Home
NETGEAR XS712T-100NES Switch User Manual
Contents
1. 3 To view additional information about the remote device click the link in the MSAP Entry field A popup window displays information for the selected port MED Details Neighbors Information Port Details Local Port MSAP Entry Basic Details Chassis ID SubType Chassis ID Port ID SubType Port ID Port Description System Name System Description System Capabilities Managed Address MAC Address 00 14 6C 34 5F 4F MAC Address 00 14 6C 34 5F 51 FSM7352S 48 4 L3 Stackable Switch bridge router o Address Pr Interface Interface SubType 2 SubType Number MAC PHY Details Auto Negotiation Supported True Auto Negotiation Enabled Auto Negotiation Advertised Capabilities Operational MAU Type True Unknovn Capabilities Supported Current Capabilities Device Class PoE Device Type PoE Power Source PoE Power Priority PoE Power Value Hardware Revision Firmware Revision Software Revision Serial Number Model Name Asset ID Location Information Civic Coordinates ECS ELIN Unknown Network Policies Capabilities Network Policy Inventory Capabilities Network Policy Inventory Network Connectivity 15D35B4U00224 FSM7352S Application User bi N P rone LAN ID VLAN Type Priority DSC LLDP Unknown TLVs Type 66 XS712T Smart Switch The following table describes the information transmitted by the neighbor Field Description Port Details
2. 0 000 eee Appendix D Hardware Specifications and Default Values XS712T Smart Switch Specifications 20000005 XS712T Switch Features and Defaults 00 000 e Appendix E Notification of Compliance Getting Started This manual describes how to configure and operate the XS712T Smart Switch by using the web based graphical user interface GUI The manual describes the software configuration procedures and explains the options available within those procedures Note For information about issues and workarounds see the release notes for the XS712T Smart Switch Getting Started with the XS712T Smart Switch This chapter provides an overview of starting your NETGEAR XS712T Smart Switch and accessing the user interface It also leads you through the steps to use the Smart Control Center utility This chapter contains the following sections Switch Management Interface Connect the Switch to the Network Discover a Switch in a Network with a DHCP Server Discover a Switch in a Network without a DHCP Server Configure the Network Settings on the Administrative System Access the Management Interface from a Web Browser Understand the User Interfaces Interface Naming Convention Online Help Registration XS712T Smart Switch Switch Management Interface The NETGEAR XS712T Smart Switch contain an embedded web server and management software for managing and monitoring switch functions T
3. Use the buttons at the bottom of the screen to perform the following actions e Click Clear to clear one or all of the IGMP Snooping entries e Click Refresh to reload the screen and display the most current information IGMP Snooping VLAN Configuration Use the IGMP Snooping VLAN Configuration screen to configure IGMP snooping settings for VLANS on the system gt To configure IGMP snooping settings for VLANs 1 Select Switching gt Multicast gt IGMP Snooping gt IGMP Snooping VLAN Configuration IGMP Snooping VLAN Configuration IGMP Snooping VLAN Configuration Fast Leave nate Response Query Interval VLAN ID Host Ti t MRouter Ti t Mod Em Admin Mode 1 to 1800 secs ew dq Ww 3ww NH o 0I e M 2 Enter the VLAN ID in the appropriate field and configure the IGMP Snooping values Fast Leave Admin Mode Enable or disable the IGMP Snooping Fast Leave Mode for the specified VLAN ID Enabling fast leave allows the switch to immediately remove the Layer 2 LAN interface from its forwarding table entry upon receiving an IGMP leave message for that multicast group without first sending out MAC based general queries to the interface You should enable fast leave admin mode only on VLANs where only one host is connected to each layer 2 LAN port This prevents the inadvertent dropping of the other hosts that were connected to the same layer 2 LAN 118 gt 3 XS712T Smart Switch port but were still intere
4. 161 XS712T Smart Switch Class Configuration Use the Class Configuration screen to add a new DiffServ class name or to rename or delete an existing class The screen also allows you to define the criteria to associate with a DiffServ class As packets are received these DiffServ classes are used to prioritize packets You can have multiple match criteria in a class The logic is a Boolean logical and for this criteria After creating a Class click the class link to the Class screen Tocreate a DiffServ class 1 Select QoS DiffServ Advanced Class Configuration Class Configuration Class Configuration ECI 2 n the Class Name field enter a class name 3 Select the class type 4 Click Add The switch supports only the Class Type value All which means all the various match criteria defined for the class should be satisfied for a packet match All signifies the logical AND of all the match criteria Torename an existing class 1 Select the check box next to the configured class 2 Under Class Name update the name 3 Click Apply Todelete a class 1 Select the check box next to the class name 2 Click Delete Toconfigure the class match criteria 1 Click the class name for an existing class Class Configuration Class Configuration _ class name class Type OL m O at All The class name is a hyperlink The following figure shows the configuration fields for the class
5. Password control access 1 Idle timeout 7 5 mins Password password Management security 1 profile with 20 rules for HTTP HTTPS SNMP access to allow deny an IP address subnet All IP addresses allowed Port MAC lock down Boot code update All ports 1 Disabled N A DHCP manual IP 1 DHCP enabled 192 168 0 239 Default gateway 192 168 0 254 System name configuration 1 NULL Configuration save restore 1 N A Firmware upgrade 1 N A Restore defaults 1 Web and front panel button N A Dual image support 1 Enabled Factory reset 1 N A Multi session Web connections 4 Enabled SNMPv1 V2c Max 5 community entries Enabled read read write SNMP v3 communities Time control 1 Local or SNTP Local Time enabled LLDP LLDP MED All ports Enabled Logging 3 Memory Flash Server Memory Log enabled MIB support 1 Disabled Smart Control Center N A Enabled Statistics N A N A IGMP snooping v1 v2 v3 All ports Disabled Configurations upload download 1 N A EAPoL flooding All ports Disabled BPDU flooding All ports Disabled Static multicast groups 8 Disabled Filter multicast control 1 Disabled Number of static routes 32 N A 305 XS712T Smart Switch Table 47 Switch features and defaults Continued Feature Sets Supported Default Number of routed VLANs 15 N A Number of ARP Cache entries 1024 N A
6. Results 2 Inthe Hostname IP Address field specify the IP address or the hostname of the station you want the switch to ping The initial value is blank This information is not retained across a power cycle 3 Configure the following settings Probes Per Hop Specify the number of times each hop should be probed The valid range is 1 10 MaxTTL Specify the maximum time to live for a packet in number of hops The valid range is 1 255 InitTTL Specify the initial time to live for a packet in number of hops The valid range is 1 255 MaxFail Specify the maximum number of failures allowed in the session The valid range is 0 255 Interval Specify the time between probes in seconds The valid range is 1 60 Port Specify the UDP destination port in probe packets The valid range is 1 65535 Size Specify the size of probe packets The valid range is 0 65507 4 Click Apply to initiate the traceroute The results are displayed in the TraceRoute area 282 XS712T Smart Switch Troubleshooting Chart The following table lists symptoms causes and solutions of possible problems Table 45 Troubleshooting chart Symptom Cause Solution Power LED is off No power is received Check the power cord connections for the switch at the switch and the connected AC power source Link ACT LED is off Port connection is not working Check the crimp on the when a cable connectors and make sure
7. 212 XS712T Smart Switch ACL Wizard ACL Wizard helps you to create a simple ACL and apply it to the selected ports easily and quickly First you can select an ACL type Then you can add an ACL rule to this ACL and a rule can be applied this ACL on the selected ports The ACL Wizard allows you only to create the ACL but does not allow you to modify it For information about how to modify it see the instructions on the to the ACL configuration screen Todisplay the ACL wizard screen Select Security ACL ACL Wizard 1 ACL Wizard ACL Type Selection ACL Type ACL Based on Destination MAC ACL Based on Destination MAC Action HEN Destination MAC Destination MAC AN Every Mask L d d 1 Binding Configuration Port Selection Table In the ACL Type field specify the ACL type used to create the ACL You can select one type from 10 optional types ACL Based on Destination MAC Use this to create an ACL based on the destination MAC address destination MAC mask and VLAN ACL Based on Source MAC Use this to create an ACL based on the source MAC address source MAC mask and VLAN ACL Based on Destination IPv4 Use this to create an ACL based on the destination IPv4 address and IPv4 address mask ACL Based on Source IPv4 Use this to create an ACL based on the source IPv4 address and IPv4 address mask ACL Based on Destination IPv6 Use this to create an ACL based on the destination IPv6 prefix and I
8. Go To Interface 2 To configure Multicast Router settings for a physical port enter the interface and click Go to select that particular interface 3 Select the interfaces for which you want to configure the CoS settings 128 XS712T Smart Switch e To configure Multicast Router settings for a Link Aggregation Group LAG click LAGS e To configure Multicast Router settings for both physical ports and LAGs click ALL 4 Use the Multicast Router field to enable or disable Multicast Router on the selected interface 5 Click Apply Multicast Router VLAN Configuration The statically configured router attached VLAN Interface is added to the learned multicast router attached interface list if the interface is active and is a member of the VLAN Unlike in the previous release of the system firmware Snooping dynamic learning mode snooping interface mode or snooping VLAN mode does not need not be enabled on the interface The dynamic learning mode is applicable only for dynamically learnt multicast router information Queries from an attached true Querier gt To configure the multicast router VLAN 1 Select Switching gt Multicast gt MLD Snooping gt Multicast Router Configuration VLAN Configuration Multicast Router VLAN Configuration Multicast Router VLAN Configuration Interface Multicast Router VLAN Configuration Z3 VLAN ID Multicast Router 2 Select the interface in unit slot port form
9. Use the features you access from the System navigation tab to define the switch s relationship to its environment The System navigation tab provides access to the configuration menus described in the following sections Management e SNMP e LLDP e Services DHCP Snooping Management This section describes how to display the switch status and specify some basic switch information such as the management interface IP address system clock settings and DNS information From the Management configuration menu you can access the following links e System Information e IP Configuration e Pv6 Network Configuration Pv6 Network Neighbor Time e Denial of Service e DNS Green Ethernet 26 XS712T Smart Switch System Information After a successful login the System Information screen displays Use this screen to configure and view general device information gt To define a system name location and contact 1 Select System Management System Information The System Information screen displays System Information System Information XS712T ProSafe 12 Port 10 Gigabit Ethernet 10GbE Smart Product Name 3 Switch 6 1 0 3 B6 1 0 1 System Name System Location System Contact Serial Number FBG12A7Y00025 System Object OID 1 3 6 1 4 1 4526 100 4 30 Date amp Time Apr 10 11 19 49 2000 UTC 0 00 System Up Time 0 days 0 hours 20 mins 16 secs Base MAC Address
10. EDOC in Languages of the European Community Cesky Czech NETGEAR Inc t mto prohlaSuje Ze tento Radiolan je ve shode se zakladnimi po adavky a dal mi pr slu n mi ustanoven mi smernice 1999 5 ES Dansk Undertegnede NETGEAR Inc erkl rer herved at f lgende udstyr Radiolan Danish overholder de v sentlige krav og vrige relevante krav i direktiv 1999 5 EF Deutsch Hiermit erkl rt NETGEAR Inc dass sich das Ger t Radiolan in bereinstimmung German mit den grundlegenden Anforderungen und den brigen einschl gigen Bestimmungen der Richtlinie 1999 5 EG befindet Eesti K esolevaga kinnitab NETGEAR Inc seadme Radiolan vastavust direktiivi Estonian 1999 5 EU p hin uetele ja nimetatud direktiivist tulenevatele teistele asjakohastele s tetele English Hereby NETGEAR Inc declares that this Radiolan is in compliance with the essential requirements and other relevant provisions of Directive 1999 5 EC Espa ol Por medio de la presente NETGEAR Inc declara que el Radiolan cumple con los Spanish requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE EAAnviKI ME THN MAPOY2A NETGEAR Inc AHAONEI OTI Radiolan ZYMMOPQOONETAI Greek MPO TI OYZIOAEIZ ATIAITH2EI2 KAI TIZ AOINE ZXETIKEZ AIATA EI2 TH OAHMIAZ 1999 5 EK Fran ais Par la pr sente NETGEAR Inc d clare que l appareil Radiolan est conforme aux French exigences essen
11. Passwords are 1 20 alphanumeric characters in length and are case sensitive 3 Enter the new password It will not display as it is typed and only asterisks will show on the screen Passwords are 1 20 alphanumeric characters in length and are case sensitive 4 To confirm the password enter it again to make sure you entered it correctly This field will not display but will show asterisks 5 Click Apply gt To reset the password to the default value 6 Select the Reset Password check box 7 Click Apply Note In you have forgotten the password and are unable to log into the switch management interface press the Factory Defaults button on the front panel of the switch for more than one second The device reboots and all switch settings including the password are reset to the factory default values If you press the reset button for less than one second the switch reboots but the switch loads the saved configuration 172 XS712T Smart Switch RADIUS Configuration RADIUS servers provide additional security for networks The RADIUS server maintains a user database which contains per user authentication information The switch passes information to the configured RADIUS server which can authenticate a user name and password before authorizing use of the network RADIUS servers provide a centralized authentication method for e Web Access e Access Control Port 802 1X The RADIUS folder contains links des
12. 162 XS712T Smart Switch Class Configuration Class Information Class Name Class Type DiffServ Class Configuration Match Every Any v O Reference Class x Class Of Service 0 O VLAN 1 to 4093 Ethernet Type Appletalk Source MAC Address O Destination MAC Address Protocol Type li ICMP Source IP Address O Source L4 Port domain O Destination IP Address Destination L4 Port domain IP pscp afii wj O Precedence Value 0 v OIP Tos Bit Value Bit Mask Class Summary Define the criteria to associate with a DiffServ class e Match Every This adds to the specified class definition a match condition whereby all packets are considered to belong to the class Reference Class Selects a class to start referencing for criteria A specified class can reference at most one other class of the same type e Class of Service Select the field and enter a class of service 802 1p user priority value to be matched for the packets The valid range is 0 7 e VLAN Select the field and enter a VLAN ID to be matched for packets The VLAN ID range is 1 4093 Ethernet Type This lists the keywords for the Ether Type from which one can be selected Source MAC Address This is the source MAC address specified as six two digit hexadecimal numbers separated by colons Source MAC Mask This is a bit mask in the same format as MAC Add
13. Portuguese essenciais e outras disposi es da Directiva 1999 5 CE Slovensko NETGEAR Inc izjavlja da je ta Radiolan v skladu z bistvenimi zahtevami in Slovenian ostalimi relevantnimi dolo ili direktive 1999 5 ES Slovensky NETGEAR Inc t mto vyhlasuje Ze Radiolan sp a z kladn po iadavky a v etky Slovak pr slu n ustanovenia Smernice 1999 5 ES Suomi NETGEAR Inc vakuuttaa t ten ett Radiolan tyyppinen laite on direktiivin Finnish 1999 5 EY oleellisten vaatimusten ja sit koskevien direktiivin muiden ehtojen mukainen Svenska H rmed intygar NETGEAR Inc att denna Radiolan st r verensst mmelse med Swedish de v sentliga egenskapskrav och vriga relevanta best mmelser som framg r av direktiv 1999 5 EG slenska H r me l sir NETGEAR Inc yfir v a Radiolan er samr mi vi grunnkr fur og Icelandic a rar kr fur sem ger ar eru tilskipun 1999 5 EC Norsk NETGEAR Inc erkl rer herved at utstyret Radiolan er i samsvar med de Norwegian grunnleggende krav og vrige relevante krav i direktiv 1999 5 EF FCC Requirements for Operation in the United States FCC Information to User This product does not contain any user serviceable components and is to be used with approved antennas only Any product changes or modifications will invalidate all applicable regulatory certifications and approvals FCC Guidelines for Human Exposure This equipment complies with FCC radiation expos
14. Sequence Number I 3 1 to 4294967295 Port Selection Table Interface Binding Status ACL Type ACL ID Sequence Number 2 Select an existing MAC ACL which requires binding configuration from the ACL ID menu The packet filtering direction for ACL is Inbound which means the MAC ACL rules are applied to traffic entering the port 3 Specify an optional sequence number to indicate the order of this access list relative to other access lists already assigned to this interface and direction A low number indicates high precedence order If a sequence number is already in use for this interface and direction the specified access list replaces the currently attached access list using that sequence number If the sequence number is not specified by the user a sequence number that is one greater than the highest sequence number currently in use for this interface and direction will be used The valid range is 14294967295 4 Click the appropriate orange bar to expose the available ports or LAGs Toadd the selected ACL to a port or LAG click the box directly below the port or LAG number so that a check mark displays in the box Toremove the selected ACL from a port or LAG click the box directly below the port or LAG number to clear the selection An check mark in the box indicates that the ACL is applied to the interface 5 Click Apply 218 XS712T Smart Switch The Interface Binding Status section on the MAC Bi
15. e 00 00 00 00 00 00 e 01 80 C2 00 00 00 to 01 80 C2 00 00 0F e 01 80 C2 00 00 20 to 01 80 C2 00 00 21 e FF FF FF FF FF FF Click the orange bar under the Source Port Members heading to display the available ports Select the port s to include in the inbound filter If a packet with the MAC address and VLAN ID you specify is received on a port that is not in the list it will be dropped Click the orange bar under the Destination Port Members heading to display the available ports Select the port s to include in the outbound filter Packets with the MAC address and VLAN ID you selected will be transmitted only out of ports that are in the list Destination ports can be included only in the Multicast filter Click Apply To delete a configured MAC filter 1 2 In the MAC Filter list select the filter to remove Click Delete 198 XS712T Smart Switch MAC Filter Summary Use the MAC Filter Summary screen to view the MAC filters that are configured on the system To display the MAC filter summary screen Select Security Traffic Control MAC Filter MAC Filter Summary The MAC Filter Summary screen displays MAC Filter Summary MAC Filter Summary MAC Address VLAN ID Source Port Members Destination Port Members Figure 6 MAC filter summary screen The following table describes the information displayed on the screen Table 28 MAC filter summary information Field Description
16. The configuration process is simplified by allowing each CoS queue parameter to be configured globally or per port A global configuration change is automatically applied to all ports in the system 156 XS712T Smart Switch gt To configure CoS queue settings for an interface 1 Select QoS gt CoS gt Advanced gt Interface Queue Configuration Interface Queue Configuration Interface Queue Configuration 3 1 LAGS All Go To Interface GO LLL Queue Minimum Interface ID Bandwidth Scheduler Type Queue Management Type 0 to 100 Weighted TailDrop Weighted TailDrop Weighted TailDrop Weighted TailDrop Weighted TailDrop Weighted TailDrop Weighted TailDrop Weighted TailDrop Weighted TailDrop Weighted TailDrop Weighted TailDrop Weighted TailDrop xgi xg2 xg3 xg4 xg5 xg6 xg7 xg8 xg9 xg10 xgii EN o Eo EI o m o um o m o EMO Lo Lo Lo LL o BEN o xgi2 1 LAGS All Go To Interface so 2 To configure CoS queue settings for a physical port enter the interface and click Go to select that particular interface 3 Select the interfaces for which you want to configure the interface queue settings To configure CoS settings for a Link Aggregation Group LAG click LAGS e Toconfigure CoS settings for both physical ports and LAGs click ALL 4 Select the check box next to the port or LAG to configure You can select multiple ports and LAGs to
17. The percentage of power saving due to the Green Ethernet features on the switch Cumulative Energy Saving Watts Hours The cumulative of energy savings on the switch 50 XS712T Smart Switch The following table describes the information in the Green Ethernet feature support table Table 11 Green Ethernet support information Field Description Unit The ID number for the switch Green Features supported on this The Green Ethernet feature s supported on this unit unit The following table describes the information in the Green Ethernet interface table Table 12 Green Ethernet interface information Field Description Interface The interface associated with the rest of the data in the row EEE Admin Mode The administrative status of the EEE feature on the interface Click Refresh to refresh the screen with the most current data from the switch View and Configure Green Ethernet LPI History Use this screen to configure and view the Green Ethernet low power idle LPI history Viewing the Green Ethernet LPI History feature allows you to view the Green Ethernet history on the switch gt To configure the LPI settings 1 Select System gt Management gt Green Ethernet gt Green Ethernet LPI History The Port GreenMode EEE History screen displays Port GreenMode EEE History Interface Sampling Interval 30 Max Samples to keep 1 to 168 P
18. Click Add To modify information about an existing SNMP recipient 1 Select the check box next to the recipient 2 Update the desired fields 3 Click Apply Todelete an SNMP trap recipient 1 Select the check box next to the recipient to remove 2 Click Delete 55 XS712T Smart Switch Trap Flags Use the Trap Flags screen to enable or disable traps the switch can send to an SNMP manager When the condition identified by an active trap is encountered by the switch a trap message is sent to any enabled SNMP Trap Receivers and a message is written to the trap log gt To configure the trap flags 1 Select System SNMP SNMP V1 V2 gt Trap Flags The Trap Flag screen displays Trap Flags Trap Flags Authentication Disable Enable Link Up Down Disable Enable Spanning Tree Disable Enable ACL Disable Enable 2 Enable or disable the following system traps Authentication When enabled SNMP traps are sent when events involving authentication occur such as when a user attempts to access the device management interface and fails to provide a valid user name and password Link Up Down When enabled SNMP traps are sent when the administrative or operational state of a physical or logical link changes Spanning Tree When enabled SNMP traps are sent when various spanning tree events occur e ACL When enabled SNMP traps are sent when a packet matches a configured ACL rule that includes ACL log
19. Discarded The sum of single collision frames discarded multiple collision frames discarded and excessive frames discarded Single Collision Frames A count of the number of successfully transmitted frames on a particular interface for which transmission is inhibited by exactly one collision Multiple Collision Frames Excessive Collision Frames A count of the number of successfully transmitted frames on a particular interface for which transmission is inhibited by more than one collision A count of frames for which transmission on a particular interface fails due to excessive collisions 243 XS712T Smart Switch Table 39 Detailed interface statistics Continued Field Description Dropped Transmit Frames Number of transmit frames discarded at the selected port STP BPDUs Received Number of STP BPDUs received at the selected port STP BPDUs Transmitted Number of STP BPDUs transmitted from the selected port RSTP BPDUs Received Number of RSTP BPDUs received at the selected port RSTP BPDUs Transmitted Number of RSTP BPDUs transmitted from the selected port MSTP BPDUs Received Number of MSTP BPDUs received at the selected port MSTP BPDUs Transmitted Number of MSTP BPDUs transmitted from the selected port 802 3x Pause Frames Transmitted EAPOL Frames Received A count of MAC Control frames transmitted on this interface with an opcode indi
20. Displays VLAN IDs enabled for IGMP snooping querier Snooping Querier IGMP Snooping Interface Configuration Use the IGMP Snooping Interface Configuration screen to configure IGMP snooping settings on specific interfaces gt To configure IGMP snooping interface settings 1 Select Switching gt Multicast IGMP Snooping gt IGMP Snooping Interface Configuration IGMP Snooping Interface Configuration IGMP Snooping Interface Configuration 1 LAGS All Go To Interface 1560 Timeout Admin Mode Time HE Se 1 xgi Disable 260 10 Disable 260 Disable Disable Disable Disable Disable Disable Disable Disable xgii Disable xg12 Disable i LAGS All Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Max MRout Fast L H Interface Admin Mode Host Timeout Response p xke EN o EE o Im o IE o Im o mo 2 To configure IGMP Snooping settings for a physical port enter the interface and click Go to select that particular interface 116 XS712T Smart Switch 3 Select the interfaces for which you want to configure the CoS settings To configure IGMP Snooping settings for a Link Aggregation Group LAG click LAGS To configure IGMP Snooping settings for both physical ports and LAGs click ALL 4 Select the check box next to the port or LAG to configure You can select multiple ports an
21. G Logging Interface Trust Mode Invalid Rate Limit pps Burst Interval secs Packets a NI i E Q xgi Disable Disable N A xg2 Disable Disable N A xg3 Disable Disable N A Disable Disable N A Disable Disable N A Disable Disable N A Disable Disable N A Disable Disable N A Disable Disable Disable Disable Disable Disable Disable Disable Go To Interface 2 Select whether to configure physical interfaces link aggregation groups LAGs or both by clicking one of the following links above the table heading e 1 Only physical interfaces are displayed This is the default setting e LAGS Only link aggregation groups are displayed All Both physical interfaces and link aggregation groups are displayed 3 Select whether to configure a single interface a group of interfaces or all interfaces for the sake of simplicity in this procedure link aggregation groups are also considered interfaces e To configure a single interface select the check box next to the interface that you want to configure You can also type the interface number for example xg12 in the Go To Interface field at the top or bottom of the table and click Go The information for the selected interface displays in the drop down lists in the table heading 71 XS712T Smart Switch e To configure a group of interfaces select the check boxes for the individual interfaces that you want to configure e To configure all interfaces se
22. Specific Dynamic Gateway Entry Selecting this allows you to specify the required IP address Specific Static Entry e None Select if you do not want to delete any entry from the ARP Table If you select Specific Dynamic Gateway Entry or Specific Static Entry in the Remove from Table list you can enter the IP address of an entry to remove from the ARP table 3 Click Apply 152 Configuring Quality of Service Use the features you access from the QoS tab to configure Quality of Service QoS settings on the switch The QoS tab contains links described in the following sections e Class of Service Differentiated Services In a typical switch each physical port consists of one or more queues for transmitting packets on the attached network Multiple queues per port are often provided to give preference to certain packets over others based on user defined criteria When a packet is queued for transmission in a port the rate at which it is serviced depends on how the queue is configured and possibly the amount of traffic present in the other queues of the port If a delay is necessary packets get held in the queue until the scheduler authorizes the queue for transmission As queues become full packets have no place to be held for transmission and get dropped by the switch QoS is a means of providing consistent predictable data delivery by distinguishing between packets that have strict timing requirements from those that a
23. This does not include multicast packets Total Packets Received with MAC Errors The total number of inbound packets that contained errors preventing them from being deliverable to a higher layer protocol 241 XS712T Smart Switch Table 39 Detailed interface statistics Continued Field Description Jabbers Received Fragments Received The total number of packets received that were longer than 1518 octets excluding framing bits but including FCS octets and had either a bad Frame Check Sequence FCS with an integral number of octets FCS Error or a bad FCS with a non integral number of octets Alignment Error This definition of jabber is different than the definition in IEEE 802 3 section 8 2 1 5 1OBASE5 and section 10 3 1 4 10BASE2 These documents define jabber as the condition where any packet exceeds 20 ms The allowed range to detect jabber is between 20 ms and 150 ms The total number of packets received that were less than 64 octets in length with ERROR CRC excluding framing bits but including FCS octets Undersize Received The total number of packets received that were less than 64 octets in length with GOOD CRC excluding framing bits but including FCS octets Alignment Errors The total number of packets received that had a length excluding framing bits but including FCS octets of between 64 and 1518 octets inclusive but had a bad Frame Check Sequence FCS with
24. configure a non default value next to Fast Start Duration This value sets the number of LLDP packets sent when the LLDP MED Fast Start mechanism is initialized which occurs when a new endpoint device links with the LLDP MED network connectivity device 4 Click Apply 58 XS712T Smart Switch LLDP Port Settings Use the LLDP Port Settings screen to specify per interface LLDP settings gt To configure LLDP port settings 1 Select System LLDP Advanced LLDP Port Settings The LLDP Port Settings screen displays LLDP Port Settings LLDP Port Settings 1 All Go To Interface M t IP Interface Admin Status nerseet Notification Optional TLVs Address Lu x 2 Disabled Auto Advertise NE le NE Disabled Auto Advertise Disable Enable Disabled Auto Advertise Disable Enable Disabled Auto Advertise Disable Enable Disabled Auto Advertise Disabl Enable Disabled Auto Advertise Disabl Enable Disabled Auto Advertise Disabl Enable Disabled Auto Advertise Disabl Enable Disabled Auto Advertise Disabl Enable Disabled Auto Advertise Disabl Enable Disabled Auto Advertise Disabl Enable Disabled Auto Advertise Disabl Enable Go To Interface laco m o m o m o mo oc 2 Select the port s to configure To configure a single port select the check box associated with it or type the port number in the Go To Interface field and click Go To configure multiple ports with the same settings select the
25. locked port VLAN ID Displays the VLAN ID corresponding to the Last Violation MAC address Port Security Interface Configuration A MAC address can be defined as allowable by one of two methods dynamically or statically Both methods are used concurrently when a port is locked Dynamic locking implements a first arrival mechanism for port security You specify how many addresses can be learned on the locked port If the limit has not been reached then a packet with an unknown source MAC address is learned and forwarded normally When the limit is reached no more addresses are learned on the port Any packets with source MAC addresses that were not already learned are discarded You can effectively disable dynamic locking by setting the number of allowable dynamic entries to zero Static locking allows you to specify a list of MAC addresses that are allowed on a port The behavior of packets is the same as for dynamic locking only packets with an allowable source MAC address can be forwarded gt To configure port security settings 1 Select Security gt Traffic Control gt Port Security gt Interface Configuration 202 XS712T Smart Switch Interface Configuration Interface Configuration 2 1 LAGS All Go To Port L GO J Max Allowed Max Allowed s i Enable Violation Port Port Security Dynamically Statically sack Learned MAC Locked MAC p Disable Disable Disable Disable Disable Disable Di
26. which is made up from the bridge priority and the base MAC address of the bridge Root Path Cost Displays the path cost to the Designated Root for this MST instance Root Port Indicates the port to access the Designated Root for this MST instance Todelete an MST instance 1 Select the check box next to the instance 2 Click Delete MST Port Configuration Use the MST Port Configuration screen to configure and display Multiple Spanning Tree MST settings on a specific port on the switch To configure MST port settings 1 Select Switching gt STP gt Advanced gt MST Port Configuration MST Port Configuration Status No MSTs Available Note If no MST instances have been configured on the switch the screen displays a No MSTs Available message 2 To configure MST settings for a physical port enter the interface and click Go to select that particular interface 107 XS712T Smart Switch Select the interfaces for which you want to configure the CoS settings e To configure MST settings for a Link Aggregation Group LAG click LAGS e To configure MST settings for both physical ports and LAGs click ALL Select the check box next to the port or LAG to configure You can select multiple ports and LAGs to apply the same setting to the selected interfaces Select the check box in the heading row to apply the same settings to all interfaces Configure the MST values for the selec
27. 500 see VLAN Membership Configuration on page 86 3 From the STP Configuration screen enable the Spanning Tree State option see STP Configuration on page 99 Use the default values for the rest of the STP configuration settings By default the STP Operation Mode is MSTP and the Configuration Name is the switch MAC address 4 From the CST Configuration screen set the Bridge Priority value for each of the three switches to force Switch 1 to be the root bridge e Switch 1 4096 e Switch 2 12288 e Switch 3 20480 Note Bridge priority values are multiples of 4096 299 XS712T Smart Switch If you do not specify a root bridge and all switches have the same Bridge Priority value the switch with the lowest MAC address is elected as the root bridge see CST Configuration on page 101 5 From the CST Port Configuration screen select ports gi g8 and select Enable from the STP Status menu see CST Port Configuration on page 102 6 Click Apply 7 Select ports g1 g5 edge ports and select Enable from the Fast Link menu Since the edge ports are not at risk for network loops ports with Fast Link enabled transition directly to the Forwarding state 8 Click Apply You can use the CST Port Status screen to view spanning tree information about each port 9 From the MST Configuration screen create a MST instances with the following settings e MSTID 1 e Priority Use the default 32768 e VLAN ID 300 For more in
28. ACL ID field displays all the ACLs configured depending on the ACL Type selected Click Add To delete a VLAN binding 1 2 Select the check box next to the VLAN with the ACL binding to remove Click Delete 232 Monitoring the System Use the features available from the Monitoring tab to view a variety of information about the switch and its ports and to configure how the switch monitors events The Monitoring tab contains configuration menus described in the following sections Ports Logs Mirroring Ports The screens available from the Ports menu contain a variety of information about the number and type of traffic transmitted from and received on the switch From the Ports menu you can access the following links Switch Statistics Port Statistics Port Detailed Statistics EAP Statistics Cable Test Switch Statistics The Switch Statistics screen displays detailed statistical information about the traffic the switch handles gt To view the switch statistics Click Monitoring gt Ports gt Switch Statistics 233 XS712T Smart Switch Switch Statistics Statistics ifIndex 313 Octets Received 3812718 Packets Received Without Errors 33949 Unicast Packets Received 8716 Multicast Packets Received 15350 Broadcast Packets Received 9883 Receive Packets Discarded 8997 Octets Transmitted 25582720 Packets Transmitted Without Errors 55495 Unicast Packets Transmitted 9016 Multicast Packets Transmitt
29. Apply Table 34 Private VLAN promiscuous interface table information Field Description Operational VLAN s The primary and secondary operational private VLANs for the interface The VLANs that are operational depend on the configured mode for the interface and the private VLAN type 211 XS712T Smart Switch Configuring Access Control Lists Access Control Lists ACLs ensure that only authorized users have access to specific resources while blocking off any unwarranted attempts to reach network resources ACLs are used to provide traffic flow control restrict contents of routing updates decide which types of traffic are forwarded or blocked and above all provide security for the network XS712T Smart Switch software supports IPv4 and MAC ACLs To configure an ACL first create an IPv4 based or MAC based ACL ID Then create a rule and assign it to a unique ACL ID Next define the rules which can identify protocols source and destination IP and MAC addresses and other packet matching criteria Finally use the ID number to assign the ACL to a port or to a LAG The Security gt ACL configuration menu contains links described in the following sections e ACL Wizard e Basic e MAC ACL e MAC Rules e MAC Binding Configuration e MAC Binding Table e Advanced IPACL e P Rules P Extended Rules e Pv6 ACL e Pv6 Rules P Binding Configuration e IP Binding Table e VLAN Binding Table
30. Configuration e CST Configuration CST Port Configuration e CST Port Status e Rapid STP MST Configuration MST Port Configuration e STP Statistics 98 STP Configuration XS712T Smart Switch The STP Configuration screen contains fields for enabling STP on the switch Toconfigure STP settings on the switch 1 Select Switching gt STP gt Basic gt STP Configuration STP Configuration Global Settings Spanning Tree State STP Operation Mode Configuration Name Configuration Revision Level Configuration Digest Key Forward BPDU while STP Disabled STP Status Bridge Identifier Time Since Topology Change Topology Change Count Topology Change Designated Root Root Path Cost Root Port Max Age secs Forward Delay secs Hold Time secs CST Regional Root CST Path Cost Disable Enable STP RSTP MSTP 00 05 02 04 06 07 0 0 to 65535 0xac36177f50283cd4b83821d8ab26de62 Disable Enable 80 00 00 05 02 04 06 07 0 day 1 hr 53 min 18 sec 0 False 80 00 00 05 02 04 06 07 0 80 00 00 05 02 04 06 07 0 2 From the Spanning Tree State field specify whether to enable or disable Spanning Tree operation on the switch 3 From the STP Operation Mode field specify the Force Protocol Version parameter for the Switch Options are e STP Spanning Tree Protocol IEEE 802 1D e RSTP Rapid Spanning Tree Protocol IEEE 802 1w e MSTP Multiple Spanning Tree Protocol IEEE 80
31. Configuration on page 127 5 Click Refresh to update the screen with the latest information from the switch MLD Interface Configuration For MLD snooping to be active on an interface it must be enabled both globally and on the interface physical or LAG gt To configure an interface for MLD snooping 1 Select Switching gt Multicast gt MLD Snooping gt Interface Configuration 125 XS712T Smart Switch MLD Snooping Interface Configuration MLD Snooping Interface Configuration 1 LAGS All GoTo Interface Grou Present p Max Response 2 3 Expiration Time secs g Time secs Admi Interface TTE Membership Mod ai Interval secs Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable QUO mc I o II o I o mo o o To configure MLD settings for a physical port enter the interface and click Go to select that particular interface Select the interfaces for which you want to configure the CoS settings e To configure MLD settings for a Link Aggregation Group LAG click LAGS e To configure MLD settings for both physical ports and LAGs click ALL Select all physical VLAN and LAG interface you want to configure in the Interface field Select the interface mode for the selected interface for MLD Snooping for the switc
32. ERA 199 Fort ogouy COHTOBEAROE cae doacd EROR E eta RE E CD Rete de DECRE 201 Port Security Interface Configuration 0 000 eee eee 202 Security MAC AGIS oe ci hei eod DER EXE Rod eee d 204 Private VLAN Configuration 2 006600 cee eee eee eee 205 Private VLAN Association Configuration 00000 eae 206 Private VLAN Port Mode Configuration 0 000 eee 207 Private VLAN Host Interface Configuration 00 208 Private VLAN Promiscuous Interface Configuration 210 MAL RUGS cosh canne eos Ed RERRRXEERT IR REX TEEERPPRM RES RES 216 MAC Binding Configuratio 43 dd racio iC eee e wha Cb ens 218 MAG Binding PREIS Laure RR RRGYERIE RERO E EAR NC E Ed eg 219 IPPC uleuacsaqQorRSQRda ARR GUT AE qa dSqRdes RE eade 220 ludis ed 221 IP Extended RUES cece keeree eres Hebert EX PE V REPE 222 PYG e mr 225 IPO RUGS Lau oL bb d kpS ERR ER doy Adqdiaqudbeded qq da db dcs 226 Chapter 7 Monitoring the System PONE E EEEL A EEEN EE STEN REENT ESTEA ETT thee Rese eA 233 EEDE E ide E TEE o dob E E ce e E E 254 POM AST s oido Ios deci aD eoi op ah RR Ao osque OR o doo ER IR ME as 236 LOGS vaecxad ded ped Aqu dae dob Reb dedos r dod ped 248 FLAS s s Een aber quado a we Rd doo tup dodo dO e ioa de a 250 MONG 4 noe ioe ena Rd dre ERR Rae e ERODE Eee ETTET TT 256 Chapter 8 Maintenance BB ooo dos d NRXASPERASRITIARRPQISTQNASOTREZCSTEQSERW E XA 25
33. IEEE 802 1D Disabled Blocking Listening Learning Forwarding Broken Admin Mode Displays the port control administration state Enable The port can participate in the network default Disable The port is administratively down and does not participate in the network Flow Control Mode Indicates whether flow control is enabled or disabled for the port This field is not valid for LAG interfaces 239 XS712T Smart Switch Table 39 Detailed interface statistics Continued Field Description LACP Mode Selects the Link Aggregation Control Protocol administration state Enable Specifies that the port is allowed to participate in a port channel LAG which is the default mode Disable Specifies that the port cannot participate in a port channel LAG Physical Mode Indicates the port speed and duplex mode In auto negotiation mode the duplex mode and speed are set from the auto negotiation process Physical Status Indicates the port speed and duplex mode status Link Status Indicates whether the link is up or down Link Trap This object determines whether or not to send a trap when link status changes The factory default is Enable Enable Specifies that the system sends a trap when the link status changes Disable Specifies that the system does not send a trap when the link status changes Packets RX and TX 64 Octets The to
34. Number of DHCP snooping 8K N A bindings Number of DHCP static entries 1024 N A MLD Snooping N A Disabled Protocol and MAC based VLAN N A N A Private VLAN N A N A 306 Notification of Compliance NETGEAR Wired Products Certificate of the Manufacturer Importer It is hereby certified that the ProSafe XS712T Smart Switch has been suppressed in accordance with the conditions set out in the BMPT AmtsblVfg 243 1991 and Vfg 46 1992 The operation of some equipment for example test transmitters in accordance with the regulations may however be subject to certain restrictions Please refer to the notes in the operating instructions The Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for compliance with the regulations Best tigung des Herstellers Importeurs Es wird hiermit best tigt da das ProSafe XS712T Smart Switch gem der im BMPT AmtsblVfg 243 1991 und Vfg 46 1992 aufgef hrten Bestimmungen entst rt ist Das vorschriftsmaRige Betreiben einiger Ger te z B Testsender kann jedoch gewissen Beschrankungen unterliegen Lesen Sie dazu bitte die Anmerkungen in der Betriebsanleitung Das Bundesamt f r Zulassungen in der Telekommunikation wurde davon unterrichtet da dieses Ger t auf den Markt gebracht wurde und es ist berechtigt die Serie auf die Erf llung der Vorschriften hin zu berpr f
35. Revision History Publication Part Number Version Publish Date Comments 202 11254 02 v2 0 April 2013 Minor text edits 202 11254 01 v1 0 March 2013 First publication Contents Chapter 1 Getting Started Getting Started with the XS712T Smart Switch 7 Connect the Switch to the Network nanan anaana anne 8 Discover a Switch in a Network with a DHCP Server 9 Discover a Switch in a Network without a DHCP Server 10 Configure the Network Settings on the Administrative System 12 Access the Management Interface from a Web Browser 15 Understand the User Interfaces llli llle 16 Use the Web Interface lille 16 Use SMMPUS ILL d h A ERA VERRE ARR RPSEXN E EA RU RKA NS ENT 21 CURL oua i us haw hs deca vaa UR Kad Gen dh woe wea ed 24 WISE EXONCIEG aa db nah OR Ede SER aes PRE ERE HR Ud bled d 24 Chapter 2 Configure System Information Manageplt aue aar hace RR EON EEG REE RR e OS 26 IPVO Network Neighbor uidens ki RR RR dad Beatie a ans 32 Hi EUMD 33 Donal ar SO iisque op quc e bd dpa Eod dedu n das 40 Green EIGITIGL iua asscus emer ERR CR UR ER ERR ERREUR OR Roe x 46 lt A ATT vRXTPS EP EREGOCEXEXRAG 3EGAAXEN ERSGM AXES 53 LLDESMEB Neier POY i e ex ERE ENSCRERRR EE PEE YS 60 LEDP MED Port Selle vss PO Seed soak eee eo ak eRe TS 61 Local Moama Luna ues qua cr Reo ieee Gene dete Sees eas 62 Neighbors Informalloli oes en
36. TCP SYN amp FIN DoS prevention causes the switch to drop packets that have TCP Flags SYN and FIN set 42 XS712T Smart Switch 3 Click Apply 43 XS712T Smart Switch DNS You can use these screens to configure information about DNS servers the network uses and how the switch operates as a DNS client Configure DNS Use this screen to configure global DNS settings and DNS server information To configure the global DNS settings 1 Select System gt Management gt DNS gt DNS Configuration The DNS Configuration screen displays DNS Configuration DNS Configuration DNS Status Disable Enable DNS Default Name 1 to 255 alphanumeric characters DNS Server Configuration EDC 1 10 27 138 20 Ce Ga 30 27 138 21 2 Specify whether to enable or disable the administrative status of the DNS Client Enable Allow the switch to send DNS queries to a DNS server to resolve a DNS domain name The DNS is enabled by default e Disable Prevent the switch from sending DNS queries 3 Enter the DNS default domain name to include in DNS queries When the system is performing a lookup on an unqualified hostname this field is provided as the domain name for example if default domain name is netgear com and the user enters test then test is changed to test netgear com to resolve the name 4 Under the DNS Server field specify the IPv4 address to which the switch sends DNS queries 5 Click Ad
37. The valid range is 6 40 101 XS712T Smart Switch 3 Click Apply 4 View the MSTP status information displayed on the Spanning Tree CST Configuration screen Field Description MST ID Table consisting of the MST instances including the CST and the corresponding VLAN IDs associated with each of them VID Table consisting of the VLAN IDs and the corresponding FID associated with each of them FID Table consisting of the FIDs and the corresponding VLAN IDs associated with each of them 5 Click Refresh to update the information on the screen with the most current data CST Port Configuration Use the CST Port Configuration screen to configure Common Spanning Tree CST and Internal Spanning Tree on a specific port on the switch gt To configure CST port settings 1 Select Switching gt STP gt Advanced gt CST Port Configuration CST Port Configuration Port Configuration 1 LAGS All Go To Interface uso Forwarding Cost ID Timer CE O ENNNNNENI JU o NENNEN 7 xg1 Disable Disable Disable Disabled 0 128 0 80 01 2 C xg2 Disable Disable Disable Manual forwarding 0 128 0 80 02 2 7 xg3 Disable Disable Disable Disabled 0 128 0 80 03 2 C xg4 Disable Disable Disable Disabled 0 128 0 80 04 2 xg5 Disable Disable Disable Disabled 0 128 0 80 05 2 xo6 Disable Disable Disable Disabled 0 128 0 80 06 2 T xg7 Disable Disable Disable Disabled 0 128 0 80 07 2 EC x98 D
38. This timeout is unaffected by the activity level of the session The value must be in the range of 0 168 hours A value of zero corresponds to an infinite timeout The default value is 24 hours 183 6 XS712T Smart Switch In the Maximum Number of HTTP Sessions field specify the maximum number of HTTP sessions that can exist at the same time The value must be in the range of 0 4 The default value is 4 Click Apply Secure HTTP Configuration Secure HTTP enables the transmission of HTTP over an encrypted Secure Sockets Layer SSL or Transport Layer Security TLS connection When you manage the switch by using a Web interface secure HTTP can help ensure that communication between the management system and the switch is protected from eavesdroppers and man in the middle attacks Use the Secure HTTP Configuration screen to configure the settings for HTTPS communication between the management station and the switch To configure HTTPS settings Select Security gt Access gt HTTPS gt HTTPS Configuration HTTPS Configuration 1 HTTPS Configuration HTTPS Admin Mode Disable Enable SSL Version 3 Disable Enable TLS Version 1 Disable Enable HTTPS Port 443 HTTPS Session Soft Timeout Minutes 5 HTTPS Session Hard Timeout Hours 24 Maximum Number of HTTPS Sessions 2 Use the radio buttons in the HTTPS Admin Mode field to enable or disable the Administrative Mode of Secure HTTP The defa
39. Use the menu in the 2 column to select the authentication method if any that should appear second in the selected authentication login list This is the method that will be used if the first method times out If you select a method that does not time out as the second method the third method will not be tried This parameter will not appear when you first create a new login list 5 Use the menu in the 3 column to select the authentication method if any that should appear third in the selected authentication login list This parameter will not appear when you first create a new login list 6 Use the menu in the 4 column to select the method if any that should appear fourth in the selected authentication login list This is the method that will be used if all previous methods time out Note that this parameter will not appear when you first create a new login list 7 Click Apply HTTPS Authentication List The HTTPS authentication list defines the HTTPS authentication method used for the default list gt To change the HTTPS authentication method for the defaultList 1 Select Security Management Security Authentication List HTTPS Authentication List HTTPS Authentication List HTTPS Authentication List A CR RR RR httpsList 2 Select the check box next to the httpsList name 3 Use the drop down menu in the 1 column to select the authentication method that should appear first in the selected authent
40. VLANs and some supporting routing You can also configure the software to allow traffic on a VLAN to be treated as if the VLAN were a router port When a port is enabled for bridging default rather than routing all normal bridge processing is performed for an inbound packet which is then associated with a VLAN Its MAC Destination Address MAC DA and VLAN ID are used to search the MAC address table If routing is enabled for the VLAN and the MAC DA of an inbound unicast packet is that of the internal bridge router interface the packet is routed An inbound multicast packet is forwarded to all ports in the VLAN plus the internal bridge router interface if it was received on a routed VLAN Since a port can be configured to belong to more than one VLAN VLAN routing might be enabled for all of the VLANs on the port or for a subset VLAN Routing can be used to allow more than one physical port to reside on the same subnet It could also be used when a VLAN spans multiple physical networks or when additional segmentation or security is required This section shows how to configure XS712T Smart Switch software to support VLAN routing A port can be either a VLAN port or a router port but not both However a VLAN port can be part of a VLAN that is itself a router port VLAN Routing Wizard The VLAN Routing Wizard creates a VLAN adds selected ports to the VLAN The VLAN Wizard gives the user the option to add the selected ports as a Link Aggre
41. a member of the VLAN identified by the VLAN ID in the tag In an untagged frame the VLAN is the Port VLAN ID specified for the port that received this frame Disable all frames are forwarded in accordance with the 802 1Q VLAN bridge specification The factory default is disabled 8 Specify the default 802 1p priority assigned to untagged packets arriving at the port Possible values are 0 7 9 Click Apply MAC Based VLAN The MAC Based VLAN feature allows incoming untagged packets to be assigned to a VLAN based on the source MAC address of the packet A MAC to VLAN mapping is defined by configuring an entry in the MAC to VLAN table An entry is specified via a source MAC address and the desired VLAN ID The MAC to VLAN configurations are shared across all ports of the device i e there is a system wide table that has MAC address to VLAN ID mappings When untagged or priority tagged packets arrive at the switch and entries exist in the MAC to VLAN table the source MAC address of the packet is looked up If an entry is found the corresponding VLAN ID is assigned to the packet If the packet is already priority tagged it will maintain this value otherwise the priority will be set to zero The assigned VLAN ID is verified against the VLAN table if the VLAN is valid ingress processing on the packet continues otherwise the packet is dropped This implies that the user is allowed to configure a MAC address mapping to a VLAN that has not b
42. a response from the RADIUS server Therefore the maximum delay in receiving a response from the RADIUS application equals the product of retransmit times timeout for all configured servers If the RADIUS request was generated by a user login attempt all user interfaces will be blocked until the RADIUS application returns a response 173 XS712T Smart Switch 3 In the Timeout Duration field specify the timeout value in seconds for request retransmissions Consideration to maximum delay time should be given when configuring RADIUS maximum retransmit and RADIUS timeout If multiple RADIUS servers are configured the maximum retransmit value on each will run out before the next server is attempted A retransmit will not occur until the configured timeout value on that server has passed without a response from the RADIUS server Therefore the maximum delay in receiving a response from the RADIUS application equals the product of retransmit times timeout for all configured servers If the RADIUS request was generated by a user login attempt all user interfaces will be blocked until the RADIUS application returns a response 4 From the Accounting Mode menu select whether the RADIUS accounting mode is enabled or disabled on the current server 5 Click Apply RADIUS Server Configuration Use the RADIUS Server Configuration screen to view and configure various settings for the current RADIUS server configured on the system gt
43. advertised by the remote device Displays the model name advertised by the remote device Asset ID Displays the asset ID advertised by the remote device Location Information Civic Coordinates Displays the physical location such as the street address the remote device has advertised in the location TLV For example 123 45th St E The field value length range is 6 160 characters Displays the location map coordinates the remote device has advertised in the location TLV including latitude longitude and altitude ECS ELIN Displays the Emergency Call Service ECS Emergency Location Identification Number ELIN the remote device has advertised in the location TLV The field range is 10 25 Unknown Displays unknown location information for the remote device Network Policies Application Type The media application type associated with the policy advertised by the remote device VLAN ID The VLAN ID associated with the policy VLAN Type Specifies whether the VLAN associated with the policy is tagged or untagged 68 XS712T Smart Switch Field Description User Priority The priority associated with the policy DSCP The DSCP associated with a particular policy type LLDP Unknown TLVs Type Displays the unknown TLV type field Value Displays the unknown TLV value field Services DHCP Snooping DHCP Snooping is a useful fe
44. and LAGs that belong to a private VLAN and to configure associations between interfaces and primary secondary private VLANs gt To configure the private VLAN port mode 1 Select Security gt Traffic Control gt Private Vian gt Private Vian Port Mode Configuration 2 Select the port s to configure To configure a single port select the check box associated with it or type the port number in the Go To Interface field and click Go e To configure multiple ports with the same settings select the check box associated with each port to configure To configure all ports with the same settings select the check box in the heading row 207 XS712T Smart Switch Private Vian Port Mode Configuration Private Vlan Port Mode Configuration 1 LAGS All Go To Interface Geo E General General General General General General General General General General xgil General xgi2 General 1 LAGS All Go To Interface 3 Use the Port Vlan Mode menu to select the Switch Port Mode The factory default is General General The interface is in general mode and is not a member of a private VLAN e Host The interface belongs to a secondary VLAN and depending upon the type of secondary VLAN can either communicate with other ports in the same community if the secondary VLAN is a community VLAN and with the promiscuous ports or is able to commun
45. apply the same setting to the selected interfaces Select the check box in the heading row to apply a trust mode or rate to all interfaces 5 Configure any of the following settings e Queue ID Use the menu to select the queue to be configured Minimum Bandwidth Enter a percentage of the maximum negotiated bandwidth for the selected queue on the interface Specify a percentage from 0 100 in increments of 1 Scheduler Type Selects the type of queue processing from the drop down menu Options are Weighted and Strict Defining on a per queue basis allows the user to create the desired service characteristics for different types of traffic 157 XS712T Smart Switch Weighted Weighted round robin associates a weight to each queue This is the default Strict Services traffic with the highest priority on a queue first Queue Management Type Displays the type of packet management used for all packets which is Taildrop All packets on a queue are safe until congestion occurs At this point any additional packets queued are dropped 6 Click Apply 802 1p to Queue Mapping Use this screen to view or change which internal traffic classes are mapped to the 802 1p priority class values in Ethernet frames the device receives The priority to traffic class mappings can be applied globally or per interface The mapping allows the switch to group various traffic types for example data or voice based on their latency requi
46. are participating in a VLAN in order to apply or remove configurations To configure MLD snooping on a VLAN 1 Select Switching gt Multicast gt MLD Snooping gt MLD VLAN Configuration MLD VLAN Configuration MLD VLAN Configuration et Maximum Multicast Router VLAN ID Membership x 7 Response Time Expiry Time Interval emm CS MW Under VLAN ID specify the on which MLD Snooping is enabled In the Admin Mode list select Enable In the Fast Leave Admin Mode list specify the desired mode Enable or disable the MLD Snooping Fast Leave Mode for the specified VLAN If fast leave is enabled the VLAN can be immediately removed from the layer 2 forwarding table entry when the switch receives an MLD leave message for a multicast group without first sending out MAC based general queries m Bem 6 Under Group Membership Interval specify the number of seconds the VLAN should to wait for a report for a particular group on the VLAN before the MLD snooping feature deletes the VLAN from the group 7 Under Maximum Response Time specify the number of seconds the VLAN should wait after sending a query if does not receive a report for a particular group The specified value should be less than the group membership Interval 127 XS712T Smart Switch 8 Under Multicast Router Expiry Time specify the number of seconds the VLAN should wait to receive a query before it is removed from the list of VLANs with multicas
47. attached to a LAG It can be up to 64 characters in length e LAG ID Displays the number assigned to the LAG This field is read only e Link Trap Specify whether you want to have a trap sent when link status changes The factory default is Disable which will cause the trap to be sent Admin Mode Select Enable or Disable from the menu When the LAG port channel is disabled no traffic will flow and LAGPDUS will be dropped but the links that form the LAG port channel will not be released The factory default is Enable e STP Mode Select the Spanning Tree Protocol Administrative Mode associated with the LAG e LAG Type Specifies whether the LAG is configured as a Static or LACP port When the LAG is static it does not transmit or process received LAGPDUS for example the member ports do not transmit LAGPDUS and all the LAGPDUS it can receive are dropped The default is Static Active Ports A listing of the ports that are actively participating members of this Port Channel A maximum of 8 ports can be assigned to a port channel e LAG State Indicates whether the link is Up or Down Local Preference Mode Enables or disables the LAG interface s Local Preference Mode 4 Click Apply LAG Membership Use the LAG Membership screen to select two or more full duplex Ethernet links to be aggregated together to form a link aggregation group LAG which is also known as a port channel The switch can treat the port channel as if i
48. attribute for the selected server 3 Click Add 174 XS712T Smart Switch To modify settings for a RADIUS server that is already configured on the switch 1 Select the check box next to the server IP address 2 Update the desired fields for the selected server 3 Click Apply To delete a configured RADIUS server 1 Select the check box next to the IP address of the server to remove 2 Click Delete The following table describes the RADIUS server statistics available on the screen Table 24 RADIUS server statistics Field Description Server Address This displays all configured RADIUS servers Round Trip Time The time interval in hundredths of a second between the most recent Access Reply Access Challenge and the Access Request that matched it from this RADIUS authentication server Access Requests The number of RADIUS Access Request packets sent to this server This number does not include retransmissions Access Retransmissions The number of RADIUS Access Request packets retransmitted to this server Access Accepts The number of RADIUS Access Accept packets including both valid and invalid packets that were received from this server Access Rejects The number of RADIUS Access Reject packets including both valid and invalid packets that were received from this server Access Challenges The number of RADIUS Access Challenge packets including both vali
49. block and configure any associated values 41 XS712T Smart Switch Denial of Service Min TCP Header Size Specify the minimum TCP header size allowed If DoS TCP Fragment is enabled the switch will drop packets that have a TCP header smaller than the configured value Denial of Service ICMPv4 Enabling ICMPv4 DoS prevention causes the switch to drop ICMPv4 packets that have a type set to ECHO_REQ ping and a size greater than the configured ICMPv4 Pkt Size The factory default is disabled Denial of Service Max ICMPv4 Packet Size Specify the maximum ICMPv4 packet size allowed If ICMPv4 DoS prevention is enabled the switch will drop IPv4 ICMP ping packets that have a size greater than the configured value Denial of Service ICMPv6 Enabling ICMPv6 DoS prevention causes the switch to drop ICMPv6 packets that have a type set to ECHO REQ ping and a size greater than the configured ICMPv6 Pkt Size Denial of Service Max ICMPv6 Packet Size Specify the Max IPv6 ICMP packet size allowed If ICMPv6 DoS prevention is enabled the switch will drop IPv6 ICMP ping packets that have a size greater than this configured Max ICMPv6 Pkt Size Denial of Service First Fragment Enabling First Fragment DoS prevention causes the switch to check DoS options on first fragment IP packets when switch are receiving fragmented IP packets Otherwise switch ignores the first fragment IP packages Denial of Service ICMP Fragment Enabling ICMP Fragment D
50. check box associated with each port to configure To configure all ports with the same settings select the check box in the heading row 3 Use the lists to configure the LLDP settings for the selected ports Admin Status Select the status for transmitting and receiving LLDP packets e Tx Only Enable only transmitting LLDP PDUs on the selected ports e RxOnly Enable only receiving LLDP PDUs on the selected ports e Txand Rx Enable both transmitting and receiving LLDP PDUs on the selected ports Disabled Do not transmit or receive LLDP PDUs on the selected ports Management IP Address Choose whether to advertise the management IP address from the interface The possible field values are Stop Advertise Do not advertise the management IP address from the interface Auto Advertise Advertise the current IP address of the device as the management IP address 59 XS712T Smart Switch e Notification When notifications are enabled LLDP interacts with the Trap Manager to notify subscribers of remote data change statistics The default is Disabled e Optional TLV s Enable or disable the transmission of optional type length value TLV information from the interface The TLV information includes the system name system description system capabilities and port description To configure the System Name see Management on page 26 To configure the Port Description see Ports on page 77 4 Click Apply LLDP MED Net
51. configured to operate in Host mode In the Host Primary VLAN field specify the primary VLAN ID for the Host Association Mode The range of the VLAN ID is 2 4093 4 The secondary private VLAN the port is a member of when it is configured to operate in Host mode The secondary private VLAN is either an isolated or community VLAN In the Host Secondary VLAN field specify the secondary VLAN ID for the Host Association Mode The range of the VLAN ID is 2 4093 5 Click Apply Table 33 Private VLAN host interface table information Field Description Operational VLAN s Displays the operational vlan s 209 XS712T Smart Switch Private VLAN Promiscuous Interface Configuration The private VLAN Promiscuous interface configuration screen allows you to configure the primary and secondary Promiscuous VLAN IDs for the host association mode gt To configure the private VLAN Promiscuous interface 1 2 3 Select Security gt Traffic Control gt Private Vian gt Private Vian Promiscuous Interface Configuration Select the port s to configure e To configure a single port select the check box associated with it or type the port number in the Go To Interface field and click Go e To configure multiple ports with the same settings select the check box associated with each port to configure e To configure all ports with the same settings select the check box in the heading row
52. correct format The switch has a path to the TFTP server To configure the certificate download settings for HTTPS sessions 1 Select Security gt Access gt HTTPS gt Certificate Download Certificate Download Certificate Download File Type SSL Trusted Root Certificate PEM File _ Server Address Type IPv4 v TFTP Server IP 0 0 0 0 Remote File Path Remote File Name r6v21m9b5 stk Start File Transfer F From the File Type menu select the type of SSL certificate to download which can be one of the following e SSL Trusted Root Certificate PEM File SSL Trusted Root Certificate File PEM Encoded e SSL Server Certificate PEM File SSL Server Certificate File PEM Encoded e SSL DH Weak Encryption Parameter PEM File SSL Diffie Hellman Weak Encryption Parameter File PEM Encoded e SSL DH Strong Encryption Parameter PEM File SSL Diffie Hellman Strong Encryption Parameter File PEM Encoded From the Server Address Type menu specify either IPv4 or DNS to indicate the format of the TFTP Server Address field The default is IPv4 In the TFTP Server IP field specify the address of the TFTP server The address can be an IP address in standard x x x x format or a hostname The hostname must start with a letter of the alphabet Make sure that the software image or other file to be downloaded is available on the TFTP server Enter the path of the file which you want to download in the Remote File Path field
53. e VLAN Routing with a Static Route Virtual Local Area Networks VLANs A local area network LAN can generally be defined as a broadcast domain Hubs bridges or switches in the same physical segment or segments connect all end node devices End nodes can communicate with each other without the need for a router Routers connect LANs together routing the traffic to the appropriate port A virtual LAN VLAN is a local area network with a definition that maps workstations on some basis other than geographic location for example by department type of user or primary application To enable traffic to flow between VLANs traffic must go through a router just as if the VLANs were on two separate LANs A VLAN is a group of PCs servers and other network resources that behave as if they were connected to a single network segment even though they might not be For example all marketing personnel might be spread throughout a building Yet if they are all assigned to a single VLAN they can share resources and bandwidth as if they were connected to the same segment The resources of other departments can be invisible to the marketing VLAN members accessible to all or accessible only to specified individuals depending on how the IT manager has set up the VLANs VLANs have a number of advantages e Itis easy to do network segmentation Users that communicate most frequently with each other can be grouped into common VLANs regardless of phy
54. first Type Specifies the type of entry Filename The XS712T source code filename identifying the code that detected the event Line The line number within the source file of the code that detected the event Task ID The OS assigned ID of the task reporting the event Code The event code passed to the event log handler by the code reporting the event Time The time the event occurred measured from the previous reset 255 XS712T Smart Switch Mirroring The Port Mirroring screen allows you to view and configure port mirroring on the system Port mirroring selects the network traffic for analysis by a network analyzer This is done for specific ports of the switch As such many switch ports are configured as source ports and one switch port is configured as a destination port You have the ability to configure how traffic is mirrored on a source port Packets that are received on the source port that are transmitted on a port or are both received and transmitted can be mirrored to the destination port The packet that is copied to the destination port is in the same format as the original packet on the wire This means that if the mirror is copying a received packet the copied packet is VLAN tagged or untagged as it was received on the source port If the mirror is copying a transmitted packet the copied packet is VLAN tagged or untagged as it is being transmitted on the source port Use the Port Mirroring screen to d
55. following values 249 XS712T Smart Switch Priority facility value x 8 severity level The facility value is usually one which means it is a user level message Therefore to determine the severity level of the message subtract eight from the number in the angle brackets The example log message has a severity level of 6 informational For more information about the severity of a log message see Server Log on page 252 The message was generated on March 24 at 5 34 05 a m by the switch with an IP address of 10 131 12 183 The component that generated the message is unknown but it came from line 179 of the main_login c file This is the 3 855t message logged since the switch was last booted The message indicates that the administrator logged onto the HTTP management interface from a host with an IP address of 10 27 64 122 Use the buttons at the bottom of the screen to perform the following actions e Click Clear to clear the messages out of the buffered log in the memory e Click Refresh to update the screen with the latest messages in the log FLASH Log The FLASH log is a log that is stored in persistent storage which means that the log messages are retained across a switch reboot Either the system startup log or the system operation log stores a message received by the log subsystem that meets the storage criteria but not both On system startup if the startup log is configured it stores messages up to its limit
56. for IP based extended ACLs The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded 222 XS712T Smart Switch Note There is an implicit deny all rule at the end of an ACL list This means that if an ACL is applied to a packet and if none of the explicit rules match then the final implicit deny all rule applies and the packet is dropped To add rules to an IP ACL 1 Select Security gt ACL gt Advanced gt IP Extended Rules In the following figure an extended IP ACL exists and one rule has been configured Extended ACL Rules IP Rules ACL ID NAME 150 v Extended ACL Rule Table z E Destinati AUC Assign Match Protocol Shae Source IP cia ay Destination Destination Service Queue ID Every Type PE M Mask Port perro IP Mask L4 Port Type Permit False 4 IP 2 2 2 2 255 255 255 0 2 In the ACL ID Name list select the ACL to add the rule to 3 Click Add The screen displays the extended ACL Rule Configuration fields Extended ACL Rule Configuration Extended ACL Rule Configuration 100 199 ACL ID Name 150 Rule ID 0 Action Permit Egress Queue Deny Match Every False v Protocol Type Other v Src IP Address Src IP Mask Src L4 Port Other vw Dst IP Address Dst IP Mask Dst L4 Port Other Service Type IP DSCP other ze IP Precedence 0 0 7 IP TOS 4 Next to Rule ID specify a number f
57. for the CST Root Port Port to access the Designated Root for the CST Max Age secs Specifies the bridge maximum age for CST The value must be less than or equal to 2 X Bridge Forward Delay 1 and greater than or equal to 2 X Bridge Hello Time 1 Forward Delay secs Derived value of the Root Port Bridge Forward Delay parameter Hold Time secs Minimum time between transmission of Configuration BPDUs CST Regional Root Priority and base MAC address of the CST Regional Root CST Path Cost Path Cost to the CST tree Regional Root 8 Click Refresh to update the information on the screen with the most current data 100 XS712T Smart Switch CST Configuration Use the CST Configuration screen to configure Common Spanning Tree CST and Internal Spanning Tree on the switch To configure CST settings 1 Select Switching gt STP gt Advanced gt CST Configuration CST Configuration CST Configuration Bridge Priority 32768 Bridge Max Age secs 20 Bridge Hello Time secs 2 Bridge Forward Delay secs 15 Spanning Tree Maximum Hops 20 MSTP Status MST ID pvp 1 2 2 Specify values for CST in the appropriate fields Bridge Priority When switches or bridges are running STP each is assigned a priority After exchanging BPDUs the switch with the lowest priority value becomes the root bridge Specifies the bridge priority value for the Common and Internal Spanning Tree CS
58. information is not retained across a power cycle Configure the following settings In the Count field specify the number of pings to send The valid range is 1 15 In the Interval secs field specify the number of seconds between pings sent The valid range is 1 60 e Inthe Size field specify the size of the ping ICMP packet to send The valid range is 0 65507 The Ping field displays the result after the switch send a Ping request to the specified address Click Apply to initiate the ping The switch sends the number of pings specified in the Count field and the results are displayed below the configurable data in the Ping area e If successful you will see Reply From IP Host icmp seq 0 time xx usec Tx x Rx x Min Max Avg RTT x x x msec e Ifa reply to the ping is not received you will see Reply From IP Host Destination Unreachable Tx x Rx 0 Min Max Avg RTT 0 0 0 msec 280 XS712T Smart Switch Ping IPv Use the Ping IPv6 screen to send a Ping request to a specified host name or IPv6 address You can use this to check whether the switch can communicate with a particular IPv6 station When you click the Apply button the switch will send three pings and the results will be displayed below the configurable data gt To send a ping to an IPv6 address 1 Select Maintenance gt Troubleshooting gt Ping IPv6 Ping IPv6 Ping IPv6 Ping Global IPv6 Address Host
59. of Other is displayed Other None of the following enumeration values Success The SNTP operation was successful and the system time was updated Request Timed Out A directed SNTP request timed out without receiving a response from the SNTP server Bad Date Encoded The time provided by the SNTP server is not valid Version Not Supported The SNTP version supported by the server is not compatible with the version supported by the client Server Unsynchronized The SNTP server is not synchronized with its peers This is indicated via the leap indicator field on the SNTP message Server Kiss Of Death The SNTP server indicated that no further queries were to be sent to this server This is indicated by a stratum field equal to 0 in a message received from a server Requests Specifies the number of SNTP requests made to this server since last agent reboot Failed Requests Specifies the number of failed SNTP requests made to this server since last reboot Click Refresh to refresh the screen with the most current data from the switch Summer Time Configuration Use the Summer Time Configuration screen to configure settings for summer time which is also known as daylight saving time Used in some countries around the world summer time is the practice of temporarily advancing clocks during the summer months Typically clocks are adjusted forward one or more hours near the start of spring and are adjus
60. on the network interface When DHCPwv6 is enabled the DHCPv6 Client DUID field displays the client identifier used by the DHCPv6 client if enabled when sending messages to the DHCPV6 server 4 In the IPv6 Gateway field specify the default gateway for the IPv6 network interface The gateway address is in IPv6 global or link local address format 5 Optionally configure one or more static IPv6 addresses for the management interface a In the IPv6 Prefix Prefix Length field specify the static IPv6 prefix and prefix to the IPv6 network interface The address is in the global address format b In the EUI64 field select True to enable the Extended Universal Identifier EUI flag for IPv6 address or select False to omit the EUI flag c Click Add 6 Click Apply IPv6 Network Neighbor Use the IPv6 Network Neighbor screen to view information about the IPv6 neighbors the device has discovered through the network interface by using the Neighbor Discovery Protocol NDP To access the screen select System Management IPv6 Network Neighbor A screen similar to the following displays IPv6 Network Interface Neighbor Table IPv6 Network Interface Neighbor Table Neighbor Last IPv6 Add MAC Add LENTES Updated Table 5 IPv6 neighbor table fields Field Description IPv6 Address The IPv6 address of the neighbor MAC Address The MAC address associated with an interface IsRtr Indicates whether the ne
61. option to drop packets for this policy class Mark VLAN CoS Select this value from the drop down list This is an integer value in the range from 0 to 7 for setting the VLAN priority Mark IP Precedence Select this value from the drop down list This is an IP Precedence value in the range from 0 to 7 167 XS712T Smart Switch Mark IP DSCP This lists the keywords for the known DSCP values from which one can be selected Simple Policy This lists the keywords for the known DSCP values from which one can be selected Color Conform Class This field is visible only if you select Color Aware Color Mode on the Policing Attributes screen this lists the DiffServ classes that are valid for use as a conform color aware specifier One of the classes must be selected from this list If you select the Simple Policy attribute configure the following fields Color Mode Color Aware mode requires the existence of one or more color classes that are valid for use with this policy instance otherwise the color mode is color blind which is the default Color Conform Mode The match criteria of the color Conform class Committed Rate The committed rate is specified in kilobits per second Kbps and is an integer from 14294967295 Committed Burst Size The committed burst size is specified in kilobytes KB and is an integer from 1 128 Conform Action Determines what happens to packets that are considered conforming below the police
62. password for the device For more information about this feature see Change the Switch Password on page 272 270 XS712T Smart Switch Configure the Device Use the Configure Device button to define basic switch configuration information To modify switch information 1 Select the switch 2 Click Configure Device Additional fields appear on the screen DHCP IP Address Subnet Mask MAC 00 05 02 04 06 07 2 Enabled Gateway System Name _ Disabled Location j Current Password Define the basic configuration Cancel 3 To assign or update a static IP address default gateway or subnet mask disable the DHCP client and enter the new information You can also specify a system name and location for the switch 4 Type the password in the Current Password field You cannot apply the changes without a valid switch password The default password for the switch is password 5 Click Apply The switch is updated with the changes to the network information 271 XS712T Smart Switch Change the Switch Password Use the Change Password button to change the administrative password you use to log in to the switch management interface To change the switch password 1 2 Select the switch Click Change Password Additional fields appear on the screen New Password MAC 00 05 02 04 06 07 Current Password a Confirm Password Change the salected devica passnord Type the switch password in
63. port has been configured as a monitoring port and is the source port in a port mirroring session For additional information about port monitoring and probe ports see Mirroring on page 256 Probe Indicates that the port has been configured as a monitoring port and is the destination port in a port mirroring session For additional information about port monitoring and probe ports see Mirroring on page 256 Port Channel Indicates that the port has been configured as a member of a port channel which is also known as a Link Aggregation Group LAG Port Channel ID If the port is a member of a port channel the port channel s interface ID and name are shown Otherwise Disable is shown Port Role Each MST Bridge Port that is enabled is assigned a Port Role for each spanning tree The port role will be one of the following values Root Port Designated Port Alternate Port Backup Port Master Port or Disabled Port STP Mode Displays the Spanning Tree Protocol STP Administrative Mode for the port or LAG The possible values for this field are Enable Enables the Spanning Tree Protocol for this port Disable Disables the Spanning Tree Protocol for this port STP State Displays the port s current state Spanning Tree state This state controls what action a port takes on receipt of a frame If the bridge detects a malfunctioning port it will place that port into the broken state The other five states are defined in
64. port or LAG to configure as the mirrored source 5 From the Direction list specify the direction of the Traffic to be mirrored from the configured mirrored port s The default value is Tx and Rx e Txand Rx Enable both transmitting and receiving on the selected ports e Tx only Enable only transmitting on the selected ports e Rx only Enable only receiving on the selected ports 6 Click Apply to apply the settings to the system If the port is configured as a source port the Status value is Mirrored gt To delete a mirrored port 1 Select the check box next to the mirrored port 2 Click Delete 257 XS712T Smart Switch 258 Maintenance Use the features available from the Maintenance tab to help you manage the switch The Maintenance tab contains links described in the following sections Reset Upload e Download File Management Reset The Reset menu contains links described in the following sections Device Heboot e Factory Default Device Reboot Use the Device Reboot screen to reboot the switch gt To reboot the switch 1 Select Maintenance gt Reset gt Device Reboot Device Reboot Device Reboot Check this box and click APPLY below to reboot 2 Select the check box 3 Click Apply The switch resets immediately The management interface is not available until the switch completes the boot cycle After the switch resets the login screen displays 259 X
65. queue position Before traffic in a lower queue is sent it must wait for traffic in higher queues to be sent 4 Click Apply DSCP to Queue Mapping Use the DSCP to Queue Mapping screen to specify which internal traffic class to map the corresponding DSCP value gt To map DSCP values to queues 1 Select QoS gt CoS gt Advanced gt DSCP to Queue Mapping DSCP to Queue Mapping Class Selector CS PHB Oc EC cs 0 000000 i w cs 2 010000 ol cs 4 100000 2 cs 6 110000 3 v cs 1 001000 o v cs3 011000 1 cs5 101000 2 v cs7 111000 3v Assured Forwarding AF PHB a aea L Cc R53 AF 11 001010 o v AF21 010010 o v AF31 011010 1 v AF41 100010 2v AF 12 001100 o v AF22 010100 o v AF32 011100 1 v AF42 100100 2 v AF 13 001110 om AF23 010110 o v AF33 011110 1 v AF43 100110 2 v Expedited Forwarding EF PHB EF 101110 2 Other DSCP Values Local Experimental Use co 1 000001 17 010001 39 100111 53 110101 2 000010 19 010011 41 101001 54 110110 3 000011 21 010101 42 101010 55 110111 4 000100 23 010111 43 101011 57 111001 5 000101 25 011001 44 101100 58 111010 6 000110 27 011011 45 101101 59 111011 7 000111 29 011101 47 101111 60 111100 9 001001 31 011111 49 110001 61 111101 11 001011 33 100001 50 110010 62 111110 13 001101 35 100011 51 110011
66. rate Select one of the following actions Send default These packets are presented unmodified by DiffServ to the system forwarding element Drop These packets are immediately dropped Mark CoS These packets are marked by DiffServ with the specified CoS value before being presented to the system forwarding element This selection requires that the Mark CoS value field be set Mark IP Precedence These packets are marked by DiffServ with the specified IP Precedence value before being presented to the system forwarding element This selection requires that the Mark IP Precedence value field be set Mark IP DSCP These packets are marked by DiffServ with the specified DSCP value before being presented to the system forwarding element This selection requires that the DSCP value field be set If you select Other enter a custom value in the DSCP Value field that displays Violate Action Determines what happens to packets that are considered non conforming above the police rate Select one of the following actions Send default These packets are presented unmodified by DiffServ to the system forwarding element Drop default These packets are immediately dropped Mark CoS These packets are marked by DiffServ with the specified CoS value before being presented to the system forwarding element This selection requires that the Mark CoS value field be set 168 XS712T Smart Switch Mark IP Precedence
67. s speed and duplex mode e Link Status Indicates whether the Link is up or down Link Trap This object determines whether or not to send a trap when link status changes The factory default is Enable Enable Specifies that the system sends a trap when the link status changes Disable Specifies that the system does not send a trap when the link status changes Maximum Frame Size Specifies the maximum Ethernet frame size the interface supports The size includes the Ethernet header CRC and payload Any change to the maximum frame size is immediately applied to all interfaces MAC Address Displays the physical address of the specified interface PortList Bit Offset Displays the bit offset value which corresponds to the port when the MIB object type PortList is used to manage in SNMP e iflndex The iflndex of the interface table entry associated with this port If the interface field is set to All this field is blank 5 Click Apply Flow Control IEEE 802 3x flow control works by pausing a port when the port becomes oversubscribed and dropping all traffic for small bursts of time during the congestion condition This can lead to high priority and or network control traffic loss When IEEE 802 3x flow control is enabled lower speed switches can communicate with higher speed switches by requesting that the higher speed switch refrains from sending packets Transmissions are temporarily halted to prevent buffer over
68. screen to view the data that each port advertises through LLDP gt To view local LLDP information 1 Select System Advanced LLDP Local Information The Local Information screen displays Local Information Device Information Chassis ID Subtype MAC Address Chassis ID 20 E5 2A 01 AE 90 System Name System Description XS712T ProSafe 12 Port 10 Gigabit Ethernet 10GbE Smart Switch 6 1 0 3 B6 1 0 1 System Capabilities bridge Port Information Port ID Subtype Port ID Port Description Advertisement 2 View summary LLDP information for the switch and the LLDP enabled ports 62 XS712T Smart Switch Note The list includes only the interfaces on which LLDP is enabled If no interfaces are enabled for LLDP the Interface list does not display The following table describes the LLDP device information and port summary information Field Description Chassis ID Subtype The type of information used to identify the switch in the Chassis ID field Chassis ID The hardware platform identifier for the switch System Name The user configured system name for the switch System Description The switch description which includes information about the product model and platform System Capabilities The primary function s the switch supports Interface The interface associated with the rest of the data in the row Port ID Subtype The type of information used to id
69. section displays the following e Rule Type This is the action to be performed when the rules selected are matched e Service Type The policy is restricted by the management chosen from Drop down menu Possible methods include HTTP Secure HTTP SSL and SNMP Source IP Address This is the Source IP Address of the client originating the management traffic Fill in the Source IP address in the text box provided e Mask This is the Source IP Address Mask of the client originating the management traffic e Priority Assign a priority to the rule The rules are validated against the incoming management request in the ascending order of their priorities If a rule matches action is performed and subsequent rules below are ignored For example if a Source 188 XS712T Smart Switch IP 10 10 10 10 is configured with priority 1 to permit and Source IP 10 10 10 10 is configured with priority 2 to Deny then access is permitted if the profile is active and the second rule is ignored 4 Click Apply Access Rule Configuration Use the Access Rule Configuration screen to add security access rules To configure access rules 1 Select Security gt Access gt Access Control gt Access Rule Configuration Access Rule Configuration Access Rule Configuration __ Rule Type Source IP Address ae ey a 2 Specify the following settings Rule Type Select the action to be performed when the rules selected
70. sent to the host For example if you select Error the logged messages include Error Critical Alert and Emergency The default severity level is Alert 1 The severity can be one of the following levels Emergency 0 The highest warning level If the device is down or not functioning properly an emergency log is saved to the device Alert 1 The second highest warning level An alert log is saved if there is a serious device malfunction such as all device features being down Critical 2 The third highest warning level A critical log is saved if a critical device malfunction occurs for example two device ports are not functioning while the rest of the device ports remain functional Error 3 A device error has occurred such as if a port is offline Warning 4 The lowest level of a device warning Notice 5 Provides the network administrators with device information Informational 6 Provides device information Debug 7 Provides detailed information about the log Debugging should only be entered by qualified support personnel 2 Click Add The Status field in the Server Configuration table shows whether the remote logging host is currently active Todelete an existing host 1 Select the check box next to the host to remove 2 Click Delete To modify the settings for an existing host 1 Select the check box next to the host to modify 2 Change the desired information 3 Cli
71. switch configuration on your administrative system 1 Click the Maintenance tab and select the device with the configuration to save 2 Click Upload Configuration The Browse for Folder window displays 3 Navigate to and select the folder where you want to store the configuration file Browse For Folder Select a Folder to store the configuration file E Desktop Ez G My Documents it E My Computer a My Network Places 273 4 5 XS712T Smart Switch Click OK Enter the switch password and click Apply The file is uploaded to the administrative computer as a cfg file You can open it and view the contents with a text editor gt To restore the configuration to a previously saved version le 2 ma 6 te Click the Maintenance tab and select the device with the configuration to restore Click Download Configuration The Select a Configuration window displays Navigate to and select the configuration file to download to the switch Click Open Download the file to the switch immediately or schedule a different date and time to download the configuration file Immediately Select the Run Now check box Later Clear the Run Now check box and enter a date and time to complete the download Date 1 4 2011 adi Current Password Time 42 pm C Documents and Settings Administrator My D ts Downloads Vdev 324692 Lv Download a configuration to the selected devi Ente
72. temperature is instant and can be refreshed when the REFRESH button is pressed The maximum temperature of CPU and MACs depends on the actual hardware Fan Status Boot Version The screen shows the status of the fans These fans remove the heat generated by the power CPU and other chipsets make chipsets work normally Fan status has three possible values OK Failure Not Present The boot code version of the switch Software Version The software version of the switch 28 XS712T Smart Switch IP Configuration Use the IP Configuration screen to configure network information for the management interface which is the logical interface used for in band connectivity with the switch through any of the switch s front panel ports The configuration parameters associated with the switch s network interface do not affect the configuration of the front panel ports through which traffic is switched or routed gt To configure the network information for the management interface 1 Select System Management IP Configuration The IP Configuration screen displays IP Configuration IP Configuration Current Network Configuration Protocol Static IP Address Dynamic IP Address BOOTP Dynamic IP Address DHCP IP Address Subnet Mask Default Gateway Management VLAN Management VLAN ID Select the appropriate radio button to determine how to configure the network information for the swi
73. that connects the port to the plug is correctly inserted and a valid device locked into the port at both the switch and the connecting device Ensure that all cables are used correctly and comply with the Ethernet specifications Check for a defective adapter card cable or port by testing them in an alternate environment where all products are functioning File transfer is slow Half or full duplex setting on the switch Make sure that the attached device is or performance and the connected device are not the configured to autonegotiate degradation is a same problem A segment or device One or more devices are not connected Verify that the cabling is correct is not recognized as correctly or cabling does not meet Ensure that all connectors are part of the network Ethernet guidelines securely positioned in the required ports Equipment could have been accidentally disconnected Link ACT LED is A network loop redundant path has Break the loop by ensuring that there flashing continuously been created is only one path from any networked on all connected device to any other networked device ports and the network is disabled 283 XS712T Smart Switch 284 Configuration Examples This appendix contains information about how to configure e Virtual Local Area Networks VLANs e Access Control Lists ACLs e Differentiated Services DiffServ e 802 1X e MSTP
74. the appropriate lists select the date and time on which summer time begins Ends At From the appropriate lists select the date and time on which summer time ends 4 Next to the Offset field specify the number of minutes to shift the summer time from the standard time 5 Next to the Zone field specify the acronym associated with the time zone when summer time is in effect This field is not validated against an official list of time zone acronyms 6 Click Apply The Summer Time Status table shows information about the summer time settings and whether the time shift for summer time is currently in effect Denial of Service Use the Denial of Service DoS feature to configure DoS control The switch software provides support for classifying and blocking specific types of DoS attacks Configure Auto DoS The Auto DoS Configuration screen lets you automatically enable all the DoS features available on the switch except for the L4 Port attack For information about the types of DoS attacks the switch can monitor and block see Configure Denial of Service on page 41 Toenable the Auto DoS feature 1 Select System Management Denial of Service Auto DoS Configuration The Auto DoS Configuration screen displays 40 XS712T Smart Switch Auto DoS Configuration Auto DoS Configuration Auto DoS Mode Disable Enable 2 Next to the Auto DoS Mode field select Enable When an attack is detected a war
75. the selected interfaces Select the check box in the heading row to apply the same settings to all interfaces 5 From the Policy In Name list select the policy to attach to the interface 6 Click Apply gt To remove a policy from an interface 1 Select the interface s on which the policy is to be removed 2 From the Policy In Name list select None 3 Click Apply Service Statistics Use the Service Statistics screen to display service level statistical information about all interfaces that have DiffServ policies attached gt To display the service statistics screen Select QoS gt DiffServ gt Advanced gt Service Statistics The Service Statistics screen displays Service Statistics Service Statistics Direction Policy Operational Discarded Member Name Status Packets Classes The following table describes the information available on the Service Statistics screen Table 23 Service statistics Field Description Interface Displays the interface for which service statistics are to display Direction Displays the direction of packets for which service statistics display which is always In Policy Name Displays the policy associated with the selected interface Operational Status Displays the operational status of this service interface which is either Up or Down Discarded Packets Displays the total number of packets discarded for all class instances in this service policy for
76. total number of packets received that were without errors Without Errors Packets Received With Error The number of inbound packets that contained errors preventing them from being deliverable to a higher layer protocol 236 XS712T Smart Switch Table 38 Port statistics Continued Field Description Broadcast Packets Received The total number of good packets received that were directed to the broadcast address This does not include multicast packets Packets Transmitted Without The number of frames that have been transmitted by this port to its segment Errors Transmit Packet Errors The number of outbound packets that could not be transmitted because of errors Collision Frames The best estimate of the total number of collisions on this Ethernet segment Time Since Counters Last The elapsed time in days hours minutes and seconds since the statistics Cleared for this port were last cleared gt To reset the counters for all interfaces on the switch 1 Select the check box in the heading of the table 2 Click Clear gt To reset the counters for a specific interface 1 Select the check box next to the interface for which you want to clear the counters You can also type the interface number for example 1 g7 in the Go To Interface field at the top or bottom of the table and click Go 2 Click Clear 237 XS712T Smart Switch Port Detailed Statistics T
77. using the web management interface on the switch For information about how to set the IP address on the administrative system so it is in the same subnet as the default IP address of the switch see Configure the Network Settings on the Administrative System on page 12 Discover a Switch in a Network with a DHCP Server This section describes how to set up your switch in a network that has a DHCP server The DHCP client on the switch is enabled by default When you connect it to your network the DHCP server will automatically assign an IP address to your switch Use the Smart Control Center to discover the IP address automatically assigned to the switch Toinstall the switch in a network with a DHCP server 1 Connect the switch to a network with a DHCP server Power on the switch by connecting its power cord Install the Smart Control Center on your computer Start the Smart Control Center Click Discover for the Smart Control Center to find your switch m RM A screen similar to the one shown in the following figure displays SmartControlCenter Connect with Innovation Network Maintenance Tasks Adapter Help Current Network Adapter 10 27 34 63 Device List Product MAC Address IP Address DHCP Subnet Mask Gateway FirmW XS712T 00 05 02 04 06 07 10 27 34 153 Enabled 255 255 255 0 10 27 34 1 5 2 0 11 Discovered all network devices L Discover XS712T Smart Switch 6 Make a note of the displayed IP address a
78. with the following OUls that identify the IP phone manufacturer 00 01 E3 SIEMENS 00 03 6B CISCO1 00 12 43 CISCO2 00 0F E2 H3C 00 60 B9 NITSUKO 00 D0 1E PINTEL 00 E0 75 VERILINK 00 E0 BB 3COM 00 04 0D AVAYA1 00 1B 4F AVAYA2 00 04 13 SNOM 96 XS712T Smart Switch You can select an existing OUI or add a new OUI and description to identify the IP phones on the network To configure OUI settings 1 Select Switching gt Auto VoIP OUI based gt OUI Table OUI Table OUI Table 00 01 E3 00 03 68 00 12 43 00 0F E2 00 60 B9 00 D0 1E 00 E0 75 00 E0 BB 00 04 0D 00 1B 4F 00 04 13 __ Telephony our s SIEMENS CISCO1 CISCO2 H3C NITSUKO PINTEL VERILINK 3COM AVAYAL AVAYA2 SNOM 2 Under Telephony OUI s specify the VOIP OUI prefix The OUI prefix must be in the format AA BB CC 3 Under Description type a description that identifies the manufacturer or vendor associated with the OUI The maximum length of description is 32 characters 4 Click Add gt To delete one or more OUI prefixes from the table 1 Select the check box next to each OUI prefix to remove 2 Click Delete 97 XS712T Smart Switch Spanning Tree Protocol The Spanning Tree Protocol STP provides a tree topology for any arrangement of bridges STP also provides one path between end stations on a network eliminating loops Spanning tree versions supported include Com
79. 0 Routing VLANs ARP Cache IP Address MAC Address ME The following table provides information included in the management VLAN ARP section Table 20 ARP cache information Field Description IP Address Displays the associated IP address of a device on a subnet attached to one of the switch s existing routing interfaces Port Shows the associated interface of the connection MAC Address Displays the MAC address of the device The following table provides information included in the routing VLANs ARP cache section Table 21 ARP cache information for routing VLANs Field Description Interface The routing interface associated with the ARP entry IP Address Displays the associated IP address of a device on a subnet attached to one of the switch s existing routing interfaces MAC Address Displays the unicast MAC address of the device Type The type of the ARP entry Possible values are Local An ARP entry associated with one of the switch s routing interface s MAC addresses Gateway A dynamic ARP entry whose IP address is that of a router Static An ARP entry configured by the user Dynamic An ARP entry which has been learned by the router Age Age since the entry was last refreshed in the ARP Table The format is hh mm ss Create a Static ARP Entry Use this screen to add a static entry to the ARP table 149 XS712T Smart Switch Toad
80. 0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Go To Interface xg2 xg3 xg4 T xg5 xg6 xg7 x98 xg9 xg10 Eo mo No mE o Boo o fe o fn o fem o iam o faa o i o feo Si o fem o S o feo EE o E o Si o fem o Si o mo Ec E o S o E o Io mo EN o mo Imo Bo Io iano Eo mom c Eo Si o iano Eo fee fee o fam o Io ao i o fe o Si o fem o mo amo o S o m o m o fo feo o mo E o feo em o feo SD 00 Gi 2 Select whether to display physical interfaces link aggregation groups LAGs or both by clicking one of the following links above the table heading e 1 Only physical interfaces are displayed This is the default setting e All Both physical interfaces and link aggregation groups are displayed To locate an interface quickly type the interface number for example xg12 in the Go To Interface field at the top or bottom of the table and click Go The following table describes the EAP statistics displayed on the screen Table 40 EAP statistics Field Description Ports The interface which is polled for statistics Frames Received The number of valid EAPOL frames received on the port Frames Transmitted The number of EAPOL frames transmitted through the port Start Frames Received The number of EAPOL Start frames received on the port Logoff Frames Received The number of EAPOL Log off frames th
81. 1066 263 Failure in function collectorGet 2 Select the radio buttons in the Admin Status field to determine whether to log messages e Enable Enables system logging e Disable Prevents the system from logging messages 3 From the Behavior menu specify the behavior of the log when it is full Wrap When the buffer is full the oldest log messages are deleted as the system logs new messages Stop on Full When the buffer is full the system stops logging new messages and preserves all existing log messages 4 f you change the buffered log settings click Apply to apply the changes to the system and the changes will be saved The Memory Log table displays on the Memory Log screen The Total Number of messages displays the number of messages the system has logged in memory Only the 64 most recent entries are displayed on the screen The rest of the screen displays the Memory Log messages The format of the log message is the same for messages that are displayed for the message log persistent log or console log Messages logged to a collector or relay via syslog have the same format as well The following example shows the standard format for a log message 14 Mar 24 05 34 05 10 131 12 183 1 UNKN 2176789276 main login c 179 3855 HTTP Session 19 initiated for user admin connected from 10 27 64 122 The number contained in the angle brackets represents the message priority which is derived from the
82. 2 1s 4 Specify the configuration name and revision level Configuration Name Name used to identify the configuration currently being used It can be up to 32 alphanumeric characters Configuration Revision Level Number used to identify the configuration currently being used The values allowed are between 0 and 65535 The default value is O 5 In the Forward BPDU while STP Disabled field specify whether spanning tree BPDUs should be forwarded Enabled or not Disabled while spanning tree is disabled on the Switch 99 XS712T Smart Switch 6 Click Apply 7 View the STP Status information displayed on the screen Field Description Configuration Digest Key This is used to identify the configuration currently being used Bridge Identifier The bridge identifier for the CST It is made up using the bridge priority and the base MAC address of the bridge Time Since Topology Change The time in seconds since the topology of the CST last changed Topology Change Count The number of times the topology has changed for the CST Topology Change The value of the topology change parameter for the switch indicating if a topology change is in progress on any port assigned to the CST The value is either True or False Designated Root The bridge identifier of the root bridge It is made up from the bridge priority and the base MAC address of the bridge Root Path Cost Path cost to the Designated Root
83. 20 E5 2A 01 AE 90 FAN Status FAN status Failure OK Temperature Status Temperature Sensor 1 31 C Sensor 2 30 C Versions XS712T B6 1 0 1 6 1 0 3 2 Define the following fields System Name Enter the name you want to use to identify this switch You can use up to 255 alphanumeric characters The factory default is blank e System Location Enter the location of this switch You can use up to 255 alphanumeric characters The factory default is blank System Contact Enter the contact person for this switch You can use up to 255 alphanumeric characters The factory default is blank 3 Click Apply The system parameters are applied and the device is updated 27 The following table describes the status information the System Information screen displays XS712T Smart Switch Table 4 System Information screen status fields Field Description Product Name The product name that describes the switch Serial Number System Object ID The serial number of the switch The base object ID for the switch s enterprise MIB Date amp Time The current date and time System Up Time Displays the number of days hours and minutes since the last system restart Base MAC Address The universally assigned network address Model Name The model name of the switch Temperature Status This table shows temperature of different system sensors The
84. 247 XS712T Smart Switch The following table describes the cable information displayed on the screen Table 41 Cable information Field Description Port Specifies the port that has the connected cable Cable Status Displays the cable status Normal The cable is working correctly Open The cable is disconnected or there is a faulty connector e Short There is an electrical short in the cable Cable Test Failed The cable status could not be determined The cable can in fact be working Unknown The test has not been performed Cable Length The estimated length of the cable in meters The length is displayed as a range between the shortest estimated length and the longest estimated length Unknown is displayed if the cable length could not be determined The Cable Length is displayed only if the cable status is Normal Failure Location The estimated distance in meters from the end of the cable to the failure location The failure location is displayed only if the cable status is Open or Short Logs The switch can generate messages in response to events faults or errors occurring on the platform as well as changes in configuration or other occurrences These messages are stored locally and can be forwarded to one or more centralized points of collection for monitoring purposes or long term archival storage Local and remote configuration of the logging capability includes fil
85. 25 RADIUS accounting server statistics Field Description Accounting Server Address Displays the IP address of the supported RADIUS accounting server Round Trip Time secs Displays the time interval in hundredths of a second between the most recent Accounting Response and the Accounting Request that matched it from this RADIUS accounting server Accounting Requests The number of RADIUS Accounting Request packets sent to this server This number does not include retransmissions Accounting Retransmissions The number of RADIUS Accounting Request packets retransmitted to this server Accounting Responses Displays the number of RADIUS packets received on the accounting port from this server Malformed Accounting Responses Displays the number of malformed RADIUS Accounting Response packets received from this server Malformed packets include packets with an invalid length Bad authenticators and unknown types are not included as malformed accounting responses Bad Authenticators Displays the number of RADIUS Accounting Response packets that contained invalid authenticators received from this accounting server Pending Requests The number of RADIUS Accounting Request packets destined for this server that have not yet timed out or received a response Timeouts The number of accounting timeouts to this server Unknown Types The number of RADIUS packets of unknown type whi
86. 2T Smart Switch Class You can classify incoming packets at layers 2 3 and 4 by inspecting the following information for a packet e Source destination MAC address e EtherType e Class of Service 802 1p priority value first only VLAN tag e VLAN ID range first only VLAN tag IP Service Type octet also known as ToS bits Precedence value DSCP value Layer 4 protocol such as TCP or UDP e Layer 4 source destination ports e Source destination IP address From a DiffServ point of view there are two types of classes DiffServ traffic classes DiffServ service levels forwarding classes DiffServ Traffic Classes With DiffServ you define which traffic classes to track on an ingress interface You can define simple BA classifiers DSCP and a wide variety of multifield MF classifiers Layer 2 Layers 3 4 IP only Protocol based e Address based You can combine these classifiers with logical AND or OR operations to build complex MF classifiers by specifying a class type of a or any respectively That is within a single class multiple match criteria are grouped together as an AND expression or a sequential OR expression depending on the defined class type Only classes of the same type can be nested class nesting does not allow for the negation i e exclude option of the referenced class To configure DiffServ you must define service levels namely the forwarding classes PHBs identified by a given D
87. 4294967295 4 Click the appropriate orange bar to expose the available ports or LAGs e To add the selected ACL to a port or LAG click the box directly below the port or LAG number so that a check mark displays in the box e Toremove the selected ACL from a port or LAG click the box directly below the port or LAG number to clear the selection A check mark in the box indicates that the ACL is applied to the interface 5 Click Apply 230 XS712T Smart Switch IP Binding Table Use the IP Binding Table screen to view or delete the IP ACL bindings Todelete an IP ACL binding 1 Select Security gt ACL gt Advanced gt Binding Table IP ACL Binding Table IP ACL Binding Table Interface ection a RENS Number 2 Select the check box associated with the ACL to interface binding to remove 3 Click Delete The following table describes the information displayed in the IP binding table Table 36 IP binding table information Field Description Interface Displays the interface to which the IP ACL is bound Direction Specifies the packet filtering direction for ACL The only valid direction is Inbound which means the IP ACL rules are applied to traffic entering the port ACL Type Displays the type of ACL assigned to selected interface and direction ACL ID Displays the ACL Number identifying the ACL assigned to selected interface and direction Seq No Displays the Sequence Number signifyi
88. 5 Enable UP xg6 Enable UP xg7 Enable UP xg8 Enable UP xg9 Enable UP xgiO Enable UP xgii Enable UP xg12 Enable UP 1 LAGS All In the Prioritization Type list select method used to prioritize VoIP traffic when a call control protocol is detected which is one of the following Remark Remark the voice traffic with the specified 802 1p priority value at the ingress interface e Traffic Class Assign VoIP traffic to the specified traffic class when egressing the interface In the Class Value list select the CoS tag value to be reassigned for packets received on the voice VLAN when Remark CoS is enabled Select the interface s to configure In the Auto VoIP Mode list select Enable to enable Auto VoIP on the selected interfaces The Operational Status field displays the current operational status of the interface Click Apply 94 XS712T Smart Switch OUI Based Properties The OUI based properties screen allows you to configure the OUI based properties gt To configure OUI based properties 1 Select Switching gt Auto VoIP OUI based gt Properties OUI Based Properties OUI Based Properties VoIP VLAN Id OUI based priority 2 In the VoIP VLAN ID list select the VLAN to use to segregate VolP traffic from other non voice traffic All VoIP traffic that matches a value in the known OUI list gets assigned to this VoIP VLAN elect the VoIP VLAN I
89. 568 from this switch on ports 7 and 8 are assigned to hardware queue 3 On this network traffic from streaming applications uses UDP port 4567 as the source and 4568 as the destination This real time traffic is time sensitive so it is assigned to a high priority hardware queue By default data traffic uses hardware queue 0 which is designated as a best effort queue Also the confirmed action on this flow is to send the packets with a committed rate of 1 000 000 Kbps and burst size of 128 KB Packets that violate the committed rate and burst size are dropped 802 1X Local Area Networks LANs are often deployed in environments that permit unauthorized devices to be physically attached to the LAN infrastructure or permit unauthorized users to attempt to access the LAN through equipment already attached In such environments it can be desirable to restrict access to the services offered by the LAN to those users and devices that are permitted to use those services Port based network access control makes use of the physical characteristics of LAN infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point to point connection characteristics and of preventing access to that port in cases in which the authentication and authorization process fails In this context a port is a single point of attachment to the LAN such as ports of MAC bridges and associations between stations or a
90. 63 111111 15 001111 37 100101 52 110100 lt lt ojo E 25 lt 3353 aaa ae hess lt lt lt allele lt n 3 lel a mum Ie lx lt w ns m N lt lt a lt x ik st lt af a ee o x T9 lt i n lt I f Is lt o a w lt 2 For each DSCP value select a hardware queue to associate with the value The traffic class is the hardware queue for a port Higher traffic class values indicate a higher queue position Before traffic in a lower queue is sent it must wait for traffic in higher queues to be sent Valid range is 0 6 3 Click Apply 159 XS712T Smart Switch Differentiated Services The QoS feature contains Differentiated Services DiffServ support that allows traffic to be classified into streams and given certain QoS treatment in accordance with defined per hop behaviors Standard IP based networks are designed to provide best effort data delivery service Best effort service implies that the network delivers the data in a timely fashion although there is no guarantee that it will During times of congestion packets can be delayed sent sporadically or dropped For typical Internet applications such as e mail and file transfer a slight degradation in service is acceptable and in many cases unnoticeable Conversely any degradation of service has un
91. 802 1X Configuration screen set the Port Based Authentication State and Guest VLAN Mode to Enable and then click Apply see Port Security Configuration on page 201 This example uses the default values for the port authentication settings but there are several additional settings that you can configure For example the EAPOL Flood Mode field allows you to enable the forwarding of EAPoL frames when 802 1X is disabled on the device From the RADIUS Server Configuration screen configure a RADIUS server with the following settings e Server Address 192 168 10 23 Secret Configured Yes e Secret secret123 Active Primary 296 XS712T Smart Switch For more information see RADIUS Configuration on page 173 7 Click Add 8 From the Authentication List screen configure the default List to use RADIUS as the first authentication method see Authentication List Configuration on page 180 This example enables 802 1X based port security on the XS712T switch and prompts the hosts connected on ports g1 98 for an 802 1X based authentication The switch passes the authentication information to the configured RADIUS server MSTP Spanning Tree Protocol STP runs on bridged networks to help eliminate loops If a bridge loop occurs the network can become flooded with traffic IEEE 802 1s Multiple Spanning Tree Protocol MSTP supports multiple instances of Spanning Tree to efficiently channel VLAN traffic over different interface
92. 9 Device RebODE 2446224 esti adatti re RR PERSE RE X PER E ERA 259 gg cepab rneeetecrc PPP UT 260 Upad oo 2 ag SUP peek ded nee REO RIP ERU SERRE RE EE RS 260 PAMP Fle Upload iu dus asadpad Rad ASSURER EGRE RE Qu 262 XS712T Smart Switch Dll ees Soho Bee ee T Oe SR SER PRL eS bes TRIP File Downed jc lt lt gece 4 as coo add oe Ghee des AGES MEARE HA Appendix A Smart Control Center Utilities istis A UMES cc TE Upload and Download the Configuration 000 Appendix B Troubleshooting Troubleshooting Configuration Menu 0 0 0 eee eee PU ace desc Redcar OOS DACRE AL EAMETS EE Baird e OR Ae sls TRoubleshooniig CRIT 264440544se0ndcesehante ERST TERR TE ceane Appendix C Configuration Examples Virtual Local Area Networks VLANs useesseeeeseen Sample VLAN Configuration llle nee eene Access Control Lists ACLS c c44a casaG4464 044094 0489 Rew ES MAC ACL Example Configuration illie Sample Standard IP ACL Configuration 00 cee eae Differentiated Services DiffServ lille elles eee eee DiINSery Trafic Classes uoossdbduddgaus pid pa wee eat Aa Sample DiffServ Configuration 2 6 5 0 ce eee eens MODI A 65 cus ethics DA a mad woes 4c UR te A DR do we Sample 802 1X Configuration 0 00 eee MP ida danda DER ded ex E Rh a ed oN Bare pl Aan ah se VLAN Routing Overview 222 4 6c eee een e e yy hn Sample VLAN Routing Configuration
93. AN Type Unconfigured Unconfigured Unconfigured 205 XS712T Smart Switch 2 Use the Private VLAN Type menu to select the type of private vlan The factory default is Unconfigured e Primary A private VLAN that forwards the traffic from the promiscuous ports to isolated ports community ports and other promiscuous ports in the same private VLAN Only one primary VLAN can be configured per private VLAN All ports within a private VLAN share the same primary VLAN e Isolated A secondary VLAN that carries traffic from isolated ports to promiscuous ports Only one isolated VLAN can be configured per private VLAN Community A secondary VLAN that forwards traffic between ports that belong to the same community and to the promiscuous ports Multiple community VLANs can be configured per private VLAN e Unconfigured The VLAN is not configured as a private VLAN 3 Click Apply Table 31 Private VLAN type table information Field Description VLAN ID Displays the VLAN ID for which Private VLAN type is being set The factory default is Unconfigured Private VLAN Association Configuration Use this screen to configure the association between the primary VLAN and secondary VLANs Associating a secondary VLAN with a primary VLAN allows host ports in the secondary VLAN to communicate outside the private VLAN gt To configure the private VLAN association 1 Select Security gt Traffic Control
94. Add 4 From the IP Rules screen create a second rule for IP ACL 1 with the following settings e Rule ID 2 e Action Permit e Match Every True 5 Click Add 6 From the IP Binding Configuration screen assign ACL ID 1 to the Ethernet ports 2 3 and 4 and assign a sequence number of 1 see P Binding Configuration on page 230 By default this IP ACL is bound on the inbound direction so it examines traffic as it enters the switch 7 Click Apply 289 XS712T Smart Switch 8 Use the IP Binding Table screen to view the interfaces and IP ACL binding information see IP Binding Table on page 231 The IP ACL in this example matches all packets with the source IP address and subnet mask of the Finance department s network and deny it on the Ethernet interfaces 2 3 and 4 of the switch The second rule permits all non Finance traffic on the ports The second rule is required because there is an explicit deny all rule as the lowest priority rule Differentiated Services DiffServ Standard IP based networks are designed to provide best effort data delivery service Best effort service implies that the network deliver the data in a timely fashion although there is no guarantee that it will During times of congestion packets can be delayed sent sporadically or dropped For typical Internet applications such as e mail and file transfer a slight degradation in service is acceptable and in many cases unnoticeable However any d
95. Based VLAN Group Membership Voice VLAN 84 XS712T Smart Switch Basic VLAN Configuration Use the VLAN Configuration screen to define VLAN groups stored in the VLAN membership table The XS712T supports up to 256 VLANs VLAN 1 VLAN 2 and VLAN 3 are created by default and all ports are untagged members gt To configure VLANs 1 Select Switching gt VLAN gt Basic gt VLAN Configuration VLAN Configuration VLAN Configuration BET VLAN Name VLAN Type Default Default Auto VoIP AUTO VoIP 3 Auto Video Auto Video Reset Reset Configuration 2 Under VLAN ID specify the VLAN Identifier for the new VLAN 3 Optionally under VLAN Name specify a name to help identify the VLAN 4 Click Add gt To delete a one or more VLANs 1 Select the check box next to each VLAN to delete Note You cannot delete VLANs 1 2 or 3 which are created by default 2 Click Delete gt To modify the VLAN name 1 Select the check box next to the VLAN to modify 2 Under VLAN Name specify the new name 3 Click Apply gt To reset the VLAN settings on the switch to the factory defaults 1 Select the Reset Configuration check box 2 Click OK in the popup message to confirm the action 3 If the Management VLAN is set to a non default VLAN VLAN 1 it is automatically set to 1 after a the VLAN configuration is reset 85 XS712T Smart Switch VLAN Membership Configuration Use this screen
96. C Address assigned to the VLAN Routing Interface 144 XS712T Smart Switch Configure Router Discovery The Router Discovery protocol is used by hosts to identify operational routers on the subnet Router Discovery messages are of two types Router Advertisements and Router Solicitations The protocol mandates that every router periodically advertise the IP Addresses itis associated with Hosts listen for these advertisements and discover the IP Addresses of neighboring routers Router Discovery Configuration Use the Router Discovery Configuration screen to enter or change Router Discovery parameters gt To configure the router discovery parameters 1 Select Routing Router Discovery Router Discovery Router Discovery Configuration Advertise Maximum Minimum Advertise Lifeti Pref L I E Interface aoe Advertise Address Eas Taleal puru Interval vertise Lifetime reference Level 2 Select the router interface for which data is to be configured To perform the same configuration on all interfaces select the check box in the heading row To configure a single interface select the check box associated with the interface The interface number displays in the Interface field in the table heading row 3 Select Enable or Disable from the drop down menu If you select Enable Router Advertisements are transmitted from the selected interface 4 Enter the IP Address to be used to advertise the router 5 Enter the maximu
97. Click Current Members button to view the current members of the selected protocol based VLAN Group 91 XS712T Smart Switch Voice VLAN The Voice VLAN feature enables ports to carry voice traffic that has a defined priority Voice over IP VoIP traffic is inherently time sensitive For a network to provide acceptable service the transmission rate is vital The priority level enables the separation of voice and data traffic entering the port Use the Voice VLAN Configuration screen to configure the administrative mode of the Voice VLAN and to configure voice VLAN settings for ports that carry traffic from IP phones The Voice VLAN feature can help ensure that the sound quality of an IP phone is safeguarded from deteriorating when the data traffic on the port is high gt To configure voice VLAN settings 1 Select Switching gt VLAN gt Advanced gt Voice VLAN Configuration Voice VLAN Configuration Voice VLAN Global Admin Admin Mode Q Disable Enable Voice VLAN Configuration 2 p 1 AI Go To Interface Go CoS O id Oo ti l Interface Interface Mode Value minae PUT Mode Ete UH 23 dHIAI OM Disable S Disable xg3 Disable Disable xg5 Disable Disable xg7 Disable Disable xg9 Disable Disable Disable Disable Disable LL Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Di
98. Configuration e LAG Membership e LACP Configuration e LACP Port Configuration LAG Configuration Use the LAG Port Channel Configuration screen to group one or more full duplex Ethernet links to be aggregated together to form a link aggregation group which is also known as a port channel The switch treats the LAG as if it were a single link gt To configure LAG settings 1 Select Switching gt LAG gt Basic gt LAG Configuration LAG Configuration LAG Configuration LAG is d ccc ee d I Lon Static LL Down 12 Enable Disable Disable Static Link Down Enable Disable Disable Static Link Down Enable Disable Disable Static Link Down Enable Disable Disable Static Link Down Enable Disable Disable Static Link Down Enable Disable Disable Static Link Down Enable Disable Disable Static Link Down 2 Select the check box next to the LAG to configure You can select multiple LAGs to apply the same setting to the selected interfaces Select the check box in the heading row to apply the same settings to all interfaces 3 Configure or view the following settings 80 XS712T Smart Switch Note Click current members in the list to see existing member ports in that LAG LAG Name Specify the name you want assigned to the LAG You can enter any string of up to 15 alphanumeric characters A valid name has to be specified in order to create the LAG e Description Specify the Description string to be
99. Configuration The following example shows how to create a MAC based ACL that permits Ethernet traffic from the Sales department on specified ports and denies all other traffic on those ports 1 From the MAC ACL screen create an ACL with the name Sales ACL for the Sales department of your network see MAC ACL on page 215 By default this ACL will be bound on the inbound direction which means the switch will examine traffic as it enters the port 2 From the MAC Rules screen create a rule for the Sales ACL with the following settings ID 1 Action Permit Assign Queue 0 Match Every False CoS 0 Destination MAC 01 02 1A BC DE EF Destination MAC Mask 00 00 00 00 FF FF Source MAC 02 02 1A BC DE EF Source MAC Mask 00 00 00 00 FF FF VLAN ID 2 For more information about MAC ACL rules see MAC Rules on page 216 3 From the MAC Binding Configuration screen assign the Sales ACL to Ethernet ports 6 7 and 8 and then click Apply seeMAC Binding Configuration on page 218 IP Binding Configuration Binding Configuration Sequence Number z 1 to 4294967295 Port Selection Table Interface Binding Status ACL Type ACL ID Name Sequence Number 288 XS712T Smart Switch You can assign an optional sequence number to indicate the order of this access list relative to other access lists if any are already assigned to this interface and direction 4 The MAC Binding Table displays the interface and MAC ACL bindi
100. Configuration screen to configure routing parameters for the switch gt To enable routing on the switch 1 Select Routing gt IP gt IP Configuration IP Configuration IP Configuration Default Time to Live Routing Mode Maximum Next Hops 64 Enable Disable 1 2 Next to Routing Mode select Enable You must enable routing for the switch before you can route through any of the interfaces Routing is also enabled or disabled per VLAN interface The default value is Disable The following table describes the IP configuration information displayed on the screen Field Description Default Time to Live The default value inserted into the Time To Live field of the IP header of datagrams originated by the switch if a TTL value is not supplied by the transport layer protocol The default value is 64 Maximum Next Hops The maximum number of hops supported by the switch This is a compile time constant The default value is 1 3 Click Apply IP Statistics The statistics reported on the IP Statistics screen are as specified in RFC 1213 gt To display the IP statistics screen Select Routing gt IP gt Statistics The IP Statistics screen displays 138 IP Statistics IP Statistics IpInReceives IpInHdrErrors IpInAddrErrors IpForwDatagrams IpInUnknownProtos IpInDiscards IpInDelivers IpOutRequests IpOutDiscards IpOutNoRoutes IpReasmTimeout IpReasmReqds IpReasmOKs
101. D to compare against an Ethernet frame Valid range of values is 1 to 4095 Either VLAN Range or VLAN can be configured In the Binding Configuration area specify the packet filtering direction for an ACL in the Direction field Valid direction is Inbound only In the Port Selection Table area specify the list of all available valid interfaces for ACL mapping All non routing physical interfaces and interfaces participating in LAG are listed To add a new rule to the ACL based on destination MAC select the check box next to the Name field then click Add Click Apply gt To remove a rule 1 2 Select the rule to remove Click Delete 214 XS712T Smart Switch MAC ACL A MAC ACL consists of a set of rules which are matched sequentially against a packet When a packet meets the match criteria of a rule the specified rule action Permit Deny is taken and the additional rules are not checked for a match There are multiple steps involved in defining a MAC ACL and applying it to the switch 1 Create the ACL ID See MAC ACL 2 Create a MAC rule See MAC Rules 3 Create a MAC binding configuration See MAC Binding Configuration 4 Optionally create a MAC binding table See MAC Binding Table gt To add a MAC ACL 1 Select Security gt Basic gt MAC ACL MAC ACL MAC ACL Current Number of ACL Maximum ACL MAC ACL Table Tes e oT 0 abc The MAC ACL table displays the number of ACLs cur
102. Disable 3600 60 C xg4 Auto 0 90 0 Disable 3600 60 Fl xg5 Auto 0 90 0 Disable 3600 60 xg6 Auto 0 90 0 Disable 3600 60 7 xg7 Auto 0 90 0 Disable 3600 60 xg8 Auto 0 90 0 Disable 3600 60 xg9 Auto 0 90 0 Disable 3600 60 C xgiO0 Auto 0 90 0 Disable 3600 60 i xgi1 Auto 0 90 0 Disable 3600 60 C xg12 Auto 0 90 0 Disable 3600 60 1 All GoT Control Protocol PAE Authenticator Backend Direction Version Capabilities PAE State State Authenticator Initialize Initialize Authenticator Initialize Initialize Authenticator Initialize Initialize Authenticator Initialize Initialize Authenticator Initialize Initialize Authenticator Initialize Initialize Authenticator Initialize Initialize Authenticator Initialize Initialize Authenticator Initialize Initialize Authenticator Initialize Initialize Authenticator Initialize Initialize Authenticator Initialize Initialize 2 2 2 x 2 2 2 2 2 2 2 2 l omm KP mo mM KY Mom d Select the check box next to the port to configure You can also select multiple check boxes to apply the same settings to the select ports or select the check box in the heading row to apply the same settings to all ports For one or more of the selected port specify the following settings Port Control Defines the port authorization state The control mode is only set if the link status of the port is link up The possible field values are 192 XS712T Smart Switch Auto The s
103. Displays the Sequence Number signifying the order of specified ACL relative to other ACLs assigned to selected interface and direction 219 XS712T Smart Switch IP ACL IP ACLs allow network managers to define classification actions and rules for specific ingress ports Packets can be filtered on ingress inbound ports only If the filter rules match then some actions can be taken including dropping the packet or disabling the port For example a network administrator defines an ACL rule that says port number 20 can receive TCP packets However if a UDP packet is received the packet is dropped ACLs are composed of access control entries ACE or rules that consist of the filters that determine traffic classifications Use the IP ACL Configuration screen to add or remove IP based ACLs To configure an IP ACL 1 Select Security ACL Advanced IP ACL IP ACL IP ACL Configuration Current Number of ACL Maximum ACL IP ACL Table 2 1 Extended IP ACL The IP ACL area shows the current size of the ACL table versus the maximum size of the ACL table The current size is equal to the number of configured IPv4 ACLs plus the number of configured MAC ACLs The maximum size is 100 2 In the IP ACL ID field specify the ACL ID The ID is an integer in the following range e 1 99 Creates an IP Standard ACL which allows you to permit or deny traffic from a source IP address e 100 199 Creates an IP Ext
104. Enter a valid subnet mask to determine which bits in the IP address are significant This is not a wildcard mask Destination L4 Port Requires a packet s TCP UDP destination port to match the port you select Select the desired L4 keyword from the list on which the rule can be based If you select Other the screen refreshes and a Port ID field displays Enter a user defined Port ID by which packets are matched to the rule IP DSCP Matches the packet s DSCP to the class criteria s when selected Select the DSCP type from the menu or enter a DSCP value to match If you select Other enter a custom value in the DSCP Value field that displays IP Precedence Matches the packet s IP Precedence value to the class criteria s when Enter a value in the range of 0 7 IP ToS Matches the packet s Type of Service bits in the IP header to the class criteria s when selected and a value is entered In the ToS Bits field enter a two digit hexadecimal number to match the bits in a packet s ToS field In the ToS Mask field specify the bit positions that are used for comparison against the IP ToS field in a packet Click Apply 164 XS712T Smart Switch IPv6 Class Configuration The IPv6 Class Configuration feature extends the existing QoS ACL and DiffServ functionality by providing support for IPv6 packet classification An Ethernet IPv6 packet is distinguished from an IPv4 packet by its unique Ethertype value so all IPv6 classifiers include the E
105. IP address of the administrative system to be on the same subnet as the default IP address of the switch 192 168 0 239 The method to change the IP address on an administrative system varies depending on the operating system version You need Windows Administrator privileges to change these settings The following procedures show how to change the static IP address on a computer running a Microsoft Windows 7 To modify the network settings on your administrative system 1 Open the Control Panel and click Network and Sharing Center 2 Click the Local Area Connection link ation and set up connections J See full map broadcom com Internet Connect or disconnect Access type Internet Connectionsg W Local Area Connection 12 XS712T Smart Switch 3 In the Local Area Connection Status window click Properties The Local Area Connection Properties window displays Q Local Area Connection Status Intel R 82579LM Gigabit Network Connection This connection uses the following items o Client for Microsoft Networks d File and Printer Sharing for Microsoft Networks Cisco IP Communicator driver for CDP ntemet Protocol Version 6 TCP IPv6 Intemet Protocol Version 4 TCP IPv4 4 Link Layer Topology Discovery Mapper 1 0 Driver Link Layer Topology Discovery Responder Descripti Transmission Control Protocol Intemet Protocol The default across diverse interconnected net
106. IpReasmFails IpFragOKs IpFragFails IpFragCreates IpRoutingDiscards IcmpInMsgs IcmpInErrors IcmpInDestUnreachs IcmpInTimeExcds IcmpInParmProbs IcmpInSrcQuenchs XS712T Smart Switch 0 9 0 0 0 0 0 0 0 0 1 0 0 0 0 0 Figure 5 IP statistics screen The following table describes the IP statistics information displayed on the screen Table 18 IP routing statistics Field Description IpInReceives The total number of input datagrams received from interfaces including those received in error IpInHdrErrors The number of input datagrams discarded due to errors in their IP headers including bad checksums version number mismatch other format errors time to live exceeded errors discovered in processing their IP options etc IpinAddrErrors The number of input datagrams discarded because the IP address in their IP header s destination field was not a valid address to be received at this entity This count includes invalid addresses e g 0 0 0 0 and addresses of unsupported Classes e g Class E For entities which are not IP Gateways and therefore do not forward datagrams this counter includes datagrams discarded because the destination address was not a local address 139 XS712T Smart Switch Table 18 IP routing statistics Continued Field Description IpForwDatagrams The number of input datagrams for which this entity was not their final IP destin
107. Local Port The interface on the local system that received LLDP information from a remote system MSAP Entry The Media Service Access Point MSAP entry number for the remote device Basic Details Chassis ID Subtype Identifies the type of data displayed in the Chassis ID field on the remote system Chassis ID Identifies the remote 802 LAN device s chassis Port ID Subtype Identifies the type of data displayed in the remote system s Port ID field Port ID Identifies the physical address of the port on the remote system from which the data was sent Port Description Identifies the user defined description of the port System Name Identifies the system name associated with the remote device System Description The description of the selected port associated with the remote system System Capabilities The system capabilities of the remote system Managed Addresses Address SubType The type of the management address Address The advertised management address of the remote system Interface SubType The port subtype Interface Number MAC PHY Details Identifies the port on the remote device that sent the information Auto Negotiation Supported Specifies whether the remote device supports port speed auto negotiation The possible values are True or False Auto Negotiation Enabled The port speed auto negotiation support status The possible val
108. MAC Address Identifies the MAC address that is filtered VLAN ID The VLAN ID used with the MAC address to fully identify packets you want filtered You can only change this field when you have selected the Create Filter option Source Port Members Displays the ports included in the inbound filter Destination Port Displays the ports included in the outbound filter Members 199 XS712T Smart Switch Storm Control A broadcast storm is the result of an excessive number of broadcast messages simultaneously transmitted across a network by a single port Forwarded message responses can overload network resources and or cause the network to time out The switch measures the incoming broadcast multicast unknown unicast packet rate per port and discards packets when the rate exceeds the defined value Storm control is enabled per interface by defining the packet type and the rate at which the packets are transmitted gt To configure storm control settings 1 Select Security Traffic Control Storm Control Storm Control Storm Control Ingress Control Mode Disabled Status Enable Threshold Control Action RateLimit Port Settings 1 All Go To Interface Go Port Flow Control Threshold Control Action Disable Disable RateLimit Disable Disable RateLimit Disable Disable RateLimit Disable Disable RateLimit Disable Disable RateLimit Disable Disable RateLimit Disable Disable RateLimit Disable Di
109. MSTP connects all Bridges and LANs with a single Common and Internal Spanning Tree CIST The CIST supports the automatic determination of each MST region choosing its maximum possible extent The connectivity calculated for the CIST provides the CST for interconnecting these Regions and an Internal Spanning Tree IST within each Region MSTP ensures that frames with a given VLAN ID are assigned to one and only one of the MSTIs or the IST within the Region that the assignment is consistent among all the networking devices in the Region and that the stable connectivity of each MSTI and IST at the boundary of the Region matches that of the CST The stable active topology of the Bridged LAN with respect to frames consistently classified as belonging to any given VLAN thus simply and fully connects all LANs and networking devices throughout the network though frames belonging to different VLANs can take different paths within any Region per IEEE DRAFT P802 1s D13 297 XS712T Smart Switch All bridges whether they use STP RSTP or MSTP send information in configuration messages via Bridge Protocol Data Units BPDUs to assign port roles that determine each port s participation in a fully and simply connected active topology based on one or more spanning trees The information communicated is known as the spanning tree priority vector The BPDU structure for each of these different protocols is different A MSTP bridge will transmit the appropr
110. NETGEAR XS712T Smart Switch Software Administration Manual XS712T Smart Switch NETGEAR Inc All rights reserved No part of this publication may be reproduced transmitted transcribed stored in a retrieval system or translated into any language in any form or by any means without the written permission of NETGEAR Inc Technical Support Thank you for choosing NETGEAR To register your product get the latest product updates get support online or for more information about the topics covered in this manual visit the support website at http support netgear com Phone US amp Canada only 1 888 NETGEAR Phone Other Countries Check the list of phone numbers at http support netgear com app answers detail a_id 984 Trademarks NETGEAR the NETGEAR logo ReadyNAS ProSafe ProSecure Smart Control Center Auto Uplink X RAID2 and NeoTV are trademarks or registered trademarks of NETGEAR Inc Microsoft Windows Windows NT and Vista are registered trademarks of Microsoft Corporation Other brand and product names are registered trademarks or trademarks of their respective holders Statement of Conditions To improve internal design operational function and or reliability NETGEAR reserves the right to make changes to the products described in this document without notice NETGEAR does not assume any liability that may occur due to the use or application of the product s or circuit layout s described herein
111. Name Datagram Size Result 2 In the Ping field select either Global or Link Global to select either the global IPv6 Address Hostname or Link Local Address to ping 3 Configure the following settings In the IPv6 Address Host Name field enter the IPv6 address or Hostname of the station you want the switch to ping The initial value is blank The IPv6 Address or Hostname you enter is not retained across a power cycle In the Datagram Size Enter the datagram size The valid range is 48 2048 The Result field displays the result after the switch sends a Ping IPv6 request to the specified IPv6 address 4 Click Apply to send the ping The switch sends the number of pings specified in the Count field and the results are displayed below the configurable data in the Result area If successful the output will be Send count 3 Receive count n from IPvG Address Average round trip time n ms If a reply to the ping is not received the following displays Reply From IP Host Destination Unreachable Tx x Rx 0 Min Max Avg RTT 0 0 0 msec 281 XS712T Smart Switch TraceRoute Use the Traceroute utility to discover the paths that a packet takes to a remote destination gt To trace a route to an IPv4 address or host 1 Select Maintenance gt Troubleshooting gt TraceRoute TraceRoute Traceroute IP Address Hostname Probes Per Hop Max TTL Init TTL MaxFail Interval
112. PEM File SSL Server Certificate File PEM Encoded e SSL DH Weak Encryption Parameter PEM File SSL Diffie Hellman Weak Encryption Parameter File PEM Encoded e SSL DH Strong Encryption Parameter PEM File SSL Diffie Hellman Strong Encryption Parameter File PEM Encoded If you are downloading an XS712T image Archive select the image on the switch to overwrite from the Image Name field This field is visible only when Archive is selected as the File Type Note It is recommended that you do not overwrite the active image The system will display a warning that you are trying to overwrite the active image From the Server Address Type field specify the format for the address you type in the TFTP Server Address field IPv4 Indicates the TFTP server address is an IP address in dotted decimal format e DNS Indicates the TFTP server address is a hostname In the TFTP Server IP field specify the IP address or hostname of the TFTP server The address you type must be in the format indicated by the TFTP Server Address Type In the Transfer File Path field specify the path on the TFTP server where the file is located Enter up to 160 characters Include the backslash at the end of the path A path name with a space is not accepted Leave this field blank to save the file to the root TFTP directory In the Remote File Name field specify the name of the file to download from the TFTP server You can enter up to 32 characters A f
113. Private VLAN Promiscuous Interface Configuration Private VLAN Promiscuous Interface Configuration 1 LAGS All GoToInterface L Promiscuous Primary VLAN Promiscuous Secondary VLAN s Interf Operational VLAN s qu ae SS to 4093 SS 4093 P s C J J xg2 xg3 UL C m r1 ia f 3p 3 3 EMO m OC Eo mo Eo No 3j 3 Gim Go To Interface The primary private VLAN in which the port is a member when it is configured to operate in Promiscuous mode In the Promiscuous Primary VLAN field specify the primary VLAN ID for Promiscuous Association Mode The range of the VLAN ID is 2 4093 The secondary private VLAN the port is a member of when it is configured to operate in Promiscuous mode The secondary private VLAN is either an isolated or community VLAN In the Promiscuous Secondary VLAN ID field specify the secondary VLAN ID List for Promiscuous Association Mode This field can accept single VLAN IDs a range of VLAN IDs or a combination of both in sequence separated by 210 XS712T Smart Switch e You can specify an individual VLAN ID Example 10 e You can specify the VLAN range values separated by a e You can specify a combination of both separated by Example 10 13 Example 12 15 40 43 1000 1005 2000 The range of the VLAN ID is 24093 Note The VLAN ID List given in this control will replace the configured Secondary VLAN list in the association 5 Click
114. Pv6 prefix length ACL Based on Source IPv6 Use this to create an ACL based on the source IPv6 prefix and IPv6 prefix length ACL Based on Destination IPv4 L4 Port Use this to create an ACL based on the destination IPv4 layer4 port number ACL Based on Source IPv4 L4 Port Use this to create an ACL based on the source IPv4 layer4 port number 213 10 11 12 XS712T Smart Switch ACL Based on Destination IPv6 L4 Port Use this to create an ACL based on the destination IPv6 layer4 port number ACL Based on Source IPv6 L4 Port Use this to create an ACL based on the source IPv6 layer4 port number In the Rule ID field enter a whole number in the range of 1 to 10 that will be used to identify the rule In the Action field specify what action should be taken if a packet matches the rule s criteria The choices are permit or deny In the Match Every field specify True or False In the Destination MAC field specify the destination MAC address to compare against an Ethernet frame Valid format is XX XX XX XX XX XX The BPDU keyword can be specified using a Destination MAC address of 01 80 C2 xx xx xx In the Destination MAC Mask field specify the destination MAC address mask specifying which bits in the destination MAC to compare against an Ethernet frame Valid format is xxoocxxoocxx xx The BPDU keyword can be specified using a Destination MAC mask of 00 00 00 ff ff ff The VLAN specifies the VLAN I
115. RSTP BPDUs received at the selected port RSTP BPDUs Transmitted Number of RSTP BPDUs transmitted from the selected port MSTP BPDUS Received Number of MSTP BPDUS received at the selected port MSTP BPDUS Transmitted Number of MSTP BPDUs transmitted from the selected port Click Refresh to update the screen with the latest STP statistics information 110 XS712T Smart Switch Multicast Multicast IP traffic is traffic that is destined to a host group Host groups for IPv4 multicast are identified by class D addresses which range from 224 0 0 0 to 239 255 255 255 Host groups for IPv6 multicast are identified by the prefix ff00 8 The Multicast menu contains links described in the following sections Bridge Multicast Forwarding e MFDB Table e MFDB Statistics e Auto Video IGMP Snooping IGMP Snooping Querier e MLD Snooping Bridge Multicast Forwarding When you create a VLAN a default multicast forwarding option is assigned You can use the Global Multicast Mode setting to set all VLANs currently configured on the switch to a selected forwarding mode The global setting does not create a default setting for VLANs created subsequently it simply ensures that all existing VLANs are configured with the specified mode You can also configure how the switch forwards multicast packets on an individual or per VLAN basis gt To configure bridge multicast forwarding 1 Select Switching gt Mul
116. S712T Smart Switch Factory Default Use the Factory Default screen to reset the system configuration to the factory default values Note If you reset the switch to the default configuration the IP address is reset to 192 168 0 239 and the DHCP client is enabled If you loose network connectivity after you reset the switch to the factory defaults see Connect the Switch to the Network on page 8 gt To reset the switch to the factory default settings 1 Select Maintenance gt Reset gt Factory Default Factory Default Factory Default Check this box and click APPLY below to return all configuration settings to default values L1 2 Select the check box on the screen 3 Click Apply The switch resets immediately Upload The switch supports system file uploads from the switch to a remote system by using either TFTP or HTTP The Upload menu contains links described in the following sections TFTP File Upload HTTP File Upload 260 XS712T Smart Switch TFTP File Upload Use the TFTP File Upload screen to upload configuration ASCII log ASCII and image binary files from the switch to a TFTP server on the network To upload a file from the switch to the TFTP server 1 Select Maintenance gt Upload gt TFTP File Upload TFTP File Upload TFTP File Upload File Type Archive Image Name imagel v Server Address Type IPv4 v Server Address 0 0 0 0 Transfer File Path Transfer File Nam
117. SCP value on the egress interface These service levels are defined by configuring BA classes for each 291 XS712T Smart Switch Create Policies Use DiffServ policies to associate a collection of classes that you configure with one or more QoS policy statements The result of this association is referred to as a policy From a DiffServ perspective there are two types of policies e Traffic Conditioning Policy a policy applied to a DiffServ traffic class e Service Provisioning Policy a policy applied to a DiffServ service level You must manually configure the various statements and rules used in the traffic conditioning and service provisioning policies to achieve the desired Traffic Conditioning Specification TCS and the Service Level Specification SLS operation respectively Traffic Conditioning Policy Traffic conditioning pertains to actions performed on incoming traffic There are several distinct QoS actions associated with traffic conditioning Dropping Drop a packet upon arrival This is useful for emulating access control list operation using DiffServ especially when DiffServ and ACL cannot co exist on the same interface Mark IP DSCP or IP Precedence Marking re marking the DiffServ code point in a packet with the DSCP value representing the service level associated with a particular DiffServ traffic class Alternatively the IP Precedence value of the packet can be marked re marked e Mark CoS 802 1p
118. Serv General Status Group information which includes the current administrative mode setting as well as the current and maximum number of rows in each of the main DiffServ private MIB tables gt To configure the global DiffServ mode 1 3 Select QoS gt DiffServ gt Advanced gt DiffServ Configuration Diffserv Configuration Diffserv Configuration DiffServ Admin Mode Disable Enable Status MIB Table ee Size Class Table 32 Class Rule table 192 Policy table 32 Policy Instance table Policy Attributes table Service table Select the administrative mode for DiffServ Enable Differentiated Services are active Disable The DiffServ configuration is retained and can be changed but it is not active Click Apply The following table describes the information displayed in the Status table on the DiffServ Configuration screen Table 22 DiffServ MIB table information Field Description Class Table The current and maximum number of rows of the class table Class Rule Table The current and maximum number of rows of the class rule table Policy Table The current and maximum number of rows of the policy table Policy Instance Table The current and maximum number of rows of the policy instance table Policy Attributes Table The current and maximum number of rows of the policy attributes table Service Table The current and maximum number of rows of the service table
119. Sets the three bit priority field in the first only 802 1p header to a specified value when packets are transmitted for the traffic class An 802 1p header is inserted if it does not already exist This is useful for assigning a layer 2 priority level based on a DiffServ forwarding class i e DSCP or IP Precedence value definition to convey some QoS characteristics to downstream switches which do not routinely look at the DSCP value in the IP header Policy A method of constraining incoming traffic associated with a particular class so that it conforms to the terms of the TCS Special treatment can be applied to out of profile packets that are either in excess of the conformance specification or are non conformant The DiffServ feature supports the following types of traffic policing treatments actions Drop The packet is dropped Mark cos The 802 1p user priority bits are re marked and forwarded Mark dscp The packet DSCP is re marked and forwarded Mark prec The packet IP Precedence is re marked and forwarded Send The packet is forwarded without DiffServ modification Color Mode Awareness Policing in the DiffServ feature uses either color blind or color aware mode Color blind mode ignores the coloration marking of the incoming packet Color aware mode takes into consideration the current packet marking when determining the policing outcome An auxiliary traffic class is used in conjunction with the policing definition
120. Status 1 LAGS All Disabled 80 00 20 E5 2A 01 AE 90 xg2 80 00 20 E5 2A 01 AE 90 xg3 Disabled 80 00 20 E5 2A 01 AE 90 xg4 Disabled 80 00 20 E5 2A 01 AE 90 xg5 Disabled 80 00 20 E5 2A 01 AE 90 xg6 Disabled 80 00 20 E5 2A 01 AE 90 xg7 Disabled 80 00 20 E5 2A 01 AE 90 xg8 Disabled 80 00 20 E5 2A 01 AE 90 xg9 Disabled 80 00 20 E5 2A 01 AE 90 xg10 Disabled 80 00 20 E5 2A 01 AE 90 xgii Disabled 80 00 20 E5 2A 01 AE 90 xgi2 Disabled 80 00 20 E5 2A 01 AE 90 1 LAGS All The following table describes the CST Status information displayed on the screen o E o E o IE o I o io 80 00 20 E5 2A 01 AE 90 00 00 True Disabled True 80 00 20 E5 2A 01 AE 90 80 00 20 E5 2A 01 AE 90 00 00 True Disabled False 80 00 20 E5 2A 01 AE 90 0 80 00 20 E5 2A 01 AE 90 00 00 True Disabled True 80 00 20 E5 2A 01 AE 90 0 80 00 20 E5 2A 01 AE 90 00 00 True Disabled True 80 00 20 E5 2A 01 AE 90 0 80 00 20 E5 2A 01 AE 90 00 00 True Disabled True 80 00 20 E5 2A 01 AE 90 0 80 00 20 E5 2A 01 AE 90 00 00 True Disabled True 80 00 20 E5 2A 01 AE 90 0 80 00 20 E5 2A 01 AE 90 00 00 True Disabled True 80 00 20 E5 2A 01 AE 90 0 80 00 20 E5 2A 01 AE 90 00 00 True Disabled True 80 00 20 E5 2A 01 AE 90 0 80 00 20 E5 2A 01 AE 90 00 00 True Disabled True 80 00 20 E5 2A 01 AE 90 0 80 00 20 E5 2A 01 AE 90 00 00 True Disabled True 80 00 20 E5 2A 01 AE 90 0 80 00 20 E5 2A 01 AE 90 00 00 True Disabled True 80 00 20 E5 2A 01 AE 90 0 80 00 20 E5 2A 01 AE 90 00 00 True Disabled
121. T The valid range is 0 61440 The bridge priority is a multiple of 4096 If you specify a priority that is not a multiple of 4096 the priority is automatically set to the next lowest priority that is a multiple of 4096 For example if the priority is attempted to be set to any value between 0 and 4095 it will be set to 0 The default priority is 32768 Bridge Max Age secs Specify the bridge maximum age time for the Common and Internal Spanning Tree CST which indicates the amount of time in seconds a bridge waits before implementing a topological change The valid range is 6 40 and the value must be less than or equal to 2 Bridge Forward Delay 1 and greater than or equal to 2 Bridge Hello Time 1 The default value is 20 Bridge Hello Time secs Specify the switch Hello time for the Common and Internal Spanning Tree CST which indicates the amount of time in seconds a root bridge waits between configuration messages The value is fixed at 2 seconds Bridge Forward Delay secs Specify the switch forward delay time which indicates the amount of time in seconds a bridge remains in a listening and learning state before forwarding packets The value must be greater or equal to Bridge Max Age 2 1 The time range is from 4 seconds to 30 seconds The default value is 15 Spanning Tree Maximum Hops Specify the maximum number of bridge hops the information for a particular CST instance can travel before being discarded
122. TOS field specify the two digit hexadecimal TOS number The second field is for the TOS Mask which specifies the bit positions that are used for comparison against the IP TOS field in a packet The TOS Mask value is a two digit hexadecimal number from 00 to ff representing an inverted wildcard mask The zero valued bits in the TOS Mask denote the bit positions in the TOS Bits value that are used for comparison against the IP TOS field of a packet For example to check for an IP TOS value having bits 7 and 5 set and bit 1 clear where bit 7 is most significant use a TOS Bits value of a0 and a TOS Mask of 00 6 Click Apply gt To modify the match criteria for an ACL rule 1 From the ACL Name list on the Extended ACL Rules screen select the ACL that includes the rule to update 2 Inthe Extended ACL Rule Table click the rule ID The rule ID is a hyperlink to the Extended ACL Rule Configuration screen 3 Modify the ACL rule information 4 Click Apply gt To delete and IP ACL rule 1 In the Extended ACL Rule Table on the IP Rules screen select the check box associated with the rule to remove 2 Click Delete IPv6 ACL An IPv6 ACL consists of a set of rules which are matched sequentially against a packet When a packet meets the match criteria of a rule the specified rule action Permit Deny is 225 XS712T Smart Switch taken and the additional rules are not checked for a match On this menu the interfaces to whic
123. TP Authentication List HTTP Authentication List A RN RN RN httpList 2 Select the check box next to the httpList name 3 Use the drop down menu in the 1 column to select the authentication method that should appear first in the selected authentication login list If you select a method that does not time out as the first method such as local no other method will be tried even if you have specified more than one method This parameter will not appear when you first create a new login list User authentication occurs in the order the methods are selected Possible methods are as follows Local The user s locally stored ID and password will be used for authentication Since the local method does not time out if you select this option as the first method no other method will be tried even if you have specified more than one method RADIUS The user s ID and password will be authenticated using the RADIUS server If you select RADIUS or TACACS as the first method and an error occurs during the authentication the switch uses Method 2 to authenticate the user TACACS The user s ID and password will be authenticated using the TACACS server If you select RADIUS or TACACS as the first method and an error occurs during the authentication the switch attempts user authentication Method 2 None The authentication method is unspecified This option is only available for Method 2 and Method 3 180 XS712T Smart Switch 4
124. The operation log if configured then begins to store the messages Use the FLASH Log screen to enable or disable persistent logging and to set the severity filter gt To configure the FLASH log settings 1 Select Monitoring gt Logs gt FLASH Log FLASH Log FLASH Log Configuration Admin Status Disable Enable Severity Filter Alert vi FLASH Logs Total number of Messages 0 2 Select the radio buttons in the Admin Status field to determine whether to log messages to persistent storage Enable Enables persistent logging e Disable Prevents the system from logging messages in persistent storage 250 4 XS712T Smart Switch From the Severity Filter field specify the type of log messages to record A log records messages equal to or above a configured severity threshold For example if you select Error the logged messages include Error Critical Alert and Emergency The default severity level is Alert 1 The severity can be one of the following levels Emergency 0 The highest warning level If the device is down or not functioning properly an emergency log is saved to the device Alert 1 The second highest warning level An alert log is saved if there is a serious device malfunction such as all device features being down Action must be taken immediately Critical 2 The third highest warning level A critical log is saved if a critical device malfunction occurs for example two dev
125. These packets are marked by DiffServ with the specified IP Precedence value before being presented to the system forwarding element This selection requires that the Mark IP Precedence value field be set Mark IP DSCP These packets are marked by DiffServ with the specified DSCP value before being presented to the system forwarding element This selection requires that the DSCP value field be set 5 Click Apply Service Configuration Use the Service Configuration screen to activate a policy on an interface gt To attach a DiffServ policy to an interface 1 Select QoS gt DiffServ gt Advanced gt Service Configuration Service Configuration Service Interface Configuration 1 LAGS All GoTo Interface GO Policy I u Interface PN Direction Operational Status Name um 2S SS xgli xgi2 1 LAGS All 2 To configure DiffServ policy settings for a physical port enter the interface and click Go to select that particular interface 3 Select the interfaces for which you want to configure the service interface settings To configure service interface settings for a Link Aggregation Group LAG click LAGS e To configure service interface settings for both physical ports and LAGs click ALL 4 Select the check box next to the port or LAG to configure 169 XS712T Smart Switch You can select multiple ports and LAGs to apply the same setting to
126. To configure a RADIUS server 1 Select Security Management Security gt RADIUS gt Server Configuration RADIUS Server Configuration Server Configuration e Secret Message a Seen Aimee A o Configured see ooo pe O Authenticator LU 1 NENNEN NEN a ch Statistics EE Server Tri Access Access Access Access Access Bad Pending Timeouts Unknown Packets Address Requests Retransmissions Accepts Rejects Challenges Authenticators Requests Types Dropped Tim EROR 2 To add a RADIUS server specify the following settings e Inthe Server Address field specify the IP address of the RADIUS server to add e Inthe Authentication Port field specify the UDP port number the server uses to verify the RADIUS server authentication The valid range is 1 65535 The default value is 1812 From the Secret Configured menu select Yes to add a RADIUS secret in the next field You must select Yes before you can configure the RADIUS secret After you add the RADIUS server this field indicates whether the shared secret for this server has been configured Inthe Secret field type the shared secret text string used for authenticating and encrypting all RADIUS communications between the switch and the RADIUS server This secret must match the RADIUS encryption From the Active menu specify whether the server is a Primary or Secondary server From the Message Authenticator menu enable or disable the message authenticator
127. True 80 00 20 E5 2A 01 AE 90 0 Field Description Interface Displays the port associated with the VLAN s associated with the CST Port Role Each MST Bridge Port that is enabled is assigned a Port Role for each spanning tree The port role will be one of the following values Root Port Designated Port Alternate Port Backup Port Master Port or Disabled Port Designated Root Root Bridge for the CST It is made up using the bridge priority and the base MAC address of the bridge Designated Cost Displays cost of the port participating in the STP topology Ports with a lower cost are less likely to be blocked if STP detects loops Designated Bridge Bridge Identifier of the bridge with the Designated Port It is made up using the bridge priority and the base MAC address of the bridge Designated Port Port Identifier on the Designated Bridge that offers the lowest cost to the LAN It is made up from the port priority and the interface number of the port Topology Point D ted D ted Port Fi dii Interface Port Role Designated Root E Designated Bridge cabe Change to Point CST Regional Root ak PE CHENOCU ss Port State Acknowledge MAC Cost Disabled Manual forwardi Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled 104 XS712T Smart Switch Field Description Topology Change Identifies whether the next BPDU to be trans
128. VLAN specified by the packet s VLAN ID the packet can be sent to other ports with the same VLAN ID Packets leaving the switch are either tagged or untagged depending on the setting for that port s VLAN membership properties A U for a given port means that packets leaving the switch from that port are untagged Inversely a T for a given port means that packets leaving the switch from that port are tagged with the VLAN ID that is associated with the port The example given in this section comprises numerous steps to illustrate a wide range of configurations to help provide an understanding of tagged VLANs Sample VLAN Configuration This example demonstrates several scenarios of VLAN use and describes how the switch handles tagged and untagged traffic In this example you create two new VLANs change the port membership for default VLAN 1 and assign port members to the two new VLANs 1 In the Basic VLAN Configuration screen see Basic VLAN Configuration on page 85 create the following VLANs e AVLAN with VLAN ID 10 e AVLAN with VLAN ID 20 In the VLAN Membership screen see VLAN Membership Configuration on page 86 specify the VLAN membership as follows e For the default VLAN with VLAN ID 1 specify the following members port 7 U and port 8 U 286 XS712T Smart Switch e For the VLAN with VLAN ID 10 specify the following members port 1 U port 2 U and port 3 T For the VLAN with VLAN ID 20 spec
129. When the process is complete the switch automatically reboots Note Click the Tasks tab to view status information about the firmware upgrade The Task Management information shows information about the file transfer process After the firmware upgrade is complete and the switch reboots an entry in the Task table indicates that the upgrade was successful If the download is scheduled for a later time or date an entry shows the scheduled task 276 XS712T Smart Switch View and Manage Tasks From the Tasks tab you can view information about configuration downloads and firmware upgrades that have already occurred are in progress or are scheduled to take place at a later time You can also delete or reschedule selected tasks Figure 11 shows the Tasks Screen aA SmartControlCenter NETGEAR nnect with Innovation Network Maintenance Adapter Help Current Network Adapter 10 131 12 70 Task Management From 01 01 2011 To 01 15 2011 MAC Address Date Time Task Name Task Status 3a 46 9a ff fb ff 01 04 2011 8 38pm upload configuration The device password did not match 3a 46 9a ff fb ff 01 04 2011 8 40pm upload configuration Successfully completed Delete Prior Tasks Delete One Task l Reschedule MAC 3a 46 9a ff fb ff Task upgrade firmware Select Range Figure 11 Tasks screen The following list describes the command buttons that are specific to the Tasks screen Delete Task Remove a completed or schedul
130. Wildcard masking for ACLs operates differently from a subnet mask A wildcard mask is in essence the inverse of a subnet mask For example to apply the rule to all hosts in the 192 168 1 0 24 subnet you type 0 0 0 255 in the Source IP Mask field This field is required when you configure a source IP address Src L4 Port Requires a packet s TCP UDP source port to match the port listed here Click Complete one of the following fields SourceL4 Keyword Select the desired L4 keyword from a list of source ports on which the rule can be based Source L4 Port Number If the source L4 keyword is Other enter a user defined Port ID by which packets are matched to the rule Dst IP Address Requires a packet s destination port IP address to match the address listed here Enter an IP Address in the appropriate field using dotted decimal notation The address you enter is compared to a packet s destination IP Address Dst IP Mask Specifies the destination IP address wildcard mask Wild card masks determines which bits are used and which bits are ignored A wild card mask of 255 255 255 255 indicates that no bit is important A wildcard of 0 0 0 0 indicates that all of the bits are important Wildcard masking for ACLs operates differently from a subnet mask A wildcard mask is in essence the inverse of a subnet mask For example to apply the rule to all hosts in the 192 168 1 0 24 subnet you type 0 0 0 255 in the Source IP Mask field This field is
131. You can enter up to 96 characters The factory default is blank In the Remote File Name field specify the name of the file to download including the path 186 XS712T Smart Switch You can enter up to 32 characters 7 Select the Start File Transfer check box 8 Click Apply to start the transfer A status message displays during the transfer and upon successful completion of the transfer 187 XS712T Smart Switch Access Control Access control allows you to define a profile configuration and set access rules Access Profile Configuration Use the Access Profile Configuration screen to set up a security access profile gt To configure an access profile 1 Select Security gt Access gt Access Control gt Access Profile Configuration Access Profile Configuration Access Profile Configuration Access Profile Name Activate Profile Deactivate Profile Remove Profile Packets Filtered Profile Summary Rule Type Service Type Source IP Address Ea 2 Enter the name of the access profile to be added in the Access Profile Name field Maximum length is 32 characters 3 Select one of the following options Activate Profile Activate an access profile e Deactivate Profile Deactivate an access profile Remove Profile Remove an access profile The access profile should be deactivated before removing the access profile The Packets Filtered field displays the number of packets filtered The Profile Summary
132. a non integral number of octets Rx FCS Errors The total number of packets received that had a length excluding framing bits but including FCS octets of between 64 and 1518 octets inclusive but had a bad Frame Check Sequence FCS with an integral number of octets Overruns The total number of frames discarded as this port was overloaded with incoming packets and could not keep up with the inflow Total Received Packets Not Forwarded A count of valid frames received which were discarded i e filtered by the forwarding process Local Traffic Frames The total number of frames dropped in the forwarding process because the destination address was located off of this port 802 3x Pause Frames Received A count of MAC Control frames received on this interface with an opcode indicating the PAUSE operation This counter does not increment when the interface is operating in half duplex mode Unacceptable Frame Type The number of frames discarded from this port due to being an unacceptable frame type Total Packets Transmitted Octets The total number of octets of data including those in bad packets transmitted on the network excluding framing bits but including FCS octets This object can be used as a reasonable estimate of Ethernet utilization If greater precision is desired the etherStatsPkts and etherStatsOctets objects should be sampled before and after a common interval Packets Tran
133. al MAC address in 2 digit groups separated by colons then click Go If the address exists that entry will be displayed An exact match is required VLAN ID Select VLAN ID from the menu enter the VLAN ID for example 100 Then click Go If any entries with that VLAN ID exist they are displayed 132 XS712T Smart Switch Interface Select Interface from the menu enter the interface ID in g1 g2 format then click Go If any entries learned on that interface exist they are displayed 3 Click Clear to clear Dynamic MAC Addresses in the table 4 Click Refresh to redisplay the screen to show the latest MAC Addresses The following table describes the information available for each entry in the address table Field Description VLAN ID Specifies the VLAN ID on which the IGMP Snooping Querier is administratively enabled and for which VLAN exists in the VLAN database MAC Address A unicast MAC address for which the switch has forwarding and or filtering information The format is a six byte MAC address with each byte separated by colons For example 00 0F 89 AB CD EF Interface The port where this address was learned that is this field displays the port through which the MAC address can be reached Status The status of this entry The possible values are Static The entry was added when a static MAC filter was defined Learned The entry was learned by observing the source MAC addresses of incomin
134. al bridge processing is performed for an inbound packet which is then associated with a VLAN Its MAC Destination Address MAC DA and VLAN ID are used to search the MAC address table If routing is enabled for the VLAN and the MAC DA of an inbound unicast packet is that of the internal bridge router interface the packet is routed An inbound multicast packet is forwarded to all ports in the VLAN plus the internal bridge router interface if it was received on a routed VLAN Since a port can be configured to belong to more than one VLAN VLAN routing might be enabled for all of the VLANs on the port or for a subset VLAN Routing can be used to allow more than one physical port to reside on the same subnet It could also be used when a VLAN spans multiple physical networks or when additional segmentation or security is required A port can be either a VLAN port or a router port but not both However a VLAN port can be part of a VLAN that is itself a router port Sample VLAN Routing Configuration Complete these steps to configure a switch to perform interVLAN routing 1 Use the VLAN Configuration screen to enable routing on the switch see Basic VLAN Configuration on page 85 2 Determine the IP addresses you want to assign to the VLAN interface on the switch For the switch to be able to route between the VLANs the VLAN interfaces must be configured with an IP address When the switch receives a packet destined for another subnet VLAN t
135. an 1518 octets excluding framing bits but including FCS octets and were otherwise well formed This counter has a max increment rate of 815 counts per sec at 10 Mb s Maximum Frame Size The maximum ethernet frame size the interface supports or is configured including ethernet header CRC and payload 1518 to 9216 The default maximum frame size is 1518 Total Packets Transmitted Successfully The number of frames that have been transmitted by this port to its segment Unicast Packets Transmitted The total number of packets that higher level protocols requested be transmitted to a subnetwork unicast address including those that were discarded or not sent Multicast Packets Transmitted The total number of packets that higher level protocols requested be transmitted to a Multicast address including those that were discarded or not sent Broadcast Packets Transmitted The total number of packets that higher level protocols requested be transmitted to the Broadcast address including those that were discarded or not sent Transmit Packets Discarded The number of outbound packets which were chosen to be discarded even though no errors had been detected to prevent their being deliverable to a higher layer protocol A possible reason for discarding a packet could be to free up buffer space Total Transmit Errors The sum of Single Multiple and Excessive Collisions Total Transmit Packets
136. any reason due to DiffServ treatment This is the overall count per interface per direction Member Classes Selects the member class for which octet statistics are to display 170 Managing Device Security Use the features available from the Security tab to configure management security settings for port user and server security The Security tab contains links described in the following sections Management Security Settings Configure Management Access Port Authentication Traffic Control Configuring Access Control Lists Management Security Settings From the Management Security menu you can configure the login password Remote Authorization Dial In User Service RADIUS settings Terminal Access Controller Access Control System TACACS settings and authentication lists The Management Security folder contains links described in the following sections Change Password RADIUS Configuration Configuring TACACS Authentication List Configuration Change Password Use the screen to change the login password To change the login password for the management interface 1 Select Security Management Security User Configuration Change Password 171 XS712T Smart Switch Change Password Change Password Old Password New Password Confirm Password Reset Password N Specify the current password in the Old Password field The entered password will be displayed in asterisks
137. aracter Definition Backslash Forwards slash id Asterisk Question mark lt Less than gt Greater than Pipe Use SNMPv3 The XS712T Smart Switch software supports the configuration of SNMP groups and users that can manage traps that the SNMP agent generates The XS712T Smart Switch use both standard public MIBs for standard functionality and private MIBs that support additional switch functionality All private MIBs begin with a hyphen prefix The main object for interface configuration is in SWITCHING MIB which is a private MIB Some interface configurations also involve objects in the public MIB IF MIB SNMP is enabled by default The System Information screen which is the screen that displays after a successful login displays the information you need to configure an SNMP manager to access the switch To configure information for SNMPv1 or SNMPv2 see SNMPV1 V2 on page 53 Any user can connect to the switch using the SNMPv3 protocol but for authentication and encryption the switch supports only one user which is admin therefore there is only one profile that can be created or modified 21 XS712T Smart Switch gt To configure authentication and encryption settings for the SNMPv3 admin profile by using the web interface 1 Select System gt SNMP gt SNMPv3 gt User Configuration The User Configuration screen displays User Configuration User Configuration SNMP V3 Access Mode Authentication P
138. arameter globally by specifying a priority from 1 65535 The default value is 32768 3 Click Apply 82 XS712T Smart Switch LACP Port Configuration The LACP port configuration screen is used to configure the LACP priority value for the selected port and the administrative LACP Timeout value To configure LACP port priority settings 1 Select Switching LAG Advanced LACP Port Configuration LACP Port Configuration LACP Port Priority Go To Interface BEA A ee M Long 128 Long 128 Long 128 Long 128 Long 128 Long 128 Long 128 Long 128 Long 128 Long 128 Long 128 Long GoToInterface GO 2 Select the port s to configure To configure a single port select the check box associated with it or type the port number in the Go To Interface field and click Go e To configure multiple ports with the same settings select the check box associated with each port to configure e To configure all ports with the same settings select the check box in the heading row 3 Configure the LACP Priority value for the selected port s It Specifies the device s link aggregation priority relative to the devices at the other ends of the links on which link aggregation is enabled A higher value indicates a lower priority The field range is 1 65535 Default value is 128 4 Configure the administrative LACP Timeout value Long Specifies a long tim
139. are matched Use the drop down box and select Permit or Deny access Service Type Select from the drop down box The policy is restricted by the management chosen from the drop down menu Possible methods include HTTP Secure HTTP SSL and SNMP Source IP Address Enter Source IP Address of the client originating the management traffic Fill in the Source IP address in the text box Mask Enter Source IP Address Mask of the client originating the management traffic Fill in the Mask details in the text box provided Priority Assign a priority to the rule The rules are validated against the incoming management request in the ascending order of their priorities If a rule matches action is performed and subsequent rules below are ignored For example if a Source IP 10 10 10 10 is configured with priority 1 to permit and Source IP 10 10 10 10 is configured with priority 2 to Deny then access is permitted if the profile is active and the second rule is ignored 3 Click Apply 189 XS712T Smart Switch Port Authentication In port based authentication mode when 802 1X is enabled globally and on the port successful authentication of any one supplicant attached to the port results in all users being able to use the port without restrictions At any given time only one supplicant is allowed to attempt authentication on a port in this mode Ports in this mode are under bidirectional control This is the default a
140. as a match condition for the selected IPv6 ACL rule Destination port information is optional Destination port information can be specified in two ways Select keyword other from the drop down menu and specify the number of the port in the range from 0 to 65535 Select one of the keyword from the list DOMAIN ECHO FTP FTPDATA HTTP SMTP SNMP TELNET TFTP and WWW Each of these values translates into its equivalent port number which is used as both the start and end of the port range 228 XS712T Smart Switch Flow Label Flow label is 20 bit number that is unique to an IPv6 packet used by end stations to signify quality of service handling in routers Flow label can be specified within the range 0 to 1048575 e Pv6 DSCP Service Specify the IP DiffServ Code Point DSCP field The DSCP is defined as the high order six bits of the Service Type octet in the IPv6 header This is an optional configuration Enter an integer from 0 to 63 The IPv6 DSCP is selected by possibly selection one of the DSCP keyword from a drop down menu If a value is to be selected by specifying its numeric value then select the Other option in the drop down menu and a text box will appear where the numeric value of the DSCP can be entered 6 Click Apply gt To delete an IPv6 rule 1 On the IPv6 Rules screen in the ACL Name list select the name of the ACL that includes the rule to remove 2 In the IPv6 Rule Table select the check bo
141. at have been received on the port Last Frame Version The protocol version number attached to the most recently received EAPOL frame Last Frame Source The source MAC Address attached to the most recently received EAPOL frame 245 XS712T Smart Switch Table 40 EAP statistics Continued Field Description Invalid Frames Received The number of unrecognized EAPOL frames received on this port Length Error Frames Received The number of EAPOL frames with an invalid Packet Body Length received on this port Response ID Frames Received The number of EAP Respond ID frames that have been received on the port Response Frames Received The number of valid EAP Response frames received on the port Request ID Frames The number of EAP Requested ID frames transmitted through the Transmitted port Request Frames Transmitted The number of EAP Request frames transmitted through the port Use the buttons at the bottom of the screen to perform the following actions e Toclear all the EAP counters for all ports on the switch select the check box in the row heading and click Clear The button resets all statistics for all ports to default values e To clear the counters for a specific port select the check box associated with the port and click Clear e Click Refresh to refresh the data on the screen and display the most current statistics 246 XS712T Smart Switch Cable Test U
142. at in the Interface field and click on the Go button The entry corresponding to the specified interface will be selected 3 Enter the VLAN ID in the VLAN ID field for which the Multicast Router Mode is to be Enabled or Disabled 4 Use the Multicast Router field to enable or disable Multicast Router on the selected interface 5 Click Apply Querier Configuration Use this screen to enable or disable the MLD Querier Configuration feature specify the IP address of the router to perform the querying and configure the related parameters Toconfigure the querier settings 1 Select Switching gt Multicast gt MLD Snooping gt Querier Configuration 129 7 XS712T Smart Switch MLD Snooping Querier Configuration MLD Snooping Querier Configuration Querier Admin Mode Disable Enable Querier Address MLD Version Query Interval secs Querier Expiry Interval secs VLAN Ids Enabled for MLD Snooping Querier From the Querier Admin Mode field enable or disable the administrative mode for MLD Snooping Querier In the Querier Address field specify the Snooping Querier Address to be used as source address in periodic MLD queries This address is used when no address is configured on the VLAN on which query is being sent The supported IPv6 formats are x X x X X X X X and XIX In the MLD Version field the MLD protocol version used in periodic MLD queries is displayed The supported MLD V
143. ation as a result of which an attempt was made to find a route to forward them to that final destination In entities which do not act as IP Gateways this counter includes only those packets which were Source Routed via this entity and the Source Route option processing was successful IplnUnknownProtos The number of locally addressed datagrams received successfully but discarded because of an unknown or unsupported protocol IpinDiscards The number of input IP datagrams for which no problems were encountered to prevent their continued processing but which were discarded e g for lack of buffer space Note that this counter does not include any datagrams discarded while awaiting re assembly IpinDelivers The total number of input datagrams successfully delivered to IP user protocols including ICMP IpOutRequests The total number of IP datagrams which local IP user protocols including ICMP supplied to IP in requests for transmission Note that this counter does not include any datagrams counted in ipForwDatagrams IpOutDiscards IpOutNoRoutes The number of output IP datagrams for which no problem was encountered to prevent their transmission to their destination but which were discarded e g for lack of buffer space Note that this counter would include datagrams counted in ipForwDatagrams if any such packets met this discretionary discard criterion The number of IP datagrams discarded because
144. ature that provides security by filtering untrusted DHCP messages and by building and maintaining a DHCP snooping binding table An untrusted message is a message that is received from outside the network or firewall and that can cause traffic attacks within your network The DHCP snooping binding table contains the MAC address IP address lease time binding type VLAN number and interface information that corresponds to the local untrusted interfaces of a switch An untrusted interface is an interface that is configured to receive messages from outside the network or firewall A trusted interface is an interface that is configured to receive only messages from within the network DHCP snooping acts like a firewall between untrusted hosts and DHCP servers It also provides way to differentiate between untrusted interfaces connected to the end user and trusted interfaces connected to the DHCP server or another switch From the Services configuration menu you can access the following links e Global Configuration Interface Configuration Binding Configuration e Persistent Configuration e Statistics 69 XS712T Smart Switch Global Configuration Use this screen to view and configure the global settings for DHCP Snooping gt To configure DHCP snooping global settings 1 Select System gt Services gt DHCP Snooping gt Global Configuration The DHCP Snooping Global Configuration screen displays DHCP Snooping Global Co
145. atus information displayed on the screen Field Description Interface The physical or port channel interfaces associated with VLANs associated with the CST Role Each MST Bridge Port that is enabled is assigned a Port Role for each spanning tree The port role will be one of the following values Root Port Designated Port Alternate Port Backup Port Master Port or Disabled Port Mode Specifies the spanning tree operation mode Different modes are STP RSTP and MSTP Fast Link Indicates whether the port is enabled as an edge port Status The Forwarding State of this port Click Refresh to update the information on the screen with the most current data MST Configuration Use the Spanning Tree MST Configuration screen to configure Multiple Spanning Tree MST on the switch gt To configure an MST instance 1 Select Switching gt STP gt Advanced gt MST Configuration MST Configuration MST Configuration Time Since Topology Topolo iru Ro MST ID Priority Bridge Identifier Change potosy Designated Root Path Topology Change Change m Po 32768 3 Rael 8 hr 54 min 58 sec a n E Configure the MST values e MST ID Specify the ID of the MST to create Valid values for this are between 1 and 4094 e Priority Specifies the bridge priority value for the MST When switches or bridges are running STP each is assigned a priority After exchanging BPDUS the s
146. ault value for Age Time is 1200 seconds 3 Enter the value you want the switch to use for the ARP response timeout 150 XS712T Smart Switch You must enter a valid integer which represents the number of seconds the switch will wait for a response to an ARP request The range for this field is 1 to 10 seconds The default value for Response Time is 10 second Enter an integer which specifies the maximum number of times an ARP request will be retried The range for this field is O to 10 The default value for Retries is 10 Enter an integer which specifies the maximum number of entries for the ARP cache The range for this field is 79 to 1024 The default value for Cache Size is 1024 Select the dynamic renew radio button This controls whether the ARP component automatically attempts to renew ARP Entries of type Dynamic when they age out The default setting is Enable Click Apply 151 XS712T Smart Switch Remove an ARP Entry From the ARP Cache Use this screen to remove certain entries from the ARP Table gt To remove entries from the ARP table 1 select Routing gt ARP gt Advanced gt ARP Entry Management ARP Entry Management ARP Entry Management Remove From Table Remove IP Address 2 Select the type of ARP entry to be removed from the Remove From Table drop down menu The choices listed specify the type of ARP Entry to be deleted All Dynamic Entries All Dynamic and Gateway Entries
147. ble it will be grayed out When this button is clicked the action is immediate It is not required to click Apply for the action to occur 6 Click Reauthenticate to begin the reauthentication sequence on the selected port This button is only selectable if the control mode is auto If the button is not selectable it will be grayed out When this button is pressed the action is immediate It is not required to click Apply for the action to occur The fields in the following table are not configurable Table 26 Port authentication status information Field Description Control Direction The control direction displays the control direction for the specified port which is always Both The control direction dictates the degree to which protocol exchanges take place between Supplicant and Authenticator The unauthorized controlled port exerts control over communication in both directions disabling both incoming and outgoing frames This field is not configurable Protocol Version This protocol version displays the protocol version associated with the selected port The only possible value is 1 corresponding to the first version of the 802 1X specification This field is not configurable PAE Capabilities This PAE capabilities display the port access entity PAE functionality of the selected port Possible values are Authenticator or Supplicant This field is not configurable 194 XS712T Smart Switc
148. c dash or underscore characters and have a length in the range from 0 to 31 8 Click Add gt To delete one or more static routes 1 Select the check box next to each route to remove 2 Click Delete The Route Status table provides information about the static routes configured on the switch and the dynamic routes the switch has learned Table 19 Routing table information Field Description Route Type Indicates whether the learned route is a static or default route Network Address The IP route prefix for the destination Subnet Mask Also referred to as the subnet network mask this indicates the portion of the IP interface address that identifies the attached network Protocol This field tells which protocol created the specified route The possibilities are one of the following Local e Static Route Type This field can be Connected or Static or Dynamic based on the protocol Next Hop Interface The outgoing router interface to use when forwarding traffic to the destination Next Hop IP Address The outgoing router IP address to use when forwarding traffic to the next router if any in the path towards the destination The next router is always one of the adjacent neighbors or the IP address of the local interface for a directly attached network Preference The preference is an integer value from 1 to 255 The user can specify the preference value of an individual static ro
149. cating the PAUSE operation This counter does not increment when the interface is operating in half duplex mode The number of valid EAPOL frames of any type that have been received by this authenticator EAPOL Frames Transmitted The number of EAPOL frames of any type that have been transmitted by this authenticator Time Since Counters Last Cleared The elapsed time in days hours minutes and seconds since the statistics for this port were last cleared Use the buttons at the bottom of the screen to perform the following actions e Click Clear to clear all the counters This resets all statistics for this port to the default values e Click Refresh to refresh the data on the screen and display the most current statistics 244 XS712T Smart Switch EAP Statistics Use the EAP Statistics screen to display information about EAP packets received on a specific port gt To display the EAP statistics screen 1 Select Monitoring gt Ports gt EAP Statistics EAP Statistics EAP Statistics i All Go To Interface EAPOL LESS ae Start Logoff Last Last Invalid Response ID Response Request ID Request Frames Frames Ports pesca neal EERS Frames Frames Frame Frame Frames ese Frames Frames Frames Frames Received Received Version Source Received Tode Received Received Transmitted Transmitted xgi 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
150. ccess points in IEEE 802 11 Wireless LANs The IEEE 802 11 standard describes an architectural framework within which authentication and consequent actions take place It also establishes the requirements for a protocol between the authenticator the system that passes an authentication request to the authentication server and the supplicant the system that requests authentication as well as between the authenticator and the authentication server 294 XS712T Smart Switch The XS712T Smart Switch supports a guest VLAN which allows unauthenticated users to have limited access to the network resources Note You can use QoS features to provide rate limiting on the guest VLAN to limit the network resources the guest VLAN provides Another 802 1X feature is the ability to configure a port to Enable Disable EAPoL packet forwarding support You can disable or enable the forwarding of EAPoL when 802 1X is disabled on the device The ports of an 802 1X authenticator switch provide the means in which it can offer services to other systems reachable via the LAN Port based network access control allows the operation of a switch s ports to be controlled in order to ensure that access to its services is only permitted by systems that are authorized to do so Port access control provides a means of preventing unauthorized access by supplicants to the services offered by a system Control over the access to a switch and the LAN to which it is conne
151. ce is not configurable and is always listed in the MAC Address Table Interface Description Example Physical The physical ports include 10 gigabit ports and are xg1 xg2 xg3 numbered sequentially starting from one using the following format xgX xg stands for 10G port and X is the port number Link aggregation group LAG LAG interfaces are logical interfaces that are only used for 11 12 I3 bridging functions CPU management interface This is the internal switch interface responsible for the c1 23 XS712T Smart Switch Online Help The Help main navigation tab of the web management interface provides access to the menus that are described in the following sections e Support User Guide Support The Support screen provides access to the NETGEAR support website at support netgear com Toaccess the support website from the web management interface 1 Select Help gt Support The Support screen displays Support Support Please click APPLY below to be taken to the Online Support site at netgear com 2 Click Apply to access the NETGEAR support site for the switch User Guide The XS712T Smart Switch Software Administration Manual the guide you are now reading is available at the NETGEAR download center at downloadcenter netgear com gt To access the reference manual online from the web management interface 1 Select Help gt User Guide User Guide User Guide Please click APPLY butt
152. centage of time spent in LPI mode since the last sample was recorded Percentage Time spent in LPI mode since last reset The percentage of time spent in LPI mode since the switch was reset 5 Click Apply 52 XS712T Smart Switch SNMP This section describes how to configure the Simple Network Management Protocol SNMP version 1 and SNMP version 2 information on the switch For information about configuring the SNMPv3 administrative profile see Use SNMPv3 on page 21 SNMPV1 V2 The screens under the SNMPV 1 V2 link allow you to configure SNMPv1 v2 community information traps and trap flags Configure the SNMP Community By default two SNMP Communities exist e Private with Read Write privileges and status set to Enable e Public with Read Only privileges and status set to Enable These are well known communities Use this screen to change the defaults or to add other communities Only the communities that you define using this screen will have access to the switch using the SNMPv1 and SNMPv2c protocols Only those communities with read write level access can be used to change the configuration using SNMP Use this screen when you are using the SNMPv1 and SNMPv2c protocol Toaddan SNMP community 1 Select System SNMP SNMP V1 V2 Community Configuration The Community Configuration screen displays Community Configuration Community Configuration Management Management Sea Station IP S
153. ch for an entry in the MAC address table 1 Select Switching gt Address Table gt Advanced gt Address Table Address Table MAC Address Table Search By VLAN ID Total MAC Addresses 00 00 33 44 55 66 xg2 Learned 00 00 E8 9A 59 6E xg2 Learned 00 02 BC 00 00 77 xg2 Learned 00 0B 78 66 95 00 xg2 Learned 00 0E 7F 2D 43 5F xg2 Learned 00 0F FE 00 2B 47 xg2 Learned 00 17 59 EF 63 AB xg2 Learned 00 17 9A 95 13 5C xg2 Learned 00 17 9A 95 4C 00 xg2 Learned 00 1A A0 1A 73 26 xg2 Learned 00 1A A0 1A 9A F8 Learned 00 1A A0 1A A5 87 Learned 1 1 1 1 1 1 1 00 16 9C E1 D8 00 xg2 Learned 1 1 1 1 1 1 2 Use the Search By field to search for MAC Addresses by MAC Address VLAN ID or Interface MAC Address Select MAC Address from the menu and enter a six byte hexadecimal MAC address in two digit groups separated by colons then click Go If the address exists that entry will be displayed An exact match is required VLAN ID Select VLAN ID from the menu enter the VLAN ID for example 100 Then click Go If any entries with that VLAN ID exist they are displayed 134 XS712T Smart Switch Interface Select Interface from the menu enter the interface ID in g1 g2 format then click Go If any entries learned on that interface exist they are displayed 3 Click Clear to clear Dynamic MAC Addresses in the table 4 Click Refresh to redisplay the screen to show the latest MAC Addresses The following tabl
154. ch screen contains access to the HTML based help that explains the fields and configuration options for the screen Each screen also contains command buttons The following table shows the command buttons that are used throughout the screens in the web interface Table 1 Command buttons Button Function Add Places the new item configured in the heading row of a table Apply Sends the updated configuration to the switch Configuration changes take effect immediately Cancel Abandons the configuration changes on the screen and resets the data to the previous values Delete Removes the selected item Refresh Refreshes the screen with the latest information from the device Logout Ends the session Clear Clears all information and returns the switch to its default settings 18 XS712T Smart Switch Device View The Device View is a Java applet that displays the ports on the switch This graphic provides an alternate way to navigate to configuration and monitoring options The graphic also provides information about device ports current configuration and status table information and feature components The Device View is available by selecting System Device View Depending upon the status of the port the color of a port in the Device View is either red green or black Green indicates that the port is enabled Red indicates that an error has occurred on the port or that the port is adm
155. ch were received from this server on the accounting port Packets Dropped The number of RADIUS packets received from this server on the accounting port and dropped for some other reason Use the buttons at the bottom of the screen to perform the following actions e Click Clear Counters to reset all statistics to their default value e Click Refresh to update the screen with the most current information 177 XS712T Smart Switch Configuring TACACS TACACS provides a centralized user management system while still retaining consistency with RADIUS and other authentication processes TACACS provides the following services Authentication Provides authentication during login and via user names and user defined passwords e Authorization Performed at login When the authentication session is completed an authorization session starts using the authenticated user name The TACACS server checks the user privileges The TACACS protocol ensures network security through encrypted protocol exchanges between the device and TACACS server The TACACS folder contains links described in the following sections Configuring TACACS e TACACS Server Configuration TACACS Configuration The TACACS Configuration screen contains the TACACS settings for communication between the switch and the TACACS server you configure via the inband management port gt To configure global TACACS settings 1 Select Se
156. ck Apply 253 XS712T Smart Switch Trap Logs Use the Trap Logs screen to view information about the SNMP traps generated on the switch gt To view trap log information Select Monitoring gt Logs gt Trap Logs The Trap Logs screen displays Trap Logs Trap Logs Number of Traps Since Last Reset Trap Log Capacity Number of Traps Since Log Last Viewed Trap Logs 0 Apr 10 11 01 23 2000 Entity Database Configuration Changed Apr 10 11 01 23 2000 Link Up xg2 Apr 10 11 01 23 2000 Cold Start Unit 0 Figure 8 Trap log screen The following table describes the Trap Log information displayed on the screen Table 42 Trap log statistics Field Description Number of Traps Since The number of traps that have occurred since the switch last reboot Last Reset Trap Log Capacity The maximum number of traps stored in the log If the number of traps exceeds the capacity the entries will overwrite the oldest entries Number of Traps Since The number of traps that have occurred since the traps were last displayed Log Last Viewed Displaying the traps by any method such as terminal interface display web display or upload file from switch will cause this counter to be cleared to 0 The screen also displays information about the traps that were sent Table 43 Trap log information Field Description Log The sequence number of this trap System Up Time The time at which this trap occurr
157. cribed in the following sections e Global Configuration e RADIUS Server Configuration e Accounting Server Configuration Global Configuration Use the RADIUS Configuration screen to add information about one or more RADIUS servers on the network gt To configure global RADIUS server settings 1 Select Security gt Management Security gt RADIUS gt Global Configuration Global Configuration Global Configuration Current Server IP Address Number of Configured Servers Max Number of Retransmits Timeout Duration secs 5 Accounting Mode Disable v The Current Server IP Address field is blank if no servers are configured see RADIUS Server Configuration on page 174 The switch supports up to three configured RADIUS servers If more than one RADIUS servers are configured the current server is the server configured as the primary server If no servers are configured as the primary server the current server is the most recently added RADIUS server 2 In the Max Number of Retransmits field specify the value of the maximum number of times a request packet is retransmitted to the RADIUS server Consideration to maximum delay time should be given when configuring RADIUS maximum retransmit and RADIUS timeout If multiple RADIUS servers are configured the maximum retransmit value on each will run out before the next server is attempted A retransmit will not occur until the configured timeout value on that server has passed without
158. cted can be desirable in order to restrict access to publicly accessible bridge ports or to restrict access to departmental LANs Access control is achieved by enforcing authentication of supplicants that are attached to an authenticator s controlled ports The result of the authentication process determines whether the supplicant is authorized to access services on that controlled port A Port Access Entity PAE is able to adopt one of two distinct roles within an access control interaction Authenticator A Port that enforces authentication before allowing access to services available via that Port e Supplicant A Port that attempts to access services offered by the Authenticator Additionally there exists a third role Authentication server Performs the authentication function necessary to check the credentials of the Supplicant on behalf of the Authenticator All three roles are required in order to complete an authentication exchange The XS712T Smart Switch supports the Authenticator role only in which the PAE is responsible for communicating with the Supplicant The Authenticator PAE is also responsible for submitting the information received from the Supplicant to the Authentication Server in order for the credentials to be checked which will determine the authorization state of the Port The Authenticator PAE controls the authorized unauthorized state of the controlled Port depending on the outcome of the RADIUS based auth
159. curity Management Security gt TACACS TACACS Configuration TACACS Configuration TACACS Configuration Key String Connection Timeout 2 In the Key String field specify the authentication and encryption key for TACACS communications between the XS712T and the TACACS server The valid range is 0 128 characters The key must match the key configured on the TACACS server 3 In the Connection Timeout field specify the maximum number of seconds allowed to establish a TCP connection between the XS712T and the TACACS server The valid range is 1 30 seconds Default is 5 seconds 4 Click Apply 178 XS712T Smart Switch TACACS Server Configuration Use the TACACS Server Configuration screen to configure up to five TACACS servers with which the switch can communicate To configure TACACS server 1 Select Security gt Management Security gt TACACS gt Server Configuration TACACS Server Configuration TACACS Server Configuration 2 TACACS Server Priority 0 to 65535 Port 0 to 65535 Key Strin DB d 9 Timeout 1 30 2 In the TACACS Server field specify the IP address of the TACACS server Note The Add option is available if fewer than five TACACS servers are configured on the system and the Server Address field is only available when Add is selected in the TACACS Server IP Address field After you add one or more TACACS servers additional fields appear on the TACACS Serve
160. d You can specify up to eight DNS servers The Preference field displays the server preference order The preference is set in the order created 6 Click Apply to send the updated configuration to the switch Configuration changes take effect immediately 44 XS712T Smart Switch Configure and View Hostname to IP Address Information Use this screen to manually map host names to IP addresses or to view dynamic DNS mappings To add a static entry to the local DNS table 1 Select System Management DNS Host Configuration 2 The DNS Host Configuration screen displays DNS Host Configuration DNS Host Configuration e Eel Host Name 1 to 255 characters IPv4 IPv6 Address C Dynamic Host Mapping 2 Host Total Elapsed Type IPv4 IPv6 Address 3 Under the Host Name field specify the static host name to add 4 Under the IPv4 IPv6 Address field specify the IP address to associate with the hostname 5 Click Add To remove an entry from the static DNS table 1 Select the check box next to the entry to remove 2 Click Delete To change the hostname or IP address in an entry 1 Select the check box next to the entry to update 2 Enter the new information in the appropriate field 3 Click Apply The Dynamic Host Configuration table shows host name to IP address entries that the switch has learned The following table describes the dynamic host fields Table 8 Dynamically learned host name
161. d and invalid packets that were received from this server Malformed Access Responses The number of malformed RADIUS Access Response packets received from this server Malformed packets include packets with an invalid length Bad authenticators or signature attributes or unknown types are not included as malformed access responses Bad Authenticators The number of RADIUS Access Response packets containing invalid authenticators or signature attributes received from this server Pending Requests The number of RADIUS Access Request packets destined for this server that have not yet timed out or received a response Timeouts The number of authentication timeouts to this server Unknown Types The number of RADIUS packets of unknown type which were received from this server on the authentication port Packets Dropped The number of RADIUS packets received from this server on the authentication port and dropped for some other reason 175 XS712T Smart Switch Use the buttons at the bottom of the screen to perform the following actions Click Clear Counters to clear the authentication server and RADIUS statistics to their default values Click Refresh to refresh the screen with the most current data from the switch Accounting Server Configuration Use the RADIUS Accounting Server Configuration screen to view and configure various settings for one or more RADIUS accounting servers o
162. d LAGs to apply the same setting to the selected interfaces Select the check box in the heading row to apply the same settings to all interfaces 5 Configure the IGMP Snooping values for the selected port s or LAG s Admin Mode Select the interface mode for the selected interface for IGMP Snooping for the switch from the menu The default is Disable Host Timeout Specify the amount of time you want the switch to wait for a report for a particular group on a particular interface before it deletes that interface from the group Enter a value between 2 and 3600 seconds The default is 260 seconds e Max Response Time Specify the amount of time you want the switch to wait after sending a query on an interface because it did not receive a report for a particular group on that interface Enter a value greater or equal to 1 and less than the Host Timeout in seconds The default is 10 seconds e MRouter Timeout Specify the amount of time you want the switch to wait to receive a query on an interface before removing it from the list of interfaces with multicast routers attached Enter a value between 0 and 3600 seconds The default is 0 seconds A value of zero indicates an infinite timeout no expiration Fast Leave Admin Mode Select the Fast Leave mode for a particular interface from the menu The default is Disable 6 Click Apply IGMP Snooping Table Use the IGMP Snooping Table screen to view all of the entries in the Multicast For
163. d ees REP E TAE XECREX d REX X Xn 65 aii yices DHOE SNOOP eie Rasa Erin ebd raa qu pex i pa 69 Chapter 3 Layer 2 Switching Configuration PONG at a phoretasaeaaeade cease tee oun en ewdee e pede es 7T Pon eG osse qe RP RERO EN ES REQUE RP ERE Rees 77 FONTO WOL odd do durare pd dq Rc Doa RAE T 79 LAG Config M BUDE uuu ue s ros toe PRLS DEO DEES be ed 80 LAG Mempbelelills a aco os 64 ad X ex x REEDS X a d Ce dac 81 LACP Configuration ii sese kr ern dr RR Y Rem eR RR RU enr 82 MISES adds do2 eset pee Xd Doa BROKER UP E abdo e Pee Ke dc d ut ee d 84 VLAN Membership Configuration lisse 86 VLAN OUS lt 4 bi oe od ne ERR eda ond ERU RA EH PE RERE PIGdCAEe EE 87 For VLAN ID Conngurauon 34e xe RCEYGFR E Le ERREUR ERaBqE 87 MAC Based VLAN ica Joes e ESERURPEIHLPERARUGA ERARTESERGCN SP 89 Table of Contents 3 XS712T Smart Switch Protocol Based VLAN Group Configuration 000 90 Protocol Based VLAN Group Membership 91 Auto VolP Configuratign ies nece rhe RRR sages seb RR E ERR Rx 93 Configure Protocol Based Auto VoIP Settings 93 PO SOUINGS PPM PT 95 ECT BIG isa dass dua bobo eal en Acct do dccus uu hel 96 CST Port ConfIgurellait 2 cacac eee eed etre eomm ea hebr yeas dede e 102 PRSE TL a dud dk hu E ea cob e ROC s d Oona Rd 105 MoT Emir a airaa quee eR CEN DXRq SE Qai 106 MST Port Contigo icis 99 he PEE EREREWEESRPES Ed XE 107 SUG sities ted aeieeigenesegud
164. d enter the IP address of the switch in the web browser address field The login screen displays 2 Type the password in the Password field Login Password The factory default password is password Passwords are case sensitive 3 Click Login After the system authenticates you the System Information screen displays The following figure shows the layout of the Smart Switch web interface 16 Navigation tab vitching Device View System Information gt IP Configuration gt IPv6 Network Configuration gt IPv6 Network Neighbor gt Time gt Denial of Service DNS cree here Routing Configuration menus SNMP LLDP XS712T Smart Switch Help link Logout button Security Monitoring Maintenance Help Index tosour Services System Information System Information Product Name System Name System Location System Contact Serial Number System Object OID Date amp Time System Up Time Base MAC Address FAN Status XS712T ProSafe 12 Port 10 Gigabit Ethernet 10GbE Smart Switch 3 1 12 22 B6 1 0 3 N prathibh hyd 3 1 3 6 1 4 1 4526 100 4 30 Jun 21 04 21 20 2013 UTC 0 00 O days 8 hours 9 mins 57 secs 78 65 43 33 33 21 System1 System2 Temperature Status OK OK sensor Temperature Sensor 1 Sensor 2 Versions 33 C 36 C e Model Name XS712T B6 1 0 3 3 1 12 22 Configuration status and options Figure 1 Sma
165. d in this VLAN via GVRP This selection has the effect of excluding a port from the selected VLAN 3 Define the IP address of the VLAN interface in the IP Address field 4 Define the subnet mask of the VLAN interface in the Network Mask field 5 Click Apply 143 XS712T Smart Switch VLAN Routing Configuration Use the VLAN Routing Configuration screen to view information about the VLAN routing interfaces configured on the system or to assign an IP address and subnet mask to VLANs on the system To configure VALN routing 1 Select Routing gt VLAN gt VLAN Routing VLAN Routing Configuration VLAN Routing Configuration 2 Inthe VLAN list select the VLAN you want to configure for VLAN routing This field will display the all IDs of VLANs configured on this switch 3 Enter an IP address of the VLAN routing interface a Enter a subnet mask for the VLAN routing interface 5 Under IP MTU specify the maximum size of IP packets sent on an interface A valid range is from 68 bytes to the link MTU The default value is 1500 A value of 0 indicates that the IP MTU is unconfigured When the IP MTU is unconfigured the router uses the link MTU as the IP MTU The link MTU is the maximum frame size minus the length of the layer 2 header 6 Click Add 7 View the following information about the routing VLAN Field Description Port The port number assigned to the VLAN Routing Interface MAC Address The MA
166. d is read only Path Cost Set the Path Cost to a new value for the specified port in the common and internal spanning tree It takes a value in the range of 0 200000000 Priority The priority for a particular port within the CST The port priority is set in multiples of 16 If you specify a value that is not a multiple of 16 the priority is set to the priority is automatically set to the next lowest priority that is a multiple of 16 For example if you set a value between 0 and 15 the priority is set to O If you specify a number between 16 and 31 the priority is set to 16 Priority range is 0 240 The default value is 128 External Port Path Cost Set the External Path Cost to a new value for the specified port in the spanning tree It takes a value in the range of 0 200000000 Port ID The port identifier for the specified port within the CST It is made up from the port priority and the interface number of the port Hello Timer Specifies the switch Hello time which indicates the amount of time in seconds a port waits between configuration messages The value is fixed at 2 seconds Click Apply 103 CST Port Status Use the CST Port Status screen to display Common Spanning Tree CST and Internal Spanning Tree on a specific port on the switch XS712T Smart Switch gt To display the CST port status for a specific port Select Switching gt STP gt Advanced gt CST Port Status 1 CST Port Status CST Port
167. d on the user is encouraged to try to correct the interference by one or more of the following methods Reorient or relocate the receiving antenna Increase the separation between the equipment and the receiver Connect the equipment into an electrical outlet on a circuit different from that which the radio receiver is connected e Consult the dealer or an experienced radio TV technician for help ProSafe XS712T Smart Switch Tested to Comply with FCC Standards FOR HOME OR OFFICE USE PY306100037 Modifications made to the product unless expressly approved by NETGEAR Inc could void the user s right to operate the equipment Canadian Department of Communications Radio Interference Regulations This digital apparatus ProSafe XS712T Smart Switch does not exceed the Class B limits for radio noise emissions from digital apparatus as set out in the Radio Interference Regulations of the Canadian Department of Communications Canada ID 4054A FVX538 310
168. d on the switch 3 In the OUI based priority list select the 802 1p priority value to use for traffic that matches a value in the known OUI list If the Auto VoIP mode is enabled and the interface detects an OUI match the device assigns the traffic in that session to the traffic class mapped to this priority value Traffic classes with a higher value are generally used for time sensitive traffic 4 Click Apply Port Settings The port settings scree allows you to configure the OUI port settings gt To configure OUI port settings 1 Select Switching gt Auto VoIP gt Advanced gt Port Setting 95 4 XS712T Smart Switch QUI Port Settings QUI Port Settings 1 LAGS All Go To Interface o 1d SO a Auto VoIP Mode Operational status CM D Enable Enable Enable Enable Enable Enable Enable Enable Enable xg10 Enable xg11 Enable xgi2 Enable 1 LAGS All Go To Interface GO jJ Select the interface s to configure In the Auto VoIP Mode list select Enable to enable Auto VoIP on the selected interfaces The Operational Status field displays the current operational status of the interface Click Apply OUI Table Device hardware manufacturers can include an OUI in a network adapter to help identify a hardware device The OUI is a unique 24 bit number assigned by the IEEE registration authority The switch comes preconfigured
169. d that were between 128 and 255 octets in length inclusive excluding framing bits but including FCS octets Packets Received 256 511 Octets The total number of packets including bad packets received that were between 256 and 511 octets in length inclusive excluding framing bits but including FCS octets Packets Received 512 1023 Octets The total number of packets including bad packets received that were between 512 and 1023 octets in length inclusive excluding framing bits but including FCS octets Packets Received 1024 1518 Octets The total number of packets including bad packets received that were between 1024 and 1518 octets in length inclusive excluding framing bits but including FCS octets Packets Received gt 1518 Octets The total number of packets received that were longer than 1518 octets excluding framing bits but including FCS octets and were otherwise well formed Total Packets Received Without Errors The total number of packets received that were without errors Unicast Packets Received The number of subnetwork unicast packets delivered to a higher layer protocol Multicast Packets Received The total number of good packets received that were directed to a multicast address This number does not include packets directed to the broadcast address Broadcast Packets Received The total number of good packets received that were directed to the broadcast address
170. dan entry to the ARP table 1 Select Routing gt ARP gt Advanced gt ARP Create ARP Create Static ARP Configuration E IP Address MAC Address Mie Routing VLANs ARP Cache 2 Under IP Address specify the IP address to add It must be the IP address of a device on a subnet attached to one of the switch s existing routing interfaces 3 Under MAC Address specify the unicast MAC address of the device The format is six two digit hexadecimal numbers separated by colons for example 00 06 29 32 81 40 4 Click Add For information about the information in the Routing VLANs ARP Cache table see Table 27 ARP cache information for routing VLANs on page 149 Configure Global ARP Settings Use the Global ARP Configuration screen to display and change the configuration parameters of the ARP table gt To display or change the parameters of the ARP table 1 Select Routing gt ARP gt Advanced gt Global ARP Configuration Global ARP Configuration Global ARP Configuration Age Time secs 1200 15 to 21600 Response Time secs i si 1 to 10 Retries 4 0 to 10 Cache Size 1024 79 to 1024 Dynamic Renew Disable Enable 2 Enter the value you want the switch to use for the ARP entry age out time You must enter a valid integer which represents the number of seconds it will take for an ARP entry to age out The range for this field is 15 to 21600 seconds The def
171. ddress specify the snooping querier IP address to be used as the source address in periodic MLD queries sent on the specified VLAN Click Add View the status information described in the following table Field Description Operational State Specifies the operational state of the IGMP Snooping Querier on a VLAN e Querier The snooping switch is the querier in the VLAN The snooping switch will send out periodic queries with a time interval equal to the configured querier query interval If the snooping switch sees a better querier numerically lower in the VLAN it moves to non querier mode Non Querier The snooping switch is in non querier mode in the VLAN If the querier expiry interval timer expires the snooping switch moves into querier mode Disabled The snooping Querier is not operational on the VLAN The Snooping Querier moves to disabled mode when MLD Snooping is not operational on the VLAN or when the querier address is not configured or the network management address is also not configured Operational Version Displays the MLD protocol version of the operational querier Last Querier Address Displays the IP address of the last querier from which a query was snooped on the VLAN Last Querier Version Displays the MLD protocol version of the last querier from which a query was snooped on the VLAN Operational Max Response Displays the maximum response time to be used in the queries that Time are sen
172. de gees euaatutayiunreeds 109 Bridge Multicast Forwarding usse sessece hh Rx Re 3 RI RES 111 MFD Tales ores RERQRIRERRB OPERE I EF ie aA 112 IGMP OnODDIBO qe ETE beer gees QUE ex HERD ERR eee REESE 114 IGMP Snooping QUAI iudi dace DIRE RR RR ERROR RR CREE ACA 121 MCD SPOODIDO ua gea RR eo RO REOR doe II dee SE 124 Forwarding Datebisb osa cde dene ee xd ex de dox b had 132 MAC Address Tabla sisussuac sh rea Rh dh ea 132 Dynamic Address Configuration scsisuus e aka x hdd 133 Address Table iicseec sues rc Re o RR OR EROR Rd eh 134 Statie MAU AddroSS 25 os cise Rare ened eed odes edeenad eked 135 Chapter 4 Configuring Routing Comgure IPSOS uis ger ce ao teewadee nee bene E RA menos 137 lucro cC 138 Configure VLAN BOUUDO ovx xy ERRLERARERERK SAG RO Rao ER d 142 VLAN Routing VUZBII zu oan a Radek Ee xad xx AE Ha ARR rx E eta 142 Router Discovery Configuration 0000 eee eee 145 Conmgure and View ROULSS Los doe eder Ra nade eee ee RR ard 146 Configure ARP 2 occcigecdeeeaw dee ita bk CI Red ck d pecado RC ood 148 ARP UES s capa dude ud bdo uia Reach qua dO b dd iura p dd 148 Create a Static ARP Entry 2 45 0 ces ec cee eee ee ne 149 Configure Global ARP Settings 2 06 cc cee 150 Chapter 5 Configuring Quality of Service RSS O EWI oan ie ae ahah he EEEE a aaa ok eee ase 153 Basic CoS COnfIgHrealiori 2442 64 04 eda re ghe ERROR evans 154 CoS interface ConMiguretibli iuuesscexphoeRERTCEXPRE REG 4 ERR E 158 Interface Q
173. desirable effects on applications with strict timing requirements such as voice or multimedia Defining DiffServ To use DiffServ for QoS the links accessible from the Differentiated Services configuration menu must first be used to define the following categories and their criteria 1 Class Create classes and define class criteria 2 Policy Create policies associate classes with policies and define policy statements 3 Service Add a policy to an inbound interface Packets are classified and processed based on defined criteria The classification criteria is defined by a class The processing is defined by a policy s attributes Policy attributes can be defined on a per class instance basis and it is these attributes that are applied when a match occurs A policy can contain multiples classes When the policy is active the actions taken depend on which class matches the packet Packet processing begins by testing the class match criteria for a packet A policy is applied to a packet when a class match within that policy is found The Differentiated Services menu contains links to the various DiffServ configuration and display features described in the following sections e Diffserv Configuration e Class Configuration e IPv6 Class Configuration e Policy Configuration e Service Configuration e Service Statistics 160 XS712T Smart Switch Diffserv Configuration Use the DiffServ Configuration screen to display Diff
174. e Interface xgi Interface Trust Mode 2 Select the Global radio button to specify the CoS configurable interfaces The option Global represents the most recent global configuration settings Alternatively you can select the Interface radio button to apply trust mode settings to individual interfaces The per interface setting overrides the global settings 3 From the Global Trust Mode drop down list select the trust mode for ingress traffic on the switch 154 XS712T Smart Switch Global Trust Mode can be one of the following e Untrusted Do not trust any CoS packet marking at ingress 802 1p The eight priority tags that are specified in IEEE 802 1p are pO to p7 The QoS setting lets you map each of the eight priority levels to one of seven internal hardware priority queues e DSCP The six most significant bits of the DiffServ field are called the Differentiated Services Code Point DSCP bits 4 From the Interface Trust Mode drop down list select the trust mode for ingress traffic on the interface Interface Trust Mode can be one of the following e Untrusted Do not trust any CoS packet marking at ingress e 802 1p The eight priority tags that are specified in IEEE 802 1p are pO to p7 The QoS setting lets you map each of the eight priority levels to one of seven internal hardware priority queues e DSCP The six most significant bits of the DiffServ field are called the Differentiated Services Code P
175. e Start File Transfer 2 Use the File Type menu to specify the type of file you want to upload e Archive Retrieve the image from the operational flash Text Configuration Retrieve the stored text configuration Error Log Retrieve the system error persistent log sometimes referred to as the event log Trap Log Retrieve the system trap records Buffered Log Retrieve the system buffered in memory log The factory default is Archive 3 Select the image from the Image Name field 4 From the Server Address Type field specify the format to use for the address you type in the TFTP Server Address field PvA Indicates the TFTP server address is an IP address in dotted decimal format e DNS Indicates the TFTP server address is a hostname 5 n the Server Address field specify the IP address or hostname of the TFTP server The address you type must be in the format indicated by the TFTP Server Address Type 6 In the Transfer File Path field specify the path on the TFTP server where you want to put the file You can enter up to 32 characters Include the backslash at the end of the path A path name with a space is not accepted Leave this field blank to save the file to the root TFTP directory 7 Inthe Transfer File Name field specify a destination file name for the file to upload You can enter up to 32 characters The transfer fails if you do not specify a file name For a Archive transfer use an st
176. e Time Configuration screen displays Time Configuration Time Configuration Clock Source Local SNTP Date 01 11 2030 Time 09 43 00 2 Next to the Clock Source field select Local 3 Inthe Date field enter the date in the DD MM YYYY format 4 Inthe Time field enter the time in HH MM SS format Note If you do not enter a date and time the switch will calculate the date and time using the CPU s clock cycle 5 Click Apply gt To configure the time by using SNTP 1 Select System gt Management gt Time gt Time Configuration 2 Next to the Clock Source field select SNTP The screen refreshes and additional fields appear 34 XS712T Smart Switch Time Configuration Time Configuration Clock Source Local SNTP SNTP Global Configuration Client Mode Disable Unicast Broadcast Port Unicast Poll Interval Broadcast Poll Interval Unicast Poll Timeout Unicast Poll Retry Time Zone Name Offset Hours Offset Minutes SNTP Global Status Version Supported Mode Unicast and Broadcast Last Update Time Jan 1 00 00 00 1970 UTC 0 00 Last Attempt Time Jan 1 00 00 00 1970 UTC 0 00 Last Attempt Status Other Server IP Address Address Type Unknown Server Stratum Reference Clock Id Server Mode Unicast Server Max Entries Unicast Server Current Entries Broadcast Count Next to the Client Mode field select Unicast or Broadcast Unicast SNTP operates in a point to point fashion A unicast c
177. e describes the information available for each entry in the address table Field Description VLAN ID The VLAN ID associated with the MAC address MAC Address A unicast MAC address for which the switch has forwarding and or filtering information The format is a six byte MAC address with each byte separated by colons For example 00 0F 89 AB CD EF Interface The port where this address was learned that is this field displays the port through which the MAC address can be reached Status The status of this entry The possible values are Static The entry was added when a static MAC filter was defined Learned The entry was learned by observing the source MAC addresses of incoming traffic and is currently in use Management The system MAC address which is identified with interface c1 Static MAC Address Use the Static MAC Address Configuration screen to configure and view static MAC addresses on an interface To add a static MAC address 1 Select Switching gt Address Table gt Advanced gt Static MAC Address Static MAC Address Port List Interface Static MAC Address Table E Static MAC Address VLAN ID Select the VLAN ID corresponding to the MAC address to add Specify the MAC address to add Specify the interface associated with the MAC address Click Add m Rum 135 XS712T Smart Switch gt To delete a static MAC address 1 Select the check box next to each e
178. e specifically assigned to the port using the Port VLAN Configuration screen You define a protocol based VLAN by creating a group Each group has a one to one relationship with a VLAN ID can include one to three protocol definitions and can include multiple ports When you create a group you will choose a name and a Group ID will be assigned automatically To add a protocol based VLAN group 1 Select Switching gt VLAN gt Advanced gt Protocol Based VLAN Group Configuration Protocol Based VLAN Group Configuration Protocol Based VLAN Group Configuration __ Group 1D Group Name Protocol_ VLANID x m RE UT testi 0x0800 2 Under Group ID specify a unique number used to identify the group 3 Under Group Name specify a name to identify the group You can enter up to 16 characters 4 Under Protocol specify the protocol or protocols to use as the match criteria to determine whether a particular packet belongs to the protocol based VLAN The protocols you specify are checked against the two byte EtherType field of ingress Ethernet frames on the PVBLAN Group Interfaces When adding a protocol you can specify the EtherType hex value or for IP ARP and IPX the protocol keyword 5 Under VLAN ID specify the VLAN ID to associate with the protocol based VLAN All the ports in the group will assign this VLAN ID to untagged packets received for the protocols you included in this group The Ports field displays all the
179. e task from the list e Reschedule Change the scheduled date and time for a pending firmware upgrade Select Range Select all tasks that occurred or are scheduled to occur within a certain period of time 277 XS712T Smart Switch 278 Troubleshooting This appendix covers the following topics e Troubleshooting Configuration Menu e Troubleshooting Chart Troubleshooting Configuration Menu The Maintenance main navigation tab gives access to the Troubleshooting configuration menu This menu lets you perform basic troubleshooting functions such as pinging an IPv4 or IPv6 address to check if the switch can communicate with a particular network host and tracing an IPv4 route to determine the packet s path to a remote destination The Troubleshooting configuration menu has the links that are described in the following sections Ping e Ping IPv6 TraceRoute Ping Use the Ping screen to tell the switch to send a Ping request to a specified IP address You can use this feature to check whether the switch can communicate with a particular network host gt To send a ping to an IPv4 address 1 Select Maintenance gt Troubleshooting gt Ping 279 2 XS712T Smart Switch Ping Ping Details IP Address Host Name Count Interval secs Size In the IP Address Host Name field specify the IP address or the host name of the station you want the switch to ping The initial value is blank This
180. ecent reboot Address Entries in Use The number of learned and static entries in the Forwarding Database Address Table for this switch Maximum VLAN Entries The maximum number of Virtual LANs VLANs allowed on this switch Most VLAN Entries Ever Used The largest number of VLANs that have been active on this switch since the last reboot Static VLAN Entries The number of presently active VLAN entries on this switch that have been created statically Dynamic VLAN Entries The number of presently active VLAN entries on this switch VLAN Deletes The number of VLANs on this switch that have been created and then deleted since the last reboot Time Since Counters Last Cleared The elapsed time in days hours minutes and seconds since the statistics for this switch were last cleared Use the buttons at the bottom of the screen to perform the following actions e Click Clear to clear all the statistics counters resetting all switch summary and detailed statistics to default values The discarded packets count cannot be cleared e Click Refresh to refresh the screen with the most current data from the switch 235 XS712T Smart Switch Port Statistics The Port Statistics screen displays a summary of per port traffic statistics on the switch gt To access the port summary screen 1 Select Monitoring gt Ports gt Port Statistics Port Statistics Status 1 LAGS Al
181. ecify the file name of the DHCP snooping bindings database in which the bindings are stored 3 Next to Write Delay specify the amount of time to wait between writing bindings information to persistent storage The delay allows the device to collect as many entries as possible new and removed before writing them to the persistent file 4 Click Apply 74 Statistics XS712T Smart Switch Use this screen to view and clear per interface statistics about the DHCP messages filtered by the DHCP snooping feature on untrusted interfaces To view and clear the DHCP snooping statistics 1 Select System Services DHCP Snooping Statistics The DHCP Snooping Statistics screen displays DHCP Snooping Statistics DHCP Snooping Statistics 1 LAGS All DHCP S M Interface MAC Verify Failures Client Ifc Mismatch E xor rcr Received xgi 0 xg2 xg3 xg4 xg5 xg6 xg7 xg8 xg9 xgi0 xgil xgi12 1 LAGS All 0 0 0 0 0 0 0 0 0 0 0 0 o EO NOLO LO LO EN o EO Eo Eo LE o NM 2 Select whether to display statistics for physical interfaces link aggregation groups LAGs or both by clicking one of the following links above the table heading e 1 Only physical interfaces are displayed This is the default setting e LAGS Only link aggregation groups are displayed All Both physical interfaces and link aggregation groups are displayed 3 Click Clear to clear all interfaces statistics The following
182. ed All the ports will be included in the VLAN Tag All All frames transmitted for this VLAN will be tagged All the ports will be included in the VLAN Remove All Excluding all ports from the selected VLAN 4 Click Apply 86 XS712T Smart Switch VLAN Status This VLAN Status screen displays the status of all currently configured VLANs To view the current VLAN status 1 Select Switching VLAN Advanced VLAN Status VLAN Status VLAN Status v LA Routi AM SEAN VLAN Type N Member Ports ID Name Interface 1 Default Default xg1 xg12 lag 1 lag 8 2 Auto VoIP AUTO VoIP xg1 xg12 lag 1 lag 8 3 Auto Video Auto Video 2 View the following VLAN status information e VLAN ID The VLAN Identifier VID of the VLAN The range of the VLAN ID is 1 to 4093 VLAN Name The name of the VLAN VLAN ID 1 is always named Default e VLAN Type The VLAN type Default VLAN ID 1 always present Static a VLAN you have configured Dynamic The VLAN that is created by GVRP registration initially has a type of Dynamic GVRP The type of AUTO VoIP Vlan is Dynamic AUTO VoIP The VLAN that is created by MVRP registration initially has a type of Dynamic MVRP The VLAN that is created by L2 Tunnel has a type of Dynamic L2 Tunnel The VLAN that is created by IP VLAN has a type of Dynamic IP VLAN The VLAN that is created by DOT x registration has a type of Dynamic DOT1X The VLAN that is creat
183. ed by open flow registration has a type of Dynamic OPENFLOW The type of Auto Video Vlan is Auto Video e Routing Interface Displays the routing interface Member Ports The ports that are included in the VLAN Port VLAN ID Configuration The Port PVID Configuration screen lets you assign a port VLAN ID PVID to an interface There are certain requirements for a PVID All ports must have a defined PVID e If no other value is specified the default VLAN PVID is used e Ifyou want to change the port s default PVID you must first create a VLAN that includes the port as a member Use the Port VLAN ID PVID Configuration screen to configure a virtual LAN on a port 87 XS712T Smart Switch gt To configure PVID information 1 Select Switching gt VLAN gt Advanced gt Port PVID Configuration Port PVID Configuration PVID Configuration 1 LAGS All Go To Interface aSQ J Confi d A tabl Confi d C t 5 onfigured Current Acceptable onfigure urrent port Priority Interface PVID Frame Ingress Ingress 1 to 4093 OE GN xgi 1 1 1 1 1 1 1 1 1 1 1 1 0 to 7 Types Filtering Filtering Admit All Disable Disable Admit All Disable Disable Admit All Disable Disable Admit All Disable Disable Admit All Disable Disable Admit All Disable Disable Admit All Disable Disable Admit All Disable Disable Admit All Disable Disable Admit All Disable Disable Admit All Disable Disable Admit All Disab
184. ed expressed in days hours minutes and seconds since the last reboot of the switch Trap Information identifying the trap 254 Event Logs XS712T Smart Switch Use the Event Log screen to display the event log which is used to hold error messages for catastrophic events After the event is logged and the updated log is saved in flash memory the switch will be reset The log can hold at least 2 000 entries and is erased when an attempt is made to add an entry after it is full The event log is preserved across system resets To view the event logs Select Monitoring gt Logs gt Event Logs The Event Logs screen displays Event Logs Event Logs TaskiD Code 2 3 4 5 6 7 8 9 EVENT EVENT gt EVENT gt EVENT gt EVENT gt EVENT gt EVENT gt EVENT gt EVENT EVENT gt EVENT gt EVENT gt 00112 00114 00112 00116 00115 17171717 002516 AAAAAAAA 00112 17171717 00217 AAAAAAAA 00112 17171717 025251 AAAAAAAA 00112 AAAAAAAA 00112 bootos c bootos c 310 bootos c 310 bootos c 310 bootos c 310 unitmgr c 5807 bootos c 310 unitmgr c 5807 bootos c 310 unitmgr c 5807 bootos c 310 bootos c 310 uo NO EO Eoo uio Figure 9 Event Logs screen The following table describes the Event Log information displayed on the screen Table 44 Event log information Field Description Entry The number of the entry within the event log The most recent entry is
185. ed the active management VLAN ID is 1 default which allows an IP connection to be established through any port When the management VLAN is set to a different value an IP connection can be made only through a port that is part of the management VLAN It is also mandatory that the port VLAN ID PVID of the port to be connected in that management VLAN be the same as the management VLAN ID The management VLAN has the following requirements e Only one management VLAN can be active at a time When a new management VLAN is configured connectivity through the existing management VLAN is lost The management station should be reconnected to the port in the new management VLAN 5 Click Apply 30 XS712T Smart Switch IPv6 Network Configuration Use the IPv6 Network Configuration screen to configure the IPv6 network interface which is the logical interface used for in band connectivity with the switch through all of the switch s front panel ports The configuration parameters associated with the switch s network interface do not affect the configuration of the front panel ports through which traffic is switched or routed To access the switch over a IPv6 network you must initially configure the switch with IPv6 information IPv6 prefix prefix length and default gateway IPv6 can be configured using any of the following options e Pv6 Auto Configuration e DHCPv6 When in band connectivity is established IPv6 infor
186. ed 46467 Broadcast Packets Transmitted 12 Transmit Packets Discarded 0 Most Address Entries Ever Used 10 Address Entries in Use 3 Maximum VLAN Entries Most VLAN Entries Ever Used Static VLAN Entries VLAN Deletes 0 Time Since Counters Last Cleared 3 day 3 hr 0 min 39 sec Figure 7 Switch Statistics screen The following table describes the switch statistics displayed on the screen Table 37 Switch statistics Field Description iflndex This object indicates the iflndex of the interface table entry associated with the processor of this switch Octets Received The total number of octets of data received by the processor excluding framing bits but including FCS octets Packets Received Without The total number of packets including broadcast packets and multicast Errors packets received by the processor Unicast Packets Received The number of subnetwork unicast packets delivered to a higher layer protocol Multicast Packets Received The total number of packets received that were directed to a multicast address This number does not include packets directed to the broadcast address Broadcast Packets Received The total number of packets received that were directed to the broadcast address This does not include multicast packets 234 XS712T Smart Switch Table 37 Switch statistics Continued Field Description Receive Packets Discarded Octets Transmitted The n
187. ed from other LLDP enabled systems gt To view LLDP information received from a neighbor device 1 Select System gt Advanced gt LLDP gt Neighbor Information The Neighbors Information screen displays Neighbors Information Neighbors Information MSAP Entry Local Port Chassis ID Subtype Chassis ID Port ID Subtype Port ID System Name 2 View summary LLDP information for the remote device Note If no information has been received from a neighbor device or if the link partner is not LLDP enabled no information displays 65 XS712T Smart Switch The following table describes the information that displays for all LLDP neighbors that have been discovered Field Description MSAP Entry The Media Service Access Point MSAP entry number for the remote device Local Port The interface on the local system that received LLDP information from a remote system Chassis ID Subtype Identifies the type of data displayed in the Chassis ID field on the remote system Chassis ID Identifies the remote 802 LAN device s chassis Port ID Subtype Identifies the type of data displayed in the remote system s Port ID field Port ID Identifies the physical address of the port on the remote system from which the data was sent System Name Identifies the system name associated with the remote device If the field is blank the name might not be configured on the remote system
188. een created on the system Toconfigure a MAC based VLAN 1 Select Switching gt VLAN gt Advanced gt MAC Based VLAN Mac Based VLAN Group Configuration MAC Based VLAN Configuration m MAC Address VLAN ID a EXTEXUNE GM 000000 2 Under MAC Address specify the source MAC address of the host to be bound to a VLAN ID All untagged traffic that includes this address in the source MAC address field of the Ethernet frame is placed in the associated VLAN 3 Enter the VLAN ID of the MAC based VLAN If an untagged frame received on any port or LAG matches the associated MAC address it is tagged with this VLAN ID 4 Click Add 89 XS712T Smart Switch Protocol Based VLAN Group Configuration Protocol based VLAN can be used to define filtering criteria for untagged packets By default if you do not configure any port IEEE 802 1Q or protocol based VLANs untagged packets will be assigned to VLAN 1 You can override this behavior by defining either port based VLANs or protocol based VLANs or both Tagged packets are always handled according to the IEEE 802 1Q standard and are not included in protocol based VLANs If you assign a port to a protocol based VLAN for a specific protocol untagged frames received on that port for that protocol will be assigned the protocol based VLAN ID Untagged frames received on the port for other protocols will be assigned the Port VLAN ID either the default PVID 1 or a PVID you hav
189. een only by the requestor who stores the sender information in its ARP cache Newer information always replaces existing content in the ARP cache The XS712T switches support 1024 ARP entries which includes dynamic and static ARP entries Devices can be moved in a network which means the IP address that was at one time associated with a certain MAC address is now found using a different MAC or can have disappeared from the network altogether i e it has been reconfigured disconnected or powered off This leads to stale information in the ARP cache unless entries are updated in reaction to new information seen on the network periodically refreshed to determine if an address still exists or removed from the cache if the entry has not been identified as a sender of an ARP packet during the course of an ageout interval usually specified via configuration To configure and display ARP details see the following sections e ARP Cache e Create a Static ARP Entry e Configure Global ARP Settings Remove an ARP Entry From the ARP Cache ARP Cache Use the ARP Cache screen to view entries in the ARP table a table of the remote connections most recently seen by this switch gt To display entries in the ARP table Select Routing gt ARP gt Basic gt ARP Cache The ARP Cache screen displays 148 XS712T Smart Switch ARP Cache Management VLAN ARP Cache IP Address Port MAC Address 10 27 64 1 xg2 00 16 9C E1 D8 0
190. efine port mirroring sessions gt To configure port mirroring 1 Select Monitoring gt Mirroring gt Port Mirroring Port Mirroring Mirroring Global Configuration Destination Interface None Y Session Mode Disable Enable Status Table 1 CPU LAGS All Go To Interface l co J _ Source Port Direction Status c i Tal xgi 7 xg10 FP xgii IP xgi2 1 CPU LAGS All Go To Interface 2 In the Destination Interface list select the port to which port traffic is be copied 256 XS712T Smart Switch 3 Select the mode for port mirroring on the selected port from the Session Mode e Enable Multiple Port Mirroring is active on the selected port Disable Port mirroring is not active on the selected port but the mirroring information is retained 4 Select the source port s You can configure multiple ports and LAGs as source ports a Display the port s or LAG s to configure as source ports To display physical interfaces LAGs or both click one of the following links above the table heading e 1 Only physical interfaces are displayed This is the default setting e LAGS Only link aggregation groups are displayed All Both physical interfaces and link aggregation groups are displayed To locate an interface quickly type the interface number for example xg12 in the Go To Interface field at the top or bottom of the table and click Go b Select the check box next to each physical
191. egradation of service has undesirable effects on applications with strict timing requirements such as voice or multimedia Quality of Service QoS can provide consistent predictable data delivery by distinguishing between packets that have strict timing requirements from those that are more tolerant of delay Packets with strict timing requirements are given special treatment in a QoS capable network With this in mind all elements of the network must be QoS capable If one node is unable to meet the necessary timing requirements this creates a deficiency in the network path and the performance of the entire packet flow is compromised There are two basic types of QoS Integrated Services network resources are apportioned based on request and are reserved resource reservation according to network management policy RSVP for example Differentiated Services network resources are apportioned based on traffic classification and priority giving preferential treatment to data with strict timing requirements The XS712T Smart Switch supports DiffServ The DiffServ feature contains a number of conceptual QoS building blocks you can use to construct a differentiated service network Use these same blocks in different ways to build other types of QoS architectures There are 3 key QoS building blocks needed to configure DiffServ e Class e Policy e Service i e the assignment of a policy to a directional interface 290 XS71
192. embership screen to configure the ports as protected or unprotected To configure protected ports 1 Select Security gt Traffic Control gt Protected Ports Protected Ports Protected Ports Membership 2 Click the orange bar to display the available ports 3 Click the box below each port to configure as a protected port Protected ports are marked with a check mark No traffic forwarding is possible between two protected ports 4 Click Apply Private VLAN Configuration Use this screen to add Virtual Local Area Networks VLANs to the device and to configure existing VLANs as private VLANs Private VLANs provide Layer 2 isolation between ports that share the same broadcast domain In other words a private VLAN allows a VLAN broadcast domain to be partitioned into smaller point to multipoint subdomains The ports participating in a private VLAN can be located anywhere in the Layer 2 network Each subdomain is defined represented by a primary VLAN and a secondary VLAN The primary VLAN ID is the same for all subdomains that belong to a private VLAN The secondary VLAN ID differentiates subdomains from each another and provides Layer 2 isolation between ports that are members of the same private VLAN gt To configure the private VLAN type 1 Select Security gt Traffic Control gt Private Vian gt Private Vian Type Configuration Private VLAN Type Configuration Private VLAN Type Configuration E VLAN ID Private VL
193. en FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation Regulatory Compliance Information This section includes user requirements for operating this product in accordance with National laws for usage of radio spectrum and operation of radio devices Failure of the end user to comply with the applicable requirements may result in unlawful operation and adverse action against the end user by the applicable National regulatory authority Note This product s firmware limits operation to only the channels allowed in a particular Region or Country Therefore all options described in this user s guide may not be available in your version of the product 307 XS712T Smart Switch Europe EU Declaration of Conformity CE Marking by the above symbol indicates compliance with the Essential Requirements of the R amp TTE Directive of the European Union 1999 5 EC This equipment meets the following conformance standards EN300 328 EN301 489 17 EN60950 For the current EU Declaration of Conformity visit http kb netgear com app answers detail a_id 11621
194. ended ACL which allows you to permit or deny specific types of layer 3 or layer 4 traffic from a source IP address to a destination IP address This type of ACL provides more granularity and filtering capabilities than the standard IP ACL 3 Click Add Each configured ACL displays the following information e Rules Displays the number of rules currently configured for the IP ACL e Type Identifies the ACL as either a standard or extended IP ACL Todelete an IP ACL 1 Select the check box next to the IP ACL ID field 2 Click Delete 220 XS712T Smart Switch IP Rules Use the IP Rules screen to define rules for IP based standard ACLs The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded Note There is an implicit deny all rule at the end of an ACL list This means that if an ACL is applied to a packet and if none of the explicit rules match then the final implicit deny all rule applies and the packet is dropped gt To add IP rules 1 Select Security ACL gt Advanced gt IP Rules 2 From the ACL ID Name list select the IP ACL for which to create a rule IP Rules IP Rules ACL ID NAME Basic ACL Rule Table Rule Se Match Source Source IP vi ID Action Logging Queue Eve IP Mask Id yer Address No rules have been configured for this ACL 3 Click Add Standard ACL Rule Configuration Standard ACL Rule Configura
195. entication process 295 XS712T Smart Switch gt Supplicant Authenticator Switch Authentication Server RADIUS 192 168 10 23 Supplicant Y Sample 802 1X Configuration This example shows how to configure the switch so that 802 1X based authentication is required on the ports in a corporate conference room g1 g8 These ports are available to visitors and need to be authenticated before granting access to the network The authentication is handled by an external RADIUS server When the visitor is successfully authenticated traffic is automatically assigned to the guest VLAN This example assumes that a VLAN has been configured with a VLAN ID of 150 and VLAN Name of Guest 1 2 From the Port Authentication screen select ports g1 through g8 From the Port Control menu select Unauthorized The Port Control setting for all other ports where authentication is not needed should Authorized When the Port Control setting is Authorized the port is unconditionally put in a force Authorized state and does not require any authentication When the Port Control setting is Auto the authenticator PAE sets the controlled port mode In the Guest VLAN field for ports g1 98 enter 150 to assign these ports to the guest VLAN You can configure additional settings to control access to the network through the ports See Port Security Interface Configuration on page 202 for information about the settings Click Apply From the
196. entify the interface in the Port ID field Port ID The port number Port Description The user defined description of the port To configure the Port Description see Ports on page 77 Advertisement The TLV advertisement status of the port 63 XS712T Smart Switch 3 To view additional details about a port click the name of the port in the Interface column of the Port Information table A popup window displays information for the selected port Port Information Managed Address Address SubType IPv4 Address 10 131 12 164 Interface SubType iflndex Interface Number 33 MAC PHY Details Auto Negotiation Supported Auto Negotiation Enabled Auto Negotiation Advertised uto Negotiation Advertised Capabilities Operational MAU Type Unknown MED Details Capabilities Supported Capabilities N etworlc Current Capabilities Capabilities Network Device Class Network Network Policies io Application User VLAN ID VLAN Type Priority DSCP 0 o Voice 0 Untagged The following table describes the detailed local information that displays for the selected port Field Description Managed Address Address SubType The type of address the management interface uses such as an IPv4 address Address The address used to manage the device Interface SubType The port subtype Interface Number The number that identifies the port MAC PHY Details Auto Negotiation Suppor
197. eo Auto Video Configuration Auto Video Configuration Auto Video Status Disable Enable Auto Video VLAN 3 2 Select one of the following radio buttons Select the Disable radio button to globally disable Auto Video administrative mode for the switch e Select the Enable radio button to globally enable Auto Video administrative mode for the switch The Auto Video VLAN field shows the number of Auto configured IGMP snooping VLANs 3 Click Apply IGMP Snooping Internet Group Management Protocol IGMP Snooping is a feature that allows a switch to forward multicast traffic intelligently on the switch Multicast IP traffic is traffic that is destined to a host group Host groups are identified by class D IP addresses which range from 224 0 0 0 to 239 255 255 255 Based on the IGMP query and report messages the switch forwards traffic only to the ports that request the multicast traffic This prevents the switch from broadcasting the traffic to all ports and possibly affecting network performance A traditional Ethernet network can be separated into different network segments to prevent placing too many devices onto the same shared media Bridges and switches connect these segments When a packet with a broadcast or multicast destination address is received the switch will forward a copy into each of the remaining network segments in accordance with the IEEE MAC Bridge standard Eventually the packet is made accessible t
198. eout value Short Specifies a short timeout value 5 Click Apply 83 XS712T Smart Switch VLANs Adding Virtual LAN VLAN support to a Layer 2 switch offers some of the benefits of both bridging and routing Like a bridge a VLAN switch forwards traffic based on the Layer 2 header which is fast and like a router it partitions the network into logical segments which provides better administration security and management of multicast traffic By default all ports on the switch are in the same broadcast domain VLANs electronically separate ports on the same switch into separate broadcast domains so that broadcast packets are not sent to all the ports on a single switch When you use a VLAN users can be grouped by logical function instead of physical location Each VLAN in a network has an associated VLAN ID which displays in the IEEE 802 1Q tag in the Layer 2 header of packets transmitted on a VLAN An end station can omit the tag or the VLAN portion of the tag in which case the first switch port to receive the packet can either reject it or insert a tag using its default VLAN ID A given port can handle traffic for more than one VLAN but it can only support one default VLAN ID The VLAN menu contains links described in the following sections e Basic VLAN Configuration e VLAN Membership Configuration e VLAN Status Port VLAN ID Configuration e MAC Based VLAN e Protocol Based VLAN Group Configuration Protocol
199. equal the value given for that bit The valid format is xx xx xx xx xx xx A MAC mask of 00 00 00 00 00 00 matches a single MAC address VLAN Requires a packet s VLAN ID to match the ID listed here Enter the VLAN ID to apply this criteria The valid range is 1 4093 Logging When set to Enable logging is enabled for this ACL rule subject to resource availability in the device If the Access List Trap Flag is also enabled this will cause periodic traps to be generated indicating the number of times this rule was hit during the current report interval A fixed 5 minute report interval is used for the entire system A trap is not issued if the ACL rule hit count is zero for the current interval This field is only supported for a Deny Action Click Add To change the match criteria for a rule 3 2 3 Select the check box associated with the rule Modify the fields as desired Click Apply To delete a rule 1 2 Select the check box associated with the rule to remove Click Delete 217 XS712T Smart Switch MAC Binding Configuration When an ACL is bound to an interface all the rules that have been defined are applied to the selected interface Use the MAC Binding Configuration screen to assign MAC ACL lists to ACL Priorities and Interfaces To configure MAC ACL interface bindings 1 Select Security gt ACL gt Basic gt MAC Binding Configuration MAC Binding Configuration Binding Configuration Q
200. ercentage LPI time Time Since Percentage Time spent Percentage Time spent Sample No The Sample in LPI mode in LPI mode since Was Recorded since last sample last reset 2 Next to the Sampling Interval field specify the frequency in seconds at which EEE LPI history entries are collected This configuration is applied on all interfaces on the switch 3 Next to the Max Samples to keep field specify the maximum number of LPI samples to keep in the history buffer 51 XS712T Smart Switch This configuration is applied on all interfaces on the switch 4 Click Apply To view per interface LPI history information select the interface with the information to view from the Interface list The screen refreshes and displays the LPI history for the selected interface The following table describes the status fields on the screen Table 13 LPI history information Field Description Percentage LPI time The percentage of time spent in LPI mode on the switch Sample No The current sample number When the number increases to the maximum it rolls over and begins at 1 Time Since The Sample Was Recorded The amount of time that has passed since the last LPI history sample was recorded Each time the screen is refreshed it shows a different time as it reflects the difference in current time and time at which the sample was recorded Percentage Time spent in LPI mode since last sample The per
201. erface Configuration The Green Ethernet Interface Configuration screen displays 46 XS712T Smart Switch Green Ethernet Interface Configuration Green Ethernet Interface Configuration Go To Interface Go To Interface 2 Select the port s to configure To configure a single port select the check box associated with it or type the port number in the Go To Interface field and click Go To configure multiple ports with the same settings select the check box associated with each port to configure e To configure all ports with the same settings select the check box in the heading row 3 Use the EEE Mode list to administratively enable or disable EEE for the selected ports When this mode is enabled and the send and receive sides of a link are lightly loaded the port can transition to low power mode 4 Click Apply Green Ethernet Detail Use this screen to view detailed per port Green Ethernet information and to enable or disable Green Ethernet settings on a single port Using the Green Ethernet features allows for power consumption savings gt To configure Green Ethernet mode settings for a port 1 Click System gt Management gt Green Ethernet gt Green Ethernet Detail The Port Green Mode Statistics screen displays 47 XS712T Smart Switch Port Green Mode Statistics Local Device Information Interface Cumulative Energy Saved on this port due to Green Mode s Wat
202. ersion is 1 In the Query Interval field specify the time interval in seconds between periodic queries sent by the snooping querier The Query Interval must be a value in the range of 1 1800 seconds The default value is 60 In the Querier Expiry Interval field specify the time interval in seconds after which the last querier information is removed The Querier Expiry Interval must be a value in the range of 60 300 seconds The default value is 60 Click Apply Querier VLAN Configuration Use this screen to configure MLD queriers for use with VLANs on the network gt To configure MLD queriers 1 Select Switching gt Multicast gt MLD Snooping Querier gt Querier VLAN Configuration 130 XS712T Smart Switch MLD Snooping Querier VLAN Configuration MLD Snooping Querier VLAN Configuration Querier Ts em Operational Election Querier VLAN Operational Operational Quester Querter Max Participate Address Response Under VLAN ID specify the VLAN ID for which the MLD Snooping Querier is to be enabled From the Querier Election Participate Mode list select the mode e Disabled Upon seeing another querier of the same version in the VLAN the snooping querier moves to the non querier state Enabled The snooping querier participates in querier election in which the least IP address operates as the querier in that VLAN The other querier moves to non querier state Under Snooping Querier VLAN A
203. erv class to associate with the policy 4 Click Add The available policy type is In which indicates the type is specific to inbound traffic This field is not configurable gt To rename an existing policy or add a new member class to the policy 1 Select the check box next to the configured class 2 Update the desired fields 3 Click Apply Todelete a policy 1 Click the check box associated with the policy to remove 2 Click Delete 166 XS712T Smart Switch Toconfigure the policy attributes 1 Click the name of the policy Policy Configuration Policy Configuration E3 Policy Name Policy Type Member Class In policy1 The policy name is a hyperlink The following figure shows the configuration fields for the policy Policy Class Configuration Class Information Policy Name policy1 Policy Type In Member Class Name Policy Attribute Policy Attribute Assign Queue oly O Drop Mark VLAN CoS o Mark IP Precedence DA Mark IP DSCP afi v O Simple Policy Color Mode Color Blind Comitted Rate Comitted Burst Size Conform Action Send Drop Mark CoS Mark IP Precedence C Mark IP DSCP Send Drop Mark CoS Mark IP Precedence Mark IP DSCP 2 Configure the policy attributes Assign Queue Select this value from the drop down list This is an integer value in the range 0 to 7 Drop Select this
204. erval value for rate limiting purpose on this interface If the rate limit is N A then the burst interval has no meaning and it is N A Click Apply 72 XS712T Smart Switch Binding Configuration Use this screen to view add and remove static bindings in the DHCP snooping bindings database and to view or clear the dynamic bindings in the bindings table To configure static DHCP bindings 1 Select System Services DHCP Snooping Binding Configuration 2 The DHCP Snooping Binding Configuration screen displays DHCP Snooping Binding Configuration Static Binding Configuration MAC Address VLAN ID IP Address Dynamic Binding Configuration 3 From the Interface list select the interface on which the DHCP client is authorized 4 Under MAC Address specify the MAC address for the binding to be added This is the key to the binding database 5 From the VLAN ID list field select the ID of the VLAN the client is authorized to use 6 Under IP Address specify the IP address of the client 7T Click Add to add the DHCP snooping binding entry into the database The DHCP Snooping Dynamic Binding Configuration table shows information about the DHCP bindings that have been learned on each interface on which DHCP snooping is enabled The following table describes the dynamic bindings information Table 15 DHCP Snooping dynamic binding information Field Description Interface The interface on w
205. ery is True the other rules on the screen are not available Src IP Address Requires a packet s source IP address to match the address listed here Enter an IP Address in the appropriate field using dotted decimal notation The address you enter is compared to a packet s source IP Address Src IP Mask Specifies the source IP address wildcard mask Wild card masks determine which bits are used and which bits are ignored A wild card mask of 255 255 255 255 indicates that no bit is important A wildcard of 0 0 0 0 indicates that all of the bits are important Wildcard masking for ACLs operates differently from a subnet mask A wildcard mask is in essence the inverse of a subnet mask For example to apply the rule to all hosts in the 192 168 1 0 24 subnet enter 0 0 0 255 in the Source IP Mask field This field is required when you configure a source IP address Click Apply To modify the match criteria for an ACL rule 1 2 3 4 From the ACL Name list on the IP Rules screen select the ACL that includes the rule to update In the Basic ACL Rule Table click the rule ID The rule ID is a hyperlink to the Standard ACL Rule Configuration screen Modify the ACL rule information Click Apply To delete and IP ACL rule 1 2 In the Basic ACL Rule Table on the IP Rules screen select the check box associated with the rule to remove Click Delete IP Extended Rules Use the IP Extended Rules screen to define rules
206. es the link partner has entered a low power idle state 48 XS712T Smart Switch Table 9 Green Ethernet local device information Continued Field Description Tx Low Power Idle Duration uSec The amount of time in 10 microsecond increments the link partner has spent in a low power idle state Tw sys tx uSec The value of Tw sys that the local system can support This value is updated by the EEE DLL Transmitter state diagram Tw sys tx Echo uSec The remote system s transmit Tw sys that was used by the local system to compute the Tw sys that it wants to request from the remote system Tw sys rx uSec The value of Tw sys that the local system requests from the remote system This value is updated by the EEE Receiver L2 state diagram Tw sys rx Echo uSec The value of the remote system s receive Tw sys that was used by the local system to compute the Tw sys that it can support Fallback Tw sys uSec The value of fallback Tw sys that the local system requests from the remote system This value is updated by the local system software Tx dll enabled The initialization status of the EEE transmit Data Link Layer management function on the local system Tx dll ready The transmit Data Link Layer ready status This variable indicates that the tx system initialization is complete and is ready to update receive LLDPDU containing EEE TLV This variable is updated by the local system softwa
207. est the more accurate the clock The device receives time from stratum 1 and above since it is itself a stratum 2 device Information received from SNTP servers is evaluated based on the time level and server type SNTP time definitions are assessed and determined by the following time levels Tft Time at which the original request was sent by the client T2 Time at which the original request was received by the server T3 Time at which the server sent a reply T4 Time at which the client received the server s reply The device can poll Unicast server types for the server time Polling for unicast information is used for polling a server for which the IP address is known SNTP servers that have been configured on the device are the only ones that are polled for synchronization information T1 through T4 are used to determine server time This is the preferred method for synchronizing device time because it is the most secure method If this method is selected SNTP information is accepted only from SNTP servers defined on the device using the SNTP Server Configuration screen The device retrieves synchronization information either by actively requesting information or at every poll interval 33 XS712T Smart Switch Time Configuration Use the Time Configuration screen to view and adjust date and time settings gt To manually configure the time 1 Select System gt Management gt Time gt Time Configuration Th
208. flows gt To configure global flow control settings 1 Select Switching gt Ports gt Flow Control Flow Control Flow Control Global Flow Control IEEE 802 3x Mode Disable Enable 2 Enable or disable IEEE 802 3x flow control on the system from the Global Flow Control IEEE 802 3x Mode field The factory default is Disable Enable The switch sends pause packets if the port buffers become full e Disable The switch does not send pause packets if the port buffers become full 3 Click Apply 79 XS712T Smart Switch Link Aggregation Groups Link aggregation groups LAGs which are also known as port channels allow you to combine multiple full duplex Ethernet links into a single logical link Network devices treat the aggregation as if it were a single link which increases fault tolerance and provides load sharing You assign the LAG VLAN membership after you create a LAG The LAG by default becomes member of default management VLAN i e 1 A LAG interface can be either static or dynamic but not both All members of a LAG must participate in the same protocols A static port channel interface does not require a partner system to be able to aggregate its member ports Static LAGs are supported When a port is added to a LAG as a static member it neither transmits nor receives LAGPDUs The XS712T Smart Switch supports eight LAGs The LAGs menu contains links described in the following sections e LAG
209. formation see MST Configuration on page 106 10 Click Add 11 Create a second MST instance with the following settings e MSTID 2 e Priority 49152 e VLAN ID 500 12 Click Add In this example assume that Switch 1 has become the Root bridge for the MST instance 1 and Switch 2 has become the Root bridge for MST instance 2 Switch 3 has hosts in the Sales department ports g1 g2 and g3 and in the HR department ports g4 and g5 Switches 1 and 2 also have hosts in the Sales and Human Resources departments The hosts connected from Switch 2 use VLAN 500 MST instance 2 to communicate with the hosts on Switch 3 directly Likewise hosts of Switch 1 use VLAN 300 MST instance 1 to communicate with the hosts on Switch 3 directly The hosts use different instances of MSTP to effectively use the links across the switch The same concept can be extended to other switches and more instances of MSTP 300 XS712T Smart Switch VLAN Routing with a Static Route Refer to the following sections to configure VLAN routing with a static route VLAN Routing Overview VLANs divide broadcast domains in a LAN environment Whenever hosts in one VLAN need to communicate with hosts in another VLAN the traffic must be routed between them This is known as inter VLAN routing On the switch it is accomplished by creating Layer 3 interfaces Switch virtual interfaces SVI When a port is enabled for bridging default rather than routing all norm
210. g Configuration In IPv4 Layer 2 switches can use IGMP Snooping to limit the flooding of multicast traffic by dynamically configuring Layer 2 interfaces so that multicast traffic is forwarded to only those interfaces associated with IP multicast address In IPv6 MLD snooping performs a similar function With MLD snooping IPv6 multicast data is selectively forwarded to a list of ports that want to receive the data instead of being flooded to all ports in a VLAN This list is constructed by snooping IPv6 multicast control packets To globally enable MLD snooping on the switch 1 Select Switching gt Multicast gt MLD Snooping gt MLD Snooping Configuration MLD Snooping Configuration MLD Snooping Configuration MLD Snooping Admin Mode Disable Enable Multicast Control Frame Count 0 Interfaces Enabled for MLD Snooping VLAN IDs Enabled for MLD Snooping 2 Next to MLD Snooping Admin Mode enable the administrative mode for MLD Snooping on the switch 3 Click Apply 4 View MLD snooping information on the switch e Multicast Control Frame Count The number of multicast control frames that are processed by the CPU Interfaces Enabled for MLD Snooping A list of all the interfaces currently enabled for MLD Snooping To enable an interface for MLD snooping see MLD Interface Configuration on page 125 VLAN IDs Enabled For MLD Snooping The VLANs enabled for MLD snooping To enable a VLAN for MLD snooping see MLD VLAN
211. g traffic and is currently in use Management The system MAC address which is identified with interface c1 Dynamic Address Configuration Use the Dynamic Addresses screen to set the amount of time to keep a learned MAC address entry in the forwarding database The forwarding database contains static entries which are never aged out and dynamically learned entries which are removed if they are not updated within a given time gt To configure the dynamic address setting 1 Select Switching gt Address Table gt Advanced gt Dynamic Addresses Dynamic Address Dynamic Address Address Aging Timeout seconds 2 Inthe Address Aging Timeout field specify the number of seconds the forwarding database should wait before deleting a learned entry that has not been updated IEEE 802 1D 1990 recommends a default of 300 seconds Enter any number of seconds between 10 and 1000000 The factory default is 300 133 XS712T Smart Switch Note IEEE 802 1D recommends a default of 300 seconds which is the factory default 3 Click Apply Address Table The MAC Address Table contains information about unicast entries for which the switch has forwarding and filtering information This information is used by the transparent bridging function in determining how to propagate a received frame Use the search function of the MAC Address Table screen to display information about the entries in the table gt To sear
212. gation LAG With this wizard you can e Create a VLAN and generate a unique name for VLAN Add selected ports to the newly created VLAN and remove selected ports from the default VLAN 142 XS712T Smart Switch e Create a LAG add selected ports to a LAG then add LAG to the newly created VLAN e Enable tagging on selected ports if the port is in another VLAN Disable tagging if a selected port does not exist in another VLAN Exclude ports not selected from the VLAN e Enable routing on the VLAN using the IP address and subnet mask entered gt To configure VLAN routing using the VLAN routing wizard 1 Click Routing gt VLAN gt VLAN Routing Wizard VLAN Routing Wizard VLAN Routing Wizard Vlan ID o 2 to 4093 IP Address Bet work mask d 2 Enter the VLAN Identifier VID associated with this VLAN in the Vlan ID field The range of the VLAN ID is 1 to 4093 The Ports fields displays selectable physical ports when a unit is selected and LAGs if any Selected ports will be added to the Routing VLAN Each port has three modes e Tagged Select the ports on which all frames transmitted for this VLAN will be tagged The ports that are selected will be included in the VLAN e U Untagged Select the ports on which all frames transmitted for this VLAN will be untagged The ports that are selected will be included in the VLAN e BLANK Autodetect Select the ports that can be dynamically registere
213. ging 3 Click Apply SNMP Supported MIBS This screen displays a list of all MIBs supported by the switch 56 XS712T Smart Switch LLDP The IEEE 802 1AB defined standard Link Layer Discovery Protocol LLDP allows stations on an 802 LAN to advertise major capabilities and physical descriptions This information is viewed by a network manager to identify system topology and detect bad configurations on the LAN From the LLDP configuration menu you can access the following links e LLDP Configuration e LLDP Port Settings e LLDP MED Network Policy e LLDP MED Port Settings Local Information Neighbors Information LLDP is a one way protocol there are no request response sequences Information is advertised by stations implementing the transmit function and is received and processed by stations implementing the receive function The transmit and receive functions can be enabled disabled separately per port By default both transmit and receive are enabled on all ports The application is responsible for starting each transmit and receive state machine appropriately based on the configured status and operational state of the port The Link Layer Discovery Protocol Media Endpoint Discovery LLDP MED is an enhancement to LLDP with the following features e Auto discovery of LAN policies such as VLAN Layer 2 Priority and DiffServ settings enabling plug and play networking e Device location discovery for creati
214. gt Private Vian gt Private Vian Association Configuration Private VLAN Association Configuration Private VLAN Association m Primary VLAN Secondary VLAN s Isolated VLAN Community VLAN s 2 Use the Primary VLAN menu to select the Primary VLAN ID of the domain This is used to associate the Secondary VLANs to the domain 3 The Secondary VLAN s field displays all of the statically created VLANs excluding the primary and default VLANs This control is used to associate VLANs to the selected primary VLAN 206 XS712T Smart Switch 4 Click Apply Table 32 Private VLAN association table information Field Description Isolated VLAN The VLAN ID of the isolated VLAN associated with the primary VLAN If the field is blank no isolated VLAN has been associated with the primary VLAN An isolated VLAN is a secondary VLAN that carries traffic from isolated ports to promiscuous ports Only one isolated VLAN can be configured per private VLAN Community VLAN s The VLAN ID of each community VLAN associated with the primary VLAN If the field is blank no community VLANs have been associated with the primary VLAN A community VLAN is a secondary VLAN that forwards traffic between ports that belong to the same community and to the promiscuous ports Multiple community VLANs can be configured per private VLAN Private VLAN Port Mode Configuration Use this screen to configure the port mode for the ports
215. h Table 26 Port authentication status information Continued Field Description Authenticator PAE State The authenticator PAE state displays the current state of the authenticator PAE state machine Possible values are as follows Initialize Disconnected Connecting Authenticating Authenticated Aborting Held ForceAuthorized ForceUnauthorized Backend State The backend state displays the current state of the backend authentication state machine Possible values are as follows Request Response Success Fail Timeout Initialize Idle Port Summary Use the Port Summary screen to view information about the port access control settings on a specific port Toaccess the port Summary screen Select Security gt Port Authentication gt Advanced gt Port Summary The Port Summary screen for the 802 1X feature displays 195 XS712T Smart Switch Port Summary Port Summary 1 All Control Reauthentication Port Port Control Mode Enabled Status Mode N A N A N A N A N A N A N A N A N A N A N A N A The following table describes the fields on the Port Summary screen Table 27 IEEE 802 1X port summary information Field Description Port The port whose settings are displayed in the current table row Control Mode Defines the port authorization state The control mode is only set if the link status of the port is link up The possible field values are Au
216. h an IP ACL applies must be specified as well as whether it applies to inbound or outbound traffic Rules for the IPv6 ACL are specified created using the IPv6 Rules screen gt To add an IPv6 ACL 1 Select Security gt ACL gt Advanced gt IPv6 ACL IPv6 ACL IPv6 Configuration Current Number of ACL Maximum ACL IPv6 ACL Table Tarve act C EMT UD T ENNNMNMAM L ACL wizard IPv6 0 IPv6 ACL The current number of the IP ACLs configured on the switch is displayed in the Current Number of ACL area The maximum number of IP ACLs that can be configured on the switch is displayed in the Maximum ACL field depending on the hardware The name of IPv6 ACL can be configured in IPv6 ACL field The number of the rules associated with the IP ACL is displayed in the Rules field The ACL type is IPv6 ACL and displayed in the Type field 2 Under IPv6 ACL specify a name to identify the IPv6 ACL 3 Click Add Todelete an IPv6 ACL 1 Select the check box associated with the ACL 2 Click Delete IPv6 Rules Use the IPv6 Rules screen to configure the rules for the IPv6 Access Control Lists The IPv6 Access Control Lists are created using the IPv6 Access Control List Configuration screen By default no specific value is in effect for any of the IPv6 ACL rules gt To add a rule to an IPv6 ACL 1 Select Security ACL Advanced IPv6 Rules 226 XS712T Smart Switch IPv6 Rules IPv6 Rules ACL Na
217. h from the Admin Mode field The default is disable Use the Group Membership Interval field to specify the amount of time you want the switch to wait for a report for a particular group on a particular interface before it deletes that interface from the group The valid range is from 2 to 3600 seconds The configured value must be greater than Max Response Time The default is 260 seconds Use the Max Response Time field to specify the amount of time you want the switch to wait after sending a query on an interface because it did not receive a report for a particular group on that interface 126 XS712T Smart Switch Enter a value greater or equal to 1 and less than the Group Membership Interval in seconds The default is 10 seconds The configured value must be less than the Group Membership Interval 8 Use the Present Expiration Time field to specify the amount of time you want the switch to wait to receive a query on an interface before removing it from the list of interfaces with multicast routers attached Enter a value between 0 and 3600 seconds The default is O seconds A value of zero indicates an infinite timeout that is no expiration 9 Use the Fast Leave Admin Mode field to select the Fast Leave mode for a particular interface from the menu The default is Disable 10 Click Apply MLD VLAN Configuration MLD Snooping can be enabled on a per VLAN basis It is necessary to keep track of the interfaces that
218. he switch looks at the routing table to determine where to forward the packet The packet is then passed to the VLAN interface of the destination It is then sent to the port where the end device is attached 3 Configure the VLAN interfaces by selecting the VLAN VLANs have to be created statically and ports have to added by using VLAN configuration screens Refer to the example of configuring VLAN with the IP address identified using the VLAN Routing Configuration e g IP address 10 1 2 1 and mask 255 255 255 0 4 Repeat this process for all VLANs identified to be configured as the routing interfaces 301 XS712T Smart Switch Note You can only use the VLAN Routing Wizard for creating VLANs adding ports and enabling it for routing by assigning the IP address and mask 302 Hardware Specifications and Default Values XS712T Smart Switch Specifications The XS712T Smart Switch conforms to the TCP IP UDP HTTP ICMP TFTP DHCP IEEE 802 1D IEEE 802 1p and IEEE 802 1Q standards Table 46 Smart Switch specifications Feature Value Interfaces Port 1 10 are 100M 1G 10Gbps copper ports Port 11 and 12 are Combo ports that can act as either 100M 1G 10Gbps copper ports or 1G 10Gbps SFP ports Flash memory size 32 MB SRAM size and type 128 MB DDR Switching capacity Non Blocking Full WireSpeed on all packet sizes Forwarding method Store and Forward Packet forwarding rate 100M 148 810 pp
219. he Port Detailed Statistics screen displays a variety of per port traffic statistics gt To access the port detailed screen 1 Select Monitoring gt Ports gt Port Detailed Statistics The Port Detailed Statistics figure shows some but not all of the fields on the screen Port Detailed Statistics Port Detailed Statistics Interface xgi v MSTID CST v ifIndex 1 Port Type Normal Port Channel ID Disable Port Role STP Mode Disable STP State Admin Mode Enable Flow Control Mode Disable LACP Mode Enable Physical Mode Auto Physical Status Unknown Link Status Link Down Link Trap Enable Packets RX and TX 64 Octets Packets RX and TX 65 127 Octets Packets RX and TX 128 255 Octets Packets RX and TX 256 511 Octets Packets RX and TX 512 1023 Octets Packets RX and TX 1024 1518 Octets Packets RX and TX 1519 2047 Octets o o0 OOOO 8 Packets RX and TX 2048 4095 Octets 2 From the Interface list select the interface with the statistics to view 3 From the MST list select the MST ID associated with the interface if available 238 XS712T Smart Switch The following table describes the detailed port information displayed on the screen Table 39 Detailed interface statistics Field Description iflndex This field indicates the iflndex of the interface table entry associated with this port on an adapter Port Type For most ports this field is blank Otherwise the possible values are Mirrored Indicates that the
220. he XS712T functions as a simple switch without the management software However you can use the management software to configure more advanced features that can improve switch efficiency and overall network performance Web based management lets you monitor configure and control your switch remotely using a standard web browser instead of using expensive and complicated SNMP software products From your web browser you can monitor the performance of your switch and optimize its configuration for your network You can configure all switch features such as VLANs QoS and ACLs by using the web management interface NETGEAR provides the Smart Control Center utility with this product This program runs under Microsoft Windows XP Windows 2000 or Windows Vista and provides a front end that discovers the switches on your network segment L2 broadcast domain When you power up your switch for the first time use the Smart Control Center to discover the switch and view the network information that has been automatically assigned to the switch by a DHCP server or if no DHCP server is present on the network use the Smart Control Center to discover the switch and assign static network information In addition to enabling NETGEAR switch discovery the Smart Control Center provides several utilities to help you maintain the NETGEAR switches on your network such as password management firmware upgrade and configuration file backup For more informatio
221. hen to download the image Download to primary or secondary storage MAC 00 24 b2 5c 96 49 s Primary Storage Secondary Storage jV Run this FW after download C TFTP Root GS752TXS v1 5 0 2 1 5tk Download firmware to the selected device 275 XS712T Smart Switch 6 Download the firmware to primary or secondary storage Download the firmware as to primary storage By default the firmware is downloaded to primary storage and will be become the active image after the download completes and the switch reboots Download the firmware to secondary storage Select the Secondary Storage option to save the firmware as a backup image on the switch To prevent the switch from using the downloaded firmware as the active image make sure the Run this FW after download check box is clear Note NETGEAR recommends that you download the same image as the primary and secondary image for redundancy 7 Download the firmware to the switch immediately or schedule a different date and time to download the firmware Immediately Select the Run Now check box Later Clear the Run Now check box and enter a date and time to complete the download 8 Enter the switch password in the Current Password field 9 Click Apply WARNING It is important that you do not power off the administrative system or the switch while the firmware upgrade is in progress If the download and upgrade is immediate the upgrade process continues
222. her the route is to be a Default route or a Static route If creating a default route all you need to specify is the next hop IP address otherwise you need to specify each field 3 In the Network Address field specify the IP route prefix for the destination To create a route a valid routing interface must exist and the next hop IP Address must be on the same network as the routing interface 4 Enter the subnet mask Also referred to as the subnet network mask this indicates the portion of the IP address that identifies the attached network 5 Enter the next hop IP address This is the outgoing router IP address to use when forwarding traffic to the next router if any in the path towards the destination The next router is always one of the adjacent neighbors or the IP address of the local interface for a directly attached network When creating a route the next hop IP must be on the same network as the routing interface Valid next hop IP Addresses can be seen in the Route Status table 6 Enter the preference value 146 The preference is an integer value from 1 to 255 You can specify the preference value XS712T Smart Switch sometimes called administrative distance of an individual static route For more information see the Preference description in Table 19 7 Enter a description for this route This is the description of this route that identifies the route The description must consist of alpha numeri
223. hich the DHCP client message was received MAC Address The MAC address associated with the DHCP client that sent the message This is the Key to the binding database VLAN ID The VLAN ID of the client interface IP Address The IP address assigned to the client by the DHCP server Lease Time The remaining IP address lease time for the client 73 XS712T Smart Switch Persistent Configuration Use this screen to configure the persistent location of the DHCP snooping bindings database The bindings database can be stored locally on the device or on a remote system somewhere else in the network The device must be able to reach the IP address of the remote system to send bindings to a remote database gt To configure DHCP snooping persistent settings 1 Select System gt Services gt DHCP Snooping gt Persistent Configuration The DHCP Snooping Persistent Configuration screen displays DHCP Snooping Persistent Configuration DHCP Snooping Persistent Configuration Store Local O Remote Remote IP Address 0 0 0 0 Remote File Name 1 to 32 alphanumeric characters Write Delay 300 15 to 86400 seconds 2 Specify where the DHCP snooping bindings database is located e Local The binding table will be stored locally on the switch Remote The binding table will be stored on a remote TFTP server If the database is stored on a remote server a Specify the IP address of the TFTP server b Sp
224. iate BPDU depending on the received type of BPDU from a particular port An MST Region comprises of one or more MSTP Bridges with the same MST Configuration Identifier using the same MSTIs and which have no Bridges attached that cannot receive and transmit MSTP BPDUs The MST Configuration Identifier has the following components e Configuration Identifier Format Selector e Configuration Name e Configuration Revision Level e Configuration Digest 16 byte signature of type HMAC MD5 created from the MST Configuration Table a VLAN ID to MSTID mapping As there are Multiple Instances of Spanning Tree there is a MSTP state maintained on a per port per instance basis or on a per port per VLAN basis as any VLAN can be in one and only one MSTI or CIST For example port A can be forwarding for instance 1 while discarding for instance 2 The port states have changed since IEEE 802 1D specification To support multiple spanning trees a MSTP bridge has to be configured with an unambiguous assignment of VLAN IDs VIDs to spanning trees This is achieved by 1 Ensuring that the allocation of VIDs to FIDs is unambiguous 2 Ensuring that each FID supported by the Bridge is allocated to exactly one Spanning Tree Instance The combination of VID to FID and then FID to MSTI allocation defines a mapping of VIDs to spanning tree instances represented by the MST Configuration Table With this allocation we ensure that every VLAN is assigned to
225. icate only with the promiscuous ports if the secondary VLAN is an isolated VLAN e Promiscuous The interface belongs to a primary VLAN and can communicate with all interfaces in the private VLAN including other promiscuous ports community ports and isolated ports 4 Click Apply Private VLAN Host Interface Configuration The private VLAN host interface configuration screen allows you to configure the primary and secondary VLAN IDs for the host association mode Toconfigure the private VLAN host interface 1 Select Security gt Traffic Control gt Private Vian gt Private Vlan Host Interface Configuration 2 Select the port s to configure 208 XS712T Smart Switch To configure a single port select the check box associated with it or type the port number in the Go To Interface field and click Go e To configure multiple ports with the same settings select the check box associated with each port to configure e To configure all ports with the same settings select the check box in the heading row Private VLAN Host Interface Configuration Private VLAN Host Interface Configuration 1 LAGS All Go To Interface oH Host Primary VLAN Host Secondary VLAN Interf o ti I VLAN B een to 4093 pH to 4093 imde s xg9 xgi0 xgii xgi2 1 LAGS All EN o E o E o ie o I Oo Lo o m O EO Eo Lo Eo 3 The primary private VLAN the port is a member of when it is
226. ication login list If you select a method that does not time out as the first method such as local no other method will be tried even if you have specified more than one method This parameter will not appear when you first create a new login list User authentication occurs in the order the methods are selected Possible methods are as follows e Local The user s locally stored ID and password will be used for authentication Since the local method does not time out if you select this option as the first method no other method will be tried even if you have specified more than one method e RADIUS The user s ID and password will be authenticated using the RADIUS server If you select RADIUS or TACACS as the first method and an error occurs during the authentication the switch uses Method 2 to authenticate the user 181 XS712T Smart Switch e TACACS The user s ID and password will be authenticated using the TACACS server If you select RADIUS or TACACS as the first method and an error occurs during the authentication the switch attempts user authentication Method 2 None The authentication method is unspecified This option is only available for Method 2 and Method 3 4 Usethe menu in the 2 column to select the authentication method if any that should appear second in the selected authentication login list This is the method that will be used if the first method times out If you select a method that does not t
227. ice ports are not functioning while the rest of the device ports remain functional Error 3 A device error has occurred such as if a port is offline Warning 4 The lowest level of a device warning Notice 5 Normal but significant conditions Provides the network administrators with device information Informational 6 Provides device information Debug 7 Provides detailed information about the log Debugging should only be entered by qualified support personnel Click Apply The rest of the screen displays the number of persistent messages the system has logged and the persistent log messages Use the buttons at the bottom of the screen to perform the following actions Click Clear to clear the messages out of the buffered log Click Refresh to refresh the screen with the most current data from the switch 251 XS712T Smart Switch Server Log Use the Server Log screen to allow the switch to send log messages to the remote logging hosts configured on the system gt To configure local log server settings 1 Select Monitoring gt Logs gt Server Log link Server Log Server Log Configuration Admin Status Disable Enable Local UDP Port 514 Messages Received 298 Messages Relayed 0 Messages Ignored 0 Server Configuration E IP Address Type Host Address Severity Filter 2 Select the radio buttons in the Admin Status field to determine whether to send log messages to the remote sys
228. ify the following members port 4 U port 5 T and port 6 U 3 Inthe Port PVID Configuration screen see Port VLAN ID Configuration on page 87 specify the PVID for ports g1 and g4 so that packets entering these ports are tagged with the port VLAN ID Portgt PVID 10 Port g4 PVID 20 4 With the VLAN configuration that you set up the following situations produce results as described If an untagged packet enters port 1 the switch tags it with VLAN ID 10 The packet has access to port 2 and port 3 The outgoing packet is stripped of its tag to leave port 2 as an untagged packet For port 3 the outgoing packet leaves as a tagged packet with VLAN ID 10 If atagged packet with VLAN ID 10 enters port 3 the packet has access to port 1 and port 2 If the packet leaves port 1 or port 2 it is stripped of its tag to leave the switch as an untagged packet f an untagged packet enters port 4 the switch tags it with VLAN ID 20 The packet has access to port 5 and port 6 The outgoing packet is stripped of its tag to become an untagged packet as it leaves port 6 For port 5 the outgoing packet leaves as a tagged packet with VLAN ID 20 Access Control Lists ACLs ACLs ensure that only authorized users have access to specific resources while blocking off any unwarranted attempts to reach network resources ACLs are used to provide traffic flow control restrict contents of routing updates decide which types of traffic are for
229. ighbor is a router If the neighbor is a router the value is True If the neighbor is not a router the value is False 32 XS712T Smart Switch Table 5 IPv6 neighbor table fields Continued Field Description Neighbor State The state of the neighbor cache entry The following are the states for dynamic entries in the IPv6 neighbor discovery cache e Reach The neighbor is reachable through the network interface Stale The neighbor is not known to be reachable and the switch will begin the process to reach the neighbor Delay The neighbor is not known to be reachable and upper layer protocols are attempting to provide reachability information Probe The neighbor is not known to be reachable and the device is attempting to probe for this neighbor Unknown The reachability status cannot be determined Last Updated The amount of time that has passed since the neighbor entry was last updated Time The switch supports the Simple Network Time Protocol SNTP You can also set the system time manually SNTP assures accurate network device clock time synchronization up to the millisecond Time synchronization is performed by a network SNTP server The switch software operates only as an SNTP client and cannot provide time services to other systems Time sources are established by stratums Stratums define the accuracy of the reference clock The higher the stratum where zero is the high
230. ile name with a space is not accepted Select the Start File Transfer check box to initiate the file upload Note The file transfer will not begin until you click Apply 264 XS712T Smart Switch 9 Click Apply to begin the file transfer The last row of the table displays information about the progress of the file transfer The screen refreshes automatically until the file transfer completes or fails To activate a software image that you download to the switch see File Management on page 266 HTTP File Download Use the HTTP File Download screen to download files of various types to the switch using an HTTP session for example via your Web browser gt To download a file to the switch by using HTTP 1 Select Maintenance gt Download gt HTTP File Download HTTP File Download HTTP File Download File Type Archive Image Name Imagel v Select File Browse NOTE After a File transfer is started please wait till the page refreshes 2 From the File Type menu specify what type of file you want to download to the switch Archive The archive is the system software image which is saved in one of two flash sectors called images image1 and image2 The active image stores the active copy while the other image stores a second copy The device boots and runs from the active image If the active image is corrupted the system automatically boots from the non active image This is a safety feature for faul
231. ime out as the second method the third method will not be tried This parameter will not appear when you first create a new login list 5 Usethe menu in the 3 column to select the authentication method if any that should appear third in the selected authentication login list This parameter will not appear when you first create a new login list 6 Use the menu in the 4 column to select the method if any that should appear fourth in the selected authentication login list This is the method that will be used if all previous methods time out Note that this parameter will not appear when you first create a new login list 7T Click Apply Dot 1x Authentication List The Dot1x authentication list defines the dot1x authentication method used for the default list gt To change the Dot1x authentication method for the defaultList 1 Select Security Management Security Authentication List Dot1x Authentication List Dotix Authentication List Dot1x Authentication List S ENEII I ENT dotixList 2 Select the check box next to the dot1xList name 3 Use the drop down menu in the 1 column to select the method that should appear first in the selected authentication login list The options are e Local The user s locally stored ID and password will be used for authentication e Radius The user s ID and password will be authenticated using the RADIUS server instead of locally None The user will not be a
232. in the following sections Port Configuration Flow Control Port Configuration Use the Port Configuration screen to configure the physical interfaces on the switch gt To configure port settings 1 Select Switching gt Ports gt Port Configuration The Port Configuration screen displays 77 XS712T Smart Switch Port Configuration Port Configuration 1 LAGS All Go To Interface 20 E5 2A 01 AE 92 1 Enable 20 E5 2A 01 AE 92 n Enable 20 E5 2A 01 AE 92 Enable 20 E5 2A 01 AE 92 n Enable 20 E5 2A 01 AE 92 Enable 20 E5 2A 01 AE 92 n Enable 20 E5 2A 01 AE 92 n Enable 20 E5 2A 01 AE 92 n Enable 20 E5 2A 01 AE 92 own Enable 20 E5 2A 01 AE 92 n Enable 20 E5 2A 01 AE 92 Enable 20 E5 2A 01 AE 92 1 LAGS All 99 J Select whether to configure physical interfaces link aggregation groups LAGs or both by clicking one of the following links above the table heading e 1 Only physical interfaces are displayed This is the default setting e LAGS Only link aggregation groups are displayed e All Both physical interfaces and link aggregation groups are displayed Select whether to configure a single interface a group of interfaces or all interfaces for the sake of simplicity in this procedure link aggregation groups are also considered interfaces To configure a single interface select the check box next to the interface that you want to configure You can also type the interface number for example
233. in seconds after which the last querier information is removed in the Querier Expiry Interval field The Querier Expiry Interval must be a value in the range of 60 300 seconds The default value is 125 7T Click Apply IGMP Snooping Querier VLAN Configuration Use this screen to configure IGMP queriers for use with VLANs on the network Tocreate a new VLAN ID for IGMP snooping 1 Select Switching gt Multicast gt IGMP Snooping Querier gt Querier VLAN Configuration Querier VLAN Configuration Querier VLAN Configuration VLAN ID New Entry v VLAN ID Querier Election Participate Mode Disable v Snooping Querier VLAN Address 122 XS712T Smart Switch 2 Select New Entry from the VLAN ID field and complete the following fields e VLAN ID Specifies the VLAN ID for which the IGMP Snooping Querier is to be enabled Querier Election Participate Mode Enable or disable Querier Participate Mode Disable Upon seeing another querier of the same version in the VLAN the snooping querier moves to the non querier state Enable The snooping querier participates in querier election in which the least IP address operates as the querier in that VLAN The other querier moves to non querier state e Snooping Querier VLAN Address Specify the Snooping Querier IP Address to be used as the source address in periodic IGMP queries sent on the specified VLAN 3 Click Apply IGMP Snooping Querier VLAN Status Use thi
234. in the Class Name field 3 Select the class type to associate with the policy 4 Click Add The switch supports only the Class Type value All which means all the various match criteria defined for the class should be satisfied for a packet match All signifies the logical AND of all the match criteria Torename an existing class 1 Select the check box next to the configured class 2 Under Class Name update the name 3 Click Apply 165 XS712T Smart Switch gt To delete a class 1 Select the check box next to the class name 2 Click Delete The same set of fields described for IPv6 ACL classification are also supported as match criteria for DiffServ classes Prior to the introduction of IPv6 class rule fields any layer 3 or layer 4 item was interpreted as a field in an IPv4 packet To properly interpret the match criteria fields and create classifier entries it is necessary for the configuration to specify what type of packet a class defines Policy Configuration Use the Policy Configuration screen to associate a collection of classes with one or more policy statements After creating a Policy click the policy link to the Policy screen gt To create a new DiffServ policy 1 Select QoS gt DiffServ gt Advanced gt Policy Configuration Policy Configuration Policy Configuration E Policy Name Policy Type Member Class 2 Enter a policy name in the Policy Name field 3 Select the existing DiffS
235. ing bits but including FCS octets Packets RX and TX 2048 4095 Octets The total number of packets including bad packets received or transmitted that were between 2048 and 4095 octets in length inclusive excluding framing bits but including FCS octets Packets RX and TX 4096 9216 Octets The total number of packets including bad packets received or transmitted that were between 4096 and 9216 octets in length inclusive excluding framing bits but including FCS octets 240 XS712T Smart Switch Table 39 Detailed interface statistics Continued Field Description Octets Received The total number of octets of data including those in bad packets received on the network excluding framing bits but including FCS octets This object can be used as a reasonable estimate of Ethernet utilization If greater precision is desired the etherStatsPkts and etherStatsOctets objects should be sampled before and after a common interval Packets Received 64 Octets Packets Received 65 127 Octets The total number of packets including bad packets received that were 64 octets in length excluding framing bits but including FCS octets The total number of packets including bad packets received that were between 65 and 127 octets in length inclusive excluding framing bits but including FCS octets Packets Received 128 255 Octets The total number of packets including bad packets receive
236. ing Querier contains links described in the following sections e IGMP Snooping Querier Configuration IGMP Snooping Querier VLAN Configuration IGMP Snooping Querier VLAN Status IGMP Snooping Querier Configuration Use this screen to enable or disable the IGMP Snooping Querier feature specify the IP address of the router to perform the querying and configure the related parameters gt To configure IGMP snooping querier settings 1 Select Switching gt Multicast gt IGMP Snooping Querier gt IGMP Snooping gt Querier Configuration 121 XS712T Smart Switch Querier Configuration Querier Configuration Querier Admin Mode Disable Enable Snooping Querier Address IGMP Version Query Interval secs Querier Expiry Interval secs 2 From the Querier Admin Mode field enable or disable the administrative mode for IGMP Snooping Querier 3 Specify the IP address to be used as source address in periodic IGMP queries om the Snooping Querier Address field This address is used when no address is configured on the VLAN on which the query is being sent 4 Specify the IGMP protocol version used in periodic IGMP queries in the IGMP Version field 5 Specify the time interval in seconds between periodic queries sent by the snooping querier in the Query Interval field The Query Interval must be a value in the range of 1 1800 seconds The default value is 60 6 Specify the time interval
237. ing is not operational on the VLAN when the querier address is not configured or the network management address is not configured Operational Version Displays the IGMP protocol version of the operational querier Last Querier Address Displays the IP address of the last querier from which a query was snooped on the VLAN Last Querier Version Displays the IGMP protocol version of the last querier from which a query was snooped on the VLAN Operational Max Response Displays the maximum response time to be used in the queries that are Time sent by the snooping querier MLD Snooping MLD is a protocol used by IPv6 multicast routers to discover the presence of multicast listeners nodes wishing to receive IPv6 multicast packets on its directly attached links and to discover which multicast packets are of interest to neighboring nodes MLD is derived from IGMP MLD version 1 MLDv1 is equivalent to IGMPv2 and MLD version 2 MLDv2 is equivalent to IGMPv3 MLD is a subprotocol of Internet Control Message Protocol version 6 ICMPv6 and MLD messages are a subset of ICMPv6 messages identified in IPv6 packets by a preceding Next Header value of 58 The switch can snoop on both MLDv1 and MLDv2 protocol packets and bridge IPv6 multicast data based on destination IPv6 Multicast MAC Addresses The switch can be configured to perform MLD Snooping and IGMP Snooping simultaneously 124 XS712T Smart Switch MLD Snoopin
238. inistratively disabled A port that is black does not have a link The port speed LED is either green or yellow e Solid green A valid 10 Gbps link is established e Blinking green Packets transmitting receiving is occurring at 10 Gbps e Solid yellow a valid 100 1000 Mbps link is established Blinking yellow packets transmitting receiving is occurring at 100 1000 Mbps The System LEDs are located on the left side of the front panel Power Status LED The Power LED is a bicolor LED that serves as an indicator of power and diagnostic status The following indications are given by the following LED states Asolid green LED indicates that the power is supplied to the switch and operating normally A solid yellow LED indicates that system is in the boot up stage e No lit LED indicates that power is disconnected FAN Status LED FAN status is indicated as follows A solid yellow LED indicates that the fan is faulty e Nolit LED indicates that the fan is operating normally The following image shows the Device View of the XS712T ae GEO Or aane Figure 3 Device view 19 XS712T Smart Switch Click the port you want to view or configure to see a menu that displays statistics and configuration options Select the menu option to access the screen that contains the configuration or monitoring options Device View E Power O Fan Port Configuration T Cable Test Por Detailed Statistics Port Summar
239. iption or delete an image To configure dual image settings 1 Select Maintenance gt File Management gt Dual Image gt Dual Image Configuration Dual Image Configuration Dual Image Configuration Image Name imagel v Current active imagel Image Description Activate Image Delete Image 2 In the Image Name field select one of the images The Current active field displays the name of the active image 3 In the Image Description field type a description 4 To set the selected image as the active image select the Activate Image check box Note After activating an image you must perform a system reset of the switch to run the new code 5 To remove the selected image from permanent storage on the switch select the Delete Image check box You cannot delete the active image 6 Click Apply 267 XS712T Smart Switch Dual Image Status The Dual Image Status screen shows the following Image1 Ver The version of the image1 code file Image Ver The version of the image2 code file Current active The currently active image on this unit Next active The image to be used on the next restart of this unit Image1 Description The description associated with the image1 code file Image2 Description The description associated with the image2 code file Dual Image Status Dual Image Status 6 1 0 3 1 15 8 37 imagel imagel Dual Image Description Imagei Description Image2 Descri
240. is screen to generate or delete certificates To manage certificates 1 Select Security gt Access gt HTTPS gt Certificate Management Certificate Management Certificate Management Certificate Present None Generate Certificates Delete Certificates Certificate Generation Status Certificate Generation Status No certificate generation in progress From the Certificate Present field a Yes or No status displays 2 Under Certificate Present select one of the following e Select None to not display the certificates This is the default selection Select Generate Certificates to generate the Certificate files e Select Delete Certificates to delete the corresponding Certificate files if it is present The Certificate Generation Status field displays whether SSL certificate generation is in progress Certificate Present displays whether there is a certificate present on the device 3 Click Apply to start the certification configuration 185 gt XS712T Smart Switch Certificate Download For the Web server on the switch to accept HTTPS connections from a management station the Web server needs a public key certificate You can generate a certificate externally for example off line and download it to the switch Before you download a file to the switch the following conditions must be true The file to download from the TFTP server is on the server in the appropriate directory The file is in the
241. isable Disable Disable Disabled 0 128 0 80 08 2 I xg9 Disable Disable Disable Disabled 0 128 0 80 09 2 xg10 Disable Disable Disable Disabled 0 128 0 80 0a 2 7 xg11 Disable Disable Disable Disabled 0 128 0 80 0b 2 O xgi2 Disable Disable Disable Disabled 0 128 0 80 0c 2 i LAGS All GoTo Interface Toeg 2 To configure CST settings for a physical port enter the interface and click Go to select that particular interface 3 Select the interfaces for which you want to configure the CST settings e To configure CST settings for a Link Aggregation Group LAG click LAGS e To configure CST settings for both physical ports and LAGs click ALL 102 XS712T Smart Switch Select the check box next to the port or LAG to configure You can select multiple ports and LAGs to apply the same setting to the selected interfaces Select the check box in the heading row to apply the same settings to all interfaces Configure the CST values for the selected port s or LAG s STP Status Enable or disable the Spanning Tree Protocol Administrative Mode associated with the port or port channel Fast Link Specifies if the specified port is an Edge Port with the CST Possible values are Enable or Disable The default is Disable BPDU Forwarding Specifies whether spanning tree BPDUs should be forwarded while spanning tree is disabled on the switch The value is enabled or disabled Port State The Forwarding state of this port This fiel
242. k EtherType Key Queue Interface Every wr S wg WW 3 I 2 From the ACL Name list select the MAC ACL for which to create or update a rule 3 Under Rule ID specify ID for the rule 4 Configure the ACL rule criteria by selecting options or specifying values as follows Action Specify what action should be taken if a packet matches the rule s criteria Permit Forwards packets that meet the ACL criteria Deny Drops packets that meet the ACL criteria Assign Queue Specifies the hardware egress queue identifier used to handle all packets matching this ACL rule Enter an identifying number from 0 7 in this field Redirect Interface Specifies the specific egress interface where the matching traffic stream is forced bypassing any forwarding decision normally performed by the device Match Every Requires a packet to match the criteria of this ACL Select True or False from the drop down menu Match Every is exclusive to the other filtering rules so if Match Every is True the other rules on the screen are not available CoS Requires a packet s class of service CoS to match the CoS value listed here Enter a CoS value between 0 7 to apply this criteria 216 gt gt 5 XS712T Smart Switch Destination MAC Requires an Ethernet frame s destination port MAC address to match the address listed here Enter a MAC address in this field The valid format is XX XX XX XX XX XX Destination MAC Mask If desi
243. k file extension 261 XS712T Smart Switch 8 Select the Start File Transfer check box to initiate the file upload 9 Click Apply to begin the file transfer Note The file transfer will not begin until you click Apply The last row of the table displays information about the progress of the file transfer The screen refreshes automatically until the file transfer completes or fails HTTP File Upload Use the HTTP File Upload screen to upload files of various types from the switch to the management system by using an HTTP session for example via your Web browser gt To upload a file from the switch to another system by using HTTP 1 Select Maintenance Upload HTTP File Upload HTTP File Upload HTTP File Upload File Type Archive Image Name imagel v 2 From the File Type menu specify what type of file you want to upload from the switch 3 Archive The archive is the system software image which is saved in one of two flash sectors called images image1 and image2 The active image stores the active copy while the other image stores a second copy The device boots and runs from the active image If the active image is corrupted the system automatically boots from the non active image This is a safety feature for faults occurring during the boot upgrade process Text Configuration A text based configuration file enables you to edit a configured text file startup config offline as needed withou
244. l Go To Interface Total Time Packets Packets Packets Broadcast j Transmit ee since A received transmitted Collision Interface received 4 Packets b Packet counters z with without Frames without received Errors last Errors Errors Errors cleared 0 day 3 hr 31 min 38 sec 0 day 3 hr 31 min 38 sec 0 day 3 hr 31 min 38 sec 0 day 3 hr 31 min 38 sec 0 day 3 hr 31 min 38 sec 0 day 3 hr 31 min 38 sec 0 day 3 hr 31 min 38 sec 0 day 3 hr 31 min 38 sec 0 day 3 hr 31 min 38 sec 0 day 3 hr 31 min 38 sec 0 day 3 hr 31 min 38 sec 0 day 3 hr 31 min 38 sec OS Oo Im o I o IE o Im o Imo eu o ID o Im o eo Io GENS o Imm o IX o IE o I o mmo oF o Bm o IE o IS o Io OOo o m o o mmo EN Oo EN o EI o I o Io mo 2 Select whether to display physical interfaces link aggregation groups LAGs or both by clicking one of the following links above the table heading e 1 Only physical interfaces are displayed This is the default setting e All Both physical interfaces and link aggregation groups are displayed To locate an interface quickly type the interface number for example xg12 in the Go To Interface field at the top or bottom of the table and click Go The following table describes the per port statistics displayed on the screen Table 38 Port statistics Field Description Interface Lists the ports on the system Total Packets Received The
245. le Disable 1 LAGS All Go To Interface ogous xg2 xgii m e mw lm l lm S i Whip xgi2 2 To configure PVID settings for a physical port enter the interface and click Go to select that particular interface 3 Select the interfaces for which you want to configure the PVID settings e To configure PVID settings for a Link Aggregation Group LAG click LAGS e To configure PVID settings for both physical ports and LAGs click ALL 4 Select the check box next to the interfaces to configure You can select multiple interfaces to apply the same setting to the selected interfaces Select the check box in the heading row to apply the same settings to all interfaces 5 Configure the PVID to assign to untagged or priority tagged frames received on this port 6 Specify how you want the port to handle untagged and priority tagged frames Whichever you select VLAN tagged frames will be forwarded in accordance with the IEEE 802 1Q VLAN standard The factory default is Admit All e VLAN Only The port will discard any untagged or priority tagged frames it receives Admit All Untagged and priority tagged frames received on the port will be accepted and assigned the value of the Port VLAN ID for this port 7 Specify how you want the port to handle tagged frames 88 XS712T Smart Switch Enable A tagged frame is discarded if this interface is not
246. lect the check box at the left in the table heading From the Trust Mode list select the desired trust mode Disabled The interface is considered to be untrusted and could potentially be used to launch a network attack DHCP server messages are checked against the bindings database On untrusted ports DHCP snooping enforces the following security rules DHCP packets from a DHCP server DHCPOFFER DHCPACK DHCPNAK DHCPRELEASEQUERY are dropped DHCPRELEASE and DHCPDECLINE messages are dropped if the MAC address is in the snooping database but the binding s interface is other than the interface where the message was received e DHCP packets are dropped when the source MAC address does not match the client hardware address if MAC Address Validation is globally enabled Enabled The interface is considered to be trusted and forwards DHCP server messages without validation From the Logging Invalid Packets list select the packet logging mode When enabled the DHCP snooping feature generates a log message when an invalid packet is received and dropped by the interface Next to Rate Limit pps specify the rate limit value for DHCP Snooping purpose If the incoming rate of DHCP packets exceeds the value of this object for consecutively burst interval seconds the port will be shutdown If this value is N A then burst interval has no meaning and rate limiting is disabled Next to Burst Interval secs specify the burst int
247. lient sends a request to a designated server at its unicast address and expects a reply from which it can determine the time and optionally the round trip delay and local clock offset relative to the server Broadcast SNTP operates in the same manner as multicast mode but uses a local broadcast address instead of a multicast address The broadcast address has a single subnet scope while a multicast address has Internet wide scope Optionally configure the following settings to non default values Port The local UDP port to listen for responses broadcasts Unicast Poll Interval The interval in seconds between unicast poll requests expressed as a power of two when configured in unicast mode Broadcast Poll Interval The interval in seconds between broadcast poll requests expressed as a power of two when configured in broadcast mode Broadcasts received prior to the expiry of this interval are discarded Unicast Poll Timeout The timeout value in seconds to wait for an SNTP response when configured in unicast mode Unicast Poll Retry The number of times to retry a request to an SNTP server after the first time out before attempting to use the next configured server when configured in unicast mode 35 XS712T Smart Switch Time Zone Name The acronym that represents the time zone This field is not validated against an official list of time zone acronyms e Hours Offset The number of hours the system clock is offset fro
248. log hosts configured on the switch Enable Messages will be sent to all configured hosts syslog collectors or relays using the values configured for each host Disable Stops logging to all syslog hosts Disable means no messages will be sent to any collector relay 3 In the Local UDP Port field specify the port on the switch from which syslog messages are sent 4 Click Apply to save the settings The Server Log Configuration area displays the following information The Messages Received field shows the number of messages received by the log process This includes messages that are dropped or ignored The Messages Relayed field shows the number of messages forwarded by the syslog function to a syslog host Messages forwarded to multiple hosts are counted once for each host The Messages Ignored field shows the number of messages that were ignored 252 XS712T Smart Switch gt To add a remote syslog host log server 1 Specify the following settings in the following list e IP Address Type Specify the IP Address Type of Host It can be one of the following IPv4 IPv6 DNS Host Address Specify the hostname of the host configured for syslog e Port Specify the port on the host to which syslog messages are sent The default port is 514 e Severity Filter Use the menu to select the severity of the logs to send to the logging host Logs with the selected severity level and all logs of greater severity are
249. m UTC which is also known as Greenwich Mean Time GMT Minutes Offset The number of minutes the system clock is offset from UTC 5 Click Apply 6 Use the SNTP Server Configuration screen to configure the SNTP server settings as described in SNTP Server Configuration on page 37 The SNTP Global Status table on the Time Configuration screen displays information about the system s SNTP client The following table describes the SNTP Global Status fields Table 6 Time Configuration status fields Field Description Version Specifies the SNTP Version the client supports Supported Mode Specifies the SNTP modes the client supports Multiple modes can be supported by a client Last Update Time Specifies the local date and time UTC the SNTP client last updated the system clock Last Attempt Time Specifies the local date and time UTC of the last SNTP request or receipt of an unsolicited message Last Attempt Status Server IP Address Specifies the status of the last SNTP request or unsolicited message for both unicast and broadcast modes If no message has been received from a server a status of Other is displayed These values are appropriate for all operational modes Other None of the following enumeration values Success The SNTP operation was successful and the system time was updated Request Timed Out A directed SNTP request timed out without receiving a response f
250. m time in seconds allowed between router advertisements sent from the interface The value must be in the range of 4 to 1800 Default value is 600 6 Enter the minimum time in seconds allowed between router advertisements sent from the interface The value must be in the range of 3 to 1800 Default value is 450 7T Enter the value in seconds to be used as the lifetime field in router advertisements sent from the interface This is the maximum length of time that the advertised addresses are to be considered as valid router addresses by hosts The value must be in the range of 4 to 9000 Default value is 1800 145 XS712T Smart Switch 8 Specify the preference level of the router as a default router relative to other routers on the same subnet Higher numbered addresses are preferred You must enter an integer The value must be in the range of 2147483648 to 2147483647 Default value is 0 9 Click Apply Configure and View Routes From the Route Configuration screen you can configure static and default routes and view the routes that the switch has already learned gt To configure a static route 1 Select Routing gt Route Configuration Route Configuration Configure Routes Rout Net k Next H IP ce hd Subnet Mask En Preference Description Type Address Address Route Status o Next II Subnet Mask Protocol EES LEE Hop IP Preference Metric Address Type Interface Address 2 Select whet
251. mapping information Field Description Host Lists the host name you assign to the specified IP address Total Amount of time since the dynamic entry was first added to the table Elapsed Amount of time since the dynamic entry was last updated Type The type of the dynamic entry Addresses Lists the IP address associated with the host name Click Clear to delete Dynamic Host Entries The table will be repopulated with entries as they are learned 45 XS712T Smart Switch Green Ethernet The Green Ethernet feature can help reduce the amount of power the switch uses The switch supports Energy Efficient Ethernet EEE gt To configure the administrative mode of Energy Efficient Ethernet 1 Select System gt Management gt Green Ethernet gt Green Ethernet Configuration The Green Ethernet Configuration screen displays Green Ethernet Configuration Green Ethernet Configuration EEE Mode Disable Enable 2 Enable or disable the EEE mode Enable When the send and receive sides of a link are lightly loaded the port can transition to low power mode to save power e Disable Provide full power to the PHY regardless of the link load 3 Click Apply Green Ethernet Interface Configuration Use this screen to configure per port Green Ethernet settings gt To configure the Green Ethernet Interface settings 1 Select System gt Management gt Green Ethernet gt Green Ethernet Int
252. mation can be changed using any of the following e SNMP based management e Web based management gt To configure the network information for an IPv6 network 1 Select System Management IPv6 Network Configuration A screen similar to the following displays IPv6 Network Interface Configuration Global Configuration Admin Mode Q Disable Enable IPv6 Address Auto Configuration Mode 9 Disable Enable Current Network Configuration Protocol None DHCPv6 IPv6 Gateway IPv6 Network Interface Configuration __ 1Pv6 Prefix Prefix Length T NN L fe80 205 2ff fe04 607 64 True 2 Next to the Admin Mode field ensure the Enable radio button is selected 3 Determine how the switch acquires an IPv6 address e Pv6 Address Auto Configuration Mode When enabled the network interface can acquire an IPv6 address through IPv6 Neighbor Discovery Protocol NDP and through the use of Router Advertisement messages When disabled the network interface will not use the native IPv6 address auto configuration features to acquire an IPv6 address Auto configuration can be enabled only when DHCPv6 is not enabled on any of the management interfaces DHCPv6 Next to the Current Network Configuration Protocol field select DHCPv6 to enable the DHCPv 6 client on the interface The switch attempts to acquire network 31 XS712T Smart Switch information from a DHCPV6 server Selecting None disables the DHCPv6 client
253. me alpha v IPv6 ACL Rule Table S S D T Assign Mirror Redirect Match Source satis mies Destination 5 E ncm ie Queue ID Interface Interface Eve JE aes Prefix det io Prefix doi TY Length Port Le No rules have been configured for this ACL 2 Inthe ACL Name list select the name of the ACL to add a rule to 3 Click Add The screen displays the IPv6 ACL Rule Configuration fields Rule ID o IPv6 ACL Rule Configuration IPv6 ACL Rule Configuration ACL Name alpha Action Permit Egress Queue Deny Logging Disable Enable Match Every Disable Enable Protocol Type Other v r Source Prefix PrefixLength SourceL4Port Other v Destination Prefix i ij PrefixLength Destination L4 Port Other v I Flow Label _ 0 to 1048575 IP DSCP Service Iw 4 Next to Rule ID specify a number from 1 10 to identify the IPv6 ACL rule You can create up to 10 rules for each ACL 5 Select or specify values for one or more of the following match criteria Rule ID Enter a whole number in the range of 1 to 10 that will be used to identify the rule An IPv6 ACL can have up to 10 rules Action Specify what action should be taken if a packet matches the rule s criteria The choices are Permit or Deny Logging When set to Enable logging is enabled for this ACL rule subject to resource availability in the device If the Access List Trap Flag i
254. member ports which belong to the group 6 Click Add 90 XS712T Smart Switch To modify protocol based VLAN information 1 Select the check box next to the protocol based VLAN to update 2 Specify the desired value in the available fields 3 Click Apply Todelete a protocol based VLAN group 1 Select the check box next to each protocol based VLAN to remove 2 Click Delete Protocol Based VLAN Group Membership The protocol based VLAN group membership screen is used to define a protocol based VLAN group gt To set up protocol based VLAN group membership 1 Select Switching gt VLAN gt Advanced gt Protocol Based VLAN Group Membership Protocol Based VLAN Group Membership Protocol Based VLAN Group Membership Group ID Group Name CURRENT MEMBERS 2 Select the protocol based VLAN Group ID for which you want to display or configure data in the Group ID drop down menu 3 Click the orange bar to display the port list Use this port list to add the ports you selected to this Protocol Based VLAN Group Note that a given interface can only belong to one group for a given protocol If you have already added a port to a group for IP you cannot add it to another group that also includes IP although you could add it to a new group for IPX The Group Name field identifies the name for the protocol based VLAN you selected It can be up to 16 alphanumeric characters long including blanks 4 Click Apply 5
255. mitted for this port Acknowledge would have the topology change acknowledgement flag set It is either True or False Edge Port Indicates whether the port is enabled as an edge port Possible values are Enabled or Disabled Point to point MAC Derived value of the point to point status CST Regional Root Displays the bridge priority and base MAC address of the CST Regional Root CST Path Cost Displays the path Cost to the CST tree Regional Root Port Forwarding State Displays the Forwarding State of this port Click Refresh to update the information on the screen with the most current data Rapid STP Use the Rapid STP screen to view information about Rapid Spanning Tree RSTP port status gt To display the RSTP port status for a specific port 1 Select Switching gt STP gt Advanced gt RSTP Rapid STP Rapid STP 1 LAGS All n OEC Fasttink StS x xg3 xg4 xg5 xg6 xg7 xg8 xg9 xgiO xgii xgi2 1 LAGS All Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled MSTP Disabled Disabled MSTP Disabled Manual forwarding MSTP Disabled Disabled MSTP Disabled Disabled MSTP Disabled Disabled MSTP Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled 105 XS712T Smart Switch The following table describes the Rapid STP St
256. mon STP Multiple STP and Rapid STP Classic STP provides a single path between end stations avoiding and eliminating loops For information about configuring Common STP see CST Port Configuration on page 102 Multiple Spanning Tree Protocol MSTP supports multiple instances of Spanning Tree to efficiently channel VLAN traffic over different interfaces Each instance of the spanning tree behaves in the manner specified in IEEE 802 1w Rapid Spanning Tree RSTP with slight modifications in the working but not the end effect chief among the effects is the rapid transitioning of the port to Forwarding The difference between the RSTP and the traditional STP IEEE 802 1D is the ability to configure and recognize full duplex connectivity and ports which are connected to end stations resulting in rapid transitioning of the port to Forwarding state and the suppression of topology change notification These features are represented by the parameters pointtopoint and edgeport MSTP is compatible to both RSTP and STP A MSTP bridge can be configured to behave entirely as a RSTP bridge or a STP bridge Note For two bridges to be in the same region the force version should be 802 1s and their configuration name digest key and revision level should match For additional information about regions and their effect on network topology refer to the IEEE 802 1Q standard The Spanning Tree menu contains links described in the following sections e STP
257. n IGMP Snooping Status Disable Enable Validate IGMP IP header Disable Enable IGMP Statistics Multicast Control Frame Count Interfaces Enabled for IGMP Snooping VLAN IDs Enabled for IGMP Snooping VLAN IDs Enabled for IGMP Snooping Querier 2 Enable or disable IGMP Snooping on the switch e Enable The switch snoops all IGMP packets it receives to determine which segments should receive packets directed to the group address Disable The switch does not snoop IGMP packets 3 Select whether to validate the IGMP IP header Enable The switch checks the IP header of all IGMP messages for the Router Alert option If the option is not present the packet is dropped Disable The IGMP IP header is not checked for Router Alert option 4 Click Apply 115 XS712T Smart Switch The following table displays information about the global IGMP snooping status and statistics on the screen Field Description Multicast Control Frame Displays the number of multicast control frames that have been Count processed by the CPU Interfaces Enabled for IGMP Lists the interfaces currently enabled for IGMP Snooping To Snooping enable interfaces for IGMP snooping see GMP Snooping Interface Configuration on page 116 VLAN Ids Enabled For IGMP Displays VLAN IDs enabled for IGMP snooping To enable VLANs Snooping for IGMP snooping see IGMP Snooping VLAN Configuration on page 118 VLAN Ids Enabled For IGMP
258. n interface Each port in the switch can be configured to trust one of the packet fields 802 1p or IP DSCP or to not trust any packets priority designation untrusted mode If the port is set to a trusted mode it uses a mapping table appropriate for the trusted field being used This mapping table indicates the CoS queue to which the packet should be forwarded on the appropriate egress port s Of course the trusted field must exist in the packet for the mapping table to be of any use so there are default actions performed when this is not the case These actions involve directing the packet to a specific CoS level configured for the ingress port as a whole based on the existing port default priority as mapped to a traffic class by the current 802 1p mapping table Alternatively when a port is configured as untrusted it does not trust any incoming packet priority designation and uses the port default priority value instead All packets arriving at the ingress of an untrusted port are directed to a specific CoS queue on the appropriate egress port s in accordance with the configured default priority of the ingress port This process is also used for cases where a trusted port mapping is unable to be honored such as when a non IP packet arrives at a port configured to trust the IP DSCP value Toconfigure global CoS settings 1 Select QoS gt Basic gt CoS Configuration CoS Configuration CoS Configuration Global Global Trust Mod
259. n see Appendix A Smart Control Center Utilities Connect the Switch to the Network To enable remote management of the switch through a web browser or SNMP you must connect the switch to the network and configure it with network information an IP address subnet mask and default gateway The switch has a default IP address of 192 168 0 239 and a default subnet mask of 255 255 255 0 To change the default network information on the switch use one of the following three methods e Dynamic assignment through DHCP DHCP is enabled by default on the switch If you connect the switch to a network with a DHCP server the switch obtains its network information automatically You can use the Smart Control Center to discover the automatically assigned network information For more information see Discover a Switch in a Network with a DHCP Server on page 9 Static assignment through the Smart Control Center If you connect the switch to a network that does not have a DHCP server you can use the Smart Control Center to assign a static IP address subnet mask and default gateway For more information see Discover a Switch in a Network without a DHCP Server on page 10 Static assignment by connecting from a local host If you do not want to use the Smart Control Center to assign a static address you can connect to the switch from a XS712T Smart Switch host administrative system in the 192 168 0 0 24 network and change the settings by
260. n configure MAC Filters Storm Control Port Security and Protected Port settings The Traffic Control folder contains links described in the following sections e MAC Filter e MAC Filter Configuration e MAC Filter Summary Storm Control e Port Security e Port Security Configuration Port Security Interface Configuration e Security MAC Address Protected Ports Membership Private VLAN Configuration MAC Filter Configuration Use the MAC Filter Configuration screen to create MAC filters that limit the traffic allowed into and out of specified ports on the system gt To configure MAC filter settings 1 Select Security gt Traffic Control gt MAC Filter gt MAC Filter Configuration 197 gt 7 XS712T Smart Switch MAC Filter Configuration MAC Filter Config MAC Filter Create Filter v MAC Address Source Port Members Destination Port Members Select Create Filter from the MAC Filter menu If no filters have been configured this is the only option available From the VLAN ID menu select the VLAN to use with the MAC address to fully identify packets you want filtered You can change this field only when the Create Filter option is selected from the MAC Filter menu In the MAC Address field specify the MAC address of the filter in the format 00 01 1A B2 53 4D You can change this field when you have selected the Create Filter option You cannot define filters for the following MAC addresses
261. n the network gt To configure the RADIUS accounting server 1 Select Security gt Management Security gt RADIUS gt Accounting Server Configuration Accounting Server Configuration Accounting Server Configuration Accounting Server Address Port 1813 Secret Configured No v Secret Accounting Mode Accounting Server Statistics Accounting Server Address Round Trip Time secs Accounting Requests Accounting Retransmissions Accounting Responses Malformed Accounting Responses Bad Authenticators Pending Requests Timeouts Unknown Types Packets Dropped 2 Inthe Accounting Server Address field specify the IP address of the RADIUS accounting server to add 3 Inthe Port field specify the UDP port number the server uses to verify the RADIUS accounting server authentication The valid range is 0 65535 Default is 1813 4 From the Secret Configured menu select Yes to add a RADIUS secret in the next field You must select Yes before you can configure the RADIUS secret After you add the RADIUS accounting server this field indicates whether the shared secret for this server has been configured 5 n the Secret field type the shared secret to use with the specified accounting server 6 From the Accounting Mode menu enable or disable the RADIUS accounting mode 7 Click Apply 176 The following table describes RADIUS accounting server statistics available on the screen XS712T Smart Switch Table
262. nated Bridge Bridge Identifier of the bridge with the Designated Port It is made up using the bridge priority and the base MAC address of the bridge Designated Port Port Identifier on the Designated Bridge that offers the lowest cost to the LAN It is made up from the port priority and the interface number of the port 8 Click Refresh to update the screen with the latest MST information STP Statistics Use the STP Statistics screen to view information about the number and type of bridge protocol data units BPDUs transmitted and received on each port gt To display the STP Statistics for a specific port 1 Select Switching STP Advanced STP Statistics 109 XS712T Smart Switch STP Statistics STP Statistics 1 LAGS All Received Transmitted Received Transmitted Received Transmitted xgi 0 0 0 0 0 xg2 xg3 xg4 xg5 xg6 xg7 xg8 xg9 xg10 xgli xgi12 1 LAGS All 0 0 0 0 0 0 0 0 0 0 0 0 EE o EO Lo EO LO NH ae OC NO LEO LO LM Oo M nO EO LO LO LO x EN o E o Lo Lo LE Oo NH EMO NN O E Oo Lo LO m The following table describes the information available on the STP Statistics screen Field Description Interface Select a physical or port channel interface to view its statistics STP BPDUs Received Number of STP BPDUs received at the selected port STP BPDUs Transmitted Number of STP BPDUs transmitted from the selected port RSTP BPDUs Received Number of
263. nding Configuration screen displays the following information e Interface Displays selected interface Direction Displays selected packet filtering direction for ACL e ACL Type Displays the type of ACL assigned to selected interface and direction e ACL ID Displays the ACL Number or Name identifying the ACL assigned to selected interface and direction Sequence Number Displays the Sequence Number signifying the order of specified ACL relative to other ACLs assigned to selected interface and direction MAC Binding Table Use the MAC Binding Table screen to view or delete the MAC ACL bindings To delete a MAC ACL to interface binding 1 Select Security ACL Basic Binding Table MAC Binding Table MAC Binding Table ACL Sequence Interf Directi ACL T 2 Select the check box next to the interface associated with the MAC ACL 3 Click Delete The following table describes the information displayed in the MAC Binding Table Table 35 MAC binding table information Field Description Interface Displays the interface to which the MAC ACL is bound Direction Specifies the packet filtering direction for ACL The only valid direction is Inbound which means the MAC ACL rules are applied to traffic entering the port ACL Type Displays the type of ACL assigned to selected interface and direction ACL ID Displays the ACL Name identifying the ACL assigned to selected interface and direction Sequence No
264. nfiguration DHCP Snooping Global Configuration DHCP Snooping Mode Disable Enable MAC Address Validation Disable Enable VLAN Configuration E VLAN ID DHCP E Mode 2 Next to DHCP Snooping Mode field enable the DHCP Snooping feature 3 Optionally next to MAC Address Validation enable the verification of the sender MAC address for DHCP snooping When enabled the device checks packets that are received on untrusted interface to verify that the MAC address and the DHCP client hardware address match If the addresses do not match the device drops the packet 4 Click Apply gt To enable DHCP snooping for all interfaces that are members of a VLAN 1 Under VLAN ID specify the VLAN on which DHCP snooping is enabled 2 From the DHCP Snooping Mode list select Enable 3 Click Apply 70 XS712T Smart Switch Interface Configuration Use the DHCP Snooping Interface Configuration screen to view and configure each port as a trusted or untrusted port Any DHCP responses received on a trusted port are forwarded If a port is configured as untrusted any DHCP or BootP responses received on that port are discarded gt To configure DHCP snooping interface settings 1 Select System Services DHCP Snooping Interface Configuration The DHCP Snooping Interface Configuration screen displays DHCP Snooping Interface Configuration DHCP Snooping Interface Configuration 2 1 LAGS All Go To Interface
265. ng information see MAC Binding Table on page 219 The ACL named Sales ACL looks for Ethernet frames with destination and source MAC addresses and MAC masks defined in the rule Also the frame must be tagged with VLAN ID 2 which is the Sales department VLAN The CoS value of the frame must be 0 which is the default value for Ethernet frames Frames that match this criteria are permitted on interfaces 6 7 and 8 and are assigned to the hardware egress queue 0 which is the default queue All other traffic is explicitly denied on these interfaces To allow additional traffic to enter these ports you must add a new permit rule with the desired match criteria and bind the rule to interfaces 6 7 and 8 Sample Standard IP ACL Configuration The following example shows how to create an IP based ACL that prevents any IP traffic from the Finance department from being allowed on the ports that are associated with other departments Traffic from the Finance department is identified by each packet s network IP address 1 From the IP ACL screen create a new IP ACL with an IP ACL ID of 1 see P ACL on page 220 2 From the IP Rules screen create a rule for IP ACL 1 with the following settings e Rule ID 1 e Action Deny e Assign Queue ID 0 optional 0 is the default value Match Every False e Source IP Address 192 168 187 0 e Source IP Mask 255 255 255 0 For additional information about IP ACL rules see P Rules on page 221 3 Click
266. ng the order of specified ACL relative to other ACLs assigned to selected interface and direction 231 gt XS712T Smart Switch VLAN Binding Table Use the VLAN binding table screen to associate an ACL with a VLAN To configure an ACL to VLAN binding 1 i Select Security gt ACL gt Advanced gt Vlan Binding Table ACL Vlan Binding VLAN Binding Configuration tu VLAN ID Sequence Number ACL G ACL ID In the VLAN ID field specify a VLAN ID for ACL mapping In the Direction field specify the direction of packet traffic affected by the ACL which can be Inbound or blank Optional In the Sequence Number field specify the sequence number of the access lists This sequence number indicates the order of this access list relative to other access lists already assigned to this VLAN and direction A lower number indicates higher precedence order If a sequence number is already in use for this VLAN and direction the specified access list replaces the currently attached access list using that sequence number If the sequence number is not specified by the user i e the value is 0 a sequence number that is one greater than the highest sequence number currently in use for this VLAN and direction will be used Valid range is 1 to 4294967295 From the ACL Type list select the type of ACL e PACL e MAC ACL e Pv6 ACL From the ACL ID list select the ID of the ACL to bind to the specified VLAN The
267. ning message is logged to the buffered log and is sent to the Syslog server At the same time the port is shut down and can be enabled only manually by the admin user 3 Click Apply Configure Denial of Service The Denial of Service Configuration screen lets you to select which types of DoS attacks for the switch to monitor and block gt To configure individual DoS settings 1 Select System gt Management gt Denial of Service gt Denial of Service Configuration The Denial of Service Configuration screen displays Denial of Service Configuration Denial of Service Configuration Denial of Service Min TCP Header Size Denial of Service ICMPv4 9 Disable Enable Denial of Service Max ICMPv4 Packet Size j Denial of Service ICMPv6 Disable Enable Denial of Service Max ICMPv6 Packet Size Denial of Service First Fragment Disable Enable Denial of Service ICMP Fragment Disable Enable Denial of Service SIP DIP Disable Enable Denial of Service SMAC DMAC Disable Enable Denial of Service TCP FIN amp URG amp PSH Disable Enable Denial of Service TCP Flag amp Sequence Disable Enable Denial of Service TCP Fragment Disable Enable Denial of Service TCP Offset Disable Enable Disable Enable Disable Enable Disable Enable Disable Enable Denial of Service TCP Port Denial of Service TCP SYN Denial of Service TCP SYN amp FIN Denial of Service UDP Port 2 Select the types of DoS attacks for the switch to monitor and
268. nnova Network Maintenance Tasks Adapter Help Current Network Adapter 10 27 65 151 Device List Product MAC Address IP Address DHCP Subnet Mask Gateway Firmw GS110TP 74 44 01 72 ea 11 10 27 65 108 Enabled 255 255 254 0 10 27 64 1 5 0 2 22 Er r MC MAC 00 70 71 72 73 78 Discover A web browser launches and opens to the switch Login screen 15 XS712T Smart Switch gt To access the management interface form the Smart Control Center 1 Open a web browser 2 Enter the IP address of the switch in the address field of the browser Understand the User Interfaces The XS712T Smart Switch software includes a set of comprehensive management functions for configuring and monitoring the system by using one of the following methods e Web user interface e Simple Network Management Protocol SNMP Each of the standards based management methods allows you to configure and monitor the components of the XS712T Smart Switch software The method you use to manage the system depends on your network size and requirements and on your preference This manual describes how to use the web based interface to manage and monitor the system Use the Web Interface To access the switch by using a web browser the browser must meet the following software requirements e HTML version 4 0 or later HTTP version 1 1 or later e Java Runtime Environment 1 6 or later gt To log on to the Web interface 1 Open a web browser an
269. no route could be found to transmit them to their destination Note that this counter includes any packets counted in ipForwDatagrams which meet this no route criterion Note that this includes any datagrams which a host cannot route because all of its default gateways are down IpReasmTimeout The maximum number of seconds which received fragments are held while they are awaiting reassembly at this entity IpReasmReqds The number of IP fragments received which needed to be reassembled at this entity IpReasmOKs The number of IP datagrams successfully re assembled IpReasmFails The number of failures detected by the IP re assembly algorithm for whatever reason timed out errors etc Note that this is not necessarily a count of discarded IP fragments since some algorithms can lose track of the number of fragments by combining them as they are received IpFragOKs The number of IP datagrams that have been successfully fragmented at this entity 140 XS712T Smart Switch Table 18 IP routing statistics Continued Field Description IpFragFails The number of IP datagrams that have been discarded because they needed to be fragmented at this entity but could not be e g because their Don t Fragment flag was set IpFragCreates The number of IP datagram fragments that have been generated as a result of fragmentation at this entity IpRoutingDiscards The number of routing en
270. nticator state machine on the specified port to determine when to send an EAPOL EAP Request Identify frame to the supplicant The transmit period must be a number in the range of 1 65535 The default value is 30 193 XS712T Smart Switch Max EAP Requests This input field allows you to enter the maximum requests for the selected port The maximum requests value is the maximum number of times the authenticator state machine on this port will retransmit an EAPOL EAP Request Identity before timing out the supplicant The maximum requests value must be in the range of 1 10 The default value is 2 Supplicant Timeout This input field allows the user to enter the supplicant timeout for the selected port The supplicant timeout is the value in seconds of the timer used by the authenticator state machine on this port to timeout the supplicant The supplicant timeout must be a value in the range of 1 and 65535 The default value is 30 Server Timeout Defines the amount of time that lapses before the switch resends a request to the authentication server The field value is in seconds The range is 1 65535 and the field default is 30 seconds 4 Click Apply to send the updated screen to the switch and cause the changes to occur on the switch and the changes will be saved 5 Click Initialize to begin the initialization sequence on the selected port s This button is only selectable if the control mode is auto If the button is not selecta
271. ntry to remove 2 Click Delete 136 Contiguring Routing The XS712T Smart Switch supports IP routing Use the menus under the Routing tab to manage routing on the system When a packet enters the switch the destination MAC address is checked to see if it matches any of the configured routing interfaces If it does then the switch searches the host table for a matching destination IP address If an entry is found then the packet is routed to the host If there is no matching entry then the switch performs a longest prefix match on the destination IP address If an entry is found then the packet is routed to the next hop If there is no match then the packet is routed to the next hop specified in the default route If there is no default route configured then the packet is passed to the software to be handled appropriately The routing table can have entries added either statically by the administrator or dynamically via a routing protocol The host table can have entries added either statically by the administrator or dynamically via ARP This chapter contains the following sections e Configure IP Settings e Configure VLAN Routing e Configure Router Discovery e Configure and View Routes e Configure ARP Configure IP Settings To configure and display IP routing data see the following sections IP Configuration e VLAN Routing Wizard P Statistics 137 IP Configuration XS712T Smart Switch Use the IP
272. o all nodes connected to the network This approach works well for broadcast packets that are intended to be seen or processed by all connected nodes In the case of multicast packets however this approach could lead to less efficient use of network bandwidth particularly when the packet is intended for only a small number of nodes Packets will be flooded into network segments where no node has any interest in receiving the packet While nodes will rarely incur any processing overhead to filter packets addressed to unrequested group addresses they are unable to transmit new packets onto the shared media for the period of time that the multicast packet is flooded The 114 XS712T Smart Switch problem of wasting bandwidth is even worse when the LAN segment is not shared for example in full duplex links Allowing switches to snoop IGMP packets is a creative effort to solve this problem The switch uses the information in the IGMP packets as they are being forwarded throughout the network to determine which segments should receive packets directed to the group address IGMP Snooping Configuration Use the IGMP Snooping Configuration screen to configure the parameters for IGMP snooping These parameters are used to build forwarding lists for multicast traffic gt To configure IGMP snooping 1 Select Switching gt Multicast gt IGMP Snooping gt IGMP Snooping Configuration IGMP Snooping Configuration IGMP Snooping Configuratio
273. oS prevention causes the switch to drop ICMP Fragmented packets Denial of Service SIPZDIP Enabling SIP DIP DoS prevention causes the switch to drop packets that have a source IP address equal to the destination IP address Denial of Service SMAC DMAC Enabling SMAC DMAC DoS prevention causes the switch to drop packets that have a source MAC address equal to the destination MAC address Denial of Service TCP FIN amp URG amp PSH Enabling TCP FIN amp URG amp PSH DoS prevention causes the switch to drop packets that have TCP Flags FIN URG and PSH set and TCP Sequence Number equal to 0 Denial of Service TCP Flag amp Sequence Enabling TCP Flag DoS prevention causes the switch to drop packets that have TCP control flags set to 0 and TCP sequence number set to 0 Denial of Service TCP Fragment Enabling TCP Fragment DoS prevention causes the switch to drop packets that have a TCP payload where the IP payload length minus the IP header size is less than the minimum allowed TCP header size Denial of Service TCP Offset Enabling TCP Offset DoS prevention causes the switch to drop packets that have a TCP header Offset set to 1 Denial of Service TCP Port Enabling TCP Port DoS prevention causes the switch to drop packets that have TCP source port equal to TCP destination port Denial of Service TCP SYN Enabling TCP SYN DoS prevention causes the switch to drop packets that have TCP Flags SYN set Denial of Service TCP SYN amp FIN Enabling
274. ociated with the port or port channel Possible values are Enable or Disable 108 XS712T Smart Switch Field Description Port Forwarding State Indicates the current STP state of a port If enabled the port state determines what forwarding action is taken on traffic Possible port states are Disabled STP is currently disabled on the port The port forwards traffic while learning MAC addresses Blocking The port is currently blocked and cannot be used to forward traffic or learn MAC addresses Listening The port is currently in the listening mode The port cannot forward traffic nor can it learn MAC addresses Learning The port is currently in the learning mode The port cannot forward traffic however it can learn new MAC addresses Forwarding The port is currently in the forwarding mode The port can forward traffic and learn new MAC addresses Port Role Each MST Bridge Port that is enabled is assigned a Port Role for each spanning tree The port role will be one of the following values Root Port Designated Port Alternate Port Backup Port Master Port or Disabled Port Designated Root Root Bridge for the selected MST instance It is made up using the bridge priority and the base MAC address of the bridge Designated Cost Displays cost of the port participating in the STP topology Ports with a lower cost are less likely to be blocked if STP detects loops Desig
275. oint DSCP bits 5 Click Apply CoS Interface Configuration Use the CoS Interface Configuration screen to apply an interface shaping rate to all interfaces or to a specific interface gt To configure CoS settings for an interface 1 Select QoS gt CoS gt Advanced gt CoS Interface Configuration CoS Interface Configuration CoS Interface Configuration Q o 1 LAGS All Go To Interface Interface Interface Trust Mode f Interface Shaping Rate 16 to 16384 CE IE xgi 802 1p I 802 1p 802 1p 802 1p 802 1p 802 1p 802 1p 802 1p 802 1p 802 1p 802 1p 802 1p o o IMI Go To Interface 155 6 XS712T Smart Switch To configure CoS settings for a specific interface enter the interface and click Go to select that particular interface Alternatively select the check box associated with each interface for which you want to configure the CoS settings e Toconfigure CoS settings for a Link Aggregation Group LAG click LAGS e To configure CoS settings for both physical ports and LAGs click ALL The same settings will be applied to all selected interfaces From the Interface Trust Mode drop down list select the trust mode for ingress traffic on the selected interfaces Untrusted Do not trust any CoS packet marking at ingress e 802 1p The eight priority tags that are specified in IEEE 802 1p are pO to p7 The QoS setting lets you map each of the eight priority level
276. omatically detect the presence of a multicast router and forward IGMP packets accordingly It is only needed when you want to make sure that the multicast router always receives IGMP packets from the switch in a complex network gt To configure a multicast routing VLAN 1 Select Switching gt Multicast gt IGMP Snooping gt Multicast Router VLAN Configuration 120 XS712T Smart Switch Multicast Router VLAN Configuration Multicast Router VLAN Configuration Interface Multicast Router VLAN Configuration m VLAN ID Multicast Router Select the Interface for which you want Multicast Router to be enabled or to be disabled Enter the VLAN ID for which the Multicast Router Mode is to be Enabled or Disabled Enable the VLAN ID for the multicast router Click Apply m wi IGMP Snooping Querier IGMP snooping requires that one central switch or router periodically query all end devices on the network to announce their multicast memberships This central device is the IGMP querier The IGMP query responses known as IGMP reports keep the switch updated with the current multicast group membership on a port by port basis If the switch does not receive updated membership information in a timely fashion it will stop forwarding multicasts to the port where the end device is located These screens enable you to configure and display information on IGMP snooping queriers on the network and separately on VLANs The IGMP Snoop
277. on below to view the PDF User Guide s You will need Adobe Acrobat Reader to view a Guide 2 Click Apply to access the NETGEAR download center 3 Enter the model number of the switch 4 Locate the XS712T Smart Switch Software Administration Manual on the product support web screen 24 XS712T Smart Switch Registration To qualify for product updates and product warranty NETGEAR encourages you to register your product The first time that you connect to the switch while it is connected to the Internet you have the option to register your product At any time you can register your product from the web management interface or you can visit the NETGEAR website for registration at https my netgear com registration login aspx gt To register the switch with NETGEAR 1 Select Help gt Register The Registration screen displays Product Registration Registration We are delighted to have you as a customer Registration confirms your email alerts will work lowers techinical support resolution time and ensures your shipping address accuracy We d also like to incorporate your feedback into future product development NETGEAR will never sell or rent your email address and you may opt out of communictaions at any time 2 Click Register A pop up window opens and displays the NETGEAR product registration web screen 3 Complete the registration form 4 Click Submit 25 Contigure System Information
278. on of location databases Extended and automated power management of Power over Ethernet endpoints e Inventory management enabling network administrators to track their network devices and determine their characteristics manufacturer software and hardware versions serial asset number 57 XS712T Smart Switch LLDP Configuration Use the LLDP Configuration screen to specify the global LLDP and LLDP MED parameters that are applied to the switch gt To configure global LLDP settings 1 Select System gt LLDP gt Basic gt LLDP Configuration The LLDP Configuration screen displays LLDP Configuration LLDP Properties TLV Advertised Interval Hold Multiplier Reinitializing Delay Transmit Delay LLDP MED Properties Fast Start Duration 2 Optionally configure non default values for the following LLDP properties TLV Advertised Interval The number of seconds between transmissions of LLDP advertisements Hold Multiplier The Transmit Interval multiplier value where Transmit Hold Multiplier x Transmit Interval the time to live TTL value the device advertises to neighbors e Reinitializing Delay The number of seconds to wait before attempting to reinitialize LLDP on a port after the LLDP operating mode on the port changes Transmit Delay The minimum number of seconds to wait between transmissions of remote data change notifications to the SNMP trap receiver s configured on the device 3 Optionally
279. one and only one MSTI The CIST is also an instance of spanning tree with a MSTID of 0 An instance can occur that has no VIDs allocated to it but every VLAN must be allocated to one of the other instances of spanning tree The portion of the active topology of the network that connects any two bridges in the same MST Region traverses only MST bridges and LANs in that region and never Bridges of any kind outside the Region in other words connectivity within the region is independent of external connectivity 298 XS712T Smart Switch Sample MSTP Configuration This example shows how to create an MSTP instance from the XS712T switch The example network has three different XS712T switches that serve different locations in the network In this example ports g1 g5 are connected to host stations so those links are not subject to network loops Ports g6 g8 are connected across switches 1 2 and 3 Ports g1 g5 Ports g1 95 connected to hosts connected to hosts Ports 96 98 connected to switch 2 and 3 Switch 1 root bridge Switch 2 Ports 96 98 onnected to switch 1 and 2 p E gt Switch 3 SS Ports g1 95 connected to hosts Perform the following procedures on each switch to configure MSTP 1 Use the VLAN Configuration screen to create VLANs 300 and 500 see Basic VLAN Configuration on page 85 2 Use the VLAN Membership screen to include ports g1 98 as tagged T or untagged U members of VLAN 300 and VLAN
280. ong all valid community names or the set request will be rejected If you select Disable the community name will become invalid 7 Click Add gt To modify an existing community 1 Select the check box next to the community 2 Update the desired fields 3 Click Apply gt To delete a community 1 Select the check box next to the community to remove 2 Click Delete 54 XS712T Smart Switch Trap Configuration Use this screen to configure settings for each SNMPv1 or SNMPv2 management host that will receive notifications about traps generated by the device The SNMP management host is also known as the SNMP trap receiver Toaddan SNMP trap receiver 1 Select System SNMP SNMP V1 V2 Trap Configuration The Trap Configuration screen displays Trap Configuration Trap Configuration __ Recipients 1P Version Community String Status LI 1 ME dM 2 Next to Recipients IP specify the IP address in x x x x format to receive SNMP traps from this device 3 From the Version list select the trap version to be used by the receiver from the menu SNMP v1 The switch uses SNMP v1 to send traps to the receiver SNMP v2 The switch uses SNMP v2 to send traps to the receiver 4 Next to Community String specify the name of the SNMP community that includes the SNMP management host and the SNMP agent on the device 5 From the Status list select Enable to send traps to the receiver 6
281. orwarding Database MFDB holds the port membership information for all active multicast address entries The key for an entry consists of a VLAN ID and MAC address pair Entries can contain data for more than one protocol gt To search the MFDB table 1 Select Switching gt Multicast gt MFDB gt MFDB Table MFDB Table MFDB Table Search By MAC Address i Go Forwarding MAC Add VLAN ID C E IT ipti rf MAC address vtan staan pasion uoce Interfaces 2 Next to Search By MAC Address specify the MAC Address whose MFDB table entry you want to view Enter six two digit hexadecimal numbers separated by colons for example 00 01 23 43 45 67 3 Click on the Go button If the address exists that entry will be displayed An exact match is required The MFDB Table screen displays the following MAC Address The multicast MAC address for which you requested data VLAN ID The VLAN ID to which the multicast MAC address is related Component This is the component that is responsible for this entry in the Multicast Forwarding Database Possible values are IGMP Snooping GMRP Static Filtering and MLD Snooping 112 XS712T Smart Switch Type This displays the type of the entry Static entries are those that are configured by the end user Dynamic entries are added to the table as a result of a learning process or protocol Description The text description of this multicast table entry Possible values a
282. pecific match criteria for the rule remove the rule and recreate it or reconfigure Match Every to False for the other match criteria to be visible Protocol There are two ways to configure IPv6 protocol Specify an integer ranging from 0 to 255 after selecting protocol keyword other This number represents the IPv6 protocol Select name of a protocol from the existing list of IPv6 ICMPv6 TCP and UDP Source Prefix Prefix Length Specify IPv6 Prefix combined with IPv6 Prefix length of the network or host from which the packet is being sent Prefix length can be in the range 0 to 128 Source L4 Port Specify a packet s source layer 4 port as a match condition for the selected IPv6 ACL rule Source port information is optional Source port information can be specified in two ways Select keyword other from the drop down menu and specify the number of the port in the range from 0 to 65535 Select one of the keyword from the list DOMAIN ECHO FTP FTPDATA HTTP SMTP SNMP TELNET TFTP and WWW Each of these values translates into its equivalent port number which is used as both the start and end of the port range Destination Prefix Prefix Length Enter up to 128 bit prefix combined with prefix length to be compared to a packet s destination IP Address as a match criteria for the selected IPv6 ACL rule Prefix length can be in the range 0 to 128 Destination L4 Port Specify a packet s destination layer 4 port
283. pen a web browser on your computer and connect to the management interface For more information see Access the Management Interface from a Web Browser on page 15 3 Change the network settings on the switch to match those of your network For more information see P Configuration on page 29 After you change the network settings on the switch return the network configuration on your administrative system to the original settings 14 XS712T Smart Switch Access the Management Interface from a Web Browser You must be able to ping the IP address of the switch web management interface from your administrative system for web access to be available If you used the Smart Control Center to set up the IP address and subnet mask either with or without a DHCP server use that IP address in the address field of your web browser If you did not change the IP address of the Switch from the default value enter 192 168 0 239 in the address field To access the switch management interface use one of the following methods From the Smart Control Center select the switch and click Web Browser Access Open a web browser and enter the IP address of the switch in the address field Toaccess the management interface from a web browser 1 Open a web browser The utility discovers all switches in the same Layer 2 domain as the administrative system 2 Select the switch to access 3 Click Web Browser Access NETGEAR Connect with I
284. ption Figure 10 Dual image status 268 Smart Control Center Utilities The NETGEAR Smart Control Center SCC is a Windows based application Its main function is to discover NETGEAR Smart switches in your network and connect them to your network For information about device discovery and network connectivity see Chapter 1 Getting Started In addition to device discovery the Smart Control Center includes network configuration utilities and several maintenance features This chapter describes the following Smart Control Center utilities e Network Utilities e Upload and Download the Configuration Upgrade the Firmware e View and Manage Tasks Network Utilities DHCP Refresh Reboot Device Web Browser Access Configure Device Change Password MAC 00 70 71 72 73 78 The Network tab includes the following network utility buttons DHCP Refresh Forces the switch to release the current bindings and request new address information from the DHCP server Reboot Device Reboots the selected device Web Browser Access Launches a web browser and connects to the management interface for the selected device 269 XS712T Smart Switch Configure Device Allows you to modify network information for the switch including the IP address DHCP client mode system name and location For more information about this feature see Configure the Device on page 271 Change Password Allows you to set a new
285. r Configuration screen 3 In the Priority field specify the order in which the TACACS servers are used A value of 0 is the highest priority The valid range is 0 65535 4 In the Port field specify the authentication port number through which the TACACS session occurs The default is port 49 and the range is 0 65535 5 In the Key String field specify the authentication and encryption key for TACACS communications between the XS712T and the TACACS server This key must match the encryption used on the TACACS server The valid range is 0 128 characters 6 In the Connection Timeout field specify the amount of time that passes before the connection between the device and the TACACS server times out The field range is from 1 to 30 seconds 7 Click Apply 179 XS712T Smart Switch Authentication List Configuration Use the Authentication List screen to configure the default login list A login list specifies one or more authentication methods to validate switch or port access for the admin user Note Admin is the only user on the system and is assigned to a preconfigured list named defaultList which you cannot delete HTTP Authentication List The HTTP authentication list defines the HTTP authentication method used for the default list gt To change the HTTP authentication method for the defaultList 1 Select Security Management Security gt Authentication List gt HTTP Authentication List HT
286. r has the same priority the SNTP client contacts the servers in the order that they appear in the table 6 Under the Version field specify the NTP version running on the server 7 Click Add 8 Repeat the previous steps to add additional SNTP servers You can configure up to three SNTP servers To remove an SNTP server 1 Select the check box next to the configured server to remove 2 Click Delete To change the settings for an existing SNTP server 1 Select the check box next to the configured server 2 Specify new values in the available fields 3 Click Apply The SNTP Server Status table displays status information about the SNTP servers configured on your switch The following table describes the SNTP Global Status fields Table 7 SNTP server status fields Field Description Address Specifies all the existing Server Addresses If no Server configuration exists a message saying No SNTP server exists flashes on the screen Last Update Time Specifies the local date and time UTC that the response from this server was used to update the system clock Last Attempt Time Specifies the local date and time UTC that this SNTP server was last queried 38 XS712T Smart Switch Table 7 SNTP server status fields Continued Field Description Last Attempt Status Specifies the status of the last SNTP request to this server If no packet has been received from this server a status
287. r the switch password in the Current Password field Click Apply Note Click the Tasks tab to view status information about the configuration download The Task Management information shows whether the download was completed successfully or when a delayed download is scheduled 274 XS712T Smart Switch Upgrade the Firmware The application software for the XS712T Smart Switch is upgradeable enabling your switch to take advantage of improvements and additional features as they become available Before you begin download the firmware file from the NETGEAR Support web site for your switch to a TFTP server on your network This procedure uses the TFTP protocol to implement the transfer from computer to switch Note You can also upgrade the firmware using the TFTP Download and HTTP Download features mentioned in this book See HTTP File Upload on page 262 To upgrade your firmware 1 Click the Maintenance tab 2 Click the Firmware link directly below the Maintenance tab Network Maintenance Configuration Device Maintenance Product MAC Address v IP Addres 3 Select the switch to upgrade and click Download Firmware A window opens and allows you to browse to and select the firmware image to download 4 Navigate to and select the firmware image on the TFTP server 5 Click Open Additional fields display on the screen and allow you to choose whether to download the image to the primary or secondary storage and w
288. r this client Click Refresh to refresh the screen with the most current data from the switch SNTP Server Configuration Use the SNTP Server Configuration screen to view and modify information for adding and modifying Simple Network Time Protocol SNTP servers gt To configure a new SNTP server 1 Select System Management Time SNTP Server Configuration The SNTP Server Configuration screen displays SNTP Server Configuration SNTP Server Configuration Server Address Port Priority Version LI 1 to 65535 L to 3 Lm to 4 a O O SNTP Server Status Last Last Last Failed Address Update Attempt Attempt Requests A Requests Time Time Status From the Server Type list select the type of SNTP address to enter in the Address field which is either an IP address IPv4 or hostname DNS Under the Address field specify the IP address or the hostname of the SNTP server If the UDP port on the SNTP server to which SNTP requests are sent is not the standard port 123 specify the port number 37 XS712T Smart Switch 5 Under the Priority field specify the order in which to query the servers The SNTP client on the device continues sending SNTP requests to different servers until a successful response is received or all servers are exhausted The request is sent to an SNTP server with a priority value of 1 first then to a server with a priority value of 2 and so on If more than one serve
289. re Rx dll enabled The status of the EEE capability negotiation on the local system Rx dll ready The receive Data Link Layer ready status This variable indicates that the rx system initialization is complete and is ready to update receive LLDPDU containing EEE TLV This variable is updated by the local system software Time Since Counters Last Cleared The amount of time that has passed since the Green Ethernet information for this port was last cleared Green Ethernet Summary This screen summarizes the Green Ethernet Summary settings currently in use To access this screen select System Management Green Ethernet Green Ethernet Summary A screen similar to the following displays 49 Green Mode Statistics Summary Current Power Consumption mW Percentage Power Saving Cumulative Energy Saving W H XS712T Smart Switch Green Features supported on this unit 1 EEE LPI History LLDP Cap Exchg Pwr Usg Est EEE Admin Mode Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Figure 4 Green Ethernet summary screen The following table describes the information the power saving table displays Table 10 Green Ethernet power saving information Field Description Current Power Consumption The power consumption in mWatts of the all the ports on the switch Estimated Percentage Power Saving
290. re Management Configured Network Configured and Network Assisted Interface The list of interfaces that are designated for forwarding Fwd and filtering Fit for the selected address Forwarding Interfaces The resultant forwarding list is derived from combining all the forwarding interfaces and removing the interfaces that are listed as the static filtering interfaces 4 Click Refresh to refresh the web screen to show the latest MFDB information MFDB Statistics This screen displays the MFDB statistics for the system gt To view the MFDB statistics 1 Select Switching gt Multicast gt MFDB gt MFDB Statistics MFDB Statistics MFDB Statistics Max MFDB Table Entries Most MFDB Entries Since Last Reset Current Entries The MFDB Statistics screen displays the following Max MFDB Table Entries The maximum number of entries that the Multicast Forwarding Database table can hold Most MFDB Entries Since Last Reset The largest number of entries that have been present in the Multicast Forwarding Database table since last reset This value is also known as the MFDB high water mark Current Entries The current number of entries in the Multicast Forwarding Database table 2 Click Refresh to update the screen with the latest MST information 113 XS712T Smart Switch Auto Video Use this screen to configure the Auto Video parameters To configure Auto Video 1 Select Switching gt Multicast gt Auto Vid
291. re more tolerant of delay Packets with strict timing requirements are given special treatment in a QoS capable network With this in mind all elements of the network must be QoS capable The presence of at least one node which is not QoS capable creates a deficiency in the network path and the performance of the entire packet flow is compromised Class of Service The Class of Service CoS queueing feature lets you directly configure certain aspects of switch queueing This provides the desired QoS behavior for different types of network traffic when the complexities of DiffServ are not required The priority of a packet arriving at an interface can be used to steer the packet to the appropriate outbound CoS queue through a mapping table CoS queue characteristics that affect queue mapping such as minimum guaranteed bandwidth or transmission rate shaping are user configurable at the queue or port level Eight queues per port are supported The eighth queue is used for stacking which is not configurable for the user Configurable queues are from O to 6 153 XS712T Smart Switch From the Advanced link the Class of service menu under the QoS tab you can access the following screens e Basic CoS Configuration e CoS Interface Configuration Interface Queue Configuration e 802 1p to Queue Mapping e DSCP to Queue Mapping Basic CoS Configuration Use the Trust Mode Configuration screen to set the class of service trust mode of a
292. red enter the MAC Mask associated with the Destination MAC to match The MAC address mask specifies which bits in the destination MAC to compare against an Ethernet frame Use Fs and zeros in the MAC mask which is in a wildcard format An F means that the bit is not checked and a zero in a bit position means that the data must equal the value given for that bit For example if the MAC address is aa bb cc dd ee ff and the mask is 00 00 ff ff ff ff all MAC addresses with aa bb xx xx xx xx result in a match where x is any hexadecimal number A MAC mask of 00 00 00 00 00 00 matches a single MAC address EtherType Key Requires a packet s EtherType to match the EtherType you select Select the EtherType value from the drop down menu If you select User Value you can enter a custom EtherType value EtherType User Value This field is configurable if you select User Value from the EtherType drop down menu The value you enter specifies a customized Ethertype to compare against an Ethernet frame The valid range of values is 0x0600 0xFFFF Source MAC Requires a packet s source port MAC address to match the address listed here Enter a MAC address in the this field The valid format is XXIXXIXXIXXIXXIXX Source MAC Mask If desired enter the MAC mask for the source MAC address to match Use Fs and zeros in the MAC mask which is in a wildcard format An F means that the bit is not checked and a zero in a bit position means that the data must
293. rements and give preference to time sensitive traffic To map 802 1p priorities to queues 1 Select QoS CoS Advanced 802 1p to Queue Mapping 802 1p to Queue Mapping 802 1p Queue Configuration Global Interface i gi mT 802 1p to Queue Mapping 802 1p Priority et EE SC URN Queue Ge obw obw 1i 2b zb sim 3b 2 Select one of the following radio buttons e Select the Global radio button to apply the same 802 1p priority mapping to all CoS configurable interfaces e Select the Interface radio button to apply 802 1p priority mapping to on a per interface basis If you map 802 1p priorities to individual interfaces select the Interface radio button and then select the interface from the drop down menu The interface settings override the global settings for 802 1p priority mapping 3 Select the queue to map to the predefined 802 1p priority values The 802 1p Priority row contains traffic class selectors for each of the eight 802 1p priorities to be mapped The priority goes from low 0 to high 7 For example traffic with a priority of 0 is for most data traffic and is sent using best effort Traffic with a higher priority such as 7 might be time sensitive traffic such as voice or video 158 XS712T Smart Switch The values in each drop down menu represent the traffic class The traffic class is the hardware queue for a port Higher traffic class values indicate a higher
294. rently configured in the switch and the maximum number of ACLs that can be configured The current size is equal to the number of configured IPv4 ACLs plus the number of configured MAC ACLs 2 Specify a name for the MAC ACL in the Name field The name string can include alphabetic numeric dash underscore or space characters only The name must start with an alphabetic character 3 Click Add Each configured ACL displays the following information e Rules Displays the number of rules currently configured for the MAC ACL Direction Displays the direction of packet traffic affected by the MAC ACL which can be Inbound or blank Tochange the name of a MAC ACL 1 Select the check box next to the Name field for the ACL to modify 2 Under Name specify the new name 3 Click Apply 215 XS712T Smart Switch gt To delete a MAC ACL 1 Select the check box next to the Name field 2 Click Delete MAC Rules Use the MAC Rules screen to define rules for MAC based ACLs The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded A default deny all rule is the last rule of every list Note To set up a new MAC ACL use the MAC ACL screen Toaddrules to a MAC ACL 1 Select Security ACL Basic MAC Rules MAC Rules Rules ACL Name Rule Table Assign Redirect Match ID 1 to 10 Action 9 Cos Destination MAC Destination MAC Mas
295. required when you configure a source IP address Dst L4 Port Requires a packet s TCP UDP destination port to match the port listed here Complete one of the following fields 224 XS712T Smart Switch Destination L4 Keyword Select the desired L4 keyword from a list of destination ports on which the rule can be based Destination L4 Port Number If the destination L4 keyword is Other enter a user defined Port ID by which packets are matched to the rule Service Type Select one of the Service Type match conditions for the extended IP ACL rule The possible values are IP DSCP IP precedence and IP TOS which are alternative ways of specifying a match criterion for the same Service Type field in the IP header however each uses a different user notation After you select the service type specify the value associated with the type IP DSCP Specify the IP DiffServ Code Point DSCP value The DSCP is defined as the high order six bits of the Service Type octet in the IP header Select an IP DSCP value from the menu To specify a numeric value in the available field select Other from the menu and type an integer from O to 63 in the field IP Precedence The IP Precedence field in a packet is defined as the high order three bits of the Service Type octet in the IP header This is an optional configuration Enter an integer from 0 to 7 IP TOS Bits Matches on the Type of Service bits in the IP header when checked In the first
296. ress indicating which part s of the source MAC Address to use for matching against packet content Destination MAC Address This is the destination MAC address specified as six two digit hexadecimal numbers separated by colons Destination MAC Mask This is a bit mask in the same format as MAC Address indicating which part s of the destination MAC Address to use for matching against packet content 163 XS712T Smart Switch Protocol Type Requires a packet s layer 4 protocol to match the protocol you select If you select Other enter a protocol number in the field that displays The valid range is 0 255 Source IP Address Requires a packet s source port IP address to match the address listed here In the IP Address field enter a valid source IP address in dotted decimal format Source Mask Enter a valid subnet mask to determine which bits in the IP address are significant Note that this is not a wildcard mask Source L4 Port Requires a packet s TCP UDP source port to match the port you select Select the desired L4 keyword from the list on which the rule can be based If you select Other the screen refreshes and a Port ID field displays Enter a user defined Port ID by which packets are matched to the rule Destination IP Address Requires a packet s destination port IP address to match the address listed here In the IP Address field enter a valid destination IP address in dotted decimal format Destination Mask
297. rom 1 10 to identify the IP ACL rule You can create up to 10 rules for each ACL 223 XS712T Smart Switch Select or specify values for one or more of the following match criteria Action Select the ACL forwarding action which is one of the following Permit Forwards packets which meet the ACL criteria Deny Drops packets which meet the ACL criteria Egress Queue Specifies the hardware egress queue identifier used to handle all packets matching this ACL rule Enter an identifying number from 0 7 in the appropriate field Match Every Requires a packet to match the criteria of this ACL Select True or False from the drop down menu Match Every is exclusive to the other filtering rules so if Match Every is True the other rules on the screen are not available Protocol Type Requires a packet s protocol to match the protocol listed here Select a type from the drop down menu or enter the protocol number in the available field Src IP Address Requires a packet s source IP address to match the address listed here Type an IP Address in the appropriate field using dotted decimal notation The address you enter is compared to a packet s source IP Address Src IP Mask Specifies the source IP address wildcard mask Wild card masks determines which bits are used and which bits are ignored A wild card mask of 255 255 255 255 indicates that no bit is important A wildcard of 0 0 0 0 indicates that all of the bits are important
298. rom the SNTP server Bad Date Encoded The time provided by the SNTP server is not valid Version Not Supported The SNTP version supported by the server is not compatible with the version supported by the client Server Unsynchronized The SNTP server is not synchronized with its peers This is indicated via the leap indicator field on the SNTP message Server Kiss Of Death The SNTP server indicated that no further queries were to be sent to this server This is indicated by a stratum field equal to 0 in a message received from a server Specifies the IP address of the server for the last received valid packet If no message has been received from any server an empty string is shown 36 XS712T Smart Switch Table 6 Time Configuration status fields Continued Field Description Address Type Specifies the address type of the SNTP Server address for the last received valid packet Server Stratum Specifies the claimed stratum of the server for the last received valid packet Reference Clock Id Specifies the reference clock identifier of the server for the last received valid packet Server Mode Specifies the mode of the server for the last received valid packet Unicast Sever Max Entries Specifies the maximum number of unicast server entries that can be configured on this client Unicast Server Current Specifies the number of current valid unicast server entries configured Entries fo
299. rotocol Encryption Protocol Encryption Key The SNMPv3 Access Mode is a read only field that shows the access privileges for the user account The admin account always has Read Write access and all other accounts have Read Only access 2 To enable authentication select an Authentication Protocol option If the authentication protocol is MD5 or SHA the user login password will be used as SNMPv3 authentication password To configure the login password see Change Password on page 171 3 To enable encryption a In the Encryption Protocol field select the DES option to encrypt SNMPv3 packets using the DES encryption protocol b In the Encryption Key field enter an encryption code of eight or more alphanumeric characters 4 Click Apply 22 XS712T Smart Switch Interface Naming Convention The switch supports physical and logical interfaces Interfaces are identified by their type and the interface number All the physical ports are as follows Ports 1 10 Copper ports that operate at 100MB 1G or 10G Ports 11 12 Combo ports that can act as 100M 1G 10G copper ports or 1G 10G SFP ports The number of the port is identified on the front panel You can configure the logical interfaces by using the software The following table describes the naming convention for all interfaces available on the switch Table 3 Interface naming conventions Switch base MAC address This interfa
300. rt Switch Web Interface Navigation Tabs Configuration Menus and Links The navigation tabs along the top of the web interface give you quick access to the various switch functions The tabs are always available and remain constant regardless of which feature you configure When you select a tab the features for that tab appear as links directly under the tabs The configuration menu links in the blue bar change according to the navigation tab that is selected The configuration screens for each feature are available as links in the menu on the left side of the screen Some items in the menu expand to reveal multiple submenu links as Figure 2 on page 18 shows When you click a link that includes multiple submenu links the item is preceded by a down arrow symbol and expands to display the additional screens 17 XS712T Smart Switch System Information Slot Information IP Configuration IPv6 Network Configuration IPv6 Network Neighbor Link Submenu Links SNTP Globa Configuration SNTP Server Configuration Denial of Service DNS Green Ethernet Figure 2 Menu hierarchy Configuration and Status Options The area directly under the configuration menus and to the right of the links displays the configuration information or status for the screen you select On screens that contain configuration options you can input information into fields or select options from drop down lists Ea
301. s 1G 1 488 000 pps 10G 14 880 000 pps MAC addresses 32K Green Ethernet IEEE802 3az Energy Efficient Ethernet 303 XS712T Smart Switch XS712T Switch Features and Defaults Table 47 Switch features and defaults Feature Sets Supported Default Auto negotiation static All ports Auto negotiation speed duplex Auto MDI MDIX N A Enabled 802 3x flow control back pressure 1 per system Disabled Port mirroring 1 Disabled Port trunking aggregation 8 Pre configured 802 1D spanning tree 1 Disabled 802 1w RSTP 1 Disabled 802 1s spanning tree 8 instances Enabled Static 802 1Q tagging 256 VID 1 Max member ports are 12 for standalone switch Learning process Supports static and dynamic MAC entries Dynamic learning is enabled by default Storm control All ports Disabled Jumbo frame All ports Disabled Max 9216 bytes Number of queues 7 N A Port based N A N A 802 1p 1 Enabled DSCP 1 Disabled Rate limiting All ports Disabled Auto QoS All ports Disabled 802 1X All ports Disabled MAC ACL 100 shared with IP and IPv6 All MAC addresses allowed ACLs IP ACL 100 shared with MAC and IPv6 All IP addresses allowed ACLs IPv6 ACL 100 shared with IP ACL and MAC All IP addresses allowed ACL 304 XS712T Smart Switch Table 47 Switch features and defaults Continued Feature Sets Supported Default
302. s Each instance of the Spanning Tree behaves in the manner specified in IEEE 802 1w Rapid Spanning Tree with slight modifications in the working but not the end effect chief among the effects is the rapid transitioning of the port to the Forwarding state The difference between the RSTP and the traditional STP IEEE 802 1D is the ability to configure and recognize full duplex connectivity and ports that are connected to end stations resulting in rapid transitioning of the port to the Forwarding state and the suppression of Topology Change Notification These features are represented by the parameters pointtopoint and edgeport MSTP is compatible to both RSTP and STP It behaves appropriately to STP and RSTP bridges A MSTP bridge can be configured to behave entirely as a RSTP bridge or a STP bridge So an IEEE 802 1s bridge inherently also supports IEEE 802 1w and IEEE 802 1D The MSTP algorithm and protocol provides simple and full connectivity for frames assigned to any given VLAN throughout a Bridged LAN comprising arbitrarily interconnected networking devices each operating MSTP STP or RSTP MSTP allows frames assigned to different VLANs to follow separate paths each based on an independent Multiple Spanning Tree Instance MSTI within Multiple Spanning Tree MST Regions composed of LANs and or MSTP Bridges These Regions and the other Bridges and LANs are connected into a single Common Spanning Tree CST IEEE DRAFT P802 1s D13
303. s all those counted by icmpOutErrors IcmpOutErrors The number of ICMP messages which this entity did not send due to problems discovered within ICMP such as a lack of buffers This value should not include errors discovered outside the ICMP layer such as the inability of IP to route the resultant datagram In some implementations there can be no types of error which contribute to this counter s value IcmpOutDestUnreachs The number of ICMP Destination Unreachable messages sent IcmpOutTimeExcds The number of ICMP Time Exceeded messages sent IcmpOutParmProbs The number of ICMP Parameter Problem messages sent IcmpOutSrcQuenchs The number of ICMP Source Quench messages sent 141 XS712T Smart Switch Table 18 IP routing statistics Continued Field Description IcmpOutRedirects The number of ICMP Redirect messages sent For a host this object is always zero since hosts do not send redirects IcmpOutEchos The number of ICMP Echo request messages sent IcmpOutEchoReps The number of ICMP Echo Reply messages sent IcmpOutTimestamps The number of ICMP Timestamp request messages IcmpOutTimestampReps The number of ICMP Timestamp Reply messages sent IcmpOutAddrMasks The number of ICMP Address Mask Request messages sent IcmpOutAddrMaskReps The number of ICMP Address Mask Reply messages sent Configure VLAN Routing You can configure XS712T Smart Switch software with some ports supporting
304. s also enabled then this causes periodic traps to be generated indicating the number of times this rule was hit during the current report interval A fixed 5 minute report interval is used for the entire system A trap is not issued if the ACL rule hit count is zero for the current interval This field is visible for a Deny action 227 XS712T Smart Switch Assign Queue ID Specifies the hardware egress queue identifier used to handle all packets matching this IPv6 ACL rule The valid range of Queue IDs is from 0 to 6 This field is visible for a Permit Action Mirror Interface Specifies the specific egress interface where the matching traffic stream is copied in addition to being forwarded normally by the device This field cannot be set if a Redirect Interface is already configured for the ACL rule This field is visible for a Permit Action Redirect Interface Specifies the specific egress interface where the matching traffic stream is forced bypassing any forwarding decision normally performed by the device This field cannot be set if a Mirror Interface is already configured for the ACL rule This field is visible for a Permit Action Match Every Select true or false from the pull down menu True signifies that all packets will match the selected IPv6 ACL and Rule and will be either permitted or denied In this case since all packets match the rule the option of configuring other match criteria will not be offered To configure s
305. s screen to view the operational state and other information for IGMP snooping queriers for VLANs on the network To view operational information on IGMP snooping queriers select Switching gt Multicast gt IGMP Snooping Querier gt Querier VLAN Status Querier VLAN Status Querier VLAN Status ti Last List main ional Operational State Operational Version Querier Querier gt Response Address Version Time sec CEERI Sa IE TR Re APA 123 XS712T Smart Switch The following table describes the information available on the Querier VLAN Status screen Table 17 IGMP snooping querier VLAN status Field Description VLAN ID Specifies the VLAN ID on which the IGMP Snooping Querier is administratively enabled and for which VLAN exists in the VLAN database Operational State Specifies the operational state of the IGMP Snooping Querier on a VLAN e Querier The snooping switch is the querier in the VLAN The snooping switch will send out periodic queries with a time interval equal to the configured querier query interval If the snooping switch sees a better querier numerically lower in the VLAN it moves to non querier mode e Non Querier The snooping switch is in non querier mode in the VLAN If the querier expiry interval timer expires the snooping switch moves into querier mode Disabled The snooping querier is not operational on the VLAN The snooping querier moves to disabled mode when IGMP snoop
306. s to one of seven internal hardware priority queues e DSCP The six most significant bits of the DiffServ field are called the Differentiated Services Code Point DSCP bits In the Interface Shaping Rate field specify the maximum bandwidth allowed This is typically used to shape the outbound transmission rate in increments of 64 kbps in this range of 16 16384 This value is controlled independently of any per queue maximum bandwidth configuration It is effectively a second level shaping mechanism The default value is 0 The value 0 means maximum is unlimited The expected shaping at egress interface is calculated as frameSize shaping frameSize IFG where IFG Inter frame gap is 20 bytes frameSize is configured frame size of the traffic and shaping is configured traffic shaping in the Interface Shaping Rate field For example when the frame size is 64 bytes and the interface shaping rate is 64 the expected shaping will be approximately 48kbps Setting the value to 0 resets the configured traffic shape rate Click Apply Interface Queue Configuration Use the Interface Queue Configuration screen to define what a particular queue does by configuring switch egress queues User configurable parameters control the amount of bandwidth used by the queue the queue depth during times of congestion and the scheduling of packet transmission from the set of all queues on a port Each port has its own CoS queue related configuration
307. sable Disable Disable Disable xgii Disable xgl2 Disable 1 LAGS All 8555585858525526 To configure port security settings for a Link Aggregation Group LAG click LAGS To configure port security settings for both physical ports and LAGs click ALL To configure settings for a physical port enter the port in unit slot port format and click on the Go button The entry corresponding to the specified port will be selected Select the check box next to the port or LAG to configure Select multiple check boxes to apply the same setting to all selected interfaces Select the check box in the heading row to apply the same settings to all interfaces Specify the following settings Port Security Enable or Disable the port security feature for the selected port Max Allowed Dynamically Learned MAC Sets the maximum number of dynamically learned MAC addresses on the selected interface e Max Allowed Statically Locked MAC Sets the maximum number of statically locked MAC addresses on the selected interface Enable Violation Traps Enables or disables the sending of new violation traps designating when a packet with a disallowed MAC address is received on a locked port Click Apply 203 XS712T Smart Switch Security MAC Address Use the Security MAC Address screen to convert a dynamically learned MAC address to a sta
308. sable Disable Disable Disable o mM o m o o EM o io o 2 Next to Admin Mode globally enable the administrative mode for Voice VLAN on the switch 3 Select the port s to configure To configure a single port select the check box associated with it or type the port number in the Go To Interface field and click Go To configure multiple ports with the same settings select the check box associated with each port to configure To configure all ports with the same settings select the check box in the heading row 92 XS712T Smart Switch 4 From the Interface Mode list select one of the following options to determine how an IP phone connected to the selected port should send voice traffic VLAN ID Forward voice traffic in the specified voice VLAN Dotip Tag voice traffic with the specified 802 1p priority value None Use the settings configured on the IP phone to send untagged voice traffic Untagged Send untagged voice traffic e Disable Operationally disables the Voice VLAN feature on the interface 5 If the interface mode is VLAN ID or Dot1p specify the VLAN ID or 802 1p priority value under Value This field is valid only when VLAN ID or dot1p is selected as the interface mode 6 From the CoS Override Mode list specify the CoS override mode for the selected ports e Enabled The port ignores the 802 1p priority value in the Ethernet frames it receives from connected de
309. sable RateLimit Disable Disable RateLimit Disable Disable RateLimit Disable Disable RateLimit Disable Disable RateLimit Go To Interface 3l Go uu Mu EES uU tw Nm uU m Uu 2 Select the check box next to the port to configure Select multiple check boxes to apply the same setting to all selected ports Select the check box in the heading row to apply the same settings to all ports 3 From the Ingress Control Mode menu select the mode of broadcast affected by storm control Disable Do not use storm control 200 7 8 XS712T Smart Switch Unknown Unicast If the rate of unknown L2 unicast destination lookup failure traffic ingressing on an interface increases beyond the configured threshold the traffic will be dropped Multicast If the rate of L2 multicast traffic ingressing on an interface increases beyond the configured threshold the traffic will be dropped e Broadcast If the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold the traffic will be dropped When the selected Ingress Control Mode is an option other than Disable select Enable or Disable from the Status menu to specify the administrative status of the mode Select Control Action mode to either Shutdown or RateLimit The default mode is RateLimit The Control Action field provides the ability to shutdown the port when threshold of configured broadcas
310. se the Cable Test screen to display information about the cables connected to switch ports gt To display the cable test screen 1 Select Monitoring gt Ports gt Cable Test Cable Test Cable Test 1 All Go To Port OC Cable Status Cable Length Failure Location xgi Untested xg2 Untested xg3 Untested xg4 Untested xg5 Untested xg6 Untested xg7 Untested xg8 Untested xg9 Untested xgi0 Untested xgil Untested xgi2 Untested 1 AI 2 Select whether to display physical interfaces link aggregation groups LAGs or both by clicking one of the following links above the table heading e 1 Only physical interfaces are displayed This is the default setting All Both physical interfaces and link aggregation groups are displayed To locate an interface quickly type the interface number for example xg12 in the Go To Interface field at the top or bottom of the table and click Go 3 Click Apply to perform a cable test on the selected interface The cable test can take up to 2 seconds to complete If the port has an active link then the link is not taken down and the cable status is always Normal The command returns a cable length estimate if this feature is supported by the PHY for the current link speed Note that if the link is down and a cable is attached to a 10 100 Ethernet adapter then the cable status can be Open or Short because some Ethernet adapters leave unused wire pairs unterminated or grounded
311. sical location Each group s traffic is contained largely within the VLAN reducing extraneous traffic and improving the efficiency of the whole network 285 XS712T Smart Switch They are easy to manage The addition of nodes as well as moves and other changes can be dealt with quickly and conveniently from a management interface rather than from the wiring closet They provide increased performance VLANs free up bandwidth by limiting node to node and broadcast traffic throughout the network They ensure enhanced network security VLANs create virtual boundaries that can be crossed only through a router So standard router based security measures can be used to restrict access to each VLAN Packets received by the switch are treated in the following way When an untagged packet enters a port it is automatically tagged with the port s default VLAN ID tag number Each port has a default VLAN ID setting that is user configurable the default setting is 1 The default VLAN ID setting for each port can be changed in the Port PVID Configuration screen see Port VLAN ID Configuration on page 87 When a tagged packet enters a port the tag for that packet is unaffected by the default VLAN ID setting The packet proceeds to the VLAN specified by its VLAN ID tag number If the port through which the packet entered does not have membership with the VLAN specified by the VLAN ID tag the packet is dropped If the port is a member of the
312. smitted 64 Octets The total number of packets including bad packets transmitted that were 64 octets in length excluding framing bits but including FCS octets Packets Transmitted 65 127 Octets The total number of packets including bad packets transmitted that were between 65 and 127 octets in length inclusive excluding framing bits but including FCS octets Packets Transmitted 128 255 Octets The total number of packets including bad packets transmitted that were between 128 and 255 octets in length inclusive excluding framing bits but including FCS octets 242 XS712T Smart Switch Table 39 Detailed interface statistics Continued Field Description Packets Transmitted 256 511 Octets The total number of packets including bad packets transmitted that were between 256 and 511 octets in length inclusive excluding framing bits but including FCS octets Packets Transmitted 512 1023 Octets The total number of packets including bad packets transmitted that were between 512 and 1023 octets in length inclusive excluding framing bits but including FCS octets Packets Transmitted 1024 1518 Octets The total number of packets including bad packets transmitted that were between 1024 and 1518 octets in length inclusive excluding framing bits but including FCS octets Packets Transmitted gt 1518 Octets The total number of packets transmitted that were longer th
313. ss1 Protocol Type UDP e Source IP Address 192 12 1 0 e Source Mask 255 255 255 0 Source L4 Port Other and enter 4567 as the source port value Destination IP Address 192 12 2 0 e Destination Mask 255 255 255 0 e Destination L4 Port Other and enter 4568 as the destination port value For more information about this screen see Class Configuration on page 162 Click Apply From the Policy Configuration screen create a new policy with the following settings e Policy Selector Policy1 Member Class Class1 For more information about this screen see Policy Configuration on page 166 Click Add to add the new policy Click the Policy1 hyperlink to view the Policy Class Configuration screen for this policy 293 XS712T Smart Switch 8 Configure the Policy attributes as follows e Assign Queue 3 Policy Attribute Simple Policy e Color Mode Color Blind Committed Rate 1000000 Kbps Committed Burst Size 128 KB e Confirm Action Send e Violate Action Drop For additional information about this screen see Policy Configuration on page 166 9 From the Service Configuration screen select the check box next to interfaces g7 and g8 to attach the policy to these interfaces and then click Apply see Service Configuration on page 169 All UDP packet flows destined to the 192 12 2 0 network with an IP source address from the 192 12 1 0 network that have a Layer 4 Source port of 4567 and Destination port of 4
314. ssigned by the DHCP server You will need this value to access the switch directly from a web browser without using the Smart Control Center E SmartControlCenter NETGEAR Network Maintenance Device List Product MAC Address 7 Select your switch by clicking the line that displays the switch then click the Web Browser Access button The Smart Control Center displays a login window Login Password Use your web browser to manage your switch The default password is password Use this screen to manage your switch For more information see Use the Web Interface on page 16 Discover a Switch in a Network without a DHCP Server This section describes how to use the Smart Control Center to set up your switch in a network without a DHCP server If your network has no DHCP service you must assign a static IP address to your switch If you choose you can assign it a static IP address even if your network has DHCP service maa 2 2 To assign a static IP address 1 Connect the switch to your existing network Power on the switch by connecting its power cord Install the Smart Control Center on your computer Start the Smart Control Center Click Discover for the Smart Control Center to find your XS712T switch The utility broadcasts Layer 2 discovery packets within the broadcast domain to discover the switch 10 XS712T Smart Switch 6 Select the switch then click Configure Device The screen e
315. sted in receiving multicast traffic directed to that group Also fast leave processing is supported only with IGMP version 2 hosts Host Timeout Sets the value for group membership interval of IGMP snooping for the specified VLAN ID The valid range is Maximum Response Time 1 to 3600 seconds Maximum Response Time Sets the value for maximum response time of IGMP Snooping for the specified VLAN ID Valid range is 1 to 25 The configured value must be less than the Group Membership Interval The default is 10 seconds MRouter Timeout Enter the amount of time that a switch will wait to receive a query on the VLAN before removing it from the list of VLANs with multicast routers attached Enter a value between 0 and 3600 seconds The default is 0 seconds which means there is no expiration Query Mode Enable or disable the IGMP Querier Mode for the specified VLAN ID Query Interval Enter the value for IGMP Query Interval for the specified VLAN ID The valid range is 1 1800 seconds The default is 60 seconds Click Add To disable IGMP snooping on one or more VLANs 1 2 Select the check box next to each VLAN ID on which IGMP snooping is to be disabled Click Delete Multicast Router Configuration If a multicast router is attached to the switch its existence can be learned dynamically You can also statically configure an interface as a multicast router interface which is an interface that faces a multicast router or IGMP q
316. t by the snooping querier 131 XS712T Smart Switch gt To remove an MLD snooping querier configuration 1 Select the check box next to each entry to remove 2 Click Delete Forwarding Database The forwarding database maintains a list of MAC addresses after having received a packet from this MAC address The transparent bridging function uses the forwarding database entries to determine how to forward a received frame The Address Table link contains links described in the following sections e MAC Address Table e Dynamic Address Configuration e Address Table e Static MAC Address MAC Address Table The MAC Address Table contains information about unicast entries for which the switch has forwarding and or filtering information This information is used by the transparent bridging function in determining how to propagate a received frame Use the search function of the MAC Address Table screen to display information about the entries in the table gt To search for an entry in the MAC address table 1 Select Switching gt Address Table gt Basic gt Address Table Address Table MAC Address Table Search By VLAN ID Total MAC Addresses 00 02 BC 00 00 77 Learned 00 0B 78 66 95 00 xg2 Learned 00 0E 7F 2D 43 5F xg2 Learned 2 Use the Search By field to search for MAC Addresses by MAC Address VLAN ID or Interface MAC Address Select MAC Address from the menu and enter a 6 byte hexadecim
317. t having to translate the contents for the switch to understand The most common usage of text based configuration is to upload a working configuration from a device edit it offline to personalize it for another similar device for example change the device name serial number IP address and download it to that device If you are uploading an XS712T image Archive select the image on the switch to upload to the management system This field is visible only when Archive is selected as the File Type Click Apply A window displays to allow you to open the text file on the management system or to save the image or text file to the management system 262 XS712T Smart Switch Download The switch supports system file downloads from a remote system to the switch by using either TFTP or HTTP The Download menu contains links described in the following sections TFTP File Download HTTP File Download TFTP File Download Use the Download File to switch screen to download device software the image file the configuration files and SSL files from a TFTP server to the switch Before you download a file to the switch the following conditions must be true The file to download from the TFTP server is on the server in the appropriate directory The file is in the correct format e The switch has a path to the TFTP server You can also download files via HTTP See HTTP File Download on page 265 for additional informa
318. t routers attached 9 Click Add gt To disable MLD snooping on a VLAN 1 Select the check box next to each VLAN on which MLD snooping should be disabled 2 Click Delete Multicast Router Configuration In addition to building and maintaining lists of multicast group memberships the Snooping switch also maintains a list of multicast routers When forwarding multicast packets they should be forwarded on ports that have joined using MLD IGMP and also on ports on which multicast routers are attached In MLD IGMP there is only one active querier This means that all other routers on the network are suppressed and are not detectable by the switch If a query is not received on an interface within a specified length of time multicast router present expiration time then that interface is removed from the list of interfaces with multicast routers attached The multicast router present expiration time is configurable via management The default value for the multicast router expiration time is zero which indicates an infinite timeout that is no expiration gt To configure the Multicast Router 1 Select Snooping Multicast Router Configuration Multicast Router Configuration Multicast Router Configuration 1 LAGS All Go To Interface aoo J EET CO NEENMNNNMMMMggggMgBNBARggBEA EBES E NNN F xg1i Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable
319. t storm recovery feature gets breached In the Threshold field specify the maximum rate at which unknown packets are forwarded The range is a percent of the total threshold between 0 100 The default is 5 In the Flow Control menu select Enable or Disable flow control The default is Disable Click Apply Port Security Configuration Use the Port Security feature to lock one or more ports on the system When a port is locked only packets with an allowable source MAC addresses can be forwarded All other packets are discarded To configure the global port security mode 1 2 Select Security gt Traffic Control gt Port Security gt Port Security Configuration Port Security Configuration Port Security Configuration Port Security Mode Disable Enable Port Security Violations Port Last Violation MAC VLAN ID In the Port Security Mode field select the appropriate radio button to enable or disable port security on the switch 3 Click Apply 201 XS712T Smart Switch The Port Security Violation table shows information about violations that occurred on ports that are enabled for port security The following table describes the fields in the Port Security Violation table Table 29 Port security violation information Field Description Port Identifies the port where a violation occurred Last Violation MAC Displays the source MAC address of the last packet that was discarded at a
320. t were a single link Tocreate a LAG 1 Select Switching gt LAG gt Basic gt LAG Membership LAG Membership LAG Membership LAG ID CURRENT MEMBERS LAG Name Port Selection Table 2 From the LAG ID field select the LAG to configure 81 XS712T Smart Switch 3 In the LAG Name field enter the name you want assigned to the LAG You can enter any string of up to 15 alphanumeric characters A valid name has to be specified to create the LAG 4 Click the unit name in the orange bar to display the ports LAG Membership Q LAGID CURRENT MEMBERS Port Selection Table Port 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 5 Click the box below each port to include in the LAG 6 Click Apply 7 To verify the configuration and view the ports that are members of the selected LAG click Current Members LACP Configuration The LACP configuration screen is used to set the LACP system priority Toconfigure LACP 1 Select Switching gt LAG gt Advanced gt LACP Configuration LACP Configuration LACP Configuration LACP System Priority 2 From the LACP System Priority field specify the device s link aggregation priority relative to the devices at the other ends of the links on which link aggregation is enabled A higher value indicates a lower priority You can change the value of the p
321. table describes the DHCP snooping statistics Table 16 DHCP Snooping statistics Field Description Interface The interface associated with the rest of the data in the row MAC Verify Failures The number of DHCP messages that were dropped because the source MAC address and client hardware address did not match MAC address verification is performed only if it is globally enabled 75 XS712T Smart Switch Table 16 DHCP Snooping statistics Continued Field Description Client Ifc Mismatch The number of packets that were dropped by DHCP snooping because the interface and VLAN on which the packet was received does not match the client s interface and VLAN information stored in the binding database DHCP Server Msgs Received The number of DHCP server messages DHCPOFFER DHCPACK DHCPNAK DHCPRELEASEQUERY that have been dropped on an untrusted port 76 Layer 2 Switching Configuration Use the features you access from the Switching tab to define Layer 2 features The Switching tab contains links to the features described in the following sections Ports Link Aggregation Groups VLANs Auto VoIP Configuration Spanning Tree Protocol Multicast Forwarding Database Ports The screens you access from the Ports menu allow you to view and monitor the physical port information for the ports available on the switch The Ports menu contains links described
322. tal number of packets including bad packets received or transmitted that were 64 octets in length excluding framing bits but including FCS octets Packets RX and TX 65 127 Octets The total number of packets including bad packets received or transmitted that were between 65 and 127 octets in length inclusive excluding framing bits but including FCS octets Packets RX and TX 128 255 Octets The total number of packets including bad packets received or transmitted that were between 128 and 255 octets in length inclusive excluding framing bits but including FCS octets Packets RX and TX 256 511 Octets The total number of packets including bad packets received or transmitted that were between 256 and 511 octets in length inclusive excluding framing bits but including FCS octets Packets RX and TX 512 1023 Octets The total number of packets including bad packets received or transmitted that were between 512 and 1023 octets in length inclusive excluding framing bits but including FCS octets Packets RX and TX 1024 1518 Octets The total number of packets including bad packets received or transmitted that were between 1024 and 1518 octets in length inclusive excluding framing bits but including FCS octets Packets RX and TX 1519 2047 Octets The total number of packets including bad packets received or transmitted that were between 1519 and 2047 octets in length inclusive excluding fram
323. tation IP Mask EU Ey LE W L 1 0 0 0 0 0 0 0 public ReadOnly Enable 0 0 0 0 0 0 0 0 private ReadWrite Enable 2 Next to Management Station IP specify the IP address of the management station 3 Next to Management Station IP Mask specify the subnet mask to associate with the management station IP address Together the Management Station IP and the Management Station IP Mask denote a range of IP addresses from which SNMP clients can use that community to access this device If either Management Station IP or Management Station IP Mask value is 0 0 0 0 access is allowed from any IP address Otherwise every client s address is ANDed with the mask as is the Management Station IP Address and if the values are equal access is allowed For example if the Management Station IP and Management Station IP Mask parameters are 192 168 1 0 255 255 255 0 then any client whose address is 192 168 1 0 through 192 168 1 255 inclusive will be allowed access To allow 53 XS712T Smart Switch access from only one station use a Management Station IP Mask value of 255 255 255 255 and use that machine s IP address for Client Address 4 Next to Community String specify a community name 5 From the Access Mode list select the access level for this community which is either Read Write or Read Only 6 From the Status list enable or disable the community If you select Enable the community name must be unique am
324. tch management interface Dynamic IP Address DHCP Specifies that the switch must obtain the IP address through a DHCP server Dynamic IP Address BOOTP Specifies that the switch must obtain the IP address through a BootP server Static IP Address Specifies that the IP address subnet mask and default gateway must be manually configured Enter this information in the fields below this radio button If you selected the Static IP Address option configure the following network information IP Address The IP address of the network interface The factory default value is 192 168 0 239 Each part of the IP address must start with a number other than zero For example IP addresses 001 100 192 6 and 192 001 10 3 are not valid Subnet Mask The IP subnet mask for the interface The factory default value is 255 255 255 0 Default Gateway The default gateway for the IP interface The factory default value is 192 168 0 254 29 XS712T Smart Switch 4 Specify the VLAN ID for the management VLAN Note Make sure that the VLAN to be configured as the management VLAN exists And make sure that the PVID of at least one port that is a port of the VLAN is the same as the management VLAN ID For information about creating VLANs and configuring the PVID for a port see VLANs on page 84 The management VLAN is used to establish an IP connection to the switch from a workstation that is connected to a port in the same VLAN If not specifi
325. ted Indicates whether the interface supports port speed auto negotiation The possible values are True or False Auto Negotiation Enabled The port speed auto negotiation support status The possible values are True enabled or False disabled Auto Negotiation Advertised The port speed auto negotiation capabilities such as 1000BASE T Capabilities half duplex mode or 100BASE TX full duplex mode 64 XS712T Smart Switch Field Description Operational MAU Type The Medium Attachment Unit MAU type The MAU performs physical layer functions including digital data conversion from the Ethernet interface collision detection and bit injection into the network MED Details Capabilities Supported The MED capabilities enabled on the port Current Capabilities The TLVs advertised by the port Device Class Network Connectivity indicates the device is a network connectivity device Network Policies Application Type The media application type associated with the policy VLAN ID The VLAN ID associated with the policy VLAN Type Specifies whether the VLAN associated with the policy is tagged or untagged User Priority The priority associated with the policy DSCP The DSCP associated with a particular policy type Neighbors Information Use the LLDP Neighbors Information screen to view the data that a specified interface has receiv
326. ted backward in autumn gt To configure the summer time settings 1 Select click System Management Time Summer Configuration The Time Configuration screen displays Time Configuration Summer Time Configuration Summer Time Disable Recurring Recurring EU Recurring USA Non Recurring Summer Time Status Summer Time Disable Summer Time In Effect No 39 XS712T Smart Switch 2 Next to the Summer Time field select one of the following options Recurring Summer time occurs at the same time every year The start and end times and dates for the time shift must be manually configured Recurring EU The system clock uses the standard recurring summer time settings used in countries in the European Union When this field is selected the rest of the applicable fields on the screen are automatically populated and cannot be edited e Recurring USA The system clock uses the standard recurring daylight saving time settings used in the United States When this field is selected the rest of the applicable fields on the screen are automatically populated and cannot be edited Non Recurring Summer time settings are in effect only between the start date and end date of the specified year When this mode is selected the summer time settings do not repeat on an annual basis 3 Ifthe selected summer time mode is Recurring or Non Recurring set the start and end times for the time shift Begins At From
327. ted port s or LAG s Port Priority The priority for a particular port within the selected MST instance The port priority is set in multiples of 16 If you specify a value that is not a multiple of 16 the priority is set to the priority is automatically set to the next lowest priority that is a multiple of 16 For example if you set a value between 0 and 15 the priority is set to 0 If you specify a number between 16 and 31 the priority is set to 16 It takes a value in the range of 0 240 Port Path Cost Set the Path Cost to a new value for the specified port in the selected MST instance It takes a value in the range of 0 200000000 Click Apply View the MST port status information The following table describes the read only MST port configuration information displayed on the Spanning Tree CST Configuration screen Field Description Auto calculated Port Path Displays whether the path cost is automatically calculated Cost Enabled or not Disabled Path cost is calculated based on the link speed of the port if the configured value for Port Path Cost is zero Port ID The port identifier for the specified port within the selected MST instance It is made up from the port priority and the interface number of the port Port Up Time Since Counters Time since the counters were last cleared displayed in Days Last Cleared Hours Minutes and Seconds Port Mode Spanning Tree Protocol Administrative Mode ass
328. ted with the policy VLAN Type Indicates whether the VLAN associated with the policy is tagged or untagged User Priority The priority associated with the policy DSCP The DSCP associated with a particular policy type LLDP MED Port Settings Use this screen to enable LLDP MED mode on an interface and configure its properties gt To configure LLDP MED settings for a port 1 Select System LLDP Advanced LLDP MED Port Settings The LLDP MED Port Settings screen displays LLDP MED Port Settings LLDP MED Port Settings Port xgi v LLDP Med Status Disable v Notification Enable v Transmit Optional TLVs Enable v 2 From the Port list select the port to configure 61 XS712T Smart Switch 3 Use the lists to enable or disable the following LLDP MED settings for the selected port LLDP MED Status The administrative status of LLDP MED on the interface When LLDP MED is enabled the transmit and receive function of LLDP is effectively enabled on the interface Notification When enabled the port sends a topology change notification if a device is connected or removed Transmit Optional TLVs When enabled the port transmits the following optional type length values TLVs in the LLDP PDU frames e MED Capabilities e Network Policy e Location Identification e Extended Power via MDI PSE Extended Power via MDI PD Inventory 4 Click Apply Local Information Use the LLDP Local Information
329. terface Periodic Reauthentication Use this field to enable or disable reauthentication of the supplicant for the specified port Select Enable or Disable If the value is Enable reauthentication will occur Otherwise reauthentication will not be allowed The default value is Disable Changing the selection will not change the configuration until the Apply button is pressed Reauthentication Period Indicates the time span in which the selected port is reauthenticated The field value is in seconds The range is 1 65535 and the field default is 3600 seconds Quiet Period This input field allows the user to configure the quiet period for the selected port This command sets the value in seconds of the timer used by the authenticator state machine on this port to define periods of time in which it will not attempt to acquire a supplicant The quiet period is the period for which the authenticator does not attempt to acquire a supplicant after a failed authentication exchange with the supplicant The quiet period must be a number in the range of 0 and 65535 A quiet period value of 0 means that the authenticator state machine will never acquire a supplicant The default value is 60 Changing the value will not change the configuration until the Submit button is pressed Resending EAP This input field allows you to configure the transmit period for the selected port The transmit period is the value in seconds of the timer used by the authe
330. tering of messages logged or forwarded based on severity and generating component The Logs menu contains links described in the following sections e Memory Log e FLASH Log e Server Log e Trap Logs e Event Logs 248 XS712T Smart Switch Memory Log The Memory Log stores messages in memory based upon the settings for message component and severity Use the Memory Log screen to set the administrative status and behavior of logs in the system buffer These log messages are cleared when the switch reboots To configure the memory log settings 1 Select Monitoring gt Logs gt Memory Log Memory Log Memory Log Configuration Admin Status O Disable Enable Behavior Wrap v Memory Log Total number of Messages 61 Description lt 14 gt Jan 4 03 05 18 10 130 184 35 5 STATSMGR 46506924 presenter c 102 268 ERROR failure in preStatsGet 0x00120006 lt 14 gt Jan 4 03 05 18 10 130 184 35 5 STATSMGR 46506924 collector c 1066 267 Failure in function collectorGet lt 14 gt Jan 4 03 05 18 10 130 184 35 5 STATSMGR 46506924 presenter c 102 266 ERROR failure in preStatsGet 0x00120005 lt 14 gt Jan 4 03 05 18 10 130 184 35 5 STATSMGR 46506924 collector c 1066 265 Failure in function collectorGet lt 14 gt Jan 4 03 05 18 10 130 184 35 5 STATSMGR 46506924 presenter c 102 264 ERROR failure in preStatsGet 0x00120004 lt 14 gt Jan 4 03 05 18 10 130 184 35 5 STATSMGR 46506924 collector c
331. the Current Password field The default password for the switch is password Type the new password in the New Password and Confirm Password fields The password can contain up to 20 ASCII characters Click Apply The switch is updated with the new password 272 XS712T Smart Switch Manage the Switch Configuration and Firmware The Maintenance tab includes links to perform the following tasks Upload and download the configuration Upload the configuration file from the switch to an administrative system or other network location or download the configuration file from a remote device to the switch Firmware upgrade Load a new firmware image on the switch Upload and Download the Configuration When you make changes to the switch the configuration information is stored in a file on the switch You can backup the configuration by uploading the configuration file from the switch to an administrative system You can download a saved configuration file from the administrative system to the switch The configuration file you download to the switch overwrites the running configuration on the switch Configuration upload and download is useful if you want to save a copy of the current switch configuration Upload Configuration before you make changes If you do not like the changes you can use the Download Configuration option to restore the switch to the settings in the saved configuration file To save a copy of the current
332. thertype field An IPv6 access list serves the same purpose as its IPv4 counterpart Prior to the IPv6 class feature any DiffServ class definition was assumed to apply to an IPv4 packet That is any match item in a class rule was interpreted in the context of an IPv4 header An example is a class rule that specifies an L4 Port match value With the introduction of the IPv6 match capability it must be specified if this class rule is for IPv4 or for IPv6 packets To facilitate this distinction a class configuration parameter is added to specify whether a class applies to IPv4 or IPv6 packet streams The Destination and Source IPv6 addresses use a prefix length value instead of an individual mask to qualify it as a subnet address or a host address The flow label is a 20 bit number that is unique to an IPv6 packet used by end stations to signify some form of quality of service QoS handling in routers Packets that match an IPv6 classifier are only allowed to be marked using the 802 1p COS field or the IP DSCP field in the Traffic Class octet IP Precedence is not defined for IPv6 this is not an appropriate type of packet marking IPv6 ACL DiffServ assignment is appropriate for LAG interfaces The procedures described by an ACL or DiffServ policy are equally applicable on a LAG interface To create a new IPv6 class 1 Select QoS DiffServ Advanced IPv6 Class Configuration IPv6 Class Name IPv6 Class Name 2 Enter a class name
333. tically locked address To convert learned MAC addresses 1 Select Security gt Traffic Control gt Port Security gt Security MAC Address Security MAC Address Port Security Settings Convert Dynamic Address to Static Number Of Dynamic MAC Addresses Learned 0 Dynamic MAC Address Table Port List xgi v VLAN ID MAC Address 2 Select the Convert Dynamic Address to Static check box 3 The Number of Dynamic MAC Addresses Learned field displays the number of dynamically learned MAC addresses on a specific port 4 Use the Port List menu to select the interface for which you want to display data 5 Click Apply The Dynamic MAC Address entries are converted to Static MAC address entries in a numerically ascending order until the Static limit is reached The Dynamic MAC Address Table shows the MAC addresses and their associated VLANs learned on the selected port Use the Port List menu to select the interface for which you want to display data Table 30 Dynamic MAC address table information Field Description VLAN ID Displays the VLAN ID corresponding to the Last Violation MAC address MAC Address Displays the MAC addresses learned on a specific port 204 XS712T Smart Switch Protected Ports Membership If a port is configured as protected it does not forward traffic to any other protected port on the switch but it will forward traffic to unprotected ports Use the Protected Ports M
334. ticast gt MFDB gt Bridge Multicast Forwarding Bridge Multicast Forwarding Bridge Multicast Forwarding Table VLAN ID Forwarding Mode 1 Forward Unregistered Forward Unregistered Forward Unregistered el CIE ee 7 2 Select the VLAN for which the Forwarding Mode is to be changed 3 From the Forwarding Mode menu select the forwarding mode Possible values are Forward Unregistered If a packet is received from a VLAN with a multicast destination address and no ports in the VLAN are registered to receive multicast packets for that address then the packet is flooded to all ports in the VLAN The 111 XS712T Smart Switch responsibility for accepting or dropping the packets belongs to the hosts If a multicast packet is received and there are ports registered to receive it the packet is sent only to the registered ports Forward All All multicast packets received from a VLAN are flooded to all ports in the VLAN regardless of port registrations to multicast addresses Filter Unregistered If a packet is received from a VLAN for a multicast destination address and no ports in the VLAN are registered to receive multicast packets for that address then the packets are dropped 4 Click Refresh to refresh the web screen to show the latest DHCP bindings information 5 Click Apply to send the updated configuration to the switch Configuration changes take effect immediately MFDB Table The Multicast F
335. tielles et aux autres dispositions pertinentes de la directive 1999 5 CE Italiano Italian Con la presente NETGEAR Inc dichiara che questo Radiolan conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999 5 CE Latviski Ar o NETGEAR Inc deklar ka Radiolan atbilst Direkt vas 1999 5 EK b tiskaj m Latvian pras b m un citiem ar to saist tajiem noteikumiem Lietuvi iuo NETGEAR Inc deklaruoja kad is Radiolan atitinka esminius reikalavimus ir Lithuanian kitas 1999 5 EB Direktyvos nuostatas 308 XS712T Smart Switch EDOC in Languages of the European Community Nederlands Hierbij verklaart NETGEAR Inc dat het toestel Radiolan in overeenstemming is Dutch met de essenti le eisen en de andere relevante bepalingen van richtlijn 1999 5 EG Malti Maltese Hawnhekk NETGEAR Inc jiddikjara li dan Radiolan jikkonforma mal htigijiet essenzjali u ma provvedimenti ohrajn relevanti li hemm fid Dirrettiva 1999 5 EC Magyar Alul rott NETGEAR Inc nyilatkozom hogy a Radiolan megfelel a vonatkoz Hungarian alapvet k vetelm nyeknek s az 1999 5 EC ir nyelv egy b el r sainak Polski Polish Niniejezym NETGEAR Inc o wiadcza ze Radiolan jest zgodny z zasadniczymi wymogami oraz pozostalymi stosownymi postanowieniami Dyrektywy 1999 5 EC Portugu s NETGEAR Inc declara que este Radiolan est conforme com os requisitos
336. tion gt To download a file to the switch from a TFTP server 1 Select Maintenance gt Download gt TFTP File Download TFTP File Download TFTP File Download File Type Archive Image Name imagel v Server Address Type IPv4 v TFTP Server IP Transfer File Path Remote File Name Start File Transfer 2 From the File Type menu specify what type of file you want to download to the switch e Archive The archive is the system software image which is saved in one of two flash sectors called images image1 and image2 The active image stores the active copy while the other image stores a second copy The device boots and runs from the active image If the active image is corrupted the system automatically boots from the non active image This is a safety feature for faults occurring during the boot upgrade process 263 XS712T Smart Switch Text Configuration A text based configuration file enables you to edit a configured text file startup config offline as needed without having to translate the contents for the switch to understand The most common usage of text based configuration is to upload a working configuration from a device edit it offline to personalize it for another similar device for example change the device name serial number IP address and download it to that device e SSL Trusted Root Certificate PEM File SSL Trusted Root Certificate File PEM Encoded e SSL Server Certificate
337. tion 1 99 ACLID 1 Rule ID o Action Permit Egress Queue Deny Logging Disable Enable Match Every Disable Enable Src IP Address Src IP Mask 4 Next to Rule ID specify a number from 1 10 to identify the IP ACL rule 5 Select or specify values for one or more of the following match criteria e Rule ID Specify a number from 1 10 to identify the IP ACL rule You can create up to 10 rules for each ACL e Action Select the ACL forwarding action which is one of the following Permit Forwards packets which meet the ACL criteria 221 gt gt 6 XS712T Smart Switch Deny Drops packets which meet the ACL criteria Egress Queue Specifies the hardware egress queue identifier used to handle all packets matching this ACL rule Logging When set to Enable logging is enabled for this ACL rule subject to resource availability in the device If the Access List Trap Flag is also enabled then this causes periodic traps to be generated indicating the number of times this rule was hit during the current report interval A fixed 5 minute report interval is used for the entire system A trap is not issued if the ACL rule hit count is zero for the current interval This field is visible for a Deny action Match Every Requires a packet to match the criteria of this ACL Select True or False from the drop down menu Match Every is exclusive to the other filtering rules so if Match Ev
338. to Automatically detects the mode of the interface Force Authorized Places the interface into an authorized state without being authenticated The interface sends and receives normal traffic without client port based authentication Force Unauthorized Denies the selected interface system access by moving the interface into unauthorized state The switch cannot provide authentication services to the client through the interface MAC Based Selects MAC Based authentication Operating Control Mode This field indicates the control mode under which the port is actually operating Possible values are ForceUnauthorized ForceAuthorized Auto N A If the port is in detached state it cannot participate in port access control 196 XS712T Smart Switch Table 27 IEEE 802 1X port summary information Continued Field Description Reauthentication Enabled Displays if reauthentication is enabled on the selected port This is a configurable field The possible values are true and false If the value is true reauthentication will occur Otherwise reauthentication will not be allowed Port Status This field displays the authorization status of the specified port The possible values are Authorized Unauthorized and N A If the port is in detached state the value will be N A since the port cannot participate in port access control Traffic Control From the Traffic Control menu you ca
339. to configure VLAN Port Membership for a particular VLAN You can select the Group operation through this screen gt To configure VLAN membership for specific ports and LAGs 1 Select Switching gt VLAN gt Advanced gt VLAN Membership VLAN Membership VLAN Membership 2 VLAN ID Group Operation Untag All v VLAN Name Default UNTAGGED PORT MEMBERS Default TAGGED PORT MEMBERS From the VLAN ID field select the VLAN to which you want to add ports Click the orange bar below the VLAN Type field to display the physical ports on the switch Click the lower orange bar to display the LAGs on the switch To select the port s or LAG s to add to the VLAN click the square below each port or LAG You can add each interface as a tagged T or untagged U VLAN member A blank square means that the port is not a member of the VLAN Tagged Frames transmitted from this port are tagged with the port VLAN ID Untagged Frames transmitted from this port are untagged Each port can be an untagged member of only one VLAN By default all ports are an untagged member of VLAN 1 6 Click Apply gt To configure the same VLAN membership settings for all ports and LAGs 1 Select Switching gt VLAN gt Advanced gt VLAN Membership 2 Inthe VLAN ID list select the VLAN to which you want to add ports 3 Inthe Group Operations list select one of the following options Untag All All frames transmitted from this VLAN will be untagg
340. to specify a value for one of the 802 1p IP DSCP or IP Precedence fields 292 XS712T Smart Switch designating the incoming color value to be used as the conforming color The color of exceeding traffic can be optionally specified as well Counting Updating octet and packet statistics to keep track of data handling along traffic paths within DiffServ In this DiffServ feature counters are not explicitly configured by the user but are designed into the system based on the DiffServ policy being created For more information see Statistics on page 75 Assigning QoS Queue Directs traffic stream to the specified QoS queue This allows a traffic classifier to specify which one of the supported hardware queues are used for handling packets belonging to the class Redirecting Forces classified traffic stream to a specified egress port physical or LAG This can occur in addition to any marking or policing action It can also be specified along with a QoS queue assignment Sample DiffServ Configuration To create a DiffServ Class Policy and attach it to a switch interface follow these steps 1 From the QoS Class Configuration screen create a new class with the following settings e Class Name Class1 e Class Type All For more information about this screen see Class Configuration on page 162 Click the Class1 hyperlink to view the DiffServ Class Configuration screen for this class Configure the following settings for Cla
341. tries which were chosen to be discarded even though they are valid One possible reason for discarding such an entry could be to free up buffer space for other routing entries IcmpinMsgs The total number of ICMP messages which the entity received Note that this counter includes all those counted by icmplnErrors IcmpinErrors The number of ICMP messages which the entity received but determined as having ICMP specific errors bad ICMP checksums bad length etc IcmpInDestUnreachs The number of ICMP Destination Unreachable messages received IcmpinTimeExcds The number of ICMP Time Exceeded messages received IcmpInParmProbs The number of ICMP Parameter Problem messages received IcmpinSrcQuenchs The number of ICMP Source Quench messages received IcmpinRedirects The number of ICMP Redirect messages received IcmpInEchos The number of ICMP Echo request messages received IcmpinEchoReps The number of ICMP Echo Reply messages received IcmpinTimestamps The number of ICMP Timestamp request messages received IcmpinTimestampReps The number of ICMP Timestamp Reply messages received IcmpinAddrMasks The number of ICMP Address Mask Request messages received IcmpinAddrMaskReps The number of ICMP Address Mask Reply messages received IcmpOutMsgs The total number of ICMP messages which this entity attempted to send Note that this counter include
342. ts Hours EEE Admin Mode Rx Low Power Idle Event Count Rx Low Power Idle Duration uSec Tx Low Power Idle Event Count Tx Low Power Idle Duration uSec Tw sys tx uSec Tw sys tx Echo uSec Tw sys rx uSec Tw sys rx Echo uSec Fallback Tw sys uSec Tx dll enabled Tx dll ready Rx dll enabled Rx dll ready Time Since Counters Last Cleared Remote Device Information Interface No LLDP data has been received on this interface Disable v 17 17 17 17 17 No No No No 0 days 0 hrs 32 mins 49 secs 2 From the Interface list select the interface to configure 3 Enable or disable the administrative mode of EEE on the port When this mode is enabled and the send and receive sides of a link are lightly loaded the port can transition to low power mode 4 Click Apply The Local Device Information table displays information about the Green Ethernet status and statistics on the port Table 9 Green Ethernet local device information Field Description Cumulative Energy Saved on this port due to Green Mode s Watts Hours The energy savings per port per hour Rx Low Power Idle Event Count The number of times the local interface has entered a low power idle state Rx Low Power Idle Duration uSec The amount of time in 10 microsecond increments the local interface has spent in a low power idle state Tx Low Power Idle Event Count The number of tim
343. ts occurring during the boot upgrade process Text Configuration A text based configuration file enables you to edit a configured text file startup config offline as needed without having to translate the contents for the switch to understand The most common usage of text based configuration is to upload a working configuration from a device edit it offline to personalize it for another similar device for example change the device name serial number IP address and download it to that device SSL Trusted Root Certificate PEM File SSL Trusted Root Certificate File PEM Encoded SSL Server Certificate PEM File SSL Server Certificate File PEM Encoded SSL DH Weak Encryption Parameter PEM File SSL Diffie Hellman Weak Encryption Parameter File PEM Encoded SSL DH Strong Encryption Parameter PEM File SSL Diffie Hellman Strong Encryption Parameter File PEM Encoded 3 If you are downloading an XS712T image Archive select the image on the switch to overwrite from the Image Name field This field is only visible when Archive is selected as the File Type 265 XS712T Smart Switch Note It is recommended that you do not overwrite the active image The system will display a warning that you are trying to overwrite the active image 4 Next to the Select File field click Browse to locate the file you want to download 5 Click the Apply button to initiate the file download Note After a file transfer is started
344. ty gt Authentication List and select RADIUS as method 1 for defaultList For more information see Authentication List Configuration on page 180 Disable The switch does not check for 802 1X authentication before allowing traffic on any ports even if the ports are configured to allow only authenticated users 3 Select the radio button in the VLAN Assignment Mode field Select Enable and Disable The default value is Disable 4 Select the radio button in the Dynamic VLAN Creation Mode field This lists two options for Dynamic VLAN Creation Mode Enable and Disable The default value is Disable 5 Select the radio button in the EAPOL Flood Mode This lists two options for EAPOL Flood Mode Enable and Disable The default value is Disable 6 Click Apply Port Authentication Use the Port Authentication screen to enable and configure port access control on one or more ports gt To configure 802 1X settings for the port 1 Select Security gt Port Authentication gt Advanced gt Port Authentication Note Use the horizontal scroll bar at the bottom of the browser to view all the fields on the Port Authentication screen The figures on the following screen are both images of the Port Authentication screen 191 XS712T Smart Switch Port Authentication Port Authentication 1 All GoT xgl Auto 0 90 0 Disable 3600 60 xg2 Auto 0 90 0 Disable 3600 60 xg3 Auto 0 90 0
345. uerier and receives multicast traffic Use this screen to manually configure an interface as a static multicast router interface All IGMP packets snooped by the switch will be forwarded to the multicast router reachable from this interface The configuration is not needed most of the time since the switch will automatically detect the presence of multicast router and forward IGMP packet accordingly It is needed only when you want to make sure the multicast router always receives IGMP packets from the switch in a complex network To configure the multicast router mode for one or more interfaces 1 Select Switching gt Multicast gt IGMP Snooping gt Multicast Router Configuration 119 XS712T Smart Switch Multicast Router Configuration Multicast Router Configuration 1 LAGS All Go To Interface ago Interface Multicast Router xgi Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable 2 Select each interface to configure 3 Use the Multicast Router menu to enable or disable Multicast Router on the selected interfaces 4 Click Apply Multicast Router VLAN Configuration Use this screen to configure the interface to only forward the snooped IGMP packets that come from VLAN ID to the multicast router attached to this interface The configuration is not needed most of the time since the switch will aut
346. ues are True or False Auto Negotiation Advertised Capabilities The port speed auto negotiation capabilities Operational MAU Type The Medium Attachment Unit MAU type The MAU performs physical layer functions including digital data conversion from the Ethernet interface collision detection and bit injection into the network 67 XS712T Smart Switch Field Description MED Details Capabilities Supported The supported capabilities that were received in MED TLV from the device Current Capabilities The advertised capabilities that were received in MED TLV from the device Device Class Displays the LLDP MED endpoint device class The possible device classes are Endpoint Class 1 Indicates a generic endpoint class offering basic LLDP services Endpoint Class 2 Indicates a media endpoint class offering media streaming capabilities as well as all Class 1 features Endpoint Class 3 Indicates a communications device class offering all Class 1 and Class 2 features plus location 911 Layer 2 switch support and device information management capabilities Hardware Revision Firmware Revision Displays the hardware version advertised by the remote device Displays the firmware version advertised by the remote device Software Revision Displays the software version advertised by the remote device Serial Number Model Name Displays the serial number
347. ueue Configuration liess 156 B02 1p to Queue Mapping isses kRRPRRXERPEXG ee 9 bo 04 He Od 158 DSCP te Queue Mapping ices sdc kaa aadguane weed eae ban ee eae 4 159 Differentiated ServicBS 6 440544 oe hoes ROS RRGY SRRISTA KC SRG E 160 Deng DITOBIE oua suas qa RR RA RARE ERUGUGRA Ad d RGGdA doped 160 Class COTON sca cesar EET EEUU d OF eo REE DHE OO REE HE 162 Policy Conga srra iieri a dd REM XS PC TASRE OO Sq ra 166 Service Configirelighi seas sa Ree Rn Rh R RR RR E RR CR ER Ra Ld 169 GOPUDB SIMIBBES cic cease ee sda Gh ERA APESICC4ptsd d qa Pk 170 XS712T Smart Switch Chapter 6 Managing Device Security Management Security Settings llle 171 Cialis FasswO saec mi TO UTE Y UC X CT LEAUPPRRER NAME V 171 Authentication List Configuration 000000 ce eee eee 180 Configure Management Access 00000 2c cece eens 183 HTTP Conful alot 222 goede etic eae atk dee Hd dettes 183 Secure HTTP Configuration ccaszauutreeczrRac tir Ru R3 n Rada 184 Certificate Management 2 0 02 6 cee seen n m he 185 Cerificate DOWNIE sss cece kee eee Ezbi4ERpi ewe dd demas fcd 186 SOZ TX COMNGUIAUON suae deed oboe he eR SER EERE Re 190 POR AUDENCO dace pax eae a cans eke olu de ae 191 aln ieichseca tease pee iateedeeeinecetee eas aveenes 195 cies es ee ee ee ee ee eee ere ees ee 197 MAC Filler Configuration sac 4sc05 e cae EAR AUR RCRCR AGEECECACADR eR Irasai 197 MAG Filer SUBE isses rre ERR x Ex RESTER EE E RE ERE
348. ult value is Disable You can only download SSL certificates when the HTTPS Admin mode is disabled Use the radio buttons in the SSL Version 3 field to enable or disable Secure Sockets Layer Version 3 0 The default value is Enable Use the radio buttons in the TLS Version 1 field to enable or disable Transport Layer Security Version 1 0 The default value is Enable In the HTTPS Port field specify the TCP port to use for HTTPS data The value must be in the range of 1025 65535 Port 443 is the default value In the HTTPS Session Soft Timeout Minutes field specify the number of minutes an HTTPS session can be idle before a timeout occurs 184 XS712T Smart Switch After the session is inactive for the configured amount of time the administrator is automatically logged out and must re enter the password to access the management interface A value of zero corresponds to an infinite timeout The valid range is 1 60 minutes The default value is 5 minutes 7 Inthe HTTPS Session Hard Timeout Hours field specify the number of hours an HTTPS session can remain active regardless of session activity The value must be in the range of 1 168 hours The default value is 24 hours 8 In the Maximum Number of HTTPS Sessions field specify the maximum number of HTTPS sessions that can be open at the same time The value must be in the range of 0 4 The default value is 4 9 Click Apply Certificate Management Use th
349. umber of inbound packets which were chosen to be discarded even though no errors had been detected in order to prevent their being delivered to a higher layer protocol A possible reason for discarding a packet could be to free up buffer space The total number of octets transmitted out of the interface including framing characters Packets Transmitted Without Errors The total number of packets transmitted out of the interface Unicast Packets Transmitted The total number of packets that higher level protocols requested be transmitted to a subnetwork unicast address including those that were discarded or not sent Multicast Packets Transmitted The total number of packets that higher level protocols requested be transmitted to a Multicast address including those that were discarded or not sent Broadcast Packets Transmitted The total number of packets that higher level protocols requested be transmitted to the Broadcast address including those that were discarded or not sent Transmit Packets Discarded The number of outbound packets which were chosen to be discarded even though no errors had been detected in order to prevent their being delivered to a higher layer protocol A possible reason for discarding a packet could be to free up buffer space Most Address Entries Ever Used The highest number of Forwarding Database Address Table entries that have been learned by this switch since the most r
350. ure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance of 20 cm between the radiator and your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter FCC Declaration Of Conformity We NETGEAR Inc 350 East Plumeria Drive Santa Clara CA 95134 declare under our sole responsibility that the ProSafe XS712T Smart Switch complies with Part 15 of FCC Rules Operation is subject to the following two conditions This device may not cause harmful interference and 309 XS712T Smart Switch This device must accept any interference received including interference that may cause undesired operation FCC Radio Frequency Interference Warnings amp Instructions This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off an
351. ute Metric Administrative cost of the path to the destination 147 XS712T Smart Switch Configure ARP The address resolution protocol ARP associates a layer 2 MAC address with a layer 3 IPv4 address XS712T Smart Switch software features both dynamic and manual ARP configuration With manual ARP configuration you can statically add entries into the ARP table ARP is a necessary part of the Internet protocol IP and is used to translate an IP address to a media MAC address defined by a local area network LAN such as Ethernet A station needing to send an IP packet must learn the MAC address of the IP destination or of the next hop router if the destination is not on the same subnet This is achieved by broadcasting an ARP request packet to which the intended recipient responds by unicasting an ARP reply containing its MAC address Once learned the MAC address is used in the destination address field of the layer 2 header prepended to the IP packet The ARP cache is a table maintained locally in each station on a network ARP cache entries are learned by examining the source information in the ARP packet payload fields regardless of whether it is an ARP request or response Thus when an ARP request is broadcast to all stations on a LAN segment or virtual LAN VLAN every recipient has the opportunity to store the sender s IP and MAC address in their respective ARP cache The ARP response being unicast is normally s
352. uthenticated 182 XS712T Smart Switch 4 Click Apply Configure Management Access From the Access menu you can configure HTTP and Secure HTTP access to the XS712T management interface You can also configure Access Control Profiles and Access Rules The Access tab contains links described in the following sections HTTP Configuration Secure HTTP Configuration Certificate Management Certificate Download Access Control HTTP Configuration Use the HTTP Configuration screen to configure the HTTP server settings on the system Toconfigure the HTTP server settings 1 Select Security gt Access gt HTTP gt HTTP Configuration HTTP Configuration HTTP Configuration Java Mode Disable Enable HTTP Session Soft Timeout Minutes 60 HTTP Session Hard Timeout Hours 24 Maximum Number of HTTP Sessions 16 2 Enable or disable the Web Java Mode This applies to both secure and unsecure HTTP connections In the HTTP Session Soft Timeout field specify the number of minutes an HTTP session can be idle before a timeout occurs After the session is inactive for the configured amount of time the administrator is automatically logged out and must re enter the password to access the management interface A value of zero corresponds to an infinite timeout The valid range is 0 to 60 minutes The default value is 5 minutes In the HTTP Session Hard Timeout field specify the hard timeout for HTTP sessions
353. uthentication mode The 802 1X network has three components Authenticators Specifies the port that is authenticated before permitting system access e Supplicants Specifies the host connected to the authenticated port requesting access to the system services e Authentication Server Specifies the external server for example the RADIUS server that performs the authentication on behalf of the authenticator and indicates whether the user is authorized to access system services The Port Authentication links described in the following sections e 802 1X Configuration Port Authentication e Port Summary 802 1X Configuration Use the 802 1X Configuration screen to enable or disable port access control on the system gt To configure global 802 1X settings 1 Select Security gt Port Authentication gt Basic gt 802 1X Configuration 802 1X Configuration 802 1X Configuration Port Based Authentication State Disable Enable VLAN Assignment Mode Disable Enable Dynamic VLAN Creation Mode Disable Enable EAPOL Flood Mode Disable Enable 2 Specify the Port Based Authentication State mode on the switch The default setting is Disable Enable Port based authentication is permitted on the switch 190 XS712T Smart Switch Note If 802 1X is enabled authentication is performed by a RADIUS server This means the primary authentication method must be RADIUS To set the method select Security Management Securi
354. vices Disabled The port trusts the priority value in the received frame 7 Click Apply Auto VolP Configuration Voice over Internet Protocol VoIP enables telephone calls over a data network Because voice traffic is typically more time sensitive than data traffic the Auto VoIP feature helps provide a classification mechanism for voice packets so that they can be prioritized above data packets in order to provide better Quality of Service QoS With the Auto VoIP feature voice prioritization is provided based on call control protocols SIP SCCP H 323 and or OUI bits Configure Protocol Based Auto VoIP Settings To prioritize time sensitive voice traffic over data traffic protocol based Auto VoIP checks for packets carrying the following VoIP protocols e Session Initiation Protocol SIP e H 323 e Signalling Connection Control Part SCCP VoIP frames that are received on ports that have the Auto VoIP feature enabled are marked with the specified CoS traffic class value To configure the protocol based port settings 1 Select Switching gt Auto VoIP gt Protocol Based Port Settings 93 XS712T Smart Switch Protocol Based Port Settings Protocol Based Global Settings Prioritization Type Traffic Class v Class Value J v Protocol Based Port Settings 2 1 LAGS All Go To Interface Go j Interface Auto VoIP Mode Operational Status xgi Enable UP xg2 Enable UP xg3 Enable UP xg4 Enable UP xg
355. wait until the screen refreshes When the screen refreshes the Select File option will be blanked out This indicates that the file transfer is done File Management The system maintains two versions of the XS712T software in permanent storage One image is the active image and the second image is the backup image The active image is loaded during subsequent switch restarts This feature reduces switch down time when upgrading or downgrading the XS712T software The File Management menu contains links described in the following sections e Copy e Dual Image Configuration e Dual Image Status Copy Use the Copy screen to copy an image from one location primary or backup to another gt To display the copy screen 1 Select Maintenance gt File Management gt Copy Copy Copy Source Image imagel image2 Destination Image C imagei image2 2 Select image1 or image2 as the source image 3 Select image1 or image2 as the destination image 4 Click Apply 266 XS712T Smart Switch Dual Image Configuration The system running a legacy software version will ignore not load a configuration file created by the newer software version When a configuration file created by the newer software version is discovered by the system running an older version of the software the system will display an appropriate warning to the user Use the Dual Image Configuration screen to set the boot image configure an image descr
356. warded or blocked and provide security for the network ACLs are normally used in firewall routers that are positioned between the internal network and an external network such as the Internet They can also be used on a router positioned between two parts of the network to control the traffic entering or exiting a specific part of the internal network The added packet processing required by the ACL feature does not affect switch performance That is ACL processing occurs at wire speed Access lists are a sequential collection of permit and deny conditions This collection of conditions known as the filtering criteria is applied to each packet that is processed by the switch or the router The forwarding or dropping of a packet is based on whether or not the packet matches the specified criteria Traffic filtering requires the following two basic steps 1 Create an access list definition The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded Additionally you can assign traffic that matches the 287 XS712T Smart Switch criteria to a particular queue or redirect the traffic to a particular port A default deny all rule is the last rule of every list 2 Apply the access list to an interface in the inbound direction The XS712T Smart Switch allows ACLs to be bound to physical ports and LAGs The switch software supports MAC ACLs and IP ACLs MAC ACL Example
357. warding Database that were created for IGMP snooping gt To view the entries in the IGMP snooping table 1 Select Switching gt Multicast gt IGMP Snooping gt IGMP Snooping Table IGMP Snooping Table IGMP Snooping Table Search By MAC Address MAC Address VLAN ID 2 Next to Search By MAC Address specify the MAC Address whose MFDB table entry you want to view Enter six two digit hexadecimal numbers separated by colons for example 00 01 23 43 45 67 117 XS712T Smart Switch 3 View the information associated with the IGMP snooping table entry The following table describes the information in the IGMP snooping table Field Description MAC Address A multicast MAC address for which the switch has forwarding and or filtering information The format is 6 two digit hexadecimal numbers that are separated by colons for example 01 00 5e 45 67 89 VLAN ID A VLAN ID for which the switch has forwarding and filtering information Type This displays the type of the entry Static entries are those that are configured by the end user Dynamic entries are added to the table as a result of a learning process or protocol Description The text description of this multicast table entry Possible values are Management Configured Network Configured and Network Assisted Interface The list of interfaces that are designated for forwarding Fwd and filtering Flt for the associated address
358. witch with the lowest priority value becomes the root bridge The bridge priority is a multiple of 4096 If you specify a priority that is not a multiple of 4096 the priority is automatically set to the next lowest priority that is a multiple of 4096 For example if the priority is attempted to be set to any value between 0 and 4095 it will be set to O The default priority is 32768 The valid range is 0 61440 VLAN ID The menu contains all VLANs configured on the switch Select a VLAN to associate with the MST instance Click Add View the MST instance information 106 XS712T Smart Switch For each configured instance the information described in the following table displays on the screen Field Description Bridge Identifier The bridge identifier for the selected MST instance It is made up using the bridge priority and the base MAC address of the bridge Time Since Displays the total amount of time since the topology of the selected MST Topology instance last changed The time is displayed in hour minute second format for Change example 5 hours 10 minutes and 4 seconds Topology Displays the total number of times topology has changed for the selected MST Change Count instance Topology Indicates whether a topology change is in progress on any port assigned to the Change selected MST instance The possible values are True or False Designated Root Displays the bridge identifier of the root bridge
359. work Policy This screen displays information about the LLPD MED network policy TLV transmitted in the LLDP frames on the selected local interface gt To view LLDP MED network policy information for an interface 1 Select System gt LLDP gt Advanced gt LLDP MED Network Policy The LLDP MED Network Policy screen displays LLDP MED Network Policy LLDP MED Network Policy Network Policies Information Network Policy VLAN VLAN User 2 From the Interface list select the interface with the information to view Note The list includes only the interfaces on which LLDP is enabled If no interfaces are enabled for LLDP the Interface list does not display The screen refreshes and displays the data transmitted in the Network Policy TLVs for the interface The following table describes the LLDP MED network policy information that displays on the screen 60 XS712T Smart Switch Table 14 LLDP MED network policy information Field Description Network Policy Number The policy number Application The media application type associated with the policy which can be one of the following Unknown Voice Guest Voice Guest Voice Signaling Softphone Voice Video Conferencing Streaming Video Video Signaling A port can receive multiple application types The application information is displayed only if a network policy TLV has been transmitted from the port VLAN ID The VLAN ID associa
360. works ok jJ ewe 4 Select the Internet Protocol Version 4 TCP IPv4 option and then click Properties The Internet Protocol Version 4 TCP IPv4 Properties window displays 13 XS712T Smart Switch 5 Select Use the following IP address and set the IP address of the administrative system to an address in the 192 168 0 0 network such as 192 168 0 200 The IP address must be different from that of the switch but within the same subnet A WARNING When you change the IP address of your administrative system you lose your connection to the rest of the network Be sure to write down your current network address settings before you change them Internet Protocol Version 4 TCP IPv4 Properties General You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address IP address 168 0 200 Subnet mask 255 255 0 Default gateway 192 168 0 1 Obtain DNS server address automatically Use the following DNS server addresses Preferred DNS server Alternate DNS server E Validate settings upon exit 6 Click OK gt To configure a static address on the switch 1 Use a straight through cable to connect the Ethernet port on the administrative system directly to any port on the XS712T 2 O
361. x of the rule to delete 3 Click Delete 229 XS712T Smart Switch IP Binding Configuration When an ACL is bound to an interface all the rules that have been defined are applied to the selected interface Use the IP Binding Configuration screen to assign ACL lists to ACL Priorities and Interfaces To add IP ACL interface bindings 1 Select Security gt ACL gt Advanced gt IP Binding Configuration IP Binding Configuration Binding Configuration ACL ID Direction Inbound v Sequence Number lo 1 to 4294967295 Port Selection Table Interface Binding Status ACL Type ACL ID Name Sequence Number 2 Select an existing IP ACL in which you want to add an IP ACL interface binding from the ACL ID menu The packet filtering direction for ACL is Inbound which means the IP ACL rules are applied to traffic entering the port 3 Specify an optional sequence number to indicate the order of this access list relative to other access lists already assigned to this interface and direction A low number indicates high precedence order If a sequence number is already in use for this interface and direction then the specified access list replaces the currently attached access list using that sequence number If the sequence number is not specified by the user then a sequence number that is one greater than the highest sequence number currently in use for this interface and direction will be used The valid range is 1
362. xg12 in the Go To Interface field at the top or bottom of the table and click Go The information for the selected interface displays in the drop down lists in the table heading e To configure a group of interfaces select the check boxes for the individual interfaces that you want to configure e To configure all interfaces select the check box at the left in the table heading Configure or view the settings Description Enter the description string to be attached to a port The string can be up to 64 characters in length Port Type For most ports this field is blank Otherwise the possible values are Trunk Member The port is a member of a Link Aggregation trunk Mirrored The port is a Mirrored port Probe The port is a Monitoring port Admin Mode Use the menu to select the port control administration state which can be one of the following Enable The port can participate in the network default Disable The port is administratively down and does not participate in the network Port Speed Use the menu to select the port s speed and duplex mode If you select Auto the duplex mode and speed will be set by the auto negotiation process The 78 XS712T Smart Switch port s maximum capability full duplex and 10 Gbps will be advertised Otherwise your selection will determine the port s duplex mode and transmission rate The factory default is Auto e Physical Status Indicates the physical port
363. xpands to display additional fields at the bottom 5 SmartControlCenter METOEAR Network Maintenance Tasks Adapter Help Current Network Adapter 10 27 34 63 Device List Product MAC Address IP Address DHCP Subnet Mask Gateway FirmW XS712T 00 05 02 04 06 07 10 27 34 153 Enabled 255 255 255 0 10 27 34 1 5 2 0 11 DHCP IP Address Subnet Mask MAC 00 05 02 04 06 07 9 Enabled Gateway System Name Disabled Location Current Password ee Define the basic configuration L Cancel Jk 7 Select the Disabled radio button to disable DHCP 8 Enter the static switch IP address gateway IP address and subnet mask for the switch and then type your password Tip You must enter the current password every time you use the Smart Control Center to update the switch setting The default password is password 9 Click Apply to configure the switch with the network settings Ensure that your computer and the switch are in the same subnet Make a note of these settings for later use 11 XS712T Smart Switch Configure the Network Settings on the Administrative System If you choose not to use the Smart Control Center to configure the network information on the switch you can connect directly to the switch from an administrative system such as a computer or laptop The IP address of the administrative system must be in the same subnet as the default IP address on the switch For most networks this means you must change the
364. y Statistics Spanning Tree Port Configuration Spanning Tree Port Configuration Status VLAN Port Configuration Port Security Interface Configuration Port Security Static Port Security Dynamic Port Security Violation Status Port Access Control Configuration Port Access Control Statistics If you click the graphic but do not click a specific port the main menu displays as the following figure shows This menu contains the same option as the navigation tabs at the top of the screen Device View Device View SNMP LLDP gt gt gt gt DSen Global Configuration gt gt gt Switching Qos Monitoring Maintenance Help Interface Configuration Binding Configuration Persistent Configuration Index Statistics Help Access Every screen contains a button to launch online help which contains information to assist in configuring and managing the switch The online help screens are context sensitive For example if the IP Addressing screen is open the help topic for that screen displays if you click Help 20 XS712T Smart Switch User Defined Fields User defined fields can contain 1 to 159 characters unless otherwise noted in the field label on the configuration screen All alphanumeric and special characters can be used except for the following unless specifically noted for that feature Table 2 Disallowed characters in user defined fields Ch
365. ystem automatically detects the mode of the interface Authorized The system places the interface into an authorized state without being authenticated The interface sends and receives normal traffic without client port based authentication Unauthorized The system denies the selected interface system access by moving the interface into unauthorized state The switch cannot provide authentication services to the client through the interface MAC based The authenticator PAE sets the controlled port mode to reflect the outcome of authentication exchanges between a supplicant an authenticator and an authentication server on a per supplicant basis Guest VLAN ID This field allows the user to configure the Guest VLAN ID on the interface The valid range is 0 4093 The default value is 0 Enter 0 to reset the Guest VLAN ID on the interface Guest VLAN Period This input field allows the user to enter the Guest VLAN period for the selected port The Guest VLAN period is the value in seconds of the timer used by the Guest VLAN Authentication The Guest VLAN timeout must be a value in the range of 1 300 The default value is 90 Unathenticated VLAN ID This input field allows the user to enter the Unauthenticated VLAN Id for the selected port The valid range is 0 3965 The default value is 0 Changing the value will not change the configuration until the Apply button is pressed Enter 0 to clear the Unauthenticated VLAN Id on the in
Download Pdf Manuals
Related Search
Related Contents
MAINTENANCE - Textfiles.com s aerorefrigerants helicoides en v tenor – 09fcte Samsung PS43E490B1R manual de utilizador GT-SERIES LOUDSPEAKERS 取扱説明書 - サウンドハウス C-990ZOOM 取扱説明書 すばやく報告、直行直帰 - 株式会社エスプリ ESPRIT Samsung VP-HMX10C Kullanıcı Klavuzu Copyright © All rights reserved.
Failed to retrieve file