enterasys switch configuration guide

A code example follows the procedure. RSTP provides rapid connectivity following the failure of a switching device, switch port, or the addition of a switch into the network. Policy Configuration Overview Table 16-2 Policy Rule Traffic Descriptions/Classifications Traffic Classification Precedence Level Description macsource Classifies based on MAC source address. VLAN Support on Enterasys Switches the perspective of the access layerwhere users are most commonly locatedegress is generally untagged. Understanding and Configuring Loop Protect Enabling or Disabling Loop Protect Event Notifications Loop Protect traps are sent when a Loop Protect event occurs, that is, when a port goes to listening due to not receiving BPDUs. Procedure 25-7 DHCPv6 Server Configuration Step Task Command(s) 1. Configuring PoE Procedure 7-3 PoE Configuration for G-Series Devices (continued) Step Task Command(s) 7. It is auto configured with the cost of the intra-area path between the two ABRs that make up the virtuallink. Do you want to continue (y/n) [n]? Optionally, set the timeout period for aging learned MAC entries. If a downstream router has no hosts for a multicast stream, it sends a prune message to the upstream router. sFlow Table 18-3 describes how to manage remote network monitoring. Display the routing table, including static routes. These ports provide a path to the root for attached devices. System(su)->show port ratelimit fe.1.1 Global Ratelimiting status is disabled. Procedure 17-1 Step Task Command(s) 1. ICMP Enabled for echo-reply and mask-reply modes. Figure 3-2 provides an example. IRDP Disabled on all interfaces. Refer to the CLI Reference for your platform for more information about the commands listed below. Factory Default Settings Table 4-1 Default Settings for Basic Switch Operation (continued) Feature Default Setting Spanning Tree topology change trap suppression Enabled. A typical situation occurs when a host requests an IP address with no DHCP server located on that segment. Set the minimum rate (in packets per second) of transmitted packets in a sampling interval. Terms and Definitions 2. 11 Configuring Link Aggregation This chapter describes how to configure link aggregation on the fixed switch platforms. set ipsec authentication {md5 | sha1} Note: This command is not available if the security mode setting is C2. IPv6 Routing Configuration Neighbor Discovery is the IPv6 replacement for ARP. User Account Overview The emergency access user is still subject to the system lockout interval even on the console port. 4. Port 5 looks up the destination MAC address in its FID. Quality of Service Overview Figure 17-1 Is propagated through the network in the protocol packet header Assigning and Marking Traffic with a Priority The ICMP protocol, used for error messaging, has a low bandwidth requirement, with a high tolerance for delay and jitter, and is appropriate for a low priority setting. For information on the command syntax and parameters, refer to the online help or the CLL Reference for your platform. RIP is described in RFC 2453. While Enterasys Discovery Protocol and Cisco Discovery Protocol are vendor-specific protocols, LLDP is an industry standard (IEEE 802.1AB), vendor-neutral protocol. . See Table 11-2 on page 11-7 for a description of port parameters. @ # $ % ^ & * () ? Implementing VLANs building has its own internal network. Use the passive-interface command in router configuration command mode to configure an interface as passive or to set passive as the default mode of operation for all interfaces. VRRP is available only on those fixed switch platforms that support advanced routing and on which an advanced feature license has been enabled. If Router R1 should become unavailable, Router R2 would take over virtual router VRID 1 and its associated IP addresses. The following example configures DHCP snooping and dynamic ARP inspection in a routing environment using RIP. First, the module is verified as present in Slot 2, and the port status is shown as operating as a 1000BASE-SX port. Display the MAC addresses in the switchs filtering database (FID). The following port administrative states are set by default: lacpactive - Transmitting LACP PDUs is enabled. The RP de-encapsulates each register message and sends the resulting multicast packet down the shared tree. show ipsec 2. (Telnet client is enabled by default.) Reviewing SNMP Settings Reviewing SNMP Settings Table 12-5 Commands to Review SNMP Settings Task Command Display SNMPv1/SNMPv2c community names and status. 8 Port Configuration This chapter describes the basic port parameters and how to configure them. Managing Switch Configuration and Files Images: ================================================================== Filename: b5-series_06.42.03.0001 Version: 06.42.03.0001 Size: 6856704 (bytes) Date: Tue Dec 14 14:12:21 2010 CheckSum: 043637a2fb61d8303273e16050308927 Compatibility: B5G124-24, B5G124-24P2, B5G124-48, B5G124-48P2, B5K125-24 B5K125-24P2, B5K125-48, B5K125-48P2 Filename: b5-series_06.61.01.0032 (Active) (Boot) Version: 06.61.01. Counter samples may be taken opportunistically in order to fill these datagrams. Configuring Policy Table 16-5 on page 16-11 describes how to display policy information and statistics. If you want to change the default timeout value for a specific server or all servers, you must enter the set tacacs server command using the timeout parameter. Routing Interfaces Example The following example shows how to enable RIP on the switch, then configure VLAN 1 with IP address 192.168.63.1 255.255.255.0 as a routing interface and enable RIP on the interface. show tacacs session {authorization | accounting} [state] Displays only the current status for TACACS+ per-command authorization and accounting. Use the following commands to review, re-enable, and reset the Spanning Tree mode. set dhcpsnooping trust port port-string enable 4. The trap indicates port, SID and loop protection status. OSPF adjacencies can not be formed on a passive interface. A6500-RC EMERSON16-Channel Output Relay, EMERSON, ACS880 frame size R8i inverter modules can be connected to the drive DC bus through a disconnector (or fuse-switch). The switch can enforce a password aging interval on a per-user basis (set system login aging). 1.2 PC ge. Enable ARP inspection on the VLANs where clients are connected, and optionally, enable logging of invalid ARP packets. show rmon event set rmon event properties set rmon event status clear rmon event Filter Allows packets to be matched by a filter definition. With LACP, if a set of links can aggregate, they will aggregate. Configuring Authentication Authentication Required Authentication methods are active on the port, based on the global and per port authentication method configured. Managing Switch Configuration and Files Caution: If you do not follow the steps above, you may lose remote connectivity to the switch. After the stack has been configured, you can use the show switch unit command to physically identify each unit. If so, this door is tagged or bound to the notification entry. - Time out the IGMP entry by not responding to further queries from Router 2. Configure PoE parameters on ports to which PDs are attached. 4. Frames will egress as tagged. Image Version Length0x8 Image Version Bytes.0x30 0x2e 0x35 0x2e 0x30 0x2e 0x34 (x.xx.xx) The following secondary header is in the image: CRC.. 2 Configuring Switches in a Stack This chapter provides information about configuring Enterasys switches in a stack. Display the current IPsec settings. Using the viewnames assigned in Step 1, create restricted views for v1/v2c users, and unrestricted views for v3 users. To enable an interface, including VLAN, tunnel, and loopback interfaces, for IPv6 routing, in router interface configuration mode: Use the ipv6 address command to configure a global IPv6 address on an interface. Table 15-8 Commands for Monitoring MSTP Task Command Verify that MSTP is running on the device. Refer to the CLI Reference for your platform for command details. Table 8-6 show snmp access Output Details, Overview: Single, Rapid, and Multiple Spanning Tree Protocols, Tabl e 91showsadetailedexplanationofcommandoutput. Configuring DVMRP System(su)->router(Config-if(Vlan 1))#exit System(su)->router(Config)#interface vlan 2 System(su)->router(Config-if(Vlan 2))#ip igmp enable System(su)->router(Config-if(Vlan 2))#exit IGMP Display Commands Table 19-5 lists Layer 2 IGMP show commands for Enterasys stackable and standalone devices. Figure 10-4 provides an overview of the fixed switch authentication configuration. 2600, and 2503). Packet flow sampling and counter sampling are designed as part of an integrated system. Figure 23-3 Multi-Backup VRRP Configuration Example 172.111.0.0/18 Default Gateway 172.111.1.1 ge.1.1 VLAN 111 172.111.1.1/16 172.111.128.0/18 Default Gateway 172.111.1.150 172.111.64.0/18 Default Gateway 172.111.1.50 VRID 1 172.111.1.1 VRID 2 172.111.1.50 VRID 3 172.111.1.150 Router R1 ge.1.1 VLAN 111 172.111.1.2/16 Router R2 ge.1.2 172.200.2. Configuring Authentication Server identification provides for the configuration of the server IP address and index value. Refer to page Syslog Operation By default, Syslog is operational on Enterasys switch devices at startup. Collaboration with Enterprise/SP/Telco Client's IT architects for high level infra design and. In this way, VACM allows you to permit or deny access to any individual item of management information depending on a user's group membership and the level of security provided by the communications channel. set igmpsnooping adminmode {enable | disable} Enable or disable IGMP on one or all ports. Refer to Getting Help Getting Help For additional support, contact Enterasys Networks using one of the following methods: World Wide Web www.enterasys.com/support Phone 1-800-872-8440 (toll-free in U.S. and Canada) or 1-978-684-1000 To find the Enterasys Networks Support toll-free number in your country: www.enterasys.com/support Email support@enterasys.com To expedite your message, type [switching] in the subject line. Table 14-7 show sntp Output Details, Table 15-1 RMON Monitoring Group Functions and Commands (Continued), Table 18-1 Enabling the Switch for Routing, Table 18-2 Router CLI Configuration Modes. 2. This enables you to set the IP address and system password using a single console port. Port Traffic Rate Limiting When a CoS is configured with an inbound rate limiter (IRL), and that IRL CoS is configured as part of a policy profile using the set policy profile command, CoS-based inbound rate limiting will take precedence over port rate limits set with set port ratelimit. Configuring RIP Table 21-1 Routing Protocol Route Preferences Route Source Default Distance Connected 0 Static 1 OSPF (Requires support for advanced routing features on the switch) 110 RIP 120 Also in router configuration mode, you can disable automatic route summarization with the no auto-summary command. Using Multicast in Your Network Table 19-1 PIM-SM Message Types (continued) Message Type Description Join/Prune (J/P) These messages contain information on group membership received from downstream routers. Any router with a priority of 0 will opt out of the DR election process. set system lockout emergency-access username 5. installation and programing guide and user manuals. Refer to RFC 1157 for a full description of functionality. Diffserv Disabled. Quality of Service Overview Additional port groups, up to eight (0 through 7) total, may be created by changing the port group value. When a root or alternate port loses its path to the root bridge, due to message age expiration, it takes on the role of designated port and will not forward traffic until a BPDU is received. OSPFv2 is available only on those fixed switch platforms that support advanced routing and on which an advanced feature license has been enabled. Packet flow sampling will cause a steady, but random, stream of sFlow datagrams to be sent to the sFlow Collector. If you need to use multiple license keys on members of a stack, use the optional unit number parameter with the set license command. The order in which servers are queried is based on a precedence value optionally specified when you configure the server. Tabl e 2510providesanexplanationofthecommandoutput. Neighbor virtual link routers must have the same password. (Not applicable for super user accounts.) User Account Overview Procedure 5-2 on page 5-4 shows how a super-user creates a new super-user account and assigns it as the emergency access account. Using Multicast in Your Network Figure 19-4 PIM Traffic Flow 7 3 1 DR RP Source 5 4 2 6 Last Hop Router Receiver 1. Refer to page ACL Configuration Overview Inserting a new ACL rule entry into an ACL Moving an ACL rule to a new location in an ACL Apply the ACL to VLAN interfaces, to ports, or to Link Aggregation ports. The sources DR registers (that is, encapsulates) and sends multicast data from the source directly to the RP via a unicast routing protocol (number 1 in figure). Determines the prune lifetime. Access Control Lists on the A4 A4(su)->router(Config)#access-list mac mymac permit 00:01:00:02:00:01 any assignqueue 2 A4(su)->router(Config)#show access-lists mymac mymac MAC access-list 1: deny 00-E0-ED-1D-90-D5 any 2: permit 00:01:00:02:00:01 any assign-queue 2 A4(su)->router(Config)#access-list interface mymac fe.1.2 in A4(su)->router(Config)#show access-lists interface fe.1.2 24-14 Port-string Access-list ----------- ----------- fe.1. If authentication is not specified, no authentication will be applied. Stackable Switches Configuration Guide Firmware Version 1.1.xx P/N 9034314-05. i Notice Enterasys Networks reserves the right to make changes in specifications and other information contained in this document and its web site without prior notice. ThisexampleshowshowtodisplaystatisticsforVLAN80. Switch# Switch#conf t Switch (config)#ip default-gateway {ip address} and set passwords. Procedure 5-1 Creating a New Read-Write or Read-Only User Account Step Task Command(s) 1. 3. Optionally, disable clearing of dynamic MAC addresses on link change. Configuring DVMRP Basic DVMRP Configuration By default, DVMRP is disabled globally and on each interface. Determines if the keys for trap doors do exist. Tabl e 147providesanexplanationofthecommandoutput. Router: Calls the readers attention to router-specific commands and information. Then, it looks to see if the tag list (v3TrapTag) specified in the notification entry exists. Operation and Maintenance of layer 2 switch (cisco and extreme), configuration, backup and replacement. The client queries these configured SNTP servers at a fixed poll-interval configured using the set sntp poll-interval command. Enabling DVMRP globally on the device and on the VLANs. Guest networking allows an administrator to specify a set of credentials that will, by default, appear on the PWA login page of an end station when a user attempts to access the network. Note: OSPF is an advanced routing feature that must be enabled with a license key. Creates a CoS setting of index 55. Select none to allow all frames to pass through. If the address is a multicast or link-local address, then you must also specify the interface to be used to contact the DHCPv6 server. enterasys handles ingress and egress separately. By default, RIP version 2 supports automatic route summarization, which summarizes sub-prefixes to the classful network boundary when crossing network boundaries. set inlinepower detectionmode {auto | ieee} auto (default) The Enterasys device first uses the IEEE 802.3af/at standards resistorbased detection method. P/N 9034314-07 Notice Enterasys Networks reserves the right to make changes in specifications and other information contained in this document and its web site without prior notice. RPs provide a place for receivers and senders to meet. User Authentication Overview When the maptable response is set to tunnel mode, the system will use the tunnel attributes in the RADIUS reply to apply a VLAN to the authenticating user and will ignore any Filter-ID attributes in the RADIUS reply. show snmp engineid Display SNMP group information. sFlow Using sFlow in Your Network The advantages of using sFlow include: sFlow makes it possible to monitor ports of a switch, with no impact on the distributed switching performance. For PIM, you must also configure a unicast routing protocol, such as OSPF. Usethiscommandtodisplaythesystemshardwareconfiguration. System contact Set to empty string. Configuration Guide. Configuring the underlying unicast routing protocol (for example, OSPF). Premium Edge The S-Series Edge Switch will be rate-limited using a configured CoS that is applied to the services and phoneES policy role. Thefollowingtabledescribestheoutputofthiscommand. Configuring Node Aliases 4-28 System Configuration. IP packets are not encapsulated in any further protocol headers as they transit the Autonomous System (AS). If the port is configured so that it is connected to a switching device known to implement Loop Protect, it uses full functional (enhanced) mode. Configuring MSTP Figure 15-14 Maximum Bandwidth in an MSTP Network Configuration Bridge A Bridge B SID 86 Priority = 4096 SID 99 Priority = 32768 SID 86 Priority = 32768 SID 99 Priority = 4096 ge.1.3 ge.1.1 ge.1.3 ge.1.2 ge.1.1 ge.1.1 ge.1.2 ge.1.2 ge.1.2 ge.1. Licensing Advanced Features Node-Locked Licensing On the C3, B3, and G3 platforms, licenses are locked to the serial number of the switch to which the license applies. IPv6 Routing Configuration Router R2 R2(su)->router R2(su)->router>enable R2su)->router#configure Enter configuration commands: R2(su)->router(Config)#interface vlan 20 R2(su)->router(Config-if(Vlan 20))#ip address 195.167.20.1 255.255.255.0 R2(su)->router(Config-if(Vlan 20))#no shutdown R2(su)->router(Config-if(Vlan 20))#exit R2(su)->router(Config)#interface tunnel 10 R2(su)->router(Config-if(Tnnl 101))#ipv6 address 2001:db8:111:1::20/127 R2(su)->router(Config-if(Tnnl 101))#tunnel source 195.167.20. Link Aggregation Configuration Example The output algorithm defaults to selecting the output port based upon the destination and source IP address. Provides guest access to a limited number of the edge switch ports to be used specifically for internet only access. ThisexampleshowshowtodisplaythesystemIPaddressandsubnetmask: Thefollowingtableprovidesanexplanationofthecommandoutput. User Account Overview Procedure 5-2 Configuring a New Super-User / Emergency Access User Account Step Task Command(s) 4. Configuring SNMP Procedure 12-2 SNMPv3 Configuration (continued) Step Task Command(s) 6. Thisexampleshowshowtodisplaythelinkflapmetricstable: Table 7-4 show linkflap parameters Output Details, Table 7-5 show linkflap metrics Output Details, Using SNMP Contexts to Access Specific MIBs. Table 11-2 show policy rule Output Details. Refer to the CLI Reference for your switch model for more information about each command. In router configuration mode, optionally disable automatic route summarization (necessary for enabling CIDR). You can use the following commands to review and, if necessary, change the edge port detection status on the device and the edge port status of Spanning Tree ports. Refer to page Policy Configuration Overview Identifying and restricting routing to legitimate routing IP addresses to prevent DoS, spoofing, data integrity and other routing related security issues. Configuring Authentication Table 10-1 Default Authentication Parameters (continued) Parameter Description Default Value realm Specifies authentication server configuration scope. Configuration parameters and stacking information can also be cleared on the master unit only by selecting the restore configuration to factory defaults option from the boot menu on switch startup. Enterasys devices allow up to 8 server IP addresses to be configured as destinations for Syslog messages. Considerations About Using clear config in a Stack 4. 1518 capture loadsize The RMON capture maximum number of cotets from each packet to be downloaded from the buffer. Optionally, enable single port LAGs on the device. Enterasys Networks, Inc. Firmware License Agreement BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. Configuring DVMRP System1(su)->router#configure Enter configuration commands: System1(su)->router(Config)#ip igmp System1(su)->router(Config)#ip dvmrp System1(su)->router(Config)#interface vlan 1 System1(su)->router(Config-if(Vlan 1))#ip address 192.0.1.2 255.255.255. For ports where no authentication is present, such as switch to switch, or switch to router connections, you should also set MultiAuth port mode to force authenticate to assure that traffic is not blocked by a failed authentication. Link Aggregation Configuration Example Table 11-4 Managing Link Aggregation (continued) Task Command Reset the maximum number of LACP groups to the default of 6. clear lacp groups If the number of LACP groups has been changed from the default, executing this command will result in a system reset and LACP configuration settings will be returned to their default values, including the group limit. Configuring Authentication Table 10-1 Default Authentication Parameters (continued) Parameter Description Default Value macauthentication Globally enables or disables MAC authentication on a device. 2. set port discard port-string {tagged | untagged | none | both} 8. Configuring SNMP Procedure 12-4 Configuring Secure Community Names Step Task Command(s) 1. In this sense, QoS is the third step in a three step process. Display the access entity index values. Router R1 Router 1(su)->router(Config)#interface vlan 111 Router 1(su)->router(Config-if(Vlan 111))#ip address 172.111.1.1 255.255.255. On all switching devices, the default Spanning Tree version is set to MSTP (802.1s) mode. 4. set multiauth mode strict 2. DHCP Snooping into the software forwarding path, where it may be processed by the DHCP relay agent, the local DHCP server, or forwarded as an IP packet. Hardware Installation Guide. STP Operation STP Operation Enterasys switch devices support the Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP), and Multiple Spanning Tree Protocol (MSTP) as defined in the following standards and described in IEEE 802.1Q: IEEE 802.1D (Spanning Tree Protocol) IEEE 802.1w (Rapid Spanning Tree Protocol) IEEE 802.1s (Multiple Spanning Tree Protocol) IEEE 802.1t (Update to 802.

Was Sidney Loving Richard's Son, Does Anthony Zerbe Have A Glass Eye, Articles E

enterasys switch configuration guide

enterasys switch configuration guide Leave a Comment