User Manual
Table Of Contents
- M4200 and M4300 Series ProSAFE Managed Switches
- Contents
- 1. Getting Started
- 2. Configure System Information
- Initial Setup
- Configure the Initial IPv4 Management VLAN
- Configure the Initial IPv6 Management VLAN
- Configure the Initial Service Port Settings
- View or Define System Information
- View the Fan Status
- View the Temperature Sensor Information
- View the Device Status
- View the System CPU Status
- Configure the CPU Thresholds
- View and Clear Switch Statistics
- View USB Device Information
- View Slot Information
- Configure a Loopback Interface
- Configure Management Interfaces
- Management VLAN Overview
- Time
- Configure DNS Settings
- Configure the Switch Database Management Template Preference
- Configure Green Ethernet Settings
- Configure DHCP Server Settings
- DHCP L2 Relay
- Manage the DHCPv6 Server
- Configure PoE
- Configure SNMP
- Configure LLDP
- Configure LLDP Global Settings
- Configure the LLDP Interface
- View LLDP Statistics
- View LLDP Local Device Information
- View LLDP Remote Device Information
- View LLDP Remote Device Inventory
- Configure LLDP-MED Global Settings
- Configure LLDP-MED Interface
- View LLDP-MED Local Device Information
- View LLDP-MED Remote Device Information
- View LLDP-MED Remote Device Inventory
- Configure Link Dependency
- Configure ISDP
- Timer Schedule
- Initial Setup
- 3. Stacking
- M4300 Series Switch Stacking Overview
- Firmware Synchronization and Upgrade
- Stack Configuration Maintenance
- Stack Master Election
- Stack Factory Defaults Reset Behavior
- Stack NSF
- Configure a Stack
- Run Stack Port Diagnostics
- Configure Stack Firmware Synchronization
- View NSF Summary Data
- View NSF Checkpoint Statistics
- 4. Configure Switching Information
- Configure VLANs
- Configure Basic VLAN Settings
- Reset the VLAN Configuration to Default Setting
- Configure an Internal VLAN
- Configure VLAN Trunking
- Configure VLAN Membership
- View VLAN Status
- Configure Port PVID Settings
- Configure a MAC-Based VLAN
- Configure Protocol-Based VLAN Groups
- Configure Protocol-Based VLAN Group Membership
- Configure an IP Subnet-Based VLAN
- Configure a Port DVLAN
- Configure a Voice VLAN
- Configure GARP Switch Settings
- Configure GARP Port
- Auto-VoIP
- iSCSI Overview
- Spanning Tree Protocol
- Multicast
- View the MFDB Table
- View the MFDB Statistics
- IGMP Snooping
- Configure IGMP Snooping
- Configure IGMP Snooping for Interfaces
- Configure IGMP Snooping for VLANs
- Configure a Multicast Router
- Configure a Multicast Router VLAN
- IGMP Snooping Querier Overview
- Configure IGMP Snooping Querier
- Configure IGMP Snooping Querier for VLANs
- Configure MLD Snooping
- Configure a MLD Snooping Interface
- Configure MLD VLAN Settings
- Enable or Disable a Multicast Router on an Interface
- Configure Multicast Router VLAN Settings
- Configure MLD Snooping Querier
- Configure MLD Snooping Querier VLAN Settings
- Configure MVR
- MAC Address Table
- Port Settings
- Link Aggregation Groups
- Multiple Registration Protocol Overview
- Loop Protection
- Configure VLANs
- 5. Routing
- 6. OSPF and OSPFv3
- Configure OSPF
- Configure Basic OSPF Settings
- Configure the OSPF Default Route Advertise Settings
- Configure OSPF Settings
- Configure the OSPF Common Area ID
- Configure the OSPF Stub Area
- Configure the OSPF NSSA Area
- Configure the OSPF Area Range
- Configure the OSPF Interface
- View and Clear OSPF Statistics for an Interface
- View and the OSPF Neighbor Table and Clear OSPF Neighbors
- View the OSPF Link State Database
- Configure the OSPF Virtual Link
- Configure the OSPF Route Redistribution
- View the NSF OSPF Summary
- Configure OSPFv3
- Configure Basic OSPFv3 Settings
- Configure OSPFv3 Default Route Advertise Settings
- Configure the Advanced OSPFv3 Settings
- Configure the OSPFv3 Common Area
- Configure an OSPFv3 Stub Area
- Configure the OSPFv3 NSSA Area
- Configure the OSPFv3 Area Range
- Configure the OSPFv3 Interface
- View and Clear OSPFv3 Interface Statistics
- View the OSPFv3 Neighbor Table and Clear OSPFv3 Neighbors
- View the OSPFv3 Link State Database
- Configure the OSPFv3 Virtual Link
- Configure OSPFv3 Route Redistribution
- View the NSF OSPFv3 Summary
- Configure OSPF
- 7. Multicast Routing
- Multicast Overview
- Configure Multicast IGMP Settings
- Configure PIM Settings
- Configure the Multicast PIM Global Settings
- Configure PIM SSM Settings
- Configure PIM Interface
- View the PIM Neighbor
- View the PIM Candidate Rendezvous Point
- View the PIM Neighbor
- Configure the PIM Candidate Rendezvous Point
- Configure the PIM Bootstrap Router Candidate
- Configure the PIM Static Rendezvous Point
- Configure Multicast Static Routes
- Configure the Multicast Admin Boundary
- Configure IPv6 Multicast Settings
- View the IPv6 Multicast Mroute Table
- Configure the IPv6 PIM Global Settings
- Configure IPv6 PIM SSM
- Configure the IPv6 PIM Interface
- View the IPv6 PIM Neighbor
- Configure the IPv6 PIM Candidate Rendezvous Point
- Configure the IPv6 PIM Bootstrap Router Candidate Settings
- Configure the IPv6 PIM Static Rendezvous Point
- Configure IPv6 MLD Global Settings
- Configure the IPv6 MLD Routing Interface
- View IPv6 MLD Routing Interface Statistics
- View the IPv6 MLD Groups
- View and Clear IPv6 MLD Traffic
- Configure the IPv6 MLD Proxy Interface
- View IPv6 MLD Proxy Interface Statistics
- View the IPv6 MLD Proxy Membership
- Configure IPv6 Multicast Static Routes
- 8. Configure Quality of Service
- 9. Manage Device Security
- Manage User Accounts and Passwords
- Manage the RADIUS Server Settings
- Manage the TACACS Settings
- Configure Authentication Lists
- View Login Sessions
- Manage HHTP, HTTPS, and SSH Access
- Configure Telnet Access
- Configure Console Port Access
- Configure Denial of Service Settings
- Configure Access Control Settings
- Manage Port Authentication
- Control Traffic With MAC Filtering
- Configure Port Security and Private Groups
- Protect Ports
- Set Up Private VLANs
- Manage the Storm Control Settings
- Configure DHCP Snooping
- Configure IP Source Guard Interfaces
- Configure Dynamic ARP Inspection
- Set Up Captive Portals
- Set Up and Manage Access Control Lists
- Use the ACL Wizard to Create a Simple ACL
- Configure an ACL Based on Destination MAC Address
- Use the ACL Wizard to Complete the Destination MAC ACL
- Configure a Basic MAC ACL
- Configure MAC ACL Rules
- Configure MAC Binding
- View and Delete MAC ACL Bindings in the MAC Binding Table
- Configure an IP ACL
- Configure Rules for an IP ACL
- Configure Rules for an Extended IP ACL
- Configure an IPv6 ACL
- Configure IPv6 Rules
- Configure IP ACL Interface Bindings
- View and Delete IP ACL Bindings in the IP ACL Binding Table
- Configure VLAN ACL Bindings
- 10. Monitor the System
- 11. Maintenance and Troubleshooting
- A. Default Settings
- B. Configuration Examples
- C. Acronyms and Abbreviations
Configuration Examples
684
M4200 and M4300 Series ProSAFE Managed Switches Web Management User Manual
4. From the IP Rules page, create a second rule for IP ACL 1 with the following settings:
• Rule ID: 2
• Action: Permit
• Match Every: True
5. Click the Add button.
6. From the IP Binding Configuration page, assign ACL ID 1 to the interface gigabit ports 2, 3,
and 4, and assign a sequence number of 1 (See Configure IP ACL Interface Bindings on
page 610).
By default, this IP ACL is bound on the inbound direction, so it examines traffic as it
enters the switch.
7. Click the Apply button.
8. Use the IP Binding Table page to view the interfaces and IP ACL binding information (See
View and Delete IP ACL Bindings in the IP ACL Binding Table on page 612).
The IP ACL in this example matches all packets with the source IP address and subnet mask
of the Finance department's network and deny it on the Ethernet interfaces 2, 3, and 4 of the
switch. The second rule permits all non-Finance traffic on the ports. The second rule is
required because there is an explicit deny all rule as the lowest priority rule.
Differentiated Services (DiffServ)
Standard IP-based networks are designed to provide best effort data delivery service. Best
effort service implies that the network deliver the data in a timely fashion, although there is no
guarantee that it will. During times of congestion, packets might be delayed, sent
sporadically, or dropped. For typical Internet applications, such as e-mail and file transfer, a
slight degradation in service is acceptable and in many cases unnoticeable. However, any
degradation of service has undesirable effects on applications with strict timing requirements,
such as voice or multimedia.
Quality of Service (QoS) can provide consistent, predictable data delivery by distinguishing
between packets with strict timing requirements from those that are more tolerant of delay.
Packets with strict timing requirements are given special treatment in a QoS-capable
network. With this in mind, all elements of the network must be QoS-capable. If one node
cannot meet the necessary timing requirements, this creates a deficiency in the network path
and the performance of the entire packet flow is compromised.
There are two basic types of QoS:
• Integrated Services: network resources are apportioned based on request and are
reserved (resource reservation) according to network management policy (RSVP, for
example).
• Differentiated Services: network resources are apportioned based on traffic classification
and priority, giving preferential treatment to data with strict timing requirements.