LevelOne GEP-5070 User Manual

Browse online or download User Manual for Network switches LevelOne GEP-5070. LevelOne GEP-5070

  • Download
  • Add to my manuals
  • Print
  • Page
    / 318
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - GEP-5070

GEP-5070 48 GE PoE-Plus + 2 GE SFP L2 Managed Switch User Manual V1.0

Page 2

CONTENTS– 10 –Configuring Local Port Mirroring 207Configuring Remote Port Mirroring 208Configuring UPnP 213Configuring sFlow 2145MONITORING THE

Page 3

CHAPTER 4 | Configuring the SwitchConfiguring Security– 100 –matches this entry when ARP/RARP protocol address space setting is equal to IP (0x800

Page 4

CHAPTER 4 | Configuring the SwitchConfiguring Security– 101 –ACE CONFIGURATIONIngress Port and Frame Type◆ Ingress Port - Any port, port identifie

Page 5 - ABOUT THIS GUIDE

CHAPTER 4 | Configuring the SwitchConfiguring Security– 102 –RARP opcode set to ARP, RARP - frame must have ARP/RARP opcode set to RARP, Other - f

Page 6

CHAPTER 4 | Configuring the SwitchConfiguring Security– 103 –RARP frames where the PRO is equal to IP (0x800) must match this entry; Default: Any)

Page 7 - CONTENTS

CHAPTER 4 | Configuring the SwitchConfiguring Security– 104 – TCP SYN - Specifies the TCP “Synchronize sequence numbers” (SYN) value for this rule

Page 8

CHAPTER 4 | Configuring the SwitchConfiguring Security– 105 – DIP Filter - Specifies the destination IP filter for this rule. (Options: Any - no d

Page 9

CHAPTER 4 | Configuring the SwitchConfiguring Security– 106 –WEB INTERFACETo configure an Access Control List for a port or a policy:1. Click Adva

Page 10 - 5MONITORING THE SWITCH 219

CHAPTER 4 | Configuring the SwitchConfiguring Security– 107 –CONFIGURING DHCPSNOOPINGUse the DHCP Snooping Configuration page to filter IP traffic

Page 11 - – 11 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 108 – If the DHCP packet is not a recognizable type, it is dropped. If a DHCP packet from

Page 12 - SECTION III APPENDICES 293

CHAPTER 4 | Configuring the SwitchConfiguring Security– 109 –Figure 35: DHCP Snooping ConfigurationCONFIGURING DHCPRELAY AND OPTION 82INFORMATION

Page 13 - – 13 –

CONTENTS– 11 –Displaying Information on LACP 252Displaying an Overview of LACP Groups 252Displaying LACP Port Status 252Displaying LACP Port Stat

Page 14 - – 14 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 110 –PARAMETERSThese parameters are displayed: ◆ Relay Mode - Enables or disables the DHCP

Page 15 - – 15 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 111 –CONFIGURING IPSOURCE GUARDIP Source Guard is a security feature that filters IP traff

Page 16 - – 16 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 112 –PARAMETERSThese parameters are displayed: Global Configuration ◆ Mode – Enables or di

Page 17 - – 17 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 113 –Figure 37: Configuring Global and Port-based Settings for IP Source GuardCONFIGURING

Page 18 - – 18 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 114 –◆ IP Address – A valid unicast IP address, including classful types A, B or C.◆ IP Ma

Page 19 - – 19 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 115 –◆ By default, ARP Inspection is disabled both globally and on all ports. If ARP Inspe

Page 20 - – 20 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 116 –◆ Mode – Enables Dynamic ARP Inspection on a given port. Only when both Global Mode a

Page 21 - GETTING STARTED

CHAPTER 4 | Configuring the SwitchConfiguring Security– 117 –◆ MAC Address – Allowed source MAC address in ARP request packets.◆ IP Address – Allo

Page 22 -

CHAPTER 4 | Configuring the SwitchConfiguring Security– 118 –◆ Dead Time – The time after which the switch considers an authentication server to b

Page 23 - 1 INTRODUCTION

CHAPTER 4 | Configuring the SwitchCreating Trunk Groups– 119 –Figure 41: Authentication ConfigurationCREATING TRUNK GROUPS You can create multipl

Page 24 - BACKUP AND

CONTENTS– 12 –Running Cable Diagnostics 2857PERFORMING SYSTEM MAINTENANCE 287Restarting the Switch 287Restoring Factory Defaults 288Upgrading Fir

Page 25 -

CHAPTER 4 | Configuring the SwitchCreating Trunk Groups– 120 –USAGE GUIDELINESBesides balancing the load across each port in the trunk, the other

Page 26 - ALGORITHM

CHAPTER 4 | Configuring the SwitchCreating Trunk Groups– 121 –needs to ensure that frames in each “conversation” are mapped to the same trunk link

Page 27 - PRIORITIZATION

CHAPTER 4 | Configuring the SwitchCreating Trunk Groups– 122 –Aggregation Group Configuration◆ Group ID – Trunk identifier.◆ Port Members – Port i

Page 28 - Table 2: System Defaults

CHAPTER 4 | Configuring the SwitchCreating Trunk Groups– 123 –CONFIGURING LACP Use the LACP Port Configuration page to enable LACP on selected por

Page 29

CHAPTER 4 | Configuring the SwitchCreating Trunk Groups– 124 –Select the Specific option to manually configure a key. Use the Auto selection to au

Page 30

CHAPTER 4 | Configuring the SwitchConfiguring Loop Protection– 125 –Figure 43: LACP Port ConfigurationCONFIGURING LOOP PROTECTIONUse the Loop Pro

Page 31 - INITIAL SWITCH CONFIGURATION

CHAPTER 4 | Configuring the SwitchConfiguring Loop Protection– 126 –When the loop protection mode is changed, any ports placed in shutdown state b

Page 32 - – 32 –

CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 127 –CONFIGURING THE SPANNING TREE ALGORITHMThe Spanning Tree Algorithm

Page 33 - WEB CONFIGURATION

CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 128 –MSTP – When using STP or RSTP, it may be difficult to maintain a s

Page 34 -

CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 129 –running spanning tree algorithm between switches that support the

Page 35 - 3 USING THE WEB INTERFACE

– 13 –FIGURESFigure 1: Home Page 35Figure 2: Front Panel Indicators 36Figure 3: System Information Configuration 45Figure 4: IP Configuration 47Figu

Page 36

CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 130 –configuration, allowing them to participate in a specific set of s

Page 37 -

CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 131 –from among the device ports attached to the network. (Note that re

Page 38

CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 132 –WEB INTERFACETo configure global settings for STA:1. Click Configu

Page 39

CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 133 –To use multiple spanning trees:1. Set the spanning tree type to MS

Page 40

CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 134 –Figure 49: Adding a VLAN to an MST InstanceCONFIGURINGSPANNING TR

Page 41

CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 135 –WEB INTERFACETo add VLAN groups to an MSTP instance:1. Click Confi

Page 42

CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 136 –spanning tree. As implemented on this switch, BPDU transparency al

Page 43

CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 137 –highest priority, the port with lowest numeric identifier will be

Page 44

CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 138 –◆ Point-to-Point – The link type attached to an interface can be s

Page 45 - 4 CONFIGURING THE SWITCH

CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 139 –PARAMETERSThese parameters are displayed: ◆ Port – Port identifier

Page 46 - ETTING AN IPV4

FIGURES– 14 –Figure 32: ACL Port Configuration 98Figure 33: ACL Rate Limiter Configuration 99Figure 34: Access Control List Configuration 106Figure

Page 47 - Figure 4: IP Configuration

CHAPTER 4 | Configuring the SwitchMulticast VLAN Registration– 140 –MULTICAST VLAN REGISTRATIONMulticast VLAN Registration (MVR) is a protocol tha

Page 48 - SETTING AN IPV6

CHAPTER 4 | Configuring the SwitchMulticast VLAN Registration– 141 –2. Set the interfaces that will join the MVR as source ports or receiver ports

Page 49

CHAPTER 4 | Configuring the SwitchMulticast VLAN Registration– 142 –port from multicast group membership. (Range: 0 to 31,744 tenths of a second;

Page 50 - Figure 6: NTP Configuration

CHAPTER 4 | Configuring the SwitchMulticast VLAN Registration– 143 –switch can only remove the interface from the multicast stream after the host

Page 51 - UTC and

CHAPTER 4 | Configuring the SwitchMulticast VLAN Registration– 144 –◆ Static bindings should only be used to receive long-term multicast streams a

Page 52 - 4. Click Save

CHAPTER 4 | Configuring the SwitchIGMP Snooping– 145 –Figure 55: Configuring MVR Channel SettingsIGMP SNOOPINGMulticasting is used to support rea

Page 53

CHAPTER 4 | Configuring the SwitchIGMP Snooping– 146 –passing between multicast clients and servers, and dynamically configure the switch ports wh

Page 54 - DLE QUEUE CIRCUITS

CHAPTER 4 | Configuring the SwitchIGMP Snooping– 147 –specific source. For IGMPv1/v2 hosts, the source address of a channel is always null (indica

Page 55 - CONFIGURING PORT CONNECTIONS

CHAPTER 4 | Configuring the SwitchIGMP Snooping– 148 –If IGMP snooping cannot locate the IGMP querier, you can manually designate a port which is

Page 56 - Configuring Port Connections

CHAPTER 4 | Configuring the SwitchIGMP Snooping– 149 –WEB INTERFACETo configure global and port-related settings for IGMP Snooping:1. Click Config

Page 57

FIGURES– 15 –Figure 68: Port Isolation Configuration 177Figure 69: Configuring MAC-Based VLANs 178Figure 70: Configuring Protocol VLANs 180Figure 71

Page 58 - ONFIGURING USER

CHAPTER 4 | Configuring the SwitchIGMP Snooping– 150 –elected “querier” and assumes the role of querying the LAN for group members. It then propag

Page 59 - 2. Click “Add new user.”

CHAPTER 4 | Configuring the SwitchIGMP Snooping– 151 –This attribute will take effect only if IGMP snooping proxy reporting is enabled (see page 1

Page 60 - PRIVILEGE LEVELS

CHAPTER 4 | Configuring the SwitchMLD Snooping– 152 –WEB INTERFACETo configure IGMP Snooping Port Group Filtering:1. Click Configuration, IGMP Sno

Page 61 - MANAGEMENT ACCESS

CHAPTER 4 | Configuring the SwitchMLD Snooping– 153 –Multicast routers use information from MLD snooping and query reports, along with a multicast

Page 62 - USAGE GUIDELINES

CHAPTER 4 | Configuring the SwitchMLD Snooping– 154 –The leave-proxy feature does not function when a switch is set as the querier. When the switc

Page 63

CHAPTER 4 | Configuring the SwitchMLD Snooping– 155 –enabled on an interface if it is connected to only one MLD-enabled device, either a service h

Page 64 - Figure 16: SSH Configuration

CHAPTER 4 | Configuring the SwitchMLD Snooping– 156 –◆ Snooping Enabled - When enabled, the switch will monitor network traffic on the indicated V

Page 65

CHAPTER 4 | Configuring the SwitchMLD Snooping– 157 –◆ QRI - The Query Response Interval is the Max Response Time advertised in periodic General Q

Page 66 - ADDRESSES FOR

CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 158 –CONFIGURING MLDFILTERINGUse the MLD Snooping Port Group Filtering Configurat

Page 67 - PROTOCOL

CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 159 –LLDP also defines how to store and maintain information gathered about the n

Page 68

FIGURES– 16 –Figure 104: QoS Control List Status 226Figure 105: Detailed Port Statistics 228Figure 106: Access Management Statistics 229Figure 107:

Page 69

CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 160 –◆ Mode – Enables LLDP message transmit and receive modes for LLDP Protocol D

Page 70

CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 161 –The management address TLV may also include information about the specific i

Page 71

CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 162 –CONFIGURINGLLDP-MED TLVSUse the LLDP-MED Configuration page to set the devic

Page 72

CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 163 –Coordinates Location◆ Latitude – Normalized to within 0-90 degrees with a ma

Page 73 - CONFIGURING SNMPV3 USERS

CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 164 – Trailing street suffix - Trailing street suffix. (Example: SW) Street suffi

Page 74 - ONFIGURING SNMPV3 GROUPS

CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 165 –This network policy is potentially advertised and associated with multiple s

Page 75 - ONFIGURING SNMPV3 VIEWS

CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 166 –endpoints frequently does not support multiple VLANs, if at all, and are typ

Page 76

CHAPTER 4 | Configuring the SwitchPower over Ethernet– 167 –WEB INTERFACETo configure LLDP-MED TLVs:1. Click Configuration, LLDP-MED.2. Modify any

Page 77

CHAPTER 4 | Configuring the SwitchPower over Ethernet– 168 –on the amount of cables attached to each device. Once configured to supply power, an a

Page 78

CHAPTER 4 | Configuring the SwitchPower over Ethernet– 169 –and reserves power accordingly. Four different port classes exist, including 4, 7, 15.

Page 79

FIGURES– 17 –Figure 140: LLDP-MED Neighbor Information 271Figure 141: LLDP Neighbor PoE Information 272Figure 142: LLDP Neighbor EEE Information 273

Page 80 - CONFIGURING RMON ALARMS

CHAPTER 4 | Configuring the SwitchConfiguring the MAC Address Table– 170 –◆ Maximum Power - The maximum power that can be delivered to a remote de

Page 81

CHAPTER 4 | Configuring the SwitchConfiguring the MAC Address Table– 171 –PARAMETERSThese parameters are displayed: Aging Configuration ◆ Disable

Page 82 - CONFIGURING RMON EVENTS

CHAPTER 4 | Configuring the SwitchIEEE 802.1Q VLANs– 172 –4. Add any required static MAC addresses by clicking the Add New Static Entry button, en

Page 83 - IMIT CONTROLS

CHAPTER 4 | Configuring the SwitchIEEE 802.1Q VLANs– 173 –◆ End stations can belong to multiple VLANs◆ Passing traffic between VLAN-aware and VLAN

Page 84

CHAPTER 4 | Configuring the SwitchIEEE 802.1Q VLANs– 174 –WEB INTERFACETo configure IEEE 802.1Q VLAN groups:1. Click Configuration, VLANs, VLAN Me

Page 85 - ACCESS SERVERS

CHAPTER 4 | Configuring the SwitchIEEE 802.1Q VLANs– 175 –◆ Port Type – Configures how a port processes the VLAN ID in ingress frames. (Default: U

Page 86

CHAPTER 4 | Configuring the SwitchIEEE 802.1Q VLANs– 176 –are classified to the Port VLAN ID. If the classified VLAN ID of a frame transmitted on

Page 87

CHAPTER 4 | Configuring the SwitchUsing Port Isolation– 177 –USING PORT ISOLATIONUse the Port Isolation Configuration page to prevent communicatio

Page 88

CHAPTER 4 | Configuring the SwitchConfiguring MAC-based VLANs– 178 –COMMAND USAGE◆ Source MAC addresses can be mapped to only one VLAN ID.◆ Config

Page 89

CHAPTER 4 | Configuring the SwitchProtocol VLANs– 179 –PROTOCOL VLANS The network devices required to support multiple protocols cannot be easily

Page 90

FIGURES– 18 –

Page 91

CHAPTER 4 | Configuring the SwitchProtocol VLANs– 180 –LLC – Includes the DSAP (Destination Service Access Point) and SSAP (Source Service Access

Page 92

CHAPTER 4 | Configuring the SwitchProtocol VLANs– 181 –MAPPING PROTOCOLGROUPS TO PORTSUse the Group Name to VLAN Mapping Table to map a protocol g

Page 93

CHAPTER 4 | Configuring the SwitchConfiguring IP Subnet-based VLANs– 182 –Figure 71: Assigning Ports to Protocol VLANsCONFIGURING IP SUBNET-BASED

Page 94

CHAPTER 4 | Configuring the SwitchManaging VoIP Traffic– 183 –◆ IP Address – The IP address for a subnet. Valid IP addresses consist of four decim

Page 95

CHAPTER 4 | Configuring the SwitchManaging VoIP Traffic– 184 –CONFIGURING VOIPTRAFFICUse the Voice VLAN Configuration page to configure the switch

Page 96 - CONTROL LISTS

CHAPTER 4 | Configuring the SwitchManaging VoIP Traffic– 185 –When OUI is selected, be sure to configure the MAC address ranges in the Telephony O

Page 97

CHAPTER 4 | Configuring the SwitchManaging VoIP Traffic– 186 –Figure 73: Configuring Global and Port Settings for a Voice VLANCONFIGURINGTELEPHON

Page 98 - ONFIGURING RATE LIMITERS

CHAPTER 4 | Configuring the SwitchQuality of Service– 187 –3. Enter a MAC address that specifies the OUI for VoIP devices in the network, and ente

Page 99

CHAPTER 4 | Configuring the SwitchQuality of Service– 188 –CONFIGURING PORTCLASSIFICATIONUse the QoS Ingress Port Classification page to set the b

Page 100 - PARAMETERS

CHAPTER 4 | Configuring the SwitchQuality of Service– 189 –verify conformity. Non-conforming traffic is dropped, conforming traffic is forwarded w

Page 101 - ACE CONFIGURATION

– 19 –TABLESTable 1: Key Features 23Table 2: System Defaults 28Table 3: Web Page Configuration Buttons 36Table 4: Main Menu 36Table 5: HTTPS Sys

Page 102 - Configuring Security

CHAPTER 4 | Configuring the SwitchQuality of Service– 190 –PARAMETERSThese parameters are displayed: Displaying QoS Egress Port Schedulers◆ Port –

Page 103

CHAPTER 4 | Configuring the SwitchQuality of Service– 191 –◆ Port Shaper – Sets the rate at which traffic can egress this queue. Enable – Enables

Page 104

CHAPTER 4 | Configuring the SwitchQuality of Service– 192 –Figure 78: Configuring Egress Port Schedulers and ShapersCONFIGURING EGRESSPORT SHAPER

Page 105

CHAPTER 4 | Configuring the SwitchQuality of Service– 193 –WEB INTERFACETo show an overview of the rate for each queue and port: 1. Click Advanced

Page 106

CHAPTER 4 | Configuring the SwitchQuality of Service– 194 – Mapped – Controls the mapping of the classified QoS class values and DP levels (drop p

Page 107 - SNOOPING

CHAPTER 4 | Configuring the SwitchQuality of Service– 195 –Figure 81: Configuring Port Tag Remarking ModeCONFIGURING PORTDSCP TRANSLATIONAND REWR

Page 108 - 3. Click Apply

CHAPTER 4 | Configuring the SwitchQuality of Service– 196 – Disable – No Ingress DSCP Classification is performed. DSCP=0 – Classify if incoming D

Page 109 - INFORMATION

CHAPTER 4 | Configuring the SwitchQuality of Service– 197 –PATH Advanced Configuration, QoS, DSCP-Based QoS PARAMETERSThese parameters are display

Page 110 - 3. Click Save

CHAPTER 4 | Configuring the SwitchQuality of Service– 198 –CONFIGURING DSCPTRANSLATIONUse the DSCP Translation page to configure DSCP translation

Page 111 - SOURCE GUARD

CHAPTER 4 | Configuring the SwitchQuality of Service– 199 –CONFIGURING DSCPCLASSIFICATIONUse the DSCP Classification page to map DSCP values to a

Page 114 - NSPECTION

CHAPTER 4 | Configuring the SwitchQuality of Service– 200 –PARAMETERSThese parameters are displayed: QoS Control List ◆ QCE – Quality Control Entr

Page 115

CHAPTER 4 | Configuring the SwitchQuality of Service– 201 –Key Parameters◆ Tag – VLAN tag type. (Options: Any, Tag, Untag; Default: Any)◆ VID – VL

Page 116

CHAPTER 4 | Configuring the SwitchQuality of Service– 202 –other than 00-00-00, then valid value of the PID will be any value from 0x0000 to 0xfff

Page 117 - AUTHENTICATION

CHAPTER 4 | Configuring the SwitchQuality of Service– 203 –a queue based on basic classification rules. (Options: 0-7, Default (use basic classifi

Page 118

CHAPTER 4 | Configuring the SwitchQuality of Service– 204 –CONFIGURING STORMCONTROLUse the Storm Control Configuration page to set limits on broad

Page 119 - Creating Trunk Groups

CHAPTER 4 | Configuring the SwitchQuality of Service– 205 –CONFIGURING WRED Use the Storm Control Configuration page to control traffic congestion

Page 120 - ONFIGURING STATIC

CHAPTER 4 | Configuring the SwitchQuality of Service– 206 –WEB INTERFACETo configure WRED:1. Click Configuration, QoS, WRED.2. Enable WRED on the

Page 121

CHAPTER 4 | Configuring the SwitchConfiguring Local Port Mirroring– 207 –Figure 89: Congestion Management Configuration CONFIGURING LOCAL PORT MI

Page 122

CHAPTER 4 | Configuring the SwitchConfiguring Remote Port Mirroring– 208 – Tx only - Frames transmitted from this port are mirrored to the destina

Page 123

CHAPTER 4 | Configuring the SwitchConfiguring Remote Port Mirroring– 209 –Figure 91: Configuring Remote Port MirroringPATH Basic/Advanced Configu

Page 124 - 5. Click Save

– 21 –SECTION IGETTING STARTEDThis section provides an overview of the switch, and introduces some basic concepts about network switches. It also de

Page 125 - Configuring Loop Protection

CHAPTER 4 | Configuring the SwitchConfiguring Remote Port Mirroring– 210 –session is allowed, either local or remote. Also, note that the source p

Page 126

CHAPTER 4 | Configuring the SwitchConfiguring Remote Port Mirroring– 211 –◆ Intermediate – Uplink ports to intermediate switches.MAC Table learnin

Page 127

CHAPTER 4 | Configuring the SwitchConfiguring Remote Port Mirroring– 212 –To configure remote port mirroring for an RSPAN intermediate switch:1. C

Page 128 - Internal Spanning Tree

CHAPTER 4 | Configuring the SwitchConfiguring UPnP– 213 –Figure 94: Mirror Configuration (Destination)CONFIGURING UPNPUniversal Plug and Play (UP

Page 129 - SETTINGS FOR STA

CHAPTER 4 | Configuring the SwitchConfiguring sFlow– 214 –interface. Or right-click on the entry and select “Properties” to display a list of devi

Page 130

CHAPTER 4 | Configuring the SwitchConfiguring sFlow– 215 –the monitored interface. Moreover, the processor and memory load imposed by the sFlow ag

Page 131

CHAPTER 4 | Configuring the SwitchConfiguring sFlow– 216 –◆ UDP Port – The UDP port on which the sFlow receiver is listening for sFlow datagrams.

Page 132 - MULTIPLE SPANNING

CHAPTER 4 | Configuring the SwitchConfiguring sFlow– 217 –Figure 96: sFlow Configuration

Page 133

CHAPTER 4 | Configuring the SwitchConfiguring sFlow– 218 –

Page 134 - BRIDGE PRIORITIES

– 219 –5 MONITORING THE SWITCHThis chapter describes how to monitor all of the basic functions, configure or view system logs, and how to view traff

Page 135 - NTERFACES

SECTION I | Getting Started– 22 –

Page 136

CHAPTER 5 | Monitoring the SwitchDisplaying Basic Information About the System– 220 –◆ Software Date – Release date of the switch software.◆ Code

Page 137

CHAPTER 5 | Monitoring the SwitchDisplaying Basic Information About the System– 221 –WEB INTERFACETo display CPU utilization:1. Click System, then

Page 138 - CONFIGURING MIST

CHAPTER 5 | Monitoring the SwitchDisplaying Basic Information About the System– 222 –Table Headings◆ ID – Error ID.◆ Level – Error level as descri

Page 139

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Ports– 223 –DISPLAYING LOGDETAILSUse the Detailed Log page to view the full text of

Page 140 - MULTICAST VLAN REGISTRATION

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Ports– 224 –DISPLAYING ANOVERVIEW OF PORTSTATISTICSUse the Port Statistics Overview

Page 141 - Multicast VLAN Registration

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Ports– 225 –◆ Q# Receive/Transmit – The number of packets received and transmitted t

Page 142

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Ports– 226 –◆ Conflict – Displays QCE status. It may happen that resources required

Page 143 - HANNEL SETTINGS

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Ports– 227 – Broadcast – The number of received and transmitted broadcast packets (g

Page 144

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Ports– 228 –WEB INTERFACETo display the detailed port statistics, click Monitor, Por

Page 145 - IGMP SNOOPING

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 229 –DISPLAYING INFORMATION ABOUT SECURITY SETTINGSYou can use th

Page 146 - IGMP Snooping

– 23 –1 INTRODUCTIONThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to configur

Page 147

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 230 –DISPLAYINGINFORMATION ABOUTSWITCH SETTINGS FORPORT SECURITYU

Page 148

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 231 – Limit Reached: The Port Security service is enabled by at l

Page 149 - SNOOPING AND QUERY

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 232 –◆ VLAN ID – The VLAN ID seen on this port. ◆ State – Indica

Page 150

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 233 –recently received frame from a new client for MAC-based auth

Page 151 - ILTERING

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 234 –PARAMETERSThese parameters are displayed:Port State ◆ Admin

Page 152 - MLD SNOOPING

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 235 –◆ Request ID – The number of EAPOL Request Identity frames t

Page 153 - MLD Snooping

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 236 –Last Supplicant Info◆ MAC Address – The MAC address of the l

Page 154

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 237 –the client will remain in the unauthenticated state for Hold

Page 155 - AND QUERY

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 238 – Port: The ACE will match a specific ingress port. ◆ Frame T

Page 156

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 239 –DISPLAYINGSTATISTICS FORDHCP SNOOPINGUse the DHCP Snooping P

Page 157

CHAPTER 1 | IntroductionDescription of Software Features– 24 –DESCRIPTION OF SOFTWARE FEATURESThe switch provides a wide range of advanced perform

Page 158 - ONFIGURING MLD

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 240 –Figure 112: DHCP Snooping Statistics DISPLAYING DHCPRELAY

Page 159 - IMING AND TLVS

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 241 –◆ Receive Bad Remote ID – The number of packets with a Remot

Page 160

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 242 –WEB INTERFACETo display the Dynamic ARP Inspection Table, cl

Page 161

CHAPTER 5 | Monitoring the SwitchDisplaying Information on Authentication Servers– 243 –DISPLAYING INFORMATION ON AUTHENTICATION SERVERS Use the M

Page 162

CHAPTER 5 | Monitoring the SwitchDisplaying Information on Authentication Servers– 244 –DISPLAYINGSTATISTICS FORCONFIGUREDAUTHENTICATIONSERVERSUse

Page 163

CHAPTER 5 | Monitoring the SwitchDisplaying Information on Authentication Servers– 245 –Accept, Access-Reject, Access-Challenge, timeout, or retra

Page 164 - (DSCP) value (IETF RFC 2474)

CHAPTER 5 | Monitoring the SwitchDisplaying Information on Authentication Servers– 246 – Unknown Types – The number of RADIUS packets of unknown t

Page 165

CHAPTER 5 | Monitoring the SwitchDisplaying Information on RMON– 247 –WEB INTERFACETo display statistics for configured authentication and account

Page 166

CHAPTER 5 | Monitoring the SwitchDisplaying Information on RMON– 248 –PARAMETERSThese parameters are displayed:◆ ID – Index of Statistics entry.◆

Page 167 - Power over Ethernet

CHAPTER 5 | Monitoring the SwitchDisplaying Information on RMON– 249 –WEB INTERFACETo display RMON statistics, click Monitor, Security, Switch, RM

Page 168

CHAPTER 1 | IntroductionDescription of Software Features– 25 –ACCESS CONTROLLISTSACLs provide packet filtering for IP frames (based on protocol, T

Page 169

CHAPTER 5 | Monitoring the SwitchDisplaying Information on RMON– 250 –WEB INTERFACETo display RMON historical samples, click Monitor, Security, Sw

Page 170

CHAPTER 5 | Monitoring the SwitchDisplaying Information on RMON– 251 –◆ Falling Threshold – If the current value is less than the falling threshol

Page 171

CHAPTER 5 | Monitoring the SwitchDisplaying Information on LACP– 252 –DISPLAYING INFORMATION ON LACP Use the monitor pages for LACP to display inf

Page 172 - IEEE 802.1Q VLANs

CHAPTER 5 | Monitoring the SwitchDisplaying Information on LACP– 253 –◆ LACP – Shows LACP status: Yes – LACP is enabled and the port link is up.

Page 173 - SSIGNING PORTS TO

CHAPTER 5 | Monitoring the SwitchDisplaying Information on Loop Protection– 254 –WEB INTERFACETo display LACP statistics for local ports this swit

Page 174 - ATTRIBUTES FOR PORT

CHAPTER 5 | Monitoring the SwitchDisplaying Information on the Spanning Tree– 255 –DISPLAYING INFORMATION ON THE SPANNING TREE Use the monitor pag

Page 175

CHAPTER 5 | Monitoring the SwitchDisplaying Information on the Spanning Tree– 256 –◆ Internal Root Cost – The Regional Root Path Cost. For the Reg

Page 176

CHAPTER 5 | Monitoring the SwitchDisplaying Information on the Spanning Tree– 257 –WEB INTERFACETo display an overview of all STP bridge instances

Page 177 - Using Port Isolation

CHAPTER 5 | Monitoring the SwitchDisplaying Information on the Spanning Tree– 258 –PARAMETERSThese parameters are displayed:◆ Port – Port Identifi

Page 178 - Configuring MAC-based VLANs

CHAPTER 5 | Monitoring the SwitchDisplaying MVR Information– 259 –◆ RSTP – The number of RSTP Configuration BPDU's received/transmitted on a

Page 179 - ROTOCOL VLAN

CHAPTER 1 | IntroductionDescription of Software Features– 26 –be ignored and will not be written to the address table. Static addresses can be use

Page 180

CHAPTER 5 | Monitoring the SwitchDisplaying MVR Information– 260 –◆ IGMPv1 Joins Received – Number of received IGMPv1 Joins.◆ IGMPv2/MLDv1 Reports

Page 181 - GROUPS TO PORTS

CHAPTER 5 | Monitoring the SwitchDisplaying MVR Information– 261 –WEB INTERFACETo display information for MVR statistics and multicast groups, cli

Page 182

CHAPTER 5 | Monitoring the SwitchShowing IGMP Snooping Information– 262 –SHOWING IGMP SNOOPING INFORMATIONUse the IGMP Snooping pages to display I

Page 183 - Managing VoIP Traffic

CHAPTER 5 | Monitoring the SwitchShowing IGMP Snooping Information– 263 –WEB INTERFACETo display IGMP snooping status information, click Monitor,

Page 184 - CONFIGURING VOIP

CHAPTER 5 | Monitoring the SwitchShowing MLD Snooping Information– 264 –PARAMETERSThese parameters are displayed:◆ VLAN ID – VLAN identifier.◆ Gro

Page 185

CHAPTER 5 | Monitoring the SwitchShowing MLD Snooping Information– 265 –PARAMETERSThese parameters are displayed:Statistics ◆ VLAN ID – VLAN Ident

Page 186 - ELEPHONY OUI

CHAPTER 5 | Monitoring the SwitchShowing MLD Snooping Information– 266 –SHOWING MLDSNOOPING GROUPINFORMATIONUse the MLD Snooping Group Information

Page 187 - Quality of Service

CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 267 –◆ Type – Indicates the Type. It can be either Allow or Deny.◆ Hardware Filter/S

Page 188 - POLICIERS

CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 268 – When a capability is enabled, the capability is followed by (+). If the capabi

Page 189 - ORT SCHEDULER

CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 269 –◆ Device Type - LLDP-MED devices are comprised of two primary types: LLDP-MED N

Page 190

CHAPTER 1 | IntroductionDescription of Software Features– 27 –VIRTUAL LANS The switch supports up to 4096 VLANs. A Virtual LAN is a collection of

Page 191 - WEB INTERFACE

CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 270 –and Media Endpoint (Class II) classes, and are extended to include aspects rela

Page 192 - ORT SHAPER

CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 271 –◆ Auto-negotiation Status – Auto-negotiation status identifies if auto-negotiat

Page 193 - REMARKING MODE

CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 272 –If it is unknown what power supply the PD device is using, this is indicated as

Page 194

CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 273 –The respective echo values shall be defined as the local link partner’s reflect

Page 195 - REWRITING

CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 274 –◆ Total Neighbors Entries Deleted – The number of LLDP neighbors which have bee

Page 196 - QOS INGRESS

CHAPTER 5 | Monitoring the SwitchDisplaying PoE Status– 275 –WEB INTERFACETo display statistics on LLDP global counters and control frames, click

Page 197

CHAPTER 5 | Monitoring the SwitchDisplaying the MAC Address Table– 276 –◆ Current Used – How much current the PD is currently using◆ Priority – Th

Page 198 - RANSLATION

CHAPTER 5 | Monitoring the SwitchDisplaying Information About VLANs– 277 –WEB INTERFACETo display the address table, click Monitor, MAC Address Ta

Page 199 - CONFIGURING QOS

CHAPTER 5 | Monitoring the SwitchDisplaying Information About VLANs– 278 – Combined: Shows information for all active user modules.◆ VLAN ID – A V

Page 200

CHAPTER 5 | Monitoring the SwitchDisplaying Information About MAC-based VLANs– 279 –◆ Ingress Filtering – If ingress filtering is enabled and the

Page 201

CHAPTER 1 | IntroductionSystem Defaults– 28 –QUALITY OF SERVICE Differentiated Services (DiffServ) provides policy-based management mechanisms use

Page 202

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Flow Sampling– 280 –PARAMETERSThese parameters are displayed:◆ MAC-based VLAN User –

Page 203

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Flow Sampling– 281 –PARAMETERSThese parameters are displayed:Receiver Statistics◆ Ow

Page 204 - ONFIGURING STORM

CHAPTER 5 | Monitoring the SwitchDisplaying Information About Flow Sampling– 282 –WEB INTERFACE1. To display information on sampled traffic, click

Page 205

– 283 –6 PERFORMING BASIC DIAGNOSTICSThis chapter describes how to test network connectivity using Ping for IPv4 or IPv6, and how to test network ca

Page 206 - MANAGEMENT

CHAPTER 6 | Performing Basic DiagnosticsPinging an IPv4 or IPv6 Address– 284 –After you press Start, the sequence number and round-trip time are d

Page 207

CHAPTER 6 | Performing Basic DiagnosticsRunning Cable Diagnostics– 285 –RUNNING CABLE DIAGNOSTICSThe VeriPHY page is used to perform cable diagnos

Page 208

CHAPTER 6 | Performing Basic DiagnosticsRunning Cable Diagnostics– 286 –

Page 209

– 287 –7 PERFORMING SYSTEM MAINTENANCEThis chapter describes how to perform basic maintenance tasks including upgrading software, restoring or savin

Page 210

CHAPTER 7 | Performing System MaintenanceRestoring Factory Defaults– 288 –RESTORING FACTORY DEFAULTSUse the Factory Defaults page to restore the o

Page 211

CHAPTER 7 | Performing System MaintenanceActivating the Alternate Image– 289 –3. Click the Upload button to upgrade the switch’s firmware.After th

Page 212

CHAPTER 1 | IntroductionSystem Defaults– 29 –SNMP SNMP Agent DisabledCommunity Strings “public” (read only) “private” (read/write)Traps Global: di

Page 213 - Configuring UPnP

CHAPTER 7 | Performing System MaintenanceManaging Configuration Files– 290 –MANAGING CONFIGURATION FILESUse the Maintenance Configuration pages to

Page 214 - Configuring sFlow

CHAPTER 7 | Performing System MaintenanceManaging Configuration Files– 291 –Figure 157: Configuration Upload

Page 215

CHAPTER 7 | Performing System MaintenanceManaging Configuration Files– 292 –

Page 216

– 293 –SECTION IIIAPPENDICESThis section provides additional information and includes these items:◆ "Software Specifications" on page 295◆

Page 217

SECTION III | Appendices– 294 –

Page 218

– 295 –A SOFTWARE SPECIFICATIONSSOFTWARE FEATURESMANAGEMENTAUTHENTICATIONLocal, RADIUS, TACACS+, AAA, Port Authentication (802.1X), HTTPS, SSH, Port

Page 219 - 5 MONITORING THE SWITCH

APPENDIX A | Software SpecificationsManagement Features– 296 –VLAN SUPPORT Up to 128 groups; port-based, protocol-based, tagged (802.1Q),private V

Page 220 - TILIZATION

APPENDIX A | Software SpecificationsStandards– 297 –RMON Groups 1, 2, 3, 9 (Statistics, History, Alarm, Event)STANDARDSANSI/TIA-1057 LLDP for Medi

Page 221 - MESSAGES

APPENDIX A | Software SpecificationsManagement Information Bases– 298 –MANAGEMENT INFORMATION BASESBridge MIB (RFC 4188)DHCP Option for Civic Addr

Page 222

– 299 –B TROUBLESHOOTINGPROBLEMS ACCESSING THE MANAGEMENT INTERFACE Table 14: Troubleshooting ChartSymptom ActionCannot connect using a web browser,

Page 223 - FRONT PANEL

USER MANUALGEP-5070Layer 2 Gigabit Ethernet Switchwith 48 10/100/1000BASE-T PoE-Plus Ports (RJ-45)and 2 Gigabit Ethernet SFP PortsGEP-5070E042013/ST-R

Page 224 - DISPLAYING QOS

CHAPTER 1 | IntroductionSystem Defaults– 30 –IP Settings Management. VLAN VLAN 1IP Address 192.168.1.1Subnet Mask 255.255.255.0Default Gateway 0.0

Page 225 - DISPLAYING QCL

APPENDIX B | TroubleshootingUsing System Logs– 300 –USING SYSTEM LOGSIf a fault does occur, refer to the Installation Guide to ensure that the pro

Page 226 - PORT STATISTICS

– 301 –C LICENSE INFORMATIONThis product includes copyrighted third-party software subject to the terms of the GNU General Public License (GPL), GNU

Page 227

APPENDIX C | License InformationThe GNU General Public License– 302 –GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND

Page 228

APPENDIX C | License InformationThe GNU General Public License– 303 –b) Accompany it with a written offer, valid for at least three years, to give

Page 229 - DISPLAYING ACCESS

APPENDIX C | License InformationThe GNU General Public License– 304 –9. If the distribution and/or use of the Program is restricted in certain cou

Page 230 - PORT SECURITY

– 305 –GLOSSARYACL Access Control List. ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for c

Page 231 - LEARNED MAC

GLOSSARY– 306 –DIFFSERV Differentiated Services provides quality of service on large networks by employing a well-defined set of building blocks fro

Page 232 - SERVICES

GLOSSARY– 307 –GMRP Generic Multicast Registration Protocol. GMRP allows network devices to register end stations with multicast groups. GMRP requir

Page 233 - 802.1X OR REMOTE

GLOSSARY– 308 –IGMP QUERY On each subnetwork, one IGMP-capable device will act as the querier — that is, the device that asks all hosts to report on

Page 234

GLOSSARY– 309 –MD5 MD5 Message-Digest is an algorithm that is used to create digital signatures. It is intended for use with 32 bit machines and is

Page 235

– 31 –2 INITIAL SWITCH CONFIGURATIONThis chapter includes information on connecting to the switch and basic configuration procedures.To make use of

Page 236

GLOSSARY– 310 –PORT TRUNK Defines a network link aggregation and trunking method which specifies how to create a single high-speed logical link that

Page 237 - DISPLAYING ACL

GLOSSARY– 311 –SSH Secure Shell is a secure replacement for remote access functions, including Telnet. SSH can authenticate users with a cryptograph

Page 238

GLOSSARY– 312 –

Page 239 - TATISTICS FOR

– 313 –INDEXAacceptable frame type 175Access Control List See ACLACL 96binding to a port 96address table 170aging time 171address, manage

Page 240 - ELAY STATISTICS

INDEX– 314 –snooping, configuring 149snooping, description 145snooping, fast leave 148throttling 148ingress classification, QoS 196ingress

Page 241 - ARP PACKETS

INDEX– 315 –static binding 143statistics, displaying 259using immediate leave 142NNTP, specifying servers 50Ppasswords 31, 58path cost 1

Page 242 - GUARD TABLE

INDEX– 316 –softwaredisplaying version 219downloading 288Spanning Tree Protocol See STAspecifications, software 295SSH 64configuring 64se

Page 244 - CONFIGURED

GEP-5070E042013/ST-R01

Page 245

CHAPTER 2 | Initial Switch Configuration– 32 –logging out. To change the password, click Security and then Users. Select “admin” from the User Con

Page 246

– 33 –SECTION IIWEB CONFIGURATIONThis section describes the basic switch features, along with a detailed description of how to configure each featur

Page 247 - TATISTICS

SECTION II | Web Configuration– 34 –

Page 248

– 35 –3 USING THE WEB INTERFACEThis switch provides an embedded HTTP web agent. Using a web browser you can configure the switch and view statistics

Page 249 - ISTORICAL SAMPLES

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 36 –CONFIGURATIONOPTIONSConfigurable parameters have a dialog box or a dr

Page 250 - LARM SETTINGS

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 37 –Aggregation 119Static Specifies ports to group into static trunks 120

Page 251 - EVENT SETTINGS

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 38 –Access Management Sets IP addresses of clients allowed management acc

Page 252

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 39 –Aggregation2119Static Specifies ports to group into static trunks 120

Page 254

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 40 –Private VLANsPort Isolation Prevents communications between designat

Page 255 - TATUS FOR STA

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 41 –WRED Sets drop probabilities for congested queues 205Congestion Manag

Page 256

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 42 –DHCP Dynamic Host Configuration ProtocolSnooping Statistics Shows st

Page 257 - STATUS FOR STA

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 43 –Group InformationDisplays active IGMP groups 263IPv4 SFM InformationD

Page 258 - STATISTICS FOR STA

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 44 –Maintenance 287Restart Device Restarts the switch 287Factory Defaults

Page 259 - ISPLAYING MVR

– 45 –4 CONFIGURING THE SWITCHThis chapter describes all of the basic configuration tasks.CONFIGURING SYSTEM INFORMATIONUse the System Information C

Page 260 - ROUP INFORMATION

CHAPTER 4 | Configuring the SwitchSetting an IP Address– 46 –SETTING AN IP ADDRESSThis section describes how to configure an IP interface for mana

Page 261 - DISPLAYING MVR

CHAPTER 4 | Configuring the SwitchSetting an IP Address– 47 –◆ IP Router – IP address of the gateway router between the switch and management stat

Page 262 - NOOPING STATUS

CHAPTER 4 | Configuring the SwitchSetting an IP Address– 48 –SETTING AN IPV6ADDRESSUse the IPv6 Configuration page to configure an IPv6 address fo

Page 263 - SHOWING IPV4 SFM

CHAPTER 4 | Configuring the SwitchSetting an IP Address– 49 –interface. The network portion of the address is based on prefixes received in IPv6 r

Page 264 - HOWING MLD

– 5 –ABOUT THIS GUIDEPURPOSE This guide gives specific information on how to operate and use the management functions of the switch.AUDIENCE The gui

Page 265

CHAPTER 4 | Configuring the SwitchConfiguring NTP Service– 50 –CONFIGURING NTP SERVICEUse the NTP Configuration page to specify the Network Time P

Page 266 - SHOWING IPV6 SFM

CHAPTER 4 | Configuring the SwitchConfiguring the Time Zone and Daylight Savings Time– 51 –CONFIGURING THE TIME ZONE AND DAYLIGHT SAVINGS TIMEUse

Page 267 - DISPLAYING LLDP INFORMATION

CHAPTER 4 | Configuring the SwitchConfiguring the Time Zone and Daylight Savings Time– 52 – Non-Recurring – Sets the start, end, and offset times

Page 268 - LLDP-MED

CHAPTER 4 | Configuring the SwitchConfiguring Remote Log Messages– 53 –CONFIGURING REMOTE LOG MESSAGESUse the System Log Configuration page to sen

Page 269 - Displaying LLDP Information

CHAPTER 4 | Configuring the SwitchConfiguring Power Reduction– 54 –CONFIGURING POWER REDUCTIONThe switch provides power saving methods including p

Page 270

CHAPTER 4 | Configuring the SwitchConfiguring Port Connections– 55 –Figure 9: Configuring EEE Power ReductionCONFIGURING PORT CONNECTIONSUse the

Page 271 - NEIGHBOR POE

CHAPTER 4 | Configuring the SwitchConfiguring Port Connections– 56 –NOTE: The 1000BASE-T standard does not support forced mode. Auto-negotiation s

Page 272 - NEIGHBOR EEE

CHAPTER 4 | Configuring the SwitchConfiguring Security– 57 –WEB INTERFACETo configure port connection settings:1. Click Configuration, Ports.2. Ma

Page 273

CHAPTER 4 | Configuring the SwitchConfiguring Security– 58 –addresses assigned to DHCP clients can also be carefully controlled using static or dy

Page 274

CHAPTER 4 | Configuring the SwitchConfiguring Security– 59 –◆ Privilege Level – Specifies the user level. (Options: 1 - 15) Access to specific fun

Page 275 - DISPLAYING POE STATUS

ABOUT THIS GUIDE– 6 –

Page 276

CHAPTER 4 | Configuring the SwitchConfiguring Security– 60 –CONFIGURING USERPRIVILEGE LEVELSUse the Privilege Levels page to set the privilege lev

Page 277

CHAPTER 4 | Configuring the SwitchConfiguring Security– 61 –3. Click Save.Figure 13: Configuring Privilege LevelsCONFIGURING THEAUTHENTICATIONMET

Page 278

CHAPTER 4 | Configuring the SwitchConfiguring Security– 62 –Figure 14: Authentication Server OperationPATH Advanced Configuration, Security, Swit

Page 279

CHAPTER 4 | Configuring the SwitchConfiguring Security– 63 –NOTE: This guide assumes that RADIUS and TACACS+ servers have already been configured

Page 280

CHAPTER 4 | Configuring the SwitchConfiguring Security– 64 –CONFIGURING SSH Use the SSH Configuration page to configure access to the Secure Shell

Page 281

CHAPTER 4 | Configuring the SwitchConfiguring Security– 65 –CONFIGURING HTTPS Use the HTTPS Configuration page to enable the Secure Hypertext Tran

Page 282

CHAPTER 4 | Configuring the SwitchConfiguring Security– 66 –Figure 17: HTTPS ConfigurationFILTERING IPADDRESSES FORMANAGEMENT ACCESSUse the Acces

Page 283 - PERFORMING BASIC DIAGNOSTICS

CHAPTER 4 | Configuring the SwitchConfiguring Security– 67 –5. Mark the protocols to restrict based on the specified address range. The following

Page 284 - Figure 150: ICMP Ping

CHAPTER 4 | Configuring the SwitchConfiguring Security– 68 –MIB objects) and default groups defined for security models v1 and v2c. The following

Page 285 - Running Cable Diagnostics

CHAPTER 4 | Configuring the SwitchConfiguring Security– 69 –◆ Version - Specifies the SNMP version to use. (Options: SNMP v1, SNMP v2c, SNMP v3; D

Page 286

– 7 –CONTENTSABOUT THIS GUIDE 5CONTENTS 7FIGURES 13TABLES 19SECTION I GETTING STARTED 211INTRODUCTION 23Key Features 23Description of Software Feat

Page 287 - PERFORMING SYSTEM MAINTENANCE

CHAPTER 4 | Configuring the SwitchConfiguring Security– 70 –8 colon-separated 16-bit hexadecimal values. One double colon may be used to indicate

Page 288 - Figure 153: Factory Defaults

CHAPTER 4 | Configuring the SwitchConfiguring Security– 71 –NOTE: To select a name from this field, first enter an SNMPv3 user with the same Trap

Page 289 - Figure 154: Software Upload

CHAPTER 4 | Configuring the SwitchConfiguring Security– 72 –SETTING SNMPV3 COMMUNITY ACCESS STRINGSUse the SNMPv3 Community Configuration page to

Page 290 - MANAGING CONFIGURATION FILES

CHAPTER 4 | Configuring the SwitchConfiguring Security– 73 –CONFIGURING SNMPV3 USERSUse the SNMPv3 User Configuration page to define a unique name

Page 291 - Managing Configuration Files

CHAPTER 4 | Configuring the SwitchConfiguring Security– 74 –◆ Privacy Protocol - The encryption algorithm use for data privacy; only 56-bit DES is

Page 292

CHAPTER 4 | Configuring the SwitchConfiguring Security– 75 –menu (see page 73). To modify an entry for USM, the current entry must first be delete

Page 293 - APPENDICES

CHAPTER 4 | Configuring the SwitchConfiguring Security– 76 –should exist and its OID subtree should overlap the “excluded” view entry. ◆ OID Subtr

Page 294 -

CHAPTER 4 | Configuring the SwitchConfiguring Security– 77 – Auth, Priv - SNMP communications use both authentication and encryption.◆ Read View N

Page 295 - A SOFTWARE SPECIFICATIONS

CHAPTER 4 | Configuring the SwitchConfiguring Security– 78 –CONFIGURING RMON STATISTICAL SAMPLESUse the RMON Statistics Configuration page to coll

Page 296 - Management Features

CHAPTER 4 | Configuring the SwitchConfiguring Security– 79 –growth and plan for expansion before your network becomes too overloaded.PATH Advanced

Page 297 - Standards

CONTENTS– 8 –Configuring Power Reduction 54Reducing Power to Idle Queue Circuits 54Configuring Port Connections 55Configuring Security 57Configu

Page 298 - Management Information Bases

CHAPTER 4 | Configuring the SwitchConfiguring Security– 80 –CONFIGURING RMON ALARMSUse the RMON Alarm Configuration page to define specific criter

Page 299 - B TROUBLESHOOTING

CHAPTER 4 | Configuring the SwitchConfiguring Security– 81 – Rising or Falling – Trigger alarm when the first value is larger than the rising thre

Page 300 - Using System Logs

CHAPTER 4 | Configuring the SwitchConfiguring Security– 82 –CONFIGURING RMON EVENTSUse the RMON Event Configuration page to set the action to take

Page 301 - C LICENSE INFORMATION

CHAPTER 4 | Configuring the SwitchConfiguring Security– 83 –Figure 28: RMON Event Configuration CONFIGURING PORTLIMIT CONTROLSUse the Port Securi

Page 302 -

CHAPTER 4 | Configuring the SwitchConfiguring Security– 84 –◆ Limit – The maximum number of MAC addresses that can be secured on this port. This n

Page 303

CHAPTER 4 | Configuring the SwitchConfiguring Security– 85 –WEB INTERFACETo configure port limit controls:1. Click Advanced Configuration, Securit

Page 304

CHAPTER 4 | Configuring the SwitchConfiguring Security– 86 –Figure 30: Using Port SecurityThis switch uses the Extensible Authentication Protocol

Page 305 - GLOSSARY

CHAPTER 4 | Configuring the SwitchConfiguring Security– 87 –◆ 802.1X / MAC-based authentication must be enabled globally for the switch.◆ The Admi

Page 306 - DiffServ allocates

CHAPTER 4 | Configuring the SwitchConfiguring Security– 88 –between the switch and the client, and therefore does not imply that a client is still

Page 307 - – 307 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 89 –whether RADIUS-assigned QoS Class is enabled for that port. When unchecked, RADIUS-ser

Page 308 - – 308 –

CONTENTS– 9 –Configuring IGMP Filtering 151MLD Snooping 152Configuring Global and Port-Related Settings for MLD Snooping 152Configuring VLAN Sett

Page 309 - – 309 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 90 –For example, if the attribute is “map-ip-dscp=2:3;service-policy-in=p1,” then the swit

Page 310 - DIUS is a logon

CHAPTER 4 | Configuring the SwitchConfiguring Security– 91 –If (re-)authentication fails or the RADIUS Access-Accept packet no longer carries a VL

Page 311 - CACS+ is a logon

CHAPTER 4 | Configuring the SwitchConfiguring Security– 92 –NOTE: For trouble-shooting VLAN assignments, use the Monitor > VLANs > VLAN Memb

Page 312 - – 312 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 93 –◆ Admin State - If NAS is globally enabled, this selection controls the port's au

Page 313 - – 313 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 94 –password in the subsequent EAP exchange with the RADIUS server. The 6-byte MAC address

Page 314 - – 314 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 95 –◆ Guest VLAN Enabled - Enables or disables this feature for a given port. Refer to the

Page 315 - – 315 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 96 –Figure 31: Network Access Server ConfigurationFILTERING TRAFFICWITH ACCESSCONTROL LIS

Page 316 - – 316 –

CHAPTER 4 | Configuring the SwitchConfiguring Security– 97 –◆ Policy ID - An ACL policy configured on the ACE Configuration page (page 101). (Rang

Page 317

CHAPTER 4 | Configuring the SwitchConfiguring Security– 98 –frames, or shutting down the port. Note that the setting for rate limiting is implemen

Page 318 - E042013/ST-R01

CHAPTER 4 | Configuring the SwitchConfiguring Security– 99 –Figure 33: ACL Rate Limiter Configuration CONFIGURING ACCESS CONTROL LISTS Use the

Comments to this Manuals

No comments