Amer.com SS2GR50i User manual

SS2GR50i / SS2GR26i /
SS2GR26ip
L2/L4 Managed Gigabit Ethernet Switch
With IP Stacking and PoE Support
Configuration Guide
(Ver 2.1)

Copyright
© Amer.com Corp., 1997-2009 All rights reserved. No part of this publication may be reproduced
in any form or by any means or used to make any derivative such as translation, transformation,
or adaptation without permission from Amer.com, as stipulated by the United States Copyright Act
of 1976.
Amer.com reserves the right to make changes to this document and the products which it
describes without notice. Amer.com shall not be liable for technical or editorial errors or omissions
made herein; nor for incidental or consequential damages resulting from the furnishing,
performance, or use of this material.
Amer.com is a registered trademark of Amer.com. All other trademarks and trade names are
properties of their owners.
Contact Information
Phone: 1-800-262-9703
sales@amer.com
support@amer.com
Online Shop

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
ii
Overview
SS2GR50i/26i/26ip series Layer 2/4 Gigabit Ethernet Switch is a high performance routing
switch released can be deployed as an aggregation device for enterprise and campus
networks.
The switch supports a variety of network interfaces from 100Mb, 1000Mb to 10 GB Ethernet.
We strongly recommend you to read through this manual before starting the installation
and configuration to avoid possible malfunction or damage to the switch.

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
iii
Table of Content
Chapter 1 Switch Management......................................................................................1
1.1 Management Options........................................................................................... 1
1.1.1 Out-of-band management ................................................................................ 1
1.1.2 In-band Management ....................................................................................... 4
1.2 CLI Interface ........................................................................................................9
1.2.1 Configuration Modes ...................................................................................... 10
1.2.2 Configuration Syntax ...................................................................................... 13
1.2.3 Shortcut Key Support ..................................................................................... 13
1.2.4 Help Function ................................................................................................. 14
1.2.5 Input Verification ............................................................................................. 15
1.2.6 Fuzzy Match Support...................................................................................... 15
Chapter 2 Basic Switch Configuration........................................................................ 16
2.1 Basic Switch Configuration Commands ............................................................. 16
2.2 Telnet Management............................................................................................ 17
2.2.1 Telnet.............................................................................................................. 17
2.2.2 SSH 18
2.3 Switch IP Addresses Configuration .................................................................... 20
2.3.1 Switch IP Addresses Configuration Task List.................................................. 20
2.4 SNMP Configuration .......................................................................................... 21
2.4.1 Introduction to SNMP ..................................................................................... 21
2.4.2 Introduction to MIB ......................................................................................... 22
2.4.3 Introduction to RMON..................................................................................... 24
2.4.4 SNMP Configuration....................................................................................... 24
2.4.5 Typical SNMP Configuration Examples .......................................................... 26
2.4.6 SNMP Troubleshooting................................................................................... 28
2.5 Switch Firmware Upgrade.................................................................................. 29
2.5.1 Switch System Files ....................................................................................... 29
2.5.2 BootROM Upgrade ......................................................................................... 29
2.5.3 FTP/TFTP Upgrade ........................................................................................ 32
Chapter 3 Cluster network management Configuration............................................ 42
3.1 Introduction to Cluster network management..................................................... 42
3.2 Cluster Network Management Configuration ..................................................... 43
3.3 Examples of Cluster Administration ................................................................... 45
3.4 Cluster Administrator Troubleshooting ............................................................... 46

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
iv
Chapter 4 Port Configuration.......................................................................................47
4.1 Introduction to Port............................................................................................. 47
4.2 Network Port Configuration................................................................................ 47
4.3 Port Configuration Example ...............................................................................49
4.4 Port Troubleshooting.......................................................................................... 50
Chapter 5 Port Loopback Detection Function Configuration.................................... 51
5.1 Introduction to Port Loopback Detection Function ............................................. 51
5.2 Port Loopback Detection Function Configuration Task List ................................ 51
5.3 Port Loopback Detection Example..................................................................... 53
5.4 Port Loopback Detection Troubleshooting ......................................................... 53
Chapter 6 PoE Port Configuration...............................................................................54
6.1 PoE Configuration..............................................................................................54
6.1.1 Turn on or off POE in global ........................................................................... 54
6.1.2 Configure max output power in global ............................................................ 54
6.1.3 Configure power manage mode in global ....................................................... 54
6.1.4 Configure nonstandard PD detect mode in global .......................................... 55
6.1.5 Turn on or off POE by port ............................................................................. 55
6.1.6 Configure max out power in port..................................................................... 55
6.1.7 Configure power out priority for ports ............................................................. 55
6.2 PoE Application Example................................................................................... 55
6.2.1 Example ......................................................................................................... 55
6.2.2 Enable global POE settings............................................................................ 56
6.3 PoE Settings Through Web GUI ........................................................................ 57
6.4 PoE Troubleshooting.......................................................................................... 59
Chapter 7 Port Channel Configuration........................................................................ 60
7.1 Introduction to Port Channel ..............................................................................60
7.2 Port Channel Configuration Task List ................................................................. 61
7.3 Port Channel Example ....................................................................................... 62
7.4 Port Channel Troubleshooting............................................................................ 64
Chapter 8 JUMBO Configuration.................................................................................65
8.1 JUMBO Introduction........................................................................................... 65
8.2 JUMBO Configuration Task List .........................................................................65
Chapter 9 VLAN Configuration ....................................................................................66
9.1 VLAN Configuration ...........................................................................................66
9.1.1 Introduction to VLAN ...................................................................................... 66
9.1.2 VLAN Configuration Task List ......................................................................... 67

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
v
9.1.3 Typical VLAN Application................................................................................ 69
9.2 GVRP Configuration........................................................................................... 70
9.2.1 Introduction to GVRP...................................................................................... 70
9.2.2 GVRP Configuration Task List ........................................................................ 71
9.2.3 Typical GVRP Application ............................................................................... 72
9.2.4 VLAN Troubleshooting.................................................................................... 73
9.3 Dot1q-tunnel Configuration ................................................................................73
9.3.1 Dot1q-tunnel Introduction ............................................................................... 73
9.3.2 Dot1q-tunnel Configuration............................................................................. 74
9.3.3 Typical Applications Of The Dot1q-tunnel ....................................................... 75
9.3.4 Dot1q-tunnel Troubleshooting......................................................................... 76
9.4 Dynamic VLAN Configuration ............................................................................76
9.4.1 Dynamic VLAN Introduction............................................................................ 76
9.4.2 Dynamic VLAN Configuration......................................................................... 77
9.4.3 Typical Application of the Dynamic VLAN....................................................... 79
9.4.4 Dynamic VLAN Troubleshooting..................................................................... 79
9.5 Voice VLAN Configuration.................................................................................. 80
9.5.1 Voice VLAN Introduction................................................................................. 80
9.5.2 Voice VLAN Configuration .............................................................................. 81
9.5.3 Typical Applications of the Voice VLAN .......................................................... 81
9.5.4 Voice VLAN Troubleshooting.......................................................................... 82
Chapter 10 MAC Table Configuration..........................................................................83
10.1 Introduction to MAC Table................................................................................ 83
10.1.1 Obtaining MAC Table.................................................................................... 83
10.1.2 Forward or Filter ........................................................................................... 84
10.2 MAC address table configuration .....................................................................85
10.3 Typical Configuration Examples ....................................................................... 86
10.4 Troubleshooting ............................................................................................... 87
10.5 MAC Address Function Extension.................................................................... 87
10.5.1 MAC Address Binding................................................................................... 87
Chapter 11 MSTP Configuration .................................................................................. 90
11.1 MSTP Introduction............................................................................................ 90
11.1.1 MSTP Region ............................................................................................... 90
11.1.2 Port Roles..................................................................................................... 92
11.1.3 MSTP Load Balance..................................................................................... 92
a) MSTP Configuration ...................................................................................92

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
vi
b) MSTP Example........................................................................................... 97
c) MSTP Troubleshooting ............................................................................. 101
Chapter 12 QoS Configuration...................................................................................102
12.1 QoS Introduction ............................................................................................ 102
12.1.1 QoS Terms.................................................................................................. 102
12.1.2 QoS Implementation................................................................................... 103
12.1.3 Basic QoS Model........................................................................................ 103
12.2 QoS Configuration ......................................................................................... 108
12.3 QoS Example..................................................................................................111
12.4 QoS Troubleshooting ..................................................................................... 114
Chapter 13 Flow-based Redirection .......................................................................... 115
13.1 Introduction to Flow-based Redirection.......................................................... 115
13.2 Flow-based Redirection Configuration Task List ............................................ 115
13.3 Flow-based Redirection Examples................................................................. 116
13.4 Flow-based Redirection Troubleshooting Help............................................... 116
Chapter 14 Layer 3 Management Configuration....................................................... 117
14.1 Layer 3 Interface ............................................................................................ 117
14.1.1 Introduction to Layer 3 Interface ..................................................................117
14.1.2 Layer 3 Interface Configuration Task List:....................................................117
14.2 IP Configuration ............................................................................................. 117
14.2.1 IPv4 Address Configuration .........................................................................118
14.2.2 IPv6 Configuration .......................................................................................118
14.2.3 IPv6 Troubleshooting.................................................................................. 121
14.3 ARP................................................................................................................ 121
14.3.1 Introduction to ARP..................................................................................... 121
14.3.2 ARP Configuration Task List: ...................................................................... 121
14.3.3 ARP Troubleshooting.................................................................................. 121
Chapter 15 ARP Scanning Prevention Function Configuration.............................. 122
15.1 Introduction to ARP Scanning Prevention Function ....................................... 122
15.2 ARP Scanning Prevention Configuration Task List......................................... 122
15.3 ARP Scanning Prevention Typical Examples ................................................. 125
15.4 ARP Scanning Prevention Troubleshooting Help ........................................... 125
Chapter 16 ARP GUARD Configuration.....................................................................127
16.1 ARP GUARD Introduction .............................................................................. 127
16.2 ARP GUARD Configuration Task List............................................................. 127
Chapter 17 DHCP Configuration................................................................................ 129

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
vii
17.1 Introduction to DHCP ..................................................................................... 129
17.2 DHCP Server Configuration ........................................................................... 130
17.3 DHCP Configuration Example........................................................................ 132
17.4 DHCP Troubleshooting .................................................................................. 134
Chapter 18 DHCP Snooping Configuration...............................................................135
18.1 DHCP Snooping Introduction ......................................................................... 135
18.2 DHCP Snooping Configuration Task List........................................................ 136
18.3 DHCP Snooping Typical Applications ............................................................ 139
18.4 DHCP Snooping Troubleshooting .................................................................. 140
18.4.1 Monitor and Debug ..................................................................................... 140
18.4.2 DHCP Snooping Troubleshooting............................................................... 140
Chapter 19 DHCP Option 82 Configuration............................................................... 141
19.1 Introduction to DHCP option 82 ..................................................................... 141
19.1.1 DHCP option 82 Message Structure........................................................... 141
19.1.2 DHCP Snooping option 82 working mechanism ......................................... 142
19.2 DHCP Snooping option 82 Configuration....................................................... 143
19.2.1 DHCP Snooping option 82 Configuration Task List..................................... 143
Chapter 20 IPv4 Multicast Protocol ........................................................................... 145
20.1 IPv4 Multicast Protocol Overview................................................................... 145
20.1.1 Introduction to Multicast.............................................................................. 145
20.1.2 Multicast Address ....................................................................................... 145
20.1.3 IP Multicast Packet Transmission............................................................... 147
20.1.4 IP Multicast Application .............................................................................. 147
20.2 DCSCM.......................................................................................................... 148
20.2.1 Introduction to DCSCM............................................................................... 148
20.2.2 DCSCM Configuration Task List ................................................................. 148
20.2.3 DCSCM Configuration Examples ............................................................... 151
20.2.4 DCSCM Troubleshooting............................................................................ 152
20.3 IGMP Snooping.............................................................................................. 153
20.3.1 Introduction to IGMP Snooping................................................................... 153
20.3.2 IGMP Snooping Configuration Task............................................................ 153
20.3.3 IGMP Snooping Example ........................................................................... 155
20.3.4 IGMP Snooping Troubleshooting................................................................ 158
Chapter 21 IPv6 Multicast Protocol ........................................................................... 159
21.1 MLD Snooping ............................................................................................... 159
21.1.1 MLD Snooping Introduction ........................................................................ 159

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
viii
21.1.2 MLD Snooping Configuration Task ............................................................. 159
21.1.3 MLD Snooping Examples ........................................................................... 161
21.1.4 MLD Snooping Troubleshooting ................................................................. 164
Chapter 22 Multicast VLAN Configuration................................................................ 165
22.1 Introductions to Multicast VLAN ..................................................................... 165
22.2 Multicast VLAN Configuration Task List ......................................................... 165
22.3 Examples Of Multicast VLAN ......................................................................... 166
Chapter 23 ACL Configuration................................................................................... 168
23.1 Introduction to ACL ........................................................................................ 168
23.1.1 Access-list................................................................................................... 168
23.1.2 Access-group.............................................................................................. 168
23.1.3 Access-list Action and Global Default Action............................................... 168
23.2 ACL Configuration .......................................................................................... 169
23.3 ACL Example ................................................................................................. 183
23.4 ACL Troubleshooting...................................................................................... 185
Chapter 24 802.1x Configuration............................................................................... 187
24.1 Introduction to 802.1x .................................................................................... 187
24.1.1 The Authentication Structure of 802.1x....................................................... 187
24.1.2 The Work Mechanism of 802.1x ................................................................. 189
24.1.3 The Encapsulation of EAPOL Messages .................................................... 189
24.1.4 The Encapsulation of EAP Attributes .......................................................... 191
24.1.5 Web Authentication Proxy based on 802.1x ............................................... 192
24.1.6 The Authentication Methods of 802.1x........................................................ 193
24.1.7 The Extension and Optimization of 802.1x ................................................. 198
24.1.8 The Features of VLAN Allocation................................................................ 199
24.2 802.1x Configuration Task List ....................................................................... 200
24.3 802.1x Application Example ........................................................................... 206
24.3.1 Examples of Guest Vlan Applications ......................................................... 206
24.3.2 Examples of IPv4 Radius Applications ....................................................... 209
24.3.3 IPv6 Radius Application.............................................................................. 210
24.3.4 802.1x Web Proxy Authentication Sample Application ................................211
24.4 802.1x Troubleshooting.................................................................................. 212
Chapter 25 Port/MAC Address Limiation in VLAN Configuratoin........................... 213
25.1 Introduction to the Number Limitation Function of Port, MAC in VLAN .......... 213
25.2 The Number Limitation Function of Port, MAC in VLAN Configuration Task
Sequence...............................................................................................................214

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
ix
25.3 The Number Limitation Function of Port, MAC in VLAN Typical Examples.... 215
25.4 The Number Limitation Function Of Port, MAC in VLAN Troubleshooting ..... 216
Chapter 26 Operational Configuration of AM Function ........................................... 217
26.1 Introduction to AM Function ........................................................................... 217
26.2 AM Function Configuration Task List .............................................................. 217
26.3 Example of AM Function ................................................................................ 219
26.4 AM Function Troubleshooting......................................................................... 219
Chapter 27 Security Feature Configuration.............................................................. 220
27.1 Security Feature Introduction ......................................................................... 220
27.2 Security Feature Configuration ...................................................................... 220
27.2.1 Prevent IP Spoofing Function Configuration Task List ................................ 220
27.2.2 Prevent TCP Unauthorized Label Attack Function Configuration Task List. 220
27.2.3 Anti Port Cheat Function Configuration Task List........................................ 221
27.2.4 Prevent TCP Fragment Attack Function Configuration Task List ................ 221
27.2.5 Prevent ICMP Fragment Attack Function Configuration Task List............... 221
27.3 Security Feature Example.............................................................................. 222
Chapter 28 TACACS+ Configuration ......................................................................... 223
28.1 TACACS+ Introduction ................................................................................... 223
28.2 TACACS+ Configuration ................................................................................ 223
28.3 Typical TACACS+ Scenarios.......................................................................... 224
28.4 TACACS+ Troubleshooting ............................................................................ 224
Chapter 29 MRPP Configuration................................................................................ 225
29.1 MRPP introduction ......................................................................................... 225
29.1.1 Conception Introduction.............................................................................. 226
29.1.2 MRPP Protocol Packet Types..................................................................... 227
29.1.3 MRPP Protocol Operation System ............................................................. 227
29.2 MRPP Configuration Task List........................................................................ 228
29.3 MRPP typical scenario ................................................................................... 229
29.4 MRPP troubleshooting ................................................................................... 231
Chapter 30 Mirroring Configuration ..........................................................................232
30.1 Introduction to Mirroring ................................................................................. 232
30.2 Mirroring Configuration Task List.................................................................... 232
30.3 Mirroring Examples ........................................................................................ 233
30.4 Mirroring Troubleshooting .............................................................................. 234
Chapter 31 SFlow Configuration................................................................................235
31.1 sFlow introduction .......................................................................................... 235

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
x
31.2 sFlow Configuration Task List ........................................................................ 235
31.3 sFlow Example............................................................................................... 237
31.4 sFlow Troubleshooting ................................................................................... 237
Chapter 32 SNTP Configuration................................................................................. 239
32.1 Introduction to SNTP...................................................................................... 239
32.2 Typical SNTP Configuration Example ............................................................ 240
Chapter 33 Monitor and Debug.................................................................................. 241
33.1 Ping................................................................................................................ 241
33.2 Ping6.............................................................................................................. 241
33.3 Traceroute...................................................................................................... 241
33.4 Traceroute6.................................................................................................... 241
33.5 Show .............................................................................................................. 242
33.6 Debug ............................................................................................................ 243
33.7 System log ..................................................................................................... 243
33.7.1 System Log Introduction............................................................................. 243
33.7.2 System Log Configuration .......................................................................... 245
33.7.3 System Log Configuration Example ........................................................... 246
Chapter 34 Reload Switch after Specified Time ....................................................... 247
34.1 Introduce to reload switch after specifid time ................................................. 247
34.2 Reload switch after specifid time Task List.....................................................247
Chapter 35 Debugging and Diagnosis ...................................................................... 248
35.1 Debugging and diagnosis for packets received and sent by CPU.................. 248
35.2 Debugging and diagnosis Task List................................................................ 248

Chapter 1 Switch Management
1.1 Management Options
After purchasing the switch, the user needs to configure the switch for network management.
SS2GR50i/26i series switch provides two management options: in-band management and
out-of-band management.
1.1.1 Out-of-band management
Out-of-band management is the management through Console interface. Generally, the user will use
out-of-band management for the initial switch configuration, or when in-band management is not
available.
The procedures for managing the switch via Console interface are listed below:
Step 1: setting up the environment:
Fig 1-1 Out-of-band Management Configuration Environment
As shown in Fig 1-1, the serial port (RS-232) is connected to the switch with the serial cable
provided. The table below lists all the devices used in the connection.
Device Name Description

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
2
PC machine Has functional keyboard and RS-232,with terminal emulator
installed, such as HyperTerminal included in Windows
9x/NT/2000/XP.
Serial port cable One end attach to the RS-232 serial port, the other end to
the Console port.
Switch Functional Console port required.
Step 2: Entering the HyperTerminal
Open the HyperTerminal included in Windows after the connection established. The example below
is based on the HyperTerminal included in Windows XP.
1)Click Start menu - All Programs -Accessories -Communication - HyperTerminal.
Fig 1-2 Opening HyperTerminal 1
2) Type a name for opening HyperTerminal, such as ‘Switch’.

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
3
Fig 1-3 Opening HyperTerminal 2
3) In the ‘Connecting using’ drop-list, select the RS-232 serial port used by the PC, e.g. COM1, and
click ‘OK’.
Fig 1-4 Opening HyperTerminal 3
4) COM1 property appears, select ‘9600’ for ‘Baud rate’, ‘8’ for ‘Data bits’, ‘none’ for ‘Parity
checksum’, ‘1’ for stop bit and ‘none’ for traffic control; or you can also click ‘Restore default’ and
click ‘OK’.

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
4
Fig 1-3 Opening HyperTerminal 2
Fig 1-5 Opening HyperTerminal
5) The configuration interface of HyperTerminal
Step 3: Entering switch CLI interface
Power on the switch, the following appears in the HyperTerminal windows, that is the CLI
configuration mode for SS2GR50i/26i series Switch.
switch>
The user can now enter commands to manage the switch. For a detailed description for the
commands, please refer to the following chapters.
1.1.2 In-band Management
In-band management refers to the management by login to the switch via Telnet ,HTTP protocol, or
using the snmp network management software developed by Amer.com or other parties to
configure the switch. In-band management enables management of the switch for some devices
attached to the switch. In the case when in-band management fails due to switch configuration
changes, out-of-band management can be used for configuring and managing the switch.
1.1.2.1 Management via Telnet
To manage the switch with Telnet, the following conditions should be met:

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
5
1) Switch has an IPv4/IPv6 address configured
2) The host IP address (Telnet client) and the switch’s VLAN interface IPv4/IPv6 address is in
the same network segment.
3) If not 2), Telnet client can connect to an IPv4/IPv6 address of the switch via other devices,
such as a router.
SS2GR50i/26i series switch is a Layer 3 switch that can be configured with several IPv4/IPv6
addresses. The following example assumes the shipment status of the switch where only VLAN1
exists in the system.
The following describes the steps for a Telnet client to connect to the switch’s VLAN1 interface by
Telnet (IPv4 address for example).
Fig 1-6 Manage the switch by Telnet
Step 1: Configure the IP addresses for the switch
First is the configuration of host IP address. This should be within the same network segment as the
switch VLAN1 interface IP address. Suppose the switch VLAN interface IP address 10.1.128.251/24.
Then, a possible host IP address is 10.1.128.252/24. Run ‘ping 10.1.128.251’ from the host and
verify the result, check for reasons if ping failed.
The IP address configuration commands for VLAN1 interface are listed below. Before in-band
management, the switch must be configured with an IP address by out-of-band management (i.e.
Console mode), The configuration commands are as follows (All switch configuration prompts are
assumed to be ‘switch’ here after if not otherwise specified):
Switch>
Switch>enable
Switch#config
Switch(Config)#interface vlan 1
Switch(Config-If-Vlan1)#ip address 10.1.128.251 255.255.255.0
Switch(Config-If-Vlan1)#no shutdown
Step 2: Run Telnet Client program.

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
6
Run Telnet client program included in Windows with the specified Telnet target.
Fig 1-7 Run telnet client program included in Windows
Step 3: Login to the switch
Login the Telnet configuration interface. Valid login name and password are required, otherwise the
switch will reject Telnet access. This is a method to protect the switch from unauthorized access. As
a result, when Telnet is enabled for configuring and managing the switch, username and password
for authorized Telnet users must be configured with the following command:
username <user> password {0|7} <password>.
Assume an authorized user in the switch has a username of ‘test’, and password of ‘test’, the
configuration procedure should like the following:
Switch>en
Switch#config
Switch(Config)#telnet-user test password 0 test
Enter valid login name and password in the Telnet configuration interface, Telnet user will be able to
enter the switch’s CLI configuration interface. The commands used in the Telnet CLI interface after
login is the same as that in the Console interface.

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
7
Fig 1-8
Telnet Configuration Interface
1.1.2.2 Management via HTTP
To manage the switch via HTTP, the following conditions should be met:
1) Switch has an IPv4/IPv6 address configured
2) The host IPv4/IPv6 address (HTTP client) and the switch’s VLAN interface IPv4/IPv6
address are in the same network segment;
3) If 2) is not met, HTTP client should connect to an IPv4/IPv6 address of the switch via other
devices, such as a router.
Similar to management via Telnet, as soon as the host succeeds to ping/ping6 an IPv4/IPv6
address of the switch and to type the right login password, it can access the switch via HTTP. The
configuration list is as below:
Step 1: Configure the IP addresses for the switch and start the HTTP Server function on the switch
For configuring the IP address on the switch through out-of-band management, see the relevant
chapter.
To enable the WEB configuration, users should type the CLI command ip http server in the global
mode as below:
Switch>en
Switch#config
Switch(Config)#ip http server
Step 2: Using HTTP protocol on the host
Open the Web browser on the host and type the IP address of the switch.Or run directly the HTTP
protocol on the Windows. For example, the IP address of the switch is ‘10.1.128.251’.

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
8
Fig 1-9 Connect through HTTP Protocol
When accessing a switch with IPv6 address, it is recommended to use the Firefox browser with 1.5
or later version. For example, if the IPv6 address of the switch is ‘3ffe:506:1:2::3’, enter the switch
address at the address bar: http://[3ffe:506:1:2::3], where the address should be in the square
brackets.
Step 3: Logon to the switch
To logon to the HTTP configuration interface, valid login user name and password are required;
otherwise the switch will reject HTTP access. This is a method to protect the switch from the
unauthorized access.
Consequently, in order to configure the switch via HTTP, username and password for authorized
HTTP users must be configured with the following command in the global mode:
username <username> password <show_flag> <password>.
Suppose an authorized user in the switch has a username as ‘test’, and password as ‘test’. The
configuration procedure is as below:
Switch>en
Switch#config
Switch(Config)#web-user admin password 0 digital
1.1.2.3 Management via snmp network management software
To manage the switch with snmp, the following conditions should be met:

Switch Configuration SS2GR50i / SS2GR26i / SS2GR26ip
9
1) Switch has an IP address configured
2) As the client, the host IP address and the switch’s VLAN interface IP address is in the same
network segment.
3) If not 2), client can connect to an IP address of the switch via other devices, such as a
router.
4) Open the snmp function.
Management via snmp network management software, the host succeeds to ping an IP address of
the switch, then run the switch, snmp network management software will be found by SS2GR50i/26i
series, and operate it with read-write permission. For more detail please refer to the ‘Snmp Network
Management Software Usage Guide’.
1.2 CLI Interface
SS2GR50i/26i series switch provides three management interfaces: CLI(Command Line Interface),
Web interface and Snmp network management software.
CLI interface is familiar to most users. As aforementioned out-of-band management and Telnet login
are all performed through CLI interface to manage the switch.
CLI Interface is supported by Shell program, which consists of a set of configuration commands.
Those commands are categorized according to their functions in switch configuration and
management. Each category represents a different configuration mode. The Shell for the switch is
described below:
zConfiguration Modes
zConfiguration Syntax
zShortcut keys
zHelp function
zInput verification
zFuzzy match support
Other manuals for SS2GR50i
1
This manual suits for next models
2
Table of contents
Other Amer.com Network Router manuals
Popular Network Router manuals by other brands

NetComm
NetComm 3G38WV quick start guide

Huawei
Huawei AR1200 Series Configuration guide

NETGEAR
NETGEAR XEB1004 - 85 Mbps Powerline EN Switch datasheet

Datacom
Datacom DM4001 Installation and operation guide

NETGEAR
NETGEAR DGFV338 - ProSafe Wireless ADSL Modem VPN Firewall... Network Setup

Juniper
Juniper PTX5000 Hardware guide

Asante
Asante FriendlyNet FS4004DS user manual

Linksys
Linksys SFE2000P - Managed Ethernet Switch Product data

RSupport
RSupport RemoteView Configuration guide

LevelOne
LevelOne GSW-0507 user manual

SMC Networks
SMC Networks ADSL2 Barricade N Pro SMC7904WBRA-N Specification sheet

Cisco
Cisco 2501 - Router - EN user guide