Foundry Networks
Page 1 of 87
Switch Administration
This chapter describes how to administer devices. It explains how to perform initial switch
configuration using the command-line-interface (configuring a single device, upgrading user’s
system software, protecting the device from outside attacks and more). The chapter includes the
following sections:
TABLE OF FIGURES .................................................................................................................................... 3
MANAGING THE MAC ADDRESS TABLE.............................................................................................. 4
O
VERVIEW
.................................................................................................................................................... 4
A
DDING
E
NTRIES TO THE
MAC
A
DDRESS
T
ABLE
......................................................................................... 4
MAC
A
DDRESS
T
ABLE
E
NTRY
T
YPES
........................................................................................................... 4
A
SSOCIATING
Q
O
S
P
ROFILES WITH A
MAC
A
DDRESS
T
ABLE
E
NTRY
........................................................... 6
F
ILTERING
MAC
A
DDRESSES
........................................................................................................................ 6
T
HE
MAC
A
DDRESS
T
ABLE
A
GING
T
IME
..................................................................................................... 6
MAC
B
ASED
D
O
S-A
TTACK
P
REVENTION
..................................................................................................... 6
MAC
A
DDRESS
D
EFAULT
C
ONFIGURATION
.................................................................................................. 6
C
ONFIGURING THE
MAC
A
DDRESS
T
ABLE
................................................................................................... 7
R
EMOVING
E
NTRIES FROM THE
MAC
A
DDRESS
T
ABLE
................................................................................ 8
D
ISPLAYING THE
MAC
A
DDRESS
T
ABLE
.................................................................................................... 10
S
ETTING AND
D
ISPLAYING THE
MAC
A
DDRESS
T
ABLE
A
GING
T
IME
......................................................... 13
A
DDITIONAL
MAC
A
DDRESS
C
OMMANDS
.................................................................................................. 15
D
ISABLING
L
EARNING OF
N
EW
MAC
A
DDRESSES
C
OMMANDS
.................................................................. 15
MANAGING THE ARP TABLE................................................................................................................. 18
O
VERVIEW
.................................................................................................................................................. 18
ARP
C
OMMANDS
........................................................................................................................................ 18
SCRIPT FILES SYSTEM ............................................................................................................................ 21
O
VERVIEW
.................................................................................................................................................. 21
S
CRIPT
F
ILE
S
YSTEM
D
EFAULT
C
ONFIGURATION
........................................................................................ 21
M
ANIPULATING AND
D
ISPLAYING THE
S
CRIPT
F
ILES
S
YSTEM
.................................................................... 22
FILE SYSTEM .............................................................................................................................................. 29
O
VERVIEW
.................................................................................................................................................. 29
F
ILE
S
YSTEM
D
EFAULT
C
ONFIGURATION
.................................................................................................... 29
C
ONFIGURING AND
D
ISPLAYING THE
S
YSTEM
L
OADER
............................................................................... 30
DOWNLOADING AND UPLOADING THE SOFTWARE IMAGE AND RELOAD COMMANDS . 36
D
OWNLOADING THE
A
PPLICATION
S
OFTWARE
I
MAGE TO THE
S
WITCH
U
SING
TFTP.................................. 36
U
PLOADING THE
S
OFTWARE
I
MAGE
U
SING
TFTP ....................................................................................... 37
D
OWNLOADING
/U
PLOADING
S
OFTWARE
I
MAGES
C
OMMANDS
................................................................... 38
D
OWNLOADING AND
U
PLOADING
C
ONFIGURATION
F
ILES
U
SING
TFTP ..................................................... 40
C
OMMANDS FOR
D
OWNLOADING AND
U
PLOADING
C
ONFIGURATION
F
ILES
............................................... 41
REBOOTING OF THE SWITCH............................................................................................................... 45
N
ORMAL
S
WITCH
R
EBOOT
.......................................................................................................................... 45
BOOT LOADER ........................................................................................................................................... 46
L
OADER
D
EFAULT
C
ONFIGURATION
........................................................................................................... 46
T
HE
S
WITCH
L
OADER
S
OFTWARE
R
ELATED
C
OMMANDS
............................................................................ 47
I
NFORMATION
D
ISPLAY
C
OMMANDS
........................................................................................................... 48
T
HE
L
OADER
C
ONFIGURATION
C
OMMANDS
................................................................................................ 49