Powerconnect-5424 - User's Guide - En-Us
Powerconnect-5424 - User's Guide - En-Us
Powerconnect-5424 - User's Guide - En-Us
54xx Systems
User Guide
w w w. d e l l . c o m | s u p p o r t . d e l l . c o m
Notes, Cautions and Warnings
NOTE: A NOTE indicates important information that helps you make better use of computer.
CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
____________________
Information in this document is subject to change without notice.
© 2007–2008 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Axim, Dell, the DELL logo, DellNet, Dell OpenManage, Dell Precision, Dimension, Inspiron, Latitude, OptiPlex,
PowerConnect, PowerApp, and PowerVault are trademarks of Dell Inc. Microsoft and Windows are either trademarks or registered trademarks
of Microsoft Corporation in the United States and/or other countries.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products.
Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
PowerConnect 54xx Series Systems . . . . . . . . . . . . . . . . . . . . . . 13
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
General Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
MAC Address Supported Features . . . . . . . . . . . . . . . . . . . . . 15
Layer 2 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
VLAN Supported Features . . . . . . . . . . . . . . . . . . . . . . . . . 17
Spanning Tree Protocol Features . . . . . . . . . . . . . . . . . . . . . . 18
Link Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Layer 3 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Quality of Service Features . . . . . . . . . . . . . . . . . . . . . . . . . 19
Device Management Features . . . . . . . . . . . . . . . . . . . . . . . 20
Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Locked Port Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2 Hardware Description . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Device Port Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
PowerConnect 54xx Series Systems Front Panel
Port Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
PowerConnect Back Panel Port Description . . . . . . . . . . . . . . . . 26
Device Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Physical Dimensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
LED Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Port LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
System LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Hardware Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Power Supplies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Reset Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Ventilation System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Contents 3
3 Installing the PowerConnect Device . . . . . . . . . . . . . . . . 31
Installation Precautions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Site Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Unpacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Package Contents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Unpacking the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Initial Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Advanced Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
4 Contents
Configuring Security Passwords . . . . . . . . . . . . . . . . . . . . . . . . 50
Configuring an Initial Terminal Password . . . . . . . . . . . . . . . . . 50
Configuring an Initial Telnet Password . . . . . . . . . . . . . . . . . . . 50
Configuring an Initial SSH Password . . . . . . . . . . . . . . . . . . . . 51
Configuring an Initial HTTP Password . . . . . . . . . . . . . . . . . . . 51
Configuring an Initial HTTPS Password . . . . . . . . . . . . . . . . . . 51
Startup Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Startup Menu Procedures . . . . . . . . . . . . . . . . . . . . . . . . . 52
Software Download . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Erase FLASH File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Erasing the Device Configuration . . . . . . . . . . . . . . . . . . . . . . 54
Password Recovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Software Download Through TFTP Server . . . . . . . . . . . . . . . . . 55
Contents 5
6 Configuring System Information . . . . . . . . . . . . . . . . . . . 67
Defining General Device Information . . . . . . . . . . . . . . . . . . . . . . 67
Viewing Device Information . . . . . . . . . . . . . . . . . . . . . . . . 67
Defining System Time Settings . . . . . . . . . . . . . . . . . . . . . . . 71
Viewing System Health Information . . . . . . . . . . . . . . . . . . . . 77
Viewing the Versions Page . . . . . . . . . . . . . . . . . . . . . . . . . 79
Resetting the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Managing Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Defining Global Log Parameters . . . . . . . . . . . . . . . . . . . . . . 93
Displaying RAM Log Table . . . . . . . . . . . . . . . . . . . . . . . . . 97
Displaying the Log File Table . . . . . . . . . . . . . . . . . . . . . . . . 99
Viewing the Device Login History. . . . . . . . . . . . . . . . . . . . . 101
Configuring the Remote Log Server Settings Page . . . . . . . . . . . . 102
6 Contents
Managing Device Security . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Defining Access Profiles . . . . . . . . . . . . . . . . . . . . . . . . . 147
Adding an Access Profile . . . . . . . . . . . . . . . . . . . . . . . . . 149
Defining Authentication Profiles . . . . . . . . . . . . . . . . . . . . . 154
Assigning Authentication Profiles . . . . . . . . . . . . . . . . . . . . 157
Managing Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Viewing Active Users . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Defining the Local User Databases . . . . . . . . . . . . . . . . . . . . 165
Defining Line Passwords . . . . . . . . . . . . . . . . . . . . . . . . . 168
Defining Enable Passwords. . . . . . . . . . . . . . . . . . . . . . . . 170
Defining TACACS+ Settings . . . . . . . . . . . . . . . . . . . . . . . . 171
Configuring RADIUS Global Parameters . . . . . . . . . . . . . . . . . 176
Contents 7
Managing Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
File Management Overview. . . . . . . . . . . . . . . . . . . . . . . . 220
Downloading Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Uploading Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Copying Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Managing Device Files . . . . . . . . . . . . . . . . . . . . . . . . . . 229
8 Contents
Configuring Address Tables . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Viewing Dynamic Addresses . . . . . . . . . . . . . . . . . . . . . . . 298
Contents 9
Viewing RMON Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
Viewing RMON Statistics Group . . . . . . . . . . . . . . . . . . . . . 389
Viewing RMON History Control Statistics . . . . . . . . . . . . . . . . 392
Viewing the RMON History Table . . . . . . . . . . . . . . . . . . . . . 394
Defining Device RMON Events . . . . . . . . . . . . . . . . . . . . . . 396
Viewing the RMON Events Log . . . . . . . . . . . . . . . . . . . . . . 399
Defining RMON Device Alarms . . . . . . . . . . . . . . . . . . . . . . 401
10 Contents
Device Memory Specifications . . . . . . . . . . . . . . . . . . . . . . . . 428
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Contents 11
12 Contents
Introduction
CAUTION: Before proceeding, read the release notes for this product. The release notes can be
downloaded from support.dell.com.
This User Guide contains the information needed for installing, configuring and maintaining the
PowerConnect device.
Introduction 13
Features
This section describes the device user-configured features. For a complete list of all updated device
features, refer to the latest software version Release Notes.
General Features
MDI/MDIX Support
The device supports auto-detection between crossed and straight-through cables.
Standard wiring for end stations is Media-Dependent Interface (MDI) and the standard wiring for hubs
and switches is known as Media-Dependent Interface with Crossover (MDIX).
For information on configuring MDI/MDI for ports or Link Aggregate Groups (LAGs), see "Defining
Port Parameters" on page 278 or "Configuring Load Balancing" on page 284.
14 Introduction
Back Pressure Support
On half-duplex links, the receiving port prevents buffer overflows by occupying the link so that it is
unavailable for additional traffic.
For information on configuring Back Pressure for ports or LAGs, see "Defining Port Parameters" on
page 278 or "Configuring Load Balancing" on page 284.
iSCSI Optimization
iSCSI is a communication protocol used for sending data between file servers and storage disks. The file
servers are called initiators and the disks are called targets. You can optimize iSCSI flow by setting
Quality of Service frame priority parameters in the device. The device can also intercept iSCSI frames
and provide information about iSCSI communications (called sessions).
For more information, see "Optimizing iSCSI" on page 232.
Voice VLAN
Voice VLAN allows network administrators to enhance VoIP service by configuring ports to carry IP voice
traffic from IP phones on a specific VLAN. VoIP traffic has a preconfigured OUI prefix in the source MAC
address. Network Administrators can configure VLANs from which voice IP traffic is forwarded. Non-VoIP
traffic is dropped from the Voice VLAN in auto Voice VLAN secure mode. Voice VLAN also provides
QoS to VoIP, ensuring that the quality of voice does not deteriorate if the IP traffic is received unevenly.
For more information, see "Configuring Voice VLANs" on page 343.
Guest VLAN
Guest VLAN provides limited network access to unauthorized ports. If a port is denied network access
via port-based authorization, but the Guest VLAN is enabled, the port receives limited network access.
Introduction 15
Static MAC Entries
User defined static MAC entries are stored in the Bridging Table.
For more information, see "Configuring Address Tables" on page 295.
Layer 2 Features
IGMP Snooping
Internet Group Membership Protocol (IGMP) Snooping examines IGMP frame contents, when they are
forwarded by the device from work stations to an upstream Multicast router. From the frame, the device
identifies work stations configured for Multicast sessions, and which Multicast routers are sending
Multicast frames.
For more information, see "IGMP Snooping" on page 366.
Port Mirroring
Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing
packets from a monitored port to a monitoring port. Users specify which target port receives copies of all
traffic passing through a specified source port.
For more information, see "Defining Port Mirroring Sessions" on page 292.
16 Introduction
VLAN Supported Features
VLAN Support
VLANs are collections of switching ports that comprise a single broadcast domain. Packets are classified
as belonging to a VLAN based on either the VLAN tag or based on a combination of the ingress port and
packet contents. Packets sharing common attributes can be grouped in the same VLAN.
For more information, see "Configuring Multiple Spanning Tree" on page 317.
QinQ
QinQ tagging allows network managers to add an additional tag to previously tagged packets. Customer
VLANs are configured using QinQ. Adding additional tags to the packets helps create more VLAN space.
The added tag provides an VLAN ID to each customer, this ensures private and segregated network
traffic. The VLAN ID tag is assigned to a customer port in the service providers network. The designated
port then provides additional services to the packets with the double-tags. This allows administrators to
expand service to VLAN users.
GVRP Support
GARP VLAN Registration Protocol (GVRP) provides IEEE 802.1Q-compliant VLAN pruning and
dynamic VLAN creation on 802.1Q trunk ports. When GVRP is enabled, the device registers and
propagates VLAN membership on all ports that are part of the active underlying "Spanning Tree Protocol
Features" on page 18 topology.
For more information, see "Configuring GVRP" on page 340.
Introduction 17
Spanning Tree Protocol Features
Fast Link
STP can take up to 30-60 seconds to converge. During this time, STP detects possible loops, allowing
time for status changes to propagate and for relevant devices to respond. 30-60 seconds is considered too
long of a response time for many applications. The Fast Link option bypasses this delay, and can be used
in network topologies where forwarding loops do not occur.
For more information enabling Fast Link for ports and LAGs, see "Defining STP Port Settings" on
page 308 or "Defining STP LAG Settings" on page 312.
Link Aggregation
For more information, see "Aggregating Ports" on page 351.
Link Aggregation
Up to eight Aggregated Links may be defined, each with up to eight member ports, to form a single Link
Aggregated Group (LAG). This enables:
• Fault tolerance protection from physical link disruption
• Higher bandwidth connections
18 Introduction
• Improved bandwidth granularity
• High bandwidth server connectivity
LAG is composed of ports with the same speed, set to full-duplex operation.
For more information, see "Defining LAG Membership" on page 354.
Layer 3 Features
TCP
Transport Control Protocol (TCP) connections are defined between 2 ports by an initial synchronization
exchange. TCP ports are identified by an IP address and a 16-bit port number. Octets streams are divided
into TCP packets, each carrying a sequence number.
Introduction 19
Device Management Features
SNMP Version 3
Access to the switch using SNMPv3 provides additional security features that cover message integrity,
authentication, and encryption; as well as controlling user access to specific areas of the MIB tree.
The SNMPv3 security structure consists of security models, with each model having it’s own security levels.
Remote Monitoring
Remote Monitoring (RMON) is an extension to SNMP, which provides comprehensive network traffic
monitoring capabilities with support for 64 bit counters (as opposed to SNMP which allows network device
management and monitoring). RMON is a standard MIB that defines current and historical MAC-layer
statistics and control objects, allowing real-time information to be captured across the entire network.
For more information, see "Viewing RMON Statistics" on page 389.
20 Introduction
Command Line Interface
Command Line Interface (CLI) syntax and semantics conform as much as possible to common industry
practice. CLI is composed of mandatory and optional elements. The CLI interpreter provides command
and keyword completion to assist user and shorten typing.
Syslog
Syslog is a protocol that allows event notifications to be sent to a set of remote servers, where they can be
stored, examined and acted upon. Multiple mechanisms are implemented to send notification of
significant events in real time, and keep a record of these events for after-the-fact usage.
For more information on Syslog, see "Managing Logs" on page 93.
SNTP
The Simple Network Time Protocol (SNTP) assures accurate network device clock time synchronization
up-to the millisecond. Time synchronization is performed by a network SNTP server. Time sources are
established by Stratums. Stratums define the distance from the reference clock. The higher the stratum
(where zero is the highest), the more accurate the clock.
For more information, see "Configuring SNTP Settings" on page 81.
Traceroute
Traceroute enables discovering IP routes that packets were forwarded along during the forwarding
process. The CLI Traceroute utility can be executed from either the user-exec or privileged modes.
802.1ab (LLDP-MED)
The Link Layer Discovery Protocol allows network managers to troubleshoot and enhance network
management by discovering and maintaining network topologies over multi-vendor environments.
LLDP discovers network neighbors by standardizing methods for network devices to advertise
themselves to other systems, and to store discovered information. The multiple advertisement sets are
sent in the packet Type Length Value (TLV) field. LLDP devices must support chassis and port ID
advertisement, as well as system name, system ID, system description, and system capability
advertisements.
LLDP Media Endpoint Discovery (LLDP-MED) increases network flexibility by allowing different
IP systems to co-exist on a single network LLDP. It provides detailed network topology information,
emergency call service via IP Phone location information, and troubleshooting information.
Security Features
SSL
Secure Socket Layer (SSL) is an application-level protocol that enables secure transactions of data
through privacy, authentication, and data integrity. It relies upon certificates and public and private keys.
Introduction 21
Port Based Authentication (802.1x)
Port based authentication enables authenticating system users on a per-port basis via an external server.
Only authenticated and approved system users can transmit and receive data. Ports are authenticated via
the Remote Authentication Dial In User Service (RADIUS) server using the Extensible Authentication
Protocol (EAP). Dynamic VLAN Assignment (DVA) allows network administrators to automatically
assign users to VLANs during the RADIUS server authentication.
For more information, see "Configuring Port Based Authentication" on page 243.
RADIUS Client
RADIUS is a client/server-based protocol. A RADIUS server maintains a user database, which contains
per-user authentication information, such as user name, password and accounting information.
For more information, see "Configuring RADIUS Global Parameters" on page 176.
SSH
Secure Shell (SSH) is a protocol that provides a secure, remote connection to a device. SSH version 1 is
currently available. The SSH server feature enables an SSH client to establish a secure, encrypted
connection with a device. This connection provides functionality that is similar to an inbound telnet
connection. SSH uses RSA Public Key cryptography for device connections and authentication.
TACACS+
TACACS+ provides centralized security for validation of users accessing the device. TACACS+ provides
a centralized user management system, while still retaining consistency with RADIUS and other
authentication processes.
For more information, see "Defining TACACS+ Settings" on page 171.
22 Introduction
DHCP Snooping
DHCP Snooping expands network security by providing firewall security between untrusted interfaces
and DHCP servers. By enabling DHCP Snooping network administrators can differentiate between
trusted interfaces connected to end-users or DHCP Servers and untrusted interfaces located beyond the
network firewall.
For more information, see "Configuring DHCP Snooping" on page 269.
Introduction 23
24 Introduction
Hardware Description
Device Port Configurations
PowerConnect 54xx Series Systems Front Panel Port Description
The PowerConnect 54xx series systems are configured with the following ports:
• 24/48 Copper ports — RJ-45 ports designated as 10/100/1000 BaseT Gigabit Ethernet ports
• 4 Fiber ports — Designated as Gigabit ports
• Terminal port — RS-232 console based port
The following figure illustrates the PowerConnect 54xx series systems front panel.
The front panel contains ports1-24/48, which are copper based RJ-45 ports, designated as
10/100/1000 Mbps and support both Half and Full Duplex modes. There are four SFP fiber ports
which are designated as Combo ports 21-24/45-48. A Combo port is a single logical port with two
physical connections. Only one physical connection can be active at a time, so either the copper
ports or the equivalent fiber ports 21-24 can be active, but they cannot both be active
simultaneously. The upper row of ports are marked by odd numbers and the lower row of ports are
marked with even numbers.
On the front panel are all the device LEDs and a Reset Button which is used to manually reset
the device.
The device automatically detects whether the cable connected to an RJ-45 port is crossed or straight
through, and functions either way.
Hardware Description 25
PowerConnect Back Panel Port Description
The device back panel contains connectors for power, as illustrated in the Figure 2-2.
On the device back panel are two power supply connectors and an RS-232 Console port. For general use
there is an AC Power Supply connector which is connectable to either 110V or 220V power supplies.
The DC Power Supply connector is to connect a Redundant Power Supply (RPS) to be activated
automatically in the event of an AC power supply outage.
Device Ports
SFP Ports
The Small Form Factor Plugable (SFP) port is a hot swappable optical modular transceiver that offers
high speed and compactness, which is designated as 1000Base-SX or LX.
Combo Ports
A combo port is a single logical port with two physical connections:
• A RJ-45 connection for Twisted Pair copper cabling
• A SFP connection for various fiber-based modules
Only one of the two physical connections of a combo port may be used at any one time. Port features and
available port controls are determined by the physical connection used.
The system automatically detects the media used on a combo port, and utilizes this information in all
operations and control interfaces.
26 Hardware Description
If both RJ-45 and SFP are present, and a connector is inserted in the SFP port, the SFP port is active,
unless the copper connector of the Base-T port of the same number is inserted and has a link.
The system can switch from the RJ-45 to the SFP (or vice-versa) without a system reboot or reset.
Physical Dimensions
The device has the following physical dimensions:
LED Definitions
The front panel contains light emitting diodes (LED) that indicate the status of links, power supplies,
fans, and system diagnostics.
Port LEDs
Hardware Description 27
SFP LEDs
The SFP ports each have one LED marked as LNK.
The SFP port LED indications are described in the following table:
When the SFP port is connected, the Duplex LED on the corresponding copper Combo port is Green.
System LEDs
The system LEDs, located on the left side of the front panel, provide information about the power
supplies, fans, thermal conditions, and diagnostics. Figure 2-6 illustrates the system LEDs.
28 Hardware Description
The following table describes the system LED indications.
Hardware Components
Power Supplies
The device has an internal power supply unit (AC unit) and a connector to connect the device to an
external power supply unit (DC unit). The external unit provides redundancy and is called an RPS unit.
To power up the device, only one power supply is required. Operation with both power supply units is
regulated through load sharing.
Load sharing is where the device power requirements are divided between the two power supplies. If one
power supply has an outage, the second power supply automatically continues providing power to the
whole device.
Power supply LEDs indicate the power supply status. For more information on LEDs, see "LED
Definitions" on page 27.
Hardware Description 29
AC Power Supply Unit
The AC power supply unit converts standard 220/110V AC 50/60 Hz to 5V DC at 5A, 12V DC at 3A.
The unit automatically senses the available voltage rating (110 or 220V) and no setting is required.
The AC power supply unit uses a standard AC220/110V connector. LED indicator is on the front panel
and indicates whether the AC unit is connected.
Reset Button
The reset button, located on the front panel, manually resets the device.
Ventilation System
The device uses a fan system for cooling. Fan operational status can be verified by observing the LEDs
that indicate if there is a faulty fan. For information, see "LED Definitions" on page 27.
30 Hardware Description
Installing the PowerConnect Device
This section contains information about device unpacking, location, installation, and cable
connections.
Installation Precautions
WARNING: Before performing any of the following procedures, read and follow the safety instructions
located in the System Information Guide included in the Dell Documentation.
WARNING: Observe the following points before performing the procedures in this section:
• Ensure that the rack or cabinet housing the device is adequately secured to prevent it from
becoming unstable and/or falling over.
• Ensure that the power source circuits are properly grounded.
• Observe and follow the service markings. Do not service any device except as explained in the
system documentation. Opening or removing covers marked with a triangular symbol with a
lighting bolt may cause electrical shock. These components are to be serviced by trained service
technicians only.
• Ensure that the power cable, extension cable, and/or plug is not damaged.
• Ensure that the device is not exposed to water.
• Ensure that the device is not exposed to radiators and/or heat sources.
• Ensure that the cooling vents are not blocked.
• Do not push foreign objects into the device, as it may cause a fire or electric shock.
• Use the device only with approved equipment.
• Allow the device to cool before removing covers or touching internal equipment.
• Ensure that the device does not overload the power circuits, wiring, and over-current protection.
To determine the possibility of overloading the supply circuits, add together the ampere ratings of
all switches installed on the same circuit as the device. Compare this total with the rating limit for
the circuit.
• Do not install the device in an environment where the operating ambient temperature might
exceed 45ºC (113ºF).
• Ensure that the airflow around the front, sides, and back of the device is not restricted.
Unpacking
Package Contents
While unpacking the device, ensure that the following items are included:
• The device
• An AC power cable
• RS-232 crossover cable
• Self-adhesive rubber pads
• Rack mount kits for rack installation
• Documentation CD
2 Insert the supplied screws into the rack mounting holes and tighten with a screwdriver.
3 Repeat the process for the rack-mounting bracket on the other side of the device.
Back Panel
RS-232
Crossover
Cable
Power Connect
Rear View
Back Panel
Confirm that the device is connected and operating correctly by examining the LEDs on the front panel.
The RJ-45pin number allocation for the 10/100/1000BaseT ports is listed in the table following.
Table 3-2. RJ-45 Pin Number Allocation for 10/100/1000BaseT Ethernet Port
Pin No Function
1 TxRx 1+
2 TxRx 1-
3 TxRx 2+
4 TxRx 2-
5 TxRx 3+
6 TxRx 3-
7 TxRx 4+
8 TxRx 4-
Auto-Negotiation
Auto-negotiation enables automatic detection of speed, duplex mode and flow control on switching
10/100/1000BaseT ports. Auto-negotiation is enabled per port by default.
Auto-negotiation is a mechanism established between two link partners to enable a port to advertise its
transmission rate, duplex mode and flow control (the flow control by default is disabled) abilities to its
partner. The ports then both operate at the highest common denominator between them.
If connecting a NIC that does not support auto-negotiation or is not set to auto-negotiation, both the
device switching port and the NIC must be manually set to the same speed and duplex mode.
MDI/MDIX
The device supports auto-detection of straight through and crossed cables on all switching
10/100/1000BaseT ports. The feature is part of the Auto-negotiation and is enabled when Auto-negotiation
is enabled.
When the MDI/MDIX (Media Dependent Interface with Crossover) is enabled, the automatic
correction of errors in cable selection is possible, making the distinction between a straight through
cable and a crossover cable irrelevant. (The standard wiring for end stations is known as MDI
(Media Dependent Interface), and the standard wiring for hubs and switches is known as MDIX.)
Flow Control
The device supports 802.3x Flow Control for ports configured with the Full Duplex mode. By default,
this feature is disabled. It can be enabled per port. The flow control mechanism allows the receiving side
to signal to the transmitting side that transmission must temporarily be halted to prevent buffer
overflow.
Back Pressure
The device supports back pressure for ports configured to half duplex mode. By default, this feature is
disabled. It can be enabled per port. The back pressure mechanism prevents the transmitting side from
transmitting additional traffic temporarily. The receiving side may occupy a link so it becomes
unavailable for additional traffic.
Power On
Yes Susepnd
Bootup
No
Press Esc
Loading Program from
flash to RAM
Standard
Device
Reboot Installation
No
Initial Configuration:
Wizard Configuration
IP Address, Subnet
Process
mask, Users Basic
Security Configuration
---------------------
-- Unit Standalone --
---------------------
Initial Configuration
NOTE: Before proceeding, read the release notes for this product. Download the release notes from the Dell
Support website at support.dell.com.
NOTE: The initial configuration assumes the following:
• The PowerConnect device was never configured before and is in the same state as when you received it.
• The PowerConnect device booted successfully.
• The console connection is established and the console prompt is displayed on the screen of a VT100 terminal
device.
The initial device configuration is through the Console port. After the initial configuration, the device
can be managed either from the already connected Console port or remotely through an interface
defined during the initial configuration.
If this is the first time the device has booted up, or if the configuration file is empty because the device has
not been configured, the user is prompted to use the Setup Wizard. The Setup Wizard provides guidance
through the initial device configuration, and gets the device up and running as quickly as possible.
NOTE: Obtain the following information from the network administrator before configuring the device:
• The IP address to be assigned to the VLAN 1 interface through which the device is to be managed (by default,
every port is a member of the VLAN 1)
• The IP subnet mask for the network
• The default gateway (next hop router) IP address for configuring the default route.
• SNMP community string and SNMP management system IP address (optional)
• Username and password
The Setup Wizard guides you through the initial switch configuration, and gets the system up and
running as quickly as possible. You can skip the Setup Wizard, and manually configure the device
through the device CLI mode.
Wizard Step 1
The following is displayed:
The system is not setup for SNMP management by default.
To manage the switch using SNMP (required for Dell Network Manager)
you can
Setup the initial SNMP version 2 account now.
Return later and setup additional SNMP v1/v3 accounts.
For more information on setting up SNMP accounts, please see the user
documentation.
Would you like to setup the SNMP management interface now? (Y/N)[Y]Y
Wizard Step 2
The following is displayed:
Now we need to setup your initial privilege (Level 15) user account.
This account is used to login to the CLI and Web interface.
You may setup other accounts and change privilege levels later.
For more information on setting up user accounts and changing
privilege levels, see the user documentation.
To setup a user account:
Enter the user name<1-20>:[admin]
Please enter the user password:*
Please reenter the user password:*
Enter the following:
• User name, for example "admin"
• Password and password confirmation.
NOTE: If the first and second password entries are not identical, the user is prompted until they are identical.
Press Enter.
Wizard Step 4
The following is displayed:
Finally, setup the default gateway.
Please enter the IP address of the gateway from which this network is
reachable (e.g. 192.168.1.1).Default gateway (A.B.C.D):[0.0.0.0]
Enter the default gateway.
Press Enter. The following is displayed (as per the example parameters described):
This is the configuration information that has been collected:
==============================================================
SNMP Interface = [email protected]
User Account setup = admin
Password = *
Management IP address = 1.1.1.1 255.255.255.0
Default Gateway = 1.1.1.2
==============================================================
Wizard Step 5
The following is displayed:
If the information is correct, please select (Y) to save the
configuration, and copy to the start-up configuration file. If the
information is incorrect, select (N) to discard configuration and
restart the wizard: (Y/N)[Y]Y
Wizard Step 6
The CLI prompt is displayed.
Advanced Configuration
This section provides information about dynamic allocation of IP addresses and security management
based on the authentication, authorization, and accounting (AAA) mechanism, and includes the
following topics:
• Configuring IP Addresses through DHCP
• Configuring IP Addresses through BOOTP
• Security Management and Password Configuration
When configuring/receiving IP addresses through DHCP and BOOTP, the configuration received from
these servers includes the IP address, and may include subnet mask and default gateway.
NOTE: It is not necessary to delete the device configuration to retrieve an IP address from the DHCP server.
NOTE: When copying configuration files, avoid using a configuration file that contains an instruction to enable
DHCP on an interface that connects to the same DHCP server, or to one with an identical configuration. In this
instance, the device retrieves the new configuration file and boots from it. The device then enables DHCP as
instructed in the new configuration file, and the DHCP instructs it to reload the same file again.
Startup Procedures
Startup Menu Procedures
The procedures called from the Startup menu cover software download, flash handling and password
recovery. The diagnostics procedures are for use by technical support personnel only and are not disclosed
in the document.
The Startup menu can be entered when booting the device – a user input must be entered immediately
after the POST test.
To enter the Startup menu:
1 Turn the power on and watch for the auto-boot message.
**************************************************
***************** SYSTEM RESET *****************
**************************************************
Password Recovery
If a password is lost, the Password Recovery procedure can be called from the Startup menu.
The procedure enables entry to the device once without password.
Component Name
1 The tree view contains a list of the different device features. The branches in
the tree view can be expanded to view all the components under a specific
feature, or retracted to hide the feature's components. By dragging the
vertical bar to the right, the tree area can be expanded to display the full name
of a component.
2 The device view provides information about device ports, current
configuration and status, table information, and feature components.
Depending on the option selected, the area at the bottom of the device view
displays other device information and/or dialogs for configuring parameters.
3 The components list contains a list of the feature components. Components
can also be viewed by expanding a feature in the tree view.
4 The information buttons provide access to information about the device and
access to Dell Support. For more information, see "Information Buttons."
Device Representation
The PowerConnect home page contains a graphical device representation of the front panel.
The port coloring indicates if a specific port is currently active. Ports can be the following colors:
NOTE: The Port LEDs are not reflected in PowerConnect front panel in the PowerConnect OpenManage Switch
Administrator. LED status can only be determined by viewing the actual device. For more information about LEDs,
see "LED Definitions" on page 27.
Information Buttons
Information buttons provide access to on-line support and online help, as well as information about the
OpenManage Switch Administrator interfaces.
Button Description
Support Opens the Dell Support page at support.dell.com.
Help Online help containing information to assist in configuring and managing
the device. The online help pages are linked directly to the page currently
open. For example, if the IP Addressing page is open, the help topic for
that page opens when Help is clicked.
About Contains the version and build number and Dell copyright information.
Log Out Logs out of the application and closes the browser window.
Button Description
Apply Changes Applies changes to the device.
Add Adds information to tables or dialogs.
Telnet Starts a Telnet session.
Query Queries tables.
Show All Displays the device tables.
Left arrow/Right arrow Moves information between lists.
Refresh Refreshes device information.
Reset All Counters Clears statistic counters.
Print Prints the Network Management System page and/or table information.
Show Neighbors Info Displays the Neighbors List from the Neighbors Table page.
Draw Creates statistics charts on-the-fly.
Console Connection
1 Power on the device and wait until the startup is complete.
2 When the Console> prompt displays, type enable and press <Enter>.
3 Configure the device and enter the necessary commands to complete the required tasks.
4 When finished, exit the session with the quit or exit command.
NOTE: If a different user logs into the system in the Privilege EXEC command mode, the current user is logged off
and the new user is logged in.
Telnet Connection
Telnet is a terminal emulation TCP/IP protocol. ASCII terminals can be virtually connected to the local
device through a TCP/IP protocol network. Telnet is an alternative to a local login terminal where a
remote login is required.
The device supports up to four simultaneous Telnet sessions. All CLI commands can be used over a
telnet session.
Interface Mode
The Interface mode contains commands that configure the interface. The Global Configuration mode
command interface ethernet is used to enter the interface configuration mode. The following is
an example of the Interface mode prompt:
console> enable
console# configure
console(config)# interface ethernet g18
console(config-if)#
CLI Examples
CLI commands are provided as configuration examples. For a full description of the CLI commands,
including examples, refer to the "CLI Reference Guide" included on the Documentation CD.
FAN 1 Status: OK
FAN 2 Status: OK
• Clock Source — The source used to set the system clock. The possible field values are:
– SNTP — Specifies that the system time is set via an SNTP server. For more information,
see "Configuring SNTP Settings" on page 81.
– None — Specifies that the system time is not set by an external source.
Local Settings
• Date — Defines the system date. The field format is Day:Month:Year, for example, 04 May 2050.
• Local Time — Defines the system time. The field format is HH:MM:SS, for example, 21:15:03.
• Time Zone Offset — The difference between Greenwich Mean Time (GMT) and local time. For
example, the Time Zone Offset for Paris is GMT +1, while the local time in New York is GMT –5.
• There are two types of daylight settings, either by a specific date in a particular year or a recurring
setting irrespective of the year. For a specific setting in a particular year complete the Daylight Savings
area, and for a recurring setting, complete the Recurring area.
• Power Supply Status — The main power supply state. The possible field values are:
– — The main power supply is operating normally for the specified unit
– — The main power supply is not operating normally for the specified unit.
– Not Present — The power supply is not present for the specified unit.
• Fan — The device fan status. The possible field values are:
– — The fans are operating normally for the specified unit.
– — The fans are not operating normally for the specified unit.
– Not Present — The fans are not present for the specified unit.
FAN Status
------------- --------
1 OK
2 OK
DELL Switch#
Console >reload
This command will reset the whole system and disconnect your
current
session. Do you want to continue (y/n) [n] ?
• Poll Interval (60-86400) — Defines the interval (in seconds) at which the SNTP server is polled for
Unicast information.
• Receive Broadcast Servers Updates — Polls the SNTP servers for Broadcast server time information on
the selected interfaces.
• SNTP Authentication — Enables authenticating an SNTP session between the device and an SNTP
server, when enabled.
• Encryption Key ID — Defines the Key Identification used to authenticate the SNTP server and
device. The field value is up to 4294967295 characters.
• Authentication Key (1-8 Characters) — Specifies the key used for authentication.
• Trusted Key — Specifies the Encryption Key used to authenticate the SNTP server.
• Remove — Removes SNTP Authentication when selected.
• SNTP Server — Enter a user-defined SNTP server IP addresses or hostname. Up to eight SNTP servers
can be defined. This field can contain 1 - 158 characters.
• Poll Interval — Enables polling the selected SNTP Server for system time information, when enabled.
• Encryption Key ID — Specifies the Key Identification used to communicate between the SNTP server
and device. The range is 1 - 4294967295.
• Preference — The SNTP server providing SNTP system time information. The possible field values are:
– Primary — The primary server provides SNTP information.
– Secondary — The backup server provides SNTP information.
• Status — The operating tatus The possible field values are:
– Up — The SNTP server is currently operating normally.
– Down — The SNTP server is currently not operating normally.
– Unknown — The SNTP server status is currently unknown.
• Last Response — The last time a response was received from the SNTP server.
• Offset — Timestamp difference between the device local clock and the acquired time from the
SNTP server.
Unicast servers:
Server Preference Status Last response Offset Delay
[mSec] [mSec]
--------- ---------- -------- --------------- ------ ------
176.1.1.8 Primary Up AFE252C1.6DBDDFF2 7.33 117.79
176.1.8.179 Secondary Unknown AFE21789.643287C9 8.98 189.19
Anycast server:
Broadcast:
Interface IP address Last response
----------- ----------- ------------------------
176.1.1.8 Primary AFE252C1.6DBDDFF2
176.1.8.179 Secondary AFE21789.643287C9
Managing Logs
The Logs page contains links to various log pages. To open the Logs page, click System → Logs in the
tree view.
The Global Log Parameters page contains fields for defining which events are recorded to which logs.
It contains fields for enabling logs globally, and parameters for defining log parameters. The Severity log
messages are listed from the highest severity to the lowest. To open the Global Log Parameters page,
click System→ Logs→ Global Parameters in the tree view.
Enabling Logs:
1 Open the Global Log Parameters page.
2 Select Enable in the Logging drop-down list.
3 Select the log type and log severity in the Global Log Parameters check boxes.
4 Click Apply Changes.
The log settings are saved, and the device is updated.
Viewing and Clearing the RAM Log Table Using the CLI Commands
The following table summarizes the equivalent CLI commands for viewing and clearing fields displayed
in the RAM Log Table.
Table 6-12. RAM Log Table CLI Commands
IPv6 Prefixes
While unicast IPv6 addresses written with their prefix lengths are permitted, in practice their prefix
lengths are always 64 bits and therefore are not required to be expressed. Any prefix that is less than
64 bits is a route or address range that is summarizing a portion of the IPv6 address space.
For every assignment of an IP address to an interface, the system runs the Duplicate Address Detection
(DAD) algorithm to ensure uniqueness.
An intermediary transition mechanism is required for IPv6-only nodes to communicate with IPv6 nodes
over an IPv4 infrastructure. The tunneling mechanism implemented is the Intra-Site Automatic Tunnel
Addressing Protocol (ISATAP). This protocol treats the IPv4 network as a virtual IPv6 local-link,
with each IPv4 address mapped to a Link Local IPv6 address.
To open the IP Addressing page, click System → IP Addressing in the tree view.
Deleting IP Addresses
1 Open the IPv6 Interface page.
2 Click Show All.
The IPv4 Interface Parameters Table opens:
• Interface — The specific interface on which the DHCP client is configured. Click the option button
next to Port, LAG, or VLAN and select the interface connected to the device.
• Host Name — The system name as it is defined on the DHCP server (up to 20 characters).
• Remove — When selected, removes DHCP clients.
• Interface — The IPv6 interface that has been selected for configuration.
• Remove — When selected, removes the IPv6 attributes of the interface.
• DAD Attempts — Defines the number of consecutive neighbor solicitation messages that are sent on
an interface while Duplicate Address Detection (DAD) is performed on unicast IPv6 addresses on this
interface. New addresses remain in a tentative state while duplicate address detection is performed.
A field value of 0, disables duplicate address detection processing on the specified interface. A field
value of 1, indicates a single transmission without follow up transmissions. Range is 0-600, default is 1.
• Default Gateway IP Address — Displays the Link Local IPv6 address of the default gateway.
• Interface — Specifies the outgoing interface through which the default gateway can be reached.
Interface refers to any Port/LAG/VLAN and/or Tunnel.
• Type — Specifies the means by which the default gateway was configured. The possible field
values are:
– Static — Indicates the default gateway is user-defined.
– Dynamic — Indicates the default gateway is dynamically configured.
• State — Displays the default gateway status. The possible field values are:
– Incomplete — Indicates that address resolution is in progress and the link-layer address of the
default gateway has not yet been determined.
– Reachable — Indicates that the default gateway is known to have been reachable recently
(within tens of seconds ago).
– Stale — Indicates that the default gateway is no longer known to be reachable but until traffic is
sent to the default gateway, no attempt is made to verify its reachability.
• ISATAP Status — Specifies the status of ISATAP on the device. The possible field values are:
– Enable — ISATAP is enabled on the device.
– Disable — ISATAP is disabled on the device. This is the default value.
• IPv4 Address — Specifies the local (source) IPv4 address of a tunnel interface.
• Tunnel Router's Domain Name — Specifies a global string that represents a specific automatic tunnel
router domain name. The default value is ISATAP.
– Use Default — Selecting the check box returns settings to default.
• Domain Name Query Interval — Specifies the interval between DNS Queries (before the IP address
of the ISATAP router is known) for the automatic tunnel router domain name. The range is 10 - 3600
seconds. The default is 10 seconds.
– Use Default — Selecting the check box returns settings to default.
• ISATAP Router Solicitation Interval — Specifies the interval between router solicitations messages
when there is no active router. The range is 10 - 3600 seconds. The default is 10.
– Use Default — Selecting the check box returns settings to default.
• ISATAP Robustness — Specifies the number of DNS Query/ Router Solicitation refresh messages that
the device sends. The range is 1 - 20 seconds. The default is 3.
– Use Default — Selecting the check box returns settings to default.
• Interface — Displays the interface on which IPv6 Interface is defined. Interfaces include Ports, LAGs,
or VLANs.
• IPv6 Address — Defines the currently configured neighbor IPv6 address.
• MAC Address — Displays the MAC address assigned to the interface.
• Type — Displays the type of the neighbor discovery cache information entry. The possible field values
are:
– Static — Shows static neighbor discovery cache entries. If an entry for the specified IPv6 address
already exists in the neighbor discovery cache—as learned through the IPv6 neighbor discovery
process—you can convert the entry to a static entry.
– Dynamic — Shows dynamic neighbor discovery cache entries.
Deleting Neighbors
1 Open the IPv6 Neighbors page.
2 Click Show All.
The IPv6 Neighbors Table opens:
3 Select the Remove check box in the desired entry. Alternatively, select the desired value in the Clear
Table field. The possible filed values are:
– Static Only — Clears the the IPv6 Neighbor Table static entries.
– Dynamic Only — Clears the IPv6 Neighbor Table dynamic entries.
– All Dynamic and Static — Clears the IPv6 Neighbor Table static and dynamic address entries.
– None — Does not clear any entries.
4 Click Apply Changes.
The selected neighbors are deleted, and the device is updated.
• Default Domain Name (1-158 characters) — Contains a user-defined DNS domain name server.
When selected, the DNS domain name is the default domain.
• Type — The domain type if the domain was statically or dynamically created.
• Remove — When selected, removes a selected domain.
• Host Name — Contains a Host Name list. Host Name are defined in the Add Host Name Mapping
page. Each host provides up to eight IP address. The field values for the Host Name field are:
• IP Address (X.X.X.X) — Provides up to eight IP addresses that are assigned to the specified host name.
• Type — The IP address type. The possible field values are:
– Dynamic — The IP address was created dynamically.
– Static — The IP address is a static IP address.
• Remove Host Name — When checked, removes the DNS Host Mapping.
Configuring ARP
The Address Resolution Protocol (ARP) is a TCP/IP protocol that converts IP addresses into physical
addresses. The static entries can be defined in the ARP Table. When static entries are defined,
a permanent entry is entered and used to translate IP addresses to MAC addresses. To open the ARP
Settings page, click System→ IP Addressing→ ARP in the tree view.
3 Select an interface.
console> enable
Console# test copper-port tdr g3
Cable is open at 100 meters.
Console> show copper-ports tdr
Port Result Length [meters] Date
---- ------ --------------- ----
g1 OK
g2 Short 50 13:32:00 15 January 2004
g3 Test has not been performed
g4 Open 64 13:32:00 15 January 2004
21 W OK OK OK OK OK OK
22 OK OK OK OK OK E OK
23 Copper
• Access Profile — User-defined Access Profile lists. The Access Profile list contains a default value of
Console List, to which user-defined access profiles are added. Selecting Console Only as the Access
Profile name disconnects the session, and enables accessing the device from the console only.
• Current Active Access Profile — The access profile that is currently active.
• Set Access Profile Active — Activates an access profile.
• Remove — Removes an access profile from the Access Profile Name list, when selected.
Activating a Profile
1 Open the Access Profiles page.
2 Select an Access Profile in the Access Profile field.
3 Select the Set Access Profile Active check box.
4 Click Apply Changes.
The Access Profile is activated.
• Access Profile Name (1-32 Characters) — User-defined name for the access profile.
• Rule Priority (1-65535) — The rule priority. When the packet is matched to a rule, user groups are
either granted or denied device management access. The rule order is set by defining a rule number
within the Profile Rules Table. The rule number is essential to matching packets to rules, as packets
are matched on a first-fit basis. The rule priorities are assigned in the Profile Rules Table.
• Management Method — The management method for which the access profile is defined. Users with
this access profile can access the device using the management method selected.
Removing a Rule
1 Open the Access Profiles page.
2 Click Show All.
The Profile Rules Table opens.
3 Select a rule.
4 Select the Remove check box.
5 Click Apply Changes.
The selected rule is deleted, and the device is updated.
Minimal length: 0
History: Disabled
History hold time: no limit
Lockout control: disabled
Enable Passwords
Line Passwords
Deleting Users:
1 Open the Local User Database page.
2 Click Show All.
The Local User Table opens.
3 Select a User Name.
4 Select the Remove check box.
5 Click Apply Changes.
The selected user is deleted and the device is updated.
Global values
-----------------
TimeOut : 5
Router Configuration
-----------------
Source IP : 0.0.0.0
console#
• Enable LLDP — Indicates if LLDP is enabled on the device. The possible field values are:
– Checked — Indicates that LLDP is enabled on the device.
– Unchecked — Indicates that LLDP is disabled on the device. This is the default value.
• Updates Interval (5-32768) — Indicates that rate at which LLDP advertisement updates are sent.
The possible field range is 5 - 32768 seconds. The default value is 30 seconds.
For information on the fields, refer to the Details Advertise Information page above.
• Local Engine ID (10 - 64 Hex Characters) — Indicates the local device engine ID. The field value is a
hexadecimal string. Each byte in hexadecimal character strings is two hexadecimal digits. Each byte
can be separated by a period or a colon. The Engine ID must be defined before SNMPv3 is enabled.
For stand-alone devices select a default Engine ID that is comprised of Enterprise number and the
default MAC address.
• Use Default — Uses the device generated Engine ID. The default Engine ID is based on the device
MAC address and is defined per standard as:
– First 4 octets — first bit = 1, the rest is IANA Enterprise number = 674.
– Fifth octet — Set to 3 to indicate the MAC address that follows.
– Last 6 octets — MAC address of the device.
• SNMP Notifications — Enables or disables the router sending SNMP notifications.
• Authentication Notifications — Enables or disables the router sending SNMP traps when
authentication fails.
Version 3 notifications
Target Type Username Security Udp Filter To Retries
Address Level Port name Sec
-------- ---- --------- -------- ---- ------ --- -------
• View Name — Contains a list of user-defined views. The view name can contain a maximum of 30
alphanumeric characters. The possible field values are:
– Default — Displays the default user-defined view.
– DefaultSuper — Displays the default super user-defined view.
• New Object ID Subtree — Indicates the device feature OID included or excluded in the selected
SNMP view.
• Selected from List — Select the device feature OID by using the Up and Down buttons to scroll
through a list of all device OIDs.
• Insert — Specify the device feature OID.
• View Type — Indicates if the defined OID branch will be included or excluded in the selected SNMP
view.
• Group Name — The user-defined group to whom access control rules are applied. The field range is up
to 30 characters.
• Security Model — Defines the SNMP version attached to the group. The possible field values are:
– SNMPv1 — SNMPv1 is defined for the group.
– SNMPv2 — SNMPv2 is defined for the group.
– SNMPv3 — SNMPv3 is defined for the group.
– Security Level — The security level attached to the group. Security levels apply to SNMPv3 only.
The possible field values are:
– No Authentication — Neither the Authentication nor the Privacy security levels are assigned to
the group.
– Authentication — Authenticates SNMP messages, and ensures the SNMP messages origin is
authenticated.
– Privacy — Encrypts SNMP messages.
• Operation — Defines the group access rights. The possible field values are:
– Read — The management access is restricted to read-only, and changes cannot be made to the
assigned SNMP view.
– Write — The management access is read-write and changes can be made to the assigned
SNMP view.
– Notify — Sends traps for the assigned SNMP view.
• User Name — Contains a list of user-defined user names. The field range is up to 30 alphanumeric
characters.
• Engine ID — Indicates either the local or remote SNMP entity, to which the user is connected.
Changing or removing the local SNMP Engine ID deletes the SNMPv3 User Database.
• Group Name — Contains a list of user-defined SNMP groups. SNMP groups are defined in the Access
Control Group page.
• Authentication Method — The authentication method used to authenticate users. The possible field
values are:
– MD5 Key — Users are authenticated using the HMAC-MD5 algorithm.
– SHA Key — Users are authenticated using the HMAC-SHA-96 authentication level.
– MD5 Password — Indicates that HMAC-MD5-96 password is used for authentication. The user
should enter a password.
– SHA Password — Users are authenticated using the HMAC-SHA-96 authentication level.
The user should enter a password.
– None — No user authentication is used.
• Password (0-32 Characters) — Modifies the user-defined password for a group. Passwords can contain
a maximum of 32 alphanumeric characters.
Defining Communities
Access rights are managed by defining communities in the Community Table. When the community
names are changed, access rights are also changed. To open the SNMP Community page, click System →
SNMP → Community in the tree view.
Deleting Communities
1 Open the Community Table page.
2 Click Show All.
The Community Table opens.
3 Select a community from the Community Table.
4 Select the Remove check box.
5 Click Apply Changes.
The selected community entry is deleted, and the device is updated.
Firmware Download
• Server IP Address — The Server IP Address from which the firmware files are downloaded.
• Source File Name (1-64 Characters) — Indicates the file to be downloaded.
Active Image
• Active Image — The Image file that is currently active.
• Active Image After Reset — The Image file that is active after the device is reset.
Configuration Download
• Server IP Address — The Server IP Address from which the configuration files
• are downloaded.
• Source File Name (1-64 Characters) — Indicates the configuration files to be downloaded.
• Destination — The destination file to which the configuration file is downloaded.
Downloading Files
1 Open the File Download From Server page.
2 Define the file type to download.
3 Define the fields.
4 Click Apply Changes.
The software is downloaded to the device.
• Supported IP Format — Specifies the IP format supported by the server. The possible values are:
– IPv6 — IP version 6 is supported.
– IPv4 — IP version 4 is supported.
• IPv6 Address Type — When the server supports IPv6 (see previous parameter), this specifies the type
of static address supported. The possible values are:
– Link Local — A Link Local address that is non-routable and used for communication on the same
network only.
– Global — A globally unique IPv6 address; visible and reachable from different subnets.
Configuration Upload
• TFTP Server IP Address — The TFTP Server IP Address to which the Configuration file is uploaded.
• Destination File Name (1-64 Characters) — Indicates the Configuration file path to which the file is
uploaded.
• Transfer File Name — The software file to which the configuration is uploaded. This list of
user-defined configuration files only appears if the user created backup configuration files.
For example, if the user copied the running configuration file to a user-defined configuration file
called BACKUP-SITE-1, this list appears on the File Upload to Server page and the BACKUP-SITE-1
configuration file appears in the list.The possible field values are:
– Running Configuration — Uploads the Running Configuration file.
– Startup Configuration — Uploads the Startup Configuration file.
– <filename> — Uploads the specified configuration file. The filename was determined by the
user at download.
• Copy Configuration — When selected, copies the configuration to the destination file as specified.
– Source — Indicates the type of file to be copied to the destination file. Select either the Running
Configuration or Startup Configuration.
– Destination — Indicates the destination configuration file to which the source file is copied.
Select My First Backup, Startup Configuration or Running Configuration.
– New File Name — Indicates the name of the newly created backup configuration file.
• Restore Configuration Factory Defaults — When selected, specifies that the factory configuration
default files should be reset. When unselected, maintains the current configuration settings.
Copying Files
1 Open the Copy Files page.
2 Define the Copy Configuration fields.
3 Click Apply Changes.
The file is copied, and the device is updated.
Optimizing iSCSI
iSCSI is a communication protocol used for sending data between file servers and storage disks. The file
servers are called initiators and the disks are called targets. You can optimize iSCSI flow by setting
Quality of Service frame priority parameters in the device. The device can also intercept iSCSI frames
and provide information about iSCSI communications (called sessions).
• iSCSI Status — Whether iSCSI Optimization is enabled on the device. The default value is enabled.
• Classification — Whether priority of iSCSI packets is determined by CoS or DSCP. Select the
classification and then choose the desired value.
• Remark — Whether iSCSI remarks are enabled on the device.
• iSCSI Aging Time — How long the device will wait after the last received frame of an iSCSI session
before deleting the session from the list.
Session 2:
---------
Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10
Time started: 23-Jul-2002 21:04:50
Time for aging out: 2 min
ISID: 22
• TCP Port — The TCP port used by the target for iSCSI communications.
• IP Address — The IP address of the target. The IP address 0.0.0.0 is any IP address.
• Target Name — The name of the target.
• Remove — Used to remove targets from the table.
Adding Targets
1 Open the iSCSI Targets Table.
2 Click Add.
The Add iSCSI Target page opens.
Removing Targets
1 Open the iSCSI Targets Table.
2 In the table, check the Remove checkbox next to each target to be removed.
3 Click Apply Changes.
iSCSI enabled
iSCSI vpt: 5, remark
Session aging time: 60 min
Maximum number of sessions: 256
Termination Cause — The reason for which the port authentication was terminated.
Copy To Checkbox — Copies port parameters from one port to the selected ports.
Select All — Selects all ports in the Port Based Authentication Table.
console> enable
Console# show dot1x
ACL Overview
Access Control Lists (ACL) allow network managers to define classification actions and rules for specific
ingress ports. Packets entering an ingress port, with an active ACL, are either admitted or denied entry
and the ingress port is disabled. If they are denied entry, the user can disable the port.
• DHCP Snooping Status — Indicates if DHCP Snooping is enabled on the device. The possible field
values are:
– Enable — Enables DHCP Snooping on the device.
– Disable — Disables DHCP Snooping on the device. This is the default value.
• Verify MAC Address — Indicates if MAC addresses are verified. The possible field values are:
– Enable — Verifies that an untrusted port source MAC address matches the client’s MAC address.
– Disable — Disables verifying that an untrusted port source MAC address matches the client’s
MAC address. This is the default value.
• Save Binding Database to File — Indicates if the DHCP Snooping Database is saved to file.
The possible field values are:
– Enable — Enables saving the database to file. This is the default value.
– Disable — Disables saving the database to file.
– Save Binding Database Internal — Indicates how often the DHCP Snooping Database is
updated. The possible field range is 600 – 86400 seconds. The field default is 1200 seconds.
Interface Trusted
----------- -----------
g1 yes
g2 yes
• Interface — Indicates the port or LAG on which DHCP Snooping Trust mode is enabled.
• Trust Status — Indicates if the DHCP Snooping Trust mode is enabled on the port or LAG.
The possible field values are:
– Enable — Indicates that DHCP Snooping Trust mode is enabled on the port or LAG.
– Disable — Indicates that DHCP Snooping Trust mode is disabled on the port or LAG.
• Port — The port number for which port parameters are defined.
• Description (0-64 Characters) — A brief interface description, such as Ethernet.
• Port Type — The type of port.
• Admin Status — Enables or disables traffic forwarding through the port. The new port status is
displayed in the Current Port Status field.
• Current Port Status — Specifies whether the port is currently operational or non-operational.
• Interface — The specific port or LAG to which the static MAC address is applied.
• MAC Address — The MAC address listed in the current static address list.
• VLAN ID — The VLAN ID attached to the MAC Address.
• VLAN Name — User-defined VLAN name.
console#
• Spanning Tree State — Enables or disables Spanning Tree on the device. The possible field values are:
– Enable — Enables Spanning Tree
– Disable — Disables Spanning Tree
• STP Operation Mode — The STP mode by which STP is enabled on the device. The possible field
values are:
– Classic STP — Enables Classic STP on the device. This is the default value.
– Rapid STP — Enables Rapid STP on the device.
– Multiple STP — Enables Multiple STP on the device.
console(config)# spanning-tree
console(config)# spanning-tree mode rstp
console(config)# spanning-tree priority 12288
console(config)# spanning-tree hello-time 5
console(config)# spanning-tree max-age 15
console(config)# spanning-tree forward-time 25
console(config)# exit
console# show spanning-tree
Interfaces
Name State Prio. Cost Sts Role PortFast Type
Nbr
----- ------ ----- ---- ------ ------ --------- ------
g1 enabled 128.1 100 DSBL Dsbl No P2p (STP)
g2 enabled 128.2 100 DSBL Dsbl No P2p (STP)
g3 enabled 128.3 100 DSBL Dsbl No P2p (STP)
Port g5 disabled
State: disabled Role: disabled
console#
• Select a LAG — The user-defined LAG. For more information, see "Defining LAG Membership" on
page 354.
• STP — Enables or disables STP on the LAG.
• Fast Link — Enables Fast Link mode for the LAG. If Fast Link mode is enabled for a LAG, the LAG
State is automatically placed in the Forwarding state when the LAG is up. Fast Link mode optimizes
the time it takes for the STP protocol to converge. STP convergence can take 30-60 seconds in large
networks.
• Root Guard — When checked, prevents devices outside the network core from being assigned the
spanning tree root.
Rapid Spanning Tree is enabled on the STP Global Settings page. To open the Rapid Spanning Tree
(RSTP) page, click Switch→ Spanning Tree→ Rapid Spanning Tree in the tree view.
Enabling RSTP
1 Open the Rapid Spanning Tree (RSTP) page.
2 Define the Point-to-Point Admin, Point-to-Point Oper, and the Activate Protocol Migration fields.
3 Click Apply Changes.
Rapid STP is enabled, and the device is updated.
• Instance ID — Defines the VLAN group to which the interface is assigned. Possible field range is 0-15.
• Interface — Assigns either ports or LAGs to the selected MSTP instance.
• Port State — Indicates whether the port is enabled or disabled in the specific instance.
• Type — Indicates whether MSTP treats the port as a point-to-point port, or a port connected to a hub,
and whether the port is internal to the MSTP region or a boundary port. If the port is a boundary port,
it also indicates whether the device on the other side of the link is working in RSTP or STP mode.
Configuring VLANs
VLANs are logical subgroups of a Local Area Network (LAN) created via software rather than defining a
hardware solution. VLANs combine user stations and network devices into a single domain regardless of
the physical LAN segment to which they are attached. VLANs allow network traffic to flow more
efficiently within subgroups. VLANs managed through software reduces the amount of time in which
network changes are implemented.
VLANs have no minimum number of ports, and can be created per device or any other logical
connection combination, as VLANs are software based and not defined by physical attributes.
VLANs function at Layer 2. Since VLANs isolate traffic within the VLAN, a Layer 3 router functioning
router is needed to allows traffic flow between VLANs. Layer 3 routers identify segments and coordinate
with VLANs. VLANs are broadcast and Multicast domains. Broadcast and Multicast traffic is transmitted
only in the VLAN in which the traffic is generated.
VLAN tagging provides a method of transferring VLAN information between VLAN groups. VLAN
tagging attaches a tag to packet headers. The VLAN tag indicates to which VLAN the packet belongs.
VLAN tags are attached to the packet by either the end station or by the network device. VLAN tags also
contains VLAN network priority information. Combining VLANs and GVRP enables the automatic
dispersal of VLAN information. To open the VLAN page, click Switch→ VLAN in the tree view.
QinQ tagging allows network managers to add an additional tag to previously tagged packets. Customer
VLANs are configured using QinQ. Adding additional tags to the packets helps create more VLAN space.
The added tag provides VLAN ID to each customer, this ensures private and segregated network traffic.
• Show VLAN — Lists and displays specific VLAN information according to VLAN ID or VLAN name.
• VLAN Name — The user-defined VLAN name.
Deleting a VLAN
1 Open the VLAN Membership page.
2 Click the VLAN ID or VLAN Name option button and select a VLAN from the drop-down menu.
3 Select the Remove VLAN check box.
4 Click Apply Changes.
The selected VLAN is deleted, and the device is updated.
CLI Command
Console>enable
Console#config
Console (config)#
Console (config)# vlan database
Console (config-vlan)# vlan 100
Console (config-vlan)# exit
Console (config)# interface ethernet e5
Console (config-if)# switchport mode customer
Console (config-if)# switchport customer vlan 100
Console (config-if)# exit
Console (config)# interface ethernet e10
Console (config-if)# switchport mode trunk
Console (config-if)# switchport trunk allowed vlan add 100
Console (config-if)# exit
Forbidden VLANS:
Vlan Name
---- -----------------------
Classification rules:
Group ID Vlan ID
-------- ------------------
Group ID Vlan ID
-------- ------------------
Group ID Vlan ID
-------- ------------------
console#
• Frame Type — The packet type. Possible field values are Ethernet, RFC1042, and LLC Other.
• Protocol Value — User-defined protocol name.
• Ethernet-Based Protocol Value — The Ethernet protocol group type. The possible field values are IP,
IPX and IPV6.
• Protocol Group ID — The VLAN Group ID number.
• Remove — When selected, removes frame-to-protocol group mapping, if the protocol group to be
removed is not configured on this protocol port.
The following example sets a protocol-based classification rule of protocol group 1 to VLAN 8:
Console (config-if)# switchport general map protocols-group 1
vlan 8
Configuring GVRP
GARP VLAN Registration Protocol (GVRP) is specifically provided for automatic distribution of VLAN
membership information among VLAN-aware bridges. GVRP allows VLAN-aware bridges to
automatically learn VLANs to bridge ports mapping, without having to individually configure each
bridge and register VLAN membership.
To ensure the correct operation of the GVRP protocol, it is advised to set the maximum number of
GVRP VLANs equal to a value which significantly exceeds the sum of:
• The number of all static VLANs both currently configured and expected to be configured.
• The number of all dynamic VLANs participating in GVRP, both currently configured (initial number of
dynamic GVRP VLANs is 128) and expected to be configured.
The GVRP Global Parameters page enables GVRP globally. GVRP can also be enabled on a per-interface
basis. To open the GVRP Parameters page, click Switch→ VLAN→ GVRP Parameters in the tree view.
• GVRP Global Status — Enables or disables GVRP on the device. GVRP is disabled by default.
• Interface — The port or LAG for which GVRP is enabled.
• GVRP State — Enables or disables GVRP on an interface.
• Dynamic VLAN Creation — Enables or disables VLAN creation through GVRP.
• GVRP Registration — The GVRP Registration status.
• Voice VLAN Status — Indicates if Voice VLAN is enabled on the device. The possible field values are:
– Enable — Enables Voice VLAN on the device.
– Disable — Disables Voice VLAN on the device. This is the default value.
• Voice VLAN ID — Defines the Voice VLAN ID number.
OUI table
• Interface — Indicates the specific port or and LAG to which the Voice VLAN settings are applied.
• Voice VLAN Mode — Defines the Voice VLAN mode. The possible field values are:
– None — Disables the selected port/LAG on the Voice VLAN.
– Static — Maintains the current Voice VLAN port/LAG settings. This is the default value.
– Auto — Indicates that if traffic with an IP Phone MAC Address is transmitted on the port/LAG,
the port/LAG joins the Voice VLAN. The port/LAG is aged out of the voice VLAN if the
IP phone’s MAC address (with an OUI prefix) is aged out and exceeds the defined. If the
MAC Address of the IP phones OUI was added manually to a port/LAG in the Voice VLAN,
the user cannot add it to the Voice VLAN in Auto mode, only in Manual mode.
• Voice VLAN Port/LAG Security — Indicates if port/LAG security is enabled on the Voice VLAN.
Port Security ensures that packets arriving with an unrecognized OUI are dropped.
– Enable — Enables port security on the Voice VLAN.
– Disable — Disables port security on the Voice VLAN. This is the default value.
The Voice VLAN Port Setting Table includes the Membership field which indicates if the Voice VLAN
member is a static or dynamic member. The field value Dynamic indicates the VLAN membership
was dynamically created through GARP. The field value Static indicates the VLAN membership is
user-defined.
3 Modify the fields as desired.
4 Click Apply Changes.
• Telephony OUI(s) — Lists the OUIs currently enabled on the Voice VLAN. The following OUIs are
enabled by default:
– 00-01-E3 — Siemens AG phone
– 00-03-6B — Cisco phone
– 00-0F-E2 — H3C Aolynk
– 00-60-B9 — Philips and NEC AG phone
– 00-D0-1E — Pingtel phone
– 00-E0-75 — Polycom/Veritel phone
– 00-E0-BB — 3COM phone
• Description — Provides an OUI description up to 32 characters.
Adding OUIs
1 Open the Voice VLAN OUI page.
2 Click Add. The Add OUI page opens.
Removing OUIs
1 Open the Voice VLAN OUI page.
2 Check the Remove checkbox next to teach OUI to be removed.
3 Click Apply Changes.
The selected OUIs are removed.
Aggregating Ports
Port Aggregation optimizes port usage by linking a group of ports together to form a single Link
Aggregated Group (LAG). Port Aggregation multiplies the bandwidth between the devices, increases
port flexibility, and provides link redundancy. The device supports up to eight LAGs per system, and
eight ports per LAG per device.
Each LAG is composed of ports of the same speed, set to full-duplex operations. Ports in a LAG, can be
of different media types (UTP/Fiber, or different fiber types), provided they operate at the same speed.
Aggregated Links can be assigned manually or automatically by enabling Link Aggregation Control
Protocol (LACP) on the relevant links. The device provides LAG Load Balancing based on both source
MAC addresses and destination MAC addresses.
Aggregated Links are treated by the system as a single logical port. Specifically, the Aggregated Link has
similar port attributes to a non-aggregated port, including auto-negotiation, speed, Duplex setting, etc.
The device supports both static LAGs and Link Aggregation Control Protocol (LACP) LAGs. LACP
LAG negotiate Aggregated Port links with other LACP ports located on a different device. If the other
device ports are also LACP ports, the devices establish a LAG between them.
The following guidelines should be followed when adding ports to a LAG:
• There is no Layer 3 interface defined on the port.
• The port does not belong to any VLAN.
• The port does not belong to any other LAG.
• The port is not a mirrored port.
• The port's 802.1p priority is equal to LAGs 802.1p priority.
• QoS Trust is not disabled on the port.
• GVRP is not enabled.
Ports can be configured as LACP ports only if the ports are not part of a previously configured LAG.
The device uses a hash function to determine which frames are carried on which aggregated-link
member. The hash function statistically load-balances the aggregated link members. The device
considers an Aggregated Link as a single logical port.
• LACP System Priority (1-65535) — The LACP priority value for global settings. The possible range is
1- 65535. The default value is 1.
• Select a Port — The port number to which timeout and priority values are assigned.
• LACP Port Priority (1-65535) — LACP priority value for the port.
• LACP Timeout — Administrative LACP timeout. The possible field values are:
– Short — Specifies a short timeout value.
– Long — Specifies a long timeout value.
• VLAN ID — Identifies a VLAN and contains information about the Multicast group address.
• Bridge Multicast Address — Identifies the Multicast group MAC address/IP address.
• Remove — When selected, removes a Bridge Multicast address.
• Ports — Port that can be added to a Multicast service.
• LAGs — LAGs that can be added to a Multicast service.
Managing LAGs and Ports Attached to Multicast Routers Using CLI Commands
The following table summarizes the equivalent CLI commands for managing LAGs and ports attached
to Multicast routers as displayed on the Bridge Multicast Forward All page.
Table 7-40. CLI Commands for Managing LAGs and Ports Attached to Multicast Routers
console(config)#vlan database
console(config-if)#vlan 8
console(config-vlan)#exit
console(config)#interface range ethernet g1-9
console(config-if)# switchport mode general
console(config-if)# switchport general allow vlan add 8
Console(config-if)# exit
console(config)#interface vlan 8
Console(config-if)# bridge multicast address 0100.5e02.0203
add ethernet g1-9
Console(config-if)# exit
Console (config)# interface VLAN 1
Console (config-if)# bridge multicast forward-all add ethernet
g8
Console(config-if)# end
Console # show bridge multicast filtering 1
Filtering: Enabled
VLAN: Forward-All
show ip igmp snooping groups [vlan vlan-id] Displays the Multicast groups learned by IGMP snooping.
[address ip-multicast-address]
show ip igmp snooping interface vlan-id Displays IGMP snooping configuration.
show ip igmp snooping mrouter [interface vlan- Displays information about dynamically learned Multicast
id] router interfaces.
Console> enable
Console# config
Console (config)# ip igmp snooping
Console (config)# interface vlan 1
Console (config-if)# ip igmp snooping mrouter learn-pim-dvmrp
Console (config-if)# ip igmp snooping host-time-out 300
Console (config-if)# ip igmp snooping mrouter-time-out 200
Console (config-if)# exit
Console (config)# interface vlan 1
Console (config-if)# ip igmp snooping leave-time-out 60
Console (config-if)# exit
Console (config)# exit
Console # show ip igmp snooping groups
VLAN Ports
---- ------
1 g1
Port Unregistered
---- -------------
g1 Forward
g2 Filter
g3 Filter
Viewing Tables
The Table Views page contains links for displaying statistics in a chart form. To open the page,
click Statistics→ Table in the tree view.
• Refresh Rate — The amount of time that passes before the interface statistics are refreshed.
• Interface — The interface number.
• Interface Status — Status of the interface.
• Refresh Rate — The amount of time that passes before the interface statistics are refreshed.
• Interface — The interface number.
• Interface Status — The interface status.
• Received Unicast Packets — Number of received Unicast packets on the interface.
• Received Non Unicast Packets — Number of received non-Unicast packets on the interface.
• Transmit Unicast Packets — Number of transmitted Unicast packets from the interface.
Transmit Statistics
• Total Bytes (Octets) — Number of octets transmitted on the selected interface.
• Unicast Packets — Number of Unicast packets transmitted on the selected interface.
• Multicast Packets — Number of Multicast packets transmitted on the selected interface.
• Broadcast Packets — Number of Broadcast packets transmitted on the selected interface.
• Packets with Errors — Number of error packets transmitted from the selected interface.
Console> enable
Console> enable
Console# show interfaces counters ethernet g1
FCS Errors: 8
Single Collision Frames: 0
Multiple Collision Frames: 0
SQE Test Errors: 0
Deferred Transmissions: 0
Late Collisions: 0
Excessive Collisions: 0
Internal MAC Tx Errors: 0
Carrier Sense Errors: 0
Oversize Packets: 0
Internal MAC Rx Errors: 0
Received Pause Frames: 0
Transmitted Pause Frames: 0
GVRP statistics:
----------------
rJE : Join Empty Received rJIn : Join In Received
rEmp : Empty Received rLIn : Leave In Received
rLE : Leave Empty Received rLA : Leave All Received
sJE : Join Empty Sent sJIn : Join In Sent
sEmp : Empty Sent sLIn : Leave In Sent
sLE : Leave Empty Sent sLA : Leave All Sent
Port rJE rJIn rEmp rLIn rLE rLA sJE sJIn sEmp sLIn sLE sLA
---- --- ---- ---- ---- --- --- --- ---- ---- ---- --- ---
g1 0 0 0 0 0 0 0 0 0 0 0 0
g2 0 0 0 0 0 0 0 0 0 0 0 0
g3 0 0 0 0 0 0 0 0 0 0 0 0
g4 0 0 0 0 0 0 0 0 0 0 0 0
g5 0 0 0 0 0 0 0 0 0 0 0 0
g6 0 0 0 0 0 0 0 0 0 0 0 0
g7 0 0 0 0 0 0 0 0 0 0 0 0
g8 0 0 0 0 0 0 0 0 0 0 0 0
• Interface — Specifies the port or LAG for which statistics are displayed.
• Refresh Rate — Amount of time that passes before the statistics are refreshed.
• Drop Events — Number of dropped events that have occurred on the interface since the device was
last refreshed.
• Received Bytes (Octets) — Number of octets received on the interface since the device was last
refreshed. This number includes bad packets and FCS octets, but excludes framing bits.
• Received Packets — Number of packets received on the interface, including bad packets, Multicast
and broadcast packets, since the device was last refreshed.
• Broadcast Packets Received — Number of good broadcast packets received on the interface since the
device was last refreshed. This number does not include Multicast packets.
console> enable
Console# show rmon statistics ethernet g1
Port g1
Dropped: 8
Octets: 878128 Packets: 978
Broadcast: 7 Multicast: 1
CRC Align Errors: 0 Collisions: 0
Undersize Pkts: 0 Oversize Pkts: 0
Fragments: 0 Jabbers: 0
64 Octets: 98 65 to 127 Octets: 0
128 to 255 Octets: 0 256 to 511 Octets: 0
512 to 1023 Octets: 491 1024 to 1518 Octets: 389
• History Entry No. — Entry number for the History Control Table page.
• Source Interface — Port or LAG from which the history samples were taken.
• Owner (0-20 characters) — RMON station or user that requested the RMON information.
• Max No. of Samples to Keep (1-50) — Number of samples to be saved. The default value is 50.
• Current No. of Samples in List — The current number of samples taken.
• Sampling Interval (1-3600) — Indicates in seconds the time that samples are taken from the ports.
The possible values are 1-3600 seconds. The default is 1800 seconds (30 minutes).
• Remove — When selected, removes the History Control Table entry.
• Sample No. — The specific sample the information in the table reflects.
• Drop Events — The number of dropped packets due to lack of network resources during the sampling
interval. This may not represent the exact number of dropped packets, but rather the number of times
dropped packets were detected.
• Received Bytes (Octets) — The number of data octets, including bad packets, received on the
network.
• Received Packets — The number of packets received during the sampling interval.
• Broadcast Packets — The number of good broadcast packets received during the sampling interval.
• Multicast Packets — The number of good Multicast packets received during the sampling interval.
• CRC Align Errors — The number of packets received during the sampling session with a length of
64-1518 octets, a bad Frame Check Sequence (FCS), and with an integral number of octets, or a bad
FCS with a non-integral number.
• Undersize Packets — The number of packets received less than 64 octets long during the sampling
session.
• Oversize Packets — The number of packets received more than 1518 octets long during the sampling
session.
• Fragments — The number of packets received less than 64 octets long and had a FCS during the
sampling session.
• Jabbers — The number of packets received more than 1518 octets long and had a FCS during the
sampling session.
• Collisions — Estimates the total number of packet collisions that occurred during the sampling
session. Collisions are detected when repeater ports detects two or more stations transmit
simultaneously.
• Utilization — Estimates the main physical layer network usage on an interface during the session
sampling. The value is reflected in hundredths of a percent.
The following is an example of the CLI commands for displaying RMON ethernet statistics for
throughput on index 1:.
console> enable
Console# show rmon history 1 throughput
Sample Set: 1 Owner: CLI
Interface: g1 Interval: 1800
Requested samples: 50 Granted samples: 50
console> enable
console# config
console (config)# rmon event 1 log
console (config)# exit
Console# show rmon events
console> enable
console# config
console (config)# rmon event 1 log
console (config)# exit
Console# show rmon log
3 Select an interface.
4 Complete the fields in the dialog.
5 Click Apply Changes.
The RMON alarm is added, and the device is updated.
Viewing Charts
The Chart page contains links for displaying statistics in a chart form. To open the page,
click Statistics→ Charts in the tree view.
Port Description
---- ------------------
g1 Management_port
g2 R&D_port
g3 Finance_port
Ch Description
---- ------------------
1 Output
GVRP statistics:
----------------
rJE : Join Empty Received rJIn : Join In Received
rEmp : Empty Received rLIn : Leave In Received
rLE : Leave Empty Received rLA : Leave All Received
sJE : Join Empty Sent sJIn : Join In Sent
sEmp : Empty Sent sLIn : Leave In Sent
sLE : Leave Empty Sent sLA : Leave All Sent
Port rJE rJIn rEmp rLIn rLE rLA sJE sJIn sEmp sLIn sLE sLA
---- --- ---- ---- ---- --- --- --- ---- ---- ---- --- ---
g1 0 0 0 0 0 0 0 0 0 0 0 0
g2 0 0 0 0 0 0 0 0 0 0 0 0
g3 0 0 0 0 0 0 0 0 0 0 0 0
g4 0 0 0 0 0 0 0 0 0 0 0 0
g5 0 0 0 0 0 0 0 0 0 0 0 0
g6 0 0 0 0 0 0 0 0 0 0 0 0
g7 0 0 0 0 0 0 0 0 0 0 0 0
g8 0 0 0 0 0 0 0 0 0 0 0 0
CPU utilization
--------------------------
five seconds: 5%; one minute: 3%; five minutes: 3%
CoS Services
After packets are assigned to a specific queue, CoS services can be assigned to the queue(s). Output queues
are configured with a scheduling scheme by one of the following methods:
• Strict Priority — Ensures that time-sensitive applications are always forwarded through an expedited
path. Strict Priority allows the prioritization of mission-critical, time-sensitive traffic over less
time-sensitive applications.
For example, under Strict Priority, voice over IP traffic is forwarded before FTP or e-mail (SMTP)
traffic.
The strict priority queue is emptied before the traffic in the remaining queues in forwarded.
• Weighted Round Robin — Ensures that a single application does not dominate the device forwarding
capacity. Weighted Round Robin (WRR) forwards entire queues in a Round Robin order. Queue
priorities are defined by the queue length. The longer the queue length, the higher the queue's
forwarding priority.
For example, if eight queues have queue weights of 1, 2, 3, 4, 5, 6, 7 and 8, packets with the highest
forwarding priority are assigned to queue 8, and packets with the lowest forwarding priority assigned to
queue 1.
By providing highest forwarding priority to length 8 queues, weighted round robin processes higher
priority traffic, and ensure that low-priority traffic is forwarded satisfactorily.
• Cos Mode — Enables or disables managing network traffic using Quality of Service.
• Trust Mode — Determines which packet fields to use for classifying packets entering the device.
When no rules are defined the traffic containing the predefined packet field (CoS or DSCP) is
mapped according to the relevant trust modes table. Traffic not containing a predefined packet field is
mapped to best effort. The possible Trust Mode field values are:
– CoS (802.1P) — The output queue assignment is determined by the IEEE802.1p VLAN priority
tag (VPT) or by the default VPT assigned to a port.
– DSCP — The output queue assignment is determined by the DSCP field. interface Trust settings
overrides the global Trust setting.
• Class of Service — Specifies the CoS priority tag values, where zero is the lowest and 7 is the highest.
• Queue — The traffic forwarding queue to which the CoS priority is mapped. Eight traffic priority
queues are supported.
• Restore Defaults — Restores the device factory defaults for mapping CoS values to a forwarding
queue.
• DSCP In — The values of the DSCP field within the incoming packet.
• Queue — The queue to which packets with the specific DSCP value is assigned. The values are 1-8,
where one is the lowest value and eight is the highest.
Port Specifications
The following table describes the device port types, as well as, a description of the port types.
Device Specification
PowerConnect 5400 • 24 GE ports or 48 GE ports
• 4 SFP ports
• RS-232 Console port
Port Types
RJ-45 • 10 Base-T
• 100 Base-T
• 1000 Base-T
SFP Supports Standard Small Form-Factor
Gigabit Plug Transceivers
Port Settings
• Auto-negotiation for speed, duplex mode and
flow control
• Back Pressure
• Head of Line Blocking
• Auto MDI/MDIX
• Port Mirroring
• Broadcast Storm Control
Feature Specification
Operating Temperature 0 to 45 C / 32 to 113 F
Operating Humidity 10% - 90% (non-condensing)
Feature Specification
Unit Size • 19“ Width
• 1U Height
Ventilation Two fans per unit.
Quality of Service
• Layer 2 Trust Mode (IEEE 802.1p tagging)
• Layer 3 Trust Mode (DSCP)
• Adjustable Weighted Round Robin (WRR)
• Adjustable Strict Queue Scheduling
Layer 2 Multicast
• Dynamic Multicast Support - upto 256 Multicast groups supported in IGMP Snooping or static
Multicast, support for unregistered Multicast groups
Device Security
• Switch access password protection
• Port-based MAC Address alert and lock-down
• RADIUS remote authentication for switch management access
• TACACS+
• Management access filtering via Management Access Profiles
• SSH/SSL Management Encryptions
• DHCP Snooping
• 802.1x Authentication with Dynamic VLAN Assignment
• IP and MAC Based ACLs
Device Management
• Web Based Management Interface
• CLI Accessibility via Telnet
• SNMPv1 and SNMP v2 are supported
• 4 RMON Groups Supported
• TFTP Transfers of Firmware and Configuration Files
• Dual Firmware Images On-Board
• Multiple Configuration File Upload/Download Supported
• Statistics for Error Monitoring and Performance Optimization
• BootP/DHCP IP Address Management Supported
• Syslog Remote Logging Capabilities
• SNTP Support
• Layer 3 Traceroute
• Telnet Client
• DNS Client
System Features
• IPv6 Host
• LLDP-MED
• Voice VLAN
• iSCSI Optimization
A B C D E F G H I J L M N O P Q R S T U V W
A ASIC
Access Mode Application Specific Integrated Circuit. A custom
chip designed for a specific application.
Specifies the method by which user access is
granted to the system. Asset Tag
Glossary 431
Backup Configuration Files BPDU
Contains a backup copy of the device configuration. Bridge Protocol Data Unit. Provide bridging
The Backup file changes when the Running information in a message format. BPDUs are sent
Configuration file or the Startup file is copied to the across device information with in Spanning Tree
Backup file. configuration. BPDU packets contain information
Bandwidth on ports, addresses, priorities, and forwarding costs.
432 Glossary
C D
CDB DHCP Client
Configuration Data Base. A file containing a
An Internet host using DHCP to obtain
device’s configuration information.
configuration parameters, such as a network
Class of Service address.
A overlapping transmission of two or more packets A group of computers and devices on a network that
that collide. The data transmitted cannot be used, are grouped with common rules and procedures.
and the session is restarted.
Duplex Mode
Combo Ports
Permits simultaneous transmissions and reception
A single logical port with two physical connections,
of data. There are two different types of duplex
including an RJ-45 connection and an SFP
mode:
connection.
• Full Duplex Mode — Permits for
CLI
bisynchronous communication, for example,
Command Line Interface. A set of line commands a telephone. Two parties can transmit
used to configure the system. For more information information at the same time.
on using the CLI, see Using the CLI. • Half Duplex Mode — Permits asynchronous
communication, for example, a walkie-talkie.
Communities Only one party can transmit information at a
time.
Specifies a group of users which retains the same
system access rights. Dynamic VLAN Assignment (DVA)
Glossary 433
E Flow Control
Egress Ports
Enables lower speed devices to communicate with
Ports from which network traffic is transmitted. higher speed devices, that is, that the higher speed
device refrains from sending packets.
End System
Fragment
An end user device on a network.
Ethernet packets smaller than 576 bits.
Ethernet
Frame
Ethernet is standardized as per IEEE 802.3.
Ethernet is the most common implemented LAN Packets containing the header and trailer
standard. Supports data transfer rates of Mpbs, information required by the physical medium.
where 10, 100 or 1000 Mbps is supported.
G
EWS GARP
Embedded Web Server. Provides device management General Attributes Registration Protocol. Registers
via a standard web browser. Embedded Web Servers client stations into a Multicast domain.
are used in addition to or in place of a CLI or NMS.
Gigabit Ethernet
F
Gigabit Ethernet transmits at 1000 Mbps, and is
FFT
compatible with existing 10/100 Mbps Ethernet
Fast Forward Table. Provides information about standards.
forwarding routes. If a packet arrives to a device with
GVRP
a known route, the packet is forwarded via a route
listed in the FFT. If there is not a known route, GARP VLAN Registration Protocol. Registers client
the CPU forwards the packet and updates the FFT. stations into a VLANs.
FIFO H
First In First Out. A queuing process where the first HOL
packet in the queue is the first packet out of the
Head of Line. Packets are queued. Packets at the
packet.
head of the queue are forwarded before packets at
Flapping the end of the line.
434 Glossary
HTTP Image File
HyperText Transport Protocol. Transmits HTML System images are saved in two Flash sectors called
images (Image 1 and Image 2). The active image
documents between servers and clients on the
stores the active copy; while the other image stores a
internet.
second copy.
I Ingress Port
IC
Ports on which network traffic is received.
Integrated Circuit. Integrated Circuits are small
electronic devices composed from semiconductor IP
material. Internet Protocol. Specifies the format of packets
and there addressing method. IP addresses packets
ICMP
and forwards the packets to the correct port.
Internet Control Message Protocol. Allows gateway or
IP Address
destination host to communicate with a source
host, for example, to report a processing error. Internet Protocol Address. A unique address assigned
IEEE to a network device with two or more
interconnected LANs or WANs.
Institute of Electrical and Electronics Engineers.
An Engineering organization that develops IP Version 6 (IPv6)
communications and networking standards. A version of IP addressing with longer addresses
IEEE 802.1d than the traditional IPv4. IPv6 addresses are 128 bits
long, whereas IPv4 addresses are 32 bits; allowing a
Used in the Spanning Tree Protocol, IEEE 802.1d much larger address space.
supports MAC bridging to avoid network loops.
IPX
IEEE 802.1p
Internetwork Packet Exchange. Transmits
Prioritizes network traffic at the data-link/MAC connectionless communications.
sublayer.
ISATAP
IEEE 802.1Q
Intra-Site Automatic Tunnel Addressing Protocol .
Defines the operation of VLAN Bridges that permit ISATAP is an automatic overlay tunneling
the definition, operation, and administration of mechanism that uses the underlying IPv4 network
VLANs within Bridged LAN infrastructures. as a non-broadcast/multicast access link layer for
IPv6. ISATAP is designed for transporting
IPv6 packets within a site where a native
IPv6 infrastructure is not yet available.
Glossary 435
iSCSI LLDP-MED
iSCSI is a communication protocol used for sending Link Layer Discovery Protocol - Media Endpoint
data between file servers and storage disks. The file Discovery. LLDP allows network managers to
servers are called initiators and the disks are called troubleshoot and enhance network management by
targets. discovering and maintaining network topologies
over multi-vendor environments. MED increases
J network flexibility by allowing different IP systems
Jumbo Frames to co-exist on a single network LLDP.
436 Glossary
Mask ND
N PDU
NA Protocol Data Unit. A data unit specified in a layer
protocol consisting of protocol control information
Neighbor Advertisement.
and layer user data.
Glossary 437
PING Query
Packet Internet Groper. Verifies if a specific IP Extracts information from a database and presents
address is available. A packet is sent to another IP the information for use.
address and waits for a reply.
R
Port
RA
Physical ports provide connecting components that
RADIUS Advertisement.
allow microprocessors to communicate with
peripheral equipment. RD
Port Mirroring RADIUS Discovery.
Monitors and mirrors network traffic by forwarding RS
copies of incoming and outgoing packets from one
port to a monitoring port. Router Solicitation.
Port Speed RADIUS
Indicates port speed of the port. Port speeds Remote Authentication Dial-In User Service.
include: A method for authenticating system users, and
• Ethernet 10 Mbps tracking connection time.
438 Glossary
Running Configuration File Spanning Tree Protocol
Contains all Startup file commands, as well as all Prevents loops in network traffic. The Spanning Tree
commands entered during the current session. After Protocol (STP) provides tree topography for any
the device is powered down or rebooted, all arrangement of bridges. STP provides one path
commands stored in the Running Configuration file between end stations on a network, eliminating
are lost. loops.
S SSH
Glossary 439
T V
TCP/IP VLAN
Transmissions Control Protocol. Enables two hosts to Virtual Local Area Networks. Logical subgroups with
communicate and exchange data streams. TCP a Local Area Network (LAN) created via software
guarantees packet delivery, and guarantees packets rather than defining a hardware solution.
are transmitted and received in the order their sent.
W
Telnet
WAN
Terminal Emulation Protocol. Enables system users
Wide Area Networks. Networks that cover a large
to log in and use resources on remote networks.
geographical area.
TFTP
Wildcard Mask
Trivial File Transfer Protocol. Uses User Data
Specifies which IP address bits are used, and which
Protocol (UDP) without security features to transfer
bits are ignored. A wild card mask of
files.
255.255.255.255 indicates that no bit is important.
Trap A wildcard of 0.0.0.0 indicates that all the bits are
important.
A message sent by the SNMP that indicates that
system event has occurred.
Trunking
Tunnel ISATAP
See ISATAP.
U
UDP
Unicast
440 Glossary
Index
Index 441
442 Index
F HTTP, 147 L
Fans, 30 HTTPS, 147 L2TP, 436
Fast Link, 18 LACP, 352
Fast link, 308 LAG, 284, 436
I
File Transfer Protocol, 434 LAGs, 362
ICMP, 435
Filtering, 332, 335, 356 LCP, 316
IDRP, 435
Firmware, 222 Leds, 27
IEEE, 435
Flow Control, 38 Light Emitting Diodes, 27
IEEE 802.1d, 435
FTP, 434 Line, 155
IEEE 802.1p, 435
Line Passwords, 168
IEEE 802.1Q, 435
Link Control Protocol, 316
G IEEE 802.1Q-, 17
LLDP Media Endpoint
GARP, 301-302, 434 Image file, 220
Discovery, 21, 182
GARP VLAN Registration Informational, 95, 104
LLDP-MED, 21, 182
Protocol, 17, 434 Ingress, 435
Local User Database, 165
Gateway, 108 Interface mode, 65
Locked ports, 255, 262, 267,
GBIC, 434 Internetwork Packet 269, 271, 273, 275, 277
General Attributes Exchange, 435
Log, 93
Registration Protocol, 434 IP, 435
Log file, 95
Generic Attribute IP addresses, 109
Registration Protocol, 301 Logs, 93, 99, 101
IP Version 6 (IPv6), 107
GRE, 434 Loops, 303
IPM, 435
GVRP, 17, 341, 383-384, 434
IPX, 435
GVRP Parameters Page, 341 M
ISATAP Tunnel, 123
iSCSI, 232 MAC Address, 436
H ISIS, 436 MAC address, 295
442 Index
Management Access Passwords, 62, 171 Reset, 80, 107
Methods, 157
PDU, 437 Reset button, 30
Management Information
PING, 438 RFC1042, 337
Base., 437
Port, 26 RMON, 389, 391-392, 394,
Management methods, 149 438
Port aggregation, 351
Management security, 147 RMON History Control
Port LEDs, 27
Master Election/Topology Page, 393
Discovery Algorithm, 437 Ports, 60, 278, 405
RPS, 29
MD5, 82, 437 Power supplies, 29
RSTP, 18, 438
MDI, 14, 280, 437 PPP, 438
Rule, 152
MDI/MDIX, 38 Profiles, 147
Rules, 148-149
MDIX, 14, 280, 437 Protocol, 337
Running Configuration
MDU, 437 PVID, 331, 334 file, 220
MED, 186
Media Endpoint
Q S
Discovery, 186
QinQ, 323 Secure Shell, 158
Message Digest 5, 437
QoS, 411, 414, 416, 438 Security, 147, 241
MIB, 194, 437
Quality of Service, 411, 438 SFP, 28
Multicast, 362
Queue, 419 Simple Network Management
Protocol, 20, 194, 439
N Simple Network Time
Network Control
R Protocol, 21, 81
Protocols, 316 RADIUS, 155, 176, 178-180, SNMP, 20, 147, 194, 207-209,
187, 189-190, 438 439
Network Management
System., 437 RAM logs, 95 SNTP, 21, 81
Network security, 241 Rapid Spanning Tree Software version, 79
Protocol, 438
Notice, 95, 104 Spanning Tree Protocol, 303,
Rapid STP, 320 314
Remote Authentication Dial SPF LEDs, 28
P In User Service, 22
SSH, 158, 439
Package Contents, 32 Remote Authentication Dial-
Startup file, 220
In User Service, 438
Package contents, 32
Index 443
444 Index
U
UDP, 440
Understanding the
interface, 59
Unicast, 81
Uploading files, 224
User Data Protocol, 440
444 Index