Extreme Networks, Inc.3585 Monroe StreetSanta Clara, California 95051(888) 257-3000http://www.extremenetworks.com Summit 300-48 Switch Software User G
10 Summit 300-48 Switch Software User Guide ContentsAppendix C Software Upgrade and Boot OptionsDownloading a New Image 215Rebooting the Switch 216Sav
100 Summit 300-48 Switch Software User GuideUnified Access SecuritySupplicant SideOn the client or supplicant side, the only platform that natively s
Network LoginSummit 300-48 Switch Software User Guide 101with connections to DNS, WINS servers, and network routers. For wired network login, VLAN te
102 Summit 300-48 Switch Software User GuideUnified Access Securitycreate vlan wlan-mgmt# Configure the wireless network.configure vlan wlan-mgmt ipa
Network LoginSummit 300-48 Switch Software User Guide 103session-Timeout = 60 (timeout for 802.1x reauthentication)Extreme:Extreme-Netlogin-Only = En
104 Summit 300-48 Switch Software User GuideUnified Access Security• After successful authentication, the connection information configured on the RA
Network LoginSummit 300-48 Switch Software User Guide 105URL redirection requires the switch to be assigned a DNS name. The default name is network-a
106 Summit 300-48 Switch Software User GuideUnified Access SecurityDisplaying Network Login SettingsTo display network login settings, use the follow
MAC RADIUSSummit 300-48 Switch Software User Guide 107Wireless Network Login ConsiderationsAs an authentication framework, network login is equivalen
108 Summit 300-48 Switch Software User GuideUnified Access Security• Make the network infrastructure as secure as possible.• Be able to track and ide
Network Security Policies for Wireless InterfacesSummit 300-48 Switch Software User Guide 109Policy ExamplesThe following examples suggest typical us
Summit 300-48 Switch Software User Guide 11 Figures1 Example of a port-based VLAN on the Summit 300-48 switch 662 Single port-based VLAN spanning two
110 Summit 300-48 Switch Software User GuideUnified Access SecurityVendor-Specific AttributesTable 49 lists the supported vendor-specific attributes
CLI Commands for Security on the SwitchSummit 300-48 Switch Software User Guide 111CLI Commands for Security on the SwitchSecurity Profile CommandsTa
112 Summit 300-48 Switch Software User GuideUnified Access Securityess-name Sets the name of the wireless network for the 802.11 interface associated
Secure Web Login AccessSummit 300-48 Switch Software User Guide 113Secure Web Login Access The existing web server in Extremeware allows HTTP clients
114 Summit 300-48 Switch Software User GuideUnified Access SecurityCreating Certificates and Private KeyA default certificate and private key are sto
Example Wireless Configuration ProcessesSummit 300-48 Switch Software User Guide 115Example Wireless Configuration ProcessesThis section provides exa
116 Summit 300-48 Switch Software User GuideUnified Access Security2 Remove the wireless port from the default VLAN.config vlan default delete ports
Example Wireless Configuration ProcessesSummit 300-48 Switch Software User Guide 117indicated in the parameter or into the VLAN indicated by a Vendor
118 Summit 300-48 Switch Software User GuideUnified Access SecurityNOTEIf you attach this security-profile to a port before configure at least 1 WEP
Example Wireless Configuration ProcessesSummit 300-48 Switch Software User Guide 119NOTEIf you enter the wrong number of characters for the code, a m
12 Summit 300-48 Switch Software User Guide Figures
120 Summit 300-48 Switch Software User GuideUnified Access Securityconfig security-profile web-based-64 dot11-auth open network-auth web-based encryp
Example Wireless Configuration ProcessesSummit 300-48 Switch Software User Guide 121Open - MAC Radius - None1 Create a security profile (mac-radius-o
122 Summit 300-48 Switch Software User GuideUnified Access Securityconfig security-profile mac-radius-64 wep default-key-index 08 Configure the name
Example Wireless Configuration ProcessesSummit 300-48 Switch Software User Guide 1235 Configure the Dot11 Authentication, Network Authentication and
124 Summit 300-48 Switch Software User GuideUnified Access Securityconfig security-profile open-wpa-64 ess-name open-wpa-64-essOpen - WPA (Dynamic) -
Example Wireless Configuration ProcessesSummit 300-48 Switch Software User Guide 1252 Create a VLAN (wpa-vlan) for the potential clients that will co
126 Summit 300-48 Switch Software User GuideUnified Access Security3 Configure the tag for the wpa-vlanconfig vlan wpa-vlan tag 104 Add the wireless
Example Wireless Configuration ProcessesSummit 300-48 Switch Software User Guide 1272 Create a VLAN (wpa-vlan) for the potential clients that will co
128 Summit 300-48 Switch Software User GuideUnified Access Securityconfig security-profile shared-none-64 wep default-key-index 08 Configure the name
Example Wireless Configuration ProcessesSummit 300-48 Switch Software User Guide 129config vlan web-vlan add ports 1:5 tagged5 Configure the Dot11 Au
Summit 300-48 Switch Software User Guide 13 Ta bl es1 Notice Icons 172 Text Conventions 183 ExtremeWare Summit 300-48 Factory Defaults 224 Command Syn
130 Summit 300-48 Switch Software User GuideUnified Access Securityconfig security-profile shared-web-128 wep default-key-index 08 Configure the name
Example Wireless Configuration ProcessesSummit 300-48 Switch Software User Guide 131config vlan mac-vlan add ports 1:5 tagged5 Configure the Dot11 Au
132 Summit 300-48 Switch Software User GuideUnified Access Security
Summit 300-48 Switch Software User Guide 133 8 Power Over EthernetThis chapter explains how to configure the Summit 300-48 switch to supply power to d
134 Summit 300-48 Switch Software User GuidePower Over EthernetPort Power ManagementWhen you connect PDs, the Summit 300-48 switch automatically disc
Port Power ManagementSummit 300-48 Switch Software User Guide 135Common Power PoolThe common power pool represents the total amount of power availabl
136 Summit 300-48 Switch Software User GuidePower Over Ethernetoverall system limit is reached, additional PoE ports are powered based on the system
Port Power ManagementSummit 300-48 Switch Software User Guide 137Ports are powered based upon their priority and discovery time. Higher priority port
138 Summit 300-48 Switch Software User GuidePower Over EthernetThe total power used by all PoE devices must not exceed the total available inline pow
Per-Port LEDsSummit 300-48 Switch Software User Guide 139If there are an excessive number of power supply failures (five or more within a five minute
14 Summit 300-48 Switch Software User Guide Ta bl es34 Client Aging Configuration Command 8735 Switch-Level Wireless Configuration Commands 8736 Switc
140 Summit 300-48 Switch Software User GuidePower Over Ethernetenable inline-power slot <slotid> Enables PoE support for the power supply in th
Configuring Power Over EthernetSummit 300-48 Switch Software User Guide 141config inline-power violation-precedence [advertised-class | operator-limi
142 Summit 300-48 Switch Software User GuidePower Over Ethernetshow inline-power stats slot <slotlist> Provides inline power statistics for the
Summit 300-48 Switch Software User Guide 143 9 Forwarding Database (FDB)This chapter describes the following topics:• Overview of the FDB on page 143•
144 Summit 300-48 Switch Software User GuideForwarding Database (FDB)interface are stored as permanent. The Summit 300-48 switches support a maximum
Configuring FDB EntriesSummit 300-48 Switch Software User Guide 145Configuring FDB EntriesTo configure entries in the FDB, use the commands listed in
146 Summit 300-48 Switch Software User GuideForwarding Database (FDB)FDB Configuration ExamplesThe following example adds a permanent entry to the FD
Summit 300-48 Switch Software User Guide 147 10 Access PoliciesThis chapter describes the following topics:• Overview of Access Policies on page 147•
148 Summit 300-48 Switch Software User GuideAccess Policiesshared multiple access control lists, using different lists of values to examine packets.
Using Access Control ListsSummit 300-48 Switch Software User Guide 149Rate LimitsEach entry that makes up a rate limit contains a unique name and spe
Summit 300-48 Switch Software User Guide 15 Ta bl es80 Basic IP Commands 19881 Route Table Configuration Commands 19982 ICMP Configuration Commands 20
150 Summit 300-48 Switch Software User GuideAccess PoliciesAccess Mask Precedence NumbersThe access mask precedence number is optional, and determine
Using Access Control ListsSummit 300-48 Switch Software User Guide 151The permit-established KeywordThe permit-established keyword is used to control
152 Summit 300-48 Switch Software User GuideAccess PoliciesThe maximum number of access list allowed by the hardware is 254 for each block of eight 1
Using Access Control ListsSummit 300-48 Switch Software User Guide 153Table 63: Access Control List Configuration CommandsCommand Descriptioncreate a
154 Summit 300-48 Switch Software User GuideAccess Policiescreate access-mask <access-mask name> {dest-mac} {source-mac} {vlan } {ethertype} {t
Using Access Control ListsSummit 300-48 Switch Software User Guide 155create rate-limit <rule_name> access-mask <access-mask name> {dest-
156 Summit 300-48 Switch Software User GuideAccess PoliciesAccess Control List ExamplesThis section presents three access control list examples:• Usi
Using Access Control ListsSummit 300-48 Switch Software User Guide 157Step 1 – Deny IP Traffic. First, create an access-mask that examines the IP pr
158 Summit 300-48 Switch Software User GuideAccess PoliciesFigure 9: Access list allows TCP trafficStep 3 - Permit-Established Access List. When a T
Using Access Control ListsSummit 300-48 Switch Software User Guide 159Figure 11 shows the final outcome of this access list.Figure 11: Permit-establi
16 Summit 300-48 Switch Software User Guide Ta bl es
160 Summit 300-48 Switch Software User GuideAccess Policies
Summit 300-48 Switch Software User Guide 161 11 Quality of Service (QoS)This chapter describes the following topics:• Overview of Policy-Based Quality
162 Summit 300-48 Switch Software User GuideQuality of Service (QoS)Summit 300-48 switches support up to four physical queues per port.NOTEAs with al
Configuring QoS for a Port or VLANSummit 300-48 Switch Software User Guide 163Web Browsing ApplicationsQoS needs for Web browsing applications cannot
164 Summit 300-48 Switch Software User GuideQuality of Service (QoS)Traffic GroupingsAfter a QoS profile has been modified for bandwidth and priority
Traffic GroupingsSummit 300-48 Switch Software User Guide 165prescribe the bandwidth management and priority handling for that traffic grouping. This
166 Summit 300-48 Switch Software User GuideQuality of Service (QoS)Explicit Class of Service (802.1p and DiffServ) Traffic GroupingsThis category of
Traffic GroupingsSummit 300-48 Switch Software User Guide 167supports four hardware queues. The transmitting hardware queue determines the bandwidth
168 Summit 300-48 Switch Software User GuideQuality of Service (QoS)Configuring DiffServContained in the header of every IP packet is a field for IP
Traffic GroupingsSummit 300-48 Switch Software User Guide 169Observing DiffServ InformationWhen a packet arrives at the switch on an ingress port, th
Summit 300-48 Switch Software User Guide 17 PrefaceThis preface provides an overview of this guide, describes guide conventions, and lists other publi
170 Summit 300-48 Switch Software User GuideQuality of Service (QoS)DiffServ ExamplesFor information on the access list and access mask commands in t
Verifying Configuration and PerformanceSummit 300-48 Switch Software User Guide 171The same information is also available for ports or VLANs using on
172 Summit 300-48 Switch Software User GuideQuality of Service (QoS)Displaying QoS Profile InformationThe QoS monitor can also be used to verify the
Summit 300-48 Switch Software User Guide 173 12 Status Monitoring and StatisticsThis chapter describes the following topics:• Status Monitoring on pag
174 Summit 300-48 Switch Software User GuideStatus Monitoring and StatisticsTable 71 describes commands that are used to monitor the status of the sw
Port StatisticsSummit 300-48 Switch Software User Guide 175Port StatisticsExtremeWare provides a facility for viewing port statistic information. The
176 Summit 300-48 Switch Software User GuideStatus Monitoring and Statistics• Received Byte Count (RX Byte Count) — The total number of bytes that we
Port Monitoring Display KeysSummit 300-48 Switch Software User Guide 177• Receive Fragmented Frames (RX Frag) — The total number of frames received b
178 Summit 300-48 Switch Software User GuideStatus Monitoring and StatisticsNOTEExtreme Networks recommends that you set the system recovery level to
LoggingSummit 300-48 Switch Software User Guide 179• Message — The message contains the log information with text that is specific to the problem.Loc
18 Summit 300-48 Switch Software User GuidePrefaceRelated PublicationsThe publications related to this one are:• ExtremeWare Release Notes• Summit 30
180 Summit 300-48 Switch Software User GuideStatus Monitoring and Statistics— ipaddress — The IP address of the syslog host.— facility — The syslog f
LoggingSummit 300-48 Switch Software User Guide 181config syslog {add} <host name/ip> {<port>} <facility> {<priority>}Configu
182 Summit 300-48 Switch Software User GuideStatus Monitoring and StatisticsRMON Using the Remote Monitoring (RMON) capabilities of the switch allows
RMONSummit 300-48 Switch Software User Guide 183History The History group provides historical views of network performance by taking periodic samples
184 Summit 300-48 Switch Software User GuideStatus Monitoring and StatisticsEvent Actions The actions that you can define for each alarm are shown in
Summit 300-48 Switch Software User Guide 185 13 Spanning Tree Protocol (STP)This chapter describes the following topics:• Overview of the Spanning Tre
186 Summit 300-48 Switch Software User GuideSpanning Tree Protocol (STP)A port can belong to only one STPD. If a port is a member of multiple VLANs,
STP ConfigurationsSummit 300-48 Switch Software User Guide 187• Marketing is defined on all switches (switch A, switch B, switch Y, switch Z, and swi
188 Summit 300-48 Switch Software User GuideSpanning Tree Protocol (STP)Figure 16: Tag-based STP configurationThe tag-based network in Figure 16 has
Configuring STP on the SwitchSummit 300-48 Switch Software User Guide 1893 Enable STP for one or more STP domains using the following command:enable
Summit 300-48 Switch Software User Guide 19 1 ExtremeWare OverviewThis chapter describes the following topics:• Summary of Features on page 19• Securi
190 Summit 300-48 Switch Software User GuideSpanning Tree Protocol (STP)config stpd <stpd_name> maxage <value> Specifies the maximum age
Displaying STP SettingsSummit 300-48 Switch Software User Guide 191STP Configuration ExampleThe following Summit 300-48 switch example creates and en
192 Summit 300-48 Switch Software User GuideSpanning Tree Protocol (STP)Disabling and Resetting STPTo disable STP or return STP settings to their def
Summit 300-48 Switch Software User Guide 193 14 IP Unicast RoutingThis chapter describes the following topics:• Overview of IP Unicast Routing on page
194 Summit 300-48 Switch Software User GuideIP Unicast RoutingRouter InterfacesThe routing software and hardware routes IP traffic between router int
Overview of IP Unicast RoutingSummit 300-48 Switch Software User Guide 195— Locally, by way of interface addresses assigned to the system— By other s
196 Summit 300-48 Switch Software User GuideIP Unicast RoutingProxy ARPProxy Address Resolution Protocol (ARP) was first invented so that ARP-capable
Relative Route PrioritiesSummit 300-48 Switch Software User Guide 197Relative Route PrioritiesTable 79 lists the relative priorities assigned to rout
198 Summit 300-48 Switch Software User GuideIP Unicast RoutingVerifying the IP Unicast Routing ConfigurationUse the show iproute command to display t
IP CommandsSummit 300-48 Switch Software User Guide 199Table 81 describes the commands used to configure the IP route table.disable bootp vlan [<n
2 Alpine, Altitude, BlackDiamond, EPICenter, Ethernet Everywhere, Extreme Ethernet Everywhere, Extreme Networks, Extreme Turbodrive, Extreme Velocity,
20 Summit 300-48 Switch Software User GuideExtremeWare Overview• SSH2 connection• Simple Network Management Protocol (SNMP) support• Remote Monitorin
200 Summit 300-48 Switch Software User GuideIP Unicast RoutingTable 82 describes the commands used to configure IP options and the ICMP protocol.conf
IP CommandsSummit 300-48 Switch Software User Guide 201disable ip-option loose-source-route Disables the loose source route IP option.disable ip-opti
202 Summit 300-48 Switch Software User GuideIP Unicast RoutingRouting Configuration ExampleFigure 18 illustrates a Summit 300-48 switch with two VLAN
Displaying Router SettingsSummit 300-48 Switch Software User Guide 203The example in Figure 18 is configured as follows:create vlan Financecreate vla
204 Summit 300-48 Switch Software User GuideIP Unicast RoutingConfiguring DHCP/BOOTP RelayOnce IP unicast routing is configured, you can configure th
UDP-ForwardingSummit 300-48 Switch Software User Guide 2053 Configure the addresses to which DHCP or BOOTP requests should be directed, using the fol
206 Summit 300-48 Switch Software User GuideIP Unicast RoutingUDP-Forwarding ExampleIn this example, the VLAN Marketing and the VLAN Operations are p
UDP-ForwardingSummit 300-48 Switch Software User Guide 207config vlan <name> udp-profile <profile_name> Assigns a UDP-forwarding profile
208 Summit 300-48 Switch Software User GuideIP Unicast Routing
Summit 300-48 Switch Software User Guide 209 A Safety InformationImportant Safety InformationWARNING!Read the following safety information thoroughly
Software LicensingSummit 300-48 Switch Software User Guide 21Quality of ServiceExtremeWare has Quality of Service (QoS) features that support IEEE 80
210 Summit 300-48 Switch Software User GuideSafety Information• The appliance coupler (the connector to the unit and not the wall plug) must have a c
Important Safety InformationSummit 300-48 Switch Software User Guide 211Lithium BatteryThe lithium battery is not user-replaceable.WARNING!Danger of
212 Summit 300-48 Switch Software User GuideSafety Information
Summit 300-48 Switch Software User Guide 213 B Supported StandardsThe following is a list of software standards supported by ExtremeWare for the Summi
214 Summit 300-48 Switch Software User GuideSupported Standards
Summit 300-48 Switch Software User Guide 215 C Software Upgrade and Boot OptionsThis appendix describes the following topics:• Downloading a New Image
216 Summit 300-48 Switch Software User GuideSoftware Upgrade and Boot OptionsRebooting the SwitchTo reboot the switch, use the following command:rebo
Using TFTP to Upload the ConfigurationSummit 300-48 Switch Software User Guide 217To erase the currently selected configuration image and reset all s
218 Summit 300-48 Switch Software User GuideSoftware Upgrade and Boot OptionsUsing TFTP to Download the ConfigurationYou can download ASCII files tha
Upgrading and Accessing BootROMSummit 300-48 Switch Software User Guide 219To display scheduled download information, use the following command:show
22 Summit 300-48 Switch Software User GuideExtremeWare OverviewSecurity Licensing Certain additional ExtremeWare security features, such as the use o
220 Summit 300-48 Switch Software User GuideSoftware Upgrade and Boot Options Accessing the Bootloader CLIThe Bootloader CLI contains commands that s
Boot Option CommandsSummit 300-48 Switch Software User Guide 221Boot Option CommandsTable 88 lists the CLI commands associated with switch boot optio
222 Summit 300-48 Switch Software User GuideSoftware Upgrade and Boot Optionsuse configuration [primary | secondary] Configures the switch to use a p
Summit 300-48 Switch Software User Guide 223 D TroubleshootingIf you encounter problems when using the switch, this appendix may be helpful. If you ha
224 Summit 300-48 Switch Software User GuideTroubleshooting• Both ends of the Gigabit link are set to the same autonegotiation state.Both sides of th
Using the Command-Line InterfaceSummit 300-48 Switch Software User Guide 225Check that the port through which you are trying to access the device has
226 Summit 300-48 Switch Software User GuideTroubleshootingThe only way to establish a full duplex link is to either force it at both sides, or run a
Debug TracingSummit 300-48 Switch Software User Guide 227with a number, or contains non-alphabetical characters, you must use quotation marks wheneve
228 Summit 300-48 Switch Software User GuideTroubleshootingshow debug-trace wireless ports (portlist) [dot1x | radius]The output of this command is s
Contacting Extreme Technical SupportSummit 300-48 Switch Software User Guide 229• (408) 579-2826or by email at:• [email protected] can a
Software Factory DefaultsSummit 300-48 Switch Software User Guide 23NOTEFor default settings of individual ExtremeWare features, see the applicable i
230 Summit 300-48 Switch Software User GuideTroubleshooting
Summit 300-48 Switch Software User Guide 231 IndexNumerics802.11a, 802.11b, 802.11g 76802.1p configuration commands (table) 167802.1x authentication 9
232 - Index Summit 300-48 Switch Software User Guide Ccampus mode 101campus mode authentication 99, 103certificatescommands (table) 114channel 82ciphe
Summit 300-48 Switch Software User Guide Index - 233 Events, RMON 183examplesport power budget 136security configuration 116wireless configuration 115
234 - Index Summit 300-48 Switch Software User Guide power supplies 137verifying the configuration 61local logging 179location-based authentication 95
Summit 300-48 Switch Software User Guide Index - 235 redundant supplies 137reserved 134Power over Ethernet. See PoEpower sourcing equipment (PSE) 135p
236 - Index Summit 300-48 Switch Software User Guide configuration examples 116configuration options (table) 112options (table) 94security licensingde
Summit 300-48 Switch Software User Guide Index - 237 and BOOTP 205and DHCP 205configuration commands (table) 206configuring 205description 205example
238 - Index Summit 300-48 Switch Software User Guide
Summit 300-48 Switch Software User Guide 239 Index of CommandsNumerics802.3af 133Cclear counters 180clear fdb 145, 165clear inline-power connection-
24 Summit 300-48 Switch Software User GuideExtremeWare Overview
240 - Index of Commands Summit 300-48 Switch Software User Guide config stpd hellotime 189config stpd maxage 190config stpd port cost 190config stp
Summit 300-48 Switch Software User Guide Index of Commands - 241 disable icmp address-mask 204disable icmp parameter-problem 200disable icmp port-un
242 - Index of Commands Summit 300-48 Switch Software User Guide enable sntp-client 53, 56enable ssh2 30, 41enable stpd 189, 190enable stpd port 1
Summit 300-48 Switch Software User Guide Index of Commands - 243 show version 175show vlan 73, 104, 171, 172show wireless ap-scan results 82show wi
244 - Index of Commands Summit 300-48 Switch Software User Guide
Summit 300-48 Switch Software User Guide 25 2 Accessing the SwitchThis chapter describes the following topics:• Understanding the Command Syntax on pa
26 Summit 300-48 Switch Software User GuideAccessing the SwitchSyntax HelperThe CLI has a built-in syntax helper. If you are unsure of the complete s
Line-Editing KeysSummit 300-48 Switch Software User Guide 27NamesAll named components of the switch configuration must have a unique name. Names must
28 Summit 300-48 Switch Software User GuideAccessing the SwitchCommand HistoryExtremeWare “remembers” the last 49 commands you entered. You can displ
Common CommandsSummit 300-48 Switch Software User Guide 29config sys-recovery-level [none | critical | all] Configures a recovery option for instance
Summit 300-48 Switch Software User Guide 3 ContentsPrefaceIntroduction 17Conventions 17Related Publications 18Chapter 1 ExtremeWare OverviewSummary of
30 Summit 300-48 Switch Software User GuideAccessing the SwitchConfiguring Management AccessExtremeWare supports the following two levels of manageme
Configuring Management AccessSummit 300-48 Switch Software User Guide 31User AccountA user-level account has viewing access to all manageable paramet
32 Summit 300-48 Switch Software User GuideAccessing the SwitchChanging the Default PasswordDefault accounts do not have passwords assigned to them.
Domain Name Service Client ServicesSummit 300-48 Switch Software User Guide 33Viewing AccountsTo view the accounts that have been created, you must h
34 Summit 300-48 Switch Software User GuideAccessing the SwitchChecking Basic ConnectivityThe switch offers the following commands for checking basic
Checking Basic ConnectivitySummit 300-48 Switch Software User Guide 35• from uses the specified source address in the ICMP packet. If not specified,
36 Summit 300-48 Switch Software User GuideAccessing the Switch
Summit 300-48 Switch Software User Guide 37 3 Managing the SwitchThis chapter describes the following topics:• Overview on page 37• Using the Console
38 Summit 300-48 Switch Software User GuideManaging the SwitchUsing the Console InterfaceThe CLI built into the switch is accessible by way of the 9-
Using TelnetSummit 300-48 Switch Software User Guide 39You can enable BOOTP on a per-VLAN basis by using the following command:enable bootp vlan [<
4 Summit 300-48 Switch Software User Guide ContentsConfiguring Management Access 30User Account 31Administrator Account 31Default Accounts 31Creating
40 Summit 300-48 Switch Software User GuideManaging the SwitchWhen you have successfully logged in to the switch, the command-line prompt displays th
Using Secure Shell 2 (SSH2)Summit 300-48 Switch Software User Guide 41Controlling Telnet AccessBy default, Telnet services are enabled on the switch.
42 Summit 300-48 Switch Software User GuideManaging the SwitchYou can specify a list of predefined clients that are allowed SSH2 access to the switch
Using SNMPSummit 300-48 Switch Software User Guide 43Supported MIBsIn addition to private MIBs, the switch supports the standard MIBs listed in Appen
44 Summit 300-48 Switch Software User GuideManaging the SwitchDisplaying SNMP SettingsTo display the SNMP settings configured on the switch, use the
Authenticating UsersSummit 300-48 Switch Software User Guide 45Authenticating Users ExtremeWare provides a Radius client to authenticate switch admin
46 Summit 300-48 Switch Software User GuideManaging the SwitchRADIUS RFC 2138 Attributes The RADIUS RFC 2138 optional attributes supported are as fol
Authenticating UsersSummit 300-48 Switch Software User Guide 47#homeless testing type proxy v1 #xyz.merit.edu moretesting type=Ascend:NAS v1 #anyoldt
48 Summit 300-48 Switch Software User GuideManaging the Switch• Cannot issue a show switch command.• Can perform all other commands.We know from the
Using ExtremeWare VistaSummit 300-48 Switch Software User Guide 49Using ExtremeWare VistaThe ExtremeWare Vista™ device-management software that runs
Summit 300-48 Switch Software User Guide 5 ContentsChapter 4 Configuring Ports on a SwitchPort Numbering 57Enabling and Disabling Switch Ports 57Confi
50 Summit 300-48 Switch Software User GuideManaging the Switch• After downloading a newer version of the switch image, clear the browser disk and mem
Using ExtremeWare VistaSummit 300-48 Switch Software User Guide 51Task FrameThe task frame has two sections: menu buttons and submenu links. The four
52 Summit 300-48 Switch Software User GuideManaging the SwitchStatus MessagesStatus messages are displayed at the top of the content frame. The four
Using the Simple Network Time ProtocolSummit 300-48 Switch Software User Guide 53Do a GET When Configuring a VLANWhen configuring a VLAN using Extrem
54 Summit 300-48 Switch Software User GuideManaging the SwitchOnce enabled, the switch sends out a periodic query to the NTP servers defined later (i
Using the Simple Network Time ProtocolSummit 300-48 Switch Software User Guide 55-9:00 -540 YST - Yukon Standard-10:00 -600 AHST - Alaska-Hawaii Stan
56 Summit 300-48 Switch Software User GuideManaging the SwitchSNTP Configuration CommandsTable 14 describes SNTP configuration commands.SNTP ExampleI
Summit 300-48 Switch Software User Guide 57 4 Configuring Ports on a SwitchThis chapter describes the following topics: • Port Numbering on page 57• E
58 Summit 300-48 Switch Software User GuideConfiguring Ports on a SwitchConfiguring Switch Port Speed and Duplex SettingBy default, the switch is con
Load Sharing on the SwitchSummit 300-48 Switch Software User Guide 59Load Sharing on the SwitchLoad sharing with switches allows you to increase band
6 Summit 300-48 Switch Software User Guide ContentsAP Detection 81Managing Wireless Clients 83Performing Client Scanning 83Collecting Client Informati
60 Summit 300-48 Switch Software User GuideConfiguring Ports on a SwitchYou can configure the address-based load-sharing algorithm on the Summit 300-
Switch Port-MirroringSummit 300-48 Switch Software User Guide 61• Ports on the switch are divided into a maximum of five groups.• Port-based and roun
62 Summit 300-48 Switch Software User GuideConfiguring Ports on a SwitchUp to eight mirroring filters and one monitor port can be configured. After a
Extreme Discovery ProtocolSummit 300-48 Switch Software User Guide 63Port-Mirroring ExampleThe following example selects port 1:3 as the mirror port
64 Summit 300-48 Switch Software User GuideConfiguring Ports on a Switch
Summit 300-48 Switch Software User Guide 65 5 Virtual LANs (VLANs)This chapter describes the following topics:• Overview of Virtual LANs on page 65• T
66 Summit 300-48 Switch Software User GuideVirtual LANs (VLANs)• VLANs ease the change and movement of devices.With traditional networks, network adm
Types of VLANsSummit 300-48 Switch Software User Guide 67Spanning Switches with Port-Based VLANsTo create a port-based VLAN that spans two switches,
68 Summit 300-48 Switch Software User GuideVirtual LANs (VLANs)Figure 3 illustrates two VLANs spanning two switches. On system 1, ports 1:12 through
Types of VLANsSummit 300-48 Switch Software User Guide 69NOTEThe use of 802.1Q tagged packets may lead to the appearance of packets slightly bigger t
Summit 300-48 Switch Software User Guide 7 ContentsWireless Management Configuration Example 115Security Configuration Examples 116Profile Assignment
70 Summit 300-48 Switch Software User GuideVirtual LANs (VLANs)Figure 4: Physical diagram of tagged and untagged traffic Figure 5 is a logical diagra
VLAN NamesSummit 300-48 Switch Software User Guide 71• The server connected to port 1:16 on system 1 has a NIC that supports 802.1Q tagging. • The se
72 Summit 300-48 Switch Software User GuideVirtual LANs (VLANs)Renaming a VLANTo rename an existing VLAN, use the following command:config vlan <o
Displaying VLAN SettingsSummit 300-48 Switch Software User Guide 73VLAN Configuration ExamplesThe following Summit 300-48 switch example creates a ta
74 Summit 300-48 Switch Software User GuideVirtual LANs (VLANs)
Summit 300-48 Switch Software User Guide 75 6 Wireless NetworkingThis chapter describes wireless networking using the Summit 300-48 switch and the Alt
76 Summit 300-48 Switch Software User GuideWireless NetworkingFigure 6: Sample integrated wired and wireless networkThis arrangement is part of the E
BridgingSummit 300-48 Switch Software User Guide 77In addition to traditional wired devices, the Summit 300-48 switch supports the Altitude 300 and d
78 Summit 300-48 Switch Software User GuideWireless NetworkingManaging the Altitude 300It is not necessary to configure the individual Altitude 300 p
Configuring RF PropertiesSummit 300-48 Switch Software User Guide 79Configuring RF Properties RF profiles allow you to group RF parameters for access
8 Summit 300-48 Switch Software User Guide ContentsChapter 11 Quality of Service (QoS)Overview of Policy-Based Quality of Service 161Applications and
80 Summit 300-48 Switch Software User GuideWireless NetworkingNOTEess-name is no longer part of RF-Profile property values. It is now part of Securit
Configuring RF MonitoringSummit 300-48 Switch Software User Guide 81• Rogue access point detection, including alarm conditions• RF overlap levels to
82 Summit 300-48 Switch Software User GuideWireless Networkingconfigure wireless port <portlist> interface [1|2] ap-scan send-probe <on|off&
Managing Wireless ClientsSummit 300-48 Switch Software User Guide 83Managing Wireless ClientsTable 26 lists the commands for configuring interactions
84 Summit 300-48 Switch Software User GuideWireless Networkingconfigure wireless port <portlist> interface [1|2] client-scan added-trap <o
Managing Wireless ClientsSummit 300-48 Switch Software User Guide 85Collecting Client InformationClient information is collected from stations when s
86 Summit 300-48 Switch Software User GuideWireless NetworkingClient Debug InformationThe following commands support debugging of individual client p
Configuring Wireless Switch PropertiesSummit 300-48 Switch Software User Guide 87Client AgingClient aging allows you to configure an aging timer for
88 Summit 300-48 Switch Software User GuideWireless NetworkingConfiguring Country CodesWhen the Summit 300-48 switch is set to factory defaults, you
Configuring Wireless PortsSummit 300-48 Switch Software User Guide 89Configuring Wireless PortsTable 39 lists the configuration commands for wireless
Summit 300-48 Switch Software User Guide 9 ContentsSpanning Tree Domains 185Defaults 186STPD BPDU Tunneling 186STP Configurations 186Configuring STP o
90 Summit 300-48 Switch Software User GuideWireless Networkinginterface from one profile to another without having to shut it down. Table 41 lists th
Event Logging and ReportingSummit 300-48 Switch Software User Guide 91Event Logging and ReportingThe Summit 300-48 switch supports the following enha
92 Summit 300-48 Switch Software User GuideWireless Networking
Summit 300-48 Switch Software User Guide 93 7 Unified Access SecurityThis chapter describes the security features of the Summit 300-48 switch and incl
94 Summit 300-48 Switch Software User GuideUnified Access Security• Single authentication infrastructure — Single set of policies, RADIUS, and certif
User Access SecuritySummit 300-48 Switch Software User Guide 95for wired networks, it is not effective on the wireless side, and is therefore not rec
96 Summit 300-48 Switch Software User GuideUnified Access SecurityEncryptionEncryption is used to protect the privacy and integrity of user data sent
Network LoginSummit 300-48 Switch Software User Guide 97When web-based network login is enabled on a switch port, that port is placed into a non-forw
98 Summit 300-48 Switch Software User GuideUnified Access SecurityWeb-based and 802.1x authentication each have advantages and disadvantages, as summ
Network LoginSummit 300-48 Switch Software User Guide 99Campus and ISP ModesNetwork login supports two modes of operation, Campus and ISP. Campus mod
Kommentare zu diesen Handbüchern