Supermicro SSE-G2252, SSE-G2252P User manual

  • Hello! I am an AI chatbot trained to assist you with the Supermicro SSE-G2252 User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
SSE-G2252 Switch
SSE-G2252P Switch
USER’S MANUAL
Revison 1.0b
SSE-G2252P
SSE-G2252P Switch
SSE-G2252
SSE-G2252 Switch
The information in this USER’S MANUAL has been carefully reviewed and is believed to be accurate. The
vendor assumes no responsibility for any inaccuracies that may be contained in this document, makes no
commitment to update or to keep current the information in this manual, or to notify any person or organization
of the updates. Please Note: For the most up-to-date version of this manual, please see our web site at
www.supermicro.com.
Super Micro Computer, Inc. (“Supermicro”) reserves the right to make changes to the product described in this
manual at any time and without notice. This product, including software, if any, and documentation may not, in
whole or in part, be copied, photocopied, reproduced, translated or reduced to any medium or machine without
prior written consent.
IN NO EVENT WILL SUPERMICRO BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL,
SPECULATIVE OR CONSEQUENTIAL DAMAGES ARISING FROM THE USE OR INABILITY TO USE THIS
PRODUCT OR DOCUMENTATION, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN
PARTICULAR, SUPERMICRO SHALL NOT HAVE LIABILITY FOR ANY HARDWARE, SOFTWARE, OR DATA
STORED OR USED WITH THE PRODUCT, INCLUDING THE COSTS OF REPAIRING, REPLACING,
INTEGRATING, INSTALLING OR RECOVERING SUCH HARDWARE, SOFTWARE, OR DATA.
Any disputes arising between manufacturer and customer shall be governed by the laws of Santa Clara County
in the State of California, USA. The State of California, County of Santa Clara shall be the exclusive venue for
the resolution of any such disputes. Supermicro's total liability for all claims will not exceed the price paid for the
hardware product.
FCC Statement: This equipment has been tested and found to comply with the limits for a Class A digital device
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against
harmful interference when the equipment is operated in a commercial environment. This equipment generates,
uses, and can radiate radio frequency energy and, if not installed and used in accordance with the
manufacturer’s instruction manual, may cause harmful interference with radio communications. Operation of
this equipment in a residential area is likely to cause harmful interference, in which case you will be required to
correct the interference at your own expense.
California Best Management Practices Regulations for Perchlorate Materials: This Perchlorate warning applies
only to products containing CR (Manganese Dioxide) Lithium coin cells. Perchlorate Material-special handling
may apply. See www.dtsc.ca.gov/hazardouswaste/perchlorate for further details.
WARNING: HANDLING OF LEAD SOLDER MATERIALS USED IN THIS PRODUCT MAY
EXPOSE YOU TO LEAD, A CHEMICAL KNOWN TO THE STATE OF CALIFORNIA TO CAUSE
BIRTH DEFECTS AND OTHER REPRODUCTIVE HARM
Manual Revison 1.0b
Release Date: June 1, 2016
Unless you request and receive written permission from Super Micro Computer, Inc., you may not copy any part
of this document.
Information in this document is subject to change without notice. Other products and companies referred to
herein are trademarks or registered trademarks of their respective companies or mark holders.
Copyright © 2016 by Super Micro Computer, Inc.
All rights reserved.
Printed in the United States of America
– 3 –
ABOUT THIS GUIDE
PURPOSE This guide gives specific information on how to operate and use the
management functions of the following switches:
SSE-G2252 GIGABIT ETHERNET SWITCH
Layer 2+ Managed Switch
with 48 10/100/1000BASE-T (RJ-45) Ports,
and 4 Gigabit SFP Ports
SSE-G2252P GIGABIT ETHERNET POE SWITCH
Layer 2+ Managed Switch
with 48 10/100/1000BASE-T (RJ-45) PoE Ports,
and 4 Gigabit SFP Ports
AUDIENCE The guide is intended for use by network administrators who are
responsible for operating and maintaining network equipment;
consequently, it assumes a basic working knowledge of general switch
functions, the Internet Protocol (IP), and Simple Network Management
Protocol (SNMP).
CONVENTIONS The following conventions are used throughout this guide to show
information:
N
OTE
:
Emphasizes important information or calls your attention to related
features or instructions.
C
AUTION
:
Alerts you to a potential hazard that could cause loss of data, or
damage the system or equipment.
W
ARNING
:
Alerts you to a potential hazard that could cause personal injury.
RELATED PUBLICATIONS The following publication details the hardware features of the switch,
including the physical and performance-related characteristics, and how to
install the switch:
The Installation Guide
Also, as part of the switch’s software, there is an online web-based help
that describes all management related features.
– 4 –
REVISION HISTORY This section summarizes the changes in each revision of this guide.
REVISION 1.0, SEPTEMBER 2015 RELEASE
This is the first version of this guide. This guide is valid for software release v2.0.0.4.
REVISION 1.0A, NOVEMBER 2015 REVISION
This is the second version of this guide with new changes for the latest software release.
REVISION 1.0B, MAY 2016 REVISION
This revision included small changes to correct a baud rate error on a few pages of the manual.
U
SER
S
M
ANUAL
TABLE OF CONTENTS
IGETTING STARTED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Key Features ......................................................................................................................................................................17
Description of Software Features ......................................................................................................................................18
System Defaults.................................................................................................................................................................24
2 INITIAL SWITCH CONFIGURATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Connecting to the Switch...................................................................................................................................................27
Configuration Options.................................................................................................................................................27
Required Connections .................................................................................................................................................28
Remote Connections....................................................................................................................................................29
Basic Configuration...........................................................................................................................................................29
Console Connection ....................................................................................................................................................29
Setting Passwords........................................................................................................................................................30
Setting an IP Address ..................................................................................................................................................31
Downloading a Configuration File and Other Parameters Provided by a DHCP Server............................................37
Enabling SNMP Management Access ........................................................................................................................39
Managing System Files......................................................................................................................................................41
Saving or Restoring Configuration Settings................................................................................................................41
II WEB CONFIGURATION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43
3 USING THE WEB INTERFACE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Connecting to the Web Interface .......................................................................................................................................45
Navigating the Web Browser Interface .............................................................................................................................46
Home Page ..................................................................................................................................................................46
Configuration Options.................................................................................................................................................47
Panel Display...............................................................................................................................................................47
Main Menu .................................................................................................................................................................47
4 BASIC MANAGEMENT TASKS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Displaying System Information.........................................................................................................................................65
Displaying Hardware/Software Versions .........................................................................................................................67
– 6 –
Configuring Support for Jumbo Frames............................................................................................................................68
Displaying Bridge Extension Capabilities.........................................................................................................................69
Managing System Files......................................................................................................................................................70
Copying Files via FTP/SFTP/TFTP or HTTP.............................................................................................................70
Saving the Running Configuration to a Local File......................................................................................................73
Setting the Start-Up File..............................................................................................................................................74
Showing System Files .................................................................................................................................................75
Automatic Operation Code Upgrade...........................................................................................................................75
Setting the System Clock...................................................................................................................................................79
Setting the Time Manually..........................................................................................................................................80
Setting the SNTP Polling Interval...............................................................................................................................81
Configuring NTP.........................................................................................................................................................81
Configuring Time Servers...........................................................................................................................................82
Setting the Time Zone .................................................................................................................................................86
Configuring the Console Port ............................................................................................................................................87
Configuring Telnet Settings...............................................................................................................................................88
Configuring CPU Guard....................................................................................................................................................90
Displaying CPU Utilization...............................................................................................................................................91
Displaying Memory Utilization.........................................................................................................................................93
Resetting the System..........................................................................................................................................................94
5 INTERFACE CONFIGURATION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Port Configuration .............................................................................................................................................................99
Configuring by Port List..............................................................................................................................................99
Configuring by Port Range........................................................................................................................................102
Displaying Connection Status ...................................................................................................................................102
Configuring Local Port Mirroring.............................................................................................................................103
Configuring Remote Port Mirroring..........................................................................................................................105
Showing Port or Trunk Statistics...............................................................................................................................109
Displaying Statistical History....................................................................................................................................114
Displaying Transceiver Data.....................................................................................................................................118
Configuring Transceiver Thresholds.........................................................................................................................119
Performing Cable Diagnostics...................................................................................................................................122
Trunk Configuration........................................................................................................................................................124
Configuring a Static Trunk........................................................................................................................................125
Configuring a Dynamic Trunk ..................................................................................................................................128
Displaying LACP Port Counters...............................................................................................................................133
Displaying LACP Settings and Status for the Local Side.........................................................................................134
Displaying LACP Settings and Status for the Remote Side......................................................................................136
Configuring Load Balancing.....................................................................................................................................137
Saving Power...................................................................................................................................................................139
Traffic Segmentation .......................................................................................................................................................141
Enabling Traffic Segmentation .................................................................................................................................141
Configuring Uplink and Downlink Ports ..................................................................................................................142
VLAN Trunking ..............................................................................................................................................................144
6 VLAN CONFIGURATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
IEEE 802.1Q VLANs ......................................................................................................................................................147
Configuring VLAN Groups.......................................................................................................................................150
Adding Static Members to VLANs...........................................................................................................................153
Configuring Dynamic VLAN Registration...............................................................................................................157
IEEE 802.1Q Tunneling ..................................................................................................................................................160
Enabling QinQ Tunneling on the Switch..................................................................................................................163
Creating CVLAN to SPVLAN Mapping Entries......................................................................................................165
Adding an Interface to a QinQ Tunnel......................................................................................................................167
Protocol VLANs ..............................................................................................................................................................168
Configuring Protocol VLAN Groups........................................................................................................................168
Mapping Protocol Groups to Interfaces ...........................................................................................
.........................170
Configuring IP Subnet VLANs........................................................................................................................................172
Configuring MAC-based VLANs....................................................................................................................................174
– 7 –
Configuring VLAN Mirroring.........................................................................................................................................176
7 ADDRESS TABLE SETTINGS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Configuring MAC Address Learning ..............................................................................................................................179
Setting Static Addresses...................................................................................................................................................181
Changing the Aging Time................................................................................................................................................182
Displaying the Dynamic Address Table..........................................................................................................................183
Clearing the Dynamic Address Table..............................................................................................................................184
Configuring MAC Address Mirroring.............................................................................................................................185
Issuing MAC Address Traps............................................................................................................................................187
8 SPANNING TREE ALGORITHM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Overview..........................................................................................................................................................................189
Configuring Loopback Detection ....................................................................................................................................191
Configuring Global Settings for STA..............................................................................................................................193
Displaying Global Settings for STA................................................................................................................................199
Configuring Interface Settings for STA...........................................................................................................................200
Displaying Interface Settings for STA.............................................................................................................................203
Configuring Multiple Spanning Trees.............................................................................................................................206
Configuring Interface Settings for MSTP........................................................................................................................210
9 CONGESTION CONTROL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Rate Limiting...................................................................................................................................................................213
Storm Control ..................................................................................................................................................................214
Automatic Traffic Control...............................................................................................................................................216
Setting the ATC Timers ............................................................................................................................................217
Configuring ATC Thresholds and Responses...........................................................................................................219
10 CLASS OF SERVICE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Layer 2 Queue Settings....................................................................................................................................................223
Setting the Default Priority for Interfaces.................................................................................................................223
Selecting the Queue Mode ........................................................................................................................................224
Mapping CoS Values to Egress Queues....................................................................................................................226
Layer 3/4 Priority Settings...............................................................................................................................................229
Setting Priority Processing to IP Precedence/DSCP or CoS ....................................................................................229
Mapping IP Precedence Values to Internal DSCP Values........................................................................................231
Mapping Ingress DSCP Values to Internal DSCP Values ........................................................................................233
Mapping CoS Priorities to Internal DSCP Values ....................................................................................................235
11 QUALITY OF SERVICE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Overview..........................................................................................................................................................................239
Configuring a Class Map.................................................................................................................................................240
Creating QoS Policies......................................................................................................................................................243
Attaching a Policy Map to a Port.....................................................................................................................................252
12 VOIP TRAFFIC CONFIGURATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Overview..........................................................................................................................................................................255
Configuring VoIP Traffic ................................................................................................................................................255
Configuring Telephony OUI............................................................................................................................................257
Configuring VoIP Traffic Ports.......................................................................................................................................258
13 SECURITY MEASURES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
AAA Authentication, Authorization and Accounting .....................................................................................................262
Configuring Local/Remote Logon Authentication....................................................................................................263
Configuring Remote Logon Authentication Servers.................................................................................................264
Configuring AAA Accounting..................................................................................................................................269
Configuring AAA Authorization...............................................................................................................................274
Configuring User Accounts.............................................................................................................................................277
Web Authentication.........................................................................................................................................................279
Configuring Global Settings for Web Authentication...............................................................................................280
– 8 –
Configuring Interface Settings for Web Authentication ...........................................................................................281
Network Access (MAC Address Authentication) ...........................................................................................................282
Configuring Global Settings for Network Access.....................................................................................................284
Configuring Network Access for Ports .....................................................................................................................285
Configuring Port Link Detection...............................................................................................................................287
Configuring a MAC Address Filter...........................................................................................................................288
Displaying Secure MAC Address Information .........................................................................................................290
Configuring HTTPS.........................................................................................................................................................291
Configuring Global Settings for HTTPS...................................................................................................................291
Replacing the Default Secure-site Certificate ...........................................................................................................293
Configuring the Secure Shell ..........................................................................................................................................294
Configuring the SSH Server......................................................................................................................................297
Generating the Host Key Pair....................................................................................................................................298
Importing User Public Keys......................................................................................................................................300
Access Control Lists .......................................................................................................................................................302
Setting a Time Range ................................................................................................................................................303
Showing TCAM Utilization......................................................................................................................................306
Setting the ACL Name and Type ..............................................................................................................................307
Configuring a Standard IPv4 ACL............................................................................................................................309
Configuring an Extended IPv4 ACL.........................................................................................................................310
Configuring a Standard IPv6 ACL............................................................................................................................313
Configuring an Extended IPv6 ACL.........................................................................................................................314
Configuring a MAC ACL..........................................................................................................................................317
Configuring an ARP ACL.........................................................................................................................................319
Binding a Port to an Access Control List..................................................................................................................321
Configuring ACL Mirroring......................................................................................................................................322
Showing ACL Hardware Counters............................................................................................................................324
ARP Inspection................................................................................................................................................................325
Configuring Global Settings for ARP Inspection......................................................................................................326
Configuring VLAN Settings for ARP Inspection .....................................................................................................328
Configuring Interface Settings for ARP Inspection ..................................................................................................329
Displaying ARP Inspection Statistics........................................................................................................................330
Displaying the ARP Inspection Log..........................................................................................................................332
Filtering IP Addresses for Management Access..............................................................................................................332
Configuring Port Security................................................................................................................................................334
Configuring 802.1X Port Authentication ........................................................................................................................337
Configuring 802.1X Global Settings.........................................................................................................................338
Configuring Port Authenticator Settings for 802.1X ................................................................................................340
Configuring Port Supplicant Settings for 802.1X.................................................................................
....................344
Displaying 802.1X Statistics.....................................................................................................................................346
DoS Protection.................................................................................................................................................................348
IPv4 Source Guard...........................................................................................................................................................351
Configuring Ports for IPv4 Source Guard.................................................................................................................351
Configuring Static Bindings for IPv4 Source Guard.................................................................................................353
Displaying Information for Dynamic IPv4 Source Guard Bindings.........................................................................354
IPv6 Source Guard...........................................................................................................................................................355
Configuring Ports for IPv6 Source Guard.................................................................................................................356
Configuring Static Bindings for IPv6 Source Guard.................................................................................................358
Displaying Information for Dynamic IPv6 Source Guard Bindings.........................................................................360
DHCP Snooping ..............................................................................................................................................................361
DHCP Snooping Global Configuration.....................................................................................................................364
DHCP Snooping VLAN Configuration ....................................................................................................................365
Configuring Ports for DHCP Snooping.....................................................................................................................366
Displaying DHCP Snooping Binding Information ...................................................................................................367
14 BASIC ADMINISTRATION PROTOCOLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Configuring Event Logging.............................................................................................................................................369
System Log Configuration ........................................................................................................................................370
Remote Log Configuration........................................................................................................................................372
Sending Simple Mail Transfer Protocol Alerts.........................................................................................................373
– 9 –
Link Layer Discovery Protocol........................................................................................................................................374
Setting LLDP Timing Attributes...............................................................................................................................375
Configuring LLDP Interface Attributes ....................................................................................................................377
Configuring LLDP Interface Civic-Address.............................................................................................................381
Displaying LLDP Local Device Information............................................................................................................383
Displaying LLDP Remote Device Information.........................................................................................................386
Displaying Device Statistics......................................................................................................................................394
Power over Ethernet.........................................................................................................................................................396
Setting the Switch’s Overall PoE Power Budget ......................................................................................................396
Setting the Port PoE Power Budget...........................................................................................................................398
Simple Network Management Protocol ..........................................................................................................................400
Configuring Global Settings for SNMP....................................................................................................................402
Setting the Local Engine ID......................................................................................................................................403
Specifying a Remote Engine ID................................................................................................................................404
Setting SNMPv3 Views ............................................................................................................................................406
Configuring SNMPv3 Groups ..................................................................................................................................408
Setting Community Access Strings ..........................................................................................................................413
Configuring Local SNMPv3 Users ..........................................................................................................................415
Configuring Remote SNMPv3 Users .......................................................................................................................417
Specifying Trap Managers ........................................................................................................................................419
Creating SNMP Notification Logs............................................................................................................................424
Showing SNMP Statistics .........................................................................................................................................426
Remote Monitoring..........................................................................................................................................................428
Configuring RMON Alarms......................................................................................................................................428
Configuring RMON Events.......................................................................................................................................431
Configuring RMON History Samples.......................................................................................................................433
Configuring RMON Statistical Samples...................................................................................................................436
Switch Clustering.............................................................................................................................................................438
Configuring General Settings for Clusters................................................................................................................439
Cluster Member Configuration .................................................................................................................................440
Managing Cluster Members......................................................................................................................................442
Ethernet Ring Protection Switching ................................................................................................................................442
ERPS Global Configuration......................................................................................................................................447
ERPS Ring Configuration .........................................................................................................................................447
ERPS Forced and Manual Mode Operations ............................................................................................................464
Connectivity Fault Management......................................................................................................................................468
Configuring Global Settings for CFM.......................................................................................................................471
Configuring Interfaces for CFM................................................................................................................................475
Configuring CFM Maintenance Domains.................................................................................................................476
Configuring CFM Maintenance Associations...........................................................................................................480
Configuring Maintenance End Points .......................................................................................................................485
Configuring Remote Maintenance End Points..........................................................................................................486
Transmitting Link Trace Messages ...........................................................................................................................488
Transmitting Loop Back Messages...........................................................................................................................490
Transmitting Delay-Measure Requests .....................................................................................................................492
Displaying Local MEPs.............................................................................................................................................494
Displaying Details for Local MEPs...........................................................................................................................495
Displaying Local MIPs..............................................................................................................................................496
Displaying Remote MEPs .........................................................................................................................................497
Displaying Details for Remote MEPs .......................................................................................................................498
Displaying the Link Trace Cache..............................................................................................................................500
Displaying Fault Notification Settings......................................................................................................................502
Displaying Continuity Check Errors.........................................................................................................................503
OAM Configuration.........................................................................................................................................................504
Enabling OAM on Local Ports..................................................................................................................................504
Displaying Statistics for OAM Messages .................................................................................................................507
Displaying the OAM Event Log ...............................................................................................................................508
Displaying the Status of Remote Interfaces ..............................................................................................................509
Configuring a Remote Loop Back Test.....................................................................................................................510
Displaying Results of Remote Loop Back Testing ...................................................................................................512
– 10 –
UDLD Configuration.......................................................................................................................................................513
Configuring UDLD Protocol Intervals......................................................................................................................514
Configuring UDLD Interface Settings ......................................................................................................................515
Displaying UDLD Neighbor Information.................................................................................................................517
15 MULTICAST FILTERING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
Overview..........................................................................................................................................................................519
Layer 2 IGMP (Snooping and Query for IPv4)...............................................................................................................520
Configuring IGMP Snooping and Query Parameters................................................................................................522
Specifying Static Interfaces for a Multicast Router ..................................................................................................526
Assigning Interfaces to Multicast Services ...............................................................................................................528
Setting IGMP Snooping Status per Interface............................................................................................................529
Filtering IGMP Query Packets and Multicast Data...................................................................................................535
Displaying Multicast Groups Discovered by IGMP Snooping.................................................................................536
Displaying IGMP Snooping Statistics.......................................................................................................................537
Filtering and Throttling IGMP Groups............................................................................................................................541
Enabling IGMP Filtering and Throttling...................................................................................................................541
Configuring IGMP Filter Profiles .............................................................................................................................542
Configuring IGMP Filtering and Throttling for Interfaces .......................................................................................544
MLD Snooping (Snooping and Query for IPv6) .....................................................................................
........................546
Configuring MLD Snooping and Query Parameters.................................................................................................546
Setting Immediate Leave Status for MLD Snooping per Interface...........................................................................548
Specifying Static Interfaces for an IPv6 Multicast Router........................................................................................549
Assigning Interfaces to IPv6 Multicast Services.......................................................................................................551
Showing MLD Snooping Groups and Source List....................................................................................................553
Multicast VLAN Registration for IPv4 ...........................................................................................................................554
Configuring MVR Global Settings............................................................................................................................555
Configuring MVR Domain Settings..........................................................................................................................557
Configuring MVR Group Address Profiles...............................................................................................................559
Configuring MVR Interface Status ...........................................................................................................................561
Assigning Static MVR Multicast Groups to Interfaces.............................................................................................564
Displaying MVR Receiver Groups ...........................................................................................................................566
Displaying MVR Statistics........................................................................................................................................567
Multicast VLAN Registration for IPv6 ...........................................................................................................................571
Configuring MVR6 Global Settings..........................................................................................................................571
Configuring MVR6 Domain Settings........................................................................................................................574
Configuring MVR6 Group Address Profiles.............................................................................................................575
Configuring MVR6 Interface Status .........................................................................................................................578
Assigning Static MVR6 Multicast Groups to Interfaces...........................................................................................580
Displaying MVR6 Receiver Groups .........................................................................................................................582
Displaying MVR6 Statistics......................................................................................................................................583
16 IP CONFIGURATION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
Setting the Switch’s IP Address (IP Version 4)...............................................................................................................587
Setting the Switch’s IP Address (IP Version 6)...............................................................................................................590
Configuring the IPv6 Default Gateway...........................................................................................
..........................591
Configuring IPv6 Interface Settings..........................................................................................................................592
Configuring an IPv6 Address....................................................................................................................................597
Showing IPv6 Addresses...........................................................................................................................................600
Showing the IPv6 Neighbor Cache ...........................................................................................................................601
Showing IPv6 Statistics.............................................................................................................................................602
Showing the MTU for Responding Destinations ......................................................................................................608
17 IP SERVICES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611
Domain Name Service.....................................................................................................................................................611
Configuring General DNS Service Parameters ........................................................................................................611
Configuring a List of Domain Names .......................................................................................................................612
Configuring a List of Name Servers..........................................................................................................................613
Configuring Static DNS Host to Address Entries .....................................................................................................615
Displaying the DNS Cache........................................................................................................................................616
– 11 –
Dynamic Host Configuration Protocol............................................................................................................................617
Specifying a DHCP Client Identifier.........................................................................................................................617
Enabling DHCP Dynamic Provision ...............................................................................................................................620
Configuring the PPPoE Intermediate Agent....................................................................................................................621
Configuring PPPoE IA Global Settings ....................................................................................................................621
Configuring PPPoE IA Interface Settings.................................................................................................................622
Showing PPPoE IA Statistics....................................................................................................................................624
18 GENERAL IP ROUTING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
Overview..........................................................................................................................................................................627
Initial Configuration..................................................................................................................................................627
IP Routing and Switching................................................................................................................................................628
Routing Path Management........................................................................................................................................629
Routing Protocols......................................................................................................................................................629
Configuring IP Routing Interfaces...................................................................................................................................630
Configuring Local and Remote Interfaces ................................................................................................................630
Using the Ping Function............................................................................................................................................631
Using the Trace Route Function................................................................................................................................632
Address Resolution Protocol ..........................................................................................................................................634
Proxy ARP Configuration.........................................................................................................................................634
Configuring Static ARP Addresses...........................................................................................................................636
Displaying Dynamic or Local ARP Entries ..............................................................................................................637
Displaying ARP Statistics .........................................................................................................................................638
Configuring Static Routes................................................................................................................................................639
Displaying the Routing Table..........................................................................................................................................640
III COMMAND LINE INTERFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .643
19 GENERAL COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
20 SYSTEM MANAGEMENT COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653
Device Designation..........................................................................................................................................................653
System Status...................................................................................................................................................................654
Frame Size .......................................................................................................................................................................664
File Management .............................................................................................................................................................665
Line..................................................................................................................................................................................678
Event Logging..................................................................................................................................................................688
SMTP Alerts ....................................................................................................................................................................695
Time.................................................................................................................................................................................699
Time Range......................................................................................................................................................................711
Switch Clustering.............................................................................................................................................................714
21 SNMP COMMANDS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
22 REMOTE MONITORING COMMANDS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
23 AUTHENTICATION COMMANDS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
User Accounts and Privilege Levels................................................................................................................................753
Authentication Sequence .................................................................................................................................................758
RADIUS Client................................................................................................................................................................760
TACACS+ Client.............................................................................................................................................................764
AAA.................................................................................................................................................................................767
Web Server ......................................................................................................................................................................776
Telnet Server....................................................................................................................................................................780
Secure Shell .....................................................................................................................................................................782
802.1X Port Authentication.............................................................................................................................................792
Management IP Filter ......................................................................................................................................................807
– 12 –
PPPoE Intermediate Agent ..............................................................................................................................................810
24 GENERAL SECURITY MEASURES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 817
Port Security ....................................................................................................................................................................818
Network Access (MAC Address Authentication) ...........................................................................................................824
Web Authentication.........................................................................................................................................................837
DHCPv4 Snooping ..........................................................................................................................................................843
DHCPv6 Snooping ..........................................................................................................................................................854
IPv4 Source Guard...........................................................................................................................................................863
IPv6 Source Guard...........................................................................................................................................................870
ARP Inspection................................................................................................................................................................875
Denial of Service Protection............................................................................................................................................884
Port-based Traffic Segmentation .....................................................................................................................................889
25 ACCESS CONTROL LISTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 895
IPv4 ACLs .......................................................................................................................................................................895
IPv6 ACLs .......................................................................................................................................................................903
MAC ACLs......................................................................................................................................................................909
ARP ACLs.......................................................................................................................................................................916
ACL Information .............................................................................................................................................................919
26 INTERFACE COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 921
27 LINK AGGREGATION COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 951
28 POWER OVER ETHERNET COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 965
29 PORT MIRRORING COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973
Local Port Mirroring Commands.....................................................................................................................................973
RSPAN Mirroring Commands ........................................................................................................................................976
30 CONGESTION CONTROL COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 983
Rate Limit Commands.....................................................................................................................................................983
Storm Control Commands ...............................................................................................................................................984
Automatic Traffic Control Commands............................................................................................................................986
31 LOOPBACK DETECTION COMMANDS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001
32 UNIDIRECTIONAL LINK DETECTION COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007
33 ADDRESS TABLE COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1013
34 SPANNING TREE COMMANDS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1021
35 ERPS COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1049
36 VLAN COMMANDS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1079
GVRP and Bridge Extension Commands......................................................................................................................1079
Editing VLAN Groups...................................................................................................................................................1084
Configuring VLAN Interfaces.......................................................................................................................................1086
Displaying VLAN Information......................................................................................................................................1093
Configuring IEEE 802.1Q Tunneling............................................................................................................................1094
Configuring L2CP Tunneling........................................................................................................................................1100
Configuring VLAN Translation.....................................................................................................................................1104
Configuring Protocol-based VLANs .............................................................................................................................1106
Configuring IP Subnet VLANs......................................................................................................................................1110
Configuring MAC Based VLANs .................................................................................................................................1112
Configuring Voice VLANs............................................................................................................................................1114
– 13 –
37 CLASS OF SERVICE COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1121
Priority Commands (Layer 2)........................................................................................................................................1121
Priority Commands (Layer 3 and 4) ..............................................................................................................................1125
38 QUALITY OF SERVICE COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1133
39 MULTICAST FILTERING COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1151
IGMP Snooping.............................................................................................................................................................1151
Static Multicast Routing ................................................................................................................................................1173
IGMP Filtering and Throttling.......................................................................................................................................1174
MLD Snooping..............................................................................................................................................................1185
MLD Filtering and Throttling........................................................................................................................................1196
MVR for IPv4................................................................................................................................................................1204
MVR for IPv6................................................................................................................................................................1226
40 LLDP COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1245
41 CFM COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1269
42 OAM COMMANDS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1309
43 DOMAIN NAME SERVICE COMMANDS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1321
44 DHCP COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1329
DHCP Client..................................................................................................................................................................1329
DHCP Relay ..................................................................................................................................................................1337
45 IP INTERFACE COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1339
IPv4 Interface.................................................................................................................................................................1339
Basic IPv4 Configuration........................................................................................................................................1340
ARP Configuration..................................................................................................................................................1346
IPv6 Interface.................................................................................................................................................................1347
ND Snooping .................................................................................................................................................................1368
46 IP ROUTING COMMANDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1377
Global Routing Configuration.......................................................................................................................................1377
IV APPENDICES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1383
47 SOFTWARE SPECIFICATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1385
Software Features ..........................................................................................................................................................1385
Management Features....................................................................................................................................................1386
Standards........................................................................................................................................................................1387
Management Information Bases....................................................................................................................................1387
48 TROUBLESHOOTING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1389
Problems Accessing the Management Interface............................................................................................................1389
Using System Logs........................................................................................................................................................1390
49 LICENSE INFORMATION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1391
The GNU General Public License .................................................................................................................................1391
50 GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1395
51 COMMAND LIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1403
– 15 –
S
ECTION
I
GETTING STARTED
This section provides an overview of the switch, and introduces some basic
concepts about network switches. It also describes the basic settings
required to access the management interface.
This section includes these chapters:
“Introduction” on page 17
“Initial Switch Configuration” on page 27
Chapter 1: Introduction
Key Features
– 17 –
1INTRODUCTION
This switch provides a broad range of features for Layer 2 switching and
Layer 3 static routing. It includes a management agent that allows you to
configure the features listed in this manual. The default configuration can
be used for most of the features provided by this switch. However, there
are many options that you should configure to maximize the switch’s
performance for your particular network environment.
KEY FEATURES
Table 1-1: Key Features
Feature Description
Configuration Backup
and Restore
Using management station or FTP/TFTP server
Authentication Console, Telnet, web – user name/password, RADIUS, TACACS+
Port – IEEE 802.1X, MAC address filtering
SNMP v1/2c - Community strings
SNMP version 3 – MD5 or SHA password
Telnet – SSH
Web – HTTPS
General Security
Measures
AAA
ARP Inspection
DHCP Snooping (with Option 82 relay information)
DoS Protection
IP Source Guard
PPPoE Intermediate Agent
Port Authentication – IEEE 802.1X
Port Security – MAC address filtering
Traffic Segmentation - by port designation
Access Control Lists Supports up to 512 rules, 64 ACLs,
and a maximum of 32 rules for an ACL
DHCP/DHCPv6 Client
DNS Client and Proxy service
Port Configuration Speed and duplex mode and flow control
Port Trunking Supports up to 12 trunks – static or dynamic trunking (LACP)
Port Mirroring 50 sessions, one or more source ports to one analysis port
Congestion Control Rate Limiting
Throttling for broadcast, multicast, unknown unicast storms
Random Early Detection
Address Table 16K MAC addresses in the forwarding table, 1K static MAC
addresses, 256 L2 multicast groups, 32 static ARP entries,
24 static IP routes, 8 IP interfaces
IP Version 4 and 6 Supports IPv4 and IPv6 addressing, and management
IEEE 802.1D Bridge Supports dynamic data switching and addresses learning
Chapter 1: Introduction
Description of Software Features
– 18 –
DESCRIPTION OF SOFTWARE FEATURES
The switch provides a wide range of advanced performance enhancing
features. Flow control eliminates the loss of packets due to bottlenecks
caused by port saturation. Storm suppression prevents broadcast,
multicast, and unknown unicast traffic storms from engulfing the network.
Untagged (port-based), tagged, and protocol-based VLANs, plus support
for automatic GVRP VLAN registration provide traffic security and efficient
use of network bandwidth. CoS priority queueing ensures the minimum
delay for moving real-time multimedia data across the network. While
multicast filtering provides support for real-time network applications.
Some of the management features are briefly described below.
CONFIGURATION
BACKUP AND
RESTORE
You can save the current configuration settings to a file on the
management station (using the web interface) or an FTP/TFTP server
(using the web or console interface), and later download this file to restore
the switch configuration settings.
Store-and-Forward
Switching
Supported to ensure wire-speed switching while eliminating bad
frames
Spanning Tree Algorithm Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and
Multiple Spanning Trees (MSTP)
Virtual LANs Up to 4094 using IEEE 802.1Q, port-based, protocol-based,
voice VLANs, and QinQ tunnel
Traffic Prioritization Default port priority, traffic class map, queue scheduling, IP
Precedence, or Differentiated Services Code Point (DSCP)
Qualify of Service Supports Differentiated Services (DiffServ)
Link Layer Discovery
Protocol
Used to discover basic information about neighboring devices
IP Routing Supports static routing
ARP Static and dynamic address configuration, proxy ARP
Multicast Filtering Supports IGMP snooping and query, and Multicast VLAN
Registration
Switch Clustering Supports up to 36 member switches in a cluster
Connectivity Fault
Management
Connectivity monitoring using continuity check messages, fault
verification through loop back messages, and fault isolation by
examining end-to-end connections (IEEE 802.1ag)
ERPS Supports Ethernet Ring Protection Switching for increased
availability of Ethernet rings (G.8032)
Remote Device
Management
Supports Ethernet OAM functions for attached CPEs
(IEEE 802.3ah, ITU-T Y.1731)
Table 1-1: Key Features (Continued)
Feature Description
Chapter 1: Introduction
Description of Software Features
– 19 –
AUTHENTICATION This switch authenticates management access via the console port, Telnet,
or a web browser. User names and passwords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or
TACACS+). Port-based authentication is also supported via the IEEE
802.1X protocol. This protocol uses Extensible Authentication Protocol over
LANs (EAPOL) to request user credentials from the 802.1X client, and then
uses the EAP between the switch and the authentication server to verify
the client’s right to access the network via an authentication server (i.e.,
RADIUS or TACACS+ server).
Other authentication options include HTTPS for secure management access
via the web, SSH for secure management access over a Telnet-equivalent
connection, SNMP Version 3, IP address filtering for SNMP/Telnet/web
management access, MAC address filtering and IP source guard also
provide authenticated port access. While DHCP snooping is provided to
prevent malicious attacks from insecure ports. While PPPoE Intermediate
Agent supports authentication of a client for a service provider.
ACCESS CONTROL
LISTS
ACLs provide packet filtering for IP frames (based on address, protocol,
TCP/UDP port number or TCP control code) or any frames (based on MAC
address or Ethernet type). ACLs can be used to improve performance by
blocking unnecessary network traffic or to implement security controls by
restricting access to specific network resources or protocols.
PORT CONFIGURATION You can manually configure the speed, duplex mode, and flow control used
on specific ports, or use auto-negotiation to detect the connection settings
used by the attached device. Use full-duplex mode on ports whenever
possible to double the throughput of switch connections. Flow control
should also be enabled to control network traffic during periods of
congestion and prevent the loss of packets when port buffer thresholds are
exceeded. The switch supports flow control based on the IEEE 802.3x
standard (now incorporated in IEEE 802.3-2002).
RATE LIMITING This feature controls the maximum rate for traffic transmitted or received
on an interface. Rate limiting is configured on interfaces at the edge of a
network to limit traffic into or out of the network. Packets that exceed the
acceptable amount of traffic are dropped.
PORT MIRRORING The switch can unobtrusively mirror traffic from any port to a monitor port.
You can then attach a protocol analyzer or RMON probe to this port to
perform traffic analysis and verify connection integrity.
PORT TRUNKING Ports can be combined into an aggregate connection. Trunks can be
manually set up or dynamically configured using Link Aggregation Control
Protocol (LACP – IEEE 802.3-2005). The additional ports dramatically
increase the throughput across any connection, and provide redundancy by
taking over the load if a port in the trunk should fail. The switch supports
up to 12 trunks.
Chapter 1: Introduction
Description of Software Features
– 20 –
STORM CONTROL Broadcast, multicast and unknown unicast storm suppression prevents
traffic from overwhelming the network.When enabled on a port, the level of
traffic passing through the port is restricted. If traffic rises above a pre-
defined threshold, it will be throttled until the level falls back beneath the
threshold.
STATIC MAC
ADDRESSES
A static address can be assigned to a specific interface on this switch.
Static addresses are bound to the assigned interface and will not be
moved. When a static address is seen on another interface, the address will
be ignored and will not be written to the address table. Static addresses
can be used to provide network security by restricting access for a known
host to a specific port.
IP ADDRESS
FILTERING
Access to insecure ports can be controlled using DHCP Snooping which
filters ingress traffic based on static IP addresses and addresses stored in
the DHCP Snooping table. Traffic can also be restricted to specific source IP
addresses or source IP/MAC address pairs based on static entries or entries
stored in the DHCP Snooping table.
IEEE 802.1D BRIDGE The switch supports IEEE 802.1D transparent bridging. The address table
facilitates data switching by learning addresses, and then filtering or
forwarding traffic based on this information. The address table supports up
to 16K addresses.
STORE-AND-FORWARD
SWITCHING
The switch copies each frame into its memory before forwarding them to
another port. This ensures that all frames are a standard Ethernet size and
have been verified for accuracy with the cyclic redundancy check (CRC).
This prevents bad frames from entering the network and wasting
bandwidth.
To avoid dropping frames on congested ports, the switch provides 8 Mbits
for frame buffering. This buffer can queue packets awaiting transmission
on congested networks.
SPANNING TREE
ALGORITHM
The switch supports these spanning tree protocols:
Spanning Tree Protocol (STP, IEEE 802.1D) – This protocol provides
loop detection. When there are multiple physical paths between
segments, this protocol will choose a single path and disable all others
to ensure that only one route exists between any two stations on the
network. This prevents the creation of network loops. However, if the
chosen path should fail for any reason, an alternate path will be
activated to maintain the connection.
Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) – This protocol
reduces the convergence time for network topology changes to about 3
to 5 seconds, compared to 30 seconds or more for the older IEEE
802.1D STP standard. It is intended as a complete replacement for STP,
Chapter 1: Introduction
Description of Software Features
– 21 –
but can still interoperate with switches running the older standard by
automatically reconfiguring ports to STP-compliant mode if they detect
STP protocol messages from attached devices.
Multiple Spanning Tree Protocol (MSTP, IEEE 802.1s) – This protocol is
a direct extension of RSTP. It can provide an independent spanning tree
for different VLANs. It simplifies network management, provides for
even faster convergence than RSTP by limiting the size of each region,
and prevents VLAN members from being segmented from the rest of
the group (as sometimes occurs with IEEE 802.1D STP).
CONNECTIVITY FAULT
MANAGEMENT
The switch provides connectivity fault monitoring for end-to-end
connections within a designated service area by using continuity check
messages which can detect faults in maintenance points, fault verification
through loop back messages, and fault isolation with link trace messages.
VIRTUAL LANS The switch supports up to 4094 VLANs. A Virtual LAN is a collection of
network nodes that share the same collision domain regardless of their
physical location or connection point in the network. The switch supports
tagged VLANs based on the IEEE 802.1Q standard. Members of VLAN
groups can be dynamically learned via GVRP, or ports can be manually
assigned to a specific set of VLANs. This allows the switch to restrict traffic
to the VLAN groups to which a user has been assigned. By segmenting
your network into VLANs, you can:
Eliminate broadcast storms which severely degrade performance in a
flat network.
Simplify network management for node changes/moves by remotely
configuring VLAN membership for any port, rather than having to
manually change the network connection.
Provide data security by restricting all traffic to the originating VLAN,
except where a connection is explicitly defined via the switch's routing
service.
Use private VLANs to restrict traffic to pass only between data ports
and the uplink ports, thereby isolating adjacent ports within the same
VLAN, and allowing you to limit the total number of VLANs that need to
be configured.
Use protocol VLANs to restrict traffic to specified interfaces based on
protocol type.
IEEE 802.1Q
TUNNELING (QINQ)
This feature is designed for service providers carrying traffic for multiple
customers across their networks. QinQ tunneling is used to maintain
customer-specific VLAN and Layer 2 protocol configurations even when
different customers use the same internal VLAN IDs. This is accomplished
by inserting Service Provider VLAN (SPVLAN) tags into the customer’s
frames when they enter the service provider’s network, and then stripping
the tags when the frames leave the network.
Chapter 1: Introduction
Description of Software Features
– 22 –
TRAFFIC
PRIORITIZATION
This switch prioritizes each packet based on the required level of service,
using four priority queues with strict priority, Weighted Round Robin (WRR)
scheduling, or a combination of strict and weighted queuing. It uses IEEE
802.1p and 802.1Q tags to prioritize incoming traffic based on input from
the end-station application. These functions can
be used to provide
independent priorities for delay-sensitive data and best-effort data.
This switch also supports several common methods of prioritizing layer 3/4
traffic to meet application requirements. Traffic can be prioritized based on
the priority bits in the IP frame’s Type of Service (ToS) octet using DSCP, or
IP Precedence. When these services are enabled, the priorities are mapped
to a Class of Service value by the switch, and the traffic then sent to the
corresponding output queue.
IP ROUTING The switch provides Layer 3 IP static routing. To maintain a high rate of
throughput, the switch forwards all traffic passing within the same
segment, and routes only traffic that passes between different
subnetworks. The wire-speed routing provided by this switch lets you
easily link network segments or VLANs together without having to deal
with the bottlenecks or configuration hassles normally associated with
conventional routers.
Static Routing – Traffic is automatically routed between any IP interfaces
configured on the switch. Routing to statically configured hosts or subnet
addresses is provided based on next-hop entries specified in the static
routing table.
ADDRESS RESOLUTION
PROTOCOL
The switch uses ARP and Proxy ARP to convert between IP addresses and
MAC (hardware) addresses. This switch supports conventional ARP, which
locates the MAC address corresponding to a given IP address. This allows
the switch to use IP addresses for routing decisions and the corresponding
MAC addresses to forward packets from one hop to the next. Either static
or dynamic entries can be configured in the ARP cache.
Proxy ARP allows hosts that do not support routing to determine the MAC
address of a device on another network or subnet. When a host sends an
ARP request for a remote network, the switch checks to see if it has the
best route. If it does, it sends its own MAC address to the host. The host
then sends traffic for the remote destination via the switch, which uses its
own routing table to reach the destination on the other network.
QUALITY OF SERVICE Differentiated Services (DiffServ) provides policy-based management
mechanisms used for prioritizing network resources to meet the
requirements of specific traffic types on a per-hop basis. Each packet is
classified upon entry into the network based on access lists, IP Precedence
or DSCP values, or VLAN lists. Using access lists allows you select traffic
based on Layer 2, Layer 3, or Layer 4 information contained in each
packet. Based on network policies, different kinds of traffic can be marked
for different kinds of forwarding.
/