EasyManua.ls Logo

Enterasys D-Series User Manual

Enterasys D-Series
540 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Enterasys
®
D-Series
Ethernet Switches
CLI Reference
Firmware Version 1.00.01.0005 or Higher
P/N 9034394-01

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Enterasys D-Series and is the answer not in the manual?

Enterasys D-Series Specifications

General IconGeneral
DimensionsVaries by model
Switching CapacityVaries by model
Forwarding RateVaries by model
MAC Address Table SizeVaries by model
WeightVaries by model
PortsVaries by model
Uplink PortsVaries by model
Power over Ethernet (PoE)Varies by model
LayerVaries by model
ManagementVaries by model
Power SupplyVaries by model
PoE SupportVaries by model
VLANsVaries by model
Jumbo Frame SupportVaries by model
Operating TemperatureVaries by model
Storage TemperatureVaries by model
HumidityVaries by model

Summary

About This Guide

Using This Guide

Explains how to access the device's Command Line Interface (CLI) and perform network management operations.

Structure of This Guide

Outlines the organization of the manual into chapters covering CLI, basic configuration, licensed features, and more.

Related Documents

Conventions Used in This Guide

Getting Help

Provides contact information and methods for obtaining additional support for the switch or its documentation.

Chapter 1: Introduction

D-Series CLI Overview

Provides an overview of tasks performable via the CLI, including network management and configuration operations.

Switch Management Methods

Details various methods for managing the D-Series switch, including console, modem, SNMP, and Telnet connections.

Factory Default Settings

Lists the default settings for basic switch operation, covering protocols, ports, security, and system parameters.

Using the Command Line Interface

Explains how to start a CLI session via console or Telnet and navigate the interface using commands and help.

Chapter 2: Basic Configuration

Quick Start Setup Commands

Provides a quick reference for essential CLI commands needed for initial D2 switch operation and firmware setup.

Setting User Accounts and Passwords

Explains how to manage user login accounts and passwords, including adding new accounts and changing defaults.

Setting Basic Switch Properties

Covers displaying and setting fundamental system properties like IP address, system name, location, and contact information.

Chapter 3: Activating Licensed Features

Clearing, Showing, and Moving Licenses

Details commands for displaying, applying, and clearing D-Series licensed features after purchase.

Chapter 4: Configuring System Power and PoE

show inlinepower

Displays system power properties, including available power and usage thresholds for modules.

Chapter 5: Discovery Protocol Configuration

Configuring CDP

Explains how to review and configure the Enterasys CDP discovery protocol for network topology discovery.

Configuring Cisco Discovery Protocol

Details how to review and configure the Cisco discovery protocol for network topology and phone detection.

Configuring Link Layer Discovery Protocol and LLDP-MED

Covers LLDP and LLDP-MED configuration for advertising device identities and capabilities on a network.

Chapter 6: Port Configuration

Port Configuration Summary

Provides an overview of port configuration, including port string syntax and SFP port setup.

Port String Syntax Used in the CLI

Explains the syntax used for designating port type, slot location, and port number in CLI commands.

Configuring SFP Ports for 100BASE-FX

Details the steps to configure SFP ports for 100BASE-FX connections using Fast Ethernet transceivers.

Reviewing Port Status

Explains how to display operating status, duplex mode, speed, port type, and traffic statistics for switch ports.

Disabling / Enabling and Naming Ports

Covers disabling/enabling ports for security or troubleshooting, and assigning aliases for convenience.

Setting Speed and Duplex Mode

Explains how to review and set operational speed in Mbps and default duplex mode for ports.

Enabling / Disabling Jumbo Frame Support

Details how to enable and disable jumbo frame support on ports, allowing Gigabit Ethernet to transmit larger frames.

Setting Auto-Negotiation and Advertised Ability

Explains how to review, disable, or enable auto-negotiation and configure port advertisement for speed and duplex.

Setting Flow Control

Describes how to review, enable, or disable port flow control to manage transmission and prevent port overload.

Setting Port Link Traps and Link Flap Detection

Covers disabling/enabling link traps, displaying status, and configuring link flapping detection.

Configuring Broadcast Suppression

Explains how to review and set broadcast suppression thresholds per port to limit broadcast frames.

Port Mirroring

Details how to mirror or redirect traffic on a port for network analysis and connection assurance.

Link Aggregation Control Protocol (LACP)

Explains LACP, which logically groups interfaces to create greater bandwidth uplinks or link aggregations.

Chapter 7: SNMP Configuration

SNMP Configuration Summary

Provides an overview of SNMP, its versions (v1, v2c, v3), and its role in network management.

SNMPv1 and SNMPv2c

Describes the components of SNMPv1 and SNMPv2c network management, including managed devices and agents.

SNMPv3

Explains SNMPv3 as a secure protocol providing access by authenticating and encrypting frames.

About SNMP Security Models and Levels

Defines SNMP security models and levels (NoAuthNoPriv, AuthNoPriv, authPriv) for user authentication.

Using SNMP Contexts to Access Specific MIBs

Explains how to use SNMP contexts to limit access to specific MIB objects via user groups.

Reviewing SNMP Statistics

Describes how to review SNMP statistics, including engine ID, boots, time, and maximum message size.

Configuring SNMP Users, Groups, and Communities

Details how to configure SNMP users, groups, and communities for SNMPv1, v2c, and v3 management.

Configuring SNMP Access Rights

Explains how to configure SNMP access rights, assigning privileges and security levels to SNMP user groups.

Configuring SNMP MIB Views

Describes how to configure SNMP MIB views to map SNMP objects to access rights.

Configuring SNMP Target Parameters

Covers configuring SNMP target parameters that control where and under what circumstances SNMP notifications are sent.

Configuring SNMP Target Addresses

Explains how to configure SNMP target addresses that will receive SNMP notification messages.

Configuring SNMP Notification Parameters

Details how to configure SNMP notification parameters and optional filters to manage notification targets.

Chapter 8: Spanning Tree Configuration

Spanning Tree Configuration Summary

Provides an overview of STP, RSTP, and MSTP protocols and their functions in network topology.

Overview: Single, Rapid, and Multiple Spanning Tree Protocols

Explains IEEE 802.1D STP, 802.1w RSTP, and 802.1s MSTP protocols for loop prevention.

Spanning Tree Features

Details the D-Series device's Spanning Tree Protocol functions for creating, compensating, and managing topology.

Loop Protect

Describes the Loop Protect feature which prevents or short circuits loop formation in networks with redundant paths.

Configuring Spanning Tree Bridge Parameters

Covers displaying and setting Spanning Tree bridge parameters like priority, hello time, and forward delay.

Configuring Spanning Tree Port Parameters

Explains how to display and set Spanning Tree port parameters, including admin status and priority.

Configuring Spanning Tree Loop Protect Parameters

Details setting Spanning Tree Loop Protect parameters like threshold, window, and traps.

Chapter 9: 802.1Q VLAN Configuration

VLAN Configuration Summary

Provides an overview of Virtual LANs, their role in partitioning traffic, and GVRP configuration.

Port String Syntax Used in the CLI

Explains the syntax used for designating VLANs and port numbers in CLI commands.

Creating a Secure Management VLAN

Guides on creating a management-only VLAN for secure device access, ensuring only select devices can manage the switch.

Viewing VLANs

Describes how to display configured VLANs, port assignments, and traffic transmission modes.

Creating and Naming Static VLANs

Details the process of creating new static VLANs and assigning names to existing or new VLANs.

Assigning Port VLAN IDs (PVIDs) and Ingress Filtering

Explains assigning default VLAN IDs to untagged frames, configuring ingress filtering, and setting frame discard mode.

Configuring the VLAN Egress List

Covers assigning or removing ports from a VLAN egress list to determine frame transmission eligibility.

Setting the Host VLAN

Describes configuring a host VLAN for secure management access, allowing only select devices access.

Enabling/Disabling GVRP (GARP VLAN Registration Protocol)

Explains GVRP's purpose in dynamically creating VLANs and how it propagates VLAN information across a network.

Chapter 10: Differentiated Services Configuration

Globally Enabling or Disabling Diffserv

Explains how to globally enable or disable the Diffserv feature on the device.

Creating Diffserv Classes and Matching Conditions

Details reviewing, creating, and configuring Diffserv classes and matching conditions for packet classification.

Configuring Diffserv Policies and Assigning Classes

Covers reviewing, creating, and configuring Diffserv policies and assigning classes to them.

Assigning Policies to Service Ports

Explains how to review and assign Diffserv policies and their associated classes to service ports.

DiffServ Configuration Examples

Provides examples of DiffServ policy creation, including rate limiting and DSCP marking.

Chapter 11: Policy Classification Configuration

Policy Classification Configuration Summary

Overview of D-Series policy profile-based provisioning for network resources, including creating and assigning rules.

Configuring Policy Profiles

Details creating, changing, and removing user profiles for managing network resources based on business policies.

Configuring Classification Rules

Explains how to review, create, assign, and unassign classification rules to policy profiles for frame filtering.

Assigning Ports to Policy Profiles

Covers assigning and unassigning ports to policy profiles, ensuring only activated ports transmit frames.

Configuring Policy Class of Service (CoS)

Details assigning mission-critical data higher priority by defining CoS settings and rate limiters.

Chapter 12: Port Priority and Rate Limiting Configuration

Port Priority Configuration Summary

Overview of port priority characteristics, including default CoS transmit priority and traffic mapping.

Configuring Port Priority

Explains how to display or change the default Class-of-Service (CoS) transmit priority for frames.

Configuring Priority to Transmit Queue Mapping

Details how to view and configure priority to transmit queue mapping for physical ports.

Configuring Quality of Service (QoS)

Covers setting priority mode and weight for transmit queues on each port, implementing QoS.

Configuring Port Traffic Rate Limiting

Explains how to limit the rate of inbound traffic on a per port/priority basis to prevent congestion.

Chapter 13: IGMP Configuration

IGMP Overview

Provides an overview of IGMP, IP multicast group management, and multicasting principles.

Configuring IGMP at Layer 2

Details how to configure IGMP snooping from the switch CLI for efficient multicast traffic forwarding.

Chapter 14: Logging and Network Management

Configuring System Logging

Explains how to configure system logging, including Syslog server settings, defaults, and logging buffer.

Monitoring Network Events and Status

Covers displaying switch events and command history, setting history buffer size, and managing user sessions.

Managing Switch Network Addresses and Routes

Details displaying or deleting switch ARP table entries and displaying MAC address information.

Configuring Simple Network Time Protocol (SNTP)

Explains how to configure SNTP to synchronize device clocks in a network.

Configuring Node Aliases

Covers reviewing, disabling, and re-enabling node alias functionality for ports.

Chapter 15: RMON Configuration

RMON Monitoring Group Functions

Overview of RMON groups for network fault diagnosis, planning, and performance tuning.

Statistics Group Commands

Details commands for displaying, configuring, and clearing RMON statistics.

History Group Commands

Covers commands for displaying, configuring, and clearing RMON history properties and statistics.

Alarm Group Commands

Details commands for displaying, configuring, and clearing RMON alarm entries and properties.

Event Group Commands

Covers commands to display and clear RMON events, and configure RMON event properties.

Filter Group Commands

Details commands for displaying RMON channel and filter entries, and configuring filters.

Packet Capture Commands

Covers commands to display, configure, enable, disable, and clear RMON capture entries.

Chapter 16: DHCP Server Configuration

DHCP Overview

Provides an overview of DHCP for IPv4, its role in IP address assignment, and relay agents.

DHCP Server

Explains DHCP server functionality for providing IP configuration and its mechanisms for IP address allocation.

Configuring General DHCP Server Parameters

Details configuring DHCP server parameters, including enabling/disabling the server and conflict logging.

Configuring IP Address Pools

Covers configuring and clearing DHCP address pool parameters for dynamic and static IP assignments.

Chapter 17: Security Configuration

Overview of Security Methods

Describes available security methods for controlling user access, including login accounts, HACA, and SNMP.

RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment

Explains using RADIUS Filter-ID to dynamically assign policy profiles and management levels to users.

Configuring RADIUS

Details reviewing, enabling/disabling RADIUS client/server, and setting server parameters.

Configuring 802.1X Authentication

Covers reviewing and configuring 802.1X authentication for ports using EAPOL for user authorization.

Configuring MAC Authentication

Explains reviewing, enabling, disabling, and configuring MAC authentication for source MAC addresses.

Configuring Multiple Authentication Methods

Details how to enable multiple authentication types per port, including User + IP phone authentication.

Configuring VLAN Authorization (RFC 3580)

Explains RFC 3580 Tunnel Attributes for containing authenticated users to a VLAN based on RADIUS results.

Configuring MAC Locking

Covers reviewing, disabling, enabling, and configuring MAC locking to prevent unauthorized devices on ports.

Configuring Port Web Authentication (PWA)

Details how to review, enable, disable, and configure Port Web Authentication (PWA) for user access.

Configuring Secure Shell (SSH)

Explains how to review, enable, disable, and configure Secure Shell (SSH) protocol for secure Telnet.

Related product manuals