DCN Basic Management Configuration
DCN Basic Management Configuration
Content
Content
Content
Fig 1-1 Out-of-band Management Configuration Environment As shown in above, the serial port (RS-232) is connected to the switch with the serial cable provided. The table below lists all the devices used in the connection.
Description Has functional keyboard and RS-232, with terminal emulator installed, such as HyperTerminal included in Windows 9x/NT/2000/XP.
One end attach to the RS-232 serial port, the other end to the Console port. 1-1
Step 2 Entering the HyperTerminal Open the HyperTerminal included in Windows after the connection established. The example below is based on the HyperTerminal included in Windows XP. 1) Click Start menu - All Programs -Accessories -Communication - HyperTerminal.
Fig 1-2 Opening Hyper Terminal 2) Type a name for opening HyperTerminal, such as Switch.
Fig 1-3 Opening HyperTerminal 3) In the Connecting using drop-list, select the RS-232 serial port used by the PC, e.g. COM1, and click OK.
1-2
Fig 1-4 Opening HyperTerminal 4) COM1 property appears, select 9600 for Baud rate, 8 for Data bits, none for Parity checksum, 1 for stop bit and none for traffic control; or, you can also click Restore default and click OK.
Fig 1-5 Opening HyperTerminal Step 3: Entering switch CLI interface Power on the switch, the following appears in the HyperTerminal windows, that is the CLI configuration mode for Switch. Testing RAM... 0x077C0000 RAM OK Loading MiniBootROM... Attaching to file system ...
1-3
Basic Management Configuration Loading nos.img ... Booting...... Starting at 0x10000... Attaching to file system ... --- Performing Power-On Self Tests (POST) --DRAM Test....................PASS! PCI Device 1 Test............PASS! FLASH Test...................PASS! FAN Test.....................PASS! Done All Pass. ------------------ DONE --------------------Current time is SUN JAN 01 00:00:00 2006 Switch> done.
The user can now enter commands to manage the switch. For a detailed description for the commands, please refer to the following chapters.
assumes the shipment status of the switch where only VLAN1 exists in the system. The following describes the steps for a Telnet client to connect to the switchs VLAN1 interface by Telnet(IPV4 address example):
Fig 1-6 Manage the switch by Telnet Step 1: Configure the IP addresses for the switch and start the Telnet Server function on the switch. First is the configuration of host IP address. This should be within the same network segment as the switch VLAN1 interface IP address. Suppose the switch VLAN1 interface IP address is 10.1.128.251/24. Then, a possible host IP address is 10.1.128.252/24. Run ping 10.1.128.251 from the host and verify the result, check for reasons if ping failed. The IP address configuration commands for VLAN1 interface are listed below. Before in-band management, the switch must be configured with an IP address by out-of-band management (i.e. Console mode), the configuration commands are as follows (All switch configuration prompts are assumed to be Switch hereafter if not otherwise specified): Switch> Switch>enable Switch#config Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 10.1.128.251 255.255.255.0 Switch(Config-if-Vlan1)#no shutdown To enable the Telnet Server function, users should type the CLI command telnet-server enable in the global mode as below: Switch>en Switch#config Switch(config)# telnet-server enable
1-5
Run Telnet client program included in Windows with the specified Telnet target.
Fig 1-7 Run telnet client program included in Windows Step 3: Login to the switch. Login to the Telnet configuration interface. Valid login name and password are required, otherwise the switch will reject Telnet access. This is a method to protect the switch from unauthorized access. As a result, when Telnet is enabled for configuring and managing the switch, username and password for authorized Telnet users must be configured with the following command: username <username> privilege <privilege> [password (0|7) <password>]. To open the local authentication style with the following command: authentication line vty login local. Privilege option must exist and just is 15. Assume an authorized user in the switch has a username of test, and password of test, the configuration procedure should like the following: Switch>enable Switch#config Switch(config)#username test privilege 15 password 0 test Switch(config)#authentication line vty login local Enter valid login name and password in the Telnet configuration interface, Telnet user will be able to enter the switchs CLI configuration interface. The commands used in the Telnet CLI interface after login is the same as that in the Console interface.
1-6
Basic Management Configuration Switch(config)#ip http server Step 2: Run HTTP protocol on the host.
Open the Web browser on the host and type the IP address of the switch, or run directly the HTTP protocol on the Windows. For example, the IP address of the switch is 10.1.128.251;
Fig 1-9 Run HTTP Protocol When accessing a switch with IPv6 address, it is recommended to use the Firefox browser with 1.5 or later version. For example, if the IPv6 address of the switch is 3ffe:506:1:2::3. Input the IPv6 address of the switch is http://[3ffe:506:1:2::3] and the address should draw together with the square brackets. Step 3: Login to the switch.
Login to the Web configuration interface. Valid login name and password are required, otherwise the switch will reject HTTP access. This is a method to protect the switch from unauthorized access. As a result, when Telnet is enabled for configuring and managing the switch, username and password for authorized Telnet users must be configured with the following command: username <username> privilege <privilege> [password (0|7) <password>]. To open the local authentication style with the following command: authentication line web login local. Privilege option must exist and just is 15. Assume an authorized user in the switch has a username of admin, and password of admin, the configuration procedure should like the following: Switch>enable Switch#config Switch(config)#username admin privilege 15 password 0 admin Switch(config)#authentication line web login local The Web login interface of DCRS-5750-52T is as below:
1-8
Fig 1-10 Web Login Interface Input the right username and password, and then the main Web configuration interface is shown as below.
Fig 1-11 Main Web Configuration Interface Notice: When configure the switch, the name of the switch is composed with English letters.
1-9
1-11
password must be set for entering Admin mode to prevent unauthorized access and malicious modification to the switch.
Global Mode.
return to Global
return to Global
return to Global
VLAN Mode Using the vlan <vlan-id> command under Global Mode can enter the corresponding VLAN Mode. Under VLAN Mode the user can configure all member ports of the corresponding VLAN. Run the exit command to exit the VLAN Mode to Global Mode. DHCP Address Pool Mode Type the ip dhcp pool <name> command under Global Mode will enter the DHCP
1-12
Address Pool Mode prompt Switch(Config-<name>-dhcp)#. DHCP address pool properties can be configured under DHCP Address Pool Mode. Run the exit command to exit the DHCP Address Pool Mode to Global Mode. Route Mode Routing Protocol RIP Protocol Routing Entry Type router rip command under Global Mode. OSPF Protocol Routing Type router ospf command under Global Mode. BGP Protocol Routing Type router bgp <AS mumber> command under Global Mode. Configure BGP protocol parameters. Configure OSPF protocol parameters. Operates Configure RIP protocol parameters. Exit Use the exit command to return to Global Mode. Use the exit command to return to Global Mode. Use the exit command to return to Global Mode.
ACL Mode ACL type Standard ACL Mode IP Entry Type ip access-list command Operates Configure Mode. Configure Mode. parameters parameters Exit Use the exit
standard Type
for Standard IP ACL command to return to Global Mode. Use the exit
extanded
1-13
Here are examples for some actual configuration commands: & & & & show version, no parameters required. This is a command with only a keyword and no parameter, just type in the command to run. vlan <vlan-id>, parameter values are required after the keyword. firewall {enable | disable}, user can enter firewall enable or firewall disable for this command. snmp-server community {ro | rw} <string>, the followings are possible: snmp-server community ro <string> snmp-server community rw <string>
1-16
[YYYY.MM.DD] show version set default write reload show cpu usage show memory usage Global Mode
2-1
Chapter 2 Basic Switch Configuration Configure the information displayed when the login authentication of a telnet or console user is successful.
Chapter 2 Basic Switch Configuration the telnet. The no form command deletes the telnet user authorization. Configure the secure IP address to
login to the switch through Telnet: the no command deletes the authorized Telnet secure address. Configure IPv6 security address to login to the switch through Telnet; the no command deletes the authorized Telnet security address. Binding standard IP ACL protocol to login with Telnet/SSH/Web; the no form command will cancel the binding ACL. Binding standard IPv6 ACL protocol to login with Telnet/SSH/Web; the no form command will cancel the binding ACL.
{<num-std>|<name>} no authentication ipv6 access-class authentication line {console | vty | web} login {local | radius | tacacs } no authentication line {console | vty | web} login authorization line {console | vty | web} exec {local | radius | tacacs} no authorization line {console | vty | web} exec Admin Mode
Display debug information for Telnet terminal monitor terminal no monitor client login to the switch; the no command information. disables the debug
2. Telnet to a remote host from the switch Command Admin Mode telnet [vrf <vrf-name>] {<ip-addr> | Login to a remote host with the Telnet client included in the switch. Explanation
<ipv6-addr>
2-3
2.2.2 SSH
2.2.2.1 Introduction to SSH
SSH (Secure Shell) is a protocol which ensures a secure remote access connection to network devices. It is based on the reliable TCP/IP protocol. By conducting the mechanism such as key distribution, authentication and encryption between SSH server and SSH client, a secure connection is established. The information transferred on this connection is protected from being intercepted and decrypted. The switch meets the requirements of SSH2.0. It supports SSH2.0 client software such as SSH Secure Client and putty. Users can run the above software to manage the switch remotely. The switch presently supports RSA authentication, 3DES cryptography protocol and SSH user password authentication etc.
modulus <moduls>
2-4
SSH client side; the no command stops displaying SSH debug information on the SSH client side.
Manual configuration of IP address is assign an IP address manually for the switch. In BOOTP/DHCP mode, the switch operates as a BOOTP/DHCP client, send broadcast packets of BOOTPRequest to the BOOTP/DHCP servers, and the BOOTP/DHCP servers assign the address on receiving the request. In addition, switch can act as a DHCP server, and dynamically assign network parameters such as IP 2-5
addresses, gateway addresses and DNS server addresses to DHCP clients DHCP Server configuration is detailed in later chapters.
2. Manual configuration Command VLAN Interface Mode ip address <ip_address> <mask> Configure IP address of VLAN interface; the no command deletes IP address of VLAN interface. Configure IPv6 address, including Explanation
aggregation global unicast address, local site address and local link address. The no command deletes IPv6 address.
prefix-length>
3. BOOTP configuration Command VLAN Interface Mode Enable the switch to be a BootP client and ip bootp-client enable no ip bootp-client enable obtain IP address and gateway address through command function. BootP negotiation; the the no client disables BootP Explanation
2-6
obtain IP address and gateway address through command function. DHCP negotiation; the the no client disables DHCP
NMS
with
Get-Request,
Get-Next-Request,
Get-Bulk-Request and Set-Request messages; and the Agent, upon receiving the requests, replies with Get-Response message. On some special situations, like network device ports are on Up/Down status or the network topology changes, Agents can send Trap messages to NMS to inform the abnormal events. Besides, NMS can also be set to alert to some abnormal events by enabling RMON function. When alert events are triggered, Agents will send Trap messages or log the event according to the settings. Inform-Request is mainly used for inter-NMS communication in the layered network management. USM ensures the transfer security by well-designed encryption and authentication. USM encrypts the messages according to the user typed password. This mechanism ensures that the messages cant be viewed on transmission. And USM authentication ensures that the messages cant be changed on transmission. USM employs DES-CBC cryptography. And HMAC-MD5 and HMAC-SHA are used for authentication. VACM is used to classify the users access permission. It puts the users with the same access permission in the same group. Users cant conduct the operation which is not authorized.
2-8
Fig 2-1 ASN.1 Tree Instance In this figure, the OID of the object A is 1.2.1.1. NMS can locate this object through this unique OID and gets the standard variables of the object. MIB defines a set of standard variables for monitored network devices by following this structure. If the variable information of Agent MIB needs to be browsed, the MIB browse software needs to be run on the NMS. MIB in the Agent usually consists of public MIB and private MIB. The public MIB contains public network management information that can be accessed by all NMS; private MIB contains specific information which can be viewed and controlled by the support of the manufacturers. MIB-I [RFC1156] is the first implemented public MIB of SNMP, and is replaced by MIB-II [RFC1213]. MIB-II expands MIB-I and keeps the OID of MIB tree in MIB-I. MIB-II contains sub-trees which are called groups. Objects in those groups cover all the functional domains in network management. NMS obtains the network management information by visiting the MIB of SNMP Agent. The switch can operate as a SNMP Agent, and supports both SNMP v1/v2c and SNMP v3. The switch supports basic MIB-II, RMON public MIB and other public MID such as BRIDGE MIB. Besides, the switch supports self-defined private MIB.
2-9
Statistics: Maintain basic usage and error statistics for each subnet monitored by the Agent. History: Record periodical statistic samples available from Statistics. Alarm: Allow management console users to set any count or integer for sample intervals and alert thresholds for RMON Agent records. Event: A list of all events generated by RMON Agent. Alarm depends on the implementation of Event. Statistics and History display some current or history subnet statistics. Alarm and Event provide a method to monitor any integer data change in the network, and provide some alerts upon abnormal events (sending Trap or record in logs).
1. Enable or disable SNMP Agent server function Command Global Mode snmp-server enabled no snmp-server enabled Enable the SNMP Agent function on the switch; the no command disables the SNMP Agent function on the switch. Explanation
2. Configure SNMP community string Command Global Mode snmp-server community {ro|rw} Configure the community string for the switch; the no command deletes the configured community string. 2-10 Explanation
Basic Management Configuration {<ipv6-num-std>|<ipv6-name>}] <read-view-name>] <write-view-name>] no snmp-server community <string> [access [ipv6-access {<ipv6-num-std>|<ipv6-name>}] {<num-std>|<name>}] [read [write
3. Configure IP address of SNMP management station Command Global Mode snmp-server securityip { <ipv4-addres s> | <ipv6-address> } no snmp-server securityip Configure IPv4/IPv6 security address which is allowed to access the switch on the NMS; the no command deletes the configured security address. Enable or disable secure IP address check function on the NMS. Explanation
4. Configure engine ID Command Global Mode snmp-server engineid <engine-string> no snmp-server engineid Configure the local engine ID on the switch. This command is used for SNMP v3. Explanation
<group-string> [{authPriv | authNoPriv} auth {md5 | sha} <word>] [access {<num-std>|<name>}] [ipv6-access Add a user to a SNMP group. This command is used to configure USM for SNMP v3.
[access [ipv6-access
{<num-std>|<name>}]
{<ipv6-num-std>|<ipv6-name>}]
<write-string>] [notify <notify-string>]] [access [ipv6-access {<ipv6-num-std>|<ipv6-name>}] no snmp-server group <group-string> {noauthnopriv|authnopriv|authpriv} [access [ipv6-access {<ipv6-num-std>|<ipv6-name>}] {<num-std>|<name>}] {<num-std>|<name>}] Set the group information on the switch. This command is used to configure VACM for SNMP v3.
7. Configure view Command Global Mode snmp-server view <view-string> Configure view on the switch. This command is used for SNMP v3. Explanation
[<oid-string>]
8. Configuring TRAP Command Global Mode snmp-server enable traps no snmp-server enable traps snmp-server host { <host-ipv4-address> | <host-ipv6-address> } {v1 | v2c | {v3 {noauthnopriv | authnopriv | authpriv}}} <user-string> no { snmp-server <host-ipv4-address> host | Enable the switch to send Trap message. This command is used for SNMP v1/v2/v3. Set the host IPv4/IPv6 address which is used to receive SNMP Trap information. For SNMP v1/v2, this command also configures Trap community string; for SNMP v3, this command also configures Trap user name and security level. The no form of this command cancels this IPv4 or IPv6 address. Set the source IPv4 or IPv6 address which Explanation
<host-ipv6-address> } {v1 | v2c | {v3 {noauthnopriv | authnopriv | authpriv}}} <user-string> snmp-server trap-source
2-12
Chapter 2 Basic Switch Configuration is used to send trap packet, the no command deletes the configuration.
{<ipv4-address> | <ipv6-address>}
9. Enable/Disable RMON Command Global mode rmon enable no rmon enable Enable/disable RMON. Explanation
Scenario 4: NMS wants to receive the v3Trap messages sent by the switch. The configuration on the switch is listed below: Switch(config)#snmp-server enable Switch(config)#snmp-server host 10.1.1.2 v3 authpriv tester Switch(config)#snmp-server enable traps Scenario 5: The IPv6 address of the NMS is 2004:1:2:3::2; the IPv6 address of the switch (Agent) is 2004:1:2:3::1. The NMS network administrative software uses SNMP protocol to obtain data from the switch. The configuration on the switch is listed below: Switch(config)#snmp-server enable Switch(config)#snmp-server community rw private Switch(config)#snmp-server community ro public Switch(config)#snmp-server securityip 2004:1:2:3::2 The NMS can use private as the community string to access the switch with read-write permission, or use public as the community string to access the switch with read-only permission. Scenario 6: NMS will receive Trap messages from the switch (Note: NMS may have community string verification for the Trap messages. In this scenario, the NMS uses a Trap verification community string of dcstrap). The configuration on the switch is listed below: Switch(config)#snmp-server host 2004:1:2:3::2 v1 dcstrap Switch(config)#snmp-server enable traps
If Trap function is required, remember to enable Trap (use snmp-server enable traps command). And remember to properly configure the target host IP address and community string for Trap (use snmp-server host command) to ensure Trap message can be sent to the specified host.
& &
If RMON function is required, RMON must be enabled first (use rmon enable command). Use show snmp command to verify sent and received SNMP messages; Use show snmp status command to verify SNMP configuration information; Use debug snmp packet to enable SNMP debugging function and verify debug information. If users still cant solve the SNMP problems, Please contact our technical and service
center.
2-15
cable connection
Fig 2-2 Typical topology for switch upgrade in BootROM mode The upgrade procedures are listed below: Step 1: As shown in the figure, a PC is used as the console for the switch. A console cable is used to connect PC to the management port on the switch. The PC should have FTP/TFTP server software installed and has the image file required for the upgrade. Step 2: Press ctrl+b on switch boot up until the switch enters BootROM monitor mode. The operation result is shown below: [Boot]: Step 3: Under BootROM mode, run setconfig to set the IP address and mask of the switch under BootROM mode, server IP address and mask, and select TFTP or FTP upgrade. Suppose the switch address is 192.168.1.2, and PC address is 192.168.1.66, and select TFTP upgrade, the configuration should like: [Boot]: setconfig Host IP Address: [10.1.1.1] 192.168.1.2 Server IP Address: [10.1.1.2] 192.168.1.66 FTP(1) or TFTP(2): [1] 2 Network interface configure OK. [Boot] Step 4: Enable FTP/TFTP server in the PC. For TFTP, run TFTP server program; for FTP, run FTP server program. Before start downloading upgrade file to the switch, verify the connectivity 2-16
between the server and the switch by ping from the server. If ping succeeds, run load command in the BootROM mode from the switch; if it fails, perform troubleshooting to find out the cause. The following is the configuration for the system update image file. [Boot]: load nos.img Loading... Loading file ok! Step 5: Execute write nos.img in BootROM mode. The following saves the system update image file. [Boot]: write nos.img File nos.img exists, overwrite? (Y/N)?[N] y Writing nos.img..................................................... Write nos.img OK. [Boot]: Step 6: The following update file boot.rom, the basic environment is the same as Step 4. [Boot]: load boot.rom Loading Loading file ok! Step 7: Execute write boot.rom in BootROM mode. The following saves the update file. [Boot]: write boot.rom File boot.rom exists, overwrite? (Y/N)?[N] y Writing boot.rom Write boot.rom OK. [Boot]: Step 8: After successful upgrade, execute run or reboot command in BootROM mode to return to CLI configuration interface. [Boot]: runor reboot
2-17
Other commands in BootROM mode 1. DIR command Used to list existing files in the FLASH. [Boot]: dir boot.rom boot.conf nos.img startup-config temp.img 327,440 1900-01-01 00:00:00 --SH 83 1900-01-01 00:00:00 --SH 2,431,631 1980-01-01 00:21:34 ---2,922 1980-01-01 00:09:14 ---2,431,631 1980-01-01 00:00:32 ----
As data connection is established through the specified address and port, there is a third party to provide data connection service. TFTP builds upon UDP, providing unreliable data stream transfer service with no user authentication or permission-based file access authorization. It ensures correct data transmission by sending and acknowledging mechanism and retransmission of time-out packets. The advantage of TFTP over FTP is that it is a simple and low overhead file transfer service. Switch can operate as either FTP/TFTP client or server. When switch operates as a FTP/TFTP client, configuration files or system files can be downloaded from the remote FTP/TFTP servers (can be hosts or other switches) without affecting its normal operation. And file list can also be retrieved from the server in ftp client mode. Of course, switch can also upload current configuration files or system files to the remote FTP/TFTP servers (can be hosts or other switches). When switch operates as a FTP/TFTP server, it can provide file upload and download service for authorized FTP/TFTP clients, as file list service as FTP server. Here are some terms frequently used in FTP/TFTP. ROM: Short for EPROM, erasable read-only memory. EPROM is repalced by FLASH memory in switch. SDRAM: RAM memory in the switch, used for system software operation and configuration sequence storage. FLASH: Flash memory used to save system file and configuration file. System file: including system image file and boot file. System image file: refers to the compressed file for switch hardware driver and software support program, usually refer to as IMAGE upgrade file. In switch, the system image file is allowed to save in FLASH only. Switch mandates the name of system image file to be uploaded via FTP in Global Mode to be nos.img, other IMAGE system files will be rejected. Boot file: refers to the file initializes the switch, also referred to as the ROM upgrade file (Large size file can be compressed as IMAGE file). In switch, the boot file is allowed to save in ROM only. Switch mandates the name of the boot file to be boot.rom. Configuration file: including start up configuration file and running configuration file. The distinction between start up configuration file and running configuration file can facilitate the backup and update of the configurations. Start up configuration file: refers to the configuration sequence used in switch startup. Startup configuration file stores in nonvolatile storage, corresponding to the so-called configuration save. If the device does not support CF, the configuration file stores in FLASH only, if the device supports CF, the configuration file stores in FLASH or CF, if the
2-19
device supports multi-config file, names the configuration file to be .cfg file, the default is startup.cfg. If the device does not support multi-config file, mandates the name of startup configuration file to be startup-config. Running configuration file: refers to the running configuration sequence use in the switch. In switch, the running configuration file stores in the RAM. In the current version, the running configuration sequence running-config can be saved from the RAM to FLASH by write command or copy running-config startup-config command, so that the running configuration sequence becomes the start up configuration file, which is called configuration save. To prevent illicit file upload and easier configuration, switch mandates the name of running configuration file to be running-config. Factory configuration file: The configuration file shipped with switch in the name of factory-config. Run set default and write, and restart the switch, factory configuration file will be loaded to overwrite current start up configuration file.
Basic Management Configuration Command Admin Mode copy <source-url> <destination-url> [ascii | binary] Admin Mode
2For FTP client, server file list can be checked. For FTP client, server file list can be ftp-dir <ftpServerUrl> checked. FtpServerUrl format looks like: ftp: //user: password@IPv4|IPv6 Address.
2. FTP server configuration 1Start FTP server Command Global Mode ftp-server enable no ftp-server enable Start FTP server, the no command shuts down FTP server and prevents FTP user from logging in. Explanation Configure FTP login username and password; this no command will delete the username and password. Explanation Set connection idle time. Explanation
2Configure FTP login username and password Command Global Mode ip ftp username <username>
password [0 | 7] <password> no ip ftp username<username> Command Global Mode ftp-server timeout <seconds>
3. TFTP server configuration 1Start TFTP server Command Global Mode tftp-server enable no tftp-server enable Start TFTP server, the no command shuts down TFTP server and prevents TFTP user from logging in. Explanation Explanation
2Modify TFTP server connection idle time Command Global Mode 2-21
Basic Management Configuration tftp-server retransmission-timeout <seconds> Command Global Mode tftp-server retransmission-number <number>
10.1.1.1
Fig 2-3 Download nos.img file as FTP/TFTP client Scenario 1: The switch is used as FTP/TFTP client. The switch connects from one of its ports to a computer, which is a FTP/TFTP server with an IP address of 10.1.1.1; the switch acts as a FTP/TFTP client, the IP address of the switch management VLAN is 10.1.1.2. Download nos.img file in the computer to the switch. & FTP Configuration
Computer side configuration: Start the FTP server software on the computer and set the username Switch, and the password superuser. Place the 12_30_nos.img file to the appropriate FTP server directory on the computer. The configuration procedures of the switch are listed below: Switch(config)#interface vlan 1 2-22
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-Vlan1)#no shut Switch(Config-if-Vlan1)#exit Switch(config)#exit Switch#copy ftp: //Switch:[email protected]/12_30_nos.img nos.img With the above commands, the switch will have the nos.img file in the computer downloaded to the FLASH. & TFTP Configuration Computer side configuration: Start TFTP server software on the computer and place the 12_30_nos.img file to the appropriate TFTP server directory on the computer. The configuration procedures of the switch are listed below: Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-Vlan1)#no shut Switch(Config-if-Vlan1)#exit Switch(config)#exit Switch#copy tftp: //10.1.1.1/12_30_nos.img nos.img Scenario 2: The switch is used as FTP server. The switch operates as the FTP server and connects from one of its ports to a computer, which is a FTP client. Transfer the nos.img file in the switch to the computer and save as 12_25_nos.img. The configuration procedures of the switch are listed below: Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-Vlan1)#no shut Switch(Config-if-Vlan1)#exit Switch(config)#ftp-server enable Switch(config)# username Admin password 0 superuser Computer side configuration: Login to the switch with any FTP client software, with the username Switch and password superuser, use the command get nos.img 12_25_nos.img to download nos.img file from the switch to the computer. Scenario 3: The switch is used as TFTP server. The switch operates as the TFTP server and connects from one of its ports to a computer, which is a TFTP client. Transfer the
2-23
The configuration procedures of the switch are listed below: Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-Vlan1)#no shut Switch(Config-if-Vlan1)#exit Switch(config)#tftp-server enable Computer side configuration: Login to the switch with any TFTP client software, use the tftp command to download nos.img file from the switch to the computer. Scenario 4: Switch acts as FTP client to view file list on the FTP server. Synchronization conditions: The switch connects to a computer by an Ethernet port, the computer is a FTP server with an IP address of 10.1.1.1; the switch acts as a FTP client, and the IP address of the switch management VLAN1 interface is 10.1.1.2. FTP Configuration: PC side: Start the FTP server software on the PC and set the username Switch, and the password superuser. Switch: Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-Vlan1)#no shut Switch(Config-if-Vlan1)#exit Switch#copy ftp: //Switch: [email protected] 220 Serv-U FTP-Server v2.5 build 6 for WinSock ready... 331 User name okay, need password. 230 User logged in, proceed. 200 PORT Command successful. 150 Opening ASCII mode data connection for /bin/ls. recv total = 480 nos.img nos.rom parsecommandline.cpp position.doc qmdict.zip (some display omitted here)
2-24
start. If the system file and system start up file upgrade through FTP fails, please try to upgrade again or use the BootROM mode to upgrade.
2-26
2. The formatting operation of storage devices Command Admin Configuration Mode format <device> Format the storage device. Explanation
3-1
4. The deletion of sub-directory Command Admin Configuration Mode rmdir <directory> Delete a sub-directory in a designated directory on a certain device. Explanation
5. Changing the current working directory of the storage device Command Admin Configuration Mode cd <directory> Change the current working directory of the storage device. Explanation
6. The display operation of the current working directory Command Admin Configuration Mode pwd Display the current working directory. Explanation
7. The display operation of information about a designated file or directory Command Admin Configuration Mode dir [WORD] Display information about a designated file or directory on the storage device. Explanation
8. The deletion of a designated file in the file system Command Admin Configuration Mode delete <file-url> Delete the designated file in the file system. Explanation
9. The renaming operation of files Command Admin Configuration Mode rename <source-file-url> <dest-file> Change the name of a designated file on the switch to a new one. Explanation
3-2
Basic Management Configuration 10. The copy operation of files Command Admin Configuration Mode copy <source-file-url > <dest-file-url>
Explanation Copy a designated file one the switch and store it as a new one.
3.4 Troubleshooting
If errors occur when users try to implement file system operations, please check whether they are caused by the following reasons & & Whether file names or paths are entered correctly. When renaming a file, whether it is in use or the new file name is already used by an existing file or directory.
3-3
1) Configure private IP address pool for member switches of the cluster 2) Create or delete cluster 3) Add or remove a member switch 3 Configure attributes of the cluster in the commander switch 1) Enable or disable automatically adding cluster members 2) Set automatically added members to manually added ones 3) Set or modify the time interval of keep-alive messages on switches in the cluster. 4) Set or modify the max number of lost keep-alive messages that can be tolerated 5) Clear the list of candidate switches maintained by the switch 4 Configure attributes of the cluster in the candidate switch 1) Set the time interval of keep-alive messages of the cluster 2) Set the max number of lost keep-alive messages that can be tolerated in the cluster 5 Remote cluster network management 1) Remote configuration management 2) Remotely upgrade member switch 3) Reboot member switch 6 Manage cluster network with web 1) Enable http 7 Manage cluster network with snmp 1) Enable snmp server 1. Enable or disable cluster Command Global Mode cluster run [key <WORD>] [vid <VID>] no cluster run Enable or disable cluster function in the switch. Explanation
2. Create a cluster Command Global Mode cluster ip-pool <commander-ip> no cluster ip-pool cluster commander [<cluster_name>] no cluster commander 4-2 Configure the private IP address pool for cluster member devices. Create or delete a cluster. Explanation
<candidate-sn> | mac-address <mac-addr> [id <member-id> ]} no cluster member {id <member-id> | mac-address <mac-addr>} Add or remove a member switch.
3. Configure attributes of the cluster in the commander switch Command Global Mode cluster auto-add no cluster auto-add Enable or disable adding newly discovered candidate switch to the cluster. Change cluster member auto-to-user members ones. cluster keepalive interval <second> no cluster keepalive interval cluster keepalive loss-count <int> no cluster keepalive loss-count Admin mode clear cluster nodes | [nodes-sn mac-address Clear nodes in the list of candidate switches maintained by the switch. Set the keep-alive interval of the cluster. Set the max number of lost keep-alive messages that can be tolerated in the cluster. automatically into manually added added Explanation
<candidate-sn-list> <mac-addr>]
4. Configure attributes of the cluster in the candidate switch Command Global Mode cluster keepalive interval <second> no cluster keepalive interval cluster keepalive loss-count <int> no cluster keepalive loss-count Set the keep-alive interval of the cluster. Set the max number of lost keep-alive messages that can be tolerated in the clusters. Explanation
4-3
In the commander switch, this rcommand member <member-id> command is used to configure and manage member switches. In rcommand commander the member switch, this command is used to configure the commander switch. cluster reset member [id <member-id> | mac-address <mac-addr>] In the commander switch, this command is used to reset the member switch. In the commander switch, this cluster update member <member-id> command is used to remotely upgrade the member switch. It can only upgrade nos.img file. <src-url> <dst-filename>[ascii | binary]
6. Manage cluster network with web Command Global Mode Enable http function in commander switch and member switch. Notice: ip http server must insure the http function be enabled in member switch when commander switch visiting member switch by web. The commander switch visit member switch via beat member node in member cluster topology. 7. Manage cluster network with snmp Command Global Mode Explanation Explanation
4-4
Chapter 4 Cluster Configuration Enable snmp server function in commander switch and member switch. Notice: must insure the snmp server function be enabled in member switch when commander switch visiting member switch by snmp. The commander switch visit member character ember id>. switch via configure string
snmp-server enable
<commander-community>@sw<m
E1
E2
E1
E2
E1
E1
SW1
SW2
SW3
SW4
Fig 4-1 Examples of Cluster Configuration Procedure 1. Configure the command switch Configuration of SW1: Switch(config)#cluster run Switch(config)#cluster ip-pool 10.2.3.4 Switch(config)#cluster commander 5526 Switch(config)#cluster auto-add 2. Configure the member switch Configuration of SW2-SW4 Switch(config)#cluster run 4-5
4-6