Nokia ESB26 User manual

©2004 by Nokia
Nokia
ESB26 GigabitEthernet Switch
User Guide

Document History
ISSUE DATE
ISSUED
COMMENTS
MN700004 Rev 01 15 Jan 2004 First draft.

Table of Contents
PREFACE.................................................................................................................................................. A
1. INTRODUCTION..............................................................................................................................1
OVERVIEW........................................................................................................................................1
SPECIFICATIONS..............................................................................................................................3
2. GETTING STARTED .......................................................................................................................6
OVERVIEW........................................................................................................................................6
UNPACKING...................................................................................................................................... 6
FRONT PANEL ..................................................................................................................................6
USING THE CLI TO CONFIGURE THE SWITCH..........................................................................7
PLANNING THE CONFIGURATION ..............................................................................................9
BASIC CLI OPERATING CONVENTIONS .....................................................................................9
SPECIAL KEYS.................................................................................................................................. 9
CLI MODES......................................................................................................................................10
MESSAGES ......................................................................................................................................11
GETTING SYSTEM HELP ..............................................................................................................12
USING THE LIST COMMAND.......................................................................................................12
COMMAND HISTORY....................................................................................................................12
USING TELNET............................................................................................................................... 12
CONFIGURING THE DEVICE'S IP PARAMETERS..................................................................... 13
GENERAL COMMANDS ................................................................................................................14
VIEW MODE AND PRIVILEGED MODE .....................................................................................14
CONFIGURE MODE........................................................................................................................18
3. CONFIGURING A TELNET CONNECTION .............................................................................20
INTRODUCTION .............................................................................................................................20
CONFIGURING A TELNET SESSION........................................................................................... 20
SWITCHING BETWEEN SESSIONS..............................................................................................24
4. USER PRIVILEGE LEVELS .........................................................................................................25
INTRODUCTION .............................................................................................................................25
SUPPORTED STANDARDS, MIBS AND RFCS............................................................................27
DEFAULT USER PRIVILEGE LEVELS CONFIGURATION.......................................................27
CONFIGURING AND DISPLAYING USER PRIVILEGES...........................................................27
5. ETHERNET INTERFACE CONFIGURATION..........................................................................30
INTRODUCTION .............................................................................................................................30
SUPPORTED STANDARDS, MIBS AND RFCS............................................................................31
DEFAULT FAST AND GIGA ETHERNET PORTS CONFIGURATION .....................................31
CONFIGURING AND DISPLAYING FAST AND GIGA ETHERNET PORTS ...........................32
RELATED COMMANDS.................................................................................................................44
6. PORT SECURITY ...........................................................................................................................45
INTRODUCTION .............................................................................................................................45
CONFIGURING AND DISPLAYING PORT SECURITY SETTINGS ..........................................45
7. LINK AGGREGATION GROUPS (LAGS)..................................................................................49
INTRODUCTION .............................................................................................................................49
FEATURE OVERVIEW ...................................................................................................................50
SUPPORTED STANDARDS, MIBS AND RFCS............................................................................52
PREREQUISITES .............................................................................................................................53

DEFAULT LINK AGGREGATION CONFIGURATION ............................................................... 53
CONFIGURING AND DISPLAYING LAGS..................................................................................54
CONFIGURATION EXAMPLES.....................................................................................................58
8. TRAFFIC MONITORING..............................................................................................................66
INTRODUCTION .............................................................................................................................66
FEATURE OVERVIEW ...................................................................................................................66
SUPPORTED STANDARDS, MIBS AND RFCS............................................................................69
PREREQUISITES .............................................................................................................................69
DEFAULT TRAFFIC MONITORING CONFIGURATION............................................................69
CONFIGURING AND DISPLAYING MONITOR SESSION......................................................... 70
CONFIGURATION EXAMPLES.....................................................................................................71
9. RESILIENT LINK........................................................................................................................... 73
INTRODUCTION .............................................................................................................................73
CONFIGURING AND DISPLAYING A RESILIENT LINK.......................................................... 73
10. SNMP SERVER CONFIGURATION............................................................................................ 81
INTRODUCTION .............................................................................................................................81
CONFIGURING AND DISPLAYING THE SNMP SERVER SETTINGS..................................... 81
11. FORWARDING DATABASE (FDB) ...........................................................................................104
INTRODUCTION ...........................................................................................................................104
MAC-TABLE ENTRY TYPES.......................................................................................................104
HOW ENTRIES ARE ADDED TO THE FDB............................................................................... 105
CONFIGURING AND DISPLAYING FDB SETTINGS...............................................................105
DESCRIPTION OF COMMANDS................................................................................................. 105
12. SPANNING TREE PROTOCOL (STP)...................................................................................... 110
INTRODUCTION ...........................................................................................................................110
CONFIGURING AND DEBUGGING STP.................................................................................... 110
DISPLAYING PORT SPANNING-TREE TOPOLOGY SETTINGS............................................ 117
13. RAPID SPANNING TREE PROTOCOL (RSTP) ......................................................................121
INTRODUCTION ...........................................................................................................................121
SELECTION OF THE ROOT BRIDGE AND ROOT PORT......................................................... 122
SELECTION OF THE DESIGNATED BRIDGE AND DESIGNATED PORT............................ 122
CHANGING PORT STATES .........................................................................................................123
CONFIGURING AND DEBUGGING RSTP ................................................................................. 124
DISPLAYING PORT RAPID-SPANNING-TREE TOPOLOGY SETTINGS...............................134
14. MULTIPLE SPANNING TREE PROTOCOL (MSTP)............................................................. 139
INTRODUCTION ...........................................................................................................................139
FEATURE OVERVIEW .................................................................................................................140
SUPPORTED STANDARDS, MIBS AND RFCS.......................................................................... 147
PREREQUISITES ...........................................................................................................................148
DEFAULT MSTP CONFIGURATION ..........................................................................................148
CONFIGURING AND DISPLAYING MSTP ................................................................................149
CONFIGURATION EXAMPLES...................................................................................................173
15. GARP MULTICAST REGISTRATION PROTOCOL (GMRP) ..............................................186
INTRODUCTION ...........................................................................................................................186
FEATURE OVERVIEW .................................................................................................................186
SUPPORTED STANDARDS, MIBS AND RFCS.......................................................................... 187
PREREQUISITES ...........................................................................................................................187
DEFAULT GMRP CONFIGURATION .........................................................................................187
CONFIGURING AND DISPLAYING GMRP ............................................................................... 188
RELATED COMMANDS............................................................................................................... 189
16. GARP VLAN REGISTRATION PROTOCOL (GVRP)............................................................190

INTRODUCTION ...........................................................................................................................190
CONFIGURING AND DISPLAYING GVRP SETTINGS ............................................................190
17. VIRTUAL LANS (VLANS)........................................................................................................... 194
INTRODUCTION ...........................................................................................................................194
BENEFITS OF USING VLANS .....................................................................................................194
VLAN TYPES................................................................................................................................. 194
USES OF TAGGED VLANS..........................................................................................................195
ASSIGNING A VLAN TAG...........................................................................................................196
DESCRIPTION OF COMMANDS................................................................................................. 197
18. QUALITY OF SERVICE ..............................................................................................................209
INTRODUCTION ...........................................................................................................................209
FEATURE OVERVIEW .................................................................................................................209
SUPPORTED STANDARDS, MIBS AND RFCS.......................................................................... 216
DEFAULT QOS CONFIGURATION ............................................................................................216
CONFIGURING QUALITY OF SERVICE FEATURES ..............................................................218
RELATED COMMANDS............................................................................................................... 233
19. DHCP CLIENT ..............................................................................................................................234
DHCP OVERVIEW ........................................................................................................................234
THE ESB26 STARTUP PROCESS ................................................................................................235
THE DHCP NEGOTIATION PROCESS........................................................................................236
CONFIGURING THE DHCP CLIENT ..........................................................................................239
CONFIGURATION EXAMPLE.....................................................................................................242
20. IGMP SNOOPING......................................................................................................................... 243
INTRODUCTION ...........................................................................................................................243
JOINING A MULTICAST GROUP ............................................................................................... 243
LEAVING A MULTICAST GROUP .............................................................................................243
IMMEDIATE-LEAVE PROCESSING........................................................................................... 244
IGMP SNOOPING COMMANDS.................................................................................................. 244
21. MULTICAST VLAN REGISTRATION (MVR) ........................................................................ 255
INTRODUCTION ...........................................................................................................................255
DESCRIPTION OF COMMANDS................................................................................................. 256
22. TRANSPARENT LAN SERVICES (TLS)...................................................................................265
INTRODUCTION ...........................................................................................................................265
FEATURE OVERVIEW .................................................................................................................265
SUPPORTED STANDARDS, MIBS AND RFCS.......................................................................... 266
PREREQUISITES ...........................................................................................................................267
DEFAULT TLS CONFIGURATION ............................................................................................. 267
CONFIGURING AND DISPLAYING TLS ...................................................................................267
23. SOFTWARE UPGRADE AND REBOOT OPTIONS................................................................ 272
OVERVIEW....................................................................................................................................272
DESCRIPTION OF COMMANDS................................................................................................. 272
24. FILE SYSTEM FOR CONFIGURATION SCRIPT FILES ......................................................282
INTRODUCTION ...........................................................................................................................282
SCRIPT-FILE COMMANDS..........................................................................................................282
25. STATUS MONITORING, STATISTICS AND GENERAL COMMANDS .............................289
OVERVIEW....................................................................................................................................289
DESCRIPTION OF COMMANDS................................................................................................. 290
26. REMOTE MONITORING............................................................................................................304
INTRODUCTION ...........................................................................................................................304
FEATURE OVERVIEW .................................................................................................................304

SUPPORTED STANDARDS, MIBS AND RFCS.......................................................................... 305
STATISTICS MONITORING ........................................................................................................306
RMON ALARMS............................................................................................................................ 307
27. PERIODIC MONITORING .........................................................................................................312
INTRODUCTION ...........................................................................................................................312
FEATURE OVERVIEW .................................................................................................................312
SUPPORTED STANDARDS, MIBS AND RFCS.......................................................................... 314
DEFAULT PERIODIC MONITORING CONFIGURATION........................................................315
CONFIGURING AND DISPLAYING PERIODIC MONITORING ............................................. 316
CONFIGURATION EXAMPLES...................................................................................................326
RELATED COMMANDS............................................................................................................... 328
28. LOGGING SYSTEM TRAP MESSAGES TO THE NVRAM ..................................................329
INTRODUCTION ...........................................................................................................................329
CONFIGURING THE TRAP LEVEL FOR STORED SYSTEM MESSAGES............................. 329
CONFIGURING THE MESSAGE FORMAT ................................................................................329
NVRAM SYSTEM-TRAP LOGGING COMMANDS................................................................... 330
29. NVRAM CONFIGURATION HISTORY.................................................................................... 333
INTRODUCTION ...........................................................................................................................333
HISTORY LOG FORMAT AND GENERATION.........................................................................333
CONFIGURING HISTORY SETTINGS........................................................................................ 333
DISPLAYING THE CONFIGURATION HISTORY..................................................................... 334
30. CONFIGURING THE WATCHDOG FEATURES....................................................................337
OVERVIEW....................................................................................................................................337
ACCESSING WATCHDOG MODE ..............................................................................................337
CONFIGURING THE RESET-LOOP DETECTION FEATURE .................................................. 338
CONFIGURING THE SNMP REQUEST FAILURE DETECTION FEATURE...........................339
CONFIGURING THE APPLICATION SUSPENSION DETECTION FEATURE.......................340
DISPLAYING THE WATCHDOG CONFIGURATION...............................................................341
31. NTP CLIENT DESCRIPTION .....................................................................................................342
INTRODUCTION ...........................................................................................................................342
THE NTP TIMESERVER COMMANDS....................................................................................... 342
WHY USE NTP PROTOCOL ?...................................................................................................... 343
CONFIGURING AND DISPLAYING NTP SERVER SETTINGS...............................................343
MD5 AUTHENTICATION.............................................................................................................345
RUNNING THE NTP SERVER ..................................................................................................... 346
EXAMPLES ....................................................................................................................................347
CONFIGURATION EXAMPLE.....................................................................................................347
CONFIGURING DAYLIGHT SAVING TIME (DST) ..................................................................348
32. REMOTE AUTHENTICATION DIAL-IN USER SERVICE (RADIUS) ................................351
INTRODUCTION ...........................................................................................................................351
BINOS RADIUS FEATURES ........................................................................................................351
DESCRIPTION OF COMMANDS................................................................................................. 352
USING RADIUS TO CONFIGURE LOGIN AUTHENTICATION..............................................354
A RADIUS CONFIGURATION EXAMPLE .................................................................................355
33. SECURE SHELL (SSH) ................................................................................................................357
INTRODUCTION ...........................................................................................................................357
SOME SECURITY CONSIDERATIONS ......................................................................................357
COMMANDS FOR MANAGING THE SSH SERVER................................................................. 358
SUPPORTED CLIENTS .................................................................................................................359
SUPPORTED STANDARDS..........................................................................................................359
34. 802.1X PORT-BASED AUTHENTICATION .............................................................................360
INTRODUCTION ...........................................................................................................................360

FEATURE OVERVIEW .................................................................................................................360
SUPPORTED STANDARDS, MIBS AND RFCS.......................................................................... 363
DEFAULT 802.1X CONFIGURATION......................................................................................... 364
CONFIGURING AND DISPLAYING 802.1X............................................................................... 365
CONFIGURATION EXAMPLE.....................................................................................................376
RELATED COMMANDS............................................................................................................... 376
35. BUILT-IN SELF TEST (BIST).....................................................................................................378
OVERVIEW....................................................................................................................................378
STARTUP EXECUTION OF BIST ................................................................................................378
BIST COMMANDS ........................................................................................................................379
36. DIAGNOSTIC TESTS...................................................................................................................382
ESB26 DIAGNOSTICS-RELATED COMMANDS....................................................................... 382
THE DIAGNOSTICS-RELATED COMMANDS ..........................................................................382
37. DNS RESOLVER...........................................................................................................................390
INTRODUCTION ...........................................................................................................................390
FEATURE OVERVIEW .................................................................................................................390
SUPPORTED STANDARDS, MIBS AND RFCS.......................................................................... 391
DEFAULT DNS RESOLVER CONFIGURATION.......................................................................392
CONFIGURING AND DISPLAYING DNS RESOLVER............................................................. 392
CONFIGURATION EXAMPLE.....................................................................................................393
RELATED COMMANDS............................................................................................................... 393
APPENDIX: LOADER, SYSLOADER AND DUAL BOOT ................................................................. I
OVERVIEW.........................................................................................................................................I
LOADER..............................................................................................................................................I
SYSLOADER AND DUAL BOOT ..................................................................................................IX

MN700004 Rev 01 a
Preface
This guide provides the required information to setup and configure the ESB26 switch,
firmware version 3.3.0. It is intended for network administrators who are responsible for
installing and setting up network equipment. It assumes a basic working knowledge of the
following:
•Local area networks (LANs)
•Ethernet concepts
•Ethernet switching and bridging concepts
•Routing concepts
•Internet Protocol (IP) concepts
If the information in the Release Notes that are shipped with your unit differs from the
information in this guide, follow the Release Notes.
Conventions Used in This Guide
The syntax of CLI command lines, explained in "Basic CLI Operating Conventions" and the
further topics and discussed throughout this guide, is represented by the following general
format:
device-name>keyword(s) [parameter(s)] ... [keyword(s)] [parameter(s)]
OR
device-name[ (config ...)]#keyword(s) [parameter(s)]
... [keyword(s)] [parameter(s)]
where:
•The angle bracket (>) is the CLI prompt symbol in View mode.
•The pound symbol (#) is the CLI prompt symbol in all other modes.
•The left part, up to and including the prompt symbol represents the command prompt
displayed by the computer. In this part:
device-name stands for the name of the switch (e.g. ESB26).
The optional expression “(config)” or “(cfg ...)” – including the parentheses –
appears on the screen exactly as in the manual.
The part following the prompt symbol represents the users command. In this

Preface
MN700004 Rev 01
b
part:
> keyword(s), in boldface characters, stands for one or more standard CLI
command keywords. The first keyword may optionally be preceded by no
to indicate a negation of the command.
> parameter(s) may be one or more optional or requisite values, depending
on the requirements of the specific command. They are represented by
slanted characters.
> In this guide, keywords and parameters may be separated by vertical OR
bars (|). The OR bars indicate an exclusive-or choice among a group of
selectable entities separated by these symbols.
> Parentheses and braces may be used in this guide to enclose selectable
entities – for the purpose of clarification.
Acronyms Used in This Guide
L3 OSI Layer 3 requirements
DHCP Dynamic host configuration protocol
Downlink The Ethernet links connecting to equipment that perform host data processing.
GARP Generic Attribute Registration Protocol
GMRP Group Multicast Registration Protocol
GVRP GARP VLAN Registration Protocol
MAC Media Access Control
MIB Management information base
pps Packets per second
SNMP Simple network management protocol
STP Spanning Tree Protocol
RSTP Rapid Spanning Tree Protocol
Uplink The Ethernet links connecting to another switch or router.
UTP Unshielded twisted pair
VLAN Virtual Local Area Network
10Base-T 10Mbit/s Ethernet link that works over standard UTP copper cabling.

Preface
MN700004 Rev 01
c
100Base-TX
1000Base-T
1000Base-SX
100Mbit/s Ethernet link that works over standard UTP copper cabling.
1000Mbit/s Ethernet link that works over standard UTP copper cabling.
1000Mbit/s Ethernet link that works over optical, 850nm multimode cabling.
Summary of Version 3.3.0 Features
The Version 3.3.0 includes the following features:
●VLANs (Virtual local area networks) including support for IEEE 802.1Q and IEEE
802.1p
●VLAN aggregation
●STP (Spanning Tree Protocol) (IEEE 802.1D)
●RSTP (Rapid Spanning Tree Protocol) (IEEE 802.1w)
●MSTP (Multiple Spanning Tree Protocol) (IEEE 802.1s)
●QoS (Quality of Service)
●IGMP snooping to control IP multicast traffic.
●GMRP (GARP Multicast Registration Protocol)
●GVRP (GARP VLAN Registration Protocol)
●MVR (Multicast VLAN Registration)
●Console CLI (Command-line Interface) connection
●Telnet CLI connection
●SNMP (Simple Network Management Protocol) v1, v2c and v3 support
●RMON (Remote Monitoring)
●Traffic mirroring for all ports
●DHCP Client
●Backpressure and flow control support
●802.3x flow control for full-duplex links
●Link Aggregation (LAG) for increased bandwidth without requiring expensive
hardware upgrade
●Link Aggregation Control Protocol (LACP) providing dynamic LAGs
●Console timeout value
●Remote logging
●Remote time synchronization protocol (rfc867, rfc868).
●SSH

Preface
MN700004 Rev 01
d
●RADIUS
●CLI user privilege levels
●Resilient link for port redundancy
●Script file system
●Up to 1.7 MB size of the configuration file
●More accurate CPU utilization measurement
●Inform requests for SNMPv2c
●MAC address per port in BPDU for xSTP
●Enhanced DHCP boot process:
●Startup configuration integrity check
●Option to save downloaded file to the internal Flash memory
●Image file upload
●Enhanced password security (passwords are saved in the internal Flash memory and
not in the running config, startup or script files.)
●Cable crossover support

MN700004 Rev 01 1
1. Introduction
Overview
ESB26 is an integrated Ethernet switch based on DX200 hardware platform. The ESB26
features a total of 26 Ethernet ports of types and placements as follows:
Port Placement Connector Traffic
20 full duplex 10/100Base
T/TX Ethernet ports
back panel AMP 2mm Z-pack
connectors compatible
downlink
2full duplex 10/100Base
T/TX Ethernet ports
front panel RJ45 downlink/uplink
21000Base-T ports front panel RJ45 downlink/uplink
21000Base-SX ports front panel LC uplink
ESB26 contains also one RS-232 interface (RJ45) on the front panel for management
purposes.
The two 1000Base-T ports support all the 10/100/1000 Mbit/s link speeds. Speed mixing is
supported, too, e.g. it is possible to use one of the 1000Base-T ports in gigabit mode while the
other runs in 100Mbit mode.
The intended use of the ESB26 is to collect the Ethernet links of different computer units and
preprocessor units of DX200-based network elements, and allow access to them from the
upper levels. The ESB26 can be used in all M98F DX200 based network elements. The
ESB26 can be assembled into a place of ESB20/ESB20-A by using the existing cabling.
NOTE
The ESB26 is designed to operate in forced cooling M98F only.
The two graphics below represent two examples of operational environments for the ESB26.
As presented, the ESB26s are used to collect traffic from/to different computer units and
preprocessor units and forward it towards 3rd party L3 switches. It is important to note that
VLAN-technology is used in order to divide the different units into several broadcast
domains. It must also be noted that redundant paths do exists and Rapid STP (as according to
IEEE 802.1w) is used in order to avoid loops.

1. Introduction
MN700004 Rev 01
2
OSR OSR
IPET
IPET IPET
IPET
TGSU TGSU
IPET-
cabinet
IPET-
cabinet
Legend:
Forwarding
Blocked
VLANs
Rapid-
STP
Rapid-
STP
3550
3550 3550 3550
Rapid-
STP
OSRs used as L2-
devices
ESB26 ESB26 ESB26 ESB26 ESB26 ESB26 ESB26 ESB26
ESB26 ESB26 ESB26 ESB26
3550 3550
GSR
GSR
Cisco 3550s
or ESB26s
Cisco 3550s
or ESB26s
Cisco 3550s
or ESB26s
Figure 1-1 Example of Operational Environment for the ESB26 with L2 OSRs
OSR OSR
IPET
IPET IPET
IPET
TGSU TGSU
IPET-cabinet IPET-cabine
t
Legend
Forwarding
Blocked
VLANs
Rapid-
STP
3550 3550 3550 3550
3550 3550
ESB26 ESB26 ESB26 ESB26 ESB26 ESB26 ESB26 ESB26
ESB26 ESB26 ESB26 ESB26
Rapid-
STP
OSRs used as L3-
devices
Cisco 3550s or
ESB26s (possible
with L3 software)
Cisco 3550s or
ESB26s (possible
with L3 software)
Cisco 3550s or
ESB26s (possible
with L3 software)
Figure 1-2 Example of Operational Environment for the ESB26 with L3 OSRs.

1. Introduction
MN700004 Rev 01
3
The switch is managed via BiNOSCommand Language Interface (CLI) commands typed in
by the user by either of the following means:
•By direct connection, through a VT-100 compatible terminal connected to the
console port on the unit’s front panel;
•Remotely, using telnet over a TCP/IP communication network.
Specifications
Compliance
• IEEE802.3
• IEEE802.1d
• IEEE802.3X
• IEEE802.1q
• IEEE802.1w
• IEEE802.1s
• IEEE802.3ad
Switching Characteristics
Bridging
Address table:
Forwarding Rate:
Internal Bandwidth (max):
Buffers Memory:
Priority Queuing:
Virtual LAN:
Per IEEE 802.1d / 802.1w /802.1s spanning tree.
16 K MAC address per switch.
148,800 packets-per-second maximum for 100Base ports.
1,488,000 packets-per-second maximum for 1000Base ports.
5.3 Gbps (Full Duplex).
32 Mbytes
8 Queues per port, provides CoS per 802.1p
Port Based VLAN per 802.1q.
Up to 4094 VLAN groups can be defined.
GVRP protocol support.
Port Aggregation: Up to 7 static or dynamic LAGs can be defined.
In-Band: SNMP, TELNET,
Supported MIBs: MIB-II, BRIDGE MIB (RFC-1493), PRIVATE MIB, RMON MIB (Group
I,2,3,9)

1. Introduction
MN700004 Rev 01
4
Local:
For initial configuration, EIA-232 protocol, RJ-45 console connector
on the front panel, VT100 compatible
Management
Software download: Via TFTP (Server application)
Monitoring: Port mirroring for sniffer connection.
Max. configuration file size: 1.7 MB
Indicators
General: Operation Indicator. A single two-color LED (Green/Red)
• Green: the unit is operational.
• Red: during power up and in faulty condition.
• Blinking orange: when no image software is loaded.
• Off: power is off.
Physical Characteristics
Dimensions: 233.4x220mm with PCB thickness of 1.6mm and spacing of 20.34mm (4T)
Supported chassis
models:
CC3C-ACC4C-ACM2C-ALASWC-AIPETC-A
Environmental Characteristics
Operating Temperature: According to Nokia Environmental Specification (Commercial Range
0-70°C)
Humidity: Complying to Nokia Environmental Specification
Power Characteristics
Voltage:
Power Consumption:
+3.3Vand +5V (±5% voltage tolerances)
Less than 25 W
Ex-Factory Default Settings
IP Address: 192.168.0.5

1. Introduction
MN700004 Rev 01
5
Subnet mask: 255.255.255.128
Default gateway: 192.168.0.10
Password: nokia
Telnet: enabled
SNMP: disabled
RMON: enabled
802.1p priority recognition: enabled
802.1q tagging: disabled on the default VLAN
Forwarding database aging
period:
300 seconds (5 minutes)
GVRP: disabled
GMRP: disabled
SSH: disabled
LACP: disabled
LAN ports status: enabled
Port auto negotiation: enabled
Port mirroring: disabled
VLANs: disabled
Rapid STP: disabled
DHCP: enabled
Hot-Swap
The card can be inserted and removed while power is applied to the IPA2800 chassis. Before
removing the card, press the Reset button twice within two seconds. This will disconnect
power from the card for 20 seconds. The LED will turn off, indicating that the card can be
safely removed.

MN700004 Rev 01 6
2. Getting Started
Overview
ESB26 installation consists of inserting the card into the appropriate slot in the system,
turning the unit power on, and setting the IP Address in order to enable remote management.
All other management procedures may be performed remotely via Terminal Interface
management applications that are integrated into the unit.
This chapter describes how to install the unit, perform initial setup, use Terminal Interface
management applications, and how to perform basic switch operations.
Unpacking
After unpacking:
•Verify that the ESB26 unit has not been damaged during shipment.
•It is recommended that you keep the shipping package until the unit has been
installed and verified as being fully operational. As all electronic devices with
static sensitive components, ESB26 should be handled with care.
Front Panel
SER1
OPR
RST
ETH2
ETH1
Operation indicator
Reset button
Serial
connector
1000Base T
ports
Open tabs outwards to insert or extract card
ETH4
ETH3
B A
ETH6
ETH5
1000Base SX
ports
10/100Base
T/TX ports
Figure 2-1 ESB26 Front Panel
Table 2-1 ESB26 Front Panel Components
ETH1, ETH2 Two 1000Base SX ports interface connectors

2. Getting Started
MN700004 Rev 01 7
ETH3, ETH4 Two 1000Base T ports interface connectors
ETH5, ETH6 Two 10/100Base T/TX ports interface connectors
OPR
Operation Indicator. A single two-color LED (Green/Red)
• Green: the unit is operational
• Red: during power up and in faulty condition.
• Blinking orange: when no image software is loaded.
• Off: power is off.
RST Local Reset and Hotswap button.
To perform Hotswap, press twice within two seconds before removing the card.
Power will be turned off for 20 seconds during which the card may be removed
safely.
SER1 RJ45 console connector used for initial configuration.
TX – Pin 2 (Going out of the switch)
RX – Pin 5 (Going into the switch)
GND – Pin 3
GND – Pin 4
Using the CLI to Configure the Switch
The configuration program uses a CLI (Command Line Interface) that enables you to start
using the switch quickly and without extensive background knowledge. It does this by
prompting you for the information required to perform basic configuration procedures.
Using the CLI, you will be able to do the following:
• Establish host names and interfaces
• Enable transparent Ethernet bridging
• Configure Layer 2 switch protocols (GVRP, GMRP, Spanning Tree, etc.)
• Configure VLANs
System parameters are stored in a non-volatile memory. They have to be set up only once
during initial setup.
Getting Started with the CLI
Configuration of the switch is done by connecting a VT-100 (or compatible terminal) to the
card RJ-45 (Console) connector.
The CLI operates automatically when you power on the switch. Before you start using the
CLI, you must do the following:

2. Getting Started
MN700004 Rev 01 8
Step 1. Insert the device into its chassis slot.
Step 2. Attach an RS-232 ASCII terminal to the RJ-45 (SER1) connector (See Figure 2-1).
Step 3. Configure the terminal to operate at:
• Emulation mode: VT-100 mode (default mode)
• 9600 bps
• 8 data bits
• 1 stop bit
• No parity
• No flow control
25 lines and 80 columns window size
Step 4. Establish a session with the unit and power on the unit. After a few seconds, the
following is displayed on the terminal screen:
Press any key to stop auto-boot...
0
Verifying validity of primary application.....OK
Start primary application...
BUILT-IN SELF TEST
------------------
CPU Core Test : Passed
CPU Notify RAM Test : Passed
CPU Interface Test : Passed
Testing Switch Core : Passed
On-board Power Test : Passed
////////////////////////////////////////////////////////////////////////
// //
// N O K I A //
// //
// //
// Switch model : NOKIA ESB26 //
// SW version : 3.2.89 ER created Dec 17 2003 - 11:32:40 //
// //
////////////////////////////////////////////////////////////////////////
User Access Verification
Password:
Step 5. Enter your password, which is nokia by default. The device-name> prompt is
displayed, allowing you to begin the configuration process.

2. Getting Started
MN700004 Rev 01 9
If the password has been lost or cannot be configured, please contact Nokia support.
Planning the Configuration
Before starting the configuration process, determine the following:
• The protocols you plan to use and their specific parameters
• The types of interfaces installed: Ethernet or Serial
• Whether or not you plan to use bridging
Basic CLI Operating Conventions
Entering commands at the CLI prompt and then pressing the Return key initiates CLI
commands. Based on user input, the CLI returns various data in response.
You type all commands on one line and then press <Enter>. The CLI response is displayed on
your screen.
You can use abbreviated commands provided they are unique. For example, enter the letters
sho for the show command.
Certain commands display multiple screens with this prompt at the bottom of the screen:
--More--
Press on the space bar to continue.
Special Keys
Table 2-2 summarizes special keys available at the CLI prompt.
Table 2-2 CLI Entry Keys
Key Action
Backspace Erase characters
Ctrl-U Delete line
Ctrl-W Erase the last word
Exit Escape current mode and go to previous mode
Table of contents
Other Nokia Network Router manuals

Nokia
Nokia M1122 Use and care manual

Nokia
Nokia MulteFire User manual

Nokia
Nokia M10 User manual

Nokia
Nokia WiFi User manual

Nokia
Nokia WiFi Beacon User manual

Nokia
Nokia RoofTop R242 User manual

Nokia
Nokia 7705 SAR-W Series User manual

Nokia
Nokia G-240W-C User manual

Nokia
Nokia IP40 - Satellite Unlimited - Security... User manual

Nokia
Nokia ONT User manual
Popular Network Router manuals by other brands

Asus
Asus RT-AX3000 quick start guide

ANTAIRA
ANTAIRA LMP-0702G-SFP-V2 Series Quick installation guide

Kodak
Kodak Carousel S-AV B instruction manual

D-Link
D-Link DSL-G2452GR-5G Quick installation guide

ZyXEL Communications
ZyXEL Communications AMG1302-T11C Configuration guide

TP-Link
TP-Link Deco WE10800 user manual