EasyManua.ls Logo

Extreme Networks 200 Series - User Manual

Extreme Networks 200 Series
338 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
Extreme Networks, Inc.
3585 Monroe Street
Santa Clara, California 95051
(888) 257-3000
http://www.extremenetworks.com
Summit 200 Series Switch
Installation and User Guide
Software Version 7.1e0
December, 2003
Part Number: 100149-00 Rev 02

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Extreme Networks 200 Series and is the answer not in the manual?

Extreme Networks 200 Series Specifications

General IconGeneral
BrandExtreme Networks
Model200 Series
CategorySwitch
LanguageEnglish

Summary

Preface

Introduction

Describes the purpose, scope, and intended audience of the installation and user guide.

Chapter 1 Summit 200 Series Switch Overview

Summary of Features

Lists the key software features supported by the Summit 200 series switches.

Summit 200-24 Switch Physical Features

Details the physical characteristics and components of the Summit 200-24 switch model.

Summit 200-48 Switch Physical Features

Details the physical characteristics and components of the Summit 200-48 switch model.

Mini-GBIC Type and Hardware;Software Support

Provides information on supported Mini-GBIC types and their specifications.

Chapter 2 Switch Installation

Determining the Switch Location

Guidance on selecting an appropriate and accessible location for switch installation.

Installing the Switch

Step-by-step instructions for physically installing the switch into a rack or setting it up.

Installing or Replacing a Mini-Gigabit Interface Connector (Mini-GBIC)

Safety precautions and procedures for installing or replacing Mini-GBIC modules.

Connecting Equipment to the Console Port

Instructions for connecting a terminal or workstation to the switch's console port for management.

Powering On the Switch

Procedure for connecting power and turning on the switch.

Logging In for the First Time

Steps for initial login and basic configuration after powering on the switch.

Chapter 3 ExtremeWare Overview

Summary of Features

Lists the key software features supported by the Summit 200 series switches.

Virtual LANs (VLANs)

Explains the concept and benefits of Virtual LANs for network segmentation and management.

Spanning Tree Protocol

Details the Spanning Tree Protocol for network fault tolerance and loop prevention.

Software Licensing

Information on enabling software features using license keys for different functionality levels.

Chapter 4 Accessing the Switch

Understanding the Command Syntax

Explains the general rules and steps for entering commands via the command-line interface.

Common Commands

Lists and describes frequently used commands for managing the switch's basic functions.

Configuring Management Access

Details how to set up user and administrator access levels for switch management.

Checking Basic Connectivity

Describes tools like Ping and Traceroute for verifying network connectivity.

Chapter 5 Managing the Switch

Using the Console Interface

Instructions for accessing and managing the switch via its console port.

Using Telnet

Procedures for remotely managing the switch using the Telnet protocol.

Using Secure Shell 2 (SSH2)

Steps to enable and use SSH2 for secure remote command-line access to the switch.

Using SNMP

Information on configuring and using SNMP for network management of the switch.

Authenticating Users

Describes methods for authenticating users, including RADIUS and TACACS+.

Network Login

Details the network login feature for controlling access based on user authentication.

Chapter 6 Configuring Ports on a Switch

Enabling and Disabling Switch Ports

Instructions on how to enable or disable individual switch ports or ports within a VLAN.

Configuring Switch Port Speed and Duplex Setting

Guides on manually setting port speed and duplex modes, or enabling autonegotiation.

Load Sharing on the Switch

Explains how to configure load sharing to increase bandwidth and network resiliency.

Switch Port-Mirroring

Details on configuring port mirroring for traffic analysis and monitoring.

Chapter 7 Virtual LANs (VLANs)

Overview of Virtual LANs

Explains the concept of VLANs, their benefits, and how they segment networks.

Types of VLANs

Describes different methods for creating VLANs, including port-based and tagged VLANs.

Configuring VLANs on the Switch

Step-by-step guide on creating, naming, and configuring VLANs on the switch.

MAC-Based VLANs

Details how to map physical ports to VLANs based on learned MAC addresses.

Chapter 8 Forwarding Database (FDB)

Overview of the FDB

Explains the function and contents of the Forwarding Database (FDB) table.

FDB Entry Types

Describes the different types of entries stored in the FDB, such as dynamic and permanent.

Configuring FDB Entries

Provides commands and procedures for adding, deleting, and managing FDB entries.

Chapter 9 Access Policies

Overview of Access Policies

Introduces access policies used for security, QoS, and traffic forwarding decisions.

Access Control Lists

Details how to create and use Access Control Lists for packet filtering and forwarding.

Rate Limits

Explains how to configure rate limits to constrain traffic to predefined rates.

Routing Access Policies

Describes how to control routing protocol advertisement and recognition using access policies.

Chapter 10 Network Address Translation (NAT)

Overview

Explains the concept of Network Address Translation (NAT) and its function.

Configuring VLANs for NAT

Steps to configure VLANs as inside or outside for NAT operation.

NAT Modes

Describes the four modes for assigning outside IP addresses and Layer 4 ports in NAT.

Configuring NAT Rules

Provides instructions and commands for creating NAT translation rules.

Chapter 11 Ethernet Automatic Protection Switching

Overview of the EAPS Protocol

Explains the Ethernet Automatic Protection Switching (EAPS) protocol for fast protection switching.

Commands for Configuring and Monitoring EAPS

Details the commands used for configuring and monitoring EAPS domains and nodes.

Creating and Deleting an EAPS Domain

Procedures for creating and deleting EAPS domains for ring protection.

Displaying EAPS Status Information

Instructions on how to view the status and configuration of EAPS domains.

Chapter 12 Quality of Service (QoS)

Overview of Policy-Based Quality of Service

Explains policy-based QoS for specifying service levels for different traffic types.

Configuring QoS for a Port or VLAN

Steps for applying QoS profiles to specific ports or VLANs for traffic management.

Traffic Groupings

Details how traffic is classified and grouped for QoS policy application.

Verifying Configuration and Performance

Using the QoS monitor to verify configuration and assess application performance.

Chapter 13 Status Monitoring and Statistics

Status Monitoring

Overview of the switch's status monitoring facility for performance analysis.

Port Statistics

Provides detailed statistics for each port, including packet and byte counts.

Port Errors

Information on reviewing Ethernet link errors and port error types.

Logging

Details on configuring and managing system event logs, including local and remote logging.

Chapter 14 Spanning Tree Protocol (STP)

Overview of the Spanning Tree Protocol

Explains the Spanning Tree Protocol (STP) for network fault tolerance and loop prevention.

STP Configurations

Guidance on configuring Spanning Tree Domains (STPDs) and their effect on VLAN traffic.

Configuring STP on the Switch

Step-by-step instructions for creating, enabling, and configuring STP domains and ports.

Disabling and Resetting STP

Procedures for disabling STP on the switch or resetting STP settings to defaults.

Chapter 15 IP Unicast Routing

Overview of IP Unicast Routing

Introduces IP unicast routing and its role in network traffic exchange between routers.

Router Interfaces

Explains how VLANs with IP addresses function as router interfaces for IP traffic.

Populating the Routing Table

Describes how the switch's IP routing table is populated dynamically and statically.

Proxy ARP

Details the Proxy ARP functionality for responding to ARP requests on behalf of devices.

Chapter 16 Interior Gateway Routing Protocols

Overview

Introduces the two interior gateway protocols supported: RIP and OSPF.

RIP Versus OSPF

Compares RIP and OSPF, highlighting their fundamental differences and advantages.

Overview of RIP

Provides details on the Routing Information Protocol (RIP), its operation, and limitations.

Overview of OSPF

Explains the OSPF link-state routing protocol, its database, and operational aspects.

Chapter 17 IP Multicast Routing and IGMP Snooping

IP Multicast Routing Overview

Introduces IP multicast routing and its core functions for group communication.

Configuring PIM-SM

Steps for configuring Protocol Independent Multicast-Sparse Mode (PIM-SM).

IGMP Overview

Explains the Internet Group Management Protocol (IGMP) for multicast group membership.

Configuring IGMP and IGMP Snooping

Instructions for configuring IGMP and IGMP snooping for efficient multicast traffic handling.

Chapter 18 Configuring Stacked Switches

Introducing Stacking

Explains the concept of stacking multiple switches into a single logical unit.

Configuring a Stack

Detailed steps for setting up a stack, including backup configuration and master enablement.

Recovering a Stack

Procedures for recovering a stack configuration after issues like member failures.

Changing a Stack Configuration

Instructions on adding or removing members from a stack configuration.

Chapter 19 Using ExtremeWare Vista on the Summit 200

ExtremeWare Vista Overview

Introduces ExtremeWare Vista as a web-based management interface for the switch.

Accessing ExtremeWare Vista

Steps to access the ExtremeWare Vista interface via a web browser.

Navigating within ExtremeWare Vista

Explains how to navigate the graphical interface, including menus and controls.

Configuring the Summit 200 using ExtremeWare Vista

Guides on configuring various switch features, including IP forwarding, OSPF, and Ports.

Reviewing ExtremeWare Vista Statistical Reports

Describes how to access and interpret various statistical reports available in the GUI.

Locating Support Information

Information on finding help, downloading software, and contacting technical support.

A Safety Information

Important Safety Information

Critical safety warnings and precautions for installing and operating the switch.

Power

Guidelines for safe power connection, grounding, and handling of the power cord.

B Technical Specifications

Summit 200-24 Switch

Detailed technical specifications for the Summit 200-24 switch model.

Summit 200-48 Switch

Detailed technical specifications for the Summit 200-48 switch model.

C Supported Standards

D Software Upgrade and Boot Options

Downloading a New Image

Procedure for downloading and installing new software images onto the switch.

Rebooting the Switch

Instructions for rebooting the switch, including scheduled and immediate reboots.

Saving Configuration Changes

Guidance on saving the current switch configuration to nonvolatile storage.

Using TFTP to Upload the Configuration

Steps to upload the current switch configuration to a TFTP server for backup or analysis.

E Troubleshooting

LEDs

Troubleshooting common issues based on the status of the switch's LEDs.

Using the Command-Line Interface

Guidance on troubleshooting issues related to accessing and using the CLI.

You forget your password and cannot log in

Steps to resolve issues when a user cannot log into the switch due to forgotten credentials.

Port Configuration

Troubleshooting common port configuration problems, such as link lights and errors.

Related product manuals