The hardware, firmware, or software described in this document is subject to change without notice. Spanning Tree Basics Figure 15-8 MSTI 1 in a Region CIST Root 1 MSTI 1 2 5 MST CIST Regional Root 3 4 MSTI 1 Regional Root Legend: Physical Link Blocked VLANs Figure 15-9 MSTI2 in the Same Region MSTI 2 1 5 MST CIST Regional Root 3 2 MSTI 2 Regional Root 4 Legend: Physical Link Blocked VLANs Figure 15-10 on page 15-19 shows 3 regions with five MSTIs. Telnet Overview identifier configured in this example must be 01:00:01:22:33:44:55. DHCPv6 Configuration Relay Remote ID Option Flags Procedure 25-7 on page 25-17 describes the tasks to configure a Fixed Switch interface as a DHCPv6 server. The trap generation will be done using the Enterasys Syslog Client MIB notification etsysSyslogSecureLogDroppedMsgNotification. Configuration Guide. Understanding and Configuring Loop Protect Figure 15-15 Basic Loop Protect Scenario Figure 15-16 shows that, without Loop Protect, a failure could be as simple as someone accidentally disabling Spanning Tree on the port between Switch 2 and 3. 11 Configuring Link Aggregation This chapter describes how to configure link aggregation on the fixed switch platforms. Password Reset Button Functionality Procedure 5-3 Configuring System Password Settings (continued) Step Task Command(s) 2. SEVERABILITY. Table 15-2 provides a summary of STP port roles. Configuration To configure this switch, use a serial terminal connection to its console port. Enable or disable Telnet services, inbound, outbound, or all. Configuring ACLs Port-string ----------ge.1.29 Access-list ----------121 Configuring ACLs This section provides procedures and examples for configuring IPv4, IPv6, and MAC ACLs. UsethiscommandtodisplaythesystemIPaddressandsubnetmask. Go to the website "www.enterasys.com" and download proper firmware from the download library. Procedure 5-1 Creating a New Read-Write or Read-Only User Account Step Task Command(s) 1. ieee The Enterasys device uses only the IEEE 802. Configuring Authentication Note: User + IP Phone authentication is not supported on the I-Series With User + IP Phone authentication, the policy role for the IP phone is statically mapped using a policy admin rule which assigns any frames received with a VLAN tag set to a specific VID (for example, Voice VLAN) to a specified policy role (for example, IP Phone policy role). Set the minimum rate (in packets per second) of transmitted packets in a sampling interval. UsethiscommandtodisplaySNMPtrafficcountervalues. A feature exists to allow the creation of a single port LAG that is disabled by default. ACLs on the A4 are described separately in this chapter since ACL support on the A4 is different from the support on the other Fixed Switch platforms. Configuring Authentication Procedure 10-1 IEEE 802.1x Configuration (continued) Step Task Command(s) 2. In interface configuration mode, configure an IP address for all routing interfaces in the AS. 1.6 IP-PBX Info x.x.x.x x.x.x.x x.x.x.x Info x.x.x.x x.x.x.x x.x.x.x x.x.x. DHCP Snooping ------set system service-acl my-sacl deny ip-source 192.168.10.10 mask 255.255.255.255 service ssh priority 1 set system service-acl my-sacl permit port ge.1.1 priority 2 set system service-acl my-sacl permit port ge.1.2 priority 3 set system service-acl my-sacl permit ip-source 10.10.22. The forward delay interval is the amount of time spent listening for topology change information after an interface has been activated for bridging and before forwarding actually begins. By default, RIP version 2 supports automatic route summarization, which summarizes sub-prefixes to the classful network boundary when crossing network boundaries. MAC Address Settings Aging time: 600 seconds Limiting MAC Addresses to Specific VLANs Use the set mac multicast command to define on what ports within a VLAN a multicast address can be dynamically learned on, or on what ports a frame with the specified MAC address can be flooded. Diffserv Disabled. UsethiscommandtodisplaythecontentsoftheNeighborCache. 3. Create a VLAN and add ports to the VLAN. Event type, description, last time event was sent. Use the set system lockout command to: Set the number of failed login attempts allowed before disabling a read-write or read-only user account or locking out a super-user account. If LAG members with different port speeds should tie for the lowest port priority, the LAG member with the lowest port number breaks the tie. However, Enterasys Networks strongly recommends that you use NetSight Policy Manager, not CLI commands, to configure policy in your network. If so, this door is tagged or bound to the notification entry. This guest policy provides for an internet-only access to the network. . After setting the index and IP address you are prompted to enter a secret value for this authentication server. Enterasys SecureStack B3. You can configure ports to only use MDI or MDIX connections with the set port mdix command. Set the Tunnel-Private-Group-ID attribute parameters as follows: Type: Set to 81 for Tunnel-Private-Group-ID RADIUS attribute Length: Set to a value greater than or equal to 3. IRDP Disabled on all interfaces. When a packet is received, the packet is mapped to a CoS index based on the packet 802.1 priority, port, and policy role, if a policy role is present. Advanced Configuration Overview Procedure 4-1 contains the steps to assign an IP address and configure basic system parameters. Authentication Header (AH) mode is not supported. DHCPv6 Configuration Default Conditions The following table lists the default DHCPv6 conditions. RSTP provides rapid connectivity following the failure of a switching device, switch port, or the addition of a switch into the network. (Optional) Specify the method the Enterasys device uses to detect connected PDs. Figure 10-4 provides an overview of the fixed switch authentication configuration. 2. (The ports are in the ConfigMismatch state.) TACACS+ Basic TACACS+ Configuration Procedure 26-4 describes the basic steps to configure TACACS+ on Enterasys devices. With this operation, an SNMP manager does not need to know the exact variable name. Ctrl+D Delete a character. This configuration requires a charging circuit to charge the DC capacitors of the modules in a controlled way. Configuring RIP Procedure 21-1 Basic RIP Configuration (continued) Step Task Command(s) 3. By convention, the higher the port speed, the lower the port cost. Factory Default Settings Table 4-1 Default Settings for Basic Switch Operation (continued) Feature Default Setting Console (serial) port required settings Baud rate: 9600 Data bits: 8 Flow control: disabled Stop bits: 1 Parity: none DHCP server Disabled. Configuring PoE Procedure 7-2 PoE Configuration for Stackable B5 and C5 Devices (continued) Step Task Command(s) 6. Refer to Getting Help Getting Help For additional support, contact Enterasys Networks using one of the following methods: World Wide Web www.enterasys.com/support Phone 1-800-872-8440 (toll-free in U.S. and Canada) or 1-978-684-1000 To find the Enterasys Networks Support toll-free number in your country: www.enterasys.com/support Email [email protected] To expedite your message, type [switching] in the subject line. Port Traffic Rate Limiting You can mix WRR and SP by assigning SP to the higher numbered queues and assigning WRR to the lower numbered queues, making sure that the values assigned to the WRR queues totals 100 percent. ip route dest-prefix dest-prefixmask forwarding-rtr-addr [distance] 2. Apply power to the new unit. Management Authentication Notification MIB Functionality Refer to the CLI Reference for your platform for detailed information about the commands listed below in Procedure 5-4. Guest networking allows an administrator to specify a set of credentials that will, by default, appear on the PWA login page of an end station when a user attempts to access the network. ACL Configuration Overview IPv6 Rules For IPv6 rules, IPv6 source and destination addresses and prefix length are specified, or the any option can be used. Ports used to authenticate and authorize supplicants utilize access entities that maintain entity state, counters, and statistics for an individual supplicant. Hardware troubleshooting and replace when it was necessary. 1.4 IP phone ge. show dot1x auth-session-stats 3. then assign the ports you want in each vlan. The Class of Service capability of the device is implemented by a priority queueing mechanism. If the address is a multicast or link-local address, then you must also specify the interface to be used to contact the DHCPv6 server. Enterasys matrix c2 c2k122-24: release note (41 pages), Gigabit and fast ethernet switches (78 pages), Enterasys securestack c2 c2g124-48p: install guide (82 pages), Enterasys securestack c2 c2g170-24: install guide (74 pages), C-series c3 policy-based gigabit ethernet stackable l2/l3/l4 edge switch (9 pages), Gigabit and fast ethernet switches (80 pages), Roamabout wireless switch 8xx0 (28 pages), Enterasys networks switch hardware installation guide (90 pages), Enterasys securestack a2 a2h123-24: install guide (64 pages), Manual will be automatically added to "My Manuals", Saving the Configuration and Connecting Devices, Installing a New Stackable System of up to Eight Units, Installing Previously-Configured Systems in a Stack, Considerations about Using "Clear Config" in a Stack, When Uplink Ports Are Configured as Ethernet Ports, Using an Administratively Configured User Account, Default Settings for Basic Switch Operation, Applying Non-Node-Locked Licenses in a Stack, DHCP Configuration on a Non-Routing System, Managing and Displaying DHCP Server Parameters, User Account and Password Parameter Defaults by Security Mode, Management Authentication Notification MIB Functionality, Displaying and Saving the Configuration and Creating a Backup, Poe Settings Supported on Enterasys Devices, GARP VLAN Registration Protocol (GVRP) Support, Configuring Protocol-Based VLAN Classification, Applying Policy to Multiple Users on a Single Port, Authenticating Multiple Users with Different Methods on a Single Port, Remote Authentication Dial-In Service (RADIUS), Selecting Authentication Method When Multiple Methods Are Validated, Configuring Port Web Authentication (PWA), Optionally Enable Guest Network Privileges, PWA Guest Networking Privileges Configuration, Setting Multiauth Authentication Precedence, Setting Multiauth Authentication Port Properties, Displaying Multiauth Configuration Information, Displaying Multiauth Authentication Configuration, Configuring User + IP Phone Authentication, Stackable Fixed Switch Authentication Configuration Example Overview, Creating RADIUS User Accounts on the Authentication Server, Configuring the Engineering Group 802.1X End-User Stations, Configuring the Printer Cluster for MAC-Based Authentication, Authentication Configuration Terms and Definitions, Displaying Link Aggregation Information and Statistics, LAG and Physical Port Admin Key Assignments, Link Aggregation Configuration Terms and Definitions, Network Router Enterasys C5G124-24 Quick Reference, Switch Enterasys Matrix C2 C2K122-24 Release Note, Switch Enterasys SecureStack C2 C2G124-24 Hardware Installation Manual, Switch Enterasys SecureStack C2 C2G124-48P Hardware Installation Manual, Switch Enterasys SecureStack C3K122-24 Hardware Installation Manual, Switch Enterasys SecureStack C2 C2G170-24 Hardware Installation Manual, Switch Enterasys SecureStack C2 C2G170-24 Configuration Manual, Switch Enterasys SecureStack C3 C3G124-24 Datasheet, Switch Enterasys C3G124-24 Configuration Manual, Switch Enterasys SECURESTACK C3 Configuration Manual, Switch Enterasys SecureStack C2 Configuration Manual, Switch Enterasys Enterasys SecureStack B2 B2G124-24 Hardware Installation Manual, Switch Enterasys Enterasys RoamAbout RBT-1002-EU Release Notes, Switch Enterasys Enterasys Gold Distributed Forwarding Engine 4G4282-49 Hardware Installation Manual, Switch Enterasys SecureStack A2 A2H123-24 Hardware Installation Manual, Switch Enterasys Enterasys 6H308-48 Hardware Installation Manual, Page 32: Setting User Accounts And Passwords, Page 34: Configuring A Stack Of New Switches, Page 39: About Switch Operation In A Stack, Page 41: Installing Previously-Configured Systems In A Stack, Page 42: Removing Units From An Existing Stack, Page 44: Configuring Standalone A4 Stack Ports, Page 46: Connecting Using The Console Port, Page 51: Example Cli Properties Configuration, Page 56: Default Settings For Router Operation, Page 62: Applying Node-Locked Licenses In A Stack, Page 63: Adding A New Member To A Licensed Stack, Page 70: Dhcp Configuration On A Non-Routing System, Page 72: Managing And Displaying Dhcp Server Parameters, Page 73: Configuring Dhcp Ip Address Pools, Page 75: Configuring Additional Pool Parameters, Page 77: Limiting Mac Addresses To Specific Vlans, Page 81: Chapter 5: User Account And Password Management, Page 88: System Password Settings Configuration, Page 89: Password Reset Button Functionality, Page 91: Chapter 6: Firmware Image And File Management, Page 92: Downloading From A Tftp Or Sftp Server, Page 99: Chapter 7: Configuring System Power And Poe, Page 103: Stackable A4, B3, And C3 Devices, Page 112: Auto-Negotiation And Advertised Ability, Page 117: Basic Link Flap Detection Configuration, Page 119: Link Flap Detection Display Commands, Page 122: Configuring Remote Port Mirroring, Page 123: Configuring Smon Mib Port Mirroring, Page 127: Preparing For Vlan Configuration, Page 130: Vlan Support On Enterasys Switches, Page 137: Configuring Protocol-Based Vlan Classification, Page 141: Chapter 10: Configuring User Authentication, Page 142: Implementing User Authentication, Page 145: Applying Policy To Multiple Users On A Single Port, Page 146: Authenticating Multiple Users With Different Methods On A Single Port, Page 147: Remote Authentication Dial-In Service (Radius), Page 155: Configuring Mac-Based Authentication, Page 156: Configuring Port Web Authentication (Pwa), Page 157: Optionally Enable Guest Network Privileges, Page 158: Setting Multiauth Authentication Precedence, Page 159: Setting Multiauth Authentication Timers, Page 160: Displaying Multiauth Configuration Information, Page 162: Configuring User + Ip Phone Authentication, Page 165: Authentication Configuration Example, Page 166: Configuring Multiauth Authentication, Page 167: Configuring The Printer Cluster For Mac-Based Authentication, Page 168: Configuring The Public Area Pwa Station, Page 171: Chapter 11: Configuring Link Aggregation, Page 177: Single Port Attached State Rules, Page 181: Link Aggregation Configuration Example, Page 183: Lag And Physical Port Admin Key Assignments, Page 184: Configuring The S8 Distribution Switch, Page 196: Adding To Or Modifying The Default Configuration, Page 199: Configuring An Snmpv3 Inform Or Trap Engine Id, Page 201: Configuring Secure Snmp Community Names, Page 205: Chapter 13: Configuring Neighbor Discovery, Page 207: Communication Between Lldp-Enabled Devices, Page 215: Example Enterasys Discovery Protocol Configuration, Page 216: Cisco Discovery Protocol Configuration Commands, Page 221: Syslog Components And Their Use, Page 227: About Server And Application Severity Levels, Page 228: Modifying Syslog Server Defaults, Page 229: Displaying Current Application Severity Levels, Page 235: Multiple Spanning Tree Overview, Page 236: Functions And Features Supported On Enterasys Devices, Page 241: Root Port Selection Based On Lowest Port Id, Page 242: Identifying Designated, Alternate, And Backup Port Roles, Page 246: Multiple Spanning Tree Instances (Msti), Page 250: Reviewing And Enabling Spanning Tree, Page 251: Setting Bridge Priority Mode And Priority, Page 253: Enabling The Backup Root Function, Page 255: Example 1: Configuring Mstp For Traffic Segregation, Page 256: Traffic Segregation In An Mstp Network Configuration, Page 257: Example 2: Configuring Mstp For Maximum Bandwidth Utilization, Page 261: Monitoring Spanguard Status And Settings, Page 264: Enabling Or Disabling Loop Protect, Page 265: Enabling Or Disabling Loop Protect Event Notifications, Page 270: Standard And Enhanced Policy On Enterasys Platforms, Page 271: Understanding Roles In A Secure Network, Page 272: Setting A Default Vlan For A Role, Page 274: Policy Rule Traffic Descriptions/Classifications, Page 279: Displaying Policy Configuration And Statistics, Page 283: Configuring Guest Policy On Edge Platforms, Page 284: Configuring Phonefs Policy For The Edge Fixed Switch, Page 285: Configuring Policy For The Edge Faculty Fixed Switch, Page 287: Chapter 17: Configuring Quality Of Service, Page 291: Cos Settings Reference To Port Resource Mapping, Page 292: Preferential Queue Treatment For Packet Forwarding, Page 301: Port Priority And Transmit Queue Configuration, Page 305: Chapter 18: Configuring Network Monitoring, Page 321: Chapter 19: Configuring Multicast, Page 323: Igmp Support On Enterasys Devices, Page 324: Example: Sending A Multicast Stream, Page 325: Distance Vector Multicast Routing Protocol (Dvmrp), Page 331: Protocol Independent Multicast (Pim), Page 333: Pim Support On Enterasys Devices, Page 336: Layer 2 Igmp Configuration Commands, Page 346: Entering Router Configuration Modes, Page 357: Chapter 21: Ipv4 Basic Routing Protocols, Page 369: Configuring The Designated Router, Page 371: Configuring The Administrative Distance For Ospf Routes, Page 375: Configuring A Not So Stubby Area (Nssa), Page 378: Configuring Area Virtual-Link Authentication, Page 380: Configuring Ospf Interface Timers, Page 383: Managing And Displaying Ospf Configuration And Statistics, Page 390: Multiple Backup Vrrp Configuration, Page 393: Using Access Control Lists (Acls) In Your Network, Page 407: Chapter 25: Configuring And Managing Ipv6, Page 411: Setting Routing General Parameters, Page 412: Enabling An Interface For Ipv6 Routing, Page 419: Neighbor Discovery Configuration, Page 427: Security Mode And User Authentication And Passwords, Page 428: Security Mode And File Management, Page 430: Radius Management Authentication, Page 441: Restricting Management Access To The Console Port, Page 443: Building And Maintaining The Database. Any such invalidity, illegality, or unenforceability in any jurisdiction shall not invalidate or render illegal or unenforceable such provision in any other jurisdiction. Using Multicast in Your Network Figure 19-4 PIM Traffic Flow 7 3 1 DR RP Source 5 4 2 6 Last Hop Router Receiver 1. This is useful for troubleshooting or problem solving when network management through the console port, telnet, or SSH is not feasible. Valid sid values are 04094. Thefollowingtabledescribestheoutputofthiscommand. set maclock agefirstarrival port-string enable Use either the set maclock agefirstarrival disable or clear maclock firstarrival commands to disable aging. By default, all applications running on the Enterasys switch are allowed to forward Syslog messages generated at severity levels 6 through 1. Save the running configuration. DHCP Configuration Procedure 4-5 DHCP Server Configuration on a Routing System Step Task Command(s) 1. 4 - Load new operational code using XMODEM 5 - Display operational code vital product data 6 - Run Flash Diagnostics 7 - Update Boot Code 8 - Delete operational code 9 - Reset the system 10 - Restore Configuration to factory defaults (delete config files) 11 - Set new Boot Code password [Boot Menu] 2 5. Configuring PIM-SM on the device and on the VLANs. Display the current IPsec settings. Refer to page Configuring RIP 21-1 Configuring IRDP 21-5 Configuring RIP Using RIP in Your Network The fixed switches support Routing Information Protocol (RIP) Version 1 and 2. Configuring IGMP Table 19-3 Layer 2 IGMP Configuration Commands Task Command Enable or disable IGMP on the system. Using PuTTY, TeraTerm, or another terminal emulator, connect to the switch using the serial port connection. Terms and Definitions LoopProtect Lock status for port lag.0.2, SID 56_ is UNLOCKED Enterasys->show spantree lpcapablepartner port lag.0.2 Link partner of port lag.0.2_is LoopProtect-capable. User Authentication Overview devices that do not support 802.1x or web authentication. On the S-Series, N-Series, and K-Series switches, you can also manually configure the maximum percentage of PoE power available to the chassis as a percentage of the total installed PoE power with the set inlinepower available command. set snmp targetaddr targetaddr ipaddr param param [udpport udpport] [mask mask] [timeout timeout] [retries retries] [taglist taglist] [volatile | nonvolatile] If not specified, udpport will be set to 162. Port Configuration Overview Auto-Negotiation and Advertised Ability Auto-negotiation is an Ethernet feature that facilitates the selection of port speed, duplex, and flow control between the two members of a link, by first sharing these capabilities and then selecting the fastest transmission mode that both ends of the link support. If Spanning Tree is disabled globally all linked ports will be in a forwarding state and the Spanning Tree Protocol will not run. Use the set sntp trustedkey command to add an authentication key to the trusted key list. The creation of additional port groups could be used to combine similar ports by their function for flexibility. If Router R1 should become unavailable, Router R2 would take over virtual router VRID 1 and its associated IP addresses. SNTP Configuration Procedure 4-2 Configuring SNTP (continued) Step Task Command(s) 3. Policy Configuration Example Configuring Guest Policy on Edge Platforms All edge ports will be set with a default guest policy using the set policy port command. Remote port mirroring involves configuration of the following port mirroring related parameters: 1. Configuring OSPF Areas Example Figure 22-5 OSPF NSSA Topology Area 1 RIP Backbone Router 1 Router 2 Router 3 Router 4 Router 5 Using the topology shown in Figure 22-5, the following code examples will configure Router 2 as the ABR between Area 1 and the backbone area 0. Configuring CLI Properties Table 3-2 CLI Properties Configuration Commands (continued) Task Command Set the time (in minutes) an idle console or Telnet set logout timeout CLI session will remain connected before timing out. Thisexampleshowshowtodisplaythelinkflapparameterstable: Tabl e 74providesanexplanationoftheshowlinkflapparameterscommandoutput. Default settings are listed in Table 15-6: Table 15-6 Spanning Tree Port Default Settings Setting Default Value Bridge priority mode 802. If single port LAG is enabled, a single port LAG can be created on this device. Displaying Scrolling Screens If the CLI screen length has been set using the set length command, CLI output requiring more than one screen will display --More-- to indicate continuing screens. area area-id virtual-link router-id Refer to Configuring Area Virtual-Links on page 22-12 for more information. I have over twenty years of experience working in the Information Systems Management field. Globally: Disabled. Configuring RIP on page 21-1 Configure OSPFv2. Configuring Port Link Flap Detection Procedure 8-1 Configuring SFP Ports for 100BASE-FX Step Task Command(s) 4. RADIUS Management Authentication Procedure 26-2 Configuring IPsec Step Task Command(s) 1. Forwarding is enabled by default ipv6 forwarding Set the value of the hop limit field in IPv6 packets originated by this device. Can be no less than the max advertisement interval. Table 14-1 Syslog Terms and Definitions Term Definition Enterays Usage Facility Categorizes which functional process is generating an error message. TACACS+ Procedure 26-3 MAC Locking Configuration (continued) Step Task Command(s) 7. Optionally, set the GARP join, leave, and leaveall timer values. Dynamic VLAN authorization is not reflected in the show port vlan display. Configuring SNMP enterasys(su)->set snmp view viewname RW subtree 0.0 enterasys(su)->set snmp view viewname RW subtree 1.3.6.1.6.3.13.1 excluded enterasys(su)->set snmp targetparams TVv1public user public security-model v1 message processing v1 enterasys(su)->set snmp targetaddr TVTrap 10.42.1.10 param TVv1public taglist TVTrapTag enterasys(su)->set snmp notify TVTrap tag TVTrapTag Adding to or Modifying the Default Configuration By default, SNMPv1 is configured on Enterasys switches. (See Overview on page 18-12 for more information.) Enterasys Switch: List of Devices # Model Type of Document; 1: Enterasys I3H252: Enterasys Switch I3H252 Hardware installation manual (78 pages) 2: Enterasys I Series: Configuring Syslog Note: The set logging local command requires that you specify both console and file settings. Configuring IRDP Table 21-3 IRDP Default Values (continued) Parameter Description Default Value advertisement holdtime The length of time this advertised address should be considered valid. Testing Network Connectivity Configuring Static Routes Procedure 20-3 lists the commands to configure a static route. = [ ] \ ; ? About Security Audit Logging The secure.log file stored in the secure/logs directory cannot be deleted, edited, or renamed. Using the viewnames assigned in Step 1, create restricted views for v1/v2c users, and unrestricted views for v3 users. Procedure 12-1 New SNMPv1/v2c Configuration Step Task Command(s) 1. Start the TFTP application. Note: Globally enabling 802.1x on a switch sets the port-control type to auto for all ports. Configuring DVMRP Basic DVMRP Configuration By default, DVMRP is disabled globally and on each interface. routing interface A VLAN or loopback interface configured for IP routing. ARP responses are unicast toward their destination. Connect the Switch to PuTTY. 2. When a faculty member authenticates through the RADIUS server, the name of the faculty policy is returned in the RADIUS Access-Accept response message and that policy is applied by the switch to the faculty user. DHCPv6 Configuration address, a multicast address, or a link-local address. 3. SNMP Support on Enterasys Switches Table 12-1 SNMP Message Functions (continued) Operation Function get-response Replies to a get-request, get-next-request, and set-request sent by a management station. Router R1 Router 1(su)->router(Config)#interface vlan 111 Router 1(su)->router(Config-if(Vlan 111))#ip address 172.111.1.1 255.255.255. For example, you could assign WRR to queues 0 through 4 by assigning 20 percent to each of those queues, and then setting queue 5 to SP. Table 11-3 lists link aggregation parameters and their default values. A6500-RC EMERSON16-Channel Output Relay, EMERSON, ACS880 frame size R8i inverter modules can be connected to the drive DC bus through a disconnector (or fuse-switch). Fiber ports always have a status of MDIX. Syslog Components and Their Use The following sections provide greater detail on modifying key Syslog components to suit your enterprise. SNMP Support on Enterasys Switches Versions Supported Enterasys devices support three versions of SNMP: Version 1 (SNMPv1) This is the initial implementation of SNMP. set inlinepower detectionmode {auto | ieee} auto (default) The Enterasys device first uses the IEEE 802.3af/at standards resistorbased detection method. After you have properly configured the switch, and started Enterasys WebView, you can perform any of the tasks described in the following sections. Quality of Service Overview Figure 17-4 Hybrid Queuing Packet Behavior Rate Limiting Rate limiting is used to control the rate of traffic entering (inbound) a switch per CoS. Rate limiting allows for the throttling of traffic flows that consume available bandwidth, in the process providing room for other flows. We then set the lease duration to infinite. Thefollowingtabledescribestheoutputfields. Account Lockout User accounts can be locked out based on the number of failed login attempts or a period of inactivity. STP Operation STP Operation Enterasys switch devices support the Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP), and Multiple Spanning Tree Protocol (MSTP) as defined in the following standards and described in IEEE 802.1Q: IEEE 802.1D (Spanning Tree Protocol) IEEE 802.1w (Rapid Spanning Tree Protocol) IEEE 802.1s (Multiple Spanning Tree Protocol) IEEE 802.1t (Update to 802. CoS Hardware Resource Configuration Inbound Rate Limiting Port Configuration Entries ---------------------------------------------------------------------Port Group Name : Port Group :1 Port Type :0 Assigned Ports :ge.1. 21 IPv4 Basic Routing Protocols This chapter describes how to configure the Routing Information Protocol (RIP) and the ICMP Router Discovery Protocol (IRDP).