NEC N8406-022 Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 102 Seiten
- 0.52 mb
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Switch
NEC V850/SC1
35 Seiten 0.49 mb -
Switch
NEC N8406-022A
90 Seiten 0.58 mb -
Switch
NEC N8191-09
104 Seiten 2.03 mb -
Switch
NEC V850/SC2
35 Seiten 0.49 mb -
Switch
NEC INTELLIGENT L2 SWITCH N8406-022A
94 Seiten 1.74 mb -
Switch
NEC VS482
1 Seiten 0.04 mb -
Switch
NEC IB-USB
48 Seiten 1.83 mb -
Switch
NEC N8406-022
102 Seiten 0.52 mb
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung NEC N8406-022 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von NEC N8406-022, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung NEC N8406-022 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung NEC N8406-022. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung NEC N8406-022 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts NEC N8406-022
- Den Namen des Produzenten und das Produktionsjahr des Geräts NEC N8406-022
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts NEC N8406-022
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von NEC N8406-022 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von NEC N8406-022 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service NEC finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von NEC N8406-022 zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts NEC N8406-022, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von NEC N8406-022 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
N8406-022 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) Part number: 856-126757-301-00 First edition: Jan 2007[...]
-
Seite 2
2 Legal notices © 2007 NEC Corporation The information contained herein is subject to change without notice. The onl y warra nties for NEC products and services are set forth in the express warranty statements accompanying such products and se rvices. Nothing herein should be construed as constituting an addi tional warranty. NEC shall not be liab[...]
-
Seite 3
ISCLI Reference 3 Contents ISCLI Reference Introduction ............................................................................................................................................................. 6 Additional references ................................................................................................................[...]
-
Seite 4
ISCLI Reference 4 Statistics command s Introduction ........................................................................................................................................................... 41 Port Statistics ...........................................................................................................................[...]
-
Seite 5
ISCLI Reference 5 VLAN configuration ......................................................................................................................................... 82 Layer 3 configuration ............................................................................................................................................ 82 IP int[...]
-
Seite 6
ISCLI Reference 6 ISCLI Reference Introduction The 1Gb Intelligent L2 Switch is ready to perform b asic swit ching functions right out of the box. Som e of the more advanced features, however, require some administrat ive configuration bef ore th ey can be used effectivel y. The extensive s witching software included in the s witch provides a varie[...]
-
Seite 7
ISCLI Reference 7 To establish a console conn ection with the switch: 1. Connect the terminal to the cons ole port using the nu ll modem cable. 2. Power on the terminal. 3. Press the Enter key a few times on the terminal to establish the connection. 4. You will be required to enter a password for access to the s witch. Setting an IP address To acce[...]
-
Seite 8
ISCLI Reference 8 The supported SSH encryption and auth entication methods are listed b elow. • Server Host Authentication—Client RSA authenticat es the s witch in the beginning of ever y connection • Key Exchange—RSA • Encryption: • AES256-CBC • AES192-CBC • AES128-CBC • 3DES-CBC • 3DES • ARCFOUR • User Authentication—Loc[...]
-
Seite 9
ISCLI Reference 9 Table 2 User access levels User account Description and tasks performed User The User has no direct responsibility for sw itch management. He or she can view all switch status information and statistics, but cannot ma ke any configuration changes to the switch. The user account is enabled by default, and the default password is us[...]
-
Seite 10
ISCLI Reference 10 Typeface or symbol Meaning brackets [ ] Indicate optional elements in syntax descriptions. Do not type the brackets when entering the command. Example: If the command syntax is show ip interface [< 1-256 >] you can enter show ip interface or show ip interface 1 italic text Indicates variables in command syntax descriptions.[...]
-
Seite 11
ISCLI basics 11 ISCLI basics Introduction The ISCLI is used for viewing switch information and statis tics. In ad dition, the administrator can use the CLI for performing all levels of switch configuration. This chapter describes the ISCLI Command Modes, and pr ovi des a list of commands and shortcuts that are commonly available from all the c omma[...]
-
Seite 12
ISCLI basics 12 Global commands Some basic commands are recognized thr oughout the ISCLI hierarchy. These comma nds are useful for obtaining online Help, navigating thro ugh the interface, and saving c onfiguration changes. T o get help about a specific command, type the command, followed by help . The following table describes the g lobal commands[...]
-
Seite 13
ISCLI basics 13 Command line interfac e shortcuts The following shortcuts allo w you to enter commands quickly and easily. Command abbreviation Most commands can be abbreviated by entering the first c hara cters that distinguish the command from the others in the same mode. For example, consider the follo wing full command: Switch(config)# spanning[...]
-
Seite 14
Information Commands 14 Information Commands Introduction You can view configuration information for the s witch in the ISCLI. This chapter discusses how to use the ISCLI to display switch information. The following table describes ge neral information comman ds. Table 5 Information commands Command Usage show sys-info Displays system information. [...]
-
Seite 15
Information Commands 15 System Information commands The following table describes the System Information comman ds. Table 6 System Information commands Command Usage show snmp-server v3 Displays SNMP v3 information. Command mode: All show sys-info Displays system information, including: • System date and time • Switch model name and number • [...]
-
Seite 16
Information Commands 16 SNMPv3 USM User Table information The following command displays SNMPv3 user information: show snmp-server v3 user Command mode: All The User-based Security Mode l (USM) in SNMPv3 provides security services such as authentication and pri vacy of messages. This security model makes use of a defined set of user identiti es dis[...]
-
Seite 17
Information Commands 17 The following table describes the SNMPv 3 View Table information. Table 9 View Table param eters Field Description View Name Displays the name of the view. Subtree Displays the MIB subtree as an OID string. A view subtree is the set of all MIB object instances which have a common Obje ct Identifier prefix to their names. Mas[...]
-
Seite 18
Information Commands 18 SNMPv3 Group Table information The following command displays SNMPv3 group information: show snmp-server v3 group Command mode: All Sec Model User Name Group Name ---------- ----------------------------- ------------------------------- snmpv1 v1v2only v1v2grp usm adminmd5 admingrp usm adminsha admingrp A group is a combinati[...]
-
Seite 19
Information Commands 19 SNMPv3 Target Address Table information The following command displays SNMPv3 target address information: show snmp-server v3 target-address Command mode: All Name Transport Addr Port Taglist Params ---------- --------------- ---- ---------- --------------- trap1 47.81.25.66 162 v1v2trap v1v2param This command displays the S[...]
-
Seite 20
Information Commands 20 SNMPv3 Notify Table information The following command displays the SNMPv3 Notify Table: show snmp-server v3 notify Command mode: All Name Tag -------------------- -------------------- v1v2trap v1v2trap The following table describes the SNMPv 3 Notify Table information. Table 15 SNMPv3 Notify Table informatio n Field Descript[...]
-
Seite 21
Information Commands 21 SNMPv3 dump The following command disp lays SNMPv3 information: show snmp-server v3 Command mode: All Engine ID = 80:00:07:50:03:00:0F:6A:F8:EF:00 usmUser Table: User Name Protocol -------------------------------- -------------------------------- admin NO AUTH, NO PRIVACY adminmd5 HMAC_MD5, DES PRIVACY adminsha HMAC_SHA, DES[...]
-
Seite 22
Information Commands 22 System information The following command displays system information: show sys-info Command mode: All System Information at 6:56:22 Thu Jan 11, 2006 Time zone: Asia/Tokyo Blade Network Technologies 1Gb Intelligent L2 Switch sysName: sysLocation: RackId: NEC01A 6X00125 RackName: Default_Rack_Name EnclosureSerialNumber: NEC01A[...]
-
Seite 23
Information Commands 23 Show recent syslog messages The following command displays system log messages: show logging messages Command mode: All Date Time Severity level Message ---- ---- ----------------- ------- Jul 8 17:25:41 NOTICE system: link up on port 1 Jul 8 17:25:41 NOTICE system: link up on port 8 Jul 8 17:25:41 NOTICE system: link up on [...]
-
Seite 24
Information Commands 24 The following table describes the us er status information. Table 16 User status Information Field Usage user Displays the status of the user access level. oper Displays the status of the oper (operator) access level. admin Displays the status of the admin (administrator) access level. Layer 2 information The following table[...]
-
Seite 25
Information Commands 25 FDB information commands The forwarding database (FDB) contains inform ation that maps the media access control (MAC) a ddress of each known device to the switch port where the devic e addre ss was learned. T he FDB also shows which other ports have seen frames destined for a particular MAC address. NOTE: The master forwardi[...]
-
Seite 26
Information Commands 26 S panning T r ee information The following command displays Spanning T ree information: show spanning-tree stp <1-32> information Command mode: All ------------------------------------------------------------------ upfast disabled, update 40 ------------------------------------------------------------------ Spanning Tr[...]
-
Seite 27
Information Commands 27 Table 19 STP parameters Parameter Description FwdDel The forward delay parameter specifies, in seconds, the amount of time that a bridge por t has to wait before it changes from learning state to forwarding state. Aging The aging time parameter specifies, in seconds , the amount of time the bridge waits without receiving a p[...]
-
Seite 28
Information Commands 28 The switch software can be set to use the IEEE 802.1w Rapid Spanning T ree Protocol (RSTP) or the IEEE 802.1s Multiple Spanning Tr ee Protocol (MSTP). If RSTP/MSTP is turned on, you can view the following RST P bridge information for the Spanning Tree Group: • Status of Uplink Fast (upfast) • Current root MAC address •[...]
-
Seite 29
Information Commands 29 Common Internal S panning T ree information The following command displays Common In ternal Spanning T ree (CIST) information: show spanning-tree mstp cist information Command mode: All Mstp Digest: 0xac36177f50283cd4b83821d8ab26de62 Common Internal Spanning Tree: VLANs: 1 3-4094 Current Root: Path-Cost Port MaxAge FwdDel 80[...]
-
Seite 30
Information Commands 30 You can also refer to the following port-specific CIST information: • Port number and priority • Cost • State • Role • Designated bridge and port • Hello interval • Link type and port type The following table describes the CIST parameters. Table 21 Common Internal Span ning Tree parameter descriptio ns Paramete[...]
-
Seite 31
Information Commands 31 T runk group information The following command displays Trunk Group information: show portchannel information Command mode: All Trunk group 1, Enabled port state: 17: STG 1 forwarding 18: STG 1 forwarding When trunk groups are configure d, you can view t he state of each port in the various tru nk groups. NOTE: If Spanning T[...]
-
Seite 32
Information Commands 32 Layer 3 information The following table describes bas ic Layer 3 Information commands. T he following sections provide more detai led information and commands. Layer 3 function ality is limited in this rele ase. Table 22 Layer 3 information comma nds Command Usage show ip arp Display s Address Resolution Protocol (ARP) Infor[...]
-
Seite 33
Information Commands 33 Show all ARP entry information The following command di splays ARP information: show ip arp Command mode: All except User EXEC IP address Flags MAC address VLAN Port --------------- ----- ----------------- ---- ---- 192.168.2.4 00:50:8b:b2:32:cb 1 18 192.168.2.19 00:0e:7f:25:89:b5 1 17 192.168.2.61 P 00:0f:6a:ed:46:00 1 The [...]
-
Seite 34
Information Commands 34 IGMP multicast group information The following table describes the comm ands used to disp lay informati on about IGMP groups learned by the s witch. Table 25 IGMP Multicast Group commands Command Usage show ip igmp groups address <IP address> Displays a single IGMP multicast group by its IP address. Command mode: All e[...]
-
Seite 35
Information Commands 35 The following table describes the RMON Histor y Information parameters. Table 27 RMON History Information Command Usage Index Displays the index number that identifies each history instance. IFOID Displays the MIB Object Identifier. Interval Displays the time interval for each for each sampling bucket. Rbnum Displays the num[...]
-
Seite 36
Information Commands 36 The following table describes the RMON Alarm Information pa rameters. Table 28 RMON Alarm Information Command Usage Index Displays the index number that identifies each alarm instance. Interval Displays the time interval over which data is sampled and compared with the rising and falling thresholds. Type Displays the method [...]
-
Seite 37
Information Commands 37 Link status information The following command displays link information: show interface link Command mode: All except User EXEC ------------------------------------------------------------------ Port Speed Duplex Flow Ctrl Link ---- ----- -------- --TX-----RX-- ------ 1 1000 any yes yes down 2 1000 any yes yes down 3 1000 fu[...]
-
Seite 38
Information Commands 38 Port information The following command disp lays port information: show interface information Command mode: All except User EXEC Port Tag RMON PVID NAME VLAN(s) ---- --- ---- ---- -------------- ------------------------------- 1 n d 1 Downlink1 1 2 n d 1 Downlink2 1 3 n d 1 Downlink3 1 4 n d 1 Downlink4 1 5 n d 1 Downlink5 1[...]
-
Seite 39
Information Commands 39 Logical Port to GEA Port mapping The following command dis plays information about GEA ports: show geaport Command mode: All Logical Port GEA Port(0-based) GEA Unit ------------ ----------------- --------- 1 1 0 2 2 0 3 4 0 4 7 0 5 8 0 6 12 0 7 13 0 8 14 0 9 0 0 10 3 0 11 5 0 12 6 0 13 9 0 14 10 0 15 11 0 16 15 0 17 16 0 18 [...]
-
Seite 40
Information Commands 40 Information dump The following command dumps s witch information: show information-dump Command mode: All Use the dump command to dump all s witch information avail able from this switch memor y (10K or more, depending on your configuration). T his data is useful for tuning and debugging s witch performance. If you want to c[...]
-
Seite 41
Statistics commands 41 S t atistics commands Introduction You can view switch performance statistics in the us er, operator, and a dministrator command modes. This chapter discusses how to use the ISCLI to display switch statistics. The following table describes gener al Statistics commands. Table 30 Statistics commands Command Usage show layer2 co[...]
-
Seite 42
Statistics commands 42 Bridging statistics Use the following command to displa y the br idging statistics of the selected port: show interface gigabitethernet <port number> bridging-counters Command mode: All Bridging statistics for port 1: dot1PortInFrames: 63242584 dot1PortOutFrames: 63277826 dot1PortInDiscards: 0 dot1TpLearnedEntryDiscards[...]
-
Seite 43
Statistics commands 43 The following table describes the Et her net statistics for a selected port: Table 33 Ethernet statistics for port Statistics Description dot3StatsAlignmentErrors A count of frames received on a particular interface that are not an integral number of octets in length and do not pass the Frame Check Sequence (FCS) check. The c[...]
-
Seite 44
Statistics commands 44 Table 33 Ethernet statistics for port Statistics Description dot3StatsFrameTooLongs A count of frames received on a pa rticular interface that exceeds the maximum permitted frame size. The count represented by an instanc e of this object is incremented when the frameTooLong status is returned by the MAC service to the LLC (or[...]
-
Seite 45
Statistics commands 45 Table 34 Interface statistics for port Statistics Description UcastPkts—IfHCOut The total number of packets that hi gher-level protocols requested to be transmitted, and which were not address ed to a multicast or broadcast address at this sublayer, including those t hat were discarded or not sent. BroadcastPkts—IfHCOut T[...]
-
Seite 46
Statistics commands 46 Link statistics Use the following command to display th e link statistics of the selected port: show interface gigabitethernet <port number> link-counters Command mode: All Link statistics for port 1: linkStateChange: 2 The following table describes the li nk statistics for a selected port: Table 36 Link statistics for [...]
-
Seite 47
Statistics commands 47 Layer 3 statistics The following table describes bas ic Layer 3 statistics co mmands. The follo wing sections provide more detailed information and commands. Layer 3 function ality is limited in this rele ase. Table 39 Layer 3 Statistics commands Command Usage show ip counters Displays IP statistics. Command mode: All except [...]
-
Seite 48
Statistics commands 48 Table 40 IP statistics Statistics Description ipInDiscards The number of input IP datagrams for which no problems were encountered to prevent their continued processing, but whic h were discarded (for example, for lack of buffer space). This counter does not include any datagra ms discarded while awaiting re-assembly. ipInDel[...]
-
Seite 49
Statistics commands 49 DNS statistics show ip dns counters Command mode: All except User EXEC DNS statistics: dnsInRequests: 0 dnsOutRequests: 0 dnsBadRequests: 0 The following table describes the D o main Name System (DNS) statistics: Table 42 DNS statistics Statistic Description dnsInRequests The total number of DNS request packets that have been[...]
-
Seite 50
Statistics commands 50 Table 43 ICMP statistics Statistics Description icmpOutDestUnreachs The number of ICMP Destinati on Unreachable messages sent. icmpOutTimeExcds The number of ICMP Time Exceeded messages sent. icmpOutParmProbs The number of ICMP Parameter Problem m essages sent. icmpOutSrcQuenchs The number of ICMP Source Quench (buffer almost[...]
-
Seite 51
Statistics commands 51 Table 44 TCP statistics Statistics Description tcpRetransSegs The total number of segments retransmitted, that is, the number of TCP segm ents transmitted containing one or more previously transmitted octets. tcpInErrs The total number of segments received in error (for exam ple, bad TCP checksums). tcpCurBuff The total numbe[...]
-
Seite 52
Statistics commands 52 IGMP Multicast Group statistics The following command displays statistics about the use of the IGMP Multicast Groups: show ip igmp counters Command mode: All except User EXEC Enter VLAN number: (1-4095) 1 ------------------------------------------------------------ IGMP Snoop vlan 1 statistics: -------------------------------[...]
-
Seite 53
Statistics commands 53 TCP statistics The following command displays T CP statistics: show mp tcp-block Command mode: All except User EXEC All TCP allocated control blocks: 10ad41e8: 0.0.0.0 0 <=> 0.0.0.0 80 listen 10ad5790: 47.81.27.5 1171 <=> 47.80.23.243 23 established The following table describes the T ransmission Control Prot oco [...]
-
Seite 54
Statistics commands 54 CPU statistics The following command displays the CPU utilization statistics: show mp cpu Command mode: All except User EXEC CPU utilization: cpuUtil1Second: 8% cpuUtil4Seconds: 9% cpuUtil64Seconds: 8% The following table describes the ma nag ement port CPU utilization statistics: Table 50 CPU statistics Statistics Descriptio[...]
-
Seite 55
Statistics commands 55 Table 51 SNMP statistics Statistics Description snmpInASNParseErrs The total number of ASN.1 (Abstract Syntax Notation One ) or BER (Basic Encoding Rules), errors encountered by the SNMP protocol entity when decoding SNMP messages received. The Open Systems Interconnection (OSI) method of specifying abstract objects is called[...]
-
Seite 56
Statistics commands 56 Table 51 SNMP statistics Statistics Description snmpOutGenErrs The total number of SNMP Protocol Data Units (PDUs), which were gene rated by the SNMP protocol entity and for whic h the value of the erro r-status field is genErr. snmpOutGetRequests The total number of SNMP Get-Request Protocol Data Units (PD Us), which have be[...]
-
Seite 57
Statistics commands 57 The following table describes the NT P statistics: Table 52 NTP statistics Statistics Description Primary Server Requests Sent: The total number of NTP requests the s witch sent to the primary NTP server to synchronize time. Responses Received: The total number of NTP responses received from the primary NTP server. Updates: T[...]
-
Seite 58
Configuration Commands 58 Configuration Commands Introduction The Configuration commands ar e available only from an administrator log in. They include commands for configuring every aspect of the swit ch. Changes can be saved to non-volatil e memory (NVRAM). The following table describes the b asic Configuration co mmands. T he following sections [...]
-
Seite 59
Configuration Commands 59 Table 55 System Configuration comma nds Command Usage [no] system notice <1-1024 characters multi-line> <’-‘ to end> Displays login notice immediatel y before the “Enter password:” prompt. This notice can contai n up to 1024 characters and new lines. Command mode: Global configuration [no] banner <1-[...]
-
Seite 60
Configuration Commands 60 Table 56 Syslog Configuration comma nds Command Description [no] logging log { <feature> } Displays a list of features for which syslog messages can be generated. You can choose to enable/disable specific features or enable/disable sy slog on all available features. Features include: • console • system • mgmt ?[...]
-
Seite 61
Configuration Commands 61 Table 57 SSHD Configuration comm ands Command Description no ssh scp-enable Disables the SCP apply and save. This is the default for SCP. Command mode: Global configuration ssh enable Enables the SSH server. Command mode: Global configuration no ssh enable Disables the SSH server. This is the default for the SSH server. Co[...]
-
Seite 62
Configuration Commands 62 TACACS+ server configuration TACACS+ (Terminal Access Controller Access Control Syste m) is an authentication protoc ol that allows a remote access server to forward a user's logon pass word to an authentication server to det ermine whether access can be allowed to a given system. TACACS+ and Remote Aut hentication Di[...]
-
Seite 63
Configuration Commands 63 IMPORTANT: If TACACS+ is enabled, you must l ogin usi ng TACACS+ authentication when connecting via the console or Telnet/SSH/HTTP/HTTPS. Backdoor for c onsole is al ways enabled, so you can con nect using notacacs and the administrator password even if the backdoor ( telnet ) or secure back door ( secbd ) are disabled. If[...]
-
Seite 64
Configuration Commands 64 System SNMP configuration The switch software supports SNMP-based network managem ent. In SNMP model of network management, a management station (client/manager) accesses a set of variables k nown as MIBs (Management Information Bas e) provided by the managed devic e (agent). If you are running an SNMP net work management [...]
-
Seite 65
Configuration Commands 65 SNMPv3 configuration SNMP version 3 (SNMPv3) is an extensible SNMP Fr amework that supplement s the SNMPv2 Framework by supporting the following: • a new SNMP message format • security for messages • access control • remote configuration of SNMP parameters For more details on the SNMPv3 architecture pl ease see RFC[...]
-
Seite 66
Configuration Commands 66 User Security Model configuration You can make use of a defined set of user identities us in g this Security Model. An SNMP engine must hav e the knowledge of applicable attributes of a us er. These commands help yo u create a user security model entry for an authorize d user. You need to provide a security name to create [...]
-
Seite 67
Configuration Commands 67 SNMPv3 View configuration The following table describes the SNMPv 3 View Configuration commands. Table 64 SNMPv3 View Configuration comma nds Command Description snmp-server view <1-128> name <1-32 characters> Defines the name for a family of vi ew subtrees up to a maximum of 32 characters. Command mode: Global[...]
-
Seite 68
Configuration Commands 68 Table 65 View-based Access Control Co nfiguration commands Command Description show snmp-server access <1-32> Displays the View-based Access Control configuration. Command mode: All SNMPv3 Group configuration The following table describes the SNMPv 3 Group Configuration commands. Table 66 SNMPv3 Group Configurati on [...]
-
Seite 69
Configuration Commands 69 SNMPv3 Target Address Table configuration These commands allo w you to configure an entry of a transport address that tra nsmits SNMP traps. The following table describes the SNMPv 3 Target Address Table Configuration commands. Table 68 SNMPv3 Target Address T able Configuration commands Command Description snmp-server tar[...]
-
Seite 70
Configuration Commands 70 SNMPv3 Notify Table configuration SNMPv3 uses Notificati on Originator to send out traps. A notificati on typically monitors a system for particular events or conditions, and generates Notification- Cla ss messages based on these events or con ditions. The following table describes the SNMPv 3 Notify Table Configuration co[...]
-
Seite 71
Configuration Commands 71 User Access Control configuration The following table describes the Us er Access Control commands. Table 73 User Access Control Configur ation commands Command Description access user <1-10> Configures the User ID. Command mode: Global configuration access user eject <1-10> Ejects the selected user from the swi[...]
-
Seite 72
Configuration Commands 72 HTTPS Access configuration The following table describes the HT TPS Access Configuration commands. Table 75 HTTP S Access Configuration commands Command Description [no] access https enable Enables or disables BBI a ccess (Web access) using HTTPS. The default value is disabled . Command mode: Global configuration access ht[...]
-
Seite 73
Configuration Commands 73 Port configuration Use the port configuration commands to conf igure settings for individual s witch ports. NOTE: Port 19 is reserved for switch management. The following table describes the Port Co nfiguration commands. The follo wing sections provide mor e detailed information and commands. Table 76 Port Configuration co[...]
-
Seite 74
Configuration Commands 74 Port link configuration Use these commands to set port parameters for the port link. Link commands are described in the follo wing table. Us ing these commands, you can set p ort parameters such as speed, duplex, flow control, and negotiation mode for the port link. The following table describes the Gig abit Link Configura[...]
-
Seite 75
Configuration Commands 75 Rapid S panning T ree Protocol / Multiple S panning T ree Protocol configuration The switch supports the IEEE 802.1w Rapid Spann ing Tr ee Protocol (RST P) and IEEE 802.1s Multiple Spanning Tree Protocol (MSTP). MST P allows you to map many VLANs to a small number of spanning tree grou ps, each with i ts own topol ogy. You[...]
-
Seite 76
Configuration Commands 76 Common Internal Spanning Tree configuration The Common Internal Spanning Tree (CIST) provides com patibilit y with different MSTP regions and with devices running different Spanning T ree instances. It is equivalent to Spanni ng Tree Group 0. The following table describes the comm ands used to configure CIST commands. Tabl[...]
-
Seite 77
Configuration Commands 77 CIST port configuration CIST port parameters are used to modify MRST operation on an indiv idual port basis. CIST parameters do not affect operation of STP/PVST. For each port, CIST is turned on by default. Port parameters include: • Port priority • Port path cost • Port Hello time • Link type • Edge • On and o[...]
-
Seite 78
Configuration Commands 78 S panning T r ee configuration The switch supports the IEEE 802.1d Spanning T ree Protocol (STP) and Cisco pro prietary PVST and PVST+ protocols. You can configure up to 31 spanni ng tree groups on the s witch (STG 32 is reserved for switch management). Spanning Tree is turned o n by default. NOTE: When RST P is turned on,[...]
-
Seite 79
Configuration Commands 79 Bridge Spanning Tree configuration Spanning tree bridge parameters can b e configured for each Spanning T ree Group. STP bridge parameters include: • Bridge priority • Bridge hello time • Bridge maximum age • Forwarding d elay • Current bridge configuration The following table describes the Bri dge Spanning T ree[...]
-
Seite 80
Configuration Commands 80 Spanning Tree port configuration By default for STP/PVST+, Spanning tree is turned Off for downlink ports (1-16), and turned On for cross-connect ports (17-18), and uplink ports (20-24). By default fo r RSTP/MSTP, Spanning tree is turn ed On for all downlink ports (1-16), all cross-connect ports (17-18), and all uplink por[...]
-
Seite 81
Configuration Commands 81 Forwarding Database configuration The following table describes the F orw arding Database Config uration commands. Table 86 FDB Configuration comman ds Command Description aging < 0-65535 > Configures the aging value for FDB entries. The default value is 300. show mac-address-table Displays current FDB parameters. St[...]
-
Seite 82
Configuration Commands 82 VLAN configuration The commands in this section configur e VLAN attributes , change the status of the VLAN, delete th e VLAN, and change the port membership of the VLAN. By default, the VLANs are disabled exc ept VLAN 1, which is always enabled. T he switch supports a maximum of 1,000 VLANs. VLAN 4095 is reserved for s wit[...]
-
Seite 83
Configuration Commands 83 IP interface configuration The switch can be configured with up to 256 IP interfaces . Each IP interface represents the s witch on an IP subnet on your network. The IP Interface option is disa bled by default. Interface 256 is reserved for s witch management. The following table describes the IP Interface Configur ation co[...]
-
Seite 84
Configuration Commands 84 Address Resolution Protocol configuration Address Resolution Protocol (ARP) is the T CP/IP protocol that resides within the Inte rnet layer. ARP resolves a physical address from an IP address. ARP quer ies machines on the local network for their ph ysical addresses. ARP also maintains IP to physical address pairs in it s c[...]
-
Seite 85
Configuration Commands 85 Table 94 IGMP Snooping commands Command Description [no] ip igmp snoop vlan <1-4095> fastleave Enables or disables Fastleave processing. Fastleave allows the switch to immediately remove a port from the IGMP port list, if the host sends a Leave mess age, and the proper conditions are met. This command is disabled by [...]
-
Seite 86
Configuration Commands 86 IGMP filter definition The following table describes the IGMP Filter Definiti on commands. Table 97 IGMP Filter Definition commands Command Description ip igmp profile <1-16> range <IP multicast address> <IP multicast address> Configures the range of IP multicast addresses for this filter. Enter the first[...]
-
Seite 87
Configuration Commands 87 Remote Monitoring configuration Remote Monitoring (RMON) allows you to monitor traffi c flo wing through the switch. The RMON MIB is described in RFC 1757. The following table describes t he RMON Config uration commands. Table 100 RMON commands Command Description show rmon Displays the current RMON configuration. Command [...]
-
Seite 88
Configuration Commands 88 Table 102 RMON Event commands Command Description no rmon event <1-65535> Deletes this event index. Command mode: Glo bal configuration show rmon event Displays the current RMON Event parameters. Command mode: All RMON alarm configuration The Alarm RMON group can track rising or falling valu es for a MIB object. The [...]
-
Seite 89
Configuration Commands 89 Port mirroring Port Mirroring is used to configure, enable, and disabl e the monitored port. Whe n enabled, network packets being sent and/or received on a target port are duplicated an d sent to a monitor port. By attaching a net work analyzer to the monitor port, you can collect detailed information a b out your network [...]
-
Seite 90
Configuration Commands 90 Failure Detection Pair configuration Use these commands to configure a Fail ure Detection Pair , which consists of one Link to Mon itor (LtM) and one Link to Disable (LtD). When the s witch detects a failure on the LtM, it automatically di sables the ports in the LtD. The following table describes the F ailure De tection P[...]
-
Seite 91
Configuration Commands 91 Saving the active switch configuration When the copy running-config tftp command is used, the active configur ation commands of the switch will be uploaded to the specified script conf igur ation file on the TFT P server. To start the switch configuration upload, at the prompt, enter: Switch(config)# copy running-config tf[...]
-
Seite 92
Operations Commands 92 Operations Commands Introduction Operations-level commands are used for making imm edi ate and temporary cha nges to s witch configuration. Operations commands are used for bringing ports temporari ly in and out of service. These commands are av ailable only from an administrator and operator lo gin. The following table descr[...]
-
Seite 93
Boot Options 93 Boot Options Introduction You must be logged in to the switch as the ad ministrator to use the Boot Optio ns commands. The Boot Options allow you to perform the follo wing functions: • Select a switch software image to be used when the switch is next reloaded. • Select a configuration block to be used when the switch is next rel[...]
-
Seite 94
Boot Options 94 5. The system prompts you to confirm your request. You should next select a software image to run, as described in the “Selecting a Soft Image to Ru n” section. 6. If you are loading an image from which you are not cu rrently booted, the system prompts you to change the image. image2 currently contains Software Version 1.1.0 tha[...]
-
Seite 95
Boot Options 95 5. The system then requests confirmation of what you have enter ed. To have the file uploaded, enter y. image2 currently contains Software Version 1.1.0 Upload will transfer image2 (1889411 bytes) to file "test" on TFTP server 192.1.1.1. Confirm upload operation [y/n]: y Selecting a configuration block When you make config[...]
-
Seite 96
Maintenance Commands 96 Maintenance Commands Introduction The Maintenance commands are used for debugging purpose s, enabling yo u to generate a technic al support dump of the critical state information in the switch, and to clear entries in the For warding Database and the Address Resolution Protocol (ARP) and routing tables. T hese co mmands are [...]
-
Seite 97
Maintenance Commands 97 Debugging options The Miscellaneous Debug comma nds display trace buffer information about events that can be helpful i n understanding switch operation. You can view the following information us ing Debug commands: • Events traced by the management processor (MP) • Events traced to a buffer area when a reset occurs If t[...]
-
Seite 98
Maintenance Commands 98 IGMP Snooping maintenance The following table describes the IGMP Snoop ing Maintenance commands. Table 116 IGMP Snooping Maintenanc e commands Command Usage show ip igmp groups address <IP address> Shows a single IGMP Multicast group by IP address. Command mode: All except User EXE C show ip igmp groups vlan <1-4095[...]
-
Seite 99
Maintenance Commands 99 TFTP system dump put Use this command to put (save) the system dump to a TFTP server. NOTE: If the TFTP server is running SunOS or the Solaris operati ng system, the specified copy flash-dump tftp (or ftp) file must exist prior to executing the copy flash-dump tftp command ( or copy flash-dump tftp ) command, and must be wri[...]
-
Seite 100
Maintenance Commands 100 Unscheduled system dump s If there is an unscheduled system dump to flash memor y, the following message is displayed when you log on to the sw itch: Note: A system dump exists in FLASH. The dump was saved at 13:43:22 Wednesday October 30, 2006. Use show flash-dump uuencode to extract the dump for analysis and clear flash-d[...]
-
Seite 101
Index 101 Index A abbreviating commands, 14 access control, user, 70 active configuration block, 59, 97 active switch configuration: gtcfg, 93; ptcfg, 92; restoring, 93 Address Resolution Protocol (ARP): address list, 99 Address Resolution Protocol (ARP) Menu, 33 aging: STP information, 28, 29 apply command, 13 auto-negotiation: enable/disable on p[...]
-
Seite 102
Index 102 S save command, 13, 97 save n command, 13 secret, radius server, 62 Secure Shell (SSH): encryption and authentication methods, 9 Secure Shell Server (SSHD) Menu, 61 shortcuts, 14 snap traces, buffer, 99 SNMP: set and get access, 65 SNMPv3 Access Table information, 18 SNMPv3 Community T able information, 19 SNMPv3 dump, 22 SNMPv3 Group Tab[...]