Summit 300-48 Switch Software User Guide - Svpro.ru

1y ago
17 Views
2 Downloads
2.93 MB
198 Pages
Last View : 1d ago
Last Download : 3m ago
Upload by : Casen Newsome
Transcription

Summit 300-48 SwitchSoftware User GuideSoftware Version 6.2aExtreme Networks, Inc.3585 Monroe StreetSanta Clara, California 95051(888) 257-3000http://www.extremenetworks.comPublished: September 2003Part number: 123007-00 Rev. 01

2003 Extreme Networks, Inc. All rights reserved. Extreme Networks, ExtremeWare, Alpine, and BlackDiamond areregistered trademarks of Extreme Networks, Inc. in the United States and certain other jurisdictions. ExtremeWare Vista,ExtremeWorks, ExtremeAssist, ExtremeAssist1, ExtremeAssist2, PartnerAssist, Extreme Standby Router Protocol, ESRP,SmartTraps, Summit, Summit1, Summit4, Summit4/FX, Summit7i, Summit24, Summit48, Summit Virtual Chassis,SummitLink, SummitGbX, SummitRPS and the Extreme Networks logo are trademarks of Extreme Networks, Inc.,which may be registered or pending registration in certain jurisdictions. The Extreme Turbodrive logo is a service markof Extreme Networks, which may be registered or pending registration in certain jurisdictions. Specifications are subjectto change without notice.NetWare and Novell are registered trademarks of Novell, Inc. Merit is a registered trademark of Merit Network, Inc.Solaris is a trademark of Sun Microsystems, Inc. F5, BIG/ip, and 3DNS are registered trademarks of F5 Networks, Inc.see/IT is a trademark of F5 Networks, Inc.“Data Fellows”, the triangle symbol, and Data Fellows product names and symbols/logos aretrademarks of Data Fellows.F-Secure SSH is a registered trademark of Data Fellows.All other registered trademarks, trademarks and service marks are property of their respective owners.Authors: Julie Laccabue, Barbara WeinsteinEditor: Amy GuzulesProduction: Julie LaccabueSpecial Thanks: Collin Batey, Valerie Swisher, Richard Small2

ContentsPrefaceChapter 1Chapter 2Introduction15Conventions15Related Publications16ExtremeWare OverviewSummary of FeaturesUnified AccessVirtual LANs (VLANs)Spanning Tree ProtocolQuality of ServiceLoad SharingESRP-Aware Switches17181818191919Software Licensing19Security LicensingObtaining a Security LicenseSecurity Features Under License Control202020Software Factory Defaults20Accessing the SwitchUnderstanding the Command SyntaxSyntax HelperCommand ShortcutsSummit 300-48 Switch Numerical RangesNamesSymbols232424242525Line-Editing Keys25Command History26Common Commands26Summit 300-48 Switch Software User Guide3

ContentsChapter 3Chapter 44Configuring Management AccessUser AccountAdministrator AccountDefault AccountsCreating a Management Account2829292930Domain Name Service Client Services31Checking Basic ConnectivityPingTraceroute323232Managing the SwitchOverview35Using the Console Interface36Using TelnetConnecting to Another Host Using TelnetConfiguring Switch IP ParametersDisconnecting a Telnet SessionControlling Telnet Access3636363839Using Secure Shell 2 (SSH2)Enabling SSH2 for Inbound Switch Access3939Using SNMPAccessing Switch AgentsSupported MIBsConfiguring SNMP SettingsDisplaying SNMP Settings4040414142Authenticating UsersRADIUS Client4343Using ExtremeWare VistaControlling Web AccessSetting Up Your BrowserAccessing ExtremeWare VistaNavigating ExtremeWare VistaSaving ChangesFiltering InformationDo a GET When Configuring a VLANSending Screen Output to Extreme Networks474747484850505151Using the Simple Network Time ProtocolConfiguring and Using SNTPSNTP Configuration CommandsSNTP Example51515454Configuring Ports on a SwitchSummit 300-48 Switch Software User Guide

ContentsChapter 5Chapter 6Port Numbering55Enabling and Disabling Switch PortsConfiguring Switch Port Speed and Duplex SettingSwitch Port Commands555656Load Sharing on the SwitchLoad-Sharing AlgorithmsConfiguring Switch Load SharingLoad-Sharing ExampleVerifying the Load-Sharing Configuration5757585959Switch Port-MirroringPort-Mirroring CommandsPort-Mirroring Example596061Extreme Discovery ProtocolEDP Commands6161Virtual LANs (VLANs)Overview of Virtual LANsBenefits6363Types of VLANsPort-Based VLANsTagged VLANs646466VLAN NamesDefault VLANRenaming a VLAN696970Configuring VLANs on the SwitchVLAN Configuration CommandsVLAN Configuration Examples707071Displaying VLAN Settings71Wireless NetworkingOverview of Wireless NetworkingSummary of Wireless Features7374Wireless Devices74Bridging75Managing Wireless Ports75Configuring RF Properties76Configuring Wireless Switch PropertiesConfiguring Country Codes7878Configuring Wireless Ports79Summit 300-48 Switch Software User Guide5

ContentsChapter 7Chapter 8Chapter 96Configuring Wireless Port Interfaces79Managing Wireless Clients80Show Commands80Event Logging and Reporting81Unified Access SecurityOverview of Security83User Access SecurityAuthenticationPrivacyCipher Suites84848585Network Security PoliciesPolicy DesignPolicy ExamplesPolicies and RADIUS SupportRADIUS Attributes8787888888CLI Commands for Security on the SwitchSecurity Profile Commands8989Example Wireless Configuration Process9193Power Over EthernetOverviewSummary of PoE Features9595Port Power ManagementPort Power Operator LimitPower Budget ManagementPort Power Events96969697Per-Port LEDs98Configuring Power Over Ethernet98Forwarding Database (FDB)Overview of the FDBFDB ContentsFDB Entry TypesHow FDB Entries Get AddedAssociating a QoS Profile with an FDB Entry103103103104104Configuring FDB EntriesFDB Configuration Examples105106Displaying FDB Entries106Summit 300-48 Switch Software User Guide

ContentsChapter 10Chapter 11Chapter 12Access PoliciesOverview of Access PoliciesAccess Control ListsRate Limits107107107Using Access Control ListsAccess MasksAccess ListsRate LimitsHow Access Control Lists WorkAccess Mask Precedence NumbersSpecifying a Default RuleThe permit-established KeywordAdding Access Mask, Access List, and Rate Limit EntriesDeleting Access Mask, Access List, and Rate Limit EntriesVerifying Access Control List ConfigurationsAccess Control List CommandsAccess Control List lity of Service (QoS)Overview of Policy-Based Quality of Service121Applications and Types of QoSVoice ApplicationsVideo ApplicationsCritical Database ApplicationsWeb Browsing ApplicationsFile Server Applications122122122122123123Configuring QoS for a Port or VLAN123Traffic GroupingsAccess List Based Traffic GroupingsMAC-Based Traffic GroupingsExplicit Class of Service (802.1p and DiffServ) Traffic GroupingsConfiguring DiffServPhysical and Logical Groupings124124125126128130Verifying Configuration and PerformanceQoS MonitorDisplaying QoS Profile Information131131132Modifying a QoS Configuration132Traffic Rate-Limiting132Status Monitoring and StatisticsStatus MonitoringSummit 300-48 Switch Software User Guide1337

ContentsChapter 13Chapter 148Port Statistics135Port Errors136Port Monitoring Display Keys137Setting the System Recovery Level137LoggingLocal LoggingRemote LoggingLogging Configuration ChangesLogging Commands138139139140140RMONAbout RMONRMON Features of the SwitchConfiguring RMONEvent Actions142142142143144Spanning Tree Protocol (STP)Overview of the Spanning Tree Protocol145Spanning Tree DomainsDefaultsSTPD BPDU Tunneling145146146STP Configurations146Configuring STP on the SwitchSTP Configuration Example148151Displaying STP Settings151Disabling and Resetting STP152IP Unicast RoutingOverview of IP Unicast RoutingRouter InterfacesPopulating the Routing Table153154154Proxy ARPARP-Incapable DevicesProxy ARP Between Subnets156156156Relative Route Priorities157Configuring IP Unicast RoutingVerifying the IP Unicast Routing Configuration157158IP Commands158Routing Configuration Example162Displaying Router Settings163Summit 300-48 Switch Software User Guide

ContentsAppendix AResetting and Disabling Router Settings163Configuring DHCP/BOOTP RelayVerifying the DHCP/BOOTP Relay Configuration164165UDP-ForwardingConfiguring UDP-ForwardingUDP-Forwarding ExampleICMP Packet ProcessingUDP-Forwarding Commands165165166166166Safety InformationImportant Safety InformationPowerPower CordConnectionsLithium BatteryAppendix BSupported StandardsAppendix CSoftware Upgrade and Boot OptionsAppendix D169169170170171Downloading a New ImageRebooting the Switch175176Saving Configuration ChangesReturning to Factory Defaults176176Using TFTP to Upload the Configuration177Using TFTP to Download the ConfigurationDownloading a Complete ConfigurationDownloading an Incremental ConfigurationScheduled Incremental Configuration DownloadRemember to Save178178178178179Upgrading and Accessing BootROMUpgrading BootloaderAccessing the Bootstrap CLIAccessing the Bootloader CLI179179179180Boot Option Commands181TroubleshootingLEDs183Using the Command-Line InterfacePort ConfigurationVLANsSTP184185186187Summit 300-48 Switch Software User Guide9

ContentsDebug Tracing187TOP Command187Contacting Extreme Technical Support187IndexIndex of Commands10Summit 300-48 Switch Software User Guide

Figures123456789101112131415161718Summit 300-48 Switch Software User GuideExample of a port-based VLAN on the Summit 300-48 switchSingle port-based VLAN spanning two switchesTwo port-based VLANs spanning two switchesPhysical diagram of tagged and untagged trafficLogical diagram of tagged and untagged trafficSample integrated wired and wireless networkPermit-established access list example topologyAccess control list denies all TCP and UDP trafficAccess list allows TCP trafficHost A initiates a TCP session to host BPermit-established access list filters out SYN packet to destinationICMP packets are filtered outEthernet packet encapsulationIP packet header encapsulationMultiple Spanning Tree DomainsTag-based STP configurationRouting between VLANsUnicast routing configuration 5416211

Figures12Summit 300-48 Switch Software User Guide

7282930313233Summit 300-48 Switch Software User GuideNotice IconsText ConventionsExtremeWare Summit 300-48 Factory DefaultsCommand Syntax SymbolsLine-Editing KeysCommon CommandsDefault AccountsDNS CommandsPing Command ParametersSNMP Configuration CommandsRADIUS CommandsMultiselect List Box Key DefinitionsGreenwich Mean Time OffsetsSNTP Configuration CommandsSwitch Port CommandsSwitch Port-Mirroring Configuration CommandsEDP CommandsVLAN Configuration CommandsRF Configuration CommandsRF Profile Property ValuesSwitch-Level Wireless Configuration CommandsSwitch-Level Configuration Property ValuesWireless Port Configuration CommandsWireless Port Configuration Property ValuesWireless Port Interface Configuration CommandsClient Configuration CommandsShow CommandsWi-Fi Security Cipher SuitesAuthentication-Based Network Access ExampleRADIUS Request AttributesRADIUS Response AttributesVendor-Specific AttributesSecurity Profile 78797980808086888889898913

56575859606162636414Security Profile Command Property ValuesPer-Port LEDsPower Over Ethernet Configuration CommandsPoE Show CommandsFDB Configuration CommandsAccess Control List Configuration CommandsTraffic Type and QoS GuidelinesQoS Configuration CommandsTraffic Groupings by Precedence802.1p Priority Value-to-QoS Profile to Hardware Queue Default Mapping802.1p Configuration CommandsDiffServ Configuration CommandsDefault Code Point-to-QoS Profile MappingStatus Monitoring CommandsPort Monitoring Display KeysFault Levels Assigned by the SwitchFault Log SubsystemsLogging CommandsEvent ActionsSTP Configuration CommandsSTP Disable and Reset CommandsRelative Route PrioritiesBasic IP CommandsRoute Table Configuration CommandsICMP Configuration CommandsRouter Show CommandsRouter Reset and Disable CommandsUDP-Forwarding CommandsBootstrap Command OptionsBootloader Command OptionsBoot Option mmit 300-48 Switch Software User Guide

PrefaceThis preface provides an overview of this guide, describes guide conventions, and lists otherpublications that may be useful.IntroductionThis guide provides the required information to install the Summit 300-48 switch and configure theExtremeWare software running on the Summit 300-48 switch.This guide is intended for use by network administrators who are responsible for installing and settingup network equipment. It assumes a basic working knowledge of: Local area networks (LANs) Ethernet concepts Ethernet switching and bridging concepts Routing concepts Internet Protocol (IP) concepts Simple Network Management Protocol (SNMP)NOTEIf the information in the release notes shipped with your switch differs from the information in this guide,follow the release notes.ConventionsTable 1 and Table 2 list conventions that are used throughout this guide.Table 1: Notice IconsIconNotice TypeAlerts you to.NoteImportant features or instructions.Summit 300-48 Switch Software User Guide15

PrefaceTable 1: Notice Icons (continued)IconNotice TypeAlerts you to.CautionRisk of personal injury, system damage,or loss of data.WarningRisk of severe personal injury.Table 2: Text ConventionsConventionDescriptionScreen displaysThis typeface indicates command syntax, or represents informationas it appears on the screen.The words “enter”and “type”When you see the word “enter” in this guide, you must typesomething, and then press the Return or Enter key. Do not press theReturn or Enter key when an instruction simply says “type.”[Key] namesKey names are written with brackets, such as [Return] or [Esc].If you must press two or more keys simultaneously, the key namesare linked with a plus sign ( ). Example:Press [Ctrl] [Alt] [Del].Words in italicized typeItalics emphasize a point or denote new terms at the place wherethey are defined in the text.Related PublicationsThe publications related to this one are: ExtremeWare Release Notes Summit 300-48 Switch Release NotesDocumentation for Extreme Networks products is available on the World Wide Web at the followinglocation: http://www.extremenetworks.com/16Summit 300-48 Switch Software User Guide

1ExtremeWare OverviewThis chapter describes the following topics: Summary of Features on page 17 Security Licensing on page 20 Software Factory Defaults on page 20ExtremeWare is the full-featured software operating system that is designed to run on theSummit 300-48 switch. This section describes the supported ExtremeWare features for the Summit300-48 switch.Summary of FeaturesThe Summit 300-48 switch supports the following ExtremeWare features: Unified Access support Virtual local area networks (VLANs) including support for IEEE 802.1Q and IEEE 802.1p Spanning Tree Protocol (STP) (IEEE 802.1D) Quality of Service (QoS) including support for IEEE 802.1p, MAC QoS, and four hardware queues Wire-speed Internet Protocol (IP) forwarding Extreme Standby Router Protocol (ESRP) - Aware support Diffserv support Access-policy support for routing protocols Access list support for packet filtering Access list support for rate-limiting Load sharing on multiple ports RADIUS client Console command-line interface (CLI) connection Telnet CLI connectionSummit 300-48 Switch Software User Guide17

ExtremeWare Overview SSH2 connection Simple Network Management Protocol (SNMP) support Remote Monitoring (RMON) Traffic mirroring for portsUnified AccessThe Summit 300-48 supports the Unified Access architecture, enabling wired and wireless applicationsacross a completely integrated enterprise infrastructure. With the Altitude product line, the Summit300-48 supports 802.11 WLAN connectivity. Provisioning of Unified Access is completely controlled bythe Summit 300-48.Virtual LANs (VLANs)ExtremeWare has a VLAN feature that enables you to construct your broadcast domains without beingrestricted by physical connections. A VLAN is a group of location- and topology-independent devicesthat communicate as if they were on the same physical local area network (LAN).Implementing VLANs on your network has the following three advantages: They help to control broadcast traffic. If a device in VLAN Marketing transmits a broadcast frame,only VLAN Marketing devices receive the frame. They provide extra security. Devices in VLAN Marketing can only communicate with devices onVLAN Sales using routing services. They ease the change and movement of devices on networks.NOTEFor more information on VLANs, see Chapter 5, “Virtual LANs (VLANs)”.Spanning Tree ProtocolThe Summit 300-48 supports the IEEE 802.1D Spanning Tree Protocol (STP), which is a bridge-basedmechanism for providing fault tolerance on networks. STP enables you to implement parallel paths fornetwork traffic, and ensure that: Redundant paths are disabled when the main paths are operational. Redundant paths are enabled if the main traffic paths fail.A single spanning tree can span multiple VLANs.NOTEFor more information on STP, see Chapter 13, “Spanning Tree Protocol (STP)”.18Summit 300-48 Switch Software User Guide

Software LicensingQuality of ServiceExtremeWare has Quality of Service (QoS) features that support IEEE 802.1p, MAC QoS, and fourqueues. These features enable you to specify service levels for different traffic groups. By default, alltraffic is assigned the “normal” QoS policy profile. If needed, you can create other QoS policies andrate-limiting access control lists and apply them to different traffic types so that they have differentmaximum bandwidth, and priority.NOTEFor more information on Quality of Service, see Chapter 11, “Quality of Service (QoS)”.Load SharingLoad sharing allows you to increase bandwidth and resiliency by using a group of ports to carry trafficin parallel between systems. The sharing algorithm allows the switch to use multiple ports as a singlelogical port. For example, VLANs see the load-sharing group as a single virtual port. The algorithm alsoguarantees packet sequencing between clients.NOTEFor information on load sharing, see Chapter 4, “Configuring Ports on a Switch”.ESRP-Aware SwitchesExtreme switches that are not running ESRP, but are connected on a network that has other Extremeswitches running ESRP are ESRP-aware. When ESRP-aware switches are attached to ESRP-enabledswitches, the ESRP-aware switches reliably perform fail-over and fail-back scenarios in the prescribedrecovery times. No configuration of this feature is necessary.If Extreme switches running ESRP are connected to layer 2 switches that are not manufactured byExtreme Networks (or Extreme switches that are not running ExtremeWare 4.0 or above), the fail-overtimes seen for traffic local to the segment may appear longer, depending on the application involvedand the FDB timer used by the other vendor’s layer 2 switch. As such, ESRP can be used with layer 2switches from other vendors, but the recovery times vary.The VLANs associated with the ports connecting an ESRP-aware switch to an ESRP-enabled switchmust be configured using an 802.1Q tag on the connecting port, or, if only a single VLAN is involved, asuntagged using the protocol filter any. ESRP will not function correctly if the ESRP-aware switchinterconnection port is configured for a protocol-sensitive VLAN using untagged traffic.Software LicensingSummit 300-48 switches support Advanced Edge licensing.Summit 300-48 Switch Software User Guide19

ExtremeWare OverviewSecurity LicensingCertain additional ExtremeWare security features, such as the use of Secure Shell (SSH2) encryption,may be under United States export restriction control. Extreme Networks ships these security features ina disabled state. You can obtain information on enabling these features at no charge from ExtremeNetworks.Obtaining a Security LicenseTo obtain information on enabling features that require export restriction, access the Extreme NetworksSupport website ill out a contact form to indicate compliance or noncompliance with the export restrictions. If you arein compliance, you will be given information that will allow you to enable security features.Security Features Under License ControlExtremeWare version 6.0 and above supports the SSH2 protocol. SSH2 allows the encryption of sessiondata. The encryption methods used are under U.S. export restriction control.Software Factory DefaultsTable 3 shows factory defaults for Summit 300-48 ExtremeWare features.Table 3: ExtremeWare Summit 300-48 Factory DefaultsItemDefault SettingSerial or Telnet user accountadmin with no password and user with no passwordTelnetEnabledSSH2DisabledSNMPEnabledSNMP read community stringpublicSNMP write community stringprivateRMONDisabledBOOTPDisabled on the default VLAN (default)QoSAll traffic is part of the default queue802.1p priorityRecognition enabled802.3x flow controlEnabled on Gigabit Ethernet portsVirtual LANsTwo VLANs predefined. VLAN named default contains allports and belongs to the STPD named s0.802.1Q taggingAll packets are untagged on the default VLAN (default).Spanning Tree ProtocolDisabled for the switch; enabled for each port in the STPD.Forwarding database aging period300 seconds (5 minutes)IP RoutingDisabled20Summit 300-48 Switch Software User Guide

Software Factory DefaultsTable 3: ExtremeWare Summit 300-48 Factory Defaults (continued)ItemDefault SettingIP multicast routingDisabledIGMPEnabledIGMP snoopingDisabledSNTPDisabledDNSDisabledPort MirroringDisabledWirelessEnabledNOTEFor default settings of individual ExtremeWare features, see the applicable individual chapters in thisguide.Summit 300-48 Switch Software User Guide21

ExtremeWare Overview22Summit 300-48 Switch Software User Guide

2Accessing the SwitchThis chapter describes the following topics: Understanding the Command Syntax on page 23 Line-Editing Keys on page 25 Command History on page 26 Common Commands on page 26 Configuring Management Access on page 28 Domain Name Service Client Services on page 31 Checking Basic Connectivity on page 32Understanding the Command SyntaxThis section describes the steps to take when entering a command. Refer to the sections that follow fordetailed information on using the command-line interface (CLI).When entering a command at the prompt, ensure that you have the appropriate privilege level. Mostconfiguration commands require you to have the administrator privilege level. To use the CLI, followthese steps:1 Enter the command name.If the command does not include a parameter or values, skip to step 3. If the command requiresmore information, continue to step 2.2 If the command includes a parameter, enter the parameter name and values.3 The value part of the command specifies how you want the parameter to be set. Values includenumerics, strings, or addresses, depending on the parameter.4 After entering the complete command, press [Return].NOTEIf an asterisk (*) appears in front of the command-line prompt, it indicates that you have outstandingconfiguration changes that have not been saved. For more information on saving configuration changes,see Appendix C, “Software Upgrade and Boot Options”.Summit 300-48 Switch Software User Guide23

Accessing the SwitchSyntax HelperThe CLI has a built-in syntax helper. If you are unsure of the complete syntax for a particular command,enter as much of the command as possible and press [Return]. The syntax helper provides a list ofoptions for the remainder of the command.The syntax helper also provides assistance if you have entered an incorrect command.Command Completion with Syntax HelperExtremeWare provides command completion by way of the [Tab] key. If you enter a partial command,pressing the [Tab] key posts a list of available options, and places the cursor at the end of the command.Abbreviated SyntaxAbbreviated syntax is the most unambiguous, shortest allowable abbreviation of a command orparameter. Typically, this is the first three letters of the command.In command tables throughout this guide, abbreviated syntax is noted using bold characters.NOTEWhen using abbreviated syntax, you must enter enough characters to make the commandunambiguous and distinguishable to the switch.Command ShortcutsAll named components of the switch configuration must have a unique name. Components are namedusing the create command. When you enter a command to configure a named component, you do notneed to use the keyword of the component. For example, to create a VLAN, you must enter a uniqueVLAN name:create vlan engineeringAfter you have created the VLAN with a unique name, you can then eliminate the keyword vlan fromall other commands that require the name to be entered. For example, on the stand-alone switch,instead of entering the commandconfig vlan engineering delete port 1:1-1:3,1:6you could enter the following shortcut:config engineering delete port 1:1-1:3,1:6Summit 300-48 Switch Numerical RangesCommands that require you to enter one or more slot:port numbers on a Summit 300-48 switch use theparameter portlist in the syntax. A portlist can be a range of numbers, for example:port 1:1-1:3You can add additional slot and port numbers to the list, separated by a comma:port 1:1-1:3, 1:6,1:824Summit 300-48 Switch Software User Guide

Line-Editing KeysNamesAll named components of the switch configuration must have a unique name. Names must begin withan alphabetical character and are delimited by whitespace, unless enclosed in quotation marks.SymbolsYou may see a variety of symbols shown as part of the command syntax. These symbols explain how toenter the command, and you do not type them as part of the command itself. Table 4 summarizescommand syntax symbols.Table 4: Command Syntax Symbolsangle brackets Enclose a variable or value. You must specify the variable or value. Forexample, in the syntaxconfig vlan name ipaddress ip address you must supply a VLAN name for name and an address for ip address when entering the command. Do not type the anglebrackets.square brackets [ ]Enclose a required value or list of required arguments. One or morevalues or arguments can be specified. For example, in the syntaxuse image [primary secondary]you must specify either the primary or secondary image when enteringthe command. Do not type the square brackets.vertical bar Separates mutually exclusive items in a list, one of which must beentered. For example, in the syntaxconfig snmp community [readonly readwrite] string you must specify either the read or write community string in thecommand. Do not type the vertical bar.braces { }Enclose an optional value or a list of optional arguments. One or morevalues or arguments can be specified. For example, in the syntaxreboot { date time cancel}you can specify either a particular date and time combination, or thekeyword cancel to cancel a previously scheduled reboot. If you do notspecify an argument, the command will prompt, asking if you want toreboot the switch now. Do not type the braces.Line-Editing KeysTable 5 describes the line-editing keys available using the CLI.Table 5: Line-Editing KeysSymbolDescriptionBackspaceDeletes character to left of cursor and shifts remainder of line to left.Delete or [Ctrl] DDeletes character under cursor and shifts remainder of line to left.[Ctrl] KDeletes characters from under cursor to end of line.[Ctrl] UClears all characters typed from cursor to beginning of line.Summit 300-48 Switch Software User Guide25

Accessing the SwitchTable 5: Line-Editing Keys (continued)SymbolDescription[Ctrl] WDeletes previous word.InsertToggles on and off. When toggled on, inserts text and shifts previoustext to right.Left ArrowMoves cursor to left.Right ArrowMoves cursor to right.Home or [Ctrl] AMoves cursor to first character in line.End or [Ctrl] EMoves cursor to last character in line.[Ctrl] LClears screen and movers cursor to beginning of line.[Ctrl] P orUp ArrowDisplays previous command in command history buffer and places cursorat end of command.[Ctrl] N orDown ArrowDisplays next command in command history buffer and places cursor atend of command.Command HistoryExtremeWare “remembers” the last 49 commands you entered. You can display a list of thesecommands by using the following command:historyCommon CommandsTable 6 describes common commands used to manage the switch. Commands specific to a particularfeature are described in the other chapters of this guide.Table 6: Common CommandsCommandDescriptionclear session number Terminates a Telnet session from theswitch.config account username {encrypted}{ password }Configures a user account password.Passwords must have a minimum of 1character and can have a maximum of 32characters. User names and passwordsare case-sensitive.config bannerConfigures the banner string. You canenter up to 24 rows of 79-column text thatis displayed before the login prompt ofeach session. Press [Return] at thebeginning of a line to terminate thecommand and apply the banner. To clearthe banner, press [Return] at the beginningof the first line.config ports portlist auto off {speed [10 100 1000]} duplex [half full]Manually configures the port speed andduplex setting of one or more ports on aswitch.config ssh2 key {pregenerated}Generates the SSH2 host key.26Summit 300-48 Switch Software User Guide

Common CommandsTable 6: Common Commands (continued)CommandDescriptionconfig sys-recovery-level [none critical all]Configures a recovery option for instanceswhere an exception occurs inExtremeWare. Specify one of thefollowing: none — Recovery without systemreboot. critical — ExtremeWare logs anerror to the syslog, and reboots thesystem after critical exceptions. all — ExtremeWare logs an error tothe syslog, and reboots the systemafter any exception.The default setting is none.config time date time Configures the system date and time. Theformat is as follows:mm/dd/yyyy hh:mm:ssThe time uses a 24-hour clock format. Youcannot set the year past 2036.config timezone gmt offset {autodst noautodst}Configures the time zone information tothe configur

Using Access Control Lists 107 Access Masks 108 Access Lists 108 Rate Limits 109 How Access Control Lists Work 109 Access Mask Precedence Numbers 110 Specifying a Default Rule 110 The permit-established Keyword 111 Adding Access Mask, Access List, and Rate Limit Entries 111 Deleting Access Mask, Access List, and Rate Limit Entries 112

Related Documents:

Summit X440-48t-10G 9.1 lb (4.130 kg) Height: 1RU, 1.73 inches (4.4 cm) Width: 17.4 inches (44.1 cm) Summit X440-48p-10G 10.6 lb (4.830 kg) Depth: 10.0 inches (25.4 cm) Weight and Physical Dimensions Switch Model Minimum ( 30 C) Maximum ( 30 C) Summit X440-8t 0 RPM 0 RPM Summit X440-8p 6800 RPM 11000 RPM Summit X440-24t 0 RPM 11000 RPM

Summit X480 – Data Sheet 1 DATA SHEET Summit X480 Series The Summit X480 series switch is a versatile, high-end Ethernet switch for data center, enterprise aggregation, and Carrier Ethernet deployments. Summit X480 helps optimize application performance for a variety of network deployments with its rich features and high scalability.

Thermal magnetic switch DIP (Dual In-line Package) Encapsulated switches Switch with delayed opening Double switch bipolar Time switch Timer Electronic limiter Mercury switch Inclination or motion detector Closed switch Switch delay when opening and closing Double limit switch

134-1400 LS EP Switch 265-1002 134-1402 LS EP Switch 265-1006 Original Part No. Mfg. Description Part No. 134-1403 LS EP Switch 265-1005 134-1404 LS EP Switch 265-1002 134-1405 LS EP Switch 265-1004 134-1406 LS EP Switch 265-1003 134-1407 LS EP Switch 265-1006 134-1452 LS Pressure Elec. Switch 134-1451 134-1456 LS Pressure Elec. Switch 134-1451 .

failover capability with n-1 master redundancy, distributed Layer 2 and Layer 3 switching, link aggregation across the stack and distributed uplinks. SummitStack supports up to eight units in a stack, and the mixture of the units can be Summit X250e, Summit X450e, Summit X450a, Summit X480 and Summit X650 switches. It provides

Summit X440-8t 5.8 lb (2.640 kg) Height: 1RU, 1.73 inches (4.4 cm) Width: 12.0 inches (30.5 cm) Summit X440-8p 6.7 lb (3.035 kg) Depth: 10.3 inches (26.1 cm) Summit X440-24t 8.4 lb (3.825 kg) Height: 1RU, 1.73 inches (4.4 cm) Width: 17.4 inches (44.1 cm) Depth: 10.0 inches (25.4 cm) Summit X440-24p 9.8 lb (4.465 kg) Summit X440-24x 8.4 lb (3 .

Summit X620–8t-2x EXOS v22.3.1.4-patch1CC-2 Summit X440-G2 Series Summit X440-G2-12t-10GE4 EXOS v22.3.1.4-patch1CC-2 . Extreme Networks Summit Series Switches Security Target 6 of 70 Series Platform Build Summit X440-G2-12p-10GE4 EXOS v22.3.1.4-patch1CC-2

Logo Included in attendee acquisition emails Logo & link on Summit website 250 word company description on Summit website and mobile app SUMMIT ACCESS EXPERIENCE Five (5) Full Summit Passes One 10 x10 exhibit space Dedicated meeting room for three (3) days of the Summit (room includes a screen and projector and