enterasys switch configuration guide

Spanning Tree Basics displayed in the following example. set inlinepower detectionmode {auto | ieee} auto (default) The Enterasys device first uses the IEEE 802.3af/at standards resistorbased detection method. SNMP Support on Enterasys Switches Table 12-2 SNMP Terms and Definitions (continued) Term Definition USM User-Based Security Model, the SNMPv3 authentication model which relies on a user name match for access to network management components. Advanced Configuration Overview Procedure 4-1 contains the steps to assign an IP address and configure basic system parameters. Default is 300 seconds. View online Configuration manual for Enterasys C2H124-24 Switch or simply click Download button to examine the Enterasys C2H124-24 guidelines offline on your desktop or laptop computer. Enterasys devices support version 2 of the PIM protocol as described in RFC 4601 and draft-ietfpim-sm-v2-new-09. student Connects a dorm room PC to the network through a Student Fixed Switch port. When enabled, this indicates that a port is on the edge of a bridged LAN. Terms and Definitions Router 2(su)->router(Config-router)#create vlan 111 3 Router 2(su)->router(Config-router)#address vlan 111 3 172.111.1.150 0 Router 2(su)->router(Config-router)#master-icmp-reply vlan 111 3 Router 2(su)->router(Config-router)#enable vlan 111 3 Router 2(su)->router(Config-router)#exit Terms and Definitions Table 23-2 lists terms and definitions used in this VRRP configuration discussion. Event type, description, last time event was sent. User Authentication Overview When the maptable response is set to tunnel mode, the system will use the tunnel attributes in the RADIUS reply to apply a VLAN to the authenticating user and will ignore any Filter-ID attributes in the RADIUS reply. Refer to the CLI Reference for your platform for command details. Figure 10-4 provides an overview of the fixed switch authentication configuration. DHCP Configuration The subnet of the IP address being issued should be on the same subnet as the ingress interface (that is, the subnet of the host IP address of the switch, or if routing interfaces are configured, the subnet of the routing interface). set vlan create vlan-id Create a routed interface for the VLAN in router configuration mode. Go to the website "www.enterasys.com" and download proper firmware from the download library. Configuring STP and RSTP variations of the global bridge configuration commands. Dynamic ARP Inspection Dynamic ARP Inspection Configuration set arpinspection vlan 10 set arpinspection trust port ge.1.1 enable Routing Example T Note: This example applies only to platforms that support routing. Chapter 23, Configuring VRRP Configure IPv6 Chapter 25, Configuring and Managing IPv6 Security and General Management Configure Access Control Lists (ACLs). 3. | En savoir plus sur l'exprience professionnelle de Nicolas Fluchaire, sa formation, ses relations et plus en . Quality of Service (QoS) configuration on Enterasys switches is usually done via policies. Displaying Scrolling Screens If the CLI screen length has been set using the set length command, CLI output requiring more than one screen will display --More-- to indicate continuing screens. This setting will not be changed in our example. Refer to Table 2-2 for console port pinout assignments. PIM-SM adopts RPF technology in the join/prune process. Configured channel, filter, and buffer information will be saved across resets, but not frames within the capture buffer. If it is not, then the sending device proceeds no further. Enterasys devices allow up to 8 server IP addresses to be configured as destinations for Syslog messages. IPsec Configuration IPsec and IKE (Internet Key Exchange protocol) are defined for the RADIUS host application only. Using Multicast in Your Network IGMP snooping is disabled by default on Enterasys devices. Dynamic VLAN authorization is not reflected in the show port vlan display. Syslog combines this value and the severity value to determine message priority. ACL Configuration Overview 2: deny ip 30.0.0.1 0.0.255.255 any 3: deny ip 40.0.0.1 0.0.255.255 any 4: permit ip any any Inserting ACL Rules When you enter an ACL rule, the new rule is appended to the end of the existing rules by default. Port Configuration Overview C5(su)->show console vt100 terminal mode disabled Baud Flow Bits StopBits Parity ------ ------- ---- ---------- -----9600 Disable 8 1 none Use the set console baud command to change the baud rate of the console port. IP Broadcast Settings the clear arp command to delete a specific entry or all entries from the switch ARP table. Testing Network Connectivity Configuring Static Routes Procedure 20-3 lists the commands to configure a static route. Understanding How VLANs Operate Preparing for VLAN Configuration A little forethought and planning is essential to a successful VLAN implementation. This implementation supports the creation of Security Associations (SAs) with servers configured for RADIUS, and the RADIUS application helps define the IPsec flow. Valid sid values are 04094. Hardware troubleshooting and replace when it was necessary. BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. 1.2 PC ge. The port cost value may also be administratively assigned using the set spantree adminpathcost command. 1 second priority Specifies the router priority for the master election for this virtual router. Display MAC authentication configuration or status of active sessions. Graft messages are sent upstream hop-by-hop until the multicast tree is reached. For multiple user 802.1x authentication or any non-802.1x authentication, set the system authentication mode to use multiple authenticators simultaneously. If you clear a license from a member unit in a stack while the master unit has a activated license, the status of the member will change to ConfigMismatch and its ports will be detached from the stack. Password Management Overview Special characters (default 0) The set of special characters recognized is: ! ThisexampleshowshowtodisplayOSPFinformation: UsethiscommandtodisplaytheOSPFlinkstatedatabase. Using the Command Line Interface Logging In By default, the switch is configured with three user login accountsro for Read-Only access, rw for Read-Write access, and admin for super-user access to all modifiable parameters. Routers R1 and R2 are both configured with one virtual router (VRID 1). Create a community name. Configuring VLANs Default Settings Table 9-1 lists VLAN parameters and their default values. Configuring RIP on page 21-1 Configure OSPFv2. Configuring Authentication Table 10-1 Default Authentication Parameters (continued) Parameter Description Default Value realm Specifies authentication server configuration scope. Also configured are two loopback interfaces, to use for the router IDs. Display the current settings for the Management Authentication Notification MIB. Use clear license to remove an applied license from a switch. Note: Priority mode and weight cannot be configured on LAGs, only on the physical ports that make up the LAG. Create a new read-write or read-only user login account and enable it. Access Control Lists on the A4 Table 24-1 ACL Rule Precedence (continued) ACL Type and Rule Priority Example IP SIP any DIP exact 18 permit any 10.0.1.22 IP SIP any DIP any 17 deny any any MAC SA any DA any 16 deny any any Rule actions include: Deny drop the packet. The Class of Service capability of the device is implemented by a priority queueing mechanism. In this case, all destinations outside of the stub area are represented by means of a default route. User Account Overview Procedure 5-2 on page 5-4 shows how a super-user creates a new super-user account and assigns it as the emergency access account. Determine an appropriate policy best suited for the use of that device on your network. After you have properly configured the switch, and started Enterasys WebView, you can perform any of the tasks described in the following sections. Optionally, delete an entire ACL or a single rule or range of rules. ThisexampleshowshowtodisplaythesystemIPaddressandsubnetmask: Thefollowingtableprovidesanexplanationofthecommandoutput. With LACP, if a set of links can aggregate, they will aggregate. The hosts are configured to use 172.111.1.1/16 as the default route. Note: You must be logged in to the Enterasys device with read-write access rights to use the commands shown in this procedure. Refer to page Security Mode Configuration FIPS mode is disabled by default. Configuring PIM-SM Table 19-8 DVMRP Show Commands Task Command Display DVMRP routing information, neighbor information, or DVMRP enable status. Copying One Switch's Configuration to Another Switch Using USB Zero Touch Provisioning (ZTP) Criteria for USB Zero Touch Provisioning; Use the dir command to display the contents of the images directory. SNTP Configuration b. engine ID A value used by both the SNMPv3 sender and receiver to propagate inform notifications. Managing Switch Configuration and Files Caution: If you do not follow the steps above, you may lose remote connectivity to the switch. The ARP Table This example shows output from a successful ping to IP address 182.127.63.23: C5(su)->router#ping 182.127.63.23 182.127.63.23 is alive Use the traceroute command to display a hop-by-hop path through an IP network from the device to a specific destination host. sFlow Using sFlow in Your Network The advantages of using sFlow include: sFlow makes it possible to monitor ports of a switch, with no impact on the distributed switching performance. Refer to page Configuring SNMP doorstep. Management Authentication Notification MIB Functionality Refer to the CLI Reference for your platform for detailed information about the commands listed below in Procedure 5-4. Functions and Features Supported on Enterasys Devices Disabling Spanning Tree Spanning Tree may be disabled globally or on a per port basis. Figure 15-11 shows the problem that arises when using a single Spanning Tree configuration for traffic segregation with redundancy. Procedure 5-4 Configuring Management Authentication Notification MIB Settings Step Task Command(s) 1. As soon as a rule is matched, processing of the access list stops. Enter router interface configuration command mode for the specified interface from global configuration command mode. For detailed information about the CLI commands used in this book, refer to the CLI Reference for your Fixed Switch platform. 26 Configuring Security Features This chapter. How RADIUS Data Is Used The Enterasys switch bases its decision to open the port and apply a policy or close the port based on the RADIUS message, the port's default policy, and unauthenticated behavior configuration. PoE is not supported on the I-Series switches. Automatic IP Address Pools When configuring an IP address pool for dynamic IP address assignment, the only required steps are to name the pool and define the network number and mask for the pool using the set dhcp pool network command. When a Packet Flow Sample is generated, the sFlow Agent examines the list of counter sources and adds counters to the sample datagram, least recently sampled first. Users on all ports will attempt to authenticate. Spanning Tree Basics string corresponding to the bridge MAC address. If there is still a tie, these ports are connected via a shared medium. Determines the prune lifetime. However, it does provide a level of authentication for a device where otherwise none would be possible. Permit allow the frame to be switched. OSPF routes IP packets based solely on the destination IP address found in the IP packet header. Removing Units from an Existing Stack The hierarchy of the switches that will assume the function of backup manager is also determined in case the current manager malfunctions, is powered down, or is disconnected from the stack. set-request Stores a value in a specific variable. Press ENTER to advance the output one line at a time. Considerations About Using clear config in a Stack To create a virtual switch configuration in a stack environment: 1. Policy Configuration Overview The following example creates a policy profile with a profile-index value of 1 and a profile name, student, that can be used by the RADIUS Filter-ID functionality: System(rw)->set policy profile 1 name student Setting a Default VLAN for a Role A default VLAN can be configured for a policy role. EAPOL authentication mode When enabled, set to auto for all ports. Configuring PoE Procedure 7-3 PoE Configuration for G-Series Devices (continued) Step Task Command(s) 4. Configuration of static IGMP groups using the set igmpsnooping add-static on the fixed switches. RIP is a distance-vector routing protocol for use in small networks it is not intended for complex networks. sFlow Table 18-3 describes how to manage remote network monitoring. VRRP Overview Figure 23-1 Basic VRRP Topology VRID 1 172.111.1.1 Router R1 Router R2 ge.1.1 VLAN 111 172.111.1.1/16 ge.1.1 VLAN 111 172.111.1.2/16 Host 1 172.111.1.100/16 Default Gateway 172.111.1.1 Figure 23-1 shows a basic VRRP topology with a single virtual router. These ports provide a path to the root for attached devices. Optionally, set the timeout period for aging learned MAC entries. Managing Switch Configuration and Files Displaying the Configuration Executing show config without any parameters will display all the non-default configuration settings. Display the status of edge port detection: show spantree autoedge 2. Policy Configuration Example Roles The example defines the following roles: guest Used as the default policy for all unauthenticated ports. Use the following commands to review, re-enable, and reset the Spanning Tree mode. Table 11-2 show policy rule Output Details. The Extreme switch does not use it and does not assert CTS. Configuring ACLs Port-string ----------ge.1.29 Access-list ----------121 Configuring ACLs This section provides procedures and examples for configuring IPv4, IPv6, and MAC ACLs. Enable or disable Telnet services, inbound, outbound, or all. Using the Command Line Interface Connecting Using the Console Port Connect a terminal to the local console port as described in Connecting to the Switch on page 1-2. When Policy Maptable Response is Profile When the switch is configured to use only Filter-ID attributes, by setting the set policy maptable command response parameter to policy: If the Filter-ID attributes are present, the specified policy profile will be applied to the authenticating user. Account and password feature behavior and defaults differ depending on the security mode of the switch. Switch 3s blocking port eventually transitions to a forwarding state which leads to a looped condition. Determines if the keys for trap doors do exist. Downloading New Firmware Enterasys C5 Command Line Interface Enterasys Networks, Inc. 50 Minuteman Rd. Enable ARP inspection on the VLANs where clients are connected, and optionally, enable logging of invalid ARP packets. Network Engineer Network Engineering Description A network engineer is a technology professional who is highly skilled in maintaining the connectivity of networks in terms of. Configuring Authentication Optionally Enable Guest Network Privileges With PWA enhanced mode enabled, you can optionally configure guest networking privileges. The allocation mechanism attempts to maximize aggregation, subject to management controls. Enterasys Switch: List of Devices # Model Type of Document; 1: Enterasys I3H252: Enterasys Switch I3H252 Hardware installation manual (78 pages) 2: Enterasys I Series: Guide the actions of Level 1 and Level 2 teams focus on configuration changes, software updates, and preventive/ corrective maintenance, define and develop together with Management team, the initial performance procedures that should be used by the NOC.