Lantech LGS-2816C-RPS User manual

Manual is about: 16 100/1000M SFP+ 8 10/100/1000T/Dual Speed SFP Combo L2 Plus Managed Switch w/ Redundant Power Supply

Summary of LGS-2816C-RPS

  • Page 1

    Lantech lgs-2816c-rps 16 100/1000m sfp+ 8 10/100/1000t/dual speed sfp combo l2 plus managed switch w/ redundant power supply user manual.

  • Page 2

    M a n a g e m e n t g u i d e lgs-2816c-rps 16 100/1000m sfp+ 8 10/100/1000t/dual speed sfp combo l2 plus managed switch w/ redundant power supply lgs-2816c-rps publication date: march., 2011 revision v5.17.

  • Page 3: Bout

    A bout t his g uide p urpose this guide gives specific information on how to operate and use the management functions of the switch. A udience the guide is intended for use by network administrators who are responsible for operating and maintaining network equipment; consequently, it assumes a basic...

  • Page 4: Revision History

    Revision history release date revision 5.17 01/10/2010 b1.

  • Page 5: Ontents

    C ontents.

  • Page 6: Ection

    – 6 – s ection i g etting s tarted this section provides an overview of the switch, and introduces some basic concepts about network switches. It also describes the basic settings required to access the management interface. This section includes these chapters: ◆ ―introduction‖ ◆ ―initial switch co...

  • Page 7: Ntroduction

    1 i ntroduction this switch provides a broad range of features for layer 2 plus switching. It includes a management agent that allows you to configure the features listed in this manual. The default configuration can be used for most of the features provided by this switch. However, there are many o...

  • Page 8: Escription

    Table 1-2: key features (continued) feature description virtual lans up to 4k using ieee 802.1q, port-based, and private vlans traffic prioritization queue mode and cos configured by ethernet type, vlan id, tcp/ udp port, dscp, tos bit, vlan tag priority, or port qualify of service supports differen...

  • Page 9

    N ote : the ssl only provide the cli for switch management and ssh default enable without ui for management. I gmp s nooping support igmp version 2 (rfc 2236): the function igmp snooping is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, av...

  • Page 10

    P ort c onfiguration you can manually configure the speed and duplex mode, and flow control used on specific ports, or use auto-negotiation to detect the connection settings used by the attached device. Flow control should also be enabled to control network traffic during periods of congestion and p...

  • Page 11

    S panning t ree a lgorithm the switch supports these spanning tree protocols: spanning tree protocol (stp, ieee 802.1d) – supported by using the stp backward compatible mode provided by rstp. Stp provides loop detection. When there are multiple physical paths between segments, this protocol will cho...

  • Page 12

    Q uality of s ervice differentiated services (diffserv) provides policy-based management mechanisms used for prioritizing network resources to meet the requirements of specific traffic types. Each packet is classified upon entry into the network based on access lists, dscp values, or vlan lists. Usi...

  • Page 13: Ystem

    S ystem d efaults the following table lists some of the basic system defaults. Table: system defaults function parameter default console port connection baud rate 115200 bps data bits 8 stop bits 1 parity none local console timeout 0 (disabled) system information device name lgs-2816c-rps account ad...

  • Page 14

    Table: system defaults (continued) function parameter default tag-based group vlan id 1 vlan name default igmp aware disable private vlan disable gvrp propagation disable member port 1-24 ports port-based group vlan name default member port 1-24 ports vlan ports tag identifier 0x8100 vlan aware enab...

  • Page 15

    Table : system defaults (continued) function parameter default queuing mode strict priority queue weighted low 1 queue weighted normal 2 queue weighted medium 4 queue weighted high 8 qos control list qos control list none rate limiters ingress enable disabled ingress rate 500 ingress unit kbps egres...

  • Page 16: Nitial

    2 i nitial s witch c onfiguration this chapter includes information on connecting to the switch and basic configuration procedures. C onnecting t o t he s witch the switch has a embed network management agent. It offers a variety of management options, including snmp, rmon and a web- based interface...

  • Page 17

    Set the speed/duplex mode for any port configure the bandwidth of any port by limiting input or output rates or enable the flow control of any port control port access through ieee 802.1x security or static address filtering filter packets using access control lists (acls) configure up to 4k ieee 80...

  • Page 18

    ■ set the data format to 8 data bits, 1 stop bit, and no parity. ■ set flow control to none. ■ set the emulation mode to vt100. ■ when using hyperterminal, select terminal keys, not windows keys. N ote : once you have set up the terminal correctly, the console login screen will be displayed. For a d...

  • Page 19: Asic

    B asic c onfiguration s etting p asswords if this is your first time to log into the console interface, you could define a new password for access to the web interface, record it, and put it in a safe place. The password can consist of up to 15 alphanumeric characters and is case sensitive. To preve...

  • Page 20

    N ote : an ipv4 address for this switch is 192.168.1.1 default . A ssigning an ip v 4 a ddress before you can assign an ip address to the switch, you must obtain the following information from your network administrator: ▼ ip address for the switch ▼ network mask for this network ▼ default gateway f...

  • Page 21

    Managed switch - lgs-2816c-rps login: admin password: ***** lgs-2816c-rps# ip lgs-2816c-rps(ip)# enabl dhcp ? Usage: enable dhcp lgs-2816c-rps(ip)# enable dhcp manual lgs-2816c-rps(ip)# show dhcp : enable ip address : 192.168.20.15 current ip address : 0.0.0.0 subnet mask : 255.255.255.0 gateway : 1...

  • Page 22

    C ommunity s trings ( for snmp version 1 and 2 c clients ) community strings are used to control management access to snmp version 1 and 2c stations, as well as to authorize snmp stations to receive trap messages from the switch. You therefore need to assign community strings to specified users, and...

  • Page 23

    . T rap r eceivers you can also specify snmp stations that are to receive traps from the switch. To configure a trap receiver, enter the ―snmp trap‖ commands shown below, and press . {for snmpv1/v2c trap setting} “ set trap ” where ―version‖ indicates the snmp client version (1, 2c, 3), ―community- ...

  • Page 25: Ection

    S ection ii this section describes the basic switch features, along with a detailed description of how to configure each feature via a web browser. This section includes these chapters: ◆ ―using the web interface‖ ◆ ―configuring the switch‖ s ection ii w eb c onfiguration.

  • Page 26: Onnecting

    3 this switch has an embedded http web agent. Using a web browser you can configure the switch and view statistics to monitor network activity. The web agent can be accessed by any computer on the network using a standard web browser (microsoft ie 6.0 above, netscape v7.1 above or firefox v1.00). N ...

  • Page 27

    N avigating t he w eb b rowser i nterface to access the web-browser interface you must first enter a user name and password. By default, the user name is ―admin‖ and there is no password. H ome p age when your web browser connects with the switch‘s web agent, the home page is displayed as shown belo...

  • Page 28

    P anel d isplay the web agent displays an image of the switch‘s ports. The refresh mode is auto-mode by default. Clicking on the image of a port opens the detailed statistics page as described on page 143 . Figure 2: front panel indicators m ain m enu using the onboard web agent, you can define syst...

  • Page 33: Onfiguring  The

    This chapter describes all of the basic configuration tasks. C onfiguring s ystem i nformation you can identify the system by configuring the contact information, name, and location of the switch. W eb i nterface to configure system information in the web interface: 1. Click system, system, informat...

  • Page 38

    C onfiguring t ime the switch provides manual and automatic ways to set the system time via ntp. Manual setting is simple and you just input ―year‖, ―month‖, ―day‖, ―hour‖, ―minute‖ and ―second‖ within the valid value range indicated in each item. Ntp is a well-known protocol used to synchronize the...

  • Page 41: Ip A

    S etting a n ip a ddress this section describes how to configure an ip interface for management access to the switch over the network. This switch supports ip version 4, and can be managed simultaneously through either of the address types. You can manually configure a specific ipv4 address or direc...

  • Page 42

    P arameters these parameters are displayed on the time configuration page: dhcp setting – to set enable or disable the switch obtained a ip address from dhcp server. Default is disable ip address – address of the switch, valid ip addresses consist of four numbers, 0 to 255, separated by periods. (de...

  • Page 43

    C onfiguring l oop d etection the loop detection is used to detect the presence of traffic. When switch receives packet‘s(looping detection frame) mac address the same as oneself from port, show loop detection happens. The port will be locked when it received the looping detection frames. If you wan...

  • Page 44

    C onfiguring m anagement p olicy through the management security configuration, the manager can do the strict setup to control the switch and limit the user to access this switch. W eb i nterface to configure management policy in the web interface: 1. Click system, management policy. 2. Add a manage...

  • Page 45

    Figure 4-6: management policy configuration p arameters these parameters are displayed on the management policy configuration page: add. – to create a new management policy. Specify new entry of management security configuration can be created after the parameters as mentioned above had been setup d...

  • Page 46

    Ip range - the switch supports two kinds of options for managed valid ip range, including ―any‖ and ―custom‖. Default is ―any‖. In case that‖ custom‖ had been chosen, you can assigned effective ip range. The valid range is 0.0.0.0~255.255.255.255. Incoming port - the switch supports two kinds of opt...

  • Page 47

    C onfiguring s yslog the syslog is a standard for logging program messages . It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. It can be used as well a generalized informational, analysis and debugging messa...

  • Page 48

    C onfiguring s ystem l og the system log provides information about system logs, including information when the device was booted, how the ports are operating, when users logged in, when sessions timed out, as well as other system information. W eb i nterface to configure system log in the web inter...

  • Page 49

    C onfiguring v irtual s tack virtual stack management(vsm) is the group management function. Through the proper configuration of this function, switches in the same lan will be grouped automatically. And among these switch, one switch will be a master machine, and the others in this group will becom...

  • Page 50

    P arameters these parameters are displayed on the virtual stack page: state – it is used for the activation or de-activation of vsm. Default is enable. Role - the role that the switch would like to play in virtual stack. Two types of roles, including master and slave are offered for option. Default ...

  • Page 51

    C onfiguring p ort c onfiguration the port configuration page includes configuration options for enabling auto-negotiation or manually setting the speed and duplex mode, enabling flow control, setting the maximum frame size, specifying the response to excessive collisions, or enabling power saving m...

  • Page 53

    C onfiguring p ort s tatus the function port status gathers the information of all ports‘ current status and reports it by the order of port number, media, link status, port state, auto-negotiation status, speed/duplex, rx pause and tx pause. An extra media type information for the module ports1 to ...

  • Page 55

    W eb i nterface to display the port port 1 ~ port 24 sfp information in the web interface: 1. Right click port connected icon. 2. Display the port detail information. Figure 4-12: port 1~ port 24 sfp detail information p arameters these parameters are displayed on the port detial information page: c...

  • Page 57

    Data code - show the date this sfp module was made. Temperature - show the current temperature of sfp module. Vcc - show the working dc voltage of sfp module. Mon1 (bias) ma - show the bias current of sfp module. Mon2 (tx pwr) - show the transmit power of sfp module. Mon3 (rx pwr) - show the receive...

  • Page 58

    C onfiguring s imple c ounter the function of simple counter collects any information and provides the counting about the traffic of the port, no matter the packet is good or bad. The window can show all ports‘ counter information at the same time. Each data field has 20-digit long. If the counting ...

  • Page 59

    ◆ receive - number of bad packets received. Drops – ◆ transmit–number of packets transmitted drop. ◆ receive - number of packets received drop. ◆ auto-refresh - the simple counts will be refreshed automatically on the ui screen. ◆ refresh - the simple counts will be refreshed manually when user use ...

  • Page 60

    C onfiguring d etail c ounter the function of detail counter collects any information and provides the counting about the traffic of the port, no matter the packet is good or bad. Each data field has 20-digit long. If the counting is overflow, the counter will be reset and restart counting. The data...

  • Page 61

    Rx broadcast - show the counting number of the received broadcast packet. Rx multicast - show the counting number of the received multicast packet. Tx packets - the counting number of the packet transmitted. Tx octets - total transmitted bytes. Tx high priority packets - number of tx packets classif...

  • Page 63

    C onfiguring p ower s aving the function of power saving and provides the power saving for reduce the power consumption with "actiphy power management" and "perfectreach power management" two technique.It could efficient saving the switch power when the client idle and detec the cable length to prov...

  • Page 64: 802.1Q V

    I eee 802.1q v lans the switch supports tag-based vlan (802.1q) and port-based vlan. Support 4094 active vlans and vlan id 1~4094. Vlan configuration is used to partition your lan into small ones as your demand. Properly configuring it, you can gain not only improving security and increasing perform...

  • Page 66

    Segment forwarding port mapping 1 port 01  port 02 2 port 03  port 04 3 port 05  port 06 4 port 07  port 08 5 port 09  port 10 6 port 11  port 12 7 port 13  port 14 8 port 15  port 16 9 port 17  port 18 10 port 19  port 20 11 port 21  port 22 12 port 23  port 24 the ports in ...

  • Page 67

    C onfiguring t ag -b ased g roup the function shows the information of existed tag-based vlan groups, you can also easily create, edit and delete a tag-based vlan group by pressing add>, edit> and delete> function buttons. User can add a new vlan group by inputting a new vlan name and vlan id. W eb ...

  • Page 68

    Vlan id - vlan identifier. Each tag-based vlan group has a unique vid. It appears only in tag-based and double-tag mode. Igmp proxy - igmp proxy enables the switch to issue igmp host messages on behalf of hosts that the system discovered through standard igmp interfaces. The system acts as a proxy f...

  • Page 73

    C onfiguring p ort i solation port isolation provides for an apparatus and method to isolate ports on layer 2 switches on the same vlan to restrict traffic flow. The apparatus comprises a switch having said plurality of ports, each port configured as a protected port or a non-protected port. An addr...

  • Page 75

    C onfiguring m ac mac table configuration gathers many functions, including mac table information, mac table maintenance, static forward, static filter and mac alias, which cannot be categorized to some function type. They are described below. W eb i nterface to configure the mac address table in th...

  • Page 77

    C onfiguring s tatic f ilter static filter is a function that denies the packet forwarding if the packet‘s mac address is listed in the filtering static filter table. User can very easily maintain the table by filling in mac address, vid (vlan id) and alias fields individually. User also can delete ...

  • Page 78

    C onfiguring s tatic f orward static forward is a function that allows the user in the static forward table to access a specified port of the switch. Static forward table associated with a specified port of a switch is set up by manually inputting mac address and its alias name. When a mac address i...

  • Page 79

    C onfiguring m ac a lias mac alias function is used to let you assign mac address a plain english name. At the initial time, it shows all pairs of the existed alias name and mac address. There are three mac alias functions in this function folder, including mac alias add, mac alias edit and mac alia...

  • Page 80

    C onfiguring m ac t able mac table function is used to display the static or dynamic learning mac entry and the state for the selected port. There are five mac table information display on the web gui, including mac alias, mac address, port, vid and state. W eb i nterface to display the mac table in...

  • Page 81

    C onfiguring g vrp gvrp is an application based on generic attribute registration protocol (garp), mainly used to automatically and dynamically maintain the group membership information of the vlans. The gvrp offers the function providing the vlan registration service through a garp application. It ...

  • Page 83

    C onfiguring c ounter all gvrp counters are mainly divided into received and transmitted two categories to let you monitor the gvrp actions. Actually, they are garp packets. W eb i nterface to display the gvrp counter in the web interface: 1. Click gvrp, counter. 2. Scroll which port you want to dis...

  • Page 84

    Gvrp application. Joinin message packets: number of gvrp bpdu with join in message is received by the gvrp application. Leaveempty message packets: number of gvrp bpdu with leave empty message is received by the gvrp application. Transmitted – total gvrp packets: total gvrp bpdu is received by the g...

  • Page 85

    C onfiguring g roup the function will display the dynamic group member and their detail imformation. Others it also provide a configuration item to edit administrative control parameters. The detail information includes vid and member port. W eb i nterface to display the group in the web interface: ...

  • Page 86

    C onfiguring q os (q uality o f s ervice ) the switch support four qos queues per port with strict or weighted fair queuing scheduling. There are 24 qos control lists (qcl) for advance programmable qos classification, based on ieee 802.1p, ethertype, vid, ipv4/ipv6 dscp and udp/tcp ports and ranges....

  • Page 87

    Default class - user can set up high priority or low priority for each port respectively. You could scroll with low / normal / medium / high qcl - the number of qcl rule 1~24, each port have to apply one of the qcl rule for qos behavior. You could scroll with 1 to 24. User priority - the user priori...

  • Page 88

    C onfiguring q os c ontrol l ist the switch support four qos queues per port with strict or weighted fair queuing scheduling. There are 24 qos control lists (qcl) for advance programmable qos classification, based on ieee 802.1p, ether type, vid, ipv4/ipv6 dscp and udp/tcp ports and ranges. W eb i n...

  • Page 89

    Ethertype (hexadecimal) protocol 0x0800 ip, internet protocol 0x0801 x.75 internet 0x0802 nbs internet 0x0803 ecma internet 0x0804 chaosnet 0x0805 x.25 level 3 0x0806 arp, address resolution protocol. 0x0808 frame relay arp [rfc1701] 0x6559 raw frame relay [rfc1701] 0x8035 drarp, dynamic rarp. Rarp,...

  • Page 90

    0x8e88 eapol, eap over lan. 0x9000 loopback (configuration test protocol) 0xffff reserved. Vlan id - the configurable vid range:1~4094. Udp/tcp port - to select the udp/tcp port classification method by range or specific. Udp/tcp port range - the configurable ports range: 0~65535you can refer to fol...

  • Page 91

    C onfiguring r ate l imiters each port includes an ingress policer, and an egress shaper, which can limit the bandwidth of received and transmitted frames. Ingress policer or egress shaper operation is controlled per port in the rate limit configuration. W eb i nterface to display the qos rate limit...

  • Page 92

    Egress shaper enabled – evoke to enable the egress rate limiter rule. Egress rate (rule) - - configures the rate for the port shaper. (range: 500-1000000 kbps, or 1-1000 mbps; default: 500 kbps) egress shaper unit – sets the unit of measure for the port shaper. (options: kbps, mbps; default: kbps).

  • Page 93

    C onfiguring s torm c ontrol you can configure limits on broadcast, multicast and unknown unicast traffic to control traffic storms which may occur when a network device is malfunctioning, the network is not properly configured, or application programs are not well designed or properly configured. T...

  • Page 94

    Rate (pps) - the threshold above which packets are dropped. This limit can be set by specifying a value of 2n packets per second (pps), or by selecting one of the options in kpps. 1 / 2 / 4 / 8 / 16 / 32 / 64 / 128 / 256 / 512 / 1k / 2k / 4k / 8k / 16k / 32k / 64k / 128k / 256k / 512k / 1024k n ote ...

  • Page 95

    C onfiguring q os w izard you can use the qcl configuration wizard is targeted on user can easy to configure the qcl rules for qos configuration. The wizard provide the typical network application rules, user can apply these application easily. W eb i nterface to configure qos wizard: 1. Click qos, ...

  • Page 96

    Figure 4-35 : set up policy rules p arameters these parameters are displayed on the qcl wizard page: qcl id – display the qos control list (qcl) index from 1 to 24 port member – evoke the port to join the qcl id and become the qcl member. Wizard again - click on the wizard again> , back to qcl confi...

  • Page 97

    Figure 4-36: set up port policy finish figure 4-37: set up typical network application rules p arameters these parameters are displayed on the qcl wizard page: audio and video – quicktime 4 server / msn messenger phone / yahoo messenger phone / napster / real audio games - blizzard battlenet (diablo...

  • Page 98

    Figure 4-38: set up typical network application rules p arameters these parameters are displayed on the qcl wizard page: qcl id – scroll to set the qcl id from 1 to 24 traffic class – scroll to set the traffic class with low/ normal/ medium/ high figure 4-39: set up tos precedence mapping rules.

  • Page 99

    P arameters these parameters are displayed on the qcl wizard page: qcl id – scroll to set the qcl id from 1 to 24 tos precedence 0- 7 class – scroll to set the tos precedence mapping class with low/ normal/ medium/ high figure 4-40: set up vlan tag priority mapping rules p arameters these parameters...

  • Page 100

    C onfiguring s nmp (s imple n etwork m anagement p rotocol ) simple network management protocol (snmp) is a communication protocol designed specifically for managing devices on a network. Equipment commonly managed with snmp. Snmp is typically used to configure these devices for proper operation in ...

  • Page 101

    Snmp system configration this function is used to configure snmp settings, community name, trap host and public traps as well as the throttle of snmp. A snmp manager must pass the authentication by identifying both community names, then it can access the mib information of the target device. So, bot...

  • Page 102

    Snmpv3 communities configration the function is used to configure snmpv3 communities. The community and username is unique. To create a new community account, please check add new community> button, and enter the account information then check save>. Max group number : 4. W eb i nterface to configur...

  • Page 103

    Snmpv3 users configration the function is used to configure snmpv3 user. The entry index key is username. To create a new username account, please check add new user> button, and enter the user information then check save>. Max group number : 10. W eb i nterface to configure snmpv3 users setting: 1....

  • Page 104

    Authentication protocol – scroll to choice two methods as md5 and sha for authentication protocol. Authentication password –specify the authentication password field. The length of 'md5 authentication pwd' is restricted to 8 – 32. The length of 'sha authentication pwd' is restricted to 8 – 40. Priva...

  • Page 105

    W eb i nterface to configure snmpv3 groups setting: 1. Click snmp, groups. 2. Click add new group. 3. Specify the snmp group parameters. 4. Click save. 5. If you want to modify or clear the setting then click reset. C aution : alerts you to add a snmp commuity or user entry first. Without the step t...

  • Page 106

    Security model – scroll to choice the security model as v1: snmpv1, v2c: snmpv2c or usm: user-based security model.The length of ―username‖ string is restricted to 1-32. Security name – scroll to choice the username you set on the switch already to join the snmp groups. The length of ―security name‖...

  • Page 107

    W eb i nterface to configure snmpv3 views setting: 1. Click snmp, views. 2 . Click add new view. 3. Specify the snmp view parameters. 4. Click save. 5. If you want to modify or clear the setting then click reset. Figure 4-45: set up snmp views p arameters these parameters are displayed on the snmp v...

  • Page 108

    W eb i nterface to configure snmpv3 accesses setting: 1. Click snmp, accesses. 2 . Click add new access. 3. Specify the snmp access parameters. 4. Click save. 5. If you want to modify or clear the setting then click reset. Figure 4-46: set up snmp accesses p arameters these parameters are displayed ...

  • Page 109

    Auth, priv: authentication and privacy. Read view name – scroll to choice the read view name. The name of mib view. Select ―none‖, this entry has no read right. Write view name - scroll to choice the write view name. The name of mib view. Select ―none‖, this entry has no write right..

  • Page 110

    W eb i nterface to configure snmp trap hosts setting: 1. Click snmp, trap hosts. 2 . Display the snmp trap hosts information table. 3. Choice a entry to display and modify the detail parameters or click delete button to delete the trap hosts entry. Figure 4-47: set up snmp trap hosts p arameters the...

  • Page 111

    Version – scroll snmp version to choice the trap method as v1, v2c or v3. Ip – specify the ip field. The field is the snmp host ip address. Port – specify the port field. Port number. Default: 162. Community /security name – specify the community/ security name field. The length of ―community / secu...

  • Page 112

    C onfiguring a ccess c ontrol l ists an access control list (acl) is a sequential list of permit or deny conditions that apply to ip addresses, mac addresses, or other more specific criteria. This switch tests ingress packets against the conditions in an acl one by one. A packet will be accepted as ...

  • Page 113

    3. Repeat the preceding step for each port to which an acl will be applied. 4. Click apply. Figure 4-48: acl ports configuration p arameters these parameters are displayed on the snmp trap hosts setting page: port # – port identifier. Port number: 1~24. Policy id - an acl policy configured on the ac...

  • Page 114

    Rate limiter id - specifies a rate limiter to apply to the port. (rate limiter id range: 1~16. To select one of rate limiter id for this port, it will limit met acl packets by rate limiter id configuration. Default: disabled). Port copy - defines a port to which matching frames are copied. (range: 1...

  • Page 115

    W eb i nterface to configure rate limits which can be applied to a port: 1 . Click configuration, acl, rate limiters. 2. For any of the rate limiters, select the maximum ingress rate that will be supported on a port once a match has been found in an assigned acl. 3. Click apply. Figure 4-49: acl rat...

  • Page 116

    U sage g uidelines rules within an acl are checked in the configured order, from top to bottom. A packet will be accepted as soon as it matches a permit rule, or dropped as soon as it matches a deny rule. If no rules match, the frame is accepted. The maximum number of ace rules that can be configure...

  • Page 117

    Figure 4- 50: access control list configuration.

  • Page 118

    The following buttons are used to edit or move the acl entry (ace): table: ace modification buttons button description inserts a new ace before the current row. Edits the ace. Moves the ace up the list. Moves the ace down the list. Deletes the ace. The lowest plus sign adds a new entry at the bottom...

  • Page 119

    Ethertype filter - this option can only be used to filter ethernet ii formatted packets. (options: any, specific (600-ffff hex); default: any) a detailed listing of ethernet protocol types can be found in rfc1060. A few of the more common types include 0800 (ip), 0806 (arp), 8137 (ipx). Arp: mac par...

  • Page 121

    Tcp parameters source port filter - specifies the tcp source filter for this rule. (options: any, specific (0-65535), range (0-65535);default: any) dest. Port filter - specifies the tcp destination filter for this rule. (options: any, specific (0-65535), range (0-65535); default: any) tcp fin - spec...

  • Page 122

    Match this entry; default: any) sip filter - specifies the source ip filter for this rule. (options: any - no source ip filter is specified, host - specifies the source ip address in the sip address field, network - specifies the source ip address and source ip mask in the sip address and sip mask f...

  • Page 123

    W eb i nterface to configure acl wizard: 1. Click acl, wizard. 2. Choice one of three methods for action . 3. Click next to next step of configuration 4. Follw up the gui procedure to set all parameters. Figure 4- 51: access control list wizard configuration p arameters these parameters are displaye...

  • Page 124

    Figure 4- 52: set up acl wizard policy rules n ote : it is easy to configure acl wizard policy rules then you only need to click ―next‖ and ―finish‖ to complete the configuration. Figure 4- 53: set up acl wizard port polices rules n ote : it is easy to configure acl wizard port polices rules then yo...

  • Page 125

    Figure 4- 54: set up acl wizard typical network application rules p arameters these parameters are displayed on the wizard typical network application rules configuration page: common server – evoke what kinds server to choice. The server type includes dhcp / dns / ftp / http / imap / nfs / pop3 / s...

  • Page 126

    Instant messaging – evoke what kinds instant messaging to choic. The messaging includes google talk / msn messenger / yahoo messenger. User definition – evoke the article and specify the field. The article includes ethernet type / udp port / tcp port. Others – evoke the article with tcp port / icmp ...

  • Page 127

    C onfiguring i p m ac b inding the ip network layer uses a four-byte address. The ethernet link layer uses a six- byte mac address. Binding these two address types together allows the transmission of data between the layers. The primary purpose of ip-mac binding is to restrict the access to a switch...

  • Page 128

    P arameters these parameters are displayed on the wizard typical network application rules configuration page: state – scroll to enable or disable the ip mac binding. Time interval - range: 10 / 20 / 30, time interval is for arp echo, the switch will according to server table entries to send arp ech...

  • Page 129

    C onfiguring 8 02.1x use the authentication configuration page to specify the authentication method for controlling management access through telnet, ssh or http/ https. Access can be based on the (local) user name and password configured on the switch, or can be controlled with a radius or tacacs+ ...

  • Page 130

    Only pass the packets when the authenticator pae is authorized, and otherwise, an uncontrolled port will unconditionally pass the packets with pae group mac address, which has the value of 01- 80-c2-00-00-03 and will not be forwarded by mac bridge, at any time. Authentication server: a device provid...

  • Page 131

    Switch. If there are two switches directly connected together instead of single one, for the link connecting two switches, it may have to act two port roles at the end of the link: authenticator and supplicant, because the traffic is bi-directional. The fig. 61 shows the procedure of 802.1x authenti...

  • Page 132

    9. When the authenticator pae receives a radius-access-accept, it willsend an eap-success to the supplicant. At this time, the supplicant is authorized and the port connected to the supplicant and under 802.1x control is in the authorized state. The supplicant and other devices connected to this por...

  • Page 133

    W eb i nterface to configure 802.1x server : 1. Click 802.1x, server. 2. Specify the authentication server parameter field and accounting server parameter field. 3. Click save. Figure 4-60 : set up the 802.1x server detail parameters p arameters these parameters are displayed on the 802.1x server co...

  • Page 135

    W eb i nterface to configure 802.1x port detail parameter: 1. Click 802.1x, port configuration. 2. Specify the port configuration parameter field. 3. Click save. Figure 4-61: set up the 802.1x port detail parameters p arameters these parameters are displayed on the 802.1x server configuration page: ...

  • Page 136

    Mode – scroll the range: disable / normal / advanced / clientless disable: disable ieee 802.1x for this port. Normal: all clients under this port will be authorized when one of the client do 802.1x authentication successfully. Advanced: each clients under this port have to do 802.1x authentication b...

  • Page 138

    W eb i nterface to display the 802.1x status: 1. Click 802.1x, status. 2. Click refresh button to refresh the 802.1x status table. Figure 4-62 display the 802.1x status p arameters these parameters are displayed on the 802.1x status page: port – the port indentity. Port number: 1-24. Mode - show thi...

  • Page 139

    W eb i nterface to display the 802.1x statistics: 1. Click 802.1x, statistic. 2. Scroll the port to display the 802.1x statistics. 3. Evoke to enable auto-refresh 4. Click refresh button to refresh the 802.1x statistics table. 5. If you want to clear the data of 802.1x statistics then click clear bu...

  • Page 140

    C onfiguring t acacs+ tacacs+ (terminal access controller access-control system plus) is a protocol which provides access control for the switch via one or more centralized servers. It provides separate authentication, authorization and accounting services. Tacacs+ utilizes tcp port 49. It consists ...

  • Page 141

    W eb i nterface to display the tacacs+ authentication configuration: 1. Click tacacs+, authentication. 2. Scroll to set login primary and login secondary field. 3. Specify the authentication retry field. (range: 1 to 3) 4. Click apply. Figure 4-65: configure tacacs+ authentication p arameters these ...

  • Page 142

    W eb i nterface to display the tacacs+ authorization configuration: 1. Click tacacs+, authorization. 2. Scroll to set state and fallback to local authorization field. 3. Click apply. Figure 4-66: configure tacacs+ authorization p arameters these parameters are displayed on the tacacs+ authorization ...

  • Page 143

    W eb i nterface to display the tacacs+ accounting configuration: 1. Click tacacs+, accounting. 2. Scroll to set state field. 3. Click apply. Figure 4-67 : configure tacacs+ accounting p arameters these parameters are displayed on the tacacs+ accounting page: state – scroll to set enable or disable t...

  • Page 144

    C onfiguring t runk the port trunking configuration is used to configure the settings of link aggregation. You can bundle more than one port with the same speed, full duplex and the same mac to be a single logical port, thus the logical port aggregates the bandwidth of these ports. This means you ca...

  • Page 147

    Method – scroll and choice the trunk method with none, lacp and static three methods. None: a port does not want to aggregate with any other port should choose this default setting. Lacp: a port use lacp as its trunk method to get aggregated with other ports also using lacp. Static: a port use stati...

  • Page 148

    W eb i nterface to display the trunk aggregator view: 1. Click trunk, aggregator view. 2. Click refresh to refresh the trunk data. 3. Click lacp detail to show detail lacp status. Figure 4-69: display the trunk aggregator view c aution : alerts you before you configure the port to join the lacp trun...

  • Page 149

    Ready ports - show only the ready member ports within an aggregator (port). System priority – show the actor and partner system priority value. Mac address – show the client device‘s mac address information. Port – show the trunk port number. Key – show the trunk lacp key value. Trunk status – show ...

  • Page 150

    W eb i nterface to display the trunk aggregation hash mode configuration: 1. Click trunk, aggregator hash mode. 2. Evoke to enable or disable the aggregation hash mode function. 3. Click apply. Figure 4-70: display the trunk aggregation hash mode configuration p arameters these parameters are displa...

  • Page 151

    W eb i nterface to display the trunk system priority configuration: 1. Click trunk, lacp system priority. 2. Specify the system priority value between 1 to 65535. 3. Click apply. Figure 4-71: display the trunk system priority configuration p arameters these parameters are displayed on the trunk syst...

  • Page 152

    C onfiguring s panning t ree p rotocol the spanning tree protocol (stp) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices (that is, an stp-compliant switch, bridge or route...

  • Page 153

    W eb i nterface to display the spanning tree protocol status: 1. Click stp, status. 2. Display all spanning tree protocol detail parameter data. Figure 4-72: display the spanning tree protocol status p arameters these parameters are displayed on the spanning tree protocol status page: stp state –sho...

  • Page 155

    Current max. Age - show the current root bridge maximum age time. Maximum age time is used to monitor if stp topology needs to change. When a bridge does not receive a hello message from root bridge until the maximum age time is counted down to 0, the bridge will treat the root bridge malfunctioned ...

  • Page 156

    W eb i nterface to display the spanning tree protocol configuration: 1. Click stp, configuration. 2. Scroll to choice spanning tree protocol enable or disable (default is disable) 3. Scroll the bridge priority value to select a specific value with 0 to 61440. 4. Specify the hellow time, max. Age and...

  • Page 157

    P arameters these parameters are displayed on the spanning tree protocol status page: spanning tree protocol –set 802.1w rapid stp function enable / disable. Default is ―disable‖. Bridge priority - the lower the bridge priority is, the higher priority it has. Usually, the bridge with the highest bri...

  • Page 158

    W eb i nterface to display the spanning tree port configuration: 1. Click stp, port. 2. You need enable the stp first and the screen will show all detail of system port stp status 3. Click edit to modify the port stp parameters configuration. 4. Click mcheck to check the port stp parameters setting....

  • Page 161

    Admin point to point - we say a port is a point-to-point link, from rstp‘s view, if it is in full-duplex mode but is shared link if it is in half-duplex mode. Rstp fast convergence can only happen on point-to-point links and on edge ports. This can expedite the convergence because this will have the...

  • Page 163

    Table: default stp path costs port type link type ieee 802.1w-2001 ethernet half duplex full duplex trunk 2,000,000 1,000,000 500,000 fast ethernet half duplex full duplex trunk 200,000 100,000 50,000 gigabit ethernet full duplex trunk 10,000 5,000

  • Page 164

    C onfiguring m ultiple s panning t ree p rotocol the implementation of mstp is according to ieee 802.1q 2005 clause 13 – multiple spanning tree protocol. Mstp allows frames assigned to different vlans to follow separate paths, each based on an independent multiple spanning tree instance (msti), with...

  • Page 165

    W eb i nterface to display the mstp region config configuration: 1. Click mstp, region config. 2. Specify the multiple spanning tree region name field. 3. Specify the mstp revision level field.. 4. Click apply. Figure 4-76: display the mstp region config configuration p arameters these parameters ar...

  • Page 166

    W eb i nterface to display the mstp instance view edit msti/ vlan configuration: 1. Click mstp, instance view. 2. Click edit to create msti/ vlan. 3. Specify the instance id field. 4. Specify the vlan mapping (vid string) field. 5. Click apply. Figure 4-77: display the mstp instance view configurati...

  • Page 167

    Del msti - to delete an msti. Del all msti - deleting all provisioned mstis at a time. Instance configuration - to provision spanning tree performance parameters per instance. (detail see fig. 81). Port config - to provision spanning tree performance parameters per instance per port. (detail see fig...

  • Page 169

    P arameters these parameters are displayed on the mstp edit msti/ vlan page: port – the port identity of switch physical interface. Port number is 1 to 24. Path cost - the same definition as in the rstp specification. But in mstp, this parameter can be respectively applied to ports of cist and ports...

  • Page 170

    Figure 4-81: display the mstp instance status p arameters these parameters are displayed on the mstp instance status page: mstp state – to show mstp protocol is enable or disable status. Force version – to show the current spanning tree protocol version configured. Bridge max age - it shows the max ...

  • Page 171

    In the same mst region.The first case indicates that the root port‘s owner is the cist regional root bridge. Cist regional root priority - spanning tree priority value of the cist regional root bridge.Note that cist regional root bridge is different from cist root bridge.One exception is that when a...

  • Page 172

    Specification possible values are ―forwarding‖ , ―learning‖ , ―discarding‖ role –the role that a port plays in the spanning tree topology. Possible values are ―dsbl‖(disable port) , ‖alt‖(alternate port) , ―bkup‖(backup port) , ―root‖(root port) , ―dsgn‖(designated port) , ―mstr‖(master port). The l...

  • Page 175

    C onfiguring m ulitcast p rotocol the function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, avoids wasting the bandwidth while ip multicast packets are running over the network. This is because a switch that does not support igmp or ...

  • Page 178

    P arameters these parameters are displayed on the igmp snooping configuration page: host time out – set the igmp snooping enable and the host packet received by switch timeout period. The unit is second and time range is from 1 to 65535. The default is 125 seconds. Fast leave - set which port want t...

  • Page 179

    W eb i nterface to display the igmp group membership: 1. Click group membership. 2. Display group membership data. 3. Click next page display next page context. 4. Click previous page display previous page context. 5. Click refresh to refresh data. Figure 4-88: display the igmp group membership p ar...

  • Page 181

    W eb i nterface to display how to add the mvid setting: 1. Click mvid. 2. Click add new mvid. 3. Specify the mvid field the specific value. 4. Select mvid port member(disable, client, or server). 5 . Click apply. To display how to delete the mvid setting: 1. Click mvid. 2. Select those mvids which y...

  • Page 183

    P arameters these parameters are displayed on the igmp group allow page: mvid – the switch supports two kinds of options for managed valid mvid, including ―any‖ and ―custom‖. Default is ―any‖. When you choose ―custom‖, you can fill in vid number. The valid vid range is 1~4094. Start address – start ...

  • Page 184

    Previous page – display previous page context. Next page – display next page context. Refresh – update multicast group membership..

  • Page 185

    C onfiguring a larm the function, is used to set a alarm trap and send mail or get the event log. The trap events configuration function is used to enable the switch to send out the trap information while pre-defined trap events occurred. The switch offers 24 different trap events to users for switc...

  • Page 186

    N ote : the system default alarm events ad below: trap: cold start, warm start, link down, link up, authentication failure, user login, user logout stp : stp topology changed, stp disabled, stp enabled. Lacp : lacp disabled, lacp enabled, lacp member added, lacp port failure. Gvrp: gvrp disabled, gv...

  • Page 187

    W eb i nterface to display the alarm email configuration: 1. Click alarm, email. 2. Specify the alarm email parameter. 3. Click apply. Figure 4-94: display the alarm email configuration p arameters these parameters are displayed on the igmp group membership page: mail server – specify the ip address...

  • Page 188

    C onfiguring d hcp s nooping the addresses assigned to dhcp clients on unsecure ports can be carefully controlled using the dynamic bindings registered with dhcp snooping. Dhcp snooping allows a switch to protect a network from rogue dhcp servers or other devices which send port-related information ...

  • Page 189

    W eb i nterface to display the dhcp snooping entry configuration: 1. Click dhcp snooping entry. 2. Select a dhcp snooping entry and click delete button to delete the seletcted entry. 3. Specify the server port vid and server ip value. 4. Scroll the turst port 1 value to select a specific value with ...

  • Page 190

    P arameters these parameters are displayed on the dhcp snooping entrypage: vid –when dhcp snooping is enabled, and enabled on the specified vlan, dhcp packet filtering will be performed on any un-trusted ports within the vlan. It set a available vlan id to enable the dhcp snooping on vlan interface....

  • Page 191

    W eb i nterface to display the dhcp snooping client: 1. Click dhcp snooping client. 2. Display all dhcp snooping client information. 3. Select a dhcp snooping client entry and click delete button to delete the seletcted entry figure 4-97: display the dhcp snooping client p arameters these parameters...

  • Page 193

    P arameters these parameters are displayed on the lldp state page: tx interval - configures the periodic transmit interval for lldp advertisements. (range: 5-32768 seconds; default: 30 seconds) tx hold - the specifies the amount of time the receiving device holds a link layer discovery protocol (lld...

  • Page 194

    W eb i nterface to display information about lldp neighbors: 1. Click lldp, lldp entry. Figure 4-99: lldp configuration p arameters these parameters are displayed on the lldp entry page: local port - to display the switch local port. Chassis id - to display the chassis id which connect to the switch...

  • Page 195

    W eb i nterface to display statistics on lldp global counters and control frames: 1. Click lldp, lldp counter. Figure 4- 100 : lldp statistics p arameters these parameters are displayed on the lldp counter page: global counters neighbor entries were last changed at - the time period which neighbor e...

  • Page 197

    Lldp statistics local port - show the local port on the switch. Tx frames - the counting number of the frames transmitted. Rx frames - the counting number of the frames received. Rx errors - the number of received lldp frames containing some kind of error. Frames discarded - number of frames discard...

  • Page 198: / R

    C onfiguring s ave / r estore the switch supports user to save or restore the three copies of configuration and it includes the default configuration, working configuration and user configuration for your configuration management. All of them are listed and described as the below respectively. Defau...

  • Page 200

    W eb i nterface to display restore to factory default configuration: 1. Click save/ restore, save start. 2. Click yes. Figure 4- 102: save start w eb i nterface to display restore to factory default configuration: 1. Click save/ restore, save user. 2. Click yes. Figure 4- 103: save user s ave s tart...

  • Page 201

    W eb i nterface to display restore to factory default configuration: 1. Click save/ restore, restore user. 2. Click yes. Figure 4- 104: restore user configuration.

  • Page 202: / I

    C onfiguring e xport / i mport with this function, user can back up or reload the configuration files of save as start or save as user via tftp. C aution : before importing / exporting configuration please make sure the firmware version is always the same. C aution : after firmware upgrade, the swit...

  • Page 204

    D iagnostics three functions, including diagnostics, loopback test and ping test are contained in this function folder for device self-diagnostics. Each of them will be described in detail orderly in the following sections. W eb i nterface to display the diagnostics function: 1. Click diagnostics, d...

  • Page 205

    3. Specify the ping size field. 4. Click start. Figure 4- 107: display th diagnostics ping functionality screen p arameters these parameters are displayed on the diagnostics ping page: ip address –an ip address with the version of v4, e.G. 192.168.1.1. Ping size – to set the ping packet size. Defaul...

  • Page 206

    M aintenance this chapter will introduce the reset and firmware upgrade function for the firmware upgrade and key parameters change system maintenance requirements. We offer you many ways to reset the switch, including power up, hardware reset and software reset. You can press the reset button in th...

  • Page 207

    3. Click upload. Figure 110: display firmware upgrade screen.

  • Page 208

    L ogout you can manually logout by performing logout function. In the switch, it provides another way to logout. You can configure it to logout automatically. The switch allows you to logout the system to prevent other users from the system without the permission. If you do not logout and exit the b...

  • Page 209: 802.1X Commands Of Cli

    Table 5-1: 802.1x commands syntax set maxreq port-range> vlaue> port range - syntax 1,5-7, available from 1 to 24 value - max-times , range 1-10 default setting value – 2 5 802.1x commands of cli command function set maxreq set mode set port-control set quietperiod set reauthenabled set reauthmax se...

  • Page 210

    Example syntax set mode port-range>mode> port-list - syntax 1,5-7, available from 1 to 24 mode- set up 802.1x mode 0- disable the 802.1x function 1- set 802.1x to multi-host mode example lgs-2816c-rps(802.1x)# set maxreq 2 2 lgs-2816c-rps(802.1x)# show port-config 2 port 2) mode : disabled port cont...

  • Page 214

    Syntax set servertimeout port-range>value> port-range - sytax 1, 5-7, avaliable from 1 to 24 value – 1-65535, default is 30. Default setting value – 30 example lgs-2816c-rps(802.1x)# set reauthperiod 2 3600 lgs-2816c-rps(802.1x)# show port-config 2 port 2) mode : disabled port control : auto reauthm...

  • Page 215

    Syntax set auth-server ip-address>udp-port>secret-key> ip-address – the ip address of radius server udp-port– the server port of radius (authentication port). Secret-keyip-address – set up the value of secret-key, and the length of secret-key is from 1 to 31 default setting udp-port - 1812 example s...

  • Page 216

    Default setting value – 30 example syntax set supptimeout port-range>value> port-range - sytax 1, 5-7, avaliable from 1 to 24 value– timer, range 1-65535. Default setting value – 30 example lgs-2816c-rps(802.1x)# set supptimeout 2 30 lgs-2816c-rps(802.1x)# show port-config 2 port 2) mode : disabled ...

  • Page 217

    Syntax set txperiod port-range>value> port-range - sytax 1, 5-7, avaliable from 1 to 24 value– 1-65535, default is 30 default setting value – 30 example syntax show status default setting value – 30 servertimeout : 30 vlanassignment: disable guestvlan : n/a authfailedvlan: n/a set txperiod a timer u...

  • Page 222

    Syntax add operator name> name - new account name. (range: a string must be at least 5 character) example syntax del name> name - existing user account default setting none example syntax modify name> name - existing user account example lgs-2816c-rps (account)# add operator aaaaa password: confirm ...

  • Page 223

    Syntax show default setting none example username changed successfully. Password changed successfully. Show to show system account, including account name and identity. Lgs-2816c-rps (account)# show account name identity ----------------- --------------- admin administrator guest guest.

  • Page 224: Acl Commands Of Cli

    Table 7-1: acl commands syntax ace index – the access control rule index value. Default setting none example 7 acl commands of cli command function ace action delete list move policy ratelimter set show to display the ace configuration. To set the access control per port as packet filter action rule...

  • Page 226

    Syntax delete index - the access control rule index value. Default setting none example 16 1 permit disabled disabled 0 17 1 permit disabled disabled 0 18 1 permit disabled disabled 0 19 1 permit disabled disabled 0 20 1 permit disabled disabled 0 21 1 permit disabled disabled 0 22 1 permit disabled...

  • Page 227

    Syntax list default setting none example list this command display acl list. Lgs-2816c-rps(acl)# list index ingress port action rate limiter port copy counters port policy id action rate limiter port copy counter ---- --------- ------ ------------ --------- ------------ 1 switch deny 3 disabled 109 ...

  • Page 228

    Syntax move index1/index2 - the access control rule index value.(range: 13-128) default setting none command usage to move the ace ( access control entry) configuration between index1 and index2. Example syntax policy [policy] [ports] policy – set specific policy id for specific port.(range: 1-8) po...

  • Page 229

    Syntax ratelimiter [id] [rate] id – rate limiter identifier.(range: 1-16) rate – the threshold of packet.(options:1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1000, 2000, 4000, 8000, 16000, 32000, 64000, 128000, 256000, 512000, 1024000) default setting all rate limiters example syntax set [index>] [next i...

  • Page 230

    Vid - the vlan to filter for this rule. (range: 1-4094, or any) tag_prio - specifies the user priority value found in the vlan tag (3 bits as defined by ieee 802.1p) to match for this rule. (range: 0-7, or any) dmac_type - the type of destination mac address. (options: any, unicast, multicast, broad...

  • Page 231

    Zero; default: any) ip fragment – specifies the fragment offset settings for this rule. (option: any, yes, no; default: any) ip option - options flag with any value. (option: any, yes, no; default: any) icmp – set ip protoclo filter to icmp icmp type - icmp type number (0-255) or any. Icmp code - ic...

  • Page 232

    Default setting see defaults in syntax section command usage rules within an acl are checked in the configured order, from top to bottom. A packet will be accepted as soon as it matches a permit rule, or dropped as soon as it matches a deny rule. If no rules match, the frame is accepted. Example syn...

  • Page 233

    22 1 permit disabled disabled 0 23 1 permit disabled disabled 0 24 1 permit disabled disabled 0 rate limiter rate(pps) ------------ ------------ 1 512 2 16000 3 32 4 1 5 1 6 1 7 1 8 1 9 1 10 1 11 1 12 1 13 1 14 1 15 1 16 1 lgs-2816c-rps(acl)#.

  • Page 235

    Syntax set mail-address #> mail-address> # - email address number, range: 1 to 6. Mail-address - email address. Example syntax set return-path path> path - return-path description. Example syntax set server ip> ip - email server ip address or domain name. Example set mail-address to set up the email...

  • Page 237: Ection

    Ection iv a ppendices this section provides additional information and includes these items: ◆ ―software specifications‖ ◆ ―troubleshooting‖.

  • Page 238: Oftware

    A s oftware s pecifications s oftware f eatures a uthentication local, radius, tacacs+, port (802.1x), aaa, https, ssh, ip mac port binding, ip filter, dhcp snooping a ccess c ontrol l ists 128 rules per system p ort c onfiguration 1000base-t: 10/100 mbps at half/full duplex, 1000 mbps at full duple...

  • Page 239

    C lass of s ervice supports four levels of priority strict or weighted round robin queueing queue mode and cos configured by ethernet type, vlan id, tcp/udp port, dscp, tos bit, vlan tag priority, or port layer 3/4 priority mapping: ip dscp remarking q uality of s ervice diffserv supports dscp remar...

  • Page 241

    – 349 – interfaces evolution mib (rfc 2863) ip mib (rfc 2011).

  • Page 242

    Ip multicasting related mibs mau mib (rfc 3636) mib ii (rfc 1213) port access entity mib (ieee 802.1x) port access entity equipment mib private mib quality of service mib radius accounting server mib (rfc 2621) radius authentication client mib (rfc 2621) rmon mib (rfc 2819) rmon ii probe configurati...

  • Page 243: Roubleshooting

    B t roubleshooting p roblems a ccessing the m anagement i nterface table: troubleshooting chart symptom action cannot connect using telnet, web browser, or snmp software cannot connect using secure shell cannot access the on- board configuration program via a serial port connection forgot or lost th...

  • Page 244

    . U sing s ystem l ogs if a fault does occur, refer to the installation guide to ensure that the problem you encountered is actually caused by the switch. If the problem appears to be caused by the switch, follow these steps: 1. Set the error messages reported to include all categories. 2 . Enable s...

  • Page 245: Lossary

    G lossary acl access control list. Acls can limit network traffic and restrict access to certain users or devices by checking each packet for certain ip or mac (i.E., layer 2) information. Bootp boot protocol. Bootp i s used to provide bootup information for network devices, including ip address inf...

  • Page 246

    Dns domain name service. A system used for translating host names for network nodes into ip addresses. Dscp differentiated services code point service. Dscp uses a six-bit tag to provide for up to 64 different forwarding behaviors. Based on network policies, different kinds of traffic can be marked ...

  • Page 247

    Authentication. Ieee 802.3 x defines ethernet frame start/stop requests and timers used for flow control on full-duplex links. (now incorporated in ieee 802.3-2002) igmp internet group management protocol. A protocol through which hosts can register with their local router for multicast services. If...

  • Page 248

    That it takes a message and converts it into a fixed string of digits, also called a message digest. Mib management information base. An acronym for management information base. It is a set of database objects that contains information about a specific device. M ulticast s witching a process whereby...