Extreme switch configuration guide

Extreme Networks

For those of you who may be replacing your old switches with new switches from Enterasys, you may be wondering as to how you go about accomplishing basic switch setup such as setting an IP address, setting the admin password, updating your firmware, etc. We wanted to go over these steps and others to get your new Enterasys switch up and running out of the box.

React leaflet sidebar

Updating your firmware for the switch is very critical as most likely you do not have the latest and greatest firmware out of the box. There is no better time to get everything updated before placing the hardware into production as 1. You would at the very least have a service interruption in the switch rebooting after updating the firmware. In order to update the firmware to the latest version, you will need to create an Enterasys account on their website in order to gain access to the downloads section including the firmware files.

Simple go to www. You will see a link to download firmware. Once you click that link, you will be presented with the option to login or create an account.

After pulling the file down:.

Free pentecostal books pdf

The default password for new Enterasys switches is simply a blank password for the admin account. Simply connect a laptop or desktop to the switch using a console cable and issue the following command to set the password:. Enterasys switches are great products to work with and anyone familiar and comfortable with any CLI interface will be at home working with the Enterasys products.

Hopefully the commands above will help anyone get up to speed quickly out of the box in getting basic configuration and connection variables setup. Showing ports and what VLAN they are assigned to:. Keep up to date with latest posts!The CLI has a built-in syntax helper. If you are unsure of the complete syntax for a particular command, enter as much of the command as possible and press [Return]. The syntax helper provides a list of options for the remainder of the command.

The syntax helper also provides assistance if you have entered an incorrect command. ExtremeWare provides command completion by way of the [Tab] key. If you enter a partial command, pressing the [Tab] key posts a list of available options, and places the cursor at the end of the command. Abbreviated syntax is the most unambiguous, shortest allowable abbreviation of a command or parameter. Typically, this is the first three letters of the command. When using abbreviated syntax, you must enter enough characters to make the command unambiguous and distinguishable to the switch.

Components are named using the create command. When you enter a command to configure a named component, you do not need to use the whole keyword of the component. Once you have created the VLAN with a unique name, you can then eliminate the keyword vlan from all other commands that require the name to be entered.

Basic Switch Configuration Guide with Examples

For example, instead of entering the switch command. Commands that require you to enter one or more port numbers on a Summit switch use the parameter in the syntax.

A portlist can be a range of numbers, for example:. All named components of the switch configuration must have a unique name. Names must begin with an alphabetical character and are delimited by white space, unless enclosed in quotation marks.

Extreme Networks

Now the switch has an easy point and click means of configuration. To reset the switch back to factory configs, and keep the user account informantion type the command:. To rest the switch back to factory configs and remove the users account information type the command:. Port mirroring configures to the switch to copy all traffic associated with one or more ports.

The traffic filter can be defined based on one of the following criteria:. Physical port — All data that traverses that port, regardless of the VLAN, is copied to the mirror port.

Note: The port you configure to be the mirror port must be active prior to enabling it for mirroring. The following example selects port 3 as the mirror port and sends all traffic coming into out of port 1 to the mirror port.

The following example sends all traffic coming into and out of port 1 and the Default VLAN to the mirror port. You can name switch ports in order to keep track of what is plugged in to them, or for personal records. To set a port for Meg full duplex type the command: Config port auto off duplex full speed To set a port for 10Meg Half duplex type the command: Config port auto off duplex half speed Note: If you want to look at all ports, simply leave out the port number and the switch will display all ports.This tutorial explains basic switch configuration commands in detail with examples.

Configuration and commands explained in this tutorial are essential commands to manage a Cisco switch effectively. Learn how to configure and manage a Cisco Switch step by step with this basic switch commands and configuration guide.

To explain basic switch configuration commands, I will use packet tracer network simulator software. You can use any network simulator software or can use a real Cisco switch to follow this guide.

There is no difference in output as long as your selected software contains the commands explained in this tutorial. Create a practice lab as shown in following figure or download this pre-created practice lab and load in packet tracer.

Download practice topology for basic switch configuration. If require, you can download the latest as well as earlier version of Packet Tracer from here. Download Packet Tracer. IOS is a group of commands used for monitoring, configuring and maintaining cisco devices. For security and easy administration, IOS commands are divided in the set of different command modes.

Static analysis techniques for session

Each command mode has its own set of commands. Which commands are available to use, depend upon the mode we are in.

Word help is used to get a list of available commands that begin with a specific letter. For example if we know that our command begins with letter ewe can hit enter key after typing e? It will list all possible commands that begin with letter e. We can list all available commands, if we don't know the initials of our command. For example to list all available commands at User exec mode, just type?

Command syntax help can be used to get the list of keyword, commands, or parameters that are available starting with the keywords that we had already entered. Question mark after hitting Space key and prompt will return with the list of available command options. For example to know the parameters required by show ip command type show ip?

You can execute the command in current condition. Switch name can be set from global configuration mode. Use hostname [ desired hostname ] command to set name on switch.

Passwords are used to restrict physical access to switch.

extreme switch configuration guide

Cisco switch supports console line for local login and VTYs for remote login. All supported lines need be secure for User Exec mode. For example if you have secured VTYs line leaving console line unsecure, an intruder can take advantage of this situation in connecting with device. Once you are connected with device, all remaining authentication are same.

No separate configuration is required for further modes.

Turmeric for lipedema

Password can be set from their respective line mode. Enter in line mode from global configuration mode. Switch may support up to thousand VTYs lines.

extreme switch configuration guide

By default first five 0 - 4 lines are enabled. If we need more lines, we have to enable them manually. We can set a separate password for each line, for that we have to specify the number of line.Basic Command of Extreme switch.

If you are unsure of the complete syntax for a particular command, enter as much of the command as possible and press [Return].

The syntax helper provides a list of options for the remainder of the command. The syntax helper also provides assistance if you have entered an incorrect command.

If you enter a partial command, pressing the [Tab] key posts a list of available options, and places the cursor at the end of the command. Typically, this is the first three letters of the command. When using abbreviated syntax, you must enter enough characters to make the command unambiguous and distinguishable to the switch.

Components are named using the create command. When you enter a command to configure a named component, you do not need to use the whole keyword of the component. For example, to create a VLAN, you must enter a unique VLAN name: create vlan engineering Once you have created the VLAN with a unique name, you can then eliminate the keyword vlan from all other commands that require the name to be entered.

A portlist can be a range of numbers, for example: port You can add additional port numbers to the list, separated by a comma: port ,6,8 NAMES All named components of the switch configuration must have a unique name.

Names must begin with an alphabetical character and are delimited by white space, unless enclosed in quotation marks.

Refaccionaria hernandez veracruz ver

Now the switch has an easy point and click means of configuration. To reset the switch back to factory configs, and keep the user account informantion type the command: Unconf switch To rest the switch back to factory configs and remove the users account information type the command: Unconf switch all Mirroring Ports Port mirroring configures to the switch to copy all traffic associated with one or more ports.

The traffic filter can be defined based on one of the following criteria: Physical port — All data that traverses that port, regardless of the VLAN, is copied to the mirror port VLAN — All data that traverses the VLAN, regardless of the physical port, is copied to the mirror port. Note: The port you configure to be the mirror port must be active prior to enabling it for mirroring. The following example selects port 3 as the mirror port and sends all traffic coming into out of port 1 to the mirror port enable mirroring to port 3 config mirroring add port 1 The following example sends all traffic for the Default VLAN to the mirror port config mirroring add vlan default The following example sends all traffic coming into and out of port 1 and the Default VLAN to the mirror port.

To name a port type the command: Config port display-string To reset port name type: unconfig port display-string Setting Speed and Duplex on a port To set a port for Meg full duplex type the command: Config port auto off duplex full speed To set a port for 10Meg Half duplex type the command: Config port auto off duplex half speed 10 To reset the port able to auto negotiation type the command: Config port auto on Looking at Port Errors Note: If you want to look at all ports, simply leave out the port number and the switch will display all ports.

Also you can specify port groups. Since every port can be a router and the routing mechanism is built into the switch fabric, VLAN configuration has become incredibly easy. Most user ports will be untagged. The reason for adding tags to ports is to allow multiple VLAN traffic to traverse those ports, as with trunk ports.

This is useful if you have more than one VLAN at an edge switch. In order to have more than one VLAN on a uplink you will need to add an Tag and Tag should be on that trunk Adding a To enable or disable loadsharing use the following commands.

Enable sharing grouping To disable sharing: Disable sharing For example Enable sharing 2 grouping Routing on an Extreme Networks switch Every switch from Extreme is a layer 3 switch. How to turn on routing Type the command: Enable ipforwarding Note: you can also turn on or off routing for any single vlan on the switch.

Postingan populer dari blog ini Mini Dipole 40m Band - Agustus 20, Ready to DX Just need small spaceyou don't need a toweryou ready to DX just 7m high antenna from the earth Baca selengkapnya.

Fluke 87 calibration manual

Transistor Q1 dan Q2 sebaiknya menggunakan 2SC TR ini cukup low noise. Dalam beberapa kasus suara krotokan dan noise yang kuat muncul dari bagian ini.

Tahap ini fungsinya untuk "mengkompensasi" loss yang timbul di BPF dan diode mixer. Jika BPF dan mixer punya loss sekitar db, maka penguatan total dibagian ini sebaiknya juga disekitar itu. Penguatan post-mixer sebaiknya tidak lebih dari 10db, jika lebih, ….Where to download WiNG firmware?

extreme switch configuration guide

Can't find what you need? What would you like to know? Please limit to 97 characters. Reset Search. Printable View. Objective How to download firmware and configuration guide for Extreme Networks products. Environment All Extreme Networks products and all firmware versions.

Procedure Extreme Networks firmware can be downloaded from the Extreme Portal. If you are looking for all the related files for a certain version please use the Products page. The release notes are listed in the section just below the firmware and this is a very easy place to get both the firmware and the release notes for a recent release. Use the Advanced button to filter by Family, Release Type, Date and other options You can also search by file name, product name, serial number and other options.

Additional notes A valid service contract is required for firmware downloads for products not covered by Warranty. See availability information linked below. If you have a valid service contract and cannot access the latest firmware releases, please contact GTAC using the Request Access option for the needed firmware. Was this article helpful? Feedback Please tell us how we can make this article more useful. Characters Remaining: Ask the Community Create a Case.

All rights reserved. How to download firmware and configuration guide for Extreme Networks products. All Extreme Networks products and all firmware versions. Extreme Networks firmware can be downloaded from the Extreme Portal. A valid service contract is required for firmware downloads for products not covered by Warranty.This guide covers the configuration of network devices in order to integrate them with PacketFence in VLAN enforcement.

Covers API, captive portal customization, application code customizations and instructions for supporting new equipment. There is no need to follow the instructions in this guide if you plan on deploying in inline enforcement, except RADIUS inline.

extreme switch configuration guide

Enabling RADIUS accounting on your network devices will increase significantly your database size and can cause performance issues. You should be aware of this and use accounting only if you really need it.

PacketFence supports a whole lot of different wireless and wired network equipment from various vendors running different versions. Throughout this configuration example we use the following assumptions for our network infrastructure:. If your management authentication on your switch is default, applying the configuration above will have your authentication switch to a RADIUS based one with PacketFence as the authentication server.

It is almost certain that you do not want that! Below, we will just create a local password for vty accesses telnet and nothing on the console. In order to avoid locking yourself out, make sure to verify your configuration! You now need to configure a user profile equivalent of a role that will determine which VLAN is assigned to the device.

In this case the profile names are 'unreg', 'employee' and 'guest'. First configure the user profile for voice. In this example it is only isolating it on another VLAN but any user profile attributes can be added to the profile. You now need to configure an edge profile equivalent of a role that will determine which VLAN is assigned to the device. Next, configure the switch in PacketFence. You will need to create an edge template and apply it on the ports you want to do authentication on.

First configure the edge profile for voice. In this example it is only isolating it on another VLAN but any edge profile attributes can be added to the profile. So Avaya switches are, in effect, re-branded Nortels. See Nortel section of this document for configuration instructions. Where xx and yy represent the range of ports where you want PacketFence enforcement.Components are named using the create command.

When you enter a command to configure a named component, you do not need to use the whole keyword of the component. A portlist can be a range of numbers, for example: port You can add additional port numbers to the list, separated by a comma: port ,6,8 Resetting Back to Factory Configs: Unconf switch reset the switch back to factory configs Unconf switch all rest the switch back to factory configs and remove the users account information.

Since every port can be a router and the routing mechanism is built into the switch fabric, VLAN configuration has become incredibly easy.

VLAN Basics create vlan crear vlan config vlan ip x. Most user ports will be untagged. The reason for adding tags to ports is to allow multiple VLAN traffic to traverse those ports, as with trunk ports. This is useful if you have more than one VLAN at an edge switch.

In order to have more than one VLAN on a uplink you will need to add an Tag and Tag should be on that trunk Adding a Making a port a trunk port config vlan add port n tagged. How to load share ports aka Fast Etherchannel To define a load sharing group, you assign a group of ports to a single logical port number.

To enable or disable loadsharing use the following commands. Enable sharing grouping To disable sharing: Disable sharing For example Enable sharing 2 grouping Routing on an Extreme Networks switch Every switch from Extreme is a layer 3 switch.

How to turn on routing Type the command: Enable ipforwarding Note: you can also turn on or off routing for any single vlan on the switch. Several of our remote offices purchased some Extreme Summit X switches to replace a bunch of old unmanaged switches so we could get more insight and control on the network. In order to prep for that, I'm playing with a Summit X that I borrowed from a vendor.

The problem is I can't get trunking to work between the X and the C I've got it connected to. The two switches can see each other's mac addresses, so I know they're communicating, I just can't pass traffic over the trunk. Everything I've been able to find on the subject says that this should work, yet I can't ping between the two. Any suggestions would be appreciated.