Powerconnect-5316m User's Guide En-Us
Powerconnect-5316m User's Guide En-Us
Powerconnect-5316m User's Guide En-Us
Users Guide
PC5316M
www.dell.com | support.dell.com
CAUTION: A CAUTION indicates a potential for property damage, personal injury, or death.
____________________
Information in this document is subject to change without notice.
2004 Dell Inc. All rights reserved.
Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell, Dell OpenManage, the DELL logo, Inspiron, Dell Precision, Dimension, OptiPlex,
PowerConnect, PowerApp, PowerVault, Axim, DellNet, and Latitude are trademarks of Dell Inc. Microsoft and Windows are
registered trademarks of Microsoft Corporation.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or
their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
October 2004
Rev. A00
Contents
1
Introduction
. . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
10
General Features . . . . . . . . . . . . . . .
MAC Address Supported Features . . . . . . .
Layer 2 Features . . . . . . . . . . . . . . .
VLAN Supported Features . . . . . . . . . . .
Spanning Tree Protocol Features. . . . . . . .
Link Aggregation . . . . . . . . . . . . . . .
Layer 3 Features . . . . . . . . . . . . . . .
Quality of Service Features . . . . . . . . . .
Ethernet Switch Module Management Features
Security Features . . . . . . . . . . . . . . .
Locked Port Support. . . . . . . . . . . . . .
Port Default Settings .
. . . . . . . . . . . .
10
11
12
13
13
14
15
15
15
17
17
. . . . . . . . . . . . . . . . . . . . . . . . . . .
18
. . . . . . . . . . . . . . . . . . . . . . .
18
. . . . . . . . . . . . . . . .
19
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
Hardware Description
Ethernet Switch Module Port Configurations
. . . . . . . . . .
19
. . . . . . . . . . . . . . . . . . . . . . . . . . .
19
LED Definitions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
20
Port LEDs .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
20
Physical Dimensions .
. . . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
21
21
21
Contents
23
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
23
Installation Precautions
Overview
Unpacking.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Package Contents . . . . . . . . . . .
Unpacking the Ethernet Switch Module
. . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . .
24
24
. . . . . . . . . . . . .
25
. . . . . . . . . . . .
25
. . . . . . . . . . . . . . . . . . . . . .
26
. . . . . . . . . . . . . . . . . . . . .
27
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
27
. . . . . . . . . . . . . . . . . . . . .
27
Installing the Ethernet Switch Module into Dell Modular Server Chassis .
Removing a Ethernet Switch Module
. .
28
. . . . . . . . . . . . . . . . . . . .
30
. . . . . . .
32
. . . . . . . . . . . .
36
. . . . . . . . . . . . . . . . . . . . . . .
37
. . . . . . . . . . . . . . . . . . . . . . . . . . .
37
38
38
38
. . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
39
. . . . . . . . . . . . . . . . . . . . . . . . . .
40
Configuration Overview
. . . . . . . . . . . . . . . . . . . . . . . . .
41
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
41
. . . . . . . . . . . . . . . . . .
42
42
24
Contents
. . . . . . . . . . . . . . . . . .
. . . . . . . . . . .
42
43
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
43
. . . . . . . . . . . . . . . . . . . . . . . . .
44
Configuring SNMP . . . . . . .
Viewing SNMP Community Tables
Advanced Configuration
. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . .
45
45
. . . . . . . . . . . . . . . . . . . . . . . . . .
46
. . . . . . . . . . . . . . .
46
. . . . . . . . . . . . . . .
48
. . . . . . . . . . . .
49
. . . . . . . . . . . . . . . . . . . . . .
49
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
50
50
50
51
51
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
51
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
. . . . . . . . . . .
. . . . . . . . . . .
. . . . . . . . . . .
. . . . . . . . . . .
. . . . . . . . . . .
. . . . . . . . . . .
. . . . . . . . . . .
51
53
53
53
54
54
57
. . . . . . . . . . . . . . . . . . . .
58
. . . . . . . . . . .
59
. . . . . . . . . . . .
. . . . . . . . . . . .
59
60
. . . . . . . . . . . . . . . . . . . . . . . . . .
60
Contents
. . . . . . . . . .
61
. . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . .
61
61
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
62
Console Connection .
Telnet Connection . .
Using the CLI
. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
67
. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
67
76
78
. . . . . . . . . . . . . . . . . . . . . . . .
79
. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . .
80
80
80
80
82
85
88
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
90
. . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . .
Contents
. . . . . . . . . . .
. . . . . . . . . . .
. . . . . . . . . . .
. . . . . . . . . . .
. . . . . . . . . . . . . . . . . .
62
62
62
63
64
65
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
90
94
96
98
102
102
103
107
108
111
. . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . .
113
115
. . . . . . . . . . . . . . . . . . . . . . .
118
. . . . . . . . . . . . . . . . .
119
. . . . . . . . . . . . . . . . . . .
121
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
121
127
131
135
137
139
141
145
. . . . . . . . . . . . . . . . . . . . . . .
151
Defining Communities .
Defining Traps . . . .
. . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . .
151
154
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
158
. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
158
159
161
163
. . . . . . . . . . . . . . . . . . . . . . .
165
Managing Files
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
. . . . . . .
165
. . . . . . . . . . . . . . . . . . . . . .
169
. . . . . . . . . .
. . . . . . . . . .
169
170
174
177
178
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
182
. . . . . . . . . . . . . . . . . . . . . .
182
188
193
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . .
Contents
. . . . . . . . . . . . . . . . . .
196
. . . . . . . . . . . . . . . . . . . . . . .
199
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
199
201
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
204
. . . . . . . . . . . . . . . . . . . . . . .
204
. . . . . . . . . . . . . . . . .
206
. . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . .
207
211
214
217
. . . . . . . . . . . . . . . . . . . . . . . . . . .
220
. . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . .
220
225
228
231
232
234
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
237
. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
238
240
. . . . . . . . . . . . . . . . . . . . . .
242
. . . . . . . . . . . . .
242
244
248
251
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
255
. . . . . . . . . . . . .
. . . . . . . . . . . . .
Viewing Statistics
Viewing Tables
. . . . . . . . . . . . .
Contents
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
255
256
257
260
261
. . . . . . . . . . . . . . . . . . . . . . . .
268
. . . . . . . . . . .
268
272
274
276
279
280
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
285
. . . . . . . . . . . . . . . . . . . . . . .
285
286
. . . . . . . . . . .
. . . . . . . . . . .
. . . . . . . . . . .
. . . . . . . . . . .
. . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . .
289
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
290
. . . . . . . . . . . . . . . . . . . . .
290
. . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . .
291
292
294
297
299
. . . . . . . . . . . . . . . . . . . . . . . . .
VLAN . . . . . . . . . . . . . . . .
Quality of Service . . . . . . . . . .
Layer 2 Multicast . . . . . . . . . .
Ethernet Switch Module Security . .
Additional Switching Features . . . .
Ethernet Switch Module Management
. . . . . . . . . . . . . . . .
301
301
301
301
302
302
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
303
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
315
Glossary
Index
. . . . . . . . . . . . . . . .
301
. . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . .
Contents
Tables
Contents
. . . . . . . . . . . . . .
Table 1-1.
Table 2-2.
. . . .
18
20
. . . . . . . . . . . . .
21
. . . . . . . . . .
21
Table 2-3.
Table 2-4.
Table 2-5.
. . . . . . . . .
22
. . . . . . . . . . . . . .
58
. . . . . . . . . . . . . . . . .
59
. . . . . . . . . . . . . . .
59
Table 5-6.
Interface Components
Table 5-7.
Led Indicators
Table 5-8.
Information Buttons
Table 5-9.
. . . . . . .
. . . . . . . . . . . . . .
Table 6-10.
Table 6-11.
Table 6-12.
Table 6-13.
Table 6-14.
Table 6-15.
Table 6-16.
Table 6-17.
Table 6-18.
Table 6-19.
Table 6-20.
Table 6-21.
Table 6-22.
Table 6-23.
Table 6-24.
60
69
. . . . . . . . . .
76
. . . . . . . . . . . . .
77
. . . . . . . . . . . . . . .
79
. . . . .
82
. . . . . . .
85
. . . . . . . . . . .
88
. . . . . . . . .
89
. . . . . . . . . . . . . . .
91
. . . . . .
93
. . . . . . . . .
95
. . . . . . . . . .
97
. . . . . . . .
101
. . . . . . . . .
103
. . . . .
106
. . . . . . . .
108
. . . . . . . . . . .
110
Table 6-25.
Table 6-26.
Table 6-27.
. . . . . . .
112
Table 6-28.
. . . . . . .
115
Table 6-29.
. . . . . . . . . .
118
Table 6-30.
. . . . . . . .
120
Table 6-31.
. . . . . . . . .
125
Table 6-32.
. . . . . .
130
Table 6-33.
. . . . . .
133
Table 6-34.
. . . . . . .
137
Table 6-35.
. . . . . . . . . .
139
Table 6-36.
. . . . .
141
Table 6-37.
. . . . . . . . . . . .
144
Table 6-38.
. . . . . . . . .
149
Table 6-39.
. . . . . . . .
153
Table 6-40.
. . . . . . .
157
Table 6-41.
. . . . . . . . . .
161
Table 6-42.
. . . . . . . . . . . .
165
Table 6-43.
. . . . . . . . .
167
Table 7-44.
. . . . . . .
173
Table 7-45.
. . . . . . . . . .
176
Table 7-46.
. . . . . . . . .
178
Table 7-47.
. . . . . . . . . .
181
Table 7-48.
. . . . . . . .
185
Table 7-49.
. . . . . . . .
191
Table 7-50.
. . . . . . . . . .
195
Table 7-51.
. . . . . . . . . .
198
Table 7-52.
. . . . . . . . . .
201
Contents
. . . . . . . . . .
203
. . . . . . . . . . .
206
. . . . . .
209
. . . . . . . .
213
Table 7-57.
. . . . . . . .
216
Table 7-58.
. . . . . . . . . .
219
Table 7-59.
Table 7-60.
Table 7-61.
Table 7-53.
Table 7-54.
Table 7-55.
Table 7-56.
. . . . . . . . . .
223
. . . . . . . .
224
. . . . . . . . . . . .
227
. . . . .
229
. . . . . .
232
. . . . . . . . . .
234
. . . . .
235
Table 7-63.
Table 7-64.
Table 7-65.
Table 7-66.
Table 7-67.
. . . . . . . .
239
Table 7-68.
. . . . . . . .
242
Table 7-69.
. . . . . . .
244
. . . . . . . . .
245
Table 7-71.
. . . .
247
Table 7-72.
. . . .
249
Table 7-73.
Contents
222
Table 7-62.
Table 7-70.
10
. . . .
. .
250
. . . . . . . . .
252
Table 7-74.
Table 8-75.
. . . . . . . .
259
Table 8-76.
. . . . . . . .
261
Table 8-77.
. . . . . . . . .
264
Table 8-78.
. . . . . . . . .
267
Table 8-79.
. . . . . . . . .
270
Table 8-80.
. . . . . . . . . .
273
Table 8-81.
. . . . . .
275
Table 8-82.
. . . . . .
278
Table 8-83.
. . . . . .
280
Table 8-84.
. . . . . . . . . .
283
Table 8-85.
. . . . . . . . . . .
288
Table 9-86.
. . .
289
Table 9-87.
. . . . . . . . .
290
. . . . . . . . . . .
292
. . . . . . . . . .
294
Table 9-88.
Table 9-89.
Table 9-90.
Table 9-91.
. . . . . . . . .
296
. . . . . .
299
Table 9-92.
. . . . . .
300
Figure 1-1.
. . . . . . . . .
10
Figure 2-2.
. . . . . . . . .
19
Figure 2-3.
. . .
20
Figure 2-4.
. . . . . . . . . . . . . . . .
22
Figure 3-5.
. . . . . . .
25
Figure 3-6.
Figures
. . . . . .
26
. . . . . . . . . . . . . . . . . . .
27
. . . .
28
Figure 3-7.
Caution Label
Figure 3-8.
Contents
11
Figure 3-9.
Figure 3-10.
Figure 3-11.
12
Contents
. . . .
29
. . . . . . . . . . . .
31
. . . .
32
. . . . . . . .
42
. . . . . . . . .
59
. . . . . . . . . . . . . . . . . .
61
. . . . . . . . . . . . . . . . . . . . . .
69
. . . . . . . . . . . . . . . . . . . . . . .
70
. . . . . . . . . . . . . . .
75
. . . . . . . . . . . . . . . . . . . . .
79
. . . . . . . . . . . . . . . . . . . . . . .
80
Figure 4-12.
Figure 5-13.
Figure 5-14.
Port Indicators
Figure 6-15.
System
Figure 6-16.
Asset
Figure 6-17.
Time Synchronization
Figure 6-18.
Versions
Figure 6-19.
Reset
Figure 6-20.
. . . . . . . . . . . . . . .
83
Figure 6-21.
SNTP Authentication
. . . . . . . . . . . . . . .
85
Figure 6-22.
. . . . . . . . . . . . . .
86
Figure 6-23.
. . . . . . . . . . . . .
86
Figure 6-24.
SNTP Servers .
. . . . . . . . . . . . . . . . . .
88
Figure 6-25.
. . . . . . . . . . . . . . . . .
89
Figure 6-26.
. . . . . . . . . . . . . . . .
89
Figure 6-27.
. . . . . . . . . . . . . .
94
Figure 6-28.
. . . . . . . . . . . . . . . . . .
96
Figure 6-29.
. . . . . . . . . . . . . . . . . . .
99
Figure 6-30.
Figure 6-31.
Figure 6-32.
Figure 6-33.
Figure 6-34.
. . . . . . . . . . .
101
. . . . . . . . . . . . . . . .
102
. . . . . . . . . . . .
103
IP Interface Parameters
. . . . . . . . . . . . .
106
. . . . . . . . . . . .
107
. . . . . . . . . .
107
. . . . . . . . . . . . . . .
109
. . . . . . . . . .
111
. . . . . . . . . . . . . . . .
112
Figure 6-39.
. . . . . . . . . . . . . . . .
112
Figure 6-40.
. . . . . . . . . . . . . .
114
Figure 6-41.
. . . . . . . . . . . . . .
115
Figure 6-42.
. . . . . . . . . . . .
116
Figure 6-43.
. . . . . . . . . . .
116
Figure 6-44.
ARP Settings
. . . . . . . . . . . . . . . . . .
118
Figure 6-45.
. . . . .
121
Figure 6-46.
Access Profiles
. . . . . . . . . . . . . . . . .
124
Figure 6-47.
. . . . . . . . . . . . . .
125
Figure 6-48.
. . . . . . . . . . .
126
Figure 6-49.
. . . . . . . . . . . . . . .
127
Figure 6-50.
Authentication Profiles
. . . . . . . . . . . . .
130
Figure 6-51.
Figure 6-52.
Figure 6-53.
Figure 6-35.
Figure 6-36.
DHCP IP Interface .
Figure 6-37.
Figure 6-38.
. . . . . . . . . . .
131
. . . . . . . . . .
132
Select Authentication
. . . . . . . . . . . . . .
133
Figure 6-54.
. . . . . . . . . . . . . .
137
Figure 6-55.
. . . . . . . . . . . . . . . .
138
Figure 6-56.
. . . . . . . . . . . . . . . .
138
Figure 6-57.
Line Password
. . . . . . . . . . . . . . . . .
140
Figure 6-58.
Enable Password
. . . . . . . . . . . . . . . .
142
Figure 6-59.
TACACS+ Settings
. . . . . . . . . . . . . . .
144
Figure 6-60.
. . . . . . . . . . . . . . .
145
Figure 6-61.
TACACS+ Table
. . . . . . . . . . . . . . . . .
146
Figure 6-62.
RADIUS Settings
. . . . . . . . . . . . . . . .
148
Contents
13
14
Contents
. . . . . . . . . . . . . . .
Figure 6-63.
Figure 6-64.
Figure 6-65.
SNMP Community .
Figure 6-66.
Figure 6-67.
Community Table
Figure 6-68.
Figure 6-69.
Figure 6-70.
Figure 6-71.
Figure 6-72.
Figure 6-73.
Copy Files .
Figure 6-74.
General Settings
Figure 7-75.
Figure 7-76.
Figure 7-77.
Multiple Hosts
Figure 7-78.
150
. . . . . . . . . . . . . .
150
. . . . . . . . . . . . . . .
153
. . . . . . . . . . . . .
154
. . . . . . . . . . . . . . . .
155
. . . . . . . . . . . . . .
157
. . . . . . . . . . . . . . .
158
. . . . . . . . . . . . . .
159
. . . . . . . . . . .
162
. . . . . . . . . . . . . .
164
. . . . . . . . . . . . . . . . . . .
166
. . . . . . . . . . . . . . . .
168
. . . . . . . . . . .
172
. . . . . . . .
174
. . . . . . . . . . . . . . . . .
176
. . . . . . . . . . . . . .
178
Figure 7-79.
Authenticated Users
. . . . . . . . . . . . . .
179
Figure 7-80.
. . . . . . . . . . .
180
Figure 7-81.
Port Security
. . . . . . . . . . . . . . . . . .
181
Figure 7-82.
. . . . . . . . . . . . . . .
183
Figure 7-83.
Port Configuration .
. . . . . . . . . . . . . . .
185
Figure 7-84.
. . . . . . . . . . . .
187
Figure 7-85.
LAG Configuration .
. . . . . . . . . . . . . . .
191
Figure 7-86.
Figure 7-87.
Storm Control
Figure 7-88.
Figure 7-89.
Port Mirroring .
Figure 7-90.
. . . . . . . . . . . .
192
. . . . . . . . . . . . . . . . . .
195
. . . . . . . . . .
196
. . . . . . . . . . . . . . . . .
198
. . . . . . . . . . . . . .
200
. . . . . . . . . . . .
203
. . . . . . . . . . . . . . . . . .
205
. . . . . . . . . . . . . . .
208
. . . . . . . . . . . . . . . .
212
Figure 7-95.
. . . . . . . . . . . . . . . .
216
Figure 7-96.
. . . . . . . . . . .
218
Figure 7-97.
VLAN Membership
. . . . . . . . . . . . . . .
221
Figure 7-98.
. . . . . . . . . . . . . . .
226
Figure 7-99.
. . . . . . . . . . . . . . . .
228
Figure 7-100.
Protocol Group
. . . . . . . . . . . . . . . . .
231
Figure 7-101.
. . . . . . . . . . . . . . .
233
Figure 7-102.
. . . . . . . . . . . .
234
Figure 7-103.
LACP Parameters
. . . . . . . . . . . . . . . .
238
Figure 7-104.
LAG Membership
. . . . . . . . . . . . . . . .
240
Figure 7-105.
Figure 7-106.
Figure 7-107.
Figure 7-108.
Figure 7-109.
IGMP Snooping
Figure 8-110.
Utilization Summary
Figure 8-111.
Counter Summary
Figure 8-112.
Figure 7-91.
Figure 7-92.
GARP Timers
Figure 7-93.
Figure 7-94.
. . . . . . . . . .
242
. . . . . . . . . . . . .
244
. . . . . . . . . . .
245
. . . . . . . . . .
248
. . . . . . . . . . . . . . . . .
250
. . . . . . . . . . . . . . .
256
. . . . . . . . . . . . . . . .
257
Interface Statistics
. . . . . . . . . . . . . . .
258
Figure 8-113.
Etherlike Statistics
. . . . . . . . . . . . . . .
260
Figure 8-114.
GVRP Statistics
. . . . . . . . . . . . . . . . .
263
Figure 8-115.
EAP Statistics .
. . . . . . . . . . . . . . . . .
266
Figure 8-116.
RMON Statistics
. . . . . . . . . . . . . . . .
268
Figure 8-117.
. . . . . . . . . . . . . .
272
Figure 8-118.
. . . . . . . . . . . . . .
274
Contents
15
. . . . . . . . . . . . . .
277
. . . . . . . . . . . . . . . .
279
. . . . . . . . . . . . . . . . .
281
. . . . . . . . . . . . . . .
282
Port Statistics .
. . . . . . . . . . . . . . . . .
285
Figure 8-124.
LAG Statistics .
. . . . . . . . . . . . . . . . .
287
Figure 9-125.
. . . . . . . . . . . . . . .
293
Figure 9-126.
Interface Settings
. . . . . . . . . . . . . . . .
295
Figure 9-127.
. . . . . . . . . . . . . .
297
Figure 9-128.
. . . . . . . . . .
300
Figure 1-1.
. . . . . . . . .
10
Figure 2-2.
. . . . . . . . .
19
Figure 2-3.
. . .
20
Figure 2-4.
. . . . . . . . . . . . . . . .
22
Figure 3-5.
. . . . . . .
25
Figure 3-6.
Figure 8-119.
Figure 8-120.
Figure 8-121.
RMON Alarms
Figure 8-122.
Figure 8-123.
. . . . . . . . . . . . . . . . . . .
27
Caution Label
Figure 3-8.
. . . .
28
Figure 3-9.
. . . .
29
. . . .
31
. . . .
32
. . . . . . . .
40
. . . . . . . . .
57
. . . . . . . . . . . . . . . . . .
59
. . . . . . . . . . . . . . . . . . . . . .
67
Figure 3-11.
Contents
26
Figure 3-7.
Figure 3-10.
16
. . . . . .
Figure 4-12.
Figure 5-13.
Figure 5-14.
Port Indicators
Figure 6-15.
System
. . . . . . . . . . . . . . . . . . . . . . .
68
. . . . . . . . . . . . . . .
73
. . . . . . . . . . . . . . . . . . . . .
77
. . . . . . . . . . . . . . . . . . . . . . .
78
. . . . . . . . . . . . . . .
81
Figure 6-21.
SNTP Authentication
. . . . . . . . . . . . . . .
83
Figure 6-22.
. . . . . . . . . . . . . .
84
Figure 6-23.
. . . . . . . . . . . . .
84
Figure 6-24.
SNTP Servers .
. . . . . . . . . . . . . . . . . .
86
Figure 6-25.
. . . . . . . . . . . . . . . . .
87
Figure 6-26.
. . . . . . . . . . . . . . . .
87
Figure 6-27.
. . . . . . . . . . . . . .
92
Figure 6-28.
. . . . . . . . . . . . . . . . . .
94
Figure 6-29.
. . . . . . . . . . . . . . . . . . .
97
Figure 6-30.
. . . . . . . . . . . .
99
Figure 6-31.
Figure 6-32.
Figure 6-33.
Figure 6-16.
Asset
Figure 6-17.
Time Synchronization
Figure 6-18.
Versions
Figure 6-19.
Reset
Figure 6-20.
. . . . . . . . . . . . . . . .
100
. . . . . . . . . . . .
101
IP Interface Parameters
. . . . . . . . . . . . .
104
Figure 6-34.
. . . . . . . . . . . .
105
Figure 6-35.
. . . . . . . . . .
105
Figure 6-36.
DHCP IP Interface .
. . . . . . . . . . . . . . .
107
Figure 6-37.
. . . . . . . . . .
109
Figure 6-38.
. . . . . . . . . . . . . . . .
109
Figure 6-39.
. . . . . . . . . . . . . . . .
110
Figure 6-40.
. . . . . . . . . . . . . .
112
Figure 6-41.
. . . . . . . . . . . . . .
113
Figure 6-42.
. . . . . . . . . . . .
114
Figure 6-43.
. . . . . . . . . . .
114
Contents
17
18
Contents
. . . . . . . . . . . . . . . . . .
116
. . . . .
119
. . . . . . . . . . . . . . . . .
122
. . . . . . . . . . . . . .
123
. . . . . . . . . . .
124
. . . . . . . . . . . . . . .
125
. . . . . . . . . . . . .
128
Figure 6-44.
ARP Settings
Figure 6-45.
Figure 6-46.
Access Profiles
Figure 6-47.
Figure 6-48.
Figure 6-49.
Figure 6-50.
Authentication Profiles
Figure 6-51.
Figure 6-52.
Figure 6-53.
. . . . . . . . . . .
129
. . . . . . . . . .
130
Select Authentication
. . . . . . . . . . . . . .
131
Figure 6-54.
. . . . . . . . . . . . . .
135
Figure 6-55.
. . . . . . . . . . . . . . . .
136
Figure 6-56.
. . . . . . . . . . . . . . . .
136
Figure 6-57.
Line Password
. . . . . . . . . . . . . . . . .
138
Figure 6-58.
Enable Password
. . . . . . . . . . . . . . . .
140
Figure 6-59.
TACACS+ Settings
. . . . . . . . . . . . . . .
142
Figure 6-60.
. . . . . . . . . . . . . . .
143
Figure 6-61.
TACACS+ Table
. . . . . . . . . . . . . . . . .
144
Figure 6-62.
RADIUS Settings
. . . . . . . . . . . . . . . .
146
Figure 6-63.
. . . . . . . . . . . . . . .
148
Figure 6-64.
Figure 6-65.
SNMP Community .
Figure 6-66.
Figure 6-67.
Community Table
Figure 6-68.
Figure 6-69.
Figure 6-70.
Figure 6-71.
. . . . . . . . . . . . . .
148
. . . . . . . . . . . . . . .
151
. . . . . . . . . . . . .
152
. . . . . . . . . . . . . . . .
153
. . . . . . . . . . . . . .
155
. . . . . . . . . . . . . . .
156
. . . . . . . . . . . . . .
157
. . . . . . . . . . .
160
. . . . . . . . . . . . . .
162
. . . . . . . . . . . . . . . . . . .
164
. . . . . . . . . . . . . . . .
166
Figure 6-72.
Figure 6-73.
Copy Files .
Figure 6-74.
General Settings
Figure 7-75.
Figure 7-76.
Figure 7-77.
Multiple Hosts
Figure 7-78.
. . . . . . . . . . .
170
. . . . . . . .
172
. . . . . . . . . . . . . . . . .
175
. . . . . . . . . . . . . .
176
Figure 7-79.
Authenticated Users
. . . . . . . . . . . . . .
177
Figure 7-80.
. . . . . . . . . . .
178
Figure 7-81.
Port Security
. . . . . . . . . . . . . . . . . .
179
Figure 7-82.
. . . . . . . . . . . . . . .
181
Figure 7-83.
Port Configuration .
. . . . . . . . . . . . . . .
183
Figure 7-84.
. . . . . . . . . . . .
185
Figure 7-85.
LAG Configuration .
. . . . . . . . . . . . . . .
189
Figure 7-86.
Figure 7-87.
Storm Control
Figure 7-88.
Figure 7-89.
Port Mirroring .
Figure 7-90.
Figure 7-91.
Figure 7-92.
GARP Timers
Figure 7-93.
Figure 7-94.
. . . . . . . . . . . .
191
. . . . . . . . . . . . . . . . . .
194
. . . . . . . . . .
195
. . . . . . . . . . . . . . . . .
197
. . . . . . . . . . . . . .
199
. . . . . . . . . . . .
202
. . . . . . . . . . . . . . . . . .
204
. . . . . . . . . . . . . . .
207
. . . . . . . . . . . . . . . .
211
Figure 7-95.
. . . . . . . . . . . . . . . .
215
Figure 7-96.
. . . . . . . . . . .
218
Figure 7-97.
VLAN Membership
. . . . . . . . . . . . . . .
221
Figure 7-98.
. . . . . . . . . . . . . . .
226
Figure 7-99.
. . . . . . . . . . . . . . . .
228
Contents
19
20
Contents
. . . . . . . . . . . . . . . . .
231
. . . . . . . . . . . . . . .
233
. . . . . . . . . . . .
234
LACP Parameters
. . . . . . . . . . . . . . . .
238
Figure 7-104.
LAG Membership
. . . . . . . . . . . . . . . .
241
Figure 7-105.
Figure 7-106.
Figure 7-107.
Figure 7-108.
Figure 7-109.
IGMP Snooping
Figure 8-110.
Utilization Summary
Figure 8-111.
Counter Summary
Figure 8-112.
Figure 7-100.
Protocol Group
Figure 7-101.
Figure 7-102.
Figure 7-103.
. . . . . . . . . .
243
. . . . . . . . . . . . .
245
. . . . . . . . . . .
246
. . . . . . . . . .
249
. . . . . . . . . . . . . . . . .
251
. . . . . . . . . . . . . . .
256
. . . . . . . . . . . . . . . .
257
Interface Statistics
. . . . . . . . . . . . . . .
258
Figure 8-113.
Etherlike Statistics
. . . . . . . . . . . . . . .
260
Figure 8-114.
GVRP Statistics
. . . . . . . . . . . . . . . . .
263
Figure 8-115.
EAP Statistics .
. . . . . . . . . . . . . . . . .
266
Figure 8-116.
RMON Statistics
. . . . . . . . . . . . . . . .
268
Figure 8-117.
. . . . . . . . . . . . . .
272
Figure 8-118.
. . . . . . . . . . . . . .
274
Figure 8-119.
. . . . . . . . . . . . . .
277
Figure 8-120.
. . . . . . . . . . . . . . . .
279
Figure 8-121.
RMON Alarms
. . . . . . . . . . . . . . . . .
281
Figure 8-122.
. . . . . . . . . . . . . . .
282
Figure 8-123.
Port Statistics .
. . . . . . . . . . . . . . . . .
285
Figure 8-124.
LAG Statistics .
. . . . . . . . . . . . . . . . .
287
Figure 9-125.
. . . . . . . . . . . . . . .
291
Figure 9-126.
Interface Settings
. . . . . . . . . . . . . . . .
293
Figure 9-127.
. . . . . . . . . . . . . .
295
. . . . . . . . . .
298
. . . . . . . . . . . .
299
Figure 9-128.
Figure 9-129.
Contents
21
22
Contents
Introduction
NOTICE: Before proceeding, read the release notes for this product. The release notes can be
downloaded from support.dell.com.
This Users Guide contains the information needed for installing, configuring and maintaining the
Ethernet Switch Module.
External ports 6 external RJ-45 connectors for 10/100/1000 Base-T copper ports (uplinks)
used for connecting Server Modules to the network.
Internal ports 10 internal ports connected to Server Modules through the Dell Modular
Server Chassis mid-plane. On every Internal Port the speed is fixed to 1000 Mbps.
The console connection to the Ethernet Switch Module is provided only through the DRAC/MC.
No access point is provided on the Ethernet Switch Module front panel. For debugging and
management purposes, a UART bus of each Ethernet Switch Module is connected to the
DRAC/MC. The DRAC/MC can re-direct the serial console interface to only one switch at a time.
The Ethernet Switch Module receives a power supply (12 V dc) through the mid-plane. A single
system LED indicates the Ethernet Switch Module status, which is controlled by the DRAC/MC.
The following figure illustrates the PowerConnect 5316M:
Introduction
www.dell.com | support.dell.com
Figure 1-1.
Features
This section describes the Ethernet Switch Module user-configured features. For a complete list of
all updated Ethernet Switch Module features, see the latest software version Release Notes.
General Features
Head of Line Blocking
Head of Line (HOL) blocking results in traffic delays and frame loss caused by traffic competing
for the same egress port resources. HOL blocking queues packets, and the packets at the head of
the queue are forwarded before packets at the end of the queue. By default HOL blocking is active
at all times except when QoS, Flow Control, or Back Pressure is active on a port, the HOL blocking
prevention mechanism is disabled on the whole system.
Flow Control Support (IEEE 802.3X)
Flow control enables lower speed Ethernet Switch Modules to communicate with higher speed
Ethernet Switch Modules, by requesting that the higher speed Ethernet Switch Module refrains
from sending packets. Transmissions are temporarily halted to prevent buffer overflows.
For information on configuring Flow Control for ports or LAGs, see "Defining Port Parameters" or
"Defining LAG Parameters."
Back Pressure Support
On half-duplex links, the receiving port prevents buffer overflows by occupying the link so that it is
unavailable for additional traffic.
For information on configuring Back Pressure for ports or LAGs, see "Defining Port Parameters" or
"Defining LAG Parameters."
Jumbo Frames Support
Jumbo frames are frames with an MTU size of up to 10K bytes, and better utilize the network by
transporting the same data using less frames.
The main benefits of this facility are reduced transmission overhead, and reduced host processing
overhead. Jumbo are used for server-to-server transfers.
For information on enabling Jumbo Frames, see "Configuring System Information."
10
Introduction
VCT detects and reports copper link cabling occurrences, such as open cables and cable shorts.
MDI/MDIX Support
The Ethernet Switch Module automatically detects whether the cable connected to an RJ-45 port
is crossed or straight through.
Standard wiring for end stations is Media-Dependent Interface (MDI) and the standard wiring for
hubs and switches is known as Media-Dependent Interface with Crossover (MDIX).
For information on configuring MDI/MDIX for ports or LAGs, see "Defining Port Parameters" or
"Defining LAG Parameters."
Auto Negotiation
Auto negotiation allows an Ethernet Switch Module to advertise modes of operation. The auto
negotiation function provides the means to exchange information between two Ethernet Switch
Modules that share a point-to-point link segment, and to automatically configure both Ethernet
Switch Modules to take maximum advantage of their transmission capabilities.
The Ethernet Switch Module supports up to 4K MAC addresses. The Ethernet Switch Module
reserves specific MAC addresses for system use.
Static MAC Entries
MAC entries can be manually entered in the Bridging Table, as an alternative to learning them
from incoming frames. These user-defined entries are not subject to aging, and are preserved across
resets and reboots.
For more information, see "Configuring Address Tables."
Self-Learning MAC Addresses
The Ethernet Switch Module enables automatic MAC address learning from incoming packets.
The MAC addresses are stored in the Bridging Table.
Automatic Aging for MAC Addresses
MAC addresses from which no traffic is received for a given period are aged out. This prevents the
Bridging Table from overflowing.
For more information on configuring the MAC Address Age Out Time, see "Configuring Address
Tables."
Introduction
11
www.dell.com | support.dell.com
Multicast service is a limited broadcast service, which allows one-to-many and many-to-many
connections for information distribution. Layer 2 Multicast service is where a single frame is
addressed to a specific Multicast address, from where copies of the frame are transmitted to the
relevant ports.
For more information, see "Multicast Forwarding Support."
Layer 2 Features
IGMP Snooping
IGMP Snooping examines IGMP frame contents, when they are forwarded by the Ethernet Switch
Module from work stations to an upstream Multicast router. From the frame, the Ethernet Switch
Module identifies work stations configured for Multicast sessions, and which Multicast routers are
sending Multicast frames.
For more information, see "IGMP Snooping."
Port Mirroring
Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing
packets from a monitored port to a monitoring port. Users specify which target port receives copies
of all traffic passing through a specified source port.
For more information, see "Defining Port Mirroring Sessions."
Broadcast Storm Control
Storm Control enables limiting the amount of Multicast and Broadcast frames accepted and
forwarded by the Ethernet Switch Module.
When Layer 2 frames are forwarded, Broadcast and Multicast frames are flooded to all ports on the
relevant VLAN. This occupies bandwidth, and loads all nodes connected on all ports.
For more information, see "Enabling Storm Control."
12
Introduction
VLANs are collections of switching ports that comprise a single broadcast domain. Packets are
classified as belonging to a VLAN based on either the VLAN tag or based on a combination of the
ingress port and packet contents. Packets sharing common attributes can be grouped in the same
VLAN.
For more information, see "Configuring VLANs."
Port Based Virtual LANs (VLANs)
Port-based VLANs classify incoming packets to VLANs based on their ingress port.
For more information, see "Defining VLAN Ports Settings."
IEEE802.1V Protocol Based Virtual LANs (VLANs)
VLAN classification rules are defined on data-link layer (Layer 2) protocol identification. Protocolbased VLANs isolate Layer 2 traffic for differing Layer 3 protocols.
For more information, see "Defining VLAN Protocol Groups."
Full 802.1Q VLAN Tagging Compliance
IEEE 802.1Q defines an architecture for virtual bridged LANs, the services provided in VLANs and
the protocols and algorithms involved in the provision of these services. An important requirement
included in this standard is the ability to mark frames with a desired Class of Service (CoS) tag
value (0-7).
GVRP Support
GARP VLAN Registration Protocol (GVRP) provides IEEE 802.1Q-compliant VLAN pruning and
dynamic VLAN creation on 802.1Q trunk ports. When GVRP is enabled, the Ethernet Switch
Module registers and propagates VLAN membership on all ports that are part of the active
underlying "Spanning Tree Protocol Features" on page 13 topology.
For more information, see "Configuring GVRP."
802.1d Spanning tree is a standard Layer 2 switch requirement that allows bridges to automatically
prevent and resolve L2 forwarding loops. Switches exchange configuration messages using
specifically formatted frames and selectively enable and disable forwarding on ports.
For more information, see "Configuring the Spanning Tree Protocol."
Introduction
13
www.dell.com | support.dell.com
Fast Link
STP can take up to 30-60 seconds to converge. During this time, STP detects possible loops,
allowing time for status changes to propagate and for relevant Ethernet Switch Modules to
respond. 30-60 seconds is considered too long of a response time for many applications. The Fast
Link option bypasses this delay, and can be used in network topologies where forwarding loops do
not occur.
For more information enabling Fast Link for ports and LAGs, see "Defining STP Port Settings" or
"Defining STP LAG Settings."
IEEE 802.1w Rapid Spanning Tree
Spanning Tree can take 30-60 seconds for each host to decide whether its ports are actively
forwarding traffic. Rapid Spanning Tree (RSTP) detects uses of network topologies to enable faster
convergence, without creating forwarding loops.
For more information, see "Configuring Rapid Spanning Tree."
Link Aggregation
For more information, see "Aggregating Ports."
Link Aggregation
Up to six Aggregated Links may be defined, each with up to six member ports, to form a single Link
Aggregated Group (LAG). This enables:
LAG is composed of ports with the same speed, set to full-duplex operation.
NOTE: Only the six external port can be added to LAG.
For more information, see "Defining LAG Membership."
Link Aggregation and LACP
LACP uses peer exchanges across links to determine, on an ongoing basis, the aggregation
capability of various links, and continuously provides the maximum level of aggregation capability
achievable between a given pair of systems. LACP automatically determines, configures, binds and
monitors the port binding to aggregators within the system.
For more information, see "Defining LACP Parameters."
14
Introduction
Layer 3 Features
Address Resolution Protocol (ARP)
The Address Resolution Protocol (ARP) converts IP addresses into physical addresses, and maps
the IP address to a MAC address. ARP allows a host to communicate with other hosts only when
the IP address of its neighbors is known.
For more information, see "Configuring ARP."
TCP
Transport Control Protocol (TCP). TCP connections are defined between 2 ports by an initial
synchronization exchange. TCP ports are identified by an IP address and a 16-bit port number.
Octets streams are divided into TCP packets, each carrying a sequence number.
BootP and DHCP Clients
DHCP enables additional setup parameters to be received from a network server upon system
startup. DHCP service is an on-going process. DHCP is an extension to BootP.
For more information on DHCP, see "Defining DHCP IP Interface Parameters."
The IEEE 802.1p signaling technique is an OSI Layer 2 standard for marking and prioritizing
network traffic at the data link/MAC sub-layer. 802.1p traffic is classified and sent to the
destination. No bandwidth reservations or limits are established or enforced. 802.1p is a spin-off of
the 802.1Q (VLANs) standard. 802.1p establishes eight levels of priority, similar to the IP
Precedence IP Header bit-field.
For more information, see "Configuring Quality of Service."
The system logs events with severity codes and timestamps. Events are sent as SNMP traps to a
Trap Recipient List.
For more information on SNMP Alarms and Traps, see "Defining SNMP Parameters."
SNMP Version 1 and Version 2
Simple Network Management Protocol (SNMP) over the UDP/IP protocol controls access to the
system, a list of community entries is defined, each of which consists of a community string and its
access privileges. There are 3 levels of SNMP security read-only, read-write and super. Only a super
user can access the community table.
Introduction
15
www.dell.com | support.dell.com
With web based management, the system can be managed from any web browser. The system
contains an Embedded Web Server (EWS), which serves HTML pages, through which the system
can be monitored and configured. The system internally converts web-based input into
configuration commands, MIB variable settings and other management-related settings.
Configuration File Download and Upload
The Ethernet Switch Module configuration is stored in a configuration file. The Configuration file
includes both system wide and port specific Ethernet Switch Module configuration. The system
can display configuration files in the form of a collection of CLI commands, which are stored and
manipulated as text files.
For more information, see "Managing Files."
TFTP Trivial File Transfer Protocol
The Ethernet Switch Module supports boot image, software and configuration upload/download
via TFTP.
Remote Monitoring
Command Line Interface (CLI) syntax and semantics conform as much as possible to common
industry practice. CLI is composed of mandatory and optional elements. The CLI interpreter
provides command and keyword completion to assist user and shorten typing.
Syslog
Syslog is a protocol that enables event notifications to be sent to a set of remote servers, where they
can be stored, examined and acted upon. The system sends notifications of significant events in
real time, and keeps a record of these events for after-the-fact usage.
For more information on Syslog, see "Managing Logs."
16
Introduction
SNTP
The Simple Network Time Protocol (SNTP) assures accurate network Ethernet Switch Module
clock time synchronization up to the millisecond. Time synchronization is performed by a network
SNTP server. Time sources are established by Stratums. Stratums define the distance from the
reference clock. The higher the stratum (where zero is the highest), the more accurate the clock.
For more information, see "Configuring SNTP Settings."
Traceroute
Traceroute enables discovering IP routes that packets were forwarded along during the forwarding
process. The CLI Traceroute utility can be executed from either the user-exec or privileged modes.
Security Features
SSL
Secure Socket Layer (SSL) is an application-level protocol that enables secure transactions of data
through privacy, authentication, and data integrity. It relies upon certificates and public and private
keys.
Port Based Authentication (802.1x)
Port based authentication enables authenticating system users on a per-port basis via an external
server. Only authenticated and approved system users can transmit and receive data. Ports are
authenticated via the Remote Authentication Dial In User Service (RADIUS) server using the
Extensible Authentication Protocol (EAP).
For more information, see "Configuring Port Based Authentication."
Introduction
17
www.dell.com | support.dell.com
SSH
Secure Shell (SSH) is a protocol that provides a secure, remote connection to a Ethernet Switch
Module. SSH version 2 is currently supported. The SSH server feature enables an SSH client to
establish a secure, encrypted connection with a Ethernet Switch Module. This connection provides
functionality that is similar to an inbound telnet connection. SSH uses RSA and DSA Public Key
cryptography for Ethernet Switch Module connections and authentication.
TACACS+
TACACS+ provides centralized security for validation of users accessing the Ethernet Switch
Module. TACACS+ provides a centralized user management system, while still retaining
consistency with RADIUS and other authentication processes.
For more information, see "Defining TACACS+ Settings."
Default Setting
Flow Control
Back Pressure
Auto Negotiation
Enabled
On (disabled on ingress)
Internal Ports
Function
Default Setting
Flow control
Disabled
NOTE: The settings are fixed on the internal ports and cannot be changed.
Introduction
Hardware Description
Ethernet Switch Module Port Configurations
PowerConnect 5316M Front Panel Port Description
The PowerConnect 5316M Ethernet Switch Module contains 6 external Gigabit Ethernet
10/100/1000 Base-T ports on the front panel for connecting to a network, and 10 Gigabit Ethernet
internal ports for connecting the embedded network controllers on the PowerEdge Server Modules.
The six external Gigabit Ethernet ports can operate at 10, 100 or 1000 Mbps. These ports support
auto-negotiation, duplex mode (Half or Full duplex), and flow control. The 10 Gigabit Ethernet
ports that connect to PowerEdge Server Modules can only operate at 1000 Mbps, full-duplex.
These 10 ports also support flow control.
The following figure illustrates the PowerConnect 5316M front panel.
Figure 2-2. PowerConnect 5316M Front Panel
On the front panel there are six ports which are numbered 11 to 16 from left to right. The ports are
designated as g11 to g16 for system configuration. On each port there are LEDs to indicate the port
status.
On the left side of the front panel is the System LED which indicates the Ethernet Switch Module
operational status.
Physical Dimensions
The Ethernet Switch Module has the following physical dimensions:
Height 32.2 mm
Width 129.8 mm
Hardware Description
19
www.dell.com | support.dell.com
Depth 251.2 mm
LED Definitions
The front panel contains light emitting diodes (LED) that indicate the status of links, and switch
diagnostics.
Port LEDs
10/100/1000 Base-T Port LEDs
Each 10/100/1000 Base-T port has two LEDs. Speed/link/activity is indicated on the left LED and
the duplex mode is indicated on the right LED.
Figure 2-3.
Color
Description
Left LED
Green Static
Green Flashing
Orange Static
Orange Flashing
Off
No Link.
Green
Off
Right LED
System LED
There is one system LED on the Ethernet Switch Module with dual functions, controlled by
DRAC/MC for error status reporting and Ethernet Switch Module identification. Different
flashing frequencies are used to indicate the different functions. There are two functions,
identification and error reporting, with identification having a higher priority than error reporting.
20
Hardware Description
NOTE: If there is an error and the identification function is activated, the LED still functions as an
identification LED.
The LED can only be disabled by the DRAC/MC with a 255 seconds timeout. If an error occurs,
the LED for error reporting will always be flashing and cannot be disabled.
The following table describes the system LED indications.
Table 2-3.
LED Color
Identification
Solid green
Cable
Cat.5
Hardware Description
21
www.dell.com | support.dell.com
Figure 2-4.
The RJ-45pin number allocation for the 10/100/1000 Base-T ports is listed in the following table.
Table 2-5. RJ-45 Pin Number Allocation for 10/100/1000 Base-T Ethernet Port
Pin No
Function
22
Hardware Description
TxRx 1+
TxRx 1-
TxRx 2+
TxRx 2-
TxRx 3+
TxRx 3-
TxRx 4+
TxRx 4-
Installation Precautions
CAUTION Before performing any of the following procedures, read and follow the safety
instructions located in the Product Information Guide included in the Dell Documentation.
CAUTION Observe the following points before performing the procedures in this section:
Observe and follow the service markings. Do not service any Ethernet Switch Module except
as explained in the system documentation. Opening or removing covers marked with a
triangular symbol with a lighting bolt may cause electrical shock. These components are to be
serviced by trained service technicians only.
Ensure that the Ethernet Switch Module is not exposed to radiators or heat sources.
Do not push foreign objects into the Dell Modular Server Chassis I/O Module bays, as it may
cause a fire or electric shock.
Allow the Ethernet switch module to cool before removing covers or touching internal
equipment.
Ensure that the airflow around the front, sides, and back of the Dell Modular Server Chassis is
not restricted.
Overview
The Ethernet Switch Module is installed in one of the Chassis I/O Module bays of the Dell
Modular Server Chassis. For the details on the number, types and location of the module bays, and
for additional information on the entire Modular Server System, see Dell PowerEdge 1855 Systems
User's Guide and Dell PowerEdge Installation and Troubleshooting Guide.
The process of installing an Ethernet Switch Module into a Dell Modular Server Chassis consists of
both hardware and software instructions. The process consists of three main functions: physically
installing the Ethernet Switch Module into the Dell Modular Server Chassis, connecting the RS-
23
www.dell.com | support.dell.com
232 serial port of the Dell Remote Access Controller / Modular Chassis (DRAC/MC) to the RS-232
serial port of the terminal or computer running the terminal emulation application, and finally
configuring the Ethernet Switch Module.
Once the DRAC/MC is connected to the console, the Ethernet Switch Module can be configured.
The initial configuration process consists of setting the user name and password, configuring the
static IP address, and configuring the read/write access and community strings.
After the IP address is set, the Ethernet Switch Module can be managed through the network via
Telnet, SNMP, or Web interfaces.
Unpacking
If the Ethernet Switch Modules are ordered with the Dell Modular Server Chassis, the Ethernet
Switch Modules are already installed and no unpacking is required. The unpacking procedure
applies only if an additional Ethernet Switch Module is ordered or a new unit replacing a
malfunctioning Ethernet Switch Module is received.
Package Contents
While unpacking the Ethernet Switch Module, ensure that the following items are included:
Documentation CD
24
Carefully remove the Ethernet Switch Module from the container and place it on a secure,
stable and clean surface.
Inspect the Ethernet Switch Module for damage. Report any damage immediately to Dell.
25
www.dell.com | support.dell.com
Figure 3-6.
Bay 2
Bay 1
Bay 4
Bay 3
NOTE: To maintain proper system cooling, each module bay must contain either a module or end-cap
(blank plug).
The four Chassis I/O module bays are located at the rear panel of the Dell Modular Server Chassis.
Although Ethernet Switch Module can be inserted in every I/O module bay it is important to
understand that not all of the bays are neccessarily intended for the Ethernet Switch Modules. The
usage of the bays is dependent on the system I/O requirements.
In particular, the Chassis I/O Module bays 1 and 2 are specifically intended to house the Ethernet
Switch Modules. The bays 3 and 4 should only be populated with the Ethernet Switch Modules if a
Gigabit Ethernet daughter card is installed on the Server Module(s).
26
Each of the module bays on Dell Modular Server Chassis has either a module or end-cap (blank
plug) installed.
A removed hot-swap module is replaced with an identical module or end-cap (blank plug) within 1
minute of removal.
Safety
CAUTION: Never remove the cover on a power supply or any part that has the following label
attached.
Figure 3-7. Caution Label
CAUTION: Hazardous voltage, current, and energy levels are present inside any component that has
this label attached. There are no serviceable parts inside these components. If you suspect a problem
with one of these parts, contact a service technician.
Limit your movement. Movement can cause static electricity to build up around your person.
Handle the Ethernet Switch Modules carefully, holding it by its edges or its frame.
Do not leave the Ethernet Switch Modules where others can handle and possibly damage the
Ethernet switch module.
While the Ethernet Switch Modules is still in its static-protective package, touch it to an unpainted
metal part of Dell Modular Server Chassis for at least two seconds. (This drains static electricity
from the package and from your person.)
Remove the Ethernet Switch Module from its package and install it directly into the Dell Modular
Server Chassis without setting it down. If it is necessary to set the Ethernet Switch Module down,
place it in its static-protective package. Do not place the Ethernet Switch Modules on your Dell
Modular Server Chassis or on a metal table.
27
www.dell.com | support.dell.com
Take additional care when handling Ethernet Switch Modules during cold weather because heating
reduces indoor humidity and increases static electricity.
Review and become familiar with the safety and handling guidelines specified under "Safety"
and "Handling Static Sensitive Devices."
Select a Chassis I/O Module bay in which to install the Ethernet Switch Module. In this
example, an Ethernet Switch Module is being installed in the Chassis I/O Module Bay 1. For
other modules and their positions see "Ethernet Controller Enumeration."
Remove the end-cap (blank plug) from the selected bay. Store the end-cap (blank plug) for
future use.
If not already done, touch the static-protective package that contains the Ethernet Switch
Module to an unpainted metal part of Dell Modular Server Chassis for at least two seconds.
Ensure that the release latch on the Ethernet Switch Module is in the open position
(perpendicular to the module).
Figure 3-8.
28
Slide the Ethernet Switch Module into the appropriate bay until it stops.
Push the release latch on the front of the Ethernet Switch Module to the closed position.
29
www.dell.com | support.dell.com
NOTE: Neither the Server Modules, nor the Dell Modular Server Chassis needs to be powered down to
remove a Ethernet Switch Module.
NOTE: By removing an Ethernet Switch Module, the connection to the network is broken.
NOTE: The replacement Ethernet Switch Module or an end-cap (blank plug) must be installed within 1
minute of removing an Ethernet Switch Module or an end-cap (blank plug).
To remove a Ethernet Switch Module from Dell Modular Server Chassis perform the following:
30
Review and become familiar with the safety and handling guidelines specified under "Safety"
and "Handling Static Sensitive Devices."
Select the Ethernet Switch Module to remove. In this example, an Ethernet Switch Module is
being removed from Bay 1. For other modules and their positions see "Ethernet Controller
Enumeration."
Complete any Dell Modular Server Module tasks as specified in the Dell PowerEdge 1855
Systems User's Guide and Dell PowerEdge Installation and Troubleshooting Guide.
Pull the release latch on the Ethernet Switch Module outwards (perpendicular to the
module). The Ethernet Switch Module is released from the Dell Modular Server Chassis.
Figure 3-10.
Slide the Ethernet Switch Module out of the Dell Modular Server Chassis and set it aside.
31
www.dell.com | support.dell.com
Figure 3-11. Slide the Ethernet Switch Module out of the Dell Modular Server Chassis
Place either another Ethernet Switch Module or a end-cap (blank plug) in the bay within one
minute.
For more information, see Dell PowerEdge 1855 Systems User's Guide and Dell PowerEdge
Installation and Troubleshooting Guide.
32
Connect the DB9 null-modem or cross over cable to the RS-232 serial port of the DRAC/MC
in the Dell Modular Server Chassis to the RS-232 serial port of the terminal or computer
running the terminal emulation application.
NOTE: The default data rate of the DRAC/MC is 115200. See the Dell Remote Access Controller/Modular
Chassis Users Guide to determine the current baud rate settings of the DRAC/MC.
a
Set the data format to 8 data bits, 1 stop bit, and no parity.
Select Terminal keys for Function, Arrow, and Ctrl keys. Ensure that the setting is for
Terminal keys (not Windows keys).
NOTICE: When using HyperTerminal with Microsoft Windows 2000,ensure that Windows 2000
Service Pack 2 or later is installed. With Windows 2000 Service Pack 2, the arrow keys function properly
in HyperTerminals VT100 emulation. Go to www.microsoft.com for information on Windows 2000 service
packs.
On the console monitor the DRAC/MC application displays a login screen.
2
Log in onto the DRAC/MC using the default username root and password calvin.
The DRAC/MC CLI command prompt "DRAC/MC:" is displayed.
For more information, see Dell Modular Server System User's Guide and Dell Remote Access
Controller/Modular Chassis Users Guide.
If Dell Modular Server Chassis is off then power it on using the following DRAC/MC CLI
command:
racadm chassisaction -m chassis powerup
NOTE: The Ethernet Switch Module inserted into the Chassis I/O bay is powered on automatically when
the Dell Modular Server Chassis is powered on. For further details on configuring the Dell Modular
Server Chassis via the DRAC/MC CLI interface see the Dell Remote Access Controller/Modular Chassis
User's Guide.
Power cycle the Ethernet Switch Module using the following DRAC/MC CLI command:
racadm chassisaction -m
switch-N powercycle
where N is the Chassis I/O Module bay number in which the Ethernet Switch Module is
inserted.
5
Redirect the DRAC/MC serial console to the Ethernet Switch Module internal serial console
interface. This action is performed by entering the CLI command at the command prompt of
the DRAC/MC CLI.
connect switch-N
where N is the Chassis I/O Module bay number in which the Ethernet Switch Module is
inserted.
NOTE: To switch back to the context of the DRAC/MC CLI command prompt press the following
sequence of keys: "<Enter>~."; that is, first press <Enter>, then press on tilde "~" (remember to depress the
<Shift> key if the tilde character is located in the upper register of your keyboard) and then press period
(dot) "."
33
www.dell.com | support.dell.com
For further details on configuring and using the DRAC/MC see Dell Remote Access Controller
/ Modular Chassis User's Guide.
Once the Ethernet Switch Module is connected to the console, wait until the Ethernet
Switch Module is fully booted. Observe the booting information being outputted to the
terminal window and wait for the Ethernet Switch Module CLI command prompt "console>"
to appear. Press <Enter> several times in order to ensure that the terminal connection is
successfully established and the Ethernet Switch Module can be configured through the CLI
command interface.
6
Make sure that the system LED on the Ethernet Switch Module is illuminated green and is
not flashing, which indicates that the Ethernet Switch Module is operating properly.
An output similar to the following will be displayed on the terminal window:
Remote Access Controller / Modular Chassis (DRAC/MC)
Copyright (C) 2000-2004 Dell Inc. All Rights Reserved.
Login: root
Password: ******
------ Performing the Power-On Self Test (POST) -----UART Channel Loopback Test........................PASS
Testing the System SDRAM..........................PASS
Boot1 Checksum Test...............................PASS
Boot2 Checksum Test...............................PASS
Flash Image Validation Test.......................PASS
FRU Validation Test...............................PASS
34
[DELL LOGOTYPE]
**************************************************************
*** Running SW Ver. 1.x.x.x Date 1-Oct-2004 Time xx:xx:xx ***
**************************************************************
HW version is 00.00.01
Base Mac address is: xx:xx:xx:xx:xx:xx
Dram size is : 64M bytes
Dram first block size is : 40960K bytes
Dram first PTR is : 0x1800000
Flash size is: 16M
Loading running configuration.
Loading startup configuration.
Device configuration:
Prestera based system
Slot 1 - PowerConnect 5316M
Tapi Version: v1.2.10-P1_02
35
www.dell.com | support.dell.com
console>
7
If an error is displayed, or the green system LED is flashing, stop the installation process and
contact Dell technical support.
36
Attach a one end of a twisted-pair cable to the Ethernet Switch Modules RJ-45 connector,
and the other end to a switch or server.
Make sure each twisted pair cable does not exceed 120 meters (393.7 ft.) in length.
As each connection is made, the green Link LED on the Ethernet Switch Module corresponding to
each port is illuminated indicating that the connection is valid.
For more information see "Port Connections, Cables, and Pinout Information."
Auto-Negotiation
Auto-negotiation enables automatic detection of speed, duplex mode and flow control on
switching 10/100/1000 Base-T ports. Auto-negotiation is enabled per port by default.
Auto-negotiation is a mechanism established between two link partners to enable a port to
advertise its transmission rate, duplex mode and flow control (the flow control default is disabled)
abilities to its partner. The ports then both operate at the highest common denominator between
them.
If connecting a Ethernet Switch Module to an external switch port that does not support autonegotiation or is not set to auto-negotiation, both the Ethernet Switch Module switching port and
the external switch port must be manually set to the same speed and duplex mode.
If connecting a regular computer NIC (Network Interface Card) to the External Switch Ports, both
should be either configured to Auto Negotiation, or to the same speed and duplex mode, manually.
Meaning, if one of the NIC is configured to 1000/Full Duplex, the same configuration should apply
to the External Switch Port.
37
www.dell.com | support.dell.com
MDI/MDIX
The Ethernet Switch Module supports auto-detection of straight through and crossed cables on all
switching 10/100/1000 Base-T ports. The feature is enabled when Auto-negotiation is enabled, and
auto MDI/MDIX is automatically disabled if the auto-negotiation is disabled. In this scenario, the
correct cable must be used.
When the MDI/MDIX (Media Dependent Interface with Crossover) is enabled, the automatic
correction of errors in cable selection is possible, making the distinction between a straight through
cable and a crossover cable irrelevant. (The standard wiring for end stations is known as MDI
(Media Dependent Interface), and the standard wiring for hubs and switches is known as MDIX.)
Flow Control
The Ethernet Switch Module supports IEEE 802.3x Flow Control for ports configured with the
Full Duplex mode. By default, this feature is disabled. It can be enabled per port. The flow control
mechanism allows the receiving side to signal to the transmitting side that transmission must
temporarily be halted to prevent buffer overflow.
Back Pressure
The Ethernet Switch Module supports back pressure for ports configured to Half Duplex mode. By
default, this feature is disabled. It can be enabled per port. The back pressure mechanism prevents
the transmitting side from transmitting additional traffic temporarily. The receiving side may
occupy a link so it becomes unavailable for additional traffic.
38
Introduction
Its important to understand the Ethernet Switch Module architecture and the Dell Modular
Server System architecture when configuring the Ethernet Switch Module. See "PowerConnect
5316M and the Dell Modular Server System."
The installation and configuration process is illustrated in the following figure.
39
www.dell.com | support.dell.com
Configuration Overview
Before assigning a static IP address to the Ethernet Switch Module, obtain the following
information:
An IP address that has been allocated to the Ethernet Switch Module in order for it to be
configured.
Network mask.
40
NOTE: After making any configuration changes, the new configuration must be saved before rebooting.
To save the configuration, enter:
console# copy running-config startup-config
Initial Configuration
NOTE: Before proceeding, read the release notes for this product. The release notes can be
downloaded from Dell support website at support.dell.com.
NOTE: The initial simple configuration uses the following assumptions:
The PowerConnect Ethernet Switch Module was never configured before, and is in the same state
as when it was received.
The connection to Ethernet Switch Module via the serial console port of the DRAC/MC was
established and the CLI command prompt is displayed on the screen of the teminal or in the window
of the terminal emulation application (press the <Enter> key several times to verify that the prompt
displays correctly).
The Ethernet Switch Module is not configured with a default user name and password.
The initial Ethernet Switch Module configuration is through the DRAC/MC Serial port. After the
initial configuration, the Ethernet Switch Module can then be managed either from the already
connected DRAC/MC Serial port or remotely through an interface defined during the initial
configuration.
The initial configuration consists of the following:
Setting the user name admin, password as secret with the highest privilege level of 15.
41
www.dell.com | support.dell.com
Before applying the initial configuration procedure to the Ethernet Switch Module, the following
information must be obtained from the network administrator:
The IP address to be assigned to a VLAN through which the Ethernet Switch Module is
managed.
console> enable
console# configure
console(config)# username admin password secret level 15
console(config)# interface vlan 1
console(config-if)# ip address 192.168.1.123 255.255.255.0
console(config-if)# exit
42
Type
Activity status
---------------------
------------
------------------
192.168.1.1
Static
Active
IP address
Interface
Type
-------------------
------------
------------
192.168.1.123/24
VLAN 1
Static
User Name
To manage the Ethernet Switch Module remotely, for example through SSH, Telnet, or the Web
interface, a user name must be configured. To gain complete administrative control over the
Ethernet Switch Module the highest privilege (15) must be specified.
NOTE: Only the administrator (super-user) with the highest privilege level (15) is allowed to manage the
Ethernet Switch Module through the Web browser interface.
It allows access via IP interfaces. It also allows access to the device via HTTP and HTTPS.
For more information about the privilege level, see the CLI Reference Guide.
The configured user name is entered as a login name for remote management sessions. To
configure user name admin with password abc and highest privilege level, enter the command at
the system prompt as shown in the configuration example:
console> enable
console# configure
console(config)# username admin password abc level 15
43
www.dell.com | support.dell.com
Read Only Indicates that the community members can view configuration
information, but cannot change any information.
Read/Write Indicates that the community members can view and modify
configuration information.
Configurable IP address. If IP address is not configured, all community members with the
same community name are granted the same access rights.
Common practice is to use two community strings for the Ethernet Switch Module one (public
community) with read-only access and the other (private community) with read-write access. The
public string allows authorized management stations to retrieve MIB objects, while the private
string allows authorized management stations to retrieve and modify MIB objects.
During initial configuration, it is recommended to configure the Ethernet Switch Module
according to the network administration requirements, in accordance with using an SNMP-based
management station.
44
Configuring SNMP
To configure SNMP station IP address and community string(s) for the general Ethernet Switch
Module router tables:
1
At the console prompt, enter the command Enable. The prompt is displayed as #.
In the configuration mode, enter the SNMP configuration command with the parameters
including community name (private), community access right (read and write) and IP
address, as shown in the example below:
console# configure
config(config)# snmp-server community private rw 11.1.1.2
At the console prompt, enter the command exit. The prompt is displayed as # (Privilege
EXEC mode).
In the Privileged EXEC mode, enter the show command as shown in the example below:
Console# show snmp
Community-String
Community-Access
IP address
---------------
----------------
-----------------------------
public
readonly
All
private
readwrite
172.16.1.1
private
readwrite
172.17.1.1
Trap-Rec-Community
public
Version
2
45
www.dell.com | support.dell.com
Trap-Rec-Address
176.16.8.9
Trap-Rec-Community
public
Version
2
Advanced Configuration
This section provides information about dynamic allocation of IP addresses and security
management based on the authentication, authorization, and accounting (AAA) mechanism, and
includes the following topics:
When configuring/receiving IP addresses through DHCP and BOOTP, the configuration received
from these servers includes the IP address, and may include subnet mask and default gateway.
Select and connect any external port to a DHCP server or to a subnet that has a DHCP server
on it, in order to retrieve the IP address.
Enter the following commands to use the selected port for receiving the IP address. In the
following example, the commands are based on the port type used for configuration.
46
console(config-if)# exit
console(config)#
To verify the IP address, enter the show ip interface command at the system prompt as shown
in the following example.
47
www.dell.com | support.dell.com
Type
Activity status
---------------------
------------
------------------
10.7.1.1
DHCP
Active
IP address
Interface
Type
-------------------
------------
------------
10.7.1.192/24
VLAN 1
DHCP
10.7.2.192/24
g11
DHCP
NOTE: It is not necessary to delete the Ethernet Switch Module configuration to retrieve an IP address
from the DHCP server.
NOTE: When copying configuration files, avoid using a configuration file that contains an instruction to
enable DHCP on an interface that connects to the same DHCP server, or to one with an identical
configuration. In this instance, the Ethernet Switch Module retrieves the new configuration file and boots
from it. The Ethernet Switch Module then enables DHCP as instructed in the new configuration file, and
the DHCP instructs it to reload the same file again.
Select and connect any port to a BOOTP server or subnet containing such a server, to retrieve
the IP address.
At the system prompt, enter the delete startup configuration command to delete the Startup
Configuration from flash.
The Ethernet Switch Module reboots with no configuration and in 60 seconds starts sending
BOOTP requests. The Ethernet Switch Module receives the IP address automatically.
NOTE: When the Ethernet Switch Module reboot begins, any input at the ASCII terminal or keyboard
automatically cancels the BOOTP process before completion and the Ethernet Switch Module does not
receive an IP address from the BOOTP server.
48
Terminal
Telnet
SSH
HTTP
HTTPS
NOTE: Passwords are user-defined.
49
www.dell.com | support.dell.com
NOTE: When creating a user name, the default priority is 1, which allows access but not configuration
rights. A priority of 15 must be set to enable access and configuration rights to the Ethernet Switch
Module. Although user names can be assigned privilege level 15 without a password, it is recommended
to always assign a password. If there is no specified password, privileged users can access the Web
interface with any password.
When initially logging on to a Ethernet Switch Module through a terminal session, enter
george at the password prompt.
When changing a Ethernet Switch Modules mode to enable, enter george at the password
prompt.
When initially logging onto a Ethernet Switch Module through a Telnet session, enter bob
at the password prompt.
When initially logging onto a Ethernet Switch Module through a SSH session, enter jones
at the password prompt.
Startup Menu
Startup Menu Procedures
The procedures called from the Startup menu cover software download, flash handling and
password recovery.
The Startup menu can be entered when booting the Ethernet Switch Module a user input must
be entered immediately after the POST test.
To enter the Startup menu:
1
The Ethernet Switch Module is powered on (power is cycled) or reset via the CLI or Web user
interface and the POST is displayed.
**************************************************
***************** SYSTEM RESET *****************
**************************************************
51
www.dell.com | support.dell.com
When the auto-boot message appears, press <Enter> to get the Startup menu. The Startup
menu procedures can be done using the ASCII terminal or Windows HyperTerminal.
NOTE: The terminal baud rate in the menu item [5] above pertains to the internal serial connection speed
between the Ethernet Switch Module and DRAC/MC. This speed is fixed to 9600 and must not be
changed.
See the Dell Remote Access Controller/Modular Chassis Users Guide to determine the current baud rate
settings of the DRAC/MC external console serial port.
NOTE: When selecting an option form the Startup menu, time out must be taken into account: if no
selection is made within 35 seconds (default), the Ethernet Switch Module times out. This default value
can be changed through CLI.
Technical support personnel only can operate the Diagnostics Mode. For this reason, "Enter
Diagnostics Mode" is not described in this guide.
Software Download
The software download procedure is performed when a new version must be downloaded to replace
the corrupted files, update or upgrade the system software.
To download software from the Startup menu:
1
From the Startup menu, press [1]. The following prompt appears:
When using the HyperTerminal, click Transfer on the HyperTerminal Menu Bar.
In the Filename field, enter the file path for the file to be downloaded.
From the Startup menu, press [2] to erase flash file. The following message is displayed:
53
www.dell.com | support.dell.com
Enter config as the name of the flash file. The configuration is erased and the Ethernet
Switch Module reboots.
Password Recovery
If a password is lost, the Password Recovery procedure can be called from the Startup menu. The
procedure enables entry to the Ethernet Switch Module once without password.
To recover a lost password for the local terminal only:
1
The Ethernet Switch Module boots and runs when decompressing the system image from the flash
memory area where a copy of the system image is stored. When a new image is downloaded, it is
saved in the other area allocated for the other system image copy.
On the next boot, the Ethernet Switch Module will decompress and run the currently active system
image unless chosen otherwise.
To download a system image through the TFTP server:
1
Ensure that an IP address is configured on one of the Ethernet Switch Module ports and
pings can be sent to a TFTP server.
Make sure that the file to be downloaded is saved on the TFTP server (the ros file).
Enter show version command to verify which software version is currently running on the
Ethernet Switch Module. The following is an example of the information that appears:
console# show version
SW version 1.0.0.42 (date 22-Jul-2004 time 13:42:41)
Boot version 1.0.0.18 (date 01-Jun-2004 time 15:12:20)
HW version
54
Enter show bootvar command to verify which system image is currently active. The
following is an example of the information that appears:
Exclamation symbols indicate that a copying process is in progress. Each symbol (!) corresponds to
512 bytes transferred successfully. A period indicates that the copying process is timed out. Many
periods in a row indicate that the copying process failed.
6
Select the image for the next boot by entering the boot system command. After this
command, enter show bootvar command to verify that the copy indicated as a parameter
in the boot system command is selected for the next boot.
55
www.dell.com | support.dell.com
Loading a new boot image from the TFTP server and programming it into the flash updates the
boot image. The boot image is loaded when the Ethernet Switch Module is powered on. A user has
no control over the boot image copies. To download a boot image through the TFTP server:
1
Ensure that an IP address is configured on one of the Ethernet Switch Module ports and
pings can be sent to a TFTP server.
Ensure that the file to be downloaded is saved on the TFTP server (the rfb file).
Enter show version command to verify which software version is currently running on the
Ethernet Switch Module. The following is an example of the information that appears:
console# show version
SW version 1.0.0.42 (date 22-Jul-2004 time 13:42:41)
Boot version 1.0.0.18 (date 01-Jun-2004 time 15:12:20)
HW version 00.00.01 (date 01-May-2004 time 12:12:20)
Enter y.
The Ethernet Switch Module reboots.
56
Tree View Located on the left side of the home page, the tree view provides an expandable
view of the features and their components.
Switch Module View Located on the right side of the home page, the Ethernet Switch
Module view provides a view of the Ethernet Switch Module, an information or table area,
and configuration instructions.
Table 5-6 lists the interface components with their corresponding numbers.
57
www.dell.com | support.dell.com
Description
58
Figure 5-14.
Port Indicators
The port coloring indicates if a specific port is currently active. Ports can be the following colors:
Table 5-7.
Led Indicators
LED Color
Description
Green
Red
Blue
NOTE: The Port LEDs are not reflected in PowerConnect front panel in the PowerConnect OpenManage
Switch Administrator. LED status can only be determined by viewing the actual Ethernet Switch Module.
For more information about LEDs, see "LED Definitions."
Information Buttons
Information buttons provide access to on-line support and online help, as well as information
about the OpenManage Switch Administrator interfaces.
Table 5-8.
Information Buttons
Button
Description
Support
Help
About
59
www.dell.com | support.dell.com
Description
Log Out
Description
Apply Changes
Add
Telnet
Query
Queries tables.
Show All
Draw
Enter the Ethernet Switch Module IP address (as defined in the CLI) in the address bar and
press <Enter>.
For information about assigning an IP address to the Ethernet Switch Module, see "Static IP
Address and Subnet Mask."
60
When the Enter Network Password window opens, enter a user name and password.
NOTE: The Ethernet Switch Module is not configured with a default password, and can be configured
without entering a password. For information about recovering a lost password, see Password
Recovery."
NOTE: Passwords are both case sensitive and alpha-numeric.
4
Click OK.
The Dell PowerConnect OpenManage Switch Administrator home page opens.
Console Connection
1
Power on the Ethernet Switch Module and wait until the startup is complete.
When the console> prompt displays, type enable and press <Enter>.
Configure the Ethernet Switch Module and enter the necessary commands to complete the
required tasks.
When finished, exit the session with the quit or exit command.
NOTE: If a different user logs into the system in the Privilege EXEC command mode, the current user is
logged off and the new user is logged in.
Telnet Connection
Telnet is a terminal emulation TCP/IP protocol. ASCII terminals can be virtually connected to the
local a switch module through a TCP/IP protocol network. Telnet is an alternative to a local login
terminal where a remote login is required.
The Ethernet Switch Module supports up to four simultaneous Telnet sessions. All CLI commands
can be used over a telnet session.
To start a Telnet session in a Microsoft Windows Environment:
1
In the Run window, type Telnet <IP address> in the Open field.
61
www.dell.com | support.dell.com
62
When a password prompt displays, enter the password and press <Enter>.
The Privileged EXEC mode prompt displays as the Ethernet Switch Module host name
followed by #. For example:
console#
To list the Privileged EXEC commands, type a question mark at the command prompt and
press <Enter>.
To return from Privileged EXEC Mode to User EXEC Mode use any of the following
commands: disable, exit/end, or <Ctrl><Z>.
The following example illustrates accessing Privileged EXEC mode and then returning to the User
EXEC mode:
console>enable
Enter Password: ******
console#
console#disable
console>
Use the exit command to move back to a previous mode. For example, from Interface
Configuration mode to Global Configuration mode, and from Global Configuration mode to
Privileged EXEC mode.
63
www.dell.com | support.dell.com
The VLAN mode contains commands to create, delete, and configure a VLAN. The following is an
example of the VLAN mode prompt:
console# vlan database
console(config-vlan)#
Port Channel Mode
The Port Channel mode contains commands for configuring LAG. The following is an example of
the Port Channel mode prompt:
console(config)# interface port-channel 1
console(config-if)#
NOTE: Only external ports can be aggregated link group members.
Interface Mode
The Interface mode contains commands that configure the interface. The Global Configuration
mode command interface ethernet is used to enter the interface configuration mode. The
following is an example of the Interface mode prompt:
console# configure
console(config)# interface ethernet g11
console(config-if)#
Management Access List
The Management Access List mode contains commands to define management access-lists. The
Global Configuration mode command management access-list is used to enter the
Management Access List Configuration mode.
The following example shows how to create an access-list called "mlist", configure two management
interfaces ethernet g11 and ethernet g16, and activates the access-list:
console(config)# management access-list mlist
console(config-macl)# permit ethernet g11
console(config-macl)# permit ethernet g16
console(config-macl)# exit
64
From the SSH Public Key mode, enter commands to specify client SSH public keys.
The Global Configuration mode command crypto key pubkey-chain ssh is used to enter
the SSH Public Key-chain Configuration mode.
The following example enters the SSH Public Key-chain configuration mode:
console(config)# crypto key pubkey-chain ssh
console(config-pubkey-chain)#
CLI Examples
CLI commands are provided as configuration examples. For a full description of the CLI
commands, including examples, see the CLI Reference Guide included on the Documentation CD.
65
www.dell.com | support.dell.com
66
67
www.dell.com | support.dell.com
System Name (0-160 Characters) Defines the user-defined switch module name.
System Contact (0-160 Characters) Specifies the name of the contact person.
System Location (0-160 Characters) The location where the system is currently running.
MAC Address Specifies the switch module MAC address.
Sys Object ID The vendor's authoritative identification of the network management subsystem
contained in the entity.
Service Tag The service reference number used when servicing the switch module.
Asset Tag (0-16 Characters) Specifies the user-defined switch module reference.
Serial No. The switch module serial number.
Date (DD/MMM//YY) The current date. The format is day, month, year, for example,
10/NOV/02 is November 10, 2002.
Time (HH:MM:SS) Specifies the time. The format is hour, minute, second, for example,
20:12:03 is eight twelve and three seconds in the evening.
System Up Time Specifies the amount of time since the last switch module reset. The system
time is displayed in the following format: Days, Hours, Minutes and Seconds. For example, 41 days,
2 hours, 22 minutes and 15 seconds.
68
Click Telnet.
A Telnet session is initiated.
The following table summarizes the equivalent CLI commands for viewing and setting fields
displayed in the Asset page.
Table 6-10.
CLI Command
Description
hostname name
clock set hh:mm:ss day month Manually sets the system clock and date.
year
show clock [detail]
show system id
show system
asset-tag text
69
www.dell.com | support.dell.com
console# exit
console(config)# asset-tag 1qwepot
console> clock set 13:32:00 7 Dec 2004
console> show clock
13:32:00 (UTC+0) Dec 7 2004
No time source
console# show system
System
Description:
Ethernet Switch
System Up Time
(days,hour:min:sec):
0,00:04:17
System Contact:
spk
System Name:
DELL Switch
System Location:
R&D
System MAC
Address:
00:10:b5:f4:00:01
1.3.6.1.4.1.674.10895.30
00
The Time Synchronization page contains fields for defining system time parameters for both the
local hardware clock, and the external SNTP clock. If the system time is kept using an external
SNTP clock, and the external SNTP clock fails, the system time reverts to the local hardware clock.
Daylight Savings Time can be enabled on the switch module. The following is a list of Daylight
Time start and end times in specific countries:
70
Brazil From the 3rd Sunday in October until the 3rd Saturday in March. During the period
of Daylight Saving Time, Brazilian clocks go forward one hour in most of the Brazilian
southeast.
Chile Easter Island 9th March 12th October. The first Sunday in March or after 9th
March.
Canada From the first Sunday in April until the last Sunday of October. Daylight Saving
Time is usually regulated by provincial and territorial governments. Exceptions may exist in
certain municipalities.
Cuba From the last Sunday of March to the last Sunday of October.
71
www.dell.com | support.dell.com
Mexico From the first Sunday in April at 02:00 to the last Sunday in October at 02:00.
New Zealand From the first Sunday in October until the first Sunday on or after 15th
March.
Slovak Republic Last weekend of March until the last weekend of October.
South Africa South Africa does not operate Daylight Saving Time.
United Kingdom Last weekend of March until the last weekend of October.
United States of America From the first Sunday in April at 02:00 to the last Sunday in
October at 02:00.
For more information on SNTP, see "Configuring SNTP Settings" on page 79.
To open the Time Synchronization page, click System General Time Synchronization in the
tree view.
72
Figure 6-17.
Time Synchronization
Clock Source
Clock Source The source used to set the system clock. The possible field values:
SNTP Specifies that the system time is set via an SNTP server. For more information, see
"Configuring SNTP Settings" on page 79.
None Specifies that the system time is not set by an external source.
Local Settings
Date Defines the system date. The field format is DD:MMM:YY, for example, 04 May 50.
Local Time Defines the system time. The field format is HH:MM:SS, for example, 21:15:03.
Time Zone Offset The difference between Greenwich Mean Time (GMT) and local time. For
example, the Time Zone Offset for Paris is GMT +1, while the local time in New York is GMT 5.
There are two types of daylight settings, either by a specific date in a particular year or a recurring
setting irrespective of the year. For a specific setting in a particular year complete the Daylight
Savings area, and for a recurring setting, complete the Recurring area.
Daylight Savings Enables the Daylight Savings Time (DST) on the switch module based on the
switch modules location. The possible field values are:
USA The switch module switches to DST at 2 a.m. on the first Sunday of April, and reverts
to standard time at 2 a.m. on the last Sunday of October.
Configuring System Information
73
www.dell.com | support.dell.com
European The switch module switches to DST at 1:00 am on the last Sunday in March
and reverts to standard time at 1:00 am on the last Sunday in October. The European option
applies to EU members, and other European countries using the EU standard.
Other The DST definitions are user-defined based on the switch module locality. If Other
is selected, the From and To fields must be defined.
Time Set Offset (1-1440) For non USA and European countries, the amount of time for DST
can be set in minutes. The default time is 60 minutes.
From Defines the time that DST begins in countries other than USA or Europe, in the format
DD/MMM/YY in one field and time in another. For example, if DST begins on the 25th October
2007 5:00 am, the two fields are defined as 25/Oct/07 and 5:00. The possible field values are:
Date The date at which DST begins. The possible field range is 1-31.
Month The month of the year in which DST begins. The possible field range is Jan-Dec.
Year The year in which the configured DST begins.
Time The time at which DST begins. The field format is Hour:Minute, for example, 05:30.
To Defines the time that DST ends in countries other than USA or Europe in the format
DD/MMM/YY in one field and time in another. For example, DST ends on the 23rd March 2008
12:00 am, the two fields are defined as 23/Mar/08 and 12:00. The possible field values are:
Date The date at which DST ends. The possible field range is 1-31.
Month The month of the year in which DST ends. The possible field range is Jan-Dec.
Year The year in which the configured DST ends.
Time The time at which DST starts. The field format is Hour:Minute, for example, 05:30.
Recurring Defines the time that DST starts in countries other than USA or European where the
DST is constant year to year. The possible field values are:
From Defines the time that DST begins each year. For example, DST begins locally every
second Sunday in April at 5:00 am. The possible field values are:
Day The day of the week from which DST begins every year. The possible field range is
Sunday-Saturday.
Week The week within the month from which DST begins every year. The possible field
range is 1-5.
Month The month of the year in which DST begins every year. The possible field range is
Jan-Dec.
Time The time at which DST begins every year. The field format is Hour:Minute, for
example, 02:10.
To Defines the recurring time that DST ends each year. For example, DST ends locally every
fourth Friday in October at 5:00 am. The possible field values are:
74
Day The day of the week at which DST ends every year. The possible field range is SundaySaturday.
Week The week within the month at which DST ends every year. The possible field range
is 1-5.
Month The month of the year in which DST ends every year. The possible field range is
Jan-Dec.
Time The time at which DST ends every year. The field format is Hour:Minute, for
example, 05:30.
Selecting a Clock Source
1
The following table summarizes the equivalent CLI commands for setting fields displayed in the
Time Synchronization page.
NOTE: The following steps must be completed before setting the summer clock:
75
www.dell.com | support.dell.com
clock summer-time
76
Figure 6-18.
Versions
Software Version The current software version running on the switch module.
Boot Version The current Boot version running on the Ethernet Switch Module.
Hardware Version The current Ethernet Switch Module hardware version.
Displaying Switch Module Versions Using the CLI
The following table summarizes the equivalent CLI commands for viewing fields displayed in the
Versions page.
Table 6-12.
CLI Command
Description
show version
77
www.dell.com | support.dell.com
HW version x.x.x
NOTE: Save all changes to the Startup Configuration file before resetting the switch module. This
prevents the current switch module configuration from being lost. For more information about saving
Configuration files, see "Managing Files" on page 158.
Resetting the Switch Module
78
Click Reset.
Click OK.
The switch module is reset. After the switch module is reset, a prompt for a user name and
password displays.
The following table summarizes the equivalent CLI commands for performing a reset of the switch
module via the CLI:.
Table 6-13.
CLI Command
Description
reload
Unicast
Anycast
Broadcast
Time sources are established by Stratums. Stratums define the accuracy of the reference clock. The
higher the stratum (where zero is the highest), the more accurate the clock. The switch module
receives time from stratum 1 and above.
The following is an example of stratums:
Stratum 0 A real time clock is used as the time source, for example, a GPS system.
Stratum 1 A server that is directly linked to a Stratum 0 time source is used. Stratum 1
time servers provide primary network time standards.
79
www.dell.com | support.dell.com
Stratum 2 The time source is distanced from the Stratum 1 server over a network path. For
example, a Stratum 2 server receives the time over a network link, via NTP, from a Stratum 1
server.
Information received from SNTP servers is evaluated based on the Time level and server type.
SNTP time definitions are assessed and determined by the following time levels:
T1 The time at which the original request was sent by the client.
T2 The time at which the original request was received by the server.
80
Figure 6-20.
Poll Interval (60-86400) Defines the interval (in seconds) at which the SNTP server is polled for
Unicast information.
Receive Broadcast Servers Updates Listens to the SNTP servers for Broadcast server time
information on the selected interfaces, when enabled.
Receive Anycast Servers Updates Polls the SNTP server for Anycast server time information,
when enabled. If both the Receive Anycast Servers Update, and the Receive Broadcast Servers
Update fields are enabled, the system time is set according the Anycast server time information.
Receive Unicast Servers Updates Polls the SNTP server for Unicast server time information,
when enabled. If the Receive Broadcast Servers Updates, Receive Anycast Servers Updates, and
the Receive Unicast Servers Updates fields are all enabled, the system time is set according the
Unicast server time information.
Send Unicast Requests Sends SNTP Unicast forwarding information to the SNTP server, when
enabled.
81
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for setting fields displayed in the
SNTP Global Settings page.
Table 6-14. SNTP Global Parameters CLI Commands
CLI Command
Description
82
Figure 6-21.
SNTP Authentication
SNTP Authentication Enables authenticating an SNTP session between the switch module and
an SNTP server, when enabled.
Encryption Key ID Defines the Key Identification used to authenticate the SNTP server and
switch module. The field value is up to 4294967295 characters.
Authentication Key (1-8 Characters) The key used for authentication.
Trusted Key Specifies the encryption key used (Unicast/Anycast) or elected (Broadcast) to
authenticate the SNTP server.
Remove Removes selected ID keys when checked.
Adding an SNTP Authentication Key
1
Click Add.
The Add Authentication Key page opens:
83
www.dell.com | support.dell.com
84
The following table summarizes the equivalent CLI commands for setting fields displayed in the
SNTP Authentication page.
Table 6-15.
CLI Command
Description
sntp authenticate
sntp authentication-key
number md5 value
85
www.dell.com | support.dell.com
SNTP Server Enter a user-defined SNTP server IP address. Up to eight SNTP servers can be
defined.
Poll Interval Enables polling the selected SNTP Server for system time information, when
enabled.
Encryption Key ID Specifies the Key Identification used to communicate between the SNTP
server and switch module. The range is 1 - 4294967295.
Preference The SNTP server providing SNTP system time information. The possible field values
are:
Primary The primary server provides SNTP information.
Secondary The backup server provides SNTP information.
Status The operating SNTP server status. The possible field values are:
Up The SNTP server is currently operating normally.
Down Indicates that a SNTP server is currently not available. For example, the SNTP
server is currently not connected or is currently down.
In progress The SNTP server is currently sending or receiving SNTP information.
Unknown The progress of the SNTP information currently being sent is unknown. For
example, the Ethernet switch module is currently looking for an interface.
86
Last Response The last time a response was received from the SNTP server.
Offset Timestamp difference between the switch module local clock and the acquired time
from the SNTP server.
Delay The amount of time it takes to reach the SNTP server.
Remove Removes a specific SNTP server from the SNTP Servers list, when selected.
Adding an SNTP Server
1
Click Add.
The Add SNTP Server page opens:
Figure 6-25.
Figure 6-26.
87
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for setting fields displayed in the
Add SNTP Server page.
Table 6-16. SNTP Server CLI Commands
CLI Command
Description
sntp server ipConfigures the switch module to use SNTP to
address|hostname [poll] [key request and accept NTP traffic from a server.
keyid]
Click Add.
The Add SNTP Interface page.
The following table summarizes the equivalent CLI commands for setting fields displayed in the
SNTP Broadcast Interface Table.
NOTE: When defining Anycast or Broadcast interfaces, at least one IP Address must be defined.
Table 6-17.
CLI Command
Description
The following is an example of the CLI commands for configuring SNTP interfaces:
89
www.dell.com | support.dell.com
Polling
Encryption Key
-----------
--------
-----------------
176.1.1.8
Enabled
176.1.8.179
Disabled
Disabled
Managing Logs
The Logs page contains links to various log pages. To open the Logs page, click System Logs in
the tree view.
90
Table 6-18.
Severity Type
Severity Level
Description
Emergency
Alert
Critical
Error
Warning
Notice
Informational
Debug
The Global Log Parameters page contains fields for defining which events are recorded to which
logs. It contains fields for enabling logs globally, and parameters for defining log parameters. The
Severity log messages are listed from the highest severity to the lowest. To open the Global Log
Parameters page, click System Logs Global Parameters in the tree view.
91
www.dell.com | support.dell.com
Logging Enables switch module global logs for Cache, File, and Server Logs. Console logs are
enabled by default.
Severity The following are the available severity logs:
Emergency The highest warning level. If the switch module is down or not functioning
properly, an emergency log message is saved to the specified logging location.
Alert The second highest warning level. An alert log is saved if there is a serious switch
module malfunction, for example, an attempt was made to download a non-existing
configuration file.
Critical The third highest warning level. A critical log is saved if a critical switch module
malfunction occurs, for example, two Ethernet switch module ports are not functioning,
while the rest of the switch module ports remain functional.
Error A switch module error has occurred, for example, a copy operation has failed.
Warning The lowest level of a switch module warning. For example, the Ethernet switch
module is functioning, but a port link is currently down.
Notice Provides switch module information.
Informational Provides switch module information. For example, a port is currently up.
Debug Provides debugging messages.
92
NOTE: When a severity level is selected, all severity level choices above the selection are selected
automatically.
The Global Log Parameters page also contains check boxes which correspond to a distinct logging
system:
Console The minimum severity level from which logs are sent to the console.
RAM Logs The minimum severity level from which logs are sent to the Log File kept in RAM
(Cache).
Log File The minimum severity level from which logs are sent to the Log File kept in FLASH
memory.
Enabling Logs:
1
Select the log type and log severity in the Global Log Parameters check boxes.
The following table summarizes the equivalent CLI commands for setting fields displayed in the
Global Log Parameters page.
Table 6-19.
CLI Command
Description
logging on
logging {ip-address |
hostname} [port port]
[severity level] [facility
facility] [description text]
clear logging
Clears logs.
93
www.dell.com | support.dell.com
94
Viewing and Clearing the RAM Log Table Using the CLI Commands
The following table summarizes the equivalent CLI commands for viewing and clearing fields
displayed in the RAM Log Table.
Table 6-20.
CLI Command
Description
show logging
clear logging
Clears logs.
95
www.dell.com | support.dell.com
96
Figure 6-29.
The following table summarizes the equivalent CLI commands for viewing and setting fields
displayed in the Log File Table.
Table 6-21.
CLI Command
Description
97
www.dell.com | support.dell.com
98
Figure 6-30.
99
www.dell.com | support.dell.com
Click Add.
The Add a Log Server page opens:
100
The following table summarizes the equivalent CLI command for working with remote server logs.
Table 6-22.
CLI Command
Description
no logging
show logging
101
www.dell.com | support.dell.com
102
The following table summarizes the equivalent CLI commands for setting fields displayed in the
Default Gateway page.
Table 6-23.
CLI Command
Description
Defining IP Interfaces
The IP Interface Parameters page contains fields for assigning IP parameters to interfaces. To open
the IP Interface Parameters page, click System IP Addressing IP Interface Parameters in the
tree view.
103
www.dell.com | support.dell.com
Click Add.
The Add a Static IP Interface page opens:
104
Figure 6-34.
Deleting IP Addresses
1
Figure 6-35.
105
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for setting fields displayed in the
IP Interface Parameters page.
Table 6-24. IP Interface Parameters CLI Commands
CLI Command
Description
Removes an IP address
106
DHCP IP Interface
Interface The specific interface connected to the switch module. Click the option button next
to Port, LAG, or VLAN and select the interface connected to the switch module.
Host Name The system name. This field can contain up to 20 characters.
Remove When selected, removes DHCP clients.
Adding DHCP Clients
1
Click Add.
The Add DHCP IP Interface page opens.
107
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for defining DHCP clients.
Table 6-25. DHCP IP Interface CLI Commands
CLI Command
Description
ip address dhcp
[hostname host-name]
Figure 6-37.
Click Add.
The Add DNS Server page opens:
Figure 6-38.
109
www.dell.com | support.dell.com
The following table summarizes the CLI commands for configuring switch module system
information.
Table 6-26. DNS Server CLI Commands
CLI Command
Description
110
Table 6-26.
CLI Command
Description
no ip name-server serveraddress
ip domain-name name
ip domain-lookup
111
www.dell.com | support.dell.com
Default Domain Name (1-158 characters) Contains a user-defined DNS domain name server.
When selected, the DNS domain name is the default domain.
Remove When selected, removes a selected domain.
Defining DNS Domain Names Using the CLI Commands
The following table summarizes the CLI commands for configuring DNS domain names.
Table 6-27. DNS Domain Name CLI Commands
112
CLI Command
Description
ip domain-name name
no ip domain-name
Host Name Contains a Host Name list. Host Names are defined in the Add Host Name
Mapping page. Each host provides one IP address. The field values for the Host Name field are:
IP Address (X.X.X.X) Provides an IP address that is assigned to the specified host name.
Type The IP address type. The possible field values are:
Dynamic The IP address was created dynamically.
Static The IP address is a static IP address.
Remove Host Name Mapping When checked, removes the DNS Host Mapping.
113
www.dell.com | support.dell.com
Click Add.
The Add Host Name Mapping page opens:
114
The following table summarizes the equivalent CLI commands for mapping Domain Host names
to IP addresses.
Table 6-28.
CLI Command
Description
no ip host name
Configuring ARP
The Address Resolution Protocol (ARP) converts IP addresses into physical addresses (maps the IP
address to a MAC address). ARP allows a host to communicate with other hosts only when the IP
address of its neighbors is known. To open the ARP Settings page, click System IP Addressing
ARP in the tree view.
115
www.dell.com | support.dell.com
Global Settings Select this option to activate the fields for ARP global settings.
ARP Entry Age Out (1-40000000) For all Ethernet switch module s, the amount of time
(seconds) that passes between ARP requests about an ARP table entry. After this period, the entry
is deleted from the table. The range is 1 - 40000000. The default value is 60000 seconds.
Clear ARP Table Entries The type of ARP entries that are cleared on all Ethernet switch
modules. The possible values are:
None ARP entries are not cleared.
All All ARP entries are cleared.
Dynamic Only dynamic ARP entries are cleared.
Static Only static ARP entries are cleared.
ARP Entry Select this option to activate the fields for ARP settings on a single Ethernet switch
module.
Interface The interface number of the port, LAG, or VLAN that is connected to the Ethernet
switch module.
IP Address The station IP address, which is associated with the MAC address filled in below.
MAC Address The station MAC address, which is associated in the ARP table with the IP
address.
Status The ARP Table entry status. Possible field values are:
116
Click Add.
The Add ARP Entry page opens:
Select an interface.
117
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for setting fields displayed in the
ARP Settings page.
Table 6-29. ARP Settings CLI Commands
CLI Command
Description
clear arp-cache
show arp
no arp
IP address
HW address
Status
---------
----------
----------
------
g11
10.7.1.102
00:10:B5:04:DB:4B
Dynamic
g12
10.7.1.135
00:50:22:00:2A:A4
Static
118
119
www.dell.com | support.dell.com
Approximate Cable Length The approximate cable length. This test can only be performed
when the port is up and operating at 1 Gbps.
Performing a Cable Test
1
Ensure that both ends of the copper cable are connected to a Ethernet switch module.
The following table summarizes the equivalent CLI commands for performing copper cable tests.
Table 6-30. Copper Cable Test CLI Commands
CLI Command
Description
show copper-port cable- Displays the estimated copper cable length attached to a
length [interface]
port.
120
console> enable
console# test copper-port tdr g11
Cable is open at 100 meters.
console# show copper-ports tdr
Port
Result
Length [meters]
Date
----
------
---------------
----
g11
OK
100
50
g12
Short
g13
g14
Open
64
NOTE: The cable length returned is an approximation in the ranges of up to 50 meters, 50m-80m, 80m110m, 110m-120m, or more than 120m. The deviation may be up to 20 meters.
121
www.dell.com | support.dell.com
The Access Profiles page contains fields for configuring Management Lists and applying them to
specific interfaces. To open the Access Profiles page, click System Management Security
Access Profiles in the tree view.
Figure 6-46. Access Profiles
Access Profile User-defined Access Profile lists. The Access Profile list contains a default value
of Console Only. Accessing the Ethernet switch module is performed from ConsoleOnly.
Current Active Access Profile The access profile that is currently active.
Set Access Profile Active Activates an access profile.
Remove Removes an access profile from the Access Profile Name list, when selected.
Activating a Profile
1
122
Rules act as filters for determining rule priority, the switch module management method, interface
type, source IP address and network mask, and the switch module management access action.
Users can be blocked or permitted management access. Rule priority sets the order in which the
rules are implemented.
Defining Rules for an Access Profile:
1
Figure 6-47.
Access Profile Name User-defined name for the access profile. The Access Profile name can
contain up to 32 characters.
Rule Priority (1-65535) The rule priority. When the packet is matched to a rule, user groups are
either granted access or denied access to Ethernet switch module management. The rule order is
set by defining a rule number within the Profile Rules Table. The rule number is essential to
matching packets to rules, as packets are matched on a first-fit basis. The rule priorities are assigned
in the Profile Rules Table.
Management Method The management method for which the access profile is defined. Users
with this access profile can access the switch module using the management method selected.
Interface The interface type to which the rule applies. This is an optional field. This rule can be
applied to a selected port, LAG, or VLAN by selecting the check box and selecting the appropriate
option button and interface.
NOTE: Assigning an access profile to an interface denies access via other interfaces. If an access
profile is not assigned to any interface, the switch module can be accessed by all interfaces.
Configuring System Information
123
www.dell.com | support.dell.com
Source IP Address The interface source IP address for which the rule applies. This is an optional
field and indicates that the rule is valid for a subnetwork.
Network Mask The IP subnetwork mask.
Prefix Length The number of bits that comprise the source IP address prefix, or the network
mask of the source IP address.
Action Defines whether to permit or deny management access to the defined interface.
3
NOTE: The first rule must be defined to beginning matching traffic to access profiles.
1
124
NOTE: The order in which rules appear in the Profile Rules Table is important. Packets are matched to
the first rule which meets the rule criteria.
1
Figure 6-49.
Removing a Rule
1
Select a rule.
The following table summarizes the equivalent CLI commands for setting fields displayed in the
Access Profiles page.
Table 6-31.
CLI Command
Description
management access-list
name
125
www.dell.com | support.dell.com
Description
126
Locally
127
www.dell.com | support.dell.com
128
Click Add.
The Add Authentication Profile page opens:
Figure 6-51.
129
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for setting fields displayed in the
Authentication Profiles page.
Table 6-32. Authentication Profile CLI Commands
CLI Command
Description
130
Select Authentication
131
www.dell.com | support.dell.com
132
The following table summarizes the equivalent CLI commands for setting fields displayed in the
Select Authentication page.
Table 6-33.
CLI Command
Description
enable authentication
[default | list-name]
login authentication
[default | list-name]
ip http authentication
method1 [method2.]
ip https authentication
method1 [method2.]
show authentication
methods
133
www.dell.com | support.dell.com
------------------------------------------Console
Console_Login
Telnet
Default
Default
SSH
Default
Default
134
Console_Enable
135
www.dell.com | support.dell.com
Click Add.
The Add User page opens:
Deleting Users:
1
136
The following table summarizes the equivalent CLI commands for setting fields displayed in the
Local User Database page.
Table 6-34.
CLI Command
Description
137
www.dell.com | support.dell.com
Line Password for Console/Telnet/Secure Telnet (0-159 Characters) The line password for
accessing the switch module via a console, Telnet, or Secure Telnet session. Passwords can contain a
maximum of 159 characters.
Confirm Password Confirms the new line password. The password appears in the ***** format.
Defining Line Passwords for Console Sessions
1
138
The following table summarizes the equivalent CLI commands for setting fields displayed in the
Line Password page.
Table 6-35.
CLI Command
Description
password password
[encrypted]
139
www.dell.com | support.dell.com
Select Enable Access Level Access level associated with the enable password. Possible field
values are 1-15.
Password (0-159 Characters) The currently configured enable password. Enable passwords can
contain a maximum of 159 characters.
Confirm Password Confirms the new enable password. The password appears in the *****
format.
Defining a New Enable Password:
1
140
The following table summarizes the equivalent CLI commands for setting fields displayed in the
Enable Password page.
Table 6-36.
CLI Command
Description
enable password [level level] Sets a local password to control access to user and
password [encrypted]
privilege levels.
Authentication Provides authentication during login and via user names and user-defined
passwords.
The TACACS+ protocol ensures network integrity through encrypted protocol exchanges between
the switch module and TACACS+ server. To open the TACACS+ Settings page, click System
Management Security TACACS+ in the tree view.
141
www.dell.com | support.dell.com
The TACACS+ default parameters are user-defined defaults. The default settings are applied to
newly defined TACACS+ servers. If default values are not defined, the system defaults are applied
to the new TACACS+ new servers. The following are the TACACS+ defaults:
Source IP Address The default switch module source IP address used for the TACACS+ session
between the switch module and the TACACS+ server.
Key String (0-128 Characters) The default authentication and encryption key for TACACS+
communication between the switch module and the TACACS+ server.
Timeout for Reply (1-30) The default time that passes before the connection between the
switch module and the TACACS+ times out.
Adding a TACACS+ Server
1
Click Add.
The Add TACACS+ Host page opens:
Figure 6-60.
143
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for setting fields displayed in the
TACACS+ Settings page.
Table 6-37. TACACS+ CLI Commands
CLI Command
Description
144
Table 6-37.
CLI Command
Description
IP address
Status
Port
Single
TimeOut
Source IP
Priority
Connection
-----------
---------
-----
----------
----------
---------
---------
12.1.1.2
Not
49
Yes
12.1.1.1
Connected
Global values
-----------------
TimeOut : 5
Device Configuration
----------------Source IP : 0.0.0.0
console#
Telnet Access
Configuring System Information
145
www.dell.com | support.dell.com
Web Access
To open the RADIUS Settings page, click System Management Security RADIUS in the tree
view.
Figure 6-62. RADIUS Settings
146
Key String (1-128 Characters) The Key string used for authenticating and encrypting all
RADIUS communications between the switch module and the RADIUS server. This key is
encrypted.
Source IP Address Specifies the source IP address that is used for communication with RADIUS
servers.
Usage Type Specifies the server usage type. Can be one of the following values: login, 802.1x
or all. If unspecified, defaults to all.
The following fields set the RADIUS default values:
Default Timeout for Reply (1-30) Specifies the default amount of the time (in seconds) the
switch module waits for an answer from the RADIUS server before timing out.
NOTE: If host-specific Timeouts, Retries, or Dead time values are not specified, the Global values
(Defaults) are applied to each host.
Default Retries (1-10) Specifies the default number of transmitted requests sent to RADIUS
server before a failure occurs.
Default Dead time (0-2000) Specifies the default amount of time (in minutes) that a RADIUS
server is bypassed for service requests. The range is 0-2000.
Default Key String (1-128 Characters) The Default Key string used for authenticating and
encrypting all RADIUS communications between the switch module and the RADIUS server. This
key is encrypted.
Source IP Address Specifies the default source IP address that is used for communication with
RADIUS servers.
Defining RADIUS Parameters:
1
Click Add.
The Add RADIUS Server page opens:
147
www.dell.com | support.dell.com
148
The following table summarizes the equivalent CLI commands for setting fields displayed in the
RADIUS Settings page.
Table 6-38.
CLI Command
Description
radius-server timeout timeout Sets the default interval for which a switch
module waits for a server host to reply.
radius-server retransmit
retries
radius-server deadtime
deadtime
149
www.dell.com | support.dell.com
Auth
Acct TimeOu
t
Retransmi
t
Deadtim Source
e
IP
Priorit
y
Usage
--------- ----
---- ------
---------
------- -----
-------
-----
33.1.1.1
1813 6
10
0.0.0.
0
All
1646 11
Global
Global
All
1812
172.16.1. 1645
2
Global values
-------------TimeOut: 5
Retransmit: 5
Deadtime: 10
Source IP: 0.0.0.0
150
Defining Communities
Access rights are managed by defining communities in the Community Table. When the
community names are changed, access rights are also changed. To open the SNMP Community
page, click System SNMP Communities in the tree view.
Figure 6-65.
SNMP Community
151
www.dell.com | support.dell.com
Community String Functions as a password and used to authenticate the selected management
station to the switch module.
Access Mode Defines the access rights of the community. The possible field values are:
Read Only The management access is restricted to read-only, for all MIBs except the
community table, for which there is no access.
Read Write The management access is read-write, for all MIBs except the community
table, for which there is no access.
SNMP Admin The management access is read-write for all MIBs, including the
community table.
Remove Removes a community, when selected.
Defining a New Community
1
Click Add.
The Add SNMP Community page opens:
Close the Add SNMP Community page. The SNMP Community page is displayed.
152
Figure 6-67.
Community Table
Deleting Communities
1
The following table summarizes the equivalent CLI commands for setting fields displayed in the
SNMP Community page.
Table 6-39.
CLI Command
Description
snmp-server community
string [ro | rw | su] [ipaddress]
snmp-server host {ip-address Determines the trap type sent to the selected
| hostname} communityrecipient.
string [1 | 2]
show snmp
153
www.dell.com | support.dell.com
Community-Access
IP address
public_1
super
1.1.1.1
public_2
readwrite
2.2.2.2
public_3
readonly
3.3.3.3
-------------------------------------
Trap-Rec-Community
Version
-----------------
-------------------
---------
1.1.1.1
public_1
2.2.2.2
public_2
Defining Traps
From the SNMP Trap Settings page, the user can enable or disable the switch module to send
SNMP traps or notifications. To open the SNMP Trap Settings page, click System SNMP
Traps in the tree view.
154
Figure 6-68.
SNMP Trap Enables sending SNMP traps or SNMP notifications from the switch module to
defined trap recipients.
Authentication Trap Enables sending SNMP traps when authentication failed to define
recipients.
Select Recipient IP Specifies the IP address to whom the traps are sent.
Community String Identifies the community string of the trap manager.
Traps Determines the trap type sent to the selected recipient. The possible field values are:
SNMP V1 SNMP Version 1 traps are sent
SNMP V2c SNMP Version 2 traps are sent
Remove Removes Trap Manager Table entries, when selected.
Enabling SNMP traps on the Switch Module
1
Click Refresh.
155
www.dell.com | support.dell.com
Click Add.
The Add Trap Recipient page opens:
Define the fields. Configuring 0.0.0.0 means All, and the traps are Broadcast.
The Trap Recipient Table contains fields for configuring trap types.
1
156
Figure 6-70.
The following table summarizes the equivalent CLI commands for setting fields displayed in the
SNMP Trap Settings page.
Table 6-40.
CLI Command
Description
snmp-server trap
authentication
show snmp
157
www.dell.com | support.dell.com
Community-Access
IP address
-------------------------------------
-----------------------------------
-----------------------
public_1
super
1.1.1.1
public_2
readwrite
2.2.2.2
public_3
readonly
3.3.3.3
Trap-Rec-Community
Version
-----------------
-------------------
---------
1.1.1.1
public_1
2.2.2.2
public_2
Managing Files
The File Management page contains fields for managing switch module software, the Image Files,
and the Configuration Files. Files can be downloaded from a TFTP server.
158
Startup Configuration File Contains the commands required to reconfigure the switch
module to the same settings as when the switch module is powered down or rebooted. The
startup configuration file is created by copying the configuration commands from the
Running Configuration file or the Backup Configuration file to the Startup Configuration
file.
Running Configuration File Contains all Startup Configuration file commands, as well as
all commands entered during the current session. After the switch module is powered down or
rebooted, all commands stored in the Running Configuration file are lost. During the startup
process, all commands in the Startup Configuration file are copied to the Running
Configuration file and applied to the switch module. During the session, all new commands
entered are added to the commands existing in the Running Configuration file. Commands
are not overwritten. To update the Startup Configuration file, before powering down the
switch module, the Running Configuration file must be copied to the Startup Configuration
file. The next time the switch module is restarted, the commands are copied back into the
Running Configuration file from the Startup Configuration file.
Backup Configuration File Contains a backup copy of the switch module configuration.
The Backup Configuration file is generated when the Running Configuration file or the
startup configuration file is copied to the Backup Configuration file. The commands copied
into the file replace the existing commands saved in the Backup Configuration file. The
Backup Configuration file contents can be copied to either the Running Configuration or the
Startup Configuration files.
Image Files System file images are saved in two Flash Files called Image 1 and Image 2.
The active image stores the active copy, while the other image stores a second copy. The
switch module boots and runs from the active image. If the active image is corrupted, the
system automatically boots from the non-active image. This is a safety feature for faults
occurring during the Software Upgrade process.
To open the File Management page, click System File Management in the tree view. The File
Management page contains links to:
File Download
File Upload
Copy Files
Downloading Files
The File Download From Server page contains fields for downloading system image and
Configuration files from the TFTP server to the switch module. To open the File Download From
Server page, click System File Management File Download in the tree view.
159
www.dell.com | support.dell.com
Firmware Download The Firmware file is downloaded. If Firmware Download is selected, the
Configuration Download fields are grayed out.
Configuration Download The Configuration file is downloaded. If Configuration Download is
selected, the Firmware Download fields are grayed out.
Firmware Download TFTP Server IP Address The TFTP Server IP Address from which files are
downloaded.
Firmware Download Source File Name Specifies the file to be downloaded.
Firmware Download Destination File The destination file type to which the file is downloaded.
The possible field values are:
Software Image Downloads the Image file.
Boot Code Downloads the Boot file.
Active Image The Image file that is currently active.
Active Image After Reset The Image file that is active after the switch module is reset.
Configuration Download File TFTP Server IP Address The TFTP Server IP Address from
which the configuration files are downloaded.
Configuration Download Source File Name Specifies the configuration files to be downloaded.
Configuration Download Destination Name The destination file to which the configuration
file is downloaded. The possible field values are:
160
The following table summarizes the equivalent CLI commands for setting fields displayed in the
File Download From Server page.
Table 6-41.
CLI Command
Description
Uploading Files
The File Upload to Server page contains fields for uploading the software to the TFTP server from
the switch module. The Image file can also be uploaded from the File Upload to Server page. To
open the File Upload to Server page, click System File Management File Upload in the tree
view.
Configuring System Information
161
www.dell.com | support.dell.com
Firmware Upload The Firmware file is uploaded. If Firmware Upload is selected, the
Configuration Upload fields are grayed out.
Configuration Upload The Configuration file is uploaded. If Configuration Upload is selected,
the Software Image Upload fields are grayed out.
Software Image Upload TFTP Server IP Address The TFTP Server IP Address to which the
Software Image is uploaded.
Software Image Upload Destination Specifies the Software Image file path to which the file is
uploaded.
Configuration Upload TFTP Server IP Address The TFTP Server IP Address to which the
Configuration file is uploaded.
Configuration Upload Destination Specifies the Configuration file path to which the file is
uploaded.
Configuration Upload Transfer file name The software file to which the configuration is
uploaded. The possible field values are:
Running Configuration Uploads the Running Configuration file
Startup Configuration Uploads the Startup Configuration file
Backup Configuration Uploads the Backup Configuration file
162
Uploading Files
1
The following table summarizes the equivalent CLI commands for setting fields displayed in the
File Upload to Server page.
File Upload CLI Commands
CLI Command
Description
Copying Files
Files can be copied and deleted from the Copy Files page. To open the Copy Files page, click
System File Management Copy Files in the tree view.
163
www.dell.com | support.dell.com
Copy Configuration When selected, copies either the Running Configuration, Startup
Configuration or Backup Configuration files. The possible field values are:
Source Copies either the Running Configuration, Startup Configuration or Backup
Configuration files.
Destination The file to which the Running Configuration, Startup Configuration or
Backup Configuration file is copied.
Restore Configuration Factory Defaults When selected, specifies that the factory configuration
default files should be reset. When unselected, maintains the current configuration settings.
Copying Files
1
164
The following table summarizes the equivalent CLI commands for setting fields displayed in the
Copy Files page.
Table 6-42.
CLI Command
Description
delete startup-config
165
www.dell.com | support.dell.com
166
The following table summarizes the equivalent CLI commands for setting fields displayed in the
General Settings page.
Table 6-43.
CLI Command
Description
logging buffered size number Sets the number of syslog messages stored in the
internal buffer (RAM).
port jumbo-frame
167
www.dell.com | support.dell.com
168
Port based authentication enables authenticating system users on a per-port basis via a external
server. Only authenticated and approved system users can transmit and receive data. Ports are
authenticated via the RADIUS server using the Extensible Authentication Protocol (EAP). Port
Authentication includes:
Authenticators Specifies the port that is authenticated before permitting system access.
Supplicants Specifies host connected to the authenticated port requesting to access the
system services.
Authentication Server Specifies the external server, for example, the RADIUS server that
performs the authentication on behalf of the authenticator, and indicates whether the user is
authorized to access system services.
Controlled Access Permits communication between the user and the system, if the user is
authorized.
The switch module currently supports Port Based Authentication via RADIUS servers.
Advanced Port Based Authentication
Advanced Port Based Authentication enables multiple hosts to be attached to a single port.
Advanced Port Based Authentication requires only one host to be authorized for all hosts to have
system access. If the port is unauthorized all attached hosts are denied access to the network.
169
www.dell.com | support.dell.com
Advanced Port Based Authentication also enables VLAN based authentication. Specific VLANs in
the switch module are always available, even if specific ports attached to the VLAN are
unauthorized. For example, Voice over IP does not require authentication, while data traffic
requires authentication. VLANs for which authorization is not required can be defined.
Unauthenticated VLANs are available to users, even if the ports attached to the VLAN are defined
as authorized.
Advanced Port Based Authentication is implemented in the following modes:
Single Host Mode Enables only the authorized host to access the port.
Multiple Host Mode Enables multiple hosts to be attached to a single port. Only one host
must be authorized for all hosts to access the network. If the host authentication fails or an
EAPOL-logoff message is received, all attached clients are denied network access.
Port Based Authentication State Permits port based authentication on the switch module. The
possible field values are:
170
171
www.dell.com | support.dell.com
Supplicant Timeout (1-65535) The amount of time that lapses before EAP requests are resent
to the user. The field value is in seconds. The field default is 30 seconds.
Max EAP Requests (1-10) The total amount of EAP requests sent. If a response is not received
after the defined period, the authentication process is restarted. The field default is 2 retries.
Displaying the Port Based Authentication Table
1
Copy Parameters From The port from which parameters are copied.
Termination Cause The reason for which the port authentication was terminated.
Copy To Copies port parameters from one port to the selected ports.
Select All Selects all ports in the Port Based Authentication Table.
Copying Parameters in the Port Based Authentication Table
1
172
Select the Copy to check box to define the interfaces to which the Port based authentication
parameters are copied.
The following table summarizes the equivalent CLI commands for enabling the port based
authentication as displayed in the Port Based Authentication page.
.
Table 7-44.
CLI Command
Description
dot1x re-authenticate
[ethernet interface]
dot1x re-authentication
dot1x timeout supp-timeout Sets the time for the retransmission of an EAP
seconds
request frame to the client.
dot1x timeout tx-period
seconds
173
www.dell.com | support.dell.com
Description
Reauth
Control
Reauth
Period
Username
---------
---------- ----------
--------
------
--------
g11
Auto
Authorized
Ena
3600
Bob
g12
Auto
Authorized
Ena
3600
John
g13
Auto
Unauthorized
Ena
3600
Clark
g14
Force-auth Authorized
Dis
3600
n/a
174
Figure 7-77.
Multiple Hosts
Port The port number for which Advanced Port Based Authentication is enabled.
Multiple Hosts Enables or disables a single host to authorize multiple hosts for system access.
This setting must be enabled in order to either disable the ingress-filter, or to use port-lock security
on the selected port.
Action on Single Host Violation Defines the action to be applied to packets arriving in singlehost mode, from a host whose MAC address is not the client (supplicant) MAC address. The
possible field values are:
Forward Forwards the packets from an unknown source, however, the MAC address is not
learned.
Discard Discards the packets from any unlearned source. This is the default value.
Discard Shutdown Discards the packet from any unlearned source and shuts down the
port. Ports remain shut down until they are activated, or the switch module is reset.
Traps Enables or disables sending traps to the host if a violation occurs.
Trap Frequency (1-1000000) (Sec) Defines the time period by which traps are sent to the host.
The Trap Frequency (1-1000000) field can be defined only if the Multiple Hosts field is defined as
Disable. The default is 10 seconds.
Status The host status. The possible field values are:
Unauthorized Indicates that the port control is Force Unauthorized, the port link is down
or the port control is Auto, but a client has not been authenticated via the port.
Configuring Switch Module Information
175
www.dell.com | support.dell.com
Not in auto mode Indicates that the port control is Forced Authorized, and clients have full
port access.
Single-host Lock Indicates that the port control is Auto and a single client has been
authenticated via the port.
No Single Host Indicates that Multiple Host is enabled.
Number of Violations The number of packets that arrived on the interface in single-host mode,
from a host whose MAC address is not the client (supplicant) MAC address.
Displaying the Multiple Hosts Table
1
The following table summarizes the equivalent CLI commands for enabling the advanced port
based authentication as displayed in the Multiple Hosts page.
Table 7-45. Multiple Hosts CLI Commands
CLI Command
Description
dot1x multiple-hosts
Allows multiple hosts (clients) on an 802.1Xauthorized port that has the dot1x port-control
interface configuration command set to auto.
176
Console# configure
Console(config)# interface ethernet g11
Console(config-if)# dot1x multiple-hosts
Authenticating Users
The Authenticated Users page displays user port access lists. To open the Authenticated Users
page, click Switch Network Security Authenticated Users.
Figure 7-79.
Authenticated Users
177
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for authenticating users as
displayed in the Authenticated Users page.
Table 7-46. Add User Name CLI Commands
CLI Command
Description
----------------------------------------------------------------g12
gili
00:09:27
Remote
00:80:c8:b9:dc:1d
is not tied to that port (either it was learned on a different port, or is unknown to the system), the
protection mechanism is invoked, and can provide various options. Unauthorized packets arriving
to a locked port are either:
Forwarded
Locked port security also enables storing a list of MAC addresses in the configuration file. The
MAC address list can be restored after the switch module has been reset.
NOTE: In order to enable port security, the Multiple Hosts feature must first be enabled on the required
ports.
Disabled ports are activated from the Port Parameters page, see "Defining Port Parameters" on
page 182. To open the Port Security page, click Switch Network Security Port Security.
Figure 7-81.
Port Security
179
www.dell.com | support.dell.com
180
Figure 7-82.
The following table summarizes the equivalent CLI commands for configuring Locked Port
security as displayed in the Port Security page.
Table 7-47.
CLI Command
Description
shutdown
Disables interfaces.
181
www.dell.com | support.dell.com
Port
Status
Action
Trap
Frequency
Counter
-----
-------
-------
-------
---------
--------
g11
locked
Discard
Enable
100
88
g12
locked
Discard,
Shutdown
Disable
g13
Unlocked
Configuring Ports
The Ports page contians links to port functionality pages including advanced features, such as
Storm Control and Port Mirroring. To open the Ports page, click Switch Ports.
182
Figure 7-83.
Port Configuration
Port The port number for which port parameters are defined.
Description A brief interface description, such as Ethernet.
Port Type The type of port.
Admin Status Enables or disables traffic forwarding through the port. The new port status is
displayed in the Current Port Status field.
Current Port Status Specifies whether the port is currently operational or non-operational.
Re-Activate Port Reactivates a port if the port has been disabled through the locked port
security option.
Operational Status The port operational status. Possible field values are:
Suspended The port is currently active, and is currently not receiving or transmitting
traffic.
Active The port is currently active and is currently receiving and transmitting traffic.
Disable The port is currently disabled, and is not currently receiving or transmitting traffic.
Admin Speed The configured rate for the port. The port type determines what speed setting
options are available. Admin speed can only be designated when auto negotiation is disabled on the
configured port.
Current Port Speed The actual currently configured port speed (Mbps).
183
www.dell.com | support.dell.com
Admin Duplex The port duplex mode can be either Full or Half. Full indicates that the
interface supports transmission between the switch module and its link partner in both directions
simultaneously. Half indicates that the interface supports transmission between the switch module
and the client in only one direction at a time.
Current Duplex Mode The currently configured port duplex mode.
Auto Negotiation Enables Auto Negotiation on the port. Auto Negotiation is a protocol
between two link partners that enables a port to advertise its transmission rate, duplex mode and
flow control abilities to its partner.
Current Auto Negotiation The currently configured Auto Negotiation setting.
Back Pressure Enables Back Pressure mode on the port. Back Pressure mode is used by the
receiving port for slowing down the partner port.
Current Back Pressure The currently configured Back Pressure setting.
Flow Control Enables or disables flow control or enables the auto negotiation of flow control on
the port. Operates when port is in Full duplex mode.
Current Flow Control The currently configured Flow Control setting.
MDI/MDIX Allows the switch module to decipher between crossed and uncrossed cables.
Hubs and switches are deliberately wired opposite the way end stations are wired, so that when a
hub or switch is connected to an end station, a straight through Ethernet cable can be used, and
the pairs are match up properly. When two hubs/switches are connected to each other, or two end
stations are connected to each other, a crossover cable is used ensure that the correct pairs are
connected. The possible field values are:
Auto Use to automatically detect the cable type.
MDI (Media Dependent Interface) Use for end stations.
MDIX (Media Dependent Interface with Crossover) Use for hubs and switches.
Current MDI/MDIX The currently configured switch module MDI/MDIX settings.
LAG Specifies if the port is part of a LAG. Only external ports can be added to LAGs.
Defining Port Parameters
1
184
Figure 7-84.
The following table summarizes the equivalent CLI commands for configuring ports as displayed
in the Ports Configuration Table page.
Table 7-48. Port Configuration CLI Commands
CLI Command
Description
185
www.dell.com | support.dell.com
Description
description string
shutdown
186
speed Mbps
negotiation
back-pressure
Type
Duplex
Speed
Neg
Flow
Control
Admin
State
Back
Mdix
Pressure
Mode
----
-----
------
------
----
------
-----
------
----
g15
1G
Full
100
Enabled
On
Up
Enable
Auto
console#
console# show interfaces status ethernet g15
Port
Type
Duplex
Speed
Neg
Flow
Control
Link
State
Back
Mdix
Pressure
Mode
----
-----
------
------
----
------
-----
------
g15
1G
Full
100
Enabled
On
Up
Disabled on
----
187
www.dell.com | support.dell.com
Type
Duplex
Speed
Neg
Flow
Control
Link
State
Back
Mdix
Pressure
Mode
----
-----
------
------
----
------
-----
------
----
g11
1G
Full
100
Auto
On
Up
Enable
On
g12
100
Full
1000
Off
Off
Up
Disable
On
Ch
Type
Duplex
Speed
Neg
Flow
Control
Back
Link
Pressure State
---
----
-----
---
-----
-------
-------
------
1000
Full
1000
Off
Off
Disable
Up
188
Figure 7-85.
LAG Configuration
189
www.dell.com | support.dell.com
Admin Flow Control Enables/disables flow control, or enables the auto negotiation of flow
control on the LAG. Flow Control mode is effective on the ports operating in Full Duplex in the
LAG.
Current Flow Control The user-designated flow control setting.
Defining LAG Parameters
1
190
Figure 7-86.
The following table summarizes the equivalent CLI commands for configuring LAGs as displayed
in the LAG Configuration page.
Table 7-49.
CLI Command
Description
description string
shutdown
speed bps
negotiation
back-pressure
191
www.dell.com | support.dell.com
Description
192
console#
console# configure
console(config)# interface port-channel 2
console(config-if)# no negotiation
console(config-if)# speed 100
console(config-if)# flowcontrol on
console(config-if)# exit
console(config)# interface port-channel 3
console(config-if)# shutdown
console(config-if)# exit
console(config)# interface port-channel 4
console(config-if)# back-pressure
console(config-if)# description p4
console(config-if)# exit
Ports
---------
---------
ch1
Inactive: g(11-13)
ch2
Active: g14
193
www.dell.com | support.dell.com
The Storm Control page provides fields for enabling and configuring Storm Control. To open the
Storm Control page, click Switch Ports Storm Control in the tree view.
Figure 7-87. Storm Control
Count Multicast with Broadcast Counts Broadcast and Multicast traffic. The possible field
values are:
Broadcast Rate Threshold (0-65535) The maximum rate (packets per second) at which
Broadcast and Multicast packets are forwarded. The range is 0-65535. The default value is 1000.
Note that if the rate is 0, Broadcast packets are not forwarded.
Port The port from which storm control is enabled.
Broadcast Control Enables or disables forwarding Broadcast packet types on the specfic
interface.
Enabling Storm Control
194
Figure 7-88.
The following table summarizes the equivalent CLI commands for configuring Storm Control as
displayed on the Storm Control page.
Table 7-50.
CLI Command
Description
195
www.dell.com | support.dell.com
Description
-----
-------------------------------------
g11
8000
g12
Disabled
g14
Disabled
196
To open the Port Mirroring page, click Switch Ports Port Mirroring in the tree view.
NOTE: When a port is set to be a target port for a port-mirroring session, all normal operations on it are
suspended. This includes Spanning Tree and LACP.
Figure 7-89.
Port Mirroring
197
www.dell.com | support.dell.com
Click Add.
The Add Source Port page opens.
Select the destination port from the Destination Port drop-down menu.
Select the source port from the Source Port drop-down menu.
The following table summarizes the equivalent CLI commands for configuring a Port Mirroring
session as displayed in the Port Mirroring page.
Table 7-51. Port Mirroring CLI Commands
CLI Command
Description
Destination Port
Type
Status
VLAN Tagging
-----------
----------------
------------
-------
------------
g12
g11
RX, TX
Active
No
198
Interface The specific port or LAG to which the static MAC address is applied.
MAC Address The MAC address listed in the current static address list.
VLAN ID The VLAN ID attached to the MAC Address.
VLAN Name User-defined VLAN name.
199
www.dell.com | support.dell.com
Click Add.
The Add Static MAC Address page opens.
200
The following table summarizes the equivalent CLI commands for configuring static address
parameters as displayed in the Static MAC Address page.
Table 7-52.
CLI Command
Description
vlan
mac address
port
type
----
------------
----
--------
00:60:70:4C:73:FF
g8
dynamic
00:60:70:8C:73:FF
g8
dynamic
200
00:10:0D:48:37:FF
g9
static
201
www.dell.com | support.dell.com
Address Aging (10-360) Specifies the amount of time the MAC Address remains in the
Dynamic Addresses Table before it is timed out if no traffic from the source is detected. The
default value is 300 seconds.
Interface Specifies the interface for which the table is queried. There are two interface types
from which to select.
Port Specifies the port numbers for which the table is queried.
LAG Specifies the LAG for which the table is queried.
MAC Address Specifies the MAC address for which the table is queried.
VLAN ID The VLAN ID for which the table is queried.
Address Table Sort Key Specifies the means by which the Dynamic Address Table is sorted.
Redefining the Aging Time
1
202
Click Query.
The Dynamic Addresses Table is queried.
From the Address Table Sort Key drop-down menu, select whether to sort addresses by
address, VLAN ID, or interface.
Click Query.
The Dynamic Addresses Table is sorted.
The following table summarizes the equivalent CLI commands for aging, querying, and sorting
dynamic addresses as displayed in the Dynamic Addresses Table.
Table 7-53.
CLI Command
Description
vlan
mac address
port
type
----
-----------
----
----
203
www.dell.com | support.dell.com
00:60:70:4C:73:FF
g8
dynamic
00:60:70:8C:73:FF
g8
dynamic
200
00:10:0D:48:37:FF
g8
static
Configuring GARP
Generic Attribute Registration Protocol (GARP) is a general-purpose protocol that registers any
network connectivity or membership-style information. GARP defines a set of switch modules
interested in a given network attribute, such as VLAN or Multicast address.
When configuring GARP, ensure the following:
The leave time must be greater than or equal to three times the join time.
The leave all time must be greater than the leave time.
Set the same GARP timer values on all Layer 2-connected Ethernet switch module s. If the GARP
timers are set differently on the Layer 2-connected Ethernet switch module s, GARP application
does not operate successfully.
To open the GARP page, click Switch GARP in the tree view.
204
Select the Copy to check box to define the interfaces to which the GARP timer definitions
are copied, or click Select All to copy the definitions to all ports or LAGs.
This table summarizes the equivalent CLI commands for defining GARP timers as displayed in the
GARP Timers page.
205
www.dell.com | support.dell.com
Description
garp timer {join | leave | leaveall} Adjusts the GARP application join,
timer_value
leave, and leaveall GARP timer values.
Port(s) GVRP-
Registration
Status
Dynamic VLAN
Timers
(milliseconds)
Creation
Join
Leave
Leave All
------- --------
------------
------------
-------
------ ---------
g11
Normal
Enabled
200
900
Disabled
10000
console#
206
Classic STP Provides a single path between end stations, avoiding and eliminating loops.
For more information on configuring Classic STP, see "Defining STP Global Settings" on
page 207.
Rapid STP Detects and uses of network topologies that provide faster spanning tree
convergence, without creating forwarding loops. For more information on configuring Rapid
STP, see "Configuring Rapid Spanning Tree" on page 217.
To open the Spanning Tree page, click Switch Spanning Tree in the tree view.
NOTE: Internal ports may be effected by enabling the Spanning Tree.
Spanning Tree State Enables or disables Spanning Tree on the Ethernet Switch Module.
Enable Enables Spanning Tree
Disable Disables Spanning Tree
STP Operation Mode The STP mode by which STP is enabled on the switch module. The
possible field values are:
207
www.dell.com | support.dell.com
Classic STP Enables Classic STP on the switch module. This is the default value.
Rapid STP Enables Rapid STP on the switch module.
Port Cost Method Determines the Spanning Tree default path cost method. The possible field
values are:
Short Specifies 1 through 65535 range for port path costs. This is the default value.
Long Specifies 1 through 200000000 range for port path costs.
BPDU Handling Determines how BPDU packets are managed when STP is disabled on the
port or the switch module. BPDUs are used to transmit spanning tree information. The possible
field values are:
Filtering Filters BPDU packets when spanning tree is disabled on an interface. This is the
default value.
Flooding Floods BPDU packets when spanning tree is disabled on an interface.
Priority (0-61440, in steps of 4096) Specifies the bridge priority value. When switches or
bridges are running STP, each is assigned a priority. After exchanging BPDUs, the switch with the
lowest priority value becomes the Root Bridge. The default value is 32768. The bridge priority value
is provided in increments of 4096. For example, 0, 4096, 8192, etc.
Hello Time (1-10) Specifies the switch module Hello Time. The Hello Time indicates the
amount of time in seconds a root bridge waits between configuration messages. The default is 2
seconds.
Max Age (6-40) Specifies the switch module Maximum Age Time. The Maximum Age Time
indicates the amount of time in seconds a bridge waits before sending configuration messages. The
default max age is 20 seconds.
Forward Delay (4-30) Specifies the switch module forward delay time. The Forward Delay Time
indicates the amount of time in seconds a bridge remains in a listening and learning state before
forwarding packets. The default is 15 seconds.
Bridge ID Identifies the Bridge priority and MAC address.
Root Bridge ID Identifies the Root Bridge priority and MAC address.
Root Port The port number that offers the lowest cost path from this bridge to the Root Bridge.
It is significant when the Bridge is not the Root. Zero is indicated in case Ethernet Switch Module
is the root.
Root Path Cost The cost of the path from this bridge to the root. Zero is indicated in case
Ethernet Switch Module is the root.
Topology Changes Counts Specifies the total amount of STP state changes that have occurred
since the last reboot.
Last Topology Change The amount of time that has elapsed since the bridge was initialized or
reset, and the last topographic change occurred. The time is displayed in a day hour minute second
format, for example, 0 days 1 hour 34 minutes and 38 seconds.
208
Select the port that needs to be enabled from the Select a Port drop-down menu.
Select the STP mode in the STP Operation Mode field, and define the bridge settings.
The following table summarizes the equivalent CLI commands for defining STP global parameters
as displayed in the STP Global Settings page.
Table 7-55.
CLI Command
Description
spanning-tree
spanning-tree forward-time
seconds
209
www.dell.com | support.dell.com
Description
console(config)# spanning-tree
console(config)# spanning-tree mode rstp
console(config)# spanning-tree priority 12288
console(config)# spanning-tree hello-time 5
console(config)# spanning-tree max-age 15
console(config)# spanning-tree forward-time 25
console(config)# exit
console# show spanning-tree
Priority
12288
Address
00:e8:00:b4:c0:00
210
Interfaces
Name
State
Prio.
Nbr
Cost
Sts
Role
PortFast
Type
-----
------
-----
----
------
------
---------
------
g11
enabled
128.1
100
DSBL
Dsbl
No
P2p (STP)
g12
enabled
128.2
100
DSBL
Dsbl
No
P2p (STP)
g13
enabled
128.3
100
DSBL
Dsbl
No
P2p (STP)
211
www.dell.com | support.dell.com
Port State The current port STP state. If enabled, the port state determines what forwarding
action is taken on traffic. Possible port states are:
Disabled The port link is currently down.
Blocking The port is currently blocked and cannot be used to forward traffic or learn MAC
addresses. Blocking is displayed when Classic STP is enabled.
Listening The port is currently in the listening mode. The port cannot forward traffic nor
learn MAC addresses.
Learning The port is currently in the learning mode. The port cannot forward traffic
however it can learn new MAC addresses.
Forwarding The port is currently in the forwarding mode. The port can forward traffic and
learn new MAC addresses.
Speed Speed at which the port is operating.
Path Cost (1-200000000) The port contribution to the root path cost. The path cost is adjusted
to a higher or lower value, and is used to forward traffic when a path being rerouted.
Default Path Cost The default path cost of the port is automatically set by the port speed and
the default path cost method.
The default values for long path costs are:
Ethernet - 2000000
Fast Ethernet - 200000
Gigabit Ethernet - 20000
The default values for short path costs (short path costs are the default) are:
Ethernet - 100
Fast Ethernet - 19
Gigabit Ethernet - 4
Priority (0-240, in steps of 16) Priority value of the port. The priority value influences the port
choice when a bridge has two ports connected in a loop. The priority value is between 0-240. The
priority value is provided in increments of 16.
Designated Bridge ID The bridge priority and the MAC Address of the designated bridge.
Designated Port ID The designated ports priority and interface.
Designated Cost Cost of the port participating in the STP topology. Ports with a lower cost are
less likely to be blocked if STP detects loops.
Forward Transitions Number of times the port has changed from the Blocking state to the
Forwarding state.
LAG The LAG to which the port is attached.
212
Define the Fast Link, Path Cost, and the Priority fields.
Modify the Priority, Fast Link, Path Cost, and the Fast Link fields.
The following table summarizes the equivalent CLI commands for defining STP port parameters
as displayed in the STP Port Settings page.
Table 7-56.
CLI Command
Description
spanning-tree disable
spanning-tree portfast
blockedports]
213
www.dell.com | support.dell.com
Role: disabled
Port id:
Type: P2p
96.5
(configured: Auto)
STP
Address: 00:e8:00:b4:c0:00
214
Figure 7-95.
Select a LAG The user-defined LAG. For more information, see "Defining LAG Membership"
on page 240.
STP Enables or disables STP on the LAG.
Fast Link Enables Fast Link mode for the LAG. If Fast Link mode is enabled for a LAG, the
LAG State is automatically placed in the Forwarding state when the LAG is up. Fast Link mode
optimizes the time it takes for the STP protocol to converge. STP convergence can take 30-60
seconds in large networks.
LAG State Current STP state of a LAG. If enabled, the LAG state determines what forwarding
action is taken on traffic. If the bridge discovers a malfunctioning LAG, the LAG is placed in the
Broken state. Possible LAG states are:
Disabled The LAG link is currently down.
Blocking The LAG is blocked and cannot be used to forward traffic or learn MAC
addresses.
Listening The LAG is in the listening mode and cannot forward traffic or learn MAC
addresses.
Learning The LAG is in the learning mode and cannot forward traffic, but it can learn new
MAC addresses.
Forwarding The LAG is currently in the forwarding mode, and it can forward traffic and
learn new MAC addresses.
215
www.dell.com | support.dell.com
Broken The LAG is currently malfunctioning and cannot be used for forwarding traffic.
Path Cost (1-200000000) Amount the LAG contributes to the root path cost. The path cost is
adjusted to a higher or lower value, and is used to forward traffic when a path being rerouted. The
path cost has a value of 1 to 200000000. If the path cost method is short, the LAG cost default
value is 4. If the path cost method is long, the LAG cost default value is 20000.
Default Path Cost When selected, the LAG path cost returns to its default value.
Priority (0-240, in steps of 16) Priority value of the LAG. The priority value influences the LAG
choice when a bridge has two looped ports. The priority value is between 0-240, in increments of
16.
Designated Bridge ID The bridge priority and the MAC Address of the designated bridge.
Designated Port ID The port priority and interface number of the designated port.
Designated Cost The cost of the designated bridge.
Forward Transitions Number of times the LAG State has changed from the Blocking state to a
Forwarding state.
Modifying the LAG STP Parameters
1
The following table summarizes the equivalent CLI commands for defining STP LAG settings.
Table 7-57. STP LAG Settings CLI Commands
CLI Command
Description
spanning-tree
spanning-tree disable
216
Table 7-57.
CLI Command
Description
Disabled
Learning
Discarding
Forwarding
Rapid Spanning Tree is enabled on the STP Global Settings page. To open the Rapid Spanning
Tree (RSTP) page, click Switch Spanning Tree Rapid Spanning Tree in the tree view.
217
www.dell.com | support.dell.com
of the chosen network layer protocols has been configured, packets from each network layer
protocol can be sent over the link. The link remains configured for communications until explicit
LCP or NCP packets close the link, or until some external event occurs. This is the actual switch
module port link type.
Point-to-Point Operational Status The Point-to-Point operating state. It may differ from the
administrative state.
Activate Protocol Migrational Test When selected, enables PPP sending Link Control Protocol
(LCP) packets to configure and test the data link.
Enabling RSTP
1
Define the Point-to-Point Admin, Point-to-Point Oper, and the Activate Protocol Migration
fields.
The following table summarizes the equivalent CLI commands for defining Rapid STP parameters
as displayed in the Rapid Spanning Tree (RSTP) page.
Table 7-58.
CLI Command
Description
219
www.dell.com | support.dell.com
Configuring VLANs
VLANs are logical subgroups of a Local Area Network (LAN) created via software rather than
defining a hardware solution. VLANs combine user stations and network devices into a single
domain regardless of the physical LAN segment to which they are attached. VLANs allow network
traffic to flow more efficiently within subgroups. VLANs managed through software reduces the
amount of time in which network changes are implemented.
VLANs have no minimum number of ports, and can be created per switch module or any other
logical connection combination, as VLANs are software based and not defined by physical
attributes.
VLANs function at Layer 2. Since VLANs isolate traffic within the VLAN, a Layer 3 functioning
router is needed to allows traffic flow between VLANs. Layer 3 routers identify segments and
coordinate with VLANs. VLANs are Broadcast and Multicast domains. Broadcast and Multicast
traffic is transmitted only in the VLAN in which the traffic is generated.
VLAN tagging provides a method of transferring VLAN information between VLAN groups. VLAN
tagging attaches a tag to packet headers. The VLAN tag indicates to which VLAN the packet
belongs. VLAN tags are attached to the packet by either the end station or by the network devices.
VLAN tags also contains VLAN network priority information. Combining VLANs and GVRP
enables the automatic dispersal of VLAN information. To open the VLAN page, click Switch
VLAN in the tree view.
220
Figure 7-97.
VLAN Membership
Click Add.
The Create New VLAN page opens.
221
www.dell.com | support.dell.com
Deleting VLANs
1
The following table summarizes the equivalent CLI commands for defining VLAN membership
groups as displayed in the VLAN Membership page.
Table 7-59. VLAN Membership Group CLI Commands
CLI Command
Description
vlan database
vlan {vlan-range}
Creates a VLAN.
name string
222
The VLAN Port Membership Table contains a Port Table for assigning ports to VLANs. Ports are
assigned VLAN membership by toggling through the Port Control settings. Ports can have the
following values:
Table 7-60.
Port Control
Definition
Blank
NOTE: Ports which are LAG members are not displayed in the VLAN Port Membership Table.
The VLAN Port Membership Table displays the ports and the ports states, as well as LAGs.
Assigning Ports to a VLAN Group
1
Click the VLAN ID or VLAN Name option button and select a VLAN from the drop-down
menu.
Select a port in the Port Membership Table, and assign the port a value.
223
www.dell.com | support.dell.com
Deleting a VLAN
1
Click the VLAN ID or VLAN Name option button and select a VLAN from the drop-down
menu.
The following table summarizes the equivalent CLI commands for assigning ports to VLAN
groups.
Table 7-61. Port-to-VLAN Group Assignments CLI Commands
CLI Command
Description
224
225
www.dell.com | support.dell.com
226
Reserve VLAN for Internal Use The VLAN selected by the user to be the reserved VLAN if not
in use by the system.
Assigning Port Settings
1
Select the port to which settings need to be assigned from the Port drop-down menu.
The following table summarizes the equivalent CLI commands for assigning ports to VLAN
groups.
Table 7-62.
CLI Command
Description
switchport general allowed vlan Adds or removes VLANs for a port in general
add vlan-list [tagged |
mode.
untagged]
switchport general acceptableframe-types tagged-only
227
www.dell.com | support.dell.com
Select a LAG from the LAG drop-down menu and complete the fields on the page.
The following table summarizes the equivalent CLI commands for assigning LAGs to VLAN
groups as displayed in the VLAN LAG Setting page.
Table 7-63.
CLI Command
Description
229
www.dell.com | support.dell.com
Description
switchport general allowed vlan Adds or removes VLANs from a general LAG.
add vlan-list [tagged |
untagged]
switchport general acceptableframe-type tagged-only
230
Protocol Group
Frame Type The packet type. Possible field values are Ethernet, RFC1042, and LLC Other.
Protocol Value User-defined protocol name.
Ethernet-Based Protocol Value The Ethernet protocol group type. The possible field values are
IP, IPX and IPV6.
Protocol Group ID ID number assigned to frames containing specified protocol value.
Remove When selected, removes frame-to-protocol group mapping, if the protocol port to be
removed is not configured on this protocol group.
Adding a Protocol Group
1
Click Add.
The Add Protocol to Group page opens.
231
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for configuring Protocol Groups.
Table 7-64. VLAN Protocol Groups CLI Commands
CLI Command
Description
232
Figure 7-101.
NOTE: Protocol ports can be defined only on ports that are defined as General in the VLAN Port Settings
page.
1
Click Add.
The Add Protocol Port page opens.
233
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI command for defining Protocol Ports.
Table 7-65. Protocol Port CLI Commands
CLI Command
Description
The following example sets a protocol-based classification rule of protocol group 1 to VLAN 8:
console (config-if)# switchport general map protocols-group 1 vlan 8
Configuring GVRP
GARP VLAN Registration Protocol (GVRP) is specifically provided for automatic distribution of
VLAN membership information among VLAN-aware bridges. GVRP allows VLAN-aware bridges to
automatically learn VLANs to bridge ports mapping, without having to individually configure each
bridge and register VLAN membership.
The GVRP Global Parameters page enables GVRP globally. GVRP can also be enabled on a perinterface basis. To open the GVRP Global Parameters page, click Switch VLAN GVRP
Parameters in the tree view.
Figure 7-102. GVRP Global Parameters
234
GVRP Global Status Enables or disables GVRP on the switch module. GVRP is disabled by
default.
Interface The port or LAG for which GVRP is enabled.
GVRP State Enables or disables GVRP on an interface.
Dynamic VLAN Creation Enables or disables VLAN creation through GVRP.
GVRP Registration Enables or disables VLAN registration through GVRP.
Enabling GVRP on the Switch Module
1
Select Enable in the GVRP Global Status field for the desired interface.
The following table summarizes the equivalent CLI commands for configuring GVRP as displayed
in the GVRP Global Parameters page.
Table 7-66.
CLI Command
Description
gvrp vlan-creation-forbid
gvrp registration-forbid
235
www.dell.com | support.dell.com
Description
GVRPStatus
Registration
Dynamic
VLAN
Creation
Leave
Timers
(milliseconds)
Join
Leave
All
-------
------
------------
--------
-------------- -----
-----
g11
Enabled
Forbidden
Disabled
200
900
10000
g12
Disabled
Normal
Enabled
200
600
10000
236
Aggregating Ports
Port Aggregation optimizes port usage by linking a group of ports together to form a single Link
Aggregated Groups (LAGs). Port Aggregation multiplies the bandwidth between the switch
modules, increases port flexibility, and provides link redundancy. The switch module supports up to
six LAGs per system, and six ports per LAG per switch module.
Each LAG is composed of ports of the same speed, set to full-duplex operations. Ports in a LAG,
can be of different media types (UTP/Fiber, or different fiber types), provided they operate at the
same speed. Fiber ports refer only to internal ports.
Aggregated Links can be assigned manually or automatically by enabling Link Aggregation Control
Protocol (LACP) on the relevant links. The switch module provides LAG Load Balancing based on
both source MAC addresses and destination MAC addresses.
Aggregated Links are treated by the system as a single logical port. Specifically, the Aggregated Link
has similar port attributes to a non-aggregated port, including auto-negotiation, speed, Duplex
setting, etc.
The Ethernet Switch Module supports both static LAGs and Link Aggregation Control Protocol
(LACP) LAGs. LACP LAG negotiate Aggregated Port links with other LACP ports located on a
different switch module. If the other ports are also LACP ports, the Ethernet Switch Module
establish a LAG between them.
NOTE: Internal Ports cannot be aggregated.
NOTE: To enable LACP, LACP must be defined for external ports.
Follow these guidelines when adding ports to a LAG:
The switch module uses a hash function to determine which frames are carried on which
aggregated-link member. The system uses a hash function to forward frames to aggregated link
members. This hash function statistically load-balances aggregate link member use, and guarantees
no frame reordering. The switch module considers an Aggregated Link as a single logical port.
Each Aggregated Link has an Aggregated Link Port Type, including Gigabit Ethernet ports. Ports
can be added to an Aggregated Link only if they are the same port type. When ports are removed
from an Aggregated Links, the ports revert to the original port settings. To open the Link
Aggregation page, click Switch Link Aggregation in the tree view.
237
www.dell.com | support.dell.com
LACP System Priority (1-65535) The LACP priority value for global settings. The possible
range is 1- 65535. The default value is 1.
Select a Port The port number to which timeout and priority values are assigned.
LACP Port Priority (1-65535) LACP priority value for the port.
LACP Timeout Administrative LACP timeout. The possible field values are:
Short Specifies a short timeout value.
Long Specifies a long timeout value.
Defining Link Aggregation Global Parameters
1
238
The following table summarizes the equivalent CLI commands for configuring LACP parameters
as displayed in the LACP Parameters page.
Table 7-67.
CLI Command
Description
239
www.dell.com | support.dell.com
240
Figure 7-104.
LAG Membership
In the LAG row (the second row), toggle the button to a specific number to aggregate or
remove the port to that LAG number.
In the LACP row (the first row), toggle the button under the port number to assign either the
LACP or the static LAG.
The following table summarizes the equivalent CLI commands for assigning ports to LAGs as
displayed in the LAG Membership page.
241
www.dell.com | support.dell.com
Description
To open the Multicast Support page, click Switch Multicast Support in the tree view.
When IGMP snooping is enabled globally, the switching ASIC is programmed to forward all IGMP
packets to the CPU. The CPU analyzes the incoming packets and determines which ports are to
join which Multicast groups, which ports have Multicast routers generating IGMP queries, and
what routing protocols are forwarding packets and Multicast traffic. Ports requesting to join a
specific Multicast group issue an IGMP report specifying that Multicast group. This results in the
creation of the Multicast filtering database.
The Multicast Global Parameters page contains fields for enabling IGMP Snooping on the switch
module. To open the Multicast Global Parameters page, click Switch Multicast Support
Global Parameters in the tree view.
Figure 7-105.
Bridge Multicast Filtering Enables or disables bridge Multicast filtering. Disabled is the default
value. IGMP Snooping can be enabled only if Bridge Multicast Filtering is enabled.
IGMP Snooping Status Enables or disables IGMP Snooping on the switch module. Disabled is
the default value.
Enabling Bridge Multicast Filtering on the switch module
1
243
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for enabling Multicast forwarding
and IGMP Snooping as displayed on the Multicast Global Parameters page.
Table 7-69. Multicast Forwarding and Snooping CLI Commands
CLI Command
Description
ip igmp snooping
244
Figure 7-106.
VLAN ID Identifies a VLAN and contains information about the Multicast group address.
Bridge Multicast Address Identifies the Multicast group MAC address/IP address.
Remove When selected, removes a Bridge Multicast address.
Ports Port that can be added to a Multicast service.
LAGs LAGs that can be added to a Multicast service.
The following table contains the IGMP port and LAG members management settings:
Table 7-70. IGMP Port/LAG Members Table Control Settings
Port Control
Definition
Forbidden.
Blank
245
www.dell.com | support.dell.com
Click Add.
The Add Bridge Multicast Group page opens:
246
Toggle the LAG to S to join the LAG to the selected Multicast group.
Toggle the LAG to F to forbid adding specific Multicast addresses to a specific LAG.
The following table summarizes the equivalent CLI commands for managing Multicast service
members as displayed in the Bridge Multicast Group page.
Table 7-71.
CLI Command
Description
Vlan
MAC Address
Type
Ports
----
-----------
-----
----------
0100.5e02.0203
static
g11, g12
19
0100.5e02.0208
static
g11-16
19
0100.5e02.0208
dynamic
g11-12
247
www.dell.com | support.dell.com
Vlan
MAC Address
Ports
----
-----------
----------
0100.5e02.0203
g8
19
0100.5e02.0208
g8
Vlan
IP Address
Type
Ports
----
-----------
-----
----------
224-239.130|2.2.3
static
g11, g12
19
224-239.130|2.2.8
static
g11-16
19
224-239.130|2.2.8
dynamic
g11-12
Vlan
IP Address
Ports
----
-----------
----------
224-239.130|2.2.3
g8
19
224-239.130|2.2.8
g8
248
Figure 7-108.
Definition
Forbidden.
Blank
Select a port in the Ports table, and assign the port a value.
249
www.dell.com | support.dell.com
Select a port in the LAGs table, and assign the LAG a value.
Managing LAGs and Ports Attached to Multicast Routers Using CLI Commands
The following table summarizes the equivalent CLI commands for managing LAGs and ports
attached to Multicast routers as displayed on the Bridge Multicast Forward All page.
Table 7-73. CLI Commands for Managing LAGs and Ports Attached to Multicast Routers
CLI Command
Description
250
VLAN:
Forward-All
Port
Static
Status
-------
-----------------
-----------
g11
Forbidden
Filter
g12
Forward
Forward(s)
g13
Forward(d)
IGMP Snooping
The IGMP Snooping page contains fields for enabling IGMP snooping per VLAN, and defining
the aging time for packets. To open the IGMP Snooping page, click Switch Multicast
Support IGMP Snooping in the tree view.
Figure 7-109.
IGMP Snooping
251
www.dell.com | support.dell.com
Immediate Leave Upon receiving a group-specific IGMPv2 leave message, IGMP snooping
immediately removes the interface from the Layer 2 forwarding table entry for that Multicast
group.
Enabling IGMP Snooping on the Switch Module
1
Select the VLAN ID for the switch module on which IGMP snooping needs to be enabled.
The following table summarizes the equivalent CLI commands for configuring IGMP Snooping on
the switch module:
Table 7-74. IGMP Snooping CLI Commands
CLI Command
Description
ip igmp snooping
show ip igmp snooping groups [vlan vlan- Displays the Multicast groups learned
id] [address ip-multicast-address]
by IGMP snooping.
show ip igmp snooping interface vlan-id Displays IGMP snooping
configuration.
252
Table 7-74.
CLI Command
Description
253
www.dell.com | support.dell.com
IP Address
-----
------------------
1
19
Querier
224-239.130|2.2.3
Ports
-------Yes
224-239.130|2.2.8
Yes
-----
g11, g12
g11-13
254
VLAN
Ports
----
------
g11
Viewing Statistics
The Statistics pages contains Ethernet Switch Module information for interface, GVRP, Etherlike,
RMON, and Ethernet Switch Module utilization. To open the Statistics page, click
Statistics/RMON in the tree view.
NOTE: CLI commands are not available for all the Statistics pages.
Viewing Tables
The Table Views page contains links for displaying statistics in a table form. To open the Table
Views page, click Statistics/RMON Tables in the tree view.
Viewing Statistics
255
www.dell.com | support.dell.com
Refresh Rate The amount of time that passes before the interface statistics are refreshed.
Interface The interface number.
Interface Status Status of the interface.
% Interface Utilization Network interface utilization percentage based on the duplex mode of
the interface. The range of this reading is from 0 to 200%. The maximum reading of 200% for a full
duplex connection indicates that 100% of bandwidth of incoming and outgoing connections is
used by the traffic travelling through the interface. The maximum reading for a half duplex
connection is 100%.
% Unicast Received Percentage of Unicast packets received on the interface.
% Non Unicast Packets Received Percentage of non-Unicast packets received on the interface.
% Error Packets Received Number packets with errors received on the interface.
Global System LAGs Current LAGs/trunk performance.
256
Viewing Statistics
Figure 8-111.
Counter Summary
Refresh Rate The amount of time that passes before the interface statistics are refreshed.
Interface The interface number.
Interface Status The interface status.
Received Unicast Packets Number of received Unicast packets on the interface.
Transmit Unicast Packets Number of transmitted Unicast packets from the interface.
Received Non Unicast Packets Number of received non-Unicast packets on the interface.
Transmit Non Unicast Packets Number of transmitted non-Unicast packets from the interface.
Received Errors The number of error packets received on the interface.
Global System LAGs Current LAGs performance.
Viewing Statistics
257
www.dell.com | support.dell.com
258
Viewing Statistics
The following table summarizes the equivalent CLI commands for viewing interface statistics.
Table 8-75.
CLI Command
Description
InUcastPkts
InMcastPkts
InBcastPkts
------- -------------
----------------
----------------
------------
g11
183892
1289
987
g12
g13
123899
1788
373
19
Port
OutOctets
OutUcastPkts
OutMcastPkts
OutBcastPkts
------- -------------
----------------
----------------
------------
g11
9188
g12
g13
8789
27
Port
InOctets
Viewing Statistics
259
www.dell.com | support.dell.com
InUcastPkts
InMcastPkts
InBcastPkts
------- -------------
----------------
----------------
------------
27889
928
78
Ch
OutOctets
OutUcastPkts
OutMcastPkts
OutBcastPkts
------- -------------
----------------
----------------
------------
882
122
Ch
InOctets
23739
260
Viewing Statistics
Late Collisions Number of late collision frames received on the selected interface.
Excessive Collisions Number of excessive collisions received on the selected interface.
Internal MAC Transmit Errors Number of internal MAC transmit errors on the selected
interface.
Oversize Packets Number of oversized packet errors on the selected interface.
Internal MAC Receive Errors Number of internal MAC received errors on the selected
interface.
Received Pause Frames Number of received paused frames on the selected interface.
Transmitted Pause Frames Number of paused frames transmitted from the selected interface.
Displaying Etherlike Statistics for an Interface
1
The following table summarizes the equivalent CLI commands for viewing etherlike statistics.
Table 8-76.
CLI Command
Description
Viewing Statistics
261
www.dell.com | support.dell.com
InMcastPkts
InBcastPkts
------- -------------
----------------
----------------
------------
g11
183892
1289
987
Port
OutOctets
OutUcastPkts
OutMcastPkts
OutBcastPkts
------- -------------
----------------
----------------
------------
g11
Port
InOctets
9188
FCS Errors: 8
Single Collision Frames: 0
Late Collisions: 0
Excessive Collisions: 0
Internal MAC Tx Errors: 0
Oversize Packets: 0
Internal MAC Rx Errors: 0
Received Pause Frames: 0
Transmitted Pause Frames: 0
262
Viewing Statistics
Figure 8-114.
GVRP Statistics
Viewing Statistics
263
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for viewing GVRP statistics.
Table 8-77. GVRP Statistics CLI Commands
CLI Command
Description
Port rJE
rJIn
rEmp
rLIn
rLE
rLA
sJE
sJIn
sEmp
sLIn sLE
sLA
---- ---
----
----
----
---
---
---
----
----
---- ---
---
g11
264
Viewing Statistics
g12
g13
Port
INVPROT
INVATYP
INVAVAL
INVALEN
INVEVENT
----
-------
-------
-------
-------
--------
g11
g12
g13
g14
g15
g16
The EAP Statistics page contains information about EAP packets received on a specific port. For
more information about EAP, see "Port Based Authentication (802.1x)." To open the EAP Statistics
page, click Statistics/RMON Table Views EAP Statistics in the tree view.
Viewing Statistics
265
www.dell.com | support.dell.com
266
Viewing Statistics
Last Frame Version The protocol version number attached to the most recently received
EAPOL frame.
Last Frame Source The source MAC address attached to the most recently received EAPOL
frame.
Displaying EAP statistics for a Port
1
The following table summarizes the CLI commands for viewing EAP statistics.
Table 8-78.
CLI Command
Description
Viewing Statistics
267
www.dell.com | support.dell.com
Interface Specifies the port or LAG for which statistics are displayed.
Refresh Rate Amount of time that passes before the statistics are refreshed.
Drop Events Number of dropped events that have occurred on the interface since the Ethernet
Switch Module was last refreshed.
Received Bytes (Octets) Number of octets received on the interface since the Ethernet Switch
Module was last refreshed. This number includes bad packets and FCS octets, but excludes
framing bits.
268
Viewing Statistics
Received Packets Number of packets received on the interface, including bad packets, Multicast
and Broadcast packets, since the Ethernet Switch Module was last refreshed.
Broadcast Packets Received Number of good Broadcast packets received on the interface since
the Ethernet Switch Module was last refreshed. This number does not include Multicast packets.
Multicast Packets Received Number of good Multicast packets received on the interface since
the Ethernet Switch Module was last refreshed.
CRC & Align Errors Number of CRC and Align errors that have occurred on the interface since
the Ethernet Switch Module was last refreshed.
Undersize Packets Number of undersized packets (less than 64 octets) received on the interface
since the Ethernet Switch Module was last refreshed.
Oversize Packets Number of oversized packets (over 1518 octets) received on the interface since
the Ethernet Switch Module was last refreshed.
Fragments Number of fragments (packets with less than 64 octets, excluding framing bits, but
including FCS octets) received on the interface since the Ethernet Switch Module was last
refreshed.
Jabbers The total number of packets received that were longer than 1518 octets (excluding
framing bits, but including FCS octets), and had either a bad Frame Check Sequence (FCS) with
an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets
(Alignment Error). The allowed range to detect jabber is between 20 ms and 150 ms.
Collisions Number of collisions received on the interface since the Ethernet Switch Module was
last refreshed.
Frames of xx Bytes Number of xx-byte frames received on the interface since the Ethernet
Switch Module was last refreshed.
Viewing Interface Statistics
1
The following table summarizes the equivalent CLI commands for viewing RMON statistics.
Viewing Statistics
269
www.dell.com | support.dell.com
270
CLI Command
Description
Viewing Statistics
Packets: 0
Broadcast: 0
Multicast: 0
Collisions: 0
Undersize Pkts: 0
Oversize Pkts: 0
Fragments: 0
Jabbers: 0
64 Octets: 0
65 to 127 Octets: 0
Packets: 0
Broadcast: 0
Multicast: 0
Collisions: 0
Undersize Pkts: 0
Oversize Pkts: 0
Fragments: 0
Jabbers: 0
64 Octets: 0
65 to 127 Octets: 0
Viewing Statistics
271
www.dell.com | support.dell.com
History Entry No. Entry number for the History Control Table page.
Source Interface Port or LAG from which the history samples were taken.
Owner (0-20 characters) RMON station or user that requested the RMON information.
Max No. of Samples to Keep (1-65535) Number of samples to be saved. The default value is 50.
NOTE: A change to the number of sample is only effective after a reboot.
Current No. of Samples in List The current number of samples taken.
Sampling Interval (1-3600) Indicates in seconds the time that samples are taken from the ports.
The default value is 1800 seconds (30 minutes).
Remove When selected, removes the History Control Table entry.
Adding a History Control Entry
272
Click Add.
Viewing Statistics
Select Remove.
The following table summarizes the equivalent CLI commands for viewing RMON History
statistics.
Table 8-80.
CLI Command
Description
Viewing Statistics
273
www.dell.com | support.dell.com
Viewing Statistics
Broadcast Packets The number of good Broadcast packets received during the sampling interval.
Multicast Packets The number of good Multicast packets received during the sampling interval.
CRC Align Errors The number of packets received during the sampling session with a length of
64-1518 octets, a bad Frame Check Sequence (FCS), and with an integral number of octets, or a
bad FCS with a non-integral number of octets.
Undersize Packets The number of packets received less than 64 octets long during the sampling
session.
Oversize Packets The number of packets received more than 1518 octets long during the
sampling session.
Fragments The number of packets received less than 64 octets long and had a FCS during the
sampling session.
Jabbers The total number of packets received that were longer than 1518 octets (excluding
framing bits, but including FCS octets), and had either a bad Frame Check Sequence (FCS) with
an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets
(Alignment Error). The allowed range to detect jabber is between 20 ms and 150 ms.
Collisions Estimates the total number of packet collisions that occurred during the sampling
session. Collisions are detected when repeater ports detect two or more stations transmit
simultaneously.
Utilization Estimates the main physical layer network usage on an interface during the session
sampling. The value is reflected in percents.
Viewing Statistics for a Specific Table Entry
1
The following table summarizes the equivalent CLI commands for viewing RMON history.
Table 8-81.
CLI Command
Description
Viewing Statistics
275
www.dell.com | support.dell.com
The following is an example of the CLI commands for displaying RMON ethernet statistics for
throughput on index 1:.
console# show rmon history 1 throughput
Sample Set: 1
Owner: CLI
Interface: g11
Interval: 1800
Requested samples: 50
Granted samples: 50
Octets
------------------
Packets
Broadcast
Multicast
--------- -------
----------
---------
-----
303595962 357568
3289
7287
19.98%
287696304 275686
2789
2789
20.17%
276
Viewing Statistics
Figure 8-119.
Click Add.
The Add an Event Entry page opens.
Viewing Statistics
277
www.dell.com | support.dell.com
Select Remove for the event(s) that need to be deleted and then click Apply Changes.
The selected table entry is deleted, and the Ethernet Switch Module is updated.
NOTE: A single event entry can be removed from the RMON Events Control page by selecting the
Remove check box on that page.
The following table summarizes the equivalent CLI commands for defining RMON events.
Table 8-82. RMON Event Definition CLI Commands
CLI Command
Description
278
Viewing Statistics
Description
Type
Community
Owner
-----
-----------
--------
---------
-------
--------------------
Errors
Log
CLI
Manager
router
Viewing Statistics
279
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for viewing Ethernet Switch
Module RMON events.
Table 8-83. RMON Event Definition CLI Commands
CLI Command
Description
Description
Time
-------
--------------
---------
Errors
Errors
High Broadcast
280
Viewing Statistics
Figure 8-121.
RMON Alarms
Viewing Statistics
281
www.dell.com | support.dell.com
Falling Threshold The falling counter value that triggers the falling threshold alarm. The falling
threshold is graphically presented on the bottom of the graph bars. Each monitored variable is
designated a color.
Startup Alarm The trigger that activates the alarm generation. Rising is defined by crossing the
threshold from a low-value threshold to a higher-value threshold.
Interval (Sec) Alarm interval time.
Owner Ethernet Switch Module or user that defined the alarm.
Remove When selected, removes an RMON Alarm.
Adding an Alarm Table Entry
1
Click Add.
The Add an Alarm Entry page opens:
Select an interface.
282
Viewing Statistics
The following table summarizes the equivalent CLI commands for defining RMON alarms.
Table 8-84.
CLI Command
Description
Viewing Statistics
283
www.dell.com | support.dell.com
OID
Owner
------
------------------- --------------
1.3.6.1.2.1.2.2.1.1 CLI
0.1
1.3.6.1.2.1.2.2.1.1 Manager
0.1
1.3.6.1.2.1.2.2.1.1 CLI
0.9
284
Viewing Statistics
Viewing Charts
The Chart page contains links for displaying statistics in a chart form. To open the page, click
Statistics/RMON Charts in the tree view.
Port Statistics
Select the desired refresh rate from the Refresh Rate drop-down menu.
Viewing Statistics
285
www.dell.com | support.dell.com
Click Draw.
The graph for the selected statistic is displayed.
The following table summarizes the equivalent CLI commands for viewing port statistics.
Port Statistic CLI Commands
CLI Command
Description
: Invalid Protocol Id
INVATYP
INVAVAL
Port
286
Viewing Statistics
Figure 8-124.
LAG Statistics
Select the desired refresh rate from the Refresh Rate drop-down menu.
Click Draw.
The graph for the selected statistic is displayed.
The following table summarizes the equivalent CLI commands for viewing LAG statistics.
Viewing Statistics
287
www.dell.com | support.dell.com
Description
Port rJE
rJIn
rEmp
rLIn
rLE
rLA
sJE
sJIn
sEmp
sLIn sLE
sLA
---- ---
----
----
----
---
---
---
----
----
---- ---
---
g11
g12
g13
g14
g15
g16
288
Viewing Statistics
Classification Specifies which packet fields are matched to specific values. All packets
matching the user-defined specifications are classified together.
Action Defines traffic management where packets being forwarded are based on packet
information, and packet field values such as VLAN priority (VPT) and DSCP (DiffServ Code
Point).
VLAN Priority Tags are used to classify the packets by mapping packets to one of the egress queues.
VLAN Priority Tag to queue assignments are user-definable. The table below details the VPT to
queue default settings:
Table 9-86.
CoS Value
q2 (Best Effort)
q1 (Lowest Priority)
q1 (Lowest Priority)
q2 ( Best Effort)
q3
q3
q4 (Highest Priority)
289
www.dell.com | support.dell.com
q4 (Highest Priority)
Packets arriving untagged are assigned a default VPT value, which is set on a per port basis. The
assigned VPT is used to map the packet to the egress queue.
DSCP values can be mapped to priority queues. The following table contains the default DSCP
mapping to egress queue values:
Table 9-87. DSCP to Queue Mapping Table Default Values
D S C P Va l u e
Fo r w a r d i n g Q u e u e Va l u e s
0-15
q1 (Lowest Priority)
16-31
q2
32-47
q3
48-63
q4 (Highest Priority)
CoS Services
After packets are assigned to a specific egress queue, CoS services can be assigned to the queue(s).
Egress queues are configured with a scheduling scheme by one of the following methods:
Strict Priority Ensures that time-sensitive applications are always forwarded. Strict Priority
(SP) allows the prioritization of mission-critical, time-sensitive traffic over less time-sensitive
applications.
For example, under Strict Priority, voice over IP traffic is forwarded before FTP or e-mail
(SMTP) traffic.
Weighted Round Robin Ensures that a single application does not dominate the Ethernet
Switch Module forwarding capacity. Weighted Round Robin (WRR) forwards entire queues
in a Round Robin order. All queues can participate in WRR, with expect SP queues.
SP queues are serviced before WRR queues. If the traffic flow is minimal, and SP queues do
not occupy the whole bandwidth allocated to a port, the WRR queues can share the
bandwidth with the SP queues. Ensuring the remaining bandwidth is distributed according to
the weight ratio.
290
Quality of Service Enables or disables managing network traffic using Quality of Service.
Trust Mode Determines which packet fields are used to classify packets entering the Ethernet
Switch Module. When no rules are defined, the traffic containing the predefined CoS or DSCP
packet field is mapped according to the selected trust mode. Traffic not containing a predefined
packet field is mapped to the best effort queue (q2). The possible Trust Mode field values are:
CoS The egress queue assignment is determined by the IEEE802.1p VLAN priority tag
(VPT) or by the default VPT assigned to a port. The Ethernet Switch Module default is the
IEEE802.1p.
DSCP The egress queue assignment is determined by the DSCP field.
NOTE: The interface Trust settings overrides the global Trust setting.
Enabling Quality of Service:
1
291
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for configuring fields in the QoS
Global Settings page.
Table 9-88. CoS Setting CLI Commands
CLI Command
Description
no qos trust
292
Figure 9-126.
Interface Settings
293
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for configuring fields in the
Interface Settings page.
Table 9-89. CoS Interface CLI Commands
CLI Command
Description
qos trust
no qos trust
294
Figure 9-127.
295
www.dell.com | support.dell.com
The following table summarizes the equivalent CLI commands for configuring fields in the Global
Queue Settings page.
Table 9-90. Queue Settings CLI Commands
CLI Command
Description
296
qid
weights
Ef
Priority
-----
--------
-----
----------
125
Disable
N/A
125
Disable
N/A
125
Disable
N/A
125
Disable
N/A
297
www.dell.com | support.dell.com
Class of Service Specifies the CoS priority tag values, where zero is the lowest and 7 is the
highest.
Queue The queue to which the CoS priority is mapped. Four traffic priority queues are
supported.
Restore Defaults Restores the Ethernet Switch Module factory defaults for mapping CoS values
to an egress queue.
Mapping a CoS value to a Queue
1
The following table summarizes the equivalent CLI commands for configuring fields in the CoS to
Queue Mapping Table page.
298
Table 9-91.
CLI Command
Description
DSCP In The values of the DSCP field within the incoming packet.
299
www.dell.com | support.dell.com
Queue The queue to which packets with the specific DSCP value is assigned. The values are 14, where 1 is the lowest value and 4 is the highest.
Mapping a DSCP value and assigning priority queue:
1
The following table summarizes the equivalent CLI commands for configuring fields in the DSCP
to Queue Mapping page.
Table 9-92. DSCP Value to Queue CLI Commands
CLI Command
Description
300
Feature Specifications
VLAN
VLAN support for Tagging and Port Based as per IEEE 802.1Q
Quality of Service
Layer 2 Multicast
TACACS+
301
www.dell.com | support.dell.com
Link Aggregation with support for up to six Aggregated Links per Ethernet Switch Module
and up to six Ports per aggregated link (IEEE 802.3ad)
LACP Support
Port Mirroring
302
SNTP Support
Layer 3 Traceroute
Telnet Client
DNS Client
Glossary
This glossary contains key technical words of interest.
A
Access Mode
Specifies the method by which user access is granted to the system.
Access Profiles
Allows network managers to define profiles and rules for accessing the switch module. Access to management
functions can be limited to user groups, which are defined by the following criteria:
Ingress interfaces
Aggregated VLAN
Groups several VLANs into a single aggregated VLAN. Aggregating VLANs enables routers to respond to ARP
requests for nodes located on different sub-VLANs belonging to the same Super VLAN. Routers respond with
their MAC address.
ARP
Address Resolution Protocol. A TCP/IP protocol that converts IP addresses into physical addresses.
ASIC
Application Specific Integrated Circuit. A custom chip designed for a specific application.
Asset Tag
Specifies the user-defined switch module reference.
Authentication Profiles
Sets of rules which that enables login to and authentication of users and applications.
Glossary
303
www.dell.com | support.dell.com
Auto-negotiation
Allows 10/100 Mpbs or 10/100/1000 Mbps Ethernet ports to establish for the following features:
Flow Control
Speed
Back Pressure
A mechanism used with Half Duplexmode that enables a port not to receive a message.
Backplane
304
Glossary
Bridge
A Ethernet switch module that connect two networks. Bridges are hardware specific, however they are protocol
independent. Bridges operate at Layer 1 and Layer 2 levels.
Broadcast Domain
Ethernet switch module sets that receive broadcast frames originating from any Ethernet switch module within
a designated set. Routers bind Broadcast domains, because routers do not forward broadcast frames.
Broadcasting
A method of transmitting packets to all ports on a network.
Broadcast Storm
An excessive amount of broadcast messages simultaneously transmitted across a network by a single port.
Forwarded message responses are heaped onto the network, overloading network resources or causing the
network to time out.
For more information about broadcast storms, see "Defining LAG Parameters."
C
CDB
Configuration Data Base. A file containing a Ethernet switch module s configuration information.
Class of Service
Class of Service (CoS). Class of Service is the 802.1p priority scheme. CoS provides a method for tagging packets
with priority information. A CoS value between 0-7 is added to the Layer II header of packets, where zero is the
lowest priority and seven is the highest.
A overlapping transmission of two or more packets that collide. The data transmitted cannot be used, and the
session is restarted.
CLI
Command Line Interface. A set of line commands used to configure the system. For more information on using
the CLI, see Using the CLI.
Communities
Specifies a group of users which retains the same system access rights.
CPU
Central Processing Unit. The part of a computer that processes information. CPUs are composed of a control
unit and an ALU.
D
DHCP Client
An Internet host using DHCP to obtain configuration parameters, such as a network address.
Glossary
305
www.dell.com | support.dell.com
DSCP
DiffServe Code Point (DSCP). DSCP provides a method of tagging IP packets with QoS priority information.
Domain
A group of computers and Ethernet switch modules on a network that are grouped with common rules and
procedures.
DRAC/MC
Dell Remote Access Controller / Modular Chassis (DRAC/MC). Provides a single point of control for Dell
Modular Server System components.
Duplex Mode
Permits simultaneous transmissions and reception of data. There are two different types of duplex mode:
Full DuplexMode Permits for bisynchronous communication, for example, a telephone. Two parties can
transmit information at the same time.
Half DuplexMode Permits asynchronous communication, for example, a walkie-talkie. Only one party
can transmit information at a time.
Egress Ports
Ports from which network traffic is transmitted.
End System
An end user Ethernet switch module on a network.
Ethernet
Ethernet is standardized as per IEEE 802.3. Ethernet is the most common implemented LAN standard.
Supports data transfer rates of Mpbs, where 10, 100 or 1000 Mbps is supported.
EWS
Embedded Web Server. Provides Ethernet switch module management via a standard web browser. Embedded
Web Servers are used in addition to or in place of a CLI or NMS.
F
FFT
Fast Forward Table. Provides information about forwarding routes. If a packet arrives to a Ethernet switch module
with a known route, the packet is forwarded via a route listed in the FFT. If there is not a known route, the CPU
forwards the packet and updates the FFT.
FIFO
First In First Out. A queuing process where the first packet in the queue is the first packet out of the packet.
306
Glossary
Flapping
Flapping occurs when an interfaces state is constantly changing. For example, an STP port constantly changes
from listening to learning to forwarding. This may cause traffic loss.
Flow Control
Enables lower speed Ethernet switch modules to communicate with higher speed Ethernet switch module s, that
is, that the higher speed Ethernet switch module refrains from sending packets.
Fragment
Ethernet packets smaller than 576 bits.
Frame
Packets containing the header and trailer information required by the physical medium.
G
GARP
General Attributes Registration Protocol. Registers client stations into a Multicast domain.
Gigabit Ethernet
Gigabit Ethernet transmits at 1000 Mbps, and is compatible with existing 10/100 Mbps Ethernet standards.
GVRP
GARP VLAN Registration Protocol. Registers client stations into a VLANs.
H
HOL
Head of Line. Packets are queued. Packets at the head of the queue are forwarded before packets at the end of the
line.
Host
A computer that acts as a source of information or services to other computers.
HTTP
HyperText Transport Protocol. Transmits HTML documents between servers and clients on the internet.
I
IC
Integrated Circuit. Integrated Circuits are small electronic Ethernet switch modules composed from
semiconductor material.
Glossary
307
www.dell.com | support.dell.com
ICMP
Internet Control Message Protocol. Allows gateway or destination host to communicate with a source host, for
example, to report a processing error.
IEEE
Institute of Electrical and Electronics Engineers. An Engineering organization that develops communications and
networking standards.
IEEE 802.1d
Used in the Spanning Tree Protocol, IEEE 802.1d supports MAC bridging to avoid network loops.
IEEE 802.1p
Prioritizes network traffic at the data-link/MAC sublayer.
IEEE 802.1Q
Defines the operation of VLAN Bridges that permit the definition, operation, and administration of VLANs
within Bridged LAN infrastructures.
Image File
System images are saved in two Flash sectors called images (Image 1 and Image 2). The active image stores
the active copy; while the other image stores a second copy.
Ingress Port
Ports on which network traffic is received.
IP
Internet Protocol. Specifies the format of packets and there addressing method. IP addresses packets and forwards
the packets to the correct port.
IP Address
Internet Protocol Address. A unique address assigned to a network Ethernet switch module with two or more
interconnected LANs or WANs.
IPX
Internetwork Packet Exchange. Transmits connectionless communications.
J
Jumbo Frames
Enables transporting the identical data in fewer frames. Jumbo Frames reduce overhead, lower processing time,
and ensures fewer interrupts.
308
Glossary
LAG
Link Aggregated Group. Aggregates ports or VLANs into a single virtual port or VLAN.
For more information on LAGs, see Defining LAG Membership.
LAN
Local Area Networks. A network contained within a single room, building, campus or other limited geographical
area.
Layer 2
Data Link Layer or MAC Layer. Contains the physical address of a client or server station. Layer 2 processing is
faster than Layer 3 processing because there is less information to process.
Layer 4
Establishes a connections and ensures that all data arrives to their destination. Packets inspected at the Layer 4
level are analyzed and forwarding decisions based on their applications.
Load Balancing
Enables the even distribution of data or processing packets across available network resources. For example, load
balancing may distribute the incoming packets evenly to all servers, or redirect the packets to the next available
server.
M
MAC Address
Media Access Control Address. The MAC Address is a hardware specific address that identifies each network
node.
MAC Address Learning
MAC Address Learning characterizes a learning bridge, in which the packets source MAC address is recorded.
Packets destined for that address are forwarded only to the bridge interface on which that address is located.
Packets addressed to unknown addresses are forwarded to every bridge interface. MAC Address Learning
minimizes traffic on the attached LANs.
MAC Layer
A sub-layer of the Data Link Control (DTL) layer.
Mask
A filter that includes or excludes certain values, for example parts of an IP address.
For example, Unit 2 is inserted in the first minute of a ten-minute cycle, and Unit 1 is inserted in fifth minute of
the same cycle, the units are considered the same age.
Glossary
309
www.dell.com | support.dell.com
MD5
Message Digest 5. An algorithm that produces a 128-bit hash. MD5 is a variation of MD4, and increases MD4
security. MD5 verifies the integrity of the communication, authenticates the origin of the communication.
MDI
Media Dependent Interface. A cable used for end stations.
MDIX
Media Dependent Interface with Crossover (MDIX). A cable used for hubs and switches.
MIB
Management Information Base. MIBs contain information describing specific aspects of network components.
Multicast
Transmits copies of a single packet to multiple ports.
N
NMS
Network Management System. An interface that provides a method of managing a system.
Node
A network connection endpoint or a common junction for multiple network lines. Nodes include:
Processors
Controllers
Workstations
OID
Object Identifier. Used by SNMP to identify managed objects. In the SNMP Manager/ Agent network
management paradigm, each managed object must have an OID to identify it.
P
Packets
Blocks of information for transmission in packet switched systems.
PDU
Protocol Data Unit. A data unit specified in a layer protocol consisting of protocol control information and layer
user data.
310
Glossary
PING
Packet Internet Groper. Verifies if a specific IP address is available. A packet is sent to another IP address and waits
for a reply.
Port
Physical ports provide connecting components that allow microprocessors to communicate with peripheral
equipment.
Port Mirroring
Monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to
a monitoring port.
For more information on port mirroring, see "Defining Port Mirroring Sessions."
Port Speed
Indicates port speed of the port. Port speeds include:
Ethernet 10 Mbps
Protocol
A set of rules that governs how Ethernet switch modules exchange information across networks.
Q
QoS
Quality of Service. QoS allows network managers to decide how and what network traffic is forwarded according
to priorities, application types, and source and destination addresses.
Query
Extracts information from a database and presents the information for use.
R
RADIUS
Remote Authentication Dial-In User Service. A method for authenticating system users, and tracking connection
time.
RMON
Remote Monitoring. Provides network information to be collected from a single workstation.
Router
A Ethernet switch module that connects to separate networks. Routers forward packets between two or more
networks. Routers operate at a Layer 3 level.
Glossary
311
www.dell.com | support.dell.com
RSTP
Rapid Spanning Tree Protocol. Detects and uses network topologies that allow a faster convergence of the
spanning tree, without creating forwarding loops.
Running Configuration File
Contains all startup configuration file commands, as well as all commands entered during the current session.
After the switch module is powered down or rebooted, all commands stored in the Running Configuration file
are lost.
S
Segmentation
Divides LANs into separate LAN segments for bridging. Segmentation eliminates LAN bandwidth limitations.
Server
A central computer that provides services to other computers on a network. Services may include file storage and
access to applications.
SNMP
Simple Network Management Protocol. Manages LANs. SNMP based software communicates with network
Ethernet switch modules with embedded SNMP agents. SNMP agents gather network activity and Ethernet
switch module status information, and send the information back to a workstation.
SNTP
Simple Network Time Protocol. SNTP assures accurate network switch clock time synchronization up to the
millisecond.
SoC
System on a Chip. An ASIC that contains an entire system. For example, a telecom SoC application can contain
a microprocessor, digital signal processor, RAM, and ROM.
Spanning Tree Protocol
Prevents loops in network traffic. The Spanning Tree Protocol (STP) provides tree topography for any
arrangement of bridges. STP provides one path between end stations on a network, eliminating loops.
SSH
Secure Shell. Permits logging to another computer over a network, execute commands on a remote machine, and
move files from one machine to another. Secure Shell provides strong authentication and secure
communications methods over unsecure channels.
Startup Configuration
Retains the exact switch module configuration when the switch module is powered down or rebooted.
312
Glossary
Subnet
Sub-network. Subnets are portions of a network that share a common address component. On TCP/IP networks,
Ethernet switch modules that share a prefix are part of the same subnet. For example, all Ethernet switch
modules with a prefix of 157.100.100.100 are part of the same subnet.
Subnet Mask
Used to mask all or part of an IP address used in a subnet address.
Switch
Filters and forwards packets between LAN segments. Switches support any packet protocol type.
T
TCP/IP
Transmissions Control Protocol. Enables two hosts to communicate and exchange data streams. TCP guarantees
packet delivery, and guarantees packets are transmitted and received in the order their sent.
Telnet
Terminal Emulation Protocol. Enables system users to log in and use resources on remote networks.
TFTP
Trivial File Transfer Protocol. Uses User Data Protocol (UDP) without security features to transfer files.
Trap
A message sent by the SNMP that indicates that system event has occurred.
Trunking
Link Aggregation. Optimizes port usage by linking a group of ports together to form a single trunk (aggregated
groups).
U
UDP
User Data Protocol. Transmits packets but does not guarantee their delivery.
Unicast
A form of routing that transmits one packet to one user.
V
VLAN
Virtual Local Area Networks. Logical subgroups with a Local Area Network (LAN) created via software rather
than defining a hardware solution.
Glossary
313
www.dell.com | support.dell.com
WAN
Wide Area Networks. Networks that cover a large geographical area.
Wildcard Mask
Specifies which IP address bits are used, and which bits are ignored. A wild switch module mask of
255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits are important.
For example, if the destination IP address 149.36.184.198 and the wildcard mask is 255.36.184.00, the first two
bits of the IP address are used, while the last two bits are ignored.
314
Glossary
Index
Numerics
BPDU, 304
802.1d, 13
Defining device
information, 67
Broadcast, 79-81, 89
Device representation, 58
Buttons, 60
A
Access mode, 152
Access profiles, 121
ACE, 303
Address Resolution
Protocol, 15, 115, 303
DHCP, 15
C
Cables, 118-119
CIDR, 305
Class of Service, 13
Dimensions, 19
DNS, 108
Domain Name System, 108
Downloading files, 161
Downloading software, 158
CLI, 16
AH, 303
CLI Examples, 65
Alert, 92
Anycast, 79-81, 89
Communities, 153
Asset, 67, 69
Configuration, 40
Emergency, 92
Auto-Negotiation, 37
EPG, 307
Critical, 92
Error, 92
Ethernet, 231
B
Backup file, 159
BGP, 304
Debug, 92
BootP, 304
Extensible Authentication
Protocol, 17, 169
Index
315
316
Index
HTTP, 121
Fast Link, 14
HTTPS, 121
L2TP, 309
LACP, 238
I
ICMP, 308
IDRP, 308
IEEE, 308
IEEE 802.1d, 308
IEEE 802.1p, 309
LAG, 309
LAGs, 248
LCP, 218
Light Emitting Diodes, 20
Line, 128
Line Passwords, 137
Link Control Protocol, 218
IEEE 802.1Q-, 13
IGMP, 309
Gateway, 102
Image, 309
GBIC, 308
Image 1, 309
General Attributes
Registration Protocol, 308
Image 2, 309
Generic Attribute
Registration Protocol, 204
Ingress, 309
GRE, 308
Interface mode, 64
Internetwork Packet
Exchange, 309
iles, 159
IP, 309
IPM, 309
Hardware version, 77
IPX, 309
Hash, 80
ISIS, 309
Height, 19
HOL, 308
316
Index
Informational, 92
IP addresses, 103
HMP, 308
J
Jumbo frames, 309
Management Information
Base., 310
Management methods, 123
Management security, 121
Master Election/Topology
Discovery Algorithm, 310
MD5, 80, 310
MDI, 11, 184, 310
MDI/MDIX, 38
MDIX, 11, 184, 310
MDU, 310
Message, 80
Message Digest 5, 310
Message digest 5, 80
Package Contents, 24
RFC1042, 231
Package contents, 24
N
NCP, 218
Network Control
Protocols, 218
Network Management
System., 311
Network security, 169
Notice, 92
PPP, 312
Running Configuration
file, 159
Profiles, 121
RVSP, 312
Protocol, 231
PVID, 225, 229
S
Secure Shell, 131
RAM logs, 93
Software version, 77
RDP, 312
OSPF, 311
Stratums, 79
Index
317
318
Index
SYSLOG RFC, 90
System, 67
UDP, 314
Understanding the
interface, 57
Unicast, 79-81
T1, 80
T2, 80
T3, 80
T4, 80
TACACS, 128, 141
TCP, 15
TFTP, 313
Time Domain
Reflectometry, 119
Time levels, 80
Transport Control
Protocol, 15
VLANs, 220
318
Index
W
Warning, 92
Web management system
icons, 59
Weighted Round Robin, 294
Width, 19