GS716Tv2 and GS724Tv3 Software Administration Manual

NETGEAR, Inc. 350 E. Plumeria Drive San Jose CA 95134 USA

202-10484-01 July 2009

© 2007, 2008, 2009 by NETGEAR, Inc. All rights reserved. FullManual.

Technical Support
Please refer to the support information card that shipped with your product. By registering your product at http://www.netgear.com/register, we can provide you with faster expert technical support and timely notices of product and software upgrades. NETGEAR, INC. Support Information Phone: 1-888-NETGEAR, for US & Canada only. For other countries, see your Support information card. E-mail: support@netgear.com North American NETGEAR website: http://www.netgear.com

Trademarks
NETGEAR, the NETGEAR logo, and Auto Uplink are trademarks or registered trademarks of NETGEAR, Inc. Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation.Other brand and product names are registered trademarks or trademarks of their respective holders. Portions of this document are copyright Intoto, Inc. July 2009

Statement of Conditions
In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to make changes to the products described in this document without notice. NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.

Certificate of the Manufacturer/Importer
It is hereby certified that the Gigabit Smart Switch has been suppressed in accordance with the conditions set out in the BMPT-AmtsblVfg 243/1991 and Vfg 46/1992. The operation of some equipment (for example, test transmitters) in accordance with the regulations may, however, be subject to certain restrictions. Please refer to the notes in the operating instructions. The Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for compliance with the regulations.

Bestätigung des Herstellers/Importeurs
Es wird hiermit bestätigt, daß dasGigabit Smart Switch gemäß der im BMPT-AmtsblVfg 243/1991 und Vfg 46/1992 aufgeführten Bestimmungen entstört ist. Das vorschriftsmäßige Betreiben einiger Geräte (z.B. Testsender) kann jedoch gewissen Beschränkungen unterliegen. Lesen Sie dazu bitte die Anmerkungen in der Betriebsanleitung. Das Bundesamt für Zulassungen in der Telekommunikation wurde davon unterrichtet, daß dieses Gerät auf den Markt gebracht wurde und es ist berechtigt, die Serie auf die Erfüllung der Vorschriften hin zu überprüfen.

Voluntary Control Council for Interference (VCCI) Statement
This equipment is in the Class B category (information equipment to be used in a residential area or an adjacent area thereto) and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing

ii v1.0, July 2009

Equipment and Electronic Office Machines aimed at preventing radio interference in such residential areas. When used near a radio or TV receiver, it may become the cause of radio interference. Read instructions for correct handling.

Product and Publication Details
Model Number: Publication Date: Product Family: Product Name: Home or Business Product: Language: Publication Part Number: Publication Version Number: GS716T and GS724T July 2009 GS716T/GS724T Series Smart Switch Gigabit Smart Switch Business English 202-10484-01 1.0

iii v1.0, July 2009

iv v1.0, July 2009

..............................................................................1-2 SmartWizard Discovery in a Network with a DHCP Server ...............................1-14 Common Parameter Values .................................................................................1-7 Exit ........................................................... xi Conventions.................................................................................................................................................... xiv Revision History ........................................................0...............................................................................................................1-15 Interface Naming Convention .........................................................................................................................Contents GS716Tv2 and GS724Tv3 Software Administration Manual About This Manual Audience .....1-6 Password Change .............................. Formats and Scope .......................1-4 Manually Assigning Network Parameters ...........................................................................................1-5 Configuring the Network Settings on the Administrative System .........................................................................................1-3 SmartWizard Discovery in a Network without a DHCP Server .............. xv Chapter 1 Getting Started Connecting the Switch to the Network .................................................................................................................................................1-7 Firmware Upgrade .............................................................1-8 Understanding the User Interfaces ...........1-9 Using the Web Interface .................................................................................................................... xi Organization ................1-6 SmartWizard Discovery Utilities ...........................................1-16 v v1...................... July 2009 ....................................................... xii How to Use This Manual ........1-1 Switch Management Interface ..................................................................................................................................................................................................................................................1-9 Using SNMP .............................................................................................................................................. xiv How to Print this Manual ...................................

......................................................................2-30 Chapter 3 Configuring Switching Information Configuring and Viewing Device Port Information .......................2-24 Local Information .....................................................................................................................................................................................2-20 SNMP v3 User Configuration ..........................................................................................................2-23 LLDP Configuration .......................................................................................................................................................3-8 LACP Port Configuration .....................................................2-3 Time ..................................................................................................................2-5 Time Configuration ..............................3-1 Flow Control .............................................................................3-7 LACP Configuration .....................................................................................................................2-1 Defining System Information .......................................3-4 Creating LAGs ................3-10 VLAN Membership Configuration ..................................2-27 Neighbors Information ........................................................................................................................................................................................... July 2009 ...........................................................2-19 Trap Flags ....................2-16 Community Configuration .....................................................................................................................................................................................................................................................................................................................................................................................................2-15 SNMP V1/V2 ...........................................................3-10 VLAN Configuration .............................................................2-3 Network Connectivity ........................................................................................................................................................................................................3-5 LAG Configuration .....2-13 Green Ethernet Configuration ................................................2-10 SNTP Server Status .......................................................................................................................................................................2-8 SNTP Server Configuration .........3-1 Port Configuration ........2-23 LLDP Port Settings ...............................................................................................................2-11 Denial of Service ............................................................................................................................3-12 vi v1........................................................2-17 Trap Configuration ........................................................................................................2-21 LLDP .............................................................................................3-9 Managing VLANs .........................3-5 LAG Membership ..........................GS716Tv2 and GS724Tv3 Software Administration Manual Chapter 2 Configuring System Information System Information ....................................................................................................................................................................2-6 SNTP Global Status .....................0.........................................................................................

................3-42 IGMP Snooping Querier Configuration ..........................................................................3-52 Chapter 4 Configuring Quality of Service Configuring Class of Service ...........................................................................................4-6 DSCP to Queue Mapping ...................................................3-31 Configuring IGMP Snooping ...........3-32 IGMP Snooping Interface Configuration ................................3-21 CST Port Status ...................................3-27 STP Statistics ..................................................................3-43 IGMP Snooping Querier VLAN Configuration ..........................................................................................................3-47 Searching the MAC Address Table ....................3-45 Searching and Configuring the Forwarding Database ........................................4-1 Basic CoS Configuration ................................................................................................................................................3-17 CST Configuration .3-39 IGMP Snooping VLAN Configuration ...........3-26 MST Port Configuration .............................................................................................................................................3-37 MFDB Statistics ........................................................4-2 CoS Interface Configuration ..............................................................................................................................................................................................................................................3-35 IGMP Snooping Table ...............................................................................................4-3 Interface Queue Configuration .............................................................................3-50 Static MAC Address .......................................................................................3-40 Configuring IGMP Snooping Queriers ......................1p to Queue Mapping ...........................................................................................................3-16 STP Switch Configuration/Status .................................................................................................................................3-47 Dynamic Address Configuration .................................................................................................................................................................................................................................................................................................................................................................................3-23 Rapid STP Configuration ............................................................3-36 MFDB Table .......................................... July 2009 ...................................4-7 vii v1............................................................3-14 Configuring Spanning Tree Protocol ............................................0......................................................3-19 CST Port Configuration ...................................3-34 Viewing Multicast Forwarding Database Information ...........................................................................................................................................3-44 IGMP Snooping Querier VLAN Status .....GS716Tv2 and GS724Tv3 Software Administration Manual Port VLAN ID Configuration .............3-49 MAC Address Table ........................................4-5 802.........................................................3-32 Global Configuration .....................................................................................................3-24 MST Configuration .............................................

.....................................................................5-33 Port Security Configuration .............5-30 MAC Filter Configuration .................0.....5-22 802...................................................................................................................................................................................5-44 MAC Binding Table ......................................................................................................................................................................5-34 Port Security Interface Configuration ..................................................5-37 Protected Ports Membership ..............................................................................5-24 Port Summary .................................................................................................................................5-18 Access Profile Configuration ...........................................................................................................................................5-2 RADIUS Configuration ..................................................5-13 Configuring Management Access ...................................................................................................GS716Tv2 and GS724Tv3 Software Administration Manual Chapter 5 Managing Device Security Management Security Settings ..........................................................................................................5-19 Access Rule Configuration ........................................................................................................................................................................................5-35 Security MAC Address ............................5-40 MAC Rules ...........................................................................................................................................................................................................................................................................................5-10 Authentication List Configuration ................................5-15 Secure HTTP Configuration ............5-3 Configuring TACACS+ ..........................5-56 viii v1....................................................5-39 MAC ACL .5-42 MAC Binding Configuration .......................................................................................................................................................................................................................5-32 Storm Control .................................................................................................................................................................................................................................1X Configuration ................5-54 IP Binding Table .......................................................................................................5-30 MAC Filter Summary ...............................................................................................................5-28 Traffic Control ....................5-50 IP Binding Configuration ...................5-47 IP Rules ........5-23 Port Authentication .....................................................................5-15 HTTP Configuration ..............................................................................................................................................................................................................................5-16 Certificate Download .........................................5-21 Port Authentication ...............................................5-38 Configuring Access Control Lists .... July 2009 ........................................................................................................................................5-1 Change Password ...........................................5-48 IP Extended Rule .....................................................................................5-45 IP ACL .........

...........................................7-2 Upload File From Switch .................................. A-1 GS7xxTR Gigabit Smart Switch Features and Defaults ...................7-10 Viewing the Dual Image Status .......................................................................................................................................6-1 Viewing Port Statistics ..........................................................................................................................................................6-16 Server Log Configuration ..........0..................................................................................................................................................................7-8 File Management ....................................................................................................................................................................................................................................................................................................................................GS716Tv2 and GS724Tv3 Software Administration Manual Chapter 6 Monitoring the System Switch Statistics ...............6-4 Port Statistics .................................................................6-22 Configuring Port Mirroring .................................................................................................6-21 Event Logs .......................................................................6-14 Memory Logs .........................................................................................................................................................................................................................................................................................................7-13 TraceRoute .................................7-12 Troubleshooting ....7-14 Appendix A Hardware Specifications and Default Values GS7xxT Gigabit Smart Switch Specifications ................................................................................................................................................................................7-3 Uploading Files ..6-23 Chapter 7 Maintenance Reset .....................................................................................6-19 Trap Logs .................................................................................................................................................................6-23 Multiple Port Mirroring ..7-5 Download File To Switch ..........................................................................................................6-4 Port Detailed Statistics ......... A-2 ix v1......................................................................................................................................................................7-10 Dual Image Configuration ...............6-12 Managing Logs ..............................7-13 Ping ..................................................................................................................................................................7-6 HTTP File Download ..................................................................................7-1 Rebooting the Switch .......................................................................................................................................................................6-14 FLASH Log Configuration ...... July 2009 ..........................................................................................................................................7-5 TFTP File Download .............................7-1 Reset Configuration to Defaults ..6-5 EAP Statistics ..............

.............................................................. B-1 VLAN Example Configuration ........................ B-2 Access Control Lists (ACLs) ......... B-4 MAC ACL Example Configuration ..................................................................................... B-6 802.........................................................................................................................................1X Example Configuration ............0....................................................GS716Tv2 and GS724Tv3 Software Administration Manual Appendix B Configuration Examples Virtual Local Area Networks (VLANs) ........................... B-8 802.................................................................................................................................................................... B-13 Index x v1............................... B-11 MSTP Example Configuration ........................ July 2009 ............................................................... B-10 MSTP .................. B-5 Standard IP ACL Example Configuration ......................................1X ...............................................

a greater level of configuration —anywhere from the basic up to the maximum possible—will give your network the full benefit of the switch’s features. Organization The GS716Tv2 and GS724Tv3 Software Administration Manual contains the following chapters: • • • • Chapter 1.About This Manual The NETGEAR® GS716Tv2 and GS724Tv3 Software Administration Manual describes how to configure and operate the Gigabit Smart Switch using its included software features by using the Web-based graphical user interface (GUI). Chapter 4. “Configuring System Information” on page 2-1 describes how to configure administrative features such as SNMP. Chapter 3. xi v1. “Configuring Switching Information” on page 3-1 describes how to manage and monitor the layer 2 switching features. However. “Getting Started”on page 1-1 contains information about performing the initial system configuration and accessing the user interface. it will function in a network using its remaining factory default parameters. The book describes the software configuration procedures and explains the options available within those procedures. you should have basic knowledge of Ethernet and networking concepts. Audience The information in this guide is intended for any of the following individuals: • • System administrators who are responsible for configuring and operating a network using GS716T/GS724T Smart Switch software Level 1 and/or Level 2 Support providers To obtain the greatest benefit from this guide. When the basic configuration of the switch is performed. Chapter 2. The Web interface simplifies this configuration at all levels.0. “Configuring Quality of Service” on page 4-1 describes how to manage the GS716T/GS724T software ACLs. and how to configure the Differentiated Services and Class of Service features. July 2009 . and port information. DHCP.

and to configure how the switch monitors events. July 2009 . formats. Conventions. Chapter 6. “Managing Device Security” on page 5-1 contains information about configuring switch security information such as port access control. and scope of this manual are described in the following paragraphs: • Typographical Conventions.GS716Tv2 and GS724Tv3 Software Administration Manual • Chapter 5. IP addresses. “Configuration Examples” on page B-1 contains examples of how to configure various features on the GS716T/GS724T switch. Appendix B. CDs. This manual uses the following formats to highlight special messages: Note: A note provides more information about a feature or technology. This manual uses the following typographical conventions: Italic Bold Fixed italic Emphasis. GUI screen text Command prompt. books. xii v1. CLI text. extensions User input. Chapter 7. such as VLAN and Access Control List (ACL) configuration examples. code URL links • Formats. TACACS+. “Maintenance” on page 7-1 describes features to help you manage the switch. Appendix A. • • • • Note: Refer to the GS716T/GS724T Series Smart Switch for information about issues and workarounds. “Monitoring the System” on page 6-1 describes how to view a variety of information about the switch and its port. and RADIUS server settings.0. file and server names. “Hardware Specifications and Default Values” on page B-1 contains hardware specifications and default values on the GS716T/GS724T switch. Formats and Scope The conventions.

Inc. combination of settings. website at http://kb. events.netgear. website at http://kb.com/app/products/list/p3/322.GS716Tv2 and GS724Tv3 Software Administration Manual Tip: This format is used to highlight a procedure that will save time or resources. • Scope. Warning: A caution provides information about critical aspects of the configuration. July 2009 . security. This manual is written for the Smart Switch according to these specifications: Product Version Manual Publication Date GS716T and GS724T Gigabit Smart Switch July 2009 Note: Product updates for the GS716T are available on the NETGEAR. Inc. Failure to take heed of this notice may result in personal injury or death. xiii v1.netgear. Danger: This is a safety warning. Product updates for the GS724T are available on the NETGEAR. or procedures that can adversely affect network connectivity.0.com/app/products/list/p3/322. and so on.

0. The PDF version of the complete manual opens in a browser window. online knowledge base for the product • • Links to PDF versions of the full manual and individual chapters.adobe. at a time and . July 2009 . • • Printing a Page from HTML. How to Print this Manual To print this manual. Click the print icon in the upper left of your browser window. The PDF version of the chapter you were viewing opens in a browser window. • – Printing a PDF version of the Complete Manual. xiv v1. Double-click on a link in the table of contents or index to navigate directly to where the topic is described in the manual. for browsing forwards or backwards through the manual one page A button that displays the table of contents and an button. Use the PDF of This Chapter link at the top left of any page. button to access the full NETGEAR.GS716Tv2 and GS724Tv3 Software Administration Manual How to Use This Manual The HTML version of this manual includes the following: • • Buttons. Your computer must have the free Adobe Acrobat reader installed in order to view and print PDF files.com. The Acrobat reader is available on the Adobe Web site at http://www. – Printing a PDF Chapter. Each page in the HTML version of the manual is dedicated to a major topic. • Click the Complete PDF Manual link at the top left of any page in the manual. you can choose one of the following options. Use the Complete PDF Manual link at the top left of any page. • Click the PDF of This Chapter link at the top left of any page in the chapter you want to print. according to your needs. Select File  Print from the browser menu to print the page contents. Inc. Printing from PDF. A model.

0 xv v1. Revision History Part Number Version Date Number July 2009 Description Product Created 202-10484-01 1. July 2009 .0.GS716Tv2 and GS724Tv3 Software Administration Manual • Click the print icon in the upper left of your browser window. you can save paper and printer ink by selecting this feature. Tip: If your printer supports printing two pages on a single sheet of paper.

July 2009 .0.GS716Tv2 and GS724Tv3 Software Administration Manual xvi v1.

To access the switch over a network. you need to make a connection to the switch so that you can do one of the following: • • Manually configure network information for the management interface. and DHCP is enabled by default. or Enable the management interface as a DHCP or BOOTP client on your network (if not already enabled) and then view the network information after it is assigned by the DHCP server. 1-1 v1. You can assign the IP information automatically by using a BOOTP or DHCP server.168. After you perform the physical hardware installation. you must first configure it with network information (an IP address.0. and default gateway). The switch comes up with a default IP address of 192.Chapter 1 Getting Started This chapter provides an overview of starting your NETGEAR GS716T/GS724T Gigabit Smart Switch and accessing the user interface. After you configure network information. This chapter contains the following sections: • • • • • • “Connecting the Switch to the Network” on page 1-1 “Switch Management Interface” on page 1-2 “SmartWizard Discovery in a Network with a DHCP Server” on page 1-3 “SmartWizard Discovery in a Network without a DHCP Server” on page 1-4 “SmartWizard Discovery Utilities” on page 1-6 “Understanding the User Interfaces” on page 1-9 Connecting the Switch to the Network To enable remote management of the switch through a Web browser or SNMP. and the switch is physically and logically connected to the network. such as the IP address and subnet mask. It also leads you through the steps to use the SmartWizard Discovery utility. subnet mask. you can manage and monitor the switch remotely through a Web browser or an SNMP-based network management system.239. July 2009 .0. you must connect the switch to the network.

the SmartWizard Discovery utility enables you to configure its basic network parameters without prior knowledge of the IP address or subnet mask. BOOTP. Power on the switch.168. Configure network information. After the switch is connected to the network. When you power up your switch for the first time. this program leads you into the Web user interface. 1-2 v1. Windows 2000. You should then be able to select the IP Configuration. see “SmartWizard Discovery in a Network with a DHCP Server” on page 1-3 or “SmartWizard Discovery in a Network without a DHCP Server” on page 1-4.0. SmartWizard Discovery Utility Management Method SmartWizard Discovery utility • • • • • No IP address or subnet mask setup needed Discover all switches on the network User-friendly interface under Microsoft Windows Firmware upgrade capability Password change feature (available at the application level.239. July 2009 Getting Started . 3. you can use the default IP address for remote access to the switch by using a Web browser and logging in to the Web interface. 2. under the System  Management  IP Configuration menu. when the switch is not at the boot level) • Provides entry to Web configuration of switch For more details about the SmartWizard Discovery utility. that is. Switch Management Interface NETGEAR provides the SmartWizard Discovery utility with this product. The switch comes up with a default IP address of 192.GS716Tv2 and GS724Tv3 Software Administration Manual Follow these steps: 1. This program runs under Microsoft® Windows® XP. or Windows Vista® and provides a front end that discovers the switches on your network segment. Table 1-1. Following such configuration. Table 1-1 shows some features of the SmartWizard Discovery utility.0. or DHCP IP assignment. for either Static.

Start the SmartWizard Discovery utility. The SmartWizard Discovery utility displays a login window similar to Figure 1-2 on page 1-4. 4. You should see a screen similar to the one shown in Figure 1-1. Make a note of the displayed IP address assigned by the DHCP server. Then click the Web Access button. Select your switch by clicking the line that shows it. Click Discover for the SmartWizard Discovery utility to find your GS716T or GS724T switch.0. Connect the Gigabit Smart Switch to a DHCP network. Getting Started v1. You will need this value to access the switch directly from a Web browser (without using the SmartWizard Discovery utility). use the following steps: 1.GS716Tv2 and GS724Tv3 Software Administration Manual SmartWizard Discovery in a Network with a DHCP Server To install the switch in a network with a DHCP server. 3. 7. 5. 2. July 2009 1-3 . Figure 1-1 6. Power on the switch by connecting its AC-DC power adapter. Install the SmartWizard Discovery utility on your computer.

July 2009 Getting Started . SmartWizard Discovery in a Network without a DHCP Server This section describes how to set up your switch in a network without a DHCP server. The default password is password. Then use this page to proceed to management of the switch covered in “Using the Web Interface” on page 1-9.0. and is divided into the following tasks: • • “Manually Assigning Network Parameters” on page 1-5 “Configuring the Network Settings on the Administrative System” on page 1-6 1-4 v1.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 1-2 Use your Web browser to manage your switch.

Connect the GS716T or GS724T Gigabit Smart Switch to your existing network. 3. gateway IP address and subnet mask.168. July 2009 1-5 . You should see a screen similar to Figure 1-1 on page 1-3. Getting Started v1. 2. you can assign it a static IP address. even if your network has DHCP service. Please ensure that your PC and the GS716T or GS724T Gigabit Smart Switch are in the same subnet.239). Install the SmartWizard Discovery utility on your computer. 6. Select the switch. 5. Choose the Disable radio box to disable DHCP. A screen similar to Figure 1-3 appears. 4.0. Click Discover for the SmartWizard Discovery utility to find your GS716T or GS724T switch. (Default IP is 192.GS716Tv2 and GS724Tv3 Software Administration Manual Manually Assigning Network Parameters If your network has no DHCP service. and then type your password and click Set. If you choose. 8. then click Configuration Setting. Enter your chosen switch IP address. you must assign a static IP address to your switch. Figure 1-3 7.0. Start the SmartWizard Discovery utility. To assign a static IP address: 1. Power on the switch by plugging in the AC-DC power adapter. Make a note of these settings for later use.

The subnet mask value should be identical to that set in the switch. Figure 1-4 To modify your NIC settings: 1. access the MS Windows operating system TCP/IP Properties.0. although they do not appear in the Windows view. SmartWizard Discovery Utilities Alternatively. Set the IP address and subnet mask appropriately. you can access additional functions from the SmartWizard Discovery utility’s main page. For comparison. 2. The PC IP address must be different from that of the switch but lie in the same subnet. The additional functions include the following: 1-6 v1. On your PC. July 2009 Getting Started . refer to the settings pages of the switch shown in Figure 1-1 on page 1-3 and in Figure 1-3 on page 1-5. shown in Figure 1-1 on page 1-3.GS716Tv2 and GS724Tv3 Software Administration Manual Configuring the Network Settings on the Administrative System The settings of your network interface card (NIC) under the MS Windows OS are made with entries into Windows screen pages similar to the ones shown in Figure 1-4. You need Windows Administrator privileges to change these settings.

Firmware Upgrade The application software for the GS716T/GS724T Gigabit Smart Switch is upgradeable. See “Download File To Switch” on page 7-5. when the switch is not at the boot level. i. To upgrade your firmware: 1. This procedure uses the TFTP protocol to implement the transfer from computer to switch. Click Password Change from the Switch Setting section.e. You can set a new password. 2. The upgrade procedure and the required equipment are described below. The Password Change screen appears. Click Set to enable the new password. The following screen appears: Getting Started v1.GS716Tv2 and GS724Tv3 Software Administration Manual • • “Password Change” on page 1-7 “Firmware Upgrade” on page 1-7 Password Change To set a new password: 1. This procedure assumes that you have downloaded or otherwise obtained the firmware upgrade and that you have it available as a binary file on your computer. Note: Password Change is only available at the application level. enabling your switch to take advantage of improvements and additional features as they become available. after you have selected the switch to upgrade.0. Click Firmware Upgrade from the main screen (see Figure 1-1 on page 1-3). You can set a new password of up to 20 ASCII characters. Note: You can also upgrade the firmware using the TFTP Download and HTTP Download features mentioned in this book. July 2009 1-7 . you are required to enter the old password and to confirm the new one. In this process.

Shows upgrading in progress. If you do not know the location. you can click Browse to locate the file. Click Start to begin loading the upgrade. Start Upgrade. July 2009 Getting Started .0. Note: It is important that you do not power-off the PC or the Switch while the Firmware upgrade is in progress. Upgrade Password. Enter your password. When the process is complete. The system software is automatically loaded. Enter the following values into the appropriate places in the form: • • • Product Assigned Firmware.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 1-5 2. the switch automatically reboots. Exit Click Exit from the Switch Setting section to close the SmartWizard Discovery utility. The location of the new firmware. 3. the default password is ‘password’. 1-8 v1. then click Apply.

July 2009 1-9 . as shown in Figure 1-6 on page 1-10. or later HTTP version 1. Passwords are case sensitive. Using the Web Interface To access the switch by using a Web browser.0.1. Getting Started v1. Open a Web browser and enter the IP address of the switch in the Web browser address field.0. 2. and then click Login. Type the password into the field on the login screen. The GS716Tv2 and GS724Tv3 Software Administration Manual describes how to use the Webbased interface to manage and monitor the system. or later Java Runtime Environment 1.GS716Tv2 and GS724Tv3 Software Administration Manual Understanding the User Interfaces GS716T/GS724T software includes a set of comprehensive management functions for configuring and monitoring the system by using one of the following methods: • • Web user interface Simple Network Management Protocol (SNMP) Each of the standards-based management methods allows you to configure and monitor the components of the GS716T/GS724T software.6 or later Use the following procedures to log on to the Web interface: 1. the browser must meet the following software requirements: • • • HTML version 4. The factory default password is password. The method you use to manage the system depends on your network size and requirements. and on your preference.

0. 1-10 v1. July 2009 Getting Started . After the system authenticates you. the System Information page displays.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 1-6 3.

When you select a tab. and configuration and status HTML pages. Getting Started v1. and the tabs at the top that provide access to all the configuration functions of the switch and remain constant. Figure 1-8 on page 1-12 shows an example of a folder. July 2009 1-11 . or retracted to hide the feature's components. The tabs give you quick access to the various device functions. the configuration status and options. or a combination of both. The tree consists of a combination of folders. its hierarchical-tree view is on the left side of the Web interface. Each Web page contains three main areas: navigation tree on the left. Click the folder to view the options in that folder.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 1-7 shows the layout of the GS716T/GS724T software Web interface. The branches in the navigation tree can be expanded to view all the components under a specific feature. The tree view contains a list of various device features. Logout Button Help LInk Help Page Navigation Tree Configuration Status and Options Figure 1-7 Navigation Tabs The navigation tabs are along the top of the Web interface. Each folder contains either subfolders or HTML pages.0. subfolders.

and HTML page in the navigation menu. July 2009 Getting Started . Common Command Buttons Button Add Apply Cancel Delete Refresh Logout Function Click Add to update the switch with the values on a screen. Clicking the Logout button ends the session. Clicking the Refresh button refreshes the page with the latest information from the device. On pages that contain configuration options. Each page contains access to the HTML-based help that explains the fields and configuration options for the page. Many pages also contain command buttons. select it and click Delete. Folder HTML Page Figure 1-8 Configuration and Monitoring Options The panel directly under the tabs and to the right of the navigation menu displays the configuration information or status for the page you select. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. it becomes preceded by a down arrow symbol and. When you click a folder or subfolder. 1-12 v1. If you click an HTML page. if there is a subfolder. you can input information into fields or select options from drop down menus.0. the folder expands to display the contents.GS716Tv2 and GS724Tv3 Software Administration Manual subfolder. Clicking the Apply button sends the updated configuration to the switch. To remove a configured item. Table 1-2 shows the following command buttons are used throughout the pages in the Web interface: Table 1-2. a new page displays in the main frame. Configuration changes take effect immediately.

The port coloring indicates whether a port is currently active.0. This graphic provides an alternate way to navigate to configuration and monitoring options. table information. The Device View is available from the System Device View page. and feature components. or red indicates that the link is disabled. Figure 1-10 Getting Started v1. July 2009 1-13 . Figure 1-9 shows the Device View of the system. current configuration and status. The graphic also provides information about device ports.GS716Tv2 and GS724Tv3 Software Administration Manual Device View The Device View is a Java® applet that displays the ports on the switch. Green indicates that the port is enabled. Click the menu option to access the page that contains the configuration or monitoring options. Figure 1-9 Click the port you want to view or configure to see a menu that displays statistics and configuration options. red indicates that an error has occurred on the port.

This menu contains the same option as the navigation tabs at the top of the page. if the IP Addressing page is open. but do not click a specific port.GS716Tv2 and GS724Tv3 Software Administration Manual If you click the graphic. you can configure SNMP groups and users that can manage traps that the SNMP agent generates. Figure 1-7 on page 1-11 shows the location of the Help link on the Web interface. July 2009 Getting Started . User-Defined Fields User-defined fields can contain 1-159 characters. All characters may be used except for the following (unless specifically noted in for that feature): \ / * ? < >| | Using SNMP For GS716T/GS724T software that includes the SNMP module. unless otherwise noted on the configuration Web page. the main menu appears. 1-14 v1. which contains information to assist in configuring and managing the switch. For example. The online help pages are context sensitive. Figure 1-11 Help Page Access Every page contains a link to the online help . the help topic for that page displays if you click Help. as Figure 1-11 shows.0.

Click Apply. To access configuration information for SNMPv1 or SNMPv2. Empty strings (“”) are not valid user-defined strings. 2. IF-MIB. All private MIBs begin with a “-” prefix. Table 1-3. Navigate to the System  SNMP  SNMPv3  User Configuration page. which is the page that displays after a successful login. enclose the name value in double quotes. To use spaces as part of a name parameter. Then. which is a private MIB. click System  SNMP  SNMPv1/v2 and click the page that contains the information to configure. displays the information you need to configure an SNMP manager to access the switch. For example. which is either MD5 or SHA.c. therefore there is only one profile that can be created or modified. Table 1-3 describes common parameter values and value formatting. 3. To enable encryption. Parameter Descriptions Parameter ipaddr Description This parameter is a valid IP address. SNMP is enabled by default. Any user can connect to the switch using the SNMPv3 protocol. select an Authentication Protocol option. To configure authentication and encryption settings for the SNMPv3 admin profile by using the Web interface: 1. To enable authentication. the expression “System Name with Spaces” forces the system to accept the spaces.1) Getting Started v1. Some interface configurations also involve objects in the public MIB. July 2009 1-15 . but for authentication and encryption. The System  Management  System Information Web page.b.0.d (100. the switch supports only one user which is admin.GS716Tv2 and GS724Tv3 Software Administration Manual GS716T/GS724T switches use both standard public MIBs for standard functionality and private MIBs that support additional switch functionality. select the DES option in the Encryption Protocol field.10.2. The main object for interface configuration is in -SWITCHING-MIB. 4. You can enter the IP address in the following formats: a. Common Parameter Values Parameter values might be names (strings) or numbers. enter an encryption code of eight or more alphanumeric characters in the Encryption Key field.

and so on. l2. This is applicable for a LAG (port-channel) interface which is represented as l1. g2. Interface Naming Convention GS716T/GS724T Switch supports physical and logical interfaces. Table 1-4. The physical ports are gigabit interfaces and are numbered on the front panel. Represents a logical interface. g2. The following table describes the naming convention for all interfaces available on the switch. l2. l3 LAG1. You configure the logical interfaces by using the software. LAG2 This is the internal switch interface responsible c1 for the switch base MAC address. LAG interfaces are logical interfaces that are only used for bridging functions. Example g1. 1-16 v1. July 2009 Getting Started . Interfaces are identified by their type and the interface number. Parameter Descriptions (continued) Parameter Interface Logical Interface Description g1. Types of Interface Interface Physical Description The physical ports are gigabit Ethernet interfaces and are numbered sequentially starting from one. g3 Link Aggregation Group (LAG) CPU Management Interface l1. This interface is not configurable and is always listed in the MAC Address Table.GS716Tv2 and GS724Tv3 Software Administration Manual Table 1-3.0. and so on for the physical interfaces.

Click System  Management System Information in the navigation tree. Use this page to configure and view general device information. the System Information page displays.0. The System tab contains links to the following features: • • • • • • • • “System Information” on page 2-1 “Network Connectivity” on page 2-3 “Time” on page 2-5 “Denial of Service” on page 2-13 “Green Ethernet Configuration” on page 2-15 “SNMP V1/V2” on page 2-16 “SNMP v3 User Configuration” on page 2-21 “LLDP” on page 2-23 System Information After a successful login. July 2009 . To display the System Information page: 1.Chapter 2 Configuring System Information Use the features in the System tab to define the switch’s relationship to its environment. 2-1 v1.

The model name of the switch.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 2-1 Table 2-1. Enter the location of this switch. The factory default is blank. Displays the number of days. The current date and time. System Description Fields Field System Name System Location System Contact Serial Number System Object ID Date & Time System Up Time Base MAC Address Model Name Description Enter the name you want to use to identify this switch. You may use up to 31 alphanumeric characters. The base object ID for the switch's enterprise MIB.0. You may use up to 31 alphanumeric characters. The universally assigned network address. July 2009 Configuring System Information . Enter the contact person for this switch. hours. You may use up to 31 alphanumeric characters. The serial number of the switch. The factory default is blank. and minutes since the last system restart. The factory default is blank. 2-2 v1.

Defining System Information 1. 3. July 2009 2-3 . Open the System Information page. To access the page: 1. The system parameters are applied. and the device is updated. Define the following fields: System Name. System Location. Click Apply. The Network Connectivity page allows you to change the IP information using the Web interface. Click System  Management  IP Configuration in the navigation tree.GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-1. The software version of the switch. Network Connectivity The network interface is the logical interface used for in-band connectivity with the switch via any of the switch's front panel ports. and System Contact. System Description Fields (continued) Field Boot Version Software Version Description The bootcode version of the switch. 2. Configuring System Information v1.0. The configuration parameters associated with the switch's network interface do not affect the configuration of the front panel ports through which traffic is switched or routed.

The IP subnet mask for the interface. Note: Each part of the IP address must start with a number other than zero. The factory default value is 192. IP addresses 001.1.0. Network Connectivity Fields Field IP Address Description The IP address of the network interface. subnet mask. The default gateway for the IP interface.0.168.001.255.3 are not valid. The factory default value is 192. and default gateway). The factory default value is 255.255. you must first configure it with IP information (IP address.0.100. The range is 1–4093.10. You can configure the IP information using any of the following options: • • • Dynamic IP Address (DHCP) Dynamic IP Address (BOOTP) Static IP Address Table 2-2.0. Specifies the management VLAN ID of the switch. To access the switch over a network.168.192. For example. Subnet Mask Default Gateway Management VLAN ID 2-4 v1. The management VLAN is used for management of the switch.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 2-2 2.239. July 2009 Configuring System Information .6 and 192.

a GPS system. T4: Time at which the client received the server's reply. The following is an example of stratums: • • • Stratum 0: A real-time clock is used as the time source. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. click Apply to apply the changes to the system. This is the preferred method for synchronizing device time because it is the most secure method. If this Configuring System Information v1. Time synchronization is performed by a network SNTP server.GS716Tv2 and GS724Tv3 Software Administration Manual 3. Stratum 1 time servers provide primary network time standards. The higher the stratum (where zero is the highest). The device receives time from stratum 1 and above since it is itself a stratum 2 device. the more accurate the clock.0. 4. from a Stratum 1 server. July 2009 2-5 . The device can poll Unicast server types for the server time. T1 through T4 are used to determine server time. Polling for Unicast information is used for polling a server for which the IP address is known. a Stratum 2 server receives the time over a network link. Time sources are established by Stratums. T2: Time at which the original request was received by the server. Stratum 2: The time source is distanced from the Stratum 1 server over a network path. T3: Time at which the server sent a reply. SNTP time definitions are assessed and determined by the following time levels: • • • • T1: Time at which the original request was sent by the client. Time GS716T/GS724T software supports the Simple Network Time Protocol (SNTP). for example. GS716T/GS724T software operates only as an SNTP client and cannot provide time services to other systems. Stratum 1: A server that is directly linked to a Stratum 0 time source is used. SNTP assures accurate network device clock time synchronization up to the millisecond. via NTP. Stratums define the accuracy of the reference clock. If you change any of the network connection parameters. SNTP servers that have been configured on the device are the only ones that are polled for synchronization information. For example. Information received from SNTP servers is evaluated based on the time level and server type.

either by actively requesting information or at every poll interval. When the Clock Source is set to Local. In the Date field. Configuration changes take effect immediately. Time Configuration Use the Time Configuration page to view and adjust SNTP parameters. Click Apply to send the updated configuration to the switch. the switch will calculate the date and time using the CPU’s clock cycle. the Time Zone field is grayed out (disabled): 6. Note: If you do not enter a Date and Time. Use the Time option to set the time locally on the switch. 2. 2-6 v1. 4.GS716Tv2 and GS724Tv3 Software Administration Manual method is selected. enter the date in the DD/MM/YYYY format. SNTP information is accepted only from SNTP servers defined on the device using the SNTP Server Configuration page. 5. enter the time in HH:MM:SS format. The device retrieves synchronization information. 3. Select the Clock Source as Local by checking the radio button to configure the local time. July 2009 Configuring System Information . To display the Time Configuration page: 1.0. Click System  Management Time  SNTP Global Configuration in the navigation menu. In the Time field.

Select the Clock Source as SNTP by checking the radio button. This is the default behavior unless you enter a new Date and Time. The switch gets the date and time from the network. Specifies the duration of the box in days. July 2009 2-7 . expressed as the number of hours. Use the menu to select the Coordinated Universal Time (UTC) time zone in which the switch is located. The Time and Date will subsequently be changed to match the Time you entered. The default is Local. 2. Table 2-3. Click Apply to send the updated configuration to the switch. 4.0. Configuring System Information v1.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 2-3 To configure the time through SNTP: 1. months and years since the last reboot. Time Configuration Fields Field Clock Source Date Description Use this field to configure time locally or through SNTP. The options in the Time Zone menu specify the time difference from UTC time zone. the Date and Time fields are grayed out (disabled). Configuration changes take effect immediately. When the Clock Source is set to ‘SNTP’. 3.

SNTP Global Status Use the SNTP Global Status page to view information about the system’s SNTP client. The default value is UTC 00:00. the time data received from the server is based on Coordinated Universal Time (UTC). Figure 2-4 2-8 v1. Click System  Management  Time  SNTP Global Configuration in the navigation menu. Time Configuration Fields (continued) Field Time Time Zone Description Specifies the duration of the box in hours.GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-3. Time Zone configures a time zone specifying the time difference from UTC time zone. 5. which is the same as Greenwich Mean Time (GMT). When using SNTP/NTP time servers to update the switch’s clock. To access the SNTP Global Status page: 1. Click Refresh to refresh the page with the most current data from the switch. This may not be the time zone in which the switch is located. 6. July 2009 Configuring System Information . The time zone can affect the display of the current system time.0. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. minutes and seconds since the last reboot.

Server IP Address Address Type Server Stratum Reference Clock Id Server Mode Configuring System Information v1. an empty string is shown. Specifies the mode of the server for the last received valid packet. • Server Unsynchronized: The SNTP server is not synchronized with its peers. • Server Kiss Of Death: The SNTP server indicated that no further queries were to be sent to this server. a status of Other is displayed.0. If no message has been received from a server. Specifies the local date and time (UTC) of the last SNTP request or receipt of an unsolicited message. • Version Not Supported: The SNTP version supported by the server is not compatible with the version supported by the client. Specifies the SNTP modes the client supports. Specifies the claimed stratum of the server for the last received valid packet. Multiple modes may be supported by a client. If no message has been received from any server. Specifies the reference clock identifier of the server for the last received valid packet. These values are appropriate for all operational modes: • Other: None of the following enumeration values. • Request Timed Out: A directed SNTP request timed out without receiving a response from the SNTP server. Specifies the IP address of the server for the last received valid packet. SNTP Global Configuration Fields Field Version Supported Mode Last Update Time Last Attempt Time Last Attempt Status Description Specifies the SNTP Version the client supports. This is indicated via the 'leap indicator' field on the SNTP message. Specifies the local date and time (UTC) the SNTP client last updated the system clock. • Success: The SNTP operation was successful and the system time was updated.GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-4. Specifies the status of the last SNTP request or unsolicited message for unicast mode. July 2009 2-9 . • Bad Date Encoded: The time provided by the SNTP server is not valid. Specifies the address type of the SNTP Server address for the last received valid packet. This is indicated by a stratum field equal to 0 in a message received from a server.

Click Refresh to refresh the page with the most current data from the switch. If you change any of the settings on the page. 3. Figure 2-5 2-10 v1. Configuration changes take effect immediately.0. 2.GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-4. July 2009 Configuring System Information . SNTP Global Configuration Fields (continued) Field Unicast Sever Max Entries Unicast Server Current Entries Description Specifies the maximum number of unicast server entries that can be configured on this client. To display the SNTP Server Configuration page: 1. click Apply to send the updated configuration to the switch. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. SNTP Server Configuration Use the SNTP Server Configuration page to view and modify information for adding and modifying Simple Network Time Protocol SNTP servers. Click System  Management  Time  SNTP Server Configuration in the navigation tree. 4. Specifies the number of current valid unicast server entries configured for this client.

Enter the protocol version number. Shows the format of the TFTP Server Address field The factory default is IPv4. You can define up to three SNTP servers. To removing an SNTP server. or select Add to configure a new SNTP server. and is now reflected in the Server list. To access the SNTP Server Status page: Configuring System Information v1. 5. 4. Specifies the priority of this server entry in determining the sequence of servers to which SNTP requests are sent. SNTP Server Configuration Fields Field Server Type Description Specifies the address type of the configured SNTP server to view or modify information about. The entry is removed. The default is 123. and then click Delete. Configuration changes take effect immediately. and the device is updated. Address Port Priority Enter the IP address of the SNTP server.0. select the IP address of the server to remove from the Server list. July 2009 2-11 . select Add. If you change any of the settings on the page. Enter a port number from 1–65535. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. The range is 1–4. The SNTP server is added. with 1 being the default and the highest priority. Version 2. SNTP Server Status The SNTP Server Status page displays status information about the SNTP servers configured on your switch. 3.GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-5. and click Apply. click Apply to send the updated configuration to the switch. Enter a priority from 1–3. Servers with lowest numbers have priority. complete the remaining fields as desired. To add an SNTP server.

If no packet has been received from this server. • Version Not Supported: The SNTP version supported by the server is not compatible with the version supported by the client. Figure 2-6 Table 2-6. • Bad Date Encoded: The time provided by the SNTP server is not valid. July 2009 Configuring System Information .0. • Server Unsynchronized: The SNTP server is not synchronized with its peers. Last Update Time Last Attempt Time Last Attempt Status 2-12 v1. If no Server configuration exists. SNTP Server Status Fields Field Address Description Specifies all the existing Server Addresses. • Success: The SNTP operation was successful and the system time was updated. • Server Kiss Of Death: The SNTP server indicated that no further queries were to be sent to this server. Click System  Management  Time  SNTP Server Configuration in the navigation menu. Specifies the local date and time (UTC) that the response from this server was used to update the system clock. a message saying “No SNTP server exists” flashes on the screen. • Request Timed Out: A directed SNTP request timed out without receiving a response from the SNTP server. a status of Other is displayed: • Other: None of the following enumeration values. This is indicated by a stratum field equal to 0 in a message received from a server.GS716Tv2 and GS724Tv3 Software Administration Manual 1. Specifies the status of the last SNTP request to this server. This is indicated via the 'leap indicator' field on the SNTP message. Specifies the local date and time (UTC) that this SNTP server was last queried.

TCP Fragment: IP Fragment Offset = 1. Specifies the number of failed SNTP requests made to this server since last reboot. The GS716T/GS724T software provides support for classifying and blocking specific types of DoS attacks. ICMP: Limiting the size of ICMP Ping packets. TCP Flag: TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP Sequence Number = 0 or TCP Flags FIN.0. SNTP Server Status Fields (continued) Field Requests Failed Requests Description Specifies the number of SNTP requests made to this server since last agent reboot. July 2009 2-13 . L4 Port: Source TCP/UDP Port = Destination TCP/UDP Port. First Fragment: TCP Header size is smaller than the configured value. 2.GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-6. URG. Click Refresh to refresh the page with the most current data from the switch. • • To access the Denial of Service page: Configuring System Information v1. and PSH set and TCP Sequence Number = 0 or TCP Flags SYN and FIN set. You can configure your system to monitor and block six types of attacks: • • • • SIP=DIP: Source IP address = Destination IP address. Denial of Service Use the Denial of Service (DoS) page to configure DoS control.

The factory default is disabled. Enable or disable this option by selecting the corresponding line on the pulldown entry field. The factory default is disabled. Enabling First Fragment DoS prevention causes the switch to drop packets that have a TCP header smaller than the configured Min TCP Hdr Size. Denial of Service Configuration Fields Field Denial of Service SIP=DIP Description Enable or disable this option by selecting the corresponding line on the pulldown entry field. Denial of Service First Fragment Denial of Service Min TCP Hdr Size Denial of Service TCP Fragment 2-14 v1. July 2009 Configuring System Information . The factory default is 20 bytes.GS716Tv2 and GS724Tv3 Software Administration Manual 1. The factory default is disabled. Enable or disable this option by selecting the corresponding line on the pulldown entry field. the switch will drop packets that have a TCP header smaller than this configured Min TCP Hdr Size. Enabling TCP Fragment DoS prevention causes the switch to drop packets that have an IP fragment offset equal to 1. Specify the Min TCP Hdr Size allowed. Click System  Management  Denial of Service in the navigation menu.0. Enabling SIP=DIP DoS prevention causes the switch to drop packets that have a source IP address equal to the destination IP address. Figure 2-7 Table 2-7. If First Fragment DoS prevention is enabled.

click Apply to apply the changes to the switch.GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-7. Enabling TCP Flag DoS prevention causes the switch to drop packets that have TCP flag SYN set and TCP source port less than 1024 or TCP control flags set to 0 and TCP sequence number set to 0 or TCP flags FIN. Green Ethernet Configuration Use this page to configure Green Ethernet features. The factory default is disabled. The factory default is disabled. Enabling ICMP DoS prevention causes the switch to drop ICMP packets that have a type set to ECHO_REQ (ping) and a size greater than the configured ICMP Pkt Size.0. If ICMP DoS prevention is Size enabled. Denial of Service Configuration Fields (continued) Field Denial of Service TCP Flag Description Enable or disable this option by selecting the corresponding line on the pulldown entry field. The factory default is disabled. Enable or disable this option by selecting the corresponding line on the pulldown entry field. URG. Using the Green Ethernet features allows for power consumption savings. 2. Denial of Service L4 Port Denial of Service ICMP Denial of Service Max ICMP Specify the Max ICMP Pkt Size allowed. The factory default is disabled. Enabling L4 Port DoS prevention causes the switch to drop packets that have TCP/UDP source port equal to TCP/UDP destination port. If you change any of the DoS settings. the switch will drop ICMP ping packets that have a size greater then this configured Max ICMP Pkt Size. Enable or disable this option by selecting the corresponding line on the pulldown entry field. To access this page: Configuring System Information v1. and PSH set and TCP sequence number set to 0 or both TCP flags SYN and FIN set. July 2009 2-15 .

Configuration changes take effect immediately. Click System  Management  Green Ethernet Configuration.GS716Tv2 and GS724Tv3 Software Administration Manual 1. July 2009 2-16 . the PHY automatically goes down for a short amount of time and then wakes up to check link pulses. This performs auto-negotiation and saving power consumption routines when a link partner is unavailable. A cable test is performed when this is enabled and the port link is up at 1 Gbps: if the cable is less than 10m. SNMP V1/V2 The System  SNMP  SNMP V1/V2 folder contains links to the following pages: • • • “Community Configuration” on page 2-17 “Trap Configuration” on page 2-19 “Trap Flags” on page 2-20 Configuring System Information v1. In the Auto Power Down Mode or Short Cable Mode field. PHYs are placed in low power mode (nominal power) Short Cable Mode 2. Green Ethernet Configuration Fields Field Auto Power Down Mode Description When this is enabled and the port link is down.0. Figure 2-8 Table 2-8. 3. Click Apply to send the updated configuration to the switch. select Enable or Disable to turn the feature on or off.

July 2009 2-17 . Only those communities with read/write level access can be used to change the configuration using SNMP.GS716Tv2 and GS724Tv3 Software Administration Manual Community Configuration To display this page. These are well-known communities. with Read Only privileges and status set to Enable.0. click System  SNMP  SNMP V1/V2  Community Configuration in the navigation tree. Only the communities that you define using this page will have access to the switch using the SNMPv1 and SNMPv2c protocols. with Read/Write privileges and status set to Enable. Figure 2-9 Configuring System Information v1. Use this page to change the defaults or to add other communities. two SNMP Communities exist: • • Private. By default. Public. Use this page when you are using the SNMPv1 and SNMPv2c protocol.

if the values are equal. and. Use this screen to reconfigure an existing community. and use that machine’s IP address for Client Address.0 through 192.0.0. access is allowed from any IP address. To allow access from only one station.168. the Community Name will become invalid.168.0/255. use a Management Station IP Mask value of 255.255. Management Station IP Mask Community String Access Mode Status 2-18 v1.1. access is allowed. as is the Management Station IP Address. If either (Management Station IP or Management Station IP Mask) value is 0.0.0.0/255. if the Management Station IP and Management Station IP Mask parameters are 192. SNMP V1/V2 Community Configurable Data Field Management Station IP Description Taken together.0.255.255. For example.1. every client’s address is ANDed with the mask.255. the Management Station IP and the Management Station IP Mask denote a range of IP addresses from which SNMP clients may use that community to access this device.0. or select Create to add a new one. the Management Station IP and the Management Station IP Mask denote a range of IP addresses from which SNMP clients may use that community to access this device.168.0. If you select Enable. If either (Management Station IP or Management Station IP Mask) value is 0. every client’s address is ANDed with the mask.1.255. A valid entry is a case-sensitive string of up to 16 characters.1. access is allowed from any IP address. then any client whose IP address is 192.255.1. Otherwise. Specify the access level for this community by selecting Read/Write or Read Only from the pulldown menu. if the Management Station IP and Management Station IP Mask parameters are 192.GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-9. Use this pulldown menu to select one of the existing community names.168.0.255 (inclusive) will be allowed access. or to create a new one. July 2009 Configuring System Information .0.168. access is allowed.255 (inclusive) will be allowed access. then any client whose address is 192.255. the Community Name must be unique among all valid Community Names or the set request will be rejected.168.255.255.255. and use that machine’s IP address for Client Address. use a Management Station IP Mask value of 255. and. If you select Disable.1. Specify the status of this community by selecting Enable or Disable from the pulldown menu. as is the Management Station IP Address. Otherwise. To allow access from only one station.0 through 192. For example. if the values are equal. Taken together.

Uses SNMP v1 to send traps to the receiver. Configuring System Information v1.0. SNMP Trap Configuration Field Recipients IP Version Description Enter the address in x. • SNMP v2 . Select the trap version to be used by the receiver from the pulldown menu.x. July 2009 2-19 .x format to receive SNMP traps from this device. Delete the currently selected receiver configuration. Sends the updated configuration to the switch.GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-10. Cancel the configuration on the screen. • SNMP v1 . Reset the data on the screen to the latest value of the switch. Command Buttons Field Add Delete Cancel Apply Description Add the currently selected receiver configuration to the switch. Configuration changes take effect immediately. click System  SNMP  SNMP V1/V2  Trap Configuration in the navigation tree.x.Uses SNMP v2 to send traps to the receiver. Figure 2-10 Table 2-11. To access this page. Trap Configuration This page displays an entry for every active Trap Receiver.

Cancel the configuration on the screen. Click System  SNMP  SNMP V1/V2  Trap Flags.Send traps to the receiver. a trap message is sent to any enabled SNMP Trap Receivers. Table 2-12. • Disable . Command Buttons Field Add Delete Cancel Apply Description Add the currently selected receiver configuration to the switch. SNMP Trap Configuration (continued) Field Community String Status Description Enter the community string for the SNMP trap packet to be sent to the trap manager.GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-11. Select the receiver’s status from the pulldown menu: • Enable . July 2009 Configuring System Information .0. Reset the data on the screen to the latest value of the switch. Configuration changes take effect immediately. When the condition identified by an active trap is encountered by the switch. Use the Trap Flags page to enable or disable traps the switch can sent to an SNMP manager. This may be up to 16 characters and is case sensitive. To access the Trap Flags page: 1.Do not send traps to the receiver. Delete the currently selected receiver configuration. Trap Flags The pages in the Trap Manager folder allow you to view and configure information about SNMP traps the system generates. 2-20 v1. and a message is written to the trap log. Sends the updated configuration to the switch.

click Apply to send the updated configuration to the switch. July 2009 2-21 . Configuration changes take effect immediately. 3. Enable or disable activation of link status traps by selecting the corresponding button. Figure 2-11 and the following table show the fields that are available on a system with all packages installed. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 2. Trap Flags Configuration Fields Field Authentication Link Up/Down Spanning Tree Description Enable or disable activation of authentication failure traps by selecting the corresponding button. The factory default is enabled. Table 2-13. If you make any changes to this page. To access this page: 1. The factory default is enabled. The factory default is enabled. Click System  SNMP  SNMP V3  User Configuration in the navigation menu. SNMP v3 User Configuration This is the configuration for SNMP v3. Enable or disable activation of spanning tree traps by selecting the corresponding button. Configuring System Information v1.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 2-11 The fields available on the Trap Flags page depends on the packages installed on your system.0.

The password must be eight characters in length. and you must therefore specify a password. you must enter a key in the Encryption Key field. 2-22 v1. The Apply check box must be checked in order to change the Encryption Protocol and Encryption Key. Specify the SNMPv3 Authentication Protocol setting for the selected user account. the Encryption Key is ignored. Valid keys are 0 to 15 characters long. The valid Authentication Protocols are None. SNMP v3 User Configuration Field SNMP v3 Access Mode Description The SNMPv3 access privileges for the user account.0. July 2009 Configuring System Information . If None is specified for the Protocol. • MD5 or SHA . Authentication Protocol Encryption Protocol Encryption Key 2.The user will be unable to access the SNMP data from an SNMP browser. MD5.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 2-12 Table 2-14. If you select: • None . or SHA. If you select the DES Protocol. enter the SNMPv3 Encryption Key here. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. Specify the SNMPv3 Encryption Protocol setting for the selected user account.The user login password will be used as SNMPv3 authentication password. The valid Encryption Protocols are None or DES. The admin account always has Read/Write access. If you selected DES in the Encryption Protocol field. Otherwise. and all other accounts have Read Only access. this field is ignored.

To display the LLDP Configuration page: 1. there are no request/response sequences. allows stations residing on an 802 LAN to advertise major capabilities and physical descriptions.0. Click System  LLDP  Basic  LLDP Configuration in the navigation tree. both transmit and receive are disabled on all ports.1AB-defined standard. The transmit and receive functions can be enabled/disabled separately per port. By default. The application is responsible for starting each transmit and receive state machine appropriately. This information is viewed by a network manager to identify system topology and detect bad configurations on the LAN. and is received and processed by stations implementing the receive function. LLDP is a one-way protocol. LLDP The IEEE 802. July 2009 2-23 . Click Apply to send the updated configuration to the switch. Information is advertised by stations implementing the transmit function. Note: You can also access the LLDP Configuration page by clicking System  LLDP  Advanced  LLDP Configuration. Configuration changes take effect immediately. Configuring System Information v1.GS716Tv2 and GS724Tv3 Software Administration Manual 3. The LLDP folder contains links to the following pages: • • • • “LLDP Configuration” on page 2-23 “LLDP Port Settings” on page 2-24 “Local Information” on page 2-27 “Neighbors Information” on page 2-30 LLDP Configuration Use the LLDP Configuration page to specify LLDP parameters that are applied to the switch. Link Layer Discovery Protocol (LLDP). based on the configured status and operational state of the port.

and the range is 2–10. Specifies the delay before a reinitialization. To display the LLDP Port Settings page: 1. The default is 5 seconds. and the range is 5–3600 seconds. Description 2. Specifies the interval for the transmission of notifications.0.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 2-13 Table 2-15. The default is 30 seconds. click Apply to apply the new settings to the system. The default is 2 seconds. The default is 4. 2-24 v1. LLDP Configuration Fields Field LLDP Properties TLV Advertised Interval Hold Multiplier Reinitializing Delay Transmit Delay Specifies the interval at which frames are transmitted. Specifies multiplier on the transmit interval to assign to Time-to-Live (TTL). and the valid range is 1–32768 seconds. If you make any changes to the page. July 2009 Configuring System Information . and the range is 1–10 seconds. Click SystemLLDP Advanced  LLDPPort Settings in the navigation tree. LLDP Port Settings Use the LLDP Port Settings page to specify LLDP parameters that are applied to a specific interface.

July 2009 2-25 . • Rx Only: Enable only receiving LLDP PDUs on the selected ports. Choose whether to advertise the management IP address from the interface. • Auto Advertise: Advertise the current IP address of the device as the management IP address.0. LLDP Port Settings Fields Field Interface Admin Status Description Specifies the port to be affected by these parameters.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 2-14 Table 2-16. The possible field values are: • Stop Advertise: Do not advertise the management IP address from the interface. • Disabled: Do not transmit or receive LLDP PDUs on the selected ports. Select the status for transmitting and receiving LLDP packets. Management IP Address Configuring System Information v1. • Tx and Rx: Enable both transmitting and receiving LLDP PDUs on the selected ports. The options are: • Tx Only: Enable only transmitting LLDP PDUs on the selected ports.

LLDP interacts with the Trap Manager to notify subscribers of remote data change statistics. 2-26 v1.GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-16. July 2009 Configuring System Information . The default is disabled.0. system description. Optional TLV(s) 2. see “System Information” on page 2-1. The TLV information includes the system name. click Refresh. and port description. see “Configuring and Viewing Device Port Information” on page 3-1. If you make any changes to the page. Enable or disable the transmission of optional type-length value (TLV) information from the interface. To configure the System Name. LLDP Port Settings Fields (continued) Field Notification Description When notifications are enabled. click Apply to apply the new settings to the system. To configure the Port Description. system capabilities. 3. To update the page with the latest data.

Identifies the system name associated with the remote device. Identifies the type of data displayed in the Port ID field. Specifies the system capabilities of the local system. Click SystemAdvanced LLDPLocal Information in the navigation tree.0. Specifies the description of the selected port associated with the local system. Configuring System Information v1. see “System Information” on page 2-1. Figure 2-15 Table 2-17. Identifies the physical address of the port. To display the LLDP Local Device Information page: 1. Select the interface with the information to display. LLDP Local Information Fields Field Chassis ID Subtype Chassis ID System Name System Description System Capabilities Interface Port ID Subtype Port ID Description Identifies the type of data displayed in the Chassis ID field Identifies the 802 LAN device's chassis.GS716Tv2 and GS724Tv3 Software Administration Manual Local Information Use the LLDP Local Information page to view the data that each port advertises through LLDP. To configure the System Name. July 2009 2-27 .

Advertisement 2. A popup window displays information for the selected port. July 2009 Configuring System Information . LLDP Local Information Fields (continued) Field Port Description Description Identifies the user-defined description of the port.GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-17. see “Configuring and Viewing Device Port Information” on page 3-1. Click Refresh to refresh the page with the most current data from the switch.0. To view additional details about a port. 3. Figure 2-16 2-28 v1. To configure the Port Description. Displays the advertisement status of the port. click the name of the port in the Interface column of the Port Information table.

Displays the Medium Attachment Unit (MAU) type. The possible values are True (enabled) or False (disabled). Local Port Information Field Managed Address Address SubType Address Interface SubType Interface Number MAC/PHY Details Auto-Negotiation Supported Specifies whether the interface supports port-speed auto-negotiation. Displays the address used to manage the device. Displays the number that identifies the port. The MAU performs physical layer functions. Specifies the VLAN ID associated with the policy.GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-18. Specifies whether the VLAN associated with the policy is tagged or untagged. Description Auto-Negotiation Enabled Displays the port speed auto-negotiation support status. Specifies the DSCP associated with a particular policy type. Network Connectivity indicates the device is a network connectivity device. The possible values are True or False Displays the type of address the management interface uses.0. Configuring System Information v1. July 2009 2-29 . Displays the TLVs advertised by the port. Specifies the priority associated with the policy. including digital data conversion from the Ethernet interface collision detection and bit injection into the network. such as an IPv4 address. Auto Negotiation Advertised Capabilities Operational MAU Type Displays the port speed auto-negotiation capabilities such as 1000BASE-T half-duplex mode or 100BASE-TX full-duplex mode. MED Details Capabilities Supported Current Capabilities Device Class Network Policies Application Type VLAN ID VLAN Type User Priority DSCP Specifies the media application type associated with the policy. Displays the port subtype. Displays the MED capabilities enabled on the port.

Click Refresh to update the information on the screen with the most current data. Click SystemLLDP  Advanced Neighbors Information in the navigation tree. Identifies the remote 802 LAN device's chassis. Figure 2-17 Table 2-19.0. July 2009 Configuring System Information . Identifies the physical address of the port on the remote system from which the data was sent. LLDP Neighbors Information Fields Field MSAP Entry Local Port Chassis ID Subtype Chassis ID Port ID Subtype Port ID System Name Description Displays the Media Service Access Point (MSAP) entry number for the remote device. Identifies the system name associated with the remote device. the name might not be configured on the remote system. If the field is blank. 2. To display the LLDP Neighbors Information page: 1. Identifies the type of data displayed in the Chassis ID field on the remote system. Shows the interface on the local system that received LLDP information from a remote system.GS716Tv2 and GS724Tv3 Software Administration Manual Neighbors Information Use the LLDP Neighbors Information page to view the data that a specified interface has received from other LLDP-enabled systems. Identifies the type of data displayed in the remote system’s Port ID field. 2-30 v1.

Configuring System Information v1. A popup window displays information for the selected port. click the link in the MSAP Entry field.GS716Tv2 and GS724Tv3 Software Administration Manual 3. To view more information about the remote device. Figure 2-18 4. Click Refresh to refresh the page with the most current data from the switch.0. July 2009 2-31 .

GS716Tv2 and GS724Tv3 Software Administration Manual 2-32 v1.0. July 2009 Configuring System Information .

The Ports folder has links to the following features: • • “Port Configuration” on page 3-1 “Flow Control” on page 3-4 Port Configuration Use the Port Configuration page to configure the physical interfaces on the switch. Click Switching  Ports  Port Configuration in the navigation tree. July 2009 . To access the Port Configuration page: 1. 3-1 v1.0.Chapter 3 Configuring Switching Information • • • • • • • • “Configuring and Viewing Device Port Information” on page 3-1 “Creating LAGs” on page 3-5 “Managing VLANs” on page 3-10 “Configuring Spanning Tree Protocol” on page 3-16 “Configuring IGMP Snooping” on page 3-32 “Viewing Multicast Forwarding Database Information” on page 3-35 “Configuring IGMP Snooping Queriers” on page 3-42 “Searching and Configuring the Forwarding Database” on page 3-47 Configuring and Viewing Device Port Information The pages on the Ports tab allows you to view and monitor the physical port information for the ports available on the switch.

Description Port Type Admin Mode Port Speed 3-2 v1.0. The string can be up to 64 characters in length. The factory default is Auto. If you select Auto. If you select All. For additional information about port monitoring see Chapter 6. Port Configuration Fields Field Port Description Select the port from the menu to display or configure data for that port. Otherwise. your selection will determine the port’s duplex mode and transmission rate. Enter the description string to be attached to a port. For more information see “LAG Membership” on page 3-7. • LAG: Indicates that the port is a member of a Link Aggregation trunk. July 2009 Configuring Switching Information . • Disable: The port is administratively down and does not participate in the network. the duplex mode and speed will be set by the auto-negotiation process. the changes you make to the Port Configuration page apply to all physical ports on the system. For most ports this field is blank.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 3-1 Table 3-1. “Monitoring the System”. which can be one of the following: • Enable: The port can participate in the network (default). Use the menu to select the port control administration state. Otherwise. the possible values are: • MON: Indicates that the port is a monitoring port. The port’s maximum capability (full duplex and 1000 Mbps) will be advertised. Use the menu to select the port’s speed and duplex mode.

performs auto-negotiation and saving power consumption routines when a link partner is unavailable. July 2009 3-3 . PHYs are placed in low power mode (nominal power). Indicates the maximum Ethernet frame size the interface supports or is configured to support. which can be one of the following: • Enable: Specifies that cable test is performed when the port link is up at 1 Gbps and if the cable is less than 10m. (1518–9216). and payload. Configuring Switching Information v1. • Disable: The port is administratively down and does not participate in Green Ethernet mode. If you make any changes to the page. The ifIndex of the interface table entry associated with this port. 3. • Disable: The port is administratively down and does not participate in Green Ethernet mode. Displays the physical address of the specified interface. CRC. The default maximum frame size is 1518. • Disable: Specifies that the system does not send a trap when the link status changes. which can be one of the following: Enable: Specifies that when the port link is down. Use the menu to select the port’s Green Ethernet mode. This object determines whether or not to send a trap when link status changes. The factory default is enabled: • Enable: Specifies that the system sends a trap when the link status changes. and wakes up to check link pulses. the PHY automatically goes down for a short amount of time. Port Configuration Fields (continued) Field Auto Power Down Mode Description Use the menu to select the port’s Green Ethernet mode. The frame size includes the Ethernet header. Display the bit offset value which corresponds to the port when the MIB object type PortList is used to manage in SNMP. Short Cable Mode Physical Status Link Status Link Trap Maximum Frame Size MAC Address PortList Bit Offset ifIndex 2.0. Indicates the physical port’s speed and duplex mode Indicates whether the Link is up or down. If the interface field is set to All. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. click Apply to apply the changes to the system.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-1. this field is blank.

3x) Mode Description Enables or disables IEEE 802. To display the Flow Control page: 1.0. 3-4 v1. lower speed switches can communicate with higher speed switches by requesting that the higher speed switch refrains from sending packets.GS716Tv2 and GS724Tv3 Software Administration Manual Flow Control IEEE 802. Transmissions are temporarily halted to prevent buffer overflows. and then click the Flow Control link. If you change the mode. When IEEE 802.3x flow control on the system.3x flow control works by pausing a port when the port becomes oversubscribed and dropping all traffic for small bursts of time during the congestion condition.3x flow control is enabled. This can lead to highpriority and/or network control traffic loss. • Select Enable so that the switch can communicate with higher speed switches. The factory default is disabled. 2. Figure 3-2 Table 3-2. click Apply to apply the changes to the system. Click Switching  Ports. Switch Flow Control Configuration Fields Field Global Flow Control (IEEE 802. July 2009 Configuring Switching Information . • Select Disable so that the switch does not send pause packets if the port buffers become full.

A LAG interface can be either static or dynamic. Configuring Switching Information v1.0. Click Switching LAG  Basic  LAG Configuration in the navigation tree. The switch treats the LAG as if it were a single link. July 2009 3-5 . allow you to combine multiple full-duplex Ethernet links into a single logical link. The LAG by default becomes a member of the management VLAN. Network devices treat the aggregation as if it were a single link. which is also known as a port-channel. When a port is added to a LAG as a static member. it neither transmits nor receives LAGPDUs. To access the LAG Configuration page: 1. which are also known as port-channels. Note: The GS716T supports 2 LAGs and GS724T supports 4 LAGs. The LAG folder contains links to the following features: • • • • “LAG Configuration” on page 3-5 “LAG Membership” on page 3-7 “LACP Configuration” on page 3-8 “LACP Port Configuration” on page 3-9 LAG Configuration Use the LAG (Port Channel) Configuration page to group one or more full-duplex Ethernet links to be aggregated together to form a link aggregation group. All members of a LAG must participate in the same protocols. Static LAGs are supported.GS716Tv2 and GS724Tv3 Software Administration Manual Creating LAGs Link aggregation groups (LAGs). A static port-channel interface does not require a partner system to be able to aggregate its member ports. which increases fault tolerance and provides load sharing. but not both. You assign the LAG VLAN membership after you create a LAG.

Description LAG ID Link Trap Admin Mode STP Mode LAG Type Active Ports LAG State 3-6 v1. A maximum of 8 ports can be assigned to a port channel. Identification of the LAG Specify whether you want to have a trap sent when link status changes. When the LAG is static. LAG (Port Channel) Configuration Fields Field LAG Name Description Enter the name you want assigned to the LAG. July 2009 Configuring Switching Information . the member ports do not transmit LAGPDUs and all the LAGPDUs it may receive are dropped. Select Enable or Disable from the menu. no traffic will flow and LAGPDUs will be dropped.0. Indicates whether the link is Up or Down. A listing of the ports that are actively participating members of this Port Channel. Select Static or LACP. The Spanning Tree Protocol Administrative Mode associated with the LAG. The factory default is Disable. Possible values are Enable or Disable. The factory default is Enable.e. i. It can be up to 64 characters in length. it does not transmit or process received LAGPDUs.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 3-3 Table 3-3. You may enter any string of up to 15 alphanumeric characters. The default is Static. but the links that form the LAG (port channel) will not be released. When the LAG (port channel) is disabled.. A valid name has to be specified in order to create the LAG Enter the Description string to be attached to a LAG.

which is also known as a port-channel. To remove a configured LAG (port channel). All ports that were members of this LAG are removed from the LAG and included in the default VLAN. select it and click Delete. Configuration changes take effect immediately. Click Add to update the switch with the values on this screen. LAG Membership Use the LAG Membership page to group one or more full-duplex Ethernet links to be aggregated together to form a link aggregation group (LAG). Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. Configuring Switching Information v1. 5. You may enter any string of up to 15 alphanumeric characters.GS716Tv2 and GS724Tv3 Software Administration Manual 2. Figure 3-4 Table 3-4. A valid name has to be specified to create the LAG. Enter the name you want assigned to the LAG. LAG Membership Fields Field LAG ID LAG Name Description Identifies the LAG (port channel) with the interface naming convention. click Apply to send the updated configuration to the switch. To access the LAG Membership page: 1. If you make any changes to this page. 4. July 2009 3-7 . Click Switching LAG  Basic  LAG Membership in the navigation tree. The switch can treat the port-channel as if it were a single link.0. 3.

Configuration changes take effect immediately. Click Refresh to reload the page and display the most current information. Displays the LAGs on the current channel.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-4.0. LACP Configuration Fields Field LACP System Priority Description Specifies the device’s link aggregation priority relative to the devices at the other ends of the links on which link aggregation is enabled. July 2009 Configuring Switching Information . The default value is 32768. A higher value indicates a lower priority. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. You can change the value of the parameter globally by specifying a priority from 0–65535. If you make any changes to this page. 2. 3. 2. Figure 3-5 Table 3-5. LACP Configuration To display the LACP Configuration page: 1. Click Switching LAG  Advanced  LACP Configuration in the navigation tree. click Apply to send the updated configuration to the switch. 3-8 v1. LAG Membership Fields (continued) Field Port Selection Table Current Members Description Select the ports as members of this LAG.

click Apply to send the updated configuration to the switch. Specifies a long timeout value. July 2009 3-9 . Specifies a short timeout value. If you make any changes to this page. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. Click Switching LAG  Advanced  LACP Port Configuration in the navigation tree. • Short. Configuration changes take effect immediately. If you make any changes to this page. Configuring Switching Information v1. 3.GS716Tv2 and GS724Tv3 Software Administration Manual 3. LACP Port Configuration Fields Field Interface LACP Priority Timeout Description Select the interface for which data is to be displayed or configured. The default value is 128. Configuration changes take effect immediately. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.0. Displays the administrative LACP timeout. 4. The possible values are: • Long. The field range is 0–255. click Apply to send the updated configuration to the switch. 2. Figure 3-6 Table 3-6. LACP Port Configuration To display the LACP Port Configuration page: 1. Specifies port priority value.

a VLAN switch forwards traffic based on the Layer 2 header. but it can only support one default VLAN ID. An end station may omit the tag. The only physical requirement is that the end station and the port to which it is connected both belong to the same VLAN.0. security and management of multicast traffic. A given port may handle traffic for more than one VLAN. which is fast. it partitions the network into logical segments. Each VLAN in a network has an associated VLAN ID. which appears in the IEEE 802. and like a router. A VLAN is a set of end stations and the switch ports that connect them.1Q tag in the Layer 2 header of packets transmitted on a VLAN. VLAN 1 is the default VLAN of which all ports are members. The GS716T supports 64 VLANs and GS724T supports 128 VLANs. which provides better administration. such as department or project membership. or the VLAN portion of the tag.GS716Tv2 and GS724Tv3 Software Administration Manual Managing VLANs Adding Virtual LAN (VLAN) support to a Layer 2 switch offers some of the benefits of both bridging and routing. You may have many reasons for the logical division. The VLAN folder contains links to the following features: • • • “VLAN Configuration” on page 3-10 “VLAN Membership Configuration” on page 3-12 “Port VLAN ID Configuration” on page 3-14 VLAN Configuration Use the VLAN Configuration page to define VLAN groups stored in the VLAN membership table. July 2009 Configuring Switching Information . Like a bridge. in which case the first switch port to receive the packet may either reject it or insert a tag using its default VLAN ID. To display the VLAN Configuration page: 3-10 v1.

) The range of the VLAN ID is 1–4093. Configuring Switching Information v1. Click Switching VLAN  Basic  VLAN Configuration in the navigation tree. VLAN Configuration Fields Field VLAN ID Description Specify the VLAN Identifier for the new VLAN.0. it is automatically set to 1 after a Reset Configuration. Figure 3-7 Table 3-7. its type will always be Static. July 2009 3-11 . 4. VLAN ID 1 is always named “Default. 3. VLAN Name VLAN Type Reset Configuration 2. including blanks. When you create a VLAN on this page. If the Management VLAN is set to a non-default VLAN (VLAN 1). The default is blank. Use this optional field to specify a name for the VLAN. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. Click Add to add a new VLAN to the switch. It can be up to 32 alphanumeric characters long. You cannot change the type of the default VLAN (VLAN ID = 1) because the the type is always Default. (You can only enter data in this field when you are creating a new VLAN. Click Delete to delete a selected VLAN from the switch. This resets all the VLAN configurations.” This field identifies the type of the VLAN you are configuring.GS716Tv2 and GS724Tv3 Software Administration Manual 1.

click Apply to send the updated configuration to the switch.GS716Tv2 and GS724Tv3 Software Administration Manual 5.0. VLAN Membership Configuration Use this page to configure VLAN Port Membership for a particular VLAN. If you make any changes to this page. You can select the Group operation through this page. Figure 3-8 2. Click Switching VLAN  Advanced  VLAN Membership in the navigation tree. July 2009 Configuring Switching Information . 3-12 v1. Click the orange bar below the VLAN Type field to display the physical ports on the switch. Configuration changes take effect immediately. To display the VLAN Membership Configuration page: 1.

0. It can be up to 32 alphanumeric characters long. All the ports will be included in the VLAN. including blanks. Possible values are: • Untag All: Select all the ports on which all frames transmitted from this VLAN will be untagged. All the ports will be included in the VLAN. This field identifies the name for the VLAN you selected. July 2009 3-13 . VLAN ID 1 is always named “Default. The default is blank. VLAN Membership Configuration Fields Field VLAN ID Group Operation Description Select the VLAN Identifier for which you want to display or configure data. Use this field to select all the ports and configure them. Table 3-8. To change the VLAN tagging for one or more ports. • Remove All: This selection has the effect of excluding all ports from the selected VLAN.” VLAN Name Configuring Switching Information v1.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 3-9 3. • Tag All: Select the ports on which all frames transmitted for this VLAN will be tagged. click each port to make traffic forwarded by the interface tagged (T) or untagged (U).

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. July 2009 Configuring Switching Information . If you make any changes to this page. Configuration changes take place immediately. • Untagged: Select the ports on which all frames transmitted for this VLAN will be untagged.0. 5. Possible values are: • Default: The default (VLAN ID = 1) is always present. To access the Port PVID Configuration page: 1. The ports that are selected will be included in the VLAN. • Static: A VLAN that you have configured using this screen. VLAN Membership Configuration Fields (continued) Field Untagged/Tagged Port Members Description Click Untagged Port Members or Tagged Port Members to see the port list and use it to add the ports you selected to this VLAN. Port VLAN ID Configuration Use the Port VLAN ID (PVID) Configuration page to configure a virtual LAN on a port. Click Switching VLAN  Advanced  Port PVID Configuration in the navigation tree. Each port has three modes: • Tagged: Select the ports on which all frames transmitted for this VLAN will be tagged. VLAN Type 4. This field identifies the type of the VLAN you selected. 3-14 v1. click Apply to send the updated configuration to the switch. The ports that are selected will be included in the VLAN.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-8.

0. • VLAN Only: The port will discard any untagged or priority tagged frames it receives. Configuring Switching Information v1. Port VLAN ID Configuration Fields Field Interface Port VLAN ID (PVID) Acceptable Frame Types Description Select the physical interface for which you want to display or configure data. The factory default is 1. • Admit All: Untagged and priority tagged frames received on the port will be accepted and assigned the value of the Port VLAN ID for this port.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 3-10 Table 3-9. VLAN tagged frames will be forwarded in accordance with the IEEE 802. July 2009 3-15 . Whichever you select. Specify how you want the port to handle untagged and priority tagged frames.1Q VLAN standard. The factory default is Admit All. Specify the range of Port VLAN IDs you want assigned to untagged or priority tagged frames received on this port.

Multiple Spanning Tree Protocol (MSTP) supports multiple instances of Spanning Tree to efficiently channel VLAN traffic over different interfaces. is the rapid transitioning of the port to ‘Forwarding’). with slight modifications in the working but not the end effect (chief among the effects. Classic STP provides a single path between end stations. eliminating loops. Port VLAN ID Configuration Fields (continued) Field Ingress Filtering Description Specify how you want the port to handle tagged frames: • Enable: A tagged frame will be discarded if this port is not a member of the VLAN identified by the VLAN ID in the tag. If you make any changes to this page.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-9.1Q VLAN standard. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. Specify the default 802. 3-16 v1. The difference between the RSTP and the traditional STP (IEEE 802. Port Priority 2. STP also provides one path between end stations on a network. Configuration changes take place immediately. Rapid Spanning Tree (RSTP). Possible values are 0–7. • Disable: All frames are forwarded in accordance with the IEEE 802. These features are represented by the parameters ‘pointtopoint’ and ‘edgeport’.1p priority assigned to untagged packets arriving at the port. Multiple STP. For information on configuring Common STP.0. Spanning tree versions supported include Common STP. The factory default is disable. MSTP is compatible to both RSTP and STP. and Rapid STP. July 2009 Configuring Switching Information . Each instance of the Spanning Tree behaves in the manner specified in IEEE 802.1w. A MSTP bridge can be configured to behave entirely as a RSTP bridge or a STP bridge. click Apply to send the updated configuration to the switch. Configuring Spanning Tree Protocol The Spanning Tree Protocol (STP) provides a tree topology for any arrangement of bridges. resulting in rapid transitioning of the port to ‘Forwarding’ state and the suppression of Topology Change Notification. In an untagged frame. the VLAN is the Port VLAN ID specified for the port that received this frame.1d) is the ability to configure and recognize full duplex connectivity and ports which are connected to end stations. 3. see “CST Port Configuration” on page 3-21. It behaves appropriately to STP and RSTP bridges. avoiding and eliminating loops.

Click SwitchingSTPBasic  STP Configuration in the navigation tree.GS716Tv2 and GS724Tv3 Software Administration Manual Note: For two bridges to be in the same region. July 2009 3-17 . refer to the IEEE 802. The Spanning Tree folder contains links to the following features: • • • • • • • • “STP Switch Configuration/Status” on page 3-17 “CST Configuration” on page 3-19 “CST Port Configuration” on page 3-21 “CST Port Status” on page 3-23 “Rapid STP Configuration” on page 3-24 “MST Configuration” on page 3-26 “MST Port Configuration” on page 3-27 “STP Statistics” on page 3-31 STP Switch Configuration/Status The Spanning Tree Switch Configuration/Status page contains fields for enabling STP on the switch.1s and their configuration name. digest key.0. and revision level should match.1Q standard. Configuring Switching Information v1. For additional information about regions and their effect on network topology. the force version should be 802. To display the Spanning Tree Switch Configuration/Status page: 1.

When this feature is enabled. BPDU packets arriving at this port are flooded to other ports if STP is disabled.1s Name used to identify the configuration currently being used. It may be up to 32 alphanumeric characters. The bridge identifier for the CST. Specifies the Force Protocol Version parameter for the switch. Number used to identify the configuration currently being used. It is made up using the bridge priority and the base MAC address of the bridge. Configuration Name Configuration Revision Level Configuration Digest Key BPDU Flooding Bridge Identifier 3-18 v1.1d • RSTP (Rapid Spanning Tree Protocol): IEEE 802. Spanning Tree Switch Configuration/Status Fields Field Spanning Tree State STP Operation Mode Description Enables or disables Spanning Tree operation on the switch. The default value is 0. July 2009 Configuring Switching Information .0. Options are: • STP (Spanning Tree Protocol): IEEE 802. Enables or disables BPDU Flooding. The values allowed are between 0 and 65535.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 3-11 Table 3-10. Number used to identify the configuration currently being used.1w • MSTP (Multiple Spanning Tree Protocol): IEEE 802.

July 2009 3-19 . Port to access the Designated Root for the CST. The number of times the topology has changed for the CST. If you make any configuration changes. Priority and base MAC address of the CST Regional Root. To display the Spanning Tree CST Configuration page: 1. Minimum time between transmission of Configuration BPDUs. It is made up from the bridge priority and the base MAC address of the bridge. Derived value of the Root Port Bridge Forward Delay parameter. Designated Root Root Path Cost Root Port Max Age (secs) Forward Delay (secs) Hold TIme (secs) CST Regional Root CST Path Cost 2. The bridge identifier of the root bridge.0. CST Configuration Use the Spanning Tree CST Configuration page to configure Common Spanning Tree (CST) and Internal Spanning Tree on the switch. Path Cost to the CST tree Regional Root. The value is either True or False. click Apply to send the updated configuration to the switch. Spanning Tree Switch Configuration/Status Fields (continued) Field Time Since Topology Change Topology Change Count Topology Change Description The time in seconds since the topology of the CST last changed.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-10. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch 4. 3. Click SwitchingSTPAdvanced  CST Configuration in the navigation tree. Path cost to the Designated Root for the CST. Configuration changes occur immediately. The value must be less than or equal to (2 X Bridge Forward Delay) – 1 and greater than or equal to 2 X (Bridge Hello Time +1). The value of the topology change parameter for the switch indicating if a topology change is in progress on any port assigned to the CST. Configuring Switching Information v1. Click Refresh to update the information on the screen with the most current data. Specifies the bridge maximum age for CST.

each is assigned a priority.0. After exchanging BPDUs. For example. The valid range is 6–40. The bridge priority is a multiple of 4096. If you specify a priority that is not a multiple of 4096. it will be set to 0.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 3-12 Table 3-11. if the priority is attempted to be set to any value between 0 and 4095. The valid range is 0–61440. The default value is 20. the priority is automatically set to the next lowest priority that is a multiple of 4096. July 2009 Configuring Switching Information . Specifies the bridge maximum age time for the Common and Internal Spanning Tree (CST). Specifies the bridge priority value for the Common and Internal Spanning Tree (CST). The value is fixed at 2 seconds. and the value must be less than or equal to (2 * Bridge Forward Delay) – 1 and greater than or equal to 2 * (Bridge Hello Time +1). Spanning Tree CST Configuration/Status Fields Field Bridge Priority Description When switches or bridges are running STP. Bridge Max Age (secs) Bridge Hello Time (secs) 3-20 v1. Specifies the switch Hello time for the Common and Internal Spanning Tree (CST). the switch with the lowest priority value becomes the root bridge. which indicates the amount of time in seconds a bridge waits before implementing a topological change. which indicates the amount of time in seconds a root bridge waits between configuration messages. The default priority is 32768.

Table consisting of the VLAN IDs and the corresponding FID associated with each of them Table consisting of the FIDs and the corresponding VLAN IDs associated with each of them. click Apply to send the updated configuration to the switch.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-11. Spanning Tree MSTP Status Fields Field MST ID VID FID Description Table consisting of the MST instances (including the CST) and the corresponding VLAN IDs associated with each of them. Specifies the maximum number of bridge hops the information for a particular CST instance can travel before being discarded. Click Refresh to update the information on the screen with the most current data. 2. July 2009 3-21 . The value must be greater or equal to (Bridge Max Age / 2) + 1. Configuration changes take place immediately. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch 4. The default value is 15. To display the Spanning Tree CST Port Configuration page: 1. Configuring Switching Information v1. Spanning Tree CST Configuration/Status Fields (continued) Field Bridge Forward Delay (secs) Description Specifies the switch forward delay time. CST Port Configuration Use the Spanning Tree CST Port Configuration page to configure Common Spanning Tree (CST) and Internal Spanning Tree on a specific port on the switch. The time range is from 4 seconds to 30 seconds. The valid range is 1–127. If you make any configuration changes. which indicates the amount of time in seconds a bridge remains in a listening and learning state before forwarding packets. 3. Table 3-12. Click SwitchingSTPAdvanced  CST Port Configuration in the navigation tree. Spanning Tree Maximum Hops Displayed on the Spanning Tree CST Configuration page is the MSTP Status table.0.

The port priority is set in multiples of 16. The priority for a particular port within the CST. Set the External Path Cost to a new value for the specified port in the spanning tree. It takes a value in the range of 1–200000000. The Forwarding state of this port. It takes a value in the range of 1– 200000000. July 2009 Configuring Switching Information . Set the Path Cost to a new value for the specified port in the common and internal spanning tree. Possible values are Enable or Disable.0. the priority is set to 0. the priority is set to the priority is automatically set to the next lowest priority that is a multiple of 16. Possible values are Enable or Disable. Priority External Port Path Cost 3-22 v1. If you specify a number between 16 and 31. Specifies if the specified port is an Edge Port with the CST. Spanning Tree CST Port Configuration/Status Fields Field Interface STP Status Fast Link Port State Path Cost Description Select one of the physical or port channel interfaces associated with the VLAN(s) associated with the CST. if you set a value between 0 and 15. the priority is set to 16. Spanning Tree Protocol Administrative Mode associated with the port or port channel. If you specify a value that is not a multiple of 16.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 3-13 Table 3-13. The default is Disable. For example.

which indicates the amount of time in seconds a port waits between configuration messages. Spanning Tree CST Port Configuration/Status Fields (continued) Field Port ID Hello Timer Description The port identifier for the specified port within the CST. The value is fixed at 2 seconds. Figure 3-14 Configuring Switching Information v1. 4. Configuration changes take place immediately.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-13. To display the Spanning Tree CST Port Status page: 1. July 2009 3-23 . Specifies the switch Hello time. Click SwitchingSTPAdvanced  CST Port Status in the navigation tree.0. click Apply to send the updated configuration to the switch. Click Refresh to update the information on the screen with the most current data. If you make any configuration changes. 2. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. CST Port Status Use the Spanning Tree CST Port Status page to display Common Spanning Tree (CST) and Internal Spanning Tree on a specific port on the switch. 3. It is made up from the port priority and the interface number of the port.

GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-14. Indicates whether the port is enabled as an edge port. To display the Rapid STP Configuration page: 3-24 v1. Click Refresh to update the information on the screen with the most current data. Possible values are Enabled or Disabled. Bridge Identifier of the bridge with the Designated Port. Port Identifier on the Designated Bridge that offers the lowest cost to the LAN. Identifies whether the next BPDU to be transmitted for this port would have the topology change acknowledgement flag set. July 2009 Configuring Switching Information . Root Bridge for the CST. The port is associated with the VLAN(s) associated with the CST. It is made up from the port priority and the interface number of the port. Designated Root Designated Cost Designated Bridge Designated Port Topology Change Acknowledge Edge Port Point-to-point MAC CST Regional Root CST Path Cost Port Forwarding State 2. Shows the path Cost to the CST tree Regional Root. It is made up using the bridge priority and the base MAC address of the bridge. Spanning Tree CST Port Status Fields Field Interface Port Role Description Select a physical or port channel interface to configure. Rapid STP Configuration Use the Rapid Spanning Tree Configuration page to configure Rapid Spanning Tree (RSTP) on the switch. Master Port. Shows the bridge priority and base MAC address of the CST Regional Root. It is made up using the bridge priority and the base MAC address of the bridge. Derived value of the point-to-point status. The port role will be one of the following values: Root Port. Alternate Port. Designated Port. Ports with a lower cost are less likely to be blocked if STP detects loops. Backup Port.0. Displays cost of the port participating in the STP topology. or Disabled Port. Each MST Bridge Port that is enabled is assigned a Port Role for each spanning tree. Displays the Forwarding State of this port. It is either “True” or “False”.

The port role will be one of the following values: Root Port. Mode Fast Link Status 2. Each MST Bridge Port that is enabled is assigned a Port Role for each spanning tree.0. Click Refresh to update the information on the screen with the most current data. Master Port. Figure 3-15 Table 3-15. Alternate Port.GS716Tv2 and GS724Tv3 Software Administration Manual 1. RSTP. and MSTP. Specifies the spanning tree operation mode. Different modes are STP. or Disabled Port. Indicates whether the port is enabled as an edge port. Rapid STP Field Interface Role Description The physical or port channel interfaces associated with VLANs associated with the CST. Configuring Switching Information v1. July 2009 3-25 . Backup Port. Click SwitchingSTPAdvanced  RSTP in the navigation tree. The Forwarding State of this port. Designated Port.

The bridge priority is a multiple of 4096. After exchanging BPDUs. The ID of the MST being created. each is assigned a priority. To display the Spanning Tree MST Configuration page: 1. Valid values for this are between 1 and 4094. If you specify a priority that is not a multiple of 4096. When switches or bridges are running STP. For example. it will be set to 0. July 2009 Configuring Switching Information . the switch with the lowest priority value becomes the root bridge. the priority is automatically set to the next lowest priority that is a multiple of 4096. Figure 3-16 Table 3-16. if the priority is attempted to be set to any value between 0 and 4095.The valid range is 0–61440. Use this page to create and configure a new MST or select an existing MST to display or configure.0. Specifies the bridge priority value for the MST. The default priority is 32768. 3-26 v1. Spanning Tree MST Configuration Field MST ID Priority Description This is only visible when the select option of the MST ID select box is selected. Click SwitchingSTPAdvanced  MST Configuration in the navigation tree.GS716Tv2 and GS724Tv3 Software Administration Manual MST Configuration Use the Spanning Tree MST Configuration page to configure Multiple Spanning Tree (MST) on the switch.

All VLANs associated with the instance are associated with the CST. These can be selected or unselected for reconfiguring the association of VLANs to MST instances. July 2009 3-27 . To display the Spanning Tree MST Port Status page: Configuring Switching Information v1. Displays the bridge identifier of the root bridge. Click Add to create a new MST which you have configured.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-16. Displays the total number of times topology has changed for the selected MST instance. The time is displayed in hour/minute/second format. It is made up using the bridge priority and the base MAC address of the bridge. which is made up from the bridge priority and the base MAC address of the bridge. Bridge Identifier The bridge identifier for the selected MST instance. Indicates whether a topology change is in progress on any port assigned to the selected MST instance. for example. 2. The VLANs associated with the MST instance which is selected are highlighted on the list. and 4 seconds. The possible values are True or False. Click Delete to delete the selected MST instance. Configuration changes take effect immediately. Displays the path cost to the Designated Root for this MST instance. 4.0. Spanning Tree MST Configuration (continued) Field VLAN ID Description This gives a list box of all VLANs on the switch. click Apply to apply the new settings to the switch. Indicates the port to access the Designated Root for this MST instance. If you make any configuration changes. 10 minutes. MST Port Configuration Use the Spanning Tree MST Port Configuration page to display Multiple Spanning Tree (MST) on a specific port on the switch. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 5. Time Since Topology Change Topology Change Count Topology Change Designated Root Root Path Cost Root Port Displays the total amount of time since the topology of the selected MST instance last changed. 5 hours. 3.

Figure 3-17 and Figure 3-18 show the left and right portions of the Web page.GS716Tv2 and GS724Tv3 Software Administration Manual 1. Click Switching  STP  Advanced  MST Port Configuration in the navigation tree. July 2009 Configuring Switching Information . the page displays a “No MSTs Available” message and does not display the fields shown in Table 3-17 on page 3-29. 3-28 v1.0. Figure 3-17 Figure 3-18 Note: If no MST instances have been configured on the switch.

the priority is set to 0.0. It takes a value in the range of 1–200000000. Displays whether the path cost is automatically calculated (Enabled) or not (Disabled). If you specify a value that is not a multiple of 16. Port Priority Port Path Cost Auto-calculated Port Path Cost Port ID Port Up Time Since Counters Last Cleared Port Mode Configuring Switching Information v1. If you specify a number between 16 and 31. the priority is set to 16. Spanning Tree Protocol Administrative Mode associated with the port or port channel. Possible values are Enable or Disable. Time since the counters were last cleared. Set the Path Cost to a new value for the specified port in the selected MST instance. July 2009 3-29 . For example. It is made up from the port priority and the interface number of the port. Hours. Path cost is calculated based on the link speed of the port if the configured value for Port Path Cost is zero. The port is associated with the VLAN(s) associated with the selected MST instance. The priority for a particular port within the selected MST instance. The port identifier for the specified port within the selected MST instance. the priority is set to the priority is automatically set to the next lowest priority that is a multiple of 16. The port priority is set in multiples of 16. displayed in Days. and Seconds. if you set a value between 0 and 15. Spanning Tree MST Port Status Fields Field Select MST Interface Description Select an existing MST instance from the pull down list of MST IDs in the Status table at the top of the screen.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 3-19 Table 3-17. Select a physical or port channel interface to configure. Minutes.

• Listening: The port is currently in the listening mode. It is made up using the bridge priority and the base MAC address of the bridge. Designated Port. Displays cost of the port participating in the STP topology.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-17. If enabled. The port forwards traffic while learning MAC addresses. Port Identifier on the Designated Bridge that offers the lowest cost to the LAN. Ports with a lower cost are less likely to be blocked if STP detects loops. however. Root Bridge for the selected MST instance. The port can forward traffic and learn new MAC addresses Each MST Bridge Port that is enabled is assigned a Port Role for each spanning tree. Configuration changes take effect immediately. 3-30 v1. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. Master Port or Disabled Port. Possible port states are: • Disabled: STP is currently disabled on the port. The port cannot forward traffic nor can it learn MAC addresses. The port cannot forward traffic. 3. the port state determines what forwarding action is taken on traffic. It is made up using the bridge priority and the base MAC address of the bridge. Click Refresh to update the screen with the latest MST information. Port Role Designated Root Designated Cost Designated Bridge Designated Port 2. If you make any configuration changes. It is made up from the port priority and the interface number of the port. Alternate Port. July 2009 Configuring Switching Information . Spanning Tree MST Port Status Fields (continued) Field Port Forwarding State Description Indicates the current STP state of a port. 4. • Forwarding: The port is currently in the forwarding mode. Bridge Identifier of the bridge with the Designated Port. it can learn new MAC addresses. click Apply to apply the new settings to the switch. The port role will be one of the following values: Root Port. Backup Port. • Blocking: The port is currently blocked and cannot be used to forward traffic or learn MAC addresses. • Learning: The port is currently in the learning mode.0.

Configuring Switching Information v1. Number of STP BPDUs transmitted from the selected port. Number of RSTP BPDUs received at the selected port. Number of RSTP BPDUs transmitted from the selected port. Number of MSTP BPDUs transmitted from the selected port. July 2009 3-31 . Figure 3-20 Table 3-18.0.GS716Tv2 and GS724Tv3 Software Administration Manual STP Statistics Use the Spanning Tree Statistics page to view information about the number and type of bridge protocol data units (BPDUs) transmitted and received on each port. Click Switching  STP  Advanced  STP Statistics in the navigation tree. 2. Number of STP BPDUs received at the selected port. To display the Spanning Tree Statistics page: 1. Click Refresh to update the screen with the latest STP statistics information. Number of MSTP BPDUs received at the selected port. Spanning Tree Statistics Fields Field Interface STP BPDUs Received STP BPDUs Transmitted RSTP BPDUs Received RSTP BPDUs Transmitted MSTP BPDUs Received MSTP BPDUs Transmitted Description Select a physical or port channel interface to view its statistics.

While nodes will rarely incur any processing overhead to filter packets addressed to unrequested group addresses. When a packet with a broadcast or multicast destination address is received. this approach could lead to less efficient use of network bandwidth. for example in full duplex links. Multicast IP traffic is traffic that is destined to a host group.255.255. the switch will forward a copy into each of the remaining network segments in accordance with the IEEE MAC Bridge standard. This approach works well for broadcast packets that are intended to be seen or processed by all connected nodes. Based on the IGMP query and report messages. The Multicast folder contains links to the following features: • • “Global Configuration” on page 3-32 “IGMP Snooping Interface Configuration” on page 3-34 Global Configuration Use the IGMP Snooping Configuration page to configure the parameters for IGMP snooping. Packets will be flooded into network segments where no node has any interest in receiving the packet. Host groups are identified by class D IP addresses. the packet is made accessible to all nodes connected to the network. the switch forwards traffic only to the ports that request the multicast traffic.0.0.255. however.0 to 239. A traditional Ethernet network may be separated into different network segments to prevent placing too many devices onto the same shared media. The problem of wasting bandwidth is even worse when the LAN segment is not shared. July 2009 Configuring Switching Information . they are unable to transmit new packets onto the shared media for the period of time that the multicast packet is flooded. The switch uses the information in the IGMP packets as they are being forwarded throughout the network to determine which segments should receive packets directed to the group address. Eventually. Allowing switches to snoop IGMP packets is a creative effort to solve this problem. which is used to build forwarding lists for multicast traffic. particularly when the packet is intended for only a small number of nodes. This prevents the switch from broadcasting the traffic to all ports and possibly affecting network performance. To access the IGMP Snooping Configuration page: 3-32 v1.GS716Tv2 and GS724Tv3 Software Administration Manual Configuring IGMP Snooping Internet Group Management Protocol (IGMP) Snooping is a feature that allows a switch to forward multicast traffic intelligently on the switch. In the case of multicast packets. Bridges and switches connect these segments. which range from 224.0.

0. The default is Disable. Data Frames Forwarded by Shows the number of data frames forwarded by the CPU. see “IGMP Snooping Interface Configuration” on page 3-34. Figure 3-21 Table 3-19. see “IGMP Snooping VLAN Configuration” on page 3-40.GS716Tv2 and GS724Tv3 Software Administration Manual 1. July 2009 3-33 . To enable interfaces for IGMP snooping. Configuring Switching Information v1. Lists the interfaces currently enabled for IGMP Snooping. Shows the number of multicast control frames that have been processed by the CPU. To enable VLANs for IGMP snooping. Click Switching Multicast  IGMP Snooping  IGMP Snooping Configuration in the navigation tree. Displays VLAN IDs enabled for IGMP snooping querier. the CPU VLAN Ids Enabled For IGMP Snooping VLAN Ids Enabled For IGMP Snooping Querier Displays VLAN IDs enabled for IGMP snooping. IGMP Snooping Configuration Fields Field IGMP Snooping Status Multicast Control Frame Count Interfaces Enabled for IGMP Snooping Description Select the administrative mode for IGMP Snooping for the switch.

To access the IGMP Snooping Interface Configuration page: 1.0.GS716Tv2 and GS724Tv3 Software Administration Manual 2. IGMP Snooping Interface Configuration Fields Field Interface Admin Mode Description Lists all physical. Configuration changes take effect immediately. 3. Select the interface mode for the selected interface for IGMP Snooping for the switch from the menu. If you make any configuration changes. click Apply to apply the new settings to the switch. The default is Disable. IGMP Snooping Interface Configuration Use the IGMP Snooping Interface Configuration page to configure IGMP snooping settings on specific interfaces. Select the interface you want to configure. VLAN. Click Switching Multicast  IGMP Snooping  IGMP Snooping Interface Configuration in the navigation tree. 3-34 v1. Figure 3-22 Table 3-20. and LAG interfaces. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. July 2009 Configuring Switching Information .

click Apply to apply the new settings to the switch. traffic is prevented from going to parts of the network where that traffic is unnecessary. If a match is found.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-20. The default is 0 seconds. depending on the switch configuration. the destination MAC address is combined with the VLAN ID and a search is performed in the Layer 2 Multicast Forwarding Database. no expiration. then the packet is either flooded to all ports in the VLAN or discarded. Specify the amount of time you want the switch to wait to receive a query on an interface before removing it from the list of interfaces with multicast routers attached. The configured value must be less than the Group Membership Interval. The default is Disable. The default is 10 seconds. Enter a value greater or equal to 1 and less than the Group Membership Interval in seconds. When a packet enters the switch. Configuration changes take effect immediately. Enter a value between 0 and 3600 seconds. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. If you make any configuration changes. then the packet is forwarded only to the ports that are members of that multicast group. The default is 260 seconds. Enter a value between 1 and 3600 seconds. Max Response Time MRouter Timeout Fast Leave Admin Mode 2. If no match is found. A value of zero indicates an infinite timeout. Select the Fast Leave mode for a particular interface from the menu. The Switching  Multicast folder contains links to the following pages: Configuring Switching Information v1. July 2009 3-35 .0. Viewing Multicast Forwarding Database Information The Layer 2 Multicast Forwarding Database (MFDB) is used by the switch to make forwarding decisions for packets that arrive with a multicast destination MAC address. By limiting multicasts to only certain ports in the switch. 3. Specify the amount of time you want the switch to wait after sending a query on an interface because it did not receive a report for a particular group on that interface. IGMP Snooping Interface Configuration Fields (continued) Field Host Timeout Description Specify the amount of time you want the switch to wait for a report for a particular group on a particular interface before it deletes that interface from the group.

for example. Figure 3-23 Table 3-21.0. To access the IGMP Snooping Table page: 1. The format is 6 two-digit hexadecimal numbers that are separated by colons. July 2009 Configuring Switching Information . 01:00:5e:45:67:89. A VLAN ID for which the switch has forwarding and filtering information. VLAN ID 3-36 v1. Click Switching Multicast  IGMP Snooping  IGMP Snooping Table in the navigation tree. IGMP Snooping Table Fields Field MAC Address Description A multicast MAC address for which the switch has forwarding and/or filtering information.GS716Tv2 and GS724Tv3 Software Administration Manual • • • • “IGMP Snooping Table” on page 3-36 “MFDB Table” on page 3-37 “MFDB Statistics” on page 3-39 “IGMP Snooping VLAN Configuration” on page 3-40 IGMP Snooping Table Use the IGMP Snooping Table page to view all of the entries in the Multicast Forwarding Database that were created for IGMP snooping.

Static entries are those that are configured by the end user. Network Configured. July 2009 3-37 . Possible values are Management Configured. Configuring Switching Information v1. Click Clear to clear one or all of the IGMP Snooping entries. The list of interfaces that are designated for forwarding (Fwd) and filtering (Flt) for the associated address. 3. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. MFDB Table Use the MFDB Table page to view the port membership information for all active multicast address entries. Dynamic entries are added to the table as a result of a learning process or protocol. IGMP Snooping Table Fields (continued) Field Type Description This displays the type of the entry. Click Refresh to reload the page and display the most current information. Entries may contain data for more than one protocol. The text description of this multicast table entry. Click Switching Multicast  IGMP Snooping  MFDB Table in the navigation tree. Description Interface 2. 4. The key for an entry consists of a MAC address. and Network Assisted.0.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-21. To access the MFDB Table page: 1.

MFDB Table Fields Field MAC Address Description The MAC Address to which the multicast MAC address is related. An exact match is required. If the address exists.0.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 3-24 Table 3-22. This displays the type of the entry. Dynamic entries are added to the table as a result of a learning process or protocol. and then click Go. Possible values are Management Configured. that entry will be displayed. Possible values are IGMP Snooping or Static Filtering. for example 00:0f:43:67:89:AB. VLAN ID Component Type Description 3-38 v1. Static entries are those that are configured by the end user. To search by MAC address. This is the component that is responsible for this entry in the Multicast Forwarding Database. The text description of this multicast table entry. enter the address with the MFDB table entry you want displayed. Network Configured and Network Assisted. The VLAN ID to which the multicast MAC address is related. July 2009 Configuring Switching Information . Enter six two-digit hexadecimal numbers separated by colons.

GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-22. Click Switching Multicast  IGMP Snooping  MFDB Statistics in the navigation tree. MFDB Table Fields (continued) Field Interface Forwarding Interfaces Description The list of interfaces that are designated for forwarding (Fwd) and filtering (Flt) for the selected address.0. July 2009 3-39 . Figure 3-25 Configuring Switching Information v1. MFDB Statistics Use the multicast forwarding database Statistics page to view statistical information about the MFDB table. Click Refresh to update the information on the screen with the most current data. To access the MFDB Statistics page: 1. 2. The resultant forwarding list is derived from combining all the forwarding interfaces and removing the interfaces that are listed as the static filtering interfaces.

Click Refresh to update the information on the screen with the most current data. This value is also known as the MFDB high-water mark. Multicast Forwarding Database Statistics Fields Field Max MFDB Table Entries Most MFDB Entries Since Last Reset Current Entries Description Shows the maximum number of entries that the Multicast Forwarding Database table can hold.0. July 2009 Configuring Switching Information . 2. The largest number of entries that have been present in the Multicast Forwarding Database table since the system was last reset. IGMP Snooping VLAN Configuration Use the IGMP Snooping VLAN Configuration page to configure IGMP snooping settings for VLANs on the system. Shows the current number of entries in the Multicast Forwarding Database table. 3-40 v1.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-23.

July 2009 3-41 . Figure 3-26 Table 3-24. Click Switching Multicast  IGMP Snooping  IGMP Snooping VLAN Configuration in the navigation tree. IGMP Snooping VLAN Configuration Fields Field VLAN ID Fast Leave Admin Mode Description List of VLAN IDs for which IGMP Snooping is enabled. You should enable fast-leave admin mode only on VLANs where only one host is connected to each layer 2 LAN port. This prevents the inadvertent dropping of the other hosts that were connected to the same layer 2 LAN port but were still interested in receiving multicast traffic directed to that group. Also.GS716Tv2 and GS724Tv3 Software Administration Manual To access the IGMP Snooping VLAN Configuration page: 1.0. Enable or disable the IGMP Snooping Fast Leave Mode for the specified VLAN ID. fast-leave processing is supported only with IGMP version 2 hosts. Enabling fast-leave allows the switch to immediately remove the layer 2 LAN interface from its forwarding table entry upon receiving an IGMP leave message for that multicast group without first sending out MAC-based general queries to the interface. Host Timeout Configuring Switching Information v1. The valid range is (Maximum Response Time + 1) to 3600 seconds. Sets the value for group membership interval of IGMP snooping for the specified VLAN ID.

MRouter Timeout Query Mode Query Interval 2. keep the switch updated with the current multicast group membership on a port-by-port basis. 3. 5. Its value should be greater than the Group Membership Interval value. Sets the value for multicast router expiry time of IGMP Snooping for the specified VLAN ID. If you make any configuration changes. Valid range is 1–18000 seconds. This central device is the 'IGMP querier'. Enable or disable the IGMP Querier Mode for the specified VLAN ID. Click Delete to disable IGMP snooping on the specified VLAN. Enter the value for IGMP Query Interval for the specified VLAN ID. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 4.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-24. The IGMP Snooping Querier folder contains links to the following features: • • • “IGMP Snooping Querier Configuration” on page 3-43 “IGMP Snooping Querier VLAN Configuration” on page 3-44 “IGMP Snooping Querier VLAN Status” on page 3-45 Configuring Switching Information v1. Click Add to enable IGMP snooping on the specified VLAN. July 2009 3-42 . If the switch does not receive updated membership information in a timely fashion.0. Configuring IGMP Snooping Queriers IGMP snooping requires that one central switch or router periodically query all end-devices on the network to announce their multicast memberships. The range is 1 to (Group Membership Interval -1) seconds. This value must be less than the IGMP Query Interval time value. separately. Configuration changes take effect immediately. click Apply to apply the new settings to the switch. on VLANs. The valid range is 0–3600 seconds. The IGMP query responses. it will stop forwarding multicasts to the port where the end device is located. known as IGMP reports. IGMP Snooping VLAN Configuration Fields (continued) Field Maximum Response Time Description Enter the amount of time in seconds that a switch will wait after sending a query on an interface because it did not receive a report for a particular group in that interface. These pages enable you to configure and display information on IGMP snooping queriers on the network and.

IGMP Snooping Querier Configuration Fields Field Querier Admin Mode Snooping Querier Address Description Select the administrative mode for IGMP Snooping for the switch from the menu. Configuring Switching Information v1. The Query Interval must be a value in the range of 1–18000 seconds. IGMP Version Query Interval Querier Expiry Interval 2. The default value is 60. Figure 3-27 Table 3-25. Specify the time interval in seconds after which the last querier information is removed. Click Refresh to redisplay the page with the latest information from the switch. Click Switching Multicast  IGMP Snooping Querier  IGMP Snooping  Querier Configuration in the navigation tree. The Querier Expiry Interval must be a value in the range of 60–300 seconds. Specify the time interval in seconds between periodic queries sent by the snooping querier. Specify the IGMP protocol version used in periodic IGMP queries. Specify the Snooping Querier Address to be used as source address in periodic IGMP queries. The default is Disable. The default value is 60.GS716Tv2 and GS724Tv3 Software Administration Manual IGMP Snooping Querier Configuration Use this page to enable or disable the IGMP Snooping Querier feature. This address is used when no address is configured on the VLAN on which the query is being sent. July 2009 3-43 . To access this page: 1. specify the IP address of the router to perform the querying.0. and configure the related parameters.

IGMP Snooping Querier VLAN Configuration Fields Field VLAN ID Description Specifies VLAN ID for which the IGMP Snooping Querier is to be enabled. 3-44 v1. Click Switching Multicast  IGMP Snooping Querier  Querier VLAN Configuration in the navigation tree. click Apply to apply the new settings to the switch. July 2009 Configuring Switching Information . You can also set pre-configurable Snooping Querier parameters. Figure 3-28 Table 3-26. To access this page: 1. Configuration changes take effect immediately. IGMP Snooping Querier VLAN Configuration Use this page to configure IGMP queriers for use with VLANs on the network.0. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.GS716Tv2 and GS724Tv3 Software Administration Manual 3. If you configure an IGMP snooping querier. Select New Entry to create a new VLAN ID for IGMP Snooping. 4.

0. click Apply to apply the new settings to the switch. When enabled.GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-26. upon seeing another querier of same version in the VLAN. 5. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. When this mode is Mode disabled. Snooping Querier VLAN Address Specify the Snooping Querier Address to be used as the source address in periodic IGMP queries sent on the specified VLAN. in which the least IP address operates as the querier in that VLAN. July 2009 3-45 . The other querier moves to non-querier state. 2. To access this page: Configuring Switching Information v1. Click Refresh to redisplay the page with the latest information from the switch. IGMP Snooping Querier VLAN Configuration Fields (continued) Field Description Querier Election Participate Enable or disable Querier Participate Mode. This button is not visible when a VLAN is not selected. 3. the snooping querier participates in querier election. Click Delete to disable Snooping Querier on the selected VLAN. IGMP Snooping Querier VLAN Status Use this page to view the operational state and other information for IGMP snooping queriers for VLANs on the network. If you configure a snooping querier for a VLAN. the snooping querier moves to non-querier state. 4.

Displays the IP address of the last querier from which a query was snooped on the VLAN. Displays the IGMP protocol version of the operational querier. The snooping switch will send out periodic queries with a time interval equal to the configured querier query interval. If the snooping switch sees a better querier (numerically lower) in the VLAN. IGMP Snooping Querier VLAN Status Fields Field VLAN ID Description Specifies the VLAN ID on which the IGMP Snooping Querier is administratively enabled and for which VLAN exists in the VLAN database. the snooping switch moves into querier mode. Click Switching Multicast  IGMP Snooping Querier  Querier VLAN Status in the navigation tree. Figure 3-29 Table 3-27.GS716Tv2 and GS724Tv3 Software Administration Manual 1.0. Specifies the operational state of the IGMP Snooping Querier on a VLAN: • Querier: The snooping switch is the querier in the VLAN. or the network management address is not configured. If the querier expiry interval timer expires. July 2009 Configuring Switching Information . it moves to nonquerier mode. • Non-Querier: The snooping switch is in non-querier mode in the VLAN. Operational State Operational Version Last Querier Address 3-46 v1. • Disabled: The snooping querier is not operational on the VLAN. The snooping querier moves to disabled mode when IGMP snooping is not operational on the VLAN. when the querier address is not configured.

100. • MAC Address: Select MAC Address from the menu and enter a six-byte hexadecimal MAC address in two-digit groups separated by colons. 2. 3-47 v1. July 2009 • Configuring Switching Information .GS716Tv2 and GS724Tv3 Software Administration Manual Table 3-27. VLAN ID: Select VLAN ID from the menu. VLAN ID. then click Go. The Address Table folder contains links to the following features: • • • • “Searching the MAC Address Table” on page 3-47 “Dynamic Address Configuration” on page 3-49 “MAC Address Table” on page 3-50 “Static MAC Address” on page 3-52 Searching the MAC Address Table Use the search function of the MAC Address Table page to display information about unicast entries for which the switch has forwarding and/or filtering information. enter the VLAN ID. If any entries with that VLAN ID exist they are displayed. To access this page: 1. Click Refresh to redisplay the page with the latest information from the switch. Operational Max Response Displays the maximum response time to be used in the queries that are Time sent by the snooping querier. Click Switching Address Table  Basic  Address Table in the navigation tree. Use the “Search By” field to search for MAC Addresses by MAC Address. The transparent bridging function uses the forwarding database entries to determine how to forward a received frame. IGMP Snooping Querier VLAN Status Fields (continued) Field Last Querier Version Description Displays the IGMP protocol version of the last querier from which a query was snooped on the VLAN. for example.0. 2. that entry will be displayed. If the address exists. This information is used by the transparent bridging function in determining how to propagate a received frame. or Interface. Then click Go. Searching and Configuring the Forwarding Database The forwarding database maintains a list of MAC addresses after having received a packet from this MAC address. An exact match is required.

click Go. then. The possible values are: • Static: The entry was added when a static MAC filter was defined..0. enter the interface ID in g1. and is currently in use. • Management: The system MAC address. they are displayed. A unicast MAC address for which the switch has forwarding and/or filtering information. MAC Address Interface Status 3. Figure 3-30 Table 3-28. July 2009 Configuring Switching Information . In other words. Click Clear to clear Dynamic MAC Addresses in the table. g2. The format is a six-byte MAC address with each byte separated by colons. 3-48 v1.. If any entries with learned on that interface exist. which is identified with interface c1. The port where this address was learned. this field shows the port through which the MAC address can be reached. MAC Address Table Fields Field VLAN ID Description Specifies the VLAN ID on which the IGMP Snooping Querier is administratively enabled and for which VLAN exists in the VLAN database. For example. The status of this entry. 00:0F:89:AB:CD:EF. format.GS716Tv2 and GS724Tv3 Software Administration Manual • Interface: Select Interface from the menu. • Learned: The entry was learned by observing the source MAC addresses of incoming traffic.

July 2009 3-49 .1d1990 recommends a default of 300 seconds.0. 5. IEEE 802. Click Refresh to redisplay the page to show the latest MAC Addresses. Figure 3-31 Table 3-29. Dynamic Address Configuration Use the Advanced  Dynamic Addresses page to set the amount of time to keep a learned MAC address entry in the forwarding database. Dynamic Address Configuration Fields Field Address Aging Description Specify the number of seconds the forwarding database should wait before deleting a learned entry that has not been updated. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. You may enter any number of seconds between 10 and 1000000. To access the Configuration page: 1. The factory default is 300. and dynamically learned entries. The forwarding database contains static entries. Click Switching  Address Table  Advanced  Dynamic Addresses in the navigation tree. which are removed if they are not updated within a given time.GS716Tv2 and GS724Tv3 Software Administration Manual 4. Configuring Switching Information v1. which are never aged out.

format. MAC Address Table The MAC Address Table contains information about unicast entries for which the switch has forwarding and/or filtering information. If any entries with learned on that interface exist. the entry will be displayed as the first entry. 2. or interface: • Search by VLAN ID. 100. followed by the remaining (greater) MAC addresses. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. Configuration changes take effect immediately. This information is used by the transparent bridging function in determining how to propagate a received frame.. 3. Search by Interface. which is the factory default. July 2009 Configuring Switching Information . they are displayed. You can search for MAC Addresses by VLAN ID. MAC Address. An exact match is required. that entry will be displayed.0. If the address exists. Click Switching Address Table  Advanced  Address Table in the navigation tree. Select VLAN ID from the menu. Search by MAC Address. enter the interface ID in g1. and then click Go. Select MAC Address from the menu and enter a six-byte hexadecimal MAC address in two-digit groups separated by colons.. Click Apply to apply to send the updated configuration to the switch. Select Interface from the menu. • • 3-50 v1.GS716Tv2 and GS724Tv3 Software Administration Manual Note: IEEE 802. g2. for example. then click Go.1d recommends a default of 300 seconds. To access the MAC Address Table page: 1. and then click Go. If the address exists. and enter the VLAN ID.

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 3-32 Table 3-30. MAC Address Table Fields
Field VLAN ID MAC Address Description The VLAN ID associated with the MAC Address. A unicast MAC Address for which the switch has forwarding and/or filtering information. The MAC address is in the format of 6 two-digit hexadecimal numbers that are separated by colons. For example, 00:0f:5e:45:67:89 is the MAC Address. The port upon which this address was learned. The status of this entry. Possible values are: • Learned. The value of the corresponding instance was learned, and is being used. • Management. The value of the corresponding instance is also the value of an existing instance of dot1dStaticAddress. • Static.The value of the corresponding instance was added by the system or a user and cannot be relearned.

Interface Status

2. Click Clear to clear the entries. 3. Click Refresh to reload the page and display the latest MAC address learned on a specific port.

Configuring Switching Information v1.0, July 2009

3-51

GS716Tv2 and GS724Tv3 Software Administration Manual

4. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

Static MAC Address
Use the Static MAC Address Configuration page to view static MAC addresses configured on an interface. To access the Static MAC Address Configuration page: 1. Click Switching Address Table  Advanced  Static MAC Address in the navigation tree.

Figure 3-33

Table 3-31. Static MAC Address Fields
Field Vlan ID Static MAC Address Interface Description Select the VLAN ID corresponding to the MAC address being added. Only packets with source address matching this MAC Address will be admitted, otherwise it will be discarded. Select the physical interface for which you want to display data.

2. Click Refresh to reload the page and display the latest MAC address learned on a specific port. 3. Enter a new static MAC address in the field, select the VLAN ID corresponding to the MAC address being added, then click Add to add the static MAC address to the switch.

3-52 v1.0, July 2009

Configuring Switching Information

GS716Tv2 and GS724Tv3 Software Administration Manual

4. After you enter the MAC address and VLAN ID of the statically configured MAC address to delete, click Delete to remove the MAC address from the port and apply the new settings to the system. The screen refreshes, and the MAC address no longer appears in the table on the page. 5. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 6. If you make any changes to the page, click Apply to apply the changes to the system. If you want the switch to retain the new values across a power cycle, you must perform a save.

Configuring Switching Information v1.0, July 2009

3-53

GS716Tv2 and GS724Tv3 Software Administration Manual

3-54 v1.0, July 2009

Configuring Switching Information

Chapter 4 Configuring Quality of Service This section gives an overview of Quality of Service (QoS) and explains the QoS features available from the Quality of Service navigation tree menu. This section contains the following subsections: • “Configuring Class of Service” on page 4-1 In a typical switch. each physical port consists of one or more queues for transmitting packets on the attached network.0. or transmission rate shaping are userconfigurable at the queue (or port) level. The Class of Service folder contains links to the following features: • • “Basic CoS Configuration” on page 4-2 “CoS Interface Configuration” on page 4-3 4-1 v1. As queues become full. QoS is a means of providing consistent. CoS queue characteristics that affect queue mapping. With this in mind. Packets with strict timing requirements are given “special treatment” in a QoS-capable network. July 2009 . Configuring Class of Service The Class of Service (CoS) queueing feature lets you directly configure certain aspects of switch queueing. The priority of a packet arriving at an interface can be used to steer the packet to the appropriate outbound CoS queue through a mapping table. The presence of at least one node which is not QoS-capable creates a deficiency in the network path and the performance of the entire packet flow is compromised. such as minimum guaranteed bandwidth. all elements of the network must be QoS-capable. Four queues per port are supported. If a delay is necessary. When a packet is queued for transmission in a port. packets get held in the queue until the scheduler authorizes the queue for transmission. Multiple queues per port are often provided to give preference to certain packets over others based on user-defined criteria. packets have no place to be held for transmission and get dropped by the switch. the rate at which it is serviced depends on how the queue is configured and possibly the amount of traffic present in the other queues of the port. predictable data delivery by distinguishing between packets that have strict timing requirements from those that are more tolerant of delay.

0. it does not trust any incoming packet priority designation and uses the port default priority value instead. Of course. or to not trust any packet’s priority designation (untrusted mode). Figure 4-1 4-2 v1. based on the existing port default priority as mapped to a traffic class by the current 802. when a port is configured as untrusted. in accordance with the configured default priority of the ingress port. so there are default actions performed when this is not the case.1p mapping table. This mapping table indicates the CoS queue to which the packet should be forwarded on the appropriate egress port(s). This process is also used for cases where a trusted port mapping is unable to be honored. Each port in the switch can be configured to trust one of the packet fields (802. such as when a non-IP packet arrives at a port configured to trust the IP DSCP value. If the port is set to a trusted mode. July 2009 Configuring Quality of Service . Click the QoS  Basic  CoS Configuration in the navigation tree.1p to Queue Mapping” on page 4-6 “DSCP to Queue Mapping” on page 4-7 Basic CoS Configuration Use the Trust Mode Configuration page to set the class of service trust mode of an interface. the trusted field must exist in the packet for the mapping table to be of any use. All packets arriving at the ingress of an untrusted port are directed to a specific CoS queue on the appropriate egress port(s). Alternatively.GS716Tv2 and GS724Tv3 Software Administration Manual • • • “Interface Queue Configuration” on page 4-5 “802. These actions involve directing the packet to a specific CoS level configured for the ingress port as a whole. it uses a mapping table appropriate for the trusted field being used.1p or IP DSCP). To display the Basic CoS Configuration page: 1.

The mode can only be one of the following: • Untrusted • 802. The default value is trust 802. Configuring Quality of Service v1. click Apply to send the updated configuration to the switch. Specifies whether or not all interfaces trust a particular packet marking when the packet enters the port. If you change any of the settings on the page. CoS Interface Configuration Use the CoS Interface Configuration page to apply an interface shaping rate to all ports or to a specific port. July 2009 4-3 . and then click the Advanced  CoS Interface Configuration link.1p • DSCP Interface Interface Trust Mode 2.1p.1p • DSCP The menu contains all CoS configurable interfaces.1p. Basic CoS Configuration Fields Field Global Global Trust Mode Description Select the Global option to apply the same trust mode to all CoS configurable interfaces. Select an individual interface from the menu to override the global settings on a perinterface basis. Specifies whether or not an interface trusts a particular packet marking when the packet enters the port. The mode can only be one of the following: • Untrusted • 802. To display the CoS Interface Configuration page: 1.GS716Tv2 and GS724Tv3 Software Administration Manual Table 4-1.0. The default value is trust 802. Click the QoS  CoS tab.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. Select the check box next to an individual port to apply a trust mode or rate to a specific interface. July 2009 Configuring Quality of Service . in increments of 16. A value of 0 means the maximum is unlimited. The mode can only be one of the following: • Untrusted • 802. The default value is 0.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 4-2 Table 4-2.1p. click Apply to apply the changes to the system. If you make changes to the page. Select the check box in the heading row to apply a trust mode or rate to all interfaces. Interface Trust Mode Interface Shaping Rate 2. The default value is trust 802. It is effectively a second-level shaping mechanism. typically used to shape the outbound transmission rate in increments of 64 kbps in the range of 1616384. Interface Configuration Fields Field Interface Description Indicates the interface to be affected by the Interface Shaping Rate. Specifies whether or not an interface (or all interfaces if all interfaces are selected) trust a particular packet marking when the packet enters the port. This value is controlled independently of any per-queue maximum bandwidth configuration. 4-4 v1.0. 3.1p • DSCP Specifies the maximum bandwidth allowed.

Click the QoS  CoS tab. Use the menu to select the queue to be configured.GS716Tv2 and GS724Tv3 Software Administration Manual Interface Queue Configuration Use the Interface Queue Configuration page to define what a particular queue does by configuring switch egress queues. Select the check box in the heading row to apply a trust mode or rate to all interfaces. Figure 4-3 Table 4-3. A global configuration change is automatically applied to all ports in the system. To display the Interface Queue Configuration page: 1. the queue depth during times of congestion. July 2009 4-5 . and the scheduling of packet transmission from the set of all queues on a port. Each port has its own CoS queue-related configuration. Interface Queue Configuration Fields Field Interface Description Indicates the interface to configure. Queue ID Configuring Quality of Service v1. The configuration process is simplified by allowing each CoS queue parameter to be configured globally or per-port. and then click the Advanced  Interface Queue Configuration link. Select the check box next to an individual port to apply a trust mode or rate to a specific interface.0. User-configurable parameters control the amount of bandwidth used by the queue.

Selects the type of queue processing from the drop down menu. The HW queues are mapped to the following weight proportions: 1:3:5:7:8:10:12:15. • Weighted: Weighted round robin associates a weight to each queue. Interface Queue Configuration Fields (continued) Field Minimum Bandwidth Description Enter a percentage of the maximum negotiated bandwidth for the selected queue on the interface. which is Taildrop. To display the 801. Figure 4-4 4-6 v1.p to Queue Mapping page: 1. This is the default. Specify a percentage from 0–100. 802. Scheduler Type Queue Management Type 2.1p to Queue Mapping The 802. Displays the type of packet management used for all packets. • Strict: Services traffic with the highest priority on a queue first. All packets on a queue are safe until congestion occurs. Options are Weighted and Strict. Defining on a per-queue basis allows the user to create the desired service characteristics for different types of traffic. If you make changes to the page.0. July 2009 Configuring Quality of Service . Click QoS  CoS  Advanced  802.1p Priority Mapping table.1p to Queue Mapping to display the page. click Apply to apply the changes to the system. At this point.GS716Tv2 and GS724Tv3 Software Administration Manual Table 4-3. any additional packets queued are dropped.1p to Queue Mapping page also displays the Current 802. in increments of 1.

The traffic class is the hardware queue for a port. DSCP to Queue Mapping Use the DSCP to Queue Mapping page to specify which internal traffic class to map the corresponding DSCP value.1p priorities to be mapped. Higher traffic class values indicate a higher queue position.1p Priority 2.GS716Tv2 and GS724Tv3 Software Administration Manual Table 4-4.1p priority mapping to all CoS configurable interfaces. The values in each drop down menu represent the traffic class. The priority goes from low (0) to high (3). click Apply to apply the changes to the system. Before traffic in a lower queue is sent. If you make changes to the page. might be time-sensitive traffic.” Traffic with a higher priority.0. it must wait for traffic in higher queues to be sent. This row contains traffic class selectors for each of the eight 802. such as 3. 802. To display the IP DSCP Mapping page: Configuring Quality of Service v1. For example. traffic with a priority of 0 is for most data traffic and is sent using “best effort. such as voice or video. The menu contains all CoS configurable interfaces. Select an individual interface from the menu to override the global settings for 802.1p priority mapping on a perinterface basis. Current 802. July 2009 4-7 .1p Priority Mapping Table Fields Field Global Interface Description Select the Global option to apply the same 802.

If you make changes to the page. Click the QoS  CoS tab. Higher traffic class values indicate a higher queue position. 2. 4-8 v1. Valid range is 0–3. Figure 4-5 Table 4-5. July 2009 Configuring Quality of Service . Before traffic in a lower queue is sent. IP DSCP Mapping Configuration Fields Field DSCP Queue Description Lists the DSCP values to which you can map an internal traffic class. 3. it must wait for traffic in higher queues to be sent. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. The values range from 0–63.0. click Apply to apply the changes to the system. and then click the Advanced  DSCP to Queue Mapping link. The traffic class is the hardware queue for a port.GS716Tv2 and GS724Tv3 Software Administration Manual 1.

Remote Authorization Dial-In User Service (RADIUS) settings. July 2009 .0. user. you can configure the login password. click the Security  Management Security tab. and authentication lists. and server security. Terminal Access Controller Access Control System (TACACS+) settings.Chapter 5 Managing Device Security Use the features available from the Security tab to set management security parameters for port. The Security folder contains links to the following features: • • • • • “Management Security Settings” “Configuring Management Access” “Port Authentication” “Traffic Control” “Configuring Access Control Lists” Management Security Settings From the Management Security Settings page. The Management Security folder contains links to the following features: • • • • “Change Password” on page 5-2 “RADIUS Configuration” on page 5-3 “Configuring TACACS+” on page 5-10 “Authentication List Configuration” on page 5-13 5-1 v1. To display the page.

press the Factory default Reset button on the front panel for more than one second to restore the factory default.0. Enter the password again. It will not display as it is typed. To display the page: 1. Passwords are one to 20 alphanumeric characters in length and are case sensitive. This field will not display. Passwords are one to 20 alphanumeric characters in length and are case sensitive. New Password Confirm Password Reset Password 2. July 2009 Managing Device Security . 5-2 v1. If you make changes to the page. The entered password will be displayed in asterisks (*). to confirm that you entered it correctly. The reset button will only reboot the device. Click Security  Management Security  User Configuration  Change Password in the navigation tree. click Apply to apply the changes to the system. but will show asterisks (*) Use this field to reset the password to the default value. User Accounts Fields Field Old Password Description Specify the current password for the account created by the user. and only asterisks (*) will show on the screen. 3. Note: In the case of a lost password. Enter the optional new or changed password for the account. Figure 5-1 Table 5-1. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.GS716Tv2 and GS724Tv3 Software Administration Manual Change Password Use the page to change the login password.

0.GS716Tv2 and GS724Tv3 Software Administration Manual RADIUS Configuration RADIUS servers provide additional security for networks. Figure 5-2 Managing Device Security v1. RADIUS servers provide a centralized authentication method for: • • Web Access Access Control Port (802. July 2009 5-3 . which contains per-user authentication information. and then click the RADIUS  Global Configuration in the navigation tree. The RADIUS server maintains a user database.1X) The RADIUS folder contains links to the following features: • • • “Global Configuration” on page 5-3 “Server Configuration” on page 5-5 “Accounting Server Configuration” on page 5-7 Global Configuration Use the RADIUS Configuration page to add information about one or more RADIUS servers on the network. To access the RADIUS Configuration page: 1. Click Security  Management Security.

RADIUS Configuration Fields Field Current Server IP Address Description Shows the IP address of the current server. The value of the maximum number of times a request packet is retransmitted. If you make changes to the page. Consideration to maximum delay time should be given when configuring RADIUS max retransmit and RADIUS timeout. Consideration to maximum delay time should be given when configuring RADIUS max retransmit and RADIUS timeout.0. If the RADIUS request was generated by a user login attempt. the current server is the server configured as the primary server. the maximum delay in receiving a response from the RADIUS application equals the sum of (retransmit times timeout) for all configured servers. in seconds.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-2. The valid range is 1–30. the current server is the most recently added RADIUS server. all user interfaces will be blocked until the RADIUS application returns a response. If multiple RADIUS servers are configured. Number of Configured Servers Max Number of Retransmits Timeout Duration (secs) Accounting Mode 2. This value will be in the range of 0–3. A retransmit will not occur until the configured timeout value on that server has passed without a response from the RADIUS server. 5-4 v1. Use the drop down menu to select whether the RADIUS accounting mode is enabled or disabled on the current server. If no servers are configured as the primary server. 3. July 2009 Managing Device Security . click Apply to apply the changes to the system. the maximum delay in receiving a response from the RADIUS application equals the sum of (retransmit times timeout) for all configured servers. Therefore. all user interfaces will be blocked until the RADIUS application returns a response. the max retransmit value on each will be exhausted before the next server is attempted. If the RADIUS request was generated by a user login attempt. for request retransmissions. This field is blank if no servers are configured. The number of RADIUS servers that have been configured. Therefore. If more than one RADIUS servers are configured. A retransmit will not occur until the configured timeout value on that server has passed without a response from the RADIUS server. The timeout value. the max retransmit value on each will be exhausted before the next server is attempted. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. The valid range is 1–15. If multiple RADIUS servers are configured.

Authentication Port Secret Configured Secret Managing Device Security v1. this field indicates whether the shared secret for this server has been configured. This secret must match the RADIUS encryption. To modify settings for a RADIUS server that is already configured on the switch. and then click the RADIUS  Server Configuration link. After you add the RADIUS server. To access the RADIUS Server Configuration page: 1. You can only enter a RADIUS secret if you select Yes from the menu. Identifies the authentication port the server uses to verify the RADIUS server authentication. RADIUS Server Configuration Fields Field Server Address Description Enter the IP address of the RADIUS server to add. and the valid range is 0– 65535. Click Security  Management Security.GS716Tv2 and GS724Tv3 Software Administration Manual Server Configuration Use the RADIUS Server Configuration page to view and configure various settings for the current RADIUS server configured on the system. select the check box next to the server address.0. Figure 5-3 Table 5-3. July 2009 5-5 . Shared secret text string used for authenticating and encrypting all RADIUS communications between the device and the RADIUS server. The port is a UDP port.

Access Requests Access Retransmissions Access Accepts Access Rejects Access Challenges Malformed Access Responses 5-6 v1. that were received from this server. To delete a configured RADIUS server. that were received from this server.0. enter information about the server into the appropriate fields and click Add. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. including both valid and invalid packets. in hundredths of a second. Bad authenticators or signature attributes or unknown types are not included as malformed access-responses. The number of RADIUS Access-Request packets sent to this server. between the most recent Access-Reply/Access-Challenge and the Access-Request that matched it from this RADIUS authentication server. Click Refresh to update the page with the most current information. and then click Delete. If you make changes to the page. that were received from this server. RADIUS Server Configuration Fields (continued) Field Active Message Authenticator Description Sets the selected server to the Primary or Secondary server. 3. The number of RADIUS Access-Accept packets. RADIUS Server Statistics Fields Field Server Address Round Trip Time Description This displays all configured RADIUS servers. The number of malformed RADIUS Access-Response packets received from this server. July 2009 Managing Device Security . Enable or disable the message authenticator attribute for the selected server. 4. including both valid and invalid packets. 2. select the check box next to the server address. To add a RADIUS server. 5. Malformed packets include packets with an invalid length. 6. click Apply to apply the changes to the system. including both valid and invalid packets. The number of RADIUS Access-Challenge packets. Table 5-4. The time interval. This number does not include retransmissions. The number of RADIUS Access-Request packets retransmitted to this server.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-3. The number of RADIUS Access-Reject packets.

The number of RADIUS packets received from this server on the authentication port and dropped for some other reason. 7.0. The number of RADIUS Access-Request packets destined for this server that have not yet timed out or received a response. To access the RADIUS Accounting Server Configuration page: Managing Device Security v1. Click Clear Counters to clear the authentication server and RADIUS statistics to their default values. 8. Accounting Server Configuration Use the RADIUS Accounting Server Configuration page to view and configure various settings for one or more RADIUS accounting servers on the network. The number of authentication timeouts to this server. Click Refresh to refresh the page with the most current data from the switch. The number of RADIUS packets of unknown type which were received from this server on the authentication port. RADIUS Server Statistics Fields (continued) Field Bad Authenticators Pending Requests Timeouts Unknown Types Packets Dropped Description The number of RADIUS Access-Response packets containing invalid authenticators or signature attributes received from this server.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-4. July 2009 5-7 .

Click Security  Management Security. Specifies the shared secret to use with the specified accounting server. Indicates whether the shared secret for this server has been configured. Click Refresh to update the page with the most current information. 4. and the valid range is 0–65535. 3. Figure 5-4 Table 5-5. Secret Configured Secret Accounting Mode 2. The port is a UDP port.0. This field is only displayed if the user has READWRITE access. RADIUS Accounting Server Configuration Fields Field Description Accounting Server Address Enter the IP address of the RADIUS accounting server to add. Port Identifies the authentication port the server uses to verify the RADIUS accounting server authentication. July 2009 Managing Device Security . and then click the RADIUS  Accounting Server Configuration in the navigation tree. 5-8 v1. click Delete. The Secret field is only available if you select Yes.GS716Tv2 and GS724Tv3 Software Administration Manual 1. To delete a configured RADIUS Accounting server. Use the menu to enable or disable the RADIUS accounting mode. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

in hundredths of a second. RADIUS Accounting Server Fields Field Description Accounting Server Address Displays the IP address of the supported RADIUS accounting server. Displays the number of RADIUS Accounting-Response packets that contained invalid authenticators received from this accounting server. The number of RADIUS Accounting-Request packets sent to this server. July 2009 5-9 . Click Clear Counters to reset all statistics to their default value. Accounting Requests Accounting Retransmissions Accounting Responses Malformed Accounting Responses Bad Authenticators Pending Requests Timeouts Unknown Types Packets Dropped 2. Bad authenticators and unknown types are not included as malformed accounting responses.0. Displays the number of malformed RADIUS Accounting-Response packets received from this server. Click Refresh to update the page with the most current information. 3. The number of accounting timeouts to this server. This number does not include retransmissions. The number of RADIUS Accounting-Request packets retransmitted to this server. Malformed packets include packets with an invalid length. Displays the number of RADIUS packets received on the accounting port from this server. Enter information about the server into the appropriate fields and click Apply. The number of RADIUS packets of unknown type which were received from this server on the accounting port. The number of RADIUS packets received from this server on the accounting port and dropped for some other reason. Table 5-6. between the most recent Accounting-Response and the Accounting-Request that matched it from this RADIUS accounting server. The number of RADIUS Accounting-Request packets destined for this server that have not yet timed out or received a response. Managing Device Security v1.GS716Tv2 and GS724Tv3 Software Administration Manual To add a RADIUS Accounting server: 1. Round Trip Time (secs) Displays the time interval.

0. The TACACS+ folder contains links to the following features: • • “Configuring TACACS+” on page 5-10 “Server Configuration” on page 5-11 TACACS+ Configuration The TACACS+ Configuration page contains the TACACS+ settings for communication between the switch and the TACACS+ server you configure via the inband management port. The TACACS+ server checks the user privileges. and then click the TACACS+  TACACS+ Configuration link. July 2009 Managing Device Security . an authorization session starts using the authenticated user name. Figure 5-5 5-10 v1. TACACS+ provides the following services: • • Authentication: Provides authentication during login and via user names and user-defined passwords. To display the TACACS+ Configuration page: 1. Authorization: Performed at login. while still retaining consistency with RADIUS and other authentication processes. Click Security  Management Security. When the authentication session is completed. The TACACS+ protocol ensures network security through encrypted protocol exchanges between the device and TACACS+ server.GS716Tv2 and GS724Tv3 Software Administration Manual Configuring TACACS+ TACACS+ provides a centralized user management system.

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-7. TACACS+ Configuration Fields
Field Key String Description Specifies the authentication and encryption key for TACACS+ communications between the device and the TACACS+ server. The valid range is 0–128 characters. The key must match the key configured on the TACACS+ server. The maximum number of seconds allowed to establish a TCP connection between the device and the TACACS+ server. The valid range is 1–30.

Connection Timeout

2. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 3. If you make any changes to the page, click Apply to apply the new settings to the system. Server Configuration Use the TACACS+ Server Configuration page to configure up to five TACACS+ servers with which the switch can communicate. To display the TACACS+ Server Configuration page: 1. Click Security  Management Security, and then click the TACACS+  Server Configuration link.

Figure 5-6

Managing Device Security v1.0, July 2009

5-11

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-8. TACACS+ Configuration Fields
Field TACACS+ Server Description Use the list to select the IP address of the TACACS+ server to view or configure. If fewer than five TACACS+ servers are configured on the system, the Add option is also available. Select Add to configure additional TACACS+ servers. Enter the IP address of the TACACS+ server to add. This field is only available when Add is selected in the TACACS+ Server IP Address field.

Server Address

After you add one or more TACACS+ servers, additional fields appear on the TACACS+ Server Configuration page.

Figure 5-7 Table 5-9. TACACS+ Configuration Fields
Field TACACS+ Server Description Use the list to select the IP address of the TACACS+ server to view or configure. If fewer than five RADIUS servers are configured on the system, the Add option is also available. Select Add to configure additional RADIUS servers. Specifies the order in which the TACACS+ servers are used. The valid range 0–65535. The authentication port number through which the TACACS+ session occurs. The default is port 49, and the range is 0–65535. Defines the authentication and encryption key for TACACS+ communications between the device and the TACACS+ server. This key must match the encryption used on the TACACS+ server. The valid range is 0–128 characters. The amount of time that passes before the connection between the device and the TACACS+ server times out. The field range is from 1 to 30 seconds.

Priority Port Key String

Connection Timeout

5-12 v1.0, July 2009

Managing Device Security

GS716Tv2 and GS724Tv3 Software Administration Manual

2. If you make changes to the page, or add a new entry, click Apply to apply the changes to the system. 3. To delete a configured TACACS+ server, select the IP address of the server from the TACACS+ Server IP Address drop down menu, and then click Delete.

Authentication List Configuration
Use the Authentication List page to configure the default login list. A login list specifies one or more authentication methods to validate switch or port access for the admin user.

Note: Admin is the only user on the system and is assigned to a preconfigured list named defaultList, which you cannot delete. To access the Authentication List page: 1. Click Security  Management Security, and then click the Authentication List link.

Figure 5-8

Managing Device Security v1.0, July 2009

5-13

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-10. Authentication Profile Fields
Field List Name Description The switch supports a single list named defaultList. You can change the authentication methods for this list, but you cannot change the list name. To change the authentication method for the defaultList, select the check box next to the defaultList name and use the drop down menus. Use the drop down menu to select the authentication method that should appear first in the selected authentication login list. If you select a method that does not time out as the first method, such as ‘local’, no other method will be tried, even if you have specified more than one method. This parameter will not appear when you first create a new login list. User authentication occurs in the order the methods are selected. Possible methods are as follows: • Local: The user's locally stored ID and password will be used for authentication. Since the local method does not time out, if you select this option as the first method, no other method will be tried, even if you have specified more than one method. • RADIUS: The user's ID and password will be authenticated using the RADIUS server. If you select RADIUS or TACACS+ as the first method and an error occurs during the authentication, the switch uses Method 2 to authenticate the user. • TACACS+: The user's ID and password will be authenticated using the TACACS+ server. If you select RADIUS or TACACS+ as the first method and an error occurs during the authentication, the switch attempts user authentication Method 2. • None: The authentication method is unspecified. This option is only available for Method 2 and Method 3. Use the menu to select the authentication method, if any, that should appear second in the selected authentication login list. This is the method that will be used if the first method times out. If you select a method that does not time out as the second method, the third method will not be tried. This parameter will not appear when you first create a new login list. Use the menu to select the authentication method, if any, that should appear third in the selected authentication login list. This parameter will not appear when you first create a new login list.

1

2

3

2. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 3. If you make changes to the page, click Apply to apply the changes to the system.

5-14 v1.0, July 2009

Managing Device Security

The Security  Access tab contains the following folders: • • • • • “HTTP Configuration” on page 5-15 “Secure HTTP Configuration” on page 5-16 “Certificate Download” on page 5-18 “Access Profile Configuration” on page 5-19 “Access Rule Configuration” on page 5-21 HTTP Configuration Use the HTTP Configuration page to configure the HTTP server settings on the system.GS716Tv2 and GS724Tv3 Software Administration Manual Configuring Management Access From the Access page. and then click the HTTP  HTTP Configuration link. You can also configure Access Control Profiles and Access Rules. To access the HTTP Configuration page: 1.0. then click Access. you can configure HTTP and Secure HTTP access to the GS716T and GS724T. July 2009 5-15 . Figure 5-9 Managing Device Security v1. Click the Security tab.

0. click Apply to apply the changes to the system. The default value is Enable. The default value is 24 hours. This timeout is unaffected by the activity level of the session. A value of zero corresponds to an infinite timeout. HTTP Configuration Fields Field Java Mode Description This select field is used to Enable or Disable the Web Java Mode. A value of zero corresponds to an infinite timeout. HTTP Session Soft Timeout This field is used to set the inactivity timeout for HTTP sessions. secure HTTP can help ensure that communication between the management system and the switch is protected from eavesdroppers and man-in-the-middle attacks. The value must be in the range of (0–60) minutes. The default value is 5 minutes. This applies to both secure and un-secure HTTP connections. The value must be in the range of (0–168) hours. Secure HTTP Configuration Secure HTTP enables the transmission of HTTP over an encrypted Secure Sockets Layer (SSL) or Transport Layer Security (TLS) connection. Click Security  Access. Maximum Number of HTTP This field is used to set the maximum allowable number of HTTP Sessions sessions. July 2009 Managing Device Security . Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-11. The currently configured value is shown when the Web page is displayed. HTTP Session Hard Timeout This field is used to set the hard timeout for HTTP sessions. The default value is 16. The value must be in the range of (0–16). The currently configured value is shown when the Web page is displayed. The currently configured value is shown when the Web page is displayed. If you make changes to the page. When you manage the switch by using a Web interface. 5-16 v1. Use the Secure HTTP Configuration page to configure the settings for HTTPS communication between the management station and the switch. and then click the HTTPS  HTTPS Configuration link. To display the Secure HTTP Configuration page: 1. 3. 2. The currently configured value is shown when the Web page is displayed.

0. You can only download SSL certificates when the HTTPS Admin mode is disabled. The currently configured value is shown when the Web page is displayed. The currently configured value is shown when the Web page is displayed. The default value is 5 minutes. The value must be in the range of (1–60) minutes. Port 443 is the default value. Sets the inactivity timeout for HTTPS sessions. The currently configured value is shown when the Web page is displayed. SSL Version 3 TLS Version 1 HTTPS Port HTTPS Session Soft Timeout Managing Device Security v1. Enables or Disables Transport Layer Security Version 1.0. The default value is Enable. July 2009 5-17 .GS716Tv2 and GS724Tv3 Software Administration Manual Figure 5-10 Table 5-12. The default value is Disable. Enables or Disables Secure Sockets Layer Version 3. The currently configured value is shown when the Web page is displayed. The default value is Enable. The value must be in the range of 1– 65535. The currently configured value is shown when the Web page is displayed. Sets the HTTPS Port Number. Secure HTTP Configuration Fields Field HTTPS Admin Mode Description Enables or Disables the Administrative Mode of Secure HTTP.0.

off-line) and download it to the switch.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-12. Downloading SSL Certificates. The switch has a path to the TFTP server. The default value is 4.0. Before you download a file to the switch. Secure HTTP Configuration Fields (continued) Field HTTPS Session Hard Timeout Description Sets the hard timeout for HTTPS sessions.e. The value must be in the range of (0–4). The file is in the correct format. The value must be in the range of (1– 168) hours. Sets the maximum allowable number of HTTPS sessions. The currently configured value is shown when the Web page is displayed.. The currently configured value is shown when the Web page is displayed. This timeout is unaffected by the activity level of the session. July 2009 Managing Device Security . the following conditions must be true: • • • The file to download from the TFTP server is on the server in the appropriate directory. You can generate a certificate externally (i. and then click the HTTPS  Certificate Download link. Maximum Number of HTTPS Sessions Certificate Download For the Web server on the switch to accept HTTPS connections from a management station. click Security  Access. Figure 5-11 5-18 v1. the Web server needs a public key certificate. The default value is 24 hours. To display the Certificate Download page.

Enter the IP address of the TFTP server in the form of an IP address in x.0. TFTP Server IP Remote File Name 2.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-13. You may enter up to 32 characters. • SSL Server Certificate PEM File: SSL Server Certificate File (PEM Encoded). July 2009 5-19 . 3.x.0.0. To access the Access Profile Configuration page: Managing Device Security v1. • SSL DH Strong Encryption Parameter PEM File: SSL DiffieHellman Strong Encryption Parameter File (PEM Encoded).x format. If you change any of the settings on the page. Make sure that the software image or other file to be downloaded is available on the TFTP server. The factory default is blank. Enter the name of the file to download. Configuration changes take effect immediately. click Apply to send the updated configuration to the switch. Certificate Download Fields Field File Type Description Select the type of SSL certificate to download. Access Profile Configuration Use the Access Profile Configuration page to configure settings that control management access to the switch. which can be one of the following: • SSL Trusted Root Certificate PEM File: SSL Trusted Root Certificate File (PEM Encoded). The factory default is 0.x. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.0. • SSL DH Weak Encryption Parameter PEM File: SSL Diffie-Hellman Weak Encryption Parameter File (PEM Encoded).

Table 5-15 shows the Profile Summary fields. Select the check box to deactivate an access profile Select the check box to remove an access profile. which is either Permit or Deny. Profile Summary Fields Field Rule Type Service Type Description Identifies the action the rule takes. Table 5-15. July 2009 Managing Device Security . The access profile should be deactivated before removing the access profile. Figure 5-12 Table 5-14. and then click the Access Control  Access Profile Configuration link. Select the check box to activate an access profile. Shows the type of service to allow or prohibit from accessing the switch management interface: • SNMP • HTTP • HTTPS 5-20 v1.0. Click Security  Access.GS716Tv2 and GS724Tv3 Software Administration Manual 1. Access Profile Configuration Fields Field Access Profile Name Activate Profile DeActivate Profile Remove Profile Description Enter the name of the access profile to be added. Maximum length is 32 characters.

0. Access Rule Configuration Use the Access Rule Configuration page to configure the rules about what systems can access the GS716T and GS724T Web interface and what protocols are allowed. Click Security  Access. click Apply to send the updated configuration to the switch. action is performed and subsequent rules below are ignored. 3. Click Refresh to update the page with the most current information. Figure 5-13 Managing Device Security v1.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-15. Profile Summary Fields (continued) Field Source IP Address Mask Priority Description Shows the IP Address of the client that may or may not originate management traffic. If you change any of the settings on the page. 4. Shows the priority of the rule. 2. July 2009 5-21 . Shows the subnet mask associated with the IP address. Configuration changes take effect immediately. The rules are validated against the incoming management request in the ascending order of their priorities. If a rule matches. To access the Access Rule Configuration page: 1. and then click the Access Control  Access Rule Configuration link. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.

To delete an Access Rule. The rules are validated against the incoming management request in the ascending order of their priorities. Service Type Source IP Address Mask Priority 2. and then click Delete. At any given time. July 2009 Managing Device Security . and the second rule is ignored.0. Select Deny to prohibit access to the switch administrative pages for traffic that meets the criteria you configure for the rule. Ports in this mode are under bidirectional control. Select the type of service to allow or prohibit from accessing the switch management interface: • SNMP • HTTP • HTTPS Enter Source IP Address of the client originating the management traffic. Configure priority to the rule. and Source IP 10. enter information into the appropriate fields and click Add. If a rule matches. For example. Any traffic that does not meet the rules is allowed access to the switch.10 is configured with priority 1 to permit.10. If you make changes to the page. select the check box next to the Rule Type. 5. if a Source IP 10. click Apply to apply the changes to the system.10 is configured with priority 2 to Deny. action is performed and subsequent rules below are ignored.1X is enabled globally and on the port.10. 4. To add an Access Rule. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. Enter the subnet mask associated with the IP address. 5-22 v1. 3.10.10. Port Authentication In port-based authentication mode. only one supplicant is allowed to attempt authentication on a port in this mode. Access Rule Configuration Fields Field Rule Type Description Select Permit to allow access to the switch administrative pages for traffic that meets the criteria you configure for the rule. This is the default authentication mode.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-16. successful authentication of any one supplicant attached to the port results in all users being able to use the port without restrictions. then access is permitted if the profile is active. when 802. Any traffic that does not meet the rules is denied. Enter the address in the Source IP address text box.

The Port Authentication folder contains links to the following features: • Basic: • • “802. Supplicants: Specifies the host connected to the authenticated port requesting access to the system services.0.1X Configuration in the navigation tree. July 2009 5-23 .1X Configuration page to enable or disable port access control on the system.1X Configuration Use the 802. the RADIUS server that performs the authentication on behalf of the authenticator.1X network has three components: • • • Authenticators: Specifies the port that is authenticated before permitting system access.GS716Tv2 and GS724Tv3 Software Administration Manual The 802.1X Configuration” on page 5-23 Advanced: • • “Port Authentication” on page 5-24 “Port Summary” on page 5-28 802. for example. and indicates whether the user is authorized to access system services.1X Configuration page: 1. To display the 802. then click Basic  802. Figure 5-14 Managing Device Security v1. Authentication Server: Specifies the external server. Click Security  Port Authentication.

Note: Use the horizontal scroll bar at the bottom of the browser to view all the fields on the Port Authentication page. The default is Disable. July 2009 Managing Device Security . This feature permits port-based authentication on the switch. If enabled. as determined by a guest VLAN configured on authentication server. click Apply to apply the new settings to the system. the port still provide limited network access. If you change the mode. Click Security  Port Authentication. To access the Port Authentication page: 1. 3. 4.0.1X supplicant is authenticated on a port. Port Authentication Use the Port Authentication page to enable and configure port access control on one or more ports. and then click the Advanced  Port Authentication link. when no 802.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-17. The default is Disable. 5-24 v1. 2.1X administrative mode on the switch. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. Select to Enable or Disable Guest VLAN Supplicant Mode. Port Access Control—Port Configuration Fields Field Port Based Authentication State Guest VLAN Description Select Enable or Disable 802. Click Refresh to refresh the page with the most current data from the switch. Figure 5-15 and Figure 5-16 are both images of the Port Authentication page.

July 2009 5-25 .GS716Tv2 and GS724Tv3 Software Administration Manual Figure 5-15 Figure 5-16 Managing Device Security v1.0.

The field default is 60 seconds. Defines the amount of time that the switch remains in the quiet state following a failed authentication exchange. Selectable values are Enable and Disable. Indicates the time span in which the selected port is reauthenticated. The possible field range is 0–65535.The default value is 0. The field value is in seconds. reauthentication will occur.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-18. Use this field to enable or disable reauthentication of the supplicant for the specified port. of the timer used by the authenticator state machine on the specified port to determine when to send an EAPOL EAP Request/Identify frame to the supplicant. The possible field values are: • Auto: Automatically detects the mode of the interface. Port Authentication Port Configuration Fields Field Port Port Control Description Selects the Port to configure. The default value is 90. The default value is Disable. This input field allows the user to enter the Guest VLAN period for the selected port. reauthentication will not be allowed.0. of the timer used by the Guest VLAN Authentication. in seconds. The default value is 30. Enter 0 to reset the Guest VLAN ID on the interface. The transmit period is the value. Changing the value will not change the configuration until you click the Apply button. The switch cannot provide authentication services to the client through the interface. This field allows the user to configure the Guest VLAN ID on the interface. • Unauthorized: Denies the selected interface system access by moving the interface into unauthorized state. The control mode is only set if the link status of the port is link up. The transmit period must be a number in the range of 1– 65535. The range is 1–65535. The interface sends and receives normal traffic without client port-based authentication. July 2009 Managing Device Security . The Guest VLAN timeout must be a value in the range of 1–300. The field value is in seconds. If the value is Enable. Defines the port authorization state. and the field default is 3600 seconds. Changing the selection will not change the configuration until the Apply button is pressed. This input field allows you to configure the transmit period for the selected port. The valid range is 0–4093. Otherwise. in seconds. Guest VLAN ID Guest VLAN Period Periodic Reauthentication Reauthentication Period (secs) Quiet Period (secs) Resending EAP 5-26 v1. The Guest VLAN period is the value. • Authorized: Places the interface into an authorized state without being authenticated.

July 2009 5-27 . The maximum requests value is the maximum number of times the authenticator state machine on this port will retransmit an EAPOL EAP Request/Identity before timing out the supplicant. and the field default is 30 seconds. The field value is in seconds.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-18. Possible values are Authenticator or Supplicant. Defines the amount of time that lapses before EAP requests are resent to the user. The field default is 30 seconds. The range is 1–65535. The default value is 2. The only possible value is 1. corresponding to the first version of the 802. Port Authentication Port Configuration Fields (continued) Field Max EAP Requests Description This input field allows you to enter the maximum requests for the selected port. Possible values are as follows: • Initialize • Disconnected • Connecting • Authenticating • Authenticated • Aborting • Held • ForceAuthorized • ForceUnauthorized Supplicant Timeout (secs) Server Timeout (secs) Control Direction Protocol Version PAE Capabilities Authenticator PAE State Managing Device Security v1. This affects whether the unauthorized controlled port exerts control over communication in both directions (disabling both incoming and outgoing frames) or just in the incoming direction (disabling only the reception of incoming frames). This field is not configurable. This field is not configurable. This displays the control direction for the specified port. This field displays the port access entity (PAE) functionality of the selected port. The maximum requests value must be in the range of 1–10. This field displays the current state of the authenticator PAE state machine. This field is not configurable on some platforms.1X specification. Defines the amount of time that lapses before the switch resends a request to the authentication server.0. This field displays the protocol version associated with the selected port. Changing the value will not change the configuration until you click the Apply button. The control direction dictates the degree to which protocol exchanges take place between Supplicant and Authenticator. The field value is in seconds.

GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-18. If the button is not selectable. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. Port Summary Use the Port Summary page to view information about the port access control settings on a specific port. 5. Click Reauthenticate to begin the reauthentication sequence on the selected port. Once this button is pressed. If the button is not selectable. the action is immediate. it will be grayed out. It is not required to click Apply for the action to occur. This button is only selectable if the control mode is 'auto'. It is not required to click Apply for the action to occur. Once this button is pressed. the action is immediate. EAPOL Flood Mode 2. Click Apply to send the updated screen to the switch and cause the changes to take effect on the switch but these changes will not be retained across a power cycle unless a save is performed. This button is only selectable if the control mode is 'auto'. Port Authentication Port Configuration Fields (continued) Field Backend State Description This field displays the current state of the backend authentication state machine.0.The default value is Disable. 4. Click Initialize to begin the initialization sequence on the selected port. 3. Possible values are as follows: • Request • Response • Success • Fail • Timeout • Initialize • Idle This field is used to Enable or Disable the EAPOL Flood mode per Interface. To access the Port Summary page: 5-28 v1. July 2009 Managing Device Security . it will be grayed out.

0. The switch cannot provide authentication services to the client through the interface. Defines the port authorization state. This field indicates the control mode under which the port is actually operating. Port Summary Fields Field Port Control Mode Description The port whose settings are displayed in the current table row. July 2009 5-29 . The possible field values are: • Auto: Automatically detects the mode of the interface. • Force Unauthorized: Denies the selected interface system access by moving the interface into unauthorized state. The interface sends and receives normal traffic without client port-based authentication. • Force Authorized: Places the interface into an authorized state without being authenticated. Click Security  Port Authentication  Advanced  Port Summary in the navigation menu. Operating Control Mode Managing Device Security v1.GS716Tv2 and GS724Tv3 Software Administration Manual 1. Possible values are: • ForceUnauthorized • ForceAuthorized • Auto • N/A: If the port is in detached state it cannot participate in port access control. The control mode is only set if the link status of the port is link up. Figure 5-17 Table 5-19.

Otherwise. the value will be 'N/A' since the port cannot participate in port access control. The Traffic Control folder contains links to the following features: • MAC Filter: • • • • “MAC Filter Configuration” on page 5-30 “MAC Filter Summary” on page 5-32 “Storm Control” on page 5-33 Port Security: • • • “Port Security Configuration” on page 5-34 “Port Security Interface Configuration” on page 5-35 “Security MAC Address” on page 5-37 • “Protected Ports Membership” on page 5-38 MAC Filter Configuration Use the MAC Filter Configuration page to create MAC filters that limit the traffic allowed into and out of specified ports on the system. The possible values are 'true' and 'false'. Click Refresh to update the information on the screen. Traffic Control From the Traffic Control page. reauthentication will not be allowed. and Protected Port settings. This field shows the authorization status of the specified port. Port Summary Fields (continued) Field Reauthentication Enabled Description Displays if reauthentication is enabled on the selected port. Port Security. you can configure MAC Filters. July 2009 Managing Device Security . click the Security  Traffic Control tab. To display the page. 'Unauthorized' and 'N/A'. To display the MAC Filter Configuration page: 5-30 v1. If the value is 'true' reauthentication will occur. The possible values are 'Authorized'. Port Status 2. This is a configurable field. Storm Control. If the port is in detached state.0.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-19.

0. it will be dropped. Click Security  Traffic Control. Figure 5-18 Table 5-20. Click the orange bar to display the available ports. select “Create Filter” from the top of the list The VLAN ID used with the MAC address to fully identify packets you want filtered. To add a new filter. Destination ports can be included only in the Multicast filter. and then click the MAC Filter  MAC Filter Configuration link. To change the port mask(s) for an existing filter. You can only change this field when you have selected the “Create Filter” option. Packets with the MAC address and VLAN ID you selected will only be transmitted out of ports that are in the list.GS716Tv2 and GS724Tv3 Software Administration Manual 1. Select the ports you want included in the outbound filter. The MAC address of the filter in the format 00:01:1A:B2:53:4D. VLAN ID MAC Address Source Port Members Destination Port Members Managing Device Security v1. You cannot define filters for these MAC addresses: • 00:00:00:00:00:00 • 01:80:C2:00:00:00 to 01:80:C2:00:00:0F • 01:80:C2:00:00:20 to 01:80:C2:00:00:21 • FF:FF:FF:FF:FF:FF Click the orange bar to display the available ports. select the entry you want to change. Select the ports you want included in the inbound filter. Switch Configuration Fields Field MAC Filter Description This is the list of MAC address and VLAN ID pairings for all configured filters. July 2009 5-31 . You can only change this field when you have selected the “Create Filter” option. If a packet with the MAC address and VLAN ID you selected is received on a port that is not in the list.

Figure 5-19 Table 5-21. Shows the ports included in the outbound filter. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. You can only change this field when you have selected the “Create Filter” option. To delete a configured MAC Filter. The VLAN ID used with the MAC address to fully identify packets you want filtered. Source Port Members Destination Port Members 2. If you make changes to the page. and then click the MAC Filter  MAC Filter Summary link. Switch Configuration Fields Field MAC Address VLAN ID Description Identifies the MAC address that is filtered. Click Security  Traffic Control. 4. click Apply to apply the changes to the system.GS716Tv2 and GS724Tv3 Software Administration Manual 2. July 2009 Managing Device Security . To display the MAC Filter Summary page: 1.0. Shows the ports included in the inbound filter. and then click Delete. select it from the menu. MAC Filter Summary Use the MAC Filter Summary page to view the MAC filters that are configured on the system. 3. Click Refresh to update the page with the most current information. 5-32 v1.

and then click the Storm Control link. Click Security  Traffic Control. To display the Storm Control page: 1. Storm control is enabled per interface. July 2009 5-33 . by defining the packet type and the rate at which the packets are transmitted. Figure 5-20 Managing Device Security v1.0.GS716Tv2 and GS724Tv3 Software Administration Manual Storm Control A broadcast storm is the result of an excessive number of broadcast messages simultaneously transmitted across a network by a single port. The switch measures the incoming broadcast/multicast/unknown unicast packet rate per port and discards packets when the rate exceeds the defined value. Forwarded message responses can overload network resources and/or cause the network to time out.

The default is 5%. 3. When a port is locked.0. Port Security Configuration Use the Port Security feature to lock one or more ports on the system. The range is a percent of the total threshold. the traffic will be dropped. • Multicast — If the rate of L2 multicast traffic ingressing on an interface increases beyond the configured threshold. the traffic will be dropped. To go to an interface in the list. Specifies the maximum rate at which unknown packets are forwarded. type the interface number in the Go To Interface field and click Go. • Disable — Do not use storm control. Storm Control Fields Field Ingress Control Mode Description Select the mode of broadcast affected by storm control. Multicast.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-22. 5-34 v1. the traffic will be dropped. only packets with allowable source MAC addresses can be forwarded. Shows whether the interfaces is enabled for storm control. The range is a percent of the total threshold between 0–100%. Port Settings Fields Field Port Status Threshold Description Select the check box next to the port to change the Storm Control administrative status. • Unknown Unicast — If the rate of unknown L2 unicast (destination lookup failure) traffic ingressing on an interface increases beyond the configured threshold. Click Security  Traffic Control. If you make changes to the page. If the port check box is selected. July 2009 Managing Device Security . The range is between 0–100% 2. To display the Port Security Configuration page: 1. you can enable or disable storm control for the port. • Broadcast — If the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold. click Apply to apply the changes to the system. or Unknown Unicast traffic. All other packets are discarded. and then click the Port Security  Port Security Configuration link. Threshold Table 5-23. Used to set the threshold for either Broadcast.

Displays the source MAC address of the last packet that was discarded at a locked port. Both methods are used concurrently when a port is locked. Table 5-25. If you make changes to the page.0. Displays the VLAN ID corresponding to the Last Violation MAC address. click Apply to apply the changes to the system. 3. Managing Device Security v1. 4. Port Security Configuration Fields Field Port Security Mode Description Enable or Disable the port security feature. Port Security Violation Fields Field Port Last Violation MAC VLAN ID Description Identifies the port where a violation occurred. Click Refresh to refresh the page with the most current data from the switch. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 5-21 Table 5-24. Port Security Interface Configuration A MAC address can be defined as allowable by one of two methods: dynamically or statically. July 2009 5-35 . 2.

Enable or Disable the port security feature for the selected port. July 2009 Managing Device Security . The behavior of packets is the same as for dynamic locking: only packets with an allowable source MAC address can be forwarded.GS716Tv2 and GS724Tv3 Software Administration Manual Dynamic locking implements a ‘first arrival’ mechanism for Port Security.0. Figure 5-22 Table 5-26. select the associated check box. You specify how many addresses can be learned on the locked port. When the limit is reached. Port Security Configuration Fields Field Port Port Security Description Identifies the port. You can effectively disable dynamic locking by setting the number of allowable dynamic entries to zero. no more addresses are learned on the port. then a packet with an unknown source MAC address is learned and forwarded normally. If the limit has not been reached. 5-36 v1. and then click the Port Security  Interface Configuration link. Static locking allows you to specify a list of MAC addresses that are allowed on a port. Click Security  Traffic Control. Any packets with source MAC addresses that were not already learned are discarded. To display the Port Security Interface Configuration page: 1. To change the port security settings for the port.

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-26. Port Security Configuration Fields (continued)
Field Max Allowed Dynamically Learned MAC Max Allowed Statically Locked MAC Enable Violation Traps Description Sets the maximum number of dynamically learned MAC addresses on the selected interface. Valid range is 0–600. Sets the maximum number of statically locked MAC addresses on the selected interface. Valid range is 0–20. Enables or disables the sending of new violation traps designating when a packet with a disallowed MAC address is received on a locked port.

2. To display the list of Ports, click PORTS. 3. To display the list of LAGs, click LAGS. 4. To display a list of both Ports and LAGs, click ALL. 5. To go to an interface in the list, type the interface number in the Go To Interface field and click Go. 6. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 7. If you make changes to the page, click Apply to apply the changes to the system.

Security MAC Address
Use the Security MAC Address page to convert a dynamically learned MAC address to a statically locked address. To display the Security MAC Address page: 1. Click Security  Traffic Control, and then click the Port Security  Security MAC Address link.

Managing Device Security v1.0, July 2009

5-37

GS716Tv2 and GS724Tv3 Software Administration Manual

Figure 5-23 Table 5-27. Port Security Settings Fields
Field Convert Dynamic Address to Static Description Select the check box to convert a dynamically learned MAC address to a statically locked address. The Dynamic MAC Address entries are converted to Static MAC address entries in a numerically ascending order until the Static limit is reached.

Table 5-28. Dynamic MAC Address Table Fields
Field Port List VLAN ID MAC Address Description Select the physical interface for which you want to display data. Displays the VLAN ID corresponding to the Last Violation MAC address. Displays the MAC addresses learned on a specific port.

2. Click Refresh to refresh the page with the most current data from the switch. 3. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 4. If you make changes to the page, click Apply to apply the changes to the system.

Protected Ports Membership
Use the Protected Ports Membership page to configure the ports as protected or unprotected. You need read-write access privileges to modify the configuration.
5-38 v1.0, July 2009 Managing Device Security

GS716Tv2 and GS724Tv3 Software Administration Manual

To display the Protected Ports Membership page: 1. Click the Security  Traffic Control  Protected Ports link.

Figure 5-24

Table 5-29. Protected Ports Membership Fields
Field Protected Port(s) Description The selection list consists of physical ports, protected as well as unprotected. The protected ports are highlighted to differentiate between them. No traffic forwarding is possible between two protected ports. If left unconfigured, the default state is Unprotected.

2. Click Refresh to refresh the page with the most current data from the switch. 3. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 4. If you make changes to the page, click Apply to apply the changes to the system. Configuration changes take effect immediately.

Configuring Access Control Lists
Access Control Lists (ACLs) ensure that only authorized users have access to specific resources while blocking off any unwarranted attempts to reach network resources. ACLs are used to provide traffic flow control, restrict contents of routing updates, decide which types of traffic are forwarded or blocked, and above all provide security for the network. GS716T/GS724T software supports IPv4 and MAC ACLs.

Managing Device Security v1.0, July 2009

5-39

GS716Tv2 and GS724Tv3 Software Administration Manual

You first create an IPv4-based or MAC-based ACL ID. Then, you create a rule and assign it to a unique ACL ID. Next, you define the rules, which can identify protocols, source, and destination IP and MAC addresses, and other packet-matching criteria. Finally, use the ID number to assign the ACL to a port or to a VLAN interface. The Security  ACL folder contains links to the following features: • Basic: • • • • • “MAC ACL” on page 5-40 “MAC Rules” on page 5-42 “MAC Binding Configuration” on page 5-44 “MAC Binding Table” on page 5-45

Advanced: • • • • • “IP ACL” on page 5-47 “IP Rules” on page 5-48 “IP Extended Rule” on page 5-50 “IP Binding Configuration” on page 5-54 “IP Binding Table” on page 5-56

MAC ACL
A MAC ACL consists of a set of rules which are matched sequentially against a packet. When a packet meets the match criteria of a rule, the specified rule action (Permit/Deny) is taken and the additional rules are not checked for a match. There are multiple steps involved in defining an ACL and applying it to the switch. First, you use the “MAC ACL” page to create the ACL ID. Then, you use the “MAC Rules” page to create rules for the ACL. Finally, use the “MAC Binding Configuration” page to assign the ACL by its ID number to a port. You can use the “MAC Binding Table” page to view the configurations.

5-40 v1.0, July 2009

Managing Device Security

GS716Tv2 and GS724Tv3 Software Administration Manual To display the MAC ACL page: 1. July 2009 5-41 . or space characters only. To delete a MAC ACL. 3. Shows the direction of packet traffic affected by the MAC ACL. The name must start with an alphabetic character. The name string may include alphabetic. select the check box next to the Name field. MAC ACL Table Fields Field Name Description Enter a name for the MAC ACL. enter information into the appropriate fields and click Add.0. Shows the number of rules currently configured for the MAC ACL. Click Security  ACL. To add a MAC ACL.. then click Delete. 5. Managing Device Security v1. 4. The current size is equal to the number of configured IPv4 ACLs plus the number of configured MAC ACLs. click Apply to apply the changes to the system. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. The MAC ACL page is under the Basic link. Table 5-30. Rules Direction 2. Figure 5-25 The MAC ACL table shows the number of ACLs currently configured in the switch and the maximum number of ACLs that can be configured. which can be Inbound or blank. numeric. If you make changes to the page. dash. underscore.

July 2009 Managing Device Security . Specify what action should be taken if a packet matches the rule's criteria: • Permit: Forwards packets that meet the ACL criteria. • Deny: Drops packets that meet the ACL criteria. then click the Basic  MAC Rules link. 5-42 v1. Click Security  ACL. MAC ACL Rule Configuration Fields Field ACL Name ID (1 to 10) Action Description Specifies an existing MAC ACL.GS716Tv2 and GS724Tv3 Software Administration Manual MAC Rules Use the MAC Rules page to define rules for MAC-based ACLs.0. A default 'deny all' rule is the last rule of every list. To display the MAC Rules page: 1. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. To set up a new MAC ACL use the “MAC ACL” page. Enter a rule ID. Figure 5-26 Table 5-31.

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-31. MAC ACL Rule Configuration Fields (continued)
Field Assign Queue Description Specifies the hardware egress queue identifier used to handle all packets matching this ACL rule. Enter an identifying number from 0–3 in this field. Requires a packet to match the criteria of this ACL. Select True or False from the drop down menu. Match Every is exclusive to the other filtering rules, so if Match Every is True, the other rules on the screen are not available. Requires a packet’s class of service (CoS) to match the CoS value listed here. Enter a CoS value between 0–7 to apply this criteria. Requires an Ethernet frame’s destination port MAC address to match the address listed here. Enter a MAC address in this field. The valid format is xx:xx:xx:xx:xx:xx. If desired, enter the MAC Mask associated with the Destination MAC to match. The MAC address mask specifies which bits in the destination MAC to compare against an Ethernet frame. Use F’s and zeros in the MAC mask, which is in a wildcard format. An F means that the bit is not checked, and a zero in a bit position means that the data must equal the value given for that bit. For example, if the MAC address is aa:bb:cc:dd:ee:ff, and the mask is 00:00:ff:ff:ff:ff, all MAC addresses with aa:bb:xx:xx:xx:xx result in a match (where x is any hexadecimal number). Requires a packet’s EtherType to match the EtherType you select. Select the EtherType value from the drop down menu. If you select User Value, you can enter a custom EtherType value. This field is configurable if you select User Value from the EtherType drop down menu. The value you enter specifies a customized Ethertype to compare against an Ethernet frame. The valid range of values is 0x0600–0xFFFF. Requires a packet’s source port MAC address to match the address listed here. Enter a MAC address in the this field. The valid format is xx:xx:xx:xx:xx:xx. If desired, enter the MAC mask for the source MAC address to match. Use Fs and zeros in the MAC mask, which is in a wildcard format. An F means that the bit is not checked, and a zero in a bit position means that the data must equal the value given for that bit. The valid format is xx:xx:xx:xx:xx:xx. Requires a packet’s VLAN ID to match the ID listed here. Enter the VLAN ID to apply this criteria. The valid range is 0–4093.

Match Every

CoS Destination MAC

Destination MAC Mask

EtherType Key

EtherType User Value

Source MAC

Source MAC Mask

VLAN

2. To add a rule, complete the desired fields and click Add.
Managing Device Security v1.0, July 2009 5-43

GS716Tv2 and GS724Tv3 Software Administration Manual

3. To delete a rule, select the check box associated with the rule and click Delete. 4. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 5. To change a rule, select the check box associated with the rule, change the desired fields and click Apply.

MAC Binding Configuration
When an ACL is bound to an interface, all the rules that have been defined are applied to the selected interface. Use the MAC Binding Configuration page to assign MAC ACL lists to ACL Priorities and Interfaces. To display the MAC Binding Configuration page: 1. Click Security  ACL, then click the Basic  MAC Binding Configuration link.

Figure 5-27

5-44 v1.0, July 2009

Managing Device Security

GS716Tv2 and GS724Tv3 Software Administration Manual

Table 5-32. MAC ACL Rule Configuration Fields
Field ACL ID Direction Description Select an existing MAC ACL. Specifies the packet filtering direction for ACL. The only valid direction is Inbound, which means the MAC ACL rules are applied to traffic entering the port. An optional sequence number may be specified to indicate the order of this access list relative to other access lists already assigned to this interface and direction. A low number indicates high precedence order. If a sequence number is already in use for this interface and direction, the specified access list replaces the currently attached access list using that sequence number. If the sequence number is not specified by the user, a sequence number that is one greater than the highest sequence number currently in use for this interface and direction will be used. Valid range is 1–4294967295. Specifies list of all available valid interfaces for ACL binding. All nonrouting physical interfaces and interfaces participating in LAGs are listed.

Sequence Number

Port Selection Table

2. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 3. Click Apply to save any changes to the running configuration.

MAC Binding Table
Use the MAC Binding Table page to view or delete the MAC ACL bindings. To display the MAC Binding Table:

Managing Device Security v1.0, July 2009

5-45

GS716Tv2 and GS724Tv3 Software Administration Manual

1. Click Security  ACL, then click the Basic  Binding Table link.

Figure 5-28

Table 5-33. MAC ACL Rule Configuration Fields
Field Interface Direction Description Shows the interface to which the MAC ACL is bound. Specifies the packet filtering direction for ACL. The only valid direction is Inbound, which means the MAC ACL rules are applied to traffic entering the port. Displays the type of ACL assigned to selected interface and direction. Displays the ACL Name identifying the ACL assigned to selected interface and direction. Displays the Sequence Number signifying the order of specified ACL relative to other ACLs assigned to selected interface and direction.

ACL Type ACL ID Sequence No

2. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 3. To delete the binding, select the check box next to the interface and click Delete.

5-46 v1.0, July 2009

Managing Device Security

To display the IP ACL page: 1. Packets can be filtered on ingress (inbound) ports only. July 2009 5-47 . If the filter rules match. that consist of the filters that determine traffic classifications. a network administrator defines an ACL rule that says port number 20 can receive TCP packets.GS716Tv2 and GS724Tv3 Software Administration Manual IP ACL IP ACLs allow network managers to define classification actions and rules for specific ingress ports. The current size is equal to the number of configured IPv4 plus the number of configured MAC ACLs. or rules.0. Click Security  ACL. However. For example. Figure 5-29 Table 5-29 shows the current size of the ACL table versus the maximum size of the ACL table. including dropping the packet or disabling the port. Managing Device Security v1. then click the Advanced  IP ACL link. Use the IP ACL Configuration page to add or remove IP-based ACLs. ACLs are composed of access control entries (ACE). The maximum size is 100. if a UDP packet is received the packet is dropped. then some actions can be taken.

Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. IP Rules Use the IP Rules page to define rules for IP-based standard ACLs. 4. 3. which allows you to permit or deny traffic from a source IP address. and then click Delete. This type of ACL provides more granularity and filtering capabilities than the standard IP ACL. July 2009 Managing Device Security . Note: There is an implicit “deny all” rule at the end of an ACL list. IP ACL Configuration Fields Field IP ACL Description Enter an ACL ID. To delete an IP ACL. Rules Type 2. To add an IP ACL. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. select the check box associated withe ACL ID. This means that if an ACL is applied to a packet and if none of the explicit rules match. The ID is an integer in the following range: • 1–99: Creates an IP Standard ACL. To display the IP Rules page: 5-48 v1.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-34. enter an ACL ID in the appropriate field. The Delete button only appears if a configured IP ACL is selected. which allows you to permit or deny specific types of layer 3 or layer 4 traffic from a source IP address to a destination IP address. • 100–199: Creates an IP Extended ACL. Identifies the ACL as either a standard or extended IP ACL. Shows the number of rules currently configured for the IP ACL. and then click Add. then the final implicit “deny all” rule applies and the packet is dropped.0.

GS716Tv2 and GS724Tv3 Software Administration Manual 1. To delete an IP rule. This field is only available if you select Create Rule from the Rule field. and then click Delete. You can create up to 10 rules for each ACL. the new ID is created and you can configure the rule settings. Click Security  ACL. Configuration changes take effect immediately. select the check box associated with the rule. click Apply to send the updated configuration to the switch. select the ACL ID to add the rule to. 5. To set up a new IP ACL. then click the Advanced  IP Rules link. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. July 2009 5-49 . Table 5-35. 3. If you change any of the settings on the page. see “IP ACL”. Managing Device Security v1. 4. IP ACL Rule Configuration Fields Field ACL ID Rule ID Description The menu contains the existing IP ACLs configured on the page. To add an IP ACL rule. Figure 5-30 2.0. Enter a new Rule ID. After you click Apply. complete the fields in the Basic ACL Rule Table and then click Add.

The address you enter is compared to a packet's source IP Address. Assign Queue ID Match Every Source IP Address Source IP Mask IP Extended Rule Use the IP Extended Rules page to define rules for IP-based extended ACLs. the mask has ones (1's) in the bit positions that are used for the network address. July 2009 Managing Device Security .0. the other rules on the screen are not available.255.0. This means that if an ACL is applied to a packet and if none of the explicit rules match.255. In contrast. then the final implicit “deny all” rule applies and the packet is dropped. With a subnet mask. A wildcard mask is in essence the inverse of a subnet mask. Enter an IP Address in the appropriate field using dotted-decimal notation. Note: There is an implicit “deny all” rule at the end of an ACL list. so if Match Every is True. A wildcard of 0. Select True or False from the drop down menu. and has zeros (0's) for the bit positions that are not used.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-35. Enter an identifying number from 0–3 in the appropriate field. To display the IP extended Rules page: 5-50 v1. a wildcard mask has (0’s) in a bit position that must be checked.0. which is one of the following: • Permit — Forwards packets which meet the ACL criteria. Specifies the hardware egress queue identifier used to handle all packets matching this ACL rule. Requires a packet’s source port IP address to match the address listed here. Specifies the source IP address wildcard mask. Match Every is exclusive to the other filtering rules. • Deny — Drops packets which meet the ACL criteria. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded.255 indicates that no bit is important.0 indicates that all of the bits are important. Wildcard masking for ACLs operates differently from a subnet mask. This field is required when you configure a source IP address. IP ACL Rule Configuration Fields (continued) Field Action Description Selects the ACL forwarding action. A wild card mask of 255. Wild card masks determines which bits are used and which bits are ignored. Requires a packet to match the criteria of this ACL. A ‘1’ in a bit position of the ACL mask indicates the corresponding bit can be ignored.

GS716Tv2 and GS724Tv3 Software Administration Manual 1. then click the Advanced  IP Extended Rules link. select the ACL ID to add the rule to. Managing Device Security v1.0. 4. The Extended ACL Rules configuration page displays as shown in Figure 5-32 on page 5-52. and then click Delete. Click Security  ACL. select the check box associated with the rule. To add an IP ACL rule. 3. and then click Add. Figure 5-31 2. To delete an IP rule. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. July 2009 5-51 .

Selects the ACL forwarding action that should be taken if a packet matches the rule’s criteria. After you click Apply. Valid range of Queue IDs is 0–3. Specifies the hardware egress queue identifier used to handle all packets matching this IP ACL rule. IP ACL Rule Configuration Fields Field ACL ID Rule ID Description Identifies the ACL to which the rule is being added. the new ID is created and you can configure the rule settings. so if Match Every is True. You can create up to 10 rules for each IP ACL. July 2009 Managing Device Security . Requires a packet’s protocol to match the protocol listed here. Requires a packet to match the criteria of this ACL. Match Every is exclusive to the other filtering rules.0. This field is visible when 'Permit' is chosen as 'Action'. Action Egress Queue Match Every Protocol Type 5-52 v1. Select a type from the drop down menu or enter the protocol number in the available field.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 5-32 Table 5-36. Enter a whole number in the range 1–10 that will be used to identify the rule. the other rules on the screen do not appear. • Deny — Drops packets which meet the ACL criteria. Possible values are: • Permit — Forwards packets which meet the ACL criteria.

The address you enter is compared to a packet's source IP Address. In contrast. • Source L4 Port Number: If the source L4 keyword is Other. enter a user-defined Port ID by which packets are matched to the rule. The address you enter is compared to a packet's destination IP Address. and has zeros (0's) for the bit positions that are not used. Click Complete one of the following fields: • Source L4 Keyword: Select the desired L4 keyword from a list of source ports on which the rule can be based. Specify the IP Mask in dotted-decimal notation to be used with the Destination IP Address value. Src IP Mask Src L4 Port Dst IP Address Dst IP Mask Managing Device Security v1. A wildcard mask is in essence the inverse of a subnet mask. A wild card mask of 255.255. A wildcard of 0.0. A ‘1’ in a bit position of the ACL mask indicates the corresponding bit can be ignored. Enter an IP Address in the appropriate field using dotted-decimal notation. the mask has ones (1's) in the bit positions that are used for the network address.0. Wildcard masking for ACLs operates differently from a subnet mask. Wild card masks determines which bits are used and which bits are ignored. Requires a packet’s destination port IP address to match the address listed here.0. This field is required when you configure a source IP address. a wildcard mask has (0’s) in a bit position that must be checked. Enter an IP Address in the appropriate field using dotteddecimal notation.0 indicates that all of the bits are important. July 2009 5-53 . Specifies the source IP address wildcard mask.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-36.255 indicates that no bit is important. IP ACL Rule Configuration Fields (continued) Field Src IP Address Description Requires a packet’s source port IP address to match the address listed here.255. Requires a packet’s TCP/UDP source port to match the port listed here. With a subnet mask.

Select one of the following three Match fields to use in matching packets to ACLs: • IP DSCP: Matches the packet DSCP value to the rule. Complete one of the following fields: • Destination L4 Keyword: Select the desired L4 keyword from a list of destination ports on which the rule can be based. To display the IP Binding Configuration page: 1. Click Security  ACL.TOS Bits: Requires the bits in a packet’s TOS field to match the two-digit hexadecimal number entered here. 5-54 v1. all the rules that have been defined are applied to the selected interface. • Destination L4 Port Number: If the destination L4 keyword is Other. . Use the IP Binding Configuration page to assign ACL lists to ACL Priorities and Interfaces. • IP Precedence: Matches the packet IP Precedence value to the rule when checked. July 2009 Managing Device Security . then click the Advanced  IP Binding Configuration link. enter a user-defined Port ID by which packets are matched to the rule.TOS Mask: Specifies the bit positions that are used for comparison against the IP TOS field in a packet.0. IP ACL Rule Configuration Fields (continued) Field Dst L4 Port Description Requires a packet’s TCP/UDP destination port to match the port listed here. IP Binding Configuration When an ACL is bound to an interface. . Click Apply to save any changes to the running configuration. • IP TOS Bits: Matches on the Type of Service bits in the IP header when checked. Enter the IP Precedence value to match.GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-36. Select the desired value from the drop down menu of DSCP keyword values. Either the DSCP value or the IP Precedence value is used to match packets to ACLs. Service Type 5. Either the DSCP value or the IP Precedence value is used to match packets to ACLs.

An optional sequence number may be specified to indicate the order of this access list relative to other access lists already assigned to this interface and direction. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. The only valid direction is Inbound. The valid range is 1–4294967295.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 5-33 Table 5-37. All nonrouting physical interfaces and interfaces participating in LAGs are listed. July 2009 5-55 . which means the IP ACL rules are applied to traffic entering the port. IP ACL Binding Configuration Fields Field ACL ID Direction Description Select an existing IP ACL. Sequence Number Port Selection Table 2. Specifies list of all available valid interfaces for ACL binding. If a sequence number is already in use for this interface and direction. Click Apply to save any changes to the running configuration. Managing Device Security v1. A lower number indicates higher precedence order. the specified access list replaces the currently attached access list using that sequence number. Specifies the packet filtering direction for ACL. Click the orange bar to view all the available interfaces. a sequence number that is one greater than the highest sequence number currently in use for this interface and direction will be used.0. If the sequence number is not specified by the user. 3.

Displays the type of ACL assigned to selected interface and direction. 3. Displays the Sequence Number signifying the order of specified ACL relative to other ACLs assigned to selected interface and direction. July 2009 Managing Device Security . IP ACL Binding Table Fields Field Interface Direction Description Shows the interface to which the IP ACL is bound.GS716Tv2 and GS724Tv3 Software Administration Manual IP Binding Table Use the IP Binding Table page to view or delete the IP ACL bindings. 5-56 v1. To delete the binding. which means the IP ACL rules are applied to traffic entering the port. select the check box next to the interface and click Delete. 2. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. The only valid direction is Inbound. To display the IP Binding Table: 1.0. Displays the ACL Number identifying the ACL assigned to selected interface and direction. Figure 5-34 Table 5-38. Specifies the packet filtering direction for ACL. Click Security  ACL. then click the Advanced  Binding Table link. ACL Type ACL ID Seq No.

Click Monitoring  Ports  Switch Statistics in the navigation menu. The Monitoring tab contains links to the following features: • • • • “Switch Statistics” on page 6-1 “Viewing Port Statistics” on page 6-4 “Managing Logs” on page 6-14 “Configuring Port Mirroring” on page 6-23 Switch Statistics The pages in the Switch Statistics folder contain a variety of information about the number and type of traffic transmitted from and received on the switch.0. The Switch Statistics page shows detailed statistical information about the traffic the switch handles. July 2009 .Chapter 6 Monitoring the System Use the features available from the Monitoring tab to view a variety of information about the switch and its ports and to configure how the switch monitors events. To access the Switch Statistics page: 1. 6-1 v1.

0. Receive Packets Discarded The number of inbound packets which were chosen to be discarded. Switch Statistics Fields Field ifIndex Octets Received Packets Received Without Errors Unicast Packets Received Description This object indicates the ifIndex of the interface table entry associated with the processor of this switch. The total number of packets (including broadcast packets and multicast packets) received by the processor. The number of subnetwork-unicast packets delivered to a higher layer protocol. but including FCS octets). Broadcast Packets Received The total number of packets received that were directed to the broadcast address. Multicast Packets Received The total number of packets received that were directed to a multicast address. The total number of octets of data received by the processor (excluding framing bits. This does not include multicast packets. 6-2 v1.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 6-1 Table 6-1. A possible reason for discarding a packet could be to free up buffer space. July 2009 Monitoring the System . This number does not include packets directed to the broadcast address. in order to prevent their being delivered to a higher layer protocol. even though no errors had been detected.

GS716Tv2 and GS724Tv3 Software Administration Manual Table 6-1. The number of presently active VLAN entries on this switch that have been created statically. including framing characters. since the statistics for this switch were last cleared. Click Clear Counters to clear all the statistics counters. hours. The discarded packets count cannot be cleared. and seconds. July 2009 6-3 . including those that were discarded or not sent. including those that were discarded or not sent. 3. The number of outbound packets which were chosen to be discarded. The highest number of Forwarding Database Address Table entries that have been learned by this switch since the most recent reboot. minutes. The number of VLANs on this switch that have been created and then deleted since the last reboot. Most Address Entries Ever Used Address Entries in Use Maximum VLAN Entries Most VLAN Entries Ever Used Static VLAN Entries Dynamic VLAN Entries VLAN Deletes Time Since Counters Last Cleared 2. The total number of packets that higher-level protocols requested be transmitted to the Broadcast address. resetting all switch summary and detailed statistics to default values. Switch Statistics Fields (continued) Field Octets Transmitted Packets Transmitted Without Errors Unicast Packets Transmitted Multicast Packets Transmitted Broadcast Packets Transmitted Transmit Packets Discarded Description The total number of octets transmitted out of the interface. The total number of packets that higher level protocols requested be transmitted to a Multicast address. The number of presently active VLAN entries on this switch. The number of Learned and static entries in the Forwarding Database Address Table for this switch.0. A possible reason for discarding a packet could be to free up buffer space. in order to prevent their being delivered to a higher layer protocol. Click Refresh to refresh the page with the most current data from the switch. The largest number of VLANs that have been active on this switch since the last reboot. Monitoring the System v1. The elapsed time. The maximum number of Virtual LANs (VLANs) allowed on this switch. even though no errors had been detected. in days. including those that were discarded or not sent. The total number of packets that higher level protocols requested be transmitted to a subnetwork-unicast address. The total number of packets transmitted out of the interface.

Figure 6-2 6-4 v1. To access the Port Summary page: 1. and then click the Port Statistics link. July 2009 Monitoring the System .GS716Tv2 and GS724Tv3 Software Administration Manual Viewing Port Statistics The pages in the Ports folder contain a variety of information about the number and type of traffic transmitted from and received on the switch.0. • • • “Port Statistics” on page 6-4 “Port Detailed Statistics” on page 6-5 “EAP Statistics” on page 6-12 Port Statistics The Port Statistics page shows a summary of per-port traffic statistics on the switch. Click Monitoring  Ports.

Port Detailed Statistics The Port Detailed Statistics page displays a variety of per-port traffic statistics. The total number of packets received that were without errors. The number of outbound packets that could not be transmitted because of errors. The number of inbound packets that contained errors preventing them from being deliverable to a higher-layer protocol.GS716Tv2 and GS724Tv3 Software Administration Manual Table 6-2. To clear all the counters for all ports on the switch. but not all. Port Statistics Fields Field Interface Total Packets Received Without Errors Packets Received With Error Broadcast Packets Received Packets Transmitted Without Errors Transmit Packet Errors Collision Frames Time Since Counters Last Cleared Description Lists the ports on the system. in days. minutes.0. hours. and seconds since the statistics for this port were last cleared. 4. 2. The best estimate of the total number of collisions on this Ethernet segment. July 2009 6-5 . (Figure 6-3 on page 6-6 shows some. Click Refresh to refresh the data on the screen and display the most current statistics.) Monitoring the System v1. The elapsed time. select the check box in the row heading and click Clear. To clear the counters for a specific port. and then click Port Detailed Statistics. select the check box associated with the port and click Clear. of the fields on the Port Detailed Statistics page. The number of frames that have been transmitted by this port to its segment. 3. This does not include multicast packets. The total number of good packets received that were directed to the broadcast address. Click the Monitoring  Ports tab. The button resets all statistics for all ports to default values. To access the Port Detailed page: 1.

GS716Tv2 and GS724Tv3 Software Administration Manual Figure 6-3 Table 6-3. 6-6 v1. Port Detailed Statistics Fields Field Interface MST ID ifIndex Port Type Description Use the drop down menu to select the interface for which data is to be displayed or configured. Otherwise the possible values are: • Mirrored: Indicates that the port has been configured as a monitoring port and is the source port in a port mirroring session. Displays the created or existing MSTs. For additional information about port monitoring and probe ports. For additional information about port monitoring and probe ports. July 2009 Monitoring the System . • Probe: Indicates that the port has been configured as a monitoring port and is the destination port in a port mirroring session. This field indicates the ifIndex of the interface table entry associated with this port on an adapter. • Port Channel: Indicates that the port has been configured as a member of a port-channel. see “Multiple Port Mirroring” on page 6-23. see “Multiple Port Mirroring” on page 6-23. which is also known as a link Aggregation Group (LAG). For most ports this field is blank.0.

• Disable: Specifies that the port cannot participate in a port channel (LAG). The port role will be one of the following values: Root Port. This object determines whether or not to send a trap when link status changes. In auto-negotiation mode. the port channel's interface ID and name are shown. which is the default mode. Port Detailed Statistics Fields (continued) Field Port Channel ID Port Role Description If the port is a member of a port channel. Each MST Bridge Port that is enabled is assigned a Port Role for each spanning tree. or Disabled Port. Selects the Link Aggregation Control Protocol administration state: • Enable: Specifies that the port is allowed to participate in a port channel (LAG). The possible values for this field are: • Enable: Enables the Spanning Tree Protocol for this port. The factory default is enabled: • Enable: Specifies that the system sends a trap when the link status changes.GS716Tv2 and GS724Tv3 Software Administration Manual Table 6-3. • Disable: The port is administratively down and does not participate in the network. Otherwise. Disable is shown. Designated Port. The other five states are defined in IEEE 802. Backup Port. Indicates the port speed and duplex mode.0. the duplex mode and speed are set from the auto-negotiation process. Indicates whether the link is up or down. July 2009 6-7 . Indicates the port speed and duplex mode status. • Disable: Disables the Spanning Tree Protocol for this port. STP Mode STP State Admin Mode LACP Mode Physical Mode Physical Status Link Status Link Trap Monitoring the System v1. Shows the port's current state Spanning Tree state.1D: • Disabled • Blocking • Listening • Learning • Forwarding • Broken Shows the port control administration state: • Enable: The port can participate in the network (default). Shows the Spanning Tree Protocol (STP) Administrative Mode for the port or LAG. If the bridge detects a malfunctioning port it will place that port into the broken state. Alternate Port. • Disable: Specifies that the system does not send a trap when the link status changes. This state controls what action a port takes on receipt of a frame. Master Port.

If greater precision is desired. The total number of packets (including bad packets) received or transmitted that were between 1024 and 1518 octets in length inclusive (excluding framing bits but including FCS octets). July 2009 Monitoring the System .GS716Tv2 and GS724Tv3 Software Administration Manual Table 6-3. the etherStatsPkts and etherStatsOctets objects should be sampled before and after a common interval. Port Detailed Statistics Fields (continued) Field Packets RX and TX 64 Octets Packets RX and TX 65-127 Octets Description The total number of packets (including bad packets) received or transmitted that were 64 octets in length (excluding framing bits but including FCS octets). Packets Received 64 Octets The total number of packets (including bad packets) received that were 64 octets in length (excluding framing bits but including FCS octets). The total number of packets (including bad packets) received that were between 256 and 511 octets in length inclusive (excluding framing bits but including FCS octets). The total number of packets (including bad packets) received or transmitted that were between 65 and 127 octets in length inclusive (excluding framing bits but including FCS octets). The total number of packets (including bad packets) received that were between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets). Packets RX and TX 128-255 The total number of packets (including bad packets) received or Octets transmitted that were between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets).0. Packets Received 65-127 Octets Packets Received 128-255 Octets Packets Received 256-511 Octets The total number of packets (including bad packets) received that were between 65 and 127 octets in length inclusive (excluding framing bits but including FCS octets). This object can be used as a reasonable estimate of ethernet utilization. Packets RX and TX 5121023 Octets Packets RX and TX 10241518 Octets Packets RX and TX > 1522 Octets Octets Received The total number of packets (including bad packets) received or transmitted that were between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS octets). Packets RX and TX 256-511 The total number of packets (including bad packets) received or Octets transmitted that were between 256 and 511 octets in length inclusive (excluding framing bits but including FCS octets). 6-8 v1. The total number of octets of data (including those in bad packets) received on the network (excluding framing bits but including FCS octets). The total number of packets (including bad packets) received or transmitted that are in excess of 1522 octets in length inclusive (excluding framing bits but including FCS octets).

inclusive. and had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error).3.1.4 (10BASE2). July 2009 6-9 . The total number of inbound packets that contained errors preventing them from being deliverable to a higher-layer protocol.0. Multicast Packets Received The total number of good packets received that were directed to a multicast address. but including FCS octets) and were otherwise well formed.GS716Tv2 and GS724Tv3 Software Administration Manual Table 6-3. Port Detailed Statistics Fields (continued) Field Description Packets Received 512-1023 The total number of packets (including bad packets) received that were Octets between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS octets). The total number of packets received that were longer than 1518 octets (excluding framing bits. This definition of jabber is different than the definition in IEEE802. The number of subnetwork-unicast packets delivered to a higher-layer protocol. The total number of packets received that were less than 64 octets in length with GOOD CRC (excluding framing bits but including FCS octets). The total number of packets received that had a length (excluding framing bits. but had a bad Frame Check Sequence (FCS) with a nonintegral number of octets. The total number of packets received that were without errors. These documents define jabber as the condition where any packet exceeds 20 ms. The total number of packets received that were in excess of 1522 octets (excluding framing bits. Fragments Received Undersize Received Alignment Errors Monitoring the System v1.1. but including FCS octets). The total number of packets received that were less than 64 octets in length with ERROR CRC (excluding framing bits but including FCS octets). This number does not include packets directed to the broadcast address. Broadcast Packets Received Total Packets Received with MAC Errors Jabbers Received The total number of good packets received that were directed to the broadcast address.3 section 8. The allowed range to detect jabber is between 20 ms and 150 ms. Packets Received 10241518 Octets Packets Received > 1522 Octets Total Packets Received Without Errors Unicast Packets Received The total number of packets (including bad packets) received that were between 1024 and 1518 octets in length inclusive (excluding framing bits but including FCS octets).5 (10BASE5) and section 10. This does not include multicast packets.2. but including FCS octets) of between 64 and 1518 octets.

This object can be used as a reasonable estimate of ethernet utilization. but had a bad Frame Check Sequence (FCS) with an integral number of octets The total number of frames discarded as this port was overloaded with incoming packets. Packets Transmitted 64 Octets Packets Transmitted 65-127 The total number of packets (including bad packets) transmitted that Octets were between 65 and 127 octets in length inclusive (excluding framing bits but including FCS octets).1 reserved address and are not supported by the system. The number of frames discarded when a lookup in the multicast tree for a VLAN occurs while that tree is being modified. The number of frames discarded due to lack of cell descriptors available for that packet's priority level. If greater precision is desired. July 2009 Monitoring the System . The number of frames discarded from this port due to being an unacceptable frame type. but including FCS octets) of between 64 and 1518 octets. and could not keep up with the inflow. The number of frames discarded that are destined to an IEEE 802. This counter does not increment when the interface is operating in half-duplex mode. Port Detailed Statistics Fields (continued) Field Rx FCS Errors Description The total number of packets received that had a length (excluding framing bits. The total number of octets of data (including those in bad packets) transmitted on the network (excluding framing bits but including FCS octets).GS716Tv2 and GS724Tv3 Software Administration Manual Table 6-3.0.. the etherStatsPkts and etherStatsOctets objects should be sampled before and after a common interval. inclusive. CFI Discards Upstream Threshold Total Packets Transmitted (Octets) The number of frames discarded that have CFI bit set and the addresses in RIF are in non-canonical format. 6-10 v1. A count of MAC Control frames received on this interface with an opcode indicating the PAUSE operation. Overruns Total Received Packets Not A count of valid frames received which were discarded (i. filtered) by Forwarded the forwarding process. The total number of packets (including bad packets) transmitted that were 64 octets in length (excluding framing bits but including FCS octets).e. Local Traffic Frames 802. Broadcast Storm Recovery The number of frames discarded that are destined for FF:FF:FF:FF:FF:FF when Broadcast Storm Recovery is enabled.3x Pause Frames Received Unacceptable Frame Type Multicast Tree Viable Discards Reserved Address Discards The total number of frames dropped in the forwarding process because the destination address was located off of this port.

The sum of single collision frames discarded.0. The total number of frames discarded because the transmit FIFO buffer became empty during frame transmission. This counter has a max increment rate of 815 counts per second at 10 Mb/s. The total number of packets (including bad packets) transmitted that were between 1024 and 1518 octets in length inclusive (excluding framing bits but including FCS octets). July 2009 6-11 .GS716Tv2 and GS724Tv3 Software Administration Manual Table 6-3. The total number of packets (including bad packets) transmitted that were between 256 and 511 octets in length inclusive (excluding framing bits but including FCS octets). multiple collision frames discarded. The sum of Single. The total number of packets that higher-level protocols requested be transmitted to the Broadcast address. including those that were discarded or not sent. but including FCS octets) of between 64 and 1518 octets. and excessive frames discarded. and Excessive Collisions. Tx Oversized Underrun Errors Total Transmit Packets Discarded Monitoring the System v1. The number of frames that have been transmitted by this port to its segment. The total number of packets (including bad packets) transmitted that were between 1519 and 1522 octets in length inclusive (excluding framing bits but including FCS octets). including those that were discarded or not sent. The total number of packets transmitted that had a length (excluding framing bits. including those that were discarded or not sent. Port Detailed Statistics Fields (continued) Field Packets Transmitted 128255 Octets Packets Transmitted 256511 Octets Packets Transmitted 5121023 Octets Packets Transmitted 10241518 Octets Packets Transmitted 15191522 Octets Total Packets Transmitted Successfully Unicast Packets Transmitted Multicast Packets Transmitted Broadcast Packets Transmitted Total Transmit Errors Tx FCS Errors Description The total number of packets (including bad packets) transmitted that were between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets). Multiple. The total number of packets that higher-level protocols requested be transmitted to a Multicast address. The total number of packets that higher-level protocols requested be transmitted to a subnetwork-unicast address. but had a bad Frame Check Sequence (FCS) with an integral number of octets The total number of frames that exceeded the max permitted frame size. The total number of packets (including bad packets) transmitted that were between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS octets). inclusive.

Number of RSTP BPDUs transmitted from the selected port. and seconds since the statistics for this port were last cleared. Port Membership Discards STP BPDUs Received STP BPDUs Transmitted RSTP BPDUs Received RSTP BPDUs Transmitted MSTP BPDUs Received MSTP BPDUs Transmitted 802.3x Pause Frames Transmitted EAPOL Frames Received EAPOL Frames Transmitted Time Since Counters Last Cleared The number of frames discarded on egress for this port due to egress filtering being enabled. 2. and then click the EAP Statistics link.GS716Tv2 and GS724Tv3 Software Administration Manual Table 6-3. Number of MSTP BPDUs received at the selected port. EAP Statistics Use the EAP Statistics page to display information about EAP packets received on a specific port. hours. This counter does not increment when the interface is operating in half-duplex mode. The number of EAPOL frames of any type that have been transmitted by this authenticator.0. A count of the number of successfully transmitted frames on a particular interface for which transmission is inhibited by more than one collision. Click the Monitoring  Ports tab. Click Refresh to refresh the data on the screen and display the most current statistics. Number of RSTP BPDUs received at the selected port. Port Detailed Statistics Fields (continued) Field Single Collision Frames Multiple Collision Frames Description A count of the number of successfully transmitted frames on a particular interface for which transmission is inhibited by exactly one collision. 3. 6-12 v1. Number of STP BPDUs transmitted from the selected port. To display the EAP Statistics page: 1. The elapsed time. Click Clear to clear all the counters. Number of MSTP BPDUs transmitted from the selected port. Excessive Collision Frames A count of frames for which transmission on a particular interface fails due to excessive collisions. The number of valid EAPOL frames of any type that have been received by this authenticator. This resets all statistics for this port to the default values. July 2009 Monitoring the System . in days. A count of MAC Control frames transmitted on this interface with an opcode indicating the PAUSE operation. minutes. Number of STP BPDUs received at the selected port.

Displays the number of EAPOL frames with an invalid Packet Body Length received on this port. Displays the number of unrecognized EAPOL frames received on this port. Monitoring the System v1.0. Displays the number of EAP Respond ID frames that have been received on the port. Displays the protocol version number attached to the most recently received EAPOL frame. Displays the number of valid EAPOL frames received on the port. July 2009 6-13 . EAP Statistics Fields Field Ports Frames Received Frames Transmitted Start Frames Received Log off Frames Received Last Frame Version Last Frame Source Invalid Frames Received Length Error Frames Received Response/ID Frames Received Response Frames Received Description Specifies the interface which is polled for statistics. Displays the number of valid EAP Response frames received on the port. Displays the source MAC Address attached to the most recently received EAPOL frame.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 6-4 Table 6-4. Displays the number of EAPOL frames transmitted through the port. Displays the number of EAPOL Start frames received on the port. Displays the number of EAPOL Log off frames that have been received on the port.

EAP Statistics Fields (continued) Field Request/ID Frames Transmitted Description Displays the number of EAP Requested ID frames transmitted through the port. The Monitoring  Logs tab contains links to the following folders: • • • • • “Memory Logs” on page 6-14 “FLASH Log Configuration” on page 6-16 “Server Log Configuration” on page 6-19 “Trap Logs” on page 6-21 “Event Logs” on page 6-22 Memory Logs The in-memory log stores messages in memory based upon the settings for message component and severity. Click the Monitoring  Logs tab. Use the Memory Logs page to set the administrative status and behavior of logs in the system buffer. Managing Logs The switch may generate messages in response to events. To clear all the EAP counters for all ports on the switch. select the check box in the row heading and click Clear. The button resets all statistics for all ports to default values. or errors occurring on the platform as well as changes in configuration or other occurrences. To clear the counters for a specific port. faults.GS716Tv2 and GS724Tv3 Software Administration Manual Table 6-4. Click Refresh to refresh the data on the screen and display the most current statistics. Local and remote configuration of the logging capability includes filtering of messages logged or forwarded based on severity and generating component. and then click the Memory Log link. July 2009 Monitoring the System . 3. To access the Memory Log page: 1. 2. 6-14 v1. Request Frames Transmitted Displays the number of EAP Request frames transmitted through the port. select the check box associated with the port and click Clear.0. 4. These messages are stored locally and can be forwarded to one or more centralized points of collection for monitoring purposes or long term archival storage.

• Stop on Full: When the buffer is full.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 6-5 Table 6-5. • Wrap: When the buffer is full. Indicates the behavior of the log when it is full. the oldest log messages are deleted as the system logs new messages. Behavior The Memory Log table also appears on the Memory Log page. Only the 64 most recent entries are displayed on the page. • Enable: Enables system logging. • Disable: Prevents the system from logging messages. the system stops logging new messages and preserves all existing log messages. Memory Log Configuration Fields Field Admin Status Description Determines whether to log messages. Memory Log Table Fields Field Total Number of Messages Description Shows the number of messages the system has logged in memory. July 2009 6-15 .0. Monitoring the System v1. Table 6-6.

Messages logged to a collector or relay via syslog have an identical format of either type. The message was generated on Aug 24 05:34:05 by line 318 of file mstp_api. 5. • The first log type is the system startup log. To preserve the changes after a system reboot. The message was generated by the MSTP component running in thread id 2110. click Apply to apply the changes to the system. If you change the buffered log settings. or console log. <15>Aug 24 05:34:05 STK0 MSTP[2110]: mspt_api.c(318) 237 %% Interface 12 transitioned to root state on message age timer expiry The example log message above indicates a user-level message (1) with severity 7 (debug). Click Refresh to update the page with the latest messages in the log.c. Number of log messages displayed: For the message log. The system startup log stores the first N messages received after system reboot. July 2009 Monitoring the System . you must perform a save. FLASH Log Configuration The FLASH log is a log that is stored in persistent storage. which means that the log messages are retained across a switch reboot. Messages logged to a collector or relay via syslog have an identical format to the above message. 6-16 v1.0. 2. persistent log.c(318) 237 %% Interface 12 transitioned to root state on message age timer expiry The example log message above indicates a message with severity 7(15 mod 8) (debug).GS716Tv2 and GS724Tv3 Software Administration Manual The rest of the page displays the Memory Log messages. only the latest 64 entries are displayed on the Web page. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 3. Example user-level message: <15>Aug 24 05:34:05 STK0 MSTP[2110]: mspt_api. Click Clear to clear the messages out of the buffered log in the memory. This log always has the log full operation attribute set to stop on full and can store up to 32 messages. The message was generated by component MSTP running in thread id 2110.c. This is the 237th message logged. 4. This is the 237th message logged. The following example applies to the format of all logged messages which are displayed for the message log. The message was generated on Aug 24 05:34:05 by line 318 of file mstp_api.

0. on system startup. if configured. but not both. In other words. Figure 6-6 Monitoring the System v1. Either the system startup log or the system operation log stores a message received by the log subsystem that meets the storage criteria. Click the Monitoring  Logs tab.GS716Tv2 and GS724Tv3 Software Administration Manual • The second log type is the system operation log. July 2009 6-17 . Use the FLASH Log Configuration page to enable or disable persistent logging and to set the severity filter. and then click the FLASH Log link. it stores messages up to its limit. The system operation log stores the last N messages received during system operation. This log always has the log full operation attribute set to overwrite. To access the FLASH Log Configuration page: 1. This log can store up to 1000 messages. if the startup log is configured. The operation log. then begins to store the messages.

Click Clear to clear the messages out of the buffered log. Table 6-8. 3. Click Refresh to refresh the page with the most current data from the switch. July 2009 Monitoring the System . Severity Filter The rest of the page displays the persistent log messages. such as all device features being down. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.GS716Tv2 and GS724Tv3 Software Administration Manual Table 6-7. 5. while the rest of the device ports remain functional. For example. FLASH Log Configuration Fields Field Admin Status Description Enable or disable logging by selecting the corresponding check box. 2. An alert log is saved if there is a serious device malfunction. 4. Action must be taken immediately. and Emergency. Use the menu to select the severity of the logs. click Apply to apply the change to the system. A critical log is saved if a critical device malfunction occurs. The default severity level is Alert(1). if you select Error. The default is Disable. If you make any changes to the page. • Error (3): A device error has occurred. Debugging should only be entered by qualified support personnel. • Warning (4): The lowest level of a device warning. Critical. If the device is down or not functioning properly. Alert. the logged messages include Error. such as if a port is offline. two device ports are not functioning. FLASH Log Fields Field Number of FLASH Messages Description Shows the number of persistent messages the system has logged. • Info (6): Provides device information. The severity can be one of the following levels: • Emergency (0): The highest level warning level. Provides the network administrators with device information. • Critical (2): The third highest warning level. an emergency log is saved to the device.0. • Enable: A log that is ‘Enabled’ logs messages. • Disable: A log that is ‘Disabled’ does not log messages. • Notice (5): Normal but significant conditions. • Debug (7): Provides detailed information about the log. 6-18 v1. • Alert (1): The second highest warning level. A log records messages equal to or above a configured severity threshold. for example.

Local UDP Port Messages Relayed Messages Ignored Monitoring the System v1. Messages forwarded to multiple hosts are counted once for each host. To access the Server Log Configuration page: 1. The number of messages forwarded by the syslog function to a syslog host.GS716Tv2 and GS724Tv3 Software Administration Manual Server Log Configuration Use the Server Log Configuration page to allow the switch to send log messages to the remote logging hosts configured on the system. July 2009 6-19 . The number of messages that were ignored. Click the Monitoring  Logs tab. Server Log Configuration Fields Field Admin Status Description Specifies whether to send log messages to the remote syslog hosts configured on the switch: • Enable: Messages will be sent to all configured hosts (syslog collectors or relays) using the values configured for each host. Disable means no messages will be sent to any collector/relay.0. • Disable: Stops logging to all syslog hosts. and then click the Server Log link. Specifies the port on the switch from which syslog messages are sent. Figure 6-7 Table 6-9. The default port is 514.

2. 6. • Debug (7): Provides detailed information about the log. 5. such as if a port is offline. if you select Error. • Critical (2): The third highest warning level. enter the appropriate information into the Host Configuration table and click Add. Alert. Critical. change the desired information.0. for example. such as all device features being down. The severity can be one of the following levels: • Emergency (0): The highest level warning level. 6-20 v1. 4. If you make any changes to the Server Log Configuration information. two device ports are not functioning. an emergency log is saved to the device. To delete an existing host. Logs with the selected severity level and all logs of greater severity are sent to the host. Use the menu to select the severity of the logs to send to the logging host. The default severity level is Alert(1). To modify the settings for an existing host. select the check box next to the host.GS716Tv2 and GS724Tv3 Software Administration Manual The Server Log Configuration page also contains the Server Configuration table. An alert log is saved if there is a serious device malfunction. Table 6-10. Debugging should only be entered by qualified support personnel. Identifies the port on the host to which syslog messages are sent. the logged messages include Error. • Error (3): A device error has occurred. select the check box next to the host and click Delete. • Notice (5): Provides the network administrators with device information. Specify the port in the text field. A critical log is saved if a critical device malfunction occurs. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. Shows whether the remote logging host is currently active. and Emergency. • Warning (4): The lowest level of a device warning. July 2009 Monitoring the System . while the rest of the device ports remain functional. For example. To add a remote logging host. click Apply to apply the change to the system. Host Configuration Fields Field Host Address Status Port Severity Filter Description Enter the IP address of the host configured for syslog. • Informational (6): Provides device information. and click Apply. If the device is down or not functioning properly. The default port is 514. • Alert (1): The second highest warning level. 3.

and then click the Trap Logs link. If the number of traps exceeds the capacity. July 2009 6-21 . To access the Trap Logs page: 1. The page also displays information about the traps that were sent. The maximum number of traps stored in the log. Monitoring the System v1. Web display. The number of traps that have occurred since the traps were last displayed. or upload file from switch) will cause this counter to be cleared to 0. Trap Log Statistics Field Number of Traps Since Last Reset Trap Log Capacity Number of Traps Since Log Last Viewed Description The number of traps that have occurred since the switch last reboot. Click the Monitoring  Logs tab. the entries will overwrite the oldest entries. Displaying the traps by any method (such as terminal interface display.0.GS716Tv2 and GS724Tv3 Software Administration Manual Trap Logs Use the Trap Logs page to view information about the SNMP traps generated on the switch. Figure 6-8 Table 6-11.

July 2009 Monitoring the System .000 entries and is erased when an attempt is made to add an entry after it is full. Trap Logs Field Log System Up Time Trap Description The sequence number of this trap. To access the Event Log page: 1. This resets all statistics for the trap logs to the default values. Event Logs Use the Event Log page to display the event log. the switch will be reset. After the event is logged and the updated log is saved in flash memory. Figure 6-9 6-22 v1. 2. expressed in days. minutes and seconds since the last reboot of the switch. hours. The event log is preserved across system resets. which is used to hold error messages for catastrophic events. Click the Monitoring  Logs tab. The time at which this trap occurred. and then click the Event Logs link. The log can hold at least 2. Information identifying the trap.0.GS716Tv2 and GS724Tv3 Software Administration Manual Table 6-12. Click Clear Counters to clear all the counters.

or are both received and transmitted. The most recent entry is first. 2. the copied packet is VLAN tagged or untagged as it was received on the source port. If the mirror is copying a transmitted packet. As such. Click Clear to clear the messages out of the Event Log. Click Refresh to refresh the data on the screen and display the most current information. To access the Multiple Port Mirroring page: Monitoring the System v1. The OS-assigned ID of the task reporting the event. The GS716T/GS724T source code filename identifying the code that detected the event. Configuring Port Mirroring The page under the Mirroring link allows you to view and configure port mirroring on the system. The line number within the source file of the code that detected the event. The packet that is copied to the destination port is in the same format as the original packet on the wire. This means that if the mirror is copying a received packet. Multiple Port Mirroring Port mirroring selects the network traffic for analysis by a network analyzer. Use the Multiple Port Mirroring page to define port mirroring sessions. that are transmitted on a port. Specifies the type of entry. the copied packet is VLAN tagged or untagged as it is being transmitted on the source port. can be mirrored to the destination port. measured from the previous reset. You have the ability to configure how traffic is mirrored on a source port. many switch ports are configured as source ports and one switch port is configured as a destination port. Packets that are received on the source port.0.GS716Tv2 and GS724Tv3 Software Administration Manual Table 6-13. The time the event occurred. This is done for specific ports of the switch. 3. July 2009 6-23 . The event code passed to the event log handler by the code reporting the event. Event Log Fields Field Entry Type Filename Line Task ID Code Time Description The number of the entry within the event log.

To delete a mirrored port. Select Disable to turn off port mirroring. enter the port to which port traffic may be copied in g1. If the port is configured as a source port. select the check box next to the mirrored port. and then click Apply. Select Enable from the Session Mode menu. Session Mode Mirroring Port 2. To add a mirrored port. 4. July 2009 Monitoring the System ..0. 3.. Multiple Port Mirroring Fields Field Source Port Destination Port Description Lists all the ports on the system. After you select a source port. the field value is Mirrored. and then click Delete. Figure 6-10 Table 6-14. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. select the source port. You can only configure one destination port on the system. The session mode is a global value.GS716Tv2 and GS724Tv3 Software Administration Manual 1. g2.. 6-24 v1. enter the destination port number (g1.) in the Destination port field.... Select Enable to turn on Multiple Port Mirroring. Click Monitoring  Port Mirroring in the navigation menu.format. Select the check box next to a port to configure it as a source port. g2.

0.Chapter 7 Maintenance The Maintenance tab contains links to the following pages that help you manage the switch: • • • • • “Reset” on page 7-1 “Upload File From Switch” on page 7-3 “Download File To Switch” on page 7-5 “File Management” on page 7-10 “Troubleshooting” on page 7-13 Reset The Reset menu contains links to the following options: • • “Rebooting the Switch” on page 7-1 “Reset Configuration to Defaults” on page 7-2 Rebooting the Switch Use the Device Reboot page to reboot the system. To access the Device Reboot page: 7-1 v1. July 2009 .

see “Connecting the Switch to the Network” on page 1-1. 3. Reset Configuration to Defaults Use the Factory Default page to reset the system configuration to the factory default values. Click Apply to send the updated configuration to the switch.GS716Tv2 and GS724Tv3 Software Administration Manual 1. Click Maintenance  Reset  Device Reboot in the navigation tree. Note: For information about configuring network information. July 2009 Maintenance . Figure 7-1 2. To access the Factory Defaults page: 7-2 v1. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch.0. Configuration changes take place immediately.

Maintenance v1. Click Apply to restore the factory default settings. 3. Figure 7-2 2. Upload File From Switch Use the File Upload page to upload configuration (ASCII) and image (binary) files from the switch to the TFTP server. Click Maintenance  Reset  Factory Default in the navigation tree.0.GS716Tv2 and GS724Tv3 Software Administration Manual 1. The action occurs immediately. Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch. July 2009 7-3 .

Specify the code image to upload.0. This field is only visible when Code is selected as the File Type.0.0. Trivial File Transfer Protocol. Shows the format of the TFTP Server Address field The factory default is IPv4. • Text Configuration: Retrieves the text configuration file startupconfig. The factory default is image1. Image Name Transfer Mode Server Address Type Server Address 7-4 v1. Upload File from Switch Fields Field File Type Description Specify the type of file you want to upload: • Code: Retrieves a stored code image. Figure 7-3 Table 7-1. July 2009 Maintenance . Click Maintenance  Upload  File Upload in the navigation tree. The default is Error Log. The factory default is the IPv4 address 0. • Error Log: Retrieves the system error (persistent) log. Enter the IP address of the TFTP server in accordance with the format indicated by the TFTP Server Address Type.GS716Tv2 and GS724Tv3 Software Administration Manual To display the File Upload page: 1. • Buffered Log: Retrieves the system buffered (in-memory) log.0. Specify what protocol to use to transfer the file: • TFTP. • Trap Log: Retrieves the system trap records. either image1 or image2. sometimes referred to as the event log.

The factory default is blank. Complete the Server Address Type. and Transfer File Name (full path without TFTP server IP address) fields. and then click Apply. 4. Transfer File Name Start File Transfer The last row of the table is used to display information about the progress of the file transfer. The page will refresh automatically until the file transfer completes. Uploading Files Use the following procedures to upload a file from the switch to a TFTP server. You may enter up to 32 characters. the Image Name field is not available. Server IP Address. From the File Type field. select the image on the switch to upload. The Download menu contains links to the following options: • • “TFTP File Download” on page 7-6 “HTTP File Download” on page 7-8 Maintenance v1. select the type of file to copy from the switch to the TFTP server. If you are uploading another type of file. A file name with a space is not accepted. Click the Start File Transfer check box. Enter a destination file name for the file to upload.0. 1. Download File To Switch The switch supports system file downloads from a remote system to the switch by using either TFTP or HTTP. July 2009 7-5 . You may enter up to 32 characters. 5.GS716Tv2 and GS724Tv3 Software Administration Manual Table 7-1. 2. 3. The factory default is blank. check this box before clicking Apply. If you are uploading a GS716T/GS724T image (Code). Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch. To initiate the file upload. Upload File from Switch Fields (continued) Field Transfer File Path Description Enter the path on the TFTP server where you want to put the file.

To access the TFTP File Download page: 1. July 2009 Maintenance . Figure 7-4 7-6 v1. You can also download files via HTTP. See “HTTP File Download” on page 7-8 for additional information. Click Maintenance  Download  TFTP File Download in the navigation tree. the image file.GS716Tv2 and GS724Tv3 Software Administration Manual TFTP File Download Use the Download File to Switch page to download device software.0. the configuration files and SSL files from a TFTP server to the switch.

• SSL DH Strong Encryption Parameter PEM File: SSL Diffie-Hellman Strong Encryption Parameter File (PEM Encoded). check this box before clicking Submit.GS716Tv2 and GS724Tv3 Software Administration Manual Table 7-2. either image1 or image2. Shows the format of the TFTP Server Address field The factory default is IPv4. You may enter up to 32 characters. The factory default is image1. July 2009 7-7 . Enter the name of the file you want to download from the TFTP server. The device boots and runs from the active image. The factory default is blank. This is a safety feature for faults occurring during the boot upgrade process. If the active image is corrupt. The most common usage of text-based configuration is to upload a working configuration from a device. The active image stores the active copy. • Text Configuration: A text-based configuration file enables you to edit a configured text file (startup-config) offline as needed without having to translate the contents for Smart Switch to understand. Download File to Switch Fields Field File Type Description Specify what type of file you want to download to the switch: • Code: The code is the system software image. The factory default is blank. You may enter up to 32 characters. Enter the path on the TFTP server where the selected file is located. while the other image stores a second copy. the system automatically boots from the non-active image. A file name with a space is not accepted.0.0. and download it to that device.0. The factory default is the IPv4 address 0. Maintenance v1. edit it offline to personalize it for another similar device (for example. Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch. Image Name Server Address Type TFTP Server IP Transfer File Path Remote File Name Start File Transfer 2. serial number. • SSL Server Certificate PEM File: SSL Server Certificate File (PEM Encoded).0. which is saved in one of two flash sectors called images (image1 and image2). • SSL DH Weak Encryption Parameter PEM File: SSL Diffie-Hellman Weak Encryption Parameter File (PEM Encoded). • SSL Trusted Root Certificate PEM File: SSL Trusted Root Certificate File (PEM Encoded). change the device name. Specify the code image you want to download. IP address). To initiate the download. Enter the IP address of the TFTP server in accordance with the format indicated by the TFTP Server Address Type. This field is only visible when Code is selected as the File Type.

Complete the Server Address Type. the screen refreshes and a “File transfer operation started” message appears. To display this page: 7-8 v1. 3. select the image on the switch to overwrite. Verify the IP address of the TFTP server and ensure that the software image or other file to be downloaded is available on the TFTP server. If you are downloading a GS716T/GS724T image (Code). The file is in the correct format. After the software is downloaded to the device. July 2009 Maintenance . The switch has a path to the TFTP server. If you are downloading another type of file. 6. a message appears indicating that the file transfer operation completed successfully. and then click Apply. The system will display a warning that you are trying to overwrite the active image. see “File Management” on page 7-10. After you click Apply. TFTP Server IP Address and Remote File Name (full path without TFTP server IP address) fields. the Image Name field is not available.GS716Tv2 and GS724Tv3 Software Administration Manual Downloading a File to the Switch Before you download a file to the switch. 5. Click the Start File Transfer check box. Note: It is recommended that you not overwrite the active image. To activate a software image that you download to the switch. the following conditions must be true: • • • The file to download from the TFTP server is on the server in the appropriate directory. Use the following procedures to download a file from a TFTP server to the switch. 2. select the type of file to download. HTTP File Download Use the HTTP File Download page to download files of various types to the switch using an HTTP session (for example. via your Web browser). 4. From the File Type field.0. 1.

Image Name Select File 2. HTTP File Download Fields Field File Type Description Specify the type of file you want to download: • Code: Choose this option to upgrade the operational software in flash (default). You may enter up to 80 characters. Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch. Click Maintenance  Download  HTTP File Download in the navigation menu.GS716Tv2 and GS724Tv3 Software Administration Manual 1. either image1 (the default) or image2. • Text Configuration: Choose this option to update the switch's configuration. 3. July 2009 7-9 . If the file has errors the update will be stopped. This field is only visible when Code is selected as the File Type. Enter the path and filename or browse for the file you want to download. Figure 7-5 Table 7-3.0. Click the Apply button to initiate the file download. Maintenance v1. • SSL Trusted Root Certificate PEM File: SSL Trusted Root Certificate File (PEM Encoded) • SSL Server Certificate PEM File: SSL Server Certificate File (PEM Encoded) • SSL DH Weak Encryption Parameter PEM File: SSL Diffie-Hellman Weak Encryption Parameter File (PEM Encoded) • SSL DH Strong Encryption Parameter PEM File: SSL Diffie-Hellman Strong Encryption Parameter File (PEM Encoded) Specify the code image you want to download.

This indicates that the file transfer is done.GS716Tv2 and GS724Tv3 Software Administration Manual Note: After a file transfer is started. The File Management menu contains links to the following options: • • “Dual Image Configuration” on page 7-10 “Viewing the Dual Image Status” on page 7-12 Dual Image Configuration The system running an older software version will ignore (not load) a configuration file created by the newer software version. When the page refreshes. the system will display an appropriate warning to the user. File Management The system maintains two versions of the GS716T/GS724T software in permanent storage. and the second image is the backup image. July 2009 Maintenance . The active image is loaded during subsequent switch restarts. To display the Dual Image Configuration page: 7-10 v1. This feature reduces switch down time when upgrading or downgrading the GS716T/GS724T software. When a configuration file created by the newer software version is discovered by the system running an older version of the software. One image is the active image. the “Select File” option will be blanked out. Use the Dual Image Configuration page to set the boot image.0. please wait until the page refreshes.

If the file you uploaded contains the boot loader code only. Click Delete Image to remove the selected image from permanent storage on the switch. Click Refresh to reload the page and display the most current information. You cannot delete the active image. you must perform a system reset of the switch in order to run the new code. Displays name of current active image. 2. Click Activate Image to make the image that is selected in the Image Name field the next active image for subsequent reboots. Maintenance v1. 3. Note: After activating an image. Dual Image Configuration Fields Field Image Name Current Active Image Description Description Select image1 or image2 from the drop down menu to display or configure information about that software image. July 2009 7-11 . 4.GS716Tv2 and GS724Tv3 Software Administration Manual 1.0. click Update Bootcode. If desired. enter a descriptive name for the software image. 5. Click Maintenance  File Management  Dual Image  Dual Image Configuration in the navigation menu. Figure 7-6 The Active Image page contains the following fields: Table 7-4.

0. Click Apply to update the image description on the switch. Displays the image to be used on the next restart of this switch. Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch. Viewing the Dual Image Status You can use the Dual Image Status page to view information about the system images on the device.GS716Tv2 and GS724Tv3 Software Administration Manual 6. 7. July 2009 Maintenance . Displays the version of the image2 code file. Click Maintenance File Management  Dual Image  Dual Image Status in the navigation menu. Displays the version of the image1 code file. Displays the description associated with the image1 code file. To display the Dual Image Status page: 1. Dual Image Status Fields Field Unit Image1 Ver Image2 Ver Current-active Next-active Image1 Description Description The unit ID of the switch is always 1. Figure 7-7 Table 7-5. Displays the currently active image on this switch. 7-12 v1.

Dual Image Status Fields (continued) Field Image2 Description Description Displays the description associated with the image2 code file. 3. 2.0. You can use this feature to check whether the switch can communicate with a particular network host. see “File Management” on page 7-10. To access the Ping page: 1. Troubleshooting The Troubleshooting menu contains links to the following options: • • “Ping” on page 7-13 “TraceRoute” on page 7-14 Ping Use the Ping page to tell the switch to send a Ping request to a specified IP address. July 2009 7-13 . For information about how to update or change the system images. Figure 7-8 Maintenance v1.GS716Tv2 and GS724Tv3 Software Administration Manual Table 7-5. Click Maintenance  Troubleshooting  Ping in the navigation menu. Click Refresh to display the latest information from the router.

Specify the size of the ping packet to send.0. Rx = 0 Min/Max/Avg RTT = 0/0/0 msec” TraceRoute You can use the TraceRoute utility to discover the paths that a packet takes to a remote destination. Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch. Rx = x Min/Max/Avg RTT = x/x/x msec” If a reply to the ping is not received. Ping Fields Field IP Address Count Interval Size Ping Description Specify the IP address. Specify the number of pings to send.GS716Tv2 and GS724Tv3 Software Administration Manual Table 7-6. Click Maintenance  Troubleshooting  TraceRoute in the navigation tree. Tx = x. Click Apply to send the ping. The valid range is 1–60. • • If successful. The valid range is 0–65507. you will see “Reply From IP/Host: icmp_seq = 0. 3. Tx = x. Specify the number of seconds between pings sent. Displays the results of the ping. July 2009 Maintenance . time = xx usec. To display this page: 1. The switch will send the number of pings configured and the results will be displayed below the configurable data. you will see “Reply From IP/Host: Destination Unreachable. The valid range is 1–15. 7-14 v1. 2.

TraceRoute Fields Field IP Address Probes Per Hop MaxTTL InitTTL MaxFail Interval Port Size TraceRoute Definition Specify the IP address. Displays the output from a traceroute. Enter the maximum time-to-live for a packet in number of hops. Click Apply to initiate the traceroute. The valid range is 1–255. The valid range is 1–60. The valid range is 0–65507. Enter the number of times each hop should be probed. The valid range is 1–10.0. 2. The valid range is 0– 255. Enter the maximum number of failures allowed in the session. The valid range is 0–255. Enter the UDP destination port in probe packets.GS716Tv2 and GS724Tv3 Software Administration Manual Figure 7-9 Table 7-7. Maintenance v1. The valid range is 1–65535. Enter the time between probes in seconds. Enter the initial time-to-live for a packet in number of hops. 3. Enter the size of probe packets. The results display in the TraceRoute box. July 2009 7-15 . Click Cancel to cancel the operation on the screen and reset the data on the screen to the latest value of the switch.

July 2009 Maintenance .GS716Tv2 and GS724Tv3 Software Administration Manual 7-16 v1.0.

IEEE 802.1D.Appendix A Hardware Specifications and Default Values GS7xxT Gigabit Smart Switch Specifications The GS7xxT Gigabit Smart Switch conforms to the TCP/IP. HTTP.0. ICMP. GS7xxT Gigabit Smart Switch Specifications Feature Interfaces PoE Flash memory size SRAM size and type Value 14G + 2 Combo G ports with SFP on GS716T 22G + 2 Combo G ports with SFP on GS724T N/A 16 MB 64 MB DDR Table A-2.1p.810 pps/ 1G:1. TFTP.000 pps 8K Max support 1.5 MB buffer memory Power consumption savings by cable length (>10m) MAC addresses MAC buffer memory size Green Ethernet A-1 v1. IEEE 802. Table A-1. and IEEE 802.1Q standards.880 pps/ 100M:148. Switch Performance Feature Switching capacity Forwarding method Packet forwarding rate Value Non-Blocking Full WireSpeed on all packet sizes Store and Forward 10M:14. DHCP. UDP.488. July 2009 .

Quality Of Service Feature Number of queues Port based 802.1p DSCP Rate limiting Auto-QoS Sets Supported 4 N/A 1 1 16 on GS716T/ 24 on GS724T (per port) 16 on GS716T/ 24 on GS724T (per port) Default N/A N/A Enabled Disabled Disabled Disabled A-2 Hardware Specifications and Default Values v1. July 2009 .0. Port Characteristics Feature Auto negotiation/static speed/ duplex Auto MDI/MDIX 802.3x flow control/back pressure Port mirroring Port trunking (aggregation) 802.1s spanning tree Static 802.GS716Tv2 and GS724Tv3 Software Administration Manual GS7xxTR Gigabit Smart Switch Features and Defaults Table A-3.1Q tagging Sets Supported 16 on GS716T/ 24 on GS724T (per port) N/A 1 (per system) 1 6 1 1 3 instances 2 Port Trunking on GS716T/ 4 Port Trunking on GS724T Supports Static and dynamic MAC entries Default Auto negotiation Enabled Disabled Disabled Pre-configured Disabled Disabled Disabled VID = 1MemberPorts = [1–n] n = 16 on GS716T 24 on GS724T Dynamic learning is enabled by default Learning process Table A-4.1w RSTP 802.1D spanning tree 802.

0.168.GS716Tv2 and GS724Tv3 Software Administration Manual Table A-5. System Setup Feature Boot code update DHCP/manual IP System name configuration Configuration save/restore Firmware upgrade Restore defaults Dual image support Factory reset Sets Supported 1 1 1 1 1 1 (Web and front-panel button) 1 1 Default N/A 192.1x MAC ACL IP access list Password control access Management security Sets Supported 16 on GS716T/ 24 on GS724T (per port) 100 (Shared with IP ACL) 100 (shared with MACACL) 1 1 profile with 20 rules for HTTP/ HTTPS/SNMP access to allow/ deny an IP address/subnet 16 on GS716T/ 24 on GS724T (per port) Default Disabled All MAC addresses allowed All IP addresses allowed Idle timeout = 5 mins.0. Security Feature 802. Traffic Control Feature Storm control Jumbo frame Sets Supported 16 on GS716T/ 24 on GS724T (per port) 16 on GS716T/ 24 on GS724T (per port) Default Disabled Disabled Table A-7.239 NULL N/A N/A N/A Enabled N/A Hardware Specifications and Default Values v1. July 2009 A-3 . Password = “password” All IP addresses allowed Port MAC lock down Disabled Table A-6.

July 2009 .GS716Tv2 and GS724Tv3 Software Administration Manual Table A-8. Other Features Feature IGMP snooping v1/v2 Configurations upload/download EAPoL flooding BPDU flooding Static multicast groups Filter multicast control Sets Supported 16 on GS716T/ 24 on GS724T (per port) 1 16 on GS716T/ 24 on GS724T (per port) 16 on GS716T/ 24 on GS724T (per port) 8 1 Default Disabled N/A Disabled Disabled Disabled Disabled A-4 Hardware Specifications and Default Values v1.0.

Routers connect LANs together.Appendix B Configuration Examples This chapter contains information about how to configure the following features: • • • • • “Virtual Local Area Networks (VLANs)” on page B-1 “Access Control Lists (ACLs)” on page B-4 “Access Control Lists (ACLs)” on page B-4 “802. type of user. A virtual LAN (VLAN) is a local area network with a definition that maps workstations on some basis other than geographic location (for example. routing the traffic to the appropriate port. B-1 v1. Yet if they are all assigned to a single VLAN. depending on how the IT manager has set up the VLANs. bridges. For example. July 2009 . accessible to all. A VLAN is a group of PCs. traffic must go through a router.1X” on page B-8 “MSTP” on page B-11 Virtual Local Area Networks (VLANs) A local area network (LAN) can generally be defined as a broadcast domain. The resources of other departments can be invisible to the marketing VLAN members. Hubs. To enable traffic to flow between VLANs. or accessible only to specified individuals. or primary application). and other network resources that behave as if they were connected to a single network segment—even though they might not be. End nodes can communicate with each other without the need for a router. by department. or switches in the same physical segment or segments connect all end node devices. all marketing personnel might be spread throughout a building.0. just as if the VLANs were on two separate LANs. servers. they can share resources and bandwidth as if they were connected to the same segment.

VLANs free up bandwidth by limiting node-to-node and broadcast traffic throughout the network. router-based security measures can be used to restrict access to each VLAN. it is automatically tagged with the port’s default VLAN ID tag number.GS716Tv2 and GS724Tv3 Software Administration Manual VLANs have a number of advantages: • It is easy to do network segmentation. the packet is dropped. VLANs create virtual boundaries that can be crossed only through a router. regardless of physical location. They are easy to manage. the tag for that packet is unaffected by the default VLAN ID setting. a T for a given port means that packets leaving the switch from that port are tagged with the VLAN ID that is associated with the port. The default VLAN ID setting for each port can be changed in the Port PVID Configuration screen. The packet proceeds to the VLAN specified by its VLAN ID tag number. They ensure enhanced network security. B-2 v1. Packets leaving the switch are either tagged or untagged. July 2009 Configuration Examples . They provide increased performance. See “Port VLAN ID Configuration” on page 3-14. can be dealt with quickly and conveniently from a management interface rather than from the wiring closet.0. Each group’s traffic is contained largely within the VLAN. The addition of nodes. • • • • The example given in this section comprises numerous steps to illustrate a wide range of configurations to help provide an understanding of tagged VLANs. Users that communicate most frequently with each other can be grouped into common VLANs. VLAN Example Configuration This example demonstrates several scenarios of VLAN use and describes how the switch handles tagged and untagged traffic. the packet can be sent to other ports with the same VLAN ID. A U for a given port means that packets leaving the switch from that port are untagged. reducing extraneous traffic and improving the efficiency of the whole network. If the port through which the packet entered does not have membership with the VLAN specified by the VLAN ID tag. depending on the setting for that port’s VLAN membership properties. Each port has a default VLAN ID setting that is user configurable (the default setting is 1). • • • Packets received by the switch are treated in the following way: • When an untagged packet enters a port. as well as moves and other changes. If the port is a member of the VLAN specified by the packet’s VLAN ID. So standard. Inversely. When a tagged packet enters a port.

• • Configuration Examples v1. and port 6 (U). 3. In the Basic VLAN Configuration screen (see “VLAN Configuration” on page 3-10). the switch tags it with VLAN ID 10. it is stripped of its tag to leave the switch as an untagged packet. With the VLAN configuration that you set up. A VLAN with VLAN ID 20. change the port membership for default VLAN 1. For the VLAN with VLAN ID 20. the outgoing packet leaves as a tagged packet with VLAN ID 20.GS716Tv2 and GS724Tv3 Software Administration Manual In this example. port 2 (U). the packet has access to port 1 and port 2. July 2009 B-3 . If an untagged packet enters port 4. For port 5. In the VLAN Membership screen (see “VLAN Membership Configuration” on page 3-12) specify the VLAN membership as follows: • • • For the default VLAN with VLAN ID 1. specify the following members: port 1 (U). specify the following members: port 4 (U). specify the following members: port 7 (U) and port 8 (U). If the packet leaves port 1 or port 2. and assign port members to the two new VLANs: 1. the switch tags it with VLAN ID 20. the outgoing packet leaves as a tagged packet with VLAN ID 10. specify the PVID for ports g1 and g4 so that packets entering these ports are tagged with the port VLAN ID: • • Port g1: PVID 10 Port g4: PVID 20 4. and port 3 (T). port 5 (T). In the Port PVID Configuration screen (see “Port VLAN ID Configuration” on page 3-14). For the VLAN with VLAN ID 10. If a tagged packet with VLAN ID 10 enters port 3. The packet has access to port 5 and port 6. you create two new VLANs. create the following VLANs: • • A VLAN with VLAN ID 10. The outgoing packet is stripped of its tag to leave port 2 as an untagged packet. 2. the following situations produce results as described: • If an untagged packet enters port 1.0. For port 3. The outgoing packet is stripped of its tag to become an untagged packet as it leaves port 6. The packet has access to port 2 and port 3.

The GS716T/GS724T switch supports MAC ACLs and IP ACLs. Access lists are a sequential collection of permit and deny conditions. The match criteria for MAC access lists can include the following information: • • • • • Source MAC address Destination MAC address EtherType VLAN ID COS The match criteria for IP access lists can include the following information: • • • • • • • Source IP address Destination IP address IP Protocol IP Precedence IP DSCP Layer 4 Source Port Layer 4 Destination Port Traffic filtering requires the following two basic steps: B-4 v1. ACL processing occurs at wire speed.0. That is. July 2009 Configuration Examples . decide which types of traffic are forwarded or blocked. The added packet processing required by the ACL feature does not affect switch performance. restrict contents of routing updates.GS716Tv2 and GS724Tv3 Software Administration Manual Access Control Lists (ACLs) ACLs ensure that only authorized users have access to specific resources while blocking off any unwarranted attempts to reach network resources. The forwarding or dropping of a packet is based on whether or not the packet matches the specified criteria. is applied to each packet that is processed by the switch or the router. such as the Internet. They can also be used on a router positioned between two parts of the network to control the traffic entering or exiting a specific part of the internal network. ACLs are used to provide traffic flow control. known as the filtering criteria. and provide security for the network. ACLs are normally used in firewall routers that are positioned between the internal network and an external network. This collection of conditions.

The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. and LAGs. Configuration Examples v1. Additionally. physical ports. GS716T/GS724T switches allow ACLs to be bound to VLANs. By default. 2. Create an access list definition. this ACL will be bound on the inbound direction. MAC ACL Example Configuration The following example shows how to create a MAC-based ACL that permits Ethernet traffic from the Sales department on specified ports and denies all other traffic on those ports. Apply the access list to an interface in the inbound direction. create an ACL with the name Sales_ACL for the Sales department of your network (See “MAC ACL” on page 5-40). see “MAC Rules” on page 5-42. A default deny all rule is the last rule of every list.0. Binding an ACL to a VLAN is efficient because you can bind an ACL to a single VLAN that has multiple ports as members instead of binding an ACL to each port. From the MAC Rules screen. you can assign traffic that matches the criteria to a particular queue or redirect the traffic to a particular port.GS716Tv2 and GS724Tv3 Software Administration Manual 1. create a rule for the Sales_ACL with the following settings: • • • • • • • • • • ID: 1 Action: Permit Assign Queue: 0 Match Every: False CoS: 0 Destination MAC: 01:02:1A:BC:DE:EF Destination MAC Mask: FF:FF:FF:FF:00:00 Source MAC: 02:02:1A:BC:DE:EF Source MAC Mask: FF:FF:FF:FF:00:00 VLAN ID: 2 For more information about MAC ACL rules. 1. 2. From the MAC ACL screen. July 2009 B-5 . which means the switch will examine traffic as it enters the port.

All other traffic is explicitly denied on these interfaces. 8. Figure B-1 You can assign an optional sequence number to indicate the order of this access list relative to other access lists if any are already assigned to this interface and direction. and 10 and are assigned to the hardware egress queue 0. Traffic from the Finance department is identified by each packet’s network IP address. Standard IP ACL Example Configuration The following example shows how to create an IP-based ACL that prevents any IP traffic from the Finance department to be allowed on the ports that are associated with other departments. Also. you must add a new permit rule with the desired match criteria and bind the rule to interfaces 6. which is the default queue. and 10. the frame must be tagged with VLAN ID 2. which is the default value for Ethernet frames. The CoS value of the frame must be 0. To allow additional traffic to enter these ports. and 10. which is the Sales department VLAN. assign the Sales_ACL to the interface gigabit ports 6. From the MAC Binding Configuration screen. The ACL named Sales_ACL looks for Ethernet frames with destination and source MAC addresses and MAC masks defined in the rule. and then click Apply (See “MAC Binding Configuration” on page 5-44). 8. 4.GS716Tv2 and GS724Tv3 Software Administration Manual 3. 9. Frames that match this criteria are permitted on interfaces 6. 7. 8. 9. The MAC Binding Table displays the interface and MAC ACL binding information (See “MAC Binding Table” on page 5-45).0. July 2009 Configuration Examples . 7. 7. 9. B-6 v1.

4. 19. From the IP ACL screen.GS716Tv2 and GS724Tv3 Software Administration Manual 1. Use the IP Binding Table screen to view the interfaces and IP ACL binding information (See “IP Binding Table” on page 5-56). 7. 3. 10.0 is the default value) Match Every: False Source IP Address: 192. From the IP Rules screen. see “IP Rules” on page 5-48. assign ACL ID 2 to the interface gigabit ports 14. this IP ACL is bound on the inbound direction. Configuration Examples v1. 16.255. 9. 8. From the IP Binding Configuration page. Click Add. From the IP Binding Configuration page. and assign a sequence number of 1 (See “IP Binding Configuration” on page 5-54). By default. 15. 17. Click Apply. 6. Click Add. 18. so it examines traffic as it enters the switch. 2.255. 16.0. From the IP Rules screen. 19. 17.187. create a rule for IP ACL 2 with the following settings: • • • Rule ID: 2 Action: Permit Match Every: True 5. Click Apply. July 2009 B-7 . and 20. create a rule for IP ACL 1 with the following settings: • • • • • • Rule ID: 1 Action: Deny Assign Queue ID: 0 (optional .0 For more information about IP ACL rules.0 Source IP Mask: 255.168. 18. and assign a sequence number of 2. 15. assign ACL ID 1 to the interface gigabit ports 14. and 20. create a new IP ACL with an IP ACL ID of 1 (See “IP ACL” on page 5-47).

it may be desirable to restrict access to the services offered by the LAN to those users and devices that are permitted to use those services.0. as well as between the authenticator and the authentication server. In this context. or permit unauthorized users to attempt to access the LAN through equipment already attached.1X feature is the ability to configure a port to Enable/Disable EAPoL packet forwarding support.1X Local Area Networks (LANs) are often deployed in environments that permit unauthorized devices to be physically attached to the LAN infrastructure. Another 802.GS716Tv2 and GS724Tv3 Software Administration Manual The IP ACL in this example matches all packets with the source IP address and subnet mask of the Finance department's network and deny it on the Ethernet interfaces 14. 17. and 20 of the switch. 16. 18.11 Wireless LANs. which allows unauthenticated users to have limited access to the network resources. 15. The GS716T/GS724T switch supports a guest VLAN. The second rule permits all non-Finance traffic on the ports. 802.11 standard describes an architectural framework within which authentication and consequent actions take place.You can disable or enable the forwarding of EAPoL when 802.1X is disabled on the device. The second rule is required because there is an explicit deny all rule as the lowest priority rule. Note: You can use QoS features to provide rate limiting on the guest VLAN to limit the network resources the guest VLAN provides. B-8 v1. Port-based network access control makes use of the physical characteristics of LAN infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics and of preventing access to that port in cases in which the authentication and authorization process fails. July 2009 Configuration Examples . such as ports of MAC bridges and associations between stations or access points in IEEE 802. a port is a single point of attachment to the LAN. It also establishes the requirements for a protocol between the authenticator (the system that passes an authentication request to the authentication server) and the supplicant (the system that requests authentication). 19. The IEEE 802. In such environments.

2.GS716Tv2 and GS724Tv3 Software Administration Manual The ports of an 802. The Authenticator PAE controls the authorized/unauthorized state of the controlled Port depending on the outcome of the authentication process. The Authenticator PAE is also responsible for submitting the information received from the Supplicant to the Authentication Server in order for the credentials to be checked. July 2009 B-9 .1X authenticator switch provide the means in which it can offer services to other systems reachable via the LAN. which will determine the authorization state of the Port. Supplicant: A Port that attempts to access services offered by the Authenticator. GS716T/GS724T switches support the Authenticator role only. Authenticator: A Port that enforces authentication before allowing access to services available via that Port. Port-based network access control allows the operation of a switch’s ports to be controlled in order to ensure that access to its services is only permitted by systems that are authorized to do so. Control over the access to a switch and the LAN to which it is connected can be desirable in order to restrict access to publicly accessible bridge ports or to restrict access to departmental LANs. Configuration Examples v1. All three roles are required in order to complete an authentication exchange. Port access control provides a means of preventing unauthorized access by supplicants to the services offered by a system. A Port Access Entity (PAE) is able to adopt one of two distinct roles within an access control interaction: 1. Authentication server: Performs the authentication function necessary to check the credentials of the Supplicant on behalf of the Authenticator.0. Access control is achieved by enforcing authentication of supplicants that are attached to an authenticator's controlled ports. there exists a third role: 3. such as Local and/or RADIUS. Additionally. in which the PAE is responsible for communicating with the Supplicant. The result of the authentication process determines whether the supplicant is authorized to access services on that controlled port.

g23. and g24.23 Supplicant Figure B-2 802. This example assumes that a VLAN has been configured with a VLAN ID of 150 and VLAN Name of Guest. In the Guest VLAN field for ports g21–g24. You can configure additional settings to control access to the network through the ports. the authenticator PAE sets the controlled port mode 3. select Unauthorized.GS716Tv2 and GS724Tv3 Software Administration Manual Supplicant Authenticator Switch Authentication Server (RADIUS) 192. and then click Apply (See “Port Security Configuration” on page 5-34). the port is unconditionally put in a force-Authorized state and does not require any authentication. enter 150 to assign these ports to the guest VLAN. 2. When the Port Control setting is Authorized. B-10 v1. 4. From the 802.1X-based authentication is required on the ports in a corporate conference room (g21–g24). set the Port Based Authentication State and Guest VLAN Mode to Enable. When the visitor is successfully authenticated.1X Example Configuration This example shows how to configure the switch so that 802. Click Apply.0. See “Port Security Interface Configuration” on page 5-35 for information about the settings.10. From the Port Authentication screen. From the Port Control menu. select ports g21. The Port Control setting for all other ports where authentication is not needed should be Auto or Authorized. g22. The authentication is handled by an external RADIUS server.168. traffic is automatically assigned to the guest VLAN. 5. July 2009 Configuration Examples .1X Configuration screen. These ports are available to visitors and need to be authenticated before granting access to the network. 1. When the Port Control setting is Auto.

configure the default List to use RADIUS as the first authentication method (See “Authentication List Configuration” on page 5-13). These features are represented by the parameters pointtopoint and edgeport.1d. If a bridge loop occurs. 7.168. IEEE 802. the EAPOL Flood Mode field allows you to enable the forwarding of EAPoL frames when 802. see “RADIUS Configuration” on page 5-3. Click Add. but there are several additional settings that you can configure.1s bridge inherently also supports IEEE 802.0. configure a RADIUS server with the following settings: • • • • Server Address: 192. July 2009 B-11 . the network can become flooded with traffic. The difference between the RSTP and the traditional STP (IEEE 802.10. So. 8. Rapid Spanning Tree. A MSTP bridge can be configured to behave entirely as a RSTP bridge or a STP bridge.GS716Tv2 and GS724Tv3 Software Administration Manual This example uses the default values for the port authentication settings. The switch passes the authentication information to the configured RADIUS server. For example. The RADIUS server must be configured to allow access on the Guest VLAN. 6.1d) is the ability to configure and recognize full duplex connectivity and ports that are connected to end stations. Each instance of the Spanning Tree behaves in the manner specified in IEEE 802. From the Authentication List screen.1w and IEEE 802. resulting in rapid transitioning of the port to the Forwarding state and the suppression of Topology Change Notification.23 Secret Configured: Yes Secret: secret123 Active: Primary For more information.1X is disabled on the device. It behaves appropriately to STP and RSTP bridges. Configuration Examples v1.1X-based authentication. From the RADIUS Server Configuration screen. This example enables 802. MSTP is compatible to both RSTP and STP. an IEEE 802.1X-based port security on the GS716T/GS724T switch and prompts the hosts connected on ports g21-g24 for a 802.1s Multiple Spanning Tree Protocol (MSTP) supports multiple instances of Spanning Tree to efficiently channel VLAN traffic over different interfaces.1w. with slight modifications in the working but not the end effect (chief among the effects is the rapid transitioning of the port to the Forwarding state). MSTP Spanning Tree Protocol (STP) runs on bridged networks to help eliminate loops.

An MST Region comprises of one or more MSTP Bridges with the same MST Configuration Identifier. whether they use STP. B-12 v1. Configuration Revision Level 4. [IEEE DRAFT P802. using the same MSTIs. July 2009 Configuration Examples . and an Internal Spanning Tree (IST) within each Region. STP or RSTP.16-byte signature of type HMAC-MD5 created from the MST Configuration Table (a VLAN ID to MSTID mapping) As there are Multiple Instances of Spanning Tree. The stable active topology of the Bridged LAN with respect to frames consistently classified as belonging to any given VLAN thus simply and fully connects all LANs and networking devices throughout the network. within Multiple Spanning Tree (MST) Regions composed of LANs and or MSTP Bridges. each operating MSTP. Configuration Name 3.g. each based on an independent Multiple Spanning Tree Instance (MSTI).0.as any VLAN can be in one and only one MSTI or CIST). The port states have changed since IEEE 802.. MSTP ensures that frames with a given VLAN ID are assigned to one and only one of the MSTIs or the IST within the Region. though frames belonging to different VLANs can take different paths within any Region.GS716Tv2 and GS724Tv3 Software Administration Manual The MSTP algorithm and protocol provides simple and full connectivity for frames assigned to any given VLAN throughout a Bridged LAN comprising arbitrarily interconnected networking devices. and which have no Bridges attached that cannot receive and transmit MSTP BPDUs. per-instance basis (or on a per port per VLAN basis . Configuration Identifier Format Selector 2. there is a MSTP state maintained on a per-port. send information in configuration messages via Bridge Protocol Data Units (BPDUs) to assign port roles that determine each port’s participation in a fully and simply connected active topology based on one or more spanning trees.1s/D13] MSTP connects all Bridges and LANs with a single Common and Internal Spanning Tree (CIST).1s/D13] All bridges. MSTP allows frames assigned to different VLANs to follow separate paths. Configuration Digest . The information communicated is known as the spanning tree priority vector. choosing its maximum possible extent.1d specification. The connectivity calculated for the CIST provides the CST for interconnecting these Regions. that the assignment is consistent among all the networking devices in the Region and that the stable connectivity of each MSTI and IST at the boundary of the Region matches that of the CST. These Regions and the other Bridges and LANs are connected into a single Common Spanning Tree (CST). The MST Configuration Identifier has the following components: 1. The BPDU structure for each of these different protocols is different. RSTP or MSTP. The CIST supports the automatic determination of each MST region. A MSTP bridge will transmit the appropriate BPDU depending on the received type of BPDU from a particular port. port A can be forwarding for instance 1 while discarding for instance 2. For e. [IEEE DRAFT P802.

The combination of VID to FID and then FID to MSTI allocation defines a mapping of VIDs to spanning tree instances. 2 and 3. so those links are not subject to network loops. Ensuring that the allocation of VIDs to FIDs is unambiguous.0. With this allocation we ensure that every VLAN is assigned to one and only one MSTI. The CIST is also an instance of spanning tree with a MSTID of 0. but every VLAN must be allocated to one of the other instances of spanning tree. a MSTP bridge has to be configured with an unambiguous assignment of VLAN IDs (VIDs) to spanning trees. 2. ports g1–g5 are connected to host stations. in other words connectivity within the region is independent of external connectivity. An instance may occur that has no VIDs allocated to it. The example network has three different GS716T/GS724T switches that serve different locations in the network. represented by the MST Configuration Table. Configuration Examples v1. and never Bridges of any kind outside the Region. Ports g6-g10 are connected across switches 1. MSTP Example Configuration This example shows how to create an MSTP instance from the GS716T/GS724T switch. The portion of the active topology of the network that connects any two bridges in the same MST Region traverses only MST bridges and LANs in that region. Ensuring that each FID supported by the Bridge is allocated to exactly one Spanning Tree Instance.GS716Tv2 and GS724Tv3 Software Administration Manual To support multiple spanning trees. In this example. July 2009 B-13 . This is achieved by: 1.

4. By default. the STP Operation Mode is MSTP and the Configuration Name is the switch MAC address.0. From the STP Configuration screen. 3. July 2009 Switch 1: 4096 Switch 2: 12288 Switch 3: 20480 Configuration Examples . set the Bridge Priority value for each of the three switches to force Switch 1 to be the root bridge: • • • B-14 v1. From the CST Configuration screen. enable the Spanning Tree State option (see “STP Switch Configuration/Status” on page 3-17). Use the VLAN Configuration screen to create VLANs 300 and 500 (see “VLAN Configuration” on page 3-10). 2.GS716Tv2 and GS724Tv3 Software Administration Manual Ports g1-g5 Connected to Hosts Ports g1-g5 Connected to Hosts Ports g6-g10 Connected to Switch 2 and 3 Switch 1 Root Bridge Switch 2 Ports g6-g10 Connected to Switch 1 and 2 Switch 3 Ports g1-g5 Connected to Hosts Ports g6-g10 Connected to Switch 1 and 3 Figure B-3 Perform the following procedures on each switch to configure MSTP: 1. Use the VLAN Membership screen to include ports g1–g10 and ports g15–g24 as tagged (T) or untagged (U) members of VLAN 300 and VLAN 500 (see “VLAN Membership Configuration” on page 3-12). Use the default values for the rest of the STP configuration settings.

ports with Fast Link enabled transition directly to the Forwarding state. 10. You can use the CST Port Status screen to view spanning tree information about each port. Since the edge ports are not at risk for network loops. Click Apply.GS716Tv2 and GS724Tv3 Software Administration Manual Note: Bridge priority values are multiples of 4096. 9. and select Enable from the Fast Link menu. select ports g1–g10 and g15–g24 and select Enable from the STP Status menu (see “CST Port Configuration” on page 3-21). Click Add. 8. Select ports g1–g5 (edge ports). From the CST Port Configuration screen. see “MST Configuration” on page 3-26. Create a second MST instance with the following settings • • • MST ID: 2 Priority: 49152 VLAN ID: 500 12. Switches 1 and 2 Configuration Examples v1. Click Add. July 2009 B-15 . In this example.0. From the MST Configuration screen. Click Apply. 6. and Switch 2 has become the Root bridge for MST instance 2. 5. create a MST instances with the following settings: • • • MST ID: 1 Priority: Use the default (32768) VLAN ID: 300 For more information. If you do not specify a root bridge and all switches have the same Bridge Priority value. the switch with the lowest MAC address is elected as the root bridge (see “CST Configuration” on page 3-19). g2 and g3) and in the HR department (ports g4 and g5). Switch 3 has hosts in the Sales department (ports g1. assume that Switch 1 has become the Root bridge for the MST instance 1. 7. 11.

MST instance 1 to communicate with the hosts on Switch 3 directly. The hosts use different instances of MSTP to effectively use the links across the switch. B-16 v1. MST instance 2 to communicate with the hosts on Switch 3 directly. The same concept can be extended to other switches and more instances of MSTP.GS716Tv2 and GS724Tv3 Software Administration Manual also have hosts in the Sales and HR departments. July 2009 Configuration Examples . The hosts connected from Switch 2 use VLAN 500. Likewise. hosts of Switch 1 use VLAN 300.0.

6-20 Default Gateway 2-4 defaults A-1 CoS B-6 factory 5-2 DES 1-15 Device View 1-13 DoS 2-13 download a file 7-8 files via HTTP 7-6 from a remote system 7-5 software 7-6 Index-1 v1. 6-20 authentication enable 1-15 C Certificate 5-18 Changing the password 5-2 Configuration 802.1X 5-23 Access Control Lists 5-39 Access Profile 5-19 Access Rule 5-21 Authentication List 5-13 Community 2-17 CoS 4-2 Dual Image 7-10 Dynamic Address 3-49 Global 3-32 Green Ethernet 2-15 HTTP 5-15 IGMP Snooping 3-32 LACP 3-8 LACP Port 3-9 LAG 3-5 LLDP 2-23 MAC Filter 5-30 Management Access 5-15 MST Port 3-27 Network Settings on the Administrative System 1-6 password 5-2 Port Security 5-34 Port VLAN ID 3-14 QoS 4-1 RADIUS 5-3 Global 5-3 Secure HTTP 5-16 SNMP v3 User 2-21 SNTP Server 2-10 Standard IP ACL Example B-6 STP 3-16 TACACS+ 5-10 Time 2-6 Trap 2-19 VLAN 3-10 VLAN example B-2 VLAN Port Membership 3-12 CoS 4-2 Critical 6-18.0. 6-20 Customer support 1-ii D Debug 6-18.GS716Tv2 and GS724Tv3 Software Administration Manual Index A Alert 6-18. July 2009 .

1Q 3-10. 3-3.1s 3-17. 3-32 ACL 5-40 Address Table 3-50 bridge identifier 3-27 CPU Management Interface 1-16 Dynamic Address 3-49 Filter Summary 5-32 MFDB Table 3-37 multicast destination 3-35 Rules 5-42 Searching Address Table 3-47 Static Address 3-52 Management VLAN ID 2-4 MD5 2-5 MIBs 1-15 I ICMP 2-13 IEEE 802.1w 3-16.11x B-8 IEEE 802.1X 5-3 IEEE 802.1AB 2-23 IEEE 802. 6-20 Interface Queue Configuration 4-5 IP DSCP 4-2 Mapping 4-8 ipaddr 1-15 L LACP Port Configuration 3-9 System Priority 3-8 LAG interface 3-5 LAG VLAN 3-5 LAGPDUs 3-5 LAGs 3-5 Membership 3-7 Static 3-5 LLDP 2-23 Local Information 2-27 Neighbors Information 2-30 Port Settings 2-24 F file management 7-10 firmware upgrade 1-7 G getting started 1-1 Green Ethernet 2-15 H Help HTML-based 1-12 HTML 1-11 HTTP 5-15 over an encrypted Secure Sockets Layer 5-16 Secure 5-15 HTTP File Download 7-8 M MAC 2-2. 3-49 IEEE 802.GS716Tv2 and GS724Tv3 Software Administration Manual Dual Image Status 7-12 E EAP 6-12 EAPOL 6-13 Emergency 6-18. 3-24. 2-29. 6-20 Index-2 N Notice 6-18.3 flow control 3-4 IEEE 802. July 2009 . 3-15. 3-17 IEEE 802.1d 3-16. 3-18 IEEE 802. 3-18. 6-20 Error 6-18. 3-18 IEEE 802. 3-16.3x 3-4 IGMP 3-32 Informational 6-18. 6-20 v1.0.1p 3-16 IEEE 802.

1p to Queue Mapping 4-6 R RADIUS 5-1 authentication port 5-8 authentication server 5-6 server 5-3 registering 1-ii Reset 7-1 button 5-2 Configuration to Defaults 7-2 Password 5-2 Switch 7-1 RSTP 3-16 Utilities 1-6 utility 1-2 SNMP using 1-14 V1/V2 2-16 v3 2-21 SNTP 2-5 Global Status 2-8 Server Configuration 2-10 Server Status 2-11 Specifications A-1 SSL 5-16 status HTML pages 1-11 storm control 5-33 STP 3-16 Status 3-17 Stratum 0 2-5 1 2-5 2 2-5 Support 1-ii T T1 2-5 T2 2-5 T3 2-5 T4 2-5 TACACS+ 5-11 folder 5-10 settings 5-10 Technical Support 1-ii TFTP 1-7 Time 2-5 Clock Source 2-7 configure through SNTP 2-7 Date 2-7 GMT 2-8 levels 2-5 Index-3 v1.GS716Tv2 and GS724Tv3 Software Administration Manual P password change 5-2 login 5-2 new 5-2 reset 5-2 Ping 7-13 port authentication 5-22 summary 5-28 Profiles 5-13 Q QoS 4-1 802.0. July 2009 S Security MAC Address 5-37 server HTTP 5-15 Simple Network Time Protocol 2-5 slot/port 1-16 SmartWizard Discovery in a Network with a DHCP Server 1-3 in a Network without a DHCP Server 14 .

July 2009 . 6-20 Web interface panel 1-11 U Unicast 2-5 upload a file 7-5 Index-4 v1.0.GS716Tv2 and GS724Tv3 Software Administration Manual Local 2-6 UTC 2-7 Zone 2-6 Time Zone 2-8 TraceRoute 7-14 Traffic Control 5-30 Trap Flags 2-20 Manager 2-20 upload configuration 7-3 V VLAN 3-10 ID 3-10 managing 3-10 Port VLAN ID 3-14 W Warning 6-18.