EasyManua.ls Logo

Cisco SF500-24 User Manual

Cisco SF500-24
548 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Cisco ESW2 Series Advanced Switches
ADMINISTRATION
GUIDE

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Cisco SF500-24 and is the answer not in the manual?

Cisco SF500-24 Specifications

General IconGeneral
ModelSF500-24
TypeManaged
Ports24
Power SupplyInternal
StackableNo
VLAN SupportYes
Power over Ethernet (PoE)No
MAC Address Table Size16, 000 entries
Jumbo Frame SupportYes
Form FactorRack-mountable
LayerLayer 2

Summary

Getting Started

Starting the Web-based Configuration Utility

Describes how to navigate the web-based switch configuration utility and potential browser restrictions.

Logging Out

Explains the default logout behavior and how to save configurations before logging out.

Quick Start Device Configuration

Provides links to commonly used pages for simplified device configuration.

Interface Naming Conventions

Details how interfaces are denoted in the GUI by concatenating elements like type, unit, and slot numbers.

Window Navigation

Describes features of the web-based switch configuration utility, including the Application Header and links.

Status and Statistics

Viewing Ethernet Interfaces

Displays traffic statistics per port, including sent and received data dispersion.

Viewing Etherlike Statistics

Shows detailed information regarding errors in the physical layer (Layer 1) per port.

Managing RMON

Explains RMON specification for proactive traffic monitoring, alarm generation, and event notification.

Administration: System Log

Setting System Log Settings

Configures global log parameters, including enabling logging and selecting severity levels for RAM and Flash logs.

Viewing Memory Logs

Displays messages saved in RAM (cleared on reboot) and Flash memory (persistent across reboots).

Administration: File Management

System Files

Details system files like configuration, firmware, and boot code, and methods of file transfer.

Upgrade/Backup Firmware/Language

Describes processes for upgrading or backing up firmware, boot code, and language files.

DHCP Auto Configuration

Explains how auto configuration passes information and enables devices to download configuration files.

Administration: Stack Management

Overview

Describes how stacks are managed, including standalone and stacked modes, and master/slave models.

Unit ID Assignment

Explains how unique unit IDs are assigned automatically or manually after topology discovery.

Master Selection Process

Details the priority factors used to select the master unit from master-enabled units.

Unit Failure in Stack

Describes how the backup unit takes over if the master fails, and the synchronization process.

Stack Unit Mode

Indicates whether a device is part of a stack or operating standalone (Standalone, Native, Hybrid modes).

Administration: General Information

Device Models

Provides information on managed models, port configurations, and PoE details for stackable managed devices.

System Information

Displays device status, hardware, firmware, PoE status, and other system details via the System Summary page.

Rebooting the Device

Explains how to reboot the device, including immediate and scheduled reboots, and configuration saving.

Routing Resources

Details TCAM allocation differences between models and how to view and modify router resources.

Administration: Time Settings

System Time Options

Covers methods for setting system time: manual, from PC, or via SNTP server.

SNTP Modes

Describes SNTP client modes: Broadcast Reception (passive) and Broadcast Transmission (active).

Configuring System Time

Explains how to select the system time source and configure time zone and DST settings.

Administration: Diagnostics

Testing Copper Ports

Details results of integrated cable tests performed on copper cables using Virtual Cable Tester (VCT).

Displaying Optical Module Status

Shows operating conditions reported by SFP transceivers, including MSA-compatible SFPs.

Configuring Port and VLAN Mirroring

Explains how to send a copy of network packets from ports or VLANs to a network monitoring connection.

Administration: Discovery

Configuring Bonjour Discovery

Details how the device broadcasts Bonjour Discovery protocol packets to advertise its existence and services.

LLDP and CDP

Explains LLDP and CDP as link layer protocols for advertising capabilities to neighbors.

Configuring LLDP

Covers LLDP overview, properties, port settings, MED network policy, and port status configuration.

Displaying LLDP Local Information

Shows LLDP local port status advertised on a port, including Chassis ID, System Name, and Port Description.

Port Management

Configuring Ports

Outlines actions for port configuration, including Port Settings, LAG, LACP, and Green Ethernet.

Setting Port Configuration

Details global and per-port settings, including jumbo frames, port type, description, and administrative status.

Configuring Link Aggregation

Covers LAG overview, static/dynamic LAG workflow, LAG management, settings, and LACP configuration.

Configuring Green Ethernet

Describes Green Ethernet features for power saving, including Energy-Detect, Short-Reach, and EEE modes.

Smartport

Overview

Explains Smartport feature for saving and sharing common configurations via CLI or Auto Smartport.

Smartport Types

Lists supported Smartport types for attached devices and their relationship with Auto Smartport.

Smartport Macros

Defines Smartport macros as CLI command scripts for interface configuration and pairing with anti-macros.

Auto Smartport

Details how Auto Smartport automatically assigns Smartport types based on CDP/LLDP packets.

Common Smartport Tasks

Provides common tasks for setting up Smartport and Auto Smartport, including global enablement and interface configuration.

VLAN Management

VLANs

Defines VLANs as logical groups of ports enabling communication regardless of physical LAN segment.

Creating VLANs

Explains how to create VLANs with unique VIDs and the effect of assigning ports to VLANs.

Defining VLAN Membership

Details how to display and configure VLAN memberships for ports and LAGs, including Forbidden, Excluded, Tagged, Untagged options.

Voice VLAN

Covers voice VLAN deployment scenarios, dynamic modes (Telephony OUI, Auto Voice VLAN), and QoS propagation.

Spanning Tree

STP Flavors

Describes STP versions (Classic, Rapid, Multiple) that protect Layer 2 domains from broadcast storms and prevent loops.

Configuring STP Status and Global Settings

Sets STP status, operation mode (STP, RSTP, MSTP), BPDU handling, and bridge settings.

Defining Spanning Tree Interface Settings

Configures STP on a per-port basis, including Edge Port, Root Guard, BPDU Guard, and Path Cost.

Configuring Rapid Spanning Tree Settings

Enables faster STP convergence by configuring RSTP per port, including Point to Point status and roles.

Multiple Spanning Tree

Explains MSTP for separating STP port state between domains (VLANs) and defining global MSTP settings.

Managing MAC Address Tables

Types of MAC Addresses

Distinguishes between static (user-configured, non-expiring) and dynamic (learned, aging) MAC addresses.

Configuring Static MAC Addresses

Assigns static MAC addresses to specific physical interfaces and VLANs, with options for permanent or timeout deletion.

Managing Dynamic MAC Addresses

Covers configuring aging intervals for dynamic MAC addresses and querying the dynamic address table.

Multicast

Multicast Forwarding

Enables one-to-many information dissemination by forwarding data only to relevant ports, conserving bandwidth.

Defining Multicast Properties

Configures Bridge Multicast filtering status and forwarding methods (MAC, IP, Source IP) per VLAN.

Adding MAC Group Address

Supports forwarding Multicast traffic based on MAC group information, derived from IGMP/MLD packets or manual config.

Configuring IGMP Snooping

Explains IGMP snooping for selective Multicast forwarding, supporting static VLANs and IGMP Querier functionality.

MLD Snooping

Details MLD protocol usage for Multicast sessions and supports MLDv1 and MLDv2 snooping.

IP Configuration

IPv4 Management and Interfaces

Defines IPv4 interfaces, including static or dynamic IP address configuration and IP address assignment rules.

IPv4 Routes

Enables configuring and viewing IPv4 static routes using the longest prefix match (LPM) algorithm.

ARP

Manages the ARP table for known devices, supporting static and dynamic addresses for IP communication.

DHCPv4 Snooping/Relay

Provides security by preventing false DHCP responses, logging addresses, and relaying DHCP packets to servers.

DHCP Server

Enables configuring the device as a DHCPv4 server, allocating IPv4 addresses from user-defined pools.

IPv6 Management and Interfaces

Covers IPv6 network-layer protocol, address configuration, tunneling, and router advertisements.

IPv6 Static Routing

Enables configuring and viewing static IPv6 routes, defining paths between network devices.

IP Configuration: RIPv2

Overview

Describes Routing Information Protocol (RIP) version 2, a distance-vector protocol classifying routers as active or passive.

How RIP Operates on the Device

Explains RIP operation, including enabling RIP globally and per interface, offset configuration, and passive mode.

RIP Authentication

Details RIP message authentication methods: Plain text or password, and MD5 digest authentication.

Configuring RIP

Covers mandatory actions like enabling RIP globally and per interface, and optional actions like offset configuration.

IP Configuration: IPv4 VRRP Virtual Routers

Overview

Describes Virtual Router Redundancy Protocol (VRRP) for dynamic assignment of virtual router responsibility.

Configurable Elements of VRRP

Details configurable elements like VRID, VRRP versions, virtual router IP addresses, and source IP address.

VRRP Router Priority and Preemption

Explains VRRP priority for efficiently performing as a backup and the preemptive feature.

Configuring VRRP

Outlines how to configure VRRP properties, add virtual routers, and set interface, VRID, description, and status.

Security

Defining Users

Covers setting up user accounts, privilege levels, and password complexity rules for device access.

Configuring TACACS+

Establishes TACACS+ for centralized security, handling authentication, authorization, and accounting.

Configuring RADIUS

Describes RADIUS for centralized 802.1X or MAC-based network access control, covering authentication and accounting.

Key Management

Explains configuring key chains for applications and protocols like RIP, used for authentication.

Configuring Management Access Authentication

Assigns authentication methods (RADIUS, TACACS+, Local, None) for management access methods like SSH, Telnet, HTTP.

Denial of Service Prevention

Details DoS attack types (SYN, Fragmentation) and prevention methods like SYN protection and Martian addresses.

Configuring 802.1X

Covers port-based access control using 802.1X standard for authentication and authorization of supplicants.

Security: SSH Client

Secure Copy (SCP) and SSH

Explains SSH as a secure protocol for data exchange and SCP for secure file transfer (firmware, logs).

Protection Methods

Details various methods for SSH client authentication: Passwords, Public/Private Keys, and Import Keys.

SSH Server Authentication

Enables SSH server authentication by defining trusted servers and managing public key fingerprints.

SSH Client Authentication

Covers SSH client authentication methods (password, public key) and supported algorithms.

Common Tasks

Provides workflows for configuring SSH client, transferring data, importing keys, and changing passwords.

SSH Client Configuration Through the GUI

Guides through SSH user authentication setup via GUI, including password and public key methods.

Security: SSH Server

Overview

Describes establishing SSH sessions using internally-generated or public key modes for secure access.

Common Tasks

Provides workflows for logging into the device via SSH using default or user-created keys.

SSH Server Authentication

Explains enabling SSH server authentication by defining trusted servers and managing RSA/DSA keys.

Security: Secure Sensitive Data Management

Introduction

Details SSD architecture for protecting sensitive data (passwords, keys) via encryption and access control.

SSD Rules

Defines read permissions and default read modes for user sessions on management channels.

SSD Properties

Sets parameters for SSD environment, controlling data encryption, configuration file security, and view permissions.

Configuration File Passphrase Control

Provides additional protection for user-defined passphrases in text-based configuration files (Unrestricted, Restricted).

Configuration Files

Describes device configuration files (Running, Startup, Mirror, Backup) and their management via text-based formats.

Sensitive Data Zero-Touch Auto Configuration

Enables auto configuration of target devices with encrypted sensitive data without manual passphrase pre-configuration.

SSD Management Channels

Categorizes management channels (secure, insecure) and indicates parallel secure channels for SSD operations.

Access Control

Access Control Lists

An ordered list of classification filters and actions (ACEs) to define traffic flows and control entry.

Defining MAC-based ACLs

Filters traffic based on Layer 2 fields by checking all frames for MAC address matches.

IPv4-based ACLs

Checks IPv4 packets using rules defined in ACLs, matching IP protocol, ports, and IP addresses.

IPv6-Based ACLs

Creates IPv6 ACLs to check pure IPv6-based traffic, matching IPv6 protocol, addresses, and ports.

Defining ACL Binding

Binds ACLs to interfaces, applying ACE rules to packets and matching them to a default rule.

Quality of Service

QoS Features and Components

Explains QoS for optimizing network performance through traffic classification, assignment to queues, and handling attributes.

QoS Modes

Describes QoS modes: Basic (CoS/802.1p/DSCP trust), Advanced (per-flow QoS), and Disabled (best effort).

Configuring QoS - General

Covers general QoS configuration, including QoS mode, interface CoS priority, queue settings, and bandwidth limits.

QoS Advanced Mode

Defines per-flow QoS using class maps, policers, and policies, matching ACLs for traffic flows.

QoS Policers

Measures traffic rates against rules and enforces limits, using single or aggregate policers for traffic control.

Policy Binding

Shows which policy profiles are bound to ports, filtering and applying QoS to ingress traffic based on policy flows.

Managing QoS Statistics

Provides tools to manage policer statistics and view queue statistics for forwarded and dropped packets.

SNMP

SNMP Versions and Workflow

Describes SNMP agent support for v1, v2, v3, trap reporting, and recommended workflow for configuration.

Model OIDs

Lists device model Object IDs (OIDs) for supported models, used in SNMP management.

SNMP Engine ID

Explains the Engine ID's role in uniquely identifying SNMPv3 entities and its configuration.

Configuring SNMP Views

Defines user-created labels (views) for collections of MIB subtrees, specifying included or excluded objects.

Creating SNMP Groups

Covers creating SNMPv3 groups to control user read/write privileges and security levels.

Managing SNMP Users

Defines SNMP users with login credentials, authentication methods, and associates them with groups and Engine IDs.

Defining SNMP Communities

Manages access rights in SNMPv1/v2 using community names as shared passwords for authentication.

Defining Trap Settings

Configures whether SNMP notifications (traps or informs) are sent from the device and for which cases.

Notification Recipients

Specifies destinations for SNMP notifications (traps/informs) and configures notification attributes.

SNMP Notification Filters

Enables configuring SNMP notification filters and Object IDs (OIDs) to filter notifications sent to the management station.

Related product manuals