Home

Summit 200 Series Switch Installation and User Guide

image

Contents

1. 10 100 Mbps ports Mini GBIC Unit stacking Console port status LEDs ID LED port a IG OGG IG ODOGOGIG FGsreZigan m T T TTT TT p TEE Sere se 5 Extreme Networks Summit 200 24 coms 1000 baseT ports L Mini GBIC ports LC24001A A NOTE See Table 5 for information about supported mini GBIC types and distances 16 Summit 200 Series Switch Installation and User Guide Summit 200 24 Switch Physical Features A NOTE See Summit 200 24 Switch LEDs on page 17 for more details Console Port Use the console port 9 pin D type connector for connecting a terminal and carrying out local management Port Connections The Summit 200 24 switch has 24 1OBASE T 100BASE TX ports using RJ 45 connectors for communicating with end stations and other devices over 10 100Mbps Ethernet The switch also has four Gigabit Ethernet uplink ports These ports are labeled 25 and 26 on the front panel of the switch Two of the ports are 10 100 1000BASE T ports using RJ 45 connectors The other two ports are unpopulated receptacles for mini SFP GBICs using optical fibers with LC connectors The Summit 200 24 switch supports the use of 1000BASE SX 1000BASE LX or 1000BASE ZX mini GBICs A NOTE Only mini GBICs that have been certified by Extreme Networks available from Extreme Networks should be i
2. 28 Summit 200 Series Switch Installation and User Guide Connecting Equipment to the Console Port Free Standing The Summit 200 series switch is supplied with four self adhesive rubber pads Apply the pads to the underside of the device by sticking a pad in the marked area at each corner of the switch Stacking the Switch and Other Devices You can place up to four Summit switches on top of one another A NOTE This relates only to stacking the devices directly one on top of one another Apply the pads to the underside of the device by sticking a pad at each corner of the switch Place the devices on top of one another ensuring that the corners align Connecting Equipment to the Console Port Connection to the console port is used for direct local management The switch console port settings are set as follows e Baud rate 9600 e Data bits 8 e Stop bit 1 e Parity None e Flow control None A NOTE If you set the switch console port flow control to XON XOFF rather than None you will be unable to access the switch Do not set the switch console port flow control to XON XOFF The terminal connected to the console port on the switch must be configured with the same settings This procedure is described in the documentation supplied with the terminal Appropriate cables are available from your local supplier To make your own cables pinouts for a DB 9 male console connector are described in Table 10 T
3. Current time and time system uptime and time zone Operating environment fans e NVRAM configuration information Scheduled reboot information show tech support Displays the output for the following commands e show version e show switch e show config show diag e show gdb e show iparp e show ipfdb e show ipstats e show iproute e show igmp snooping detail e show memory detail e show log It also displays the output from internal debug commands This command disables the CLI paging feature show version Displays the hardware and software versions currently running on the switch 158 Summit 200 Series Switch Installation and User Guide Port Statistics Port Statistics ExtremeWare provides a facility for viewing port statistic information The summary information lists values for the current counter against each port on each operational module in the system and it is refreshed approximately every 2 seconds Values are displayed to nine digits of accuracy To view port statistics use the following command show ports lt portlist gt stats The following port statistic information is collected by the switch e Link Status The current status of the link Options are Ready the port is ready to accept a link Active the link is present at this port Chassis the link is connected to a Summit Virtual Chassis e Transmitted Packet Count Tx Pkt Count The number of packets
4. Summit 200 Series Switch Installation and User Guide Software Version 6 2e 2 Extreme Networks Inc 3585 Monroe Street Santa Clara California 95051 888 257 3000 http Awww extremenetworks com Published June 2003 Part Number 100149 00 Rev 01 2003 Extreme Networks Inc All rights reserved Extreme Networks and BlackDiamond are registered trademarks of Extreme Networks Inc in the United States and certain other jurisdictions ExtremeWare ExtremeWare Vista ExtremeWorks ExtremeAssist ExtremeAssist1 ExtremeAssist2 PartnerAssist Extreme Standby Router Protocol ESRP SmartTraps Alpine Summit Summit1 Summit4 Summit4 FX Summit7i Summit24 Summit48 Summit 200 Series Summit 200 24 Summit 200 48 Summit Virtual Chassis SummitLink SummitGbX SummitRPS and the Extreme Networks logo are trademarks of Extreme Networks Inc which may be registered or pending registration in certain jurisdictions The Extreme Turbodrive logo is a service mark of Extreme Networks which may be registered or pending registration in certain jurisdictions Specifications are subject to change without notice NetWare and Novell are registered trademarks of Novell Inc Merit is a registered trademark of Merit Network Inc Solaris is a trademark of Sun Microsystems Inc F5 BIG ip and 3DNS are registered trademarks of F5 Networks Inc see IT is a trademark of F5 Networks Inc Data Fellows the triangle symbol and Data Fellows product
5. Summit 200 Series Switch Installation and User Guide 131 Ethernet Automatic Protection Switching database FDB and sends a message on the control VLAN to all of its associated transit nodes to flush their forwarding databases as well so that all of the switches can learn the new paths to Layer 2 end stations on the reconfigured ring topology Trap Message Sent by a Transit Node When any transit node detects a loss of link connectivity on any of its ring ports it immediately sends a link down message on the control VLAN using its good link to the master node When the master node receives the link down message see Figure 26 it immediately declares a failed state and performs the same steps described above it unblocks its secondary port for access by the protected VLANs flushes its FDB and sends a flush FDB message to its associated transit nodes Restoration Operations The master node continues sending health check packets out its primary port even when the master node is operating in the failed state As long as there is a break in the ring the fail period timer of the master node will continue to expire and the master node will remain in the failed state When the broken link is restored the master will receive its health check packet back on its secondary port and will once again declare the ring to be complete It will logically block the protected VLANs on its secondary port flush its FDB and sen
6. Enables the EAPS domain with the specified name Displays EAPS status information Use the optional domain name parameter to display status information for a specific EAPS domain Sets the specified port s internal configuration state to INVALID causing the port to appear in the state Idle with a port status of Unknown when you use the show eaps lt name gt detail command to display port status information 134 Summit 200 Series Switch Installation and User Guide Commands for Configuring and Monitoring EAPS Creating and Deleting an EAPS Domain Each EAPS domain is identified by a unique domain name A NOTE Only a single EAPS domain per switch is supported by Summit 200 series switches To create an EAPS domain use the following command create e aps lt name gt The name parameter is a character string of up to 32 characters that identifies the EAPS domain to be created EAPS domain names and VLAN names must be unique Do not use the same name string to identify both an EAPS domain and a VLAN The following command example creates EAPS domain eaps_1 on the switch create eaps eaps_1 To delete an EAPS domain use the following command delete eaps lt name gt The following command example deletes the EAPS domain eaps_1 delete eaps eaps_1l Defining the EAPS Mode of the Switch To configure the EAPS node type of the switch use the following command config eaps lt name gt mode master tra
7. config bootprelay add lt ipaddress gt To delete an entry use the following command config bootprelay delete lt ipaddress gt all Verifying the DHCP BOOTP Relay Configuration To verify the DHCP BOOTP relay configuration use the following command show ipconfig This command displays the configuration of the BOOTP relay service and the addresses that are currently configured UDP Forwarding UDP forwarding is a flexible and generalized routing utility for handling the directed forwarding of broadcast UDP packets UDP forwarding allows applications such as multiple DHCP relay services from differing sets of VLANs to be directed to different DHCP servers The following rules apply to UDP broadcast packets handled by this feature e Ifthe UDP profile includes BOOTP or DHCP it is handled according to guidelines in RFC 1542 e Ifthe UDP profile includes other types of traffic these packets have the IP destination address modified as configured and changes are made to the IP and UDP checksums and decrements to the TTL field as appropriate If the UDP forwarding is used for BOOTP or DHCP forwarding purposes do not configure or use the existing bootprelay function However if the previous bootprelay functions are adequate you may continue to use them A NOTE UDP forwarding only works across a layer 3 boundary 190 Summit 200 Series Switch Installation and User Guide UDP Forwarding Configuring UDP Forwarding
8. 105 105 144 197 47 170 47 90 106 155 155 49 49 169 234 179 71 71 134 135 138 138 polling timers configuring 135 ring port unconfiguring 138 show eaps display fields table 140 status information displaying 138 switch mode defining 135 ECMP See IP route sharing EDP commands table 84 description 84 electromagnetic compatibility Summit 200 24 switch 224 Summit 200 48 switch 226 enabling a switch port 77 environmental requirements Summit 200 24 switch 223 Summit 200 48 switch 226 Equal Cost Multi Path ECMP routing See IP route sharing errors port 159 establishing a Telnet session 54 Ethernet ports autopolarity detection feature 78 Events RMON 166 export restrictions security licensing 39 SSH2 encryption protocol 39 Extensible Authentication Protocol See EAP Extreme Discovery Protocol See EDP ExtremeWare factory defaults 40 features 15 35 F FDB adding an entry 98 aging entries 97 blackhole entries 98 configuration commands table 99 configuring 99 contents 97 creating a permanent entry example 100 displaying 100 dynamic entries 97 entries 97 non aging entries 97 permanent entries 97 QoS profile association 98 feature licensing Advanced Edge functionality 38 description 38 Edge functionality 38 license keys 39 ordering 39 verifying 39 file server applications and QoS 145 flow control 78 Forwarding Database See FDB free standing installation
9. Destination Address MAC Based Groupings e Permanent e Dynamic e Blackhole Physical Logical Groupings Source port e VLAN Access List Based Traffic Groupings Access list based traffic groupings are based on any combination of the following items e IP source or destination address e TCP UDP or other layer 4 protocol e TCP UDP port information e MAC source or destination address e VLANid Access list based traffic groupings are defined using access lists Access lists are discussed in detail in Chapter 9 By supplying a named QoS profile at the end of the access list command syntax you can prescribe the bandwidth management and priority handling for that traffic grouping This level of packet filtering has no impact on performance 146 Summit 200 Series Switch Installation and User Guide Traffic Groupings MAC Based Traffic Groupings QoS profiles can be assigned to destination MAC addresses MAC based traffic groupings are configured using the following command create fdbentry lt mac_address gt vlan lt name gt blackhole port lt portlist gt dynamic gqosprofile lt qosprofile gt The MAC address options defined below are as follows e Permanent e Dynamic e Blackhole Permanent MAC addresses Permanent MAC addresses can be assigned a QoS profile whenever traffic is destined to the MAC address This can be done when you create a permanent FDB entry For example create fdbentry 00 11 22 33 44
10. Enables a loopback mode on an interface If loopback is enabled the router interface remains in the UP state even if no ports are defined in the VLAN As a result the subnet is always advertised as one of the available routes Table 54 describes the commands used to configure the IP route table Table 54 Route Table Configuration Commands Command Description config iproute add lt ipaddress gt lt mask gt lt gateway gt lt metric gt config iproute add blackhole lt ipaddress gt lt mask gt config iproute add default lt gateway gt lt metric gt Adds a static address to the routing table Use a value of 255 255 255 255 for mask to indicate a host entry Adds a blackhole address to the routing table All traffic destined for the configured IP address is dropped and no Internet Control Message Protocol ICMP message is generated Adds a default gateway to the routing table A default gateway must be located on a configured IP interface If no metric is specified the default metric of 1 is used Use the unicast only or multicast only options to specify a particular traffic type If not specified both unicast and multicast traffic uses the default route 184 Summit 200 Series Switch Installation and User Guide IP Commands Table 54 Route Table Configuration Commands continued Command config iproute delete lt ipaddress gt lt mask gt lt gateway gt config iproute delete black
11. VLAN Configuration Examples The following Summit 200 series switch example creates a tag based VLAN named video It assigns the VLANid 1000 Ports 4 through 8 are added as tagged ports to the VLAN create vlan video config video tag 1000 config video add port 4 8 tagged The following Summit 200 series switch example creates a VLAN named sales with the VLANid 120 The VLAN uses both tagged and untagged ports Ports 1 through 3 are tagged and ports 4 and 7 are untagged Note that when not explicitly specified ports are added as untagged create vlan sales config sales tag 120 config sales add port 1 3 tagged config sales add port 4 7 Displaying VLAN Settings To display VLAN settings use the following command show vlan lt name gt detail The show command displays summary information about each VLAN which includes e Name e VLANid e How the VLAN was created e IP address e STPD information e QoS profile information e Ports assigned e Tagged untagged status for each port e How the ports were added to the VLAN e Number of VLANs configured on the switch Use the detail option to display the detailed format 92 Summit 200 Series Switch Installation and User Guide MAC Based VLANs MAC Based VLANs MAC Based VLANs allow physical ports to be mapped to a VLAN based on the source MAC address learned in the FDB This feature allows you to designate a set of ports that have their VLAN membership dynamically
12. config tacacs accounting 65 config tacacs accounting shared secret 65 config time 45 config timezone 45 72 config udp profile add 192 config udp profile delete 192 config vlan add port 91 config vlan delete port 91 config vlan dhcp address range 70 config vlan dhcp lease timer 70 config vlan dhcp options 70 config vlan ipaddress 45 56 91 182 config vlan name 91 92 config vlan netlogin lease timer 70 config vlan priority 149 config vlan qosprofile 145 152 config vlan tag 91 config vlan udp profile 192 configure eaps failtime 134 create access list 105 107 create access mask 105 108 create access profile type 114 120 create account 45 48 create eaps 134 135 create fdbentry 99 147 create fdbentry blackhole 99 create fdbentry dynamic 99 create ospf area 198 210 create rate limit 105 109 create stpd 172 174 create udp profile 192 create vlan 45 92 D delete access list 106 110 delete access mask 106 110 delete access profile 120 delete account 45 delete eaps 134 135 delete fdbentry 99 delete ospf area 213 delete rate limit 106 110 delete stpd 175 delete udp profile 192 delete vlan 45 92 disable bootp 45 183 189 disable bootprelay 183 189 disable cli config logging 45 163 164 disable clipaging 45 disable dhcp ports vlan 70 disable diffserv examination ports 150 disable dlcs 155 disable dlcs ports 155 disable eapol flooding 71 72 248 Summit 200 Series Switch Installation and User Guide Index
13. 134 135 135 135 136 137 137 138 138 138 138 143 144 144 144 144 145 145 145 146 146 147 148 150 152 153 153 153 154 154 154 155 155 155 Summit 200 Series Switch Installation and User Guide Contents Chapter 13 Status Monitoring and Statistics Status Monitoring 157 Port Statistics 159 Port Errors 159 Port Monitoring Display Keys 160 Setting the System Recovery Level 161 Logging 161 Local Logging 162 Remote Logging 163 Logging Configuration Changes 163 Logging Commands 164 RMON 165 About RMON 165 RMON Features of the Switch 165 Configuring RMON 166 Event Actions 167 Chapter 14 Spanning Tree Protocol STP Overview of the Spanning Tree Protocol 169 Spanning Tree Domains 169 Defaults 170 STPD BPDU Tunneling 170 STP Configurations 170 Configuring STP on the Switch 172 STP Configuration Example 175 Displaying STP Settings 175 Disabling and Resetting STP 175 Chapter 15 IP Unicast Routing Overview of IP Unicast Routing 177 Router Interfaces 178 Populating the Routing Table 179 Subnet Directed Broadcast Forwarding 180 Proxy ARP 180 ARP Incapable Devices 181 Proxy ARP Between Subnets 181 Relative Route Priorities 181 Configuring IP Unicast Routing 182 Verifying the IP Unicast Routing Configuration 182 Summit 200 Series Switch Installation and User Guide 9 Contents Chapter 16 IP Commands Routing Configuration Example Displaying Router Settings Resetting and D
14. Description Enables TACACS accounting If accounting is use the TACACS client must also be enabled Enables CLI command authorization When enabled each command is transmitted to the remote TACACS server for authorization before the command is executed Displays the current TACACS configuration and statistics Displays the current TACACS accounting client configuration and statistics Unconfigures the TACACS client configuration Unconfigures the TACACS accounting client configuration Using Network Login Network login is a feature designed to control the admission of user packets into a network by giving addresses only to users that have been properly authenticated Network login is controlled by an administrator on a per port per VLAN basis and uses an integration of DHCP user authentication over the web interface and sometimes a RADIUS server to provide a user database or specific configuration details When network login is enabled on a port in a VLAN that port will not forward any packets until authentication takes place A NOTE Windows authentication is not supported via network login Network login has two modes of operation e Campus mode Campus mode is used when a port in a VLAN will move to another VLAN when authentication has been completed successfully This mode is for the roaming user who will not always be using the same port for authentication e ISP mode ISP mode is used when the
15. Interior Gateway Routing Protocols Figure 35 Virtual link providing redundancy Virtual link ee Cah S ABR 1 yo ABR 2 l 4 i l T j T ii Re HEE Wiel i bea bl Uh a EN Ma Area 1 Area 0 Area 3 EW_017 Point to Point Support You can manually configure the OSPF link type for a VLAN Table 60 describes the link types Table 60 OSPF Link Types Link Type Number of Routers Description Auto Varies ExtremeWare automatically determines the OSPF link type based on the interface type This is the default setting Broadcast Any Routers must elect a designated router DR and a backup designated router BDR during synchronization Ethernet is an example of a broadcast link Point to point Up to 2 Synchronizes faster than a broadcast link because routers do not elect a DR or BDR Does not operate with more than two routers on the same VLAN PPP is an example of a point to point link An OSPF point to point link supports only zero to two OSPF routers and does not elect a DR or BDR If you have three or more routers on the VLAN OSPF will fail to synchronize if the neighbor is not configured A NOTE The number of routers in an OSPF point to point link is determined per
16. Notify only Send trap to all trap receivers Notify and log Send trap place entry in RMON log To be notified of events using SNMP traps you must configure one or more trap receivers as described in Chapter 5 Managing the Switch Summit 200 Series Switch Installation and User Guide 167 Status Monitoring and Statistics 168 Summit 200 Series Switch Installation and User Guide Spanning Tree Protocol STP This chapter describes the following topics e Overview of the Spanning Tree Protocol on page 169 e Spanning Tree Domains on page 169 e STP Configurations on page 170 e Configuring STP on the Switch on page 172 e Displaying STP Settings on page 175 e Disabling and Resetting STP on page 175 Using the Spanning Tree Protocol STP functionality of the switch makes your network more fault tolerant The following sections explain more about STP and the STP features supported by ExtremeWare A NOTE STP is a part of the 802 1D bridge specification defined by the IEEE Computer Society To explain STP in terms used by the 802 1D specification the switch will be referred to as a bridge Overview of the Spanning Tree Protocol STP is a bridge based mechanism for providing fault tolerance on networks STP allows you to implement parallel paths for network traffic and ensure that e Redundant paths are disabled when the main paths are operational e Redundant paths are enabled if the main path fails Spa
17. To configure UDP forwarding the first thing you must do is create a UDP forward destination profile The profile describes the types of UDP packets by port number that are used and where they are to be forwarded You must give the profile a unique name in the same manner as a VLAN protocol filter or Spanning Tree Domain Next configure a VLAN to make use of the UDP forwarding profile As a result all incoming traffic from the VLAN that matches the UDP profile is handled as specified in the UDP forwarding profile A maximum of ten UDP forwarding profiles can be defined Each named profile may contain a maximum of eight rules defining the UDP port and destination IP address or VLAN A VLAN can make use of a single UDP forwarding profile UDP packets directed toward a VLAN use an all ones broadcast on that VLAN UDP Forwarding Example In this example the VLAN Marketing and the VLAN Operations are pointed toward a specific backbone DHCP server with IP address 10 1 1 1 and a backup server with IP address 10 1 1 2 Additionally the VLAN LabUser is configured to use any responding DHCP server on a separate VLAN called LabSvrs The commands for this configuration are as follows create udp profile backbonedhcp create udp profile labdhcp config backbonedhcp add 67 ipaddress 10 1 1 1 config backbonedhcp add 67 ipaddress 10 1 1 2 config labdhcp add 67 vlan labsvrs config marketing udp profile backbonedhcp config operati
18. all trusted gateway lt access_profile gt none e Import Filter Use an access profile to determine which RIP routes are accepted as valid routes This policy can be combined with the trusted neighbor policy to accept selected routes only from a set of trusted neighbors To configure an import filter policy use the following command config rip vlan lt name gt all import filter lt access_profile gt none Summit 200 Series Switch Installation and User Guide 115 Access Policies Export Filter Use an access profile to determine which RIP routes are advertised into a particular VLAN using the following command config rip vlan lt name gt all export filter lt access_profile gt none Examples In the example shown in Figure 21 a switch is configured with two VLANs Engsvrs and Backbone The RIP protocol is used to communicate with other routers on the network The administrator wants to allow all internal access to the VLANs on the switch but no access to the router that connects to the Internet The remote router that connects to the Internet has a local interface connected to the corporate backbone The IP address of the local interface connected to the corporate backbone is 10 0 0 10 24 Figure 21 RIP access policy example ORR oon 10 0 0 10 24 Backbone RIP 10 0 0 11 24 10 0 0 12 24 Switch bein Se a eee or aE oN ee configured SG owes 6 oa G 10
19. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab cd ab ed 01 02 04 50 60 mac group mac group mac group mac group mac group any any any any any engineering engineering sales sales sales Summit 200 Series Switch Installation and User Guide 95 Virtual LANs VLANs 96 Summit 200 Series Switch Installation and User Guide Forwarding Database FDB This chapter describes the following topics e Overview of the FDB on page 97 e Configuring FDB Entries on page 99 e Displaying FDB Entries on page 100 Overview of the FDB The switch maintains a database of all media access control MAC addresses received on all of its ports It uses the information in this database to decide whether a frame should be forwarded or filtered FDB Contents Each FDB entry consists of the MAC address of the device an identifier for the port on which it was received and an identifier for the VLAN to which the device belongs Frames destined for devices that are not in the FDB are flooded to all members of the VLAN FDB Entry Types The Summit 200 series switch supports up to 8 191 layer 2 FDB entries and 2 047 layer 3 FDB entries The following are four types of entries in the FDB e Dynamic entries Initially all entries in the database are dynamic Entries in the database are removed aged out if after a period of time aging time the
20. FDB Configuration Examples The following example adds a permanent entry to the FDB create fdbentry 00 E0 2B 12 34 56 vlan marketing port 4 The permanent entry has the following characteristics e MAC address is 00 E0 2B 12 34 56 e VLAN name is marketing e Port number for this device is 4 This example associates the QoS profile qp2 with a dynamic entry that will be learned by the FDB create fdbentry 00 A0 23 12 34 56 vlan net34 dynamic gosprofile qp2 This entry has the following characteristics e MAC address is 00A023123456 e VLAN name is net34 e The entry will be learned dynamically e QoS profile qp2 will be applied when the entry is learned Displaying FDB Entries To display FDB entries use the following command show fdb lt mac_address gt vlan lt name gt ports lt portlist gt permanent where mac_address Displays the entry for a particular MAC address vlan lt name gt Displays the entries for a VLAN ports lt portlist gt Displays the entries for a slot and port combination permanent Displays all permanent entries including the ingress and egress QoS profiles If you enter this command with no options specified the command displays all FDB entries 100 Summit 200 Series Switch Installation and User Guide Access Policies This chapter describes the following topics e Overview of Access Policies on page 101 e Using Access Control Lists on page 102 e Using Routing Acces
21. Overview Using ExtremeWare you can manage the switch using the following methods e Access the CLI by connecting a terminal or workstation with terminal emulation software to the console port e Access the switch remotely using TCP IP through one of the switch ports Remote access includes Telnet using the CLI interface SSH2 using the CLI interface SNMP access using ExtremeWare Enterprise Manager or another SNMP manager The switch supports up to the following number of concurrent user sessions e One console session e Eight Telnet sessions e Eight SSH2 sessions Summit 200 Series Switch Installation and User Guide 53 Managing the Switch Using the Console Interface The CLI built into the switch is accessible by way of the 9 pin RS 232 port labeled console located on the front of the Summit 200 series switch Once the connection is established you will see the switch prompt and you can log in Using Telnet Any workstation with a Telnet facility should be able to communicate with the switch over a TCP IP network Up to eight active Telnet sessions can access the switch concurrently If idletimeouts are enabled the Telnet connection will time out after 20 minutes of inactivity If a connection to a Telnet session is lost inadvertently the switch terminates the session within two hours Before you can start a Telnet session you must configure the switch IP parameters See Configuring Switch IP Param
22. S10 would result in a super loop Case 1 Summit 200 series switches on a single ring In this case EAPSv1 requires no STP support Case 2 Summit 200 series switches on a multi ring network along with ring connecting switches not running EAPSvz2 In this case the Summit 200 series switches still cannot be ring connecting nodes and this implementation requires configuring EAPSv1 plus STP support to prevent super loops This configuration process is described in the EAPS chapter of the ExtremeWare Software User Guide Version 7 0 0 Case 3 Summit 200 series switches on a multi ring network along with ring connecting switches running EAPSvz2 In this case the Summit 200 series switches still cannot be ring connecting nodes but configuring EAPSv1 plus EAPSv2 means that the EAPS awareness of the ring connecting switches would prevent problems with super loops without requiring STP support This configuration process is described in the EAPS chapter of the ExtremeWare Software User Guide Version 7 1 0 Summit 200 Series Switch Installation and User Guide 133 Ethernet Automatic Protection Switching Commands for Configuring and Monitoring EAPS Table 34 lists the ExtremeWare EAPS commands Each command is described in detail in the sections that follow Table 34 EAPS Commands Command Description config eaps lt name gt mode master transit config eaps lt name gt hellotime lt seconds gt failtime
23. SYN _______ lt SYN ACK _ E ACK gt A Host B EW_036 An access list that uses the permit established keyword filters the SYN packet in one direction Use the permit established keyword to allow only host A to be able to establish a TCP session to host B and to prevent any TCP sessions from being initiated by host B as illustrated in Figure 18 The commands for this access control list is as follows create access mask tcp_connection_mask ipprotocol dest ip 32 dest L4port permit established ports precedence 1000 create access list telnet deny tcp_connection_mask ipprotocol tcp dest ip 10 10 10 100 32 dest L4port 23 ports 10 permit established A NOTE This step may not be intuitive Pay attention to the destination and source address the ingress port that the rule is applied to and the desired affect A NOTE This rule has a higher precedence than the rule tcp2_1 and tcp1_2 Figure 19 shows the final outcome of this access list 112 Summit 200 Series Switch Installation and User Guide Using Access Control Lists Figure 19 Permit established access list filters out SYN packet to destination a sw gt _ amp _ 10 10 10 100 10 10 20 100 EW_037 Example 2 Filter ICMP Packets This example creates an access list that filters out ping ICMP echo packets ICMP echo packets are defined as type 8 code 0 The commands to c
24. refers to information contained within a packet intended to explicitly determine a class of service That information includes e IP DiffServ code points formerly known as IP TOS bits e Prioritization bits used in IEEE 802 1p packets An advantage of explicit packet marking is that the class of service information can be carried throughout the network infrastructure without repeating what can be complex traffic grouping policies at each switch location Another advantage is that end stations can perform their own packet marking on an application specific basis The Summit 200 series switch has the capability of observing and manipulating packet marking information with no performance penalty The documented capabilities for 802 1p priority markings or DiffServ capabilities are not impacted by the switching or routing configuration of the switch For example 802 1p information can be preserved across a routed switch boundary and DiffServ code points can be observed or overwritten across a layer 2 switch boundary A NOTE Re marking DiffServ code points is supported through access lists See Chapter 9 Access Policies for more information Configuring 802 1p Priority Extreme switches support the standard 802 1p priority bits that are part of a tagged Ethernet packet The 802 1p bits can be used to prioritize the packet and assign it to a particular QoS profile When a packet arrives at the switch the switch examines the 802 1p p
25. verifying the installation 31 54 Summit 200 24 switch oe Pod Dana a Nas using 54 certification marks 224 REN temperature and humidity dimensions 223 S it 200 24 223 lectromagnetic compatibility 224 Laie a ne mmental requirement 223 Summit 200 48 226 Sens EqurementS Terminal Access Controller Access Control System Plus See front view 16 TACACS heat dissipation 223 244 Summit 200 Series Switch Installation and User Guide Index TFIP types 86 server 231 UDP Forwarding 191 using 233 voice applications QoS 144 timed configuration download MAC based VLANs 94 traceroute command 50 Ww poe AR web browsing applications and QoS 145 transmit errors 159 aa 200 24 223 eee updates oe Summit 200 48 22 U UDP Forwarding and BOOTP 190 and DHCP 190 configuration commands table 192 configuring 191 description 190 example 191 profiles 191 VLANs 191 upgrading the image 231 uploading the configuration 233 user account 47 users access levels 46 authenticating 60 creating 48 default 47 viewing 49 V verifying the installation 31 video applications and QoS 144 viewing accounts 49 Virtual LANs See VLANs virtual link OSPF 199 VLAN tagging 88 VLANs and STP 170 assigning a tag 88 benefits 85 configuration commands table 91 configuration examples 92 configuring 91 default 90 description 36 disabling route advertising 195 displaying settings 92 MAC based description 93 example 94 groups 93 guidelines
26. 1 1 1 24 10 2 1 1 24 LC24011 Assuming the backbone VLAN interconnects all the routers in the company and therefore the Internet router does not have the best routes for other local subnets the commands to build the access policy for the switch would be create access profile nointern ipaddress config access profile nointern mode deny add 10 0 0 10 32 gateway nointernet config access profile nointern Qc ct ct config rip vlan backbone trust 116 Summit 200 Series Switch Installation and User Guide Using Routing Access Policies In addition if the administrator wants to restrict any user belonging to the VLAN Engsvrs from reaching the VLAN Sales IP address 10 2 1 0 24 the additional access policy commands to build the access policy would be create access profile nosales ipaddress config access profile nosales mode deny config access profile nosales add 10 2 1 0 24 config rip vlan backbone import filter nosales This configuration results in the switch having no route back to the VLAN Sales Routing Access Policies for OSPF Because OSPF is a link state protocol the access policies associated with OSPF are different in nature than those associated with RIP Access policies for OSPF are intended to extend the existing filtering and security capabilities of OSPF for example link authentication and the use of IP address ranges If you are using the OSPF protocol the switch can be configured
27. 2001 The following example of the show eaps lt name gt detail command displays detailed EAPS information for a single EAPS domain named eaps2 on the master node Table 35 describes significant fields and values in the display Baker1l5 4 show eaps2 detail ame eaps2 instance 0 State Complete Running Yes Enabled Yes Mode Master Primary port 14 Port status Up Tag status Tagged Secondary port 13 Port status Blocked Tag status Tagged Hello Timer interval 1 sec Fail Timer interval 3 sec Eaps Domain has following Controller Vlan Vlan Name VID Wrhsc 0020 EAPS Domain has following Protected Vlan s Vlan Name VID blue 1003 traffic 1001 Number of Protected Vlans 2 Summit 200 Series Switch Installation and User Guide 139 Ethernet Automatic Protection Switching Table 35 show eaps Display Fields Field Description EAPS Enabled Number of EAPS instances EAPSD Bridge links Name Instance State Running Enabled Mode Primary Secondary port Current state of EAPS on this switch Yes EAPS is enabled on the switch no EAPS is not enabled Number of EAPS domains created There can only be one EAPS domain on this platform The total number of EAPS bridge links in the system The maximum count is 255 Each time a VLAN is added to EAPS this count increments by 1 The configured name for this EAPS domain The inst
28. 29 full duplex 17 20 G Greenwich Mean Time offset offset values table 73 240 Summit 200 Series Switch Installation and User Guide Index H K hardware address 19 22 keys heat dissipation line editing 43 Summit 200 24 switch 223 port monitoring 160 Summit 200 48 switch 226 History RMON 166 L laser safety certifications l Summit 200 24 switch 224 ICMP configuration commands table 185 Summit 200 48 switch 226 IEEE 802 1Q 88 LEDs IEEE 802 1x Summit 200 24 switch 17 EAP Over LANs EAPOL 71 Summit 200 48 switch 21 Extensible Authentication Protocol EAP 71 license keys 39 IGMP licensing configuration commands table 216 Advanced Edge functionality 38 description 215 description 38 disabling 217 Edge functionality 38 reset and disable commands table 217 license keys 39 snooping ordering 39 configuration information displaying 217 verifying 39 described 215 line editing keys 43 resetting 217 link state database 196 image link state protocol description 194 downloading 231 load sharing primary and secondary 232 algorithms 80 upgrading 231 configuring 81 installation description 80 free standing 29 load sharing group description 80 rack 28 master port 81 verifying 31 verifying the configuration 82 interfaces router 178 local logging 162 IP address entering 55 log display 162 IP multicast groups and IGMP snooping 215 logging IP route sharing 180 and Telnet 162 IP TOS configuration commands table 150 commands t
29. 5 reach the router by way of the VLAN Personnel The example in Figure 37 is configured as follows create vlan Finance create vlan Personnel config Finance add port 2 4 config Personnel add port 3 5 config Finance ipaddress 192 207 35 1 config Personnel ipaddress 192 207 36 1 enable ipforwarding config rip add vlan all enable rip Summit 200 Series Switch Installation and User Guide 205 Interior Gateway Routing Protocols Displaying RIP Settings To display settings for RIP use the commands listed in Table 62 Table 62 RIP Show Commands Command Description show rip detail show rip stat detail show rip stat vlan lt name gt show rip vlan lt name gt Displays RIP configuration and statistics for all VLANs Displays RIP specific statistics for all VLANs Displays RIP specific statistics for a VLAN Displays RIP configuration and statistics for a VLAN Resetting and Disabling RIP To return RIP settings to their defaults or to disable RIP use the commands listed in Table 63 Table 63 RIP Reset and Disable Commands Command Description config rip delete vlan lt name gt all disable rip disable rip aggregation disable rip export static direct ospf ospf intra ospf inter ospf extern1 ospf extern2 metric lt metric gt tag lt number gt disable rip originate default disable rip poisonreverse disable rip splithorizon disable rip triggerupdates unconfi
30. 55 vlan default port 4 gqosprofile qp2 Dynamic MAC Addresses Dynamic MAC addresses can be assigned a QoS profile whenever traffic is destined to the MAC address For any port on which the specified MAC address is learned in the specified VLAN the port is assigned the specified QoS profile For example create fdbentry 00 11 22 33 44 55 vlan default dynamic gqosprofile qp3 The QoS profile is assigned when the MAC address is learned If a client s location moves the assigned QoS profile moves with the device If the MAC address entry already exists in the FDB you can clear the forwarding database so that the QoS profile can be applied when the entry is added again Use the following command to clear the FDB clear fdb Blackhole MAC Address Using the blackhole option configures the switch to not forward any packets to the destination MAC address on any ports for the VLAN specified The blackhole option is configured using the following command create fdbentry 00 11 22 33 44 55 vlan default blackhole Verifying MAC Based QoS Settings To verify any of the MAC based QoS settings use either the command show fdb permanent or the command show gosprofile lt qosprofile gt Summit 200 Series Switch Installation and User Guide 147 Quality of Service QoS Explicit Class of Service 802 1p and DiffServ Traffic Groupings This category of traffic groupings describes what is sometimes referred to as explicit packet marking and
31. 92 After a successful login has been achieved there are several ways that a port can return to a non authenticated non forwarding state e The user successfully logs out using the logout web browser window e The link from the user to the switch s port is lost e An administrator changes the port state A NOTE Because network login is sensitive to state changes during the authentication process Extreme Networks recommends that you do not log out until the login process is completed The login process is completed when you receive a permanent address Using Network Login in ISP Mode In ISP mode a RADIUS server might be used to provide user authentication No Extreme specific lines are required for the dictionary or the user file Configuring ISP Mode Configure the switch to use network login in ISP mode using this command enable netlogin ports lt portlist gt vlan lt name gt A NOTE Network login is used on a per port per VLAN basis A port that is tagged can belong to more than one VLAN In this case network login can be enabled on one port for each VLAN Example Configuration Using ISP Mode This example creates a permanent VLAN named corp on the switch This VLAN will be used for authentication through RADIUS The radius server is 10 201 26 243 and the IP address of the switch is 10 201 26 11 The secret is secret Port 9 is added to the VLAN corp Network login is enabled on the port create vla
32. Example config nat add out_vlan_1l map source 192 168 1 0 24 to 216 52 8 1 216 52 8 31 Creating Portmap NAT Rules To configure portmap NAT rules use this command config nat add delete vlan lt outside_vlan gt map source any lt ipaddress gt lt bits gt lt netmask gt to lt ip gt lt mask gt lt netmask gt lt ipaddress gt tcp udp both portmap lt min gt lt max gt The addition of an L4 protocol name and the portmap keyword tells the switch to use portmap mode Optionally you may specify the range of L4 ports the switch chooses on the translated IP addresses but there is a performance penalty for doing this Remember that portmap mode will only translate TCP and or UDP so a dynamic NAT rule must be specified after the portmap rule in order to allow ICMP packets through without interfering with the portmapping Portmap NAT Rule Example config nat add out_vlan_2 map source 192 168 2 0 25 to 216 52 8 32 28 both portmap Portmap Min Max Example config nat add out_vlan_2 map source 192 168 2 128 25 to 216 52 8 64 28 tcp portmap 1024 8192 Summit 200 Series Switch Installation and User Guide 125 Network Address Translation NAT Creating Auto Constrain NAT Rules To create auto constrain NAT rules use the following command config nat add delete vlan lt outside_vlan gt map source any lt ipaddress gt lt bits gt lt netmask gt to lt ip gt lt mask gt lt n
33. Installation and User Guide Using the Simple Network Time Protocol 5 Optionally the interval for which the SNTP client updates the real time clock of the switch can be changed using the following command config sntp client update interval lt seconds gt The default sntp client update interval value is 64 seconds 6 You can verify the configuration using the following commands show sntp client This command provides configuration and statistics associated with SNTP and its connectivity to the SNTP server show switch This command indicates the GMT offset Daylight Savings Time and the current local time NTP updates are distributed using GMT time To properly display the local time in logs and other timestamp information the switch should be configured with the appropriate offset to GMT based on geographical location Table 23 describes GMT offsets Table 23 Greenwich Mean Time Offsets GMT Offset in GMT Offset Common Time Zone Hours in Minutes References Cities 0 00 0 GMT Greenwich Mean London England Dublin Ireland f Edinburgh Scotland Lisbon aoe a ee Portugal Reykjavik Iceland Casablanca Morocco WET Western European 1 00 60 WAT West Africa Azores Cape Verde Islands 2 00 120 AT Azores 3 00 180 Brasilia Brazil Buenos Aires Argentina Georgetown Guyana 4 00 240 AST Atlantic Standard Caracas La Paz 5 00 300 EST Eastern Standard Bogota Columbia Lima Peru New Yor
34. Option RFC 1122 Host requirements IEEE 802 1D 1998 802 1p Packet priority IEEE 802 1Q VLAN tagging RFC 2474 DiffServ Precedence RFC 783 TFTP RFC 1542 BootP RFC 854 Telnet RFC 768 UDP RFC 791 IP RFC 792 ICMP RFC 793 TCP RFC 826 ARP RFC 2068 HTTP RFC 2131 BootP DHCP relay RFC 2030 Simple Network Time Protocol RFC 1256 Router discovery protocol RFC 1812 IP router requirement RFC 1519 CIDR Management and Security RFC 1157 SNMP vi1 v2c RFC 1213 MIB II RFC 1354 IP forwarding table MIB RFC 1493 Bridge MIB RFC 2037 Entity MIB RFC 1573 Evolution of Interface RFC 1643 Ethernet MIB RFC 1757 Four groups of RMON ExtremeWare VLAN Configuration private MIB RFC 2021 RMON probe configuration RFC 2239 802 3 MAU MIB RFC 1724 RIP v2 MIB RFC 1850 OSPF v2 MIIB ExtremeWare Enterprise MIB HTML and Telnet management RFC 2138 RADIUS RFC 2925 Ping MIB RFC 2233 Interface MIB RFC 2096 IP Forwarding Table MIB 999 local messages criticals stored across reboots Summit 200 Series Switch Installation and User Guide 229 Supported Standards 230 Summit 200 Series Switch Installation and User Guide software Upgrade and Boot Options This appendix describes the following topics e Downloading a New Image on page 231 e Saving Configuration Changes on page 232 e Using TFIP to Upload the Configuration on page 233 e Using TFIP to Download the Configuration on page 234 e Upgrading and Accessing Boo
35. Priorities include critical emergency alert error warning notice info and debug If not specified only critical priority messages and are sent to the syslog host Disables configuration logging Disables the log display Disables logging to a remote syslog host Enables the logging of CLI configuration commands to the Syslog for auditing purposes The default setting is enabled Enables the log display Enables logging to a remote syslog host 164 Summit 200 Series Switch Installation and User Guide RMON Table 48 Logging Commands continued Command Description show log lt priority gt Displays the current snapshot of the log Specify the priority option to filter the log to display message with the selected priority or higher more critical Priorities include critical emergency alert error warning notice info and debug If not specified all messages are displayed show log config Displays the log configuration including the syslog host IP address the priority level of messages being logged locally and the priority level of messages being sent to the syslog host RMON Using the Remote Monitoring RMON capabilities of the switch allows network administrators to improve system efficiency and reduce the load on the network The following sections explain more about the RMON concept and the RMON features supported by the switch A NOTE You can only use the RMON features of the system if y
36. STP is enabled for the associated STPD The default setting is enabled 174 Summit 200 Series Switch Installation and User Guide Displaying STP Settings STP Configuration Example The following Summit 200 series switch example creates and enables an STPD named Backbone_st It assigns the Manufacturing VLAN to the STPD It disables STP on ports 1 through 7 and port 12 create stpd backbone_st config stpd backbone_st add vlan manufacturing enable stpd backbone_st disable stpd backbone_st port 1 7 12 Displaying STP Settings To display STP settings use the following command show stpd lt stpd_name gt This command displays the following information e STPD name e Bridge ID e STPD configuration information To display the STP state of a port use the following command show stpd lt stpd_name gt port lt portlist gt This command displays the following information e STPD port configuration e STPD state root bridge and so on e STPD port state forwarding blocking and so on Disabling and Resetting STP To disable STP or return STP settings to their defaults use the commands listed in Table 51 Table 51 Commands to Disable or Reset STP Command Description delete stpd lt stpd_name gt Removes an STPD An STPD can only be removed if all VLANs have been deleted from it The default STPD s0 cannot be deleted disable ignore bpdu vlan lt name gt Allows the switch to recognize STP BPDUs disa
37. Switch Installation and User Guide 195 Interior Gateway Routing Protocols A NOTE If you are using RIP with supernetting Classless Inter Domain Routing CIDR you must use RIPv2 only In addition RIP route aggregation must be turned off Overview of OSPF OSPF is a link state protocol that distributes routing information between routers belonging to a single IP domain also known as an autonomous system AS In a link state routing protocol each router maintains a database describing the topology of the autonomous system Each participating router has an identical database maintained from the perspective of that router From the link state database LSDB each router constructs a tree of shortest paths using itself as the root The shortest path tree provides the route to each destination in the autonomous system When several equal cost routes to a destination exist traffic can be distributed among them The cost of a route is described by a single metric A NOTE A Summit 200 series switch can support up to two non passive OSPF interfaces and cannot be a designated or a backup designated router Link State Database Upon initialization each router transmits a link state advertisement LSA on each of its interfaces LSAs are collected by each router and entered into the LSDB of each router Once all LSAs are received the router uses the LSDB to calculate the best routes for use in the IP routing table OSPF uses flooding
38. Temp IP Unknown DHCP Not Enabled User auto MAC 00 10 A4 A9 11 3B Disabling Network Login Network login must be disabled on a port before you can delete a VLAN that contains that port To disable network login use the following command disable netlogin ports lt portlist gt vlan lt name gt Using EAPOL Flooding Port based Network Access Control IEEE 802 1x uses Extensible Authentication Protocol EAP as the underlying mechanism for transferring information between the three network entities engaged in the IEEE 802 1x port authentication access control process the supplicant the authenticator and the authenticating server The encapsulating mechanism used for communication between the supplicant and the authenticator is referred to as EAP Over LANs or EAPOL By default per IEEE 802 1D Summit 200 series switches do not forward EAPOL frames Under certain conditions you might opt to change this behavior to support an upstream central authenticator by enabling the switch to flood the EAPOL frame on the VLAN associated with the ingress port The following example enables EAPOL frame flooding on a Summit 200 series switch enable eapol flooding When EAPOL flooding is enabled on the switch you can verify that status by using the command show config The following example disables EAPOL frame flooding on a Summit 200 series switch disable eapol flooding You can verify the current EAPOL flooding state by using the c
39. User Guide Summit 200 48 Switch Physical Features Summit 200 48 Switch LEDs Table 4 describes the LED behavior on the Summit 200 48 switch Table 4 Summit 200 48 switch LED behavior Unit Status LED MGMT LED Color Indicates Green solid The Summit switch is operating normally Green blinking The Summit switch POST is in progress Amber The Summit switch has failed its POST or an overheat condition is detected Fan LED Color Indicates Green The fan is operating normally Amber blinking A failed condition is present on the fan Port Status LEDs Ports 1 50 Color Indicates Green Link is present port is enabled Green blinking Link is present port is enabled and there is activity on the port Off Link is not present or the port is disabled Media Selection Fiber LEDs Ports 49 and 50 Color Indicates Green Fiber link is selected mini GBIC is present and being used for the Gigabit Ethernet uplink Off 1000BASE T link is selected the switch is using the RJ 45 port for the Gigabit Ethernet uplink Summit 200 48 Switch Rear View Figure 4 shows the rear view of the Summit 200 48 switch Figure 4 Summit 200 48 switch rear view SHIZ BlTG Le J gs Q0 20020 g 20020 P o e A O O 4 2 2 H s e e I i AN ANI 200000 ane Power socket LC48002 Power Socket The Summit 200 48 switch automatically adjusts to the supply voltage The power supply ope
40. add blackhole config iproute add default config iproute delete config iproute delete blackhole config iproute delete default config iproute priority config irdp config log display config mirroring add config mirroring delete config nat finrst timeout config nat icmp timeout config nat syn timeout config nat tcp timeout config nat timeout config nat udp timeout config nat vlan config osfp area nssa config osfp ase limit config ospf add virtual link config ospf add vlan config ospf add vlan area link type config ospf area add range config ospf area delete range config ospf area external filter config ospf area interarea filter config ospf area normal config ospf area nssa config ospf area stub config ospf asbr filter config ospf ase limit config ospf ase summary add config ospf ase summary delete config ospf authentication config ospf cost config ospf delete virtual link config ospf delete vlan config ospf direct filter 184 184 56 182 184 185 185 185 182 185 185 162 164 122 124 198 197 208 208 207 208 208 117 119 117 119 208 208 208 117 119 208 208 208 209 207 207 209 209 117 120 209 Summit 200 Series Switch Installation and User Guide 247 Index of Commands config ospf lsa batching timer config ospf metric table config ospf originate default config ospf routerid config ospf spf hold time config ospf timer config ospf vlan confi
41. are not active Summit 200 Series Switch Installation and User Guide 179 IP Unicast Routing A NOTE If you define multiple default routes the route that has the lowest metric is used If multiple default routes have the same lowest metric the system picks one of the routes You can also configure blackhole routes Traffic to these destinations is silently dropped IP Route Sharing IP route sharing allows multiple equal cost routes to be used concurrently IP route sharing can be used with static routes or with OSPF routes In OSPF this capability is referred to as equal cost multipath ECMP routing To use IP route sharing use the following command enable iproute sharing Next configure static routes and or OSPF as you would normally ExtremeWare supports unlimited route sharing across static routes and up to eight ECMP routes for OSPF Route sharing is useful only in instances where you are constrained for bandwidth This is typically not the case using Extreme switches Using route sharing makes router troubleshooting more difficult because of the complexity in predicting the path over which the traffic will travel Subnet Directed Broadcast Forwarding You can enable or disable the hardware forwarding of subnet directed broadcast IP packets This allows the switch to forward subnet directed broadcast packets at wire speed To enable or disable hardware forwarding use the following command enable disable ipforw
42. are permitted to be forward by this switch An optional QoS profile can be assigned to the access list so that the switch can prioritize packets accordingly e set Modify the DiffServ code point or the 802 1p value for matching forwarded packets e limit Specifies the rate limit e lt rate_in_Mbps gt The rate limit For 100 Mbps ports specify a value from 1 to 100 Mbps in 1 Mbps increments For 1000 Mbps ports specify a value from 8 to 1000 Mbps in increments of 8 Mbps e exceed action Action to take for matching packets that exceed the rate Summit 200 Series Switch Installation and User Guide 109 Access Policies Table 30 Access Control List Configuration Commands continued Command Description delete access list lt name gt Deletes an access list delete access mask lt name gt Deletes an access mask Any access lists or rate limits that reference this mask must first be deleted delete rate limit lt name gt Deletes a rate limit show access list lt name gt ports lt portlist gt Displays access list information show access mask lt name gt Displays access list information show rate limit lt name gt ports lt portlist gt Displays access list information Access Control List Examples This section presents three access control list examples e Using the permit establish keyword e Filtering ICMP packets e Using a rate limit Using the Permit Established Keyword This ex
43. can configure the system to maintain a running real time display of log messages on the console To turn on the log display use the following command enable log display To configure the log display use the following command config log display lt priority gt If priority is not specified only messages of critical priority are displayed If you enable the log display on a terminal connected to the console port your settings will remain in effect even after your console session is ended unless you explicitly disable the log display When using a Telnet connection if your Telnet session is disconnected because of the inactivity timer or for other reasons the log display is automatically halted You must restart the log display by using the enable log display command 162 Summit 200 Series Switch Installation and User Guide Logging Remote Logging In addition to maintaining an internal log the switch supports remote logging by way of the UNIX syslog host facility To enable remote logging follow these steps 1 Configure the syslog host to accept and log messages 2 Enable remote logging by using the following command enable syslog 3 Configure remote logging by using the following command config syslog add lt ipaddress gt lt facility gt lt priority gt where ipaddress Specifies the IP address of the syslog host facility Specifies the syslog facility level for local use Options include local0 throu
44. disabled on the interface the parameters are not reset to their defaults Configures the RIP garbage time The timer granularity is 10 seconds The default setting is 120 seconds Configures the route timeout The default setting is 180 seconds Changes the RIP receive mode for one or all VLANs Specify e none Drop all received RIP packets e vlonly Accept only RIP v1 format packets e v2only Accept only RIP v2 format packets e any Accept both RIP v1 and v2 packets If no VLAN is specified the setting is applied to all VLANs The default setting is any Changes the RIP transmission mode for one or all VLANs Specify e none Do not transmit any packets on this interface e vilonly Transmit RIP v1 format packets to the broadcast address e vicomp Transmit RIP v2 format packets to the broadcast address e v2only Transmit RIP v2 format packets to the RIP multicast address If no VLAN is specified the setting is applied to all VLANs The default setting is v2only Changes the periodic RIP update timer The default setting is 30 seconds Configures the cost metric of the interface The default setting is 1 Enables RIP The default setting is disabled Summit 200 Series Switch Installation and User Guide 203 Interior Gateway Routing Protocols Table 61 RIP Configuration Commands continued Command enable rip aggregation enable rip export static direct ospf ospf
45. endstation The switch keeps aging out endstation entries in the switch Forwarding Database FDB Reduce the number of topology changes by disabling STP on those systems that do not use redundant paths Specify that the endstation entries are static or permanent Debug Tracing ExtremeWare includes a debug tracing facility for the switch The show debug tracing command can be applied to one or all VLANs as follows show debug tracing vlan lt name gt The debug commands should only be used under the guidance of Extreme Networks technical personnel TOP Command The top command is a utility that indicates CPU utilization by process Contacting Extreme Technical Support If you have a network issue that you are unable to resolve contact Extreme Networks technical support Extreme Networks maintains several Technical Assistance Centers TACs around the world to answer networking questions and resolve network problems You can contact technical support by phone at e 800 998 2408 e 408 579 2826 or by email at e support extremenetworks com You can also visit the support website at e http www extremenetworks com extreme support techsupport asp to download software updates requires a service contract and documentation Summit 200 Series Switch Installation and User Guide 237 Troubleshooting 238 Summit 200 Series Switch Installation and User Guide Index Numerics autonegotiation 77 802 1
46. established keyword e Egress port e Ingress ports An access mask can also have an optional unique precedence number associated with it Access Lists Each entry that makes up an access list contains a unique name and specifies a previously created access mask The access list also includes a list of values to compare with the incoming packets and an action to take for packets that match When you create an access list you must specify a value for each of the fields that make up the access mask used by the list 102 Summit 200 Series Switch Installation and User Guide Using Access Control Lists For packets that match a particular access control list you can specify the following actions e Drop Drop the packets Matching packets are not forwarded e Permit established Drop the packet if it would initiate a new TCP session see The permit established Keyword on page 104 e Permit Forward the packet You can send the packet to a particular QoS profile and modify the packet s 802 1p value and or DiffServe code point Rate Limits Each entry that makes up a rate limit contains a unique name and specifies a previously created access mask Like an access list a rate limit includes a list of values to compare with the incoming packets and an action to take for packets that match Additionally a rate limit specifies an action to take when matching packets arrive at a rate above the limit you set When you create a
47. exception The default setting is none Configures the system date and time The format is as follows mm dd yyyy hh mm ss The time uses a 24 hour clock format You cannot set the year past 2036 Configures the time zone information to the configured offset from GMT time The format of gmt_offset is minutes from GMT time Specify e autodst Enables automatic Daylight Savings Time change e noautodst Disables automatic Daylight Savings Time change The default setting is autodst Configures an IP address and subnet mask for a VLAN Creates a user account This command is available to admin level users and to users with RADIUS command authorization The username is between 1 and 32 characters the password is between 0 and 16 characters Creates a VLAN Deletes a user account Deletes a VLAN Disables BOOTP for one or more VLANs Disables logging of CLI commands to the Syslog Disables pausing of the screen display when a show command output reaches the end of the page Disables the timer that disconnects all sessions Once disabled console sessions remain open until the switch is rebooted or you logoff Telnet sessions remain open until you close the Telnet client Disables a port on the switch Summit 200 Series Switch Installation and User Guide 45 Accessing the Switch Table 14 Common Commands continued Command disable ssh2 disable telnet disable web enable bootp via
48. facilities The following sections describe how to get started if you want to use an SNMP manager It assumes you are already familiar with SNMP management If not refer to the following publication The Simple Book by Marshall T Rose ISBN 0 13 8121611 9 Published by Prentice Hall Accessing Switch Agents To have access to the SNMP agent residing in the switch at least one VLAN must have an IP address assigned to it Supported MIBs In addition to private MIBs the switch supports the standard MIBs listed in Appendix C Configuring SNMP Settings The following SNMP parameters can be configured on the switch e Authorized trap receivers An authorized trap receiver can be one or more network management stations on your network The switch sends SNMP traps to all trap receivers You can have a maximum of 16 trap receivers configured for each switch Entries in this list can also be created modified and deleted using the RMON2 trapDestTable MIB variable as described in RFC 2021 e Community strings The community strings allow a simple method of authentication between the switch and the remote Network Manager There are two types of community strings on the switch Read community strings provide read only access to the switch The default read only community string is public Read write community strings provide read and write access to the switch The default read write community string is private A total of eight community string
49. histogram of packet statistics show ports lt portlist gt rxerrors Displays real time receive error statistics show ports lt portlist gt stats Displays real time port statistics show ports lt portlist gt txerrors Displays real time transmit error statistics show ports lt portlist gt utilization Displays real time port utilization information Use the Spacebar to toggle between packet byte and bandwidth utilization information show sharing address based Displays the address based load sharing configuration unconfig ports lt portlist gt display string Clears the user defined display string from a port lt string gt Load Sharing on the Switch Load sharing with switches allows you to increase bandwidth and resiliency by using a group of ports to carry traffic in parallel between switches The sharing algorithm allows the switch to use multiple ports as a single logical port For example VLANs see the load sharing group as a single logical port Most load sharing algorithms guarantee packet sequencing between clients If a port in a load sharing group fails traffic is redistributed to the remaining ports in the load sharing group If the failed port becomes active again traffic is redistributed to include that port A NOTE Load sharing must be enabled on both ends of the link or a network loop may result The load sharing algorithms do not need to be the same on both ends This feature is supported betw
50. in parallel between systems The sharing algorithm allows the switch to use multiple ports as a single logical port For example VLANs see the load sharing group as a single virtual port The algorithm also guarantees packet sequencing between clients A NOTE For information on load sharing see Chapter 6 Configuring Ports on a Switch ESRP Aware Switches Extreme switches that are not running ESRP but are connected on a network that has other Extreme switches running ESRP are ESRP aware When ESRP aware switches are attached to ESRP enabled switches the ESRP aware switches reliably perform fail over and fail back scenarios in the prescribed recovery times No configuration of this feature is necessary If Extreme switches running ESRP are connected to layer 2 switches that are not manufactured by Extreme Networks or Extreme switches that are not running ExtremeWare 4 0 or above the fail over times seen for traffic local to the segment may appear longer depending on the application involved Summit 200 Series Switch Installation and User Guide 37 ExtremeWare Overview and the FDB timer used by the other vendor s layer 2 switch As such ESRP can be used with layer 2 switches from other vendors but the recovery times vary The VLANs associated with the ports connecting an ESRP aware switch to an ESRP enabled switch must be configured using an 802 1Q tag on the connecting port or if only a single VLAN is involved as u
51. is 10 to 2 147 483 647 seconds 68 years The default setting is 260 seconds enable igmp vlan lt name gt Enables IGMP on a router interface If no VLAN is specified IGMP is enabled on all router interfaces The default setting is enabled 216 Summit 200 Series Switch Installation and User Guide Displaying IGMP Snooping Configuration Information Table 67 IGMP and IGMP Snooping Commands continued Command Description enable igmp snooping Enables IGMP snooping on the switch forward merouteronly WINS proxy Specify the forward mcrouter only option to have the switch forward all multicast traffic to the multicast router only otherwise the switch forwards all multicast traffic to any IP router Specify the with proxy option to enable the IGMP snooping proxy This command is useful for troubleshooting purposes Enabling the proxy allows the switch to suppress duplicate join requests on a group to prevent forwarding to the connected layer 3 switch The proxy also suppresses superfluous IGMP leave messages so that they are forwarded only when the last member leaves the group If snooping is not enabled enabling the proxy also enables snooping The default setting is enabled Displaying IGMP Snooping Configuration Information To display IGMP snooping registration information and a summary of all IGMP timers and states use the following command show igmp snooping vlan lt name gt detail Clea
52. is activity on the port Off Link is not present or the port is disabled Media Selection Fiber LEDs Ports 25 and 26 Color Indicates Green Fiber link is selected mini GBIC is present and being used for the Gigabit Ethernet uplink Off 1000BASE T link is selected the switch is using the RJ 45 port for the Gigabit Ethernet uplink Unit Stacking ID Number LED Color Indicates N A When several Summit 200 24 switches are interconnected stacked each switch will be assigned a unique stacking ID number that will be visible in the unit stacking ID number LED The switch acting as the stack master will be assigned the number 0 which is the default Summit 200 24 Switch Rear View Figure 2 shows the rear view of the Summit 200 24 switch Figure 2 Summit 200 24 switch rear view Power socket LC24002 18 Summit 200 Series Switch Installation and User Guide Summit 200 48 Switch Physical Features Power Socket The Summit 200 24 switch automatically adjusts to the supply voltage The power supply operates down to 90 V Serial Number Use this serial number for fault reporting purposes MAC Address This label shows the unique Ethernet MAC address assigned to this device A NOTE The Summit 200 24 switch certification and safety label is located on the bottom of the switch Summit 200 48 Switch Physical Features The Summit 200 48 switch is a compact enclosure see Figure
53. lt qosprofile gt to a specific QoS profile If you only specify the ingress qosprofile lt qosprofile gt qosprofile ingress QoS profile the egress QoS profile defaults lt qosprofile gt to none and vice versa If both profiles are specified the source MAC address of an ingress packet and the destination MAC address of an egress packet are examined for QoS profile assignment create fdbentry lt mac_address gt vlan Creates a blackhole FDB entry Specify ene blackhole source mac dest mac lt ource mac The blackhole MAC address matches the ingress source MAC address e dest mac The blackhole MAC address matches the egress destination MAC address both tThe blackhole MAC address matches the ingress source MAC address or the egress destination MAC address delete fdbentry lt mac_address gt vlan Deletes one or all permanent FDB entries lt name gt all Summit 200 Series Switch Installation and User Guide 99 Forwarding Database FDB Table 29 FDB Configuration Commands continued Command Description disable learning port lt portlist gt Disables MAC address learning on one or more ports for security purposes If MAC address learning is disabled only broadcast traffic EDP traffic and packets destined to a permanent MAC address matching that port number are forwarded The default setting is enabled enable learning port lt portlist gt Enables MAC address learning on one or more ports
54. modify the packet s DiffServe code point Summit 200 Series Switch Installation and User Guide 103 Access Policies How Access Control Lists Work When a packet arrives on an ingress port the fields of the packet corresponding to an access mask are compared with the values specified by the associated access lists to determine a match It is possible that a packet will match more than one access control list If the resulting actions of all the matches do not conflict they will all be carried out If there is a conflict the actions of the access list using the higher precedence access mask are applied When a match is found the packet is processed If the access list is of type deny the packet is dropped If the list is of type permit the packet is forwarded A permit access list can also apply a QoS profile to the packet and modify the packet s 802 1p value and the DiffServe code point Access Mask Precedence Numbers The access mask precedence number determines the order in which each rule is examined by the switch and is optional Access control list entries are evaluated from highest precedence to lowest precedence Precedence numbers range from 1 to 25 600 with the number 1 having the highest precedence but an access mask without a precedence specified has a higher precedence than any access mask with a precedence specified The first access mask defined without a specified precedence has the highest precedence Subsequent mask
55. more addresses can be added to it and the profile can be used to control a specific routing protocol Specify the following e ipaddress A list of IP address and mask pairs delete access profile lt access_profile gt Deletes an access profile show access profile lt access_profile gt Displays access profile related information for the switch 120 Summit 200 Series Switch Installation and User Guide Network Address Translation NAT This chapter covers the following topics e Overview on page 121 e Internet IP Addressing on page 122 e Configuring VLANs for NAT on page 122 e Configuring NAT on page 124 e Configuring NAT Rules on page 124 e Creating NAT Rules on page 125 e Displaying NAT Settings on page 127 e Disabling NAT on page 128 Overview NAT is a feature that allows one set of IP addresses typically private IP addresses to be converted to another set of IP addresses typically public Internet IP addresses This conversion is done transparently by having a NAT device rewrite the source IP address and Layer 4 port of the packets Figure 23 NAT Overview po ee ee S TaT PANEN Inside NAT Outside l i I i switch aay i n iii l l J prva Outgoing it al ot fi ey nea I T Network hp ala Bih bl l l Incom
56. more of the following commands e show fdb permanent Displays destination MAC entries and their QoS profiles e show switch Displays information including PACE enable disable information e show vlan Displays the QoS profile assignments to the VLAN e show ports lt portlist gt info detail Displays information including QoS information for the port Modifying a QoS Configuration If you make a change to the parameters of a QoS profile after implementing your configuration the timing of the configuration change depends on the traffic grouping involved The following rules apply e For destination MAC based grouping other than permanent clear the MAC FDB using the command clear fdb This command should also be issued after a configuration is implemented as the configuration must be in place before an entry is made in the MAC FDB For permanent destination MAC based grouping re apply the QoS profile to the static FDB entry as documented You can also save and reboot the switch e For physical and logical groupings of a source port or VLAN re apply the QoS profile to the source port or VLAN as documented You can also save and reboot the switch Traffic Rate Limiting The Summit 200 series switch rate limiting method is based on creating a rate limit a specific type of access control list Traffic that matches a rate limit is constrained to the limit set in the access control list Rate limits are discussed in Chapter 9 A
57. multiple IP addresses A NOTE For information on creating and configuring VLANs see Chapter 7 Virtual LANs VLANs To configure the IP settings manually follow these steps 1 Connect a terminal or workstation running terminal emulation software to the console port 2 At your terminal press Return one or more times until you see the login prompt 3 At the login prompt enter your user name and password Note that they are both case sensitive Ensure that you have entered a user name and password with administrator privileges If you are logging in for the first time use the default user name admin to log in with administrator privileges For example login admin Administrator capabilities enable you to access all switch functions The default user names have no passwords assigned If you have been assigned a user name and password with administrator privileges enter them at the login prompt Summit 200 Series Switch Installation and User Guide 55 Managing the Switch 4 At the password prompt enter the password and press Return When you have successfully logged in to the switch the command line prompt displays the name of the switch in its prompt 5 Assign an IP address and subnetwork mask for the default VLAN by using the following command config vlan lt name gt ipaddress lt ipaddress gt lt subnet_mask gt For example config vlan default ipaddress 123 45 67 8 255 255 255 0 Your chan
58. must have administrator privileges Use the following command to see the accounts show accounts Deleting an Account To delete a account you must have administrator privileges To delete an account use the following command delete account lt username gt A NOTE The account name admin cannot be deleted Domain Name Service Client Services The Domain Name Service DNS client in ExtremeWare augments the following commands to allow them to accept either IP addresses or host names telnet e download bootrom configuration image e upload configuration e ping e traceroute In addition the nslookup utility can be used to return the IP address of a hostname Table 16 describes the commands used to configure DNS Table 16 DNS Commands Command Description config dns client add lt ipaddress gt Adds a DNS name server s to the available server list for the DNS client Up to three name servers can be configured config dns client default domain lt domain_name gt Configures the domain that the DNS client uses if a fully qualified domain name is not entered For example if the default domain is configured to be foo com executing ping bar searches for bar foo com config dns client delete lt ipaddress gt Removes a DNS server nslookup lt hostname gt Displays the IP address of the requested host show dns client Displays the DNS configuration Summit 200 Series Switch Installation and User
59. name gt To delete a rate limit entry use the following command delete rate limit lt name gt Verifying Access Control List Configurations To verify access control list settings you can view the access list configuration To view the access list configuration use the following command show access list name ports lt portlist gt To view the rate limit configuration use the following command show rate limit name ports lt portlist gt To view the access mask configuration use the following command show access mask name Access Control List Commands Table 30 describes the commands used to configure access control lists A NOTE On the Summit 200 48 switch ACL ingress and egress ports must belong to the same port group Port group 1 consists of ports 1 through 24 and port 49 port group 2 consists of ports 25 through 48 and port 50 106 Summit 200 Series Switch Installation and User Guide Using Access Control Lists Table 30 Access Control List Configuration Commands Command Description create access list lt name gt access mask lt access mask name gt dest mac lt dest_mac gt source mac lt src_mac gt vlan lt name gt ethertype IP ARP lt hex_value gt tos lt ip_precedence gt code point lt code_point gt ipprotocol tcp udp icmp igmp lt protocol_num gt dest ip lt dest_IP gt lt mask length gt dest L4port lt dest_port gt source ip lt sr
60. names and symbols logos are SEBAA PLUS trademarks of Data Fellows m suan F Secure SSH is a registered trademark of Data Fellows y All other registered trademarks trademarks and service marks are property of their respective owners Contents Preface Introduction xiii Conventions xiv Related Publications xiv Chapter 1 Summit 200 Series Switch Overview Summit 200 Series Switches 15 Summary of Features 15 Summit 200 24 Switch Physical Features 16 Summit 200 24 Switch Front View 16 Summit 200 24 Switch Rear View 18 Summit 200 48 Switch Physical Features 19 Summit 200 48 Switch Front View 19 Summit 200 48 Switch Rear View 21 Mini GBIC Type and Hardware Software Support 22 Mini GBIC Type and Specifications 22 Chapter 2 Switch Installation Determining the Switch Location 27 Following Safety Information 28 Installing the Switch 28 Rack Mounting 28 Free Standing 29 Stacking the Switch and Other Devices 29 Connecting Equipment to the Console Port 29 Powering On the Switch 30 Checking the Installation 31 Summit 200 Series Switch Installation and User Guide 3 Contents Chapter 3 Chapter 4 Logging In for the First Time Installing or Replacing a Mini Gigabit Interface Connector Mini GBIC Safety Information Preparing to Install or Replace a Mini GBIC Removing and Inserting a Mini GBIC ExtremeWare Overview Summary of Features Virtual LANs VLANs Spanning Tree Protocol Quality of Service Unicast Ro
61. now access the device a problem with the original port is indicated Re examine the connections and cabling A network problem may be preventing you accessing the device over the network Try accessing the device through the console port Check that the community strings configured for the device and the Network Manager are the same Check that SNMP access was not disabled for the system 234 Summit 200 Series Switch Installation and User Guide Using the Command Line Interface Permanent entries remain in the FDB If you have made a permanent entry in the FDB which requires you to specify the VLAN to which it belongs and then delete the VLAN the FDB entry will remain Though causing no harm you must manually delete the entry from the FDB if you want to remove it Default and Static Routes If you have defined static or default routes those routes will remain in the configuration independent of whether the VLAN and VLAN IP address that used them remains You should manually delete the routes if no VLAN IP address is capable of using them You forget your password and cannot log in If you are not an administrator another user having administrator access level can log in delete your user name and create a new user name for you with a new password Alternatively another user having administrator access level can log in and initialize the device This will return all configuration information including passwords to the i
62. of Commands disable eaps 134 138 disable sntp client 75 disable edp ports 84 disable ssh2 46 disable icmp 189 disable stpd 175 disable icmp address mask 189 disable stpd port 175 disable icmp parameter problem 185 disable syslog 164 disable icmp port unreachables 189 disable tacacs 65 disable icmp redirects 189 disable tacacs accounting 65 disable icmp time exceeded 189 disable tacacs authorization 65 disable icmp timestamp 189 disable telnet 46 57 disable icmp unreachables 189 disable web 46 disable icmp useredirects 189 download bootrom 49 236 disable idletimeouts 45 download configuration 49 94 234 236 disable igmp 217 download configuration cancel 235 236 disable igmp snooping 217 download configuration every 94 234 236 disable ignore bpdu 170 download configuration incremental 234 disable ignore bpdu vlan 175 download image 49 231 236 disable ignore stp vlan 175 disable ipforwarding 183 189 E disable ipforwarding broadcast 184 189 enable bootp 46 184 disable ipforwarding fast direct broadcast 180 enable bootp vlan 55 disable ipforwarding ignore broadcast 180 enable bootprelay 184 190 disable ip option loose source route 185 enable cli config logging 46 163 164 disable ip option record route 185 enable clipaging 46 disable ip option record timestamp 185 enable dhcp ports 70 disable ip option strict source route 185 enable diffserv examination ports 150 151 disable ip option use router alert 186 enable dics 155 disable ip
63. of the control VLAN must be tagged By assigning the control VLAN a QoS profile of Qp8 you ensure that EAPS control VLAN traffic is serviced before any other traffic and that control VLAN messages reach their intended destinations For example if the control VLAN is not assigned the highest priority and a broadcast storm occurs in the network the control VLAN messages might be dropped at intermediate points Assigning the control VLAN the highest priority prevents dropped control VLAN messages A NOTE Because the QoS profiles Qo7 and Qp8 share the same hardware queue in the Summit 200 series switch you must limit the amount of traffic that uses these profiles otherwise the Summit 200 series switch may drop EAPS control packets preventing EAPS from operating reliably The following command example adds the control VLAN keys to the EAPS domain eaps_1 config eaps eaps_1l add control vlan keys Configuring the EAPS Protected VLANs You must configure one or more protected VLANs for each EAPS domain The protected VLANs are the data carrying VLANs A NOTE When you configure the VLAN that will act as a protected VLAN the ring ports of the protected VLAN must be tagged except in the case of the default VLAN Summit 200 Series Switch Installation and User Guide 137 Ethernet Automatic Protection Switching To configure an EAPS protected VLAN use the following command config eaps lt name gt add protect
64. on page 205 e Displaying RIP Settings on page 206 e Resetting and Disabling RIP on page 206 e Configuring OSPF on page 206 e Displaying OSPF Settings on page 212 e Resetting and Disabling OSPF Settings on page 213 This chapter assumes that you are already familiar with IP unicast routing If not refer to the following publications for additional information e RFC 1058 Routing Information Protocol RIP e RFC 1723 RIP Version 2 e RFC 2328 OSPF Version 2 e Interconnections Bridges and Routers by Radia Perlman ISBN 0 201 56332 0 Published by Addison Wesley Publishing Company Overview The switch supports the use of two interior gateway protocols IGPs the Routing Information Protocol RIP and the Open Shortest Path First OSPF protocol for IP unicast routing RIP is a distance vector protocol based on the Bellman Ford or distance vector algorithm The distance vector algorithm has been in use for many years and is widely deployed and understood Summit 200 Series Switch Installation and User Guide 193 Interior Gateway Routing Protocols OSPF is a link state protocol based on the Dijkstra link state algorithm OSPF is a newer Interior Gateway Protocol IGP and solves a number of problems associated with using RIP on today s complex networks A NOTE Both RIP and OSPF can be enabled on a single VLAN RIP Versus OSPF The distinction between RIP and OSPF lies in the fundamental differences between di
65. one or more ports to the VLAN As you add each port to the VLAN decide if the port will use an 802 1Q tag VLAN Configuration Commands Table 28 describes the commands used to configure a VLAN Table 28 VLAN Configuration Commands Command Description config vlan lt name gt add port lt portlist gt tagged Adds one or more ports to a VLAN You can untagged nobroadcast specify tagged port s untagged port s Specify nobroadcast to prevent the switch from forwarding broadcast multicast and unknown unicast traffic By default ports are untagged config vlan lt name gt delete port lt portlist gt Deletes one or more ports from a VLAN tagged untagged nobroadcast config vlan lt name gt ipaddress lt ipaddress gt Assigns an IP address and an optional mask to lt mask gt the VLAN config vlan lt name gt tag lt vlanid gt Assigns a numerical VLANid The valid range is from 2 to 4094 1 is used by the default VLAN Summit 200 Series Switch Installation and User Guide 91 Virtual LANs VLANs Table 28 VLAN Configuration Commands continued Command Description config vlan lt old_name gt name lt new_name gt Renames a previously configured VLAN create vlan lt name gt Creates a named VLAN delete vlan lt name gt Removes a VLAN unconfig ports lt portlist gt monitor vlan lt name gt Removes port based VLAN monitoring unconfig vlan lt name gt ipaddress Resets the IP address of the VLAN
66. other nodes are designated as transit nodes One port of the master node is designated the master node s primary port P to the ring another port is designated as the master node s secondary port S to the ring In normal operation the master node blocks the secondary port for all non control traffic belonging to this EAPS domain thereby avoiding a loop in the ring like STP Layer 2 switching and learning mechanisms operate per existing standards on this ring A NOTE Like the master node each transit node is also configured with a primary port and a secondary port on the ring but the primary secondary port distinction is ignored as long as the node is configured as a transit node Figure 25 EAPS operation Secondary port Direction of is logically blocked health check message Master node EW_071 If the ring is complete the master node logically blocks all data traffic in the transmit and receive directions on the secondary port to prevent a loop If the master node detects a break in the ring it unblocks its secondary port and allows data traffic to be transmitted and received through it 130 Summit 200 Series Switch Installation and User Guide Overview of the EAPS Protocol Fault Detection and Recovery EAPS fault detection on a ring is based on a single control VLAN per EAPS domain This EAPS domain provides protection to one or more data carrying VLANs called protected VLANs The control VLAN is used only
67. password at the prompt Re enter the new password at the prompt To add a password to the default user account follow these steps Log in to the switch using the name admin At the password prompt press Return or enter the password that you have configured for the admin account Add a default user password by entering the following command config account user Enter the new password at the prompt Re enter the new password at the prompt A NOTE If you forget your password while logged out of the command line interface contact your local technical support representative who will advise on your next course of action Creating a Management Account The switch can have a total of 16 management accounts You can use the default names admin and user or you can create new names and passwords for the accounts Passwords can have a minimum of 0 characters and can have a maximum of 31 characters To create a new account follow these steps 1 2 Log in to the switch as admin At the password prompt press Return or enter the password that you have configured for the admin account Add a new user by using the following command create account admin user lt username gt Enter the password at the prompt Re enter the password at the prompt 48 Summit 200 Series Switch Installation and User Guide Domain Name Service Client Services Viewing Accounts To view the accounts that have been created you
68. port and VLAN used will remain constant All network settings are configured for that VLAN These two network login modes have the following functional similarities e Until authentication takes place ports on the VLAN are kept in a non forwarding state e Each mode requires the user to open a web browser with the IP address of the switch This is the only address that the client can reach in a non authenticated state e The web server on the switch provides user authentication e After authentication takes place ports are moved into a forwarding state and moved to the VLAN configuration on the RADIUS server 66 Summit 200 Series Switch Installation and User Guide Using Network Login Using Network Login in Campus Mode Campus mode requires e A DHCP server e A RADIUS server configuration The RADIUS server must have the following options configured in its dictionary file for network login Extreme attr Extreme Netlogin Vlan 203 string 1 0 ENCAPS The following optional configuration parameters can also be specified Extreme attr Extreme Netlogin Url 204 string 1 0 ENCAPS Extreme attr Extreme Netlogin Url Desc 205 string 1 0 ENCAPS A NOTE These settings are for the Merit 3 6 version of RADIUS The syntax of these settings will vary based on the type of RADIUS server that you are using The RADIUS server must also contain entries in the user file for a permanent VLAN the URL to be redirected t
69. query should be enabled when the switch is configured to perform IP unicast routing IGMP snooping is a layer 2 function of the switch and is enabled by default It does not require multicast routing to be enabled IGMP snooping optimizes the usage of network bandwidth and prevents multicast traffic from being flooded to parts of the network that do not need it The switch does not reduce any IP multicast traffic in the local multicast domain 224 0 0 x If IGMP snooping is disabled all IGMP and IP multicast traffic floods within a given VLAN IGMP snooping expects at least one device in the network to generate periodic IGMP query messages Without an IGMP querier the switch stops forwarding IP multicast packets to any port When a port sends an IGMP leave message the switch removes the IGMP snooping entry after 10 seconds The switch sends a query to determine which ports want to remain in the multicast group If Summit 200 Series Switch Installation and User Guide 215 IP Multicast Groups and IGMP Snooping other members of the VLAN want to remain in the multicast group the router ignores the leave message but the port that requests removal is removed from the IGMP snooping table If the last port within a VLAN sends an IGMP leave message the router does not receive any responses to the query and the router immediately removes the VLAN from the multicast group Configuring IGMP and IGMP Snooping Table 67 describes the commands
70. show dlcs show dns client show eapol flooding show eaps show edp show fdb show fdb permanent show igmp snooping show iparp show iparp proxy show ipconfig show ipfdb show iproute show ipstats show log show log config show management show memory show mirroring show nat connections show nat rules show nat stats show nat timeout show ospf show ospf area show ospf ase summary show ospf interfaces show ospf Isdb show ospf virtual link show ports collisions show ports configuration show ports info show ports packet show ports gosmonitor show ports rxerrors 56 232 236 79 185 56 232 236 106 110 106 110 120 49 46 236 237 158 155 49 71 72 134 138 84 100 147 154 217 183 188 188 183 188 190 183 188 182 188 188 158 162 165 158 165 57 60 158 83 127 127 127 127 202 212 212 212 212 212 212 79 80 82 80 151 152 154 80 153 80 160 250 Summit 200 Series Switch Installation and User Guide show ports stats show ports txerrors show ports utilization show qosprofile show radius show radius accounting show rate limit show rip show rip stat show rip vlan show session show sharing address based show sntp client show sntp client show stpd show stpd port show switch show tacacs show tacacs accounting show tech support show udp profile show version show vlan T telnet traceroute U unconfig eaps unconfig eap
71. specifications Parameter Minimum Typical Maximum Transceiver Optical output power 9 5 dBm 3 dBm Center wavelength 1275 nm 1310 nm 1355 nm Receiver Optical input power sensitivity 23 dBm Optical input power maximum 3 dBm Operating wavelength 1270 nm 1355 nm General Total system budget 13 5 dB Total optical system budget for the LX mini GBIC is 13 5 dB Measure cable plant losses with a 1310 nm light source and verify this to be within budget When calculating the maximum distance attainable using optical cable with a specified loss per kilometer for example 0 25 dB km Extreme Networks recommends that 3 dB of the total budget be reserved for losses induced by cable splices connectors and operating margin Thus 10 5 dB remains available for cable induced attenuation There is no minimum attenuation or minimum cable length restriction Summit 200 Series Switch Installation and User Guide 23 Summit 200 Series Switch Overview ZX Mini GBIC Specifications Table 8 describes the specifications for the ZX mini GBIC Table 8 ZX mini GBIC specifications Parameter Minimum Typical Maximum Transceiver Optical output power 2 dBm 0 dBm 3 dBm Center wavelength 1540 nm 1550 nm 1570 nm Receiver Optical input power sensitivity 23 dBm Optical input power maximum 3 dBm Operating wavelength 1540 nm 1550 nm 1570 nm Long Range GBIC System Budgets Measure cable plant losses with a 1550 nm light source and v
72. switch is connected to it the VLAN names have no significance to the other switch A NOTE You should use VLAN names consistently across your entire network Default VLAN The switch ships with one default VLAN that has the following properties e The VLAN name is default e It contains all the ports on a new or initialized switch e The default VLAN is untagged on all ports It has an internal VLANid of 1 90 Summit 200 Series Switch Installation and User Guide Configuring VLANs on the Switch Renaming a VLAN To rename an existing VLAN use the following command config vlan lt old_name gt name lt new_name gt The following rules apply to renaming VLANs e Once you change the name of the default VLAN it cannot be changed back to default e You cannot create anew VLAN named default e You cannot change the VLAN name MacVlanDiscover Although the switch accepts a name change once it is rebooted the original name is recreated Configuring VLANs on the Switch This section describes the commands associated with setting up VLANs on the switch Configuring a VLAN involves the following steps 1 Create and name the VLAN 2 Assign an IP address and mask if applicable to the VLAN if needed A NOTE Each IP address and mask assigned to a VLAN must represent a unique IP subnet You cannot configure the same IP subnet on different VLANs 3 Assign a VLANid if any ports in this VLAN will use a tag 4 Assign
73. that have been successfully transmitted by the port e Transmitted Byte Count Tx Byte Count The total number of data bytes successfully transmitted by the port e Received Packet Count Rx Pkt Count The total number of good packets that have been received by the port e Received Byte Count RX Byte Count The total number of bytes that were received by the port including bad or lost frames This number includes bytes contained in the Frame Check Sequence FCS but excludes bytes in the preamble e Received Broadcast RX Bcast The total number of frames received by the port that are addressed to a broadcast address e Received Multicast RX Mcast The total number of frames received by the port that are addressed to a multicast address Port Errors The switch keeps track of errors for each port To view port transmit errors use the following command show ports lt portlist gt txerrors The following port transmit error information is collected by the system Port Number e Link Status The current status of the link Options are Ready the port is ready to accept a link Active the link is present at this port e Transmit Collisions TX Coll The total number of collisions seen by the port regardless of whether a device connected to the port participated in any of the collisions e Transmit Late Collisions TX Late Coll The total number of collisions that have occurred after the port s
74. the Switch e Cannot issue a show switch command e Can perform all other commands We know from the users file that this applies to the users albert and lulu We also know that eric is able to log in but is unable to perform any commands because he has no valid profile assigned In PROFILE2 a user associated with this profile can use any enable command the clear counter command and the show management command but can perform no other functions on the switch We also know from the users file that gerald has these capabilities The following lists the contents of the file users with support for per command authentication user Password Filter Id unlim admin Password Service Typ Administrative Filter Id unlim eric Password Service Typ Administrative Filter Id unlim Extreme Extreme CLI Authorization Enabled albert Password Service Typ Administrative Profilel Filter Id unlim Extreme Extreme CLI Authorization Enabled lulu Password Service Typ Administrative Profilel Filter Id unlim Extreme Extreme CLI Authorization Enabled gerald Password Service Typ Administrative Filter Id unlim Extreme Extreme CLI Authorization Enabled Contents of the file profiles PROFILE1 deny enable disable ipforwarding show switch PROFILE2 enable clear counters
75. the generation of ICMP network unreachable messages type 3 code 0 and host unreachable messages type 3 code 1 when a packet cannot be forwarded to the destination because of unreachable route or host ICMP packet processing on one or all VLANs The default setting is enabled If a VLAN is not specified the command applies to all IP interfaces enable icmp useredirects Enables the modification of route table information when an ICMP redirect message is received This option applies to the switch when it is not configured for routing The default setting is disabled enable ip option loose source route Enables the loose source route IP option enable ip option record route Enables the record route IP option enable ip option record timestamp Enables the record timestamp IP option 186 Summit 200 Series Switch Installation and User Guide Routing Configuration Example Table 55 ICMP Configuration Commands continued Command Description enable ip option strict source route Enables the strict source route IP option enable ip option use router alert Enables the switch to generate the router alert IP option with routing protocol packets enable irdp vlan lt name gt Enables the generation of ICMP router advertisement messages on one or all VLANs The default setting is enabled unconfig icmp Resets all ICMP settings to the default values unconfig irdp Resets all router advertisement settings to the default values
76. to distribute LSAs between routers Any change in routing information is sent to all of the routers in the network All routers within an area have the exact same LSDB Table 59 describes LSA type numbers Table 59 LSA Type Numbers Type Number Description Router LSA Network LSA Summary LSA AS summary LSA AS external LSA NSSA external LSA Link local ON OR OUN 0 Area scoping 1 AS scoping 196 Summit 200 Series Switch Installation and User Guide Overview of OSPF Database Overflow The OSPF database overflow feature allows you to limit the size of the LSDB and to maintain a consistent LSDB across all the routers in the domain which ensures that all routers have a consistent view of the network Consistency is achieved by e Limiting the number of external LSAs in the database of each router e Ensuring that all routers have identical LSAs To configure OSPF database overflow use the following command config ospf ase limit lt number gt timeout lt seconds gt where number Specifies the number of external LSAs excluding the default LSAs that the system supports before it goes into overflow state A limit value of zero disables the functionality When the LSDB size limit is reached OSPF database overflow flushes LSAs from the LSDB OSPF database overflow flushes the same LSAs from all the routers which maintains consistency timeout Specifies the timeout in seconds after which the system ce
77. to send and receive EAPS messages the protected VLANs carry the actual data traffic As long as the ring is complete the EAPS master node blocks the protected VLANs from accessing its secondary port A NOTE The control VLAN is not blocked Messages sent on the control VLAN must be allowed into the switch for the master node to determine whether the ring is complete Figure 26 EAPS fault detection and protection switching Break in ring S4 sends link down message to master node message to S3 sends link on master node Master node opens secondary port to allow traffic to pass Master node EW_072 A master node detects a ring fault in either of two ways e Polling response e Trap message sent by a transit node Polling The master node transmits a health check packet on the control VLAN at a user configurable interval see Figure 25 If the ring is complete the master node will receive the health check packet on its secondary port the control VLAN is not blocked on the secondary port When the master node receives the health check packet it resets its fail period timer and continues normal operation If the master node does not receive the health check packet before the fail period timer expires it declares a failed state and opens its logically blocked secondary port on all the protected VLANs Now traffic can flow through the master s secondary port The master node also flushes its forwarding
78. to use an access profile to determine any of the following e Inter area Filter For switches configured to support multiple OSPF areas an ABR function an access profile can be applied to an OSPF area that filters a set of OSPF inter area routes from being sourced from any other areas To configure an inter area filter policy use the following command config ospf area lt area_id gt interarea filter lt access_profile gt none e External Filter For switches configured to support multiple OSPF areas an ABR function an access profile can be applied to an OSPF area that filters a set of OSPF external routes from being advertised into that area To configure an external filter policy use the following command config ospf area lt area_id gt external filter lt access_profile gt none A NOTE If any of the external routes specified in the filter have already been advertised those routes will remain until the associated LSAs in that area time out e ASBR Filter For switches configured to support RIP and static route re distribution into OSPF an access profile can be used to limit the routes that are advertised into OSPF for the switch as a whole To configure an ASBR filter policy use the following command config ospf asbr filter lt access_profile gt none e Direct Filter For switches configured to support direct route re distribution into OSPF an access profile can be used to limit the routes that are a
79. transmit window has expired Summit 200 Series Switch Installation and User Guide 159 Status Monitoring and Statistics Transmit Deferred Frames TX Deferred The total number of frames that were transmitted by the port after the first transmission attempt was deferred by other network traffic Transmit Errored Frames TX Error The total number of frames that were not completely transmitted by the port because of network errors such as late collisions or excessive collisions Transmit Parity Frames TX Parity The bit summation has a parity mismatch To view port receive errors use the following command show ports lt portlist gt rxerrors The following port receive error information is collected by the switch Receive Bad CRC Frames RX CRC The total number of frames received by the port that were of the correct length but contained a bad FCS value Receive Oversize Frames RX Over The total number of good frames received by the port greater than the supported maximum length of 1 522 bytes Receive Undersize Frames RX Under The total number of frames received by the port that were less than 64 bytes long Receive Fragmented Frames RX Frag The total number of frames received by the port were of incorrect length and contained a bad FCS value Receive Jabber Frames RX Jab The total number of frames received by the port that was of greater than the support maximum length and had a Cyclic Redundancy Ch
80. 0 e For a100 Mbps port the default cost is 19 Specifies the priority of the port in this STPD By changing the priority of the port you can make it more or less likely to become the root port The range is 0 through 31 where 0 indicates the lowest priority The default setting is 16 Specifies the priority of the STPD By changing the priority of the STPD you can make it more or less likely to become the root bridge The range is 0 through 65 535 where 0 indicates the highest priority The default setting is 32 768 Creates an STPD When created an STPD has the following default parameters e Bridge priority 32 768 e Hello time 2 seconds Forward delay 15 seconds Configures the switch to ignore STP BPDUs which prevents ports in the VLAN from becoming part of an STPD This command is useful when you have a known topology with switches outside your network and wish to keep the root bridge within your network The default setting is disabled Configures the switch to ignore the STP protocol and not block traffic for the VLAN s This command is useful when multiple VLANs share the same physical ports but only some of the VLANs require STP protection The default setting is disabled Enables the STP protocol for one or all STPDs The default setting is disabled Enables the STP protocol on one or more ports If STPD is enabled for a port bridge protocol data units BPDUs will be generated on that port if
81. 101 45 67 the IP hosts communicates as if the two hosts are on the same subnet and sends out an IP ARP Request The switch answers on behalf of the device at address 100 101 45 67 using its own MAC address All subsequent data packets from 100 101 102 103 are sent to the switch and the switch routes the packets to 100 101 45 67 Relative Route Priorities Table 52 lists the relative priorities assigned to routes depending upon the learned source of the route AR CAUTION Although these priorities can be changed do not attempt any manipulation unless you are expertly familiar with the possible consequences Summit 200 Series Switch Installation and User Guide 181 IP Unicast Routing Table 52 Relative Route Priorities Route Origin Priority Direct 10 BlackHole 50 Static 1100 ICMP 1200 OSPFintra 2200 OSPFinter 2300 RIP 2400 OSPFExtern1 3200 OSPFExtern2 3300 BOOTP 5000 To change the relative route priority use the following command config iproute priority rip bootp icmp static ospf intra ospf inter ospf as external ospf externl ospf extern2 lt priority gt Configuring IP Unicast Routing This section describes the commands associated with configuring IP unicast routing on the switch To configure routing follow these steps 1 2 Create and configure two or more VLANs Assign each VLAN that will be using routing an IP address using the following command config vlan lt name gt ipaddre
82. 124 Summit 200 Series Switch Installation and User Guide Creating NAT Rules Creating NAT Rules This section describes how to configure the various types of NAT static dynamic portmap and auto constrain In the examples in this section advanced port and destination matching options have been removed For information on how to use some of the more advanced rule matching features refer to Advanced Rule Matching on page 126 Creating Static and Dynamic NAT Rules To create static or dynamic NAT rules use this command config nat add delete vlan lt outside_vlan gt map source any lt ipaddress gt lt bits gt lt netmask gt to lt ipaddress gt lt mask gt lt netmask gt lt ipaddress gt This is the simplest NAT rule You specify the outside vlan name and a subnet of inside IP addresses which get translated to the outside IP address using the specified mode static in this case For the outside IP addresses you can either specify an IP address and netmask or a starting and ending IP range to determine the IP addresses the switch will translate the inside IP addresses to If the netmask for both the source and NAT addresses is 32 the switch will use static NAT translation If the netmask for both the source and NAT addresses are not both 32 the switch will use dynamic NAT translation Static NAT Rule Example config nat add out_vlan_1l map source 192 168 1 12 32 to 216 52 8 32 32 Dynamic NAT Rule
83. 25 are part of VLAN Finance and ports 17 through 24 are part of VLAN Marketing Figure 10 Example of a port based VLAN on the Summit 200 24 switch Marketing Finance Sales LC24004 For the members of the different IP VLANs to communicate the traffic must be routed by the switch This means that each VLAN must be configured as a router interface with a unique IP address Spanning Switches with Port Based VLANs To create a port based VLAN that spans two switches you must do two things 1 Assign the port on each switch to the VLAN 2 Cable the two switches together using one port on each switch per VLAN Figure 11 illustrates a single VLAN that spans a BlackDiamond switch and a Summit 200 24 switch All ports on the BlackDiamond switch belong to VLAN Sales Ports 1 through 24 and port 26 on the Summit 200 24 switch also belong to VLAN Sales The two switches are connected using slot 8 port 4 on system 1 the BlackDiamond switch and port 26 on system 2 the Summit 200 24 switch 86 Summit 200 Series Switch Installation and User Guide Figure 11 Single port based VLAN spanning two switches System 1 a 1 o 2 0 3 o H amp CO g emme 00000 g Qax S
84. 3 one rack unit in height 1 75 inches or 44 45 mm that provides 48 autosensing 1OBASE T 100BASE TX ports using RJ 45 connectors It also provides two 10 100 1000BASE T Gigabit Ethernet uplink ports using RJ 45 connectors and two optical ports that also allow Gigabit Ethernet uplink connections through Extreme 1000BASE SX 1000BASE LX or 1000BASE ZX SFP mini GBICs using optical fibers with LC connectors Summit 200 48 Switch Front View Figure 3 shows the Summit 200 48 switch front view Figure 3 Summit 200 48 switch front view Console 10 100 Mbps ports Mini GBIC ports port ES iSIGtSESISISIS CEISIEISISISESIG CHIGISISISISISIS E Now ot Extreme Networks Summit 200 48 1000 baseT ports LC48001 A NOTE See Table 5 for information about supported mini GBIC types and distances A NOTE See Summit 200 48 Switch LEDs on page 21 for more details Summit 200 Series Switch Installation and User Guide 19 Summit 200 Series Switch Overview Console Port Use the console port 9 pin D type connector for connecting a terminal and carrying out local management Port Connections The Summit 200 48 switch has 48 1OBASE T 100BASE TX ports using RJ 45 connectors for communicating with end stations and other devices over 10 100Mbps Ethernet The switch also has four Gigabit Ethernet uplink ports These ports are labeled 49 and 50 on the front p
85. 9 enable ip option use router alert 187 disable snmp traps 59 enable iproute sharing 185 Summit 200 Series Switch Installation and User Guide 249 Index of Commands enable irdp enable learning port enable license advanced edge enable log display enable loopback mode vlan enable mirroring enable nat enable netlogin ports enable osfp export direct enable ospf enable ospf capability opaque lsa enable ospf export enable ospf export rip enable ospf export static enable ports enable radius enable radius accounting enable rip enable rip aggregation enable rip export enable rip originate default enable rip poisonreverse enable rip splithorizon enable rip triggerupdates enable rmon enable route sharing enable sharing enable snmp access enable snmp traps enable sntp client enable ssh2 enable stpd enable stpd port enable syslog enable tacacs enable tacacs accounting enable tacacs authorization enable telnet enable web H history L logout N nslookup P ping 187 100 38 162 164 184 83 124 70 210 182 210 197 210 179 202 210 202 211 77 79 62 62 182 203 204 179 202 204 204 204 204 204 166 46 57 173 174 174 163 164 44 46 56 49 49 50 Q quit R reboot restart ports rtlookup S save show access list show access mask show access profile show accounts show banner show configuration show debug tracing show diagnostics
86. 93 limitations 94 timed configuration download 94 mixing port based and tagged 90 names 90 port based 86 renaming 91 routing 182 tagged 88 trunks 88 Summit 200 Series Switch Installation and User Guide 245 Index 246 Summit 200 Series Switch Installation and User Guide Index of Commands C clear counters 164 clear dlcs 155 clear fdb 99 147 clear igmp snooping 217 clear iparp 183 189 clear ipfdb 183 189 clear log 164 clear session 44 56 config access profile 119 config access profile add 114 119 config access profile delete 115 119 config access profile mode 114 config account 44 config banner 44 config bootprelay add 183 190 config bootprelay delete 183 190 config dns client add 49 config dns client default domain 49 config dns client delete 49 config download server 94 234 236 config eaps lt old name gt name lt new name gt 134 config eaps add control vlan 134 config eaps add protect vlan 134 138 config eaps delete control vlan 134 config eaps delete protect vlan 134 config eaps failtime 135 config eaps hellotime 134 135 config eaps mode 134 135 config eaps primary port config eaps secondary port config fdb agingtime config igmp query_interval config igmp snooping config iparp add config iparp add proxy config iparp delete config iparp delete proxy config iparp timeout 134 136 137 134 136 137 99 216 216 183 181 183 183 183 183 config iproute add config iproute
87. ADIUS server is 10 201 26 243 and the IP address of the Summit 200 Series Switch Installation and User Guide 67 Managing the Switch switch is 10 201 26 11 The secret is secret A temporary VLAN named temporary is created and port 9 is added Network login is enabled on the port create vlan corp config corp ipaddress 10 201 26 11 24 config radius primary server 10 201 26 243 client ip 10 201 26 11 config radius primary shared secret secret enable radius create vlan temporary config temporary add port 9 config temporary ipaddress 192 168 0 1 24 config temporary dhcp address range 192 168 0 20 192 168 0 100 enable netlogin ports 9 vlan temporary User Login Using Campus Mode To log in as a user from the client the user will follow these steps 1 Set up the Windows IP configuration for DHCP 2 Plug into the port that has network login enabled In this example the user will plug into port 9 Log in to Windows Release any old IP settings and renew the DHCP lease This is done differently depending on the version of Windows the user is running Windows 9x use the winipcfg tool Choose the Ethernet adapter that is connected to the port on which network login is enabled Use the buttons to release the IP configuration and renew the DHCP lease Windows NT 2000 use the ipconfig command line utility Use the command ipconfig release to release the IP configuration and ipconfig renew to get the
88. Any unmatched traffic will be routed normally and not be translated Because all traffic destined for an outside VLAN runs through the central processing unit CPU it cannot run at line rate 122 Summit 200 Series Switch Installation and User Guide Configuring VLANs for NAT When a VLAN is configured to be out side it routes all traffic destined for inside VLANs Because the routed traffic runs through the CPU it cannot run at line rate When a VLAN is configured to be none all NAT functions are disabled and the VLAN operates normally NAT Modes There are four different modes used to determine how the outside IP addresses and Layer 4 ports are assigned e Static mapping Dynamic mapping Port mapping e Auto constraining Static Mapping When static mapping is used each inside IP address uses a single outside IP address The Layer 4 ports are not changed only the IP address is rewritten Because this mode requires a 1 to 1 mapping of internal to external addresses it does not make efficient use of the external address space But it is useful when you have a small number of hosts that need to have their IP addresses rewritten without conflicting with other hosts Because this mode does not rely on Layer 4 ports ICMP traffic is translated and allowed to pass Dynamic Mapping Dynamic mapping is similar to static mapping in that the Layer 4 ports are not rewritten during translation Dynamic mapping is different in tha
89. DIUS per command authentication you must add the following type to the client file type extreme nas RAD_RFC ACCT_RFC Within the users configuration file additional keywords are available for Profile Name and Ext reme CLI Authorization To use per command authentication enable the CLI authorization function and indicate a profile name for that user If authorization is enabled without specifying a valid profile the user is unable to perform any commands Next define the desired profiles in an ASCII configuration file called profiles This file contains named profiles of exact or partial strings of CLI commands A named profile is linked with a user through the users file A profile with the permit on keywords allows use of only the listed commands A profile with the deny keyword allows use of all commands except the listed commands CLI commands can be defined easily in a hierarchal manner by using an asterisk to indicate any possible subsequent entry The parser performs exact string matches on other text to validate commands Commands are separated by a comma or newline Looking at the following example content in profiles for the profile named PROFILE1 which uses the deny keyword the following attributes are associated with the user of this profile e Cannot use any command starting with enable e Cannot issue the disable ipforwarding command Summit 200 Series Switch Installation and User Guide 63 Managing
90. Default 5 Minimum 0 Maximum 3 600 e transmission_delay Default 1 Minimum 0 Maximum 3 600 e hello _interval Default 10 Minimum 1 Maximum 65 535 e dead_interval Default 40 Minimum 1 Maximum 2 147 483 647 Adds a virtual link to another ABR Specify the following e routerid Far end router interface number e areaid transit area used for connecting the two end points Enables OSPF on one or all VLANs router interfaces The lt areaid gt specifies the area to which the VLAN is assigned The passive parameter indicates that the interface does not send or receive OSPF packets Configures a range of IP addresses in an OSPF area If advertised the range is exported as a single LSA by the ABR Deletes a range of IP addresses in an OSPF area Configures an OSFP area as a normal area The default setting is normal Configures an OSPF area as a NSSA Configures an OSPF area as a stub area Configures a route filter for non OSPF routes exported into OSPF If none is specified no RIP and static routes are filtered Configures OSPF database overflow Configures an aggregated OSPF external route using the IP addresses specified 208 Summit 200 Series Switch Installation and User Guide Table 64 OSPF Configuration Commands continued Command config ospf ase summary delete lt ipaddress gt lt mask gt config ospf delete virtual link lt routerid gt lt areaid gt config ospf delet
91. FLASH memory A NOTE If this command does not complete successtully it could prevent the switch from booting Downloads a complete configuration Use the incremental keyword to specify an incremental configuration download Cancels a previously scheduled configuration download Schedules a configuration download Specify the hour using a 24 hour clock where the range is 0 to 23 Downloads a new image from a TFTP server over the network If no parameters are specified the image is saved to the current image Reboots the switch at the date and time specified If you do not specify a reboot time the reboot happens immediately following the command and any previously scheduled reboots are cancelled To cancel a previously scheduled reboot use the cancel option Saves the current configuration to nonvolatile storage You can specify the primary or secondary configuration area If not specified the configuration is saved to the primary configuration area Displays the current configuration to the terminal You can then capture the output and store it as a file 236 Summit 200 Series Switch Installation and User Guide Boot Option Commands Table 69 Boot Option Commands continued Command upload configuration lt ipaddress gt lt hostname gt lt filename gt every lt time gt upload configuration cancel use configuration primary secondary use image primary secondary Descripti
92. For optimum performance mirror three or fewer ports at any given time On the Summit 200 48 switch all ports specified by mirror filters as well as the mirror output port must belong to the same port group Port group 1 consists of ports 1 through 24 and port 49 port group 2 consists of ports 25 through 48 and port 50 Port Mirroring Commands Switch port mirroring commands are described in Table 26 Table 26 Switch Port Mirroring Configuration Commands Command Description config mirroring add ports lt portlist gt Adds a single mirroring filter definition Up to eight mirroring definitions can be added config mirroring delete ports lt portlist gt Deletes a particular mirroring filter definition disable mirroring Disables port mirroring enable mirroring to lt port gt tagged Dedicates a port to be the mirror output port show mirroring Displays the port mirroring configuration Port Mirroring Example The following example selects port 3 as the mirror port and sends all traffic coming into or out of the switch on port 1 to the mirror port enable mirroring to port 3 tagged config mirroring add port 1 Summit 200 Series Switch Installation and User Guide 83 Configuring Ports on a Switch Extreme Discovery Protocol The Extreme Discovery Protocol EDP is used to gather information about neighbor Extreme Networks switches EDP is used to by the switches to exchange topology information Information communicated u
93. Guide 49 Accessing the Switch Checking Basic Connectivity The switch offers the following commands for checking basic connectivity e ping e traceroute Ping The ping command enables you to send Internet Control Message Protocol ICMP echo messages to a remote IP device The ping command is available for both the user and administrator privilege level The ping command syntax is ping continuous size lt start_size gt lt end_size gt lt ip_address gt lt hostname gt from lt src_address gt with record route from lt src_ipaddress gt with record route Options for the ping command are described in Table 17 Table 17 Ping Command Parameters Parameter Description continuous Specifies ICMP echo messages to be sent continuously This option can be interrupted by pressing any key size Specifies the size of the ICMP request If both the start_size and end_size are specified transmits ICMP requests using 1 byte increments per packet If no end_size is specified packets of start_size are sent lt ipaddress gt Specifies the IP address of the host lt hostname gt Specifies the name of the host To use the hostname you must first configure DNS from Uses the specified source address in the ICMP packet If not specified the address of the transmitting interface is used with record route Decodes the list of recorded routes and displays them when the ICMP echo reply is received If a ping r
94. IEC EN 61000 4 2 Electrostatic Discharge IEC EN 61000 4 3 Radiated Immunity IEC EN 61000 4 4 Transient Bursts IEC EN 61000 4 5 Surge IEC EN 61000 4 6 Conducted Immunity IEC EN 61000 4 11 Power Dips and Interruptions Japan Class A VCCI Registration Emissions Australia New Zealand AS NZS 3548 ACA DoC Emissions Korean MIC Mark MIC Approval Emissions and Immunity Mexico NOM NYCE Product Safety and EMC Approval GOST Russia Taiwan CNS 13438 1997 Class A BSMI Approval Emissions Certification Marks ACN 090 029 066 o ce an MIC CE European Community TUV GS German Notified Body TUV S Argentina GOST Russian Federation C Tick Australian Communication Authority Underwriters Laboratories USA and Canada MIC South Korea BSMI Republic of Taiwan NOM Mexican Official Normalization Electronic Certification and Normalization Summit 200 Series Switch Installation and User Guide 227 Technical Specifications 228 Summit 200 Series Switch Installation and User Guide Supported Standards ExtremeWare supports the following standards for the Summit 200 series switch Standards and Protocols RFC 1058 RIP RFC 1723 RIP v2 RFC 1112 IGMP RFC 2236 IGMP v2 RFC 2328 OSPF ve incl MD5 authentication RFC 2154 OSPF with Digital Signatures password MD 5 RFC 1587 NSSA option RFC 1765 OSPF Database Overflow RFC 2370 OSPF Opaque LSA
95. LAN Marketing and VLAN Sales e All other stations use untagged traffic As data passes out of the switch the switch determines if the destination port requires the frames to be tagged or untagged All traffic coming from and going to the server is tagged Traffic coming from and going to the trunk ports is tagged The traffic that comes from and goes to the other stations on this network is not tagged Mixing Port Based and Tagged VLANs You can configure the switch using a combination of port based and tagged VLANs A given port can be a member of multiple VLANs with the stipulation that only one of its VLANs uses untagged traffic In other words a port can simultaneously be a member of one port based VLAN and multiple tag based VLANs A NOTE For the purposes of VLAN classification packets arriving on a port with an 802 1Q tag containing a VLANid of zero are treated as untagged VLAN Names Each VLAN is given a name that can be up to 32 characters VLAN names can use standard alphanumeric characters The following characters are not permitted in a VLAN name e Space e Comma e Quotation mark VLAN names must begin with an alphabetical letter Quotation marks can be used to enclose a VLAN name that does not begin with an alphabetical character or that contains a space comma or other special character VLAN names are locally significant That is VLAN names used on one switch are only meaningful to that switch If another
96. N 166 front view 19 status monitoring heat dissipation 226 commands table 158 laser safety certifications 226 described 157 LEDs 21 STP MAC address 22 and VLANs 170 port connections 20 BPDU tunneling 170 power safety certifications 226 bridge priority 173 power socket 21 configurable parameters 173 power supply specifications 226 configuration commands table 173 power off specifications 226 configuration example 175 rear view 21 configuring 172 serial number 22 default domain 170 temperature and humidity 226 description 36 weight 226 disable and reset commands table 175 switch displaying settings 175 logging 161 domains 169 monitoring 157 examples 170 RMON features 165 forward delay 173 switch port commands table 79 hello time 173 syntax understanding 41 max age 173 syslog host 163 overview 169 system contact SNMP 59 path cost 173 system location SNMP 59 port priority 173 system name SNMP 59 port state displaying 175 stub area OSPF 198 T Eos o TACACS P 8 55 and RADIUS 60 65 INS ANS configuration commands table 65 load sharing 81 d eh escription 65 load sharing example 82 ifvi 65 location 27 9S Ae N yng 88 media distances supported 22 tagging technical support 237 media types supported 22 Telnet port P Ai v connecting to another host 54 AE 8 ti 28 controlling access 57 peas AORE disconnecting a session 56 stacking with other devices 29 an logging 162 verifying load sharing 82 3 Ae k maximum sessions 54
97. OSPF area is specified authentication information is applied to all OSPF interfaces within the area Summit 200 Series Switch Installation and User Guide 207 Interior Gateway Routing Protocols Table 64 OSPF Configuration Commands continued Command config ospf vlan lt name gt area lt areaid gt virtual link lt routerid gt lt areaid gt timer lt retransmission_interval gt lt transmission_delay gt lt hello_interval gt lt dead_interval gt config ospf add virtual link lt routerid gt lt areaid gt config ospf add vlan lt name gt area lt areaid gt passive config ospf area lt areaid gt add range lt ipaddress gt lt mask gt advertise noadvertise type 3 type 7 config ospf area lt areaid gt delete range lt ipaddress gt lt mask gt config ospf area lt areaid gt normal config ospf area lt areaid gt nssa summary nosummary stub default cost lt cost gt translate config ospf area lt areaid gt stub summary nosummary stub default cost lt cost gt config ospf asbr filter lt access_profile gt none config ospf ase limit lt number gt timeout lt seconds gt config ospf ase summary add lt ipaddress gt lt mask gt cost lt cost gt lt tag_number gt Description Configures the timers for one interface or all interfaces in the same OSPF area The following default minimum and maximum values in seconds are used e retransmission_interval
98. RIP and OSPF are explained later in this chapter Overview of RIP RIP is an Interior Gateway Protocol IGP first used in computer routing in the Advanced Research Projects Agency Network ARPAnet as early as 1969 It is primarily intended for use in homogeneous networks of moderate size To determine the best path to a distant network a router using RIP always selects the path that has the least number of hops Each router that data must traverse is considered to be one hop 194 Summit 200 Series Switch Installation and User Guide Overview of RIP Routing Table The routing table in a router using RIP contains an entry for every known destination network Each routing table entry contains the following information e IP address of the destination network e Metric hop count to the destination network e IP address of the next router e Timer that tracks the amount of time since the entry was last updated The router exchanges an update message with each neighbor every 30 seconds default value or if there is a change to the overall routed topology also called triggered updates If a router does not receive an update message from its neighbor within the route timeout period 180 seconds by default the router assumes the connection between it and its neighbor is no longer available Split Horizon Split horizon is a scheme for avoiding problems caused by including routes in updates sent to the router from which the route wa
99. Routing Configuration Example Figure 33 illustrates a switch that has two VLANs defined as follows e Finance Contains ports 2 and 4 IP address 192 207 35 1 e Personnel Contains ports 3 and 5 IP address 192 207 36 1 Figure 33 Unicast routing configuration example O networks O 192 207 35 0 192 207 36 0 Finance Personnel O e 2 3 4 5 192 207 35 11 192 207 35 13 ay 192 207 36 12 192 207 36 14 ai In this configuration all IP traffic from stations connected to ports 2 and 4 have access to the router by way of the VLAN Finance Ports 3 and 5 reach the router by way of the VLAN Personnel Summit 200 Series Switch Installation and User Guide 187 IP Unicast Routing The example in Figure 33 is configured as follows create vlan Finance create vlan Personnel Finance add port 2 4 Personnel add port 3 5 config config config config config rip add vlan Finance config rip add vlan Personnel enable ipforwarding enable rip Finance ipaddress 192 207 35 1 Personnel ipaddress 192 207 36 1 Displaying Router Settings To display settings for various IP routing components use the commands listed in Table 56 Table 56 Router Show Commands Command Description show iparp lt ipaddress vlan lt name gt permanent show iparp proxy lt ipaddress gt lt mask gt show ipconfig vlan lt name g
100. Routing access policies can be used to hide entire networks or to trust only specific sources for routes or ranges of routes The capabilities of routing access policies are specific to the type of routing protocol involved but are sometimes more efficient and easier to implement than access lists Using Access Control Lists Each access control list consists of an access mask that selects which fields of each incoming packet to examine and a list of values to compare with the values found in the packet Access masks can be shared multiple access control lists using different lists of values to examine packets The following sections describe how to use access control lists Access Masks There are between twelve and fourteen access masks available in the Summit 200 series switch depending on which features are enabled on the switch Each access mask is created with a unique name and defines a list of fields that will be examined by any access control list that uses that mask and by any rate limit that uses the mask An access mask consists of a combination of the following thirteen fields e Ethernet destination MAC address e Ethernet source MAC address e VLANid e IP Type of Service TOS or DiffServ code point e Ethertype e IP protocol e IP destination address and netmask e Layer 4 destination port e IP source address and netmask e Layer 4 source port or ICMP type and or ICMP code e TCP session initiation bits permit
101. S data VLAN spanning two rings 5 a 4 ee ee ars S6 ae 4 5 3 S7 T23 LHS ring RHS ring 1 2 3 2 8 P S 4 5 S P o QD 51 ITs Heeel Master Master node node LC24015 In this example there is one EAPS domain with its own control VLAN running on the ring labeled LHS and another EAPS domain with its own control VLAN running on the ring labeled RHS A data VLAN that spans both rings acts as a protected VLAN to both EAPS domains Switches S 5 and S 10 will have two instances of EAPS domains running on them one for each ring Summit 200 series switches can be deployed in a multi ring EAPS topology subject to these guidelines e Summit 200 series switches can be used as any of the EAPS nodes in the ring except as a node that interconnects the two rings For example in the example shown in Figure 27 nodes S 5 and S 10 cannot be Summit 200 series switches Summit 200 series switches support EAPS Version 1 EAPSv1 and only support a single EAPS domain per switch e Depending on the network topology and the versions of EAPS EAPSv1 vs EAPSv2 running on the other EAPS nodes there might be a requirement to configure STP support for EAPSv1 to prevent super loops in the event of a break in the common link between the nodes interconnecting the rings For example in the example shown in Figure 27 a break in the link between nodes S 5 and
102. Summit 200 24 Switch Summit 200 48 Switch Supported Standards Software Upgrade and Boot Options Downloading a New Image Rebooting the Switch Saving Configuration Changes Returning to Factory Defaults Using TFTP to Upload the Configuration Using TFIP to Download the Configuration Downloading a Complete Configuration Downloading an Incremental Configuration Scheduled Incremental Configuration Download Remember to Save Upgrading and Accessing BootROM Upgrading BootROM Accessing the BootROM menu Boot Option Commands Contents 215 216 217 217 219 219 220 220 220 223 226 231 232 232 233 233 234 234 234 234 235 235 235 235 236 Summit 200 Series Switch Installation and User Guide Contents Appendix E Troubleshooting LEDs Using the Command Line Interface Port Configuration VLANs STP Debug Tracing TOP Command Contacting Extreme Technical Support Index Index of Commands 233 234 235 236 237 237 237 237 Summit 200 Series Switch Installation and User Guide Preface This preface provides an overview of this guide describes guide conventions and lists other publications that may be useful Introduction This guide provides the required information to install the Summit 200 series switch and configure the ExtremeWare software running on the Summit 200 series switch This guide is intended for use by network administrators who are respons
103. The status monitoring facility provides information about the switch This information may be useful for your technical support representative if you have a problem ExtremeWare includes many show commands that display information about different switch functions and facilities A NOTE For more information about show commands for a specific ExtremeWare feature see the appropriate chapter in this guide Summit 200 Series Switch Installation and User Guide 157 Status Monitoring and Statistics Table 44 describes commands that are used to monitor the status of the switch Table 44 Status Monitoring Commands Command Description show diag Displays software diagnostics show log lt priority gt Displays the current snapshot of the log Specify the priority option to filter the log to display message with the selected priority or higher more critical Priorities include critical emergency alert error warning notice info and debug If not specified all messages are displayed show log config Displays the log configuration including the syslog host IP address the priority level of messages being logged locally and the priority level of messages being sent to the syslog host show memory detail Displays the current system memory information Specify the detail option to view task specific memory usage show switch Displays the current switch information including e sysName sysLocation sysContact e MAC address
104. VLAN not per link A NOTE All routers in the VLAN must have the same OSPF link type If there is a mismatch OSPF attempts to operate but may not be reliable 200 Summit 200 Series Switch Installation and User Guide Route Re Distribution Route Re Distribution Both RIP and OSPF can be enabled simultaneously on the switch Route re distribution allows the switch to exchange routes including static routes between the two routing protocols Figure 36 is an example of route re distribution between an OSPF autonomous system and a RIP autonomous system Figure 36 Route re distribution OSPF AS Backbone Area 0 0 0 0 o a a Area 121 2 3 4 EW_019 Configuring Route Re Distribution Exporting routes from OSPF to RIP and from RIP to OSPF are discreet configuration functions To run OSPF and RIP simultaneously you must first configure both protocols and then verify the independent operation of each Then you can configure the routes to export from OSPF to RIP and the routes to export from RIP to OSPF Summit 200 Series Switch Installation and User Guide 201 Inter
105. a WINS server to serve more than one VLAN and there are IPQoS rules defined for that server the command to add the WINS server is rejected DLCS Commands The DLCS commands are described in Table 43 Table 43 DLCS Configuration Commands Command Description clear dics Clears learned DLCS data disable dics Disables snooping of DLCS packets disable dics ports lt port number gt Disables port on which DLCS packets are snooped enable dics Enables snooping of DLCS packets enable dics ports lt port number gt Enables port on which DLCS packets are snooped show dlcs Displays ports which are snooping WINS packets along with the data that has been learned Summit 200 Series Switch Installation and User Guide 155 Quality of Service QoS 156 Summit 200 Series Switch Installation and User Guide Status Monitoring and Statistics This chapter describes the following topics e Status Monitoring on page 157 e Port Statistics on page 159 e Port Errors on page 159 e Port Monitoring Display Keys on page 160 e Setting the System Recovery Level on page 161 e Logging on page 161 e RMON on page 165 Viewing statistics on a regular basis allows you to see how well your network is performing If you keep simple daily records you will see trends emerging and notice problems arising before they cause major network faults In this way statistics can help you get the best out of your network Status Monitoring
106. a number several numbers separated by commas or ranges of numbers two numbers separated by a hyphen e off Disables the autopolarity detection feature on Enables the autopolarity detection feature Configures a user defined string for a port The string is displayed in certain show commands for example show port all info The string can be up to 16 characters Configures the part of the packet examined by the switch when selecting the egress port for transmitting load sharing data This feature is available using the address based load sharing algorithm only Disables a port Even when disabled the link is available for diagnostic purposes Disables a load sharing group of ports Enables a port Defines a load sharing group of ports The ports specified in lt portlist gt are grouped to the master port The optional load sharing algorithm address based uses addressing information as criteria for egress port selection Resets autonegotiation for one or more ports by resetting the physical link Displays real time collision statistics Summit 200 Series Switch Installation and User Guide 79 Configuring Ports on a Switch Table 25 Switch Port Commands continued Command Description show ports lt portlist gt configuration Displays the port configuration show ports lt portlist gt info detail Displays detailed system related information show ports lt portlist gt packet Displays a
107. able 164 IP unicast routing configuration changes 163 basic IP commands table 183 description 161 BOOTP relay 190 fault level 161 configuration examples 187 local 162 configuring 182 message 162 default gateway 177 real time display 162 description 37 remote 163 DHCP relay 190 subsystem 161 disabling 189 timestamp 161 ECMP logging in 31 48 enabling 182 IP route sharing 180 M Proxy ART 130 MAC address 19 22 reset and disable commands table 189 MAC based VLANs resetting 189 su 3 description 93 router interfaces 178 examole 94 router show commands table 188 P groups 93 routing table hgh guidelines 93 configuration commands table 184 R limitations 94 dynamic routes 179 timed configuration download 94 multiple routes 179 46 opulating 179 management access _ POP master port load sharing 81 static routes 179 i i A maximum Telnet session 54 settings displaying 188 2 O media types and distances 22 verifying the configuration 182 MIBs 58 IRDP 187 3 A mirroring See port mirroring monitoring the switch 157 multiple routes 179 Summit 200 Series Switch Installation and User Guide 241 Index N names VLANs NAT configuration commands table creating rules rule matching timeout commands table Network Address Translation See NAT network login campus mode configuration example configuring user login configuration commands table DHCP server disabling ISP mode configuration example co
108. able 10 Console Connector Pinouts Function Pin Number Direction DCD data carrier detect 1 RXD receive data 2 In TXD transmit data 3 Out DTR data terminal ready 4 Out 5 6 In GND ground DSR data set ready In Summit 200 Series Switch Installation and User Guide 29 Switch Installation Table 10 Console Connector Pinouts continued Function Pin Number Direction RTS request to send 7 Out CTS clear to send 8 In Figure 7 shows the pin outs for a 9 pin to RS 232 25 pin null modem cable Figure 7 Null modem cable pin outs Summit PC Terminal Cable connector 9 pin female Cable connector 25 pin male female Screen Shell _ 1 Screen TxD 3 3 RxD RxD 2 2 TxD Ground 5 7 Ground RTS 7 4 RTS CTS 8 20 DTR DSR 6 5 CTS DCD 1 6 DSR DTR 4 alee 8 DCD Pra Figure 8 shows the pin outs for a 9 pin to 9 pin PC AT null modem serial cable Figure 8 PC AT serial null modem cable pin outs Summit PC AT Serial Port Cable connector 9 pin female Cable connector 9 pin female Screen Shell e Shell Screen DTR 4 1 DCD TxD 3 2 RxD RxD 2 3 TxD CTS 8 4 DTR Ground 5 5 Ground DSR 6 6 DSR RTS 7 7 RTS DCD 1 8 CTS oo came Powering On the Switch To turn on power to the switch connect the AC p
109. able 29 Table 29 FDB Configuration Commands Command Description clear fdb lt mac_address gt vlan lt name gt Clears dynamic FDB entries that match the filter ports lt portlist gt When no options are specified the command clears all FDB entries config fdb agingtime lt number gt Configures the FDB aging time The range is 15 through 1 000 000 seconds The default value is 300 seconds A value of 0 indicates that the entry should never be aged out create fdbentry lt mac_address gt vlan Creates a permanent static FDB entry Specify the lt name gt ports lt portlist gt all qosprofile following lt qosprofile gt ingress qosprofile lt qosprofile gt ingress qosprofile lt qosprofile gt qosprofile lt qosprofile gt e mac_address Device MAC address using colon separated bytes name VLAN associated with MAC address e portlist Port numbers associated with MAC address e gqosprofile QoS profile associated with destination MAC address of the egress port e ingress qosprofile QoS profile associated with the source MAC address of the ingress port If more than one port number is associated with a permanent MAC entry packets are multicast to the multiple destinations create fdbentry lt mac_address gt vlan Creates a permanent dynamic FDB entry Assigns lt name gt dynamic qosprofile lt qosprofile gt a packet with the specified MAC address and VLAN ingress qosprofile
110. address based load sharing using the following command config sharing address based mac_source mac_destination mac_source_destination ip_source ip_destination ip_source_destination where mac_source Indicates that the switch should examine the MAC source address mac_destination Indicates that the switch should examine the MAC destination address mac_source_destination Indicates that the switch should examine the MAC source and destination address ip_source Indicates that the switch should examine the IP source address ip_source_destination Indicates that the switch should examine the IP source address and destination address ip_destination Indicates that the switch should examine the IP destination address This feature is available for the address based load sharing algorithm only To verify your configuration use the following command show sharing address based Configuring Switch Load Sharing To set up a switch to load share among ports you must create a load sharing group of ports The first port in the load sharing group is configured as the master logical port This is the reference port used in configuration commands It can be thought of as the logical port representing the entire port group Summit 200 Series Switch Installation and User Guide 81 Configuring Ports on a Switch The following rules apply to the Summit 200 series switch e Ports on the switch must be of the s
111. ales Types of VLANs 00009 LC24005 To create multiple VLANs that span two switches in a port based VLAN a port on system 1 must be cabled to a port on system 2 for each VLAN you want to have span across the switches At least one port on each switch must be a member of the corresponding VLANs as well Figure 12 illustrates two VLANs spanning two switches On system 1 ports 1 through 8 and port 26 are part of VLAN Accounting ports 17 through 24 and port 25 are part of VLAN Engineering On system 2 all ports on slot 1 are part of VLAN Accounting all ports on slot 8 are part of VLAN Engineering Figure 12 Two port based VLANs spanning two switches System 1 ae El fe is CEE peteeges o a aie beh se p o z M a System 2 BlackDiamond eteme 4 Accounting z z Engineering eee 4 fea EE aol LC24006 Summit 200 Series Switch Installation and User Guide 87 Virtual LANs VLANs VLAN Accounting span
112. ame port type For example if you use 100 Mbps ports all ports on the switch must be 100 Mbps ports e Ports on the switch are divided into a maximum of six groups e Port based and round robin load sharing algorithms do not apply To define a load sharing group you assign a group of ports to a single logical port number To enable or disable a load sharing group use the following commands enable sharing lt port gt grouping lt portlist gt address based disable sharing lt port gt Load Sharing Example This section provides an example of how to define load sharing on a Summit 200 series switch Load Sharing on a Summit 200 Series Switch The following example defines a load sharing group that contains ports 9 through 12 and uses the first port in the group as the master logical port 9 enable sharing 9 grouping 9 12 In this example logical port 9 represents physical ports 9 through 12 When using load sharing you should always reference the master logical port of the load sharing group port 9 in the previous example when configuring or viewing VLANs VLANs configured to use other ports in the load sharing group will have those ports deleted from the VLAN when load sharing becomes enabled A NOTE Do not disable a port that is part of a load sharing group Disabling the port prevents it from forwarding traffic but still allows the link to initialize As a result a partner switch does not receive a valid indication
113. ame used to identify a VLAN cannot be used when you create an STPD or a QoS profile 2 Add one or more VLANs to the STPD using the following command config stpd lt stpd_name gt add vlan lt name gt 172 Summit 200 Series Switch Installation and User Guide Configuring STP on the Switch 3 Enable STP for one or more STP domains using the following command enable stpd lt stpd_name gt A NOTE All VLANs belong to a STPD If you do not want to run STP on a VLAN you must add the VLAN to a STPD that is disabled Once you have created the STPD you can optionally configure STP parameters for the STPD AR CAUTION You should not configure any STP parameters unless you have considerable knowledge and experience with STP The default STP parameters are adequate for most networks The following parameters can be configured on each STPD e Hello time e Forward delay e Max age e Bridge priority The following parameters can be configured on each port e Path cost e Port priority A NOTE The device supports the RFC 1493 Bridge MIB Parameters of only the sO default STPD are accessible through this MIB Table 50 shows the commands used to configure STP Table 50 STP Configuration Commands Command Description config stpd lt stpd_name gt add vlan lt name gt Adds a VLAN to the STPD config stpd lt stpd_name gt forwarddelay Specifies the time in seconds that the ports in lt value gt this STPD
114. ample uses an access list that permits TCP sessions Telnet FTP and HTTP to be established in one direction The switch shown in Figure 15 is configured as follows e Two VLANs NET10 VLAN and NET20 VLAN are defined e The NET10 VLAN is connected to port 2 and the NET20 VLAN is connected to port 10 e The IP addresses for NET10 VLAN is 10 10 10 1 24 e The IP address for NET20 VLAN is 10 10 20 1 24 e The workstations are configured using addresses 10 10 10 100 and 10 10 20 100 e IPForwarding is enabled Figure 15 Permit established access list example topology NET10 VLAN NET20 VLAN LC24008 The following sections describe the steps used to configure the example 110 Summit 200 Series Switch Installation and User Guide Using Access Control Lists Step 1 Deny IP Traffic First create an access mask that examines the IP protocol field for each packet Then create two access lists one that blocks all TCP one that blocks UDP Although ICMP is used in conjunction with IP it is technically not an IP data packet Thus ICMP data traffic such as ping traffic is not affected The following commands creates the access mask and access lists create access mask ipproto_mask ipprotocol ports precedence 25000 create access list denytcp ipproto_mask ipprotocol tcp ports 2 10 deny create access list denyudp ipproto_mask ipprotocol udp ports 2 10 deny Figure 16 illustrates the outcome of the access control lis
115. ance number is created internally by the system On a transit node the command displays one of the following states e Idle The EAPS domain has been enabled but the configuration is not complete e Links Up This EAPS domain is running and both its ports are up and in the FORWARDING state Links Down This EAPS domain is running but one or both of its ports are down e Preforwarding This EAPS domain is running and both of its ports are up but one of them is ina temporary BLOCKED state On a master node the command displays one of the following states e Idle The EAPS domain has been enabled but the configuration is not complete e Complete The ring is in the COMPLETE state for this EAPS domain e Failed There is a break in the ring for this EAPS domain e Yes This EAPS domain is running e No This EAPS domain is not running Indicates whether EAPS is enabled on this domain e Yes EAPS is enabled on this domain e no EAPS is not enabled The configured EAPS mode for this switch transit or master The port numbers assigned as the EAPS primary and secondary ports On the master node the port distinction indicates which port is blocked to avoid a loop 140 Summit 200 Series Switch Installation and User Guide Commands for Configuring and Monitoring EAPS Table 35 show eaps Display Fields continued Field Port status Tag status Hello Timer interval Fail Timer inte
116. anel of the switch Two of the ports are 10 100 1000BASE T ports using RJ 45 connectors The other two ports are unpopulated receptacles for mini SFP GBICs using optical fibers with LC connectors The Summit 200 48 switch supports the use of 1000BASE SX 1000BASE LX or 1000BASE ZX mini GBICs A NOTE Only mini GBICs that have been certified by Extreme Networks available from Extreme Networks should be inserted into the mini GBIC receptacles on the Summit 200 series switch Only two of the four Gigabit Ethernet uplink ports can be active at one time For example you can use both 1000BASE T ports both mini GBIC ports or a combination of one 1000BASE T port and one mini GBIC A NOTE For information on the mini GBIC see Mini GBIC Type and Hardware Software Support on page 22 A NOTE When configuring the Summit 200 48 switch all ports specified as mirrored ports and mirroring port or ACL ingress ports and egress port must belong to the same port group Port group 1 consists of ports 1 through 24 and port 49 port group 2 consists of ports 25 through 48 and port 50 Full Duplex The Summit 200 48 switch provides full duplex support for all ports Full duplex allows frames to be transmitted and received simultaneously and in effect doubles the bandwidth available on a link All 10 100 Mbps ports on the Summit 200 48 switch autonegotiate for half or full duplex operation 20 Summit 200 Series Switch Installation and
117. arding fast direct broadcast vlan lt vlan_name gt The entries are added to the IP forwarding table as standard entries and you can view them using the show ipfdb command You can also configure the VLAN router interface to either forward and process all subnet directed broadcast packets or to simply forward these packets after they have been added to the IP forwarding database The latter option allows you to improve CPU forwarding performance by having upper layers such as UDP and TCP ignore broadcast packet processing for example if the packets have IP options configured To enable or disable broadcast packet processing use the following command enable disable ipforwarding ignore broadcast vlan lt vlan_name gt Proxy ARP Proxy Address Resolution Protocol ARP was first invented so that ARP capable devices could respond to ARP Request packets on behalf of ARP incapable devices Proxy ARP can also be used to achieve router redundancy and simplify IP client configuration The switch supports proxy ARP for this type of network configuration The section describes some example of how to use proxy ARP with the switch 180 Summit 200 Series Switch Installation and User Guide Relative Route Priorities ARP Incapable Devices To configure the switch to respond to ARP Requests on behalf of devices that are incapable of doing so you must configure the IP address and MAC address of the ARP incapable device using the use t
118. ases to be in overflow state A timeout value of zero leaves the system in overflow state until OSPF is disabled and re enabled Opaque LSAs Opaque LSAs are a generic OSPF mechanism used to carry auxiliary information in the OSPF database Opaque LSAs are most commonly used to support OSPF traffic engineering Normally support for opaque LSAs is auto negotiated between OSPF neighbors In the event that you experience interoperability problems you can disable opaque LSAs across the entire system using the following command disable ospf capability opaque lsa To re enable opaque LSAs across the entire system use the following command enable ospf capability opaque lsa If your network uses opaque LSAs we recommend that all routers on your OSPF network support opaque LSAs Routers that do not support opaque LSAs do not store or flood them At minimum a well interconnected subsection of your OSPF network needs to support opaque LSAs to maintain reliability of their transmission Areas OSPF allows parts of a network to be grouped together into areas The topology within an area is hidden from the rest of the autonomous system Hiding this information enables a significant reduction in LSA traffic and reduces the computations needed to maintain the LSDB Routing within the area is determined only by the topology of the area Summit 200 Series Switch Installation and User Guide 197 Interior Gateway Routing Protocols The three types o
119. ast Routing The switch provides full layer 3 IP unicast routing It exchanges routing information with other routers on the network using either the Routing Information Protocol RIP or the Open Shortest Path First OSPF protocol The switch dynamically builds and maintains a routing table and determines the best path for each of its routes Each host using the IP unicast routing functionality of the switch must have a unique IP address assigned In addition the default gateway assigned to the host must be the IP address of the router interface Summit 200 Series Switch Installation and User Guide 177 IP Unicast Routing Router Interfaces The routing software and hardware routes IP traffic between router interfaces A router interface is simply a VLAN that has an IP address assigned to it As you create VLANs with IP addresses belonging to different IP subnets you can also choose to route between the VLANs Both the VLAN switching and IP routing function occur within the switch A NOTE Each IP address and mask assigned to a VLAN must represent a unique IP subnet You cannot configure the same IP address and subnet on different VLANs In Figure 32 a switch is depicted with two VLANs defined Finance and Personnel Ports 2 and 4 are assigned to Finance ports 3 and 5 are assigned to Personnel Finance belongs to the IP network 192 207 35 0 the router interface for Finance is assigned the IP address 192 206 35 1 Personnel bel
120. atically upload the configuration file every day so that the TFIP server can archive the configuration on a daily basis Because the filename is not changed the configured file stored in the TFIP server is overwritten every day To upload the configuration use the following command upload configuration lt ipaddress gt lt hostname gt lt filename gt every lt time gt where ipaddress Specifies the IP address of the TFIP server hostname Specifies the hostname of the TFTP server You must enable DNS to use this option filename Specifies the name of the ASCII file The filename can be up to 255 characters long and cannot include any spaces commas quotation marks or special characters every lt time gt Specifies the time of day you want the configuration automatically uploaded on a daily basis If not specified the current configuration is immediately uploaded to the TFTP server To cancel a previously scheduled configuration upload use the following command upload configuration cancel Summit 200 Series Switch Installation and User Guide 233 Software Upgrade and Boot Options Using TFTP to Download the Configuration You can download ASCII files that contain CLI commands to the switch to modify the switch configuration Three types of configuration scenarios that can be downloaded e Complete configuration e Incremental configuration e Scheduled incremental configuration Downloading a Complete Con
121. been reset Check that the device IP address is correctly recorded by the SNMP Network Manager refer to the user documentation for the Network Manager Check that the community strings configured for the system and Network Manager are the same Check that SNMP access was not disabled for the system The Telnet workstation cannot access the device Check that the device IP address subnet mask and default router are correctly configured and that the device has been reset Ensure that you enter the IP address of the switch correctly when invoking the Telnet facility Check that Telnet access was not disabled for the switch If you attempt to log in and the maximum number of Telnet sessions are being used you should receive an error message indicating so Traps are not received by the SNMP Network Manager Check that the SNMP Network Manager s IP address and community string are correctly configured and that the IP address of the Trap Receiver is configured properly on the system The SNMP Network Manager or Telnet workstation can no longer access the device Check that Telnet access or SNMP access is enabled Check that the port through which you are trying to access the device has not been disabled If it is enabled check the connections and network cabling at the port Check that the port through which you are trying to access the device is in a correctly configured VLAN Try accessing the device through a different port If you can
122. ble ignore stp vlan lt name gt Allows a VLAN to use STP port information disable stpd lt stpd_name gt all Disables the STP mechanism on a particular STPD or for all STPDs disable stpd ports lt portlist gt Disables STP on one or more ports Disabling STP on one or more ports puts those ports in forwarding state all BPDUs received on those ports will be disregarded unconfig stpd lt stpd_name gt Restores default STP values to a particular STPD or to all STPDs Summit 200 Series Switch Installation and User Guide 175 Spanning Tree Protocol STP 176 Summit 200 Series Switch Installation and User Guide IP Unicast Routing This chapter describes the following topics e Overview of IP Unicast Routing on page 177 e Proxy ARP on page 180 e Relative Route Priorities on page 181 e Configuring IP Unicast Routing on page 182 e IP Commands on page 183 e Routing Configuration Example on page 187 e Displaying Router Settings on page 188 e Resetting and Disabling Router Settings on page 189 e Configuring DHCP BOOTP Relay on page 190 e UDP Forwarding on page 190 This chapter assumes that you are already familiar with IP unicast routing If not refer to the following publications for additional information e RFC 1256 ICMP Router Discovery Messages e RFC 1812 Requirements for IP Version 4 Routers A NOTE For more information on interior gateway protocols refer to Chapter 16 Overview of IP Unic
123. blem message type 12 when the switch cannot properly process the IP header or IP option information The default setting is enabled If a VLAN is not specified the command applies to all IP interfaces enable icmp port unreachables vlan lt name gt Enables the generation of ICMP port unreachable messages type 3 code 3 when a TPC or UDP request is made to the switch and no application is waiting for the request or access policy denies the request The default setting is enabled If a VLAN is not specified the command applies to all IP interfaces enable icmp redirects vlan lt name gt Enables the generation of an ICMP redirect message type 5 when a packet must be forwarded out on the ingress port The default setting is enabled If a VLAN is not specified the command applies to all IP interfaces enable icmp time exceeded vlan lt name gt Enables the generation of an ICMP time exceeded message type 11 when the TTL field expires during forwarding IP multicast packets do not trigger ICMP time exceeded messages The default setting is enabled If a VLAN is not specified the command applies to all IP interfaces enable icmp timestamp vlan lt name gt Enables the generation of an ICMP timestamp response type 14 code 0 when an ICMP timestamp request is received The default setting is enabled If a VLAN is not specified the command applies to all IP interfaces enable icmp unreachables vlan lt name gt Enables
124. c_IP gt lt mask length gt source L4port lt src_port gt icmp type lt icmp_type gt icmp code lt icmp_code gt egressport lt port gt ports lt portlist gt permit qosprofile lt qosprofile gt set code point lt code_point gt set dotip lt dot1p_value gt permit established deny Creates an access list The list is applied to all ingress packets Options include lt name gt Specifies the access control list name The access list name can be between 1 and 31 characters access mask Specifies the associated access mask Any field specified in the access mask must have a corresponding value specified in the access list dest mac Specifies the destination MAC address source mac Specifies the source MAC address vlan Specifies the VLANid ethert ype Specify IP ARP or the hex value to match tos Specifies the IP precedence value code point Specifies the DiffServ code point value ipprotocol Specify an IP protocol or the protocol number dest ip Specifies an IP destination address and subnet mask A mask length of 32 indicates a host entry dest L4port Specify the destination port source ip Specifies an IP source address and subnet mask source L4port Specify the source port icmp type Specify the ICMP type icmp code Specify the ICMP code egressport Specify the egress port ports Specifies the ingress port s on which this rule is applie
125. ccess Policies Dynamic Link Context System The Dynamic Link Context System DLCS is a feature that snoops WINS NetBIOS packets and creates a mapping between a user name the IP address or MAC address and the switch port Based on the information in the packet DLCS can detect when an end station boots up or a user logs in or out and dynamically maps the end station name to the current IP address and switch port This information is available for use by ExtremeWare Enterprise Manager EEM version 2 1 or later or ExtremeWare EPICenter in setting policies that can be applied to users and can dynamically follow a user s location DLCS provides you with valuable information on a user s location and associated network attributes For DLCS to operate within ExtremeWare the user or end station must allow for automatic DLCS updates This feature should only be used in conjunction with the EEM Policy System or ExtremeWare EPICenter Policy System Refer to the ExtremeWare Enterprise Manager or ExtremeWare EPICenter documentation for more information 154 Summit 200 Series Switch Installation and User Guide Dynamic Link Context System DLCS Guidelines Follow these guidelines when using DLCS Only one user is allowed on one workstation at a given time A user can be logged into many workstations simultaneously An IP address can be learned on only one port in the network at a given time Multiple IP addresses can be learned on the same p
126. ce 181 downloads 234 proxy ARP between subnets 181 downloading complete 234 proxy ARP description of 180 downloading incremental 234 responding to ARP requests 181 logging 163 table displaying 183 primary and secondary 232 Summit 200 Series Switch Installation and User Guide 239 Index saving changes schedule download uploading to file console port connecting equipment to controlling Telnet access conventions notice icons About This Guide text About This Guide creating access lists access masks rate limits D database applications and QoS database overflow OSPF default passwords settings STP domain users default VLAN delete access list access masks rate limit deleting a session DHCP and UDP Forwarding relay configuring server DiffServ configuring dimensions Summit 200 24 switch Summit 200 48 switch disabling a switch port disabling route advertising RIP disconnecting a Telnet session distance vector protocol description DLCS configuration commands table description guidelines limitations DNS configuration commands table description Domain Name Service See DNS domains Spanning Tree Protocol downloading incremental configuration dynamic entries FDB dynamic routes E EAP EAPOL IEEE 802 1x port authentication EAPOL flooding EAPS commands table domain creating and deleting enabling and disabling a domain enabling and disabling on a switch 232 234 233 29 54 57 xiv xiv 105
127. currences you can depend on the Event group for notification Through the SNMP traps events can trigger other actions which provides a mechanism for an automated response to certain occurrences Configuring RMON RMON requires one probe per LAN segment and standalone RMON probes traditionally have been expensive Therefore Extreme s approach has been to build an inexpensive RMON probe into the agent of each system This allows RMON to be widely deployed around the network without costing more than traditional network management The switch accurately maintains RMON statistics at the maximum line rate of all of its ports For example statistics can be related to individual ports Also because a probe must be able to see all traffic a stand alone probe must be attached to a nonsecure port Implementing RMON in the switch means that all ports can have security features enabled To enable or disable the collection of RMON statistics on the switch use the following command enable disable rmon 166 Summit 200 Series Switch Installation and User Guide RMON By default RMON is disabled However even in the disabled state the switch response to RMON queries and sets for alarms and events By enabling RMON the switch begins the processes necessary for collecting switch statistics Event Actions The actions that you can define for each alarm are shown in Table 49 Table 49 Event Actions Action High Threshold No action
128. d permit Specifies the packets that match the access list description are permitted to be forward by this switch An optional QoS profile can be assigned to the access list so that the switch can prioritize packets accordingly set Modify the DiffServ code point and or the 802 1p value for matching packets permit established Specifies a uni directional session establishment is denied deny Specifies the packets that match the access list description are filtered dropped by the switch Summit 200 Series Switch Installation and User Guide 107 Access Policies Table 30 Access Control List Configuration Commands continued Command Description create access mask lt access mask name gt Creates an access mask The mask specifies dest mac which packet fields to examine Options include rce m Pe eae ac e lt access mask name gt Specifies the access mask name The access mask name E oint can be between 1 and 31 characters ipprotocol e dest mac Specifies the destination MAC dest ip lt mask length gt dest L4port address field source ip lt mask length gt source L4port icmp type icmp code permit established egressport e vlan Specifies the VLANid field ports precedence lt number gt source mac Specifies the source MAC address field e ethertype Specifies the Ethertype field e tos Specifies the IP precedence field e code point Specifies the DiffS
129. d MIBs 58 poison reverse 195 system contact 59 redistributing routes 201 system location 59 reset and disable commands table 206 system name 59 routing access policies 115 trap receivers 58 routing table entries 195 using 58 settings displaying 206 SNTP show commands table 206 configuration commands table 75 split horizon 195 configuring 72 triggered updates 195 Daylight Savings Time 72 version 2 195 description 72 RMON example 75 alarm actions 167 Greenwich Mean Time offset Alarms group 166 configuring 72 Events group 166 offset values table 73 features supported 165 SNTP servers 72 Summit 200 Series Switch Installation and User Guide 243 Index socket power 19 21 laser safety certifications 224 software licensing LEDs 17 security features 39 MAC address 19 SSH2 protocol Extreme Networks support website 39 port connections 17 Spanning Tree Protocol See STP power socket 19 speed ports 78 power supply specifications 223 split horizon 195 power off specifications 223 SSH2 protocol rear view 18 authentication key 57 safety certifications 223 description 57 serial number 19 enabling 57 temperature and humidity 223 licensing Extreme Networks support website 39 weight 223 TCP port number 58 Summit 200 48 switch stand alone switch enabling and disabling ports 77 certification marks 227 static routes 179 dimensions 226 statistics electromagnetic compatibilit 226 gn p y port 159 environmental requirements 226 RMO
130. d a flush FDB message to its associated transit nodes During the time between when the transit node detects that the link is operable again and when the master node detects that the ring is complete the secondary port on the master node is still open and data could start traversing the transit node port that just came up To prevent the possibility of a such a temporary loop when the transit node detects that its failed link is up again it will perform these steps 1 For the port that just came up put all the protected VLANs traversing that port into a temporary blocked state 2 Remember which port has been temporarily blocked Set the state to Preforwarding When the master node receives its health check packet back on its secondary port and detects that the ring is once again complete it sends a message to all its associated transit nodes to flush their forwarding databases When the transit nodes receive the message to flush their forwarding databases they perform these steps 1 Flush their forwarding databases on the protected VLANs 2 If the port state is set to Preforwarding unblock all the previously blocked protected VLANs for the port 132 Summit 200 Series Switch Installation and User Guide Summit 200 Series Switches in Multi ring Topologies Summit 200 Series Switches in Multi ring Topologies Figure 27 shows how a data VLAN could span two rings having two interconnecting switches in common Figure 27 EAP
131. d arguments One or more values or arguments can be specified For example in the syntax use image primary secondary you must specify either the primary or secondary image when entering the command Do not type the square brackets vertical bar Separates mutually exclusive items in a list one of which must be entered For example in the syntax config snmp community read only read write lt string gt you must specify either the read or write community string in the command Do not type the vertical bar braces Enclose an optional value or a list of optional arguments One or more values or arguments can be specified For example in the syntax reboot lt date gt lt time gt cancel you can specify either a particular date and time combination or the keyword cancel to cancel a previously scheduled reboot If you do not specify an argument the command will prompt asking if you want to reboot the switch now Do not type the braces Line Editing Keys Table 13 describes the line editing keys available using the CLI Table 13 Line Editing Keys Keystroke Description Backspace Deletes character to left of cursor and shifts remainder of line to left Delete or Ctrl D Deletes character under cursor and shifts remainder of line to left Ctrl K Deletes characters from under cursor to end of line Summit 200 Series Switch Installation and User Guide 43 Accessing the Switch Table 13 Line Edit
132. d error patterns in critical areas of the network History The History group provides historical views of network performance by taking periodic samples of the counters supplied by the Statistics group The group features user defined sample intervals and bucket counters for complete customization of trend analysis The group is useful for analysis of traffic patterns and trends on a LAN segment or VLAN and to establish baseline information indicating normal operating parameters Alarms The Alarms group provides a versatile general mechanism for setting threshold and sampling intervals to generate events on any RMON variable Both rising and falling thresholds are supported and thresholds can be on the absolute value of a variable or its delta value In addition alarm thresholds can be autocalibrated or set manually Alarms inform you of a network performance problem and can trigger automated action responses through the Events group Events The Events group creates entries in an event log and or sends SNMP traps to the management workstation An event is triggered by an RMON alarm The action taken can be configured to ignore it to log the event to send an SNMP trap to the receivers listed in the trap receiver table or to both log and send a trap The RMON traps are defined in RFC 1757 for rising and falling thresholds Effective use of the Events group saves you time Rather than having to watch real time graphs for important oc
133. dd lt ipaddress gt config bootprelay delete lt ipaddress gt all config iparp add lt ipaddress gt lt mac_address gt config iparp add proxy lt ipaddress gt lt mask gt lt mac_address gt always config iparp delete lt ipaddress gt config iparp delete proxy lt ipaddress gt lt mask gt all config iparp timeout lt minutes gt disable bootp vlan lt name gt all disable bootprelay disable ipforwarding vlan lt name gt Removes dynamic entries in the IP ARP table Permanent IP ARP entries are not affected Removes the dynamic entries in the IP forwarding database If no options are specified all dynamic IP FDB entries are removed Adds the IP destination address to forward BOOTP packets Removes one or all IP destination addresses for forwarding BOOTP packets Adds a permanent entry to the ARP table Specify the IP address and MAC address of the entry Configures proxy ARP entries When mask is not specified an address with the mask 255 255 255 255 is assumed When mac_address is not specified the MAC address of the switch is used in the ARP Response When always is specified the switch answers ARP Requests without filtering requests that belong to the same subnet of the receiving router interface Deletes an entry from the ARP table Specify the IP address of the entry Deletes one or all proxy ARP entries Configures the IP ARP timeout period The default setting is 20 m
134. de on the ring e Network Login e RADIUS and TACACS command authentication e Network Address Translation NAT Enabling the Advanced Edge Functionality To enable the Advanced Edge software feature license use the following command nable license advanced edge lt license_key gt where license_key is an integer 38 Summit 200 Series Switch Installation and User Guide Security Licensing for Features Under License Control A NOTE The command unconfig switch all does not clear licensing information Once it is enabled on the switch this license cannot be disabled Verifying the Advanced Edge License To verify the Advanced Edge license use the show switch command Obtaining an Advanced Edge License You can order the desired functionality from the factory using the appropriate model of the desired product If you order licensing from the factory the switch arrives packaged with a certificate that contains the unique license key s and instructions for enabling the correct functionality on the switch The certificate is typically packaged with the switch documentation Once the license key is entered it should not be necessary to enter the information again However we recommend keeping the certificate for your records You can upgrade the Advanced Edge licensing of an existing product by purchasing a voucher for the desired product and functionality Please contact your supplier to purchase a voucher The vo
135. determined by the MAC address of the end station that plugs into the physical port You can configure the source MAC address to VLAN mapping either offline or dynamically on the switch For example you could use this application for a roaming user who wants to connect to a network from a conference room In each room the user plugs into one of the designated ports on the switch and is mapped to the appropriate VLAN Connectivity is maintained to the network with all of the benefits of the configured VLAN in terms of QoS routing and protocol support MAC Based VLAN Guidelines When using the MAC to VLAN mapping consider the following guidelines e A port can only accept connections from an endstation host and should not be connected to a layer 2 repeater device Connecting to a layer 2 repeater device can cause certain addresses to not be mapped to their respective VLAN if they are not correctly configured in the MAC VLAN configuration database If a repeater device is connected to a MAC Based VLAN port and the configured MAC to VLAN mapped station enters on the repeater any endstation that is attached to the repeater can be mapped to that VLAN while the configured endstation is active in that VLAN Upon removal of the configured MAC to VLAN endstation all other endstations lose connectivity e Groups are used as a security measure to allow a MAC address to enter into a VLAN only when the group mapping matches the port mapping As an example th
136. device has not transmitted This prevents the database from becoming full with obsolete entries by ensuring that when a device is removed from the network its entry is deleted from the database Dynamic entries are deleted from the database if the switch is reset or a power off on cycle occurs For more information about setting the aging time refer to Configuring FDB Entries later in this chapter e Nonaging entries If the aging time is set to zero all aging entries in the database are defined as static nonaging entries This means that they do not age but they are still deleted if the switch is reset e Permanent entries Permanent entries are retained in the database if the switch is reset or a power off on cycle occurs The system administrator must make entries permanent A permanent entry can either be a unicast or multicast MAC address All entries entered by way of the command line Summit 200 Series Switch Installation and User Guide 97 Forwarding Database FDB interface are stored as permanent The Summit 200 series switches support a maximum of 64 permanent entries Once created permanent entries stay the same as when they were created For example the permanent entry store is not updated when any of the following take place A VLAN is deleted A VLAN identifier VLANid is changed A port mode is changed tagged untagged A port is deleted from a VLAN A port is disabled A port en
137. dvertised into OSPF for the switch as a whole To configure a direct filter policy use the following command config ospf direct filter lt access_profile gt none Example Figure 22 illustrates an OSPF network that is similar to the network used previously in the RIP example In this example access to the Internet is accomplished by using the ASBR function on the switch labeled Internet As a result all routes to the Internet will be done through external routes Suppose the network administrator wishes to only allow access to certain internet addresses falling within the range 192 1 1 0 24 to the internal backbone Summit 200 Series Switch Installation and User Guide 117 Access Policies Figure 22 OSPF access policy example Switch being configured BSSS S008 come 10 0 0 10 24 Backbone OSPF area 0 0 0 0 10 0 0 11 24 10 0 0 12 24 PRESESH memm 10 1 1 1 24 10 2 1 1 24 Engsvrs area 0 0 0 1 area 0 0 0 2 LC24012 To configure the switch labeled Internet the commands would be as follows create access profile okinternet ipaddress config access profile okinternet mode permit config access profile okinternet add 192 1 1 0 24 config ospf asbr filter okinternet Making Changes to a Routing Access Policy You can change the routing access policy by changing the associated access profile However the propagation of the change depends on the p
138. e LVD TUV R GS Mark by German Notified Body EN60950 2000 European Safety CB Scheme IEC60950 2000 with all country deviations International Safety Mexico NOM NYCE Product Safety and EMC Approval Australia New Zealand AS NZS 3260 ACA DoC Safety of ITE Argentina S Mark GOST Russia Laser Safety North America Europe FCC 21 CFR subpart J Safety of Laser Products CDRH Letter of Approval US FDA Approval EN60825 2 European Safety of Lasers Electromagnetic Compatibility North America Europe International Country Specific FCC 47 CFR Part 15 Class A US Emissions ICES 003 Class A Canada Emissions 89 336 EEC EMC Directive ETSI EN 300 386 2001 EU Telecommunications Emissions and Immunity EN55022 1998 Class A European Emissions EN55024 1998 includes IEC EN 61000 2 3 4 5 6 11 European Immunity EN 61000 3 2 3 Europe Harmonics and Flicker IEC CISPR 22 1997 Class A International Emissions IEC CISPR 24 1998 International Immunity IEC EN 61000 4 2 Electrostatic Discharge IEC EN 61000 4 3 Radiated Immunity IEC EN 61000 4 4 Transient Bursts IEC EN 61000 4 5 Surge IEC EN 61000 4 6 Conducted Immunity IEC EN 61000 4 11 Power Dips and Interruptions Japan Class A VCCI Registration Emissions Australia New Zealand AS NZS 3548 ACA DoC Emissions Korean MIC Mark MIC Approval Emissions and Immunity Mexico NOM NYCE Product Safety and EMC Approval GOST Russia Taiwa
139. e 171 Spanning Tree Protocol STP Figure 31 Tag based STP configuration Marketing amp Sales Marketing Sales amp Engineering ee eee Ca ese Sees NGG Switch 1 Switch 3 Switch 2 E E i as iso E e ee ee ee U B a S es n a Sales amp Engineering LC24014 The tag based network in Figure 31 has the following configuration e Switch 1 contains VLAN Marketing and VLAN Sales e Switch 2 contains VLAN Engineering and VLAN Sales e Switch 3 contains VLAN Marketing VLAN Engineering and VLAN Sales e The tagged trunk connections for three switches form a triangular loop that is not permitted in an STP topology e All VLANs in each switch are members of the same STPD STP can block traffic between switch 1 and switch 3 by disabling the trunk ports for that connection on each switch Switch 2 has no ports assigned to VLAN marketing Therefore if the trunk for VLAN marketing on switches 1 and 3 is blocked the traffic for VLAN marketing will not be able to traverse the switches Configuring STP on the Switch To configure STP follow these steps 1 Create one or more STP domains using the following command create stpd lt stpd_name gt A NOTE STPD VLAN and QoS profile names must all be unique For example a n
140. e VLAN currently using untagged traffic on the port If this were the default VLAN the command would be Summit200 24 30 config vlan default del port 1 which should now allow you to re enter the previous command without error as follows Summit200 24 31 config vlan red add port 1 VLAN names There are restrictions on VLAN names They cannot contain whitespaces and cannot start with a numeric value unless you use quotation marks around the name If a name contains whitespaces starts with a number or contains non alphabetical characters you must use quotation marks whenever referring to the VLAN name VLANs IP Addresses and default routes The system can have an IP address for each configured VLAN It is necessary to have an IP address associated with a VLAN if you intend to manage Telnet SNMP ping through that VLAN or route IP traffic You can also configure multiple default routes for the system The system first tries the default route with the lowest cost metric 236 Summit 200 Series Switch Installation and User Guide Debug Tracing STP You have connected an endstation directly to the switch and the endstation fails to boot correctly The switch has STP enabled and the endstation is booting before the STP initialization process is complete Specify that STP has been disabled for that VLAN or turn off STP for the switch ports of the endstation and devices to which it is attempting to connect and then reboot the
141. e following configuration allows MAC 00 00 00 00 00 aa to enter into the VLAN only on ports 10 and 11 because of membership in group 100 Summit48 50 show mac Port Vlan Group State 10 MacVlanDiscover 100 Discover 11 MacVlanDiscover 100 Discover 12 MacVlanDiscover any Discover 13 MacVlanDiscover any Discover 14 MacVlanDiscover any Discover Total Entries in Database 2 Mac Vlan Group 00 00 00 00 00 aa sales 100 00 00 00 00 00 01 sales any 2 matching entries e The group any is equivalent to the group 0 Ports that are configured as any allow any MAC address to be assigned to a VLAN regardless of group association e Partial configurations of the MAC to VLAN database can be downloaded to the switch using the timed download configuration feature Summit 200 Series Switch Installation and User Guide 93 Virtual LANs VLANs MAC Based VLAN Limitations The following list contains the limitations of MAC based VLANs e Ports participating in MAC VLANs must first be removed from any static VLANs e The MAC to VLAN mapping can only be associated with VLANs that exist on the switch e A MAC address cannot be configured to associate with more than 1 VLAN If this is attempted the MAC address is associated with the most recent VLAN entry in the MAC to VLAN database e The feature is intended to support one client per physical port Once a client MAC address has successfully registered the VLAN association rema
142. e of the complete syntax for a particular command enter as much of the command as possible and press Return The syntax helper provides a list of options for the remainder of the command The syntax helper also provides assistance if you have entered an incorrect command Command Completion with Syntax Helper ExtremeWare provides command completion by way of the Tab key If you enter a partial command pressing the Tab key posts a list of available options and places the cursor at the end of the command Abbreviated Syntax Abbreviated syntax is the most unambiguous shortest allowable abbreviation of a command or parameter Typically this is the first three letters of the command In command tables throughout this guide abbreviated syntax is noted using bold characters A NOTE When using abbreviated syntax you must enter enough characters to make the command unambiguous and distinguishable to the switch Command Shortcuts All named components of the switch configuration must have a unique name Components are named using the create command When you enter a command to configure a named component you do not need to use the keyword of the component For example to create a VLAN you must enter a unique VLAN name create vlan engineering Once you have created the VLAN with a unique name you can then eliminate the keyword vlan from all other commands that require the name to be entered For example on the stand alo
143. e sensitive Configures the banner string You can enter up to 24 rows of 79 column text that is displayed before the login prompt of each session Press Return at the beginning of a line to terminate the command and apply the banner To clear the banner press Return at the beginning of the first line Manually configures the port speed and duplex setting of one or more ports on a switch Generates the SSH2 host key 44 Summit 200 Series Switch Installation and User Guide Table 14 Common Commands continued Command config sys recovery level none critical all config time lt date gt lt time gt config timezone lt gmt_offset gt autodst noautodst config vlan lt name gt ipaddress lt ip_address gt lt mask gt create account admin user lt username gt encrypted lt password gt create vlan lt name gt delete account lt username gt delete vian lt name gt disable bootp vlan lt name gt all disable cli config logging disable clipaging disable idletimeouts disable ports lt portlist gt Common Commands Description Configures a recovery option for instances where an exception occurs in ExtremeWare Specify one of the following e none Recovery without system reboot e critical ExtremeWare logs an error to the syslog and reboots the system after critical exceptions e all ExtremeWare logs an error to the syslog and reboots the system after any
144. e switch use the following command reboot time lt date gt lt time gt cancel where date Specifies the date when the switch will be rebooted The date is entered in the format mm dd yyyy time Specifies the time of day using a 24 hour clock when the switch will be rebooted The time is entered in the format hh mm ss If you do not specify a reboot time the reboot occurs immediately following the command and any previously scheduled reboots are cancelled To cancel a previously scheduled reboot use the cancel option Saving Configuration Changes The configuration is the customized set of parameters that you have selected to run on the switch As you make configuration changes the new settings are stored in run time memory Settings that are stored in run time memory are not retained by the switch when the switch is rebooted To retain the settings and have them load when you reboot the switch you must save the configuration to nonvolatile storage The switch can store two different configurations a primary and a secondary When you save configuration changes you can select into which configuration area you want the changes saved If you do not specify the configuration area the changes are saved to the configuration area currently in use If you have made a mistake or you must revert to the configuration as it was before you started making changes you can tell the switch to use the secondary configuration on the next
145. e vlan lt name gt all config ospf direct filter lt access_profile gt none config ospf Isa batching timer lt timer_value gt config ospf metric table lt 10M_cost gt lt 100M_cost gt lt 1G_cost gt config ospf routerid automatic lt routerid gt config ospf spf hold time lt seconds gt config ospf vlan lt name gt area lt areaid gt Description Deletes an aggregated OSPF external route Removes a virtual link Disables OSPF on one or all VLANs router interfaces Configures a route filter for direct routes If none is specified all direct routes are exported if ospf export direct is enabled Configures the OSPF LSA batching timer value The range is between 0 disabled and 600 seconds using multiples of 5 seconds The LSAs added to the LSDB during the interval are batched together for refresh or timeout The default setting is 30 seconds Configures the automatic interface costs for 10 Mbps 100 Mbps and 1 Gbps interfaces The default cost for 10 Mbps is 10 for 100 Mbps is 5 and for 4 Gbps is 1 Configures the OSPF router ID If automatic is specified the switch uses the largest IP interface address as the OSPF router ID The default setting is automatic Configures the minimum number of seconds between Shortest Path First SPF recalculations The default setting is 3 seconds Changes the area ID of an OSPF interface VLAN Configuring OSPF Summit 200 Series Switch In
146. ea This router must be an ABR Configures the router to use the access policy to determine which inter area routes are allowed to be exported into the area This router must be an ABR Configures the router to use the access policy to limit the routes that are advertised into OSPF for the switch as a whole for switches configured to support RIP and static route re distribution into OSPF Summit 200 Series Switch Installation and User Guide 119 Access Policies Table 31 Routing Access Policy Configuration Commands continued Command Description config ospf direct filter lt access_profile gt Configures the router to use the access policy to none limit the routes that are advertised into OSPF for the switch as a whole for switches configured to support direct route re distribution into OSPF config rip vlan lt name gt all export filter Configures RIP to suppress certain routes when lt access profile gt none performing route advertisements config rip vlan lt name gt all import filter Configures RIP to ignore certain routes received lt access_profile gt none from its neighbor config rip vlan lt name gt all trusted gateway Configures RIP to use the access list to lt access_profile gt none determine which RIP neighbor to receive or reject the routes create access profile lt access_profile gt type Creates an access profile Once the access ipaddress profile is created one or
147. each access profile entry If you do not specify a sequence number entries are sequenced in the order they are added Each entry is assigned a value of 5 more than the sequence number of the last entry Permit and Deny Entries If you have configured the access profile mode to be none you must specify each entry type as either permit or deny If you do not specify the entry type it is added as a permit entry If you have configured the access profile mode to be permit or deny it is not necessary to specify a type for each entry Deleting an Access Profile Entry To delete an access profile entry use the following command config access profile lt access_profile gt delete lt seq_number gt Applying Access Profiles Once the access profile is defined apply it to one or more routing protocols or VLANs When an access profile is applied to a protocol function for example the export of RIP routes or a VLAN this forms an access policy A profile can be used by multiple routing protocol functions or VLANs but a protocol function or VLAN can use only one access profile Routing Access Policies for RIP If you are using the RIP protocol the switch can be configured to use an access profile to determine Trusted Neighbor Use an access profile to determine trusted RIP router neighbors for the VLAN on the switch running RIP To configure a trusted neighbor policy use the following command config rip vlan lt name gt
148. ecific functional area to which the error refers Table 47 describes the subsystems Summit 200 Series Switch Installation and User Guide 161 Status Monitoring and Statistics Table 47 Fault Log Subsystems Subsystem Description Syst General system related information Examples include memory power supply security violations fan failure overheat condition and configuration mode STP STP information Examples include an STP state change Brdg Bridge related functionality Examples include low table space and queue overflow SNMP SNMP information Examples include community string violations Telnet Information related to Telnet login and configuration performed by way of a Telnet session VLAN VLAN related configuration information Port Port management related configuration Examples include port statistics and errors e Message The message contains the log information with text that is specific to the problem Local Logging The switch maintains 1 000 messages in its internal log You can display a snapshot of the log at any time by using the following command show log lt priority gt where priority Filters the log to display message with the selected priority or higher more critical Priorities include in order critical emergency alert error warning notice info and debug If not specified all messages are displayed Real Time Display In addition to viewing a snapshot of the log you
149. eck CRC error Receive Alignment Errors RX Align The total number of frames received by the port that occurs if a frame has a CRC error and does not contain an integral number of octets Receive Frames Lost RX Lost The total number of frames received by the port that were lost because of buffer overflow in the switch Port Monitoring Display Keys Table 45 describes the keys used to control the displays that appear when you issue any of the show port commands Table 45 Port Monitoring Display Keys Key s Description U D Displays the previous page of ports Displays the next page of ports Esc or Return Exits from the screen 0 Clears all counters Space Cycles through the following screens e Packets per second Bytes per second Percentage of bandwidth Available using the show port utilization command only 160 Summit 200 Series Switch Installation and User Guide Setting the System Recovery Level Setting the System Recovery Level You can configure the system to automatically reboot after a software task exception using the following command config sys recovery level none critical all where none Configures the level to recovery without a system reboot critical Configures ExtremeWare to log an error into the syslog and automatically reboot the system after a critical exception all Configures ExtremeWare to log an error into the syslog and automatically reboot
150. econdary shared secret encrypted lt string gt disable tacacs disable tacacs accounting disable tacacs authorization enable tacacs Configure the server information for a TACACS server Specify the following e primary secondary Specifies primary or secondary server configuration To remove a server use the address 0 0 0 0 e lt ipaddress gt lt hostname gt Specifies the TACACS server e lt udp_port gt Optionally specifies the UDP port to be used e client ip Specifies the IP address used by the switch to identify itself when communicating with the TACACS server Configures the shared secret string used to communicate with the TACACS server Configures the TACACS accounting server You can use the same server for accounting and authentication Configures the shared secret string used to communicate with the TACACS accounting server Disables TACACS Disables TACACS accounting Disables CLI command authorization Enables TACACS Once enabled all CLI logins are sent to one of the two TACACS server for login name authentication and accounting Summit 200 Series Switch Installation and User Guide 65 Managing the Switch Table 20 TACACS Commands continued Command enable tacacs accounting enable tacacs authorization show tacacs show tacacs accounting unconfig tacacs server primary secondary unconfig tacacs accounting server primary secondary
151. ed by Extreme Networks A WaRNinG Mini GBICs can emit invisible laser radiation Avoid direct eye exposure to beam A NOTE Remove the LC fiber optic connector from the mini GBIC prior to removing the mini GBIC from the switch A NOTE If you see an amber blinking Mini GBIC port status LED on your Summit 200 series switch the mini GBIC installed in your switch is one that is not approved or supported by Extreme Networks To correct this problem ensure that you install a mini GBIC that is approved and supported by Extreme Networks Removing a Mini GBIC To remove a mini GBIC similar to the one labeled Module A in Figure 9 gently press and hold the black plastic tab at the bottom of the connector to release the mini GBIC and pull the mini GBIC out of the SFP receptacle on the switch To remove a mini GBIC similar to the one labeled Module B in Figure 9 rotate the front handle down and pull the mini GBIC out of the slot Summit 200 Series Switch Installation and User Guide 33 Switch Installation Inserting a Mini GBIC A NOTE Mini GBICs can be installed in the SFP mini GBIC receptacles for ports 25 and 26 on the Summit 200 series switches To insert a mini GBIC connector Holding the mini GBIC by its sides insert the mini GBIC into the SFP receptacle on the switch 2 Push the mini GBIC into the SFP receptacle until you hear an audible click indicating the mini GBIC is securely seated in
152. een Extreme Networks switches only but may be compatible with third party trunking or link aggregation algorithms Check with an Extreme Networks technical representative for more information Load Sharing Algorithms Load sharing algorithms allow you to select the distribution technique used by the load sharing group to determine the output port selection Algorithm selection is not intended for use in predictive traffic engineering You can configure the address based load sharing algorithm on the Summit 200 series switch 80 Summit 200 Series Switch Installation and User Guide Load Sharing on the Switch The address based load sharing algorithm uses addressing information to determine which physical port in the load sharing group to use for forwarding traffic out of the switch Addressing information is based on the packet protocol as follows IP packets Use the source and destination MAC and IP addresses All other packets Use the source and destination MAC address Configured IP Address Based Load Sharing When you configure load sharing the switch examines a specific place in the packet to determine which egress port to use for forwarding traffic e For Layer 2 load sharing the switch uses the MAC source address MAC destination address IP source address and IP destination address e For Layer 3 load sharing the switch uses the IP destination address You can control the field examined by the switch for IP
153. equest fails the switch continues to send ping messages until interrupted Press any key to interrupt a ping request Traceroute The traceroute command enables you to trace the routed path between the switch and a destination endstation The traceroute command syntax is traceroute lt ip_address gt lt hostname gt from lt src_ipaddress gt ttl lt TTL gt port lt port gt where ip_address Specifies the IP address of the destination endstation hostname Specifies the hostname of the destination endstation To use the hostname you must first configure DNS 50 Summit 200 Series Switch Installation and User Guide Checking Basic Connectivity from Uses the specified source address in the ICMP packet If not specified the address of the transmitting interface is used ttl Configures the switch to trace up to the time to live number of the switch port Uses the specified UDP port number Summit 200 Series Switch Installation and User Guide 51 Accessing the Switch 52 Summit 200 Series Switch Installation and User Guide Managing the Switch This chapter describes the following topics e Overview on page 53 e Using the Console Interface on page 54 e Using Telnet on page 54 e Using Secure Shell 2 SSH2 on page 57 e Using SNMP on page 58 e Authenticating Users on page 60 e Using Network Login on page 66 e Using EAPOL Flooding on page 71 e Using the Simple Network Time Protocol on page 72
154. erify this to be within budget When calculating the maximum distance attainable using optical cable with a specified loss per kilometer for example 0 25 dB km Extreme Networks recommends that 3 dB of the total budget be reserved for losses induced by cable splices connectors and operating margin Figure 5 shows the total optical system budget between long range GBICs in various end to end combinations ZX ZX Rev 03 LX70 and LX100 A NOTE The ZX mini GBIC is equivalent to the ZX Rev 03 GBIC Figure 5 Total optical system budgets for long range GBICs 19 5 dB ZX GBIC 21 0 dB ZX GBIC G a C a ZX GBIC ZX GBIC O Rev 03 LX70 le 220dB_ A 1x70 Lx100 je 30 008 i x00 23 0 dB 29 0 dB ZX GBIC e a 18 0 dB 25 0 dB ZX GBIC EdB LX70 ZX GBIC eer LX100 19 0 dB 27 0 dB Sc L_19 00B AT 5x GBic zx ane ae a ae 21 5 dB Rev 03 Rev 03 24 0 dB lt _ ____ XM_041 24 Summit 200 Series Switch Installation and User Guide Mini GBIC Type and Hardware Software Support Table 9 lists the minimum attenuation requirements to prevent saturation of the receiver for each type of long range GBIC Table 9 Minimum attenuation requirements Receivers ZX prior to GBIC Type LX70 LX100 Rev 03 ZX Rev03 ZX mini LX70 9 dB 13 dB 7 dB 7 dB 9 dB LX100 8 dB 12 dB 6 dB 6 dB 8 dB Tran
155. erv code point field e ipprotocol Specifies the IP protocol field e dest ip Specifies the IP destination field and subnet mask You must supply the subnet mask e dest L4port Specifies the destination port field e source ip Specifies the IP source address field and subnet mask You must supply the subnet mask e source L4port Specifies the source port field e icmp type Specify the ICMP type field e icmp code Specify the ICMP code field e permit established Specifies the TCP SYN ACK bit fields e egressport Specify the egress port e ports Specifies the ingress port s on which this rule is applied e precedence Specifies the access mask precedence number The range is 1 to 25 600 108 Summit 200 Series Switch Installation and User Guide Using Access Control Lists Table 30 Access Control List Configuration Commands continued Command create rate limit lt rule_name gt access mask lt access mask name gt dest mac lt dest_mac gt source mac lt src_mac gt vlan lt name gt ethertype IP ARP lt hex_value gt tos lt ip_precedence gt code point lt code_point gt ipprotocol tcp udp icmp igmp lt protocol_num gt dest ip lt dest_IP gt lt mask length gt dest L4port lt dest_port gt source ip lt src_IP gt lt mask length gt source L4port lt src_port gt icmp type lt icmp_type gt icmp code lt icmp_code gt egressport lt port
156. es Disables the generation of ICMP timestamp response messages If a VLAN is not specified the command applies to all IP interfaces Disables the generation of ICMP network unreachable messages and host unreachable messages If a VLAN is not specified the command applies to all IP interfaces Disables the changing of routing table information when an ICMP redirect message is received Disables routing for one or all VLANs Disables routing of broadcasts to other networks Disables the generation of router advertisement messages on one or all VLANs Resets all ICMP settings to the default values Resets all router advertisement settings to the default values Summit 200 Series Switch Installation and User Guide 189 IP Unicast Routing Configuring DHCP BOOTP Relay Once IP unicast routing is configured you can configure the switch to forward Dynamic Host Configuration Protocol DHCP or BOOTP requests coming from clients on subnets being serviced by the switch and going to hosts on different subnets This feature can be used in various applications including DHCP services between Windows NT servers and clients running Windows 95 To configure the relay function follow these steps 1 Configure VLANs and IP unicast routing 2 Enable the DHCP or BOOTP relay function using the following command enable bootprelay 3 Configure the addresses to which DHCP or BOOTP requests should be directed using the following command
157. essing too many health check packets Increasing the hellotime value should not affect the network convergence time because transit nodes are already sending link down notifications Use the failtime keyword and its associated seconds parameter to specify the amount of time the master node waits before declaring a failed state and opens the logically blocked VLANs on the secondary port seconds must be greater than the configured value for hellotime The default value is three seconds A NOTE Increasing the failtime value provides more protection against frequent flapping between the complete state and the failed state by waiting long enough to receive a health check packet when the network is congested A NOTE When the master node declares a failed state it also flushes its forwarding database FDB and sends a flush FDB message to all the transit switches on the ring by way of the control VLAN The reason for flushing the FDB is so that the switches can relearn the new directions to reach Layer 2 end stations via the reconfigured topology The following command examples configure the hellotime value for the EAPS domain eaps_1 to 2 seconds and the failtime value to 10 seconds config eaps eaps_1 hellotime 2 config eaps eaps_1l failtime 10 Configuring the Primary and Secondary Ports Each node on the ring connects to the ring through two ring ports As part of the protection switching scheme one port m
158. eters on page 54 for more information Telnet is enabled by default To open the Telnet session you must specify the IP address of the device that you want to manage Check the user manual supplied with the Telnet facility if you are unsure of how to do this Once the connection is established you will see the switch prompt and you may log in Connecting to Another Host Using Telnet You can Telnet from the current CLI session to another host using the following command telnet lt ipaddress gt lt hostname gt lt port_number gt If the TCP port number is not specified the Telnet session defaults to port 23 Only VT100 emulation is supported Configuring Switch IP Parameters To manage the switch by way of a Telnet connection or by using an SNMP Network Manager you must first configure the switch IP parameters Using a BOOTP Server If you are using IP and you have a Bootstrap Protocol BOOTP server set up correctly on your network you must add the following information to the BOOTP server e Switch Media Access Control MAC address found on the rear label of the switch e IP address e Subnet address mask optional Once this is done the IP address and subnet mask for the switch will be downloaded automatically You can then start managing the switch without further configuration 54 Summit 200 Series Switch Installation and User Guide Using Telnet You can enable BOOTP on a per VLAN basis by using the followin
159. etmask gt lt ipaddress gt tcp udp both auto constrain This rule uses auto constrain NAT Remember that each inside IP address will be restricted in the number of simultaneous connections Most installations should use portmap mode Auto Constrain Example config nat add out_vlan_3 map source 192 168 3 0 24 to 216 52 8 64 32 both auto constrain Advanced Rule Matching By default NAT rules only match connections based on the source IP address of the outgoing packets Using the L4 port and destination keywords you can further limit the scope of the NAT rule so that it only applied to specific TCP UDP Layer 4 port numbers or specific outside destination IP addresses A NOTE Once a single rule is matched no other rules are processed Destination Specific NAT config nat add delete vlan lt outside_vlan gt map source any lt ipaddress gt lt bits gt lt netmask gt destination lt ipaddress mask gt to lt ipaddress gt lt mask gt lt netmask gt lt ipaddress gt The addition of the destination optional keyword after the source IP address and mask allows the NAT rule to be applied to only packets with a specific destination IP address L4 Port Specific NAT The addition of the L4 port optional keyword after the source IP address and mask allows the NAT rule to be applied only to packets with a specific L4 source or destination port If you use the L4 port command after the source IP mas
160. f area lt areaid gt Stub Areas OSPF allows certain areas to be configured as stub areas A stub area is connected to only one other area The area that connects to a stub area can be the backbone area External route information is not distributed into stub areas Stub areas are used to reduce memory consumption and computation requirements on OSPF routers Not So Stubby Areas NSSA NSSAs are similar to the existing OSPF stub area configuration option but have the following two additional capabilities e External routes originating from an ASBR connected to the NSSA can be advertised within the NSSA e External routes originating from the NSSA can be propagated to other areas including the backbone area The CLI command to control the NSSA function is similar to the command used for configuring a stub area as follows config ospf area lt area_id gt nssa summary nosummary stub default cost lt cost gt translate 198 Summit 200 Series Switch Installation and User Guide Overview of OSPF The translate option determines whether type 7 LSAs are translated into type 5 LSAs When configuring an OSPF area as an NSSA the translate should only be used on NSSA border routers where translation is to be enforced If translate is not used on any NSSA border router in a NSSA one of the ABRs for that NSSA is elected to perform translation as indicated in the NSSA specification The option should not be used on NSSA internal ro
161. f routers defined by OSPF are as follows e Internal Router IR An internal router has all of its interfaces within the same area e Area Border Router ABR An ABR has interfaces in multiple areas It is responsible for exchanging summary advertisements with other ABRs You can create a maximum of 7 non zero areas e Autonomous System Border Router ASBR An ASBR acts as a gateway between OSPF and other routing protocols or other autonomous systems Backbone Area Area 0 0 0 0 Any OSPF network that contains more than one area is required to have an area configured as area 0 0 0 0 also called the backbone All areas in an autonomous system must be connected to the backbone When designing networks you should start with area 0 0 0 0 and then expand into other areas The backbone allows summary information to be exchanged between ABRs Every ABR hears the area summaries from all other ABRs The ABR then forms a picture of the distance to all networks outside of its area by examining the collected advertisements and adding in the backbone distance to each advertising router When a VLAN is configured to run OSPF you must configure the area for the VLAN If you want to configure the VLAN to be part of a different OSPF area use the following command config ospf vlan lt name gt area lt areaid gt If this is the first instance of the OSPF area being used you must create the area first using the following command create osp
162. figuration Downloading a complete configuration replicates or restores the entire configuration to the switch You typically use this type of download in conjunction with the upload config command which generates a complete switch configuration in an ASCII format As part of the complete configuration download the switch is automatically rebooted To download a complete configuration use the following command download configuration lt hostname gt lt ipaddress gt lt filename gt After the ASCII configuration is downloaded by way of TFIP you are prompted to reboot the switch The downloaded configuration file is stored in current switch memory during the rebooting process and is not retained if the switch has a power failure When the switch completes booting it treats the downloaded configuration file as a script of CLI commands and automatically executes the commands If your CLI connection is through a Telnet connection and not the console port your connection is terminated when the switch reboots but the command executes normally Downloading an Incremental Configuration A partial or incremental change to the switch configuration may be accomplished by downloaded ASCII files that contain CLI commands These commands are interpreted as a script of CLI commands and take effect at the time of the download without requiring a reboot of the switch To download an incremental configuration use the following command downl
163. formation about a particular OSPF area show ospf ase summary Displays the OSPF external route aggregation configuration show ospf interfaces detail Displays information about all OSPF interfaces show ospf interfaces vlan lt name gt area Displays information about one or all OSPF lt areaid gt interfaces show ospf Isdb detail area lt areaid gt all Displays a table of the current LSDB You router network Ssummary net summary asb can filter the display using the area ID and as external external type7 all LSA type The default setting is a11 with no detail If detail is specified each entry includes complete LSA information show ospf virtual link lt areaid gt lt routerid gt Displays virtual link information about a particular router or all routers OSPF LSD Display ExtremeWare provides several filtering criteria for the show ospf 1sdb command You can specify multiple search criteria and only results matching all of the criteria are displayed This allows you to control the displayed entries in large routing tables To display the current link state database use the following command show ospf lsdb detail summary stats area all lt areaid gt lt len gt lstype all as external xternal type7 network router summary asb summary net lsid lt id gt lt len gt routerid lt id gt lt len gt The detail option displays all fields of matching LSAs in a multi line f
164. g command enable bootp vlan lt name gt all By default BOOTP is enabled on the default VLAN If you configure the switch to use BOOTP the switch IP address is not retained through a power cycle even if the configuration has been saved To retain the IP address through a power cycle you must configure the IP address of the VLAN using the command line interface Telnet or Web interface All VLANs within a switch that are configured to use BOOTP to get their IP address use the same MAC address Therefore if you are using BOOTP relay through a router the BOOTP server must be capable of differentiating its relay based on the gateway portion of the BOOTP packet A NOTE For more information on DHCP BOOTP relay see Chapter 15 IP Unicast Routing Manually Configuring the IP Settings If you are using IP without a BOOTP server you must enter the IP parameters for the switch in order for the SNMP Network Manager Telnet software or Web interface to communicate with the device To assign IP parameters to the switch you must perform the following tasks e Log in to the switch with administrator privileges e Assign an IP address and subnet mask to a VLAN The switch comes configured with a default VLAN named default To use Telnet or an SNMP Network Manager you must have at least one VLAN on the switch and it must be assigned an IP address and subnet mask IP addresses are always assigned to a VLAN The switch can be assigned
165. g ospf vlan area config ospf vlan neighbor add config ospf vlan neighbor delete config ospf vlan timer config ports auto off config ports auto on config ports auto polarity config ports display string config ports gosprofile config radius server config radius shared secret config radius accounting config radius accounting shared secret config rip add config rip delete config rip garbagetime config rip routetimeout config rip rxmode config rip txmode config rip updatetime config rip vlan cost config rip vlan export filter config rip vlan import filter config rip vlan trusted gateway config sharing address based config snmp add trapreceiver config snmp community config snmp delete trapreceiver config snmp syscontact config snmp syslocation config snmp sysname config sntp client config sntp client server config sntp client update interval config ssh2 key config stpd add vlan config stpd forwarddelay config stpd hellotime config stpd maxage config stpd port cost config stpd port priority config stpd priority config syslog config syslog delete config sys recovery level config tacacs config tacacs shared secret 209 209 211 209 209 208 209 198 207 207 210 211 44 78 79 78 79 79 79 145 152 61 61 61 61 203 203 206 203 203 203 203 203 203 116 120 115 120 115 120 75 73 75 44 57 172 173 173 173 174 174 174 174 163 164 164 45 161 65 65
166. g rip vlan lt name gt Configuring OSPF Disables RIP on an IP interface When RIP is disabled on the interface the parameters are not reset to their defaults Disables RIP Disables the RIP aggregation of subnet information on a RIP v2 interface Disables the distribution of non RIP routes into the RIP domain Disables the advertisement of a default route Disables poison reverse Disables split horizon Disables triggered updates Resets all RIP parameters to match the default VLAN Does not change the enable disable state of the RIP settings If no VLAN is specified all VLANs are reset Each switch that is configured to run OSPF must have a unique router ID It is recommended that you manually set the router ID of the switches participating in OSPF instead of having the switch automatically choose its router ID based on the highest interface IP address Not performing this configuration in larger dynamic environments could result in an older link state database remaining in use 206 Summit 200 Series Switch Installation and User Guide Configuring OSPF Table 64 describes the commands used to configure OSPF Table 64 OSPF Configuration Commands Command config ospf add vlan lt name gt area lt areaid gt link type auto broadcast point to point passive config ospf vlan lt name gt neighbor add lt ipaddress gt config ospf vlan lt name gt neighbor delete lt ipaddress gt config
167. ges take effect immediately A NOTE As a general rule when configuring any IP addresses for the switch you can express a subnet mask by using dotted decimal notation or by using classless inter domain routing notation CIDR CIDR uses a forward slash plus the number of bits in the subnet mask Using CIDR notation the command identical to the one above would be config vlan default ipaddress 123 45 67 8 24 6 Configure the default route for the switch using the following command config iproute add default lt gateway gt lt metric gt For example config iproute add default 123 45 67 1 7 Save your configuration changes so that they will be in effect after the next switch reboot by typing save 8 When you are finished using the facility log out of the switch by typing logout or quit Disconnecting a Telnet Session An administrator level account can disconnect a Telnet management session If this happens the user logged in by way of the Telnet connection is notified that the session has been terminated To terminate a Telnet session follow these steps 1 Log in to the switch with administrator privileges 2 Determine the session number of the session you want to terminate by using the following command show session 3 Terminate the session by using the following command clear session lt session_number gt 56 Summit 200 Series Switch Installation and User Guide Using Secure Shell 2 SSH2 Controlling Tel
168. gh local7 priority Filters the log to display message with the selected priority or higher more critical Priorities include in order critical emergency alert error warning notice info and debug If not specified only critical priority messages are sent to the syslog host A NOTE Refer to your UNIX documentation for more information about the syslog host facility Logging Configuration Changes ExtremeWare allows you to record all configuration changes and their sources that are made using the CLI by way of Telnet or the local console The changes are logged to the system log Each log entry includes the user account name that performed the change and the source IP address of the client if Telnet was used Configuration logging applies only to commands that result in a configuration change To enable configuration logging use the following command nable cli config logging To disable configuration logging use the following command disable cli config logging CLI configuration logging is enabled by default Summit 200 Series Switch Installation and User Guide 163 Status Monitoring and Statistics Logging Commands Use the commands described in Table 48 to configure or reset logging options or to display or clear the log Table 48 Logging Commands Command Description clear counters clear log static config log display lt priority gt config syslog add lt host name ip gt lt faci
169. gt port lt port number gt permit qosprofile lt qosprofile gt set code point lt code_point gt set dotip lt dotip_value gt limit lt rate_in_Mbps gt exceed action drop set code point lt code_point gt Description Creates a rate limit The rule is applied to all ingress packets Options include e lt rule_name gt Specifies the rate limit name from 1 to 31 characters e access mask Specifies the associated access mask Any field specified in the access mask must have a corresponding value specified in the rate limit e dest mac Specifies the destination MAC address e source mac Specifies the source MAC address e vlan Specifies the VLANid e ethertype Specify IP ARP or the hex value to match e tos Specifies the IP precedence value code point Specifies the DiffServ code point value e ipprotocol Specify an IP protocol or the protocol number e dest ip Specifies the IP destination address and subnet mask A mask length of 32 indicates a host entry e dest L4port Specify the destination port e source ip Specifies the IP source address and subnet mask e source L4port Specify the source port e icmp type Specify the ICMP type e icmp code Specify the ICMP code e egressport Specify the egress port e port Specifies the ingress port to which this rule is applied e permit Specifies the packets that match the access list description
170. h of time it takes to transmit an LSA packet over the interface The transit delay must be greater than 0 e Hello interval HelloInterval The interval at which routers send hello packets Smaller times allow routers to discover each other more quickly but also increase network traffic The default value is 10 seconds e Dead router wait interval RouterDeadInterval The interval after which a neighboring router is declared down due to the fact that hello packets are no longer received from the neighbor This interval should be a multiple of the hello interval The default value is 40 seconds e Router wait interval WaitInterval The interval between the interface coming up and the election of the DR and BDR This interval should be greater than the hello interval If it is close to the hello interval the network synchronizes very quickly but might not elect the correct DR or BDR The default value is equal to the dead router wait interval A NOTE The OSPF standard specifies that wait times are equal to the dead router wait interval Summit 200 Series Switch Installation and User Guide 211 Interior Gateway Routing Protocols Displaying OSPF Settings To display settings for OSPF use the commands listed in Table 65 Table 65 OSPF Show Commands Command Description show ospf Displays global OSPF information show ospf area detail Displays information about all OSPF areas show ospf area lt areaid gt Displays in
171. hat is not TCP UDP or ICMP The default setting is 600 seconds show nat timeout Displays NAT timeout settings Displaying NAT Settings To display NAT rules use the following command show nat rules vlan lt outside_vlan gt This command displays the NAT rules for a specific VLAN Rules are displayed in the order they are processed starting with the first one To display NAT traffic statistics use the following command show nat stats This command displays statistics for the NAT traffic and includes e The number of rules e The number of current connections e The number of translated packets on the inside and outside VLANs e Information on missed translations To display NAT connection information use the following command show nat connections This command displays the current NAT connection table including source IP Layer 4 port mappings from inside to outside Summit 200 Series Switch Installation and User Guide 127 Network Address Translation NAT Disabling NAT To disable NAT use the following command disable nat 128 Summit 200 Series Switch Installation and User Guide Ethernet Automatic Protection Switching This chapter describes the use of the Ethernet Automatic Protection Switching EAPS protocol and includes information on the following topics e Overview of the EAPS Protocol on page 129 e Summit 200 Series Switches in Multi ring Topologies on page 133 e Commands for Co
172. he following command config iparp add proxy lt ipaddress gt lt mask gt lt mac_address gt always Once configured the system responds to ARP Requests on behalf of the device as long as the following conditions are satisfied e The valid IP ARP Request is received on a router interface e The target IP address matches the IP address configured in the proxy ARP table e The proxy ARP table entry indicates that the system should always answer this ARP Request regardless of the ingress VLAN the always parameter must be applied Once all the proxy ARP conditions are met the switch formulates an ARP Response using the configured MAC address in the packet Proxy ARP Between Subnets In some networks it is desirable to configure the IP host with a wider subnet than the actual subnet mask of the segment Proxy ARP can be used so that the router answers ARP Requests for devices outside of the subnet As a result the host communicates as if all devices are local In reality communication with devices outside of the subnet are proxied by the router For example an IP host is configured with a class B address of 100 101 102 103 and a mask of 255 255 0 0 The switch is configured with the IP address 100 101 102 1 and a mask of 255 255 255 0 The switch is also configured with a proxy ARP entry of IP address 100 101 0 0 and mask 255 255 0 0 without the always parameter When the IP host tries to communicate with the host at address 100
173. he ability to have a port be a member of multiple VLANs This is particularly useful if you have a device such as a server that must belong to multiple VLANs The device must have a NIC that supports 802 1Q tagging A single port can be a member of only one port based VLAN All additional VLAN membership for the port must be accompanied by tags In addition to configuring the VLAN tag for the port the server must have a Network Interface Card NIC that supports 802 1Q tagging Assigning a VLAN Tag Each VLAN may be assigned an 802 1Q VLAN tag As ports are added to a VLAN with an 802 10 tag defined you decide whether each port will use tagging for that VLAN The default mode of the switch is to have all ports assigned to the VLAN named default with an 802 10 VLAN tag VLANid of 1 assigned Not all ports in the VLAN must be tagged As traffic from a port is forwarded out of the switch the switch determines in real time if each destination port should use tagged or untagged packet formats for that VLAN The switch adds and strips tags as required by the port configuration for that VLAN A NOTE Packets arriving tagged with a VLANid that is not configured on a port will be discarded 88 Summit 200 Series Switch Installation and User Guide Types of VLANs Figure 13 illustrates the physical view of a network that uses tagged and untagged traffic Figure 13 Physical diagram of tagged and untagged traffic System 1 it sew
174. he detail keyword in the show eaps command Summit 200 Series Switch Installation and User Guide 141 Ethernet Automatic Protection Switching 142 Summit 200 Series Switch Installation and User Guide Quality of Service QoS This chapter covers the following topics e Overview of Policy Based Quality of Service on page 143 e Applications and Types of QoS on page 144 e Configuring QoS for a Port or VLAN on page 145 e Traffic Groupings on page 146 MAC Based Traffic Groupings on page 147 Explicit Class of Service 802 1p and DiffServ Traffic Groupings on page 148 Physical and Logical Groupings on page 152 e Verifying Configuration and Performance on page 153 e Modifying a QoS Configuration on page 154 e Traffic Rate Limiting on page 154 e Dynamic Link Context System on page 154 Policy based Quality of Service QoS is a feature of ExtremeWare and the Extreme switch architecture that allows you to specify different service levels for traffic traversing the switch Policy based QoS is an effective control mechanism for networks that have heterogeneous traffic patterns Using Policy based QoS you can specify the service level that a particular traffic type receives Overview of Policy Based Quality of Service Policy based QoS allows you to protect bandwidth for important categories of applications or specifically limit the bandwidth associated with less critical traffic For example if voice over IP traffic require
175. hole lt ipaddress gt lt mask gt config iproute delete default lt gateway gt config iproute priority rip bootp icmp static ospf intra ospf inter ospf as external ospf extern1 ospf extern2 lt priority gt disable iproute sharing enable iproute sharing rtlookup lt ipaddress gt lt hostname gt Description Deletes a static address from the routing table Deletes a blackhole address from the routing table Deletes a default gateway from the routing table Changes the priority for all routes from a particular route origin Disables load sharing for multiple routes Enables load sharing if multiple routes to the same destination are available Only paths with the same lowest cost are shared The default setting is disabled Performs a look up in the route table to determine the best route to reach an IP address Table 55 describes the commands used to configure IP options and the ICMP protocol Table 55 ICMP Configuration Commands Command Description config irdp multicast broadcast config irdp lt mininterval gt lt maxinterval gt lt lifetime gt lt preference gt disable icmp parameter problem vlan lt name gt disable ip option loose source route disable ip option record route disable ip option record timestamp disable ip option strict source route Configures the destination address of the router advertisement messages The default setting is multicast Co
176. iate STPD BPDU Tunneling You can configure ExtremeWare to allow a BDPU to traverse a VLAN without being processed by STP even if STP is enabled on the port This is known as BPDU tunneling To enable and disable BPDU tunneling on a VLAN use the following command enable disable ignore bpdu vlan lt name gt If you have a known topology and have switches outside of your network within your STPD use this feature to keep the root bridge within your network STP Configurations When you assign VLANs to an STPD pay careful attention to the STP configuration and its effect on the forwarding of VLAN traffic The example network shown in Figure 30 uses VLAN tagging for trunk connections The following four VLANs have been defined e Sales is defined on switch A switch B and switch M e Personnel is defined on switch A switch B and switch M e Manufacturing is defined on switch Y switch Z and switch M e Engineering is defined on switch Y switch Z and switch M e Marketing is defined on all switches switch A switch B switch Y switch Z and switch M 170 Summit 200 Series Switch Installation and User Guide STP Configurations Two STPDs are defined e STPD1 contains VLANs Sales and Personnel e STPD2 contains VLANs Manufacturing and Engineering The VLAN Marketing is a member of the default STPD but not assigned to either STPD1 or STPD2 Figure 30 Multiple Spanning Tree Domains Sales Personnel Marketing Ma
177. ible for installing and setting up network equipment It assumes a basic working knowledge of Local area networks LANs Ethernet concepts Ethernet switching and bridging concepts Routing concepts Internet Protocol IP concepts Simple Network Management Protocol SNMP A NOTE If the information in the release notes shipped with your switch differs from the information in this guide follow the release notes Summit 200 Series Switch Installation and User Guide 13 Conventions Table 1 and Table 2 list conventions that are used throughout this guide Table 1 Notice Icons Icon Notice Type Alerts you to A Note Important features or instructions A Caution Risk of personal injury system damage or loss of data a Warning Risk of severe personal injury Ad Table 2 Text Conventions Convention Description Screen displays This typeface indicates command syntax or represents information as it appears on the screen The words enter When you see the word enter in this guide you must type something and type and then press the Return or Enter key Do not press the Return or Enter key when an instruction simply says type Key names Key names are written with brackets such as Return or Esc If you must press two or more keys simultaneously the key names are linked with a plus sign Example Press Ctrl Alt Del Words in italicized type Italics emphasize a point
178. icast traffic e Load sharing on multiple ports Summit 200 Series Switch Installation and User Guide 35 ExtremeWare Overview e RADIUS client and per command authentication support e TACACS support e Network Login e Console command line interface CLI connection e Telnet CLI connection e SSH2 connection e Simple Network Management Protocol SNMP support e Remote Monitoring RMON e Traffic mirroring for ports Virtual LANs VLANs ExtremeWare has a VLAN feature that enables you to construct your broadcast domains without being restricted by physical connections A VLAN is a group of location and topology independent devices that communicate as if they were on the same physical local area network LAN Implementing VLANs on your network has the following three advantages e They help to control broadcast traffic If a device in VLAN Marketing transmits a broadcast frame only VLAN Marketing devices receive the frame e They provide extra security Devices in VLAN Marketing can only communicate with devices on VLAN Sales using routing services e They ease the change and movement of devices on networks A NOTE For more information on VLANs see Chapter 7 Virtual LANs VLANs Spanning Tree Protocol The Summit 200 series switch supports the IEEE 802 1D Spanning Tree Protocol STP which is a bridge based mechanism for providing fault tolerance on networks STP enables you to implement parallel paths f
179. ications This appendix provides technical specifications for the following Summit 200 series switches e Summit 200 24 Switch on page 223 e Summit 200 48 Switch on page 226 Summit 200 24 Switch Physical and Environmental Dimensions Weight Temperature and Humidity Power Heat Dissipation Watts BTU Temperature switch power off Height 1 75 inches 4 44 cm Width 17 3 inches 43 94 cm Depth 8 1 inches 20 57 cm Weight 5 72 Ibs 2 6 kg Operating Temperature 0 to 40 C 32 to 104 F Storage Temperature 40 to 70 C 40 to 158 F Operating Humidity 10 to 95 relative humidity noncondensing Standards EN60068 to Extreme IEC68 schedule AC Line Frequency 50 Hz to 60 Hz Input Voltage Options 90 VAC to 264 VAC auto ranging Current Rating 100 120 200 240 VAC 2 0 1 0 A 24 1 W Listed by supply type Digital supplies not Rev C1 Not drifting 65 to 70 C 149 to 158 F Drifting 50 C 122 F Digital supplies Rev C1 70 to 75 C 158 to 167 F Power One supplies Rev OL and earlier 60 to 65 C 140 to 149 F Power One supplies Rev OM and later 75 C 167 F Summit 200 Series Switch Installation and User Guide 223 Technical Specifications Safety Certifications North America Europe International Country Specific UL 60950 3rd Edition listed US Safety CAN CSA C22 2 No 60950 00 Canadian Safety Low Voltage Directiv
180. ications 144 configuration commands table 119 web browsing applications 145 deny 114 Quality of Service See QoS examples OSPF 117 R RIP 116 rack mounting the switch 28 ae Te RADIUS it 114 and TACACS 60 65 Po i removing 118 client configuration 61 RIP 115 configuration commands table 61 Rate 114 description 60 sng Merit server configuration example 62 Routing Information Protocol See RIP gurauon routing table populating 179 per command authentication 60 3 routing See IP unicast routing per command configuration example 63 RFC 2138 attributes 62 servers 60 S TCP port 61 safety certifications rate limits Summit 200 24 switch 223 adding 105 Summit 200 48 switch 226 and QoS 154 safety information 219 deleting 106 saving configuration changes 232 receive errors 160 scheduling configuration download 234 remote logging 163 secondary image 232 Remote Monitoring See RMON security licensing renaming a VLAN 91 description 39 reset to factory defaults 233 obtaining 39 responding to ARP requests 181 serial port See console port reverse mask 115 sessions deleting 56 RIP shortcuts command 42 advantages 194 Simple Network Management Protocol See SNMP configuration commands table 203 SNMP configuration example 205 community strings 58 description 194 configuration commands table 59 disabling route advertising 195 configuring 58 enabling 182 settings displaying 60 limitations 194 supporte
181. icitly blocked using this keyword 104 Summit 200 Series Switch Installation and User Guide Using Access Control Lists A NOTE For an example of using the permit established keyword refer to Using the Permit Established Keyword on page 110 The permit established keyword denies the access control list Having a permit established access control list blocks all traffic that matches the TCP source destination and has the SYN 1 and ACK 0 flags set Adding Access Mask Access List and Rate Limit Entries Entries can be added to the access masks access lists and rate limits To add an entry you must supply a unique name using the create command and supply a number of optional parameters see Table 30 for the full command syntax For access lists and rate limits you must specify an access mask to use To modify an existing entry you must delete the entry and retype it or create a new entry with a new unique name To add an access mask entry use the following command create access mask lt name gt To add an access list entry use the following command create access list lt name gt To add a rate limit entry use the following command create rate limit lt name gt Maximum Entries If you try to create an access mask when no more are available the system will issue a warning message Three access masks are constantly used by the system leaving a maximum of 13 user definable access masks Howeve
182. imits Routing Access Policies Using Access Control Lists Access Masks 83 83 84 84 85 85 86 86 88 90 90 91 91 91 92 92 93 93 94 94 94 97 97 97 98 98 99 100 100 101 101 101 102 102 102 Summit 200 Series Switch Installation and User Guide Contents Access Lists 102 Rate Limits 103 How Access Control Lists Work 104 Access Mask Precedence Numbers 104 Specifying a Default Rule 104 The permit established Keyword 104 Adding Access Mask Access List and Rate Limit Entries 105 Deleting Access Mask Access List and Rate Limit Entries 106 Verifying Access Control List Configurations 106 Access Control List Commands 106 Access Control List Examples 110 Using Routing Access Policies 114 Creating an Access Profile 114 Configuring an Access Profile Mode 114 Adding an Access Profile Entry 114 Deleting an Access Profile Entry 115 Applying Access Profiles 115 Routing Access Policies for RIP 115 Routing Access Policies for OSPF 117 Making Changes to a Routing Access Policy 118 Removing a Routing Access Policy 118 Routing Access Policy Commands 119 Chapter 10 Network Address Translation NAT Overview 121 Internet IP Addressing 122 Configuring VLANs for NAT 122 NAT Modes 123 Configuring NAT 124 Configuring NAT Rules 124 Creating NAT Rules 125 Creating Static and Dynamic NAT Rules 125 Creating Portmap NAT Rules 125 Creating Auto Constrain NAT Rules 126 Advanced Rule Matching 126 C
183. imode fiber 500 550 62 5 125 um multimode fiber 160 220 62 5 125 um multimode fiber 200 275 1000BASE LX 50 125 um multimode fiber 400 550 1310 nm optical window 50 125 um multimode fiber 500 550 62 5 125 um multimode fiber 500 550 10 125 um single mode fiber 5 000 1000BASE ZX 10 125 um single mode fiber 50 000 1550 nm optical window 22 Summit 200 Series Switch Installation and User Guide Mini GBIC Type and Hardware Software Support SX Mini GBIC Specifications Table 6 describes the specifications for the SX mini GBIC Table 6 SX mini GBIC specifications Parameter Minimum Typical Maximum Transceiver Optical output power 9 5 dBm 4 dBm Center wavelength 830 nm 850 nm 860 nm Receiver Optical input power sensitivity 21 dBm Optical input power maximum 4 dBm Operating wavelength 830 nm 860 nm General Total system budget 11 5 dB Total optical system budget for the SX mini GBIC is 11 5 dB Extreme Networks recommends that 3 dB of the total budget be reserved for losses induced by cable splices connectors and operating margin While 8 5 dB remains available for cable induced attenuation the 1OOOBASE SX standard specifies supported distances of 275 meters over 62 5 micron multimode fiber and 550 meters over 50 micron multimode fiber There is no minimum attenuation or minimum cable length restriction LX Mini GBIC Specifications Table 7 describes the specifications for the LX mini GBIC Table 7 LX mini GBIC
184. ine prompt ends with a sign For example Summit200 24 18 Prompt Text The prompt text is taken from the SNMP sysname setting The number that follows the colon indicates the sequential line command number If an asterisk appears in front of the command line prompt it indicates that you have outstanding configuration changes that have not been saved For example Summit200 24 19 Default Accounts By default the switch is configured with two accounts as shown in Table 15 Table 15 Default Accounts Account Name Access Level admin This user can access and change all manageable parameters The admin account cannot be deleted user This user can view but not change all manageable parameters with the following exceptions e This user cannot view the user account database e This user cannot view the SNMP community strings Changing the Default Password Default accounts do not have passwords assigned to them Passwords must have a minimum of four characters and can have a maximum of 12 characters Summit 200 Series Switch Installation and User Guide 47 Accessing the Switch A NOTE User names and passwords are case sensitive To add a password to the default admin account follow these steps 1 2 3 4 5 Log in to the switch using the name admin At the password prompt press Return Add a default admin password by entering the following command config account admin Enter the new
185. ing i ii it vin Incoming l l lt e e pa p l Ao oe a fa f P EY Ieee l Ne a a Se eta oe ee BESA E EEE EA TE zs Summit 200 Series Switch Installation and User Guide 121 Network Address Translation NAT You can configure NAT to conserve IP address space by mapping a large number of inside private addresses to a much smaller number of outside public addresses In implementing NAT you must configure at least two separate VLANs involved One VLAN is configured as inside and corresponds to the private IP addresses you would like to translate into other IP addresses The other type of VLAN is configured as outside which corresponds to the public probably Internet IP addresses you want the inside addresses translated to The mappings between inside and outside IP addresses are done via rules that specify the IP subnets involved and the algorithms used to translate the addresses A NOTE The NAT modes in ExtremeWare support translating traffic initiating only from inside addresses NAT rules are associated with a single outside VLAN Multiple rules per outside VLAN are allowed The rules take effect in the order they are displayed using the show command Any number of inside VLANs can use a single outside VLAN assuming that you have created proper rules Similarly a single inside VLAN can use any number of different outside VLANs assuming that the rules and routing are set up properly Both TCP and UDP have Layer 4
186. ing Keys continued Keystroke Description Insert to right Left Arrow Moves cursor to left Right Arrow Moves cursor to right Home or Ctrl A End or Ctrl E Ctrl L Ctrl P or Up Arrow at end of command Ctrl N or Down Arrow end of command Command History Toggles on and off When toggled on inserts text and shifts previous text Moves cursor to first character in line Moves cursor to last character in line Clears screen and movers cursor to beginning of line Displays previous command in command history buffer and places cursor Displays next command in command history buffer and places cursor at ExtremeWare remembers the last 49 commands you entered You can display a list of these commands by using the following command history Common Commands Table 14 describes common commands used to manage the switch Commands specific to a particular feature are described in the other chapters of this guide Table 14 Common Commands Command Description clear session lt number gt config account lt username gt encrypted lt password gt config banner config ports lt portlist gt auto off speed 10 100 1000 duplex half full config ssh2 key pregenerated Terminates a Telnet session from the switch Configures a user account password Passwords must have a minimum of 1 character and can have a maximum of 32 characters User names and passwords are cas
187. ins until the port connection is dropped or the FDB entry ages out e The MAC to VLAN database is stored in memory only It is not stored in NVRAM As a result the the VLAN associations are lost during a reboot and you must perform an incremental download of the MAC to VLAN database to recover the VLAN associations MAC Based VLAN Example In this following example three VLANs are created engineering marketing and sales A single MAC address is associated with each VLAN The MAC address 00 00 00 00 00 02 has a group number of any or 0 associated with it allowing it to be plugged into any port that is in MacVlanDiscover mode ports 10 15 in this case The MAC address 00 00 00 00 00 01 has a group number of 10 associated with it and can only be assigned to a VLAN if inserted into ports 16 or 17 The MAC address 00 00 00 00 00 03 has a group number of 200 associated with it and can only be inserted into ports 18 through 20 enable mac vlan mac group any ports 10 15 enable mac vlan mac group 10 ports 16 17 enable mac vlan mac group 200 ports 18 20 config mac vlan add mac address 00 00 00 00 00 01 mac group 10 engineering config mac vlan add mac address 00 00 00 00 00 02 mac group any marketing config mac vlan add mac address 00 00 00 00 00 03 mac group 200 sales Timed Configuration Download for MAC Based VLANs To allow centralized control of MAC based VLANs over multiple switches a timed TFIP configuration download allows
188. intra ospf inter ospf extern1 ospf extern2 metric lt metric gt tag lt number gt enable rip originate default always cost lt metric gt tag lt number gt enable rip poisonreverse enable rip splithorizon enable rip triggerupdates Description Enables aggregation of subnet information on interfaces configured to send RIP v2 or RIP v2 compatible traffic The switch summarizes subnet routes to the nearest class network route The following rules apply when using RIP aggregation Subnet routes are aggregated to the nearest class network route when crossing a class boundary e Within a class boundary no routes are aggregated If aggregation is enabled the behavior is the same as in RIP v1 If aggregation is disabled subnet routes are never aggregated even when crossing a class boundary The default setting is disabled Enables RIP to redistribute routes from other routing functions Specify one of the following e static Static routes e direct Interface routes only interfaces that have IP forwarding enabled are exported ospf All OSPF routes ospf intra OSPF intra area routes ospf inter OSPF inter area routes ospf externl1 OSPF AS external route type 1 ospf extern2 OSPF AS external route type 2 The metric range is 0 15 If set to 0 RIP uses the route metric obtained from the route origin Configures a default route to be advertised by RIP if no o
189. inutes A setting of 0 disables ARP aging The maximum aging time is 32 767 minutes Disables the generation and processing of BOOTP packets Disables the forwarding of BOOTP requests Disables routing for one or all VLANs Summit 200 Series Switch Installation and User Guide 183 IP Unicast Routing Table 53 Basic IP Commands continued Command disable ipforwarding broadcast vlan lt name gt disable loopback mode vlan lt name gt all enable bootp vian lt name gt all enable bootprelay enable ipforwarding vlan lt name gt enable ipforwarding broadcast vlan lt name gt enable loopback mode vlan lt name gt all Description Disables routing of broadcasts to other networks Disables loopback mode on an interface Enables the generation and processing of BOOTP packets on a VLAN to obtain an IP address for the VLAN from a BOOTP server The default setting is enabled for all VLANs Enables the forwarding of BOOTP and Dynamic Host Configuration Protocol DHCP requests Enables IP routing for one or all VLANs If no argument is provided enables routing for all VLANs that have been configured with an IP address The default setting for ipforwarding is disabled Enables forwarding IP broadcast traffic for one or all VLANs If no argument is provided enables broadcast forwarding for all VLANs To enable ipforwarding must be enabled on the VLAN The default setting is disabled
190. ion Protocol RIP version 1 and RIP version 2 Open Shortest Path First OSPF routing protocol DiffServ support Summit 200 Series Switch Installation and User Guide 15 Summit 200 Series Switch Overview e Access policy support for routing protocols e Access list support for packet filtering e Access list support for rate limiting e IGMP snooping to control IP multicast traffic e Load sharing on multiple ports e RADIUS client and per command authentication support e TACACS support e Network Login e Console command line interface CLI connection e Telnet CLI connection e SSH2 connection e Simple Network Management Protocol SNMP support e Remote Monitoring RMON e Traffic mirroring for ports Summit 200 24 Switch Physical Features The Summit 200 24 switch is a compact enclosure see Figure 1 one rack unit in height 1 75 inches or 44 45 mm that provides 24 autosensing 1OBASE T 100BASE TX ports using RJ 45 connectors It also provides two 10 100 1000BASE T Gigabit Ethernet uplink ports using RJ 45 connectors and two optical ports that also allow Gigabit Ethernet uplink connections through Extreme 1000BASE SX 1000BASE LX or 1000BASE ZX Small Form Factor pluggable SFP Gigabit Interface Connectors GBICs also known as mini GBICs using LC optical fiber connectors Summit 200 24 Switch Front View Figure 1 shows the Summit 200 24 switch front view Figure 1 Summit 200 24 switch front view
191. ion and User Guide 213 Interior Gateway Routing Protocols 214 Summit 200 Series Switch Installation and User Guide IP Multicast Groups and IGMP Snooping This chapter describes the following topics e Overview on page 215 e Configuring IGMP and IGMP Snooping on page 216 e Displaying IGMP Snooping Configuration Information on page 217 e Clearing Disabling and Resetting IGMP Functions on page 217 For more information on IP multicast groups and IGMP snooping see the following publications e RFC 1112 Host Extension for IP Multicasting e RFC 2236 Internet Group Management Protocol Version 2 Overview To constrain the flooding of multicast traffic configure Summit 200 series switch interfaces to use Internet Group Management Protocol IGMP snooping so that multicast traffic is forwarded only to interfaces associated with IP multicast entities IGMP is a protocol used by an IP host to register its IP multicast group membership with a router Periodically the router queries the multicast group to see if the group is still in use If the group is still active a single IP host responds to the query and group registration is maintained When configured to use IGMP snooping a Summit 200 series switch snoops on IGMP transmissions to keep track of multicast groups and member ports IGMP is enabled by default on the switch However the switch can be configured to disable the generation of period IGMP query packets IGMP
192. ior Gateway Routing Protocols Re Distributing Routes into OSPF Enable or disable the exporting of RIP static and direct interface routes to OSPF using the following commands enable ospf export static rip direct cost lt metric gt ase type 1 ase type 2 tag lt number gt disable ospf export static rip direct These commands enable or disable the exporting of RIP static and direct routes by way of LSA to other OSPF routers as AS external type 1 or type 2 routes The default setting is disabled The cost metric is inserted for all RIP learned static and direct routes injected into OSPF If the cost metric is set to 0 the cost is inserted from the route The tag value is used only by special routing applications Use 0 if you do not have specific requirements for using a tag The tag value in this instance has no relationship with 802 10 VLAN tagging The same cost cost type and tag values can be inserted for all the export routes or route maps can be sued for selective insertion Verify the configuration using the command show ospf Re Distributing Routes into RIP Enable or disable the exporting of static direct and OSPF learned routes into the RIP domain using the following commands enable rip export static direct ospf ospf intra ospf inter ospf externl ospf extern2 cost lt metric gt tag lt number gt disable rip export static direct ospf ospf intra ospf inter ospf e
193. is allowed Adds an SNMP read or read write community string The default read only community string is public The default read write community string is private Each community string can have a maximum of 127 characters and can be enclosed by double quotation marks Deletes the IP address of a specified trap receiver or all authorized trap receivers Configures the name of the system contact A maximum of 255 characters is allowed Configures the location of the switch A maximum of 255 characters is allowed Configures the name of the switch A maximum of 32 characters is allowed The default sysname is the model name of the device for example Summit200 24 The sysname appears in the switch prompt Disables SNMP on the switch Disabling SNMP access does not affect the SNMP configuration for example community strings Prevents SNMP traps from being sent from the switch Does not clear the SNMP trap receivers that have been configured Turns on SNMP support for the switch Turns on SNMP trap support Restores default values to all SNMP related entries Summit 200 Series Switch Installation and User Guide 59 Managing the Switch Displaying SNMP Settings To display the SNMP settings configured on the switch use the following command show management This command displays the following information e Enable disable state for Telnet SSH2 and SNMP e SNMP community strings e Authorized SNMP stati
194. isabling Router Settings Configuring DHCP BOOTP Relay Verifying the DHCP BOOTP Relay Configuration UDP Forwarding Configuring UDP Forwarding UDP Forwarding Example ICMP Packet Processing UDP Forwarding Commands Interior Gateway Routing Protocols Overview RIP Versus OSPF Overview of RIP Routing Table Split Horizon Poison Reverse Triggered Updates Route Advertisement of VLANs RIP Version 1 Versus RIP Version 2 Overview of OSPF Link State Database Areas Point to Point Support Route Re Distribution Configuring Route Re Distribution OSPF Timers and Authentication Configuring RIP RIP Configuration Example Displaying RIP Settings Resetting and Disabling RIP Configuring OSPF Configuring OSPF Wait Interval Displaying OSPF Settings OSPF LSD Display Resetting and Disabling OSPF Settings 183 187 188 189 190 190 190 191 191 191 192 193 194 194 195 195 195 195 195 195 196 196 197 200 201 201 202 203 205 206 206 206 211 212 212 213 Summit 200 Series Switch Installation and User Guide Chapter 17 Appendix A Appendix B Appendix C Appendix D IP Multicast Groups and IGMP Snooping Overview Configuring IGMP and IGMP Snooping Displaying IGMP Snooping Configuration Information Clearing Disabling and Resetting IGMP Functions Safety Information Important Safety Information Power Power Cord Connections Lithium Battery Technical Specifications
195. itch 226 54 powering on the switch 30 power off specifications 194 Summit 200 24 switch 223 198 Summit 200 48 switch 226 197 primary image 232 198 private community SNMP 58 207 protocol analyzers use with port mirroring 83 197 proxy ARP 197 communicating with devices outside subnet 181 194 196 conditions 181 213 configuring 181 212 description 180 182 MAC address in response 181 208 responding to requests 181 200 subnets 181 196 table displaying 188 io public community SNMP 58 197 200 Q 201 QoS 213 802 1p configuration commands table 149 213 802 1p priority 148 198 applications 144 117 blackhole 147 212 configuration commands table 145 212 database applications 144 198 description 36 143 199 DiffServ configuring 150 211 examples MAC address 147 source port 152 VLAN 152 FDB entry association 98 47 file server applications 145 48 IP TOS configuration commands table 150 242 Summit 200 Series Switch Installation and User Guide Index monitor History group 166 description 153 probe 165 real time display 153 Statistics group 166 traffic groupings 146 route sharing See IP route sharing access list 146 router interfaces 178 blackhole 147 router types OSPF 198 by precedence table 146 routing access policies explicit packet marking 148 access profile MAC address 147 applying 115 source port 152 changing 118 VLAN 152 configuring 114 verifying 153 creating 114 video applications 144 types 114 voice appl
196. itch being configured Configure the Greenwich Mean Time GMT offset and Daylight Savings Time preference The command syntax to configure GMT offset and usage of Daylight Savings is as follows config timezone lt GMT_offset gt autodst noautodst The GMT_OFFSET is in minutes from the GMT time Automatic Daylight Savings Time DST changes can be enabled or disabled The default setting is enabled Enable the SNTP client using the following command nable sntp client Once enabled the switch sends out a periodic query to the SNTP servers defined later if configured or listens to broadcast SNTP updates from the network The network time information is automatically saved into the on board real time clock If you would like this switch to use a directed query to the SNTP server configure the switch to use the SNTP server s If the switch listens to SNTP broadcasts skip this step To configure the switch to use a directed query use the following command config sntp client primary secondary server lt ip_address gt lt hostname gt NTP queries are first sent to the primary server If the primary server does not respond within 1 second or if it is not synchronized the switch queries the secondary server if one is configured If the switch cannot obtain the time it restarts the query process otherwise the switch waits for the sntp client update interval before querying again 72 Summit 200 Series Switch
197. k NY Trevor City MI USA 6 00 360 CST Central Standard Mexico City Mexico 7 00 420 MST Mountain Standard Saskatchewan Canada 8 00 480 PST Pacific Standard Los Angeles CA Cupertino CA Seattle WA USA 9 00 540 YST Yukon Standard 10 00 600 AHST Alaska Hawaii Standard CAT Central Alaska HST Hawaii Standard 11 00 660 NT Nome 12 00 720 IDLW International Date Line West Summit 200 Series Switch Installation and User Guide 73 Managing the Switch Table 23 Greenwich Mean Time Offsets continued GMT Offset in GMT Offset Common Time Zone Hours in Minutes References 1 00 60 CET Central European FWT French Winter MET Middle European MEWT Middle European Winter SWT Swedish Winter 2 00 120 EET Eastern European Russia Zone 1 3 00 180 BT Baghdad Russia Zone 2 4 00 240 ZP4 Russia Zone 3 5 00 300 ZP5 Russia Zone 4 5 30 330 IST India Standard Time 6 00 360 ZP6 Russia Zone 5 7 00 420 WAST West Australian Standard 8 00 480 CCT China Coast Russia Zone 7 9 00 540 JST Japan Standard Russia Zone 8 10 00 600 EAST East Australian Standard GST Guam Standard Russia Zone 9 11 00 660 12 00 720 IDLE International Date Line East NZST New Zealand Standard NZT New Zealand Cities Paris France Berlin Germany Amsterdam The Netherlands Brussels Belgium Vienna Austria Madrid Spain Rome Italy Bern Switzerland S
198. k the rule will match only if the port s specified are the source L4 ports If you use the L4 port command after the destination IP mask the rule will match only if the port s specified are the destination L4 ports Both options may be used together to further limit the rule 126 Summit 200 Series Switch Installation and User Guide Displaying NAT Settings Configuring Timeouts When an inside host initiates a session a session table entry is created Depending on the type of traffic or the current TCP state the table entries timeout after the configured timeout expires Table 33 describes the commands used to configure timeout periods Table 33 NAT Timeout Commands Command Description config nat finrst timeout lt seconds gt Configures the timeout for a TCP session that has been torn down or reset The default setting is 60 seconds config nat icmp timeout lt seconds gt Configures the timeout for an ICMP packet The default setting is 3 seconds config nat syn timeout lt seconds gt Configures the timeout for an entry with an unacknowledged TCP SYN state The default setting is 60 seconds config nat tcp timeout lt seconds gt Configures the timeout for a fully setup TCP SYN session The default setting is 120 seconds config nat udp timeout lt seconds gt Configures the timeout for an UDP session The default setting is 120 seconds config nat timeout lt seconds gt Configures the timeout for any IP packet t
199. k are set to the same autonegotiation state Both sides of the Gigabit link must be enabled or disabled It the two are different typically the side with autonegotiation disabled will have the link LED lit and the side with autonegotiation enabled will not be lit The default configuration for a Gigabit port is autonegotiation enabled This can be verified by entering the following command show port config Switch does not power up All products manufactured by Extreme Networks use digital power supplies with surge protection In the event of a power surge the protection circuits shut down the power supply To reset unplug the switch for 1 minute plug it back in and attempt to power up the switch If this does not work try using a different power source different power strip outlet and power cord Summit 200 Series Switch Installation and User Guide 233 Troubleshooting Using the Command Line Interface The initial welcome prompt does not display Check that your terminal or terminal emulator is correctly configured For console port access you may need to press Return several times before the welcome prompt appears Check the settings on your terminal or terminal emulator The settings are 9600 baud 8 data bits 1 stop bit no parity no flow control The SNMP Network Manager cannot access the device Check that the device IP address subnet mask and default router are correctly configured and that the device has
200. key must be generated for each SSH2 session This can be done automatically by the switch or by the client application To have the key generated by the switch use the following command config ssh2 key pregenerated If you do not select automatic key generation you are prompted to enter the key when you enable SSH2 Summit 200 Series Switch Installation and User Guide 57 Managing the Switch You can specify a TCP port number to be used for SSH2 communication By default the TCP port number is 22 The supported cipher is 3DES CBC The supported key exchange is DSA For additional information on the SSH protocol refer to FIPS 186 Federal Information Processing Standards Publication FIPSPUB 186 Digital Signature Standard 18 May 1994 This can be downloaded from ftp ftp cs hut fi pub ssh General technical information is also available from http www ssh fi After you obtain the SSH2 key value copy the key to the SSH2 client application Also ensure that the client is configured for any nondefault TCP port information that you have configured on the switch Once these tasks are accomplished you may form an SSH2 encrypted session with the switch Using SNMP Any Network Manager running the Simple Network Management Protocol SNMP can manage the switch provided the Management Information Base MIB is installed correctly on the management station Each Network Manager provides its own user interface to the management
201. l switch parameters to take advantage of this capability The RADIUS server implementation automatically negotiates the per command authentication capability with the switch For examples on per command RADIUS configurations see Configuring RADIUS Client on page 61 60 Summit 200 Series Switch Installation and User Guide Configuring RADIUS Client Authenticating Users You can define primary and secondary server communication information and for each RADIUS server the RADIUS port number to use when talking to the RADIUS server The default port value is 1645 The client IP address is the IP address used by the RADIUS server for communicating back to the switch RADIUS commands are described in Table 19 Table 19 RADIUS Commands Command Description config radius primary secondary server lt ipaddress gt lt hostname gt lt udp_port gt client ip lt ipaddress gt config radius primary secondary shared secret encrypted lt string gt config radius accounting primary secondary server lt ipaddress gt lt hostname gt lt udp_port gt client ip lt ipaddress gt config radius accounting primary secondary shared secret encrypted lt string gt disable radius disable radius accounting Configures the primary and secondary RADIUS server Specify the following e primary secondary Configure either the primary or secondary RADIUS server e lt ipaddress gt lt host
202. lity gt lt priority gt config syslog delete lt host name ip gt lt facility gt lt priority gt disable cli config logging disable log display disable syslog enable cli config logging enable log display enable syslog Clears all switch statistics and port counters Clears the log If static is specified the critical log messages are also cleared Configures the real time log display Specify the priority option to filter the log to display messages with the selected priority or higher more critical Priorities include critical emergency error alert warning notice info and debug If not specified informational priority messages and higher are displayed Configures the syslog host address and filters messages sent to the syslog host Up to 4 syslog servers can be configured Options include host name ip tThe IP address or name of the syslog host e facility tThe syslog facility level for local use localO local7 e priority Filters the log to display messages with the selected priority or higher more critical Priorities include critical emergency alert error warning notice info and debug If not specified only critical priority messages and are sent to the syslog host Deletes a syslog host address e facility tThe syslog facility level for local use localO local7 e priority Filters the log to display messages with the selected priority or higher more critical
203. lt name gt disable icmp parameter problem vlan lt name gt disable icmp port unreachables vlan lt name gt disable icmp redirects vlan lt name gt disable icmp time exceeded vlan lt name gt disable icmp timestamp vlan lt name gt disable icmp unreachables vlan lt name gt disable icmp useredirects disable ipforwarding vlan lt name gt disable ipforwarding broadcast vlan lt name gt disable irdp vlan lt name gt unconfig icmp unconfig irdp Removes dynamic entries in the IP ARP table Permanent IP ARP entries are not affected Removes the dynamic entries in the IP forwarding database If no options are specified all IP FDB entries are removed Disables the generation and processing of BOOTP packets Disables the forwarding of BOOTP requests Disables the generation of an ICMP address mask reply messages If a VLAN is not specified the command applies to all IP interfaces Disables the generation of ICMP parameter problem messages If a VLAN is not specified the command applies to all IP interfaces Disables the generation of ICMP port unreachable messages If a VLAN is not specified the command applies to all IP interfaces Disables the generation of ICMP redirect messages If a VLAN is not specified the command applies to all IP interfaces Disables the generation of ICMP time exceeded messages If a VLAN is not specified the command applies to all IP interfac
204. lt seconds gt config eaps lt name gt primary secondary port lt port number gt config eaps lt name gt add delete control vlan lt name gt config eaps lt name gt add delete protect vlan lt name gt config eaps lt old_name gt name lt new_name gt create eaps lt name gt delete eaps lt name gt disable eaps disable eaps lt name gt enable eaps enable eaps lt name gt show eaps lt name gt detail unconfig eaps lt name gt primary secondary port Configures the switch as either the EAPS master node or as an EAPS transit node for the specified domain Configures the values of the polling timers the master node uses for the EAPS health check packet that is circulated around the ring for the specified EAPS domain Configures a node port as the primary or secondary port for the specified EAPS domain Adds the specified control VLAN to the specified EAPS domain or deletes the specified control VLAN from the specified EAPS domain Adds the specified protected VLAN to the specified EAPS domain or deletes the specified protected VLAN from the specified EAPS domain Renames an existing EAPS domain Creates an EAPS domain with the specified name Only a singe domain is supported on this platform Deletes the specified EAPS domain Disables the EAPS function for an entire switch Disables the EAPS domain with the specified name Enables the EAPS function for an entire switch
205. mit deny none Adding an Access Profile Entry Next configure the access profile using the following command config access profile lt access_profile gt add lt seq_number gt permit deny ipaddress lt ipaddress gt lt mask gt exact The following sections describe the config access profile add command 114 Summit 200 Series Switch Installation and User Guide Using Routing Access Policies Specifying Subnet Masks The subnet mask specified in the access profile command is interpreted as a reverse mask A reverse mask indicates the bits that are significant in the IP address In other words a reverse mask specifies the part of the address that must match the IP address to which the profile is applied If you configure an IP address that is an exact match that is specifically denied or permitted use a mask of 32 for example 141 251 24 28 32 If the IP address represents all addresses in a subnet address that you want to deny or permit then configure the mask to cover only the subnet portion for example 141 251 10 0 24 The keyword exact can be used when you wish to match only against the subnet address and ignore all addresses within the subnet If you are using off byte boundary subnet masking the same logic applies but the configuration is more tricky For example the address 141 251 24 128 27 represents any host from subnet 141 251 24 128 Sequence Numbering You can specify the sequence number for
206. mmands Command Description config vlan lt name gt priority lt number gt Configures the 802 1p priority value for 802 1Q VLAN tags The value for priority is an integer between 0 and 7 Configuring 802 1p Priority When a packet is transmitted by the switch you can configure the 802 1p priority field that is placed in the 802 1Q tag You can configure the priority to be a number between 0 and 7 using the following command config vlan lt name gt priority lt number gt Replacing 802 1p Priority Information By default 802 1p priority information is not replaced or manipulated and the information observed on ingress is preserved when transmitting the packet This behavior is not affected by the switching or routing configuration of the switch However the switch is capable of replacing the 802 1p priority information To replace 802 1p priority information you will use an access list to set the 802 1p value See Chapter 9 Access Policies for more information on using access lists You will use the set dotlp lt dotlp_value gt parameter of the create access list command to replace the value The packet is then placed on the queue that corresponds to the new 802 1p value Summit 200 Series Switch Installation and User Guide 149 Quality of Service QoS Configuring DiffServ Contained in the header of every IP packet is a field for IP Type of Service TOS now also called the DiffServ field The TOS field is u
207. mmands on page 44 Configuring Management Access on page 46 Domain Name Service Client Services on page 49 Checking Basic Connectivity on page 50 Understanding the Command Syntax This section describes the steps to take when entering a command Refer to the sections that follow for detailed information on using the command line interface When entering a command at the prompt ensure that you have the appropriate privilege level Most configuration commands require you to have the administrator privilege level To use the command line interface CLI follow these steps 1 4 Enter the command name If the command does not include a parameter or values skip to step 3 If the command requires more information continue to step 2 If the command includes a parameter enter the parameter name and values The value part of the command specifies how you want the parameter to be set Values include numerics strings or addresses depending on the parameter After entering the complete command press Return A NOTE If an asterisk appears in front of the command line prompt it indicates that you have outstanding configuration changes that have not been saved For more information on saving configuration changes see Appendix D Software Upgrade and Boot Options Summit 200 Series Switch Installation and User Guide 41 Accessing the Switch Syntax Helper The CLI has a built in syntax helper If you are unsur
208. n lt name gt all enable cli config logging enable clipaging enable idletimeouts enable ssh2 access profile lt access_profile gt none port lt tcp_port_number gt enable telnet access profile lt access_profile gt none port lt tcp_port_number gt enable web history show banner unconfig switch all Description Disables SSH2 Telnet access to the switch Disables Telnet access to the switch Disables web access Enables BOOTP for one or more VLANs Enables the logging of CLI configuration commands to the Syslog for auditing purposes The default setting is enabled Enables pausing of the screen display when show command output reaches the end of the page The default setting is enabled Enables a timer that disconnects all sessions both Telnet and console after 20 minutes of inactivity The default setting is disabled Enables SSH2 Telnet sessions By default SSH2 uses TCP port number 22 Enables Telnet access to the switch By default Telnet uses TCP port number 23 Enables web server on the switch for Network Login support By default the web server is enabled Displays the previous 49 commands entered on the switch Displays the user configured banner Resets all switch parameters with the exception of defined user accounts and date and time information to the factory defaults If you specify the keyword all the switch erases the currently selected configuratio
209. n CNS 13438 1997 Class A BSMI Approval Emissions Certification Marks CE CE European Community TUV GS German Notified Body TUV S Argentina 224 Summit 200 Series Switch Installation and User Guide Cg ACN 090 029 066 GOST Russian Federation C Tick Australian Communication Authority Underwriters Laboratories USA and Canada MIC South Korea BSMI Republic of Taiwan NOM Mexican Official Normalization Electronic Certification and Normalization Summit 200 24 Switch Summit 200 Series Switch Installation and User Guide 225 Technical Specifications Summit 200 48 Switch Physical and Environmental Dimensions Weight Temperature and Humidity Power Heat Dissipation Watts BTU Temperature switch power off Height 1 75 inches 4 44 cm Width 17 3 inches 43 94 cm Depth 12 2 inches 31 00 cm Weight 9 7 lbs 4 4 kg Operating Temperature 0 to 40 C 32 to 104 F Storage Temperature 40 to 70 C 40 to 158 F Operating Humidity 10 to 95 relative humidity noncondensing Standards EN60068 to Extreme IEC68 schedule AC Line Frequency 50 Hz to 60 Hz Input Voltage Options 90 VAC to 264 VAC auto ranging Current Rating 100 120 200 240 VAC 2 0 1 0 A 48 0 W Listed by supply type Digital supplies not Rev C1 Not drifting 65 to 70 C 149 to 158 F Drifting 50 C 122 F Digital supplies Rev C1 70 t
210. n corp config corp ipaddress 10 201 26 11 24 config radius primary server 10 201 26 243 client ip 10 201 26 11 Summit 200 Series Switch Installation and User Guide 69 Managing the Switch config radius primary shared secret secret enable radius config corp add port 9 enable netlogin ports 9 vlan corp DHCP Server on the Switch A DHCP server with limited configuration capabilities is included in the switch to provide IP addresses to clients DHCP is enabled on a per port per VLAN basis To enable or disable DHCP on a port in a VLAN use one of the following commands enable dhcp ports lt portlist gt vlan lt name gt disable dhcp ports lt portlist gt vlan lt name gt Network Login Configuration Commands Table 21 describes the commands used to configure network login Table 21 Network Login Configuration Commands Command Description config vlan lt name gt dhcp address range lt ipaddress1 gt lt ipaddress2 gt config vlan lt name gt dhcp lease timer lt lease timer gt config vlan lt name gt dhcp options default gateway dns server wins server lt ipaddress gt config vlan lt name gt netlogin lease timer lt lease timer gt disable dhcp ports lt portlist gt vlan lt name gt disable netlogin ports lt portlist gt vlan lt name gt enable dhcp ports lt portlist gt vlan lt name gt enable netlogin ports lt portlist gt vlan lt name gt Configures a set of DHCP addre
211. n image in flash memory and reboots As a result all parameters are reset to default settings Configuring Management Access ExtremeWare supports the following two levels of management e User e Administrator In addition to the management levels you can optionally use an external RADIUS server to provide CLI command authorization checking for each command For more information on RADIUS see RADIUS Client in Chapter 5 Managing the Switch User Account A user level account has viewing access to all manageable parameters with the exception of 46 Summit 200 Series Switch Installation and User Guide Configuring Management Access e User account database e SNMP community strings A user level account can use the ping command to test device reachability and change the password assigned to the account name If you have logged on with user capabilities the command line prompt ends with a gt sign For example Summit200 24 2 gt Administrator Account An administrator level account can view and change all switch parameters It can also add and delete users and change the password associated with any account name The administrator can disconnect a management session that has been established by way of a Telnet connection If this happens the user logged on by way of the Telnet connection is notified that the session has been terminated If you have logged on with administrator capabilities the command l
212. nable nat Configuring NAT Rules To configure NAT rules use the commands listed in Table 32 Table 32 NAT Configuration Commands Command Description config nat add vlan lt outside_vian gt map source Adds a NAT translation rule that translates any lt ipaddress gt lt bits gt lt netmask gt private IP addresses to public IP addresses l4 port any lt number gt lt number gt on the outside VLAN The first IP address destination lt ipaddress gt lt mask gt l4 port specifies private side IP addresses and the any lt number gt lt number gt to lt ipaddress gt second IP address specifies the public side lt mask gt lt netmask gt lt ipaddress gt IP address Use portmap to specify port tcp udp both portmap lt min gt lt max gt translations and specify either TCP or UDP auto constrain port translation or both The range of number is 1 to 65535 The default setting for min is 1024 The default setting for max is 65535 config nat delete vlan lt outside_vlan gt map source Deletes a NAT translation rule any lt ipaddress gt lt bits gt lt netmask gt l4 port any lt number gt lt number gt destination lt ipaddress gt lt mask gt l4 port any lt number gt lt number gt to lt ipaddress gt lt mask gt lt netmask gt lt ipaddress gt tcp udp both portmap lt min gt lt max gt auto constrain
213. name gt The IP address or hostname of the server being configured e lt udp_port gt The UDP port to use to contact the RADIUS server The default UDP port setting is 1645 e client ip lt ipaddress gt The IP address used by the switch to identify itself when communicating with the RADIUS server The RADIUS server defined by this command is used for user name authentication and CLI command authentication Configures the authentication string used to communicate with the RADIUS server Configures the RADIUS accounting server Specify the following e primary secondary Configure either the primary or secondary RADIUS server e lt ipadress gt lt hostname gt The IP address or hostname of the server being configured e lt udp_port gt The UDP port to use to contact the RADIUS server The default UDP port setting is 1646 e client ip lt ipaddress gt The IP address used by the switch to identify itself when communicating with the RADIUS server The accounting server and the RADIUS authentication server can be the same Configures the authentication string used to communicate with the RADIUS accounting server Disables the RADIUS client Disables RADIUS accounting Summit 200 Series Switch Installation and User Guide 61 Managing the Switch Table 19 RADIUS Commands continued Command enable radius enable radius accounting show radius show radius accou
214. nclude Selecting the image to boot from Booting to factory default configuration Summit 200 Series Switch Installation and User Guide 235 Software Upgrade and Boot Options For example to change the image that the switch boots from in flash memory press 1 for the image stored in primary or 2 for the image stored in secondary Then press the key to boot from newly selected on board flash memory To boot to factory default configuration press the a key for default and the f key to boot from the configured on board flash Boot Option Commands Table 69 lists the CLI commands associated with switch boot options Table 69 Boot Option Commands Command Description config download server primary secondary lt hostname gt lt ipaddress gt lt filename gt download bootrom lt hostname gt lt ipaddress gt lt filename gt download configuration lt hostname gt lt ipaddress gt lt filename gt incremental download configuration cancel download configuration every lt hour gt download image lt ipaddress gt lt hostname gt lt filename gt primary secondary reboot time lt date gt lt time gt cancel save configuration primary secondary show configuration Configures the TFTP server s used by a scheduled incremental configuration download Downloads a BOOT ROM image from a TFTP server The downloaded image replaces the BOOT ROM in the onboard
215. ne switch instead of entering the command config vlan engineering delete port 1 3 6 you could enter the following shortcut config engineering delete port 1 3 6 Summit 200 Series Switch Numerical Ranges Commands that require you to enter one or more port numbers on a Summit 200 series switch use the parameter lt portlist gt in the syntax A portlist can be a range of numbers for example port 1 3 You can add additional port numbers to the list separated by a comma port 1 3 6 8 42 Summit 200 Series Switch Installation and User Guide Line Editing Keys Names All named components of the switch configuration must have a unique name Names must begin with an alphabetical character and are delimited by whitespace unless enclosed in quotation marks Symbols You may see a variety of symbols shown as part of the command syntax These symbols explain how to enter the command and you do not type them as part of the command itself Table 12 summarizes command syntax symbols Table 12 Command Syntax Symbols Symbol Description lt gt angle brackets Enclose a variable or value You must specify the variable or value For example in the syntax config vlan lt name gt ipaddress lt ip_address gt you must supply a VLAN name for lt name gt and an address for lt ip_address gt when entering the command Do not type the angle brackets Square brackets Enclose a required value or list of require
216. net Access By default Telnet services are enabled on the switch To display the status of Telnet use the following command show management You can choose to disable Telnet by using the following command disable telnet To re enable Telnet on the switch at the console port use the following enable telnet You must be logged in as an administrator to enable or disable Telnet Using Secure Shell 2 SSH2 Secure Shell 2 SSH2 is a feature of ExtremeWare that allows you to encrypt Telnet session data between the switch and a network administrator using SSH2 client software The ExtremeWare SSH2 switch application is based on the Data Fellows SSH2 server implementation It is highly recommended that you use the F Secure SSH client products from Data Fellows corporation These applications are available for most operating systems For more information refer to the Data Fellows website at http www datafellows com A NOTE SSH2 is compatible with the Data Fellows SSH2 client version 2 0 12 or above SSH2 is not compatible with SSH1 Enabling SSH2 Because SSH2 is currently under U S export restrictions before enabling SSH2 you must first obtain a security license which you can do through Extreme Networks The procedure for obtaining a security license key is described in Chapter 3 ExtremeWare Overview To enable SSH2 use the following command enable ssh2 port lt tcp_port_number gt An authentication
217. nfigures the router advertisement message timers using seconds Specify mininterval The minimum amount of time between router advertisements The default setting is 450 seconds maxinterval The maximum time between router advertisements The default setting is 600 seconds e 1lifetime The default setting is 1 800 seconds e preference tThe preference level of the router An ICMP Router Discover Protocol IRDP client always uses the router with the highest preference level Change this setting to encourage or discourage the use of this router The default setting is 0 Disables the generation of ICMP messages for the parameter problem packet type Disables the loose source route IP option Disables the record route IP option Disables the record timestamp IP option Disables the strict source route IP option Summit 200 Series Switch Installation and User Guide 185 IP Unicast Routing Table 55 ICMP Configuration Commands continued Command Description disable ip option use router alert Disables the generation of the router alert IP option enable icmp address mask vlan lt name gt Enables the generation of an ICMP address mask reply type 18 code 0 when an ICMP address mask request is received The default setting is enabled If a VLAN is not specified the command applies to all IP interfaces enable icmp parameter problem vlan lt name gt Enables the generation of an ICMP parameter pro
218. nfiguring RADIUS server configuration settings displaying non aging entries FDB Not So Stubby_Area See NSSA NSSA See OSPF O opaque LSAs OSPF Open Shortest Path First See OSPF opening a Telnet session OSPF advantages area 0 areas backbone area configuration commands table consistency database overflow description disabling display filtering enabling hello interval link type link state database normal area NSSA opaque LSAs point to point links redistributing routes reset and disable commands table resetting router types routing access policies settings displaying show commands table stub area virtual link wait interval configuring P passwords default forgetting permanent entries FDB 97 90 permit established keyword 104 ping command 50 124 poison reverse 195 126 port 126 autonegotiation 77 127 autopolarity detection feature 78 configuring on Summit 200 series switch 77 66 connections 17 20 66 67 enabling and disabling 77 67 errors viewing 159 67 monitoring display keys 160 68 priority STP 173 70 receive errors 160 67 statistics viewing 159 71 STP state displaying 175 66 69 STPD membership 169 69 Summit 200 series switch 77 69 switch commands table 79 67 transmit errors 159 70 port based VLANs 86 97 port mirroring and protocol analyzers 83 description 82 example 83 switch configuration commands table 83 power supply specifications 197 Summit 200 24 switch 223 Summit 200 48 sw
219. nfiguring and Monitoring EAPS on page 134 Overview of the EAPS Protocol The EAPS protocol provides fast protection switching to Layer 2 switches interconnected in an Ethernet ring topology such as a Metropolitan Area Network MAN or large campuses see Figure 24 Figure 24 Gigabit Ethernet fiber EAPS MAN ring Transit node Transit node Transit Gigabit Ethernet Fiber node EAPS MAN ring Transit node lt 0 ile Master node EW_070 Summit 200 Series Switch Installation and User Guide 129 Ethernet Automatic Protection Switching EAPS protection switching is similar to what can be achieved with the Spanning Tree Protocol STP but offers the advantage of converging in less than a second when a link in the ring breaks A NOTE In order to use EAPS you must enable EDP on the switch For more information on EDP refer to Chapter 6 EAPS operates by declaring an EAPS domain on a single ring Any VLAN that warrants fault protection is configured on all ring ports in the ring and is then assigned to an EAPS domain On that ring domain one switch or node is designated the master node see Figure 25 while all
220. ng and Disabling Switch Ports Table 25 describes the switch port commands Table 25 Switch Port Commands Command Description config ports lt portlist gt auto off speed 10 100 1000 duplex half full config ports lt portlist gt auto on config ports lt all portlist gt auto polarity lt off on gt config ports lt portlist gt display string lt string gt config sharing address based mac_source mac_destination mac_source_destination ip_source ip destination ip_source_destination disable ports lt portlist gt disable sharing lt port gt enable ports lt portlist gt enable sharing lt port gt grouping lt portlist gt address based restart ports lt portlist gt show ports lt portlist gt collisions Changes the configuration of a group of ports Specify the following auto off the port will not autonegotiate the settings speed tThe speed of the port e duplex tThe duplex setting half or full duplex Enables autonegotiation for the particular port type 802 3u for 10 100 Mbps ports or 802 3z for Gigabit Ethernet ports Disables or enables the autopolarity detection feature for one or more Ethernet ports Specify the following all Specifies that the feature is either disabled or enabled for all of the Ethernet ports on the switch portlist Specifies that the feature is either disabled or enabled for one or more ports identified as
221. nitial values In the case where no one knows a password for an administrator level user contact your supplier Port Configuration No link light on 10 100 Base port If patching from a hub or switch to another hub or switch ensure that you are using a CAT5 cross over cable This is a CAT5 cable that has pins 1 and 2 on one end connected to pins 3 and 6 on the other end Excessive RX CRC errors When a device that has auto negotiation disabled is connected to an Extreme switch that has auto negotiation enabled the Extreme switch links at the correct speed but in half duplex mode The Extreme switch 10 100 physical interface uses a method called parallel detection to bring up the link Because the other network device is not participating in auto negotiation and does not advertise its capabilities parallel detection on the Extreme switch is only able to sense 10 Mbps versus 100 Mbps speed and not the duplex mode Therefore the switch establishes the link in half duplex mode using the correct speed The only way to establish a full duplex link is to either force it at both sides or run auto negotiation on both sides using full duplex as an advertised capability which is the default setting on the Extreme switch A NOTE A mismatch of duplex mode between the Extreme switch and another network device will cause poor network performance Viewing statistics using the show port rx command on the Extreme switch may display a constant inc
222. nning Tree Domains The switch can be partitioned into multiple virtual bridges Each virtual bridge can run an independent Spanning Tree instance Each Spanning Tree instance is called a Spanning Tree Domain STPD Each STPD has its own root bridge and active path Once the STPD is created one or more VLANs can be assigned to it A port can belong to only one STPD If a port is a member of multiple VLANs then all those VLANs must belong to the same STPD Summit 200 Series Switch Installation and User Guide 169 Spanning Tree Protocol STP The key points to remember when configuring VLANs and STP are e Each VLAN forms an independent broadcast domain e STP blocks paths to create a loop free environment e When STP blocks a path no data can be transmitted or received on the blocked port e Within any given STPD all VLANs belonging to it use the same spanning tree A NOTE Ensure that multiple STPD instances within a single switch do not see each other in the same broadcast domain This could happen if for example another external bridge is used to connect VLANs belonging to separate STPDs If you delete an STPD the VLANs that were members of that STPD are also deleted You must remove all VLANs associated with the STP before deleting the STPD Defaults The default device configuration contains a single STPD called s0 The default VLAN is a member of STPD s50 All STP parameters default to the IEEE 802 1D values as appropr
223. nnot be powered from ITt supplies If your supplies are of IT type this unit must be powered by 230 V 2P T via an isolation transformer ratio 1 1 with the secondary connection point labeled Neutral connected directly to ground Power Cord The power cord must be approved for the country where it is used e USA and Canada The cord set must be UL listed and CSA certified The minimum specification for the flexible cord is No 18 AWG 1 5 mm Type SVT or SJT 3 conductor The cord set must have a rated current capacity of at least the amount rated for each specific product The AC attachment plug must be an Earth grounding type with a NEMA 5 15P 10 A 125 V configuration e Denmark tThe supply plug must comply with section 107 2 D1 standard DK2 1la or DK2 5a e Switzerland The supply plug must comply with SEV ASE 1011 e Argentina The supply plug must comply with Argentinian standards Connections Fiber Optic ports Optical Safety Never look at the transmit LED laser through a magnifying device while it is powered on Never look directly at the fiber port or fiber cable ends when they are powered on This is a Class 1 laser device a AA WARNING Use only for data communications applications that require optical fiber Use only with the appropriate connector When not in use replace dust cover Using this module in ways other than those described in this manual can result in intense heat that can ca
224. nserted into the mini GBIC receptacles on the Summit 200 series switch Only two of the four Gigabit Ethernet uplink ports can be active at one time For example you can use both 1000BASE T ports both mini GBIC ports or a combination of one 1000BASE T port and one mini GBIC A NOTE For information on the mini GBIC see Mini GBIC Type and Hardware Software Support on page 22 Full Duplex The Summit 200 24 switch provides full duplex support for all ports Full duplex allows frames to be transmitted and received simultaneously and in effect doubles the bandwidth available on a link All 10 100 Mbps ports on the Summit 200 24 switch autonegotiate for half or full duplex operation Summit 200 24 Switch LEDs Table 3 describes the light emitting diode LED behavior on the Summit 200 24 switch Summit 200 Series Switch Installation and User Guide 17 Summit 200 Series Switch Overview Table 3 Summit 200 24 switch LED behavior Unit Status LED MGMT LED Color Indicates Green solid The Summit switch is operating normally Green blinking The Summit switch POST is in progress Amber The Summit switch has failed its POST or an overheat condition is detected Fan LED Color Indicates Green The fan is operating normally Amber blinking A failed condition is present on the fan Port Status LEDs Ports 1 26 Color Indicates Green Link is present port is enabled Green blinking Link is present port is enabled and there
225. nsit One node on the ring must be configured as the master node for the specified domain all other nodes on the ring are configured as transit nodes for the same domain The following command example identifies this switch as the master node for the domain named eaps_1 config eaps eaps_l mode master The following command example identifies this switch as a transit node for the domain named eaps_1 config eaps eaps_1 mode transit Configuring EAPS Polling Timers To set the values of the polling timers the master node uses for the EAPS health check packet that is circulated around the ring for an EAPS domain use the following command config eaps lt name gt hellotime lt seconds gt failtime lt seconds gt A NOTE This command applies only to the master node If you configure the polling timers for a transit node they will be ignored If you later reconfigure that transit node as the master node the polling timer values will be used as the current values Summit 200 Series Switch Installation and User Guide 135 Ethernet Automatic Protection Switching Use the hellotime keyword and its associated seconds parameter to specify the amount of time the master node waits between transmissions of health check packets on the control VLAN seconds must be greater than 0 when you are configuring a master node The default value is one second A NOTE Increasing the hellotime value keeps the processor from sending and proc
226. ntagged using the protocol filter any ESRP will not function correctly if the ESRP aware switch interconnection port is configured for a protocol sensitive VLAN using untagged traffic Software Licensing Some Extreme Networks products have capabilities that are enabled by using a license key Keys are typically unique to the switch and are not transferable Keys are stored in NVRAM and once entered persist through reboots software upgrades and reconfigurations The following sections describe the features that are associated with license keys Feature Licensing Summit 200 series switches support software licensing for different levels of functionality In ExtremeWare version 6 2e 2 feature support is separated into two sets Edge and Advanced Edge Edge is a subset of Advanced Edge Edge Functionality Edge functionality requires no license key Summit 200 series switches have Edge functionality without the requirement of a license key Edge functionality includes all switching functions and also includes all available layer 3 QoS access list and ESRP aware functions Layer 3 routing functions include support for e IP routing using RIP version 1 and or RIP version 2 e IP routing between directly attached VLANs e IP routing using static routes Advanced Edge Functionality The Advanced Edge license enables support of additional functions including e Rate limiting ACLs e IP routing using OSPF e EAPS Edge cannot be a core no
227. nting unconfig radius server primary secondary unconfig radius accounting server primary secondary RADIUS RFC 2138 Attributes Description Enables the RADIUS client When enabled all CLI logins are sent to the RADIUS servers for authentication When used with a RADIUS server that supports ExtremeWare CLI authorization each CLI command is sent to the RADIUS server for authentication before it is executed Enables RADIUS accounting The RADIUS client must also be enabled Displays the current RADIUS client configuration and statistics Displays the current RADIUS accounting client configuration and statistics Unconfigures the radius client configuration Unconfigures the radius accounting client configuration The RADIUS RFC 2138 optional attributes supported are as follows e User Name e User Password e Service Type e Login IP Host RADIUS Server Configuration Example Merit Many implementations of RADIUS server use the publicly available Merit AAA server application available on the World Wide Web at http www merit edu aaa Included below are excerpts from relevant portions of a sample Merit RADIUS server implementation The example shows excerpts from the client and user configuration files The client configuration file ClientCfg txt defines the authorized source machine source name and access level The user configuration file users defines username password and service type inf
228. nufacturing Engineering Marketing l l RG oon l ee l l Switch Y l l 7 p ApH amoan h mene 6 pene Switch B l Switch Z Switch M STPD 1 STPD 2 D Migi mappi o E E E o 10 0 i PERII NADE J Sales Personnel Manufacturing Engineering Marketing LC24013 When the switches in this configuration start up STP configures each STPD such that there are no active loops in the topology STP could configure the topology in a number of ways to make it loop free In Figure 30 the connection between switch A and switch B is put into blocking state and the connection between switch Y and switch Z is put into blocking state After STP converges all the VLANs can communicate and all bridging loops are prevented The VLAN Marketing which has not been assigned to either STPD1 or STPD2 communicates using all five switches The topology has no loops because STP has already blocked the port connection between switch A and switch B and between switch Y and switch Z Within a single STPD you must be extra careful when configuring your VLANs Figure 31 illustrates a network that has been incorrectly set up using a single STPD so that the STP configuration disables the ability of the switches to forward VLAN traffic Summit 200 Series Switch Installation and User Guid
229. o 75 C 158 to 167 F Power One supplies Rev OL and earlier 60 to 65 C 140 to 149 F Power One supplies Rev OM and later 75 C 167 F Safety Certifications North America Europe International Country Specific UL 60950 3rd Edition listed US Safety CAN CSA C22 2 No 60950 00 Canadian Safety Low Voltage Directive LVD TUV R GS Mark by German Notified Body EN60950 2000 European Safety CB Scheme IEC60950 2000 with all country deviations International Safety Mexico NOM NYCE Product Safety and EMC Approval Australia New Zealand AS NZS 3260 ACA DoC Safety of ITE Argentina S Mark GOST Russia Laser Safety North America Europe FCC 21 CFR subpart J Safety of Laser Products CDRH Letter of Approval US FDA Approval EN60825 2 European Safety of Lasers 226 Summit 200 Series Switch Installation and User Guide Summit 200 48 Switch Electromagnetic Compatibility North America Europe International Country Specific FCC 47 CFR Part 15 Class A US Emissions ICES 003 Class A Canada Emissions 89 336 EEC EMC Directive ETSI EN 300 386 2001 EU Telecommunications Emissions and Immunity EN55022 1998 Class A European Emissions EN55024 1998 includes IEC EN 61000 2 3 4 5 6 11 European Immunity EN 61000 3 2 3 Europe Harmonics and Flicker IEC CISPR 22 1997 Class A International Emissions IEC CISPR 24 1998 International Immunity
230. o after authentication has taken place and the description of that URL For example auto Authentication Typ Unix PW Service Typ login Filter Id unlim Extreme Extreme Netlogin Vlan corp Extreme Extreme Netlogin Url hetp 1927 207 3 7 16 Extreme Extreme Net login Url Desc Extreme Networks Home In this example the username is auto the permanent VLAN is corp and the URL to be redirected to is the Extreme Networks home page http 192 207 37 16 Configuring Campus Mode To configure the switch to use network login in campus mode follow these steps 1 Configure the switch as a RADIUS client See RADIUS Client on page 60 2 Configure a DHCP range for the port or ports in the VLAN on which you want to enable network login using this command config vlan lt name gt dhcp address range lt ipaddressl gt lt ipaddress2 gt The switch will assign a temporary DHCP address within the DHCP range to the client 3 Enable network login on the port using the command enable netlogin ports lt portlist gt vlan lt name gt A NOTE Network login is used on a per port per VLAN basis A port that is tagged can belong to more than one VLAN In this case network login can be enabled on one port for each VLAN Example Configuration Using Campus Mode This example creates a permanent VLAN named corp on the switch This VLAN will be used for authentication through a RADIUS server The R
231. oS parameters for video applications include minimum bandwidth priority and possibly buffering depending upon the behavior of the application Critical Database Applications Database applications such as those associated with ERP typically do not demand significant bandwidth and are tolerant of delay You can establish a minimum bandwidth using a priority less than that of delay sensitive applications 144 Summit 200 Series Switch Installation and User Guide Configuring QoS for a Port or VLAN Web Browsing Applications QoS needs for Web browsing applications cannot be generalized into a single category For example ERP applications that use a browser front end may be more important than retrieving daily news information Traffic groupings can typically be distinguished from each other by their server source and destinations Most browser based applications are distinguished by the dataflow being asymmetric small dataflows from the browser client large dataflows from the server to the browser client TM An exception to this may be created by some Java based applications In addition Web based applications are generally tolerant of latency jitter and some packet loss however small packet loss may have a large impact on perceived performance due to the nature of TCP The relevant parameter for protecting browser applications is minimum bandwidth The relevant parameter for preventing non critical browser applications from o
232. oad configuration lt hostname gt lt ipaddress gt lt filename gt incremental Scheduled Incremental Configuration Download You can schedule the switch to download a partial or incremental configuration on a regular basis You could use this feature to update the configuration of the switch regularly from a centrally administered TFIP server As part of the scheduled incremental download you can optionally configuration a backup TFIP server To configure the primary and or secondary TFIP server and filename use the following command config download server primary secondary lt hostname gt lt ipaddress gt lt filename gt To enable scheduled incremental downloads use the following command download configuration every lt hour 0 23 gt 234 Summit 200 Series Switch Installation and User Guide Upgrading and Accessing BootROM To display scheduled download information use the following command show switch To cancel scheduled incremental downloads use the following command download configuration cancel Remember to Save Regardless of which download option is used configurations are downloaded into switch runtime memory only The configuration is saved only when the save command is issued or if the configuration file itself contains the save command If the configuration currently running in the switch does not match the configuration that the switch used when it originally booted an asterisk appear
233. ofile gt none Adds an entry to the access profile The explicit sequence number and permit or deny attribute should be specified if the access profile mode is none Specify one of the following e lt seq number gt The order of the entry within the access profile If no sequence number is specified the new entry is added to the end of the access profile and is automatically assigned a value of 5 more than the sequence number of the last entry e permit deny Per entry permit or deny specification The per entry attribute only takes effect if the access profile mode is none Otherwise the overall access profile type takes precedence e lt ipaddress gt lt mask gt An IP address and mask If the attribute exact is specified for an entry then a exact match with address and mask is performed subnets within the address range do not match entry against entry Deletes an access profile entry using the sequence number Configures the access profile to be one of the following e permit Allows the addresses that match the access profile description e deny Denies the addresses that match the access profile description e none Permits and denies access on a per entry basis Each entry must be added to the profile as either type permit or deny The default setting is permit Configures the router to use the access policy to determine which external routes are allowed to be exported into the ar
234. oftware Feature Factory Defaults for the Summit 200 Series Item Default Setting Serial or Telnet user account Telnet SSH2 SNMP SNMP read community string SNMP write community string RMON BOOTP Qos 802 1p priority 802 3x flow control Virtual LANs 802 1Q tagging Spanning Tree Protocol Forwarding database aging period IP Routing RIP OSPF IGMP IGMP snooping NTP DNS EAPS NAT Network Login RADIUS TACACS Port Mirroring A NOTE admin with no password and user with no password Enabled Disabled Enabled public private Disabled Enabled on the default VLAN default All traffic is part of the default queue Recognition enabled Enabled on Gigabit Ethernet ports Two VLANs predefined VLAN named default contains all ports and belongs to the STPD named s0 All packets are untagged on the default VLAN default Disabled for the switch enabled for each port in the STPD 300 seconds 5 minutes Disabled Disabled Disabled Enabled Enabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled For default settings of individual ExtremeWare features see the applicable individual chapters in this guide 40 Summit 200 Series Switch Installation and User Guide Accessing the Switch This chapter describes the following topics Understanding the Command Syntax on page 41 Line Editing Keys on page 43 Command History on page 44 Common Co
235. ommand show eapol flooding Table 22 describes the commands used to configure EAPOL flooding Summit 200 Series Switch Installation and User Guide 71 Managing the Switch Table 22 EAPOL Flooding Configuration Commands Command Description disable eapol flooding Disables EAPOL flooding on the switch enable eapol flooding Enables EAPOL flooding on the switch show eapol flooding Enables network login on a specified port in a VLAN Using the Simple Network Time Protocol ExtremeWare supports the client portion of the Simple Network Time Protocol SNTP Version 3 based on RFC1769 SNTP can be used by the switch to update and synchronize its internal clock from a Simple Network Time Protocol server When enabled the switch sends out a periodic query to the indicated SNTP server or the switch listens to broadcast SNTP updates In addition the switch supports the configured setting for Greenwich Mean time GMT offset and the use of Daylight Savings Time These features have been tested for year 2000 compliance Configuring and Using SNTP To use SNTP follow these steps 1 Identify the host s that are configured as SNTP server s Additionally identify the preferred method for obtaining SNTP updates The options are for the SNTP server to send out broadcasts or for switches using SNTP to query the SNTP server s directly A combination of both methods is possible You must identify the method that should be used for the sw
236. ommand without an argument or keyword the command displays a summary of status information for all configured EAPS domains You can use the detail keyword to display more detailed status information 138 Summit 200 Series Switch Installation and User Guide A NOTE Commands for Configuring and Monitoring EAPS The output displayed by this command depends on whether the node is a transit node or a master node The display for a transit node contains information fields that are not shown for a master node Also some state values are different on a transit node than on a master node The following example of the show eaps lt name gt detail command displays detailed EAPS information for a transit node Table 35 describes the fields and values in the display Summit200 24 39 show eaps detail FEAPS Enabled Yes umber of EAPS instances 1 EAPSD Bridge links 2 Hello Timer interval 1 sec Preforwarding Timer Last update Eaps Domain interval 3 sec From Master Id 00 E0 2B 81 20 00 has following Controller Vlan Vlan Name VID rhsc 0020 EAPS Domain has following Protected Vlan s Vlan Name VID traffic 1001 umber of Protected Vlans 1 Fail Timer interval ame eapsl instance 0 State Links Up Running Yes Enabled Yes Mode Transit Primary port 13 Port status Up Tag status Tagged Secondary port 14 Port status Up Tag status Tagged 3 sec Sat Mar 17 17 03 37
237. on Uploads the current run time configuration to the specified TFTP server If every lt time gt is specified the switch automatically saves the configuration to the server once per day at the specified time If the time option is not specified the current configuration is immediately uploaded Cancels a previously schedule configuration upload Configures the switch to use a particular configuration on the next reboot Options include the primary configuration area or the secondary configuration area Configures the switch to use a particular image on the next reboot Summit 200 Series Switch Installation and User Guide 237 Software Upgrade and Boot Options 238 Summit 200 Series Switch Installation and User Guide Troubleshooting If you encounter problems when using the switch this appendix might be helpful If you have a problem not listed here or in the release notes contact your local technical support representative LEDs Power LED does not light Check that the power cable is firmly connected to the device and to the supply outlet On powering up the MGMT LED lights amber The device has failed its Power On Self Test POST and you should contact your supplier for advice A link is connected but the Port Status LED does not light Check that e All connections are secure e Cables are free from damage e The devices at both ends of the link are powered up e Both ends of the Gigabit lin
238. on list e SNMP trap receiver list e RMON polling configuration e Login statistics Authenticating Users ExtremeWare provides two methods to authenticate users who login to the switch e Radius client e TACACS RADIUS Client Remote Authentication Dial In User Service RADIUS RFC 2138 is a mechanism for authenticating and centrally administrating access to network nodes The ExtremeWare RADIUS client implementation allows authentication for Telnet or console access to the switch A NOTE You cannot configure RADIUS and TACACS at the same time You can define a primary and secondary RADIUS server for the switch to contact When a user attempts to login using Telnet http or the console the request is relayed to the primary RADIUS server and then to the secondary RADIUS server if the primary does not respond If the RADIUS client is enabled but access to the RADIUS primary an secondary server fails the switch uses its local database for authentication The privileges assigned to the user admin versus nonadmin at the RADIUS server take precedence over the configuration in the local switch database Per Command Authentication Using RADIUS The RADIUS implementation can be used to perform per command authentication Per command authentication allows you to define several levels of user capabilities by controlling the permitted command sets based on the RADIUS username and password You do not need to configure any additiona
239. onfiguring Timeouts 127 Displaying NAT Settings 127 Disabling NAT 128 Summit 200 Series Switch Installation and User Guide 7 Contents Chapter 11 Chapter 12 Ethernet Automatic Protection Switching Overview of the EAPS Protocol Fault Detection and Recovery Restoration Operations Summit 200 Series Switches in Multi ring Topologies Commands for Configuring and Monitoring EAPS Creating and Deleting an EAPS Domain Defining the EAPS Mode of the Switch Configuring EAPS Polling Timers Configuring the Primary and Secondary Ports Configuring the EAPS Control VLAN Configuring the EAPS Protected VLANs Enabling and Disabling an EAPS Domain Enabling and Disabling EAPS Unconfiguring an EAPS Ring Port Displaying EAPS Status Information Quality of Service QoS Overview of Policy Based Quality of Service Applications and Types of QoS Voice Applications Video Applications Critical Database Applications Web Browsing Applications File Server Applications Configuring QoS for a Port or VLAN Traffic Groupings Access List Based Traffic Groupings MAC Based Traffic Groupings Explicit Class of Service 802 1p and DiffServ Traffic Groupings Configuring DiffServ Physical and Logical Groupings Verifying Configuration and Performance QoS Monitor Displaying QoS Profile Information Modifying a QoS Configuration Traffic Rate Limiting Dynamic Link Context System DLCS Guidelines DLCS Limitations DLCS Commands 129 131 132 133
240. ongs to the IP network 192 207 36 0 its router interface is assigned IP address 192 207 36 1 Traffic within each VLAN is switched using the Ethernet MAC addresses Traffic between the two VLANs is routed using the IP addresses Figure 32 Routing between VLANs O networks C 192 207 35 0 192 207 36 0 Finance Personnel O O 2 3 4 5 192 207 35 11 I 192 207 35 13 Tp 192 207 36 12 192 207 36 14 are 178 Summit 200 Series Switch Installation and User Guide Overview of IP Unicast Routing Populating the Routing Table The switch maintains an IP routing table for both network routes and host routes The table is populated from the following sources e Dynamically by way of routing protocol packets or by ICMP redirects exchanged with other routers e Statically by way of routes entered by the administrator Default routes configured by the administrator Locally by way of interface addresses assigned to the system By other static routes as configured by the administrator A NOTE If you define a default route and then delete the VLAN on the subnet associated with the default route the invalid default route entry remains You must manually delete the configured default route Dynamic Routes Dynamic routes are typically learned by way of RIP or OSPF Routers that use RIP or OSPF exchange information in their routing tables in
241. ons udp profile backbonedhcp config labuser udp profile labdhcp ICMP Packet Processing As ICMP packets are routed or generated you can take various actions to control distribution For ICMP packets typically generated or observed as part of the routing function you can assert control on a per type per VLAN basis You would alter the default settings for security reasons to restrict the success of tools that can be used to find an important application host or topology information The controls include the disabling of transmitting ICMP messages associated with unreachables port unreachables time exceeded parameter problems redirects time stamp and address mask requests For ICMP packets that are typically routed you can apply access lists to restrict forwarding behavior Access lists are described in Chapter 9 Summit 200 Series Switch Installation and User Guide 191 IP Unicast Routing UDP Forwarding Commands Table 58 describes the commands used to configure UDP forwarding Table 58 UDP Forwarding Commands Command Description config udp profile lt profile_name gt add lt udp_port gt vlan lt name gt ipaddress lt dest_ipaddress gt config udp profile lt profile_name gt delete lt udp_port gt vlan lt name gt ipaddress lt dest_ipaddress gt config vlan lt name gt udp profile lt profile_name gt create udp profile lt profile_name gt delete udp profile lt profile_name gt sho
242. or denote new terms at the place where they are defined in the text Related Publications The publications related to this one are e ExtremeWare Release Notes e Summit 200 Series Switch Release Notes Documentation for Extreme Networks products is available on the World Wide Web at the following location e http www extremenetworks com 14 Summit 200 Series Switch Installation and User Guide Summit 200 Series Switch Overview This chapter describes the features and functionality of the Summit 200 series switches Summit 200 Series Switches on page 15 Summary of Features on page 15 Summit 200 24 Switch Physical Features on page 16 Summit 200 48 Switch Physical Features on page 19 Mini GBIC Type and Hardware Software Support on page 22 Summit 200 Series Switches The Summit 200 series switches include the following switch models Summit 200 24 switch Summit 200 48 switch Summary of Features The Summit 200 series switches support the following ExtremeWare features Virtual local area networks VLANs including support for IEEE 802 10 and IEEE 802 1p Spanning Tree Protocol STP IEEE 802 1D Quality of Service QoS including support for IEEE 802 1p MAC QoS and four hardware queues Wire speed Internet Protocol IP routing DHCP BOOTP Relay Network Address Translation NAT Extreme Standby Router Protocol ESRP Aware support Ethernet Automated Protection Switching EAPS support Routing Informat
243. or network traffic and ensure that e Redundant paths are disabled when the main paths are operational e Redundant paths are enabled if the main traffic paths fail A single spanning tree can span multiple VLANs A NOTE For more information on STP see Chapter 14 Spanning Tree Protocol STP 36 Summit 200 Series Switch Installation and User Guide Summary of Features Quality of Service ExtremeWare has Quality of Service QoS features that support IEEE 802 1p MAC QoS and four queues These features enable you to specify service levels for different traffic groups By default all traffic is assigned the normal QoS policy profile If needed you can create other QoS policies and rate limiting access control lists and apply them to different traffic types so that they have different maximum bandwidth and priority A NOTE For more information on Quality of Service see Chapter 12 Quality of Service QoS Unicast Routing The Summit 200 series switch can route IP traffic between the VLANs that are configured as virtual router interfaces Static IP routes are maintained in the routing table The following routing protocols are supported e RIP version 1 e RIP version 2 e OSPF A NOTE For more information on IP unicast routing see Chapter 15 IP Unicast Routing Load Sharing Load sharing allows you to increase bandwidth and resiliency by using a group of ports to carry traffic
244. ormat The summary option displays several important fields of matching LSAs one line per LSA The stats option displays the number of matching LSAs but not any of their contents If not specified the default is to display in the summary format A common use of this command is to omit all optional parameters resulting in the following shortened form show ospf lsdb The shortened form displays all areas and all types in a summary format 212 Summit 200 Series Switch Installation and User Guide Resetting and Disabling OSPF Settings Resetting and Disabling OSPF Settings To return OSPF settings to their defaults use the commands listed in Table 66 Table 66 OSPF Reset and Disable Commands Command Description delete ospf area lt areaid gt all Deletes an OSPF area Once an OSPF area is removed the associated OSPF area and OSPF interface information is removed The backbone area cannot be deleted A non empty area cannot be deleted disable ospf Disables OSPF process in the router disable ospf export direct Disables exporting of local interface direct routes into the OSPF domain disable ospf export rip Disables exporting of RIP routes in the OSPF domain disable ospf export static Disables exporting of statically configured routes into the OSPF domain unconfig ospf vlan lt name gt area lt areaid gt Resets one or all OSPF interfaces to the default settings Summit 200 Series Switch Installat
245. ormation ClientCfg txt Client Name Key type prefix 10 I 253256 test type nas pfx pm1 S SS X amp E amp type nas pml pm2 Topo P type nas pm2 merit edu homeless hmoemreilte ses homeless testing type proxy 62 Summit 200 Series Switch Installation and User Guide Authenticating Users xyzZ merit edu moretesting type Ascend NAS vl anyoldthing 1234 whoknows type NAS RAD_RFC ACCT_RFC 104202 1 3 andrew linux type nas 10 203 1 41 eric type nas 10 203 1 42 eric type nas 10 0 52 14 samf type nas users user Password Filter Id unlim admin Password Service Typ Administrative Filter Id unlim eric Password Service Typ Administrative Filter Id unlim albert Password password Service Type Administrative Filter Id unlim samuel Password password Service Type Administrative Filter Id unlim RADIUS Per Command Configuration Example Building on this example configuration you can use RADIUS to perform per command authentication to differentiate user capabilities To do so use the Extreme modified RADIUS Merit software that is available from the Extreme Networks web server at http www extremenetworks com extreme support otherapps htm or by contacting Extreme Networks technical support The software is available in compiled format for Solaris or Linux operating systems as well as in source code format For all clients that use RA
246. ort DLCS mapping is flushed when a user logs in or logs out or when an end station is shutdown DLCS Limitations Consider the following limitations concerning data received from WINS snooping DLCS does not work for the WINS server This is because the WINS server does not send NETBIOS packets on the network these packets are address to itself When the IP address of a host is changed and the host is not immediately rebooted the old host to IP address mapping is never deleted You must delete the mapping of the host to IP address through the EEM Policy Manager or ExtremeWare EPICenter Policy Manager When the host is moved from one port to another port on a switch the old entry does not age out unless the host is rebooted or a user login operation is performed after the host is moved DLCS information is dynamic therefore if the switch is rebooted the information is lost This information is still stored in the policy server To delete the information from the policy system you must explicitly delete configuration parameters from the EEM or ExtremeWare EPICenter Policy Applet user interface As a workaround you can delete the switch that was rebooted from the list of managed devices in the EEM or EPICenter Inventory Applet and re add the switch to the Inventory Manager DLCS is not supported on hosts that have multiple NIC cards IPQoS is not supported to a WINS server that is serving more than one VLAN If you attempt to add
247. ospf area lt areaid gt vlan lt name gt all cost automatic lt number gt config ospf vlan lt name gt area lt areaid gt virtual link lt routerid gt lt areaid gt authentication simple password lt password gt md5 lt md5_key_id gt lt md5_key gt none encrypted simple password lt password gt md5 lt md5_key_id gt lt md5_key gt Description Configures the OSPF link type Specify one of the following e auto ExtremeWare automatically determines the OSPF link type based on the interface type broadcast Broadcast link such as Ethernet Routers must elect a DR anda BDR during synchronization e point to point Point to point link type such as PPP The default setting is auto The passive parameter indicates that the interface does not send or receive OSPF packets Configures the IP address of a point to point neighbor Deletes the IP address of a point to point neighbor Configures the cost metric of one or all VLAN s If an area is specified the cost metric is applied to all VLANs currently within that area When automatic is specified the advertised cost is determined from the OSPF metric table and corresponds to the active highest bandwidth port in the VLAN Specifies the authentication password up to eight characters or Message Digest 5 MD5 key for one or all interfaces VLANs in an area The md5_key is a numeric value with the range 0 to 65 536 When the
248. ou can also configure each port for a particular speed either 10 Mbps or 100 Mbps A NOTE The fiber medium Gigabit Ethernet ports on the switch are statically set to 1 Gbps and their speed cannot be modified The copper medium Gigabit Ethernet ports can be configured as 10 100 1000 Mbps ports Summit 200 Series Switch Installation and User Guide 77 Configuring Ports on a Switch All ports on a stand alone switch can be configured for half duplex or full duplex operation By default the 10 100 Mbps ports autonegotiate the duplex setting To configure port speed and duplex setting use the following command config ports lt portlist gt auto off speed 10 100 1000 duplex half full To configure the system to autonegotiate use the following command config ports lt portlist gt auto on Flow control is supported only on Gigabit Ethernet ports It is enabled or disabled as part of autonegotiation If autonegotiation is set to off flow control is disabled When autonegotiation is turned on flow control is enabled Turning Off Autonegotiation for a Gigabit Ethernet Port In certain interoperability situations you may need to turn autonegotiation off on a Gigabit Ethernet port Even though a Gigabit Ethernet port runs only at full duplex you must specify the duplex setting The following example turns autonegotiation off for port 25 a Gigabit Ethernet port on a stand alone Summit 200 24 switch config ports 25 a
249. ou have an RMON management application and have enabled RMON on the switch About RMON RMON is the common abbreviation for the Remote Monitoring Management Information Base MIB system defined by the Internet Engineering Task Force IETF documents RFC 1271 and RFC 1757 which allows you to monitor LANs remotely A typical RMON setup consists of the following two components e RMON probe An intelligent remotely controlled device or software agent that continually collects statistics about a LAN segment or VLAN The probe transfers the information to a management workstation on request or when a predefined threshold is crossed e Management workstation Communicates with the RMON probe and collects the statistics from it The workstation does not have to be on the same network as the probe and can manage the probe by in band or out of band connections RMON Features of the Switch Of the nine groups of IETF Ethernet RMON statistics the switch supports these four groups e Statistics e History e Alarms e Events This section describes these groups and discusses how they can be used Summit 200 Series Switch Installation and User Guide 165 Status Monitoring and Statistics Statistics The RMON Ethernet Statistics group provides traffic and error statistics showing packets bytes broadcasts multicasts and errors on a LAN segment or VLAN Information from the Statistics group is used to detect changes in traffic an
250. ou should provide a minimum of 1 inch 25 mm clearance e No objects are placed on top of the unit e Units are not stacked more than four high if the switch is free standing Summit 200 Series Switch Installation and User Guide 27 Switch Installation Following Safety Information Before installing or removing any components of the switch or before carrying out any maintenance procedures read the safety information provided in w of this guide Installing the Switch The Summit 200 series switch switch can be mounted in a rack or placed free standing on a tabletop Rack Mounting AR CAUTION Do not use the rack mount kits to suspend the switch from under a table or desk or to attach the switch to a wall To rack mount the Summit 200 series switch 1 Place the switch upright on a hard flat surface with the front facing you 2 Remove the existing screws from the sides of the case retain the screws for Step 4 3 Locate a mounting bracket over the mounting holes on one side of the unit 4 Insert the screws and fully tighten with a suitable screwdriver as shown in Figure 6 Figure 6 Fitting the mounting bracket a ca or i y suorit oo etwork LC24003 Repeat steps 2 through 4 for the other side of the switch Insert the switch into the 19 inch rack Secure the switch with suitable screws not provided Connect the switch to the redundant power supply if applicable Co ON FD UI Connect cables
251. ower cable to the switch and then to the wall outlet Turn the on off switch to the on position 30 Summit 200 Series Switch Installation and User Guide Checking the Installation Checking the Installation After turning on power to the Summit 200 series switch the device performs a Power On Self Test POST During the POST all ports are temporarily disabled the port LED is off and the MGMT LED flashes The MGMT LED flashes until the switch successfully passes the POST If the switch passes the POST the MGMT LED is solid green If the switch fails the POST the MGMT LED is amber A NOTE For more information on the LEDs see Chapter 1 Summit 200 Series Switch Overview Logging In for the First Time After the Summit 200 series switch completes the POST it is operational Once operational you can log in to the switch and configure an IP address for the default VLAN named default To configure the IP settings manually follow these steps 1 Connect a terminal or workstation running terminal emulation software to the console port 2 At your terminal press Return one or more times until you see the login prompt 3 At the login prompt enter the default user name admin to log on with administrator privileges For example login admin Administrator capabilities allow you to access all switch functions A NOTE For more information on switch security see Chapter 4 Accessing the Switch 4 At the pas
252. p configuration commands table 149 autopolarity detection feature Ethernet ports 78 A B access control lists backbone area OSPF D8 adding 105 blackhole entries FDB 98 configuration commands table 107 boot option commands table 236 deleting 106 BOOTP description 101 and UDP Forwarding 190 examples 110 relay configuring 190 ICMP filter example 113 using z permit established example 110 BootROM permit established keyword 104 mMenu accessing verifying settings 106 prompt aa access levels 46 upgrading 239 accese masks BPDU tunneling 170 adding 105 deleting 106 C access policies description 101 cable types and distances 22 access profiles reverse mask 115 certification marks accounts Summit 200 24 switch 224 aoe of Summit 200 48 switch 227 eleting CLI viewing 49 command history 44 adding i command shortcuts 42 access lists line editing keys 43 access masks 105 named components 43 ae ee n E 105 numerical ranges Summit 200 series switch 42 Address Resolution Protocol See symbols 43 admin account 47 Pa helper 42 Advanced Edge functionality 38 using aging entries FDB 97 command alarm actions 167 history 44 Alarms RMON 166 shortcuts 42 area 0 OSPF 198 syntax understanding 41 areas OSPF 197 Command Line Interface See CLI ARP common commands table 44 clearing entries 189 communicating with devices outside subnet 181 D ar oe outside subnet complete configuration download 234 configuring proxy configuration incapable devi
253. port numbers ranging from 1 to 65535 These Layer 4 ports in combination with the IP addresses form a unique identifier which allows hosts as well as the NAT switch to distinguish between separate conversations NAT operates by replacing the inside IP packet s source IP and Layer 4 port with an outside IP and Layer 4 port The NAT switch maintains a connection table to map the return packets on the outside VLAN back into their corresponding inside sessions Internet IP Addressing When implementing NAT in an Internet environment it is strongly recommended that you use one of the reserved private IP address ranges for your inside IP addresses These ranges have been reserved specifically for networks not directly attached to the Internet Using IP addresses within these ranges prevents addressing conflicts with public Internet sites to which you want to connect The ranges are as follows e 10 0 0 0 8 Reserved Class A private address space e 172 16 0 0 12 Reserved Class B private address space e 192 168 0 0 16 Reserved Class C private address space Configuring VLANs for NAT You must configure each VLAN participating in NAT as either an inside or outside VLAN To configure a VLAN as an inside or outside VLAN use the following command config nat vlan lt name gt inside outside none When a VLAN is configured to be inside traffic from that VLAN destined for an outside VLAN is translated only if it has a matching NAT rule
254. propriate technical training and experience necessary to be aware of the hazards to which they are exposed when performing a task and of measures to minimize the danger to themselves or other people Install the unit only in a temperature and humidity controlled indoor area free or airborne materials that can conduct electricity Too much humidity can cause a fire Too little humidity can produce electrical shock and fire A NOTE For more information about the temperature and humidity ranges for the Summit 200 series switches see Appendix B Power The Summit 200 series switch has one power input on the switch e The unit must be grounded Do not connect the power supply unit to an AC outlet without a ground connection e The unit must be connected to a grounded outlet to comply with European safety standards e The socket outlet must be near the unit and easily accessible You can only remove power from the unit by disconnecting the power cord from the outlet Summit 200 Series Switch Installation and User Guide 219 Safety Information e This unit operates under Safety Extra Low Voltage SELV conditions according to IEC 950 The conditions are only maintained if the equipment to which it is connected also operates under SELV conditions e The appliance coupler the connector to the unit and not the wall plug must have a configuration for mating with an EN60320 IEC320 appliance inlet e France and Peru only This unit ca
255. r enabling some features causes the system to use additional access masks reducing the number available For each of the following features that you enable the system will use one access mask When the feature is disabled the mask will again be available The features are e RIP e IGMP or OSPF both would share a single mask e DiffServ examination e QoS monitor The maximum number of access list allowed by the hardware is 254 for each block of eight 10 100 Mbps Ethernet ports and 126 for each Gbps Ethernet port for a total of 1014 rules 254 3 126 2 Most user entered access list commands will require multiple rules on the hardware For example a global rule an access control list using an access mask without ports defined will require 5 rules one for each of the 5 blocks of ports on the hardware The maximum number of rate limiting rules allowed is 315 635 This number is part of the total access control list rules 1014 Summit 200 Series Switch Installation and User Guide 105 Access Policies Deleting Access Mask Access List and Rate Limit Entries Entries can be deleted from access masks access lists and rate limits An access mask entry cannot be deleted until all the access lists and rate limits that reference it are also deleted To delete an access mask entry use the following command delete access mask lt name gt To delete an access list entry use the following command delete access list lt
256. r networks has the following advantages e VLANs help to control traffic With traditional networks congestion can be caused by broadcast traffic that is directed to all network devices regardless of whether they require it VLANs increase the efficiency of your network because each VLAN can be set up to contain only those devices that must communicate with each other e VLANs provide extra security Devices within each VLAN can only communicate with member devices in the same VLAN If a device in VLAN Marketing must communicate with devices in VLAN Sales the traffic must cross a routing device e VLANs ease the change and movement of devices With traditional networks network administrators spend much of their time dealing with moves and changes If users move to a different subnetwork the addresses of each endstation must be updated manually Summit 200 Series Switch Installation and User Guide 85 Virtual LANs VLANs Types of VLANs VLANs can be created according to the following criteria e Physical port e 802 1Q tag e MAC address e A combination of these criteria Port Based VLANs In a port based VLAN a VLAN name is given to a group of one or more ports on the switch A port can be a member of only one port based VLAN The Summit 200 series switch supports L2 port based VLANs For example on the Summit 200 24 switch in Figure 10 ports 1 through 8 and port 26 are part of VLAN Sales ports 9 through 16 and port
257. rate limit you must specify a value for each of the fields that make up the access mask used by the list A NOTE Unlike an access list a rate limit can only be applied to a single port Each port will have its own rate limit defined separately On a 100 Mbps port 100BASE TX you can configure the rate limit value in the range from 1 Mbps to 100 Mbps in 1 Mbps increments which is to say the rate limit value can be set at 1 2 3 4 100 Mbps On a 1000 Mbps port Gigabit Ethernet uplink port you can configure the rate limit value in the range from 8 Mbps to 1000 Mbps in increments of 8 Mbps which is to say the rate limit value can be set at 8 16 24 32 1000 Mbps A NOTE The rate limit specified in the command line does not precisely match the actual rate limit imposed by the hardware due to hardware constraints See the release notes for the exact values of the actual rate limits if required for your implementation For packets that match a particular list and arrive at a rate below the limit you can specify the following action e Permit Forward the packet You can send the packet to a particular QoS profile and modify the packet s 802 1p value and or DiffServe code point For packets that match a particular list and arrive at a rate that exceeds the limit you can specify the following actions e Drop Drop the packets Excess packets are not forwarded e Permit with rewrite Forward the packet but
258. rates down to 90 V Summit 200 Series Switch Installation and User Guide 21 Summit 200 Series Switch Overview Serial Number Use this serial number for fault reporting purposes MAC Address This label shows the unique Ethernet MAC address assigned to this device A NOTE The Summit 200 48 switch certification and safety label is located on the bottom of the switch Mini GBIC Type and Hardware Software Support The Summit 200 series switch supports the SFP GBIC also known as the mini GBIC in three types the SX mini GBIC which conforms to the 1000BASE SX standard the LX mini GBIC which conforms to the 1000BASE LX standard and the ZX mini GBIC a long haul mini GBIC that conforms to the IEEE 802 3z standard The system uses identifier bits to determine the media type of the mini GBIC that is installed The Summit 200 series switches support only the SFP mini GBIC A NOTE Only mini GBICs that have been certified by Extreme Networks available from Extreme Networks should be inserted into the mini GBIC receptacles on the Summit 200 series switch This section describes the mini GBIC types and specifications Mini GBIC Type and Specifications Table 5 describes the mini GBIC type and distances for the Summit 200 series switches Table 5 Mini GBIC types and distances Maximum Mhz Km Distance Standard Media Type Rating Meters 1000BASE SX 50 125 um multimode fiber 400 500 20 HIS optical Winaow 50 125 um mult
259. reate this access control list is as follows create access mask icmp_mask ipprotocol icmp type icmp cod create access list denyping icmp_mask ipprotocol icmp icmp type 8 icmp code 0 deny The output for this access list is shown in Figure 20 Figure 20 ICMP packets are filtered out LC24010 Example 3 Rate limiting Packets This example creates a rate limit to limit the incoming traffic from the 10 10 10 x subnet to 10 Mbps on ingress port 2 Ingress traffic on port 2 below the rate limit is sent to QoS profile qp1 with its DiffServ code point set to 7 Ingress traffic on port 2 in excess of the rate limit will be dropped The commands to create this rate limit is as follows create access mask port2_mask source ip 24 ports precedence 100 create rate limit port2_limit port2_mask source ip 10 10 10 0 24 port 2 permit qpl set code point 7 limit 10 exceed action drop Summit 200 Series Switch Installation and User Guide 113 Access Policies Using Routing Access Policies To use routing access policies you must perform the following steps 1 Create an access profile 2 Configure the access profile to be of type permit deny or none 3 Add entries to the access profile Entries are IP addresses and subnet masks 4 Apply the access profile Creating an Access Profile The first thing to do when using routing access policies is to create an access profile An access profile has a unique name and contain
260. reboot To save the configuration use the following command save configuration primary secondary To use the configuration use the following command use configuration primary secondary The configuration takes effect on the next reboot A NOTE If the switch is rebooted while in the middle of a configuration save the switch boots to factory default settings The configuration that is not in the process of being saved is unaffected 232 Summit 200 Series Switch Installation and User Guide Using TFTP to Upload the Configuration Returning to Factory Defaults To return the switch configuration to factory defaults use the following command unconfig switch This command resets the entire configuration with the exception of user accounts and passwords that have been configured and the date and time To erase the currently selected configuration image and reset all switch parameters use the following command unconfig switch all Using TFTP to Upload the Configuration You can upload the current configuration to a TFTP server on your network The uploaded ASCII file retains the command line interface CLI format This allows you to e Modify the configuration using a text editor and later download a copy of the file to the same switch or to one or more different switches e Send a copy of the configuration file to the Extreme Networks Technical Support department for problem solving purposes e Autom
261. rement of CRC errors This is characteristic of a duplex mismatch between devices This is NOT a problem with the Extreme switch Always verify that the Extreme switch and the network device match in configuration for speed and duplex Summit 200 Series Switch Installation and User Guide 235 Troubleshooting No link light on Gigabit fiber port Check to ensure that the transmit fiber goes to the receive fiber side of the other device and vice versa All gigabit fiber cables are of the cross over type The Extreme switch has auto negotiation set to on by default for gigabit ports These ports need to be set to auto off using the command config port lt port gt auto off if you are connecting it to devices that do not support auto negotiation Ensure that you are using multi mode fiber MMF when using a 1000BASE SX Mini GBIC 1000BASE SX does not work with single mode fiber SMF VLANs You cannot add a port to a VLAN If you attempt to add a port to the default VLAN and get an error message similar to Summit200 24 28 config vlan default add port 1 ERROR There is a protocol conflict with adding port 1 untagged to VLAN default you already have a VLAN using untagged traffic on this port Only one VLAN using untagged traffic can be configured on a single physical port VLAN configuration can be verified by using the following command show vlan lt name gt The solution for this error is to remove port 1 from th
262. ring Disabling and Resetting IGMP Functions To clear IGMP snooping entries disable IGMP or IGMP snooping or return IGMP settings to their defaults use the commands listed in Table 68 Table 68 IGMP Disable and Reset Commands Command Description clear igmp snooping vlan lt name gt Removes one or all IGMP snooping entries disable igmp vlan lt name gt Disables the router side IGMP processing on a router interface No IGMP query is generated but the switch continues to respond to IGMP queries received from other devices If no VLAN is specified IGMP is disabled on all router interfaces disable igmp snooping Disables IGMP snooping Disabling IGMP snooping allows all IGMP and IP multicast traffic to flood within a given VLAN unconfig igmp Resets all IGMP settings to their default values and clears the IGMP group table Summit 200 Series Switch Installation and User Guide 217 IP Multicast Groups and IGMP Snooping 218 Summit 200 Series Switch Installation and User Guide Safety Information Important Safety Information A WARNING Read the following safety information thoroughly before installing your Extreme Networks switch Failure to follow this safety information can lead to personal injury or damage to the equipment Installation maintenance removal of parts and removal of the unit and components must be done by qualified service personnel only Service personnel are people having ap
263. riority field maps it to a specific hardware queue when subsequently transmitting the packet The 802 1p priority field is located directly following the 802 1Q type field and preceding the 802 10 VLAN ID as shown in Figure 28 Figure 28 Ethernet Packet Encapsulation 802 1Q 802 1p 802 1Q type priority VLAN ID Destination Source EW_024 Observing 802 1p Information When ingress traffic that contains 802 1p prioritization information is detected by the switch the traffic is mapped to various hardware queues on the egress port of the switch The Summit 200 series switch 148 Summit 200 Series Switch Installation and User Guide Traffic Groupings supports four hardware queues The transmitting hardware queue determines the bandwidth management and priority characteristics used when transmitting packets To control the mapping of 802 1p prioritization values to hardware queues 802 1p prioritization values can be mapped to a QoS profile The default mapping of each 802 1p priority value to QoS profile is shown in Table 39 Table 39 802 1p Priority Value to QoS Profile to Hardware Queue Default Mapping Hardware Queue Priority Value QoS Profile Priority Value Qp1 1 Qp2 Qp3 Qp4 Qp5 Qp6 Qp7 Qp8 N Oo fF GON O A A OO OONN 802 1p Commands Table 40 shows the command used to configure 802 1p priority This is explained in more detail in the following paragraphs Table 40 802 1p Configuration Co
264. rk Login Settings 70 Disabling Network Login 71 Using EAPOL Flooding 71 Using the Simple Network Time Protocol 72 Configuring and Using SNTP 72 SNTP Configuration Commands 75 SNTP Example 75 Chapter6 Configuring Ports on a Switch Enabling and Disabling Switch Ports 77 Configuring Switch Port Speed and Duplex Setting 77 Switch Port Commands 79 Load Sharing on the Switch 80 Load Sharing Algorithms 80 Configuring Switch Load Sharing 81 Load Sharing Example 82 Verifying the Load Sharing Configuration 82 Switch Port Mirroring 82 Summit 200 Series Switch Installation and User Guide 5 Contents Chapter 7 Chapter 8 Chapter 9 Port Mirroring Commands Port Mirroring Example Extreme Discovery Protocol EDP Commands Virtual LANs VLANs Overview of Virtual LANs Benefits Types of VLANs Port Based VLANs Tagged VLANs VLAN Names Default VLAN Renaming a VLAN Configuring VLANs on the Switch VLAN Configuration Commands VLAN Configuration Examples Displaying VLAN Settings MAC Based VLANs MAC Based VLAN Guidelines MAC Based VLAN Limitations MAC Based VLAN Example Timed Configuration Download for MAC Based VLANs Forwarding Database FDB Overview of the FDB FDB Contents FDB Entry Types How FDB Entries Get Added Associating a QoS Profile with an FDB Entry Configuring FDB Entries FDB Configuration Examples Displaying FDB Entries Access Policies Overview of Access Policies Access Control Lists Rate L
265. rom port 7 uses the QoS profile named qp3 when being transmitted config ports 7 gosprofile qp3 VLAN A VLAN traffic grouping indicates that all intra VLAN switched traffic and all routed traffic sourced from the named VLAN uses the indicated QoS profile To configure a VLAN traffic grouping use the following command config vlan lt name gt gqosprofile lt qosprofile gt For example all devices on VLAN servnet require use of the QoS profile qp4 The command to configure this example is as follows config vlan servnet qosprofile qp4 Verifying Physical and Logical Groupings To verify settings on ports or VLANs use the following command show gosprofile lt qosprofile gt The same information is also available for ports or VLANs using one of the following commands show ports lt portlist gt info detail or show vlan 152 Summit 200 Series Switch Installation and User Guide Verifying Configuration and Performance Verifying Configuration and Performance Once you have created QoS policies that manage the traffic through the switch you can use the QoS monitor to determine whether the application performance meets your expectations QoS Monitor The QoS monitor is a utility that monitors the incoming packets on a port or ports The QoS monitor keeps track of the number of frames and the frames per second sorted by 802 1p value on each monitored port Real Time Performance Monitoring The real time displa
266. rotocol and policy involved Propagation of changes applied to RIP access policies depends on the protocol timer to age out entries A NOTE Changes to profiles applied to OSPF typically require rebooting the switch or disabling and re enabling OSPF on the switch Removing a Routing Access Policy To remove a routing access policy you must remove the access profile from the routing protocol or VLAN All the commands that apply an access profile to form an access policy also have the option of choosing none as the access profile Using the none option removes any access profile of that particular type from the protocol or VLAN and therefore removes the access policy 118 Summit 200 Series Switch Installation and User Guide Routing Access Policy Commands Routing Access Policy Commands Table 31 describes the commands used to configure routing access policies Table 31 Routing Access Policy Configuration Commands Command Description config access profile lt access_profile gt add lt seq_number gt permit deny ipaddress lt ipaddress gt lt mask gt exact config access profile lt access_profile gt delete lt seq_number gt config access profile lt access_profile gt mode permit deny none config ospf area lt area_id gt external filter lt access_profile gt none config ospf area lt area_id gt interarea filter lt access_profile gt none config ospf asbr filter lt access_pr
267. route sharing 185 enable dics ports 155 disable irdp 189 enable eapol flooding 71 72 disable learning port 99 enable eaps 134 138 disable log display 164 enable edp ports 84 disable loopback mode vlan 184 enable icmp address mask 186 disable mirroring 83 enable icmp parameter problem 186 disable nat 128 enable icmp port unreachables 186 disable netlogin ports vlan 70 enable icmp redirects 186 disable ospf 213 enable icmp time exceeded 186 disable ospf capability opaque lsa 197 210 enable icmp timestamp 186 disable ospf export 179 enable icmp unreachables 186 disable ospf export direct 213 enable icmp useredirects 186 disable ospf export rip 202 213 enable idletimeouts 46 disable ospf export static 202 213 enable igmp 216 disable ports 45 77 79 enable igmp snooping 217 disable radius 61 enable ignore bpdu 170 disable radius accounting 61 enable ignore bpdu vlan 174 disable rip 206 enable ignore stp vlan 174 disable rip aggregation 206 enable ipforwarding 182 184 disable rip export 179 202 206 enable ipforwarding broadcast 184 disable rip originate default 206 enable ipforwarding fast direct broadcast 180 disable rip poisonreverse 206 enable ipforwarding ignore broadcast 180 disable rip splithorizon 206 enable ip option loose source route 186 disable rip triggerupdates 206 enable ip option record route 186 disable rmon 166 enable ip option record timestamp 186 disable sharing 79 82 enable ip option strict source route 187 disable snmp access 5
268. rval Preforwarding Timer interval Last update EAPS Domain has Controller Vians EAPS Domain has Protected Vlans 2 Number of Protected Vlans Description e Unknown This EAPS domain is not running so the port status has not yet been determined Up the port is up and is forwarding data Down The port is down Blocked The port is up but data is blocked from being forwarded Tagged status of the control VLAN e Tagged The control VLAN has this port assigned to it and the port is tagged in the VLAN Untagged The control VLAN has this port assigned to it but the port is untagged in the control VLAN Undetermined Either a VLAN has not been added as the control VLAN to this EAPS domain or this port has not been added to the control VLAN The configured value of the timer The configured value of the timer The configured value of the timer This value is set internally by the EAPS software Displayed only for transit nodes indicates the last time the transit node received a hello packet from the master node identified by its MAC address Lists the assigned name and ID of the control VLAN Lists the assigned names and VLAN IDs of all the protected VLANs configured on this EAPS domain The count of protected VLANs configured on this EAPS domain 1 These fields apply only to transit nodes they are not displayed for a master node 2 This list is displayed when you use t
269. s Extreme Networks Summit 200 24 802 1Q Tagged server DO OOOO G OO OOO OOO OSS OO OOOOOO M Marketing M a S Sales s A Tagged port S Marketing amp Sales g i Se o o o 00000 System 2 LC24007 Figure 14 is a logical diagram of the same network Figure 14 Logical diagram of tagged and untagged traffic Marketing Sales System 1 System 1 System 1 Ports 1 8 Port 16 Ports 17 24 amp 26 Port 25 System 2 System 2 System 2 Slot 1 Port 2 Slot 7 Ports 1 8 amp 17 24 Slot 1 Port 1 Slot 1 Port 3 amp 4 Slot 7 Ports 9 16 amp 25 32 Tagged Ports sH 007 In Figure 13 and Figure 14 e The trunk port on each switch carries traffic for both VLAN Marketing and VLAN Sales e The trunk port on each switch is tagged e The server connected to port 16 on system 1 has a NIC that supports 802 1Q tagging Summit 200 Series Switch Installation and User Guide 89 Virtual LANs VLANs e The server connected to port 16 on system 1 is a member of both V
270. s The outside IP address and Layer 4 port space is evenly distributed to all possible inside hosts This guarantees that no single inside host can prevent other traffic from flowing through the NAT device Summit 200 Series Switch Installation and User Guide 123 Network Address Translation NAT Because of the large number of simultaneous requests that can be made from a web browser it is not recommended that this mode be used when a large number of inside hosts are being translated to a small number of outside IP addresses ICMP traffic is not translated in this mode You must add a dynamic NAT rule for the same IP address range to allow for ICMP traffic Configuring NAT The behavior of NAT is determined by the rules you create to translate the IP addresses You must attach each rule to a specific VLAN All rules are processed in order The options specified on the NAT rule determine the algorithm used to translate the inside IP addresses to the outside IP addresses For outgoing inside to outside packets the first rule to match is processed All following rules are ignored All return packets must arrive on the same outside VLAN on which the session went out For most configurations make sure that the outside IP addresses specified in the rule are part of the outside VLAN s subnet range so that the switch can proxy the address resolution protocol ARP for those addresses To enable NAT functionality use the following command e
271. s Policies on page 114 e Making Changes to a Routing Access Policy on page 118 e Removing a Routing Access Policy on page 118 e Routing Access Policy Commands on page 119 Overview of Access Policies Access policies are a generalized category of features that impact forwarding and route forwarding decisions Access policies are used primarily for security and quality of service QoS purposes The three categories of access policies are e Access control lists e Rate limits e Routing access policies Access Control Lists Access control lists are used to perform packet filtering and forwarding decisions on incoming traffic Each packet arriving on an ingress port is compared to the access list in sequential order and is either forwarded to a specified QoS profile or dropped These forwarded packets can also be modified by changing the 802 1p value and or the DiffServe code point Using access lists has no impact on switch performance Rate Limits Rate limits are almost identical to access control lists Incoming packets that match a rate limit access control list are allowed as long as they do not exceed a pre defined rate Excess packets are either dropped or modified by resetting their DiffServ code point Summit 200 Series Switch Installation and User Guide 101 Access Policies Routing Access Policies Routing access policies are used to control the advertisement or recognition of routing protocols such as RIP or OSPF
272. s a list of IP addresses and associated subnet masks You must give the access profile a unique name in the same manner as naming a VLAN protocol filter or Spanning Tree Domain To create an access profile use the following command create access profile lt access_profile gt type ipaddress Configuring an Access Profile Mode After the access profile is created you must configure the access profile mode The access profile mode determines whether the items in the list are to be permitted access or denied access Three modes are available e Permit The permit access profile mode permits the operation as long as it matches any entry in the access profile If the operation does not match any entries in the list the operation is denied e Deny The deny access profile mode denies the operation as long as it matches any entry in the access profile If it does not match all specified entries in the list the operation is permitted e None Using the none mode the access profile can contain a combination of permit and deny entries Each entry must have a permit or deny attribute The operation is compared with each entry in the list Once a match is found the operation is either permitted or denied depending on the configuration of the matched entry If no match is found the operation is implicitly denied To configure the access profile mode use the following command config access profile lt access_profile gt mode per
273. s a reserved amount of bandwidth to function properly using QoS you can reserve sufficient bandwidth critical to this type of application Other applications deemed less critical can be limited so as to not consume excessive bandwidth The switch contains separate hardware queues on every physical port Each hardware queue can be programmed by ExtremeWare with bandwidth limitation and prioritization parameters The bandwidth limitation and prioritization parameters that modify the forwarding behavior of the switch affect how the switch transmits traffic for a given hardware queue on a physical port Summit 200 series switches support up to four physical queues per port Summit 200 Series Switch Installation and User Guide 143 Quality of Service QoS A NOTE As with all Extreme switch products QoS has no impact on switch performance Using even the most complex traffic groupings has no cost in terms of switch performance Applications and Types of QoS Different applications have different QoS requirements The following applications are ones that you will most commonly encounter and need to prioritize e Voice applications e Video applications e Critical database applications e Web browsing applications e File server applications General guidelines for each traffic type are given below and summarized in Table 36 Consider them as general guidelines and not strict recommendations Once QoS parameters are set you can monitor
274. s before the command line prompt when using the CLI Upgrading and Accessing BootROM The BootROM of the switch initializes certain important switch variables during the boot process If necessary BootROM can be upgraded after the switch has booted using TFTP In the event the switch does not boot properly some boot option functions can be accessed through a special BootROM menu Upgrading BootROM Upgrading BootROM is done using TFIP from the CLI after the switch has booted Upgrade the BootROM only when asked to do so by an Extreme Networks technical representative To upgrade the BootROM use the following command download bootrom lt hostname gt lt ipaddress gt lt filename gt Accessing the BootROM menu Interaction with the BootROM menu is only required under special circumstances and should be done only under the direction of Extreme Networks Customer Support The necessity of using these functions implies a non standard problem which requires the assistance of Extreme Networks Customer Support To access the BootROM menu follow these steps 1 Attach a serial cable to the console port of the switch 2 Attach the other end of the serial cable to a properly configured terminal or terminal emulator power cycle the switch while depressing the spacebar on the keyboard of the terminal As soon as you see the Boot ROM gt prompt release the spacebar You can see a simple help menu by pressing h Options in the menu i
275. s can be configured on the switch The community string for all authorized trap receivers must be configured on the 58 Summit 200 Series Switch Installation and User Guide Using SNMP switch for the trap receiver to receive switch generated traps SNMP community strings can contain up to 127 characters e System contact optional The system contact is a text field that enables you to enter the name of the person s responsible for managing the switch e System name The system name is the name that you have assigned to this switch The default name is the model name of the switch for example Summit1 switch e System location optional Using the system location field you can enter an optional location for this switch Table 18 describes SNMP configuration commands Table 18 SNMP Configuration Commands Command Description config snmp add trapreceiver lt ipaddress gt community lt string gt config snmp community read only read write lt string gt config snmp delete trapreceiver lt ip address gt community lt string gt all config snmp syscontact lt string gt config snmp syslocation lt string gt config snmp sysname lt string gt disable snmp access disable snmp traps enable snmp access enable snmp traps unconfig management Adds the IP address of a specified trap receiver The IP address can be a unicast multicast or broadcast address A maximum of 16 trap receivers
276. s learned Split horizon omits routes learned from a neighbor in updates sent to that neighbor Poison Reverse Like split horizon poison reverse is a scheme for eliminating the possibility of loops in the routed topology In this case a router advertises a route over the same interface that supplied the route but the route uses a hop count of 16 defining it as unreachable Triggered Updates Triggered updates occur whenever a router changes the metric for a route and it is required to send an update message immediately even if it is not yet time for a regular update message to be sent This will generally result in faster convergence but may also result in more RIP related traffic Route Advertisement of VLANs VLANs that are configured with an IP address but are configured to not route IP or are not configured to run RIP do not have their subnets advertised by RIP Only those VLANs that are configured with an IP address and are configured to route IP and run RIP have their subnets advertised RIP Version 1 Versus RIP Version 2 A new version of RIP called RIP version 2 expands the functionality of RIP version 1 to include e Variable Length Subnet Masks VLSMs e Support for next hop addresses which allows for optimization of routes in certain environments e Multicasting RIP version 2 packets can be multicast instead of being broadcast reducing the load on hosts that do not support routing protocols Summit 200 Series
277. s lists You will use the set code point parameter of the create access list command to replace the value To display the DiffServ configuration use the following command show ports lt portlist gt info detail A NOTE The show ports command displays only the default code point mapping DiffServ Examples For information on the access list and access mask commands in the following examples see Chapter 9 Access Policies Summit 200 Series Switch Installation and User Guide 151 Quality of Service QoS Use the following command to use the DiffServe code point value to assign traffic to the hardware queues nable diffserv examination ports all In the following example all the traffic from network 10 1 2 x is assigned the DiffServe code point 23 and the 802 1p value of 2 create access mask SrilIpMask source ip 24 create access list TenOneTwo access mask SrcIpMask source ip 10 1 2 0 24 permit qp3 set code point 23 set dotip 2 Physical and Logical Groupings Two traffic groupings exist in this category e Source port e VLAN Source port A source port traffic grouping implies that any traffic sourced from this physical port uses the indicated QoS profile when the traffic is transmitted out to any other port To configure a source port traffic grouping use the following command config ports lt portlist gt qosprofile lt qosprofile gt In the following modular switch example all traffic sourced f
278. s primary port unconfig eaps secondary port unconfig icmp unconfig igmp unconfig irdp unconfig management unconfig ospf unconfig ports display string unconfig ports monitor vlan unconfig radius unconfig radius accounting unconfig rip unconfig stpd unconfig switch unconfig switch all unconfig tacacs unconfig tacacs accounting unconfig udp profile unconfig vlan ipaddress upload configuration upload configuration cancel use configuration use image 80 159 80 159 80 147 152 153 62 62 106 110 206 206 206 56 80 81 73 75 175 175 73 94 154 158 235 66 66 158 192 158 92 152 154 49 54 49 50 134 138 138 187 189 217 187 189 59 213 80 92 92 49 233 237 233 237 232 237 237 Index of Commands Summit 200 Series Switch Installation and User Guide 251 Index of Commands 252 Summit 200 Series Switch Installation and User Guide
279. s system 1 and system 2 by way of a connection between system 1 port 26 and system 2 slot 1 port 6 VLAN Engineering spans system 1 and system 2 by way of a connection between system 1 port 25 and system 2 slot 8 port 6 Using this configuration you can create multiple VLANs that span multiple switches in a daisy chained fashion Each switch must have a dedicated port for each VLAN Each dedicated port must be connected to a port that is a member of its VLAN on the next switch Tagged VLANs Tagging is a process that inserts a marker called a tag into the Ethernet frame The tag contains the identification number of a specific VLAN called the VLANid The Summit 200 series switch supports L2 tagged VLANs A NOTE The use of 802 1Q tagged packets may lead to the appearance of packets slightly bigger than the current IEEE 802 3 Ethernet maximum of 1 518 bytes This may affect packet error counters in other devices and may also lead to connectivity problems if non 802 1Q bridges or routers are placed in the path Uses of Tagged VLANs Tagging is most commonly used to create VLANs that span switches The switch to switch connections are typically called trunks Using tags multiple VLANs can span multiple switches using one or more trunks In a port based VLAN each VLAN requires its own pair of trunk ports as shown in Figure 12 Using tags multiple VLANs can span two switches with a single trunk Another benefit of tagged VLANs is t
280. s without a specified precedence have a lower precedence and so on Specifying a Default Rule You can specify a default access control list to define the default access to the switch You should use an access mask with a low precedence for the default rule access control list If no other access control list entry is satisfied the default rule is used to determine whether the packet is forwarded or dropped If no default rule is specified the default behavior is to forward the packet A NOTE If your default rule denies traffic you should not apply this rule to the Summit 200 series switch port used as a management port The following example shows an access control list that is used to specify an default rule to explicitly deny all traffic create access mask ingress_mask ports precedence 25000 create acess list DenyAll ingress_mask ports 2 26 deny Once the default behavior of the access control list is established you can create additional entries using precedence numbers The following access control list example shows an access control list that will forward traffic from the 10 1 2 x subnet even while the above default rule is in place create access mask ip_src_mask source ip 24 precedence 1000 create access list TenOneTwo ip_src_mask source ip 10 1 2 0 24 permit The permit established Keyword The permit established keyword is used to directionally control attempts to open a TCP session Session initiation can be expl
281. sceiv rs aa 2 dB 6 dB 0 dB 0 dB 2 dB ZX Rev 03 5 dB 9 dB 3 dB 3 dB 5 dB ZX mini 6 dB 10 dB 4 dB 4 dB 6 dB Summit 200 Series Switch Installation and User Guide 25 Summit 200 Series Switch Overview 26 Summit 200 Series Switch Installation and User Guide Switch Installation This chapter describes the following topics e Determining the Switch Location on page 27 e Following Safety Information on page 28 e Installing the Switch on page 28 e Connecting Equipment to the Console Port on page 29 e Powering On the Switch on page 30 e Checking the Installation on page 31 e Logging In for the First Time on page 31 e Installing or Replacing a Mini Gigabit Interface Connector Mini GBIC on page 32 A CAUTION Use of controls or adjustments of performance or procedures other than those specified herein can result in hazardous radiation exposure Determining the Switch Location The Summit 200 series switch is suited for use in the office where it can be free standing or mounted in a standard 19 inch equipment rack Alternately the device can be rack mounted in a wiring closet or equipment room Two mounting brackets are supplied with the switch When deciding where to install the switch ensure that e The switch is accessible and cables can be connected easily e Water or moisture cannot enter the case of the unit e Air flow around the unit and through the vents in the side of the case is not restricted Y
282. sed by the switch to determine the type of service provided to the packet Observing DiffServ code points as a traffic grouping mechanism for defining QoS policies and overwriting the Diffserv code point fields are supported in the Summit 200 series switch Figure 29 shows the encapsulation of an IP packet header Figure 29 IP packet header encapsulation DiffServ code point 0 lt bits SSS Version Type of service Total length Identification Flags Fragment offset Time to live Protocol Header checksum Source address Destination address Options padding Data variable EW_023 Table 41 lists the commands used to configure DiffServ Some of the commands are described in more detail in the following paragraphs Table 41 DiffServ Configuration Commands Command Description disable diffserv examination ports lt portlist gt Disables the examination of the diffserv field in all an IP packet enable diffserv examination ports lt portlist gt Enables the diffserv field of an ingress IP packet all to be examined by the switch in order to select a QoS profile The default setting is disabled Observing DiffServ Information When a packet arrives at the switch on an ingress port the switch examines the first six of eight TOS bits called the code point The switch can assign the QoS profile used to subsequently transmit the packet based on the code point The QoS profile controls a hardware que
283. show management PROFILE3 deny create vlan disable show fdb delete configure iproute configure rip add Profile Name Profile Name Profile Name Profile Name Profile2 64 Summit 200 Series Switch Installation and User Guide Configuring TACACS Authenticating Users Terminal Access Controller Access Control System Plus TACACS is a mechanism for providing authentication authorization and accounting on a centralized server similar in function to the RADIUS client The ExtremeWare version of TACACS is used to authenticate prospective users who are attempting to administer the switch TACACS is used to communicate between the switch and an authentication database A NOTE You cannot use RADIUS and TACACS at the same time You can configure two TACACS servers specifying the primary server address secondary server address and UDP port number to be used for TACACS sessions Table 20 describes the commands that are used to configure TACACS Table 20 TACACS Commands Command Description config tacacs primary secondary server lt ipaddress gt lt hostname gt lt udp_port gt client ip lt ipaddress gt config tacacs primary secondary shared secret encrypted lt string gt config tacacs accounting primary secondary server lt ipaddress gt lt hostname gt lt udp_port gt client ip lt ipaddress gt config tacacs accounting primary s
284. sing EDP includes e Switch MAC address switch ID e Switch software version information e Switch IP address e Switch VLAN IP information e Switch port number EDP Commands Table 27 lists EDP commands Table 27 EDP Commands Command Description disable edp ports lt portlist gt Disables the EDP on one or more ports enable edp ports lt portlist gt Enables the generation and processing of EDP messages on one or more ports The default setting is enabled show edp Displays EDP information 84 Summit 200 Series Switch Installation and User Guide Virtual LANs VLANs This chapter describes the following topics e Overview of Virtual LANs on page 85 e Types of VLANs on page 86 e VLAN Names on page 90 e Configuring VLANs on the Switch on page 91 e Displaying VLAN Settings on page 92 e MAC Based VLANs on page 93 Setting up Virtual Local Area Networks VLANs on the switch eases many time consuming tasks of network administration while increasing efficiency in network operations Overview of Virtual LANs The term VLAN is used to refer to a collection of devices that communicate as if they were on the same physical LAN Any set of ports including all ports on the switch is considered a VLAN LAN segments are not restricted by the hardware that physically connects them The segments are defined by flexible user groups you create with the command line interface Benefits Implementing VLANs on you
285. spend in the listening and learning states when the switch is the Root Bridge The range is 4 through 30 The default setting is 15 seconds config stpd lt stpd_name gt hellotime lt value gt Specifies the time delay in seconds between the transmission of BPDUs from this STPD when it is the Root Bridge The range is 1 through 10 The default setting is 2 seconds Summit 200 Series Switch Installation and User Guide 173 Spanning Tree Protocol STP Table 50 STP Configuration Commands continued Command config stpd lt stpd_name gt maxage lt value gt config stpd lt stpd_name gt ports cost lt value gt lt portlist gt config stpd lt stpd_name gt ports priority lt value gt lt portlist gt config stpd lt stpd_name gt priority lt value gt create stpd lt stpd_name gt enable ignore bpdu vlan lt name gt enable ignore stp vlan lt vian name gt enable stpd lt stpd_name gt enable stpd ports lt portlist gt Description Specifies the maximum age of a BPDU in this STPD The range is 6 through 40 The default setting is 20 seconds Note that the time must be greater than or equal to 2 Hello Time 1 and less than or equal to 2 Forward Delay 1 Specifies the path cost of the port in this STPD The range is 1 through 65 535 The switch automatically assigns a default path cost based on the speed of the port as follows e Fora 10 Mbps port the default cost is 10
286. ss lt ipaddress gt lt mask gt Ensure that each VLAN has a unique IP address Configure a default route using the following command config iproute add default lt gateway gt lt metric gt Default routes are used when the router has no other dynamic or static route to the requested destination Turn on IP routing for one or all VLANs using the following command enable ipforwarding vlan lt name gt Turn on RIP or OSPF using one of the following commands enable rip enable ospf Verifying the IP Unicast Routing Configuration Use the show iproute command to display the current configuration of IP unicast routing for the switch and for each VLAN The show iproute command displays the currently configured routes and includes how each route was learned 182 Summit 200 Series Switch Installation and User Guide Additional verification commands include IP Commands e show iparp Displays the IP ARP table of the system e show ipfdb Displays the hosts that have been transmitting or receiving packets and the port and VLAN for each host e show ipconfig Displays configuration information for one or more VLANs IP Commands Table 53 describes the commands used to configure basic IP settings Table 53 Basic IP Commands Command Description clear iparp lt ipaddress gt lt mask gt vlan lt vlan gt clear ipfdb lt ipaddress gt lt netmask gt vlan lt name gt config bootprelay a
287. sses for a VLAN Configures the timer value in seconds returned as part of the DHCP response Configures the DHCP options returned as part of the DHCP response by a switch configured as a DHCP server Configures the timer value in seconds returned as part of the DHCP response for clients attached to network enabled ports The default value is 30 seconds Disables DHCP on a specified port in a VLAN Disables network login on a specified port in a VLAN Enables DHCP on a specified port in a VLAN Enables network login on a specified port in a VLAN Displaying Network Login Settings To display the network login settings use the following command show netlogin info ports lt portlist gt vlan lt name gt Example show netlogin info ports 9 vlan temporary Port 9 VLAN temporary Port State Not Authenticated 70 Summit 200 Series Switch Installation and User Guide Using EAPOL Flooding Temp IP Unknown DHCP Not Enabled User Unknown MAC Unknown In this example the user is using campus mode and no authentication has taken place Therefore the port state displays as not authenticated No packets sent by the user on port 9 will get past the port until authentication takes place After authentication has taken place and the permanent IP address is obtained the show command displays the port state as authenticated show netlogin info ports 9 vlan corp Port 9 VLAN corp Port State Authenticated
288. stallation and User Guide 209 Interior Gateway Routing Protocols Table 64 OSPF Configuration Commands continued Command config ospf vlan lt vlan gt timer lt rxmtinterval gt lt transitdelay gt lt hellointerval gt lt routerdeadinterval gt lt waitinterval gt create ospf area lt areaid gt disable ospf capability opaque lsa enable ospf enable ospf capability opaque lsa enable ospf export direct cost lt metric gt ase type 1 ase type 2 tag lt number gt enable ospf export rip cost lt metric gt ase type 1 ase type 2 tag lt number gt Description Configures the OSPF wait interval Specify the following rxmt interval the length of time that the router waits before retransmitting an LSA that is not acknowledged If you set an interval that is too short unnecessary retransmissions will result The default value is 5 seconds transitdelay tThe length of time it takes to transmit an LSA packet over the interface The transit delay must be greater than 0 hellointerval tThe interval at which routers send hello packets Smaller times allow routers to discover each other more quickly but also increase network traffic The default value is 10 seconds routerdeadinterval the interval after which a neighboring router is declared down due to the fact that hello packets are no longer received from the neighbor This interval should be a multiple of the hello interval The defaul
289. stance vector protocols and link state protocols Using a distance vector protocol each router creates a unique routing table from summarized information obtained from neighboring routers Using a link state protocol every router maintains an identical routing table created from information obtained from all routers in the autonomous system Each router builds a shortest path tree using itself as the root The link state protocol ensures that updates sent to neighboring routers are acknowledged by the neighbors verifying that all routers have a consistent network map The biggest advantage of using RIP is that it is relatively simple to understand and implement and it has been the de facto routing standard for many years RIP has a number of limitations that can cause problems in large networks including e A limit of 15 hops between the source and destination networks e A large amount of bandwidth taken up by periodic broadcasts of the entire routing table e Slow convergence e Routing decisions based on hop count no concept of link costs or delay e Flat networks no concept of areas or boundaries OSPF offers many advantages over RIP including e No limitation on hop count e Route updates multicast only when changes occur e Faster convergence e Support for load balancing to multiple routers based on the actual cost of the link e Support for hierarchical topologies where the network is divided into areas The details of
290. sword prompt press Return The default name admin has no password assigned When you have successfully logged on to the switch the command line prompt displays the name of the switch for example Summit200 24 in its prompt 5 Assign an IP address and subnetwork mask for VLAN default by typing config vlan default ipaddress 123 45 67 8 255 255 255 0 Your changes take effect immediately 6 Save your configuration changes so that they will be in effect after the next switch reboot by typing Save A NOTE For more information on saving configuration changes refer to the ExtremeWare Software User Guide Summit 200 Series Switch Installation and User Guide 31 Switch Installation 7 When you are finished using the facility logout of the switch by typing logout A NOTE After two incorrect login attempts the Summit 200 series switch locks you out of the login facility You must wait a few minutes before attempting to log in again Installing or Replacing a Mini Gigabit Interface Connector Mini GBIC This section describes the safety precautions and preparation steps that you must perform before inserting and securing a mini GBIC Safety Information Before you install or replace a mini GBIC read the safety information in this section AA WARNING Mini GBICs can emit invisible laser radiation Avoid direct eye exposure to beam Mini GBICs are a class 1 laser device Use only devices approved by Extreme Ne
291. t show ipconfig vlan lt name gt detail show ipfdb lt ipaddress gt lt netmask gt vlan lt name gt show iproute priority vlan lt vlan gt permanent lt ipaddress gt lt netmask gt origin direct static blackhole rip bootp icmp ospf intra ospf inter ospf as external ospf extern1 ospf extern2 sorted show ipstats vlan lt name gt Displays the IP Address Resolution Protocol ARP table You can filter the display by IP address VLAN or permanent entries Displays the proxy ARP table Displays configuration information for one or all VLANs Displays IP configuration settings Displays the contents of the IP forwarding database FDB table If no option is specified all IP FDB entries are displayed Displays the contents of the IP routing table or the route origin priority Displays IP statistics for the CPU of the system 188 Summit 200 Series Switch Installation and User Guide Resetting and Disabling Router Settings Resetting and Disabling Router Settings To return router settings to their defaults and disable routing functions use the commands listed in Table 57 Table 57 Router Reset and Disable Commands Command Description clear iparp lt ipaddress gt vlan lt name gt clear ipfdb lt ipaddress gt lt netmask gt vlan lt name gt disable bootp vian lt name gt all disable bootprelay disable icmp address mask vlan
292. t Figure 16 Access control list denies all TCP and UDP traffic 10 10 10 1 10 10 20 100 NET10 VLAN NET20 VLAN s L 7 O a a LC24009 Step 2 Allow TCP traffic The next set of access list commands permits TCP based traffic to flow Because each session is bi directional an access list must be defined for each direction of the traffic flow UDP traffic is still blocked The following commands create the access control list create access mask ip_addr_mask ipprotocol dest ip 32 source ip 32 ports precedence 20000 create access list tcpl_2 ip_addr_mask ipprotocol tcp dest ip 10 10 20 100 32 source ip 10 10 10 100 32 ports 2 permit qpl create access list tcp2_1 ip_addr_mask ipprotocol tcp dest ip 10 10 10 100 32 source ip 10 10 20 100 32 ports 10 permit qpl Figure 17 illustrates the outcome of this access list Summit 200 Series Switch Installation and User Guide 111 Access Policies Figure 17 Access list allows TCP traffic Be lt lt TCP ______ gt 7 e A 10 10 20 100 EW_035 Step 3 Permit Established Access List When a TCP session begins there is a three way handshake that includes a sequence of a SYN SYN ACK and ACK packets Figure 18 shows an illustration of the handshake that occurs when host A initiates a TCP session to host B After this sequence actual data can be passed Figure 18 Host A initiates a TCP session to host B
293. t the number of inside hosts can be greater than the number of outside hosts The outside IP addresses are allocated on a first come first serve basis to the inside IP addresses When the last session for a specific inside IP address closes that outside IP address can be used by other hosts Because this mode does not rely on Layer 4 ports ICMP traffic is translated and allowed to pass Port mapping Port mapping gives you the most efficient use of the external address space As each new connection is initiated from the inside the NAT device picks the next available source Layer 4 port on the first available outside IP address When all ports on a given IP address are in use the NAT device uses ports off of the next outside IP address Some systems reserve certain port ranges for specific types of traffic so it is possible to map specific source Layer 4 port ranges on the inside to specific outside source ranges However this may cause a small performance penalty In this case you would need to make several rules using the same inside and outside IP addresses one for each Layer 4 port range ICMP traffic is not translated in this mode You must add a dynamic NAT rule for the same IP address range to allow for ICMP traffic Auto constraining The auto constraining algorithm for port mapping limits the number of outside Layer 4 ports a single inside host can use simultaneously The limitation is based on the ratio of inside to outside IP addresse
294. t value is 40 seconds waitinterval the interval between the interface coming up and the election of the DR and BDR This interval is required by the OSPF standard to be equal to the routerdeadinterval Under some circumstances setting the waitinterval to smaller values can help OSPF routers on a broadcast network to synchronize more quickly at the expense of possibly electing an incorrect DR or BDR This value should not be set to less than the hellointerval The default value is equal to the routerdeadinterval Creates an OSPF area Area 0 does not need to be created It exists by default Disables OSPF opaque LSA support Enables OSPF process for the router Enables OSPF opaque LSA support Enables the distribution of local interface direct routes into the OSPF domain Once enabled the OSPF router is considered to be an ASBR The default tag number is 0 The default setting is disabled Interface routes which correspond to the interface that has OSPF enabled are ignored Enables the distribution of RIP routes into the OSPF domain Once enabled the OSPF router is considered to be an ASBR The default tag number is 0 The default setting is disabled 210 Summit 200 Series Switch Installation and User Guide Configuring OSPF Table 64 OSPF Configuration Commands continued Command Description enable ospf export static cost lt metric gt Enables the distribution of static routes into the ase type 1 ase
295. tROM on page 235 e Boot Option Commands on page 236 Downloading a New Image The image file contains the executable code that runs on the switch It comes preinstalled from the factory As new versions of the image are released you should upgrade the software running on your system The image is upgraded by using a download procedure from either a Trivial File Transfer Protocol TFIP server on the network Downloading a new image involves the following steps e Load the new image onto a TFIP server on your network if you will be using TFTP e Download the new image to the switch using the download image command To download the image use the following command download image lt ipaddress gt lt hostname gt lt filename gt primary secondary where ipaddress Specifies the IP address of the TFIP server hostname Specifies the hostname of the TFTP server You must enable DNS to use this option filename Specifies the filename of the new image primary Specifies the primary image secondary Specifies the secondary image Summit 200 Series Switch Installation and User Guide 231 Software Upgrade and Boot Options The switch can store up to two images a primary and a secondary When you download a new image you must select into which image space primary or secondary the new image should be placed If you do select not an image space the system uses the primary image space Rebooting the Switch To reboot th
296. temporary IP address from the switch If you have more than one Ethernet adapter specify the adapter by using a number for the adapter following the ipconfig command You can find the adapter number using the command ipconfig all At this point the client will have its temporary IP address In this example the client should have obtained the IP address 192 168 0 20 5 Bring up the web browser and enter the IP address of the switch A AK note It is important to use the IP address of a VLAN that is reachable from anywhere on the network A page will open with a link for network login 6 Click the network login link A dialog box opens requesting a username and password 7 Enter the username and password configured on the RADIUS server After the user has successfully logged in the user will be redirected to the URL configured on the RADIUS server 68 Summit 200 Series Switch Installation and User Guide Using Network Login During the user login process the following takes place e Authentication is done through the RADIUS server e After successful authentication the connection information configured on the RADIUS server is returned to the switch The permanent VLAN The URL to be redirected to optional The URL description optional e The port is moved to the permanent VLAN You can verify this using the show vlan command For more information on the show vlan command see Displaying VLAN Settings on page
297. ters blocking state A port QoS setting is changed A port goes down link down e Blackhole entries A blackhole entry configures the switch to discard packets with a specified MAC destination address Blackhole entries are useful as a security measure or in special circumstances where a specific destination address must be discarded Blackhole entries are treated like permanent entries in the event of a switch reset or power off on cycle Blackhole entries are never aged out of the database How FDB Entries Get Added Entries are added into the FDB in the following two ways e The switch can learn entries The system updates its FDB with the source MAC address from a packet the VLAN and the port identifier on which the source packet is received e You can enter and update entries using a MIB browser an SNMP Network Manager or the command line interface CLI Associating a QoS Profile with an FDB Entry You can associate a QoS profile with a MAC address and VLAN of a device that will be dynamically learned The FDB treats the entry like a dynamic entry it is learned it can be aged out of the database and so on The switch applies the QoS profile as soon as the FDB entry is learned A NOTE For more information on QoS refer to Chapter 12 98 Summit 200 Series Switch Installation and User Guide Configuring FDB Entries Configuring FDB Entries To configure entries in the FDB use the commands listed in T
298. that the port is not in a forwarding state and the partner switch will continue to forward packets Verifying the Load Sharing Configuration The screen output resulting from the show ports configuration command lists the ports that are involved in load sharing and the master logical port identity Switch Port Mirroring Port mirroring configures the switch to copy all traffic associated with one or more ports The monitor port can be connected to a network analyzer or RMON probe for packet analysis The system uses a traffic filter that copies a group of traffic to the monitor port The traffic filter is defined by the physical port meaning that all data that traverses the port regardless of VLAN configuration is copied to the monitor port 82 Summit 200 Series Switch Installation and User Guide Switch Port Mirroring Up to eight mirroring filters and one monitor port can be configured Once a port is specified as a monitor port it cannot be used for any other function A NOTE Frames that contain errors are not mirrored The mirrored port always transmits tagged frames The default port tag will be added to any untagged packets as they are mirrored This allows you to mirror multiple ports or VLANs to a mirror port while preserving the ability of a single protocol analyzer to track and differentiate traffic within a broadcast domain VLAN and across broadcast domains for example across VLANs when routing A NOTE
299. the performance of the application to determine if the actual behavior of the applications matches your expectations It is very important to understand the needs and behavior of the particular applications you wish to protect or limit Behavioral aspects to consider include bandwidth needs sensitivity to latency and jitter and sensitivity and impact of packet loss Voice Applications Voice applications typically demand small amounts of bandwidth However the bandwidth must be constant and predictable because voice applications are typically sensitive to latency inter packet delay and jitter variation in inter packet delay The most important QoS parameter to establish for voice applications is minimum bandwidth followed by priority Video Applications Video applications are similar in needs to voice applications with the exception that bandwidth requirements are somewhat larger depending on the encoding It is important to understand the behavior of the video application being used For example in the playback of stored video streams some applications can transmit large amounts of data for multiple streams in one spike with the expectation that the end stations will buffer significant amounts of video stream data This can present a problem to the network infrastructure because it must be capable of buffering the transmitted spikes where there are speed differences for example going from Gigabit Ethernet to Fast Ethernet Key Q
300. the SFP receptacle If the mini GBIC has a handle push up on the handle to secure the mini GBIC 34 Summit 200 Series Switch Installation and User Guide ExtremeWare Overview This chapter describes the following topics e Summary of Features on page 35 e Software Licensing on page 38 e Security Licensing for Features Under License Control on page 39 e Software Factory Defaults on page 40 ExtremeWare is the full featured software operating system that is designed to run on the Summit 200 series switch This section describes the supported ExtremeWare features for the Summit 200 series switch Summary of Features The Summit 200 series switch supports the following ExtremeWare features e Virtual local area networks VLANs including support for IEEE 802 10 and IEEE 802 1p e Spanning Tree Protocol STP IEEE 802 1D e Quality of Service QoS including support for IEEE 802 1p MAC QoS and four hardware queues e Wire speed Internet Protocol IP routing e DHCP BOOTP Relay e Network Address Translation NAT e Extreme Standby Router Protocol ESRP Aware support e Ethernet Automated Protection Switching EAPS support e Routing Information Protocol RIP version 1 and RIP version 2 e Open Shortest Path First OSPF routing protocol e Diffserv support e Access policy support for routing protocols e Access list support for packet filtering e Access list support for rate limiting e IGMP snooping to control IP mult
301. the form of advertisements Using dynamic routes the routing table contains only networks that are reachable Dynamic routes are aged out of the table when an update for the network is not received for a period of time as determined by the routing protocol Static Routes Static routes are manually entered into the routing table Static routes are used to reach networks not advertised by routers Static routes can also be used for security reasons to control which routes you want advertised by the router You can decide if you want all static routes to be advertised using one of the following commands enable disable rip export static enable disable ospf export static The default setting is disabled Static routes are never aged out of the routing table A static route must be associated with a valid IP subnet An IP subnet is associated with a single VLAN by its IP address and subnet mask If the VLAN is subsequently deleted the static route entries using that subnet must be deleted manually Multiple Routes When there are multiple conflicting choices of a route to a particular destination the router picks the route with the longest matching network mask If these are still equal the router picks the route using the following criteria in the order specified e Directly attached network interfaces e ICMP redirects refer to Table 55 later in this chapter e Static routes e Directly attached network interfaces that
302. the system after any exception The default setting is none A NOTE Extreme Networks recommends that you set the system recovery level to critical This allows ExtremeWare to log an error to the syslog and automatically reboot the system after a critical exception Logging The switch log tracks all configuration and fault information pertaining to the device Each entry in the log contains the following information e Timestamp tThe timestamp records the month and day of the event along with the time hours minutes and seconds in the form HH MM SS If the event was caused by a user the user name is also provided e Fault level Table 46 describes the three levels of importance that the system can assign to a fault Table 46 Fault Levels Assigned by the Switch Level Description Critical A desired switch function is inoperable The switch may need to be reset Warning A noncritical error that may lead to a function failure Informational Actions and events that are consistent with expected behavior Debug Information that is useful when performing detailed troubleshooting procedures By default log entries that are assigned a critical or warning level remain in the log after a switch reboot Issuing a clear log command does not remove these static entries To remove log entries of all levels including warning or critical use the following command clear log static e Subsystem tThe subsystem refers to the sp
303. ther default route is advertised If always is specified RIP always advertises the default route to its neighbors If always is not specified RIP adds a default route if there is a reachable default route in the route table Enables the split horizon with poison reverse algorithm for RIP The default setting is enabled If you enable poison reverse and split horizon poison reverse takes precedence Enables the split horizon algorithm for RIP Default setting is enabled Enables triggered updates Triggered updates are a mechanism for immediately notifying a router s neighbors when the router adds or deletes routes or changes the metric of a route The default setting is enabled 204 Summit 200 Series Switch Installation and User Guide RIP Configuration Example RIP Configuration Example Figure 37 illustrates a switch that has two VLANs defined as follows e Finance which contains ports 2 and 4 and has the IP address 192 207 35 1 e Personnel which contains ports 3 and 5 and has the IP address 192 207 36 1 Figure 37 RIP configuration example oO networks O 192 207 35 0 192 207 36 0 Finance Personnel m oO 2 3 4 5 192 207 35 11 E 192 207 35 13 L 192 207 36 12 192 207 36 14 mA In this configuration all IP traffic from stations connected to ports 2 and 4 have access to the router by way of the VLAN Finance Ports 3 and
304. tockholm Sweden Oslo Norway Athens Greece Helsinki Finland Istanbul Turkey Jerusalem Israel Harare Zimbabwe Kuwait Nairobi Kenya Riyadh Saudi Arabia Moscow Russia Tehran Iran Abu Dhabi UAE Muscat Tblisi Volgograd Kabul New Delhi Pune Allahabad India Wellington New Zealand Fiji Marshall Islands 74 Summit 200 Series Switch Installation and User Guide SNTP Configuration Commands Using the Simple Network Time Protocol Table 24 describes SNTP configuration commands Table 24 SNTP Configuration Commands Command Description config sntp client primary secondary server lt ipaddress gt lt host_name gt config sntp client update interval lt seconds gt disable sntp client enable sntp client show snitp client SNTP Example Configures an SNTP server for the switch to obtain time information Queries are first sent to the primary server If the primary server does not respond within 1 second or if it is not synchronized the switch queries the second server Configures the interval between polling for time information from SNTP servers The default setting is 64 seconds Disables SNTP client functions Enables Simple Network Time Protocol SNTP client functions Displays configuration and statistics for the SNTP client In this example the switch queries a specific SNTP server and a backup SNTP server The switch is located in Cupertino CA and an
305. tworks A NOTE Remove the LC fiber optic connector from the mini GBIC prior to removing the mini GBIC from the switch Preparing to Install or Replace a Mini GBIC To ensure proper installation complete the following tasks before inserting the mini GBIC e Disable the port that is needed to install or replace the mini GBIC e Inspect and clean the fiber tips coupler and connectors e Prepare and clean an external attenuator if needed e Do not stretch the fiber e Make sure the bend radius of the fiber is not less than 2 inches In addition to the previously described tasks Extreme Networks recommends the following when installing or replacing mini GBICs on an active network e Use the same type of mini GBIC at each end of the link e Connect one end of the link to the Tx port Without an attenuator measure the total loss from the Tx port to the other side of the link Once you complete all of the described tasks you are ready to install or replace a mini GBIC 32 Summit 200 Series Switch Installation and User Guide Installing or Replacing a Mini Gigabit Interface Connector Mini GBIC Removing and Inserting a Mini GBIC You can remove mini GBICs from or insert mini GBICs into your Summit 200 series switch without powering off the system Figure 9 shows the two types of mini GBIC modules Figure 9 Mini GBIC modules Module A Module B xM 024 Mini GBICs are a 3 3 V Class 1 laser device Use only devices approv
306. type 2 tag lt number gt OSPF domain Once enabled the OSPF router is considered to be an ASBR The default tag number is 0 The default setting is disabled enable ospf originate default always cost Configures a default external LSA to be lt metric gt ase type 1 ase type 2 tag generated by OSPF if no other default route is lt number gt originated by OSPF by way of RIP and static route re distribution If always is specified OSPF always advertises the default route If always is not specified OSPF adds the default LSA if there is a reachable default route in the route table Configuring OSPF Wait Interval ExtremeWare allows you to configure the OSPF wait interval rather than using the router dead interval AR CAUTION Do not configure OSPF timers unless you are comfortable exceeding OSPF specifications Non standard settings might not be reliable under all circumstances To specify the timer intervals use the following command config ospf vlan lt vlan gt timer lt rxmtinterval gt lt transitdelay gt lt hellointerval gt lt routerdeadinterval gt lt waitinterval gt You can configure the following parameters e Retransmit interval RxmtInterval The length of time that the router waits before retransmitting an LSA that is not acknowledged If you set an interval that is too short unnecessary retransmissions will result The default value is 5 seconds e Transit delay TransitDelay The lengt
307. ucher contains information and instructions on obtaining a license key for the switch using the Extreme Networks Support website at http esupport extremenetworks com or by phoning Extreme Networks Technical Support at e 800 998 2408 e 408 579 2826 Security Licensing for Features Under License Control Certain additional ExtremeWare security features such as the use of Secure Shell SSH2 encryption might be under United States export restriction control Extreme Networks ships these security features in a disabled state In order to enable the use of these features you must first obtain an export license which you can do through Extreme Networks at no extra charge SSH2 Encryption ExtremeWare version 6 0 and above supports the SSH2 protocol SSH2 allows the encryption of Telnet session data The encryption methods used are under U S export restriction control To obtain information on enabling SSH2 encryption access the Extreme Networks Support website at http esupport extremenetworks com Fill out a contact form to indicate compliance or noncompliance with the export restrictions If you are in compliance you will be given information that will allow you to enable security features Summit 200 Series Switch Installation and User Guide 39 ExtremeWare Overview Software Factory Defaults Table 11 shows factory defaults for ExtremeWare features supported on the Summit 200 series switch Table 11 ExtremeWare S
308. ue used when transmitting the packet out of the switch and determines the forwarding characteristics of a particular code point 150 Summit 200 Series Switch Installation and User Guide Traffic Groupings Viewing DiffServ information can be enabled or disabled by default it is disabled To view DiffServ information use the following command nable diffserv examination ports lt portlist gt all A NOTE DiffServ examination requires one access mask while it is enabled See Maximum Entries on page 105 for more information Changing DiffServ Code point assignments in the QoS Profile The DiffServ code point has 64 possible values 2 64 By default the values are grouped and assigned to the default QoS profiles listed in Table 42 Table 42 Default Code Point to QoS Profile Mapping Code Point QoS Profile 0 7 Qp1 8 15 Qp2 16 23 Qp3 24 31 Qp4 32 39 Qp5 40 47 Qp6 48 55 Qp7 56 63 Qp8 You can change the QoS profile assignment for a code point by using an access list See Chapter 9 Access Policies for more information Replacing DiffServ Code Points An access list can be used to change the DiffServ code point in the packet prior to the packet being transmitted by the switch This is done with no impact on switch performance To replace the DiffServ code point you will use an access list to set the new code point value See Chapter 9 Access Policies for more information on using acces
309. ummit 200 Series Switch Installation and User Guide 145 Quality of Service QoS Traffic Groupings Once a QoS profile is modified for bandwidth and priority you assign traffic a grouping to the profile A traffic grouping is a classification of traffic that has one or more attributes in common Traffic is typically grouped based on the applications discussed starting on page 144 Traffic groupings are separated into the following categories for discussion e Access list based information IP source destination TCP UDP port information and VLANid e Destination MAC MAC QoS groupings e Explicit packet class of service information such as 802 1p or DiffServ IP TOS e Physical logical configuration physical source port or VLAN association In the event that a given packet matches two or more grouping criteria there is a predetermined precedence for which traffic grouping will apply In general the more specific traffic grouping takes precedence By default all traffic groupings are placed in the QoS profile Qp1 The supported traffic groupings are listed in Table 38 The groupings are listed in order of precedence highest to lowest The four types of traffic groupings are described in detail on the following pages Table 38 Traffic Groupings by Precedence IP Information Access Lists Grouping e Access list precedence determined by user configuration Explicit Packet Class of Service Groupings e DiffServ IP TOS e 802 1P
310. update occurs every 20 minutes The commands to configure the switch are as follows config timezone 480 autodst config sntp client update interval 1200 enable sntp client config sntp client primary server 10 0 1 1 config sntp client secondary server 10 0 1 2 Summit 200 Series Switch Installation and User Guide 75 Managing the Switch 76 Summit 200 Series Switch Installation and User Guide Configuring Ports on a Switch This chapter describes the following topics e Enabling and Disabling Switch Ports on page 77 e Load Sharing on the Switch on page 80 e Switch Port Mirroring on page 82 e Extreme Discovery Protocol on page 84 Enabling and Disabling Switch Ports By default all ports are enabled To enable or disable one or more ports use the following command enable disable ports lt portlist gt For example to disable ports 3 5 and 12 through 15 on a Summit 200 series switch use the following command disable ports 3 5 12 15 Even though a port is disabled the link remains enabled for diagnostic purposes Configuring Switch Port Speed and Duplex Setting By default the switch is configured to use autonegotiation to determine the port speed and duplex setting for each port You can manually configure the duplex setting and the speed of 10 100 Mbps ports 10BASE T and 100BASE TX ports can connect to either 1OBASE T or 100BASE T networks By default the ports autonegotiate port speed Y
311. use fire property damage or personal injury Lithium Battery The battery in the bq4830 DS1644 device is encapsulated and not user replaceable If service personnel disregard the instructions and attempt to replace the bq4830 DS1644 replace the lithium battery with the same or equivalent type as recommended by the manufacturer 220 Summit 200 Series Switch Installation and User Guide Important Safety Information a AA WARNING Danger of explosion if battery is incorrectly replaced Replace only with the same or equivalent type recommended by the manufacturer Dispose of used batteries according to the manufacturer s instructions e Disposal requirements vary by country and by state e Lithium batteries are not listed by the Environmental Protection Agency EPA as a hazardous waste Therefore they can typically be disposed of as normal waste e If you are disposing of large quantities contact a local waste management service e No hazardous compounds are used within the battery module e The weight of the lithium contained in each coin cell is approximately 0 035 grams e Two types of batteries are used interchangeably CR chemistry uses manganese dioxide as the cathode material BR chemistry uses poly carbonmonofluoride as the cathode material Summit 200 Series Switch Installation and User Guide 221 Safety Information 222 Summit 200 Series Switch Installation and User Guide Technical Specif
312. used to configure IGMP and IGMP snooping on the Summit 200 series switches Table 67 IGMP and IGMP Snooping Commands Command Description config igmp lt query_interval gt Configures the IGMP timers Timers are based lt query_response_interval gt on RFC 2236 Specify the following lt last_member_query_interval gt query_interval tThe amount of time in seconds the system waits between sending out General Queries The range is 1 to 2 147 483 647 seconds 68 years The default setting is 125 seconds query_response_interval tThe maximum response time inserted into the periodic General Queries The range is 1 to 25 seconds The default setting is 10 seconds e last_member_query_interval tThe maximum response time inserted into a Group Specific Query sent in response to a Leave group message The range is 1 to 25 seconds The default setting is 1 second config igmp snooping lt router_timeout gt Configures the IGMP snooping timers Timers lt host_timeout gt should be set to approximately 2 5 times the router query interval in use on the network Specify the following e router_timeout The interval in seconds between the last time the router was discovered and the current time The range is 10 to 2 147 483 647 seconds 68 years The default setting is 260 seconds host_timeout The interval in seconds between the last IGMP group report message from the host and the current time The range
313. ust be configured as the primary port the other must be configured as the secondary port If the ring is complete the master node prevents a loop by logically blocking all data traffic in the transmit and receive directions on its secondary port If the master node subsequently detects a break in the ring it unblocks its secondary port and allows data traffic to be transmitted and received through it To configure a node port as primary or secondary use the following command config eaps lt name gt primary secondary port lt port number gt The following command example adds port 2 of the switch to the EAPS domain eaps_1 as the primary port config eaps eaps_1l primary port 2 136 Summit 200 Series Switch Installation and User Guide Commands for Configuring and Monitoring EAPS Configuring the EAPS Control VLAN You must configure one control VLAN for each EAPS domain The control VLAN is used only to send and receive EAPS messages A NOTE A control VLAN cannot belong to more than one EAPS domain To configure the EAPS control VLAN for the domain use the following command config eaps lt name gt add control vlan lt name gt A NOTE To avoid loops in the network the control VLAN must NOT be configured with an IP address and ONLY ring ports may be added to the VLAN A NOTE When you configure the VLAN that will act as the control VLAN that VLAN must be assigned a QoS profile of Qp8 and the ring ports
314. uters Doing so inhibits correct operation of the election algorithm Normal Area A normal area is an area that is not e Area 0 e Stub area e NSSA Virtual links can be configured through normal areas External routes can be distributed into normal areas Virtual Links In the situation when a new area is introduced that does not have a direct physical attachment to the backbone a virtual link is used A virtual link provides a logical path between the ABR of the disconnected area and the ABR of the normal area that connects to the backbone A virtual link must be established between two ABRs that have a common area with one ABR connected to the backbone Figure 34 illustrates a virtual link A NOTE Virtual links can not be configured through a stub or NSSA area Figure 34 Virtual link using Area 1 as a transit area Virtual link EW_016 Virtual links are also used to repair a discontiguous backbone area For example in Figure 35 if the connection between ABR1 and the backbone fails the connection using ABR2 provides redundancy so that the discontiguous area can continue to communicate with the backbone using the virtual link Summit 200 Series Switch Installation and User Guide 199
315. uting Load Sharing ESRP Aware Switches Software Licensing Feature Licensing Security Licensing for Features Under License Control SSH2 Encryption Software Factory Defaults Accessing the Switch Understanding the Command Syntax Syntax Helper Command Shortcuts Summit 200 Series Switch Numerical Ranges Names Symbols Line Editing Keys Command History Common Commands Configuring Management Access User Account Administrator Account Default Accounts Creating a Management Account Domain Name Service Client Services Checking Basic Connectivity Ping Traceroute 31 32 32 32 33 35 36 36 37 37 37 37 38 38 39 39 40 41 42 42 42 43 43 43 44 44 46 46 47 47 48 49 50 50 50 Summit 200 Series Switch Installation and User Guide Contents Chapter5 Managing the Switch Overview 53 Using the Console Interface 54 Using Telnet 54 Connecting to Another Host Using Telnet 54 Configuring Switch IP Parameters 54 Disconnecting a Telnet Session 56 Controlling Telnet Access 57 Using Secure Shell 2 SSH2 57 Enabling SSH2 57 Using SNMP 58 Accessing Switch Agents 58 Supported MIBs 58 Configuring SNMP Settings 58 Displaying SNMP Settings 60 Authenticating Users 60 RADIUS Client 60 Configuring TACACS 65 Using Network Login 66 Using Network Login in Campus Mode 67 Using Network Login in ISP Mode 69 DHCP Server on the Switch 70 Network Login Configuration Commands 70 Displaying Netwo
316. uto off duplex full Turning Off Autopolarity Detection for an Ethernet Port The autopolarity detection feature allows the system to detect and respond to the Ethernet cable type straight through vs crossover cable used to make the connection to the switch port When the autopolarity feature is enabled the system causes the Ethernet link to come up regardless of the cable type connected to the port When the autopolarity feature is disabled the link will come up only when a crossover cable is connected to the port The autopolarity feature is supported only on the 10BASE T and 100BASE TX switch ports and enabled by default Under certain conditions you might opt to turn autopolarity off on one or more 10BASE T and 100BASE TX ports The following example turns autopolarity off for ports 3 5 on a Summit 200 series switch config ports 3 5 auto polarity off A NOTE If you attempt to invoke this command on a Gigabit Ethernet switch port the system displays a message indicating that the specified port is not supported by this feature When autopolarity is disabled on one or more Ethernet ports you can verify that status by using the command show config This command will list the ports for which the feature has been disabled You can also verify the current autopolarity status by using the command show ports lt portlist gt info detail 78 Summit 200 Series Switch Installation and User Guide Switch Port Commands Enabli
317. verwhelming the network is maximum bandwidth In addition RED can be used to reduce session loss if the queue that floods Web traffic becomes over subscribed File Server Applications With some dependencies on the network operating system file serving typically poses the greatest demand on bandwidth although file server applications are very tolerant of latency jitter and some packet loss depending on the network operating system and the use of TCP or UDP A NOTE Full duplex links should be used when deploying policy based QoS Half duplex operation on links can make delivery of guaranteed minimum bandwidth impossible Table 36 summarizes QoS guidelines for the different types of network traffic Table 36 Traffic Type and QoS Guidelines Traffic Type Key QoS Parameters Voice Minimum bandwidth priority Video Minimum bandwidth priority buffering varies Database Minimum bandwidth Web browsing Minimum bandwidth for critical applications maximum bandwidth for non critical applications RED File server Minimum bandwidth Configuring QoS for a Port or VLAN Table 37 lists the commands used to configure QoS Table 37 QoS Configuration Commands Command Description config ports lt portlist gt qosprofile lt qosprofile gt Configures one or more ports to use a particular QoS profile config vlan lt name gt qgosprofile lt qosprofile gt Allows you to configure a VLAN to use a particular QoS profile S
318. vlan lt name gt A NOTE As long as the ring is complete the master node blocks the protected VLANs on its secondary port The following command example adds the protected VLAN orchid to the EAPS domain eaps_1 config eaps eaps_1l add protect vlan orchid Enabling and Disabling an EAPS Domain To enable a specific EAPS domain use the following command enable eaps lt name gt To disable a specific EAPS domain use the following command disable eaps lt name gt Enabling and Disabling EAPS To enable the EAPS function for the entire switch use the following command enable eaps To disable the EAPS function for the entire switch use the following command disable eaps Unconfiguring an EAPS Ring Port Unconfiguring an EAPS port sets its internal configuration state to INVALID which causes the port to appear in the Idle state with a port status of Unknown when you use the show eaps lt name gt detail command to display the status information about the port To unconfigure an EAPS primary or secondary ring port for an EAPS domain use the following command unconfig eaps lt name gt primary secondary port The following command example unconfigures this node s EAPS primary ring port on the domain eaps_1 unconfig eaps eaps_l primary port Displaying EAPS Status Information To display EAPS status information use the following command show eaps lt name gt detail If you enter the show eaps c
319. w udp profile lt profile_name gt unconfig udp profile vlan lt name gt all Adds a forwarding entry to the specified UDP forwarding profile name All broadcast packets sent to lt udp_port gt are forwarded to either the destination IP address unicast or subnet directed broadcast or to the specified VLAN as an all ones broadcast Deletes a forwarding entry from the specified udp profile name Assigns a UDP forwarding profile to the source VLAN Once the UDP profile is associated with the VLAN the switch picks up any broadcast UDP packets that matches with the user configured UDP port number and forwards those packets to the user defined destination If the UDP port is the DHCP BOOTP port number appropriate DHCP BOOTP proxy functions are invoked Creates a UDP forwarding profile You must use a unique name for the UDP forwarding profile Deletes a UDP forwarding profile Displays the profile names input rules of UDP port destination IP address or VLAN and the source VLANs to which the profile is applied Removes the UDP forwarding profile configuration for one or all VLANs 192 Summit 200 Series Switch Installation and User Guide Interior Gateway Routing Protocols This chapter describes the following topics e Overview on page 193 e Overview of RIP on page 194 e Overview of OSPF on page 196 e Route Re Distribution on page 201 e Configuring RIP on page 203 e RIP Configuration Example
320. xternl ospf extern2 These commands enable or disable the exporting of static direct and OSPF learned routes into the RIP domain You can choose which types of OSPF routes are injected or you can simply choose ospf which will inject all learned OSPF routes regardless of type The default setting is disabled OSPF Timers and Authentication Configuring OSPF timers and authentication on a per area basis is a shorthand for applying the timers and authentication to each VLAN in the area at the time of configuration If you add more VLANs to the area you must configure the timers and authentication for the new VLANs explicitly 202 Summit 200 Series Switch Installation and User Guide Configuring RIP Configuring RIP Table 61 describes the commands used to configure RIP Table 61 RIP Configuration Commands Command Description config rip add vlan lt name gt all config rip delete vlan lt name gt all config rip garbagetime lt seconds gt config rip routetimeout lt seconds gt config rip rxmode none vionly v2only any vlan lt name gt config rip txmode none vionly vicomp v2only vlan lt name gt config rip updatetime lt seconds gt config rip vlan lt name gt all cost lt number gt enable rip Configures RIP on an IP interface When an IP interface is created per interface RIP configuration is disabled by default Disables RIP on an IP interface When RIP is
321. y scrolls through the given portlist to provide statistics You can choose screens for packet count and packets per second The view real time switch per port performance use the following command show ports lt portlist gt gqosmonitor The QoS monitor rate screen packets per second does not display any results for at least five seconds Once the rate is displayed it is updated each second A NOTE The QoS monitor can display up to four ports at a time A NOTE The QoS monitor displays the statistics of incoming packets The real time display corresponds to the 802 1p values of the incoming packets Any priority changes within the switch are not reflected in the display A NOTE The QoS monitor requires one access mask until it exits See Maximum Entries on page 105 for more information Displaying QoS Profile Information The QoS monitor can also be used to verify the QoS configuration and monitor the use of the QoS policies that are in place To display QoS information on the switch use the following command show gosprofile lt qosprofile gt Displayed information includes e QoS profile name e Minimum bandwidth e Maximum bandwidth Summit 200 Series Switch Installation and User Guide 153 Quality of Service QoS e Priority e A list of all traffic groups to which the QoS profile is applied Additionally QoS information can be displayed from the traffic grouping perspective by using one or
322. you to download incremental configuration files from a primary or secondary server at specified time intervals The timed downloads are configurable in 24 hour intervals When a switch reboots the configuration is automatically downloaded immediately after booting per the configured primary and secondary servers To configure the primary and or secondary server and file name use the following command config download server primary secondary lt host_name gt lt ip_address gt lt filename gt To enable timed interval downloads use the following command download configuration every lt hour minute gt To display timed download information use the following command show switch 94 Summit 200 Series Switch Installation and User Guide Example MAC Based VLANs In relation to MAC based VLANs the downloaded file is an ASCII file that consists of CLI commands used to configure the most recent MAC to VLAN database This feature is different from the normal download configuration command in that it allows incremental configuration without the automatic rebooting of the switch The following example shows an incremental configuration file for MAC based VLAN information that updates the database and saves changes config mac vlan config mac vlan config mac vlan config mac vlan config mac vlan save add add add add add mac address mac address mac address mac address mac address 00 00 00

Download Pdf Manuals

image

Related Search

Related Contents

Philips Detachable water tank CRP175  Guide d`instruction (86 ko, PDF)      ELITE ST LINEAR FIREPLACE 20,000 BTU/h WARNING  Triarch 33216 User's Manual  

Copyright © All rights reserved.
Failed to retrieve file