Manual Juniper Networks EX2500

102 pages 1.05 mb
Download

Go to site of 102

Summary
  • Juniper Networks EX2500 - page 1

    Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-200 0 www.juniper.net Part Number: 530-029705-01, Revision 2 Juniper Networks EX2500 Ethernet Switch Configuration Guide Release 3.0 ...

  • Juniper Networks EX2500 - page 2

    ii  Juniper Networks, the Juniper Netw orks logo, JUNOS, NetScreen, ScreenOS, and Steel-Belted Radius are reg istered trademarks of J unip er Networks, Inc. in the United States and other coun tries. JUNO Se is a trademark of J uniper Networ ks, Inc. All other trademarks, service mark s, reg istered tradem arks, or registered service marks are t ...

  • Juniper Networks EX2500 - page 3

    Table of Contents  iii Table of Contents About This Guide xi Objectives ............... ............. ............. ................ ............. ............. ................ .... xi Audience .............. ............. ............. ................ ............. ............. ................ ....... xi Supported Pl atforms ............... ...

  • Juniper Networks EX2500 - page 4

    iv  Table of Contents EX2500 Ethernet Switch Configuration Guide TACACS+ Authen tication . ................ ............. ............. ................ ............. 14 How TACACS+ Authentication Wo rks .............. ............. ................ ... 14 TACACS+ Authenticatio n Features in the EX2500 Switch ...... .......... 14 Command Authori ...

  • Juniper Networks EX2500 - page 5

    Table of Contents Table of Contents  v PVRST Configu ration Guidelines ....... ............. ............. ................ ............. 38 Configuring PV RST .................. ............. ............ ................. ............ .......... 38 Multiple Spa nning Tre e Protocol ................. ............ ............. ............. ... ...

  • Juniper Networks EX2500 - page 6

    vi  Table of Contents EX2500 Ethernet Switch Configuration Guide History MIB Object ID ....... ................ ............. ............. ................ ............. 67 Configuring RMON History ...... ................ ............. ................ ............. ...... 67 RMON Group 3—Alarms ...... ............. ................ ......... ...

  • Juniper Networks EX2500 - page 7

    List of Figures  vii List of Figures Figure 1: Default VL AN Settings ............. ............. ................ ............. ............. 24 Figure 2: Port-Based VLAN Assign ment .............. ................ ............. ............. 25 Figure 3: 802.1Q Tagging ( after Port-Based VLAN Assignment) ......... .......... 25 Figure 4: 802.1 ...

  • Juniper Networks EX2500 - page 8

    viii  List of Figures EX2500 Ethernet Switch Configuration Guide ...

  • Juniper Networks EX2500 - page 9

    List of Tables  ix List of Tables Table 1: Notice Icons ............ ............. ................ ............. ............. ............. ... xii Table 2: EX2500 Tex t and Synta x Conventions . ................ ............. ............. xii Table 3: EX2500 Ethern et Switch Do cumentation ....... ................ ............. .. xiii Table ...

  • Juniper Networks EX2500 - page 10

    x  List of Tables EX2500 Ethernet Switch Configuration Guide ...

  • Juniper Networks EX2500 - page 11

    Objectives  xi About This Guide This preface provides the fo llowing guidelines for using the Junip er Networks EX2500 Ethern et Switch Config uration Guide :  Objectives on page xi  Audience on page xi  Supported Platf orms on page xi  Documentation Conventions on page xii  List of Technical Publications on pag e xiii  Documen ...

  • Juniper Networks EX2500 - page 12

    EX2500 Ethernet Switch Configuration Guide xii  Documentation Conventions Documentation Conventions Table 1 describe s the notic e icons used i n this manual. Table 2 describes the EX2500 text and synt ax conventions. Table 1: Notice Icons Icon Meaning Description Informational note Indica tes important features or instructions. Caution Indicate ...

  • Juniper Networks EX2500 - page 13

    List of Technical Publications  xiii About This Guide List of Technical Publications Table 3 lists the docum entation supp or ting the EX2500 Ethernet Switch. All documentation for EX Series Ethernet S witches is available at http://www.juniper.n et/techpubs/ . Documentation Feedback We encourage you to provide feedback, co mments, and suggestio ...

  • Juniper Networks EX2500 - page 14

    EX2500 Ethernet Switch Configuration Guide xiv  Requesting Technical Support Self-Help Online Tools and Resources For quick and easy problem resolution, th e Ju niper N etworks online sel f-service portal—the Customer Suppo rt Center (C SC)—provide s the fo llow ing features:  Find CSC offerings: http://www.juniper. net/customers/supp ort ...

  • Juniper Networks EX2500 - page 15

    EX2500 Ethernet Switch Applications  1 Part 1 EX2500 Ethernet Switch Applications This configuration guide will help y ou p lan, implement, and administer EX2500 software. Where possible, each chapte r provides featur e overviews, usage examples, and configuration instructions.  “Accessing the Switch” on page 3 desc ribes how to access th ...

  • Juniper Networks EX2500 - page 16

    EX2500 Ethernet Switch Configuration Guide 2  EX2500 Ethernet Switch Applications ...

  • Juniper Networks EX2500 - page 17

    Configuring the Management Interface  3 Chapter 1 Accessing the Switch The EX2500 software provides a means fo r accessing, co nfiguring, and viewing information and statistics abou t the EX 2500 E thernet Sw it ch. This chapter discusses different me thods of accessing the switch an d wa ys to secure the switch for remote administra tors:  C ...

  • Juniper Networks EX2500 - page 18

    EX2500 Ethernet Switch Configuration Guide 4  Dynamic Host Configuration Protocol 3. Configure the management IP address, subnet mask, and default gateway. ex2500(config)# interface ip-mgmt addr ess 10.10.10.2 ex2500(config)# interface ip-mgmt ne tmask 255.255.255.0 ex2500(config)# interface ip-mgmt en able ex2500(config)# interface ip-mgmt gate ...

  • Juniper Networks EX2500 - page 19

    Using Telnet  5 Chapter 1: Accessing the Switch DHCP is an extension of another netw or k IP management p rotocol, Boot strap Protocol (BOOTP), with an additiona l capability of being able to allocate reusable network addresses and configuration para meters for client operation. Built on the client/serv er model, DHCP allo ws hosts or clients on ...

  • Juniper Networks EX2500 - page 20

    EX2500 Ethernet Switch Configuration Guide 6  Using the EX2500 Web Device Manager By default, EX2500 Web Devi ce Manager access is enabled on the switch. Configuring EX2500 Web Devi ce Manager Access via HTTP By default, EX2500 Web Device Manag er access via HTTP is enabled . Use the following command to disable or enab le EX2500 Web D evice Man ...

  • Juniper Networks EX2500 - page 21

    Using SNMP  7 Chapter 1: Accessing the Switch The EX2500 Web Device Manag er is organized at a high level as fo llows: Context tabs —These tabs allow you to select the type of ac tion you w ish to perform. The Con figure tab provides access to the configuration elements for th e entire switch. The Monitor tab provides access to the switch stat ...

  • Juniper Networks EX2500 - page 22

    EX2500 Ethernet Switch Configuration Guide 8  Using SNMP SNMPv3 SNMPv3 is an enhanced version of the Simple Network Manag ement Protocol, approved by the Internet Eng ineering Steering Group in March, 2002. SNMPv3 contains additional security and authentica tion fea tures that provide data origin authentication, data integ rity checks, ti meline ...

  • Juniper Networks EX2500 - page 23

    Using SNMP  9 Chapter 1: Accessing the Switch 2. Configure a user acce ss group, along with the views the group may access. U se the access table to configure the grou p’s access level. Because the read view, write view, and notify view are all set to iso , the user type has access to all private and publ ic MIBs. ex2500(config)# snmp-server a ...

  • Juniper Networks EX2500 - page 24

    EX2500 Ethernet Switch Configuration Guide 10  Securing Access to the Switch SNMPv3 Trap Host Configuration To configure a user for SNMPv3 t raps, you can choose to send t he traps with b oth privacy and authentication, with authen tication o nly, or without privacy or authenticatio n. This is configured in the access table w ith the following c ...

  • Juniper Networks EX2500 - page 25

    Securing Access to the Switch  11 Chapter 1: Accessing the Switch RADIUS Authenticat ion and Authorization The EX2500 switch supports the RADIUS (Remote Authentication Dial-in User Service) method to authenticate and authorize remote administrators for managing the switch. This method is based on a client/server model. The Remote Access Server ( ...

  • Juniper Networks EX2500 - page 26

    EX2500 Ethernet Switch Configuration Guide 12  Securing Access to the Switch 3. If desired, you may change the defaul t UDP port number used to listen to RADIUS. The well-known port for RADIUS is 1812. ex2500(config)# radius-server port <UDP port number> 4. Configure th e number of retry attempts for contacting the RADIUS server, and the t ...

  • Juniper Networks EX2500 - page 27

    Securing Access to the Switch  13 Chapter 1: Accessing the Switch Switch User Accounts The user accounts listed in Table 4 can be defined in the RADI US server dictiona ry file. RADIUS Attributes for EX2500 User Privilege s When the user logs in , the sw itch authenticates his or her level of access by se nding the RADIUS access re quest, that i ...

  • Juniper Networks EX2500 - page 28

    EX2500 Ethernet Switch Configuration Guide 14  Securing Access to the Switch TACACS+ Authentication The EX2500 switch supports auth entication and authorization with ne tworks using the TACACS+ protocol. Th e EX2500 switch functions as the Network Access Server (NAS) by interacting with the re mote client and initiating au thentication an d auth ...

  • Juniper Networks EX2500 - page 29

    Securing Access to the Switch  15 Chapter 1: Accessing the Switch The default mappi ng between TACACS+ autho rization levels and EX2500 management access levels is show n in Table 6. The authorization levels must be defined on the TACACS+ serv er. Alternate mapping between TACACS + authorization levels and EX2500 management access levels is show ...

  • Juniper Networks EX2500 - page 30

    EX2500 Ethernet Switch Configuration Guide 16  Securing Access to the Switch Command Authorization and Logging When TACACS+ Command Authorizatio n is enabled, EX2500 configuration commands are sent to the TACACS+ server for au thorization. Use the follo wing command to enable TACACS+ Command Authorization: ex2500(config) # tacacs-server command- ...

  • Juniper Networks EX2500 - page 31

    Securing Access to the Switch  17 Chapter 1: Accessing the Switch Secure Shell Secure Shell (SSH) uses secure tunnels to encrypt and secure messages between a remote administrator and the switch. Telnet does not provide this lev el of security. The Telnet method of managing an EX250 0 switch does not provide a secure connection. SSH is a protoco ...

  • Juniper Networks EX2500 - page 32

    EX2500 Ethernet Switch Configuration Guide 18  Securing Access to the Switch When the SSH server is fi rst enabled and applied, the switch automaticall y generates the RSA host and se rver keys, which are stored in the Flash m emory. To configure RSA host and server keys, e nter the following commands to generate them manually: ex2500(config)# s ...

  • Juniper Networks EX2500 - page 33

    Securing Access to the Switch  19 Chapter 1: Accessing the Switch Considerations for Configuring End User Accounts  A maximum of 10 user IDs are supported on the switch.  The EX2500 switch support s end user support for console , Telnet, EX2500 Web Device Manager, and SSHv1 or SSHv2 access to the switch.  If RADIUS authentication is use ...

  • Juniper Networks EX2500 - page 34

    EX2500 Ethernet Switch Configuration Guide 20  Securing Access to the Switch Listing Current Users The following command displays defined user accounts and whether or not eac h user is currently logge d in to the sw itch. ex2500# show access us er Usernames: user - Enabled - offline oper - Disabled - offline admin - Always En abled - o nline 1 s ...

  • Juniper Networks EX2500 - page 35

    VLAN Overview  21 Chapter 2 VLANs This chapter describes network design and to pology considerations for using Vir t ua l Lo ca l Ar e a Ne t wo rk s (V L AN s) . VLANs commonly are used to split up groups of network users into manageable broadcast dom ains, to create logical seg mentation of workgroups, and to enforce security poli cies among l ...

  • Juniper Networks EX2500 - page 36

    EX2500 Ethernet Switch Configuration Guide 22  VLANs and Port VLAN ID Number s VLANs and Port VLAN ID Numbers VLAN Numbers The EX2500 switch supports up to 1024 VLANs per swit ch. Even though the maximum number of VLANs supported at any given time is 1024, each can be identified with any nu mber betwe en 1 and 40 94. VLAN 1 is th e default V LAN ...

  • Juniper Networks EX2500 - page 37

    VLAN Tagging  23 Chapter 2: VLANs VLAN Tagging EX2500 software supports 80 2.1Q VLAN tagging, providing standards-based VLAN support for Ethe rnet systems. Tagging places the VLAN identifier in the frame heade r of a packet, allowing each port to belong to multiple VLANs. Whe n you add a port to multiple VLANs, you also must enable taggin g on t ...

  • Juniper Networks EX2500 - page 38

    EX2500 Ethernet Switch Configuration Guide 24  VLAN Tagging Figure 1: Default VLAN Settings When a VLAN is configured, ports are added as members of the VLAN, and the ports are d efined as eith er tagged or untagged (see Figure 2 through F igure 5). The default configuration setti ngs for th e EX2500 switch have all po rts set as untagged member ...

  • Juniper Networks EX2500 - page 39

    VLAN Tagging  25 Chapter 2: VLANs Figure 2: Port-Based VLAN Assignment As shown in Figure 3, the untagged packe t is marked (tagged) as it leaves the switch through port 5, wh ich is configured as a tagged member of VLAN 2. The untagged packet re mains unchanged as it lea ves the switch through port 7, which i s configured as an untagged member ...

  • Juniper Networks EX2500 - page 40

    EX2500 Ethernet Switch Configuration Guide 26  VLAN Topologies and Design Considerations As shown in Figure 5, the tagge d packet remains unchanged a s it leaves the switch through port 5, wh ich is configured as a tag ged member of VLAN 2. How ever, the tagged packet i s stripped (untagged) as i t leav es the sw itch through po rt 7, which is c ...

  • Juniper Networks EX2500 - page 41

    VLAN Topologies and Design Considerations  27 Chapter 2: VLANs  All ports that are involved in po rt mi rroring must hav e memberships in the same VLANs. If a port is configured for port mirroring, the port’s VLAN membership cannot be ch anged. For more information on configuring port mirroring, see “Monitorin g Ports wi th Port Mirroring ...

  • Juniper Networks EX2500 - page 42

    EX2500 Ethernet Switch Configuration Guide 28  VLAN Topologies and Design Considerations Use the following procedu re to configure the sample network shown in Figure 6. 1. Enable VLAN tagging on serve r po rts that support multiple VLANs. ex2500(config)# interface port 5 ex2500(config-if)# tagging ex2500(config-if)# exit 2. Enable tagging on upl ...

  • Juniper Networks EX2500 - page 43

    Private VLANs  29 Chapter 2: VLANs Private VLANs Private VLANs provide Layer 2 isol atio n between the ports within the same broadcast domain. Private VL ANs can control traffic within a VLAN domain, and provide port-based security for host serv ers. Use private VLANs to partition a VLAN dom ain into su b-domains. Each sub-domain is comprised of ...

  • Juniper Networks EX2500 - page 44

    EX2500 Ethernet Switch Configuration Guide 30  Private VLANs Private VLAN Configuration Guidelines The following guidelines a pply wh en configuring priva te VLANs:  The default VLAN 1 cannot be a private VLAN.  The management VLAN 4095 cannot be a private V LAN. The management port cannot be a member of a priva te VLAN.  IGMP Snooping ...

  • Juniper Networks EX2500 - page 45

    Spanning Tree Overview  31 Chapter 3 Spanning Tree Protocol When multiple paths exist on a network, Spanning Tree Protocol configures the network so that a switch uses only the most effic ient path. The following topics are di scussed in this chapter:  Spanning Tree Overview on page 31  Rapid Spanni ng Tree Protoc ol on page 35  Per VLA ...

  • Juniper Networks EX2500 - page 46

    EX2500 Ethernet Switch Configuration Guide 32  Spanning Tree Overview The relationship between port, trunk groups , VLANs, and spanning trees is shown in Table 9. Bridge Protocol Data Units (BPDUs) To create a spanning tree, the switch generates a co nfiguration Bridge Protocol Data Unit (BPDU), which it then forwards ou t of its ports. Al l swi ...

  • Juniper Networks EX2500 - page 47

    Spanning Tree Overview  33 Chapter 3: Spanning Tree Protocol Port Pri ority The port priority helps determine which bridge port becomes the root or designated port. The case for the root port is when 2 switches are connected using a minimum of two links wi th the same pa th -cost. The case for the designated port is in a network topology tha t h ...

  • Juniper Networks EX2500 - page 48

    EX2500 Ethernet Switch Configuration Guide 34  Spanning Tree Overview  Each STG must hav e a VLAN assigned to it before it becomes fun ctional. You cannot configure other STG settings until the VLAN is assigned. If the STG VLAN is unassigned, other configuration sett ings are cleared. Assign a VLAN and reconfigure the STG settings. Creating a ...

  • Juniper Networks EX2500 - page 49

    Rapid Spanning Tree Protocol  35 Chapter 3: Spanning Tree Protocol  When you re move a port from a VL AN th at belongs to an S TG, that port is removed from the STG. However, i f that port belongs to an other VL AN in the same STG, the port remains in the STG. As an example, assume that port 1 belo ngs to VLAN 2, and VLAN 2 belong s to STG 2. ...

  • Juniper Networks EX2500 - page 50

    EX2500 Ethernet Switch Configuration Guide 36  Rapid Spanning Tree Protocol Port Type and Link Type Spanning tree configuration i ncludes the following parame ters to support RSTP and MSTP: edge port and link ty pe. Edge Port A port that does not connec t to a bridge is called a n edge port . Edge ports can start forwarding as so on as the link ...

  • Juniper Networks EX2500 - page 51

    Per VLAN Rapid Spanning Tree  37 Chapter 3: Spanning Tree Protocol Per VLAN Rapid Spanning Tree Per VLAN Rapid S panning Tree Plus Protocol (PVRST+ ) enhances the RSTP protocol by addi ng the ability to have multiple Spanni ng Tree Groups ( STGs). PVRST+ is based on IEEE 80 2.1w Rapid Span ning Tree P rotocol. In PVRST mode, the EX2500 switch su ...

  • Juniper Networks EX2500 - page 52

    EX2500 Ethernet Switch Configuration Guide 38  Per VLAN Rapid Spanning Tree In Figure 8, VLAN 1 and VLAN 2 belong to different Spanning Tre e Groups. The two instances of Span ning Tree separat e th e topo logy without fo rming a loo p. Both VLANs can forward pac kets between the swi tches without losing connectivity. Figure 8: Two VLANs, Each o ...

  • Juniper Networks EX2500 - page 53

    Multiple Spanning Tree Protocol  39 Chapter 3: Spanning Tree Protocol Multiple Spanning Tree Protocol Multiple Spanning Tr ee Protocol (MSTP) ex tends Rapid Spanning Tree Pro tocol through multiple Spanning Tree Groups, u s ing multiple VLANs in each STG. MSTP supports up to 32 Spanning Tree instances, that correspond to Spanning Tree Groups 1 t ...

  • Juniper Networks EX2500 - page 54

    EX2500 Ethernet Switch Configuration Guide 40  Multiple Spanning Tree Protocol Figure 9 shows how multiple spanning trees can provi de redundancy witho ut wasting any uplink ports. In this example, the server ports are split between two separate VLANs. Both VLANs belong to two d ifferent Mult iple Spanning Tree (MSTP) Groups. The spanning- tree ...

  • Juniper Networks EX2500 - page 55

    Fast Uplink Convergence  41 Chapter 3: Spanning Tree Protocol Add server ports 1 and 2 to VLAN 1. Add up link ports 19 and port 20 to VLAN 1. ex2500(config)# vlan 1 ex2500(config-vlan)# enable ex2500(config-vlan)# member 1 ex2500(config-vlan)# member 2 ex2500(config-vlan)# member 19 ex2500(config-vlan)# member 20 ex2500(config-vlan)# stg 1 ex250 ...

  • Juniper Networks EX2500 - page 56

    EX2500 Ethernet Switch Configuration Guide 42  Fast Uplink Convergence Configuration Guidelines When you enable Fast Uplink Converge nce, the EX2500 switch automa tically makes the following config uration changes:  Sets the bridge priority to 61440 so that it doe s not become the root swi tch.  Increases the cost of all po rts by 3000 0, ...

  • Juniper Networks EX2500 - page 57

    Trunking Overview  43 Chapter 4 Ports and Trunking Trunk groups can provide su per-bandwid th, multi-link connections betwee n switches or other trunk-capable device s. A trunk group is a group of ports that act together, combining their ba ndwidth to create a single, larger virtu al link. Thi s ch apt er provides configuration backgrou nd and e ...

  • Juniper Networks EX2500 - page 58

    EX2500 Ethernet Switch Configuration Guide 44  Trunking Overview Each packet’s particular MAC or IP addres s information results in se lecting one line in the trunk group for data transmission . The more da ta streams are feeding the trunk lines, the more ev enly traffic i s distribute d. Built-In Fault Tolerance Since each tr unk group is mad ...

  • Juniper Networks EX2500 - page 59

    Port Trunking Configuration Example  45 Chapter 4: Ports and Trunking  You cannot change the VLAN m embership for a trunk group’s member port. You can change the VLAN member ship of the trunk group.  When an active port is configured in a tru nk, the port becomes a trunk member when you enable the trunk. The Spanning Tree parameters for ...

  • Juniper Networks EX2500 - page 60

    EX2500 Ethernet Switch Configuration Guide 46  Port Trunking Configuration Example 1. Follow these steps on the EX2500 switch: a. Define a trunk group. ex2500(config)# portchannel 3 memb er 2,9, 16 ex2500(config)# portchannel 3 ena ble b. Verify the configuration. ex2500(config)# show portchannel 3 Examine the resulting information. If any setti ...

  • Juniper Networks EX2500 - page 61

    Configurable Trunk Hash Algorithm  47 Chapter 4: Ports and Trunking Configurable Trunk Hash Algorithm This feature allows you to configure parameters for the trunk hash algorithm , instead of using the default v alues. Use the IP Trunk Hash commands to conf igure new default behavior fo r Layer 2 traffic and Layer 3 traffic. The trunk hash setti ...

  • Juniper Networks EX2500 - page 62

    EX2500 Ethernet Switch Configuration Guide 48  Link Aggregation Control Protocol A port’s Link Aggregation Id entifier (LAG ID) determi nes how the port can be aggregated. The Link Aggregation ID (LAG ID) is constructed mainly from the system ID and the port’s admin key , as f ollows:  System ID —An integer value ba sed on the switch’ ...

  • Juniper Networks EX2500 - page 63

    Link Aggregation Control Protocol  49 Chapter 4: Ports and Trunking When the system is initialized, a ll ports by default are in LACP off mode and are assigned unique admin keys. To make a group of po rts aggregatable, you assign them all the same admin k ey. You must set the port’s LACP mode to active to activate LACP negotiation. You can set ...

  • Juniper Networks EX2500 - page 64

    EX2500 Ethernet Switch Configuration Guide 50  Link Aggregation Control Protocol We recommend that you use the default long ti meout to red uce LAPDU processing. If the CPU utilization rate of your sw itch remains at 100% for periods of 90 seconds or more, consider using static tru nks inst ead of LACP. Howe ver, if CPU use is low, you can set t ...

  • Juniper Networks EX2500 - page 65

    QoS Overview  51 Chapter 5 Quality of Service Quality of Service features allow you to allocate ne twork resources to mission-critical applications at the expense of applications that are less sensitive to such factors as time delays or network co nge stion. You can configure you r network to prioritize specific types of traffic, ensuring that e ...

  • Juniper Networks EX2500 - page 66

    EX2500 Ethernet Switch Configuration Guide 52  Using ACL Filters Figure 11: QoS Model The basic QoS model works as follow s:  Classify traffic:  Read the DSCP value.  Read the 802.1p priority valu e.  Match ACL fil ter parameters.  Perform actions:  Permit packets.  Deny packets.  Map the 802.1p priority to a COS queu e. ...

  • Juniper Networks EX2500 - page 67

    Using ACL Filters  53 Chapter 5: Quality of Service Each ACL contains rules that define the ma tching criteria for da ta packets. The ACL checks each packet against its rules, to dete rmine if there is a ma tch. If the pa cket matches the ACL’s rules, th e ACL performs its configured actio n: either permit or deny the packet. The EX2500 switch ...

  • Juniper Networks EX2500 - page 68

    EX2500 Ethernet Switch Configuration Guide 54  Using ACL Filters IP Extended ACLs The switch supports up to 128 IP ACLs (standard and extende d), numbered from 128 through 254. Use IP Extended ACLs to filter traffic using the following criteria:  Source IP address or network mask  Destination IP addr ess or network mask  IP protocol nu ...

  • Juniper Networks EX2500 - page 69

    Using ACL Filters  55 Chapter 5: Quality of Service Understanding ACL Priority Each ACL has a unique priority value, based on its number . The lower the ACL number, the higher the priority, so ACL 1 has the highest priority. The priority value is used to decide whic h ACL rule to apply when a packet matches one or more ACLs. When an incomin g pa ...

  • Juniper Networks EX2500 - page 70

    EX2500 Ethernet Switch Configuration Guide 56  Using ACL Filters Assigning ACLs to a Port Once you configu re an ACL, you must a ssign the ACL to a port. Each port can accept multiple ACLs. Note that higher-pri ority ACLs are considered first, and thei r action takes precedence over lower- priority ACLs. When you assign an ACL to a port, the ACL ...

  • Juniper Networks EX2500 - page 71

    Using ACL Filters  57 Chapter 5: Quality of Service 3. Verify the configuration. ex2500# show access-li sts 1 Standard IP Acces s List 1 ------------ ---------- ------ Source IP a ddress : 0.0.0 .0 Source IP a ddress mas k : 0.0.0 .0 Destination IP addres s : 100.1 0.1.1 Destination IP addres s mask : 255.2 55.255.255 In Port Lis t : 1 Filter Ac ...

  • Juniper Networks EX2500 - page 72

    EX2500 Ethernet Switch Configuration Guide 58  Using ACL Filters ACL Example 4—Blocking Al l Except Certain Packets Use this configuration to block all traf fic except traffic of certain types. HTTP/HTTPS , DHCP, and ARP p ackets are perm itted on the port. All o ther traffic is denied. 1. Configure on e IP ACL for each type of traffic that yo ...

  • Juniper Networks EX2500 - page 73

    Using Storm Control Filters  59 Chapter 5: Quality of Service Using Storm Control Filters The EX2500 switch provides filters that can limit the number of the following packet types transmitted by switch po rts:  Broadcast packets  Multicast packets  Unknown un icast packets (de stination look up failure) Broadcast Storms Excessive trans ...

  • Juniper Networks EX2500 - page 74

    EX2500 Ethernet Switch Configuration Guide 60  Using DSCP Values to Provide QoS Using DSCP Values to Provide QoS The switch uses the Differen tiated Services (Di ffServ) architecture to provide QoS functions. DiffServ is de scribed in IETF RFCs 2474 and 2475 . The six most significant bi ts in the ToS byte of the IP header are defined as DiffSer ...

  • Juniper Networks EX2500 - page 75

    Using DSCP Values to Provide QoS  61 Chapter 5: Quality of Service Per Hop Behavior The DSCP value determines the Per Hop Be havior ( PHB) of each packet. The PHB is the forwarding treatment given to packets at e ach hop. QoS policies are bui lt by the application of a set of rules to pack ets, based on the DSCP value, as they ho p through the n ...

  • Juniper Networks EX2500 - page 76

    EX2500 Ethernet Switch Configuration Guide 62  Using DSCP Values to Provide QoS QoS Levels Table 16 shows the default servi ce levels provide d by the switch, listed from highest to lowest importa nce. DSCP Mapping The switch can use the DSCP value of ingress packets to set the COS queue. U se the following command to view the default settings: ...

  • Juniper Networks EX2500 - page 77

    Using 802.1p Priority to Provide QoS  63 Chapter 5: Quality of Service Using 802.1p Priority to Provide QoS The EX2500 switch provides Quality o f Service (QoS ) functions ba sed on the priority bits in a packet’s VLAN hea der. ( The priority bits are defined by th e 802.1p standard wit hin the IEE E 802.1Q V LAN head er. ) The 802.1p bits, if ...

  • Juniper Networks EX2500 - page 78

    EX2500 Ethernet Switch Configuration Guide 64  Queuing and Scheduling Queuing and Scheduling The EX2500 switch has eight outp ut Class of Service (COS) qu eues per port, into which each packet is placed. Each pack et’s 802.1p priori ty determines its COS queue. Higher COS que ue numbers prov ide forwardi ng precedence . You can map 802.1p prio ...

  • Juniper Networks EX2500 - page 79

    RMON Overview  65 Chapter 6 Remote Monitoring Remote Monitoring (RMON) allows network devices to exchange netw ork monitoring data. The following topic s are discussed in this chapter:  RMON Overview on page 65  RMON Group 1—Statistics on page 66  RMON Group 2—History on page 67  RMON Group 3—Alarms on page 68  RMON Group 9? ...

  • Juniper Networks EX2500 - page 80

    EX2500 Ethernet Switch Configuration Guide 66  RMON Group 1—Statistics RMON Group 1—Statistics The switch supports collection of Ethernet statistics as outlined in the RMON statistics MIB, in reference to etherSta tsTable . You c an configure RMON statistics on a per- port basis. RMON statistics are sample d every second, and new data overwr ...

  • Juniper Networks EX2500 - page 81

    RMON Group 2—History  67 Chapter 6: Remote Monitoring RMON Group 2—History The RMON History Group allows you to sample and archive Ethernet statistics for a specific interface during a specific time interval. Histo ry sampling is done per port. Data is gathe red during discreet sa mpli ng intervals and stored in “ buckets .” At each conf ...

  • Juniper Networks EX2500 - page 82

    EX2500 Ethernet Switch Configuration Guide 68  RMON Group 3—Alarms 3. View RMON history for the p ort. ex2500(confi g)# show rmon hist ory RMON is enab led Index I FOID Interval Rbnum Gbnum ------ --- ------- -------- ----- ----- 1 ifEn try.1.7 120 30 30 History Ethe r table is empty RMON Group 3—Alarms The RMON Alarm Group allows you to def ...

  • Juniper Networks EX2500 - page 83

    RMON Group 9—Events  69 Chapter 6: Remote Monitoring RMON Group 9—Events The RMON Event Group allow s you to defi ne events that are triggere d by alarms. An event can be a log me ssage, an SNMP trap, or both. When an alarm is generated, it triggers a correspo nding event notification. Use the following commands to correla te an Event index ...

  • Juniper Networks EX2500 - page 84

    EX2500 Ethernet Switch Configuration Guide 70  RMON Group 9—Events ...

  • Juniper Networks EX2500 - page 85

    IGMP Snooping  71 Chapter 7 IGMP Internet Group Management Protoco l (IGMP) is used by IP Multicast routers to learn about the existence of host group members on their directly attached subnet (see RFC 2236). The IP Multicast routers get this information by broadcasting IGMP Membership Queries and listening for IP hosts reporting their host grou ...

  • Juniper Networks EX2500 - page 86

    EX2500 Ethernet Switch Configuration Guide 72  FastLeave The client-server path is set up as follo ws: 1. An IP Mul ticast rout er (Mrouter ) sends Membership Queries to the switch, which forwards them to all ports in a give n VLAN. 2. Hosts that want to re ceive the multica st data stream send Membership Report s to the switch, w hich sends a p ...

  • Juniper Networks EX2500 - page 87

    IGMPv3 Snooping  73 Chapter 7: IGMP IGMPv3 Snooping IGMPv3 includes new mem bership report me ssages to ex tend IGMP fu nctionality . The switch provides snooping capability for all types o f IGMP version 3 (IGMPv3) Membership Reports. IGMPv3 supports Source-Specific Multicast (S SM). SSM identifies session traffic by both source and group addre ...

  • Juniper Networks EX2500 - page 88

    EX2500 Ethernet Switch Configuration Guide 74  Static Multicast Router 4. Enable IGMPv3 Snooping (optional). ex2500(config)# ip igmp snoop igmp v3 enable 5. View dynamic IGMP information. ex2500# show ip igmp group s Note: Local groups (22 4.0.0.x) are not sn ooped/relaye d and will not appea r. Source Gr oup VLAN P ort Versio n Mode Expires F w ...

  • Juniper Networks EX2500 - page 89

    High Availability Overview  75 Chapter 8 High Availability Through Uplink Failure Detection This chapter describes how to use Uplink Failu re Detectio n (UFD) to ensu re that network resources remain availa ble if one switch is remov ed for service. The following topics are di scussed in this chapter:  High Availabil ity Overview on pag e 75 ...

  • Juniper Networks EX2500 - page 90

    EX2500 Ethernet Switch Configuration Guide 76  Failure Detection Pair Figure 14: Uplink Failure Detection Example Failure Detection Pair To use UFD, you mu st configure a Failu re Detection Pair and then turn UFD on. A Failure Detection Pair consists of the fo llowing groups of ports:  Link to Monitor (LtM)—The Link to Monito r group consis ...

  • Juniper Networks EX2500 - page 91

    UFD Configuration Example  77 Chapter 8: High Availability Through Uplink Failure Detect ion  Ports that are already members of a trunk group are not allow ed to be assigned to an LtM.  A port cannot be added to a trunk gro u p if it already belongs to an LtM.  An LtD can con tain one or more p orts, and/or one or more trunks. Use the f ...

  • Juniper Networks EX2500 - page 92

    EX2500 Ethernet Switch Configuration Guide 78  Monitoring UFD ...

  • Juniper Networks EX2500 - page 93

    Appendixes  79 Part 2 Appendixes  “Monitoring Ports with Port Mirroring” on page 81 disc usses th e main tool fo r troubleshooting your switch—monitoring ports. ...

  • Juniper Networks EX2500 - page 94

    EX2500 Ethernet Switch Configuration Guide 80  Appendixes ...

  • Juniper Networks EX2500 - page 95

    Port Mirroring Overview  81 Appendix A Monitoring Ports with Port Mirroring This appendix explains port mirroring to help you monitor ports and troubleshoot common problems on the EX2500 switch. The following topics are discussed in this appendix:  Port Mirroring Overview on pag e 81  Configuring Port Mirroring o n page 82 Port Mirroring O ...

  • Juniper Networks EX2500 - page 96

    EX2500 Ethernet Switch Configuration Guide 82  Configuring Port Mirroring As shown in Figure 15, port 2 is acting as a monitor port, receiv ing mirrored traffic from three other switch ports: ingress traffic from port 4, egress traffic from port 7, and both ingress and egress traffic fro m port 10 . A sniffer could be attache d to port 2 in orde ...

  • Juniper Networks EX2500 - page 97

    Indexes  83 Part 3 Indexes  Index on pa ge 85 ...

  • Juniper Networks EX2500 - page 98

    EX2500 Ethernet Switch Configuration Guide 84  Indexes ...

  • Juniper Networks EX2500 - page 99

    Index  85 Index Numerics 802.1p priority fo r QoS .................... .............. .............. 63 802.1Q VLAN tagging .................. .............. .............. ..... 23 A Access Control Lists. See ACLs. accessing the switch management interface ....... ........... .............. ............. 3 RADIUS authenti cation ............. . ...

  • Juniper Networks EX2500 - page 100

    86  Index EX2500 Ethernet Switch Configuration Guide H help, requesting .................... .............. .............. ............ xi ii high availability, overview .................... .............. .......... 75 history, RMON ................ .............. .............. .............. ..... 67 HP-OpenView ............... .............. ...

  • Juniper Networks EX2500 - page 101

    Index  87 Index Q QoS 802.1p priority ...... .............. .............. .............. ........ 63 ACLs ............. .............. .............. .............. ........... ........ 52 COS queuing and scheduling .............. .............. ..... 64 DSCP ....................... .............. .............. ........... ........... 60 DSCP ...

  • Juniper Networks EX2500 - page 102

    88  Index EX2500 Ethernet Switch Configuration Guide U UDP ................. ............... .............. .............. .............. ....... 54 UFD ............ ........... .............. .............. .............. .............. .. 75 configuration ............ .............. .............. .............. ..... 77 configuration guidelin ...

Manufacturer Juniper Networks Category Switch

Documents that we receive from a manufacturer of a Juniper Networks EX2500 can be divided into several groups. They are, among others:
- Juniper Networks technical drawings
- EX2500 manuals
- Juniper Networks product data sheets
- information booklets
- or energy labels Juniper Networks EX2500
All of them are important, but the most important information from the point of view of use of the device are in the user manual Juniper Networks EX2500.

A group of documents referred to as user manuals is also divided into more specific types, such as: Installation manuals Juniper Networks EX2500, service manual, brief instructions and user manuals Juniper Networks EX2500. Depending on your needs, you should look for the document you need. In our website you can view the most popular manual of the product Juniper Networks EX2500.

A complete manual for the device Juniper Networks EX2500, how should it look like?
A manual, also referred to as a user manual, or simply "instructions" is a technical document designed to assist in the use Juniper Networks EX2500 by users. Manuals are usually written by a technical writer, but in a language understandable to all users of Juniper Networks EX2500.

A complete Juniper Networks manual, should contain several basic components. Some of them are less important, such as: cover / title page or copyright page. However, the remaining part should provide us with information that is important from the point of view of the user.

1. Preface and tips on how to use the manual Juniper Networks EX2500 - At the beginning of each manual we should find clues about how to use the guidelines. It should include information about the location of the Contents of the Juniper Networks EX2500, FAQ or common problems, i.e. places that are most often searched by users in each manual
2. Contents - index of all tips concerning the Juniper Networks EX2500, that we can find in the current document
3. Tips how to use the basic functions of the device Juniper Networks EX2500 - which should help us in our first steps of using Juniper Networks EX2500
4. Troubleshooting - systematic sequence of activities that will help us diagnose and subsequently solve the most important problems with Juniper Networks EX2500
5. FAQ - Frequently Asked Questions
6. Contact detailsInformation about where to look for contact to the manufacturer/service of Juniper Networks EX2500 in a specific country, if it was not possible to solve the problem on our own.

Do you have a question concerning Juniper Networks EX2500?

Use the form below

If you did not solve your problem by using a manual Juniper Networks EX2500, ask a question using the form below. If a user had a similar problem with Juniper Networks EX2500 it is likely that he will want to share the way to solve it.

Copy the text from the picture

Comments (0)