Supermicro SSE-G2252, SSE-G2252P User manual

  • Hello! I am an AI chatbot trained to assist you with the Supermicro SSE-G2252 User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
i
SSE-G2252 Switches
52-Port Layer 2 Gigabit Ethernet Switch
SSE-G2252P Switches
52-Port Layer 2 Gigabit Ethernet Switch with
48 PoE-Capable Ports
USER’S MANUAL
Revison 1.0b
SSE-G2252
SSE-G2252P
SSE-G2252/SSE-G2252P Switches USER’S MANUAL
ii
The information in this USER’S MANUAL has been carefully reviewed and is believed to be accurate. The
vendor assumes no responsibility for any inaccuracies that may be contained in this document, makes no
commitment to update or to keep current the information in this manual, or to notify any person or
organization of the updates. Please Note: For the most up-to-date version of this manual, please see
our web site at www.supermicro.com.
Super Micro Computer, Inc. (“Supermicro”) reserves the right to make changes to the product described
in this manual at any time and without notice. This product, including software, if any, and documentation
may not, in whole or in part, be copied, photocopied, reproduced, translated or reduced to any medium or
machine without prior written consent.
IN NO EVENT WILL SUPERMICRO BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL,
SPECULATIVE OR CONSEQUENTIAL DAMAGES ARISING FROM THE USE OR INABILITY TO USE
THIS PRODUCT OR DOCUMENTATION, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. IN PARTICULAR, SUPERMICRO SHALL NOT HAVE LIABILITY FOR ANY HARDWARE,
SOFTWARE, OR DATA STORED OR USED WITH THE PRODUCT, INCLUDING THE COSTS OF
REPAIRING, REPLACING, INTEGRATING, INSTALLING OR RECOVERING SUCH HARDWARE,
SOFTWARE, OR DATA.
Any disputes arising between manufacturer and customer shall be governed by the laws of Santa Clara
County in the State of California, USA. The State of California, County of Santa Clara shall be the
exclusive venue for the resolution of any such disputes. Super Micro's total liability for all claims will not
exceed the price paid for the hardware product.
FCC Statement: This equipment has been tested and found to comply with the limits for a Class A digital
device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a commercial environment. This
equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in
accordance with the manufacturer’s instruction manual, may cause harmful interference with radio
communications. Operation of this equipment in a residential area is likely to cause harmful interference,
in which case you will be required to correct the interference at your own expense.
California Best Management Practices Regulations for Perchlorate Materials: This Perchlorate warning
applies only to products containing CR (Manganese Dioxide) Lithium coin cells. Perchlorate
Material-special handling may apply. See www.dtsc.ca.gov/hazardouswaste/perchlorate for further
details.
Manual Revison 1.0b
Release Date: October 8, 2013
Unless you request and receive written permission from Super Micro Computer, Inc., you may not copy
any part of this document.
Information in this document is subject to change without notice. Other products and companies referred
to herein are trademarks or registered trademarks of their respective companies or mark holders.
Copyright © 2013 by Super Micro Computer, Inc.
All rights reserved.
Printed in the United States of America
WARNING: HANDLING OF LEAD SOLDER MATERIALS USED IN THIS
PRODUCT MAY EXPOSE YOU TO LEAD, A CHEMICAL KNOWN TO THE
STATE OF CALIFORNIA TO CAUSE BIRTH DEFECTS AND OTHER
REPRODUCTIVE HARM.
iii
Preface
About this Manual
This manual is written for professional system integrators, Information Technology
professionals, service personnel, technicians and network administrators who are
responsible for installing and setting up network equipment; consequently, it assumes a
basic working knowledge of LANs (Local Area Networks). It provides information for the
installation and use of Supermicro's SSE-G2252 and SSE-G2252P switches.
Installation and maintenance should be performed by experienced professionals only.
Glossary
Glossary Term Description
ACL
Access Control List. ACLs can limit network traffic and restrict access to
certain users or devices by checking each packet for certain IP or MAC
(i.e., Layer 2) information.
ARP
Address Resolution Protocol converts between IP addresses and MAC
(hardware) addresses. ARP is used to locate the MAC address
corresponding to a given IP address. This allows the switch to use IP
addresses for routing decisions and the corresponding MAC addresses to
forward packets from one hop to the next.
BOOTP
Boot Protocol. BOOTP i
s used to provide bootup information for network
devices, including IP address information, the address of the TFTP server
that contains the devices system files, and the name of the boot file.
CoS
Class of Service is supported by prioritizing packets based on the required
level of service, and then placing them in the appropriate output queue.
Data is transmitted from the queues using weighted round-robin service to
enforce priority service and prevent blockage of lower-level queues.
Priority may be set according to the port default, the packet’s priority bit (in
the VLAN tag), TCP/UDP port number, IP Precedence bit, or DSCP priority
bit.
DHCP
Dynamic Host Control Protocol. Provides a framework for passing
configuration information to hosts on a TCP/IP network. DHCP is based on
the Bootstrap Protocol (BOOTP), adding the capability of automatic
allocation of reusable network addresses and additional configuration
options.
DHCP Snooping
A technique used to enhance network security by snooping on DHCP
server messages to track the physical location of hosts, ensure that hosts
only use the IP addresses assigned to them, and ensure that only
authorized DHCP servers are accessible.
SSE-G2252/SSE-G2252P Switches USER’S MANUAL
iv
DiffServ
Differentiated Services provides quality of service on large networks by
employing a well-defined set of building blocks from which a variety of
aggregate forwarding behaviors may be built. Each packet carries
information (DS byte) used by each hop to give it a particular forwarding
treatment, or per-hop behavior, at each network node. DiffServ allocates
different levels of service to users on the network with mechanisms such
as traffic meters, shapers/droppers, packet markers at the boundaries of
the network.
DNS
Domain Name Service. A system used for translating host names for
network nodes into IP addresses.
DSCP
Differentiated Services Code Point Service. DSCP uses a six-bit tag to
provide for up to 64 different forwarding behaviors. Based on network
policies, different kinds of traffic can be marked for different kinds of
forwarding. The DSCP bits are mapped to the Class of Service categories,
and then into the output queues.
EAPOL
Extensible Authentication Protocol over LAN. EAPOL is a client
authentication protocol used by this switch to verify the network access
rights for any device that is plugged into the switch. A user name and
password is requested by the switch, and then passed to an authentication
server (e.g., RADIUS) for verification. EAPOL is implemented as part of
the IEEE 802.1X Port Authentication standard.
EUI
Extended Universal Identifier is an address format used by IPv6 to identify
the host portion of the network address. The interface identifier in EUI
compatible addresses is based on the link-layer (MAC) address of an
interface. Interface identifiers used in global unicast and other IPv6
address types are 64 bits long and may be constructed in the EUI-64
format. The modified EUI-64 format interface ID is derived from a 48-bit
link-layer address by inserting the hexadecimal number FFFE between the
upper three bytes (OUI field) and the lower 3 bytes (serial number) of the
link layer address. To ensure that the chosen address is from a unique
Ethernet MAC address, the 7th bit in the high-order byte is set to 1
(equivalent to the IEEE Global/Local bit) to indicate the uniqueness of the
48-bit address.
GARP
Generic Attribute Registration Protocol. GARP is a protocol that can be
used by endstations and switches to register and propagate multicast
group membership information in a switched environment so that multicast
data frames are propagated only to those parts of a switched LAN
containing registered endstations. Formerly called Group Address
Registration Protocol.
GMRP
Generic Multicast Registration Protocol. GMRP allows network devices to
register end stations with multicast groups. GMRP requires that any
participating network devices or end stations comply with the IEEE 802.1p
standard.
GVRP
GARP VLAN Registration Protocol. Defines a way for switches to
exchange VLAN information in order to register necessary VLAN members
on ports along the Spanning Tree so that VLANs defined in each switch
can work automatically over a Spanning Tree network.
IEEE 802.1D
Specifies a general method for the operation of MAC bridges, including the
Spanning Tree Protocol.
Glossary Term Description
v
Preface
IEEE 802.1Q
VLAN Tagging—Defines Ethernet frame tags which carry VLAN
information. It allows switches to assign endstations to different virtual
LANs, and defines a standard way for VLANs to communicate across
switched networks.
IEEE 802.1p
An IEEE standard for providing quality of service (QoS) in Ethernet
networks. The standard uses packet tags that define up to eight traffic
classes and allows switches to transmit packets based on the tagged
priority value.
IEEE 802.1s
An IEEE standard for the Multiple Spanning Tree Protocol (MSTP) which
provides independent spanning trees for VLAN groups.
IEEE 802.1w
An IEEE standard for the Rapid Spanning Tree Protocol (RSTP) which
reduces the convergence time for network topology changes to about 10%
of that required by the older IEEE 802.1D STP standard. (Now
incorporated in IEEE 802.1D-2004)
IEEE 802.1X
Port Authentication controls access to the switch ports by requiring users
to first enter a user ID and password for authentication.
IEEE 802.3ac Defines frame extensions for VLAN tagging.
IEEE 802.3x
Defines Ethernet frame start/stop requests and timers used for flow control
on full-duplex links. (Now incorporated in IEEE 802.3-2002)
IGMP
Internet Group Management Protocol. A protocol through which hosts can
register with their local router for multicast services. If there is more than
one multicast switch/router on a given subnetwork, one of the devices is
made the “querier” and assumes responsibility for keeping track of group
membership.
IGMP Query
On each subnetwork, one IGMP-capable device will act as the querier —
that is, the device that asks all hosts to report on the IP multicast groups
they wish to join or to which they already belong. The elected querier will
be the device with the lowest IP address in the subnetwork.
IGMP Proxy
Proxies multicast group membership information onto the upstream
interface based on IGMP messages monitored on downstream interfaces,
and forwards multicast traffic based on that information. There is no need
for multicast routing protocols in an simple tree that uses IGMP Proxy.
IGMP Snooping
Listening to IGMP Query and IGMP Report packets transferred between IP
Multicast Routers and IP Multicast host groups to identify IP Multicast
group members.
In-Band Management Management of the network from a station attached directly to the network.
IP Multicast Filtering
A process whereby this switch can pass multicast traffic along to
participating hosts.
IP Precedence
The Type of Service (ToS) octet in the IPv4 header includes three
precedence bits defining eight different priority levels ranging from highest
priority for network control packets to lowest priority for routine traffic. The
eight values are mapped one-to-one to the Class of Service categories by
default, but may be configured differently to suit the requirements for
specific network applications.
LACP
Link Aggregation Control Protocol. Allows ports to automatically negotiate
a trunked link with LACP-configured ports on another device.
Layer 2
Data Link layer in the ISO 7-Layer Data Communications Protocol. This is
related directly to the hardware interface for network devices and passes
on traffic based on MAC addresses.
Glossary Term Description
SSE-G2252/SSE-G2252P Switches USER’S MANUAL
vi
Link Aggregation See Port Trunk.
LLDP
Link Layer Discovery Protocol is used to discover basic information about
neighboring devices in the local broadcast domain by using periodic
broadcasts to advertise information such as device identification,
capabilities and configuration settings.
MD5
MD5 Message-Digest is an algorithm that is used to create digital
signatures. It is intended for use with 32 bit machines and is safer than the
MD4 algorithm, which has been broken. MD5 is a one-way hash function,
meaning that it takes a message and converts it into a fixed string of digits,
also called a message digest.
MIB
Management Information Base. An acronym for Management Information
Base. It is a set of database objects that contains information about a
specific device.
MSTP
Multiple Spanning Tree Protocol can provide an independent spanning tree
for different VLANs. It simplifies network management, provides for even
faster convergence than RSTP by limiting the size of each region, and
prevents VLAN members from being segmented from the rest of the group.
MRD
Multicast Router Discovery is a A protocol used by IGMP snooping and
multicast routing devices to discover which interfaces are attached to
multicast routers. This process allows IGMP-enabled devices to determine
where to send multicast source and group membership messages.
Multicast Switching
A process whereby the switch filters incoming multicast frames for services
for which no attached host has registered, or forwards them to all ports
contained within the designated multicast VLAN group.
MVR
Multicast VLAN Registration is a method of using a single network-wide
multicast VLAN to transmit common services, such as such as television
channels or video-on-demand, across a service-provider’s network. MVR
simplifies the configuration of multicast services by using a common VLAN
for distribution, while still preserving security and data isolation for
subscribers residing in both the MVR VLAN and other standard or private
VLAN groups.
NTP
Network Time Protocol provides the mechanisms to synchronize time
across the network. The time servers operate in a
hierarchical-master-slave configuration in order to synchronize local clocks
within the subnet and to national time standards via wire or radio.
Out-of-Band Management Management of the network from a station not attached to the network.
Port Authentication See IEEE 802.1X.
Port Mirroring
A method whereby data on a target port is mirrored to a monitor port for
troubleshooting with a logic analyzer or RMON probe. This allows data on
the target port to be studied unobstructively.
Port Trunk
Defines a network link aggregation and trunking method which specifies
how to create a single high-speed logical link that combines several
lower-speed physical links.
Private VLANs
Private VLANs provide port-based security and isolation between ports
within the assigned VLAN. Data traffic on downlink ports can only be
forwarded to, and from, uplink ports.
Glossary Term Description
vii
Preface
QinQ
QinQ tunneling is designed for service providers carrying traffic for multiple
customers across their networks. It is used to maintain customer-specific
VLAN and Layer 2 protocol configurations even when different customers
use the same internal VLAN IDs.
QoS
Quality of Service. QoS refers to the capability of a network to provide
better service to selected traffic flows using features such as data
prioritization, queuing, congestion avoidance and traffic shaping. These
features effectively provide preferential treatment to specific flows either by
raising the priority of one flow or limiting the priority of another flow.
RADIUS
Remote Authentication Dial-in User Service. RADIUS
is a logon
authentication protocol that uses software running on a central server to
control access to RADIUS-compliant devices on the network.
RMON
Remote Monitoring. RMON provides comprehensive network monitoring
capabilities. It eliminates the polling required in standard SNMP, and can
set alarms on a variety of traffic conditions, including specific error types.
RSTP
Rapid Spanning Tree Protocol. RSTP reduces the convergence time for
network topology changes to about 10% of that required by the older IEEE
802.1D STP standard.
SMTP
Simple Mail Transfer Protocol is a standard host-to-host mail transport
protocol that operates over TCP, port 25.
SNMP
Simple Network Management Protocol. The application protocol in the
Internet suite of protocols which offers network management services.
SNTP
Simple Network Time Protocol allows a device to set its internal clock
based on periodic updates from a Network Time Protocol (NTP) server.
Updates can be requested from a specific NTP server, or can be received
via broadcasts sent by NTP servers.
SSH
Secure Shell is a secure replacement for remote access functions,
including Telnet. SSH can authenticate users with a cryptographic key, and
encrypt data connections between management clients and the switch.
STA
Spanning Tree Algorithm is a technology that checks your network for any
loops. A loop can often occur in complicated or backup linked network
systems. Spanning Tree detects and directs data along the shortest
available path, maximizing the performance and efficiency of the network.
TACACS+
Terminal Access Controller Access Control System Plus. TA
CACS+ is a
logon authentication protocol that uses software running on a central
server to control access to TACACS-compliant devices on the network.
TCP/IP
Transmission Control Protocol/Internet Protocol. Protocol suite that
includes TCP as the primary transport protocol, and IP as the network
layer protocol.
Telnet
Defines a remote communication facility for interfacing to a terminal device
over TCP/IP.
TFTP
Trivial File Transfer Protocol. A TCP/IP protocol commonly used for
software downloads.
UDP
User Datagram Protocol. UD
P provides a datagram mode for
packet-switched communications. It uses IP as the underlying transport
mechanism to provide access to IP-like services. UDP packets are
delivered just like IP packets – connection-less datagrams that may be
discarded before reaching their targets. UDP is useful when TCP would be
too complex, too slow, or just unnecessary.
Glossary Term Description
SSE-G2252/SSE-G2252P Switches USER’S MANUAL
viii
UTC
Universal Time Coordinate. UTC is a time scale that couples Greenwich
Mean Time (based solely on the Earth’s rotation rate) with highly accurate
atomic time. The UTC does not have daylight saving time.
VLAN
Virtual LAN. A Virtual LAN is a collection of network nodes that share the
same collision domain regardless of their physical location or connection
point in the network. A VLAN serves as a logical workgroup with no
physical barriers, and allows users to share information and resources as
though located on the same LAN.
XModem
A protocol used to transfer files between devices. Data is grouped in
128-byte blocks and error-corrected.
Glossary Term Description
ix
Table of Contents
Chapter 1 Introduction.......................................................................1-1
1-1 Key Features......................................................................................1-1
1-2 Description of Software Features...................................................1-2
Configuration Backup and Restore.........................................................1-2
Authentication.........................................................................................1-3
Access Control Lists ...............................................................................1-3
Port Configuration...................................................................................1-3
Port Mirroring..........................................................................................1-3
Port Trunking...........................................................................................1-3
Rate Limiting...........................................................................................1-4
Storm Control..........................................................................................1-4
Static Addresses.....................................................................................1-4
IEEE 802.1D Bridge................................................................................1-4
Store-and-Forward Switching..................................................................1-4
Spanning Tree Algorithm.........................................................................1-5
Virtual LANs............................................................................................1-5
Traffic Prioritization .................................................................................1-6
Quality of Service....................................................................................1-6
Multicast Filtering....................................................................................1-6
System Defaults......................................................................................1-6
1-3 Description of Hardware...................................................................1-9
10/100/1000BASE-T Ports......................................................................1-9
SFP Transceiver Slots ............................................................................1-9
Port and System Status LEDs...............................................................1-10
Mode Button..........................................................................................1-11
Power Supply Inlet................................................................................1-11
Grounding Point....................................................................................1-11
Reset Button.........................................................................................1-12
Console Port.........................................................................................1-12
Chapter 2 Standardized Warning Statements.....................2-1
2-1 About Standardized Warning Statements......................................2-1
Warning Definition...................................................................................2-1
Installation Instructions ...........................................................................2-4
Circuit Breaker........................................................................................2-5
Power Disconnection Warning................................................................2-6
Equipment Installation.............................................................................2-8
SSE-G2252/SSE-G2252P Switches USER’S MANUAL
x
Restricted Area.......................................................................................2-9
Battery Handling ...................................................................................2-10
Redundant Power Supplies ..................................................................2-12
Backplane Voltage................................................................................2-13
Comply with Local and National Electrical Codes.................................2-15
Product Disposal...................................................................................2-16
Hot Swap Fan Warning.........................................................................2-17
Power Cable and AC Adapter ..............................................................2-18
Chapter 3 Initial Configuration.....................................................3-1
3-1 Connecting to the Switch.................................................................3-1
Configuration Options.............................................................................3-1
Required Connections ............................................................................3-2
Remote Connections ..............................................................................3-3
3-2 Basic Configuration...........................................................................3-4
Console Connection................................................................................3-4
Setting Passwords..................................................................................3-4
Setting an IP Address.............................................................................3-5
Manual Configuration...........................................................................3-5
Dynamic Configuration.........................................................................3-8
Downloading a Configuration File Referenced by a DHCP Server.......3-10
Enabling SNMP Management Access..................................................3-12
Community Strings (for SNMP version 1 and 2c Clients)...................3-12
Trap Receivers...................................................................................3-13
Configuring Access for SNMP Version 3 Clients................................3-14
3-3 Managing System Files..................................................................3-14
Saving or Restoring Configuration Settings..........................................3-15
Chapter 4 Using the Web Interface...........................................4-1
4-1 Connecting to the Web Interface....................................................4-1
4-2 Navigating the Web Browser Interface..........................................4-2
Home Page.............................................................................................4-2
Configuration Options.............................................................................4-3
Panel Display..........................................................................................4-4
Showing Status Information....................................................................4-4
Main Menu .............................................................................................4-5
Chapter 5 Basic Management Tasks........................................5-1
5-1 Displaying System Information .......................................................5-1
5-2 Displaying Switch Hardware/Software Versions .........................5-2
xi
Table of Contents
5-3 Configuring Support for Jumbo Frames ........................................5-3
5-4 Displaying Bridge Extension Capabilities......................................5-4
5-5 Managing System Files....................................................................5-6
Copying Files via FTP/TFTP or HTTP....................................................5-6
Saving the Running Configuration to a Local File...................................5-8
Setting The Start-Up File.........................................................................5-9
Showing System Files...........................................................................5-10
Automatic Operation Code Upgrade.....................................................5-11
5-6 Setting the System Clock...............................................................5-15
Setting the Time Manually.....................................................................5-15
Setting the SNTP Polling Interval..........................................................5-16
Specifying SNTP Time Servers.............................................................5-17
Setting the Time Zone...........................................................................5-18
5-7 Configuring the Console Port........................................................5-19
5-8 Configuring Telnet Settings............................................................5-21
5-9 Displaying CPU Utilization.............................................................5-22
5-10 Displaying Memory Utilization.....................................................5-23
5-11 Resetting the System ...................................................................5-24
Chapter 6 Interface Configuration..............................................6-1
6-1 Port Configuration.............................................................................6-1
Configuring by Port List...........................................................................6-1
Configuring by Port Range......................................................................6-4
Displaying Connection Status.................................................................6-6
Configuring Local Port Mirroring.............................................................6-7
Configuring Remote Port Mirroring .........................................................6-9
Showing Port or Trunk Statistics...........................................................6-13
Performing Cable Diagnostics ..............................................................6-18
6-2 Trunk Configuration ........................................................................6-19
Configuring a Static Trunk.....................................................................6-20
Configuring a Dynamic Trunk................................................................6-23
Displaying LACP Port Counters............................................................6-28
Displaying LACP Settings and Status for the Local Side......................6-29
Displaying LACP Settings and Status for the Remote Side..................6-31
Configuring Trunk Mirroring ..................................................................6-32
6-3 Saving Power...................................................................................6-34
6-4 Traffic Segmentation.......................................................................6-36
Enabling Traffic Segmentation..............................................................6-36
SSE-G2252/SSE-G2252P Switches USER’S MANUAL
xii
Configuring Uplink and Downlink Ports.................................................6-37
6-5 VLAN Trunking ................................................................................6-38
Chapter 7 VLAN Configuration.....................................................7-1
7-1 IEEE 802.1Q VLANs.........................................................................7-1
Assigning Ports to VLANs.......................................................................7-2
VLAN Classification..............................................................................7-2
Port Overlapping..................................................................................7-3
Untagged VLANs .................................................................................7-3
Automatic VLAN Registration...............................................................7-3
Forwarding Tagged/Untagged Frames ...................................................7-4
Configuring VLAN Groups ......................................................................7-4
Adding Static Members to VLANs...........................................................7-6
Configuring Dynamic VLAN Registration..............................................7-10
7-2 IEEE 802.1Q Tunneling..................................................................7-13
Enabling QinQ Tunneling on the Switch ...............................................7-17
Adding an Interface to a QinQ Tunnel...................................................7-18
7-3 Protocol VLANs...............................................................................7-19
Configuring Protocol VLAN Groups ......................................................7-20
Mapping Protocol Groups to Interfaces ................................................7-21
7-4 Configuring IP Subnet VLANs.......................................................7-23
7-5 Configuring MAC-based VLANs...................................................7-25
7-6 Configuring VLAN Mirroring...........................................................7-27
Chapter 8 Address Table Settings.............................................8-1
8-1 Setting Static Addresses..................................................................8-1
8-2 Changing the Aging Time ................................................................8-3
8-3 Displaying the Dynamic Address Table.........................................8-4
8-4 Clearing the Dynamic Address Table.............................................8-5
8-5 Configuring MAC Address Mirroring..............................................8-6
Chapter 9 Spanning Tree Algorithm.........................................9-1
9-1 Overview.............................................................................................9-1
STP.........................................................................................................9-2
RSTP ......................................................................................................9-2
MSTP......................................................................................................9-2
9-2 Configuring Loopback Detection.....................................................9-4
9-3 Configuring Global Settings for STA ..............................................9-5
Displaying Global Settings for STA.......................................................9-11
xiii
Table of Contents
9-4 Configuring Interface Settings for STA ........................................9-12
9-5 Displaying Interface Settings for STA ..........................................9-16
9-6 Configuring Multiple Spanning Trees...........................................9-19
9-7 Configuring Interface Settings for MSTP.....................................9-22
Chapter 10 Congestion Control.................................................10-1
10-1 Rate Limiting..................................................................................10-1
10-2 Storm Control.................................................................................10-4
10-3 Automatic Traffic Control .............................................................10-6
Setting the ATC Timers.........................................................................10-7
Configuring ATC Thresholds and Responses.......................................10-9
Chapter 11 Class of Service.........................................................11-1
11-1 Layer 2 Queue Settings ...............................................................11-1
Setting the Default Priority for Interfaces..............................................11-1
Selecting the Queue Mode ...................................................................11-2
Mapping CoS Values to Egress Queues...............................................11-5
11-2 Layer 3/4 Priority Settings............................................................11-7
Mapping Layer 3/4 Priorities to CoS Values .........................................11-7
Setting Priority Processing to DSCP or CoS ........................................11-8
Mapping Ingress DSCP Values to Internal DSCP Values.....................11-9
Mapping CoS Priorities to Internal DSCP Values................................11-11
Chapter 12 Quality of Service.....................................................12-1
12-1 Overview.........................................................................................12-1
12-2 Configuring a Class Map .............................................................12-2
12-3 Creating QoS Policies..................................................................12-5
12-4 Attaching a Policy Map to a Port..............................................12-14
Chapter 13 VoIP Traffic Configuration ..................................13-1
13-1 Overview.........................................................................................13-1
13-2 Configuring VoIP Traffic...............................................................13-1
13-3 Configuring Telephony OUI.........................................................13-3
13-4 Configuring VoIP Traffic Ports.....................................................13-4
Chapter 14 Security Measures....................................................14-1
14-1 AAA Authorization and Accounting............................................14-2
Configuring Local/Remote Logon Authentication..................................14-3
Configuring Remote Logon Authentication Servers..............................14-4
Configuring AAA Accounting.................................................................14-9
SSE-G2252/SSE-G2252P Switches USER’S MANUAL
xiv
Configuring AAA Authorization ...........................................................14-14
14-2 Configuring User Accounts........................................................14-17
14-3 Web Authentication.....................................................................14-19
Configuring Global Settings for Web Authentication...........................14-19
Configuring Interface Settings for Web Authentication .......................14-21
14-4 Network Access (MAC Address Authentication)....................14-22
Configuring Global Settings for Network Access................................14-24
Configuring Network Access for Ports................................................14-25
Configuring Port Link Detection..........................................................14-27
Configuring a MAC Address Filter ......................................................14-28
Displaying Secure MAC Address Information.....................................14-30
14-5 Configuring HTTPS.....................................................................14-31
Configuring Global Settings for HTTPS..............................................14-31
Replacing the Default Secure-site Certificate .....................................14-33
14-6 Configuring the Secure Shell ...................................................14-34
Configuring the SSH Server................................................................14-37
Generating the Host Key Pair.............................................................14-38
Importing User Public Keys.................................................................14-40
14-7 Access Control Lists...................................................................14-42
Showing TCAM Utilization ..................................................................14-43
Setting the ACL Name and Type ........................................................14-44
Configuring a Standard IPv4 ACL.......................................................14-45
Configuring an Extended IPv4 ACL....................................................14-47
Configuring a Standard IPv6 ACL.......................................................14-50
Configuring an Extended IPv6 ACL....................................................14-52
Configuring a MAC ACL......................................................................14-54
Configuring an ARP ACL....................................................................14-56
Binding a Port to an Access Control List.............................................14-58
14-8 ARP Inspection............................................................................14-59
Configuring Global Settings for ARP Inspection.................................14-60
Configuring VLAN Settings for ARP Inspection..................................14-62
Configuring Interface Settings for ARP Inspection..............................14-63
Displaying ARP Inspection Statistics ..................................................14-65
Displaying the ARP Inspection Log.....................................................14-66
14-9 Filtering IP Addresses for Management Access....................14-67
14-10 Configuring Port Security.........................................................14-69
14-11 Configuring 802.1X Port Authentication ...............................14-72
Configuring 802.1X Global Settings....................................................14-74
xv
Table of Contents
Configuring Port Authenticator Settings for 802.1X ............................14-75
Configuring Port Supplicant Settings for 802.1X.................................14-79
Displaying 802.1X Statistics................................................................14-81
14-12 IP Source Guard.......................................................................14-84
Configuring Ports for IP Source Guard ...............................................14-84
Configuring Static Bindings for IP Source Guard................................14-86
Displaying Information for Dynamic IP Source Guard Bindings..........14-88
14-13 DHCP Snooping........................................................................14-89
DHCP Snooping Configuration...........................................................14-91
DHCP Snooping VLAN Configuration.................................................14-92
Displaying DHCP Snooping Binding Information................................14-95
Chapter 15 Basic Administration Protocols ......................15-1
15-1 Configuring Event Logging..........................................................15-1
System Log Configuration.....................................................................15-1
Remote Log Configuration....................................................................15-4
Sending Simple Mail Transfer Protocol Alerts.......................................15-5
15-2 Link Layer Discovery Protocol....................................................15-8
Setting LLDP Timing Attributes.............................................................15-8
Configuring LLDP Interface Attributes ................................................15-10
Configuring LLDP Interface Civic-Address .........................................15-14
Displaying LLDP Local Device Information.........................................15-16
Displaying LLDP Remote Port Information .........................................15-19
Displaying Device Statistics................................................................15-23
15-3 Power Over Ethernet..................................................................15-25
Displaying the Switch’s Overall PoE Power Budget............................15-26
Setting The Port PoE Power Budget...................................................15-27
15-4 Simple Network Management Protocol ..................................15-29
Configuring Global Settings for SNMP................................................15-32
Setting the Local Engine ID ................................................................15-33
Specifying a Remote Engine ID..........................................................15-34
Setting SNMPv3 Views ......................................................................15-35
Configuring SNMPv3 Groups .............................................................15-38
Setting Community Access Strings ....................................................15-43
Configuring Local SNMPv3 Users .....................................................15-44
Configuring Remote SNMPv3 Users .................................................15-46
Specifying Notification Managers........................................................15-49
15-5 Remote Monitoring .....................................................................15-53
Configuring RMON Alarms .................................................................15-53
SSE-G2252/SSE-G2252P Switches USER’S MANUAL
xvi
Configuring RMON Events..................................................................15-57
Configuring RMON History Samples ..................................................15-60
Configuring RMON Statistical Samples ..............................................15-63
15-6 Switch Clustering ........................................................................15-66
Configuring General Settings for Clusters ..........................................15-67
Cluster Member Configuration............................................................15-68
15-7 Setting A Time Range................................................................15-71
Chapter 16 IP Configuration.........................................................16-1
16-1 Using the Ping Function...............................................................16-1
16-2 Address Resolution Protocol ......................................................16-3
Setting the ARP Timeout.......................................................................16-3
Displaying ARP Entries.........................................................................16-4
16-3 Setting the Switch’s IP Address (IP Version 4) ........................16-5
16-4 Setting the Switch’s IP Address (IP Version 6)........................16-7
Configuring the IPv6 Default Gateway..................................................16-8
Configuring IPv6 Interface Settings ......................................................16-9
Configuring an IPv6 Address..............................................................16-10
Showing IPv6 Addresses....................................................................16-13
Showing the IPv6 Neighbor Cache.....................................................16-14
Showing IPv6 Statistics.......................................................................16-16
Chapter 17 IP Services....................................................................17-1
17-1 Configuring General DNS Service Parameters .......................17-1
17-2 Configuring a List of Domain Names.........................................17-2
17-3 Configuring a List of Name Servers...........................................17-4
17-4 Configuring Static DNS Host to Address Entries.....................17-5
17-5 Displaying the DNS Cache..........................................................17-6
Chapter 18 Multicast Filtering ....................................................18-1
18-1 Overview.........................................................................................18-1
18-2 Layer 2 IGMP (Snooping and Query)........................................18-2
Configuring IGMP Snooping and Query Parameters............................18-4
Specifying Static Interfaces for a Multicast Router................................18-8
Assigning Interfaces to Multicast Services..........................................18-10
Setting IGMP Snooping Status per Interface......................................18-12
Displaying Multicast Groups Discovered by IGMP Snooping .............18-17
18-3 Filtering and Throttling IGMP Groups......................................18-18
Enabling IGMP Filtering and Throttling...............................................18-18
xvii
Table of Contents
Configuring IGMP Filter Profiles .........................................................18-19
Configuring IGMP Filtering and Throttling for Interfaces.....................18-22
18-4 Multicast VLAN Registration .....................................................18-23
Configuring Global MVR Settings.......................................................18-25
Configuring MVR Interface Status.......................................................18-26
Assigning Static Multicast Groups to Interfaces..................................18-28
Showing Multicast Group Members....................................................18-30
Chapter 19 Using the Command Line Interface...............19-1
19-1 Accessing the CLI.........................................................................19-1
Console Connection..............................................................................19-1
Telnet Connection .................................................................................19-2
19-2 Entering Commands.....................................................................19-3
Keywords and Arguments.....................................................................19-3
Minimum Abbreviation ..........................................................................19-3
Command Completion..........................................................................19-3
Getting Help on Commands..................................................................19-3
Showing Commands..........................................................................19-4
Partial Keyword Lookup........................................................................19-6
Negating the Effect of Commands........................................................19-6
Using Command History.......................................................................19-6
Understanding Command Modes .........................................................19-6
Exec Commands...................................................................................19-7
Configuration Commands.....................................................................19-8
Command Line Processing...................................................................19-9
Showing Status Information................................................................19-10
Output Modifiers..................................................................................19-11
19-3 CLI Command Groups...............................................................19-11
Chapter 20 General Commands.................................................20-1
prompt...................................................................................................20-1
reload (Global Configuration)................................................................20-2
enable...................................................................................................20-3
quit........................................................................................................20-4
show history..........................................................................................20-4
configure...............................................................................................20-5
disable...................................................................................................20-6
reload (Privileged Exec)........................................................................20-6
show reload...........................................................................................20-7
end........................................................................................................20-7
SSE-G2252/SSE-G2252P Switches USER’S MANUAL
xviii
exit ........................................................................................................20-8
Chapter 21 System Management Commands...................21-1
21-1 Device Designation.......................................................................21-2
hostname..............................................................................................21-2
21-2 System Status................................................................................21-3
show access-list tcam-utilization...........................................................21-3
show memory........................................................................................21-4
show process cpu.................................................................................21-4
show running-config..............................................................................21-4
show startup-config...............................................................................21-7
show system.........................................................................................21-8
show tech-support.................................................................................21-9
show users..........................................................................................21-10
show version.......................................................................................21-11
21-3 Frame Size...................................................................................21-12
jumbo frame........................................................................................21-12
21-4 File Management........................................................................21-13
boot system.........................................................................................21-14
copy ....................................................................................................21-15
delete..................................................................................................21-18
dir........................................................................................................21-18
whichboot............................................................................................21-20
upgrade opcode auto..........................................................................21-20
upgrade opcode path..........................................................................21-22
21-5 Line................................................................................................21-23
line ......................................................................................................21-24
databits................................................................................................21-25
exec-timeout .......................................................................................21-26
login ....................................................................................................21-27
parity ...................................................................................................21-28
password.............................................................................................21-29
password-thresh .................................................................................21-30
silent-time............................................................................................21-31
speed..................................................................................................21-32
stopbits................................................................................................21-33
timeout login response........................................................................21-34
disconnect...........................................................................................21-35
show line.............................................................................................21-36
xix
Table of Contents
21-6 Event Logging..............................................................................21-37
logging facility .....................................................................................21-37
logging history.....................................................................................21-38
logging host.........................................................................................21-39
logging on ...........................................................................................21-40
logging trap.........................................................................................21-41
clear log ..............................................................................................21-42
show log..............................................................................................21-43
show logging.......................................................................................21-44
21-7 SMTP Alerts.................................................................................21-46
logging sendmail.................................................................................21-46
logging sendmail host.........................................................................21-47
logging sendmail level.........................................................................21-48
logging Sendmail Destination-Email ...................................................21-49
logging Sendmail Source-Email..........................................................21-50
show logging sendmail........................................................................21-50
21-8 Time ..............................................................................................21-51
sntp client............................................................................................21-52
sntp poll...............................................................................................21-53
sntp server..........................................................................................21-54
show sntp............................................................................................21-55
clock timezone....................................................................................21-56
clock timezone-predefined..................................................................21-57
calendar set ........................................................................................21-58
Syntax..............................................................................................21-58
show calendar.....................................................................................21-59
21-9 Time Range..................................................................................21-59
time-range...........................................................................................21-60
absolute ..............................................................................................21-61
periodic ...............................................................................................21-62
show time-range .................................................................................21-63
21-10 Switch Clustering......................................................................21-64
cluster .................................................................................................21-65
cluster commander .............................................................................21-66
cluster ip-pool......................................................................................21-66
cluster member...................................................................................21-67
rcommand...........................................................................................21-68
show cluster........................................................................................21-69
show cluster members........................................................................21-69
SSE-G2252/SSE-G2252P Switches USER’S MANUAL
xx
show cluster candidates......................................................................21-70
Chapter 22 SNMP Commands.....................................................22-1
snmp-server..........................................................................................22-2
snmp-server community........................................................................22-3
snmp-server contact .............................................................................22-4
snmp-server location.............................................................................22-5
show snmp............................................................................................22-6
snmp-server enable traps.....................................................................22-7
snmp-server host .................................................................................22-8
snmp-server engine-id........................................................................22-10
snmp-server group..............................................................................22-12
snmp-server user................................................................................22-13
snmp-server view................................................................................22-15
show snmp engine-id..........................................................................22-16
show snmp group................................................................................22-16
show snmp user..................................................................................22-17
show snmp view..................................................................................22-18
nlm......................................................................................................22-19
snmp-server notify-filter ......................................................................22-19
show nlm oper-status..........................................................................22-21
show snmp notify-filter........................................................................22-22
Chapter 23 Remote Monitoring Commands.......................23-1
rmon alarm............................................................................................23-2
rmon event ...........................................................................................23-3
rmon collection history..........................................................................23-4
rmon collection rmon1 ..........................................................................23-5
show rmon alarms.................................................................................23-6
show rmon events.................................................................................23-6
show rmon history.................................................................................23-6
show rmon statistics..............................................................................23-8
Chapter 24 Authentication Commands ................................24-1
24-1 User Accounts...............................................................................24-2
enable password...................................................................................24-2
username..............................................................................................24-3
24-2 Authentication Sequence.............................................................24-4
authentication enable............................................................................24-4
authentication login...............................................................................24-6
24-3 RADIUS Client...............................................................................24-7
/