Page 50 Gateway IP Address IP Address The configured gateway IP address must belong to the same subnet as one of the device IP interfaces. The prompt is displayed as. Security Management and Password Configuration System security is handled through the AAA Authentication, Authorization and Accounting mechanism that manages user access rights, privileges and management NOTE: When creating a user name, the default priority is "1", which allows access but not configuration rights.
Page 61 NOTE: is the default baud rate for new device. If using baud rate does not result in viewing the device terminal, try another baud rate setting the device may be set at a different baud rate.
Page 62 Booting Device Default Settings To return to device default settings use delete startup-config command at the privileged mode prompt , and reboot the device. Page 67 telnet, Web Server etc. In this example the username and password is "Dell". Page Start Running The Management Station console config line telnet console config-line login authentication default console config-line enable authentication default console config-line password admin console config-line exit console config aaa authentication login default line console config aaa authentication enable default line console config line ssh console config-line login authentication default console config-line enable authentication default console config-line password admin console config-line exit console config ip http authentication local console config username admin password admin Page 71 Enter the command Telnet and the device IP address.
Microsoft Windows [Version 5. Page 74 When the authentication window is displayed, enter the Username and password: P a s s w o r d P r o m p t The device Web Management Interface is displayed. Each stack has one Master unit, and up to five Member units. Repeat steps 3 and 4 for all stacking members. Expanding the Stack This section contains instructions for adding stacking members.
NOTE: The device times out after 35 seconds if no selection is made. The time out periods can be reset using the CLI. Type 1. The following message is displayed. Flash file name 8 characters, Enter for none. The configuration is erased and the switch config reboots.
The IP parameter configuration for a first-time configuration is described in Device Configuration Introduction. Running Diagnostics Contact Dell technical support before using this option.
Enter console show version on each unit. The following is an example of the information which displays: Unit SW version The following is an example of the information that displays Unit 2: Erased image-1!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Page 83 Ensure that an IP address is assigned to at least one port on the Master unit. The following is an example of the information that displays: Unit SW version 1. Devices supporting SNMP run local software agent.
The SNMP agents maintain a list of variables, which are used to manage the device. The MIB presents the variables controlled by the agent. To switch off all equipment, the power supply cable is removed from the power supply socket. The power supply socket should be located near the equipment and should be easily accessible.
Passwords are both case sensitive and alpha-numeric. Page 91 Indicates that the port is disconnected. LED status can only be established by viewing the actual device. For more information about LED definitions, see Opens the About page. Page 94 Click Help.
The Online Help page opens. Select a Help topic. The selected Help topic page opens. The About page contain the device name, the software release number, and Dell copyright information. To access the About page The Switch Administrator contains the following management buttons: D e v i c e M a n a g e m e n t B u t t o n s Adds ACLs. Adds new lists.
Attaches assorted lists to interfaces. Resets statistic counters. Sorts table information. Displays the Neighbors List from the Neighbors Table page. Restores the device default settings. Creates Statistics charts on-the-fly. Each command mode has a specific command set. Entering a question mark? Global Configuration Mode Global Configuration commands apply to system features, rather than a specific protocol or interface. Telnet is an alternative to a local login terminal where a remote login is required.
All CLI commands can be used over a telnet session. Page Getting Started Page Defining General Device Information This section provides information about defining system parameters including security features, downloading device software, and resetting the device. The System page opens. S y s t e m P a g e Defining General Device Information The General page contains links to pages that allow network managers to configure device parameters, including Page System Contact—Specifies the name of the contact person.
Page Displays the device asset tag. The System Health page opens. Click Reset. Messages are assigned a severity code and include a message mnemonic, which identifies the source application generating the message. Messages are filtered based on their urgency or relevancy.
Console logs are enabled by default and cannot be disabled. Page Informational—Provides device information. NOTE: When a severity level is selected, all severity level choices above the selection are selected automatically. Console Messages: 0 Dropped severity. Buffer logging: level debugging. Buffer Messages: 11 Logged, Max. File logging: level notifications. The possible range is 1 - 65, The default value is The default value is Local 0.
Click Show All. The Log Servers Table page opens. Select a Log Servers Table entry. Check the Remove check box to remove the server s. Click Apply Changes. Packets are forwarded to the default IP when frames are sent to a remote network.
The possible field values are: — Checked—Indicates the Gateway device is currently active. Set the new gateway as active by checking the check box. The new default Gateway device is defined, and the device is updated. Page — Port—Indicates that the IP address was assigned to a port.
The IP Interface Table page opens. Select an entry in the IP Interface Table. Check the Remove check box to remove IP addresses. Modify the Interface field. The entry is modified, and the device is updated. After this period, the entry is deleted from the table. The default value is 60, seconds. The ARP Table entry is added, and the device is updated. If Access Profile Security Management is disabled, the device is accessible to all stations.
The possible field values: — All—Indicates all management methods are assigned to the Access Profile. Users with this Access Profile can access the device using all management methods. Page Click Apply Changes. The rule is added, and the device is updated. Packets are matched to the first rule which meets the rule criteria. Open the Access Profiles page. Page CLI Command management access-list name permit [ethernet interface- number vlan vlan-id port- channel number] [service service] permit ip-source ip-address [mask mask prefix-length] [ethernet interface-number vlan vlan-id port-channel number] [service service] deny [ethernet interface- number vlan vlan-id port- channel number] [service service] deny ip-source ip-address Select a profile in the Authentication Profile Name field.
Select the authentication method using the arrow icons. The Open the Authentication Profile page opens. Select an authentication profile.
For example, console users can be authenticated by Authentication Method Lists 1, while Telnet users are authenticated by Authentication Method List 2. Authentication Profiles are assigned in two predefined field values to which other Authentication Profiles can be added. However the predefined values cannot be deleted. The predefined field values are: — Network Default — Telnet sessions are assigned an Authentication List.
Page The following is an example of the CLI commands: Console config-line enable authentication default Console config-line login authentication default Console config-line exit Console config ip http authentication radius local Console config ip https authentication radius local Console config exit Console show authentication methods Login Authentication Method Lists Default: Radius, Local, Line Password are limited to a maximum of 16 characters.
The Local User Database page opens. Assigning access rights to a user: Open the Local User Database page. Select a user in the User Name field. Define the Access Level, and Password fields. The Local User Table page opens. Select a User Name. Check the Remove check box. Passwords are limit to maximum of 16 characters. The Line Password page opens. To open the Modify Enable Password page. The Modify Enable Password page opens. The possible values are , where 1 is the highest value.
Page The following is an example of the CLI commands: Console config radius-server timeout 5 Console config radius-server retransmit 5 Console config radius-server deadtime 10 Console config radius-server key dell-server Console config radius-server host Page Defining Snmp Parameters Devices supporting SNMP run a local software agent.
Page Defining Communities Defining Communities The system administrator manages access rights read and write, read only, and so on. When the community names are changed, access rights are also changed. Page — SNMP Admin—Indicates that the user has access to all device configuration options, as well to modifying the community. The possible field values are: — Checked—Removes the community.
The Community Table page opens. Select a community from the Community Table. The possible field values are: — Enables the switch to send SNMP traps when authentication failed. Determines the trap type sent to the The Startup file maintains configuration commands, and configuration commands from the Running Configuration file can be saved to the Startup file.
If Firmware Download is selected, the Configuration Download fields are grayed out. The possible field values are: — Running Configuration—Downloads commands into the Running Configuration files.
The Image file can also be uploaded from the File Upload to Server page. The Active Image file for each unit in a stacking configuration can be individually selected. The Image file is selected. The Image file reloads only after the next reset. The currently selected Image file continue to run until the next device reset. Note that the Backup-Config File is not erased. The possible field values are: — Checked—Restores the factory defaults.
Copying Files: Open the Copy Files page. Page Defining Advanced Settings Accessing file 'file1' on Loading file1 from Changes are implemented only after the device is reset.
The General Settings page opens. ACEs are the filters that determine traffic classifications. The Port Security page opens. Page Click Show All. The Port Security Table page opens. Configuring Switch Infor m ation Description Disables interfaces. Reactivates an interface that is shutdown due to port security reasons. Locks learning of new addresses on an interface.
Displays port lock status. Frequency Counter Configuring Switch Infor mation Click Add. Configuring Switch Infor mation Select an ACE. ACEs act as filters to match packets to forwarding criteria. Page A wild card mask of Configuring Switch Infor m ation Parameters". The ACL Bindings page opens. The Port Configuration page opens. By default, this parameter is set to Enable. The possible field values are: — Up—Enables traffic forwarding through the port.
Page The possible field values are: — Enable—Enables auto negotiation on the port. Page Hubs and switches are deliberately wired the opposite way end stations are wired, so that when a hub or switch is connected to an end station, a straight through Ethernet cable can be used, and the pairs match up properly.
The port parameters are saved to the device. The Port Configuration Table opens. Page [ethernet interface port- channel port-channel- number] show interfaces status [ethernet interface port-channel port- channel-number] Configuring Switch Infor m ation Description Enters the interface configuration mode to configure an ethernet type interface.
Adds a description to an interface configuration. The system provides 6 permanent LAGs. For information about Link Page LAG. The LAG Configuration page displays. The current field values are: — Full—The interface supports transmission between the device and the client in both directions simultaneously. The queue to which the port is assigned displays in the Map to Queue drop-down list. Select a new traffic queue in the Map to Queue drop-down list.
ACLs contain multiple classification rules and actions. If a match is not found, the packet is dropped as a default action. Page 61 Interface—Indicates the selected interface type on which locked port is enabled. Port—Indicates the selected interface type is a port.
Set Port—Indicates that the port is either locked or unlocked. The possible field values are: Unlocked—Unlocks Port. ACEs are checked on the first fit basis. Protocol—Enables creating an ACE based on a specific protocol. Page 64 2. Click Add. Click Show All. Page 68 Removing ACLs: 1.
Select an ACL. Check the Remove ACL check box. Page Configuring Ports Displays all the class maps configured on the device.
The following is an example of the CLI commands: Console config class-map class1 match-any Console config-cmap match access-group dell Console config-cmap exit Console config exit Description—Provides a brief interface description, for example Ethernet. Port Type—Indicates the port type. Page 73 Admin Duplex—Specifies the synchronized port duplex mode in bps.
When Admin Duplex is set to full, Head-of-Line blocking is operational on the selected port. The possible fields values are: Full—The interface supports transmission between the device and the client in both directions simultaneously. This is the default value. Page 74 Modifying Port Parameters: 1. Open the Port Configuration page. Select a port in the Port field.
The LAG Configuration page displays. This value can be entered only if the LAG is disabled. Page Enabling Storm Control Enabling Storm Control A Broadcast Storm is a result of an excessive amount of broadcast messages simultaneously transmitted across a network by a single port.
Forwarded message responses are loaded onto the network, straining network resources or causing the network to time out. Page 83 Enable—Enables moderating unknown Multicast packets on the device. The possible field values are: Enable—Enables moderating Broadcast packets. For FE ports, the range is , For GE ports the range is , packets.
The Port Mirroring page opens. NOTE: When a port is set to be a target port for a port-mirroring session, all normal operations on this port are suspended. Define the Source Port and Type fields. The new source port is defined, and the device is updated. Deleting a copy port from a port mirroring session: 1.
Open the Port Mirroring page. A packet addressed to a destination stored in one of the databases is forwarded immediately to the port. MAC addresses are dynamically learned as packets from sources arrive at the switch.
The new static address is added to the Static Address table, and the device is updated. Page Viewing Dynamic Addresses show bridge address-table static [vlan vlan] [ethernet interface port-channel port-channel- Displays classes of statically entered entries in the bridge-forwarding database. The default value is seconds. Port—Specifies the port numbers for which the table is queried. Open the Dynamic Address Table.
Define the parameter by which to query the Dynamic Address Table. Click Query. The Dynamic Address Table is queried. The query results are sorted by the selected Address Table Sort Key field value. Page 98 1. Open the Spanning Tree Global Parameters page. Select Enable in the Spanning Tree State field.
STP is enabled on the device. Forward Transitions—Indicates the number of times the port has changed from the blocking state to forwarding. Enabling STP on a port: 1.
Select Enable in the STP field. Page STP has the following different port states: Listening Learning Blocking Forwarding A listening port is either a designated or a root port, and is in the process of moving to the forwarding state. However, after the port is in the forwarding state, there is no way to determine whether the port is a root or designated port.
Page Configuring Vlans Disable—Disables establishing a point-to-point link. Activate Protocol Migration —Activates protocol migration. Protocol migration allows protocols to renegotiate with neighboring switches by testing the ports to see if they can migrate to RSTP. The possible field values are: Checked—Activates protocol migration.
As a result, VLANs have an unlimited number of ports and can be created per unit, per device, per stack, or any other logical connection combination.
VLANs function at Layer 2. Layer 3 routers identify segments and coordinate with VLANs. The following is an example of the CLI commands: Console vlan database Console config-switch Console config-switch vlan Console config-switch exit Console config interface vlan Check the Remove check box. The VLAN group is deleted, and the device is updated. All untagged packets arriving to the device are tagged by the ports PVID.
The VLAN port parameters are defined, and the device is updated. Page Configuring Gvrp console config-if switchport LAG native vlan Console config-if switchport general pvid Console config-if switchport general allowed vlan add 1,2,5,6 tagged Console config-if switchport general acceptable-frame-types tagged-only Console config-if switchport general ingress-filtering disable Configuring GVRP This field value is the default.
The port is not a mirrored port. The port's No ACL is defined on the port. QoS Trust in not disabled on the port. GVRP is not enabled. Aggregate ports can be linked into link-aggregation port-groups. Each group is comprised of ports with the same speed. The possible range is The default value is 1.
Defining Global Parameters: 1. Scroll to the Global Parameters section. LAGs can include up to 8 ports. The following is an example of the CLI commands: Console channel-group port-channel-number mode on auto This type of traffic forwarding is functional; The possible field values are: Enabled—Enables bridge multicast filtering on the device.
The following is an example of the CLI commands: Console config bridge multicast filtering Console config ip igmp snooping Page Remove—Removes a bridge multicast group specified by its address. Checked—Removes the bridge multicast address. Ports Table—Lists the port that can be added to a multicast service.
Page Enabling Igmp Snooping 3. The LAG attached to the multicast router or group is updated. System Contact—Specifies the name of the contact person. System Location—Indicates the location where the system is currently running. Page Displays system information. Main Power Supply Status—Indicates the main power supply state. The possible field values are: —Indicates the main power supply is operating normally for the specified unit.
Software Version—Displays the current software version running on a specific stacking unit. Boot Version—Displays the current Boot version running on a specific stacking unit. Hardware Version—Displays the current hardware versions running on a specific stacking unit. For more information about saving Configuration files, see "Managing Files". Resetting the device: 1. Open the Reset page. Managing Logs The Logs page contains links to various log pages. This feature provides the ability to log and manage events and report errors.
Page Notice—Provides the network administrators with device information. CLI Command Description show logging Displays the state of logging and the syslog messages stored in the internal buffer. Severity—Specifies the log severity. Description—Displays the log message text. Buffer Messages: 11 Logged, Max. File logging: level notifications. File Messages: 0 Dropped severity. Syslog server Messages: 6 Dropped severity.
The possible range is 1 - 65, The default value is Page 1. Open the Remote Logs Server Settings page. The Add a Log Server page opens.
The IP Addressing page opens. Active—Indicates if the default Gateway device specified in the Default Gateway drop-down list is currently active. The possible field values are: Checked—Indicates the Gateway device is currently active. Page Add New Default Gateway 3. Set the new gateway as active by checking the check box. The new default Gateway device is defined, and the device is updated. The IP Interface Parameters page opens. Select the interface to which the IP interface will be assigned.
The new interface is added, and the device is updated. Port—Specifies the interface type is a port, and the specific port number for which DHCP client settings are shown. Page Configuring Arp 3. Select the Interface and define the Host Name.
Modify the Interface field. After this period, the entry is deleted from the table. The default value is 60, seconds. Open the ARP Settings page. Page Managing Device Security console config arp Page Rules act as filters for determining rule priority, the device management method, interface type, source IP address and network mask, and the device management access action.
Users can be blocked or permitted management access. Rule priority sets the order of rule application in a profile. Page 5. The new Access Profile is added, and the device is updated. Open the Access Profiles page.
Page Deny—Denies management access to the defined interface. Define the Access Profile Name field. The rule is added, and the device is updated. Page User authentication occurs in the order the methods are selected. Page Selecting an Authentication Profile: 1. Open the Authentication Profiles page. Select a profile in the Authentication Profile Name field. Select the authentication method using the arrow icons. The user authentication profile is updated to the device.
The following is an example of the CLI commands: Console config aaa authentication login default radius local enable none Console config no aaa authentication login default Secure Shell SSH provides secure remote connections to a device. Page 2. Select an authentication sequence in the HTTP field. HTTP sessions are assigned an authentication sequence. Open the Select Authentication page. Access Level—Determines the user access level.
The possible values are: —Indicates the user access level. The new user is defined, and the device is updated. Displaying the Local User Table: 1. Page The Line Passwords page allows network managers to define line passwords for management methods. Passwords are limit to maximum of 16 characters. The Line Password page opens. Page Defining Enable Password password password [encrypted] Specifies a password on a line.
To open the Modify Enable Password page. Page Configuring Radius Global Parameters enable password [level level] password [encrypted] Sets a local password to control access to user and privilege levels. The following is an example of the CLI commands: Console config enable password level 15 dell Console show users accounts Username Privilege Priority —Indicates the server priority.
The possible values are , where 1 is the highest value. This is used to configure the order in which servers are queried. Page Console config radius-server timeout 5 Console config radius-server retransmit 5 Console config radius-server deadtime 10 Console config radius-server key dell-server Console config radius-server host The SNMP agents maintain a list of variables, which are used to manage the device.
Community String—Functions as a password and used to authenticate the selected management station to the device. Access Mode—Defines the access rights of the community. The possible field values are: Read Only—Indicates that the management access is restricted to read-only, and changes cannot be made to the community. SNMP traps are enabled on the device. Enabling Authentication Traps on the device: 1. Page 3. Select a Trap Managers Table entry. The trap manager is deleted, and the device is updated.
Page Managing Files Files can be downloaded from a TFTP server. If Firmware Download is selected, the Configuration Download fields are grayed out. Configuration Download—Indicates that the Configuration file is downloaded. If Configuration Download is selected, the Firmware Download fields are grayed out. CLI Command Description copy source-url destination-url [snmp] Copies any file from a source to a destination. If Firmware Upload is selected, the Configuration Upload fields are grayed out.
Configuration Upload—Indicates that the Configuration file is uploaded. After Reset—Indicates the Image file which is active on the unit after the device is reset. Selecting an Image File: 1. Open the Active Images page. Select an Image file for a specific unit in the After Reset field.
Current—The current value. After Reset—The future after reset value. By entering a value in the After Reset column, memory is allocated to the field table. Page Console config logging buffered size Back to Contents Page You can contact Dell electronically using the following addresses: World Wide Web Page Autotech Service AutoTech Service Dell's automated technical support service—AutoTech—provides recorded answers to the questions most frequently asked by Dell customers about their portable and desktop computer systems.
When you call AutoTech, use your touch-tone telephone to select the subjects that correspond to your questions. Page Dell Enterprise Training And Certification If possible, turn on your system before you call Dell for technical assistance and call from a telephone at or near the computer. You may be asked to type some commands at the keyboard, relay detailed information during operations, or try other troubleshooting steps possible only at the system itself.
Ensure that the system documentation is available. Page Contacting Dell Toll-free numbers are for use within the country for which they are listed. When you need to contact Dell, use the electronic addresses, telephone numbers, and codes provided in the following table.
If you need assistance in determining which codes to use, contact a local or an international operator. To start the Switch Administrator: 1. Open a web browser. A login window displays. Page Tree View Component List. The Component List contains a list of the feature components. For more information about using the components list, see "Component List".
0コメント