by selecting the corresponding
line on the pulldown entry field. This feature is enabled by default. This trap is triggered when the same
user ID is logged into the switch more than once at the same time (either via Telnet or the serial port).
Spanning Tree When selected, this option enables activation of spanning tree traps by selecting the corresponding
line on the pulldown entry field. This feature is enabled by default.
ACL Traps When selected, this option enables activation of ACL traps by selecting the corresponding line on the
pulldown entry field. This feature is disabled by default.
Power Supply Module State When selected, this option enables SNMP notifications when power supply events occur.
Temperature When selected, this option enables SNMP notifications when temperature events occur.
If you select Dynamic or Manual from the Type of Binding drop-down menu, the screen refreshes and a
slightly different set of fields appears.
DHCP Server Pool Configuration Fields
Field Description
Pool Name Select the pool to configure. The menu includes all pools that have been configured on the device.
Type of Binding Specifies the type of binding for the pool. The options are:
• Manual You statically assign an IP address to a client based on the client’s MAC address.
• Dynamic The DHCP server can assign the client any available IP address within the pool. This type
is also known as Automatic.
Network Base Address Dynamic pools only – The network portion of the IP address. A DHCP client can be offered any
available IP address within the defined network as long as it has not been configured as an excluded
address.
Network Mask Dynamic pools only – The subnet mask associated with the Network Base Address that separates the
network bits from the host bits.
Default Router, DNS Server, NetBIOS Server – To configure settings for one or more default routers, DNS servers, or NetBIOS servers that
can be used by the client(s) in the pool, use the buttons available in the appropriate table to perform the following tasks:
To add an entry to the server list, click this button and enter the IP address of the server to add.
To edit the address of a configured server, click this button associated with the entry to edit and update the address.
To delete an entry from the list, click this button associated with the entry to remove.
To delete all entries from the list, click this button in the heading row.
Default Router Lists the IP address of each router to which the client(s) in the pool should send traffic. The default
router should be in the same subnet as the client.
DNS Server Lists the IP address of each DNS server the client(s) in the pool can contact to perform address resolution.
NetBIOS Server Lists the IP address of each NetBIOS Windows Internet Naming Service (WINS) name server that is
available for the selected pool.
Domain Name The default domain name to configure for all clients in the selected pool. Use the buttons as follows:
Click this button to configure the field.
Click this button to reset the field to the default value.
Bootfile Name The name of the default boot image that the client should attempt to download from a specified boot
server. Use the buttons as follows:
Click this button to configure the field.
Click this button to reset the field to the default value.
The lower section of the page contains the option table which shows the Vendor Options that have been added to the selected pool.
Option Name Identifies whether the entry is a fixed option or a vendor-defined option (Vendor).
Option Code The number that uniquely identifies the option.
Option Type Specifies the type of option associated with the option code configured for the selected pool:
• ASCII The option type is a text string.
• HEX The option type is a hexadecimal number.
• IP Address The option type is an IP address.
Option Value The data associated with the Option Code. When adding or editing a vendor option, the field(s)
available for configuring the value depend on the selected Option Type. If the value you configure
contains invalid characters for the selected Option Type, the configuration cannot be applied.
If you change any settings, click Submit to apply the changes to the system.
• To remove an entry from the table, select each entry to delete and click Clear Entries. You must confirm
the action before the binding is deleted.
• Click Refresh to refresh the data on the screen with the present state of the data in the switch.
Note: The time range entries use the system time for the time periods in which they take effect. Make
sure you configure the SNTP server settings so that the SNTP client on the switch can obtain the
correct date and time from the server.
To access this page, click System > Advanced Configuration > Time Ranges > Entry Configuration.
To configure the time range entries for a time range configuration, select the time range configuration from
the Time Range Name menu and use the buttons to perform the following tasks:
• To add an absolute time range entry, click Add Absolute, configure the settings to define the absolute
time range, and then click Submit to apply the changes. If the Add Absolute button is not available, an
absolute entry already exists for the time range specified by Time Range Name.
• To add a periodic time range entry, click Add Periodic and specify the days and times that the entry is
in effect.
• To delete a time range entry, select each entry to delete, click Remove, and confirm the action.
• Click Refresh to update the information on the screen.
To retain the changes across the switch’s next power cycle, click System > Configuration Storage > Save.
Configuring DNS
You can use these pages to configure information about DNS servers the network uses and how the
switch/router operates as a DNS client.
DNS Global Configuration
Use the DNS Global Configuration page to configure global DNS settings and to view DNS client status
information. To access this page, click System > Advanced Configuration > DNS > Configuration.
DNS IP Mapping
Unicast Poll Interval Specifies the interval, in seconds, between unicast poll requests expressed as a power of two when
configured in unicast mode. Allowed range is 6 to 10. Default value is 6.
Broadcast Poll Interval Specifies the interval, in seconds, between broadcast poll requests expressed as a power of two when
configured in broadcast mode. Broadcasts received prior to the expiry of this interval are discarded.
Allowed range is 6 to 10. Default value is 6.
Unicast Poll Timeout Specifies the number of seconds to wait for an SNTP response when configured in unicast mode.
Allowed range is 1 to 30. Default value is 5.
Unicast Poll Retry Specifies the number of times to retry a request to an SNTP server after the first timeout before
attempting to use the next configured server when configured in unicast mode. Allowed range is 0 to
10. Default value is 1.
Number of Servers Configured Specifies the number of current valid unicast server entries configured for this client.
Managing VLANs
Adding Virtual LAN (VLAN) support to a Layer-2 switch offers some of the benefits of both bridging and
routing. Like a bridge, a VLAN switch forwards traffic based on the Layer-2 header, which is fast, and like a
router, it partitions the network into logical segments, which provides better administration, security and
management of multicast traffic.
A VLAN is a set of end stations and the switch ports that connect them. You may have many reasons for the
logical division, such as department or project membership. The only physical requirement is that the end
station and the port to which it is connected both belong to the same VLAN.
Each VLAN in a network has an associated VLAN ID, which appears in the IEEE 802.1Q tag in the Layer-2 header
of packets transmitted on a VLAN. An end station may omit the tag, or the VLAN portion of the tag, in which
case the first switch port to receive the packet may either reject it or insert a tag using its default VLAN ID.
A given port may handle traffic for more than one VLAN, but it can only support one default VLAN ID.
VLAN Status
Use the VLAN Status page to view information about the VLANs configured on your system. To access the
VLAN Status page, click Switching > VLAN > Status in the navigation menu.
VLAN Status
To reset the VLAN configuration, click Reset, and then confirm the reset by clicking OK. When the system
indicates that all default VLAN settings have been restored, click Close to acknowledge the result.
GARP Configuration
Use this page to set the administrative mode for the features that use the Generic Attribute Registration
Protocol (GARP), including GARP VLAN Registration Protocol (GVRP) and GARP Multicast Registration
Protocol (GMRP). GARP is a general-purpose protocol that registers any network connectivity or
membership-style information. GARP defines a set of switches interested in a given network attribute, such
as VLAN ID or multicast address.
GARP Switch Configuration
To access the GARP Switch Configuration page, click Switching > GARP > Switch in the navigation menu.
To change the GARP settings for one or more interfaces, select each interface to configure and click Edit. The
same settings are applied to all selected interfaces.
Click Refresh to refresh the page with the most current data from the switch.
Interface Configuration
Use the IGMP Snooping Interface Configuration page to configure IGMP snooping settings on specific
interfaces.
To access the page, click Switching > IGMP Snooping > Interface Configuration in the navigation menu.
Click Refresh to refresh the page with the most current data from the switch.
Use this page to view the multicast router VLAN status for each interface. Use the buttons to perform the
following tasks:
• Click the Add and Edit buttons to be redirected to the Multicast Router VLAN Configuration page for the
selected interface to enable or disable VLANs as multicast router interfaces.
• To disable all VLANs as multicast router interfaces for one or more physical ports or LAGs, select each
entry to modify, click Remove, and confirm the action.
• Click Refresh to refresh the page with the most current data from the switch.
To retain the changes across the switch’s next power cycle, click System > Configuration Storage > Save.
VLAN Configuration
Use this page to enable the IGMP snooping querier feature on one or more VLANs and to configure per‑VLAN
IGMP snooping querier settings. Only VLANS that have the IGMP snooping querier feature enabled appear in
the table.
To access the IGMP Snooping Querier VLAN Configuration page, click Switching > IGMP Snooping Querier >
VLAN Configuration in the navigation menu.
Click Refresh to refresh the page with the most current data from the switch.
Note: If you configure the maximum number of dynamic port-channels (LAGs) that your platform
supports, additional port-channels that you configure are automatically static.
Static LAGs are supported. When a port is added to a LAG as a static member, it neither transmits nor receives
Link Aggregation Control Protocol (LACP) Protocol Data Units (PDU)s.
Port Channel Summary
Use the Port Channel Summary page to group one or more full duplex Ethernet links to be aggregated
together to form a port-channel, which is also known as a link aggregation group (LAG). The switch can treat
the port-channel as if it were a single link.
To access the page, click Switching > Port Channel > Summary in the navigation menu.
To quickly find a MAC address when the list is too long to scan, enter the MAC address in the Filter box.
Click Refresh to update the information on the screen with the most current data.
Click Refresh to update the information on the screen with the most current data.
Multicast Forwarding Database IGMP Snooping Table
This page displays the entries in the multicast forwarding database (MFDB) that were added because they
were discovered by the IGMP snooping feature. IGMP snooping allows the device to dynamically add or
remove ports from IPv4 multicast groups by listening to IGMP join and leave requests.
To access the page, click Switching > Multicast Forwarding Database > IGMP Snooping in the navigation menu.
Click Refresh to update the information on the screen with the most current data.
Note: For two bridges to be in the same region, the force version should be 802.1S and their
configuration name, digest key, and revision level should match. For more information about regions
and their effect on network topology, refer to the IEEE 802.1Q standard.
Note: If no MST instances have been configured on the switch, the page displays a “No MSTs Available”
message and does not display the fields shown in the illustration below.
Use the 802.1p Priority Mapping page in the Class of Service submenu to assign 802.1p priority values to
various traffic classes on one or more interfaces.
To display the page, click Switching > Class of Service > 802.1p Priority Mapping in the navigation menu.
Managing LLDP
The IEEE 802.1AB defined standard, Link Layer Discovery Protocol (LLDP), allows stations residing on an
802 LAN to advertise major capabilities and physical descriptions. This information is viewed by a network
manager to identify system topology and detect bad configurations on the LAN.
LLDP is a one-way protocol; there are no request/response sequences. Information is advertised by stations
implementing the transmit function, and is received and processed by stations implementing the receive
function. The transmit and receive functions can be enabled/disabled separately per port. By default, both
transmit and receive are disabled on all ports. The application is responsible for starting each transmit and
receive state machine appropriately, based on the configured status and operational state of the port.
The EdgeSwitch software allows LLDP to have multiple LLDP neighbors per interface. The number of such
neighbors is limited by the memory constraints. A product-specific constant defines the maximum number
of neighbors supported by the switch. There is no restriction on the number of neighbors supported on a
per LLDP port. If all the remote entries on the switch are filled up, the new neighbors are ignored. In case of
multiple VOIP devices on a single interface, the 802.1ab component sends the Voice VLAN configuration to
all the VoIP devices.
LLDP Global Configuration
Use the LLDP Global Configuration page to specify LLDP parameters that are applied to the switch.
To display the LLDP Global Configuration page, click Switching > LLDP > Global in the navigation menu.
Note: When adding or editing LLDP settings on an interface, select the appropriate check box to
enable a feature, or clear the check box to disable a feature.
Click Refresh to update the information on the screen with the most current data.
Click Refresh to update the information on the screen with the most current data.
LLDP Statistics
Use the LLDP Statistics page to view the global and interface LLDP statistics.
To display the LLDP Statistics page, click Switching > LLDP > Statistics in the navigation menu.
LLDP Statistics
LLDP-MED
The Link Layer Discovery Protocol-Media Endpoint Discovery (LLDP-MED) is an enhancement to LLDP that
features:
• Auto-discovery of LAN policies (such as VLAN, Layer-2 Priority and DiffServ settings), enabling plug and
play networking.
• Device location discovery for creation of location databases.
• Extended and automated power management of Power over Ethernet endpoints.
• Inventory management, enabling network administrators to track their network devices and determine
their characteristics (manufacturer, software and hardware versions, serial/asset number).
LLDP-MED Global Configuration
Use the LLDP-MED Global Configuration page to set global parameters for LLDP-MED operation. To display
this page, click Switching > LLDP‑MED > Global in the navigation menu.
Configuring ARP
The Address Resolution Protocol (ARP) associates a Layer-2 MAC address with a Layer-3 IPv4 address. The
EdgeSwitch software features both dynamic and manual ARP configuration. With manual ARP configuration,
you can statically add entries into the ARP table.
ARP is a necessary part of the internet protocol (IP) and is used to translate an IP address to a media (MAC)
address, defined by a local area network (LAN) such as Ethernet. A station needing to send an IP packet must
learn the MAC address of the IP destination, or of the next hop router, if the destination is not on the same
subnet. This is achieved by broadcasting an ARP request packet, to which the intended recipient responds
by unicasting an ARP reply containing its MAC address. Once learned, the MAC address is used in the
destination address field of the Layer-2 header prepended to the IP packet.
The ARP cache is a table maintained locally in each station on a network. ARP cache entries are learned by
examining the source information in the ARP packet payload fields, regardless of whether it is an ARP request
or response. Thus, when an ARP request is broadcast to all stations on a LAN segment or virtual LAN (VLAN),
every recipient has the opportunity to store the sender’s IP and MAC address in their respective ARP cache.
The ARP response, being unicast, is normally seen only by the requestor, who stores the sender information
in its ARP cache. Newer information always replaces existing content in the ARP cache.
The number of supported ARP entries is platform-dependent.
Devices can be moved in a network, which means the IP address that was at one time associated with
a certain MAC address is now found using a different MAC, or may have disappeared from the network
altogether (i.e., it has been reconfigured, disconnected, or powered off ). This leads to stale information in
the ARP cache unless entries are updated in reaction to new information seen on the network, periodically
refreshed to determine if an address still exists, or removed from the cache if the entry has not been
identified as a sender of an ARP packet during the course of an ageout interval, usually specified via
configuration.
The Routing > ARP Table submenu contains links to the following UI pages that configure and display ARP-
related details:
• “ARP Table” on page 189
• “ARP Table Configuration” on page 190
ARP Table
Use the ARP Table page to add an entry to the Address Resolution Protocol table.
To display the page, click Routing > ARP Table > Summary in the navigation menu. The ARP Table is
displayed at the bottom of the page, and contains the fields in the table below.
ARP Table
Routing IP Configuration
Routing IP Statistics
The statistics reported on the Routing IP Statistics page are as specified in RFC 1213.
To display the page, click Routing > IP > Statistics in the navigation menu.
Routing IP Statistics
Click Refresh to refresh the page with the most current data from the switch.
Router
The Routing > Router menu contains links to UI pages that configure and display route tables.
Route Table
The route table manager collects routes from multiple sources: static routes and local routes. The route table
manager may learn multiple routes to the same destination from multiple sources. The route table lists all
routes. The best routes table displays only the most preferred route to each destination.
To display the Route Table Summary page, click Routing > Router > Route Table in the navigation menu.
Configured Routes
Use the Configured Route Summary page to create and display static routes.
To display the page, click Routing > Router > Configured Routes in the navigation menu.
Note: The selected Route Type determines the fields that are available to be configured. Some of
the fields listed in the table “Configured Routes Fields” on page 201 are not available when
configuring certain types of routes.
Guest VLAN Period The value, in seconds, of the timer used for guest VLAN authentication.
Unauthenticated VLAN ID The VLAN ID of the unauthenticated VLAN. Hosts that fail the authentication might be denied
access to the network or placed on a VLAN created for unauthenticated clients. This VLAN might be
configured with limited network access.
Click this button to set the Unauthenticated VLAN ID.
Click this button to reset the Unauthenticated VLAN ID to the default value.
Supplicant Timeout The amount of time that the port waits for a response before retransmitting an EAP request frame to
the client.
Server Timeout The amount of time the port waits for a response from the authentication server.
Maximum Requests The maximum number of times that the port sends an EAP request frame (assuming that no response
is received) to the client before restarting the authentication process.
MAB Mode The MAC-based Authentication Bypass (MAB) mode on the port, which can be enabled or disabled.
Re-Authentication Period The amount of time that clients can be connected to the port without being reauthenticated. If this
field is disabled, connected clients are not forced to reauthenticate periodically.
Click this button to set the Re-Authentication Period.
Click this button to reset the Re-Authentication Period to the default value.
Maximum Users The maximum number of clients supported on the port if the Control Mode on the port is MAC-Based
802.1X authentication.
RADIUS Settings
Remote Authorization Dial-In User Service (RADIUS) servers provide additional security for networks. The
RADIUS server maintains a user database, which contains per-user authentication information. RADIUS
servers provide a centralized authentication method for:
• Telnet Access
• Web Access
• Console to Switch Access
• Port Access Control (802.1X)
The RADIUS folder contains links to pages that help you view and configure system RADIUS settings.
RADIUS Configuration
Use the RADIUS Configuration page to view and configure various settings for the RADIUS servers configured
on the system. To access the page, click Security > RADIUS > Configuration in the navigation menu.
RADIUS Configuration
Use the buttons at the bottom of the page to perform the following actions:
• If you make changes to the page, click Submit to apply the changes to the system.
• Click Refresh to update the page with the most current information.
To retain the changes across the switch’s next power cycle, click System > Configuration Storage > Save.
Click Reset to clear all statistics for the RADIUS authentication and accounting server. After you confirm
the action, the statistics on both the RADIUS Server Statistics and RADIUS Accounting Server Statistics pages
are reset.
TACACS+ Settings
The TACACS+ submenu allows you to access the pages used to view and modify the TACACS+ configuration.
TACACS+ Configuration
To access the TACACS+ Configuration page, click Security > TACACS+ > Configuration in the navigation menu.
TACACS+ Configuration
Connection Timeout The maximum number of seconds allowed to establish a TCP connection between the device and the
TACACS+ server.
Use the buttons at the bottom of the page to perform the following tasks:
• To add an ACL, click Add, configure the ACL type and ID, and click Submit to apply the changes.
• To configure rules for an ACL, select the ACL and click Edit. Configure the fields on the Access Control List
Configuration page for the selected ACL (see “Access Control List Configuration” on page 232), and
click Submit to apply the changes.
• To remove one or more configured ACLs, select each entry to delete and click Remove. You must confirm
the action before the entry is deleted.
• Click Refresh to refresh the page with the most current data from the switch.
To retain the changes across the switch’s next power cycle, click System > Configuration Storage > Save.
• To configure settings on all interfaces, click Edit All. In the Edit OUI Based Port Configuration window,
change the settings as needed, and click Submit to apply the changes.
• Click Refresh to refresh the page with the most current data from the switch.
To retain the changes across the switch’s next power cycle, click System > Configuration Storage > Save.
Protocol Based Auto VoIP
Use this page to configure the protocol-based Auto VoIP priority settings and to enable or disable the
protocol-based Auto VoIP mode on the interfaces.
To display the Protocol Based Auto VoIP page, click QoS > Auto VoIP > Protocol Based Auto VoIP in the
navigation menu. A portion of the UI page is shown below.
Configuring Diffserv
Use this page to configure the administrative mode of Differentiated Services (DiffServ) support on the
device and to view the current and maximum number of entries in each of the main DiffServ private MIB
tables. DiffServ allows traffic to be classified into streams and given certain QoS treatment in accordance
with defined per-hop behaviors.
Packets are classified and processed based on defined criteria. The classification criteria is defined by a class.
The processing is defined by a policy’s attributes. Policy attributes may be defined on a per-class instance
basis, and it is these attributes that are applied when a match occurs. A policy can contain multiples classes.
When the policy is active, the actions taken depend on which class matches the packet.
Diffserv Global Configuration and Status
Use the Diffserv Global Configuration and Status page to configure the Global DiffServ settings on the device.
To display the page, click QoS > Diffserv > Global in the navigation menu.
After you select the policy to configure from the Policy menu, use the buttons to perform the following tasks:
• To add a class to the policy, click Add Class.
• To add attributes to a policy or to change the policy attributes, select the policy with the attributes to
configure and click Add Attribute.
• To remove the most recently associated class from the selected policy, click Remove Last Class.
• Click Refresh to refresh the page with the most current data from the switch.
To retain the changes across the switch’s next power cycle, click System > Configuration Storage > Save.
Click Refresh to update the page with the most current data from the switch.
Click Refresh to update the page with the most current data from the switch.
Note: Each configuration example starts from a factory-default configuration unless otherwise noted.
Configuring VLANs
The diagram in this section shows a switch with four ports configured to handle the traffic for two VLANs.
Port 0/2 handles traffic for both VLANs, while port 0/1 is a member of VLAN 2 only, and ports 0/3 and 0/4 are
members of VLAN 3 only.
The following examples show how to create VLANs, assign ports to the VLANs, and assign a VLAN as the
default VLAN to a port.
Layer 3 Switch
24V
24V 24V
24V 24V
VLAN 3
VLAN 2
VLAN Example Network Diagram
3. Type 2-3 in the VLAN ID or Range field, and then click Submit.
4. From the Port Configuration page, select VLAN 2 from the VLAN ID List.
5. From the Participation column in the interface table, select Include for ports 0/1 and 0/2 to specify that
these ports are members of VLAN 2.
6. Select the interface check box and click Edit. Select the Tagging All check box to specify that frames will
always be transmitted tagged from ports that are members of VLAN 2.
7. Click Submit.
8. Select VLAN 3 from the VLAN ID and Name List.
9. Select the Participate option in the VLAN field.
10. For ports 0/2, 0/3, and 0/4, select Include from the Participation menu to specify that these ports are
members of VLAN 3.
11. Click Submit.
12. Go to the Switching > VLAN > Port Summary page.
13. In the Interface column, select 0/1 and click Edit.
14. In the Acceptable Frame Type field, select Only Tagged to specify that untagged frames will be rejected on
receipt.
15. Click Submit.
16. In the Interface column, select 0/2 and click Edit.
17. In the Port VLAN ID field, enter 3 to assign VLAN 3 as the default VLAN for the port.
18. In the Acceptable Frame Types field, select Admit All to specify the untagged frames will be rejected on receipt.
2. Assign ports 0/1 and 0/2 to VLAN2 and specify that untagged frames will be rejected on receipt.
(UBNT EdgeSwitch) #Config
interface 0/1
vlan participation include 2
vlan acceptframe vlanonly
exit
interface 0/2
vlan participation include 2
vlan acceptframe all
3. While in interface config mode for port 0/2, assign VLAN3 as the default VLAN.
(UBNT EdgeSwitch) (Interface 0/2)#vlan pvid 3
exit
4. Specify that frames will always be transmitted tagged from ports that are members of VLAN 2.
(UBNT EdgeSwitch)(Config)#vlan port tagging all 2
exit
Note: Port 0/2 belongs to both VLANs, and port 0/1 can never belong to VLAN 3.
Note: The digest key is generated based on the association of VLANs to different instances. To ensure
the digest key is same, the mapping of VLAN to instance must be the same on each switch in the
region. For example, if VLAN 10 is associated with instance 10 on one switch, you must associate VLAN
10 and instance 10 on the other switches.
4. Use similar procedures to associate MST instance 20 to VLAN 20 and assign it a bridge priority value of
61440.
By using a lower priority for MST 20, MST 10 becomes the root bridge.
5. Force port 0/2 to be the root port for MST 20, which is the non-root bridge.
a. Go to the Switching > Spanning Tree > MST page.
b. From the MST ID menu, select 20.
c. From the Interface menu, select 0/2.
d. In the Port Priority field, enter 64.
e. Click Submit.
5. Change the name so that all the bridges that want to be part of the same region can form the region.
spanning-tree configuration name ubnt
6. Make the MST ID 10 bridge the root bridge by lowering the priority.
spanning-tree mst priority 10 16384
7. Change the priority of MST ID 20 to ensure the other bridge is the root bridge.
spanning-tree mst priority 20 61440
10. On the non-root bridge, change the priority to force port 0/2 to be the root port.
spanning-tree mst 20 port-priority 64
exit
24V
VLAN 10 VLAN 20
24V 24V
24V 24V
24V
2. Configure ports 0/1, 0/2 as members of VLAN 10 and specify that untagged frames received on these
ports will be assigned to VLAN 10.
config
interface 0/1
vlan participation include 10
vlan pvid 10
exit
interface 0/2
vlan participation include 10
vlan pvid 10
exit
3. Configure port 0/3 as a member of VLAN 20 and specify that untagged frames received on these ports will
be assigned to VLAN 20.
interface 0/3
vlan participation include 20
vlan pvid 20
exit
exit
4. Specify that all frames transmitted for VLANs 10 and 20 will be tagged.
config
vlan port tagging all 10
vlan port tagging all 20
exit
6. View the logical interface IDs assigned to the VLAN routing interfaces.
(UBNT EdgeSwitch) #show ip vlan
Logical
VLAN ID Interface IP Address Subnet Mask
------- -------------- --------------- ---------------
10 4/1 0.0.0.0 0.0.0.0
20 4/2 0.0.0.0 0.0.0.0
As the output shows, VLAN 10 is assigned ID 4/1 and VLAN 20 is assigned ID 4/2.
7. Enable routing for the switch:
config
ip routing
exit
8. Configure the IP addresses and subnet masks for the virtual router ports.
config
interface 4/1
ip address 192.150.3.1 255.255.255.0
exit
interface 4/2
ip address 192.150.4.1 255.255.255.0
exit
exit
24V
VLAN 20 VLAN 30
In this example, the procedure to configure policy route traffic from VLAN routing interface 10 to VLAN
routing interface 30 is shown in the diagram above. Traffic sent to VLAN Interface 10 is destined for VLAN
Interface 20. In order to override the traditional destination routing and send the same traffic to VLAN
Interface 30, use the following procedure.
1. Create VLANs 10, 20, 30, 40, and enable routing on these VLANs.
(UBNT EdgeSwitch) #vlan database
vlan 10,20,30,40
vlan routing 10 1
vlan routing 20 2
vlan routing 30 3
vlan routing 40 4
exit
2. Add physical ports to the VLANs and configure PVID on the corresponding interfaces.
config
interface 0/2
vlan pvid 10
vlan participation exclude 1
vlan participation include 10
exit
interface 0/4
vlan pvid 20
vlan participation exclude 1
vlan participation include 20
exit
interface 0/22
vlan pvid 30
vlan participation exclude 1
vlan participation include 30
exit
interface 0/24
vlan pvid 40
vlan participation exclude 1
vlan participation include 40
exit
exit
After this step, if traffic with the following characteristics is sent, it will be routed from VLAN routing
interface 10 to VLAN routing interface 20.
Source IP: 1.1.1.2
Destination IP: 2.2.2.2
In order to policy route such traffic to VLAN routing interface 30, continue with the following steps:
5. Create an access-list matching incoming traffic.
config
access-list 1 permit 1.1.1.2 0.0.0.255
exit
After this step, traffic mentioned in the diagram “Policy-Based Routing Example” on page 267 is
policy‑routed to VLAN interface 30. Counters are incremented in the “show route-map” command
indicating that traffic is being policy routed.
8. Run the show command.
(UBNT EdgeSwitch) #show route-map pbr_test
route-map pbr_test permit 10
Match clauses:
ip address (access-lists) : 1
Set clauses:
ip next-hop 3.3.3.3
24V
Supplicant
If a user, or supplicant, attempts to communicate via the switch on any interface except interface 0/1, the
system challenges the supplicant for login credentials. The system encrypts the provided information and
transmits it to the RADIUS server. If the RADIUS server grants access, the system sets the 802.1X port state of
the interface to authorized, and the supplicant is able to access network resources.
Using the CLI to Configure 802.1X Port-Based Access Control
1. Configure the RADIUS authentication server IP address.
(UBNT EdgeSwitch) #config
radius server host auth 10.10.10.10
24V 24V
Port 0/2
Calculator Calendar Gallery Sound Recorder Calculator Calendar Gallery Sound Recorder
2. Create a DiffServ classifier named ‘class_voip’ and define a single match criterion to detect UDP packets.
The class type match-all indicates that all match criteria defined for the class must be satisfied in order for
a packet to be considered a match.
class-map match-all class_voip
match protocol udp
exit
3. Create a second DiffServ classifier named ‘class_ef’ and define a single match criterion to detect a DiffServ
code point (DSCP) of ‘EF’ (expedited forwarding). This handles incoming traffic that was previously
marked as expedited elsewhere in the network.
class-map match-all class_ef
match ip dscp ef
exit
4. Create a DiffServ policy for inbound traffic named ‘pol_voip’, and then add the previously created classes
‘class_ef’ and ‘class_voip’ as instances within this policy.
This policy handles incoming packets already marked with a DSCP value of ‘EF’ (per ‘class_ef’ definition),
or marks UDP packets per the ‘class_voip’ definition) with a DSCP value of ‘EF’. In each case, the matching
packets are assigned internally to use queue 5 of the egress port to which they are forwarded.
policy-map pol_voip in
class class_ef
assign-queue 5
exit
class class_voip
mark ip-dscp ef
assign-queue 5
exit
exit
©2014 Ubiquiti Networks, Inc. All rights reserved. Ubiquiti, Ubiquiti Networks, the Ubiquiti U logo, the Ubiquiti beam logo, EdgeMAX,
and EdgeSwitch are trademarks or registered trademarks of Ubiquiti Networks, Inc. in the United States and in other countries. All other
trademarks are the property of their respective owners.
AI093014