Handbook

N8406-022A 1Gb Intelligent L2 Switch Application Guide 3
Contents
Accessing the switch
Introduction ............................................................................................................................................................. 6
Additional references .............................................................................................................................................. 6
Typographical conventions ..................................................................................................................................... 6
Management Network ............................................................................................................................................ 7
Connecting through the console port ................................................................................................................ 7
Connecting through Telnet ................................................................................................................................ 7
Connecting through Secure Shell ..................................................................................................................... 7
Using the command line interfaces ........................................................................................................................ 8
Configuring an IP interface ................................................................................................................................ 8
Using the Browser-based Interface ........................................................................................................................ 9
Using Simple Network Management Protocol ........................................................................................................ 9
SNMP v1.0 ........................................................................................................................................................ 9
SNMP v3.0 ...................................................................................................................................................... 10
Default configuration ....................................................................................................................................... 10
User configuration ........................................................................................................................................... 10
View based configurations .............................................................................................................................. 11
Configuring SNMP trap hosts.......................................................................................................................... 12
Secure access to the switch ................................................................................................................................. 14
Setting allowable source IP address ranges ................................................................................................... 14
RADIUS authentication and authorization ....................................................................................................... 14
TACACS+ authentication ................................................................................................................................ 19
Secure Shell and Secure Copy ....................................................................................................................... 24
User access control .............................................................................................................................................. 28
Setting up user IDs .......................................................................................................................................... 28
Ports and trunking
Introduction ........................................................................................................................................................... 29
Ports on the switch ............................................................................................................................................... 29
Port trunk groups .................................................................................................................................................. 29
Statistical load distribution ............................................................................................................................... 30
Built-in fault tolerance ...................................................................................................................................... 30
Before you configure trunks .................................................................................................................................. 30
Trunk group configuration rules ............................................................................................................................ 30
Port trunking example ........................................................................................................................................... 31
Configuring trunk groups (AOS CLI example) ................................................................................................. 32
Configuring trunk groups (BBI example) ......................................................................................................... 33
Configurable Trunk Hash algorithm ...................................................................................................................... 35
Link Aggregation Control Protocol ........................................................................................................................ 36
Configuring LACP ........................................................................................................................................... 37
VLANs
Introduction ........................................................................................................................................................... 38
Overview ............................................................................................................................................................... 38
VLANs and port VLAN ID numbers ...................................................................................................................... 38
VLAN numbers ................................................................................................................................................ 38
PVID numbers ................................................................................................................................................. 38
Viewing and configuring PVIDs ....................................................................................................................... 39
VLAN tagging ....................................................................................................................................................... 39
VLANs and IP interfaces ...................................................................................................................................... 42
VLAN topologies and design considerations ........................................................................................................ 42
VLAN configuration rules ................................................................................................................................ 42
Multiple VLANS with tagging ................................................................................................................................ 43
Configuring the example network .................................................................................................................... 44
FDB static entries ................................................................................................................................................. 51
Trunking support for FDB static entries ........................................................................................................... 51
Configuring a static FDB entry ........................................................................................................................ 51
Spanning Tree Protocol
Introduction ........................................................................................................................................................... 52
Overview ............................................................................................................................................................... 52
Bridge Protocol Data Units ................................................................................................................................... 52