NETGEAR GS716Tv2 - ProSafe Gigabit Managed Switch Admin Manual

Add to My manuals
246 Pages

advertisement

NETGEAR GS716Tv2 - ProSafe Gigabit Managed Switch Admin Manual | Manualzz

GS716Tv2 and GS724Tv3

Software Administration

Manual

NETGEAR , Inc.

350 E. Plumeria Drive

San Jose CA 95134 USA

202-10484-01

July 2009

© 2007, 2008, 2009 by NETGEAR, Inc. All rights reserved. FullManual.

Technical Support

Please refer to the support information card that shipped with your product. By registering your product at http://www.netgear.com/register , we can provide you with faster expert technical support and timely notices of product and software upgrades.

NETGEAR, INC. Support Information

Phone: 1-888-NETGEAR, for US & Canada only. For other countries, see your Support information card.

E-mail: [email protected]

North American NETGEAR website: http://www.netgear.com

Trademarks

NETGEAR, the NETGEAR logo, and Auto Uplink are trademarks or registered trademarks of NETGEAR, Inc.

Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation.Other brand and product names are registered trademarks or trademarks of their respective holders. Portions of this document are copyright

Intoto, Inc.

July 2009

Statement of Conditions

In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to make changes to the products described in this document without notice.

NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.

Certificate of the Manufacturer/Importer

It is hereby certified that the Gigabit Smart Switch has been suppressed in accordance with the conditions set out in the

BMPT-AmtsblVfg 243/1991 and Vfg 46/1992. The operation of some equipment (for example, test transmitters) in accordance with the regulations may, however, be subject to certain restrictions. Please refer to the notes in the operating instructions.

The Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for compliance with the regulations.

Bestätigung des Herstellers/Importeurs

Es wird hiermit bestätigt, daß dasGigabit Smart Switch gemäß der im BMPT-AmtsblVfg 243/1991 und Vfg 46/1992 aufgeführten Bestimmungen entstört ist. Das vorschriftsmäßige Betreiben einiger Geräte (z.B. Testsender) kann jedoch gewissen Beschränkungen unterliegen. Lesen Sie dazu bitte die Anmerkungen in der Betriebsanleitung.

Das Bundesamt für Zulassungen in der Telekommunikation wurde davon unterrichtet, daß dieses Gerät auf den Markt gebracht wurde und es ist berechtigt, die Serie auf die Erfüllung der Vorschriften hin zu überprüfen.

Voluntary Control Council for Interference (VCCI) Statement

This equipment is in the Class B category (information equipment to be used in a residential area or an adjacent area thereto) and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing ii v1.0, July 2009

Equipment and Electronic Office Machines aimed at preventing radio interference in such residential areas. When used near a radio or TV receiver, it may become the cause of radio interference. Read instructions for correct handling.

Product and Publication Details

Model Number:

Publication Date:

Product Family:

Product Name:

GS716T and GS724T

July 2009

GS716T/GS724T Series Smart Switch

Gigabit Smart Switch

Home or Business Product: Business

Language: English

Publication Part Number: 202-10484-01

Publication Version Number: 1.0 v1.0, July 2009 iii

iv v1.0, July 2009

Contents

GS716Tv2 and GS724Tv3 Software Administration Manual

About This Manual

Audience ........................................................................................................................... xi

Organization ..................................................................................................................... xi

Conventions, Formats and Scope ................................................................................... xii

How to Use This Manual ................................................................................................ xiv

How to Print this Manual ................................................................................................. xiv

Revision History ............................................................................................................... xv

Chapter 1

Getting Started

Connecting the Switch to the Network ............................................................................1-1

Switch Management Interface ........................................................................................1-2

SmartWizard Discovery in a Network with a DHCP Server ............................................1-3

SmartWizard Discovery in a Network without a DHCP Server .......................................1-4

Manually Assigning Network Parameters ................................................................1-5

Configuring the Network Settings on the Administrative System .............................1-6

SmartWizard Discovery Utilities .....................................................................................1-6

Password Change ....................................................................................................1-7

Firmware Upgrade ...................................................................................................1-7

Exit ...........................................................................................................................1-8

Understanding the User Interfaces .................................................................................1-9

Using the Web Interface ...........................................................................................1-9

Using SNMP ...........................................................................................................1-14

Common Parameter Values .........................................................................................1-15

Interface Naming Convention .......................................................................................1-16 v v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Configuring System Information

System Information .........................................................................................................2-1

Defining System Information ....................................................................................2-3

Network Connectivity ......................................................................................................2-3

Time ................................................................................................................................2-5

Time Configuration ...................................................................................................2-6

SNTP Global Status .................................................................................................2-8

SNTP Server Configuration ....................................................................................2-10

SNTP Server Status ...............................................................................................2-11

Denial of Service ..........................................................................................................2-13

Green Ethernet Configuration .......................................................................................2-15

SNMP V1/V2 ................................................................................................................2-16

Community Configuration .......................................................................................2-17

Trap Configuration .................................................................................................2-19

Trap Flags ..............................................................................................................2-20

SNMP v3 User Configuration .......................................................................................2-21

LLDP .............................................................................................................................2-23

LLDP Configuration ................................................................................................2-23

LLDP Port Settings .................................................................................................2-24

Local Information ....................................................................................................2-27

Neighbors Information ............................................................................................2-30

Chapter 3

Configuring Switching Information

Configuring and Viewing Device Port Information ..........................................................3-1

Port Configuration ....................................................................................................3-1

Flow Control .............................................................................................................3-4

Creating LAGs ................................................................................................................3-5

LAG Configuration ....................................................................................................3-5

LAG Membership .....................................................................................................3-7

LACP Configuration .................................................................................................3-8

LACP Port Configuration ..........................................................................................3-9

Managing VLANs ..........................................................................................................3-10

VLAN Configuration ...............................................................................................3-10

VLAN Membership Configuration ...........................................................................3-12 vi v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Port VLAN ID Configuration ...................................................................................3-14

Configuring Spanning Tree Protocol ............................................................................3-16

STP Switch Configuration/Status ...........................................................................3-17

CST Configuration ..................................................................................................3-19

CST Port Configuration ..........................................................................................3-21

CST Port Status .....................................................................................................3-23

Rapid STP Configuration .......................................................................................3-24

MST Configuration .................................................................................................3-26

MST Port Configuration ..........................................................................................3-27

STP Statistics .........................................................................................................3-31

Configuring IGMP Snooping .........................................................................................3-32

Global Configuration ..............................................................................................3-32

IGMP Snooping Interface Configuration ................................................................3-34

Viewing Multicast Forwarding Database Information ...................................................3-35

IGMP Snooping Table ............................................................................................3-36

MFDB Table ...........................................................................................................3-37

MFDB Statistics ......................................................................................................3-39

IGMP Snooping VLAN Configuration .....................................................................3-40

Configuring IGMP Snooping Queriers ..........................................................................3-42

IGMP Snooping Querier Configuration ..................................................................3-43

IGMP Snooping Querier VLAN Configuration ........................................................3-44

IGMP Snooping Querier VLAN Status ...................................................................3-45

Searching and Configuring the Forwarding Database ..................................................3-47

Searching the MAC Address Table ........................................................................3-47

Dynamic Address Configuration .............................................................................3-49

MAC Address Table ...............................................................................................3-50

Static MAC Address ...............................................................................................3-52

Chapter 4

Configuring Quality of Service

Configuring Class of Service ..........................................................................................4-1

Basic CoS Configuration ..........................................................................................4-2

CoS Interface Configuration .....................................................................................4-3

Interface Queue Configuration .................................................................................4-5

802.1p to Queue Mapping ........................................................................................4-6

DSCP to Queue Mapping .........................................................................................4-7 vii v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Managing Device Security

Management Security Settings .......................................................................................5-1

Change Password ....................................................................................................5-2

RADIUS Configuration .............................................................................................5-3

Configuring TACACS+ ...........................................................................................5-10

Authentication List Configuration ...........................................................................5-13

Configuring Management Access .................................................................................5-15

HTTP Configuration ...............................................................................................5-15

Secure HTTP Configuration ...................................................................................5-16

Certificate Download ..............................................................................................5-18

Access Profile Configuration ..................................................................................5-19

Access Rule Configuration .....................................................................................5-21

Port Authentication .......................................................................................................5-22

802.1X Configuration .............................................................................................5-23

Port Authentication .................................................................................................5-24

Port Summary ........................................................................................................5-28

Traffic Control ...............................................................................................................5-30

MAC Filter Configuration ........................................................................................5-30

MAC Filter Summary ..............................................................................................5-32

Storm Control .........................................................................................................5-33

Port Security Configuration ....................................................................................5-34

Port Security Interface Configuration .....................................................................5-35

Security MAC Address ...........................................................................................5-37

Protected Ports Membership ..................................................................................5-38

Configuring Access Control Lists ..................................................................................5-39

MAC ACL ...............................................................................................................5-40

MAC Rules .............................................................................................................5-42

MAC Binding Configuration ....................................................................................5-44

MAC Binding Table ................................................................................................5-45

IP ACL ....................................................................................................................5-47

IP Rules ..................................................................................................................5-48

IP Extended Rule ...................................................................................................5-50

IP Binding Configuration ........................................................................................5-54

IP Binding Table .....................................................................................................5-56 viii v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Monitoring the System

Switch Statistics ..............................................................................................................6-1

Viewing Port Statistics ....................................................................................................6-4

Port Statistics ...........................................................................................................6-4

Port Detailed Statistics .............................................................................................6-5

EAP Statistics .........................................................................................................6-12

Managing Logs .............................................................................................................6-14

Memory Logs .........................................................................................................6-14

FLASH Log Configuration ......................................................................................6-16

Server Log Configuration .......................................................................................6-19

Trap Logs ...............................................................................................................6-21

Event Logs .............................................................................................................6-22

Configuring Port Mirroring ............................................................................................6-23

Multiple Port Mirroring ............................................................................................6-23

Chapter 7

Maintenance

Reset ..............................................................................................................................7-1

Rebooting the Switch ...............................................................................................7-1

Reset Configuration to Defaults ...............................................................................7-2

Upload File From Switch ................................................................................................7-3

Uploading Files ........................................................................................................7-5

Download File To Switch ................................................................................................7-5

TFTP File Download ................................................................................................7-6

HTTP File Download ................................................................................................7-8

File Management ..........................................................................................................7-10

Dual Image Configuration ......................................................................................7-10

Viewing the Dual Image Status ..............................................................................7-12

Troubleshooting ............................................................................................................7-13

Ping ........................................................................................................................7-13

TraceRoute ............................................................................................................7-14

Appendix A

Hardware Specifications and Default Values

GS7xxT Gigabit Smart Switch Specifications ................................................................ A-1

GS7xxTR Gigabit Smart Switch Features and Defaults ................................................ A-2 ix v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Configuration Examples

Virtual Local Area Networks (VLANs) ............................................................................ B-1

VLAN Example Configuration ................................................................................. B-2

Access Control Lists (ACLs) .......................................................................................... B-4

MAC ACL Example Configuration ........................................................................... B-5

Standard IP ACL Example Configuration ................................................................ B-6

802.1X ........................................................................................................................... B-8

802.1X Example Configuration ............................................................................. B-10

MSTP ........................................................................................................................... B-11

MSTP Example Configuration ............................................................................... B-13

Index x v1.0, July 2009

About This Manual

The NETGEAR® GS716Tv2 and GS724Tv3 Software Administration Manual describes how to configure and operate the Gigabit Smart Switch using its included software features by using the

Web-based graphical user interface (GUI). The book describes the software configuration procedures and explains the options available within those procedures.

Audience

The information in this guide is intended for any of the following individuals:

• System administrators who are responsible for configuring and operating a network using

GS716T/GS724T Smart Switch software

• Level 1 and/or Level 2 Support providers

To obtain the greatest benefit from this guide, you should have basic knowledge of Ethernet and networking concepts. When the basic configuration of the switch is performed, it will function in a network using its remaining factory default parameters. However, a greater level of configuration

—anywhere from the basic up to the maximum possible—will give your network the full benefit of the switch’s features. The Web interface simplifies this configuration at all levels.

Organization

The GS716Tv2 and GS724Tv3 Software Administration Manual contains the following chapters:

• Chapter 1, “Getting Started” on page 1-1 contains information about performing the initial system configuration and accessing the user interface.

• Chapter 2, “Configuring System Information” on page 2-1 describes how to configure administrative features such as SNMP, DHCP, and port information.

• Chapter 3, “Configuring Switching Information” on page 3-1 describes how to manage and monitor the layer 2 switching features.

• Chapter 4, “Configuring Quality of on page 4-1 describes how to manage the

GS716T/GS724T software ACLs, and how to configure the Differentiated Services and Class of Service features.

xi v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

• Chapter 5, “Managing Device Security” on page 5-1 contains information about configuring switch security information such as port access control, TACACS+, and RADIUS server settings.

• Chapter 6, “Monitoring the System” on page 6-1 describes how to view a variety of information about the switch and its port, and to configure how the switch monitors events.

• Chapter 7, “Maintenance” on page 7-1 describes features to help you manage the switch.

• Appendix A, “Hardware Specifications and Default Values” on page B-1 contains hardware specifications and default values on the GS716T/GS724T switch.

• Appendix B, “Configuration Examples” on page B-1 contains examples of how to configure various features on the GS716T/GS724T switch, such as VLAN and Access Control List

(ACL) configuration examples.

Note: Refer to the GS716T/GS724T Series Smart Switch for information about issues and workarounds.

Conventions, Formats and Scope

The conventions, formats, and scope of this manual are described in the following paragraphs:

• Typographical Conventions. This manual uses the following typographical conventions:

Italic

Bold

Fixed italic

Emphasis, books, CDs, file and server names, extensions

User input, IP addresses, GUI screen text

Command prompt, CLI text, code

URL links

• Formats. This manual uses the following formats to highlight special messages:

Note: A note provides more information about a feature or technology.

xii v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Tip: This format is used to highlight a procedure that will save time or resources.

Warning: A caution provides information about critical aspects of the configuration, combination of settings, events, or procedures that can adversely affect network connectivity, security, and so on.

Danger: This is a safety warning. Failure to take heed of this notice may result in personal injury or death.

• Scope. This manual is written for the Smart Switch according to these specifications:

Product Version

Manual Publication Date

GS716T and GS724T Gigabit Smart Switch

July 2009

Note: Product updates for the GS716T are available on the NETGEAR, Inc. website at http://kb.netgear.com/app/products/list/p3/322.

Product updates for the GS724T are available on the NETGEAR, Inc. website at http://kb.netgear.com/app/products/list/p3/322.

v1.0, July 2009 xiii

GS716Tv2 and GS724Tv3 Software Administration Manual

How to Use This Manual

The HTML version of this manual includes the following:

• Buttons, at a time and , for browsing forwards or backwards through the manual one page

• A button that displays the table of contents and an button. Double-click on a link in the table of contents or index to navigate directly to where the topic is described in the manual.

• A model.

button to access the full NETGEAR, Inc. online knowledge base for the product

• Links to PDF versions of the full manual and individual chapters.

How to Print this Manual

To print this manual, you can choose one of the following options, according to your needs.

• Printing a Page from HTML . Each page in the HTML version of the manual is dedicated to a major topic. Select File



Print from the browser menu to print the page contents.

• Printing from PDF . Your computer must have the free Adobe Acrobat reader installed in order to view and print PDF files. The Acrobat reader is available on the Adobe Web site at http://www.adobe.com

.

– Printing a PDF Chapter. Use the PDF of This Chapter link at the top left of any page.

• Click the PDF of This Chapter link at the top left of any page in the chapter you want to print. The PDF version of the chapter you were viewing opens in a browser window.

• Click the print icon in the upper left of your browser window.

– Printing a PDF version of the Complete Manual . Use the Complete PDF Manual link at the top left of any page.

• Click the Complete PDF Manual link at the top left of any page in the manual. The

PDF version of the complete manual opens in a browser window. xiv v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

• Click the print icon in the upper left of your browser window.

Tip: If your printer supports printing two pages on a single sheet of paper, you can save paper and printer ink by selecting this feature.

Revision History

Part Number

Version

Number

Date

202-10484-01 1.0

July 2009

Description

Product Created v1.0, July 2009 xv

GS716Tv2 and GS724Tv3 Software Administration Manual xvi v1.0, July 2009

Chapter 1

Getting Started

This chapter provides an overview of starting your NETGEAR GS716T/GS724T Gigabit Smart

Switch and accessing the user interface. It also leads you through the steps to use the SmartWizard

Discovery utility. This chapter contains the following sections:

• “Connecting the Switch to the Network” on page 1-1

• “Switch Management Interface” on page 1-2

• “SmartWizard Discovery in a Network with a DHCP Server” on page 1-3

• “SmartWizard Discovery in a Network without a DHCP Server” on page 1-4

• “SmartWizard Discovery Utilities” on page 1-6

• “Understanding the User Interfaces” on page 1-9

Connecting the Switch to the Network

To enable remote management of the switch through a Web browser or SNMP, you must connect the switch to the network. The switch comes up with a default IP address of 192.168.0.239, and

DHCP is enabled by default.

To access the switch over a network, you must first configure it with network information (an IP address, subnet mask, and default gateway). You can assign the IP information automatically by using a BOOTP or DHCP server.

After you configure network information, such as the IP address and subnet mask, and the switch is physically and logically connected to the network, you can manage and monitor the switch remotely through a Web browser or an SNMP-based network management system.

After you perform the physical hardware installation, you need to make a connection to the switch so that you can do one of the following:

• Manually configure network information for the management interface, or

• Enable the management interface as a DHCP or BOOTP client on your network (if not already enabled) and then view the network information after it is assigned by the DHCP server.

1-1 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Follow these steps:

1. Power on the switch.

2. Configure network information.

3. The switch comes up with a default IP address of 192.168.0.239.

After the switch is connected to the network, you can use the default IP address for remote access to the switch by using a Web browser and logging in to the Web interface. You should then be able to select the IP Configuration, under the System



Management



IP Configuration menu, for either Static, BOOTP, or DHCP IP assignment.

Switch Management Interface

NETGEAR provides the SmartWizard Discovery utility with this product. This program runs under Microsoft ® Windows ® XP, Windows 2000, or Windows Vista ® and provides a front end that discovers the switches on your network segment. When you power up your switch for the first time, the SmartWizard Discovery utility enables you to configure its basic network parameters without prior knowledge of the IP address or subnet mask. Following such configuration, this program leads you into the Web user interface.

Table 1-1 shows some features of the SmartWizard Discovery utility.

Table 1-1. SmartWizard Discovery Utility

Management Method

SmartWizard Discovery utility • No IP address or subnet mask setup needed

• Discover all switches on the network

• User-friendly interface under Microsoft Windows

• Firmware upgrade capability

• Password change feature (available at the application level, that is, when the switch is not at the boot level)

• Provides entry to Web configuration of switch

For more details about the SmartWizard Discovery utility, see “SmartWizard Discovery in a

Network with a DHCP Server” on page 1-3 or “SmartWizard Discovery in a Network without a

DHCP Server” on page 1-4 .

1-2 Getting Started v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

SmartWizard Discovery in a Network with a DHCP Server

To install the switch in a network with a DHCP server, use the following steps:

1.

Connect the Gigabit Smart Switch to a DHCP network.

2.

Power on the switch by connecting its AC-DC power adapter.

3.

Install the SmartWizard Discovery utility on your computer.

4.

Start the SmartWizard Discovery utility.

5.

Click Discover for the SmartWizard Discovery utility to find your GS716T or GS724T switch. You should see a screen similar to the one shown in Figure 1-1 .

Figure 1-1

6.

Make a note of the displayed IP address assigned by the DHCP server. You will need this value to access the switch directly from a Web browser (without using the SmartWizard

Discovery utility).

7.

Select your switch by clicking the line that shows it. Then click the Web Access button. The

SmartWizard Discovery utility displays a login window similar to Figure 1-2 on page 1-4 .

Getting Started 1-3 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 1-2

Use your Web browser to manage your switch. The default password is password . Then use this page to proceed to management of the switch covered in “Using the Web Interface” on page 1-9 .

SmartWizard Discovery in a Network without a DHCP Server

This section describes how to set up your switch in a network without a DHCP server, and is divided into the following tasks:

• “Manually Assigning Network Parameters” on page 1-5

• “Configuring the Network Settings on the Administrative System” on page 1-6

1-4 Getting Started v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Manually Assigning Network Parameters

If your network has no DHCP service, you must assign a static IP address to your switch. If you choose, you can assign it a static IP address, even if your network has DHCP service.

To assign a static IP address:

1.

Connect the GS716T or GS724T Gigabit Smart Switch to your existing network.

2.

Power on the switch by plugging in the AC-DC power adapter. (Default IP is 192.168.0.239),

3.

Install the SmartWizard Discovery utility on your computer.

4.

Start the SmartWizard Discovery utility.

5.

Click Discover for the SmartWizard Discovery utility to find your GS716T or GS724T switch. You should see a screen similar to Figure 1-1 on page 1-3 .

6.

Select the switch, then click Configuration Setting . A screen similar to Figure 1-3 appears.

Figure 1-3

7.

Choose the Disable radio box to disable DHCP.

8.

Enter your chosen switch IP address, gateway IP address and subnet mask, and then type your password and click Set .

Please ensure that your PC and the GS716T or GS724T Gigabit Smart Switch are in the same subnet. Make a note of these settings for later use.

Getting Started 1-5 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Configuring the Network Settings on the Administrative System

The settings of your network interface card (NIC) under the MS Windows OS are made with entries into Windows screen pages similar to the ones shown in Figure 1-4 . For comparison, refer to the settings pages of the switch shown in Figure 1-1 on page 1-3 and in Figure 1-3 on page 1-5 , although they do not appear in the Windows view. You need Windows Administrator privileges to change these settings.

Figure 1-4

To modify your NIC settings:

1.

On your PC, access the MS Windows operating system TCP/IP Properties.

2.

Set the IP address and subnet mask appropriately. The subnet mask value should be identical to that set in the switch. The PC IP address must be different from that of the switch but lie in the same subnet.

SmartWizard Discovery Utilities

Alternatively, you can access additional functions from the SmartWizard Discovery utility’s main page, shown in Figure 1-1 on page 1-3 . The additional functions include the following:

1-6 Getting Started v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

• “Password Change” on page 1-7

• “Firmware Upgrade” on page 1-7

Password Change

To set a new password:

1.

Click Password Change from the Switch Setting section. The Password Change screen appears. You can set a new password. In this process, you are required to enter the old password and to confirm the new one.

Note: Password Change is only available at the application level, i.e. when the switch is not at the boot level.

2.

Click Set to enable the new password.

You can set a new password of up to 20 ASCII characters.

Firmware Upgrade

The application software for the GS716T/GS724T Gigabit Smart Switch is upgradeable, enabling your switch to take advantage of improvements and additional features as they become available.

The upgrade procedure and the required equipment are described below. This procedure assumes that you have downloaded or otherwise obtained the firmware upgrade and that you have it available as a binary file on your computer. This procedure uses the TFTP protocol to implement the transfer from computer to switch.

Note: You can also upgrade the firmware using the TFTP Download and HTTP

Download features mentioned in this book. See “Download File To Switch” on page 7-5 .

To upgrade your firmware:

1.

Click Firmware Upgrade from the main screen (see Figure 1-1 on page 1-3 ), after you have selected the switch to upgrade. The following screen appears:

Getting Started 1-7 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 1-5

2.

Enter the following values into the appropriate places in the form:

• Product Assigned Firmware . The location of the new firmware. If you do not know the location, you can click Browse to locate the file.

• Upgrade Password . Enter your password, then click Apply ; the default password is

‘password’.

• Start Upgrade . Shows upgrading in progress.

3.

Click Start to begin loading the upgrade. The system software is automatically loaded. When the process is complete, the switch automatically reboots.

Note: It is important that you do not power-off the PC or the Switch while the Firmware upgrade is in progress.

Exit

Click Exit from the Switch Setting section to close the SmartWizard Discovery utility.

1-8 Getting Started v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Understanding the User Interfaces

GS716T/GS724T software includes a set of comprehensive management functions for configuring and monitoring the system by using one of the following methods:

• Web user interface

• Simple Network Management Protocol (SNMP)

Each of the standards-based management methods allows you to configure and monitor the components of the GS716T/GS724T software. The method you use to manage the system depends on your network size and requirements, and on your preference.

The GS716Tv2 and GS724Tv3 Software Administration Manual describes how to use the Webbased interface to manage and monitor the system.

Using the Web Interface

To access the switch by using a Web browser, the browser must meet the following software requirements:

• HTML version 4.0, or later

• HTTP version 1.1, or later

• Java Runtime Environment 1.6 or later

Use the following procedures to log on to the Web interface:

1.

Open a Web browser and enter the IP address of the switch in the Web browser address field.

2.

The factory default password is password . Type the password into the field on the login screen, as shown in Figure 1-6 on page 1-10 , and then click Login . Passwords are case sensitive.

Getting Started v1.0, July 2009

1-9

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 1-6

3.

After the system authenticates you, the System Information page displays.

1-10 v1.0, July 2009

Getting Started

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 1-7 shows the layout of the GS716T/GS724T software Web interface. Each Web page contains three main areas: navigation tree on the left, the configuration status and options, and the tabs at the top that provide access to all the configuration functions of the switch and remain constant.

Logout

Button

Help LInk

Help Page

Navigation Tree

Figure 1-7

Configuration Status and Options

Navigation Tabs

The navigation tabs are along the top of the Web interface. The tabs give you quick access to the various device functions.

When you select a tab, its hierarchical-tree view is on the left side of the Web interface. The tree view contains a list of various device features. The branches in the navigation tree can be expanded to view all the components under a specific feature, or retracted to hide the feature's components.

The tree consists of a combination of folders, subfolders, and configuration and status HTML pages. Click the folder to view the options in that folder. Each folder contains either subfolders or

HTML pages, or a combination of both. Figure 1-8 on page 1-12 shows an example of a folder,

Getting Started 1-11 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual subfolder, and HTML page in the navigation menu. When you click a folder or subfolder, it becomes preceded by a down arrow symbol and, if there is a subfolder, the folder expands to display the contents. If you click an HTML page, a new page displays in the main frame.

Folder

HTML Page

Figure 1-8

Configuration and Monitoring Options

The panel directly under the tabs and to the right of the navigation menu displays the configuration information or status for the page you select. On pages that contain configuration options, you can input information into fields or select options from drop down menus.

Each page contains access to the HTML-based help that explains the fields and configuration options for the page. Many pages also contain command buttons.

Table 1-2 shows the following command buttons are used throughout the pages in the Web interface:

Table 1-2. Common Command Buttons

Button

Add

Function

Click Add to update the switch with the values on a screen.

Apply

Cancel

Delete

Refresh

Logout

Clicking the Apply button sends the updated configuration to the switch. Configuration changes take effect immediately.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

To remove a configured item, select it and click Delete .

Clicking the Refresh button refreshes the page with the latest information from the device.

Clicking the Logout button ends the session.

1-12 Getting Started v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Device View

The Device View is a Java ® applet that displays the ports on the switch. This graphic provides an alternate way to navigate to configuration and monitoring options. The graphic also provides information about device ports, current configuration and status, table information, and feature components.

The Device View is available from the System



Device View page.

The port coloring indicates whether a port is currently active. Green indicates that the port is enabled, red indicates that an error has occurred on the port, or red indicates that the link is disabled.

Figure 1-9 shows the Device View of the system.

Figure 1-9

Click the port you want to view or configure to see a menu that displays statistics and configuration options. Click the menu option to access the page that contains the configuration or monitoring options.

Figure 1-10

Getting Started v1.0, July 2009

1-13

GS716Tv2 and GS724Tv3 Software Administration Manual

If you click the graphic, but do not click a specific port, the main menu appears, as Figure 1-11 shows. This menu contains the same option as the navigation tabs at the top of the page.

Figure 1-11

Help Page Access

Every page contains a link to the online help , which contains information to assist in configuring and managing the switch. The online help pages are context sensitive. For example, if the IP Addressing page is open, the help topic for that page displays if you click Help. Figure 1-7 on page 1-11 shows the location of the Help link on the Web interface.

/

\

*

?

User-Defined Fields

User-defined fields can contain 1-159 characters, unless otherwise noted on the configuration Web page. All characters may be used except for the following (unless specifically noted in for that feature):

|

<

>|

Using SNMP

For GS716T/GS724T software that includes the SNMP module, you can configure SNMP groups and users that can manage traps that the SNMP agent generates.

1-14 Getting Started v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

GS716T/GS724T switches use both standard public MIBs for standard functionality and private

MIBs that support additional switch functionality. All private MIBs begin with a “-” prefix. The main object for interface configuration is in -SWITCHING-MIB, which is a private MIB. Some interface configurations also involve objects in the public MIB, IF-MIB.

SNMP is enabled by default. The System



Management



System Information Web page, which is the page that displays after a successful login, displays the information you need to configure an SNMP manager to access the switch.

Any user can connect to the switch using the SNMPv3 protocol, but for authentication and encryption, the switch supports only one user which is admin ; therefore there is only one profile that can be created or modified.

To configure authentication and encryption settings for the SNMPv3 admin profile by using the

Web interface:

1.

Navigate to the System



SNMP



SNMPv3



User Configuration page.

2.

To enable authentication, select an Authentication Protocol option, which is either MD5 or

SHA .

3.

To enable encryption, select the DES option in the Encryption Protocol field. Then, enter an encryption code of eight or more alphanumeric characters in the Encryption Key field.

4.

Click Apply .

To access configuration information for SNMPv1 or SNMPv2, click System



SNMP



SNMPv1/v2 and click the page that contains the information to configure.

Common Parameter Values

Parameter values might be names (strings) or numbers. To use spaces as part of a name parameter, enclose the name value in double quotes. For example, the expression “System Name with

Spaces” forces the system to accept the spaces. Empty strings (“”) are not valid user-defined strings. Table 1-3 describes common parameter values and value formatting.

Table 1-3. Parameter Descriptions

Parameter ipaddr

Description

This parameter is a valid IP address. You can enter the IP address in the following formats: a.b.c.d (100.10.2.1)

Getting Started 1-15 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 1-3. Parameter Descriptions (continued)

Parameter

Interface

Logical Interface

Description g1, g2, and so on for the physical interfaces.

Represents a logical interface. This is applicable for a LAG (port-channel) interface which is represented as l1, l2, and so on.

Interface Naming Convention

GS716T/GS724T Switch supports physical and logical interfaces. Interfaces are identified by their type and the interface number. The physical ports are gigabit interfaces and are numbered on the front panel. You configure the logical interfaces by using the software. The following table describes the naming convention for all interfaces available on the switch.

Table 1-4. Types of Interface

Interface Description Example

Physical The physical ports are gigabit Ethernet interfaces and are numbered sequentially starting from one. g1, g2, g3

Link Aggregation Group (LAG) LAG interfaces are logical interfaces that are only used for bridging functions.

CPU Management Interface l1, l2, l3

LAG1, LAG2

This is the internal switch interface responsible for the switch base MAC address. This interface is not configurable and is always listed in the

MAC Address Table.

c1

1-16 v1.0, July 2009

Getting Started

Chapter 2

Configuring System Information

Use the features in the System tab to define the switch’s relationship to its environment. The

System tab contains links to the following features:

• “System Information” on page 2-1

• “Network Connectivity” on page 2-3

• “Time” on page 2-5

• “Denial of Service” on page 2-13

• “Green Ethernet Configuration” on page 2-15

• “SNMP V1/V2” on page 2-16

• “SNMP v3 User Configuration” on page 2-21

• “LLDP” on page 2-23

System Information

After a successful login, the System Information page displays. Use this page to configure and view general device information.

To display the System Information page:

1.

Click System



Management



System Information in the navigation tree.

2-1 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 2-1

Table 2-1. System Description Fields

Field

System Name

System Location

System Contact

Serial Number

System Object ID

Date & Time

System Up Time

Base MAC Address

Model Name

Description

Enter the name you want to use to identify this switch. You may use up to

31 alphanumeric characters. The factory default is blank.

Enter the location of this switch. You may use up to 31 alphanumeric characters. The factory default is blank.

Enter the contact person for this switch. You may use up to 31 alphanumeric characters. The factory default is blank.

The serial number of the switch.

The base object ID for the switch's enterprise MIB.

The current date and time.

Displays the number of days, hours, and minutes since the last system restart.

The universally assigned network address.

The model name of the switch.

2-2 Configuring System Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 2-1. System Description Fields (continued)

Field

Boot Version

Software Version

Description

The bootcode version of the switch.

The software version of the switch.

Defining System Information

1.

Open the System Information page.

2.

Define the following fields: System Name , System Location , and System Contact .

3.

Click Apply .

The system parameters are applied, and the device is updated.

Network Connectivity

The network interface is the logical interface used for in-band connectivity with the switch via any of the switch's front panel ports. The configuration parameters associated with the switch's network interface do not affect the configuration of the front panel ports through which traffic is switched or routed.

The Network Connectivity page allows you to change the IP information using the Web interface.

To access the page:

1.

Click System



Management



IP Configuration in the navigation tree.

Configuring System Information v1.0, July 2009

2-3

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 2-2

2.

To access the switch over a network, you must first configure it with IP information (IP address, subnet mask, and default gateway). You can configure the IP information using any of the following options:

• Dynamic IP Address (DHCP)

• Dynamic IP Address (BOOTP)

• Static IP Address

Table 2-2. Network Connectivity Fields

Field

IP Address

Subnet Mask

Default Gateway

Management VLAN ID

Description

The IP address of the network interface. The factory default value is

192.168.0.239.

Note : Each part of the IP address must start with a number other than zero. For example, IP addresses 001.100.192.6 and 192.001.10.3 are not valid.

The IP subnet mask for the interface. The factory default value is

255.255.255.0.

The default gateway for the IP interface. The factory default value is

192.168.0.1.

Specifies the management VLAN ID of the switch. The range is 1–4093.

The management VLAN is used for management of the switch.

2-4 Configuring System Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

4.

If you change any of the network connection parameters, click Apply to apply the changes to the system.

Time

GS716T/GS724T software supports the Simple Network Time Protocol (SNTP).

SNTP assures accurate network device clock time synchronization up to the millisecond. Time synchronization is performed by a network SNTP server. GS716T/GS724T software operates only as an SNTP client and cannot provide time services to other systems.

Time sources are established by Stratums. Stratums define the accuracy of the reference clock. The higher the stratum (where zero is the highest), the more accurate the clock. The device receives time from stratum 1 and above since it is itself a stratum 2 device.

The following is an example of stratums:

• Stratum 0: A real-time clock is used as the time source, for example, a GPS system.

• Stratum 1: A server that is directly linked to a Stratum 0 time source is used. Stratum 1 time servers provide primary network time standards.

• Stratum 2 : The time source is distanced from the Stratum 1 server over a network path. For example, a Stratum 2 server receives the time over a network link, via NTP, from a Stratum 1 server.

Information received from SNTP servers is evaluated based on the time level and server type.

SNTP time definitions are assessed and determined by the following time levels:

• T1 : Time at which the original request was sent by the client.

• T2 : Time at which the original request was received by the server.

• T3 : Time at which the server sent a reply.

• T4 : Time at which the client received the server's reply.

The device can poll Unicast server types for the server time.

Polling for Unicast information is used for polling a server for which the IP address is known.

SNTP servers that have been configured on the device are the only ones that are polled for synchronization information. T1 through T4 are used to determine server time. This is the preferred method for synchronizing device time because it is the most secure method. If this

Configuring System Information 2-5 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual method is selected, SNTP information is accepted only from SNTP servers defined on the device using the SNTP Server Configuration page.

The device retrieves synchronization information, either by actively requesting information or at every poll interval.

Time Configuration

Use the Time Configuration page to view and adjust SNTP parameters.

To display the Time Configuration page:

1.

Click System



Management



Time



SNTP Global Configuration in the navigation menu.

2.

Use the Time option to set the time locally on the switch. Select the Clock Source as Local by checking the radio button to configure the local time.

Note: If you do not enter a Date and Time, the switch will calculate the date and time using the CPU’s clock cycle.

3.

In the Date field, enter the date in the DD/MM/YYYY format.

4.

In the Time field, enter the time in HH:MM:SS format.

5.

When the Clock Source is set to Local , the Time Zone field is grayed out (disabled):

6.

Click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

2-6 v1.0, July 2009

Configuring System Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 2-3

To configure the time through SNTP:

1.

Select the Clock Source as SNTP by checking the radio button.

2.

When the Clock Source is set to ‘SNTP’, the Date and Time fields are grayed out (disabled).

The switch gets the date and time from the network.

3.

Use the menu to select the Coordinated Universal Time (UTC) time zone in which the switch is located, expressed as the number of hours. The options in the Time Zone menu specify the time difference from UTC time zone.

4.

Click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

Table 2-3. Time Configuration Fields

Field

Clock Source

Date

Description

Use this field to configure time locally or through SNTP. The default is

Local .

Specifies the duration of the box in days, months and years since the last reboot. This is the default behavior unless you enter a new Date and Time. The Time and Date will subsequently be changed to match the Time you entered.

Configuring System Information 2-7 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 2-3. Time Configuration Fields (continued)

Field

Time

Time Zone

Description

Specifies the duration of the box in hours, minutes and seconds since the last reboot.

When using SNTP/NTP time servers to update the switch’s clock, the time data received from the server is based on Coordinated Universal

Time (UTC), which is the same as Greenwich Mean Time (GMT). This may not be the time zone in which the switch is located. Time Zone configures a time zone specifying the time difference from UTC time zone. The time zone can affect the display of the current system time.

The default value is UTC 00:00.

5.

Click Refresh to refresh the page with the most current data from the switch.

6.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

SNTP Global Status

Use the SNTP Global Status page to view information about the system’s SNTP client.

To access the SNTP Global Status page:

1.

Click System



Management



Time



SNTP Global Configuration in the navigation menu.

2-8

Figure 2-4 v1.0, July 2009

Configuring System Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 2-4. SNTP Global Configuration Fields

Field

Version

Supported Mode

Last Update Time

Last Attempt Time

Last Attempt Status

Server IP Address

Address Type

Server Stratum

Reference Clock Id

Server Mode

Description

Specifies the SNTP Version the client supports.

Specifies the SNTP modes the client supports. Multiple modes may be supported by a client.

Specifies the local date and time (UTC) the SNTP client last updated the system clock.

Specifies the local date and time (UTC) of the last SNTP request or receipt of an unsolicited message.

Specifies the status of the last SNTP request or unsolicited message for unicast mode. If no message has been received from a server, a status of Other is displayed. These values are appropriate for all operational modes:

• Other: None of the following enumeration values.

• Success: The SNTP operation was successful and the system time was updated.

• Request Timed Out: A directed SNTP request timed out without receiving a response from the SNTP server.

• Bad Date Encoded: The time provided by the SNTP server is not valid.

• Version Not Supported: The SNTP version supported by the server is not compatible with the version supported by the client.

• Server Unsynchronized: The SNTP server is not synchronized with its peers. This is indicated via the 'leap indicator' field on the SNTP message.

• Server Kiss Of Death: The SNTP server indicated that no further queries were to be sent to this server. This is indicated by a stratum field equal to 0 in a message received from a server.

Specifies the IP address of the server for the last received valid packet.

If no message has been received from any server, an empty string is shown.

Specifies the address type of the SNTP Server address for the last received valid packet.

Specifies the claimed stratum of the server for the last received valid packet.

Specifies the reference clock identifier of the server for the last received valid packet.

Specifies the mode of the server for the last received valid packet.

Configuring System Information 2-9 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 2-4. SNTP Global Configuration Fields (continued)

Field Description

Unicast Sever Max Entries Specifies the maximum number of unicast server entries that can be configured on this client.

Unicast Server Current

Entries

Specifies the number of current valid unicast server entries configured for this client.

2.

Click Refresh to refresh the page with the most current data from the switch.

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

4.

If you change any of the settings on the page, click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

SNTP Server Configuration

Use the SNTP Server Configuration page to view and modify information for adding and modifying Simple Network Time Protocol SNTP servers.

To display the SNTP Server Configuration page:

1.

Click System



Management



Time



SNTP Server Configuration in the navigation tree.

2-10

Figure 2-5 v1.0, July 2009

Configuring System Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 2-5. SNTP Server Configuration Fields

Field

Server Type

Description

Specifies the address type of the configured SNTP server to view or modify information about, or select Add to configure a new SNTP server.

You can define up to three SNTP servers.

Address

Port

Priority

Version

Shows the format of the TFTP Server Address field The factory default is

IPv4 .

Enter the IP address of the SNTP server.

Enter a port number from 1–65535. The default is 123.

Specifies the priority of this server entry in determining the sequence of servers to which SNTP requests are sent. Enter a priority from 1–3, with

1 being the default and the highest priority. Servers with lowest numbers have priority.

Enter the protocol version number. The range is 1–4.

2.

To add an SNTP server, select Add , complete the remaining fields as desired, and click Apply .

The SNTP server is added, and is now reflected in the Server list.

3.

To removing an SNTP server, select the IP address of the server to remove from the Server list, and then click Delete . The entry is removed, and the device is updated.

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

If you change any of the settings on the page, click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

SNTP Server Status

The SNTP Server Status page displays status information about the SNTP servers configured on your switch.

To access the SNTP Server Status page:

Configuring System Information v1.0, July 2009

2-11

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click System



Management



Time



SNTP Server Configuration in the navigation menu.

2-12

Figure 2-6

Table 2-6. SNTP Server Status Fields

Field

Address

Last Update Time

Last Attempt Time

Last Attempt Status

Description

Specifies all the existing Server Addresses. If no Server configuration exists, a message saying “No SNTP server exists” flashes on the screen.

Specifies the local date and time (UTC) that the response from this server was used to update the system clock.

Specifies the local date and time (UTC) that this SNTP server was last queried.

Specifies the status of the last SNTP request to this server. If no packet has been received from this server, a status of Other is displayed:

• Other: None of the following enumeration values.

• Success: The SNTP operation was successful and the system time was updated.

• Request Timed Out: A directed SNTP request timed out without receiving a response from the SNTP server.

• Bad Date Encoded: The time provided by the SNTP server is not valid.

• Version Not Supported: The SNTP version supported by the server is not compatible with the version supported by the client.

• Server Unsynchronized: The SNTP server is not synchronized with its peers. This is indicated via the 'leap indicator' field on the SNTP message.

• Server Kiss Of Death: The SNTP server indicated that no further queries were to be sent to this server. This is indicated by a stratum field equal to 0 in a message received from a server.

Configuring System Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 2-6. SNTP Server Status Fields (continued)

Field

Requests

Failed Requests

Description

Specifies the number of SNTP requests made to this server since last agent reboot.

Specifies the number of failed SNTP requests made to this server since last reboot.

2.

Click Refresh to refresh the page with the most current data from the switch.

Denial of Service

Use the Denial of Service (DoS) page to configure DoS control. The GS716T/GS724T software provides support for classifying and blocking specific types of DoS attacks. You can configure your system to monitor and block six types of attacks:

• SIP=DIP : Source IP address = Destination IP address.

• First Fragment : TCP Header size is smaller than the configured value.

• TCP Fragment : IP Fragment Offset = 1.

• TCP Flag : TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP

Sequence Number = 0 or TCP Flags FIN, URG, and PSH set and TCP Sequence Number or TCP Flags SYN and FIN set.

• L4 Port : Source TCP/UDP Port = Destination TCP/UDP Port.

• ICMP : Limiting the size of ICMP Ping packets.

To access the Denial of Service page:

Configuring System Information v1.0, July 2009

2-13

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click System



Management



Denial of Service in the navigation menu.

Figure 2-7

Table 2-7. Denial of Service Configuration Fields

Field Description

Denial of Service SIP=DIP Enable or disable this option by selecting the corresponding line on the pulldown entry field. Enabling SIP=DIP DoS prevention causes the switch to drop packets that have a source IP address equal to the destination IP address. The factory default is disabled.

Denial of Service First

Fragment

Denial of Service Min TCP

Hdr Size

Enable or disable this option by selecting the corresponding line on the pulldown entry field. Enabling First Fragment DoS prevention causes the switch to drop packets that have a TCP header smaller than the configured Min TCP Hdr Size. The factory default is disabled.

Specify the Min TCP Hdr Size allowed. If First Fragment DoS prevention is enabled, the switch will drop packets that have a TCP header smaller than this configured Min TCP Hdr Size. The factory default is 20 bytes.

Denial of Service TCP

Fragment

Enable or disable this option by selecting the corresponding line on the pulldown entry field. Enabling TCP Fragment DoS prevention causes the switch to drop packets that have an IP fragment offset equal to 1.

The factory default is disabled.

2-14 v1.0, July 2009

Configuring System Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 2-7. Denial of Service Configuration Fields (continued)

Field Description

Denial of Service TCP Flag Enable or disable this option by selecting the corresponding line on the pulldown entry field. Enabling TCP Flag DoS prevention causes the switch to drop packets that have TCP flag SYN set and TCP source port less than 1024 or TCP control flags set to 0 and TCP sequence number set to 0 or TCP flags FIN, URG, and PSH set and TCP sequence number set to 0 or both TCP flags SYN and FIN set. The factory default is disabled.

Denial of Service L4 Port

Denial of Service ICMP

Enable or disable this option by selecting the corresponding line on the pulldown entry field. Enabling L4 Port DoS prevention causes the switch to drop packets that have TCP/UDP source port equal to TCP/UDP destination port. The factory default is disabled.

Enable or disable this option by selecting the corresponding line on the pulldown entry field. Enabling ICMP DoS prevention causes the switch to drop ICMP packets that have a type set to ECHO_REQ (ping) and a size greater than the configured ICMP Pkt Size. The factory default is disabled.

Denial of Service Max ICMP

Size

Specify the Max ICMP Pkt Size allowed. If ICMP DoS prevention is enabled, the switch will drop ICMP ping packets that have a size greater then this configured Max ICMP Pkt Size. The factory default is disabled.

2.

If you change any of the DoS settings, click Apply to apply the changes to the switch.

Green Ethernet Configuration

Use this page to configure Green Ethernet features. Using the Green Ethernet features allows for power consumption savings.

To access this page:

Configuring System Information v1.0, July 2009

2-15

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click System



Management



Green Ethernet Configuration .

Figure 2-8

Table 2-8. Green Ethernet Configuration Fields

Field Description

Auto Power Down Mode When this is enabled and the port link is down, the PHY automatically goes down for a short amount of time and then wakes up to check link pulses. This performs auto-negotiation and saving power consumption routines when a link partner is unavailable.

Short Cable Mode A cable test is performed when this is enabled and the port link is up at mode (nominal power)

2.

In the Auto Power Down Mode or Short Cable Mode field, select Enable or Disable to turn the feature on or off.

3.

Click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

SNMP V1/V2

The System



SNMP



SNMP V1/V2 folder contains links to the following pages:

• “Community Configuration” on page 2-17

• “Trap Configuration” on page 2-19

• “Trap Flags” on page 2-20

2-16 Configuring System Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Community Configuration

To display this page, click System



SNMP



SNMP V1/V2



Community Configuration in the navigation tree.

By default, two SNMP Communities exist:

• Private, with Read/Write privileges and status set to Enable .

• Public, with Read Only privileges and status set to Enable .

These are well-known communities. Use this page to change the defaults or to add other communities. Only the communities that you define using this page will have access to the switch using the SNMPv1 and SNMPv2c protocols. Only those communities with read/write level access can be used to change the configuration using SNMP.

Use this page when you are using the SNMPv1 and SNMPv2c protocol.

Figure 2-9

Configuring System Information v1.0, July 2009

2-17

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 2-9. SNMP V1/V2 Community Configurable Data

Field

Management Station IP

Management Station IP

Mask

Community String

Access Mode

Status

Description

Taken together, the Management Station IP and the Management Station IP

Mask denote a range of IP addresses from which SNMP clients may use that community to access this device. If either (Management Station IP or

Management Station IP Mask) value is 0.0.0.0, access is allowed from any

IP address. Otherwise, every client’s address is ANDed with the mask, as is the Management Station IP Address; and, if the values are equal, access is allowed. For example, if the Management Station IP and Management

Station IP Mask parameters are 192.168.1.0/255.255.255.0, then any client whose address is 192.168.1.0 through 192.168.1.255 (inclusive) will be allowed access. To allow access from only one station, use a Management

Station IP Mask value of 255.255.255.255, and use that machine’s IP address for Client Address.

Taken together, the Management Station IP and the Management Station IP

Mask denote a range of IP addresses from which SNMP clients may use that community to access this device. If either (Management Station IP or

Management Station IP Mask) value is 0.0.0.0, access is allowed from any

IP address. Otherwise, every client’s address is ANDed with the mask, as is the Management Station IP Address; and, if the values are equal, access is allowed. For example, if the Management Station IP and Management

Station IP Mask parameters are 192.168.1.0/255.255.255.0, then any client whose IP address is 192.168.1.0 through 192.168.1.255 (inclusive) will be allowed access. To allow access from only one station, use a Management

Station IP Mask value of 255.255.255.255, and use that machine’s IP address for Client Address.

Use this screen to reconfigure an existing community, or to create a new one. Use this pulldown menu to select one of the existing community names, or select Create to add a new one. A valid entry is a case-sensitive string of up to 16 characters.

Specify the access level for this community by selecting Read/Write or

Read Only from the pulldown menu.

Specify the status of this community by selecting Enable or Disable from the pulldown menu. If you select Enable , the Community Name must be unique among all valid Community Names or the set request will be rejected. If you select Disable , the Community Name will become invalid.

2-18 v1.0, July 2009

Configuring System Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 2-10. Command Buttons

Field

Add

Delete

Cancel

Apply

Description

Add the currently selected receiver configuration to the switch.

Delete the currently selected receiver configuration.

Cancel the configuration on the screen. Reset the data on the screen to the latest value of the switch.

Sends the updated configuration to the switch. Configuration changes take effect immediately.

Trap Configuration

This page displays an entry for every active Trap Receiver. To access this page, click System



SNMP



SNMP V1/V2



Trap Configuration in the navigation tree.

Figure 2-10

Table 2-11. SNMP Trap Configuration

Field

Recipients IP

Version

Description

Enter the address in x.x.x.x format to receive SNMP traps from this device.

Select the trap version to be used by the receiver from the pulldown menu.

• SNMP v1 - Uses SNMP v1 to send traps to the receiver.

• SNMP v2 - Uses SNMP v2 to send traps to the receiver.

Configuring System Information 2-19 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 2-11. SNMP Trap Configuration (continued)

Field

Community String

Status

Description

Enter the community string for the SNMP trap packet to be sent to the trap manager. This may be up to 16 characters and is case sensitive.

Select the receiver’s status from the pulldown menu:

• Enable - Send traps to the receiver.

• Disable - Do not send traps to the receiver.

Table 2-12. Command Buttons

Field

Add

Delete

Cancel

Apply

Description

Add the currently selected receiver configuration to the switch.

Delete the currently selected receiver configuration.

Cancel the configuration on the screen. Reset the data on the screen to the latest value of the switch.

Sends the updated configuration to the switch. Configuration changes take effect immediately.

Trap Flags

The pages in the Trap Manager folder allow you to view and configure information about SNMP traps the system generates.

Use the Trap Flags page to enable or disable traps the switch can sent to an SNMP manager. When the condition identified by an active trap is encountered by the switch, a trap message is sent to any enabled SNMP Trap Receivers, and a message is written to the trap log.

To access the Trap Flags page:

1.

Click System



SNMP



SNMP V1/V2



Trap Flags .

2-20 v1.0, July 2009

Configuring System Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 2-11

The fields available on the Trap Flags page depends on the packages installed on your system.

Figure 2-11 and the following table show the fields that are available on a system with all packages installed.

Table 2-13. Trap Flags Configuration Fields

Field Description

Authentication

Link Up/Down

Spanning Tree

Enable or disable activation of authentication failure traps by selecting the corresponding button. The factory default is enabled.

Enable or disable activation of link status traps by selecting the corresponding button. The factory default is enabled.

Enable or disable activation of spanning tree traps by selecting the corresponding button. The factory default is enabled.

2.

If you make any changes to this page, click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

SNMP v3 User Configuration

This is the configuration for SNMP v3.

To access this page:

1.

Click System



SNMP



SNMP V3



User Configuration in the navigation menu.

Configuring System Information 2-21 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 2-12

Table 2-14. SNMP v3 User Configuration

Field Description

SNMP v3 Access Mode The SNMPv3 access privileges for the user account. The admin account always has Read/Write access, and all other accounts have Read Only access.

Authentication Protocol Specify the SNMPv3 Authentication Protocol setting for the selected user account. The valid Authentication Protocols are None , MD5 , or SHA . If you select:

• None - The user will be unable to access the SNMP data from an

SNMP browser.

• MD5 or SHA - The user login password will be used as SNMPv3 authentication password, and you must therefore specify a password.

The password must be eight characters in length.

Encryption Protocol

Encryption Key

Specify the SNMPv3 Encryption Protocol setting for the selected user account. The valid Encryption Protocols are None or DES . If you select the DES Protocol, you must enter a key in the Encryption Key field. If

None is specified for the Protocol, the Encryption Key is ignored.

If you selected DES in the Encryption Protocol field, enter the SNMPv3

Encryption Key here. Otherwise, this field is ignored. Valid keys are 0 to

15 characters long. The Apply check box must be checked in order to change the Encryption Protocol and Encryption Key.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

2-22 Configuring System Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

3.

Click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

LLDP

The IEEE 802.1AB-defined standard, Link Layer Discovery Protocol (LLDP), allows stations residing on an 802 LAN to advertise major capabilities and physical descriptions. This information is viewed by a network manager to identify system topology and detect bad configurations on the

LAN.

LLDP is a one-way protocol; there are no request/response sequences. Information is advertised by stations implementing the transmit function, and is received and processed by stations implementing the receive function. The transmit and receive functions can be enabled/disabled separately per port. By default, both transmit and receive are disabled on all ports. The application is responsible for starting each transmit and receive state machine appropriately, based on the configured status and operational state of the port.

The LLDP folder contains links to the following pages:

• “LLDP Configuration” on page 2-23

• “LLDP Port Settings” on page 2-24

• “Local Information” on page 2-27

• “Neighbors Information” on page 2-30

LLDP Configuration

Use the LLDP Configuration page to specify LLDP parameters that are applied to the switch.

To display the LLDP Configuration page:

1.

Click System



LLDP



Basic



LLDP Configuration in the navigation tree.

Note: You can also access the LLDP Configuration page by clicking System



LLDP



Advanced



LLDP Configuration .

Configuring System Information v1.0, July 2009

2-23

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 2-13

Table 2-15. LLDP Configuration Fields

Field Description

LLDP Properties

TLV Advertised Interval

Hold Multiplier

Reinitializing Delay

Transmit Delay

Specifies the interval at which frames are transmitted. The default is 30 seconds, and the valid range is 1–32768 seconds.

Specifies multiplier on the transmit interval to assign to Time-to-Live

(TTL). The default is 4, and the range is 2–10.

Specifies the delay before a reinitialization. The default is 2 seconds, and the range is 1–10 seconds.

Specifies the interval for the transmission of notifications. The default is

5 seconds, and the range is 5–3600 seconds.

2.

If you make any changes to the page, click Apply to apply the new settings to the system.

LLDP Port Settings

Use the LLDP Port Settings page to specify LLDP parameters that are applied to a specific interface.

To display the LLDP Port Settings page:

1.

Click System



LLDP



Advanced



LLDP



Port Settings in the navigation tree.

2-24 Configuring System Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 2-14

Table 2-16. LLDP Port Settings Fields

Field

Interface

Admin Status

Management IP Address

Description

Specifies the port to be affected by these parameters.

Select the status for transmitting and receiving LLDP packets. The options are:

• Tx Only: Enable only transmitting LLDP PDUs on the selected ports.

• Rx Only: Enable only receiving LLDP PDUs on the selected ports.

• Tx and Rx: Enable both transmitting and receiving LLDP PDUs on the selected ports.

• Disabled: Do not transmit or receive LLDP PDUs on the selected ports.

Choose whether to advertise the management IP address from the interface. The possible field values are:

• Stop Advertise: Do not advertise the management IP address from the interface.

• Auto Advertise: Advertise the current IP address of the device as the management IP address.

Configuring System Information v1.0, July 2009

2-25

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 2-16. LLDP Port Settings Fields (continued)

Field

Notification

Optional TLV(s)

Description

When notifications are enabled, LLDP interacts with the Trap Manager to notify subscribers of remote data change statistics. The default is disabled.

Enable or disable the transmission of optional type-length value (TLV) information from the interface. The TLV information includes the system name, system description, system capabilities, and port description. To configure the System Name, see “System Information” on page 2-1 . To configure the Port Description, see “Configuring and Viewing Device

Port Information” on page 3-1 .

2.

If you make any changes to the page, click Apply to apply the new settings to the system.

3.

To update the page with the latest data, click Refresh .

2-26 v1.0, July 2009

Configuring System Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Local Information

Use the LLDP Local Information page to view the data that each port advertises through LLDP.

To display the LLDP Local Device Information page:

1.

Click System



Advanced



LLDP



Local Information in the navigation tree.

Figure 2-15

Table 2-17. LLDP Local Information Fields

Field

Chassis ID Subtype

Chassis ID

System Name

System Description

System Capabilities

Interface

Port ID Subtype

Port ID

Description

Identifies the type of data displayed in the Chassis ID field

Identifies the 802 LAN device's chassis.

Identifies the system name associated with the remote device. To configure the System Name, see “System Information” on page 2-1 .

Specifies the description of the selected port associated with the local system.

Specifies the system capabilities of the local system.

Select the interface with the information to display.

Identifies the type of data displayed in the Port ID field.

Identifies the physical address of the port.

Configuring System Information 2-27 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 2-17. LLDP Local Information Fields (continued)

Field

Port Description

Description

Identifies the user-defined description of the port. To configure the Port

Description, see “Configuring and Viewing Device Port Information” on page 3-1 .

Displays the advertisement status of the port.

Advertisement

2.

Click Refresh to refresh the page with the most current data from the switch.

3.

To view additional details about a port, click the name of the port in the Interface column of the Port Information table.

A popup window displays information for the selected port.

2-28

Figure 2-16 v1.0, July 2009

Configuring System Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 2-18. Local Port Information

Field Description

Managed Address

Address SubType

Address

Interface SubType

Interface Number

User Priority

DSCP

Displays the type of address the management interface uses, such as an

IPv4 address.

Displays the address used to manage the device.

Displays the port subtype.

Displays the number that identifies the port.

MAC/PHY Details

Auto-Negotiation

Supported

Specifies whether the interface supports port-speed auto-negotiation.

The possible values are True or False

Auto-Negotiation Enabled Displays the port speed auto-negotiation support status. The possible values are True (enabled) or False (disabled).

Auto Negotiation

Advertised Capabilities

Operational MAU Type

Displays the port speed auto-negotiation capabilities such as

1000BASE-T half-duplex mode or 100BASE-TX full-duplex mode.

Displays the Medium Attachment Unit (MAU) type. The MAU performs physical layer functions, including digital data conversion from the

Ethernet interface collision detection and bit injection into the network.

MED Details

Capabilities Supported

Current Capabilities

Device Class

Displays the MED capabilities enabled on the port.

Displays the TLVs advertised by the port.

Network Connectivity indicates the device is a network connectivity device.

Network Policies

Application Type

VLAN ID

VLAN Type

Specifies the media application type associated with the policy.

Specifies the VLAN ID associated with the policy.

Specifies whether the VLAN associated with the policy is tagged or untagged.

Specifies the priority associated with the policy.

Specifies the DSCP associated with a particular policy type.

Configuring System Information v1.0, July 2009

2-29

GS716Tv2 and GS724Tv3 Software Administration Manual

Neighbors Information

Use the LLDP Neighbors Information page to view the data that a specified interface has received from other LLDP-enabled systems.

To display the LLDP Neighbors Information page:

1.

Click System



LLDP



Advanced



Neighbors Information in the navigation tree.

Figure 2-17

Table 2-19. LLDP Neighbors Information Fields

Field

MSAP Entry

Local Port

Chassis ID Subtype

Chassis ID

Port ID Subtype

Port ID

System Name

Description

Displays the Media Service Access Point (MSAP) entry number for the remote device.

Shows the interface on the local system that received LLDP information from a remote system.

Identifies the type of data displayed in the Chassis ID field on the remote system.

Identifies the remote 802 LAN device's chassis.

Identifies the type of data displayed in the remote system’s Port ID field.

Identifies the physical address of the port on the remote system from which the data was sent.

Identifies the system name associated with the remote device. If the field is blank, the name might not be configured on the remote system.

2.

Click Refresh to update the information on the screen with the most current data.

2-30 Configuring System Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

3.

To view more information about the remote device, click the link in the MSAP Entry field.

A popup window displays information for the selected port.

Figure 2-18

4.

Click Refresh to refresh the page with the most current data from the switch.

Configuring System Information v1.0, July 2009

2-31

GS716Tv2 and GS724Tv3 Software Administration Manual

2-32 v1.0, July 2009

Configuring System Information

Chapter 3

Configuring Switching Information

• “Configuring and Viewing Device Port Information” on page 3-1

• “Creating LAGs” on page 3-5

• “Managing VLANs” on page 3-10

• “Configuring Spanning Tree Protocol” on page 3-16

• “Configuring IGMP Snooping” on page 3-32

• “Viewing Multicast Forwarding Database Information” on page 3-35

• “Configuring IGMP Snooping Queriers” on page 3-42

• “Searching and Configuring the Forwarding Database” on page 3-47

Configuring and Viewing Device Port Information

The pages on the Ports tab allows you to view and monitor the physical port information for the ports available on the switch. The Ports folder has links to the following features:

• “Port Configuration” on page 3-1

• “Flow Control” on page 3-4

Port Configuration

Use the Port Configuration page to configure the physical interfaces on the switch.

To access the Port Configuration page:

1.

Click Switching



Ports



Port Configuration in the navigation tree.

3-1 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

3-2

Figure 3-1

Table 3-1. Port Configuration Fields

Field

Port

Description

Port Type

Admin Mode

Port Speed

Description

Select the port from the menu to display or configure data for that port. If you select All , the changes you make to the Port Configuration page apply to all physical ports on the system.

Enter the description string to be attached to a port. The string can be up to 64 characters in length.

For most ports this field is blank. Otherwise, the possible values are:

• MON: Indicates that the port is a monitoring port. For additional information about port monitoring see Chapter 6, “Monitoring the

System” .

• LAG: Indicates that the port is a member of a Link Aggregation trunk.

For more information see “LAG Membership” on page 3-7 .

Use the menu to select the port control administration state, which can be one of the following:

• Enable: The port can participate in the network (default).

• Disable: The port is administratively down and does not participate in the network.

Use the menu to select the port’s speed and duplex mode. If you select

Auto , the duplex mode and speed will be set by the auto-negotiation process. The port’s maximum capability (full duplex and 1000 Mbps) will be advertised. Otherwise, your selection will determine the port’s duplex mode and transmission rate. The factory default is Auto . v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-1. Port Configuration Fields (continued)

Field

Auto Power Down Mode

Short Cable Mode

Physical Status

Link Status

Link Trap

Maximum Frame Size

MAC Address

PortList Bit Offset ifIndex

Description

Use the menu to select the port’s Green Ethernet mode, which can be one of the following:

Enable: Specifies that when the port link is down, the PHY automatically goes down for a short amount of time, and wakes up to check link pulses, performs auto-negotiation and saving power consumption routines when a link partner is unavailable.

• Disable: The port is administratively down and does not participate in

Green Ethernet mode.

Use the menu to select the port’s Green Ethernet mode, which can be one of the following:

• Enable: Specifies that cable test is performed when the port link is up at 1 Gbps and if the cable is less than 10m, PHYs are placed in low power mode (nominal power).

• Disable: The port is administratively down and does not participate in

Green Ethernet mode.

Indicates the physical port’s speed and duplex mode

Indicates whether the Link is up or down.

This object determines whether or not to send a trap when link status changes. The factory default is enabled:

• Enable: Specifies that the system sends a trap when the link status changes.

• Disable: Specifies that the system does not send a trap when the link status changes.

Indicates the maximum Ethernet frame size the interface supports or is configured to support. The frame size includes the Ethernet header,

CRC, and payload. (1518–9216). The default maximum frame size is

1518.

Displays the physical address of the specified interface.

Display the bit offset value which corresponds to the port when the MIB object type PortList is used to manage in SNMP.

The ifIndex of the interface table entry associated with this port. If the interface field is set to All , this field is blank.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you make any changes to the page, click Apply to apply the changes to the system.

Configuring Switching Information v1.0, July 2009

3-3

GS716Tv2 and GS724Tv3 Software Administration Manual

Flow Control

IEEE 802.3x flow control works by pausing a port when the port becomes oversubscribed and dropping all traffic for small bursts of time during the congestion condition. This can lead to highpriority and/or network control traffic loss. When IEEE 802.3x flow control is enabled, lower speed switches can communicate with higher speed switches by requesting that the higher speed switch refrains from sending packets. Transmissions are temporarily halted to prevent buffer overflows.

To display the Flow Control page:

1.

Click Switching



Ports , and then click the Flow Control link.

Figure 3-2

Table 3-2. Switch Flow Control Configuration Fields

Field Description

Global Flow Control

(IEEE 802.3x) Mode

Enables or disables IEEE 802.3x flow control on the system. The factory default is disabled.

• Select Enable so that the switch can communicate with higher speed switches.

• Select Disable so that the switch does not send pause packets if the port buffers become full.

2.

If you change the mode, click Apply to apply the changes to the system.

3-4 v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Creating LAGs

Link aggregation groups (LAGs), which are also known as port-channels, allow you to combine multiple full-duplex Ethernet links into a single logical link. Network devices treat the aggregation as if it were a single link, which increases fault tolerance and provides load sharing. You assign the

LAG VLAN membership after you create a LAG. The LAG by default becomes a member of the management VLAN.

A LAG interface can be either static or dynamic, but not both. All members of a LAG must participate in the same protocols. A static port-channel interface does not require a partner system to be able to aggregate its member ports.

Note: The GS716T supports 2 LAGs and GS724T supports 4 LAGs.

Static LAGs are supported. When a port is added to a LAG as a static member, it neither transmits nor receives LAGPDUs.

The LAG folder contains links to the following features:

• “LAG Configuration” on page 3-5

• “LAG Membership” on page 3-7

• “LACP Configuration” on page 3-8

• “LACP Port Configuration” on page 3-9

LAG Configuration

Use the LAG (Port Channel) Configuration page to group one or more full-duplex Ethernet links to be aggregated together to form a link aggregation group, which is also known as a port-channel.

The switch treats the LAG as if it were a single link.

To access the LAG Configuration page:

1.

Click Switching



LAG



Basic



LAG Configuration in the navigation tree.

Configuring Switching Information v1.0, July 2009

3-5

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 3-3

3-6

Table 3-3. LAG (Port Channel) Configuration Fields

Field

LAG Name

Description

LAG ID

Link Trap

Admin Mode

STP Mode

LAG Type

Active Ports

LAG State

Description

Enter the name you want assigned to the LAG. You may enter any string of up to 15 alphanumeric characters. A valid name has to be specified in order to create the LAG

Enter the Description string to be attached to a LAG. It can be up to 64 characters in length.

Identification of the LAG

Specify whether you want to have a trap sent when link status changes.

The factory default is Disable .

Select Enable or Disable from the menu. When the LAG (port channel) is disabled, no traffic will flow and LAGPDUs will be dropped, but the links that form the LAG (port channel) will not be released. The factory default is Enable .

The Spanning Tree Protocol Administrative Mode associated with the

LAG. Possible values are Enable or Disable .

Select Static or LACP . When the LAG is static, it does not transmit or process received LAGPDUs, i.e., the member ports do not transmit

LAGPDUs and all the LAGPDUs it may receive are dropped. The default is Static .

A listing of the ports that are actively participating members of this Port

Channel. A maximum of 8 ports can be assigned to a port channel.

Indicates whether the link is Up or Down.

Configuring Switching Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

2.

Click Add to update the switch with the values on this screen.

3.

To remove a configured LAG (port channel), select it and click Delete . All ports that were members of this LAG are removed from the LAG and included in the default VLAN.

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

If you make any changes to this page, click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

LAG Membership

Use the LAG Membership page to group one or more full-duplex Ethernet links to be aggregated together to form a link aggregation group (LAG), which is also known as a port-channel. The switch can treat the port-channel as if it were a single link.

To access the LAG Membership page:

1.

Click Switching



LAG



Basic



LAG Membership in the navigation tree.

Figure 3-4

Table 3-4. LAG Membership Fields

Field

LAG ID

LAG Name

Description

Identifies the LAG (port channel) with the interface naming convention.

Enter the name you want assigned to the LAG. You may enter any string of up to 15 alphanumeric characters. A valid name has to be specified to create the LAG.

Configuring Switching Information 3-7 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-4. LAG Membership Fields (continued)

Field

Port Selection Table

Current Members

Description

Select the ports as members of this LAG.

Displays the LAGs on the current channel.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you make any changes to this page, click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

LACP Configuration

To display the LACP Configuration page:

1.

Click Switching



LAG



Advanced



LACP Configuration in the navigation tree.

Figure 3-5

Table 3-5. LACP Configuration Fields

Field Description

LACP System Priority Specifies the device’s link aggregation priority relative to the devices at the other ends of the links on which link aggregation is enabled. A higher value indicates a lower priority. You can change the value of the parameter globally by specifying a priority from 0–65535. The default value is 32768.

2.

Click Refresh to reload the page and display the most current information.

3-8 Configuring Switching Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

4.

If you make any changes to this page, click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

LACP Port Configuration

To display the LACP Port Configuration page:

1.

Click Switching



LAG



Advanced



LACP Port Configuration in the navigation tree.

Figure 3-6

Table 3-6. LACP Port Configuration Fields

Field Description

Interface

LACP Priority

Timeout

Select the interface for which data is to be displayed or configured.

Specifies port priority value. The field range is 0–255. The default value is 128.

Displays the administrative LACP timeout. The possible values are:

• Long . Specifies a long timeout value.

• Short . Specifies a short timeout value.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you make any changes to this page, click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

Configuring Switching Information 3-9 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Managing VLANs

Adding Virtual LAN (VLAN) support to a Layer 2 switch offers some of the benefits of both bridging and routing. Like a bridge, a VLAN switch forwards traffic based on the Layer 2 header, which is fast, and like a router, it partitions the network into logical segments, which provides better administration, security and management of multicast traffic.

A VLAN is a set of end stations and the switch ports that connect them. You may have many reasons for the logical division, such as department or project membership. The only physical requirement is that the end station and the port to which it is connected both belong to the same

VLAN.

Each VLAN in a network has an associated VLAN ID, which appears in the IEEE 802.1Q tag in the Layer 2 header of packets transmitted on a VLAN. An end station may omit the tag, or the

VLAN portion of the tag, in which case the first switch port to receive the packet may either reject it or insert a tag using its default VLAN ID. A given port may handle traffic for more than one

VLAN, but it can only support one default VLAN ID.

The VLAN folder contains links to the following features:

• “VLAN Configuration” on page 3-10

• “VLAN Membership Configuration” on page 3-12

• “Port VLAN ID Configuration” on page 3-14

VLAN Configuration

Use the VLAN Configuration page to define VLAN groups stored in the VLAN membership table. The GS716T supports 64 VLANs and GS724T supports 128 VLANs. VLAN 1 is the default

VLAN of which all ports are members.

To display the VLAN Configuration page:

3-10 v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Switching



VLAN



Basic



VLAN Configuration in the navigation tree.

Figure 3-7

Table 3-7. VLAN Configuration Fields

Field Description

VLAN ID

VLAN Name

VLAN Type

Reset Configuration

Specify the VLAN Identifier for the new VLAN. (You can only enter data in this field when you are creating a new VLAN.) The range of the VLAN

ID is 1–4093.

Use this optional field to specify a name for the VLAN. It can be up to 32 alphanumeric characters long, including blanks. The default is blank.

VLAN ID 1 is always named “Default.”

This field identifies the type of the VLAN you are configuring. You cannot change the type of the default VLAN (VLAN ID = 1) because the the type is always Default. When you create a VLAN on this page, its type will always be Static.

This resets all the VLAN configurations. If the Management VLAN is set to a non-default VLAN (VLAN 1), it is automatically set to 1 after a Reset

Configuration.

2.

Click Add to add a new VLAN to the switch.

3.

Click Delete to delete a selected VLAN from the switch.

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

Configuring Switching Information 3-11 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

5.

If you make any changes to this page, click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

VLAN Membership Configuration

Use this page to configure VLAN Port Membership for a particular VLAN. You can select the

Group operation through this page.

To display the VLAN Membership Configuration page:

1.

Click Switching



VLAN



Advanced



VLAN Membership in the navigation tree.

Figure 3-8

2.

Click the orange bar below the VLAN Type field to display the physical ports on the switch.

3-12 v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 3-9

3.

To change the VLAN tagging for one or more ports, click each port to make traffic forwarded by the interface tagged (T) or untagged (U).

Table 3-8. VLAN Membership Configuration Fields

Field

VLAN ID

Group Operation

VLAN Name

Description

Select the VLAN Identifier for which you want to display or configure data.

Use this field to select all the ports and configure them. Possible values are:

• Untag All : Select all the ports on which all frames transmitted from this VLAN will be untagged. All the ports will be included in the VLAN.

• Tag All : Select the ports on which all frames transmitted for this VLAN will be tagged. All the ports will be included in the VLAN.

• Remove All : This selection has the effect of excluding all ports from the selected VLAN.

This field identifies the name for the VLAN you selected. It can be up to

32 alphanumeric characters long, including blanks. The default is blank.

VLAN ID 1 is always named “Default.”

Configuring Switching Information v1.0, July 2009

3-13

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-8. VLAN Membership Configuration Fields (continued)

Field

Untagged/Tagged Port

Members

VLAN Type

Description

Click Untagged Port Members or Tagged Port Members to see the port list and use it to add the ports you selected to this VLAN. Each port has three modes:

• Tagged : Select the ports on which all frames transmitted for this

VLAN will be tagged. The ports that are selected will be included in the VLAN.

• Untagged : Select the ports on which all frames transmitted for this

VLAN will be untagged. The ports that are selected will be included in the VLAN.

This field identifies the type of the VLAN you selected. Possible values are:

• Default : The default (VLAN ID = 1) is always present.

• Static : A VLAN that you have configured using this screen.

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

If you make any changes to this page, click Apply to send the updated configuration to the switch. Configuration changes take place immediately.

Port VLAN ID Configuration

Use the Port VLAN ID (PVID) Configuration page to configure a virtual LAN on a port.

To access the Port PVID Configuration page:

1.

Click Switching



VLAN



Advanced



Port PVID Configuration in the navigation tree.

3-14 v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 3-10

Table 3-9. Port VLAN ID Configuration Fields

Field

Interface

Port VLAN ID (PVID)

Acceptable Frame Types

Description

Select the physical interface for which you want to display or configure data.

Specify the range of Port VLAN IDs you want assigned to untagged or priority tagged frames received on this port. The factory default is 1.

Specify how you want the port to handle untagged and priority tagged frames. Whichever you select, VLAN tagged frames will be forwarded in accordance with the IEEE 802.1Q VLAN standard. The factory default is Admit All .

• VLAN Only: The port will discard any untagged or priority tagged frames it receives.

• Admit All: Untagged and priority tagged frames received on the port will be accepted and assigned the value of the Port VLAN ID for this port.

Configuring Switching Information v1.0, July 2009

3-15

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-9. Port VLAN ID Configuration Fields (continued)

Field

Ingress Filtering

Port Priority

Description

Specify how you want the port to handle tagged frames:

• Enable : A tagged frame will be discarded if this port is not a member of the VLAN identified by the VLAN ID in the tag. In an untagged frame, the VLAN is the Port VLAN ID specified for the port that received this frame.

• Disable : All frames are forwarded in accordance with the IEEE

802.1Q VLAN standard. The factory default is disable .

Specify the default 802.1p priority assigned to untagged packets arriving at the port. Possible values are 0–7.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you make any changes to this page, click Apply to send the updated configuration to the switch. Configuration changes take place immediately.

Configuring Spanning Tree Protocol

The Spanning Tree Protocol (STP) provides a tree topology for any arrangement of bridges. STP also provides one path between end stations on a network, eliminating loops. Spanning tree versions supported include Common STP, Multiple STP, and Rapid STP.

Classic STP provides a single path between end stations, avoiding and eliminating loops. For information on configuring Common STP, see “CST Port Configuration” on page 3-21 .

Multiple Spanning Tree Protocol (MSTP) supports multiple instances of Spanning Tree to efficiently channel VLAN traffic over different interfaces. Each instance of the Spanning Tree behaves in the manner specified in IEEE 802.1w, Rapid Spanning Tree (RSTP), with slight modifications in the working but not the end effect (chief among the effects, is the rapid transitioning of the port to ‘Forwarding’). The difference between the RSTP and the traditional

STP (IEEE 802.1d) is the ability to configure and recognize full duplex connectivity and ports which are connected to end stations, resulting in rapid transitioning of the port to ‘Forwarding’ state and the suppression of Topology Change Notification. These features are represented by the parameters ‘pointtopoint’ and ‘edgeport’. MSTP is compatible to both RSTP and STP. It behaves appropriately to STP and RSTP bridges. A MSTP bridge can be configured to behave entirely as a

RSTP bridge or a STP bridge.

3-16 v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Note: For two bridges to be in the same region, the force version should be 802.1s and their configuration name, digest key, and revision level should match. For additional information about regions and their effect on network topology, refer to the IEEE 802.1Q

standard.

The Spanning Tree folder contains links to the following features:

• “STP Switch Configuration/Status” on page 3-17

• “CST Configuration” on page 3-19

• “CST Port Configuration” on page 3-21

• “CST Port Status” on page 3-23

• “Rapid STP Configuration” on page 3-24

• “MST Configuration” on page 3-26

• “MST Port Configuration” on page 3-27

• “STP Statistics” on page 3-31

STP Switch Configuration/Status

The Spanning Tree Switch Configuration/Status page contains fields for enabling STP on the switch.

To display the Spanning Tree Switch Configuration/Status page:

1.

Click Switching



STP



Basic



STP Configuration in the navigation tree.

Configuring Switching Information v1.0, July 2009

3-17

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 3-11

Table 3-10. Spanning Tree Switch Configuration/Status Fields

Field Description

Spanning Tree State

STP Operation Mode

Enables or disables Spanning Tree operation on the switch.

Specifies the Force Protocol Version parameter for the switch. Options are:

• STP (Spanning Tree Protocol): IEEE 802.1d

• RSTP (Rapid Spanning Tree Protocol): IEEE 802.1w

• MSTP (Multiple Spanning Tree Protocol): IEEE 802.1s

Configuration Name

Configuration Revision

Level

Name used to identify the configuration currently being used. It may be up to 32 alphanumeric characters.

Number used to identify the configuration currently being used. The values allowed are between 0 and 65535. The default value is 0.

Configuration Digest Key Number used to identify the configuration currently being used.

BPDU Flooding Enables or disables BPDU Flooding. When this feature is enabled,

BPDU packets arriving at this port are flooded to other ports if STP is disabled.

Bridge Identifier The bridge identifier for the CST. It is made up using the bridge priority and the base MAC address of the bridge.

3-18 Configuring Switching Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-10. Spanning Tree Switch Configuration/Status Fields (continued)

Field

Time Since Topology

Change

Topology Change Count

Topology Change

Designated Root

Root Path Cost

Root Port

Max Age (secs)

Forward Delay (secs)

Hold TIme (secs)

CST Regional Root

CST Path Cost

Description

The time in seconds since the topology of the CST last changed.

The number of times the topology has changed for the CST.

The value of the topology change parameter for the switch indicating if a topology change is in progress on any port assigned to the CST. The value is either True or False .

The bridge identifier of the root bridge. It is made up from the bridge priority and the base MAC address of the bridge.

Path cost to the Designated Root for the CST.

Port to access the Designated Root for the CST.

Specifies the bridge maximum age for CST. The value must be less than or equal to (2 X Bridge Forward Delay) – 1 and greater than or equal to

2 X (Bridge Hello Time +1).

Derived value of the Root Port Bridge Forward Delay parameter.

Minimum time between transmission of Configuration BPDUs.

Priority and base MAC address of the CST Regional Root.

Path Cost to the CST tree Regional Root.

2.

Click Refresh to update the information on the screen with the most current data.

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch

4.

If you make any configuration changes, click Apply to send the updated configuration to the switch. Configuration changes occur immediately.

CST Configuration

Use the Spanning Tree CST Configuration page to configure Common Spanning Tree (CST) and

Internal Spanning Tree on the switch.

To display the Spanning Tree CST Configuration page:

1.

Click Switching



STP



Advanced



CST Configuration in the navigation tree.

Configuring Switching Information v1.0, July 2009

3-19

GS716Tv2 and GS724Tv3 Software Administration Manual

3-20

Figure 3-12

Table 3-11. Spanning Tree CST Configuration/Status Fields

Field

Bridge Priority

Bridge Max Age (secs)

Bridge Hello Time (secs)

Description

When switches or bridges are running STP, each is assigned a priority.

After exchanging BPDUs, the switch with the lowest priority value becomes the root bridge. Specifies the bridge priority value for the

Common and Internal Spanning Tree (CST). The valid range is 0–61440.

The bridge priority is a multiple of 4096. If you specify a priority that is not a multiple of 4096, the priority is automatically set to the next lowest priority that is a multiple of 4096. For example, if the priority is attempted to be set to any value between 0 and 4095, it will be set to 0. The default priority is 32768.

Specifies the bridge maximum age time for the Common and Internal

Spanning Tree (CST), which indicates the amount of time in seconds a bridge waits before implementing a topological change. The valid range is 6–40, and the value must be less than or equal to (2 * Bridge Forward

Delay) – 1 and greater than or equal to 2 * (Bridge Hello Time +1). The default value is 20.

Specifies the switch Hello time for the Common and Internal Spanning

Tree (CST), which indicates the amount of time in seconds a root bridge waits between configuration messages. The value is fixed at 2 seconds. v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-11. Spanning Tree CST Configuration/Status Fields (continued)

Field

Bridge Forward Delay

(secs)

Spanning Tree Maximum

Hops

Description

Specifies the switch forward delay time, which indicates the amount of time in seconds a bridge remains in a listening and learning state before forwarding packets. The value must be greater or equal to (Bridge Max

Age / 2) + 1. The time range is from 4 seconds to 30 seconds. The default value is 15.

Specifies the maximum number of bridge hops the information for a particular CST instance can travel before being discarded. The valid range is 1–127.

Displayed on the Spanning Tree CST Configuration page is the MSTP Status table.

Table 3-12. Spanning Tree MSTP Status Fields

Field

MST ID

VID

FID

Description

Table consisting of the MST instances (including the CST) and the corresponding VLAN IDs associated with each of them.

Table consisting of the VLAN IDs and the corresponding FID associated with each of them

Table consisting of the FIDs and the corresponding VLAN IDs associated with each of them.

2.

Click Refresh to update the information on the screen with the most current data.

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch

4.

If you make any configuration changes, click Apply to send the updated configuration to the switch. Configuration changes take place immediately.

CST Port Configuration

Use the Spanning Tree CST Port Configuration page to configure Common Spanning Tree (CST) and Internal Spanning Tree on a specific port on the switch.

To display the Spanning Tree CST Port Configuration page:

1.

Click Switching



STP



Advanced



CST Port Configuration in the navigation tree.

Configuring Switching Information v1.0, July 2009

3-21

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 3-13

3-22

Table 3-13. Spanning Tree CST Port Configuration/Status Fields

Field

Interface

STP Status

Fast Link

Port State

Path Cost

Priority

External Port Path Cost

Description

Select one of the physical or port channel interfaces associated with the

VLAN(s) associated with the CST.

Spanning Tree Protocol Administrative Mode associated with the port or port channel. Possible values are Enable or Disable .

Specifies if the specified port is an Edge Port with the CST. Possible values are Enable or Disable . The default is Disable .

The Forwarding state of this port.

Set the Path Cost to a new value for the specified port in the common and internal spanning tree. It takes a value in the range of 1–

200000000.

The priority for a particular port within the CST. The port priority is set in multiples of 16. If you specify a value that is not a multiple of 16, the priority is set to the priority is automatically set to the next lowest priority that is a multiple of 16. For example, if you set a value between 0 and

15, the priority is set to 0. If you specify a number between 16 and 31, the priority is set to 16.

Set the External Path Cost to a new value for the specified port in the spanning tree. It takes a value in the range of 1–200000000.

Configuring Switching Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-13. Spanning Tree CST Port Configuration/Status Fields (continued)

Field

Port ID

Hello Timer

Description

The port identifier for the specified port within the CST. It is made up from the port priority and the interface number of the port.

Specifies the switch Hello time, which indicates the amount of time in seconds a port waits between configuration messages. The value is fixed at 2 seconds.

2.

Click Refresh to update the information on the screen with the most current data.

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

4.

If you make any configuration changes, click Apply to send the updated configuration to the switch. Configuration changes take place immediately.

CST Port Status

Use the Spanning Tree CST Port Status page to display Common Spanning Tree (CST) and

Internal Spanning Tree on a specific port on the switch.

To display the Spanning Tree CST Port Status page:

1.

Click Switching



STP



Advanced



CST Port Status in the navigation tree.

Figure 3-14

Configuring Switching Information v1.0, July 2009

3-23

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-14. Spanning Tree CST Port Status Fields

Field Description

Interface

Port Role

Designated Root

Designated Cost

Designated Bridge

Designated Port

Topology Change

Acknowledge

Edge Port

Point-to-point MAC

CST Regional Root

CST Path Cost

Port Forwarding State

Select a physical or port channel interface to configure. The port is associated with the VLAN(s) associated with the CST.

Each MST Bridge Port that is enabled is assigned a Port Role for each spanning tree. The port role will be one of the following values: Root

Port, Designated Port , Alternate Port, Backup Port , Master Port , or

Disabled Port .

Root Bridge for the CST. It is made up using the bridge priority and the base MAC address of the bridge.

Displays cost of the port participating in the STP topology. Ports with a lower cost are less likely to be blocked if STP detects loops.

Bridge Identifier of the bridge with the Designated Port. It is made up using the bridge priority and the base MAC address of the bridge.

Port Identifier on the Designated Bridge that offers the lowest cost to the

LAN. It is made up from the port priority and the interface number of the port.

Identifies whether the next BPDU to be transmitted for this port would have the topology change acknowledgement flag set. It is either “True” or “False”.

Indicates whether the port is enabled as an edge port. Possible values are Enabled or Disabled .

Derived value of the point-to-point status.

Shows the bridge priority and base MAC address of the CST Regional

Root.

Shows the path Cost to the CST tree Regional Root.

Displays the Forwarding State of this port.

2.

Click Refresh to update the information on the screen with the most current data.

Rapid STP Configuration

Use the Rapid Spanning Tree Configuration page to configure Rapid Spanning Tree (RSTP) on the switch.

To display the Rapid STP Configuration page:

3-24 v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Switching



STP



Advanced



RSTP in the navigation tree.

Figure 3-15

Table 3-15. Rapid STP

Field Description

Interface

Role

Mode

Fast Link

Status

The physical or port channel interfaces associated with VLANs associated with the

CST.

Each MST Bridge Port that is enabled is assigned a Port Role for each spanning tree. The port role will be one of the following values: Root Port, Designated Port,

Alternate Port, Backup Port, Master Port, or Disabled Port.

Specifies the spanning tree operation mode. Different modes are STP , RSTP , and

MSTP .

Indicates whether the port is enabled as an edge port.

The Forwarding State of this port.

2.

Click Refresh to update the information on the screen with the most current data.

Configuring Switching Information v1.0, July 2009

3-25

GS716Tv2 and GS724Tv3 Software Administration Manual

MST Configuration

Use the Spanning Tree MST Configuration page to configure Multiple Spanning Tree (MST) on the switch.

To display the Spanning Tree MST Configuration page:

1.

Click Switching



STP



Advanced



MST Configuration in the navigation tree. Use this page to create and configure a new MST or select an existing MST to display or configure.

Figure 3-16

Table 3-16. Spanning Tree MST Configuration

Field

MST ID

Priority

Description

This is only visible when the select option of the MST ID select box is selected. The

ID of the MST being created. Valid values for this are between 1 and 4094.

Specifies the bridge priority value for the MST. When switches or bridges are running STP, each is assigned a priority. After exchanging BPDUs, the switch with the lowest priority value becomes the root bridge. The bridge priority is a multiple of

4096. If you specify a priority that is not a multiple of 4096, the priority is automatically set to the next lowest priority that is a multiple of 4096. For example, if the priority is attempted to be set to any value between 0 and 4095, it will be set to 0.

The default priority is 32768.The valid range is 0–61440.

3-26 Configuring Switching Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-16. Spanning Tree MST Configuration (continued)

Field Description

VLAN ID This gives a list box of all VLANs on the switch. The VLANs associated with the

MST instance which is selected are highlighted on the list. These can be selected or unselected for reconfiguring the association of VLANs to MST instances.

Bridge Identifier The bridge identifier for the selected MST instance. It is made up using the bridge priority and the base MAC address of the bridge.

Time Since

Topology

Change

Topology

Change Count

Topology

Change

Displays the total amount of time since the topology of the selected MST instance last changed. The time is displayed in hour/minute/second format, for example, 5 hours, 10 minutes, and 4 seconds.

Displays the total number of times topology has changed for the selected MST instance.

Indicates whether a topology change is in progress on any port assigned to the selected MST instance. The possible values are True or False .

Designated

Root

Displays the bridge identifier of the root bridge, which is made up from the bridge priority and the base MAC address of the bridge.

Root Path Cost Displays the path cost to the Designated Root for this MST instance.

Root Port Indicates the port to access the Designated Root for this MST instance.

2.

Click Add to create a new MST which you have configured.

3.

Click Delete to delete the selected MST instance. All VLANs associated with the instance are associated with the CST.

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

If you make any configuration changes, click Apply to apply the new settings to the switch.

Configuration changes take effect immediately.

MST Port Configuration

Use the Spanning Tree MST Port Configuration page to display Multiple Spanning Tree (MST) on a specific port on the switch.

To display the Spanning Tree MST Port Status page:

Configuring Switching Information v1.0, July 2009

3-27

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Switching



STP



Advanced



MST Port Configuration in the navigation tree.

Figure 3-17 and Figure 3-18 show the left and right portions of the Web page.

Figure 3-17

3-28

Figure 3-18

Note: If no MST instances have been configured on the switch, the page displays a

“No MSTs Available” message and does not display the fields shown in

Table 3-17 on page 3-29 .

v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 3-19

Table 3-17. Spanning Tree MST Port Status Fields

Field

Select MST

Interface

Port Priority

Port Path Cost

Auto-calculated Port Path

Cost

Port ID

Port Up Time Since

Counters Last Cleared

Port Mode

Description

Select an existing MST instance from the pull down list of MST IDs in the Status table at the top of the screen.

Select a physical or port channel interface to configure. The port is associated with the VLAN(s) associated with the selected MST instance.

The priority for a particular port within the selected MST instance. The port priority is set in multiples of 16. If you specify a value that is not a multiple of 16, the priority is set to the priority is automatically set to the next lowest priority that is a multiple of 16. For example, if you set a value between 0 and 15, the priority is set to 0. If you specify a number between 16 and 31, the priority is set to 16.

Set the Path Cost to a new value for the specified port in the selected

MST instance. It takes a value in the range of 1–200000000.

Displays whether the path cost is automatically calculated ( Enabled ) or not ( Disabled ). Path cost is calculated based on the link speed of the port if the configured value for Port Path Cost is zero.

The port identifier for the specified port within the selected MST instance. It is made up from the port priority and the interface number of the port.

Time since the counters were last cleared, displayed in Days, Hours,

Minutes, and Seconds.

Spanning Tree Protocol Administrative Mode associated with the port or port channel. Possible values are Enable or Disable .

Configuring Switching Information v1.0, July 2009

3-29

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-17. Spanning Tree MST Port Status Fields (continued)

Field

Port Forwarding State

Port Role

Designated Root

Designated Cost

Designated Bridge

Designated Port

Description

Indicates the current STP state of a port. If enabled, the port state determines what forwarding action is taken on traffic. Possible port states are:

• Disabled: STP is currently disabled on the port. The port forwards traffic while learning MAC addresses.

• Blocking: The port is currently blocked and cannot be used to forward traffic or learn MAC addresses.

• Listening: The port is currently in the listening mode. The port cannot forward traffic nor can it learn MAC addresses.

• Learning: The port is currently in the learning mode. The port cannot forward traffic, however, it can learn new MAC addresses.

• Forwarding: The port is currently in the forwarding mode. The port can forward traffic and learn new MAC addresses

Each MST Bridge Port that is enabled is assigned a Port Role for each spanning tree. The port role will be one of the following values: Root

Port , Designated Port , Alternate Port , Backup Port , Master Port or

Disabled Port .

Root Bridge for the selected MST instance. It is made up using the bridge priority and the base MAC address of the bridge.

Displays cost of the port participating in the STP topology. Ports with a lower cost are less likely to be blocked if STP detects loops.

Bridge Identifier of the bridge with the Designated Port. It is made up using the bridge priority and the base MAC address of the bridge.

Port Identifier on the Designated Bridge that offers the lowest cost to the LAN. It is made up from the port priority and the interface number of the port.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

Click Refresh to update the screen with the latest MST information.

4.

If you make any configuration changes, click Apply to apply the new settings to the switch.

Configuration changes take effect immediately.

3-30 v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

STP Statistics

Use the Spanning Tree Statistics page to view information about the number and type of bridge protocol data units (BPDUs) transmitted and received on each port.

To display the Spanning Tree Statistics page:

1.

Click Switching



STP



Advanced



STP Statistics i n the navigation tree.

Figure 3-20

Table 3-18. Spanning Tree Statistics Fields

Field Description

Interface

STP BPDUs Received

STP BPDUs Transmitted

RSTP BPDUs Received

Select a physical or port channel interface to view its statistics.

Number of STP BPDUs received at the selected port.

Number of STP BPDUs transmitted from the selected port.

Number of RSTP BPDUs received at the selected port.

RSTP BPDUs Transmitted Number of RSTP BPDUs transmitted from the selected port.

MSTP BPDUs Received Number of MSTP BPDUs received at the selected port.

MSTP BPDUs Transmitted Number of MSTP BPDUs transmitted from the selected port.

2.

Click Refresh to update the screen with the latest STP statistics information.

Configuring Switching Information v1.0, July 2009

3-31

GS716Tv2 and GS724Tv3 Software Administration Manual

Configuring IGMP Snooping

Internet Group Management Protocol (IGMP) Snooping is a feature that allows a switch to forward multicast traffic intelligently on the switch. Multicast IP traffic is traffic that is destined to a host group. Host groups are identified by class D IP addresses, which range from 224.0.0.0 to

239.255.255.255. Based on the IGMP query and report messages, the switch forwards traffic only to the ports that request the multicast traffic. This prevents the switch from broadcasting the traffic to all ports and possibly affecting network performance.

A traditional Ethernet network may be separated into different network segments to prevent placing too many devices onto the same shared media. Bridges and switches connect these segments. When a packet with a broadcast or multicast destination address is received, the switch will forward a copy into each of the remaining network segments in accordance with the IEEE

MAC Bridge standard. Eventually, the packet is made accessible to all nodes connected to the network.

This approach works well for broadcast packets that are intended to be seen or processed by all connected nodes. In the case of multicast packets, however, this approach could lead to less efficient use of network bandwidth, particularly when the packet is intended for only a small number of nodes. Packets will be flooded into network segments where no node has any interest in receiving the packet. While nodes will rarely incur any processing overhead to filter packets addressed to unrequested group addresses, they are unable to transmit new packets onto the shared media for the period of time that the multicast packet is flooded. The problem of wasting bandwidth is even worse when the LAN segment is not shared, for example in full duplex links.

Allowing switches to snoop IGMP packets is a creative effort to solve this problem. The switch uses the information in the IGMP packets as they are being forwarded throughout the network to determine which segments should receive packets directed to the group address.

The Multicast folder contains links to the following features:

• “Global Configuration” on page 3-32

• “IGMP Snooping Interface Configuration” on page 3-34

Global Configuration

Use the IGMP Snooping Configuration page to configure the parameters for IGMP snooping, which is used to build forwarding lists for multicast traffic.

To access the IGMP Snooping Configuration page:

3-32 v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Switching



Multicast



IGMP Snooping



IGMP Snooping Configuration in the navigation tree.

Figure 3-21

Table 3-19. IGMP Snooping Configuration Fields

Field Description

IGMP Snooping Status

Multicast Control Frame

Count

Select the administrative mode for IGMP Snooping for the switch. The default is Disable .

Shows the number of multicast control frames that have been processed by the CPU.

Interfaces Enabled for

IGMP Snooping

VLAN Ids Enabled For

IGMP Snooping Querier

Lists the interfaces currently enabled for IGMP Snooping. To enable interfaces for IGMP snooping, see “IGMP Snooping Interface

Configuration” on page 3-34 .

Data Frames Forwarded by the CPU

Shows the number of data frames forwarded by the CPU.

VLAN Ids Enabled For

IGMP Snooping

Displays VLAN IDs enabled for IGMP snooping. To enable VLANs for

IGMP snooping, see page 3-40 .

“IGMP Snooping VLAN Configuration” on

Displays VLAN IDs enabled for IGMP snooping querier.

Configuring Switching Information 3-33 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you make any configuration changes, click Apply to apply the new settings to the switch.

Configuration changes take effect immediately.

IGMP Snooping Interface Configuration

Use the IGMP Snooping Interface Configuration page to configure IGMP snooping settings on specific interfaces.

To access the IGMP Snooping Interface Configuration page:

1.

Click Switching



Multicast



IGMP Snooping



IGMP Snooping Interface

Configuration in the navigation tree.

3-34

Figure 3-22

Table 3-20. IGMP Snooping Interface Configuration Fields

Field

Interface

Admin Mode

Description

Lists all physical, VLAN, and LAG interfaces. Select the interface you want to configure.

Select the interface mode for the selected interface for IGMP Snooping for the switch from the menu. The default is Disable .

Configuring Switching Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-20. IGMP Snooping Interface Configuration Fields (continued)

Field

Host Timeout

Max Response Time

MRouter Timeout

Fast Leave Admin Mode

Description

Specify the amount of time you want the switch to wait for a report for a particular group on a particular interface before it deletes that interface from the group. Enter a value between 1 and 3600 seconds. The default is 260 seconds.

Specify the amount of time you want the switch to wait after sending a query on an interface because it did not receive a report for a particular group on that interface. Enter a value greater or equal to 1 and less than the Group Membership Interval in seconds. The default is 10 seconds. The configured value must be less than the Group

Membership Interval.

Specify the amount of time you want the switch to wait to receive a query on an interface before removing it from the list of interfaces with multicast routers attached. Enter a value between 0 and 3600 seconds.

The default is 0 seconds. A value of zero indicates an infinite timeout; no expiration.

Select the Fast Leave mode for a particular interface from the menu.

The default is Disable .

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you make any configuration changes, click Apply to apply the new settings to the switch.

Configuration changes take effect immediately.

Viewing Multicast Forwarding Database Information

The Layer 2 Multicast Forwarding Database (MFDB) is used by the switch to make forwarding decisions for packets that arrive with a multicast destination MAC address. By limiting multicasts to only certain ports in the switch, traffic is prevented from going to parts of the network where that traffic is unnecessary.

When a packet enters the switch, the destination MAC address is combined with the VLAN ID and a search is performed in the Layer 2 Multicast Forwarding Database. If no match is found, then the packet is either flooded to all ports in the VLAN or discarded, depending on the switch configuration. If a match is found, then the packet is forwarded only to the ports that are members of that multicast group.

The Switching



Multicast folder contains links to the following pages:

Configuring Switching Information 3-35 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

• “IGMP Snooping Table” on page 3-36

• “MFDB Table” on page 3-37

• “MFDB Statistics” on page 3-39

• “IGMP Snooping VLAN Configuration” on page 3-40

IGMP Snooping Table

Use the IGMP Snooping Table page to view all of the entries in the Multicast Forwarding

Database that were created for IGMP snooping.

To access the IGMP Snooping Table page:

1.

Click Switching



Multicast



IGMP Snooping



IGMP Snooping Table in the navigation tree.

3-36

Figure 3-23

Table 3-21. IGMP Snooping Table Fields

Field

MAC Address

VLAN ID

Description

A multicast MAC address for which the switch has forwarding and/or filtering information. The format is 6 two-digit hexadecimal numbers that are separated by colons, for example, 01:00:5e:45:67:89.

A VLAN ID for which the switch has forwarding and filtering information.

Configuring Switching Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-21. IGMP Snooping Table Fields (continued)

Field

Type

Description

Interface

Description

This displays the type of the entry. Static entries are those that are configured by the end user. Dynamic entries are added to the table as a result of a learning process or protocol.

The text description of this multicast table entry. Possible values are

Management Configured , Network Configured , and Network

Assisted .

The list of interfaces that are designated for forwarding (Fwd) and filtering (Flt) for the associated address.

2.

Click Clear to clear one or all of the IGMP Snooping entries.

3.

Click Refresh to reload the page and display the most current information.

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

MFDB Table

Use the MFDB Table page to view the port membership information for all active multicast address entries. The key for an entry consists of a MAC address. Entries may contain data for more than one protocol.

To access the MFDB Table page:

1.

Click Switching



Multicast



IGMP Snooping



MFDB Table in the navigation tree.

Configuring Switching Information v1.0, July 2009

3-37

GS716Tv2 and GS724Tv3 Software Administration Manual

3-38

Figure 3-24

Table 3-22. MFDB Table Fields

Field

MAC Address

VLAN ID

Component

Type

Description

Description

The MAC Address to which the multicast MAC address is related.

To search by MAC address, enter the address with the MFDB table entry you want displayed. Enter six two-digit hexadecimal numbers separated by colons, for example 00:0f:43:67:89:AB, and then click Go .

If the address exists, that entry will be displayed. An exact match is required.

The VLAN ID to which the multicast MAC address is related.

This is the component that is responsible for this entry in the Multicast

Forwarding Database. Possible values are IGMP Snooping or Static

Filtering .

This displays the type of the entry. Static entries are those that are configured by the end user. Dynamic entries are added to the table as a result of a learning process or protocol.

The text description of this multicast table entry. Possible values are

Management Configured , Network Configured and Network

Assisted .

v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-22. MFDB Table Fields (continued)

Field

Interface

Forwarding Interfaces

Description

The list of interfaces that are designated for forwarding (Fwd) and filtering (Flt) for the selected address.

The resultant forwarding list is derived from combining all the forwarding interfaces and removing the interfaces that are listed as the static filtering interfaces.

2.

Click Refresh to update the information on the screen with the most current data.

MFDB Statistics

Use the multicast forwarding database Statistics page to view statistical information about the

MFDB table.

To access the MFDB Statistics page:

1.

Click Switching



Multicast



IGMP Snooping



MFDB Statistics in the navigation tree.

Figure 3-25

Configuring Switching Information v1.0, July 2009

3-39

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-23. Multicast Forwarding Database Statistics Fields

Field Description

Max MFDB Table Entries

Most MFDB Entries Since

Last Reset

Current Entries

Shows the maximum number of entries that the Multicast Forwarding

Database table can hold.

The largest number of entries that have been present in the Multicast

Forwarding Database table since the system was last reset. This value is also known as the MFDB high-water mark.

Shows the current number of entries in the Multicast Forwarding

Database table.

2.

Click Refresh to update the information on the screen with the most current data.

IGMP Snooping VLAN Configuration

Use the IGMP Snooping VLAN Configuration page to configure IGMP snooping settings for

VLANs on the system.

3-40 v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

To access the IGMP Snooping VLAN Configuration page:

1.

Click Switching



Multicast



IGMP Snooping



IGMP Snooping VLAN Configuration in the navigation tree.

Figure 3-26

Table 3-24. IGMP Snooping VLAN Configuration Fields

Field

VLAN ID

Fast Leave Admin Mode

Host Timeout

Description

List of VLAN IDs for which IGMP Snooping is enabled.

Enable or disable the IGMP Snooping Fast Leave Mode for the specified

VLAN ID. Enabling fast-leave allows the switch to immediately remove the layer 2 LAN interface from its forwarding table entry upon receiving an IGMP leave message for that multicast group without first sending out MAC-based general queries to the interface.

You should enable fast-leave admin mode only on VLANs where only one host is connected to each layer 2 LAN port. This prevents the inadvertent dropping of the other hosts that were connected to the same layer 2 LAN port but were still interested in receiving multicast traffic directed to that group. Also, fast-leave processing is supported only with

IGMP version 2 hosts.

Sets the value for group membership interval of IGMP snooping for the specified VLAN ID. The valid range is (Maximum Response Time + 1) to

3600 seconds.

Configuring Switching Information 3-41 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-24. IGMP Snooping VLAN Configuration Fields (continued)

Field Description

Maximum Response Time Enter the amount of time in seconds that a switch will wait after sending a query on an interface because it did not receive a report for a particular group in that interface. This value must be less than the IGMP

Query Interval time value. The range is 1 to (Group Membership Interval

-1) seconds. Its value should be greater than the Group Membership

Interval value.

MRouter Timeout

Query Mode

Query Interval

Sets the value for multicast router expiry time of IGMP Snooping for the specified VLAN ID. The valid range is 0–3600 seconds.

Enable or disable the IGMP Querier Mode for the specified VLAN ID.

Enter the value for IGMP Query Interval for the specified VLAN ID. Valid range is 1–18000 seconds.

2.

Click Add to enable IGMP snooping on the specified VLAN.

3.

Click Delete to disable IGMP snooping on the specified VLAN.

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

If you make any configuration changes, click Apply to apply the new settings to the switch.

Configuration changes take effect immediately.

Configuring IGMP Snooping Queriers

IGMP snooping requires that one central switch or router periodically query all end-devices on the network to announce their multicast memberships. This central device is the 'IGMP querier'. The

IGMP query responses, known as IGMP reports, keep the switch updated with the current multicast group membership on a port-by-port basis. If the switch does not receive updated membership information in a timely fashion, it will stop forwarding multicasts to the port where the end device is located.

These pages enable you to configure and display information on IGMP snooping queriers on the network and, separately, on VLANs.

The IGMP Snooping Querier folder contains links to the following features:

• “IGMP Snooping Querier Configuration” on page 3-43

• “IGMP Snooping Querier VLAN Configuration” on page 3-44

• “IGMP Snooping Querier VLAN Status” on page 3-45

3-42 Configuring Switching Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

IGMP Snooping Querier Configuration

Use this page to enable or disable the IGMP Snooping Querier feature, specify the IP address of the router to perform the querying, and configure the related parameters.

To access this page:

1.

Click Switching



Multicast



IGMP Snooping Querier



IGMP Snooping



Querier

Configuration in the navigation tree.

Figure 3-27

Table 3-25. IGMP Snooping Querier Configuration Fields

Field Description

Querier Admin Mode Select the administrative mode for IGMP Snooping for the switch from the menu. The default is Disable .

Snooping Querier Address Specify the Snooping Querier Address to be used as source address in periodic IGMP queries. This address is used when no address is configured on the VLAN on which the query is being sent.

IGMP Version

Query Interval

Querier Expiry Interval

Specify the IGMP protocol version used in periodic IGMP queries.

Specify the time interval in seconds between periodic queries sent by the snooping querier. The Query Interval must be a value in the range of

1–18000 seconds. The default value is 60.

Specify the time interval in seconds after which the last querier information is removed. The Querier Expiry Interval must be a value in the range of 60–300 seconds. The default value is 60.

2.

Click Refresh to redisplay the page with the latest information from the switch.

Configuring Switching Information 3-43 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

4.

If you configure an IGMP snooping querier, click Apply to apply the new settings to the switch. Configuration changes take effect immediately.

IGMP Snooping Querier VLAN Configuration

Use this page to configure IGMP queriers for use with VLANs on the network.

To access this page:

1.

Click Switching



Multicast



IGMP Snooping Querier



Querier VLAN Configuration in the navigation tree.

Figure 3-28

Table 3-26. IGMP Snooping Querier VLAN Configuration Fields

Field

VLAN ID

Description

Specifies VLAN ID for which the IGMP Snooping Querier is to be enabled. Select New Entry to create a new VLAN ID for IGMP

Snooping. You can also set pre-configurable Snooping Querier parameters.

3-44 v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-26. IGMP Snooping Querier VLAN Configuration Fields (continued)

Field Description

Querier Election Participate

Mode

Enable or disable Querier Participate Mode. When this mode is disabled, upon seeing another querier of same version in the VLAN, the snooping querier moves to non-querier state.

When enabled, the snooping querier participates in querier election, in which the least IP address operates as the querier in that VLAN. The other querier moves to non-querier state.

Snooping Querier VLAN

Address

Specify the Snooping Querier Address to be used as the source address in periodic IGMP queries sent on the specified VLAN.

2.

Click Refresh to redisplay the page with the latest information from the switch.

3.

Click Delete to disable Snooping Querier on the selected VLAN. This button is not visible when a VLAN is not selected.

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

If you configure a snooping querier for a VLAN, click Apply to apply the new settings to the switch.

IGMP Snooping Querier VLAN Status

Use this page to view the operational state and other information for IGMP snooping queriers for

VLANs on the network.

To access this page:

Configuring Switching Information v1.0, July 2009

3-45

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Switching



Multicast



IGMP Snooping Querier



Querier VLAN Status in the navigation tree.

3-46

Figure 3-29

Table 3-27. IGMP Snooping Querier VLAN Status Fields

Field

VLAN ID

Operational State

Operational Version

Last Querier Address

Description

Specifies the VLAN ID on which the IGMP Snooping Querier is administratively enabled and for which VLAN exists in the VLAN database.

Specifies the operational state of the IGMP Snooping Querier on a

VLAN:

• Querier : The snooping switch is the querier in the VLAN. The snooping switch will send out periodic queries with a time interval equal to the configured querier query interval. If the snooping switch sees a better querier (numerically lower) in the VLAN, it moves to nonquerier mode.

• Non-Querier : The snooping switch is in non-querier mode in the

VLAN. If the querier expiry interval timer expires, the snooping switch moves into querier mode.

• Disabled : The snooping querier is not operational on the VLAN. The snooping querier moves to disabled mode when IGMP snooping is not operational on the VLAN, when the querier address is not configured, or the network management address is not configured.

Displays the IGMP protocol version of the operational querier.

Displays the IP address of the last querier from which a query was snooped on the VLAN.

Configuring Switching Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 3-27. IGMP Snooping Querier VLAN Status Fields (continued)

Field Description

Last Querier Version Displays the IGMP protocol version of the last querier from which a query was snooped on the VLAN.

Operational Max Response

Time

Displays the maximum response time to be used in the queries that are sent by the snooping querier.

2.

Click Refresh to redisplay the page with the latest information from the switch.

Searching and Configuring the Forwarding Database

The forwarding database maintains a list of MAC addresses after having received a packet from this MAC address. The transparent bridging function uses the forwarding database entries to determine how to forward a received frame.

The Address Table folder contains links to the following features:

• “Searching the MAC Address Table” on page 3-47

• “Dynamic Address Configuration” on page 3-49

• “MAC Address Table” on page 3-50

• “Static MAC Address” on page 3-52

Searching the MAC Address Table

Use the search function of the MAC Address Table page to display information about unicast entries for which the switch has forwarding and/or filtering information. This information is used by the transparent bridging function in determining how to propagate a received frame.

To access this page:

1.

Click Switching



Address Table



Basic



Address Table in the navigation tree.

2.

Use the “Search By” field to search for MAC Addresses by MAC Address , VLAN ID , or

Interface .

• MAC Address : Select MAC Address from the menu and enter a six-byte hexadecimal

MAC address in two-digit groups separated by colons, then click Go . If the address exists, that entry will be displayed. An exact match is required.

• VLAN ID : Select VLAN ID from the menu, enter the VLAN ID, for example, 100. Then click Go . If any entries with that VLAN ID exist they are displayed.

Configuring Switching Information 3-47 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

• Interface : Select Interface from the menu, enter the interface ID in g1, g2... format, then, click Go . If any entries with learned on that interface exist, they are displayed.

Figure 3-30

Table 3-28. MAC Address Table Fields

Field Description

VLAN ID

MAC Address

Interface

Status

Specifies the VLAN ID on which the IGMP Snooping Querier is administratively enabled and for which VLAN exists in the VLAN database.

A unicast MAC address for which the switch has forwarding and/or filtering information. The format is a six-byte MAC address with each byte separated by colons. For example, 00:0F:89:AB:CD:EF.

The port where this address was learned. In other words, this field shows the port through which the MAC address can be reached.

The status of this entry. The possible values are:

• Static: The entry was added when a static MAC filter was defined.

• Learned: The entry was learned by observing the source MAC addresses of incoming traffic, and is currently in use.

• Management: The system MAC address, which is identified with interface c1.

3.

Click Clear to clear Dynamic MAC Addresses in the table.

3-48 Configuring Switching Information v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

4.

Click Refresh to redisplay the page to show the latest MAC Addresses.

5.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

Dynamic Address Configuration

Use the Advanced



Dynamic Addresses page to set the amount of time to keep a learned MAC address entry in the forwarding database. The forwarding database contains static entries, which are never aged out, and dynamically learned entries, which are removed if they are not updated within a given time.

To access the Configuration page:

1.

Click Switching



Address Table



Advanced



Dynamic Addresses in the navigation tree.

Figure 3-31

Table 3-29. Dynamic Address Configuration Fields

Field

Address Aging

Description

Specify the number of seconds the forwarding database should wait before deleting a learned entry that has not been updated. IEEE 802.1d-

1990 recommends a default of 300 seconds. You may enter any number of seconds between 10 and 1000000. The factory default is 300.

Configuring Switching Information v1.0, July 2009

3-49

GS716Tv2 and GS724Tv3 Software Administration Manual

Note: IEEE 802.1d recommends a default of 300 seconds, which is the factory default.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

Click Apply to apply to send the updated configuration to the switch. Configuration changes take effect immediately.

MAC Address Table

The MAC Address Table contains information about unicast entries for which the switch has forwarding and/or filtering information. This information is used by the transparent bridging function in determining how to propagate a received frame.

To access the MAC Address Table page:

1.

Click Switching



Address Table



Advanced



Address Table in the navigation tree.

You can search for MAC Addresses by VLAN ID, MAC Address, or interface:

• Search by VLAN ID. Select VLAN ID from the menu, and enter the VLAN ID, for example, 100, then click Go . If the address exists, the entry will be displayed as the first entry, followed by the remaining (greater) MAC addresses.

• Search by MAC Address. Select MAC Address from the menu and enter a six-byte hexadecimal MAC address in two-digit groups separated by colons, and then click Go . If the address exists, that entry will be displayed. An exact match is required.

• Search by Interface. Select Interface from the menu, enter the interface ID in g1, g2... format, and then click Go . If any entries with learned on that interface exist, they are displayed.

3-50 v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 3-32

Table 3-30. MAC Address Table Fields

Field

VLAN ID

MAC Address

Interface

Status

Description

The VLAN ID associated with the MAC Address.

A unicast MAC Address for which the switch has forwarding and/or filtering information. The MAC address is in the format of 6 two-digit hexadecimal numbers that are separated by colons. For example,

00:0f:5e:45:67:89 is the MAC Address.

The port upon which this address was learned.

The status of this entry. Possible values are:

• Learned . The value of the corresponding instance was learned, and is being used.

• Management . The value of the corresponding instance is also the value of an existing instance of dot1dStaticAddress.

• Static .The value of the corresponding instance was added by the system or a user and cannot be relearned.

2.

Click Clear to clear the entries.

3.

Click Refresh to reload the page and display the latest MAC address learned on a specific port.

Configuring Switching Information v1.0, July 2009

3-51

GS716Tv2 and GS724Tv3 Software Administration Manual

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

Static MAC Address

Use the Static MAC Address Configuration page to view static MAC addresses configured on an interface.

To access the Static MAC Address Configuration page:

1.

Click Switching



Address Table



Advanced



Static MAC Address in the navigation tree.

Figure 3-33

Table 3-31. Static MAC Address Fields

Field Description

Vlan ID

Static MAC Address

Select the VLAN ID corresponding to the MAC address being added.

Only packets with source address matching this MAC Address will be admitted, otherwise it will be discarded.

Select the physical interface for which you want to display data. Interface

2.

Click Refresh to reload the page and display the latest MAC address learned on a specific port.

3.

Enter a new static MAC address in the field, select the VLAN ID corresponding to the MAC address being added, then click Add to add the static MAC address to the switch.

3-52 v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

4.

After you enter the MAC address and VLAN ID of the statically configured MAC address to delete, click Delete to remove the MAC address from the port and apply the new settings to the system. The screen refreshes, and the MAC address no longer appears in the table on the page.

5.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

6.

If you make any changes to the page, click Apply to apply the changes to the system. If you want the switch to retain the new values across a power cycle, you must perform a save.

Configuring Switching Information v1.0, July 2009

3-53

GS716Tv2 and GS724Tv3 Software Administration Manual

3-54 v1.0, July 2009

Configuring Switching Information

Chapter 4

Configuring Quality of Service

This section gives an overview of Quality of Service (QoS) and explains the QoS features available from the Quality of Service navigation tree menu. This section contains the following subsections:

• “Configuring Class of Service” on page 4-1

In a typical switch, each physical port consists of one or more queues for transmitting packets on the attached network. Multiple queues per port are often provided to give preference to certain packets over others based on user-defined criteria. When a packet is queued for transmission in a port, the rate at which it is serviced depends on how the queue is configured and possibly the amount of traffic present in the other queues of the port. If a delay is necessary, packets get held in the queue until the scheduler authorizes the queue for transmission. As queues become full, packets have no place to be held for transmission and get dropped by the switch.

QoS is a means of providing consistent, predictable data delivery by distinguishing between packets that have strict timing requirements from those that are more tolerant of delay. Packets with strict timing requirements are given “special treatment” in a QoS-capable network. With this in mind, all elements of the network must be QoS-capable. The presence of at least one node which is not QoS-capable creates a deficiency in the network path and the performance of the entire packet flow is compromised.

Configuring Class of Service

The Class of Service (CoS) queueing feature lets you directly configure certain aspects of switch queueing. The priority of a packet arriving at an interface can be used to steer the packet to the appropriate outbound CoS queue through a mapping table. CoS queue characteristics that affect queue mapping, such as minimum guaranteed bandwidth, or transmission rate shaping are userconfigurable at the queue (or port) level.

Four queues per port are supported.

The Class of Service folder contains links to the following features:

• “Basic CoS Configuration” on page 4-2

• “CoS Interface Configuration” on page 4-3

4-1 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

• “Interface Queue Configuration” on page 4-5

• “802.1p to Queue Mapping” on page 4-6

• “DSCP to Queue Mapping” on page 4-7

Basic CoS Configuration

Use the Trust Mode Configuration page to set the class of service trust mode of an interface. Each port in the switch can be configured to trust one of the packet fields (802.1p or IP DSCP), or to not trust any packet’s priority designation (untrusted mode). If the port is set to a trusted mode, it uses a mapping table appropriate for the trusted field being used. This mapping table indicates the CoS queue to which the packet should be forwarded on the appropriate egress port(s). Of course, the trusted field must exist in the packet for the mapping table to be of any use, so there are default actions performed when this is not the case. These actions involve directing the packet to a specific

CoS level configured for the ingress port as a whole, based on the existing port default priority as mapped to a traffic class by the current 802.1p mapping table.

Alternatively, when a port is configured as untrusted, it does not trust any incoming packet priority designation and uses the port default priority value instead. All packets arriving at the ingress of an untrusted port are directed to a specific CoS queue on the appropriate egress port(s), in accordance with the configured default priority of the ingress port. This process is also used for cases where a trusted port mapping is unable to be honored, such as when a non-IP packet arrives at a port configured to trust the IP DSCP value.

To display the Basic CoS Configuration page:

1.

Click the QoS



Basic



CoS Configuration in the navigation tree.

4-2

Figure 4-1 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 4-1. Basic CoS Configuration Fields

Field Description

Global

Global Trust Mode

Interface

Interface Trust Mode

Select the Global option to apply the same trust mode to all CoS configurable interfaces.

Specifies whether or not all interfaces trust a particular packet marking when the packet enters the port. The default value is trust 802.1p. The mode can only be one of the following:

• Untrusted

• 802.1p

• DSCP

The menu contains all CoS configurable interfaces. Select an individual interface from the menu to override the global settings on a perinterface basis.

Specifies whether or not an interface trusts a particular packet marking when the packet enters the port. The default value is trust 802.1p. The mode can only be one of the following:

• Untrusted

• 802.1p

• DSCP

2.

If you change any of the settings on the page, click Apply to send the updated configuration to the switch.

CoS Interface Configuration

Use the CoS Interface Configuration page to apply an interface shaping rate to all ports or to a specific port.

To display the CoS Interface Configuration page:

1.

Click the QoS



CoS tab, and then click the Advanced



CoS Interface Configuration link.

4-3 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 4-2

Table 4-2. Interface Configuration Fields

Field

Interface

Interface Trust Mode

Interface Shaping Rate

Description

Indicates the interface to be affected by the Interface Shaping Rate.

Select the check box in the heading row to apply a trust mode or rate to all interfaces. Select the check box next to an individual port to apply a trust mode or rate to a specific interface.

Specifies whether or not an interface (or all interfaces if all interfaces are selected) trust a particular packet marking when the packet enters the port. The default value is trust 802.1p. The mode can only be one of the following:

• Untrusted

• 802.1p

• DSCP

Specifies the maximum bandwidth allowed, typically used to shape the outbound transmission rate in increments of 64 kbps in the range of 16-

16384. This value is controlled independently of any per-queue maximum bandwidth configuration. It is effectively a second-level shaping mechanism. The default value is 0, in increments of 16. A value of 0 means the maximum is unlimited.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you make changes to the page, click Apply to apply the changes to the system.

4-4 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Interface Queue Configuration

Use the Interface Queue Configuration page to define what a particular queue does by configuring switch egress queues. User-configurable parameters control the amount of bandwidth used by the queue, the queue depth during times of congestion, and the scheduling of packet transmission from the set of all queues on a port. Each port has its own CoS queue-related configuration.

The configuration process is simplified by allowing each CoS queue parameter to be configured globally or per-port. A global configuration change is automatically applied to all ports in the system.

To display the Interface Queue Configuration page:

1.

Click the QoS



CoS tab, and then click the Advanced



Interface Queue Configuration link.

Figure 4-3

Table 4-3. Interface Queue Configuration Fields

Field

Interface

Queue ID

Description

Indicates the interface to configure. Select the check box in the heading row to apply a trust mode or rate to all interfaces. Select the check box next to an individual port to apply a trust mode or rate to a specific interface.

Use the menu to select the queue to be configured.

4-5 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 4-3. Interface Queue Configuration Fields (continued)

Field Description

Minimum Bandwidth

Scheduler Type

Enter a percentage of the maximum negotiated bandwidth for the selected queue on the interface. Specify a percentage from 0–100, in increments of 1.

Selects the type of queue processing from the drop down menu. Options are Weighted and Strict . Defining on a per-queue basis allows the user to create the desired service characteristics for different types of traffic.

• Weighted : Weighted round robin associates a weight to each queue.

This is the default. The HW queues are mapped to the following weight proportions: 1:3:5:7:8:10:12:15 .

• Strict : Services traffic with the highest priority on a queue first.

Queue Management Type Displays the type of packet management used for all packets, which is

Taildrop. All packets on a queue are safe until congestion occurs. At this point, any additional packets queued are dropped.

2.

If you make changes to the page, click Apply to apply the changes to the system.

802.1p to Queue Mapping

The 802.1p to Queue Mapping page also displays the Current 802.1p Priority Mapping table. To display the 801.p to Queue Mapping page:

1.

Click QoS



CoS



Advanced



802.1p to Queue Mapping to display the page.

4-6

Figure 4-4 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 4-4. Current 802.1p Priority Mapping Table Fields

Field Description

Global

Interface

Select the Global option to apply the same 802.1p priority mapping to all CoS configurable interfaces.

The menu contains all CoS configurable interfaces. Select an individual interface from the menu to override the global settings for 802.1p priority mapping on a perinterface basis.

802.1p Priority This row contains traffic class selectors for each of the eight 802.1p priorities to be mapped. The priority goes from low (0) to high (3). For example, traffic with a priority of 0 is for most data traffic and is sent using “best effort.” Traffic with a higher priority, such as 3, might be time-sensitive traffic, such as voice or video.

The values in each drop down menu represent the traffic class. The traffic class is the hardware queue for a port. Higher traffic class values indicate a higher queue position. Before traffic in a lower queue is sent, it must wait for traffic in higher queues to be sent.

2.

If you make changes to the page, click Apply to apply the changes to the system.

DSCP to Queue Mapping

Use the DSCP to Queue Mapping page to specify which internal traffic class to map the corresponding DSCP value.

To display the IP DSCP Mapping page: v1.0, July 2009

4-7

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click the QoS



CoS tab, and then click the Advanced



DSCP to Queue Mapping link.

Figure 4-5

Table 4-5. IP DSCP Mapping Configuration Fields

Field Description

DSCP

Queue

Lists the DSCP values to which you can map an internal traffic class.

The values range from 0–63.

The traffic class is the hardware queue for a port. Higher traffic class values indicate a higher queue position. Before traffic in a lower queue is sent, it must wait for traffic in higher queues to be sent. Valid range is

0–3.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you make changes to the page, click Apply to apply the changes to the system.

4-8 v1.0, July 2009

Chapter 5

Managing Device Security

Use the features available from the Security tab to set management security parameters for port, user, and server security.

The Security folder contains links to the following features:

• “Management Security Settings”

• “Configuring Management Access”

• “Port Authentication”

• “Traffic Control”

• “Configuring Access Control Lists”

Management Security Settings

From the Management Security Settings page, you can configure the login password, Remote

Authorization Dial-In User Service (RADIUS) settings, Terminal Access Controller Access

Control System (TACACS+) settings, and authentication lists.

To display the page, click the Security



Management Security tab. The Management Security folder contains links to the following features:

• “Change Password” on page 5-2

• “RADIUS Configuration” on page 5-3

• “Configuring TACACS+” on page 5-10

• “Authentication List Configuration” on page 5-13

5-1 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Change Password

Use the page to change the login password. To display the page:

1.

Click Security



Management Security



User Configuration



Change Password in the navigation tree.

Figure 5-1

Table 5-1. User Accounts Fields

Field Description

Old Password

New Password

Confirm Password

Reset Password

Specify the current password for the account created by the user. The entered password will be displayed in asterisks (*). Passwords are one to 20 alphanumeric characters in length and are case sensitive.

Enter the optional new or changed password for the account. It will not display as it is typed, and only asterisks (*) will show on the screen.

Passwords are one to 20 alphanumeric characters in length and are case sensitive.

Enter the password again, to confirm that you entered it correctly. This field will not display, but will show asterisks (*)

Use this field to reset the password to the default value.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you make changes to the page, click Apply to apply the changes to the system.

5-2

Note: In the case of a lost password, press the Factory default Reset button on the front panel for more than one second to restore the factory default. The reset button will only reboot the device.

Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

RADIUS Configuration

RADIUS servers provide additional security for networks. The RADIUS server maintains a user database, which contains per-user authentication information. RADIUS servers provide a centralized authentication method for:

• Web Access

• Access Control Port (802.1X)

The RADIUS folder contains links to the following features:

• “Global Configuration” on page 5-3

• “Server Configuration” on page 5-5

• “Accounting Server Configuration” on page 5-7

Global Configuration

Use the RADIUS Configuration page to add information about one or more RADIUS servers on the network.

To access the RADIUS Configuration page:

1.

Click Security



Management Security , and then click the RADIUS



Global

Configuration in the navigation tree.

Figure 5-2

Managing Device Security v1.0, July 2009

5-3

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-2. RADIUS Configuration Fields

Field Description

Current Server IP Address Shows the IP address of the current server. This field is blank if no servers are configured. If more than one RADIUS servers are configured, the current server is the server configured as the primary server. If no servers are configured as the primary server, the current server is the most recently added RADIUS server.

Number of Configured

Servers

Max Number of

Retransmits

Timeout Duration (secs)

Accounting Mode

The number of RADIUS servers that have been configured. This value will be in the range of 0–3.

The value of the maximum number of times a request packet is retransmitted. The valid range is 1–15. Consideration to maximum delay time should be given when configuring RADIUS max retransmit and RADIUS timeout. If multiple RADIUS servers are configured, the max retransmit value on each will be exhausted before the next server is attempted. A retransmit will not occur until the configured timeout value on that server has passed without a response from the RADIUS server. Therefore, the maximum delay in receiving a response from the

RADIUS application equals the sum of (retransmit times timeout) for all configured servers. If the RADIUS request was generated by a user login attempt, all user interfaces will be blocked until the RADIUS application returns a response.

The timeout value, in seconds, for request retransmissions. The valid range is 1–30. Consideration to maximum delay time should be given when configuring RADIUS max retransmit and RADIUS timeout. If multiple RADIUS servers are configured, the max retransmit value on each will be exhausted before the next server is attempted. A retransmit will not occur until the configured timeout value on that server has passed without a response from the RADIUS server.

Therefore, the maximum delay in receiving a response from the

RADIUS application equals the sum of (retransmit times timeout) for all configured servers. If the RADIUS request was generated by a user login attempt, all user interfaces will be blocked until the RADIUS application returns a response.

Use the drop down menu to select whether the RADIUS accounting mode is enabled or disabled on the current server.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you make changes to the page, click Apply to apply the changes to the system.

5-4 Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Server Configuration

Use the RADIUS Server Configuration page to view and configure various settings for the current

RADIUS server configured on the system.

To access the RADIUS Server Configuration page:

1.

Click Security



Management Security , and then click the RADIUS



Server

Configuration link.

Figure 5-3

Table 5-3. RADIUS Server Configuration Fields

Field

Server Address

Authentication Port

Secret Configured

Secret

Description

Enter the IP address of the RADIUS server to add.

To modify settings for a RADIUS server that is already configured on the switch, select the check box next to the server address.

Identifies the authentication port the server uses to verify the RADIUS server authentication. The port is a UDP port, and the valid range is 0–

65535.

You can only enter a RADIUS secret if you select Yes from the menu.

After you add the RADIUS server, this field indicates whether the shared secret for this server has been configured.

Shared secret text string used for authenticating and encrypting all

RADIUS communications between the device and the RADIUS server.

This secret must match the RADIUS encryption.

Managing Device Security 5-5 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-3. RADIUS Server Configuration Fields (continued)

Field

Active

Message Authenticator

Description

Sets the selected server to the Primary or Secondary server.

Enable or disable the message authenticator attribute for the selected server.

2.

Click Refresh to update the page with the most current information.

3.

To add a RADIUS server, enter information about the server into the appropriate fields and click Add .

4.

To delete a configured RADIUS server, select the check box next to the server address, and then click Delete .

5.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

6.

If you make changes to the page, click Apply to apply the changes to the system.

Table 5-4. RADIUS Server Statistics Fields

Field Description

Server Address This displays all configured RADIUS servers.

Round Trip Time

Access Requests

The time interval, in hundredths of a second, between the most recent

Access-Reply/Access-Challenge and the Access-Request that matched it from this RADIUS authentication server.

The number of RADIUS Access-Request packets sent to this server.

This number does not include retransmissions.

Access Retransmissions The number of RADIUS Access-Request packets retransmitted to this server.

Access Accepts The number of RADIUS Access-Accept packets, including both valid and invalid packets, that were received from this server.

Access Rejects

Access Challenges

The number of RADIUS Access-Reject packets, including both valid and invalid packets, that were received from this server.

The number of RADIUS Access-Challenge packets, including both valid and invalid packets, that were received from this server.

Malformed Access

Responses

The number of malformed RADIUS Access-Response packets received from this server. Malformed packets include packets with an invalid length. Bad authenticators or signature attributes or unknown types are not included as malformed access-responses.

5-6 Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-4. RADIUS Server Statistics Fields (continued)

Field

Bad Authenticators

Pending Requests

Timeouts

Unknown Types

Packets Dropped

Description

The number of RADIUS Access-Response packets containing invalid authenticators or signature attributes received from this server.

The number of RADIUS Access-Request packets destined for this server that have not yet timed out or received a response.

The number of authentication timeouts to this server.

The number of RADIUS packets of unknown type which were received from this server on the authentication port.

The number of RADIUS packets received from this server on the authentication port and dropped for some other reason.

7.

Click Clear Counters to clear the authentication server and RADIUS statistics to their default values.

8.

Click Refresh to refresh the page with the most current data from the switch.

Accounting Server Configuration

Use the RADIUS Accounting Server Configuration page to view and configure various settings for one or more RADIUS accounting servers on the network.

To access the RADIUS Accounting Server Configuration page:

Managing Device Security v1.0, July 2009

5-7

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Security



Management Security , and then click the RADIUS



Accounting Server

Configuration in the navigation tree.

Figure 5-4

Table 5-5. RADIUS Accounting Server Configuration Fields

Field Description

Accounting Server Address Enter the IP address of the RADIUS accounting server to add.

Port Identifies the authentication port the server uses to verify the RADIUS accounting server authentication. The port is a UDP port, and the valid range is 0–65535.

Secret Configured

Secret

Indicates whether the shared secret for this server has been configured. The Secret field is only available if you select Yes.

Specifies the shared secret to use with the specified accounting server.

This field is only displayed if the user has READWRITE access.

Accounting Mode Use the menu to enable or disable the RADIUS accounting mode.

2.

Click Refresh to update the page with the most current information.

3.

To delete a configured RADIUS Accounting server, click Delete .

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5-8 Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

To add a RADIUS Accounting server:

1.

Enter information about the server into the appropriate fields and click Apply .

Table 5-6. RADIUS Accounting Server Fields

Field Description

Accounting Server Address Displays the IP address of the supported RADIUS accounting server.

Round Trip Time (secs) Displays the time interval, in hundredths of a second, between the most recent Accounting-Response and the Accounting-Request that matched it from this RADIUS accounting server.

Accounting Requests

Accounting

Retransmissions

Accounting Responses

The number of RADIUS Accounting-Request packets sent to this server.

This number does not include retransmissions.

The number of RADIUS Accounting-Request packets retransmitted to this server.

Malformed Accounting

Responses

Displays the number of RADIUS packets received on the accounting port from this server.

Displays the number of malformed RADIUS Accounting-Response packets received from this server. Malformed packets include packets with an invalid length. Bad authenticators and unknown types are not included as malformed accounting responses.

Bad Authenticators

Pending Requests

Displays the number of RADIUS Accounting-Response packets that contained invalid authenticators received from this accounting server.

The number of RADIUS Accounting-Request packets destined for this server that have not yet timed out or received a response.

Timeouts

Unknown Types

Packets Dropped

The number of accounting timeouts to this server.

The number of RADIUS packets of unknown type which were received from this server on the accounting port.

The number of RADIUS packets received from this server on the accounting port and dropped for some other reason.

2.

Click Clear Counters to reset all statistics to their default value.

3.

Click Refresh to update the page with the most current information.

Managing Device Security v1.0, July 2009

5-9

GS716Tv2 and GS724Tv3 Software Administration Manual

Configuring TACACS+

TACACS+ provides a centralized user management system, while still retaining consistency with

RADIUS and other authentication processes. TACACS+ provides the following services:

• Authentication : Provides authentication during login and via user names and user-defined passwords.

• Authorization : Performed at login. When the authentication session is completed, an authorization session starts using the authenticated user name. The TACACS+ server checks the user privileges.

The TACACS+ protocol ensures network security through encrypted protocol exchanges between the device and TACACS+ server.

The TACACS+ folder contains links to the following features:

• “Configuring TACACS+” on page 5-10

• “Server Configuration” on page 5-11

TACACS+ Configuration

The TACACS+ Configuration page contains the TACACS+ settings for communication between the switch and the TACACS+ server you configure via the inband management port.

To display the TACACS+ Configuration page:

1.

Click Security



Management Security , and then click the TACACS+



TACACS+

Configuration link.

5-10

Figure 5-5 v1.0, July 2009

Managing Device Security

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-7. TACACS+ Configuration Fields

Field Description

Key String

Connection Timeout

Specifies the authentication and encryption key for TACACS+ communications between the device and the TACACS+ server. The valid range is 0–128 characters. The key must match the key configured on the TACACS+ server.

The maximum number of seconds allowed to establish a TCP connection between the device and the TACACS+ server. The valid range is 1–30.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you make any changes to the page, click Apply to apply the new settings to the system.

Server Configuration

Use the TACACS+ Server Configuration page to configure up to five TACACS+ servers with which the switch can communicate.

To display the TACACS+ Server Configuration page:

1.

Click Security



Management Security , and then click the TACACS+



Server

Configuration link.

Figure 5-6

Managing Device Security v1.0, July 2009

5-11

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-8. TACACS+ Configuration Fields

Field Description

TACACS+ Server

Server Address

Use the list to select the IP address of the TACACS+ server to view or configure. If fewer than five TACACS+ servers are configured on the system, the Add option is also available. Select Add to configure additional TACACS+ servers.

Enter the IP address of the TACACS+ server to add. This field is only available when Add is selected in the TACACS+ Server IP Address field.

After you add one or more TACACS+ servers, additional fields appear on the TACACS+

Server Configuration page.

Figure 5-7

5-12

Table 5-9. TACACS+ Configuration Fields

Field

TACACS+ Server

Priority

Port

Key String

Connection Timeout

Description

Use the list to select the IP address of the TACACS+ server to view or configure. If fewer than five RADIUS servers are configured on the system, the Add option is also available. Select Add to configure additional RADIUS servers.

Specifies the order in which the TACACS+ servers are used. The valid range 0–65535.

The authentication port number through which the TACACS+ session occurs. The default is port 49, and the range is 0–65535.

Defines the authentication and encryption key for TACACS+ communications between the device and the TACACS+ server. This key must match the encryption used on the TACACS+ server. The valid range is 0–128 characters.

The amount of time that passes before the connection between the device and the TACACS+ server times out. The field range is from 1 to

30 seconds.

Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

2.

If you make changes to the page, or add a new entry, click Apply to apply the changes to the system.

3.

To delete a configured TACACS+ server, select the IP address of the server from the

TACACS+ Server IP Address drop down menu, and then click Delete .

Authentication List Configuration

Use the Authentication List page to configure the default login list. A login list specifies one or more authentication methods to validate switch or port access for the admin user.

Note: Admin is the only user on the system and is assigned to a preconfigured list named defaultList, which you cannot delete.

To access the Authentication List page:

1.

Click Security



Management Security , and then click the Authentication List link.

Figure 5-8

Managing Device Security v1.0, July 2009

5-13

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-10. Authentication Profile Fields

Field Description

List Name

1

2

3

The switch supports a single list named defaultList. You can change the authentication methods for this list, but you cannot change the list name.

To change the authentication method for the defaultList, select the check box next to the defaultList name and use the drop down menus.

Use the drop down menu to select the authentication method that should appear first in the selected authentication login list. If you select a method that does not time out as the first method, such as ‘local’, no other method will be tried, even if you have specified more than one method. This parameter will not appear when you first create a new login list. User authentication occurs in the order the methods are selected. Possible methods are as follows:

• Local : The user's locally stored ID and password will be used for authentication. Since the local method does not time out, if you select this option as the first method, no other method will be tried, even if you have specified more than one method.

• RADIUS : The user's ID and password will be authenticated using the

RADIUS server. If you select RADIUS or TACACS+ as the first method and an error occurs during the authentication, the switch uses

Method 2 to authenticate the user.

• TACACS+ : The user's ID and password will be authenticated using the TACACS+ server. If you select RADIUS or TACACS+ as the first method and an error occurs during the authentication, the switch attempts user authentication Method 2.

• None : The authentication method is unspecified. This option is only available for Method 2 and Method 3.

Use the menu to select the authentication method, if any, that should appear second in the selected authentication login list. This is the method that will be used if the first method times out. If you select a method that does not time out as the second method, the third method will not be tried. This parameter will not appear when you first create a new login list.

Use the menu to select the authentication method, if any, that should appear third in the selected authentication login list. This parameter will not appear when you first create a new login list.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you make changes to the page, click Apply to apply the changes to the system.

5-14 Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Configuring Management Access

From the Access page, you can configure HTTP and Secure HTTP access to the GS716T and

GS724T. You can also configure Access Control Profiles and Access Rules.

The Security



Access tab contains the following folders:

• “HTTP Configuration” on page 5-15

• “Secure HTTP Configuration” on page 5-16

• “Certificate Download” on page 5-18

• “Access Profile Configuration” on page 5-19

• “Access Rule Configuration” on page 5-21

HTTP Configuration

Use the HTTP Configuration page to configure the HTTP server settings on the system.

To access the HTTP Configuration page:

1.

Click the Security tab, then click Access , and then click the HTTP



HTTP Configuration link.

Figure 5-9

Managing Device Security v1.0, July 2009

5-15

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-11. HTTP Configuration Fields

Field Description

Java Mode This select field is used to Enable or Disable the Web Java Mode. This applies to both secure and un-secure HTTP connections. The currently configured value is shown when the Web page is displayed. The default value is Enable.

HTTP Session Soft Timeout This field is used to set the inactivity timeout for HTTP sessions. The value must be in the range of (0–60) minutes. A value of zero corresponds to an infinite timeout. The default value is 5 minutes. The currently configured value is shown when the Web page is displayed.

HTTP Session Hard

Timeout

This field is used to set the hard timeout for HTTP sessions. This timeout is unaffected by the activity level of the session. The value must be in the range of (0–168) hours. A value of zero corresponds to an infinite timeout. The default value is 24 hours. The currently configured value is shown when the Web page is displayed.

Maximum Number of HTTP

Sessions

This field is used to set the maximum allowable number of HTTP sessions. The value must be in the range of (0–16). The default value is

16. The currently configured value is shown when the Web page is displayed.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you make changes to the page, click Apply to apply the changes to the system.

Secure HTTP Configuration

Secure HTTP enables the transmission of HTTP over an encrypted Secure Sockets Layer (SSL) or

Transport Layer Security (TLS) connection. When you manage the switch by using a Web interface, secure HTTP can help ensure that communication between the management system and the switch is protected from eavesdroppers and man-in-the-middle attacks.

Use the Secure HTTP Configuration page to configure the settings for HTTPS communication between the management station and the switch.

To display the Secure HTTP Configuration page:

1.

Click Security



Access , and then click the HTTPS



HTTPS Configuration link.

5-16 Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 5-10

Table 5-12. Secure HTTP Configuration Fields

Field

HTTPS Admin Mode

SSL Version 3

TLS Version 1

HTTPS Port

HTTPS Session Soft

Timeout

Description

Enables or Disables the Administrative Mode of Secure HTTP. The currently configured value is shown when the Web page is displayed.

The default value is Disable. You can only download SSL certificates when the HTTPS Admin mode is disabled.

Enables or Disables Secure Sockets Layer Version 3.0. The currently configured value is shown when the Web page is displayed. The default value is Enable.

Enables or Disables Transport Layer Security Version 1.0. The currently configured value is shown when the Web page is displayed. The default value is Enable.

Sets the HTTPS Port Number. The value must be in the range of 1–

65535. Port 443 is the default value. The currently configured value is shown when the Web page is displayed.

Sets the inactivity timeout for HTTPS sessions. The value must be in the range of (1–60) minutes. The default value is 5 minutes. The currently configured value is shown when the Web page is displayed.

Managing Device Security v1.0, July 2009

5-17

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-12. Secure HTTP Configuration Fields (continued)

Field

HTTPS Session Hard

Timeout

Maximum Number of

HTTPS Sessions

Description

Sets the hard timeout for HTTPS sessions. This timeout is unaffected by the activity level of the session. The value must be in the range of (1–

168) hours. The default value is 24 hours. The currently configured value is shown when the Web page is displayed.

Sets the maximum allowable number of HTTPS sessions. The value must be in the range of (0–4). The default value is 4. The currently configured value is shown when the Web page is displayed.

Certificate Download

For the Web server on the switch to accept HTTPS connections from a management station, the

Web server needs a public key certificate. You can generate a certificate externally (i.e., off-line) and download it to the switch.

To display the Certificate Download page, click Security



Access , and then click the HTTPS



Certificate Download link.

Downloading SSL Certificates. Before you download a file to the switch, the following conditions must be true:

• The file to download from the TFTP server is on the server in the appropriate directory.

• The file is in the correct format.

• The switch has a path to the TFTP server.

5-18

Figure 5-11 v1.0, July 2009

Managing Device Security

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-13. Certificate Download Fields

Field Description

File Type

TFTP Server IP

Remote File Name

Select the type of SSL certificate to download, which can be one of the following:

• SSL Trusted Root Certificate PEM File : SSL Trusted Root

Certificate File (PEM Encoded).

• SSL Server Certificate PEM File : SSL Server Certificate File (PEM

Encoded).

• SSL DH Weak Encryption Parameter PEM File : SSL Diffie-Hellman

Weak Encryption Parameter File (PEM Encoded).

• SSL DH Strong Encryption Parameter PEM File : SSL Diffie-

Hellman Strong Encryption Parameter File (PEM Encoded).

Enter the IP address of the TFTP server in the form of an IP address in x.x.x.x format. The factory default is 0.0.0.0. Make sure that the software image or other file to be downloaded is available on the TFTP server.

Enter the name of the file to download. You may enter up to 32 characters. The factory default is blank.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

If you change any of the settings on the page, click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

Access Profile Configuration

Use the Access Profile Configuration page to configure settings that control management access to the switch.

To access the Access Profile Configuration page:

Managing Device Security v1.0, July 2009

5-19

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Security



Access , and then click the Access Control



Access Profile Configuration link.

5-20

Figure 5-12

Table 5-14. Access Profile Configuration Fields

Field Description

Access Profile Name

Activate Profile

DeActivate Profile

Remove Profile

Enter the name of the access profile to be added. Maximum length is 32 characters.

Select the check box to activate an access profile.

Select the check box to deactivate an access profile

Select the check box to remove an access profile. The access profile should be deactivated before removing the access profile.

Table 5-15 shows the Profile Summary fields.

Table 5-15. Profile Summary Fields

Field

Rule Type

Service Type

Description

Identifies the action the rule takes, which is either Permit or Deny.

Shows the type of service to allow or prohibit from accessing the switch management interface:

• SNMP

• HTTP

• HTTPS

Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-15. Profile Summary Fields (continued)

Field

Source IP Address

Mask

Priority

Description

Shows the IP Address of the client that may or may not originate management traffic.

Shows the subnet mask associated with the IP address.

Shows the priority of the rule. The rules are validated against the incoming management request in the ascending order of their priorities.

If a rule matches, action is performed and subsequent rules below are ignored.

2.

Click Refresh to update the page with the most current information.

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

4.

If you change any of the settings on the page, click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

Access Rule Configuration

Use the Access Rule Configuration page to configure the rules about what systems can access the

GS716T and GS724T Web interface and what protocols are allowed.

To access the Access Rule Configuration page:

1.

Click Security



Access , and then click the Access Control



Access Rule Configuration link.

Figure 5-13

Managing Device Security v1.0, July 2009

5-21

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-16. Access Rule Configuration Fields

Field Description

Rule Type

Service Type

Source IP Address

Mask

Priority

Select Permit to allow access to the switch administrative pages for traffic that meets the criteria you configure for the rule. Any traffic that does not meet the rules is denied.

Select Deny to prohibit access to the switch administrative pages for traffic that meets the criteria you configure for the rule. Any traffic that does not meet the rules is allowed access to the switch.

Select the type of service to allow or prohibit from accessing the switch management interface:

• SNMP

• HTTP

• HTTPS

Enter Source IP Address of the client originating the management traffic. Enter the address in the Source IP address text box.

Enter the subnet mask associated with the IP address.

Configure priority to the rule. The rules are validated against the incoming management request in the ascending order of their priorities.

If a rule matches, action is performed and subsequent rules below are ignored. For example, if a Source IP 10.10.10.10 is configured with priority 1 to permit, and Source IP 10.10.10.10 is configured with priority 2 to Deny, then access is permitted if the profile is active, and the second rule is ignored.

2.

To add an Access Rule, enter information into the appropriate fields and click Add .

3.

To delete an Access Rule, select the check box next to the Rule Type, and then click Delete .

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

If you make changes to the page, click Apply to apply the changes to the system.

Port Authentication

In port-based authentication mode, when 802.1X is enabled globally and on the port, successful authentication of any one supplicant attached to the port results in all users being able to use the port without restrictions. At any given time, only one supplicant is allowed to attempt authentication on a port in this mode. Ports in this mode are under bidirectional control. This is the default authentication mode.

5-22 Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

The 802.1X network has three components:

• Authenticators : Specifies the port that is authenticated before permitting system access.

• Supplicants : Specifies the host connected to the authenticated port requesting access to the system services.

• Authentication Server : Specifies the external server, for example, the RADIUS server that performs the authentication on behalf of the authenticator, and indicates whether the user is authorized to access system services.

The Port Authentication folder contains links to the following features:

• Basic:

• “802.1X Configuration” on page 5-23

• Advanced:

• “Port Authentication” on page 5-24

• “Port Summary” on page 5-28

802.1X Configuration

Use the 802.1X Configuration page to enable or disable port access control on the system.

To display the 802.1X Configuration page:

1.

Click Security



Port Authentication , then click Basic



802.1X Configuration in the navigation tree.

Figure 5-14

Managing Device Security v1.0, July 2009

5-23

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-17. Port Access Control—Port Configuration Fields

Field Description

Port Based Authentication

State

Guest VLAN

Select Enable or Disable 802.1X administrative mode on the switch.

The default is Disable . This feature permits port-based authentication on the switch.

Select to Enable or Disable Guest VLAN Supplicant Mode. If enabled, when no 802.1X supplicant is authenticated on a port, the port still provide limited network access, as determined by a guest VLAN configured on authentication server. The default is Disable .

2.

Click Refresh to refresh the page with the most current data from the switch.

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

4.

If you change the mode, click Apply to apply the new settings to the system.

Port Authentication

Use the Port Authentication page to enable and configure port access control on one or more ports.

To access the Port Authentication page:

1.

Click Security



Port Authentication , and then click the Advanced



Port Authentication link.

Note: Use the horizontal scroll bar at the bottom of the browser to view all the fields on the Port Authentication page. Figure 5-15 and Figure 5-16 are both images of the Port Authentication page.

5-24 v1.0, July 2009

Managing Device Security

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 5-15

Figure 5-16

Managing Device Security v1.0, July 2009

5-25

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-18. Port Authentication Port Configuration Fields

Field Description

Port

Port Control

Guest VLAN ID

Guest VLAN Period

Selects the Port to configure.

Defines the port authorization state. The control mode is only set if the link status of the port is link up. The possible field values are:

• Auto : Automatically detects the mode of the interface.

• Authorized : Places the interface into an authorized state without being authenticated. The interface sends and receives normal traffic without client port-based authentication.

• Unauthorized : Denies the selected interface system access by moving the interface into unauthorized state. The switch cannot provide authentication services to the client through the interface.

This field allows the user to configure the Guest VLAN ID on the interface. The valid range is 0–4093.The default value is 0. Enter 0 to reset the Guest VLAN ID on the interface.

This input field allows the user to enter the Guest VLAN period for the selected port. The Guest VLAN period is the value, in seconds, of the timer used by the Guest VLAN Authentication. The Guest VLAN timeout must be a value in the range of 1–300. The default value is 90.

Periodic Reauthentication Use this field to enable or disable reauthentication of the supplicant for the specified port. Selectable values are Enable and Disable . If the value is Enable , reauthentication will occur. Otherwise, reauthentication will not be allowed. The default value is Disable .

Changing the selection will not change the configuration until the Apply button is pressed.

Reauthentication Period

(secs)

Quiet Period (secs)

Indicates the time span in which the selected port is reauthenticated.

The field value is in seconds. The range is 1–65535, and the field default is 3600 seconds.

Defines the amount of time that the switch remains in the quiet state following a failed authentication exchange. The possible field range is

0–65535. The field value is in seconds. The field default is 60 seconds.

Resending EAP This input field allows you to configure the transmit period for the selected port. The transmit period is the value, in seconds, of the timer used by the authenticator state machine on the specified port to determine when to send an EAPOL EAP Request/Identify frame to the supplicant. The transmit period must be a number in the range of 1–

65535. The default value is 30. Changing the value will not change the configuration until you click the Apply button.

5-26 Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-18. Port Authentication Port Configuration Fields (continued)

Field Description

Max EAP Requests

Supplicant Timeout (secs) Defines the amount of time that lapses before EAP requests are resent to the user. The field value is in seconds. The field default is 30 seconds.

Server Timeout (secs) Defines the amount of time that lapses before the switch resends a request to the authentication server. The field value is in seconds. The range is 1–65535, and the field default is 30 seconds.

Control Direction

This input field allows you to enter the maximum requests for the selected port. The maximum requests value is the maximum number of times the authenticator state machine on this port will retransmit an

EAPOL EAP Request/Identity before timing out the supplicant. The maximum requests value must be in the range of 1–10. The default value is 2. Changing the value will not change the configuration until you click the Apply button.

This displays the control direction for the specified port. The control direction dictates the degree to which protocol exchanges take place between Supplicant and Authenticator. This affects whether the unauthorized controlled port exerts control over communication in both directions (disabling both incoming and outgoing frames) or just in the incoming direction (disabling only the reception of incoming frames).

This field is not configurable on some platforms.

Protocol Version

PAE Capabilities

Authenticator PAE State

This field displays the protocol version associated with the selected port. The only possible value is 1, corresponding to the first version of the 802.1X specification. This field is not configurable.

This field displays the port access entity (PAE) functionality of the selected port. Possible values are Authenticator or Supplicant . This field is not configurable.

This field displays the current state of the authenticator PAE state machine. Possible values are as follows:

• Initialize

• Disconnected

• Connecting

• Authenticating

• Authenticated

• Aborting

• Held

• ForceAuthorized

• ForceUnauthorized

Managing Device Security 5-27 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-18. Port Authentication Port Configuration Fields (continued)

Field

Backend State

EAPOL Flood Mode

Description

This field displays the current state of the backend authentication state machine. Possible values are as follows:

• Request

• Response

• Success

• Fail

• Timeout

• Initialize

• Idle

This field is used to Enable or Disable the EAPOL Flood mode per

Interface.The default value is Disable .

2.

Click Initialize to begin the initialization sequence on the selected port. This button is only selectable if the control mode is 'auto'. If the button is not selectable, it will be grayed out.

Once this button is pressed, the action is immediate. It is not required to click Apply for the action to occur.

3.

Click Reauthenticate to begin the reauthentication sequence on the selected port. This button is only selectable if the control mode is 'auto'. If the button is not selectable, it will be grayed out. Once this button is pressed, the action is immediate. It is not required to click Apply for the action to occur.

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

Click Apply to send the updated screen to the switch and cause the changes to take effect on the switch but these changes will not be retained across a power cycle unless a save is performed.

Port Summary

Use the Port Summary page to view information about the port access control settings on a specific port.

To access the Port Summary page:

5-28 v1.0, July 2009

Managing Device Security

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Security



Port Authentication



Advanced



Port Summary in the navigation menu.

Figure 5-17

Table 5-19. Port Summary Fields

Field

Port

Control Mode

Operating Control Mode

Description

The port whose settings are displayed in the current table row.

Defines the port authorization state. The control mode is only set if the link status of the port is link up. The possible field values are:

• Auto : Automatically detects the mode of the interface.

• Force Authorized : Places the interface into an authorized state without being authenticated. The interface sends and receives normal traffic without client port-based authentication.

• Force Unauthorized : Denies the selected interface system access by moving the interface into unauthorized state. The switch cannot provide authentication services to the client through the interface.

This field indicates the control mode under which the port is actually operating. Possible values are:

• ForceUnauthorized

• ForceAuthorized

• Auto

• N/A: If the port is in detached state it cannot participate in port access control.

Managing Device Security 5-29 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-19. Port Summary Fields (continued)

Field Description

Reauthentication Enabled Displays if reauthentication is enabled on the selected port. This is a configurable field. The possible values are 'true' and 'false'. If the value is 'true' reauthentication will occur. Otherwise, reauthentication will not be allowed.

Port Status This field shows the authorization status of the specified port. The possible values are 'Authorized', 'Unauthorized' and 'N/A'. If the port is in detached state, the value will be 'N/A' since the port cannot participate in port access control.

2.

Click Refresh to update the information on the screen.

Traffic Control

From the Traffic Control page, you can configure MAC Filters, Storm Control, Port Security, and

Protected Port settings. To display the page, click the Security



Traffic Control tab.

The Traffic Control folder contains links to the following features:

• MAC Filter:

• “MAC Filter Configuration” on page 5-30

• “MAC Filter Summary” on page 5-32

• “Storm Control” on page 5-33

• Port Security:

• “Port Security Configuration” on page 5-34

• “Port Security Interface Configuration” on page 5-35

• “Security MAC Address” on page 5-37

• “Protected Ports Membership” on page 5-38

MAC Filter Configuration

Use the MAC Filter Configuration page to create MAC filters that limit the traffic allowed into and out of specified ports on the system.

To display the MAC Filter Configuration page:

5-30 Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Security



Traffic Control , and then click the MAC Filter



MAC Filter

Configuration link.

Figure 5-18

Table 5-20. Switch Configuration Fields

Field

MAC Filter

VLAN ID

MAC Address

Source Port

Members

Destination Port

Members

Description

This is the list of MAC address and VLAN ID pairings for all configured filters. To change the port mask(s) for an existing filter, select the entry you want to change. To add a new filter, select “Create Filter” from the top of the list

The VLAN ID used with the MAC address to fully identify packets you want filtered. You can only change this field when you have selected the “Create

Filter” option.

The MAC address of the filter in the format 00:01:1A:B2:53:4D. You can only change this field when you have selected the “Create Filter” option.

You cannot define filters for these MAC addresses:

• 00:00:00:00:00:00

• 01:80:C2:00:00:00 to 01:80:C2:00:00:0F

• 01:80:C2:00:00:20 to 01:80:C2:00:00:21

• FF:FF:FF:FF:FF:FF

Click the orange bar to display the available ports. Select the ports you want included in the inbound filter. If a packet with the MAC address and VLAN ID you selected is received on a port that is not in the list, it will be dropped.

Click the orange bar to display the available ports. Select the ports you want included in the outbound filter. Packets with the MAC address and VLAN ID you selected will only be transmitted out of ports that are in the list. Destination ports can be included only in the Multicast filter.

Managing Device Security 5-31 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

2.

To delete a configured MAC Filter, select it from the menu, and then click Delete .

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

4.

If you make changes to the page, click Apply to apply the changes to the system.

MAC Filter Summary

Use the MAC Filter Summary page to view the MAC filters that are configured on the system.

To display the MAC Filter Summary page:

1.

Click Security



Traffic Control , and then click the MAC Filter



MAC Filter Summary link.

Figure 5-19

Table 5-21. Switch Configuration Fields

Field Description

MAC Address

VLAN ID

Identifies the MAC address that is filtered.

The VLAN ID used with the MAC address to fully identify packets you want filtered. You can only change this field when you have selected the “Create

Filter” option.

Shows the ports included in the inbound filter.

Source Port

Members

Destination Port

Members

Shows the ports included in the outbound filter.

2.

Click Refresh to update the page with the most current information.

5-32 Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Storm Control

A broadcast storm is the result of an excessive number of broadcast messages simultaneously transmitted across a network by a single port. Forwarded message responses can overload network resources and/or cause the network to time out.

The switch measures the incoming broadcast/multicast/unknown unicast packet rate per port and discards packets when the rate exceeds the defined value. Storm control is enabled per interface, by defining the packet type and the rate at which the packets are transmitted.

To display the Storm Control page:

1.

Click Security



Traffic Control , and then click the Storm Control link.

Figure 5-20

Managing Device Security v1.0, July 2009

5-33

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-22. Storm Control Fields

Field

Ingress Control

Mode

Threshold

Description

Select the mode of broadcast affected by storm control.

• Disable — Do not use storm control.

• Unknown Unicast — If the rate of unknown L2 unicast (destination lookup failure) traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped.

• Multicast — If the rate of L2 multicast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped.

• Broadcast — If the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped.

Specifies the maximum rate at which unknown packets are forwarded. The range is a percent of the total threshold. The range is a percent of the total threshold between 0–100%. The default is 5%.

Table 5-23. Port Settings Fields

Field Description

Port

Status

Threshold

Select the check box next to the port to change the Storm Control administrative status.

Shows whether the interfaces is enabled for storm control. If the port check box is selected, you can enable or disable storm control for the port.

Used to set the threshold for either Broadcast, Multicast, or Unknown Unicast traffic. The range is between 0–100%

2.

To go to an interface in the list, type the interface number in the Go To Interface field and click Go .

3.

If you make changes to the page, click Apply to apply the changes to the system.

Port Security Configuration

Use the Port Security feature to lock one or more ports on the system. When a port is locked, only packets with allowable source MAC addresses can be forwarded. All other packets are discarded.

To display the Port Security Configuration page:

1.

Click Security



Traffic Control , and then click the Port Security



Port Security

Configuration link.

5-34 Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 5-21

Table 5-24. Port Security Configuration Fields

Field Description

Port Security Mode Enable or Disable the port security feature.

Table 5-25. Port Security Violation Fields

Field Description

Port Identifies the port where a violation occurred.

Last Violation MAC Displays the source MAC address of the last packet that was discarded at a locked port.

VLAN ID Displays the VLAN ID corresponding to the Last Violation MAC address.

2.

Click Refresh to refresh the page with the most current data from the switch.

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

4.

If you make changes to the page, click Apply to apply the changes to the system.

Port Security Interface Configuration

A MAC address can be defined as allowable by one of two methods: dynamically or statically.

Both methods are used concurrently when a port is locked.

Managing Device Security 5-35 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Dynamic locking implements a ‘first arrival’ mechanism for Port Security. You specify how many addresses can be learned on the locked port. If the limit has not been reached, then a packet with an unknown source MAC address is learned and forwarded normally. When the limit is reached, no more addresses are learned on the port. Any packets with source MAC addresses that were not already learned are discarded. You can effectively disable dynamic locking by setting the number of allowable dynamic entries to zero.

Static locking allows you to specify a list of MAC addresses that are allowed on a port. The behavior of packets is the same as for dynamic locking: only packets with an allowable source

MAC address can be forwarded.

To display the Port Security Interface Configuration page:

1.

Click Security



Traffic Control , and then click the Port Security



Interface

Configuration link.

Figure 5-22

5-36

Table 5-26. Port Security Configuration Fields

Field

Port

Port Security

Description

Identifies the port. To change the port security settings for the port, select the associated check box.

Enable or Disable the port security feature for the selected port.

Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-26. Port Security Configuration Fields (continued)

Field

Max Allowed

Dynamically

Learned MAC

Max Allowed

Statically Locked

MAC

Enable Violation

Traps

Description

Sets the maximum number of dynamically learned MAC addresses on the selected interface. Valid range is 0–600.

Sets the maximum number of statically locked MAC addresses on the selected interface. Valid range is 0–20.

Enables or disables the sending of new violation traps designating when a packet with a disallowed MAC address is received on a locked port.

2.

To display the list of Ports, click PORTS .

3.

To display the list of LAGs, click LAGS .

4.

To display a list of both Ports and LAGs, click ALL .

5.

To go to an interface in the list, type the interface number in the Go To Interface field and click Go .

6.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

7.

If you make changes to the page, click Apply to apply the changes to the system.

Security MAC Address

Use the Security MAC Address page to convert a dynamically learned MAC address to a statically locked address.

To display the Security MAC Address page:

1.

Click Security



Traffic Control , and then click the Port Security



Security MAC Address link.

Managing Device Security v1.0, July 2009

5-37

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 5-23

Table 5-27. Port Security Settings Fields

Field

Convert Dynamic

Address to Static

Description

Select the check box to convert a dynamically learned MAC address to a statically locked address. The Dynamic MAC Address entries are converted to

Static MAC address entries in a numerically ascending order until the Static limit is reached.

Table 5-28. Dynamic MAC Address Table Fields

Field Description

Port List

VLAN ID

MAC Address

Select the physical interface for which you want to display data.

Displays the VLAN ID corresponding to the Last Violation MAC address.

Displays the MAC addresses learned on a specific port.

2.

Click Refresh to refresh the page with the most current data from the switch.

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

4.

If you make changes to the page, click Apply to apply the changes to the system.

Protected Ports Membership

Use the Protected Ports Membership page to configure the ports as protected or unprotected. You need read-write access privileges to modify the configuration.

5-38 Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

To display the Protected Ports Membership page:

1.

Click the Security



Traffic Control



Protected Ports link.

Figure 5-24

Table 5-29. Protected Ports Membership Fields

Field Description

Protected Port(s) The selection list consists of physical ports, protected as well as unprotected.

The protected ports are highlighted to differentiate between them. No traffic forwarding is possible between two protected ports. If left unconfigured, the default state is Unprotected .

2.

Click Refresh to refresh the page with the most current data from the switch.

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

4.

If you make changes to the page, click Apply to apply the changes to the system.

Configuration changes take effect immediately.

Configuring Access Control Lists

Access Control Lists (ACLs) ensure that only authorized users have access to specific resources while blocking off any unwarranted attempts to reach network resources. ACLs are used to provide traffic flow control, restrict contents of routing updates, decide which types of traffic are forwarded or blocked, and above all provide security for the network. GS716T/GS724T software supports IPv4 and MAC ACLs.

Managing Device Security 5-39 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

You first create an IPv4-based or MAC-based ACL ID. Then, you create a rule and assign it to a unique ACL ID. Next, you define the rules, which can identify protocols, source, and destination

IP and MAC addresses, and other packet-matching criteria. Finally, use the ID number to assign the ACL to a port or to a VLAN interface.

The Security



ACL folder contains links to the following features:

• Basic:

• “MAC ACL” on page 5-40

• “MAC Rules” on page 5-42

• “MAC Binding Configuration” on page 5-44

• “MAC Binding Table” on page 5-45

• Advanced:

• “IP ACL” on page 5-47

• “IP Rules” on page 5-48

• “IP Extended Rule” on page 5-50

• “IP Binding Configuration” on page 5-54

• “IP Binding Table” on page 5-56

MAC ACL

A MAC ACL consists of a set of rules which are matched sequentially against a packet. When a packet meets the match criteria of a rule, the specified rule action (Permit/Deny) is taken and the additional rules are not checked for a match.

There are multiple steps involved in defining an ACL and applying it to the switch. First, you use the “MAC ACL” page to create the ACL ID. Then, you use the “MAC Rules” page to create rules for the ACL. Finally, use the “MAC Binding Configuration” page to assign the ACL by its ID number to a port. You can use the “MAC Binding Table” page to view the configurations.

5-40 v1.0, July 2009

Managing Device Security

GS716Tv2 and GS724Tv3 Software Administration Manual

To display the MAC ACL page:

1.

Click Security



ACL . The MAC ACL page is under the Basic link.

Figure 5-25

The MAC ACL table shows the number of ACLs currently configured in the switch and the maximum number of ACLs that can be configured. The current size is equal to the number of configured IPv4 ACLs plus the number of configured MAC ACLs.

Table 5-30. MAC ACL Table Fields

Field

Name

Rules

Direction

Description

Enter a name for the MAC ACL.. The name string may include alphabetic, numeric, dash, underscore, or space characters only. The name must start with an alphabetic character.

Shows the number of rules currently configured for the MAC ACL.

Shows the direction of packet traffic affected by the MAC ACL, which can be Inbound or blank.

2.

To add a MAC ACL, enter information into the appropriate fields and click Add .

3.

To delete a MAC ACL, select the check box next to the Name field, then click Delete .

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

If you make changes to the page, click Apply to apply the changes to the system.

Managing Device Security 5-41 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

MAC Rules

Use the MAC Rules page to define rules for MAC-based ACLs. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. A default 'deny all' rule is the last rule of every list.

To display the MAC Rules page:

1.

Click Security



ACL , then click the Basic



MAC Rules link.

5-42

Figure 5-26

Table 5-31. MAC ACL Rule Configuration Fields

Field

ACL Name

ID (1 to 10)

Action

Description

Specifies an existing MAC ACL. To set up a new MAC ACL use the

“MAC ACL” page.

Enter a rule ID.

Specify what action should be taken if a packet matches the rule's criteria:

• Permit: Forwards packets that meet the ACL criteria.

• Deny: Drops packets that meet the ACL criteria.

Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-31. MAC ACL Rule Configuration Fields (continued)

Field

Assign Queue

Match Every

CoS

Destination MAC

Destination MAC Mask

EtherType Key

EtherType User Value

Source MAC

Source MAC Mask

VLAN

Description

Specifies the hardware egress queue identifier used to handle all packets matching this ACL rule. Enter an identifying number from 0–3 in this field.

Requires a packet to match the criteria of this ACL. Select True or False from the drop down menu. Match Every is exclusive to the other filtering rules, so if Match Every is True, the other rules on the screen are not available.

Requires a packet’s class of service (CoS) to match the CoS value listed here. Enter a CoS value between 0–7 to apply this criteria.

Requires an Ethernet frame’s destination port MAC address to match the address listed here. Enter a MAC address in this field. The valid format is xx:xx:xx:xx:xx:xx.

If desired, enter the MAC Mask associated with the Destination MAC to match. The MAC address mask specifies which bits in the destination

MAC to compare against an Ethernet frame. Use F’s and zeros in the

MAC mask, which is in a wildcard format. An F means that the bit is not checked, and a zero in a bit position means that the data must equal the value given for that bit. For example, if the MAC address is aa:bb:cc:dd:ee:ff, and the mask is 00:00:ff:ff:ff:ff, all MAC addresses with aa:bb:xx:xx:xx:xx result in a match (where x is any hexadecimal number).

Requires a packet’s EtherType to match the EtherType you select.

Select the EtherType value from the drop down menu. If you select User

Value, you can enter a custom EtherType value.

This field is configurable if you select User Value from the EtherType drop down menu. The value you enter specifies a customized Ethertype to compare against an Ethernet frame. The valid range of values is

0x0600–0xFFFF.

Requires a packet’s source port MAC address to match the address listed here. Enter a MAC address in the this field. The valid format is xx:xx:xx:xx:xx:xx.

If desired, enter the MAC mask for the source MAC address to match.

Use Fs and zeros in the MAC mask, which is in a wildcard format. An F means that the bit is not checked, and a zero in a bit position means that the data must equal the value given for that bit. The valid format is xx:xx:xx:xx:xx:xx.

Requires a packet’s VLAN ID to match the ID listed here. Enter the

VLAN ID to apply this criteria. The valid range is 0–4093.

2.

To add a rule, complete the desired fields and click Add .

Managing Device Security 5-43 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

3.

To delete a rule, select the check box associated with the rule and click Delete .

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

To change a rule, select the check box associated with the rule, change the desired fields and click Apply .

MAC Binding Configuration

When an ACL is bound to an interface, all the rules that have been defined are applied to the selected interface. Use the MAC Binding Configuration page to assign MAC ACL lists to ACL

Priorities and Interfaces.

To display the MAC Binding Configuration page:

1.

Click Security



ACL , then click the Basic



MAC Binding Configuration link.

5-44

Figure 5-27 v1.0, July 2009

Managing Device Security

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-32. MAC ACL Rule Configuration Fields

Field Description

ACL ID

Direction

Sequence Number

Port Selection Table

Select an existing MAC ACL.

Specifies the packet filtering direction for ACL. The only valid direction is Inbound, which means the MAC ACL rules are applied to traffic entering the port.

An optional sequence number may be specified to indicate the order of this access list relative to other access lists already assigned to this interface and direction. A low number indicates high precedence order.

If a sequence number is already in use for this interface and direction, the specified access list replaces the currently attached access list using that sequence number. If the sequence number is not specified by the user, a sequence number that is one greater than the highest sequence number currently in use for this interface and direction will be used. Valid range is 1–4294967295.

Specifies list of all available valid interfaces for ACL binding. All nonrouting physical interfaces and interfaces participating in LAGs are listed.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

Click Apply to save any changes to the running configuration.

MAC Binding Table

Use the MAC Binding Table page to view or delete the MAC ACL bindings.

To display the MAC Binding Table:

Managing Device Security v1.0, July 2009

5-45

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Security



ACL , then click the Basic



Binding Table link.

Figure 5-28

Table 5-33. MAC ACL Rule Configuration Fields

Field Description

Interface

Direction

ACL Type

ACL ID

Sequence No

Shows the interface to which the MAC ACL is bound.

Specifies the packet filtering direction for ACL. The only valid direction is Inbound, which means the MAC ACL rules are applied to traffic entering the port.

Displays the type of ACL assigned to selected interface and direction.

Displays the ACL Name identifying the ACL assigned to selected interface and direction.

Displays the Sequence Number signifying the order of specified ACL relative to other ACLs assigned to selected interface and direction.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

To delete the binding, select the check box next to the interface and click Delete .

5-46 v1.0, July 2009

Managing Device Security

GS716Tv2 and GS724Tv3 Software Administration Manual

IP ACL

IP ACLs allow network managers to define classification actions and rules for specific ingress ports. Packets can be filtered on ingress (inbound) ports only. If the filter rules match, then some actions can be taken, including dropping the packet or disabling the port. For example, a network administrator defines an ACL rule that says port number 20 can receive TCP packets. However, if a UDP packet is received the packet is dropped.

ACLs are composed of access control entries (ACE), or rules, that consist of the filters that determine traffic classifications.

Use the IP ACL Configuration page to add or remove IP-based ACLs.

To display the IP ACL page:

1.

Click Security



ACL , then click the Advanced



IP ACL link.

Figure 5-29

Table 5-29 shows the current size of the ACL table versus the maximum size of the ACL table. The current size is equal to the number of configured IPv4 plus the number of configured MAC ACLs. The maximum size is 100.

Managing Device Security v1.0, July 2009

5-47

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-34. IP ACL Configuration Fields

Field Description

IP ACL

Rules

Type

Enter an ACL ID. The ID is an integer in the following range:

• 1–99: Creates an IP Standard ACL, which allows you to permit or deny traffic from a source IP address.

• 100–199: Creates an IP Extended ACL, which allows you to permit or deny specific types of layer 3 or layer 4 traffic from a source IP address to a destination IP address. This type of ACL provides more granularity and filtering capabilities than the standard IP ACL.

Shows the number of rules currently configured for the IP ACL.

Identifies the ACL as either a standard or extended IP ACL.

2.

To add an IP ACL, enter an ACL ID in the appropriate field, and then click Add .

3.

To delete an IP ACL, select the check box associated withe ACL ID, and then click Delete .

The Delete button only appears if a configured IP ACL is selected.

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

IP Rules

Use the IP Rules page to define rules for IP-based standard ACLs. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded.

Note: There is an implicit “deny all” rule at the end of an ACL list. This means that if an

ACL is applied to a packet and if none of the explicit rules match, then the final implicit “deny all” rule applies and the packet is dropped.

To display the IP Rules page:

5-48 v1.0, July 2009

Managing Device Security

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Security



ACL , then click the Advanced



IP Rules link.

Figure 5-30

2.

To add an IP ACL rule, select the ACL ID to add the rule to, complete the fields in the Basic

ACL Rule Table and then click Add .

3.

To delete an IP rule, select the check box associated with the rule, and then click Delete .

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

If you change any of the settings on the page, click Apply to send the updated configuration to the switch. Configuration changes take effect immediately.

Table 5-35. IP ACL Rule Configuration Fields

Field

ACL ID

Rule ID

Description

The menu contains the existing IP ACLs configured on the page. To set up a new IP ACL, see “IP ACL” .

This field is only available if you select Create Rule from the Rule field.

Enter a new Rule ID. After you click Apply , the new ID is created and you can configure the rule settings. You can create up to 10 rules for each ACL.

Managing Device Security 5-49 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-35. IP ACL Rule Configuration Fields (continued)

Field

Action

Assign Queue ID

Match Every

Source IP Address

Source IP Mask

Description

Selects the ACL forwarding action, which is one of the following:

• Permit — Forwards packets which meet the ACL criteria.

• Deny — Drops packets which meet the ACL criteria.

Specifies the hardware egress queue identifier used to handle all packets matching this ACL rule. Enter an identifying number from 0–3 in the appropriate field.

Requires a packet to match the criteria of this ACL. Select True or False from the drop down menu. Match Every is exclusive to the other filtering rules, so if Match Every is True, the other rules on the screen are not available.

Requires a packet’s source port IP address to match the address listed here. Enter an IP Address in the appropriate field using dotted-decimal notation. The address you enter is compared to a packet's source IP

Address.

Specifies the source IP address wildcard mask. Wild card masks determines which bits are used and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of

0.0.0.0 indicates that all of the bits are important. Wildcard masking for

ACLs operates differently from a subnet mask. A wildcard mask is in essence the inverse of a subnet mask. With a subnet mask, the mask has ones (1's) in the bit positions that are used for the network address, and has zeros (0's) for the bit positions that are not used. In contrast, a wildcard mask has (0’s) in a bit position that must be checked. A ‘1’ in a bit position of the ACL mask indicates the corresponding bit can be ignored. This field is required when you configure a source IP address.

IP Extended Rule

Use the IP Extended Rules page to define rules for IP-based extended ACLs. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded.

Note: There is an implicit “deny all” rule at the end of an ACL list. This means that if an

ACL is applied to a packet and if none of the explicit rules match, then the final implicit “deny all” rule applies and the packet is dropped.

To display the IP extended Rules page:

5-50 Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Security



ACL , then click the Advanced



IP Extended Rules link.

Figure 5-31

2.

To add an IP ACL rule, select the ACL ID to add the rule to, and then click Add . The

Extended ACL Rules configuration page displays as shown in Figure 5-32 on page 5-52 .

3.

To delete an IP rule, select the check box associated with the rule, and then click Delete .

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

Managing Device Security v1.0, July 2009

5-51

GS716Tv2 and GS724Tv3 Software Administration Manual

5-52

Figure 5-32

Table 5-36. IP ACL Rule Configuration Fields

Field

ACL ID

Rule ID

Action

Egress Queue

Match Every

Protocol Type

Description

Identifies the ACL to which the rule is being added.

Enter a whole number in the range 1–10 that will be used to identify the rule. After you click Apply , the new ID is created and you can configure the rule settings. You can create up to 10 rules for each IP ACL.

Selects the ACL forwarding action that should be taken if a packet matches the rule’s criteria. Possible values are:

• Permit — Forwards packets which meet the ACL criteria.

• Deny — Drops packets which meet the ACL criteria.

Specifies the hardware egress queue identifier used to handle all packets matching this IP ACL rule. Valid range of Queue IDs is 0–3.

This field is visible when 'Permit' is chosen as 'Action'.

Requires a packet to match the criteria of this ACL. Match Every is exclusive to the other filtering rules, so if Match Every is True, the other rules on the screen do not appear.

Requires a packet’s protocol to match the protocol listed here. Select a type from the drop down menu or enter the protocol number in the available field.

Managing Device Security v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-36. IP ACL Rule Configuration Fields (continued)

Field

Src IP Address

Src IP Mask

Src L4 Port

Dst IP Address

Dst IP Mask

Description

Requires a packet’s source port IP address to match the address listed here. Enter an IP Address in the appropriate field using dotted-decimal notation. The address you enter is compared to a packet's source IP

Address.

Specifies the source IP address wildcard mask. Wild card masks determines which bits are used and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of

0.0.0.0 indicates that all of the bits are important. Wildcard masking for

ACLs operates differently from a subnet mask. A wildcard mask is in essence the inverse of a subnet mask. With a subnet mask, the mask has ones (1's) in the bit positions that are used for the network address, and has zeros (0's) for the bit positions that are not used. In contrast, a wildcard mask has (0’s) in a bit position that must be checked. A ‘1’ in a bit position of the ACL mask indicates the corresponding bit can be ignored. This field is required when you configure a source IP address.

Requires a packet’s TCP/UDP source port to match the port listed here.

Click Complete one of the following fields:

• Source L4 Keyword : Select the desired L4 keyword from a list of source ports on which the rule can be based.

• Source L4 Port Number : If the source L4 keyword is Other, enter a user-defined Port ID by which packets are matched to the rule.

Requires a packet’s destination port IP address to match the address listed here. Enter an IP Address in the appropriate field using dotteddecimal notation. The address you enter is compared to a packet's destination IP Address.

Specify the IP Mask in dotted-decimal notation to be used with the

Destination IP Address value.

Managing Device Security v1.0, July 2009

5-53

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-36. IP ACL Rule Configuration Fields (continued)

Field

Dst L4 Port

Service Type

Description

Requires a packet’s TCP/UDP destination port to match the port listed here. Complete one of the following fields:

• Destination L4 Keyword : Select the desired L4 keyword from a list of destination ports on which the rule can be based.

• Destination L4 Port Number : If the destination L4 keyword is Other, enter a user-defined Port ID by which packets are matched to the rule.

Select one of the following three Match fields to use in matching packets to ACLs:

• IP DSCP : Matches the packet DSCP value to the rule. Either the

DSCP value or the IP Precedence value is used to match packets to

ACLs. Select the desired value from the drop down menu of DSCP keyword values.

• IP Precedence : Matches the packet IP Precedence value to the rule when checked. Enter the IP Precedence value to match. Either the

DSCP value or the IP Precedence value is used to match packets to

ACLs.

• IP TOS Bits : Matches on the Type of Service bits in the IP header when checked.

- TOS Bits : Requires the bits in a packet’s TOS field to match the two-digit hexadecimal number entered here.

- TOS Mask : Specifies the bit positions that are used for comparison against the IP TOS field in a packet.

5.

Click Apply to save any changes to the running configuration.

IP Binding Configuration

When an ACL is bound to an interface, all the rules that have been defined are applied to the selected interface. Use the IP Binding Configuration page to assign ACL lists to ACL Priorities and Interfaces.

To display the IP Binding Configuration page:

1.

Click Security



ACL , then click the Advanced



IP Binding Configuration link.

5-54 v1.0, July 2009

Managing Device Security

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 5-33

Table 5-37. IP ACL Binding Configuration Fields

Field Description

ACL ID

Direction

Sequence Number

Port Selection Table

Select an existing IP ACL.

Specifies the packet filtering direction for ACL. The only valid direction is Inbound , which means the IP ACL rules are applied to traffic entering the port.

An optional sequence number may be specified to indicate the order of this access list relative to other access lists already assigned to this interface and direction. A lower number indicates higher precedence order. If a sequence number is already in use for this interface and direction, the specified access list replaces the currently attached access list using that sequence number. If the sequence number is not specified by the user, a sequence number that is one greater than the highest sequence number currently in use for this interface and direction will be used. The valid range is 1–4294967295.

Specifies list of all available valid interfaces for ACL binding. All nonrouting physical interfaces and interfaces participating in LAGs are listed. Click the orange bar to view all the available interfaces.

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

Click Apply to save any changes to the running configuration.

Managing Device Security 5-55 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

IP Binding Table

Use the IP Binding Table page to view or delete the IP ACL bindings.

To display the IP Binding Table:

1.

Click Security



ACL , then click the Advanced



Binding Table link.

Figure 5-34

Table 5-38. IP ACL Binding Table Fields

Field Description

Interface

Direction

ACL Type

ACL ID

Seq No.

Shows the interface to which the IP ACL is bound.

Specifies the packet filtering direction for ACL. The only valid direction is Inbound, which means the IP ACL rules are applied to traffic entering the port.

Displays the type of ACL assigned to selected interface and direction.

Displays the ACL Number identifying the ACL assigned to selected interface and direction.

Displays the Sequence Number signifying the order of specified ACL relative to other ACLs assigned to selected interface and direction.

2.

To delete the binding, select the check box next to the interface and click Delete .

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5-56 Managing Device Security v1.0, July 2009

Chapter 6

Monitoring the System

Use the features available from the Monitoring tab to view a variety of information about the switch and its ports and to configure how the switch monitors events. The Monitoring tab contains links to the following features:

• “Switch Statistics” on page 6-1

• “Viewing Port Statistics” on page 6-4

• “Managing Logs” on page 6-14

• “Configuring Port Mirroring” on page 6-23

Switch Statistics

The pages in the Switch Statistics folder contain a variety of information about the number and type of traffic transmitted from and received on the switch.

The Switch Statistics page shows detailed statistical information about the traffic the switch handles.

To access the Switch Statistics page:

1.

Click Monitoring



Ports



Switch Statistics in the navigation menu.

6-1 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

6-2

Figure 6-1

Table 6-1. Switch Statistics Fields

Field Description ifIndex

Octets Received

This object indicates the ifIndex of the interface table entry associated with the processor of this switch.

The total number of octets of data received by the processor (excluding framing bits, but including FCS octets).

Packets Received Without

Errors

The total number of packets (including broadcast packets and multicast packets) received by the processor.

Unicast Packets Received The number of subnetwork-unicast packets delivered to a higher layer protocol.

Multicast Packets Received The total number of packets received that were directed to a multicast address. This number does not include packets directed to the broadcast address.

Broadcast Packets

Received

The total number of packets received that were directed to the broadcast address. This does not include multicast packets.

Receive Packets Discarded The number of inbound packets which were chosen to be discarded, even though no errors had been detected, in order to prevent their being delivered to a higher layer protocol. A possible reason for discarding a packet could be to free up buffer space.

Monitoring the System v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 6-1. Switch Statistics Fields (continued)

Field Description

Octets Transmitted The total number of octets transmitted out of the interface, including framing characters.

The total number of packets transmitted out of the interface.

Packets Transmitted

Without Errors

Unicast Packets

Transmitted

Multicast Packets

Transmitted

Broadcast Packets

Transmitted

The total number of packets that higher level protocols requested be transmitted to a subnetwork-unicast address, including those that were discarded or not sent.

The total number of packets that higher level protocols requested be transmitted to a Multicast address, including those that were discarded or not sent.

The total number of packets that higher-level protocols requested be transmitted to the Broadcast address, including those that were discarded or not sent.

Transmit Packets

Discarded

The number of outbound packets which were chosen to be discarded, even though no errors had been detected, in order to prevent their being delivered to a higher layer protocol. A possible reason for discarding a packet could be to free up buffer space.

Most Address Entries Ever

Used

The highest number of Forwarding Database Address Table entries that have been learned by this switch since the most recent reboot.

Address Entries in Use The number of Learned and static entries in the Forwarding Database

Address Table for this switch.

The maximum number of Virtual LANs (VLANs) allowed on this switch.

Maximum VLAN Entries

Most VLAN Entries Ever

Used

Static VLAN Entries

Dynamic VLAN Entries

VLAN Deletes

The largest number of VLANs that have been active on this switch since the last reboot.

The number of presently active VLAN entries on this switch that have been created statically.

The number of presently active VLAN entries on this switch.

Time Since Counters Last

Cleared

The number of VLANs on this switch that have been created and then deleted since the last reboot.

The elapsed time, in days, hours, minutes, and seconds, since the statistics for this switch were last cleared.

2.

Click Clear Counters to clear all the statistics counters, resetting all switch summary and detailed statistics to default values. The discarded packets count cannot be cleared.

3.

Click Refresh to refresh the page with the most current data from the switch.

Monitoring the System 6-3 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Viewing Port Statistics

The pages in the Ports folder contain a variety of information about the number and type of traffic transmitted from and received on the switch.

• “Port Statistics” on page 6-4

• “Port Detailed Statistics” on page 6-5

• “EAP Statistics” on page 6-12

Port Statistics

The Port Statistics page shows a summary of per-port traffic statistics on the switch.

To access the Port Summary page:

1.

Click Monitoring



Ports , and then click the Port Statistics link.

6-4

Figure 6-2 v1.0, July 2009

Monitoring the System

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 6-2. Port Statistics Fields

Field

Interface

Total Packets Received

Without Errors

Packets Received With

Error

Broadcast Packets

Received

Packets Transmitted

Without Errors

Transmit Packet Errors

Collision Frames

Time Since Counters Last

Cleared

Description

Lists the ports on the system.

The total number of packets received that were without errors.

The number of inbound packets that contained errors preventing them from being deliverable to a higher-layer protocol.

The total number of good packets received that were directed to the broadcast address. This does not include multicast packets.

The number of frames that have been transmitted by this port to its segment.

The number of outbound packets that could not be transmitted because of errors.

The best estimate of the total number of collisions on this Ethernet segment.

The elapsed time, in days, hours, minutes, and seconds since the statistics for this port were last cleared.

2.

To clear all the counters for all ports on the switch, select the check box in the row heading and click Clear . The button resets all statistics for all ports to default values.

3.

To clear the counters for a specific port, select the check box associated with the port and click

Clear .

4.

Click Refresh to refresh the data on the screen and display the most current statistics.

Port Detailed Statistics

The Port Detailed Statistics page displays a variety of per-port traffic statistics.

To access the Port Detailed page:

1.

Click the Monitoring



Ports tab, and then click Port Detailed Statistics . ( Figure 6-3 on page 6-6 shows some, but not all, of the fields on the Port Detailed Statistics page.)

Monitoring the System v1.0, July 2009

6-5

GS716Tv2 and GS724Tv3 Software Administration Manual

6-6

Figure 6-3

Table 6-3. Port Detailed Statistics Fields

Field

Interface

MST ID ifIndex

Port Type

Description

Use the drop down menu to select the interface for which data is to be displayed or configured.

Displays the created or existing MSTs.

This field indicates the ifIndex of the interface table entry associated with this port on an adapter.

For most ports this field is blank. Otherwise the possible values are:

• Mirrored: Indicates that the port has been configured as a monitoring port and is the source port in a port mirroring session. For additional information about port monitoring and probe ports, see “Multiple Port

Mirroring” on page 6-23 .

• Probe: Indicates that the port has been configured as a monitoring port and is the destination port in a port mirroring session. For additional information about port monitoring and probe ports, see

“Multiple Port Mirroring” on page 6-23 .

• Port Channel: Indicates that the port has been configured as a member of a port-channel, which is also known as a link Aggregation

Group (LAG).

Monitoring the System v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 6-3. Port Detailed Statistics Fields (continued)

Field

Port Channel ID

Port Role

STP Mode

STP State

Admin Mode

LACP Mode

Physical Mode

Physical Status

Link Status

Link Trap

Description

If the port is a member of a port channel, the port channel's interface ID and name are shown. Otherwise, Disable is shown.

Each MST Bridge Port that is enabled is assigned a Port Role for each spanning tree. The port role will be one of the following values: Root

Port, Designated Port, Alternate Port, Backup Port, Master Port, or

Disabled Port.

Shows the Spanning Tree Protocol (STP) Administrative Mode for the port or LAG. The possible values for this field are:

• Enable: Enables the Spanning Tree Protocol for this port.

• Disable: Disables the Spanning Tree Protocol for this port.

Shows the port's current state Spanning Tree state. This state controls what action a port takes on receipt of a frame. If the bridge detects a malfunctioning port it will place that port into the broken state. The other five states are defined in IEEE 802.1D:

• Disabled

• Blocking

• Listening

• Learning

• Forwarding

• Broken

Shows the port control administration state:

• Enable: The port can participate in the network (default).

• Disable: The port is administratively down and does not participate in the network.

Selects the Link Aggregation Control Protocol administration state:

• Enable: Specifies that the port is allowed to participate in a port channel (LAG), which is the default mode.

• Disable: Specifies that the port cannot participate in a port channel

(LAG).

Indicates the port speed and duplex mode. In auto-negotiation mode, the duplex mode and speed are set from the auto-negotiation process.

Indicates the port speed and duplex mode status.

Indicates whether the link is up or down.

This object determines whether or not to send a trap when link status changes. The factory default is enabled:

• Enable: Specifies that the system sends a trap when the link status changes.

• Disable: Specifies that the system does not send a trap when the link status changes.

Monitoring the System 6-7 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 6-3. Port Detailed Statistics Fields (continued)

Field Description

Packets RX and TX 64

Octets

Packets RX and TX 65-127

Octets

The total number of packets (including bad packets) received or transmitted that were 64 octets in length (excluding framing bits but including FCS octets).

The total number of packets (including bad packets) received or transmitted that were between 65 and 127 octets in length inclusive

(excluding framing bits but including FCS octets).

Packets RX and TX 128-255

Octets

The total number of packets (including bad packets) received or transmitted that were between 128 and 255 octets in length inclusive

(excluding framing bits but including FCS octets).

Packets RX and TX 256-511

Octets

The total number of packets (including bad packets) received or transmitted that were between 256 and 511 octets in length inclusive

(excluding framing bits but including FCS octets).

Packets RX and TX 512-

1023 Octets

Packets RX and TX 1024-

1518 Octets

The total number of packets (including bad packets) received or transmitted that were between 512 and 1023 octets in length inclusive

(excluding framing bits but including FCS octets).

The total number of packets (including bad packets) received or transmitted that were between 1024 and 1518 octets in length inclusive

(excluding framing bits but including FCS octets).

Packets RX and TX > 1522

Octets

Octets Received

The total number of packets (including bad packets) received or transmitted that are in excess of 1522 octets in length inclusive

(excluding framing bits but including FCS octets).

The total number of octets of data (including those in bad packets) received on the network (excluding framing bits but including FCS octets). This object can be used as a reasonable estimate of ethernet utilization. If greater precision is desired, the etherStatsPkts and etherStatsOctets objects should be sampled before and after a common interval.

Packets Received 64 Octets The total number of packets (including bad packets) received that were

64 octets in length (excluding framing bits but including FCS octets).

Packets Received 65-127

Octets

The total number of packets (including bad packets) received that were between 65 and 127 octets in length inclusive (excluding framing bits but including FCS octets).

Packets Received 128-255

Octets

The total number of packets (including bad packets) received that were between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets).

Packets Received 256-511

Octets

The total number of packets (including bad packets) received that were between 256 and 511 octets in length inclusive (excluding framing bits but including FCS octets).

6-8 Monitoring the System v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 6-3. Port Detailed Statistics Fields (continued)

Field Description

Packets Received 512-1023

Octets

The total number of packets (including bad packets) received that were between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS octets).

Packets Received 1024-

1518 Octets

The total number of packets (including bad packets) received that were between 1024 and 1518 octets in length inclusive (excluding framing bits but including FCS octets).

Packets Received > 1522

Octets

The total number of packets received that were in excess of 1522 octets

(excluding framing bits, but including FCS octets) and were otherwise well formed.

Total Packets Received

Without Errors

The total number of packets received that were without errors.

Unicast Packets Received The number of subnetwork-unicast packets delivered to a higher-layer protocol.

Multicast Packets Received The total number of good packets received that were directed to a multicast address. This number does not include packets directed to the broadcast address.

Broadcast Packets

Received

Total Packets Received with MAC Errors

Jabbers Received

The total number of good packets received that were directed to the broadcast address. This does not include multicast packets.

The total number of inbound packets that contained errors preventing them from being deliverable to a higher-layer protocol.

The total number of packets received that were longer than 1518 octets

(excluding framing bits, but including FCS octets), and had either a bad

Frame Check Sequence (FCS) with an integral number of octets (FCS

Error) or a bad FCS with a non-integral number of octets (Alignment

Error). This definition of jabber is different than the definition in IEEE-

802.3 section 8.2.1.5 (10BASE5) and section 10.3.1.4 (10BASE2).

These documents define jabber as the condition where any packet exceeds 20 ms. The allowed range to detect jabber is between 20 ms and 150 ms.

Fragments Received

Undersize Received

The total number of packets received that were less than 64 octets in length with ERROR CRC (excluding framing bits but including FCS octets).

The total number of packets received that were less than 64 octets in length with GOOD CRC (excluding framing bits but including FCS octets).

Alignment Errors The total number of packets received that had a length (excluding framing bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but had a bad Frame Check Sequence (FCS) with a nonintegral number of octets.

Monitoring the System 6-9 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 6-3. Port Detailed Statistics Fields (continued)

Field Description

Rx FCS Errors

Overruns

The total number of packets received that had a length (excluding framing bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but had a bad Frame Check Sequence (FCS) with an integral number of octets

The total number of frames discarded as this port was overloaded with incoming packets, and could not keep up with the inflow.

Total Received Packets Not

Forwarded

A count of valid frames received which were discarded (i.e., filtered) by the forwarding process.

Local Traffic Frames

802.3x Pause Frames

Received

The total number of frames dropped in the forwarding process because the destination address was located off of this port.

A count of MAC Control frames received on this interface with an opcode indicating the PAUSE operation. This counter does not increment when the interface is operating in half-duplex mode.

Unacceptable Frame Type The number of frames discarded from this port due to being an unacceptable frame type.

Multicast Tree Viable

Discards

The number of frames discarded when a lookup in the multicast tree for a VLAN occurs while that tree is being modified.

Reserved Address

Discards

The number of frames discarded that are destined to an IEEE 802.1 reserved address and are not supported by the system.

Broadcast Storm Recovery The number of frames discarded that are destined for

FF:FF:FF:FF:FF:FF when Broadcast Storm Recovery is enabled.

6-10

CFI Discards

Upstream Threshold

Total Packets Transmitted

(Octets)

Packets Transmitted 64

Octets

The number of frames discarded that have CFI bit set and the addresses in RIF are in non-canonical format.

The number of frames discarded due to lack of cell descriptors available for that packet's priority level.

The total number of octets of data (including those in bad packets) transmitted on the network (excluding framing bits but including FCS octets). This object can be used as a reasonable estimate of ethernet utilization. If greater precision is desired, the etherStatsPkts and etherStatsOctets objects should be sampled before and after a common interval.

The total number of packets (including bad packets) transmitted that were 64 octets in length (excluding framing bits but including FCS octets).

Packets Transmitted 65-127

Octets

The total number of packets (including bad packets) transmitted that were between 65 and 127 octets in length inclusive (excluding framing bits but including FCS octets).

Monitoring the System v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 6-3. Port Detailed Statistics Fields (continued)

Field Description

Packets Transmitted 128-

255 Octets

Packets Transmitted 256-

511 Octets

Packets Transmitted 512-

1023 Octets

Packets Transmitted 1024-

1518 Octets

Packets Transmitted 1519-

1522 Octets

Total Packets Transmitted

Successfully

Unicast Packets

Transmitted

Multicast Packets

Transmitted

Broadcast Packets

Transmitted

Total Transmit Errors

Tx FCS Errors

Tx Oversized

Underrun Errors

Total Transmit Packets

Discarded

The total number of packets (including bad packets) transmitted that were between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets).

The total number of packets (including bad packets) transmitted that were between 256 and 511 octets in length inclusive (excluding framing bits but including FCS octets).

The total number of packets (including bad packets) transmitted that were between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS octets).

The total number of packets (including bad packets) transmitted that were between 1024 and 1518 octets in length inclusive (excluding framing bits but including FCS octets).

The total number of packets (including bad packets) transmitted that were between 1519 and 1522 octets in length inclusive (excluding framing bits but including FCS octets).

The number of frames that have been transmitted by this port to its segment.

The total number of packets that higher-level protocols requested be transmitted to a subnetwork-unicast address, including those that were discarded or not sent.

The total number of packets that higher-level protocols requested be transmitted to a Multicast address, including those that were discarded or not sent.

The total number of packets that higher-level protocols requested be transmitted to the Broadcast address, including those that were discarded or not sent.

The sum of Single, Multiple, and Excessive Collisions.

The total number of packets transmitted that had a length (excluding framing bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but had a bad Frame Check Sequence (FCS) with an integral number of octets

The total number of frames that exceeded the max permitted frame size. This counter has a max increment rate of 815 counts per second at

10 Mb/s.

The total number of frames discarded because the transmit FIFO buffer became empty during frame transmission.

The sum of single collision frames discarded, multiple collision frames discarded, and excessive frames discarded.

Monitoring the System 6-11 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 6-3. Port Detailed Statistics Fields (continued)

Field Description

Single Collision Frames A count of the number of successfully transmitted frames on a particular interface for which transmission is inhibited by exactly one collision.

Multiple Collision Frames A count of the number of successfully transmitted frames on a particular interface for which transmission is inhibited by more than one collision.

Excessive Collision Frames A count of frames for which transmission on a particular interface fails due to excessive collisions.

Port Membership Discards The number of frames discarded on egress for this port due to egress filtering being enabled.

STP BPDUs Received

STP BPDUs Transmitted

Number of STP BPDUs received at the selected port.

Number of STP BPDUs transmitted from the selected port.

RSTP BPDUs Received Number of RSTP BPDUs received at the selected port.

RSTP BPDUs Transmitted Number of RSTP BPDUs transmitted from the selected port.

MSTP BPDUs Received Number of MSTP BPDUs received at the selected port.

MSTP BPDUs Transmitted Number of MSTP BPDUs transmitted from the selected port.

802.3x Pause Frames

Transmitted

A count of MAC Control frames transmitted on this interface with an opcode indicating the PAUSE operation. This counter does not increment when the interface is operating in half-duplex mode.

EAPOL Frames Received The number of valid EAPOL frames of any type that have been received by this authenticator.

EAPOL Frames

Transmitted

The number of EAPOL frames of any type that have been transmitted by this authenticator.

Time Since Counters Last

Cleared

The elapsed time, in days, hours, minutes, and seconds since the statistics for this port were last cleared.

2.

Click Clear to clear all the counters. This resets all statistics for this port to the default values.

3.

Click Refresh to refresh the data on the screen and display the most current statistics.

EAP Statistics

Use the EAP Statistics page to display information about EAP packets received on a specific port.

To display the EAP Statistics page:

1.

Click the Monitoring



Ports tab, and then click the EAP Statistics link.

6-12 Monitoring the System v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 6-4

Table 6-4. EAP Statistics Fields

Field Description

Ports

Frames Received

Frames Transmitted

Start Frames Received

Log off Frames Received

Last Frame Version

Last Frame Source

Specifies the interface which is polled for statistics.

Displays the number of valid EAPOL frames received on the port.

Displays the number of EAPOL frames transmitted through the port.

Displays the number of EAPOL Start frames received on the port.

Displays the number of EAPOL Log off frames that have been received on the port.

Displays the protocol version number attached to the most recently received EAPOL frame.

Displays the source MAC Address attached to the most recently received EAPOL frame.

Invalid Frames Received

Length Error Frames

Received

Response/ID Frames

Received

Displays the number of unrecognized EAPOL frames received on this port.

Displays the number of EAPOL frames with an invalid Packet Body

Length received on this port.

Displays the number of EAP Respond ID frames that have been received on the port.

Response Frames Received Displays the number of valid EAP Response frames received on the port.

Monitoring the System 6-13 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 6-4. EAP Statistics Fields (continued)

Field Description

Request/ID Frames

Transmitted

Displays the number of EAP Requested ID frames transmitted through the port.

Request Frames Transmitted Displays the number of EAP Request frames transmitted through the port.

2.

To clear all the EAP counters for all ports on the switch, select the check box in the row heading and click Clear . The button resets all statistics for all ports to default values.

3.

To clear the counters for a specific port, select the check box associated with the port and click

Clear .

4.

Click Refresh to refresh the data on the screen and display the most current statistics.

Managing Logs

The switch may generate messages in response to events, faults, or errors occurring on the platform as well as changes in configuration or other occurrences. These messages are stored locally and can be forwarded to one or more centralized points of collection for monitoring purposes or long term archival storage. Local and remote configuration of the logging capability includes filtering of messages logged or forwarded based on severity and generating component.

The Monitoring



Logs tab contains links to the following folders:

• “Memory Logs” on page 6-14

• “FLASH Log Configuration” on page 6-16

• “Server Log Configuration” on page 6-19

• “Trap Logs” on page 6-21

• “Event Logs” on page 6-22

Memory Logs

The in-memory log stores messages in memory based upon the settings for message component and severity. Use the Memory Logs page to set the administrative status and behavior of logs in the system buffer.

To access the Memory Log page:

1.

Click the Monitoring



Logs tab, and then click the Memory Log link.

6-14 Monitoring the System v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 6-5

Table 6-5. Memory Log Configuration Fields

Field Description

Admin Status

Behavior

Determines whethe r to log messages.

• Enable: Enables system logging.

• Disable: Prevents th e system from logging messages.

Indicates the behavior of the log when it is full.

• Wrap: When the buffer is full, the oldest log messages are deleted as the system logs new messages.

• Stop on Full: When the buffer is full, the system stops logging new messages and preserves all existing log messages.

The Memory Log table also appears on the Memory Log page.

Table 6-6. Memory Log Table Fields

Field Description

Total Number of Messages Shows the number of messages the system has logged in memory. Only the 64 most recent entries are displayed on the page.

Monitoring the System 6-15 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

The rest of the page displays the Memory Log messages. The following example applies to the format of all logged messages which are displayed for the message log, persistent log, or console log.

Messages logged to a collector or relay via syslog have an identical format of either type.

<15>Aug 24 05:34:05 STK0 MSTP[2110]: mspt_api.c(318) 237 %% Interface

12 transitioned to root state on message age timer expiry

The example log message above indicates a message with severity 7(15 mod 8) (debug). The message was generated by the MSTP component running in thread id 2110. The message was generated on Aug 24 05:34:05 by line 318 of file mstp_api.c. This is the 237th message logged.

Example user-level message:

<15>Aug 24 05:34:05 STK0 MSTP[2110]: mspt_api.c(318) 237 %% Interface

12 transitioned to root state on message age timer expiry

The example log message above indicates a user-level message (1) with severity 7 (debug).

The message was generated by component MSTP running in thread id 2110. The message was generated on Aug 24 05:34:05 by line 318 of file mstp_api.c. This is the 237th message logged. Messages logged to a collector or relay via syslog have an identical format to the above message.

Number of log messages displayed: For the message log, only the latest 64 entries are displayed on the Web page.

2.

Click Clear to clear the messages out of the buffered log in the memory.

3.

Click Refresh to update the page with the latest messages in the log.

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

If you change the buffered log settings, click Apply to apply the changes to the system. To preserve the changes after a system reboot, you must perform a save.

FLASH Log Configuration

The FLASH log is a log that is stored in persistent storage, which means that the log messages are retained across a switch reboot.

• The first log type is the system startup log . The system startup log stores the first N messages received after system reboot. This log always has the log full operation attribute set to stop on full and can store up to 32 messages.

6-16 Monitoring the System v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

• The second log type is the system operation log . The system operation log stores the last N messages received during system operation. This log always has the log full operation attribute set to overwrite. This log can store up to 1000 messages.

Either the system startup log or the system operation log stores a message received by the log subsystem that meets the storage criteria, but not both. In other words, on system startup, if the startup log is configured, it stores messages up to its limit. The operation log, if configured, then begins to store the messages.

Use the FLASH Log Configuration page to enable or disable persistent logging and to set the severity filter.

To access the FLASH Log Configuration page:

1.

Click the Monitoring



Logs tab, and then click the FLASH Log link.

Figure 6-6

Monitoring the System v1.0, July 2009

6-17

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 6-7. FLASH Log Configuration Fields

Field

Admin Status

Severity Filter

Description

Enable or disable logging by selecting the corresponding check box.

The default is Disable .

• Enable: A log that is ‘Enabled’ logs messages.

• Disable: A log that is ‘Disabled’ does not log messages.

A log records messages equal to or above a configured severity threshold. Use the menu to select the severity of the logs. For example, if you select Error , the logged messages include Error , Critical , Alert , and Emergency . The default severity level is Alert(1) . The severity can be one of the following levels:

• Emergency (0): The highest level warning level. If the device is down or not functioning properly, an emergency log is saved to the device.

• Alert (1): The second highest warning level. An alert log is saved if there is a serious device malfunction, such as all device features being down. Action must be taken immediately.

• Critical (2): The third highest warning level. A critical log is saved if a critical device malfunction occurs, for example, two device ports are not functioning, while the rest of the device ports remain functional.

• Error (3): A device error has occurred, such as if a port is offline.

• Warning (4): The lowest level of a device warning.

• Notice (5): Normal but significant conditions. Provides the network administrators with device information.

• Info (6): Provides device information.

• Debug (7): Provides detailed information about the log. Debugging should only be entered by qualified support personnel.

The rest of the page displays the persistent log messages.

Table 6-8. FLASH Log Fields

Field Description

Number of FLASH

Messages

Shows the number of persistent messages the system has logged.

2.

Click Clear to clear the messages out of the buffered log.

3.

Click Refresh to refresh the page with the most current data from the switch.

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

If you make any changes to the page, click Apply to apply the change to the system.

6-18 Monitoring the System v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Server Log Configuration

Use the Server Log Configuration page to allow the switch to send log messages to the remote logging hosts configured on the system.

To access the Server Log Configuration page:

1.

Click the Monitoring



Logs tab, and then click the Server Log link.

Figure 6-7

Table 6-9. Server Log Configuration Fields

Field

Admin Status

Local UDP Port

Messages Relayed

Messages Ignored

Description

Specifies whether to send log messages to the remote syslog hosts configured on the switch:

• Enable: Messages will be sent to all configured hosts (syslog collectors or relays) using the values configured for each host.

• Disable: Stops logging to all syslog hosts. Disable means no messages will be sent to any collector/relay.

Specifies the port on the switch from which syslog messages are sent. The default port is 514.

The number of messages forwarded by the syslog function to a syslog host.

Messages forwarded to multiple hosts are counted once for each host.

The number of messages that were ignored.

Monitoring the System 6-19 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

The Server Log Configuration page also contains the Server Configuration table.

Table 6-10. Host Configuration Fields

Field

Host Address

Status

Port

Severity Filter

Description

Enter the IP address of the host configured for syslog.

Shows whether the remote logging host is currently active.

Identifies the port on the host to which syslog messages are sent. The default port is 514. Specify the port in the text field.

Use the menu to select the severity of the logs to send to the logging host. Logs with the selected severity level and all logs of greater severity are sent to the host. For example, if you select Error, the logged messages include Error, Critical, Alert, and Emergency. The default severity level is Alert(1). The severity can be one of the following levels:

• Emergency (0): The highest level warning level. If the device is down or not functioning properly, an emergency log is saved to the device.

• Alert (1): The second highest warning level. An alert log is saved if there is a serious device malfunction, such as all device features being down.

• Critical (2): The third highest warning level. A critical log is saved if a critical device malfunction occurs, for example, two device ports are not functioning, while the rest of the device ports remain functional.

• Error (3): A device error has occurred, such as if a port is offline.

• Warning (4): The lowest level of a device warning.

• Notice (5): Provides the network administrators with device information.

• Informational (6): Provides device information.

• Debug (7): Provides detailed information about the log. Debugging should only be entered by qualified support personnel.

2.

To add a remote logging host, enter the appropriate information into the Host Configuration table and click Add .

3.

To delete an existing host, select the check box next to the host and click Delete .

4.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

5.

If you make any changes to the Server Log Configuration information, click Apply to apply the change to the system.

6.

To modify the settings for an existing host, select the check box next to the host, change the desired information, and click Apply .

6-20 Monitoring the System v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Trap Logs

Use the Trap Logs page to view information about the SNMP traps generated on the switch.

To access the Trap Logs page:

1.

Click the Monitoring



Logs tab, and then click the Trap Logs link.

Figure 6-8

Table 6-11. Trap Log Statistics

Field Description

Number of Traps

Since Last Reset

Trap Log Capacity

The number of traps that have occurred since the switch last reboot.

Number of Traps

Since Log Last

Viewed

The maximum number of traps stored in the log. If the number of traps exceeds the capacity, the entries will overwrite the oldest entries.

The number of traps that have occurred since the traps were last displayed.

Displaying the traps by any method (such as terminal interface display, Web display, or upload file from switch) will cause this counter to be cleared to 0.

The page also displays information about the traps that were sent.

Monitoring the System 6-21 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 6-12. Trap Logs

Field Description

Log

System Up Time

The sequence number of this trap.

The time at which this trap occurred, expressed in days, hours, minutes and seconds since the last reboot of the switch.

Information identifying the trap.

Trap

2.

Click Clear Counters to clear all the counters. This resets all statistics for the trap logs to the default values.

Event Logs

Use the Event Log page to display the event log, which is used to hold error messages for catastrophic events. After the event is logged and the updated log is saved in flash memory, the switch will be reset. The log can hold at least 2,000 entries and is erased when an attempt is made to add an entry after it is full. The event log is preserved across system resets.

To access the Event Log page:

1.

Click the Monitoring



Logs tab, and then click the Event Logs link.

6-22

Figure 6-9 v1.0, July 2009

Monitoring the System

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 6-13. Event Log Fields

Field

Entry

Type

Filename

Line

Task ID

Code

Description

The number of the entry within the event log. The most recent entry is first.

Specifies the type of entry.

The GS716T/GS724T source code filename identifying the code that detected the event.

The line number within the source file of the code that detected the event.

The OS-assigned ID of the task reporting the event.

The event code passed to the event log handler by the code reporting the event.

The time the event occurred, measured from the previous reset.

Time

2.

Click Clear to clear the messages out of the Event Log.

3.

Click Refresh to refresh the data on the screen and display the most current information.

Configuring Port Mirroring

The page under the Mirroring link allows you to view and configure port mirroring on the system.

Multiple Port Mirroring

Port mirroring selects the network traffic for analysis by a network analyzer. This is done for specific ports of the switch. As such, many switch ports are configured as source ports and one switch port is configured as a destination port. You have the ability to configure how traffic is mirrored on a source port. Packets that are received on the source port, that are transmitted on a port, or are both received and transmitted, can be mirrored to the destination port.

The packet that is copied to the destination port is in the same format as the original packet on the wire. This means that if the mirror is copying a received packet, the copied packet is VLAN tagged or untagged as it was received on the source port. If the mirror is copying a transmitted packet, the copied packet is VLAN tagged or untagged as it is being transmitted on the source port.

Use the Multiple Port Mirroring page to define port mirroring sessions.

To access the Multiple Port Mirroring page:

Monitoring the System 6-23 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Monitoring



Port Mirroring in the navigation menu.

Figure 6-10

Table 6-14. Multiple Port Mirroring Fields

Field

Source Port

Destination Port

Session Mode

Description

Lists all the ports on the system. Select the check box next to a port to configure it as a source port.

After you select a source port, enter the port to which port traffic may be copied in g1, g2,...format. You can only configure one destination port on the system.

Select Enable to turn on Multiple Port Mirroring. Select Disable to turn off port mirroring. The session mode is a global value.

If the port is configured as a source port, the field value is Mirrored.

Mirroring Port

2.

To delete a mirrored port, select the check box next to the mirrored port, and then click Delete .

3.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

4.

To add a mirrored port, select the source port, enter the destination port number ( g1, g2,...

) in the Destination port field. Select Enable from the Session Mode menu, and then click Apply .

6-24 Monitoring the System v1.0, July 2009

Chapter 7

Maintenance

The Maintenance tab contains links to the following pages that help you manage the switch:

• “Reset” on page 7-1

• “Upload File From Switch” on page 7-3

• “Download File To Switch” on page 7-5

• “File Management” on page 7-10

• “Troubleshooting” on page 7-13

Reset

The Reset menu contains links to the following options:

• “Rebooting the Switch” on page 7-1

• “Reset Configuration to Defaults” on page 7-2

Rebooting the Switch

Use the Device Reboot page to reboot the system.

To access the Device Reboot page:

7-1 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Maintenance



Reset



Device Reboot in the navigation tree.

Figure 7-1

2.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

3.

Click Apply to send the updated configuration to the switch. Configuration changes take place immediately.

Reset Configuration to Defaults

Use the Factory Default page to reset the system configuration to the factory default values.

Note: For information about configuring network information, see “Connecting the

Switch to the Network” on page 1-1 .

To access the Factory Defaults page:

7-2 v1.0, July 2009

Maintenance

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Maintenance



Reset



Factory Default in the navigation tree.

Figure 7-2

2.

Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch.

3.

Click Apply to restore the factory default settings. The action occurs immediately.

Upload File From Switch

Use the File Upload page to upload configuration (ASCII) and image (binary) files from the switch to the TFTP server.

Maintenance v1.0, July 2009

7-3

GS716Tv2 and GS724Tv3 Software Administration Manual

To display the File Upload page:

1.

Click Maintenance



Upload



File Upload in the navigation tree.

7-4

Figure 7-3

Table 7-1. Upload File from Switch Fields

Field

File Type

Image Name

Transfer Mode

Server Address Type

Server Address

Description

Specify the type of file you want to upload:

• Code: Retrieves a stored code image.

• Text Configuration : Retrieves the text configuration file startupconfig.

• Error Log: Retrieves the system error (persistent) log, sometimes referred to as the event log.

• Buffered Log: Retrieves the system buffered (in-memory) log.

• Trap Log: Retrieves the system trap records.

The default is Error Log .

Specify the code image to upload, either image1 or image2. This field is only visible when Code is selected as the File Type. The factory default is image1.

Specify what protocol to use to transfer the file:

• TFTP . Trivial File Transfer Protocol.

Shows the format of the TFTP Server Address field The factory default is

IPv4 .

Enter the IP address of the TFTP server in accordance with the format indicated by the TFTP Server Address Type. The factory default is the

IPv4 address 0.0.0.0

.

Maintenance v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 7-1. Upload File from Switch Fields (continued)

Field

Transfer File Path

Transfer File Name

Start File Transfer

Description

Enter the path on the TFTP server where you want to put the file. You may enter up to 32 characters. A file name with a space is not accepted.

The factory default is blank.

Enter a destination file name for the file to upload. You may enter up to

32 characters. The factory default is blank.

To initiate the file upload, check this box before clicking Apply .

The last row of the table is used to display information about the progress of the file transfer.

The page will refresh automatically until the file transfer completes.

Uploading Files

Use the following procedures to upload a file from the switch to a TFTP server.

1.

From the File Type field, select the type of file to copy from the switch to the TFTP server.

2.

If you are uploading a GS716T/GS724T image ( Code ), select the image on the switch to upload. If you are uploading another type of file, the Image Name field is not available.

3.

Complete the Server Address Type , Server IP Address, and Transfer File Name (full path without TFTP server IP address) fields.

4.

Click the Start File Transfe r check box, and then click Apply .

5.

Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch.

Download File To Switch

The switch supports system file downloads from a remote system to the switch by using either

TFTP or HTTP.

The Download menu contains links to the following options:

• “TFTP File Download” on page 7-6

• “HTTP File Download” on page 7-8

Maintenance 7-5 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

TFTP File Download

Use the Download File to Switch page to download device software, the image file, the configuration files and SSL files from a TFTP server to the switch.

You can also download files via HTTP. See “HTTP File Download” on page 7-8 for additional information.

To access the TFTP File Download page:

1.

Click Maintenance



Download



TFTP File Download in the navigation tree.

Figure 7-4

7-6 v1.0, July 2009

Maintenance

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 7-2. Download File to Switch Fields

Field

File Type

Image Name

Server Address Type

TFTP Server IP

Transfer File Path

Remote File Name

Start File Transfer

Description

Specify what type of file you want to download to the switch:

• Code: The code is the system software image, which is saved in one of two flash sectors called images (image1 and image2). The active image stores the active copy; while the other image stores a second copy. The device boots and runs from the active image. If the active image is corrupt, the system automatically boots from the non-active image. This is a safety feature for faults occurring during the boot upgrade process.

• Text Configuration : A text-based configuration file enables you to edit a configured text file (startup-config) offline as needed without having to translate the contents for Smart Switch to understand. The most common usage of text-based configuration is to upload a working configuration from a device, edit it offline to personalize it for another similar device (for example, change the device name, serial number, IP address), and download it to that device.

• SSL Trusted Root Certificate PEM File: SSL Trusted Root Certificate

File (PEM Encoded).

• SSL Server Certificate PEM File: SSL Server Certificate File (PEM

Encoded).

• SSL DH Weak Encryption Parameter PEM File: SSL Diffie-Hellman

Weak Encryption Parameter File (PEM Encoded).

• SSL DH Strong Encryption Parameter PEM File: SSL Diffie-Hellman

Strong Encryption Parameter File (PEM Encoded).

Specify the code image you want to download, either image1 or image2.

This field is only visible when Code is selected as the File Type. The factory default is image1 .

Shows the format of the TFTP Server Address field The factory default is

IPv4 .

Enter the IP address of the TFTP server in accordance with the format indicated by the TFTP Server Address Type. The factory default is the

IPv4 address 0.0.0.0

.

Enter the path on the TFTP server where the selected file is located. You may enter up to 32 characters. The factory default is blank.

Enter the name of the file you want to download from the TFTP server.

You may enter up to 32 characters. A file name with a space is not accepted. The factory default is blank.

To initiate the download, check this box before clicking Submit .

2.

Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch.

Maintenance 7-7 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Downloading a File to the Switch

Before you download a file to the switch, the following conditions must be true:

• The file to download from the TFTP server is on the server in the appropriate directory.

• The file is in the correct format.

• The switch has a path to the TFTP server.

Use the following procedures to download a file from a TFTP server to the switch.

1.

From the File Type field, select the type of file to download.

2.

If you are downloading a GS716T/GS724T image (Code), select the image on the switch to overwrite. If you are downloading another type of file, the Image Name field is not available.

Note: It is recommended that you not overwrite the active image. The system will display a warning that you are trying to overwrite the active image.

3.

Verify the IP address of the TFTP server and ensure that the software image or other file to be downloaded is available on the TFTP server.

4.

Complete the Server Address Type , TFTP Server IP Address and Remote File Name (full path without TFTP server IP address) fields.

5.

Click the Start File Transfer check box, and then click Apply .

6.

After you click Apply , the screen refreshes and a “File transfer operation started” message appears. After the software is downloaded to the device, a message appears indicating that the file transfer operation completed successfully.

To activate a software image that you download to the switch, see “File Management” on page 7-10 .

HTTP File Download

Use the HTTP File Download page to download files of various types to the switch using an HTTP session (for example, via your Web browser).

To display this page:

7-8 Maintenance v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Maintenance



Download



HTTP File Download in the navigation menu.

Figure 7-5

Table 7-3. HTTP File Download Fields

Field

File Type

Image Name

Select File

Description

Specify the type of file you want to download:

• Code : Choose this option to upgrade the operational software in flash (default).

• Text Configuration : Choose this option to update the switch's configuration. If the file has errors the update will be stopped.

• SSL Trusted Root Certificate PEM File : SSL Trusted Root Certificate File (PEM

Encoded)

• SSL Server Certificate PEM File : SSL Server Certificate File (PEM Encoded)

• SSL DH Weak Encryption Parameter PEM File : SSL Diffie-Hellman Weak

Encryption Parameter File (PEM Encoded)

• SSL DH Strong Encryption Parameter PEM File : SSL Diffie-Hellman Strong

Encryption Parameter File (PEM Encoded)

Specify the code image you want to download, either image1 (the default) or image2 . This field is only visible when Code is selected as the File Type.

Enter the path and filename or browse for the file you want to download. You may enter up to 80 characters.

2.

Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch.

3.

Click the Apply button to initiate the file download.

Maintenance 7-9 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Note: After a file transfer is started, please wait until the page refreshes. When the page refreshes, the “Select File” option will be blanked out. This indicates that the file transfer is done.

File Management

The system maintains two versions of the GS716T/GS724T software in permanent storage. One image is the active image, and the second image is the backup image. The active image is loaded during subsequent switch restarts. This feature reduces switch down time when upgrading or downgrading the GS716T/GS724T software.

The File Management menu contains links to the following options:

• “Dual Image Configuration” on page 7-10

• “Viewing the Dual Image Status” on page 7-12

Dual Image Configuration

The system running an older software version will ignore (not load) a configuration file created by the newer software version. When a configuration file created by the newer software version is discovered by the system running an older version of the software, the system will display an appropriate warning to the user.

Use the Dual Image Configuration page to set the boot image.

To display the Dual Image Configuration page:

7-10 v1.0, July 2009

Maintenance

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Click Maintenance



File Management



Dual Image



Dual Image Configuration in the navigation menu.

Figure 7-6

The Active Image page contains the following fields:

Table 7-4. Dual Image Configuration Fields

Field Description

Image Name Select image1 or image2 from the drop down menu to display or configure information about that software image.

Current Active Displays name of current active image.

Image

Description

If desired, enter a descriptive name for the software image.

2.

Click Activate Image to make the image that is selected in the Image Name field the next active image for subsequent reboots.

Note: After activating an image, you must perform a system reset of the switch in order to run the new code.

3.

If the file you uploaded contains the boot loader code only, click Update Bootcode .

4.

Click Refresh to reload the page and display the most current information.

5.

Click Delete Image to remove the selected image from permanent storage on the switch. You cannot delete the active image.

Maintenance 7-11 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

6.

Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch.

7.

Click Apply to update the image description on the switch.

Viewing the Dual Image Status

You can use the Dual Image Status page to view information about the system images on the device.

To display the Dual Image Status page:

1.

Click Maintenance



File Management



Dual Image



Dual Image Status in the navigation menu.

Figure 7-7

7-12

Table 7-5. Dual Image Status Fields

Field Description

Unit

Image1 Ver

Image2 Ver

The unit ID of the switch is always 1.

Displays the version of the image1 code file.

Displays the version of the image2 code file.

Current-active

Next-active

Displays the currently active image on this switch.

Displays the image to be used on the next restart of this switch.

Image1 Description Displays the description associated with the image1 code file.

v1.0, July 2009

Maintenance

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 7-5. Dual Image Status Fields (continued)

Field Description

Image2 Description Displays the description associated with the image2 code file.

2.

Click Refresh to display the latest information from the router.

3.

For information about how to update or change the system images, see “File Management” on page 7-10 .

Troubleshooting

The Troubleshooting menu contains links to the following options:

• “Ping” on page 7-13

• “TraceRoute” on page 7-14

Ping

Use the Ping page to tell the switch to send a Ping request to a specified IP address. You can use this feature to check whether the switch can communicate with a particular network host.

To access the Ping page:

1.

Click Maintenance



Troubleshooting



Ping in the navigation menu.

Figure 7-8

Maintenance v1.0, July 2009

7-13

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 7-6. Ping Fields

Field

IP Address

Count

Interval

Size

Ping

Description

Specify the IP address.

Specify the number of pings to send. The valid range is 1–15.

Specify the number of seconds between pings sent. The valid range is

1–60.

Specify the size of the ping packet to send. The valid range is 0–65507.

Displays the results of the ping.

2.

Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch.

3.

Click Apply to send the ping. The switch will send the number of pings configured and the results will be displayed below the configurable data.

• If successful, you will see “Reply From IP/Host: icmp_seq = 0. time = xx usec. Tx = x,

Rx = x Min/Max/Avg RTT = x/x/x msec”

• If a reply to the ping is not received, you will see “Reply From IP/Host: Destination

Unreachable. Tx = x, Rx = 0 Min/Max/Avg RTT = 0/0/0 msec”

TraceRoute

You can use the TraceRoute utility to discover the paths that a packet takes to a remote destination.

To display this page:

1.

Click Maintenance



Troubleshooting



TraceRoute in the navigation tree.

7-14 v1.0, July 2009

Maintenance

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 7-9

Table 7-7. TraceRoute Fields

Field

IP Address

Probes Per Hop

MaxTTL

InitTTL

MaxFail

Interval

Port

Size

TraceRoute

Definition

Specify the IP address.

Enter the number of times each hop should be probed. The valid range is 1–10.

Enter the maximum time-to-live for a packet in number of hops. The valid range is

1–255.

Enter the initial time-to-live for a packet in number of hops. The valid range is 0–

255.

Enter the maximum number of failures allowed in the session. The valid range is

0–255.

Enter the time between probes in seconds. The valid range is 1–60.

Enter the UDP destination port in probe packets. The valid range is 1–65535.

Enter the size of probe packets. The valid range is 0–65507.

Displays the output from a traceroute.

2.

Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch.

3.

Click Apply to initiate the traceroute. The results display in the TraceRoute box.

Maintenance 7-15 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

7-16 v1.0, July 2009

Maintenance

Appendix A

Hardware Specifications and Default Values

GS7xxT Gigabit Smart Switch Specifications

The GS7xxT Gigabit Smart Switch conforms to the TCP/IP, UDP, HTTP, ICMP, TFTP, DHCP,

IEEE 802.1D, IEEE 802.1p, and IEEE 802.1Q standards.

Table A-1. GS7xxT Gigabit Smart Switch Specifications

Feature

Interfaces

PoE

Flash memory size

SRAM size and type

Value

14G + 2 Combo G ports with SFP on GS716T

22G + 2 Combo G ports with SFP on GS724T

N/A

16 MB

64 MB DDR

Table A-2. Switch Performance

Feature

Switching capacity

Forwarding method

Packet forwarding rate

MAC addresses

MAC buffer memory size

Green Ethernet

Value

Non-Blocking Full WireSpeed on all packet sizes

Store and Forward

10M:14,880 pps/

100M:148,810 pps/

1G:1,488,000 pps

8K

Max support 1.5 MB buffer memory

Power consumption savings by cable length

(>10m)

A-1 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

GS7xxTR Gigabit Smart Switch Features and Defaults

Table A-3. Port Characteristics

Feature

Auto negotiation/static speed/ duplex

Auto MDI/MDIX

802.3x flow control/back pressure

Port mirroring

Port trunking (aggregation)

802.1D spanning tree

802.1w RSTP

802.1s spanning tree

Static 802.1Q tagging

Sets Supported

16 on GS716T/

24 on GS724T (per port)

N/A

1 (per system)

1

1

1

6

3 instances

2 Port Trunking on GS716T/

4 Port Trunking on GS724T

Learning process Supports Static and dynamic

MAC entries

Default

Auto negotiation

Enabled

Disabled

Disabled

Pre-configured

Disabled

Disabled

Disabled

VID = 1MemberPorts = [1–n] n = 16 on GS716T

24 on GS724T

Dynamic learning is enabled by default

Table A-4. Quality Of Service

Feature

Number of queues

Port based

802.1p

DSCP

Rate limiting

Auto-QoS

Sets Supported

1

1

4

N/A

16 on GS716T/

24 on GS724T (per port)

16 on GS716T/

24 on GS724T (per port)

Default

N/A

N/A

Enabled

Disabled

Disabled

Disabled

A-2 Hardware Specifications and Default Values v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Table A-5. Security

Feature

802.1x

MAC ACL

IP access list

Password control access

Management security

Port MAC lock down

Sets Supported

16 on GS716T/

24 on GS724T (per port)

100 (Shared with IP ACL)

100 (shared with MACACL)

1

Default

Disabled

All MAC addresses allowed

All IP addresses allowed

Idle timeout = 5 mins.

Password = “password”

All IP addresses allowed 1 profile with 20 rules for HTTP/

HTTPS/SNMP access to allow/ deny an IP address/subnet

16 on GS716T/

24 on GS724T (per port)

Disabled

Table A-6. Traffic Control

Feature

Storm control

Jumbo frame

Sets Supported

16 on GS716T/

24 on GS724T (per port)

16 on GS716T/

24 on GS724T (per port)

Default

Disabled

Disabled

Table A-7. System Setup

Feature

Boot code update

DHCP/manual IP

System name configuration

Configuration save/restore

Firmware upgrade

Restore defaults

Dual image support

Factory reset

Sets Supported Default

1

1

1

1

N/A

192.168.0.239

NULL

N/A

1

1

1 N/A

1 (Web and front-panel button) N/A

Enabled

N/A

Hardware Specifications and Default Values v1.0, July 2009

A-3

GS716Tv2 and GS724Tv3 Software Administration Manual

Table A-8. Other Features

Feature Sets Supported

IGMP snooping v1/v2 16 on GS716T/

24 on GS724T (per port)

Configurations upload/download 1

EAPoL flooding 16 on GS716T/

24 on GS724T (per port)

BPDU flooding 16 on GS716T/

24 on GS724T (per port)

Static multicast groups

Filter multicast control

8

1

Default

Disabled

N/A

Disabled

Disabled

Disabled

Disabled

A-4 Hardware Specifications and Default Values v1.0, July 2009

Appendix B

Configuration Examples

This chapter contains information about how to configure the following features:

• “Virtual Local Area Networks (VLANs)” on page B-1

• “Access Control Lists (ACLs)” on page B-4

• “Access Control Lists (ACLs)” on page B-4

• “802.1X” on page B-8

• “MSTP” on page B-11

Virtual Local Area Networks (VLANs)

A local area network (LAN) can generally be defined as a broadcast domain. Hubs, bridges, or switches in the same physical segment or segments connect all end node devices. End nodes can communicate with each other without the need for a router. Routers connect LANs together, routing the traffic to the appropriate port.

A virtual LAN (VLAN) is a local area network with a definition that maps workstations on some basis other than geographic location (for example, by department, type of user, or primary application). To enable traffic to flow between VLANs, traffic must go through a router, just as if the VLANs were on two separate LANs.

A VLAN is a group of PCs, servers, and other network resources that behave as if they were connected to a single network segment—even though they might not be. For example, all marketing personnel might be spread throughout a building. Yet if they are all assigned to a single

VLAN, they can share resources and bandwidth as if they were connected to the same segment.

The resources of other departments can be invisible to the marketing VLAN members, accessible to all, or accessible only to specified individuals, depending on how the IT manager has set up the

VLANs.

B-1 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

VLANs have a number of advantages:

• It is easy to do network segmentation. Users that communicate most frequently with each other can be grouped into common VLANs, regardless of physical location. Each group’s traffic is contained largely within the VLAN, reducing extraneous traffic and improving the efficiency of the whole network.

• They are easy to manage. The addition of nodes, as well as moves and other changes, can be dealt with quickly and conveniently from a management interface rather than from the wiring closet.

• They provide increased performance. VLANs free up bandwidth by limiting node-to-node and broadcast traffic throughout the network.

• They ensure enhanced network security. VLANs create virtual boundaries that can be crossed only through a router. So standard, router-based security measures can be used to restrict access to each VLAN.

Packets received by the switch are treated in the following way:

• When an untagged packet enters a port, it is automatically tagged with the port’s default

VLAN ID tag number. Each port has a default VLAN ID setting that is user configurable (the default setting is 1). The default VLAN ID setting for each port can be changed in the Port

PVID Configuration screen. See “Port VLAN ID Configuration” on page 3-14 .

• When a tagged packet enters a port, the tag for that packet is unaffected by the default VLAN

ID setting. The packet proceeds to the VLAN specified by its VLAN ID tag number.

• If the port through which the packet entered does not have membership with the VLAN specified by the VLAN ID tag, the packet is dropped.

• If the port is a member of the VLAN specified by the packet’s VLAN ID, the packet can be sent to other ports with the same VLAN ID.

• Packets leaving the switch are either tagged or untagged, depending on the setting for that port’s VLAN membership properties. A U for a given port means that packets leaving the switch from that port are untagged. Inversely, a T for a given port means that packets leaving the switch from that port are tagged with the VLAN ID that is associated with the port.

The example given in this section comprises numerous steps to illustrate a wide range of configurations to help provide an understanding of tagged VLANs.

VLAN Example Configuration

This example demonstrates several scenarios of VLAN use and describes how the switch handles tagged and untagged traffic.

B-2 Configuration Examples v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

In this example, you create two new VLANs, change the port membership for default VLAN 1, and assign port members to the two new VLANs:

1.

In the Basic VLAN Configuration screen (see “VLAN Configuration” on page 3-10 ), create the following VLANs:

• A VLAN with VLAN ID 10.

• A VLAN with VLAN ID 20.

2.

In the VLAN Membership screen (see “VLAN Membership Configuration” on page 3-12 ) specify the VLAN membership as follows:

• For the default VLAN with VLAN ID 1, specify the following members: port 7 (U) and port 8 (U).

• For the VLAN with VLAN ID 10, specify the following members: port 1 (U), port 2 (U), and port 3 (T).

• For the VLAN with VLAN ID 20, specify the following members: port 4 (U), port 5 (T), and port 6 (U).

3.

In the Port PVID Configuration screen (see “Port VLAN ID Configuration” on page 3-14 ), specify the PVID for ports g1 and g4 so that packets entering these ports are tagged with the port VLAN ID:

• Port g1: PVID 10

• Port g4: PVID 20

4.

With the VLAN configuration that you set up, the following situations produce results as described:

• If an untagged packet enters port 1, the switch tags it with VLAN ID 10. The packet has access to port 2 and port 3. The outgoing packet is stripped of its tag to leave port 2 as an untagged packet. For port 3, the outgoing packet leaves as a tagged packet with VLAN ID

10.

• If a tagged packet with VLAN ID 10 enters port 3, the packet has access to port 1 and port

2. If the packet leaves port 1 or port 2, it is stripped of its tag to leave the switch as an untagged packet.

• If an untagged packet enters port 4, the switch tags it with VLAN ID 20. The packet has access to port 5 and port 6. The outgoing packet is stripped of its tag to become an untagged packet as it leaves port 6. For port 5, the outgoing packet leaves as a tagged packet with VLAN ID 20.

Configuration Examples B-3 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Access Control Lists (ACLs)

ACLs ensure that only authorized users have access to specific resources while blocking off any unwarranted attempts to reach network resources.

ACLs are used to provide traffic flow control, restrict contents of routing updates, decide which types of traffic are forwarded or blocked, and provide security for the network. ACLs are normally used in firewall routers that are positioned between the internal network and an external network, such as the Internet. They can also be used on a router positioned between two parts of the network to control the traffic entering or exiting a specific part of the internal network. The added packet processing required by the ACL feature does not affect switch performance. That is, ACL processing occurs at wire speed.

Access lists are a sequential collection of permit and deny conditions. This collection of conditions, known as the filtering criteria, is applied to each packet that is processed by the switch or the router. The forwarding or dropping of a packet is based on whether or not the packet matches the specified criteria.

The GS716T/GS724T switch supports MAC ACLs and IP ACLs. The match criteria for MAC access lists can include the following information:

• Source MAC address

• Destination MAC address

• EtherType

• VLAN ID

• COS

The match criteria for IP access lists can include the following information:

• Source IP address

• Destination IP address

• IP Protocol

• IP Precedence

• IP DSCP

• Layer 4 Source Port

• Layer 4 Destination Port

Traffic filtering requires the following two basic steps:

B-4 Configuration Examples v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

Create an access list definition.

The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. Additionally, you can assign traffic that matches the criteria to a particular queue or redirect the traffic to a particular port. A default deny all rule is the last rule of every list.

2.

Apply the access list to an interface in the inbound direction.

GS716T/GS724T switches allow ACLs to be bound to VLANs, physical ports, and LAGs.

Binding an ACL to a VLAN is efficient because you can bind an ACL to a single VLAN that has multiple ports as members instead of binding an ACL to each port.

MAC ACL Example Configuration

The following example shows how to create a MAC-based ACL that permits Ethernet traffic from the Sales department on specified ports and denies all other traffic on those ports.

1.

From the MAC ACL screen, create an ACL with the name Sales_ACL for the Sales department of your network (See “MAC ACL” on page 5-40 ).

By default, this ACL will be bound on the inbound direction, which means the switch will examine traffic as it enters the port.

2.

From the MAC Rules screen, create a rule for the Sales_ACL with the following settings:

• ID: 1

• Action: Permit

• Assign Queue: 0

• Match Every: False

• CoS: 0

• Destination MAC: 01:02:1A:BC:DE:EF

• Destination MAC Mask: FF:FF:FF:FF:00:00

• Source MAC: 02:02:1A:BC:DE:EF

• Source MAC Mask: FF:FF:FF:FF:00:00

• VLAN ID: 2

For more information about MAC ACL rules, see “MAC Rules” on page 5-42 .

Configuration Examples B-5 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

3.

From the MAC Binding Configuration screen, assign the Sales_ACL to the interface gigabit ports 6, 7, 8, 9, and 10, and then click Apply (See “MAC Binding Configuration” on page 5-44 ).

Figure B-1

You can assign an optional sequence number to indicate the order of this access list relative to other access lists if any are already assigned to this interface and direction.

4.

The MAC Binding Table displays the interface and MAC ACL binding information (See

“MAC Binding Table” on page 5-45 ).

The ACL named Sales_ACL looks for Ethernet frames with destination and source MAC addresses and MAC masks defined in the rule. Also, the frame must be tagged with VLAN ID 2, which is the Sales department VLAN. The CoS value of the frame must be 0, which is the default value for Ethernet frames. Frames that match this criteria are permitted on interfaces 6, 7, 8, 9, and

10 and are assigned to the hardware egress queue 0, which is the default queue. All other traffic is explicitly denied on these interfaces. To allow additional traffic to enter these ports, you must add a new permit rule with the desired match criteria and bind the rule to interfaces 6, 7, 8, 9, and 10.

Standard IP ACL Example Configuration

The following example shows how to create an IP-based ACL that prevents any IP traffic from the

Finance department to be allowed on the ports that are associated with other departments. Traffic from the Finance department is identified by each packet’s network IP address.

B-6 Configuration Examples v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

1.

From the IP ACL screen, create a new IP ACL with an IP ACL ID of 1 (See “IP ACL” on page 5-47 ).

2.

From the IP Rules screen, create a rule for IP ACL 1 with the following settings:

• Rule ID: 1

• Action: Deny

• Assign Queue ID: 0 (optional - 0 is the default value)

• Match Every: False

• Source IP Address: 192.168.187.0

• Source IP Mask: 255.255.255.0

For more information about IP ACL rules, see “IP Rules” on page 5-48 .

3.

Click Add .

4.

From the IP Rules screen, create a rule for IP ACL 2 with the following settings:

• Rule ID: 2

• Action: Permit

• Match Every: True

5.

Click Add .

6.

From the IP Binding Configuration page, assign ACL ID 1 to the interface gigabit ports 14, 15,

16, 17, 18, 19, and 20, and assign a sequence number of 1 (See “IP Binding Configuration” on page 5-54 ).

By default, this IP ACL is bound on the inbound direction, so it examines traffic as it enters the switch.

7.

Click Apply .

8.

From the IP Binding Configuration page, assign ACL ID 2 to the interface gigabit ports 14, 15,

16, 17, 18, 19, and 20, and assign a sequence number of 2.

9.

Click Apply .

10.

Use the IP Binding Table screen to view the interfaces and IP ACL binding information (See

“IP Binding Table” on page 5-56 ).

Configuration Examples B-7 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

The IP ACL in this example matches all packets with the source IP address and subnet mask of the

Finance department's network and deny it on the Ethernet interfaces 14, 15, 16, 17, 18, 19, and 20 of the switch. The second rule permits all non-Finance traffic on the ports. The second rule is required because there is an explicit deny all rule as the lowest priority rule.

802.1X

Local Area Networks (LANs) are often deployed in environments that permit unauthorized devices to be physically attached to the LAN infrastructure, or permit unauthorized users to attempt to access the LAN through equipment already attached. In such environments, it may be desirable to restrict access to the services offered by the LAN to those users and devices that are permitted to use those services.

Port-based network access control makes use of the physical characteristics of LAN infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics and of preventing access to that port in cases in which the authentication and authorization process fails. In this context, a port is a single point of attachment to the LAN, such as ports of MAC bridges and associations between stations or access points in IEEE 802.11 Wireless LANs.

The IEEE 802.11 standard describes an architectural framework within which authentication and consequent actions take place. It also establishes the requirements for a protocol between the authenticator (the system that passes an authentication request to the authentication server) and the supplicant (the system that requests authentication), as well as between the authenticator and the authentication server.

The GS716T/GS724T switch supports a guest VLAN, which allows unauthenticated users to have limited access to the network resources.

Note: You can use QoS features to provide rate limiting on the guest VLAN to limit the network resources the guest VLAN provides.

Another 802.1X feature is the ability to configure a port to Enable/Disable EAPoL packet forwarding support.You can disable or enable the forwarding of EAPoL when 802.1X is disabled on the device.

B-8 Configuration Examples v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

The ports of an 802.1X authenticator switch provide the means in which it can offer services to other systems reachable via the LAN. Port-based network access control allows the operation of a switch’s ports to be controlled in order to ensure that access to its services is only permitted by systems that are authorized to do so.

Port access control provides a means of preventing unauthorized access by supplicants to the services offered by a system. Control over the access to a switch and the LAN to which it is connected can be desirable in order to restrict access to publicly accessible bridge ports or to restrict access to departmental LANs.

Access control is achieved by enforcing authentication of supplicants that are attached to an authenticator's controlled ports. The result of the authentication process determines whether the supplicant is authorized to access services on that controlled port.

A Port Access Entity (PAE) is able to adopt one of two distinct roles within an access control interaction:

1. Authenticator : A Port that enforces authentication before allowing access to services available via that Port.

2. Supplicant : A Port that attempts to access services offered by the Authenticator.

Additionally, there exists a third role:

3. Authentication server : Performs the authentication function necessary to check the credentials of the Supplicant on behalf of the Authenticator.

All three roles are required in order to complete an authentication exchange.

GS716T/GS724T switches support the Authenticator role only, in which the PAE is responsible for communicating with the Supplicant. The Authenticator PAE is also responsible for submitting the information received from the Supplicant to the Authentication Server in order for the credentials to be checked, which will determine the authorization state of the Port. The Authenticator PAE controls the authorized/unauthorized state of the controlled Port depending on the outcome of the authentication process, such as Local and/or RADIUS.

Configuration Examples v1.0, July 2009

B-9

GS716Tv2 and GS724Tv3 Software Administration Manual

Supplicant

Authenticator

Switch

Authentication

Server (RADIUS)

192.168.10.23

Supplicant

Figure B-2

802.1X Example Configuration

This example shows how to configure the switch so that 802.1X-based authentication is required on the ports in a corporate conference room (g21–g24). These ports are available to visitors and need to be authenticated before granting access to the network. The authentication is handled by an external RADIUS server. When the visitor is successfully authenticated, traffic is automatically assigned to the guest VLAN. This example assumes that a VLAN has been configured with a

VLAN ID of 150 and VLAN Name of Guest.

1.

From the Port Authentication screen, select ports g21, g22, g23, and g24.

2.

From the Port Control menu, select Unauthorized.

The Port Control setting for all other ports where authentication is not needed should be Auto or Authorized. When the Port Control setting is Authorized, the port is unconditionally put in a force-Authorized state and does not require any authentication. When the Port Control setting is Auto, the authenticator PAE sets the controlled port mode

3.

In the Guest VLAN field for ports g21–g24, enter 150 to assign these ports to the guest

VLAN.

You can configure additional settings to control access to the network through the ports. See

“Port Security Interface Configuration” on page 5-35 for information about the settings.

4.

Click Apply .

5.

From the 802.1X Configuration screen, set the Port Based Authentication State and Guest

VLAN Mode to Enable, and then click Apply (See “Port Security Configuration” on page 5-34 ).

B-10 Configuration Examples v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

This example uses the default values for the port authentication settings, but there are several additional settings that you can configure. For example, the EAPOL Flood Mode field allows you to enable the forwarding of EAPoL frames when 802.1X is disabled on the device.

6.

From the RADIUS Server Configuration screen, configure a RADIUS server with the following settings:

• Server Address: 192.168.10.23

• Secret Configured: Yes

• Secret: secret123

• Active: Primary

For more information, see “RADIUS Configuration” on page 5-3 .

7.

Click Add .

8.

From the Authentication List screen, configure the default List to use RADIUS as the first authentication method (See “Authentication List Configuration” on page 5-13 ).

This example enables 802.1X-based port security on the GS716T/GS724T switch and prompts the hosts connected on ports g21-g24 for a 802.1X-based authentication. The switch passes the authentication information to the configured RADIUS server. The RADIUS server must be configured to allow access on the Guest VLAN.

MSTP

Spanning Tree Protocol (STP) runs on bridged networks to help eliminate loops. If a bridge loop occurs, the network can become flooded with traffic. IEEE 802.1s Multiple Spanning Tree

Protocol (MSTP) supports multiple instances of Spanning Tree to efficiently channel VLAN traffic over different interfaces. Each instance of the Spanning Tree behaves in the manner specified in IEEE 802.1w, Rapid Spanning Tree, with slight modifications in the working but not the end effect (chief among the effects is the rapid transitioning of the port to the Forwarding state).

The difference between the RSTP and the traditional STP (IEEE 802.1d) is the ability to configure and recognize full duplex connectivity and ports that are connected to end stations, resulting in rapid transitioning of the port to the Forwarding state and the suppression of Topology Change

Notification. These features are represented by the parameters pointtopoint and edgeport . MSTP is compatible to both RSTP and STP. It behaves appropriately to STP and RSTP bridges.

A MSTP bridge can be configured to behave entirely as a RSTP bridge or a STP bridge. So, an

IEEE 802.1s bridge inherently also supports IEEE 802.1w and IEEE 802.1d.

Configuration Examples B-11 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

The MSTP algorithm and protocol provides simple and full connectivity for frames assigned to any given VLAN throughout a Bridged LAN comprising arbitrarily interconnected networking devices, each operating MSTP, STP or RSTP. MSTP allows frames assigned to different VLANs to follow separate paths, each based on an independent Multiple Spanning Tree Instance (MSTI), within Multiple Spanning Tree (MST) Regions composed of LANs and or MSTP Bridges. These

Regions and the other Bridges and LANs are connected into a single Common Spanning Tree

(CST). [IEEE DRAFT P802.1s/D13]

MSTP connects all Bridges and LANs with a single Common and Internal Spanning Tree (CIST).

The CIST supports the automatic determination of each MST region, choosing its maximum possible extent. The connectivity calculated for the CIST provides the CST for interconnecting these Regions, and an Internal Spanning Tree (IST) within each Region. MSTP ensures that frames with a given VLAN ID are assigned to one and only one of the MSTIs or the IST within the

Region, that the assignment is consistent among all the networking devices in the Region and that the stable connectivity of each MSTI and IST at the boundary of the Region matches that of the

CST. The stable active topology of the Bridged LAN with respect to frames consistently classified as belonging to any given VLAN thus simply and fully connects all LANs and networking devices throughout the network, though frames belonging to different VLANs can take different paths within any Region. [IEEE DRAFT P802.1s/D13]

All bridges, whether they use STP, RSTP or MSTP, send information in configuration messages via Bridge Protocol Data Units (BPDUs) to assign port roles that determine each port’s participation in a fully and simply connected active topology based on one or more spanning trees.

The information communicated is known as the spanning tree priority vector. The BPDU structure for each of these different protocols is different. A MSTP bridge will transmit the appropriate

BPDU depending on the received type of BPDU from a particular port.

An MST Region comprises of one or more MSTP Bridges with the same MST Configuration

Identifier, using the same MSTIs, and which have no Bridges attached that cannot receive and transmit MSTP BPDUs. The MST Configuration Identifier has the following components:

1.

Configuration Identifier Format Selector

2.

Configuration Name

3.

Configuration Revision Level

4.

Configuration Digest - 16-byte signature of type HMAC-MD5 created from the MST

Configuration Table (a VLAN ID to MSTID mapping)

As there are Multiple Instances of Spanning Tree, there is a MSTP state maintained on a per-port, per-instance basis (or on a per port per VLAN basis - as any VLAN can be in one and only one

MSTI or CIST). For e.g., port A can be forwarding for instance 1 while discarding for instance 2.

The port states have changed since IEEE 802.1d specification.

B-12 Configuration Examples v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

To support multiple spanning trees, a MSTP bridge has to be configured with an unambiguous assignment of VLAN IDs (VIDs) to spanning trees. This is achieved by:

1.

Ensuring that the allocation of VIDs to FIDs is unambiguous.

2.

Ensuring that each FID supported by the Bridge is allocated to exactly one Spanning Tree

Instance.

The combination of VID to FID and then FID to MSTI allocation defines a mapping of VIDs to spanning tree instances, represented by the MST Configuration Table.

With this allocation we ensure that every VLAN is assigned to one and only one MSTI. The CIST is also an instance of spanning tree with a MSTID of 0.

An instance may occur that has no VIDs allocated to it, but every VLAN must be allocated to one of the other instances of spanning tree.

The portion of the active topology of the network that connects any two bridges in the same MST

Region traverses only MST bridges and LANs in that region, and never Bridges of any kind outside the Region, in other words connectivity within the region is independent of external connectivity.

MSTP Example Configuration

This example shows how to create an MSTP instance from the GS716T/GS724T switch. The example network has three different GS716T/GS724T switches that serve different locations in the network. In this example, ports g1–g5 are connected to host stations, so those links are not subject to network loops. Ports g6-g10 are connected across switches 1, 2 and 3.

Configuration Examples v1.0, July 2009

B-13

GS716Tv2 and GS724Tv3 Software Administration Manual

Ports g1-g5

Connected to Hosts

Ports g1-g5

Connected to Hosts

Ports g6-g10

Connected to Switch 2 and 3

Switch 1

Root Bridge

Switch 2

Ports g6-g10

Connected to

Switch 1 and 3

Ports g6-g10

Connected to Switch 1 and 2

Switch 3

Ports g1-g5

Connected to Hosts

Figure B-3

Perform the following procedures on each switch to configure MSTP:

1.

Use the VLAN Configuration screen to create VLANs 300 and 500 (see “VLAN

Configuration” on page 3-10 ).

2.

Use the VLAN Membership screen to include ports g1–g10 and ports g15–g24 as tagged (T) or untagged (U) members of VLAN 300 and VLAN 500 (see “VLAN Membership

Configuration” on page 3-12 ).

3.

From the STP Configuration screen, enable the Spanning Tree State option (see “STP Switch

Configuration/Status” on page 3-17 ).

Use the default values for the rest of the STP configuration settings. By default, the STP

Operation Mode is MSTP and the Configuration Name is the switch MAC address.

4.

From the CST Configuration screen, set the Bridge Priority value for each of the three switches to force Switch 1 to be the root bridge:

• Switch 1: 4096

• Switch 2: 12288

• Switch 3: 20480

B-14 Configuration Examples v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Note: Bridge priority values are multiples of 4096.

If you do not specify a root bridge and all switches have the same Bridge Priority value, the switch with the lowest MAC address is elected as the root bridge (see “CST Configuration” on page 3-19 ).

5.

From the CST Port Configuration screen, select ports g1–g10 and g15–g24 and select Enable from the STP Status menu (see “CST Port Configuration” on page 3-21 ).

6.

Click Apply .

7.

Select ports g1–g5 (edge ports), and select Enable from the Fast Link menu.

Since the edge ports are not at risk for network loops, ports with Fast Link enabled transition directly to the Forwarding state.

8.

Click Apply .

You can use the CST Port Status screen to view spanning tree information about each port.

9.

From the MST Configuration screen, create a MST instances with the following settings:

• MST ID: 1

• Priority: Use the default (32768)

• VLAN ID: 300

For more information, see “MST Configuration” on page 3-26 .

10.

Click Add .

11.

Create a second MST instance with the following settings

• MST ID: 2

• Priority: 49152

• VLAN ID: 500

12.

Click Add .

In this example, assume that Switch 1 has become the Root bridge for the MST instance 1, and

Switch 2 has become the Root bridge for MST instance 2. Switch 3 has hosts in the Sales department (ports g1, g2 and g3) and in the HR department (ports g4 and g5). Switches 1 and 2

Configuration Examples B-15 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual also have hosts in the Sales and HR departments. The hosts connected from Switch 2 use VLAN

500, MST instance 2 to communicate with the hosts on Switch 3 directly. Likewise, hosts of

Switch 1 use VLAN 300, MST instance 1 to communicate with the hosts on Switch 3 directly.

The hosts use different instances of MSTP to effectively use the links across the switch. The same concept can be extended to other switches and more instances of MSTP.

B-16 v1.0, July 2009

Configuration Examples

GS716Tv2 and GS724Tv3 Software Administration Manual

Index

A

Alert

6-18

,

6-20

authentication enable

1-15

C

Certificate

5-18

Changing the password

5-2

Configuration

802.1X

5-23

Access Control Lists

5-39

Access Profile

5-19

Access Rule

5-21

Authentication List

5-13

Community

2-17

CoS

4-2

Dual Image

7-10

Dynamic Address

3-49

Global

3-32

Green Ethernet

2-15

HTTP

5-15

IGMP Snooping

3-32

LACP

3-8

LACP Port

3-9

LAG

3-5

LLDP

2-23

MAC Filter

5-30

Management Access

5-15

MST Port

3-27

Network Settings on the Administrative

System

1-6

password

5-2

Port Security

5-34

Port VLAN ID

3-14

QoS

4-1

RADIUS

5-3

Global

5-3

Secure HTTP

5-16

SNMP v3 User

2-21

SNTP Server

2-10

Standard IP ACL Example

B-6

STP

3-16

TACACS+

5-10

Time

2-6

Trap

2-19

VLAN

3-10

VLAN example

B-2

VLAN Port Membership

3-12

CoS

4-2

Critical

6-18

,

6-20

Customer support

1-ii

D

Debug

6-18

,

6-20

Default Gateway

2-4

defaults

A-1

CoS

B-6

factory

5-2

DES

1-15

Device View

1-13

DoS

2-13

download a file

7-8

files via HTTP

7-6

from a remote system

7-5

software

7-6

Index-1 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Dual Image Status

7-12

E

EAP

6-12

EAPOL

6-13

Emergency

6-18

,

6-20

Error

6-18

,

6-20

F

file management

7-10

firmware upgrade

1-7

G

getting started

1-1

Green Ethernet

2-15

H

Help

HTML-based

1-12

HTML

1-11

HTTP

5-15

over an encrypted Secure Sockets Layer

5-16

Secure

5-15

I

HTTP File Download

7-8

ICMP

2-13

IEEE 802.11x

B-8

IEEE 802.1AB

2-23

IEEE 802.1d

3-16

,

3-18

,

3-49

IEEE 802.1p

3-16

IEEE 802.1Q

3-10

,

3-15

,

3-16

,

3-17

IEEE 802.1s

3-17

,

3-18

IEEE 802.1w

3-16

,

3-18

IEEE 802.1X

5-3

IEEE 802.3 flow control

3-4

IEEE 802.3x

3-4

IGMP

3-32

Informational

6-18

,

6-20

Index-2 v1.0, July 2009

Interface Queue Configuration

4-5

IP DSCP

4-2

Mapping

4-8

ipaddr

1-15

L

LACP

Port Configuration

3-9

System Priority

3-8

LAG interface

3-5

LAG VLAN

3-5

LAGPDUs

3-5

LAGs

3-5

Membership

3-7

Static

3-5

LLDP

2-23

Local Information

2-27

Neighbors Information

2-30

Port Settings

2-24

M

MAC

2-2

,

2-29

,

3-3

,

3-24

,

3-32

ACL

5-40

Address Table

3-50

bridge identifier

3-27

CPU Management Interface

1-16

Dynamic Address

3-49

Filter Summary

5-32

MFDB Table

3-37

multicast destination

3-35

Rules

5-42

Searching Address Table

3-47

Static Address

3-52

Management VLAN ID

2-4

MD5

2-5

MIBs

1-15

N

Notice

6-18

,

6-20

GS716Tv2 and GS724Tv3 Software Administration Manual

P

password change

5-2

login

5-2

new

5-2

reset

5-2

Ping

7-13

port authentication

5-22

summary

5-28

Profiles

5-13

Q

QoS

4-1

802.1p to Queue Mapping

4-6

R

RADIUS

5-1

authentication port

5-8

authentication server

5-6

server

5-3

registering

1-ii

Reset

7-1

button

5-2

Configuration to Defaults

7-2

Password

5-2

Switch

7-1

RSTP

3-16

S

Security MAC Address

5-37

server

HTTP

5-15

Simple Network Time Protocol

2-5

slot/port

1-16

SmartWizard Discovery in a Network with a DHCP Server

1-3

in a Network without a DHCP Server

1-

4

Utilities

1-6

utility

1-2

SNMP using

1-14

V1/V2

2-16

v3

2-21

SNTP

2-5

Global Status

2-8

Server Configuration

2-10

Server Status

2-11

Specifications

A-1

SSL

5-16

status HTML pages

1-11

storm control

5-33

STP

3-16

Status

3-17

Stratum

0

2-5

1

2-5

2

2-5

Support

1-ii

T

T1

2-5

T2

2-5

T3

2-5

T4

2-5

TACACS+

5-11

folder

5-10

settings

5-10

Technical Support

1-ii

TFTP

1-7

Time

2-5

Clock Source

2-7

configure through SNTP

2-7

Date

2-7

GMT

2-8

levels

2-5

Index-3 v1.0, July 2009

GS716Tv2 and GS724Tv3 Software Administration Manual

Local

2-6

UTC

2-7

Zone

2-6

Time Zone

2-8

TraceRoute

7-14

Traffic Control

5-30

Trap

Flags

2-20

Manager

2-20

U

Unicast

2-5

upload a file

7-5

upload configuration

7-3

V

VLAN

3-10

ID

3-10

managing

3-10

Port VLAN ID

3-14

W

Warning

6-18

,

6-20

Web interface panel

1-11

Index-4 v1.0, July 2009

advertisement

Related manuals

Download PDF

advertisement

Table of contents