ExtremeSwitching 4900 Series User manual

Quick Start Configuration for Ethernet
Routing Switch 4900 and 5900 Series
Release 7.5
NN47211-500
Issue 07.01
December 2017

© 2017, Extreme Networks, Inc.
All Rights Reserved.
Notice
While reasonable efforts have been made to ensure that the
information in this document is complete and accurate at the time of
printing, Extreme Networks, Inc. assumes no liability for any errors.
Extreme Networks, Inc. reserves the right to make changes and
corrections to the information in this document without the obligation
to notify any person or organization of such changes.
Documentation disclaimer
“Documentation” means information published in varying mediums
which may include product information, operating instructions and
performance specifications that are generally made available to users
of products. Documentation does not include marketing materials.
Extreme Networks shall not be responsible for any modifications,
additions, or deletions to the original published version of
Documentation unless such modifications, additions, or deletions
were performed by or on the express behalf of Extreme Networks.
End User agrees to indemnify and hold harmless Extreme Networks,
Extreme Networks’ agents, servants and employees against all
claims, lawsuits, demands and judgments arising out of, or in
connection with, subsequent modifications, additions or deletions to
this documentation, to the extent made by End User.
Link disclaimer
Extreme Networks is not responsible for the contents or reliability of
any linked websites referenced within this site or Documentation
provided by Extreme Networks. Extreme Networks is not responsible
for the accuracy of any information, statement or content provided on
these sites and does not necessarily endorse the products, services,
or information described or offered within them. Extreme Networks
does not guarantee that these links will work all the time and has no
control over the availability of the linked pages.
Warranty
Extreme Networks provides a limited warranty on Extreme Networks
hardware and software. Refer to your sales agreement to establish
the terms of the limited warranty. In addition, Extreme Networks’
standard warranty language, as well as information regarding support
for this product while under warranty is available to Extreme
Networks customers and other parties through the Extreme Networks
Support website: http://www.extremenetworks.com/support under the
link ““Policies” or such successor site as designated by Extreme
Networks. Please note that if You acquired the product(s) from an
authorized Extreme Networks Channel Partner outside of the United
States and Canada, the warranty is provided to You by said Extreme
Networks Channel Partner and not by Extreme Networks.
“Hosted Service” means an Extreme Networks hosted service
subscription that You acquire from either Extreme Networks or an
authorized Extreme Networks Channel Partner (as applicable) and
which is described further in Hosted SAS or other service description
documentation regarding the applicable hosted service. If You
purchase a Hosted Service subscription, the foregoing limited
warranty may not apply but You may be entitled to support services
in connection with the Hosted Service as described further in your
service description documents for the applicable Hosted Service.
Contact Extreme Networks or Extreme Networks Channel Partner (as
applicable) for more information.
Hosted Service
THE FOLLOWING APPLIES ONLY IF YOU PURCHASE AN
EXTREME NETWORKS HOSTED SERVICE SUBSCRIPTION
FROM EXTREME NETWORKS OR AN EXTREME NETWORKS
CHANNEL PARTNER (AS APPLICABLE), THE TERMS OF USE
FOR HOSTED SERVICES ARE AVAILABLE ON THE EXTREME
NETWORKS WEBSITE, https://extremeportal.force.com OR SUCH
SUCCESSOR SITE AS DESIGNATED BY EXTREME NETWORKS,
AND ARE APPLICABLE TO ANYONE WHO ACCESSES OR USES
THE HOSTED SERVICE. BY ACCESSING OR USING THE
HOSTED SERVICE, OR AUTHORIZING OTHERS TO DO SO, YOU,
ON BEHALF OF YOURSELF AND THE ENTITY FOR WHOM YOU
ARE DOING SO (HEREINAFTER REFERRED TO
INTERCHANGEABLY AS “YOU” AND “END USER”), AGREE TO
THE TERMS OF USE. IF YOU ARE ACCEPTING THE TERMS OF
USE ON BEHALF A COMPANY OR OTHER LEGAL ENTITY, YOU
REPRESENT THAT YOU HAVE THE AUTHORITY TO BIND SUCH
ENTITY TO THESE TERMS OF USE. IF YOU DO NOT HAVE SUCH
AUTHORITY, OR IF YOU DO NOT WISH TO ACCEPT THESE
TERMS OF USE, YOU MUST NOT ACCESS OR USE THE
HOSTED SERVICE OR AUTHORIZE ANYONE TO ACCESS OR
USE THE HOSTED SERVICE.
Licenses
THE SOFTWARE LICENSE TERMS AVAILABLE ON THE
EXTREME NETWORKS WEBSITE, https://extremeportal.force.com
OR SUCH SUCCESSOR SITE AS DESIGNATED BY EXTREME
NETWORKS, ARE APPLICABLE TO ANYONE WHO
DOWNLOADS, USES AND/OR INSTALLS EXTREME NETWORKS
SOFTWARE, PURCHASED FROM EXTREME NETWORKS, INC.,
ANY EXTREME NETWORKS AFFILIATE, OR AN EXTREME
NETWORKS CHANNEL PARTNER (AS APPLICABLE) UNDER A
COMMERCIAL AGREEMENT WITH EXTREME NETWORKS OR
AN EXTREME NETWORKS CHANNEL PARTNER. UNLESS
OTHERWISE AGREED TO BY EXTREME NETWORKS IN
WRITING, EXTREME NETWORKS DOES NOT EXTEND THIS
LICENSE IF THE SOFTWARE WAS OBTAINED FROM ANYONE
OTHER THAN EXTREME NETWORKS, AN EXTREME
NETWORKS AFFILIATE OR AN EXTREME NETWORKS CHANNEL
PARTNER; EXTREME NETWORKS RESERVES THE RIGHT TO
TAKE LEGAL ACTION AGAINST YOU AND ANYONE ELSE USING
OR SELLING THE SOFTWARE WITHOUT A LICENSE. BY
INSTALLING, DOWNLOADING OR USING THE SOFTWARE, OR
AUTHORIZING OTHERS TO DO SO, YOU, ON BEHALF OF
YOURSELF AND THE ENTITY FOR WHOM YOU ARE
INSTALLING, DOWNLOADING OR USING THE SOFTWARE
(HEREINAFTER REFERRED TO INTERCHANGEABLY AS “YOU”
AND “END USER”), AGREE TO THESE TERMS AND CONDITIONS
AND CREATE A BINDING CONTRACT BETWEEN YOU AND
EXTREME NETWORKS, INC. OR THE APPLICABLE EXTREME
NETWORKS AFFILIATE (“EXTREME NETWORKS”).
Extreme Networks grants You a license within the scope of the
license types described below. Where the order documentation does
not expressly identify a license type, the applicable license will be a
Designated System License as set forth below in the Designated
System(s) License (DS) section as applicable. The applicable
number of licenses and units of capacity for which the license is
granted will be one (1), unless a different number of licenses or units
of capacity is specified in the documentation or other materials
available to You. “Software” means computer programs in object
code, provided by Extreme Networks or an Extreme Networks
Channel Partner, whether as stand-alone products, pre-installed on
hardware products, and any upgrades, updates, patches, bug fixes,
or modified versions thereto. “Designated Processor” means a single
stand-alone computing device. “Server” means a set of Designated
Processors that hosts (physically or virtually) a software application
to be accessed by multiple users. “Instance” means a single copy of
the Software executing at a particular time: (i) on one physical
machine; or (ii) on one deployed software virtual machine (“VM”) or
similar deployment.
License type(s)
Designated System(s) License (DS). End User may install and use
each copy or an Instance of the Software only: 1) on a number of
Designated Processors up to the number indicated in the order; or 2)
up to the number of Instances of the Software as indicated in the
order, Documentation, or as authorized by Extreme Networks in
writing. Extreme Networks may require the Designated Processor(s)
to be identified in the order by type, serial number, feature key,
Instance, location or other specific designation, or to be provided by
End User to Extreme Networks through electronic means established
by Extreme Networks specifically for this purpose.
Copyright
Except where expressly stated otherwise, no use should be made of
materials on this site, the Documentation, Software, Hosted Service,
or hardware provided by Extreme Networks. All content on this site,
the documentation, Hosted Service, and the product provided by
Extreme Networks including the selection, arrangement and design
of the content is owned either by Extreme Networks or its licensors
and is protected by copyright and other intellectual property laws
including the sui generis rights relating to the protection of databases.
You may not modify, copy, reproduce, republish, upload, post,
transmit or distribute in any way any content, in whole or in part,

including any code and software unless expressly authorized by
Extreme Networks. Unauthorized reproduction, transmission,
dissemination, storage, and or use without the express written
consent of Extreme Networks can be a criminal, as well as a civil
offense under the applicable law.
Virtualization
The following applies if the product is deployed on a virtual machine.
Each product has its own ordering code and license types. Note,
unless otherwise stated, that each Instance of a product must be
separately licensed and ordered. For example, if the end user
customer or Extreme Networks Channel Partner would like to install
two Instances of the same type of products, then two products of that
type must be ordered.
Third Party Components
“Third Party Components” mean certain software programs or
portions thereof included in the Software or Hosted Service may
contain software (including open source software) distributed under
third party agreements (“Third Party Components”), which contain
terms regarding the rights to use certain portions of the Software
(“Third Party Terms”). As required, information regarding distributed
Linux OS source code (for those products that have distributed Linux
OS source code) and identifying the copyright holders of the Third
Party Components and the Third Party Terms that apply is available
in the products, Documentation or on Extreme Networks’ website
at:http://www.extremenetworks.com/support/policies/software-
licensing or such successor site as designated by Extreme Networks.
The open source software license terms provided as Third Party
Terms are consistent with the license rights granted in these Software
License Terms, and may contain additional rights benefiting You,
such as modification and distribution of the open source software.
The Third Party Terms shall take precedence over these Software
License Terms, solely with respect to the applicable Third Party
Components to the extent that these Software License Terms impose
greater restrictions on You than the applicable Third Party Terms.
The following applies only if the H.264 (AVC) codec is distributed with
the product. THIS PRODUCT IS LICENSED UNDER THE AVC
PATENT PORTFOLIO LICENSE FOR THE PERSONAL USE OF A
CONSUMER OR OTHER USES IN WHICH IT DOES NOT RECEIVE
REMUNERATION TO (i) ENCODE VIDEO IN COMPLIANCE WITH
THE AVC STANDARD (“AVC VIDEO”) AND/OR (ii) DECODE AVC
VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A
PERSONAL ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO
PROVIDER LICENSED TO PROVIDE AVC VIDEO. NO LICENSE IS
GRANTED OR SHALL BE IMPLIED FOR ANY OTHER USE.
ADDITIONAL INFORMATION MAY BE OBTAINED FROM MPEG LA,
L.L.C. SEE HTTP://WWW.MPEGLA.COM.
Service Provider
THE FOLLOWING APPLIES TO EXTREME NETWORKS CHANNEL
PARTNER’S HOSTING OF EXTREME NETWORKS PRODUCTS
OR SERVICES. THE PRODUCT OR HOSTED SERVICE MAY USE
THIRD PARTY COMPONENTS SUBJECT TO THIRD PARTY
TERMS AND REQUIRE A SERVICE PROVIDER TO BE
INDEPENDENTLY LICENSED DIRECTLY FROM THE THIRD
PARTY SUPPLIER. AN EXTREME NETWORKS CHANNEL
PARTNER’S HOSTING OF EXTREME NETWORKS PRODUCTS
MUST BE AUTHORIZED IN WRITING BY EXTREME NETWORKS
AND IF THOSE HOSTED PRODUCTS USE OR EMBED CERTAIN
THIRD PARTY SOFTWARE, INCLUDING BUT NOT LIMITED TO
MICROSOFT SOFTWARE OR CODECS, THE EXTREME
NETWORKS CHANNEL PARTNER IS REQUIRED TO
INDEPENDENTLY OBTAIN ANY APPLICABLE LICENSE
AGREEMENTS, AT THE EXTREME NETWORKS CHANNEL
PARTNER’S EXPENSE, DIRECTLY FROM THE APPLICABLE
THIRD PARTY SUPPLIER.
WITH RESPECT TO CODECS, IF THE EXTREME NETWORKS
CHANNEL PARTNER IS HOSTING ANY PRODUCTS THAT USE
OR EMBED THE G.729 CODEC, H.264 CODEC, OR H.265
CODEC, THE EXTREME NETWORKS CHANNEL PARTNER
ACKNOWLEDGES AND AGREES THE EXTREME NETWORKS
CHANNEL PARTNER IS RESPONSIBLE FOR ANY AND ALL
RELATED FEES AND/OR ROYALTIES. THE G.729 CODEC IS
LICENSED BY SIPRO LAB TELECOM INC. SEE
WWW.SIPRO.COM/CONTACT.HTML. THE H.264 (AVC) CODEC IS
LICENSED UNDER THE AVC PATENT PORTFOLIO LICENSE FOR
THE PERSONAL USE OF A CONSUMER OR OTHER USES IN
WHICH IT DOES NOT RECEIVE REMUNERATION TO: (I) ENCODE
VIDEO IN COMPLIANCE WITH THE AVC STANDARD (“AVC
VIDEO”) AND/OR (II) DECODE AVC VIDEO THAT WAS ENCODED
BY A CONSUMER ENGAGED IN A PERSONAL ACTIVITY AND/OR
WAS OBTAINED FROM A VIDEO PROVIDER LICENSED TO
PROVIDE AVC VIDEO. NO LICENSE IS GRANTED OR SHALL BE
IMPLIED FOR ANY OTHER USE. ADDITIONAL INFORMATION
FOR H.264 (AVC) AND H.265 (HEVC) CODECS MAY BE
OBTAINED FROM MPEG LA, L.L.C. SEE HTTP://
WWW.MPEGLA.COM.
Compliance with Laws
You acknowledge and agree that it is Your responsibility for
complying with any applicable laws and regulations, including, but not
limited to laws and regulations related to call recording, data privacy,
intellectual property, trade secret, fraud, and music performance
rights, in the country or territory where the Extreme Networks product
is used.
Preventing Toll Fraud
“Toll Fraud” is the unauthorized use of your telecommunications
system by an unauthorized party (for example, a person who is not a
corporate employee, agent, subcontractor, or is not working on your
company's behalf). Be aware that there can be a risk of Toll Fraud
associated with your system and that, if Toll Fraud occurs, it can
result in substantial additional charges for your telecommunications
services.
Security Vulnerabilities
Information about Extreme Networks’ security support policies can be
found in the Global Technical Assistance Center Knowledgebase at
https://gtacknowledge.extremenetworks.com/.
Downloading Documentation
For the most current versions of Documentation, see the Extreme
Networks Support website: http://
documentation.extremenetworks.com, or such successor site as
designated by Extreme Networks.
Contact Extreme Networks Support
See the Extreme Networks Support website:http://
www.extremenetworks.com/support for product or Hosted Service
notices and articles, or to report a problem with your Extreme
Networks product or Hosted Service. For a list of support telephone
numbers and contact addresses, go to the Extreme Networks
Support website:http://www.extremenetworks.com/support/contact/
(or such successor site as designated by Extreme Networks), scroll
to the bottom of the page, and select Contact Extreme Networks
Support.
Contact Avaya Support
See the Avaya Support website: https://support.avaya.com for
product or Hosted Service notices and articles, or to report a problem
with your Avaya product or Hosted Service. For a list of support
telephone numbers and contact addresses, go to the Avaya Support
website: https://support.avaya.com (or such successor site as
designated by Avaya), scroll to the bottom of the page, and select
Contact Avaya Support.
Trademarks
The trademarks, logos and service marks (“Marks”) displayed in this
site, the Documentation, Hosted Service(s), and product(s) provided
by Extreme Networks are the registered or unregistered Marks of
Extreme Networks, Inc., its affiliates, its licensors, its suppliers, or
other third parties. Users are not permitted to use such Marks without
prior written consent from Extreme Networks or such third party
which may own the Mark. Nothing contained in this site, the
Documentation, Hosted Service(s) and product(s) should be
construed as granting, by implication, estoppel, or otherwise, any
license or right in and to the Marks without the express written
permission of Extreme Networks or the applicable third party.
Extreme Networks is a registered trademark of Extreme Networks,
Inc.
All non-Extreme Networks trademarks are the property of their
respective owners. Linux® is the registered trademark of Linus
Torvalds in the U.S. and other countries.

Contents
Chapter 1: Preface.................................................................................................................... 7
Purpose.................................................................................................................................. 7
Training.................................................................................................................................. 7
Providing Feedback to Us........................................................................................................ 7
Getting Help............................................................................................................................ 7
Extreme Networks Documentation............................................................................................ 8
Subscribing to service notifications........................................................................................... 9
Chapter 2: New in this document.......................................................................................... 10
Chapter 3: Fundamentals....................................................................................................... 11
System connection................................................................................................................ 11
System Logon....................................................................................................................... 12
Secure and nonsecure protocols............................................................................................ 13
Out-of-band management...................................................................................................... 14
New unit Quick Configuration................................................................................................. 16
Password encryption............................................................................................................. 16
Quick Start............................................................................................................................ 16
Enterprise Device Manager.................................................................................................... 17
Chapter 4: Connecting and configuring the switch............................................................. 21
Connecting a terminal to the switch......................................................................................... 21
Configuring the switch........................................................................................................... 22
Configuring Quick Start using CLI..................................................................................... 22
Configuring Quick Start using EDM................................................................................... 24
Configuring the terminal......................................................................................................... 25
Configuring BootP on the current instance of the switch or server.............................................. 26
Configuring diagnostics quick mode........................................................................................ 27
Setting user access limitations using CLI................................................................................. 27
Configuring multiple local read-write (RW) and read-only (RO) users accounts..................... 28
Enabling and disabling passwords.................................................................................... 29
Setting user access limitations using Enterprise Device Manager.............................................. 29
Configuring the console password using EDM................................................................... 30
Configuring the web and telnet password using EDM......................................................... 31
Configuring the CLI banner.................................................................................................... 32
Configuring system identification............................................................................................ 34
Enabling logging.................................................................................................................... 36
Configuring Simple Network Time Protocol.............................................................................. 36
Configuring real-time clock..................................................................................................... 37
Configuring local time zone.................................................................................................... 38
Configuring the clock............................................................................................................. 40
Configuring a static route....................................................................................................... 40
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 5

Enabling remote access......................................................................................................... 42
Using telnet to log on to the device......................................................................................... 42
Enabling the web server management interface....................................................................... 43
Accessing the switch through the web interface....................................................................... 43
Enabling or disabling Quick Configuration............................................................................... 44
Recording a Quick Configuration............................................................................................ 45
Configuring a VLAN using CLI................................................................................................ 46
Configuring VLAN using EDM................................................................................................ 49
Installing a license file............................................................................................................ 52
Saving the configuration......................................................................................................... 53
Storing the configuration files................................................................................................. 54
Chapter 5: Configuring management IP addresses using CLI........................................... 57
Configuring an in-band management IP address...................................................................... 57
Obtaining an in-band management IP address automatically.................................................... 59
Displaying in-band management information........................................................................... 59
Configuring an out-of-band management IPv4 address............................................................ 60
Displaying out-of-band management information...................................................................... 62
Configuring a management route............................................................................................ 63
Configuring an in-band management IPv6 address.................................................................. 64
Displaying in-band IPv6 management information.................................................................... 65
Configuring an out-of-band management IPv6 address............................................................ 66
Displaying out-of-band management IPV6 information............................................................. 69
Enabling or disabling the out-of-band management port........................................................... 71
Setting in-band management IP address parameters from the ip.cfg file on a USB device........... 71
Configuring a Domain Name Server........................................................................................ 74
Resolving domain names to IP addresses............................................................................... 74
Clearing the IP address ......................................................................................................... 75
Setting the in-band default IP gateway address........................................................................ 76
Deleting the in-band default IP gateway address...................................................................... 77
Chapter 6: Configuring management IP addresses using EDM......................................... 78
Configuring out-of-band management using EDM.................................................................... 78
Chapter 7: Verification............................................................................................................ 81
Pinging an IP device.............................................................................................................. 81
Verifying the software release................................................................................................. 81
Displaying local alarms.......................................................................................................... 82
Contents
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 6

Chapter 1: Preface
Purpose
This document provides basic instructions to install the hardware and perform basic configuration on
the following platforms:
• Extreme Networks Ethernet Routing Switch 4900 Series
• Extreme Networks Ethernet Routing Switch 5900 Series
Examples and network illustrations in this document may illustrate only one of the supported
platforms. Unless otherwise noted, the concept illustrated applies to all supported platforms.
Training
Ongoing product training is available. For more information or to register, you can access the Web
site at www.extremenetworks.com/education/.
Providing Feedback to Us
We are always striving to improve our documentation and help you work better, so we want to hear
from you! We welcome all feedback but especially want to know about:
• Content errors or confusing or conflicting information.
• Ideas for improvements to our documentation so you can find the information you need faster.
• Broken links or usability issues.
If you would like to provide feedback to the Extreme Networks Information Development team about
this document, please contact us using our short online feedback form. You can also email us
directly at [email protected]
Getting Help
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 7

Product purchased from Extreme Networks
If you purchased your product from Extreme Networks, use the following support contact information
to get help.
If you require assistance, contact Extreme Networks using one of the following methods:
•GTAC (Global Technical Assistance Center) for Immediate Support
- Phone: 1-800-998-2408 (toll-free in U.S. and Canada) or +1 408-579-2826. For the support
phone number in your country, visit: www.extremenetworks.com/support/contact
or model number in the subject line.
•GTAC Knowledge – Get on-demand and tested resolutions from the GTAC Knowledgebase, or
create a help case if you need more guidance.
•The Hub – A forum for Extreme customers to connect with one another, get questions
answered, share ideas and feedback, and get problems solved. This community is monitored
by Extreme Networks employees, but is not intended to replace specific guidance from GTAC.
•Support Portal – Manage cases, downloads, service contracts, product licensing, and training
and certifications.
Before contacting Extreme Networks for technical support, have the following information ready:
• Your Extreme Networks service contract number and/or serial numbers for all involved Extreme
Networks products
• A description of the failure
• A description of any action(s) already taken to resolve the problem
• A description of your network environment (such as layout, cable type, other relevant
environmental information)
• Network load at the time of trouble (if known)
• The device history (for example, if you have returned the device before, or if this is a recurring
problem)
• Any related RMA (Return Material Authorization) numbers
Product purchased from Avaya
If you purchased your product from Avaya, use the following support contact information to get help.
Go to the Avaya Support website at http://support.avaya.com for the most up-to-date
documentation, product notices, and knowledge articles. You can also search for release notes,
downloads, and resolutions to issues. Use the online service request system to create a service
request. Chat with live agents to get answers to questions, or request an agent to connect you to a
support team if an issue requires additional expertise.
Extreme Networks Documentation
To find Extreme Networks product guides, visit our documentation pages at:
Preface
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 8

Current Product Documentation www.extremenetworks.com/documentation/
Archived Documentation (for previous
versions and legacy products)
www.extremenetworks.com/support/documentation-
archives/
Release Notes www.extremenetworks.com/support/release-notes
Open Source Declarations
Some software files have been licensed under certain open source licenses. More information is
available at: www.extremenetworks.com/support/policies/software-licensing.
Subscribing to service notifications
Subscribe to receive an email notification for product and software release announcements,
Vulnerability Notices, and Service Notifications.
About this task
You can modify your product selections at any time.
Procedure
1. In an Internet browser, go to http://www.extremenetworks.com/support/service-notification-
form/ .
2. Type your first and last name.
3. Type the name of your company.
4. Type your email address.
5. Type your job title.
6. Select the industry in which your company operates.
7. Confirm your geographic information is correct.
8. Select the products for which you would like to receive notifications.
9. Click Submit.
Subscribing to service notifications
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 9

Chapter 2: New in this document
There are no feature changes in this release.
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 10

Chapter 3: Fundamentals
Provisioning follows hardware installation.
The Quick Start Configuration for Ethernet Routing Switch 4900 and 5900 Series includes the
minimum, but essential, configuration steps to:
• Provide a default, starting point configuration
• Establish a management interface
• Establish basic security on the node
The shipment includes the following:
• An installation kit
• A foldout poster
For more information about hardware specifications and installation procedures, see Installing
Ethernet Routing Switch 5900 Series or Installing Ethernet Routing Switch 4900 Series.
For more information about how to configure security, see Configuring Security on Ethernet Routing
Switch 4900 and 5900 Series.
To download and print selected technical publications and release notes directly from the Internet,
go to https://extremeportal.force.com.
System connection
Use the console cable to connect the terminal to the switch console port. The console cable and
connector must match the console port on the switch (DB-9 or RJ-45, depending on your model).
The following are the default communication protocol settings for the console port:
• 9600 baud
• 8 data bits
• 1 stop bit
• No parity
• No flow control
• VT100 or VT100/ANSI Terminal Protocol
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 11

To use the console port, you need the following equipment:
• A terminal or TeleTypewriter (TTY)-compatible terminal, or a portable computer with a serial
port and terminal-emulation software.
• An Underwriters Laboratories (UL)-listed straight-through or null modem RS-232 cable with a
female DB-9 connector for the console port on the switch. The other end of the cable must use
a connector appropriate to the serial port on your computer or terminal.
You must shield the cable that connects to the console port to comply with emissions regulations
and requirements.
System Logon
After the platform boot sequence is complete, a logon prompt appears. The following table shows
the default values for logon and password for console and Telnet sessions.
Note:
With enhanced secure mode enabled, the person in the role-based authentication level of
security administrator configures the login and password values for the other role-based
authentication levels. The security administrator initially logs on to the switch using the default
login as admin and the default password as password.
After the initial login, the switch prompts the security administrator to create a new security
administrator account and password. The default account named admin is removed and during
the first login, security administrator must change the password of the newly created account.
The administrator then configures default login and password for the other users based on the
role-based authentication levels of the user. For more information, see Configuring Security on
Ethernet Routing Switch 4900 and 5900 Series.
Note:
Enhanced secure mode is a boot mode operation. By default, enhanced secure mode is
disabled. The switch must be restarted after the feature is enabled or disabled in order to apply
the new setting.
Configurations are not transferable between operating modes with enhanced secure mode
enabled or enhanced secure mode disabled. The switch resets to default configuration when the
modes of operation are switched.
For more information about enhanced secure mode, see Configuring Security on Ethernet
Routing Switch 4900 and 5900 Series.
Fundamentals
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 12

Table 1: Access levels and default logon values
Access level Description Default Logon Default Password
Read-only Permits view-only configuration
and status information. Is
equivalent to Simple Network
Management Protocol (SNMP)
read-only community access.
RO user
Read/write View and change configuration
and status information across the
switch. You can change security
and password settings. This
access level is equivalent to
SNMP read/write community
access.
RW secure
Secure and nonsecure protocols
The following table describes the secure and nonsecure protocols that the switch supports.
Table 2: Secure and nonsecure protocols
Nonsecure protocols Default status Equivalent secure
protocols
Default status
FTP Disabled SCP Disabled
Telnet Enabled SSH v1, v2
You should use SSHv2
instead of SSHv1.
Disabled
SNMPv1, SNMPv2 Enabled SNMPv3
You must load the
DES/AES image on the
platform to use SNMPv3.
For more information,
see Configuring Security
on Ethernet Routing
Switch 4900 and 5900
Series
Disabled
Rlogin Disabled Secure SHell (SSH) v1,
v2
Disabled
HTTP Disabled HTTPS Enabled
Table continues…
Secure and nonsecure protocols
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 13

Nonsecure protocols Default status Equivalent secure
protocols
Default status
Important:
You should take the
appropriate security
precautions within
the network if you
use HTTP.
Note:
On SSH, by default, HTTP is enabled and HTTPS is disabled.
Out-of-band management
Out-of-band management allows IPv4 or IPv6 switch or stack management using the dedicated out-
of-band management port. Out-of-band management supports Telnet, Secure Shell (SSH) protocol,
Simple Network Management Protocol (SNMP), HTTP, or HTTPS, without requiring an in-band
management VLAN.
To configure out-of-band management, you assign an IP address to the RJ-45 Ethernet
management port for a switch or stack. You can configure a specific out-of-band management
default gateway, which takes precedence over the in-band default gateway. If you do not configure
an out-of-band management default gateway, the in-band default gateway is used for out-of-band
switch or stack management.
Note:
The out-of-band switch or stack management IP address must be different than the in-band IP
address and belong to a different subnet.
You can use the out-of-band management port to perform tasks such as downloading software
images and, when the SNMP server is enabled, access the Enterprise Device Manager (EDM)
interface for a switch or stack. To access EDM, you type the out-of-band management IP address in
the address bar of an Internet browser.
The out-of-band management port supports full auto negotiation, which enables management
stations to connect at any of the supported speeds or duplexes.
Stack mode
In stack mode, when you use the unit, switch, or stack parameters, the device assigns the IPv4 or
IPv6 address to the management stack. If a management stack IP address is in use, you can only
access the stack through the management port base unit. If the base unit goes down, the stack
management IP address becomes unreachable and the switch management IP address becomes
status up.
Fundamentals
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 14

Only the base unit allows all commands for out-of-band management. if the base unit leaves the
stack, the stack IP addresses and priveleges transfer to the temporary base unit (TBU). You need a
link in the management port TBU for the IP address to be operational.
On the base unit, if you configure the IP stack address, the base unit is the only active IP address in
the stack. On the non-base units, the IP addresses you configure only become active and reachable
if they become stand alone.
Stand alone mode
In stand alone mode, you assign the IPv4 or IPv6 address only to the switch. You can configure IP
addresses on every switch in the stack.
On the non-base units, the IP addresses you configure only become active and reachable if they
become stand alone.
Considerations and limitations
The following considerations and limitations apply when you configure and use out-of-band
management:
• You must configure all out-of-band management IP addresses for a stack to the same subnet.
• You can configure only one out-of-band management default gateway for each stack.
• You cannot automatically obtain an out-of-band management IP address using BootP or
DHCP.
• With out-of-band management you can issue the ping command from the out-of-band
management port on a stack base unit only.
• With out-of-band management you can only download a software image, or load a
configuration file from the base unit in a stack.
• You can access a management stack from the out-of-band management port on the stack base
unit only.
• You can configure both an in-band and out-of-band management IP:
- The out-of-band management default gateway takes precedence over the in-band
management default gateway.
- In Layer 2 mode, once an out-of-band management default gateway is configured, the in-
band management address is reachable only through a directly attached subnet for the
management VLAN.
- In Layer 3 mode, you must configure a management route to maintain connectivity with the
management network when you use out-of-band management.
• The MAC address for the out-of-band management port is created using the switch MAC
address plus the management offset. The management offset value for the primary out-of-band
management port is 0x300 and the management offset value for the secondary out-of-band
management port is 0x301.
• The out-of-band management port speed is automatically negotiated, however, you can
change it manually.
• The out-of-band management port does not support generation or processing of Autotopology
packets when an out-of-band management IP is configured.
• RADIUS authentication is not supported for the out-of-band management IP.
Out-of-band management
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 15

New unit Quick Configuration
You can use the new unit Quick Configuration feature to create a default configuration that applies
to any new unit joining the stack. Quick Configuration can configure the VLAN IDs, port speed,
PVID, tagging, and spanning tree groups for the new unit without resetting the stack.
Password encryption
The local passwords for the switch are stored in the configuration file.
Important:
For security reasons, you should configure the passwords to values other than the factory
defaults.
For more information about configuring passwords, see:
Using CLI and EDM on Ethernet Routing Switch 4900 and 5900 Series
Configuring Security on Ethernet Routing Switch 4900 and 5900 Series
Quick Start
You can use the install command in Command Line Interface (CLI) or the Quick Start menu in
Enterprise Device Manager (EDM) to configure the following:
• quick start VLAN
• in-band IP address and subnet mask
• default gateway
• management subnet mask, management IP address and management default gateway
• read-only and read-write community strings
• IPv6 in-band address and IPv6 default gateway
• management IPV6 address and management IPV6 default gateway
Note:
When you reset the switch to factory default, the setup utility does not start automatically. Use
the install command to start the setup utility. The default IP address of the switch is
192.168.1.1 if the switch does not get its IP address from another source.
Fundamentals
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 16

Enterprise Device Manager
Enterprise Device Manager (EDM) is an embedded graphical user interface (GUI) that you can use
to manage and monitor the platform through a standard web browser. EDM is embedded in the
switch software, and the switch operates as a web server, so you do not require additional client
software. For more information about EDM, see Using CLI and EDM on Ethernet Routing Switch
4900 and 5900 Series.
To manage the switch from a centralized location, using Configuration and Orchestration Manager
(COM) 2.0 and higher, you can use product-specific EDM plug-ins for COM include other features,
such as centralized syslog, trap viewer, troubleshooting and diagnostic tools.
For more information, or to purchase plug-ins, go to https://extremeportal.force.com.
Enterprise Device Manager access
EDM has been tested with the following web browsers:
Browser Version
Microsoft Internet Explore, Windows 7 11.0.9600.18537
Mozilla Firefox, Windows 7 52.0
Google Chrome, Windows 7 57.0.2987.98
Microsoft Edge, Windows 10 20.10240.17146.0
To access EDM, open http://<deviceip>/login.html or https://<deviceip>/login.html.
Important:
You must enable the web server from CLI to enable HTTP access to EDM. If you want HTTP
access to the device, you must also disable the web server secure-only option. The web server
secure-only option is enabled by default and allows HTTPS access to the device. Take the
appropriate security precautions within the network if you use HTTP.
If you experience issues while connecting to EDM, check the proxy settings. Proxy settings can
affect EDM connectivity to the switch. Clear the browser cache, and do not use a proxy when
connecting to the device.
Default user name and password
The following table contains the default user name and password that you can use to log on to the
switch using EDM. For more information about changing the passwords, see Configuring Security
on Ethernet Routing Switch 4900 and 5900 Series.
Enterprise Device Manager
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 17

Table 3: EDM default user name and password
User Name Password
admin password
Important:
The default passwords and community strings are documented and well known. You should
change the default passwords and community strings immediately after you first log on. For
more information about changing user names and passwords, see Configuring Security on
Ethernet Routing Switch 4900 and 5900 Series.
The following table describes access levels and default logon values when Enhanced Secure Mode
is disabled.
Table 4: Access levels and default logon values for EDM
Access level Default logon Default password
Read-only RO user
Read/write RW secure
Device Physical View
When you access EDM, the first panel in the work area displays a switch summary view. The tab
behind the summary view is a real-time physical view of the front panel of the device or stack called
the Device Physical View.
Objects in the Device Physical View are:
• Stand-alone switch, called a unit
• Switch stack, called a chassis
• Port
From the Device Physical View, you can:
• Determine the hardware operating status
• Select a switch or a port to perform management tasks on specific objects or view fault,
configuration, and performance information for specific objects
Click to select an object. The system outlines the object in yellow to indicate that the object is
selected.
The conventions on the device view are similar to the actual switch appearance except that LEDs in
Device Physical View do not blink. The LEDs and the ports are color-coded to reflect hardware
status. Green indicates the port is up and running; red indicates that the port is disabled.
From the menu bar, you can click the Device Physical View tab to open the Device Physical View
any time during a session.
Fundamentals
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 18

Figure 1: Device Physical View
EDM window
The EDM window contains the following parts:
1. Navigation tree—The navigation pane on the left side of the window that displays available
command folders in a tree format.
2. Navigation tree toolbar—The area displays buttons for common functions.
3. Menu bar—The area at the top of the window that displays primary and secondary tabs that
you accessed during the session; the tabs remain available until you close them.
4. Toolbar—The area just below the menu bar that provides quick access to the most common
operational commands such as Apply, Refresh, and Help.
5. Work area—The main area on the right side of the window that displays the dialog boxes
where you view or configure switch parameters.
6. Auto Complete Search — The area between the navigation tree toolbar and the navigation
tree where you can type a partial or complete search string to find menus. When you type
the search string, the navigation tree changes to display only the entries associated with
your search. To return to the full navigation tree display, click the x beside the Auto Complete
Search dialog box.
Enterprise Device Manager
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 19

Figure 2: EDM window
Fundamentals
December 2017 Quick Start Configuration for ERS 4900 and 5900 Series 20
Other manuals for 4900 Series
3
This manual suits for next models
1
Table of contents
Other ExtremeSwitching Network Router manuals