Home

Using Web-based Management for the BayStack 380-24F

image

Contents

1. 64 Target Address page items 66 Target Parameter page items 68 SNMP Trap Receiver page fields 70 MAC Address Table page fields 72 Port Management pageitems 74 High Speed Flow Control page items 77 Software Download page fields 78 LED Indications during the software download process 79 Using Web based Management for the BayStack 380 24F Gigabit Switch 14 Tables Table 30 Table 31 Table 32 Table 33 Table 34 Table 35 Table 36 Table 37 Table 38 Table 39 Table 40 Table 41 Table 42 Table 43 Table 44 Table 45 Table 46 Table 47 Table 48 Table 49 Table 50 Table 51 Table 52 Table 53 Table 54 Table 55 Table 56 Table 57 Configuration File Download Upload page items 81 Parameters not saved to the configuration file 82 Console Communication Port page items 83 RMON Threshold page items 86 RMON Event Log page fields 89 System Log page fields AA EE EG Ee tee 91 RMON Ethernet page items 93 RMON History page items 97 Port page items a sho oe AE UB
2. 86 RMON Event Logpage 89 System Log page 90 RMON Ethernet page is Ee EE Ge Se ee eh 92 RMON Ethernet Chart in a bar graph format 94 RMON Ethernet Chart in a piechartformat 95 RMON History page 96 RMON History page Chart in line graph format 98 Port page voe EE BE EER E Keer EE da RU Ee pane Ee 100 Port Chart page in a pie chart format 103 Port Chart page in a bar graph format 104 Interface page xx eso sex RES ae DRE E REPERTA 105 Interface Chart in a pie chart format 107 Interface Chart in a bar graph format 108 Ethernet Errors page 109 Ethernet Error Chart in a pie chart format 111 Ethernet Error Chart in a bar graph format 112 Transparent Bridging page 113 Transparent Bridging Chart in a pie chart format 114 Transparent Bridging Chart in a bar graph format 115 Port Mirroringipage sete eem BE ER Sek og EPOD EE BEE ee ED NE N 118 Security Configuration page 120 Port Configuration page
3. Item and MIB association Range Description KI Deletes the row Security Name 1 32 Type a string of character to create a security name for the vacmSecurity ToGroupStatus principal which is mapped by this entry to a group name Security Model 1 SNMPv1 Choose the security model within which the security name to vacmSecurity ToGroupStatus 2 SNMPv2c group name mapping is valid 3 USM Group Name 1 32 Type a string of character to specify the group name vacmGroupName Entry Storage 1 Volatile Choose your storage preference Selecting Volatile requests vacmSecurityToGroupStorageType 2 Non Volatile information to be dropped lost when you turn the power off Selecting Non Volatile requests information to be saved in NVRAM when you turn the power off 2 In the Group Membership Creation section type information in the text boxes or select from a list 3 Click Submit The new entry is displayed in the Group Membership Table Figure 17 on page 56 Deleting an SNMPv3 group membership configuration To delete an SNMPv3 group membership configuration 1 From the main menu choose Configuration SNMPv3 Group Membership The Group Membership page opens Figure 17 on page 56 2 In the Group Membership Table click the Delete icon for the entry you want to delete A message opens prompting you to confirm your request Using Web based Management for the BayStack 380 24F Gigabit Switch
4. 56 Figure 18 Group Access Rights page 59 Figure 19 Management Information View page 61 Figure 20 Notification page 63 Figure 21 TargetAddresspage 65 Figure 22 Target Parameter page 68 Figure 23 SNMP Trap Receiver page 70 Figure 24 MAC Address Table page 71 Figure 25 Find MAC Address Table page 73 Figure 26 Port Management page 74 Figure 27 FlowControlpage 76 Figure 28 Software Download page 78 Figure 29 Configuration File Download Upload page 80 Using Web based Management for the BayStack 380 24F Gigabit Switch 10 Figures Figure 30 Figure 31 Figure 32 Figure 33 Figure 34 Figure 35 Figure 36 Figure 37 Figure 38 Figure 39 Figure 40 Figure 41 Figure 42 Figure 43 Figure 44 Figure 45 Figure 46 Figure 47 Figure 48 Figure 49 Figure 50 Figure 51 Figure 52 Figure 53 Figure 54 Figure 55 Figure 56 Figure 57 Figure 58 Figure 59 Figure 60 Figure 61 Figure 62 Figure 63 Figure 64 Console Communication Port page 83 RMON Threshold page
5. 69 Deleting an SNMP trap receiver configuration 70 Viewing learned MAC addresses by VLAN 71 Locating aspecificMACaddress 72 214394 A Contents 7 Configuring switch port autonegotiation speed 74 Configuring flow control 75 Downloading switchimages 77 Storing or retrieving a configuration file from a TFTP server 80 Requirements for storing or retrieving parameters on a TFTP server 81 Configuring port communication speed 83 REX TN RD de DE N ME EA AD DE AN ke DA td ha 84 Chapter 5 Configuring remote network monitoring RMON 85 Configuring RMON fault threshold parameters 85 Creating an RMON fault threshold 86 Deleting an RMON threshold configuration 88 Viewing the RMON fault event log 88 Viewing the system log 0 EE RI I n 90 Viewing RMON Ethernet statistics 92 Viewing RMON Ethernet statistics in a bar graph format 94 Viewing RMON Ethernet statistics in a pie chart format 95 Viewing RMON histo
6. 122 Port List View Port Listpage erdt na SE ke n 123 Port List View Learn by Ports page 123 Security Table page 124 Port List View Clear by Ports page 126 Port Configuration page 127 Traffic Class Policy page kii nt ORE EE ER RE WEER Saeed hs 129 Traffic Class Priority page 130 VLAN Configuration page 132 VLAN Configuration Port Information page 133 VLAN Configuration Port Configuration page 135 Port Configuration page 137 214394 A Figures 11 Figure 65 Figure 66 Figure 67 Figure 68 Figure 69 Figure 70 Figure 71 Port Information page IA EE Ee eee 139 Port Configuration page 140 Bridge Information page 142 Group Dade iste de tee Es er ER oe S lg ee ER RE ee RE Reg Pe ERR A De AWA 145 Utilization page RE E WORD EERS EE ERR ROER ORE E ER RA ERR 147 Online help menu EE Secreta m a Ee Reste a Rs 150 Nortel Networks Technical Documentation Web site 151 Using Web based Management for the BayStack 380 24F Gigabit Switch 12 Figures 214394 A 13 Tables Table 1 Table 2 Table 3 Table 4 Table 5 Table 6
7. 214394 A Chapter 2 Administering the switch 29 Configuring system security This section describes the steps you use to build and manage security using the Web based management interface Setting console Telnet and Web passwords To set console Telnet and Web passwords 1 From the main menu choose Administration gt Security and Console Telnet or Web The selected password page opens Figure 5 Note The title of the page corresponds to the menu selection you choose In Figure 5 the network administrator selected Administration gt Security gt Console Figure 5 Console password setting page Administration gt Security gt Console Lomi talib Ped triis nmn le edik ase id Tael Sead ag esum fod Baad rus iaki Puamwid Da mis ie LP askeru id hard Coma hli amimi Taal tae 7 Maud ap feck oe Wai Dirk oe Using Web based Management for the BayStack 380 24F Gigabit Switch 30 Chapter 2 Administering the switch Table 5 describes the items on the Console page Table 5 Console page fields Section Fields Setting Description Note Console Telnet and Web settings share the same switch password type and password Console Switch Password Setting Console Switch Password Setting Type Read Only Switch Password Read Write Switch Password 1 None 2 Local Password 3 RADIUS Authentication 1 15 1 15 Displays
8. Default Gateway Configuration Image Filename Configuration File Download Upload TFTP Server IP Address Console Read Only Switch Password Console Comm Port Configuration Console Read Write Switch Password 214394 A Chapter 4 Configuring the switch 83 Configuring port communication speed You can view the current console communication port settings and configure the console port baud rate to match the baud rate of the console terminal To view current console communication port settings and configure console port speed 1 From the main menu choose Configuration Console Comm Port The Console Communication Port page opens Figure 30 Figure 30 Console Communication Port page Lenfigur sen Derrinla arm alie Poel Camrmuricsuian Fart Setting Camm Fon Dac iir D Lats op Gam Fan karig i WER Gama Fu Map B cono ET Darasa Peri San ad AE Table 32 describes the items on the Console Communication Port page Table 32 Console Communication Port page items Item Range Description Comm Port Data Bits The current console communication port data bit setting Comm Port Parity The current console communication port parity setting Comm Port Stop Bits The current console communication port stop bit setting Console Port Speed 2400 Choose the console port speed baud rate 4800 9600 Note The default setting is 9600 19200 38400 Caution If you c
9. 58 Chapter 4 Configuring the switch 3 Do one of the following e Click Yes to delete the group membership configuration e Click Cancel to return to the Group Membership page without making changes Note This Group Membership Table section of the Group Membership page contains hyperlinks to the SNMPv3 User Specification and Group Access Rights pages For more information on these pages see Configuring user access to SNMPv3 on page 53 and Configuring SNMPv3 group access rights on page 58 Configuring SNMPv3 group access rights You can view a table of existing SNMPv3 group access rights configurations and you can create or delete a group s SNMPv3 system level access rights Creating an SNMPv3 group access rights configuration To create a group s SNMPv3 system level access right configuration 1 From the main menu choose Configuration SNMPv3 Group Access Rights The Group Access Rights page opens Figure 18 214394 A Chapter 4 Configuring the switch 59 Figure 18 Group Access Rights page Desaflgiureikain SNP Genup Access Table X nem tsi romani apa PLEEG bassi ud pin id LLL rea vrug ELKE rnm med perma VERRE Eara add rg Eis Ere re gerig DEE v P imde us maahi rad Ebo e OT ed rote derms iss dT es rmah Group Access Creatien 7 Hami atom Eas Write View Vapaap dont Rights k k z I zi ad dd ad LEID oreo CM mk tile ir ke Se gt Lee
10. Por Tuna Securing E od F ETE Wa JE Die ja E bho jia Daai E n Desti x E n sablei Using Web based Management for the BayStack 380 24F Gigabit Switch 128 Chapter 7 Configuring application settings Table 46 describes the items on the Port Configuration page Table 46 Port Configuration page items Item Range Description Port 1to 24 Lists each port on the unit Trunk Blank 1 to 6 Displays the MultiLink Trunk that the port belongs to Security 1 Enabled Enables MAC address based security on that port 2 Disabled Note You must configure the port for MAC address based security before enabling the security Deleting ports You can delete ports from the security system in a variety of ways e Inthe Ports List View Port List page Figure 54 click on the checkmark of a selected port to delete that port from the specified port list e Inthe Ports List View Learn by Ports page Figure 55 click on the checkmark of a selected port to remove that port from those that learn MAC addresses e Inthe Port Configuration page Figure 58 click Disabled to remove that port from the MAC address based security system it will disable all MAC address based security on that port Creating and managing virtual LANs VLANs A VLAN is a collection of switch ports that make up a single broadcast domain You can configure a VLAN for a single switch or for multiple switches
11. e Click Cancel to return to the User Specification page without making changes Using Web based Management for the BayStack 380 24F Gigabit Switch 56 Chapter 4 Configuring the switch Configuring an SNMPv3 system user group membership You can view a table of existing SNMPv3 group membership configurations and map or delete an SNMPv3 user to group configuration Mapping an SNMPv3 system user to a group To map an SNMPv3 system user to a group 1 From the main menu choose Configuration SNMPv3 Group Membership The Group Membership page opens Figure 17 Figure 17 Group Membership page amp unfiguralian SWAPY gt Group Membership Taa Hu pharti asia WETTE ET maize pnis Cae Paw Cul phigh riel ws ERGER LEER gered dy Pesi Cuy skag gee ware DE Lu mcm caca ly Pia md Cg TANTES wwe OF LEE ree aus Cl raad mis ai EERS EER mii mega Paa val mama Reede GEES NE Rad rans MY Faa Cub Eng EE el weed OUER Laai gie ds Faul Cul sg lettere Lume Em ie gt ie Pa en Car aaa Lin RENEE Se EE Pai Ca TEEL era SE LC 2E ig Peel ud ibil midi narweweslp ELE LE MEd di Faai Ca rud erm rarwwowp BSS LEES IMS Pau Cy E H El j xl Al B zi zi x W Fe Eraag Hesderiibks Lisa Barug ame da ai Hand CCCCCCCCCCOCOCOSCSC S aiiai Mader Green Harve War Traga Table 18 describes the items on the Group Membership page 214394 A Table 18 Group Membership page items Chapter 4 Configuring the switch 57
12. Note Using this page you instruct the switch to allow the specified MAC address access only through the specified port or port list Table 45 describes the items on the Security Table page Table 45 Security Table page items Section Item Range Description MAC Address Action Allows you to delete a MAC address Security Table x Address Displays the MAC address Allowed Source Port Displays the port through which the MAC address is allowed MAC Address MAC Address Enter the MAC address you want to allow to access the Security Table Entry switch Creation F Allowed Source Select the port through which the MAC address is allowed 2 Complete fields as described in the table Note If you choose an Entry as the Allowed Source you must have configured that specific entry on the Port View List Port List page 3 On the Security Table page type information in the text boxes or select from a list 4 Click Submit Note Be certain to include the MAC address for the default LAN router as an allowed source MAC address Using Web based Management for the BayStack 380 24F Gigabit Switch 126 Chapter 7 Configuring application settings Clearing ports You can clear all information from the specified port s for the list of ports that learn MAC addresses If Learn by Ports is enabled the specified ports will begin again to learn the MAC addresses To clear information fr
13. Table 7 Table 8 Table 9 Table 10 Table 11 Table 12 Table 13 Table 14 Table 15 Table 16 Table 17 Table 18 Table 19 Table 20 Table 21 Table 22 Table 23 Table 24 Table 25 Table 26 Table 27 Table 28 Table 29 Main headings andoptions 22 Menu icons sis Posts SES cutee A MERE Ee AA GR ate we UR D 23 Pade COS ER PP rx 25 System Information page items 28 Console page fields 30 RADIUS page fields iia tee 31 User levels and access levels 33 Switch Information page fields 38 GBIC Information page fields 40 IP page ems zo SERE Db ete es ad tes ER bee ee 43 System page items 45 TELNET Configuration screen fields 47 SNMPvi page items 50 System Information section fields 52 SNMPv3 Counters section fields 52 User Specification Table section items 54 User Specification Creation section items 54 Group Membership page items 57 Group Access Rights page items 59 Management Information View pagefields 62 Notification page items
14. The dialects are SNMP1v1 SNMPv2C and SNMPv3 Authentication Protocols Supported The registration point for standards track authentication protocols used in SNMP Management Frameworks The registration points are None HMAC MD5 HMAC SHA HMAC MD5 Note The BayStack 380 24F Gigabit Switch supports only the MD5 authentication protocol Private Protocols Supported The registration point for standards track privacy protocols used in SNMP Management Frameworks The registration points are None or CBC DES Note The BayStack 380 24F Gigabit Switch does not support privacy protocols Table 15 describes the fields on the SNMPv3 Counters section of the SNMPv3 System Information page Table 15 SNMPv3 Counters section fields Item Description Unavailable Contexts The total number of packets dropped by the SNMP engine because the context contained in the message was unavailable Unknown Contexts The total number of packets dropped by the SNMP engine because the context contained in the message was unknown Unsupported Security Levels The total number of packets dropped by the SNMP engine because they requested a security level that was unknown to the SNMP engine or otherwise unavailable Not in Time Windows The total number of packets dropped by the SNMP engine because they appeared outside of the authoritative SNMP engine s window Unknown User Names The total number of packets
15. You can configure groups of links between the BayStack 380 24F Gigabit Switch and another switch or a server to links provide higher bandwidth with active redundant You can configure two to four switch ports together as members of a trunk to a maximum of six trunks 214394 A Chapter 7 Configuring application settings 145 To configure MultiLink Trunk members From the main menu choose Application gt MultiLink Trunk gt Group The Group page opens Figure 68 Figure 68 Group page Application gt Mu ink Trunk Group kduldil ink Trunk rtm Setting wah p D TE Mi a a Bar wh F ET L prm Trani E ETFI os Bem mes g i T Enim T EE Bu Pies fis wi F iat fT an a CELL ica Bai Mm o sal Tri F os ml TI T Te MITTIT Mu kil hek Tonk erp tea Table 56 describes the items on the Group page Using Web based Management for the BayStack 380 24F Gigabit Switch 146 Chapter 7 Configuring application settings Table 56 Group page items Section Item Range Description MultiLink Trunk Group Setting MultiLink Trunk Group Setting Trunk 1 6 This column contains fields in each row that can be configured to create the corresponding trunk lt indicates that the trunk members in this row are associated with the specified switch number Each switch port can only be a member of a single trunk The appropriate trunk
16. customer support 17 D destination address filtering 119 E Entry field 122 Ethernet error statistics viewing 109 viewing in a bar graph format 111 viewing in a pie chart format 111 Ethernet Errors page 109 Event Logging field 47 F fault threshold parameters configuring 85 Find MAC Address page 72 G gateway addresses configuring 42 Using Web based Management for the BayStack 380 24F Gigabit Switch 154 Index Group Access Rights page 58 Group Membership page 56 Group page 145 H High Speed Flow Control page 75 high speed flow control configuring 75 icons about 25 Inactivity Timeout field 47 Interface page 105 interface statistics viewing 105 106 viewing in a bar graph format 108 viewing in a pie chart format 107 IP addresses configuring 42 IP page 42 L Learn by Ports page 123 logging on 32 logging out 35 Login Retries field 47 Login Timeout field 47 MAC Address field 125 MAC address security 119 allowed source 124 clearing 126 deleting ports 128 learn by ports 123 learning 121 MACDA 119 ports 127 security list 121 security table 124 MAC Address Security field 120 MAC Address Security SNMP Locked field 120 MAC Address Table page 71 MAC addresses locating a specific address 72 viewing learned addresses 71 MAC DA filtering 119 main menu headings and options 22 icons 23 25 Management Information View page 61 Microsoft Internet Explorer software version re
17. 149 technical publications downloading 150 user interface upgrading 151 support Nortel Networks 17 switch configuration files not saved parameters 82 retrieving from a TFTP server 80 storing ona TFTP server 80 switch configuration options autotopolgy feature 49 bootP settings 42 community string settings 49 gateway settings 42 high speed flow control 75 IP settings 42 MAC addresses finding 72 MAC addresses viewing 71 network manager contact 44 port autonegotiation speed 74 port communication speed 83 retrieving from a TFTP server 80 SNMP trap receivers 69 SNMPv3 group access rights 58 management information views 60 management target addresses 65 management target parameters 67 system information viewing 51 system notification entries 63 user access 53 user group membership 56 storing on a TFTP server 80 switch images downloading 77 system location 44 system name 44 trap mode settings 49 switch images downloading 77 switch information viewing 39 Switch Information page 39 switch port autonegotiation speed configuring 74 system default settings resetting to 34 System Information page 32 51 214394 A system location naming 44 system log viewing 90 system name configuring 44 System page 44 system settings modifying 44 system contact 45 system location 45 system name 45 system statistics options viewing Ethernet error statistics 109 interface statistics 105 port statis
18. 67 Bridge Information page Application gt Spanning Tree gt Bridge infsemation Spanning Tess Bridge inferno km OE mere ELBE EE Se ne Pet Tum J UE A seram ILE enr tees IN tarra di a id Table 55 describes the items on the Bridge Information page 214394 A Table 55 Bridge Information page items Chapter 7 Configuring application settings 143 Item Range Description Bridge Priority 0 65535 Type the priority value of the bridge ID in hexadecimal notation which is the most significant byte of the bridge ID The STA uses this parameter to determine the root bridge or designated bridge For example the bridge with the lowest bridge ID becomes the root bridge with Bridge Priority values compared first followed by the hardware addresses The default setting is 8000 Designated Root XXXXXXXXXXXXXX The bridge ID of the root bridge as determined by the STA Root Port 1 24 The port number of the port which offers the lowest cost past from this bridge to the root bridge Root Path Cost Integer The cost of the path to the root as seen from this bridge Hello Time 1 10 seconds The actual Hello Interval the amount of time between transmissions of configuration Bridge Protocol Data Units BPDUS that the root bridge is currently using Note Bridges participating in the spanning tree network use the root bridge s Hello Interval parameter value See
19. Clear by Ports Action Allows you to clear specific ports from participation in the x MAC address security features Port List Will be blank Current Learning Will be blank Mode 214394 A Chapter 7 Configuring application settings 121 Table 43 Security Configuration page items continued Section Item Range Description MAC Security Table Action Allows you to identify ports that will learn incoming MAC Learn by Ports x addresses All source MAC addresses of any packets received on a specified port s are added to the MAC Security Table maximum of 448 MAC addresses allowed Port List Displays all the ports that will learn incoming MAC address to detect intrusions unallowed MAC addresses Current Learning 1 Enabled Enables learning Mode 2 Disabled 2 On the Security Configuration page type information in the text boxes or select from a list 3 Click Submit Configuring ports In this section you create a list of ports and you can add ports to or delete ports from each list To activate an entry or add or delete ports to a list 1 From the main menu choose Application gt MAC Address Security gt Port Lists The Port Lists page opens Figure 53 Using Web based Management for the BayStack 380 24F Gigabit Switch 122 Chapter 7 Configuring application settings Figure 53 Port Configuration page Application gt MAC Address Se
20. Non Volatile Clear Messages 1 Volatile Choose to clear messages from Volatile memory or From 2 Volatile Non Volatile Volatile and Non Volatile memory 3 None A The default settings is None do not clear messages Index The number of the event Time Stamp The time in hundreths of a second between system initialization and the time the log messages entered the System Message Type The type of message The options are 1 Critical 2 Serious and 3 Informational Message A character string that identifies the origin of the message and the reason why the message was generated 2 In the System Log View By section do one or more of the following e Choose the number of the switch from which to display messages e Choose where to display messages from e Choose to clear messages from Volatile or Non Volatile memory 3 Click Submit The results of your request are displayed in the System Log section Figure 33 on page 90 Using Web based Management for the BayStack 380 24F Gigabit Switch 92 Chapter 5 Configuring remote network monitoring RMON Viewing RMON Ethernet statistics You can gather and graph RMON Ethernet statistics in a variety of formats To gather and graph RMON Ethernet statistics 1 From the main menu choose Statistics RMON Ethernet The RMON Ethernet page opens Figure 34 Figure 34 RMON Ethernet page BIS GT ir DE EL AE Ed mita T iride La IH
21. Switch 106 Chapter 6 Viewing system statistics Table 39 Interface page items Item Description Displays statistics in a bar graph format e Displays statistics in a pie chart format Port The port number corresponding to the selected switch In Octets The number of octets received on the interface including framing characters Out Octets The number of octets transmitted out of the interface including framing characters In Unicast The number of subnetwork unicast packets delivered to a higher layer protocol Out Unicast The number of packets that higher layer protocols requested be transmitted to a subnetwork unicast address including those that were discarded or not sent In Non Unicast The number of non unicast packets for example subnetwork broadcast or subnetwork multicast packets delivered to a higher protocol Out Non Unicast The number of packets that higher level protocols requested be transmitted to a non unicast address For example a subnetwork broadcast or a subnetwork multicast address including those that were discarded or not sent In Discards The number of inbound packets which were selected to be discarded even though no errors were detected to prevent their being delivered to a higher layer protocol Packet discarding is not arbitrary One reason for discarding packets is to free buffer space Out Discards The number of outbound packets which were s
22. Table 3 Page icons Icon Name Description Modify Accesses a modification page for the selected row Delete Deletes a row Pie Chart Displays statistics information in a pie chart format x s Bar Graph Displays statistics information in a bar graph format Line Graph Displays statistics information in a line graph format Help Accesses the Help menu in a new Web browser ax Note Text within a table that is highlighted blue and underlined is a hyperlink to a related management page Using Web based Management for the BayStack 380 24F Gigabit Switch 26 Chapter 1 Using the Web based management interface 214394 A 27 Chapter 2 Administering the switch The administrative options available to you are e Viewing system information next e Configuring system security on page 29 e Accessing the management interface on page 32 e Resetting the BayStack 380 24F Gigabit Switch on page 34 e Changing the BayStack 380 24F Gigabit Switch to system defaults on page 34 Logging out of the management interface on page 35 Viewing system information You can view an image of the BayStack 380 24F Gigabit switch configuration information about the host device and if provided the contact person or manager for the switch The System Information page is also the Web based management interface home page To view system information gt From the
23. When you create a VLAN you can control traffic flow and ease the administration of moves adds and changes on the network by eliminating the need to change physical cabling Using the Web based management interface you can configure port based VLANs 214394 A Chapter 7 Configuring application settings 129 Creating VLAN Traffic Class Policy To create a Traffic Class Policy 1 From the main menu choose Application gt VLAN gt Configuration gt Traffic Class Policy The Configuration gt Traffic Class Policy page opens Figure 62 2 Inthe Traffic Class Policy page choose a Policy type 3 In the Queue Weight setting table select values for the queue weight 4 Click on the Submit button Figure 59 Traffic Class Policy page Configuration gt Traffic Class Policy p sleg Type Siutting Peer Type Ee PEER unue Wright sahing Low GO Walgiri Mod 0 Welt biiga G Waigiri fe sj BE Hight D Weiss 1 5 Camara Table 47 describes the items on the Traffic Class Policy page Table 47 Traffic Class Policy items Item Value Description Policy Type Policy Type Specifies the policy type Setting Queue Weight Low Q Weight Specifies the lowest queue weight Setting Medium Q Specifies the medium queue weight Weight Using Web based Management for the BayStack 380 24F Gigabit Switch 130 Chapter 7 Configuring application settings Table 47 Traffic Class Policy item
24. also Bridge Hello Time Maximum Age Time 6 40 seconds The Maximum Age Time parameter value that the root bridge is currently using This value specifies the maximum age that a Hello message can attain before it is discarded Note The root bridge s Maximum Age Time parameter value becomes the actual Maximum Age Time parameter value for all bridges participating in the spanning tree network See also Bridge Maximum Age Time Forward Delay 4 30 seconds The Forward Delay parameter value that the root bridge is currently using This value specifies the amount of time that the bridge ports remain in the Listening and Learning states before entering the Forwarding state Note The root bridge s Forward Delay parameter value becomes the actual Forward Delay parameter value for all bridges participating in the spanning tree network See also Bridge Forward Delay Bridge Hello Time 1 10 seconds The Hello Interval the amount of time between transmissions of BPDUS specified by management for this bridge This parameter takes effect only when this bridge becomes the root bridge Note Although you can set the Hello Interval for a bridge using bridge management software once the spanning tree computation process is complete all bridges participating in the spanning tree network use the root bridge s Hello Interval parameter value If any bridge becomes the root bridge its Hello Interval parameter value beco
25. bar graph format You can view interface statistics in a bar graph format To view interface statistics in a bar graph format 1 From the main menu choose Statistics gt Interface The Interface page opens Figure 42 on page 105 2 Inthe port row of your choice click the bar graph icon The Interface Chart page opens in a bar graph format Figure 43 Figure 44 Interface Chart in a bar graph format Statistics gt interface hari a Bow a Eua Bos Daa Ber Bos Be Bou a 3 To update the statistical information click Update or click Back to return to the Interface page 214394 A Chapter 6 Viewing system statistics 109 Viewing Ethernet error statistics You can view Ethernet error statistics for each monitored interface linked to the Baystack 380 Switch To view Ethernet error statistics 1 From the main menu choose Statistics Ethernet Errors The Ethernet Errors page opens Figure 45 Figure 45 Ethernet Errors page H JRTEL FAT PAND EG ue Lue Le Le Le Lue Le Le Le Le Le ue Table 40 describes the items on the Ethernet Errors page Using Web based Management for the BayStack 380 24F Gigabit Switch 110 Chapter 6 Viewing system statistics Table 40 Ethernet Errors page items Item Description Displays statistics in a bar graph format e Displays statistics in a pie chart format Port The port number corresponding to the selected switch
26. configuration options available to you are e Configuring BootP IP and gateway settings next e Modifying system settings on page 44 About SNMP on page 49 e Configuring SNMPvI on page 49 e Configuring SNMPv3 on page 51 e Viewing learned MAC addresses by VLAN on page 71 e Viewing learned MAC addresses by VLAN on page 71 e Configuring switch port autonegotiation speed on page 74 e Configuring flow control on page 75 Downloading switch images on page 77 e Storing or retrieving a configuration file from a TFTP server on page 80 e Configuring port communication speed on page 83 Note In order to use all the BayStack 380 24F Gigabit Switch management features you must connect your management station into a BayStack 380 24F Gigabit Switch port Using Web based Management for the BayStack 380 24F Gigabit Switch 42 Chapter 4 Configuring the switch Configuring BootP IP and gateway settings You can configure the BootP mode settings create and modify the in band switch IP addresses and in band subnet mask parameters and configure the IP address of your default gateway Note Settings take effect immediately when you click Submit gt To configure BootP IP and gateway settings 1 From the main menu choose Configuration gt IP The IP page opens Figure 11 Figure 11 Configuration IP page Configuration gt IF Booi Made Samiii Boot Request Mode Eo
27. create a list of up to 10 MAC DAs you want to filter The packet with the specified MAC DA will be dropped regardless of the ingress port source address SA intrusion or VLAN membership Note Ensure that you do not enter the MAC address of the switch or stack you are working on Configuring MAC address based security To configure MAC address based security using the Web based management system 1 From the main menu choose Application gt MAC Address Security gt Security Configuration The Security Configuration page opens Figure 52 Using Web based Management for the BayStack 380 24F Gigabit Switch 120 Chapter 7 Configuring application settings Figure 52 Security Configuration page Table 43 Security Configuration page items Application gt MAC Address Security gt Security Configuration BAAT Aldine Security Seting MAC Addas Security MAC Addrass Security SMMP Locked Dizsintad MAT Security Tabla Pe ee ET Learning Mode Dinar hy Ports mi Leam by Pors NONE Disabled Die abad Table 43 describes the items on the Security Configuration page SNMP Locked Section Item Range Description MAC Address MAC Address 1 Enabled Enables the MAC address security features Security Setting Security 2 Disabled MAC Address 1 Enabled Enables locking SNMP so that you cannot use SNMP to Security 2 Disabled modify the MAC address security features MAC Security Table
28. described in Table 29 apply to a 24 port switch model Table 29 LED Indications during the software download process Phase Description LED Indications 1 The switch downloads the new 1000 Mb s port status LEDs The LEDs begin to turn on in software image succession beginning with port 1 on one side and port 24 on the other side 2 The switch erases the flash memory 1000 Mb s port status LEDs The LEDs begin to turn on in succession beginning with port 1 on one side and port 24 on the other side 3 The switch programs the new 1000 Mb s port status LEDs The LEDs begin to turn on in software image into the flash succession beginning with port 1 on one side and port 24 on the memory other side 4 The switch resets automatically After the reset completes the new software image initiates the Switch self test which comprises various diagnostic routines and subtests All of the LEDs will display solid green The LEDs display various patterns to indicate that the subtests are in progress Using Web based Management for the BayStack 380 24F Gigabit Switch 80 Chapter 4 Configuring the switch Storing or retrieving a configuration file from a TFTP server You can store switch configuration parameters on a TFTP server You can retrieve the configuration parameters of a switch and use the retrieved parameters to automatically configure a replacement switch To store a switch configuration you must set
29. discarded because of CRC errors and improper framing Using Web based Management for the BayStack 380 24F Gigabit Switch 102 Chapter 6 Viewing system statistics Table 38 Port page items continued Section Item Description Port Statistics Table Collisions The number of collisions detected on this port cont Single Collisions The number of packets that were transmitted successfully on this port after a single collision Multiple Collisions The number of packets that were transmitted successfully on this port after more than one collision Excessive Collisions The number of packets lost on this port due to excessive collisions Late Collisions The number of packets collisions that occurred after a total length of time that exceeded 512 bit times of packet transmission 2 Click Submit The Port Statistics Table is updated with information about the selected device and port Figure 42 on page 105 3 To update the statistical information click Update Zeroing ports To clear the statistical information for the currently displayed port gt Click Zero Port To clear the statistical information for all ports in a switch configuration gt Click Zero All Ports 214394 A Chapter 6 Viewing system statistics 103 Viewing port statistics in a pie chart format You can view port statistics in a pie chart format To view the displayed statistical information in a pie chart format
30. eda dana ERU Ie ed RUM IRE RUE e 119 Configuring MAC address based security 119 Configuring ports AA EE ES Ee Ee rs 121 Adding MAC addresses HA 000 cece ER Se res 124 Clearing POSi n AE ee EE DE ID 126 Enabling security on ports KIA AAA aa e eh 127 Deleting ports ui EE ER EE ER EE EE Re ee RR Inh 128 Creating and managing virtual LANS VLANS 128 Creating VLAN Traffic Class Policy 129 Traffic Class Priority ie EE EE Ge e i ee mh 130 Port based VLANS 03 cesses e ees ma GER E RE Ay GER RE ER n 131 Gontiguiing MEANS er cua EER oe DEE ete Beth ace ETC ER Ee ee pis 132 Creating a port based VLAN 133 Modifying a port based VLAN 134 Selecting a management VLAN 136 Deleting a VLAN configuration 136 Configuring broadcast domains 137 Viewing VLAN port information 138 Managing Spanning Tree Protocol STP 140 Changing Spanning Tree bridge switch settings 142 Configuring MultiLink Trunk MLT members 144 Monitoring MLT traffic leise IIIA 147 Chapter 8 Support menu iii eu RE Sins RE ER EE KERRIE RES SERE ieee EER EE 149 Us
31. information view configuration To create an SNMPv3 management information view configuration 1 From the main menu choose Configuration gt SNMPv3 gt Management Info View The Management Information View page opens Figure 19 Figure 19 Management Information View page Vamiparantes SASS C NLasapesiens amma les klaar dare rd Information Table EE a DIT el 137 orar beet Peed Coty ee Eers d d aem kabsa Vian dy Wanaerrzsarst infarmatsze Crealinn Yere E Wian Haran TT we Mes Whee Type mi try Haaaga E pue Table 20 describes the fields on the Management Information View page Using Web based Management for the BayStack 380 24F Gigabit Switch 62 Chapter 4 Configuring the switch Table 20 Management Information View page fields Fields and MIB association Range Description KI Deletes the row View Name 1 32 Type a character string to create a name for a family of view vacmViewTreeFamilyViewName subtrees View Subtree X X X X X Type an object identifier OID to specify the MIB subtree vacmViewTreeFamilySubtree which when combined with the corresponding instance of vacmViewTreeFamilyMask defines a family of view subtrees Note If no OID is entered and the field is blank a default mask value consisting of 1s is recognized View Mask vacmViewTreeFamilyMask Octet String 0 16 Type the bit mask which in combination with the corresponding i
32. main menu choose Administration gt System Information The System Information page opens Figure 4 Note You may create or modify existing system information parameters using the System page For more information on configuring system information see Modifying system settings on page 44 Using Web based Management for the BayStack 380 24F Gigabit Switch 28 Chapter 2 Administering the switch Figure 4 System Information page Arrasa HW e Barman UCon gurwdun A Lm A yria gt Applirabpn Y akte slak d Era hars noir banin Lego ya Reel Bread To Doris gt Hippi Administration gt System Information BayStack 380 24F BayStack n IF HAKE sysDesciiplium 12 5 20 sad nds meme EER aa ys ocaiion yee Table 4 describes the items on the System Information page Table 4 System Information page items Item Description sysDescription The default description of the BayStack 380 24F Gigabit Switch sysUpTime The elapsed time since the last network management portion of the system was last re initialized sysName The name created by the network administrator to identify the switch for example Finance Group sysLocation The location name created by the network administrator to identify the switch location for example first floor sysContact The name email address and telephone number of the person to contact about switch operation
33. notification configurations and you can configure specific SNMPv3 system notification types with particular message recipients and delete SNMPv3 notification configurations Creating an SNMPv3 system notification configuration To create an SNMPv3 system notification configuration 1 From the main menu choose Configuration SNMPv3 Notification The Notification page opens Figure 20 Figure 20 Notification page Configaiation gt ZAMBI Netifizalian Kaa T ani utin kasaat Aase kuih dag Harty Typa li rwy irai aga N Ni LAE Kaa Aaaa Lied Haf Haas Hans lag Hang Dee Tos Eniny Daraga ur j Using Web based Management for the BayStack 380 24F Gigabit Switch 64 Chapter 4 Configuring the switch Table 21 describes the items on the Notification page Table 21 Notification page items Item and MIB association Range Description XI Deletes the row Notify Name 1 32 Type a character string to identify the entry snmpNotifyRowStatus Notify Tag 1 32 Type a value which to use to select entries in the snmpTargetAddrTable snmpNotifyTag Any entry in the snmpTargetAddrTable which contains a tag value which is equal to the value of an instance of this object is selected If this object carries a zero length no entries are selected Notify Type 1 Trap Choose the type of notification to generate snmpNotifyType 2 Inform Entry Storage 1 Volatile Choose your storage pr
34. page items Item Range Description Monitoring Mode 1 Disabled The default setting is Disabled 2 gt Port X 3 Port X gt Monitor Port 1 12 Choose the switch port to designate as the monitor port 13 24 Port X 1 24 Choose the switch port to be monitored by the designated 13 24 monitor port This port is monitored according to the value X in the Monitoring Mode field 214394 A Chapter 7 Configuring application settings 119 2 Type information in the text boxes or select from a list 3 Click Submit Mac address security The MAC address based security feature of the Web based management system allows you to specify a range of system responses to unauthorized network access to your switch The response can range from sending a trap to disabling the port The network access control is based on the MAC source addresses SAs of the authorized stations You can specify a list of up to 448 MAC source addresses that are authorized to access the switch You can also specify the ports that each MAC source address is allowed to access The options for port access include NONE ALL and single or multiple ports that are specified in a list for example 1 4 You must also include the MAC source address of any router or switch connected to any secure ports You can configure the BayStack 380 24F Gigabit Switch to drop all packets having a specified MAC destination address DA You can also
35. self test that comprises various diagnostic routines and subtests The LEDs display various patterns to indicate that the subtests are in progress To change the BayStack 380 24F Gigabit Switch to system defaults 1 From the main menu choose Administration gt Reset to Default The system prompts you select Ok to reset the switch to the system defaults or cancel 2 Click Ok to reset to system defaults 214394 A Chapter 2 Administering the switch 35 Logging out of the management interface To log out of the Web based management user interface 1 From the main menu choose Administration gt Logout A message opens prompting you to confirm your reguest 2 Doone of the following e Click OK to log out e Click Cancel to return to the Web based management interface home page Using Web based Management for the BayStack 380 24F Gigabit Switch 36 Chapter 2 Administering the switch 214394 A 37 Chapter 3 Viewing summary information The summary information options are e Viewing information next Viewing GBIC information on page 39 Viewing information You can view a summary of your switch framework for example the current version of the running software and the IP address of the Web based management interface Note The Web based management user interface automatically detects the operational mode of your system To view switch information 1 From the main menu choos
36. subject to restrictions as set forth in subparagraph c 1 Gi of the Rights in Technical Data and Computer Software clause at DFARS 252 227 7013 Notwithstanding any other license agreement that may pertain to or accompany the delivery of this computer software the rights of the United States Government regarding its use reproduction and disclosure are as set forth in the Commercial Computer Software Restricted Rights clause at FAR 52 227 19 Statement of conditions In the interest of improving internal design operational function and or reliability Nortel Networks Inc reserves the right to make changes to the products described in this document without notice Nortel Networks Inc does not assume any liability that may occur due to the use or application of the product s or circuit layout s described herein Portions of the code in this software product may be Copyright O 1988 Regents of the University of California All rights reserved Redistribution and use in source and binary forms of such portions are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation advertising materials and other materials related to such distribution and use acknowledge that such portions of the software were developed by the University of California Berkeley The name of the University may not be used to endorse or promote products derived from such portions of the software wit
37. the Event Log screen TELNET connect Indicates the IP address and access mode of a Telnet session TELNET disconnect Indicates the IP address of the remote host and the access mode due to either a logout or inactivity Failed TELNET connection attempts Indicates the IP address of the remote host whose IP address is not on the list of allowed addresses or indicates the IP address of the remote host that did not supply the correct password None Indicates that no Telnet events will be logged in the Event Log Screen Accesses Logs only Telnet connect and disconnect events in the Event Log screen Failures Logs only failed Telnet connection attempts in the Event Log screen Using Web based Management for the BayStack 380 24F Gigabit Switch 48 Chapter 4 Configuring the switch Table 12 TELNET Configuration screen fields continued Field Description Allowed Source IP Address Specifies up to 10 user assigned host IP addresses that are allowed Telnet access to the Cl Default Value 0 0 0 0 no IP address assigned Range Four octet dotted decimal notation where each octet is represented as a decimal value separated by a decimal point Allowed Source Mask Specifies up to 10 user assigned allowed source address masks The remote IP address is masked with the Allowed Source Mask and if the resulting value equals the Allowed Source IP address the connection is allowed For examp
38. the switch password types Note The default is None Type the read only password setting for the read only access user Type the read write password setting for the read write access user Console Password Setting Console Password Setting Type Read Only Password Read Write Password 1 None 2 Local Password 3 RADIUS Authentication 1 15 1 15 Displays the switch password types Note The default is None Type the read only password setting for the read only access user Type the read write password setting for the read write access user 2 Type the information or make a selection from the list 3 Click Submit Configuring remote dial in access security To configure remote dial in access security parameters 1 From the main menu choose Administration gt Security gt RADIUS The RADIUS page opens Figure 6 214394 A Chapter 2 Administering the switch 31 Figure 6 RADIUS page Adimimistrutinm 5ecurity Radius Puma RADIUS Sear Doo o Secondary RADIIS Saai pooo UDP RADRIS Puri ese S RADIUS Sard Semi AAA Table 6 describes the items on the RADIUS page Table 6 RADIUS page fields Field Setting Description Primary RADIUS Server XXX XXX XXX XXX Type a Primary RADIUS server IP address in the appropriate format Secondary RADIUS Server XXX XXX XXX XXX Type a Secondary RADIUS server IP address in the appropriate format UDP R
39. unflgurallan gt MAC Address Table Har adders labi ETE IE W RAES E LZ Lae Pad Fl DU ume 2 Pad T DA A DE Bel Tm od Pa TER er Een Using Web based Management for the BayStack 380 24F Gigabit Switch 72 Chapter 4 Configuring the switch Table 25 describes the fields on the MAC Address Table page Table 25 MAC Address Table page fields Section Field Range Description MAC Address Aging Time 10 1000000 Type the timeout period in seconds for aging out Setting dynamically learned forwarding information If the entry is inactive for a period of time that exceeds the specified aging time the address is removed Note Nortel Networks recommends that you use the default value of 300 seconds Select VLAN 1 64 Choose the VLAN on which to view learned MAC addresses MAC Address MAC Address The unicast MAC address for which the bridge has Table forwarding and or filtering information Source The source of the discovered MAC address 2 Inthe MAC Address Setting section choose the aging time and VLAN you want to view learned MAC addresses on 3 Click Submit Your request is displayed in the MAC Address Table Figure 24 on page 71 Locating a specific MAC address You can search for a specific MAC address among all the MAC addresses learned from all the VLANS This is a useful tool for finding whether or not a switch has learned a particular address To locate a specific MAC addresses 1 From the
40. up the file on your TETP server and set the filename read write permission to enabled To download the BayStack 380 24F Gigabit Switch configuration file a properly configured Trivial File Transfer Protocol TFTP server must be present in your network and the BayStack 380 24F switch must have an IP address To learn how to configure the switch IP address refer to Configuring BootP IP and gateway settings on page 42 To store or retrieve a switch configuration file 1 From the main menu choose Configuration Configuration File The Configuration File Download Upload page opens Figure 29 Figure 29 Configuration File Download Upload page Zanfiguratian gt Canfigurattan File Oowmiaad Upload TBefteaie Derieri ia ind ng Lof EEN image FdBrare EES TTTT darre IF Agere fran de desi Capp EF stan konga a Earear a Beets Curfigerztion image irem Berear 214394 A Chapter 4 Configuring the switch 81 Table 30 describes the items on the Configuration File Download Upload page Table 30 Configuration File Download Upload page items Item Range Description Configuration Image 1 32 Type the configuration file name Filename TFTP Server IP Address XXX XXX XXX XXX Type the IP address of the TFTP load host Copy Configuration Image 1 Yes Choose whether or not to copy the configuration image to the to Server 2 No server Retrieve Configuration 1 Yes Choo
41. 1 Inthe Port Statistics Table click the pie chart icon The Port Chart page opens in a pie chart format Figure 40 Figure 40 Port Chart page in a pie chart format Mi a E Hi a Ds a Br Ms Bi 2 Click Back to return to the Port page Using Web based Management for the BayStack 380 24F Gigabit Switch 104 Chapter 6 Viewing system statistics Viewing port statistics in a bar graph format You can view port statistics in a bar graph format To view the displayed statistical information in a bar graph format 1 In the Port Statistics Table click the bar graph icon The Port Chart page opens in a bar graph format Figure 41 Figure 41 Port Chart page in a bar graph format Slatiiica Pari Chart rz a a Ds 1 E m Ei Ha m a B Me m Ba L m ln a 2 Click Back to return to the Port page 214394 A Chapter 6 Viewing system statistics 105 Viewing interface statistics You can view selected switch interface statistics To view an interface s statistical information 1 From the main menu choose Statistics Interface The Interface page opens Figure 42 ADARA ABAR liidi L D E a a a a i aimi i G arua Mr TAT UE N Le Le Le Le Le ue Lue Le Le Le IBILEZHERCN Wi ELE EET 1S Gede VN med lm es s rer i Le i aa MITE aa Table 39 describes the items on the Interface page Using Web based Management for the BayStack 380 24F Gigabit
42. 17 Chapter 7 Configuring application settings The options available to configure application settings are e Configuring port mirroring next e Mac address security on page 119 e Creating and managing virtual LANs VLANs on page 128 e Configuring VLANs on page 132 e Configuring broadcast domains on page 137 Viewing VLAN port information on page 138 e Managing Spanning Tree Protocol STP on page 140 e Changing Spanning Tree bridge switch settings on page 142 e Configuring MultiLink Trunk MLT members on page 144 e Monitoring MLT traffic on page 147 Configuring port mirroring The BayStack 380 24F Switch supports port mirroring to analyze traffic You can view existing port mirroring activity and you can configure a specific switch port to mirror up to two specified ports When you configure port mirroring you specify port based monitoring Using Web based Management for the BayStack 380 24F Gigabit Switch 118 Chapter 7 Configuring application settings To configure port mirroring 1 From the main menu choose Application gt Port Mirroring The Port Mirroring page opens Figure 51 Figure 51 Port Mirroring page Application gt Font Mirrering Part Miereemg Sating Mardincing Binda 1 285 Manie Part Fan X EH Part Maerermg Acie Bhariin ry Mense ITEM Table 42 describes the items on the Port Mirroring page Table 42 Port Mirroring
43. 55 bytes b amp bo Rob Rob R c oowunDuuu umu 1024 far bytes l Max Hz bytes Ceatol Packets Coat Packets FCS Errars U Cellzipra Iedersired Packets D Single Collisions O Uwersized Packets D Mahiple Callisiaas O Filtered Packat 0 Eise Dollin O Flooded Packets O Lata Celia Table 38 describes the items on the Port page Table 38 Port page items Section Item Description Port Statistics Port Choose the switch s port number to monitor View By Displays statistics in a bar graph format La e Displays statistics in a pie chart format 214394 A Table 38 Port page items continued Chapter 6 Viewing system statistics 101 Section Item Description Port Statistics Table Packets The number of packets received transmitted on this port including bad packets broadcast packets and multicast packets Multicast The number of good multicast packets received transmitted on this port excluding broadcast packets Broadcasts The number of good broadcast packets received transmitted on this port Total Octets The number of octets of data received transmitted on this port including data in bad packets and FCS octets and framing bits Packets 64 bytes The number of packets this size received transmitted successfully on this port Packets 65 127 bytes The number of packets this size received transmitted successfully on this port Packets 128 255 b
44. ADIUS Port Integer Type the UDP RADIUS port number RADIUS Shared Secret 1 16 Type a unique character string to create a Secret password 2 Type the information 3 Click Submit Using Web based Management for the BayStack 380 24F Gigabit Switch 32 Chapter 2 Administering the switch Accessing the management interface Once switch passwords and RADIUS authentication settings are integrated into the Web based management user interface anyone who attempts to use the application is presented with a log on page Figure 7 Figure 7 Web based management interface log on page To log on to the Web based management interface 1 Inthe Username text box type RO upper case for read only access or RW upper case for read write access In the Password text box type your password Click Log On The System Information page opens Figure 8 214394 A Chapter 2 Administering the switch 33 Figure 8 System Information page HERTEL Administration gt System Information HETWORKS Artos RW BayStack 380 24F T zm BayStack 0 SIF Maroc Baa rar Fy wysies prion bade iene 1013 pn guragan waa EER Tyd am wyl nat un With Web access enabled the switch can support up to four concurrent Web page users Two pre defined user levels are available and each user level has a corresponding username and password Table 7 shows an example of the two pre defined user levels available and their access level wi
45. Alignment Errors The number of frames received on a particular interface that are not an integral number of octets in length and do not pass the FCS check FCS Errors The number of frames received on a particular interface that are an integral number of octets in length but do not pass the FCS check Internal MAC Transmit Errors The number of frames for which transmission on a particular interface fails due to an internal MAC sublayer transmit error A frame only is counted by an instance of this object if it is not counted by the corresponding instance of either the dot3StatsLateCollisions object the dot3StatsExcessiveCollisions object or the dot3StatsCarrierSenseErrors object Internal MAC Receive Errors The number of frames for which reception on a particular interface fails due to an internal MAC sublayer transmit error A frame only is counted by an instance of this object if it is not counted by the corresponding instance of either the dot3StatsLateCollisions object the dot3StatsExcessiveCollisions object or the dot3StatsCarrierSenseErrors object Carrier Sense Errors The number of times that the carrier sense conditions was lost or never asserted when attempting to transmit a frame on a particular interface Frame Too Long The number of frames received on a particular interface that exceed the maximum permitted frame size SQE Test Errors The number of times that the SQE TEST ERROR message is gen
46. Asema RW Tale Access Eend E 3e himan Legin Timana minia V Crr gpursnn im Legin Patria a mikn EE MAA Targ AA BMMPS ben Lagging aa E B UPI eT z BHWP Trap Sobre a WAC Aiens Tan ie db Find MAD ajieun a lFanMatagerari Allowed Sime IP ani Sehpa Hak a Faw Gol je lowed Sperre IP Almen Seance Mars a gatene Corwin 1 omma d Cpnguwxm File 1 naas LE bes 2 Conk brem Pot 214394 A Chapter 4 Configuring the switch 47 Table 12 TELNET Configuration screen fields Field Description TELNET Access Allows a user remote access to the CI through a Telnet session Default Value Enabled Range Enabled Disabled Login Timeout Specifies the amount of time a user has to enter the correct password at the console ter minal prompt Default Value 1 minute Range 0 to 10 minutes 0 indicates no timeout Login Retries Specifies the number of times a user can enter an incorrect password at the console ter minal prompt before terminating the session Inactivity Time out Default Value 3 Range 1 to 100 Specifies the amount of time the session can be inactive before it is terminated Default Value 15 minutes Range 0 to 60 minutes 0 indicates no timeout Event Logging Specifies the types of events that will be displayed in the Event Log screen Default Value All Range All None Accesses Failures Description All Logs the following Telnet events to
47. E PIETER per s BEAN bd Table 36 describes the items on the RMON Ethernet page 214394 A Chapter 5 Configuring remote network monitoring RMON 93 Table 36 RMON Ethernet page items Item Description Displays statistics as a bar graph e Displays statistics as a pie chart Port The port number that corresponds to the selected switch Drop Events The number of events in which packets were dropped by the interface due to a lack of resources Octets The number of octets of data including those in bad packets received on the network excluding framing bits but including Frame Check Sequence FCS octets Packets The number of good packets received that were directed to the broadcast address This does not include multicast packets Broadcast The number of good packets received that were directed to the broadcast address This does not include multicast packets Multicast The number of good packets received that were directed to the multicast address This does not include packets sent to the broadcast address CRC Align Errors The number of packets received that had a length excluding and 1518 octets inclusive but had either a bad Frame FCS with an integral number of octets FCS errors with a non integral number of octets alignment error 65 127 bytes 128 255 bytes 256 511 bytes 512 1023 bytes 1024 1518 bytes Undersize The number of packets
48. ESS FOR A PARTICULAR PURPOSE Licensee is responsible for the security of its own data and information and for maintaining adeguate procedures apart from the Software to reconstruct lost or altered files data or programs 4 Limitation of liability IN NO EVENT WILL NORTEL NETWORKS OR ITS LICENSORS BE LIABLE FOR ANY COST OF SUBSTITUTE PROCUREMENT SPECIAL INDIRECT INCIDENTAL OR CONSEOUENTIAL DAMAGES OR ANY DAMAGES RESULTING FROM INACCURATE OR LOST DATA OR LOSS OF USE OR PROFITS ARISING OUT OF OR IN CONNECTION WITH THE PERFORMANCE OF THE SOFTWARE EVEN IF NORTEL NETWORKS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES IN NO EVENT SHALL THE LIABILITY OF NORTEL NETWORKS RELATING TO THE SOFTWARE OR THIS AGREEMENT EXCEED THE PRICE PAID TO NORTEL NETWORKS FOR THE SOFTWARE LICENSE 5 Government licensees This provision applies to all Software and documentation acquired directly or indirectly by or on behalf of the United States Government The Software and documentation are commercial products licensed on the open market at market prices and were developed entirely at private expense and without the use of any U S Government funds The license to the U S Government is granted only with restricted rights and use duplication or disclosure by the U S Government is subject to the restrictions set forth in subparagraph c 1 of the Commercial Computer Software Restricted Rights clause of FAR 52 227 19 and the limitations set out in this license
49. INI BR ER RE WEE RR EE RE Eg 100 Interface page items IAA eee 106 Ethernet Errors page items 110 Transparent Bridging page items 113 Port Mirroring page items 118 Security Configuration page items 120 Ports Lists page items 122 Security Table pageitems 125 Port Configuration page items 128 Traffic Class Policy items 129 Traffic Class Priority tems 131 VLAN Configuration page items 133 VLAN Configuration Port Information page items 134 Port Configuration page items 135 Port Configuration page items 138 Port Information page items 139 Port Configuration page items 141 Bridge Information page items 143 Group page items AA Wa ee 146 Utilization page items AU a a E 148 214394 A Preface 15 Preface Welcome to Using Web based Management for the BayStack 380 24F Gigabit Switch Default values are defined for all Nortel Networks BayStack 380 24F Gigabit Switch features that allow the switch to begin forwarding packets
50. Part No 214394 A March 2003 4655 Great America Parkwa y Santa Clar RS 85094 Using Web based Management for the BayStack 380 24F Gigabit Switch NORTEL NETWORKS Copyright 2003 Nortel Networks All rights reserved February 2003 The information in this document is subject to change without notice The statements configurations technical data and recommendations in this document are believed to be accurate and reliable but are presented without express or implied warranty Users must take full responsibility for their applications of any products specified in this document The information in this document is proprietary to Nortel Networks Inc Trademarks Nortel Networks the Nortel Networks logo the Globemark Unified Networks and BayStack 380 are trademarks of Nortel Networks Microsoft Windows and Windows NT are trademarks of Microsoft Corporation Adobe and Acrobat Reader are trademarks of Adobe Systems Incorporated SPARC is a trademark of Sparc International Inc Sun and Solaris are trademarks of Sun Microsystems Inc HP is a trademark of Hewlett Packard Corporation UNIX is is a trademark of X Open Company Limited IBM and AIX are trademarks of International Business Machines Corporation IBM Netscape Navigator is a trademark of Netscape Communications Corporation Ethernet is a trademark of Xerox Corporation Restricted rights legend Use duplication or disclosure by the United States Government is
51. TX 75082 LICENSEE ACKNOWLEDGES THAT LICENSEE HAS READ THIS AGREEMENT UNDERSTANDS IT AND AGREES TO BE BOUND BY ITS TERMS AND CONDITIONS LICENSEE FURTHER AGREES THAT THIS AGREEMENT IS THE ENTIRE AND EXCLUSIVE AGREEMENT BETWEEN NORTEL NETWORKS AND LICENSEE WHICH SUPERSEDES ALL PRIOR ORAL AND WRITTEN AGREEMENTS AND COMMUNICATIONS BETWEEN THE PARTIES PERTAINING TO THE SUBJECT MATTER OF THIS AGREEMENT NO DIFFERENT OR ADDITIONAL TERMS WILL BE ENFORCEABLE AGAINST NORTEL NETWORKS UNLESS NORTEL NETWORKS GIVES ITS EXPRESS WRITTEN CONSENT INCLUDING AN EXPRESS WAIVER OF THE TERMS OF THIS AGREEMENT 214394 A Contents EER EER EE OE EO NE En qu 15 Before you begin AA ke ee ee ee ee he 15 Text conventlons EDE EE EE DE menses AE RD EE E Qui did 16 Related publications si sae 00 EE EE RE EE EE EE ER EE EE nh 16 Hard copytechnicalmanuals 17 Howto get help ON RE RE YA Rane AA 17 Chapter 1 Using the Web based managementinterface 19 Requirements eie es Re n ox oen ek Red e d CIR De e e RU De RR e 19 Logging in to the Web based management interface 20 Mens se OE EE heec ode expost ceca cu er t Ee URE ER DN as SR RR eats ME 21 Management page siss eiea nnan EE SE EE Se EE ee EE hh rne 24 Chapter 2 Administering the switch 27 Viewing system information 27 Config
52. ace Management page When you click a menu option the corresponding management page opens Figure 3 shows the page displayed for the Administration gt Security gt Console option Figure 3 Console page NIORTEL RKS Administration gt Security gt Console Console Selitch Password Seeing Access ROW Console Selich Password Type Pere W Baia Read Dig Sein FP pearl f d gibh Wien eo add Vis Saetich iP id GAC iima 7e C omgurasar gt Fut ER Ie Sors Rig ralieh W Schrott Sevier inem W asin a vip a Tami IR Ge id Fathi PE Leoni A page is composed of one or more of the following elements e Tables and input forms The gray cells in a page are display only and white cells are input fields e Check boxes 214394 A Chapter 1 Using the Web based management interface 25 You enable or disable a selection by clicking a check box When a check mark is displayed in the box that selection is enabled You disable a selection by clicking the checked box e Icons and buttons Icons and buttons perform an action concerning the displayed page or the switch Some pages include a button that opens another page or updates the values shown on the current page Other pages include icons that initiate an action such as reformatting the current displayed data as a bar or pie chart Table 3 describes the icons that allow you to modify information in a statistical table or to display statistics in chart format
53. age fields 2 BS380 24F Image 3 BS380 24FDiagnostics Fields Range Description Current Running Version The version of the current running software Local Store Version The local version of the software in the flash memory BS380 24F Image Filename 1 30 Type the software image load filename BS380 24F Diagnostics 1 30 Type the diagnostics filename Filename Image Filename 1 30 Type the image filename TFTP Server IP Address XXX XXX XXX XXX Type the IP address of your TFTP load host Download Option 1 No Choose the software image to load 214394 A Chapter 4 Configuring the switch 79 2 Type information in the text boxes or select from a list 3 Click Submit The software download process automatically completes without user intervention The process erases the contents of flash memory and replaces it with a new software image Take care not to interrupt the download process until after it runs to completion the process can take up to 10 minutes depending on network conditions When the download process is complete the switch automatically resets and the new software image initiates a self test During the download process the BayStack 380 24F Gigabit Switch is not operational You can monitor the progress of the download process by observing the LED indications Table 29 describes the LED indications during the software download process Note The LED indications
54. ain menu choose Statistics gt RMON History The RMON History page opens Figure 37 Figure 37 RMON History page Statistics RMON History ENDS HEgiong kaaa PA se Dy daa EMDR Harry Dairi asie henne 3 aerate TE bied 1 Berea 1 bieder TI Sec wer Vi benader 1 Eis II EET ld kimieg Saa T1 keen T3 Tere 11 ber 3 Bancii 1 bimi O Ep ele dd hemde Fonte ld Lied em Sacred T8 kha 1 Berou IN blade di Ter wait eee j E ii O EE mon m EI hd m AAEAAR ER aurmrcesucuro iEOAADE Ed die HE TTE am E ur om om ol m d o mom onu H B TEELE mo oo mauu Table 37 describes the items on the RMON History page 214394 A Chapter 5 Configuring remote network monitoring RMON 97 Table 37 RMON History page items Section RMON History Statistics Table View By RMON History Statistics Table Item Description Port be Choose the port number to be monitored Displays statistics as a line graph Start The value of the sysUPTime at the start of the interval over which this sample was measured Drop Events The number of events in which packets were dropped by the interface due to a lack of resources Octets The number of octets of data including those in bad packets received on the network excluding framing bits but including Frame Check Sequence FCS octets Packets The number of good packets received that were directed to the broadcast address This doe
55. are supported in your network configuration You can also view information about packets received by the system having particular errors such as unavailable contexts unknown contexts decrypting errors or unknown user names To view SNMPv3 system information 1 From the main menu choose Configuration SNMPv3 System Information The System Information page opens Figure 15 Figure 15 System Information page Canfiguialion RIP gt yabem Infarmatien Serer skeie ke htl Laguna li EH 3520 1 a DO IT 0 Ei Using Web based Management for the BayStack 380 24F Gigabit Switch 52 Chapter 4 Configuring the switch Table 14 describes the fields on the System Information section of the SNMPv3 System Information page Table 14 System Information section fields Item Description SNMP Engine ID The SNMP engine s identification number SNMP Engine Boots The number of times that the SNMP engine has re initialized itself since its initial configuration SNMP Engine Time The number of seconds since the SNMP engine last incremented the snmpEngineBoots object SNMP Engine Maximum Message Size The maximum length in octets of an SNMP message which this SNMP engine can send or receive and process determined as the minimum of the maximum message size values supported among all transports available to and supported by the engine SNMP Engine Dialects The SNMP dialect the engine recognizes
56. as soon as it is powered up and connected to compatible devices The Web based management interface is one of many tools specifically designed to assist the network manager in creating complex standalone or network configurations For information on the default values defined within the BayStack 380 24F Gigabit Switch or for information on additional products available to configure your switch refer to Using the BayStack 380 24F Gigabit Switch part number 214391 A This guide describes how to use the Web based management interface to configure and maintain your BayStack 380 24F Gigabit Switch and the devices connected within its framework Before you begin This guide is intended for network managers who are responsible for configuring BayStack switches This guide assumes prior knowledge and understanding of the terminology theories and practices and specific knowledge about the networking devices protocols and interfaces that comprise your network You should have working knowledge of the Microsoft Windows operating system graphical user interfaces GUIs and Web browsers Using Web based Management for the BayStack 380 24F Gigabit Switch 16 Preface Text conventions This guide uses the following text conventions italic text Indicates new terms and book titles separator gt Shows menu paths Example Configuration Port Management identifies the Port Management option on the Configuration menu Rel
57. ated publications For more information about using the Web based management interface and the BayStack 380 24F Gigabit Switch refer to the following publications e Using the BayStack 380 24F Gigabit Switch part number 214391 A Describes how to use the BayStack 380 24F Gigabit switch e Installing the BayStack 380 24F Gigabit Switch part number 214390 A Describes how to install the BayStack 380 24F Gigabit switch e Release Notes for the BayStack 380 24F Gigabit switch part number 214395 A Documents important changes about the software and hardware that are not covered in other related publications 214394 A Preface 17 Hard copy technical manuals You can print selected technical manuals and release notes free directly from the Internet Go to the www nortelnetworks com documentation URL Find the product for which you need documentation Then locate the specific category and model or version for your hardware or software product Use Adobe Acrobat Reader to open the manuals and release notes search for the sections you need and print them on most standard printers Go to Adobe Systems at the www adobe com URL to download a free copy of the Adobe Acrobat Reader You can purchase selected documentation sets CDs and technical publications through the Internet at the www1 vervante com documentation nortel URL How to get help If you purchased a service contract for your Nortel Networks product from a distributor
58. ation in full duplex mode Flow Control 1 Enabled Choose your flow control preference to control traffic and avoid 2 Symmetric congestion on the GBIC port 3 Asymmetric 2 Select from the lists 3 Click Submit Downloading switch images You can download the BayStack 380 24F Gigabit Switch software image that is located in non volatile flash memory To download the BayStack 380 24F Gigabit Switch software image a properly configured Trivial File Transfer Protocol TFTP server must be present in your network and the policy switch must have an IP address To learn how to configure the switch IP address refer to Configuring BootP IP and gateway settings on page 42 Caution Do not interrupt power to the device during the software download process A power interruption can corrupt the firmware image Using Web based Management for the BayStack 380 24F Gigabit Switch 78 Chapter 4 Configuring the switch To download a switch image 1 From the main menu choose Configuration Software Download The Software Download page opens Figure 28 Figure 28 Software Download page Configuration gt Software Download Software Download Saning Current Hazaing Version Local Store Version Tiger image Filesame l IO TE el d 18 m Tiger Mayra Fil niam TFTP Sones IP Address Dowaload Opdan ie Table 28 describes the fields on the Software Download page Table 28 Software Download p
59. ation page opens Figure 63 214394 A Chapter 7 Configuring application settings 135 Figure 63 VLAN Configuration Port Configuration page Aupplication VLAN Pert Confiraratien ELAH Puri arf Hier LLLI LI N iN m Hi Fe di dIE iaar d Table 51 describes the items on the VLAN Configuration Port Configuration page Table 51 Port Configuration page items Item Range Description Port 1 24 The port number Port Name 1 16 Type character string to create a unigue port name for example Port 1 Filter Untagged 1 Yes Choose how to process filter untagged frames Frames 2 No When a flag is set the frames are discarded by the forwarding process The default setting is No no frames discarded PVID 1 4094 Type the number of the VLAN ID to assign to untagged frames received on this trunk port For example a port with a PVID of 3 assigns all untagged frames received on this port to VLAN 3 The default setting is 1 Link Type 1 Untagged Access Choose the link type for each port 2 Tagged Trunk 3 Type information in the text boxes or click the check box of a port to associate it with the VLAN or if the port is already a member click the check box to deselect it as a member of the VLAN Using Web based Management for the BayStack 380 24F Gigabit Switch 136 Chapter 7 Configuring application settings 4 Do one of the following e Click Submit e Click Ba
60. atistics RMON Ethernet The RMON Ethernet page opens Figure 34 on page 92 2 Inthe port row of your choice click the bar graph icon The RMON Ethernet Chart page is displayed in a bar graph format Figure 35 Figure 35 RMON Ethernet Chart in a bar graph format Stilts ROM Etfarnat Chart i Era m al a Ba io a go 3 To refresh statistical information click Update or click Back to return to the Ethernet Statistics page 214394 A Chapter 5 Configuring remote network monitoring RMON 95 Viewing RMON Ethernet statistics in a pie chart format To view RMON Ethernet statistics in a pie chart format 1 From the main menu choose Statistics gt RMON Ethernet The RMON Ethernet page opens Figure 34 on page 92 2 In the port row of your choice click the pie chart icon The RMON Ethernet Chart page is displayed in a pie chart format Figure 36 Figure 36 RMON Ethernet Chart in a pie chart format SiaSclicn gt AMON Bthemet Cart ERI L Bice E La Eg s E E Buz Bg Bio TETEL 3 To refresh statistical information click Update or click Back to return to the Ethernet Statistics page Using Web based Management for the BayStack 380 24F Gigabit Switch 96 Chapter 5 Configuring remote network monitoring RMON Viewing RMON history You can view a periodic statistical sampling of data from various types of networks To view periodic statistical data 1 From the m
61. atistics in a pie chart format To view transparent bridging statistics in a pie chart format 1 From the main menu choose Statistics gt Transparent Bridging The Transparent Bridging page opens Figure 48 on page 113 2 Inthe port row of your choice click the pie chart icon The Transparent Bridging Chart page opens in a pie chart format Figure 49 Figure 49 Transparent Bridging Chart in a pie chart format Simai gt Transparent Brssging Chart 3 To update the statistical information click Update or click Back to return to the Transparent Bridging page Viewing transparent bridging statistics in a bar graph format You can view measured transparent bridging statistics in a bar graph format To view transparent bridging statistics in a bar graph format 1 From the main menu choose Statistics Transparent Bridging 214394 A Chapter 6 Viewing system statistics 115 The Transparent Bridging page opens Figure 48 on page 113 2 In the port row of your choice click the bar graph icon The Transparent Bridging Chart page opens in a bar graph format Figure 50 Figure 50 Transparent Bridging Chart in a bar graph format Siatigiica Transgareen Bridging Chart 3 To update the statistical information click Update or click Back to return to the Transparent Bridging page Using Web based Management for the BayStack 380 24F Gigabit Switch 116 Chapter 6 Viewing system statistics 214394 A 1
62. bit Switch 86 Chapter 5 Configuring remote network monitoring RMON Creating an RMON fault threshold You can create the RMON threshold parameters for fault notification alarms To create an RMON threshold 1 From the main menu choose Fault gt RMON Threshold The RMON Threshold page opens Figure 31 Figure 31 RMON Threshold page Paull MOK Theat HM eggs HERI B lied Die dis ira 1 Per 2 ere rain had Lapai T YA ale ar Table 33 describes the items on the RMON Threshold page Table 33 RMON Threshold page items Item Range Description xI Deletes the row Index Alarm 1 10 Type the unique number to identify the alarm entry Index Target Integer The switch number and port number Port 1 24 Choose the port on which to set an alarm 214394 A Chapter 5 Configuring remote network monitoring RMON 87 Table 33 RMON Threshold page items continued Item Range Description Parameter 1 Good Bytes Choose the sampled statistic 2 Good Packets 3 Multicast 4 Broadcast 5 CRC Errors 6 Runts 7 Fragments 8 Frame Too Long 9 Collisions Current Level Integer The value of the statistic during the last sampling period Note If the sample type is Delta the value is the difference between the samples at the beginning and end of the period If the sample type is Absolute the value is the sampled value at the end of the period Rising Level Intege
63. cF Disebled IP Setting Crabe in Use FIT Ir Elarpd Switch IP Address 134 177 218 293 138 177 218 000 0 In Band Subnet Mask 255 255 255 0 255 255 2550 000 0 Gateway Serin Default Gateway 154 177 218 1 134 177 218 1 00 0 0 214394 A Table 10 Section Chapter 4 Configuring the switch 43 Table 10 describes the items on the IP page IP page items Item Range Description Boot Mode Setting IP Setting Gateway Setting BootP Reguest Mode BootP When Needed Choose this mode to inform the switch to send a BootP reguest when the switch IP address stored in nonvolatile memory is the factory default value If the stored IP address differs from the factory default value the switch uses the stored network parameters If the switch cannot find a BootP server it tries five more times to find one and then defaults to the factory settings BootP Always Choose this mode to inform the switch each time the switch boots to ignore any stored network parameters and send a BootP request If the BootP request fails the switch boots with the factory default IP configuration This setting disables remote management if no BootP server is set up for the switch but it allows the switch to boot normally BootP Disabled Choose this mode to inform the switch each time the switch boots to use the IP configuration parameters stored in non volatile memory If a BootP configuration is in progress whe
64. ce identified by host ID for which it was originally acquired b to copy the Software solely for backup purposes in support of authorized use of the Software and c to use and copy the associated user manual solely in support of authorized use of the Software by Licensee This license applies to the Software only and does not extend to Nortel Networks Agent software or other Nortel Networks software products Nortel Networks Agent software or other Nortel Networks software products are licensed for use under the terms of the applicable Nortel Networks Inc Software License Agreement that accompanies such software and upon payment by the end user of the applicable license fees for such software 2 Restrictions on use reservation of rights The Software and user manuals are protected under copyright laws Nortel Networks and or its licensors retain all title and ownership in both the Software and user manuals including any revisions made by Nortel Networks or its licensors The copyright notice must be reproduced and included with any copy of any portion of the Software or user manuals Licensee may not modify translate decompile disassemble use for any competitive analysis reverse engineer distribute or create derivative works from the Software or user manuals or any copy in whole or in part Except as expressly provided in this Agreement Licensee may not copy or transfer the Software or user manuals in whole or in part The Software and user man
65. ck to return to the VLAN Configuration page without making changes The modified VLAN configuration is displayed in the VLAN Table Figure 61 on page 132 Selecting a management VLAN You can select any VLAN to perform as the management VLAN VLAN 1 is the default management VLAN for the switch To set this field the VLAN State field value must be active To select a VLAN as the management VLAN 1 From the main menu choose Application gt VLAN gt VLAN Configuration The VLAN Configuration page opens Figure 62 on page 133 2 Inthe VLAN Setting section choose the VLAN to assign as your management VLAN 3 Click Submit Deleting a VLAN configuration To delete a VLAN configuration 1 From the main menu choose Application gt VLAN gt VLAN Configuration The VLAN Configuration page opens Figure 62 on page 133 2 Inthe VLAN Table click the Delete icon for the entry you want to delete A message opens prompting you to confirm your request 3 Do one of the following e Click Yes to delete the VLAN configuration e Click Cancel to return to the VLAN Configuration page without making changes 214394 A Chapter 7 Configuring application settings 137 Configuring broadcast domains You can configure specified VLAN switch ports with the appropriate PVID VLAN association that enables the creation of broadcast domains You can configure specified switch ports to filter discard all received tagged frames untagged f
66. curity gt Port Configuration MAC Aa PEE Se culty Pan Configuration EITUMESTTSENEETUT HM la EEE F ET IE Dicit m Deste E TI a TEE Em ja Daad IE E abl peni E E Table 44 describes the items on the Ports Configuration page Table 44 Ports Lists page items Item Range Description Port Displays the port number Trunk Describes the trunk if any for the port Security Allows you to enable or disable Mac address security for the port 2 Toadd or delete ports to a list click the icon in the Action column in the list row you want The Port List View Port List page opens Figure 54 214394 A Chapter 7 Configuring application settings 123 Figure 54 Port List View Port List page Agplicabint gt MVC Address Secariby Purt Link Vies Applica MAC Akins Sarunily Surursty Cunfiguenbrn Loam by Paris 7 Part HOME LE 2 4 BO TOROS d HE 2 HA GB AE TTE 3 2 E 22 23 24 ir ia al ie ea lid id al mei ie ed died al ed Le ey a Click the ports you want to add to the selected list or click None b To delete a port from a list uncheck the box by clicking it C Click Submit 3 From the main menu choose Application gt MAC Address Security gt Security Configuration The Security Configuration page opens Figure 52 4 Inthe MAC Security Table section click the icon in the Action column of the Learn By Ports row The Port List View Learn by Ports page opens Figu
67. d the documentation Close the Web browser Upgrade option You can upgrade your Web based management user interface to the most recent software release To upgrade to the most recent software release 1 From the main menu choose Support Upgrade Nortel Networks Technical Documentation Web site opens in a separate Web browser Figure 71 Follow the prompts to download the software release Close the Web browser Using Web based Management for the BayStack 380 24F Gigabit Switch 152 Chapter 8 Support menu 214394 A 153 Index A access SNMP 119 administrative options logging on 32 logging out 35 resetting the switch stack 34 resetting to system defaults 34 security configuring passwords 29 remote dial in access 30 alarms configuring 88 Allowed Source field 125 Allowed Source IP Address field 48 Allowed Source Mask field 48 application setting options broadcast domains 137 MultiLink Trunking MLT 144 port mirroring 117 Spanning Tree Protocol 140 VLANs 132 authentication traps enabling 49 autotopology enabling 49 bootP configuring 42 request modes 43 Bridge Information page 142 broadcast domains configuring 137 C check boxes about 24 Clear by Ports page 126 community strings configuring 49 Configuration File Download Upload page 80 Console Password Setting page 29 Console Communication Port page 83 conventions text 16 Current Learning Mode field 120
68. dropped by the SNMP engine because they referenced an unknown user Unknown Engine IDs The total number of packets dropped by the SNMP engine because they referenced an snmpEnginelD that was not known to the SNMP engine 214394 A Chapter 4 Configuring the switch 53 Table 15 SNMPv3 Counters section fields Item Description Wrong Digests Decryption Errors The total number of packets dropped by the SNMP engine because they did not contain the expected digest value The total number of packets dropped by the SNMP engine because they could not be decrypted Configuring user access to SNMPv3 You can view a table of all current SNMPv3 user security information such as authentication privacy protocols in use and create or delete SNMPv3 system user configurations Creating an SNMPv3 system user configuration To create an SNMPv3 system user configuration 1 From the main menu choose Configuration SNMPv3 User Specification The User Specification page opens Figure 16 Figure 16 User Specification page Configurarion gt SNMP gt User 5pecificarion llusr 5 parilizaiian Istis BEERS ENE ETE DIER lisar 5 perilizatian Crsatun leer Hamer WI Aushierriscatian Pratzcal I ine Ej furherriscalian Pascoe Entry Siaraya nw a Using Web based Management for the BayStack 380 24F Gigabit Switch 54 Chapter 4 Configuring the switch Table 16 describes the items on th
69. e Summary Switch Information The Switch Information page opens Figure 9 Using Web based Management for the BayStack 380 24F Gigabit Switch 38 Chapter 3 Viewing summary information Figure 9 Switch Information page w Summary gt Switch information hich Inftarmadorn Arrais HW Giymek 3880 248 24 1000 Fiter peris 20 Mini semp ed Lin sh GEC aes and 4 GER alate TRIS Safna are Version v2 10 13 Werke bron iom Manufartuiing Dau Code 11122002 GEL C imatr CN Tariel c ngurasari ip Operational Stair Pierri Srki Wa Fulilniis 046 97 30 BF a a a a L d a a a Tai Canipuiabon IF Sgr ee ACC Mu 177 in OF ET Pawi Stalin Prima Power RASI nbl presi SHA EE SHMP Trap MAC Address Tabit Find BAC Ediz Put Manager View Canai Skaars Dera red Table 8 describes the fields on the Switch Information and Switch Inventory sections of the Switch Information page Table 8 Switch Information page fields Section Field Description Switch Information System Description The name created in the configuration process to identify the switch Software Version The version of the running software MAC Address The MAC address of the switch IP Address The IP address of the switch Manufacturing Date Code The date of manufacture of the board in ASCII format YYYYMMDD Serial Number The serial number of the switch Operatio
70. e User Specification Table section of the User Specification page Table 16 User Specification Table section items Item and MIB Hi Description association KI Deletes the row User Name The name of an existing SNMPV3 user usmUserSecurityName Authentication Protocol usmUserAuthProtocol Indicates whether the message sent on behalf of this user to from the SNMP engine identified UserEnginelD can be authenticated by the MD5 authentication protocol Note The BayStack 380 24F Switch supports only the MD5 authentication protocol Private Protocol usmUserPrivProtocol Displays whether or not messages sent on behalf of this user to or from the SNMP engine identified by usmUserEnginelD can be protected from disclosure and if so the type of privacy protocol which is used Entry Storage The current storage type for this row If Volatile is displayed information is dropped lost when you turn the power off If non volatile is displayed information is saved in NVRAM when you turn the power off Table 17 describes the items on the User Specification Creation section of the User Specification page Table 17 User Specification Creation section items Item and MIB usmUserAuthPassword asscelat n Range Description User Name 1 32 Type a string of characters to create an identity for the user Authentication Protocol None Choose whether or not the message sent on behalf of this user to
71. e defective media at no charge if it is returned to Nortel Networks during the warranty period along with proof of the date of shipment This warranty does not apply if the media has been damaged as a result of accident misuse or abuse The Licensee assumes all responsibility for selection of the Software to achieve Licensee s intended results and for the installation use and results obtained from the Software Nortel Networks does not warrant a that the functions contained in the software will meet the Licensee s requirements b that the Software will operate in the hardware or software combinations that the Licensee may select c that the operation of the Software will be uninterrupted or error free or d that all defects in the operation of the Software will be corrected Nortel Networks is not obligated to remedy any Software defect that cannot be reproduced with the latest Software release These warranties do not apply to the Software if it has been 1 altered except by Nortel Networks or in accordance with its instructions ii used in conjunction with another vendor s product resulting in the defect or iii damaged by improper environment abuse misuse accident or negligence THE FOREGOING WARRANTIES AND LIMITATIONS ARE EXCLUSIVE REMEDIES AND ARE IN LIEU OF ALL Using Web based Management for the BayStack 380 24F Gigabit Switch OTHER WARRANTIES EXPRESS OR IMPLIED INCLUDING WITHOUT LIMITATION ANY WARRANTY OF MERCHANTABILITY OR FITN
72. e line graph icon The RMON History Chart page opens in a line graph format Figure 38 Figure 38 RMON History page Chart in line graph format Seattle gt DEON Hirie Chari 3 Click Back to return to the RMON History page 214394 A 99 Chapter 6 Viewing system statistics The options available to monitor system statistical data are e Viewing port statistics next e Viewing interface statistics on page 105 e Viewing Ethernet error statistics on page 109 e Viewing transparent bridging statistics on page 112 Viewing port statistics You can view detailed statistics about a selected switch port configuration Both received and transmitted statistics are displayed so that you can compare throughput or other port parameters To view statistical data about a selected switch port 1 From the main menu choose Statistics Port The Port page opens Figure 39 Using Web based Management for the BayStack 380 24F Gigabit Switch 100 Chapter 6 Viewing system statistics Figure 39 Port page Statistics Port Part Sipibsiics view Hys Access HW E Fort Management Fles cii Befare D reri cad ag ura on F ge CunspipiCamm Fari si Peat ai Tabla Li ARON Thrashpbld RHUOH Event Lag System Lop 0 Facket W wisis D Mahina Pad D Bsnadicasts d merare D Total Cctets hemel Eris 1 Parket 54 brytas de Transparent Bridging d AMON Eres hi 5127 bytes 128 2
73. eate an SNMPv3 target address configuration 1 From the main menu choose Configuration SNMPv3 Target Address The Target Address page opens Figure 21 Figure 21 Target Address page Gunfigurallan gt ZHMPuS Target Addiaxi T arai Ao Tihi Tag Lk IA Pare Tar i B memi larmes e 7 218 TEI mm T ries mi EE EE EET eg led cere Daan EUH 1 OR Ed 1 i day be vm idus rik vd de n Find imd Tani Had ree rium Tengri Boom Lew Addis Teri teed EE argui Bebg mad oe lei f Legri Pon briny oi AN TN Using Web based Management for the BayStack 380 24F Gigabit Switch 66 Chapter 4 Configuring the switch Table 22 describes the items on the Target Address page Table 22 Target Address page items Item and MIB association Range Description KI Deletes the row Target Name 1 32 Type a character string to create a target name snmpTargetAddrName Target Domain 1 32 The transport type of the address contained in the snmpTargetAddrTDomain snmpTargetAddrTAddress object Target Address XXX XXX XXX XXX XXX Type a transport address in the format of an IP address snmpTargetAddrTAddress colon and UDP port number For example 10 30 31 99 162 Target Timeout Integer Type the number in seconds to designate as the maximum snmpTargetAddrTimeout time to wait for a response to an inform notification before re sending the Inform notification Target Retry Count 0 255 Ty
74. eference Selecting Volatile requests snmpNotifyStorageType 2 Non Volatile information to be dropped lost when you turn the power off Selecting Non Volatile requests information to be saved in NVRAM when you turn the power off 3 Click Submit In the Notification Creation section type information in the text boxes or select from a list The new entry is displayed in the Notification Table Figure 20 Note This Notification Table section of the Notification page contains hyperlinks to the Target Parameter page Deleting an SNMPv3 system notification configuration To delete an SNMPv3 notification configuration 1 From the main menu choose Configuration SNMPv3 Notification The Notification page opens Figure 20 on page 63 delete In the Notification Table click the Delete icon for the entry you want to A message opens prompting you to confirm your request 214394 A Chapter 4 Configuring the switch 65 3 Do one of the following e Click Yes to delete the notification configuration e Click Cancel to return to the table without making changes Configuring an SNMPv3 management target address You can view a table of existing SNMPv3 management target configurations create SNMPv3 management target address configurations that associate notifications with particular recipients and delete SNMPv3 target address configurations Creating an SNMPv3 target address configuration To cr
75. elected to be discarded even though no errors were detected to prevent their being transmitted Packet discarding is not arbitrary One reason for discarding packets is to free buffer space In Errors The number of inbound packets that contained errors preventing them from being deliverable to a higher layer protocol Out Errors The number of outbound packets that could not be transmitted because of errors In Unknown The number of packets received through the interface which were discards due to an unknown or Protocols unsupported protocol 2 To update the statistical information click Update 214394 A Chapter 6 Viewing system statistics 107 Viewing interface statistics in a pie chart format You can view interface statistics in a pie chart format To view interface statistics in a pie chart format 1 From the main menu choose Statistics gt Interface The Interface page opens Figure 42 on page 105 2 In the port row of your choice click the pie chart icon The Interface Chart page opens in a pie chart format Figure 43 Figure 43 Interface Chart in a pie chart format Sikilia beide Chart BE Baa LJ Boi B Lia Bt Baw a Baw E 3 To update the statistical information click Update or click Back to return to the Interface page Using Web based Management for the BayStack 380 24F Gigabit Switch 108 Chapter 6 Viewing system statistics Viewing interface statistics in a
76. erated by the PLS sublayer for a particular interface The SQE TEST ERROR is defined in section 7 2 2 2 4 of ANSI IEEE 802 3 1985 and its generation is described in section 7 2 4 6 of the same document Deferred Transmissions The number of frames for which the first transmission attempt on a particular interface is delayed because the medium is busy Single Collision Frames The number of successfully transmitted frames on a particular interface for which transmission is inhibited by more than one collision Multiple Collision Frames The number of successfully transmitted frames on a particular interface for which transmission is inhibited by a single collision Late Collisions The number of times a collision is detected on a particular interface later than 512 bit times into the transmission of a packet Excessive Collisions The number of frames for which transmission on a particular interface fails due to excessive collisions 2 To refresh the statistical information click Update 214394 A Chapter 6 Viewing system statistics 111 Viewing Ethernet error statistics in a pie chart format You can view Ethernet Errors statistics in a pie chart format To view Ethernet Errors statistics in a pie chart format 1 From the main menu choose Statistics Ethernet Errors The Ethernet Errors page opens Figure 45 on page 109 2 In the port row of your choice click the pie chart icon The Ether
77. ess page opens Figure 21 on page 65 2 Inthe Target Address Table click the Delete icon for the entry you want to delete A message opens prompting you to confirm your request 3 Do one of the following e Click Yes to delete the target address configuration e Click Cancel to return to the table without making changes Configuring an SNMPv3 management target parameter SNMPv3 management target parameters are used during notification generation to specify the communication parameters used for exchanges with notification recipients You can view a table of existing SNMPv3 target parameter configurations create SNMPv3 target parameters that associate notifications with particular recipients and delete existing SNMPv3 target parameter configurations Creating an SNMPv3 target parameter configuration To create an SNMPv3 target parameter configuration 1 From the main menu choose Configuration SNMPv3 Target Parameter The Target Parameter page opens Figure 22 Using Web based Management for the BayStack 380 24F Gigabit Switch 68 Chapter 4 Configuring the switch Figure 22 Target Parameter page amp unflguirallan RMP3 Target Par arsbad T aant Parameter Viable DUE AO regrata Pj hg geed Pere Sat Trgi Pare wis Forres lag Tyre dm ET dl Mag Press Mendel TEE Reiid itp ba Be kaaa Level Dang BEd ARE iw LEEG kenny iarsa Manii iers reels phe Hs ov wem nl rek or o
78. eturn to the RMON Threshold page without making changes Viewing the RMON fault event log RMON events and alarms work together to notify you when values in your network go out of a specified range When values pass the specified ranges the alarm is triggered and fires The event specifies how the activity is recorded 214394 A Chapter 5 Configuring remote network monitoring RMON 89 An event specifies whether a trap a log or a trap and a log are generated to view alarm activity When RMON is globally enabled two default events are generated Rising Event e Falling Event Default events specify that when an alarm goes out of range the firing of the alarm is tracked in both a trap and a log For example when an alarm fires at the rising threshold the rising event specifies that this information be sent to both a trap and a log The RMON Event Log page works in conjunction with the RMON Threshold page to enable you to view a history of RMON fault events To view a history of RMON fault events gt From the main menu choose Fault gt RMON Event Log The RMON Event Log page opens Figure 32 Figure 32 RMON Event Log page Fault AMOH Brent Lag RM Fare lug Did E majin Pedum veil ab a Table 34 describes the fields on the RMON Event Log page Table 34 RMON Event Log page fields Field Description Time Stamp The time the event occurred Description An implementation dependent description o
79. f TE ad ay pem Paul Ling Engl Uns Pasi Codi Eeu dy Pumi inia mi cin nd zE gt i A mr mil Table 19 describes the items on the Group Access Rights page Table 19 Group Access Rights page items Item and MIB association Range Description X Deletes the row Group Name 1 32 Type a character string to specify the group name to which vacmAccessToGroupStatus access is granted Security Model 1 SNMPv1 Choose the security model to which access is granted vacmAccessSecurityModel 2 SNMPv2c 3 USM Security Level 1 noAuthNoPriv Choose the minimum level of security required in order to vacmAccessSecurityLevel 2 authNoPriv gain the access rights allowed to the group vacmSecurityToGroupStorageType 2 Non Volatile Read View 1 32 Type a character string to identify the MIB view of the SNMP vacmAccessReadViewName context to which this entry authorizes read access Write View 1 32 Type a character string to identify the MIB view of the SNMP vacmAccessWriteViewName context to which this entry authorizes write access Notify View 1 32 Type a character string to identify the MIB view to which this vacmAccessNotifyViewName entry authorizes access to notifications Entry Storage 1 Volatile Choose your storage preference Selecting Volatile requests information to be dropped lost when you turn the power off Selecting Non Volatile requests information to be saved i
80. f the event that activated this log entry Triggered By A comment describing the source of the event ID The event that generated this log entry Using Web based Management for the BayStack 380 24F Gigabit Switch 90 Chapter 5 Configuring remote network monitoring RMON Viewing the system log You can view a display of messages contained in non volatile random access memory NVRAM or dynamic random access memory DRAM and NVRAM To open the System Log page 1 From the main menu choose Fault System Log The System Log page opens Figure 33 Figure 33 System Log page Fault gt Sateen Lag Deam Loy Maw HA Hey Dee bs SS ee cum mee d Lien Kiwanga N ram re 3 HE Va IR kiraia aid Eha Tais E IM IA ET teers Lini lg ben IH UMTS kiesers Link lg Tao EIE AI kimona Deb Lip Tu D Ot IETS mier need r Ug Tua KH ir Ed maana ai lg Tous XS UH EP keel Lord Up has TUM NETZ eterno Lei Up Tas XD MEUS mireta Link Ly Tus IO DU VES teenie Lad Up Tan Ma EE de mI EE Table 35 describes the fields on the System Log page 214394 A Chapter 5 Configuring remote network monitoring RMON 91 Table 35 System Log page fields Section System Log System Log Field Range Description Display 1 Non Volatile Choose to display messages from Non Volatile memory Messages From 2 Volatile Non Volatile NVRAM or Volatile DRAM and Non Volatile memory The default settings is
81. for civilian agencies and subparagraph c 1 ii of the Rights in Technical Data and Computer Software clause of DFARS 252 227 7013 for agencies of the Department of Defense or their successors whichever is applicable 6 Use of software in the European Community This provision applies to all Software acquired for use within the European Community If Licensee uses the Software within a country in the European Community the Software Directive enacted by the Council of European Communities Directive dated 14 May 1991 will apply to the examination of the Software to facilitate interoperability Licensee agrees to notify Nortel Networks of any such intended examination of the Software and may procure support and assistance from Nortel Networks 7 Term and termination This license is effective until terminated however all of the restrictions with respect to Nortel Networks copyright in the Software and user manuals will cease being effective at the date of expiration of the Nortel Networks copyright those restrictions relating to use and disclosure of Nortel Networks confidential information shall continue in effect Licensee may terminate this license at any time The license will automatically terminate if Licensee fails to comply with any of the terms and conditions of the license Upon termination for any reason Licensee will immediately destroy or return to Nortel Networks the Software user manuals and all copies Nortel Networks is not
82. from the usmUserAuthProtocol MD5 SNMP engine identified UserEnginelD can be authenticated with the MD5 protocol Note The BayStack 380 24F Switch supports only the MD5 authentication protocol Authentication Password 1 32 Type a string of character to create a password to use in conjunction with the authorization protocol Creation Mode Create Entry Choose to create a new unique user specification entry Entry Storage usmUserStorageType Choose your storage preference Selecting Volatile requests information to be dropped lost when you turn the power off Selecting Non Volatile requests information to be saved in NVRAM when you turn the power off 1 Volatile 2 Non Volatile 214394 A Chapter 4 Configuring the switch 55 2 In the User Specification Creation section type information in the text boxes or select from a list 3 Click Submit The new configuration is displayed in the User Specification Table Figure 16 on page 53 Deleting an SNMPv3 system user configuration To delete an existing SNMPv3 user configuration 1 From the main menu choose Configuration SNMPv3 User Specification The User Specification page opens Figure 16 on page 53 2 In the User Specification Table click the Delete icon for the entry you want to delete A message opens prompting you to confirm your request 3 Do one of the following e Click Yes to delete the SNMPv3 user configuration
83. ge 132 In the VLAN Creation section choose Port Click Create VLAN The VLAN Configuration Port Information page opens Figure 62 Figure 62 VLAN Configuration Port Information page Applicsti n VLAN gt Fart Inlecirimtiati VLA Tur idea aka were Ir Pari fi zl Ian Poti Hore VLA Fr maran la i An Pri Using Web based Management for the BayStack 380 24F Gigabit Switch 134 Chapter 7 Configuring application settings Table 50 describes the items on the VLAN Configuration Port Information page Table 50 VLAN Configuration Port Information page items Item Range Description VLAN 1 4094 The number assigned to the VLAN when the VLAN was created VLAN Name 1 16 Type a character string to create a unique name to identify the VLAN for example VLAN1 Type information in the text boxes or select from a list Do one of the following Click Submit e Click Back to return to the VLAN Configuration page without making changes The new port based VLAN configuration appears in the VLAN Table on the VLAN Configuration page Figure 62 on page 133 Modifying a port based VLAN To modify an existing port based VLAN 1 From the main menu choose Application gt VLAN gt VLAN Configuration The VLAN Configuration page opens Figure 62 on page 133 2 Inthe VLAN Table section in the port based VLAN row of your choice click the Modify icon The VLAN Configuration Port Configur
84. hoose a baud rate that does not match your console terminal baud rate you will lose communication with the configuration interface when you click Submit 2 3 Select from the list Click Submit Using Web based Management for the BayStack 380 24F Gigabit Switch 84 Chapter 4 Configuring the switch 214394 A 85 Chapter 5 Configuring remote network monitoring RMON The RMON management information base MIB is an interface between the RMON agent on a BayStack 380 24FSwitch and RMON management applications such as the Web based management user interface It defines objects that are suitable for the management of any type of network Some groups are specifically targeted for Ethernet networks The RMON agent continuously collects statistics and proactively monitors the switch This RMON options available to you are e Configuring RMON fault threshold parameters next Viewing the RMON fault event log on page 88 e Viewing the system log on page 90 e Viewing RMON Ethernet statistics on page 92 Viewing RMON history on page 96 Configuring RMON fault threshold parameters Alarms are useful when you need to know when the value of some variable goes out of range RMON alarms can be defined on any MIB variable that resolves to an integer value String variables such as system description cannot be used as alarm variables Using Web based Management for the BayStack 380 24F Giga
85. hout specific prior written permission SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED AS IS AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 214394 A In addition the program and information contained herein are licensed only pursuant to a license agreement that contains restrictions on use and disclosure that may incorporate by reference certain limitations and notices imposed by third parties Nortel Networks Inc software license agreement NOTICE Please carefully read this license agreement before copying or using the accompanying software or installing the hardware unit with pre enabled software each of which is referred to as Software in this Agreement BY COPYING OR USING THE SOFTWARE YOU ACCEPT ALL OF THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT THE TERMS EXPRESSED IN THIS AGREEMENT ARE THE ONLY TERMS UNDER WHICH NORTEL NETWORKS WILL PERMIT YOU TO USE THE SOFTWARE If you do not accept these terms and conditions return the product unused and in the original shipping container within 30 days of purchase to obtain a credit for the full purchase price 1 License grant Nortel Networks Inc Nortel Networks grants the end user of the Software Licensee a personal nonexclusive nontransferable license a to use the Software either on a single computer or if applicable on a single authorized devi
86. ick Submit Viewing VLAN port information You can view VLAN information about a selected switch port To view VLAN port information 1 From the main menu choose Application gt VLAN gt Port Information The Port Information page opens Figure 65 214394 A Chapter 7 Configuring application settings 139 Figure 65 Port Information page eed RE E am mee m x A m H IRTEL aa Ed D sri Er EE dm aaa Table 53 describes the items on the Port Information page Table 53 Port Information page items Item Range Description Port 1 24 Choose the number of the switch s port to view PVID The PVID assigned when the VLAN port was created Port Name The port name assigned when the VLAN port was created VLAN The number assigned to the VLAN when it was created VLAN Name The name assigned to the VLAN when it was created 2 Inthe VLAN Port Information View By section enter the port number of the VLAN you want to view 3 Click Submit The results of your request are displayed in the VLAN Port Information Table Figure 65 on page 139 Using Web based Management for the BayStack 380 24F Gigabit Switch 140 Chapter 7 Configuring application settings Managing Spanning Tree Protocol STP You can configure system parameters for Spanning Tree Protocol the industry standard for avoiding loops in switched networks You can configure individual switch ports or a
87. ify which ports belong to the VLAN The VLAN ID is used to coordinate VLANS across multiple switches Using Web based Management for the BayStack 380 24F Gigabit Switch 132 Chapter 7 Configuring application settings Configuring VLANS You can create VLANS by assigning switch ports as VLAN members and you can designate an existing VLAN to act as the management VLAN To open the VLAN Configuration page gt From the main menu choose Application gt VLAN gt VLAN Configuration The VLAN Configuration page opens Figure 61 Figure 61 VLAN Configuration page Apakah VLAN YLA all parate XT ET oe i i skin azp Table 49 describes the items on the VLAN Configuration page 214394 A Chapter 7 Configuring application settings 133 Table 49 VLAN Configuration page items Section Item Description VLAN Table VLAN Creation VLAN Setting El Displays a modification page KI Deletes the row VLAN The number assigned to the VLAN when the VLAN was created VLAN Name The name assigned to the VLAN when the VLAN was created State The current operational state of the VLAN VLAN Type Specifies a port based VLAN Management VLAN Choose the VLAN to designate as the management VLAN Creating a port based VLAN To create a port based VLAN 1 From the main menu choose Application VLAN VLAN Configuration The VLAN Configuration page opens Figure 61 on pa
88. in menu choose Configuration gt SNMPv3 gt Target Address The Target Address page opens Figure 21 on page 65 2 Inthe Target Parameter Table click the Delete icon for the entry you want to delete A message opens prompting you to confirm your request 3 Do one of the following e Click Yes to delete the target parameter configuration e Click Cancel to return to the table without making changes Configuring an SNMP trap receiver You can configure the IP address and community string for a new SNMP trap receiver view a table of existing SNMP trap receiver configurations or delete an existing SNMP trap receiver configuration s Note The SNMP Trap Receiver Table is an alternative to using the SNMPv3 Target Table and SNMPv3 Parameter Table However only SNMPv1 traps are configurable using this table Creating an SNMP trap receiver configuration To create an SNMP trap receiver configuration 1 From the main menu choose Configuration SNMP Trap Receiver The SNMP Trap Receiver page opens Figure 23 Using Web based Management for the BayStack 380 24F Gigabit Switch 70 Chapter 4 Configuring the switch Figure 23 SNMP Trap Receiver page ZailiguiaHan SNMP Trap Raceivni DIW iai Table 24 describes the fields on the Trap Receiver Table and Trap Receiver Creation sections of the SNMP Trap Receiver page Table 24 SNMP Trap Receiver page fields Fields Range Description X Deletes
89. ing the online Help option 149 Downloading technical publications 150 Upgrade option nes ence web aes Pane tees arenes Pee pene DER EE BEA ee RR 151 ide iis EE UE 153 214394 A Figures Figure 1 Web based management interface home page 20 Figure 2 Menu ase seceded iad PSI Y GE ME BE ER WEN ERISMER PREIS E 21 Figure 3 Consolepage ssssssseeeeee esee 24 Figure4 System Information page 28 Figure 5 Console password setting page 29 Figure 6 RADIUS page ui SE Ed GE Ee Se ee Re Gee ee ed Re ee ee eit 31 Figure 7 Web based managementinterfacelogonpage 32 Figure 8 System Information page 33 Figure 9 Switch Information page 38 Figure 10 Summary gt GBIC Information 39 Figure 11 Configuration IP page 42 Figure 12 Configuration gt System page 44 Figure 13 TELNET Configuration screen 46 Figure 14 SNMPV1 page AA AA EXER bag ae E 50 Figure 15 System Information page 51 Figure 16 User Specification page 53 Figure 17 Group Membership page
90. is currently in use Last BootP The column header for the read only fields in this screen The read only data displayed in this column represents data obtained from the last BootP reply received Default Gateway XXX XXX XXX XXX Type an IP address for the default gateway in the appropriate format Using Web based Management for the BayStack 380 24F Gigabit Switch 44 Chapter 4 Configuring the switch 2 Type information in the text boxes or select from a list 3 Click Submit Modifying system settings You can create or modify the system name system location and network manager contact information Note The configurable parameters on the System page are displayed in a read only format on the System Information home page To configure system settings 1 From the main menu choose Configuration System The System page opens Figure 12 Figure 12 Configuration System page Configuration gt System 5ysiem Chaani Settireg System escription BayStack 380 Hi B C Fe OD 38 Swi OIE lem Object MM 136341453451 Sysipm Up Time 23 123 System Hame Sysiem Location System Cedar 214394 A Table 11 System page items Chapter 4 Configuring the switch 45 Table 11 describes the items on the System page Item Range Description System Description The factory set description of the hardware and software versions System Object ID The cha
91. istrator you must create access parameters and passwords to protect the integrity of your network configuration s 214394 A Chapter 1 Using the Web based management interface 21 Menu The menu Figure 2 is the same for all pages It contains a list of seven main headings Figure 2 Menu Access RW A Summan Configuration F aull Statistics Application Adimerestralion Support To navigate the Web based management interface menu click a menu title and then click one of its options When you click an option the corresponding page opens The first six headings provide options for viewing and configuring switch parameters The Support heading provides options to open the online Help file and the Nortel Networks Web site Using Web based Management for the BayStack 380 24F Gigabit Switch 22 Chapter 1 Using the Web based management interface Table 1 lists the main headings in the Web based management user interface and their associated options Table 1 Main headings and options Main menu titles Option Summary Switch Information GBIC Information Configuration IP System Telnet Configuration SNMPv1 SNMPv3 SNMP Trap MAC Address Table Find MAC Address Port Management Flow Control Software Download Configuration File Fault RMON Threshold RMON Event Log System Log Statistic Port Interface Ethernet Errors Transparent Bridging RMON Ethernet RMON History Application Port Mir
92. l Fa d ee FR i Ereliai Deus Feerwal s i ae eae E Eraiki Cusen x reatu x B tret m Deer oe aa a Err rja f Ep lt ley ER b E Deme Cx E Drena a a Labia wj Dien C s area wj res dad se d n ETER Seen cv E Trata B Eretud een ce 2 frre mi cep IS EE i creda S Gem a E Table 26 describes the items on the Port Management page Table 26 Port Management page items Item Range Description Port The switch port number of the corresponding row The values that you set in each switch row affect all switch ports Trunk The trunk group that the switch port belongs to as specified in the Trunk Member fields on the MultiLink Trunk page 214394 A Table 26 Port Management page items Chapter 4 Configuring the switch 75 Item Range Description Status 1 Enabled Choose to enable or disable the port You can also use this 2 Disabled field to control access to any switch port The default setting is Enabled Link The current link state of the corresponding port as follows Up The port is connected and operational Down The port is not connected or is not operational Link Trap 1 On Choose to control whether link up down traps are sent to the 2 Off configured trap sink from the switch The default setting is On Autonegotiation 1 Enabled Choose to enable or disable the autonegotiation feature 2 Disabled Choosing to enable autonegotiation se
93. le a connection would be allowed with the following settings Remote IP address 192 0 1 5 Allowed Source IP Address 192 0 1 0 Allowed Source Mask 255 255 255 0 Default Value 0 0 0 0 no IP mask assigned Range Four octet dotted decimal notation where each octet is represented as a decimal value separated by a decimal point 214394 A Chapter 4 Configuring the switch 49 About SNMP Simple Network Management Protocol SNMP is the standard for network management that uses a common software agent to manage local and wide area network equipment from different vendors part of the Transmission Control Protocol Internet Protocol TCP IP suite and defined in RFC1157 SNMPv1 is version one or the original standard protocol SNMPv3 is a combination of proposal updates to SNMP most of which deal with security Configuring SNMPv1 You can configure SNMPv1 read write and read only community strings enable or disable trap mode settings and or enable or disable the autotopology feature The autotopology feature when enabled performs a process that recognizes any device on the managed network and defines and maps its relation to other network devices in real time To configure the community string trap mode and autotopology settings and features 1 From the main menu choose Configuration gt SNMPvI The SNMPv1 page opens Figure 14 Using Web based Management for the BayStack 380 24F Gigabit Switch 50 Chap
94. liable to Licensee for damages in any form solely by reason of the termination of this license 8 Export and re export Licensee agrees not to export directly or indirectly the Software or related technical data or information without first obtaining any required export licenses or other governmental approvals Without limiting the foregoing Licensee on behalf of itself and its subsidiaries and affiliates agrees that it will not without first obtaining all export licenses and approvals required by the U S Government 1 export re export transfer or divert any such Software or technical data or any direct product thereof to any country to which such exports or re exports are restricted or embargoed under United States export control laws and regulations or to any national or resident of such restricted or embargoed countries or ii provide the Software or related technical data or information to any military end user or for any military end use including the design development or production of any chemical nuclear or biological weapons 9 General If any provision of this Agreement is held to be invalid or unenforceable by a court of competent jurisdiction the remainder of the provisions of this Agreement shall remain in full force and effect This Agreement will be governed by the laws of the state of California Should you have any questions concerning this Agreement contact Nortel Networks Inc 2375 N Glenville Dr Richardson
95. ll switch ports for participation in the spanning tree algorithm STA Note STP resolves duplicate paths in networks and is not necessary for ports that have workstations directly attached to the switch When STP is enabled on these ports the default workstations are unable to attach to servers for a few seconds while STP stabilizes To configure switch ports for Spanning Tree participation 1 From the main menu choose Application Spanning Tree Port Configuration The Port Configuration page opens Figure 66 Figure 66 Port Configuration page Fi TE WA HIET 5d HIJATEL MET WEY griewe s Ep Tree 1 Pari Cor rr Feri rium Table 54 describes the items on the Port Configuration page 214394 A Chapter 7 Configuring application settings 141 Table 54 Port Configuration page items Item Description Command Port The port number of the currently displayed switch Trunk The trunk that corresponds to the switch ports specified as MLT members For more information on MLT see Type information in the text boxes or select from a list on page 144 Participation Choose any or all of the switch ports for Spanning Tree participation Your options are 1 Normal Learning 2 Fast Learning 3 Disabled Note When an individual port is a trunk member changing this setting for one of the trunk members changes the setting for all members of that trunk Consider the effect changing this
96. main menu choose Configuration Find MAC Address The Find MAC Address Table page opens Figure 25 214394 A Chapter 4 Configuring the switch 73 Figure 25 Find MAC Address Table page Configuration gt Find MAC Address Table fond DEE LAIT Fond Be Pal aa 1o o0 L MR dd as Vakie TALC Dee i Fed T UA la Pet T EEN Eer EEA Der 1 Pet 2 Table 25 on page 72 describes the items on the MAC Address Table page fields 2 Inthe MAC Address Setting section type the MAC address you want to search for 3 Click Submit to enter the request If the address is located it is shown in the first row in the MAC Address Table section If the address is not located the system response Not Found is shown to the right of the Find MAC Address input field Using Web based Management for the BayStack 380 24F Gigabit Switch 74 Chapter 4 Configuring the switch Configuring switch port autonegotiation speed You can configure a specific switch port or all switch ports to autonegotiate for the highest available speed of the connected station or you can set the speed for selected switch ports To configure a switch port s autonegotiation speed 1 From the main menu choose Configuration gt Port Management The Port Management page opens Figure 26 Figure 26 Port Management page ale iit iL se Configuration gt Part Management Pan Makdyrrial biting Arne RW re Dee Ce Eeatier s
97. main menu choose Support gt Help or click the Help icon located in the upper right corner of any management page The Online Help menu opens in a separate Web browser Figure 70 Using Web based Management for the BayStack 380 24F Gigabit Switch 150 Chapter 8 Support menu Figure 70 Online help menu Cuabends Saline aid Lg Web ger d manage mein a ir dd id 2 Click on any content item to read information about the topic If you clicked the Help icon on a management page information about that page is immediately displayed Click Return to Top to return to the Content index Close the Web browser Downloading technical publications You can download current documentation about the Web based management user interface from Nortel Networks Technical Documentation Web site To download current documentation 1 From the main menu choose Support Release Notes Nortel Networks Technical Documentation Web site opens in a separate Web browser Figure 71 214394 A Chapter 8 Support menu 151 Figure 71 Nortel Networks Technical Documentation Web site Hai Lit m dod You oo FREE CAMIA eae Reece Documentation wath armia Tig bn inni LL Tn ir Luise pd aim Locate your product and click the document you want to download Click on the PDF icon to start the download process You need Adobe Acrobat 3 0 or later to view or print documents from this site Follow the prompts to downloa
98. mes the Actual Hello Interval parameter value for all bridges participating in the spanning tree network See also Hello Time The default setting is 2 seconds Using Web based Management for the BayStack 380 24F Gigabit Switch 144 Chapter 7 Configuring application settings Table 55 Bridge Information page items continued Item Range Description Bridge Maximum Age Time 6 40 seconds The maximum age in seconds that a Hello message can attain before it is discarded This parameter specified by management for this bridge takes effect only when the bridge becomes the root bridge Note If this bridge becomes the root bridge its Maximum Age Time parameter value becomes the Actual Maximum Age Time parameter value for all bridges participating in the Spanning tree network See also Maximum Age Time The default setting is 20 seconds Bridge Forward Delay 4 30 seconds The amount of time that the bridge ports remains in the Listening and Learning states before entering the Forwarding state Note All bridges participating in the spanning tree network use the root bridge s Forward Delay parameter value See also Forward Delay The default setting is 15 seconds Type information in the text boxes or select from a list Click Submit The bridge information is displayed in the Spanning Tree Bridge Information page Figure 67 on page 142 Configuring MultiLink Trunk MLT members
99. n NVRAM when you turn the power off Using Web based Management for the BayStack 380 24F Gigabit Switch 60 Chapter 4 Configuring the switch 2 In the Group Access Creation section type information in the text boxes or select from a list 3 Click Submit The new entry is displayed in the Group Access Table Figure 18 on page 59 Deleting an SNMPv3 group access rights configuration To delete an SNMPv3 group access configuration 1 From the main menu choose Configuration SNMPv3 Group Access Rights The Group Access Rights page opens Figure 18 on page 59 2 In the Group Access Table click the Delete icon for the entry you want to delete A message opens prompting you to confirm your request 3 Do one of the following e Click Yes to delete the group access configuration e Click Cancel to return to the Group Access Rights page without making changes Note This Group Access Table section of the Group Access Rights page contains hyperlinks to the Management Information View page Configuring an SNMPv3 management information view You can view a table of existing SNMPv3 management information view configurations and you can create or delete SNMPv3 management information view configurations Note A view may consist of multiple entries in the table each with the same view name but a different view subtree 214394 A Chapter 4 Configuring the switch 61 Creating an SNMPv3 management
100. n you issue this command the BootP configuration stops BootP or Last Address Choose this mode to inform the switch at each startup to obtain its IP configuration using BootP If the BootP request fails the Switch uses the network parameters stored in its non volatile memory Note Valid parameters obtained in using BootP always replace current information stored in the non volatile memory Note Whenever the switch is broadcasting BootP requests one of the three modes the BootP process times out if a reply is not received within approximately 7 minutes When the process times out the BootP request mode automatically changes to BootP Disabled mode To restart the BootP process change the BootP request mode to any of the three following modes BootP When Needed BootP Always or to BootP or Last Address In Band Switch IP Address XXX XXX XXX XXX Type a new switch IP address in the appropriate format Note When the IP address is entered in the In Band IP Address field and the In Band Subnet Mask field value is not present the software provides an in use default value for the In Band Subnet Mask field that is based on the class of the IP address entered in the In Band IP Address field In Band Subnet Mast XXX XXX XXX XXX Type a new subnet mask in the appropriate format In Use The column header for the read only fields in this screen The data displayed in this column represents data that
101. nal State The current operational state of the device The operational states are Other Not Available Removed Disabled Normal Reset in Progress Testing Warning Non Fatal Errors Fatal Error and Not Configured Description The description of the device or its subcomponent 214394 A 2 Chapter 3 Viewing summary information 39 In the upper left corner of the Switch Information page click the number of the device you want to view The Switch Information page is updated with information about the selected switch Viewing GBIC information You can view GBIC information about the switch To view GBIC information 1 From the main menu choose Summary GBIC Information The GBIC Information page opens Figure 10 Figure 10 Summary GBIC Information Summary gt GBIC Information cm lalermaikas Pon GB Damerigiian m D muy EE HORE HIE HOKE HERE NONE HORE HERE NONE HORE ALENT HAGE TOL Bx HOHE NONE HOME HOHE KORE HOHE HORE HOME HORE hore HOHE HOME MORE Using Web based Management for the BayStack 380 24F Gigabit Switch 40 Chapter 3 Viewing summary information Table 9 describes the fields on the GBIC Information page Table 9 GBIC Information page fields Item Description Port Specifies the number of the GBIC port GBIC Description Specifies the type of GBIC 214394 A 41 Chapter 4 Configuring the switch The switch
102. net Errors Chart page opens in a pie chart format Figure 46 Figure 46 Ethernet Error Chart in a pie chart format Siatialica Bihvarnet Ermar Chart 3 To update the statistical information click Update or click Back to return to the Ethernet Errors page Viewing Ethernet error statistics in a bar graph format You can view Ethernet Errors statistics in a bar graph format To view Ethernet errors statistics in a bar graph format 1 From the main menu choose Statistics Ethernet Errors The Ethernet Errors page opens Figure 45 on page 109 Using Web based Management for the BayStack 380 24F Gigabit Switch 112 Chapter 6 Viewing system statistics 2 In the port row of your choice click the bar graph icon The Ethernet Errors Chart page opens in a bar graph format Figure 47 Figure 47 Ethernet Error Chart in a bar graph format Staticticn gt Bhasi Error Chart B8 di B Das Im rea Hie a Ba m 3 To update the statistical information click Update or click Back to return to the Ethernet Errors page Viewing transparent bridging statistics You can view the transparent bridging statistics measured for each monitored interface on the device To view transparent bridging statistics 1 From the main menu choose Statistics Transparent Bridging The Transparent Bridging page opens Figure 48 214394 A Chapter 6 Viewing system statistics 113 Figure 48 Transparent B
103. nstance of vacmViewFamilySubtree defines a family of view subtrees View Type 1 Included Choose to include or exclude a family of view subtrees vacmViewTreeFamilyType 2 Excluded Entry Storage 1 Volatile Choose your storage preference Selecting Volatile requests vacmSecurityToGroupStorageType 2 Non Volatile information to be dropped lost when you turn the power off Selecting Non Volatile requests information to be saved in NVRAM when you turn the power off 2 In the Management Information Creation section type information in the text boxes or select from a list 3 Click Submit The new entry appears in the Management Information Table Figure 19 on page 61 Deleting an SNMPv3 management information view configuration To delete an existing SNMPv3 management information view configuration 1 From the main menu choose Configuration SNMPv3 Management Info View The Management Information page opens Figure 19 on page 61 2 Inthe Management Information Table click the Delete icon for the entry you want to delete A message opens prompting you to confirm your request 214394 A Chapter 4 Configuring the switch 63 3 Do one of the following e Click Yes to delete the management information view configuration e Click Cancel to return to the table without making changes Configuring an SNMPv3 system notification entry You can view a table of existing SNMPv3 system
104. number for each trunk member configured within this field is shown adjacent to the corresponding switch port on the following management pages Port Configuration and Spanning Tree Configuration There are no default settings Trunk Port Members Port 1 24 Type the port numbers to associate with the corresponding trunk Note You can configure two to four switch ports together as members of a trunk to a maximum of six trunks Switch ports can only be assigned a member of a single trunk There are no default settings STP Learning 1 Normal 2 Fast 3 Disabled Choose the parameter that allows the specified trunk to participate in the spanning tree This setting overrides those of the individual trunk members Selecting Fast shortens the state transition timer by two seconds The default setting is Normal Trunk Mode Trunk Name Basic The default operating mode of the switch When in Basic mode source MAC addresses are dynamically assigned to specific trunk members for flooding and forwarding This allows the switch to stabilize and distribute the data streams of source addresses across the trunk members Type a character string to create a unique name to identify the trunk for example Trunk1 The name if chosen carefully can provide meaningful information to you For example S1 T1 to FS2 indicates that Trunk1 in Switch1 connects to File Server 2 Trunk Status 1 Enabled 2 Di
105. o Utilization Table the trunk specified in the Trunk column Last 5 Minutes The percentage of packets of the type specified in the Traffic Type field used by the port in the last five minutes This field provides a running average of network activity and is updated every 15 seconds Last 30 Minutes The percentage of packets of the type specified in the Traffic Type field used by the port in the last 30 minutes This field provides a running average of network activity and is updated every 15 seconds Last Hour The percentage of packets of the type specified in the Traffic Type field used by the port in the last 60 minutes This field provides a running average of network activity and is updated every 15 seconds In the MultiLink Trunk Utilization Selection section type the Trunk number and traffic type to be monitored Click Submit The results of your request are displayed in the MultiLink Trunk Utilization Table Figure 69 on page 147 214394 A 149 Chapter 8 Support menu The customer support options available to you are e Using the online Help option next Downloading technical publications on page 150 e Upgrade option on page 151 Using the online Help option You can read information about Web based management user interface functions in the online Help menu embedded in the Web based management interface To open online Help 1 From the
106. om selected ports 1 From the main menu choose Application gt MAC Address Security gt Security Configuration The Security Configuration page opens Figure 52 2 Inthe MAC Security Table section click the icon in the Action column of the Clear By Ports row The Port List View Clear by Ports page opens Figure 57 Figure 57 Port List View Clear by Ports page Application MAC felines Security Port Lisi View Pp kon MAL aires Sorusty 5 tm snty or rr Chor m Foris Poi HOME zr 24 58 B 7 WY 80971213 ddia in iT 18 19 Mi 22 23 U B dd add dd qe p pn pr go ars apes qud qs pe di Ad di di ER 3 Select the ports you want to clear or click None 4 Click Submit 214394 A Chapter 7 Configuring application settings 127 Note When you specify a port or ports to be cleared using this field the specific port or ports will be cleared for each of the entries listed in the MAC Address Security Table If you totally clear the allowed Source Port s field leaving a blank field for an entry the associated MAC address for that entry is also cleared Enabling security on ports To enable or disable MAC address based security on the port 1 From the main menu choose Application gt MAC Address Security gt Port Configuration The Port Configuration page opens Figure 58 Figure 58 Port Configuration page Application gt MAC Address Security gt Port Configuration Mar Air re arwiy Pun Tangia
107. onfiguration 55 Configuring an SNMPv3 system user group membership 56 Mapping an SNMPv3 system usertoagroup 56 Deleting an SNMPv3 group membership configuration 57 Configuring SNMPv3 group access rights 58 Creating an SNMPv3 group access rights configuration 58 Deleting an SNMPv3 group access rights configuration 60 Configuring an SNMPv3 management information view 60 Creating an SNMPv3 management information view configuration 61 Deleting an SNMPv3 management information view configuration 62 Configuring an SNMPv3 system notification entry 63 Creating an SNMPv3 system notification configuration 63 Deleting an SNMPv3 system notification configuration 64 Configuring an SNMPv3 management target address 65 Creating an SNMPvS target address configuration 65 Deleting an SNMPv3 target address configuration 67 Configuring an SNMPv3 management target parameter 67 Creating an SNMPv3 target parameter configuration 67 Deleting an SNMPv3 target parameter configuration 69 Configuring an SNMP trap receiver 69 Creating an SNMP trap receiver configuration
108. ons fault event log viewing 88 fault threshold parameters configuring 85 deleting 88 history statistics viewing 96 RMON Threshold page 86 RMON about 85 S security MAC address based 119 Security Configuration page 119 Security field 128 Security page 119 Security Table page 124 security configuring passwords 29 remote dial in access 30 SNMP about 49 MAC address security 120 trap receivers configuring 69 deleting 70 SNMP Trap Receiver page 69 SNMPvI about 49 configuring 49 SNMPvI page 49 SNMPv3 about 49 configuring 51 group access rights Using Web based Management for the BayStack 380 24F Gigabit Switch 156 Index configuring 58 deleting 60 group membership configuring 56 deleting 57 management information views configuring 60 deleting 62 system information viewing 51 system notification entries configuring 63 deleting 64 target addresses configuring 65 deleting 67 target parameters configuring 67 deleting 69 user access configuring 53 deleting 55 software download LED indication descriptions 79 process 77 79 Software Download page 78 software version requirements Microsoft Internet Explorer 19 Netscape Navigator 19 Spanning Tree Protocol about 140 bridge switch settings configuring 142 managing 140 Stack Information page 37 stack information viewing 37 summary options viewing stack information 37 switch information 39 Support heading 21 Support menu online help
109. or authorized reseller contact the technical support staff for that distributor or reseller for assistance If you purchased a Nortel Networks service program contact one of the following Nortel Networks Technical Solutions Centers Technical Solutions Center Telephone Europe Middle East and Africa 33 4 92 966 968 800 ANORTEL or 800 466 7835 Asia Pacific 61 2 9927 8800 800 China 800 810 5000 North America An Express Routing Code ERC is available for many Nortel Networks products and services When you use an ERC your call is routed to a technical support person who specializes in supporting that product or service To locate an ERC for your product or service go to the www nortelnetworks com erc URL Using Web based Management for the BayStack 380 24F Gigabit Switch 18 Preface 214394 A 19 Chapter 1 Using the Web based management interface This chapter describes the reguirements for using the Web based management interface and how to use it as a tool to configure your BayStack 380 24F Gigabit Switch Requirements To use the Web based management interface you need the following items e A computer connected to any of the network ports e One of the following Web browsers installed on the computer Microsoft Internet Explorer version 4 0 or later on Windows 95 Windows 98 or Windows NT Netscape Navigator version 4 51 or later on Windows 95 Wind
110. ows 98 Windows NT and UNIX e The IP address of the BayStack 380 24F Gigabit switch Note The Web based management interface Web pages may load at different speeds depending on the Web browser you use Note In order to use the BayStack 380 24F Gigabit Switch Web based management functionality such as downloading software you must connect your management station to a BayStack 380 24F Gigabit Switch port Using Web based Management for the BayStack 380 24F Gigabit Switch 20 Chapter 1 Using the Web based management interface Logging in to the Web based management interface Before you log in to the Web based management interface use the console interface to verify the VLAN port assignments and to ensure that your switch CPU and your computer are assigned to the same VLAN If the devices are not connected to the same VLAN the IP address of the switch will not open the home page To log in to the Web based management interface Start your Web browser 2 In the Web address field type the IP address for your host switch for example http 10 30 31 105 and press Enter The home page opens Figure 1 Figure 1 Web based management interface home page A dmintsiratn gt System iefrrmaiion BayStack 380 24F karem IHi Jur e Dee il Decir weHiaTbra Fi Mewes 73 Darcos alias pd cra mw mari Network security does not yet exist the first time you access the Embedded Web Server As the system admin
111. pe the default number of retires to be attempted when a snmpTargetAddrRetryCount response is not received for a generated message An application may provide its own retry count in which case the value of this object is ignored Target Tag List 1 20 Type the space separated list of tag values to be used to snmpTargetAddrTagList select target addresses for a particular operation Target Parameter Entry 1 32 Type a numeric string to identify an entry in the snmpTargetAddr snmpTargetParamsTable The identified entry contains SNMP parameters to be used when generated messages to be sent to this transport address Entry Storage 1 Volatile Choose your storage preference Selecting Volatile requests 2 Non Volatile information to be dropped lost when you turn the power off Selecting Non Volatile requests information to be saved in NVRAM when you turn the power off 2 select from a list Click Submit In the Target Address Creation section type information in the text boxes or The new entry is displayed in the Target Address Table Figure 21 on page 65 Note This Target Address Table section of the Target Address page contains hyperlinks to the Target Parameter page 214394 A Chapter 4 Configuring the switch 67 Deleting an SNMPv3 target address configuration To delete an SNMPv3 target address configuration 1 From the main menu choose Configuration gt SNMPv3 gt Target Address The Target Addr
112. quirements 19 MultiLink Trunking MLT about 144 configuring 144 monitoring traffic 147 N Netscape Navigator software version requirements 19 network administrator contact information 44 45 network security protecting system integrity 20 Notification page 63 O online help accessing 149 P passwords setting console 29 remote dial in access 30 Telnet 29 Web 29 port autonegotiation speed configuring 74 port communication speed configuring 83 214394 A Port Configuration page 127 Port Configuration page STP 140 Port Configuration page VLAN 137 Port Information page 138 Port List field 120 122 Port List page 122 Port Lists page 121 Port Management page 74 port mirroring about 117 configuring 117 Port Mirroring page 118 Port page 99 port statistics viewing 99 100 viewing in a bar graph format 104 viewing in a pie chart format 103 zeroing ports 102 product support 17 publications hard copy 17 related 16 R Radius page 30 release notes obtaining 21 remote dial in access configuring 30 Reset page 34 Reset to Defaults page 34 resetting the switch stack 34 resetting the switch stack to system defaults 34 RMON Ethernet statistics viewing 92 viewing in a bar graph format 94 viewing in a pie chart format 95 history statistics viewing 96 Index 155 viewing in a line graph format 98 RMON Ethernet page 92 RMON Event Log page 89 RMON History page 96 RMON opti
113. r Type the event entry to be used when a rising threshold is crossed Note When the current sampled value is greater than or equal to this threshold and the value at the last sampling interval was less than this threshold a single event will be generated After a rising event is generated another such event is not generated until the sampled value falls below this threshold and reaches the Falling Threshold Rising Action 1 None Choose the type of notification for the event Selecting Log generates an entry in 2 Log the RMON Event Log table for each event Selecting SNMP Trap sends an 3 SNMP Trap SNMP trap to one or more management stations 4 Log and Trap Interval Type the time period in seconds to sample data and compare the data to the rising and falling thresholds Sample Alarm Sample 1 Absolute 2 Delta Choose the sampling method Absolute Absolute alarms are defined on the current value of the alarm variable An example of an alarm defined with absolute value is card operating status Because this value is not cumulative but instead represents states such as card up value 1 and card down value 2 you set it for absolute value Therefore an alarm could be created with a rising value of 2 and a falling value of 1 to alert a user to whether the card is up or down Delta Most alarm variables related to Ethernet traffic are set to delta value Delta alarms are defined based on the difference in the val
114. r ri aia Firmi iy Table 23 describes the items on the Target Parameter page Table 23 Target Parameter page items Item Range Description XI Deletes the row Parameter Tag 1 32 Type a unique character string to identify the parameter tag snmpTargetParamsRowStatus Msg Processing Model 0 SNMPv1 Choose the message processing model to be used when snmpTargetParamsMPModel 1 SNMPv2c generating SNMP messages using this entry 2 SNMPv2 3 SNMPv3 USM Security Name 1 32 Type the principal on whose behalf SNMP messages are snmpTargetParamsSecuirtyName generated using this entry Security Level 1 noAuthNoPriv Choose the level of security to be used when generating snmpTargetParamsSecuirtyLevel 2 authNoPriv SNMP messages using this entry Entry Storage 1 Volatile Choose your storage preference Selecting Volatile requests snmpTargetParamsStorageType 2 Non Volatile information to be dropped lost when you turn the power off Selecting Non Volatile requests information to be saved in NVRAM when you turn the power off 2 In the Target Parameter Creation section type information in the text boxes or select from a list 3 Click Submit The new entry appears in the Target Parameter Table Figure 22 on page 68 214394 A Chapter 4 Configuring the switch 69 Deleting an SNMPv3 target parameter configuration To delete an SNMPv3 target parameter configuration 1 From the ma
115. racter string that the vendor created to uniguely identify this device System Up Time The elapsed time since the last network management portion of the system was last re initialized Note This field is updated only when the screen is redisplayed System Name 0 255 Type a character string to create a name to identify the switch for example Finance Group System Location 0 255 Type a character string to create a name for the switch location for example First Floor System Contact 0 255 Type a character string to create the contact information for the network manager or the selected person to contact regarding switch operation for example mcarlson company com Note To operate correctly with the Web interface the system contact should be an e mail address 2 Type information in the text boxes 3 Click Submit Using Web based Management for the BayStack 380 24F Gigabit Switch 46 Chapter 4 Configuring the switch TELNET Configuration screen The TELNET Configuration screen Figure 13 allows a user at a remote console terminal to communicate with the BayStack 380 24F Gigabit Switch as if the console terminal were directly connected to it You can have up to four active Telnet sessions at one time To open the TELNET Configuration screen gt Choose TELNET Configuration or press t from the main menu Figure 13 TELNET Configuration screen HERTEL Configuration gt Telnet Configuration NETWORKS leet 5erings
116. rames or unregistered frames You can also prioritize the order in which the switch forwards untagged packets on a per port basis To configure broadcast domains 1 From the main menu choose Application VLAN Port Configuration The Port Configuration page opens Figure 64 Figure 64 Port Configuration page Applicata gt VL AN gt Fart Cunfigerilien VLBA Puri te Finy Table 52 describes the items on the Port Configuration page Using Web based Management for the BayStack 380 24F Gigabit Switch 138 Chapter 7 Configuring application settings Table 52 Port Configuration page items Item Range Description Port 1 24 The port number Port Name 1 16 Type character string to create a unigue port name for example Port 1 Filter Untagged 1 Yes Choose how to process filter untagged frames Frames 2 No When a flag is set the frames are discarded by the forwarding process The default setting is No no frames discarded PVID 1 4094 Type the number of the VLAN ID to assign to untagged frames received on this trunk port For example a port with a PVID of 3 assigns all untagged frames received on this port to VLAN 3 The default setting is 1 Link Type 1 Untagged Access Choose the link type for each port 2 Tagged Trunk 2 Inthe upper left hand corner click on the switch number of the switch to monitor Type information in the text boxes or select from a list Cl
117. re 55 Figure 55 Port List View Learn by Ports page Applicatinm MAC Abirerzs security Pori List Viza acutum MAC Rara Sor y gt Rees Clips Gear by Paris Port HONEI Z 34 5 H 7 T 3DTI 12 12 T4 12 IE AT IA 13 m Su 4 IE po pr HE wb s pen er ps pro esas aeo PIE IE REINES RESIES LP arm a Click the ports through which you want the switch to learn MAC addresses or click None Using Web based Management for the BayStack 380 24F Gigabit Switch 124 Chapter 7 Configuring application settings b If you want that port to no longer learn MAC addresses click the checked box to uncheck it C Click Submit 5 Inthe MAC Security Table section choose Enabled in the Current Learning Mode column of the Learn By Ports row 6 Click Submit Note You cannot include any of the port values you have chosen for the secure ports field Adding MAC addresses To add MAC address to the MAC address based security system 1 In the main menu choose Applications gt MAC Address Security gt Security Table It may take awhile for the required addresses to be learned Then the Security Table page opens Figure 56 Figure 56 Security Table page Application gt MAC Address Security gt Security Tabla BAL Add ese Security Tablo S MAT Addas Allirarad Sourek BAL dns Security Table Drey Ore san MAC Aridia Aowa Source B 214394 A Chapter 7 Configuring application settings 125
118. received that were less than 64 octets long excluding framing bits but including FCS octets and were otherwise well formed Oversize The number of packets received that were longer than 1518 octets long excluding framing bits but including FCS octets and were otherwise well formed Fragments The number of packets received that were less than 64 octets in length excluding framing bits but including FCS octets and had either a bad FCS with an integral number of octets FCS Error or a bad FCS with a non integral number of octets Alignment Error Collisions The best estimate number of collisions on this Ethernet segment Jabbers The number of packets received that were longer than 1518 octets in length excluding framing bits but including FCS octets and had either a bad FCS with an integral number of octets FCS Error or a bad FCS with a non integral number of octets Alignment Error Packets The number of octets received including bad packets in length excluding framing bits but 64 bytes including FCS octets 2 Click Submit The RMON Ethernet Statistics Table is updated with information about the selected device Figure 34 on page 92 Using Web based Management for the BayStack 380 24F Gigabit Switch 94 Chapter 5 Configuring remote network monitoring RMON Viewing RMON Ethernet statistics in a bar graph format To view RMON Ethernet statistics in a bar graph format 1 From the main menu choose St
119. ridging page HIJATEL HETWCHXS aam ES s Tampe Rad ore i yu er UH EE LE TT SEE FEJ FI trs tei ay d E T TE x E BE a aT EEEEEEEEEEE 3935555552 Table 41 describes the items on the Transparent Bridging page Table 41 Transparent Bridging page items Item Description Ly e Displays statistics in a pie chart format Port The port number that corresponds to the selected switch Displays statistics in a bar graph format dotidTpPortinFrames The number of frames that have been received by this port from its segment A frame received on the interface corresponding to this port is counted only if it is for a protocol being processed by the local bridging function including bridge management errors dotidTpPortOutFrames The number of frames that have been transmitted by this port from its segment A frame received on the interface corresponding to this port is counted only if it is for a protocol being processed by the local bridging function including bridge management errors dotidTpPortinDiscards The number of valid frames received which were discarded by the forwarding process 2 To refresh the statistical information click Update Using Web based Management for the BayStack 380 24F Gigabit Switch 114 Chapter 6 Viewing system statistics Viewing transparent bridging statistics in a pie chart format You can view measured transparent bridging st
120. roring MAC Address Secuity VLAN Spanning Tree Multilink Trunk Administration System Information Security Logout Reset Reset to Defaults Support Help Release Notes Manuals Upgrades 214394 A Chapter 1 Using the Web based management interface 23 Tools are provided in the menu to assist you in navigating the Web based management interface Caution Web browser capabilities such as page bookmarking refresh and page forward and page back function as they would in any other Web site However these capabilities do not enhance the functionality of the Web based management interface Nortel Networks recommends that you use only the navigation tools provided in the management interface Table 2 describes the icons that appear on the menu Table 2 Menu icons Button or icon Description This icon identifies a menu title Click on this icon to display its options This icon identifies a menu title option Click on this icon to display the E corresponding page This icon identifies a menu title option with a hyperlink to related pages E 3 This icon is linked to an action for example logout reset or reset to yp system defaults Clicking on the Nortel Networks logo opens the corporate home page in a HEJRTEL new Web browser NETWORKS Using Web based Management for the BayStack 380 24F Gigabit Switch 24 Chapter 1 Using the Web based management interf
121. ry 96 Viewing RMON statistics inalinegraphformat 98 Chapter 6 Viewing system statistics 99 Viewing port statisties IIIA eee eat ee 99 Zeroing PONS AE Pee bee N OT OE ON OT ueber OE eae 102 Viewing port statistics in a pie chart format 103 Viewing port statistics in a bar graph format 104 Viewing interface statistics 105 Viewing interface statistics in a pie chart format 107 Viewing interface statistics in a bar graph format 108 Viewing Ethernet error statistics 109 Viewing Ethernet error statistics in a pie chart format 111 Viewing Ethernet error statistics in a bar graph format 111 Viewing transparent bridging statistics 112 Viewing transparent bridging statistics in a pie chart format 114 Using Web based Management for the BayStack 380 24F Gigabit Switch 8 Contents Viewing transparent bridging statistics in a bar graph format 114 Chapter 7 Configuring application settings 117 Configuring port mirroring 117 Mac address security aosa EER swat aa
122. s High Q Weight Specifies the high queue weight Highest Q Specifies the highest queue weight Weight Traffic Class Priority To enter a Traffic Class Priority 1 From the main menu choose Application Configuration Traffic Class Priority The Configuration Traffic Class Priority page opens Figure 63 2 In the Traffic Class priority page specify priority levels for one or more of the eight different priorities 3 Click on the Submit button Figure 60 Traffic Class Priority page Configuration gt Traffic Class Priority Tee Clim Pilati Satin Printy i Priority 1 Pia Pona Poiutity d Priory 5 Pilimi 6 Priori 7 Mes E Fo 214394 A Chapter 7 Configuring application settings 131 Table 51 describes the items on the Traffic Class Priority page Table 48 Traffic Class Priority items Type of Setting Priority Description Traffic Class Priority Setting Priority 0 Specifies priority 0 Priority 1 Specifies priority 1 Priority 2 Specifies priority 2 Priority 3 Specifies priority 3 Priority 4 Specifies priority 4 Priority 5 Specifies priority 5 Priority 6 Specifies priority 6 Priority 7 Specifies priority 7 Port based VLANs A port based VLAN is a VLAN in which the ports are explicitly configured to be in the VLAN When you create a port based VLAN on a switch you assign a VLAN identification number VLAN ID and spec
123. s not include multicast packets Broadcast The number of good packets received that were directed to the broadcast address This does not include multicast packets Multicast The number of good packets received that were directed to the multicast address This does not include packets sent to the broadcast address CRC Align Errors The number of packets received that had a length excluding and 1518 octets inclusive but had either a bad Frame FCS with an integral number of octets FCS errors with a non integral number of octets alignment error Undersize The number of packets received that were less than 64 octets long excluding framing bits but including FCS octets and were otherwise well formed Oversize The number of packets received that were longer than 1518 octets long excluding framing bits but including FCS octets and were otherwise well formed 2 Click Submit The Port Statistics Table is updated with information about the selected device and port Figure 37 Using Web based Management for the BayStack 380 24F Gigabit Switch 98 Chapter 5 Configuring remote network monitoring RMON Viewing RMON statistics in a line graph format You can view RMON statistical data in a line graph format To view statistics in a line graph format 1 From the main menu choose Statistics gt RMON History The RMON History page opens Figure 37 on page 97 2 In the RMON History Statistics Table click th
124. sabled Choose to enable or disable any of the existing MultiLink Trunks Note When a trunk is not active Trunk Status field set to Disabled configuration changes do not take effect until you set the Trunk Status field to enabled 2 Type information in the text boxes or select from a list 3 Click Submit in any section to save your changes 214394 A Chapter 7 Configuring application settings 147 Monitoring MLT traffic You can monitor the bandwidth usage for the MultiLink Trunk member ports within each trunk in your configuration by selecting the traffic type to monitor To monitor MultiLink Trunk traffic 1 From the main menu choose Application gt MultiLink Trunk gt Utilization The Utilization page opens Figure 69 Figure 69 Utilization page Application gt Multi ink Trunk gt Lilir asm Mali ak liari Rie e Enn Aar Hd Taa Taaflic Typa r iTe wj Table 57 describes the items on the Utilization page Using Web based Management for the BayStack 380 24F Gigabit Switch 148 Chapter 7 Configuring application settings Table 57 Utilization page items Section Item Range Description MultiLink Trunk Trunk 1 6 Choose the trunk to be monitored Utilization Selection View By Traffic Type 1 RX and TX Choose the traffic type to be monitored for percentage of 2 RX bandwidth utilization 3 TX MultiLink Trunk Port A list of the trunk member switch ports that correspond t
125. se whether or not to retrieve the configuration image from a Image from Server 2 No server If you choose Yes the download process begins immediately and when completed causes the switch to reset with the new configuration parameters 2 Type information in the text boxes or select from a list 3 Click Submit Requirements for storing or retrieving parameters on a TFTP server The following requirements apply when storing and retrieving configuration parameters on a TFTP server The Configuration File feature can only be used to copy switch configuration parameters to other switches A configuration file obtained from a switch can only be used to configure other switches that have the same firmware revision and model type as the donor switch The configuration file also duplicates any settings that exist for any GBIC that is installed in the donor switch If you use the configuration file to configure another switch that has the same GBIC model installed the configuration file settings will also apply to and override the existing GBIC settings Using Web based Management for the BayStack 380 24F Gigabit Switch 82 Chapter 4 Configuring the switch Table 31 describes the parameters that are not saved to the configuration file Table 31 Parameters not saved to the configuration file These parameters are not saved Used in this screen IP Configuration Setup In Band Switch IP Address In Band Subnet Mask
126. ter 4 Configuring the switch Table 13 SNMPv1 page items Figure 14 SNMPv1 page Bure oe BE de amp unflguralian FIAT Community string Setting Eend Og Cement Berg Handels Carmenit Tieng oo oe Trap Mode Etna Athenien Trag 7i E Auto Ta pale Berry Table 13 describes the items on the SNMPv1 page Section Item Range Description Community String Read Only 1 32 Type a character string to identify the community string for the Setting Community SNMPv1 read only community for example public or private String The default value is public Read Write 1 32 Type a character string to identify the community string for the Community SNMPv1 read write community for example public or private String The default value is private Trap Mode Authentication 1 Enable Choose to enable or disable the authentication trap Setting Trap 2 Disable AutoTopology AutoTopology 1 Enable Choose to enable or disable the autotopology feature Setting 2 Disable 2 Type information in the text boxes or select from a list 3 Click Submit in any section to save your changes 214394 A Chapter 4 Configuring the switch 51 Configuring SNMPv3 This section describes the steps to build and manage SNMPv3 in the Web based management user interface Viewing SNMPv3 system information You can view information about the SNMPv3 engine that exists and the private protocols that
127. the row Trap Receiver Index 1 4 Choose the number of the trap receiver to create or modify IP Address XXX XXX XXX XXX Type the network address for the SNMP manager that is to receive the specified trap Community 0 32 Type the community string for the specified trap receiver 2 In the Trap Receiver Creation section type information in the text boxes or select from a list 3 Click Submit The new entry is displayed in the Trap Receiver Table Figure 23 Deleting an SNMP trap receiver configuration To delete SNMP trap receiver configurations 1 From the main menu choose Configuration SNMP Trap Receiver The SNMP Trap Receiver page opens Figure 23 214394 A Chapter 4 Configuring the switch 71 2 In the Trap Receiver Table click the Delete icon for the entry you want to delete A message opens prompting you to confirm your request 3 Do one of the following e Click Yes to delete the SNMP trap receiver configuration e Click Cancel to return to the table without making changes Viewing learned MAC addresses by VLAN You can view MAC addresses and their associated port or trunk that the switch configuration has learned based on the VLAN you select To view learned MAC addresses and their associated port or trunk 1 From the main menu choose Configuration MAC Address Table The MAC Address Table page opens Figure 24 Figure 24 MAC Address Table page amp
128. thin the Web based management user interface Table 7 User levels and access levels User level User name for Password for each Access Level each level user level Read only RO XXXXXXXX Read only Read write RW XXXXXXXX Full read write access Using Web based Management for the BayStack 380 24F Gigabit Switch 34 Chapter 2 Administering the switch Resetting the BayStack 380 24F Gigabit Switch You can reboot a BayStack 380 24F switch without erasing any configured switch parameters While rebooting the switch initiates a self test that comprises various diagnostic routines and subtests The LEDs display various patterns to indicate that the subtests are in progress To reboot the BayStack 380 24F Gigabit Switch without making changes since your last Submit request 1 From the main menu choose Administration Reset The system prompts you to select ok to reset the switch or cancel 2 Click ok to reset the switch Changing the BayStack 380 24F Gigabit Switch to system defaults You can change a switch and replace all configured switch parameters with the factory default values Caution If you choose change to default settings all configured settings are replaced with factory default settings when you click Submit For more information on factory default settings see Using the BayStack 380 24F Gigabit Switch 214391 A During the process of changing to default settings the switch initiates a
129. tics 99 transparent bridging statistics 112 T tables and input forms about 24 Target Address page 65 Target Parameter page 67 technical publications 17 technical publications downloading 150 technical support 17 TELNET Access field 47 TELNET Configuration screen 46 Telnet Password Setting page 29 text conventions 16 Transparent Bridging page 112 transparent bridging statistics viewing 112 113 viewing in a bar graph format 114 viewing in a pie chart format 114 troubleshooting address filtering 119 U user interface upgrading 151 Utilization page 147 Index 157 V VLAN Configuration Port Based modification page 130 134 Port Based Setting page 129 133 VLAN Configuration page 132 VLANS about 128 broadcast domains configuring 137 configuring 132 deleting 136 MAC SA based configuring 131 136 port information viewing 138 port based about 131 configuring 133 selecting a management VLAN 136 W Web browser requirements 19 Web Help file accessing 21 Web Password Setting page 29 Web based management interface home page graphic 20 logging in 20 main menu icons 23 25 management page 24 navigating the menu 21 requirements to use 19 Using Web based Management for the BayStack 380 24F Gigabit Switch 158 Index 214394 A
130. ts the corresponding port to match the best service provided by the connected station The default setting is Enabled Speed Duplex 1000Mbs Full The default setting Configuring flow control To configure flow control In the port row of your choice select from the lists 3 Click Submit You can set switch port parameters for GBICs for flow control From the main menu choose Configuration gt Flow Control The Flow Control page opens Figure 27 Using Web based Management for the BayStack 380 24F Gigabit Switch 76 Chapter 4 Configuring the switch Figure 27 Flow Control page Configuration gt Flow Control Flew Conia settings ENT EET N 1 Enea Uni reni Dina kee z Eraakr Uninewn Casa beg i3 Ens kid Lini ferri Diis lad E Ersag Linirn Cinai kei I8 Ermi ba Linknawn Dias la lg Erki Liik reran ETELE T Eren Umnmwn Deia Ia Ens kid Li fern TE TT I Erain Linirn Disases 10 Enabled T COMEs Full Spiret n Erki Uri renes Dinas 12 Era Linkngwn EIE TT 13 Enas las Uni ferr TE TT TE Eraikad Lirie Disales IE maa Link ran Dias kas 214394 A Chapter 4 Configuring the switch 77 Table 27 describes the items on the High Speed Flow Control page Table 27 High Speed Flow Control page items Item Range Description Autonegotiation 1 Enabled Choose to enable or disable the autonegotiation feature 2 Disabled When enabled the port supports 1000Mb s oper
131. uals embody Nortel Networks and its licensors confidential and proprietary intellectual property Licensee shall not sublicense assign or otherwise disclose to any third party the Software or any information about the operation design performance or implementation of the Software and user manuals that is confidential to Nortel Networks and its licensors however Licensee may grant permission to its consultants subcontractors and agents to use the Software at Licensee s facility provided they have agreed to use the Software only in accordance with the terms of this license 3 Limited warranty Nortel Networks warrants each item of Software as delivered by Nortel Networks and properly installed and operated on Nortel Networks hardware or other equipment it is originally licensed for to function substantially as described in its accompanying user manual during its warranty period which begins on the date Software is first shipped to Licensee If any item of Software fails to so function during its warranty period as the sole remedy Nortel Networks will at its discretion provide a suitable fix patch or workaround for the problem that may be included in a future Software release Nortel Networks further warrants to Licensee that the media on which the Software is provided will be free from defects in materials and workmanship under normal use for a period of 90 days from the date Software is first shipped to Licensee Nortel Networks will replac
132. ue of the alarm variable between the start of the polling period and the end of the polling period Delta alarms are sampled twice per polling period For each sample the last two values are added together and compared to the threshold values This process increases precision and allows for the detection of threshold crossings that span the sampling boundary Therefore if you keep track of the current values of a given delta valued alarm and add them together the result is twice the actual value This result is not an error in the software Using Web based Management for the BayStack 380 24F Gigabit Switch 88 Chapter 5 Configuring remote network monitoring RMON 2 In the RMON Threshold Creation section type information in the text boxes or select from a list 3 Click Submit The new configuration is displayed in the RMON Threshold Table Figure 31 on page 86 Note RMON threshold configurations are not modifiable They must be deleted and the information recreated Deleting an RMON threshold configuration To delete an existing RMON threshold configuration 1 From the main menu choose Fault RMON Threshold The RMON Threshold page opens Figure 31 on page 86 2 Inthe RMON Threshold Table click the Delete icon for the entry you want to delete A message opens prompting you to confirm your request 3 Do one of the following e Click Yes to delete the RMON threshold configuration e Click Cancel to r
133. uring system security 29 Setting console Telnet and Web passwords 29 Configuring remote dial in access security 30 Accessing the management interface 32 Resetting the BayStack 380 24F Gigabit Switch 34 Logging out of the management interface 35 Chapter 3 Viewing summary information 37 Viewing information 23 EES edu EE MEDE SE OE RED REIR ER Ed due 37 Viewing GBIC information sssllesell nh 39 Using Web based Management for the BayStack 380 24F Gigabit Switch 6 Contents Chapter 4 Configuring the switch 41 Configuring BootP IP and gateway settings 42 Modifying system settings AA Ee ee IIIA 44 TELNET Configuration screen 46 About SNMP i e nen En RET Crude tege e qute reo Eq 49 Gonfig ring SNMPYT iss sa OER MEE SERE MEN ota UR Ru RC PP IF EE dae 49 Configuring SNMPV3 ss se EE DERE Re EE RR AG RE Re ed eS Bg ohne E RE eb oe Om 51 Viewing SNMPv3 system information 51 Configuring useraccesstoSNMPV3 53 Creating an SNMPv3 system user configuration 53 Deleting an SNMPv3 system user c
134. value has in your network topology before making changes The default settings is Normal Learning Priority The bridge spanning tree parameter that prioritizes the port s lowest path cost to the root When one or more ports have the same path cost the STA selects the path with the highest priority lowest numerical value Path Cost The bridge spanning tree parameter that determines the lowest path cost to the root State The current state of the port as defined by application of the Spanning Tree Protocol This state controls what action a port takes on reception of a frame Note If the bridge has detected a port that is malfunctioning it will place that port into the broken 6 state For ports which are disabled this object will have a value of disabled 1 2 In the port row s of your choice choose to enable STP normal learning or fast learning or disable STP 3 Click Submit The results of your request are displayed in the Spanning Tree Port configuration page Figure 66 on page 140 Using Web based Management for the BayStack 380 24F Gigabit Switch 142 Chapter 7 Configuring application settings Changing Spanning Tree bridge switch settings You can view and configure existing Spanning Tree switch settings To configure Spanning Tree switch settings 1 From the main menu choose Application gt Spanning Tree gt Bridge Information The Bridge Information page opens Figure 67 Figure
135. ytes The number of packets this size received transmitted successfully on this port Packets 256 511 bytes The number of packets this size received transmitted successfully on this port Packets 512 1023 bytes The number of packets this size received transmitted successfully on this port Packets 1024 or more bytes The number of packets this size received transmitted successfully on this port Max 9216 Bytes The maximum number of packets received transmitted successfully on this port Control Packets FCS Errors The number of controlled packets received on the port The number of valid size packets received on this port with proper framing but discarded because of cyclic redundancy check CRC errors Undersized Packets The number of packets received on this port with fewer than 64 bytes and with proper CRC and framing also known as short frames or runts Oversized Packets The number of packets that were received on this port with proper CRC and framing that meet the following requirements e 1518 bytes if no VLAN tag exists e 1522 bytes if a VLAN tag exists Filtered Packets The number of packets filtered but not forwarded on this port Flooded Packets The number of packets flooded forwarded through this port because the destination address was not recognized in the address database Frame Errors The number of valid size packets received on this port but

Download Pdf Manuals

image

Related Search

Related Contents

1098号 - 静岡県漁業協同組合連合会    DIDAC-100700 Simulateur d`accouchement avec bébé de  Cajas industriales aislantes  CE SAR Test Report  

Copyright © All rights reserved.
Failed to retrieve file