If it is not, then the sending device proceeds no further. The RP de-encapsulates each register message and sends the resulting multicast packet down the shared tree. Understanding and Configuring Loop Protect Figure 15-15 Basic Loop Protect Scenario Figure 15-16 shows that, without Loop Protect, a failure could be as simple as someone accidentally disabling Spanning Tree on the port between Switch 2 and 3. Configuring PIM-SM Figure 19-6 PIM-SM Configuration VLAN 9 172.2.2/24 Router R2 VLAN 3 VLAN 5 VLAN 7 VLAN 2 172.2.4/24 VLAN 8 172.1.2/24 Router R1 172.1.1/24 Router R4 172.4.4/24 172.3.4/24 172.1.3/24 VLAN 4 VLAN 6 Router R3 172.3.3/24 VLAN 10 Routers R1 and R4 Configuration On Router R1, at the switch level, IGMP snooping is enabled globally and on the ports connected to hosts. Configuring VRRP then advertisements are sent every advertising interval to let other VRRP routers in this VRID know the router is still acting as master of the VRID. set multiauth mode strict 2. It also assumes that the network has a TFTP or SFTP server to which you have access. Port priority also determines which ports will join a LAG when the number of supported ports for a LAG is exceeded. Configuring ICMP Redirects This example shows how to enable IP directed broadcasts on VLAN 1 and have all client DHCP requests for users in VLAN 1 to be forwarded to the remote DHCP server with IP address 192.168.1.28 C5(su)->router(Config)#interface vlan 1 C5(su)->router(Config-if(Vlan 1))#ip directed-broadcast C5(su)->router(Config-if(Vlan 1))#ip forward-protocol udp C5(su)->router(Config-if(Vlan 1))#ip helper-address 192.168.1. The following port administrative states are set by default: lacpactive - Transmitting LACP PDUs is enabled. Save Your System Configuration Settings. Usethiscommandtodisplayportwebauthenticationinformationforoneormoreports. Enable DHCP snooping globally on the switch. Is it reachable? (These drivers are usually provided by the vendor of the adapter cable.) Rate limiting guarantees the availability of bandwidth for other traffic by preventing the rate limited traffic from consuming more than the assigned amount of a networks resources. When passwords are entered on the switch using the CLI, the switch automatically suppresses the clear text representation of the password. Considerations About Using clear config in a Stack 4. set vlan create vlan-id Create a routed interface for the VLAN in router configuration mode. If single port LAG is enabled, a single port LAG can be created on this device. When a packet is received, the packet is mapped to a CoS index based on the packet 802.1 priority, port, and policy role, if a policy role is present. If LAG members with different port speeds should tie for the lowest port priority, the LAG member with the lowest port number breaks the tie. Table 14-7 show sntp Output Details, Table 15-1 RMON Monitoring Group Functions and Commands (Continued), Table 18-1 Enabling the Switch for Routing, Table 18-2 Router CLI Configuration Modes. SNTP Configuration Table 4-5 Managing and Displaying SNTP (continued) Task Command(s) To reset the poll interval between unicast SNTP requests to its default value: clear sntp poll-interval To reset the number of poll retries to a unicast SNTP server to its default value: clear sntp poll-retry To reset the SNTP poll timeout to its default value: clear sntp poll-timeout To clear an SNTP authentication key: clear sntp authentication-key key-id To remove an authentication key from the trusted key. Using the output of the show switch switchtype command, determine the switch index (SID) of the model of switch being configured. Table 25-9 show ipv6 ospf neighbor Output Details, Overview of Authentication and Authorization Methods. Troubleshooting em equipamentos ativos da Rede SIEMENS para VOIP como 3COM, Cisco, Extreme, Foundry, Enterasys (Cabletron) (Routers e Switch's Level 2 e 3. Procedure 4-4 DHCP Server Configuration on a Non-Routing System Step Task Command(s) 1. Display the current password settings. set dhcpsnooping vlan vlan-list enable 3. After the stack has been configured, you can use the show switch unit command to physically identify each unit. The default setting is auto. DHCP Snooping ------set system service-acl my-sacl deny ip-source 192.168.10.10 mask 255.255.255.255 service ssh priority 1 set system service-acl my-sacl permit port ge.1.1 priority 2 set system service-acl my-sacl permit port ge.1.2 priority 3 set system service-acl my-sacl permit ip-source 10.10.22. ThiscommanddisplaysIPv6NeighborCacheinformation. 11 Configuring Link Aggregation This chapter describes how to configure link aggregation on the fixed switch platforms. Policy Configuration Overview Table 16-2 Policy Rule Traffic Descriptions/Classifications Traffic Classification Precedence Level Description macsource Classifies based on MAC source address. For multiple user 802.1x authentication or any non-802.1x authentication, set the system authentication mode to use multiple authenticators simultaneously. Link Aggregation Overview Single Port Attached State Rules By default, a LAG must contain two or more actor and partner port pairs for the LAG to be initiated by this device. Enter router interface configuration command mode for the specified interface from global configuration command mode. Policy Configuration Overview Applying a Default Policy The following example assigns a default policy with index 100 to all user ports (ge.1.1 through ge.1.22) on a switch: System(su)-> set policy port ge.1.1-22 100 Applying Policies Dynamically Dynamic policy assignment requires that users authenticate through a RADIUS server. Configure the owner identity string and timeout value for an sFlow Collector in the switchs sFlow Receivers Table set sflow receiver index owner owner-string timeout timeout 2. In the event any provision of this Agreement is found to be invalid, illegal or unenforceable, the validity, legality and enforceability of any of the remaining provisions shall not in any way be affected or impaired thereby, and that provision shall be reformed, construed and enforced to the maximum extent permissible. If you clear a license from a member unit in a stack while the master unit has a activated license, the status of the member will change to ConfigMismatch and its ports will be detached from the stack. Such a group, together with the routers having interfaces to any one of the included networks, is called an area. However, Enterasys Networks strongly recommends that you use NetSight Policy Manager, not CLI commands, to configure policy in your network. The Extreme switch does not use it and does not assert CTS. Procedure 9-2 provides an example of how to create a secure management VLAN. Valid sid values are 04094. Licensing Advanced Features Node-Locked Licensing On the C3, B3, and G3 platforms, licenses are locked to the serial number of the switch to which the license applies. Enabling IGMP on the device and on the VLANs. As soon as a rule is matched, processing of the access list stops. Create the following SNMP view group configurations. Configuring Cisco Discovery Protocol Refer to your devices CLI Reference Guide for a description of the output of each command. DHCP Configuration Table 4-7 Default DHCP Server Parameters Parameter Description Default Value Number of ping packets Specifies the number of ping packets the DHCP server sends to an IP address before assigning the address to a requesting client 2 packets Configuring DHCP IP Address Pools This section provides procedures for the basic configuration of automatic (dynamic) and manual (static) IP address pools, as well as a list of the commands to configure other optional pool parameters. Figure 15-13 shows that with a single Spanning Tree configuration, only a single link towards the root forwards on a bridge. DHCPv6 Configuration DHCPv6 Pool: pool22 Static Bindings: Binding for Client 00:01:00:06:99:a3:ff:11:22:33:44:55:66:77 IA PD: IA ID not specified, Prefix: 3001:2222::/48 Preferred Lifetime infinite, Valid Lifetime infinite Static Bindings: Binding for Client 00:01:00:06:99:a3:ff:11:22:33:44:55:66:77 IA PD: IA ID not specified, Prefix: 3001:3333::/48 Preferred Lifetime infinite, Valid Lifetime infinite DNS Server: 2001:DB8:222:111::10 DNS Server: 2001:DB8:4444:5555::20 Domain Name: enterasys. Terms and Definitions 20-12 IP Configuration. show port [port-string] Display operating and admin status, speed, duplex mode and port type for one or more ports on the device. User Account Overview Procedure 5-2 on page 5-4 shows how a super-user creates a new super-user account and assigns it as the emergency access account. Assign to queue assign the packet to a queue Note: Unlike other Fixed Switch platforms, A4 ACLs are not terminated with an implicit deny all rule. Port Mirroring Table 8-4 Transmit Queue Monitoring Tasks Task Command Configure the time interval, in seconds, that ports disabled by the transmit queue monitoring feature remain disabled. Configuration Guide Firmware 6.61.xx and Higher. Display the access entity index values. Password Management Overview Special characters (default 0) The set of special characters recognized is: ! set multiauth mode multi 3. show snmp community name Display the context list configuration for SNMP view- show snmp context based access control. Set the port duplex mode to full. Optionally, set the GARP join, leave, and leaveall timer values. Optionally, enable single port LAGs on the device. Port Slot/Unit Parameters Used in the CLI. First, the module is verified as present in Slot 2, and the port status is shown as operating as a 1000BASE-SX port. Skilled in network testing and troubleshooting. This setting will not be changed in our example. Configuring VLANs Procedure 9-1 Static VLAN Configuration (continued) Step Task Command(s) 4. All operational ports which are not root, alternate or backup are designated ports. 3. Table 25-5 show ipv6 ospf database Output Details. Terms and Definitions Configuring Dynamic Policy Assignment Configure the RADIUS server user accounts with the appropriate information using the Filter-ID attribute for faculty role members and devices. Remote port mirroring involves configuration of the following port mirroring related parameters: 1. The power available for PoE is 150W. It is auto configured with the cost of the intra-area path between the two ABRs that make up the virtuallink. set igmpsnooping adminmode {enable | disable} Enable or disable IGMP on one or all ports. (1800 seconds) preference level The preference value for this advertised address. . Configuring VRRP 2. For detailed information about the CLI commands used in this book, refer to the CLI Reference for your Fixed Switch platform. Optionally, set the timeout period for aging learned MAC entries. Configuring SNMP Procedure 12-4 Configuring Secure Community Names (continued) Step Task Command(s) 5. GVRP must be enabled to allow creation of dynamic VLANs. Displaying Scrolling Screens If the CLI screen length has been set using the set length command, CLI output requiring more than one screen will display --More-- to indicate continuing screens. Understanding How VLANs Operate Preparing for VLAN Configuration A little forethought and planning is essential to a successful VLAN implementation. Neighbor Solicitation messages are also used to verify the reachability of a neighbor after the linklocal address is known. IP interfaces Disabled with no IP addresses specified. Configuring a Stack of New Switches 1. Using Multicast in Your Network A new dependent downstream device appears on a pruned branch. Policy profile number 1 is created that enables PVID override and defines the default behavior (classify to VLAN 3) if none of the classification rules created for the profile are matched. Stand Alone (SSA) Switch Hardware Installation Guide SSA-T4068-0252 SSA-T1068-0652 SSA-G1018-0652. The hello interval is the period between transmissions of hello packet advertisements. Routing Interfaces Example The following example shows how to enable RIP on the switch, then configure VLAN 1 with IP address 192.168.63.1 255.255.255.0 as a routing interface and enable RIP on the interface. Terms and Definitions Table 20-3 IP Routing Terms and Definitions (continued) Term Definition relay agent A DHCPv6 application that provides a means for relaying DHCPv6 requests between a subnet to which no DHCP server is connected to other subnets on which servers are attached. Terms and Definitions Table 15-11 Spanning Tree Terms and Definitions (continued) Term Definition Max age Maximum time (in seconds) the bridge can wait without receiving a configuration message (bridge hello) before attempting to reconfigure. SSH Disabled. Router 2 will translate Type 7 LSAs from the connected domain to Type 5 routes into the backbone. Use the area virtual-link command in OSPF router configuration command mode, providing the transit area ID and the ABRs router ID, to configure an area virtual-link. Thisexampleshowshowtodisplayportsdisabledbylinkflapdetectionduetoaviolation: Tabl e 75providesanexplanationoftheshowlinkflapmetricscommandoutput. This basic configuration requires the configuration of four interfaces and associated IP addresses. Port Configuration Overview vlan for vlan interfaces lag for IEEE802.3 link aggregation ports Where unit_or_slotnumber can be: 1 - 8 for stackable switches (up to 8 units in a stack) 1 - 3 for I-Series standalone switches (Note that the uplink ports are considered to be slot 3) 1 - 4 for G-Series standalone switches Where port number depends on the device. Two PoE modules are installed. Per Port: Enabled. Display the status of edge port detection: show spantree autoedge 2. Important Notice Depending on the firmware version used on your Fixed Switch platform, some features described in this document may not be supported. Image Version Length0x8 Image Version Bytes.0x30 0x2e 0x35 0x2e 0x30 0x2e 0x34 (x.xx.xx) The following secondary header is in the image: CRC.. 2 Configuring Switches in a Stack This chapter provides information about configuring Enterasys switches in a stack. The MST region presents itself to the rest of the network as a single device, which simplifies administration. Configuring VRRP The master advertise-interval is changed to 2 seconds for VRID 1. You can configure DAI to not log invalid packets for specific VLANs. Dynamic ARP Inspection Table 26-13 Displaying Dynamic ARP Inspection Information (continued) Task Command To display the ARP configuration of one or more VLANs show arpinspection vlan vlan-range To display ARP statistics for all DAI-enabled VLANs or for specific VLANs show arpinspection statistics [vlan vlan-range] Table 26-14 Managing Dynamic ARP Inspection Task Command To remove additional optional ARP validation parameters that were previously configured. Managing Switch Configuration and Files Using an I-Series Memory Card The I3H-4FX-MEM and I3H-6TX-MEM IOMs provide a memory card slot where a small, separately-purchased memory card (I3H-MEM) may be inserted. System name Set to empty string. Example PoE Configuration A PoE-compliant G-Series device is configured as follows: One 400W power supply is installed. The CIST contains a root bridge, which is the root of the Spanning Tree for the network. 12 Configuring SNMP This chapter describes basic SNMP concepts, the SNMP support provided on Enterasys fixed stackable and standalone switches, and how to configure SNMP on the switches using CLI commands. Also, use this command to append ports to or clear ports from the egress ports list. Configuring LLDP Table 13-1 13-8 LLDP Configuration Commands (continued) Task Command Enable or disable transmitting and processing received LLDPDUs on a port or range of ports. Spanning Tree Basics Figure 15-8 MSTI 1 in a Region CIST Root 1 MSTI 1 2 5 MST CIST Regional Root 3 4 MSTI 1 Regional Root Legend: Physical Link Blocked VLANs Figure 15-9 MSTI2 in the Same Region MSTI 2 1 5 MST CIST Regional Root 3 2 MSTI 2 Regional Root 4 Legend: Physical Link Blocked VLANs Figure 15-10 on page 15-19 shows 3 regions with five MSTIs. Screen Hierarchy The contents of this chapter are arranged following the structure shown in Figure 3-1. Switch# Switch#conf t Chapter 2: Configuring Switches in a Stack, Chapter 6: Discovery Protocol Configuration, Chapter 14: Logging and Network Management, Appendix A: Policy and Authentication Capacities. The authentication server verifies the credentials and returns an Accept or Reject message back to the switch. Securestack a2 Read online or download PDF Enterasys Networks A2H124-24FX User Manual. When console-only access is configured, all TCP SYN packets and UDP packets are dropped, with the exception of UDP packets sent to the DHCP Server or DHCP Client ports. Setting the value to 0 will set the timeout to forever. C5(su)->set webview disable C5(su)->show webview WebView is Disabled. Procedure 21-1 lists the basic steps to configure RIP and the commands used. You can insert a new rule into a specified entry location using the insert option. Configuring MSTP Example 2: Configuring MSTP for Maximum Bandwidth Utilization This example illustrates the use of MSTP for maximum bandwidth utilization. set sntp poll-retry retry 5. Configuring SNMP security model and security level used to request access. For detailed information about the CLI commands used in this book, refer to the CLI Reference for your Fixed Switch platform. Setting security access rights 3. Configuring SNMP Configuring SNMPv1/SNMPv2c Creating a New Configuration Procedure 12-1 shows how to create a new SNMPv1 or SNMPv2c configuration. Access Control Lists on the A4 A4(su)->router#configure Enter configuration commands: A4(su)->router(Config)#access-list 101 deny ip host 192.168.10.10 any A4(su)->router(Config)#access-list 101 deny ip host 164.108.20.20 host 164.20.40.40 A4(su)->router(Config)#access-list 101 ip permit host 148.12.111.1 any assignqueue 5 A4(su)->router(Config)#show access-lists 101 Extended IP access list 101 1: deny ip host 192.168.10.10 any 2: deny ip host 164.108.20.20 host 164.20.40.40 3: permit ip host 148.12.111. Implementing VLANs building has its own internal network. OSPF routes IP packets based solely on the destination IP address found in the IP packet header. then assign the ports you want in each vlan. Configuring Node Aliases C5(su)->show nodealias config ge.1.1 Port Number ----------ge.1.1 Max Entries ----------32 Used Entries -----------32 Status ---------Enable The following command disables the node alias agent on port ge.1.8: C5(su)->set nodealias disable ge.1. The order in which servers are queried is based on a precedence value optionally specified when you configure the server. This attribute contains the 42 byte authenticator response. Based on the exchanged BPDU information, the spanning tree algorithm selects one of the switches on the network as the root switch for the tree topology. Database contains 1 Enterasys S8-Chassis Manuals (available for free online viewing or downloading in PDF): Hardware installation manual . Port Mirroring 2. Ctrl+B Move cursor back one character. The memory card provides a removable, non-volatile means for storing the system configuration and IP address only, and may be used to move the systems configuration to another switch. 2. Set a new hello time interval: set spantree hello interval Valid interval values are 110. The set inlinepower mode command is set to auto, which means that the power available for PoE (150W) is distributed evenly75W to each PoE module. If no Filter-ID attributes are present, the default policy (if it exists) will be applied. set inlinepower mode {auto | manual} auto (default) Available power is distributed evenly to PoE modules based on PoE port count. Configuring PIM-SM PIM-SM is an advanced routing feature that must be enabled with a license key. Table 3-1 lists some commonly used commands. show access-lists [interface [portstring]] | [vlan [vlan-id]] 7. User Authentication Overview Figure 10-1 Applying Policy to Multiple Users on a Single Port Authentication Request User 1 Switch Authentication Response Radius Server SMAC 00-00-00-11-11-11 Authentication Credentials User 1 Authentication Credentials User 2 Authentication Request Authentication Credentials User 3 Authentication Response User 2 SMAC 00-00-00-22-22-22 Port ge.1.5 Authentication Request User 3 Dynamic Admin Rule for Policy 1 SMAC = 00-00-00-11-11-11 ge.1. DHCPv6 Configuration DHCPv6 Configuration DHCP is generally used between clients (for example, hosts) and servers (for example, routers) for the purpose of assigning IP addresses, gateways, and other networking definitions such as DNS, NTP, and/or SIP parameters. Configuring Cisco Discovery Protocol 13-14 Configuring Neighbor Discovery. In interface configuration mode, configure an IP address for all routing interfaces in the AS. Table 16-5 Displaying Policy Configuration and Statistics Task Command(s) Display policy role information. Enterasys Fixed Switching Configuration Guide Firmware 6.61. Configuring OSPF Areas Router 3(su)->router(Config-router)#area 0.0.0.1 stub no-summary Router 3(su)->router(Config-router)#area 0.0.0.1 default-cost 15 Router 5 Router 5(su)->router(Config)#router ospf 1 Router 5(su)->router(Config-router)#area 0.0.0.2 stub Router 5(su)->router(Config-router)#area 0.0.0.2 default-cost 15 Router 6 Router 6(su)->router(Config)#router ospf 1 Router 6(su)->router(Config-router)#area 0.0.0.2 stub Router 6(su)->router(Config-router)#area 0.0.0. Connecting to a Switch This procedure describes how to connect to a switch. 3. 1.2 IP phone ge. This example, which sets the new VLAN as VLAN 2, assumes the management station is attached to ge.1.1, and wants untagged frames. Configuring Policy Table 16-4 Non-Edge Protocols (continued) Protocol Policy Effect Web Server Protocol Stop malicious proxies and application-layer attacks by ensuring only the right Web servers can connect from the right location at the right time, by blocking HTTP on the source port for this device. If privacy is not specified, no encryption will be applied. RMON Procedure 18-1 Step Configuring Remote Network Monitoring (continued) Task Command(s) startup - (Optional) Specifies the alarm type generated when this event is first enabled rthresh - (Optional) Specifies the minimum threshold that will cause a rising alarm fthresh - (Optional) Specifies the minimum threshold that will cause a falling alarm revent - (Optional) Specifies the index number of the RMON event to be triggered when the rising threshold is crossed fevent - (Optional) Specifies. Therefore, a value of 7 is given the highest priority. A graft retransmission timer expires before a graft ACK is received. For example, set logging local console enable would not execute without also specifying file enable or disable. If authentication fails, the guest policy is used. ExtremeXOS User Guide Version 22.7 > STP > Spanning Tree Protocol Overview > Compatibility Between IEEE 802.1D-1998 and IEEE 802.1D-2004 STP Bridges > Bridge Priority > Spanning Tree Protocol . DHCP Configuration C5(su)->router(Config)#exit C5(su)->router#exit C5(su)->router>exit C5(su)->set dhcp enable C5(su)->set dhcp pool autopool2 network 6.6.0.0 255.255.0.0 Managing and Displaying DHCP Server Parameters Table 4-6 lists additional DHCP server tasks. . Use the area virtual-link authentication-key command in OSPF router configuration command mode to configure simple authentication on this area virtual-link. Creating and enabling VLANs with IP interfaces. Transferring switch configurations Using the CLI commands described in the section beginning with TFTP: Copying a configuration file to a remote host (CLI), you can copy switch configurations to and from a switch, or copy a software image to configure or replace an ACL in the switch configuration. Examples 17-18 Chapter 18: Configuring Network Monitoring Basic Network Monitoring Features .. 18-1 Console/Telnet History Buffer . Chapter 20: IP Configuration Enabling the Switch for Routing . 20-1 Router Configuration Modes 20-1 Entering Router Configuration Modes . 20-2 Example Configuring Area Virtual-Link Authentication . 22-14 Configuring Area Virtual-Link Timers. 22-14 Configuring Route Redistribution 22-14 Configuring Passive Interfaces .. Extended IPv4 ACL Configuration .. 24-12 MAC ACL Configuration .. 24-13 Chapter 25: Configuring and Managing IPv6 Managing IPv6 . Disabling and Enabling Ports .. 26-9 MAC Locking Defaults . 26-9 MAC Locking Configuration .. 26-10 TACACS+ .. 11-3 13-1 13-2 13-3 14-1 15-1 15-2 15-3 15-4 15-5 15-6 15-7 15-8 15-9 15-10 15-11 15-12 15-13 15-14 15-15 15-16 15-17 16-1 17-1 17-2 17-3 17-4 17-5 19-1 19-2 19-3 19-4 19-5 19-6 22-1 22-2 22-3 22-4 22-5 22-6 23-1 23-2 23-3 25-1 Link Aggregation Example.. 11-12 Communication between LLDP-enabled Devices . 13-3 LLDP-MED .. 4-7 4-8 5-1 6-1 7-1 7-2 7-3 8-1 8-2 8-3 8-4 9-1 9-2 9-3 10-1 10-2 10-3 10-4 11-1 11-2 11-3 11-4 11-5 11-6 11-7 12-1 12-2 12-3 12-4 12-5 13-1 13-2 13-3 13-4 13-5 13-6 14-1 14-2 14-3 14-4 15-1 15-2 15-3 15-4 15-5 15-6 15-7 15-8 15-9 15-10 15-11 16-1 16-2 16-3 16-4 16-5 xx Default DHCP Server Parameters . 4-20 Configuring Pool Parameters 16-6 17-1 18-1 18-2 18-3 18-4 18-5 18-6 18-7 18-8 19-1 19-2 19-3 19-4 19-5 19-6 19-7 19-8 19-9 19-10 20-1 20-2 20-3 21-1 21-2 21-3 22-1 22-2 23-1 23-2 24-1 25-1 25-2 25-3 25-4 25-5 25-6 26-1 26-2 26-3 26-4 26-5 26-6 26-7 26-8 26-9 26-10 26-11 26-12 26-13 26-14 Policy Configuration Terms and Definitions 16-18 CoS Configuration Terminology About This Guide This guide provides basic configuration information for the Enterasys Networks Fixed Switch platforms using the Command Line Interface (CLI0, including procedures and code examples. 100 VRRP preemption Specifies whether higher priority backup VRRP routers can preempt a lower priority master VRRP router and become master. The higher priority traffic through the device is serviced first before lower priority traffic. A value of 0 equates to an 802.1p priority of 0. Automatic IP Address Pools When configuring an IP address pool for dynamic IP address assignment, the only required steps are to name the pool and define the network number and mask for the pool using the set dhcp pool network command. This procedure would typically be used when the system is NOT configured for routing. Downloading New Firmware Enterasys C5 Command Line Interface Enterasys Networks, Inc. 50 Minuteman Rd. Link Aggregation Overview problems if they also wanted, or needed, to use a different brand of networking hardware. This setting is useful for configuring more complex VLAN traffic patterns, without forcing the switch to flood the unicast traffic in each direction. Setting SNMP notification parameters (filters) 7. Notice Enterasys Networks reserves the right to make changes in specifications and other information contained in this document and its web site without prior notice. Spanning Tree Basics Spanning Tree Basics This section provides you with a more detailed understanding of how the Spanning Tree operates in a typical network environment. Using Multicast in Your Network 2. Configuring Cisco Discovery Protocol There is a one-to-one correlation between the value set with the cos parameter and the 802.1p value assigned to ingressed traffic by the Cisco IP phone. Port Mirroring LAG ports can be a mirror source port, but not a mirror destination port. If the running stack uses a ring stack topology, break the ring and make the stack cable connections to the new unit to close the ring. SNMP Support on Enterasys Switches Table 12-1 SNMP Message Functions (continued) Operation Function get-response Replies to a get-request, get-next-request, and set-request sent by a management station. Downloading New Firmware or just want to verify the contents of the images directory, refer to Deleting a Backup Image File on page 1-5 for more information. Router R1 serves as the master and Router R2 serves as the backup. 3. DHCPv6 Configuration address, a multicast address, or a link-local address.