ES-3024 - Switch réseau ZYXEL - Free user manual and instructions
Find the device manual for free ES-3024 ZYXEL in PDF.
Download the instructions for your Switch réseau in PDF format for free! Find your manual ES-3024 - ZYXEL and take your electronic device back in hand. On this page are published all the documents necessary for the use of your device. ES-3024 by ZYXEL.
USER MANUAL ES-3024 ZYXEL
Dimension ES-3024 Ethernet Switch
Copyright Copyright © 2003 by ZyXEL Communications Corporation
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patents rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Dimension ES-3024 Ethernet Switch
ZyXEL Limited Warranty
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two (2) years from the date of purchase. During the warranty period and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
ZyXEL Limited Warranty ïil
Dimension ES-3024 Ethernet Switch
Interference Statements and Warnings
FCC Interference Statement
This switch complies with Part 15 of the FCC rules. Operation is subject to the following two conditions:
(1) This switch may not cause harmful interference.
(2) This switch must accept any interference received, including interference that may cause undesired operations. FCC Warning
This equipment has been tested and found to comply with the limits for a Class A digital switch, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.
This is a class A product. In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures.
Taiwanese BSMI (Bureau of Standards, Metrology and Inspection) À Warning:
EÉÈRE SÆFANÉNENN, AREAS, HéÉSRTÉ, HESÉRAT,
Select your product from the drop-down list box on the ZyXEL home page to go to that product's page. Select the certification you wish to view from this page. Registration
Register your product online for free future product updates and information at www.zyxel.com for global products, or at www.us.zyxel.com for North American products.
iv Interference Statements and Warnings
Dimension ES-3024 Ethernet Switch
Contacting Customer Support
If you have questions about your ZyXEL product or desire assistance, contact ZyXEL Communications Corporation offices worldwide, in one of the following ways:
When you contact your customer support representative, have the following information ready:
+ Product model and serial number.
+ Firmware version information.
+ Warranty information.
+ Date you received your product.
+ Brief description of the problem and the steps you took to solve it.
METHOD E-MAIL TELEPHONE/FAX | WEB SITE/ FTP SITE REGULAR MAIL SUPPORT/SALES LOCATION WORLDWIDE | support@zyxel.com.tw | +886-3-578-3942 | www.zyxel.com ZyXEL Communications www.europe.zyxel.com | Corp., 6 Innovation Road Il, Science-Based ftp.zyxel.com
Industrial Park, Hsinchu 300, Taiwan
ZyXEL Limited Warranty
Interference Statements and Warnings
Chapter 1 Getting to Know the ES-3024
Chapter 2 Hardware Installation...
3.5 Front Panel LEDs...
6.7 IP Setup. 6.8 Port Setup
7.1 Introduction to IEEE 802.1Q Tagged VLAN 7.2 802.1Q VLAN.... 73 Introduction to Port-based VLANS …..
Chapter 8 Static MAC Forward Setup.
8.1 Introduction to Static MAC Forward Setup
8.2 Configuring Static MAC Forwarding 83 Viewing and Editing Static MAC Forwarding Rule
Chapter 9 Filtering …
9.1 Introduction to Filtering
9.3 Viewing and Editing Filter Rules
11.1 Introduction to Bandwidth Control
11.2 Viewing and Editing a Bandwidth Control Rule.
Part V Chapter 12 Broadcast Storm Control
12.1 Introducing Broadcast Storm Control
Chapter 13 Mirroring
13.1 Introduction to Port Mirroring
13.2 Port Mirroring Configuration
Chapter 14 Link Aggregation
142 Link Aggregation Protocol Status
Chapter 15 Port Authentication..
20.2 Firmware Upgrade...
20.4 Backing Up a Configuration File …
viii Table of Contents
Dimension ES-3024 Ethernet Switch
20.6 Reboot System …
20.7 Command Line FTP Chapter 21 Diagnostic.
21.1 Diagnostic … Chapter 22 Cluster Management
22.1 Introduction to Cluster Management.
Chapter 25 Introduction to CLI
25.1 Command Line Interface Overview …
25.2 Command Summary
Chapter 26 Command Examples
26.1 Commonly Used Commands Overview
26.3 sys cluster Commands.…
27.5 vlanlq svlan active
27.6 vlaniq svlan inactive
27.7 vlanlq svlan list...
Table of Contents ix
Dimension ES-3024 Ethernet Switch
27.8 vlanlq vlan list... sienne 27-9
Part VIII A Product Specifications seen A1 B Index... seen B-1
Figure 1-3 High Performance Switched Workgroup Application.
Figure 1-4 VLAN Workgroup Application.
Figure 1-5 Shared Server Using VLAN Example
Figure 2-1 Attaching Rubber Feet
Figure 2-2 Attaching Mounting Brackets and Screws…
Figure 2-3 Mounting the ES to an EIA standard 19-inch rack …
Figure 3-1 ES-3024 Front Panel...
Figure 3-2 Loosening the Screws and Removing the Cover Plate …
Figure 3-3 Inserting An Example Module...
Figure 3-4 ES-3024 AC Unit Rear Panel Figure 3-5 ES-3024 DC Unit Rear Panel ….
Figure 3-6 Front Panel LEDs
Figure 3-7 Stacking Example 1
Figure 4-4 Resetting the Switch: Via Console Port.
Figure 6-3 Switch Setup.
Figure 6-4 Port Setup …
Figure 7-1 Port VLAN Trunking.
Lists of Figures and Charts xi
Dimension ES-3024 Ethernet Switch
Figure 7-2 Selecting a VLAN Type
Figure 7-7 VIDI Example Screen.
Figure 7-8 Port Based VLAN Setup (All Connected)
Figure 7-9 Port Based VLAN Setup (Port isolation)...
Figure 8-1 Static MAC Forwarding
Figure 8-2 Static MAC Forwarding: Summary Table.
Figure 9-1 Filtering
Figure 12-1 Broadcast Storm Control
Figure 13-1 Mirroring: Mirror Port Setting.…
Figure 13-2 Mirroring: Configuring a Mirroring Rule...
Figure 13-3 Mirroring: Summary Table
Figure 14-1 Aggregation ID.
Figure 14-2 Link Aggregation: Link Aggregation Protocol Status
xii Lists of Figures and Charts
Figure 17-5 Access Control: Logins..
Figure 17-7 Access Control: Remote Management.
Figure 18-1 Queuing Method
Figure 19-1 Static Routing...
Figure 19-2 Static Routing: Summary Table …
Figure 20-1 Maintenance.
Figure 20-2 Firmware Upgrade
Figure 20-3 Restore Configuration...
Figure 20-4 Backup Configuration.
Figure 22-2 Cluster Management Status …
Figure 22-3 Cluster Member Web Configuration Screen.
Figure 22-4 Example: Uploading Firmware to a Cluster Member Switch.
Figure 22-5 Configuring Cluster Management
Figure 26-2 sys version Command Example.
Figure 26-8 sys cluster status Command Example…
Figure 26-9 sys cluster showMember Command Example
Lists of Figures and Charts xiii
Dimension ES-3024 Ethernet Switch
Figure 27-3 Deleting Default VLAN Example
Figure 27-12 Modifying the Static VLAN Example.
Figure 27-13 vlan1q svlan delentry Command Example…
Figure 27-14 vlan1q svlan list Command Example
Figure 27-15 vlan1q svlan list Command Example
xiv Lists of Figures and Charts
Table 6-3 Switch Setup.
Table 8-2 Static MAC Forwarding: Summary Table
Table 14-1 Link Aggregation Groups.
Table 14-2 Link Aggregation: Link Aggregation Protocol Status …
Table 14-3 Link Aggregation: Configuration
Table 15-1 Port Authentication: RADIUS...
Table 15-2 Port Authentication: 802.1x
Table 16-1 Port Security.
Table 17-1 Access Control Summary
Table 17-2 SNMP Commands.
Table 19-1 Static Routing....
Table 19-2 Static Routing: Summary Table …
Table 20-1 Filename Conventions.
Table 20-2 General Commands for GUI-based FTP Clients.
Table 21-1 Diagnostic
Table 22-1 ZyXEL Clustering Management Specifications.
Table 22-2 Cluster Management Status.
Table 22-3 FTP Upload to Cluster member Example
Table 25-3 Command Summary: exit
Congratulations on your purchase from the Dimension series of Ethernet switches.
This preface introduces you to the ES-3024 and discusses the conventions of this User’s Guide. It also provides information on other related documentation.
There are two ES-3024 models. The ES-3024 DC model requires DC power supply input of -48 VDC to -60 VDC, 1.84A Max. The ES-3024 AC model requires 100-240VAC/1.5A power.
All figures in this guide display the ES-3024 AC model unless specifically noted otherwise.
The ES-3024 Ethernet switch is a managed switch with features ideally suited in any environment with unshielded twisted pair (UTP) wiring. It can deliver broadband IP services to:
>. Multi-tenant unit (MTU) buildings (hotels, motels, resorts, residential multi-dwelling units, office buildings, educational establishments, etc.) > Public facilities (convention centers, airports, plazas, train stations, etc.) > Enterprises. It can also be deployed as a mini-POP (point-of-presence) in a building basement delivering 10/100Mbps data service over Category 5 wiring to each customer.
General Syntax Conventions
> This guide shows you how to configure the switch using the web configurator and CLI commands. See the online HTML help for information on individual web configurator screens.
> Mouse action sequences are denoted using a comma. For example, click Start, Settings, Control Panel, Network means first you click Start, click or move the mouse pointer over Settings, then click or move the mouse pointer over Control Panel and finally click (or double-click) Network.
> “Enter” means for you to type one or more characters. “Select” or “Choose” means for you to use one of the predefined choices.
> Predefined choices are in Bold Arial font.
> Button and field labels, links and screen names in are in Bold Times New Roman font.
> For brevity’s sake, we will use “e.g.” as shorthand for “for instance”, and “i.e.” as shorthand for “that is” or
“in other words” throughout this manual. Related Documentation Web Configurator Online HTML help
The online HTML help shows you how to use the web configurator to configure individual screens. More background information can be found in this UG.
The ZyXEL download library at www.zyxel.com contains additional support documentation as well as an online glossary of networking terms.
Help us help you. E-mail all User Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you.
Features and Applications
Part I Features And Applications
This part acquaints you with the features and applications of the ES-3024.
Dimension ES-3024 Ethernet Switch
Chapter 1 Getting to Know the ES-3024
This chapter describes the key features, benefits and applications of the ES-3024.
The ES-3024 is a stand-alone Ethernet switch with 24 10/100Mbps ports, two slots for electrical or optical uplink modules and one slot for a stacking module.
With its built-in web configurator, managing and configuring the switch is easy. From cabinet management to port- level control and monitoring, you can visually configure and manage your network via the web browser. Just click your mouse instead of typing cryptic command strings. In addition, the switch can also be managed via Telnet, the console port, or third-party SNMP management.
The next two sections describe the hardware and firmware features of the ES-3024.
1.1.1 Hardware Features
The ES-3024 DC model requires DC power supply input of -48 VDC to -60 VDC, 1.84A Max. The ES-3024 AC model requires 100-240VAC/1.5A power.
24 10/100 Mbps Fast Ethernet Ports
Connect up to 24 computers or switches to the 10/100Mbps auto-negotiating, automatic cable sensing (auto-MDIX) Ethernet RJ-45 ports. All Ethernet ports support:
> IEEE 802.3/3u/3z/3ab standards > Back pressure flow control in half duplex mode > IEEE 802.3x flow control in full duplex mode Two Slots for Uplink Modules The modules allow the ES-3024 to connect to another WAN switch or daisy-chain to other switches. One Slot for Stacking Module Up to eight switches may be stacked using stacking modules. Console Port Use the console port for local management of the switch.
The fans cool the ES-3024 sufficiently to allow reliable operation of the switch in even poorly ventilated rooms or basements.
Getting to Know the ES-3024 1-1
Dimension ES-3024 Ethernet Switch
1.1.2 Firmware Features
> IP Host (No routing) > Telnet for configuration and monitoring > SNMP for management
> Ethernet MIBs RFC 1643 > Bridge MIBs RFC 1493 > SMIRFC1155 > RMON RFC 1757 o SNMPv2, SNMPv2c RFC 2674 Management > Web configurator >. Command-line interface locally via console port or remotely via Telnet > SNMP System Monitoring e System status (link status, rates, statistics counters) e SNMP e __ Temperatures, voltage, fan speed reports and alarms
° Port Mirroring allows you to analyze one port’s traffic from another.
Security > System management password protection > Port-based VLAN > IEEE 802.1Q VLAN > 802.1x Authentication > Limit dynamic port MAC address learning > Static MAC address filtering
Port Link Aggregation
The ES-3024 adheres to the 802.3ad standard for static and dynamic port link aggregation.
1-2 Getting to Know the ES-3024
Dimension ES-3024 Ethernet Switch
> The ES-3024 supports rate limiting in 1Kbps increments allowing you to create different service plans
> The ES-3024 supports IGMP snooping enabling group multicast traffic to be only forwarded to ports that are members of that group; thus allowing you to significantly reduce multicast traffic passing through your switch.
> Broadcast storm control
> Four priority queues so you can ensure mission-critical data gets delivered on time.
> Follows the IEEE 802.1p priority setting standard based on source/destination MAC addresses. STP (Spanning Tree Protocol) / RSTP (Rapid STP)
(R)STP detects and breaks network loops and provides backup links between switches, bridges or routers. It allows a switch to interact with other (R)STP -compliant switches in your network to ensure that only one path exists between any two stations on the network.
Cluster Management allows you to manage switches through one switch, called the cluster manager. The switches must be directly connected and be in the same VLAN group so as to be able to communicate with one another.
This section shows a few examples of using the ES-3024 in various network environments.
1.2.1 Backbone Application In this application, the switch is an ideal solution for small networks where rapid growth can be expected in the near future.
The switch can be used standalone for a group of heavy traffic users. You can connect computers directly to the switch’s port or connect other switches to the ES-3024.
In this example, all computers connected directly or indirectly to the ES-3024 can share super high-speed applications on the Gigabit server.
To expand the network, simply add more networking devices such as switches, routers, firewalls, print servers etc.
Getting to Know the ES-3024 1-3
Dimension ES-3024 Ethernet Switch
1.2.2 Bridging Example
In this example application the switch is the ideal solution for different company departments to connect to the corporate backbone. It can alleviate bandwidth contention and eliminate server and network bottlenecks. All users that need high bandwidth can connect to high-speed department servers via the switch. You can provide a super- fast uplink connection by selecting from an array of uplink modules compatible with the ES-3024.
Moreover, the switch eases supervision and maintenance by allowing network managers to centralize multiple servers at a single location.
1-4 Getting to Know the ES-3024
Dimension ES-3024 Ethernet Switch
Figure 1-2 Bridging Application
Full-duplex mode operation only applies to point-to-point access (for example, when attaching the switch to a workstation, server, or another switch). When connecting to hubs, use a standard cascaded connection set at half-duplex operation.
1.2.3 High Performance Switched Workgroup Example
The switch is ideal for connecting two power workgroups that need high bandwidth. In the following example, use trunking to connect these two power workgroups.
Switching to higher-speed LANS such as FDDI or ATM is not feasible for most people due to the expense of replacing all existing Ethernet cables and adapter cards, restructuring your network and complex maintenance.
The ES-3024 can provide the same bandwidth as FDDI and ATM at much lower cost while still being able to use existing adapters and switches. Moreover, the current LAN structure can be retained as all ports can freely communicate with each other.
Getting to Know the ES-3024 1-5
Dimension ES-3024 Ethernet Switch
Figure 1-3 High Performance Switched Workgroup Application
1.2.4 IEEE 802.1Q VLAN Application Examples
This section shows a workgroup and a shared server example using 802.1Q tagged VLANSs. For more information on VLANS, see the Switch Setup and VLAN Setup chapters in this User’s Guide. A VLAN (Virtual Local Area Network) allows a physical network to be partitioned into multiple logical networks. Stations on a logical network belong to one group. A station can belong to more than one group. With VLAN, a station cannot directly talk to or hear from stations that are not in the same group(s) unless such traffic first goes through a router.
Tag-based VLAN Workgroup Example
Ports in the same VLAN group share the same broadcast domain thus increase network performance through reduced broadcast traffic. VLAN groups can be modified at any time by adding, moving or changing ports without any re-cabling.
1-6 Getting to Know the ES-3024
Dimension ES-3024 Ethernet Switch
VLAN Shared Server Example
Shared resources such as a server can be used by all ports in the same VLAN as the server, as shown in the following example. In this example, only ports that need access to the server need belong to VLAN 3 while they
can belong to other VLAN groups too.
Getting to Know the ES-3024 1-7
Dimension ES-3024 Ethernet Switch
Figure 1-5 Shared Server Using VLAN Example
Hardware Installation & Connections
Part II Hardware Installation & Connections
| This part acquaints you with installation scenarios of the ES-3024, instructs you on how to make | the hardware connections including installing/removing modules, shows some stacking/uplink examples and explains the front panel LEDs.
Dimension ES-3024 Ethernet Switch
Chapter 2 Hardware Installation
This chapter shows two switch installation scenarios.
2.1 Installation Scenarios
The switch can be placed on a desktop or rack-mounted on a standard EIA rack. Use the rubber feet in a desktop installation and the brackets in a rack-mounted installation.
For proper ventilation, allow at least 4 inches (10 cm) of clearance at the front and 3.4 inches (8 cm) at the back of the switch. This is especially important for enclosed rack installations.
2.1.1 Desktop Installation Procedure
Step 1. Make sure the switch is clean and dry.
Step 2. Set the switch on a smooth, level surface strong enough to support the weight of the switch and the connected cables. Make sure there is a power outlet nearby.
Step 3. Make sure there is enough clearance around the switch to allow air circulation and the attachment of cables and the power cord.
Step 4. Remove the adhesive backing from the rubber feet.
Step 5. Attach the rubber feet to each corner on the bottom of the switch. These rubber feet help protect the switch from shock or vibration and ensure space between switches when stacking.
Figure 2-1 Attaching Rubber Feet
Do not block the ventilation holes. Leave space between switches when stacking.
Hardware Installation 2-1
Dimension ES-3024 Ethernet Switch
2.1.2 Rack-Mounted Installation The switch can be mounted on an EIA standard size, 19-inch rack or in a wiring closet with other equipment. Follow the steps below to mount your switch on a standard EIA rack using a rack-mounting kit.
Step 1. Align one bracket with the holes on one side of the switch and secure it with the bracket screws smaller than the rack-mounting screws.
Step 2. Attach the other bracket in a similar fashion.
Figure 2-2 Attaching Mounting Brackets and Screws
Step 3. After attaching both mounting brackets, position the switch in the rack by lining up the holes in the brackets with the appropriate holes on the rack. Secure the switch to the rack with the rack-mounting
2-2 Hardware Installation
Figure 2-3 Mounting the ES to an EIA standard 19-inch rack
Hardware Installation 2-3
Dimension ES-3024 Ethernet Switch
Chapter 3 Hardware Connections
This chapter acquaints you with the front and rear panels, shows you how to make the connections, install/remove (optional) modules and explains the LEDs.
> The length of exposed (bare) power wire should not exceed 7mm.
> Do not use this product near water, for example, in a wet basement.
> Only a qualified technician should service or disassemble this device.
The following figure shows the front panel of the ES-3024. The front panel contains a console port for local switch management, switch LEDs, 24 RJ-45 Ethernet ports and two (optional) uplink modules.
Console Port Ethernet Parts Uplink Modules (optional)
Figure 3-1 ES-3024 Front Panel
Table 3-1 ES-3024: Front Panel Ports
CONNECTOR DESCRIPTION Console The console port is for local configuration of the ES-3024 switch.
24 10/100 Mbps RJ-45 | Connect these ports to a computer, a hub, an Ethernet switch or router. Ethernet connectors
For local management, you can use a computer with terminal emulation software configured to the following parameters:
Dimension ES-3024 Ethernet Switch
Connect the male 9-pin end of the console cable to the console port of the ES-3024 switch. Connect the female end to a serial port (COMI, COM2 or other COM port) of your computer.
3.2.2 Ethernet Ports
The ES-3024 has 10/100Mbps auto-negotiating, auto-crossover Ethernet ports. In 10/100Mbps Fast Ethernet, the speed can be 10Mbps or 100Mbps and the duplex mode can be half duplex or full duplex (100 Mbps only).
When auto-negotiation is turned on, an Ethernet port on the ES-3024 switch negotiates with the peer automatically to determine the connection speed and duplex mode. If the peer Ethernet port does not support auto-negotiation or turns off this feature, the ES-3024 switch determines the connection speed by detecting the signal on the cable and using half duplex mode. When the ES-3024 switch’s auto-negotiation is turned off, an Ethernet port uses the pre- configured speed and duplex mode when making a connection, thus requiring you to make sure that the settings of the peer Ethernet port are the same in order to connect.
Default Ethernet Negotiation Settings
The factory default negotiation settings for the Ethernet ports on the ES-3024 switch are:
o Speed: Auto o Duplex: Auto o Flow control: On o Link Aggregation: Disabled
All ports are auto-crossover, that is auto-MDIX ports (Media Dependent Interface Crossover), so you may use either a straight through Ethernet cable or crossover Ethernet cable for all Ethernet port connections. Auto- crossover ports automatically sense whether they need to function as crossover or straight ports, so crossover cables can connect both computers and switches/hubs.
LEDs in the (optional) uplink modules are described in the corresponding module manual.
3.3.1 Installing Modules
You can install one stacking module and up to two (optional) uplink modules separately to meet the needs of your network. See your module manual for module specifications.
Modules are NOT hot swappable!
Follow these steps to install the optional modules.
Step 1. Make sure the power cord is not connected to the switch.
Loosen the thumbscrews from the cover plate and remove the cover plate from the optional slot. Do not discard the cover plate. You can put the cover plate back on if you remove the new module.
Figure 3-2 Loosening the Screws and Removing the Cover Plate
You should wear an anti-static wrist strap or touch any grounded or metal objects to discharge any bodily static electricity before you continue.
Remove the optional module from its protective anti-static packaging. Avoid touching the onboard circuit components by holding it by the edge.
Insert the optional module into an available expansion slot on the switch. Press it firmly until the optional module snaps into place.
Secure it to the switch with the retaining screws.
Slide the optional module into the expansion slot until
it snaps into place.
Never force, bend or twist the optional modules into the expansion slots.
Hardware Connections 3-3
Step7. See section 3.4.1 for instructions on connecting the power. The switch automatically detects the installed optional module. Connect any necessary network cables to the optional module and check the LEDs to verify that it is functioning properly.
The following figure shows the rear panel of the ES-3024. The rear panel contains the slot for the stacking module and the power receptacle. See section 3.3.1 for information on inserting and removing modules.
100-240VAC 50/40Ha 1.SAMAX FUSE T2ZA250VAC DC POWER INPUT Figure 3-5 ES-3024 DC Unit Rear Panel
3.4.1 Power Connector
Make sure you are using the correct power source as shown on the panel.
To connect the power to the ES-3024 AC unit, insert the female end of power cord to the power receptacle on the rear panel. Connect the other end of the supplied power cord to a 100-240VAC/1.5A power outlet. Make sure that no objects obstruct the airflow of the fans (located on the side of the unit).
The ES-3024 DC unit requires DC power supply input of 48 VDC to -60 VDC, 1.84A Max. To connect the power to the unit, insert the one end of the supplied power cord to the power receptacle on the rear panel and the other end to a power outlet.
3.5 Front Panel LEDs
After you connect the power to the switch, view the LEDs to ensure proper functioning of the switch and as an aid in troubleshooting. The front panel LEDs are as follows.
3-4 Hardware Connections
Dimension ES-3024 Ethernet Switch
Dimension ES3024 ne 2 4 6 8 10 12 14 16 18 20 22 24 ut
CONSOLE Z: XEL ri 1357 9133151739223
Y Figure 3-6 Front Panel LEDs
The following table describes the LED indicators on the front panel of an ES-3024 switch.
Table 3-2 ES-3024 Switches: LED Descriptions
LED COLOR | STATUS DESCRIPTION S1 Green Blinking [The system is transmitting/receiving through the stacking port. S2 ON The link through the stacking port is up.
OFF The link through the stacking port is down.
PWR Green ON The system is turned on. OFF The system is off.
SYS Green Blinking |The system is rebooting and performing self-diagnostic tests. ON The system is on and functioning properly. OFF The power is off or the system is not ready/malfunctioning.
ALM Red ON There is a hardware failure. OFF The system is functioning normally.
LNK/ACT Green Blinking [The system is transmitting/receiving to/from a 10 Mbps Ethernet network. (Ethernet ports) ON The link to a 10 Mbps Ethernet network is up. OFF The link to a 10 Mbps Ethernet network is down. Yellow | Blinking |The system is transmitting/receiving to/from a 100 Mbps Ethernet network. ON The link to a 100 Mbps Ethernet network is Up. OFF The link to a 100 Mbps Ethernet network is down. FDX/COL Yellow | Blinking |The Ethernet port is negotiating in half-duplex mode and collisions are (Ethernet ports) occurring; the more collisions that occur the faster the LED blinks.
ON The Ethernet port is negotiating in full-duplex mode. OFF The Ethernet port is negotiating in half-duplex mode and no collisions are
3.6 Stacking Scenario Examples
Use Ethernet cables when stacking the switches. See the following figures for example stacking scenarios using the stacking module. The switches must form a closed ring in all scenarios.
Hardware Connections
Dimension ES-3024 Ethernet Switch
STACKING STACKING Figure 3-7 Stacking Example 1
STACKING STACKXING STACKING Figure 3-8 Stacking Example 2
3-6 Hardware Connections
Dimension ES-3024 Ethernet Switch
STACKING STACKING STACKING Figure 3-9 Stacking Example 3
See the Commands Introduction and Commonly Used Commands chapters for information on configuring the stacking modules (as well as other ports) using line commands.
3.7 Uplink Scenario Example
Use Ethernet cables when daisy-chaining/uplinking the switches. See the following figure for an example uplink connection using the stacking module. You must uplink to a Gigabit switch when uplinking using the stacking module. Uplink scenarios using an uplink module depend on the uplink module you use.
Hardware Connections 3-7
Q STACKING Figure 3-10 Uplink Example
3.8 Configuring the ES-3024
You may use the embedded web configurator or command line interface to configure the ES-3024. If you're using the web configurator, you need Internet Explorer 5.5 and later or Netscape Navigator 6 and later.
You can access the command line interface using a terminal emulation program on a computer connected to the switch console port (see section 3.2.1) or access the switch via an Ethernet port using Telnet.
You can use the “config save” command to save 802.1Q, STP, Cluster and IP configuration changes to non-volatile memory (Flash). These changes are effective after you restart the switch.
However you cannot use “config save” for all other line command configurations. These are saved in volatile memory (DRAM), so are not effective after you restart the switch.
The next part of this guide discusses configuring the ES-3024 using the web configurator.
3-8 Hardware Connections
Part III Getting Started
This part introduces you to the ES-3024 web configurator, describes the Home and System Info screens and shows you how to configure the Basic Settings menus.
Dimension ES-3024 Ethernet Switch
The embedded web configurator allows you to manage the switch from anywhere through a standard browser such as Microsoft Internet Explorer or Netscape Navigator.
Use Internet Explorer 5.5 and later or Netscape Navigator 6 and later versions.
A local console port connection locks out all other connections. Log out from the console port connection before logging in with the web configurator.
Step 1. Start your Internet Explorer or Netscape Navigator web browser.
Step 2. Type “http://” and the IP address of the switch (for example, the default is 192.168.1.1) in the Location or Address field. Press Enter.
Step 3. The login screen appears. The default username is admin and associated default password is 1234. The date and time display as shown if you have not configured a time server nor manually entered a time and date in the General Setup screen.
Enter Network Password E 1x œ Please type your user name and password.
Realm ES-3024 at Sat Jan 01 00:26:13 2000 User Name |
F Save this password in your password list
Figure 4-1 Web Configurator: login
Step 4. Click OK to view the first web configurator screen.
Introducing the Web Configurator 4-1
The Status screen is the first web configurator screen you see after you log in. The following figure shows the navigating components of a web configurator screen.
Systeen Up Time: 0:53-10 5 u : 4 ut Le Se per mue ous mul Click Status to view Click here for help on 1 Dem 570 Det 0 0 1! current device statistics. configuring a screen. 2 100MF FORWARDING Dissbied 1513 178 1 1 Down STOP Dissbied © L] LU L1] 00 00000 4 Down STOP Dissbied D o 2 00 00 00000 $ Down STOP Dissbied © [] © 00 00 00000 5 Down STOP Dissbied 0 L 9 00 00 0000 Navigation Panel. L Down STOP Dissbd 0 0 6 00 00 cooc Click Logout to exit the 1 Down STOP Disskéed © 0 L] 00 00 00000 Click on a tab to 2 Dom STOP Disbied D 0 0 00 00 oo00 web configurator. displ Jated links. u Down STOP Dissbied © 0 L] 00 00 00000 isplay related links. u Don STOP Dissbied 0 L] L] 00 00 00000 [| u Down STOP Dissbied 0 (] L] 00 00 00000 u Down STOP Dissbied © o o 00 00 00000 14 Dom STOP Dissbied 0 ! ® 00 00 00000 L Down STOP Dissbied © [ 9 00 00 00000 en Down STOP Dissbied 0 [] © 00 00 00000 1 Down STOP Dissbied 0 L] LU 00 00 00000 u Down STOP Dissbied 0 LU L 00 00 00000 .
Figure 4-2 Web Configurator Home Screen (Status)
In the navigation panel, click a main link to reveal a list of submenu links.
Static MAC Forwarding
4-2 Introducing the Web Configurator
Dimension ES-3024 Ethernet Switch
The following table lists the various web configurator screens within the sub-links.
Broadcast Storm Control
The following table summarizes these sub-links in the navigation panel.
This link takes you to a screen that displays general system and hardware monitoring
This link takes you to a screen where you can configure general identification information
This link takes you to a screen where you can set up global switch parameters such as VLAN type, MAC address learning, IGMP snooping, GARP and priority queues.
This link takes you to a screen where you can configure the IP address, subnet mask (necessary for switch management) and DNS (domain name server).
This link takes you to screens where you can configure settings for individual switch ports.
Advanced Application
VLAN This link takes you to screens where you can configure port-based or 802.1Q VLAN (depending on what you configured in the Switch Setup menu).
Static MAC Forwarding
This link takes you to screens where you can configure static MAC addresses for a port. These static MAC addresses do not age out.
This link takes you to a screen to set up filtering rules.
Spanning Tree Protocol
This link takes you to screens where you can configure the STP to prevent network loops.
This link takes you to screens where you can cap the maximum bandwidth allowed from specified source(s) to specified destination(s).
Broadcast Storm Control
This link takes you to a screen to set up broadcast filters.
This link takes you to screens where you can copy traffic from one port or ports to another port in order that you can examine the traffic from the first port without interference
This link takes you to a screen where you can logically trunk physical links to form one logical, higher-bandwidth link.
This link takes you to a screen where you can configure RADIUS (Remote Authentication Dial-In User Service), a protocol for user authentication that allows you to use an external server to validate an unlimited number of users.
This link takes you to a screen where you can activate MAC address learning and set the maximum number of MAC addresses to learn on a port.
This link takes you to screens where you can change the system login password and configure SNMP and remote management.
This link takes you to a screen where you can configure SPQ or WFQ with associated queue weights for each port.
This link takes you to screens where you can configure static routes. A static route defines how the ES-3024 should forward traffic by configuring the TCP/IP parameters manually.
This link takes you to screens where you can perform firmware and configuration file maintenance as well as reboot the system.
This link takes you to screens where you can view system logs and test port(s).
This link takes you to a screen where you can configure clustering management and view its status.
LABEL DESCRIPTION Filtering Database
This link takes you to a screen where you can view the MAC addresses (and types) of
devices attached to what ports and VLAN IDs.
This link takes you to a screen where you can view the MAC addresses — IP address
4.3.1 Change Your Password
After you log in for the first time, it is recommended you change the default Administrator password in the
Please record your new password whenever you change it. The system will lock you out if you have forgotten your password.
User Name Password Retype to confirm
You are locked out from managing the switch if another administrator is currently logged in. You must wait until
he/she has logged out before you can log in. Moreover, you could lock yourself (and all others) out from the switch by:
1. Deleting the management VLAN (default is VLAN 1).
2. Deleting all port-based VLANS with the CPU port as a member. The “CPU port” is the management port of
Dimension ES-3024 Ethernet Switch
3. Filtering all traffic to the CPU port. 4. Disabling all ports.
5. Assigning minimum bandwidth to the CPU port. If you limit bandwidth to the CPU port, you may find that the switch performs sluggishly or not at all.
Be careful not to lock yourself and others out of the switch.
4.5 Resetting the Switch
If you lock yourself (and others) from the switch or forget the ES-3024 password, you will need to reload the factory-default configuration file.
Uploading the factory-default configuration file replaces the current configuration file with the factory-default configuration file. This means that you will lose all previous configurations and the speed of the console port will be reset to the default of 9600bps with 8 data bit, no parity, one stop bit and flow control set to none. The password will also be reset to “1234” and the IP address to 192.168.1.1.
To upload the configuration file, do the following:
Step 1. Connect to the console port using a computer with terminal emulation software. See the chapter on hardware connections for details.
Step 2. Disconnect and reconnect the switch’s power to begin a session. When you reconnect the switch’s power, you will see the initial screen.
Step 3. When you see the message “Press any key to enter Debug Mode within 3 seconds” press any key to enter debug mode.
Step 4. Type atlc after the “Enter Debug Mode” message.
Step 5. Wait for the “Starting XMODEM upload” message before activating XMODEM upload on your terminal.
Step 6. After a successful configuration file upload, type at go to restart the switch.
Bootbase Version: V1.0 | 04/25/2003 10:01:06
RAM: Size = 32768 Kbytes
FLASH: Intel 32M ZyNOS Version: V3.50(DU.0)b6 | 07/11/2003 18:00:29
Press any key to enter debug mode within 3 seconds.
Starting XMODEM upload (CRC mode) ....
Figure 4-4 Resetting the Switch: Via Console Port
The switch is now reinitialized with a default configuration file including the default password of “1234”.
4-6 Introducing the Web Configurator
Dimension ES-3024 Ethernet Switch
Click Logout in a screen to exit the web configurator. You have to log in with your password again after you log out. This is recommended after you finish a management session both for security reasons and so as you don’t lock out other switch administrators.
Figure 4-5 Web Configurator: Logout Screen
The web configurator’s online help has descriptions of individual screens and some supplementary information.
Click the HELP link from a web configurator screen to view an online help description of that screen.
Introducing the Web Configurator 4-7
Dimension ES-3024 Ethernet Switch
Chapter 5 System Status and Port Details
This chapter describes the system status (web configurator home page) and port details screens.
5.1 About System Statistics and Information
The home screen of the web configurator displays a port statistical summary with links to each port showing statistical details.
5.2 Port Status Summary
To view the port statistics, click Status in all web configurator screens to display the Status screen as shown next.
Pollinterval(s) |40 Setinterval Stop
pot ER Figure 5-1 Port Status Summary
The following table describes the labels in this screen.
System Status and Port Details 5-1
Dimension ES-3024 Ethernet Switch
This field shows how long the system has been running since the last time it was started.
Port This identifies the Ethernet port. Click a port number to display the Port Details screen (refer to Section 5.2.1).
Link This field displays the speed (either 10M for 10Mbps, 100M for 100Mbps or another value depending on the uplink module being used) and the duplex (F for full duplex or H for half).
State This field displays the STP state of the port. See the Spanning Tree Protocol chapter for details on STP port states.
LACP This fields displays whether the Link Aggregation Control Protocol (LACP) has been enabled on the port.
TxPkts This field shows the number of transmitted frames on this port.
RxPkts This field shows the number of received frames on this port.
Errors This field shows the number of received errors on this port.
Tx KB/s This field shows the number of kilobytes per second transmitted on this port.
Rx KB/s This field shows the number of kilobytes per second received on this port.
Up Time This field shows the total amount of time in hours, minutes and seconds the port has been up.
The text box displays how often (in seconds) this screen refreshes. You may change the refresh interval by typing a new number in the text box and then clicking Set Interval.
Click Stop to halt system statistic polling.
Select a port from the Port drop-down list box and then click Clear Counter to erase the recorded statistical information for that port.
Click a number in the Port column in the Status screen to display individual port statistics. Use this screen to
detailed performance data about an individual port on the switch.
System Status and Port Details
Le PortDetais ___} Status Port Info Port NO. 1 Link Down Status STOP LACP Disabled TxPkts û RxPkts ui) Errors 0 TxKBs/s 0.0 Rx KBsis 0.0 Up Time 0:00:00 TX Packet TX Packets 0 Multicast Broadcast Pause Tagged RX Packet RX Packets 64 Byte 65-127 Byte 128-255 Byte 256-511 Byte
TX Collision Single Multiple Excessive Late
Error Packet RX CRC Length Alignment Runt
Dropped Packet Giant
Poll Interval(s) [ao Setinterval Stop
Figure 5-2 Status: Port Details
The following table describes the labels in this screen.
System Status and Port Details 5-3
Dimension ES-3024 Ethernet Switch
Table 5-2 Status: Port Details
LABEL DESCRIPTION Port Info Port NO. This field identifies the Ethernet port described in this screen. Link|This field shows whether the Ethernet connection is down, and the speed/duplex mode. Status|This field shows the training state of the ports. The states are FORWARDING (forwarding), which means the link is functioning normally or STOP (the port is stopped to break a loop or duplicate path). LACP This field shows if LACP is enabled on this port or not. TxPkts|This field shows the number of transmitted frames on this port RxPKkts|This field shows the number of received frames on this port Errors |This field shows the number of received errors on this port. Tx KB/s|This field shows the number kilobytes per second transmitted on this port. Rx KB/s This field shows the number of kilobytes per second received on this port. Up Time |This field shows the total amount of time the connection has been up. Tx Packet
The following fields display detailed information about frames transmitted.
This field shows the number of good frames (unicast, multicast and broadcast) transmitted.
This field shows the number of good multicast frames transmitted.
This field shows the number of good broadcast frames transmitted.
This field shows the number of 802.3x Pause frames transmitted.
This field shows the number of frames with VLAN tags transmitted.
The following fields display detailed information about frames received.
This field shows the number of good frames (unicast, multicast and broadcast) received.
This field shows the number of frames (including bad frames) received that were 64 octets in length.
This field shows the number of frames (including bad frames) received that were between 65 and 127 octets in length.
This field shows the number of frames (including bad frames) received that were between 128 and 255 octets in length.
This field shows the number of frames (including bad frames) received that were between 256 and 511 octets in length.
System Status and Port Details
This field shows the number of frames (including bad frames) received that were between 512 and 1023 octets in length.
This field shows the number of frames (including bad frames) received that were between 1024 and 1518 octets in length.
This field shows the number of frames (including bad frames) transmitted that were greater than 1518 octets in length.
This field shows the number of good multicast frames received.
This field shows the number of good broadcast frames received.
This field shows the number of 802.3x Pause frames received.
This field shows the number of frames with VLAN tags received.
This field shows the number of control received (including those with CRC error) but it does not include the 802.3x Pause frames.
The following fields display information on collisions while transmitting.
This is a count of successfully transmitted frames for which transmission is inhibited by exactly one collision.
This is a count of successfully transmitted frames for which transmission was inhibited by more than one collision.
This is a count of frames for which transmission failed due to excessive collisions. Excessive collision is defined as the number of maximum collisions before the retransmission count is reset.
This is the number of times a late collision is detected, that is, after 512 bits of the frame have already been transmitted.
The following fields display detailed information about frames received that were in error.
RX CRC This field shows the number of frames received with CRC (Cyclic Redundant Check) error(s).
This field shows the number of frames received with a length that was out of range.
This field shows the number of frames received of proper size but with CRC error(s) and a non- integral number of octets.
This field shows the number of frames received that were too short (shorter than 64 octets), including the ones with CRC errors.
The following filed indicates why frames were dropped.
This field shows the number of frames dropped because they were bigger than the maximum frame size.
System Status and Port Details 5-5
Dimension ES-3024 Ethernet Switch
Table 5-2 Status: Port Details
LABEL DESCRIPTION Poll Interval(s) The text box displays how often (in seconds) this screen refreshes. You may change the refresh interval by typing a new number in the text box and then clicking Set Interval.
Stop Click Stop to stop port statistic polling.
5-6 System Status and Port Details
Dimension ES-3024 Ethernet Switch
Chapter 6 Basic Settinq
This chapter describes how to configure the System Info, General Setup, Switch Setup, IP Setup and Port Setup screens.
6.1 Introducing The Basic Setting Screens
The System Info screen displays general switch information (such as firmware version number) and hardware polling information (such as fan speeds). The General Setup screen allows you to configure general switch identification information. The General Setup screen also allows you to set the system time manually or get the current time and date from an external server when you turn on your switch. The real time is then displayed in the switch logs. The Switch Setup screen allows you to set up and configure global switch features. The IP Setup screen allows you to configure a switch IP address, subnet mask and DNS (domain name server) for management purposes.
6.2 System Information
In the navigation panel, click Basic Setting and then System Info to display the screen as shown. You can check the firmware version number and monitor the switch temperature, fan speeds and voltage in this screen.
The following table describes the labels in this screen.
This field displays the version number of the switch 's current firmware including the date created.
This field refers to the Ethernet MAC (Media Access Control) address of the switch.
The switch has temperature sensors that are capable of detecting and reporting if the temperature rises above the threshold. You may choose the temperature unit (Centigrade or Fahrenheit) in this field.
MAC, CPU and PHY refer to the location of the temperature sensors on the switch printed circuit board.
This field displays the current temperature measured at this sensor.
Dimension ES-3024 Ethernet Switch
Table 6-1 System Info
LABEL DESCRIPTION MAX This field displays the maximum temperature measured at this sensor.
MIN This field displays the minimum temperature measured at this sensor.
This field displays the upper temperature limit at this sensor.
This field displays Normal for temperatures below the threshold and Error for those above.
A properly functioning fan is an essential component (along with a sufficiently ventilated, cool operating environment) in order for the device to stay within the temperature threshold. Each fan has a sensor that is capable of detecting and reporting if the fan speed falls below the threshold shown.
This field displays this fan's current speed in Revolutions Per Minute (RPM).
MAX This field displays this fan's maximum speed measured in Revolutions Per Minute (RPM).
MIN This field displays this fan's minimum speed measured in Revolutions Per Minute (RPM). "<41" is displayed for speeds too small to measure (under 2000 RPM).
This field displays the minimum speed at which a normal fan should work.
Normal indicates that this fan is functioning above the minimum speed. Error indicates that this fan is functioning below the minimum speed.
The power supply for each voltage has a sensor that is capable of detecting and reporting if the voltage falls out of the tolerance range.
This is the current voltage reading.
MAX This field displays the maximum voltage measured at this point.
MIN This field displays the minimum voltage measured at this point.
This field displays the minimum voltage at which the switch should work.
Normal indicates that the voltage is within an acceptable operating range at this point; otherwise Error is displayed.
The text box displays how often (in seconds) this screen refreshes. You may change the refresh interval by typing a new number in the text box and then clicking Set Interval.
Click Stop to halt statistic polling.
Click Basic Setting and General Setup in the navigation panel to display the screen as shown.
L @ General Setup __]
It will take 60 seconds if time server is unreachable.
The following table describes the labels in this screen.
Table 6-2 General Setup
LABEL DESCRIPTION System Name
Choose a descriptive name for identification purposes. This name consists of up to 32 printable characters; spaces are not allowed.
Enter the geographic location (up to 30 characters) of your switch.
Contact Person's Name
Enter the name (up to 30 characters) of the person in charge of this switch.
Table 6-2 General Setup
LABEL DESCRIPTION Use Time Server Enter the time service protocol that a timeserver sends when you turn on the switch. Not all When Bootup timeservers support all protocols, so you may have to use trial and error to find a protocol that works. The main differences between them are the time format.
Daytime (RFC 867) format is day/month/year/time zone of the server.
Time (RFC-868) format displays a 4-byte integer giving the total number of seconds since 1970/1/1 at 0:0:0.
NTP (RFC-1305) is similar to Time (RFC-868).
None is the default value. Enter the time manually. Each time you turn on the switch, the time and date will be reset to 2000-1-1 O:0.
Time Server IP Enter the IP address (or URL if you configure a domain name server in the IP Setup screen) of
Address your timeserver. The switch searches for the timeserver for up to 60 seconds. If you select a timeserver that is unreachable, then this screen will appear locked for 60 seconds. Please wait.
Current Time This field displays the time you open this menu (or refresh the menu).
New Time Enter the new time in hour, minute and second format. The new time then appears in the
(hh:min:ss) Current Time field after you click Apply.
Current Date This field displays the date you open this menu.
New Date (yyyy- Enter the new date in year, month and day format. The new date then appears in the Current
mm-dd) Date field after you click Apply.
Time Zone Select the time difference between UTC (Universal Time Coordinated, formerly known as
GMT, Greenwich Mean Time) and your time zone from the drop-down list box.
Apply Click Apply to save the settings.
Cancel Click Cancel to start configuring the screen again.
6.4 Introduction to VLANS A VLAN (Virtual Local Area Network) allows a physical network to be partitioned into multiple logical networks. Devices on a logical network belong to one group. A device can belong to more than one group. With VLAN, a device cannot directly talk to or hear from devices that are not in the same group(s); the traffic must first go through a router.
In MTU (Multi-Tenant Unit) applications, VLAN is vital in providing isolation and security among the subscribers. When properly configured, VLAN prevents one subscriber from accessing the network resources of another on the same LAN, thus a user will not see the printers and hard disks of another user in the same building.
VLAN also increases network performance by limiting broadcasts to a smaller and more manageable logical broadcast domain. In traditional switched environments, all broadcast packets go to each and every individual port. With VLAN, all broadcasts are confined to a specific broadcast domain.
Note that VLAN is unidirectional; it only governs outgoing traffic.
Dimension ES-3024 Ethernet Switch
See the VLAN chapter for information on port-based and 802.1Q tagged VLANSs.
IGMP (Internet Group Multicast Protocol) is a session-layer protocol used to establish membership in a multicast group - it is not used to carry user data. Refer to RFC 1112 and RFC 2236 for information on IGMP versions 1 and 2 respectively.
A layer-2 switch can passively snoop on IGMP Query, Report and Leave (IGMP version 2) packets transferred between IP multicast routers/switches and IP multicast hosts to learn the IP multicast group membership. It checks IGMP packets passing through it, picks out the group registration information, and configures multicasting accordingly.
Without IGMP snooping, multicast traffic is treated in the same manner as broadcast traffic, that is, it is forwarded to all ports. With IGMP snooping, group multicast traffic is only forwarded to ports that are members of that group. IGMP Snooping generates no additional network traffic, allowing you to significantly reduce multicast traffic passing through your switch.
6.6 Switch Setup Screen
Click Basic Setting and then Switch Setup in the navigation panel display the screen as shown. The VLAN setup screens change depending on whether you choose 802.1Q or Port Based in the VLAN Type field in this screen. Refer to the chapter on VLANSs.
Dimension ES-3024 Ethernet Switch
VCEN TRS © Port Based
IGMP Snooping Active CO MAC Address Learning Aging Time 300 seconds
GARP Timer Join Timer 200 milliseconds Leave Timer ETS milliseconds Leave All Timer Froooo milliseconds
Priority Queue Assignment level7 [EE]
levelô [3 +] levels [2x] level4 [2%] level3 y] level2 [o +] level [o xl level0 xl Apply | Cancel |
Figure 6-3 Switch Setup
The following table describes the labels in this screen.
Table 6-3 Switch Setup
LABEL DESCRIPTION EXAMPLE VLAN Type |Choose 802.1Q or Port Based from the drop-down list box. The VLAN Setup 802.1Q screen changes depending on whether you choose 802.1Q VLAN Type or Port Based VLAN Type in this screen. See Section 6.4 and the VLAN chapter for more information on VLANSs.
IGMP Select Active to enable IGMP snooping have group multicast traffic only Snooping forwarded to ports that are members of the VLAN specified in the VLAN field, significantly reducing multicast traffic passing through your switch. See Section 6.5 for more information on IGMP snooping.
MAC Address | MAC address learning reduces outgoing traffic broadcasts. For MAC address Learning learning to occur on a port, the port must be active.
Aging Time | Enter a time from 10 to 3000 seconds. This is how long all dynamically learned 300 MAC addresses remain in the MAC address table before they age out (and must be relearned).
Dimension ES-3024 Ethernet Switch
Table 6-3 Switch Setup
LABEL DESCRIPTION EXAMPLE GARP Timer: Switches join VLANSs by making a declaration. À declaration is made by issuing a Join message using GARP. Declarations are withdrawn by issuing a Leave message. À Leave All message terminates all registrations. GARP timers set declaration timeout values. See the chapter on VLAN setup for more background information.
Join Timer|Join Timer sets the duration of the Join Period timer for GVRP in milliseconds. 200 milliseconds Each port has a Join Period timer. The allowed Join Time range is between 100 (default) and 65535 milliseconds; the default is 200 milliseconds. See the chapter on VLAN setup for more background information.
Leave Timer|Leave Timer sets the duration of the Leave Period timer for GVRP in 600 milliseconds milliseconds. Each port has a single Leave Period timer. Leave Time must be two (default) times larger than Join Timer; the default is 600 milliseconds.
Leave All' Leave All Timer sets the duration of the Leave All Period timer for GVRP in 1000 Timer|milliseconds. Each port has a single Leave All Period timer. Leave All Timer must milliseconds be larger than Leave Timer; the default is 1000 milliseconds. (default)
Priority Queue Assignment
IÉEE 802.1p defines up to 8 separate traffic types by inserting a tag into a MAC-layer frame that contains bits to define class of service. Frames without an explicit priority tag are given the default priority of the ingress port. Use the next two fields to configure the priority level-to-physical queue mapping.
The switch has 4 physical queues that you can map to the 8 priority levels. On the switch, traffic assigned to higher index queues gets through faster while traffic in lower index queues is dropped if the network is congested.
See also Queuing Method and 802.1p Priority in Port Setup for related information.
Priority Level (The following descriptions are based on the traffic types defined in the IEEE 802.1d standard (which incorporates the 802.1p).
Level 7|Typically used for network control traffic such as router configuration messages.
Level 6|Typically used for voice traffic that is especially sensitive to jitter (jitter is the variations in delay).
Level 5|Typically used for video that consumes high bandwidth and is sensitive to jitter.
Typically used for controlled load, latency-sensitive traffic such as SNA (Systems Network
Level4 Architecture) transactions.
Typically used for “excellent effort” or better than best effort and would include important business
Level 3 traffic that can tolerate some delay.
Level 2|This is for “spare bandwidth”.
This is typically used for non-critical “background” traffic such as bulk transfers that are allowed but
Level 1 that should not affect other applications and users.
Level 0|Typically used for best-effort traffic.
Apply Click Apply to save your changes back to the switch.
Cancel Click Cancel to begin configuring this screen afresh.
© DHCP Client & Static IP Address
IP Address 19216811 |.
IP Subnet Mask [255.255.255.0
Default Gateway 192.166.1.254 Domain Name Server 0.0.0.0
To set the default gateway device and the domain name server on the switch, click IP Setup in the navigation panel and set the related fields. The default gateway specifies the IP address of the default gateway (next hop) for outgoing traffic.
The following table describes the labels in this screen.
LABEL DESCRIPTION DHCP Client |Select this option if you have a DHCP server that can assign the switch an IP address, subnet mask, a default gateway IP address and a domain name server IP address automatically.
Static IP Select this option if you don’t have a DHCP server or if you wish to assign static IP address
Address information to the switch. You need to fill in the following fields when you select this option.
IP Address Enter the IP address of your switch in dotted decimal notation for example 192.168.1.1.
Mask Enter the IP subnet mask of your switch in dotted decimal notation for example 255.255.255.0. Default Enter the IP address of the default outgoing gateway in dotted decimal notation, for example
Gateway |192.168.1.254.
Domain |DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and
vice versa. Enter a domain name server IP address in order to be able to use a domain name instead of an IP address.
LABEL DESCRIPTION Management |Enter the VLAN identification number associated with the switch IP address. Management VLAN ID VID is the VLAN ID of the CPU and is used for management only. The default is "1". AIl ports, by default, are fixed members of this "management VLAN" in order to manage the device from any port. If a port is not a member of this VLAN, then users on that port cannot access the device. To access the switch make sure the port that you are connected to is a member of Management VLAN.
Apply Click Apply to save your changes back to the switch.
Cancel Click Cancel to begin configuring the fields again.
Click Basic Setting and then Port Setup in the navigation panel to enter the port configuration screen. You may configure any of the switch ports and module (uplink and stacking) ports.
Dimension ES-3024 Ethernet Switch
The following table describes the fields in this screen.
This is the port index number.
Select this check box to enable a port. The factory default for all ports is enabled. A port must be enabled for data transmission to occur.
Enter a descriptive name that identifies this port.
This field displays 10/100M for an Ethernet/Fast Ethernet connection and 1000M for Gigabit connections.
Select the speed and the duplex mode of the Ethernet connection on this port. Choices are Auto, 10M/Half Duplex, 10M/Full Duplex, 100M/Half Duplex, 100M/Full Duplex and 1000M/Full Duplex (for gigabit ports only).
Selecting Auto (auto-negotiation) makes one Ethernet port able to negotiate with a peer automatically to obtain the connection speed and duplex mode that both ends support. When auto- negotiation is turned on, an Ethernet port on the switch negotiates with the peer automatically to determine the connection speed and duplex mode. If the peer Ethernet port does not support auto- negotiation or turns off this feature, the switch determines the connection speed by detecting the signal on the cable and using half duplex mode. When the switch’s auto-negotiation is turned off, an Ethernet port uses the pre-configured speed and duplex mode when making a connection, thus requiring you to make sure that the settings of the peer Ethernet port are the same in order to connect.
A concentration of traffic on a port decreases port bandwidth and overflows buffer memory causing packet discards and frame losses. Flow Control is used to regulate transmission of signals to match the bandwidth of the receiving port.
The switch uses IEEE802.3x flow control in full duplex mode and backpressure flow control in half duplex mode.
IEEE802.3x flow control is used in full duplex mode to send a pause signal to the sending port, causing it to temporarily stop sending signals when the receiving port memory buffers fill.
Back Pressure flow control is typically used in half duplex mode to send a "collision" signal to the sending port (mimicking a state of packet collision) causing the sending port to temporarily stop sending signals and resend later. Select Flow Control to enable it.
This priority value is added to incoming frames without a (802.1p) priority queue tag. See Priority Queue Assignment in Table 6-3 for more information. See also Priority Queue Assignment in Switch Setup and Queuing Method for related information.
Click Apply to save your changes back to the switch.
Click Cancel to begin configuring this screen afresh.
This part shows you how to configure the VLAN, Static MAC Forwarding, Filtering, STP and Bandwidth Control Advanced Application screens.
Dimension ES-3024 Ethernet Switch
VLAN The type of screen you see here depends on the VLAN Type you selected in the Switch Setup screen. This chapter shows you how to configure 802.1Q tagged and port-based VLANSs. See the General, Switch and IP Setup chapter for more information.
7.1 Introduction to IEEE 802.1Q Tagged VLAN Tagged VLAN uses an explicit tag (VLAN ID) in the MAC header to identify the VLAN membership of a frame across bridges - they are not confined to the switch on which they were created. The VLANS can be created statically by hand or dynamically through GVRP. The VLAN ID associates a frame with a specific VLAN and provides the information that switches need to process the frame across the network. A tagged frame is four bytes longer than an untagged frame and contains two bytes of TPID (Tag Protocol Identifier, residing within the type/length field of the Ethernet frame) and two bytes of TCI (Tag Control Information, starts after the source address field of the Ethernet frame).
The CFI (Canonical Format Indicator) is a single-bit flag, always set to zero for Ethernet switches. If a frame received at an Ethernet port has a CFI set to 1, then that frame should not be forwarded as it is to an untagged port. The remaining twelve bits define the VLAN ID, giving a possible maximum number of 4,096 (212) VLANSs. Note that user priority and VLAN ID are independent of each other. A frame with VID (VLAN Identifier) of null (0) is called a priority frame, meaning that only the priority level is significant and the default VID of the ingress port is given as the VID of the frame. Of the 4096 possible VIDs, a VID of 0 is used to identify priority frames and value 4095 (FFF) is reserved, so the maximum possible VLAN configurations are 4,094
TPID User Priority CFI [VLANID 2 Bytes |3 Bits 1 Bit |12 bits
7.1.1 Forwarding Tagged and Untagged Frames
Each port on the switch is capable of passing tagged or untagged frames. To forward a frame from an 802.1Q VLAN-aware switch to an 802.1Q VLAN-unaware switch, the switch first decides where to forward the frame and then strips off the VLAN tag. To forward a frame from an 802.1Q VLAN-unaware switch to an 802.1Q VLAN-aware switch, the switch first decides where to forward the frame, and then inserts a VLAN tag reflecting the ingress port's default VID. The default PVID is VLAN 1 for all ports, but this can be changed.
7.1.2 Automatic VLAN Registration
GARP and GVRP are the protocols used to automatically register VLAN membership across switches.
Dimension ES-3024 Ethernet Switch
GARP GARP (Generic Attribute Registration Protocol) allows network switches to register and de-register attribute values with other GARP participants within a bridged LAN. GARP is a protocol that provides a generic mechanism for protocols that serve a more specific application, for example, GVRP.
Switches join VLANSs by making a declaration. A declaration is made by issuing a Join message using GARP. Declarations are withdrawn by issuing a Leave message. À Leave All message terminates all registrations. GARP timers set declaration timeout values.
GVRP GVRP (GARP VLAN Registration Protocol) is a registration protocol that defines a way for switches to register necessary VLAN members on ports across the network. Enable this function to permit VLANSs groups beyond the
Please refer to the following table for common GARP terminology.
Table 7-1 GARP Terminology
VLAN TERM DESCRIPTION PARAMETER VLAN Type Permanent VLAN This is a static VLAN created manually. Dynamic VLAN This is a VLAN configured by a GVRP registration/deregistration
VLAN Administrative Control
Fixed registration ports are permanent VLAN members.
Registration Forbidden
Ports with registration forbidden are forbidden to join the specified VLAN.
Ports dynamically join a VLAN using GVRP.
VLAN Tag Control |Tagged Ports belonging to the specified VLAN tag all outgoing frames transmitted. Untagged Ports belonging to the specified don't tag all outgoing frames transmitted. VLAN Port Port VID This is the VLAN ID assigned to untagged frames that this port received.
Acceptable frame type
You may choose to accept both tagged and untagged incoming frames or just tagged incoming frames on a port.
If set, the switch discards incoming frames for VLANS that do not have this port as a member
VLAN Dimension ES-3024 Ethernet Switch
7.1.3 Port VLAN Trunking
Enable VLAN Trunking on a port to allow frames belonging to unknown VLAN groups to pass through that port. This is useful if you want to set up VLAN groups on end devices without having to configure the same VLAN groups on intermediary devices.
Refer to the following figure. Suppose you want to create VLAN groups 1 and 2 (VI and V2) on devices A and B. Without VLAN Trunking, you must configure VLAN groups 1 and 2 on all intermediary switches C, D and E; otherwise they will drop frames with unknown VLAN group tags. However, with VLAN Trunking enabled on a port(s) in each intermediary switch you only need to create VLAN groups in the end devices (A and B). C, D and E automatically allow frames with VLAN group tags 1 and 2 (VLAN groups that are unknown to those switches) to pass through their VLAN trunking port(s).
Figure 7-1 Port VLAN Trunking
7.2 802.1Q VLAN Follow the steps below to set the 802.1Q VLAN Type on the switch. Step 1. Select 802.1Q as the VLAN Type in the Switch Setup screen (under Basic Setting) and click Apply.
L D Switch Setup __]
C 8021Q VLAN Type [ Le & Port Based
SM STIITENTO Figure 7-2 Selecting a VLAN Type Step 2. Click VLAN under Advanced Application to display the VLAN Status screen as shown next.
Previous Page | NexPage |
Figure 7-3 802.1Q VLAN Status
The following table describes the labels in this screen.
Table 7-2 802.1Q VLAN Status
LABEL DESCRIPTION The Number of
VLAN This is the number of VLANSs configured on the switch.
Index This is the VLAN index number.
VID VID is the PVID, the Port VLAN ID assigned to untagged frames or priority-tagged frames received on this port that you configure in the VLAN Port Setting screen.
Port Number This column displays the ports that are participating in a VLAN. A tagged port is marked as T, an untagged port is marked as U and ports not participating in a VLAN in marked as “—".
Elapsed Time This field shows how long it has been since a normal VLAN was registered or a static VLAN was set Up.
Status This field shows how this VLAN was added to the switch; dynamically using GVRP or
statically, that is, added as a permanent entry.
The text box displays how often (in seconds) this screen refreshes. You may change the refresh interval by typing a new number in the text box and then clicking Set Interval.
Click Stop to halt polling statistics.
Click one of these buttons to show the previous/next screen if all status information cannot be seen in one screen.
The following table describes the labels in this screen.
Table 7-3 802.1Q VLAN Port Settings
LABEL DESCRIPTION GVRP GVRP (GARP VLAN Registration Protocol) is a registration protocol that defines a way for switches to dynamically register necessary VLAN members on ports across the network.
Select this check box to permit VLAN groups beyond the local switch.
Port Isolation Port Isolation allows each port (1 to 26) to communicate with the CPU port, uplink ports and stacking ports but not communicate with each other. This option is the most limiting but also the most secure.
Port This field displays the port numbers.
Ingress Check If this check box is selected for a port, the device discards incoming frames for VLANS that do not include this port in its member set.
PVID Each port on the switch is capable of passing tagged or untagged frames. To forward a frame from an 802.1Q VLAN-unaware switch to an 802.1Q VLAN-aware switch, the switch first decides where to forward the frame, and then inserts a VLAN tag reflecting the default ingress ports VLAN ID, the PVID. The default PVID is VLAN 1 for all ports, but this can be changed to any number between 0 and 4094.
GVRP Select this check box to permit VLANS groups beyond the local switch on this port. GVRP (GARP VLAN Registration Protocol) is a registration protocol that defines a way for switches to register necessary VLAN members on ports across the network.
Acceptable Specify the type of frames allowed on a port. Choices are All, Tag Only and Untag Only. Frame Type Select All to accept all frames with untagged or tagged frames on this port. This is the default setting.
Select Tag Only to accept only tagged frames on this port. All untagged frames are dropped.
Select Untag Only to accept only untagged frames on this port. All tagged frames are dropped.
VLAN Trunking Enable VLAN Trunking on ports connected to other switches or routers (but not ports directly connected to end users) to allow frames belonging to unknown VLAN groups to pass through
the switch. Apply Click Apply to save the changes. Cancel Click Cancel to start configuring the screen again.
7.2.2 802.1Q Static VLAN You can dynamically have a port join a VLAN group using GVRP, permanently assign a port to be a member of a VLAN group or prohibit a port from joining a VLAN group in this screen. Click Static VLAN in the VLAN Status screen to display the screen as shown next.
7-6 VLAN Dimension ES-3024 Ethernet Switch
The following table describes the labels in this screen.
Table 7-4 802.1Q Static VLAN LABEL DESCRIPTION Active Select this check box to enable the VLAN. Name Enter a descriptive name for this VLAN group for identification purposes.
VLAN Group ID Enter the VLAN ID for this static VLAN entry; the valid range is between 1 and 4094.
The port number identifies the port you are configuring. Ports 25 and 26 are the uplink ports. S1 and S2 are the stacking ports.
Control Select Normal for the port to dynamically join this VLAN group using GVRP. This is the default selection. Select Fixed for the port to be a permanent member of this VLAN group. Select Forbidden if you want to prohibit the port from joining this VLAN group.
Tagging Select TX Tagging if you want the port to tag all outgoing frames transmitted with this VLAN Group ID.
Add Click Add to save the new rule to the switch. It then displays in the summary table at the bottom of the screen.
Cancel Click Cancel to reset the fields to your previous configuration.
Clear Click Clear to clear the fields to the factory defaults.
Viewing and Editing VLAN Settings
To view a summary of the VLAN configuration, scroll down to the summary table at the bottom of the Static
To change the settings of a rule, click a number in the VID field.
vin Active Name Delete 1 Yes 1 [mi
Figure 7-6 Static VLAN: Summary Table
The following table describes the labels in this screen.
Table 7-5 Static VLAN: Summary Table
LABEL DESCRIPTION VID This field displays the ID number of the VLAN group. Click the number to edit the VLAN settings. Active This field indicates whether the VLAN settings are enabled (Yes) or disabled (No). Name This field displays the descriptive name for this VLAN group. Delete Click Delete to remove the selected entry from the summary table. Cancel Click Cancel to clear the Delete check boxes.
7-8 VLAN Dimension ES-3024 Ethernet Switch
L @ Static VLAN 2] ACTIVE Name VLAN Group ID Port Control 1 € Normal & Fixed 2 © Normal © Fixed 3 © Normal © Fied 4 © Normal © Fied 5 © Normal © Fied 6 € Normal © Fixed 7 € Normal © Fixed 8 © Normal © Fixed 9 € Normal & Fixed 10 © Normal © Fixed 11 © Normal © Fied 12 € Normal & Fixed 13 © Normal © Fixed 14 © Normal © Fixed 15 € Normal © Fixed 16 € Normal © Fixed 17 € Normal © Fixed 18 € Normal & Fixed 19 © Normal © Fixed 20 © Normal © Fied 21 © Normal © Fied 22 © Normal © Fixed 23 € Normal © Fixed 24 € Normal © Fixed 25 € Normal © Fixed 26 © Normal & Fixed s1 © Normal © Fixed 82 © Normal © Fied
Dimension ES-3024 Ethernet Switch
7.3 Introduction to Port-based VLANS Port-based VLANSs are VLANSs where the packet forwarding decision is based on the destination MAC address and its associated port.
Port-based VLANSs require allowed outgoing ports to be defined for each port. Therefore, if you wish to allow two subscriber ports to talk to each other, for example, between conference rooms in a hotel, you must define the egress (an egress port is an outgoing port, that is, a port through which a data packet leaves) for both ports.
Port-based VLANS are specific only to the switch on which they were created.
The port-based VLAN setup screen is shown next. The CPU management port forms a VLAN with all Ethernet ports.
7.3.1 Configuring a Port-based VLAN Select Port Based as the VLAN Type in the Switch Setup screen under Basic Setting and then click VLAN under Advanced Application to display the next screen.
7-10 VLAN Dimension ES-3024 Ethernet Switch
Figure 7-8 Port Based VLAN Setup (All Connected)
[a [a L L L L D L (=) L
Figure 7-9 Port Based VLAN Setup (Port isolation)
The following table describes the labels in this screen.
LABEL DESCRIPTION Setting Wizard
Choose from All connected or Port isolation.
All connected means all ports can communicate with each other, that is, there are no virtual LANSs. All incoming and outgoing ports are selected (Figure 7-8). This option is the most flexible but also the least secure.
Port isolation means that each port can only communicate with the CPU management port and cannot communicate with each other. All incoming ports are selected while only the CPU outgoing port is selected (Figure 7-9). This option is the most limiting but also the most secure.
After you make your selection, click Apply (top right of screen) to display the screens as mentioned above. You can still customize these settings by adding/deleting incoming or outgoing ports, but you must also click Apply at the bottom of the screen.
These are the ingress ports; an ingress port is an incoming port, that is, a port through which a data packet enters. If you wish to allow two subscriber ports to talk to each other, you must define the ingress port for both ports. The numbers in the top row denote the incoming port for the corresponding port listed on the left (its outgoing port). CPU refers to the switch management port. By default it forms a VLAN with all Ethernet ports. If it does not form a VLAN with a particular port then the switch cannot be managed from that port.
These are the egress ports; an egress port is an outgoing port, that is, a port through which a data packet leaves. If you wish to allow two subscriber ports to talk to each other, you must define the egress port for both ports. CPU refers to the switch management port. By default it forms a VLAN with all Ethernet ports. If it does not form a VLAN with a particular port then the switch cannot be managed from that port.
Click Apply to save the changes, including the “wizard settings”.
Click Cancel to start configuring the screen again.
Dimension ES-3024 Ethernet Switch
Chapter 8 Static MAC Forward Setup
Use these screens to configure static MAC address forwarding.
8.1 Introduction to Static MAC Forward Setup
A static MAC address entry is an address that has been manually entered in the MAC address learning table. Static MAC addresses do not age out. When you set up static MAC address rules, you are setting static MAC addresses for a port. Devices that match static MAC address rules on a port can only receive traffic on that port
and cannot receive traffic on other ports. This may reduce unicast flooding.
8.2 Configuring Static MAC Forwarding
Click Static MAC Forwarding to display the configuration screen as shown.
L_@W Static MAC Forwarding ___2 Active [mi Name MAC Address [| [| [ VID PF Port h
_Add|_Cencel | Clear
Index Active Name MAC Address Delete Delete | Cancel
Figure 8-1 Static MAC Forwarding
The following table describes the labels in this screen. Table 8-1 Static MAC Forwarding LABEL DESCRIPTION Active Select this check box to activate your rule. You may temporarily deactivate a rule without deleting it by clearing this check box.
Name Enter a descriptive name for identification purposes for this static MAC address forwarding rule.
Static MAC Forward Setup
Dimension ES-3024 Ethernet Switch
Table 8-1 Static MAC Forwarding
LABEL DESCRIPTION MAC Address |Enter the MAC address in valid MAC address format, that is, six hexadecimal character pairs. Static MAC addresses do not age out.
VID Enter the VLAN identification number.
Port Select a port where the MAC address entered in the previous field will be automatically forwarded.
Add Click Add to save the new rule to the switch. It then displays in the summary table at the bottom of the screen.
Cancel Click Cancel to reset the fields to your previous configuration.
Clear Click Clear to clear the fields to the factory defaults.
8.3 Viewing and Editing Static MAC Forwarding Rules
To view a summary of the rule configuration, scroll down to the summary table at the bottom of the Statie MAC Forwarding screen.
To change the settings of a rule, click a number in the Index field.
Index Active Name MAC Address Port Delete
1 Yes test 0a:b2:a0:81#3:7e 11 3 O Delete | Cancel
Figure 8-2 Static MAC Forwarding: Summary Table
The following table describes the labels in this screen.
Table 8-2 Static MAC Forwarding: Summary Table
LABEL DESCRIPTION Index Click an index number to modify a static MAC address rule for a port.
Active This field displays whether this static MAC address forwarding rule is active (Yes) or not (No). You may temporarily deactivate a rule without deleting it.
Name This field displays the descriptive name for identification purposes for this static MAC address- forwarding rule.
MAC Address |This field displays the MAC address that will be forwarded and the VLAN identification number to which the MAC address belongs.
Port This field displays the port where the MAC address shown in the next field will be forwarded.
Delete Check the rule(s) that you want to remove in the Delete column, then click the Delete button.
Cancel Click Cancel to clear the selected checkboxes in the Delete column.
8-2 Static MAC Forward Setup
Dimension ES-3024 Ethernet Switch
This chapter discusses static IP and MAC address port filtering.
9.1 Introduction to Filtering
Port filtering means sifting traffic from one or all ports to one or all ports based on the source and/or destination MAC addresses and VLAN group (ID).
9.1.1 Note About Configuration
The following rules apply when configuring filtering.
The rule applies to traffic flowing in both directions if both a source and destination are specified.
The rule applies to traffic flowing in one direction if either a source or destination is specified.
No any-to-any rules are allowed. That is, you cannot select Ignore for both the source and destination ports. No blank rules are allowed. If you do not select Ignore, you must set the related fields.
You can forward a MAC address to one port or all ports (AII Ports) but not two different ports.
9.2 Configuring a Filtering Rule
Click Filtering to display the screen as shown next.
Figure 9-1 Filtering The following table describes the related labels in this screen.
deactivate a rule without deleting it by deselecting this check box.
Active Make sure to select this check box to activate your rule. You may temporarily
Name Type a descriptive name for this filter rule. This is for identification purpose only. Protocol Select the protocol type to which this rule applies. Source The next fields pertain to the source MAC address and source port.
Ignore Click this check box to ignore any traffic from all source ports.
MAC Address Type a MAC address in valid MAC address format, that is, six hexadecimal character pairs or click Any MAC /VID to apply the filter rule to all MAC addresses and VLAN
The VID for the source and destination must be the same.
Select the port to which the filter rule should be applied. You may choose one port only or all ports (All Ports).
The next fields pertain to the destination MAC address and destination port.
Click this check box to ignore any traffic to all destination ports.
Type a MAC address in valid MAC address format, that is, six hexadecimal character pairs or click Any MAC/VID to apply the filter rule to all MAC addresses and VLAN groups.
VID Type the VLAN group identification number.
Select the port to which the filter rule should be applied. You may choose one port only or all ports (All Ports).
Click Add to save the new rule to the switch. It then displays in the summary table at the bottom of the screen.
Click Cancel to reset the fields to your previous configuration.
Click Clear to clear the fields to the factory defaults.
9.3 Viewing and Editing Filter Rules
To view a summary of the rule configuration, scroll down to the summary table at the bottom of the Filtering
To change the settings of a rule, click a number in the Index field.
Name Source Destination Delete
Figure 9-2 Filtering: Summary Table
The following table describes the labels in the summary table.
Table 9-2 Filtering: Summary Table
LABEL DESCRIPTION Index This field displays the index number of the rule. Click an index number to edit the rule. Active This field displays Yes when the rule is activated and No when is it deactivated. Name This field displays the descriptive name for this rule. This is for identification purpose only. Source This field displays the source port number, the source MAC address with the VLAN identification
number to which the MAC address belongs or a combination of the two.
All Entries means all MAC addresses from all ports.
Destination |This field displays the destination port number, the destination MAC address with the VLAN identification number to which the MAC address belongs or a combination of the two.
All Entries means all MAC addresses from all ports.
Delete Check the rule(s) that you want to remove in the Delete column and then click the Delete button.
Cancel Click Cancel to clear the selected checkboxes in the Delete column.
STP detects and breaks network loops and provides backup links between switches, bridges or routers. It allows a switch to interact with other STP-compliant switches in your network to ensure that only one route exists between any two stations on the network.
10.1.1 STP Terminology
The root bridge is the base of the spanning tree: it is the bridge with the lowest identifier value (MAC address).
Path cost is the cost of transmitting a frame onto a LAN through that port. It is assigned according to the speed of the link to which a port is attached. The slower the media, the higher the cost - see the next table.
Table 10-1 STP Path Costs
LINK SPEED | RECOMMENDED VALUE RECOMMENDED RANGE ALLOWED RANGE Path Cost | 4Mbps 250 100 to 1000 1 to 65535 Path Cost | 10Mbps 100 50 to 600 1 to 65535 Path Cost | 16Mbps 62 40 to 400 1 to 65535 Path Cost | 100Mbps 19 10 to 60 1 to 65535 Path Cost | 1Gbps 3 to 10 1 to 65535 Path Cost | 10Gbps 1to5 1 to 65535
On each bridge, the root port is the port through which this bridge communicates with the root. It is the port on this switch with the lowest path cost to the root (the root path cost). If there is no root port, then this switch has been accepted as the root bridge of the spanning tree network.
For each LAN segment, a designated bridge is selected. This bridge has the lowest cost to the root among the
bridges connected to the LAN.
After a bridge determines the lowest cost-spanning tree with STP, it enables the root port and the ports that are the designated ports for connected LANSs, and disables all other ports that participate in STP. Network packets are therefore only forwarded between enabled ports, eliminating any possible network loops.
STP-aware switches exchange Bridge Protocol Data Units (BPDUSs) periodically. When the bridged LAN topology changes, a new spanning tree is constructed.
Spanning Tree Protocol
Once a stable network topology has been established, all bridges listen for Hello BPDUSs (Bridge Protocol Data Units) transmitted from the root bridge. If a bridge does not get a Hello BPDU after a predefined interval (Max Age), the bridge assumes that the link to the root bridge is down. This bridge then initiates negotiations with other bridges to reconfigure the network to re-establish a valid network topology.
10.1.3 STP Port States
STP assigns five port states (see next table) to eliminate packet looping. A bridge port is not allowed to go directly from blocking state to forwarding state so as to eliminate transient loops.
Table 10-2 STP Port States
PORT STATE DESCRIPTION Disabled STP is disabled (default). Blocking Only configuration and management BPDUSs are received and processed. Listening All BPDUSs are received and processed. Learning All BPDUSs are received and processed. Information frames are submitted to the learning process but not forwarded. Forwarding All BPDUSs are received and processed. All information frames are received and forwarded.
Click Advanced Application and then Spanning Tree Protocol in the navigation panel to display the STP status as shown in the screen next.
The following table describes the labels in this screen.
Table 10-3 Spanning Tree Protocol: Status
LABEL DESCRIPTION Spanning Tree Protocol |This field displays Running if STP is activated. Otherwise, it displays Down.
Bridge Root refers to the base of the spanning tree (the root bridge). Our Bridge is this switch. This switch may also be the root bridge.
Bridge ID This is the unique identifier for this bridge, consisting of bridge priority plus MAC address. This ID is the same for Root and Our Bridge if the switch is the root switch.
Hello Time (second) This is the time interval (in seconds) at which the root switch transmits a configuration message. The root bridge determines Hello Time, Max Age and Forwarding Delay
Max Age (second) This is the maximum time (in seconds) a switch can wait without receiving a configuration message before attempting to reconfigure.
Spanning Tree Protocol 10-3
This is the time (in seconds) the root switch will wait before changing states (that is, listening to learning to forwarding).
This is the path cost from the root port on this switch to the root switch.
Port ID This is the priority and number of the port on the switch through which this switch must communicate with the root of the Spanning Tree.
Topology Changed Times
This is the number of times the spanning tree has been reconfigured.
Time Since Last Change
This is the time since the spanning tree was last reconfigured.
The text box displays how often (in seconds) this screen refreshes. You may change the refresh interval by typing a new number in the text box and then clicking Set Interval.
Click Stop to halt STP statistic polling.
Active Bridge Priority
The following table describes the labels in this screen.
Table 10-4 Spanning Tree Protocol: Configuring
LABEL DESCRIPTION Active
Select this check box to activate STP.
Bridge priority is used in determining the root switch, root port and designated port. The switch with the highest priority (lowest numeric value) becomes the STP root switch. If all switches have the same priority, the switch with the lowest MAC address will then become the root switch. The allowed range is 0 to 65535.
The lower the numeric value you assign, the higher the priority for this bridge.
Bridge Priority determines the root bridge, which in turn determines Hello Time, Max Age and Forwarding Delay.
Hello Time This is the time interval in seconds between BPDU (Bridge Protocol Data Units) configuration message generations by the root switch. The allowed range is 1 to 10 seconds.
Max Age This is the maximum time (in seconds) a switch can wait without receiving a BPDU before attempting to reconfigure. AIl switch ports (except for designated ports) should receive BPDUSs at regular intervals. Any port that ages out STP information (provided in the last BPDU) becomes the designated port for the attached LAN. [fit is a root port, a new root port is selected from among the switch ports attached to the network. The allowed range is 6 to 40 seconds.
Forwarding This is the maximum time (in seconds) a switch will wait before changing states. This delay is
Delay required because every switch must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to a blocking state; otherwise, temporary data loops might result. The allowed range is 4 to 30 seconds.
As a general rule: 2 * (Forward Delay - 1) >= Max Age >= 2 * (Hello Time + 1)
Port This field displays the port number.
Active Select this check box to activate STP on this port.
Priority Configure the priority for each port here.
Priority decides which port should be disabled when more than one port forms a loop in a switch. Ports with a higher priority numeric value are disabled first. The allowed range is between 0 and 255 and default value is 128.
Path Cost Path cost is the cost of transmitting a frame on to a LAN through that port. lt is assigned according to the speed of the bridge. The slower the media, the higher the cost - see Table 10-1 for more information.
Apply Click Apply to save your changes back to the switch.
Cancel Click Cancel to begin configuring this screen afresh.
10-6 Spanning Tree Protocol
Dimension ES-3024 Ethernet Switch
This chapter shows you how you can cap the maximum bandwidth allowed from specific source(s) to specified destination(s) using the Bandwidth Control setup screens.
11.1Introduction to Bandwidth Control
Bandwidth control means defining a maximum allowable bandwidth for traffic flows from specified source(s) to specified destination(s). Click Advanced Application and then Bandwidth Control in the navigation panel to bring up the screen as shown next.
11.1.1 Note About Configuration
The following rules apply when configuring bandwidth control.
° The rule applies to traffic flowing in both directions if both a source and destination are specified.
° The rule applies to traffic flowing in one direction if either a source or destination is specified.
° No any-to-any rules are allowed, that is, you cannot select Ignore for both the source and destination ports.
° No port-to-port rules are allowed, that is, you cannot set the switch to perform bandwidth management between two ports on the same switch.
° No blank rules are allowed. If you do not select Ignore, you must set the related fields.
Bandwidth Control 11-1
Any MAC VID WMC © EH D HE E Address
Index Active Name Max. Bandwidth Source Destination Delete
Figure 11-1 Bandwidth Control
The following table describes the labels in this screen.
Table 11-1 Bandwidth Control
LABEL DESCRIPTION Active Make sure to select this check box to activate your rule. You may temporarily deactivate a rule Without deleting it by deselecting this check box. Name Type a descriptive name for this rule. This is for identification purpose only. Maximum Type the maximum bandwidth allowed in kilobits per second (kbps) for this traffic flow. Bandwidth Protocol Select the protocol traffic to which this rule applies. Source The next fields pertain to the source MAC address and source port. Ignore Click this check box to ignore any traffic from all source ports.
Dimension ES-3024 Ethernet Switch
Table 11-1 Bandwidth Control
LABEL DESCRIPTION MAC Address |Select Any MAC/VID to apply the rule to all MAC address and VLAN group identification numbers. To specify a source, select the second choice and type a MAC address in valid MAC address format (six hexadecimal character pairs) and then enter the VLAN group identification number. VID |Type the VLAN group identification number. The VID for the source and destination must be the same. Port Select the port to which the rule should be applied. You may choose one port only or all ports (AIl Ports). Destination The next fields pertain to the destination MAC address and destination port. Ignore Click this check box to ignore any traffic to all destination ports. MAC Address |Select Any MAC/VID to apply the rule to all MAC address and VLAN group identification numbers. To specify a destination, select the second choice and type a MAC address in valid MAC address format (six hexadecimal character pairs) and then enter the VLAN group identification number. VID |Type the VLAN group identification number. The VID for the source and destination must be the same. Port Select the port to which the rule should be applied. You may choose one port only or all ports (AIl Ports). Add Click Add to save the new rule to the switch. It then displays in the summary table at the bottom of the screen. Cancel Click Cancel to reset the fields to your previous configuration. Clear Click Clear to clear the fields to the factory defaults.
11.2Viewing and Editing a Bandwidth Control Rule
To view a summary of the rule configuration, scroll down to the summary table at the bottom of the Bandwidth
To change the settings of a rule, click a number in the Index field.
Name Max. Bandwidth Source Destination Delete
The following table describes the labels in this screen.
Table 11-2 Bandwidth Control: Summary Table
LABEL DESCRIPTION Index This field displays the index number of a bandwidth control rule. Click this number to edit the rule settings.
Active This field indicates whether the bandwidth control rule is enabled (Yes) or disabled (No).
Name This field displays the descriptive name of the rule.
Max. This field displays the maximum bandwidth allowed in kilobits per second (kbps) for the rule.
Source This field displays the source port number, the source MAC address with the VLAN identification number to which the MAC address belongs or a combination of the two. All Entries means all IP/MAC addresses from all ports.
Destination This field displays the destination port number, the destination MAC address with the VLAN identification number to which the MAC address belongs or a combination of the two. All Entries means all IP/MAC addresses from all ports.
Delete Check the rule(s) that you want to remove in the Delete column, and then click the Delete button.
Cancel Click Cancel to clear the selected checkboxes in the Delete column.
Advanced Applications
This part shows you how to configure the Broadcast Storm Control, Mirroring, Link Aggregation, Port Authentication, Port Security, Access Control and Queuing Method Advanced Application screens.
Dimension ES-3024 Ethernet Switch
Chapter 12 Broadcast Storm Control
12.1Introducing Broadcast Storm Control
Broadcast storm control limits the number of broadcast frames that can be stored in the switch buffer or sent out from the switch. Broadcast frames that arrive when the buffer is full are discarded. Enable this feature to reduce broadcast traffic coming into your network.
12.2Configuring Broadcast Storm Control
Click Broadcast Strom Control in the navigation panel to display the screen as shown next.
Broadcast Storm Control 12-1
Dimension ES-3024 Ethernet Switch
L @D Broadcast Storm Control ___] Active (rl
Monitor Interval 64 =| microseconds
Direction Incoming “|
Port Incoming Outgoing 1 [32767 =] Frames 32767 -| Frames 2 32767 +] Frames 32767 -l Frames 3 32787 x] Frames 32767 x] Frames 4 [32767 x] Frames 32767 x] Frames 5 [32767 x] Frames 32767 | Frames 6 32767 | Frames [82767 | Frames 7 [32767 +] Frames 32767 -| Frames 8 [32767 »| Frames 32767 - Frames 9 [32767 x] Frames 32767 x] Frames 10 32767 -| Frames 32767 -l Frames 11 32767 >| Frames 32767 -| Frames 12 32767 xl Frames 32767 :| Frames 13 [32767 »| Frames 32767 Ël Frames 14 32767 -| Frames 32767 -| Frames 15 32767 =] Frames [32767 -| Frames 16 [32767 »| Frames 32767 -| Frames 17 [32767 >] Frames 32767 | Frames 18 32767 -| Frames 32767 -| Frames 19 32767 -| Frames 32767 -| Frames 20 32767 :l Frames 32767 -| Frames 21 32767 | Frames 32767 :l Frames 22 132767 ] rrames 32767 x] Frames 23 32767 -| Frames [32767 -| Frames 24 [32767 +] Frames 32767 x] Frames 25 32767 x] Frames 32767 x] Frames = 3
Figure 12-1 Broadcast Storm Control
The following table describes the labels in this screen.
12-2 Broadcast Storm Control
Select this check box to enable broadcast storm control on the switch.
When the Monitor Interval time period expires, each port begins counting broadcast frames allowed in its buffers anew. Select a time period from 64, 1024, 8000, 256000 microseconds from the drop-down list box.
Direction Choose to monitor broadcast packets coming into the switch (Incoming) or going out of the switch (Outgoing).
Port This field displays a port number.
Incoming From the drop-down list box, select how many broadcast frames the port can store in the switch buffer.
Outgoing From the drop-down list box, select how many frames the port will send out
Apply Click Apply to save your changes back to the switch.
Cancel Click Cancel to begin configuring this screen afresh.
Broadcast Storm Control 12-3
Dimension ES-3024 Ethernet Switch
Chapter 13 Mirroring
This chapter discusses the Mirror setup screens.
13.1Introduction to Port Mirroring
Port mirroring allows you to copy traffic going from one or all ports to another or all ports in order that you can examine the traffic from the mirror port (the port you copy the traffic to) without interference.
13.2Port Mirroring Configuration
Click Advanced Application and then Mirroring in the navigation panel to display the Mirroring screen.
13.2.1 Note About Configuration
The following rules apply when configuring mirroring.
° The rule applies to traffic flowing in both directions if both a source and destination are specified.
° The rule applies to traffic flowing in one direction if either a source or destination is specified.
° No any-to-any rules are allowed. That is, you cannot select Ignore for both the source and destination ports.
° No blank rules are allowed. If you do not select Ignore, you must set the related fields.
13.2.2 Setting Up the Mirror Port
You must first select a mirror port. À mirror port is a port that copies the traffic of another port.
Le Mirrorng __} Active ÊÜ
Mirror Port Porti » Apply | Reset
Figure 13-1 Mirroring: Mirror Port Setting
The following table describes the related labels in this screen.
Dimension ES-3024 Ethernet Switch
Table 13-1 Mirroring: Mirror Port Setting
LABEL DESCRIPTION Active Clear this check box to deactivate port mirroring on the switch. Mirror Port The mirror port is the port you copy the traffic to in order to examine it in more detail without
interfering with the traffic flow on the original port(s). Select this port from this drop-down list box.
Apply Click Apply to save the changes.
Cancel Click Cancel to start configuring the screen again.
13.2.3 Configuring a Mirroring Rule
After you select a mirror port, configure a mirroring rule in the related fields in the Mirroring screen.
L Active [e Mirror Port Por » Apply | Reset —| Active Name Protocol [All FA Source F ignore 6 Any MAC ! VID mc wc D-0N.EN.ON.ON. EN vo I Rule Port All Ports “| Destination PT ignore [ol Any MAC j VID ec M S-DS-DN-ONON .N vD (| Port All Ports » LT À Add| Cancel | Cisar| Figure 13-2 Mirroring: Configuring a Mirroring Rule The following table describes the related labels in this screen. 13-2 Mirroring
Make sure to select this check box to activate your rule. You may temporarily deactivate a rule Without deleting it by deselecting this check box.
Type a descriptive name for this rule. This is for identification purpose only.
Select the protocol traffic to which this rule applies.
The next fields pertain to the source MAC address and source port.
Click this check box to ignore any traffic from all source ports.
Select Any MAC/VID to apply the rule to all MAC address and VLAN group identification numbers.
VI D|Type the VLAN group identification number.
Select the port to which the rule should be applied. You may choose one port only or all ports (AIl Ports).
The next three fields pertain to the destination MAC address and destination port.
Click this check box to ignore any traffic to all destination ports.
Select Any MAC/VID to apply the rule to all MAC address and VLAN group identification numbers.
VI D|Type the VLAN group identification number.
Select the port to which the rule should be applied. You may choose one port only or all ports (AIl Ports).
Click Add to inset the entry to the summary table below.
Click Cancel to reset the fields.
Click Clear to start configuring the screen again.
Editing and Viewing a Mirroring Rule
To view a summary of the rule configuration, scroll down to the summary table at the bottom of the Mirroring
To change the settings of a rule, click a number in the Index field.
Dimension ES-3024 Ethernet Switch
Index Active Name Source Destination Delete Delete | Cancel Figure 13-3 Mirroring: Summary Table The following table describes the related labels in this screen. Table 13-3 Mirroring: Summary Table LABEL DESCRIPTION Index This field displays the index number of a rule. Click this number to edit the rule settings. Active This field indicates whether the rule is enabled (Yes) or disabled (No). Name This field displays the descriptive name of the rule.
Source This field displays the source port number, the source MAC address with the VLAN All Entries means all IP/MAC addresses from all ports.
identification number to which the MAC address belongs or a combination of the two.
All Entries means all IP/MAC addresses from all ports.
Destination This field displays the destination port number, the destination MAC address with the VLAN identification number to which the MAC address belongs or a combination of the two.
Delete Check the rule(s) that you want to remove in the Delete column, and then click the Delete button. Cancel Click Cancel to clear the selected checkboxes in the Delete column. 13-4 Mirroring
Dimension ES-3024 Ethernet Switch
Chapter 14 Link Aggregation
This chapter shows you how to logically aggregate physical links to form one logical, higher-bandwidth link.
14.1 Introduction to Link Aggregation
Link aggregation (trunking) is the grouping of physical ports into one logical higher-capacity link. You may want to trunk ports if for example, it is cheaper to use multiple lower-speed links than to under-utilize a high-speed, but more costly, single-port link.
However, the more ports you aggregate then the fewer available ports you have. A link aggregation group is one logical link containing multiple ports.
The first port must be physically connected when forming a trunk group.
Table 14-1 Link Aggregation Groups
LINK AGGREGATION BEGINNING-TO-END PORT RANGE GROUP 1 1to8 2 9 to 16 3 17 to 24 4 25 and 26 (the uplink ports) 5 S1 and S2 (the stacking ports)
141.1 Dynamic Link Aggregation
The ES-3024 adheres to the 802.3ad standard for static and dynamic (LACP) port trunking.
The ES-3024 supports the link aggregation IEEE802.3ad standard. This standard describes the Link Aggregate Control Protocol (LACP), which is a protocol that dynamically creates and manages trunk groups.
When you enable LACP link aggregation on a port, the port can automatically negotiate with the ports at the remote end of a link to establish trunk groups. LACP also allows port redundancy, that is, if an operational port fails, then one of the “standby” ports become operational without user intervention
You must connect all ports point-to-point to the same Ethernet switch and configure the ports for LACP trunking.
LACP only works on full-duplex links.
All ports in the same trunk group must have the same media type, speed, duplex mode and flow control settings.
Link Aggregation 14-1
Dimension ES-3024 Ethernet Switch
Configure trunk groups or LACP before you connect the Ethernet switch to avoid causing network topology loops.
14.12 Link Aggregation ID LACP aggregation ID consists of the following information:
0000 00-00-00-00-00 000p7 00 0000
System priority Local switch MAC address Kéy Port Priority! | Port Number
0000 00-00-00-00-00 0000 00 0000
System priority MAC address Key Port Priority! | Port Number
Figure 14-1 Aggregation ID
14.2Link Aggregation Protocol Status
Click Link Aggregation in the navigation panel to display the Link Aggregation Protocol Status screen.
? This is “0” as it is the aggregator ID for the link aggregation group, not the individual port.
14-2 Link Aggregation
Dimension ES-3024 Ethernet Switch
40 Set Interval Stop
Figure 14-2 Link Aggregation: Link Aggregation Protocol Status
The following table describes the labels in this screen.
Table 14-2 Link Aggregation: Link Aggregation Protocol Status
LABEL DESCRIPTION Index
This field displays the trunk ID to identify a trunk group, that is, one logical link containing multiple ports.
Aggregator ID Refer to Figure 14-1 for more information on this field.
These are the ports you have configured in the Link Aggregation screen to be in the trunk group.
These are the ports that are currently transmitting data as one logical link in this trunk group.
The text box displays how often (in seconds) this screen refreshes. You may change the refresh interval by typing a new number in the text box and then clicking Set Interval.
Click Stop to halt statistic polling.
Figure 14-3 Link Aggregation: Configuration
The following table describes the labels in this screen.
Table 14-3 Link Aggregation: Configuration
LABEL DESCRIPTION Link Aggregation Control Protocol
LACP system priority is a number between 1 and 65,355. The switch with the lowest system priority (and lowest port number if system priority is the same) becomes the LACP “server”. The LACP “server” controls the operation of LACP setup. Enter a number to set the priority of an active port using Link Aggregate Control Protocol (LACP). The smaller the number, the higher the priority level.
Index The index identifies the link aggregation group, that is, one logical link containing multiple ports
Active Make sure to select this check box to activate the trunk group. You may temporarily deactivate a trunk group without deleting it by clearing this check box.
Starting Port This is the beginning port in the trunk group's port range and is not configurable - see Table 14-1.
Ending Port Select the end port in the port range from the drop-down list box — see Table 14-1.
LACP Select this check box to enable LACP for a trunk.
14-4 Link Aggregation
Dimension ES-3024 Ethernet Switch
Table 14-3 Link Aggregation: Configuration
LABEL DESCRIPTION LACP Timeout Timeout is the time interval between the individual port exchanges of LACP packets in order to check that the peer port in the trunk group is still up. If a port does not respond after three tries, then it is deemed to be “down” and is removed from the trunk. Set a short timeout (one second) for busy trunked links to ensure that disabled ports are removed from the trunk group as soon as possible.
Select either 1 second or 30 seconds.
Apply Click Apply to save your changes back to the switch.
Cancel Click Cancel to begin configuring this screen afresh.
Link Aggregation 14-5
Dimension ES-3024 Ethernet Switch
This chapter describes the 802.1x authentication method and RADIUS server connection setup.
15.1Introduction to Authentication
IEEE 802.1x is an extended authentication protocol” that allows support of RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) for centralized user profile management on a network RADIUS server.
15.1.1 RADIUS RADIUS (Remote Authentication Dial-In User Service) authentication is a popular protocol used to authenticate users by means of an external server instead of (or in addition to) an internal device user database that is limited to the memory capacity of the device. In essence, RADIUS authentication allows you to validate an unlimited number of users from a central location.
Figure 15-1 RADIUS Server
15.2Configuring Port Authentication
To enable port authentication, first activate IEEE802.1x security (both on the ES-3024 and the port(s)) then configure the RADIUS server settings.
Click Port Authentication under Advanced Application in the navigation panel to display the screen as shown.
? At the time of writing, Windows XP of the Microsoft operating systems supports 802.1x. See the Microsoft web site for information on other Windows operating system support. For other operating systems, see its documentation. If your operating system does not support 802.1x, then you may need to install 802.1x client software.
Port Authentication 15-1
Dimension ES-3024 Ethernet Switch
[_@ Port Authentication
Figure 15-2 Port Authentication
From the Port Authentication screen, click RADIUS to display the configuration screen as shown.
Figure 15-3 Port Authentication: RADIUS The following table describes the labels in this screen.
Table 15-1 Port Authentication: RADIUS LABEL DESCRIPTION Authentication Server
IP Address Enter the IP address of the external RADIUS server in dotted decimal notation.
UDP Port The default port of the RADIUS server for authentication is 1812. You need not change this value unless your network administrator instructs you to do so.
Shared Secret Specify a password (up to 31 alphanumeric characters) as the key to be shared between the external RADIUS server and the switch. This key is not sent over the network. This key must be the same on the external RADIUS server and the switch.
Apply Click Apply to save your changes back to the switch.
Cancel Click Cancel to begin configuring this screen afresh.
15.2.2 Configuring IEEE802.1x
From the Port Authentication screen, click 802.1x to display the configuration screen as shown.
The following table describes the labels in this screen.
Dimension ES-3024 Ethernet Switch
Table 15-2 Port Authentication: 802.1x
LABEL DESCRIPTION Active Select this check box to permit 802.1x authentication on the switch. You must first allow 802.1x authentication on the switch before configuring it on each port. Port This field displays a port number. Active Select this checkbox to permit 802.1x authentication on this port. You must first allow 802.1x
authentication on the switch before configuring it on each port.
Specify if a subscriber has to periodically re-enter his or her username and password to stay connected to the port.
Reauthentication Timer
Specify how often a client has to re-enter his or her username and password to stay connected to the port.
Apply Click Apply to save your changes back to the switch. Cancel Click Cancel to begin configuring this screen afresh. 15-4 Port Authentication
Dimension ES-3024 Ethernet Switch
Chapter 16 Port Security
This chapter shows you how to set up port security.
16.1 About Port Security
Port security allows only packets with dynamically learned MAC addresses and/or configured static MAC addresses to pass through a port on the switch. The switch can learn up to 16K MAC addresses in total with no limit on individual ports other than the sum cannot exceed 16K.
For maximum port security, enable this feature, disable MAC address learning and configure static MAC address(es) for a port. It is not recommended you disable Port Security together with MAC address learning as this will result in many broadcasts.
16.2Port Security Setup
Click Port Security in the navigation panel to display the screen as shown.
The following table describes the labels in this screen.
Select this check box to enable MAC address learning on this port.
MAC address learning reduces outgoing broadcast traffic. For MAC address learning to occur on a port, the port itself must be active with address learning enabled.
Learned MAC Use this field to limit the number of (dynamic) MAC addresses that may be learned on a port. For example, if you set this field to "5" on port 2, then only the devices with these five learned
Address MAC addresses may access port 2 at any one time. À sixth device would have to wait until one of the five learned MAC addresses aged out. MAC-address aging out time can be set in the Switch Setup screen. The valid range is from “0” to “254”. “0” means this feature is disabled, so the switch will learn MAC addresses up to the global limit of 16K.
Apply Click Apply to save your changes back to the switch.
Cancel Click Cancel to begin configuring this screen afresh.
This chapter describes how to control access to the switch.
17.1About Access Control
Click Access Control from the navigation panel to display the screen as shown. From this screen you can configure SNMP, up to four web configurator administrators, enable/disable remote service access and configure trusted
computers for remote ac
SNMP Click Here Logins Click Here Service Access Control ClickHere Remote Management Click Here
Figure 17-1 Access Control
17.2Access Control Overview
1. A console port access control session and Telnet access control session cannot coexist. The console port has higher priority. If you telnet to the switch and someone is already logged in from the console port, then you will
see the following message.
“Local administrator is configuring this device now!!!
Connection to host lost.”
Figure 17-2 Console Port Priority
2. A console port or Telnet session can coexist with one FTP session, up to five Web sessions (five different usernames and passwords) and/or limitless SNMP access control sessions.
Dimension ES-3024 Ethernet Switch
Table 17-1 Access Control Summary
Console port Telnet FTP Web SNMP Number of 1 1 1 5 No limit sessions allowed Number of 1 console port or Telnet. 1 5 No limit concurrent Console port has priority. sessions allowed
17.3About SNMP Simple Network Management Protocol is a protocol used for exchanging management information between network switches. SNMP is a member of TCP/IP protocol suite. À manager station can manage and monitor the ES-3024 through the network via SNMP version one (SNMPv1) and/or SNMP version 2c. The next figure illustrates an SNMP management operation. SNMP is only available if TCP/IP is configured.
MANAGER SNMP AGENT AGENT AGENT Managed Device Managed Device Managed Device
Figure 17-3 SNMP Management Model An SNMP managed network consists of two main components: agents and a manager.
An agent is a management software module that resides in a managed switch (the ES-3024). An agent translates the local management information from the managed switch into a form compatible with SNMP. The manager is the console through which network administrators perform network management functions. It executes applications that control and monitor managed devices.
The managed devices contain object variables/managed objects that define each piece of information to be collected about a switch. Examples of variables include such as number of packets received, node port status etc. A
Dimension ES-3024 Ethernet Switch
Management Information Base (MIB) is a collection of managed objects. SNMP allows a manager and agents to communicate for the purpose of accessing these objects.
SNMP itself is a simple request/response protocol based on the manager/agent model. The manager issues a request and the agent returns responses using the following protocol operations:
Table 17-2 SNMP Commands
COMMAND DESCRIPTION Get Allows the manager to retrieve an object variable from the agent. GetNext Allows the manager to retrieve the next object variable from a table or list within an agent. In
SNMPv1, when a manager wants to retrieve all elements of a table from an agent, it initiates a Get operation, followed by a series of GetNext operations.
Set Allows the manager to set values for object variables within an agent.
Trap Used by the agent to inform the manager of some events.
17.3.1 Supported MIBs
MIBs let administrators collect statistics and monitor status and performance.
The ES-3024 supports the following MIBs:
> SNMP MIBII (RFC 1213) > RFC 1157 SNMP vl
> RFC 1493 Bridge MIBs > RFC 1643 Ethernet MIBs
> RFC 1757 RMON > SNMPv2, SNMPv2c or later version, compliant with RFC 2011
SNMPv2 MIB for IP, RFC 2012 SNMPv2 MIB for TCP, RFC 2013 SNMPv2 MIB for UDP
The ES-3024 sends traps to an SNMP manager when an event occurs. SNMP traps supported are outlined in the following table.
Table 17-3 SNMP Traps
GENERIC TRAP SPECIFIC TRAP DESCRIPTION
0 (Cold Start) [0] This trap is sent when the ES-3024 is turned on.
1 (WarmStart) [0] This trap is sent when the ES-3024 restarts.
2 (linkDown) [0] This trap is sent when the Ethernet link is down.
3 (linkUp) [0] This trap is sent when the Ethernet link is up.
4 [o] This trap is sent when an SNMP request comes from non- (authenticationFailure) authenticated hosts.
17.3.3 Configuring SNMP Access Control 17-3
Dimension ES-3024 Ethernet Switch
From the Access Control screen, display the SNMP screen. You can click Access Control to go back to the Access Control screen.
Get Community Jpublic Set Community Jpublic Trap Community fpublic
Figure 17-4 Access Control: SNMP The following table describes the labels in this screen.
Table 17-4 Access Control: SNMP LABEL DESCRIPTION Get Community Enter the get community, which is the password for the incoming Get- and GetNext- requests from the management station.
Set Community Enter the set community, which is the password for incoming Set- requests from the management station.
Trap: Community Enter the trap community, which is the password sent with each trap to the SNMP manager.
Trap: Destination Enter the IP addresses of up to four stations to send your SNMP traps to.
Apply Click Apply to save your changes back to the switch.
Cancel Click Cancel to begin configuring this screen afresh.
17.34 Setting Up Login Accounts Up to five people (one administrator and four non-administrators) may access the switch via web configurator at any one time.
1. An administrator is someone who can both view and configure switch changes. The username for the Administrator is always admin. The default administrator password is 1234.
It is highly recommended that you change the default administrator password ("1234").
2. A non-administrator (username is something other than admin) is someone who can view but not configure switch changes.
Dimension ES-3024 Ethernet Switch
Click Access Control from the navigation panel and then click Logins from this screen.
L @ Cogins __2 Access Control
Old Password New Password Retype to confirm
Please record your new password whenever you change it. The system will lock you out if you have forgotten your password.
Edit Logins Login User Name Password Retype to confirm
The following table describes the labels in this screen.
Table 17-5 Access Control: Logins
LABEL DESCRIPTION Administrator
This is the default administrator account with the “admin” user name. You cannot change the default administrator user name. Only the administrator has read/write access.
Old Password|Type the existing system password ("1234" is the default password when shipped).
New Password |Enter your new system password.
Retype to confirm|Retype your new system password for confirmation
Edit Logins You may configure passwords for up to four users. These people have read-only access.
User Name |Set a user name (up to 30 characters long).
Password |Enter your new system password.
Retype to confirm|Retype your new system password for confirmation
Dimension ES-3024 Ethernet Switch
LABEL DESCRIPTION Apply Click Apply to save your changes back to the switch. Cancel Click Cancel to begin configuring this screen afresh.
17.4Service Access Control
Service Access Control allows you to decide what services you may use to access the ES-3024. You may also change the default service port and configure “trusted computer(s)” for each service in the Remote Management screen (discussed later). Click Access Control to go back to the Access Control screen.
L_@D Service Access Contro Access Control
Services Active Service Port
ICMP SNMP Apply | Cancel
The following table describes the fields in this screen.
Table 17-6 Access Control: Service Access Control
LABEL DESCRIPTION Services Services you may use to access the ES-3024 are listed here. Active Select the check boxes for the corresponding services that you want to allow to
Server Port For Telnet, FTP or web services, you may change the default service port by typing the new port number in the Server Port field. If you change the default port number then you will have to let people (who wish to use the service) know the new port number for that service.
Apply Click Apply to save your changes back to the switch.
Cancel Click Cancel to begin configuring this screen afresh.
17.5Remote Management
From the Access Control screen, display the Remote Management screen as shown next.
Dimension ES-3024 Ethernet Switch
You can specify a group of one or more “trusted computers” from which an administrator may use a service to
manage the switch. Click Access Control to return to the Access Control screen.
L @ Remote Management _] Secured Client Setup
Entry Active Start Address End Address Telnet FTP Web ICMP SNMP CA [0.0.0.0 F FF PF F 2 HN [0000 0.0.0.0 O DO © DO © 3 M [0000 0.0.0.0 O DO © DO O0
CL 0.0.0.0 D © © © D Apply | Cancel
Figure 17-7 Access Control: Remote Management
The following table describes the labels in this screen.
Table 17-7 Access Control: Remote Management
LABEL DESCRIPTION Entry This is the client set index number. A “client set” is a group of one or more “trusted computers” from which an administrator may use a service to manage the switch.
Active Select this check box to activate this secured client set. Clear the check box if you wish to temporarily disable the set without deleting it.
Start Address Configure the IP address range of trusted computers fro which you can manage this switch.
The switch checks if the client IP address of a computer requesting a service or protocol matches the range set here. The switch immediately disconnects the session if it does not match.
Telnet/FTP/Web/ICMP/SNMP |Select services that may be used for managing the switch from the specified
Click Apply to save your changes back to the switch.
Click Cancel to begin configuring this screen afresh.
This chapter introduces SPQ and WFQ.
18.1Introduction to Queuing
Queuing is used to help solve performance degradation when there is network congestion. Use the Queuing Method screen to configure queuing algorithms for outgoing traffic. See also Priority Queue Assignment in Switch Setup and 802.1p Priority in Port Setup for related information.
Queuing algorithms allow switches to maintain separate queues for packets from each individual source or flow and prevent a source from monopolizing the bandwidth.
The switch has four physical queues, Q0 to Q3. Q3 has the highest priority and Q0 has the lowest.
Table 18-1 Physical Queue Priority
QUEUE PRIORITY Q3 1 (Highest) Q2 2 Q1 3 Q0 4 (Lowest)
18.1.1 Strict Priority Queuing (SPQ)
Strict Priority Queuing (SPQ) services queues based on priority only. As traffic comes into the switch, traffic on the highest priority queue, Q3 is transmitted first. When that queue empties, traffic on the next highest-priority queue, Q2 is transmitted until Q2 empties, and then traffic is transmitted on Q1 and so on. If higher priority queues never empty, then traffic on lower priority queues never gets sent. SPQ does not automatically adapt to changing network requirements.
18.12 Weighted Fair Queuing (WFQ)
Weighted Fair Queuing (WFQ) services queues based on their priority and queue weight (the number you configure in the % field — see Figure 18-1). WFQ is activated only when a port has more traffic than it can handle. Queues with larger weights get more service than queues with smaller weights. This queuing mechanism is highly efficient in that it divides any available bandwidth across the different traffic queues.
18.2Configuring Queuing
Click Queuing Method under Advanced Application in the navigation panel.
The following table describes the labels in this screen.
Table 18-2 Queuing Method
LABEL DESCRIPTION Port This label shows the port you are configuring.
Method Select SPQ (Strict Priority Queuing) or WFQ (Weighted Fair Queuing). Strict Priority Queuing (SPQ) services queues based on priority only. When the highest priority queue empties, traffic on the next highest-priority queue begins. Q3 has the highest priority and Q0 the lowest. Weighted Fair Queuing (WF Q) services queues based on their priority and queue weight (the number you configure in the queue % field). Queues with larger weights get more service than queues with smaller weights.
Q0-Q3 Weight |When you select WFQ, enter the queue weight here. Bandwidih is divided across the different
% traffic queues according to their weights. Queues with larger weights get more service than ° [queues with smaller weights.
Apply Click Apply to save your changes back to the switch.
Cancel Click Cancel to begin configuring this screen afresh.
Calculate Click Calculate to make sure the WFQ queuing weighis total to 100%; if not an error message is
Routing Protocol and Management
Part VI Routing Protocol and Management
This part describes the Routing Protocol and Management screens.
VI Dimension ES-3024 Ethernet Switch
Chapter 19 Routing Protocol
This chapter shows you how to configure the routing functions.
Static routes tell the ES-3024 how to forward IP traffic when you configure the TCP/IP parameters manually.
Click Routing Protocol in the navigation panel and then Static Routing to display the screen as shown.
L @ Static Routing _]
Active Name Destination IP Address IP Subnet Mask Gateway IP Address
Add Cancel | Clear |
Index Active Name Destination Address Subnet Mask Gateway Address Metric Delete #Æ Yes ju 172.16.1.2 255.255.0.0 192.168.1.2 2 [sl Delete | Cancel Figure 19-1 Static Routing The following table describes the related labels you use to create a static route.
Table 19-1 Static Routing
LABEL DESCRIPTION Active This field allows you to activate/deactivate this static route. Name Enter a descriptive name for this route. This is for identification purpose only.
Table 19-1 Static Routing
LABEL DESCRIPTION Destination IP Address
This parameter specifies the IP network address of the final destination. Routing is always based on network number. If you need to specify a route to a single host, use a subnet mask of 255.255.255.255 in the subnet mask field to force the network number to be identical to the host ID.
IP Subnet Mask |Enter the subnet mask for this destination.
Gateway IP Enter the IP address of the gateway. The gateway is an immediate neighbor of your switch that
Address will forward the packet to the destination. The gateway must be a router on the same segment as your switch.
Metric The metric represents the “cost” of transmission for routing purposes. IP routing uses hop count as the measurement of cost, with a minimum of 1 for directly connected networks. Enter a number that approximates the cost for this link. The number need not be precise, but it must be between 1 and 15. In practice, 2 or 3 is usually a good number.
Add Click Add to save the new rule to the switch. It then displays in the summary table at the bottom of the screen.
Cancel Click Cancel to reset the fields to your previous configuration.
Clear Click Clear to clear the fields to the factory defaults.
View the current static routes on the switch in the summary table at the bottom of the screen.
Index Active Name Destination Address Subnet Mask Gateway Address Metric Delete
Yes ju 172.16.1.2 255.255.0.0 192.168.1.2 2 [es
Figure 19-2 Static Routing: Summary Table
The following table describes the labels in the summary table.
Table 19-2 Static Routing: Summary Table
LABEL DESCRIPTION Index This field displays the index number of the route. Click a number to edit the static route entry. Active This field displays Yes when the static route is activated and NO when is it deactivated. Name This field displays the descriptive name for this route. This is for identification purpose only.
Destination Address |This field displays the IP network address of the final destination.
This field displays the subnet mask for this destination.
Dimension ES-3024 Ethernet Switch
Table 19-2 Static Routing: Summary Table
LABEL DESCRIPTION Gateway Address |This field displays the IP address of the gateway. The gateway is an immediate neighbor of your switch that will forward the packet to the destination.
Metric This field displays the cost of transmission for routing purposes.
Delete Check the rule(s) that you want to remove in the Delete column, and then click the Delete button.
Cancel Click Cancel to clear the selected checkboxes in the Delete column.
Routing Protocol 19-3
Dimension ES-3024 Ethernet Switch
This chapter explains how to configure the maintenance screens. The links on the upper right of the Maintenance screen lead to different screens that let you maintain the firmware and configuration files.
Click Management and then Maintenance in the navigation panel to open the following screen.
L @ Maintenance __] Firmware Upgrade Click Here Restore Configuration Click Here Backup Configuration Click Here Load Factory Default Click Here Reboot System Click Here
Figure 20-1 Maintenance
20.2Firmware Upgrade
Click Firmware Upgrade in the Maintenance screen if you want to upgrade your switch firmware. See the System Info screen to verify your current firmware version number. Make sure you have downloaded (and unzipped) the correct model firmware and version to your computer before uploading to the device.
Be sure to upload the correct model firmware as uploading the wrong model firmware may damage your device.
From the Maintenance screen, display the Firmware Upgrade screen as shown next.
L_@ Firmware Upgrade Maintenance
To upgrade the internal switch firmware, browse to the location ofthe binary (BIN) file and click Apply button.
Figure 20-2 Firmware Upgrade
Type the path and file name of the firmware file you wish to upload to the switch in the File Path text box or click Browse to locate it. After you have specified the file, click Upgrade.
20.3Restore a Configuration File
Restore a previously saved configuration from your computer to the switch using the Restore Configuration screen.
L_@) Restore Configuration Maintenance
To restore the device's configuration form a file, browse to the location ofthe configuration file and click Restore button.
Type the path and file name of the configuration file you wish to restore in the File Path text box or click Browse to display a Choose File screen from which you can locate it. After you have specified the file, click Restore. “rom-0" is the name of the configuration file on the switch, so your backup configuration file is automatically renamed when you restore using this screen.
20.4Backing Up a Configuration File
Backing up your switch configurations allows you to create various “snap shots” of your device from which you may restore at a later date.
Back up your current switch configuration to a computer using the Configuration Backup screen.
L € «up Configuration Maintenance
This page allows you to back up the device's current configuration to your workstation. Now clickthe Backup button
Figure 20-4 Backup Configuration
Follow the steps below to back up the current switch configuration to your computer in this screen. Step 1. Click Backup.
Step 3. Choose a location to save the file on your computer from the Save in drop-down list box and type a descriptive name for it in the File name list box. Click Save to save the configuration file to your computer.
20.5Load Factory Defaults
Press the Click Here button next to Load Factory Defaults to clear all switch configuration information you configured and return to the factory defaults. The following message appears.
Microsoft Internet Explorer _x{
7) âre you sure you want to load Factory default?
Figure 20-5 Confirm Load factory Defaults
Click OK to go to the next screen.
Microsoft Internet Explorer x
A rebooting.…. please close this session then reconnect later,
Figure 20-6 Restart Switch After Load Factory Defaults
Click OK to begin resetting all switch configurations to the factory defaults and then wait for the switch to restart. This takes up to two minutes. If you want to access the switch web configurator again, you may need to change the IP address of your computer to be in the same subnet as that of the default switch IP address (192.168.1.1).
Reboot System allows you to restart the switch without physically turning the power off. Press the Click Here button next to Reboot System to display the next screen.
Microsoft Internet Explorer Ex
âre you sure you want to reboot system?
Dimension ES-3024 Ethernet Switch
Click OK to see the screen as shown in Figure 20-6. Click OK again and then wait for the switch to restart. This takes up to two minutes. This does not affect the switch’s configuration.
20.7Command Line FTP This section shows some examples of uploading to or downloading files from the switch using FTP commands. First, understand the filename conventions.
20.7.1 Filename Conventions
The configuration file (often called the romfile or rom-0) contains the factory default settings in the screens such as password, switch setup, IP Setup, etc. It arrives from ZyXEL with a “rom” filename extension. Once you have customized the switch's settings, they can be saved back to your computer under a filename of your choosing.
ZyNOS (ZyXEL Network Operating System sometimes referred to as the “ras” file) is the system firmware and has a “bin” filename extension.
Table 20-1 Filename Conventions
FILE TYPE INTERNAL | EXTERNAL DESCRIPTION NAME NAME Configuration File | Rom-0 *rom This is the configuration filename on the switch. Uploading the
rom-0 file replaces the entire ROM file system, including your switch configurations, system-related data (including the default password), the error log and the trace log.
Firmware Ras *.bin This is the generic name for the ZyNOS firmware on the switch.
Example FTP Commands
ftp> put firmware.bin ras
This is a sample FTP session showing the transfer of the computer file " firmware.bin" to the switch .
ftp> get rom-0 config.cfq This is a sample FTP session saving the current configuration to a file called “config.cfg” on your computer.
If your (T)FTP client does not allow you to have a destination filename different than the source, you will need to rename them as the switch only recognizes “rom-0” and “ras”. Be sure you keep unaltered copies of both files for later use.
Be sure to upload the correct model firmware as uploading the wrong model firmware may damage your device.
20.7.2 FTP Command Line Procedure
Step 1. Launch the FTP client on your computer.
Step 2. Enter “open”, followed by a space and the IP address of your switch.
Dimension ES-3024 Ethernet Switch
Step 3. Press [ENTER] when prompted for a username. Step 4. Enter your password as requested (the default is 1234”). Step 5. Enter “bin” to set transfer mode to binary.
Step 6. Use “put” to transfer files from the computer to the switch, for example, “put firmware.bin ras” transfers the firmware on your computer (firmware.bin) to the switch and renames it “ras”. Similarly, “put config.rom rom-0” transfers the configuration file on your computer (config.rom) to the switch and renames it “rom-0”. Likewise “get rom-0 config.rom” transfers the configuration file on the switch to your computer and renames it “config.rom.” See earlier in this chapter for more information on filename conventions.
Step 7. Enter “quit” to exit the ftp prompt.
20.7.3 GUl-based FTP Clients
The following table describes some of the commands that you may see in GUI-based FTP clients.
Table 20-2 General Commands for GUl-based FTP Clients
COMMAND DESCRIPTION Host Address Enter the address of the host server. Login Type Anonymous.
This is when a user I.D. and password is automatically supplied to the server for anonymous access. Anonymous logins will work only if your ISP or service administrator has enabled this option.
The server requires a unique User ID and Password to login.
Transfer Type Transfer files in either ASCII (plain text format) or in binary mode. Configuration and firmware files should be transferred in binary mode.
Initial Remote Directory Specify the default remote directory (path).
Initial Local Directory Specify the default local directory (path).
20.7.4 FTP over WAN Restrictions
FTP over WAN will not work when: e Telnet service is disabled in Secured Client Sets.
e The IP address(es) in the Secured Client Sets menu does not match the client IP address. If it does not match, the switch will disconnect the Telnet session immediately.
Dimension ES-3024 Ethernet Switch
Chapter 21 Diagnostic
This chapter explains the Diagnostic screens.
Click Management and then Diagnostic in the navigation panel to display this screen. Use this screen to check system logs, reset the system or ping IP addresses.
System Log Display | Clear IP Ping IP Address Ping Ethernet Port Test Potii | PortTest
Figure 21-1 Diagnostic
The following table describes the labels in this screen.
Table 21-1 Diagnostic
LABEL DESCRIPTION System Log
Click Clear to empty the text box and reset the syslog entry.
Click Display to display a log of events in the multi-line text box.
Type the IP address of a device that you want to ping in order to test a connection. Click Ping to have the switch ping the IP address (in the field to the left) 5 times
From the Port drop-down list box, select a port number and click Port Test to perform internal
Cluster Management allows you to manage switches through one switch, called the cluster manager. The switches must be directly connected and be in the same VLAN group so as to be able to communicate with one another.
Table 22-1 ZyXEL Clustering Management Specifications
Maximum number of cluster members 8
Cluster Member Models
Must be compatible with ZyXEL cluster management implementation.
The switch through which you manage the cluster member switches.
The switches being managed by the cluster manager switch.
In the following example, switch A in the basement is the cluster manager and the other switches on the upper floors of the building are cluster members.
Click Management in the navigation panel and then Cluster Management to display the following screen.
The Number Of Member = 2
Manager 00:a0:c5:05:02:34
Figure 22-2 Cluster Management Status
The following table describes the labels in this screen.
Table 22-2 Cluster Management Status
LABEL DESCRIPTION A cluster can only have one mai
Status|This field displays the role of this switch within the cluster. o Manager o Member (you see this if you access this screen in the cluster member switch directly and not via the cluster manager) o None (neither a manager nor a member of a cluster) Manager|This field displays the cluster manager switch's hardware MAC Address.
The Number of Member
This field displays the number of switches that make up this cluster. The following fields describe the cluster member switches.
You can manage cluster member switches via the cluster manager switch. Each number in the Index column is a hyperlink leading to the cluster member switch's web configurator (see Figure 22-3).
This is the cluster member switch's hardware MAC Address.
This is the cluster member switch's System Name.
Table 22-2 Cluster Management Status
LABEL DESCRIPTION Status|This field displays: o Online (the cluster member switch is accessible)
o Error (for example the cluster member switch password was changed or the switch was set as the manager and so left the member list, etc.)
o Offline (the switch is disconnected - Offline shows approximately 1.5 minutes after the link between cluster member and manager goes down).
22.2.1 Cluster Member Switch Management
Go to the Clustering Management Status screen of the cluster manager switch and then select an Index hyperlink from the list of members to go to that cluster member switch's web configurator home page. This cluster member web configurator home page and the home page that you'd see if you accessed it directly are different (see Figure
Access Control Suaying Method Cluster Member
Figure 22-3 Cluster Member Web Configuration Screen
Uploading Firmware to a Cluster Member Switch
You can use FTP to upload firmware to a cluster member switch through the cluster manager switch as shown in the following example.
Cluster Management 22-3
ssuord: 1234 is the default pass 230 Logged in
200 Port command okay
150 Opening data connection for LIST
lowner group 1399654
lowner group 262144 rom-0
lowner group 0 Jul 01 12:00 fw-00-a0-c lowner group 0 Jul 01 12:00 config-00-a0-c
ftp: 462 bytes received in 0.01Seconds 30.80Kbytes/sec.
ftp> put 350DT3b1.bin fw-00-a0 02-34
Figure 22-4 Example: Uploading Firmware to a Cluster Member Switch
The following table explains some of the FTP parameters.
Table 22-3 FTP Upload to Cluster member Example
FTP PARAMETER DESCRIPTION User name Press <Enter> Password The web configurator password default is 1234. Is Enter this command to list the name of cluster member switch's firmware and configuration file. 350DT3b1.bin The name of the firmware file you want to upload to the cluster member switch. fw-00-a0-c5-05-02-34 The cluster member switch's firmware name as seen in the cluster manager switch.
config-00-a0-c5-05-02-34 | The cluster member switch’s configuration file name as seen in the cluster manager switch.
22.3Configuring Cluster Management
Click Configuration from the Cluster Management screen to display the next screen.
Dimension ES-3024 Ethernet Switch
[_@ Clustering Management Configuration Status Clustering Manager: Active F Name cm-goose-43? VID 1 Apply | Cancel Clustering Candidate: 00:a0:c5:01:23:45/ES-3024/ES-3024 00:a0:c5:3f91:59/ES-3024/ES-3024 List 00:a0:c5:88:99:11/VES-1000/ 00:80:c6:e8:e5:63/VES-1000/ Password Apply | Cancel | Refresh Index HwAddr Name Model Remove 1 00:a0:c5:05:22:11 cm-member1 ES-3024 [el EN 2 00:a0:c5:391:54 ES-4024 ES-4024 (mi Remove Cancel Figure 22-5 Configuring Cluster Management Table 22-4 Configuring Cluster Management
LABEL DESCRIPTION Active|Select Active to have this switch become the cluster manager switch. A cluster can only have one manager. Other (directly connected) switches that are set to be cluster managers will not be visible in the Clustering Candidates list. If a switch that was previously a cluster member is later set to become a cluster manager, then its Status is displayed as Error in the Cluster Management Status screen
and a warning icon ( ) appears in the member summary list below.
Name |Type a name to identify the Clustering Manager. You may use up to 32 printable characters (no spaces are allowed).
Cluster Management 22-5
Dimension ES-3024 Ethernet Switch
LABEL DESCRIPTION VID This is the Management VLAN ID and is only applicable if the switch is set to 802.1Q VLAN. All switches must be in the same management VLAN group to belong to the same cluster. Switches that are not in the same management VLAN group are not visible in the Clustering Candidates list. This field is ignored if the Clustering Manager is using Port-based VLAN.
Click Apply to save these changes to the switch.
Click Cancel to begin configuring this part of the screen afresh.
Clustering Candidate
The following fields relate to the switches that are potential cluster members.
A list of suitable candidates found by auto-discovery is shown here. The switches must be directly connected. Directly connected switches that are set to be cluster managers will not be visible in the Clustering Candidate list. Switches that are not in the same management VLAN group will not be visible in the Clustering Candidate list.
Each cluster member's password is its web configurator password. Select a member in the Clustering Candidate list and then enter its web configurator password. If that switch administrator changes the web configurator password afterwards, then it cannot be managed from the Cluster Manager. lts Status is displayed as Error in the Cluster Management Status screen and a warning icon
( & ) appears in the member summary list below.
If multiple devices have the same password then hold [SHIFT] and click those switches to select them. Then enter their common web configurator password.
Click Apply to save these changes to the switch.
Click Cancel to begin configuring this part of the screen afresh.
Click Refresh to perform auto-discovery again to list potential cluster members.
The next summary table shows
the devices selected for clustering.
This is the index number of a cluster member switch.
This is the cluster member switch's hardware MAC address.
This is the cluster member switch's System Name.
This is the cluster member switch’s model name.
Select this checkbox and then click the Remove button to remove a cluster member switch from the cluster.
Click Cancel to begin configuring this part of the screen afresh.
23.1Introduction to Filtering Database
The Filtering Database shows how frames are forwarded or filtered across the switch’s ports. It shows what device
MAC address, belonging to what VLAN group (if any) is forwarded to which port(s) and whether the MAC address is dynamic (learned by the switch) or static (manually entered in Static MAC Forwarding).
The switch uses the Filtering Database to determine how to forward frames. See the following figure. 1. The switch examines a received frame and learns the port on which this source MAC address came.
2. The switch checks to see if the frame's destination MAC address matches a source MAC address already learned in the Filtering Database.
> _Ifthe switch has already learned the port for this MAC address, then it forwards the frame to that port.
> Ifthe switch has not already learned the port for this MAC address, then the frame is flooded to all ports. Too much port flooding leads to network congestion.
Ifthe switch has already learned the port for this MAC address, but the destination port is the same as the port it came in on, then it filters the frame.
Is destination MAC address in the MAC table?
Forwerd to all ports except the incoming one. No
Is outgoing port different from incoming port?
Filter this frame Forwerd to outgoing port
23.2Viewing Filtering Database
Click Management in the navigation panel and then Filtering Database to display the following screen. The Filtering Database can hold up to 16K entries.
L_@p Filtering Database __] Sortby _MAC| VID Index MAC Address VID Port Type 1 00:02:03:04:05:06 1 1 static 2 00:a0:c5:05:22:11 1 6 dynamic 3 00:00:85:0b:61:30 1 12 dynamic 4 00:00:85:28:f1:05 1 12 dynamic 5 00:00:86:46:17:72 1 12 dynamic 6 00:00:86:46:#.78 1 12 dynamic 7 00:00:86:47:11:91 1 12 dynamic 8 00:00:82:54:c8:17 1 12 dynamic 9 00:00:e2:59:7b:d8 L 12 dynamic 10 00:00:e2:6b:49:4e L 12 dynamic 11 00:00:e2:82:90:1e 1 12 dynamic 12 00:00:e2:82:90:b5 1 12 dynamic 13 00:00:22:82:99:65 1 12 dynamic 14 00:00:e2:82:e7 2 1 12 dynamic 15 00:00:e2:82:cc:19 L 12 dynamic 16 00:00:e2:8b:d6:4f 1 12 dynamic 17 00:00:e2:8c:1b:d9 1 12 dynamic 18 00:00:e28c:1e:1c 1 12 dynamic 19 00:00:22:93:68:06 1 12 dynamic 20 00:00:82:98:d5:31 1 12 dynamic 21 00:00:e8:72:9f0e L 12 dynamic Figure 23-2 Filtering Database The following table describes the labels in this screen. Table 23-1 Filtering Database LABEL DESCRIPTION Sort by Click one of the following buttons to display and arrange the data according to that button type. The information is then displayed in the summary table below. MAC | Click this button to display and arrange the data according to MAC address. VID |Click this button to display and arrange the data according to VLAN group. Port| Click this button to display and arrange the data according to port number. Index This is the incoming frame index number. MAC Address This is the MAC address of the device from which this incoming frame came. 23-2 Filtering Database
Dimension ES-3024 Ethernet Switch
Table 23-1 Filtering Database
LABEL DESCRIPTION VID This is the VLAN group to which this frame belongs. Port This is the port from which the above MAC address was learned. Type This shows whether the MAC address is dynamic (learned by the switch) or static
(manually entered in Static MAC Forwarding).
24.1Introduction to ARP Table
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address, also known as a Media Access Control or MAC address, on the local area network.
An IP (version 4) address is 32 bits long. In an Ethernet LAN, MAC addresses are 48 bits long. The ARP Table maintains an association between each MAC address and its corresponding IP address.
24.1.1 How ARP Works
When an incoming packet destined for a host device on a local area network arrives at the switch, the switch's ARP program looks in the ARP Table and, if it finds the address, sends it to the device.
If no entry is found for the IP address, ARP broadcasts the request to all the devices on the LAN. The switch fills in its own MAC and IP address in the sender address fields, and puts the known IP address of the target in the target IP address field. In addition, the switch puts all ones in the target MAC field (FF.FF.FF.FF.FF.FF is the Ethernet broadcast address). The replying device (which is either the IP address of the device being sought or the router that knows the way) replaces the broadcast address with the target's MAC address, swaps the sender and target pairs, and unicasts the answer directly back to the requesting machine. ARP updates the ARP Table for future reference and then sends the packet to the MAC address that replied.
24.2Viewing ARP Table
Click Management in the navigation panel and then ARP Table to open the following screen. The ARP table can hold up to 500 entries.
Dimension ES-3024 Ethernet Switch
IP Address MAC Address Type
127.0.0.101 00:a0:c5:32:71:95 dynamic 127.0.0.102 00:a0:c5:32:71:97 dynamic 127.0.0.103 00:a0:c5:61:28:92 dynamic 127.0.0.104 Q0:a0:c5:f12:6c dynamic 127.0.0.105 00:a0:c5:4b:d6:67 dynamic 169.254.170.66 00:0b:cd:94:85:00 dynamic 17217.2.1 00:60:h0:d6:e1:ad dynamic 1721724 00:01:26:61:26:d4 dynamic 1721726 00:10:83:95:30:a1 dynamic 172.17.2.254 00:01:30:b8:16:40 dynamic 172.21.0.2 00:05:5d:04:30:f1 dynamic 172.21.0.254 00:01:30:b8:16:40 dynamic 172.21.1.166 00:02:h3:2c:79:93 dynamic 172.21.2.229 00:50:8d:36:37:e2 dynamic 1722136 00:50:8d:36:3c:3h dynamic 172.21.3.7 00:50:ha:ad:75:dd dynamic 172.21.3.11 00:50:8d:af13:31 dynamic 172.21.315 00:00:e8:89:88:06 dynamic 17221318 00:50:8d'af.2f28 dynamic 172.21.319 00:a0:c5:01:23:46 dynamic 172.21.3.20 08:00:46:68:10:58 dynamic 172.21.3.21 00:0b:cd:94:89:32 dynamic 172.21.3.23 00:00:e2:93:68:06 dynamic 17291294 N0NE'Adet fceh dinarir
Figure 24-1 ARP Table
The following table describes the labels in this screen.
Table 24-1 ARP Table
LABEL DESCRIPTION Index This is the ARP Table entry number.
IP Address This is the learned IP address of a device connected to a switch port with corresponding MAC address below.
MAC Address This is the MAC address of the device with corresponding IP address above.
Type This shows whether the MAC address is dynamic (learned by the switch) or static (manually entered in Static MAC Forwarding).
24-2 Filtering Database
Introduction to CLI This chapter introduces line commands and gives a summary of commands available.
25.1 Command Line Interface Overview
In addition to the web configurator, you can use line commands to configure the switch. It is recommended that you use the web configurator for everyday management of the switch and that you use line commands for advanced switch diagnosis and troubleshooting. If you have problems with your switch, customer support may request that you issue some of these commands to assist them in troubleshooting.
You can use the “config save” command to save 802.1Q, STP, Cluster and IP configuration changes to non-volatile memory (Flash). These changes are effective after you restart the switch.
However you cannot use “config save” for all other line command configurations. These are saved in volatile memory (DRAM), so are not effective after you restart the switch.
25.1.1 Accessing the Command Line Interface
There are two ways to access the command line interface on the ES-3024: e Telnet to the switch
e Connect a computer to the console port and use terminal emulation software configured to the following parameters:
"__ VT100 terminal emulation "9600 bps
"No parity, 8 data bits, 1 stop bit “__Noflow control 25.1.2 Command Conventions
The system uses a one-level command structure. You must type the full command every time, as follows. 192.168.1.1> <command>
For instance, the following example shows how to enable GVRP.
192.168.1.1> sys sw gvrp enable
The conventions for typing in most CI commands are shown next.
command <interface|device> subcommand [parameter]
command subcommand [parameter]
Type all commands as displayed on the screen.
Dimension ES-3024 Ethernet Switch
25.1.3 Command Syntax Conventions
1. Command keywords are in courier new font. 2. The | symbol means “or
3. Required fields in a command are enclosed in angle brackets <>. Use the following command to turn the system monitor on or off.
sys monitor enable <on/off>
4. Optional fields in a command are enclosed in square brackets [], for example, year, month and day are optional in the following command. This command just displays the date if you don’t specify the year, month and day parameters.
sys date [year month day]
5. Commands can be abbreviated to the smallest unique string that differentiates the command. For example the “system date” command could be abbreviated to “s d”.
Type “help” or “?” to display a list of valid commands or type a command followed by “help” or “?” to display a list of associated subcommands.
The following figure shows a sample help information.
ES-3024> ? Valid commands are: sys exit ip
ES-3024> sys view ? Usage: view <filename>
Figure 25-1 CLI Help: Sample Output
The following tables are summaries of the commands available in the ES-3024 together with a brief description of each command. See the related section in the User's Guide for more background information.
Table 25-1 Command Summary: sys
COMMAND DESCRIPTION switch [onloff] Enables/disables/ the system trace log or shows whether it's on or off. online [onloff] Enables/disables the trace log onscreen display (for example in the telnet management window). level [level] Sets the level (1-10) of trace logs
(1 shows the least) to display.
Uses hexadecimal characters to set the type of trace logs to record.
disp Shows the trace log.
clear Erases the trace log.
call Shows call events.
Creates a packet trace buffer.
Removes the packet trace buffer.
channel <name> [none |incomingloutgoing|bothway]
Sets the packet trace direction for a given channel.
Enables/disables the sending of a log to the trace packet buffer when configuration changes are made or displays the current setting.
Enables/disables packet trace or displays the current setting.
Displays the trace packets.
Sends the trace packets to another system using UDP.
Enables/disables the sending of the trace packets to another system using UDP or displays the current setting.
Sets the target IP address for sending trace packets using UDP.
Sets the UDP port (should match that of the target IP address) for sending trace packets using UDP.
parse [[start_idx], end _idx]
Displays detailed packet details of the packet range specified.
Displays number of MAC addresses in L2 DBM
Displays entries in L2 DBM
dbm mac flush [port]
Flushes learned MAC addresses in the forwarding table.
dbm mac search <MAC> <VID>
Searches the MAC/VID learnt on which port.
Displays entries in L3 DBM
Sets the log level. Logs displayed consist of critical, error, warning, debug and informational messages in order of severity. Log level “4” displays all messages; log level “0” just displays critical messages.
Displays the switch chip's memory map for the block specified.
Writes to a register.
Reads from a register.
Displays the interrupt counter.
Resets the interrupt counter.
Displays the system socket's ID #, type, control block address (PCB), IP address and port number of peer device connected to the socket (Remote Socket) and task control block (Owner).
Disable the cluster named.
add <MAC addr> <password>
Add a member switch into the cluster using its web configurator password.
Remove a member switch from the cluster.
showMember Shows details of member switches in this cluster.
showCandidate Shows a list of auto-discovered potential cluster members.
status Shows whether this switch is a
cluster member, cluster manager or neither and information about members in the cluster.
The following commands are system switch commands; all are preceded with sys sw
Table 25-2 Command Summary: sys sw
COMMAND DESCRIPTION garp status Shows the GARP timer status. timer <join timer (ms) ><leave Sets the GARP timer's Join timer (ms)><leave all timer<ms> Timer, Leave Timer and Leave AI Timer. gvrp trace Sets GVRP trace level. enable Enables GVRP. disable Disables GVRP.
counters (CPU interface).
Displays whether LACP is enabled on the specified port.
actoradm activity [port no] [0:passive l:active]
Allows/disallows the specified local port to engage in trunking.
actoradm display [port _ no]
Shows whether the specified local port is engaged in trunking.
Turns LACP key management on or off.
syspriority <priority>
Sets the LACP system priority. The switch with the lowest priority becomes the LACP “server”.
Enables 802.1X security on the switch.
Disables 802.1X security on the switch.
Configures how often the specified port should be re- authenticated.
Sets the external RADIUS server IP address.
Internal switch user database. Information in this database is flushed on restarting the switch.
add <username> <passwd>
Creates a username and password profile in the internal [switch user database.
Deletes a username and password profile in the internal [switch user database.
Lists all profiles in the internal [switch user database.
A class is the basic rule parameters for a bandwidth control, port mirror or port filter rule.
Displays run-time bandwidth control, port mirror and port filter rule status.
<src port> <src MAC> <sre vid> <dest port> <dest MAC> <dest vid>
Find source/destination port, MAC address and VLAN group information.
<src port> <src mac> <sre vid><dest port><dest mac> <dest vid><protocol>
Sets source/destination port, MAC address, VLAN group and protocol information.
A class is automatically created when you create a bandwidth control, port mirror or port filter rule. This command deletes the specified class.
These commandés relate to broadcast storm control.
Clears current run-time settings
<dir (ingress/egress)> <type (broadcast/multicast/both)>
Specifies the type of frames to limit in the switch; broadcast, multicast or both.
Displays broadcast storm control ports’ settings
Disables broadcast storm control on this port.
Displays static MAC addresses.
Clears current run-time static MAC address settings
display [<mac> <vid>]
Displays current run-time static MAC addresses on the ports.
Configures a static MAC address on the specified port.
Deletes a static MAC address on the specified port.
The following commands relate to port filters. Port filtering means sifting traffic from one or all ports to one or all ports based on the source and/or destination MAC addresses and VLAN group.
Apply class to a filter.
Deletes filter class.
Clears current run-time filters.
Displays current run-time filter status.
<src port><sre mac><sre vid><dest port><dest mac><dest vid>
Creates a filter rule using source/destination port, MAC address and VLAN group information. “*” means “any”.
The following commands relate to port mirrors. Port mirroring is copying traffic from one or all ports to another or all ports for external analysis.
<Class Idx> <MirrorType=input |output|both>
Apply class to mirroring.
Delete a mirroring class.
Clears current run-time port mirror settings.
Displays current run-time port mirror settings.
<src port> <src MAC> <sre vid> <dest port> <dest MAC> <dest vid>
Creates a mirror rule using source/destination port, MAC address and VLAN group information. “*” means “any”.
<input [output |both>
Sets the direction of mirrored traffic.
Sets the mirror port (the port traffic is copied to for analysis).
The following commands relate to bandwidth control rules. Bandwidth control means defining la maximum allowable bandwidth for traffic flows from specified source(s) to specified destination(s).
<Class Idx> <Max BW>
Apply class to bandwidth control.
Delete a bandwidth control class.
Clears current run-time bandwidth control rules.
Displays current run-time bandwidth control rules.
<src port><sre mac><sre vid><dest port><dest mac><dest vid><max bw>
Creates a bandwidth control rule using source/destination port, MAC address and VLAN group information. “*” means “any”.
The following commands relate to trunking. Trunking is the grouping of physical ports into one logical higher-capacity link.
Delete a trunk group.
Clears current run-time trunk settings.
COMMAND DESCRIPTION display Displays current run-time trunk settings. listView Displays member list of trunk. set <group><# ports> Adds ports to a trunk group. ingress set <port> <enable disable> Sets ingress check on a port. get <port> Gets ingress check state on a port. viewAll Gets ingress check state on all ports. learn enable [port] Enables address learning on the port. disable [port] Disables address learning on the port. display [port] Displays address learning status. isolate disable Disables port isolation.(All connected) port <port> <Port-List (in Hex)> Sets the port-list which can connected to the specific port. enable Enables port isolation. me set <addr> <port>... Sets ports to a specific multicast address del <addr> Deletes a specific multicast address get <addr> Shows settings of the multicast address vlan status Displays VLAN status type <802.1q | port-based> Sets VLAN mode
Table 25-3 Command Summary: exit
Sets the TCP minimum round trip time.
Sets the TCP default initial round trip time.
rtt <tcb> <value> Sets the round trip time for the TCP control block. status [tcb] [<interval>] |[Displays the TCP statistic counters. syndata [onloff] Turns on/off the option to send data with the SYN packet. trace [onloff] Turns on/off the trace for debugging. telnet <host> [port] Telnets to the specified host. traceroute <host> [ttl] [wait] [queries] |Sends ICMP packets to trace the route of a remote host. igmpsnoop status Displays the IGMP group table. querier Displays the port number of the incoming port that received the latest IGMP querier. enable Turns on IGMP snooping. disable Turns off IGMP snooping. ip dhcp <iface> mode <none | client> Set an interface to accept information from a DHCP server. dhcp <iface> [status Show whether an interface can accept information from a DHCP server. dhcp <iface> [client release Release DHCP information such as the IP address from an interface dhcp <iface> [client renew Renevw the IP address on the
Introduction to CLI Dimension ES-3024 Ethernet Switch COMMAND DESCRIPTION
config save [You can use the “config save” command to save 802.1Q, STP, Cluster and IP configuration changes to non-volatile memory (Flash). These changes are effective after you restart the switch.
However you cannot use “config save” for all other line command configurations. These are saved in volatile memory (DRAM), so are not effective after you restart the switch.
Introduction to CLI 25-17
This chapter describes some commands in more detail.
26.1Commonly Used Commands Overview
These are commands that you may use frequently in configuring and maintaining your switch. See the following
chapter for IEEE 802.1Q Tagged VLAN command
These are the commonly used commands that belong to the sys (system) group of commands.
ras> log Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb
If you clear a log (using the sys log clear command), you cannot view it again.
Syntax: sys version This command shows the RAS code, firmware version, system uptime and bootbase version.
An example is shown next.
bootbase version: V1.
Figure 26-2 sys version Command Example
26.2.4 sys monitor status
<al1|VID|start Specify either all of the VLAN entries (all), a single VLAN ID (VID) or a _VIDlend VID>= range of VLAN IDs starting from a certain VID (start_VID) or a range of
This command displays statistics of a port. An example is shown next.
RxMulticast RxBroadcastPkts: RxPauseP Alignment : LateCollision ExcessiveCollision: SingleCollision: MultipleCollision
This command displays the IP address(es) stored on the system chip (ixe2424). An example is shown next.
ES-3024> ixe2424 dbm ip list Vlanld IPAddr Port
0 10.255.255.255 CPU
This command displays the MAC address(es) stored on the system chip (ixe2424). An example is shown next.
These are the commonly used commands that belong to the “sys cluster” group of commands. Use “config save to save these configurations.
26.3.1 sys cluster status
Syntax: sys cluster status
This command shows whether this switch is a cluster member, cluster manager or neither and information about members in the cluster. An example is shown next.
Figure 26-8 sys cluster status Command Example
26.3.2 sys cluster showMember
Syntax: sys cluster showMember
This command shows details of member switches in this cluster. An example is shown next.
test_mem> sys cluster showMember Nol
hwAddr = hostName = modelName= time = 100 status = 4(0:Invalid, liwaiting, 2
2:11 hostName = cm-memberl modelName=ES-3024 channel = swp05
time = 90 = 2(0:Invalid, l:waiting, 2:Active, 3:Inactive, 4:static
No3 ipAddr mask = hwAddr
Figure 26-9 sys cluster showMember Command Example
26.3.3 sys cluster showCandidate
Syntax: sys cluster showCandidate
This command shows a list of auto-discovered potential cluster members. An example is shown next.
Command Examples 26-5
Dimension ES-3024 Ethernet Switch
These are the commonly used commands that belong to the ip group of commands. Use “config save” to save
these configurations.
Syntax: ip ping <hostid>
This command pings a remote host. An example is shown next.
ES-3024> ip ping 192.168.1.10 Resolving 192.168.1.10... 192.168.1.10
sent revd avg mdev max min 1 1 0 0 0 0 2 2 0 0 0 0 3 3 0 0 0 0
Figure 26-11 IP PING Command Example
Figure 26-12 ip route status Command Example
received 1 badtype 0 bogu
Time Addr 0 00:a0:c5:3f:91:56 43
This chapter describes the IEEE 802.1Q Tagged VLAN and associated commands. Use the “config save” command to save configuration changes.
27.1IÈEE 802.1Q Tagged VLAN Overview
See the VLAN chapter for more information on VLANSs. There are two kinds of tagging: 1. Explicit Tagging
A VLAN identifier is added to the frame header that identifies the source VLAN.
The MAC (Media Access Control) number, the port or other information is used to identify the source of a VLAN frame.
The IEEE 802.1Q Tagged VLAN uses both explicit and implicit tagging.
It is important for the switch to determine what devices are VLAN-aware and VLAN-unaware so that it can decide whether to forward a tagged frame (to a VLAN-aware device) or first strip the tag from a frame and then forward it (to a VLAN-unaware device).
27.2Filtering Databases
A filtering database stores and organizes VLAN registration information useful for switching frames to and from a switch. À filtering database consists of a static entries (Static VLAN or SVLAN table) and dynamic entries (Dynamic VLAN or DVLAN table).
27.2.1 Static Entries (SVLAN Table)
Static entry registration information is added, modified and removed by administrators only.
27.2.2 Dynamic Entries (DVLAN Table)
Dynamic entries are learned by the switch and cannot be created or updated by administrators. The switch learns this information by observing what port, source address and VLAN ID (or VID) is associated with a frame. Entries are added and deleted using GARP VLAN Registration Protocol (GVRP), where GARP is the Generic Attribute Registration Protocol.
27.3Configuring Tagged VLAN IÉEE 802.1Q Tagged VLAN 27-1
Dimension ES-3024 Ethernet Switch
The following procedure shows you how to configure tagged VLAN.
Step 1. Use the IEEE 802.1Q tagged VLAN commands to configure tagged VLAN for the switch.
e Usethesys sw vlanlq svlan setentry command to configure a VLAN ID for each port on the switch.
e Usethesys sw vlanlq svlan active command when you are finished configuring the VLAN (see the last step).
e Usethesys sw vlanla port defaultVID command to set the VLAN ID you created for a port to that specific port in the PVID table.
e Usethesys sw vlanlq svlan active command to activate the VLAN IDs.
ES-3024> sys sw vlanlq svlan setentry upl 2000 24 fixed tag for newly create VLAN, please use svlan active <VID> to activate this entry
Figure 27-1 Tagged VLAN Configuration and Activation Example Step 2. Configure your management VLAN.
e Usethesys sw vlanlq svlan setentry command to configure a VLAN ID (VID 3 in this example) for managing the switch (the “management” or “CPU” VLAN).
e Usethesys sw vlanlq svlan active command to activate the new management VLAN ID.
ES-3024> sys sw vlanlq svlan setentry example 3 24 fixed tag
Figure 27-2 CPU VLAN Configuration and Activation Example Step 3. Perform the procedure below to complete the VLAN setup. a. Telnet to the operational IP address of the switch. b. Usethesys sw vlanlq svlan cpu command to set VID 3 as the management VLAN. c. Usethesys sw svlan delentry command to remove the default VLAN ID (1).
27-2 IÉEE 802.1Q Tagged VLAN Dimension ES-3024 Ethernet Switch
Figure 27-3 Deleting Default VLAN Example
27.4IEEE VLAN1Q Tagged VLAN Configuration Commands
These sw (switch) commands allow you to configure and monitor the IEEE 802.1Q Tagged VLAN.
Syntax: sys sw garp status This command shows the switch’s GARP timer settings, including the join, leave and leave all timers.
sys sw garp timer timer <join timer(ms)> <leave timer(ms)> <leave all timer<ms>
This sets the duration of the Join Period timer for GVRP in milliseconds. Each port has a Join Period timer. The allowed Join Time range is between 100 and 32767 milliseconds; the default is 200 milliseconds.
This sets the duration of the Leave Period timer for GVRP in milliseconds. Each port has a single Leave Period timer. Leave Time must be two times larger than Join Timer; the default is 600 milliseconds.
<leave all timer<ms>= This sets the duration of the Leave All Period timer for GVRP in milliseconds. Each port has a single Leave All Period timer. Leave All Timer must be larger than Leave Timer; the default is 10000 milliseconds.
IÉEE 802.1Q Tagged VLAN 27-3
Dimension ES-3024 Ethernet Switch
This command sets the switch’s GARP timer settings, including the join, leave and leave all timers.
Switches join VLANSs by making a declaration. A declaration is made by issuing a Join message using GARP. Declarations are withdrawn by issuing a Leave message. A Leave All message terminates all registrations. GARP
timers set declaration timeout values.
The following example sets the Join Timer to 300 milliseconds, the Leave Timer to 800 milliseconds and the Leave All Timer to 11000 milliseconds.
Figure 27-5 garp timer Command Example
Syntax: sys sw gvrp status This command shows the switch’s GVRP settings.
This command turns on GVRP in order to propagate VLAN information beyond the switch.
Syntax: sys sw gvrp disable
This command turns off GVRP so that the switch does not propagate VLAN information to other switches.
27.4.6 vlan1q port status
The following example shows the settings for port 1.
Syntax: sys sw vlanlq port defaultVID <port> <VID> where <port> = À port number <VID> = The VLAN ID. Valid parameter range = [1 — 4094].
This command sets a default VLAN ID for all untagged packets that come in through the specified port.
The following example sets the default VID of port 1 to 2000.
ES-3024> sys sw vlanlq port defaultVID 1 2000
The following example sets port 2 to accept only tagged frames.
The following example turns off GVRP for port 2.
<VID> = The VLAN ID. Valid parameter range = [1 — 40941].
This command sets the management VLAN (CPU). You can only use ports that are members of this management
VLAN in order to manage the switch.
The following example sets VLAN ID 2 to be the CPU (management) VLAN.
ES-3024> sys sw vlanlq svlan cpu 2
Figure 27-11 vlan1q svlan cpu Command Example
À name to identify the SVLAN entry. The VLAN ID [1 — 4094]. This is the switch port number.
This is the registrar administration control flag. Valid parameters = [fixed, forbidden, normal].
Enter fixed to register a <port #> to the static VLAN table with <vid>. Enter normal to confirm registration ofthe <port #> to the static VLAN table with <vid>.
Enter forbidden to block a <port #> from joining the static VLAN table with <vid>.
This is the tag control flag. Valid parameters = [tagluntag].
Enter tag to tag outgoing frames. Enter untag to send outgoing frames without a tag.
This command adds or modifies an entry in the static VLAN table. Display your configuration by using the sys sw vlaniq svlan list command. An example of a configuration is shown next.
Modify a Static VLAN Table Example
The following is an example of how to modify a static VLAN table.
vlanigq svlan setentry vlanigq svlan setentry
Figure 27-12 Modifying the Static VLAN Example
Forwarding Process Example
First the switch checks the VLAN ID (VID) of tagged frames or assigns temporary VIDs to untagged frames (see Section 27.4.7).
The switch then checks the VID in a frame’s tag against the SVLAN table.
The switch notes what the SVLAN table says (that is, the SVLAN tells the switch whether or not to forward a frame and if the forwarded frames should have tags).
Then the switch applies the port filter to finish the forwarding decision. This means that frames may be dropped even if the SVLAN says to forward them. Frames might also be dropped if they are sent to a CPE (customer premises equipment) DSL device that does not accept tagged frames.
IÉEE 802.1Q Tagged VLAN
Dimension ES-3024 Ethernet Switch
Untagged Frames Step 1. An untagged frame comes in from the LAN. Step 2. The switch checks the PVID table and assigns a temporary VID of 1.
Step 3. The switch ignores the port from which the frame came, because the switch does not send a frame to the port from which it came. The switch also does not forward frames to “forbidden” ports.
Step 4. Ifafter looking at the SVLAN, the switch does not have any ports to which it will send the frame, it won’t check the port filter.
27.4.12 vlan1q svlan delentry
Syntax: sys sw vlanlq svlan delentry <VID> where <VID> = The VLAN ID [1 — 4094]. This command deletes the specified VLAN ID entry from the static VLAN table
The following example deletes entry 2 in the static VLAN table.
vlanlgq svlan delentry 2
Figure 27-13 vlan1q svlan delentry Command Example
27.5vlan1q svlan active
Syntax: sys sw vlanlq svlan active <VID>
This command shows the IEEE 802.1Q Tagged SVLAN (Static VLAN) table.
27-8 IÉEE 802.1Q Tagged VLAN Dimension ES-3024 Ethernet Switch
An example is shown next. For the AdCt1 section of the last column, “-“ is a port set to normal, “x” is a forbidden port and “F” is a fixed port.
For the TagCt1 section of the last column, “T“ is a tagged port, “U” is an untagged port.
ES-3024> sys sw vlanlq svlan list
<all1|VID|start Specify either all of the VLAN entries (a11), a single VLAN ID (VID) ora _VIDIend_VID>= range of VLAN IDs starting from a certain VID (start_VID) or a range of VLAN Ids ending at a specific VID (end_VID).
This command shows the current IEEE 802.1Q Tagged VLAN table or a specific part ofit. An example is shown next.
For the EgressPort section of the last column, “E” is an egress port for this VLAN, “-“ is not an egress port for this VLAN.
Figure 27-15 vlan1q svlan list Command Example
See the following example shows the default VLAN settings. The default VLAN allows all ports to connect to each other and sets them to send untagged packets.
27-10 IÉEE 802.1Q Tagged VLAN Appendices and Index
This part contains appendices of advanced background feature information and an Index.
VIII Dimension ES-3024 Ethernet Switch
À Product Specifications
These are the ES-3024 product specifications.
(24 10/100BASE-T Ethernet ports
Full/half duplex for 10/100Mbps speeds
Full/Half Duplex Full duplex only for Gigabit speeds (see your module manual)
Media Interface Exchange AII ports are auto-crossover (auto-MDI-X) and auto-negotiating.
Chart 2 Performance and Management Specifications
Product Specifications A-1
Dimension ES-3024 Ethernet Switch
Chart 2 Performance and Management Specifications
Packet Forwarding Rate
Port Link Aggregation
IEEE802.3ad dynamic port trunking
Static MAC address filtering
IMAC address learning limit
(Support IGMP snooping
(Support broadcast storm control
All Ethernet, stacking and uplink ports support port mirroring
Web-based management Telnet
(SNMP Management Security
User ID/Password for Telnet and Web-based management authentication
Up to 4 administrators allowed
(SNMP MIB II (RFC 1213) RFC 1157 SNMP v1
ISNMPv2, SNMPv2c or later version, compliant with RFC 2011 SNMPv2 MIB for
MIBs RFC 1493 Bridge MIBs RFC 1155 SMI RFC 1757 RMON RFC 2674 SNMPv2, SNMPv2c A-2 Product Specifications
Chart 3 Physical and Environmental Specifications
Power Supply (DC Unit)
DC input of -48 VDC — -60 VDC, 1.84A Max.
Main switch: 60W maximum
(Caution: For continued protection against risk of fire, replace only with the same type land fuse rating.
Operating Temperature
D°C -45°C (32°F to 113°F)
10% to 90% (Non-condensing)
[North America UL 1950 listing
Safety ICSA C22.2 No. 950 (Canada) European Union EN60950, EN41003 EMC North America FCC Part15 (Class A) EMI European Union Conducted/Radiated Emission: EN55022 Class A EMS European Union
Radiated Susceptibilityl
Product Specifications
Bandwidth Control Setup, 11-1 Note, 11-1
Bridge MIBs RFC 1493, 1-2
Bridge Priority, 10-6
Bridge Protocol Data Units (BPDUSs), 10-1
Broadcast storm control, 1-3
Broadcast Storm Control, 12-1
C Canonical Format Indicator, 7-1
Federal Communications Commission (FCC) Interference Statement, iv
File Transfer using FTP, 20-4 command example, 20-4 GUI-based, 20-5 procedure, 20-4 restrictions over WAN, 20-5
Filename Conventions, 20-4
Filter Setup, 9-1 Note, 9-1
Filtering, 9-1 View rules, 9-3
Filtering Databases, 27-1
Firmware Upgrade, 20-1
Forwarding Delay, 10-4, 10-6
Frimware version, 6-2
Front Panel LEDs, 3-4
ip route status, 26-6
MAC address learning, 1-2, 6-7, 8-1 MAC Address Learning, 6-7
MAC Address Table, A-2 Maintenance, 20-1
Management Information Base (MIB), 17-3 Management VLAN ID, 6-10
Max Age, 10-2, 10-3, 10-6
Media Interface Exchange, A-1 MIBs, A-2
Mounting Brackets, 2-2
Multi-tenant unit (MTU), xvi
N Navigation Panel Links, 4-3 Network Applications Bridging, 1-4 Collapsed Backbone, 1-3 High Performance Switched Workgroup, 1-5 VLAN Application, 1-6 VLAN Server, 1-7 VLAN Workgroup, 1-6 Network Cables, A-1 NTP (RFC-1305), 6-5
Operating Temperature, A-3
Operational Humidity, A-3
Optional Modules Installing, 3-2
P Packet Forwarding Rate, A-2 Password Default, 4-1 Path cost, 10-1 Ping, 21-2
POP (point-of-presence, xvi Port Based VLAN Type, 6-7 Port Details, 5-2, 5-3 Port Isolation, 7-6, 7-13 Port Mirroring, 1-2, 13-1, 25-13 Note, 13-1 Port Setup, 6-10, 6-11 Port Statistics. See Port Details Port Status, 5-1. See Port Details Port Link Aggregation, 1-2 Port VID, 7-2 Default for all ports, 7-1 Port-based VLANSs, 7-10 Configure, 7-10 Power Connector, 3-4 Power Consumption, A-3 Power Supply, A-3 Priority, 6-8
Priority Queue Assignment, 6-8, 6-12 Product specifications, A-1
Quality of Service, 1-3
R Radiated Susceptibility, A-3
RADIUS (Remote Authentication Dial-In User
Service), 15-1 RADIUS Setup, 15-2 ras, 20-4 Ras, 20-4 Rear Panel, 3-4 Rear Panel Connections Rear Panel, 3-4 Reauthentication, 15-4 Related Documentation, xvi Remote Management, 17-6 repair, iii Resetting the Switch, 4-6 Restore Configuration, 20-2 RMON REC 1757, 1-2 Rom-0, 20-4 Root bridge, 10-1 Rubber Feet, 2-1 Runt, 5-5 Rx KBj/s, 5-2, 5-4 Rx Packet, 5-4 RxPkts, 5-2, 5-4
Safety Warnings, 3-1 Scenarios, 2-1
Screen Overview, 4-5 Secured Client, 20-5
Service Access Control, 17-6 Set Community, 17-4 Shared Secret, 15-2
supported versions, 17-2
summary, 25-7 sys sw vlan1q vlan list, 26-2 sys version, 26-2 System Information, 5-1, 6-1 System Log, 21-1 System Monitoring, 1-2 System Name, 6-4 System Priority, 14-4 System Statistics, 5-1 System time and date, 6-4 System up Time, 5-2
X XMODEM upload, 4-6
ManualGo.com