Manual

Accessing the switch 3
Contents
Accessing the switch
Introduction.............................................................................................................................................................6
Additional references..............................................................................................................................................6
Typographical conventions.....................................................................................................................................6
Management Network ............................................................................................................................................7
Connecting through the console port ................................................................................................................7
Connecting through Telnet................................................................................................................................7
Connecting through Secure Shell .....................................................................................................................7
Using the command line interfaces ........................................................................................................................ 8
Configuring an IP interface................................................................................................................................ 8
Using the Browser-based Interface ........................................................................................................................ 9
Using Simple Network Management Protocol ........................................................................................................ 9
SNMP v1.0........................................................................................................................................................9
SNMP v3.0......................................................................................................................................................10
Default configuration .......................................................................................................................................10
User configuration...........................................................................................................................................10
View based configurations ..............................................................................................................................11
Configuring SNMP trap hosts.......................................................................................................................... 12
Secure access to the switch.................................................................................................................................14
Setting allowable source IP address ranges...................................................................................................14
RADIUS authentication and authorization.......................................................................................................14
TACACS+ authentication ................................................................................................................................ 18
Secure Shell and Secure Copy.......................................................................................................................23
User access control..............................................................................................................................................27
Setting up user IDs.......................................................................................................................................... 27
Ports and trunking
Introduction...........................................................................................................................................................28
Ports on the switch ...............................................................................................................................................28
Port trunk groups..................................................................................................................................................28
Statistical load distribution............................................................................................................................... 29
Built-in fault tolerance...................................................................................................................................... 29
Before you configure trunks..................................................................................................................................29
Trunk group configuration rules............................................................................................................................29
Port trunking example...........................................................................................................................................30
Configuring trunk groups (AOS CLI example)................................................................................................. 31
Configuring trunk groups (BBI example).........................................................................................................32
Configurable Trunk Hash algorithm......................................................................................................................34
Link Aggregation Control Protocol........................................................................................................................35
Configuring LACP ...........................................................................................................................................36
VLANs
Introduction...........................................................................................................................................................37
Overview...............................................................................................................................................................37
VLANs and port VLAN ID numbers ...................................................................................................................... 37
VLAN numbers................................................................................................................................................37
PVID numbers.................................................................................................................................................37
Viewing and configuring PVIDs.......................................................................................................................38
VLAN tagging .......................................................................................................................................................38
VLANs and IP interfaces ......................................................................................................................................41
VLAN topologies and design considerations........................................................................................................41
VLAN configuration rules ................................................................................................................................41
Multiple VLANS with tagging ................................................................................................................................ 42
Configuring the example network....................................................................................................................43
FDB static entries .................................................................................................................................................48
Trunking support for FDB static entries...........................................................................................................48
Configuring a static FDB entry ........................................................................................................................48
Spanning Tree Protocol
Introduction...........................................................................................................................................................49
Overview...............................................................................................................................................................49