Allied Telesis Summit 24 Podręcznik Użytkownika

Przeglądaj online lub pobierz Podręcznik Użytkownika dla Switche sieciowe Allied Telesis Summit 24. Allied Telesis Summit 24 User guide Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Software User Guide

Extreme Networks, Inc.3585 Monroe StreetSanta Clara, California 95051(888) 257-3000http://www.extremenetworks.com Summit 300-48 Switch Software User G

Strona 2

10 Summit 300-48 Switch Software User Guide ContentsDebug Tracing 187TOP Command 187Contacting Extreme Technical Support 187IndexIndex of Commands

Strona 3 - Contents

100 Summit 300-48 Switch Software User GuidePower Over Ethernetunconfig inline-power disconnect-precedence [lowest-priority | deny-port]Returns the d

Strona 4 - Chapter 3 Managing the Switch

Configuring Power Over EthernetSummit 300-48 Switch Software User Guide 101unconfig inline-power operator-limit ports <portlist> Resets the ope

Strona 5 - Chapter 6 Wireless Networking

102 Summit 300-48 Switch Software User GuidePower Over Ethernet

Strona 6 - Chapter 8 Power Over Ethernet

Summit 300-48 Switch Software User Guide 103 9 Forwarding Database (FDB)This chapter describes the following topics:• Overview of the FDB on page 103•

Strona 7 - Chapter 10 Access Policies

104 Summit 300-48 Switch Software User GuideForwarding Database (FDB)interface are stored as permanent. The Summit 300-48 switches support a maximum

Strona 8 - Chapter 14 IP Unicast Routing

Configuring FDB EntriesSummit 300-48 Switch Software User Guide 105Configuring FDB EntriesTo configure entries in the FDB, use the commands listed in

Strona 9 - Appendix D Troubleshooting

106 Summit 300-48 Switch Software User GuideForwarding Database (FDB)FDB Configuration ExamplesThe following example adds a permanent entry to the FD

Strona 10 - Index of Commands

Summit 300-48 Switch Software User Guide 107 10 Access PoliciesThis chapter describes the following topics:• Overview of Access Policies on page 107•

Strona 11

108 Summit 300-48 Switch Software User GuideAccess Policiesshared multiple access control lists, using different lists of values to examine packets.

Strona 12

Using Access Control ListsSummit 300-48 Switch Software User Guide 109Rate LimitsEach entry that makes up a rate limit contains a unique name and spe

Strona 13

Summit 300-48 Switch Software User Guide 11 Figures1 Example of a port-based VLAN on the Summit 300-48 switch 642 Single port-based VLAN spanning two

Strona 14 - Ta bl es

110 Summit 300-48 Switch Software User GuideAccess PoliciesAccess Mask Precedence NumbersThe access mask precedence number is optional, and determine

Strona 15 - Conventions

Using Access Control ListsSummit 300-48 Switch Software User Guide 111The permit-established KeywordThe permit-established keyword is used to directi

Strona 16 - Related Publications

112 Summit 300-48 Switch Software User GuideAccess PoliciesThe maximum number of access list allowed by the hardware is 254 for each block of eight 1

Strona 17 - 1 ExtremeWare Overview

Using Access Control ListsSummit 300-48 Switch Software User Guide 113Table 39: Access Control List Configuration CommandsCommand Descriptioncreate a

Strona 18 - Spanning Tree Protocol

114 Summit 300-48 Switch Software User GuideAccess Policiescreate access-mask <access-mask name> {dest-mac} {source-mac} {vlan } {ethertype} {t

Strona 19 - Software Licensing

Using Access Control ListsSummit 300-48 Switch Software User Guide 115create rate-limit <rule_name> access-mask <access-mask name> {dest-

Strona 20 - Software Factory Defaults

116 Summit 300-48 Switch Software User GuideAccess PoliciesAccess Control List ExamplesThis section presents three access control list examples:• Usi

Strona 21

Using Access Control ListsSummit 300-48 Switch Software User Guide 117Step 1 – Deny IP Traffic. First, create an access-mask that examines the IP pr

Strona 22 - ExtremeWare Overview

118 Summit 300-48 Switch Software User GuideAccess PoliciesFigure 9: Access list allows TCP trafficStep 3 - Permit-Established Access List. When a T

Strona 23 - 2 Accessing the Switch

Using Access Control ListsSummit 300-48 Switch Software User Guide 119Figure 11 shows the final outcome of this access list.Figure 11: Permit-establi

Strona 24 - Command Shortcuts

12 Summit 300-48 Switch Software User Guide Figures

Strona 25 - Line-Editing Keys

120 Summit 300-48 Switch Software User GuideAccess Policies

Strona 26 - Common Commands

Summit 300-48 Switch Software User Guide 121 11 Quality of Service (QoS)This chapter describes the following topics:• Overview of Policy-Based Quality

Strona 27

122 Summit 300-48 Switch Software User GuideQuality of Service (QoS)Summit 300-48 switches support up to four physical queues per port.NOTEAs with al

Strona 28 - Configuring Management Access

Configuring QoS for a Port or VLANSummit 300-48 Switch Software User Guide 123Web Browsing ApplicationsQoS needs for Web browsing applications cannot

Strona 29 - Default Accounts

124 Summit 300-48 Switch Software User GuideQuality of Service (QoS)Traffic GroupingsAfter a QoS profile has been modified for bandwidth and priority

Strona 30 - Creating a Management Account

Traffic GroupingsSummit 300-48 Switch Software User Guide 125prescribe the bandwidth management and priority handling for that traffic grouping. This

Strona 31 - Deleting an Account

126 Summit 300-48 Switch Software User GuideQuality of Service (QoS)Explicit Class of Service (802.1p and DiffServ) Traffic GroupingsThis category of

Strona 32 - Checking Basic Connectivity

Traffic GroupingsSummit 300-48 Switch Software User Guide 127supports four hardware queues. The transmitting hardware queue determines the bandwidth

Strona 33

128 Summit 300-48 Switch Software User GuideQuality of Service (QoS)Configuring DiffServContained in the header of every IP packet is a field for IP

Strona 34 - Accessing the Switch

Traffic GroupingsSummit 300-48 Switch Software User Guide 129Observing DiffServ InformationWhen a packet arrives at the switch on an ingress port, th

Strona 35 - 3 Managing the Switch

Summit 300-48 Switch Software User Guide 13 Tables1 Notice Icons 152 Text Conventions 163 ExtremeWare Summit 300-48 Factory Defaults 204 Command Synta

Strona 36 - Using Telnet

130 Summit 300-48 Switch Software User GuideQuality of Service (QoS)DiffServ ExamplesFor information on the access list and access mask commands in t

Strona 37

Verifying Configuration and PerformanceSummit 300-48 Switch Software User Guide 131The same information is also available for ports or VLANs using on

Strona 38 - Managing the Switch

132 Summit 300-48 Switch Software User GuideQuality of Service (QoS)Displaying QoS Profile InformationThe QoS monitor can also be used to verify the

Strona 39 - Using Secure Shell 2 (SSH2)

Summit 300-48 Switch Software User Guide 133 12 Status Monitoring and StatisticsThis chapter describes the following topics:• Status Monitoring on pag

Strona 40 - Using SNMP

134 Summit 300-48 Switch Software User GuideStatus Monitoring and StatisticsTable 47 describes commands that are used to monitor the status of the sw

Strona 41 - Configuring SNMP Settings

Port StatisticsSummit 300-48 Switch Software User Guide 135Port StatisticsExtremeWare provides a facility for viewing port statistic information. The

Strona 42 - Displaying SNMP Settings

136 Summit 300-48 Switch Software User GuideStatus Monitoring and Statistics• Received Byte Count (RX Byte Count) — The total number of bytes that we

Strona 43 - Authenticating Users

Port Monitoring Display KeysSummit 300-48 Switch Software User Guide 137• Receive Fragmented Frames (RX Frag) — The total number of frames received b

Strona 44 - RADIUS RFC 2138 Attributes

138 Summit 300-48 Switch Software User GuideStatus Monitoring and StatisticsNOTEExtreme Networks recommends that you set the system recovery level to

Strona 45

LoggingSummit 300-48 Switch Software User Guide 139• Message — The message contains the log information with text that is specific to the problem.Loc

Strona 46

14 Summit 300-48 Switch Software User Guide Ta bl es34 Security Profile Command Property Values 9035 Per-Port LEDs 9836 Power Over Ethernet Configurat

Strona 47 - Using ExtremeWare Vista

140 Summit 300-48 Switch Software User GuideStatus Monitoring and Statistics— ipaddress — The IP address of the syslog host.— facility — The syslog f

Strona 48 - Navigating ExtremeWare Vista

LoggingSummit 300-48 Switch Software User Guide 141config syslog {add} <host name/ip> {<port>} <facility> {<priority>}Configu

Strona 49 - Content Frame

142 Summit 300-48 Switch Software User GuideStatus Monitoring and StatisticsRMON Using the Remote Monitoring (RMON) capabilities of the switch allows

Strona 50 - Filtering Information

RMONSummit 300-48 Switch Software User Guide 143History The History group provides historical views of network performance by taking periodic samples

Strona 51 - Configuring and Using SNTP

144 Summit 300-48 Switch Software User GuideStatus Monitoring and StatisticsEvent Actions The actions that you can define for each alarm are shown in

Strona 52

Summit 300-48 Switch Software User Guide 145 13 Spanning Tree Protocol (STP)This chapter describes the following topics:• Overview of the Spanning Tre

Strona 53 - (continued)

146 Summit 300-48 Switch Software User GuideSpanning Tree Protocol (STP)A port can belong to only one STPD. If a port is a member of multiple VLANs,

Strona 54 - SNTP Example

STP ConfigurationsSummit 300-48 Switch Software User Guide 147• Marketing is defined on all switches (switch A, switch B, switch Y, switch Z, and swi

Strona 55 - Configuring Ports on a Switch

148 Summit 300-48 Switch Software User GuideSpanning Tree Protocol (STP)Figure 16: Tag-based STP configurationThe tag-based network in Figure 16 has

Strona 56 - Switch Port Commands

Configuring STP on the SwitchSummit 300-48 Switch Software User Guide 1493 Enable STP for one or more STP domains using the following command:enable

Strona 57 - Load Sharing on the Switch

Summit 300-48 Switch Software User Guide 15 PrefaceThis preface provides an overview of this guide, describes guide conventions, and lists other publi

Strona 58

150 Summit 300-48 Switch Software User GuideSpanning Tree Protocol (STP)config stpd <stpd_name> maxage <value> Specifies the maximum age

Strona 59 - Switch Port-Mirroring

Displaying STP SettingsSummit 300-48 Switch Software User Guide 151STP Configuration ExampleThe following Summit 300-48 switch example creates and en

Strona 60 - Port-Mirroring Commands

152 Summit 300-48 Switch Software User GuideSpanning Tree Protocol (STP)Disabling and Resetting STPTo disable STP or return STP settings to their def

Strona 61 - Extreme Discovery Protocol

Summit 300-48 Switch Software User Guide 153 14 IP Unicast RoutingThis chapter describes the following topics:• Overview of IP Unicast Routing on page

Strona 62

154 Summit 300-48 Switch Software User GuideIP Unicast RoutingRouter InterfacesThe routing software and hardware routes IP traffic between router int

Strona 63 - 5 Virtual LANs (VLANs)

Overview of IP Unicast RoutingSummit 300-48 Switch Software User Guide 155— Locally, by way of interface addresses assigned to the system— By other s

Strona 64 - Types of VLANs

156 Summit 300-48 Switch Software User GuideIP Unicast RoutingProxy ARPProxy Address Resolution Protocol (ARP) was first invented so that ARP-capable

Strona 65 - System 2

Relative Route PrioritiesSummit 300-48 Switch Software User Guide 157Relative Route PrioritiesTable 55 lists the relative priorities assigned to rout

Strona 66 - Tagged VLANs

158 Summit 300-48 Switch Software User GuideIP Unicast RoutingVerifying the IP Unicast Routing ConfigurationUse the show iproute command to display t

Strona 67 - Assigning a VLAN Tag

IP CommandsSummit 300-48 Switch Software User Guide 159Table 57 describes the commands used to configure the IP route table.disable bootp vlan [<n

Strona 68 - Marketing

16 Summit 300-48 Switch Software User GuidePrefaceRelated PublicationsThe publications related to this one are:• ExtremeWare Release Notes• Summit 30

Strona 69 - VLAN Names

160 Summit 300-48 Switch Software User GuideIP Unicast RoutingTable 58 describes the commands used to configure IP options and the ICMP protocol.conf

Strona 70 - VLAN Configuration Commands

IP CommandsSummit 300-48 Switch Software User Guide 161disable ip-option loose-source-route Disables the loose source route IP option.disable ip-opti

Strona 71 - Displaying VLAN Settings

162 Summit 300-48 Switch Software User GuideIP Unicast RoutingRouting Configuration ExampleFigure 18 illustrates a Summit24e3 switch that has two VLA

Strona 72

Displaying Router SettingsSummit 300-48 Switch Software User Guide 163The example in Figure 18 is configured as follows:create vlan Financecreate vla

Strona 73 - 6 Wireless Networking

164 Summit 300-48 Switch Software User GuideIP Unicast RoutingConfiguring DHCP/BOOTP RelayOnce IP unicast routing is configured, you can configure th

Strona 74 - Wireless Devices

UDP-ForwardingSummit 300-48 Switch Software User Guide 1653 Configure the addresses to which DHCP or BOOTP requests should be directed, using the fol

Strona 75 - Managing Wireless Ports

166 Summit 300-48 Switch Software User GuideIP Unicast RoutingUDP-Forwarding ExampleIn this example, the VLAN Marketing and the VLAN Operations are p

Strona 76 - Configuring RF Properties

UDP-ForwardingSummit 300-48 Switch Software User Guide 167config vlan <name> udp-profile <profile_name> Assigns a UDP-forwarding profile

Strona 77

168 Summit 300-48 Switch Software User GuideIP Unicast Routing

Strona 78 - Configuring Country Codes

Summit 300-48 Switch Software User Guide 169 A Safety InformationImportant Safety InformationWARNING!Read the following safety information thoroughly

Strona 79 - Configuring Wireless Ports

Summit 300-48 Switch Software User Guide 17 1 ExtremeWare OverviewThis chapter describes the following topics:• Summary of Features on page 17• Securi

Strona 80 - Show Commands

170 Summit 300-48 Switch Software User GuideSafety Information• The appliance coupler (the connector to the unit and not the wall plug) must have a c

Strona 81 - Event Logging and Reporting

Important Safety InformationSummit 300-48 Switch Software User Guide 171Lithium BatteryThe lithium battery is not user-replaceable.WARNING!Danger of

Strona 82 - Wireless Networking

172 Summit 300-48 Switch Software User GuideSafety Information

Strona 83 - 7 Unified Access Security

Summit 300-48 Switch Software User Guide 173 B Supported StandardsThe following is a list of software standards supported by ExtremeWare for the Summi

Strona 84 - User Access Security

174 Summit 300-48 Switch Software User GuideSupported Standards

Strona 85 - Cipher Suites

Summit 300-48 Switch Software User Guide 175 C Software Upgrade and Boot OptionsThis appendix describes the following topics:• Downloading a New Image

Strona 86 - Legacy and WPA 802.1x Support

176 Summit 300-48 Switch Software User GuideSoftware Upgrade and Boot OptionsRebooting the SwitchTo reboot the switch, use the following command:rebo

Strona 87 - Network Security Policies

Using TFTP to Upload the ConfigurationSummit 300-48 Switch Software User Guide 177To erase the currently selected configuration image and reset all s

Strona 88 - RADIUS Attributes

178 Summit 300-48 Switch Software User GuideSoftware Upgrade and Boot OptionsUsing TFTP to Download the ConfigurationYou can download ASCII files tha

Strona 89 - Security Profile Commands

Upgrading and Accessing BootROMSummit 300-48 Switch Software User Guide 179To display scheduled download information, use the following command:show

Strona 90 - Unified Access Security

18 Summit 300-48 Switch Software User GuideExtremeWare Overview• SSH2 connection• Simple Network Management Protocol (SNMP) support• Remote Monitorin

Strona 91

180 Summit 300-48 Switch Software User GuideSoftware Upgrade and Boot Options Accessing the Bootloader CLIThe Bootloader CLI contains commands that s

Strona 92

Boot Option CommandsSummit 300-48 Switch Software User Guide 181Boot Option CommandsTable 64 lists the CLI commands associated with switch boot optio

Strona 93

182 Summit 300-48 Switch Software User GuideSoftware Upgrade and Boot Optionsuse configuration [primary | secondary] Configures the switch to use a p

Strona 94

Summit 300-48 Switch Software User Guide 183 D TroubleshootingIf you encounter problems when using the switch, this appendix may be helpful. If you ha

Strona 95 - 8 Power Over Ethernet

184 Summit 300-48 Switch Software User GuideTroubleshooting• Both ends of the Gigabit link are set to the same autonegotiation state.Both sides of th

Strona 96 - Port Power Management

Using the Command-Line InterfaceSummit 300-48 Switch Software User Guide 185Check that the port through which you are trying to access the device has

Strona 97 - Port Power Events

186 Summit 300-48 Switch Software User GuideTroubleshootingThe only way to establish a full duplex link is to either force it at both sides, or run a

Strona 98 - Per-Port LEDs

Debug TracingSummit 300-48 Switch Software User Guide 187with a number, or contains non-alphabetical characters, you must use quotation marks wheneve

Strona 99

188 Summit 300-48 Switch Software User GuideTroubleshooting• [email protected] can also visit the support website at:• http://www.extrem

Strona 100 - Power Over Ethernet

Summit 300-48 Switch Software User Guide 189 IndexNumerics02.1x/EAP 84802.11a, 802.11b, 802.11g 74802.1p configuration commands (table) 127Aaccess con

Strona 101 - Table 37: PoE Show Commands

Software LicensingSummit 300-48 Switch Software User Guide 19Quality of ServiceExtremeWare has Quality of Service (QoS) features that support IEEE 80

Strona 102

190 - Index Summit 300-48 Switch Software User Guide configurationdownloading 178downloading complete 178downloading incremental 178logging 140primary

Strona 103 - 9 Forwarding Database (FDB)

Summit 300-48 Switch Software User Guide Index - 191 DHCP relay 164disabling 163enabling 157IP route sharing 155proxy ARP 156reset and disable command

Strona 104 - How FDB Entries Get Added

192 - Index Summit 300-48 Switch Software User Guide primary image 175privacy 85private community, SNMP 41protocol analyzers, use with port-mirroring

Strona 105 - Configuring FDB Entries

Summit 300-48 Switch Software User Guide Index - 193 Greenwich Mean Time Offsets (table) 52NTP servers 51software licensingsecurity features 20SSH2 pr

Strona 106 - Displaying FDB Entries

194 - Index Summit 300-48 Switch Software User Guide types 64UDP-Forwarding 165voice applications, QoS 122WWeb access, controlling 47web browsing appl

Strona 107 - 10 Access Policies

Summit 300-48 Switch Software User Guide 195 Index of CommandsCclear counters 140clear fdb 105, 125clear inline-power connection-history slot 99cle

Strona 108 - Access Lists

196 - Index of Commands Summit 300-48 Switch Software User Guide config vlan ipaddress 27, 38, 70, 157config vlan name 70config vlan priority 127co

Strona 109 - How Access Control Lists Work

Summit 300-48 Switch Software User Guide Index of Commands - 197 enable inline-power 98enable inline-power ports 99enable inline-power slot 98enabl

Strona 110 - Specifying a Default Rule

198 - Index of Commands Summit 300-48 Switch Software User Guide show wireless config 80show wireless ports 80show wireless ports interface 80Tteln

Strona 111 - Maximum Entries

2 ©2003 Extreme Networks, Inc. All rights reserved. Extreme Networks, ExtremeWare, Alpine, and BlackDiamond are registered trademarks of Extreme Netwo

Strona 112 - Access Control List Commands

20 Summit 300-48 Switch Software User GuideExtremeWare OverviewSecurity Licensing Certain additional ExtremeWare security features, such as the use o

Strona 113 - Using Access Control Lists

Software Factory DefaultsSummit 300-48 Switch Software User Guide 21NOTEFor default settings of individual ExtremeWare features, see the applicable i

Strona 114 - Access Policies

22 Summit 300-48 Switch Software User GuideExtremeWare Overview

Strona 115

Summit 300-48 Switch Software User Guide 23 2 Accessing the SwitchThis chapter describes the following topics:• Understanding the Command Syntax on pa

Strona 116 - 10.10.20.1

24 Summit 300-48 Switch Software User GuideAccessing the SwitchSyntax HelperThe CLI has a built-in syntax helper. If you are unsure of the complete s

Strona 117

Line-Editing KeysSummit 300-48 Switch Software User Guide 25NamesAll named components of the switch configuration must have a unique name. Names must

Strona 118

26 Summit 300-48 Switch Software User GuideAccessing the SwitchCommand HistoryExtremeWare “remembers” the last 49 commands you entered. You can displ

Strona 119

Common CommandsSummit 300-48 Switch Software User Guide 27config sys-recovery-level [none | critical | all] Configures a recovery option for instance

Strona 120

28 Summit 300-48 Switch Software User GuideAccessing the SwitchConfiguring Management AccessExtremeWare supports the following two levels of manageme

Strona 121 - 11 Quality of Service (QoS)

Configuring Management AccessSummit 300-48 Switch Software User Guide 29User AccountA user-level account has viewing access to all manageable paramet

Strona 122 - Applications and Types of QoS

Summit 300-48 Switch Software User Guide 3 ContentsPrefaceIntroduction 15Conventions 15Related Publications 16Chapter 1 ExtremeWare OverviewSummary of

Strona 123 - File Server Applications

30 Summit 300-48 Switch Software User GuideAccessing the SwitchChanging the Default PasswordDefault accounts do not have passwords assigned to them.

Strona 124 - Traffic Groupings

Domain Name Service Client ServicesSummit 300-48 Switch Software User Guide 31Viewing AccountsTo view the accounts that have been created, you must h

Strona 125 - MAC-Based Traffic Groupings

32 Summit 300-48 Switch Software User GuideAccessing the SwitchChecking Basic ConnectivityThe switch offers the following commands for checking basic

Strona 126 - Observing 802.1p Information

Checking Basic ConnectivitySummit 300-48 Switch Software User Guide 33• from uses the specified source address in the ICMP packet. If not specified,

Strona 127 - 802.1p Commands

34 Summit 300-48 Switch Software User GuideAccessing the Switch

Strona 128 - Configuring DiffServ

Summit 300-48 Switch Software User Guide 35 3 Managing the SwitchThis chapter describes the following topics:• Overview on page 35• Using the Console

Strona 129

36 Summit 300-48 Switch Software User GuideManaging the SwitchUsing the Console InterfaceThe CLI built into the switch is accessible by way of the 9-

Strona 130 - Source port

Using TelnetSummit 300-48 Switch Software User Guide 37You can enable BOOTP on a per-VLAN basis by using the following command:enable bootp vlan [<

Strona 131 - QoS Monitor

38 Summit 300-48 Switch Software User GuideManaging the SwitchWhen you have successfully logged in to the switch, the command-line prompt displays th

Strona 132 - Traffic Rate-Limiting

Using Secure Shell 2 (SSH2)Summit 300-48 Switch Software User Guide 39Controlling Telnet AccessBy default, Telnet services are enabled on the switch.

Strona 133 - Status Monitoring

4 Summit 300-48 Switch Software User Guide ContentsConfiguring Management Access 28User Account 29Administrator Account 29Default Accounts 29Creating

Strona 134

40 Summit 300-48 Switch Software User GuideManaging the SwitchYou can specify a list of predefined clients that are allowed SSH2 access to the switch

Strona 135 - Port Statistics

Using SNMPSummit 300-48 Switch Software User Guide 41Supported MIBsIn addition to private MIBs, the switch supports the standard MIBs listed in Appen

Strona 136 - Port Errors

42 Summit 300-48 Switch Software User GuideManaging the SwitchDisplaying SNMP SettingsTo display the SNMP settings configured on the switch, use the

Strona 137 - Port Monitoring Display Keys

Authenticating UsersSummit 300-48 Switch Software User Guide 43Authenticating Users ExtremeWare provides a Radius client to authenticate switch admin

Strona 138

44 Summit 300-48 Switch Software User GuideManaging the SwitchRADIUS RFC 2138 Attributes The RADIUS RFC 2138 optional attributes supported are as fol

Strona 139 - Remote Logging

Authenticating UsersSummit 300-48 Switch Software User Guide 45eric Password = "", Service-Type = Administrative Filter-Id = "unlim

Strona 140 - Logging Commands

46 Summit 300-48 Switch Software User GuideManaging the SwitchFilter-Id = "unlim" admin Password = "", Service-Type = Administrat

Strona 141

Using ExtremeWare VistaSummit 300-48 Switch Software User Guide 47Using ExtremeWare VistaThe ExtremeWare Vista™ device-management software that runs

Strona 142 - RMON Features of the Switch

48 Summit 300-48 Switch Software User GuideManaging the Switch• After downloading a newer version of the switch image, clear the browser disk and mem

Strona 143 - Configuring RMON

Using ExtremeWare VistaSummit 300-48 Switch Software User Guide 49Task FrameThe task frame has two sections: menu buttons and submenu links. The four

Strona 144 - Event Actions

Summit 300-48 Switch Software User Guide 5 ContentsPort Numbering 55Enabling and Disabling Switch Ports 55Configuring Switch Port Speed and Duplex Set

Strona 145 - Spanning Tree Protocol (STP)

50 Summit 300-48 Switch Software User GuideManaging the SwitchStatus MessagesStatus messages are displayed at the top of the content frame. The four

Strona 146 - STP Configurations

Using the Simple Network Time ProtocolSummit 300-48 Switch Software User Guide 51Do a GET When Configuring a VLANWhen configuring a VLAN using Extrem

Strona 147 - Sales, Personnel, Marketing

52 Summit 300-48 Switch Software User GuideManaging the SwitchOnce enabled, the switch sends out a periodic query to the NTP servers defined later (i

Strona 148 - Switch 3

Using the Simple Network Time ProtocolSummit 300-48 Switch Software User Guide 53-9:00 -540 YST - Yukon Standard-10:00 -600 AHST - Alaska-Hawaii Stan

Strona 149 - Configuring STP on the Switch

54 Summit 300-48 Switch Software User GuideManaging the SwitchSNTP Configuration CommandsTable 14 describes SNTP configuration commands.SNTP ExampleI

Strona 150

Summit 300-48 Switch Software User Guide 55 4 Configuring Ports on a SwitchThis chapter describes the following topics: • Port Numbering on page 55• E

Strona 151 - Displaying STP Settings

56 Summit 300-48 Switch Software User GuideConfiguring Ports on a SwitchConfiguring Switch Port Speed and Duplex SettingBy default, the switch is con

Strona 152 - Disabling and Resetting STP

Load Sharing on the SwitchSummit 300-48 Switch Software User Guide 57Load Sharing on the SwitchLoad sharing with switches allows you to increase band

Strona 153 - 14 IP Unicast Routing

58 Summit 300-48 Switch Software User GuideConfiguring Ports on a SwitchYou can configure the address-based load-sharing algorithm on the Summit 300-

Strona 154 - Populating the Routing Table

Switch Port-MirroringSummit 300-48 Switch Software User Guide 59• Ports on the switch are divided into a maximum of five groups.• Port-based and roun

Strona 155 - IP Route Sharing

6 Summit 300-48 Switch Software User Guide ContentsConfiguring Wireless Port Interfaces 79Managing Wireless Clients 80Show Commands 80Event Logging an

Strona 156 - Proxy ARP

60 Summit 300-48 Switch Software User GuideConfiguring Ports on a SwitchUp to eight mirroring filters and one monitor port can be configured. After a

Strona 157 - Relative Route Priorities

Extreme Discovery ProtocolSummit 300-48 Switch Software User Guide 61Port-Mirroring ExampleThe following example selects port 1:3 as the mirror port

Strona 158 - IP Commands

62 Summit 300-48 Switch Software User GuideConfiguring Ports on a Switch

Strona 159

Summit 300-48 Switch Software User Guide 63 5 Virtual LANs (VLANs)This chapter describes the following topics:• Overview of Virtual LANs on page 63• T

Strona 160 - IP Unicast Routing

64 Summit 300-48 Switch Software User GuideVirtual LANs (VLANs)• VLANs ease the change and movement of devices.With traditional networks, network adm

Strona 161

Types of VLANsSummit 300-48 Switch Software User Guide 65Spanning Switches with Port-Based VLANsTo create a port-based VLAN that spans two switches,

Strona 162 - Routing Configuration Example

66 Summit 300-48 Switch Software User GuideVirtual LANs (VLANs)Figure 3 illustrates two VLANs spanning two switches. On system 1, ports 1:12 through

Strona 163 - Displaying Router Settings

Types of VLANsSummit 300-48 Switch Software User Guide 67NOTEThe use of 802.1Q tagged packets may lead to the appearance of packets slightly bigger t

Strona 164 - Configuring DHCP/BOOTP Relay

68 Summit 300-48 Switch Software User GuideVirtual LANs (VLANs)Figure 4: Physical diagram of tagged and untagged traffic Figure 5 is a logical diagra

Strona 165 - UDP-Forwarding

VLAN NamesSummit 300-48 Switch Software User Guide 69• The server connected to port 1:16 on system 1 has a NIC that supports 802.1Q tagging. • The se

Strona 166 - UDP-Forwarding Commands

Summit 300-48 Switch Software User Guide 7 ContentsChapter 10 Access PoliciesOverview of Access Policies 107Access Control Lists 107Rate Limits 107Usi

Strona 167

70 Summit 300-48 Switch Software User GuideVirtual LANs (VLANs)Renaming a VLANTo rename an existing VLAN, use the following command:config vlan <o

Strona 168

Displaying VLAN SettingsSummit 300-48 Switch Software User Guide 71VLAN Configuration ExamplesThe following Summit 300-48 switch example creates a ta

Strona 169 - A Safety Information

72 Summit 300-48 Switch Software User GuideVirtual LANs (VLANs)

Strona 170 - Connections

Summit 300-48 Switch Software User Guide 73 6 Wireless NetworkingThis chapter describes wireless networking using the Summit 300-48 switch and the Alt

Strona 171 - Lithium Battery

74 Summit 300-48 Switch Software User GuideWireless NetworkingFigure 6: Sample integrated wired and wireless networkThis arrangement is part of the E

Strona 172 - Safety Information

BridgingSummit 300-48 Switch Software User Guide 75You can set network policies at Layers 2 and 3 to cover both the wired and wireless networks. In t

Strona 173 - B Supported Standards

76 Summit 300-48 Switch Software User GuideWireless Networking7 Configure a specific channel (determined from a site survey), if desired, on each int

Strona 174 - Supported Standards

Configuring RF PropertiesSummit 300-48 Switch Software User Guide 77frag-length 2345 256-2345 Identifies fragment size in bytes. This value should re

Strona 175 - Downloading a New Image

78 Summit 300-48 Switch Software User GuideWireless NetworkingConfiguring Wireless Switch PropertiesTable 21 lists the wireless configuration command

Strona 176 - Saving Configuration Changes

Configuring Wireless PortsSummit 300-48 Switch Software User Guide 79Configuring Wireless PortsThe configure wireless ports commands allow you to con

Strona 177

8 Summit 300-48 Switch Software User Guide ContentsPort Statistics 135Port Errors 136Port Monitoring Display Keys 137Setting the System Recovery Level

Strona 178

80 Summit 300-48 Switch Software User GuideWireless NetworkingTable 25 lists the configuration commands for wireless ports.Managing Wireless ClientsT

Strona 179 - Accessing the Bootstrap CLI

Event Logging and ReportingSummit 300-48 Switch Software User Guide 81Event Logging and ReportingThe Summit 300-48 switch supports the following enha

Strona 180 - Accessing the Bootloader CLI

82 Summit 300-48 Switch Software User GuideWireless Networking

Strona 181 - Boot Option Commands

Summit 300-48 Switch Software User Guide 83 7 Unified Access SecurityThis chapter describes the security features of the Summit 300-48 switch and incl

Strona 182

84 Summit 300-48 Switch Software User GuideUnified Access SecurityUser Access SecurityEffective user security meets the following objectives:• Authen

Strona 183 - D Troubleshooting

User Access SecuritySummit 300-48 Switch Software User Guide 85then extends or denies access as instructed, and passes along configuration informatio

Strona 184 - Troubleshooting

86 Summit 300-48 Switch Software User GuideUnified Access Securityincorporate each of these suites, and the Altitude 300 wireless port supports hardw

Strona 185 - Port Configuration

Network Security PoliciesSummit 300-48 Switch Software User Guide 87Network Security PoliciesNetwork security policy refers to a set of network rules

Strona 186

88 Summit 300-48 Switch Software User GuideUnified Access SecurityPolicy ExamplesThe following examples suggest typical uses of network security poli

Strona 187 - TOP Command

CLI Commands for Security on the SwitchSummit 300-48 Switch Software User Guide 89Table 31 lists the attributes included in the RADIUS response.Vendo

Strona 188 - • [email protected]

Summit 300-48 Switch Software User Guide 9 ContentsResetting and Disabling Router Settings 163Configuring DHCP/BOOTP Relay 164Verifying the DHCP/BOOTP

Strona 189 - Numerics

90 Summit 300-48 Switch Software User GuideUnified Access SecurityTable 34 lists the properties for the security profile configuration command.Table

Strona 190

Example Wireless Configuration ProcessSummit 300-48 Switch Software User Guide 91Example Wireless Configuration ProcessThis section provides an examp

Strona 191

92 Summit 300-48 Switch Software User GuideUnified Access SecurityTo configure the VLAN, addresses, and RF profiles, follow these steps:1 Create the

Strona 192

Example Wireless Configuration ProcessSummit 300-48 Switch Software User Guide 93If you enter the wrong number of characters for the code, a message

Strona 193

94 Summit 300-48 Switch Software User GuideUnified Access Security

Strona 194

Summit 300-48 Switch Software User Guide 95 8 Power Over EthernetThis chapter explains how to configure the Summit 300-48 switch to supply power to de

Strona 195

96 Summit 300-48 Switch Software User GuidePower Over EthernetPort Power ManagementWhen you connect PDs, the Summit 300-48 switch automatically disco

Strona 196

Port Power ManagementSummit 300-48 Switch Software User Guide 97Common Power PoolThe common power pool represents the total amount of power available

Strona 197

98 Summit 300-48 Switch Software User GuidePower Over EthernetPorts are powered based upon their priority and discovery time. Higher priority ports w

Strona 198

Configuring Power Over EthernetSummit 300-48 Switch Software User Guide 99enable inline-power ports <portlist>disable inline-power ports <po

Komentarze do niniejszej Instrukcji

Brak uwag