Ml800-A4 Ge Miltilin
Ml800-A4 Ge Miltilin
Digital Energy
Multilink ML800
Managed Edge Switch
Instruction Manual
Firmware Revision: 3.3x
Manual P/N: 1601-9107-A4 T
GIS ERE
RE
U LT I L
• Failure to observe and follow the instructions provided in the equipment manual(s)
could cause irreversible damage to the equipment and could lead to property
damage, personal injury and/or death.
• Before attempting to use the equipment, it is important that all danger and
caution indicators are reviewed.
• If the equipment is used in a manner not specified by the manufacturer or
functions abnormally, proceed with caution. Otherwise, the protection provided by
the equipment may be impaired and can result in Impaired operation and injury.
• Caution: Hazardous voltages can cause shock, burns or death.
• Installation/service personnel must be familiar with general device test practices,
electrical awareness and safety precautions must be followed.
• Before performing visual inspections, tests, or periodic maintenance on this device
or associated circuits, isolate or disconnect all hazardous live circuits and sources
of electric power.
• Failure to shut equipment off prior to removing the power connections could
expose you to dangerous voltages causing injury or death.
• All recommended equipment that should be grounded and must have a reliable
and un-compromised grounding path for safety purposes, protection against
electromagnetic interference and proper device operation.
• Equipment grounds should be bonded together and connected to the facility’s
main ground system for primary power.
• Keep all ground leads as short as possible.
• At all times, equipment ground terminal must be grounded during device
operation and service.
• In addition to the safety precautions mentioned all electrical connections made
must respect the applicable local jurisdiction electrical code.
Indicates a hazardous situation which, if not avoided, will result in death or serious
Note
injury.
Indicates a hazardous situation which, if not avoided, could result in death or serious
Note
injury.
moderate injury.
Indicates significant issues and practices that are not related to personal injury.
Note
EN Battery Disposal batería. La batería se marca con este símbolo, que puede incluir siglas
This product contains a battery that cannot be disposed of as para indicar el cadmio (Cd), el plomo (Pb), o el mercurio (Hg ). Para el
reciclaje apropiado, devuelva este producto a su distribuidor ó
unsorted municipal waste in the European Union. See the product
deshágase de él en los puntos de reciclaje designados. Para mas
documentation for specific battery information. The battery is marked
with this symbol, which may include lettering to indicate cadmium información: wwwrecyclethis.info.
(Cd), lead (Pb), or mercury (Hg). For proper recycling return the battery ET Patareide kõrvaldamine
to your supplier or to a designated collection point. For more Käesolev toode sisaldab patareisid, mida Euroopa Liidus ei tohi
information see: www.recyclethis.info.
kõrvaldada sorteerimata olmejäätmetena. Andmeid patareide kohta
CS Nakládání s bateriemi vaadake toote dokumentatsioonist. Patareid on märgistatud
käesoleva sümboliga, millel võib olla kaadmiumi (Cd), pliid (Pb) või
Tento produkt obsahuje baterie, které nemohou být zneškodněny v
elavhõbedat (Hg) tähistavad tähed. Nõuetekohaseks ringlusse
Evropské unii jako netříděný komunální odpadu. Viz dokumentace k
produktu pro informace pro konkrétní baterie. Baterie je označena võtmiseks tagastage patarei tarnijale või kindlaksmääratud
vastuvõtupunkti. Lisainformatsiooni saab Internetist aadressil:
tímto symbolem, který může zahrnovat i uvedena písmena, kadmium
www.recyclethis.info.
(Cd), olovo (Pb), nebo rtuť (Hg). Pro správnou recyklaci baterií vraťte
svémudodavateli nebo na určeném sběrném místě. Pro více informací FI Paristoje ja akkujen hävittäminen
viz: www.recyclethis.info
Tuote sisältää pariston, jota ei saa hävittää Euroopan Unionin alueella
DA Batteri affald talousjätteen mukana. Tarkista tuoteselosteesta tuotteen tiedot.
Paristo on merkitty tällä symbolilla ja saattaa sisältää cadmiumia (Cd),
Dette produkt indeholder et batteri som ikke kan bortskaffes sammen
lyijyä (Pb) tai elohopeaa (Hg). Oikean kierrätystavan varmistamiseksi
med almindeligt husholdningsaffald i Europa. Se produktinformation
for specifikke informationer om batteriet. Batteriet er forsynet med palauta tuote paikalliselle jälleenmyyjälle tai palauta se paristojen
keräyspisteeseen. Lisätietoja sivuilla www.recyclethis.info.
indgraveret symboler for hvad batteriet indeholder: kadmium (Cd), bly
(Pb) og kviksølv (Hg). Europæiske brugere af elektrisk udstyr skal FR Élimination des piles
aflevere kasserede produkter til genbrug eller til leverandøren.
Ce produit contient une batterie qui ne peuvent être éliminés comme
Yderligere oplysninger findes på webstedet www.recyclethis.info.
déchets municipaux non triés dans l'Union européenne. Voir la
DE Entsorgung von Batterien documentation du produit au niveau des renseignements sur la pile.
La batterie est marqué de ce symbole, qui comprennent les
Dieses Produkt beinhaltet eine Batterie, die nicht als unsortierter
städtischer Abfall in der europäischen Union entsorgt werden darf. indications cadmium (Cd), plomb (Pb), ou mercure (Hg). Pour le
recyclage, retourner la batterie à votre fournisseur ou à un point de
Beachten Sie die spezifischen Batterie-informationen in der
collecte. Pour plus d'informations, voir: www.recyclethis.info.
Produktdokumentation. Die Batterie ist mit diesem Symbol
gekennzeichnet, welches auch Hinweise auf möglicherweise HU Akkumulátor hulladék kezelése
enthaltene Stoffe wie Kadmium (Cd), Blei (Pb) oder Quecksilber
Ezen termék akkumulátort tartalmaz, amely az Európai Unión belül
(Hektogramm) darstellt. Für die korrekte Wiederverwertung bringen csak a kijelölt módon és helyen dobható ki. A terméken illetve a
Sie diese Batterie zu Ihrem lokalen Lieferanten zurück oder entsorgen
mellékelt ismertetőn olvasható a kadmium (Cd), ólom (Pb) vagy higany
Sie das Produkt an den gekennzeichneten Sammelstellen. Weitere
(Hg) tartalomra utaló betűjelzés. A hulladék akkumulátor leadható a
Informationen hierzu finden Sie auf der folgenden Website: termék forgalmazójánál új akkumulátor vásárlásakor, vagy a kijelölt
www.recyclethis.info.
elektronikai hulladékudvarokban. További információ a
EL Απόρριψη μπαταριών www.recyclethis.info oldalon.
Αυτό το προϊόν περιέχει μια μπαταρία που δεν πρέπει να IT Smaltimento batterie
απορρίπτεται σε δημόσια συστήματα απόρριψης στην Ευρωπαϊκή Questo prodotto contiene una batteria che non può essere smaltita
Κοινότητα. ∆είτε την τεκμηρίωση του προϊόντος για συγκεκριμένες
nei comuni contenitori per lo smaltimento rifiuti, nell' Unione Europea.
πληροφορίες που αφορούν τη μπαταρία. Η μπαταρία είναι φέρει
Controllate la documentazione del prodotto per le informazioni
σήμανση με αυτό το σύμβολο, το οποίο μπορεί να περιλαμβάνει specifiche sulla batteria. La batteria è contrassegnata con questo
γράμματα για να δηλώσουν το κάδμιο (Cd), τον μόλυβδο (Pb), ή τον
simbolo e può includere alcuni caratteri ad indicare la presenza di
υδράργυρο (Hg). Για την κατάλληλη ανακύκλωση επιστρέψτε την
cadmio (Cd), piombo (Pb) oppure mercurio (Hg). Per il corretto
μπαταρία στον προμηθευτή σας ή σε καθορισμένο σημείο συλλογής. smaltimento, potete restituirli al vostro fornitore locale, oppure
Για περισσότερες πληροφορίες δείτε: www.recyclethis.info.
rivolgervi e consegnarli presso i centri di raccolta preposti. Per
ES Eliminacion de baterias maggiori informazioni vedere: ww.recyclethis.info.
Este producto contiene una batería que no se pueda eliminar como
basura normal sin clasificar en la Unión Europea. Examine la
documentación del producto para la información específica de la
Table of Contents
1: INTRODUCTION GETTING STARTED ...............................................................................................................................1-1
INSPECTING THE PACKAGE AND PRODUCT ..........................................................................1-1
ORDER CODES .......................................................................................................................................1-2
SPECIFICATIONS ...................................................................................................................................1-3
COMMAND LINE INTERFACE FIRMWARE ...................................................................................1-7
CONSOLE CONNECTION .........................................................................................................1-7
CONSOLE SETUP ......................................................................................................................1-7
CONSOLE SCREEN ...................................................................................................................1-8
LOGGING IN FOR THE FIRST TIME .........................................................................................1-8
AUTOMATIC IP ADDRESS CONFIGURATION .........................................................................1-8
SETTING THE IP PARAMETERS USING CONSOLE PORT ......................................................1-9
PRIVILEGE LEVELS ....................................................................................................................1-11
USER MANAGEMENT ...............................................................................................................1-12
HELP ..........................................................................................................................................1-13
EXITING .....................................................................................................................................1-14
ENERVISTA SECURE WEB MANAGEMENT .................................................................................1-15
LOGGING IN FOR THE FIRST TIME .........................................................................................1-15
PRIVILEGE LEVELS ....................................................................................................................1-17
USER MANAGEMENT ...............................................................................................................1-17
MODIFYING THE PRIVILEGE LEVEL ........................................................................................1-21
HELP ..........................................................................................................................................1-21
EXITING .....................................................................................................................................1-22
ML800 FIRMWARE UPDATES ..........................................................................................................1-23
UPDATING MULTILINK ML800 FIRMWARE .........................................................................1-23
SELECTING THE PROPER VERSION ........................................................................................1-23
UPDATING THROUGH THE COMMAND LINE .........................................................................1-23
UPDATING THROUGH THE ENERVISTA SECURE WEB MANAGEMENT SOFTWARE ..........1-25
ALARM CONTACTS FOR MONITORING INTERNAL POWER, AND SOFTWARE TRAPS .......3-8
CONNECTING THE CONSOLE TERMINAL TO MULTILINK ML800 ......................................3-9
COMMANDS ..............................................................................................................................10-12
EXAMPLE ...................................................................................................................................10-13
CONFIGURING TAG VLANS WITH ENERVISTA SECURE WEB MANAGEMENT SOFTWARE
10-19
DESCRIPTION ............................................................................................................................10-19
B: DC POWER INPUT SPECIFICATIONS FOR MULTILINK ML800 SWITCHES, DC POWER AT 12, 24, –48, 125, AND
250 V DC POWER INPUT ...............................................................................B-1
12, 24, –48, 125, AND 250 V DC POWER, THEORY OF OPERATION ..............................B-3
APPLICATIONS FOR DC-POWERED ETHERNET SWITCHES ................................................B-4
ML800, 12, 24, –48, 125, AND 250 V DC INSTALLATION ...................................................B-5
UL REQUIREMENTS FOR DC-POWERED UNITS ...................................................................B-5
OPERATION .............................................................................................................................................B-6
Multilink ML800
Chapter 1: Introduction
Introduction
ML800 - * - * - * - * - * *
ML800
Module Slot A Slot C Slot D
ML800 | | | | | Base Unit
Power Supply 250S | | | | ML800 250VDC Chassis
125S | | | | ML800 125VDC Chassis
48VS | | | | ML800 48VDC Chassis
24VS | | | | ML800 24VDC Chassis
12VS | | | | ML800 12VDC Chassis
125D | | | | ML800 125VDC Chassis - Dual Input PSU
48VD | | | | ML800 48VDC Chassis - Dual Input PSU
24VD | | | | ML800 24VDC Chassis - Dual Input PSU
48PS | | | | ML800 48VDC Chassis - PoE enabled
48PD | | | | ML800 48VDC Chassis - PoE enabled with Dual Input PSU
HIAC | | | | ML800 100-240V AC Chassis
Modules | XX XX | None
C1 | | | 4 x 10/100 RJ-45
| C1 | | 4 x 10/100 RJ-45
C2 | | | 4 x 10/100 RJ-45 PoE-enabled ports (only with ML800-48P
models)
C3 | | 2 x10/100 RJ-45 + 2x 100Mbit MTRJ mm Fiber
C4 | | 2x 10/100 RJ-45 + 2x 100Mbit LC mm Fiber
C5 | | 2x 10/100 RJ-45 + 2x 100Mbit LC sm Fiber 15km
CB | 3x 10/100 RJ45 Copper + 1x mm MTRJ Fiber
CC | 1x 10/100 RJ45 Copper + 3x mm MTRJ Fiber
CD | 3x 10/100 RJ45 Copper + 1x mm LC Fiber
CE | 1x 10/100 RJ45 Copper + 3x mm LC Fiber
CF | 3x 10/100 RJ45 Copper + 1x sm LC 15 km Fiber
CG | 1x 10/100 RJ45 Copper + 3x sm LC 15 km Fiber
CH | 3x 10/100 RJ45 Copper + 1x sm LC 40 km Fiber
CI | 2x 10/100 RJ45 Copper + 2x sm LC 40 km Fiber
CJ | 1x 10/100 RJ45 Copper + 3x sm LC 40 km Fiber
H3 | 2x 1000Mbit LC sm Fiber 10km
H4 | 2x 1000Mbit LC sm Fiber 25km
H5 | 2x 1000Mbit LC sm Fiber 40km
H6 | 2x 1000Mbit LC sm Fiber 70km
H7 | 2x 1000Mbit RJ-45 Copper
HG | 1x 1000Mbit LC sm Fiber 10km
HH | 1x 1000Mbit LC sm Fiber 25km
HI | 1x 1000Mbit LC sm Fiber 40km
HJ | 1x 1000Mbit LC sm Fiber 70km
HK | 1x 1000Mbit RJ-45 Copper
RoHS/Conformal Coating X None
Option
H Harsh Chemical Environment Conformal Coating
Z RoHS-compliant
Y RoHS-compliant with Harsh Chemical Environment Coating
1.3 Specifications
PERFORMANCE
Filtering / Forwarding Rate:.. Ethernet (10Mb): 14,880 pps
Fast Ethernet (100Mb): 148,800 pps
Gigabit Ethernet (1000Mb): 1,488,000 pps
Switching Processing Type: .. Store and Forward with IEEE 802.3x full-duplex flow -control, non-
blocking
Data Rate:..................................... 10Mbps, 100Mbps and 1000Mbps
Address Table Capacity:......... 4K node, self-learning with address aging
Packet buffer size:..................... 240KB for 10/100 and 120KB for 1000Mb
Latency: ......................................... 5 μs + packet time (100 to 100Mbps)
15 μs + packet time (10 to 10 Mbps, and 10 to 100Mbps)
Throughput with 8 10/100 and 2Glink max: 4.17M pps (Transmit)
Back plane:................................... 2.66Gb/s per slot
OPERATING ENVIRONMENT
Ambient Temperature:............ -40° to 140° F (-40° to 60°C) for UL60950 and Component Parts
rating
-40° to 195° F (-40° to 85°C) for IEC 60068 Type Test short term
rating
Storage Temperature: ............. -60°to 210°F (-50°to 100°C)
Ambient Relative Humidity: .. 5% to 95% (non-condensing)
Altitude: .......................................... -200 to 13,000 ft. (-60 to 4000m)
Conformal Coating (humidity protection) optional:Request quote
PACKAGING
Enclosure:...................................... High strength extruded aluminum
Dimensions:.................................. 6.85 in. H x 7.5 in. W x 2.0 in. D
17.4 cm H x 19.1 cm W x 5.08 cm D
Cooling method: ........................ Convection, fully-enclosed ribbed-surface aluminum case used as
a sink, designed for vertical mounting, no fans
Weight: ........................................... 3 lbs. (1.3 kg)
POWER CONSUMPTION
20 watts max. (for a fully loaded fiber model with 2 Gb)
15 watts max. (for 8 port copper and 100Mb fiber model)
ML800 MOUNTING
Vertical mounting normal. Suitable for wall or DIN-Rail mounting (ML800)
TYPE TESTS
APPROVALS
WARRANTY
Three years, per UL 60950 temperature ratingMade in USA
Once the switch is configured with an IP address, the command line interface (or CLI) is
also accessible using telnet as well as the serial port. Access to the switch can be either
through the console interface or remotely over the network. Simultaneous access (that is,
through the console port as well as through the network) to the MultiLink ML800 Managed
Edge Switch switch is not permitted.
The Command Line Interface (CLI) enables local or remote unit installation and
maintenance. The MultiLink ML800 Managed Edge Switch provides a set of system
commands which allow effective monitoring, configuration and debugging of the devices
on the network.
If the ML800 is not connected to a network, then proceed to Step 3 below. or use the
Note
default IP address.
NOTE
Step 1:
The ML800 will scan the network for a DHCP server. If the server responds, the ML800 will
acquire and set the assigned IP address. To manage the switch, determine the assigned IP
address and enter as follows in Internet Explorer:
https://<assigned_IP_address>
Ensure that https is entered, not http, and that there is connectivity (that is, you can ping
the switch).
Step 2:
If there is no response from a DCHP server, the ML800 will query for a BOOTP server. If the
server responds, the ML800 will acquire and set the assigned IP address. To manage the
switch, determine the assigned IP address and enter as follows in Internet Explorer:
https://<assigned_IP_address>
Ensure that https is entered, not http, and that there is connectivity (that is, you can ping
the switch).
Step 3:
If there is no response from either a DCHP or BOOTP server, or if the switch is not
connected to a network, the switch will assign itself an IP address. The ML800 will check to
see if IP address 192.168.1.2, with a network mask of 255.255.255.0, is free. If so, it will
assume these values. If this IP address is assigned to another device, the ML800 will repeat
steps 1 through 3 to find a DCHP or BOOTP server or wait for the 192.168.1.2 address to
become free.
Once connected, the browser will display a login prompt. The default login is:
• Username: manager
Password: manager
Save the settings (without saving, the changes made will be lost).
Power off the switch (or a firmware reboot as discussed below).
Power on the switch - login with the new login name and password.
From the PC (or from the switch) ping the IP address specified for the
switch to ensure connectivity.
From the switch ping the default gateway specified (ensure you are
connected to the network to check for connectivity) to ensure
network connectivity.
Syntax:
ipconfig [ip=<ip-address>] [mask=<subnet-mask>] [dgw=<gateway>]
An example is shown below.
ML800# ipconfig ip=3.94.247.41 mask=255.255.252.0
dgw=3.94.244.41
ML800# save
This manual assumes the reader is familiar with IP addressing schemes as well as how net
Note
mask is used and how default gateways and routers are used in a network.
NOTE
Reboot gives an opportunity to save the configuration prior to shutdown. For a reboot,
simply type in the command reboot . Note that even though the passwords are not
changed, they can be changed later.
ML800# reboot
Proceed on rebooting the switch? ['Y' or 'N'] Y
Do you wish to save current configuration? ['Y' or 'N'] Y
ML800#
The ML800 forces an answer by prompting with a “Y” or a “N” to prevent accidental
keystroke errors and loss of work.
The parameters can be viewed at any time by using the show command. The show
command will be covered in more detail later in various sections throughout the
document.
The example below illustrates the basic setup parameters. You can use show setup or
show sysconfig commands to view setup parameters.
1.4.9 Help
Typing the help command lists the commands you can execute at the current privilege
level. For example, typing help at the Operator level shows the following:
ML800> help
logout ping set
terminal telnet walkmib
Contextless Commands:
! ? clear
enable exit help
show whoami
alarm
ML800>
Help for any command that is available at the current context level can be viewed by
typing help followed by enough of the command string to identify the command. The
following syntax applies:
help <command string>
For example, to list the help for the set time command
ML800# help set time
set time : Sets the device Time
Usage
set time hour=<0-23> min=<0-59> sec=<0-59> [zone=GMT[+/-]hh:mm]
ML800#
The options for a specific command can be displayed by typing the command and
pressing enter. The following syntax applies:
command <Enter>
For example, the options for the show command are:
ML800# show <Enter>
Usage
show active-stp
show active-snmp
show active-vlan
show address-table
show age
show alarm
show arp
show auth <config|ports>
show backpressure
show bootmode
--more--
Other ways to display help, specifically, with reference to a command or a set of
commands, use the TAB key. The following syntax applies:
<TAB>
<Command string> <TAB>
<First character of the command> <TAB>
For example, following the syntax listed above, the <TAB> key will list the available
commands in the particular privilege level:
ML800> <TAB>
?
alarm
clear
enable
exit
help
logout
ping
set
show
telnet
terminal
walkmib
whoami
ML800>
The following example lists commands starting with a specific string:
ML800> s <TAB>
set
show
ML800>
In the following example, the <TAB> key completes the command:
ML800> se<TAB>
password
timeout
vlan
ML800> set
1.4.10 Exiting
To exit from the CLI interface and terminate the console session use the logout
command. This command prompts to ensure that the logout was not mistakenly typed.
The following syntax applies:
logout
The following example illustrates logging out from a session:
ML800> logout
Logging out from the current session [’Y’ or ’N’] Y
Connection to the host lost
Make sure you use HTTPS (secure HTTP) and not HTTP in the URL.
Note
Once you click Yes on the security certificate, the browser will prompt you to login.
In the following example below, the user peter was added with manager privilege after
clicking the add button.
After successfully adding a user, the added user is displayed in the list of users as shown
below.
To modify the password, view the users as described above and click
on the edit icon ( ).
After clicking on the edit icon, the screen opens up for modifying the password.
In this example, the user ID peter was selected for modification. The password for peter
will be modified after the new password is entered.
1.5.5 Help
Help for the EnerVista Secure Web Management software can be obtained by clicking on
the Help icon as shown below.
1.5.6 Exiting
To exit or logout, click on the logout button.
Version #
Version #
Once the file transfer is completed reboot the switch with the
reboot command or by cycling power.
Login to the switch and use the show version command to verify
and upload the configuration file (if necessary).
As the file is being loaded, the firmware will display the transfer in progress window.
As the file is being loaded, the firmware will display the transfer in progress window.
Multilink ML800
2.1 Overview
ML800 Managed Edge Switches provide configurability in an entry-level industrial-grade
package. The high performance ML800 base unit comes with four 10/100 copper ports
(which may be either regular or PoE). Up to 3 100Mb fiber ports or up to four more 10/100
copper ports or combinations, may also be configured. In addition, one or two Gb ports
may be configured as 10/100/1000 copper or SFP fiber in any ML800 base unit.
ML800s are ideal for building a switched, hardened Ethernet network infrastructure,
connecting edge devices such as PLCs and IEDs with upstream switches or routers.
Designed for use in industrial applications such as factory floors and control cabinets,
industrial video surveillance systems with PoE, power utility substations, tariffed carrier
field facilities, or transportation and oil and gas, the rugged ML800 handles stressful
workloads (mixes of bursty data traffic and priority streaming traffic) as well as harsh
environmental conditions.
Advanced thermal design techniques with ribbed–surface Aluminum cases for maximum
heat dissipation and a sealed case design enables the unit to operate in harsh Industrial
grade environments efficiently. Heavy duty Ethernet Switch jobs are readily
accommodated with an extended temperature rating of -40˚C to 60˚C by the UL
Component Parts method, or -40˚C to 85˚C by the IEC 60068 Type-Test method. With
options such as several popular DC power input types, AC power and DIN-Rail mounting,
the hardened ML800 is a “multi-purpose” Industrial Ethernet Switch.
The ML800 managed switches also provides a PoE option via power –inside PoE base unit
(ML800P-48VDC) on Slot A and allows the users to utilize up to 4-ports of PoE to support
802.3af Powered devices. See details for PoE base unit in sec 5.2. The Power Sourcing
Equipment (PSE) is fully compatible with Powered Devices (PD) (e.g wireless access points,
IP phones) that comply with the IEEE 802.3af PoE standard. The PoE switch ports have an
auto-sensing algorithm, so that they provide power only to 802.3af, PoE end devices. PoE
is managed by a multi-stage handshake to protect equipment from damage and to
manage power budgets .The PoE ports will discontinue supplying power when the PoE
powered devices are disconnected. This feature supports the 802.3af PoE PSE standard for
over-current protection, under-current detection, and fault protection.
High performance features include non-blocking unicast traffic speed on all ports and
802.1p QoS Traffic Prioritization. ML800 switches are “plug-and-play” and are designed for
use in connecting edge devices such as PLCs, IEDs and PoE video cameras with upstream
switches and routers where a mix of bursty data traffic and priority streaming traffic for
video surveillance and cell-tower applications are present.
ML800 Managed Edge Switches have heavy-duty aluminum cases and are readily
available with standard Industrial grade 24VDC power. Alternative internal DC power
options are available. Internal AC power and DC power input types may be 12V, 24V, 48V,
125V, 250V and dual source DC input is optional on the ML800.
Alarm Relay contacts provided on each ML800 Switch monitor the hardware and software
through traps, providing a record of any losses of power signals and other user- defined
software events. See Section 3.4.2 for details.
When the ML800 Switch detects that its free buffer queue space is low, the Switch sends
industry standard (full-duplex only) PAUSE packets out to the devices sending it packets to
cause “flow control”. This tells the sending devices to temporarily stop sending traffic,
which allows the traffic to catch-up without dropping packets. Then, normal packet
buffering and processing resumes. This flow-control sequence occurs in a small fraction of
a second and is transparent to an observer.
Another feature implemented in the ML800 Switches is a collision-based flow-control
mechanism (when operating at half-duplex only). When the Switch detects that its free
buffer queue space is low, the Switch prevents more frames from entering by forcing a
collision signal on all receiving half-duplex ports in order to stop incoming traffic.
2.3 Applications
ML800 Edge Switches offer high performance, modularity and availability. They provide
the flexibility of 100Mbps fiber and copper ports as well as single or dual Gigabit (1000Mb)
ports, with industry-standard LAN management software. Multilink ML800 Switches are
easily used in a variety of applications including client/server computing, secure VLAN-
performance upgrades to departmental networks, and stream traffic for VOIP and audio/
video applications. They can also be used in a much diversified combination of mixed
media in Industrial floor applications. The performance characteristics of the ML800
Switches enable them to inter-connect a series of subnets (one subnet per ML800 Switch
port) in a LAN traffic center. The subnet connections may be via fiber or twisted pair
cabling, 100Mbps or 10 Mbps speed, and full-or half-duplex.
The mixed-media modular capability is ideal for industrial applications where existing
Ethernet LAN network cabling must be accommodated. The fiber-built-in media capability
is ideal for integrating future-proof fiber cabling into the LAN structure.
Example 1: ML800 Switch for an Industrial Application
Equipped with lots of useful features including hardened enclosures, a wide spread of DC
power supply options, and extended temperature ratings qualifies the ML800 Managed
switch for any Industrial factory-floor, traffic control, transportation system, or power
utility application. The several ML800 software operated features qualifies this managed
switch to operate and perform securely and reliably in all critical applications. The addition
of Ring-Only Mode features allow this Managed switch to provide a very secure highly
available redundant network capability in any ring topology network.
The Managed ML800’s modularity along with the management software features
remarkably handle industrial environments (i.e. where the factory floors are networked
with Ethernet based mixed-media LANs equipped with PLCs, computers for taking
readings and data from Machines, Client/ Server databases, etc. and sending these
important data to the central office data warehouses) very securely and reliably. The DIN-
Rail Mounting options on the Multilink ML800 allow the factory floor’s industrial user to
mount the ML800 securely anywhere on their Network setup.
The option of setting the ports at 10 or 100Mb on copper and 100Mb on fiber media
provide widespread options to the users to mix and match their legacy and advance
network needs. The modularity of the ML800 Managed Edge Switches make them an
attractive choice for use in applications with LAN connections to an organization’s multiple
site offices and factory- floors. The different locations can be easily connected together
with the Fiber ports supported by the ML800 Switch. A main NT-server in a secure area
protected from earthquake or fire hazards can be connected to the full duplex Gigabit
Fiber port.
Extended temperature ratings and a variety of options for AC/DC power supplies qualify
this managed ML800 switch for use in non-temperature controlled networks and many
other temperature sensitive critical Industrial applications where above normal room
temperatures occur while the network is in operation. Full-duplex future proof fiber media
can easily connect long distance subnets and provide a stable secure network to all
applications. The SNMP management capability of the ML800 Switch helps create a
database of all the network subnets to easily manage the network.
Example 2: A managed network is needed to provide a redundant ring topology for
maximum redundancy. In a network where any faulty cable, cable disconnection or power
failure can bring the whole thing down, a ring switch can be reconfigured and up and
running in milliseconds. The ring topology of the network consists of high speed LAN
segments supported by 100 Mbps full-duplex future-proof fiber media to provide a secure
long distance LAN connection. The entire network is sharing a higher bandwidth Gigabit-
enabled data-mining server for the vital database located in a separate secured building.
The copper ports are required for multiple subnets inside the power plant to check the
status of other Ethernet units. The entire spread network will be manageable to provide
easy, detectable, uninterrupted support through a viewable SNMP monitor.
The ML800 Managed Edge Switch equipped with a mix of copper and fiber ports provides
an economical and seamless solution to many requirements. The user-configurable
Multilink ML800 provides an extra boost to the network requirements by providing copper/
fiber media along with the higher bandwidth support of 10/100 and 1000Mb. The user can
utilize the SNMP feature equipped with VLAN, RMON, STP and other standard managed
LAN features to provide a secure and stable network.
The ML800 Managed Fiber with Ring-Only Mode features easily fulfill the redundant
requirement with a secure and fast reconfiguration time for cable breakup when set up in
a ring topology. The Gigabit port option boosts the bandwidth for high speed to support
the peak traffic and minimize congestion.
Example 3: In another application in an industrial environment, a 12 port Nebs compliant,
24VDC managed switch is required to meet the fiber and copper connections to cover the
wider area of video CCTV. The switch must be SNMP enabled and managed to easily
monitor the whole setup.
The managed edge switch easily qualifies for this requirement with the various features
and modularity it has. Loaded with management software, the edge switch provides a very
effective and economical solution for the video -vignette environment.
The security features (e.g. port-security, VLANs, SNMPv3, secure telnet, etc.) also boost the
managed switches to provide a very effective and reliable solution. The modularity feature
to support both copper and fiber at either 10/100/1000Mb speeds easily meets the various
speeds of legacy and future broadband requirements.
In a fast growing secure video environment, the ML800 is a reliable and secure solution.
The modular design of the ML800, provides a wide range of copper/fiber options to meet
requirements. The Gigabit uplink for storage or broadband uplink allows the telecom user
a very effective solution to store their sensitive data securely.
Multilink ML800
Chapter 3: Installation
Installation
3.1 Preparation
It is recommended that high quality CAT. 5 cable be used whenever possible in order to
Note
provide flexibility in a mixed-speed network, since 10/100 copper switched ports are
NOTE auto-sensing for either 10 and 100Mb/s.
The following procedure describes how to connect a 10BASE-T or 100BASE-TX twisted pair
segment to the RJ-45 port. The procedure is the same for both unshielded and shielded
twisted pair cables.
1. Using standard twisted pair media, insert either end of the cable with an RJ-
45 plug into the RJ-45 connector of the port. Note that, even though the
connector is shielded, either unshielded or shielded cables and wiring may be
used.
2. Connect the other end of the cable to the corresponding device.
3. Use the LINK LED to ensure proper connectivity by noting that the LED will be
illuminated when the unit is powered and proper connection is established.
For Power Substations: In support of the IEEE 1613 Class 2 standard, GE Digital Energy
Note
advises that, for substation applications, the RJ-45 ports are intended for connectivity to
NOTE other communication equipment such as routers or telecommunication multiplexers
installed in close proximity (i.e., less than 2 meters or 6.5ft) to the ML800. It is not
recommended to use these ports in substation applications to interface to field devices
across distances which could produce high (greater than 2500V) levels of ground potential
rise (GPR) during line-to-ground fault conditions. The ML800 passes the 1613specifications
for zero packet loss with fiber ports & with RJ-45 ports used as indicated here.
It is highly recommended to remove the fiber cable first before removing the SFP
transceiver for any reason. Not removing the fiber cable first can damage the fiber cable,
CAUTION
cable connector or optical interfaces. It is advised not to remove and insert a SFP
transceiver frequently as this may shorten its useful life.
Always use an ESD wrist strap while handling the SFP transceivers since the SFP modules
are static sensitive devices.
CAUTION
The copper 1000BASE-T SFP transceiver port supports 1000Mb only. It is recommended to
Note
use a straight-through RJ-45 (4-twisted pair) connection while connecting to any Server/
NOTE workstation. While connecting with any Switch/repeater or other device, it is
recommended to use Crossover RJ-45 (4-twisted pair) category 5 or higher cabling. The
maximum length supported on copper 1000BASE-T is 100m (328 ft.).
One strand of the duplex fiber optic cable is coded using color bands at regular intervals;
Note
you must use the color-coded strand on the associated ports at each end of the fiber optic
NOTE segment.
3. Find the Transmit (TX) and Receive (RX) markings on the SFP transceiver to
verify the top side of it. Some of the transceiver marks arrow sign for up.
4. Position the SFP transceiver correctly before insertion, and then insert the SFP
transceiver carefully, until the transceiver connector snap into the place in the
socket connector.
5. Connect the Transmit (TX) port on the Multilink PM to the Receive (RX) port of
the remote device. Connect the Receive (RX) port on the PM to the Transmit
(TX) port of the remote device.
The LINK LED on the front of the PM will illuminate and turn Green, when a proper
connection has been established at both ends (and when power is ON in the unit). If LINK is
not lit or OFF after cable connection, the normal cause is improper cable polarity. Swap
the fiber cables at the PM connector and also check the connectivity on the target device
to remedy this situation.
Reconfigure or reboot both of the devices if required.
If connected properly, you can check via software for verifying the validity of SFP Gigabit
ports.
The metal brackets supplied, hold the back of the ML800 unit out from the panel or wall
Note
behind it, creating a rear space of about ¼ inch or 1cm. This allows air circulation and
NOTE cooling of the rear part of the case.
For best cooling of the ML800, attach the metal brackets to metal (rather than wood or
plastic). Attaching to metal helps conduct heat away from the ML800 through the metal
brackets and into the metal support structure.
Since the ML800 has special internal thermal techniques (patent pending) to move the
Note
heat generated by the electronic components inside into the case, the case may be quite
NOTE warm to the touch during normal operation.
The unit is mounted using the brackets as shown in the illustration above. The spacing for
Note
the mounting screws into the supporting wall or panel is a rectangle 21.74 x 11.91 cm (8.56
NOTE x 4.69 inches) center-to-center.
The ML800 is designed for use in a “factory floor” industrial environment. It is available with
an optional DIN-Rail bracket to mount it securely in a metal factory floor enclosure,
maintained vertically for proper convection cooling of the unit. The Multilink ML800
requires one DIN-Rail bracket for secure mounting. This may be ordered as Model # DIN-
RAIL-ML800. See a ML800 viewed from the side, at the rear, with model DIN-RAIL-ML800 in
place on the unit.
The DIN Rail bracket is mounted on one of three available positions at the rear of the
ML800 unit. Eight threaded holes are provided on the rear of ML800 for DIN-Rail mounting
purposes. The required four screws are included with the DIN-Rail bracket, and are no.4-
40 X 5/16 PHIL. PAN Head.
To install the ML800 with the DIN-Rail bracket installed, hold the ML800 in the side vertical
position with the bottom out, and with the top moved in toward the DIN-Rail. Position the
DIN bracket over the top of the DIN-Rail. Then, snap the bracket into holding position by
moving the bottom of the ML800 inwards to a vertical position. The DIN-Rail bracket is
heavy duty, and will hold the ML800 securely in position, even with cabling attached to the
unit.
To release the ML800 from the DIN-Rail mounting, press the top of the DIN-Rail bracket
slide DOWN to release the ML800 so that it can be dismounted by pulling the bottom out.
Once the bottom of the ML800 is rotated out, the DIN-Rail bracket is not engaged and the
ML800 can be moved up and out, free of the DIN-Rail mounting.
The DIN-Rail mounting bracket is optional and needs to be ordered as separate items, e.g
Model # DIN-RAIL-ML800.
3.4.2 Alarm Contacts for monitoring internal power, and Software Traps
The Alarm Contacts feature, standard on ML800’s, provides two Form C Normally Closed
(NC) contacts to which the user can attach two sets of status monitoring wires at the green
terminal block. When this option is present, the terminal block for Alarm Contacts is part of
the Power Input panel in the ML800 case. The DC power input connection is in the same
panel.
The first NC Alarm Contact (top position, switch vertically mounted) is a “Software Alarm”,
operated by user settings in the software. The user can disable the Software Alarm feature
with a software configuration command if desired. When the Software Alarm is enabled,
the Form C Normally Closed (NC) contact is held close during normal software operation. A
user-defined software malfunction, such as an SNMP Trap or a Software Security violation
or an Ring-Only Mode Fault, causes the contact to open and thus triggers an alarm in the
user’s monitoring system
The second NC Alarm Contact is held closed when there is power on the main board inside
of the Switch. This provides a “Hardware Alarm” because the NC contacts will open when
internal power is lost, either from an external power down condition or by the failure of the
power supply inside of the Switch.
Useful information about Alarm contacts:
1. There are four terminal blocks (1,2,3,4) provided next to the DC power supply
2. The left two pins (1,2) are hardware operated
3. The right two pins (3,4) are software operated
4. These are both NC (normally closed) relays
5. The switch’s software operation needs to be enabled and set to get the Alarm traps.
For detailed information about the Software Alarm and software control of SNMP
alarm traps, please reference Chapter 16.
The Alarm Contacts are on the front left area (next to the DC power source) of the Multilink
ML800 unit and are green in color as shown in the picture.
FIGURE 3–2: Alarm Contacts: 1 & 2 (left) hardware operated; 3 & 4 (right) software operated
NOTE 3.4.3.1 RS-232 (DB-9) Console port (Serial port) pin assignments
To use the Console port to configure the managed switch, a serial (Null-modem) female to
Note
female cable is required to communicate properly. The Null-Modem (DB-9) cable is optional
NOTE and can be ordered from the factory, along with the unit as:
CONSOLE CBL for serial port
CONSOLE USB for USB port
For Power Substations: In support of the IEEE 1613 Class 2 standard, GE Digital Energy
Note
advises that, for substation applications, the serial (DB-9) console ports are intended for
NOTE temporary connectivity to other equipment such as PCs. Since the console port
connection is temporary, it is excluded from IEEE 1613 packet-loss testing per the 1613
standard-defined test procedure.
Multilink ML800
Chapter 4: Operation
Operation
4.1 Functionality
Each time a packet arrives on one of the switched ports, the decision is taken to either filter
or to forward the packet. Packets whose source and destination addresses are on the
same port segment will be filtered, constraining them to that one port and relieving the
rest of the network from having to process them. A packet whose destination address is on
another port segment will be forwarded to the appropriate port, and will not be sent to the
other ports where it is not needed. Traffic needed for maintaining the un-interrupted
operation of the network (such as occasional multi-cast packets) is forwarded to all ports.
The Multilink ML800 Switches operate in the store-and-forward switching mode, which
eliminates bad packets and enables peak performance to be achieved when there is
heavy traffic on the network.
All Multilink ML800 units have address table capacities of 4K node addresses suitable for
use in larger networks. They are self-learning, so as nodes are added, removed or moved
from one segment to another, the ML800 Switch automatically keeps up with node
locations.
An address-aging algorithm causes least-used addresses to fall out in favor for frequently-
used addresses. To reset the address buffer, cycle power down-and-up.
Some NIC cards only auto-negotiate when the computer system that they are in is
Note
powered. These are exceptions to the “negotiate at LINK – enabled” rule above, but may
NOTE be occasionally encountered.
When operating in 100Mb half-duplex mode, cable distances and hop-counts may be
limited within that collision domain. The Path Delay Value (PDV) bit-times must account for
all devices and cable lengths within that domain. For Multilink ML800 Fast Ethernet
switched ports operating at 100Mb half-duplex, the bit time delay is 50BT.
10/100 Mb ports for flow control. That is, the switch prevents frames from entering the
NOTE device by forcing a collision indication on the half-duplex ports that are receiving. This
temporary “collision” delay allows the available buffer space to improve as the switch
catches up with the traffic flow.
4.1.4 Power Budget Calculations for ML800 Modules with Fiber Media
Receiver Sensitivity and Transmitter Power are the parameters necessary to compute the
power budget. To calculate the power budget of different fiber media installations using
Multilink products, the following equations should be used:
OPB (Optical Power Budget) = PT(min) - PR(min)
where PT = Transmitter Output Power, and PR = Receiver Sensitivity
Worst case OPB = OPB - 1dB(for LED aging) - 1dB(for insertion loss)
Worst case distance = {Worst case OPB, in dB} / [Cable Loss, in dB/Km]
where the “Cable Loss” for 62.5/125 and 50/125mm (M.m) is 2.8 dB/km,
and the “Cable Loss” for 100/140 (Multi-mode) is 3.3 dB/km,
and the “Cable Loss” for 9/125 (Single-mode) is 0.5 dB/km
and the “Cable Loss” for 9/125 (Single-mode) is 0.4 dB/km (LX25)
and the “Cable Loss” for 9/125 (Single-mode) is 0.25 dB/km (ZX40)
and the “Cable Loss” for 9/125 (Single-mode) is 0.2 dB/km (ZX70)
The ML800 Port modules are not identical to the port modules used in other Multilink
Note
products such as the ML2400 and ML810. For information about other Multilink products,
NOTE please see the applicable manual. For a list of ML800 Port Modules, refer to Section 1.2
Order Codes.
Each ML800 Port Module (PM) is individually described in the following sections.
RJ45 (Standard)
1 = ON (100 Mb), OFF (10 Mb)
2 = ON (Link)
3 = ON (Full Duplex), OFF (Half Duplex)
4 = BLINKING (Activity)
RJ45 (PoE)
1 = ON (100 Mb), OFF (10 Mb)
2 = ON (Link), BLINKING (Link/Activity)
3 = ON (Full Duplex), OFF (Half Duplex)
4 = ON (PoE device detected)
MTRJ (Fiber)
1 = ON (Link)
2 = BLINKING (Activity)
LC (Fiber)
1 = ON (Link)
2 = BLINKING (Activity)
The C1 Module 4-port Copper module, provides four 10/100Mb switched RJ-45 ports. The
10/100 Mb switched ports normally (as a default setting) are independently N-way auto-
negotiating and auto-crossover (MDIX) for operation at 10 or 100 Mb speed in full- or half-
duplex mode. (i.e., each independently selects a mode and speed to match the device at
the other end of the twisted pair cable).
For auto-negotiation and MDIX details, see Section 4.1.2.
On the model C1 module, there are four LEDs for each port, two integrated into the
connector, and two below the connector. The LK (Link) LED indicates “ready for operation”
on that port when lit. The blinking ACT (Activity) LED indicates receiving Activity on that port
when lit. The 10/100 LED indicates operation at 100 Mb speed when ON and at 10 Mb
speed when OFF (when auto-negotiation is not disabled). The FDX/HDX LED is ON to
indicate full-duplex operation and OFF to indicate the half-duplex mode. A twisted pair
cable must be connected into an RJ-45 port and the Link (LK) indicator for that port must
be ON (indicating there is a powered-up device at the other end of the cable) in order for a
LK LED to provide valid indications of operating conditions on that port.
Using the management software, the user may disable auto-negotiation and fix the
desired operation of each RJ-45 port. The user may select 10Mb or 100Mb speed and full-
or half-duplex mode per-port as per user requirements.
For Power Substations: In support of the IEEE 1613 Class 2 standard, GE Digital Energy
Note
advises that, for substation applications, the RJ-45 ports are intended for connectivity to
NOTE other communication equipment such as routers or telecommunication multiplexers
installed in close proximity (i.e., less than 2 meters or 6.5 ft) to the ML800. It is not
recommended to use these ports in substation applications to interface to field devices
across distances which could produce high (greater than 2500 V ) levels of ground
potential rise (GPR) during line-to-ground fault conditions. The ML800 passes the 1613
specifications for zero packet loss with fiber ports and with RJ-45 ports used as indicated
here.
The CB Module, 4-port Fiber / Copper module, provides one 100 Mb Multimode MTRJ Fiber
port and three 10/100 Mb switched RJ-45 ports.
The CB Module fiber port is a Small Form Factor (SFF) MTRJ Multimode connector. The
MTRJ’s small size and ease of connection make it a good choice for 100Mbps “fiber-to-the-
desktop” Ethernet connectivity. When installed in a Multilink ML800 Series Switch, it
supports fiber optic cable distances up to the IEEE-standard 100 Mbps distance limits, i.e.,
typically 2 km at full-duplex and 412 m at half-duplex.
Each port has an Activity (ACT) LED indicating packets being received and a Link (LK) LED
that indicates proper connectivity with the remote device when lit.
The CB Module copper ports support Ethernet twisted pair segments of any standard
length. It is equipped with a three-port RJ-45 connector, and offers 10/100 full / half-duplex
auto-negotiating capability on each port. The RJ-45 connector is shielded to minimize
emissions and will allow both unshielded twisted pair (UTP) and shielded twisted pair (STP)
cable connections. When installed in a Multilink ML800 Series Managed Switch, the copper
ports support the standard distance of 100 m on each port.
The C3 Module, 4-port Fiber / Copper module, provides two 100Mb Multimode MTRJ Fiber
ports and two 10/100 Mb switched RJ-45 ports.
The CC Module, 4-port Fiber / Copper module provides three 100Mb Multimode MTRJ Fiber
ports and one 10/100Mb switched RJ-45 port. This module option occupies parts of Slot
“A” and Slot “C”.
The CD Module, 4-port Fiber / Copper module provides one 100Mb Multimode LC Fiber port
and three 10/100 Mb switched RJ-45 ports.
The CD Module fiber port is a Small Form Factor (SFF) LC Multimode connector used
primarily in 100 Mbps fiber-to-the-desktop links. When installed in a Multilink ML800 Series
Switch, it supports fiber optic cable distances up to the IEEE-standard 100 Mbps distance
limits, i.e., typically 2 km at full-duplex and 412 m at half-duplex.
The compact size of the LC Connector reduces the size of wiring panels in wiring closets
while providing the advantage of “future-proof” fiber optic technology.
The cable end is a “plug-in” connector with both fiber strands terminated in one housing
that cannot be improperly inserted. Each port has an Activity (ACT) LED indicating packets
being received and a Link (LK) LED indicating proper connectivity with the remote device
when lit.
The CD Module copper ports support Ethernet twisted pair segments of any standard
length. It is equipped with a three-port RJ-45 connector, and offers 10/100 full / half-duplex
auto-negotiating capability on each port. The RJ-45 connector is shielded to minimize
emissions and will allow both unshielded twisted pair (UTP) and shielded twisted pair (STP)
cable connections. When installed in a Multilink ML800 Series Managed Switch, the copper
ports support the standard distance of 100 m on each port.
The C4 Module, 4-port Fiber / Copper module provides two 100Mb Multimode LC Fiber
ports and two 10/100Mb switched RJ-45 ports. (See Section 4.2.2.5 for more information.)
The CE Module, 4-port Fiber / Copper module provides three 100 Mb Multimode LC Fiber
ports and one 10/100 Mb switched RJ-45 ports. This module option occupies parts of Slot
“A” and Slot “C”. (See Section 4.2.2.5 for more information.)
The C5, CF, CG, 4-port Fiber / Copper modules provide 100Mb Singlemode LC Fiber ports,
supporting distances up to 15 km , and 10/100 Mb switched RJ45 ports. These modules
provide the same functions as the Multimode versions (see Sections 4.2.2.5 through 4.2.2.7
for more detail and panel configurations).
The CH, CI, CJ, 4-port Fiber / Copper modules provide 100Mb Singlemode LC Fiber ports,
supporting distances up to 40km , and 10/100 Mb switched RJ45 ports. These modules
provide the same functions as the Multimode versions (see Sections 4.2.2.5 through 4.2.2.7
for more detail and panel configurations).
The H7, 2-port Copper Gigabit module provides two fixed 10/100/1000 Mb RJ-45 ports.
Note
The Multilink ML800 offers a Gigabit option with multiple choices of Copper 10/100/
NOTE
1000 Mbps or Gigabit SFP Fiber transceivers for the modular slot. Up to two Gigabit ports
(maximum) can be configured in Slot D only.
There are six LEDs provided for each Gigabit port. Each Copper Gigabit port has LEDs that
indicate FH (Full or Half Duplex), LK (Link), ACT (Activity) and 10/100/1000 Mbps speed (set
to AUTO by default).
The HK, 1-port Copper Gigabit module provides one fixed 10/100/1000 Mb RJ-45 port.
Note
The H1, H2, H3, H4, H5, H6, 2-port Fiber Gigabit module provides two SFP open
Note
(See the Order Codes section of this manual for part numbers)
The 1000 Mb Gigabit SFP fiber-port modules on the Multilink ML800 are normally set
(factory default) to operate at AUTO mode for best fiber distance and performance.
LEDs are configured the same as the copper gigabit option. (See Section 4.2.2.10 above)
The HE, HF, HG, HH, HI, HJ, 1-port Fiber Gigabit module provides one SFP open
Note
4.3 Troubleshooting
All Multilink Ethernet products are designed to provide reliability and consistently high
performance in all network environments. The installation of a Multilink ML800 Switch is a
straight forward procedure. The operation is also straightforward and is discussed in
Section 4.1.
Should problems develop during installation or operation, this section is intended to help
locate, identify and correct these types of problems. Please follow the suggestions listed
below prior to contacting your supplier. However, if you are unsure of the procedures
described in this section or if the Multilink ML800 Switch is not performing as expected, do
not attempt to repair the unit; instead contact your supplier for assistance or contact GE
Digital Energy Customer Support.
Multilink ML800
Chapter 5: IP Addressing
IP Addressing
5.1.1 Overview
It is assumed that the user has familiarity with IP addresses, classes of IP addresses and
related netmask schemas (for example, class A, B, and C addressing).
Without an IP address, the switch operates as a standalone Layer 2 switch. Without an IP
address, you cannot:
• Use the web interface to manage the switch
• Use telnet to access the CLI
• Use any SNMP Network Management software to manage the switch
• Use NTP protocol or an NTP server to synchronize the time on the switch
• Use TFTP or FTP to download the configurations or upload software updates
• Run ping tests to test connectivity
To set the IP address, please refer to section 1.4.6: Setting the IP Parameters. Once the IP
address is set, the CLI can be accessed via telnet as well as the console interface. From
now on, all commands discussed are accessible from the command line interface,
irrespective of access methods (i.e. serial port or in band using telnet).
To verify the IP address settings using the command line interface, the show ipconfig
command can be used as follows:
ML800> show ipconfig
IP Address: 3.94.247.41
Subnet Mask: 255.255.252.0
Default Gateway: 3.94.244.1
ML800>
To verify the IP address using the EnerVista Secure Web Management software,
Select the Administration > System menu item to view.
Besides manually assigning IP addresses, there are other means to assign an IP address
automatically. The two most common procedures are using DHCP and bootp.
• ht is the hardware type. For the MultiLink family of switches, set this to ether (for
Ethernet). This tag must precede the ha tag.
• ha is the hardware address. Use the switch's 12-digit MAC address.
• ip is the IP address to be assigned to the switch.
• sm is the subnet mask of the subnet in which the switch is installed.
Each switch should have a unique name and MAC address specified in the bootptab table
entry
Likewise, the bootcfg argument is valid only with the bootp type. This option allows the
switch to load the configuration file from the bootp server. This is useful when a new
switch is put on a network and the specific configurations are loaded from a centralized
bootp server
The following example changes the boot mode of the switch:
ML800# set bootmode type=bootp bootimg=enable bootcfg=disable
Network application image download is enabled.
Network application config download is disabled.
Save Configuration and Restart System
ML800#
Alternatively, the DHCP/bootp/manual can be enabled through the EnerVista Secure Web
Management software as shown below.
Select the Administration > System menu item.
Click Edit.
The show console command can show the status of the telnet client as well as other
console parameters. The following example reviews the console parameters with the show
console command. Note that telnet is enabled.
ML800# show console
Console/Serial Link
Inbound Telnet Enabled: Yes
Outbound Telnet Enabled: Yes
Web Console Enabled: Yes
SNMP Enabled: Yes
Terminal Type: VT100
Screen Refresh Interval (sec): 3
Baud Rate: 38400
Flow Control: None
Session Inactivity Time (min): 10
ML800#
Users can telnet to a remote host from the MultiLink family of switches using the following
syntax.
telnet <ipaddress> [port=<port number>]
The default port for telnet is 23.
To start a telnet session through the EnerVista Secure Web Management software,
Select the Administration > Telnet menu item.
For example:
ML800# user
ML800(user)## useraccess user=peter service=telnet enable
Telnet Access Enabled.
ML800(user)## exit
ML800# show session
Current Sessions:
SL# Sessn Id Connection User Name User Mode
1 1 163.10.10.14 manager Manager
2 2 163.11.11.1 peter Manager
3 3 163.12.12.16 operator Operator
ML800# kill session id=3
Session Terminated
ML800#
In the above example, the user with username “peter” is given telnet access. Then multiple
users telnet into the switch. This is shown using the show session command. The user
operator session is then terminated using the kill session command.
A maximum of four simultaneous telnet sessions are allowed at any time on the switch.
Note
The commands in these telnet windows are executed in a round robin fashion; that is, if
one window takes a long time to finish a command, the other windows may encounter a
delay before the command is completed. For example, if one window is executing a file
download, the other windows will not be able to execute the command before the file
transfer is completed. As well, if a outbound telnet session is started from the switch
(through a telnet window) then other windows will not be able to execute a command until
the telnet session is completed.
Changing these parameters through the serial port will cause loss of connectivity. The
Note
terminal software parameters (e.g. HyperTerminal) will also have to be changed to match
NOTE the new settings.
To see the current settings of the serial port, use the show serial command to query the
serial port settings as illustrated below.
ML800# show serial
Baud Rate: 38400
Data: 8
Parity: No Parity
Stop: 1
Flow Control: None
To set the SNTP parameter with the command line software, enter the SNTP configuration
mode from the manager. The setsntp, sync, and sntp commands can then be used to
setup the time synchronization automatically from the SNTP server. Note it is not sufficient
to setup the SNTP variables. Make sure to setup the synchronization frequency as well as
enable SNTP. The syntax for the above commands is shown below.
setsntp server = <ipaddress> timeout = <1-10>
retry = <1-3>
sync [hour=<0-24>] [min=<0-59>] (default = 24
hours)
sntp [enable|disable]
To set the SNTP server to be 3.94.210.5 (with a time out of 3 seconds and a number of
retries set to 3 times); allowing the synchronization to be ever 5 hours, the following
sequence of commands are used
ML800# sntp
ML800(sntp)## setsntp server=3.94.210.5 timeout=3 retry=3
SNTP server is added to SNTP server
database
ML800(sntp)## sync hour=5
ML800(sntp)## sntp enable
SNTP is already enabled.
ML800(sntp)## exit
ML800(sntp)#
SNTP parameters can be configured through the EnerVista Secure Web Management
software with the Configuration > SNTP menu item. The SNTP menu allows the time zone
(hours from GMT) to be defined along with other appropriate parameters on setting the
time and synchronizing clocks on network devices.
The edit button allows editing of the SNTP parameters as shown below. Adding or deleting
SNTP servers is accomplished by using the add and delete buttons. Clicking the edit button
allows the specific SNTP parameter settings to be modified.
After the proper SNTP values are entered, click OK to register the changes, or click Cancel
to back out from the changes made.
To add an SNTP server, click the add button on the Configuration > SNTP menu. The menu
prompts you to add IP address of an SNTP server, the time out in seconds and the number
of retries, before the time synchronization effort is aborted. The Sync Now button allows
synchronization as soon as the server information is added.
If your site has internet access, there are several SNTP servers available online. A quick
Note
search will yield information about these servers. You can use the IP address of these
NOTE servers; however, please ensure the server can be reached by using the ping command.
The ping command can also be launched from the EnerVista software.
The Time Out value is in seconds. Note the time server can be a NTP server available on
the Internet. Ensure the IP parameters are configured for the switch and the device can be
pinged by the switch. Once the server is added, it is listed with the other SNTP servers.
Place the Switch offline while transferring Setting Files to the Switch.
Note
When transferring Settings Files from one Switch to another, the IP address of the
NOTE originating Switch will also be transferred. The user must therefore reset the IP address on
the receiving Switch before connecting to the network.
Configuration changes are automatically registered but not saved; that is, the effect of the
change is immediate. However, if power fails, the changes are not restored unless they
saved using the save command. It is also a good practice to save the configuration on
another network server using the tftp or ftp protocols. Once the configuration is saved, it
can be loaded to restore the settings. At this time, the saved configuration parameters are
not in a human readable format. The commands for saving and loading configurations on
the network are:
saveconf mode=<serial|tftp|ftp>
<ipaddress> file=<name>
loadconf mode=<serial|tftp|ftp>
<ipaddress> file=<name>
Ensure the machine specified by the IP address has the necessary services running. For
serial connections, x-modem or other alternative methods can be used. In most situations,
the filename must be a unique, since overwriting files is not permitted by most ftp and tftp
servers (or services). Only alphanumeric characters are allowed in the filename.
The following example illustrated how to save the configuration on a tftp server
ML800# saveconf mode=tftp 3.94.240.9 file=ML800set
Do you wish to upload the configuration?
['Y' or 'N'] Y
The saveconf and loadconf commands are often used to update software. Before the
software is updated, it is advised to save the configurations. The re-loading of the
configuration is not usually necessary; however, in certain situations it maybe needed and
it is advised to save configurations before a software update. The loadconf command
requires a reboot for the new configuration to be active. Without a reboot the older
configuration is used by the MultiLink family of switches.
The saveconf and loadconf commands are often used to update software to the
ML800. These commands will be deprecated in the version 2.x and above, and replaced
with the ftp, tftp, or xmodem commands. It is advised to begin using these commands
instead of saveconf and loadconf.
<ML800 -conf-1.0>
################################################################
# Copyright (c) 2001-2005 GE Digital Energy, Inc All rights reserved.
# RESTRICTED RIGHTS
# ---------------------------------
# Use, duplication or disclosure is subject to U.S. Government
# restrictions as set forth in Sub-division (b)(3)(ii) of the
# rights in Technical Data and Computer Software clause at
# 52.227-7013.
#
# This file is provided as a sample template to create a backup
# of GE MultiLink switches. As such, this script
# provides insights into the configuration of GE MultiLink
# switches settings. GE Digital Energy, Inc. recommends that modifications of this
# file and the commands should be verified by the User in a
# test environment prior to use in a "live" production network.
# All modifications are made at the User's own risk and are
# subject to the limitations of the GE MultiLink software End User
# License Agreement (EULA). Incorrect usage may result in
# network shutdown. GE Digital Energy, Inc. is not liable for incidental or
# consequential damages due to improper use.
################################################################
***This is a Machine Generated File.
***Only the SYSTEM config block is editable.
***Editing any other block will result in error while loading.
##########################################################
# Hardware Configuration - This area shows the type of #
# hardware and modules installed. #
##########################################################
[HARDWARE]
type=ML800
slotB=8 Port TP Module
##########################################################
# System Manager - This area configures System related #
# information. #
##########################################################
[SYSTEM]
***Edit below this line only***
system_name=ML800
system_contact=support@gemultilin.com
system_location= Markham, Ontario
boot_mode=manual
system_ip=192.168.5.5
system_subnet=0.0.0.0
system_gateway=0.0.0.0
idle_timeout=10
telnet_access=enable
snmp_access=enable
web_access=enable
1. A config file allows only certain portions of the file to be edited by a user. Changing
Note
any other part of the file will result in the system not allowing the file to be loaded, as
NOTE
the CRC computed and stored in the file would not be matched. Should you want to
edit, edit the System portion of the file only. GE Digital Energy, Inc. recommends
editing the “script” file (see below)
2. File names cannot have special characters such as *#!@$^&* space and control
characters.
--more—
...
--more—
...
FIGURE 5–3: Displaying specific modules using the ‘show config’ command
--more—
...
Additional capabilities have been added to save and load configurations. The commands
are:
ftp <get|put|list|del> type=<app|config|oldconf|script|hosts|log> host=<hostname>
ip=<ipaddress> file=<filename> user=<user> pass=<password>
tftp <get|put> type=<app|config|oldconf|script|hosts|log> host=<hostname>
ip=<ipaddress> file=<filename>
xmodem <get|put> type=<app|config|oldconf|script|hosts|log>
The arguments are describe below:
type: Specifies whether a log file or host file is uploaded or downloaded. This can also
perform the task of exporting a configuration file or uploading a new image to
the switch
host , ip, file, user, pass: These parameters are associated with ftp/tftp server
communications.
The user can save the configuration in old (v2 format) and new (v3 format). The v3 format
must be used to utilize the ASCII and CLI Script capability.
save [format=v2|v3]
With release 1.7 and higher, the configuration can be saved in the older format (binary
Note
object) or in a new format as an ASCII file. The new format is recommended by GE Digital
NOTE Energy. Use the old format only if there are multiple MultiLink switches on the network
running different versions of software. GE Digital Energy recommends upgrading all
switches to the most current software release.
To ease the process of uploading and executing a series of commands, the ML800 can
create a host (equivalent to creating a host table on many systems). The command for
creating a host is:
host <add|edit|del> name=<host-name> ip=<ipaddress> user=<user>
pass=<password>
The show host command displays the host table entries
ML800# access
ML800(access)## host add name=server ip=192.168.5.2
Host added successfully
ML800(access)## show host
No Host Name IP Address User Password
=========================================
1 server 192.168.5.2 -- ******
2 -- -- -- --
3 -- -- -- --
4 -- -- -- --
5 -- -- -- --
6 -- -- -- --
7 -- -- -- --
8 -- -- -- --
9 -- -- -- --
10 -- -- -- --
ML800(access)##
###############################################################
#
# Copyright (c) 2001-2005 GE Digital Energy, Inc All rights reserved.
# RESTRICTED RIGHTS
# ---------------------------------
# Use, duplication or disclosure is subject to U.S. Government
# restrictions as set forth in Sub-division (b)(3)(ii) of the
# rights in Technical Data and Computer Software clause at
# 52.227-7013.
#
# This file is provided as a sample template to create a backup
# of GE MultiLink switches configurations. As such,
# this script provides insights into the configuration of GE MultiLink switch's settings.
# GE Digital Energy, Inc. recommends that modifications of this
# file and the commands should be verified by the User in a
# test environment prior to use in a "live" production network.
# All modifications are made at the User's own risk and are
# subject to the limitations of the GE MultiLink MNS End User
# License Agreement (EULA). Incorrect usage may result in
# network shutdown. GE Digital Energy, Inc. is not liable for incidental or
# consequential damages due to improper use.
###############################################################
#
##########################################################
# System Manager - This area configures System related #
# information. #
##########################################################
user
add user=manager level=2
passwd user=manager
manager
<additional lines deleted for succinct viewing>
In the above example, note that all the commands are CLI commands. This script provides
an insight into the configuration of GE MultiLink switches settings. GE Digital Energy, Inc.
recommends that modifications of this file and the commands should be verified by the
User in a test environment prior to use in a "live" production network
To ease the process of uploading the script files, use the Script Upload/Download
capability described above.
Place the Switch offline while transferring Setting Files to the Switch.
Note
When transferring Settings Files from one Switch to another, the IP address of the
NOTE originating Switch will also be transferred. The user must therefore reset the IP address on
the receiving Switch before connecting to the network.
After configuration changes are made, all the changes are automatically saved. It is a
good practice to save the configuration on another server on the network using the tftp
or ftp protocols. Once the configuration is saved, the saved configuration can be reloaded
to restore the settings. At this time, the saved or loaded configuration parameters are not
in a human readable format.
The following figure illustrates the FTP window, which can be used to save the
configuration, as well as up load new images or reload a saved configuration.
Ensure the machine specified by the IP address has the necessary services running on it.
For serial connections, x-modem or other alternative methods can be used. Generally, the
filename name must be a unique filename, as over-writing files is not permitted by most
FTP and TFTP servers (or services).
The following figure illustrates saving the configuration on a TFTP server. Note that the
menu is similar to the FTP screen described earlier.
This process can also be used to update new software to the managed MultiLink switches.
Before the software is updated, it is advised to save the configurations. Reloading of the
configuration is not usually necessary, but in certain situations it may be needed, and it is
recommended that you save configurations before a software update. Make sure to
reboot the switch after a new configuration is loaded.
The file transfer operations allowed are:
1. Image Download (or Image Upload): Copy the ML800 image from switch to the
server (or from the server to the switch). The “Image Upload” option is
commonly used to upgrade the ML800 image on the switch.
2. Config Download (or Config Upload): Save the configuration of the switch on
the server (or load the saved configuration from the server to the switch). This
option is used to save a backup of the ML800 configuration or restore the
configuration (in case of a disaster.)
3. Script Download (or Script Upload): Save the necessary CLI commands used
for configuration of the switch (or upload the necessary CLI commands
needed to configure the switch). This option is used to ease the repetitive task
of configuring multiple commands or reviewing all the commands needed to
configure the ML800.
4. Host Download (or Host Upload): Save the host information. The hosts are
created by the Configuration - Access - Host commands
5. Log Upload - Save the log file on the ftp/tftp server
To save any changes,
Click on the save ( ) icon.
The software will ask again if the changes need to be saved or
ignored.
If the changes need to be ignored, click on Cancel and reboot the
switch.
To delete or edit the entries, use the delete or edit icons next to each
entry shown above.
User also has the option to save one module from defaulting back to factory defaults by
Note
In the example below “system” module box has been checked. In this case after kill Config
command is issued by pressing the OK button, the Switch will perform a factory dump
restoring all the Switch settings back to factory defaults except for the “System” settings
which will be retained.
When the OK button is pressed the Switch will issue the following warning messages; and
reboot the switch for it to revert back to the factory default settings with the exceptions of
modules opted not to be defaulted.
Here is a list of the modules and related settings that can be selected not to default back to
factory default settings.
5.5 IPv6
This section explains how to access the GE MultiLink switches using IPv6 instead of IPv4
addressing. IPv6 provides a much larger address space and its use is often required.
Assumptions
It is assumed here that the user is familiar with IP addressing schemes and has other
supplemental material on IPv6, configuration, routing, setup and other items related to
IPv6. This user guide does not discuss these details.
nodes. The use of anycast addresses in the IPv6 source route allows nodes to
control the path along which their traffic flows.
• Header Format Simplification - Some IPv4 header fields have been dropped or
made optional, to reduce the common-case processing cost of packet handling
and to keep the bandwidth cost of the IPv6 header as low as possible despite the
increased size of the addresses. Even though the IPv6 addresses are four times
longer than the IPv4 addresses, the IPv6 header is only twice the size of the IPv4
header.
• Improved Support for Options - Changes in the way IP header options are encoded
allow more efficient forwarding, less stringent limits on the length of options, and
greater flexibility for introducing new options in the future.
• Quality-of-Service Capabilities - A new capability is added to enable the labeling of
packets belonging to particular traffic "flows" for which the sender requests
special handling, such as non-default quality of service or "real- time" service.
• Authentication and Privacy Capabilities - IPv6 includes the definition of extensions
which provide support for authentication, data integrity, and confidentiality. This is
included as a basic element of IPv6 and will be included in all implementations.
ML800# ipconfig ?
ipconfig : Configures the system IP address, subnet mask and gateway
Usage
ipconfig [ip=<ipaddress>] [mask=<subnet-mask>] [dgw=<gateway>]
ML800#
In addition to the commands listed above, the commands which support IPv6 addressing
are
Syntax ftp <IPv6 address> - ftp to an IPv6 station
Example – ftp fe80::220:6ff:fe25:ed80
Syntax telnet <IPv6 address> - telnet to an IPv6 station
Example – telnet fe80::220:6ff:fe25:ed80
Besides, if the end station supports IPv6 addressing (as most Linux and Windows systems
do), one can access the switch using the IPv6 addressing as shown in the example below
http://fe80::220:6ff:fe25:ed80
Multilink ML800
6.1.1 Description
This section explains how the access to the MultiLink ML800 Managed Edge Switch can be
secured. Further security considerations are also covered such as securing access by IP
address or MAC address.
It is assumed here that the user is familiar with issues concerning security as well as
Note
securing access for users and computers on a network. Secure access on a network can
NOTE be provided by authenticating against an allowed MAC address as well as IP address.
6.1.2 Passwords
The MultiLink ML800 Managed Edge Switch has a factory default password for the
manager as well as the operator account. Passwords can be changed from the user ID by
using the set password command.
For example:
ML800# set password
Enter Current Password: *******
Enter New Password:*******
Confirm New Password:*******
Password has been modified successfully
ML800#
Network security hinges on the ability to allow or deny access to network resources. This
Note
6.2.1 Commands
To configure port security, login as a level 2 user or as a manager. Once logged in, get to
the port-security configuration level to setup and configure port security with the following
command syntax:
configure port-security
port-security
For example, using the configure port-security command:
ML800# configure port-security
ML800(port-security)##
Alternately, the port-security command can also be used to enter the port-security
configuration mode:
ML800# port-security
ML800#(port-security)##
From the port security configuration mode, the switch can be configured to:
1. Auto-learn the MAC addresses.
2. Specify individual MAC addresses to allow access to the network.
3. Validate or change the settings.
The command syntax for the above actions are:
allow mac=<address|list|range>
port=<num|list|range>
learn port=<number-list> <enable|disable>
show port-security
action port=<num|list|range>
<none|disable|drop>
signal port=<num|list|range>
<none|log|trap|logandtrap>
ps <enable|disable>
remove mac=<all|address|list|range>
port=<num|list|range>
signal port=<num|list|range>
<none|log|trap|logandtrap>
Where the following hold:
• allow mac - configures the switch to setup allowed MAC addresses on specific
ports
• learn port - configures the switch to learn the MAC addresses associated with
specific port or a group of ports
• show port-security - shows the information on port security programmed or
learnt
• action port - specifies the designated action to take in case of a non
authorized access
• ps - port security - allows port security to be enable or disabled
• remove mac - removes specific or all MAC addresses from port security lookup
• signal port=<num|list|range> - observe list of specified ports and notify if
there is a security breach on the list of port specified. The signal can be a log entry,
a trap to the trap receiver specified as part of the SNMP commands (where is that
specified) or both
There is a limitation of 200 MAC addresses per port and 500 MAC addresses per switch for
Note
port security.
All commands listed above must be executed under the port security configuration mode.
Note
NOTE
Let's look at a few examples. The following command allows specific MAC addresses on a
specified port. No spaces are allowed between specified MAC addresses.
ML800(port-security)## allow mac=00:c1:00:7f:ec:00,00:60:b0:88:9e:00
port=18
The following command sequence sets the port security to learn the MAC addresses. Note
that a maximum of 200 MAC addresses can be learned per port, to a maximum of 500 per
switch. Also, the action on the port must be set to none before the port learns the MAC
address information.
ML800(port-security)## action port=1, 2 none
ML800(port-security)## learn port=1, 2 enable
The following command sequence enables and disables port security
ML800(port-security)## ps enable
Port Security is already enabled
ML800(port-security)## ps disable
Port Security Disabled
ML800 ps enable
Port Security Enabled
All the above commands have to be configured in this sequence, otherwise the port will
Note
remain insecure.
NOTE
ML800(port-security)##
ML800(port-security)##
Example 6-2 shows how to enable learning on a port. After the learning is enabled, the
port security can be queried to find the status of MAC addresses learnt. If there were
machines connected to this port, the MAC address would be shown on port 3 as they are
shown on port 1.
Example 6-3 shows how to allow specific MAC address on specific ports. After the MAC
address is specified, the port or specific ports or a range of ports can be queried as shown.
Example 6-4 shows how to remove a MAC address from port security
To set logging on a port, use the following command sequence:
ML800(port-security)## signal port=3 logandtrap
Port security Signal type set to Log and
Trap on selected port(s)
The examples provided illustrate the necessary commands to setup port security. The
recommended steps to setup security are:
Set the ML800 software to allow port security commands (use the
port-security command).
Enable port security (use the enable ps command).
Enable learning on the required ports (for example, use the learn
port=3 enable command for port 3).
Verify learning is enables and MAC addresses are being learnt on
required ports (use the show port-security port=3 command).
Save the port-security configuration (use the save command).
Example 6-5 illustrates these steps for setting up port security on a specific port:
Once port security is setup, it is important to manage the log and review the log often. If
the signals are sent to the trap receiver, the traps should also be reviewed for intrusion and
other infractions.
ML800# port-security
ML800(port-security)## ps enable
Port Security is already enabled
ML800(port-security)## learn port=3 enable
Port Learning Enabled on selected port(s)
ML800(port-security)## show port-security
PORT STATE SIGNAL ACTION LEARN COUNT MAC ADDRESS
---- ----- ------ ------ ----- ----- -----------
1 ENABLE LOG NONE ENABLE 6 00:e0:29:2a:f1:bd
00:01:03:e2:27:89
00:07:50:ef:31:40
00:e0:29:22:15:85
00:03:47:ca:ac:45
00:30:48:70:71:23
2 ENABLE NONE NONE DISABLE 0 Not Configured
3 ENABLE NONE NONE ENABLE 0 00:c1:00:7f:ec:00
4 ENABLE NONE NONE DISABLE 0 Not Configured
5 ENABLE NONE NONE DISABLE 0 Not Configured
6 ENABLE NONE NONE DISABLE 0 Not Configured
ML800(port-security)## save
Saving current configuration
Configuration saved
ML800(port-security)## learn port=3 disable
Port Learning Disabled on selected port(s)
ML800(port-security)## action port=3 drop
Port security Action type set to Drop on selected
port(s)
ML800(port-security)## show port-security port=3
PORT STATE SIGNAL ACTION LEARN COUNT MAC ADDRESS
---- ----- ------ ------ ----- ----- -----------
3 ENABLE NONE DROP ENABLE 0 00:c1:00:7f:ec:00
ML800(port-security)## signal port=3 logandtrap
Port security Signal type set to Log and Trap on
selected port(s)
(such as unexpected behavior). The specific types of logs can be viewed and cleared. The
show log command displays the log information and the clear log command clears
the log entries. The syntax for these commands is shown below:
show log [1..5|informational|debug|fatal |critical|activity]
clear log [informational|debug|activity |critical|fatal]
The set logsize command set the number of lines to be collected in the log before the
oldest record is re-written. The syntax for this command is:
set logsize size=<1-1000>
Example 6-6 illustrates the show log and clear log commands. The show log
command indicates the type of log activity in the S column. I indicates informational
entries and A indicates activities which are a result of port-security setup. Notice the
clear log informational command clears the informational entries only.
The log shows the most recent intrusion at the top of the listing. If the log is filled when the
switch detects a new intrusion, the oldest entry is dropped off the listing.
As discussed in the prior section, any port can be set to monitor security as well as make a
log on the intrusions that take place. The logs for the intrusions are stored on the switch.
When the switch detects an intrusion on a port, it sets an “alert flag” for that port and
makes the intrusion information available.
The default log size is 50 rows. To change the log size, use the set logsize command.
When the switch detects an intrusion attempt on a port, it records the date and time
stamp, the MAC address, the port on which the access was attempted and the action
taken by ML800 software. The event log lists the most recently detected security violation
attempts. This provides a chronological entry of all intrusions attempted on a specific port.
The event log records events as single-line entries listed in chronological order, and serves
as a tool for isolating problems. Each event log entry is composed of four fields
• Severity - the level of severity (see below).
• Date - date the event occurred on. See Date and Time on page 5–10 for
information on setting the date and time on the switch.
• Time - time the event occurred on. See Date and Time on page 5–10 for
information on setting the date and time on the switch
• Log Description - description of event as detected by the switch
Severity has one of the following values, and depending on the severity type, is assigned a
severity level.
• I (information, severity level 1) indicates routine events.
• A (activity, severity level 2) indicates the activity on the switch.
• D (debug, severity level 3) is reserved for GE Digital Energy internal diagnostic
information
• C (critical, severity level 4) indicates that a severe switch error has occurred.
• F (fatal, severity level 5) indicates that a service has behaved unexpectedly.
It is assumed here that the user is familiar with IP addressing schemes (e.g. class A, B, C,
Note
etc.), subnet masking and masking issues such as how many stations are allowed for a
NOTE given subnet mask.
In Example 6-7, any computer on 3.94.245.10 network is allowed (note how the subnet
mask indicates this). Also, a specific station with IP address 3.94.245.25 is allowed (again
note how the subnet mask is used). An older station with IP address 3.94.245.15 is
removed.
ML800# access
ML800(access)## allow ip=3.94.245.10 mask=255.255.255.0 service=tel
Service(s) allowed for specified address
ML800(access)## allow ip=3.94.245.25 mask=255.255.255.255 service=t
Service(s) allowed for specified address
ML800(access)## remove ip=3.94.245.15 mask=255.255.255.255
Access entry removed
ML800(access)## exit
ML800# show ip-access
============================================================
IP Address | Mask | Telnet | Web | SNMP |
============================================================
3.94.245.10 255.255.255.0 ALLOWED DENIED DENIED
6.3.1 Commands
After enabling the EnerVista Secure Web Management software,
Select the Configuration > Port > Security menu item to configure
port security as shown below.
From the menu shown above, each individual port can be configured for the proper action
on the port, auto learn MAC addresses and specify individual MAC addresses.
To edit each port, click on the edit icon ( ).
To enable or disable port security, use the Status drop down menu
as shown below.
Note that the screen also provides an overview of each port on the switch. Each port can
be individually configured for the proper port security action.
Each individual port can be configured by clicking on the edit icon ( ). Once the edit
screen is shown, the following actions can be taken for each port:
1. The port can be specified to create a log entry or send a trap, do both or do
nothing. This is done through the Signal Status drop down menu.
2. The port can be specified to drop the connection, disable the port or do
nothing. This is indicated by the Action Status drop down menu.
3. The port can be put in the learn mode or the learning can be disabled. This is
indicated by the Learn Status drop down menu.
Additionally, MAC addresses can be added or deleted from the table of allowed MAC
addresses.
To delete a MAC address, click on the delete icon ( ).
To add a MAC address, click on the Add button and fill in the MAC
address in the MAC address window.
There is a limitation of 200 MAC addresses per port and 500 MAC addresses per switch for
port security.
After clicking on the Add button, the following screen appears, allowing the entry of a
specific MAC address
Once port security is setup, it is important to manage the log and review it often. If the
signals are sent to the trap receiver, the traps should also be reviewed for intrusion and
other infractions.
6.3.2 Logs
All events occurring on the Managed MultiLink ML800 Managed Edge Switch are logged.
The events can be informational (e.g. login, STP synchronization etc.), debugging logs (for
debugging network and other values), critical (critical events), activity (traffic activity) and
fatal events (such as unexpected behavior). The specific types of logs can be viewed and
cleared. To view the logs in the EnerVista Secure Web Management software, select the
Configuration > Logs menu item.
Note the different types of logs. Specific logs may be viewed by using the drop down menu
in the top right corner
As discussed in the previous section, any port can be set to monitor security as well as
make a log on the intrusions that take place. The logs for the intrusions are stored on the
switch. When the switch detects an intrusion on a port, it sets an “alert flag” for that port
and makes the intrusion information available.
The default log size is 50 rows. To change the log size, select the Configuration > Statistics
Note
Severity has one of the following values, and depending on the severity type, is assigned a
severity level.
• I (information, severity level 1) indicates routine events.
• A (activity, severity level 2) indicates the activity on the switch.
• D (debug, severity level 3) is reserved for GE Digital Energy internal diagnostic
information
• C (critical, severity level 4) indicates that a severe switch error has occurred.
• F (fatal, severity level 5) indicates that a service has behaved unexpectedly.
The window above show the authorized access list for managing the switch. Note specific
services can be authorized. Also note that individual stations or a group of stations with IP
addresses can be authorized.
It is assumed that users are familiar with IP addressing schemes (e.g. class A, B, C etc.),
Note
subnet masking and masking issues such as how many stations are allowed for a given
NOTE subnet mask.
In the following example, any computer on 10.10.10.0 sub network is allowed (note how
the subnet mask is used to indicate that). Also, a specific station with IP address
192.168.15.25 is allowed (again note how the subnet mask is used to allow only one
specific station in the network) and an older station with IP address 192.168.15.15 is
removed.
Multilink ML800
7.1.1 Description
The TACACS+ protocol is the latest generation of TACACS. TACACS is a simple UDP (User
Datagram Protocol) based access control protocol originally developed by BBN for the
MILNET (Military Network). Later the enhancements were called TACACS+. TACACS+ is a TCP
(Transmission Control Protocol) based access control protocol. TCP offers a connection-
oriented transport, while UDP offers best-effort delivery making the access authentication
reliable.
Remote Authentication Dial-In User Service or RADIUS is a server that has been
traditionally used by many Internet Service Providers (ISP) as well as Enterprises to
authenticate dial in users. Today, many businesses use the RADIUS server for
authenticating users connecting into a network. For example, if a user connects PC into
the network, whether the PC should be allowed access or not provides the same issues as
to whether or not a dial in user should be allowed access into the network or not. A user
has to provide a user name and password for authenticated access. A RADIUS server is
well suited for controlling access into a network by managing the users who can access
the network on a RADIUS server. Interacting with the server and taking corrective action(s)
is not possible on all switches. This capability is provided on the MultiLink ML800 Managed
Edge Switch.
RADIUS servers and its uses are also described by one or more RFCs.
The RADIUS server is the authentication server. The authentication server provides a
standard way of providing Authentication, Authorization, and Accounting services to a
network. Extensible Authentication Protocol (EAP) is an authentication framework which
supports multiple authentication methods. EAP typically runs directly over data link layers
such as PPP or IEEE 802, without requiring IP. EAP over LAN (EAPOL) encapsulates EAP
packets onto 802 frames with a few extensions to handle 802 characteristics. EAP over
RADIUS encapsulates EAP packets onto RADIUS packets for relaying to RADIUS
authentication servers.
The details of the 802.1x authentication are as follows.
1. The supplicant (host) is initially blocked from accessing the network. The
supplicant wanting to access these services starts with an EAPOL-Start frame.
2. The authenticator (MultiLink ML800 Managed Edge Switch), upon receiving an
EAPOL-start frame, sends a response with an EAP-Request/Identity frame
back to the supplicant. This will inform the supplicant to provide its identity.
3. The supplicant then sends back its own identification using an EAP-Response/
Identity frame to the authenticator (MultiLink ML800 Managed Edge Switch).
The authenticator then relays this to the authentication server by
encapsulating the EAP frame on a RADIUS-Access-Request packet.
4. The RADIUS server will then send the authenticator a RADIUS-Access-
Challenge packet.
5. The authenticator (MultiLink ML800 Managed Edge Switch) will relay this
challenge to the supplicant using an EAP-Request frame. This will request the
supplicant to pass its credentials for authentication.
6. The supplicant will send its credentials using an EAP-Response packet.
7. The authenticator will relay using a RADIUS-Access-Request packet.
8. If the supplicant's credentials are valid, RADIUS-Access-Accept packet is sent
to the authenticator.
9. The authenticator will then relay this on as an EAP-Success and provides
access to the network.
10. If the supplicant does not have the necessary credentials, a RADIUS-Access-
Deny packet is relayed to the supplicant as an EAP-Failure frame. The access
to the network continues to be blocked.
The ML800 software implements the 802.1x authenticator. It fully conforms to the
standards as described in IEEE 802.1x, implementing all the state machines needed for
port-based authentication. The ML800 software authenticator supports both EAPOL and
EAP over RADIUS to communicate to a standard 802.1x supplicant and RADIUS
authentication server.
The ML800 software authenticator has the following characteristics:
• Allows control on ports using STP-based hardware functions. EAPOL frames are
Spanning Tree Protocol (STP) link Bridge PDUs (BPDU) with its own bridge multicast
address.
• Relays MD5 challenge (although not limited to) authentication protocol to RADIUS
server
• Limits the authentication of a single host per port
• The MultiLink ML800 Managed Edge Switch provides the IEEE 802.1x MIB for SNMP
management
7.2.1 Commands
On enabling 802.1x ports, make sure the port which connects to the RADIUS servers needs
to be manually authenticated. To authenticate the port, use the setport command. The
CLI commands to configure and perform authentication with a RADIUS server are
described below.
The auth command enters the configuration mode to configure the 802.1x parameters.
auth
The show auth command displays the 802.1x configuration or port status.
show auth <config|ports>
The authserver command define the RADIUS server. Use the UDP socket number if the
RADIUS authentication is on a port other than 1812.
authserver [ip=<ip-addr>] [udp=<num>] [secret=<string>]
The auth enable and auth disable commands enable or disable the 802.1x
authenticator function on the MultiLink ML800 Managed Edge Switch.
auth <enable|disable>
The setport command configures the port characteristics for an 802.1x network.
setport port=<num|list|range> [status=<enable|disable>]
[control=<auto|forceauth|forceunauth>] [initialize=<assert|deassert>]
The backend port command configure the parameters for EAP over RADIUS.
backend port=<num|list|range>
[supptimeout=<1-240>]
[servertimeout=<1-240] [maxreq=<1-10>]
The port argument is mandatory and represents the port(s) to be configured. The
supptimeout argument is optional and represents the timeout in seconds the
authenticator waits for the supplicant to respond back. The default value is 30 seconds
and values can range from 1 to 240 seconds. The servertimeout argument is optional
and represents the timeout in seconds the authenticator waits for the back-end RADIUS
server to respond. The default value is 30 seconds and can range from 1 to 240 seconds.
The maxreq argument is optional and represents the maximum number of times the
authenticator will retransmit an EAP request packet to the Supplicant before it times out
the authentication session. Its default value is 2 and can be set to any integer value from 1
to 10.
The portaccess command sets port access parameters for authenticating PCs or
supplicants.
portaccess port=<num|list|range>
[quiet=<0-65535>] [maxreauth=<0-10>] [transmit=<1-65535>]
The port argument is mandatory and identifies the ports to be configured. The quiet
argument is optional and represents the quiet period – the amount of time, in seconds, the
supplicant is held after an authentication failure before the authenticator retries the
supplicant for connection. The default value is 60 seconds and values can range from 0 to
65535 seconds. The maxreauth argument is optional and represents the number of re-
authentication attempts permitted before the port is unauthorized. The default value is 2
and integer values can range from 0 to 10. The transmit argument is optional and
represents the transmit period. This is the time in seconds the authenticator waits to
transmit another request for identification from the supplicant. The default value is 30 and
values range from 1 to 65535 seconds
The reauth command determines how the authenticator (MultiLink ML800 Managed
Edge Switch) performs the re-authentication with the supplicant or PC.
reauth port=<num|list|range> [status=<enable|disable>]
[period=<10-86400>]
The port argument is mandatory and sets the ports to be configured. The status argument
is optional and enables/disables re-authentication. The period argument is optional and
represents the re-authentication period. This is the time in seconds the authenticator waits
before a re-authentication process will be performed again to the supplicant. The default
value is 3600 seconds (1 hour), and values range from 10 to 86400 seconds.
The show-stats command displays 802.1x related statistics.
show-stats port=<num>
The trigger-reauth command manually initiates a re-authentication of supplicant.
trigger-reauth port=<num|list|range>
7.2.2 Example
Example 7-1 demonstrates how to secure the network using port access. Ensure there is
no 802.1x or RADIUS server defined. Only one RADIUS server can be defined for the entire
network.
Example 7-1: Setting port control parameters The RADIUS server is on port 2. This port is
authenticated manually. If the RADIUS server is
802.1X Authenticator Configuration several hops away, it may be necessary to
================================== authenticate the interconnection ports. Make sure
Status: Disabled the setport port=2 status=enable
RADIUS Authentication Server control=forceauth initialize=assert command
================================== is executed before the auth enable command.
IP Address: 0.0.0.0
UDP Port: 1812
Shared Secret:
ML800# auth
ML800(auth)## setport port=2 status=enable control=forceauth initialize=assert
Successfully set port control parameter(s) The auth disable command is not
necessary. However, it is shown for
ML800(auth)## auth disable completeness in case a RADIUS
802.1X Authenticator is disabled. server was defined with a previously
set authentication scheme.
ML800(auth)## authserver ip=3.204.240.1 secret=secret
Successfully set RADIUS Authentication Server parameter(s)
ML800(auth)## auth enable
802.1X Authenticator is enabled.
ML800(auth)## show auth ports
Port Status Control Initialize Current State
The RADIUS server is
======================================================
connected on port #2
1 Enabled Auto Deasserted Authorized
2 Enabled ForcedAuth Asserted Unauthorized
3 Enabled Auto Deasserted Authorized
4 Enabled Auto Deasserted Unauthorized
5 Enabled Auto Deasserted Unauthorized
6 Enabled Auto Deasserted Unauthorized
-- Port not available
ML800(auth)## show auth config
802.1X Authenticator Configuration
==================================
Status: Enabled
RADIUS Authentication Server
==================================
IP Address: 3.204.240.1
UDP Port: 1812
Shared Secret: secret
7.3.1 Commands
To access the 802.1x configuration window, select the Configuration > Radius > Server
menu item.
First, select the server. Do not enable RADIUS capabilities until you have ensured that the
ports are configured properly. After the ports are configured, enable RADIUS. Also ensure
that the port connected to the RADIUS server, or the network where the RADIUS server is
connected to, is not an authenticated port.
The following window shows the configuration of a RADIUS Server. Initially, the RADIUS
Services are disabled and the server IP address is set to 0.0.0.0. Edit the server IP and
secret to add a RADIUS server.
The following figure illustrates the editing of information for the RADIUS server. Note the
UDP port number can be left blank and the default port 1812 is used.
Ensure that the port which has the RADIUS server is force authorized and asserted. For
other ports (user ports), it is best to leave the Control on auto and Initialize on de-asserted.
To change the port access characteristics when authenticating with a RADIUS server,
Select the Configuration > Radius > Port > Access menu item.
The Quiet Period column represents the time, in seconds, the supplicant is held after an
authentication failure before the authenticator retries the supplicant for connection. The
value ranges from 0 to 65535 seconds, with a default of 60.
The Max Reauth column shows the permitted reauthentication attempts before the port
becomes unauthorized. Values are integers ranging from 0 to 10, with a default of 2.
The Tx Period column represents the transmit period. This is the time (in seconds) the
authenticator waits to transmit another request for identification from the supplicant. The
values range from 1 to 65535 seconds, with a default of 30.
The backend or communication characteristics between the ML800 and the RADIUS Server
are defined through the Configuration > Radius > Port > Access > Backend menu item.
The Supp Timeout column represents the timeout the authenticator waits for the
supplicant to respond. The values range from 1 to 240 seconds, with a default of 30.
The Server Timeout column represents the timeout the authenticator waits for the
backend RADIUS server to respond. The values range from 1 to 240 seconds, with a default
of 30.
The Max Request column represents the maximum times the authenticator retransmits an
EAP request packet to the supplicant before it times out. Values are integers ranging from
1 to 10, with a default of 2.
The port authentication characteristics define how the authenticator (ML800 switch) does
the re-authentication with the supplicant or PC. These are defined through the
Configuration > Radius > Port > Access > Reauth menu item.
The Reauth Period represents the time the authenticator waits before a re-authentication
process will be done again to the supplicant. Values range from 10 to 86400 seconds, with
a default of 3600 (1 hour).
The Configuration > Radius > Port > Stats menu item illustrates the radius statistics for
each port.
Multilink ML800
8.1.1 Overview
The TACACS+ protocol (short for Terminal Access Controller Access Control System)
provides access control for routers, network access servers and other networked
computing devices via one or more centralized servers. TACACS+ provides separate
authentication, authorization and accounting services.
TACACS allows a client to accept a username and password and send a query to a TACACS
authentication server, sometimes called a TACACS daemon (server) or simply TACACSD. This
server was normally a program running on a host. The host would determine whether to
accept or deny the request and sent a response back.
The TACACS+ protocol is the latest generation of TACACS. TACACS is a simple UDP based
access control protocol originally developed by BBN for the MILNET (Military Network).
XTACACS is now replaced by TACACS+. TACACS+ is a TCP based access control protocol.
TCP offers a reliable connection-oriented transport, while UDP offers best-effort delivery.
TACACS+ improves on TACACS and XTACACS by separating the functions of authentication,
authorization and accounting and by encrypting all traffic between the Network Access
Server (NAS) and the TACACS+ clients or services or daemon. It allows for arbitrary length
and content authentication exchanges, which allows any authentication mechanism to be
utilized with TACACS+ clients. The protocol allows the TACACS+ client to request very fine-
grained access control by responding to each component of a request.
The MultiLink ML800 Managed Edge Switch implements a TACACS+ client.
1. TACACS+ servers and daemons use TCP port 49 for listening to client requests.
Clients connect to this port to send authentication and authorization packets.
2. There can be more than one TACACS+ server on the network. The MultiLink
Switch Software supports a maximum of five TACACS+ servers.
Start
Login as Operator
No Login
Yes
Login as Manager No
Yes Yes
Authentication Connection failure
failure Connect to Additional
Logout Additional
TACACS server to Servers?
Servers?
authenticate
Authorized as Authenticated No
Operator or
Authorization failure Logout
TACACS+
Login as Operator
authorization
Authorized as
Manager
Login as Manager
754716A1.CDR
The above flow diagram shows the tight integration of TACACS+ authentication with the
local user-based authentication. There are two stages a user goes through in TACACS+. The
first stage is authentication where the user is verified against the network user database.
The second stage is authorization, where it is determined whether the user has operator
access or manager privileges.
32 bits wide
4 4 8 8 8 bits
Major Minor Packet type Sequence Flags
Version Version number
Session ID
Length
754717A1.CDR
8.2.1 Commands
There are several commands to configure TACACS+.
The show tacplus command displays the status of TACACS or servers configured as
TACACS+ servers:
show tacplus <status|servers>
The tacplus enable and tacplus disable commands enable or disable TACACS
authentication:
tacplus <enable|disable>
The tacserver command creates a list of up to five TACACS+ servers:
tacserver <add|delete> id=<num>
[ip=<ip-addr>] [port=<tcp-port>] [encrypt=<enable|disable>] [key=<string>]
The <add|delete> argument is mandatory and specifies whether to add or delete a
TACACS+ server. The id argument is mandatory and sets the order to poll the TACACS+
servers for authentication. The ip argument is mandatory for adding and defines the IP
address of the TACACS+ server. The port argument is mandatory for deleting and defines
the TCP port number on which the server is listening. The encrypt argument enables or
disables packet encryption and is mandatory for deleting. The key argument requires the
secret shared key string must be supplied when encryption is enabled.
8.2.2 Example
Example 8-1 below, illustrates how to configure TACACS+.
Note that the TCP port field can be left blank – port 49 is used as a default port. Up to five
TACACS+ servers can be defined.
After the configuration is completed,
Save the settings.
Enable the TACACS+ services by using the Status drop down menu..
Multilink ML800
9.1.1 Description
This section explains how individual characteristics of a port on a MultiLink ML800
Managed Edge Switch is configured. For monitoring a specific port, the traffic on a port
can be mirrored on another port and viewed by protocol analyzers. Other setup includes
automatically setting up broadcast storm prevention thresholds.
An Ethernet switch sends traffic from one port to another port. Unlike a switch, a hub or a
shared network device, the traffic is “broadcast” on each and every port. Capturing traffic
for protocol analysis or intrusion analysis can be impossible on a switch unless all the
traffic from a specific port is “reflected” on another port, typically a monitoring port. The
MultiLink ML800 Managed Edge Switch can be instructed to repeat the traffic from one
port onto another port. This process - when traffic from one port is reflecting to another
port - is called port mirroring. The monitoring port is also called a “sniffing” port. Port
monitoring becomes critical for trouble shooting as well as for intrusion detection.
9.2.1 Commands
Monitoring a specific port can be done by port mirroring. Mirroring traffic from one port to
another port allows analysis of the traffic on that port.
The show port-mirror command displays the status of port mirroring:
show port-mirror
The port-mirror command enters the port mirror configuration mode.
port-mirror
The setport monitor command configures a port mirror.
setport monitor=<monitor port number> sniffer=<sniffer port number>
The prtmr command enables and disables port mirroring.
prtmr <enable|disable>
The sequence below illustrates how port 1 is mirrored on port 2. Any traffic on port 1 is also
sent on port 2.
ML800# show port-mirror
Sniffer Port: 0
Monitor Port: 0
Mirroring State: disabled
ML800# port-mirror
ML800(port-mirror)## setport monitor=1 sniffer=2
Port 1 set as Monitor Port
Port 2 set as Sniffer Port
ML800(port-mirror)## prtmr enable
Port Mirroring Enabled
ML800(port-mirror)## exit
ML800# show port-mirror
Sniffer Port: 2
Monitor Port: 1
Mirroring State: enabled
ML800#
Once port monitoring is completed, GE strongly recommends that the port mirroring be
disabled using the prtmr disable command for security reasons.
1. Only one port can be set to port mirror at a time.
2. Both the ports (monitored port and mirrored port) have to belong to the same
VLAN
3. The mirrored port shows both incoming as well as outgoing traffic
9.3.1 Commands
Each port on the MultiLink ML800 Managed Edge Switch can be setup specific port
characteristics. The commands for setting the port characteristics are shown below.
The device command enters the device configuration mode:
device
The setport command configures the port characteristics:
setport port=<port#|list|range> [name=<name>] [speed=<10|100>] [duplex=<half|full>]
[auto=<enable|disable>] [flow=<enable|disable>] [bp=<enable|disable>]
[status=<enable|disable>] [lla=<enable|disable>]
The arguments for the setport command are defined as follows:
• The device argument sets up the MultiLink ML800 Managed Edge Switch in the
device configuration mode.
• The name argument assigns a specific name to the port. This name is a designated
name for the port and can be a server name, user name or any other name.
• The speed argument sets the speed to be 10 or 100 Mbps. This works only with 10/
100 ports; the value is ignored and no error shown for 10 Mbps ports.
• The flow argument sets up flow control on the port.
• The bp argument enables back pressure signaling for traffic congestion
management.
• The status argument enabled/disables port operation
The show port command displays information about a specific port number.
show port[=<port number>]
In Example 9-1, ports 3 and 4 are given specific names. Ports 1 and 5 are active, as shown
by the link status. Port 5 is set to 100 Mbps, and all other ports are set to 10 Mbps. All ports
are set to auto sensing (speed).
The port speed and duplex (data transfer operation) settings are summarized below.
The speed setting defaults to auto and senses speed and negotiates with the port at the
other end of the link for data transfer operation (half-duplex or full-duplex). The “auto”
speed detection uses the IEEE 802.3u auto negotiation standard for 100Base-T networks. If
the other device does not comply with the 802.3u standard, then the port configuration on
the switch must be manually set to match the port configuration on the other device.
Possible port setting combinations for copper ports are:
• 10HDx: 10 Mbps, half-duplex
• 10FDx: 10 Mbps, full-duplex
• 100HDx: 100 Mbps, half-duplex
• 100FDx: 100 Mbps, full-duplex
Possible port settings for 100FX (fiber) ports are:
• 100FDx (default): 100 Mbps, full-duplex
• 100HDx: 100 Mbps, half-duplex
To change the port speed on a transceiver port, it is required to reboot the switch.
Note
NOTE
ML800# device
ML800(device)## setport port=3 name=JohnDoe
ML800(device)## setport port=4 name=JaneDoe
ML800(device)## show port
Keys: E = Enable D = Disable
H = Half Duplex F = Full Duplex
M = Multiple VLAN's NA = Not Applicable
LI = Listening LE = Learning
F = Forwarding B = Blocking
Port Name Control Dplx Media Link Speed Part Auto VlanID GVRP STP
-------------------------------------------------------------------------------
1 A1 E H 10Tx UP 10 No E 1 - -
2 A2 E H 10Tx DOWN 10 No E 1 - -
3 JohnDoe E H 10Tx DOWN 10 No E 1 - -
4 JaneDoe E H 10Tx DOWN 10 No E 1 - -
5 A5 E F 100Tx UP 100 No E 1 - -
6 A6 E H 10Tx DOWN 10 No E 1 - -
7 A7 E H 10Tx DOWN 10 No E 1 - -
With the port speed set to auto (the default) and flow control set to enabled; the switch
Note
negotiates flow control on the indicated port. If the port speed is not set to auto, or if flow
NOTE control is disabled on the port, then flow control is not used.
Use the flowcontrol command to set flow control:
flowcontrol xonlimit=<value> xofflimit=<value>
where xonlimit can be from 3 to 127 (default value is 4) and xofflimit ranges from 3 to
127 (default value is 6).
ML800# device
ML800(device)## show flowcontrol
XOnLimit : 4
XOffLimit : 6
ML800(device)## flowcontrol xonlimit=10 xofflimit=15
XOn Limit set successfully
XOff Limit set successfully
ML800(device)## show flowcontrol
XOnLimit : 10
XOffLimit : 15
ML800(device)## show backpressure
Rx Buffer Threshold : 28
ML800# device
ML800(device)## show broadcast-protect
===================================================================
PORT | STATUS | THRESHOLD (frms/sec) | CURR RATE (frms/sec) | ACTIVE
===================================================================
1 Disabled 19531 0 NO
2 Disabled 19531 0 NO
3 Disabled 19531 0 NO
4 Disabled 19531 0 NO
5 Disabled 19531 0 NO
6 Disabled 19531 0 NO
It is recommended to enable the Link Loss Alert (LLA) feature on ports that are connected
to end devices. LLA should be disabled for switch ports connected in a ring.
The Link Loss Alert feature is disabled by default on 100 MB Fiber Optic ports. It can be
enabled and disabled via the lla parameter in the setport command as follows:
setport port=<port#|list|range> [lla=<enable|disable>]
The following example illustrates how to enable the link loss alert feature.
ML800# device
ML800(device)## setport port=3 lla=disable
ML800(device)## show port=3
Configuration details of port 3
--------------------------------------------------
Port Name : JohnDoe
Port Link State : DOWN
Port Type : TP Port
Port Admin State : Enable
Port VLAN ID :1
Port Speed : 100Mbps
Port Duplex Mode : half-duplex
Port Auto-negotiation State : Enable
Port STP State : NO STP
Port GVRP State : No GVRP
Port Priority Type : None
Port Security : Enable
Port Flow Control : Enable
Port Back Pressure : Enable
Port Link Loss Alert : Disable
ML800(device)## setport port=3 lla=enable
Link Loss Alert enabled
ML800(device)## show port=3
Configuration details of port 3
--------------------------------------------------
Port Name : JohnDoe
Port Link State : DOWN
Port Type : TP Port
Port Admin State : Enable
Port VLAN ID :1
Port Speed : 100Mbps
Port Duplex Mode : half-duplex
Port Auto-negotiation State : Enable
Port STP State : NO STP
Port GVRP State : No GVRP
Port Priority Type : None
Port Security : Enable
9.4.1 Commands
Monitoring a specific port can be done by port mirroring. Mirroring traffic from one port to
another port allows analysis of the traffic on that port.
To enable port mirroring as well as setting up the ports to be “sniffed”,
Select the Configuration > Port > Mirroring menu item.
Set the sniffer port and the port on which the traffic is reflected.
Make sure the Mirror Status is also set to enabled for mirroring:
For security reasons, GE Digital Energy recommends that the port mirroring be disabled
using the Edit button and setting the Mirror Status to off once port monitoring is
completed.
Note that:
1. Only one port can be set to port mirror at a time.
2. Both the ports (monitored port and mirrored port) have to belong to the same
VLAN.
3. The mirrored port shows both incoming as well as outgoing traffic.
Select a specific port by using the edit icon in the Configuration >
Port > Settings menu.
In these windows:
• Port Number represents the port number on the switch.
• Port Name assigns a specific name to the port. This name is a designated name
for the port and can be a server name, user name or any other name.
• Admin Status indicates whether the port can be administered remotely.
• Link indicates the link status. In the figure above the link is down, implying either
there is no connection or the system connected to the port is turned off.
• Auto-Neg sets auto negotiation for 100 Mbps and Gigabit copper ports. There is no
no auto negotiation for fiber ports as their speeds are fixed.
• The Port Speed sets the speed to be 10 or 100 Mbps. This settings works only with
10/100 ports; it is ignored for 10 Mbps ports.
• The Duplex setting selects full duplex or half duplex capabilities for 10/100 Mbps
ports.
• The Back Pressure displays the state of the back pressure setting on the port. This
value can be edited in this window.
• The Flow Control displays the state of the flow control setting on the port. This
value can be edited in this window.
• Priority displays the priority set for the port. This value cannot be edited in this
window.
• The VLAN ID displays the VLAN set for the port. This value cannot be edited in this
window.
• The STP State displays the STP settings for the port. This value cannot be edited in
this window.
• The Tagged State displays the Tag settings on the port. This value cannot be
edited in this window.
• The GVRP State displays the GVRP settings on the port. This value cannot be edited
in this window.
• The LLA indicates the state of the Link Loss Alert feature.
The “Auto” (default) value for the Port Speed senses the speed and negotiates with the port
at the other end of the link for data transfer operation (half-duplex or full-duplex). The
“Auto” value uses the IEEE 802.3u auto negotiation standard for 100Base-T networks. If the
other device does not comply with the 802.3u standard, then the port configuration on the
switch must be manually set to match the port configuration on the other device.
Possible port setting combinations for copper ports are:
• 10HDx: 10 Mbps, half-duplex
• 10FDx: 10 Mbps, full-duplex
• 100HDx: 100 Mbps, half-duplex
• 100FDx: 100 Mbps, full-duplex
Possible port settings for 100FX (fiber) ports are:
• 100FDx (default): 100 Mbps, full-duplex
• 100HDx: 100 Mbps, half-duplex
To change the port speed on a transceiver port, the switch must be rebooted
To edit the threshold level, click on the edit icon as seen below.
See details in Broadcast Storms on page 9–7 to determine the threshold level.
After changes are made, do not forget to save the changes using
the save icon ( ).
If the switch is rebooted before the changes are made, the changes
will be lost.
Multilink ML800
10.1.1 Overview
Short for virtual LAN (VLAN), a VLAN creates separate broadcast domains or network
segments that can span multiple MultiLink ML800 Managed Edge Switchs. A VLAN is a
group of ports designated by the switch as belonging to the same broadcast domain. The
IEEE 802.1Q specification establishes a standard method for inserting VLAN membership
information into Ethernet frames.
VLANs provide the capability of having two (or more) Ethernet segments co-exist on
common hardware. The reason for creating multiple segments in Ethernet is to isolate
broadcast domains. VLANs can isolate groups of users, or divide up traffic for security,
bandwidth management, etc. VLANs are widely used today and are here to stay. VLANs
need not be in one physical location. They can be spread across geography or topology.
VLAN membership information can be propagated across multiple MultiLink ML800
Managed Edge Switchs.
The following figure illustrates a VLAN as two separate broadcast domains. The top part of
the figure shows two “traditional” Ethernet segments. Up to 32 VLANs can be defined per
switch.
SEGMENT 1 SEGMENT 2
CONSOLE
POWER
VLAN 1 VLAN 2
FIGURE 10–1: VLAN as two separate broadcast domains
A group of network users (ports) assigned to a VLAN form a broadcast domain. Packets are
forwarded only between ports that are designated for the same VLAN. Cross-domain
broadcast traffic in the switch is eliminated and bandwidth is saved by not allowing
packets to flood out on all ports. For many reasons a port may be configured to belong to
multiple VLANs.
As shown below, ports can belong to multiple VLANs. In this figure, a simplistic view is
presented where some ports belong to VLANs 1, 2 and other ports belong to VLANs 2,3.
Ports can belong to VLANs 1, 2 and 3. This is not shown in the figure.
SEGMENT 1 SEGMENT 3
SEGMENT 2
CONSOLE
POWER
By default, on the MultiLink ML800 Managed Edge Switch, VLAN support is enabled and all
ports on the switch belong to the default VLAN (DEFAULT-VLAN). This places all ports on the
switch into one physical broadcast domain.
If VLANs are entirely separate segments or traffic domains - how can the VLANs route
traffic (or “talk”) to each other? This can be done using routing technologies (e.g., a router
or a L3-switch). The routing function can be done internally to a L3-switch. One advantage
of an L3 switch is that the switch can also support multiple VLANs. The L3 switch can thus
route traffic across multiple VLANs easily and provides a cost effective solution if there are
many VLANs defined.
As shown below, routing between different VLANs is performed using a router or a Layer 3
switch (L3-switch)
SEGMENT 1 SEGMENT 2
ROUTER
ROUTER or L3 SWITCH
CONSOLE
POWER
VLAN 1 VLAN 2
FIGURE 10–3: VLAN routing
compliant device attached (such as another switch), these tagged frames can carry VLAN
membership information between switches, thus letting a VLAN span multiple switches.
Normally connections between switches can carry multiple VLAN information and this is
called port trunking or 802.1Q trunks.
There is one important caveat: administrators must ensure ports with non-802.1Q-
compliant devices attached are configured to transmit untagged frames. Many network
interface cards such as those for PCs printers and other “dumb” switches are not 802.1Q-
compliant. If they receive a tagged frame, they will not understand the VLAN tag and will
drop the frame. In situations like these, its best to use port based VLANs for connecting to
these devices.
Sometimes a port may want to listen to broadcasts across different VLANs or propagate
the VLAN information on to other ports. This port must thus belong to multiple VLANs so
that the broadcast information reaches the port accurately. If the port also wants to send
broadcast traffic, the proper leave (sending out of information) and join rules (receiving
information) have to be configured on the MultiLink ML800 Managed Edge Switch.
It is recommended to use IEEE 802.1q tagged based VLANs over port based VLANs
because of there multi-vendor interoperability and capability of carrying the isolated
tagged VLAN information when more than one switch is involved.
10.2.1 Description
Port VLANs are rarely used, and are not recommended, in networks which use VLANs
across multiple switches. Port VLANs are used when VLANs are setup up on a single switch
and connectivity between the system on different VLANs is needed however the
broadcasts and multicasts are isolated to the specific VLAN.
GE recommends using the set-port command for setting the port based VLAN as well.
The port-based VLAN feature supports a maximum of 1 VLAN per port. Any pre-existing
VLAN tags on traffic coming into the switch on a port-based VLAN port will be removed.
General steps for using port VLANs are
1. Plan your VLAN strategy and create a map of the logical topology that will
result from configuring VLANs. Include consideration for the interaction
between VLANs.
2. Configure at least one VLAN in addition to the default VLAN
3. Assign the desired ports to the VLANs
4. Decide on trunking strategy - how will the VLAN information be propagated
from one switch to another and also what VLAN information will be
propagated across
5. (Layer 3 consideration) check to see if the routing between the VLANs is
“working” by pinging stations on different VLANs
You can rename the default VLAN, but you cannot change its VID (1) or delete it from the
Note
switch
NOTE
Any ports not specifically assigned to another VLAN will remain assigned to the DEFAULT-
Note
VLAN
NOTE
Changing the number of VLANs supported on the switch requires the SAVE command to
Note
10.2.2 Commands
The following commands are used for VLANs. To define the VLAN type:
set vlan type=<port|tag|none>
To configure a VLAN:
configure vlan type=port
vlan type=port
To add VLANs:
add id=<vlan Id> [name=<vlan name>] port=<number|list|range>
To start VLANs:
start vlan=<name|number|list|range>
10.3.1 Description
Port VLANs are rarely used, and are not recommended, in networks which use VLANs
across multiple switches. Port VLANs are used when VLANs are setup up on a single switch
and connectivity between the systems on different VLANs is needed; however, the
broadcasts and multicasts are isolated to the specific VLAN.
Either port VLANs or Tag VLAN can be active at any given time on a switch. Only the default
VLAN (VLAN ID = 1) is active as a Tag VLAN as well as a port VLAN.
General steps for using port VLANs are
1. Plan your VLAN strategy and create a map of the logical topology that will
result from configuring VLANs. Include consideration for the interaction
between VLANs.
2. Configure at least one VLAN in addition to the default VLAN.
3. Assign the desired ports to the VLANs
4. Decide on trunking strategy – how will the VLAN information be propagated
from one switch to another and also what VLAN information will be
propagated across.
5. Layer 3 consideration – check to see if the routing between the VLANs is
“working” by pinging stations on different VLANs
You can rename the default VLAN, but you cannot change its VID =1 or delete it from the
Note
switch.
NOTE
Any ports not specifically assigned to another VLAN will remain assigned to the DEFAULT-
Note
VLAN (VID=1).
NOTE
Changing the number of VLANs supported on the switch requires the changes to be saved
Note
for future use. To eliminate the changes, reboot the switch without saving the changes.
NOTE
For VLAN configuration use Configuration > VLAN menu items as shown below. The Port
VLANs are active by default.
As discussed above, ports 1, 2, 3, 5, 6, 7, and 8 still belong to default VLAN. We will now add
another VLAN with VID=40 and VLAN name = Support.
After adding the VLAN, the VLAN is not active. Activating the VLAN has to be done
manually.
To activate the VLAN, click on the Status button.
Select VLAN ID.
Select VLAN Status: Start .
A specific VLAN can be activated or all VLANs can be activated (or disabled).
Click OK to activate VLAN..
After activation, note that ports 1 to 3 belong to the new VLAN. The VLAN membership of
the ports assigned to VLAN 40 now indicates that they are only members of VLAN 40. The
default VLAN membership has been terminated on VLAN activation.
10.4.1 Description
The VLAN information needs to be propagated on to other switches when multiple
switches are connected on a network. In these situations it is best to use tag-based VLANs.
10.4.2 Commands
The set-port command for setting Tag VLANs has the following parameters. The
default id parameter sets the default VLAN id (termed PVID in previous versions). The
default VLAN id is the VLAN id assigned to the untagged packets received on that port. For
the MultiLink ML800 Managed Edge Switch, the default VLAN id is 1
set-port port=<number|list|range>
default id=<number>
The filter parameter enables or disables the VLAN filtering function. When enabled, the
switch will drop the packets coming in through a port if the port is not a member of the
VLAN. For example, if port 1 is a member of VLANs 10, 20 and 30, if a packet with VLAN id
40 arrives at port 1 it will be dropped.
set-port port=<number|list|range>
filter status=<enable|disable>
The tagging id and status parameters define whether the outgoing packets from a port
will be tagged or untagged. This definition is on a per VLAN basis. For example, the
command set-port port=1 tagging id=10 status=tagged will instruct the
switch to tag all packets going out of port 1 to belong to VLAN 10.
set-port port=<number|list|range>
tagging id=<number> status=<tagged|untagged>
The join id parameter adds the specified port(s) to the specified VLAN id. This parameter
works with active or pending VLANs.
set-port port=<number|list|range>
join id=<number>
The leave id parameter releases a specific port from a VLAN. For example if port 1
belongs to VLAN 10, 20, 30, 40 the command set-port port=1 leave id=40 makes port 1
belong to VLAN 10, 20, 30, dropping VLAN 40.
set-port port=<number|list|range>
leave id=<number>
The show-port command lists all parameters related to tag VLAN for the list of ports. If
the port parameter is omitted, it will display all ports.
show-port [port=<port|list|range>]
To move Management Control on any VLAN:
add id=<vlan Id> [name=<vlan name>] port=<number|list|range>
[Forbid=<number|list|range>][<mgt|nomgt>]
To enable or disable Management Control on any VLAN:
edit id=<vlan Id>[name=<vlan name>][port=<number|list|range>[<mgt|nomgt>]
10.4.3 Example
In the following example, we start with Port VLAN and convert to TAG VLAN. We define
ports 3 through 5 to belong to VLANs 10, 20 and 30 and the rest of the ports belong to the
default VLAN (in this case, VLAN 1). Filtering is enabled on ports 3 to 5. The VLAN setup is
done before devices are plugged into ports 3 to 5 as a result the status of the ports show
the port status as DOWN.
1. A word of caution - when Tag VLAN filtering is enabled, there can be serious
connectivity repercussions - the only way to recover from that it is to reload
the switch without saving the configuration or by modifying the configuration
from the console (serial) port.
2. There can be either Tag VLAN or Port VLAN. Both VLANs cannot co-exit at the
same time.
3. There can only be one default VLAN for the switch. The default is set to VLAN 1
and can be changed to another VLAN. A word of caution on changing the
default VLAN as well - there can be repercussions on management as well as
multicast and other issues.
4. Tag VLAN support VLAN ids from 1 to 4096. VLAN ids more than 2048 are
reserved for specific purposes and it is recommended they not be used.
ML800#vlan type=port
ML800(port-vlan)##show vlan type=port
VLAN ID: 1
Name : Default VLAN
Status : Active
========================
PORT | STATUS
========================
5| DOWN
6| DOWN
7| UP
VLAN ID: 10
Name : engineering
Status : Active
========================
PORT | STATUS
========================
1| DOWN
VLAN ID: 20
Name : sales
Status : Active
========================
PORT | STATUS
========================
2| DOWN
VLAN ID: 30
Name : marketing
Status : Active
========================
PORT | STATUS
To switch to Tag VLAN, the port VLAN has to be disabled or
========================
stopped. Only one type of VLAN can co-exist at the same
3| DOWN
time. Exit out of Port VLAN configuration mode and set the
VLAN ID: 40
VLAN type to be Tag VLAN.
Name : Support
Status : Active
========================
PORT | STATUS
========================
4| UP
ML800(port-vlan)##stop vlan=all
All active VLAN's stopped.
ML800(port-vlan)##exit
ML800#set vlan type=tag
VLAN set to Tag-based.
ML800#show active-vlan
Tag VLAN is currently active.
ML800#show vlan type=tag
VLAN ID: 1
Name : Default VLAN
Status : Active
-----------------------------------------------
PORT | MODE | STATUS
----------------------------------------------- Note that ports 3 to 5 are “DOWN” - the
1| UNTAGGED | UP VLAN configuration is preferably done
2| UNTAGGED | DOWN before devices are plugged in to avoid
3| UNTAGGED | DOWN connectivity repercussions.
4| UNTAGGED | DOWN
5| UNTAGGED | DOWN
6| UNTAGGED | DOWN
7| UNTAGGED | UP
ML800#vlan type=tag
ML800(tag-vlan)##add id=10 name=mkt port=3-5
Tag based vlan Added Successfully.
Vlan id :10
Vlan name : engineering
Ports :3-5
ML800(tag-vlan)##edit id=10 name=engineering port=3-5
Tag based vlan edited Successfully.
Vlan id : 10
Vlan name : engineering
Ports : 3-5
ML800(tag-vlan)##add id=20 name=sales port=3-5
VLAN ID: 1
Name : Default VLAN
Status : Active
-----------------------------------------------
PORT | MODE | STATUS
-----------------------------------------------
1| UNTAGGED | UP
2| UNTAGGED | DOWN
3| UNTAGGED | DOWN
4| UNTAGGED | DOWN
5| UNTAGGED | DOWN
6| UNTAGGED | DOWN
7| UNTAGGED | UP
VLAN ID: 10
Name : engineering
Status : Pending
----------------------------------------------- Note that the VLANs are not started as yet.
PORT | MODE | STATUS Adding the VLAN does not start it by
default.
-----------------------------------------------
3| UNTAGGED | DOWN
4| UNTAGGED | DOWN
5| UNTAGGED | DOWN
VLAN ID: 20
Name : sales
Status : Pending
-----------------------------------------------
PORT | MODE | STATUS
-----------------------------------------------
3| UNTAGGED | DOWN
4| UNTAGGED | DOWN
5| UNTAGGED | DOWN
VLAN ID: 30
Name : marketing
Status : Pending
-----------------------------------------------
PORT | MODE | STATUS
-----------------------------------------------
3| UNTAGGED | DOWN
4| UNTAGGED | DOWN
5| UNTAGGED | DOWN
ML800(tag-vlan)##start vlan=all
All pending VLAN's started.
ML800(tag-vlan)##set-port port=3-5 filter status=enable
Ingress Filter Enabled
ML800(tag-vlan)##show vlan type=tag
VLAN ID: 1
-----------------------------------------------
PORT | MODE | STATUS
-----------------------------------------------
1| UNTAGGED | UP
2| UNTAGGED | DOWN
6| UNTAGGED | DOWN
7| UNTAGGED | UP
VLAN ID: 10
Name : engineering
Status : Active
-----------------------------------------------
PORT | MODE | STATUS
-----------------------------------------------
3| UNTAGGED | DOWN Enable filtering on the ports required. The
4| UNTAGGED | DOWN software will prompt to ensure that
5| UNTAGGED | DOWN connectivity is not disrupted.
VLAN ID: 20
Name : sales
Status : Active
-----------------------------------------------
PORT | MODE | STATUS
-----------------------------------------------
3| UNTAGGED | DOWN
4| UNTAGGED | DOWN
5| UNTAGGED | DOWN
VLAN ID: 30
Name : marketing
Status : Active
-----------------------------------------------
PORT | MODE | STATUS VLANs are now active. However, as the
----------------------------------------------- packet traverses VLANs, the packet should
3| UNTAGGED | DOWN be tagged. This is enabled next.
4| UNTAGGED | DOWN
5| UNTAGGED | DOWN
ML800(tag-vlan)##set-port port=3-5 tagging id=10 status=tagged
Port tagging enabled
ML800(tag-vlan)##set-port port=3-5 tagging id=20 status=tagged
Port tagging enabled
ML800(tag-vlan)##set-port port=3-5 tagging id=30 status=tagged
Port tagging enabled
ML800(tag-vlan)##show vlan type=tag
VLAN ID: 1
Name : Default VLAN
Status : Active
-----------------------------------------------
PORT | MODE | STATUS
-----------------------------------------------
1| UNTAGGED | UP
2| UNTAGGED | DOWN
6| UNTAGGED | DOWN
7| UNTAGGED | UP
VLAN ID: 10
Name : engineering
Status : Active
-----------------------------------------------
PORT | MODE | STATUS
-----------------------------------------------
3| TAGGED | DOWN
4| TAGGED | DOWN
5| TAGGED | DOWN
VLAN ID: 20
Name : sales
Status : Active
-----------------------------------------------
PORT | MODE | STATUS
-----------------------------------------------
3| TAGGED | DOWN
4| TAGGED | DOWN
5| TAGGED | DOWN
VLAN ID: 30
Name : marketing
Status : Active
-----------------------------------------------
PORT | MODE | STATUS
-----------------------------------------------
3| TAGGED | DOWN
4| TAGGED | DOWN
5| TAGGED | DOWN
10.5.1 Description
When multiple switches are on a network, the VLAN information needs to be propagated
on to other switches. In such situations, it is best to use tag based VLANs.
On the ML800, the port VLAN type is set to none. To use Tag VLANs, first enable Tag VLANs.
In the following example, we assign various ports as VLANs 10, 20 and 30 and the
remaining ports to the default VLAN (that is, VLAN 1).
The VLAN setup occurs before devices are connected to the ports. As such, the port status
is shown as DOWN.
There can be serious connectivity repercussions when Tag VLAN filtering is enabled. The
only way to recover from this it is to reload the switch without saving the configuration or
by modifying the configuration from the console (serial) port.
The ML800 can be configured for either Tag VLAN or Port VLAN. Both VLANs cannot co-exit
at the same time. There can only be one default VLAN for the switch. The default is set to
VLAN 1 and can be changed to another VLAN.
There can be repercussions on management as well as multicast and other issues when
changing the default VLAN.
Tag VLAN supports VLAN IDs from 1 to 4096. VLAN IDs greater than 2048 are reserved for
specific purposes. As such, it is recommended they not be used.
To use the Tag VLAN, first
Set the VLAN type to Tag in the Configuration > VLAN > Set Type
menu.
After adding the ports and defining the VLAN, click OK.
Click on Port Settings in the Configuration >VLAN >Tag-Based
menu and enable the tagging for each port..
Repeat the last two steps for each of the ports and each of the
VLANs (click on port settings and enable the tag on the port.)
After all the ports are tagged, the tagged column should change to
“Yes” for all VLANs
To check the status of the tagging,
Select the Configuration > VLAN > Tag-Based > Tagging menu.
.
Tagged VLANs can be viewed from the Configuration > VLAN > Tag-Based > Tagging
menu.
To add or delete specific ports from a VLAN,
Click on Join & Leave button from the Configuration > VLAN >. Tag-
Based > Settings menu and specify the action.
In the example below, we will take port 2 and assign it to leave VLAN
10. After the action is completed, note that port 2 will belong to VLAN
1 only.
To enable the filter capability for each port, use the Configuration >VLAN >Tag-Based >
Settings menu as shown below.
Use the Configuration >VLAN >Tag-Based > Filter menu to view the filter information for
the ports.
Multilink ML800
11.1 Overview
11.1.1 Description
The Generic Attribute Registration Protocol (GARP) and VLAN registration over GARP is
called GVRP. GVRP is defined in the IEEE 802.1q and GARP in the IEEE 802.1p standards. To
utilize the capabilities of GVRP, GE Digital Energy recommends that the user become
familiar with the concepts and capabilities of IEEE 802.1q.
There must be one common VLAN (that is, one common VID) connecting all of the GVRP-
Note
aware devices in the network to carry GVRP packets. GE Digital Energy recommends the
NOTE default VLAN (DEFAULT_VLAN; VID = 1), which is automatically enabled and configured as
untagged on every port of the MultiLink ML800 Managed Edge Switch. That is, on ports
used as GVRP links, leave the default VLAN set to untagged and configure other static
VLANs on the ports as either “Tagged or Forbid” (“Forbid” is discussed later in this chapter).
754721A1.CDR
Switch 1 with static VLANs (VID= 1, 2, and 3). Port 2 is a member of VIDs 1, 2, and 3.
1. Port 2 advertises VIDs 1, 2, and 3.
2. On Switch 2 - Port 1 receives advertisement of VIDs 1, 2, and 3 AND becomes a
member of VIDs 1, 2, and 3.
3. As discussed above, a GVRP enabled port can forward advertisement for a
VLAN it learnt about. So port 3 advertises VIDs 1, 2, and 3, but port 3 is NOT a
member of VIDs 1, 2, and 3 at this point, nor will it join the VLAN until and
advertisement is received.
4. On Switch 3, port 4 receives advertisement of VIDs 1, 2, and 3 and becomes a
member of VIDs 1, 2, and 3.
5. Port 5 advertises VIDs 1, 2,and 3, but port 5 is NOT a member of VIDs 1, 2, and
3 at this point.
6. Port 6 on the end device is statically configured to be a member of VID 3. Port
6 advertises VID 3.
7. Port 5 receives advertisement.
8. Port 4 advertises VID 3.
9. Port 3 receives advertisement of VID 3 AND becomes a member of VID 3. (Still
not a member of VIDs 1 and 2 as it did not receive any advertisements for VID
1 or 2).
10. Port 1 advertises VID 3 of VID 3 AND becomes a member of VID 3. (Port 1 is still
not a member of VIDs 1 and 2).
11. Port 2 receives advertisement of VID 3. (Port 2 was already statically
configured for VIDs 1, 2, 3).
If a static VLAN is configured on at least one port of a switch, and that port has established
Note
a link with another device, then all other ports of that switch will send advertisements for
NOTE that VLAN.
In the following figure, tagged VLAN ports on switch “A” and switch “C” advertise VLANs 22
and 33 to ports on other GVRP-enabled switches that can dynamically join the VLANs. A
port can learn of a dynamic VLAN through devices that are not aware of GVRP (Switch “B”).
Switch C
Switch C Port 5 dynamically joined VLAN 22
1 5 GVRP On Ports 11, 12 belong to Tagged VLAN 33
Switch A
GVRP On Tagged
VLAN 22
Tagged 11
2 Switch E
VLAN 22 Tagged 12 GVRP On
VLAN 33 Dynamic
VLAN 33
Switch D
Dynamic
GVRP On
Switch B VLAN 22
Dynamic 3
No GVRP 7
VLAN 33
Tagged Switch E
Dynamic 6
VLAN 22 Port 2 dynamically joined VLAN 33
VLAN 22 Ports 7 dynamically joined VLAN 33
Switch D
Port 3 dynamically joined VLAN 33
Ports 6 dynamically joined VLAN 33 754722A1.CDR
An “unknown VLAN” is a VLAN that the switch learns of by GVRP. For example, suppose that
port 1 on switch “A” is connected to port 5 on switch “C”. Because switch “A” has VLAN 22
statically configured, while switch “C” does not have this VLAN statically configured, VLAN
22 is handled as an “Unknown VLAN” on port 5 in switch “C”. Conversely, if VLAN 22 was
statically configured on switch C, but port 5 was not a member, port 5 would become a
member when advertisements for VLAN 22 were received from switch “A”. GVRP provides a
per-port join-request option which can be configured.
VLANs must be disabled in GVRP-unaware devices to allow tagged packets to pass
through. A GVRP-aware port receiving advertisements has these options:
• If there is no static VLAN with the advertised VID on the receiving port, then
dynamically create a VLAN with the same VID as in the advertisement, and allow
that VLAN's traffic
• If the switch already has a static VLAN with the same VID as in the advertisement,
and the port is configured to learn for that VLAN, then the port will dynamically join
the VLAN and allow that VLAN's traffic.
• Ignore the advertisement for that VID and drop all GVRP traffic with that VID
• Don't participate in that VLAN
• A port belonging to a tagged or untagged static VLAN has these configurable
options:
• Send VLAN advertisements, and also receive advertisements for VLANs on other
ports and dynamically join those VLANs
• Send VLAN advertisements, but ignore advertisements received from other ports
• Avoid GVRP participation by not sending advertisements and dropping any
advertisements received from other devices
The show-vlan command displays a switch's current GVRP configuration, including the
unknown VLANs.
show-vlan
A port must be enabled and configured to learn for it to be assigned to the dynamic VLAN.
To send advertisements, one or more tagged or untagged static VLANs must be configured
on one (or more) switches with GVRP enabled. The ML800 software allows a dynamic VLAN
to be converted to a static VLAN with the static command.
static vlan=<VID>
The show vlan type=tag command will display VID in case the VID is not known.
Note
NOTE
Example 11-1 illustrates how to convert a dynamic VLAN into a static VLAN.
As the following table indicates, a port that has a tagged or untagged static VLAN has the
option for both generating advertisements and dynamically joining other VLANs.
ML800# gvrp
ML800(gvrp)## show-vlan
=================================================
VLAN ID | NAME | VLAN | STATUS
=================================================
1 | Default VLAN | Static | Active
2 | Blue | Static | Active
6 | dyn6 | Dynamic | Active
ML800(gvrp)## static vlan=10
ML800(gvrp)## show-vlan
=================================================
VLAN ID | NAME | VLAN | STATUS
=================================================
1 | Default VLAN | Static | Active
2 | Blue | Static | Active
The unknown VLAN parameters are configured on a per interface basis using the CLI. The
tagged, untagged, Auto, and Forbid options are configured in the VLAN context. Since
dynamic VLANs operate as tagged VLANs, and it is possible that a tagged port on one
device may not communicate with an untagged port on another device, GE Digital Energy
recommends that you use tagged VLANs for the static VLANs.
A dynamic VLAN continues to exist on a port for as long as the port continues to receive
advertisements of that VLAN from another device connected to that port or until you:
• Convert the VLAN to a static VLAN
• Reconfigure the port to Block or Disable
• Disable GVRP
• Reboot the switch
The time-to-live for dynamic VLANs is 10 seconds. That is, if a port has not received an
advertisement for an existing dynamic VLAN during the last 10 seconds, the port removes
itself from that dynamic VLAN.
11.2.1 Commands
The commands used for configuring GVRP are shown below.
The gvrp command enables or disables GVRP.
gvrp <enable|disable>
The show gvrp command displays whether GVRP is disabled, along with the current
settings for the maximum number of VLANs and the current primary VLAN.
show gvrp
The set-ports command set the state of the port to learn, block or disable for GVRP.
Note the default state is disable.
set-ports port=<port|list|range> state=<learn|block|disable>
The set-forbid command sets the forbid GVRP capability on the ports specified.
set-forbid vlan=<tag vlanid>
forbid=<port-number|list|range>
The show-forbid command displays the ports with GVRP forbid capabilities.
show-forbid
The following example illustrates how to configure GVRP using the commands shown in
this section.
ML800# gvrp
ML800(gvrp)# show gvrp
GVRP Status : Enabled
ML800(gvrp)## gvrp disable
GVRP is now disabled
ML800(gvrp)## gvrp enable
GVRP enabled
ML800(gvrp)## show-vlan
=================================================
VLAN ID | NAME | VLAN | STATUS
=================================================
1 | Default VLAN | Static | Active
2 | Blue | Static | Active
6 | dyn6 | Dynamic | Active
ML800(gvrp)## static vlan=10
ML800(gvrp)## show-vlan
=================================================
VLAN ID | NAME | VLAN | STATUS
=================================================
1 | Default VLAN | Static | Active
2 | Blue | Static | Active
6 | dyn6 | Static | Active
ML800(gvrp)## set-forbid vlan=2 forbid=3-5
ML800(gvrp)## show-forbid
============================================
VLAN ID | FORBIDDEN PORTS
============================================
1 | None
11.3.1 Example
To configure GVRP,
Select the Configuration > VLAN > GVRP menu item.
From the GVRP menu screen, GVRP can be enabled or disabled using the drop down menu.
Each specific port can be put in the Learn, Disable or Enable state as shown in Table 11–2:
GVRP options on page 11–4.
The unknown VLAN parameters are configured on a per interface basis using the CLI. The
tagged, untagged, Auto, and Forbid options are configured in the VLAN context. Since
dynamic VLANs operate as tagged VLANs, and it is possible that a tagged port on one
device may not communicate with an untagged port on another device, GE Digital Energy
recommends that you use tagged VLANs for the static VLANs.
A dynamic VLAN continues to exist on a port for as long as the port continues to receive
advertisements of that VLAN from another device connected to that port or until you:
• Convert the VLAN to a static VLAN
• Reconfigure the port to Block or Disable
• Disable GVRP
• Save the configuration
• Reboot the switch
The time-to-live for dynamic VLANs is 10 seconds. That is, if a port has not received an
advertisement for an existing dynamic VLAN during the last 10 seconds, the port removes
itself from that dynamic VLAN.
Refer to GVRP Operation Notes on page 11–6 for additional information on using GVRP.
Multilink ML800
12.1 Overview
12.1.1 Description
The Spanning Tree Protocol was designed to avoid loops in an Ethernet network. An
Ethernet network using switches can have redundant paths, which may cause loops. To
prevent loops, the MultiLink Switch Software uses the spanning tree protocol (STP).
Controlling the span in which traffic traverses is necessary as a manager of the software. It
is also necessary to specify the parameters of STP. STP is available as the IEEE 802.1d
protocol and is a standard of the IEEE.
The table below lists the default values of the STP variables. Refer to the following section
for detailed explanation on the variables. By default, STP is disabled. To use STP, it has to be
manually enabled.
RSTP CONFIGURATION
-----------------
Rapid STP/STP Enabled(Global) : NO
RSTP/STP Enabled Ports : 1,2,3,4,5,6,7
Protocol : Normal RSTP
Bridge ID : 80:00:00:00:00:00:00:00
Bridge Priority : 32768
Bridge Forward Delay : 15
Bridge Hello Time : 02
Bridge Max Age : 20
Root Port :0
Root Path Cost :0
Designated Root : 80:00:00:00:00:00:00:00
-------------------------------------------------------------------------------
Port# Type Priority Path Cost State Des. Bridge Des. Port
-------------------------------------------------------------------------------
01 TP(10/100) 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:01
02 TP(10/100) 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:02
03 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:03
• Priority: STP uses this to determine which ports are used for forwarding. Lower the
number means higher priority. Value ranges from 0 to 255. Default is 128
• Path Cost: This is the assigned port cost value used for the switch to determine the
forwarding points. Values range from 1 to 65535
• State: indicates the STP state of individual ports. Values can be Listening, Learning,
Forwarding, Blocking and Disabled.
• Des. Bridge: This is the port's designated root bridge
• Des. Port: This is the port's designated root port
To enable or disable STP, enter the STP configuration mode via the stp command and use
the stp enable or stp disable command.
To stp command enters STP configuration mode:
stp
The enable and disable parameters start (enable) or stop (disable) STP.
stp <enable|disable>
The stp and rstp parameters set the spanning tree protocol to be IEEE 802.1d or 802.1w
(Rapid Spanning Tree Protocol).
set stp type=<stp|rstp>
The show active-stp command display which version of STP is currently active.
show active-stp
Incorrect STP settings can adversely affect network performance. GE recommends starting
Note
with the default STP settings. Changing the settings requires a detailed understanding of
NOTE STP. For more information on STP, please refer to the IEEE 802.1d standard.
It is always a good idea to check which mode of STP is active. If the proper mode is not
Note
active, the configuration command stp will not be understood. To set the proper mode,
NOTE use the set stp command.
Example 12-3 shows how to enable STP using the above commands.
ML800#show active-stp
ML800#stp
ML800#stp
ML800(stp)##stp enable
Successfully set the STP status
STP CONFIGURATION
-----------------
Spanning Tree Enabled(Global) : YES
Spanning Tree Enabled(Ports) : YES, 1,2,3,4,5,6,7
Protocol : Normal STP
Bridge ID : 80:00:00:20:06:2b:e1:54
Bridge Priority : 32768
Bridge Forward Delay : 15
Bridge Hello Time : 2
Bridge Max Age : 20
Root Port : 0
Root Path Cost : 0
Designated Root : 80:00:00:20:06:2b:e1:54
The priority command specifies the port or switch level priority. When a port(s) are
specified the priority is associated with ports and their value is 0 to 255. If no ports are
specified, then the switch (bridge) priority is specified and its value is 0 to 65535. This value
is used along with the switch MAC address to determine which switch in the network is the
root device. Lower values mean higher priority. The default value is 32768.
priority [port=<number|list|range>]
value=<0-255 | 0-65535>
The cost command is port specific. A path cost is assigned to individual ports for the
switch to determine which ports are the forwarding points. A higher cost means the link is
“more expensive” to use and falls in the passive mode compared to the link with a lower
cost. Value ranges from 0 to 65535, with a default value of 32768.
cost port=<number|list|range>
value=<0-65535>
The port command assigns ports to STP. If you are unsure, let the software make the
decisions. The status parameter enables or disables a port from participating in STP
discovery. Its best to only allow trunk ports to participate in STP. End stations need not
participate in STP process.
port port=<number|list|range>
status=<enable|disable>
The timers command changes the STP forward delay, hello timer and aging timer values.
The forward-delay parameter indicates the time duration the switch will wait from
listening to learning states and from learning to forwarding states. The value ranges from
4 to 30 seconds with a default value of 15. When the switch is the root device, the hello
parameter represents the time between messages being transmitted. The value is from 1
to 10 seconds with a default value is 2. The age parameter is the maximum time a
message with STP information is allowed by the switch before the switch discards the
information and updates the address table again. Value ranges from 6 to 40 seconds with
default value of 20.
timers forward-delay=<4-30> hello=<1-10> age=<6-40>
STP CONFIGURATION
-----------------
Spanning Tree Enabled(Global) : NO
Spanning Tree Enabled(Ports) : YES, 1,2,3,4,5,6,7
Protocol : Normal STP
Bridge ID : 80:00:00:20:06:2b:e1:54
Bridge Priority : 32768
Bridge Forward Delay : 15
Bridge Hello Time : 2
Bridge Max Age : 20
Root Port : 0
Root Path Cost : 0
Designated Root : 80:00:00:20:06:2b:e1:54
Designated Root Priority : 32768
Root Bridge Forward Delay : 15
Root Bridge Hello Time : 2
Root Bridge Max Age : 20
-------------------------------------------------------------------------------
Port# Type Priority Path Cost State Des. Bridge Des. Port
-------------------------------------------------------------------------------
Port# Type Priority Path Cost State Des. Bridge Des. Port
-------------------------------------------------------------------------------
01 TP(10/100) 128 100 Forwarding 80:00:00:20:06:2b:e1:54 80:01
02 TP(10/100) 128 19 Forwarding 80:00:00:20:06:2b:e1:54 80:02
03 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:03
04 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:04
Ports that have connected devices
05 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:05 now participate in STP.
06 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:06
07 TP(10/100) 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:07
ML800(stp)##priority value=15535
Successfully set the bridge priority
STP CONFIGURATION
-----------------
Spanning Tree Enabled(Global) : YES
Spanning Tree Enabled(Ports) : YES, 1,2,3,4,5,6,7
Protocol : Normal STP
STP is now enabled. Note the default
Bridge ID : 3c:af:00:20:06:2b:e1:54
values for the discussed variables.
Bridge Priority : 15535
Bridge Forward Delay : 15
Bridge Hello Time : 2
Bridge Max Age : 20
Root Port : 0
Root Path Cost : 0
Designated Root : 3c:af:00:20:06:2b:e1:54
Designated Root Priority : 15535
Root Bridge Forward Delay : 15
Root Bridge Hello Time : 2
Root Bridge Max Age : 20
-------------------------------------------------------------------------------
Port# Type Priority Path Cost State Des. Bridge Des. Port
-------------------------------------------------------------------------------
01 TP(10/100) 128 100 Forwarding 80:00:00:20:06:2b:e1:54 80:01
02 TP(10/100) 20 20 Forwarding 80:00:00:20:06:2b:e1:54 80:02
03 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:03
04 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:04
05 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:05
06 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:06
07 TP(10/100) 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:07
Port# Type Priority Path Cost State Des. Bridge Des. Port
-------------------------------------------------------------------------------
01 TP(10/100) 128 100 Forwarding 80:00:00:20:06:2b:e1:54 80:01
02 TP(10/100) 20 20 Forwarding 80:00:00:20:06:2b:e1:54 80:02
03 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:03
04 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:04
05 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:05
06 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:06
07 TP(10/100) 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:07
-------------------------------------------------------------------------------
Port# Type Priority Path Cost State Des. Bridge Des. Port
-------------------------------------------------------------------------------
01 TP(10/100) 128 100 Forwarding 80:00:00:20:06:2b:e1:54 80:01
02 TP(10/100) 20 20 Forwarding 80:00:00:20:06:2b:e1:54 80:02
03 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:03
04 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:04
05 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:05
06 100MB Fiber 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:06
07 TP(10/100) 128 100 Disabled 80:00:00:20:06:2b:e1:54 80:07
STP CONFIGURATION
-----------------
Spanning Tree Enabled(Global) : YES
Spanning Tree Enabled(Ports) : YES, 1,2,3,4,5,6,7
Protocol : Normal STP
Bridge ID : 80:00:00:20:06:2b:e1:54
Bridge Priority : 15535
Bridge Forward Delay : 15
Bridge Hello Time : 2
Bridge Max Age : 20
Root Port : 0
Root Path Cost : 0
Designated Root : 80:00:00:20:06:2b:e1:54
Designated Root Priority : 15535
Root Bridge Forward Delay : 15
STP CONFIGURATION
-----------------
Spanning Tree Enabled(Global) : YES
Spanning Tree Enabled(Ports) : YES, 1,2,3,4,5,6,7
Protocol : Normal STP
Bridge ID : 80:00:00:20:06:2b:e1:54
Bridge Priority : 15535
Bridge Forward Delay : 20
Bridge Hello Time : 5
Bridge Max Age : 30
Root Port : 0
Root Path Cost : 0
Designated Root : 80:00:00:20:06:2b:e1:54
Multilink ML800
13.1 Overview
13.1.1 Description
The Rapid Spanning Tree Protocol (RTSP), like STP, was designed to avoid loops in an
Ethernet network. Rapid Spanning Tree Protocol (RSTP) (IEEE 802.1w) is an evolution of the
Spanning Tree Protocol (STP) (802.1d standard) and provides for faster spanning tree
convergence after a topology change.
neighbor it cannot be sure where along the path to the root a failure occurred.
RSTP switches (bridges) generate their own configuration messages, even if they
fail to receive one from the root bridge. This leads to quicker failure detection
• RSTP offers edge port recognition, allowing ports at the edge of the network to
forward frames immediately after activation while at the same time protecting
them against loops
• An improvement in RSTP allows configuration messages to age more quickly
preventing them from “going around in circles” in the event of a loop
RSTP has three states. They are discarding, learning and forwarding.
The discarding state is entered when the port is first taken into service. The port does not
learn addresses in this state and does not participate in frame transfer. The port looks for
STP traffic in order to determine its role in the network. When it is determined that the port
will play an active part in the network, the state will change to learning. The learning state
is entered when the port is preparing to play an active member of the network. The port
learns addresses in this state but does not participate in frame transfer. In a network of
RSTP switches (bridges) the time spent in this state is usually quite short. RSTP switches
(bridges) operating in STP compatibility mode will spend between 6 to 40 seconds in this
state. After 'learning' the bridge will place the port in the forwarding state. While in this
state the port both learns addresses and participates in frame transfer while in this state.
The result of these enhanced states is that the IEEE 802.1d version of spanning tree (STP)
can take a fairly long time to resolve all the possible paths and to select the most efficient
path through the network. The IEEE 802.1w Rapid reconfiguration of Spanning Tree
significantly reduces the amount of time it takes to establish the network path. The result is
reduced network downtime and improved network robustness. In addition to faster
network reconfiguration, RSTP also implements greater ranges for port path costs to
accommodate the higher connection speeds that are being implemented.
Proper implementations of RSTP (by switch vendors) is designed to be compatible with IEEE
802.1d STP. GE recommends that you employ RSTP or STP in your network.
Users may notice extended recovery time if there is a mix of firmware revisions in the Mesh
Note
or Ring
NOTE
ML800#rstp
RSTP CONFIGURATION
-----------------
Rapid STP/STP Enabled(Global) : NO
RSTP/STP Enabled Ports : 1,2,3,4,5,6,7
Protocol : Normal RSTP
Bridge ID : 80:00:00:20:06:2b:e1:55
Bridge Priority : 32768
Bridge Forward Delay : 15
Bridge Hello Time : 02
Bridge Max Age : 20
Root Port :0
Root Path Cost :0
Designated Root : 80:00:00:20:06:2b:e1:55
Designated Root Priority : 32768
Root Bridge Forward Delay : 15
Root Bridge Hello Time : 02
Root Bridge Max Age : 20
Topology Change count :0
Time Since topology Chg : 16
• Root Port: Indicates the port number, which is elected as the root port of the switch. A
root port of "0" indicates STP is disabled.
• Root Path Cost: A path cost is assigned to individual ports for the switch to determine
which ports are the forwarding points. A higher cost means more loops; a lower cost
means fewer loops. More loops equal more traffic and a tree which takes a long time
to converge, resulting in a slower system.
• Designated Root: Shows the MAC address of the bridge in the network elected or
designated as the root bridge.
• Designated Root Priority: Shows the designated root bridge's priority. The default
value is 0.
• Root Bridge Forward Delay: Indicates the designated root bridge's forward delay.
This is the time the switch waits before it switches from the listening to the forwarding
state. This value can be set between 4 to 30 seconds, with a default of 15.
• Root Bridge Hello Time: Indicates the designated root bridge's hello time. Hello
information is sent out every 2 seconds.
• Root Bridge Max Age: Indicates the designated root bridge's maximum age, after
which it discards the information as being old and receives new updates.
• Topology Change Count: Since the last reboot, the number of times the topology has
changed. Use this in conjunction with "show uptime" to find the frequency of the
topology changes.
• Time Since topology Change: The number of seconds since the last topology change.
The variables listed by the show stp ports command are:
• Port#: Indicates the port number. The value ranges from 1 to the maximum number of
ports in the switch.
• Type: Indicates the type of port. TP indicates twisted pair.
• Priority: STP uses this to determine which ports are used for forwarding. Lower
numbers indicate higher priority. The values range from 0 to 255, with a default of 128.
• Path Cost: This is the assigned port cost value used for the switch to determine the
forwarding points. Values range from 1 to 2000000. Lower values indicate a lower
cost and hence the preferred route. The costs for different Ethernet speeds are
indicated below. The Path cost in STP is compared to the path cost in RSTP.
-------------------------------------------------------------------------------
Port# Type Priority Path Cost State Des. Bridge Des. Port
-------------------------------------------------------------------------------
01 TP(10/100) 128 2000000 Disabled 00:01
02 TP(10/100) 128 2000000 Disabled 00:02
03 100MB Fiber 128 200000 Disabled 00:03
-------------------------------------------------------------------------------
Port# Type Priority Path Cost State Des. Bridge Des. Port
-------------------------------------------------------------------------------
01 TP(10/100) 128 200000 Forwarding 80:00:00:20:06:30:00:01 00:01
02 TP(10/100) 128 2000000 Disabled 00:02
03 100MB Fiber 128 200000 Disabled 00:03
04 100MB Fiber 128 200000 Disabled 00:04
• State: Indicates the STP state of individual ports. Values can be Listening, Learning,
Forwarding, Blocking and Disabled.
• Des. Bridge: This is the port's designated root bridge
• Des. Port: This is the port's designated root port
Another example of the same command, from a larger network with several switches is
shown in Example 13-3. Note the show stp ports command can be executed from the
manager level prompt or from RSTP configuration state as shown in the screen captures
earlier
In this example, ports 9 and 10 have a path cost of 20000 and are the least cost paths.
These ports are connected to other switches and the ports are enabled as forwarding
ports. Ports 6 and 7 are also connected to other switches. From the state column, it
indicates that port 7 is in a standby state as that port is discarding all traffic.
More CLI commands associated with RSTP in the RSTP configuration mode are shown
below. The forceversion command sets the STP or RSTP compatibility mode.
forceversion <stp|rstp>
The show-forceversion command displays the current forced version.
show-forceversion
The show-timers command displays the values of the timers set for RSTP.
show-timers
The priority command specifies the switch (bridge) priority value. This value is used
along with the switch MAC address to determine which switch in the network is the root
device. Lower values mean higher priority. The value ranges from 0 to 65535 with a default
of 32768. When port are specified, the priority is associated with ports and their value is 0
to 255.
priority [port=<number|list|range>]
value=<0-255|0-65535>
A path cost is assigned to individual ports for the switch to determine which ports are the
forwarding points. A higher cost means the link is “more expensive” to use and falls in the
passive mode compared to the link with a lower cost. The value of the cost command
ranges from 0 to 65535, with a default of 32768.
cost port=<number|list|range>
value=<0-65535>
The port command assigns ports for RSTP. Note that specific ports may not need to
participate in RSTP process. These ports typically would be end-stations. If unsure, it is best
to let the software make the decisions.
port port=<number|list|range> status=<enable|disable>
The status parameter enables or disables a port from participating in RSTP discovery. Its
best to only allow trunk ports to participate in RSTP; end stations need not participate in
the RSTP process.
The timers command changes the STP forward delay, hello timer and aging timer values.
timers forward-delay=<4-30> hello=<1-10> age=<6-40>
The forward-delay parameter indicates the time duration the switch will wait from
listening to learning states and from learning to forwarding states. The value ranges from
4 to 30 seconds with a default of 15.
The hello parameter represents the time between messages being transmitted when the
switch is the root device. The value is 1 to 10 seconds, with a default of 2.
The age parameter is the maximum time a message with STP information is allowed by the
switch before the switch discards the information and updates the address table again.
Value ranges from 6 to 40 seconds with default value of 20.
ML800#rstp
RSTP CONFIGURATION
-----------------
Rapid STP/STP Enabled(Global) : NO
RSTP/STP Enabled Ports : 1,2,3,4,5,6,7
Protocol : Normal RSTP
Bridge ID : 80:00:00:20:06:2b:e1:55
Bridge Priority : 32768
Bridge Forward Delay : 15
Bridge Hello Time : 02
Bridge Max Age : 20
Root Port :0
Root Path Cost :0
Designated Root : 80:00:00:20:06:2b:e1:55
Designated Root Priority : 32768
Root Bridge Forward Delay : 15
Root Bridge Hello Time : 02
Root Bridge Max Age : 20
Topology Change count :0
Time Since topology Chg : 935
ML800(rstp)##show active-stp
ML800(rstp)##rstp enable
Successfully set the RSTP status
ML800(rstp)##show active-stp
-------------------------------------------------------------------------------
Port# Type Priority Path Cost State Des. Bridge Des. Port
-------------------------------------------------------------------------------
01 TP(10/100) 128 2000000 Forwarding 80:00:00:20:06:2b:e1:55 00:01
02 TP(10/100) 128 200000 Forwarding 80:00:00:20:06:2b:e1:55 00:02
03 100MB Fiber 128 200000 Disabled 00:03
04 100MB Fiber 128 200000 Disabled 00:04
05 100MB Fiber 128 200000 Disabled 00:05 The forceversion capability can be
used for compatibility with STP
06 100MB Fiber 128 200000 Disabled 00:06 devices. In this example, the switch is
07 TP(10/100) 128 2000000 Disabled 00:07 forced to STP mode.
ML800(rstp)##forceversion rstp
Error: Force Version already set to Normal RSTP
ML800(rstp)##forceversion stp
ML800(rstp)##show-forceversion
Force Version : Force to STP only Using forceversion, the switch is now
operating using RSTP. Note the show
stp config command also indicates
ML800(rstp)##show stp config the switch protocol is RSTP.
RSTP CONFIGURATION
-----------------
Rapid STP/STP Enabled(Global) : YES
RSTP/STP Enabled Ports : 1,2,3,4,5,6,7
Protocol : Force to STP only
Bridge ID : 80:00:00:20:06:2b:e1:55
Bridge Priority : 32768
Bridge Forward Delay : 15
Bridge Hello Time : 02
Bridge Max Age : 20
Root Port :0
Root Path Cost :0
RSTP CONFIGURATION
-----------------
Rapid STP/STP Enabled(Global) : YES
RSTP/STP Enabled Ports : 1,2,3,4,5,6,7
Protocol : Normal RSTP
Bridge ID : 80:00:00:20:06:2b:e1:55
Bridge Priority : 32768
Bridge Forward Delay : 15
Bridge Hello Time : 02
Bridge Max Age : 20
Root Port :0
Root Path Cost :0
Designated Root : 80:00:00:20:06:2b:e1:55
Designated Root Priority : 32768
Root Bridge Forward Delay : 15
Root Bridge Hello Time : 02
Root Bridge Max Age : 20
Topology Change count :0
Time Since topology Chg : 1371
ML800(rstp)##show-timers
RSTP CONFIGURATION
-----------------
Rapid STP/STP Enabled(Global) : YES
RSTP/STP Enabled Ports : 1,2,3,4,5,6,7
Protocol : Normal RSTP
Bridge ID : 80:00:00:20:06:2b:e1:55
Bridge Priority : 32768
Bridge Forward Delay : 20
Bridge Hello Time : 05
Bridge Max Age : 30
Root Port :0
Root Path Cost :0
Designated Root : 80:00:00:20:06:2b:e1:55
Designated Root Priority : 32768
13.2.2 Smart RSTP (Ring-Only Mode) through the Command Line Interface (CLI)
A special case of a mesh structure is a ring. In many networks, network managers prefer to
create a ring structure for redundancy and simplicity of the topology. In a ring structure:
1. All switches in the network are GE Digital Energy switches.
2. RSTP is enabled on all the switches.
3. The topology is a ring.
4. All switches in the ring have been configured to use the Smart RSTP (ring only
mode) (as shown below).
5. All switches in the ring must use the same firmware revision.
The ring structure can demonstrate fast recovery times, typically faster than what RSTP
can recover from a single fault. In many situations RSTP will recover in seconds, whereas
smart RSTP (ring-only mode) will recover in milliseconds.
To configure Ring-Only mode, ensure the first three of the four situations described above
are met.
RSTP mode has to be enabled before any configuration to the ring-only mode.
The RSTP command enters the RSTP configuration mode and enables/disables RSTP. By
default, RSTP is disabled and has to be manually activated.
rstp
rstp <enable|disable>
ML800# rstp
ML800(rstp)##rstp enable
Successfully set the RSTP status
ML800(rstp)##romode show
RO-MODE status : Disabled
RO-MODE set on ports : NONE
ML800(rstp)##romode enable
RSTP Ring Only Mode Enabled.
ML800(rstp)##romode show
RO-MODE status : Enabled
RO-MODE set on ports : 1,2
ML800(rstp)##romode disable
RSTP Ring Only Mode Disabled.
ML800(rstp)##romode show
• Bridge Hello Time: When the switch is the root device, this is the time between
messages being transmitted. The value is from 1 to 10 seconds, with a default of 2.
• Bridge Forward Delay: Indicates the time duration the switch will wait from listening
to learning states and from learning to forwarding states. The value ranges from 4 to
30 seconds, with a default of 15.
• Bridge Max Age: This is the maximum time a message with STP information is allowed
by the switch before the switch discards the information and updates the address
table again. The value ranges from 6 to 40 seconds with a default 20.
• Hold Time: This is the minimum time period to elapse between the transmissions of
configuration BPDUs through a given LAN Port. At most one configuration BPDU shall
be transmitted in any hold time period. This parameter is a fixed parameter, with
values as specified in RSTP standard (3 seconds).
• Topology Change: A counter indicating the number of times topology has changed.
• Time since TC: Indicates time that has elapsed since the last topology change. Use
this in conjunction with uptime on the graphical display (screen shown after a
successful login) to find the frequency of the topology changes.
Click on Edit to make any changes.
On this screen, you can select and enable STP or RSTP.
Under protocol, select “Force to STP” if there are legacy or other third
party devices that do not support RSTP.
Otherwise it is recommended to enable “Normal RSTP”.
Once again, if you are not familiar with the STP or RSTP parameter settings, is best to use
the default values.
Simply enable RSTP (or STP) and let the system default values prevail.
After RSTP is enabled, the fields are updated.
Note the Status, Time since TC, and Designated Root values.
The port specific values for RSTP or STP are shown below.
Click on the edit icon ( ) to edit the values for a specific port.
The columns in the above window are defined as follows:
• Port#: Indicates the port number. Value ranges from 1 to the maximum number of
ports in the switch.
• Port Type: Indicates the type of port and speed; TP indicates twisted-pair.
• Port State: Forwarding implies traffic is forwarded onto the next switch or device
connected the port. Disabled implies that the port may be turned off or the device
connected to it may be unplugged or turned off. Values can be Listening, Learning,
Forwarding, Blocking and Disabled.
• Path Cost: This is the assigned port cost value used for the switch to determine the
forwarding points. Values range from 1 to 2000000. The lower the value, the lower
the cost and hence the preferred route. The costs for different Ethernet speeds are
shown below. The STP path cost is compared to the RSTP path cost.
Table 13–2: Path cost defined in IEEE 802.1d and 802.1w
Port Type STP Path cost RSTP Path cost
10 Mbps 100 2 000 000
100 Mbps 19 200 000
1 Gbps 4 20 000
10 Gbps 2 2000
• Priority: STP uses this to determine which ports are used for forwarding. Lower the
number means higher priority. Value ranges from 0 to 255. Default is 128
• Edge Ports: RSTP offers edge port recognition, allowing ports at the edge of the
network to forward frames immediately after activation while at the same time
protecting them against loops.
• P2P Ports: set the "point-to-point" value to off on all ports that are connected to
shared LAN segments (i.e. connections to hubs). The default value is auto. P2P
ports would typically be end stations or computers on the network.
• Designated Root: MAC Address of the Root Bridge in the tree
• Status: status of STP/RSTP for the port.
The STP or RSTP values can be changed for each port as shown below.
Migration is enabled for all ports connected to other devices such as hubs, bridges and
switches known to support IEEE 802.1d STP services and cannot support RSTP services.
Status is normally enabled - in certain cases the Status can be set to disabled to turn off
RSTP or STP on that port.
13.3.2 Smart RSTP (Ring-Only Mode) with EnerVista Secure Web Management Software
A ring is a special case mesh structure. In many networks, network managers prefer to
create a ring structure for topological redundancy and simplicity. In a ring structure:
1. All switches in the network are GE Digital Energy switches.
2. RSTP is enabled on all the switches.
3. The topology is a ring.
4. All switches in the ring have been configured to use the ring-only mode (as
shown below).
5. All switches in the ring must use the same firmware revision.
The ring structure can demonstrate fast recovery times, typically faster than what RSTP
can recover from a single fault. In many situations RSTP will recover in seconds, whereas
smart RSTP (Ring-Only mode) will recover in milliseconds.
To configure ring-only mode, ensure the first three of the four situations described above
are met.
To enable ring-only mode, first
Enable RSTP by setting the STP Type to RSTP in the Administration >
Set > STP Type menu:
Select the Configuration > RSTP > Bridge RSTP menu as shown
below.
Save Configuration.
...THEN SAVE
ENABLE STATUS...
To reset RSTP back to normal mode, select “Normal RSTP” for the Protocol setting. Save the
configuration by clicking on the icon.
Select the Configuration > RSTP > RO Mode menu as shown below:
NOTE
Select the Enabled option for the Status setting as shown below:
Multilink ML800
14.1.1 Description
Quality of Service (QoS) refers to the capability of a network to provide different priorities to
different types of traffic. Not all traffic in the network has the same priority. Being able to
differentiate different types of traffic and allowing this traffic to accelerate through the
network improves the overall performance of the network and provides the necessary
quality of service demanded by different users and devices. The primary goal of QoS is to
provide priority including dedicated bandwidth.
To make the preemptive queuing possible, most switches implement at least two queue
buffers. The MultiLink ML800 Managed Edge Switch has two priority queues, 1 (low) and 0
(high).When tagged packets enter a switch port, the switch responds by placing the packet
into one of the two queues, and depending on the precedence levels the queue could be
rearranged to meet the QoS requirements.
IP Header
754725A1.CDR
DiffServ inserts a 6-bit DiffServ code point (DSCP) in the Type of Service (ToS) field of the IP
header, as shown in the picture above. Information in the DSCP allows nodes to determine
the Per Hop Behavior (PHB), which is an observable forwarding behavior for each packet.
Per hop behaviors are defined according to:
• Resources required (e.g., bandwidth, buffer size)
• Priority (based on application or business requirements)
• Traffic characteristics (e.g., delay, jitter, packet loss)
Nodes implement PHBs through buffer management and packet scheduling mechanisms.
This hop-by-hop allocation of resources is the basis by which DiffServ provides quality of
service for different types of communications traffic.
14.1.4 IP Precedence
IP Precedence utilizes the three precedence bits in the IPv4 header's Type of Service (ToS)
field to specify class of service for each packet. You can partition traffic in up to eight
classes of service using IP precedence. The queuing technologies throughout the network
can then use this signal to provide the appropriate expedited handling.
Data +FCS
ToS byte
3 bits
IP precedence 754726A1.CDR
The three most significant bits (correlating to binary settings 32, 64, and 128) of the Type of
Service (ToS) field in the IP header constitute the bits used for IP precedence. These bits are
used to provide a priority from 0 to 7 for the IP packet.
Because only three bits of the ToS byte are used for IP precedence, you need to
differentiate these bits from the rest of the ToS byte.
The MultiLink ML800 Managed Edge Switch has the capability to provide QoS at Layer 2. At
Layer 2, the frame uses Type of Service (ToS) as specified in IEEE 802.1p. ToS uses 3 bits,
just like IP precedence, and maps well from Layer 2 to layer 3, and vice versa.
The switches have the capability to differentiate frames based on ToS settings. With two
queues present - high or low priority queues or buffers in MultiLink ML800 Managed Edge
Switch, frames can be placed in either queue and serviced via the weight set on all ports.
This placement of queues, added to the weight set plus the particular tag setting on a
packet allows each queue to have different service levels.
MultiLink ML800 Managed Edge Switch QoS implementations provide mapping of ToS (or IP
precedence) to Class of Service (CoS). A CoS setting in an Ethernet Frame is mapped to the
ToS byte of the IP packet, and vice versa. A ToS level of 1 equals a CoS level of 1. This
provides end-to-end priority for the traffic flow when MultiLink ML800 Managed Edge
Switchs are deployed in the network.
Not all packets received on a port have high priority. IGMP and BPDU packets have high
Note
priority by default.
NOTE
The MultiLink ML800 Managed Edge Switch has the capability to set the priorities based on
three different functions. They are
• Port QoS: assigns a high priority to all packets received on a port, regardless of the
type of packet.
• TAG QoS: if a packet contains a tag, the port on which the packet was received
then looks to see at which level that tag value is set. Regardless of the tag value, if
there is a tag, that packet is automatically assigned high priority (sent to the high
priority queue)
• ToS QoS: (Layer 3) when a port is set to ToS QoS, the most significant 6-bits of the
IPv4 packet (which has 64 bits) are used. If the 6 bits are set to ToS QoS for the
specific port number the packet went to, that packet is assigned high priority by
that port
14.2.1 Commands
The MultiLink ML800 Managed Edge Switch supports three types of QoS - Port based, Tag
based and ToS based.
QoS is disabled by default on the switch. QoS needs to be enabled and configured.
Note
NOTE
The qos command enters the QoS configuration mode.
qos
The usage of the setqos command varies depending on the type of QOS. For example, for
QOS type tag, the tag levels have to be set, and for QOS type ToS, the ToS levels have to be
set. If the priority field is not set, it then defaults to low priority. ToS has 64 levels and the
valid values are 0-63 and a tagged packet has 8 levels and the valid values are 0-7
setqos type=<port|tag|tos|none> port=<port|list|range> [priority=<high|low>] [tos=<0-
63|list|range>]
[tag=<0-7|list|range>]
Setting the type parameter to none will clear the QoS settings.
The set-weight command sets the port priority weight for All the ports. Once the weight
is set, all the ports will be the same weight across the switch. The valid value for weight is
0-7
set-weight weight=<0-7>
A weight is a number calculated from the IP precedence setting for a packet. This weight is
used in an algorithm to determine when the packet will be serviced
The show-portweight command displays the weight settings on a port.
show-portweight
As mentioned previously, the switch is capable of detecting higher-priority packets marked
with precedence by the IP forwarder and can schedule them faster, providing superior
response time for this traffic. The IP Precedence field has values between 0 (the default)
and 7. As the precedence value increases, the algorithm allocates more bandwidth to that
traffic to make sure that it is served more quickly when congestion occurs. The MultiLink
ML800 Managed Edge Switch can assign a weight to each flow, which determines the
transmit order for queued packets. In this scheme, lower weights (set on all ports) are
provided more service. IP precedence serves as a divisor to this weighting factor. For
instance, traffic with an IP Precedence field value of 7 gets a lower weight than traffic with
an IP Precedence field value of 3, and thus has priority in the transmit order.
Once the port weight is set, the hardware will interpret the weight setting for all ports as
outlined below (assuming the queues are sufficiently filled - if there are no packets, for
example, in the high priority queue, packets are serviced on a first come first served - FCFS
- basis from the low priority queue).
14.2.2 Example
The following example shows how to configure QoS.
ML800#show port
Port Name Control Dplx Media Link Trunk Speed Part Auto VlanID GVRP STP
-----------------------------------------------------------------------------
1 A1 E H 10Tx DOWN No 10 No E 1 - -
2 A2 E H 10Tx DOWN No 10 No E 1 - -
3 A3 E F 100Fx DOWN No 100 No D 1 - -
4 A4 E F 100Fx DOWN No 100 No D 1 - -
5 A5 E F 100Fx DOWN No 100 No D 1 - -
6 A6 E F 100Fx DOWN No 100 No D 1 - -
All traffic on port 1 is sent to the
7 A7 E H 10Tx DOWN No 10 No E 1 - - high priority queue.
ML800#qos
ML800(qos)##show qos
========================================
PORT | QOS | STATUS
========================================
1 | Port | DOWN
2 | None | DOWN
All traffic on port 2 is sent to the
3 | None | DOWN high priority queue and the QoS
tag is set to 6.
4 | None | DOWN
5 | None | DOWN
6 | None | DOWN
7 | None | DOWN
ML800(qos)##show qos
========================================
PORT | QOS | STATUS
========================================
1 | Port | DOWN
2 | Tag | DOWN
3 | None | DOWN
4 | None | DOWN
5 | None | DOWN
6 | None | DOWN
7 | None | DOWN
ML800(qos)##set-weight weight=4
ML800(qos)##show-portweight
ML800(qos)##show qos
========================================
PORT | QOS | STATUS
========================================
1 | Port | DOWN
2 | Tag | DOWN
3 | Tag | DOWN
4 | None | DOWN
5 | None | DOWN
6 | None | DOWN
7 | None | DOWN
ML800(qos)##
14.3.1 Description
To access QoS settings,
Select the Configuration > QoS menu items.
After the port QoS settings are completed, the changes are reflected on the QoS menu
screen. The port 1 QoS settings indicate high priority set.
Next, a tag-based QoS is enabled on port 3. Note that only the menu area for the tag
setting is relevant.
After the Tag QoS settings are completed, the changes are reflected on the QoS menu
screen.
In the following window, a ToS is enabled on Port 5. As before, only the ToS level settings
are relevant.
Note that the different settings are clear from the window below. Port 1 has port-based
QoS, port 3 has tag-based QoS, and port 5 is using ToS.
After all changes are made, save the changes using the save icon
( ).
Multilink ML800
15.1 Overview
15.1.1 Description
Internet Group Management Protocol (IGMP) is defined in RFC 1112 as the standard for IP
multicasting in the Internet. It is used to establish host memberships in particular multicast
groups on a single network. The mechanisms of the protocol allows a host to inform its
local router, using Host Membership Reports that it wants to receive messages addressed
to a specific multicast group. All hosts conforming to level 2 of the IP multicasting
specification require IGMP.
The creation of transient groups and the maintenance of group membership is the
responsibility of “multicast agents”, entities that reside in internet gateways or other
special-purpose hosts. There is at least one multicast agent directly attached to every IP
network or sub-network that supports IP multicasting. A host requests the creation of new
groups, and joins or leaves existing groups by exchanging messages with a neighboring
agent.
The Internet Group Management Protocol (IGMP) is an internal protocol of the Internet
Protocol (IP) suite. IP manages multicast traffic by using switches, multicast routers, and
hosts that support IGMP (in the MultiLink ML800 Managed Edge Switch implementation of
IGMP, a multicast router is not necessary as long as a switch is configured to support IGMP
with the querier feature enabled). A set of hosts, routers, and/or switches that send or
receive multicast data streams to or from the same source(s) is termed a multicast group,
and all devices in the group use the same multicast group address. The multicast group
running version 2 of IGMP uses three fundamental types of messages to communicate:
• Query: A message sent from the querier (multicast router or switch) asking for a
response from each host belonging to the multicast group. If a multicast router
supporting IGMP is not present, then the switch must assume this function in order
to elicit group membership information from the hosts on the network (if you need
to disable the querier feature, you can do so using the IGMP configuration MIB).
• Report: A message sent by a host to the querier to indicate that the host wants to
be or is a member of a given group indicated in the report message.
• Leave Group: A message sent by a host to the querier to indicate that the host has
ceased to be a member of a specific multicast group. Thus, IGMP identifies
members of a multicast group (within a subnet) and allows IGMP-configured hosts
(and routers) to join or leave multicast groups.
When IGMP is enabled on the MultiLink ML800 Managed Edge Switch, it examines the IGMP
packets it receives to:
• Learn which ports are linked to IGMP hosts and multicast routers/queriers
belonging to any multicast group.
• Become a querier if a multicast router/querier is not discovered on the network.
Once the switch learns the port location of the hosts belonging to any particular multicast
group, it can direct group traffic to only those ports, resulting in bandwidth savings on
ports where group members do not reside. The following example illustrates this operation.
Either of these switches can operate as querier because a multicast router is not present
on the network. (If an IGMP switch does not detect a querier, it automatically assumes this
role, assuming the querier feature is enabled-the default-within IGMP.)
In the above figure, the multicast group traffic does not go to switch 1 and beyond. This is
because either the port on switch 3 that connects to switch 1 has been configured as
blocked or there are no hosts connected to switch 1 or switch 2 that belong to the
multicast group.
For PC 1 to become a member of the same multicast group without flooding IP multicast
traffic on all ports of switches 1 and 2, IGMP must be configured on both switches 1 and 2,
and the port on switch 3 that connects to switch 1 must be unblocked.
15.2.1 Commands
The igmp command enters IGMP configuration mode and enables or disables IGMP on the
switch.
igmp
igmp <enable/disable>
The show igmp command displays the IGMP status.
show igmp
The following command sequence illustrates how to enable and query the status of IGMP.
ML800# igmp
ML800(igmp)## igmp enable
IGMP is enabled
ML800(igmp)## show igmp
IGMP State : Enabled
ImmediateLeave : Disabled
Querier : Enabled
Querier Interval : 125
Querier Response Interval : 10
Multicasting Unknown Streams : Enable
ML800(igmp)## igmp disable
IGMP is disabled
ML800(igmp)## show igmp
IGMP State : Disabled
ImmediateLeave : Disabled
Querier : Enabled
Querier Interval : 125
Querier Response Interval : 10
Multicasting Unknown Streams : Enable
ML800(igmp)##
The output of the show igmp command provides the following useful information:
• IGMP State shows if IGMP is turned on (Enable) or off (Disable).
• Immediate Leave provides a mechanism for a particular host that wants to leave
a multicast group. It disables the port (where the leave message is received) ability
to transmit multicast traffic.
• Querier shows where the switch is a querier or a non-querier. In our example, the
switch is the querier.
• Querier Interval shows the time period in seconds on which the switch sends
general host-query messages.
• Querier Response Interval specifies maximum amount of time in seconds that
can elapse between when the querier sends a host-query message and when it
receives a response from a host.
The set-qri command sets the query response interval representing the maximum
amount of time that can elapse between when the querier router sends a host-query
message and when it receives a response from a host. The range can be from 2 to 270
seconds, with a default of 10. Restrictions apply to the maximum value because of an
internal calculation that is dependent on the value of the query interval.
set-qri interval=<value>
15.2.2 Example
The following example shows how to configure IGMP.
ML800(igmp)## show-router
RouterIp PortNo Timer
---------------------------------
10.21.1.250 1 25
15.3.1 Example
For configuring IGMP,
Select the Configuration > IGMP menu item.
The menu allows the IGMP parameters to be set and provides
information on IGMP groups and routers.
The menu allows the IGMP parameters described earlier to be set. It also provides the
necessary information of IGMP groups and routers.
Changes are reflected on the Configuration > IGMP > Information screen. The groups and
routers screen displays the IGMP Groups and IGMP Routers information. All edits to IGMP
are done through the Information screen.
Multilink ML800
16.1 Overview
16.1.1 Description
SImple Network Management Protocol (SNMP) enables management of the network. There
are many software packages which provide a graphical interface and a graphical view of
the network and its devices. These graphical interface and view would not be possible
without SNMP. SNMP is thus the building block for network management.
• Data integrity - A condition or state of data in which a message packet has not been
altered or destroyed in an unauthorized manner
• Data origin authentication - The ability to verify the identity of a user on whose
behalf the message is supposedly sent. This ability protects users against both
message capture and replay by a different SNMP engine, and against packets
received or sent to a particular user that use an incorrect password or security level
• Encryption - A method of hiding data from an unauthorized user by scrambling the
contents of an SNMP packet
• Group - A set of users belonging to a particular security model. A group defines the
access rights for all the users belonging to it. Access rights define what SNMP objects
can be read, written to, or created. In addition, the group defines what notifications a
user is allowed to receive
• Notification host - An SNMP entity to which notifications (traps and informs) are to be
sent
• Notify view - A view name (not to exceed 64 characters) for each group that defines
the list of notifications that can be sent to each user in the group
• Privacy - An encrypted state of the contents of an SNMP packet where they are
prevented from being disclosed on a network. Encryption is performed with an
algorithm called CBC-DES (DES-56)
• Read view - A view name (not to exceed 64 characters) for each group that defines
the list of object identifiers (OIDs) that are accessible for reading by users belonging to
the group
• Security level - A type of security algorithm performed on each SNMP packet. The
three levels are: noauth, auth, and priv. noauth authenticates a packet by a string
match of the user name. auth authenticates a packet by using either the HMAC MD5
algorithms. priv authenticates a packet by using either the HMAC MD5 algorithms and
encrypts the packet using the CBC-DES (DES-56) algorithm.
• Security model - The security strategy used by the SNMP agent. Currently, ML800
supports three security models: SNMPv1, SNMPv2c, and SNMPv3.
• Simple Network Management Protocol (SNMP) - A network management protocol
that provides a means to monitor and control network devices, and to manage
configurations, statistics collection, performance, and security.
• Simple Network Management Protocol Version 2c (SNMPv2c) - The second version
of SNMP, it supports centralized and distributed network management strategies, and
includes improvements in the Structure of Management Information (SMI), protocol
operations, management architecture, and security.
• SNMP engine - A copy of SNMP that can either reside on the local or remote device.
• SNMP group - A collection of SNMP users that belong to a common SNMP list that
defines an access policy, in which object identification numbers (OIDs) are both read-
accessible and write-accessible. Users belonging to a particular SNMP group inherit all
of these attributes defined by the group.
• SNMP user - A person for which an SNMP management operation is performed. The
user is the person on a remote SNMP engine who receives the information.
• SNMP view - A mapping between SNMP objects and the access rights available for
those objects. An object can have different access rights in each view. Access rights
indicate whether the object is accessible by either a community string or a user.
• Write view - A view name (not to exceed 64 characters) for each group that defines
the list of object identifiers (OIDs) that are able to be created or modified by users of
the group.
16.1.3 Traps
The traps supported by MNS are as follows:
SNMP Traps: Warm Start, Cold Start, Link Up, Link Down, Authentication Failure.
RMON Traps: Rising Alarm, Falling Alarm for RMON groups 1, 2, 3, and 9 (Statistics, Events,
Alarms, and History)
Enterprise Traps: Intruder
16.1.4 Standards
There are several RFC’s defining SNMP. MNS supports the following RFC’s and standards
SNMPv1 standards
• Security via configuration of SNMP communities
• Event reporting via SNMP
• Managing the switch with an SNMP network management tool Supported
Standard MIBs include:
• SNMP MIB-II (RFC 1213)
• Bridge MIB (RFC 1493) (ifGeneralGroup, ifRcvAddressGroup, ifStackGroup)
• RMON MIB (RFC 1757)
• RMON: groups 1, 2, 3, and 9 (Statistics, Events, Alarms, and History)
• Version 1 traps (Warm Start, Cold Start, Link Up, Link Down, Authentication Failure,
Rising Alarm, Falling Alarm)
RFC 1901-1908 – SNMPv2
• RFC 1901, Introduction to Community-Based SNMPv2. SNMPv2 Working Group
• RFC 1902, Structure of Management Information for Version 2 of the Simple
Network Management Protocol (SNMPv2). SNMPv2 Working Group
• RFC 1903, Textual Conventions for Version 2 of the Simple Network Management
Protocol (SNMPv2). SNMPv2 Working Group
• RFC 1904, Conformance Statements for Version 2 of the Simple Network
Management Protocol (SNMPv2). SNMPv2 Working Group
• RFC 1905, Protocol Operations for Version 2 of the Simple Network Management
Protocol (SNMPv2). SNMPv2 Working Group
• RFC 1906, Transport Mappings for Version 2 of the Simple Network Management
Protocol (SNMPv2)
• RFC 1907, Management Information Base for Version 2 of the Simple Network
Management Protocol (SNMPv2). SNMPv2 Working Group
• RFC 1908, Coexistence between Version 1 and Version 2 of the Internet-standard
Network Management Framework. SNMPv2 Working Group
RFC 2271-2275 – SNMPv3
• RFC 2104, Keyed Hashing for Message Authentication
• RFC 2271, An Architecture for Describing SNMP Management Frameworks
• RFC 2272, Message Processing and Dispatching for the Simple Network
Management Protocol (SNMP)
• RFC 2273, SNMPv3 Applications
• RFC 2274, User-Based Security Model (USM) for version 3 of the Simple Network
Management Protocol (SNMPv3)
• RFC 2275, View-Based Access Control Model (VACM) for the Simple Network
Management Protocol (SNMP)
16.2.1 Commands
There are several commands and variable which can be set for configuring SNMP. The
basic SNMP v1 parameters can be set by referring to the section on System Parameters.
Most commands here refer to SNMP v3 commands and how the variables for SNMP v3 can
be configured.
The snmp command enters the SNMP configuration mode.
snmp
The snmpv3 command enters the SNMP V3 configuration mode. It is still necessary to
enable SNMP V3 by using the set snmp command after entering configuration mode.
snmpv3
The set snmp command defines the SNMP version. The ML800 supports all versions (v1,
v2 and v3) or only v1. By default, SNMP v1only is enabled.
set snmp type=<v1|all>
The show snmp command displays the SNMP configuration information.
show snmp
The setvar command sets the system name, contact and location. All parameters are
optional but a user must supply at least one parameter.
setvar [sysname|syscontact|syslocation]=<string>
The quickcfg command automatically configures a default VACM (view-based access
control model). This allows any manager station to access the ML800 either via SNMP v1,
v2c or v3. The community name is “public”. This command is only intended for first time
users and values can be changed by administrators who want more strict access.
quickcfg
The engineid command allows the user to change the engine ID. Every agent has to
have an engineID (name) to be able to respond to SNMPv3 messages.
engineid string=<string>
The authtrap command enables or disables authentication traps generation.
authtrap <enable|disable>
The show-authtrap command displays the current value of authentication trap status.
show-authtrap
The deftrap command defines the default community string to be used when sending
traps. When user does not specify the trap community name when setting a trap station
using the trap command, the default trap community name is used.
deftrap community=<string>
The show-deftrap command displays the current value of default trap.
show-deftrap
The trap command defines the trap and inform manager stations. The station can receive
v1, v2 traps and/or inform notifications. An inform notification is an acknowledgments that
a trap has been received. A user can add up to 5 stations.
trap <add|delete> id=<id> [type=<v1|v2|inform>] [host=<host-ip>]
[community=<string>] [port=<1-65534>]
The show-trap command shows the configured trap stations in tabular format. The id
argument is optional and is the number corresponding to the trap entry number in the
table.
show-trap [id=<id#>]
The com2sec command specifies the mapping from a source/community pair to a
security name. Up to 10 entries can be specified. This part of the View based Access
Control Model (VACM) as defined in RFC 2275.
com2sec <add|delete> id=<id> [secname=<name>] [source=<source>]
[community=<community>]
The group command defines the mapping from sec model or a sec name to a group. A
sec model is one of v1, v2c, or usm. Up to 10 entries can be specified. This part of the View
based Access Control Model (VACM) as defined in RFC 2275.
group <add|delete> id=<id> [groupname=<name>] [model=<v1|v2c|usm>]
[com2secid=<com2sec-id>]
The show-group command displays all or specific group entries. The id argument is
optional and is the number corresponding to the group entry number in the table
show-group [id=<id>]
The view command defines a manager or group or manager stations what it can access
inside the MIB object tree. Up to 10 entries can be specified. This part of the View based
Access Control Model (VACM) as defined in RFC 2275
view <add|delete> id=<id> [viewname=<name>] [type=<included|excluded>]
[subtree=<oid>] [mask=<hex-string>]
The show-view command display all or specific view entries. The id argument is optional
and is the number corresponding to the view entry number in the table.
show-view [id=<id>]
The user command adds user entries. The ML800 allows up to 5 users to be added.
Currently, the ML800 agent only support noauth and auth-md5 for v3 authentication and
auth-des for priv authentication.
user <add|delete> id=<id> [username=<name>] [usertype=<readonly|readwrite>]
[authpass=<pass-phrase>]
[privpass=<pass-phrase>] [level=<noauth|auth|priv>] [subtree=<oid>]
The show-user command displays all or specific view entries. The id is optional and is the
number corresponding to the view entry number in the table.
show-user [id=<id>]
16.2.2 Example
The following example shows how to configure SNMP.
ML800(snmpv3)## show-group
ID Group Name Sec. Model Com2Sec ID
=============================================
1 v1 v1 1
2 public v2c 1
3 public usm 1
4 -- -- --
5 -- -- --
6 -- -- --
7 -- -- --
8 -- -- --
9 -- -- --
10 -- -- --
ML800(snmpv3)## show-group id=1
Group ID : 1
Group Name : v1
Model : v1
Com2Sec ID : 1
ML800(snmpv3)## view add id=1 viewname=all type=included subtree=.1
Entry is added successfully
ML800(snmpv3)## show-view
ID View Name Type Subtree Mask
===============================================
1 all included 1 ff
2 -- -- -- --
3 -- -- -- --
4 -- -- -- --
5 -- -- -- --
6 -- -- -- --
7 -- -- -- --
8 -- -- -- --
9 -- -- -- --
10 -- -- -- --
ML800(snmpv3)## show-view id=1
View ID : 1
View Name : all
Type : included
Subtree : .1
Mask : ff
ML800(snmpv3)## access add id=1 accessname=v1 model=v1 level=noauth read=1 writ
notify=none
Entry is added successfully
ML800(snmpv3)## show-access
ID View Name Model Level R/View W/View N/View Context Prefix
=================================================================================
1 v1 v1 noauth 1 none none "" exact
2 -- -- -- -- -- -- -- --
3 -- -- -- -- -- -- -- --
4 -- -- -- -- -- -- -- --
5 -- -- -- -- -- -- -- --
6 -- -- -- -- -- -- -- --
7 -- -- -- -- -- -- -- --
8 -- -- -- -- -- -- -- --
9 -- -- -- -- -- -- -- --
10 -- -- -- -- -- -- -- --
ML800(snmpv3)## show-access id=1
Access ID : 1
Access Name : v1
Sec. Model : v1
Sec. Level : noauth
Read View ID : 1
Write View ID : none
Notify View ID : none
Context : ""
Prefix : exact
ML800(snmpv3)## user add id=1 username=jsmith usertype=readwrite authpass=something
Entry is added successfully
ML800(snmpv3)## show-user
ID User Name UType AuthPass PrivPass AType Level Subtree
=================================================================================
1 jsmith RW something -- MD5 auth --
2 -- -- -- -- -- -- --
3 -- -- -- -- -- -- --
4 -- -- -- -- -- -- --
5 -- -- -- -- -- -- --
ML800(snmpv3)## show-user id=2
ERROR: Entry is not active
ML800(snmpv3)## show-user id=1
User ID : 1
User Name : jsmith
User Type : read-write
Auth. Pass : something
Priv. Pass :
Auth. Type : MD5
Auth. Level : auth
Subtree :
ML800(snmpv3)## exit
ML800#
16.3.1 Example
Most SNMP v1 capabilities can be set using the EnerVista Secure Web Management
software. For SNMP v2 and v3 parameters, please refer to Configuring SNMP through the
Command Line Interface on page 16–5.
SNMP variables are used in conjunction with Alert definitions. Alert Definitions are covered
in the next chapter.
To configure SNMP,
Select the Configuration > SNMP menu item.
When adding SNMP trap receivers, click on the Add button on the
SNMP menu screen.
Make sure that each station can be pinged from the switch by using
the Administration > Ping menu.
Determine which sorts of traps each station will receive, as shown
above. If not sure, select all three types.
When done adding trap receivers, click OK.
16.4.1 Description
The switch supports RMON (Remote Monitoring) on all connected network segments. This
allows for troubleshooting and optimizing your network. The MultiLink ML800 Managed
Edge Switch provides hardware-based RMON counters. The switch manager or a network
management system can poll these counters periodically to collect the statistics in a
format that compiles with the RMON MIB definition.
The following RMON groups are supported:
• Ethernet statistics group - maintains utilization and error statistics for the switch
port being monitored.
• History group - gathers and stores periodic statistical samples from previous
statistics group.
• Alarm group - allows a network administrator to define alarm thresholds for any
MIB variable.
• Log and event group - allows a network administrator to define actions based on
alarms. SNMP traps are generated when RMON alarms are triggered.
16.4.2 Commands
The following RMON communities, when defined, enable the specific RMON group as show
above. The rmon command enter the RMON configuration mode to setup RMON groups
and communities.
rmon
The history command defines the RMON history group and the community string
associated with the group.
history def-owner=<string> def-comm=<string>
The statistics command defines the RMON statistics group and the community string
associated with the group.
statistics def-owner=<string>
def-comm=<string>
The alarm command defines the RMON alarm group and the community string
associated with the group.
alarm def-owner=<string> def-comm=<string>
The event command defines the RMON event group and the community string
associated with the group.
event def-owner=<string> def-comm=<string>
The show rom command lists the specific RMON data as defined by the group type.
show rmon <stats|hist|event|alarm>
Multilink ML800
17.1 E-mail
17.1.1 Description
SMTP (RFC 821) is a TCP/IP protocol used in sending e-mail. However, since it's limited in its
ability to queue messages at the receiving end, it's usually used with one of two other
protocols, POP3 or Internet Message Access Protocol (IMAP) that lets the user save
messages in a server mailbox and download them as needed from the server. In other
words, users typically use a program that uses SMTP for sending e-mails (out going - e.g.
replying to an e-mail message) and either POP3 or IMAP for receiving messages that have
been arrived from the outside world. While SMTP (and its related protocols such as POP3,
IMAP etc.) are useful transports for sending and receiving e-mails, it is extremely beneficial
for a network administrator to receive e-mails in case of faults and alerts. The MultiLink
ML800 Managed Edge Switch can be setup to send and e-mail alert when a trap is
generated.
If this capability is used, please ensure that SPAM filters and other filters are not set to
delete these e-mails.
GE Digital Energy recommends that a rule be setup on the mail server so that all e-mails
indicating SNMP faults are automatically stored in a folder or redirected to the necessary
administrators.
The SNMP alerts can be configured using the MultiLink Switch Software for the following:
• Send e-mail alert according to the configuration rules when a specific event
category happens.
• Send e-mail alert according to the configuration rules when a specific trap SNMP
trap category happens.
• Provide configuration and customization commands for users to specify SMTP
server to connect to, TCP ports, user recipients and filters.
• The SMTP alerts provide the following capabilities:
• SMTP alerts can be enabled or disabled globally.
• User can defined a global default SMTP server identified by its IP address, TCP port
and retry count.
• User can add up to five SMTP alert recipients. Each recipient is identified by an ID
and e-mail address. The e-mail address needs to be a valid address and can be an
alias setup for distribution to a larger audience.
• Filters are provided for each recipient to allow only certain categories of traps and
events be sent by e-mail.
• Each recipient can have its own SMTP server and TCP port number, if this is not
defined on a certain recipient, the default SMTP server and TCP port number is
used.
17.1.2 Commands
The smtp command configures the SNMP alerts to be sent via e-mail.
smtp
smtp <enable|disable>
The show smtp command displays the current SMTP global settings and recipients
displays the currently configured recipients of e-mail alerts.
show smtp <config|recipients>
The add command adds a specific id, where id represents the recipient identification and
ranges from 1 to 5. The software allows a maximum of 5 recipients
add id=<1-5> email=<email-addr> [traps=<all|none|S|R|E>]
[events=<all|none|I|A|C|F|D>] [ip=<ip-addr>] [port=<1-65535>] [domain=<domain>]
The add command has the following additional parameters:
• The email parameter is the e-mail address of the recipient.
• The optional traps parameter represents the trap filter. If value is all, all traps of
any type will be sent to this recipient. If value is none, no traps are sent to this
recipient. Value can also be a combination of 'S' (SNMP), 'R' (RMON) and 'E'
(enterprise). For example, trap=SR means that SNMP and RMON traps will be sent
via e-mail to the recipient. If this option is not defined, the recipient will have a
default value of “all”.
• The optional events parameter is the event filter. Value can be “all” - all event
severity types will be sent to recipient, “none” - no event will be sent to recipient or
a combination of 'I' (informational), 'A' (activity), 'C' (critical), 'F' (fatal) and 'D' (debug).
With “event=ACF” implies that events of severity types activity, critical and fatal will
be sent to recipients by e-mail. If this option is not defined, a value of “all” is taken.
• The optional ip parameter represents the SMTP server IP address. This is the SMTP
server to connect to for this particular user. If this option is not defined, the global/
default SMTP server is used.
• The optional port parameter specifies the TCP port of the SMTP server. If this is not
defined, the global default TCP port is used.
The optional domain parameter specifies the domain name of the SMTP server. If this
is not defined, the global default domain name is used.
The delete command deletes the specific id specified. The deleted id no longer receives
the traps via e-mail. The id is added using the add command
delete id=<1-5>
The sendmail command customizes (and also sends a test e-mail to check SMTP settings)
the e-mail delivered by specifying the e-mail subject field, server address, to field and the
body of the text. See the example in this section for details.
sendmail server=<ip-addr> to=<email-addr> from=<email-addr> subject=<string>
body=<string>
The server command configures the global SMTP server settings.
server ip=<ip-addr> [port=<1-65535>] [retry=<0-3>] [domain=<domain>]
For this command, ip represents the SMTP server IP address, port the TCP port to be used
for SMTP communications (default is 25), and retry specifies how many times to retry if an
error occurs when sending e-mail (from 0 to 3 with default of 0).
The optional domain parameter specifies the domain name of the SMTP server.
17.1.3 Example
The following example shows how to set SMTP to receive SNMP trap information via e-mail.
E-mail alerts can be forwarded to be received by other devices such as cellphones and
Note
pages. Most interfaces to SMTP are already provided by the service provider.
NOTE
Example 17-1: Configuring SMTP to receive SNMP trap information via e-mail
ML800#smtp
ML800(smtp)##server ip=3.94.210.25 port=25 retry=3 domain=ge.com
Successfully set global SMTP server configuration
ML800(smtp)##show smtp config
SMTP Global Configuration
========================================
Status : Disabled
SMTP Server Host : 3.94.210.25
SMTP Server Domain : ge.com
SMTP Server Port : 25
Retry Count : 3
ML800(smtp)##add id=1 email=jsmith@ge.com traps=s events=CF
Recipient successfully added
ML800(smtp)##add id=2 email=xyz@abc.com traps=all events=all ip=3.30.154.28 port=25
domain=abc.com
Recipient successfully added
ML800(smtp)##show smtp recipients
ID E-mail Address SMTP Server From Domain Port Traps Events
===================================================================
1 jsmith@ge.com 3.94.210.25 ge.com 25 S FC
2 xyz@abc.com 3.30.154.28 abc.com 25 All All
3 -- -- -- -- -- --
4 -- -- -- -- -- --
5 -- -- -- -- -- --
ML800(smtp)##delete id=2
Recipient successfully deleted
ML800(smtp)##show smtp recipients
ML800(smtp)##show smtp recipients
ID E-mail Address SMTP Server From Domain Port Traps Events
===================================================================
1 jsmith@ge.com 3.94.210.25 ge.com 25 S FC
2 -- -- -- -- -- --
3 -- -- -- -- -- --
17.2 Statistics
17.2.1 Viewing Port Statistics with EnerVista Secure Web Management software
The EnerVista Secure Web Management software allows for the display of several
statistics in a graphical format. These are described below.
To view statistics,
Select the Configuration > Statistics menu item.
To view port-specific statistics,
Select the Configuration > Statistics > Port Statistics menu item.
Each port can be viewed by clicking on the back or forward buttons. Each group
represents different statistics.
17.3.1 Description
When using the serial connectivity with applications such as HyperTerminal, it may be
necessary to optimize the character delays so that the FIFO buffer used in the MultiLink
ML800 Managed Edge Switch is not overrun. The important parameters to set for any
serial connectivity software is to set the line delay to be 500 ms and the character delay to
be 50 ms. For example, using HyperTerminal this can be set under File > Properties. When
the Properties window is open, click on the ASCII Setup button and in the Line Delay entry
box enter in 500 and in the Character Delay entry box enter in 50 as shown below.
754729A1.CDR
17.4 History
17.4.1 Commands
The commands below may be useful in repeating commands and obtaining history
information.
The !! command repeats the last command.
!!
The !1, !2,..., !n commands repeat the nth command (as indicated by a show history).
!<n>
The show history command displays the last 25 executed commands. If less than 25
commands were executed, only those commands executed are shown.
show history
The history is cleared if the user logs out or if the switch times out. The history count
restarts when the user logs in.
The show version command displays the current software version.
show version
17.5 Ping
As mentioned earlier, many devices do not respond to ping commands. Make sure that
the target device responds or the network allows ping packets to propagate.
17.6 Prompt
17.7.1 Description
The event log records operating events as single-line entries listed in chronological order,
and are a useful tool for isolating problems. Each event log entry is composed of four fields
as shown below:
• Severity field: Indicates one of the following
• I (Information) indicates routine events; A (Activity) indicates activity on the switch;
D (Debug) is reserved for GE Digital Energy; C (Critical) indicates that a severe
switch error has occurred; and F (Fatal). indicates that a service has behaved
unexpectedly.
• Date field: the date in mm/dd/yy format (as per configured) that the entry was
placed in the log.
• Time field: is the time in hh:mm:ss format (as per configured) that the entry was
placed in the log.
• Description field: is a brief description of the event.
The event log holds up to 1000 lines in chronological order, from the oldest to the newest.
Each line consists of one complete event message. Once the log has received 1000 entries,
it discards the current oldest line (with information level severity only) each time a new line
is received. The event log window contains 22 log entry lines and can be positioned to any
location in the log.
Event logs can be exported to a ftp or a tftp server on the network for further analysis. The
CLI command is used to facilitate the export of the event log
exportlog mode=<serial|tftp|ftp> <ipaddress> file=<name> doctype=<raw|html>
Where mode is the mode of transfer, ipaddress is the IP address of the ftp or TFTP server,
file is the filename, and doctype indicates the log is saved as a text file (raw) or as an
HTML file.
Please ensure the proper extension is used for the file argument (for example, “html” for
an HTML file).
ML800# exportlog mode=tftp 192.168.5.2 file=eventlog
doctype=html
Do you wish to export the event logs? [ 'Y' or 'N'] Y
Successfully uploaded the event log file.
ML800# exportlog mode=tftp 192.168.5.2 file=eventlog.txt
doctype=raw
Do you wish to export the event logs? [ 'Y' or 'N'] Y
Successfully uploaded the event log file.
The Log Statistics window displays the logged events received – most logs are typically
informational and activity.
The log buffer size can be controlled through this menu.
Each specific type of log can be viewed by using the drop down menu as shown below. In
this example only informational logs are displayed.
The Clear button clears all the logs. To prevent accidental erasures, you will be prompted
again if the logs should be deleted.
The Event Log records operating events as single-line entries listed in chronological order.
For details on event log records, refer to Description on page 17–11.
• save
• whoami: display the user information
• reboot
• authorize
• degrade
• exportlog mode
• ftp
• help
• ipconfig
• kill
• kill session id
• logout: logs out from the current user
• ping: to send the ping requests
• tftp
• telnet: connects to the remote system through telnet
• terminal: to set the terminal size
• xmodem
• portaccess
• reauth
• setport
• show-port
• show-stats
• trigger-reauth
The device commands are shown below.
• device
• backpressure
• broadcast-protect: enables or disables broadcast storm protection globally
• flowcontrol
• rate-threshold: sets the broadcast rate threshold (frames/sec)
• setage: sets the mgtagetime
• setport: sets the port configuration
The VLAN registration over GARP (GVRP) commands are shown below. Refer to VLAN
Registration over GARP on page 11–1 for details.
• gvrp
• help gvrp: configures GVRP parameters for dynamic VLAN
• set-forbid: sets forbidden ports for a tag-based VLAN
• show-ports: show ports current GVRP state
• show-forbid: show forbidden ports for tag-based VLAN
• set-ports: set GVRP port state usage
• show-vlan: shows dynamic/static tag-based VLANs
• static: convert dynamic VLAN to static VLAN
The IGMP commands are shown below. Refer to IGMP on page 15–1 for additional details.
• mcast
• set-leave: enables or disables IGMP immediate leave status
• set-port: sets the port mode
• set-qi: sets the query interval (60 to 127) for router ports
• set-qri
• set-querier : enables or disables switch as querier
• show-group: displays IGMP group list
• show-port: displays IGMP port mode
• show-router : displays IGMP router list
The Link Aggregation Control Protocol (LACP) commands are shown below.
• lacp
• add port
• del port
• edit port
The port mirroring commands are shown below. Refer to Port Mirroring and Setup on page
9–1 for additional details.
• help port-mirror
• prtmr : enables/disables port mirroring functionality
• setport: defines the port mirroring ports
The port security commands are shown below. Refer to Securing Access on page 6–1 for
additional details.
• action: sets the action type of secured port
• allow: allows MAC addressing per port
• help port-security
• learn: enables/disables security for a single port or group of ports
• ps: enables/disables security in system
• remove: removes MAC addressing per port
• signal: sets the signal type of the secured port
The quality of service (QoS) commands are shown below. Refer to QoS Overview on page
14–1 for additional details.
• help qos
• setqos: configures QOS configuration usage
• set-untag
• set-weight: sets the port priority weights for all the ports in all the device
• show-portweight: displays the current port weight priority
The remote monitoring (RMON) commands are shown below. Refer to Configuring RMON
on page 16–15 for additional details.
• alarm: sets the owner for the alarm group
• event: sets the owner for the event group
• help rmon
• history: sets the owner for the history group
• statistics: sets the owner for the statistics group
The Rapid Spanning Tree Protocol (RSTP) commands are shown below. Refer to Rapid
Spanning Tree Protocol on page 13–1 for additional details.
• cost: sets the path cost of ports
• forceversion: set the force version of STP
• help rstp
• lll
• port: sets the RSTP administration status of ports
• priority: changes the priority of ports or bridge
• rstp: changes the RSTP administrative status of the bridge
• show-forceversion: shows the current force version of RSTP
• show-mode: shows the port mode status
• show-timers: shows the bridge time parameters
• timers: changes the bridge time parameters
The Simple Mail Transfer Protocol (SMTP) commands for e-mail are shown below. Refer to
E-mail on page 17–1 for additional details.
• add: adds a recipient
• edit
• save
• set-egress
• set-ingress
• set-port
• show-egress
• show-ingress
• show-port
• start
• stop
• vlan
Multilink ML800
18.1.1 Overview
Modicon programmable controllers as well as other PLCs can communicate with each
other and other devices over a variety of networks. The common language used by all
Modicon controllers is the Modbus protocol. This protocol defines a message structure that
controllers recognize and use regardless of the networks over which they communicate. It
describes the process a controller uses to request access to another device, how it will
respond to requests from the other devices, and how errors will be detected and reported.
It establishes a common format for the layout and contents of message fields. The Modbus
protocol thus operates at the layer 7 of the OSI 7 layer stack. Additional information on
Modbus can be found at http://www.modbus.org and other related sites.
RFC 1122 Requirements for Internet Hosts - Communication Layers defines how Modbus
packets can be carried over a TCP/IP transport and how Modicon controllers or other PLC
devices can communicate over a TCP/IP network. To facilitate this communications, the
MultiLink ML800 Managed Edge Switch allows Modbus connectivity.
As per this RFC, Modbus communications take place on TCP port 502. Please make sure the
network security devices do not block port 502. If port 502 is blocked, which is the normal
case with many firewall and other security devices, the communications between two
Modbus devices over a TCP/IP network will not succeed.
For example,
ML800# show ipconfig
IP Address: 192.168.1.5
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.10
ML800# show modbus
Access to Modbus disabaled
Modbus is Using Port: 502
Modbus is Using Device: 5
ML800# access
ML800(access)## modbus enable
Enabling Access to Modbus
ML800(access)## show modbus
Access to Modbus enabled
Modbus is Using Port: 502
Modbus is Using Device: 5
ML800(access)## modbus port=602
Modbus Port is set
ML800(access)## show modbus
Access to Modbus enabled
Modbus is Using Port: 602
Modbus is Using Device: 5
ML800(access)## modbus port=default
Modbus Port Set to Default
ML800(access)## show modbus
Access to Modbus enabled
Modbus is Using Port :502
Modbus is Using Device :5
Multilink ML800
A.2 Warranty
Multilink ML800
DC Power Input
B.1 Specifications for Multilink ML800 Switches, DC Power at 12, 24, –48, 125,
and 250 V DC Power input
Each Multilink Model ML800 Managed Switch requires DC power input, at 12, 24, 48, 125
and 250 V DC nominal. The wide range of DC power input types qualifies this product for
use in 12, 24, 48, 125 and 250 V DC applications in different industries.
DC Power Terminals: “+”, “-” are internally floating so that user may ground either.
Power Consumption:
20 watts typical (for a fully loaded fiber model with 2Gb)
15 watts typical (for 8 ports, copper and 100Mb fiber)
12 V DC Power Input nominal (range 8 to 18VDC)
B.2 12, 24, –48, 125, and 250 V DC Power, Theory of Operation
The 12, 24, -48VDC, 125, and 250 V DC power options are designed using diodes inside on
each DC power input line behind the two external power connection terminals, so that the
power from an external source can only flow into the hub. This allows the Switch to
operate only whenever DC power is correctly applied to the two inputs. It protects the
Switch from incorrect DC input connections. An incorrect polarity connection, for example,
will neither affect the Switch, its internal power supply, nor will it blow the fuse in the
internal power supply.
Always use a voltmeter to measure the voltage of the incoming power supply and figure
Note
out the +ve potential lead or -ve potential lead. The more +ve potential lead will connect to
NOTE
the post labeled “+ve” and the rest to the “-ve”. The GND can be hooked up at the last
When power is applied, the green PWR LED will illuminate.
The GND should be hooked up first. The ML800 unit has a floating ground, so the user may
Note
B.5 Operation
Operation of Multilink ML800 Switches with the optional -48 V DC, 12 V DC, 24 V DC,
125 V DC, or 250 V DC dual-source power input is identical to that of the standard single-
source DC-powered models.
Multilink ML800
With the exception of the dual DC input power connections and the power supply, all
specifications and configuration options for the Multilink ML800 -48VDC, 12VDC, 24VDC,
125VDC and 250VDC models with this Dual-Source option are identical to those listed in
the Multilink ML800 Edge Switches Installation and User Guide, including Appendix B
“Internal DC Power Supply Option”
The Dual-Source DC power option is designed using diodes inside of the chassis on each
DC power input line. A diode is placed in each of the four input lines (behind the four
external power connection terminals) so that power from an external source can only flow
into the unit. This allows the unit to operate whenever DC power is correctly applied to
either or both of the two inputs.
C.5 Installation
This section describes the proper connection of the -48 V DC, 12 V DC, 24 V DC, 125 V DC,
and 250 V DC dual source leads to the power terminal block on the Multilink ML800 Switch
(shown in Figure above)
The terminal block is located on the left front of the unit next to the Alarm terminal block
and is equipped with four (4) screw-down lead posts. The primary terminals are identified
as positive (A+), negative (A-), and the secondary power terminals as negative (B-), positive
(B+). The chassis is earth/ground (GND). The Dual Source terminal block for the 12, 24, 48,
125, and 250 V DC are the same.
The GND should be hooked up first. The ML800 unit has a floating ground, so the user may
Note
elect to Ground either + or - terminal to suit the customer’s use. Before connecting live
NOTE
power lines to the terminal block, always use a digital voltmeter to measure the output
voltage of the power supply and determine the lead which is more “+ve potential”. The
more “+ve” voltage lead from a +ve or –ve power supply must be connected to the post
labeled “+”.
The connection procedure is straightforward. Simply connect the DC leads to the Switch’s
power terminals, positive (+) and negative (-) screws. The use of Ground (GND) is optional; it
connects to the Switch chassis. Ensure that each lead is securely tightened.