Cisco 500 Series Stackable Managed Switch Administration Guide Release 1.2.7

Size: px
Start display at page:

Download "Cisco 500 Series Stackable Managed Switch Administration Guide Release 1.2.7"

Transcription

1 ADMINISTRATION GUIDE Cisco 500 Series Stackable Managed Switch Administration Guide Release 1.2.7

2 Contents Chapter 1: Getting Started 1 Starting the Web-based Switch Configuration Utility 1 Quick Start Switch Configuration 4 Interface Naming Conventions 5 Window Navigation 6 Chapter 2: Viewing Statistics 10 Viewing Ethernet Interfaces 10 Viewing Etherlike Statistics 12 Viewing GVRP Statistics 13 Viewing 802.1X EAP Statistics 14 Viewing TCAM Utilization 15 Managing RMON 17 Chapter 3: Managing System Logs 26 Setting System Log Settings 27 Setting Remote Logging Settings 28 Viewing Memory Logs 29 Chapter 4: Managing System Files 31 Types of System Files 31 Upgrade/Backup Firmware/Language 35 Selecting the Active Image 39 Downloading or Backing-up a Configuration or Log 40 Viewing Configuration Files Properties 43 Copying Configuration Files 44 DHCP Auto Configuration 45 Chapter 1: Stack Management 1 Overview 2 Cisco 500 Series Stackable Managed Switch Administration Guide 2

3 Contents Types of Units in Stack 3 Stack Mode 4 Stack Ports 8 Stack Topology 11 Unit ID Assignment 14 Master Selection Process 16 Stack Changes and Unit ID Assignment 17 Unit Failure in Stack 20 Software Auto Synchronization in Stack 27 Stack Configuration 27 Development Notes 30 Chapter 2: General Administrative Information 31 System Information 32 Switch Models 38 Console Settings (Autobaud Rate Support) 42 Rebooting the Switch 43 TCAM Allocation 44 Monitoring the Fan Status and Temperature 47 Defining Idle Session Timeout 48 Pinging a Host 49 Traceroute 50 Chapter 3: System Time 52 System Time Options 53 SNTP Modes 54 Configuring System Time 55 Chapter 4: Managing Device Diagnostics 64 Testing Copper Ports 64 Cisco 500 Series Stackable Managed Switch Administration Guide 3

4 Contents Displaying Optical Module Status 66 Configuring Port and VLAN Mirroring 67 Viewing CPU Utilization and Secure Core Technology 69 Chapter 5: Configuring Discovery 71 Configuring Bonjour Discovery 71 LLDP and CDP 74 Configuring LLDP 75 Configuring CDP 96 Chapter 6: Port Management 105 Configuring Ports 105 Setting Basic Port Configuration 106 Setting Community Names 110 Configuring Link Aggregation 110 Configuring Green Ethernet 118 Chapter 7: Smartports 125 Overview 126 What is a Smartport 127 Smartport Types 127 Smartport Macros 130 Macro Failure and the Reset Operation 132 How the Smartport Feature Works 133 Auto Smartport 133 Error Handling 137 Default Configuration 137 Relationships with Other Features and Backwards Compatibility 138 Common Smartport Tasks 138 Web GUI 140 Cisco 500 Series Stackable Managed Switch Administration Guide 4

5 Contents Built-in Smartport Macros 146 Chapter 8: Managing Power-over-Ethernet Devices 169 PoE on the Switch 169 Configuring PoE Properties 171 Configuring the PoE Power, Priority, and Class 172 Chapter 9: VLAN Management 176 VLANs 176 Configuring Default VLAN Settings 180 Creating VLANs 181 Configuring VLAN Interface Settings 183 Defining VLAN Membership 184 GVRP Settings 188 VLAN Groups 189 Voice VLAN 194 Access Port Multicast TV VLAN 207 Customer Port Multicast TV VLAN 210 Chapter 10: Configuring the Spanning Tree Protocol 213 STP Flavors 213 Configuring STP Status and Global Settings 215 Defining Spanning Tree Interface Settings 217 Configuring Rapid Spanning Tree Settings 219 Multiple Spanning Tree 221 Defining MSTP Properties 222 Mapping VLANs to a MSTP Instance 223 Defining MSTP Instance Settings 224 Defining MSTP Interface Settings 225 Cisco 500 Series Stackable Managed Switch Administration Guide 5

6 Contents Chapter 11: Managing MAC Address Tables 228 Configuring Static MAC Addresses 229 Managing Dynamic MAC Addresses 229 Defining Reserved MAC Addresses 231 Chapter 12: Configuring Multicast Forwarding 232 Multicast Forwarding 232 Defining Multicast Properties 235 Adding MAC Group Address 237 Adding IP Multicast Group Addresses 239 Configuring IGMP Snooping 241 MLD Snooping 245 Querying IGMP/MLD IP Multicast Group 248 Defining Multicast Router Ports 249 Defining Forward All Multicast 250 Defining Unregistered Multicast Settings 251 Chapter 13: Configuring IP Information 252 Management and IP Interfaces 252 Defining IPv4 Routes 270 Configuring ARP 271 Enabling ARP Proxy 273 Defining UDP Relay 274 Domain Name Systems 274 Chapter 14: Configuring Security 278 Defining Users 280 Configuring TACACS+ 283 Configuring RADIUS 285 Key Management 287 Cisco 500 Series Stackable Managed Switch Administration Guide 6

7 Contents Configuring Management Access Authentication 288 Defining Management Access Method 289 Configuring TCP/UDP Services 295 Defining Storm Control 296 Configuring Port Security 298 Configuring 802.1X 300 Denial of Service Prevention 313 IP Source Guard 319 Dynamic ARP Inspection 324 Chapter 15: Using the SSH Client Feature 330 Secure Copy (SCP) and SSH 330 Protection Methods 331 SSH Server Authentication 333 SSH Client Authentication 334 Default Settings and Configuration 335 Before You Begin 336 Common Tasks 336 SSH Client Configuration 338 SSH Client Activation 340 Chapter 16: Using the SSH Server Feature 341 Overview 341 Default Settings 342 Common Tasks 342 SSH Server Configuration Pages 343 Chapter 17: Using the SSL Feature 345 SSL Overview 345 Default Settings and Configuration 346 Cisco 500 Series Stackable Managed Switch Administration Guide 7

8 Contents SSL Server Authentication Settings 346 Chapter 18: Secure Sensitive Data 349 Introduction to the SSD Feature 350 SSD Management 350 SSD Properties 355 Configuration Files 356 Encryption of Sensitive Data 363 SSD Management Channels 365 Menu CLI and Password Recovery 366 Configuring SSD Chapter 19: Configuring DHCP 369 DHCP Snooping 369 DHCP Relay 370 Option Interactions Between DHCP Snooping, DHCP Relay and Option DHCP Snooping Binding Database 376 DHCP Configuration 380 Chapter 20: Access Control 383 Access Control Lists 384 Defining MAC-based ACLs 386 IPv4-based ACLs 388 IPv6-Based ACLs 393 Defining ACL Binding 396 Chapter 21: Configuring Quality of Service 398 QoS Features and Components 399 Cisco 500 Series Stackable Managed Switch Administration Guide 8

9 Contents Configuring QoS - General 402 QoS Basic Mode 413 QoS Advanced Mode 415 Managing QoS Statistics 427 Chapter 22: Configuring SNMP 431 SNMP Versions and Workflow 431 Model OIDs 435 SNMP Engine ID 437 Configuring SNMP Views 438 Creating SNMP Groups 439 Managing SNMP Users 441 Defining SNMP Communities 443 Defining Trap Settings 445 Notification Recipients 446 SNMP Notification Filters 449 Chapter 23: VRRP 451 Overview 451 Basic Terms 454 Configurable Elements of VRRP 455 Constraints and Interactions with Other Features 460 Configuring VRRP With CLI Commands 461 Configuring VRRP Through Web GUI 463 Chapter 24: RIP 466 Overview 466 Limitations and Constraints 467 How the RIP Protocol Works 468 How RIP Operates on the Device 472 Cisco 500 Series Stackable Managed Switch Administration Guide 9

10 Contents Configuring RIP With CLI Commands 478 Configuring RIP Through the WEB GUI 485 How to Configure RIP - an Example 494 Cisco 500 Series Stackable Managed Switch Administration Guide 10

11 1 Getting Started This section provides an introduction to the web-based configuration utility, and covers the following topics: Starting the Web-based Switch Configuration Utility Quick Start Switch Configuration Interface Naming Conventions Differences Between Sx500 and SG500X Devices Window Navigation Starting the Web-based Switch Configuration Utility This section describes how to navigate the web-based switch configuration utility. If you are using a pop-up blocker, make sure it is disabled. Browsers have the following restrictions: If you are using older versions of Internet Explorer, you cannot directly use an IPv6 address to access the switch. You can, however, use the DNS (Domain Name System) server to create a domain name that contains the IPv6 address, and then use that domain name in the address bar in place of the IPv6 address. If you have multiple IPv6 interfaces on your management station, use the IPv6 global address instead of the IPv6 link local address to access the switch from your browser. Cisco 500 Series Stackable Managed Switch Administration Guide 11

12 Getting Started Starting the Web-based Switch Configuration Utility 1 Launching the Configuration Utility To open the web-based configuration utility: STEP 1 STEP 2 NOTE Open a Web browser. Enter the IP address of the switch you are configuring in the address bar on the browser, and then press Enter. The Login page opens. When the switch is using the factory default IP address of , its power LED flashes continuously. When the switch is using a DHCP assigned IP address or an administrator-configured static IP address, the power LED is on solid. Logging In The default username is cisco and the default password is cisco. The first time that you log in with the default username and password, you are required to enter a new password. NOTE If you have not previously selected a language for the GUI, the language of the Login page is determined by the language(s) requested by your browser and the languages configured on your switch. If your browser requests Chinese, for example, and Chinese has been loaded into your switch, the Login page is automatically displayed in Chinese. If Chinese has not been loaded into your switch, the Login page is displayed in English. The languages loaded into the switch have a language and country code (en-us, en-gb and so on). For the Login page to be automatically displayed in a particular language, based on the browser request, both the language and country code of the browser request must match those of the language loaded on the switch. If the browser request contains only the language code without a country code (for example: fr). The first embedded language with a matching language code is taken (without matching the country code, for example: fr_ca). To log in to the device configuration utility: STEP 1 STEP 2 Enter the username/password. The password can contain up to 64 ASCII characters. Password-complexity rules are described in the Setting Password Complexity Rules section of the Configuring Security chapter. If you are not using English, select the desired language from the Language dropdown menu. To add a new language to the switch or update a current one, refer to the Upgrade/Backup Firmware/Language section. Cisco 500 Series Stackable Managed Switch Administration Guide 12

13 Getting Started Starting the Web-based Switch Configuration Utility 1 STEP 3 STEP 4 STEP 5 If this is the first time that you logged on with the default user ID (cisco) and the default password (cisco) or your password has expired, the Change Password Page opens. See Password Expiration for additional information. Choose whether to select Disable Password Complexity Enforcement or not. For more information on password complexity, see the Setting Password Complexity Rules section. Enter the new password and click Apply. When the login attempt is successful, the Getting Started page opens. If you entered an incorrect username or password, an error message is displayed and the Login page remains displayed on the window. Select Don t show this page on startup to prevent the Getting Started page from being displayed each time that you log on to the system. If you select this option, the System Summary page is opened instead of the Getting Started page. HTTP/HTTPS You can either open an HTTP session (not secured) by clicking Log In, or you can open an HTTPS (secured) session, by clicking Secure Browsing (HTTPS). You are asked to approve the logon with a default RSA key, and an HTTPS session is opened. For information on how to configure HTTPS, see SSL Server Authentication Settings. Password Expiration The New Password page is displayed: The first time you access the switch with the default username cisco and password cisco. This page forces you to replace the factory default password. When the password expires, this page forces you to select a new password. Cisco 500 Series Stackable Managed Switch Administration Guide 13

14 Getting Started Starting the Web-based Switch Configuration Utility 1 Logging Out By default, the application logs out after ten minutes of inactivity. You can change this default value as described in the Defining Idle Session Timeout section in the General Administrative Information and Operations chapter. CAUTION Unless the Running Configuration is copied to the Startup Configuration, rebooting the switch will remove all changes made since the last time the file was saved. Save the Running Configuration to the Startup Configuration before logging off to preserve any changes you made during this session. A flashing red X icon to the left of the Save application link indicates that Running Configuration changes have not yet been saved to the Startup Configuration file. The flashing can be disabled by clicking on the Disable Save Icon Blinking button on the Copy/Save Configuration page When the switch auto-discovers a device, such as an IP phone (see Chapter 11, What is a Smartport ), and it configures the port appropriately for the device. These configuration commands are written to the Running Configuration file. This causes the Save icon to begin blinking when the you log on even though you did not make any configuration changes. When you click Save, the Copy/Save Configuration page is displayed. Save the Running Configuration file by copying it to the Startup Configuration file. After this save, the red X icon and the Save application link are no longer displayed. To logout, click Logout in the top right corner of any page. The system logs out of the switch. When a timeout occurs or you intentionally log out of the system, a message is displayed and the Login page opens, with a message indicating the logged-out state. After you log in, the application returns to the initial page. The initial page displayed depends on the Do not show this page on startup option in the Getting Started page. If you did not select this option, the initial page is the Getting Started page. If you did select this option, the initial page is the System Summary page. Cisco 500 Series Stackable Managed Switch Administration Guide 14

15 Getting Started Quick Start Switch Configuration 1 Quick Start Switch Configuration To simplify switch configuration through quick navigation, the Getting Started page provides links to the most commonly used pages. Links on the Getting Started page Category Link Name (on the Page) Linked Page Initial Setup Change System Mode and Stack Management Change Management Applications and Services Change Device IP Address Create VLAN Configure Port Settings System Mode and Stack Management page TCP/UDP Services page IPv4 Interface page Create VLAN page Port Setting page Device Status System Summary System Summary page Port Statistics RMON Statistics View Log interface page Statistics page RAM Memory page Quick Access Change Device Password User Accounts page Upgrade Device Software Backup Device Configuration Create MAC Based ACL Create IP Based ACL Configure QoS Configure Port Mirroring Upgrade/Backup Firmware/ Language page Download/Backup Configuration/Log page MAC Based ACL page IPv4 Based ACL page QoS Properties page Port and VLAN Mirroring page There are two hot links on the Getting Started page that take you to Cisco web pages for more information. Clicking on the Support link takes you to the switch product support page, and clicking on the Forums link takes you to the Small Business Support Community page. Cisco 500 Series Stackable Managed Switch Administration Guide 15

16 Getting Started Interface Naming Conventions 1 Interface Naming Conventions Within the GUI, interfaces are denoted by concatenating the following elements: Type of interface: The following types of interfaces are found on the various types of devices: - Fast Ethernet (10/100 bits) These are displayed as FE. - Gigabit Ethernet ports (10/100/1000 bits) These are displayed as GE. - Ten Gigabit Ethernet ports (10000 bits) These are displayed as XG. - LAG (Port Channel) These are displayed as LAG. - VLAN These are displayed as VLAN. - Tunnel These are displayed as Tunnel. Unit Number Unit in stack. In standalone models this is always 1. Slot Number The slot number is either 1 or 2. Slot number 1 identifies an SG500 or SG500X device. Slot number 2 identifies an SF500. Interface Number: Port, LAG, tunnel or VLAN ID Differences Between Sx500 and SG500X Devices This guide is relevant for both Sx500 and SG500X devices. Notes are provided when a feature is relevant for one but not both of these devices. The following summarizes the differences between these devices: The RIP and VRRP features are only supported on SG500X devices. TCAM size, see Viewing TCAM Utilization System mode. The Sx500 devices can be set to run in either Layer 2 or Layer 3 system modes. The SG500X devices always run in Layer 3 system mode. Stack ports are different on these devices. See Stack Ports. Port speed availability per cable types are different on these devices. See Cables Types. Cisco 500 Series Stackable Managed Switch Administration Guide 16

17 Getting Started Window Navigation 1 Enabling IPv4 routing is done differently in the two types of devices, as follows: - SG500X IPv4 routing must be enabled in the IPv4 Interface page. - Sx500 When the device is switched from Layer 2 to Layer 3 system mode, IPv4 routing is automatically enabled. Window Navigation This section describes the features of the web-based switch configuration utility. Application Header The Application Header is displayed on every page. It provides the following application links: Application Links Application Link Name Description A flashing red X icon displayed to the left of the Save application link indicates that Running Configuration changes have been made that have not yet been saved to the Startup Configuration file. The flashing of the red X can be disabled on the Copy/Save Configuration page. Click Save to display the Copy/Save Configuration page. Save the Running Configuration file by copying it to the Startup Configuration file type on the switch. After this save, the red X icon and the Save application link are no longer displayed. When the switch is rebooted, it copies the Startup Configuration file type to the Running Configuration and sets the switch parameters according to the data in the Running Configuration. Username Displays the name of the user logged on to the switch. The default username is cisco. (The default password is cisco). Cisco 500 Series Stackable Managed Switch Administration Guide 17

18 Getting Started Window Navigation 1 Application Links (Continued) Application Link Name Language Menu Description This menu provides the following options: Select a language: Select one of the languages that appear in the menu. This language will be the webbased configuration utility language. Download Language: Add a new language to the switch. Delete Language: Deletes the second language on the switch. The first language (English) cannot be deleted. Debug: Used for translation purposes. If you select this option, all web-based configuration utility labels disappear and in their place are the IDs of the strings that correspond to the IDs in the language file. NOTE To upgrade a language file, use the Upgrade/ Backup Firmware/Language page. Logout About Help Click to log out of the web-based switch configuration utility. Click to display the switch name and switch version number. Click to display the online help. The SYSLOG Alert Status icon is displayed when a SYSLOG message, above the critical severity level, is logged. Click the icon to open the RAM Memory page. After you access this page, the SYSLOG Alert Status icon is no longer displayed. To display the page when there is not an active SYSLOG message, Click Status and Statistics > View Log > RAM Memory. Cisco 500 Series Stackable Managed Switch Administration Guide 18

19 Getting Started Window Navigation 1 Management Buttons The following table describes the commonly-used buttons that appear on various pages in the system. Management Buttons Button Name Description Use the pull-down menu to configure the number of entries per page. Indicates a mandatory field. Add Apply Cancel Clear All Interfaces Counters Clear Interface Counters Clear Logs Clear Table Close Click to display the related Add page and add an entry to a table. Enter the information and click Apply to save it to the Running Configuration. Click Close to return to the main page. Click Save to display the Copy/Save Configuration page and save the Running Configuration to the Startup Configuration file type on the switch. Click to apply changes to the Running Configuration on the switch. If the switch is rebooted, the Running Configuration is lost, unless it is saved to the Startup Configuration file type or another file type. Click Save to display the Copy/ Save Configuration page and save the Running Configuration to the Startup Configuration file type on the switch. Click to reset changes made on the page. Click to clear the statistic counters for all interfaces. Click to clear the statistic counters for the selected interface. Clears log files. Clears table entries. Returns to main page. If any changes were not applied to the Running Configuration, a message is displayed. Cisco 500 Series Stackable Managed Switch Administration Guide 19

20 Getting Started Window Navigation 1 Management Buttons (Continued) Button Name Copy Settings Description A table typically contains one or more entries containing configuration settings. Instead of modifying each entry individually, it is possible to modify one entry and then copy the selected entry to multiple entries, as described below: 1. Select the entry to be copied. Click Copy Settings to display the popup. 2. Enter the destination entry numbers in the to field. 3. Click Apply to save the changes and click Close to return to the main page. Delete Details Edit After selecting an entry in the table, click Delete to remove. Click to display the details associated with the entry selected. Select the entry and click Edit. The Edit page opens, and the entry can be modified. 1. Click Apply to save the changes to the Running Configuration. 2. Click Close to return to the main page. Go Test Enter the query filtering criteria and click Go. The results are displayed on the page. Click Test to perform the related tests. Cisco 500 Series Stackable Managed Switch Administration Guide 20

21 2 Viewing Statistics This section describes how to view switch statistics. It covers the following topics: Viewing Ethernet Interfaces Viewing Etherlike Statistics Viewing GVRP Statistics Viewing 802.1X EAP Statistics Viewing TCAM Utilization Managing RMON Viewing Ethernet Interfaces The Interface page displays traffic statistics per port. The refresh rate of the information can be selected. This page is useful for analyzing the amount of traffic that is both sent and received and its dispersion (Unicast, Multicast, and Broadcast). To display Ethernet statistics and/or set the refresh rate: STEP 1 STEP 2 Click Status and Statistics > Interface. The Interface page is displayed. Enter the parameters. Interface Select the type of interface and specific interface for which Ethernet statistics are to be displayed. Refresh Rate Select the time period that passes before the interface Ethernet statistics are refreshed. The available options are: - No Refresh Statistics are not refreshed. Cisco 500 Series Stackable Managed Switch Administration Guide 21

22 Viewing Statistics Viewing Etherlike Statistics 2-15 Sec Statistics are refreshed every 15 seconds Sec Statistics are refreshed every 30 seconds Sec Statistics are refreshed every 60 seconds. The Receive Statistics area displays information about incoming packets. Total Bytes (Octets) Octets received, including bad packets and FCS octets, but excluding framing bits. Unicast Packets Good Unicast packets received. Multicast Packets Good Multicast packets received. Broadcast Packets Good Broadcast packets received. Packets with Errors Packets with errors received. The Transmit Statistics area displays information about outgoing packets. Total Bytes (Octets) Octets transmitted, including bad packets and FCS octets, but excluding framing bits. Unicast Packets Good Unicast packets transmitted. Multicast Packets Good Multicast packets transmitted. Broadcast Packets Good Broadcast packets transmitted. To clear statistics counters: Click Clear Interface Counters to clear counters for the interface displayed. Click Clear All Interface Counters to clear counters for all interfaces. Viewing Etherlike Statistics The Etherlike page displays statistics per port according to the Etherlike MIB standard definition. The refresh rate of the information can be selected. This page provides more detailed information regarding errors in the physical layer (Layer 1), which might disrupt traffic. To view Etherlike Statistics and/or set the refresh rate: Cisco 500 Series Stackable Managed Switch Administration Guide 22

23 Viewing Statistics Viewing Etherlike Statistics 2 STEP 1 STEP 2 Click Status and Statistics > Etherlike. The Etherlike page is displayed. Enter the parameters. Interface Select the type of interface and specific interface for which Ethernet statistics are to be displayed. Refresh Rate Select the amount of time that passes before the Etherlike statistics are refreshed. The fields are displayed for the selected interface. Frame Check Sequence (FCS) Errors Received frames that failed the CRC (cyclic redundancy checks). Single Collision Frames Frames that were involved in a single collision, but were successfully transmitted. Late Collisions Collisions that have been detected after the first 512 bits of data. Excessive Collisions Number of transmissions rejected due to excessive collisions. Oversize Packets Packets greater than 2000 octets received. Internal MAC Receive Errors Frames rejected because of receiver errors. Pause Frames Received Received flow control pause frames. Pause Frames Transmitted Flow control pause frames transmitted from the selected interface. To clear statistics counters: Click Clear Interface Counters to clear the selected interface s counters. Click Clear All Interface Counters to clear the counters of all interfaces. Cisco 500 Series Stackable Managed Switch Administration Guide 23

24 Viewing Statistics Viewing GVRP Statistics 2 Viewing GVRP Statistics The GVRP page displays information regarding GARP VLAN Registration Protocol (GVRP) frames that were sent or received from a port. GVRP is a standards-based Layer 2 network protocol, for automatic configuration of VLAN information on switches. It was defined in the 802.1ak amendment to 802.1Q GVRP statistics for a port are only displayed if GVRP is enabled globally and on the port. See the GVRP page. To view GVRP statistics and/or set the refresh rate: STEP 1 STEP 2 Click Status and Statistics > GVRP. The GVRP page is displayed. Enter the parameters. Interface Select the specific interface for which GVRP statistics are to be displayed. Refresh Rate Select the time period that passes before the GVRP statistics page is refreshed. The Attribute Counter block displays the counters for various types of packets per interface. Join Empty Number of GVRP Join Empty packets received/transmitted. Empty Number of GVRP empty packets received/transmitted. Leave Empty Number of GVRP Leave Empty packets received/ transmitted. Join In Number of GVRP Join In packets received/transmitted. Leave In Number of GVRP Leave In packets received/transmitted. Leave All Number of GVRP Leave All packets received/transmitted. The GVRP Error Statistics section displays the GVRP error counters. Invalid Protocol ID Invalid protocol ID errors. Invalid Attribute Type Invalid attribute ID errors. Invalid Attribute Value Invalid attribute value errors. Invalid Attribute Length Invalid attribute length errors. Invalid Event Invalid events. Cisco 500 Series Stackable Managed Switch Administration Guide 24

25 Viewing Statistics Viewing 802.1X EAP Statistics 2 To clear statistics counters: Click Clear Interface Counters to clear the selected counters. Click Clear All Interface Counters to clear the counters of all interfaces. Viewing 802.1X EAP Statistics The 802.1x EAP page displays detailed information regarding the EAP (Extensible Authentication Protocol) frames that were sent or received. To configure the 802.1X feature, see the 802.1X Properties page. To view the EAP Statistics and/or set the refresh rate: STEP 1 STEP 2 STEP 3 Click Status and Statistics > 802.1x EAP. The 802.1x EAP page is displayed. Select the Interface that is polled for statistics. Select the time period (Refresh Rate) that passes before the EAP statistics are refreshed. The values are displayed for the selected interface. EAPOL Frames Received Valid EAPOL frames received on the port. EAPOL Frames Transmitted Valid EAPOL frames transmitted by the port. EAPOL Start Frames Received EAPOL Start frames received on the port. EAPOL Logoff Frames Received EAPOL Logoff frames received on the port. EAP Response/ID Frames Received EAP Resp/ID frames received on the port. EAP Response Frames Received EAP Response frames received by the port (other than Resp/ID frames). EAP Request/ID Frames Transmitted EAP Req/ID frames transmitted by the port. EAP Request Frames Transmitted EAP Request frames transmitted by the port. Cisco 500 Series Stackable Managed Switch Administration Guide 25

26 Viewing Statistics Viewing TCAM Utilization 2 Invalid EAPOL Frames Received Unrecognized EAPOL frames received on this port. EAP Length Error Frames Received EAPOL frames with an invalid Packet Body Length received on this port. Last EAPOL Frame Version Protocol version number attached to the most recently received EAPOL frame. Last EAPOL Frame Source Source MAC address attached to the most recently received EAPOL frame. To clear statistics counters: Click Clear Interface Counters to clear the selected interface s counters. Click Clear All Interface Counters to clear the counters of all interfaces. Viewing TCAM Utilization The switch architecture uses a TCAM (Ternary Content Addressable Memory) to support packet actions in wire speed. TCAM holds the rules produced by other applications, such as ACLs (Access Control Lists) and Quality of Service (QoS) and user-created rules. The maximum number of TCAM rules that can be allocated by all applications on the device is 512 Some applications allocate rules upon their initiation. Additionally, processes that initialize during system boot use some of their rules during the startup process. To view TCAM utilization, click Status and Statistics > TCAM Utilization. The TCAM Utilization page is displayed, showing the percentage of TCAM utilization per system and per stack unit. TCAM Rules To view how the allocation among various processes can be changed (for the 500 series), see the TCAM Allocation section. Cisco 500 Series Stackable Managed Switch Administration Guide 26

27 Viewing Statistics Managing RMON 2 Managing RMON RMON (Remote Networking Monitoring) is an SNMP specification that enables an SNMP agent in the switch to proactively monitor traffic statistics over a given period and send traps to an SNMP manager. The local SNMP agent compares actual, real-time counters against predefined thresholds and generates alarms, without the need for polling by a central SNMP management platform. This is an effective mechanism for proactive management, provided that you have the correct thresholds set relative to your network s base line. RMON decreases the traffic between the manager and the switch because the SNMP manager does not have to poll the switch frequently for information, and enables the manager to get timely status reports, because the switch reports events as they occur. With this feature, you can perform the following actions: View the current statistics (since the counter values were cleared). You can also collect the values of these counters over a period of time, and then view the table of collected data, where each collected set is a single line of the History tab. Define interesting changes in counter values, such as reached a certain number of late collisions (defines the alarm), and then specify what action to perform when this event occurs (log, trap, or log and trap). Viewing RMON Statistics The Statistics page displays detailed information regarding packet sizes and information regarding physical layer errors. The information displayed is according to the RMON standard. An oversized packet is defined as an Ethernet frame with the following criteria: Packet length is greater than MRU byte size. Collision event has not been detected. Late collision event has not been detected. Received (Rx) error event has not been detected. Packet has a valid CRC. Cisco 500 Series Stackable Managed Switch Administration Guide 27

28 Viewing Statistics Managing RMON 2 To view RMON statistics and/or set the refresh rate: STEP 1 STEP 2 STEP 3 Click Status and Statistics > RMON > Statistics. The Statistics page is displayed. Select the Interface for which Ethernet statistics are to be displayed. Select the Refresh Rate, the time period that passes before the interface statistics are refreshed. The statistics are displayed for the selected interface. Bytes Received Number of octets received, including bad packets and FCS octets, but excluding framing bits. Drop Events Number of packets dropped. Packets Received Number of good packets received, including Multicast and Broadcast packets. Broadcast Packets Received Number of good Broadcast packets received. This number does not include Multicast packets. Multicast Packets Received Number of good Multicast packets received. CRC & Align Errors Number of CRC and Align errors that have occurred. Undersize Packets Number of undersized packets (less than 64 octets) received. Oversize Packets Number of oversized packets (over 2000 octets) received. Fragments Number of fragments (packets with less than 64 octets, excluding framing bits, but including FCS octets) received. Jabbers Total number received packets that were longer than 1632 octets. This number excludes frame bits, but includes FCS octets that had either a bad FCS (Frame Check Sequence) with an integral number of octets (FCS Error) or a bad FCS with a non-integral octet (Alignment Error) number. A Jabber packet is defined as an Ethernet frame that satisfies the following criteria: - Packet data length is greater than MRU. - Packet has an invalid CRC. - Received (Rx) Error Event has not been detected. Cisco 500 Series Stackable Managed Switch Administration Guide 28

29 Viewing Statistics Managing RMON 2 Collisions Number of collisions received. If Jumbo Frames are enabled, the threshold of Jabber Frames is raised to the maximum size of Jumbo Frames. Frames of 64 Bytes Number of frames, containing 64 bytes that were received. Frames of 65 to 127 Bytes Number of frames, containing bytes that were received. Frames of 128 to 255 Bytes Number of frames, containing bytes that were received. Frames of 256 to 511 Bytes Number of frames, containing bytes that were received. Frames of 512 to 1023 Bytes Number of frames, containing bytes that were received. Frames greater than 1024 Bytes Number of frames, containing bytes, and Jumbo Frames, that were received. To clear statistics counters: Click Clear Interface Counters to clear the selected interface s counters. Click Clear All Interface Counters to clear the counters of all interfaces. Configuring RMON History The RMON feature enables monitoring statistics per interface. The History Control Table page defines the sampling frequency, amount of samples to store and the port from where to gather the data. After the data is sampled and stored, it is displayed in the History Table page that can be viewed by clicking History Table. To enter RMON control information: STEP 1 Click Status and Statistics > RMON > History. The History Control Table page is displayed. The fields displayed on this page are defined in the Add RMON History Cisco 500 Series Stackable Managed Switch Administration Guide 29

30 Viewing Statistics Managing RMON 2 page, below. The only field is that is on this page and not defined in the Add page is: Current Number of Samples RMON is allowed by standard to not grant all requested samples, but rather to limit the number of samples per request. Therefore, this field represents the sample number actually granted to the request that is equal or less than the requested value. STEP 2 STEP 3 Click Add. The Add RMON History page is displayed. Enter the parameters. New History Entry Displays the number of the new History table entry. Source Interface Select the type of interface from which the history samples are to be taken. Max No. of Samples to Keep Enter the number of samples to store. Sampling Interval Enter the time in seconds that samples are collected from the ports. The field range is Owner Enter the RMON station or user that requested the RMON information. STEP 4 STEP 5 Click Apply. The entry is added to the History Control Table page, and the Running Configuration file is updated. Click History Table to view the actual statistics. Viewing the RMON History Table The History Table page displays interface-specific statistical network samplings. The samples were configured in the History Control table described above. To view RMON history statistics: STEP 1 STEP 2 STEP 3 STEP 4 Click Status and Statistics > RMON > History. The History page is displayed. Click History Table. The History Control Table page is displayed. Click History Table to go to the History Table page. From the History Entry No. list, select the entry number of the sample to display. Cisco 500 Series Stackable Managed Switch Administration Guide 30

31 Viewing Statistics Managing RMON 2 The fields are displayed for the selected sample. Owner History table entry owner. Sample No. Statistics were taken from this sample. Drop Events Dropped packets due to lack of network resources during the sampling interval. This may not represent the exact number of dropped packets, but rather the number of times dropped packets were detected. Bytes Received Octets received including bad packets and FCS octets, but excluding framing bits. Packets Received Packets received, including bad packets, Multicast, and Broadcast packets. Broadcast Packets Good Broadcast packets excluding Multicast packets. Multicast Packets Good Multicast packets received. CRC Align Errors CRC and Align errors that have occurred. Undersize Packets Undersized packets (less than 64 octets) received. Oversize Packets Oversized packets (over 2000 octets) received. Fragments Fragments (packets with less than 64 octets) received, excluding framing bits, but including FCS octets. Jabbers Total number of received packets that were longer than 2000 octets. This number excludes frame bits, but includes FCS octets that had either a bad FCS (Frame Check Sequence) with an integral number of octets (FCS Error) or a bad FCS with a non-integral octet (Alignment Error) number. Collisions Collisions received. Utilization Percentage of current interface traffic compared to maximum traffic that the interface can handle. Defining RMON Events Control You can control the occurrences that trigger an alarm and the type of notification that occurs. This is performed as follows: Events Page Configures what happens when an alarm is triggered. This can be any combination of logs and traps. Cisco 500 Series Stackable Managed Switch Administration Guide 31

32 Viewing Statistics Managing RMON 2 Alarms Page Configures the occurrences that trigger an alarm. To define RMON events: STEP 1 Click Status and Statistics > RMON > Events. The Events page is displayed. This page displays previously defined events. STEP 2 STEP 3 Click Add. The Add RMON Events page is displayed. Enter the parameters. Event Entry Displays the event entry index number for the new entry. Community Enter the SNMP community string to be included when traps are sent (optional). Description Enter a name for the event. This name is used in the Add RMON Alarm page to attach an alarm to an event. Notification Type Select the type of action that results from this event. Values are: - None No action occurs when the alarm goes off. - Log (Event Log Table) Add a log entry to the Event Log table when the alarm is triggered. - Trap (SNMP Manager and SYSLOG Server) Send a trap to the remote log server when the alarm goes off. - Log and Trap Add a log entry to the Event Log table and send a trap to the remote log server when the alarm goes off. Time The time of the event. (This is a read-only table in the parent window and cannot be defined). Owner Enter the device or user that defined the event. STEP 4 STEP 5 Click Apply. The RMON event is written to the Running Configuration file. Click Event Log Table to display the log of alarms that have occurred and that have been logged (see description below). Cisco 500 Series Stackable Managed Switch Administration Guide 32

33 Viewing Statistics Managing RMON 2 Viewing the RMON Events Logs The Event Log Table page displays the log of events (actions) that occurred. Twotypes of events can be logged: Log or Log and Trap. The action in the event is performed when the event is bound to an alarm (see the Alarms page) and the conditions of the alarm have occurred. STEP 1 STEP 2 Click Status and Statistics > RMON > Events. The Events page is displayed. Click Event Log Table. The Event Log Table page is displayed. This page displays the following fields: Event Entry No. Event s log entry number. Log No. Log number (within the event). Log Time Time that the log entry was entered. Description Description of event that triggered the alarm. Defining RMON Alarms RMON alarms provide a mechanism for setting thresholds and sampling intervals to generate exception events on any counter or any other SNMP object counter maintained by the agent. Both the rising and falling thresholds must be configured in the alarm. After a rising threshold is crossed, no rising events are generated until the companion falling threshold is crossed. After a falling alarm is issued, the next alarm is issued when a rising threshold is crossed. One or more alarms are bound to an event, which indicates the action to be taken when the alarm occurs. The Alarms page provides the ability to configure alarms and to bind them with events. Alarm counters can be monitored by either absolute values or changes (delta) in the counter values. To enter RMON alarms: STEP 1 Click Status and Statistics > RMON > Alarms. The Alarms page is displayed. All previously-defined alarms are displayed. The fields are described in the Add Cisco 500 Series Stackable Managed Switch Administration Guide 33

34 Viewing Statistics Managing RMON 2 RMON Alarm page below. In addition to those fields, the following field is displayed: Counter Value Displays the value of the statistic during the last sampling period. STEP 2 STEP 3 Click Add. The Add RMON Alarm page is displayed. Enter the parameters. Alarm Entry Displays the alarm entry number. Interface Select the type of interface for which RMON statistics are displayed. Counter Name Select the MIB variable that indicates the type of occurrence measured. Sample Type Select the sampling method to generate an alarm. The options are: - Absolute If the threshold is crossed, an alarm is generated. - Delta Subtracts the last sampled value from the current value. The difference in the values is compared to the threshold. If the threshold was crossed, an alarm is generated. Rising Threshold Enter the value that triggers the rising threshold alarm. Rising Event Select an event to be performed when a rising event is triggered. Events are created in the Events page. Falling Threshold Enter the value that triggers the falling threshold alarm. Falling Event Select an event to be performed when a falling event is triggered. Startup Alarm Select the first event from which to start generation of alarms. Rising is defined by crossing the threshold from a low-value threshold to a higher-value threshold. - Rising Alarm A rising value triggers the rising threshold alarm. - Falling Alarm A falling value triggers the falling threshold alarm. - Rising and Falling Both rising and falling values trigger the alarm. Interval Enter the alarm interval time in seconds. Cisco 500 Series Stackable Managed Switch Administration Guide 34

35 Viewing Statistics Managing RMON 2 Owner Enter the name of the user or network management system that receives the alarm. STEP 4 Click Apply. The RMON alarm is written to the Running Configuration file. Cisco 500 Series Stackable Managed Switch Administration Guide 35

36 3 Managing System Logs This section describes the System Log feature, which enables the switch to generate several independent logs. Each log is a set of messages describing system events. The switch generates the following local logs: Log sent to the console interface. Log written into a cyclical list of logged events in the RAM and erased when the switch reboots. Log written to a cyclical log-file saved to the Flash memory and persists across reboots. In addition, you can send messages to remote SYSLOG servers in the form of SNMP traps and SYSLOG messages. This section covers the following sections: Setting System Log Settings Setting Remote Logging Settings Viewing Memory Logs Setting System Log Settings You can enable or disable logging on the Log Settings page, and select whether to aggregate log messages. You can select the events by severity level. Each log message has a severity level marked with the first letter of the severity level concatenated with a dash (-) on each side (except for Emergency that is indicated by the letter F). For example, the log message "%INIT-I-InitCompleted: " has a severity level of I, meaning Informational. Cisco 500 Series Stackable Managed Switch Administration Guide 36

37 Managing System Logs Setting System Log Settings 3 The event severity levels are listed from the highest severity to the lowest severity, as follows: Emergency System is not usable. Alert Action is needed. Critical System is in a critical condition. Error System is in error condition. Warning System warning has occurred. Notice System is functioning properly, but a system notice has occurred. Informational Device information. Debug Detailed information about an event. You can select different severity levels for RAM and Flash logs. These logs are displayed in the RAM Memory page and Flash Memory page, respectively. Selecting a severity level to be stored in a log causes all of the higher severity events to be automatically stored in the log. Lower severity events are not stored in the log. For example, if Warning is selected, all severity levels that are Warning and higher are stored in the log (Emergency, Alert, Critical, Error, and Warning). No events with severity level below Warning are stored (Notice, Informational, and Debug). To set global log parameters: STEP 1 STEP 2 Click Administration > System Log > Log Settings. The Log Settings page opens. Enter the parameters. Logging Select to enable message logging. Syslog Aggregator Select to enable the aggregation of SYSLOG messages and traps. If enabled, identical and contiguous SYSLOG messages and traps are aggregated over the specified Max Aggregation Time and sent in a single message. The aggregated messages are sent in the order of their arrival. Each message states the number of times it was aggregated. Max Aggregation Time Enter the interval of time that SYSLOG messages are aggregated. Cisco 500 Series Stackable Managed Switch Administration Guide 37

38 Managing System Logs Setting Remote Logging Settings 3 RAM Memory Logging Select the severity levels of the messages to be logged to the RAM. Flash Memory Logging Select the severity levels of the messages to be logged to the Flash memory. STEP 3 Click Apply. The Running Configuration file is updated. Setting Remote Logging Settings The Remote Log Servers page enables defining remote SYSLOG servers where log messages are sent (using the SYSLOG protocol). For each server, you can configure the severity of the messages that it receives. To define SYSLOG servers: STEP 1 Click Administration > System Log > Remote Log Servers. The Remote Log Servers page opens. This page displays the list of remote log servers. STEP 2 STEP 3 Click Add. The Add Remote Log Server page opens. Enter the parameters. Server Definition Select whether to identify the remote log server by IP address or name. IP Version Select the supported IP format. IPv6 Address Type Select the IPv6 address type (if IPv6 is used). The options are: - Link Local The IPv6 address uniquely identifies hosts on a single network link. A link local address has a prefix of FE80, is not routable, and can be used for communication only on the local network. Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. - Global The IPv6 address is a global Unicast IPV6 type that is visible and reachable from other networks. Link Local Interface Select the link local interface (if IPv6 Address Type Link Local is selected) from the list. Cisco 500 Series Stackable Managed Switch Administration Guide 38

39 Managing System Logs Viewing Memory Logs 3 Log Server IP Address/Name Enter the IP address or domain name of the log server. UDP Port Enter the UDP port to which the log messages are sent. Facility Select a facility value from which system logs are sent to the remote server. Only one facility value can be assigned to a server. If a second facility code is assigned, the first facility value is overridden. Description Enter a server description. Minimum Severity Select the minimum level of system log messages to be sent to the server. STEP 4 Click Apply. The Add Remote Log Server page closes, the SYSLOG server is added, and the Running Configuration file is updated. Viewing Memory Logs The switch can write to the following logs: Log in RAM (cleared during reboot). Log in Flash memory (cleared only upon user command). You can configure the messages that are written to each log by severity, and a message can go to more than one log, including logs that reside on external SYSLOG servers. RAM Memory The RAM Memory page displays all messages that were saved in the RAM (cache) in chronological order. Entries are stored in the RAM log according to the configuration in the Log Settings page. To view log entries, click Status and Statistics > View Log > RAM Memory. The RAM Memory page opens. The top of the page has a button that allows you to Disable Alert Icon Blinking. Click to toggle between disable and enable. This page displays the following fields: Cisco 500 Series Stackable Managed Switch Administration Guide 39

40 Managing System Logs Viewing Memory Logs 3 Log Index Log entry number. Log Time Time when message was generated. Severity Event severity. Description Message text describing the event. To clear the log messages, click Clear Logs. The messages are cleared. Flash Memory The Flash Memory page displays the messages that were stored in the Flash memory, in chronological order. The minimum severity for logging is configured in the Log Settings page. Flash logs remain when the switch is rebooted. You can clear the logs manually. To view the Flash logs, click Status and Statistics > View Log > Flash Memory. The Flash Memory page opens. This page displays the following fields: Log Index Log entry number. Log Time Time when message was generated. Severity Event severity. Description Message text describing the event. To clear the messages, click Clear Logs. The messages are cleared. Cisco 500 Series Stackable Managed Switch Administration Guide 40

41 4 Managing System Files This section describes how system files are managed. The following topics are covered: Types of System Files Upgrade/Backup Firmware/Language Selecting the Active Image Downloading or Backing-up a Configuration or Log Viewing Configuration Files Properties Copying Configuration Files DHCP Auto Configuration Types of System Files System files are files that contain configuration information, firmware images or boot code. Various actions can be performed with these files, such as: selecting the firmware file from which the switch boots, copying various types of configuration files internally on the switch, or copying files to or from an external device, such as an external server. The possible methods of file transfer are: Internal copy. HTTP/HTTPS that uses the facilities that the browser provides. TFTP/SCP client, requiring a TFTP/SCP server. Cisco 500 Series Stackable Managed Switch Administration Guide 41

42 Managing System Files Types of System Files 4 Configuration files on the switch are defined by their type, and contain the settings and parameter values for the device. When a configuration is referenced on the switch, it is referenced by its configuration file type (such as Startup Configuration or Running Configuration), as opposed to a file name that can be modified by the user. Content can be copied from one configuration file type to another, but the names of the file types cannot be changed by the user. Other files on the device include firmware, boot code, and log files, and are referred to as operational files. The configuration files are text files and can be edited in a text editor, such as Notepad after they are copied to an external device, such as a PC. Files and File Types The following types of configuration and operational files are found on the switch: Running Configuration Contains the parameters currently being used by the switch to operate. This is the only file type that is modified when you change parameter values on the device. If the switch is rebooted, the Running Configuration is lost. The Startup Configuration, stored in Flash, overwrites the Running Configuration, stored in RAM. To preserve any changes you made to the switch, you must save the Running Configuration to the Startup Configuration, or another file type. Startup Configuration The parameter values that were saved by copying another configuration (usually the Running Configuration) to the Startup Configuration. The Startup Configuration is retained in Flash and is preserved when the switch is rebooted. At this time, the Startup Configuration is copied to RAM and identified as the Running Configuration. Mirror Configuration A copy of the Startup Configuration, created by the switch when the following conditions exist: - The switch has been operating continuously for 24 hours. - No configuration changes have been made to the Running Configuration in the previous 24 hours. - The Startup Configuration is identical to the Running Configuration. Cisco 500 Series Stackable Managed Switch Administration Guide 42

43 Managing System Files Types of System Files 4 Only the system can copy the Startup Configuration to the Mirror Configuration. However, you can copy from the Mirror Configuration to other file types or to another device. The option of automatically copying the Running Configuration to the mirror configuration can be disabled in the Configuration Files Properties page. Backup Configuration A manual copy of a configuration file used for protection against system shutdown or for the maintenance of a specific operating state. You can copy the Mirror Configuration, Startup Configuration, or Running Configuration to a Backup Configuration file. The Backup Configuration exists in Flash and is preserved if the device is rebooted. Firmware The program that controls the operations and functionality of the switch. More commonly referred to as the image. Boot Code Controls the basic system startup and launches the firmware image. Language File The dictionary that enables the web-based configuration utility windows to be displayed in the selected language. Flash Log SYSLOG messages stored in Flash memory. File Actions The following actions can be performed to manage firmware and configuration files: Upgrade the firmware or boot code, or replace a second language, as described in Upgrade/Backup Firmware/Language section. View the firmware image currently in use or select the image to be used in the next reboot as described in the Selecting the Active Image section. Save configuration files on the switch to a location on another device as described in the Downloading or Backing-up a Configuration or Log section. Clear the Startup Configuration or Backup Configuration file types as described in the Viewing Configuration Files Properties section. Copy one configuration file type to another configuration file type as described in the Copying Configuration Files section. Enable automatically uploading a configuration file from a DHCP server to the switch, as described in the DHCP Auto Configuration section. Cisco 500 Series Stackable Managed Switch Administration Guide 43

44 Managing System Files Upgrade/Backup Firmware/Language 4 This section covers the following topics: Upgrade/Backup Firmware/Language Selecting the Active Image Downloading or Backing-up a Configuration or Log Viewing Configuration Files Properties Copying Configuration Files DHCP Auto Configuration Upgrade/Backup Firmware/Language The Upgrade/Backup Firmware/Language process can be used to: Upgrade or backup the firmware image. Upgrade or backup the boot code. Import or upgrade a second language file. The following methods for transferring files are supported: HTTP/HTTPS that uses the facilities provided by the browser TFTP that requires a TFTP server SCP that requires an SCP server If a new language file was loaded onto the switch, the new language can be selected from the drop-down menu. (It is not necessary to reboot the switch). All software images on the stack must be identical to ensure the proper operation of the stack. If a device is added to a stack and its software image is not identical to the master's software image, the master automatically loads the correct image to the new device. There are two different ways to update images across the stack: Image can be updated prior to connecting a unit to the stack. This is the recommended method. Upgrade master. The slave units are automatically updated. The following steps can be done from the CLI or from the web interface. Cisco 500 Series Stackable Managed Switch Administration Guide 44

45 Managing System Files Upgrade/Backup Firmware/Language 4 Copy image from TFTP/SCP server to master. Change active image on master. Reboot master. There are two firmware images stored on the switch. One of the images is identified as the active image and other image is identified as the inactive image. When you upgrade the firmware, the new image always replaces the image identified as the inactive image. Even after uploading new firmware on the switch, the switch continues to boot by using the active image (the old version) until you change the status of the new image to be the active image by using the procedure in the Selecting the Active Image section. Then boot the switch. NOTE If the switch is running in Native Stacking mode, the new firmware is pushed to all of the stack units. If there is a new switch joining the stack with a different firmware version, the master unit syncs the firmware version automatically with this newly joined unit. This occurs transparently, without any manual intervention. Upgrading/Backing Up Firmware or Language File To upgrade or backup a software image or language file: STEP 1 STEP 2 Click Administration > File Management > Upgrade/Backup Firmware/ Language. The Upgrade/Backup Firmware/Language page opens. Click the Transfer Method. Proceed as follows: If you selected TFTP, go to STEP 3. If you selected via HTTP/HTTPS, go to STEP 4. If you selected via SCP, go to STEP 5. STEP 3 If you selected via TFTP, enter the parameters as described in this step. Otherwise, skip to STEP 4. Select one of the following actions: Upgrade Save Action Specifies that the file type on the switch is to be replaced with a new version of that file type located on a TFTP server. Backup Save Action Specifies that a copy of the file type is to be saved to a file on another device. Cisco 500 Series Stackable Managed Switch Administration Guide 45

46 Managing System Files Upgrade/Backup Firmware/Language 4 Enter the following fields: File Type Select the destination file type. Only valid file types are shown. (The file types are described in the Files and File Types section). TFTP Server Definition Select whether to specify the TFTP server by IP address or domain name. IP Version Select whether an IPv4 or an IPv6 address is used. IPv6 Address Type Select the IPv6 address type (if IPv6 is used). The options are: - Link Local The IPv6 address uniquely identifies hosts on a single network link. A link local address has a prefix of FE80, is not routable, and can be used for communication only on the local network. Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. - Global The IPv6 address is a global Unicast IPV6 type that is visible and reachable from other networks. Link Local Interface Select the link local interface (if IPv6 is used) from the list. TFTP Server IP Address/Name Enter the IP address or the domain name of the TFTP server. (For Upgrade) Source File Name Enter the name of the source file. (For Backup) Destination File Name Enter the name of the backup file. STEP 4 If you selected via HTTP/HTTPS, you can only Upgrade. Enter the parameters as described in this step. File Type Select the configuration file type. Only valid file types can be selected. (The file types are described in the Files and File Types section). The following file types can be upgraded: - Firmware Image Select this to upgrade the firmware image. - Language Select this to upgrade the language file. File Name Click Browse to select a file or enter the path and source file name to be used in the transfer. STEP 5 If you selected via SCP (Over SSH), see Using the SSH Client Feature for instructions. Then, enter the following fields: (only unique fields are described, for non-unique fields, see the descriptions above) Cisco 500 Series Stackable Managed Switch Administration Guide 46

47 Managing System Files Upgrade/Backup Firmware/Language 4 Remote SSH Server Authentication To enable SSH server authentication (which is disabled by default), click Edit. This takes you to the SSH Server Authentication page to configure the SSH server, and return to this page. Use the SSH User Authentication page to select an SSH user authentication method (password or public/private key), set a username and password on the switch (if the password method is selected), and generate an RSA or DSA key if required. SSH Client Authentication Client authentication can be done in one of the following ways: Use SSH Client System Credentials Sets permanent SSH user credentials. Click System Credentials to go to the SSH User Authentication page where the user/password can be set once for all future use. Use SSH Client One-Time Credentials Enter the following: - Username Enter a username for this copy action. - Password Enter a password for this copy. NOTE The username and password for one-time credential will not saved in configuration file. SCP Server Definition Select whether to specify the SCP server by IP address or by domain name. IP Version Select whether an IPv4 or an IPv6 address is used. IPv6 Address Type Select the IPv6 address type (if used). The options are: - Link Local The IPv6 address uniquely identifies hosts on a single network link. A link local address has a prefix of FE80, is not routable, and can be used for communication only on the local network. Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. - Global The IPv6 address is a global Unicast IPv6 type that is visible and reachable from other networks. Link-Local Interface Select the link local interface from the list. SCP Server IP Address/Name Enter the IP address or domain name of the SCP server. (For Upgrade) Source File Name Enter the name of the source file. (For Backup) Destination File Name Enter the name of the backup file. Cisco 500 Series Stackable Managed Switch Administration Guide 47

48 Managing System Files Selecting the Active Image 4 STEP 6 Click Apply. If the files, passwords and server addresses are correct, one of the following may happen: If SSH server authentication is enabled (in the SSH Server Authentication page), and the SCP server is trusted, the operation succeeds. If the SCP server is not trusted, the operation fails and an error is displayed. If SSH server authentication is not enabled, the operation succeeds for any SCP server. Selecting the Active Image There are two firmware images stored on the switch. One of the images is identified as the active image and other image is identified as the inactive image. The switch boots from the image you set as the active image. You can change the image identified as the inactive image to the active image. (You can reboot the switch by using the process described in the Rebooting the Switch section). To select the active image: STEP 1 Click Administration > File Management > Active Image. The Active Image page opens. The page displays the following: Active Image Displays the image file that is currently active on the switch. Active Image Version Number Displays the firmware version of the active image. Active Image After Reboot Displays the image that is active after reboot. Active Image Version Number After Reboot Displays the firmware version of the active image as it be after reboot. STEP 2 STEP 3 Select the image from the Active Image After Reboot menu to identify the firmware image that is used as the active image after the switch is rebooted. The Active Image Version Number After Reboot displays the firmware version of the active image that is used after the switch is rebooted. Click Apply. The active image selection is updated. Cisco 500 Series Stackable Managed Switch Administration Guide 48

49 Managing System Files Downloading or Backing-up a Configuration or Log 4 Downloading or Backing-up a Configuration or Log The Download/Backup Configuration/Log page enables Backing up configuration files or logs from to switch to an external device. Restoring configuration files from an external device to the switch. NOTE If the device is working in Native Stacking mode, the configuration files are taken from the master unit. When restoring a configuration file to the Running Configuration, the imported file adds any configuration commands that did not exist in the old file and overwrites any parameter values in the existing configuration commands. When restoring a configuration file to the Startup Configuration or a backup configuration file, the new file replaces the previous file. When restoring to Startup Configuration, the switch must be rebooted for the restored Startup Configuration to be used as the Running Configuration. You can reboot the switch by using the process described in the Console Settings (Autobaud Rate Support) section. To backup or restore the system configuration file: STEP 1 STEP 2 Click Administration > File Management > Download/Backup Configuration/ Log. The Download/Backup Configuration/Log page opens. Select the Transfer Method. STEP 3 If you selected via TFTP, enter the parameters. Otherwise, skip to STEP 4. Select either Download or Backup as the Save Action. Download Save Action Specifies that the file on another device replaces a file type on the switch. Enter the following fields: a. Server Definition Select whether to specify the TFTP server by IP address or by domain name. b. IP Version Select whether an IPv4 or an IPv6 address is used. NOTE If the server is selected by name in the Server Definition, there is no need to select the IP Version related options. c. IPv6 Address Type Select the IPv6 address type (if used). The options are: Cisco 500 Series Stackable Managed Switch Administration Guide 49

50 Managing System Files Downloading or Backing-up a Configuration or Log 4 - Link Local The IPv6 address uniquely identifies hosts on a single network link. A link local address has a prefix of FE80, is not routable, and can be used for communication only on the local network. Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. - Global The IPv6 address is a global Unicast IPV6 type that is visible and reachable from other networks. d. Link-Local Interface Select the link local interface from the list. e. TFTP Server Enter the IP address of the TFTP server. f. Source File Name Enter the source file name. File names cannot contain slashes (\ or /), cannot start with a period (.), and must include between 1 and 160 characters. (Valid characters: A-Z, a-z, 0-9,., -, _ ). g. Destination File Type Enter the destination configuration file type. Only valid file types are displayed. (The file types are described in the Files and File Types section). Backup Save Action Specifies that a file type is to be copied to a file on another device. Enter the following fields: a. Server Definition Select whether to specify the TFTP server by IP address or by domain name. b. IP Version Select whether an IPv4 or an IPv6 address is used. c. IPv6 Address Type Select the IPv6 address type (if used). The options are: Link Local The IPv6 address uniquely identifies hosts on a single network link. A link local address has a prefix of FE80, is not routable, and can be used for communication only on the local network. Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. Global The IPv6 address is a global Unicast IPV6 type that is visible and reachable from other networks. d. Link-Local Interface Select the link local interface from the list. e. TFTP Server IP Address/Name Enter the IP address or domain name of the TFTP server. f. Source File Type Enter the source configuration file type. Only valid file types are displayed. (The file types are described in the Files and File Types section). Cisco 500 Series Stackable Managed Switch Administration Guide 50

51 Managing System Files Downloading or Backing-up a Configuration or Log 4 g. Sensitive Data Select how sensitive data should be included in the backup file. The following options are available: - Exclude Do not include sensitive data in the backup. - Encrypted Include sensitive data in the backup in its encrypted form. - Plaintext Include sensitive data in the backup in its plaintext form. NOTE The available sensitive data options are determined by the current user SSD rules. For details, refer to Secure Sensitive Data Management > SSD Rules page. h. Destination File Name Enter the destination file name. File names cannot contain slashes (\ or /), the leading letter of the file name must not be a period (.), and the file name must be between 1 and 160 characters. (Valid characters: A-Z, a-z, 0-9,., -, _ ). i. Click Apply. The file is upgraded or backed up. STEP 4 If you selected via HTTP/HTTPS, enter the parameters as described in this step. Select the Save Action. If Save Action is Download (replacing the file on the switch with a new version from another device), do the following. Otherwise, go to the next procedure in this step. a. Source File Name Click Browse to select a file or enter the path and source file name to be used in the transfer. b. Destination File Type Select the configuration file type. Only valid file types are displayed. (The file types are described in the Files and File Types section). c. Click Apply. The file is transferred from the other device to the switch. If Save Action is Backup (copying a file to another device), do the following: a. Source File Type Select the configuration file type. Only valid file types are displayed. (The file types are described in the Files and File Types section). b. Sensitive Data Select how sensitive data should be included in the backup file. The following options are available: - Exclude Do not include sensitive data in the backup. - Encrypted Include sensitive data in the backup in its encrypted form. - Plaintext Include sensitive data in the backup in its plaintext form. Cisco 500 Series Stackable Managed Switch Administration Guide 51

52 Managing System Files Downloading or Backing-up a Configuration or Log 4 NOTE The available sensitive data options are determined by the current user SSD rules. For details, refer to Secure Sensitive Data Management > SSD Rules page. c. Click Apply. The file is upgraded or backed up. STEP 5 If you selected via SCP (Over SSH), see Using the SSH Client Feature for instructions. Then enter the following fields: Remote SSH Server Authentication To enable SSH server authentication (it is disabled by default), click Edit, which takes you to the SSH Server Authentication page to configure this, and return to this page. Use the SSH Server Authentication page to select an SSH user authentication method (password or public/private key), set a username and password on the switch, if the password method is selected, and generate an RSA or DSA key if required. SSH Client Authentication Client authentication can be done in one of the following ways: Use SSH Client Sets permanent SSH user credentials. Click System Credentials to go to the SSH User Authentication page where the user/ password can be set once for all future use. Use SSH Client One-Time Credentials Enter the following: - Username Enter a username for this copy action. - Password Enter a password for this copy. SCP Server Definition Select whether to specify the TFTP server by IP address or by domain name. IP Version Select whether an IPv4 or an IPv6 address is used. IPv6 Address Type Select the IPv6 address type (if used). The options are: - Link Local The IPv6 address uniquely identifies hosts on a single network link. A link local address has a prefix of FE80, is not routable, and can be used for communication only on the local network. Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. - Global The IPv6 address is a global Unicast IPV6 type that is visible and reachable from other networks. Link-Local Interface Select the link local interface from the list. Cisco 500 Series Stackable Managed Switch Administration Guide 52

53 Managing System Files Viewing Configuration Files Properties 4 SCP Server IP Address/Name Enter the IP address or domain name of the TFTP server. If Save Action is Download (replacing the file on the switch with a new version from another device), enter the following fields. Source File Name Enter the name of the source file. Destination File Type Select the configuration file type. Only valid file types are displayed. (The file types are described in the Files and File Types section). If Save Action is Backup (copying a file to another device), enter the following fields (in addition to those fields listed above): Source File Type Select the configuration file type. Only valid file types are displayed. (The file types are described in the Files and File Types section). Sensitive Data Select how sensitive data should be included in the backup file. The following options are available: - Exclude Do not include sensitive data in the backup. - Encrypted Include sensitive data in the backup in its encrypted form. - Plaintext Include sensitive data in the backup in its plaintext form. NOTE The available sensitive data options are determined by the current user SSD rules. For details, refer to Secure Sensitive Data Management > SSD Rules page. Destination File Name Name of file being copied to. STEP 6 Click Apply. The file is upgraded or backed up. Viewing Configuration Files Properties The Configuration Files Properties page allows you to see when various system configuration files were created. It also enables deleting the Startup Configuration and Backup Configuration files. You cannot delete the other configuration file types. Cisco 500 Series Stackable Managed Switch Administration Guide 53

54 Managing System Files Copying Configuration Files 4 NOTE If the device is working in stack mode, the configuration files are taken from the master unit. To set whether mirror configuration files will be created, clear configuration files and see when configuration files were created: STEP 1 STEP 2 STEP 3 Click Administration > File Management > Configuration Files Properties. The Configuration Files Properties page opens. If required, disable Auto Mirror Configuration. This disables the automatic creation of mirror configuration files. When disabling this feature, the mirror configuration file, if it exists, is deleted. See Types of System Files for a description of mirror files and why you might not want to automatically create mirror configuration files. If required, select either the Startup Configuration, Backup Configuration or both and click Clear Files to delete these files. This page provides the following fields: Configuration File Name Displays the type of file. Creation Time Displays the date and time that file was modified. Copying Configuration Files When you click Apply on any window, changes that you made to the switch configuration settings are stored only in the Running Configuration. To preserve the parameters in the Running Configuration, the Running Configuration must be copied to another configuration type or saved on another device. CAUTION Unless the Running Configuration is copied to the Startup Configuration or another configuration file, all changes made since the last time the file was copied are lost when the switch is rebooted. Cisco 500 Series Stackable Managed Switch Administration Guide 54

55 Managing System Files Copying Configuration Files 4 The following combinations of copying internal file types are allowed: From the Running Configuration to the Startup Configuration or Backup Configuration. From the Startup Configuration to the Backup Configuration. From the Backup Configuration to the Startup Configuration. From the Mirror Configuration to the Startup Configuration or Backup Configuration. To copy one type of configuration file to another type of configuration file: STEP 1 STEP 2 STEP 3 Click Administration > File Management > Copy/Save Configuration. The Copy/ Save Configuration page opens. Select the Source File Name to be copied. Only valid file types are displayed (described in the Files and File Types section). Select the Destination File Name to be overwritten by the source file. If you are backing up a configuration file, select one of the following formats for the backup file. - Exclude Sensitive data is not included in the backup file. - Encrypted Sensitive data is included in the backup file in encrypted form. - Plaintext Sensitive data is included in the backup file in plain text. NOTE The available sensitive data options are determined by the current user SSD rules. For details, refer to Secure Sensitive Data Management > SSD Rules page. STEP 4 STEP 5 The Save Icon Blinking field indicates whether an icon blinks when there is unsaved data. To disable/enable this feature, click Disable/Enable Save Icon Blinking. Click Apply. The file is copied. Cisco 500 Series Stackable Managed Switch Administration Guide 55

56 Managing System Files DHCP Auto Configuration 4 DHCP Auto Configuration The switch supports DHCP auto configuration, which provides a means of passing configuration information (including the IP address of a TFTP TFTP or SCP server and a file name) to hosts on a TCP/IP network. Based on this protocol, the Auto Configuration feature enables a switch to download configuration files from a TFTP/SCP server. By default, the switch is enabled as a DHCP client when the Auto Configuration feature is enabled. The Auto Configuration process also supports downloading a configuration file without sensitive information, or a configuration file which includes sensitive information, such as TACACS+ keys and SSH/SSL keys, by using the Secured Copy Protocol (SCP). Triggering DHCP Auto Configuration The Auto Configuration process is triggered in the following cases: After reboot when an IP address is allocated or renewed dynamically (using DHCP). Upon an explicit DHCP renewal request and if the switch and the server are configured to do so. Upon automatic renewal of the DHCP lease. Server Name/Address You can specify the IP address or the name of the TFTP/SCP server. This server is used if no server IP address was specified in the DHCP message. This DHCP message is the DHCP offer message coming from the DHCP server. Possible options are bootp options sname and siaddr and DHCP option 150 or option 66. This is an optional parameter. Backup Configuration File Name You can specify the backup configuration filename. This file is used if no filename was specified in the DHCP message. This is an optional parameter. Cisco 500 Series Stackable Managed Switch Administration Guide 56

57 Managing System Files DHCP Auto Configuration 4 Auto Configuration Download Protocol The Auto Configuration download protocol can be configured, as follows: Auto By File Extension If this option is selected, you can provide a file extension (the default file extension is scp). Files with the specified file extension are downloaded using SCP (over SSH), while files with other extensions are downloaded using TFTP. For example, if the file extension specified is.xyz, files with the.xyz extension are downloaded using SCP, and files with the other extensions are downloaded using TFTP. The default is Auto by file extension. TFTP Only The download is done through TFTP regardless of the file extension of the configuration file name. SCP Only The download is done through SCP (over SSH) regardless of the file extension of the configuration file name. SSH Client Authentication Parameters By default, remote ssh server authentication is disabled, so the device accepts any remote ssh server out of the box. You can enable remote ssh server authentication to allow connections only from servers in the trusted server list. SSH Client Authentication parameters are required to access the SSH server by the client (which is the switch). The default SSH Client authentication parameters are: SSH Authentication method: by username/password SSH username: anonymous SSH password: anonymous Note that the SSH Client authentication parameters can also be used when downloading a file for manual download (a download that is not performed through the DHCP Auto Configuration feature). Cisco 500 Series Stackable Managed Switch Administration Guide 57

58 Managing System Files DHCP Auto Configuration 4 Auto Configuration Process When the Auto Configuration process is triggered, the following sequence of events occurs: The DHCP server is accessed to acquire the TFTP/SCP server IP address and configuration file name. These parameters are passed in the DHCP option parameters. If an IP address was not supplied by the DHCP server, the backup server address is used (if configured by the user). If the IP address was not supplied by the DHCP server and the backup TFTP/SCP server address parameter is empty then the Auto Configuration process is halted. NOTE In the previous two bullets, the IP address refers to the IP address or hostname of the TFTP or SCP server. If the configuration filename was supplied by the DHCP server, then the copy protocol (SCP/TFTP) is selected as described in DHCP Auto Configuration. When downloading using SCP, the device accepts any specified SCP/SSH server (without authentication) if either of the following is true: - The SSH server authentication process is disabled. Note that by default the SSH server authentication is disabled in order to allow downloading configuration file for devices with factory default configuration (for example out-of-box devices). - The SSH Server is configured in the SSH Trusted Servers list. If the SSH server authentication process is enabled, and the SSH server is not found in the SSH Trusted Servers list, the Auto Configuration process is halted. If a configuration filename was not supplied by the DHCP server, the backup configuration file name is used. If the configuration filename was not supplied by the DHCP server and the backup configuration file name is empty, the Auto Configuration process is halted. Cisco 500 Series Stackable Managed Switch Administration Guide 58

59 Managing System Files DHCP Auto Configuration 4 The TFTP/SCP server is accessed to download the file from it. The download process is done only if the new configuration filename is different from the current configuration filename (even if the current configuration file is empty). A SYSLOG message is generated acknowledging that the Auto Configuration process is completed. Auto Configuration Process with Factory Default Configuration Auto Configuration with/without sensitive data is supported for out-of-the-box devices with factory defaults configuration. The download process is described in the Sensitive Data Management document. Configuring DHCP Auto Configuration The DHCP Auto Configuration page is used to perform the following actions when the information is not provided in a DHCP message: Enable DHCP auto configuration feature. Specify the download protocol. Configure the switch to receive configuration information from a specific file on a specific server. Note the following regarding the DHCP auto configuration process: A configuration file that is placed on the TFTP/SCP server must match the form and format requirements of a supported configuration file. The form and format of the file are checked, but the validity of the configuration parameters is not checked prior to loading it to the Startup Configuration. To ensure that the device configuration functions as intended, due to allocation of different IP addresses with each DHCP renew cycle, it is recommended that IP addresses be bound to MAC addresses in the DHCP server table. This ensures that each device has its own reserved IP address and other relevant information. Cisco 500 Series Stackable Managed Switch Administration Guide 59

60 Managing System Files DHCP Auto Configuration 4 To configure DHCP server auto configuration: STEP 1 STEP 2 Click Administration > File Management > DHCP Auto Configuration. The DHCP Auto Configuration page opens. Enter the values. Auto Configuration Via DHCP Select this field to enable DHCP Auto Configuration, meaning that the configuration file is automatically downloaded onto the device from the DHCP server. Download Protocol Select one of the following options: - Auto By File Extension Select to indicate that auto configuration uses the TFTP or SCP protocol depending on the extension of the configuration file. If this option is selected, the extension of the configuration file does not necessarily have to be given. If it is not given, the default extension is used (as indicated below). - File Extension for SCP If Auto By File Extension is selected, then you can indicate a file extension here. Any file with this extension is downloaded using SCP. If no extension is entered, the default file extension.scp is used. - TFTP Only Select to indicate that only the TFTP protocol is to be used for auto configuration. - SCP Only Select to indicate that only the SCP protocol is to be used for auto configuration. SSH Settings for SCP When using SCP (Secure Copy Protocol) for downloading the configuration files, select one of the following options: - Remote SSH Server Authentication Click on the Enable/Disable link to navigate to the SSH Server Authentication page. There you can enable authentication of the SSH server to be used for the download and enter the trusted SSH server if required. - SSH Client Authentication Click on the System Credentials link to enter user credentials in the SSH User Authentication page. STEP 3 Enter the following optional information to be used if no configuration file name was received from the DHCP server. Backup Server Definition Select By IP Address or By name to configure the server. Cisco 500 Series Stackable Managed Switch Administration Guide 60

61 Managing System Files DHCP Auto Configuration 4 Backup Server IP Address/Name Enter the IP address or the name of the server to be used if no server IP address was specified in the DHCP message. Backup Configuration File Name Enter the path and file name of the file to be used if no configuration file name was specified in the DHCP message. The window displays the following: Last Auto Configuration Server IP Address Displays the IP address of the server last used to perform auto configuration. Last Auto Configuration File Name Displays the last file name used by the switch in auto configuration. NOTE The Last Auto Configuration File Name is compared with the information received from a DHCP server when an IP address is received for the switch. If this value does not match, the switch transfers the configuration file from the server identified by the DHCP server into the Startup Configuration file, and initiates a reboot. If the values match, no action is taken. STEP 4 Click Apply. The DHCP Auto Configuration feature is updated in the Running Configuration. Cisco 500 Series Stackable Managed Switch Administration Guide 61

62 5 Stack Management This section describes how stacks are managed. It covers the following topics: Overview Types of Units in Stack Stack Mode Stack Ports Stack Topology Unit ID Assignment Master Selection Process Stack Changes and Unit ID Assignment Unit Failure in Stack Software Auto Synchronization in Stack System Mode and Stack Management Overview Devices can either function on their own, or they can be connected into a stack of up to four devices (units). When a unit functions by itself, its stack mode is Standalone. When it functions as part of a stack, its stack mode is Native Stacking. In Native Stacking mode, all units in the stack must be of the same type (Sx500 or SG500X). By default, all Sx500 and SG500X devices operate in Native Stacking mode. The units in a stack are connected through stack ports. These devices are then collectively managed as a single logical device. Cisco 500 Series Stackable Managed Switch Administration Guide 62

63 Stack Management Overview 5 The stack is based on a single master/backup and multiple slaves model. An example of four devices connected into a stack is shown in the following: Stack Architecture A stack provides the following benefits: Network capacity can be expanded or contracted dynamically. By adding a unit, the administrator can dynamically increase the number of ports in the stack while maintaining a single, logically-managed device. Similarly, units can be removed to decrease network capacity. The stacked system supports redundancy in the following ways: - The backup unit becomes the master of the stack if the original master fails. - The stack system supports two types of topologies: chain and ring. In ring topology, if one of the stack ports fails, the stack continues to function in chain topology. - A process known as Fast Stack Link Failover is supported on the ports in a ring stack to reduce the duration of data packet loss when one of the stack ports link fails. Until the stack recovers to the new chain topology, the stack port that is currently down, loops back the packets that were supposed to be sent through it, so that the packets arrive at their destination using the remaining stacking links. During Fast Stack Link failover, the master/backup units remain active and functioning. Cisco 500 Series Stackable Managed Switch Administration Guide 63

64 Stack Management Types of Units in Stack 5 Types of Units in Stack A stack consists of a maximum of four units. A unit in a stack is one of the following types: Master The master unit s ID must be either 1 or 2. The stack is managed through the master unit that manages itself, the backup unit and the slave units. Backup If the master unit fails, the backup unit assumes the master role (switchover). The backup unit s ID must be either 1 or 2. Slave These units are managed by the master unit. In order for a group of units to function as a stack, there must be a master-enabled unit. When the master-enabled unit fails, the stack continues to function as long as there is a backup unit (the active unit that assumes the master role). Stack Mode Every Sx500 and SG500X device can operate in one of the following modes: Standalone A standalone device does not have a stack port. It has four network ports, and does not join any other devices to form a stack. The device operates on its own. Native Stacking A device is capable of joining other devices in Native Stacking mode with its stack ports to form a stack. All units in a native stack must be of the same type (all Sx500 or all SG500X) except that SF500 units and SG500 units can be stacked together. Changing the Stack Mode A device can be switched from Native Stacking mode to Standalone mode (to remove it from a stack) or vice versa (to prepare it for becoming part of a stack). Changing the stack mode might affect whether the Startup Configuration is retained and the switch s system mode (Layer 2 or Layer 3) after reboot. The startup configuration removal is done during the boot process at reboot. The system mode (Layer 2 or Layer 3) of the backup and slaves units is taken from the master-enabled unit. This mode can be configured before the reboot process and might be affected after reboot (see table below). Cisco 500 Series Stackable Managed Switch Administration Guide 64

65 Stack Management Stack Ports 5 The following describes whether the Startup Configuration and the system mode are retained after reboot. Switching Stack Mode SG500X Sx500 Startup Configuration System Mode (Layer 2/3) Startup Configuration System Mode (Layer 2/3) Standalone to Native Stacking The Startup Configuration is retained only when the unit ID is set to 1 (force setting). Layer 3 system mode is always supported. The Startup Configuration is retained only when the unit ID is set to 1 (force setting). Current mode is retained. Native Stacking to Standalone Startup Configuration is removed. Layer 3 system mode is always supported. Startup Configuration is removed. If the current mode is not specifically set before reboot, the device is in Layer 2 system mode after reboot. Stack Ports Stack ports are used to connect units in the stack and to transfer data and protocol packets among the units. If auto selection of the stack port speed is configured, the system automatically identifies the stack cable type and selects the highest speed supported by the cable and the port. If auto selection of the stack port speed is not configured, all stack ports must be set to the same speed in order for the stack to functions correctly. Cisco 500 Series Stackable Managed Switch Administration Guide 65

66 Stack Management Stack Ports 5 The following describes the possible types of stack ports and their speeds on the various types of devices: Stack Port Speeds Device Type of Units in Stack Stack Port Name on Front Panel Stack Port Speeds in Stack SG500X S1, S2 - XG 10G/1G Yes SG500X S1, S2-5G 5G/1G Yes Sx500 S1, S2 1G No Sx500 S3, S4 5G/1G Yes Auto Speed Selection Available When an Sx500 device operates in Native Stacking mode, S1 and S2 operate as regular network ports, and S3 and S4 operate as stack ports by default. On the SG500X, S1 and S2 are stack ports by default. You can manually reconfigure S1/ S2 and S3/S4 as network ports or stack ports. All the stack ports on a device that operate in Standalone mode automatically become regular Ethernet network ports. Cables Types Port Speeds Availability per Cable Type The following describes the possible combinations of cables types and ports. Stack Ports Cable Type Cisco SFP- H10GB-CU1M Copper Cable Cisco SFP- H10GB-CU3M Copper Cable Cisco SFP- H10GB-CU5M Copper Cable S1,S2-5G for SG500X and S3, S4 for Sx500 S1, S2 in Sx500 S1,S2 - XG in SG500X Network Ports S1,S2-5G for SG500X and S3, S4 for Sx500 S1,S2 in Sx500 5G 1G 10G 1G 1G 10G 5G 1G 10G 1G 1G 10G 5G 1G 10G 1G 1G 10G S1,S2 - XG in SG500X Cisco 500 Series Stackable Managed Switch Administration Guide 66

67 Stack Management Stack Ports 5 Port Speeds Availability per Cable Type Stack Ports Cable Type Cisco SFP-10G- SR Cisco SFP-10G- LRM Cisco SFP-10G- LR 1G SFP Module MGBSX1 1G SFP Module MGBT1 1G SFP Module MGBLX1 1G SFP Module MGBBX1 100Mbs SFP Module MFELX1 100Mbs SFP Module MFEFX1 100Mbs SFP Module MFEBX1 S1,S2-5G for SG500X and S3, S4 for Sx500 Not supported Not supported Not supported Not supported Not supported Not supported 10G 10G 10G S1,S2-5G for SG500X and S3, S4 for Sx500 Not supported Not supported Not supported Not supported Not supported Not supported 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G Not supported Not supported Not supported S1, S2 in Sx500 Not supported Not supported Not supported Other SFPs 1G According to: S1,S2 - XG in SG500X Not supported Not supported Not supported According to: Network Ports Not supported Not supported Not supported 1G S1,S2 in Sx Mbs 100Mbs 100Mbs According to: S1,S2 - XG in SG500X 10G 10G 10G Not supported Not supported Not supported According to: Forced user speed Forced user speed Forced user speed Forced user speed EEPROM speed EEPROM speed EEPROM speed EEPROM speed 1G speed 1G speed 1G speed 10G speed Cisco 500 Series Stackable Managed Switch Administration Guide 67

68 Stack Management Stack Topology 5 Stack Topology Types of Stack Topology The units in a stack can be connected in one of the following types of topologies: Chain Topology One stack port (either left or right) of the first unit is connected to the stack port in the second unit. All units in the stack are connected to the stack port in the next unit except for the first and last unit. The following shows a chain topology: Stack in Chain Topology Ring Topology All the units in the stack are connected in a chain. The last unit is connected to the first unit. The following shows a ring topology: Cisco 500 Series Stackable Managed Switch Administration Guide 68

69 Stack Management Stack Topology 5 Stack in Ring Topology A ring topology is more reliable than a chain topology. The failure of one link in a ring does not affect the function of the stack, whereas the failure of one link in a chain connection causes the stack to be split. Topology Discovery A stack is established by a process called topology discovery. This process is triggered by a change in the up/down status of a stack port. The process is triggered in the following cases: Changing the stack topology from a ring to a chain Merging two stacks into a single stack Splitting the stack Inserting other slave units to the stack, for instance because the units were previously disconnected from the stack due to a failure. This can happen in a chain topology if a unit in the middle of the stack fails. During topology discovery, each unit in a stack exchanges packets, which contain topology information. After the topology discovery process is completed, each unit contains the stack mapping information table of all units in the stack. Cisco 500 Series Stackable Managed Switch Administration Guide 69

70 Stack Management Unit ID Assignment 5 Unit ID Assignment After topology discovery is completed, each unit in a stack is assigned a unique unit ID. The unit ID is set in the System Mode and Stack Management page in one of the following ways: Automatically (Auto) The Unit ID is assigned by the topology discovery process. This is the default setting. Manually The unit ID is manually set. Duplicate Unit IDs If you assign the same unit ID to two separate units, only one of them can join the stack with that unit ID. If auto numbering has been selected, the duplicate unit is assigned a new unit number. If auto numbering was not selected, the duplicate unit is shut down. The following few examples show where unit ID duplication might occur. The following shows a case where two units received the same unit ID, manually. The second unit 1 was subsequently shut down. Duplicate Unit Shut Down In the figure above, Unit 1 does not join the stack and is shut down. It did not win the master selection process between the master-enabled units (1 or 2). The following shows a case where one of the duplicate units (auto-numbered) is renumbered. Cisco 500 Series Stackable Managed Switch Administration Guide 70

71 Stack Management Master Selection Process 5 Duplicate Unit Renumbered The following shows a case where one of the duplicate units is renumbered. The one with the lower MAC retains its unit ID (see Master Selection Process for a description of this process). Duplication Between Two Units With Auto Number Unit ID If a new stack has more than the maximum number of units (4), all extra units are shut down. Master Selection Process The master unit is selected from the master-enabled units (1 or 2). The factors in selecting the master unit are taken into account in the following priority: Cisco 500 Series Stackable Managed Switch Administration Guide 71

72 Stack Management Stack Changes and Unit ID Assignment 5 Force Master - If Force Master is activated on a unit, it is selected. If a unit is forced, it remains forced even after reboot. System Up Time -The master-enabled units exchange up time, which is measured in segments of 10 minutes. The unit with the higher number of segments is selected as the master. Note: The up time of the backup unit is retained when it is selected as master in the switch failover process. Unit ID - If both units have the same number of time segments, the unit with the lowest unit ID is selected. MAC Address - If both units IDs are the same, the unit with the lowest MAC address is chosen. NOTE For a stack to operate, it must have a master unit. A master unit is defined as the active unit that assumes the master role. The stack must contain a unit 1 and/or unit 2 after the master selection process. Otherwise, the stack and all its units are partially shut down, not as a complete power-off, but with traffic-passing capabilities halted. Stack Changes and Unit ID Assignment This section describes various events that can cause a change to the stack. A stack topology changes when one of the following occurs: One or more units are connecting and/or disconnecting to and from the stack. Any of its stack ports has a link up or down. The stack changes between ring and chain formation. When units are added or removed to and from a stack, it triggers topology changes, master election process, and/or unit ID assignment. Connecting/Disconnecting a Stack Cable Connecting or disconnecting a stack cable, or configuring a stack port link up or down, triggers a topology change. This can be the result of adding or removing a unit from the stack, or from changing the stack topology between a chain and a ring. Cisco 500 Series Stackable Managed Switch Administration Guide 72

73 Stack Management Stack Changes and Unit ID Assignment 5 Connecting a New Unit When a unit is inserted into the stack, a stack topology change is triggered. The unit ID is assigned (in case of auto numbering), and the configuration is downloaded from the master. One of the following cases can occur when connecting a new unit to an existing stack: No duplicate unit IDs exist. - Units with user-defined IDs retain their unit ID. - Units with automatically-assigned IDs retain their unit ID. - Factory default units receive unit IDs automatically, beginning from the lowest available ID. One or more duplicate unit IDs exist. Auto numbering resolves conflicts and assigns unit IDs. In case of manual numbering, only one unit retains its unit ID and the other(s) are shutdown. The number of units in the stack exceeds the maximum number of units allowed. The new units that joined the stack are shut down, and a notification is sent to the SYSLOG server. The following shows an example of auto numbering when a master-enabled unit joins the stack. There are two units with unit ID = 1. The master selection process selects the best unit to be the master unit (it had been booted longer than the original one). The other unit is made the backup. Auto-numbered Master-enabled Unit The following shows an example of auto numbering when a new unit joins the stack. The existing units retain their ID. The new unit receives the lowest available ID. Cisco 500 Series Stackable Managed Switch Administration Guide 73

74 Stack Management Unit Failure in Stack 5 Auto Number Unit The following shows what happens when a user-assigned, master-enabled unit with Unit ID 1 joins a stack that already has a master unit with user-assigned unit ID 1. The newer Unit 1 does not join the stack and is shutdown. User-assigned Master-enabled Unit Unit Failure in Stack Failure of Master Unit If the Master fails, the backup unit takes over the master role and continues to operate the stack normally. In order for the backup to be able to take the place of the master, both units maintain a warm standby at all times. In warm standby, the master and its backup units are synchronized with the static configuration (contained in both the Startup and Running configuration files). Backup configuration files are not synchronized. The backup configuration file remains on the previous master. Cisco 500 Series Stackable Managed Switch Administration Guide 74

Cisco Small Business 300 Series Managed Switch Administration Guide Release 1.2.7

Cisco Small Business 300 Series Managed Switch Administration Guide Release 1.2.7 ADMINISTRATION GUIDE Cisco Small Business 300 Series Managed Switch Administration Guide Release 1.2.7 Contents Table of Contents Chapter 1: Getting Started 1 Starting the Web-based Switch Configuration

More information

ADMINISTRATION GUIDE Cisco Small Business

ADMINISTRATION GUIDE Cisco Small Business ADMINISTRATION GUIDE Cisco Small Business 200 Series Smart Switch Administration Guide Contents Chapter 1: Getting Started 1 Starting the Web-based Switch Configuration Utility 1 Launching the Configuration

More information

ADMINISTRATION GUIDE Cisco Small Business 300 Series Managed Switch Administration Guide

ADMINISTRATION GUIDE Cisco Small Business 300 Series Managed Switch Administration Guide ADMINISTRATION GUIDE Cisco Small Business 300 Series Managed Switch Administration Guide 10/100 Switches SF 300-08, SF 302-08, SF 302-08MP, SF 302-08P, SF 300-24, SF 300-24P, SF 300-48, SF 300-48P Gigabit

More information

Cisco Small Business 200 Series Smart Switch Administration Guide Release 1.3

Cisco Small Business 200 Series Smart Switch Administration Guide Release 1.3 ADMINISTRATION GUIDE Cisco Small Business 200 Series Smart Switch Administration Guide Release 1.3 Contents Chapter 1: Getting Started 1 Starting the Web-based Configuration Utility 1 Launching the Configuration

More information

User Guide. Smart Switch LGS3XX

User Guide. Smart Switch LGS3XX User Guide Smart Switch LGS3XX Chapter 1: Getting Started 1 Starting the Web-based Configuration Utility 1 Launching the Configuration Utility 1 Interface Naming Conventions 2 Window Navigation 2 Configuring

More information

ADMINISTRATION GUIDE Cisco Small Business

ADMINISTRATION GUIDE Cisco Small Business ADMINISTRATION GUIDE Cisco Small Business SFE/SGE Managed Switches 2009 Cisco Systems, Inc. All rights reserved. OL-20139-01 Contents Contents Chapter 1: Getting Started 1 Starting the Application 1 Understanding

More information

GS510TP and GS110T Gigabit Smart Switches

GS510TP and GS110T Gigabit Smart Switches GS510TP and GS110T Gigabit Smart Switches Software Administration Manual 350 East Plumeria Drive San Jose, CA 95134 USA December 2011 202-10883-01 v1.0 2011 NETGEAR, Inc. All rights reserved No part of

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

ProSafe Managed Switch

ProSafe Managed Switch ProSafe Managed Switch Web Management User Manual Version 9.0.2 GSM5212P GSM7212F GSM7212P GSM7224P 350 East Plumeria Drive San Jose, CA 95134 USA November, 2011 202-10967-01 v1.0 2011 NETGEAR, Inc. All

More information

GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches

GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches Software Administration Manual September 2013 202-11263-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.

More information

GS752TP, GS728TP, and GS728TPP Gigabit Smart Switches

GS752TP, GS728TP, and GS728TPP Gigabit Smart Switches GS752TP, GS728TP, and GS728TPP Gigabit Smart Switches Software Administration Manual December 2013 202-11137-04 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4 1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may

More information

ADMINISTRATION GUIDE Cisco Small Business Pro

ADMINISTRATION GUIDE Cisco Small Business Pro ADMINISTRATION GUIDE Cisco Small Business Pro ESW 500 Series Switches 2009 Cisco Systems, Inc. All rights reserved. OL-19128-01 Contents Chapter : Getting Started 12 Introduction 12 Typical Installation

More information

AT-GS950/8. AT-GS950/8 Web Users Guide AT-S107 [1.00.043] Gigabit Ethernet Smart Switch. 613-001484 Rev A

AT-GS950/8. AT-GS950/8 Web Users Guide AT-S107 [1.00.043] Gigabit Ethernet Smart Switch. 613-001484 Rev A AT-GS950/8 Gigabit Ethernet Smart Switch AT-GS950/8 Web Users Guide AT-S107 [1.00.043] 613-001484 Rev A Copyright 2011 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced

More information

Chapter 4 Management. Viewing the Activity Log

Chapter 4 Management. Viewing the Activity Log Chapter 4 Management This chapter describes how to use the management features of your NETGEAR WG102 ProSafe 802.11g Wireless Access Point. To get to these features, connect to the WG102 as described in

More information

Web Browser Interface User s Guide

Web Browser Interface User s Guide Management Software AT-S62 Web Browser Interface User s Guide AT-8516F/SC, AT-8524M, AT-8524POE, AT-8550GB and AT-8550SP LAYER 2+ FAST ETHERNET SWITCHES VERSION 1.3.0 PN 613-000127 Rev A Copyright 2005

More information

Chapter 3 Management. Remote Management

Chapter 3 Management. Remote Management Chapter 3 Management This chapter describes how to use the management features of your ProSafe 802.11a/g Dual Band Wireless Access Point WAG102. To access these features, connect to the WAG102 as described

More information

DCRS-5650 Dual Stack Ethernet Switch Datasheet

DCRS-5650 Dual Stack Ethernet Switch Datasheet DCRS-5650 Dual Stack Ethernet Switch Datasheet DCRS-5650-28C Product Overview DCRS-5650 series switch is L3 Fast Ethernet switch which meets the requirements of security and intelligent networks for education

More information

ALLNET ALL-SG8926PM Layer 2 FULL Management 24 Port Giga PoE Current Sharing Switch IEEE802.3at/af

ALLNET ALL-SG8926PM Layer 2 FULL Management 24 Port Giga PoE Current Sharing Switch IEEE802.3at/af ALLNET ALL-SG8926PM Layer 2 FULL Management 24 Port Giga PoE Current Sharing Switch IEEE802.3at/af 24-Port Giga PoE Current Sharing 500W PoE Budget IPv6 and IPv4 Dual Protocol SNMP v1/v2c/v3 SSH version

More information

TP-LINK. JetStream 28-Port Gigabit Stackable L3 Managed Switch. Overview. Datasheet T3700G-28TQ. www.tp-link.com

TP-LINK. JetStream 28-Port Gigabit Stackable L3 Managed Switch. Overview. Datasheet T3700G-28TQ. www.tp-link.com TP-LINK JetStream 28-Port Gigabit Stackable L3 Managed Switch Overview TP-LINK s is an L3 managed switch designed to build a highly accessible, scalable, and robust network. The switch is equipped with

More information

20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch

20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch GTL-2691 Version: 1 Modules are to be ordered separately. 20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch The LevelOne GEL-2691 is a Layer 3 Managed switch with 24 x 1000Base-T ports associated

More information

16-PORT POWER OVER ETHERNET WEB SMART SWITCH

16-PORT POWER OVER ETHERNET WEB SMART SWITCH 16-PORT POWER OVER ETHERNET WEB SMART SWITCH User s Manual (DN-95312) - 0 - Content Web Smart Switch Configure login ---------------------------------- 2 Administrator Authentication Configuration ---------------------------------------------

More information

48 GE PoE-Plus + 2 GE SFP L2 Managed Switch, 375W

48 GE PoE-Plus + 2 GE SFP L2 Managed Switch, 375W GEP-5070 Version: 1 48 GE PoE-Plus + 2 GE SFP L2 Managed Switch, 375W The LevelOne GEP-5070 is an intelligent L2 Managed Switch with 48 x 1000Base-T PoE-Plus ports and 2 x 100/1000BASE-X SFP (Small Form

More information

Gigabyte Content Management System Console User s Guide. Version: 0.1

Gigabyte Content Management System Console User s Guide. Version: 0.1 Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...

More information

AT-S95 Version 1.0.0.35 AT-8000GS Layer 2 Stackable Gigabit Ethernet Switch Software Release Notes

AT-S95 Version 1.0.0.35 AT-8000GS Layer 2 Stackable Gigabit Ethernet Switch Software Release Notes AT-S95 Version 1.0.0.35 AT-8000GS Layer 2 Stackable Gigabit Ethernet Switch Software Release Notes Please read this document before you begin to use the management software. Supported Platforms The following

More information

TP-LINK L2 Managed Switch

TP-LINK L2 Managed Switch NEW TP-LINK L2 Managed Switch TM NEW TL-SL3428/TL-SL3452 Overview TP-LINK JetStream TM L2 managed switch TL-SL3428/TL-SL3452 provides 24/48 10/100Mbps ports, the switch provide high performance, enterprise-level

More information

ZyXEL GS2210-8HP V4.10(AASQ.1)C0 Release Note/Manual Supplement

ZyXEL GS2210-8HP V4.10(AASQ.1)C0 Release Note/Manual Supplement ZyXEL GS2210-8HP V4.10(AASQ.1)C0 Release Note/Manual Supplement Date: May. 5, 2015 This document describes the features in the GS2210-8HP product for its 4.10(AASQ.1)C0 release. Support Platforms: ZyXEL

More information

TP-LINK. 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch. Overview. Datasheet TL-SL5428E. www.tp-link.com

TP-LINK. 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch. Overview. Datasheet TL-SL5428E. www.tp-link.com TP-LINK 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch Overview TP-LINK JetStream L2 managed switch provides high performance, enterprise-level QoS, advanced security strategies and rich layer 2

More information

TP-LINK. 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch. Overview. Datasheet TL-SL3428. www.tp-link.com

TP-LINK. 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch. Overview. Datasheet TL-SL3428. www.tp-link.com TP-LINK TM 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch Overview TP-LINK JetStream TM gigabit L2 managed switch provides 24 10/100Mbps ports. The switch provides high performance, enterprise-level

More information

ProSafe Plus Switch Utility

ProSafe Plus Switch Utility ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA December 2012 202-10524-05 NETGEAR, Inc. All rights reserved No part of this publication maybe reproduced, transmitted,

More information

INDIAN INSTITUTE OF TECHNOLOGY BOMBAY MATERIALS MANAGEMENT DIVISION : (+91 22) 2576 8800 (DR)

INDIAN INSTITUTE OF TECHNOLOGY BOMBAY MATERIALS MANAGEMENT DIVISION : (+91 22) 2576 8800 (DR) Item CORE SWITCH: 24 Ports Item Description 1)General requirements: Switch- modular operating system, non-blocking wire speed performance. Switch solution-capable of providing complete redundancy by using

More information

Management Software. User s Guide AT-S84. For the AT-9000/24 Layer 2 Gigabit Ethernet Switch. Version 1.1. 613-000368 Rev. B

Management Software. User s Guide AT-S84. For the AT-9000/24 Layer 2 Gigabit Ethernet Switch. Version 1.1. 613-000368 Rev. B Management Software AT-S84 User s Guide For the AT-9000/24 Layer 2 Gigabit Ethernet Switch Version 1.1 613-000368 Rev. B Copyright 2006 Allied Telesyn, Inc. All rights reserved. No part of this publication

More information

TP-LINK. 48-Port Gigabit Smart Switch with 4 SFP Slots. Overview. Datasheet T1600G-52TS (TL-SG2452) www.tp-link.com

TP-LINK. 48-Port Gigabit Smart Switch with 4 SFP Slots. Overview. Datasheet T1600G-52TS (TL-SG2452) www.tp-link.com TP-LINK 48-Port Gigabit Smart Switch with 4 SFP Slots Overview TP-LINK JetStream Gigabit Smart Switch T1600G-52TS is a cost-effective product solution for small and medium-sized business which provides

More information

AT-S63 and AT-S63 NE Version 1.0.0 Management Software for the AT-9400 Series Layer 2+ Gigabit Ethernet Switches Software Release Notes

AT-S63 and AT-S63 NE Version 1.0.0 Management Software for the AT-9400 Series Layer 2+ Gigabit Ethernet Switches Software Release Notes AT-S63 and AT-S63 NE Version 1.0.0 Management Software for the AT-9400 Series Layer 2+ Gigabit Ethernet Switches Software Release Notes Supported Platforms Please read this document before you begin to

More information

ProSAFE 8-Port and 16-Port Gigabit Click Switch

ProSAFE 8-Port and 16-Port Gigabit Click Switch ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.

More information

Cisco Small Business Managed Switches

Cisco Small Business Managed Switches Cisco SRW224P 24-Port 10/100 + 2-Port Gigabit Switch: WebView/PoE Cisco Small Business Managed Switches Secure, Reliable, Intelligent Switching with PoE for Growing Businesses Highlights Connects up to

More information

TP-LINK. Gigabit L2 Managed Switch. Overview. Datasheet TL-SG3216 / TL-SG3424. www.tp-link.com

TP-LINK. Gigabit L2 Managed Switch. Overview. Datasheet TL-SG3216 / TL-SG3424. www.tp-link.com TP-LINK TM Gigabit L2 Managed Switch TL-SG3216 / TL-SG3424 Overview TP-LINK JetStream TM gigabit L2 managed switch 3 series family consists of two switches: TL-SG3216 with 16 10/100/1000Mbps ports and

More information

AT-S105 Version 1.2.0 Management Software Release Notes AT-FS750/24POE and AT-FS750/48 Fast Ethernet WebSmart Switches

AT-S105 Version 1.2.0 Management Software Release Notes AT-FS750/24POE and AT-FS750/48 Fast Ethernet WebSmart Switches AT-S105 Version 1.2.0 Management Software Release Notes AT-FS750/24POE and AT-FS750/48 Fast Ethernet WebSmart Switches Please read this document before you begin to use the management software. NOTE This

More information

TotalCloud Phone System

TotalCloud Phone System TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power

More information

TP-LINK. 24-Port Gigabit L2 Managed Switch with 4 SFP Slots. Overview. Datasheet TL-SG5428. www.tp-link.com

TP-LINK. 24-Port Gigabit L2 Managed Switch with 4 SFP Slots. Overview. Datasheet TL-SG5428. www.tp-link.com TP-LINK TM 24-Port Gigabit L2 Managed Switch with 4 SFP Slots Overview Designed for workgroups and departments, from TP-LINK provides full set of layer 2 management features. It delivers maximum throughput

More information

8-Port Gigabit managed POE Switch. User s Manual. Version: 2.3

8-Port Gigabit managed POE Switch. User s Manual. Version: 2.3 8-Port Gigabit managed POE Switch User s Manual Version: 2.3 September 9, 2007 1 TABLE OF CONTENT 1.0 INTRODUCTION... 3 1.1 MAIN FEATURES... 3 1.2 START TO MANAGE THIS SWITCH... 5 2.0 WEB MANAGEMENT...

More information

TP-LINK 24-Port Gigabit L2 Managed Switch with 4 SFP Slots

TP-LINK 24-Port Gigabit L2 Managed Switch with 4 SFP Slots NEW TP-LINK 24-Port Gigabit L2 Managed Switch with 4 SFP Slots TM NEW Overview Designed for workgroups and departments, from TP-LINK provides full set of layer 2 management features. It delivers maximum

More information

Cisco SPS208G 8-Port 10/100 + 2-Port Gigabit SP Switch Cisco Small Business Gigabit SP Switches

Cisco SPS208G 8-Port 10/100 + 2-Port Gigabit SP Switch Cisco Small Business Gigabit SP Switches Cisco SPS208G 8-Port 10/100 + 2-Port Gigabit SP Switch Cisco Small Business Gigabit SP Switches Service Provider Focused Metro Access Solution Suited for MTU/MDU Applications Highlights Cost-effective

More information

TP-LINK. 24-Port Gigabit L2 Managed PoE Switch with 4 Combo SFP Slots. Overview. Datasheet TL-SG3424P. www.tp-link.com

TP-LINK. 24-Port Gigabit L2 Managed PoE Switch with 4 Combo SFP Slots. Overview. Datasheet TL-SG3424P. www.tp-link.com TP-LINK TM 24-Port Gigabit L2 Managed PoE Switch with 4 Combo SFP Slots Overview The provides 24 10/100/1000Mbps ports that supports 802.3at/af-compliant PoE, with a total PoE power supply up to 320W,

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...

More information

ADMINISTRATION GUIDE. Cisco Small Business. WAP371 Wireless-AC/N Dual Radio Access Point with Single Point Setup

ADMINISTRATION GUIDE. Cisco Small Business. WAP371 Wireless-AC/N Dual Radio Access Point with Single Point Setup ADMINISTRATION GUIDE Cisco Small Business WAP371 Wireless-AC/N Dual Radio Access Point with Single Point Setup Contents Chapter 1: Getting Started 5 Starting the Web-Based Configuration Utility 5 Using

More information

EX 3500 ETHERNET SWITCH

EX 3500 ETHERNET SWITCH PRODUCT SPEC SHEET EX 3500 ETHERNET SWITCH EX 3500 ETHERNET SWITCH EQUIPPED THE WIRED ETHERNET SWITCH FOR UNIFIED WIRED-WIRELESS NETWORKS GET ALL THE WIRED NETWORKING FEATURES YOU NEED, PLUS THE SIMPLICITY

More information

TP-LINK. L2 Managed Switch. Overview. Datasheet TL-SL3428/TL-SL3452. www.tp-link.com

TP-LINK. L2 Managed Switch. Overview. Datasheet TL-SL3428/TL-SL3452. www.tp-link.com TP-LINK TM L2 Managed Switch TL-SL3428/TL-SL3452 Overview TP-LINK JetStreamTM L2 managed switch TL-SL3428/TL-SL3452 provides 24/48 10/100Mbps ports, the switch provide high performance, enterprise-level

More information

Cisco SFE1000P 8-Port 10/100 Ethernet Switch: PoE/Fanless Cisco Small Business Managed Switches

Cisco SFE1000P 8-Port 10/100 Ethernet Switch: PoE/Fanless Cisco Small Business Managed Switches Cisco SFE1000P 8-Port 10/100 Ethernet Switch: PoE/Fanless Cisco Small Business Managed Switches Secure, Reliable, Managed Ethernet Switching with PoE Highlights Power over Ethernet easily and cost-effectively

More information

ENTERASYS WEBVIEW WEB-BASED MANAGEMENT FOR THE VH-2402S/VH-2402S2 WEB MANAGEMENT GUIDE

ENTERASYS WEBVIEW WEB-BASED MANAGEMENT FOR THE VH-2402S/VH-2402S2 WEB MANAGEMENT GUIDE ENTERASYS WEBVIEW WEB-BASED MANAGEMENT FOR THE VH-2402S/VH-2402S2 WEB MANAGEMENT GUIDE 9033821 Notice NOTICE Enterasys Networks reserves the right to make changes in specifications and other information

More information

Manual. IP Sensor and Watchdog IPSW2210. I P S W 2 2 1 0 M a n u a l P a g e 1. Relay Output. Power input. 12VDC adapter LED Indicators. 2 Dry.

Manual. IP Sensor and Watchdog IPSW2210. I P S W 2 2 1 0 M a n u a l P a g e 1. Relay Output. Power input. 12VDC adapter LED Indicators. 2 Dry. IP Sensor and Watchdog IPSW2210 Manual Relay Output Power input 12VDC adapter LED Indicators 1 wire 2 Dry Output Green : Power Yellow: Link temperature & humidity contact inputs LED indicator sensor input

More information

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch Supported Platforms Software Release Notes Please read this document before you begin to use the AT-S60 management software. The AT-S60

More information

AT-S62 and AT-S62 NE Version 1.2.1 Management Software for AT-8500 Series Switches Software Release Notes

AT-S62 and AT-S62 NE Version 1.2.1 Management Software for AT-8500 Series Switches Software Release Notes Supported Platforms AT-S62 and AT-S62 NE Version 1.2.1 Software Release Notes AT-S62 and AT-S62 NE Version 1.2.1 Management Software for AT-8500 Series Switches Software Release Notes Please read this

More information

Avaya Wireless AP Device Manager User Guide

Avaya Wireless AP Device Manager User Guide Avaya Wireless AP Device Manager User Guide February 2003 Avaya Wireless AP Device Manager User Guide Copyright Avaya Inc. 2003 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

SonicOS Enhanced 5.7.0.2 Release Notes

SonicOS Enhanced 5.7.0.2 Release Notes SonicOS Contents Platform Compatibility... 1 Key Features... 2 Known Issues... 3 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 6 Related Technical Documentation... 11 Platform Compatibility

More information

Cisco Small Business Smart Switches

Cisco Small Business Smart Switches Cisco SLM224G4S 24-Port 10/100 + 4-Port Gigabit Smart Switch: RCT Cisco Small Business Smart Switches Cost-Effective, Highly Secure Switching with Simplified Management for Growing Businesses Highlights

More information

DCS-3950-52C Fast Ethernet Intelligent Access Switch Datasheet

DCS-3950-52C Fast Ethernet Intelligent Access Switch Datasheet DCS-3950-52C Fast Ethernet Intelligent Access Switch Datasheet DCS-3950-52C Product Overview DCS-3950-52C switch is Fast Ethernet intelligent security access switch for carrier and MAN networks. It supports

More information

Appendix A Remote Network Monitoring

Appendix A Remote Network Monitoring Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the

More information

Quick Start Guide. 500 Series Stackable Managed Switches

Quick Start Guide. 500 Series Stackable Managed Switches Quick Start Guide 500 Series Stackable Managed Switches Welcome Thank you for choosing the Cisco 500 Series Stackable Managed Switch, a Cisco network communications device. This device is designed to be

More information

AT-S63 Version 3.1.0 Management Software for the AT-9400 Basic Layer 3 Gigabit Ethernet Switches Software Release Notes

AT-S63 Version 3.1.0 Management Software for the AT-9400 Basic Layer 3 Gigabit Ethernet Switches Software Release Notes AT-S63 Version 3.1.0 Management Software for the AT-9400 Basic Layer 3 Gigabit Ethernet Switches Software Release Notes Please read this document before you begin to use the management software. Supported

More information

Gigabit Ethernet Web Smart 8-Port Switch 2 Combo SFP Open Slot

Gigabit Ethernet Web Smart 8-Port Switch 2 Combo SFP Open Slot Gigabit Ethernet Web Smart 8-Port Switch 2 Combo SFP Open Slot User s Manual (DN-80201) Content Introduction ------------------------------------------------------------------------------------4 Product

More information

WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014

WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014 WRE6505 Wireless AC750 Range Extender Version 1.00 Edition 1, 4 2014 2.4G 5G Quick Start Guide User s Guide Default Login Details LAN IP Address 192.168.1.2 User Name admin www.zyxel.com Password 1234

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

Nortel VPN Router Software Release V6_05.300

Nortel VPN Router Software Release V6_05.300 Nortel VPN Router Software Release V6_05.300 1. Release Summary Release Date: November 10, 2008 Purpose: Software Maintenance release to address customer found software issues. 2. Important Notes Before

More information

Cisco Small Business Managed Switches

Cisco Small Business Managed Switches Cisco SRW208MP 8-Port 10/100 Ethernet Switch: WebView/Max PoE Cisco Small Business Managed Switches Secure, Reliable, Intelligent Switch with PoE for Your Growing Small Business Highlights Connects up

More information

Chapter 8 Monitoring and Logging

Chapter 8 Monitoring and Logging Chapter 8 Monitoring and Logging This chapter describes the SSL VPN Concentrator status information, logging, alerting and reporting features. It describes: SSL VPN Concentrator Status Active Users Event

More information

How To Use Nnci On A Microsoft Ipfix On A Linux Box 2.2.2 (Amd64) On A Macbook 2.5 (Amd32) On An Ipfix 2.3.2 On A Windows Xp

How To Use Nnci On A Microsoft Ipfix On A Linux Box 2.2.2 (Amd64) On A Macbook 2.5 (Amd32) On An Ipfix 2.3.2 On A Windows Xp Configuration System Monitoring Release: 6.2 Document Revision: 06.01 www.nortel.com NN47200-505. . Release: 6.2 Publication: NN47200-505 Document release date: 28 June 2010 While the information in this

More information

WAP561 Wireless-N Selectable-Band Access Point with PoE

WAP561 Wireless-N Selectable-Band Access Point with PoE ADMINISTRATION GUIDE Cisco Small Business WAP551 Wireless-N Access Point with PoE and WAP561 Wireless-N Selectable-Band Access Point with PoE Contents Chapter 1: Getting Started 5 Starting the Web-Based

More information

24 Port Gigabit Ethernet Web Smart Switch. Users Manual

24 Port Gigabit Ethernet Web Smart Switch. Users Manual 24 Port Gigabit Ethernet Web Smart Switch Users Manual Content Web Smart Switch Configure login -------------------------------- 2 Configuration System Configuration ---------------------------------------------------

More information

DCS-3950-28CT-POE fully loaded AT PoE Switch Datasheet

DCS-3950-28CT-POE fully loaded AT PoE Switch Datasheet DCS-3950-28CT-POE fully loaded AT PoE Switch Datasheet DCS-3950-28CT-POE Product Overview DCS-3950-28CT-POE is fully loaded PoE switch for carrier and enterprises. It supports comprehensive QoS, enhanced

More information

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for

More information

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller 52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

Command Line Interface

Command Line Interface bridge addressdatabase add Adding a Statically Configured Address to an Address Forwarding Database You can add a statically configured address to a forwarding database using the add command on the addressdatabase

More information

Cisco SGE2010 48-Port Gigabit Switch Cisco Small Business Managed Switches

Cisco SGE2010 48-Port Gigabit Switch Cisco Small Business Managed Switches Cisco SGE2010 48-Port Gigabit Switch Cisco Small Business Managed Switches Performance and Reliability to Support Small Business Networks Highlights 48 high-speed ports optimized for the network core or

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

User Guide XMS-1024P 24 Port Gigabit Managed PoE/PoE+ Switch

User Guide XMS-1024P 24 Port Gigabit Managed PoE/PoE+ Switch Simply Connected User Guide XMS-1024P 24 Port Gigabit Managed PoE/PoE+ Switch Use the XMS-1024P to: Cost-effectively Add 802.3af/at PoE Capability to Your Network Deliver Power and Data for up to 24 PoE-Enabled

More information

Extreme Networks EAS 100-24t Switch Software Release Notes, Version 1.00

Extreme Networks EAS 100-24t Switch Software Release Notes, Version 1.00 Extreme Networks EAS 100-24t Switch Software Release Notes, Version 1.00 This release note for the EAS 100-24t switch software describes: s on page 1 Supported MIBs on page 7 Known Issues on page 8 Fixed

More information

Cisco SRW2024P 24-Port Gigabit Switch: WebView/PoE Cisco Small Business Managed Switches

Cisco SRW2024P 24-Port Gigabit Switch: WebView/PoE Cisco Small Business Managed Switches Cisco SRW2024P 24-Port Gigabit Switch: WebView/PoE Cisco Small Business Managed Switches Reliable, Intelligent Switching for Growing Businesses Highlights 24 high-speed ports optimized for the network

More information

TP-LINK. 24-Port Gigabit Smart PoE Switch with 4 Combo SFP Slots. Overview. Datasheet TL-SG2424P. www.tp-link.com

TP-LINK. 24-Port Gigabit Smart PoE Switch with 4 Combo SFP Slots. Overview. Datasheet TL-SG2424P. www.tp-link.com Power Budget TP-LINK 24-Port Gigabit Smart PoE Switch with 4 Combo SFP Slots Overview The provides 24 10/100/1000Mbps ports that supports 802.3at/af-compliant PoE, with a total PoE power supply up to 180W,

More information

How To Install An At-S100 (Geo) On A Network Card (Geoswitch)

How To Install An At-S100 (Geo) On A Network Card (Geoswitch) AT-S100 Version 1.0.3 Patch 1 Management Software for the AT-9000/28 Managed Layer 2 GE ecoswitch and AT-9000/28SP Managed Layer 2 GE ecoswitch Software Release Notes Please read this document before you

More information

xstack DGS-3120 Series Layer 3 Managed Gigabit Switch Web UI Reference Guide

xstack DGS-3120 Series Layer 3 Managed Gigabit Switch Web UI Reference Guide Information in this document is subject to change without notice. 2013 D-Link Corporation. All rights reserved. Reproduction of this document in any manner whatsoever without the written permission of

More information

RGPS-7084GP-P. Industrial 12-port rack-mount managed Gigabit PoE Ethernet switch with 8x10/100/1000Base-T(X) P.S.E. ports and 4x1000Base-X, SFP socket

RGPS-7084GP-P. Industrial 12-port rack-mount managed Gigabit PoE Ethernet switch with 8x10/100/1000Base-T(X) P.S.E. ports and 4x1000Base-X, SFP socket Rack-Mount Managed Gigabit PoE v1.2 / Dec, 2011 Features Supports O-Ring (recovery time < 30ms over 250 units of connection), MSTP/RSTP/STP (IEEE 802.1s/w/D) for Ethernet Redundancy Supports Jumbo frame

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

Cisco Application Networking Manager Version 2.0

Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment

More information

6.0. Getting Started Guide

6.0. Getting Started Guide 6.0 Getting Started Guide Netmon Getting Started Guide 2 Contents Contents... 2 Appliance Installation... 3 IP Address Assignment (Optional)... 3 Logging In For the First Time... 5 Initial Setup... 6 License

More information

USER GUIDE. 5-Port and 8-Port 10/100/1000 Gigabit Smart Switch with PD and AC Power BUSINESS SERIES

USER GUIDE. 5-Port and 8-Port 10/100/1000 Gigabit Smart Switch with PD and AC Power BUSINESS SERIES USER GUIDE 5-Port and 8-Port 10/100/1000 Gigabit Smart Switch with PD and AC Power BUSINESS SERIES Model: SLM2005, SLM2008 About This Guide About This Guide Icon Descriptions While reading through the

More information

ProCurve Switch 1700-8 ProCurve Switch 1700-24

ProCurve Switch 1700-8 ProCurve Switch 1700-24 Management and Configuration Guide ProCurve Switch 1700-8 ProCurve Switch 1700-24 www.procurve.com ProCurve Series 1700 Switch Management and Configuration Guide Copyright 2007 Hewlett-Packard Development

More information

AP6511 First Time Configuration Procedure

AP6511 First Time Configuration Procedure AP6511 First Time Configuration Procedure Recommended Minimum Configuration Steps From the factory, all of the 6511 AP s should be configured with a shadow IP that starts with 169.254.xxx.xxx with the

More information

JetNet 5428Gv2. Features. Industrial 24FE+4G Gigabit Managed Ethernet Switch INDUSTRIAL ETHERNET RACKMOUNT SWITCH

JetNet 5428Gv2. Features. Industrial 24FE+4G Gigabit Managed Ethernet Switch INDUSTRIAL ETHERNET RACKMOUNT SWITCH INDUSTRIAL ETHERNET RACKMOUNT SWITCH Industrial 24FE+4G Gigabit Managed Ethernet Switch JetNet 5428Gv2 The JetNet 5428G is a 19-inch Gigabit Layer 2+ Industrial switch, equipped with 24 100 Base-TX ports

More information

ANNEX III BUDGET PROPOSAL AS PER LOTS LOT 1

ANNEX III BUDGET PROPOSAL AS PER LOTS LOT 1 ANNEX III BUDGET PROPOSAL AS PER LOTS Item no. UNIT COSTS WITH DELIVERY Comment Technical Specification Quantity Specification Offered INCLUDING INSTALLATION AND PUTTING INTO OPERATION Technical Specification

More information

Issue 1 April 2, 2009 Using the VT2442 Web User Interface

Issue 1 April 2, 2009 Using the VT2442 Web User Interface Using the VT2442 Web User Interface View the Terms of Service by visiting the Vonage website at www.vonage.com/tos. 1 Table of Contents Introduction to the Web UI... 3 Home Page... 4 Setup... 7 WAN Configuration...

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

HARTING Ha-VIS Management Software

HARTING Ha-VIS Management Software HARTING Ha-VIS Management Software People Power Partnership HARTING Management Software Network Management Automation IT - with mcon Switches from HARTING With the Ha-VIS mcon families, HARTING has expanded

More information

Chapter 10 Troubleshooting

Chapter 10 Troubleshooting Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided

More information

Datasheet. Managed Gigabit Fiber Switch. Model: ES-12F. Non-Blocking Throughput Switching. High Performance and Low Latency

Datasheet. Managed Gigabit Fiber Switch. Model: ES-12F. Non-Blocking Throughput Switching. High Performance and Low Latency Managed Gigabit Fiber Switch Model: ES-12F Non-Blocking Throughput Switching High Performance and Low Latency Gigabit Ethernet SFP and RJ45 Ports Deployment Examples Advanced Switching Technology for the

More information

Chapter 4 Managing Your Network

Chapter 4 Managing Your Network Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration

More information