Dell UPS 500T Español Manuels
Dell UPS 500T Español Manuels
-> Accéder au site Dell
-> Accéder aux CODES PROMO et Bons de réduction Dell
-> Voir d'autres manuels Dell
Revenir à l'accueil
Dell UPS 500T
More Languages
More Languages
More Languages
More Languages
More Languages
More Languages
More Languages
More Languages
More Languages
-> Commander sur Dell.com, Cliquez ici
Autres manuels :
Dell-Latitude-D630-M..> 10-May-2013 11:17 4.7M
Dell-Precision-690-M..> 10-May-2013 11:16 3.2M
Dell-Latitude-E6400-..> 10-May-2013 11:16 3.9M
Dell-Precision-M40-M..> 10-May-2013 11:15 3.9M
Dell-Precision-360-M..> 10-May-2013 11:15 4.0M
Dell-PowerEdge-R320-..> 10-May-2013 11:14 4.4M
Dell-Precision-450-M..> 10-May-2013 11:13 4.6M
Dell-Intel-Active-Ma..> 10-May-2013 11:13 4.7M
Dell-OptiPlex-755-Ma..> 10-May-2013 11:12 5.5M
Dell-PowerVault-NX30..> 10-May-2013 11:12 5.6M
Dell-Precision-M4500..> 10-May-2013 11:10 6.1M
Dell-OptiPlex-SX280-..> 10-May-2013 11:10 6.0M
Dell-Latitude-E6400-..> 10-May-2013 10:30 3.2M
Dell-PowerEdge-T100-..> 10-May-2013 10:22 3.0M
Dell-Vostro-270s-Man..> 10-May-2013 10:21 3.1M
Dell-Precision-T7600..> 10-May-2013 10:21 3.2M
Dell-Precision-M4400..> 10-May-2013 10:20 3.3M
Dell-Precision-M4700..> 10-May-2013 10:20 3.4M
Dell-Precision-M4600..> 10-May-2013 10:19 3.4M
Dell-Precision-390-M..> 10-May-2013 10:19 2.0M
Dell-Precision-610-M..> 10-May-2013 10:18 2.3M
Dell-Manuel-d-utilis..> 10-May-2013 10:18 2.3M
Dell-Precision-M20-M..> 10-May-2013 10:17 2.8M
Dell-Guide-d-utilisa..> 10-May-2013 10:17 2.8M
Dell-Precision-370-M..> 10-May-2013 10:16 3.2M
Dell-PowerEdge-T100-..> 10-May-2013 10:22 3.0M
Dell-Vostro-270s-Man..> 10-May-2013 10:21 3.1M
Dell-Precision-T7600..> 10-May-2013 10:21 3.2M
Dell-Precision-M4400..> 10-May-2013 10:20 3.3M
Dell-Precision-M4700..> 10-May-2013 10:20 3.4M
Dell-Precision-M4600..> 10-May-2013 10:19 3.4M
Dell-Precision-390-M..> 10-May-2013 10:19 2.0M
Dell-Precision-610-M..> 10-May-2013 10:18 2.3M
Dell-Manuel-d-utilis..> 10-May-2013 10:18 2.3M
Dell-Precision-M20-M..> 10-May-2013 10:17 2.8M
Dell-Guide-d-utilisa..> 10-May-2013 10:17 2.8M
Dell-Precision-370-M..> 10-May-2013 10:16 3.2M
Dell-Latitude-E6400-..> 10-May-2013 10:16 3.2M
Dell-XPS-M1210-Owner..> 08-May-2013 10:57 2.9M
Dell-Windows-8-Manue..> 08-May-2013 10:54 5.1M
Dell-PowerEdge-R815-..> 08-May-2013 10:52 4.3M
Dell-Inspiron-1521-M..> 08-May-2013 10:51 2.9M
Dell-PowerEdge-R900-..> 08-May-2013 10:50 3.1M
Dell-Vostro-270-Manu..> 08-May-2013 10:50 3.2M
Dell-XPS-630-Manuels..> 08-May-2013 10:49 3.6M
Dell-XPS-M1730-Manue..> 08-May-2013 10:49 3.9M
Dell-Vostro-200-Manu..> 08-May-2013 10:48 4.5M
Dell-Vostro-410-Manu..> 08-May-2013 10:48 4.1M
Dell-Vostro-1700-Man..> 08-May-2013 10:47 4.8M
Dell-Inspiron-m301z-..> 08-May-2013 10:47 4.8M
Dell-Studio-Slim-Man..> 08-May-2013 10:45 5.1M
Dell-PowerEdge-R620-..> 08-May-2013 08:46 4.1M
Dell-PowerEdge-R200-..> 08-May-2013 08:46 2.6M
Dell-Inspiron-640M-M..> 08-May-2013 08:46 3.7M
Dell-Inspiron-600m-M..> 08-May-2013 08:45 2.6M
Dell-Studio-Desktop-..> 08-May-2013 08:44 2.7M
Dell-Vostro-1000-Man..> 08-May-2013 08:44 2.7M
Dell-Inspiron-15-Int..> 08-May-2013 08:44 3.0M
Dell-Alienware-Area-..> 08-May-2013 08:43 3.1M
Dell-DR4000-Manuels.htm 08-May-2013 08:43 3.4M
Dell-Alienware-M15x-..> 08-May-2013 08:42 3.3M
Dell-Latitude-XT2-Ma..> 08-May-2013 08:42 3.5M
Dell-Latitude-E5520-..> 08-May-2013 08:41 3.5M
Dell-OptiPlex-745-Ma..> 08-May-2013 08:40 3.9M
Dell-Inspiron-1525-M..> 08-May-2013 08:40 3.9M
Dell-Inspiron-One-23..> 08-May-2013 08:39 4.2M
Dell-Inspiron-One-23..> 08-May-2013 08:39 2.8M
Dell-Inspiron-510m-M..> 08-May-2013 08:38 3.2M
Dell-Inspiron-Duo-Ma..> 08-May-2013 08:38 3.0M
Dell-Vostro-1550-Man..> 08-May-2013 08:37 3.4M
Dell-Precision-T5600..> 08-May-2013 08:37 3.3M
Dell-Dimension-8300-..> 07-May-2013 22:03 2.5M
Dell-Latitude-Cpi-Ma..> 07-May-2013 22:01 3.2M
Dell-Alienware-Area-..> 07-May-2013 22:01 3.2M
Dell-Latitude-D620-M..> 07-May-2013 22:00 2.3M
Dell-PowerEdge-1950-..> 07-May-2013 22:00 2.2M
Dell-Precision-T5600..> 07-May-2013 21:30 3.1M
Dell-PowerEdge-R720x..> 07-May-2013 21:26 3.1M
Dell-Inspiron-500m-M..> 07-May-2013 21:26 2.8M
Dell-PowerEdge-R815-..> 07-May-2013 21:25 2.8M
Dell-Alienware-M15x-..> 07-May-2013 21:25 2.8M
Dell-Vostro-3450-Man..> 07-May-2013 21:24 2.8M
Dell-PowerEdge-R610-..> 07-May-2013 21:24 2.9M
Dell-Vostro-3750-Man..> 07-May-2013 21:23 3.0M
Dell-Studio-1555-15-..> 07-May-2013 21:23 3.1M
Dell-Manuel-de-maint..> 07-May-2013 21:22 3.0M
Dell-Latitude-E6420-..> 07-May-2013 21:22 3.1M
Dell-Inspiron-1520-M..> 07-May-2013 21:21 2.0M
Dell-Aztech-MDP3900-..> 07-May-2013 21:21 2.0M
Dell-PowerEdge-M905-..> 07-May-2013 21:21 2.0M
Dell-PowerEdge-400SC..> 07-May-2013 21:21 2.1M
Dell-Precision-M4500..> 07-May-2013 21:20 2.2M
Dell-Vizioncore-Manu..> 07-May-2013 21:20 2.1M
Dell-Inspiron-1520-2..> 07-May-2013 21:19 2.5M
Dell-Guide-Utilisate..> 07-May-2013 21:19 2.4M
Dell-PowerEdge-R510-..> 07-May-2013 21:18 2.7M
Dell-Manuel-d-Utilis..> 07-May-2013 21:18 2.4M
Dell-PowerEdge-300-M..> 06-May-2013 19:33 4.7M
Dell-Lifecycle-Contr..> 06-May-2013 19:32 4.3M
Dell-PowerVault-110T..> 06-May-2013 19:31 4.4M
Dell-Inspiron-620-Ma..> 06-May-2013 19:10 3.2M
Dell-Dimension-5100-..> 06-May-2013 19:10 3.4M
Dell-Manuels-et-docu..> 06-May-2013 19:09 3.7M
Dell-Manuels-et-docu..> 06-May-2013 19:09 3.5M
Dell-1130-Dell-1130n..> 06-May-2013 18:42 3.1M
Dell-Controleurs-RAID-Dell-PowerEdge-PERC-H310-H710-H710P-et-H810-Guide-d-utilisation
Dell-Laser-MFP-Dell-3333dn-et-3335dn-Guide-de-l-utilisateur
Dell-PowerVault-DL-Backup-to-Disk-Appliance-Powered-by-Symantec-Backup-Exec-Guide-d-utilisation
Dell-XPS-015-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerVault-NX3300-Guide-de-mise-en-route
Dell-INSPIRON-GUIDE-DE-REFERENCE
Dell-Systemes-Dell-PowerVault-Network-Attached-Storage-NAS-Guide-de-depannage
Dell-Commutateur-de-consoles-2161DS-Dell-Guide-de-l-utilisateur-d-OSCAR-et-du-materiel
Dell-PowerEdge-T420-Guide-de-mise-en-route
Dell-PowerEdge-C8000XD-Manuel-du-proprietaire-du-materiel
Dell-OptiPlex-755-Guide-d-utilisation
Dell-Matrices-de-stockage-Dell-PowerVault-MD3200i-et-MD3220i-Guide-de-deploiement
Dell-Latitude-E5400-et-E5500-Guide-de-configuration-et-de-reference-rapide
Dell-Set-Up-Your-Computer
Dell-Manuel-du-proprietaire-du-Dell-XPS-M1730-Manuel
Dell-Systemes-Dell-PowerEdge-M620-Manuel-du-proprietaire-Manuel
Dell-PowerEdge-C410x-Getting-Started-With-Your-System
Dell-Systemes-Dell-PowerEdge-SUSE-Linux-Enterprise-Server-10-Instructions-d-installation
Dell-Utilitaires-de-gestion-du-Dell-OpenManage-Baseboard-Management-Controller-Version%204.6-Guide-d-utilisation
Dell-OpenManage-Server-Administrator-Guide-d-installation-de-la-version-7.1
Dell-Systeme-Dell-DR4000-Guide-de-l-administrateur
Dell-Systemes-Dell-PowerEdge%20Red-Hat-Enterprise-Linux-6-x86_64-x86-Instructions-d-installation-et-informations-importantes
Dell-Integrated-Dell-Remote-Access-Controller-7-iDRAC7-Version-1.20.20-Guide-d-utilisation
Dell-Management-Plug-In-pour-VMware-vCenter-Version-1.5-Guide-d-utilisation
Dell-Projecteur-7700FullHD-Dell-Guide-de-l-utilisateur
Dell-Projecteur-Dell-1420X-1430X-Guide-d-utilisation
Dell-FluidFS-NAS-Solutions-Guide-de-l-administrateur
Dell-PowerEdge-Express-SSD-PCIe-Flash-Guide-d-utilisation
Dell-Update-Packages-DUP-Version-7.0-Guide-d-utilisation
Dell-PowerEdge-R720-et-R720xd-Guide-de-mise-en-route-Manuel
Dell-PowerEdge-R320-Guide-de-mise-en-route
Dell-Systemes-Dell-PowerEdge-R510-Manuel-du-proprietaire
Dell-Precision-M4400-Guide-de-configuration-et-de-reference-rapide
Dell-Matrices-de-stockage-SCSI-Dell-EqualLogic-PS-Series-a-clusters-de-basculement-Microsoft-Windows-Server-Guide-d-installation-et-de-depannage-du-materie
Dell-PowerEdge-C410x-Guide-de-mise-en-route-du-systeme
Dell-Moniteur-a-ecran-plat-Dell-U2713HM-Guide-d-utilisation
Dell-Moniteur-a-Dell-P1913-P1913S-P2213
Dell-Guide-de-l-utilisateur-du-moniteur-Dell-E1913S-E1913-E2213
Dell-Systems-Service-and-Diagnostics-Tools-Version-7.0-Guide-d-installation-rapide
Dell-Moniteur-a-Dell-S2740L-Guide-d-utilisation
Dell-INSPIRON-GUIDE-DE-CONFIGURATION
Dell-Dimension-Serie-8300
Dell-PowerEdge-R820-Guide-de-mise-en-route
Dell-PowerEdge-C8000-Manuel-du-proprietaire-du-materiel-manuel
Dell-OpenManage-Server-Administrator-Version-7.1-Guide-d-utilisation
Dell-PowerEdge-M1000e-M915-M910-M820-M710HD-M710-M620-M610x-M610-M520-et-M420-Guide-de-mise-en-route
Dell-OpenManage-Server-Administrator-Version-7.0-Guide-d-installation
Dell-Inspiron-15R-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerVault-NX3200-Guide-de-mise-en-route
Dell-PowerEdge-RAID-Controller-PERC-S110-Guide-d-utilisation
Dell-FluidFS-NAS-Solutions-Guide-de-mise-en-route
Dell-Micrologiciel-Dell-Chassis-Management-Controller-Version-4-1-Guide-d-utilisation
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Guide-de-mise-en-route
Dell-Vostro-470-Manuel-du-proprietaire
/Dell-Systeme-Dell-PowerVault-NX3500-Guide-de-l-administrateur
Dell-Latitude-E6420-XFR-Guide-technique
Dell-Guide-de-l-utilisateur-du-moniteur-S2240M-S2340M
Dell-Systemes-Dell-DR4000-Manuel-du-proprietaire-manuel
Dell-PowerEdge-T320-Guide-de-mise-en-route
Dell-Precision-Workstation-T3600-Manuel-du-proprietaire
Dell-Systemes-Dell-DR4000-Manuel-du-proprietaire
Dell-PowerEdge-R420-Guide-de-mise-en-route
Dell-PowerEdge-C8220-Manuel-du-proprietaire-du-materiel-manuel
Dell-Vostro-470-Owner-s-Manual
Dell-Projecteur-Dell-M110-Guide-de-l-utilisateur
Dell-Upgrading-to-BackupExec-2012-PowerVault-DL-Backup-to-Disk-Appliance
Dell-PowerVault-NX3300-Manuel-du-proprietaire
Dell-PowerConnect-5500-Series-CLI-Reference-Guide
Dell-Matrices-de-stockage-Dell-PowerVault-MD3260-Series-Guide-de-deploiement
Dell-Inspiron-One-2020-Manuel-du-proprietaire
Dell-XPS-14-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-1900-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-M620-Manuel-du-proprietaire
Dell-PowerEdge-R815-Manuel-du-proprietaire
Dell-PowerEdge-R720-and-R720xd-Owner-s-Manual
Dell-Micrologiciel-Dell-Chassis-Management-Controller-Version-4.0-Guide-d-utilisation
Dell-Inspiron-17R-Manuel-du-proprietaire-Manuel
Dell-Inspiron-One-2020-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-C5220-Manuel-du-proprietaire-du-materiel
Dell-Inspiron-660s-Manuel-du-proprietaire-manuel
Dell-PowerEdge-R820-Manuel-du-proprietaire
Dell-Vostro-270-Manuel-du-proprietaire-manuel
Dell-Systeme-Dell-PowerEdge-C6220-Manuel-du-proprietaire
Dell-Inspiron-14R-Manuel-du-proprietaire
Dell-Guide-de-l-Utilisateur-de-l-Ecran-Large-Dell-IN1940MW
Dell-Moniteur-a-Dell-S2440L-Guide-d-utilisation
Dell-Alienware-X51-Owner-s-Manual
Dell-ALIENWARE-M17x-MOBILE-MANUAL
Dell-Emplacement-des-cavaliers-de-la-carte-systeme-des-systemes-Dell-PowerEdge-R310-Mise-a-jour-des-informations
Dell-Systemes-Dell-PowerEdge-6950-Manuel-du-proprietaire
Dell-Alienware-M17x-R4-Owner-s-Manual
Dell-XPS-13-Owner-s-Manual
Dell-HBA-SAS-Dell-PowerEdge-6-Gb-s-et-Internal-Tape-Adapter-Guide-d-utilisation
Dell-Systemes-Dell-PowerEdge-R910-Mise-a-jour-des-informations
Dell-Systemes-Dell-PowerEdge-T610-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R420-Manuel-du-proprietaire
/Dell-PowerEdge-R905-Manuel-du-proprietaire
Dell-Imprimantes-laser-Dell-2350d-et-Dell-2350dn
Dell-XPS-430-Guide-de-reference-rapide
Dell-PowerEdge-RAID-Controller-PERC-H700-et-H800-Guide-d-utilisation
Dell-Lifecycle-Controller-2-Version-1.00.00-User-s-Guide
Dell-OpenManage-Server-Administrator-Version-7.0-Guide-d-utilisation
Dell-Solutions-NAS-Dell-FluidFS-Manuel-du-proprietaire-Manue
Dell-Guide-de-l-utilisateur-Dell-V525w
Dell-XPS-13-Manuel-du-proprietaire
Dell-Adaptateurs-Brocade-Manuel-d-installation-et-de-reference
Dell-FluidFS-NAS-Solutions-NX3600-NX3610-Guide-de-deploiement
Dell-Systemes-Dell-PowerEdge-T410-Manuel-du-proprietaire
Dell-Latitude-ST-Manuel-du-proprietaire-Manuel
Dell-OptiPlex-360-Guide-de-configuration-et-de-reference-rapide
Dell-PowerEdge-R810-Manuel-du-proprietaire-du-materiel
Dell-Guide-d-installation-des-systemes-Dell-PowerVault-Modular-Disk-3000
Dell-Imprimante-laser-Dell-2230d-Guide-de-l-utilisateur
Dell-Systemes-Dell-PowerEdge-C6105-Manuel-du-proprietaire-du-materiel
Dell-Imprimante-personnelle-a-jet-d-encre-Dell-J740-Manuel-du-proprietaire
Dell-2130cn-IMPRIMANTE-LASER-COULEUR
Dell-Guide-d-utilisation-de-la-station-de-travail-Dell-Precision-T3400
Dell-1235cn-Imprimante-Multifonction-Mode-d-emploi
Dell-Vostro-1310-1510-1710-et-2510-Guide-de-configuration-et-de-reference-rapide
Dell-Guide-d-utilisation-APC-Smart-UPS-750VA-1000VA-1500VA-100-120-230-V-CA-2U-Montage-en-baie-Onduleur
Dell-Guide-d-utilisation-Modele-TL24iSCSIxSAS%201Gb-iSCSI-a-SAS
Dell-Imprimantes-laser-Dell-1130-et-Dell-1130n
Dell-Precision-M6400-Guide-de-configuration-et-de-reference-rapide
Dell-M770mm-Color-Monitor-Quick-Set-up
Dell-Carte-de-gestion-reseau-AP9617-AP9618-AP9619-Manuel-d-installation-et-de-demarrage-rapide
Dell-Projecteur-Dell-1410X-Guide-d-utilisation
Dell-Imprimante-couleur-Dell-1350cnw
Dell-Manuel-d-utilisation-Dell-Inspiron-M5040-15-N5040-15-N5050-Manuel
Dell-Manuel-de-maintenance-Dell-Inspiron-620
Dell-3D-VISION-MANUEL-D-UTILISATION
Dell-Inspiron-600m-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R805-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R900-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-2970-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-C6145-Manuel-du-proprietaire-du-materiel
Dell-Inspiron-660s-Manuel-du-proprietaire
Dell-P513w-User-s-Guide-Francais-manuel
Dell-Inspiron-660-manuels
Dell-Serveur-de-sauvegarde-sur-disque-Dell-PowerVault-DL-optimise-par-CommVault-Simpana-Guide-d-utilisation
Dell-P513w-User-s-Guide-Guide-de-l-utilisateur-manuel
Dell-Precision-Workstation-T1650-Manuel-du-proprietaire
Dell-ALIENWARE-M17x-MANUEL-DE-L-ORDINATEUR-PORTABLE
Dell-Manuel-du-proprietaire-de-Dell-PowerEdge-M905-M805-M600-et-M605
Dell-Inspiron-One-2330-Manuel-du-proprietaire
Dell-Dimension-1100-B110-Manuel-du-proprietaire
Dell-Vostro-270-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T320-Manuel-du-proprietaire
Dell-Station-de-travail-mobile-Dell-Precision-M4700-Manuel-du-proprietaire
Dell-XPS-8500-Manuel-du-proprietaire
Dell-1230c-Imprimante-laser-couleur-mode-d-emploi-Manuel
Dell-Client-Management-Manuel
Dell-Studio-XPS-Setup-Guide-Manue
Dell-Adaptateur-hote-Dell-PCIe-SCSI-Ultra320-monocanal-Guide-d-utilisation-Manuel
Dell-INSPIRON-DUO-SETUP-GUIDE-Manuel
Dell-INSPIRON-DUO-GUIDE-DE-CONFIGURATION-Manuel
Dell-Guide-de-l-utilisateur-Dell-Inspiron-M4040-14-N4050-Manuel
Dell-Guide-de-l-administrateur-de-Dell-PowerVault-705N-Manuel
Dell-Vostro-420-220-220s-Guide-de-Configuration-et-de-Reference-Rapide-Manuel
Dell-Matrices-de-stockage-Dell-PowerVault-MD3660f-Series-Guide-de-deploiement-Manuel
Dell-Systemes-Dell-PowerVault-Network-Attached-Storage-NAS-Guide-de-l-administrateur-Manuel
Dell-Latitude-D430-Guide-d-utilisation-Manuel
Dell-Studio-XPS-Guide-de-configuration-Manuel
Dell-PowerEdge-C410x-Manuel-du-proprietaire
Dell-Precision-Workstation-T1650-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R300-Manuel-du-proprietaire
Dell-Systemes%20-Dell%20PowerEdge-T110-II-Manuel-du-proprietaire
Dell-Vostro-200-Manuel-du-proprietaire-Mini-Tower
Dell-Inspiron-531-Manuel-du-proprietaire
Dell-ALIENWARE-MANUEL-DE-L-ORDINATEUR-DE-BUREAU-Francais
Dell-PowerEdge-R520-Manuel-du-proprietaire
Projecteur-Dell-1201MP-Manuel-d-utilisation
Dell-PowerEdge-R910-Manuel-du-proprietaire
Dell-Dimension-C521-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T605-Manuel-du-proprietaire
Dell-Mobile-Jamz
Dell-Inspiron-530-Series-Manuel-du-proprietaire
Dell-Vostro-3460-Manuels
Dell-OPENMANAGE-POWER-CENTER-1.1-Guide-d-utilisation
Dell-PowerVault-MD3660f-Storage-Arrays-Manuels
Dell™ Ekran Yöneticisi Kullanıcı Kılavuzu
Dell-PowerEdge-R620-Guide-de-mise-en-route
Dell-PowerEdge-R520-Guide-de-mise-en-route
DELL-POWERVAULT-MD1200-et-MD1220-TECHNICAL-GUIDEBOOK
Console-de-gestion-multi-onduleurs-Dell-Manuel-de-l-utilisateur-pour-l-installation-et-la-configuration
DELL-OPTIPLEX580-TECHNICAL-GUIDEBOOK-INSIDE-THE-OPTIPLEX-580
Dell-Inspiron-1720-manuels
Dell-PowerEdge-R720-et-R720xd-Guide-de-mise-en-route
Dell-Vostro-1540-1550-Manuel-du-proprietaire
Dell-Latitude-E5430-Manuel-du-proprietaire
Dell™ S2240L/S2340L Monitör Kullanıcı Kılavuzu
Dell PowerEdge Sistemleri İçin Microsoft Windows Server 2012 Önemli Bilgiler Kılavuzu
Dell-Guide-de-l-utilisateur-du-moniteur-Dell-S2240L-S2340L
Dell™ S320/S320wi Projektör Kullanım Kılavuzu
Dell-%20Vostro-270-Manuels
Dell-Vostro-3460-Manuel-du-proprietaire-Francais
Dell-Inspiron-9200-Manuel-de-l-utilisateur
Dell-Inspiron-2600-et-2650-Manuel-de-l-utilisateur
Dell-Axim-X30-Manuel-de-l-utilisateur
Dell-Vostro-2520-Manuel-du-proprietaire
Dell-Inspiron-1721-Manuel
Dell-Systemes-Dell-PowerEdge-T710-Manuel-du-proprietaire
Dell-Precision-Workstation-T5600-Manuel-du-proprietaire
Dell-Solutions-NAS-Dell-FluidFS-Manuel-du-proprietaire
Systemes-Dell-PowerEdge-C5220-Manuel-du-proprietaire-du-materiel
Dell-Dimension-3000-Manuel-du-proprietaire
Dell-PowerEdge-R210-Technical-Guide
Dell-Inspiron-Manuels
Dell-Manuel-du-proprietaire-du-Dell-Vostro-1700
Dell-Clavier-sans-fil-et-souris-Dell-KM713-Manuel-de-l'utilisateur
Dell-Systeme-de-navigation-GPS-Dell-Manuel-de-l'utilisateur
Dell-Logiciel-de-gestion-de-l-onduleur-Manuel-de-l-utilisateur-pour-l-installation-et-la-configuration
Dell-Demarrage-rapide-du-moniteur-couleur-M990
Dell-Manuel-de-l-utilisateur-de-la-station-de-travail-Dell-Precision-370
Dell-Systemes-Dell-PowerEdge-2800-Guide-d-installation-et-de-depannage
Dell-Manuel-de-l-utilisateur-du-systeme-Dell-OptiPlex-SX280
Dell-Vostro-1440-1450-Manuel-de-l-utilisateur
Dell-Photo-Printer-540-Guide-de-l-utilisateur
Dell-Streak-7-Francais-Manuel-de-l-utilisateur
Dell-Venue-Pro-Manuel-de-l-utilisateur
Dell-Imprimante-laser-personnelle-Dell-P1500-Manuel-du-proprietaire
Dell-PowerEdge-C5125-Manuel-du-proprietaire-du-materiel
Dell-Latitude-D630-Manuels
Dell-Vostro-400-Manuel-du-proprietaire-Mini-Tower
Dell-Systemes-Dell-PowerEdge-T100-Manuel-du-proprietaire
Dell-OptiPlex-9010-7010-compact-Manuel-du-proprietaire
Dell-PowerVault%20NX3200-Manuel-du-proprietaire
Dell-Inspiron-1200-et-2200-Manuel-de%20l-utilisateur
Dell-Vostro-1540-1550-Manuel-du-proprietaire
Dell-Inspiron-8600-Manuel-du-proprietaire
Dell-PowerVault-Baie-de-stockage-MD1120-Manuel-du-proprietaire
Dell-Dimension-E521-Manuel-du-proprietaire
Dell-Inspiron-9100-Manuel-du-proprietaire
Dell-Vostro-3360-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T300-Manuel-du-proprietaire
Dell-XPS-One-2710-manuel-d-utilisation
Dell-Inspiron-1150-Manuel-du-proprietaire
Dell-Latitude-E5530-Manuel-du-proprietaire
Dell-Inspiron-660-Manuel-du-proprietaire
Acceder-au-site-Dell
Dell-Manuel-du-proprietaire-des-Dell-Latitude-E6420-et-E6420-ATG-Francais
Dell-OptiPlex-9010-Tout-en-un-Manuel-du-proprietaire
Dell-Vostro-3560-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T110-Manuel-du-proprietaire
Dell-server-poweredge-m710-tech-guidebook_fr
Dell-Systemes-Dell-PowerEdge-R420-Manuel-du-proprietaire
Dell-Latitude-5420-E5420-E5420m-Manuel-de-l-utilisateur
Dell-Latitude-E6320-Manuel-de-l-utilisateur
Dell-Systemes-Dell-Inspiron-8200-Manuel-de-l-utilisateur-Francais
Dell-server-poweredge-r610-tech-guidebook_fr
Dell-server-poweredge-t710-technical-guide-book_fr
Dell-server-poweredge-m1000e-tech-guidebook_fr
Dell-server-poweredge-m610-tech-guidebook_fr
Dell-poweredge-r210-technical-guidebook-en_fr
Dell-MANUEL-ALIENWARE-M15x-MOBILE-Manuel-de-l-utilisateur
Dell-Axim-X51-X51v-Manuel-de-l-utilisateur
Dell-Beats-By-dr.dre-Manuel-et-Garantie
Dell-Dimension-3100C-Manuel-du-proprietaire
Dell-Precision-Workstation-T3600-Manuel-du-proprietaire
Dell-Vostro-200-Manuel-du-proprietaire-Slim-Tower
Dell-ALIENWARE-MANUEL-DE-L-ORDINATEUR-DE-BUREAU
Dell-OPENMANAGE-POWER-CENTER-1-1-Guide-d-utilisation
Dell-Vostro-360-Proprietaire-du-manuel
Dell-Dimension-3100C-Manuel-du-proprietaire
AlienwareArea-51Area-51ALX
Dell-Ordinateurs-de-Bureau-PC-Portables-Netbooks/AlienwareAurora-R3
AlienwareAurora-R4
lienwareAuroraAuroraALXAurora-R2
Chassis-RAID-Dell-PowerVault-MD3000i-Manuel-du-proprietaire
Dell-Axim-X50-Manuel-du-proprietaire
Dell-Axim-X51-X51v-Manuel-du-proprietaire
Dell-Baie-de-stockage-Dell-PowerVault-MD1000-Manuel-du-proprietaire
Dell-Boîtier-Dell-PowerEdge-M1000e-Manuel-du-proprietaire
Dell-Clavier-Axim-Manuel-du-proprietaire
Dell-Dimension-3100-E310-Manuel-du-proprietaire
Dell-Dimension-9200-Manuel-du-proprietaire
Dell-Dimension-E520-Manuel-du-proprietaire
Dell-Imprimante-laser-Dell-1100-Manuel-du-proprietaire
Dell-Imprimante-laser-de-groupe-de-travail-Dell-M5200-Manuel-du-proprietaire
Dell-Imprimante-laser-monochrome-Dell-5330dn-Mode-d-emploi
Dell-Imprimante-laser-multifonction-Dell-1600n-Manuel-du-proprietaire
Dell-Inspiron-13z-Manuel-du-proprietaire
Dell-Inspiron-17R-Manuel-du-proprietaire
Dell-Inspiron-530s-Manuel-d-utilisation
Dell-Inspiron-530s-Manuel-du-proprietaire
Dell-Inspiron-700m-Manuel-du-proprietaire
Dell-Inspiron-1100-Manuel-d-utilisation
Dell-Inspiron-1525-1526-Manuel-du-proprietaire
Dell-Inspiron-5100-et-5150-Manuel-d-utilisation
Dell-Inspiron-9300-Manuel-du-proprietaire
Dell-Inspiron-9400-E1705-Manuel-du-proprietaire
http://www.audentia-gestion.fr/Dell-Ordinateurs-de-Bureau-PC-Portables-Netbooks/Dell-Laser-Printer-1700-1700n-Manuel-du-proprietaire.htm
Dell-Laser-Printer-1710-1710n-Manuel-du-proprietaire
Dell-Laser-Printer-3100cn-manuel-du-proprietaire
Dell-Latitude-ST-Manuel-du-proprietaire
Dell-Latitude-XT3-Manuel-du-proprietaire
Dell-Liste-des-manuels-et-de-la-documentation-Dell
Dell-MANUEL-ALIENWARE-M11x-MOBILE-Manuel-du-proprietaire
Dell-MANUEL-ALIENWARE-M15x-MOBILE
Dell-MANUEL-D-ALIENWARE-M17x-MOBILE-francais
Dell-MANUEL-D-ALIENWARE-M17x-MOBILE
Dell-Manuel-d-utilisation-Dell-Inspiron-M5040-15-N5040-15-N5050
Dell-Manuel-d-utilisation-du-Dell-XPS-420
Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6220
Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6520
Dell-Manuel-de-l-utilisateur-Dell-Latitude-E6320
Dell-Manuel-de-maintenance-Dell-Inspiron-N5110
Dell-Manuel-du-proprietaire-Dell-Vostro-1500
Dell-Manuel-du-proprietaire-Dell-XPS-M1330
Dell-Manuel-du-proprietaire-des-Dell-Latitude-E6420-et-E6420-ATG
Dell-Manuel-du-proprietaire-du-Dell-Inspiron-1721
Dell-Manuel-du-proprietaire-du-Dell-XPS-M1730
Dell-Manuel-du-proprietaire-du-Dell-XPS-One
Dell-Matrices-de-stockage-Dell-PowerVault-MD3260i-Series-Guide-de-deploiement
Dell-Matrices-de-stockage-Dell-PowerVault-MD3660i-Series-Guide-de-deploiement
Dell-Photo-All-In-One-Printer-944-Manuel-du-proprietaire
Dell-Photo-All-In-One-Printer-964-Manuel-du-proprietaire
Dell-Photo-All-In-One-Printer%20942-Manuel-du-proprietaire
Dell-Photo-Printer-720-Manuel-du-proprietaire
Dell-PowerEdge-C8220-Manuel-du-proprietaire
Dell-PowerEdge-R620-Manuel-du-proprietaire
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Guide-de-l-administrateur
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Manuel-du-proprietaire
Dell-PowerVault-NX400-Guide-de-mise-en-route
Dell-Precision-Workstation-T7600-Manuel-du-proprietaire
Dell-Streak-7-Manuel-de-l-utilisateur
Dell-Streak-Manuel-d-utilisation
Dell-Systemes-Dell-Inspiron-4150-Manuel-de-l-utilisateur
Dell-Systemes-Dell-Inspiron-8200-Manuel-de-l-utilisateur
Dell-Systemes-Dell-PowerEdge-1950-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-M420-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R210-II-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R410-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R710-Manuel-du-proprietaire%20-Manuel-d-utilisation
Dell-Systemes-Dell-PowerEdge-T310-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T420-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T620-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerVault-NX400-Manuel-du-proprietaire
Dell-Tout-en-un-Dell-Photo-924-Manuel-du-proprietaire
Dell-Vostro-360-Proprietaire-du-manuel
Dell-Vostro-3750-Manuel-du-proprietaire
Dell-Vostro-V131-Manuel-du-proprietaire
Dell-XP-M1530-Manuel-du-proprietaire
Dell-XPS-630i-Manuel-du-proprietair
Dell-moniteur-D1920-Manuel-du-proprietaire
DellDimension1100Series
Imprimante-Dell-Photo-All-In-One-Printer-922-Manuel-du-proprietaire
Imprimante-laser-de-groupe-de-travail-Dell-S2500-Manuel-du-proprietaire
Imprimante-personnelle-Dell-AIO-A960-Manuel-du-proprietaire
alienwareX51
Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6220
Dell-Systemes-Dell-PowerEdge-T420-Manuel-du-proprietaire
Dell-Systemes-Dell-Inspiron-4150-Manuel-de-l-utilisateur
Dell-Streak-Manuel-d-utilisation
Dell-Manuel-du-proprietaire-du-Dell-XPS-M1730
Dell-Photo-All-In-One-Printer-944-Manuel-du-proprietaire
Dell-Manuel-du-proprietaire-du-Dell-XPS-One
Dell-Clavier-Axim-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R410-Manuel-du-proprietaire
Dell-Manuel-d-utilisation-Dell-Inspiron-M5040-15-N5040-15-N5050
Dell-Manuel-de-maintenance-Dell-Inspiron-N5110
Dell-Inspiron-1100-Manuel-d-utilisation
Dell-Imprimante-laser-de-groupe-de-travail-Dell-M5200-Manuel-du-proprietaire
Dell-Photo-Printer-720-Manuel-du-proprietaire
Dell-Imprimante-laser-Dell-1100-Manuel-du-proprietaire
Dell-Manuel-du-proprietaire-Dell-Vostro-1500
Dell-XP-M1530-Manuel-du-proprietaire
Dell-Inspiron-530s-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R710-Manuel-du-proprietaire-Manuel-d-utilisation
Dell-Inspiron-5100-et-5150-Manuel-d-utilisation
Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6520
Dell-MANUEL-D-ALIENWARE-M17x-MOBILE
Dell-Manuel-de-l-utilisateur-Dell-Latitude-E6320
Dell-Laser-Printer-3100cn-manuel-du-proprietaire
Dell-Inspiron-530s-Manuel-d-utilisation
Dell-Systemes-Dell-PowerEdge-1950-Manuel-du-proprietaire
Dell-Manuel-du-proprietaire-des-Dell-Latitude-E6420-et-E6420-ATG
Dell-Imprimante-laser-monochrome-Dell-5330dn-Mode-d-emploi
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Guide-de-l-administrateur
Dell-PowerVault-NX400-Guide-de-mise-en-route
Dell-Matrices-de-stockage-Dell-PowerVault-MD3260i-Series-Guide-de-deploiement
Dell-PowerEdge-C8220-Manuel-du-proprietaire
Dell-MANUEL-ALIENWARE-M11x-MOBILE-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-M420-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerVault-NX400-Manuel-du-proprietaire
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Manuel-du-proprietaire
Dell-Matrices-de-stockage-Dell-PowerVault-MD3660i-Series-Guide-de-deploiement
Dell-Laser-Printer-1700-1700n-Manuel-du-proprietaire
Dell-Inspiron-9400-E1705-Manuel-du-proprietaire
Dell-Tout-en-un-Dell-Photo-924-Manuel-du-proprietaire
Dell-Laser-Printer-1710-1710n-Manuel-du-proprietaire
Dell-Dimension-3100-E310-Manuel-du-proprietaire
Dell-Inspiron-1525-1526-Manuel-du-proprietaire
Dell-PowerEdge-R815-..> 08-May-2013 10:52 4.3M
Dell-Inspiron-1521-M..> 08-May-2013 10:51 2.9M
Dell-PowerEdge-R900-..> 08-May-2013 10:50 3.1M
Dell-Vostro-270-Manu..> 08-May-2013 10:50 3.2M
Dell-XPS-630-Manuels..> 08-May-2013 10:49 3.6M
Dell-XPS-M1730-Manue..> 08-May-2013 10:49 3.9M
Dell-Vostro-200-Manu..> 08-May-2013 10:48 4.5M
Dell-Vostro-410-Manu..> 08-May-2013 10:48 4.1M
Dell-Vostro-1700-Man..> 08-May-2013 10:47 4.8M
Dell-Inspiron-m301z-..> 08-May-2013 10:47 4.8M
Dell-Studio-Slim-Man..> 08-May-2013 10:45 5.1M
Dell-Windows-8-Manue..> 08-May-2013 10:45 5.1M
Dell-PowerEdge-R620-..> 08-May-2013 08:46 4.1M
Dell-PowerEdge-R200-..> 08-May-2013 08:46 2.6M
Dell-Inspiron-640M-M..> 08-May-2013 08:46 3.7M
Dell-Inspiron-600m-M..> 08-May-2013 08:45 2.6M
Dell-Studio-Desktop-..> 08-May-2013 08:44 2.7M
Dell-Vostro-1000-Man..> 08-May-2013 08:44 2.7M
Dell-Inspiron-15-Int..> 08-May-2013 08:44 3.0M
Dell-Alienware-Area-..> 08-May-2013 08:43 3.1M
Dell-DR4000-Manuels.htm 08-May-2013 08:43 3.4M
Dell-Alienware-M15x-..> 08-May-2013 08:42 3.3M
Dell-Latitude-XT2-Ma..> 08-May-2013 08:42 3.5M
Dell-Latitude-E5520-..> 08-May-2013 08:41 3.5M
Dell-OptiPlex-745-Ma..> 08-May-2013 08:40 3.9M
Dell-Inspiron-1525-M..> 08-May-2013 08:40 3.9M
Dell-Inspiron-One-23..> 08-May-2013 08:39 4.2M
Dell-Inspiron-One-23..> 08-May-2013 08:39 2.8M
Dell-Inspiron-510m-M..> 08-May-2013 08:38 3.2M
Dell-Inspiron-Duo-Ma..> 08-May-2013 08:38 3.0M
Dell-Vostro-1550-Man..> 08-May-2013 08:37 3.4M
Dell-Precision-T5600..> 08-May-2013 08:37 3.3M
Dell-Dimension-8300-..> 07-May-2013 22:03 2.5M
Dell-Latitude-Cpi-Ma..> 07-May-2013 22:01 3.2M
Dell-Alienware-Area-..> 07-May-2013 22:01 3.2M
Dell-Latitude-D620-M..> 07-May-2013 22:00 2.3M
Dell-PowerEdge-1950-..> 07-May-2013 22:00 2.2M
Dell-Precision-T5600..> 07-May-2013 21:30 3.1M
Dell-PowerEdge-R720x..> 07-May-2013 21:26 3.1M
Dell-Inspiron-500m-M..> 07-May-2013 21:26 2.8M
Dell-PowerEdge-R815-..> 07-May-2013 21:25 2.8M
Dell-Alienware-M15x-..> 07-May-2013 21:25 2.8M
Dell-Vostro-3450-Man..> 07-May-2013 21:24 2.8M
Dell-PowerEdge-R610-..> 07-May-2013 21:24 2.9M
Dell-Vostro-3750-Man..> 07-May-2013 21:23 3.0M
Dell-Studio-1555-15-..> 07-May-2013 21:23 3.1M
Dell-Manuel-de-maint..> 07-May-2013 21:22 3.0M
Dell-Latitude-E6420-..> 07-May-2013 21:22 3.1M
Dell-Inspiron-1520-M..> 07-May-2013 21:21 2.0M
Dell-Aztech-MDP3900-..> 07-May-2013 21:21 2.0M
Dell-PowerEdge-M905-..> 07-May-2013 21:21 2.0M
Dell-PowerEdge-400SC..> 07-May-2013 21:21 2.1M
Dell-Precision-M4500..> 07-May-2013 21:20 2.2M
Dell-Vizioncore-Manu..> 07-May-2013 21:20 2.1M
Dell-Inspiron-1520-2..> 07-May-2013 21:19 2.5M
Dell-Guide-Utilisate..> 07-May-2013 21:19 2.4M
Dell-PowerEdge-R510-..> 07-May-2013 21:18 2.7M
Dell-Manuel-d-Utilis..> 07-May-2013 21:18 2.4M
Dell-PowerEdge-300-M..> 06-May-2013 19:33 4.7M
Dell-Lifecycle-Contr..> 06-May-2013 19:32 4.3M
Dell-PowerVault-110T..> 06-May-2013 19:31 4.4M
Dell-Inspiron-620-Ma..> 06-May-2013 19:10 3.2M
Dell-Dimension-5100-..> 06-May-2013 19:10 3.4M
Dell-Manuels-et-docu..> 06-May-2013 19:09 3.7M
Dell-Manuels-et-docu..> 06-May-2013 19:09 3.5M
Dell-1130-Dell-1130n..> 06-May-2013 18:42 3.1M
Code-Promo-Dell.htm 04-Feb-2013 09:17 1.0M
Sony-NV-U83N-Manuels..> 02-Feb-2013 09:00 5.0M
Dell-Sansa-Clip-MP3-..> 27-Nov-2012 09:15 3.0M
Dell-TSi-500-TSi-400..> 27-Nov-2012 09:15 1.0M
Dell-Vostro-3360-Man..> 27-Nov-2012 09:10 2.6M
Dell-Inspiron-5100-e..> 27-Nov-2012 09:09 2.8M
Dell-Systemes-Dell-P..> 27-Nov-2012 09:09 3.1M
Dell-1815dn-Manuel ..> 27-Nov-2012 09:09 3.5M
Dell-PowerVault-MD32..> 27-Nov-2012 09:08 1.7M
Dell-Multifunktionsp..> 27-Nov-2012 09:07 2.4M
Dell-PowerVault-MD32..> 27-Nov-2012 09:07 2.0M
Dell-Inspiron-1150-M..> 27-Nov-2012 09:07 2.8M
Dell-PowerEdge-C8220..> 27-Nov-2012 09:07 2.6M
Dell-Systemes-Dell-P..> 27-Nov-2012 09:06 2.5M
Dell-PowerVault-MD32..> 27-Nov-2012 09:06 1.8M
Dell-Systemes-Dell-P..> 27-Nov-2012 07:42 3.0M
Dell-Matrices-de-sto..> 27-Nov-2012 07:40 3.5M
Dell-Systemes-Dell-D..> 27-Nov-2012 07:40 3.8M
Dell-Console-de-gest..> 27-Nov-2012 07:40 3.9M
Dell-Logiciel-de-ges..> 27-Nov-2012 07:26 2.9M
Dell-MANUEL-ALIENWAR..> 27-Nov-2012 07:20 2.6M
Dell-Axim-X51-X51v-M..> 27-Nov-2012 07:18 2.5M
Dell-Dimension-9150-..> 27-Nov-2012 07:07 2.3M
Lien-Manuels-Utilisa..> 19-Nov-2012 07:12 92K
Dell-XPS-600-francai..> 19-Nov-2012 06:29 2.1M
Dell-XPS-430-francai..> 19-Nov-2012 06:24 1.8M
Dell-XPS-420-francai..> 18-Nov-2012 21:25 3.8M
Dell-XPS-410-Anglais..> 18-Nov-2012 21:25 3.4M
Dell-Dimension-9200C..> 18-Nov-2012 21:03 3.1M
Dell-Dimension-1000-..> 18-Nov-2012 20:57 2.9M
Dell-Alienware-Auror..> 18-Nov-2012 20:49 2.3M
Dell-Alienware-Area-..> 18-Nov-2012 20:45 1.8M
Dell-Alienware-Area-..> 18-Nov-2012 20:44 1.9M
Dell-Alienware-Area-..> 18-Nov-2012 20:44 1.9M
Dell-Alienware-Auror..> 18-Nov-2012 20:44 1.9M
Dell-Alienware-Auror..> 18-Nov-2012 20:43 2.3M
Dell-Alienware-Auror..> 18-Nov-2012 20:43 2.2M
Dell-OpenManage-Remo..> 14-Nov-2012 22:12 4.9M
Dell-OpenManage-Serv..> 14-Nov-2012 22:12 5.0M
Dell-Media-Center-Gu..> 14-Nov-2012 22:11 1.6M
Dell-Systemes-Dell-P..> 14-Nov-2012 21:42 3.2M
Dell-E-Legacy-Extend..> 14-Nov-2012 21:40 2.8M
Dell-Dimension-XPS-M..> 14-Nov-2012 21:39 3.0M
Dell-Adaptateurs-Del..> 14-Nov-2012 21:39 3.1M
Dell-Axim-X3-Guide-d..> 14-Nov-2012 21:38 3.4M
Dell-Guide-d-utilisa..> 14-Nov-2012 21:38 4.1M
Dell-OpenManage-Serv..> 14-Nov-2012 21:38 3.7M
Dell-Latitude-D531-G..> 14-Nov-2012 21:36 4.7M
Dell-Latitude-D430-G..> 14-Nov-2012 21:36 4.4M
Dell-Inspiron-1501-M..> 14-Nov-2012 21:06 5.1M
Dell-Systemes-Dell-D..> 14-Nov-2012 21:05 2.6M
Dell-Guide-d-utilisa..> 14-Nov-2012 21:05 3.6M
Dell-PowerEdge-T110-..> 14-Nov-2012 21:04 3.6M
Dell-Guide-d-utilisa..> 14-Nov-2012 21:03 4.1M
Dell-XPS-M1710-Manue..> 14-Nov-2012 21:03 4.4M
Dell-Ordinateurs-por..> 14-Nov-2012 21:02 4.8M
Dell-Studio-GUIDE-DE..> 14-Nov-2012 21:01 5.5M
Dell-Inspiron-1420-M..> 14-Nov-2012 21:01 5.4M
Dell-Systemes-Dell-P..> 14-Nov-2012 21:00 2.4M
Dell-Latitude-D830-G..> 14-Nov-2012 20:59 2.2M
Dell-Systemes-Dell-P..> 14-Nov-2012 20:59 2.4M
Dell-Dimension-1100-..> 14-Nov-2012 12:08 3.6M
Dell-Inspiron-One-23..> 14-Nov-2012 12:08 3.7M
Dell-Manuel-de-maint..> 14-Nov-2012 12:07 3.8M
Dell-Photo-All-in-On..> 14-Nov-2012 12:06 4.0M
Dell-Carte-de-gestio..> 14-Nov-2012 12:05 4.0M
Dell-Systemes-Dell-P..> 14-Nov-2012 12:05 4.3M
Dell-XPS-M1710-Manue..> 13-Nov-2012 09:56 3.4M
Dell-Inspiron-6400-E..> 13-Nov-2012 08:20 2.8M
Dell-Systemes-Dell-P..> 13-Nov-2012 08:19 3.4M
Dell-Inspiron-1300-B..> 13-Nov-2012 08:19 3.1M
Dell-OptiPlex-9010-7..> 13-Nov-2012 08:18 1.7M
Dell-Laser-Printer-5..> 13-Nov-2012 08:18 1.9M
Dell-XPS-710-H2C-Man..> 13-Nov-2012 08:18 2.5M
Dell-Inspiron-1520-M..> 13-Nov-2012 08:17 2.9M
Dell-Inspiron-1721-M..> 13-Nov-2012 08:17 3.2M
Dell-Inspiron-One-23..> 13-Nov-2012 08:16 3.3M
Dell-XPS-M2010-Manue..> 13-Nov-2012 08:16 3.7M
Dell-Inspiron-1000-M..> 13-Nov-2012 08:15 3.9M
Dell-Inspiron-8500-G..> 13-Nov-2012 08:14 4.1M
Dell-Inspiron-640M-E..> 13-Nov-2012 08:13 4.5M
Dell-Axim-X50-Manuel..> 13-Nov-2012 08:12 4.7M
Dell-Inspiron-300m-G..> 13-Nov-2012 08:12 2.0M
Dell-Inspiron-XPS-Ge..> 13-Nov-2012 08:11 2.2M
Dell-Inspiron-5160-M..> 13-Nov-2012 08:11 2.4M
Dell-Inspiron-8600-G..> 13-Nov-2012 08:11 2.7M
Dell-PowerVault-DL20..> 13-Nov-2012 08:11 2.9M
Dell-Imprimante-pers..> 13-Nov-2012 08:10 3.0M
Dell-Vostro-410-Guid..> 12-Nov-2012 17:26 2.4M
Dell-Manuel-de-l-Uti..> 12-Nov-2012 17:07 2.6M
Dell-Dimension-serie..> 12-Nov-2012 17:07 1.9M
Dell-xps-13-l321x_se..> 12-Nov-2012 17:00 1.9M
Dell-XPS-13-Manuel-d..> 12-Nov-2012 16:59 1.9M
Dell-Manuel-de-maint..> 12-Nov-2012 16:59 2.1M
Dell-Inspiron-2600-e..> 12-Nov-2012 16:59 2.3M
Dell-PowerVault-NX33..> 12-Nov-2012 16:58 2.6M
Dell-Pave-Tactile-Sa..> 12-Nov-2012 16:58 2.6M
Dell-poweredge-r520-..> 12-Nov-2012 16:58 2.7M
Dell-Inspiron-5423-O..> 12-Nov-2012 16:57 2.7M
Dell-Inspiron-3500-P..> 12-Nov-2012 16:57 2.7M
Dell-Inspiron-3000-S..> 12-Nov-2012 16:56 2.7M
Dell-Vostro-270-Owne..> 12-Nov-2012 16:56 2.8M
Dell-server-poweredg..> 12-Nov-2012 16:56 2.9M
Dell-PowerEdge-C6220..> 12-Nov-2012 16:55 3.2M
Dell-2145cn-Impriman..> 12-Nov-2012 16:55 3.6M
Dell-Dimension-Serie..> 12-Nov-2012 16:54 3.8M
Dell-PERC-6-i-PERC-6..> 12-Nov-2012 16:53 4.1M
Dell-Configuration-d..> 12-Nov-2012 16:53 4.1M
Dell-MANUEL-ALIENWAR..> 12-Nov-2012 16:51 2.1M
Dell-ALIENWARE-M18x-..> 12-Nov-2012 16:51 2.2M
Dell-MANUEL-DE-L-ORD..> 12-Nov-2012 16:51 2.3M
Dell-Carte-de-Gestio..> 06-Nov-2012 18:45 2.0M
Dell-Studio-XPS-1640..> 06-Nov-2012 18:40 2.7M
Dell-Studio-XPS-GUID..> 06-Nov-2012 18:40 2.3M
Dell-Storage-Center-..> 06-Nov-2012 11:43 3.7M
Dell-PowerEdge-T300-..> 06-Nov-2012 07:33 2.3M
Dell-Manual-del-prop..> 06-Nov-2012 07:33 2.4M
Dell-Manual-del-prop..> 06-Nov-2012 07:32 2.5M
Dell-PowerEdge-Syste..> 06-Nov-2012 07:32 2.7M
Dell-PowerEdge-R710-..> 06-Nov-2012 07:31 3.0M
Dell-S2440L-Monitor-..> 06-Nov-2012 07:31 3.0M
Dell-P1913-P1913S-P2..> 06-Nov-2012 07:31 2.0M
Dell-U2713HM-Flat-Pa..> 06-Nov-2012 07:30 2.0M
Dell-U2713HM-Flat-Pa..> 06-Nov-2012 07:30 2.0M
Dell-E1913S-E1913-E2..> 06-Nov-2012 07:29 2.1M
Dell-Latitude-ST-Kul..> 06-Nov-2012 07:29 2.1M
Dell-PowerEdge-R310-..> 06-Nov-2012 07:29 2.4M
Dell-Storage-Center-..> 06-Nov-2012 07:29 2.7M
Dell-Latitude-XT3-Ow..> 06-Nov-2012 07:28 1.7M
Dell-Manuel-de-maint..> 06-Nov-2012 07:28 1.8M
Dell-Vostro-3450-Man..> 06-Nov-2012 07:27 1.9M
Dell-Inspiron-14z-N4..> 06-Nov-2012 07:27 2.0M
Dell-Module-de-venti..> 06-Nov-2012 07:27 2.0M
Dell-Matrices-de-sto..> 06-Nov-2012 07:26 2.6M
Dell-Points-d-acces-..> 06-Nov-2012 07:26 2.0M
Dell-Guide-de-l-util..> 05-Nov-2012 18:31 4.2M
Dell-Boitiers-de-sto..> 05-Nov-2012 18:14 1.4M
Dell-Studio-One-GUID..> 05-Nov-2012 18:14 1.5M
Dell-Vostro-1310-151..> 05-Nov-2012 18:14 1.6M
Dell-Systemes-Dell-P..> 05-Nov-2012 18:13 1.9M
Dell-Modules-optique..> 05-Nov-2012 18:13 1.9M
Dell-PowerEdge-R900-..> 05-Nov-2012 18:13 2.2M
Dell-Latitude-E6520-..> 05-Nov-2012 18:13 2.0M
Dell-PowerEdge-2900-..> 05-Nov-2012 18:12 2.4M
Dell-Point-d-acces-D..> 05-Nov-2012 18:12 2.5M
Dell-B1260dn-Mode-d-..> 05-Nov-2012 18:11 2.7M
Dell-B1160-Dell-B116..> 05-Nov-2012 18:11 2.9M
Dell-OpenManage-Serv..> 05-Nov-2012 18:10 3.3M
Dell-PowerEdge-T310-..> 05-Nov-2012 18:10 3.6M
Dell-PowerEdge-R410-..> 05-Nov-2012 18:09 3.8M
Dell-Inspiron-Guide-..> 05-Nov-2012 18:08 1.3M
Dell-Guide-de-soluti..> 05-Nov-2012 17:29 3.8M
Adaptateurs-Brocade-..> 05-Nov-2012 15:05 3.6M
Dell-PowerEdge-R415-..> 05-Nov-2012 15:01 1.7M
Dell-PowerVault-MD-S..> 05-Nov-2012 15:01 1.7M
Dell-PowerEdge-2950-..> 05-Nov-2012 15:01 1.9M
Dell-PowerEdge-R710-..> 05-Nov-2012 15:00 1.9M
Dell-Server-PRO-Mana..> 05-Nov-2012 15:00 2.0M
Dell-PowerVault-NX20..> 05-Nov-2012 15:00 2.0M
Dell-PowerVault-MD11..> 05-Nov-2012 15:00 2.0M
Dell-SAS-RAID-Storag..> 05-Nov-2012 14:59 2.2M
Dell-Imprimante-lase..> 05-Nov-2012 14:59 2.2M
IOGEAR-Guide-d-insta..> 05-Nov-2012 14:58 2.3M
Dell-MANUEL-ALIENWAR..> 05-Nov-2012 14:58 2.4M
Dell-Guide-d-install..> 05-Nov-2012 14:58 2.8M
Dell-Inspiron-600m-M..> 05-Nov-2012 14:57 2.6M
Planification-du-dep..> 05-Nov-2012 14:57 3.1M
Dell-Vizioncore-vRep..> 05-Nov-2012 14:57 3.0M
Dell-Server-Deployme..> 05-Nov-2012 14:56 3.7M
Dell-Latitude-XT2-XF..> 05-Nov-2012 14:54 3.7M
Dell-Deploiement-de-..> 05-Nov-2012 12:15 2.6M
Dell-Setting-up-Your..> 05-Nov-2012 12:15 2.6M
Dell-PowerQuest-Data..> 05-Nov-2012 12:15 2.6M
Dell-Controleurs-Del..> 05-Nov-2012 12:14 2.8M
Dell-Systemes-Dell-P..> 05-Nov-2012 12:14 2.9M
Dell-Guide-de-demarr..> 05-Nov-2012 12:13 2.9M
Dell-Guide-de-config..> 05-Nov-2012 12:13 3.0M
Dell-Guide-d-utilisa..> 05-Nov-2012 12:12 3.0M
Dell-1250c-Color-Pri..> 05-Nov-2012 12:12 3.0M
Dell-XPS-600-Manuel-..> 05-Nov-2012 12:11 3.3M
Dell-Imprimante-lase..> 05-Nov-2012 12:11 3.4M
Dell-Systemes-Dell-P..> 05-Nov-2012 12:10 3.8M
Dell-Photo-All-In-On..> 05-Nov-2012 12:10 3.6M
Dell-Studio-XPS-Setu..> 05-Nov-2012 12:09 1.3M
Dell-XPS-13-Kullanı..> 05-Nov-2012 12:09 1.4M
Dell-XPS-13-Chinois-..> 05-Nov-2012 12:08 1.6M
Dell-XPS-13-Arabe-Ma..> 05-Nov-2012 12:08 1.5M
Dell-Setting-up-Your..> 05-Nov-2012 10:08 1.9M
Dell-Setting-up-Your..> 05-Nov-2012 10:08 1.9M
Dell-Vizioncore-vCon..> 05-Nov-2012 10:08 2.4M
Dell-Cartes-controle..> 05-Nov-2012 10:08 2.0M
Dell-Guide-de-l-util..> 05-Nov-2012 09:06 1.9M
Dell-Bandotheques-De..> 05-Nov-2012 09:03 2.1M
Dell-S320-S320wi-Pro..> 05-Nov-2012 09:02 1.7M
Dell-PowerEdge-RAID-..> 05-Nov-2012 09:02 2.4M
Dell-Matrices-de-sto..> 05-Nov-2012 09:02 2.2M
Dell-Vizioncore-vRan..> 05-Nov-2012 09:01 2.6M
Dell-Cartes-d-extens..> 05-Nov-2012 09:01 2.6M
Dell-Guide-technique..> 05-Nov-2012 09:00 3.2M
Dell-Onduleur-en-Bai..> 05-Nov-2012 09:00 2.7M
Dell-Matrices-de-sto..> 05-Nov-2012 08:59 3.7M
Dell-Setting-up-Your..> 05-Nov-2012 08:59 3.2M
Dell-Systemes-Dell-P..> 05-Nov-2012 08:58 4.2M
Dell-Guide-d-utilisa..> 05-Nov-2012 08:58 4.1M
Dell-M5200-Carte-de-..> 05-Nov-2012 07:58 1.6M
Dell-XPS-L412z-Manue..> 05-Nov-2012 07:38 2.0M
Dell-XPS-GUIDE-DE-CO..> 05-Nov-2012 07:38 2.1M
Dell-Studio-XPS-8100..> 05-Nov-2012 07:38 2.1M
Dell-XPS-One-GUIDE-D..> 05-Nov-2012 07:37 2.2M
Dell-INSPIRON-Setup-..> 05-Nov-2012 07:32 2.3M
Dell-Inspiron-14R-M4..> 05-Nov-2012 07:32 2.4M
Dell-XPS-M1210-Owner..> 05-Nov-2012 07:32 2.7M
Dell-Inspiron-6000-M..> 05-Nov-2012 07:31 2.9M
Dell-Guide-de-l-util..> 05-Nov-2012 07:31 3.5M
Dell-PERC-6-i-PERC-6..> 05-Nov-2012 07:31 3.8M
Dell-Adaptateurs-Del..> 05-Nov-2012 07:30 3.9M
Dell-Guide-d-utilisa..> 05-Nov-2012 07:29 4.2M
Dell-DX-Object-Stora..> 04-Nov-2012 11:04 2.8M
Dell-PowerEdge-T620-..> 04-Nov-2012 11:04 2.8M
Dell-Guide-d-install..> 04-Nov-2012 11:03 2.9M
Dell-Dimension-XPS-G..> 04-Nov-2012 11:03 3.1M
Dell-Latitude-E6500-..> 04-Nov-2012 11:02 3.3M
Dell-PowerEdge-Expan..> 04-Nov-2012 11:02 3.5M
Dell-Matrices-de-sto..> 04-Nov-2012 11:01 3.6M
Dell-Matrices-de-sto..> 04-Nov-2012 11:01 3.7M
Dell-PowerVault-Data..> 04-Nov-2012 11:00 2.7M
Dell-PowerVault-Encr..> 04-Nov-2012 10:41 2.5M
Dell-APC-Smart-UPS-A..> 04-Nov-2012 10:41 2.6M
Dell-PowerVault-Data..> 04-Nov-2012 10:41 2.6M
Dell-PowerVault-Data..> 03-Nov-2012 21:47 2.0M
Dell-EqualLogic-Stor..> 03-Nov-2012 21:47 2.1M
Dell-Latitude-E4300-..> 03-Nov-2012 21:46 2.3M
Dell-Matrices-de-sto..> 03-Nov-2012 21:46 2.2M
Dell-OptiPlex-755-Gu..> 03-Nov-2012 21:12 5.7M
Dell-PowerEdge-C8000..> 03-Nov-2012 18:23 2.1M
Dell-PowerEdge-T420-..> 03-Nov-2012 18:19 2.1M
Dell-Commutateur-de-..> 03-Nov-2012 18:19 2.3M
Dell-INSPIRON-GUIDE-..> 03-Nov-2012 18:16 2.4M
Dell-Systemes-Dell-P..> 03-Nov-2012 18:15 2.4M
Dell-XPS 15-Manuel-d..> 03-Nov-2012 18:15 2.4M
Dell-PowerVault-DL-B..> 03-Nov-2012 18:12 2.6M
Dell-Laser-MFP-Dell-..> 03-Nov-2012 18:12 3.2M
Dell-Controleurs-RAI..> 03-Nov-2012 18:11 3.4M
Dell-PowerEdge-Expre..> 03-Nov-2012 18:11 1.7M
Dell-FluidFS-NAS-Sol..> 03-Nov-2012 18:10 2.1M
Dell-Projecteur-Dell..> 03-Nov-2012 18:10 1.8M
Dell-Projecteur-7700..> 03-Nov-2012 18:09 2.2M
Dell-Management-Plug..> 03-Nov-2012 18:09 2.5M
Dell-Integrated-Dell..> 03-Nov-2012 18:09 3.1M
Dell-Systemes-Dell-P..> 03-Nov-2012 18:08 2.6M
Dell-Systeme-Dell-DR..> 03-Nov-2012 18:08 3.6M
Dell-OpenManage-Serv..> 03-Nov-2012 18:07 3.3M
Dell-Utilitaires-de-..> 03-Nov-2012 18:06 3.8M
Dell-Systemes-Dell-P..> 03-Nov-2012 18:06 3.9M
Dell-PowerEdge-C410x..> 03-Nov-2012 18:05 4.0M
Dell-Systemes-Dell-P..> 03-Nov-2012 18:05 4.3M
Dell-Manuel-du-propr..> 03-Nov-2012 18:04 4.6M
Dell-Set-Up-Your-Com..> 03-Nov-2012 18:04 4.6M
Dell-Latitude-E5400-..> 03-Nov-2012 18:02 4.7M
Dell-Matrices-de-sto..> 03-Nov-2012 18:02 4.9M
Dell-Dimension-Serie..> 03-Nov-2012 18:01 5.1M
Dell-INSPIRON-GUIDE-..> 03-Nov-2012 11:09 3.0M
Dell-Moniteur-a-Dell..> 03-Nov-2012 11:09 3.1M
Dell-Systems-Service..> 03-Nov-2012 11:08 3.1M
Dell-Guide-de-l-util..> 03-Nov-2012 11:07 3.1M
Dell-Moniteur-a-Dell..> 03-Nov-2012 11:07 3.2M
Dell-Moniteur-a-ecra..> 03-Nov-2012 11:06 3.2M
Dell-PowerEdge-C410x..> 03-Nov-2012 11:06 3.3M
Dell-Matrices-de-sto..> 03-Nov-2012 11:05 3.4M
Dell-Precision-M4400..> 03-Nov-2012 11:05 1.5M
Dell-Systemes-Dell-P..> 03-Nov-2012 11:04 1.9M
Dell-PowerEdge-R320-..> 03-Nov-2012 11:04 1.5M
Dell-PowerEdge-R720-..> 03-Nov-2012 11:04 2.0M
Dell-Update-Packages..> 03-Nov-2012 11:04 1.9M
Dell-Micrologiciel-D..> 03-Nov-2012 08:46 2.9M
Dell-FluidFS-NAS-Sol..> 03-Nov-2012 08:45 3.0M
Dell-PowerEdge-RAID-..> 03-Nov-2012 08:44 3.2M
Dell-Systemes-Dell-P..> 03-Nov-2012 08:44 3.0M
Dell-Inspiron-15R-Ma..> 03-Nov-2012 08:43 3.5M
Dell-OpenManage-Serv..> 03-Nov-2012 08:43 3.4M
Dell-PowerEdge-M1000..> 03-Nov-2012 08:42 3.7M
Dell-OpenManage-Serv..> 03-Nov-2012 08:42 3.7M
Dell-PowerEdge-C8000..> 03-Nov-2012 08:30 2.3M
Dell-PowerEdge-R820-..> 03-Nov-2012 08:30 2.0M
Dell-PowerEdge-C8220..> 03-Nov-2012 08:29 2.5M
Dell-PowerEdge-R420-..> 03-Nov-2012 08:29 2.5M
Dell-Systemes-Dell-D..> 03-Nov-2012 08:28 2.8M
Dell-Precision-Works..> 03-Nov-2012 08:28 2.6M
Dell-PowerEdge-T320-..> 03-Nov-2012 08:27 2.8M
Dell-Systemes-Dell-D..> 03-Nov-2012 08:27 2.8M
Dell-Guide-de-l-util..> 03-Nov-2012 08:27 3.0M
Dell-Latitude-E6420-..> 03-Nov-2012 08:27 3.0M
Dell-Systeme-Dell-Po..> 02-Nov-2012 18:07 3.4M
Dell-Vostro-470-Manu..> 02-Nov-2012 18:07 3.5M
Dell-PowerVault-MD32..> 02-Nov-2012 18:07 3.4M
Dell-XPS-14-Manuel-d..> 02-Nov-2012 17:36 3.1M
Dell-Inspiron-One-20..> 02-Nov-2012 17:23 3.0M
Dell-Matrices-de-sto..> 02-Nov-2012 17:22 3.0M
Dell-PowerConnect-55..> 02-Nov-2012 17:22 3.8M
Dell-PowerVault-NX33..> 02-Nov-2012 17:21 1.7M
Dell-Upgrading-to-Ba..> 02-Nov-2012 17:21 1.4M
Dell-Projecteur-Dell..> 02-Nov-2012 17:20 1.8M
Dell-Vostro-470-Owne..> 02-Nov-2012 17:20 1.7M
Dell-Inspiron-14R-Ma..> 02-Nov-2012 17:20 2.2M
Dell-Systeme-Dell-Po..> 02-Nov-2012 17:20 2.1M
Dell-Vostro-270-Manu..> 02-Nov-2012 17:19 2.6M
Dell-PowerEdge-R820-..> 02-Nov-2012 17:19 2.5M
Dell-Inspiron-660s-M..> 02-Nov-2012 17:18 2.7M
Dell-Systemes-Dell-P..> 02-Nov-2012 17:18 2.8M
Dell-Inspiron-17R-Ma..> 02-Nov-2012 17:17 2.9M
Dell-Micrologiciel-D..> 02-Nov-2012 16:35 2.9M
Dell-PowerEdge-R720-..> 02-Nov-2012 16:34 2.8M
Dell-PowerEdge-R815-..> 02-Nov-2012 16:34 3.1M
Dell-Systemes-Dell-P..> 02-Nov-2012 16:33 3.5M
Dell-Systemes-Dell-P..> 02-Nov-2012 16:33 1.9M
Dell-PowerEdge-R905-..> 02-Nov-2012 16:32 2.2M
Dell-Systemes-Dell-P..> 02-Nov-2012 16:32 2.8M
Dell-Systemes-Dell-P..> 02-Nov-2012 16:32 2.5M
Dell-Systemes-Dell-P..> 02-Nov-2012 16:31 2.9M
Dell-HBA-SAS-Dell-Po..> 02-Nov-2012 16:31 2.9M
Dell-XPS-13-Owner-s-..> 02-Nov-2012 16:30 3.0M
Dell-Alienware-M17x-..> 02-Nov-2012 16:30 3.1M
Dell-Systemes-Dell-P..> 02-Nov-2012 16:29 3.4M
Dell-Emplacement-des..> 02-Nov-2012 16:29 3.1M
Dell-ALIENWARE-M17x-..> 02-Nov-2012 16:28 3.5M
Dell-Alienware-X51-O..> 02-Nov-2012 16:28 3.4M
Dell-Moniteur-a-Dell..> 02-Nov-2012 16:27 3.6M
Dell-Guide-de-l-Util..> 02-Nov-2012 16:27 3.5M
Dell-Systemes-Dell-P..> 02-Nov-2012 11:45 2.0M
Dell-FluidFS-NAS-Sol..> 02-Nov-2012 11:24 1.7M
Dell-Latitude-ST-Man..> 02-Nov-2012 11:23 3.8M
Dell-OptiPlex-360-Gu..> 02-Nov-2012 11:23 3.4M
Dell-Adaptateurs-Bro..> 02-Nov-2012 11:22 2.8M
Dell-XPS-13-Manuel-d..> 02-Nov-2012 11:22 2.9M
Dell-Guide-de-l-util..> 02-Nov-2012 11:21 3.2M
Dell-Solutions-NAS-D..> 02-Nov-2012 11:21 3.2M
Dell-OpenManage-Serv..> 02-Nov-2012 11:20 3.7M
Dell-Lifecycle-Contr..> 02-Nov-2012 11:20 3.5M
Dell-PowerEdge-RAID-..> 02-Nov-2012 10:08 2.4M
Dell-XPS-430-Guide-d..> 02-Nov-2012 10:08 2.4M
Dell-Imprimantes-las..> 02-Nov-2012 10:07 2.4M
Dell-Imprimantes-las..> 02-Nov-2012 10:07 2.4M
Dell-Guide-d-utilisa..> 02-Nov-2012 10:06 2.5M
Dell-Guide-d-utilisa..> 02-Nov-2012 10:06 2.4M
Dell-Vostro-1310-151..> 02-Nov-2012 10:06 2.6M
Dell-1235cn-Impriman..> 02-Nov-2012 10:06 3.0M
Dell-Guide-d-utilisa..> 02-Nov-2012 10:05 3.4M
Dell-2130cn-IMPRIMAN..> 02-Nov-2012 10:05 3.0M
Dell-Imprimante-pers..> 02-Nov-2012 09:44 2.7M
Dell-Systemes-Dell-P..> 02-Nov-2012 09:44 3.1M
Dell-Imprimante-lase..> 02-Nov-2012 09:44 2.9M
Dell-Guide d-install..> 02-Nov-2012 09:43 2.1M
Dell-PowerEdge-R810-..> 02-Nov-2012 09:43 2.0M
Dell-Inspiron-660s-M..> 02-Nov-2012 09:42 2.5M
Dell-Systemes-Dell-P..> 02-Nov-2012 09:42 2.4M
Dell-Systemes-Dell-P..> 02-Nov-2012 09:41 2.8M
Dell-Systemes-Dell-P..> 02-Nov-2012 09:41 3.1M
Dell-Systemes-Dell-P..> 02-Nov-2012 09:40 3.6M
Dell-Inspiron-600m-M..> 02-Nov-2012 09:40 3.3M
Dell-3D-VISION-MANUE..> 02-Nov-2012 09:39 1.8M
Dell-Manuel-de-maint..> 02-Nov-2012 09:39 1.7M
Dell-Manuel-d-utilis..> 02-Nov-2012 09:38 1.9M
Dell-Imprimante-coul..> 02-Nov-2012 09:38 1.9M
Dell-Projecteur-Dell..> 02-Nov-2012 09:38 2.0M
Dell-M770mm-Color-Mo..> 02-Nov-2012 09:37 2.1M
Dell-Precision-M6400..> 02-Nov-2012 09:37 2.1M
Dell-Manuel-du-propr..> 01-Nov-2012 19:14 2.6M
Dell-Systemes-Dell-P..> 01-Nov-2012 19:02 2.7M
Dell-Vostro-270-Manu..> 01-Nov-2012 19:02 2.7M
Dell-ALIENWARE-M17x-..> 01-Nov-2012 19:00 2.3M
Dell-Precision-Works..> 01-Nov-2012 18:46 3.3M
Dell-P513w-User-s-Gu..> 01-Nov-2012 18:46 2.8M
Dell-Serveur-de-sauv..> 01-Nov-2012 18:42 1.9M
Dell-Inspiron-660-ma..> 01-Nov-2012 18:42 2.0M
Dell-P513w-User-s-Gu..> 01-Nov-2012 18:42 2.3M
Dell-Studio-XPS-Guid..> 01-Nov-2012 18:41 2.9M
Dell-Latitude-D430-G..> 01-Nov-2012 18:41 3.2M
Dell-Systemes-Dell-P..> 01-Nov-2012 18:41 2.7M
Dell-Matrices-de-sto..> 01-Nov-2012 18:40 1.9M
Dell-Vostro-420-220-..> 01-Nov-2012 18:40 2.0M
Dell-Guide-de-l-admi..> 01-Nov-2012 18:39 2.2M
Dell-Guide-de-l-util..> 01-Nov-2012 18:39 2.1M
Dell-INSPIRON-DUO-GU..> 01-Nov-2012 18:38 2.2M
Dell-INSPIRON-DUO-SE..> 01-Nov-2012 18:38 2.3M
Dell-Adaptateur-hote..> 01-Nov-2012 18:38 2.3M
Dell-Studio-XPS-Setu..> 01-Nov-2012 18:38 2.4M
Dell-Client-Manageme..> 01-Nov-2012 18:37 2.5M
Dell-1230c-Imprimant..> 01-Nov-2012 18:37 2.6M
Dell-XPS-8500-Manuel..> 01-Nov-2012 18:36 2.7M
Dell-Station-de-trav..> 01-Nov-2012 18:36 2.3M
Dell-Inspiron-530-Se..> 29-Oct-2012 07:41 1.9M
Dell-Mobile-Jamz.htm 29-Oct-2012 07:41 1.6M
Dell-Systemes-Dell-P..> 29-Oct-2012 07:41 2.2M
Dell-Dimension-C521-..> 29-Oct-2012 07:41 1.9M
Dell-PowerEdge-R910-..> 29-Oct-2012 07:40 2.6M
Projecteur-Dell-1201..> 29-Oct-2012 07:40 2.3M
Dell-PowerEdge-R520-..> 29-Oct-2012 07:39 3.0M
Dell-ALIENWARE-MANUE..> 29-Oct-2012 07:39 2.7M
Dell-Inspiron-531-Ma..> 29-Oct-2012 07:38 2.7M
Dell-Vostro-200-Manu..> 29-Oct-2012 07:38 2.4M
Dell-Systemes -Dell ..> 29-Oct-2012 07:37 3.2M
Dell-Systemes-Dell-P..> 29-Oct-2012 07:37 3.0M
Dell-PowerEdge-C410x..> 29-Oct-2012 07:36 3.2M
Dell-Latitude-E5430-..> 26-Oct-2012 17:29 1.6M
Console-de-gestion-m..> 26-Oct-2012 14:51 3.3M
DELL-POWERVAULT-MD12..> 26-Oct-2012 14:50 3.3M
Dell-PowerEdge-R520-..> 26-Oct-2012 14:50 3.3M
Dell-PowerEdge-R620-..> 26-Oct-2012 14:49 3.3M
Dell-Ekran-Yönetici..> 26-Oct-2012 14:49 3.4M
Dell-PowerVault-MD36..> 26-Oct-2012 14:48 2.4M
Dell-PowerVault-MD36..> 26-Oct-2012 14:48 2.8M
Dell-OPENMANAGE-POWE..> 26-Oct-2012 14:47 2.7M
Dell-Vostro-3460-Man..> 26-Oct-2012 14:47 2.7M
Dell-Vostro-3460-Man..> 26-Oct-2012 14:46 2.7M
Dell- Vostro-270-Man..> 26-Oct-2012 14:46 2.8M
Dell-S320-S320wi-Pro..> 26-Oct-2012 14:45 2.9M
Dell-Guide-de-l-util..> 26-Oct-2012 14:45 2.0M
Dell-PowerEdge-Siste..> 26-Oct-2012 14:44 1.4M
Dell-S2240L-S2340L-M..> 26-Oct-2012 14:44 1.5M
Dell-Vostro-1540-155..> 26-Oct-2012 14:44 2.2M
Dell-PowerEdge-R720-..> 25-Oct-2012 18:33 2.5M
Dell-Inspiron-1720-m..> 25-Oct-2012 18:32 2.9M
DELL-OPTIPLEX580-TEC..> 25-Oct-2012 18:32 2.9M
Dell-Manuel-du-propr..> 25-Oct-2012 18:31 3.3M
Dell-Inspiron-Manuel..> 25-Oct-2012 18:31 3.3M
Dell-PowerEdge-R210-..> 25-Oct-2012 18:30 3.6M
Dell-Dimension-3000-..> 25-Oct-2012 18:30 3.5M
Systemes-Dell-PowerE..> 25-Oct-2012 18:29 2.8M
Dell-Solutions-NAS-D..> 25-Oct-2012 18:29 2.7M
Dell-Precision-Works..> 25-Oct-2012 12:10 2.0M
Dell-Systemes-Dell-P..> 25-Oct-2012 12:10 2.3M
Dell-Inspiron-1721-M..> 25-Oct-2012 12:09 2.7M
Dell-Vostro-2520-Man..> 25-Oct-2012 12:09 2.8M
Dell-Axim-X30-Manuel..> 25-Oct-2012 12:08 3.0M
Dell-Inspiron-2600-e..> 25-Oct-2012 12:08 3.2M
Dell-Inspiron-9200-M..> 25-Oct-2012 12:07 3.4M
Dell-Imprimante-lase..> 25-Oct-2012 12:07 2.1M
Dell-Venue-Pro-Manue..> 25-Oct-2012 12:06 2.4M
Dell-Streak-7-Franca..> 25-Oct-2012 12:06 2.3M
Dell-Photo-Printer-5..> 25-Oct-2012 12:06 2.6M
Dell-Vostro-1440-145..> 25-Oct-2012 12:05 2.5M
Dell-Manuel-de-l-uti..> 25-Oct-2012 12:05 2.9M
Dell-Systemes-Dell-P..> 25-Oct-2012 12:05 3.1M
Dell-Manuel-de-l-uti..> 25-Oct-2012 12:04 2.8M
Dell-Demarrage-rapid..> 25-Oct-2012 12:04 2.4M
Dellâ„¢ Logiciel-de..> 25-Oct-2012 12:03 2.8M
Dell-Systeme-de-navi..> 25-Oct-2012 12:02 3.2M
Dell-Clavier-sans-fi..> 25-Oct-2012 12:02 3.0M
Dell-Inspiron-1200-e..> 25-Oct-2012 09:48 2.4M
Dell-PowerVault NX32..> 25-Oct-2012 09:48 2.7M
Dell-OptiPlex-9010-7..> 25-Oct-2012 09:48 2.4M
Dell-Systemes-Dell-P..> 25-Oct-2012 09:47 2.0M
Dell-Vostro-400-Manu..> 25-Oct-2012 09:47 2.3M
Dell-Latitude-D630-M..> 25-Oct-2012 09:46 2.9M
Dell-PowerEdge-C5125..> 25-Oct-2012 09:46 2.5M
Dell-Inspiron-660-Ma..> 24-Oct-2012 09:15 2.3M
Dell-Latitude-E5530-..> 24-Oct-2012 09:15 2.4M
Dell-Inspiron-1150-M..> 24-Oct-2012 09:15 2.6M
Dell-XPS-One-2710-ma..> 24-Oct-2012 09:14 2.8M
Dell-Systemes-Dell-P..> 24-Oct-2012 09:14 3.1M
Dell-Inspiron-9100-M..> 24-Oct-2012 09:13 2.6M
Dell-Dimension-E521-..> 24-Oct-2012 09:12 2.9M
Dell-PowerVault-Baie..> 24-Oct-2012 09:12 3.0M
Dell-Inspiron-8600-M..> 24-Oct-2012 09:11 3.2M
Dell-OptiPlex-9010-T..> 24-Oct-2012 07:54 2.3M
Dell-Dimension-3100C..> 24-Oct-2012 07:42 2.7M
Dell-Beats-By-dr.dre..> 24-Oct-2012 07:42 2.7M
Dell-Axim-X51-X51v-M..> 24-Oct-2012 07:42 2.9M
Dell-MANUEL-ALIENWAR..> 24-Oct-2012 07:41 2.4M
Dell-poweredge-r210-..> 24-Oct-2012 07:41 2.5M
Dell-server-poweredg..> 24-Oct-2012 07:40 2.5M
Dell-server-poweredg..> 24-Oct-2012 07:40 2.6M
Dell-server-poweredg..> 24-Oct-2012 07:39 2.3M
Dell-server-poweredg..> 24-Oct-2012 07:39 2.4M
Dell-Systemes-Dell-I..> 24-Oct-2012 07:39 2.1M
Dell-Latitude-E6320-..> 24-Oct-2012 07:38 2.1M
Dell-Latitude-5420-E..> 24-Oct-2012 07:38 2.1M
Dell-server-poweredg..> 24-Oct-2012 07:37 1.9M
Dell-Systemes-Dell-P..> 24-Oct-2012 07:37 2.2M
Dell-Vostro-3560-Man..> 24-Oct-2012 07:37 1.9M
Dell-Manuel-du-propr..> 24-Oct-2012 07:36 2.2M
Acceder-au-site-Dell..> 24-Oct-2012 06:36 1.0M
Dell-Vostro-360-Prop..> 19-Oct-2012 07:42 1.7M
Dell-OPENMANAGE-POWE..> 19-Oct-2012 07:41 1.9M
Dell-ALIENWARE-MANUE..> 19-Oct-2012 07:41 2.0M
Dell-Vostro-200-Manu..> 19-Oct-2012 07:41 2.4M
Dell-Precision-Works..> 19-Oct-2012 07:41 2.1M
Dell-Streak-7-Manuel..> 18-Oct-2012 17:13 2.9M
Dell-Systemes-Dell-P..> 18-Oct-2012 17:13 3.6M
Dell-Manuel-du-propr..> 18-Oct-2012 17:13 2.9M
Dell-MANUEL-D-ALIENW..> 18-Oct-2012 17:12 3.1M
Dell-Inspiron-9300-M..> 18-Oct-2012 17:12 3.3M
Dell-Systemes-Dell-I..> 18-Oct-2012 17:11 3.6M
Dell-PowerEdge-R620-..> 18-Oct-2012 17:11 3.9M
Dell-Manuel-d-utilis..> 18-Oct-2012 17:10 3.1M
Dell-Precision-Works..> 18-Oct-2012 17:09 3.2M
Dell-Inspiron-13z-Ma..> 18-Oct-2012 17:09 3.3M
Dell-Systemes-Dell-P..> 18-Oct-2012 17:08 3.6M
Dell-Systemes-Dell-P..> 18-Oct-2012 17:08 2.6M
Dell-Boîtier-Dell-P..> 18-Oct-2012 17:07 2.7M
Dell-Manuel-du-propr..> 18-Oct-2012 17:07 3.1M
DELLmanuelsutilisate..> 18-Oct-2012 17:06 12M
Dell-Inspiron-5100-e..> 18-Oct-2012 17:05 4.4M
Dell-Manuel-de-l-Uti..> 18-Oct-2012 17:04 4.1M
Dell-MANUEL-D-ALIENW..> 18-Oct-2012 17:03 4.1M
Dell-Manuel-de-l-uti..> 18-Oct-2012 17:02 3.9M
Dell-Laser-Printer-3..> 18-Oct-2012 17:02 3.8M
Dell-Inspiron-530s-M..> 18-Oct-2012 17:01 3.7M
Dell-Liste-des-manue..> 18-Oct-2012 17:01 3.5M
Dell-Inspiron-530s-M..> 18-Oct-2012 17:00 3.5M
Dell-Vostro-V131-Man..> 18-Oct-2012 16:59 3.4M
DellDimension1100Ser..> 18-Oct-2012 16:59 3.4M
Dell-Vostro-3750-Man..> 18-Oct-2012 16:58 3.4M
Dell-Systemes-Dell-P..> 18-Oct-2012 16:58 3.4M
Imprimante-personnel..> 18-Oct-2012 16:57 3.4M
Dell-Inspiron-17R-Ma..> 18-Oct-2012 16:56 3.3M
Dell-PowerVault-NX40..> 18-Oct-2012 16:56 3.2M
Dell-Manuel-du-propr..> 18-Oct-2012 16:55 3.3M
Dell-Matrices-de-sto..> 18-Oct-2012 16:55 3.2M
Dell-Dimension-9200-..> 18-Oct-2012 16:54 3.2M
AlienwareAurora-R3.htm 18-Oct-2012 16:54 3.2M
Dell-Axim-X50-Manuel..> 18-Oct-2012 16:53 3.2M
Imprimante-laser-de-..> 18-Oct-2012 16:53 3.2M
Dell-Axim-X51-X51v-M..> 18-Oct-2012 16:52 3.2M
Dell-Systemes-Dell-P..> 18-Oct-2012 16:52 3.2M
AlienwareAuroraAuror..> 18-Oct-2012 16:51 3.1M
Dell-MANUEL-ALIENWAR..> 18-Oct-2012 16:51 3.1M
Dell-PowerEdge-C8220..> 18-Oct-2012 16:50 3.0M
Dell-Dimension-E520-..> 18-Oct-2012 16:50 3.0M
Chassis-RAID-Dell-Po..> 18-Oct-2012 16:49 3.0M
Dell-XPS-630i-Manuel..> 18-Oct-2012 16:49 3.0M
AlienwareAurora-R4.htm 18-Oct-2012 16:48 2.9M
Dell-Photo-All-In-On..> 18-Oct-2012 16:48 2.9M
Dell-Inspiron-700m-M..> 18-Oct-2012 16:47 2.9M
Dell-Systemes-Dell-I..> 18-Oct-2012 16:47 2.9M
Dell-Manuel-du-propr..> 18-Oct-2012 16:46 2.9M
Dell-Photo-Printer-7..> 18-Oct-2012 16:46 2.8M
Dell-PowerVault-MD32..> 18-Oct-2012 16:45 2.8M
Dell-Photo-All-In-On..> 18-Oct-2012 16:45 2.8M
Dell-Manuel-du-propr..> 18-Oct-2012 16:44 2.8M
Dell-Imprimante-lase..> 18-Oct-2012 16:44 2.8M
Dell-moniteur-D1920-..> 18-Oct-2012 16:43 2.7M
Dell-Systemes-Dell-P..> 18-Oct-2012 16:43 2.8M
Dell-Latitude-XT3-Ma..> 18-Oct-2012 16:42 2.7M
AlienwareArea-51Area..> 18-Oct-2012 16:42 2.7M
Dell-Imprimante-lase..> 18-Oct-2012 16:41 2.7M
Dell-Baie-de-stockag..> 18-Oct-2012 16:41 2.7M
Dell-Streak-Manuel-d..> 18-Oct-2012 16:40 2.7M
Imprimante-Dell-Phot..> 18-Oct-2012 16:39 2.6M
Dell-Systemes-Dell-P..> 18-Oct-2012 16:39 2.6M
Dell-Clavier-Axim-Ma..> 18-Oct-2012 16:38 2.6M
Dell-Latitude-ST-Man..> 18-Oct-2012 16:38 2.6M
Dell-Systemes-Dell-P..> 18-Oct-2012 16:38 2.5M
alienwareX51.htm 18-Oct-2012 16:37 2.5M
Dell-Manuel-du-propr..> 18-Oct-2012 16:37 2.5M
Dell-Systemes-Dell-P..> 18-Oct-2012 16:36 2.5M
Dell-Imprimante-lase..> 18-Oct-2012 16:36 2.5M
Dell-Photo-All-In-On..> 18-Oct-2012 16:35 2.3M
Dell-Manuel-de-maint..> 18-Oct-2012 16:35 2.2M
Dell-Manuel-d-utilis..> 18-Oct-2012 16:35 2.3M
Dell-PowerVault-MD32..> 18-Oct-2012 16:34 2.2M
Dell-XP-M1530-Manuel..> 18-Oct-2012 16:34 2.2M
Dell-Inspiron-1100-M..> 18-Oct-2012 16:33 2.2M
Dell-MANUEL-ALIENWAR..> 18-Oct-2012 16:33 2.1M
Dell-Matrices-de-sto..> 18-Oct-2012 16:33 2.1M
Dell-Inspiron-9400-E..> 18-Oct-2012 16:32 2.0M
Dell-Imprimante-lase..> 18-Oct-2012 16:32 1.9M
Dell-Laser-Printer-1..> 18-Oct-2012 16:32 1.6M
Dell-Inspiron-1525-1..> 18-Oct-2012 16:31 1.5M
Dell-Tout-en-un-Dell..> 18-Oct-2012 16:31 1.2M
Dell-Laser-Printer-1..> 18-Oct-2012 16:31 1.0M
Dell-Dimension-3100-..> 18-Oct-2012 16:31 906K
Dellt Tower UPS
500W, 1000W, and 1920/1500W
Getting Started With
Your System
Démarrage avec votre système
Erste Schritte Mit Ihrem System
Начало работы c вашей системой
Inicio de su sistema
系统使用 入门指南
系統使用 入門指南
사용자의 시스템 시작하기
はじめに システムについて
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.comDellt Tower UPS
500W, 1000W, and 1920/1500W
Getting Started
With Your System
Démarrage avec votre système
Erste Schritte Mit Ihrem System
Начало работы c вашей системой
Inicio de su sistema
系统使用 入门指南
系統使用 入門指南
사용자의 시스템 시작하기
はじめに システムについて
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.comNotes and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your software.
CAUTION: A CAUTION indicates a potentially hazardous situation which, if not avoided, may result in minor or
moderate injury or in property damage incidents.
WARNING: A WARNING indicates a potentially hazardous situation which, if not avoided, could result in death or
injury.
DANGER: A DANGER indicates an imminently hazardous situation which, if not avoided, will result in death or
serious injury.
DANGER: Observe the following instruction to help prevent an imminently hazardous situation which, if not
avoided, will result in death or serious injury:
S This UPS contains LETHAL VOLTAGES. All repairs and service should be performed by
AUTHORIZED SERVICE PERSONNEL ONLY. There are NO USER SERVICEABLE PARTS
inside the UPS.
Information in this document is subject to change without notice.
E 2009 Dell Inc. All rights reserved.
Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell and the DELL logo are trademarks of Dell Inc.; Phillipsis a registered trademark of Phillips Screw
Company.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their
products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
July 2009System Features |
1
System Features
Providing outstanding performance and reliability, the UPS's unique benefits include:
S Buck and Boost voltage regulation that ensures regulated voltage to your load by correcting voltage
fluctuations.
S Start-on-battery capability for powering up the UPS even if utility power is not available.
S Extended runtime with an optional External Battery Module (EBM) for 1000–1920W UPS
models.
S Two standard communication ports (USB and DB-9 serial port).
S Optional Dell Network Management Card with enhanced communication capabilities for
increased power protection and control.
S Network transient protector that guards your network communications equipment from surges.
S Advanced power management with the Dell UPS Management Software for graceful shutdowns
and power monitoring.
S Sequential shutdown and load management through separate receptacle groups called load
segments.
S Firmware that is easily upgradable without a service call.
S Backed by worldwide agency approvals.2 |
Finding Information
Finding Information
CAUTION: The Safety, Environmental, and Regulatory Information document provides important safety and
regulatory information.
What are You Looking For? Find It Here
S The user's guide for my UPS
S The user's guide for the Dell Network Management
Card
S Dell UPS Management Software
NOTE:Documentation and software updates can be
found at support.dell.com.
Dell UPS Disc
S Specifications
S How to configure UPS settings
S How to troubleshoot and solve problems
Dell UPS User's Guide
The user's guide is available on the Dell UPS disc and
on support.dell.com.
S Safety instructions
S Regulatory information
S Recycling information
Safety, Environmental, and Regulatory Information
S Warranty information
S Terms and Conditions (U.S. only)
S End User License Agreement
Dell Warranty and Support Information
S Support information Dell Support Website — support.dell.com
NOTE: Select your region or business segment to view
the appropriate support site.Installation and Startup |
3
Installation and Startup
CAUTION: Before performing the procedures in this document, read and follow the safety instructions and
important regulatory information in your Safety, Environmental, and Regulatory Information document.
CAUTION: The cabinet is heavy [500W: 11.6 kg (25.6 lb); 1000W: 18.3 kg (40.3 lb); 1920/1500W: 30.5 kg (67.2 lb)].
Use caution to unpack and move the cabinet.
This section describes the steps to set up your system for the first time.
Unpacking the System
1 Unpack your system and identify each item.
2 Discard or recycle the packaging in a responsible manner, or store it for future use.4 |
Installation and Startup
Identifying the UPS
This section shows a front and rear panel of the Dell Tower UPS. Refer to the Dell Line-Interactive
Tower UPS 500W, 1000W, and 1920/1500W User's Guide for all rear panel details.
Cover Latch
Cover Latch
LCD Panel
Scroll Button (Up or Back)
Select Button
Scroll Button (Down or Forward)
Figure 1. The Dell Tower UPS
Communication Port
Six 5-15 Receptacles
(Load Segment 1)
Network Transient
Protector
USB Port
UPS Communication Bay
On/Off Button
IEC-C14 Input
Connector
Two 5-15 Receptacles
(Load Segment 2)
EBM Connector
Figure 2. UPS Rear Panel (1000W, 120V Rear Panel)Installation and Startup |
5
Removing the UPS Front Cover
3 Remove the UPS front cover.
Push the two cover latches to release the front cover and pull up.
Removing the Battery Cover
4 Unscrew the thumbscrew on the the metal battery cover and lift up to remove the cover.6 |
Installation and Startup
Connecting the Internal Battery Connector
5 Connect the internal battery connector.
6 Replace the metal battery cover.
Torque the screw to 0.7 Nm (6.2 lb in).
7 Replace the UPS front cover.Installation and Startup |
7
Connecting the Equipment
9
Connect equipment to UPS
Connect communication cable from
computer to UPS (optional)
8
8 If you plan to use Dell UPS Management Software, connect your computer to the USB port or
RS-232 port using the supplied cable.
9 Plug the equipment to be protected into the UPS output receptacles, but do not turn on the
protected equipment.
NOTE: Verify that the total equipment ratings do not exceed the UPS capacity to prevent an overload alarm.8 |
Installation and Startup
Connecting the Power Cord
10 Verify that the power input to the UPS has adequate upstream overcurrent protection:
Table 1. Minimum Upstream Circuit Breaker Rating
UPS Output Power 120V 208V 230V
500W 15A — 15A
1000W 15A — 15A
1500W (at 100V)
1920W
20A — 15A
11 Plug the UPS power cord into a power outlet.
NOTE: For 1920/1500W models. There are two power cords in the box, one with BSMI and PSE certified
markings that can be used in Taiwan and Japan, another cord is for regions other than Taiwan and Japan.Installation and Startup |
9
Starting the UPS
12 Press the button on the UPS rear panel.
Completing the Startup
13 Verify that the Normal icon appears on the UPS status summary screen, indicating that the
UPS is operating normally and any loads are powered.
14 On the UPS status summary screen, press the button to check for active alarms or notices.
Resolve any active alarms before continuing. See “Troubleshooting” in the Dell Line-Interactive
Tower UPS 500W, 1000W, and 1920/1500W User's Guide.
If there are no active alarms, a “No Active Alarms” message appears.
15 To change other factory-set defaults, see “Operation” in the Dell Line-Interactive Tower UPS
500W, 1000W, and 1920/1500W User's Guide.10 |
Installation and StartupOnduleur Tour Dellt
500 W, 1000 W et 1920/1500 W
Démarrage
avec votre système
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.comRemarques et avertissements
REMARQUE : Une REMARQUE indique des informations importantes qui vous aident à mieux utiliser votre logiciel.
DANGER : Un DANGER indique une situation dangereuse imminente qui, si elle n'est pas évitée, provoquera la
mort ou une blessure grave.
AVERTISSEMENT : Un AVERTISSEMENT indique une situation dangereuse potentielle qui, si elle n'est pas évitée,
pourrait provoquer la mort ou une blessure.
ATTENTION : Une ATTENTION indique une situation dangereuse potentielle qui, si elle n'est pas évitée, peut
provoquer une blessure mineure ou légère ou des dommages matériels.
DANGER : Respectez les instructions suivantes pour aider à empêcher une situation dangereuse imminente qui, si
elle n'est pas évitée, peut provoquer la mort ou des blessures graves :
S Cet onduleur contient desTENSIONS MORTELLES. Toutes les réparations et tous
les entretiens devront être effectués UNIQUEMENT PAR UN PERSONNEL
D’ENTRETIEN AGRÉÉ. Aucune pièce à l’intérieur de cet onduleur NE PEUT
ÊTRE ENTRETENUE PAR L’UTILISATEUR.
Les informations dans ce document sont soumises à modifications sans préavis.
E 2009 Dell Inc. Tous droits réservés.
La reproduction de quelque manière que ce soit sans autorisation écrite de Dell Inc. est strictement interdite.
Marques commerciales utilisées dans ce texte : Dell et le logo DELL sont des marques commerciales de Dell Inc. ; Phillips est une marque
déposée de Phillips Screw Company.
D’autres marques commerciales et noms commerciaux peuvent être utilisés dans ce document pour se référer à des entités revendiquant les
marques et les noms ou leurs produits. Dell Inc. rejette tout intérêt propriétaire dans les marques commerciales et les noms commerciaux ne
lui appartenant pas.
Julliet 2009Caractéristiques du système |
13
Caractéristiques du système
Offrant une fiabilité et des performances remarquables, les avantages uniques de l'onduleur
comprennent :
S La régulation de tension Buck and Boost qui assure une tension régulée à votre charge en
corrigeant les fluctuations de tension.
S La capacité de démarrage-sur-batterie pour alimenter l'onduleur même si le courant du secteur
n'est pas disponible.
S Temps d'exécution prolongé avec un Module de batterie externe (EBM) en option pour les
modèles d'onduleur 1000–1920 W.
S Deux ports de communication standards (port série DB-9 et USB).
S Carte de gestion de réseau Dell optionnelle avec capacités de communication améliorées pour une
protection et un contrôle accrus de l'alimentation électrique.
S Protecteur de réseau contre les phénomènes transitoires qui protège votre équipement de
communication réseau contre les surtensions.
S Gestion avancée de l'alimentation électrique avec le Logiciel de gestion d'onduleur Dell pour des
coupures progressives et une surveillance de l'alimentation.
S Arrêt séquentiel et gestion de charge par des groupes de prises séparés appelés « segments de
charge ».
S Micrologiciel qui peut être facilement mis à niveau sans appeler le service technique.
S Soutenu par des approbations d'organismes dans le monde entier.14 |
Trouver des informations
Trouver des informations
ATTENTION! Le document Informations sur la sécurité, l'environnement et la réglementation fournit des
informations importantes sur la sécurité et la réglementation.
Que recherchez-vous ? Trouvez-le ici
S Le guide d'utilisation de mon onduleur
S Le guide d'utilisation de ma Carte de gestion de
réseau Dell
S Logiciel de gestion d'onduleur Dell
REMARQUE : Les mises à jour des documents et des
logiciels se trouvent sur support.dell.com.
Disque de l'onduleur Dell
S Spécifications
S Comment configurer les paramètres de l'onduleur
S Comment identifier et résoudre les problèmes
Guide d'utilisation de l'onduleur Dell
Le guide d'utilisation est disponible sur le disque de
l'onduleur Dell et sursupport.dell.com.
S Instructions sur la sécurit
S Informations sur la réglementation
S Informations sur le recyclage
Informations sur la sécurité, l'environnement et la
réglementation
S Informations sur la garantie
S Termes et conditions (États-Unis uniquement)
S Contrat de licence de l'utilisateur final
Informations sur l'assistance et la garantie Dell
S Informations sur l'assistance Site Internet d'assistance Dell — support.dell.com
REMARQUE : Sélectionnez votre région ou votre segment
commercial pour voir le site d'assistance approprié.Installation et démarrage |
15
Installation et démarrage
ATTENTION! Avant de réaliser les procédures de ce document, lisez et suivez les instructions de sécurité et
les informations importantes sur la réglementation qui figurent dans votre document Informations sur la
sécurité, l'environnement et la réglementation.
ATTENTION! Le module est lourd [500 W : 11,6 kg (25,6 lb) ; 1000 W : 18,3 kg (40,3 lb) ; 1920/1500 W :
30,5 kg (67,2 lb)]. Prenez toutes les précautions nécessaires pour déballer et déplacer le module.
Cette section décrit les étapes de configuration de votre système pour la première fois.
Déballage du système
1 Déballez votre système et identifiez chaque élément.
2 Jetez ou recyclez l'emballage d'une façon responsable, ou conservez-le pour une utilisation
ultérieure.16 |
Installation et démarrage
Identification de l'onduleur
Cette section montre un panneau avant et arrière de l'onduleur Tour Dell. Reportez-vous au Guide
d'utilisation de l'onduleur en baie Line-Interactive 500 W, 1000 W et 1920/1500 W pour tous les détails
sur le panneau arrière.
Loquet du couvercle
Loquet du couvercle
Panneau LCD
Bouton de défilement
(haut ou arrière)
Bouton de sélection
Bouton de défilement (bas ou avant)
Figure 1. Onduleur Tour Dell
Port de communication
Six prises 5-15
(Segment de charge 1)
Protecteur de réseau contre les
phénomènes transitoires
Port USB
Baie de communication de
l'onduleur
Bouton Marche/Arrêt
Connecteur d'entrée
CEI-C14
Deux prises 5-15
(Segment de charge 2)
Connecteur de l'EBM
Figure 2. Panneau arrière de l'onduleur (panneau arrière du 1000 W, 120 V)Installation et démarrage |
17
Retrait du couvercle avant de l'onduleur
3 Retirez le couvercle avant de l'onduleur.
Poussez les deux loquets du couvercle pour libérer le couvercle avant et levez.
Retrait du couvercle des batteries
4 Dévissez la vis à oreilles sur le couvercle métallique des batteries et levez pour retirer le couvercle.18 |
Installation et démarrage
Connexion du connecteur interne des batteries
5 Branchez le connecteur interne des batteries.
6 Remettez en place le couvercle métallique des batteries.
Serrez la vis à un couple de 0,7 N·m (6,2 lb in).
7 Remettez en place le couvercle avant de l'onduleur.Installation et démarrage |
19
Connexion de l'équipement
9
Connectez l'équipement à l'onduleur
Connectez le câble de communication de
l'ordinateur à l'onduleur (en option)
8
8 Si vous prévoyez d'utiliser le Logiciel de gestion d'onduleur Dell, connectez votre ordinateur au
port USB ou RS-232 en utilisant le câble fourni.
9 Branchez l'équipement à protéger sur les prises de sortie de l'onduleur, mais ne mettez pas
l'équipement à protéger sous tension.
REMARQUE: Pour éviter une alarme de surcharge, vérifiez que les valeurs nominales totales de l'équipement
ne dépassent pas la capacité de l'onduleur.20 |
Installation et démarrage
Connexion du cordon d'alimentation
10 Vérifiez que l'entrée d'alimentation de l'onduleur possède une protection contre les surintensités
montantes compatible avec la valeur nominale de l'intensité pouvant être acheminée par le
cordon d'alimentation.
11 Vérifiez que l'entrée d'alimentation vers l'onduleur possède une protection adéquate contre des
surintensités montantes :
Tableau 1. Valeur nominale minimale du disjoncteur amont
Puissance de sortie de l'onduleur 120 V 208 V 230 V
500 W 15 A — 15 A
1000 W 15 A — 15 A
1500 W (à 100 V)
1920 W
20 A — 15 A
12 Branchez le cordon d'alimentation de l'onduleur à une prise secteur.Installation et démarrage |
21
Démarrage de l'onduleur
13 Appuyez sur le bouton sur le panneau arrière de l'onduleur.
Achèvement du démarrage
14 Vérifiez que l'icône Normal apparaît sur l'écran de résumé d'état de l'onduleur, indiquant que
l'onduleur fonctionne normalement et que toutes les charges sont alimentées.
15 Sur l'écran de résumé d'état de l'onduleur, appuyez sur le bouton pour vérifier les avis et les
alarmes actives. Résolvez toutes les alarmes actives avant de continuer. Voir « Dépannage » dans le
Guide d'utilisation de l'onduleur en baie Line-Interactive 500 W, 1000 W et 1920/1500 W.
Si aucune alarme n'est activée, un message « Aucune alarme active » apparaît.
16 Pour changer d'autres valeurs d'usine par défaut, voir « Fonctionnement » dans le Guide
d'utilisation de l'onduleur en baie Line-Interactive 500 W, 1000 W et 1920/1500 W.22 |
Installation et démarrageDellt Tower USV
500 W, 1000 W, und 1920/1500 W
Erste Schritte
Mit Ihrem System
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.comHinweise und Warnungen
HINWEIS: Ein HINWEIS macht auf eine wichtige Information aufmerksam, mit deren Hilfe Sie Ihre Software optimal
nutzen können.
GEFAHR: GEFAHR macht auf eine unmittelbar gefährliche Situation aufmerksam, die zum Tod oder schweren
Verletzungen führt, wenn sie nicht vermieden wird.
WARNUNG: Eine WARNUNG macht auf eine potenziell gefährliche Situation aufmerksam, die zum Tod oder zu
Verletzungen führt, wenn sie nicht vermieden wird.
ACHTUNG: ACHTUNG macht auf eine potenziell gefährliche Situation aufmerksam, die zu geringen oder mäßigen
Verletzungen oder Sachschäden führen kann, wenn sie nicht vermieden wird.
GEFAHR: Beachten Sie den folgenden Hinweis, um eine unmittelbar gefährliche Situation zu vermeiden, die zum
Tod oder zu schweren Verletzungen führen könnte:
S Diese USV führt LEBENSGEFÄHRLICHE SPANNUNG. Sämtliche Reparatur--
und Wartungsarbeiten dürfen NUR VON
AUTORISIERTEM WARTUNGSPERSONAL durchgeführt werden. Im Inneren
der USV sind KEINE VOM BENUTZER WARTBAREN TEILEvorhanden.
Unangekündigte Änderungen der Angaben in diesem Dokument vorbehalten.
E 2009 Dell Inc. Alle Rechte vorbehalten.
Die Vervielfältigung, gleich welcher Art, ist ohne schriftliche Genehmigung von Dell Inc. strengstens untersagt.
In diesem Text verwendete Marken: Dell und das DELL--Logo sind Marken von Dell Inc.; Phillipsist eine eingetragene Marke von Phillips
Screw Company.
In diesem Dokument können weitere Marken und Handelsnamen verwendet werden, die sich entweder auf die Personen beziehen, die diese
Marken und Namen für sich beanspruchen , oder auf deren Produkte. Dell Inc. verzichtet auf sämtliche gewerblichen Eigentumsrechte an
Marken und Handelsnamen, bei denen es sich nicht um eigene Marken und Handelsnamen handelt.
Juli 2009Systemmerkmale |
25
Systemmerkmale
Die herausragende Leistung und Zuverlässigkeit sind nur einige der Vorteile der USV-Anlagen. Sie
bieten zudem:
S Spannungsregulierung durch das „Buck and Boost“-Verfahren. Dies gewährleistet durch die
Korrektur von Unregelmäßigkeiten einen gleichbleibenden Spannungswert für Ihre Anlagen.
S Starten der Anlage im Batteriebetrieb zum Versorgen der USV mit Strom, selbst wenn kein
Netzstrom zur Verfügung steht.
S Erweiterte Laufzeit mit optionalem Externes Batteriemodul (EBM) für USV-Modelle für
1000-1920 W.
S Serienmäßige Ausstattung mit zwei Kommunikationsschnittstellen (USV-Schnittstelle und serielle
DB-9-Schnittstelle).
S Optionale Dell Netzwerkmanagementkarte mit erweiterten Kommunikationsmöglichkeiten für
verbesserten Leistungsschutz und Kontrolle.
S Netzwerkschutzeinrichtungen schützen Ihre Anlage für Netzwerkkommunikation vor
Spannungsspitzen.
S Fortgeschrittene Stromüberwachung mit der Dell USV Management Software für sicheres
Herunterfahren und Stromüberwachung.
S Abschaltsequenz und Lastenmanagement durch separate Anschlussgruppen (sogenannte
Lastsegmente).
S Firmware, die sich einfach und ohne Wartungsdienst aktualisieren lässt.
S Entspricht einschlägigen Normen auf der ganzen Welt.26 |
Auffinden von Informationen
Auffinden von Informationen
ACHTUNG: Im Dokument Informationen zu Sicherheit, Umweltschutz und Ordnungsvorschriften finden Sie
wichtige Sicherheitshinweise und Informationen zu gesetzlichen Bestimmungen.
Was suchen Sie? Hier finden Sie es
S Die Benutzeranleitung für meine USV
S Die Benutzeranleitung für die Dell
Netzwerkmanagementkarte
S Dell USV Management Software
HINWEIS:Dokumente und Softwareaktualisierungen
finden Sie unter support.dell.com.
Die Disk für die Dell USV
S Spezifikationen
S Anleitung zum Konfigurieren der
USV-Einstellungen
S Behebung von Fehlern und Lösung von Problemen
Benutzeranleitung der Dell USV
Die Benutzeranleitung finden Sie auf der Disk zu der
Dell USV und auch untersupport.dell.com.
S Sicherheitshinweise
S Informationen über Ordnungsvorschriften
S Recycling-Informationen
Informationen zu Sicherheit, Umweltschutz und
Ordnungsvorschriften
S Garantieerklärung
S AGB (nur USA)
S Lizenzvereinbarung für Endbenutzer
Informationen zu Garantie und Support von Dell
S Supportinformationen Support-Website von Dell – support.dell.com
HINWEIS: Wählen Sie Ihre Region bzw. Ihre Branche
aus, um die geeignete Support-Website aufzurufen.Installation und Inbetriebnahme |
27
Installation und Inbetriebnahme
ACHTUNG: Vor der Ausführung der Verfahren in diesem Dokument lesen Sie bitte die Sicherheitshinweise
und wichtigen Informationen zu Ordnungsvorschriften in Ihrem Dokument überInformationen zu Sicherheit,
Umweltschutz und Ordnungsvorschriften und halten Sie diese unbedingt ein.
:ACHTUNG: Das Gehäuse ist schwer [500 W: 11,6 kg (25,6 lb); 1000 W: 18,3 kg (40,3 lb); 1920/1500 W: 30,5 kg
(67,2 lb)]. Beim Auspacken und Transportieren des Gehäuses ist Vorsicht geboten.
In diesem Abschnitt werden die Schritte für die Erstkonfiguration Ihres Systems beschrieben.
Auspacken des Systems
1 Packen Sie das System aus und identifizieren Sie die einzelnen Komponenten.
2 Entsorgen oder recyceln Sie die Verpackung in umweltbewusster Weise, oder bewahren Sie sie für
den späteren Gebrauch auf.28 |
Installation und Inbetriebnahme
Beschreibung der USV
In diesem Abschnitt wird die Vorder- und Rückansicht der Dell Tower USV angezeigt. Alle
Einzelheiten zur Rückseite finden Sie in der Dell Line-Interactive Tower USV 500 W, 1000 W, und
1920/1500 W Benutzeranleitung.
Abdeckungslasche
Abdeckungslasche
LCD-Anzeigen
Bildlauftaste (aufwärts oder rückwärts)
Auswahltaste
Bildlauftaste (abwärts oder vorwärts)
Abbildung 1. Die Dell Tower USV
Kommunikationsschnittstelle
Sechs 5-15-Anschlussdosen
(Lastsegment 1)
Netzwerk-Transienten
Schutz
USB-Schnittstelle
Kommunikationssteckplatz der USV
Ein-/Ausschalttaste
IEC-C14-Eingangsanschluss
Zwei 5-15-Anschlussdosen
(Lastsegment 2)
EBM-Anschluss
Abbildung 2. Rückseite der USV (1000 W, 120 V)Installation und Inbetriebnahme |
29
Entfernen der vorderen USV-Abdeckung
3 Entfernen Sie die vordere USV-Abdeckung.
Drücken Sie auf die beiden Abdeckungslaschen, um die vordere Abdeckung zu lösen, und
ziehen Sie diese hoch.
Entfernen der Batterieabdeckung
4 Lösen Sie die Rändelschraube auf der metallenen Batterieabdeckung und heben Sie die
Abdeckung hoch, um sie zu entfernen.30 |
Installation und Inbetriebnahme
Anklemmen des Anschlusses im Inneren der Batterie
5 Klemmen Sie den Anschluss im Inneren der Batterie an.
6 Setzen Sie die die Batterieabdeckung aus Metall wieder ein.
Drehen Sie die Schraube mit einem Drehmoment von 0,7 Nm (6,2 lb in) wieder ein.
7 Bringen Sie die vordere Abdeckung der USV wieder an.Installation und Inbetriebnahme |
31
Anschließen der Anlage
9
Schließen Sie die Anlage an die USV an
Schließen Sie das Kommunikationskabel vom
Computer an die USV an (optional)
8
8 Sofern Sie die Benutzung der Dell USV Management Software planen, schließen Sie Ihren
Computer mit dem beiliegenden Kabel an die USB-Schnittstelle oder an die RS-232-Schnittstelle
an.
9 Stecken Sie Stecker der zu schützenden Geräte in die Ausgangsanschlüsse der USV ein, aber
schalten Sie die geschützten Geräte noch nicht ein.
HINWEIS: Vergewissern Sie sich, dass die Gesamtnennleistung aller angeschlossenen Geräte die Kapazität
der USV nicht überschreitet, um einen Überlastalarm zu vermeiden.32 |
Installation und Inbetriebnahme
Anschließen des Netzkabels
10 Vergewissern Sie sich, dass der Stromeingang der USV entsprechend dem Nennstrom des
Netzkabels mit einem Schutz gegen Spannungsspitzen ausgestattet ist.
11 Vergewissern Sie sich, dass der Stromeingang der USV mit einem angemessenen Schutz gegen
Spannungsspitzen ausgestattet ist:
Tabelle 1. Mindestnennstrom der Überstromsicherung
USV-Ausgangsleistung 120 V 208 V 230 V
500 W 15 A — 15 A
1000 W 15 A — 15 A
1500 W (bei 100 V)
1920 W
20 A — 15 A
12 Stecken Sie das Netzkabel der USV in eine Netzsteckdose.Installation und Inbetriebnahme |
33
Starten der USV
13 Drücken Sie die Taste auf der Rückseite der USV.
Abschluss des Startvorgangs
14 Vergewissern Sie sich, dass das Symbol für „Normal“ auf dem Bildschirm der
USV-Statusübersicht angezeigt wird. Hierdurch wird angezeigt, dass die USV ordnungsgemäß
funktioniert und dass alle angeschlossenen Lasten mit Strom versorgt werden.34 |
Installation und Inbetriebnahme
15 Wählen Sie im Bildschirm mit der USV-Statusübersicht die Schaltfläche , um zu prüfen ob eine
aktive Warnmeldung oder ein aktiver Hinweis vorliegt. Lösen Sie alle aktiven Warnmeldungen,
bevor Sie den Vorgang fortsetzen. Siehe „Fehlerbehebung“ in der Dell Line-Interactive Tower USV
500 W, 1000 W, und 1920/1500 W Benutzeranleitung.
Falls keine Warnmeldungen aktiv sind, wird die Meldung „Keine aktiven
Warnmeldungen“ angezeigt.
16 Für die Änderung anderer werkseitiger Standardeinstellungen siehe „Betrieb“ in der Dell
Line-Interactive Tower USV 500 W, 1000 W, und 1920/1500 W Benutzeranleitung.ИБП башенного типа Dellt
500 Вт, 1000 Вт и 1920/1500 Вт
Начало работы
c вашей системой
www.dell.com | support.dell.comПримечания и предупреждения
ПРИМЕЧАНИЕ: Пометка ПРИМЕЧАНИЕ указывает на важную информацию, которая поможет
вам более эффективно использовать свое программное обеспечение.
ОПАСНОСТЬ: Пометка ОПАСНОСТЬ указывает на ситуации, в которых существует
непосредственная угроза, которая, если ее не избежать, приведет к серьезной травме или
летальному исходу.
ПРЕДУПРЕЖДЕНИЕ: Пометка ПРЕДУПРЕЖДЕНИЕ указывает на потенциально опасную
ситуацию, которая, если ее не избежать, может привести к травме или летальному исходу.
ВНИМАНИЕ: Пометка ВНИМАНИЕ указывает на потенциально опасную ситуацию, которая,
если ее не избежать, может привести к травмам легкой и средней степени тяжести или к
повреждению имущества.
ОПАСНОСТЬ: Следуйте приведенным ниже инструкциям, позволяющим предупредить
непосредственную угрозу, которая, если ее не избежать, приведет к серьезной травме или
летальному исходу:
S В устройстве ИБП некоторые узлы находятся под СМЕРТЕЛЬНО ОПАСНЫМ
НАПРЯЖЕНИЕМ. Все работы по ремонту и обслуживанию должны выполняться
ТОЛЬКО УПОЛНОМОЧЕННЫМ ОБСЛУЖИВАЮЩИМ ПЕРСОНАЛОМ. В ИБП НЕТ
УЗЛОВ, ОБСЛУЖИВАЕМЫХ ПОЛЬЗОВАТЕЛЕМ.
Информация в настоящем документе может быть изменена без предварительного уведомления.
E 2009 Dell Inc. Все права защищены.
Воспроизведение данного документа любым способом безписьменного разрешения компании Dell Inc. категорически
запрещено.
Торговые знаки, используемые в данном тексте: Логотипы Dell и DELL являются торговыми знаками компании Dell
Inc.; Phillips является зарегистрированным торговым знаком компании Phillips Screw Company.
Прочие торговые знаки и торговые марки могут использоваться в данном документе для ссылки на организации,
предъявляющие права на эти знаки и марки, или на их товары. Dell Inc. отказывается от любого права собственности
на какие-либо торговые знаки или торговые марки, кроме своих собственных.
Июль 2009 г.Функции системы |
37
Функции системы
Вот уникальные преимущества, обеспечивающие исключительную эффективность и
надежность ИБП:
S Понижающая и повышающая регулировка напряжения обеспечивает подачу
стабильного напряжения на нагрузку путем коррекции колебаний напряжения.
S Функция запуска от батареи используется для питания ИБП даже при отсутствии
питания от электросети.
S Увеличенное время работы при помощи дополнительного модуля Модуль внешней
батареи (EBM) для моделей ИБП 1000 - 1920 Вт.
S Два стандартных коммуникационных порта (USB и последовательный порт DB-9).
S Дополнительная Карта сетевого управления Dell с усовершенствованными
коммуникационными возможностями улучшает защиту питания и его мониторинг.
S Защита от сетевых переходных процессов, которая предохраняет устройства
сетевой связи от скачков.
S Усовершенствованное управление питанием при помощи Программа управления ИБП
Dell обеспечивает корректное выключение нагрузки и мониторинг электропитания.
S Последовательное выключение и управление нагрузкой при помощи раздельных
групп разъемов, называемых сегментами нагрузки.
S Легко обновляемое аппаратно-программное обеспечение; для обновления нет
необходимости обращаться в службу технической поддержки.
S Утверждены международными организациями.38 |
Поиск информации
Поиск информации
ВНИМАНИЕ: Документ Информация о технике безопасности, охране окружающей
среды и нормативная информация содержит важную информацию о технике
безопасности и нормативную информацию.
Что вы ищите? Вы найдете это здесь
S Руководство пользователя для моего ИБП
S Руководство пользователя для карты Карта
сетевого управления Dell
S Программа управления ИБП Dell
ПРИМЕЧАНИЕ: Документация и обновленные
версии ПО можно найти на сайте
support.dell.com.
Диск ИБП Dell
S Спецификации
S Как конфигурировать настройки ИБП
S Как находить и устранять неисправности и
решать проблемы
Руководство пользователя ИБП Dell
Руководство пользователя доступно на диске
ИБП Dell и на сайте support.dell.com.
S Инструкции по технике безопасности
S Нормативная информация
S Информация об утилизации
Информация о технике безопасности, охране
окружающей среды и нормативная
информация
S Информация о гарантии
S Сроки и условия (только для США)
S Лицензионное соглашение с конечным
пользователем
Информация о гарантии и поддержке Dell
S Информация о поддержке Веб-сайт поддержки Dell — support.dell.com
ПРИМЕЧАНИЕ: Выберите свой регион или
сегмент бизнеса, чтобы увидеть
соответствующий сайт поддержки.Установка и запуск |
39
Установка и запуск
ВНИМАНИЕ: Перед выполнением процедуры, описанной в данной документации,
прочтите и выполните инструкции по технике безопасности и ознакомьтесь с важной
нормативной информацией, которая содержится в документе Информация о технике
безопасности, охране окружающей среды и нормативная информация.
ВНИМАНИЕ: ВНИМАНИЕ: Корпустяжелый (500 Вт: 11,6 кг; 1000 Вт: 18,3 кг; 1920/1500
Вт: 30,5 кг]. Проявляйте осторожность при распаковке и перемещении корпуса.
В данном разделе описываются этапы настройки системы в первый раз.
Распаковка системы
1 Распакуйте систему и проверьте каждый элемент.
2 Выбросьте или утилизируйте упаковку согласно правилам или сохраните ее для
будущего использования.40 |
Установка и запуск
Описание ИБП
В данном разделе показаны передняя и задняя панели ИБП «Башня» Dell. См.
Руководство пользователя линейно-интерактивного ИБП башенного типа 500 Вт, 1000 Вт
и 1920/1500 Вт Dell, чтобы получить подробную информацию о задней панели.
Защелка крышки
Защелка крышки
Жидкокристаллическая панель
Кнопка пролистывания
(вверх или назад)
Кнопка выбора
Кнопка пролистывания
(внизили вперед)
Рис. 1. ИБП «Башня» Dell
Коммуникационный порт
Шесть гнезд 5-15
(Сегмент нагрузки 1)
Устройство защиты от
переходных процессов в
коммуникационной сети Порт USB
Коммуникационного отсека блока
бесперебойного питания
Кнопка Вкл./Выкл
Входной разъем IEC-C14
Два гнезда 5-15
(Сегмент нагрузки 2) Разъем EBM
Рис. 2. Задняя панель ИБП (задняя панель 1000 Вт, 120 В)Установка и запуск |
41
Снятие передней крышки ИБП
3 Снимите переднюю крышку ИБП.
Нажмите на две защелки крышки, чтобы освободить переднюю крышку, и потяните
вверх.
Снятие крышки батарей
4 Отвинтите винты на металлической крышке батарей и поднимите ее, чтобы снять.42 |
Установка и запуск
Подключение разъема внутренней батареи
5 Подключите разъем внутренней батареи.
6 Установите на место металлическую крышку батарей.
Затяните винт с усилием 0,7 Нм (6,2 фунта на дюйм).
7 Установите на место переднюю крышку ИБП.Установка и запуск |
43
Подключение оборудования
9
Присоедините свое оборудование к ИБП
Подключите кабель связи от
компьютера к ИБП (факультативно)
8
8 Если вы планируете использовать Программа управления ИБП Dell, подключите свой
компьютер к USB-порту или порту RS-232 при помощи прилагающегося кабеля.
9 Подключите оборудование, которое необходимо предохранить от скачков
напряжения, к выходным гнездам ИБП, но не включайте это оборудование.
Примечание: Убедитесь, что общая паспортная мощность потребителей не превышает
мощность ИБП во избежание сигнала перегрузки.44 |
Установка и запуск
Подключение шнура питания
10 Убедитесь, что вход питания на ИБП имеет защиту от верхней перегрузки по току
согласно номинальному току шнура питания.
11 Убедитесь, что вход питания ИБП имеет соответствующую защиту от верхней
перегрузки по току:
Таблица 1. Минимальный номинал вышестоящего выключателя
Выходная мощность
ИБП
120 В 208 В 230 В
500 Вт 15 A — 15 A
1000 Вт 15 A — 15 A
1500 Вт (на 100 В)
1920 Вт
20 A — 15 A
12 Вставьте шнур питания ИБП в розетку электросети.Установка и запуск |
45
Включение ИБП
13 Нажмите кнопку на задней панели ИБП.
Завершение запуска
14 Убедитесь, что на итоговом экране состояния ИБП появилась пиктограмма обычного
режима , обозначающая, что ИБП работает нормально и подает электропитание
на существующие нагрузки.46 |
Установка и запуск
15 На итоговом экране состояния ИБП нажмите кнопку , чтобы проверить, активны ли
аварийные сигналы или извещения. Отреагируйте на все активные сигналы, прежде
чем продолжить. См. Руководство пользователя линейно-интерактивного ИБП
башенного типа 500 Вт, 1000 Вт и 1920/1500 Вт Dell, раздел «Поиск и устранение
неисправностей».
При отсутствии активных аварийных сигналов появится сообщение «Активные
аварийные сигналы отсутствуют».
16 Чтобы изменить прочие заводские настройки по умолчанию см. Руководство
пользователя линейно-интерактивного ИБП башенного типа 500 Вт, 1000 Вт и
, раздел «Эксплуатация».UPS de la torre de Dellt
500 W, 1000 W y 1920/1500 W
Inicio de
su sistema
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.comNotas y advertencias
NOTA: Una NOTA indica información importante que lo ayuda a utilizar mejor el software.
PELIGRO: Un PELIGRO indica una situación inminentemente peligrosa que, si no se evita, dará como resultado la
muerte o una lesión grave.
AVISO: Una ADVERTENCIA indica una situación potencialmente peligrosa que, si no se evita, podría dar como
resultado la muerte o una lesión.
PRECAUCIÓN: Una PRECAUCIÓN indica una situación potencialmente peligrosa que, si no se evita, puede dar
como resultado una lesión moderada o menor, o en incidentes de daño de la propiedad.
PELIGRO: Cumpla con la siguiente instrucción para evitar una situación inminentemente peligrosa que, de no
evitarse, dará como resultado la muerte o una lesión grave:
S Esta UPS contiene VOLTAJES LETALES. SÓLO EL PERSONAL DE SERVICIO AUTORIZADO
debe realizar las reparaciones y el servicio. SÓLO EL PERSONAL DE SERVICIO AUTORIZADO
dentro de la UPS.
La información de este documento se encuentra sujeta a cambios sin previo aviso.
E 2009 Dell Inc. Todos los derechos reservados.
Queda estrictamente prohibida cualquier forma de reproducción sin el previo consentimiento de Dell Inc. por escrito.
Marcas comerciales utilizadas en este texto: Dell y el logotipo de DELL son marcas comerciales de Dell Inc.; Phillips es una marca
comercial registrada de Phillips Screw Company.
Es posible que en este documento se utilicen otras marcas y nombres comerciales para hacer referencia a las entidades que responden a
dichas marcas y nombres o a sus productos. Dell Inc. niega cualquier interés en la propiedad de las marcas y nombres comerciales de
terceros.
julio de 2009Características del sistema |
49
Características del sistema
Al brindar rendimiento y confiabilidad sobresalientes, los beneficios exclusivos de la UPS incluyen:
S Regulación del aumento y la reducción de voltaje que garantiza un voltaje constante para la carga,
corrigiendo así las fluctuaciones.
S Capacidad de arranque en batería para poner en funcionamiento la UPS aun cuando el suministro
eléctrico no esté disponible.
S Tiempo de ejecución con un Módulo de batería externa opcional (EBM) para los modelos de UPS
1000-1920 W.
S Dos puertos de comunicación estándar (USB y puerto serie).
S Tarjetas opcionales Tarjeta de gestión de red de Dell con capacidades de comunicación mejoradas
para lograr mayor control y protección del suministro eléctrico.
S Protector transitorio de redes que preserva a su equipo de comunicaciones en red de las
sobretensiones.
S El manejo avanzado del suministro eléctrico con Software de Gestión de UPS de Dell permite el
apagado ordenado y la supervisión del suministro eléctrico.
S El apagado secuencial y la gestión de carga mediante grupos de receptáculos separados que se
denominan segmentos de carga.
S Firmware que se actualiza fácilmente sin necesidad de llamar al cliente.
S Respaldado por las aprobaciones de agencias a nivel mundial.50 |
Búsqueda de información
Búsqueda de información
PRECAUCIÓN: El documento Información Ambiental, Regulatoria y de Seguridad brinda información
regulatoria y sobre seguridad importante.
¿Qué está buscando? Encuéntrelo aqu
S La guía del usuario para mi UPS
S La guía del usuario para la Tarjeta de gestión de red
de Dell
S Software de Gestión de UPS de Dell
NOTA:La documentación y la actualización de software se
pueden encontrar en support.dell.com.
Disco de la UPS de Dell
S Especificaciones
S Cómo configurar los valores de la UPS
S Cómo diagnosticar las fallas y resolver problemas
Guía del usuario de la UPS de Dell
La guía del usuario está disponible en el disco de la
UPS de Dell y en support.dell.com.
S Instrucciones de seguridad
S Información regulatoria
S Información sobre reciclado
Información Ambiental, Regulatoria y de Seguridad
S Información sobre seguridad
S Términos y condiciones (sólo EE. UU.)
S Acuerdo de licencia del usuario final
Información sobre soporte y garantía de Dell
S Información sobre soporte Sitio web de soporte de Dell — support.dell.com
NOTA: Seleccione su región o segmento de negocio para
visualizar el sitio de soporte correspondiente.Instalación y arranque |
51
Instalación y arranque
PRECAUCIÓN: Antes de realizar los procedimientos que se describen en este documento, lea y cumpla con
las instrucciones de seguridad y la información regulatoria importante en su documento Información
Ambiental, Regulatoria y de Seguridad.
PRECAUCIÓN: El gabinete es pesado [500 W: 11,6 kg (25,6 lb); 1000 W: 18,3 kg (40,3 lb); 1920/1500 W: 30,5 kg
(67,2 lb)]. Tenga precaución al desembalar y trasladar el gabinete.
En la presente sección, se describen los pasos para configurar su sistema por primera vez.
Cómo desembalar el sistema
1 Desembale el sistema e identifique cada elemento.
2 Deseche o recicle el embalaje de una manera responsable o guárdelo para un uso futuro.52 |
Instalación y arranque
Identificación de la UPS
En la presente sección, se muestra un panel frontal y posterior de la UPS de la Torre de Dell. Consulte
la Guía del usuario de la UPS de la torre de la línea interactiva de Dell 500 W, 1000 W y 1920/1500 W
para obtener todos los detalles del panel posterior.
Pestillo de la
Pestillo de la cubierta
cubierta
Panel LCD
Botón de desplazamiento
(hacia arriba o hacia atrás)
Botón de selección
Botón de desplazamiento
(hacia abajo o hacia delante)
Figure 1. La UPS de la Torre de Dell
Puerto de comunicaciones
Seis receptáculos de 5-15
(Segmento de carga 1)
Protector de red a
transitorios
Puerto USB
Compartimiento de
comunicación de la UPS
Botón de
Encendido/Apagado
Conector de entrada
IEC-C14
Dos receptáculos de 5-15
(Segmento de carga 2)
Conector EBM
Figure 2. Panel posterior de la UPS (panel posterior 1000 W, 120 V)Instalación y arranque |
53
Cómo retirar la cubierta frontal de la UPS
3 Extraiga la cubierta frontal de la UPS.
Empuje las dos pestillas de la cubierta para liberar la cubierta frontal y levantarla.
Cómo extraer la cubierta de la batería
4 Desatornille el tornillo de apriete manual de la cubierta metálica de la batería y levante para
extraer la cubierta.54 |
Instalación y arranque
Cómo conectar el conector de la batería interna
5 Conecte el conector de la batería interna.
6 Vuelva a colocar la cubierta metálica de la batería.
Apriete el tornillo a 0,7 N·m (6,2 lb pulg.).
7 Vuelva a colocar la cubierta frontal de la UPS.Instalación y arranque |
55
Conectar el equipo
9
Conecte el equipamiento a la UPS
Conecte el cable de comunicación de
la computadora a la UPS (opcional)
8
8 Si planea utilizar el Software de Gestión de UPS de Dell, conecte su equipo al puerto USB o el
puerto RS-232 mediante el uso del cable suministrado.
9 Enchufe el equipo para que esté protegido en los receptáculos exteriores de la UPS, pero no
encienda el equipo protegido.
NOTA: Verifique que los regímenes totales del equipo no excedan la capacidad de la UPS para prevenir una
alarma de sobrecarga.56 |
Instalación y arranque
Conexión del cable de energía
10 Verifique que la entrada de energía a la UPS tenga protección de sobrecarga de corriente
ascendente de acuerdo con el régimen de corriente del cable de energía.
11 Verifique que la entrada de energía a la UPS tenga protección de sobrecarga de corriente
ascendente adecuada:
Table 1. Régimen mínimo del disyuntor ascendente
Potencia de salida de la UPS 120 V 208 V 230 V
500 W 15 A — 15 A
1000W 15 A — 15 A
1500 W (a 100 V)
1920 W
20 A — 15 A
12 Conecte el cable de alimentación de la UPS a un tomacorriente.Instalación y arranque |
57
Inicio de la UPS
13 Presione el botón del panel posterior de la UPS.
Cómo completar el arranque
14 Verifique que el ícono Normal aparezca en la pantalla de resumen del estado UPS, que indica
que la UPS funciona normalmente y todas las cargas están energizadas.58 |
Instalación y arranque
15 En la pantalla de resumen de estado de UPS, presione el botón para comprobar las
notificaciones y las alarmas activas. Solucione todas las alarmas activas antes de continuar.
Consulte el “Diagnóstico de fallas” en la Guía del usuario de la UPS de la torre de la línea
interactiva de Dell 500 W, 1000 W y 1920/1500 W.
Si no hay ninguna alarma activa, se muestra el mensaje “Ninguna alarma activa”.
16 Para cambiar otros valores predeterminados establecidos de fábrica, consulte “Funcionamiento”
en la Guía del usuario de la UPS de la torre de la línea interactiva de Dell 500 W, 1000 W
y 1920/1500 W.Dellt 塔式 UPS
500W, 1000W, 和 1920/1500W
系统使用
入门指南
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.com注意和警告
注意: “注意”表示可帮助您更好使用本软件的重要信息。
危险:“危险”表示紧急危险情况,如果不加以避免,将导致死亡或严重的伤害。
警告:“警告”表示潜在危险情况,如果不加以避免,将会导致死亡或伤害。
小心:“小心”表示潜在危险情况,如果不加以避免,可能导致轻度或中度伤害,或财产损失事故。
危险: 遵守下列须知有助于防止紧急危险情况,其若不加以避免,将导致死亡或严重的伤害:
S 本 UPS 包含危险致命的电压。所有维修和服务都只能由经过授权的维修人员进行。UPS
中没有用户可自行维修的部件。
本文档所含信息如有更改,恕不另行通知。
E 2009 Dell Inc. 保留所有权利。
未经 Dell Inc. 书面允许,严禁以任何形式进行复制。
本文中使用的商标:Dell和DELL 徽标为 Dell Inc.的商标;Phillips 为 Phillips Screw Company 的注册商标。
本文件中可能会使用其它商标或商业名称来指称拥有该商标或名称权利的实体或其产品。Dell Inc.
对不属于自己的商标和商品名称,不拥有任何产权利益。
2009 年 7 月系统性能 |
61
系统性能
该 UPS 可提供杰出的性能与可靠性,其独特优势包括:
S 降压与升压调节,通过调节电压波动确保您的负荷电压稳定。
S 即使没有公用电源,电池启动功能也能给 UPS 供电。
S 对 1000–1920W UPS 型号,通过可选的外部电池模块(EBM)延长运行时间。
S 两个标准通信端口(USB 和 DB-9 串行口)。
S 为了加强电源保护和控制,可选择增强通信能力的 Dell 网络管理卡。
S 网络抗瞬变装置可保护您的网络通信设备免受电涌的损害。
S 高级电源管理,用Dell UPS 管理软件进行平滑关机和电力监控。
S 通过称为载入段的单独插座组进行顺序关机和负荷管理。
S 不必拨打服务电话,即可自行对固件进行方便升级。
S 全球代理认证提供支持。62 |
查找信息
查找信息
CAUTION:安全、环保和法规信息文件提供了重要的安全和法规信息。
您正在寻找什么? 在此查找
S 我的 UPS 的用户指南
S Dell 网络管理卡 用户指南
S Dell UPS 管理软件
注意:文件和软件更新可在 support.dell.com
找到。
Dell UPS 光盘
S 规格
S 如何配置 UPS 设置
S 如何排查故障和解决问题
Dell UPS 用户指南
用户指南可从 Dell UPS 光盘和 support.dell.com
上找到。
S 安全操作说明
S 行政法规信息
S 回收信息
安全、环保和法规信息
S 保修信息
S 条款和条件(仅限美国)
S 最终用户许可协议
Dell 保修和支持信息
S 支持信息 Dell 支持网站 — support.dell.com
注意:选择您的区域或业务部门,以查看合适的支
持网站。安装和启动 |
63
安装和启动
CAUTION: 在进行本文件中的步骤之前,请先阅读和遵循 安全、环保和法规信息
文件中的安全操作说明和重要法规信息。
CAUTION:小心:机箱较重 [500W: 11.6 千克(25.6 磅);1000W:18.3 千克(40.3
磅);1920/1500W: 30.5 千克 (67.2 磅)]。请在拆开包装和搬动机箱时特别小心。
本节描述首次安装系统的步骤。
打开系统
1 打开系统,查看每个物品项目。
2 以负责任的方式处理包装材料或回收循环利用,或者收起存放以备将来使用。64 |
安装和启动
UPS 识别
本节介绍 Dell 塔式 UPS 的前面板和后面板。后面板详细情况请参见 Dell 在线互动塔式 UPS
500W, 1000W, 和 1920/1500W 用户指南 。
外盖闩锁
外盖闩锁
LCD 显示面板
滚动按钮(向上或向后)
选择按钮
滚动按钮(向下或向前)
图 1. Dell 塔式 UPS
通信端口
六个 5-15 插座(载入段 1)
网络抗瞬变装置
USB 端口
UPS 通信槽
开/关按钮
IEC-C14
输入连接器
两个 5-15 插座(载入段 2) EBM 接线器
图 2. UPS 后面板(1000W (瓦),120V (伏)后面板)安装和启动 |
65
取下 UPS 前盖
3 取下 UPS 前盖。
推动两个外盖闩锁,以松开前盖,并拉起。
取下电池盖
4 松开电池金属盖上的翼形螺钉,并提起以取下外盖。66 |
安装和启动
连接内部电池连接器
5 连接内部电池接线器。
6 重新放回电池金属盖。
将螺钉拧至 0.7 牛米(N·m) (6.2 磅英寸(lb in))。
7 重新放回 UPS 前盖。安装和启动 |
67
连接设备
9
将设备连接到 UPS 上
将计算机的通信电缆连接到
UPS 上(可选)
8
8 如果您计划使用Dell UPS 管理软件,用提供的电缆将您的电脑连接到 USB 端口或 RS-232
端口。
9 将需要保护的设备插入 UPS 输出插座,但不要启动受保护的设备。
注意:确保全部设备的总额定值不超过 UPS 的负载能力,以防止出现过载警报。68 |
安装和启动
连接电源线
10 根据电源线额定电流验证 UPS 的功率输入具有上游过电流保护。
11 验证 UPS 的功率输入具有足够的上游过电流保护:
图 1. 最小上游断路器额定值
UPS 输出功率 120V(伏) 208V(伏) 230V(伏)
500W(瓦) 15A(安) — 15A(安)
1000W(瓦) 15A(安) — 15A(安)
1500W (瓦)
(在100V(伏)时)
1920W(瓦)
20A(安) — 15A(安)
12 将 UPS 电源线插入电源插座。安装和启动 |
69
启动 UPS
13 按下 UPS 后面板上的 按钮。
完成启动
14 确认“正常”(Normal)图标 显示在 UPS 状态概要屏幕上,这表明 UPS
运转正常,任何负荷都有动力供给。
15 在 UPS 状态屏上,按下 按钮,查看现有警报或通知。 解决所有警报问题,然后继续。
参见Dell 在线互动塔式 UPS 500W, 1000W, 和 1920/1500W 用户指南中的“故障处理”。
如果没有现有警报,会出现“无现有警报”(No Active Alarms)信息。
16 要更改其它出厂设置默认项,请参见Dell 在线互动塔式 UPS 500W, 1000W, 和 1920/1500W
用户指南中的“操作”。70 |
安装和启动Dellt 塔式 UPS
500W、1000W 和 1920/1500W
系統使用
入門指南
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.com注意和警告
注意: 「注意」表示可幫助您更好地使用本軟體的重要資訊。
危險: 「危險」表示緊急危險情況,如果不加以避免,將導致死亡或嚴重的傷害。
警告: 「警告」表示潛在危險情況,如果不加以避免,將會導致死亡或嚴重的傷害。
小心:「小心」表示潛在危險情況,如果不加以避免,可能導致輕度或中度傷害,或財產損失事故。
危險: 遵守以下須知有助於防止緊急危險情況,其若不加以避免,將導致死亡或嚴重的傷害。
S 本 UPS 包含危險致命的電壓。所有維修和服務都只能由經過授權的維修人員進行。UPS
中沒有可由使用者自行維修的零件。
本文件所含資訊如有變更,恕不另行通知。
E 2009 Dell Inc. 保留所有權利。
未經 Dell Inc. 書面允許,嚴格禁止以任何形式進行複製。
本文中使用的商標:Dell和Dell 標誌為 Dell Inc.的商標;Phillips 為 Phillips Screw Company 的註冊商標。
本文件中可能會使用其他商標或商業名稱來指涉擁有該商標或名稱權利的實體或其產品。Dell Inc.
對不屬於自己的商標和商品名稱,不擁有任何產權利益。
2009 年 7 月系統性能 |
73
系統性能
該 UPS 可提供傑出的性能與可靠性,包括下列獨有優勢:
S 降壓與升壓調節,藉由調節電壓波動確保您的負載電壓穩定。
S 電池啟動功能使您能在沒有外部電源時,也能使 UPS 通電。
S 1000–1920W UPS 型號可藉由選配的 外部電池模組(EBM)延長運行時間。
S 兩個標準通信連接埠(USB 和 DB--9 序列埠)。
S 選配的 Dell 網路管理卡 具有增強通訊功能,可增加電源保護和控制。
S 網路瞬態過電保護裝置可保護您的網路通信設備免受電壓突波的損害。
S 使用Dell UPS 管理軟體的先進電源管理,進行平滑關機和電力監控。
S 藉由稱為負載區段的單獨插座組進行順序關機和負載管理。
S 不必撥打服務電話,即可自行輕鬆的升級韌體。
S 提供全球代理商認證支援。74 |
尋找資訊
尋找資訊
CAUTION: 安全、環保和法規資訊文件提供重要的安全和法規資訊。
您正在尋找什麼? 在此尋找
S 我的 UPS 的使用者指南
S Dell 網路管理卡 使用者指南
S Dell UPS 管理軟體
注意:文件和軟體更新可在 support.dell.com 找到。
Dell UPS 光碟
S 規格
S 如何進行 UPS 設定
S 如何排除故障和解決問題
Dell UPS 使用者指南
使用者指南可從 Dell UPS 光碟和 support.dell.com
上取得。
S 安全操作說明
S 行政法規資訊
S 回收資訊
安全、環保和法規資訊
S 保固資訊
S 條款與條件(僅限美國)
S 一般使用者授權協議
Dell 保固和支援資訊
S 支援資訊 Dell 支援網站 — support.dell.com
注意:選擇您的區域或業務部門,以查看合適的支援
網站。安裝和啟動 |
75
安裝和啟動
CAUTION: 在進行本文件中的步驟之前,請先閱讀和遵循 安全、環保和法規資訊
文件中的安全操作說明和重要法規資訊。
CAUTION:小心: 機箱較重 [500W; 11.6 公斤 (25.6 磅); 1000W; 18.3 公斤 (40.3 磅);
1920/1500W: 30.5 公斤 (67.2 磅)]。 在拆開包裝和搬動機箱時請特別小心。
本節描述首次安裝系統的步驟。
拆除系統包裝
1 拆除系統包裝,並檢查確定每個項目。
2 以負責任的方式棄置或回收包裝材料,或者將其存放以備將來使用。76 |
安裝和啟動
UPS 的識別
本節介紹 Dell 塔式 UPS 的前面板和後面板。後面板詳細情況請參見 Dell在線互動機架式 UPS
500W、1000W、和 1920/1500W使用者指南。
外蓋閂鎖
外蓋閂鎖
LCD 顯示面板
捲軸按鈕(向上或向後)
選擇按鈕
捲軸按鈕(向下或向前)
圖 1. Dell 塔式UPS
通信連接埠
六個 5-15 插座(負載區段 1)
網路瞬態過電保護裝置
USB 連接埠
UPS 通信槽
開/關按鈕
IEC--C14
輸入連接器
兩個 5-15 插座(負載區段 2) EBM 接線器
圖 2. UPS 後面板(1000W,120V 後面板)安裝和啟動 |
77
取下 UPS 前蓋
3 取下 UPS 前蓋。
推動兩個外蓋閂鎖,以鬆開前蓋並將其拉起。
取下電池蓋
4 鬆開電池金屬蓋上的翼形螺釘,提起以取下外蓋。78 |
安裝和啟動
連接內部電池連接器
5 連接內部電池接線器。
6 重新放囘電池金屬蓋。
將螺釘擰至 0.7 牛米(N·m)(6.2 磅吋(lb in))。
7 重新放囘 UPS 前蓋。安裝和啟動 |
79
連接設備
9
將設備連接到 UPS 上
將電腦的通信電纜連接
到 UPS 上(可選
8
8 如果您計劃使用Dell UPS 管理軟體,請使用提供的電纜將您的電腦連接到 USB連接埠或
RS--232 連接埠。
9 將要保護的設備插入 UPS 輸出插座,但不要開啟受保護設備的電源。
注意: 確保全部設備的縂額定值未超過 UPS 的負載能力,以防止出現過載警報。80 |
安裝和啟動
連接電源線
10 根據電源線額定電流驗證 UPS 的電源輸入具有上游過電保護。
11 驗證 UPS 的電源輸入具有足夠的上游過電保護:
表 1. 最小上游斷路器額定值
UPS 輸出功率 120V(伏) 208V(伏) 230V(伏)
500W(瓦) 15A(安) — 15A(安)
1000W(瓦) 15A(安) — 15A(安)
1500W(瓦)
(當100V(伏)時)
1920W(瓦)
20A(安) — 15A(安)
12 將 UPS 電源線插入電源插座。安裝和啟動 |
81
啟動 UPS
13 按下 UPS 後面板上的 按鈕。
完成啟動
14 確認「正常」(Normal)圖示 顯示在 UPS 狀態概要螢幕上,這表明 UPS 運作正常,
任何負載都有電力提供。
15 在 UPS 狀態概要螢幕上,按下 按鈕,查看作用中的警報或通知。解決所有警報問題,
然後繼續。 參見 Dell在線互動機架式 UPS 500W、1000W和 1920/1500W使用者指南
中的「故障處理」。
如果沒有作用中的警報,會出現「無作用中警報」(No Active Alarms)訊息。
16 若要變更其它出廠預設設定,請參見Dell在線互動塔式 UPS 500W, 1000W和 1920/1500W
使用者指南中的「操作」。82 |
安裝和啟動Dellt Tower UPS
500W, 1000W, 1920/1500W
사용자의 시스템
시작하기
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.com참고 및 경고
참고:"참고"는 소프트웨어를 더 잘 활용하는 데 도움이 되는 중요한 정보를 나타냅니다.
위험:"위험"은 피하지 않을 경우, 급박한 위험 상황이 사망이나 중상의 결과를 야기할 수 있음을
나타냅니다.
경고:"경고"는 피하지 않을 경우 죽음이나 상해를 야기할 수 있는 잠재적 위험 상황을 표시합니다.
주의:"주의"는 피하지 않을 경우 경미하거나 보통의 상해 또는 재산 손실 사고를 야기할 수 있는 잠재적
위험 상황을 표시합니다.
위험: 아래의 지시사항을 준수하여, 피하지 않을 경우 사망이나 중상의 결과를 야기할 수 있는 급박한 위험
상황을 방지하십시오.
S UPS는 사망에 이를 수 있는 전압을 갖고 있습니다. 모든 수리와 정비는 자격있는 서비스
요원만이 수행해야 합니다. UPS 내부에는 사용자가 정비할 수 없는 부품이 있습니다.
이 문서에 포함된 정보는 고지없이 변경될 수 있습니다.
E 2009 Dell Inc. All rights reserved.
Dell Inc.의 서면 허락 없이 어떤 방식으로든 복제를 하는 것은 엄격히 금지됩니다.
이 문서에서 사용된 상표 : Dell및DELL로고는 Dell Inc.의 상표입니다. Phillips는Phillips Screw Company 의 등록상표입니다.
기타 상표와 상호를 관련 상표 및 명칭 또는 관련 제품에 대한 권리를 가지는 당사자를 지칭하기 위해 이 문서에서 사용될 수
있습니다. Dell Inc.는 Dell Inc.가 소유하지 않은 상표 및 상호에 대한 재산적 이해관계를 부인합니다.
2009 년 7월시스템 기능 |
85
시스템 기능
탁월한 성능과 신뢰도를 제공하면서, 본 UPS는 다음과 같은 특유의 장점을 지닙니다.
S 전압 변동을 교정하여 사용자의 부하에 대한 조정 전압을 보장하는 승강압형 전압 조정.
S 상용 전력을 사용할 수 없는 경우에도 UPS에 전력을 공급하는 스타트온 배터리
(start--on--battery) 기능.
S 선택사양인 1000–1920W UPS 모델용 외장 배터리 모듈(EBM)을 갖춘 확장 런타임.
S 2개의 표준 통신 포트 (USB 및 DB--9 시리얼 포트).
S 전원 보호 및 제어 능력을 제고하기 위한 강화된 통신 기능을 갖춘 선택사양인
Dell Network Management Card.
S 네트워크 통신 장비를 서지(surge)로부터 보호하는 네트워크 과도전류(transient) 프로텍터.
S 안정적인 종료 및 전원 감시를 위한 Dell UPS Management Software로 수행되는 고급 전원
관리.
S 로드 세그먼트라고 하는 별도의 콘센트 그룹을 통한 순차적 종료 및 부하 관리.
S 서비스 요청 없이도 쉽게 업그레이드할 수 있는 펌웨어.
S 세계적인 인증기관의 각종 인증을 득함.86 |
정보 찾아보기
정보 찾아보기
주의:안전, 환경, 및 규제 관련 정보 문서는 중요한 안전 및 규제 정보를 제공합니다.
찾는 정보 항목 정보의 소재
S UPS용 사용자 설명서
S Dell Network Management Card용 사용자 설명서
S Dell UPS Management Software
참고: 문서 및 소프트웨어 업데이트는
support.dell.com에서 조회할 수 있습니다.
Dell UPS 디스크
S 사양
S UPS 설정 구성 방법
S 문제점 처리 및 해결 방법
Dell UPS 사용자 설명서
사용자 설명서는 Dell UPS 디스크 및
support.dell.com에서 조회할 수 있습니다.
S 안전 지침
S 규제 정보
S 재활용 정보
안전, 환경, 및 규제 관련 정보
S 보증 정보
S 약관 (미국만 해당)
S 최종사용자 라이센스 계약
Dell 보증 및 지원 정보
S 지원 정보 Dell 지원 웹사이트 — support.dell.com
참고:적절한 지원 사이트를 보려면 해당
지역이나 사업분야를 선택하십시오.설치 및 시동 |
87
설치 및 시동
주의:본 문서의 절차를 수행하기 전에 안전, 환경, 및 규제 관련 정보 문서에 있는 안전 지침 및 중요한
규제정보를 읽고 준수하십시오.
주의:캐비닛은 무겁습니다[500W : 11.6 kg (25.6 lb); 1000W : 18.3 kg (40.3 lb); 1920/1500W :
30.5 kg (67.2 lb)]. 주의하여 캐비닛의 포장을 풀고 캐비닛을 옮기십시오.
이 절은 귀하의 시스템을 처음 설치하는 절차를 설명합니다.
시스템 포장풀기
1 시스템 포장을 풀고 각 품목을 확인하십시오.
2 포장은 해당 처리방식에 따라 폐기하거나 재활용하십시오. 또는, 추후 사용하려면
보관하십시오.88 |
설치 및 시동
UPS 확인하기
이 절에서는 Dell Tower UPS의 앞면 패널과 뒷면 패널을 보여줍니다. 모든 뒷면 패널의 세부에
대해서는 Dell Line--Interactive Tower UPS 500W, 1000W, 1920/1500W 사용자 설명서를
참조하십시오.
덮개 걸쇠
덮개 걸쇠
LCD패널
스크롤 버튼(위로 또는 뒤로)
버튼 선택
스크롤 버튼(아래로 또는 앞으로)
그림 1. Dell Tower UPS
통신 포트
6개의5-15콘센트
(로드 세그먼트1)
네트워크 과도전류
프로텍터
USB포트
UPS통신 베이
ON/OFF버튼
IEC-C14입력
커넥터
2개의5-15콘센트
(로드 세그먼트 2)
EBM 커넥터
그림 2. UPS 뒷면 패널 (1000W, 120V 뒷면 패널)설치 및 시동 |
89
UPS 앞면 덮개 제거하기
3 UPS 앞면 덮개를 제거하십시오.
두 개의 덮개 걸쇠를 밀어서 앞면 덮개를 풀고 당겨 올리십시오.
배터리 덮개 제거하기
4 금속 배터리 덮개의 손나사를 풀고 들어올려 덮개를 제거하십시오.90 |
설치 및 시동
내부 배터리 커넥터 연결하기
5 내부 배터리 커넥터를 연결하십시오.
6 금속 배터리 덮개를 교체하십시오.
나사에 0.7 N·m (6.2 lb in)의 토크를 주십시오.
7 UPS 앞면 덮개를 교체하십시오.설치 및 시동 |
91
장비 연결하기
9
장비를UPS로 연결
컴퓨터에서UPS로 통신 케이블을
연결(선택사양)
8
8 Dell UPS Management Software를 사용하실 계획이라면, 제공된 케이블을 이용하여 컴퓨터를
USB 포트나 RS--232 포트로 연결하십시오.
9 보호할 장비를 UPS 출력 콘센트에 꽂되 켜지는 마십시오.
참고: 과부하 경보를 방지하려면 장비의 전체 정격사양이 UPS 용량을 초과하지 않도록 확인하십시오.92 |
설치 및 시동
전원 코드 연결하기
10 UPS로 입력되는 전원이 전원코드 전류 정격에 따라 업스트림 과전류 보호를 받고 있는지
확인하십시오.
11 UPS로 입력되는 전원이 적당한 업스트림 과전류에 대해 보호 받고 있는지 확인하십시오.
표 1. 최소 업스트림 회로차단기 정격
UPS 출력 전원 120V 208V 230V
500W 15A — 15A
1000W 15A — 15A
1500W (100V)
1920W
20A — 15A
12 UPS 전원코드를 전원 콘센트에 연결하십시오.설치 및 시동 |
93
UPS 시동하기
13 UPS 앞면 패널의 버튼을 누르십시오.
시동 완료하기
14 UPS가 정상적으로 작동하고 있고 모든 부하가 전력을 공급받고 있음을 표시하는, 정상
아이콘 이 UPS 상태 요약 화면에 나타나는지 확인하십시오.
15 UPS 상태 요약 화면에서, 활성 경보나 통지를 확인하려면 버튼을 누르십시오. 후속
작업을 계속하기 전에 활성 경보를 처리하십시오. Dell Line--Interactive Tower UPS 500W,
1000W, 1920/1500W 사용자 설명서의 "장애처리"를 참조하십시오.
활성 경보가 없을 경우, "활성 경보 없음" 메시지가 나타납니다.
16 기타 공장설정값을 변경하려면 Dell Line--Interactive Tower UPS 500W, 1000W, 1920/1500W
사용자 설명서의 "작동"을 참조하십시오.94 |
설치 및 시동Delltタワー型UPS
500W、1000W、および1920/1500W
はじめに
システムについて
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.com注意および警告
注記: 「注記」は、ソフトウェアを有効に利用するための重要な情報を示しています。
危険: 「危険」は、回避しないとほぼ確実に死亡、または重傷を招く危険な状況を示しています。
警告: 「警告」は、回避しないと死亡、または重傷を招く潜在的に危険な状況を示しています。
注意: 「注意」は、回避しないと軽傷、または中程度の傷害を招く恐れがある潜在的に危険な状況を示
しています。
危険:
避しないとほぼ確実に死亡、または重傷を招く危険な状況を防ぐため、以下の説明をよくお読みくだ
さい。
S このUPSの中には致死的な電圧が掛かっています。 すべての修理や点検は、公認のサービ
ススタッフのみが行わなければいけません。
当資料の情報は、予告なく変更されることがあります。
E 2009 Dell Inc.無断複写・転載を禁じます。
Dell Inc.の書面による許可のない複写は、いかなる形態においても厳重に禁じられています。.
DellおよびDELLのロゴは、Dell Inc.の登録商標です:Phillipsは、Phillips Screw Companyの登録商標です。
本書に使用されているその他の登録商標および商標名は、商標や名称を主張する事業体、あるいは製品のいずれかに言及しま
す。Dell Inc.は、Dell自身が所有する登録商標および商標権におけるいかなる所有権を一切放棄します。
2009年7月システムの特徴 |
97
システムの特徴
UPSは優れた性能や信頼性を提供し、以下のような独自の利点がございます:
S 電圧変動を修正することで、負荷への一貫した電圧を保証する「昇降圧」電圧調節。
S 外部電力がないときでもUPSの電力を入れることができる始動電池の能力。
S 拡張ランタイムおよびオプションとして1000--1920W UPS型用
の外付けバッテリーモジュール(外付けバッテリーモジュール)付き。
S 2つの標準通信ポート(USBおよびDB--9シリアルポート)。
S オプションとして、増加電力の保護や制御を行う高度通信機能付きDell
ネットワークマネージメントカード。
S サージからネットワーク通信装置を保護するネットワーク過度電流プロテクタ。
S スムースなシャットダウンや電力管理を行うDell UPS制御ソフトウェアおよび高度電力
管理。
S 負荷セグメントと呼ばれる個別のレセプタクルグループを通じた逐次シャットダウンおよび
負荷制御。
S カスタマーサービスに問い合わせる必要なく、
簡単にアップグレードができるファームウェア。
S 世界中の代理店の承認による支持。98 |
情報検出
情報検出
注意::
安全、環境、規則に関する情報資料には、安全および規定に関する重要情報が含まれています。
どんな情報をお探しですか? こちらでご覧いただけます
S UPSユーザーガイド
S Dellネットワークマネージメントカード用の
ユーザーガイド
S Dell UPS制御ソフトウェア
注記:説明書およびソフトウェアの更新情報
は、support.dell.comでご確認いただけます。
Dell UPS ディスク
S 仕様
S UPSの設定方法
S トラブルシューティングおよび問題の解決方法
Dell UPS ユーザーガイド
ユーザーガイドはDell UPSディスクおよび
support.dell.comで入手することができます。
S 安全に関する説明書
S 規則に関する情報
S リサイクルに関する情報
安全、環境、規則に関する情報
S 保証情報
S 使用上の条件(アメリカのみ)
S エンドユーザー使用許諾契約
Dell 保証およびサポート情報
S サポート情報 Dell サポート用ウェブサイト ‒
support.dell.com
注意:使用する地域や事業区分を選択し、
適切なサポートサイトをご覧ください。インストールおよび設定 |
99
インストールおよび設定
注意::
当資料の手順を実施する前に、安全、環境、規則に関する情報資料に記載されている安全に関す
る説明書および重要な規制情報をご覧いただき、これらの情報に従ってください。
注意:: キャビネットの重量[500W: 11.6 kg (25.6 lb); 1000W: 18.3 kg (40.3 lb); 1920/1500W: 30.5
kg (67.2 lb)] 注意して開梱し、キャビネットを移動します。
このセクションは、最初におけるシステムの設定方法について説明しています。
システムの開梱
1 システムを開梱し、各項目を識別します。
2 責任を持ってパッケージを処分、またはリサイクルし、あるいは将来使えるように保管し
ます。100 |
インストールおよび設定
UPSの識別
このセクションは、Dellタワー型UPSのフロントパネルおよびリヤパネルを示しています。
リヤパネルの詳細に関しましては、Dellラインインタラクティブ式ラック
500W、1000W、および1920/1500W ユーザーガイドをご参照ください。
カバー止め
カバー止め
LCDパネル
スクロールボタン
(上方向、または後方)
選択ボタン
スクロールボタン
(下方向、または前方)
図 1. Dellタワー型UPS
通信ポート
5-15レセプタクル 6個
(負荷セグメント1)
ネットワーク過度
電流プロテクタ USBポート
カバーを取り外します
オン/オフボタン
IEC-C14
入力コネクタ
5-15レセプタクル 2個 EMB コネクタ (負荷セグメント2)
図 2. UPSリヤパネル(1000W、120Vリヤパネル)インストールおよび設定 |
101
UPSのフロントカバーの取り外し方法
3 UPSのフロントカバーを取り外します。
2個のカバー止めを押し、フロントカバーを開放し、引き上げます。
バッテリーカバーの取り外し方
4 金属製バッテリーカバーの蝶ネジを外し、カバーを持ち上げて取り外します。102 |
インストールおよび設定
内臓バッテリーコネクタの接続方法
5 内臓バッテリーコネクタを接続します。
6 金属製バッテリーカバーを取り外します。
ネジを0.7 N·m (6.2 lb in)のトルクで締めます。
7 UPSフロントカバーを取り外します。インストールおよび設定 |
103
装置の接続方法
9
装置をUPSへ接続
コンピューターからUPSへの通信
ケーブルを接続(オプション)
8
8 Dell UPS制御ソフトウェアを使用する場合は、同梱のケーブルを使って、
コンピューターをUSBポートやRS--232ポートへ接続してください。
9 保護する装置をUPS出力レセプタクルに差し込みます。ただし保護装置の電源は入れない
でください。
注記::
過負荷アラームを防ぐため、装置の定格の合計がUPSの容量を超えていないか確認してください。104 |
インストールおよび設定
電源コードの接続方法
10 UPSへの電源入力には、電源コードの定格電流に従い、逆流過電流保護があるか確認して
ください。
11 UPSへの電源入力には、十分な逆流過電流保護があるか確認してください。
表 1. 上流遮断機最小定格
UPS出力 120V 208V 230V
500W 15A — 15A
1000W 15A — 15A
1500W (100V時)
1920W
20A — 15A
12 UPSの電源コードを電源コンセントに差し込みます。インストールおよび設定 |
105
UPSの起動方法
13 UPSのリヤパネルの ボタンを押します。
起動の完了
14 UPSが正常に動作し、負荷電力があることを示す「正常」アイコン がUPSのステータス
要約画面に現れていることをお確かめください。
15 アクティブになっているアラームや通知を確かめるには、UPSステータス要約画面の ボタ
ンを押します。 続ける前に、アクティブになっているアラームを解消してください。Dell
ラインインタラクティブ式ラック 500W、1000W、および1920/1500W ユーザーガイドの
「トラブルシューティング」をご参照ください。
アクティブになっているアラームがない場合は、「アクティブアラームなし」と表示され
たメッセージが現れます。
16 その他の工場出荷時設定の変更は、Dellラインインタラクティブ式ラック
500W、1000W、および1920/1500W ユーザーガイドの「操作方法」をご参照ください。106 |
インストールおよび設定*1642018091*
164201809 1
Dell Multi-UPS Management Console and
UPS Local Node Manager Software
Version 01.06
User Guide Update MUMC and ULNM Software v01.06 User Guide Update
December 2012 2
Operating Systems supported by MUMC and ULNM
MUMC and ULNM v01.06 support the following systems:
Operating system
MUMC ULNM
Service
Pack
Platform Software
version Service
Pack
Platform Software
version
x86 x64 V1.04 V1.06 x86 x64 V1.04 V1.06
Windows
Server 2012
Windows Small
Business Server 2012
Standard
Latest √ √ Latest √ √
Windows
Server 2011
Windows Small
Business Server 2011
Standard
Latest √ √ √ Latest √ √ √
Windows
Server 2008
Windows Server 2008
R2 Standard,
Enterprise, Datacenter
SP1 √ √ √ SP1 √ √ √
Windows Server 2008
R1 Standard, Enterprise,
Datacenter
SP2 √ √ √ √ SP2 √ √ √ √
Windows Server 2008
Small Business Server
R2
Latest √ √ √ √ Latest √ √ √ √
Windows Server 2008
Small Business Server Latest √ √ √ √ Latest √ √ √ √
Windows
Server 2003
Windows Server 2003
Standard, Enterprise,
Datacenter R2
SP2 √ √ √ √ SP2 √ √ √ √
Windows Server 2003
Standard, Enterprise,
Datacenter R1
SP1 √ √ √ √ SP1 √ √ √ √
Windows Small
Business Server 2003
Standard, Enterprise,
Premium R2
Latest √ √ √ Latest √ √ √
Windows 8
Windows 8 (Enterprise,
Premium, Professional,
Ultimate, Basic)
Latest √ √ Latest √ √
Windows 7
Windows 7 (Enterprise,
Premium, Professional,
Ultimate, Basic)
SP1 √ √ √ √ SP1 √ √ √ √
Windows
Vista
Windows Vista
(Enterprise, Ultimate,
Business)
SP2 √ √ √ √ SP2 √ √ √ √
Windows XP Windows XP
Professional SP3 √ √ √ SP3 √ √ √
RedHat
Enterprise
Linux
Red Hat Enterprise
Linux 6.3 √ √ √
Red Hat Enterprise
Linux 6.2 √ √ √ √
Red Hat Enterprise
Linux 5.9 √ √ √ √
Red Hat Enterprise
Linux 5.8 √ √ √ √
Red Hat Enterprise
Linux 5.7 √ √ √ √
Red Hat Enterprise
Linux Advanced
Platform 5.4 (Latest
U7 √ √ √ √MUMC and ULNM Software v01.06 User Guide Update
December 2012 3
Update)
Red Hat Enterprise
Linux Base Server
5.4 (Latest Update)
U7 √ √ √ √
Red Hat Enterprise
Linux Version 5 U6 √ √ √ √
Fedora core 15 √ √ √ √
Fedora core 14 √ √ √ √
SUSE/Novel
SuSE Linux Enterprise
Server 11 SP2 √ √ √ √
SuSE Linux Enterprise
Server 11 SP1 √ √ √ √
SuSE Linux Enterprise
Server 10 SP4 √ √ √ √
OpenSuse 11.4 √ √ √ √
OpenSuse 11.2 √ √ √ √
Debian GNU
Linux
Debian 6 (Squeeze) √ √ √ √
Debian 5 (Lenny) √ √ √
Ubuntu
12.10 √ √ √ √
12.04 LTS √ √ √ √
11.04 LTS √ √ √ √
10.04 LTS √ √ √ √
Virtualization environments supported by MUMC and ULNM
MUMC and ULNM v01.06 support the following environments:
Virtualization Environment
MUMC ULNM
Service
Pack
Platform Software
version Service
Pack
Platform Software
version
x86 x64 V1.04 V1.06 x86 x64 V1.04 V1.06
VMware ESXi 5.1 (pay version
only) √ √ √ √
ESXi 5.0 (pay version
only) U1 √ √ √ U1 √ √ √
ESX 4.0 (pay version
only) U4 √ √ √ U4 √ √ √
ESXi 4.1 (pay version
only) U4 √ √ √ U4 √ √ √
ESX 4.0 (pay version
only) √ √ √ √ √ √
ESXi 4.1 (pay version
only) √ √ √ √ √ √
Microsoft
HyperV
Windows Hyper-V
Server 2012 √ √ √ √
Windows Hyper-V
Server 2008 R2 √ √ √ √ √ √
Windows Hyper-V
Server 2008 √ √ √ √ √ √
Citrix
XenServer 6.0 √ √ √ √ √ √ √ √
XenServer 5.6 √ √ √ √ √ √ √ √
OpenSource Xen 2.6
on RHEL 5 √ √ √ √ √ √
OpenSource Xen 3.2
on Debian 5 √ √ √ √ √ √
KVM KVM 0.12.1.2 on RHEL
6 and Debian 5 √ √ √ √ √ √MUMC and ULNM Software v01.06 User Guide Update
December 2012 4
Virtualization consoles and features supported by MUMC and ULNM
MUMC and ULNM v01.06 support the following virtual environment consoles and features:
Virtualization consoles and
features
MUMC ULNM
Service
Pack
Platform Software
version Service
Pack
Platform Software
version
x86 x64 V1.04 V1.06 x86 x64 V1.04 V1.06
VMware
console vCenter √ √ √ √
VMware
feature
vMotion √ √ √ √
vSphere √
Microsoft
HyperV
console
SCVMM 2012 √ √ √ √
Microsoft
HyperV
feature
LiveMigration √ √ √ √
Citrix
console XenCenter √ √ √ √
Citrix
feature
XenMotion Live
Migration √ √ √ √
Release notes
MUMC and ULNM version 01.06
Operating systems updates compatibility:
Windows 8
Add new etoast notification tool for operating system providing Metro interface.
SCVMM 2012
ESXi 5.1
RedHat 6.3
Bug fixes:
Remove vCenter plugin does not remove MUMC tab in vCenter
Fix issue with IE10 (Windows 8) compatibility
Fix bad icon in Windows 8 task bar when notification popup is displayed
Fix a crash when special network interfaces are set. This crash has been reported in Red Hat 5.6 using
a tuned interface created via openvpn. MUMC and ULNM Software v01.06 User Guide Update
December 2012 5
MUMC and ULNM version 01.04
Usability enhancementsto the graphical userinterface
Systemtraymenu added (Windows) including ability to stop/startservice fromthe tray icon contextual
menu
Improved alarmacknowledgement options, and audible alarmadded to notification events
Improved eventsorting options
Display of active powerin watts, not Volt‐Amps
UPS shutdown settingsmenu now available in shutdownmenu location
Newfunctionality in the graphical userinterface
Improvedmass configuration ofmultipleDellUPSNetwork Cards andULNM agents
XML v4 implementation forimproved security
Improved reverse name resolution capabilitiesforULNM agents and hardware nodes
Enhanced detection of communication loss, which is now available as a shutdown criteria
Added ability to forceUDP or TCP subscription forNMC
MUMC now can be registered as “powered application” inNMC Web interface.
Database logs optimized to handle largerinstallations
Expanded virtualization platform support and integration
XenCenter plugin
Force VM shutdown inHA clusters using Remote Virtual Machine Shutdown (RVMS)
Smoother operation of hostmanagementshutdown
Improved documentation for VMware setup
Supportfortwo or moreUPSs powering redundant powersupply unit(PSU) devices
UPS software considersmultipleUPS battery status before reaching “low battery” status and shutting
down servers.
Ability to create virtual composite groups ofUPSstomanage redundantinstallations as one device
Support ofDell’s unique power metrics
Peak headroom, peak consumption, allmetrics now in Watts(W) and not Volt‐Amps(VA).
Virtualization
Subscribe MUMC isshown as a “notified application” in theUPSNMC card when a VM host node has a
UPS configured in MUMC.
MicrosoftIntegration
Trigger vCenter vMotion™ and SCVMM Live Migration™ applications
Transparentlymove virtualmachinesfroma server affected by a powerinterruption to a non‐affected
serverMUMC and ULNM Software v01.06 User Guide Update
December 2012 6
Citrix integration
XenServer: Remote shutdown from MUMC,remotemaintenance from MUMC, can Add/Protect a
XenServerin MUMC
XenCenter: Create an MUMC XenCenter plug‐in, agent‐less hostmanagementfrom MUMC, agent‐less
XenMotion
VMware integration
Removed the prerequisite of Pearl SDK installation for MUMC to communicate with VMware vCenter
New power events and alarmslogs created in VMware vCenter console
Added ability to force VM shutdown forHA clusters
Can now Add/Protect a standalone ESX/ESXi in MUMC without vCenter
Linux Support
Added supportforlatest Linux distributions(seeUserGuide forfull list)
Bug fixes:
Crash when emc2 runs out of resources (memory)
ULNM does not detect UPS connected with USB connectivity
Transfer to high efficiency mode not visible in the events list
MUMC may lose nodes, and generates alarms on non‐UPS SNMP devices
When a proxy client reaches shutdown time, all other proxy clients along with server get shut down
No communication lost after network cable is removed
Make sure Scan and communication behaves correctly when USB module is not present
Proxy: when changing power source, previous endpoint is not removed
MUMC upgrade will disable the "Set as Power Source"
ULNM in connected mode in Notified Applications of NMC
Event Pane in Power Source View is Off by One
Detect Lansafe, Netwatch, Lansafe Web View in the installer
Silent uninstall does not remove the install folder
Other bug fixes and improvements:
Outlet management improvements
Scan sometime never stops
Removing devices hangs the server
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGCover.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 – FOR PROOF ONLY
Template Last Updated -03/06/2010
Dell PowerConnect
5500 Series
System User Guide
Regulatory Models: PowerConnect 5524, 5524P, 5548, 5548PNotes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you
make better use of your system.
CAUTION: A CAUTION indicates potential damage to
hardware or loss of data if instructions are not followed.
WARNING: A WARNING indicates a potential for property
damage, personal injury, or death.
____________________
Information in this document is subject to change without notice.
© 2013 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written
permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell™, the DELL logo, Dell Precision™,
OptiPlex™, Latitude™, PowerEdge™, PowerVault™, PowerConnect™,
OpenManage™, EqualLogic™, KACE™, FlexAddress™ and Vostro™ are
trademarks of Dell Inc. Intel®, Pentium®, Xeon®, Core™ and Celeron® are
registered trademarks of Intel Corporation in the U.S. and other countries.
AMD® is a registered trademark and AMD Opteron™, AMD Phenom™, and
AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft®,
Windows®, Windows Server®, MS-DOS® and Windows Vista® are either
trademarks or registered trademarks of Microsoft Corporation in the United
States and/or other countries. Red Hat Enterprise Linux® and Enterprise Linux®
are registered trademarks of Red Hat, Inc. in the United States and/or other
countries. Novell® is a registered trademark and SUSE ™ is a trademark of
Novell Inc. in the United States and other countries. Oracle® is a registered
trademark of Oracle Corporation and/or its affiliates. Citrix®, Xen®, XenServer®
and XenMotion® are either registered trademarks or trademarks of Citrix
Systems, Inc. in the United States and/or other countries. VMware®, Virtual
SMP®, vMotion®, vCenter®, and vSphere® are registered trademarks or
trademarks of VMWare, Inc. in the United States or other countries.
Other trademarks and trade names may be used in this publication to refer to
either the entities claiming the marks and names or their products. Dell Inc.
disclaims any proprietary interest in trademarks and trade names other than its
own.
Regulatory Models PC5524, PC5524P, PC5548 and PC5548P
March 2013 A07FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
Contents 3
Contents
1 Preface . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2 Features. . . . . . . . . . . . . . . . . . . . . . . . . . 15
IP Version 6 (IPv6) Support . . . . . . . . . . . . . . . 16
Stack Support . . . . . . . . . . . . . . . . . . . . . . 16
Power over Ethernet. . . . . . . . . . . . . . . . . . . 16
Green Ethernet. . . . . . . . . . . . . . . . . . . . . . 17
Head of Line Blocking Prevention. . . . . . . . . . . . 17
Flow Control Support (IEEE 802.3X) . . . . . . . . . . . 17
Back Pressure Support . . . . . . . . . . . . . . . . . 17
Virtual Cable Testing (VCT) . . . . . . . . . . . . . . . 18
Auto-Negotiation . . . . . . . . . . . . . . . . . . . . 18
MDI/MDIX Support. . . . . . . . . . . . . . . . . . . . 18
MAC Address Supported Features . . . . . . . . . . . 18
Layer 2 Features . . . . . . . . . . . . . . . . . . . . . 20
IGMP Snooping . . . . . . . . . . . . . . . . . . . . . 20
Port Mirroring . . . . . . . . . . . . . . . . . . . . . . 20
Broadcast Storm Control . . . . . . . . . . . . . . . . 20FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
4 Contents
VLAN Supported Features . . . . . . . . . . . . . . . . 21
Spanning Tree Protocol Features . . . . . . . . . . . . 22
Link Aggregation. . . . . . . . . . . . . . . . . . . . . 24
Quality of Service Features . . . . . . . . . . . . . . . 24
Device Management Features. . . . . . . . . . . . . . 25
Security Features . . . . . . . . . . . . . . . . . . . . 29
Port Profile (CLI Macro) . . . . . . . . . . . . . . . . . 31
DHCP Server . . . . . . . . . . . . . . . . . . . . . . . 32
Protected Ports. . . . . . . . . . . . . . . . . . . . . . 32
iSCSI Optimization . . . . . . . . . . . . . . . . . . . . 32
Proprietary Protocol Filtering . . . . . . . . . . . . . . 32
3 Hardware Description . . . . . . . . . . . . . . 35
Device Models . . . . . . . . . . . . . . . . . . . . . . 36
Device Structure . . . . . . . . . . . . . . . . . . . . . 36
LED Definitions. . . . . . . . . . . . . . . . . . . . . . 40
Power Supplies . . . . . . . . . . . . . . . . . . . . . 44
4 Stacking Overview. . . . . . . . . . . . . . . . . 45
Stack Overview . . . . . . . . . . . . . . . . . . . . . 46
Stack Members and Unit IDs . . . . . . . . . . . . . . 49FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
Contents 5
5 Configuring the Switch . . . . . . . . . . . . . . 57
Configuration Work Flow . . . . . . . . . . . . . . . . 58
Connecting the Switch to the Terminal . . . . . . . . . 59
Booting the Switch . . . . . . . . . . . . . . . . . . . 60
Configuring the Stack . . . . . . . . . . . . . . . . . . 61
Configuration Using the Setup Wizard . . . . . . . . . 61
6 Advanced Switch Configuration . . . . . . . 67
Using the CLI. . . . . . . . . . . . . . . . . . . . . . . 68
Accessing the Device Through the CLI . . . . . . . . . 71
Retrieving an IP Address . . . . . . . . . . . . . . . . 72
Security Management and Password Configuration . . 75
Configuring Login Banners . . . . . . . . . . . . . . . 78
Startup Menu Procedures . . . . . . . . . . . . . . . . 80
Software Download . . . . . . . . . . . . . . . . . . . 83
7 Using Dell OpenManage Administrator. . 87
Starting the Application . . . . . . . . . . . . . . . . . 88
Understanding the Interface. . . . . . . . . . . . . . . 88
Using the Switch Administrator Buttons . . . . . . . . 91
Field Definitions . . . . . . . . . . . . . . . . . . . . . 93
Common GUI Features . . . . . . . . . . . . . . . . . . 93FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
6 Contents
GUI Terms. . . . . . . . . . . . . . . . . . . . . . . . . 94
CLI Commands . . . . . . . . . . . . . . . . . . . . . . 94
8 Network Security. . . . . . . . . . . . . . . . . . 97
Port Security . . . . . . . . . . . . . . . . . . . . . . . 98
ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . 103
ACL Binding . . . . . . . . . . . . . . . . . . . . . . 123
Proprietary Protocol Filtering . . . . . . . . . . . . . 125
Time Range. . . . . . . . . . . . . . . . . . . . . . . 127
Dot1x Authentication. . . . . . . . . . . . . . . . . . 132
9 Configuring System Information . . . . . . 155
General Switch Information . . . . . . . . . . . . . . 156
Time Synchronization . . . . . . . . . . . . . . . . . 169
Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . 195
IP Addressing . . . . . . . . . . . . . . . . . . . . . 209
Diagnostics. . . . . . . . . . . . . . . . . . . . . . . 255
Management Security . . . . . . . . . . . . . . . . . 261
DHCP Server . . . . . . . . . . . . . . . . . . . . . . 297
SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
File Management. . . . . . . . . . . . . . . . . . . . 337
Stack Management . . . . . . . . . . . . . . . . . . 367FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
Contents 7
sFlow . . . . . . . . . . . . . . . . . . . . . . . . . . 375
10 Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
Overview. . . . . . . . . . . . . . . . . . . . . . . . . 385
Jumbo Frames . . . . . . . . . . . . . . . . . . . . . . 388
Green Ethernet Configuration . . . . . . . . . . . . . . 390
Protected Ports . . . . . . . . . . . . . . . . . . . . . 394
Port Profile. . . . . . . . . . . . . . . . . . . . . . . . 397
Port Configuration . . . . . . . . . . . . . . . . . . . . 403
LAG Configuration . . . . . . . . . . . . . . . . . . . . 409
Storm Control . . . . . . . . . . . . . . . . . . . . . . 414
Port Mirroring . . . . . . . . . . . . . . . . . . . . . . 417
11 Address Tables . . . . . . . . . . . . . . . . . . . 422
Overview. . . . . . . . . . . . . . . . . . . . . . . . . 423
Static Addresses. . . . . . . . . . . . . . . . . . . . . 424
Dynamic Addresses . . . . . . . . . . . . . . . . . . . 427
12 GARP . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
GARP Overview . . . . . . . . . . . . . . . . . . . . . 431
GARP Timers . . . . . . . . . . . . . . . . . . . . . . . 432FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
8 Contents
13 Spanning Tree . . . . . . . . . . . . . . . . . . . . 434
Spanning Tree Protocol Overview. . . . . . . . . . . 435
Global Settings. . . . . . . . . . . . . . . . . . . . . 437
STP Port Settings. . . . . . . . . . . . . . . . . . . . 442
STP LAG Settings. . . . . . . . . . . . . . . . . . . . 447
Rapid Spanning Tree. . . . . . . . . . . . . . . . . . 450
Multiple Spanning Tree . . . . . . . . . . . . . . . . 454
14 VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . 466
Virtual LAN Overview . . . . . . . . . . . . . . . . . 467
VLAN Membership . . . . . . . . . . . . . . . . . . . 472
Port Settings . . . . . . . . . . . . . . . . . . . . . . 475
LAGs Settings . . . . . . . . . . . . . . . . . . . . . 481
Protocol Groups . . . . . . . . . . . . . . . . . . . . 484
Protocol Port . . . . . . . . . . . . . . . . . . . . . . 488
GVRP Parameters . . . . . . . . . . . . . . . . . . . 490
Private VLAN. . . . . . . . . . . . . . . . . . . . . . 494
Voice VLAN. . . . . . . . . . . . . . . . . . . . . . . 498
15 Link Aggregation . . . . . . . . . . . . . . . . . . 508
Link Aggregation Overview . . . . . . . . . . . . . . 509
LACP Parameters. . . . . . . . . . . . . . . . . . . . 511FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
Contents 9
LAG Membership . . . . . . . . . . . . . . . . . . . . 514
16 Multicast . . . . . . . . . . . . . . . . . . . . . . . . 516
Multicast Support Overview. . . . . . . . . . . . . . . 517
Global Parameters. . . . . . . . . . . . . . . . . . . . 519
Bridge Multicast Groups . . . . . . . . . . . . . . . . 521
Bridge Multicast Forward All . . . . . . . . . . . . . . 525
IGMP Snooping . . . . . . . . . . . . . . . . . . . . . 527
Unregistered Multicast . . . . . . . . . . . . . . . . . 533
Multicast TV VLAN. . . . . . . . . . . . . . . . . . . . 535
17 LLDP . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
LLDP Overview. . . . . . . . . . . . . . . . . . . . . . 541
LLDP Properties . . . . . . . . . . . . . . . . . . . . . 542
LLDP Port Settings . . . . . . . . . . . . . . . . . . . . 546
MED Network Policy . . . . . . . . . . . . . . . . . . 549
LLDP MED Port Settings . . . . . . . . . . . . . . . . . 552
Neighbors Information. . . . . . . . . . . . . . . . . . 557
18 Dynamic ARP Inspection . . . . . . . . . . . . 560
Dynamic ARP Inspection Overview. . . . . . . . . . . 561
Global Settings. . . . . . . . . . . . . . . . . . . . . . 562FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
10 Contents
Dynamic ARP Inspection List . . . . . . . . . . . . . 564
Dynamic ARP Inspection Entries . . . . . . . . . . . 566
VLAN Settings . . . . . . . . . . . . . . . . . . . . . 568
Trusted Interfaces . . . . . . . . . . . . . . . . . . . 570
19 DHCP Snooping . . . . . . . . . . . . . . . . . . . 572
DHCP Snooping . . . . . . . . . . . . . . . . . . . . 573
DHCP Relay. . . . . . . . . . . . . . . . . . . . . . . 586
20 iSCSI Optimization . . . . . . . . . . . . . . . . . 594
Optimizing iSCSI Overview . . . . . . . . . . . . . . 595
Global Parameters . . . . . . . . . . . . . . . . . . . 598
iSCSI Targets . . . . . . . . . . . . . . . . . . . . . . 601
iSCSI Sessions . . . . . . . . . . . . . . . . . . . . . 603
Configuring iSCSI Using CLI . . . . . . . . . . . . . . 605
21 Statistics/RMON . . . . . . . . . . . . . . . . . . 606
Table Views . . . . . . . . . . . . . . . . . . . . . . 607
RMON Components . . . . . . . . . . . . . . . . . . 625
Charts. . . . . . . . . . . . . . . . . . . . . . . . . . 643FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
Contents 11
22 Quality of Service . . . . . . . . . . . . . . . . . 650
QoS Features and Components . . . . . . . . . . . . . 651
General. . . . . . . . . . . . . . . . . . . . . . . . . . 653
QoS Basic Mode . . . . . . . . . . . . . . . . . . . . . 669
QoS Advanced Mode . . . . . . . . . . . . . . . . . . 678
QoS Statistics . . . . . . . . . . . . . . . . . . . . . . 698
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720
Revision History . . . . . . . . . . . . . . . . . . . . . . 735FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
12 ContentsDell PowerConnect 55xx Systems User Guide 13
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
1
Preface
PowerConnect 5524/5548 and PowerConnect 5524P/5548P are stackable,
advanced multi-layer devices.
This guide contains the information needed for installing, configuring, and
maintaining the device through the web-based management system, called
the OpenManage Switch Administrator.
This guide describes how to configure each system through the web-based
management system and through CLI commands.
The CLI Reference Guide, which is available on the Documentation CD,
provides additional information about the CLI commands. 14 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGPrefix.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLYDell PowerConnect 55xx Systems User Guide 15
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2
Features
This section describes the features of the PowerConnect 5524/P and 5548/P
switches.
For a complete list of all updated device features, see the latest software
version Release Notes.
This section contains the following topics:
• IP Version 6 (IPv6) Support
• Stack Support
• Power over Ethernet
• Green Ethernet
• Head of Line Blocking Prevention
• Flow Control Support (IEEE 802.3X)
• Back Pressure Support
• Virtual Cable Testing (VCT)
• Auto-Negotiation
• MDI/MDIX Support
• MAC Address Supported Features
• Layer 2 Features
• IGMP Snooping
• Port Mirroring
• Broadcast Storm Control
• VLAN Supported Features
• Spanning Tree Protocol Features
• Link Aggregation
• Quality of Service Features
• Quality of Service Features
• Device Management Features16 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Security Features
• DHCP Server
• Protected Ports
• iSCSI Optimization
• Proprietary Protocol Filtering
IP Version 6 (IPv6) Support
The device functions as an IPv6-compliant host, as well as an IPv4 host (also
known as dual stack). This enables device operation in a pure IPv6 network as
well as in a combined IPv4/IPv6 network.
For more information, see "IP Addressing" on page 209.
Stack Support
The system supports up to eight units with two fixed HDMI stacking ports.
The HDMI ports are 1.3a specification, Category 2 High Speed cables, 340
MHz (10.2 Gbit/s).
it is recommended to use HDMI cable version 1.4
The stacking feature supports the following features:
• Fast-link failover
• Software auto-synch.
• Improved response time to events, such as master failover
• Auto-numbering algorithm when choosing unit number
For more information, see "Stacking Overview" on page 45
Power over Ethernet
Power over Ethernet (PoE) provides power to devices over existing LAN
cabling, without updating or modifying the network infrastructure. When
PoE is used, the network devices do not have to be placed next to a power
source. PoE can be used in the following applications:
• IP Phones
• Wireless Access PointsDell PowerConnect 55xx Systems User Guide 17
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• IP Gateways
• PDAs
• Audio and video remote monitoring
For more information, see "Power over Ethernet" on page 162.
Green Ethernet
Green Ethernet, also known as Energy Efficient Ethernet (EEE), is an effort
to make networking equipment environmentally friendly, by reducing the
power usage of Ethernet connections.
The Short-Reach method, which reduces power over Ethernet cables shorter
than 40m, is supported by the device.
For more information, see "Green Ethernet Configuration" on page 390.
Head of Line Blocking Prevention
Head of Line (HOL) blocking results in traffic delays and frame loss caused
by traffic competing for the same egress port resources. To prevent HOL
blocking, the device queues packets, and packets at the head of the queue are
forwarded before packets at the end of the queue.
Flow Control Support (IEEE 802.3X)
Flow control enables lower-speed devices to communicate with higher-speed
devices, by requesting that the higher-speed device refrain from sending
packets. Transmissions are temporarily halted to prevent buffer overflows.
For more information, see "Flow Control" on page 386.
Back Pressure Support
On half-duplex links, the receiving port prevents buffer overflows by
occupying the link so that it is unavailable for additional traffic.
For more information, see "Protected Ports" on page 394.18 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Virtual Cable Testing (VCT)
VCTdetects and reports copper link cabling faults, such as open cables and
cable shorts.
For more information, see "Diagnostics" on page 255.
Auto-Negotiation
Auto-negotiation enables the device to advertise modes of operation. The
auto-negotiation function enables an exchange of information between two
devices that share a point-to-point link segment, and automatically
configures both devices to take maximum advantage of their transmission
capabilities.
The PowerConnect 5500 series enhances auto-negotiation by providing port
advertisement. Port advertisement enables the system administrator to
configure the port speeds that are advertised.
For more information, see "Port Configuration" on page 403 or "LAG
Configuration" on page 409.
MDI/MDIX Support
Standard wiring for end stations is known as Media-Dependent Interface
(MDI), and standard wiring for hubs and switches is known as MediaDependent Interface with Crossover (MDIX).
If auto-negotiation is enabled, the device automatically detects whether the
cable connected to an RJ-45 port is MDIX (crossed) or MDI (straight). This
enables both types to be used interchangeably.
If auto-negotiation is not enabled, only MDI (straight) cables can be used.
For more information, see "Port Configuration" on page 403 or "LAG
Configuration" on page 409.
MAC Address Supported Features
MAC Address Capacity Support
The device supports up to 16K MAC addresses and it reserves specific MAC
addresses for system use.Dell PowerConnect 55xx Systems User Guide 19
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Static MAC Entries
MAC entries can be manually entered in the Bridging Table, as an alternative
to learning them from incoming frames. These user-defined entries are not
subject to aging, and are preserved across resets and reboots.
For more information, see "Static Addresses" on page 424.
Self-Learning MAC Addresses
The device enables controlled MAC address learning from incoming packets.
The MAC addresses are stored in the Bridging Table.
For more information, see "Dynamic Addresses" on page 427.
Automatic Aging for MAC Addresses
MAC addresses from which no traffic is received for a given period, are aged
out. This prevents the Bridging Table from overflowing.
For more information, see "Dynamic Addresses" on page 427.
VLAN-Aware MAC-Based Switching
The device always performs VLAN-aware bridging. Classic bridging
(IEEE802.1D), in which frames are forwarded based only on their destination
MAC address, is not performed. However, a similar functionality can be
configured for untagged frames. Frames addressed to a destination MAC
address that is not associated with any port are flooded to all ports of the
relevant VLAN.
MAC Multicast Support
Multicast service is a limited Broadcast service that enables one-to-many and
many-to-many connections for information distribution. In Layer 2 Multicast
service, a single frame is addressed to a specific Multicast address, from which
copies of the frame are transmitted to the relevant ports. When Multicast
groups are statically enabled, you can set the destination port of registered
groups, as well as define the behavior of unregistered Multicast frames.
For more information, see "Multicast" on page 516.20 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Layer 2 Features
IGMP Snooping
Internet Group Membership Protocol (IGMP) Snooping examines IGMP
frame contents, when they are forwarded by the device from work stations to
an upstream Multicast router. From the frame, the device identifies work
stations configured for Multicast sessions, and which Multicast routers are
sending Multicast frames. The IGMP Querier simulates the behavior of a
Multicast router. This enables snooping of the Layer 2 Multicast domain even
if there is no Multicast router.
For more information, see "IGMP Snooping" on page 527.
Port Mirroring
Port mirroring monitors network traffic by forwarding copies of incoming and
outgoing packets from a monitored port to a monitoring port. Users specify
which target port receives copies of all traffic passing through a specified
source port.
For more information, see "Port Mirroring" on page 417.
Broadcast Storm Control
Storm Control enables limiting the number of Multicast and Broadcast
frames accepted by and forwarded by the device.
When Layer 2 frames are forwarded, Broadcast and Multicast frames are
flooded to all ports on the relevant VLAN. This occupies bandwidth, and
loads all nodes connected on all ports.
For more information, see "Storm Control" on page 414.Dell PowerConnect 55xx Systems User Guide 21
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
VLAN Supported Features
VLAN Support
VLANs are collections of switching ports that comprise a single Broadcast
domain. Packets are classified as belonging to a VLAN, based on either the
VLAN tag or on a combination of the ingress port and packet contents.
Packets sharing common attributes can be grouped in the same VLAN.
For more information, see "VLANs" on page 466.
Port-Based Virtual LANs (VLANs)
Port-based VLANs classify incoming packets to VLANs, based on their ingress
port.
For more information, see "Defining VLAN Membership Using CLI
Commands" on page 473.
Full 802.1Q VLAN Tagging Compliance
IEEE 802.1Q defines an architecture for virtual, bridged LANs, the services
provided in VLANs, and the protocols and algorithms involved in the
provision of these services.
For more information, see "Virtual LAN Overview" on page 467.
GVRP Support
GARP VLAN Registration Protocol(GVRP) provides IEEE 802.1Qcompliant VLAN pruning and dynamic VLAN creation. When GVRP is
enabled, the device registers and propagates VLAN membership on all ports
that are part of the active underlying Spanning Tree Protocol topology.
For more information, see "GVRP Parameters" on page 490.
Voice VLAN
Voice VLAN enables network administrators to enhance VoIP service by
configuring ports to carry IP voice traffic from IP phones on a specific VLAN.
VoIP traffic has a preconfigured OUI prefix in the source MAC address.
Network administrators can configure VLANs from which voice IP traffic is 22 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
forwarded. Non-VoIP traffic is dropped from the Voice VLAN in Auto-Voice
VLAN Secure mode. Voice VLAN also provides QoS to VoIP, ensuring that the
quality of voice does not deteriorate if the IP traffic is received unevenly.
For more information, see "Voice VLAN" on page 498.
Guest VLAN
Guest VLAN provides limited network access to unauthorized ports. If a port
is denied network access via port-based authorization, but the Guest VLAN is
enabled, the port receives limited network access through the Guest VLAN.
For more information, see "Dot1x Authentication" on page 132.
Private VLAN
The Private VLAN feature provides Layer 2 isolation between ports that share
the same Broadcast domain, or in other words, it creates a point-tomultipoint Broadcast domain. The ports can be located anywhere in the
Layer 2 network (compared to the Protected Ports feature, where the ports
must be in the same stack).
For more information, see "Private VLAN" on page 494.
Multicast TV VLAN
The Multicast TV VLAN feature provides the ability to supply multicast
transmissions to Layer 2-isolated subscribers, without replicating the
multicast transmissions for each subscriber VLAN. The subscribers are the
only receivers of the multicast transmissions.
For more information, see "Multicast TV VLAN" on page 535.
Spanning Tree Protocol Features
Spanning Tree Protocol (STP)
802.1d Spanning tree is a standard Layer 2 switch requirement that enables
bridges to automatically prevent and resolve Layer 2 forwarding loops.
Switches exchange configuration messages using specifically-formatted
frames, and selectively enable and disable forwarding on ports.
For more information, see "Spanning Tree" on page 434. Dell PowerConnect 55xx Systems User Guide 23
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Fast Link
STP can take 30–60 seconds to converge. During this time, STP detects
possible loops, enabling time for status changes to propagate and for relevant
devices to respond. This period of 30-60 seconds is considered too long a
response time for many applications. The Fast Link option bypasses this
delay, and can be used in network topologies, where forwarding loops do not
occur.
For more information on enabling Fast Link for ports and LAGs, see "STP
Port Settings" on page 442 or "Static Addresses" on page 424.
IEEE 802.1w Rapid Spanning Tree
Spanning Tree takes 30–60 seconds for each host to decide whether its ports
are actively forwarding traffic. Rapid Spanning Tree (RSTP) detects uses of
network topologies to enable faster convergence, without creating forwarding
loops.
For more information, see "Spanning Tree" on page 434.
IEEE 802.1s Multiple Spanning Tree
Multiple Spanning Tree (MSTP) operation maps VLANs into STP instances.
MSTP provides a different load balancing scenario. Packets assigned to various
VLANs are transmitted along different paths within MSTP Regions (MST
Regions). Regions are one or more MSTP bridges by which frames can be
transmitted. The standard lets administrators assign VLAN traffic to
unique paths.
For more information, see "Spanning Tree" on page 434.
STP BPDU Guard
BPDU Guard is used as a security mechanism, to protect the network from
invalid configurations.
BPDU Guard is usually used either when fast link ports (ports connected to
clients) are enabled or when the STP feature is disabled. When it is enabled
on a port, the port is shut down if a BPDU message is received and an
appropriate SNMP trap is generated.
For more information, see "Spanning Tree" on page 434.24 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Link Aggregation
Up to 32 Aggregated Links may be defined, each with up to eight member
ports, to form a single Link Aggregated Group (LAG). This enables:
• Fault tolerance protection from physical link disruption
• Higher bandwidth connections
• Improved bandwidth granularity
• High bandwidth server connectivity
A LAG is composed of ports with the same speed, set to full-duplex
operation.
For more information, see "LAG Configuration" on page 409.
Link Aggregation and LACP
LACP uses peer exchanges across links to determine, on an ongoing basis, the
aggregation capability of various links, and continuously provides the
maximum level of aggregation capability achievable between a given pair of
devices. LACP automatically determines, configures, binds, and monitors the
port binding within the system.
For more information, see "Link Aggregation" on page 508.
BootP and DHCP Clients
DHCP enables additional setup parameters to be received from a network
server upon system startup. DHCP service is an on-going process. DHCP is an
extension of BootP.
For more information, see "DHCP IPv4 Interface" on page 214.
Quality of Service Features
Class of Service 802.1p Support
The IEEE 802.1p signaling technique is an OSI Layer 2 standard for marking
and prioritizing network traffic at the data link/MAC sub-layer. 802.1p traffic
is classified and sent to the destination. No bandwidth reservations or limits Dell PowerConnect 55xx Systems User Guide 25
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
are established or enforced. 802.1p is a spin-off of the 802.1Q (VLANs)
standard. 802.1p establishes eight levels of priority, similar to the IP
Precedence IP Header bit-field.
Advanced QoS
Frames that match an ACL and were permitted entrance are implicitly
labeled with the name of the ACL that permitted their entrance. Advanced
mode QoS actions defined in network policies can then be applied to these
flows.
The switch can set DSCP values and map IPv6 DSCP to egress queues in the
same way it does for IPv4. The switch detects IPv6 frames by the IPv6 ethertype.
For more information about Advanced QoS, see "QoS Advanced Mode" on
page 678.
TCP Congestion Avoidance
The TCP Congestion Avoidance feature activates an algorithm that breaks up
or prevents TCP global synchronization on a congested node, where the
congestion is due to multiple sources sending packets with the same byte
count.
For more information, see "The following is an example of the CLI
commands:" on page 666.
Device Management Features
SNMP Alarms and Trap Logs
The system logs events with severity codes and timestamps. Events are sent as
SNMP traps to a Trap Recipient List.
For more information, see "SNMP" on page 314.26 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNMP Versions 1, 2, and 3
Simple Network Management Protocol (SNMP) over the UDP/IP protocol
controls access to the system. A list of community entries is defined, each
consisting of a community string and its access privileges. There are three
levels of SNMP security: read-only, read-write, and super. Only a super user
can access the Community table.
For more information, see "SNMP" on page 314.
Web-Based Management
Web-based management enables managing the system from any web browser.
The system contains an Embedded Web Server (EWS) that serves HTML
pages, through which the system can be monitored and configured. The
system internally converts web-based input into configuration commands,
MIB variable settings, and other management-related settings.
Management IP Address Conflict Notification
This feature validates the uniqueness of the switch's IP address, whether it is
assigned manually or through DHCP. If the IP address is not unique, the
switch performs actions according to the address type. If the IP address is
static, see more information about this in "IPv4 Interface Parameters" on
page 210. If the IP address is dynamic, see more information about this
in"DHCP IPv4 Interface" on page 214.
Flow Monitoring (sflow)
The switch supports statistics collection, using a sampling technology called
sFlow that is based on RFC 3176. The sFlow sampling technology is
embedded within the switch, and provides the ability to continuously
monitor traffic flows on some or all the interfaces simultaneously.
For more information, see "sFlow" on page 375.
Configuration File Download and Upload
The device configuration is stored in a configuration file. The configuration
file includes both system-wide and port-specific device configuration. The
system can display configuration files as a collection of CLI commands that
are stored and manipulated as text files.Dell PowerConnect 55xx Systems User Guide 27
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Auto-Update of Configuration/Image File
This feature facilitates installation of new devices. When you enable the
various auto-update options, the device automatically downloads a new
image or configuration file when it receives its IP address from a TFTP server,
and automatically reboots, using the image or configuration file it received.
For more information, see "Auto-Update/Configuration Feature" on page 338.
TFTP Trivial File Transfer Protocol
The device supports boot image, software, and configuration
upload/download via TFTP.
USB File Transfer Protocol
The device supports boot image, software, and configuration
upload/download via USB.
Remote Monitoring
Remote Monitoring (RMON) is an extension to SNMP that provides
comprehensive network traffic monitoring capabilities. RMON is a standard
MIB that defines MAC-layer statistics and control objects, enabling real-time
information to be captured across the entire network.
For more information, see "Statistics/RMON" on page 606.
Command Line Interface
Command Line Interface (CLI) syntax and semantics conform as much as
possible to common, industry standards. CLI is composed of mandatory and
optional elements. The CLI interpreter provides command and keyword
completion to assist users and save typing.
Syslog
Syslog is a protocol that enables event notifications to be sent to a set of
remote servers, where they can be stored, examined, and acted upon. The
system sends notifications of significant events in real time, and keeps a
record of these events for after-the-fact usage.
For more information on Syslog, see "Logs" on page 195.28 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNTP
The Simple Network Time Protocol (SNTP) assures accurate network
Ethernet Switch clock time synchronization up to the millisecond. Time
synchronization is performed by a network SNTP server. Time sources are
prioritized by strata. Strata define the distance from the reference clock. The
higher the stratum (where zero is the highest), the more accurate the clock.
For more information, see "Time Synchronization" on page 169.
Domain Name System
Domain Name System (DNS) converts user-defined domain names into IP
addresses. Each time a domain name is assigned, the DNS service translates
the name into a numeric IP address. For example, www.ipexample.com is
translated into 192.87.56.2. DNS servers maintain domain name databases
containing their corresponding IP addresses.
For more information, see "Domain Name System" on page 242.
802.1ab (LLDP-MED)
The Link Layer Discovery Protocol (LLDP) enables network managers to
troubleshoot, and enhances network management by discovering and
maintaining network topologies over multi-vendor environments. LLDP
discovers network neighbors by standardizing methods for network devices to
advertise themselves to other systems, and to store discovered information.
The multiple advertisement sets are sent in the packet Type Length Value
(TLV) field. LLDP devices must support chassis and port ID advertisement,
as well as system name, system ID, system description, and system capability
advertisements.
LLDP Media Endpoint Discovery (LLDP-MED) increases network flexibility
by enabling various IP systems to co-exist on a single network LLDP. It
provides detailed network topology information, emergency call service via IP
phone location information, and troubleshooting information.
For more information, see "LLDP" on page 540.Dell PowerConnect 55xx Systems User Guide 29
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Security Features
SSL
Secure Socket Layer (SSL) is an application-level protocol that enables secure
transactions of data through privacy, authentication, and data integrity. It
relies upon certificates and public and private keys.
Port-Based Authentication (Dot1x)
Port-based authentication enables authenticating system users on a per-port
basis via an external server. Only authenticated and approved system users
can transmit and receive data. Ports are authenticated via the Remote
Authentication Dial-In User Service (RADIUS) server using the Extensible
Authentication Protocol (EAP). Dynamic VLAN Assignment (DVA) enables
network administrators to automatically assign users to VLANs during the
RADIUS server authentication.
For more information, see "Dot1x Authentication" on page 132.
Locked Port Support
Locked Port increases network security by limiting access on a specific port to
users with specific MAC addresses. These addresses are either manually
defined or learned on that port. When a frame is seen on a locked port, and
the frame source MAC address is not tied to that port, the protection
mechanism is invoked.
For more information, see "Port Security" on page 98.
RADIUS Client
RADIUS is a client/server-based protocol. A RADIUS server maintains a user
database that contains per-user authentication information, such as user
name, password, and accounting information.
RADIUS Accounting
This feature enables recording device management sessions (Telnet, serial,
and WEB but not SNMP) and/or 802.1x authentication sessions.30 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Due to the complexity of 802.1x setup and configuration, many mistakes can
be made that might cause loss of connectivity or incorrect behavior. The
802.1x Monitor mode enables applying 802.1x functionality to the switch,
with all necessary RADIUS and/or domain servers active, without actually
taking any action that may cause unexpected behavior. In this way, the user
can test the 802.1x setup before actually applying it.
For more information, see "RADIUS" on page 291.
SSH
Secure Shell (SSH) is a protocol that provides a secure, remote connection to
a device. SSH version 2 is currently supported. The SSH server feature
enables an SSH client to establish a secure, encrypted connection with a
device. This connection provides functionality that is similar to an inbound
telnet connection. SSH uses RSA and DSA Public Key cryptography for
device connections and authentication.
For more information, see "Security Management and Password
Configuration" on page 75.
TACACS+
TACACS+ provides centralized security for validation of users accessing the
device. TACACS+ provides a centralized, user management system, while
still retaining consistency with RADIUS and other authentication processes.
For more information, see "TACACS+" on page 282.
Password Management
Password management provides increased network security and improved
password control. Passwords for SSH, Telnet, HTTP, HTTPS, and SNMP
access are assigned security features.
For more information, see "Password Management" on page 286.
The switch provides the ability to demand strong passwords, meaning that
they must contain both upper and lower-case letters, numbers, and
punctuation marks.
For more information, see "Password Management" on page 286.Dell PowerConnect 55xx Systems User Guide 31
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Access Control Lists (ACL)
Access Control Lists (ACL) enable network managers to define classification
actions and rules for specific ingress ports. Packets entering an ingress port
with an active ACL, are either admitted or denied entry and the ingress port is
disabled. If they are denied entry, the user can disable the port.
Dynamic ACL/Dynamic Policy Assignment (DACL/DPA)
The network administrator can specify the user's ACL in the RADIUS server.
After successful authentication, the user is assigned that ACL.
For more information, see "Network Security" on page 97.
DHCP Snooping
DHCP Snooping expands network security by providing firewall security
between untrusted interfaces and DHCP servers. By enabling DHCP
Snooping, network administrators can differentiate between trusted
interfaces connected to end-users or DHCP servers and untrusted interfaces
located beyond the network firewall.
For more information, see "DHCP Snooping" on page 573.
ARP Inspection
Dynamic ARP inspection is a security feature that validates ARP packets in a
network. It intercepts, logs, and discards ARP packets with invalid IP-to-MAC
address bindings. This capability protects the network from certain man-inthe-middle attacks.
Port Profile (CLI Macro)
Macros provide a convenient way to save and share a common configuration.
A macro is a set of CLI commands with a unique name. When a macro is
applied to a port, the CLI commands contained within it are executed and
added to the Running Configuration file.
For more information, see "Dynamic ARP Inspection" on page 560.32 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCP Server
Dynamic Host Configuration Protocol (DHCP) provides a means of passing
configuration information (including the IP address of a TFTP server and a
configuration file name) to hosts on a TCP/IP network. The switch can serve
as a DHCP server or client.
For more information on the device serving as a DHCP server, see "DHCP
Server" on page 297.
For more information on the device serving as a DHCP client, see "DHCP
IPv4 Interface" on page 214.
Protected Ports
The Protected Ports feature provides Layer 2 isolation between interfaces
(Ethernet ports and LAGs) that share the same Broadcast domain (VLAN)
with other interfaces.
For more information, see "Protected Ports" on page 394.
iSCSI Optimization
iSCSI optimization provides the iSCSI flows with specific priority over other
network traffic. In addition, the feature provides monitoring of iSCSI
sessions.
For more information, see "iSCSI Optimization" on page 594.
Proprietary Protocol Filtering
This feature enables user control over the filtering of packets with proprietary
protocols such as CDP, VTP, DTP, UDLD, PaGP, and SSTP. The user can
select any combination of the protocols to be filtered, for example: CDP and
VTP and UDLD.
For more information, see "Network Security" on page 97.
DHCP Relay and Option 82
A DHCP relay agent detects DHCP Broadcasts from DHCP clients and relays
them to DHCP servers that may reside on different subnets.Dell PowerConnect 55xx Systems User Guide 33
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The relay agent information option (Option 82) in the DHCP protocol
enables a DHCP relay agent to send additional client information, upon
requesting an IP address.
Option 82 specifies the relaying switch's MAC address, the port identifier, and
the VLAN that forwarded the packet.
For more information, see "DHCP Relay" on page 586.
Identifying a Switch via LED
The switch provides the ability to turn on a LED (through the GUI interface)
on a specific unit or on all units in a stack for a specific length of time.
For more information, see Unit Identification (Location).34 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLYDell PowerConnect 55xx Systems User Guide 35
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3
Hardware Description
This section describes PowerConnect 5500 hardware.
It contains the following topics:
• Device Models
• Device Structure
• LED Definitions
• Power Supplies36 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Device Models
The PowerConnect 5500 switches combine versatility with minimal
management requirements. This series includes the following device types:
• PowerConnect 5524 — Provides 24 10/100/1000Mbps Base-T ports
• PowerConnect 5524P (with PoE) — Provides 24 10/100/1000Mbps Base-T
ports, along with Power-over-Ethernet (PoE) support
• PowerConnect 5548 — Provides 48 10/100/1000Mbps Base-T ports
• PowerConnect 5548P (with PoE) — Provides 24 10/100/1000Mbps Base-T
ports, along with Power-over-Ethernet (PoE) support
Each of these devices provides, in addition to the above ports, two HDMI
ports, two SPF+ ports, an RS-232 console port, and a USB port, as shown in
Figure 3-1.
NOTE: 10/100/1000Mbps Baset-T ports are also known as Gigabit ports or G ports.
Device Structure
This section describes the structure of the devices.
It contains the following topics:
• Front Panel
• Buttons and LEDs
• Back Panel
• Ventilation System
• System LEDs
• Port LEDsDell PowerConnect 55xx Systems User Guide 37
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Front Panel
Figure 3-1 shows the front panel of the PowerConnect 5548 device with its
various ports labelled. The PowerConnect 5524 device from the
PowerConnect 5548 device in that there are 24 G ports and not 48.
Figure 3-2 shows the buttons/LEDs on the right side in greater detail.
Figure 3-1. PowerConnect 5548 Ports
The following ports are found on the devices.
• 24/48 G Ports
• Two XG Ports (also known as Small Form Factor Plugable (SFP)+ Ports)
These are 10 Gigabit ports, designated as 1000Base-X-SFP+. The SFP+
ports are fiber transceivers designated as 10000 Base-SX or LX. They
include TWSI (Two-Wire Serial Interface) and internal EPROM.
• RS-232 Console Port
This port is used for a terminal connection for debugging and software
downloads. The default baud rate is 9,600 bps. The baud rate can be
configured from 2400 bps up to 115,200 bps.
• Two HDMI Ports
The HDMI ports are 1.3a specification, category 2 high-speed cables, 340
MHz (10.2 Gbit/s). They are used for stacking purposes.
Console
SPF+ Ports
USB Port
HDMI Ports
Giga Ports (even numbered)
Port
Giga Ports (odd numbered)38 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
NOTE: it is recommended to use HDMI cable version 1.4
• Single USB Port
This port is used for firmware upgrade from a USB device.
Buttons and LEDs
LEDs on Front Panel
Figure 3-2 shows the extreme, right-hand part of the front panel, which
contains buttons and LEDs, in addition to ports.
Figure 3-2. Button/LED Panel
These LEDs are described in Table 3-1 and Table 3-2.
Reset Button
The PowerConnect 5500 switches have a reset button, located on the front
panel that is used for manual reset (reboot) of the device.
The single reset circuit of the switch is activated by power-up or low-voltage
conditions.
Power Status
Fan
RPS
Reset
Stacking Unit ID
Master Port LEDs
Console PortDell PowerConnect 55xx Systems User Guide 39
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The Reset button does not extend beyond the unit’s front, and it must be
activated with a pin.
Back Panel
The back panel of the non-PoE models, shown in Figure 3-3, contains a
Redundant Power Supply (RPS) connector, Location LED, and power
connector.
The back panel of the PoE models, shown in Figure 3-4, contains a Modular
Power Supply (MPS) connector, Location LED, power connector, and two fan
outlets.
Figure 3-3. PowerConnect 5524/48 Back Panel
Figure 3-4. PowerConnect 5524/48/P Back Panel
The elements on the back panel are used as follows:
• Locator LED — This LED is lit when the Unit Identification feature is
selected. See "Unit Identification (Location)" on page 373 for more
information about this feature.
• RPS/MPS — Connector for auxiliary power supply. See "Power Supplies"
on page 44 for more information.
RPS
A/C Power Supply
Locator
Locator MPS Fan Fan A/C Power Supply40 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• A/C Power Supply — Connector for AC power supply. See "Power
Supplies" on page 44 for more information.
• Fans — Fan outlets. See "Ventilation System" on page 40 for more
information.
Ventilation System
The PowerConnect 5500/P switches have two built-in fans. Operation can be
verified by observing the LED that indicates if one or more fans are faulty
(see Table 3-1).
The fan outlets are shown in Figure 3-4.
LED Definitions
The front panel contains light emitting diodes(LEDs) that indicate the
status of links, power supplies, fans, and system diagnostics.
These are described below.
System LEDs
The system LEDs of the PowerConnect 5500 devices provide information
about the power supplies, fans, thermal conditions, and diagnostics.
Figure 3-2 shows the location of the system LEDS on the device.
Table 3-1 describes the meaning of the colors of the system LEDs.
Table 3-1. System LED Indicators
LED Color Description
Power Supply
(PWR)
Green Static The switch is turned on.
Green Flashing The Locator function is enabled.
Off The switch is turned off.
Status Green Static The switch is operating normally.
Green Flashing The switch is booting.
Red Static A critical system error has occurred.
Red Flashing A non-critical system error has occurred.Dell PowerConnect 55xx Systems User Guide 41
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Stacking No. Indicates the unit ID of the device in the
stack.
Modular/Redundan
cy Power Supply
(MPS/RPS)
Green Static The MPS/RPS is currently operating.
Red Static The MPS/RPS failed.
Off The MPS/RPS is not plugged in.
Locator Green Flashing Locator function is enabled.
Green Static Locator function is disabled.
Master Green Static The device is a master unit.
Off The device is not a master unit.
Fan (FAN) Green Static All device fans are operating normally.
Red Static One or more of the device fans are not
operating.
Table 3-1. System LED Indicators (Continued)
LED Color Description 42 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port LEDs
Gigabit Ports
Each Giga port has two LEDs associated with it. The speed/link (LNK) LED
is located on the left side of the port, while the activity/PoE LED is located on
the right side of the port. The activity/PoE LED is labelled ACT in non-PoE
devices, and is labelled PoE in PoE-enabled devices, as shown in Figure 3-5.
Figure 3-5. Giga Port LEDs
Table 3-2 describes the LED indications for the Gigabit ports:
Table 3-2. Giga Port s on non-PoE-enabled Devices LEDs
LED Color Description
LNK Green Flashing Link is up and the port is either transmitting
or receiving at 1000 Mbs.
Yellow Flashing Link is up and the port is either transmitting
or receiving data at 100 Mbps.
Solid green
Solid amber
Link is up high speed.
Link is up at lower speeds.
OFF The port is currently not operating.
ACT Green Flashing There is activity on the port.
Off There is no activity on the port.
LNK ACT/PoE
LNK ACT/PoEDell PowerConnect 55xx Systems User Guide 43
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Table 3-3 describes the LED indications for Gigabit ports on PoE-enabled
devices.
HDMI Port LEDs
The HDMI ports have a Speed/link (LNK) LED on their left side and an
activity (ACT) LED on their right side.
Table 3-4 describes the HDMP port LEDs:
Table 3-3. Giga Port s on PoE-enabled Devices LEDs
LED Color Description
LNK Flashing green Link is up and the port is either transmitting or
receiving at 1000 Mbs.
Flashing amber Link is up and the port is either transmitting or
receiving data at 100 Mbps.
Solid green
Solid amber
Link is up high speed.
Link is up at lower speeds.
Off Port is currently not operating.
PoE Flashing green There is activity on the port and the PoE is off.
Flashing amber There is activity on the port and the PoE is on.
Amber solid There is no activity on the port and the PoE power is
on.
Off There is no activity on the port and the PoE is off.
Table 3-4. HDMI (Stacking) Port LEDs
LED Color Description
Speed/Link Solid green Port is linked to device.
Off Port is currently not operating.
ACT Flashing green Port is either transmitting or receiving.
Off Port is not transmitting or receiving.44 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SFP LEDs
The SFP+ ports each have two LEDs, marked as LNK and ACT, associated
with them. Figure 3-5 describes these LEDs.
Stack ID LED
The front panel of the device contains a Stack ID panel used to display the
Unit ID for the Stack Master and members, as shown in Figure 3-2.
Power Supplies
The device has an internal power supply unit (AC unit) and a connector to
connect PowerConnect 5500/P devices to a PowerConnect EPS-470 unit, or
to a PowerConnect MPS-600 unit.
The PowerConnect 5500/P devices have the following internal power
supplies:
• 24 Port non-PoE devices — 54 Watt.
• 48 Port non-PoE devices — 100 Watt.
• 24/48 Port PoE devices — 600 Watt.
Operation with both power supply units is regulated through load sharing.
Power supply LEDs indicate the status of the power supply.
The AC power supply unit operates from 90 to 264 VAC, 47 to 63 Hz. The AC
power supply unit uses a standard connector. A LED, shown in Figure 3-3,
indicates whether the AC unit is connected.
When the device is connected to a supplementary power source, the
probability of failure in the event of a power outage decreases.
Table 3-5. SFP Port LEDs
LED Color Description
LNK Solid green Link is at highest speed.
Solid amber Link is at lowest speed.
Off Port is currently not linked.
ACT Flashing green Port is either transmitting or receiving.Template Last Updated - 2/7/2007Dell PowerConnect 55xx Systems User Guide 45
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
4
Stacking Overview
This section describes how the Stacking feature of the PowerConnect 5500
series functions.
It contains the following topics:
• Stack Overview
• Stack Members and Unit IDs46 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Stack Overview
The PowerConnect 5500 Stacking feature provides multiple switch
management through a single switch, so that all units in the stack are treated
as if they were a single switch. All stack members are accessed through the
management IP address, through which the stack is managed.
Each switch is a member in a stack, although the stack may consist of only a
single switch.
Up to eight units can be stacked.
This section covers the following topics:
• Stack Operation Modes
• Stacking Units
• Stack Topology
Stack Operation Modes
All stacks must have a Master unit, and may have a Master Backup unit. All
other units are connected to the stack as members (slaves).
A unit in the stack can be in one of the following modes:
• Stack Master — Runs the fully operational software of a switch. In
addition, it runs configures and manages all other units in the stack. All
protocols run in the context of the Master unit. It is responsible for
updating and synchronizing the Master Backup.
The Stack Master detects and reconfigures the ports with minimal
operational impact in the event of:
Unit failure
Inter-unit stacking link failure
Unit insertion
Unit removal
When the Master unit boots, or when inserting or removing a stack
member, the Master unit initiates a stacking discovering process. Dell PowerConnect 55xx Systems User Guide 47
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Slave Unit — Runs a slave version of the software that enables the
applications running on the Master’s CPU to control and manage the
resources of the slave unit.
• Master Backup — Runs as a slave unit, as described above, and in
addition, continuously monitors the existence and operation of the stack
master. If the master unit fails, the master-backup unit assumes the Master
Backup role.
Stacking Units
PowerConnect 5500 series switches use two HDMI 10G ports for stacking.
To connect the units in the stack:
1 Insert one end of an HDMI cable into the left-hand HDMI port on the
unit at the top of the stack and the other end into the right-hand HDMI
port of the unit immediately below it (this is called crossover).
2 Repeat this process until all units are connected.
3 (Optional) Connect the left-hand HDMI port of the unit at the bottom of
the stack to the right-hand HDMI port of the unit at the top of the stack.
This step provides increased bandwidth and redundancy.48 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The results of this process are shown in Figure .
Figure 4-1. Stacking Ring Topology
HDMI Ports
Front Panel
HDMI Ports
Front Panel
HDMI Ports
Front Panel
Front Panel
HDMI PortsDell PowerConnect 55xx Systems User Guide 49
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Stack Topology
The PowerConnect 5500 series systems operates in a ring or chain topology.
Ring Topology
In a ring topology all units in the stack are connected to each other, forming a
circle. Each unit in the stack accepts data and sends it to the unit to which it
is attached. The packet continues through the stack until it reaches its
destination. The system discovers the optimal path on which to send traffic.
Figure 4-1 shows units of a stack connected in a ring topology.
Stacking Failover Topology - Chain Topology
Difficulties occur when a unit in the ring becomes non-functional, or a link is
severed. In this case, the system automatically switches to a chain topology,
without any system downtime.
In chain topology, each unit in the stack is connected to neighboring unit
except for the last unit, which is not connected to any other unit.
In the chain topology, the stack continues to function as long as there is a
master- or backup-enabled unit in each segment of the stack.
When the ring topology is switched to chain topology, an SNMP message is
automatically generated, but no stack management action is required. The
unit that failed must be repaired to restore full stacking operation in the ring
topology.
After the stacking issues are resolved, the units can be reconnected without
interruption, and the ring topology is restored.
Stack Members and Unit IDs
This section describes how to configure the stack.
It contains the following topics:
• Adding a Unit to the Stack
• Assigning Unit IDs
• Selecting the Master and Master Backup Units
• Switching from the Master to the Master Backup
• Replacing Stacking Members50 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Loading Software onto Stack Members
• Rebooting the Stack
• Managing Configuration Files on the Stack
Adding a Unit to the Stack
The recommended procedure to add a unit to a stack is as follows:
1 Place the powered-off unit in its physical place in the stack, and insert the
stacking link in the unit (but do not connect it to the rest of the stack).
2 Power up the unit, and set the correct Unit ID, as described below.
3 Reboot the unit and connect it to the rest of the stack through the stack
link.
Assigning Unit IDs
Each unit in the stack has a unique ID that defines the unit’s position and
function in the stack, as shown in Figure 3-2.
The unit that is assigned Unit ID 1 is the Master unit, by default. The unit
that is assigned Unit ID 2 is the Master Backup unit.
When you power-up the stack, each unit is assigned a unique Unit ID. This is
displayed on the front panel of the unit, as shown in Figure 3-2.
The Unit ID of each unit can be either automatically assigned or manually
assigned, as described in step 1 to step 4 below.
To assign IDs to the units in the stack, do the following for each unit in the
stack:
1 Connect the unit to the terminal.Dell PowerConnect 55xx Systems User Guide 51
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Turn on the unit to begin auto boot and press Return or Esc to abort and
enter the Start Up menu.
3 Select Stack Menu to open the Stack Menu.
4 Select Set Unit Stack ID. Enter either a Unit ID for manual assignment or
0 to indicate that the unit ID will be assigned automatically.
NOTE: The entire stack should be connected, as shown in Figure 4-1, before
powering up the units.
Selecting the Master and Master Backup Units
A unit is master-enabled if it assigned Unit ID 1 and Unit 2. All other units in
the stack (slaves) have unit IDs of 3-8.
The stack master assignment is performed during the configuration boot
process. One master-enabled stack member is elected as Master, and the
other master-enabled stack member is selected as Master Backup, according
to the following decision process:
• A master is selected from the set of the two Master-enabled units. Priority
is given to the lowest unit ID, but also takes into account the amount of
time the unit is UP (Up Time) as follows:
Startup Menu
[1]Download Software
[2]Erase Flash File
[3]Password Recovery Procedure
[4]Set Terminal Baud-Rate
[5]Stack Menu
[6]Back
[1]Show Unit Stack ID
[2]Set Unit Stack ID
[3]Back52 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– When a master-enabled unit is inserted to a running stack, (or when
Master and Backup master both start at the same time), they
exchange each other’s UP TIME (the time since they powered up). If
the time difference is smaller than 10 minutes, the unit with the
lowest unit ID is elected; otherwise, the unit with the longest UP time
is elected.
– If a Master-enabled unit (with ID 1 or 2) is inserted into an
operational stack, it will be elected as a backup master.
– If a Master unit and/or a backup Master unit is removed from the
stack and the user wishes to configure one of the slave units
(numbered 3-8) to be a Master backup, the user must reset the unit’s
ID. This can be done as follows:
• If there is a Master-enabled unit in the stack: Do -switch n
renumber 2 (through CLI or GUI). This makes the nth unit a
master-enabled unit.
• If there is no Master-enabled unit in the stack: Press the reset
button on the unit to be master-enabled, and assign it a unit ID=
1 using the boot menu.
• The user can force a master-enabled unit to be the master unit of the
stack, even if the master election process did not select it. This is done by
switching over to the backup unit.
NOTE: Two stacking member are considered the same age if they were
inserted within a ten minute interval, for example, if Unit 2 is inserted in the
first minute of a ten-minute cycle, and Unit 1 is inserted in fifth minute of the
same cycle, the units are considered to be the same age.
NOTE: If two stack members are discovered to have the same Unit ID, only
the older unit is included in the stack. The stack continues to function and a
message is sent notifying that a unit failed to join the stack.
The Stack Master and the Master Backup maintain a Warm Standby. The
Warm Standby ensures that the Master Backup takes over for the Stack
Master if a failover occurs, so that the stack continues to operate normally.
During the Warm Standby, the Master and the Master Backup are
synchronized with the static configuration. When the Stacking Master is
configured, it must synchronize the Master Backup. The dynamic Dell PowerConnect 55xx Systems User Guide 53
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
configuration is not saved, for example, dynamically-learned MAC addresses
are not saved, but dynamic information is learned quickly and automatically
by network traffic.
Switching from the Master to the Master Backup
The Master Backup replaces the Stack Master if one or more of the following
events occur:
• The Stack Master fails or is removed from the stack.
• Links from the Stack Master to the stacking members fails.
• User performs soft switchover via the Web interface or the CLI.
Switching between the Stack Master and the Master Backup results in limited
service loss. Dynamic tables are relearned if a failure occurs. The Running
Configuration file is synchronized between Stack Master and the Master
Backup, and continues running on the Master Backup.
Replacing Stacking Members
If a unit is removed from the stack, and replaced with a unit with the same
unit ID, the stack member is configured with the original unit configuration.
Otherwise, if the new unit has either more or fewer ports than the previous
unit, the results depend on the device type of the new and original units, as
defined in Table 4-1:
Table 4-1. Port Configurations when Replacing Units
New Unit Original Unit New Port Configuration
5548P or 5548 5548P or 5548 Port configurations remain the same.
5524 or 5524P The first 24 Giga (GE) ports receive the
respective 5524/P 24 GE port
configurations. The 10 G port
configurations remain the same. 54 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Loading Software onto Stack Members
Software can be downloaded to all units simultaneously, or to the master unit
alone. If software is only loaded to the master unit, when new software is
selected, and the Master is rebooted, the Master updates the software on the
remaining units.
In this way, all units in the stack run the same software version.
Rebooting the Stack
Whenever a reboot occurs, topology discovery is performed, and the Master
learns all units IDs in the stack.
Configuration files are changed only through explicit user configuration, and
are not automatically modified when units are added, removed or reassigned
unit IDs.
Each time the system reboots, the Startup Configuration file in the Master
unit is used to configure the stack.
Managing Configuration Files on the Stack
The Startup Configuration and Running Configuration file are stored on the
stack master.
Each port in the stack is referenced in the configuration files by its port type
and unit ID/0/port number, for example "gi1/0/24", which means Giga port 24
on unit 1 (the middle 0 is reserved for future use).
Configuration files are managed from the Stack Master, including:
• Saving to flash memory
5524P or 5524 5548P or 5548 The PowerConnect 5524/P 24 Gigabit
ports receives the first 24 Giga 5548/P port
configurations. The 10 Giga port
configurations remain the same. The
remaining ports receive the default port
configuration.
5524P or 5524 Port configurations remain the same.
Table 4-1. Port Configurations when Replacing Units (Continued)
New Unit Original Unit New Port ConfigurationDell PowerConnect 55xx Systems User Guide 55
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Uploading configuration files to an external TFTP server/HTTP client
• Downloading configuration files from an external TFTP server/HTTP
client
• Download/upload through the USB port
NOTE: Stack configuration for all configured ports is saved, even if the stack
is reset and/or the ports are no longer present.56 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLYTemplate Last Updated - 2/7/2007Dell PowerConnect 55xx Systems User Guide 57
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
5
Configuring the Switch
This section describes the configuration that must be performed after the
switch is installed and connected to power supplies. Additional advanced
functions are described in "Advanced Switch Configuration" on page 67.
NOTE: Before proceeding further, read the release notes for this product. You can
download the release notes from the Dell Support website at support.dell.com.
NOTE: We recommend that you obtain the most recent revision of the user
documentation from the Dell Support website at support.dell.com.
It contains the following topics:
• Configuration Work Flow
• Connecting the Switch to the Terminal
• Booting the Switch
• Configuring the Stack
• Configuration Using the Setup Wizard58 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuration Work Flow
To configure the switches:
1 For each switch in the stack:
a Connect it to a terminal, as described in the "Connecting the Switch
to the Terminal" on page 59.
b Boot the switch, as described in the "Booting the Switch" on page 60.
c Assign a unit ID to the switch, as described in "Assigning Unit IDs" on
page 50.
2 Connect the units in the stack to each other, as described in "Configuring
the Stack" on page 61.
3 Connect the Master unit to the terminal, reboot the unit and the Setup
Wizard is run automatically, as described in "Configuration Using the
Setup Wizard" on page 61.
4 Respond to the Setup Wizard prompts.
5 Continue managing the switch, either through the console or Telnet, using
the CLI or the web GUI.Dell PowerConnect 55xx Systems User Guide 59
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Connecting the Switch to the Terminal
The switch is configured and monitored through a terminal desktop system
that runs terminal emulation software. The switch connects to the terminal
through the console port.
To connect the switch to a terminal:
1 Connect an RS-232 cable to a VT100-compatible terminal or the serial
connector of a desktop system running terminal emulation software.
2 Connect the RS-232 cable to the switch console port on the front panel of
the switch (see Figure 5-1) using an 8-pin RJ-45 male connector.
Figure 5-1. Front-Panel Console Port
3 Set the terminal emulation software as follows:
a Select the appropriate serial port to connect to the switch.
b Set the data rate to 9600 baud.
c Set the data format to 8 data bits, 1 stop bit, and no parity.
d Set Flow Control to none.
e Select VT100 for Emulation mode within your communication
software.
f Select Terminal keys for Function, Arrow, and Ctrl keys. Ensure that
the setting is for Terminal keys (not Windows keys).
NOTE: You can connect a console to the console port on any unit in the stack, but
stack management is performed only from the stack master (Unit ID 1 or 2).
Console Port60 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Booting the Switch
After the local terminal is connected, turn on power. The switch then goes
through power-on self-test (POST). POST runs every time the switch is
started and checks hardware components, to determine if the switch is
operational before completely booting. If the system detects a critical
problem, the boot process stops. If POST passes successfully, a valid
executable image is loaded into RAM. POST messages are displayed on the
terminal and indicate test success or failure.
The boot process runs for approximately 40-45seconds.
When the boot process completes, the following LEDs are lit, as shown in
Figure 5-2:
• Power
• Status
• Fan (should be green)
• RPS (if it is being used)
Figure 5-2. Initial LEDs
Power Status
Fan
RPSDell PowerConnect 55xx Systems User Guide 61
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring the Stack
The switch is always considered to be a stack of switches even if the stack only
contains a single switch. If there is more than one switch in the stack, each
switch must be configured individually. See "Assigning Unit IDs" on page 50
for instructions on how to configure the stack.
Configuration Using the Setup Wizard
The Setup Wizard guides you through the initial switch configuration to get
the system up and running as quickly as possible. Note that you can skip the
Setup Wizard and configure the switch manually through the CLI.
The Setup Wizard configures the following fields:
• SNMP Community String and SNMP Management System IP address
(optional)
• Username and password
• Management switch IP address
• IP subnet mask
• Default gateway IP address
NOTE: The Setup Wizard assumes the following:
• The PowerConnect switch was never configured before and is in the same
state as when you received it.
• The PowerConnect switch booted successfully.
• The console connection is established and the console prompt is displayed on
the screen of a VT100 terminal switch.
Connect the Master unit to a terminal. You can identify the Master unit by
the illuminated Master LED on the front panel of the switch (see Figure 3-2).
To configure the system using the Setup Wizard:
1 Obtain the following information from the network administrator:
• SNMP Community String and SNMP Management System IP
address (optional)
• Username and password62 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• The IP address to be assigned to the VLAN 1 interface through which
the switch is to be managed (by default, every external and internal
port is a member of the VLAN 1)
• The IP subnet mask for the network
• The default gateway (next hop router) IP address for configuring the
default route
2 Boot the Master unit. The system automatically prompts you to use the
Setup Wizard.
The Setup Wizard displays the following information:
Welcome to Dell Easy Setup Wizard
The Setup Wizard guides you through the initial
switch configuration and gets you up and running
easily and quickly. You can skip the Setup Wizard
and enter CLI mode to manually configure the
switch. The system will prompt you with a default
answer; by pressing Enter, you accept the default
value.
You must respond to the next question to run the
Setup Wizard within 60 seconds, otherwise the
system will continue with normal operation using
the default system configuration.
Would you like to enter the Setup Wizard (you must
answer this question within 60 seconds)? (Y/N)
3 Enter [Y] to run the wizard. If you enter [N] or if you do not respond
within 60 seconds, the Setup Wizard automatically exits and the CLI
console prompt appears.
If you enter [Y] the wizard provides interactive guidance through the
initial switch configuration.
The following information is displayed:
You can exit the Setup Wizard at any time by
entering [ctrl+Z].
The system is not set up for SNMP management by
default. Dell PowerConnect 55xx Systems User Guide 63
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To manage the switch using SNMP (required for Dell
Network Manager) you can:
• Setup the initial SNMP version 2 account now.
• Return later and set up the SNMP version account.
For more information on setting up a SNMP version
2 account, see the user documentation.
Would you like to set up the SNMP management
interface now? [Y/N]
4 Enter [N] to skip to Step 7 or enter [Y] to continue the Setup Wizard. If
you enter [Y] the following information is displayed:
To set up the SNMP management account you must
specify the management system IP address and the
"community string" or password that the particular
management system uses to access the switch. The
wizard automatically assigns the highest access
level [Privilege Level 15] to this account.
You can use Dell Network Manager or other
management interfaces to change this setting later
and to add additional management system later. For
more information on adding management systems, see
the user documentation.
To add a management station:
Please enter the SNMP community string to be used:
5 Enter the SNMP community string. You can use the default name "public"
Please enter the IP address of the Management
System (A.B.C.D) or wildcard (0.0.0.0) to manage
from any Management Station:[0.0.0.0].
6 Enter the SNMP Management System IP.
7 Set up user account privilege level, as follows:
The following information is displayed:
Now we need to set up your initial privilege
(Level 15) user account. This account is used to
login to the CLI and Web interface. You may set up 64 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
other accounts and change privilege levels later.
For more information on setting up user accounts
and changing privilege levels, see the user
documentation.
To set up a user account:
Enter the user name:
Please enter the user password:
Please reenter the user password:
8 Enter the following:
• User name, for example "admin"
• Password and password confirmation.
9 Press Enter.
The following information is displayed:
Next, an IP address is setup. The IP address is
defined on the default VLAN (VLAN 1). This is the
IP address you use to access the Telnet, Web
interface, or SNMP interface for the switch.
To set up an IP address:
Please enter the IP address of the device
(A.B.C.D):
Please enter the IP subnet mask (A.B.C.D or nn):
10 Enter the management IP address and IP subnet mask, for example
192.168.2.100 as the IP address and 255.255.255.0 as the IP subnet mask.
11 Press Enter.
The following information is displayed:
Finally, set up the default gateway.
Please enter the IP address of the gateway from
which this network is reachable
(e.g. 192.168.2.1).Default gateway
(A.B.C.D):[0.0.0.0] Dell PowerConnect 55xx Systems User Guide 65
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
12 Enter the default gateway.
13 Press Enter. The following is displayed (example):
This is the configuration information that has
been collected:
SNMP Interface = "Dell Network
Manager"@192.168.2.10
User Account setup = admin
Password = **********
Management IP address = 192.168.2.100
255.255.255.0
Default Gateway = 192.168.2.1
The following information is displayed:
If the information is correct, please select (Y)
to save the configuration and copy to the start-up
configuration file. If the information is
incorrect, select (N) to discard configuration and
restart the wizard: [Y/N]
14 Enter [N] to restart the wizard or enter [Y] to complete the Setup Wizard.
If you enter [Y] the following is displayed:
Configuring SNMP management interface.
Configuring user account.......
Configuring IP and subnet......
Thank you for using Dell Easy Setup Wizard. You
will now enter CLI mode.
The CLI prompt is displayed. You have finished the initial configuration.
After the initial configuration is complete, you can manage the switch from
the connected console port using the CLI or remotely through the
management interface, using Telnet or the Web GUI. See the Dell
PowerConnect 5500 Series User Guide found on the Documentation CD.66 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLYDell PowerConnect 55xx Systems User Guide 67
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
6
Advanced Switch Configuration
This section describes how to perform various configuration operations
through the CLI.
It includes the following topics:
• Using the CLI
• Accessing the Device Through the CLI
• Retrieving an IP Address
• Security Management and Password Configuration
• Configuring Login Banners
• Startup Menu Procedures
• Software Download68 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Using the CLI
This section provides some general information for using the CLI.
For a complete description of CLI commands, refer to the Dell
PowerConnect 55xx Systems CLI Reference Guide.
Command Mode Overview
The CLI is divided into command modes, each with a specific command set.
Entering a question mark at the terminal prompt displays a list of commands
available for that particular command mode.
In each mode, a specific command is used to navigate from one mode to
another.
These modes are described below.
User EXEC Mode
During CLI session initialization, the CLI is in User EXEC mode. Only a
limited subset of commands is available in User EXEC mode. This level is
reserved for tasks that do not change the terminal configuration and is used
to access configuration sub-systems.
After logging into the device, User EXEC command mode is enabled. The
user-level prompt consists of the host name followed by the angle bracket
(>). For example: console>
NOTE: The default host name is console unless it has been modified during
initial configuration.
The User EXEC commands enable connecting to remote devices, changing
terminal settings on a temporary basis, performing basic tests, and listing
system information.
To list the User EXEC commands, enter a question mark at the command
prompt.
To enter the next level, Privileged EXEC mode, a password is required (if
configured).
Privileged EXEC Mode
Privileged EXEC mode provides access to the device global configuration. Dell PowerConnect 55xx Systems User Guide 69
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Privileged access can be protected, to prevent unauthorized access and to
secure operating parameters. Passwords are displayed on the screen, and are
case-sensitive.
NOTE: The enable command is only necessary if you login with privilege level less
than 15.
To access and list the Privileged EXEC mode commands:
1 At the prompt type enable and press .
2 When a password prompt displays, enter the password and press
.
The Privileged EXEC mode prompt displays as the device host name
followed by #. For example: console#
To list the Privileged EXEC commands, type a question mark at the
command prompt.
To return from Privileged EXEC mode to User EXEC mode, type disable
and press .
The following example illustrates accessing privileged EXEC mode and then
returning to the User EXEC mode:
Use the exit command to return to a previous mode.
To configure the device, enter the next level, Global Configuration mode.
Global Configuration Mode
The Global Configuration mode manages device configuration on a global
level. Global Configuration commands apply to system features, rather than a
specific protocol or interface.
console> enable
Enter Password: ******
console#
console# disable
console>70 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To access Global Configuration mode, at the Privileged EXEC Mode prompt,
type configure and press . The Global Configuration mode displays
as the device host name followed by (config) and the pound sign #.
To list the Global Configuration commands, enter a question mark at the
command prompt.
The following example illustrates how to access Global Configuration mode
and return back to the Privileged EXEC mode:
Interface Configuration Mode
The Interface Configuration mode configures the device at the physical
interface level (port, VLAN, or LAG). Interface commands that require
subcommands have another level, called the Subinterface Configuration
mode. A password is not required to access this level.
The following example, places the CLI in Interface Configuration mode on
port 1/0/1. The sntp command is then applied to that port.
To run a command in a mode, which does not contain it, use do before the
command, as in the following example:
console# configure
console(configure)#
console#
console# configure
console(config)# exit
console#
console# configure
console(config)# interface gi1/0/1
console(config-if)# sntp client enable
console# configure
console(config)# interface gi1/0/1
console(config-if)# sntp client enable
console(config-if)# do show sntp configurationDell PowerConnect 55xx Systems User Guide 71
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Accessing the Device Through the CLI
You can manage the device using CLI commands, over a direct connection to
the terminal console, or via a Telnet connection.
Direct Connection
Connect the device to the console and enter the CLI commands upon
receiving a prompt.
Telnet Connection
Telnet is a terminal emulation TCP/IP protocol. RS-232 terminals can be
virtually connected to the local device through a TCP/IP protocol network.
Telnet is an alternative to a local login terminal, where a remote login is
required.
The device supports up to four simultaneous Telnet sessions. All CLI
commands can be used over a Telnet session.
If access is via a Telnet connection, ensure that the device has an IP address
and that software has been downloaded to the device.
To start a Telnet session:
1 Select Start > Run.
The Run window opens.
2 Type cmd.
The cmd window opens.
3 In the cmd window, type Telnet .
The Telnet session begins.72 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Retrieving an IP Address
Receiving an IP Address from a DHCP Server
When using the DHCP protocol to retrieve an IP address, the device acts as a
DHCP client. When the device is reset, the DHCP command is saved in the
configuration file, but the IP address is not.
To retrieve an IP address from a DHCP server, perform the following steps:
1 Select and connect any port to a DHCP server or to a subnet that has a
DHCP server on it.
2 Type the following commands to use the selected port for receiving the IP
address.
a Assigning dynamic IP Addresses on a port:
b Assigning a dynamic IP Addresses on a VLAN:
The interface receives the IP address automatically.
console# configure
console(config)# interface gi1/0/1
console(config-if)# ip address dhcp
console# configure
console(config)# interface vlan 1
console(config-if)# ip address dhcpDell PowerConnect 55xx Systems User Guide 73
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 To verify the IP address, type show ip interface at the system prompt, as
shown in the following example.
When configuring/receiving IP addresses through DHCP and BOOTP (an
older version of DHCP), the configuration received from these servers
includes the IP address and may include the subnet mask and default
gateway.
NOTE: It is not necessary to delete the device configuration to retrieve an IP
address from the DHCP server.
NOTE: When copying configuration files, avoid using a configuration file that
contains an instruction to enable DHCP on an interface that connects to the same
DHCP server, or to one with an identical configuration. In this instance, the device
retrieves the new configuration file and boots from it. The device then enables
DHCP, as instructed in the new configuration file, and the DHCP instructs it to reload
the same file.
NOTE: If you configure a DHCP IP address, this address is dynamically retrieved,
and the ip address dhcp command is saved in the configuration file. In the event of
master failure, the backup will again attempt to retrieve a DHCP address. This could
result in one of the following:
• The same IP address may be assigned.
• A different IP address may be assigned, which could result in loss of
connectivity to the management station.
• The DHCP server may be down, which would result in IP address retrieval
failure, and possible loss of connectivity to the management station.
Receiving an IP Address From a BOOTP Server
The standard BOOTP protocol is supported and enables the device to
automatically download its IP host configuration from any standard BOOTP
server in the network. In this case, the device acts as a BOOTP client.
console# show ip interface
IP Address I/F Type Directed Precedence Status
Broadcast
----------------- --------- -------- -------- -------- -----
0.0.0.0/32 gi2/0/1 DHCP disable No Valid
10.5.234.232/24 vlan 1 Static disable No Valid74 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To retrieve an IP address from a BOOTP server:
1 Select and connect any port to a BOOTP server or subnet containing such
a server.
2 At the system prompt, enter the delete startup configuration command to
delete the Startup Configuration from flash.
The device reboots with no configuration and in 60 seconds starts sending
BOOTP requests. The device receives the IP address automatically.
NOTE: When the device reboot begins, any input at the ASCII terminal or keyboard
automatically cancels the BOOTP process before completion and the device does
not receive an IP address from the BOOTP server.
The following example illustrates the process:
To display the IP address, enter the show ip interface command.
The device is now configured with an IP address.
console> enable
console# delete startup-config
Startup file was deleted
console# reload
You haven’t saved your changes. Are you sure you want to
continue (Y/N) [N]?
This command will reset the whole system and disconnect
your current session. Do you want to continue (Y/N) [N]?
************************************************
/* the device reboots */Dell PowerConnect 55xx Systems User Guide 75
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Security Management and Password
Configuration
System security is handled through the Authentication, Authorization, and
Accounting (AAA) mechanism that manages user access rights, privileges,
and management methods. AAA uses both local and remote user databases.
Data encryption is handled through the SSH mechanism.
Passwords can be configured for the following services:
• Terminal
• Telnet
• SSH
• HTTP
• HTTPS
NOTE: When creating a user name, the default priority is 1, which provides access
but not configuration rights. A priority of 15 must be set to enable access and
configuration rights to the device. Although user names can be assigned privilege
level 15 without a password, it is recommended to always assign a password. If
there is no specified password, privileged users can access the Web interface with
any password.
NOTE: Passwords can be secured by using password management commands to
force aging out of passwords, or expiration of passwords. For more information, see
"Management Security" on page 261.
Initial Configuration and Password Recovery
The system is delivered without a default password, and all passwords must be
defined by the user. If a user-defined password is lost, a password recovery
procedure can be invoked from the Startup menu. This procedure is
applicable for the local terminal only and enables a single access to the device
from the local terminal with no password entered.
The full mode of password recovery mechanism can be enabled/disabled
through the CLI (service password-recovery command).
This affects password recovery in the following way:
• Enabled: When the password-recovery mechanism is invoked, one-time
access to the device without a password is enabled and all configuration
and user files are retained.76 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Disabled: When the password-recovery mechanism is invoked, one-time
access to the device without a password is stilled enabled, however all
configuration files (startup and backups) are removed and the following
log message is generated to the terminal after boot process completed: “All
configuration and user files were removed”
Configuring an Initial Terminal Password
To configure an initial terminal password, enter the following commands:
Configuring an Initial Telnet Password
To configure an initial Telnet password, enter the following commands:
console(config)# aaa authentication login default line
console(config)# aaa authentication enable default line
console(config)# line console
console(config-line)# login authentication default
console(config-line)# enable authentication default
console(config-line)# password george
console(config)# aaa authentication login default line
console(config)# aaa authentication enable default line
console(config)# line telnet
console(config-line)# login authentication default
console(config-line)# enable authentication default
console(config-line)# password bobDell PowerConnect 55xx Systems User Guide 77
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring an Initial SSH Password
To configure an initial SSH password, enter the following commands:
Configuring an Initial HTTP Password
To configure an initial HTTP password, enter the following commands:
Configuring an Initial HTTPS Password
To configure an initial HTTPS password, enter the following commands:
Enter the following commands once when configuring use of a terminal, a
Telnet, or an SSH session, for an HTTPS session.
NOTE: In the Web browser, enable SSL 2.0 or greater for the page content to be
displayed.
NOTE: HTTP and HTTPS services require privilege level 15 access and connect
directly to the configuration level access.
console(config)# aaa authentication login default line
console(config)# aaa authentication enable default line
console(config)# line ssh
console(config-line)# login authentication default
console(config-line)# enable authentication default
console(config-line)# password jones
console(config)# ip http authentication aaa loginauthentication local
console(config)# username admin password user1 privilege
15
console(config)# ip http authentication aaa loginauthentication local
console(config)# username admin password user1 privilege
15
console(config)# crypto certificate 1 generate keygenerate
console(config)# ip http secure-server78 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Login Banners
Banners can be defined for each line, such as console and telnet) or for all
lines. They are disabled by default.
The following types of banners can be defined:
• Message-of-the-Day Banner (motd) — Displayed when the user connects
to the device, before login. The following defines a message-of-the-day for
the console:
console# configure
console(config)# line console
console(config-line)# motd-banner
console(config-line)# exit
console (config)# banner motd *
Welcome*
console# do show banner motd
Welcome
Would you like to enable this banner to all lines?
(Y/N)[Y] Y
console(config)#Dell PowerConnect 55xx Systems User Guide 79
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Login Banner— Displayed after the Message-of-the-Day Banner, and
before the user has logged in. The following defines a login banner for the
console:
• Exec Banner — Displayed after successful login (in all privileged levels
and in all authentication methods). The following defines an exec banner
for the console:
console# configure
console(config)# line console
console(config-line)# login-banner
console(config-line)# exit
console (config)# banner login *
Please log in*
console# do show banner login
Would you like to enable this banner to all lines?
(Y/N)[Y] Y
Please log in
console# configure
console(config)# line console
console(config-line)# exec-banner
console(config-line)# exit
console (config)# banner exec *
Successfully logged in*
Would you like to enable this banner to all lines?
(Y/N)[Y] Y
console# do show banner exec
Successfully logged in80 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Startup Menu Procedures
The Startup menu enables performing various tasks, such as software
download, flash handling and password recovery.
You can enter the Startup menu when booting the device. User input must be
entered immediately after the POST test.
To enter the Startup menu:
• Turn the power on. After the auto-boot messages appear, the following
menu is displayed:
The following sections describe the available Startup menu options.
NOTE: When selecting an option from the Startup menu, take time-out into
account. If no selection is made within 10 seconds (default), the device times out.
This default value can be changed through the CLI.
Download Software - Option[1]
The software download procedure is used to replace corrupted files or
upgrade system software, when the device does not have IP connectivity or
when both software images of the device are corrupted and therefore you
cannot use the web-based management system.
NOTE: it is highly recommended that, before loading via xmodem, the baud rate of
the device and terminal be set to 115200.
Startup Menu
[1]Download Software
[2]Erase Flash File
[3]Password Recovery Procedure
[4]Set Terminal Baud-Rate
[5]Stack menu
[6]BackDell PowerConnect 55xx Systems User Guide 81
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To download software through the Startup menu:
1 From the Startup menu, press [1]. The following prompt is displayed:
2 When using the HyperTerminal, click Transfer on the HyperTerminal
Menu Bar and select Send File.
3 In the Filename field, enter the file path for the file to be downloaded.
4 Ensure that the Xmodem protocol is selected in the Protocol field.
5 Press Send. The software is downloaded.
NOTE: After software download, the device reboots automatically.
Erase FLASH File - Option[2]
In some cases, the device Startup Configuration file must be erased. If the
configuration is erased, all parameters configured via CLI, web-management
or SNMP must be reconfigured.
To erase the device configuration in the Startup Configuration file:
1 From the Startup menu, select [2]. The following message is
displayed:
Warning! About to erase a Flash file.
Are you sure (Y/N)?
2 Press Y. The following message is displayed.
Write Flash file name (Up to 8 characters, Enter for
none.):
3 Enter config ("config" is the standard name for the Startup configuration
file although you can use any name).
The following is displayed:
Downloading code using XMODEM
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
File config (if present) will be erased after system
initialization
======== Press Enter To Continue ========82 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The configuration is erased when the system is reset.
Password Recovery - Option[3]
If a password is lost, the Password Recovery procedure can be called from the
Startup menu. The procedure enables entry to the device a single time
without entering a password.
To recover a lost password when entering the local terminal only:
1 From the Startup menu, select [3].
2 Continue the regular startup by logging in without a password.
3 Enter a new password or press 'ESC' to exit.
NOTE: To ensure device security, reconfigure passwords for applicable
management methods.
Set Terminal Baud-Rate - Option[4]
To set the terminal baud-rate:
1 Type [4] and press .
2 Enter the new baud rate. The following is displayed:
Note that after this step, your terminal will no longer respond. Adjust your
terminal speed to the configured one.
Stack Menu - Option[5]
To configure the stack, type [5] and press .
For more information, see "Assigning Unit IDs" on page 50.
Set new device baud-rate: 38,400Dell PowerConnect 55xx Systems User Guide 83
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Software Download
This section contains instructions for downloading device software (system
and boot images) through a TFTP server or USB port. The TFTP server must
be configured before downloading the software.
Software Auto Synch in Stack
When several units are stacked, they must all run the same software version.
When a new slave device is inserted into the stack, it is first checked for
compatibility (meaning that the master can run firmware upgrade/downgrade
to the slave unit), and if found compatible, its boot and image software
versions are automatically updated with the Master’s. If the slave is found not
compatible, it is shutdown.
A SYSLOG message is sent when a master synchronizes a slave's software.
System Image Download
When the device boots, it decompresses the system image from the flash
memory area and runs it. When a new image is downloaded, it is saved in the
other area allocated for the other system image copy.
On the next boot, the device decompresses and runs the image from the
currently active system image.
A system image can be downloaded through a USB port or a TFTP server.
To download the system image from a TFTP server, ensure that an IP address
is configured on one of the device ports and pings can be sent to the TFTP
server. In addition, ensure that the file to be downloaded is saved on the
TFTP server.
To download a system image through the USB port or TFTP server:
1 Enter the show version command, to verify which software version is
currently running on the device. The following is an example of the
information that appears:
Unit SW version Boot version HW version
------ ------------------- ------------------- --------
2 1.0.0.24 1.0.0.11
console#84 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Enter the show bootvar command, to verify which system image is
currently active. The following is an example of the information that is
displayed:
3 Enter the one of the following commands to copy a new system image to
the current unit:
– copy {tftp://|usb://}{tftp address}/{file name}
image (current unit)
or
To copy a new system image to all units in the stack:
– copy tftp://{tftp address}/{file name}
unit://*/image
4 When the new image is downloaded, it is saved in the area allocated for
the other copy of system image (image-2, as shown in the example). The
following is an example of the information that appears:
Exclamation symbols indicate that a copying process is in progress. Each
symbol (!) corresponds to 512 bytes transferred successfully. A period
indicates that the copying process is timed out. Many periods in a row
indicate that the copying process failed.
console# show bootvar
Unit Image Filename Version Date Status
---- ----- --------- --------- --------------------- ---------
2 1 image-1 1.0.0.13 04-Aug-2010 08:27:30 Active*
2 2 image-2 1.0.0.12 29-Jul-2010 17:02:26 Not active
console#
console# copy tftp://176.215.31.3/file1.ros image
Accessing file ‘file1’ on 176.215.31.3Ö
Loading file1 from 176.215.31.3:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Copy took 00:01:11 [hh:mm:ss]Dell PowerConnect 55xx Systems User Guide 85
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
5 Select the image for the next boot by entering the boot system command.
After this command, enter the show bootvar command to verify that the
copy indicated as a parameter in the boot system command is selected for
the next boot.
The following is an example of the information that appears:
If the image for the next boot is not selected by entering the boot system
command, the system boots from the currently active image.
6 Enter the reload command. The following message is displayed:
7 Enter Y. The device reboots.
Boot Image Download
Loading a new boot image from the TFTP server or USB port, updates the
boot image. The boot image is loaded when the device is powered on. A user
has no control over the boot image copies.
To download a boot image through the TFTP server:
console# boot system image-2
console# show bootvar
Images currently available on the Flash
Image-1 active
Image-2 not active (selected for next boot)
console# reload
This command will reset the whole system and
disconnect your current session. Do you want to
continue (y/n) [n]?86 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
1 Enter the show version command to verify which software version is
currently running on the device. The following is an example of the
information that appears:
2 Enter the copy {tftp://|usb://}{tftp address}/{file
name} boot command to copy the boot image to the device. The
following is an example of the information that appears:
3 Enter the reload command. The following message is displayed:
4 Enter Y. The device reboots.
console# show version
Unit SW version Boot version HW version
----- -------------- ----------------- ----------
2 1.0.0.24 1.0.0.11
console#
console# copy tftp://50.1.1.7/contax-10014.ros image
01-Oct-2006 11:57:35 %COPY-I-FILECPY: Files Copy - source URL
tftp://50.1.1.7/contax-10014.ros destination URL flash://image
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
01-Sep-2010 11:57:38 %INIT-I-Startup: Cold Startup
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
01-Sep-2010 11:59:05 %COPY-N-: The copy operation was completed
successfully!
Copy: 5954757 bytes copied in 00:01:30 [hh:mm:ss]
console# reload
This command will reset the whole system and
disconnect your current session. Do you want to
continue (Y/N) [N]?Dell PowerConnect 55xx Systems User Guide 87
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
7
Using Dell OpenManage
Administrator
This section provides an introduction to the Dell OpenManage Switch
Administrator user interface.
It contains the following topics:
• Starting the Application
• Understanding the Interface
• Using the Switch Administrator Buttons
• Field Definitions
• Common GUI Features
• CLI Commands88 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Starting the Application
NOTE: Before starting the application the IP address must be defined. For more
information, see "Accessing the Device Through the CLI" on page 71.
1 Open a web browser.
2 Enter the device’s IP address in the address bar and press .
3 When the Log In window displays, enter a user name and password.
NOTE: Passwords are both case sensitive and alpha-numeric.
4 Click OK.
The Dell OpenManage Switch Administrator home page displays.
Understanding the Interface
The home page contains the following views:
• Tree view — Located on the left side of the home page, the tree view
provides an expandable view of the features and their components. The
branches in the tree view can be expanded to view all the components
under a specific feature, or retracted to hide the feature's components. By
dragging the vertical bar to the right, the tree area can be expanded to
display the full name of a component.
• Device View — Located in on the top center of the home page, the device
view provides information about device ports, current configuration and
status, table information, and feature components. For further
information, see "Device Representation" on page 89
• Components List — Located in the bottom center of the home page,
contains a list of the feature components. When a feature is expanded, the
GUI page for that feature is displayed.
• Information Buttons— Located at the top of the home page, provide
access to information about the device and access to Dell Support. For
more information, see "Information Buttons" on page 91.Dell PowerConnect 55xx Systems User Guide 89
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Device Representation
The home page contains a graphical representation of the units in the stack’s
front panels. Figure 7-1 displays the 5548 model, but the display for the other
models are similar.
Figure 7-1. PowerConnect Device Port Indicators
The graphic display on the home page displays the Unit ID and port
indicators that specify whether a specific port is currently active. Table 7-1
describes the port colors that are displayed and their meaning:
Table 7-1. Port Colors
NOTE: For more information about LEDs, see "LED Definitions" on page 40.
To configure a port double-click on its icon.
Only ports that are physically present are displayed in the PowerConnect
OpenManage Switch Administrator home page, and can be configured
through the web management system. Non-present ports can be configured
through the CLI or SNMP interfaces.
Port Representation
Ports are referred to in the notation: [gi/te]x/0/z, where:
Component Description
Amber The port is currently connected at 100 Mbps.
Green The port is currently connected at 1000 Mbps
Grey The port is currently disconnected
Stacking Unit ID
Giga Ports (odd numbered)
Giga Ports (even numbered)90 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• gi—Giga port
• te —Ten Giga port
• x — Unit ID
• z — Port numberDell PowerConnect 55xx Systems User Guide 91
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Using the Switch Administrator Buttons
This section describes the buttons found on the OpenManage Switch
Administrator interface.
Information Buttons
Table 7-2 describes the information buttons that provide access to online
support and online help, as well as information about the OpenManage
Switch Administrator interfaces. These are displayed at the top of each page.
Device Management Icons
Table 7-3 describes the device management buttons.
Table 7-2. Information Buttons
Button Description
Support Opens the Dell Support page at support.dell.com
About Contains the version and build number and Dell copyright
information.
Logout Opens the Log Out window.
Table 7-3. Device Management Icons
Button Icon Description
Apply&Save Saves changes to the Running and Startup Configuration
files.
Help Open online help. The online help pages are
context-sensitive. For example, if the IP Addressing page is
open, the help topic for that page is displayed when Help is
clicked.
Print Prints the Network Management System page and/or table
information.92 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Refresh Refreshes device information from the Running
Configuration file.
Table 7-3. Device Management Icons (Continued)Dell PowerConnect 55xx Systems User Guide 93
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Field Definitions
Fields that are user-defined can contain between 1–159 characters, unless
otherwise noted on the OpenManage Switch Administrator web page. All
letters or characters can be used, except the following: "\ / : * ? < >"
Common GUI Features
Table 7-4 describes the common functions that can be performed on many
GUI pages.
Table 7-4. Common GUI Elements
Button Description
Apply Save changes entered in GUI page to the Running
Configuration file.
Back Go to previous page.
Cancel Cancel changes entered in GUI page.
Clear All Counters Delete counters.
Clear Counters Delete selected counters.
Clear Log Delete entries from log.
Clear Statistics Delete statistics.
Copy parameters
from
Copy the parameters from a selected row to the selected
target rows.
Copy parameters
from port
Copy the parameters from a selected port to the selected
target ports.
Details Shows further details relevant to the current page.
Next Go to next page.
Query Run a query after query criteria have been entered.
Remove Remove checked elements in the page. If Select All is
selected, all elements are removed.
Reset All Counters Delete all counters.
Restore Defaults Restores parameters entered in page to default values.94 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
GUI Terms
Each GUI page in the tree view is described in the following sections. A brief
introduction is provided along with steps specifying how to enter information
in the page. The following terms are used:
• Enter — Indicates that information may be entered in the field. It does
not imply that the field is mandatory.
• Select —Indicates that information may be selected from a drop-down list
or from radio buttons.
• Displays —Indicates that the field is display only.
CLI Commands
There are certain command entry conventions that apply to all commands.
The following table describes these conventions.
Table 7-5. Common GUI Elements
Telnet Opens a Telnet window. This only works in the Explorer 6 and
Firefox browsers.
Button Description
[ ] In a command line, square brackets indicate an optional
entry..
{ } In a command line, curly brackets indicate a selection of
compulsory parameters separated by the | character. One
option must be selected. For example: flowcontrol
{auto|on|off} means that for the flowcontrol command
either auto, on, or off must be selected.
Italic Font Indicates a parameter value.
Bold Italic Font Indicates a parameter key word.
Any individual key on the keyboard. For example click
.
Table 7-4. Common GUI Elements (Continued)
Button DescriptionDell PowerConnect 55xx Systems User Guide 95
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Ctrl+F4 Any combination of keys clicked simultaneously, for example:
Ctrl and F4.
Screen Display Indicates system messages and prompts appearing on the
console.
all When a parameter is required to define a range of ports or
parameters and all is an option, the default for the command
is all when no parameters are defined. For example, the
command interface range port-channel has the option of
either entering a range of channels, or selecting all. When the
command is entered without a parameter, it automatically
defaults to all.
Button Description96 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLYDell PowerConnect 55xx Systems User Guide 97
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
8
Network Security
This section describes the various mechanisms for providing security on the
switch.
It contains the following topics:
• Port Security
• ACLs
• ACL Binding
• Proprietary Protocol Filtering
• Absolute Time Range
• Time Range Recurrence
• Dot1x Authentication98 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Security
Network security can be enhanced by limiting access on a port to users with
specific MAC addresses. The MAC addresses can be dynamically learned, or
they can be statically configured.
Port security has the following modes:
• Classic Lock — Locked port security monitors both received and learned
packets that are received on specific ports. Access to the locked port is
limited to users with specific MAC addresses. These addresses are either
manually defined on the port, or learned on that port before it was locked.
• Limited Dynamic Lock — When a packet is received on a locked port,
and the packet’s source MAC address is not tied to that port (either it was
learned on a different port, or it is unknown to the system), a protection
mechanism, which provides various options is invoked. Unauthorized
packets arriving to a locked port are either:
– Forwarded
– Discarded with no trap
– Discarded with a trap
– The port is shutdown
Locked port security enables storing a list of MAC addresses in the
configuration file. The MAC addresses are restored when the device is reset.
Disabled ports can be activated from the Port Configuration page. Dell PowerConnect 55xx Systems User Guide 99
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To configure port security:
1 Click Switching > Network Security > Port Security to display the Port
Security: Summary page.
Figure 8-1. Port Security: Summary
Security parameters are displayed for all ports or LAGs, depending on the
selected interface type.
2 To modify the security parameters for a port, select it, and click Edit.
3 Enter the following fields:
– Interface — Select the interface to be configured.
– Current Port Status — Displays the current port status.
– Set Port — Select to either lock or unlock the port.
– Learning Mode — Set the locked port type. The Learning Mode field
is enabled only if Locked is selected in the Set Port field. The possible
options are:
• Classic Lock — Locks the port using the classic lock mechanism.
The port is immediately locked, regardless of the number of
addresses that have already been learned. 100 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Limited Dynamic Lock — Locks the port by deleting the
dynamic MAC addresses associated with the port. The port learns
up to the maximum addresses allowed on the port. Both
relearning and aging MAC addresses are enabled.
– Max Entries (0-128) — Enter the maximum number of MAC
addresses that can be learned on the port. The Max Entries field is
enabled only if Locked is selected in the Set Port field, and the
Limited Dynamic Lock mode is selected in Learning Mode field.
– Action on Violation — Select the action to be applied to packets
arriving on a locked port. The possible options are:
• Discard — Discard the packets from any unlearned source.
• Forward — Forward the packets from an unknown source,
without learning the MAC address.
• Shutdown — Discard the packet from any unlearned source, and
shut down the port. Ports remain shutdown until they are
reactivated, or the device is reset.
– Trap — Enable/disable traps being sent when a packet is received on a
locked port.
– Trap Frequency (1-1000000) — Enter the amount of time (in
seconds) between traps.
Configuring Port Security Using CLI Commands
The following table summarizes the CLI commands for configuring port
security.
.
Table 8-1. Port Security CLI Commands
CLI Command Description
set interface active
{[gigabitethernet|tengigabitethern
et] interface|port-channel LAGnumber}
Reactivates an interface that is
shutdown due to port security
reasons.Dell PowerConnect 55xx Systems User Guide 101
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
port security max {max-addr}
no port security max
Specifies the maximum number of
MAC addresses that can be learned
on the port.
Use the no form of this command
to restore the default
port security mode {lock | maxaddresses }
no port security mode
Configures the port security
learning mode.
Use the no form of this command
to restore the default
configuration.
port security [forward | discard |
discard-shutdown] [trap seconds]
no port security
Enables port security on an
interface.
Use the no form of this command
to disable port security on an
interface.
port security
[forward|discard|discard-shutdown]
[trap seconds]
no port security
Configures port security on an
interface.
Use the no form of this command
to disable port security.
show ports security
[[gigabitethernet|tengigabitethern
et] port-number ]|port-channel
LAG-number]
Displays lock status of specified
interface or of all interfaces.
Table 8-1. Port Security CLI Commands (Continued)
CLI Command Description102 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console # show ports security
Port Status Learning Action Maximum Trap Frequency
------- -------- -------- -------- ------- ---- ---------
gi1/0/1 Disabled Max-Addresses - 10 - -
gi1/0/2 Disabled Lock - 1 - -
gi1/0/3 Disabled Lock - 1 - -
gi1/0/4 Disabled Lock - 1 - -
gi1/0/5 Disabled Lock - 1 - -
gi1/0/6 Disabled Lock - 1 - -
gi1/0/7 Disabled Lock - 1 - -
gi1/0/8 Disabled Lock - 1 - -
gi1/0/9 Disabled Lock - 1 - -
gi1/0/10Disabled Lock - 1 - -
gi1/0/11Disabled Lock - 1 - -
gi1/0/12Disabled Lock - 1 - -Dell PowerConnect 55xx Systems User Guide 103
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
ACLs
This section describes Access Control Lists (ACLs), which enable defining
classification actions and rules for specific ingress or egress ports.
It contains the following topics:
• ACL Overview
• MAC-Based ACLs
• MAC-Based ACEs
• IPv4-Based ACLs
• IPv4-Based ACEs
• IPv6-Based ACLs
• IPv6-Based ACEs
ACL Overview
Access Control Lists (ACLs) enable network managers to define classification
actions and rules for specific ingress or egress ports. Packets entering an
ingress or egress port, with an active ACL, are either admitted or denied entry.
If entry is denied, the ingress or egress port may be disabled, for example, a
network administrator defines an ACL rule that states that port number 20
can receive TCP packets, however, if a UDP packet is received, the packet is
dropped.
ACLs are composed of Access Control Entries (ACEs) that are rules that
determine traffic classifications. Each ACE is a single rule, and up to 256
rules may be defined on each ACL, and up to 3000 rules globally.
Rules are not only used for user configuration purposes, they are also used for
features like DHCP Snooping, Protocol Group VLAN and iSCSI, so that not
all 3000 rules are available for ACEs. It is expected that there will be at least
2000 rules available. If there are fewer rules available, this may be due to
DHCP Snooping or iSCSI optimization. Reduce the number of entries in
DHCP Snooping or reduce the max number of TCP connections in the iSCSI
configuration in order to free rules for ACEs.
The following types of ACLs can be defined:
• MAC-based ACL — Examines Layer 2 fields only
• IPv4-based ACL —Examines the Layer 3 layer of IPv4 frames104 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• IPv6-based ACL —Examines the Layer 3 layer of IPv6 frames
MAC-Based ACLs
To define a MAC-based ACL:
1 Click Switching > Network Security > MAC Based ACL to display the
MAC Based ACL: Summary page.
Figure 8-2. MAC Based ACL: Summary
The currently-defined MAC-based ACLs are displayed.
2 To add a new ACL, click Add ACL, and enter the name of the new ACL.Dell PowerConnect 55xx Systems User Guide 105
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring MAC-Based ACLs Using CLI Commands
The following table summarizes the CLI commands for configuring
MAC-based ACLs.
The following is an example of some of the CLI commands:
Table 8-2. MAC Based ACL CLI Commands
CLI Command Description
mac access-list extended aclname
no mac access-list extended aclname
Defines an ACL and places the device
in MAC-extended ACL configuration
mode.
Use the no form of this command to
remove the ACL.
show interfaces access-lists Displays access lists applied on
interfaces.
console# show access-lists
Extended IP access list ACL1
permit 234 172.30.40.1 0.0.0.0 any
permit 234 172.30.8.8 0.0.0.0 any106 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
MAC-Based ACEs
To add rules to an ACL:
1 Click Switching > Network Security > MAC Based ACE to display the
MAC Based ACE: Summary page.
Figure 8-3. MAC Based ACE: Summary
The currently-defined rules for the selected ACL are displayed.
2 To add a rule click Add ACE.
3 Select the ACL for which a rule is being created.
4 Enter the fields:
– New Rule Priority — Enter the priority of the ACE. ACEs with higher
priority are processed first. One is the highest priority
– Source MAC Address — Match the source MAC address from which
packets have arrived to this source address. In addition to the Source
MAC address, you can enter a Wildcard Mask that specifies which
bits in the source address are used for matching and which bits are
ignored. A wildcard of 00:00:00:00:00:00 means the bits must be
matched exactly; ff:ff:ff:ff:ff:ff means the bits are irrelevant. Any
combination of 0s and ffs can be used.
– Any — Check to indicate that the source address is not matched.Dell PowerConnect 55xx Systems User Guide 107
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Dest. MAC Address — Match the destination MAC address to which
packets are addressed to this address. In addition to the Destination
MAC address, you can enter a Wildcard Mask that specifies which
bits in the source address are used for matching and which bits are
ignored. A wildcard of 00:00:00:00:00:00 means the bits must be
matched exactly; ff:ff:ff:ff:ff:ff means the bits are irrelevant. Any
combination of 0s and ffs can be used.
– Any — Check to indicate that the destination address is not matched.
– VLAN ID — Match the packet’s VLAN ID to this VLAN ID. The
possible VLAN IDs are 1 to 4095.
– CoS — Match the packet’s CoS value to this CoS value.
– Cos Mask — Match the packet’s CoS value to one of these CoS
values.
– Ether type — Match the packet’s Ethertype to this one.
– Time Range Name — Check to associate a time range with the ACE.
Select one of the time ranges defined in the Time Range page.
– Action — Select the action taken upon a match. The following
options are available:
• Permit — Forward packets that meet the ACL criteria.
• Deny — Drop packets that meet the ACL criteria.
• Shutdown — Drop packets that meet the ACL criteria, and
disable the port to which the packet was addressed.
– Logging of Dropped Packets — Check to activate logging of dropped
packets. 108 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring MAC-Based ACEs Using CLI Commands
The following table summarizes the CLI commands for configuring MACbased ACEs.
The following is an example of some of the CLI commands:
Table 8-3. MAC Based ACE CLI Commands
CLI Command Description
permit {any|source-ip-address
source-wildcard}
{any|destination destinationwildcard} [eth-type
0|aarp|amber|decspanning|decnetiv|diagnostic|dsm|etype-6000]
[vlan vlan-id] [cos cos coswildcard] [time-range timerange-name]
Sets permit conditions for an MAC
access list (in MAC ACL configuration
mode).
deny {any|source sourcewildcard} {any|destination
destination-wildcard} [eth-type
0|aarp|amber|decspanning|decnet-iv | diagnostic
|dsm|etype-6000] [vlan vlan-id]
[cos cos cos-wildcard] [timerange time-range-name][disableport|log-input]
Sets deny conditions for an MAC
access list.
console(config)# mac access-list extended server1
console(config-mac-al)# permit 00:00:00:00:00:01
00:00:00:00:00:ff anyDell PowerConnect 55xx Systems User Guide 109
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IPv4-Based ACLs
To define an IPv4-based ACL:
1 Click Switching > Network Security > IPv4 Based ACL to display the
IPv4 Based ACL: Summary page.
Figure 8-4. IPv4 Based ACL: Summary
The previously-defined IPv4 ACLs are displayed.
2 To add a new ACL, click Add ACL.
3 Enter the name of the new ACL. Names are case-sensitive.110 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring IP-based ACLs Using CLI Commands
The following table summarizes the CLI commands for configuring IP-based
ACLs.
The following is an example of some of the CLI commands:
IPv4-Based ACEs
To add a rule to an ACL:
1 Click Switching > Network Security > IPv4 Based ACE to display the
IPv4 Based ACE page.
Figure 8-5. IPv4 Based ACE: Summary
Table 8-4. IP-Based ACL CLI Commands
CLI Command Description
ip access-list extended aclname
no ip access-list extended aclname
Defines an IPv4 access list and places
the device in IPv4 access list
configuration mode
Use the no form of this command to
remove the access list.
console(config)# ip access-list extended server-aclDell PowerConnect 55xx Systems User Guide 111
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The currently-defined rules for the selected ACL are displayed.
2 To add a rule, click Add ACE.
3 Select a user-defined ACL, and enter the following fields:
– New ACE Priority (1-2147483647) —Enter the priority of the ACE.
ACEs with higher priority are processed first. One is the highest
priority.
– Protocol Select From List — Select to create an ACE, based on a
specific protocol. The following options are available:
• ICMP — Internet Control Message Protocol (ICMP). The ICMP
enables the gateway or destination host to communicate with the
source host, for example, to report a processing error.
• IGMP — Internet Group Management Protocol (IGMP).
Enables hosts to notify their local switch or router that they want
to receive transmissions assigned to a specific multicast group.
• IPinIP — IP in IP. Encapsulates IP packets to create tunnels
between two routers. This ensures that IPIP tunnel appears as a
single interface, rather than several separate interfaces. IPIP
enables tunnel intranets occur the internet, and provides an
alternative to source routing.
• TCP — Transmission Control Protocol (TCP). Enables two hosts
to communicate and exchange data streams. TCP guarantees
packet delivery, and guarantees that packets are transmitted and
received in the order they are sent.
• EGP — Exterior Gateway Protocol (EGP). Permits exchanging
routing information between two neighboring gateway hosts in an
autonomous systems network.
• IGP — Interior Gateway Protocol (IGP). Enables for routing
information exchange between gateways in an autonomous
network.
• UDP — User Datagram Protocol (UDP). Communication
protocol that transmits packets but does not guarantee their
delivery.112 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• HMP — Host Mapping Protocol (HMP). Collects network
information from various networks hosts. HMP monitors hosts
spread over the internet as well as hosts in a single network.
• RDP — Reliable Data Protocol (RDP). provide a reliable data
transport service for packet-based applications.
• IDPR— Matches the packet to the IDPR protocol.
• IDRP— Matches the packet to the Inter-Domain Routing
Protocol (IDRP).
• RVSP — Matches the packet to the ReSerVation Protocol
(RSVP).
• AH — Authentication Header (AH). Provides source host
authentication and data integrity.
• EIGRP — Enhanced Interior Gateway Routing Protocol
(EIGRP). Provides fast convergence, support for variable-length
subnet mask, and supports multiple network layer protocols.
• OSPF — The Open Shortest Path First (OSPF) protocol is a
link-state, hierarchical interior gateway protocol (IGP) for
network routing Layer Two (2) Tunneling Protocol, an extension
to the PPP protocol that enables ISPs to operate Virtual Private
Networks (VPNs).
• IPIP — IP over IP (IPinIP). Encapsulates IP packets to create
tunnels between two routers. This ensures that IPIP tunnel
appears as a single interface, rather than several separate
interfaces. IPIP enables tunnel intranets occur the internet, and
provides an alternative to source routing.
• PIM — Matches the packet to Protocol Independent Multicast
(PIM).
• L2TP— Matches the packet to Internet Protocol (L2IP).
• ISIS — Intermediate System - Intermediate System (ISIS).
Distributes IP routing information throughout a single
autonomous system in IP networks.
– Protocol ID To Match— Enter a protocol number if you did not
select a protocol by name.
– Any(IP) — Check to use any protocol. Dell PowerConnect 55xx Systems User Guide 113
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Source Port (0 - 65535) — Enter the TCP/UDP source port. Enter
either Single, Range or select Any to include all ports.
– Destination Port (0 - 65535) — Enter the TCP/UDP destination port.
Enter either a Single, Range or select Any to include all ports.
– Source IP Address — Enter the source IP address to which addresses
in the packet are compared.
• Wildcard Mask —In addition to the Source MAC address, you
can enter a mask that specifies which bits in the source address are
used for matching and which bits are ignored. A wildcard of
0.0.0.0 means the bits must be matched exactly in addition to the
IP source address; ff.ff.ff.ff means the bits are irrelevant. Any
combination of 0s and ffs can be used.
• Any — Check to indicate that the source address is not matched.
– Dest. IP Address — Enter the destination IP address to which
addresses in the packet are compared.
• Wildcard Mask —In addition to the Destination MAC address,
you can enter a mask that specifies which bits in the source
address are used for matching and which bits are ignored. A
wildcard of 0.0.0.0 means the bits must be matched exactly in
addition to the IP destination address; ff.ff.ff.ff means the bits are
irrelevant. Any combination of 0s and ffs can be used.
• Any — Check to indicate that the destination address is not
matched.
– TCP Flags — To use TCP flags, check the TCP Flag checkbox and
then check the desired flag(s).
– ICMP — Specifies an ICMP message type for filtering ICMP packets.
This field is available only when ICMP is selected in the Protocol
field. The following options are available:
• Select from List — Select an ICMP type from the list.
• ICMP Type — Enter the ICMP type.
• Any — Check to use all ICMP types.114 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– ICMP Code — Enter an ICMP message code for filtering ICMP
packets that are filtered by ICMP message type or ICMP message
code. This field is available only when ICMP is selected in the
Protocol field. The following options are available:
• ICMP Code — Enter an ICMP code.
• Any — Check to use all ICMP codes.
– IGMP — IGMP packets can be filtered by IGMP message type. This
field is available only when IGMP is selected in the Protocol field. The
following options are available:
• Select from List — Select an IGMP message type from the list.
• IGMP Type — Enter the IGMP message type.
• Any — Check to use all IGMP message types.
– Classification — Select one of the following matching options:
• Match DSCP(0-63) — Matches the packet DSCP value to the
ACL.
• Match IP Precedence(0-7) — Check to enable matching
IP-precedence with the packet IP-precedence value. IPprecedence enables marking frames that exceed the CIR
threshold. In a congested network, frames containing a higher DP
value are discarded before frames with a lower DP value. If this
field is checked, enter a value to be matched.
– Time Range Name — Check to associate a time range with the ACE.
Select one of the time ranges defined in the Time Range page.
– Action — Select the ACL forwarding action. The following options
are available:
• Permit — Forward packets which meet the ACL criteria.
• Deny — Drop packets which meet the ACL criteria.
• Shutdown — Drop packet that meet the ACL criteria, and disable
the port to which the packet was addressed.
– Logging of Dropped Packets — Check to activate logging of dropped
packets. Dell PowerConnect 55xx Systems User Guide 115
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring IP-based ACEs Using CLI Commands
The following table summarizes the CLI commands for configuring IP-based
ACLs.
Table 8-5. IP-Based ACE CLI Commands
CLI Command Description
permit protocol {any|source-ip-address
source-wildcard} {any|destination-ipaddress destination-wildcard} [dscp
number|precedence number] [time-range
time-range-name]
permit icmp {any|source-ip-address sourcewildcard} {any|destination-ip-address
destination-wildcard} [any|icmptype][any|icmp-code]] [dscp
number|precedence number] [time-range
time-range-name]
permit igmp {any|source-ip-address sourcewildcard} {any|destination-ip-address
destination-wildcard}[igmp-type] [dscp
number|precedence number] [time-range
time-range-name]
permit tcp {any|source-ip-address sourcewildcard} {any|source-port/portrange}{any|destination-ip-address
destination-wildcard} {any|destinationport/port-range } [dscp number|precedence
number] [match-all list-of-flags] [timerange time-range-name]
permit udp {any|source-ip-address sourcewildcard} {any|source-port|port-range}
{any|destination-ip-address destinationwildcard} {any|destination-port/port-range
} [dscp number|precedence number] [matchall time-range-name] [time-range timerange-name]
Sets conditions to
allow a packet to pass
a named IP access list
( in access list
configuration mode).
The list of protocols is
found above.116 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of some of the CLI commands:
deny protocol {any|source-ip-address
source-wildcard} {any|destination-ipaddress destination-wildcard} [dscp
number|precedence number] [time-range
time-range-name] [disable-port|log-input]
deny icmp {any|source-ip-address sourcewildcard} {any|destination-ip-address
destination-wildcard{any|icmp-type}
{any|icmp-code} [dscp number|precedence
number] [time-range time-range-name]
[disable-port|log-input]
deny igmp {any|source-ip-address sourcewildcard} {any|destination-ip-address
destination-wildcard}[igmp-type] [dscp
number|precedence number] [time-range
time-range-name] [disable-port|log-input]
deny tcp {any|source-ip-address sourcewildcard} {any|source-port|portrange}{any|destination-ip-address
destination-wildcard} {any|destinationport/port-range } [dscp number|precedence
number] [match-all list-of-flags] [timerange time-range-name] [disable-port|loginput]
deny udp {any|source-ip-address sourcewildcard} {any|source-port|port-range}
{any|destination-ip-address destinationwildcard} {any|destination-port|port-range
} [dscp number|precedence number] [matchall time-range-name] [time-range timerange-name] [disable-port|log-input]
Sets deny conditions
for IPv4 access list (in
access list
configuration mode).
console(config)# ip access-list extended server
console(config-ip-al)# permit ip 1.1.1.0 0.0.0.255
1.1.2.0 0.0.0.0
Table 8-5. IP-Based ACE CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 117
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IPv6-Based ACLs
The IPv6 Based ACL Page displays and enables the creation of IPv6 ACLs,
which check pure IPv6-based traffic. IPv6 ACLs do not check IPv6-over-IPv4
or ARP packets.
To define IPv6-based ACLs:
1 Click Switching > Network Security > IPv6 Based ACL to display the
IPv6 Based ACL: Summary page.
Figure 8-6. IPv6 Based ACL: Summary
A list of all of the currently defined IPv6-based ACLs is displayed.
2 To add a new ACL, click Add ACL.
3 Enter the name of the new ACL. Names are case-sensitive.118 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring IPv6-based ACLs Using CLI Commands
The following table summarizes the CLI commands for configuring
IPv6-based ACLs.
The following is an example of some of the CLI commands:
IPv6-Based ACEs
To add a rule to an IPv6-based ACL:
1 Click Switching > Network Security > IPv6 Based ACE to display the
IPv6 ACE: Summary page.
Figure 8-7. IPv6 Based ACE: Summary
Table 8-6. IP-Based ACL CLI Commands
CLI Command Description
ipv6 access-list [access-listname]
no ipv6 access-list [accesslist-name]
Defines an IPv6 access list and places
the device in IPv6 access list
configuration mode
Use the no form of this command to
remove the access list.
console(config)# ipv6 access-list server-aclDell PowerConnect 55xx Systems User Guide 119
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The currently-defined rules for the selected ACL are displayed.
2 To add a rule click Add ACE.
3 Select a user-defined ACL for which a rule is being created.
4 Enter the following fields:
– New Rule Priority — Enter the ACE priority that determines which
ACE is matched to a packet, based on a first match.
– Protocol Select from List — Select to create an ACE, based on a
specific protocol. The following options are available:
• TCP — Transmission Control Protocol (TCP). Enables two
hosts to communicate and exchange data streams. TCP
guarantees packet delivery, and guarantees packets are
transmitted and received in the order the are sent.
• UDP — User Datagram Protocol (UDP). Communication
protocol that transmits packets but does not guarantee their
delivery.
• ICMP — Internet Control Message Protocol (ICMP). The
ICMP allows the gateway or destination host to communicate
with the source host. For example, to report a processing error.
• IPV6 — Matches the packet to the IPV6 protocol.
– Protocol ID To Match — Enter a protocol.
– Any — Check to use any protocol.
– Source Port — Enter the TCP/UDP source port. Enter either a Single,
Range or select Any to include all ports.
– Destination Port — Enter the TCP/UDP destination port. Enter
either a Single, Range or select Any to include all ports.
– TCP Flags — To use TCP flags, check the TCP Flag checkbox and
then check the desired flag(s).
– ICMP — Specifies an ICMP message type for filtering ICMP packets.
This field is available only when ICMP is selected in the Protocol
field. The following options are available:
• Select from List — Select an ICMP type from the list.
• ICMP Type — Enter the ICMP type.120 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Any — Check to use all ICMP types.
– ICMP Code — Specifies an ICMP message code for filtering ICMP
packets that are filtered by ICMP message type or ICMP message
code. This field is available only when ICMP is selected in the
Protocol field. The following options are available:
• ICMP Code — Enter an ICMP code.
• Any — Check to use all ICMP codes.
– Source IP Address — Enter the source IP address to which addresses
in the packet are compared. The following options are available:
• Prefix Length —The number of bits that comprise the source IP
address prefix of the subnetwork.
• Any — Check to indicate that the source address is not matched.
– Dest. IP Address — Enter the destination IP address to which
addresses in the packet are compared. The following options are
available:
• Prefix Length —The number of bits that comprise the
destination IP address prefix of the subnetwork.
• Any — Check to indicate that the destination address is not
matched.
– Traffic Class — Select one of the following options:
• Match DSCP — Matches the packet DSCP value to the ACL.
• Match IP Precedence — Matches the IP-precedence with the
packet IP-precedence value. IP-precedence enables marking
frames that exceed CIR threshold. In a congested network, frames
containing a higher DP value are discarded before frames with a
lower DP value.
– Time Range Name — Check to associate a time range with the ACE.
Select one of the time ranges defined in the Time Range page.
– Action — The ACL forwarding action. The following options are
available:
• Permit — Forwards packets that meet the ACL criteria.
• Deny — Drops packets that meet the ACL criteria.Dell PowerConnect 55xx Systems User Guide 121
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Shutdown — Drops packet that meet the ACL criteria, and disables
the port to which the packet was addressed.
– Logging of Dropped Packets — Check to activate logging of dropped
packets.
Configuring IP-based ACEs Using CLI Commands
The following table summarizes the CLI commands for configuring IP-based
ACLs.
Table 8-7. IP-Based ACE CLI Commands
CLI Command Description
permit protocol {any|{source-prefix/length
}{any|destination- prefix/length } [dscp
number|precedence number] [time-range
time-range-name]
permit icmp {any|{source-prefix/length
}{any|destination-prefix/length }
{any|icmp-type}{any|icmp-code} [dscp
number|precedence number] [time-range
time-range-name]
permit tcp {any|{source-prefix/length }
{any|source-port/port-range}
}{any|destination prefix/length }
{any|destination-port/port-range} [dscp
number|precedence number] [match-all listof-flags] [time-range time-range-name]
permit udp {any|{source-prefix/length }}
{any|source-port|port-range}
}{any|destination prefix/length }
{any|destination-port/port-range} [dscp
number|precedence number] [time-range
time-range-name]
Sets permit conditions
for IPv6 access list.122 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of some of the CLI commands:
deny protocol {any|{source-prefix/length
}{any|destination-prefix|length} [dscp
number|precedence number] [time-range
time-range-name] [disable-port|log-input]
deny icmp {any|{source-prefix/length
}{any|destination-prefix/length }
{any|icmp-type} {any|icmp-code} [dscp
number|precedence number] [time-range
time-range-name] [disable-port|log-input]
deny tcp {any|{source-prefix/length }
{any|source-port/port-range}
}{any|destination-prefix/length}
{any|destination-port/port-range} [dscp
number|precedence number] [match-all listof-flags] [time-range time-range-name]
[disable-port|log-input]
deny udp {any|{source-prefix/length }}
{any|source-port/port-range}
}{any|destination-prefix|length}
{any|destination-port/port-range} [dscp
number|precedence number] [time-range
time-range-name] [disable-port|log-input]
Sets deny conditions
for IPv4 access list (in
Access List
Configuration mode).
console(config)# ipv6 access-list server
console(config-ipv6-al)# permit tcp 3001::2/64 any any 80
Table 8-7. IP-Based ACE CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 123
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
ACL Binding
When an ACL is bound to an interface, all the rules that have been defined
for the ACL are applied to that interface. Whenever an ACL is assigned on a
port or LAG, flows from that ingress or egress interface that do not match the
ACL, are matched to the default rule, which is to Drop unmatched packets.
To change the default action for unmatched packets to an action other than
Drop, do the following:
• Add an additional ACE to the ACL with "Any" in all fields
• Set its action other than Drop
• Set the priority to the lowest in the ACL.
To bind ACLs to interfaces:
1 Click Switching > Network Security > ACL Binding to display the ACL
Binding: Summary page.
Figure 8-8. ACL Binding: Summary
The ports on the selected unit are displayed along with their associated
ACLs.124 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 To bind an ACL to an interface, select an interface and click Edit.
3 Select an ACL(s). You can select one of each type (MAC-based ACL,
IPv4-based ACL or IPv6-based ACL) or one IPv4-based ACL and one
IPv6-based ACL.
Configuring ACL Bindings Using CLI Commands
The following table summarizes the CLI commands for configuring ACL
Bindings.
.
The following is an example of some of the CLI commands:
Table 8-8. ACL Bindings CLI Commands
CLI Command Description
service-acl input acl-name1
[acl-name2]
no service-acl input
Controls access to an interface
Use the no form of the command to
remove access control.
show access-lists [acl-name] Displays access control lists (ACLs)
configured on the switch.
console(config)# mac access-list extended server
console(config-mac-al)# permit 00:00:00:00:00:01
00:00:00:00:00:ff any
console(config-mac-al)# exit
console(config)# interface gi1/0/1
console(config-if)# service-acl input serverDell PowerConnect 55xx Systems User Guide 125
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Proprietary Protocol Filtering
Protocol filters are used to disallow receiving specific proprietary protocol
packets through an interface. These can be enabled for specific ports.
If a protocol filter is enabled on a port, you cannot enable a QoS ACL on this
port.
To configure Proprietary Protocol Filtering:
1 Click Switching > Network Security > Proprietary Protocol Filtering to
display the Proprietary Protocol Filtering: Summary page.
Figure 8-9. Proprietary Protocol Filtering: Summary
A list of the ports and their filtered protocols is displayed.
2 Click Edit to modify the filtered protocols for a specific port.
3 Select a unit and an interface.126 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
4 Move the required protocols from the Available Protocols list to the
Filtered Protocols list. The following displays the protocols and the
addresses that are blocked:
Configuring Proprietary Protocol Filtering Using CLI Commands
The following table summarizes the CLI commands for setting fields in the
Proprietary Protocol Filtering pages.
Only one of the following CLI commands can be active on a port at the same
time. To add other protocol filters, the command must be negated and then
run again with all the required protocol names.
.
The following is an example of some of the CLI commands:
Table 8-9. Protocol Filtering
Protocol Destination Address Protocol Type
blockcdp 0100.0ccc.cccc 0x2000
blockvtp 0100.0ccc.cccc 0x2003
blockdtp 0100.0ccc.cccc 0x2004
blockudld 0100.0ccc.cccc 0x0111
blockpagp 0100.0ccc.cccc 0x0104
blocksstp 0100.0ccc.cccd -
blockall 0100.0ccc.ccc0 - 0100.0ccc.cccf -
Table 8-10. Proprietary Protocol Filtering CLI Commands
CLI Command Description
service-acl input protocol1
[protocol2 … protocol6]
no service-acl input
Discards packets that are classified to
specific protocols.
Use the no form of those commands
to disable discarding of the packets.
console (Config-if)# service-acl input blockcdp blockvtpDell PowerConnect 55xx Systems User Guide 127
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Time Range
Time ranges can be defined and associated with an QoS ACL, so that it is
applied only during that time range.
There are two types of time ranges:
• Absolute —This type of time range begins on a specific date or
immediately and ends on a specific date or extends infinitely. It is created
in the Time Range pages. A recurring element can be added to it.
• Recurring — This is a time range element that is added to an absolute
range, and begins and ends on a recurring basis. It is defined in the Time
Range Recurrence pages.
If a time range includes both absolute and recurring ranges, the ACL is
activated only if both absolute start time and the recurring time range have
been reached. The ACL is deactivated when either of the time ranges is
reached.
The switch supports a maximum of 10 absolute time ranges.
All time specifications are interpreted as local time (Daylight Savings Time
does not affect this).
To ensure that the time range entries take effect at the desired times, the
system time must be set. For more information on setting the system time,
see "Time Synchronization" on page 169.
A possible use for this feature is to limit access of computers to the network
only during business hours, after which they are locked, and access to the rest
of the network is blocked.128 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Absolute Time Range
To define an absolute time range:
1 Click Switching > Network Security > Time Range to display the Time
Range: Summary page.
Figure 8-10. Time Range: Summary
The existing Time Ranges are displayed.
2 To add a new time range, click Add.
3 Enter the name of the time range in the Time Range Name field.
4 Define the Absolute Start time.
– To begin the Time Range immediately, click Immediate.
– To determine at what time in the future the Time Range will begin,
enter values in the Date and Time fields.Dell PowerConnect 55xx Systems User Guide 129
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
5 Define the Absolute End time.
– To indicate that the Time Range should not end, click Infinite.
– To determine the time at which the Time Range ends, enter values in
the Date and Time fields.
See "Configuring Time Ranges Using CLI Commands" on page 130 for the
CLI commands for creating time ranges.
Time Range Recurrence
To add a recurring time range element to an absolute time range:
1 Click Switching > Network Security > Time Range Recurrence to display
the Recurring Time Range: Summary page.
Figure 8-11. Recurring Time Range: Summary
A daily and weekly recurring element of the time range that is selected is
displayed if they exist.130 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 To add a recurring time range element to a time range, click Add.
3 Select the Time Range Name to which you want to add the Time Range
Recurrence. The Absolute Start and Absolute End fields are displayed.
4 Check if the recurrence is Daily or Weekly in Recurrence type.
5 If the recurrence is Daily, enter:
– Start Time — Select the time on which the time range starts.
– End Time— Select the time on which the time range ends.
– Weekday — Select the day of the week on which the time range
occurs.
6 If the recurrence is Weekly, enter:
• Start — Select the Day of the Week and Time on which the time
range starts.
• End —Select the Day of the Week and Time on which the time
range ends.
Configuring Time Ranges Using CLI Commands
The following table summarizes the CLI commands for configuring time
ranges.
Table 8-11. Time Range CLI Commands
CLI Command Description
time-range time-range-name
no time-range time-range-name
Enables time-range configuration
mode, and defines time ranges for
functions (such as access lists).
Use the no form of this command
to remove the time range
configuration.
absolute start hh:mm day month
year
no absolute start
absolute end hh:mm day month year
no absolute end
Adds start and end times to the
time range.
Use the no form of the commands
to remove the start and end times
from the time range.Dell PowerConnect 55xx Systems User Guide 131
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of some of the CLI commands:
periodic day-of-the-week hh:mm to
day-of-the-week hh:mm
no periodic day-of-the-week hh:mm
to day-of-the-week hh:mm periodic
list hh:mm to hh:mm day-of-theweek1 [day-of-the-week2… day-ofthe-week7]
no periodic list hh:mm to hh:mm
day-of-the-week1 [day-of-theweek2… day-of-the-week7]
periodic list hh:mm to hh:mm all
no periodic list all hh:mm to
hh:mm all
Adds a recurring time range to the
time range.
Use the no form of the commands
to remove the recurring time
range.
console (config)# time-range http-allowed
console (config-time-range)# absolute start 12:00 1 jan
2005 end 12:00 31 dec 2005
console (config-time-range)# periodic monday 8:00 to
friday 20:00
Table 8-11. Time Range CLI Commands (Continued)
CLI Command Description132 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Dot1x Authentication
This section describes Dot1x authentication.
It contains the following topics:
• Port-Based Authentication Overview
• Dot1x Overview
• Port-Based Authentication Global
• Port-Based Authentication Interface Settings
• Monitoring Users
• Host Authentication
• Port Authentication Users
Port-Based Authentication Overview
Port-based authentication enables authenticating system users on a per-port
basis via an external server. Only authenticated and approved system users
can transmit and receive data. Ports are authenticated via the RADIUS server
using the Extensible Authentication Protocol (EAP). Port Authentication
includes:
• Authenticators — Specifies the device port that is authenticated before
permitting system access.
• Supplicants — Specifies the host connected to the authenticated port hat
is requesting to access the system services.
• Authentication Server — Specifies the external server, for example, a
RADIUS server, which performs authentication on behalf of the
authenticator, and indicates whether the supplicant is authorized to access
system services.
Port-based authentication creates two access states:
• Controlled Access — Permits communication between the supplicant and
the system, if the supplicant is authorized.
• Uncontrolled Access — Permits uncontrolled communication, regardless
of the port authorization state.Dell PowerConnect 55xx Systems User Guide 133
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The device supports Port Based Authentication via RADIUS servers.
Dot1x Overview
Dot1x is an IEEE standard for port-based network access control. The Dot1x
framework enables a device (the supplicant) to request port access from a
remote device (authenticator) to which it is connected. The supplicant is
permitted to send data to the port only after it is authenticated and
authorized. If it is not authenticated and authorized, the authenticator
discards the supplicant data, unless the data is sent to a Guest VLAN and/or
non-authenticated VLANs.
Authentication of the supplicant is performed by an external RADIUS server
through the authenticator. The authenticator monitors the results of the
authentication.
In the Dot1x standard, a device can be a supplicant and an authenticator at a
port, simultaneously requesting and granting port access. However, this
device can only act as an authenticator, and does not take on the role of a
supplicant.
The following varieties of Dot1x exist:
• Single session Dot1x:
– A1—Single-session/Single Host — In this mode, the switch, as an
authenticator, supports a single Dot1x session, and grants permission
to use the port to an authorized supplicant. All other access requests,
made by other devices received from the same port, are denied until
the authorized supplicant is no longer using the port, or the access
request is to an unauthenticated or guest VLAN.
– Single-session/Multiple Hosts—This follows the Dot1x standard. In
this mode, the switch, as an authenticator, enables any device to use a
port, as long as it has been granted permission as a supplicant at the
port.
• Multi-Session Dot1x—Every device (supplicant) connecting to a port
must be authenticated and authorized by the switch (authenticator),
separately in a different Dot1x session. This is the only mode that supports
Dynamic VLAN Assignment (DVA).134 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Dynamic VLAN Assignment (DVA)
Dynamic VLAN Assignment (DVA) is also referred to as RADIUS VLAN
Assignment in this guide. When a port is in Multiple Session mode and is
DVA-enabled, the switch automatically adds the port as an untagged member
of the VLAN that is assigned by the RADIUS server during the authentication
process. The switch classifies untagged packets to the assigned VLAN if the
packets originated from the devices or ports that are authenticated and
authorized.
For a device to be authenticated and authorized at a DVA-enabled port:
• The RADIUS server must authenticate the device and dynamically assign
a VLAN to the device.
• The assigned VLAN must not be the default VLAN and must have been
created on the switch.
• The switch must not be configured to use both a DVA and a MAC-based
VLAN group.
• A RADIUS server must support DVA with RADIUS attributes tunnel-type
(64) = VLAN (13), tunnel-media-type (65) = 802 (6), and tunnel-privategroup-id = a VLAN ID.
Dynamic Policy/ACL Assignment
The Dynamic Policy/ACL Assignment feature enables specifying a userdefined ACL or policy in the RADIUS server. After a successful
authentication, the user is assigned that ACL.
Authentication Methods
The possible authentication methods are:
• Dot1x — The switch supports this authentication mechanism, as
described in the standard, to authenticate and authorize Dot1x
supplicants.
• MAC-based — The switch can be configured to use this method to
authenticate and authorize devices that do not support Dot1x. The switch
emulates the supplicant role on behalf of the non-Dot1x-capable devices,
and uses the MAC address of the devices as the username and password,
when communicating with the RADIUS servers. MAC addresses for Dell PowerConnect 55xx Systems User Guide 135
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
username and password must be entered in lower case and with no
delimiting characters (for example: aaccbb55ccff). To use MAC-based
authentication at a port:
– A Guest VLAN must be defined.
– The port must be Guest-VLAN-enabled.
– The packets from the first supplicant, at the port before it is
authorized, must be untagged.
You can configure a port to use Dot1x only, MAC-based only, or Dot1x and
MAC-based authentication. If a port is configured to use both Dot1x and
MAC-based authentication, a Dot1x supplicant has precedence over a
non-Dot1x device. The Dot1x supplicant preempts an authorized, but
non-Dot1x device, at a port that is configured with a single session.
Unauthenticated VLAN and Guest VLANs
Unauthenticated VLANs and Guest VLANs provide access to services that do
not require the subscribing devices or ports to be Dot1x or MAC-Based
authenticated and authorized.
An unauthenticated VLAN is a VLAN that allows access by authorized and
unauthorized devices or ports. You can configure one or more VLAN to be
unauthenticated in the VLAN Membership pages in "VLANs" on page 466.
An unauthenticated VLAN has the following characteristics:
• It must be a static VLAN, and cannot be the Guest VLAN or the default
VLAN.
• The VLAN’s member ports must be manually configured as tagged
members.
• The member ports must be trunk and/or general ports. An access port
cannot be member of an unauthenticated VLAN.
The Guest VLAN, if configured, is a static VLAN with the following
characteristics.
• It must be manually defined from an existing, static VLAN.
• It is automatically available only to unauthorized devices, or to ports of
devices that are connected and Guest VLAN enabled. 136 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• If a port is Guest-VLAN-enabled, the switch automatically adds the port as
an untagged member of the Guest VLAN when the port is not authorized,
and removes the port from the Guest VLAN when the first supplicant of
the port is authorized.
• The Guest VLAN cannot be used as both the Voice VLAN and an
unauthenticated VLAN.
The switch also uses the Guest VLAN for authentication at ports configured
with Multiple Session mode and MAC-based authentication. Therefore, you
must configure a Guest VLAN before you can use the MAC-based
authentication mode.
For authentication to function, it must be activated both globally, in the PortBased Authentication Global page and individually on each port, in the PortBased Authentication Interface Settings pages.
Monitoring Mode
Monitoring mode enables providing users who fail authentication with
limited network access. This enables these users to correct the reason that the
authentication failed.
The following are the main aspects of this feature:
• Enables successful authentications using the returned RADIUS
information
• Provides a mechanism to report unsuccessful authentications without
negative repercussions to the user due to administrator errors
• Accurately reports the data received from the successful and nonsuccessful operations so that appropriate changes to problem areas may be
made.
The Dot1x monitoring activation command includes a special VLAN that is
used when there is no access interface configuration present and the client(s)
unsuccessfully authenticates. These clients are placed in the special VLAN.
For users that unsuccessfully authenticate during re-authentication process,
but already have existing VLANs configured, the failure to authenticate does
not put them in a disabled state but places them back to the existing
configuration.Dell PowerConnect 55xx Systems User Guide 137
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port-Based Authentication Global
To globally configure authentication:
1 Click Switching > Network Security > Dot1 Authentication > Port
Based Authentication Global to display the Port Based Authentication
Global page.
Figure 8-12. Port Based Authentication Global
2 Enter the following fields:
– Port Based Authentication State — Enable/disable port-based
authentication.
– Authentication Method — Select an authentication method. The
possible options are: 138 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• RADIUS, None — Perform port authentication first by using the
RADIUS server. If no response is received from RADIUS (for
example, if the server is down), then no authentication is
performed, and the session is permitted.
• RADIUS — Authenticate the user on the RADIUS server. If no
authentication is performed, the session is not permitted.
• None — Do not authenticate the user. Permit the session.
– Guest VLAN — Enable/disable the use of a Guest VLAN for
unauthorized ports. If a Guest VLAN is enabled, all unauthorized
ports automatically join the VLAN selected in the Guest VLAN ID
field. If a port is later authorized, it is removed from the Guest VLAN.
– VLAN List — Select the Guest VLAN from the VLAN list.
– Monitoring Mode — Enable/disable logging authentication attempts.
– Monitoring VLAN — Enter the ID of the VLAN to which traffic
being monitored is routed after unsuccessful Dot1x authentication.
– Accept Supplicant when Dynamic Policy/ACL Assignment Has No
Resources — If no resources remain in the TCAM, the system can
either reject (disable) or allow (enable) successful authentication.
Enabling Port-Based Authentication Globally Using the CLI Commands
The following table summarizes the CLI commands for enabling the port
based authentication as displayed in the Port Based Authentication Global
page.
Table 8-12. Port-Based Authentication Global CLI Commands
CLI Command Description
aaa authentication dot1x
default method1 [method2]
no aaa authentication dot1x
default
Specifies one or more AAA methods for
use on interfaces running IEEE 802.1X.
Use the no form of this command to
restore the default configuration.
dot1x system-auth-control
no dot1x system-auth-control
Enables 802.1x globally.
Use the no form of this command to
restore the default configuration.Dell PowerConnect 55xx Systems User Guide 139
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
dot1x system-auth-control
monitor [vlan vlan-id]
no dot1x system-auth-control
monitor
Enables 802.1x globally the 802.1x
Monitoring mode and define the Monitor
VLAN.
Use the no format of the command to
return to default.
dot1x guest-vlan
no dot1x guest-vlan
Contains a list of VLANs. The guest
VLAN is selected from the VLAN List.
Use the no form of this command to
disable access.
show dot1x Displays 802.1X status for the device.
console(config)# aaa authentication dot1x default none
console(config)# interface vlan 5
console# show dot1x
802.1x is disabled
Admin Oper Reauth Reauth Username
Port Mode Mode Control Period
-------- ------------------ ------------- -------- ------- --------
gi1/0/1 Force Authorized Authorized* Disabled 3600 n/a
gi1/0/2 Force Authorized Authorized* Disabled 3600 n/a
gi1/0/3 Force Authorized Authorized* Disabled 3600 n/a
gi1/0/4 Force Authorized Authorized* Disabled 3600 n/a
Table 8-12. Port-Based Authentication Global CLI Commands (Continued)
CLI Command Description140 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port-Based Authentication Interface Settings
To configure 802.1x authentication on an interface:
1 Click Switching > Network Security > Dot1 Authentication > Port
Based Authentication Interface Settings to display the Port Based
Authentication Interface Settings: Summary page.
Figure 8-13. Port Based Authentication Interface Settings
Port parameters for the selected unit are displayed.
2 Click Edit.
3 Select a port for which the authentication parameters apply in the
Interface drop-down list.
4 Enter the parameters:
– User Name — Displays the username of the port.
– Admin Interface Control — Select the port authorization state. The
possible options are:
• Auto — Enables port-based authentication on the interface. The
interface moves between an authorized or unauthorized state,
based on the authentication exchange between the device and the
client.Dell PowerConnect 55xx Systems User Guide 141
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Authorized — Places the interface into an authorized state
without being authenticated. The interface resends and receives
normal traffic without client port-based authentication.
• Unauthorized — Denies the selected interface system access by
moving the interface into unauthorized state. The device cannot
provide authentication services to the client through the
interface.
– Current Interface Control — Displays the current port authorization
state.
– Authentication Type — Select the type of authentication on the port.
The possible options are:
• 802.1x Only — 802.1X authentication is the only authentication
method performed on the port.
• MAC Only — Port is authenticated, based on the supplicant
MAC address. Only eight MAC-based authentications can be
used on the port.
• 802.1x & MAC — Both 802.1X and MAC-based authentication
are performed on the switch. The 802.1X authentication takes
precedence.
NOTE: For MAC authentication to succeed, the RADIUS server supplicant
username and password must be the supplicant MAC address. The MAC
address must be in lower case letters and entered without the “:” or “-”
separators; for example: 0020aa00bbcc.
– Dynamic VLAN Assignment — Enable/disable dynamic VLAN
assignment for this port. This feature enables you to automatically
assign users to VLANs during the RADIUS server authentication.
When a user is authenticated by the RADIUS server, the user is
automatically joined to the VLAN configured on a RADIUS server.
• Port Lock and Port Monitor should be disabled when DVA is
enabled.
• Dynamic VLAN Assignment (DVA) can occur only if a RADIUS
server is configured, and port authentication is enabled and set to
802.1x multi-session mode.
• If the RADIUS Accept Message does not contain the supplicant’s
VLAN, the supplicant is rejected.142 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Authenticated ports are added to the supplicant VLAN as
untagged.
• Authenticated ports remain unauthenticated VLAN and Guest
VLAN members. Static VLAN configuration is not applied to the
port.
• The following list of VLANs cannot participate in DVA: an
Unauthenticated VLAN, a Dynamic VLAN that was created by
GVRP, a Voice VLAN, a Default VLAN and a Guest VLAN.
• Delete the supplicant VLAN while the supplicant is logged in.
The supplicant is authorized during the next re-authentication if
this supplicant VLAN is re-created, or a new VLAN is configured
on the RADIUS server.
NOTE: DVA provides the same functionality as the MAC to VLAN Assignment
feature, but does so in a standard way. Therefore, when DVA is available,
MAC to VLAN Assignment is not available.
– Guest VLAN — Enable/disable port access to the Guest VLAN. If
enabled, unauthorized users, connected to this interface, can access
the Guest VLAN.
– Dynamic Policy / ACL Assignment — Enable/disable this feature.
– Periodic Reauthentication — Select to enable port re-authentication
attempts after the specified Reauthentication Period.
– Reauthentication Period (300-4294967295) — Enter the number of
seconds after which the selected port is reauthenticated.
– Reauthenticate Now — Select to enable immediate port
re-authentication.
– Authentication Server Timeout (1-65535) — Enter the time interval
that lapses before the device resends a request to the authentication
server. The field value is specified in seconds.
– Resending EAP Identity Request (1-65535) — Enter the amount of
time that lapses before EAP request are resent.
– Quiet Period (0-65535) — Enter the number of seconds that the
device remains in the quiet state, following a failed authentication
exchange.Dell PowerConnect 55xx Systems User Guide 143
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Supplicant Timeout (1-65535) — Enter the amount of time that
lapses before EAP requests are resent to the supplicant. The field
value is in seconds.
– Max EAP Requests (1-10) — Enter the maximum number of EAP
requests that can be sent. If a response is not received after the defined
period (supplicant timeout), the authentication process is restarted.
Enabling Port-Based Authentication on Interfaces Using the CLI Commands
The following table summarizes the CLI commands for enabling the port
based authentication as displayed in the Port Based Authentication Global
page.
Table 8-13. Port-Based Authentication Interface CLI Commands
CLI Command Description
dot1x port-control {auto |
force-authorized | forceunauthorized}
no dot1x port-control
Enables manual control of the port
authorization state.
Use the no form of this command to
restore the default configuration.
dot1x mac-authentication
{mac-only|mac-and-802.1x}
no dot1x mac-authentication
Enables authentication based on the
station’s MAC address.
Use the no form of this command to
disable access.
dot1x radius-attributes vlan
no dot1x radius-attributes
vlan
Enables user-based VLAN assignment.
Use the no form of this command to
disable user-based VLAN assignment.
dot1x guest-vlan enable
no dot1x guest-vlan enable
Enables unauthorized users on the
interface access to the guest VLAN.
Use the no form of this command to
disable access.
dot1x max-req count
no dot1x max-req
Sets the maximum number of times that
the device sends an EAP to the client,
before restarting the authentication
process.
Use the no form of this command to
restore the default configuration.144 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
dot1x re-authentication
no dot1x re-authentication
Enables periodic re-authentication of the
client.
Use the no form of this command to
restore the default configuration.
dot1x timeout re-authperiod
seconds
no dot1x timeout supp-timeout
Sets the number of seconds between reauthentication attempts.
Use the no form of this command to
restore the default configuration.
dot1x re-authenticate
[[gigabitethernet|tengigabit
ethernet] port-number]
Manually initiates a re-authentication of
all 802.1X-enabled ports or the specified
802.1X-enabled port.
dot1x timeout quiet-period
seconds
no dot1x timeout quiet-period
Sets the number of seconds that the
device remains in the quiet state following
a failed authentication exchange.
Use the no form of this command to
restore the default configuration.
dot1x timeout server-timeout
seconds
no dot1x timeout servertimeout
Sets the time for the retransmission of
packets to the authentication server.
Use the no form of this command to
restore the default configuration.
dot1x timeout supp-timeout
seconds
no dot1x timeout supp-timeout
Sets the time for the retransmission of an
EAP request frame to the client.
Use the no form of this command to
restore the default configuration.
dot1x timeout tx-period
seconds
no dot1x timeout tx-period
Sets the number of seconds that the
device waits for a response to an EAP -
request/identity frame, from the client,
before resending the request.
Use the no form of this command to
restore the default configuration.
show dot1x
[[gigabitethernet|tengigabit
ethernet] port-number]
Displays 802.1X status for the device or
for the specified interface.
Table 8-13. Port-Based Authentication Interface CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 145
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show dot1x advanced Displays 802.1X advanced features for the
switch or specified interface.
show dot1x users [username
username]
Displays 802.1X users for the device.
dot1x guest-vlan enable
no dot1x guest-vlan enable
Enables using a guest VLAN for
unauthorized ports.
Use the no form of this command to
restore the default configuration.
console(config)# aaa authentication dot1x default none
console(config)# interface vlan 5
console(config-if)# dot1x auth-not-req
console(config)# vlan database
console(config-vlan)# vlan 2
console(config-vlan)# exit
console(config)# interface vlan 2
console(config-if)# dot1x guest-vlan
console# show dot1x
Interface Admin
Mode
Oper Mode Reauth
Control
Reauth
Period
Username
-------- ------- ---------- -------- ------ --------
gi1/0/1 Auto Authorized Enabled 3600 Bob
gi1/0/2 Auto Authorized Enabled 3600 John
gi1/0/3 Auto Unauthoriz
ed
Enabled 3600 Clark
gi1/0/4 Forceauth
Authorized Disabled 3600 n/a
Table 8-13. Port-Based Authentication Interface CLI Commands (Continued)
CLI Command Description146 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Monitoring Users
Use the Monitoring Users page to view rejected users.
1 Click Switching > Network Security > Dot1 Authentication >
Monitoring Users to display the Monitoring Users page.
Figure 8-14. Monitoring Users
2 Select a supplicant that was authenticated on the port. The supplicant’s
information is displayed.
– User Name — Name assigned to this port.
– Port — Number of port.
– VLAN — Port belongs to this VLAN.
– MAC Address — Source of traffic.
– Reject Reason — Reason that traffic was rejected. See Table 8-14 for a
list of the possible reject reasons.
– Time — Time that traffic was rejected.Dell PowerConnect 55xx Systems User Guide 147
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Table 8-14. Reject Reason Description
Abbreviation Description
ACL-DEL ACL was deleted by a user.
ACL-NOTEXST ACL sent by the RADIUS server does not exist on the device.
ACL-OVRFL ACL sent by the RADIUS server cannot be applied because of
TCAM overflow.
AUTH-ERR Rejected by RADIUS due to wrong user name or password in
the RADIUS server.
FLTR-ERR RADIUS accept message contains more than two filter IDs.
FRS-MTH-DENY First method is deny.
IPv6WithMAC RADIUS accept message contains filter with IPv6 DIP and
MAC addresses.
IPV6WithNotIP RADIUS accept message contains IPv6 and not IP
simultaneously.
POL-BasicMode Policy is not supported in the QoS basic mode.
POL-DEL Policy was deleted by a user.
POL-OVRFL Policy sent by radius server can not be applied because of
TCAM overflow.
RAD-APIERR RADIUS API returned error (e.g. No RADIUS server is
configured).
RAD_INVLRES RADIUS server returned invalid packet (e.g. EAP attribute is
missing).
RAD-NORESP RADIUS server is not responding.
VLAN-DFLT VLAN sent by a RADIUS server cannot be applied because it
is the default VLAN.
VLAN-DYNAM VLAN sent by RADIUS server cannot be applied because it is
a dynamic VLAN.
VLAN-GUEST VLAN sent by RADIUS server cannot be applied because it is
the Guest VLAN.148 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Monitoring Users Using the CLI Commands
The following table summarizes the CLI commands for monitoring users:
The following is an example of the CLI commands:
Table 8-15. Monitoring Users CLI Commands
CLI Command Description
show dot1x monitoring result
[username username]
Displays the captured information of each
interface/host on the switch/stack.
console# show dot1x monitoring Tom
Username: Tom
Port g1
Quiet period: 60 Seconds
Tx period: 30 Seconds
Max req: 2
Supplicant timeout: 30 Seconds
Server timeout: 30 Seconds
Session Time (HH:MM:SS): 08:19:17
MAC Address: 00:08:78:32:98:78
Authentication Method: Remote
Assigned VLAN: 207
Reason for Failure:VLAN was not defined on SwitchDell PowerConnect 55xx Systems User Guide 149
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Host Authentication
Use the Host Authentication page to define the authentication mode on the
port, and the action to perform if a violation is detected.
To view ports and their authentication information:
1 Click Switching > Network Security > Dot1 Authentication > Host
Authentication to display the Host Authentication: Summary page.
Figure 8-15. Host Authentication: Summary
A list of the ports and their authentication modes is displayed. The fields
are defined on the Edit page with the exception of the following field:
– Single Host Status — Displays the host status. The possible options
are:
• Unauthorized — The port control is Force Unauthorized, the
port link is down or the port control is Auto, but a client has not
been authenticated via the port.150 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Not in Auto Mode — The port control is Forced Authorized, and
clients have full port access.
• Single-host Lock — The port control is Auto and a single client
has been authenticated via the port.
• No Single Host — Multiple Host is enabled.
– Number of Violations — Displays the number of packets that arrive
on the interface in single-host mode, from a host whose MAC address
is not the supplicant MAC address.
2 Click Edit.
3 In the Port drop-down list, select the port to which you want to apply the
authentication mode.
4 Enter the fields:
– Host Authentication — Define the host authentication type. The
options are:
• Single — Only a single authorized host can access the port. (Port
Security cannot be enabled on a port in single-host mode.)
• Multiple Host — Multiple hosts can be attached to a single
802.1x-enabled port. Only the first host must be authorized, and
then the port is wide-open for all who want to access the network.
If the host authentication fails, or an EAPOL-logoff message is
received, all attached clients are denied access to the network.
• Multiple Session — A number of specific authorized hosts may
access the port. Each host is treated as if it was the first and only
user and must be authenticated. Filtering is based on the source
MAC address.
– Action on Single Host Violation — Select the action to be applied to
packets arriving in Single Session/Single Host mode, from a host
whose MAC address is not the supplicant MAC address. The options
are:
• Discard — Discard the packets from any unlearned source.
• Forward — Forward the packets from an unknown source,
however, the MAC address is not learned.Dell PowerConnect 55xx Systems User Guide 151
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Shutdown — Discard the packet from any unlearned source and
shut down the port. Ports remain shutdown until they are
activated, or the switch is reset.
Host Authentication pages:
The following is an example of the CLI commands:
Table 8-16. Host Authentication CLI Commands
CLI Command Description
dot1x host-mode {multihost|single-host|multisessions}
Allows a single host (client) or multiple
hosts on an IEEE 802.1x-authorized port.
dot1x traps macauthentication failure
no dot1x traps macauthentication failure
Enables sending traps when a MAC
address is successfully authenticated by
the 802.1X mac-authentication access
control.
Use the no form of this command to
disable the traps.
dot1x traps macauthentication success
no dot1x traps macauthentication success
Enables sending traps when MAC address
was failed in authentication of the 802.1X
MAC authentication access control.
Use the no form of this command to
disable the traps.
dot1x violation-mode
{restrict | protect |
shutdown}
no dot1x violation-mode
Configures the action to be taken, when a
station whose MAC address is not the
supplicant MAC address, attempts to
access the interface.
Use the no form of this command to
return to default.
show dot1x advanced
[gigabitethernet|tengigabite
thernet] port-number]
Displays 802.1x advanced features for the
device or specified interface.
console(config)# interface gi1/0/1
console(config-if)# dot1x host-mode multi-host
console(config-if)# dot1x host-mode single-host
console(config-if)# dot1x host-mode multi-sessions152 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Authentication Users
The Port Authentication Users page enables you to view users that attempted
to be authenticated.
To view ports and their authentication definitions:
1 Click Switching > Network Security > Dot1 Authentication > Port
Authentication Users to display the Port Authentication Users page.
Figure 8-16. Port Authentication Users
The ports and their authentication definitions are displayed.
– User Name — Supplicant names that were authenticated on each
port.
– Port — Number of port.
– Session Time — Amount of time (in seconds) that the supplicant was
logged on the port.Dell PowerConnect 55xx Systems User Guide 153
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Authentication Method — Method by which the last session was
authenticated. The options are:
• None—No authentication is applied; it is automatically
authorized.
• RADIUS—Supplicant was authenticated by a RADIUS server.
• MAC Address—Displays the supplicant MAC address.
– MAC Address — MAC address of user who attempted to be
authenticated.
– VLAN — VLAN assigned to the user.
– Filter — Filter that was applied to the user by receiving the
policy/ACL name from the RADIUS server (Dynamic ACL
Assignment).
2 Click Details to view the names of the VLAN filters (Filter #1 and Filter
#2) defined on the port, in addition to the above fields.154 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Display Port Authentication Users Using the CLI Commands
The following table summarizes the CLI commands for displaying port
authentication users:
The following is an example of the CLI commands:
Table 8-17. Display Port Authentication Users CLI Commands
CLI Command Description
show dot1x users Displays active 802.1x authenticated users for the
device.
console# show dot1x users
Port User Session Auth MAC VLAN Filter
Name Time Method Address
------ ----- ----------- -------- -------------- ---- ------
gi1/0/1 Bob 1d 03:08:58 Remote 0008.3b79.8787 3
Port User Session Auth MAC VLAN Filter
Name Time Method Address
------ ----- ----------- -------- -------------- ---- ------
gi1/01 Bob 1d 09:07:38 Remote 0008.3b79.8787 3 OK
gi1/01 Tim 03:08:58 Remote 0008.3b79.3232 9 OK
gi1/03 Paul 02:12:48 Remote 0008.3b89.8237 8 Warning
console# show dot1x users username Bob
Port User Session Auth MAC VLAN Filter
Name Time Method Address
------ ----- ----------- -------- -------------- ---- ------
gi1/01 Bob 1d 09:07:38 Remote 0008.3b79.8787 3 OKTemplate Last Updated - 2/7/2007Dell PowerConnect 55xx Systems User Guide 155
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
9
Configuring System Information
This section describes how to set system parameters, such as security features,
switch software, system time, logging parameters and more.
It contains the following topics:
• General Switch Information
• Time Synchronization
• Logs
• IP Addressing
• Diagnostics
• Management Security
• DHCP Server
• DHCP Server
• File Management
• Stack Management
• sFlow156 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
General Switch Information
This section describes how to view and set general switch parameters.
It contains the following topics:
• Asset Information
• System Health
• Power over Ethernet
Asset Information
Use the Asset page to view and configure general device information,
including the system name, location, contact, system MAC Address, System
Object ID, date, time, and system up time.
To configure general device parameters:
1 Click System > General > Asset in the tree view to display the Asset page.
Figure 9-1. AssetDell PowerConnect 55xx Systems User Guide 157
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Enter/view the parameters:
– System Name (0-159 Characters) — Enter the user-defined device
name.
– System Contact (0-159 Characters) — Enter the name of the contact
person.
– System Location (0-159 Characters) — Enter the location where the
system is currently running.
– MAC Address — Displays the device MAC address.
– Sys Object ID — Displays the vendor's authoritative identification of
the network management subsystem contained in the entity.
– Date — Enter the current date (mandatory). This date can also be
entered in the Manual Time Settings page. If SNTP has been defined,
but the SNTP server is not available, the switch uses the date and time
in this field and the Time field.
– Time — Enter the current time (mandatory). This time can also be
entered in the Manual Time Settings page. If SNTP has been defined,
but the SNTP server is not available, the switch uses the date and time
in this field and the Date field.
– System Up Time — Displays the amount of time since the last device
reset.
3 For each unit in the stack (displayed in Unit No.), the following
information is displayed:
– Service Tag — Displays the service reference number used when
servicing the device.
– Asset Tag — Enter the device asset tag.
– Serial No. — Displays the device serial number.
4 Enter the Asset Tag (0-16 Characters) for each unit in the stack. This is
the user-defined reference for the unit.158 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Entering Asset Information Using the CLI Commands
The following table summarizes the CLI commands for entering fields
displayed on the Asset page.
The following is an example of the CLI commands
Table 9-1. Asset CLI Command
CLI Command Description
snmp-server contact text
no snmp-server contact
Configures the system contact
(sysContact) name.
Use the no form of the command to
remove the system contact
information.
snmp-server location text
no snmp-server location
Configures the system location
string.
Use the no form of this command to
remove the location string.
hostname name
no hostname
Specifies the device host name.
Use the no form of the command to
remove the existing host name.
clock set hh:mm:ss
{month|day} year
Sets the system clock to this time.
asset-tag [unit unit] tag
no asset-tag [unit unit]
Assigns the asset tag to the unit.
Removes the asset tag from the unit.
console (config)# asset-tag 2365491870Dell PowerConnect 55xx Systems User Guide 159
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
System Health
To view the device’s power information and set fan administration state:
1 Click System > General > System Health in the tree view to display the
System Health page.
Figure 9-2. System Health
The System Health page displays the following fields:
– Unit No. — The unit in the stack for which information is displayed.
Power Supply Status —Displays the following columns:
– PS — The power status of the internal power unit. The possible
options are:
• Checked — The power supply is operating normally.
• Unchecked — The power supply is not operating normally.
• Not Present — The power supply is currently not present.160 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– RPS — The device has one of two auxiliary power supplies:
Redundant Power Supply (RPS) for non-PoE devices and Modular
Power Supply (MPS) for PoE devices. Only one of these may be
present at one time. For each type of power supply, the possible
options are:
• Checked — The power supply is operating normally.
• Unchecked — The power supply is not operating normally.
• Not Present — The power supply is currently not present.
– Temperature — Displays the temperature on the device.
– Fan Status — The device has two fans. The device constantly
measures the internal temperature, and powers the fans on/off
according to the temperature. The user can set the fans to be
constantly on. The possible options are:
• Checked — The fans are operating normally.
• Unchecked — At least one of the fans is not operating
normally.
– Fan Admin State — On/Auto status that user configured in the Edit
page.
– Fan Current Level — Specifies whether the fan is actually on or off.
2 The lower block displays the condition under which a fan will be turned on
or off.
– Fan Level — The on or off level.
– Condition — The temperature at which the fans will be turned on or
off. The device temperature is displayed in Celsius. The device
temperature threshold is 40 C (104 F).Table 9-2 displays the
temperature in Fahrenheit in increments of 5.
NOTE: It is recommended to leave Fan User Level at Auto so that the fans
operate according to the temperature of the switch.
3 To control the fans on a unit, or set the default value, click Edit, and enter
the fields:
– Unit ID — Select the unit ID whose fan will be adjusted.Dell PowerConnect 55xx Systems User Guide 161
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Fan Admin State — Set one of the options:
• Auto — Fans are turned on when the internal temperature of the
switch is higher than the threshold displayed on the Summary
page in the Condition field.
• ON — Turns fan on under all conditions
Table 9-2. Celsius to Fahrenheit Conversion Table
Viewing System Health Information Using the CLI Commands
The following table summarizes the CLI commands for viewing fields
displayed on the System Health page.
Celsius Fahrenheit
0 32
5 41
10 50
15 59
20 68
25 77
30 86
35 95
40 104
Table 9-3. System Health CLI Command
CLI Command Description
show system [unit unit] Displays system information.
system fans always-on
[unit unit]
no system fans always-on
Sets the system fans to On regardless of device
temperature.
Use the no form of the command to return to
default
show system fans Displays the fans’ status.162 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
Power over Ethernet
A Power over Ethernet (PoE) switch is a type of PSE (Power Sourcing
Equipment) that delivers electrical power to connected Powered Devices
(PDs) over existing copper cables, without interfering with the network
traffic, updating the physical network or modifying the network
infrastructure.
Using PoE eliminates the need to:
• Place all network devices next to power sources.
• Deploy double-cabling systems, significantly decreasing installation costs.
PoE can be used in any network that deploys relatively low-powered devices
connected to the Ethernet LAN. PDs are devices that receive power from the
PowerConnect power supplies, such as:
• IP phones
console# show system
Unit Type
---- ----------------------
2 PowerConnect 5548
Unit Main Power Supply Redundant Power Supply
---- ----------------- ----------------------
2 OK
Unit Fans Status
---- -------------
2 OK
Unit Temperature (Celsius) Temperature Sensor Status
---- ------------------------- ---------------------
2 41 OK
Unit Up time
---- ---------------
2 02,00:03:32Dell PowerConnect 55xx Systems User Guide 163
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Wireless access points
• IP gateways
• Audio and video remote monitoring devices
PDs are connected to the device via the Gigabit ports.
Error Conditions
Traps are generated when the following occur:
• Status change to port delivering/not delivering power to PD.
• Indication that power usage is above the defined threshold.
• Indication that power usage is below the threshold.164 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring PoE
To configure PoE parameters on devices equipped with PoE:
1 Click System > General > Power over Ethernetin the tree view to display
the Power Over Ethernet: Summary page.
Figure 9-3. Power Over Ethernet: Summary
2 The PoE global parameters are displayed:
– Power Status — The inline power source status.
• On — The power supply unit is functioning.
• Off — The power supply unit is not functioning.
• Faulty — The power supply unit is functioning, but an error has
occurred, for example, a power overload or a short circuit.
– Nominal Power — The actual amount of power the device can supply,
in watts.Dell PowerConnect 55xx Systems User Guide 165
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Consumed Power — The amount of the power used by the device, in
watts.
3 Enter the following parameters:
– Power Limit Mode — Enter one of the following options for the
system power limit mode.
• Port — The power limit of the port depends on port
configuration.
• Max Port Power — In this mode, each port can get up to the
maximum power, which is 15.4W.
– System Usage Threshold (1-99 Percent) — Enter the percentage of
power consumed before a trap is generated.
– Traps — Enable/disable PoE traps on the device. If enabled, traps are
generated if one of the following situations occurs:
• Status change to port delivering/not delivering power to PD
• Indication that power usage is above the defined threshold
• Indication that power usage is below the threshold
NOTE: If traps are enabled, you must also enable SNMP, and configure at least one SNMP
notification recipient.
4 To view PoE port settings for a unit in the stack, select its Unit ID. The
port PoE parameters are displayed for all ports on the unit. The fields
displayed in this block are described in the Edit page.
5 To set PoE settings for a port, click Edit.
6 Select a port in the Port field, and enter the following PoE parameters for
the PDs connected to this port.
– PoE Admin Status — Select the device PoE mode. The possible
options are:
• Auto — Enables the Device Discovery protocol, and provides
power to the device using the PoE unit. The Device Discovery
Protocol enables the device to discover Powered Devices attached
to the device interfaces, and to learn their classification.
• Never — Disables the Device Discovery protocol, and stops the
power supply to the device using the PoE module.166 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Power Priority Level— Enter the priority that determines the power
that is used if the power supply is from Critical to Low. If, for
example, the power supply is running at 99% usage, and port 1 is
prioritized as Critical, but port 3 is prioritized as Low, port 1 is will
receive power before port 3.
– Power Limit (0-15.4) — Enter the maximum amount of power
that the PoE unit may deliver to this port.
– Powered Device (0-24 characters) — Enter a user-defined
description of the PD connected to the port, such as: "Bob Smith’s
telephone".
The following fields are displayed on this page:
– PoE Operational Status — Whether the port is currently providing
power. If it is not providing power, the reason is displayed.
– Power Consumption — The amount of power being consumed by
the powered device.
– Overload Counter — Total power overload occurrences.
– Short Counter — Total power shortage occurrences.
– Denied Counter — Number of times the powered device was
denied power.
– Absent Counter— Number of times the power supply was stopped to
the PD because it was no longer detected.
– Invalid Signature Counter — Number of times an invalid signature
was received. Signatures are the means by which the powered device
identifies itself to the PSE. Signatures are generated during powered
device detection, classification, or maintenance.Dell PowerConnect 55xx Systems User Guide 167
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Managing PoE Using the CLI Commands
The following table describes the CLI commands for viewing fields displayed
on the Power Over Ethernet pages.
Table 9-4. Power Over Ethernet CLI Commands
CLI Command Description
power inline {auto|never} Configures the administrative
status of the inline power on an
interface.
power inline powered-device pdtype
no power inline powered-device
Adds a description of the powered
device type. Use the no version of
the command to remove the
description.
Use the no form of this command
to restore the default
configuration.
power inline priority
{critical|high|low}
no power inline priority
Configures the priority of the
interface from the point of view of
inline power management.
Use the no form of this command
to restore the default
configuration.
power inline usage-threshold
no power inline usage-threshold
Configures the threshold for
triggering alarms.
Use the no form of this command
to restore the default
configuration.
power inline traps enable
no power inline traps enable
Enables PoE device traps.
Use the no form of this command
to disable traps.
power inline limit-mode {maxport-power|port}
no power inline limit-mode
Sets the power limit mode of the
system.
Use the no form of this command
to return to default.168 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show power inline
[[[gigabitethernet|tengigabitethe
rnet]port-number]|module stackmember-number]
Displays PoE configuration
information for all interfaces or for
a unit in the stack.
console# show power inline
Unit Power Nominal Power Consumed Power Usage Threshold Traps
---- ------- ------------- ------------------ --------------- -----
1 Off 1 Watts 0 Watts (0%) 95 Disable
2 Off 1 Watts 0 Watts (0%) 95 Disable
3 Off 1 Watts 0 Watts (0%) 95 Disable
4 Off 1 Watts 0 Watts (0%) 95 Disable
Table 9-4. Power Over Ethernet CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 169
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Time Synchronization
The system clock runs from the moment the system starts up, and keeps track
of the date and time.
The date and time may be either set manually, or it may be received from an
SNTP server.
This section describes how to set system time, and contains the following
sections:
• Manual Time Settings
– Setting System Time and Daylight Savings Time
– CLI Commands for Setting Manual Time
• System Time from an SNTP Server
– Global Settings (Clock Source)
– SNTP Global Settings
– SNTP Authentication
– SNTP Servers
– SNTP Interfaces
– CLI Script for Receiving Time from an SNTP Server
Manual Time Settings
This section describes how to set the system time manually on the device.
It contains the following topics:
• Setting System Time and Daylight Savings Time
• CLI Commands for Setting Manual Time170 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Setting System Time and Daylight Savings Time
Use the Manual Time Settings page to set system date/time manually (as
opposed to receiving them from an external SNTP server). For more
information on SNTP, see "System Time from an SNTP Server" on page 177.
If system time is kept using an external SNTP clock, and the external SNTP
clock fails, the system time reverts to the time set here or in the Asset page.
In addition to setting the local clock, you can use this page to enable Daylight
Savings Time (DST) on the device.
The following is a list of DST start and end times in various countries:
• Albania — Last weekend of March until the last weekend of October.
• Australia — From the end of October until the end of March.
• Australia - Tasmania — From beginning of October until the end of
March.
• Armenia — Last weekend of March until the last weekend of October.
• Austria — Last weekend of March until the last weekend of October.
• Bahamas — From April to October, in conjunction with U.S. summer
hours.
• Belarus — Last weekend of March until the last weekend of October.
• Belgium — Last weekend of March until the last weekend of October.
• Brazil — From the 3rd Sunday in October until the 3rd Saturday in
March. During the period of Daylight Saving Time, Brazilian clocks go
forward one hour in most of the Brazilian southeast.
• Chile — Easter Island 9th March 12th October. The first Sunday in March
or after 9th March.
• China — China does not operate Daylight Saving Time.
• Canada — From the first Sunday in April until the last Sunday of October.
Daylight Saving Time is usually regulated by provincial and territorial
governments. Exceptions may exist in certain municipalities.
• Cuba — From the last Sunday of March to the last Sunday of October.
• Cyprus — Last weekend of March until the last weekend of October.
• Denmark — Last weekend of March until the last weekend of October.
• Egypt — Last Friday in April until the last Thursday in September. Dell PowerConnect 55xx Systems User Guide 171
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Estonia — Last weekend of March until the last weekend of October.
• Finland — Last weekend of March until the last weekend of October.
• France — Last weekend of March until the last weekend of October.
• Germany — Last weekend of March until the last weekend of October.
• Greece — Last weekend of March until the last weekend of October.
• Hungary — Last weekend of March until the last weekend of October.
• India — India does not operate Daylight Saving Time.
• Iran — From 1st Farvardin until the 1st Mehr.
• Iraq — From 1st April until 1st October.
• Ireland — Last weekend of March until the last weekend of October.
• Israel — Varies year-to-year.
• Italy — Last weekend of March until the last weekend of October.
• Japan — Japan does not operate Daylight Saving Time.
• Jordan — Last weekend of March until the last weekend of October.
• Latvia — Last weekend of March until the last weekend of October.
• Lebanon — Last weekend of March until the last weekend of October.
• Lithuania — Last weekend of March until the last weekend of October.
• Luxembourg — Last weekend of March until the last weekend of October.
• Macedonia — Last weekend of March until the last weekend of October.
• Mexico — From the first Sunday in April at 02:00 to the last Sunday in
October at 02:00.
• Moldova — Last weekend of March until the last weekend of October.
• Montenegro — Last weekend of March until the last weekend of October.
• Netherlands — Last weekend of March until the last weekend of October.
• New Zealand — From the first Sunday in October until the first Sunday
on or after 15th March.
• Norway — Last weekend of March until the last weekend of October.
• Paraguay — From 6th April until 7th September.
• Poland — Last weekend of March until the last weekend of October.
• Portugal — Last weekend of March until the last weekend of October.172 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Romania — Last weekend of March until the last weekend of October.
• Russia — From the 29th March until the 25th October.
• Serbia — Last weekend of March until the last weekend of October.
• Slovak Republic — Last weekend of March until the last weekend of
October.
• South Africa — South Africa does not operate Daylight Saving Time.
• Spain — Last weekend of March until the last weekend of October.
• Sweden — Last weekend of March until the last weekend of October.
• Switzerland — Last weekend of March until the last weekend of October.
• Syria — From 31st March until 30th October.
• Taiwan — Taiwan does not operate Daylight Saving Time.
• Turkey — Last weekend of March until the last weekend of October.
• United Kingdom — Last weekend of March until the last weekend of
October.
• United States of America — From the second Sunday of March at 02:00
to the first Sunday of November at 02:00.Dell PowerConnect 55xx Systems User Guide 173
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To manually set the device time:
1 Click System > Time Synchronization > Manual Time Settingsin the
tree view to display the Manual Time Settings page.
Figure 9-4. Manual Time Settings
2 Enter the following local settings:
– Date — The system date.
– Local Time — The system time.
– Time Zone Offset — The difference between Greenwich Mean Time
(GMT) and local time. For example, the Time Zone Offset for Paris is
GMT +1:00, while the local time in New York is GMT –5:00.
3 To set Daylight Savings Time (DST), select the Daylight Savings field and
select one of the possible options:
– USA — The device switches to DST at 2 a.m. on the second Sunday
of March, and reverts to standard time at 2 a.m. on the first Sunday of
November. 174 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– European — The device switches to DST at 1:00 am on the last
Sunday in March, and reverts to standard time at 1:00 am on the last
Sunday in October. The European option applies to EU members,
and other European countries using the EU standard.
– Other — Specifies that you will set DST manually in the fields
described below.
If you selected USA or European you are finished. If you selected Other,
proceed to the next step.
There are two types of DST possible when Others is selected. You can set a
specific date in a particular year, or you can set a recurring setting,
irrespective of the year. For a specific setting in a particular year, complete
the Daylight Savings area, and for a recurring setting, complete the
Recurring area.
If Other is selected, the From and To fields must be defined either in the
Non-recurring or Recurring section.
4 To enter non-recurring DST parameters, enter the following fields:
– From — The time that DST begins. The possible options are:
• DD/MMM/YY — The date, month, and year at which DST
begins.
• HH/MM — The time (hour and minutes) at which DST begins.
– To — The time that DST ends. The possible options are:
• DD/MMM/YY — The date, month, and year at which DST ends.
• HH/MM — The time (hour and minutes) at which DST ends.
5 To enter recurring DST parameters, select Recurring and enter the
following fields:
– From — The time that DST begins each year, for example, DST
begins locally every second Sunday in April at 5:00 am. The possible
options are:
• Day — The day of the week from which DST begins every year.
• Week — The week within the month from which DST begins
every year.
• Month — The month of the year in which DST begins every year. Dell PowerConnect 55xx Systems User Guide 175
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Time — The time at which DST begins every year.
– To — The recurring time that DST ends each year, for example, DST
ends locally every fourth Friday in October at 5:00 am. The possible
options are:
• Day — The day of the week at which DST ends every year.
• Week — The week within the month at which DST ends every
year.
• Month — The month of the year in which DST ends every year.
• Time — The time at which DST ends every year.
CLI Commands for Setting Manual Time
The following steps (in any order) must be completed before setting time
manually:
• Set system time
• Define the time zone in relation to GMT.
• Configure Daylight Savings Time.
The following table summarizes the CLI commands for setting fields
displayed in the Manual Time Setting pages when the clock source is Local.
Table 9-5. Manual Time Setting CLI Commands
CLI Description
clock set hh:mm:ss {[day
month]|[month day]} year
Set the system clock to this time.
clock summer-time zone
recurring {usa|eu|{week
day month hh:mm week day
month hh:mm}}[offset]
Configures the system to automatically
switch to summer time (according to the
USA and European standards) every year on a
recurring basis. 176 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
clock summer-time zone
date date month year hh:mm
date month year hh:mm
[offset]
clock summer-time zone
date month date year hh:mm
month date year hh:mm
[offset]
no clock summer-time
Configures the system to automatically
switch to summer time (Daylight Savings
Time) for a specific period - date/month/year
format.
Use the no form of the command to
configure the system not to switch to
summer time (Daylight Savings Time).
clock timezone zone hoursoffset [minutes offset]
Sets the time zone and names it "zone" for
display purposes.
show clock Displays the time and date from the system
clock.
Table 9-5. Manual Time Setting CLI Commands (Continued)
CLI DescriptionDell PowerConnect 55xx Systems User Guide 177
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
A sample script to set system time manually is shown below
System Time from an SNTP Server
This section describes how to receive date/time from an SNTP server.
It contains the following topics:
• SNTP Overview
• SNTP Global Settings
• SNTP Authentication
• SNTP Servers
• SNTP Interfaces
Table 9-6. CLI Script to Set Manual System Time
CLI Description
Console# clock set 13:32:00 7 Nov 2010 Set the system time.
console# configure
console(config)# clock timezone Ohio +2
Set the time zone to GMT
plus 2 hours. The name of
the zone "Ohio" is purely for
documentation purposes.
This is not mandatory for
manual time, but is
recommended. It enables
anyone seeing the time to
know what that time is in
respect to their timezone.
console(config)# clock summer-time
Ohio_Summer recurring usa
Set Daylight Savings Time
such that it recurs every year
and is based on the summer
time schedule of the USA.
The name of the zone
"Ohio_Summer" is for
documentation purposes
only.
console(config)# exit
console# show clock
Display the system time.178 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNTP Overview
The switch supports the Simple Network Time Protocol (SNTP), which
provides accurate network switch clock time synchronization of up to 100
milliseconds. The implementation of SNTP is based on SNTPv4 (RFC 2030).
SNTP is a simple and lighter version of NTP, and can be used when the
ultimate performance of the full NTP implementation, described in
RFC-1305, is not required. SNTP operates with NTP, thus an SNTP client
can work with both SNTP and NTP servers.
The switch operates only as a client, and cannot provide time services to other
systems.
SNTP Server Types
The switch can accept time information from the following server types:
• Unicast
Polling for Unicast information is used for polling a server whose IP
address is known. This is the preferred method for synchronizing device
time, as it is most secure.
Up to eight SNTP servers can be defined.
If this method is selected, SNTP information is accepted only from SNTP
servers defined in the SNTP Servers page.
Time levels T1 - T4 (see the "Algorithm for Selecting Designated SNTP
Server" on page 180 section) are used to determine from which server time
information is accepted.
If Unicast polling is not enabled or if no servers are defined on the device,
the device accepts time information from any SNTP server of the type that
is enabled, which responds.
• Anycast
Polling for Anycast information is used when the SNTP server’s IP address
is not defined or it cannot be reached. If this method is enabled, time
information can be received from any SNTP server on the network. The Dell PowerConnect 55xx Systems User Guide 179
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
device time and date are synchronized when it proactively requests
synchronization information.
Anycast polling to get time information is preferable to Broadcast polling,
because it is more secure.
Time levels T3 and T4 are used to determine from which server time
information is accepted.
• Broadcast
Broadcast information is used if receiving Broadcast packets has been
enabled, and one of the following situations occurs:
– The SNTP server IP address has not been defined.
– Several time-information packets are received and the Broadcast time
is best according to the algorithm defined in "Algorithm for Selecting
Designated SNTP Server" on page 180.
Broadcast is the least secure method of receiving time, because it is both
unsecured and the time information was not specifically requested by the
device. Anycast is also unsecured, but time-information packets are only
accepted if they were requested.
Stratums
Each SNTP server is characterized by stratums, which define the accuracy of
its clock. The stratum is the distance, in terms of NTP hops, from the most
authoritative time server. The lower the stratum (where zero is the lowest),
the more accurate the clock. The switch accepts time from stratum 1 and
above.
The following provides examples of clocks from various stratums:
• Stratum 0 — A real time clock is used as the time source, for example, a
GPS system.
• Stratum 1 — A server that is directly linked to a Stratum 0 time source is
used.
• Stratum 2 — The time source is distanced from the Stratum 1 server over
a network path, for example, a Stratum 2 server receives the time over a
network link, via NTP, from a Stratum 1 server.180 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Algorithm for Selecting Designated SNTP Server
Messages received from SNTP servers are logged, until there are three
responding servers, or the timer expires. In any event, when the third message
is received, the timer expires.
A server is selected to be the “designated server” according to the following
criteria:
• The stratum (the distance in terms of NTP hops from the best
authoritative time servers) is considered, and the server with the best
(lowest) stratum is selected.
• If there is a tie in stratums, packets from servers defined on the device are
preferred to Anycast packets, which in turn are preferred to Broadcast
packets.
• If multiple servers pass the above criteria, then the server that sent the first
(earliest) time packet is chosen.
If a better server is discovered later, it is selected to be the “designated server”
at that time.
Polling
You can configure the system to acquire time information in the following
ways:
• Enable polling — Time information is requested every polling interval.
• Do not enable polling — Time information is received when the system is
brought up and every time that a topological change is made to the
Running Configuration file, for example when an SNTP Unicast server is
added.
This is configured by the user in the SNTP Global Settings page.
On power up, when the switch sends a request and there is no reply, it issues
another request (three retries at most) after 20 seconds of waiting.
If no SNTP server is found, the process is invoked every “poll interval” (set in
the SNTP Global Settings page), and a management trap is triggered.
Authentication
You can require that SNTP servers be authenticated, although this is not
mandatory (see the SNTP Authentication pages). Dell PowerConnect 55xx Systems User Guide 181
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
MD5 (Message Digest 5) Authentication safeguards device synchronization
paths to SNTP servers. MD5 is an algorithm that produces a 128-bit hash
value. MD5 is a variation of MD4, and increases MD4 security.
MD5 both verifies the integrity of the communication and authenticates the
origin of the communication.
Global Settings (Clock Source)
System time can be set manually, or it may be received from an external
SNTP server. You if wish to set the system time manually, you do not to use
the Global Settings page, because the default is manual (local) system time.
To set the clock source:
1 Click System > Time Synchronization > Global Settings in the tree view
to display the Global Settings page.
Figure 9-5. Global Settings182 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Select the Clock Source. The possible options are:
– Local—System time is taken from the device’s internal clock. Set this
as defined in "Manual Time Settings" on page 169.
– SNTP— System time is set via an SNTP server. Set SNTP parameters
as defined in "System Time from an SNTP Server" on page 177.
Defining the Clock Source Using CLI Commands
The following table summarizes the CLI commands for setting the clock
source.
The following is an example of the CLI commands:
SNTP Global Settings
If SNTP was selected as the clock source in the Global Settings page, you
must define the mechanism of setting time from an SNTP server. This is
done in the SNTP pages, described below.
Table 9-7. Clock Source CLI Command
CLI Description
clock source {sntp}
no clock source
Configures an external time source for the
system clock.
Use the no form of this command to disable
the external time source.
show clock [detail] Displays the time and date from the system
clock and its source.
console# configure
console(config)# clock source sntp
console# show clock detail
3:29:03 UTC Sep 7 2010
Time source is sntp
Time zone:
Offset is UTC+0Dell PowerConnect 55xx Systems User Guide 183
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define the types of server from which the device accepts SNTP
information and the polling interval:
1 Click System > Time Synchronization > SNTP Global Settings in the
tree view to display the SNTP Global Settings page.
Figure 9-6. SNTP Global Settings
2 Enter the fields:
– Poll Interval (60-86400) — Enter the interval (in seconds) at which
the SNTP servers are polled.
– Receive Broadcast Servers Updates — Enable/disable receiving time
information from Broadcast servers.
– Receive Anycast Servers Updates — Enable/disable receiving time
information from Anycast SNTP servers.
– Receive Unicast Servers Updates — Enable/disable receiving time
information from the SNTP servers defined on the switch.
– Poll Unicast Requests — Enable/disable sending SNTP Unicast server
time information requests to the SNTP server.184 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining SNTP Global Settings Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the SNTP Global Settings pages.
The following is an example of the CLI commands:
SNTP Authentication
Use the SNTP Authentication page to enable/disable SNTP authentication
between the device and an SNTP server, and to set the means by which the
SNTP server is authenticated.
Table 9-8. SNTP Global Parameters CLI Commands
CLI Command Description
sntp client poll timer
seconds
no sntp client poll timer
Sets the polling time for an SNTP client.
Use the no form of this command to
restore the default configuration.
sntp broadcast client
enable
no sntp broadcast client
enable
Enables SNTP Broadcast clients.
Use the no form of this command to
disable SNTP Broadcast clients.
sntp anycast client enable
no sntp anycast client
enable
Enables SNTP Anycast clients.
Use the no form of this command to
disable SNTP Anycast clients.
sntp unicast client enable
no sntp unicast client
enable
Enables SNTP predefined Unicast clients.
Use the no form of this command to
disable SNTP Unicast clients.
show sntp configuration Displays SNTP configuration
console(config)# sntp anycast client enableDell PowerConnect 55xx Systems User Guide 185
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To configure SNTP authentication:
1 Click System > Time Synchronization > SNTP Authentication in the
tree view to display the SNTP Authentication: Summary page.
Figure 9-7. SNTP Authentication: Summary
The previously-defined authentication keys are displayed.
2 Enable/disable SNTP Authentication. This enables/disables
authenticating SNTP sessions between the device and an SNTP server.
3 Multiple keys can be defined. To add a new SNTP authentication key, click
Add, and enter the fields.
– Encryption Key ID (1 - 4294967295) — Enter the number used to
identify this SNTP authentication key internally.
– Authentication Key (1 - 8 Characters) — Enter the key used for
authentication. The SNTP server must send this key for the switch to
use its time/date information.186 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Trusted Key — Check to specify that the encryption key is used to
authenticate the (Unicast) SNTP server. If this is not checked, the
key is not used for authentication (and another key(s) is used).
Defining SNTP Authentication Settings Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the SNTP Authentication pages.
The following is an example of the CLI commands:
Table 9-9. SNTP Authentication CLI Commands
CLI Command Description
sntp authenticate
no sntp authenticate
Defines authentication for received SNTP
traffic from servers.
Use the no form of this command to disable
the feature.
sntp trusted-key keynumber
no sntp trusted-key keynumber
Authenticates the identity of a system to
which SNTP will synchronize.
Use the no form of this command to disable
system identity authentication.
sntp authentication-key
key-number md5 value
no sntp authenticationkey key-number
Defines an authentication key for SNTP.
Use the no form of this command to remove
the authentication key for SNTP.
console(config)# sntp authenticate
console(config)# sntp trusted-key 8
console(config)# sntp authentication-key 8 md5 ClkkeyDell PowerConnect 55xx Systems User Guide 187
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNTP Servers
To add an SNTP server or display SNTP server information:
1 Click System > Time Synchronization > SNTP Servers in the tree view to
display the SNTP Servers: Summary page.
Figure 9-8. SNTP Servers: Summary
The following is displayed for the previously-defined servers:
– SNTP Server — IP address of server.
– Polling — Polls the selected SNTP server for system time information,
when enabled.
– Encryption Key ID — Key Identification used to communicate
between the SNTP server and device. 188 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Preference — SNTP server providing SNTP system time information.
The system displays on of the following options:
• Primary — The server from which time was last accepted.
• Secondary — All other servers from which time was received.
– Status — The operating SNTP server status. The possible options are:
• Up — The SNTP server is currently operating normally.
• Down — An SNTP server is currently not available, for example,
the SNTP server is currently not connected or is currently down.
• In progress — The SNTP server is currently sending or receiving
SNTP information.
• Unknown — The progress of the SNTP information currently
being sent is unknown, for example, the device is currently
looking for an interface.
– Last Response — The last time a response was received from the
SNTP server.
– Offset — The estimated offset of the server's clock, relative to the
local clock, in milliseconds. The host determines the value of this
offset, using the algorithm described in RFC 2030.
– Delay — The estimated round-trip delay of the server's clock, relative
to the local clock over the network path between them, in
milliseconds. The host determines the value of this delay, using the
algorithm described in RFC 2030.
2 To add an SNTP Server, click Add, and enter the fields:
– Supported IP Format — Select whether IPv4 or IPv6 format is used
for the IP address of the SNTP server.
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. Select one of the possible
options:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.Dell PowerConnect 55xx Systems User Guide 189
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. Select one of the
possible options:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
– SNTP Server — Enter the SNTP server’s IP address.
– Poll Interval — Enable/disable polling the selected SNTP server for
system time information, when enabled.
– Encryption Key ID — Check to use an encryption key, and select one
of the encryption keys that was defined in the SNTP Authentication
pages.
Defining SNTP Servers Settings Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the SNTP Server pages.
Table 9-10. SNTP Server CLI Commands
CLI Command Description
sntp server {ipv4-
address|ipv6-address|ipv6-
address|hostname} [poll]
[key key-id]
no sntp server {ipv4-
address|ipv6-address|ipv6-
address|hostname}
Configures the device to use SNTP to
request and accept SNTP traffic from a
server.
Use the no form of this command to
remove a server from the list of SNTP
servers.
sntp unicast client poll
no sntp unicast client poll
Enables polling for the SNTP predefined
Unicast clients.
Use the no form of this command to
disable the polling for the SNTP client.
show sntp status Displays the SNTP server statuses.190 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
SNTP Interfaces
If receiving time information from Anycast servers is enabled, you can
determine through which interface the Anycast packets are sent and received.
If no interface is defined, Anycast requests are not sent.
console(config)# sntp server 100.1.1.1 poll key 10
console# show sntp status
Clock is unsynchronized
Unicast servers:
Server Status Last Response Offset Delay
[mSec] [mSec]
--------------- --------- ------------- -------- -------
Anycast server:
Server Interface Status Last Response Offset Delay
[mSec] [mSec]
--------------- -------- -------------- ------ ------
Broadcast:
Interface IP Address Last Response
------------ --------------- -----------------------
gi1/0/1 00:00:00.0 Jan 1 2010Dell PowerConnect 55xx Systems User Guide 191
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To enable receiving Anycast updates on an interface:
1 Click System > Time Synchronization > SNTP Interface Settings to
display the SNTP Interface Settings: Summary page.
Figure 9-9. SNTP Interface Settings: Summary
The following fields are displayed for every interface for which an SNTP
interface has been enabled:
– Interface — The port, LAG or VLAN on which SNTP is enabled.
– Receive Servers Updates — Displays whether the interface is enabled
to receive updates from the SNTP server.
2 To add an interface that can receive SNTP server updates, click Add.
3 Select an interface and enable/disable State to indicate that the interface
can now receive/not receive SNTP server updates.192 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining SNTP Interface Settings Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the SNTP Interface Settings pages.
Table 9-11. SNTP Interface Settings CLI Commands
CLI Command Description
sntp client enable
{[[gigabitethernet|tengigabitethern
et] port-id|vlan vlan-id|portchannel LAG-number]}
no sntp client enable
{[[gigabitethernet|tengigabitethern
et]port-number|vlan vlan-id|portchannel LAG-number]}
Enables the SNTP client on an
interface in Global
Configuration mode.
Use the no form of this
command to disable the SNTP
client.
sntp client enable
no sntp client enable
Enables SNTP client on an
interface in Interface
Configuration mode.
Use the no form of this
command to disable the SNTP
client.
show sntp configuration Shows the configuration of the
Simple Network Time Protocol
(SNTP).Dell PowerConnect 55xx Systems User Guide 193
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
CLI Script for Receiving Time from an SNTP Server
The following is a sample script that configures receiving system time from an
SNTP server.
console# configure
console(config)# sntp client enable gi1/0/1
console# exit
console# configure
console(config)# interface gi1/0/1
console(config-if)# sntp client enable
console# show sntp configuration
SNTP port : 123.
Polling interval: 1024 seconds.
No MD5 authentication keys.
Authentication is not required for synchronization.
No trusted keys.
Unicast Clients: Disabled
Unicast Clients Polling: Disabled
Server Polling Encryption Key
----------------------------- ---------- -----------
Broadcast Clients: disabled
Anycast Clients: disabled
Broadcast Interfaces: gi1/0/1
Table 9-12. Manual Time Setting CLI Commands
CLI Description
console# configure
console(config)#clock source sntp
Set the source of time as
an SNTP server.194 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
console(config)#sntp client poll timer 6 Set polling time to 6
seconds.
console(config)#sntp unicast client
enable
Enable accepting time
from predefined Unicast
clients.
console(config)#sntp unicast client poll Enable polling predefined
Unicast clients.
console(config)#sntp server 10.4.1.3
poll
Define the server that will
be used as an SNTP
server.
console(config)#exit
console# show sntp configuration
Display SNTP settings.
console# show sntp status Display SNTP servers.
Table 9-12. Manual Time Setting CLI Commands (Continued)
CLI DescriptionDell PowerConnect 55xx Systems User Guide 195
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Logs
The Logs feature enables the switch to keep several, independent logs. Each
log is a set of entries that record system events.
It contains the following topics:
• System Log Overview
• Global Parameters
• RAM Log
• Log File (in Flash)
• Login History
• Remote Log Server
System Log Overview
System logs record events and report errors or informational messages. Some
aspects of system logging can be configured, as described below. When you
configure system logging, the configuration applies to all units in the stack.
Some events are automatically logged, such as hardware problems. You may
enable/disable logging the following types of events:
• Authentication Events in the Global Parameters page
• Copy File Events in the Global Parameters page
• Management Access Events in the Global Parameters page
• Login History in the Login History page
Event messages have a unique format, as per the System Logs (SYSLOG)
protocol recommended message format for all error reporting, for example,
SYSLOG and local device reporting messages are assigned a severity code,
and include a message mnemonic that identifies the source application
generating the message.
Messages may be filtered, based on their urgency or relevancy.
Events may be logged to the following destinations:
• Console
• Logging buffer (RAM)— Messages are stored in a cyclical file buffer.
When the maximum number of messages is reached, messages are written
starting at the beginning of the buffer (overwriting the old messages). 196 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Logs stored on the Logging buffer are deleted when the device is reset.
• Logging file (flash) — Messages are stored in flash memory. When the
buffer is full, messages are written starting at the beginning of the memory
block (overwriting the old messages).
• SYSLOG Server — Messages are sent to a remote server. This is useful for
central and remote management and to provide more space for storage of
messages. Up-to eight SYSLOG servers can be defined in the Remote
Log Server Settings pages.
You can select where to send logging messages according to their severity.
Each of the severity level can be directed to the console, RAM log, flash log
file or SYSLOG server or to any combination of these destinations.
Global Parameters
Use the Global Parameters page to enable/disable logging for the following
logging severity levels.
– Emergency — If the device is down or not functioning properly, an
emergency log message is saved to the specified logging location.
– Alert — An alert log is saved if there is a serious device malfunction,
for example, all device features are down.
– Critical — A critical log is saved if a critical device malfunction
occurs, for example, two device ports are not functioning, while the
rest of the device ports remain functional.
– Error — A device error has occurred, for example, a single port is
offline.
– Warning — The lowest level of a device warning. The device is
functioning, but an operational problem has occurred.
– Notice — Provides device information to which you might have to
respond.
– Informational — Provides device information to which you do not
have to respond.
– Debug — Provides debugging messages. Dell PowerConnect 55xx Systems User Guide 197
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
If you enable logging, some events are automatically logged, and in addition,
you can enable/disable specific types of logging and set their destination.
To configure logging:
1 Click System > Logs > Global Parameters in the tree view to display the
Global Parameters page.
Figure 9-10. Global Parameters
2 Enable/disable logging in the Logging drop-down list. Console logs are
enabled by default, and cannot be disabled.
3 If Logging is enabled, select the types of events to be logged in addition to
the events that are always logged:
– Log Authentication Events — Enable/disable generating logs when
users are authenticated. 198 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Log Copy Files Events — Enable/disable generating logs when files
are copied.
– Log Management Access Events — Enable/disable generating logs
when the device is accessed using a management method, for
example, each time the device is accessed using SSH, a device log is
generated.
4 To select the destination of logging messages, according to their severity
levels, check the minimum severity level that will be associated with the
console log, RAM log, Log file (Flash memory) and remote SYSLOG
servers. When a severity level is selected, all severity levels above the
selection are selected automatically.
Enabling Logs Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Global Parameters page.
Table 9-13. Global Log Parameters CLI Commands
CLI Command Description
logging on
no logging
Enables error message logging.
Turns off error message logging.
logging console level
no logging console level
Limits messages logged to the
console, based on severity.
Use the no form of this command to
disable logging limiting to the
console.
logging file level
no logging file
Limits SYSLOG messages stored in
flash memory, based on severity.
Use the no form of this command to
cancel using the buffer.
file-system logging
{copy|delete-rename}
Enables the logging of file system
events.Dell PowerConnect 55xx Systems User Guide 199
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
management logging {deny}
no management logging {deny}
Enables Management Access List
(ACL) deny events.
Use the no form of this command to
disable logging management access
list events.
aaa logging {login}
no aaa logging {login}
Enables logging authentication login
events.
Use the no form of this command to
disable logging authentication login
events.
console# configure
console(config)# logging on
console(config)# logging console errors
console(config)# logging file alerts
Table 9-13. Global Log Parameters CLI Commands (Continued)
CLI Command Description200 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
RAM Log
To manage the RAM log buffer:
1 Click System > Logs > RAM Log in the tree view to display the RAM Log
page.
Figure 9-11. RAM Log
The Max RAM Log Entries (20-400) line, which contains the maximum
number of RAM log entries permitted, is displayed. When the log buffer is
full, the oldest entries are overwritten. The Current Setting contains how
many entries are currently permitted, and you can change this number in
the New Setting (after reset) field.
The following is displayed for the existing logs:
– Log Index — The log number in the RAM Log table.Dell PowerConnect 55xx Systems User Guide 201
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Log Time — The time at which the log was entered into the RAM Log
table.
– Severity — The log severity.
– Description — The log entry text.
2 To remove all entries from the RAM log, click Clear Log.
Viewing and Clearing the RAM Log Table Using the CLI Commands
The following table summarizes the CLI commands for setting the size of the
RAM log buffer, viewing, and clearing entries in the RAM log.
The following is an example of the CLI commands:
Table 9-14. RAM Log Table CLI Commands
CLI Command Description
logging buffered
size
no logging buffered
Sets the number of SYSLOG messages stored in the
internal buffer (RAM).
Use the no form of this command to cancel using the
buffer.
show logging Displays the RAM logging buffer.
clear logging Clears the RAM logging buffer.
console(config)# logging buffered 300
04-Oct-2010 09:47:04 %SYSLOG-N-LOGGINGBFRSIZE: the number
of syslog messages stored in the internal buffer will be
changed to 300 (after reboot).202 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Log File (in Flash)
To view and/or clear the flash memory log file:
1 Click System > Logs > Log File in the tree view to display the Log File
page.
Figure 9-12. Log File
The following is displayed for the existing logs:
– Log Index — The log number in the Log file.
– Log Time — The time at which the log was entered.
– Severity — The log severity.
– Description — The log entry text.
2 To remove all entries from the log file, click Clear Log.Dell PowerConnect 55xx Systems User Guide 203
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Displaying the Log File Table Using the CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Log File page.
The following is an example of the CLI commands:
Login History
Use the Login History page to monitor users, including the time a user
logged in, and the protocol used to log on to the device.
Table 9-15. Log File Table CLI Commands
CLI Command Description
show logging file Displays the logging state and the SYSLOG
messages stored in the logging file.
console# show logging file
Logging is enabled.
Console Logging: Level info. Console Messages: 0 Dropped.
Buffer Logging: Level info. Buffer Messages: 62 Logged, 62
Displayed, 200 Max.
File Logging: Level debug. File Messages: 11 Logged, 51
Dropped.
SysLog server 1.1.1.1 Logging: info. Messages: 0 Dropped.
01-Jan-2000 01:12:01 :%COPY-W-TRAP: The copy operation was
completed successfully
01-Oct-2010 01:11:49 :%LINK-I-Up: gi/1/0/11
01-Oct-2010 01:11:46 :%LINK-I-Up: gi/1/0/12204 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To enable user history logging and view user login history:
1 Click System > Logs > Login History in the tree view to display the
Login History page.
Figure 9-13. Login History
The login history for the selected user or all users is displayed.
2 Enable/disable Login History to File to record login history.
3 Select a user or All from the User Name drop-down list. The login history
for this user is displayed in the following fields:
• Login Time — The time the selected user logged on to the device.
• User Name — The user that logged on to the device.
• Protocol — The means by which the user logged on to the device.
• Location — The IP address of the station from which the device was
accessed.Dell PowerConnect 55xx Systems User Guide 205
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Displaying the Device Login History Using CLI Commands
The following table summarizes the CLI commands for viewing and setting
fields displayed in the Login History page.
The following is an example of the CLI commands:
Table 9-16. Login History CLI Commands
CLI Command Description
aaa login-history file
no aaa login-history file
Enables writing to the login history file.
Use the no form of this command to disable
writing to the login history file.
show users login-history
[username]
Displays the user’s login history.
console (config)# aaa login-history file
console# show users login-history
Login Time Username Protocol Location
----------- -------- -------- ----------
01-Oct-2010
23:58:17
admin HTTP 172.16.1.8
01-Oct-2010
07:59:23
admin Telnet 172.16.0.8206 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Remote Log Server
Log messages can be sent to remote log servers, using the SYSLOG protocol.
To add a remote log server:
1 Click System > Logs > Remote Server Settings in the tree view to display
the Remote Log Server: Summary page.
Figure 9-14. Remote Log Server: Summary
The previously-defined remote servers are displayed.
2 To add a remote log server, click Add, and enter the fields:
– Supported IP Format — Select whether the IPv4 or IPv6 format is
supported.
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.Dell PowerConnect 55xx Systems User Guide 207
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
– New Log Server IP Address — Enter the IP address of the remote
SYSLOG server.
– UDP Port (1-65535) — Enter the UDP port to which the logs are sent
for the selected server.
– Facility — Select a user-defined application from which system logs
are sent to the remote server. Only a single facility can be assigned to a
single server. If a second facility level is assigned, the first facility level
is overridden. All applications defined for a device utilize the same
facility on a server.
– Description (0-64 Characters) — Enter a server description.
– Severity to Include — Check the severity levels to be logged to the
remote server. The event severity levels are listed on this page in
descending order from the highest severity to the lowest. When a
severity level is selected to appear in a log, all higher severity events are
automatically selected to appear in the log. When a security level is
not selected, no lower severity events appear in the log. 208 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Working with Remote Server Logs Using the CLI Commands
The following table summarizes the CLI command for working with remote
log servers.
The following is an example of the CLI commands:
Table 9-17. Remote Log Server CLI Commands
CLI Command Description
logging host {ipv4-address|ipv6-
address|hostname} [port port-id]
[severity level] [facility
facility] [description text]
no logging host {ipv4-
address|ipv6-address|hostname}
Logs messages to a remote server
with this IP address.
Use the no form of this command
to delete the SYSLOG server with
the specified address from the list
of SYSLOGs.
show syslog-servers Displays list of SYSLOG servers.
console (configure) # logging host 1.1.1.1
console# show syslog-servers
Device Configuration
---------------------------------------------------------
IP Address Port Facility Severity Description
----------- ----- -------- ----------- -----------
1.1.1.1 514 local7 info
1.1.1.2 514 local7 info
1.1.1.3 514 local7 info
1.1.1.4 514 local7 infoDell PowerConnect 55xx Systems User Guide 209
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IP Addressing
This section describes how to configure IP addresses on the switch, and
contains the following topics:
• IP Addressing Overview
• IPv4 Interface Parameters
• DHCP IPv4 Interface
• IPv4 Static Routing
• IPv6 Interfaces
• IPv6 Default Gateway
• ISATAP Tunnel
• IPv6 Neighbors
• IPv6 Routes Table
• Domain Name System
• Default Domain Names
• Host Name Mapping
• ARP
• UDP Relay
IP Addressing Overview
The device functions as an IPv6-compliant host, as well as an IPv4-host (also
known as dual stack). This enables device operation in a pure-IPv6 network,
as well as in a combined IPv4/IPv6 network.
Difference Between IPv4 and IPv6 Addressing
The primary difference between IPv4 to IPv6 is the length of network
addresses. IPv6 addresses are 128 bits, whereas IPv4 addresses are 32 bits.
Thus, IPv6 addresses enable the use of many more unique addresses.
The 128-bit IPv6 address format is divided into eight groups of four
hexadecimal digits. Abbreviation of this format by replacing a group of zeros
with double colons (::) is acceptable. IPv6 address representation can be
further simplified by suppressing the leading zeros.210 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
All IPv6 address formats are acceptable, yet for display purposes, the system
displays the most abbreviated form, which replaces groups of zeros with
double colons and removes the leading zeros.
IPv6 Prefixes
While Unicast IPv6 addresses written with their prefix lengths are permitted,
in practice their prefix lengths are always 64 bits, and therefore are not
required to be expressed. Any prefix that is less than 64 bits is a route or
address range that summarizes a portion of the IPv6 address space.
For every assignment of an IP address to an interface, the system runs the
Duplicate Address Detection (DAD) algorithm to ensure uniqueness.
An intermediary transition mechanism is required for IPv6-only nodes to
communicate with IPv6 nodes over an IPv4 infrastructure. The tunneling
mechanism implemented is the Intra-Site Automatic Tunnel Addressing
Protocol (ISATAP). This protocol treats the IPv4 network as a virtual IPv6
local-link, with each IPv4 address mapped to a Link Local IPv6 address.
IPv4 Interface Parameters
You can assign IP addresses to the interface in the following ways:
• Manual Assignment — Described below
• DHCP Server Assignment — Described in "DHCP IPv4 Interface" on
page 214
Multiple IP addresses can be configured in the IPv4 Interface Parameters
pages. These IP addresses can be assigned to a port, LAG, or VLAN interface.
When an IP address is assigned, it is checked for uniqueness in the following
way:
• A gratuitous ARP request is sent three times every three seconds.
• If after (3+1)*3 = 12 seconds the switch has not received the ARP
response, the IP address is considered to be unique.
• During the procedure the switch has to reply to gratuitous ARP and probe
ARP requests with the validated IP address.Dell PowerConnect 55xx Systems User Guide 211
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The IP address is assigned even if the above validation procedure concludes
that the IP address in question is not unique, but a SYSLOG message is
generated.
In addition to the above validation procedure every time a switch receives an
ARP request with a sender IP address that is equal to its IP address defined on
the input interface it sends a SYSLOG message informing of IP duplication,
containing the sender IP and MAC addresses, from the received ARP
message.
To assign an IP address to an interface, and to define subnets to which traffic
can be routed:
1 Click System > IP Addressing > IPv4 Interface Parameters in the tree
view to display the IP Interface Parameters: Summary page.
Figure 9-15. IPv4 Interface Parameters: Summary212 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The previously-assigned IP addresses are displayed.
2 To add an IP address to an interface, click Add, and enter the fields:
– IP Address — Enter the IP address assigned to the interface.
– Network Mask — Select the subnetwork mask to which traffic can be
routed.
– Prefix Length — Enter the number of bits that comprise the IP
address prefix of the subnetwork.
– Interface — Select the interface for which the IP address is defined.
Select an interface type Port, LAG, or VLAN and the specific
interface number.
Defining IPv4 Interfaces Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the IPv4 Interfaces Parameters page.
Table 9-18. IPv4 Interface Parameters CLI Commands
CLI Command Description
ip address ip-address
{mask|prefix-length}
no ip address [ip-address]
Sets an IP address.
Use the no form of the command to
remove an IP address.
show ip interface
[[gigabitethernet|tengigabitet
hernet]port-number|vlan vlanid|port-channel LAG-number]
Displays the usability status of
interfaces configured for IP.Dell PowerConnect 55xx Systems User Guide 213
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following are sample procedures to configure a static IPv4 address on an
interface using CLI and then to remove it:
Table 9-19. Sample CLI Script to Configure IPv4 Statically on a VLAN
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# interface vlan 1 Enter Interface mode for
VLAN 1.
console(config-if)# ip address
10.5.225.40 /27
Set the routing interface with
prefix length of 27.
console(config-if)# ip defaultgateway 10.5.225.33
Set the address of the default
gateway
console(config-if)# no ip address Remove the address (if
required).
Table 9-20. Sample CLI Script to Configure IPv4 Statically on a Port
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# interface gi1/0/1 Enter Interface mode for port
1 on unit 1.
console(config)# no switchport Enable the port to work as an
IP interface (Layer 3 mode).
console(config-if)# ip address
10.5.225.40 /27
Configure an IP address with
prefix length of 27.
console(config-if)# ip defaultgateway 10.5.225.33
Set the address of the default
gateway
console(config-if)# no ip address Remove the address (if
required).214 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCP IPv4 Interface
The switch can operate in the following ways:
• It can function as a DHCP client that obtains its own IP from a DHCP
server, as described in this section
• It can function as a DHCP server that allocates IP addresses to other
devices, as described in "DHCP Server" on page 297
When the interface is configured as a DHCP client, it keeps requesting an IP
address from the DHCP server, until it receives one. It then sends Address
Resolution Protocol (ARP) packets to confirm the uniqueness of the IP
address. If the ARP response shows that the IP address is in use, the switch
sends a DHCPDECLINE message to the DHCP server, and sends another
DHCPDISCOVER packet that restarts the process.
IP address collisions occur when the same IP address is used in the same IP
subnet by more than one device. Address collisions require administrative
actions on the DHCP server and/or the devices that collide.
Up to 32 interfaces (ports, LAGs, and/or VLAN) on the switch can be
configured with a static or dynamic IP address. The IP subnets to which these
IP addresses belong are known as directly connected/attached IP subnets.
The IP address assignment rules for the switch are as follows:
• If the IP address on the switch is changed, the switch issues gratuitous
ARP packets to the corresponding VLAN, to check IP address collisions.
• When a client must renew its lease, prior to its expiration date, a
DHCPREQUEST message is sent.
• A specific interface can have either a static IP address or a dynamic IP
address, but not both.Dell PowerConnect 55xx Systems User Guide 215
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define the switch as a DHCP client:
1 Click System > IP Addressing > DHCP IPv4 Interface in the tree view to
display the DHCP IPv4 Interface: Summary page.
Figure 9-16. DHCP IPv4 Interface: Summary216 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The previously-configured DHCP IPv4 interfaces are displayed.
2 To add an interface that can receive an IP address, click Add and select the
whether the interface is a port, LAG or VLAN in the Interface field.
Defining DHCP IPv4 Interfaces Using CLI Commands
The following table summarizes the CLI commands for setting fields in the
DHCP IPv4 Interface pages.
Table 9-21. DHCP IPv4 Interface CLI Commands
CLI Command Description
ip address dhcp
no ip address dhcp
Acquires an IP address on an Ethernet interface
from the Dynamic Host Configuration Protocol
(DHCP).
Use the no form of this command to release an
acquired IP address.Dell PowerConnect 55xx Systems User Guide 217
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring DHCP IPv4 Interfaces Using CLI
The following is a sample CLI script to configure a dynamic IPv4 address on
an interface and then to remove it:
IPv4 Static Routing
IPv4 static routes can be configured for IP addresses that are not on directly
connected networks. These are defined in the IPv4 Static Routing pages.
Table 9-22. Sample CLI Script to Configure IPv4 Dynamically on a VLAN
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# interface vlan 1 Enter VLAN mode for VLAN
1.
console(config)# no switchport Enable the port to work as an
IP interface (Layer 3 mode).
console(config-if)# ip address dhcp Use the DHCP protocol to
acquire the IP address.
console(config-if)# no ip address
dhcp
Remove the address (if
required).
Table 9-23. Sample CLI Script to Configure IPv4 Dynamically on a Port
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# interface vlan 1 Enter VLAN mode for VLAN
1.
console(config-if)# ip address dhcp Use the DHCP protocol to
acquire the IP address.
console(config-if)# no switchport Enable the port to work as an
IP interface (Layer 3 mode).
console(config-if)# no ip address
dhcp
Remove the address (if
required).218 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
When routing traffic, the next hop is determined according to the longest
prefix match (LPM algorithm). A destination IPv4 address may match
multiple routes in the IPv4 Static Route table. The switch uses the matched
route with the longest prefix match.
To add an IPv4 static route:
1 Click System > IP Addressing > IPv4 Static Routing in the tree view to
display the IPv4 Static Routing: Summary page.
Figure 9-17. IPv4 Static Routing: Summary
2 Click Add to add a destination, and enter the fields:
– Destination IP Prefix — Enter the destination IPv4 prefix. If all zeros
are entered, this represents a default route.
– Network Mask — Select the destination IPv4 mask.
– Prefix Length — Select the length of the destination IPv4 address
prefix. Dell PowerConnect 55xx Systems User Guide 219
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Next Hop — Enter the IP address to which the packet is forwarded on
the route to the destination address. This is typically the address of a
neighboring switch.
– Route Type — Select the route type. The possible options are:
• Reject — Rejects the route and stops routing to the destination
network via all gateways. This ensures that if a frame arrives with
the destination IP of this route, it is dropped.
• Remote — The route is a remote path.
– Metric (1-255) — Enter the administrative distance (cost) to the
destination.
Defining IPv4 Static Routing Using CLI Commands
The following table summarizes the CLI commands for configuring IPv4
static routing.
The following is an example of the CLI command:
Table 9-24. IPv4 Static Routing CLI Commands
CLI Command Description
ip routing
no ip routing
Enables IPv4 Routing.
Use the no format of the
command to disable IPv4
Routing.
ip route prefix {mask|prefixlength} ip-address-next-hop
[metric distance] [reject-route]
no ip route prefix {mask|prefixlength} [ip-address-next-hop]
Configures static routes.
Use the no form of this
command to remove static
routes.
show ip route Displays the current routing
table state.
console(config)# ip route prefix 192.168.1.1 /8
10.5.234.255 metric 3 reject-route220 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Two IP Networks on Two Different VLANS Using CLI
The following shows how to configure two IP networks on two different
VLANS using CLI:
To test this setup described in Figure 9-18:
1 Connect a host whose address is 1.1.1.2 to interface 1/0/1 (default route
1.1.1.1)
2 Connect a host whose address 2.1.1.2 to port 1/0/2 (default route 2.1.1.1)
3 Ping from 1.1.1.2 to 2.1.1.2 to verify the configuration
Table 9-25. Sample CLI Script to Configure Two IP Networks on Two Different VLANSs
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# vlan database Enter VLAN mode.
console(config-vlan)# vlan 100-150 Create VLANs number 100 to
150.
console(config-vlan)# exit Exit VLAN mode.
console(config)#interface gi1/0/1 Enter Interface mode for port
1 on unit 1.
console(config-if)# switchport access
vlan 100
Make port a member of
VLAN 100.
console(config-if)# ip address
1.1.1.1 255.255.255.0
Set the IP address with mask.
console(config-vlan)# exit Exit Interface mode for port.
console(config)#interface gi1/0/2 Enter Interface mode for port
2 on unit 1.
console(config-if)# switchport access
vlan 150
Make port a member of
VLAN 150.
console(config-if)# ip address
2.1.1.1 255.255.255.0
Set the IP address with mask.
console(config-vlan)# exit Exit Interface mode for port.Dell PowerConnect 55xx Systems User Guide 221
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Figure 9-18. IP Routing Setup
IPv6 Interfaces
The system supports IPv6-addressable hosts.
To define IPv6 interfaces:
1 Click System > IP Addressing > IPv6 Interface in the tree view to open
the IPv6 Interface: Summary page.
Figure 9-19. IPv6 Interface: Summary
PC 1.1.1.1
Switch
PC 2.1.1.1
VLAN 100
VLAN 150222 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Select an interface. The IPv6 addresses defined on the interface are
displayed. In addition to the fields described in the Add pages, the
following fields are displayed:
– ICMP Error Rate Limit Interval (0-2147483647) — Enter the
rate-limit interval for ICMPv6 error messages in milliseconds. The
value of this parameter together with the Bucket Size parameter
(below) determines how many ICMP error messages may be sent per
time interval, for example, a rate-limit interval of 100 ms and a bucket
size of 10 messages translates to 100 ICMP error messages per second.
– ICMP Error Rate Limit Bucket Size (1-200) — Enter the bucket size
for ICMPv6 error messages. The value of this parameter together with
the ICMP Error Rate Limit Interval parameter determines how many
ICMP error messages may be sent per time interval, for example, a
rate-limit interval of 100 ms and a bucket size of 10 messages
translates to 100 ICMP error messages per second.
3 To add a new IPv6 interface, click Add IPv6 Interface, and enter the fields:
– Interface — Select an IPv6 interface to be configured.
– Number of DAD Attempts — Enter the number of consecutive
neighbor solicitation messages that are sent on an interface while
Duplicate Address Detection (DAD) is performed on Unicast IPv6
addresses on this interface. New addresses remain in a tentative state
while duplicate address detection is performed. A field value of 0,
disables duplicate address detection processing on the specified
interface. A field value of 1, indicates a single transmission without
follow up transmissions.
– Autoconfiguration — Enable/disable stateless auto configuration of
IPv6 address assignment. When enabled, the router solicitation ND
procedure is initiated. This discovers a router in order to assign an IP
address to the interface, based on prefixes received with RA messages.
When auto configuration is disabled, no automatic assignment of
IPv6 global Unicast addresses is performed, and existing,
automatically-assigned IPv6 global Unicast addresses are removed
from the interface. Dell PowerConnect 55xx Systems User Guide 223
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Send ICMP Unreachable — Enable/disable transmission of ICMPv6
address Unreachable messages. When enabled, unreachable messages
are generated for any packet arriving on the interface with unassigned
TCP/UDP port.
4 To add an address to an IPv6 interface, click Add IPv6 Address, and enter
the fields for the selected interface:
– IPv6 Address Type — Check the means by which the IP address was
added to the interface. The possible options are:
• Link Local — The IP address is link local; non-routable and can
be used for communication on the same network only. A Link
Local address has a prefix of 'FE80'.
• Global Unicast — The IP address is a globally unique IPv6
Unicast address; visible and reachable from different subnets.
• Global Anycast — The IP address is a globally unique IPv6
Anycast address; visible and reachable from different subnets.
– IPv6 Address — Enter the IPv6 address assigned to the interface. The
address must be a valid IPv6 address, specified in hexadecimal using
16-bit values between colons. An example of an IPv6 address is
2031:0:130F:0:0:9C0:876A:130D and the compressed version is
represented as 2031:0:130F::9C0:876A:130D. Up to five IPv6
addresses (not including Link Local addresses) can be set per
interface, with the limitation of up to128 addresses per system.
– Prefix Length — For global Unicast or Anycast, enter the length of the
IPv6 prefix. The length is a decimal value that indicates how many of
the high-order contiguous bits of the address comprise the prefix (the
network portion of the address). The Prefix field is applicable only on a
static IPv6 address defined as a Global IPv6 address.
– EUI-64 — For global Unicast or Anycast, check to use the EUI-64
option.224 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining IPv6 Interfaces Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the IPv6 Interface pages.
Table 9-26. IPv6 Interfaces CLI Commands
CLI Command Description
ipv6 enable [no-autoconfig]
no ipv6 enable
Enables the IPv6 addressing mode on an
interface.
Use the no form of this command to
disable the IPv6 addressing mode on an
interface
ipv6 address autoconfig
no ipv6 address autoconfig
Enables automatic configuration of IPv6
addresses, using stateless auto
configuration on an interface. Addresses
are configured depending on the prefixes
received in Router Advertisement
messages.
Use the no form of this command to
disable address auto configuration on the
interface.
ipv6 icmp error-interval
milliseconds [bucketsize]
no ipv6 icmp error-interval
Configures the rate limit interval and
bucket size parameters for IPv6 Internet
Control Message Protocol (ICMP) error
messages.
Use the no form of this command to
return the interval to its default setting.
ipv6 address ipv6-
address/prefix-length [eui-64]
[anycast]
no ipv6 address [ipv6-
address/prefix-length] [eui-
64]
Configures an IPv6 address for an
interface.
Use the no form of this command to
remove the address from the interface.Dell PowerConnect 55xx Systems User Guide 225
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
ipv6 address ipv6-
address/prefix-length linklocal
no ipv6 address link-local
Configures an IPv6 link-local address for
an interface.
Use the no form of this command to
return to the default link local address on
the interface.
ipv6 unreachables
no ipv6 unreachables
Enables the generation of ICMP for IPv6
(ICMPv6) unreachable messages for
packets arriving on a specified interface.
Use the no form of this command to
prevent the generation of unreachable
messages.
ipv6 nd dad attempts attempt Configures the number of consecutive
neighbor solicitation messages that are
sent on an interface while Duplicate
Address Detection (DAD) is performed
on the unicast IPv6 addresses of the
interface.
show ipv6 interface
[[gigabitethernet|tengigabite
thernet] port-number|vlan
vlan-id|port-channel LAGnumber]
Displays the usability status of interfaces
configured for IPv6.
show ipv6 icmp error-interval Displays the IPv6 ICMP error
interval.
Table 9-26. IPv6 Interfaces CLI Commands (Continued)
CLI Command Description226 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is a sample script to configure IPv6 using CLI:
IPv6 Default Gateway
Use the IPv6 Default Gateway pages to configure and view the default IPv6
router addresses. This list contains routers that are candidates to become the
switch default router for non-local traffic. The switch randomly selects a
router from the list. The switch supports one static IPv6 default router.
Dynamic default routers are routers that have sent router advertisements to
the switch IPv6 interface.
When adding or deleting IP addresses, the following events occur:
• When removing an IP interface, all of its default gateway IP addresses are
removed.
• Dynamic IP addresses cannot be removed.
• An alert message is displayed after a user attempts to insert more than one
IP address.
• An alert message is displayed when attempting to insert a non-Link Local
type address.
Table 9-27. Sample CLI Script to Configure IPv6 on a Port
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# interface vlan 1 Enter VLAN mode for VLAN
1.
console(config-if)# ipv6 enable Enable IPv6 (dynamic).
console(config-if)# ipv6 address
5::1/64
Set the IPv6 address (static)Dell PowerConnect 55xx Systems User Guide 227
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To configure a router:
1 Click System > IP Addressing > IPv6 Default Gateway in the tree view to
display the IPv6 Default Gateway: Summary page.
Figure 9-20. IPv6 Default Gateway: Summary
The previously-defined routers are displayed with the following fields:
– IPv6 Default IPv6 Address — The router’s address.
– Interface — The interface on which the router is accessed.
– Type — The means by which the default gateway was configured. The
possible options are:
• Static — The default gateway is user-defined.
• Dynamic — The default gateway is dynamically configured
through router advertisement.228 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– State — The router’s status. The possible options are:
• Incomplete — Address resolution is in progress and the link-layer
address of the default gateway has not yet been determined.
• Reachable — The default gateway is known to have been
reachable recently (within tens of seconds ago).
• Stale — The default gateway is no longer known to be reachable
but until traffic is sent to the default gateway, no attempt is made
to verify its reachability.
• Delay — The default gateway is no longer known to be reachable,
and traffic has recently been sent to the default gateway. Rather
than probe the default gateway immediately, however, there is a
delay sending probes for a short while in order to give upper-layer
protocols a chance to provide reachability confirmation.
• Probe — The default gateway is no longer known to be reachable,
and Unicast Neighbor Solicitation probes are being sent to verify
reachability.
• Unreachable — No reachability confirmation was received.
2 To add an IPv6 default gateway, click Add, and enter the fields:
– IPv6 Address Type — Displays that the IP address was added to the
interface through a link local address.
– Link Local Interface — Displays the outgoing interface through
which the default gateway can be reached.
– Default Gateway IPv6 Address — Enter the Link Local IPv6 address
of the default gateway.
Defining IPv6 Default Gateway Parameters Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the IPv6 Default Gateway pages
.
Table 9-28. IPv6 Default Gateway CLI Commands
CLI Command Description
ipv6 default-gateway ipv6-
address
Defines an IPv6 default gateway.Dell PowerConnect 55xx Systems User Guide 229
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following are examples of these CLI command:
ISATAP Tunnel
To deliver IPv6 addresses in an IPv4 network, a tunneling process must be
defined that encapsulates IPv6 packets in IPv4 packets.
The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) is an IPv6
transition mechanism that is used to transmit IPv6 packets between
dual-stack nodes (nodes that can accept both IPv4 and IPv6 addresses) on top
of an IPv4 network.
When enabling ISATAP on a tunnel interface, an explicit IPv4 address is
configured as the tunnel source, or an automatic mode exists, where the
lowest IPv4 address is assigned to an IP interface. This source IPv4 address is
used for setting the tunnel interface identifier according to ISATAP
addressing conventions. When a tunnel interface is enabled for ISATAP, the
tunnel source must be set for the interface in order for the interface to
become active.
An ISATAP address is represented using the [64-bit prefix]:0:5EFE:w.x.y.z,
where 5EFE is the ISATAP identifier and w.x.y.z is a public or private IPv4
address. Thus, a Link Local address will be represented as FE80::5EFE:w.x.y.z
show ipv6 route Displays the current state of the IPv6 routing
table.
console(config)# ipv6 default-gateway fe80::abcd
console(config-if)# do show ipv6 route
Codes: L - Local, S - Static, I - ICMP, ND - Router
Advertisement
The number in the brackets is the metric.
L 3000::/64 is directly connected, VLAN 20 Lifetime Infinite
L 4003::/64 is directly connected, VLAN 20 Lifetime Infinite
L 5003::/64 is directly connected, VLAN 20 Lifetime Infinite
L 6003::/64 is directly connected, VLAN 20 Lifetime Infinite
Table 9-28. IPv6 Default Gateway CLI Commands (Continued)
CLI Command Description230 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
After the last IPv4 address is removed from the interface, the ISATAP IP
interface state becomes inactive and is represented as Down, however the
Admin state remains Enabled.
When defining tunneling, note the following:
• An IPv6 Link Local address is assigned to the ISATAP interface. The initial
IP address is assigned to the interface, and the interface state becomes
Active.
• If an ISATAP interface is active, the ISATAP router IPv4 address is resolved
via DNS by using ISATAP-to-IPv4 mapping. If the ISATAP DNS record is
not resolved, the ISATAP host name-to-address mapping is searched in the
host name cache.
• When an ISATAP router IPv4 address is not resolved via the DNS process,
the status of the ISATAP IP interface remains Active. The system does not
have a default gateway for ISATAP traffic until the DNS procedure is
resolved.
• In order for an ISATAP Tunnel to work properly over an IPv4 network, an
ISATAP router is must be set up.Dell PowerConnect 55xx Systems User Guide 231
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define an IPv6 ISATAP tunnel:
1 Click System > IP Addressing > IPv6 ISATAP Tunnel in the tree view to
display the ISATAP Tunnel page.
Figure 9-21. IPv6 ISATAP Tunnel
2 Enter the fields:
– ISATAP Status —Enable/disable the status of ISATAP on the device.
– IPv4 Address Type — Enter the source of the IPv4 address used by the
tunnel. The options are:
• Auto —Use the dynamic address.
• None —Disable the ISATAP tunnel
• Manual —Use the manual address assigned.
– IPv4 Address — Enter the local (source) IPv4 address of a tunnel
interface. 232 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Tunnel Router's Domain Name — Enter a specific automatic tunnel
router domain name.
– Domain Name Query Interval(10 - 3600) — Enter the interval
between DNS queries (before the IP address of the ISATAP router is
known) for the automatic tunnel router domain name.
– ISATAP Router Solicitation Interval(10 - 3600) — Enter the interval
between router solicitations messages when there is no active router.
– ISATAP Robustness (1 - 20) — Enter the number of DNS
Query/Router Solicitation refresh messages that the device sends per
second.
Select the Use Default option to use the default setting of a field.
Defining ISATAP Tunnel Parameters Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the ISATAP Tunnel pages.
Table 9-29. ISATAP Tunnel CLI Commands
CLI Command Description
interface tunnel number Enters tunnel interface configuration
mode.
tunnel mode ipv6ip {isatap}
no tunnel mode ipv6ip
Configures an IPv6 transition
mechanism global support mode.
Use the no form of this command to
remove an IPv6 transition mechanism.
tunnel isatap router router_name
no tunnel isatap router
Configures a global string that
represents a specific automatic tunnel
router domain name.
Use the no form of this command to
remove the string associated with the
router domain name and restore the
default configuration.
tunnel source {auto|ip-address
ipv4-address}
no tunnel source
Sets the local (source) IPv4 address of
a tunnel interface.
Use the no form of the command to
delete the tunnel local address.Dell PowerConnect 55xx Systems User Guide 233
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of a CLI script to create a tunnel:
tunnel isatap query-interval
seconds
no tunnel isatap query-interval
Configures the interval between DNS
Queries (before the IP address of the
ISATAP router is known) for the
automatic tunnel router domain
name.
Use the no form of this command to
restore the default configuration.
tunnel isatap solicitationinterval seconds
no tunnel isatap solicitationinterval
Configures the interval between
ISATAP router solicitations messages
(when there is no active ISATAP
router).
Use the no form of this command to
restore the default configuration.
tunnel isatap robustness number
no tunnel isatap robustness
Configures the number of DNS
Query/Router Solicitation refresh
messages that the device sends.
Use the no form of this command to
restore the default configuration.
show ipv6 tunnel Displays information on the ISATAP
tunnel.
Table 9-30. ISATAP Tunnel CLI Script
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# interface vlan 1 Enter Interface mode for
VLAN 1.
console(config-if)# ip address
10.5.225.40 /27
Configure an IP address with
prefix length of 27.
console(config-if)# ip default-gateway
10.5.225.33
console(config-if)#exit
Set the address of the default
gateway and exit Interface
mode.
Table 9-29. ISATAP Tunnel CLI Commands (Continued)
CLI Command Description234 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
console (config)# ip domain lookup Enable DNS lookup
console(config)# ip name-server
176.16.1.18
Define DNS server
console(config)# interface tunnel 1 Enter tunnel mode
console(config-tunnel)#tunnel mode
ipv6ip isatap
Enable tunnel.
console(config-tunnel)#tunnel source
auto
The system minimum IPv4
address will be used as the
source address for packets
sent on the tunnel interface.
console(config-tunnel)# do show ipv6
tunnel
Display tunnel configuration
Table 9-30. ISATAP Tunnel CLI Script
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 235
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IPv6 Neighbors
The Neighbors feature is similar in functionality to the IPv4 Address
Resolution Protocol (ARP) feature. It enables detecting Link Local addresses
within the same subnet, and includes a database for maintaining reachability
information about active neighbors.
The device supports a total of up to 64 neighbors, obtained statically or
dynamically.
When removing an IPv6 interface, all neighbors entered statically or learned
dynamically, are removed.
To add an IPv6 neighbor:
1 Click System > IP Addressing > IPv6 Neighbors in the tree view to
display the IPv6 Neighbors: Summary page.
Figure 9-22. IPv6 Neighbors: Summary236 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The previously-defined neighbors are displayed along with their states.
The possible states are:
– Incomplete — An address resolution is in progress, and the link-layer
address of the neighbor has not yet been determined.
– Reachable — The neighbor is known to have been reachable recently
(within tens of seconds).
– Stale — The neighbor is no longer known to be reachable, but until
traffic is sent to the neighbor, no attempt is made to verify its
reachability.
– Delay — The neighbor is no longer known to be reachable, and traffic
has recently been sent to the neighbor. Rather than probe the
neighbor immediately, however, there is a delay sending probes for a
short while, in order to give upper-layer protocols a chance to provide
reachability confirmation.
– Probe — The neighbor is no longer known to be reachable, and
Unicast Neighbor Solicitation probes are being sent to verify
reachability.
2 To clear the Neighbors table, select one of the following options:
– None — Does not clear any entries.
– Static Only — Clears the static entries.
– Dynamic Only — Clears the dynamic entries.
– All Dynamic and Static — Clears the static and dynamic address
entries.
3 To add a new IPv6 neighbor, click Add, and enter the fields:
– IPv6 Interface — Displays the interface on which IPv6 Interface is
defined.
– IPv6 Address — Enter the neighbor IPv6 address.
– MAC Address — Enter the MAC address assigned to the interface.Dell PowerConnect 55xx Systems User Guide 237
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
4 To modify or remove an IPv6 neighbor, click Edit, and enter the fields
described on the Add page.
5 If an entry for the specified IPv6 address already exists in the neighbor
discovery cache, as learned through the IPv6 neighbor discovery process,
you can convert the entry to a static entry. To do this, select Static in the
Type field.
Defining IPv6 Neighbors Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the IPv6 Neighbors pages.
Table 9-31. IPv6 Neighbors CLI Commands
CLI Command Description
ipv6 neighbor ipv6_addr
{[gigabitethernet|tengigabitethernet]
port-number|vlan vlan-id|port-channel
LAG-number]} mac_addr
no ipv6 neighbor ipv6_addr
{[gigabitethernet|tengigabitethernet]
port-number|vlan vlan-id|port-channel
LAG-number]}
Configures a static entry in
the IPv6 neighbor discovery
cache.
Use the no form of this
command to remove a static
IPv6 entry from the IPv6
neighbor discovery cache.
show ipv6 neighbors
{static|dynamic}[ipv6-address ipv6-
address] [mac-address mac-address]
[[gigabitethernet|tengigabitethernet]
port-number|vlan vlan-id|port-channel
LAG-number]]
Displays IPv6 neighbor
discovery cache information.
clear ipv6 neighbors Deletes all entries in the IPv6
neighbor discovery cache.238 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console# config
console(config)# ipv6 neighbor 3000::a31b vlan 1
001b.3f9c.84ea
console# show ipv6 neighbors dynamic
Interface IPv6 Address HW Address State Router
--------- ------------ ---------- ----- -----
VLAN 1 3000::a31b 0001b.3f9c.84ea Reachable YesDell PowerConnect 55xx Systems User Guide 239
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IPv6 Routes Table
The IPv6 Routes Table describes how to reach IPv6 destinations. The routing
table is used to determine the next-hop address and the interface used for
forwarding.
Each dynamic entry also has an associated invalidation timer value (extracted
from Router Advertisements). This timer is used to delete entries that are no
longer advertised.
To view IPv6 destinations and how they are reached:
• Click System > IP Addressing > IPv6 Routes Table in the tree view to
display the IPv6 Routes Table page.
Figure 9-23. IPv6 Routes Table
The following is displayed for each IP address:
– IPv6 Address — The destination IPv6 address.240 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Prefix Length — The length of the IPv6 prefix. This field is applicable
only when the destination address is defined as a global IPv6 address.
– Interface — The interface that is used to forward the packet. Interface
refers to any Port, LAG or VLAN.
– Next Hop — The address to which the packet is forwarded on the
route to the Destination address (typically the address of a
neighboring router). This can be either a Link Local or Global IPv6
address.
– Metric — The value used for comparing this route to other routes
with the same destination in the IPv6 route table. This is an
administrative distance with the range of 0-255.
– Life-Time — The timeout interval of the route if no activity takes
place. Infinite means the address is never deleted.
– RouteType — Specifies whether the destination is directly-attached
and the means by which the entry was learned. The possible options
are:
• Local — A directly-connected route entry.
• Static — Manually configured route, supported only for default
gateway, learned through the Neighbor Discover (ND) process.
• ICMP — The route was learned through ICMP Redirect
messages, sent by the router.
• ND — Route was learned by the ND protocol from Router
Advertisement messages.
Viewing IPv6 Routes Table Parameters Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the IPv6 Routes Table page.
Table 9-32. IPv6 Routes Table CLI Commands
CLI Command Description
show ipv6 route Displays the current state of the ipv6
routing table.Dell PowerConnect 55xx Systems User Guide 241
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console> show ipv6 route
Codes: L - Local, S - Static, I - ICMP, ND - Router
Advertisement
The number in the brackets is the metric.
S::/0 via fe80::77 [0] VLAN 1 Lifetime Infinite
ND::/0 via fe80::200:cff:fe4a:dfa8 [0] VLAN 1 Lifetime
1784 sec
L 2001::/64 is directly connected, g2 Lifetime Infinite
L 2002:1:1:1::/64 is directly connected, VLAN 1 Lifetime
2147467 sec
L 3001::/64 is directly connected, VLAN 1 Lifetime
Infinite
L 4004::/64 is directly connected, VLAN 1 Lifetime
Infinite
L 6001::/64 is directly connected, g2 Lifetime Infinite242 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Domain Name System
The Domain Name System (DNS) converts user-defined domain names into
IP addresses. Each time a domain name is assigned, the DNS service
translates the name into a numeric IP address, for example,
www.ipexample.com is translated into 192.87.56.2. DNS servers maintain
domain name databases and their corresponding IP addresses.
To add a DNS server and specify the active DNS server:
1 Click System > IP Addressing > Domain Name System in the tree view
to display the Domain Name System: Summary page.
Figure 9-24. Domain Name System: Summary
The list of previously-defined DNS servers is displayed.
2 To enable mapping of host names into IP addresses through a DNS server,
select DNS Status.
3 To activate one of the currently-defined DNS servers, enable Active Server.Dell PowerConnect 55xx Systems User Guide 243
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
4 To add a DNS server, click Add, and enter the fields:
– Supported IP Format — Select whether the IPv4 or IPv6 format is
supported.
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
– DNS Server — Enter the IP address of the DNS server being added.
– DNS Server Currently Active — Displays the DNS server that is
currently active.
– Set DNS Server Active — Check to activate the selected DNS server.
Configuring DNS Servers Using the CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the Domain Name System pages.
Table 9-33. DNS CLI Commands
CLI Command Description
ip domain lookup Enables DNS system for translating host
names to IP addresses.
ip name-server {server1-
ipv4-address|server1-ipv6-
address} [server-address2
…server-address8]
no ip name-server [serveraddress … server-address8]
Sets the available name servers. Up to eight
name servers can be set.
The no form of the command removes a
name server.244 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
clear host Deletes entries from the host name-toaddress cache.
clear host dhcp {name|*} Deletes entries from the host name-toaddress mapping received from DHCP.
show hosts Displays the default domain name, the list
of name server hosts, the static and the
cached list of host names and addresses
console (config)# ip domain lookup
console(config)# ip name-server 176.16.1.18
Table 9-33. DNS CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 245
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Default Domain Names
A default domain name is used when an IP address cannot be mapped to a
known domain name. This domain name is applied to all unqualified host
names.
To define the default domain name:
1 Click System > IP Addressing > Default Domain Name to display the
Default Domain Name page.
Figure 9-25. Default Domain Name
If there is a currently-defined default domain name, it is displayed.
2 Enter the Default Domain Name (1 - 160 Characters).
Its Type is displayed, and has one of the following options:
– Dynamic — The IP address was created dynamically.
– Static — The IP address is a static IP address.246 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Default Domain Names Using the CLI Commands
The following table summarizes the CLI commands for configuring the
default domain name:
The following is an example of the CLI commands:
Table 9-34. Default Domain Name CLI Commands
CLI Command Description
ip domain-name name
no ip domain-name
Defines a default domain name that the software uses
to complete unqualified host names.
The no form of the command disables the use of the
Domain Name System (DNS).
console(config)# ip domain-name dell.com Dell PowerConnect 55xx Systems User Guide 247
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Host Name Mapping
Host names can be dynamically mapped to IP addresses through the Domain
Name System pages, or statically through the Host Name Mapping page.
To assign IP addresses to static host names.
1 Click System > IP Addressing > Host Name Mapping in the tree view to
display the Host Name Mapping: Summary page.
Figure 9-26. Host Name Mapping: Summary
The currently-defined host names are displayed.
2 Click Add to add a new host name. Up to four IP addresses can be added.
3 For each IP address, enter the fields:
– Supported IP Format — Select whether the IPv4 or IPv6 format is
supported. 248 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
• Host Name (1-160 Characters) — Enter the host name to be
associated with the IP address entered below.
• IP Address — Enter the IP address of the domain. Four addresses can
be entered.
4 Click Remove to delete a host name. All addresses for this host name are
deleted at the same time.
Mapping IP Addresses to Domain Host Names Using the CLI Commands
The following table summarizes the CLI commands for mapping domain
host names to IP addresses.
Table 9-35. Domain Host Name CLI Commands
CLI Command Description
ip host name address
[address2 address3
address4]
Defines the static host name-to-address mapping in
the host cache
no ip host name Removes the name-to-address mapping.
clear host {name|*} Deletes entries from the host name-to-address cache.
show hosts [name] Displays the default domain name, list of name server
hosts, the static and the cached list of host names and
addresses.Dell PowerConnect 55xx Systems User Guide 249
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
ARP
The Address Resolution Protocol (ARP) converts IP addresses into physical
MAC addresses. ARP enables a host to communicate with other hosts when
their IP addresses are known.
To add an IP/MAC address mapping:
1 Click System > IP Addressing > ARP in the tree view to display the ARP:
Summary page.
Figure 9-27. ARP: Summary
console(config)# ip host accounting.abc.com 176.10.23.1250 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The entries in the table are displayed.
2 Enter the parameters:
• ARP Entry Age Out (1 - 40000000) — Enter the amount of time in
seconds that can pass between ARP requests for this address. After
this period, the entry is deleted from the table.
• Clear ARP Table Entries — Select the type of ARP entries that are
cleared on all devices. The possible options are:
• None — ARP entries are not cleared.
• All — All ARP entries are cleared.
• Dynamic — Only learned ARP entries are cleared.
• Static — Only static ARP entries are cleared.
3 To add a mapping, click Add, and enter the fields:
– Interface — Select an interface to be associated with the addresses.
– IP Address — Enter the station IP address, which is associated with
the MAC address filled in below.
– MAC Address — Enter the station MAC address, which is associated
in the ARP table with the IP address.
4 To change the status of a mapping from static to dynamic or vice versa,
click Edit and enter the field:
– Status — Select the entry’s status. The possible options are:
• Static — The entry was statically entered.
• Dynamic — The entry was dynamically learned. Dell PowerConnect 55xx Systems User Guide 251
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring ARP Using the CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the ARP pages.
The following is an example of the CLI commands:
Table 9-36. ARP CLI Commands
CLI Command Description
arp ip_addr mac_addr
{[gigabitethernet|tengigabit
ethernet] port-number|vlan
vlan-id|port-channel LAGnumber}
Adds a permanent entry in the ARP
cache.
no arp ip-address Removes an ARP entry from the ARP
Table.
arp timeout seconds Configures how long an entry remains in
the ARP cache. This command can be
used in Global Configuration mode for all
interfaces, or in Interface Configuration
mode for a specific interface.
clear arp-cache Deletes all dynamic entries from the ARP
cache
show arp Displays entries in the ARP Table.
show arp configuration Displays the global and interface
configuration of the ARP protocol
console(config)# arp 198.133.219.232 00-00-0c-40-0f-bc
console(config)# arp timeout 12000
console(config)# exit
console# show arp
ARP timeout: 12000 Seconds
Interface IP Address HW Address Status
--------- ---------- ---------- ------
gi1/0/11 10.7.1.102 00:10:B5:04:DB:4B dynamic
gi1/0/12 10.7.1.135 00:50:22:00:2A:A4 static252 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
UDP Relay
Switches do not typically route IP Broadcast packets between IP subnets.
However, if configured, the switch can relay specific UDP Broadcast packets
received from its IPv4 interfaces to specific destination IP addresses.
To configure the relaying of UDP packets received from a specific IPv4
interface with a destination UDP port:
1 Click System > IP Addressing > UDP Relay in the tree view to display
the UDP Relay: Summary page.
Figure 9-28. UDP Relay: SummaryDell PowerConnect 55xx Systems User Guide 253
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The UDP relays are displayed.
2 To add a UDP relay, click Add, and enter the fields:
– Source IP Address — Select the source IP address to where the switch
is to relay UDP Broadcast packets, based on a configured UDP
destination port. The interface must be one of the IPv4 interfaces
configured on the switch. Select All for all addresses.
– UDP Port (1 - 65535) — Check Default Services to select all of the
following default ports:
• IEN-116 Name Service (port 42)
• DNS (port 53)
• NetBIOS Name Server (port 137)
• NetBIOS Datagram Server (port 138)
• TACACS Server (port 49)
• Time Service (port 37)
If Default Services are not selected, check the text box and enter a
UDP port.
– Destination IP Address — Enter the IP address that receives the UDP
packet relays. If this field is 0.0.0.0, UDP packets are discarded. If this
field is 255.255.255.255, UDP packets are flooded to all IP interfaces.
Configuring UDP Relay Using the CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the UDP Relay pages.
Table 9-37. UDP Relay CLI Commands
CLI Command Description
ip helper-address {ipinterface|all} address [udpport-list]
no ip helper-address {ipinterface|all} address
Enables the forwarding of User
Datagram Protocol (UDP) broadcast
packets received on an interface to a
specific (helper) address.
Use the no form of this command to
disable the forwarding of broadcast
packets to a specific (helper) address.254 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console (config)# ip helper-address all 172.16.9.9 49 53
console (config)# do show ip helper-address
Interface Helper Address UDP Ports
----------- --------------- --------------------------
All 172.16.9.9 49,53Dell PowerConnect 55xx Systems User Guide 255
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Diagnostics
This section describes how to perform cable tests on copper and fiber optic
cables.
It contains the following sections:
• Integrated Cable Test
• Optical Transceiver Diagnostics256 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Integrated Cable Test
Time Domain Reflectometry (TDR) technology is used to test the quality
and characteristics of a copper cable attached to a port. Cables up to 120
meters long can be tested. Cables can only be tested when the ports are in the
down state, with the exception of Approximated Cable Length test.
This test can only be performed when the port is up and operating at 1 Gbps.
To perform a cable test and view the results:
1 Click System > Diagnostics > Integrated Cable Test: Summary in the
tree view to display the Integrated Cable Test: Summary page.
Figure 9-29. Integrated Cable Test: Summary
2 Select a unit in the stack in the Unit ID field. Results from previously-run
tests on that unit are displayed.
3 Ensure that both ends of the copper cable are connected to a device. Dell PowerConnect 55xx Systems User Guide 257
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
4 Ensure that the cable is connected to tested port. Go to the Test tab.
5 Click Test Now. The copper cable and Approximate Cable Length tests are
performed, and the following test results are displayed:
– Test Result — Displays the cable test results. The possible options are:
• No Cable — There is no cable connected to the port.
• Open Cable — The cable is connected on only one side.
• Short Cable — A short has occurred in the cable.
• OK — The cable passed the test.
– Cable Fault Distance — Displays the distance from the port where
the cable error occurred.
– Last Update — Displays the last time the port was tested.
– Approximate Cable Length — Displays the approximate cable length.
Performing Integrated Cable Tests Using CLI Commands
The following table contains the CLI commands for performing integrated
cable tests.
Table 9-38. Integrated Cable Test CLI Commands
CLI Command Description
test cable-diagnostics tdr
interface[gigabitethernet|tengigab
itethernet] port-number
Performs VCT tests.
show cable-diagnostics tdr
interface[gigabitethernet|tengigab
itethernet] port-number
Shows results of last VCT tests on
ports.
show cable-diagnostics cablelength interface
[gigabitethernet|tengigabitetherne
t] port-number
Displays the estimated copper
cable length attached to a port.258 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
Optical Transceiver Diagnostics
The Optical Transceiver Diagnostics page displays the operating conditions
reported by the SFP (Small Form-factor Pluggable) transceiver. Some
information might not be available for SFPs that do not support the digital
diagnostic monitoring standard SFF-8472.
The following is the list of the compatible SFPs:
• SFP:
– X3366 — 1000Base-SX, Finisar FTLF8519P2BNL
– U3650 — 1000Base-LX, Finisar FTRJ1319P1BTL
• SFP+:
– N743D — SR, Finisar FTLX8571D3BCL
– T307D — LR, Finisar FTLX1471D3BCL
– C043H — LRM, Avago AFBR-707SDZ-D1
– N198M — LRM, Finisar FTLX1371D3BCL
console> enable
console# test cable-diagnostics tdr gi1/0/3
Cable is open at 100 meters.
console# show cable-diagnostics cable-length interface
gi2/0/5
Port Length [meters]
------- ----------------
gi2/0/5 < 50Dell PowerConnect 55xx Systems User Guide 259
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To view the results of optical fiber tests:
• Click System > Diagnostics > Optical Transceiver Diagnostics in the
tree view to display the Optical Transceiver Diagnostics page.
Figure 9-30. Optical Transceiver Diagnostics
The following fields are displayed for the selected unit:
– Port — The port number on which the cable was tested.
– Temperature — The temperature (C) at which the cable is operating.
– Voltage — The voltage at which the cable is operating.
– Current — The current at which the cable is operating.
– Output Power — The rate at which output power is transmitted.
– Input Power — The rate at which input power is transmitted.
– Transmitter Fault — A fault occurred during transmission.
– Loss of Signal — A signal loss occurred in the cable.
– Data Ready — The transceiver has achieved power up, and data is
ready.260 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Performing Fiber Optic Cable Tests Using CLI Commands
The following table contains the CLI command for performing fiber optic
cable tests.
The following is an example of the CLI command:
Table 9-39. Fiber Optic Cable Test CLI Commands
CLI Command Description
show fiber-ports opticaltransceiver [interface
[gigabitethernet|tengigabitethe
rnet] port-number] [detailed]
Displays the optical transceiver
diagnostics.
console# show fiber-ports optical-transceiver detailed
Port Temp
[C]
Voltage Current
[aM]
Output
[mWat]
Input
[mWa]
POWER
[mWa]
LOS
------- ---- ------- ---- ---- ---- ---- ---
gi1/0/1 48 5.15 50 1.789 1.789 No No
gi1/0/2 43 5.15 10 1.789 1.789 No NoDell PowerConnect 55xx Systems User Guide 261
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Management Security
This section describes the pages used to manage device security.
It contains the following topics:
• Access Profiles
• Profile Rules
• Authentication Profiles
• Select Authentication
• Active Users
• Local User Database
• Line Passwords
• Enable Password
• TACACS+
• Password Management
• RADIUS
Access Profiles
Access to management functions may be limited to users identified by:
• Ingress interface (Port, LAG, or VLAN)
• Source IP address
• Source IP subnet
Management access may be separately defined for the following types of
management access methods:
• Telnet (CLI over Telnet sessions)
• Secure Telnet
• Web (HTTP)
• Secure Web (HTTPS, Using SSL)
• SNMP 262 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
This means, for example, that the set of managers allowed via Telnet may be
different than the set of Web-based managers which is, in turn, may be
different than the set of secure-web based managers, and so on.
A specific management access method may be completely disabled by
denying all user access to it (e.g. denying all users access to CLI/Telnet
management effectively disables CLI/Telnet as an available management
interface to the system).
By default, management access to the system, through all methods, is
enabled over all interfaces.
NOTE: If you enable management access through a physical port, all VLANs and
IP interfaces on that port will be acceptable management traffic sources. If you
enable management access through a VLAN, all ports and IP interfaces on that
VLAN will be acceptable. If specific IP address(es) are specified, only traffic from
the specified IP addresses on the appropriate ports will be accepted.
Access Profiles Rules
Each management access profile is composed of at least one rule, which acts
as a filter, and defines the device management method, interface type, source
IP address, network mask, and the device management access action.
Users can be blocked or permitted management access.
Rule priority sets the order in which the rules are implemented. Assigning an
access profile to an interface denies access via other interfaces. If an access
profile is not assigned to any interface, the device can be accessed by all
interfaces.
A total of 256 rules can be defined for all Management Access profiles.
To add rules to existing access profiles, see "Profile Rules" on page 266.Dell PowerConnect 55xx Systems User Guide 263
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Creating an Access Profile
To define an access profile with a single rule:
1 Click System > Management Security > Access Profiles in the tree view
to display the Access Profiles: Summary page.
Figure 9-31. Access Profiles: Summary
The currently-defined access profiles are displayed.
2 To activate an access profile, select it in the Active Access Profile field.
If you select Console Only, active management of the device can only be
performed using the console connection. This profile cannot be removed.
3 To add a new profile, click Add, and enter the fields:
– Access Profile Name (1-32 Characters) — Enter a name for the access
profile. 264 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Rule Priority (1-65535) — Enter the rule priority. Rules are applied to
packets according to their priority. These can be viewed in the Profile
Rules: Summary page.
– Management Method — Select the management method to which
the access profile is applied. Users using this management method are
authenticated using this access profile. The possible options are:
• All — The access profile is applied to all management methods.
• Telnet — The access profile is applied to Telnet users.
• Secure Telnet (SSH) — The access profile is applied to SSH
users.
• HTTP — The access profile is applied to HTTP users.
• Secure HTTP (HTTPS) — The access profile is applied to
HTTPS users.
• SNMP — The access profile is applied to SNMP users.
– Interface — Check the fields and select the interface type to which
the rule applies.
– Enable Source IP Address — Check this parameter to restrict access,
based on the source IP address. When this field is not selected, the
source IP address cannot be entered into a configured rule.
– Supported IP Format — Select whether the IPv4 or IPv6 format is
supported for the source IP addresses.
– Source IP Address — Enter the interface source IP address for which
the rule applies. This is an optional field and indicates that the rule is
valid for a subnetwork.
– Network Mask — Enter the IP subnetwork mask if Supported IP
Format is IPv4.
– Prefix Length — Enter the number of bits that comprise the source IP
address prefix, or the network mask of the source IP address.
– Action — Select whether to permit or deny management access to the
defined interface. The possible options are:
• Permit — Permits access to the device.
• Deny — Denies access to the device. Dell PowerConnect 55xx Systems User Guide 265
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Access Profiles Using CLI Commands
The following table contains the CLI command for defining an access profile,
without its rules. The CLI commands for defining the rules are described in
"Defining Access Profile Rules Using CLI Commands" on page 267.
The following is an example of the CLI commands:
Table 9-40. Access Profile CLI Commands
CLI Command Description
management access-list
name
no management access-list
name
Defines an access-list for management.
Use the no form of this command to delete an
access list.
console(config)# management access-list mlist
console(config-macl)#266 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Profile Rules
If an access profile already exists, meaning that a single rule has been defined
on it, use the Profile Rules pages to add additional rules to it.
To add a rule to a management access profiles:
1 Click System > Management Security > Profile Rules in the tree view to
display the Profile Rules: Summary page.
Figure 9-32. Profile Rules: Summary
2 Select an access profile name. Its rules are displayed in the order that they
will be implemented.
3 To add a rule to the selected management access profile, click Add.
4 Select a management access profile.
5 Complete the fields that are defined in Access Profiles pages.Dell PowerConnect 55xx Systems User Guide 267
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Access Profile Rules Using CLI Commands
The following table summarizes the CLI commands for adding rules to access
profiles.
Table 9-41. Access Profiles CLI Commands
CLI Command Description
permit[[gigabitethernet|tengigab
itethernet port-number]|vlan
vlan-id|port-channel LAG-number]
[service service]
Sets port permit conditions for the
management access list.
permit ip-source {ipv4-
address|ipv6-address|prefixlength} [mask mask|prefixlength]
[[gigabitethernet|tengigabitethe
rnet][port-number|vlan vlanid|port-channel LAG-number]
[service service]
Sets port permitting conditions for
the management access list, and the
selected management method.
deny
[[gigabitethernet|tengigabitethe
rnet] port-number|vlan vlanid|port-channel LAG-number]
[service service]
Sets port denying conditions for the
management access list, and the
selected management method.
deny ip-source {ipv4-
address|ipv6-address|prefixlength} [mask mask|prefixlength]
[[gigabitethernet|tengigabitethe
rnet] port-number|vlan vlanid|port-channel LAG-number]
[service service]
Sets port denying conditions for the
management access list, and the
selected management method.
management access-class
{console-only|name}
no management access-class
Defines which access-list is used as
the active management connections.
Use the no form of this command to
disable management connection
restrictions.268 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show management access-list
[name]
Displays the active management
access-lists.
show management access-class Displays information about
management access-class.
console(config)# management access-list mlist
console(config-macl)# permit gi1/0/1
console(config-macl)# permit gi1/0/2
console(config-macl)# deny gi1/0/3
console(config-macl)# deny gi1/0/4
console(config-macl)# exit
console(config)# management access-class mlist
console(config)# exit
console# show management access-list
mlist
-----
permit gi1/0/1
permit gi1/0/2
deny gi1/0/3
deny gi1/0/4
! (Note: all other access implicitly denied)
console# show management access-class
Management access-class is enabled, using access list
mlist
Table 9-41. Access Profiles CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 269
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Authentication Profiles
In addition to access profiles, you can configure authentication for
management access methods, such as SSH, console, Telnet, HTTP, and
HTTPS.
User authentication can occur:
• Locally
• Via an external server, such as a TACACS+ or a RADIUS server
User authentication occurs in the order that the methods are selected, for
example, if both the Local and RADIUS options are selected, the user is
authenticated first locally. If the local user database is empty, the user is
authenticated via the RADIUS server.
If an error occurs during the authentication, the next selected method is
used.
If an authentication method fails, or the user has an insufficient privilege
level, the user is denied access to the switch. The switch then stops, does not
continue, and does not attempt to use the next authentication method.
If a privilege level is redefined, the user must also be re-defined.
User authentication can also be set to None, in which case no authentication
is performed.
The process of configuring authentication for management access methods is
divided into the following stages:
• Create an authentication profile, as described below
• Assign an authentication profile to a management method, as described in
"Select Authentication" on page 272270 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To create an authentication profile:
1 Click System > Management Security > Authentication Profiles in the
tree view to display the Authentication Profiles: Summary page.
Figure 9-33. Authentication Profiles: Summary
All currently-defined authentication profiles are displayed.
2 Click Add to add a new authentication profile, and enter the fields:
– Profile Name (1-12 Characters) — Enter the name of the new
authentication profile. Profile names cannot include blank spaces.
– Authentication Method: Optional Methods — Select a user
authentication methods that can be assigned to this authentication
profile. The possible options are:
• Line — The line password is used for user authentication
(defined in "Line Passwords" on page 279).Dell PowerConnect 55xx Systems User Guide 271
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Enable — The enable (encrypted) password is used for
authentication (defined in "Enable Password" on page 281).
• Local — The user authentication is performed by the device,
which checks the user name and password for authentication.
• RADIUS — The user authentication is performed by the
RADIUS server. For more information, see "RADIUS" on
page 291.
• TACACS+ — The user authentication is performed by the
TACACS+ server. For more information, see "TACACS+" on
page 282.
• None — No user authentication occurs.
Select a method by highlighting it in the Optional Methods list, and
clicking on the right arrow to move it to the Selected Methods list.
Configuring an Authentication Profile Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Authentication Profiles pages.
The following is an example of the CLI commands:
Table 9-42. Authentication Profile CLI Commands
CLI Command Description
aaa authentication login
{default|list-name} method1
[method2]
no aaa authentication login
{default|list-name}
Configures login authentication.
Use the no form of the command to
remove a login authentication profile.
console(config)# aaa authentication login default radius
local enable none272 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Select Authentication
After Authentication Profiles are defined, the Authentication Profiles can be
assigned to Management Access methods, for example, console users can be
authenticated by Authentication Profile 1, while Telnet users can be
authenticated by Authentication Profile 2.
To assign an authentication profile to a management access method:
1 Click System > Management Security > Select Authentication in the
tree view to display the Select Authentication page.
Figure 9-34. Select Authentication
2 For the Console, Telnet and Secure Telnet (SSH) types of users, select
either the default authentication profile or one of the previously-defined
authentication profiles.Dell PowerConnect 55xx Systems User Guide 273
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 For Secure HTTP and HTTP types of users, select one or all of the
Optional Methods and click the right-arrow to move them to the Selected
Methods. The options are:
– Local — Authentication occurs locally.
– None — No authentication method is used for access.
– RADIUS — Authentication occurs at the RADIUS server.
– TACACS+ — Authentication occurs at the TACACS+ server.
Assigning Access Authentication Profiles Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Select Authentication page.
Table 9-43. Select Authentication CLI Commands
CLI Command Description
aaa authentication enable {default|listname} method [method2 ...]
no aaa authentication enable {default|listname}
Indicates the authentication
method list when accessing a
higher privilege level from a
remote Telnet, Console or SSH.
enable authentication [default|list-name]
no enable authentication
Specifies the authentication
method for accessing a higher
privilege level from a remote
Telnet or console.
Use the no form of this
command to restore the default
authentication method
login authentication [default|list-name] Indicates the login
authentication method list for a
remote Telnet, Console or SSH.
ip http authentication aaa loginauthentication method1 [method2]
no ip http authentication aaa loginauthentication
Indicates authentication
methods for HTTP or HTTPS
servers.
show authentication methods Displays information about the
authentication methods.274 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands that sets authentication
for the console using the default method list that was previously-defined:
The following is an example of the CLI commands that creates an
authentication method list for http server access (RADIUS and local):
console(config)#line console
console(config-line)# enable authentication default
console(config-line)# login authentication default
console(config-line)# exit
console(config)# ip http authentication aaa loginauthentication radius local
console(config)# exitDell PowerConnect 55xx Systems User Guide 275
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Active Users
To view active users on the device:
• Click System > Management Security > Active Users in the tree view to
display the Active Users page.
Figure 9-35. Active Users
The following fields are displayed for all active users:
– Name — Active users logged into the device.
– Protocol — The management method by which the user is connected
to the device.
– Location — The user’s IP address.276 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Displaying Active Users Using CLI Commands
The following table summarizes the CLI commands for viewing active users
connected to the device.
The following example shows an example of the CLI command:
Table 9-44. Active Users CLI Commands
CLI Command Description
show users Displays information about active users.
console> show users
Username Protocol Location
-------- -------- ---------
Bob Serial
John SSH 172.16.0.1
Robert HTTP 172.16.0.8
Betty Telnet 172.16.1.7Dell PowerConnect 55xx Systems User Guide 277
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Local User Database
Use the Local User Database pages to define users, passwords and access
levels.
To add a new user:
1 Click System > Management Security > Local User Database in the tree
view to display the Local User Database: Summary page.
Figure 9-36. Local User Database: Summary
All users are displayed even if they have been suspended.
If a user has been suspended, it can be restored here by selecting the
Reactivate Suspended User field.
2 To add a user, click Add, and enter the fields:
– User Name (1-20 characters) — Enter the username of the user.278 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Access Level — Select a user access level. The lowest user access level
is 1 and 15 is the highest user access level. Users with access level 15
are Privileged Users, and only they can access and use the switch
administrator.
– Password (8-64 characters) — Enter the password of the user.
– Confirm Password — Confirm the password of the user.
The following fields are displayed:
• Expiry Date — The expiration date of the user-defined password.
• Lockout Status — Specifies whether the user currently has access
(status Usable), or whether the user is locked out due to too many
failed authentication attempts since the user last logged in
successfully (status Locked).
• Reactivate Suspended User — Check to reactivate the specified
user’s access rights. Access rights can be suspended after
unsuccessfully attempting to login.
Configuring Local Users Using CLI Commands
The following table summarizes the CLI commands for configuring local
users.
Table 9-45. Local User CLI Commands
CLI Command Description
username name {nopassword|password
password|password encrypted
encrypted-password}
username name [privilege-level]
no username name
Establishes a username-based
authentication system.
Use the no form to remove a user
name.
set username name active Reactivates a suspended user’s
access rights.
show user accounts Displays users information.Dell PowerConnect 55xx Systems User Guide 279
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
Line Passwords
To add a line password for Console, Telnet, and Secure-Telnet users:
1 Click System > Management Security > Line Passwords in the tree view
to display the Line Password page.
Figure 9-37. Line Password
2 Enter the fields for each type of user, separately:
– Password (0 - 159 Characters) — Enter the line password for accessing
the device.
– Confirm Password — Confirm the line password.
console(config)# username bob password lee privilege 15
console# set username bob active280 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Console/Telnet/Secure Telnet Line Aging (1-365) — Check to set the
amount of time in days that elapses before a line password is aged out.
Enter the number of days after which the password expires.
– Expiry Date — Displays the expiration date of the line password.
– Lockout Status — Displays whether the user currently has access
(status Usable), or whether the user is locked out due to too many
failed authentication attempts since the user last logged in
successfully (status Locked).
– Reactivate Locked Line — Check to reactivate the line password for a
Console/Telnet/Secure Telnet session. Access rights can be suspended
after a number of unsuccessful attempts to log in.
Assigning Line Passwords Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Line Password page
.
The following is an example of the CLI commands:
Table 9-46. Line Password CLI Commands
CLI Command Description
line {console|telnet|ssh} Identifies a specific line for configuration
and enters the Line Configuration
command mode.
password password
[encrypted]
no password
Sets a password on a line.
Use the no form of this command to
remove the password.
console(config)# line console
console(config-line)# password dellDell PowerConnect 55xx Systems User Guide 281
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Enable Password
To set a local password to control access to Normal and Privilege levels
activities.
1 Click System > Management Security > Enable Passwords in the tree
view to display the Enable Password page.
Figure 9-38. Enable Password
2 Enter the fields:
– Select Enable Access Level — Select the access level to associate with
the enable password. The lowest user access level is 1 and 15 is the
highest user access level. Users with access level 15 are Privileged
Users, and only they can access and use the OpenManage Switch
Administrator.
– Password (0-159 characters) — Enter the enable password.
– Confirm Password — Confirm the password.282 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Expiry Date — If Aging is selected, displays the expiration date of the
enable password.
– Lockout Status — Displays the number of failed authentication
attempts since the user last logged in successfully (if the Enable
Login Attempts checkbox is selected in the Password Management
page.) Specifies LOCKOUT, when the user account is locked.
– Reactivate Suspended User — Check to reactivate the specified user’s
access rights. Access rights can be suspended after unsuccessfully
attempting to login.
Assigning Enable Passwords Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Enable Password page.
The following is an example of the CLI commands:
TACACS+
The device can act as a Terminal Access Controller Access Control System
(TACACS+) client. TACACS+ provides centralized validation of users
accessing the device, while still retaining consistency with RADIUS and other
authentication processes.
TACACS+ provides the following services:
• Authentication — Provides authentication during login and via user
names and user-defined passwords.
• Authorization — Performed at login after authentication. The TACACS+
server checks the privileges of the authenticated user.
Table 9-47. Enable Password CLI Commands
CLI Command Description
enable password [level
level] d [encrypted]
no enable password [level
level]
Sets a local password to control access to
user and privilege levels.
Use the no form of this command to
remove the password requirement.
console(config)# enable password level 15 secretDell PowerConnect 55xx Systems User Guide 283
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The TACACS+ protocol ensures network integrity through encrypted
protocol exchanges between the device and TACACS+ server.
To configure TACACS+ servers:
1 Click System > Management Security > TACACS+ in the tree view to
display the TACACS+: Summary page.
Figure 9-39. TACACS+: Summary
The list of currently-defined TACACS+ servers is displayed. The
parameters for each server is displayed, along with its connection status.
2 Enter the default parameters for TACACS+ servers. These values are used
unless values are added in the TACACS+ Add or Edit pages.
– Source IP Address — The device IP address used for the TACACS+
session between the device and the TACACS+ server. The default is
0.0.0.0., which means that any IP address of the device can be used to
communicate with the TACACS+ server.284 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Key String (1-128 Characters) — The authentication and encryption
key for TACACS+ communications between the device and the
TACACS+ server. This key must match the encryption key sent by the
TACACS+ server. This key is encrypted.
– Timeout for Reply (1-30) — The amount of time that passes before
the connection between the device and the TACACS+ server times
out.
3 To add a TACACS+ server, click Add, and enter the fields on the page.
The fields below are those that were not described on the TACACS+:
Summary page.
– Host IP Address — Enter the TACACS+ server IP address.
– Priority (0-65535) — Enter the order in which the TACACS+ servers
are used if several are defined.
– Source IP Address — Enter either specific device IP address for the
TACACS+ server.
– Authentication Port (0-65535) — Enter the port number through
which the TACACS+ session occurs.
– Timeout for Reply (1-30) — Enter the amount of time that passes
before the connection between the device and the TACACS+ server
times out.
– Single Connection — Check to maintain a single open connection
between the device and the TACACS+ server.Dell PowerConnect 55xx Systems User Guide 285
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Wherever available, check Use Default to use a value that was entered in
the TACACS+: Summary page.
Defining TACACS+ Settings Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the TACACS+ Settings pages.
Table 9-48. TACACS+ CLI Commands
CLI Command Description
tacacs-server host {ip
address|hostname}[singleconnection] [port port-number]
[timeout timeout][key keystring][source source] [priority
priority]
no tacacs-server host {ipaddress|hostname}
Configures a TACACS+ host.
Use the no form of this command to
delete the specified TACACS+ host.
tacacs-server key key-string
no tacacs-server key
Specifies the authentication and
encryption key for all TACACS+
communications between the device
and the TACACS+ server.
Use the no form of this command to
disable the key.
tacacs-server timeout timeout
no tacacs-server timeout
Specifies the timeout value in
seconds.
tacacs-server source-ip source
no tacacs-server source-ip
source
Specifies the source IP address.
Use the no form of this command to
restore the default configuration.
show tacacs [ip-address] Displays configuration and statistics
for a TACACS+ server.286 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
Password Management
Password management provides increased network security and improved
password control. This feature is optional and must be enabled in the
Password Management page.
Passwords for SSH, Telnet, HTTP, HTTPS, and SNMP access can be assigned
security features that include:
• Minimum password lengths
• Password expiration dates (password aging)
• Prevention of frequent password reuse
• Lockout of users after failed login attempts
• Number of repeated characters allowed
• Number of different character classes required in the password. Numeric,
alphabetic, and special characters are all character classes.
console(config)# tacacs-server source-ip 172.16.8.1
console# show tacacs
Device Configuration
-----------------------------
IP Address Status Port Single TimeOut Source IP Priority
Connection
---------- ------ ------ ---------- -------- ---------- --------
1.1.1.11 Not 49 No Global Global 10
Connected
1.1.1.21 Not 49 No Global Global 19
Connected
1.1.1.31 Not 49 No Global Global 18
Connected
1.1.1.41 Not 49 No Global Global 17
Connected
Global values
--------------
TimeOut : 5
-----------------------------
Source IP : 0.0.0.0Dell PowerConnect 55xx Systems User Guide 287
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Password aging starts immediately after password management is enabled.
However it is only effective if system time on the device is taken from an
SNTP server. Passwords expire according to the user-defined expiration
date/time. Ten days prior to password expiration, the device displays a
password expiration warning message.
After the password has expired, users can log in a few additional times.
During the remaining logins, an additional warning message displays
informing the user that the password must be changed. If the password is not
changed, users are locked out of the system, and can only log in using the
console. Password warnings are logged in the SYSLOG file.
NOTE: Password aging is enabled only after setting the switch to use SNTP for
setting time.288 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define password management parameters:
1 Click System > Management Security > Password Management in the
tree view to display the Password Management page.
Figure 9-40. Password Management
2 Check the required fields and enter their values:
– Enable Strong Passwords — Check to enable this feature.
– Number of Classes — Select a number of character classes. The
character classes are: upper case characters, lower case characters,
digits and punctuation. The number of character classes selected
indicates how many different types of characters must be in the
password.
– Repeated Characters — Select the number of permissible repeated
characters in the password.Dell PowerConnect 55xx Systems User Guide 289
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Password Minimum Length (8-64 characters) — When checked,
specifies the minimum password length. Enter the minimum
password length.
– Enable Login Attempts — When checked, enables locking a user out
of the device when a faulty password is used more than the number of
times entered. Select the maximum number of login attempts.
– Global Password Aging (1-365) — When checked, specifies that the
password will expire in the number of days entered. Enter the number
of days. This is only enabled after setting the switch to use SNTP for
setting time
– Consecutive Passwords Before Reuse (1-10) — When checked,
indicates the number of times a password must be changed, before the
password can be reused. Select the number of times.
– Password History Hold Time (1-365) — When checked, the password
history will be deleted after the number of days entered. Enter the
number of days.
Password Management Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Password Management page.
Table 9-49. Password Management CLI Commands
CLI Command Description
passwords strength-check enable
no passwords strength-check
Enforces password strength checks.
Use the no form of this command
to disable enforcing password
strength checks.
passwords strength [max-limit
repeated characters | minimum
character-classes]
no passwords strength
Enforces limits of repeated
characters and character classes.
Use the no form of this command
to disable enforcing limits of
repeated characters and character
classes.290 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is a sample script that sets password strength rules and creates a
user with a valid password.
password min-length length
no password min-length
Defines the minimum password
length.
Use the no form of this command
to remove the restriction.
passwords aging days
no passwords aging
Enforces password aging.
Use the no form of this command
to return to default.
password history number
no password history
Defines the amount of times a
password is changed, before the
password can be reused.
password history hold-time days
no password history hold-time
Configures the duration that a
password is relevant for tracking
passwords history.
Use the no form of this command
to return to the default
configuration.
password lockout number
no password lockout
Defines the number of times a
faulty password is entered before
the user is locked out of the device.
Use the no form of this command
to disable the lockout feature.
show password configuration Displays password management
information.
Table 9-50. CLI Script to Configure Strong Password
CLI Command Description
console#configure
console(conf)# passwords strengthcheck enable
Enable strong passwords.
Table 9-49. Password Management CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 291
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
RADIUS
Remote Authentication Dial-In User Service (RADIUS) servers provide
additional security for networks. Up to four RADIUS servers can be defined.
RADIUS servers provide a centralized authentication method for:
• Telnet Access
• Secure Shell Access
• Web Access
• Console Access
console(config)# passwords strength
minimum character-classes 3
Enable that passwords must
contain at least three
character classes.
password min-length 8 Enable that passwords must
contain at least eight
characters.
console(config)# username admin
privilege 15 password FGH123!@#
Create a user named
"admin" with privilege level
15 and password that fits
the strength rules.
Table 9-50. CLI Script to Configure Strong Password
CLI Command Description292 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To add a RADIUS server:
1 Click System > Management Security > RADIUS in the tree view to
display the RADIUS: Summary page.
Figure 9-41. RADIUS: Summary
The RADIUS default parameters and previously-defined RADIUS servers
are displayed.
2 Enter the default parameters to be used when these parameters are not
entered for a specific server.
– Default Retries (1-10) — The default number of transmitted requests
sent to RADIUS server before a failure occurs.
– Default Timeout for Reply (1-30) — The default amount of the time
(in seconds) that the device waits for an answer from the RADIUS
server before timing out.
– Default Dead time (0-2000) — The default amount of time (in
minutes) that a RADIUS server is bypassed for service requests.
– Default Key String (0-128 Characters) — The Default Key string
used for authenticating and encrypting all RADIUS communications
between the device and the RADIUS server. This key is used for
encryption.
– Source IPv4 Address — The source IP v4 address that is used for
communication with RADIUS servers.Dell PowerConnect 55xx Systems User Guide 293
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Source IPv6 Address — The source IP v6 address that is used for
communication with RADIUS servers.
3 To add a RADIUS server, click Add, and enter the fields:
– Supported IP Format — Select whether the IPv4 or IPv6 format is
supported.
– IP Address — Enter the RADIUS server IP address.
– Priority (0-65535) — Enter the priority of the authentication server
being added. 0 is the highest value. This is used to configure the order
in which servers are queried.
– Authentication Port (0-65535) — Enter the authentication port used
to verify the RADIUS server authentication. Enter 0 if you do not
want this server to be used for authentication purposes.
– Accounting Port (0-65535) — Enter the accounting port, which is the
UDP port number of the RADUS server used for accounting requests.
Enter 0 if you do not want this server to be used for accounting
purposes.
– Usage Type — Enter the RADIUS server usage. The possible options
are:
• Login — Used for login authentication and/or accounting.
• 802.1x — Used for 802.1x authentication and/or accounting.
• All — Used for all types of authentication and/or accounting.
4 Enter the following fields if you do not want to use the default values
entered in the RADIUS: Summary page. If you do want to use the default
values, check Use Default for these fields.
– Number of Retries (1-10) — Enter the number of requests sent to the
RADIUS server before a failure occurs.
– Timeout for Reply (1-30) — The amount of the time in seconds that
the device waits for an answer from the RADIUS server before retrying
the query, or switching to the next server.
– Dead Time (0-2000) — The amount of time (in minutes) that a
RADIUS server is bypassed for service requests.
– Key String (0-128 Characters) — The key string used for
authenticating and encrypting all RADIUS communications between
the device and the RADIUS server. 294 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Source IP Address — The device IP address that is used for
communication with RADIUS servers.
Defining RADIUS Servers Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed on the RADIUS pages.
Table 9-51. RADIUS Server CLI Commands
CLI Command Description
radius-server host {ipv4-
address|ipv6-address|ipv6zaddress|hostname} [auth-port
auth-port-number] [acct-port
acct-port-number][timeout
timeout] [retransmit retries]
[deadtime deadtime] [key keystring] [source {ipv4-
address|ipv6-address}] [priority
priority] [usage
{login|802.1x|all}]
no radius-server host {ipv4-
address|ipv6-address|hostname}
Specifies a RADIUS server host.
Use the no form of the command to
delete the specified RADIUS server
host.
radius-server timeout timeout
no radius-server timeout
Sets the interval for which a device
waits for a server host to reply.
Use the no form of this command to
restore the default configuration.
radius-server source-ip sourceip-address
no radius-server source-ip
source-ip-address
Specifies the source IPv4 address
that will be used for the IPv4
communication with RADIUS
servers.
Use the no form of this command to
restore the default configuration.Dell PowerConnect 55xx Systems User Guide 295
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
radius-server source-ipv6
source-ipv6-address
no radius-server source-ipv6
source-ipv6-address
Specifies the source IPv6 address
that will be used for the IPv6
communication with RADIUS
servers.
Use the no form of this command to
restore the default configuration.
radius-server retransmit retries
no radius-server retransmit
Specifies the number of times the
software searches the list of
RADIUS server hosts.
Use the no form of this command to
restore the default configuration.
radius-server deadtime deadtime
no radius-server deadtime
Configures unavailable servers to be
skipped.
Use the no form of this command to
restore the default configuration.
radius-server key key-string
no radius-server key
Sets the authentication and
encryption key for all RADIUS
communications between the router
and the RADIUS server.
Use the no form of this command to
restore the default configuration.
show radius-servers Displays the RADIUS server
settings.
Table 9-51. RADIUS Server CLI Commands (Continued)
CLI Command Description296 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of CLI commands:
console(config)# radius-server host 192.168.10.1 authport 20 timeout 20
console(config)# radius-server key enterprise-server
console# show radius-servers
IP address Port Port Time- Ret- Dead- Source IP Prio. Usage
Auth Acct Out rans Time
--------------- ----- ----- ------ ------ ------ --------------- ----- ---
1.1.1.11 1812 1813 Global Global Global Global 10 all
1.1.1.21 1812 1813 Global Global Global Global 19 all
1.1.1.31 1812 1813 Global Global Global Global 18 all
1.1.1.41 1812 1813 Global Global Global Global 17 all
1.1.1.51 1812 1813 Global Global Global Global 16 all
Global values
--------------
TimeOut : 3
Retransmit : 3
Deadtime : 0
Source IP : 0.0.0.0
Source IPv6 : ::Dell PowerConnect 55xx Systems User Guide 297
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCP Server
The switch can operate as either:
• DHCP client that obtains its own IP from a DHCP server, as described in
"DHCP IPv4 Interface" on page 214
• DHCP server that allocates IP addresses to other devices, as described in
this section
This section contains the following topics:
• DHCP Server Overview
• DHCP Server Properties
• Network Pool
• Excluded Addresses
• Static Hosts
• Address Binding
DHCP Server Overview
A DHCP server uses a defined pool of IP addresses (user-defined) from which
it allocates IP addresses to DHCP clients.
The DHCP server can allocate IP addresses in the following modes:
• Static Allocation — The hardware address of a host is manually mapped
to an IP address.
• Permanent Allocation — An IP address sent to the client through a
standard request-reply mechanism, is owned by that client permanently
(unless changes in the network environment/connections take place, for
any reason).
• Dynamic Allocation — A client obtains a leased IP address for a specified
period of time. The IP address is revoked at the end of this period, and the
client must request another IP address. 298 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCP Server Properties
If the device is configured to act as a DHCP server, pinging capability can be
enabled. The DHCP server pings an IP address in the address pool before
assigning that IP address to a requesting client. If the ping is unanswered, the
DHCP server assumes that the address is not in use and assigns the address to
the client.
To configure the device as a DHCP server:
1 Click System > DHCP Server > DHCP Server Properties in the tree view
to display the DHCP Server Properties page.
Figure 9-42. DHCP Server PropertiesDell PowerConnect 55xx Systems User Guide 299
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Enter the fields:
– DHCP Server Status — Enable/disable the ability of the device to
function as a DHCP server.
– DHCP Ping — Enable/disable the DHCP server to ping the offered
IP address before responding to a client request.
– DHCP Ping Retries — Enter the number of pings that are sent before
discarding an IP address. Use Default reverts to the default Ping
Retries setting.
– DHCP Ping Timeout — Enter the maximum time interval (in
milliseconds) that the DHCP server waits for a ping reply. Use Default
reverts to the default Ping Timeout.
Defining DHCP Server Using CLI Commands
The following table summarizes the CLI commands for defining the switch as
a DHCP server.
Table 9-52. DHCP Server CLI Commands
CLI Command Description
ip dhcp server
no ip dhcp server
Enables the DHCP server feature on
the device.
Use the no form of this command to
disable the DHCP server feature.
ip dhcp ping enable
no ip dhcp ping enable
Enables the DHCP server to send ping
packets before assigning the address to a
requesting client.
Use the no form of this command to
prevent the server from pinging pool
addresses.
ip dhcp ping count number
no ip dhcp ping count
Specifies the number of packets a
DHCP server sends to a pool address as
part of a ping operation.
Use the no form of this command to
restore the default configuration.300 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
ip dhcp ping timeout
milliseconds
no ip dhcp ping timeout
Specifies the time interval during which
a DHCP server waits for a ping reply
from an address pool.
Use the no form of this command to
restore default values.
console(config)# ip dhcp ping enable
console(config)# ip dhcp ping count 5
Table 9-52. DHCP Server CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 301
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Network Pool
When the device is serving as a DHCP server, a pool of IP addresses must be
defined, from which the switch will allocate IP addresses to clients.
Each IP pool has a lease duration.
To create a pool of IP addresses, and define their lease durations:
1 Click System > DHCP Server > Network Pool in the tree view to display
the Network Pool: Summary page.
Figure 9-43. Network Pool: Summary
The previously-defined network pools are displayed.
2 Click Add to define a new network pool, and enter the fields:
– Pool Name — Enter the pool name.
– Subnet IP Address — Enter the subnet in which the network pool
resides.302 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Network Mask — Check and enter the pool’s network mask.
• Prefix Length — Check and enter the number of bits that
comprise the address prefix.
– Address Pool Start — Enter the first IP address in the range of the
network pool.
– Address Pool End — Enter the last IP address in the range of the
network pool.
– Lease Duration — Enter the amount of time a DHCP client can use
an IP address from this pool. The total lease duration is 4294967295
seconds, i.e. 49710.2696 days. Thus a lease of 49710 days, 0 hours, 0
minutes and 0 seconds is a legal value, while a lease of 49710 days, 23
hours, 59 minutes and 59 seconds results in an Out of Range alert.
• Days — The duration of the lease in number of days. The range is
0 to 49710 days.
• Hours — The number of hours in the lease. A days value must be
supplied before an hours value can be added.
• Minutes — The number of minutes in the lease. A days value and
an hours value must be added before a minutes value can be
added.
• Infinite — The duration of the lease is unlimited.
– Default Router — Enter the default router for the DHCP client.
– Domain Name Server — Enter the DNS server available to the DHCP
client.
– Domain Name — Enter the domain name for a DHCP client. The
domain name may contain up to 32 characters.
– NetBIOS WINS Server — Enter the NetBIOS WINS name server
available to a DHCP client.
– NetBIOS Node Type — Select how to resolve the NetBIOS name.
Valid node types are:
• Empty— Default value.
• Broadcast — IP Broadcast messages are used to register and
resolve NetBIOS names to IP addresses.Dell PowerConnect 55xx Systems User Guide 303
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Peer-to-Peer — Point-to-point communications with a NetBIOS
name server are used to register and resolve computer names to IP
addresses.
• Mixed — A combination of b-node and p-node communications
is used to register and resolve NetBIOS names. M-node first uses
b-node; then, if necessary, p-node. M-node is typically not the best
choice for larger networks because its preference for b-node
Broadcasts increases network traffic.
• Hybrid — A hybrid combination of b-node and p-node is used.
When configured to use h-node, a computer always tries p-node
first and uses b-node only if p-node fails. This is the default.
– SNTP Server — Enter the IP address of the time server for the DHCP
client.
– Next Server — Enter the IP address of the next server in the boot
process of a DHCP client. If the next server in the boot process is not
configured, the DHCP server uses inbound interface helper addresses
as boot servers.
– Next Server Name — Enter the name of the next server in the boot
process.
– Image File Name — Enter the name of the file that is used as a boot
image.
Configuring Network Pool Using CLI Commands
The following table summarizes the CLI commands for defining a pool of
addresses on the DHCP server.
Table 9-53. Network Pool CLI Commands
CLI Command Description
ip dhcp pool network name
no ip dhcp pool network name
Configures a DHCP address pool on a
DHCP Server and enters DHCP Pool
Configuration mode.
Use the no form of this command to remove
the address pool.304 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
address {network-number|low
low-address high highaddress} {mask|prefixlength}
no address
Configures the subnet number, mask and
start and end addresses for a DHCP address
pool on a DHCP Server.
Use the no form of this command to remove
the subnet number and mask.
lease {days [{hours}
[minutes]]|infinite}
no lease
Configures the time duration of the lease for
an IP address that is assigned from a DHCP
server to a DHCP client.
Use the no form of this command to restore
the default value
default-router ip-address
[ip-address2 ... ipaddress8]
no default-router
Configures the default router list for a
DHCP client.
Use the no form of this command to remove
the default router list.
dns-server ip-address [ipaddress2 ... ip-address8]
no dns-server
Configures the DNS IP servers available to a
DHCP client.
Use the no form of this command to remove
the DNS server list.
domain-name domain
no domain-name
Specifies the domain name for a DHCP
client.
Use the no form of this command to remove
the domain name.
netbios-name-server ipaddress [ip-address2 ... ipaddress8]
no netbios-name-server
Configures the NetBIOS Windows Internet
Naming Service (WINS) servers that are
available to Microsoft DHCP clients.
Use the no form of this command to remove
the NetBIOS name server list.
netbios-node-type {b-node|pnode|m-node|h-node}
no netbios-node-type
Configures the NetBIOS node type for
Microsoft Dynamic Host Configuration
Protocol (DHCP) clients.
Use the no form of this command to remove
the NetBIOS node type.
Table 9-53. Network Pool CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 305
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
time-server ip-address [ipaddress2 ... ip-address8]
no time-server
Specifies the time servers list for a DHCP
client.
Use the no form of this command to remove
the time servers list.
next-server ip-address
no next-server
Configures the next server in the boot
process of a DHCP client.
Use the no form of this command to remove
the boot server.
next-server-name name
no next-server-name
Configures the next server name in the boot
process of a DHCP client.
Use the no form of this command to remove
the boot server name.
bootfile filename
no bootfile
Specifies the default boot image file name
for a DHCP client.
Use the no form of this command to delete
the boot image file name.
show ip dhcp pool network
[name]
Displays the DHCP network pool
configuration.
console(config)# ip dhcp pool network pool1
console(config-dhcp)# address 10.12.1.99 255.255.255.0
01b7.0813.8811.66
console(config-dhcp)# lease 1
Table 9-53. Network Pool CLI Commands (Continued)
CLI Command Description306 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Excluded Addresses
By default, the DHCP server assumes that all pool addresses in a pool may be
assigned to clients. A single IP address or a range of IP addresses can be
excluded.
To define an excluded address range:
1 Click System > DHCP Server > Excluded Addresses in the tree view to
display the Excluded Addresses: Summary page.
Figure 9-44. Excluded Addresses: Summary
The previously-defined excluded IP addresses are displayed.
2 To add a range of IP addresses to be excluded, click Add, and enter the
fields:
– Start IP Address — First IP address in the range of excluded IP
addresses.Dell PowerConnect 55xx Systems User Guide 307
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– End IP Address — Last IP address in the range of excluded IP
addresses.
Excluding Addresses Using CLI Commands
The following table summarizes the CLI commands for excluding addresses.
The following is an example of the CLI commands:
Table 9-54. Excluding Addresses Using CLI Commands
CLI Command Description
ip dhcp excluded-address lowaddress [high-address]
no ip dhcp excluded-address
low-address [high-address]
Configures a DHCP address pool on a
DHCP Server and enter DHCP Pool
Configuration mode.
Use the no form of this command to
remove the address pool.
show ip dhcp excluded-addresses Displays the excluded addresses.
console(config)# ip dhcp excluded-address 172.16.1.100
172.16.1.199
console> show ip dhcp excluded-addresses
The number of excluded addresses ranges is 2
Excluded addresses:
10.1.1.212- 10.1.1.219, 10.1.2.212- 10.1.2.219308 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Static Hosts
To manually allocate permanent IP addresses to clients (known as static
hosts):
1 Click System > DHCP Server > Static Hosts in the tree view to display
the Static Hosts: Summary page.
Figure 9-45. Static Hosts: Summary
The static hosts are displayed.
2 To add a static host, click Add, and enter the fields:
– Host Name — Enter the host pool name, which can be a string of
symbols and an integer.
– IP Address — Enter the IP address that was statically assigned to the
host.
• Network Mask — Enter the pool’s network mask.
• Prefix Length — Enter the number of bits that comprise the address
prefix.Dell PowerConnect 55xx Systems User Guide 309
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Client Identifier — Enter a unique identification of the client
specified in dotted hexadecimal notation, such as: 01b6.0819.6811.72.
or:
– MAC Address — Enter the MAC address of DHCP static host.
– Client Name — The name of the client, using a standard set of ASCII
characters. The client name must not include the domain name.
– Default Router — Enter the default router for the DHCP client.
– Domain Name Server — Enter the DNS server available to the DHCP
client.
– Domain Name — Enter the domain name for a DHCP client. The
domain name may contain up to 32 characters.
– NetBIOS WINS Server — Enter the NetBIOS WINS name server
available to a DHCP client.
– NetBIOS Node Type — Select how to resolve the NetBIOS name.
Valid node types are:
• Empty — Default value.
• Broadcast — IP Broadcast messages are used to register and
resolve NetBIOS names to IP addresses.
• Peer-to-Peer — Point-to-point communications with a NetBIOS
name server are used to register and resolve computer names to IP
addresses.
• Mixed — A combination of b-node and p-node communications
is used to register and resolve NetBIOS names. M-node first uses
b-node; then, if necessary, p-node. M-node is typically not the best
choice for larger networks because its preference for b-node
Broadcasts increases network traffic.
• Hybrid — A hybrid combination of b-node and p-node is used.
When configured to use h-node, a computer always tries p-node
first and uses b-node only if p-node fails. This is the default.
– SNTP Server — Enter the IP address of the time server for the DHCP
client.310 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Next Server — Enter the IP address of the next server in the boot
process of a DHCP client. If the next server in the boot process is not
configured, the DHCP server uses inbound interface helper addresses
as boot servers.
– Next Server Name — Enter the name of the next server in the boot
process.
– Image File Name — Enter the name of the file that is used as a boot
image.
Defining Static Hosts Using CLI Commands
The following table summarizes the CLI commands for defining static hosts.
See Table 9-53 for the remaining CLI commands that are common to the
Network Pool pages, but are used in the context DHCP Pool Host context.
Table 9-55. Defining Static Hosts Using CLI Commands
CLI Command Description
ip dhcp pool host
no ip dhcp pool host
Configures a DHCP static address
on a DHCP Server and enters the
DHCP Pool Host Configuration
mode.
Use the no form of this command to
remove the address pool.
ip host name address [address2
address3 address4]
no ip host name
Defines the static host name-toaddress mapping in the host cache.
Use the no form of this command to
remove the static hostname-toaddress mapping.
show hosts Displays the default domain name,
the list of name server hosts, the
static and the cached list of host
names and addresses.
clear host Deletes entries from the host nameto-address cache.Dell PowerConnect 55xx Systems User Guide 311
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# ip dhcp pool host station
console(config-dhcp)#ip host accounting.website.com
176.10.23.1
console# show hosts
System Name:
Default domain: Domain name is not configured
Name/address lookup is enable
Name servers (Preference order): 1.1.1.1 1.1.1.2 1.1.1.3
1.1.1.4 1.1.1.5
Configured host name-to-address mapping:
Host IP Address
--------------------------------- -----------------------
accounting.website.com 176.10.23.1312 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Address Binding
Use the Address Binding page to view and remove the IP addresses allocated
by the switch and their corresponding MAC addresses.
To view and/or remove address bindings:
• Click System > DHCP Server > Address Binding in the tree view to
display the Address Binding page.
Figure 9-46. Address Binding
The following fields for the address bindings are displayed:
– IP Address — The IP addresses of the client.
– Client Identifier/MAC Address — A unique identification of the
client specified as a MAC Address or in dotted hexadecimal notation,
e.g., 01b6.0819.6811.72.
– Lease Expiration — The lease expiration date and time of the host’s
IP address.
– Type — The manner in which the IP address was assigned to the
client. The possible options are:
• Static — The hardware address of the host was mapped to an IP
address.Dell PowerConnect 55xx Systems User Guide 313
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Permanent — The IP address, obtained dynamically from the
switch, is owned by the client permanently (unless changes in the
network environment/connections take place, for any reason).
• Dynamic — The IP address, obtained dynamically from the
switch, is owned by the client for a specified period of time. The
IP address is revoked at the end of this period, at which time the
client must request another IP address. 314 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNMP
This section describes the Simple Network Management Protocol (SNMP)
for managing network devices.
It contains the following topics:
• SNMP Overview
• SNMP Global Settings
• SNMP Views
• SNMP Access Control (Groups)
• SNMP User Security Model (Users)
• SNMP Communities
• SNMP Notification Filters
• SNMP Notification Recipients
SNMP Overview
The switch supports the SNMPv1, SNMPv2 and SNMPv3.
SNMP v1 and v2
The SNMP agent maintains a list of variables that are used to manage the
switch. These variables are stored in the Management Information Base
(MIB) from which they may be presented. The SNMP agent defines the MIB
specification format, as well as the format used to access the information over
the network. Access rights to the SNMP agents are controlled by access
strings.
SNMPv1 and v2 are enabled by default.
SNMP v3
In addition to the features provided by SNMPv1 and SNMPv2, SNMPv3
applies access control and a new trap mechanism to SNMPv1 and SNMPv2
PDUs. In addition, a User Security Model (USM) can be defined, which
includes:
• Authentication — Provides data integrity and data origin authentication. Dell PowerConnect 55xx Systems User Guide 315
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Privacy — Protects against disclosure of message content. Cipher BlockChaining (CBC) is used for encryption. Either authentication alone can
be enabled on an SNMP message, or both authentication and privacy can
be enabled on an SNMP message. However privacy cannot be enabled
without authentication.
• Timeliness — Protects against message delay or message redundancy. The
SNMP agent compares incoming message to the message time
information.
• Key Management — Defines key generation, updates, and use.
The switch supports SNMP notification filters, based on Object IDs (OIDs),
which are used by the system to manage switch features.
Authentication or Privacy Keys are modified in the User Security Model
(USM).
SNMPv3 can only be enabled if the Local Engine ID is enabled.
SNMP Access Rights
Access rights in SNMP are managed in the following ways:
• SNMPv1 and SNMPv2 — Communities
The community name is a password sent by the SNMP management
station to the device for authentication purposes.
A community string is transmitted along with the SNMPv1,v2 frames, but
neither the frames nor the community string are encrypted. Since
SNMPv1 and SNMPv2 are not encrypted, they are not secure.
Communities can be associated with views or groups, and they are defined
in the Community pages.
• SNMPv3 — Users and Groups
SNMP v3 works with users instead of communities. The users belong to
groups that have access rights assigned to them. Users are defined in the
User Security Model pages
SNMPv3 provides two security mechanisms:
– Authentication — The switch checks that the SNMP user is an
authorized system administrator. This is done for each and every
frame. 316 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Privacy — SNMP frames can carry encrypted data.
These mechanisms can be combined to provide three levels of security:
– No security
– Authentication
– Authentication and Privacy. Note that for both authentication and
privacy to be enabled, two groups with the same name, one with
authentication and one with privacy, must be created.
A group is a label for a combination of attributes that determines whether
members have read, write, and/or notify privileges. Users can be associated
with a group. A group is operational only when it is associated with an
SNMP user.
Model OIDs
The following are the switch model Object IDs (OIDs):
SNMP Global Settings
The Engine ID is used by SNMPv3 entities to uniquely identify themselves.
An SNMP agent is considered an authoritative SNMP engine. This means
that the agent responds to incoming messages (Get, GetNext, GetBulk, Set),
and sends Trap messages to a manager. The agent's local information is
encapsulated in fields in the message.
Each SNMP agent maintains local information that is used in SNMPv3
message exchanges (not relevant for SNMPv1 or SNMPv2). The default
SNMP Engine ID is comprised of the enterprise number and the default
MAC address. The SNMP engine ID must be unique for the administrative
domain, so that no two devices in a network have the same engine ID.
Model Name Object ID
PC5524 10895.3030
PC5524P 10895.3032
PC5548 10895.3031
PC5548P 10895.3033Dell PowerConnect 55xx Systems User Guide 317
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The local information is stored in four read-only MIB variables:
snmpEngineId, snmpEngineBoots, snmpEngineTime, and
snmpEngineMaxMessageSize.
To configure SNMP:
1 Click System > SNMP > Global Parameters in the tree view to display
the Global Parameters page.
Figure 9-47. Global Parameters
The global parameters are displayed.
2 Enter the fields:
– Local Engine ID (10-64 Hex Characters) — Check and enter the
local device engine ID. The field value is a hexadecimal string. Each
byte in hexadecimal character strings is two hexadecimal digits. Each
byte can be separated by a period or a colon. The Engine ID must be
defined before SNMPv3 is enabled.
For stacked devices, verify that the Engine ID is unique for the
administrative domain. This prevents two devices in a network from
having the same Engine ID. 318 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Use Default — Check to use the device-generated Engine ID. The
default Engine ID is based on the device MAC address, and is defined
per standard as:
• First 4 octets — First bit = 1, the rest is IANA Enterprise number
= 674.
• Fifth octet — Set to 3 to indicate the MAC address that follows.
• Last 6 octets — MAC address of the device.
– SNMP Notifications — Enable/disable the switch sending SNMP
notifications.
– Authentication Notifications — Enable/disable the switch sending
SNMP traps when authentication fails.
Setting SNMP Global Parameters Using CLI Commands
The following table summarizes the CLI commands for setting fields in the
Global Parameters page.
Table 9-56. SNMP Global Parameters Commands
CLI Command Description
snmp-server engine ID local
{engine-id-string|default}
no snmp-server engine ID
local
Specifies the local device engine ID. The
field values is a hexadecimal string. Each
byte in hexadecimal character strings is two
hexadecimal digits. Each byte can be
separated by a period or colon. The Engine
ID must be defined before SNMPv3 is
enabled.
Use the no form of this command to
remove the configured engine ID.
snmp-server enable traps
no snmp-server enable traps
Enables the router to send Simple Network
Management Protocol traps.
Use the no form of the command to disable
SNMP traps.Dell PowerConnect 55xx Systems User Guide 319
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
SNMP Views
An SNMP view, which is a collection of MIB subtrees, provides or blocks
access to device features.
Each subtree is defined by the Object ID (OID) of the root of its subtrees. In
extreme cases this subtree can be a leaf. Well-known names can be used to
specify the root of the desired subtree, or an OID can be entered (see "Model
OIDs" on page 316).
Each subtree is either included in or excluded from the view being defined.
snmp-server trap
authentication
no snmp-server trap
authentication
Enables the router to send Simple Network
Management Protocol traps when
authentication fails.
Use the no form of this command to
disable SNMP failed authentication traps.
show snmp Checks the status of SNMP
communications.
console(config)# snmp-server enable traps
console(config)# snmp-server trap authentication
console(config)# snmp-server engineid local default
The engine-id must be unique within your administrative
domain.
Do you wish to continue? [Y/N]y
The SNMPv3 database will be erased. Do you wish to
continue? [Y/N]y
Table 9-56. SNMP Global Parameters Commands (Continued)
CLI Command Description320 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Views can be attached to groups in the Access Control pages.
To create an SNMP view:
1 Click System > SNMP > View Settings in the tree view to display the
View Settings: Summary page.
Figure 9-48. View Setting: Summary
2 Select a view name. Its subtrees are displayed.
3 To remove a subtree from an SNMP view, click Remove. The subtrees of
the default views (Default, DefaultSuper) cannot be changed.
4 To add a new view, click Add, and enter a new View Name (1-30
Characters).
5 To complete the definition of the view, click Edit, and select a View Name
to modify. Enter the fields:
– New Object ID Subtree — Check to specify the device feature OID
included or excluded in the selected SNMP view.Dell PowerConnect 55xx Systems User Guide 321
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Selected from List — Select the device feature OID by using the
Up and Down buttons to scroll through a list of all device OIDs.
Or:
• Insert — Specify the device feature OID.
– View Type — Specify if the defined OID branch will be included or
excluded in the selected SNMP view.
Defining SNMP Views Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the View Settings pages.
The following is an example of CLI commands:
Table 9-57. SNMP View CLI Commands
CLI Command Description
snmp-server view view-name
oid-tree {included|excluded}
no snmp-server view view-name
[oid-tree]
Creates or updates a SNMP server view
entry.
Use the no form of this command to
remove an SNMP server view entry.
show snmp views [viewname] Displays the configuration of a view or all
views.
console(config)# snmp-server view user1 1 included
console(config)# end
console# show snmp views
Name OID Tree Type
------------ --------------- --------
user1 system included
Default iso included
Default snmpVacmMIB excluded
Default usmUser excluded
Default rndCommunityTable excluded
DefaultSuper iso included322 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNMP Access Control (Groups)
For ease of use, users may be assigned to groups. In this way, it is possible to
assign feature access rights to an entire group, instead of assigning them
individually to users. Users are created in the User Security Model pages.
Groups can be defined in any version of SNMP, but only SNMPv3 groups can
be assigned authentication methods.
To add an SNMP group, and assign it access control privileges:
1 Click System > SNMP > Access Control in the tree view to display the
Access Control: Summary page.
Figure 9-49. Access Control: Summary
Previously-defined groups are displayed.
2 To add a new group, click Add, and enter the fields:
– Group Name (1-30 Characters) — Enter a group name. Dell PowerConnect 55xx Systems User Guide 323
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Security Model — Select the SNMP version of the group.
– Security Level — Select the security level attached to the group.
Security levels apply to SNMPv3 only. The possible options are:
• No Authentication — Neither authentication nor the privacy
security levels are assigned to the group.
• Authentication — Authenticates SNMP messages, and ensures
that the origin of the SNMP message is authenticated.
• Privacy — Encrypts SNMP message.
– Operation — Select the group access rights. The possible options are:
• Read — The management access is restricted to read-only, and
changes cannot be made to the assigned SNMP view. If desired,
select a view from the drop-down list.
• Write — The management access is read-write and changes can
be made to the assigned SNMP view. If desired, select a view from
the drop-down list.
• Notify — Sends traps for the assigned SNMP view. If desired,
select a view from the drop-down list.
Defining SNMP Access Control Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the Access Control pages.
Table 9-58. SNMP Access Control CLI Commands
CLI Command Description
snmp-server group groupname
{v1|v2|v3 {noauth|auth|priv}}
[read readview] [write
writeview] [notify notifyview]
no snmp-server group groupname
{v1|v2|v3 [noauth|auth|priv]}
[context-name]
Configure a new Simple Network
Management Protocol (SNMP)
group, or a table that maps SNMP
users to SNMP views.
Use the no form of this command to
remove a specified SNMP group.
show snmp groups [groupname] Displays the configuration of groups 324 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
SNMP User Security Model (Users)
An SNMP user is defined by the following:
• Login credentials (username, password, and authentication method)
• Context and scope in which the user operates
• Association with a group
• Engine ID
SNMP user login credentials are verified using a local database.
After a user is authenticated, it takes on the attributes of its group, and can
then access the views permitted to this group. A user can only be a member of
a single group.
Before you create an SNMPv3 user, create an SNMPv3 group in the Access
Control pages.
When the configuration file is saved, SNMP communities/users are not
saved. This means that if you configure another device with this
configuration file, you must define the SNMP communities/users on that
device.
console (config)# snmp-server group user-group v3 priv
read user-view
console# show snmp groups
Name Security Views
Model Level Read Write Notify
----- ----- ------- ------- ------- ----------
1 V1 noauth - - -
2 V1 noauth - - -
3 V1 noauth - - -
4 V1 noauth - - -
5 V1 noauth - - -Dell PowerConnect 55xx Systems User Guide 325
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To create an SNMP V3 user, and assign it to a group and view:
1 Click System > SNMP > User Security Model in the tree view to display
the User Security Model: Summary page.
Figure 9-50. User Security Model: Summary
The currently-defined users and their groups are displayed.
2 To add a user, click Add, and enter the fields:
– User Name (1-30 Characters) — Enter a new user name.
– Engine ID — Specifies the local or remote SNMP entity, to which the
user is connected. Changing or removing the local SNMP Engine ID
deletes the SNMPv3 User Database. Select either Local or Remote. If
Remote is selected, enter the remote engine ID.
– Group Name — Select from a list of user-defined SNMP groups.
SNMP groups are defined in the Access Control Group pages.326 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Authentication Method — Select an authentication method used to
authenticate users. The possible options are:
• None — No user authentication is used.
• MD5 Password — HMAC-MD5-96 password is used for
authentication.
• SHA Password — Users are authenticated using the HMAC-SHA-
96 authentication level.
• MD5 Key — Users are authenticated using the HMAC-MD5
algorithm.
• SHA Key — Users are authenticated using the HMAC-SHA-96
authentication level.
– Password (0-32 Characters) — If the MD5 Password or SHA Password
authentication method was selected, enter the user-defined password
for a group.
– Authentication Key (MD5-16; SHA-20 Hex Characters) — If the
MD5 Key or SHA Key authentication method was selected, enter the
HMAC-MD5-96 or HMAC-SHA-96 keys. The authentication and
privacy keys are entered to define the authentication key. If only
authentication is required, 16 bytes are defined for MD5. If both
privacy and authentication are required, 32 bytes are defined for MD5.
Each byte in hexadecimal character strings is two hexadecimal digits.
Each byte can be separated by a period or a colon.
– Privacy Key (16 Hex Characters) — If the MD5 Key or SHA Key
authentication method was selected, enter the privacy key. If only
authentication is required, 20 bytes are defined. If both privacy and
authentication are required, 16 bytes are defined. Each byte in
hexadecimal character strings is two hexadecimal digits. Each byte can
be separated by a period or colon. Dell PowerConnect 55xx Systems User Guide 327
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining SNMPv3 Users Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the User Security Model pages.
The following is an example of the CLI commands:
SNMP Communities
When using SNMP v1,2, communities strings (passwords) are used to provide
access rights in the following ways:
• Basic Table — The access rights of a community can be read-only, readwrite, or SNMP Admin. In addition, you can restrict access to the
community to only certain MIB objects using a view. Views are defined in
the Views Setting pages.
• Advanced Table — Access rights to a community are assigned to a group
that consists of users. A group can have Read, Write, and Notify access to
views. Groups are defined in the Access Control pages.
Table 9-59. SNMP Users CLI Commands
CLI Command Description
snmp-server user username groupname
{v1|v2c|[remote-host] v3 [encrypted]
[auth {md5|sha} auth-password]}
no snmp-server user username [remotehost]
Configures a new SNMP V3
user.
Use the no form of the
command to remove a user.
show snmp users [username] Displays the configuration of
users.
console(config)# snmp-server user tom acbd v1
console(config)# snmp-server user tom acbd v2c
console(config)# snmp-server user tom acbd v3328 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define an SNMP community:
1 Click System > SNMP > Communities in the tree view to display the
Communities: Summary page.
Figure 9-51. SNMP Community
The Basic and Advanced tables are displayed.
2 To add a new community, click Add.
3 Define the SNMP management station by entering its IP address
information:
– Supported IP Format — Select whether the IPv4 or IPv6 format is
being used.
– IPv6 Address Type — When the community supports IPv6, this
specifies the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.Dell PowerConnect 55xx Systems User Guide 329
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
– SNMP Management Station — Enter the management station IP
address for which the SNMP community is defined, or choose All to
be able to receive SNMP messages from anywhere.
– Community String (1-20 Characters) — Enter the community string,
which functions as a password, and is used to authenticate the
management station to the device.
4 To associate access mode and views directly with the community, enter the
fields:
– Basic — Check to enable SNMP Basic mode for a selected
community.
– Access Mode — If Basic is selected, specify the access rights of the
community. The possible options are:
• Read-Only — Management access is restricted to read-only, and
changes cannot be made to the community.
• Read-Write — Management access is read-write and changes can
be made to the device configuration, but not to the community.
• SNMP Admin — User has access to all device configuration
options, as well as permissions to modify the community.
– View Name — Select a view from a list of user-defined SNMP views.
The view determines other characteristics associated with the
community.
5 To use Advanced mode, enter the fields:
– Advanced — When SNMP Advanced mode is selected, you can select
an SNMP group to specify the SNMP access control rules for the
selected community. The SNMP Advanced mode is defined only with
SNMPv3. 330 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Group Name — Select the group to be associated with the
community.
Configuring Communities Using CLI Commands
The following table summarizes the CLI commands for setting fields in the
Community pages.
The following is an example of the CLI commands:
SNMP Notification Filters
Notification filters determine the type of SNMP notifications that are sent to
the management station, based on the OID of the notification to be sent.
Each OID is linked to a device feature or a feature aspect.
SNMP notification filters provide the following services:
• Identification of management trap targets
• Trap filtering
Table 9-60. SNMP Community CLI Commands
CLI Command Description
snmp-server community community
[view view-name] [ro|rw|su]
{ipv4-address|ipv6-address}
[mask mask-value|prefix-length
prefix-value] [type router|oob]
Sets up the community access string
to permit access to the SNMP
protocol.
Use the no form of this command to
remove the specified community
string
snmp-server community-group
community group-name [ipv4-
address|ipv6-
address][mask|prefix-length]
[type router|oob]
no snmp-server community string
[ipv4-address|ipv6-address]
Sets up community access string to
permit limited access to the SNMP
protocol, based on group access
rights.
show snmp Displays the current SNMP device
configuration.
console (config)# snmp-server community dell ro 10.1.1.1Dell PowerConnect 55xx Systems User Guide 331
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Selection of trap generation parameters
• Access control checks
After creating a notification filter, attach it to a notification recipient in the
SNMPv1,2 Notification Recipients pages.
To add a notification filter:
1 Click System > SNMP > Notification Filters in the tree view to display
the Notification Filter: Summary page.
Figure 9-52. Notification Filter: Summary
2 The OIDs of the selected filter are displayed.
3 If required, the notification filter type can be changed by selecting one of
the following options:
– Excluded — OID traps or informs will not be sent.
– Included — OID traps or informs will be sent.332 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
4 To add a new notification filter, click Add.
5 In addition to the fields described in the Summary page, enter the fields:
– Filter Name (1-30 Characters) — Enter the notification filter name.
– New Object Identifier Tree — Check to specify the device feature
OID included or excluded in the selected SNMP view.
• Selected from List — Select the device feature OID by using the
Up and Down buttons to scroll through a list of all device OIDs.
or:
• Object ID — Specify the device feature OID.
– Filter Type — Select whether the defined OID branch will be
Included or Excluded in the selected SNMP view.
Configuring Notification Filters Using CLI Commands
The following table summarizes CLI commands for defining fields displayed
in the Notification Filter pages.
Table 9-61. SNMP Notification Filter CLI Commands
CLI Command Description
snmp-server filter filter-name oidtree {included|excluded}
no snmp-server filter filter-name
[oid-tree]
Creates or updates an SNMP
notification filter.
Use the no form of this
command to remove the
specified SNMP server filter
entry.
show snmp filters [filter-name] Displays the configuration of
SNMP notification filtersDell PowerConnect 55xx Systems User Guide 333
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of CLI commands:
SNMP Notification Recipients
An SNMP notification is a trap message, sent from the switch to the SNMP
management station, indicating that a certain event has occurred, such as a
link up or down.
Trap receivers, also known as notification recipients, are network nodes to
which trap messages are sent by the switch.
A trap receiver entry contains the IP address of the node and the SNMP
credentials corresponding to the version that will be included in the trap
message. When an event arises that requires a trap message to be sent, it is
sent to every node listed in the trap receiver list.
Some messages are of an informational nature and are called "informs"
instead of traps.
console (config)# snmp-server filter user1 iso included
console(config)# end
console # show snmp filters
Name OID Tree Type
----------- ------------- --------
user1 iso Included334 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To add notification recipients, and attach them to notification filters:
1 Click System > SNMP > Notification Recipient in the tree view to
display the Notification Recipients: Summary page.
Figure 9-53. Notification Recipients: Summary
The previously-defined notification recipients are displayed.
2 To add a new notification recipient, click Add, and enter the fields:
– Supported IP Format — Select whether the IPv4 or IPv6 format is
supported.
– IPv6 Address Type — When the recipient supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.Dell PowerConnect 55xx Systems User Guide 335
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The IPv6 interface is configured on this VLAN.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
– Recipient IP — The IP address to whom the traps are sent.
– Notification Type — The notification sent. The possible options are:
• Trap — Traps are sent.
• Inform — Informs are sent.
If SNMP versions 1 and 2 are enabled for the selected recipient, enter the
fields:
– Community String — The community string of the trap manager.
– Notification Version — The message trap SNMP version (v1 or v2).
If SNMPv3 is used to send and receive traps, enter the fields:
– User Name — The user to whom SNMP notifications are sent.
– Security Level — The means by which the packet is authenticated.
The possible options are:
• No Authentication — The packet is neither authenticated nor
encrypted.
• Authentication — The packet is authenticated.
• Privacy — The packet is both authenticated and encrypted.
3 Enter the fields for all versions of SNMP:
– UDP Port (1-65535) — The UDP port used to send notifications. The
default is 162.
– Filter Name — Select an SNMP filter from a list of previously-defined
SNMP filters.
– Timeout (1-300) — The amount of time (seconds) the device waits
before resending informs.
– Retries (1-255) — The amount of times the device resends an inform
request. 336 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring SNMP Notification Recipients Using CLI Commands
The following table summarizes the CLI commands for setting fields in the
Notification Recipients pages.
The following is an example of the CLI commands:
Table 9-62. SNMP Notification CLI Commands
CLI Command Description
snmp-server host {ipv4-
address|ipv6-address|hostname}
[traps|informs] [version {1|2c|3
[auth|noauth|priv]}] communitystring [udp-port port] [filter
filtername] [timeout seconds]
[retries retries]
no snmp-server host {ipv4-
address|ipv6-address|hostname}
[traps|informs] [version {1|2c|3}]
Creates or updates a notification
recipient receiving notifications in
SNMP version 1, 2 or 3.
Use the no form of this command to
remove the specified host.
show snmp Shows the current SNMP
configuration.
console(config)# snmp-server host 172.16.1.1 private
console(config)# end
console# show snmp
CommunityString
CommunityAccess
View Name IP Address
------------- ------------ --------- ----------
public read only user-view All
private read write default 172.16.1.1
private su DefaultSup
er
172.17.1.1 Dell PowerConnect 55xx Systems User Guide 337
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
File Management
This section describes how to manage device firmware (image files) and
configuration files.
It contains the following topics:
• File Management Overview
• Auto-Update/Configuration Feature
• File Download
• File Upload
• Active Images
• Copy Files
• File System
File Management Overview
This section describes the system files found in the system and how they can
be updated (downloaded) and backed up (uploaded).
System Files
The following system files are maintained on the system:
• Startup Configuration File — Files with extension .text. These files
contain the commands required to configure the device at startup or after
reboot. The Startup Configuration file is created from the Running
Configuration file, or can be created from another file.
• Running Configuration File — Files with extension .text. These files
contain all Startup Configuration file commands, as well as all commands
entered during the current session. After the device is powered down or
rebooted, all commands stored in the Running Configuration file are lost.
During the startup process, all commands in the Startup Configuration
file are copied to the Running Configuration file, and applied to the
device.
During the session, new configuration commands are added to the
Running Configuration file. To update the Startup Configuration file with
these configuration commands, the Running Configuration file must first
be copied to the Startup Configuration file before powering down the 338 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
device. This can be done manually in the Copy Files page or see "AutoUpdate/Configuration Feature" on page 338 for more information about
how to perform this automatically.
• Image Files—Files with extension .ros. System file images are saved in two
flash files called Image 1 and Image 2. The active image contains the
active copy, while the other image contains a backup copy. The device
boots and runs from the active image. If the active image is corrupted, the
system automatically boots from the non-active image. This is a safety
feature for faults occurring during the software upgrade process.
Downloading/Uploading System Files
System files can be manually loaded from (downloaded) or copied to
(uploaded) a TFTP server or a USB drive. This can be done in one of the
following ways:
• Manually—System files can be downloaded using the File Download page
and uploaded using the File Upload page.
• Automatically (Auto Update/Configuration)—System files can be
downloaded automatically, as follows:
– Auto-Configuration—If the Auto-Configure feature is enabled (in the
Auto Update of Configuration/Image File page), the Startup
Configuration file (in various conditions described below) might be
automatically updated after reboot.
– Auto-Update—If the Firmware Auto-Update feature is enabled in the
Auto Update of Configuration/Image File page, the image file is might
be automatically updated (in various conditions described below).
Auto-Update/Configuration Feature
The Auto-Update/Configuration feature enables initial configuration of the
device and upgrading of the firmware through an automatic process, which
enables the administrator to ensure that the configuration/firmware of all the
devices in the network is up-to-date. Dell PowerConnect 55xx Systems User Guide 339
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The required configuration files/images are stored on a USB key or TFTP
server, and these are downloaded to all the devices in the network when the
device boots up instead of booting from a local startup configuration file.
Auto-Update/Configuration also enables quick installation of new devices on
the network, since an out-of-box device can be configured to retrieve its
configuration file from the network/USB, allowing instant access to it from
the administrator's management station and up-to-date configuration on the
device.
NOTE: If Auto-Update is performed through the USB port, in addition to upgrading
the Startup Configuration and image file, a new IP address can also be assigned
to the device. See "Setup Files" on page 339 below.
Setup Files
In addition to placing configuration and image files on the USB key, the USB
key might also contain a setup file, which is a file with a .setup extension.
Setup File Contents
A setup file contains one or more lines. Each line contains some or all of the
following fields:
• MAC Address—This indicates to which device the line applies. In this
way, a single setup file can be used for multiple devices.
• New IP Address—The new IP address to be assigned to the device.
• New IP Address Mask—The IP address mask to be applied to the new IP
address assigned to the device.
• Configuration File Name—Name of the configuration file to be used as
the Startup Configuration.
• Image File Name—Name of the image file to be loaded on device.
• Flag—Indicates the status of the line. The following values can be used in
this field:
– In-Use—This line has already been applied. It is no longer a candidate
for future use.
– Invalid—The line is invalid, do not use.
– Blank—There is no value for the flag field. This line is a candidate to
be applied to the device.340 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Setup File Format
A line in a setup file contains all or some of the above fields separated by
spaces (in the following order):
If the field is omitted, it is considered to be blank.
A line can be in one of the following formats:
• Format A—Contains all possible fields:
Examples:
– 0080.c200.0010 192.168.0.10 255.255.255.0 switch-X.text pc5500-
4018.ros
This means that the line applies to the device with MAC address:
0080.c200.0010; a new IP address of 192.168.0.10 is to be assigned to
the device, with mask: 255.255.255.0. The switch-x.text is the Startup
Configuration file and pc5500-4018.ros is the new image file.
– 0080.c200.0010 192.168.0.10 255.255.255.0 switch-X.text pc5500-
4018.ros in-use
This line will not be used because the flag is in-use indicating that it
has already been used for some device, and it would be incorrect to use
if for another device.
– 0080.c200.0010 192.168.0.10 255.255.255.0 switch-X.text pc5500-
4018.ros invalid
This line will not be used because the flag is invalid indicating that it
is failed in the past.Dell PowerConnect 55xx Systems User Guide 341
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Format B—Contains the following 4 fields:
Example:
0080.c200.0010 switch-X.text pc5500-4018.ros
This means that the line applies to the device with MAC address:
0080.c200.0010. The switch-x.text is the Startup Configuration file and
pc5500-4018.ros is the new image file.
• Format C—Contains the following 5 fields:
Example:
192.168.0.10 255.255.255.0 switch.text pc5500-4018.ros
This means that the line applies to any device (no MAC address is
supplied); a new IP address of 192.168.0.10 is to be assigned to the device,
with mask: 255.255.255.0. The switch-x.text is the Startup Configuration
file and pc5500-4018.ros is the new image file.
• Format D—Contains the following 3 fields:
Example:
192.168.0.10 255.255.255.0
This means that the line applies to any device (no MAC address is
supplied); a new IP address of 192.168.0.10 is to be assigned to the device,
with mask: 255.255.255.0.342 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Triggering the Auto-Update/Configuration Process
When the Auto-Update/Configuration feature is enabled (in the Auto
Update of Configuration/Image File page), the device automatically attempts
to download a new image or configuration file (under certain circumstances)
using one of the following processes:
• The Auto-Update process is triggered from the USB drive if a USB key in
the USB drive is found.
• The Auto-Configuration process is triggered from the USB drive after the
Auto-Update process completed and the device was rebooted (if a new
image file was loaded), and if the following conditions are fulfilled:
– There is a USB key in the USB drive.
– Force Configuration Download at Next Startup has been enabled by
the boot host dhcp command, or the Startup Configuration file is
empty.
See "Performing Auto-Update from a USB Drive" on page 343.
• The Auto-Update from a TFTP server is triggered if the following
conditions are fulfilled:
– The conditions for a USB Auto-Update are not fulfilled.
– An IP address of a TFTP server is received from a DHCP server.
– A file name is received from DHCP server.
• The Auto-Configuration from a TFTP server is triggered if the following
conditions are fulfilled:
– The conditions for USB Auto-Configuration are not fulfilled.
– The switch as DHCP client received a configuration file name or a
TFTP URL.
– Force Configuration Download at Next Startup enabled by the boot
host dhcp command, or, the Startup Configuration file is empty.
See "Preparations for Using Auto Configuration from a TFTP Server" on
page 345.
NOTES:
• DHCP client never triggers the Auto-Update process from a TFTP server
after attempting (whether successfully or not) to auto-update/configure
configuration/image file from the USB drive. Dell PowerConnect 55xx Systems User Guide 343
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• If the auto process involved setting the IP address of the device from the
setup file, the auto process from the TFTP server can be triggered.
• If the USB drive contains a setup file, but that setup file does not include a
line that can be used for the current device, the DHCP client is able to
trigger the Auto-Update process from TFTP (because the USB process
never started at all).
Automatic DHCP IP Interface Assignment
The user can manually define a DHCP interface in the DHCP IPv4 page.
If the user does not do this, the switch automatically creates a DHCP
interface on the VLAN with the lowest VLAN ID that does not have an IP
address defined on it after boot if both of the following conditions are
fulfilled:
• There is no DHCP IP interface.
• There is a VLAN without an IP address.
Preparations for Using Auto Update/Configuration from a USB Drive
Before Auto-Update/Configuration from a USB drive can be performed, the
following steps must be performed:
1. Enable Auto-Update/Configuration in the Auto Update of
Configuration/Image File page.
2. (Optional) Create a line in the setup file for this device containing the
required options and load it on the USB key.
3. Load configuration/image files on the USB key as required.
4. Insert the USB key in the USB drive and reboot the device.
Performing Auto-Update from a USB Drive
When Auto-Update is initiated from a USB drive, the following steps are
performed:
1. Locate the correct setup file—The USB drive is searched for a setup file.
One of the following can occur:
– Setup file is not found—The root folder of the USB is searched for an
image files (with .ros extension).
• The image file with the most recent version is loaded into the
image file if the versions are different.344 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• If a new image file was loaded, the device is rebooted.
• The USB drive is searched for a configuration file (.text
extension). If there is more than one configuration file, the file
named powerconnect.text is loaded (if it is not found the process
is stopped).
– One or more setup files are found—If a single setup file is found, it is
used; if several files are found, the file powerconnect.setup is used. If
no setup file with this name is found, the process is stopped.
2. Find the line in the setup file relevant to the device—When the correct
setup file is found, it is searched for a line relevant to the device, as
follows:
– The setup file is searched for a line with format A or B in which there
is a match to the device's MAC address. If such line is found, and its
format is valid (the field is empty), the line is applied.
– If no line for the specific device was found, the setup file is searched
for valid lines with formats C or D. The first line found is applied.
3. Apply the correct line—When the correct line in the setup file is found,
it is applied, as follows:
– If the line contains an IP address and IP mask, the IP address is
configured on the default VLAN.
– If the line contains an image file and its version differs from the
current image file version, the USB image file is loaded and the switch
is rebooted.
– If a new image file was loaded, it is loaded onto all units in the stack.
– If the line contains a configuration file, the configuration file is
appended to running configuration file.
4. Mark the flag in the applied line—When the line is applied (successfully
or not), its flag is set, as follows:
– If the line contains an IP address and IP mask (format C or D), the IP
address is configured on the default VLAN and the line is marked as
"in-use". This ensures that the line is not used for another device.
– If the line was not applied successfully, for one of the following
reasons, the line is marked as "invalid" and a SYSLOG message is sent.Dell PowerConnect 55xx Systems User Guide 345
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• The configuration file specified by the line does not exist on the
USB key or is corrupted.
• The image file specified by the line does not exist on the USB key
or is corrupted.
– If parsing of the line failed for some other reason, the line is ignored
and a SYSLOG message is sent.
NOTE: When both Auto-Update and Auto-Configuration are performed, the image
file is loaded first, the device is booted and then the configuration file is loaded.
Preparations for Using Auto Configuration from a TFTP Server
The Auto-Update/Configuration feature enables configuring the device from
a configuration file found on the TFTP server.
Two methods may be used:
• One-file Read, described in "Auto Configuration (One File Read Method)"
on page 345. This method is used if a configuration file is found on the
TFTP server.
• Multi-file Read, described in "Auto Configuration (Multi File Read
Method)" on page 346. This method is used if a configuration file name is
not found on the DHCP server, or the configuration file is not found on
the TFTP server.
Auto Configuration (One File Read Method)
This method requires the following preparations on the DHCP and TFTP
servers:
• TFTP Server
Place a configuration file, for example config.txt in the main directory.
This file can be created by copying a configuration file from a device.
When the device is booted this becomes the Running configuration file.
• DHCP Server
– Configure the DHCP server with option 67 and the name of the
configuration file on the TFTP server (for example, config.txt).
– Configure the DHCP server with option -20 or 66. This is the IP
address of the TFTP server.346 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Device - On the device, one of the following cases may exist:
– If Configuration Auto-Config is selected, the device is configured
with the configuration file on the TFTP server only if the Startup
configuration file is empty.
– If Force Configuration Download at Next Startup is selected, the
device is configured with the configuration file on the TFTP server
whether the Startup configuration file is not empty or not.
Auto Configuration (Multi File Read Method)
If the one-file method has failed and the TFTP Server IP address has been
provided by the DHCP Server, the switch applies the multi-file method to
download the configuration file. The following steps are performed by the
switch:
• The switch gets the hostname, as described below.
– If the hostname was provided by the DHCP server, this hostname is
used.
– If the hostname has not been provided by a DHCP server, and if the
user has configured the sysName variable, its value is used as a
hostname.
– If neither of the above occurred, the switch uses the fp-net.cfg
Filename List on the TFTP server. Each file in this list is a text file
containing commands, each of which:
• Occupies one line.
• Has the following format: ip host hostname ip-addr. Each line
maps an IP address to a hostname. When the switch identifies its
own IP address in this list, the hostname associated with it is used.
• The switch tries to download a configuration file with the following names:
– hostname-config
– hostname.cfg if the previous file does not exist
– host.cfg if the previous files do not existDell PowerConnect 55xx Systems User Guide 347
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Preparations for Firmware Image Download from TFTP
The image file download consists of the following steps:
• The switch downloads the Indirect Image File and extracts from it the
name of the image file.
Note: If the size of the image name bigger than 160 octets only the first
160 octets will be used
• If the image file version differs from the current image file version, then
the image file is loaded and the switch is rebooted.
The preparations on the DHCP and TFTP servers require the following:
• TFTP Server
– Create a sub directory in the main directory. Place a software image
file in it.
– Create an indirect file that contains a path and the name of the
software version (for example indirect-contax.txt that contains
contax\contax-version.ros).
– Copy this file to the TFTP server’s main directory
• DHCP Server
– Configure the DHCP server with option -20 or 66. This is the IP
address of the TFTP server.
– Configure the DHCP server with option 125. Enter the following
information:
• A2-02-00-00 — Enterprise Number 674 (Dell PowerConnet 55xx
value). It should be written from right to left. 674=02 a2
• 15 — Data Length
• 01 — Sub option code 1 (Dell PowerConnet 55xx value)
• 13 — Sub option length
• Conversion of the file name (in the above example: conversion of
indirect-contax.txt from ASCII to HEX - 69-6E-64-69-72-65-63-
74-2D-63-6F-6E-74-61-78-2E-74-78-74348 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Auto Update Configuration through the GUI
To set the auto update and configuration parameters:
. NOTE: For the automatic options in this page to work the following must be
implemented:
• Since Auto-Config depends on retrieving information from a DHCP server, the
startup configuration needs to include a DHCP IP interface. The device is
defined as a DHCP client, as described in "DHCP IPv4 Interface" on page 214.
After reboot, this command is not saved in the Startup configuration.
• Preparations described above must be completed on the DHCP server and
TFTP servers.
1 Click System > File Management > Auto Update of
Configuration/Image File in the tree view to display the Auto Update of
Configuration/Image File page.
Figure 9-54. Auto Update of Configuration/Image File
The auto-update-configuration options are displayed.
2 Modify the auto-update configuration parameters as required:
– Configuration Auto-Config (boot host auto-config)— Enable/disable
automatic download of the configuration parameters to the Running
Configuration file. By default, this occurs only if the Startup
Configuration file is empty.
– Firmware Auto-Update (boot host auto-update)— Enable/disable
automatic download of the image file. Dell PowerConnect 55xx Systems User Guide 349
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Force Configuration Download at Next Startup (boot host dhcp) —
Enable/disable the Configuration Auto Update option to work even if
the Startup Configuration file is not empty.
– Auto-Copy Running Configuration to Startup Configuration After
Download (boot host auto-save)— Enable/disable the Running
Configuration file to be automatically copied to the Startup
Configuration file after downloading the Running Configuration file.
Auto Update Configuration Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Auto Update of Configuration/Image File page.
Table 9-63. Auto Update of Configuration/Image File CLI Commands
CLI Command Description
boot host auto-config
no boot host auto-config
Enables the support of autoconfiguration via DHCP.
Use the no form of this command to
disable DHCP auto configuration.
boot host auto-update
no boot host auto-update
Enables the support of auto-update via
DHCP.
Use the no form of this command to
disable DHCP auto configuration
boot host dhcp
no boot host dhcp
Forces the mechanism used to
download a configuration file at the
next system startup.
Use the no form of this command to
restore the host configuration file to the
default.
boot host auto-save
no boot host auto-save
Enables automatic saving of Running
configuration in Startup configuration
after download.
Use the no form of this command
restore default behavior
show boot Shows the status of the IP DHCP Auto
Config process.350 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI command to view the Auto-Update
status:
The following is an example of the CLI command to configure auto-update
on the switch:
console# show boot
Auto Config
-----------
Config Download via DHCP: enabled
Next Boot Config Download via DHCP: force
Auto Update
-----------
Image Download via DHCP: enabled
console# configure
console(config)# boot host auto-save
console(config)# interface vlan 1
console(config-if)# ip address dhcp
console(config-if)# 01-Oct-2006 15:19:51 %BOOTP_DHCP_CL-WDHCPIPCANDIDATE: The device is waiting for IP address
verification on interface Vlan 1 , IP 10.5.225.47, mask
255.255.255.224, DHCP server 10.5.224.25
01-Oct-2006 15:20:03 %BOOTP_DHCP_CL-I-DHCPCONFIGURED: The
device has been configured on interface Vlan 1 , IP
10.5.225.47, mask 255.255.255.224, DHCP server 10.5.224.25
01-Oct-2006 15:20:03 %COPY-I-FILECPY: Files Copy - source
URL tftp://10.5.224.4/33.txt destination URL runningconfig
01-Oct-2006 15:20:03 %COPY-N-TRAP: The copy operation was
completed successfully
01-Oct-2006 15:20:03 %COPY-I-FILECPY: Files Copy - source
URL running-config destination URL flash://startup-config
01-Oct-2006 15:20:10 %COPY-N-TRAP: The copy operation was
completed successfullyDell PowerConnect 55xx Systems User Guide 351
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
File Download
Software and configuration files can be downloaded from an external device
to the switch:
• To download from a USB port or when management computer uses HTTP
• To download files using TFTP
To download from a USB port or when management computer uses HTTP
1 Click System > File Management > File Download in the tree view to
display the File Download page.
Figure 9-55. File Download
2 For HTTP, enter the IP Format fields for the HTTP server IP address.
– Supported IP Format — Select whether IPv4 or IPv6 format is
supported.
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.352 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
3 Select a Firmware/Configuration option. The possible options are:
– Firmware Download — A firmware file is downloaded.
– Configuration Download — A configuration file is downloaded.
4 Select to download firmware or a configuration file via a USB port or
HTTP in Download Protocol.
5 If the Firmware Download option was selected, enter the following:
– Source File Name (1-64 characters) — The file to be downloaded.
– Destination File Type — The destination file type to which the file is
downloaded. The possible options are:
• Software Image — Downloads the Image file. The image file
overwrites the non-active image. It is recommended to designate
that the non-active image becomes the active image after reset,
and then to reset the device following the download. During the
Image file download a dialog box opens that displays the
download progress, and browsing is disabled.
• Boot Code — Downloads the Boot file.
6 If the Configuration Download option was selected, enter the following:
– Server IP Address — Enter the IP address of the server.
– Source File Name (1-64 Characters) — Enter the source file name.
– Destination File Name — Select the destination file to which the
configuration file is downloaded. The possible options are:
• Running Configuration — Check to download commands into
the Running Configuration file. The current file is overwritten.
• Startup Configuration — Check to download commands into the
Startup Configuration file. The current file is overwritten.
• New File Name (1-64 Characters) — Check to copy commands
into a file in flash memory. Enter the filename.Dell PowerConnect 55xx Systems User Guide 353
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
7 Click Activate to start the download process.
To download files using TFTP
1 Click System > File Management > File Download in the tree view to
display the File Download page.
Figure 9-56. File Download
2 Enter the IP Format fields for the TFTP server IP address.
– Supported IP Format — Select whether IPv4 or IPv6 format is
supported.
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.354 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
3 Select a Firmware/Configuration option. The possible options are:
– Firmware Download — A firmware file is downloaded.
– Configuration Download — A configuration file is downloaded.
4 Select to download firmware or a configuration file via a TFTP server in
Download Protocol.
5 If the Firmware Download option was selected, enter the following:
– Server IP Address — The IP address of the server from which the
firmware file is downloaded.
– Source File Name (1-64 characters) — The file to be downloaded.
– Destination File Type — The destination file type to which the file is
downloaded. The possible options are:
• Software Image — Downloads the Image file. The image file
overwrites the non-active image. It is recommended to designate
that the non-active image becomes the active image after reset,
and then to reset the device following the download. During the
Image file download a dialog box opens that displays the
download progress. The window closes automatically when the
download is complete.
• Boot Code — Downloads the Boot file.
6 If the Configuration Download option was selected, enter the following:
– Server IP Address — The TFTP server IP address from which the
configuration files are downloaded.
– Source File Name (1-64 characters) — The configuration file to be
downloaded. Dell PowerConnect 55xx Systems User Guide 355
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Destination File Name — The destination file to which the
configuration file is downloaded. The possible options are:
• Running Configuration — Check to download commands into
the Running Configuration file. The current file is overwritten.
• Startup Configuration — Check to download commands into the
Startup Configuration file. The current file is overwritten.
• New File Name (1-64 characters) — Check to download
commands into a configuration backup file. Enter the filename.
7 Click Activate to start the download process.
Downloading Files Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the File Download page.
The following is an example of the CLI command:
NOTE: Each exclamation mark (!) indicates that ten packets were successfully
transferred.
File Upload
Software and configuration files can be uploaded to an external device.
• To upload from a USB port or when management computer uses HTTP
• To upload a file or image using TFTP
Table 9-64. File Download CLI Commands
CLI Command Description
copy source-url destinationurl
Copies files from a source to a
destination.
console# copy tftp://10.6.6.64/pp.txt startup-config
....!
Copy: 575 bytes copied in 00:00:06 [hh:mm:ss]
01-Jan-2000 06:41:55 %COPY-W-TRAP:
The copy operation was completed successfully 356 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following methods can be used:
• To upload from a USB port or when management computer uses HTTP
• To upload a file or image using TFTP
To upload from a USB port or when management computer uses HTTP
1 Click System > File Management > File Upload in the tree view to
display the File Upload page.
Figure 9-57. File Upload
2 Configuration Upload is selected automatically.
3 Select to upload a configuration file when the management computer is
using HTTP or from a USB port in Download Protocol.
4 Enter the fields:
– Transfer File Name — The configuration file to which the
configuration is uploaded. The possible options are:
• Running Configuration — Uploads the Running Configuration
file.
• Startup Configuration — Uploads the Startup Configuration file.
5 Click Activate to start the upload process. A message will be displayed
asking where for the path of the destination file.Dell PowerConnect 55xx Systems User Guide 357
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To upload a file or image using TFTP
1 Click System > File Management > File Upload in the tree view to
display the File Upload page.
Figure 9-58. File Upload
2 Enter the IP Format fields for the TFTP server IP address.
– Supported IP Format — Select whether IPv4 or IPv6 format is
supported.
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.358 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
3 Select one of the options:
– Firmware Upload — A firmware file is uploaded.
– Configuration Upload — A configuration file is uploaded.
4 Select to upload firmware or a configuration file via a TFTP server in
Download Protocol.
5 If Firmware Upload was selected, enter:
– TFTP Server IP Address — The TFTP server IP address to which the
software image is uploaded.
– Destination File Name (1-64 Characters) — The file name to which
the file is uploaded.
6 If Configuration Upload was selected, enter:
– TFTP Server IP Address — The TFTP server IP address to which the
configuration file is uploaded.
– Destination File Name (1-64 Characters) — The configuration file
name/path to which the file is uploaded.
– Transfer File Name — The configuration file that is uploaded. The
possible options are:
• Running Configuration — Uploads the Running Configuration
file.
• Startup Configuration — Uploads the Startup Configuration file.
• User-defined Files —Uploads the selected file. A user-defined
file is only displayed in this list if one was previously created by a
user, for example, if the user copied the running configuration file
to a user-defined configuration file called BACKUP-SITE-1, the
BACKUP-SITE-1 configuration file is displayed in the list and can
be selected.
7 Click Activate to start the upload process.Dell PowerConnect 55xx Systems User Guide 359
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Uploading Files Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the File Upload page.
The following is an example of the CLI commands:
Table 9-65. File Upload CLI Commands
CLI Command Description
copy source-url destination-url Copies any file from a source to a
destination.
console# copy image tftp://10.6.6.64/uploaded.ros
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Copy: 4234656 bytes copied in 00:00:33 [hh:mm:ss]
01-Jan-2000 07:30:42 %COPY-W-TRAP:
The copy operation was completed successfully360 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Active Images
There are two firmware images, Image1 and Image2, stored on the switch.
One of these images is identified as the active image, and the other is
identified as the inactive image. The switch boots from the active image.
You can switch the inactive image to the active image, and then reboot the
switch.
The active image file for each unit in the stack can be individually selected.
To select the image file to be used after reset:
1 Click System > File Management > Active Images in the tree view to
display the Active Images page.
Figure 9-59. Active Images
The following fields are displayed:
– Unit ID — ID of the unit.Dell PowerConnect 55xx Systems User Guide 361
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Active Image — The name of the image file that is currently active on
the unit in the stack.
– After Reset — The image file that will be active on the unit in the
stack after the device is reset. The possible options are:
• Image 1 — Activates Image file 1 after the device is reset.
• Image 2 — Activates Image file 2 after the device is reset.
2 Click Apply to select the image file to be used after reset in After Reset.
Working with the Active Image File Using CLI Commands
The following table summarizes the CLI commands for viewing fields
displayed in the Active Images.
The following is an example of the CLI commands:
Copy Files
Firmware and configuration files can be copied between units in the stack.
Use the Copy Files page to perform the following:
• Copy the firmware on the Master unit to another unit in the stack.
• Copy the master Running Configuration file to the master sTartup
Configuration file, or copy the configuration to a user-defined
configuration file.
• Copy the master Startup Configuration file to a backup file on the Flash
file system or to a USB if available.
Table 9-66. Active Image CLI Commands
CLI Command Description
boot system {image-
1|image-2} [switch
number|all]
Sets the system image that the device loads at
startup.
show version [unit
unit]
Displays version information for the system
console# boot system image-1 all362 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Copy a configuration file to the Running Configuration file. It is
important to be aware that copying a file to the Running Configuration
file actually executes these commands, so some of the configuration
commands might fail (for example when trying to create a VLAN that is
already defined on the system).
• Restore configuration factory defaults.
To copy files:
1 Click System > File Management > Copy Files in the tree view to display
the Copy Files page.
Figure 9-60. Copy Files
2 To copy the firmware from the Master unit to the Backup Master unit or to
all other units, select Copy Master Firmware and select the options:
– Source— Select either the current Master unit’s software image file or
boot code file.Dell PowerConnect 55xx Systems User Guide 363
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Destination Unit — Check to copy the firmware to either the Backup
Master unit or all units in the stack.
3 To copy the Running Configuration file of the Master unit to the Startup
Configuration file of the Master unit or vice versa, select Copy
Configuration Firmware and enter the options:
– Source — Select either the Running Configuration or the Startup
Configuration file.
– Destination — Select either the Running Configuration, Startup
Configuration file or user-created flash files, depending on the source
configuration file.
or
– New File Name (1-64 characters) — To copy the source file to a
user-named file, enter the name of a file. If this option is selected,
check where the file is stored: Flash or USB.
4 Select Restore Configuration Factory Defaults to replace the current
configuration settings by the factory configuration default settings.
5 Click Activate to initiate the selected process.
Copying Files Using CLI Commands
The following table summarizes the CLI commands for performing actions
provided by the Copy Files page.
Table 9-67. Copy Files CLI Commands
CLI Command Description
copy source-url destination-url Copies any file from a source to a
destination.
delete startup-config Deletes the startup-config file.
delete url Deletes a file from the FLASH
memory device.364 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console# delete startup-config
Delete startup-config [y/n]? y
console# 01-Oct-2006 16:10:51 %FILE-I-DELETE: File Delete -
file URL flash://startup-config
console# copy running-config startup-config
Overwrite file [startup-config] ?[Yes/press any key for
no]....01-Oct-2006 16:11
:47 %COPY-I-FILECPY: Files Copy - source URL running-config
destination URL flash://startup-config
01-Oct-2006 16:12:01 %COPY-N-TRAP:
The copy operation was completed successfully
Copy succeededDell PowerConnect 55xx Systems User Guide 365
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
File System
Use the File System page to view information about files currently stored on
the system, including file names, file sizes, files modifications, and file
permissions. The files system permits managing up to two user-defined
backup configuration files.
To view information about files:
1 Click System > File Management > File System in the tree view to
display the File System page.
Figure 9-61. File System
2 Select the File Location. The possible options are:
– Flash — Files in flash memory are displayed.
– USB — Files on the USB device are displayed. 366 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following information is displayed for all files in the system:
– File Name — The name of the file currently stored in the file
management system.
– Size — The file size.
– Modified — The date the file was last modified.
– Permission — The permission type assigned to the file.
3 The following system-wide information is displayed if Flash was selected:
– Total Bytes — The total amount of the space currently being used.
– Free Bytes — The remaining amount of space currently free. Total
bytes and free bytes are not available when selecting USB.
4 To rename a file, click its Rename button. Change the File Name.
Managing Files Using CLI Commands
The following table summarizes the CLI command for viewing system files.
The following is an example of the CLI commands:
Table 9-68. File Management CLI Command
CLI Command Description
dir [flash://|usb://] Display list of files on a flash file system
rename url new-url Renames a file
delete url Deletes a file
console# dir flash://
Directory of flash:
File Name Permission Flash Size Data Size Modified
-------------- ---------- ---------- --------- -----------------------
1.cfg rw 524160 14065 05-Oct-2006 21:20:36
2.cfg rw 524160 14065 7-Oct-2006 09:11:07
aaafile.prv -- 65520 -- 03-Oct-2006 15:45:41
dhcpdb.sys r- 65520 -- 01-Oct-2006 19:22:49
Total size of flash: 16121856 bytes
Free size of flash: 524768 bytesDell PowerConnect 55xx Systems User Guide 367
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Stack Management
This section describes how to manage the stack.
It consists of the following topics:
• Stack Management Overview
• Stack Unit ID
• Versions
• Reset
• Unit Identification (Location)
Stack Management Overview
A stack consists of up to eight units, with support for up to 400 network ports.
Unit 1 usually acts as the stack master and Unit 2 is the backup master. All
other units act as slaves.
The entire stack, without regard to the stack topology or the number of units
in the stack, can be managed as a single switch.
For more information about stacking, see "Stacking Overview" on page 45.
The stacking pages described in this section enable the following actions:
• Switching from the Master unit to the Backup Master unit
• Changing unit IDs
• Viewing hardware and software versions on each unit
• Resetting either a unit or all the units in the stack
• Setting the Location LED on a unit(s)
Stack Unit ID
Use the Stack Unit ID pages to:
• Switch stack control from the Master unit to the Backup Master unit
• Change unit IDs, or enable them to be automatically numbered by the
system368 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To switch from the Backup Master unit to the Master Unit or set unit IDs:
1 Click System > Stack Management > Stack Unit ID in the tree view to
display the Stack Unit ID page.
Figure 9-62. Stack Unit ID
2 Enter the fields:
– Switch Stack Control from Unit 1 to Unit 2 — Check this field to
make unit 2 the Master unit.
– Unit ID After Reset — Select Auto if you want the system to assign
the unit ID after reset. Select a number to assign the unit an ID
manually.Dell PowerConnect 55xx Systems User Guide 369
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Managing Stacks Using the CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Stack Unit ID page.
The following is an example of the CLI commands:
Table 9-69. Stack Unit ID CLI Commands
CLI Command Description
stack master unit
no stack master
Makes the unit specified be the Master unit.
Use the no version to restore the default
Master unit.
switch current-unit-number
renumber new-unit-number
Changes the unit ID of a specific unit.
console(config)# stack master unit 2
console(config)# switch 3 renumber 6370 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Versions
To view the hardware and software versions currently running on the switch:
• Click System > Stack Management > Versions in the tree view to display
the Versions page.
Figure 9-63. Versions
The following fields are displayed:
– Unit ID — The unit number for which the device versions are
displayed.
– Software Version — The current software version running on the
device.
– Boot Version — The current Boot version running on the device.
– Hardware Version — The current device hardware version.Dell PowerConnect 55xx Systems User Guide 371
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Displaying Device Versions Using the CLI
The following table summarizes the CLI commands for viewing fields
displayed in the Versions page.
The following is an example of the CLI commands:
Reset
Use the Reset page to reset the device from a remote location.
To reset a unit in the stack:
1 If changes were made to the Running Configuration file, save them to the
Startup Configuration file before resetting the device. This prevents the
current device configuration from being lost. For more information about
saving Configuration files, see "Copy Files" on page 361.
Table 9-70. Versions CLI Commands
CLI Command Description
show version [unit-id] Displays system version information for a
unit or for the whole stack.
console> show version 2
Unit SW Version Boot Version HW Version
---- ------------- ------------- ------------
2 1.0.0.8 1.0.0.02 00.00.01372 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Click System > Stack Management > Reset in the tree view to display the
Reset page.
Figure 9-64. Reset
3 In the Reset Unit ID field, select either the unit ID to be reset or Stack to
reset all the units in the stack.
Resetting the Device Using the CLI
The following table summarizes the CLI commands for performing a reset of
the device via the CLI:
Table 9-71. Reset CLI Command
CLI Command Description
reload [slot unit]
Reloads the operating system of a single unit or of
all the units.Dell PowerConnect 55xx Systems User Guide 373
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI command:
Unit Identification (Location)
The Location LED on a unit helps you to discover a specific unit, or indeed,
all the units in a stack.
To light up the Location LED:
1 Click System > Stack Management > Unit Identification in the tree
view to display the Unit Identification page.
Figure 9-65. Unit Identification
console# reload
You haven't saved your changes. Are you sure you want to
continue? (Y/N)[N] Y
This command will reset the whole system and disconnect
your current session. Do you want to continue? (Y/N)[N]374 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Enter the fields:
– Identify Unit ID —Select a unit. This unit’s Location and Power LED
start blinking. Select All to cause the Location LEDs in all the units in
the stack to light up.
– Identification Duration (2-60) —Enter a time interval. The Location
and Power LED light up for this period of time.
Setting the Location LED Using the CLI
The following table summarizes the CLI commands for setting the Location
LED:
The following is an example of the CLI command:
Table 9-72. Location LED CLI Commands
CLI Command Description
system light [unit unitnumber] [duration seconds]
system light stop
Lights the location LED on a specific unit.
Use the no form of this command to
turn off the light.
console# system light unit 1Dell PowerConnect 55xx Systems User Guide 375
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
sFlow
This section describes sFlow monitoring of traffic.
It contains the following sections:
• sFlow Overview
• Workflow
• sFlow Receiver Settings
• sFlow Interface Settings
• sFlow Statistics
sFlow Overview
The sFlow feature enables collecting statistics using the sFlow sampling
technology, based on sFlow V5.
This sampling technology is embedded within switches and routers. It
provides the ability to continuously monitor traffic flows on some or all the
interfaces, simultaneously.
The sFlow monitoring system consists of an sFlow agent (embedded in a
switch or router or in a stand alone probe) and a central data collector, known
as the sFlow receiver.
The sFlow agent uses sampling technology to capture traffic and statistics
from the device it is monitoring. sFlow datagrams are used to forward the
sampled traffic and statistics to an sFlow receiver for analysis.
sFlow V5 defines:
• How traffic is monitored.
• The sFlow MIB that controls the sFlow agent.
• The format of the sample data used by the sFlow agent when forwarding
data to a central data collector. The device provides support for two types
of sFlow sampling: flow sampling and counters sampling. The following
counters sampling is performed according to sFlow V5 (if supported by
the interface):
– Generic interface counters (RFC 2233)
– Ethernet interface counters (RFC 2358)376 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Workflow
By default, flow and counter sampling are disabled.
To enable sFlow sampling:
1 Set the IP address of a receiver (also known as a collector) for sFlow
statistics. Use the sFlow Receivers Settings page for this.
2 Enable flow and/or counter sampling, direct the samples to a receiving
interface, and configure the average sampling rate. Use the sFlow
Interface Settings pages for this.
3 View and clear the sFlow statistics counters. Use the sFlow Statistics page
for this.Dell PowerConnect 55xx Systems User Guide 377
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
sFlow Receiver Settings
To set the sFlow receiver parameters:
1 Click System > sFlow > sFlow Receivers Settings in the tree view to
display the sFlow Receivers Settings: Summary page.
Figure 9-66. sFlow Receivers Settings: Summary
The sflow parameters are displayed.
2 To add a receiver (sflow analyzer), click Add and select one of the
pre-defined sampling definition indices in Index.
3 Enter the receiver’s address fields:
– Supported IP Format — Select whether IPv4 or IPv6 format is
supported. 378 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• None — Disable the ISATAP tunnel.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
– IP Address — Enter the receiver’s IP address.
4 Enter the fields:
– Syslog Port Number — Port to which SYSLOG message are sent.
– Maximum Header Size (Bytes) — Maximum number of bytes that
can be sent to the receiver in a single sample datagram (frame).
Adding an sFlow Receiver Using the CLI Commands
The following table summarizes the CLI commands for adding an sFlow
receiver.
Table 9-73. sflow Receiver CLI Commands
CLI Command Description
sflow receiver index {ipv4-
address|ipv6-address|hostname}
[port port] [max-datagram-size
bytes]
no sflow receiver index
Defines an sFlow receiver.
Use the no form of this command to
remove the definition of the receiver.
show sflow configuration
[port_id]
Displays the sFlow configuration for
ports that are enabled for Flow
sampling or Counters sampling.Dell PowerConnect 55xx Systems User Guide 379
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# sflow receiver 2 1.1.1.1 port 6343
console# show sflow configuration
Receivers
Index IP Address Port Max Datagram Size
----- -------------------- -------- ----------------
1 0.0.0.0 6343 1400
2 172.16.1.2 6343 1400
3 0.0.0.0 6343 1400
4 0.0.0.0 6343 1400
5 0.0.0.0 6343 1400
6 0.0.0.0 6343 1400
7 0.0.0.0 6343 1400
8 0.0.0.0 6343 1400
Interfaces
Interface Flow Counters Max Header Collector Index
Sampling Sampling Interval Size Sampling Counters
--------- --------- ----------------- ------------ ----------- ---------
gi1/0/1 1/2048 60 sec 128 1 1
gi1/0/2 1/4096 Disabled 128 0 2380 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
sFlow Interface Settings
To sample datagrams or counters from a port, the port must be associated
with a receiver. sFlow port settings can be configured only after a receiver has
been defined in the sFlow Receiver Settings pages.
To enable sampling and configure the port from which to collect the sFlow
information:
1 Click System > sFlow > sFlow Interface Settings in the tree view to
display the sFlow Interface Settings: Summary page.
Figure 9-67. sFlow Interface Settings: Summary
The sflow interface settings are displayed.
2 To associate an sFlow receiver with a port, click Add, and enter the fields:
– Interface — Select the unit/port from which information is collected.
– Flow Sampling — Enable/disable flow sampling. Flow sampling
cannot be disabled if Counters Sampling is disabled.Dell PowerConnect 55xx Systems User Guide 381
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Flow Sampling Average Sampling Rate(1024–1073741823) — If x is
entered, a flow sample will be taken for each x frames.
– Flow Sampling Receiver Index — Select one of the indices that was
defined in the sFlow Receivers Settings pages.
– Flow Sampling Maximum Header Size (20–256) — Maximum
number of bytes that should be copied from a sampled packet.
– Counters Sampling — Enable/disable counters sampling. Flow
sampling cannot be disabled if Flow Sampling is disabled
– Counters Sampling Interval (15–86400) — If x is entered, this
specifies that a counter sample will be taken for each x seconds.
– Counters Sampling Receiver Index — Select one of the indices that
was defined in the sFlow Receivers Settings pages.
Configuring sFlow Interfaces Using the CLI Commands
The following table summarizes the CLI commands for configuring sFlow
interfaces.
The following is an example of the CLI commands:
Table 9-74. sflow Interface CLI Commands
CLI Command Description
sflow flow-sampling rate
receiver-index [max-header-size
bytes]
no sflow flow-sampling
Enables sFlow Flow sampling and
configure the average sampling rate
of a specific port.
Use the no form of this command to
disable Flow sampling.
sflow counters-sampling interval
receiver-index
no sflow counters-sampling
Enable sFlow counters sampling and
to configure the maximum interval of
a specific port.
Use the no form of this command to
disable sFlow Counters sampling.
console(config)# interface gi2/0/3
console(config-if)#sflow flow-sampling 1024 1 382 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
sFlow Statistics
To view sFlow statistics:
1 Click System > sFlow > sFlow Statistics in the tree view to display the
sFlow Statistics page.
Figure 9-68. sFlow Statistics
The following sflow statistics per interface are displayed:
– Interface — Port for which sample was collected.
– Packets Sampled — Number of packets sampled.
– Datagrams Sent to Receiver — Number of sFlow sampling packets
sent.
2 Click Clear Statistics to clear the counters.Dell PowerConnect 55xx Systems User Guide 383
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Viewing sFlow Statistics Using the CLI
The following table summarizes the CLI commands for viewing sFlow
statistics:
The following is an example of the CLI commands:
Table 9-75. sFlow Statistics CLI Command
CLI Command Description
show sflow statistics
[port-id]
Displays sFlow statistics for ports that are
enabled for Flow sampling or Counters
sampling.
clear sflow statistics
[port-id]
Clears sFlow statistics for ports that are
enabled for Flow sampling or Counters
sampling.
console # show sflow statistics
Total sFlow datagrams sent to collectors: 100
Interface Packets Sampled Datagrams Sent to Collector
--------- ------- ------------------------------------
gi1/0/1 30 50
gi1/0/2 10 10
gi2/0/1 0 10
gi2/0/2 0 0384 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
10
Ports
This section describes how to configure port functionality.
It contains the following topics:
• Overview
• Jumbo Frames
• Green Ethernet Configuration
• Protected Ports
• Port Profile
• Port Configuration
• LAG Configuration
• Storm Control
• Port MirroringDell PowerConnect 55xx Systems User Guide 385
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Overview
This section includes a description of port features and describes the
following:
• Auto-Negotiation
• MDI/MDIX
• Flow Control
• Back Pressure
• Port Default Settings
Auto-Negotiation
Auto-negotiation enables automatic detection of speed, duplex mode and
flow control on all switching 10/100/1000BaseT ports. Auto-negotiation is
enabled on all ports by default.
Auto-negotiation is a mechanism established between two link partners to
enable a port to advertise its transmission rate, duplex mode and flow control
abilities to its partner. Both ports then operate at the highest common
denominator.
If connecting a Network Interface Card (NIC) that does not support autonegotiation or is not set to auto-negotiation, both the device switching port
and the NIC must be manually set to the same speed and duplex mode.
If the station, on the other side of the link, attempts to auto-negotiate with a
device 100BaseT port that is configured to full duplex, the auto-negotiation
results in the station attempting to operate in half duplex.
MDI/MDIX
The device supports auto-detection of straight-through and crossed cables on
all 10/100/1000BaseT ports. This feature is part of auto-negotiation and is
enabled when Auto-negotiation is enabled.
When the MDI/MDIX (Media Dependent Interface with Crossover) is
enabled, the automatic correction of errors in cable selection is possible, thus
making the distinction between a straight-through cable and a crossover cable 386 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
irrelevant. The standard wiring for end stations is known as MDI (Media
Dependent Interface), and the standard wiring for hubs and switches is known
as MDIX.
Flow Control
The device supports 802.3x flow control for ports configured to Full Duplex
mode. By default, this feature is enabled on all ports, and it can be disabled
per port.
Flow control creates a lossless link with no packet loss. The flow control
mechanism enables the receiving side to signal to the transmitting side that
transmission must temporarily be halted to prevent buffer overflow. This
signaling is done by sending PAUSE frames. The ports that receives pause
frames stops transmitting traffic.
Flow control on the device works in Receive-Only mode, meaning that the
interfaces with enabled flow control receive PAUSE frames, but do not send
them.
When flow control is enabled, the system buffers are allocated per port so
that if the buffers of one port are consumed, other ports will still have their
free buffers.
Back Pressure
The device supports back pressure for ports configured to Half Duplex mode.
By default, this feature is disabled, and it can be enabled per port. The
back-pressure mechanism prevents the sender from transmitting additional
traffic temporarily. The receiver may occupy a link so it becomes unavailable
for additional traffic.
Port Default Settings
Table 10-1 describes the port default settings.
Table 10-1. Port Default Settings
Function Default Setting
Port speed and mode 10/100/1000 BaseT copper: auto-negotiation
SFP+1000/10G Mbps full duplex, auto discovery
Port forwarding state EnabledDell PowerConnect 55xx Systems User Guide 387
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port tagging No tagging
Flow Control On
Back Pressure Off
Table 10-1. Port Default Settings (Continued)
Function Default Setting388 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Jumbo Frames
Jumbo frames are frames of up to 10 Kb in size. If Jumbo frames are not
enabled, the system supports a packet size of up to 1,632 bytes.
To enable jumbo frames:
1 Click Switching > Ports > Jumbo Frames in the tree view to display the
Jumbo Frames page.
Figure 10-1. Jumbo Frames
The current jumbo frames setting is displayed
2 Enable/disable jumbo frames in the New Setting (after reset) field.
NOTE: You must save the configuration and reboot the device in order to make jumbo
frames operational.Dell PowerConnect 55xx Systems User Guide 389
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Jumbo Frames Using CLI Commands
The following table summarizes the CLI commands for configuring Jumbo
frames.
The following is an example of the CLI commands:
Table 10-2. Jumbo Frames CLI Commands
CLI Command Description
port jumbo-frame
no port jumbo-frame
Enables jumbo frames on the device.
Use the no form of this command to disable
jumbo frames.
console(config)# port jumbo-frame390 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Green Ethernet Configuration
Green Ethernet is a name of a set of features that are designed to reduce the
power consumption of a device, and so make it environmentally friendly.
The Green Ethernet feature reduces overall power usage in the following
ways:
• Energy Efficient Ethernet — When using EEE, systems on both sides of
the link can disable portions of their functionality and save power during
periods of low link utilization. EEE is a hardware feature that is enabled by
default, and is transparent to users. This feature is defined per port,
regardless of their LAG membership.
• Short-Reach Mode — Power usage is adjusted to the actual cable length.
In this mode, the VCT (Virtual Cable Tester) length test is performed to
measure cable length. If the cable is shorter than a predetermined length,
the switch reduces the power used to send frames over the cable, thus
saving energy. This mode is only supported on RJ45 ports.
Power savings and current power consumption in Short Reach mode can
be monitored. The total amount of saved energy can be viewed as a
percentage of the power that would have been consumed by the physical
interfaces had they not been running in Green Ethernet mode.Dell PowerConnect 55xx Systems User Guide 391
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The above two energy saving modes must be enabled globally and then
configured per port.
Green Ethernet Configuration
To configure Green Ethernet settings:
1 Click Switching > Ports > Green Ethernet Configuration in the tree view
to display the Green Ethernet Configuration: Summary page.
Figure 10-2. Green Ethernet Configuration: Summary
2 The amount of energy saved from the last switch reboot is displayed in the
Cumulative Energy Saved field. This value is updated each time there is
an event that affects power saving. Click Reset to reset its value.
3 Enter the fields:
• Energy Efficient Ethernet — Globally enable/disable the Energy
Efficient Ethernet feature.
• Link Short-Reach Energy Saving Mode — Globally enable/disable
Short Reach mode.392 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Current Power Consumption — Displays the current power
consumption.
• Power Savings — Displays the percentage of power saved by running
in Green Ethernet mode.
4 Select a unit in the stack to display its power consumption parameters. Its
ports are displayed along with the following settings.
– Energy Efficient Ethernet
• Oper — Enabled or not on the port
• Remote Peer —Enabled or not on the remote peer
– Short-Reach
• Oper — Enabled or not on the port
• Fault Reason —Reason that short reach is not enabled
– Cable Length (Meter) — Length of cable.
5 Click LLDP Interface Details.
6 Select a unit in the stack. The following is displayed for each port on the
unit:
– Port — Port number.
– Oper — Displays the operational status of Green Ethernet.
– Resolved Tx Timer(μsec) — Integer that indicates the current
Tw_sys_tx is supported by the local system.
– Local Tx Timer(μsec) — Indicates the time (in micro seconds) that
the transmitting link partner waits before it starts transmitting data
after leaving Low Power Idle (LPI mode).
– Resolved Rx Timer(μsec) — Integer that indicates the current
Tw_sys_tx supported by the remote system.
– Local Rx Timer(μsec) — Indicates the time (in micro seconds) that
the receiving link partner requests that the transmitting link partner
waits before transmission of data following Low Power Idle (LPI
mode).
– Remote Tx Timer(μsec) — Indicates the local link partner’s
reflection of the remote link partner’s Tx value.Dell PowerConnect 55xx Systems User Guide 393
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Remote Rx Timer(μsec) — Indicates the local link partner’s
reflection of the remote link partner’s Rx value.
Configuring Green Ethernet Using CLI Commands
The following table summarizes the CLI commands for configuring Green
Ethernet.
Table 10-3. Green Ethernet CLI Commands
CLI Command Description
green-ethernet short-reach
no green-ethernet short-reach
Enables/disables Green Ethernet short
reach mode.
green-ethernet short-reach
force
no green-ethernet short-reach
force
Forces short-reach mode on an
interface.
Use the no form of this command to
return to the default.
green-ethernet short-reach
threshold cable-length
no green-ethernet short-reach
threshold
Set the maximum cable length for
applying short-reach mode.
Use the no form of this command to
return to the default.
green-ethernet power-meter
reset
Resets the power save meter.
eee enable
no eee enable
Enables the EEE mode globally. Can
be used globally or per interface.
Use the no format of the command to
disable the mode.
eee lldp enable
no eee lldp enable
Enables EEE support by LLDP on an
Ethernet port.
Use the no format of the command to
disable the support.
show eee Displays EEE information.394 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Protected Ports
Protected Port Overview
Protected ports provide Layer 2 isolation between interfaces (Ethernet ports
and LAGs) that share the same Broadcast domain (VLAN) with other
interfaces. This can be used to set up a group of ports that receive similar
services.
A protected port does not forward traffic (Unicast, Multicast, or Broadcast) to
any other protected port on the same switch.
A community is a group of protected ports. Protected ports within the same
community can forward traffic to each other.
The following types of ports can be defined:
• Protected Port — Can send traffic only to uplink ports.
• Community Port — A protected port that is associated with a community.
It can send traffic to other protected ports in the same community and to
uplink ports.
• Uplink Port — An uplink port is an unprotected port that can send traffic
to any port.
• Isolated Port — A protected port that does not belong to a community.
Port Protection is independent of all other features and configuration
settings. Two protected ports in a common VLAN cannot communicate with
each other.
Protected Port Restrictions
The following restrictions apply to protected ports:
• When a protected port is placed in a LAG, it loses its protected port
attribute and takes upon itself the LAG's protection attributes. When the
port is removed from the LAG, its attributes are re-applied.
• Mirrored traffic is not subject to protected ports rules.
• Routing is not affected by the protected port forwarding rule, so that if a
packet enters a protected port, it can be routed by the device to another
protected port.Dell PowerConnect 55xx Systems User Guide 395
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Protected Port Configuration
To configure protected ports and establish their communities:
1 Click Switching > Ports > Protected Ports in the tree view to display the
Protected Ports: Summary page.
Figure 10-3. Protected Ports: Summary
A summary of all the ports and their statuses is displayed.
2 Click Edit.
3 Select the unit and interface.
4 Enter values for the following fields:
• State — Select Protected/Unprotected to enable/disable port
protection.
• Community — Select the community to which to add the port, or
define the port as Isolated.396 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Protected Ports Using CLI Commands
The following table summarizes the CLI commands for configuring
protected ports.
The following is an example of the CLI commands:
Table 10-4. Protected Ports CLI Commands
CLI Command Description
switchport protected-port
no switchport protected-port
Isolates Unicast, Multicast, and Broadcast
traffic on a port at Layer 2 from other
protected ports on the same switch.
Use the no form of this command to
disable protection on the port.
switchport community
community
no switchport community
Associates a protected port with a
community
Use the no form of this command to
return to default.
show interfaces protectedports[gigabitethernet|tengiga
bitethernet] port-number
Displays protected ports configuration.
console(config)# interface gi1/0/3
console(config-if)# switchport protected-port
console(config-if)# switchport community 1Dell PowerConnect 55xx Systems User Guide 397
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Profile
Port profiles provide a convenient way to save and share a port configuration.
When a port profile, which is a set of CLI commands having a unique name,
is applied to a port, the CLI commands contained within the profile (macro)
are executed and added to the Running Configuration file.
Port profiles can be applied to a specific interface, a range of interfaces, or
globally.
There are two types of port profiles:
• User Defined — Enables the user to bundle configurations, as a port
profile, and then apply it to one or more interfaces at a time. Up to 20
user-defined macros can be supported. These can only be defined through
CLI commands.
• Built-In — Pre-defined macros that cannot be changed or deleted. The
device includes the following built-in macros:
– Global
– Desktop
– Phone
– Switch
– Router
– Wireless Configuration
Before a built-in profile can be applied to an interface, the global profile must
be applied. The global profile enables QoS Advanced mode, sets Advanced
mode parameters, CoS to queue mapping, and DSCP to queue mapping and
defines certain standard ACLs. Use the CLI command show parser macro
name profile-global to display the Global profile contents.398 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To assign a profile to a port:
1 Click Switching > Ports > Port Profile in the tree view to display the Port
Profiles: Summary page.
Figure 10-4. Port Profile: Summary
A summary of all the interfaces and their profiles is displayed.
2 To assign the Global profile to the system, check Run Global Profile.
Apply the global profile before applying a built-in interface profile.
3 To assign a profile to an interface, click Edit.
4 Select a unit/interface and a Assigned Profile. The Profile Description is
displayed.
5 Each profile requires entering various elements of VLAN information.
Enter the fields according to the profile:
– VLAN Port Mode — Displays the port mode applied to ports in the
profile.
– VLAN ID-Untagged (1-4094) — Enter the VLAN for untagged
traffic.
– VLAN ID-Tagged (1-4095) — Enter the VLAN for tagged traffic.Dell PowerConnect 55xx Systems User Guide 399
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Native VLAN ID(1-4094) — Enter the VLAN ID used for untagged
traffic to trunk ports, or check None.
The remaining fields on this page are display-only, and describe the port
configuration of the profile. The following fields are described:
Port Security fields:
– Mode — Learning mode. The possible options are:
• Classic Lock — Locks the port using the classic lock mechanism.
The port is immediately locked, regardless of the number of
addresses that have already been learned.
• Limited Dynamic Lock — Locks the port by deleting the
dynamic MAC addresses associated with the port. The port learns
up to the maximum addresses allowed on the port. Both
relearning and aging MAC addresses are enabled.
– Max Entries — Displays the maximum number of MAC addresses
that can be learned on the port.
– Action on Violation — Action to be applied to packets arriving on a
locked port. The possible options are:
• Discard — Discard the packets from any unlearned source.
• Forward — Forward the packets from an unknown source,
without learning the MAC address.
• Shutdown — Discard the packet from any unlearned source, and
shut down the port. Ports remain shutdown until they are
reactivated, or the device is reset.
Spanning Tree fields:
– Point-to-Point Admin Status — Displays whether a point-to-point
links is established. The possible options are:
• Enable — Enables the device to establish a point-to-point link, or
specifies for the device to automatically establish a point-to-point
link. To establish communications over a point-to-point link, the
originating PPP first sends Link Control Protocol (LCP) packets
to configure and test the data link. After a link is established and
optional facilities are negotiated as needed by the LCP, the
originating PPP sends Network Control Protocols (NCP) packets
to select and configure one or more network layer protocols. 400 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
When each of the chosen network layer protocols has been
configured, packets from each network layer protocol can be sent
over the link. The link remains configured for communications
until explicit LCP or NCP packets close the link, or until some
external event occurs. This is the actual switch port link type. It
may differ from the administrative state.
• Disable — Disables point-to-point link.
• Auto — The device automatically establishes a point-to-point
link.
– Fast Link — Displays whether Fast Link mode is enabled for the port.
If this is enabled, the Port State is automatically placed in the
Forwarding statewhen the port is up.
– BPDU Guard — Displays whether BPDU Guard is enabled on the
port.
Miscellaneous fields:
– Policy Name — Displays the name of a policy if one is defined on the
port.
– Auto Negotiation — Displays whether auto-negotiation is enabled on
the port. Auto-Negotiation enables a port to advertise its transmission
rate, duplex mode, and Flow Control abilities to other devices.
6 Click Apply Profile to apply the profile to the specified interface.
Configuring Port Profile Using CLI Commands
The following table summarizes the CLI commands for configuring port
profiles.
Table 10-5. Port Profiles CLI Commands
CLI Command Description
macro {apply|trace} macro-name
[parameter {value}] [parameter
{value}] [parameter {value}]
Applies a macro to an interface or
traces a macro configuration on an
interface.Dell PowerConnect 55xx Systems User Guide 401
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
Sample CLI Scripts
This section provides sample scripts of CLI commands. These particular
actions cannot be performed through the GUI, which only allows applying
built-in macros. These scripts describe how to create macros, display them
and apply them.
The following is a script that creates a global macro.
show parser macro
[{brief|description [interface
[gigabitethernet|tengigabitetherne
t] port-number|name macro-name}]
Displays the parameters for all
configured macros or for one
macro on the switch.
Switch(config) # interface gi1/0/2
Switch(config-if) # macro trace dup
Applying command… ‘duplex full’
Applying command… ‘speed auto’
Switch(config) # interface gi1/0/2
Switch(config-if) # macro apply duplex $DUPLEX full
$SPEED auto
Switch(config-if) # exit
Switch(config) # interface gi1/0/3
Switch(config-if) # macro apply dup
Switch(config-if) # exit
Table 10-6. Create a Global Macro Script
CLI Command Description
console#config
console(config)# macro name interswitch
Enter macro commands one per line. End
with the character '@'.
Create a macro called
interswitch.
Table 10-5. Port Profiles CLI Commands (Continued)
CLI Command Description402 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is a script that creates an interface macro.
vlan database
vlan 40-50
@
Enter the commands in
the macro, which create
VLANs 40 through 50.
console(config)# do show parser macro
name interswitch
Display the macro.
console(config)# macro global apply
interswitch
Apply the macro.
Table 10-7. Create an Interface Macro Script
CLI Command Description
console#config
console(config)# interface range gi1/0/1-
24
Enter Interface mode
for ports 1-24 on unit 1.
console(config-if-range)# macro name
access_port
Enter macro commands one per line. End
with the character '@'.
Create a macro called
access_port.
disable spanning-tree
@
Enter the commands in
the macro, disables
spanning tree on the
interfaces.
console(config)# do show parser macro
name access_port
Display the macro.
console(config)# macro global apply
access_port
Apply the macro to
ports 1-24 on unit 1.
Table 10-6. Create a Global Macro Script (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 403
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Configuration
If port configuration is modified while the port is a LAG member, the
configuration change is only effective after the port is removed from the
LAG.
To configure a port:
1 Click Switching > Ports > Port Configuration in the tree view to display
the Port Configuration: Summary page.
Figure 10-5. Port Configuration: Summary
All ports on the selected unit and their configuration settings are
displayed.
2 To modify the port settings, click Edit and select a port.
3 Enter the following fields:
– Description (1 - 64 Characters) — Enter a user identification
attached to the port.
– Port Type — Displays the type of port.
– Admin Status — Enable/disable traffic forwarding through the port.
• Up— Traffic is enabled through the port.404 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Down— Traffic is disabled through the port.
– Current Port Status — Displays whether the port is currently
operational or non-operational.
– Re-Activate Suspended Port — Check to reactivate a port if the port
has been disabled through the locked port security option.
– Operational Status — Displays the port operational status. The
possible options are:
• Suspended — Port is currently active, and is not receiving or
transmitting traffic.
• Active — Port is currently active, and is receiving and
transmitting traffic.
• Disable — Port is currently disabled, and is not receiving or
transmitting traffic.
– Admin Speed — Select the configured rate for the port. The port type
determines the available speed setting options. You can designate
Administrative Speed only when port auto-negotiation is disabled.
– Current Port Speed — Displays the actual synchronized port speed
(bps).
– Admin Duplex — Select the port duplex mode (this is only possible if
Auto Negotiation is not enabled). The options are:
• Full — The interface supports transmission between the device
and the client in both directions simultaneously.
• Half — The interface supports transmission between the device
and the client in only one direction at a time.
– Current Duplex Mode — Displays the synchronized port duplex
mode.
– Auto Negotiation — Select to enable auto-negotiation on the port.
Auto-Negotiation enables a port to advertise its transmission rate,
duplex mode, and Flow Control abilities to other devices.
• Energy Efficient Ethernet — Globally enable/disable Energy Efficient
Ethernet and the EEE LLDP advertisement feature.
– Current Auto Negotiation — Displays the current auto-negotiation
setting. Dell PowerConnect 55xx Systems User Guide 405
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Admin Advertisement — Check the auto-negotiation setting the port
advertises. The possible options are:
• Max Capability — The port advertises all the options that it can
support.
• 10 Half — The port advertises for a 10 mbps speed port and half
duplex mode setting.
• 10 Full — The port advertises for a 10 mbps speed port and full
duplex mode setting.
• 100 Half — The port advertises for a 100 mbps speed port and
half duplex mode setting.
• 100 Full — The port advertises for a 100 mbps speed port and full
duplex mode setting.
• 1000 Full — The port advertises for a 1000 mbps speed port and
full duplex mode setting.
• 10000 Full — The port advertises for a 10000 mbps speed port
and full duplex mode setting.
– Current Advertisement — Displays the port advertises its speed to its
neighbor port to start the negotiation process. The possible field
values are those specified in the Admin Advertisement field.
– Neighbor Advertisement — Displays the neighboring port’s
advertisement settings. The field values are identical to the Admin
Advertisement field values.
– Back Pressure — Enable/disable Back Pressure mode that is used with
Half Duplex mode to disable ports from receiving messages.
– Current Back Pressure — Displays the current Back Pressure setting.
– Flow Control — Set flow control on the port. The following options
are available:
• Enable/Disable — Enable/disable flow control on the port
(Enabled is the default).
• Auto Negotiation — Enables auto-negotiation of flow control on
the port.
– Current Flow Control — Displays the current Flow Control setting.406 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– MDI/MDIX — Select one of the options that enables the device to
decipher between crossed and uncrossed cables. Hubs and switches
are deliberately wired opposite to the way end stations are wired, so
that when a hub or switch is connected to an end station, a straight
through Ethernet cable can be used, and the pairs are match up
properly. When two hubs/switches are connected to each other, or two
end stations are connected to each other, a crossover cable is used
ensure that the correct pairs are connected. The possible options are:
• Auto — Use to automatically detect the cable type.
• MDIX — Use for hubs and switches.
• MDI — Use for end stations.
– Current MDI/MDIX — Displays the current device MDIX settings.
– LAG — Displays whether the port is part of a LAG.
Configuring Ports Using CLI Commands
The following table summarizes the CLI commands for configuring ports as
displayed in the Port Configuration pages.
Table 10-8. Port Configuration CLI Commands
CLI Command Description
eee enable
no eee enable
Enables the EEE mode globally.
Use the no format of the command
to disable the mode.
eee lldp enable
no eee lldp enable
Enables EEE support by LLDP on
an Ethernet port.
Use the no format of the command
to disable the support.
description string
no description
Adds a description to an interface
configuration.
Use the no form of this command to
remove the description.
shutdown
no shutdown
Disables an interfaces.
Use the no form of this command to
restart a disabled interface.Dell PowerConnect 55xx Systems User Guide 407
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
set interface active
{[gigabitethernet|tengigabitethe
rnet] interface|port-channel LAGnumber}
Reactivates an interface that is
shutdown.
speed {10|100|1000|10000}
no speed
Configures the speed of a given
Ethernet interface when not using
auto negotiation.
Use the no form of this command to
restore the default configuration.
duplex {half|full}
no duplex
Configures the full/half duplex
operation of a given Ethernet
interface when not using auto
negotiation.
negotiation [capability1
[capability2…capability5]
no negotiation
Enables auto negotiation operation
for the speed and duplex parameters
of a given interface.
Use the no form of this command to
disable auto-negotiation.
back-pressure
no back-pressure
Enables Back Pressure on a given
interface.
Use the no form of this command to
disable back pressure.
flowcontrol {auto|on|off}
no flowcontrol
Configures the flow control on a
given interface.
Use the no form of this command to
disable flow control.
mdix {on|auto}
no mdix
Enables automatic crossover on a
given interface or Port-channel.
Use the no form of this command to
disable cable crossover.
show interfaces configuration
[[gigabitethernet|tengigabitethe
rnet] port-number|port-channel
LAG-number]
Displays the configuration for all
configured interfaces.
Table 10-8. Port Configuration CLI Commands (Continued)
CLI Command Description408 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show interfaces advertise Displays the interface’s negotiation
advertisement settings.
show interfaces status
[[gigabitethernet|tengigabitethe
rnet] port-number|port-channel
LAG-number]
Displays the status for all configured
interfaces.
show interfaces description
[[gigabitethernet|tengigabitethe
rnet] port-number|port-channel
LAG-number]
Displays the description for all
configured interfaces.
console(config)# interface gi2/0/1
console(config-if)# description "RD SW#3"
console(config-if)# shutdown
console(config-if)# no shutdown
console(config-if)# speed 100
console(config-if)# duplex full
console(config-if)# negotiation
console(config-if)# back-pressure
console(config-if)# flowcontrol on
console(config-if)# mdix auto
console(config-if)# end
console# show interfaces configuration gi2/0/1
Flow Admin Back Mdix
Port Type Duplex Speed Neg control State Pressure Mode
-------- ------------ ------ ----- -------- ------- ----- -------- ----
gi2/0/1 1G-Copper Full 1000 Enabled Off Up Disabled Auto
console# show interfaces status gi2/0/1
Flow Link Back Mdix
Port Type Duplex Speed Neg ctrl State Pressure Mode
-------- ------------ ------ ----- -------- ---- ----------- -------- ----
gi2/0/1 1G-Copper -- -- -- -- Down -- --
Table 10-8. Port Configuration CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 409
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LAG Configuration
Use the LAG Configuration pages to configure LAGs. The device supports
up to 32 LAGs per system, meaning for all units in the stack. For information
about Link Aggregated Groups (LAGs) and assigning ports to LAGs, see
"Link Aggregation" on page 508.
To configure LAGs:
1 Click Switching > Ports > LAG Configuration in the tree view to display
the LAG Configuration: Summary page.
Figure 10-6. LAG Configuration: Summary
The LAG parameters are displayed.
2 To configure a LAG, click Edit.
3 Select the LAG and enter the fields:
– LAG Mode — Select the LAG mode. The possible options are:410 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Static — The ports comprise a single logical port for high-speed
connections between networking devices.
• LACP — Link Aggregate Control Protocol. LACP-enabled LAGs
can exchange information with other links in order to update and
maintain LAG configurations automatically.
– Description (0 - 64 Characters) — Enter a user-defined description of
the configured LAG.
– LAG Type — Displays the port types that comprise the LAG.
– Admin Status — Enable/disable the selected LAG.
– Current Status — Displays the LAG is currently operating.
– Admin Speed — Select the configured speed at which the LAG is
operating. The possible options are:
• 10M— The LAG is currently operating at 10 Mbps.
• 100M — The LAG is currently operating at 100 Mbps.
• 1000M — The LAG is currently operating at 1000 Mbps.
• 10000 Full— The LAG is currently operating at 1000 Mbps.
– Current Speed — Displays the speed at which the LAG is currently
operating.
– Admin Auto Negotiation — Enable/disable auto-negotiation, which is
a protocol between two link partners that enables a LAG to advertise
its transmission rate, duplex mode and flow control abilities to its
partner.
– Current Auto Negotiation — Displays the current auto-negotiation
setting.
– Admin Advertisement — If auto-negotiation is enabled, select the
auto-negotiation setting the LAG advertises. The possible options are:
• Max Capability — All LAG speeds and Duplex mode settings are
accepted.
• 10 Full — The LAG advertises for a 10 mbps speed LAG and full
duplex mode setting.
• 100 Full — The LAG advertises for a 100 mbps speed LAG and
full duplex mode setting.Dell PowerConnect 55xx Systems User Guide 411
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• 1000 Full — The LAG advertises for a 1000 mbps speed LAG and
full duplex mode setting.
– Current Advertisement — Displays the speed that the LAG advertises
to its neighbor LAG to start the negotiation process. The possible field
values are those specified in the Admin Advertisement field.
– Neighbor Advertisement — Displays the neighboring LAG
advertisement settings. The field values are identical to the Admin
Advertisement field values.
– Admin Flow Control — Enable/disable flow control on the LAG.
Flow Control mode is effective on the ports operating in Full Duplex
in the LAG. The possible options are:
• Enable — Enables flow control on the LAG (default).
• Disable — Disables flow control on the LAG.
• Auto Negotiation — Enables the auto-negotiation of flow control
on the LAG.
– Current Flow Control — Displays the current Flow Control setting.
Configuring LAGs Using CLI Commands
The following table summarizes the CLI commands for configuring LAGs as
displayed in the LAG Configuration pages.
Table 10-9. LAG Configuration CLI Commands
CLI Command Description
interface port-channel LAGnumber
Enters the interface configuration
mode of a specific LAG.
channel-group port-channel mode
{on|auto}
no channel-group
Sets a mode for a LAG.
Use the no form of this command
restore the default configuration.
description string
no description
Adds a description to a LAG.
Use the no form of this command to
remove the description.412 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
shutdown
no shutdown
Disables the LAG.
Use the no form of this command to
restart the LAG.
speed {10|100|1000|10000}
no speed
Configures the speed of the LAG
when not using auto negotiation.
Use the no form of this command to
restore the default configuration.
negotiation [capability1
[capability2…capability5]
no negotiation
Enables auto negotiation operation for
the speed and duplex parameters of a
LAG.
Use the no form of this command to
disable auto-negotiation.
flowcontrol {auto|on|off}
no flowcontrol
Configures the flow control on a given
LAG.
Use the no form of this command to
disable flow control.
show interfaces configuration
[port-channel LAG-number]
Displays the configuration for the
LAGs.
show interface advertise Displays the LAG’s negotiation
advertisement settings.
show interfaces status [portchannel LAG-number]
Displays the status for all configured
LAGs.
show interfaces description
[port-channel LAG-number]
Displays the description for all
configured LAGs.
show interfaces port-channel
[LAG-number]
Displays LAG information.
Table 10-9. LAG Configuration CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 413
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# interface port-channel 1
console(config-if)# no negotiation
console(config-if)# speed 100
console(config-if)# flowcontrol on
console(config-if)# exit
console(config)# interface port-channel 2
console(config-if)# shutdown
console(config-if)# exit
console(config-if)# end
console# show interfaces port-channel
Channel Ports
--------- ---------
ch1 Inactive: gi/1/0/(11-13)
ch2 Active: gi/1/0/14414 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Storm Control
When Broadcast, Multicast, or Unknown Unicast frames are received, they
are duplicated, and a copy is sent to all possible egress ports. This means that
in practice, they are sent to all ports belonging to the relevant VLAN. In this
way, one ingress frame is turned into many, creating the potential for a storm.
Storm protection provides the ability to limit the number of frames entering
the switch, and to define the types of frames that are counted towards this
limit.
When a threshold (limit) is configured on the device, the port discards traffic
when that threshold is reached. The port remains blocked until the traffic rate
drops below this threshold. It then resumes normal forwarding.
To configure Storm Control:
1 Click Switching > Ports > Storm Control in the tree view to display the
Storm Control: Summary page.
Figure 10-7. Storm ControlDell PowerConnect 55xx Systems User Guide 415
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Storm control parameters are displayed for all ports on the selected unit.
2 To configure Storm Control on a port, click Edit.
3 Select a port from the Port drop-down list and enter the following fields:
– Broadcast Control — Enable/disable forwarding Broadcast packets on
the specific interface.
– Broadcast Mode — Select the counting mode. The possible options
are:
• Multicast & Broadcast — Counts Broadcast and Multicast traffic
together towards the bandwidth threshold.
• Broadcast Only — Counts only Broadcast traffic towards the
bandwidth threshold.
– Broadcast Rate Threshold (3500-1000000) — Enter the maximum
rate (Kbits/sec) at which unknown packets are forwarded.
Configuring Storm Control Using CLI Commands
The following table summarizes the CLI commands for configuring Storm
Control as displayed on the Storm Control pages.
Table 10-10. Storm Control CLI Commands
CLI Command Description
storm-control includemulticast [unknown-unicast]
no storm-control includemulticast
Counts Multicast packets in the
Broadcast storm control.
Use the no form of this command to
disable counting of multicast packets in
the Broadcast storm control.
storm-control broadcast enable
no storm-control broadcast
enable
Enables Broadcast storm control.
Use the no form of this command to
disable Broadcast storm control.
storm-control broadcast level
kbps
no storm-control broadcast
level
Configures the maximum Broadcast
rate.
Use the no form of this command to
return the Broadcast level to the default
value.416 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show ports storm-control port Displays the storm control
configuration.
console(config)# interface gi1/0/1
console(config-if)# storm-control broadcast enable
console(config-if)# storm-control include-multicast
unknown-unicast
console# show ports storm-control gi1/0/1
Port State Rate [Kbits/Sec] Included
-------- -------- ---------------- ---------------------
gi1/0/1 Disabled 8500 Broadcast
Table 10-10. Storm Control CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 417
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Mirroring
Switches usually only forward frames to relevant ports. To monitor traffic,
either for information gathering, such as statistical analysis, or for
troubleshooting higher-layer protocol operation, the Mirroring feature
forwards frames to a monitoring port.
Mirroring provides the ability to specify that a desired destination (target)
port will receive a copy of all traffic passing through designated source ports.
The frames arriving at the destination port are copies of the frames passing
through the source port at ingress, prior to any switch action.
It is possible to specify several source ports to be monitored by a single target
port. However, in this case, the traffic sent to the target port is placed in the
target port's queues on a first come, first served basis, and any excess traffic is
silently discarded. This may mean that the traffic actually seen by any device
attached to the target port is an arbitrarily selected subset of the actual traffic
going through the source ports.
Port mirroring is only relevant to physical ports. Therefore, if you want a LAG
to function as the source of a port mirroring session, the member ports must
be individually specified as sources.
Up to four sources can be mirrored. This can be any combination of four
individual ports.
Before configuring Port Mirroring, note the following:
• Monitored ports cannot operate faster than the monitoring port.
• All Rx/Tx packets should be monitored to the same port.
Destination Port Restrictions
The following restrictions apply to destination ports:
• Destination ports cannot be configured as source ports.
• Destination ports cannot be a member of a LAG.
• IP interfaces cannot be configured on the destination port.
• GVRP cannot be enabled on the destination port.
• The destination port cannot be a member of a VLAN.
• Only one destination port can be defined.418 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• All QoS/CoS rules that apply to the destination port, as an egress, such as
traffic shaping, are suspended for the duration of the mirroring session.
Any such settings, configured on the port during the mirroring session,
take effect only after the port is no longer a destination port for a
mirroring session.
• Ingress mirrored packets may arrive at the ingress port either with an
802.1q tag or without. When the packets are mirrored to a port analyzer,
they should be transmitted as they are received on the ingress port.
However, in the device, the packet is transmitted out of the port analyzer
as always tagged or always untagged (user configurable), regardless of the
input encapsulation.
Source Port Restrictions
The following restrictions apply to ports specified as source ports:
• Source ports cannot be a member of a LAG.
• Source ports cannot be configured as a destination port.
• Up to four source ports can be mirrored.
NOTE: When a port is set to be a target port for a port-mirroring session, all normal
operations on it are suspended. This includes Spanning Tree and LACP. All currently
active protocols and services on that port are suspended.Dell PowerConnect 55xx Systems User Guide 419
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Mirroring
To specify source and destination ports for port mirroring:
1 Click Switching > Ports > Port Mirroring in the tree view to display the
Port Mirroring: Summary page.
Figure 10-8. Port Mirroring: Summary
The previously-defined source ports for the selected Destination Port are
displayed, along with the fields defined in the Add page and their status.
– Status — Indicates if the port is currently being monitored (Active) or
not being monitored (notReady), because of some problem.
2 To add a port to be mirrored, click Add, and enter the fields:
– Source Port — The port number from which port traffic is copied.
– Type — Type of traffic (Tx or Rx or both) to be copied.420 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Port Mirroring Using CLI Commands
The following table summarizes the CLI commands for configuring Port
Mirroring.
The following is an example of the CLI commands:
Table 10-11. Port Mirroring CLI Commands
CLI Command Description
port monitor srcinterface-id [rx|tx]
no port monitor srcinterface-id
Starts a port monitoring session. This must
be performed in Interface Configuration
mode, which is the destination interface.
Use the no form of this command to stop a
port monitoring session.
show ports monitor Displays the port monitoring status.
console(config)# interface gi1/0/1
console(config-if)# port monitor gi1/0/8
console# show ports monitor
Source port Destination Port Type Status
----------- ---------------- ---- -----------
gi1/0/1 gi1/0/8 RX,TX ActiveDell PowerConnect 55xx Systems User Guide 421
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY422 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
11
Address Tables
This section describes how MAC addresses are handled on the device.
It contains the following topics:
• Overview
• Static Addresses
• Dynamic AddressesDell PowerConnect 55xx Systems User Guide 423
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Overview
MAC addresses, associated with ports, are stored in the Static Address or the
Dynamic Address tables. Packets, addressed to a destination stored in one of
these tables, are forwarded to the associated port.
MAC addresses are dynamically learned when packets arrive at the device.
Addresses are associated with ports by learning the source address of the
frame. Frames, addressed to a destination MAC address that is not associated
with any port, are flooded to all ports of the relevant VLAN. In order to
prevent the bridging table from overflowing, dynamic MAC addresses, from
which no traffic is seen for a certain period, are erased.
Static addresses are manually entered into the table.424 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Static Addresses
Static addresses are manually assigned to a specific interface and VLAN on
the switch. If a static address is seen on another interface, the address is
ignored and it is not written to the address table.
To define a static address:
1 Click Switch > Address Tables > Static Address Table in the tree view to
display the Static Address Table: Summary page.
Figure 11-1. Static Address Table
A list of the currently-defined static addresses is displayed.
2 To add a static address, click Add.
3 Enter the following fields:
• Interface — Select a port or LAG for the entry.
• MAC Address — Enter the interface MAC address.
• VLAN ID — Check and select the VLAN ID for the port.
or
• VLAN Name — Check and enter the VLAN name.
• Status — Select how the entry in the table will be treated. The
possible options are:Dell PowerConnect 55xx Systems User Guide 425
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Permanent — The MAC address is never aged out of the table
and, if it is saved to the Startup Configuration, it is retained after
rebooting.
• Delete on Reset — The MAC address is deleted when the device
is reset.
• Delete on Timeout — The MAC address is deleted when a
timeout occurs.
• Secure — The MAC address is secure when the interface is in
classic locked mode.
To prevent Static MAC addresses from being deleted when the Ethernet
device is reset, ensure that the port attached to the MAC address is locked.
Configuring Static Addresses Using CLI Commands
The following table summarizes the CLI commands for configuring static
address parameters as displayed in the Static Address Table pages.
Table 11-1. Static Address CLI Commands
CLI Command Description
mac address-table static macaddress vlan vlan-id interface
{[gigabitethernet|tengigabitethern
et] port-number|port-channel LAGnumber} [permanent|delete-onreset|delete-on-timeout|secure]
no mac address-table static [macaddress] vlan vlan-id
Adds a MAC-layer station source
address to the MAC address
table.
Use the no form of this
command to delete the MAC
address.
show mac address-table
[dynamic|static|secure] [vlan
vlan]
[[[gigabitethernet|tengigabitether
net] port-number|port-channel LAGnumber]] [address mac-address]
Displays entries in the MAC
address table.426 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config-if)#bridge address 00:60:70:4C:73:FF
permanent gi1/0/8
console# show mac address-table static
Aging time is 300 sec
VLAN MAC Address Port Type
---- ------------------ -------- --------
1 00:60:70:4C:73:FF gi1/0/8 static
1 00:60:70:8C:73:FF gi1/0/8 static
200 00:10:0D:48:37:FF gi1/0/9 staticDell PowerConnect 55xx Systems User Guide 427
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Dynamic Addresses
The Dynamic Address Table contains the MAC addresses acquired by
monitoring the source addresses of traffic entering the switch. When the
destination address for inbound traffic is found in the database, the packets
intended for that address are forwarded directly to the associated port.
Otherwise, the traffic is flooded to all ports in the VLAN of the frame.
To prevent the table from overflowing and to make room for new addresses,
an address is deleted from the table if no traffic is received from a dynamic
MAC address for a certain period. This period of time is called the aging
interval.
To configure dynamic addresses:
1 Click Switch > Address Tables > Dynamic MAC Address in the tree view
to display the Dynamic Address page.
Figure 11-2. Dynamic Address Table
The current address table is displayed along with other parameters.
2 Enter Address Aging (10-630). The aging time is a value between the userconfigured value and twice that value minus 1. For example, if you entered
300 seconds, the aging time is between 300 and 599 seconds.428 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 To clear the table, check Clear Table.
4 To display a subset of the addresses in a particular order, enter the query
criteria and sort key under Query By, and click Query. The following fields
are displayed for entries matching the query criteria:
– VLAN ID — VLAN ID in the entry.
– MAC Address — Interface MAC address.
– Interface — Port or LAG associated with the MAC address.
Configuring Dynamic Addresses Using CLI Commands
The following table summarizes the CLI commands for configuring static
address parameters as displayed in the Dynamic Address Table pages.
Table 11-2. Dynamic Address CLI Commands
CLI Command Description
mac address-table aging-time
seconds
no mac address-table aging-time
Sets the aging time of the
address table.
Use the no form of this
command to restore the default.
clear mac address-table dynamic
[interface
[{[gigabitethernet|tengigabitether
net] port-number|port-channel LAGnumber}} [permanent|delete-onreset|delete-on-timeout|secure]]
clear mac address-table secure
interface
[gigabitethernet|tengigabitetherne
t] port-number|port-channel LAGnumber
Removes learned or secure
entries from the forwarding
database.
show mac address-table
[dynamic|static|secure] [vlan
vlan] [interface
[gigabitethernet|tengigabitetherne
t] port-number|port-channel LAGnumber] [address mac-address]
Displays entries in the MAC
address table.Dell PowerConnect 55xx Systems User Guide 429
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# mac address-table aging-time 600
console# show mac address-table dynamic
Aging time is 300 sec
VLAN MAC Address Port Type
---- ------------------ -------- --------
1 00:60:70:4C:73:FF gi1/0/8 dynamic
1 00:60:70:8C:73:FF gi1/0/8 dynamic430 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_GARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
12
GARP
This section describes how to configure Generic Attribute Registration
Protocol (GARP) on the device.
It contains the following topics:
• GARP Overview
• GARP TimersDell PowerConnect 55xx Systems User Guide 431
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_GARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
GARP Overview
Generic Attribute Registration Protocol (GARP) is a general-purpose protocol
that registers network connectivity or membership-style information. GARP
defines a set of devices interested in a given network attribute, such as VLAN
or Multicast address.
The Generic Attribute Registration Protocol (GARP) provides a generic
framework whereby devices in a bridged LAN, such as end stations and
switches, can register and de-register attribute values, such as VLAN
Identifiers, with each other. In doing so, these attributes are propagated to
devices in the bridged LAN, and these devices form a reachability tree that is
a subset of an active topology. GARP defines the architecture, rules of
operation, state machines and variables for the registration and deregistration
of attribute values.
When configuring GARP, ensure the following:
• The leave time must be greater than or equal to three times the join time.
• The leave-all time must be greater than the leave time.
• Set the same GARP timer values on all Layer 2-connected devices. If the
GARP timers are set differently on the Layer 2-connected devices, GARP
application does not operate successfully.432 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_GARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
GARP Timers
To enable a GARP timer on an interface:
1 Click Switching > GARP > GARP Timers in the tree view to open the
GARP Timers: Summary page.
Figure 12-1. GARP Timers: Summary
The GARP timers are displayed.
2 Click Edit.
3 Select an interface, and enter the fields:
– GARP Join Timer (10 - 2147483640) — Enter the time, in
milliseconds, during which Protocol Data Units (PDU) are
transmitted.
– GARP Leave Timer (10 - 2147483640) — Enter the time interval, in
milliseconds, which the device waits before leaving its GARP state.
Leave time is activated by a Leave All Time message sent/received,
and cancelled by the Join message received. Leave time must be
greater than or equal to three times the join time.
– GARP Leave All Timer (10 - 2147483640) — Enter time interval, in
milliseconds, which all devices wait before leaving the GARP state.
The leave all time must be greater than the leave time. Dell PowerConnect 55xx Systems User Guide 433
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_GARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining GARP Timers Using CLI Commands
This table summarizes the CLI commands for defining GARP timers as
displayed in the GARP Timers pages.
The following is an example of the CLI commands:
Table 12-1. GARP Timer CLI Commands
CLI Command Description
garp timer {join|leave|leaveall}
timer_value
Adjusts the GARP application join,
leave, and leaveall GARP timer values.
show gvrp configuration
[[gigabitethernet|tengigabitether
net]port-number|vlan vlanid|port-channel LAG-number]
Displays GVRP configuration information, including timer values,
whether GVRP and dynamic VLAN
creation are enabled, and which ports
are running GVRP.
console(config)# interface gi1/0/1
console(config-if)# garp timer leave 900
console(config-if)# end
console# show gvrp configuration gi1/0/11
GVRP Feature is currently Disabled on the device.
Maximum VLANs: 223
Port(s) GVRP Registration Dynamic VLAN Timers (milliseconds)
Status Creation Join Leave Leave All
-------- ------- ------------ ----------- ------ ----- ---------
gi1/0/11 Disabled Normal Enabled 200 900 10000434 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
13
Spanning Tree
This chapter describes the Spanning Tree Protocol.
It contains the following topics:
• Spanning Tree Protocol Overview
• Global Settings
• STP Port Settings
• STP LAG Settings
• Rapid Spanning Tree
• Multiple Spanning TreeDell PowerConnect 55xx Systems User Guide 435
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Spanning Tree Protocol Overview
Spanning Tree Protocol (STP) provides tree topography for any bridge
arrangement. STP eliminates loops by providing a unique path between end
stations on a network.
Loops occur when alternate routes exist between hosts. Loops, in an extended
network, can cause bridges to forward traffic indefinitely, resulting in packets
not arriving at their destination, increased traffic, and reduced network
efficiency.
The device supports the following Spanning Tree versions:
• Classic STP — Provides a single path between end stations, avoiding and
eliminating loops. For more information on configuring Classic STP, see
"Global Settings" on page 437.
• Rapid STP (RSTP) — Provides faster convergence of the spanning tree
than Classic STP. RSTP is most effective when the network topology is
naturally tree-structured, and therefore faster convergence might be
possible. RSTP is enabled by default.
Although Classic STP is guaranteed to prevent Layer 2 forwarding loops, in
a general network topology, there might be an unacceptable delay before
convergence. This means that before convergence, each bridge or switch in
the network must decide if it should actively forward traffic or not, on each
of its ports.
For more information on configuring Rapid STP, see "Rapid Spanning
Tree" on page 450.
• Multiple STP (MSTP) — MSTP is based on RSTP. It detects Layer 2
loops, and attempts to mitigate them by preventing the involved port from
transmitting traffic.
Since loops exist on a per-Layer 2-domain basis, a situation can occur
where there is a loop in VLAN A and no loop in VLAN B. If both VLANs
are on Port X, and STP wants to mitigate the loop, it stops traffic on the
entire port, including VLAN B traffic, where there is no need to stop
traffic.
Multiple Spanning Tree Protocol (MSTP) solves this problem by enabling
several STP instances, so that it is possible to detect and mitigate loops
separately in each instance. By associating instances to VLANs, each 436 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
instance is associated with the Layer 2 domain on which it performs loop
detection and mitigation. This enables a port to be stopped in one
instance, such as traffic from VLAN A that is causing a loop, while traffic
can remain active in another domain where no loop was seen, such as on
VLAN B.
MSTP provides full connectivity for packets allocated to any VLAN, and
transmits packets assigned to various VLANs, through different multiple
spanning tree (MST) regions.
MST regions act as a single bridge.
For more information on configuring Multiple STP, see "Multiple
Spanning Tree" on page 454.Dell PowerConnect 55xx Systems User Guide 437
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Global Settings
To enable STP and select the STP mode on the device:
1 Click Switching > Spanning Tree > Global Settings in the tree view to
display the Global Settings page.
Figure 13-1. Global Settings
The currently-defined settings are displayed.
2 Enter the fields:
– Spanning Tree State — Enable Spanning Tree on the device.
– STP Operation Mode — Select the STP mode enabled on the device.
The possible options are:
• Classic STP — Enables Classic STP on the device.
• Rapid STP — Enables Rapid STP on the device. This is the
default value.
• Multiple STP — Enables Multiple STP on the device.438 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– BPDU Handling — Select how Bridge Protocol Data Unit (BPDU)
packets are managed when STP is disabled on the port/device. BPDUs
are used to transmit spanning tree information. The possible options
are:
• Filtering — Filter BPDU packets when spanning tree is disabled
on an interface.
• Flooding — Flood BPDU packets when spanning tree is disabled
on an interface.
– Path Cost Default Values — Select the method used to assign default
path costs to STP ports. The possible options are:
• Short — Specifies 1 through 65,535 range for port path costs.
• Long — Specifies 1 through 200,000,000 range for port path
costs.
The default path costs assigned to an interface vary according to the
selected method:
Bridge Settings
– Priority (0-61440 in steps of 4096) — Enter the bridge priority value.
When switches or bridges are running STP, each is assigned a priority.
After exchanging BPDUs, the device with the lowest priority value
becomes the Root Bridge. The default value is 32768. The port
priority value is provided in increments of 4096. For example, 4096,
8192, 12288, etc.
– Hello Time (1-10) — Check to use the device Hello Time, which is
the interval of time in seconds that a root bridge waits between
configuration messages. Enter a value.
– Max Age (6-40) — Check to use device Maximum Age Time, which is
the time interval in seconds that a bridge waits before sending
configuration messages. Enter a value.
Interface Long Cost Short Cost
LAG 20,000 4
1000 Mbps 20,000 4
100 Mbps 200,000 19
10 Mbps 2,000,000 100Dell PowerConnect 55xx Systems User Guide 439
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Forward Delay (4-30) — Check to use device forward delay time,
which is the interval of time in seconds that a bridge remains in a
listening and learning state before forwarding packets. Enter a value.
Designated Root — Displays the following:
– Bridge ID — The bridge priority and MAC address.
– Root Bridge ID — The root bridge priority and MAC address.
– Root Port — The port number that offers the lowest cost path from
this bridge to the Root Bridge. This is significant when the Bridge is
not the Root.
– Root Path Cost — The cost of the path from this bridge to the root.
– Topology Changes Counts — The total amount of STP state changes
that have occurred.
– Last Topology Change — The amount of time that has elapsed since
the bridge was initialized or reset, and the last topographic change
occurred.
Defining STP Global Parameters Using CLI Commands
The following table summarizes the CLI commands for defining STP global
parameters as displayed in the Global Settings pages.
Table 13-1. STP Global Parameter CLI Commands
CLI Command Description
spanning-tree
no spanning-tree
Enables spanning tree functionality.
Use the no form of this command to
disable the spanning-tree functionality.
spanning-tree mode
{stp|rstp|mstp}
no spanning-tree mode
Configures the mode of the spanning tree
protocol.
Use the no form of this command to
restore the default configuration.
spanning-tree bpdu
{filtering|flooding|bridging}
no spanning-tree bpdu
Defines BPDU handling when the
spanning tree is disabled globally or on a
single interface.
Use the no form of this command to
restore the default configuration.440 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
spanning-tree pathcost method
{long|short}
no spanning-tree pathcost
method
Sets the default path cost method.
Use the no form of this command to return
to the default configuration.
spanning-tree priority
priority
no spanning-tree priority
Configures the spanning tree priority.
Use the no form of this command to
restore the default device spanning-tree
priority.
spanning-tree hello-time
seconds
no spanning-tree hello-time
Configures the spanning tree bridge Hello
Time, which is how often the device
Broadcasts Hello messages to other
devices.
Use the no form of this command to
restore the default configuration.
spanning-tree max-age seconds
no spanning-tree max-age
seconds
Configures the spanning tree bridge
maximum age.
Use the no form of this command to
restore the default configuration
spanning-tree forward-time
seconds
no spanning-tree forward-time
Configures the spanning tree bridge
forward time, which is the amount of time
a port remains in the listening and learning
states before entering the forwarding state.
Use the no form of this command to
restore the default configuration.
show spanning-tree
[[gigabitethernet|tengigabite
thernet] port-number|portchannel LAG-number] [instance
instance-id]
Displays spanning tree configuration.
show spanning-tree [detail]
[active|blockedports]
[instance instance-id]
Displays detailed spanning tree
information on active or blocked ports.
show spanning-tree mstconfiguration
Displays spanning tree MST configuration
identifier.
Table 13-1. STP Global Parameter CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 441
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# spanning-tree
console(config)# spanning-tree mode rstp
console(config)# spanning-tree priority 12288
console(config)# spanning-tree hello-time 5
console(config)# spanning-tree max-age 12
console(config)# spanning-tree forward-time 25
console(config)# exit442 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
STP Port Settings
To assign STP properties to individual ports:
1 Click Switching > Spanning Tree > STP Port Settings in the tree view to
display the STP Port Settings: Summary page.
Figure 13-2. STP Port Settings: Summary
The ports and their STP settings are displayed.
2 To modify STP settings on a port, click Edit.
3 Select the port, and enter the fields:
– STP — Enable/disable STP on the port.
– Fast Link — Check to enable Fast Link mode for the port. If this is
enabled, the Port State is automatically placed in the Forwarding state
when the port is up. Fast Link mode optimizes the time it takes for the
STP protocol to converge. STP convergence can take 30-60 seconds in
large networks. Dell PowerConnect 55xx Systems User Guide 443
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– BPDU Guard — Check to enable BPDU Guard on the port.
– Root Guard — Check to prevent devices outside the network core
from being assigned the spanning tree root.
– Port State — Displays the current STP state of a port. If the port state
is not disabled, it determines what forwarding action is taken on
traffic. The possible port states are:
• Disabled — STP is currently disabled on the port. The port
forwards traffic while learning MAC addresses.
• Blocking — The port is currently blocked and cannot be used to
forward traffic or learn MAC addresses. Blocking is displayed
when Classic STP is enabled.
• Listening — The port is currently in the listening mode. The port
cannot forward traffic nor can it learn MAC addresses.
• Learning — The port is currently in the learning mode. The port
cannot forward traffic, however it can learn new MAC addresses.
• Forwarding — The port is currently in the forwarding mode. The
port can forward traffic and learn new MAC addresses.
– Role — Displays the port role assigned by the STP algorithm that
provides STP paths. The possible options are:
• Root — This port provides the lowest cost path to forward packets
to root switch.
• Designated — This port is the interface through which the bridge
is connected to the LAN, which provides the lowest cost path
from the LAN to the Root Bridge.
• Alternate — This port provides an alternate LAG to the root
switch from the root interface.
• Backup — This port provides a backup path to the designated
port. Backup ports occur only when two ports are connected in a
loop by a point-to-point link. Backup ports also occur when a LAN
has two or more connections connected to a shared segment.
• Disabled — This port is not participating in the Spanning Tree.444 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Speed — Displays the speed at which the port is operating.
– Path Cost (1-200000000) — Enter the port contribution to the root
path cost. The path cost is adjusted to a higher or lower value, and is
used to forward traffic when a path being rerouted.
– Default Path Cost — Check to use the default path cost.
– Priority — Select the priority value that influences the port choice
when a bridge has two ports connected in a loop. The priority value is
provided in increments of 16.
– Designated Bridge ID — Displays the bridge priority and the MAC
address of the designated bridge.
– Designated Port ID — Displays the designated port’s priority and
interface.
– Designated Cost — Displays the cost of the port participating in the
STP topology. Ports with a lower cost are less likely to be blocked if
STP detects loops.
– Forward Transitions — Displays the number of times the port has
changed from the Forwarding state to Blocking.
– LAG — Displays the LAG to which the port is attached.
Defining STP Port Settings Using CLI Commands
The following table summarizes the CLI commands for defining STP port
parameters as displayed in the STP Port Settings page.
Table 13-2. STP Port Settings CLI Commands
CLI Command Description
spanning-tree disable
no spanning-tree disable
Disables spanning tree on a specific
port.
Use the no form of this command to
enable the spanning tree on a port.
spanning-tree cost cost
no spanning-tree cost
Configures the spanning tree cost
contribution of a port
Use the no form of this command to
restore the default configuration.Dell PowerConnect 55xx Systems User Guide 445
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
spanning-tree port-priority
priority
no spanning-tree port-priority
Configures port priority.
Use the no form of this command to
restore the default configuration.
show spanning-tree
[[gigabitethernet|tengigabiteth
ernet] port-number|port-channel
LAG-number][instance instanceid]
Displays spanning tree configuration.
spanning-tree portfast
no spanning-tree portfast
Enables Fast Link mode.
Use the no form of this command to
disable the PortFast mode.
spanning-tree bpduguard
{enable|disable}
no spanning-tree bpduguard
Shuts down an interface when it
receives a bridge protocol data unit
(BPDU).
Use the no form of this command to
restore the default configuration.
spanning-tree guard root Enables root guard on all spanning tree
instances on the interface.
show spanning-tree [detail]
[active|blockedports] [instance
instance-id]
Displays detailed spanning tree
information on active or blocked ports.
Table 13-2. STP Port Settings CLI Commands (Continued)
CLI Command Description446 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console> enable
console# configure
console(config)# interface gi1/0/1
console(config-if)# spanning-tree enable
console(config-if)# spanning-tree cost 35000
console(config-if)# spanning-tree port-priority 96
console(config-if)# spanning-tree portfast
console(config-if)# exit
console(config)# exit
console# show spanning-tree gi1/0/15 instance 12
Port gi1/0/15 enabled
State: discarding Role: alternate
Port ID: 128.15 Port cost: 19
Type: P2p (configured: Auto) Internal Port Fast: No
(configured: No)
Designated bridge Priority :
32768
Address:
00:00:b0:07:07:49
Designated port ID: 128.11 Designated path cost: 0
Guard root: Disabled
Number of transitions to forwarding state: 3
BPDU: sent 482, received 1035Dell PowerConnect 55xx Systems User Guide 447
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
STP LAG Settings
To assign STP parameters to LAGs:
1 Click Switching > Spanning Tree > LAG Settings in the tree view to
display the STP LAG Settings: Summary page.
Figure 13-3. STP LAG Settings: Summary
The LAGs and their STP settings are displayed.
2 To modify STP settings on a LAG, click Edit.
3 Select a LAG from the Select a LAG drop-down menu.
4 Enter the fields.
– STP — Enable/disable STP on the LAG.
– Fast Link — Check to enable Fast Link mode for the LAG. If Fast
Link mode is enabled for a LAG, the LAG State is automatically
placed in Forwarding when the LAG is up. Fast Link mode optimizes
the time it takes for the STP protocol to converge. STP convergence
can take from 30-60 seconds in large networks.
– BPDU Guard — Check to enable BPDU Guard on the LAG.
– Root Guard — Check to prevent devices outside the network core
from being assigned the spanning tree root. 448 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– LAG State — Displays the current STP state of the LAG. If enabled,
the LAG state determines what forwarding action is taken on traffic. If
the bridge discovers a malfunctioning LAG, the LAG is placed in the
Broken state. Possible LAG states are:
• Disabled — STP is currently disabled on the LAG. The LAG
forwards traffic while learning MAC addresses.
• Blocking — The LAG is blocked and cannot be used to forward
traffic or learn MAC addresses.
• RSTP Discarding State — The LAG does not learn MAC
addresses and does not forward frames. This state is union of
Blocking and Listening state introduced in STP (802.1.D).
• Listening — The LAG is in the listening mode, and cannot
forward traffic or learn MAC addresses.
• Learning — The LAG is in the learning mode, and cannot
forward traffic, but it can learn new MAC addresses.
• Forwarding — The LAG is currently in the forwarding mode, and
it can forward traffic and learn new MAC addresses.
• Broken — The LAG is currently malfunctioning, and cannot be
used for forwarding traffic.
– Role — Displays the LAG role assigned by the STP algorithm that
provides STP paths. The possible options are:
• Root — This LAG provides the lowest cost path to forward
packets to root switch.
• Designated — This LAG is the interface through which the
bridge is connected to the LAN, which provides the lowest cost
path from the LAN to the Root Bridge.
• Alternate — This LAG provides an alternate LAG to the root
switch from the root interface.
• Backup — This LAG provides a backup path to the designated
port. Backup ports occur only when two ports are connected in a
loop by a point-to-point link. Backup ports also occur when a LAN
has two or more connections connected to a shared segment.
• Disabled — This LAG is not participating in the Spanning Tree.Dell PowerConnect 55xx Systems User Guide 449
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Path Cost (1-200000000) — Enter the amount the LAG contributes
to the root path cost. The path cost is adjusted to a higher or lower
value, and is used to forward traffic when a path is being rerouted.
The path cost has a value of 1 to 200000000.
– Default Path Cost — Check for the device to use the default path
cost.
– Priority — Select the priority value of the LAG. The priority value
influences the LAG choice when a bridge has looped ports. The
priority value is given in steps of 16.
– Designated Bridge ID — Displays the priority and the MAC address
of the designated bridge.
– Designated Port ID — Displays the ID of the selected interface.
– Designated Cost — Displays the cost of the port participating in the
STP topology. Ports with a lower cost are less likely to be blocked if
STP detects loops.
– Forward Transitions — Displays the number of times the LAG State
has changed from the Forwarding state to a Blocking state.
Defining STP LAG Settings Using CLI Commands
For information about CLI commands for defining STP LAG settings, see
Table 13-2.
The following is an example of the CLI commands:
console(config)# interface port-channel 1
console(config-if)# spanning-tree disable
console(config-if)# spanning-tree cost 35000
console(config-if)# spanning-tree port-priority 96
console(config-if)# spanning-tree portfast450 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Rapid Spanning Tree
While classic spanning tree prevents Layer 2 forwarding loops on a general
network topology, convergence can take from 30 to 60 seconds. This delay
provides time to detect possible loops, and propagate status changes.
Rapid Spanning Tree Protocol (RSTP) detects and uses network topologies
that enable a faster convergence of the spanning tree, without creating
forwarding loops.
To configure RSTP:
1 Click Switching > Spanning Tree > Rapid Spanning Tree in the tree view
to display the Rapid Spanning Tree: Summary page.
Figure 13-4. Rapid Spanning Tree: Summary
2 To modify RSTP settings on an interface, click Edit and enter the fields:
– Interface — Select a port or LAG.
– State — Displays the RSTP state of the selected interface.Dell PowerConnect 55xx Systems User Guide 451
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Role — Displays the port role assigned by the STP algorithm in order
to provide STP paths. The possible options are:
• Root — This port provides the lowest cost path to forward packets
to root switch.
• Designated — This port is the interface through which the bridge
is connected to the LAN, which provides the lowest cost path
from the LAN to the Root Bridge.
• Alternate — This port provides an alternate LAG to the root
switch from the root interface.
• Backup — This port provides a backup path to the designated
port. Backup ports occur only when two ports are connected in a
loop by a point-to-point link. Backup ports also occur when a LAN
has two or more connections connected to a shared segment.
• Disabled — This port is not participating in the Spanning Tree.
– Mode — Displays if RSTP is enabled.
– Fast Link Operational Status — Displays if Fast Link is enabled or
disabled for the port or LAG. If Fast Link is enabled for an interface,
the interface is automatically placed in the forwarding state. The
possible options are:
• Enable — Fast Link is enabled.
• Disable — Fast Link is disabled.
• Auto — Fast Link mode is enabled a few seconds after the
interface becomes active.
– Point-to-Point Admin Status — Select if a point-to-point links is
established, or permits the device to establish a point-to-point link.
The possible options are:
• Enable — Enables the device to establish a point-to-point link, or
specifies for the device to automatically establish a point-to-point
link. To establish communications over a point-to-point link, the
originating PPP first sends Link Control Protocol (LCP) packets
to configure and test the data link. After a link is established and
optional facilities are negotiated as needed by the LCP, the
originating PPP sends Network Control Protocols (NCP) packets
to select and configure one or more network layer protocols.
When each of the chosen network layer protocols has been 452 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
configured, packets from each network layer protocol can be sent
over the link. The link remains configured for communications
until explicit LCP or NCP packets close the link, or until some
external event occurs. This is the actual switch port link type. It
may differ from the administrative state.
• Disable — Disables point-to-point link.
• Auto — The device automatically establishes a point-to-point
link.
– Point-to-Point Operational Status — Displays the Point-to-Point
operating state.
– Active Protocol Migration Test — Check to run a Protocol Migration
test. This discovers whether the link partner using STP still exists, and
if so whether it has migrated to RSTP or MSTP. If it still exists as an
STP link, the device continues to communicate with it by using STP.
Otherwise, if it has been migrated to RSTP or MSTP, the device
communicates with it using RSTP or MSTP, respectively.
Defining Rapid STP Parameters Using CLI Commands
The following table summarizes the CLI commands for defining Rapid STP
parameters as displayed in the Rapid Spanning Tree pages.
Table 13-3. Rapid STP Parameters CLI Command
CLI Command Description
spanning-tree link-type {pointto-point|shared}
no spanning-tree spanning-tree
link-type
Overrides the default link-type setting
determined by the port duplex mode,
and enables RSTP transitions to the
forwarding state.
Use the no form of this command to
restore the default configuration.
clear spanning-tree detectedprotocols interface
[[gigabitethernet|tengigabiteth
ernet] port-number|port-channel
LAG-number]
Restarts the protocol migration
process.Dell PowerConnect 55xx Systems User Guide 453
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show spanning-tree
[[gigabitethernet|tengigabiteth
ernet] port-number|port-channel
LAG-number]
Displays spanning tree configuration.
console(config)# interface gi1/0/5
console(config-if)# spanning-tree link-type shared
Table 13-3. Rapid STP Parameters CLI Command (Continued)
CLI Command Description454 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Multiple Spanning Tree
This section describes Multiple Spanning Tree Protocol (MSTP).
It contains the following topics:
• MSTP Overview
• MSTP Properties
• VLAN to MSTP Instance
• MSTP Instance Settings
• MSTP Interface SettingsDell PowerConnect 55xx Systems User Guide 455
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
MSTP Overview
MSTP maps VLANs into STP instances, using various load balancing
scenarios. As a result of this partitioning into instances, if port A is blocked in
one STP instance, the same port can be placed in the Forwarding State in
another STP instance.
In addition, packets assigned to various VLANs are transmitted along
different paths within Multiple Spanning Trees Regions (MST Regions).
Regions are one or more Multiple Spanning Tree bridges by which frames can
be transmitted.
MSTP Properties
To set an MSTP region:
1 Click Switching > Spanning Tree > MSTP Settings in the tree view to
display the MSTP Properties: Summary page.
Figure 13-5. MSTP Properties: Summary456 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Enter the following fields:
– Region Name (1-32 Characters) — Enter the user-defined MSTP
region name.
– Revision (0-65535) — Enter the unsigned 16-bit number that
identifies the current MST configuration revision. The revision
number is required as part of the MST configuration.
– Max Hops (1-40) — Enter the total number of hops that occur in a
specific region before the BPDU is discarded. Once the BPDU is
discarded, the port information is aged out.
– IST Master — Displays the Internal Spanning Tree Master ID. The
IST Master is the instance 0 root.
Configuring MST Properties Using CLI Commands
The following table summarizes the CLI commands for configuring MST
properties in the MSTP Properties pages.
Table 13-4. MSTP Properties CLI Commands
CLI Command Description
spanning-tree mst
configuration
Enters MST Configuration mode.
spanning-tree mst max-hops
hop-count
no spanning-tree mst maxhops
Configures the number of hops in an MST
region before the BDPU is discarded and the
port information is aged out (in Global
Configuration mode).
Use the no form of this command to restore
the default configuration.
name string
no name
Sets the MSTP region name.
Use the no form of this command to restore
the default setting.
revision value
no revision
Defines the MST configuration revision
number.
Use the no form of this command to restore
the default configuration.
exit Exits the MST region configuration mode
after applying configuration changes.Dell PowerConnect 55xx Systems User Guide 457
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show {current|pending} Displays the current or pending MST region
configuration.
show spanning tree mstconfiguration
Displays the MSTP configuration.
console(config)# spanning-tree mst configuration
console(config-mst)# instance 1 add vlan 10-20
console(config-mst)# name region1
console(config-mst)# revision 1
console(config)# interface gi1/0/1
console(config-if)# spanning-tree mst 1 port-priority 144
console(config)# spanning-tree mst max-hops 10
console(config)# spanning-tree mst configuration
console(config-mst)# instance 2 add vlan 21-30
console(config-mst)# name region1
console(config-mst)# revision 1
console(config-mst)# show pending
Pending MST configuration
Name: Region1
Revision: 1
Instance VLANs Mapped
-------- ------------
0 1-9,31-4094
1 10-20
2 21-30
Table 13-4. MSTP Properties CLI Commands (Continued)
CLI Command Description458 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
VLAN to MSTP Instance
To map VLANs to MSTP instances:
1 Click Switching > Spanning Tree > VLAN to MSTP Instance in the tree
view to display the VLAN to MSTP Instance: Summary page.
Figure 13-6. VLAN to MSTP Instance: Summary
The MSTP instances and their associated VLANs are displayed.
2 To associate a VLAN with an MSTP instance, click Edit.
3 Select the MSTP instance, the VLAN and whether to add or remove the
VLAN from the MSTP instance association.
4 Enter the fields:
– Select MST Instance ID — Select an MST instance.
– VLANs — Enter the VLANs being mapped to this instance.
– Action — Select the mapping action. The possible options are: Dell PowerConnect 55xx Systems User Guide 459
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Add —Add these VLANS to the MST instance.
• Remove —Remove these VLANS from the MST instance.
Mapping VLAN to MSTP Instances Using CLI Commands
The following table summarizes the CLI commands for mapping VLANs to
MSTP instances.
The following is an example of the CLI commands:
Table 13-5. Mapping VLAN to MSTP Instances Using CLI Commands
CLI Command Description
spanning-tree mst
configuration
Enters MST Configuration mode.
instance instance-id vlan
vlan-range
no instance instance-id
vlan vlan-range
Maps VLANs to an MST instance.
Use the no form of this command to restore
default mapping.
show spanning-tree detail Displays the spanning-tree configuration
console(config)# spanning-tree mst configuration
console(config-mst)# instance 1 vlan 10-20460 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
MSTP Instance Settings
To configure MSTP instances:
1 Click Switching > Spanning Tree > MSTP Instance Settings in the tree
view to display the MSTP Instance Settings page.
Figure 13-7. MSTP Instance Settings
The MSTP instances and their associated VLANs are displayed.
2 Select an Instance ID.
3 Enter the Bridge Priority (0-61440) of this bridge for the selected MSTP
instance.
4 The following fields are displayed:
– Included VLANs — Displays VLANs included in this instance.
– Designated Root Bridge ID — Priority and MAC address of the Root
Bridge for the MST instance.Dell PowerConnect 55xx Systems User Guide 461
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Root Port — Root port of the selected instance.
– Root Path Cost — Root path cost of the selected instance.
– Bridge ID — Bridge priority and the MAC address of this switch for
the selected instance.
– Remaining Hops — Number of hops remaining to the next
destination.
Configuring MSTP Instances Using CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the MSTP Instance pages.
The following is an example of the CLI commands:
Table 13-6. Configuring MSTP Instances CLI Commands
CLI Command Description
spanning-tree mst
configuration
Enters MST Configuration mode.
spanning-tree mst
instance-id priority
priority
no spanning-tree mst
instance-id priority
Configures the device priority for the specified
spanning-tree instance.
Use the no form of this command to restore
the default configuration.
show spanning-tree
detail
Displays the spanning-tree configuration
console(config)# spanning-tree mst configuration
console(config-mst)# spanning-tree mst 1 priority 4096462 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
MSTP Interface Settings
To assign interfaces to MSTP instances:
1 Click Switching > Spanning Tree > MSTP Interface Settings in the tree
view to display the MSTP Interface Settings: Summary page.
Figure 13-8. MSTP Interface Settings: Summary
MSTP interface settings for the selected instance is displayed.
2 To set MSTP settings for an interface, click Edit.
3 Select an instance, and enter the fields:
– Interface ID — Assign either ports or LAGs to the selected MSTP
instance.
– Port State — Displays whether the port is enabled or disabled in the
specific instance.
– Type — Displays whether MSTP treats the port as a point-to-point
port, or a port connected to a hub, and whether the port is internal to
the MST region or a boundary port. A Master port provides
connectivity from a MSTP region to the outlying CIST root. A Dell PowerConnect 55xx Systems User Guide 463
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Boundary port attaches MST bridges to LAN in an outlying region. If
the port is a boundary port, it also indicates whether the device on the
other side of the link is working in RSTP or STP mode.
– Role — Displays the port role assigned by the STP algorithm in order
to provide to STP paths. The possible options are:
• Root — This port provides the lowest cost path to forward packets
to root switch.
• Designated — This port is the interface through which the bridge
is connected to the LAN, which provides the lowest cost path
from the LAN to the Root Bridge.
• Alternate — This port provides an alternate LAG to the root
switch from the root interface.
• Backup — This port provides a backup path to the designated
port. Backup ports occur only when two ports are connected in a
loop by a point-to-point link. Backup ports also occur when a LAN
has two or more connections connected to a shared segment.
• Disabled — This port is not participating in the Spanning Tree.
– Interface Priority— Enter the interface priority for specified instance.
– Path Cost (1-200,000,000) — Enter the port contribution to the
Spanning Tree instance. If a loop occurs, the spanning tree considers
path cost when selecting an interface to put in the Forwarding state.
– Default Path Cost — Check to use the default path cost.
– Designated Bridge ID — Displays the bridge ID number that
connects the link or shared LAN to the root.
– Designated Port ID — Displays the Port ID number on the
designated bridge that connects the link or the shared LAN to the
root.
– Designated Cost — Displays the cost of the path from the link or the
shared LAN to the root.
– Forward Transitions — Displays the number of times the port
changed to the forwarding state.
– Remain Hops — Displays the number of hops remaining to the next
destination.464 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining MSTP Interfaces Using CLI Commands
The following table summarizes the CLI commands for defining MSTP
interfaces as displayed in the MSTP Interfaces pages.
The following is an example of the CLI commands:
Table 13-7. MSTP Interface CLI Commands
CLI Command Description
spanning-tree mst
instance-id cost cost
no spanning-tree mst
instance-id cost
Sets the path cost of the port for MST
calculations (in Interface Configuration
mode).
Use the no form of this command to restore
the default configuration.
spanning-tree mst
instance-id portpriority priority
Configures the device priority for the specified
spanning-tree instance (in Interface
Configuration mode).
Use the no form of this command to restore
the default configuration.
show spanning-tree mstconfiguration
Displays the MST configuration.
console(config)# interface gi1/0/9
console(config-if)# spanning-tree mst 1 cost 4Dell PowerConnect 55xx Systems User Guide 465
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY466 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
14
VLANs
This chapter describes how VLANs are configured on the device.
It contains the following topics:
• Virtual LAN Overview
• VLAN Membership
• Port Settings
• LAGs Settings
• Protocol Groups
• Protocol Port
• GVRP Parameters
• Private VLAN
• Voice VLANDell PowerConnect 55xx Systems User Guide 467
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Virtual LAN Overview
A VLAN is a switched network that is logically segmented on an
organizational basis, by functions, project teams, or applications rather than
on a physical or geographical basis. For example, all workstations and servers
used by a particular workgroup team can be connected to the same VLAN,
regardless of their physical connections to the network, or the fact that they
might be intermingled with other teams. Reconfiguration of the network can
be done through software rather than by physically unplugging and moving
devices or wires.
A VLAN can be thought of as a Broadcast domain that exists within a defined
set of switches. A VLAN consists of a number of end systems, either hosts or
network equipment (such as bridges and routers), connected by a single
bridging domain. The bridging domain is supported on various pieces of
network equipment; for example, LAN switches that operate bridging
protocols between them with a separate bridge group for each VLAN.
VLANs are created to provide the segmentation services traditionally
provided by routers in LAN configurations. VLANs address scalability,
security, and network management. Routers in VLAN topologies provide
broadcast filtering, security, address summarization, and traffic flow
management.
None of the switches, within a defined group, will bridge any frames, not even
broadcast frames, between two VLANs. 468 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Frame Flow
Figure 14-1 describes the flow of VLAN frames from the Ingress port to the
Egress port:
Figure 14-1. Frame Flow Through a VLAN
When a frame is received, it must be assigned a VLAN. VLAN assignment is
accomplished by the following steps:
1 If the frame contains a VLAN tag, that tag is used, otherwise the frame is
classified by the port's default VLAN (PVID), if it is defined.
2 After classification, the frame may pass (if enabled) through ingress
filtering, where the frame is dropped if the frame's VLAN ID is not one of
the VLANs to which the ingress port belongs.
3 A forwarding decision is made, as a function of the VLAN ID and the
destination MAC address.
4 The egress rules define whether the frame is to be sent as tagged or
untagged.
Special-case VLANs
VLAN#1 and VLAN#4095 are special-case VLANs:
• VLAN1 — Defined as the default VLAN, and may only be used as a Ports
Default VLAN ID (PVID). This means that if the VLAN, whose VID is the
current port's PVID, is deleted from the port (or from the system), that
port's PVID is set to 1. VLAN#1 cannot be deleted from the system.
• VLAN #4095 — Defined (according to standard and industry practice) as
the "discard" VLAN. A frame classified to this VLAN is silently dropped.
Ingress Egress
VLAN
C lassification
Ingress
Filtering
Egress
Filtering
Progress
Forwarding
Decision
Filtering
Database
Received
Frame
T ransmitted
Frame
Ingress Egress
VLAN
C lassification
Ingress
Filtering
Egress
Filtering
Progress
Forwarding
Decision
Filtering
Database
Received
Frame
T ransmitted
FrameDell PowerConnect 55xx Systems User Guide 469
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QinQ Tagging
QinQ tagging enables you to add an additional tag to previously-tagged
packets. The added tag provides a VLAN ID to each customer, which ensures
private and segregated network traffic. The VLAN ID tag is assigned to a
customer port in the service provider network. The designated port then
provides additional services to the packets with the double-tags. This enables
administrators to expand service to VLAN users.
Port Modes
Ports participating in Layer 2 switching may be classified as:
• Access Ports
Ports set to Access mode belong to a single VLAN, whose VID is the
currently set PVID (default =1). These ports accept all untagged frames,
and all frames tagged with the VID, currently set as the port's PVID. All
traffic is sent untagged. If the VLAN, whose VID is set as the current PVID
of the port, is deleted from the system, or deleted from the port, the port's
PVID will be set to 1, meaning that the port will be made a member of
VLAN#1, the default VLAN.
Ingress filtering is always enabled for ports in Access mode.
Setting an Access port’s PVID to 4095 effectively shuts it down, as no
frames will be transferred in either direction.
Access mode ports are intended to connect end-stations to the system,
especially when the end-stations are incapable of generating VLAN tags.
• Trunk Ports
Ports set to Trunk mode may belong to multiple VLANs. The default
VLAN membership of a trunk port is all VLANs (1-4094). A PVID must be
set on the port (it can be a non-existing VLAN). Trunk ports accept tagged
and untagged frames. Untagged frames will be classified to the VLAN
whose VLAN ID (VID) is configured as the port’s PVID.
Frames, sent from the port in the VLAN, whose VID is the current PVID,
are sent untagged. Frames sent in all other VLANs active on the port are
sent tagged.470 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Ingress filtering is always enabled on Trunk-mode ports. Incoming frames
will undergo ingress filtering, and if correctly tagged, (tagged with a VID of
one of the VLANs to which the port currently belongs) are admitted.
The default PVID is 1 (the default VLAN). If another VID is configured as
the port’s PVID, and the corresponding VLAN is deleted from the port or
from the system, the port’s PVID reverts to 1, meaning that the port is
made a member of the default VLAN.
Setting a trunk-port’s PVID to 4095 limits traffic to tagged frames.
Incoming untagged frames are silently discarded, and no frames are sent
untagged.
Trunk-mode ports are intended for switch-to-switch links, where traffic is
usually tagged.
• General Ports
Ports set to General mode may be members of multiple VLANs. Each of
these VLANs may be configured to be tagged or untagged. This setting
applies to transmitted frames. Incoming untagged frames are classified
into the VLAN whose VID is the currently configured PVID.
Ingress filtering may be disabled on General ports. Ingress filtering is
enabled by default.
• Promiscuous Ports
A promiscuous port can communicate with all ports of the same Private
VLAN (PVLAN), including the isolated ports of the same PVLAN.
• Isolated
An isolated port has complete Layer 2 isolation from the other ports within
the same PVLAN, but not from the promiscuous ports. Isolated ports can
communicate with promiscuous ports.
In the factory default configuration, all ports are designated as Access ports,
and are associated with the default VLAN.Dell PowerConnect 55xx Systems User Guide 471
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Acceptable Frame Type
The acceptable frame type can be set on a port to accept all frames (tagged
and untagged), tagged only, or untagged only. This setting takes precedence
over all other settings, so that if the acceptable frame type is tagged only,
incoming untagged frames are silently discarded, even if the port has a valid
PVID.472 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
VLAN Membership
The device supports up to 2-4094 VLANs.
Ports are assigned to a VLAN in the Port Settings pages.
To view the ports in a VLAN, and assign various parameters:
1 Click Switching > VLAN > VLAN Membership in the tree view to
display the VLAN Membership: Summary page.
Figure 14-2. VLAN Membership: Summary
The ports in the selected unit/VLAN are displayed along with their
statuses.
Each port/LAG is labeled with one of the following codes, regarding its
membership in the VLAN:Dell PowerConnect 55xx Systems User Guide 473
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– T — Tagged. The interface is a member of a VLAN. All packets
forwarded by the interface are tagged. The packets contain VLAN
information.
– U — Untagged. The interface is a member of a VLAN. Packets
forwarded by the interface are untagged.
– F — Forbidden. The interface is denied membership to a VLAN.
– Blank — The interface is not a VLAN member. Packets associated
with the interface are not forwarded.
2 Enter the fields:
– Show VLAN — Check one of the possible options:
• VLAN ID — Check VLAN ID, and select a VLAN ID to view.
• VLAN Name — Check VLAN Name, and select a VLAN ID to
view.
– VLAN Name (0-32 Characters) — Enter a new VLAN name.
– Status — The VLAN type. Possible values are:
• Dynamic — The VLAN was dynamically created through GVRP.
• Static — The VLAN is user-defined.
– Authentication Not Required — Enable/disable authentication on
the VLAN.
3 To define a new VLAN, click ADD, and enter the fields. The fields in this
page are described above.
Defining VLAN Membership Using CLI Commands
The following table summarizes the CLI commands for defining VLAN
membership as displayed in the VLAN Membership pages.
Table 14-1. VLAN Membership CLI Commands
CLI Command Description
vlan database Enters the VLAN configuration mode.474 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
vlan {vlan-range}[name vlanname]
no vlan vlan-range
Creates a VLAN.
Use the no form of this command to
restore the default configuration or
delete a VLAN.
name string Adds a name to a VLAN.
dot1x auth-not-req
no dot1x auth-not-req
Enables unauthorized devices access to
the VLAN.
Use the no form of this command to
disable access to the VLAN.
console(config)# vlan database
console(config-vlan)# vlan 1972
console(config-vlan)# end
console(config)# interface vlan 1972
console(config-if)# name Marketing
console(config-vlan)# dot1x auth-not-req
console(config-if)# end
Table 14-1. VLAN Membership CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 475
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Settings
After a VLAN has been defined, assign ports to it.
To assign a VLAN to untagged packets, arriving on the device, enter the port
default VLAN ID (PVID). All untagged packets arriving to the device are
tagged by the ports PVID.
All ports must have a defined PVID. If no other value is configured, the
default VLAN PVID is used. VLAN ID #1 is the default VLAN, and cannot
be deleted from the system.
To configure ports on a VLAN:
1 Click Switching > VLAN > Port Settings in the tree view to display the
Port Settings: Summary page.
Figure 14-3. Port Settings: Summary
All interfaces on the selected unit and their settings are displayed.
2 To modify the port settings, click Edit, and enter the fields:
– Interface — Enter the unit/port number to be modified.
– Switchport Mode — Select whether the port is in Layer 2 or Layer 3.
If the port is in Layer 2, enter the parameters described below,
otherwise the fields are not relevant.476 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Port VLAN Mode — Enter the port VLAN mode. The possible
options are:
• General — The port belongs to VLANs, and each VLAN is
user-defined as tagged or untagged (full 802.1Q mode).
• Access — The port belongs to a single untagged VLAN. When a
port is in Access mode, the packet types that are accepted on the
port cannot be designated. Ingress filtering cannot be
enabled/disabled on an access port.
• Trunk — The port belongs to VLANs on which all ports are tagged
(except for one port that can be untagged).
• Customer — When a port is in Customer mode, an added tag
provides a VLAN ID to each customer, ensuring private and
segregated network traffic for that customer.
• Private VLAN Promiscuous — The port is a promiscuous port.
• Private VLAN Host — The port is an isolated port
– Current Reserved VLAN — Displays the VLAN currently designated
by the system as the reserved VLAN.
– Reserve VLAN for Internal Use (1-4094) — Check to enter a reserved
VLAN, and enter its ID. If none is required, check None.
– PVID (1-4095) — Enter a VLAN ID to be added to untagged packets.
The possible values are 1-4095. VLAN 4095 is defined according to
standard and industry practice as the discard VLAN. Packets classified
to the discard VLAN are dropped.
– VLAN List (I - Inactive Configuration) — Enter the VLAN(s) to
which this port belongs, and indicate its type. The possible options are:
• T — Tagged. The port is a member of a VLAN. All packets
forwarded by the LAG are tagged. The packets contain VLAN
information.
• U — Untagged. The port is a member of a VLAN. Packets
forwarded by the LAG are untagged.
• F — Forbidden. The port is denied membership to a VLAN.
Click Add to move the port to the VLAN list together with its type.Dell PowerConnect 55xx Systems User Guide 477
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Frame Type — Select the packet type accepted on the port. The
possible options are:
• Admit All — Both tagged and untagged packets are accepted on
the port.
• Admit Tagged Only — Only tagged packets are accepted on the
port.
• Admit Untagged Only — Only untagged packets are accepted on
the port.
– Ingress Filtering — Enable/disable ingress filtering, which discards
packets that are destined to VLANs of which the specific port is not a
member.
– Native VLAN ID(1-4094) — Enter VLAN used for untagged traffic to
trunk ports.
– Multicast VLAN ID(1-4094) — Enter VLAN used for Multicast TV
VLAN traffic on access ports.
– Customer VLAN ID(1-4094) — Enter VLAN used for customer
ports.
Assigning Ports to VLAN Groups Using CLI Commands
The following table summarizes the CLI commands for assigning ports to
VLAN groups.
Table 14-2. Port-to-VLAN Group Assignments CLI Commands
CLI Command Description
switchport general acceptableframe-type {tagged-only|untaggedonly|all}
no switchport general acceptableframe-type
Configures ingress filtering based
on packet type tagged/untagged.
Use the no form of this command
to return to default.
switchport mode
{access|trunk|general}
Configures the VLAN
membership mode of a port.478 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
switchport access vlan {vlanid|none}
no switchport access vlan
Configures the VLAN ID when
the interface is in access mode.
Use the no form of this command
to restore the default
configuration.
switchport trunk allowed vlan
{all|none|add vlan-list|remove
vlan-list|except vlan-list}
no switchport trunk allowed vlan
Sets the trunk characteristics
when the interface is in Trunking
mode.
Use the no form of this command
to reset a trunking characteristic
to the default.
switchport trunk native vlan {vlanid|none}
no switchport trunk native vlan
Defines the native VLAN when
the interface is in trunk mode.
Use the no form of this command
to restore the default
configuration.
switchport general allowed vlan
{add|remove} vlan-list
[tagged|untagged]
no switchport general allowed vlan
Sets the general characteristics
when the interface is in general
mode.
Use the no form of this command
to reset a general characteristic to
the default.
switchport general pvid vlan-id
no switchport general pvid
Configures the PVID when the
interface is in general mode.
Use the no form of this command
to restore the default
configuration.
switchport customer vlan vlan-id
no switchport customer vlan
Sets the port's VLAN when the
interface is in customer mode.
Use the no form of this command
to restore the default
configuration.
Table 14-2. Port-to-VLAN Group Assignments CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 479
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
switchport mode
{access|trunk|general|private-vlan
{promiscuous|host}|customer}
no switchport mode
Configure the VLAN membership
mode of a port.
Use the no form of this command
to restore the default
configuration.
Table 14-2. Port-to-VLAN Group Assignments CLI Commands (Continued)
CLI Command Description480 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# vlan database
console(config-vlan)# vlan 23-25
console(config-vlan)# end
console(config)# interface vlan 23
console(config-if)# name Marketing
console(config-if)# end
console(config)# interface gi1/0/8
console(config-if)# switchport mode access
console(config-if)# switchport access vlan 23
console(config-if)# end
console(config)# interface gi1/0/9
console(config-if)# switchport mode trunk
console(config-if)# switchport mode trunk allowed vlan add
23-25
console(config-if)# end
console(config)# interface gi1/0/11
console(config-if)# switchport mode general
console(config-if)# switchport general allowed vlan add
23,25 tagged
console(config-if)# switchport general pvid 25Dell PowerConnect 55xx Systems User Guide 481
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LAGs Settings
VLANs can either be composed of individual ports or of LAGs. Untagged
packets entering the device are tagged with the LAGs ID specified by the
PVID.
To configure LAGS on a VLAN:
1 Click Switching > VLAN > LAG Settings in the tree view to display the
VLAN LAG Settings page.
Figure 14-4. VLAN LAG Settings
All LAGs and their settings are displayed.
2 To modify the LAG settings, click Edit, and enter the fields:
– LAG — Select the LAG to be modified.
– Switchport Mode — Select whether the LAG is in Layer 2 or Layer 3.
If the LAG is in Layer 2, enter the parameters described below,
otherwise the fields are not relevant.482 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Port VLAN Mode — Enter the port VLAN mode. The possible
options are:
• General — The port belongs to VLANs, and each VLAN is
user-defined as tagged or untagged (full 802.1Q mode).
• Access — The port belongs to a single untagged VLAN. When a
port is in Access mode, the packet types that are accepted on the
port cannot be designated. Ingress filtering cannot be
enabled/disabled on an access port.
• Trunk — The port belongs to VLANs on which all ports are tagged
(except for one port that can be untagged).
• Customer — When a port is in Customer mode, an added tag
provides a VLAN ID to each customer, ensuring private and
segregated network traffic for that customer.
• Private VLAN Promiscuous — The port is a promiscuous port.
• Private VLAN Host — The port is an isolated port
– Current Reserved VLAN — Displays the VLAN currently designated
as the reserved VLAN.
– Reserve VLAN for Internal Use (1-4094) — Enter the VLAN that is
designated as the reserved VLAN after the device is reset, or select
None.
– PVID (1-4095)— Assigns a VLAN ID to untagged packets. The possible
VLAN IDs are 1-4095. VLAN 4095 is defined as per standard and
industry practice, as the discard VLAN. Packets classified to this
VLAN are dropped.
– VLAN List (I - Inactive Configuration) — Enter the VLAN(s) to
which this LAG belongs, and indicate its type. The possible options are:
• T — Tagged. The LAG is a member of a VLAN. All packets
forwarded by the LAG are tagged. The packets contain VLAN
information.
• U — Untagged. The LAG is a member of a VLAN. Packets
forwarded by the LAG are untagged.
• F — Forbidden. The LAG is denied membership to a VLAN.
Click Add to move the LAG to the VLAN list together with its type.Dell PowerConnect 55xx Systems User Guide 483
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Frame Type — Packet type accepted by the LAG. The possible options
are:
• Admit All — Tagged and untagged packets are both accepted by
the LAG.
• Admit Tag Only — Only tagged packets are accepted by the LAG.
• Admit Untagged Only — Only untagged packets are accepted on
the LAG.
– Ingress Filtering — Enable/disable Ingress filtering by the LAG.
Ingress filtering discards packets that are destined to VLANs of which
the specific LAG is not a member.
– Native VLAN ID (1-4094) — Enter VLAN used for untagged traffic
to trunk ports, or select None.
– Multicast VLAN ID (1-4094) — Enter VLAN used for Multicast TV
VLAN traffic on access ports, or select None.
– Customer VLAN ID (1-4094) — Enter VLAN used for customer
ports, or select None.
Assigning LAGs to VLAN Groups Using CLI Commands
Refer to Table 14-2 for a list of the LAG to VLAN CLI commands.484 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Protocol Groups
Protocol groups are based on protocol-based VLANs.
Protocol-based VLANs
Untagged frames received on a VLAN-aware switch can be classified by
methods others than source port, such as data-link-layer protocol
identification. This classification method is referred to as protocol-based
VLANs.
Protocol-based VLANs are useful for isolating Layer 2 traffic of various Layer
3 protocols. If, for example, a switch serves IP stations and IPX stations that
communicate with a single VLAN-unaware server, without using
protocol-based VLANs, all the Layer 2 Broadcast traffic would reach all the
stations. With protocol-based VLANs, the switch can forward incoming
traffic from the server to stations in a specific VLAN only.
Protocol-based VLANs are only available on General ports.
Classification rules are set on a per-port basis, and may be sensitive to the
frame's encapsulation. The default encapsulation assumed is Ethernet.
On each port, a user can define associations between groups of data-link layer
protocols and ports. For each group/port combination, the user may set the
VLAN to which frames incoming on that port will be classified if they belong
to any of the protocols in the group.
Several protocol-groups may be associated to a single port, and a protocol
group may be assigned to multiple ports, if so desired.
It is not guaranteed that the VLAN to which the frame is classified exists in
the system, or is active on that port.
Restrictions
The following frames (packet) types are supported: Ethernet, RFC 1042, and
LLC Other.
There may be dependencies between protocols and encapsulations, and
specifying one protocol may automatically add additional protocols to the
protocol-group, such as specifying IP implies ARP and vice-versa. Dell PowerConnect 55xx Systems User Guide 485
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Similarly, there may be implied dependencies between encapsulations, so that
specifying an encapsulation implies defining the protocol group for related
encapsulations. An example of this is specifying the Ethernet encapsulation,
even by default, implies IEEE802 encapsulation, as per RFC 1042.
The following standards are relevant:
• IEEE802.1V defines VLAN assignment by protocol type.
• IETF RFC 10-2 defines a standard for the transmission of IP datagrams
over IEEE 802 Networks
Defining Protocol Groups
Define protocol groups in two steps:
1 Define a protocol group by assigning one or more protocols to the group
and giving it a protocol-group ID (any integer), using the Protocol Group
pages.
2 Associate the group with a desired VLAN classification, per port, using the
Protocol Port pages.486 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define a protocol group:
1 Click Switching > VLAN > Protocol Group in the tree view to display
the Protocol Group: Summary page.
Figure 14-5. Protocol Group: Summary
The currently-defined protocol groups are displayed.
2 To add a new protocol group, click Add, and enter the fields:
– Frame Type — Select a frame type to be accepted in the protocol
group.
– Protocol Value — Select a protocol name.
or
– Ethernet-Based Protocol Value (0600 - FFFF) — Enter the Ethernet
protocol group type.
– Protocol Group ID — Assign a protocol group ID number.Dell PowerConnect 55xx Systems User Guide 487
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining VLAN Protocol Groups Using CLI Commands
The following table summarizes the CLI commands for defining VLAN
Protocol groups.
The following is a sample of the CLI commands:
Table 14-3. VLAN Protocol Groups CLI Commands
CLI Command Description
map protocol protocol
[encapsulation] protocolsgroup group
no map protocol protocol
[encapsulation]
Maps a protocol to a protocol group.
Protocol groups are used for protocolbased VLAN assignment.
Use the no form of this command to
delete a protocol from a group.
console (config)# vlan database
console (config-vlan)# map protocol ip protocols-group 213488 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Protocol Port
A protocol port is a port assigned to a particular protocol group. Traffic from
particular types of frames may be assigned to a protocol group, which has a
port and VLAN associated with it.
To add an interface to a protocol group:
1 Click Switching > VLAN > Protocol Port in the tree view to display the
Protocol Port: Summary page.
Figure 14-6. Protocol Port: Summary
A list of previously-defined protocol groups is displayed.
2 To assign an interface to a protocol group, click Add, and enter the fields:
– Interface — Port or LAG number to be added to a protocol group.
– Group ID — Select a protocol group ID to which the interface is
added. Dell PowerConnect 55xx Systems User Guide 489
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Protocol ports can either be attached to aVLAN ID or a VLAN name.
– VLAN ID (1- 4094) —Check and enter a VLAN ID.
or
– VLAN Name — Check and enter a VLAN name.
Defining Protocol Ports Using CLI Commands
The following table summarizes the CLI command for defining protocol
ports.
The following is a sample of the CLI commands:
Table 14-4. Protocol Port CLI Commands
CLI Command Description
switchport general map
protocols-group group vlan
vlan-id
no switchport general map
protocols-group group
Sets a protocol-based classification rule.
Use the no form of this command to
delete a classification.
console (config-if)# switchport general map protocolsgroup 1 vlan 8490 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
GVRP Parameters
GARP VLAN Registration Protocol (GVRP) is provided for automatic
distribution of VLAN membership information among VLAN-aware bridges.
GVRP enables VLAN-aware bridges to automatically learn VLANs-to-bridgeports mapping, without having to individually configure each bridge and
register VLAN membership.
To ensure the correct operation of the GVRP protocol, it is advised to set the
maximum number of GVRP VLANs equal to a value which significantly
exceeds:
– The number of all static VLANs both currently configured and
expected to be configured.
– The number of all dynamic VLANs participating in GVRP, both
currently configured (initial number of dynamic GVRP VLANs is 128)
and expected to be configured.
To set GVRP parameters:
1 Click Switching > VLAN > GVRP Parameters in the tree view to display
the GVRP Parameters: Summary page.
Figure 14-7. GVRP Global Parameters
2 Enable/disable GVRP on the device in the GVRP Global Status field.Dell PowerConnect 55xx Systems User Guide 491
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 Check Unit ID and select a unit ID to view ports on the unit, or select
LAGs to view the LAGs in the system.
4 To set GVRP for an interface, click Edit, and enter the fields:
– Interface — Specifies port or LAG for editing GVRP settings.
– GVRP State — Enable/disable GVRP on the interface.
– Dynamic VLAN Creation — Enable/disable Dynamic VLAN creation
on the interface.
– GVRP Registration — Enable/disable VLAN registration through
GVRP on the interface.
NOTE: GVRP functions only on ports in switchport general mode. If you enable it on
another type of port, GVRP does not function.
Configuring GVRP Using CLI Commands
The following table summarizes the CLI commands for configuring GVRP as
displayed in the GVRP Global Parameters page.
Table 14-5. GVRP Global Parameters CLI Commands
CLI Command Description
gvrp enable
no gvrp enable
In Global Configuration mode, this
command enables GVRP globally. In
Interface Configuration mode, it
enables GVRP on the interface.
Use the no form of this command to
disable GVRP on the device.
gvrp vlan-creation-forbid
no gvrp vlan-creation-forbid
Enables or disables dynamic VLAN
creation.
Use the no form of this command to
enable dynamic VLAN creation or
modification.
gvrp registration-forbid
no gvrp registration-forbid
De-registers all dynamic VLANs, and
prevents dynamic VLAN registration on
the port.
Use the no form of this command to
allow dynamic registration of VLANs on
a port.492 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
show gvrp configuration
[[gigabitethernet|tengigabitet
hernet] port-number|portchannel LAG-number]
Displays GVRP configuration
information, including timer values,
whether GVRP and dynamic VLAN
creation is enabled, and which ports are
running GVRP.
show gvrp error-statistics
[[gigabitethernet|tengigabitet
hernet] port-number|portchannel LAG-number]
Displays GVRP error statistics.
show gvrp statistics
[[gigabitethernet|tengigabitet
hernet] port-number|portchannel LAG-number]
Displays GVRP statistics.
clear gvrp statistics
[[gigabitethernet|tengigabitet
hernet] port-number|portchannel LAG-number]
Clears all the GVRP statistics
information.
Table 14-5. GVRP Global Parameters CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 493
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
console(config)# gvrp enable
console(config)# interface gi1/0/1
console(config-if)# gvrp enable
console(config-if)# gvrp vlan-creation-forbid
console(config-if)# gvrp registration-forbid
console(config-if)# end
console# show gvrp configuration
GVRP Feature is currently Disabled on the device.
Maximum VLANs: 4094
Port(s) GVRP-Status Registration Dynamic VLAN Timers(milliseconds)
Creation Join Leave Leave All
-------- ----------- ------------ ------------ ---- ----- --------
gi1/0/1 Disabled Normal Enabled 200 600 10000
gi1/0/2 Disabled Normal Enabled 200 600 10000
gi1/0/3 Disabled Normal Enabled 200 600 10000
gi1/0/4 Disabled Normal Enabled 200 600 10000
gi1/0/5 Disabled Normal Enabled 200 600 10000
gi1/0/6 Disabled Normal Enabled 200 600 10000
gi1/0/7 Disabled Normal Enabled 200 600 10000
gi1/0/8 Disabled Normal Enabled 200 600 10000
gi1/0/9 Disabled Normal Enabled 200 600 10000494 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Private VLAN
Private VLANs (PVLANs) provide Layer 2 isolation between ports that share
the same Broadcast domain, or in other words, they create a
point-to-multipoint Broadcast domain. The ports can be located anywhere in
the Layer 2 network, as opposed to protected ports which must be in the same
stack.
The switch ports can be members of a Private VLAN (PVLAN) in the
following membership types:
• Promiscuous ports that can communicate with all ports of the same
PVLAN, including the isolated ports of the same PVLAN.
• Isolated ports that have complete Layer 2-isolation from the other ports
within the same PVLAN, but not from the promiscuous ports. Isolated
ports can communicate with promiscuous ports.
The PVLAN entity is implemented by allocating the following VLANs per PVLAN:
• Primary VLAN: Carries traffic from promiscuous ports.
• Isolated VLAN: Carries traffic from isolated ports.Dell PowerConnect 55xx Systems User Guide 495
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To configure PVLANs:
1 Click Switching > VLAN > Private VLAN in the tree view to display the
Private VLAN: Summary page.
Figure 14-8. Private VLAN: Summary
The previously-defined private VLANs are displayed.
2 To query by Associated Primary VLAN ID, check that field, enter a VLAN
ID, and click Query. The associated VLANs are displayed.
3 To define a private VLAN, click Assign, and enter the fields:
– Private VLAN ID — Select a VLAN to be assigned.
– Private VLAN Type — Select one of the possible options:
• Primary — Traffic from promiscuous ports flow through this type
of VLAN. This is for the internet or shared servers.
• Isolated —Traffic from isolated ports flow through this type of
VLAN.496 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Associate Primary VLAN — If the Private VLAN type is Isolated,
check to associate the isolated VLAN with a primary VLAN, thus
allowing traffic between isolated and promiscuous ports.
– Primary VLAN ID — Select a VLAN to be associated with the
isolated VLAN.
4 To assign ports to the private VLAN, click Membership.
5 Select a Primary VLAN ID.
6 Select a Isolated VLAN ID.
7 Select the ports to be assigned to each VLAN, and assign each port/LAG a
port type in the Admin row of ports/LAGs. The possible options are:
– H - Host (Isolated) — Port is isolated.
– P - Promiscuous — Port is promiscuous.
– C - Conditional (operational state depends on Port VLAN Mode) —
Port receives the Port VLAN type set in the VLAN Port Settings page.
See "Port Modes" on page 469 for a description of the various port modes.
Configuring Private VLAN Using CLI Commands
The following table summarizes the CLI commands for configuring private
VLANs.
Table 14-6. Private VLAN CLI Commands
CLI Command Description
private-vlan
{primary|isolated}
no private-vlan
Configures a private VLAN.
Use the no form of this command to
return the VLAN to normal VLAN
configuration.
private-vlan association
[add|remove] secondary-vlanlist
no private-vlan association
Configures the association between the
primary VLAN and the secondary
VLANs.
Use the no form of this command to
remove the association.Dell PowerConnect 55xx Systems User Guide 497
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
switchport private-vlan
mapping primary-vlan-id
[add|remove] secondary-vlanlist
no switchport private-vlan
mapping
Configures the VLANs of the privatevlan promiscuous port.
Use the no form of this command to
reset to default
switchport private-vlan hostassociation primary-vlan-id
secondary-vlan-id
no switchport private-vlan
host-association
Configures the VLANs of the privatevlan host port.
Use the no form of this command to
reset to default.
show vlan private-vlan [tag
vlan-id]
Displays private VLAN information.
console# show vlan private-vlan
Primary Secondary Type Ports
-------- --------- ---------- ---------------------
20 Primary gi1/0/1-2
20 201 Isolated gi1/0/1-8
20 202 Isolated gi1/0/1-2 gi1/09-18
20 203 Isolated gi1/0/1-2 gi1/0/19-21
30 Primary gi1/0/22
30 301 Isolated gi1/0/22-28
30 302 Isolated gi1/0/22, gi1/0/29-38
30 303 Isolated gi1/0/22, gi1/0/39-41
Table 14-6. Private VLAN CLI Commands (Continued)
CLI Command Description498 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Voice VLAN
The Voice VLAN feature enables you to enhance VoIP service by configuring
ports to carry IP-voice traffic from IP phones on a specific VLAN. This VLAN
is configured with a QoS profile that ensures high voice quality.
Equipment, such as VOIP phones, transmits IP traffic with a pre-configured
Organizational Unique Identifier (OUI) prefix in the source MAC address.
This enables the switch to dynamically identify ports connected to the VoIP
equipment and automatically add these ports to the Voice VLAN.
IP phones use one of the following modes, both of which are supported by the
device:
• Use only tagged packets for all communications.
• Initially use untagged packets while retrieving the initial IP address
through DHCP. Then the phone uses the Voice VLAN and starts sending
tagged VoIP packets.
Non-VoIP traffic is dropped from the Voice VLAN when the device is in Auto
Voice VLAN secured mode.
The Voice VLAN feature also provides QoS actions to VoIP, ensuring that the
quality of voice does not deteriorate if the IP traffic is received unevenly.
To summarize, when Voice VLAN is enabled and configured, and VoIP
equipment is connected to one of the switch ports, the VoIP traffic triggers
the switch’s Voice VLAN feature to add this port to the Voice VLAN (a VLAN
that usually carries only voice traffic), and to assign traffic from this port a
specific QoS profile, ensuring high voice quality.
The device supports a single voice VLAN. Dell PowerConnect 55xx Systems User Guide 499
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Properties
To set voice VLAN parameters that apply to the voice VLAN on the device:
1 Click Switching > VLAN > Voice VLAN > Properties in the tree view to
display the Properties page.
Figure 14-9. Properties
2 Enter the fields:
– Voice VLAN State — Select Enable to use the Voice VLAN feature on
the device.
– Voice VLAN ID — Select the VLAN that is to be the voice VLAN.
– Class of Service — Select to add a CoS level to untagged packets,
received on the voice VLAN. The possible values are 0 to 7, where 7 is
the highest priority. 0 is used as a best-effort, and is invoked
automatically when no other value has been set.
– Remark CoS — Displays whether the Remark CoS is enabled.500 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Voice VLAN Aging Time — Enter the interval of time after which the
port exits the voice VLAN, if no voice packets are received.
The aging time starts after the MAC address is aged out from the
Dynamic MAC Address table. The default time is 300 sec. For more
information on defining MAC address age out time, see "Dynamic
Addresses" on page 427.
Defining Voice VLAN Properties Using CLI Commands
The following table summarizes the CLI command for defining voice VLAN
properties.
Table 14-7. Voice VLAN Properties CLI Commands
CLI Command Description
voice vlan enable
no voice vlan enable
Enables automatic voice VLAN
configuration for a port.
Use the no form of this command to
disable automatic voice VLAN
configuration.
voice vlan id vlan-id
no voice vlan id
Enables the voice VLAN and configures
the voice VLAN ID in Global
Configuration mode.
Use the no form of this command to
disable voice VLAN.
voice vlan cos cos-queue
[remark]
no voice vlan cos
Sets the voice VLAN Class of Service
(CoS) queue.
Use the no form of this command to
restore the default configuration.
voice vlan aging-timeout
minutes
no voice aging-timeout
Sets the voice VLAN aging timeout in
Global Configuration mode.
Use the no form of this command to
return to default.
show voice vlan
[[gigabitethernet|tengigabite
thernet] port-number|portchannel LAG-number]
Use the show voice vlan EXEC command
to display the voice VLAN status.Dell PowerConnect 55xx Systems User Guide 501
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of some of the CLI commands:
console# show
voice vlan
Aging timeout:
OUI table
1440 minutes
MAC Address -
Prefix
Description
00:E0:BB 3COM
00:03:6B Cisco
00:E0:75 Veritel
00:D0:1E Pingtel
00:01:E3 Siemens
00:60:B9 NEC/Philips
00:0F:E2 Huawei-3COM
00:09:6E Avaya
Voice VLAN VLAN
ID: 8
CoS: 6
Remark: Yes
Interface Enabled Secure Activated
--------- -------- ------ ---------
gi1/0/1 Yes Yes Yes
gi1/0/2 Yes Yes Yes
gi1/0/3 Yes Yes Yes
gi1/0/4 Yes Yes Yes502 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Setting
To configure voice VLAN ports properties:
1 Click Switching > VLAN > Voice VLAN > Port Setting in the tree view
to display the Port Setting: Summary page.
Figure 14-10. Voice VLAN Port Setting
A list of the ports and their voice VLAN settings is displayed.
2 To modify the voice VLAN settings for an interface, click Edit, and enter
the fields:
– Interface — Enter the specific port or LAG to which the Voice VLAN
settings are applied.
– Voice VLAN Mode — Select the Voice VLAN mode. The possible
options are: Dell PowerConnect 55xx Systems User Guide 503
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• None— Disables the selected port/LAG on the Voice VLAN. This
is the default.
• Static — Statically adds the port to the Voice VLAN. This is
usually done for VoIP uplink ports that connect the device to VoIP
PBX, for example.
• Auto — Indicates that if traffic with an IP phone MAC address is
transmitted on the port/LAG, the port/LAG joins the Voice
VLAN. The port/LAG is aged out of the voice VLAN if the IP
phone’s MAC address (with an OUI prefix) is aged out. If the
MAC address of the IP phones OUI was added manually to a
port/LAG in the voice VLAN, the user cannot add it to the Voice
VLAN in Auto mode, only in Static mode.
– Voice VLAN Security — Enable/disable security on the interface.
Security ensures that packets arriving with an unrecognized OUI are
dropped (for example data packets).
Defining Voice VLAN Port Settings Using CLI Commands
The following table summarizes the CLI command for defining Voice VLAN
port settings.
Table 14-8. Voice VLAN Port Settings CLI Commands
CLI Command Description
voice vlan enable
no voice vlan enable
Enables automatic voice VLAN
configuration on a port.
Use the no form of this command to disable
automatic voice VLAN configuration on a
port.
voice vlan secure
no voice vlan secure
Configures secure mode for the voice VLAN.
Use the no form of this command to disable
secure mode.504 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
OUI
Organizationally Unique Identifiers (OUIs) are a 24-bit numbers assigned by
the Institute of Electrical and Electronics Engineers, Incorporated (IEEE)
Registration Authority to equipment manufacturers.
Up to 16 OUIs can be stored on the switch. Nine specific OUIs of popular
VoIP phones manufacturers are stored by default.
Traffic from each type of IP phone contains the OUI for the phone
manufacturer. When frames are received, in which the source MAC address’s
first three octets match one of the OUIs in the OUI list, the port on which
they are received is automatically assigned to the Voice VLAN.
console(config)# interface gi1/0/1
console(config-if)# voice vlan enable
console(config-if)# voice vlan secure
console(config-if)#Dell PowerConnect 55xx Systems User Guide 505
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To view existing OUIs, and add new OUIs:
1 Click Switching > VLAN > Voice VLAN > OUI in the tree view to
display the OUI Summary.
Figure 14-11. OUI: Summary
The previously-defined OUIs are displayed.
2 To add a new OUI, click Add, and enter the fields:
– Telephony OUI — Enter a new OUI.
– Description — Enter an OUI description up to 32 characters. 506 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Voice VLAN OUIs Using CLI Commands
The following table summarizes the CLI command for defining Voice VLAN
OUIs.
The following is an example of the CLI commands:
Table 14-9. Voice VLAN OUIs CLI Commands
CLI Command Description
voice vlan oui-table {add
mac-address-prefix|remove
mac-address-prefix}
[text]
no voice vlan oui-table
Configures the voice OUI table.
Use the no form of this command to restore
the default configuration.
console(config)# voice vlan oui-table add 00:E0:BB
console(config)#Dell PowerConnect 55xx Systems User Guide 507
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY508 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
15
Link Aggregation
This section describes link aggregation of ports.
It contains the following topics:
• Link Aggregation Overview
• LACP Parameters
• LAG MembershipDell PowerConnect 55xx Systems User Guide 509
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Link Aggregation Overview
Link Aggregation optimizes port usage by linking a group of ports together to
form a single LAG (aggregated group). Aggregating ports multiplies the
bandwidth between the devices, increases port flexibility, and provides link
redundancy.
The device supports the following types of LAGs:
• Static LAGs — Manually-configured LAGs.
• Link Aggregation Control Protocol (LACP) LAGs — LACP LAGs
negotiate aggregating a port’s links with other LACP ports located on a
different device. If the other device ports are also LACP ports, the devices
establishes a LAG between them.
When you aggregate ports, the ports and LAG must fulfill the following
conditions:
• All ports within a LAG must be the same media type.
• A VLAN is not configured on the port.
• The port is not assigned to another LAG.
• Auto-negotiation mode is not configured on the port.
• The port is in full-duplex mode.
• All ports in the LAG have the same ingress filtering and tagged modes.
• All ports in the LAG have the same back pressure and flow control modes.
• All ports in the LAG have the same priority.
• All ports in the LAG have the same transceiver type.
• The device supports up to 32 LAGs, and eight ports in each LAG.
• Ports can be configured as LACP ports only if the ports are not part of a
previously configured LAG.510 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Ports added to a LAG lose their individual port configuration. When ports are
removed from the LAG, the original port configuration is applied to the ports.
The device uses a hash function to assign packets to a LAG member. The
hash function statistically load-balances the aggregated link members. The
device considers an Aggregated Link to be a single logical port.
Aggregate ports can be linked into link-aggregation port-groups. Each group
comprises ports with the same speed, set to full-duplex operations.
Ports in a LAG can contain different media types if the ports are operating at
the same speed. Aggregated links can be manually or automatically
configured by enabling LACP on the relevant links.Dell PowerConnect 55xx Systems User Guide 511
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LACP Parameters
To define LACP LAGs, configure LACP global and port parameters, such as
LACP system priority, timeout, and port priority.
With all factors equal, when the LAG is configured with more candidate ports
than the maximum number of active ports allowed, the switch activates the
highest priority candidate ports from the dynamic LAG.
To set LACP parameters:
1 Click Switching > Link Aggregation > LACP Parameters in the tree
view to display the LACP Parameters page.
Figure 15-1. LACP Parameters
The LACP parameters for all ports are displayed.
2 Enter the global LACP System Priority (1-65535) value that determines
which candidate ports will become members of the LAG.
The page displays the LACP settings of the ports on the selected unit.
3 To modify LACP parameters for a particular port, click Edit, and enter the
following fields:
– Port — Select the port for which timeout and priority values are
assigned.512 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– LACP Port Priority (1-65535) — Enter the LACP priority value for
the port.
– LACP Timeout — Select the rate of periodic transmissions of LACP
PDUs. The possible options are:
• Long — Slow transmission rate
• Short — Fast transmission rate
Configuring LACP Parameters Using CLI Commands
The following table summarizes the CLI commands for configuring LACP
parameters as displayed in the LACP Parameters page.
Table 15-1. LACP Parameters CLI Commands
CLI Command Description
lacp system-priority value Configures the system priority.
lacp port-priority value Configures the priority value for
physical ports.
lacp timeout{long|short} Assigns an administrative LACP
timeout.
show lacp
[gigabitethernet|tengigabitether
net] port-number
[parameters|statistics|protocolstate]
Displays LACP information for
ethernet ports.Dell PowerConnect 55xx Systems User Guide 513
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console (config)# lacp system-priority 120
console (config)# interface gi1/0/11
console (config-if)# lacp port-priority 247
console (config-if)# lacp timeout long
console (config-if)# end
console# show lacp gi1/0/11 statistics
Port gi1/0/11 LACP Statistics:
LACP PDUs sent:2
LACP PDUs received:2514 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LAG Membership
Each device supports up to 32 LAGs per system, and eight ports per LAG.
When you add a port to a LAG, the port acquires the LAG’s properties. If the
port cannot be configured with the LAG’s properties, it is not added to the
LAG and an error message is generated.
If the first port joining the LAG cannot be configured with the LAG settings,
the port is added to the LAG, using the port default settings, and an error
message is generated. Since this is the only port in the LAG, the entire LAG
operates with the port’s settings, instead of the LAG’s defined settings.
To assign ports to LAGs:
1 Click Switching Link Aggregation LAG Membership in the tree view
to display the LAG Membership: Summary page.
Figure 15-2. LAG Membership: SummaryDell PowerConnect 55xx Systems User Guide 515
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The LACP and static LAGs on each unit are displayed along with their
member ports.
This page displays the following fields:
– LACP — Aggregates the port to a LAG, using LACP.
– LAG — Adds a port to a LAG, and indicates the specific LAG to
which the port belongs.
2 Click Edit to change the status of a port in a LAG.
3 Select the LAG.
4 In the LACP row (the first row), toggle the button under the port number
to assign either the LACP or the static LAG.
5 In the LAG row (the second row), toggle the button to a specific number
to aggregate or remove the port to that LAG number.
Adding Ports to LAGs Using CLI Commands
The following table summarizes the CLI commands for assigning ports to
LAGs as displayed in the LAG Membership pages.
The following is an example of the CLI commands:
Table 15-2. LAG Membership CLI Commands
CLI Command Description
channel-group LAG-number
mode {on|auto}
no channel-group
Associates a port with a port-channel with or
without a LACP operation.
Use the no form of this command to remove
the channel-group configuration from the
interface.
show interfaces portchannel [LAG-number]
Displays port-channel information for all port
channels or for a specific port channel.
console(config)# interface gi1/0/11
console(config-if)# channel-group 1 mode on516 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
16
Multicast
This chapter describes Multicast support on the device.
It contains the following topics:
• Multicast Support Overview
• Global Parameters
• Bridge Multicast Groups
• Bridge Multicast Forward All
• IGMP Snooping
• Unregistered Multicast
• Multicast TV VLAN
• Multicast TV VLAN MappingDell PowerConnect 55xx Systems User Guide 517
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Multicast Support Overview
Multicast forwarding enables a single packet to be forwarded to multiple
destinations. Layer 2 Multicast service is based on a Layer 2 device receiving a
single packet addressed to a specific Multicast address. Multicast forwarding
creates copies of the packet, and transmits the packets to the relevant ports.
There are two types of Multicast groups:
• Registered Multicast Group — When traffic addressed to a registered
Multicast group is received, it is handled according to its entry in the
Multicast Filtering Database and forwarded only to the registered
ports.
• Unregistered Multicast Group — If traffic addressed to an
unregistered Multicast group is received, it is handled by a special
entry in the Multicast Filtering Database. The default setting of this is
to flood all such traffic (traffic in unregistered Multicast groups).
The device supports:
• Forwarding L2 Multicast Packets — Forwards Layer 2 Multicast
packets. Layer 2 Multicast filtering is enabled by default, and is not
user-configurable.
• Filtering L2 Multicast Packets — Forwards Layer 2 packets to
interfaces. If Multicast filtering is disabled, Multicast packets are
flooded to all relevant ports.
NOTE: The system supports Multicast filtering for 256 Multicast groups.
Layer 2 Switching
Layer 2 switching forwards Multicast packets to all relevant VLAN ports by
default, managing the packet as a single Multicast transmission. While
Multicast traffic forwarding is effective, it is not optimal, as irrelevant ports
also receive the Multicast packets. The excess packets cause increased
network traffic. Multicast forwarding filters enable forwarding of Layer 2
packets to a subset of ports instead of to all ports.518 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IGMP
Internet Group Multicast Protocol (IGMP) adds IGMP packets to Multicast
traffic. When IGMP Snooping is enabled globally, all IGMP packets are
forwarded to the CPU. The CPU analyzes the incoming packets and
determines:
• Which ports want to join which Multicast groups.
• Which ports have Multicast routers generating IGMP queries.
• What routing protocols are forwarding packets and Multicast traffic.
Ports requesting to join a specific Multicast group issue an IGMP report,
specifying that the Multicast group is accepting members. This results in the
creation of an entry in the Multicast filtering database. Dell PowerConnect 55xx Systems User Guide 519
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Global Parameters
To enable Multicast filtering and IGMP Snooping:
1 Click Switching > Multicast Support > Global Parameters in the tree
view to display the Global Parameters page.
Figure 16-1. Global Parameters
2 Enter the fields:
– Bridge Multicast Filtering — Enable/disable Multicast filtering.
Disabled is the default value.
– IGMP Snooping Status — Enable/disable IGMP Snooping on the
device. Disabled is the default value. 520 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Enabling Multicast Filtering and IGMP Snooping Using CLI Commands
The following table summarizes the CLI commands for enabling Multicast
Filtering and IGMP snooping as displayed on the Global Parameters page.
The following is an example of the CLI commands:
Table 16-1. Multicast Filtering and Snooping CLI Commands
CLI Command Description
bridge multicast filtering
no bridge multicast filtering
Enables filtering of Multicast addresses.
Use the no form of this command to
disable multicast address filtering.
ip igmp snooping
no ip igmp snooping
Enables Internet Group Membership
Protocol (IGMP) snooping.
Use the no form of this command to
disable IGMP snooping.
console(config)# bridge multicast filtering
console(config)# ip igmp snoopingDell PowerConnect 55xx Systems User Guide 521
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Bridge Multicast Groups
The Bridge Multicast Group: Summary page displays the ports and LAGs
attached to a Multicast service group and the manner in which the port or
LAG joined it.
To add and configure a Multicast group:
1 Click Switching > Multicast Support > Bridge Multicast Group in the
tree view to display the Bridge Multicast Group: Summary page.
Figure 16-2. Bridge Multicast Group: Summary
The ports and LAGs in the selected Multicast Group are displayed.522 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Select a VLAN and enter the Multicast group IP address in Bridge
Multicast Address.
Two rows of ports and LAGs are displayed: for each unit
– Static — Displays available static ports/LAGs. These port/LAGs can
be included or excluded from the Multicast groups, as described
below.
– Current — Displays status of ports/LAGs in the Multicast group, as
actually applied.
3 For each port in the VLAN, toggle to S to join the port to the selected
Multicast group as a static port. Toggle a port to F to indicate that it is
Forbidden to this group. Leave the field empty if it is not involved in the
VLAN.
4 To add a new Multicast group, click Add, and enter the fields:
– VLAN ID — Select the VLAN ID to set its forwarding method.
– New Bridge IP Multicast — Enter a Multicast group IP address.
– New Bridge MAC Multicast — Enter a Multicast group MAC
address.
– Ports — Select the ports to be added to a Multicast service. Toggle a
port to S to join the port to the selected Multicast group as a static
port. Toggle a port to F to indicate that it is Forbidden to this service.
Leave the field empty if it is not involved in the VLAN.
– LAGs — Select the LAGs to be added to a Multicast service. Toggle a
LAG to S to join the port to the selected Multicast group as a static
LAG. Toggle a port to F to indicate that it is Forbidden to this service.
Leave the field empty if it is not involved in the VLAN.
The following table describes the codes used for the interface in this page:
Table 16-2. IGMP Port/LAG Members Table Control Settings
Port Control Definition
S Attaches the port to the Multicast group as static member in the static row.
The port/LAG has joined the Multicast group statically in the current row.
F Forbidden. The port cannot belong to the Multicast group.
Blank The port is not attached to a Multicast group, but it is also not forbidden.Dell PowerConnect 55xx Systems User Guide 523
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Managing Bridge Multicast Groups Using CLI Commands
The following table summarizes the CLI commands for managing Multicast
service members as displayed in the Bridge Multicast Group pages.
The following is an example of the CLI commands:
Table 16-3. Bridge Multicast Group CLI Commands
CLI Command Description
bridge multicast address {macmulticast-address|ip-multicastaddress}
no bridge multicast filtering
Registers MAC-layer Multicast
addresses to the bridge table, and
adds static ports to the group.
Use the no form of this command to
disable Multicast address filtering.
bridge multicast forbidden
address {mac-multicastaddress|ip-multicastaddress}[add|remove]
{[gigabitethernet|tengigabitethe
rnet] interface-list|portchannel LAG-number-list}
no bridge multicast forbidden
address {mac-multicast-address}
Forbids adding a specific Multicast
address to specific ports. Use the no
form of this command to return to
default
Use the no form of this command to
restore the default configuration.
show bridge multicast addresstable [vlan vlan-id] [address
{mac-multicast-address|ipmulticast-address}] [format
ip|mac]
Displays Multicast MAC address
table information.
console(config-if)# bridge multicast address 0100.5e02.0203
add gi1/0/11,gi1/0/12
console(config-if)# end
console # show bridge multicast address-table
VLAN MAC Address Type Ports
---- ----------- ----- ----------
1 0100.5e02.0203 static gi1/0/11,
gigi1/0/12
Forbidden ports for multicast addresses:524 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
VLAN MAC Address Ports
---- ----------- ----------
1 0100.5e02.0203 gi1/0/8
19 0100.5e02.0208 gi1/0/8
console # show bridge multicast address-table format ip
VLAN IP Address Type Ports
---- ----------- ----- ----------
1 224-239.130|2.2.3 static gi1/0/11, gi1/0/12
Forbidden ports for multicast addresses:
VLAN IP Address Ports
---- ----------- ----------
1 224-239.130|2.2.3 gi1/0/8Dell PowerConnect 55xx Systems User Guide 525
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Bridge Multicast Forward All
Use the BridgeMulticast Forward All page to attach ports or LAGs to a device
that is attached to a neighboring Multicast router/switch. After IGMP
Snooping is enabled, Multicast packets are forwarded to the appropriate port
or VLAN.
To attach interfaces to a Multicast service:
1 Click Switching > Multicast Support > Bridge Multicast Forward All in
the tree view to display the Bridge Multicast Forward All page.
Figure 16-3. Bridge Multicast Forward All
2 Select a unit/VLAN and click on the ports and LAGs to be attached to the
Multicast service. Toggle a port to S to join the port to the selected
Multicast group as a static port. Toggle a port to F to add it as a Forbidden
port.
Two rows of ports and LAGs are displayed:526 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Static — Displays available static ports/LAGs. These port/LAGs can
be included or excluded from the Multicast groups, as described
below.
– Current — Displays status of ports/LAGs, as actually applied, in the
Multicast group.
Managing LAGs and Ports Attached to Multicast Routers Using CLI Commands
The following table summarizes the CLI commands for managing LAGs and
ports attached to Multicast routers as displayed on the Bridge Multicast
Forward All page.
The following is an example of the CLI commands:
Table 16-4. Managing LAGs and Ports Attached to Multicast Routers CLI Commands
CLI Command Description
show bridge multicast filtering
vlan-id
Displays the Multicast filtering
configuration.
bridge multicast forward-all
{add|remove}
{[gigabitethernet|tengigabitethe
rnet] interface-list|portchannel LAG-number-list}
Enables forwarding of all Multicast
packets on a port.
Use the no form of this command to
return to default.
console(config)# interface vlan 1
console(config-if)# bridge multicast forward-all add
gi1/0/3
console(config-if)# end
console# show bridge multicast filtering 1
Filtering: Enabled
VLAN: Forward-All
Port Static Status
------- ----------------- -----------
gi1/0/11 Forbidden Filter
gi1/0/12 Forward Forward(s)
gi1/0/13 - Forward(d)Dell PowerConnect 55xx Systems User Guide 527
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IGMP Snooping
IGMP Snooping can be enabled globally, as described in the Global
Parameters page. It can also be enabled per VLAN to support selective IPv4
Multicast forwarding. In this case, Bridge Multicast filtering must also be
enabled.
By default, a Layer 2 switch forwards Multicast frames to all ports of the
relevant VLAN, essentially treating the frame as if it were a Broadcast. When
IGMP Snooping is enabled per VLAN, the switch forwards Multicast frames
to ports that have registered as Multicast clients in the VLAN.
NOTE: The switch supports IGMP Snooping only on static VLANs. It does not
support IGMP Snooping on dynamic VLANs.528 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The IGMP Snooping Querier is used to support a Layer 2 Multicast domain
of snooping switches in the absence of a Multicast router, for example, where
Multicast content is provided by a local server, but the router (if one exists)
on that network does not support Multicast.
There should only be a single IGMP Querier in a Layer 2 Multicast domain.
The switch supports standards-based IGMP Querier election when more than
one IGMP Querier is present in the domain.
The speed of IGMP Querier activity should be aligned with the IGMPsnooping-enabled switches. Queries should be sent at a rate that is aligned to
the snooping table aging time. If queries are sent at a rate lower than the
aging time, the subscriber cannot receive the Multicast packets.
To enable IGMP Snooping on a VLAN:
1 Click Switching Multicast Support IGMP Snooping in the tree view
to display the IGMP Snooping page.
Figure 16-4. IGMP Snooping
The IGMP snooping information for the VLANs on the switch is
displayed.
2 To enable IGMP Snooping on a VLAN, click Edit and select the VLAN
from the VLAN ID drop down menu.Dell PowerConnect 55xx Systems User Guide 529
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 Enter the fields:
• IGMP Snooping Status — Enable/disable the monitoring of network
traffic to determine which hosts have asked to be sent Multicast
traffic. The switch performs IGMP snooping only if IGMP snooping
and Bridge Multicast filtering are both globally enabled.
• Operational IGMP Snooping Status — Displays whether IGMP
Snooping is enabled.
• MRouter Ports Auto Learn — Enables or disables auto learning of the
ports to which the Mrouter is connected.
• Query Robustness (1-7) — Enter the Robustness variable value to be
used. The Robustness value enables tuning for the expected packet
loss on a link. If a link is expected to have losses, the Robustness Value
may be increased.
• Operational Query Robustness — Displays the robustness variable
sent by the elected querier.
• Query Interval (30-18000) — Enter the interval between general
queries sent by the querier .
• Operational Query Interval — The time interval in seconds between
general queries sent by the elected querier
• Query Max Response Interval (5-20) — Enter the amount of time in
which a host should respond to a query.
• Operational Query Max Response Interval — Displays the actual
delay.
• Last Member Query Counter (1-7) — Enter the number of IGMP
group-specific queries sent before the switch assumes there are no
local members. To use the default, check Use Default.
• Operational Last Member Query Counter — Displays the
operational value of the Last Member Query counter.
• Last Member Query Interval (100-25500)— Enter the time between
two consecutive group-specific queries that are sent by the querier.
• Operational Last Member Query Interval— Displays the Last
Member Query Interval sent by the elected querier.
• Intermediate Leave — Enable/disable an immediate timeout period.
The default timeout is 10 seconds.530 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• IGMP Querier Status — Enables or disables the IGMP Querier. The
IGMP Querier simulates the behavior of a Multicast router, enabling
snooping of the Layer 2 Multicast domain even though there is no
Multicast router.
• Querier Source IP Address — Select the IP address of the IGMP
Querier. Use either the VLAN’s IP address or define a unique IP
address that will be used as a source address of the querier.
• Operational Source Querier IP Address — Operational Querier IP
address.
Configuring IGMP Snooping Using CLI Commands
The following table summarizes the CLI commands for configuring IGMP
snooping on a VLAN:
Table 16-5. IGMP Snooping CLI Commands
CLI Command Description
ip igmp snooping vlan vlan-id
no ip igmp snooping vlan vlanid
Enables IGMP snooping on a specific
VLAN.
Use the no form of this command to
disable IGMP snooping on a VLAN
interface.
ip igmp snooping vlan vlan-id
mrouter learn pim-dvmrp
no ip igmp snooping vlan vlanid mrouter learn pim-dvmrp
Enables automatic learning of
Multicast router ports in the context of
a specific VLAN.
Use the no form of this command to
remove the configuration.
ip igmp robustness count
no ip igmp robustness
Changes the value of the IGMP
robustness variable.
Use the no format of the command to
return to default.
ip igmp query-interval seconds
no ip igmp query-interval
Configures the Query interval.
Use the no format of the command to
return to default.Dell PowerConnect 55xx Systems User Guide 531
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
ip igmp query-max-responsetime seconds
no ip igmp query-max-responsetime
Configures the Query Maximum
Response time.
Use the no format of the command to
return to default.
ip igmp last-member-querycount count
no ip igmp last-member-querycount
Configures the Last Member Query
Counter.
Use the no format of the command to
return to default.
ip igmp snooping vlan vlan-id
immediate-leave
no ip igmp snooping vlan vlanid immediate-leave
Enables the IGMP Snooping
Immediate-Leave processing on a
VLAN.
Use the no format of the command to
disable IGMP Snooping ImmediateLeave processing.
ip igmp snooping vlan vlan-id
querier
no ip igmp snooping vlan vlanid querier
Enables the IGMP querier on a specific
VLAN.
Use the no form of this command to
disable the IGMP querier on a VLAN
interface.
ip igmp snooping querier
address source-ip-address
no ip igmp snooping querier
address
Defines the source IP address that the
IGMP Snooping querier would use.
Use the no form of this command to
return to default.
show ip igmp snooping groups
[vlan vlan-id] [address ipmulticast-address]
Displays the Multicast groups learned
by IGMP snooping.
show ip igmp snooping
interface vlan-id
Displays IGMP snooping configuration.
show ip igmp snooping mrouter
[interface vlan-id]
Displays information about
dynamically learned Multicast router
interfaces.
Table 16-5. IGMP Snooping CLI Commands (Continued)
CLI Command Description532 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console (config)# ip igmp snooping
console (config)# interface vlan 1
console (config-if)# ip igmp snooping mrouter learn-pim-dvmrp
console (config)# interface vlan 1
console (config-if)# ip igmp snooping leave-time-out 60
console # do show ip igmp snooping groups
VLAN IP Address Querier Ports
---- ---------- ------ ----------------------
1 224-239.130 |2.2.3 Yes gi1/0/1, gi1/0/2
console # show ip igmp snooping interface 1
IGMP Snooping is globaly disabled
IGMP Snooping admin: Enabled
IGMP Snooping oper mode: Disabled
Routers IGMP version: 3
IGMP snooping querier admin: disabled
IGMP snooping querier oper: disabled
IGMP snooping querier address admin:
IGMP snooping querier address oper: 10.5.234.232
IGMP snooping robustness: admin 2 oper 2
IGMP snooping query interval: admin 125 sec oper 125 sec
IGMP snooping query maximum response: admin 10 sec oper 10 sec
IGMP snooping last member query counter: admin 2 oper 2
IGMP snooping last member query interval: admin 1000 msec oper
1000 msec
IGMP snooping last immediate leave: disable
Automatic learning of Multicast router ports is enabledDell PowerConnect 55xx Systems User Guide 533
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Unregistered Multicast
Multicast frames are generally forwarded to all ports in the VLAN. If IGMP
Snooping is enabled, the device learns about the existence of Multicast
groups and tracks which ports have joined what Multicast group.
Multicast groups can also be statically enabled. This enables the device to
forward the Multicast frames (from a registered Multicast group) only to
ports that are registered to that Multicast group.
Traffic from unregistered Multicast groups, which are the groups that are not
known to the device, can either be filtered or forwarded. After a port has been
set to Forwarding/Filtering, its configuration is valid for any VLAN of which it
is a member (or will be a member of).
To set the action for unregistered Multicast groups on a port:
1 Click Switching > Multicast Support > Unregistered Multicast in the
tree view to display the Unregistered Multicast: Summary page.
Figure 16-5. Unregistered Multicast: Summary534 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The action for each port is displayed.
2 To modify the forwarding action for an interface, click Edit, and enter the
fields.
• Interface — Select a port or LAG.
• Unregistered Multicast — Select the forwarding status of the selected
interface. The possible options are:
• Forwarding — Enables forwarding of unregistered Multicast
frames on the selected port or port-channel.
• Filtering — Enables filtering of unregistered Multicast frames on
the selected VLAN interface.
Configuring Unregistered Multicast Using CLI Commands
The following table summarizes the CLI commands for configuring
Unregistered Multicast on the device:
The following is an example of the CLI commands:
Table 16-6. Unregistered Multicast CLI Commands
CLI Command Description
bridge multicast unregistered Configures the forwarding state of
unregistered multicast addresses.
show bridge multicast unregistered Displays the unregistered multicast
filtering configuration.
console # show bridge multicast unregistered
Port Unregistered
------- --------
gi1/0/1 Forward
gi1/0/2 Filter
gi1/0/3 FilterDell PowerConnect 55xx Systems User Guide 535
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Multicast TV VLAN
This section describes the Multicast TV VLAN feature.
It contains the following sections:
• Multicast TV VLAN Overview
• Multicast TV VLAN Membership
• Multicast TV VLAN Mapping
Multicast TV VLAN Overview
The Multicast TV VLAN feature provides the ability to supply Multicast
transmissions to Layer 2-isolated subscribers, without replicating the
Multicast transmissions for all subscriber VLANs. The subscribers are the
only receivers of the Multicast transmissions.
• A Multicast TV VLAN can be defined for an Access port (a port that is
in Access mode for VLAN membership).
• All static VLANs are permitted to be a Multicast-TV VLAN.
• The configuration is performed per port.
One or more IP Multicast address groups can be associated with a Multicast
VLAN. The source port must belong to the Multicast VLAN. Source and
receiver ports do not have to be members of the same VLAN.
An end port is defined as a receiver port for the Multicast VLAN. Receiving
ports can belong to a single user VLAN and additionally to one Multicast
VLAN. The receiver port can be an access member in any VLAN, but not in
the defined Multicast VLAN. In Multicast VLAN, the receiver port can only
receive traffic and not send traffic on it. Receivers of same Multicast VLAN
are isolated in different User (Access port) VLANs and therefore isolated from
each other.
If a Multicast-TV VLAN is defined on an access port, then:
• The access port joins the Multicast-TV VLAN.
• The Multicast-TV VLAN on the receiver port is always untagged.
• The acceptable frame type of the port is set to Admit Untagged Only.536 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Multicast TV VLAN Membership
To view Multicast TV VLANs:
• Click Switching > Multicast Support > Multicast TV VLAN
Membership in the tree view to display the Multicast TV VLAN
Membership page.
Figure 16-6. Multicast TV VLAN Membership
The receiver and transceiver ports in the selected TV VLAN are displayed.
Displaying Multicast TV VLAN Membership Using CLI Commands
The following table summarizes the CLI command for displaying Multicast
TV VLAN membership:
Table 16-7. Multicast TV VLAN Membership CLI Commands
CLI Command Description
show vlan multicast-tv
vlan vlan-id
Displays information on the source ports and
receiver ports of multicast-TV VLAN.Dell PowerConnect 55xx Systems User Guide 537
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
Multicast TV VLAN Mapping
To set the Multicast Group IP address for a TV VLAN:
1 Click Switching > Multicast Support > Multicast TV VLAN Mapping
in the tree view to display the Multicast TV VLAN Mapping: Summary
page.
Figure 16-7. Multicast TV VLAN Mapping: Summary
The Multicast Group IP addresses for the selected TV VLAN are displayed.
2 To add the Multicast Group IP address for a VLAN, click Add, and enter
the fields:
• VLAN ID — Enter a VLAN ID.
console # show vlan multicast-tv vlan 1
Source Ports
-------------------------------------
gi1/0/8, gi1/0/9
Receiver Ports
-------------------------------------
gi2/0/1-18, gi3/0/1-18, gi4/0/1-18538 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Multicast Group IP Address — Enter the Multicast group IP address
for which the IGMP Snooping is enabled.
Mapping Multicast TV VLANs to IP Addresses Using CLI Commands
The following table summarizes the CLI command for mapping Multicast
TV VLANs to Multicast IP addresses:
The following is an example of the CLI commands:
Table 16-8. Unregistered Multicast CLI Commands
CLI Command Description
ip igmp snooping vlan vlan-id
multicast-tv ip-multicast-address
[count number]
no ip igmp snooping vlan vlan-id
multicast-tv ip-multicast-address
[count number]
Defines the Multicast IP
addresses that are associated
with a Multicast-TV VLAN.
Use the no form of this
command to remove all
associations.
show ip igmp snooping multicast-tv
[vlan vlan-id]
Displays the IP addresses associated with Multicast TV VLANs.
console# show ip igmp snooping multicast-tv
VLAN IP Address
---- -----------
1000 239.255.0.0
1000 239.255.0.1
1000 239.255.0.2
1000 239.255.0.3
1000 239.255.0.4
1000 239.255.0.5Dell PowerConnect 55xx Systems User Guide 539
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY540 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
17
LLDP
The section describes the Link Layer Discovery Protocol (LLDP).
It contains the following topics:
• LLDP Overview
• LLDP Properties
• LLDP Port Settings
• MED Network Policy
• LLDP MED Port Settings
• Neighbors InformationDell PowerConnect 55xx Systems User Guide 541
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LLDP Overview
The Link Layer Discovery Protocol (LLDP) enables network managers to
troubleshoot and enhance network management by discovering and
maintaining network topologies over multi-vendor environments. LLDP
discovers network neighbors by standardizing methods for network devices to
advertise themselves to other systems, and to store discovered information.
Discovery information includes:
• Device identification
• Device capabilities
• Device configuration
The advertising device transmits multiple advertisement message sets in a
single LAN packet. The multiple advertisement message sets are sent in the
packet’s Type Length Value (TLV) field.
LLDP devices must support chassis and port ID advertisements, as well as
system name, system ID, system description, and system capability
advertisements.
LLDP Media Endpoint Discovery (LLDP-MED) increases network flexibility
by enabling various IP systems to co-exist on a single network, and provides
the following features:
• Detailed network topology information, including information on which
devices are located on the network and where the devices are located, for
example, which IP phone is connect to which port, which software is
running on which switch, and which port is connected to which device.
• Automatic deployment of policies over networks for:
– QoS Policies
– Voice VLANs
• Emergency Call Service (E-911) via IP phone location information.
• Troubleshooting information. LLDP MED sends network managers alerts
for:
– Port speed and duplex mode conflicts
– QoS policy misconfigurations542 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LLDP Properties
To enable and configure LLDP:
1 Click System > LLDP > LLDP Properties in the tree view to display the
LLDP Properties page.
Figure 17-1. LLDP Properties
The current LLDP properties are displayed.
2 Enter the fields:
– Enable LLDP — Enable/disable LLDP on the device.
– Updates Interval (5-32768) — Enter the rate at which LLDP
advertisement updates are sent.
– Hold Multiplier (2-10) — Enter the hold time to be sent in the
LLDP update packets, as a multiple of the timer value.Dell PowerConnect 55xx Systems User Guide 543
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Reinitializing Delay (1-10) — Enter the minimum time, in seconds,
that an LLDP port waits before reinitializing LLDP transmission.
– Transmit Delay (1-8192) — Enter the amount of time that passes
between successive LLDP frame transmissions, due to changes in the
LLDP local systems MIB.
To use the default values for any field, select Use Default.544 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring LLDP Using CLI Commands
The following commands are used to set the fields in the LLDP Properties
page.
Table 17-1. LLDP Properties CLI Commands
CLI Command Description
lldp run
no lldp run
Enables enable LLDP.
Use the no form of this command to
disable LLDP.
lldp timer seconds
no lldp timer
Specifies how often the software sends
LLDP updates.
Use the no form of this command to
restore the default configuration.
lldp hold-multiplier number
no lldp hold-multiplier
Specifies the time that the receiving
device should hold a Link Layer Discovery
Protocol (LLDP) packet before discarding
it.
Use the no form of this command to
restore the default configuration.
lldp reinit seconds
no lldp reinit
Specifies the minimum time an LLDP
port will wait before reinitializing.
Use the no form of this command to revert
to the default setting.
lldp tx-delay seconds
no lldp tx-delay
Specifies the delay between successive
LLDP frame transmissions.
Use the no form of this command to
restore the default configuration.Dell PowerConnect 55xx Systems User Guide 545
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# interface gi1/0/1
console(config-if)# lldp run
console(config)# lldp timer 30
console(config)# lldp hold-multiplier 3
console(config)# lldp reinit 4546 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LLDP Port Settings
LLDP configuration of a port includes activating LLDP notification on it,
and selecting the optional TLVs that will be sent in the LLDP PDU, in
addition to the mandatory ones.
By setting these properties, it is possible to provide additional types of
information to those network devices that support the LLDP.
To configure LLDP per port:
1 Click System > LLDP > LLDP Port Settings in the tree view to display
the LLDP Port Settings: Summary page.
Figure 17-2. LLDP Port Settings: Summary
LLDP settings for all ports are displayed.
2 To modify the LLDP settings for a port, click Edit and select the port to be
configured.
3 Select the transmission type on which LLDP is to be configured in the
State field. The possible options are:
• Tx Only — Enables LLDP on transmitting LLDP packets only.
• Rx Only — Enables LLDP on receiving LLDP packets only. Dell PowerConnect 55xx Systems User Guide 547
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Tx & Rx — Enables LLDP on transmitting and receiving LLDP
packets.
• Disable — LLDP is disabled on the port.
4 Move the optional TLVs that the switch should advertise from the
Available TLV list to the Optional TLV list. The TLVs advertise the
following:
– Port Description — Information about the port, including
manufacturer, product name, and hardware/software version.
– System Name — System's assigned name (in alpha-numeric format).
This value equals the sysName object.
– System Description — Description of the network entity (in alphanumeric format). This includes the system's name and versions of the
hardware, operating system, and networking software supported by the
switch. This value equals the sysDescr object.
– System Capabilities — Primary functions of the switch, and whether
or not these functions are enabled in the switch. The capabilities are
indicated by two octets. Bits 0 through 7 indicate Other, Repeater,
Bridge, WLAN AP, Router, Telephone, DOCSIS cable device, and
station respectively. Bits 8 through 15 are reserved.
– 802.3 MAC-PHY — Duplex and bit rate capability and the current
duplex and bit rate settings of the sending device. It also advertises
whether the current settings are due to auto-negotiation or manual
configuration.
An alternative way to select the TLVs is to select the Use Default field, in
which case only mandatory TLVs are used. These are: Chassis subtype
(MAC address), Port subtype (port number), and TTL (time-to-leave).
5 Enter the Management IP Address that is advertised from the interface.
Check Use Default to use the default Management IP address.548 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring LLDP Port Settings Using CLI Commands
The following commands are used to configure LLDP on ports.
The following is an example of the CLI commands:
Table 17-2. LLDP Port Settings CLI Commands
CLI Command Description
lldp transmit
no lldp transmit
Enables transmitting LLDP on an
interface.
Use the no form of this command to stop
transmitting LLDP on an interface.
lldp receive
no lldp receive
Enables receiving LLDP on an interface.
Use the no form of this command to stop
receiving LLDP on an interface.
lldp optional-tlv tlv1 [tlv2
… tlv5]
Specifies which optional TLVs
from the basic set should be
transmitted
console(config)# interface gi1/0/1
console(config-if)# lldp transmit
console(config-if)# lldp receive
console(config-if)# lldp optional-tlv port-descDell PowerConnect 55xx Systems User Guide 549
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
MED Network Policy
An LLDP-MED network policy is a set of configuration settings that is
identified by a network policy number. Policies are loaded into LLDP-MED
TLVs, and sent to devices connected to the switch. A network policy instructs
the connected device as to how to send traffic, for example, a policy can be
created for VoIP phones that instructs them to:
• Send voice traffic on VLAN 10
• Tag voice traffic with DSCP=63
• Transmit data-traffic to the switch (from the PC connected to the switch
through the VoIP phone) without modification to traffic sent by the PC
(typically, Untagged).
For network policies to be implemented, they must be created and then
associated with ports.
Before policies are defined, the administrator must create the VLANs, and
configure memberships in the VLANs, based on the specification in the
LLDP-MED network policies. 550 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To add a MED network policy:
1 Click System > LLDP > MED Network Policy in the tree view to display
the MED Network Policy: Summary page.
Figure 17-3. MED Network Policy: Summary
Previously-defined network policies are displayed.
2 To add a network policy, click Add, and enter the fields:
– Network Policy Number — Select an available network policy
number.
– Application — Select the application (type of traffic) for which the
network policy is defined.
– VLAN ID — Enter the VLAN ID to which the traffic should be sent.
– VLAN Type —Select whether the traffic is Tagged or Untagged.Dell PowerConnect 55xx Systems User Guide 551
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– User Priority — Select the traffic priority assigned to the network
application.
– DSCP Value — Select the value to be used by neighbors to mark the
traffic sent to the switch.
Configuring MED Network Policies Using CLI Commands
The following commands are used to configure MED network policies.
The following is an example of the CLI commands:
Table 17-3. LLDP MED Network Policies CLI Commands
CLI Command Description
lldp med network-policy number
application [vlan id] [vlan-type
{tagged|untagged}] [up
priority][dscp value]
no lldp med network-policy number
Defines an LLDP MED network
policy.
Use the no form of this command
to remove an LLDP MED
network policy.
console(config)# lldp med network-policy 1 voice-signaling
vlan 1552 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LLDP MED Port Settings
To assign MED network policies to ports:
1 Click System > LLDP > MED Port Settings in the tree view to display
the MED Port Settings: Summary page.
Figure 17-4. MED Port Settings: Summary
2 Select the unit in the stack. All ports on that unit are displayed along with
the following fields:
– LLDP MED Status — Specifies if LLDP-MED is enabled on the
selected port.
– Network Policy — Specifies whether a network policy is assigned to
the port.
– Location — Specifies whether the location is advertised.
– PoE — Specifies whether PoE is enabled on the port.
3 To modify network policies on a port, click Edit.
4 Select the port to be configured, and enter the fields for the port:
– Enable LLDP-MED — Enable/disable LLDP-MED on the port.Dell PowerConnect 55xx Systems User Guide 553
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Available TLVs — Contains a list of available TLVs that can be
advertised by the port. The possible options are:
• Network Policy — Advertises the network policy attached to the
port.
• Location — Advertises the port’s location.
• PoE-PSE — Indicates if the connected media is a PoE or PSE
(Power Sourcing Equipment) device.
Move the TLVs to be published to the Tx Optional TLVs list.
– Available Network Policy — Contains a list of network policies that
can be assigned to a port. Move the network policies to be assigned to
the port to the Network Policy list.
– Location Coordinate (16 Bytes in Hex) — Displays the device’s
location map coordinates.
– Location Civic Address (6-160 Bytes in Hex) — Displays the device’s
civic or street address location, for example 414 23rd Ave E.
– Location ECS ELIN (10-25 Bytes in Hex) — Displays the device’s
ECS ELIN location.
5 To view MED details for a port, click Details and select a port.
The following fields are displayed for the port:
– Auto-Negotiation Status — Enabled specifies that auto-negotiation is
enabled on the port; Disabled indicates that it is not.
– Advertised Capabilities — The list of port capabilities advertised for
the port.
– MAU Type — The Media Attachment Unit type. The MAU performs
physical layer functions, including digital data conversion from the
Ethernet interfaces' collision detection and bit injection into the
network, for example, 100BASE-TX full duplex mode.
– System Name — The system's assigned name (in alpha-numeric
format). This value equals the sysName object.
– System Description — A description of the network entity (in alphanumeric format). This includes the system's name and versions of the
hardware, operating system, and networking software supported by the
switch. This value equals the sysDescr object. 554 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Device ID — The device ID advertised, for example, the device MAC
address.
– Device Type — The type of device.
– LLDP MED Capabilities — The TLVs that are advertised by the
port.
– LLDP MED Device Type — Specifies whether a sender is a network
connectivity device or an endpoint device.
– Application — The following fields are displayed for each possible
application type:
• Application Type — The application type.
• Flags — The VLAN tagging status for the application type:
Tagged or Untagged.
• VLAN ID — The VLAN number for the application type.
• User Priority — The user priority for the application type.
• DSCP — The DSCP value assigned to the network policy.
– Location Type — Displays the port’s LLDP location type:
• Coordinates— Device’s location map coordinates.
• Civic Address — Device’s civic or street address location, for
example 414 23rd Ave E.
• ECS ELIN — Device’s ECS ELIN location.
– Location Address — Displays the port’s LLDP location, according to
the Location Type.Dell PowerConnect 55xx Systems User Guide 555
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring MED on Ports Using CLI Commands
The following commands are used to set the fields in the MED Port Settings
pages.
Table 17-4. LLDP Properties CLI Commands
CLI Command Description
lldp med enable [tlv … tlv4]
no lldp med enable
Enables LLDP MED on an interface.
Use the no form of this command to
disable LLDP MED on an interface.
lldp med network-policy
{add|remove} number
no lldp med network-policy
number
Attaches or removes an LLDP MED
network policy on an interface.
Use the no form of this command to
remove all the LLDP MED network
policies from the interface
lldp med location
{{coordinate data}|{civicaddress data}|{ecs-elin
data}}
no lldp med location
{coordinate|civicaddress|ecs-elin}
configure the LLDP MED for an
interface.
Use the no form of this command to
delete location information for an
interface.
show lldp med configuration
[gigabitethernet|tengigabitet
hernet] port-number
Displays the LLDP MED configuration
for all interfaces or for a specific
interface.
show lldp local
[gigabitethernet|tengigabitet
hernet] port-number
Displays the LLDP information that is
advertised from a specific port.556 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# interface gi1/0/3
console(config)# lldp med location civic-address 6162636465
console# show lldp med configuration
Fast Start Repeat Count: 4.
Network policy 1
-------------------
Application type: voiceSignaling
VLAN ID: 1 untagged
Layer 2 priority: 0
DSCP: 0
Port Capabilities Network Location PoE Notif Inventory
Policy ications
--------- -------------- ---------------- ---------- ------
gi1/0/1 Yes Yes Yes No Enabled No
gi1/0/2 Yes Yes No No Enabled NoDell PowerConnect 55xx Systems User Guide 557
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Neighbors Information
Use the Neighbors Information page to view information that was received in
LLDP advertisements from neighboring devices.
The neighbor’s information is deleted after timeout. Timeout is the
maximum interval that can pass without receiving an LLDP PDU from a
neighbor. The timeout value is computed from the neighbor’s Time to Live
TLV.
To view neighbors information:
1 Click System > LLDP > Neighbors Information in the tree view to
display the Neighbors Information page.
Figure 17-5. Neighbors Information
The following fields are displayed for each port on the device that has a
discovered neighbor:
– Port — Port number for which neighboring information is displayed 558 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Device ID — Neighboring device ID
– System Name — Name of the neighboring system
– Port ID — Neighboring port ID
– Capabilities — Neighboring device capabilities
2 Click Clear Neighbors Table to delete all the entries or select Remove to
delete a specific port entry.
3 Click the Details button of a port to display the Neighbors Information:
Details page for that port.
In addition to the fields displayed in the MED Port Settings: Details
Advertise Information page and the Green Ethernet Configuration pages,
the following fields are displayed for the neighbors of the selected port:
– Power Type — Port’s power type
– Power Source — Port’s power source
– Power Priority — Port’s power priority
– Power Value — Port’s power value, in Watts
– Hardware revision — Hardware revision
– Firmware revision — Firmware revision
– Software revision — Software revision
– Serial number — Device serial number
– Manufacturer name — Device manufacturer name
– Model name — Device model name
– Asset ID — Asset ID
Configuring LLDP Neighbors Using CLI Commands
The following commands are used to configure LLDP neighbors.
Table 17-5. LLDP Neighbors Information CLI Commands
CLI Command Description
show lldp neighbors
[gigabitethernet|tengigabite
thernet] port-number
Displays information about neighboring
devices discovered using LLDPDell PowerConnect 55xx Systems User Guide 559
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console# show lldp neighbors
Port Device ID Port ID System Capabili TTL
Name ties
--------- ----------------- -------- ------- ------- ----
gi2/0/17 00:75:73:71:72:55 1/e21 0 91
gi2/0/33 00:12:cf:7c:63:a0 1/e1 0 92
gi2/0/33 00:11:22:11:22:33 1/g39 0 107
gi2/0/33 00:aa:aa:aa:aa:aa 1/e37 0 106
gi2/0/41 a4:ba:db:57:7c:8d g13 O 97560 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
18
Dynamic ARP Inspection
This section describes dynamic ARP inspection.
It contains the following topics:
• Dynamic ARP Inspection Overview
• Global Settings
• Dynamic ARP Inspection List
• Dynamic ARP Inspection Entries
• VLAN Settings
• Trusted InterfacesDell PowerConnect 55xx Systems User Guide 561
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Dynamic ARP Inspection Overview
ARP Inspection eliminates man-in-the-middle attacks, where false ARP
packets are inserted into the subnet. ARP requests and responses are
inspected, and their MAC-address-to-IP-address binding is checked according
to the ARP Inspection List defined by the user (in the Dynamic ARP
Inspection List and Dynamic ARP Inspection Entries pages). If the packet’s IP
address was not found in the ARP Inspection List, and DHCP Snooping is
enabled for a VLAN, a search of the DHCP Snooping database is performed.
See "How DHCP Snooping Works" on page 573 for an explanation of the
DHCP Snooping database. If the IP address is found the packet is valid, and is
forwarded.
Packets with invalid ARP Inspection bindings are logged and dropped.
Ports are classified as follows:
• Trusted — Packets are not inspected.
• Untrusted —Packets are inspected as described above.
The following additional validation checks may be configured by the user:
• Source MAC — Compares the packet’s source MAC address in the
Ethernet header against the sender’s MAC address in the ARP request.
This check is performed on both ARP requests and responses.
• Destination MAC — Compares the packet’s destination MAC address in
the Ethernet header against the destination interface’s MAC address. This
check is performed for ARP responses.
• IP Addresses — Compares the ARP body for invalid and unexpected IP
addresses. Addresses include 0.0.0.0, 255.255.255.255, and all IP Multicast
addresses. 562 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Global Settings
To enable ARP inspection on the device:
1 Click Switching > Dynamic ARP Inspection > Global Settings in the
tree view to display the Global Settings page.
Figure 18-1. Global Settings
2 Enter the fields:
• Enable ARP Inspection — Enable/disable ARP inspection.
• ARP Inspection Validate — Enable/disable the following checking
source MAC address, destination MAC address and IP addresses
against the respective addresses in the ARP body.
• Minimal Syslog Interval (0 – 86400) — Enter the minimum time
interval between successive ARP SYSLOG messages. Dell PowerConnect 55xx Systems User Guide 563
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Setting Dynamic ARP Inspection Global Settings Using CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the Global Settings pages.
The following is an example of some of the CLI commands:
Table 18-1. ARP Inspection Global Settings CLI Commands
CLI Command Description
ip arp inspection
no ip arp inspection
Enables ARP inspection.
Use the no form of this command to
disable ARP inspection.
ip arp inspection validate
no ip arp inspection
validate
Performs specific checks for dynamic ARP
inspection.
Use the no form of this command to
restore the default configuration.
ip arp inspection logging
interval {seconds |
infinite}
no ip arp inspection logging
interval
Sets the minimum time interval between
successive ARP SYSLOG messages.
Use the no form of this command to
restore the default configuration.
console(config)# ip arp inspection
console(config)# ip arp inspection validate564 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Dynamic ARP Inspection List
An ARP inspection list consists of entries where each entry is a pair of
MAC/IP addresses.
To create a new ARP inspection list and add the first entry to it:
1 Click Switching > Dynamic ARP Inspection > Dynamic ARP
Inspection List in the tree view to display the Dynamic ARP Inspection
List: Summary page.
Figure 18-2. Dynamic ARP Inspection List: Summary
The dynamic ARP lists are displayed.
2 To create a new list and enter the first address pair in it, click Add, and
enter the fields:
• List Name — Create and enter a list name.
• IP Address — Enter the IP address that will be mapped to the MAC
address entered below.
• MAC Address — Enter the MAC address that will be mapped to the
IP address entered above.Dell PowerConnect 55xx Systems User Guide 565
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Creating a Dynamic ARP Inspection List Using CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the Dynamic ARP Inspection List pages.
The following is an example of some of the CLI commands:
Table 18-2. Dynamic ARP Inspection List CLI Commands
CLI Command Description
ip arp inspection list
create name
no ip arp inspection list
create name
Creates a static ARP binding list and
enters the ARP list configuration mode.
Use the no form of this command to
delete the list.
console(config)# ip arp inspection list create servers
console(config-ARP-list)#566 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Dynamic ARP Inspection Entries
To add additional addresses to the lists defined in the Dynamic ARP
Inspection List page:
1 Click Switching > Dynamic ARP Inspection Entries > Dynamic ARP
Inspection Entries in the tree view to display the Dynamic ARP
Inspection Entries: Summary page.
Figure 18-3. Dynamic ARP Inspection Entries: Summary
The dynamic ARP entries for the selected list are displayed.
2 To add a new address pair to a list, click Add and select the list.
3 Enter the fields:
• IP Address — Enter the IP address that will be mapped to the MAC
address entered below.
• MAC Address — Enter the MAC address that will be mapped to the
IP address entered above.Dell PowerConnect 55xx Systems User Guide 567
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Adding Entries to a Dynamic ARP Inspection List Using CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the Dynamic ARP Inspection Entries pages.
The following is an example of some of the CLI commands:
Table 18-3. Dynamic ARP Inspection List Entries CLI Commands
CLI Command Description
ip ip-address mac-address
mac-address
no ip ip-address mac-address
mac-address
Creates a static ARP binding.
Use the no form of this command to
delete a static ARP binding..
show ip arp inspection list Displays the static ARP binding list.
console(config)# ip arp inspection list create servers
console(config-arp-list)# ip 172.16.1.1 mac-address
0060.704c.7321
console(config-arp-list)# ip 172.16.1.2 mac-address
0060.704c.7322
console(config-arp-list)# do show ip arp inspection list
List name: servers
Assigned to VLANs:
IP MAC
--------------- ------------------
172.16.1.1 00:60:70:4c:73:21
172.16.1.2 00:60:70:4c:73:22
console(config-arp-list)#568 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
VLAN Settings
To assign a list of IP/MAC address pairs, defined in the Dynamic ARP
Inspection List pages, to a VLAN:
1 Click Switching > Dynamic ARP Inspection Entries > VLAN Settings in
the tree view to display the VLAN Settings: Summary page.
Figure 18-4. VLAN Settings: Summary
The VLANs and their associated lists of IP/MAC address pairs are
displayed.
2 To designate a VLAN to be associated with an ARP inspection list, click
Add VLAN and enter the VLAN ID.
3 Click Assign and select the List Name to be associated with the VLAN.Dell PowerConnect 55xx Systems User Guide 569
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Assigning IP/MAC Address Pairs to VLANs Using CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the VLAN Settings pages.
The following is an example of some of the CLI commands:
Table 18-4. Assigning IP/MAC Address Pairs to VLANs CLI Commands
CLI Command Description
ip arp inspection vlan vlanid
Enables ARP inspection on a VLAN, based
on the DHCP Snooping database.
Use the no form of this command to
disable ARP inspection on a VLAN.
ip arp inspection list
assign vlan-id name
no ip arp inspection list
assign vlan
Assigns a static ARP binding list to a
VLAN.
Use the no form of this command to
delete the assignment.
console(config)# ip arp inspection list assign 37 servers570 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Trusted Interfaces
Interfaces are untrusted if the packet is received from an interface outside the
network or from an interface beyond the network firewall. Trusted interfaces
receive packets only from within the network or the network firewall.
To configure an interface to be trusted:
1 Click Switching Dynamic ARP Inspection Trusted Interface in the
tree view to display the Trusted Interface: Summary page.
Figure 18-5. Trusted Interface: Summary
The ports on the selected unit and their trusted status are displayed.
2 To modify the status of an interface, click Edit.
3 Select the interface and enable/disable its Trust Status, which is the
DHCP Snooping Trust mode.Dell PowerConnect 55xx Systems User Guide 571
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Trusted Interfaces Using CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the Trusted Interface pages.
The following is an example of some of the CLI commands:
Table 18-5. Configuring Trusted Interface Parameters CLI Commands
CLI Command Description
ip arp inspection trust
no ip arp inspection trust
Configures an interface trust state that
determines if incoming ARP packets are
inspected.
Use the no form of this command to
restore the default configuration.
show ip arp inspection
[[gigabitethernet|tengigabit
ethernet] port-number|portchannel LAG-number]
Displays the ARP inspection configuration
for all interfaces or a specific interface.
console(config)# interface gi1/0/3
console(config-if)# ip arp inspection trust572 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
19
DHCP Snooping
This section describes DHCP Snooping and DHCP Relay features.
It contains the following topics:
• DHCP Snooping
• DHCP RelayDell PowerConnect 55xx Systems User Guide 573
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCP Snooping
This section describes DHCP snooping.
It contains the following topics:
• DHCP Snooping Overview
• Global Parameters
• VLAN Settings
• Trusted Interfaces
• Snooping Binding Database
DHCP Snooping Overview
DHCP snooping expands network security by providing layer security
between untrusted interfaces and DHCP servers. By enabling DHCP
snooping, network administrators can differentiate between trusted interfaces
connected to end-users or DHCP Servers, and untrusted interfaces located
beyond the network firewall.
How DHCP Snooping Works
DHCP snooping filters untrusted messages, and stores these messages in a
database. Interfaces are untrusted if the packet is received from an interface
outside the network, or from an interface beyond the network firewall.
Trusted interfaces receive packets only from within the network or the
network firewall.
The DHCP Snooping Binding database contains the untrusted interfaces’
MAC address, IP address, Lease Time, VLAN ID, and interface information.
Table 19-1 describes how DHCP packets are handled when DHCP snooping
is enabled on an interface.
Table 19-1. DHCP Packet Handling when DHCP Snooping is Enabled
Packet Type Arriving from Untrusted
Ingress Interface
Arriving from Trusted
Ingress Interface
DHCPDISCOVER Forward to trusted
interfaces only.
Forwarded to trusted
interfaces only.574 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCPOFFER Filter. Forward the packet
according to DHCP
information. If the
destination address is
unknown the packet is
filtered.
DHCPREQUEST Forward to trusted
interfaces only.
Forward to trusted
interfaces only.
DHCPACK Filter. Same as DHCPOFFER
and an entry is added to
the Binding database.
DHCPNAK Filter. Same as DHCPOFFER.
Remove entry if exists.
DHCPDECLINE Check if there is
information in the
database. If the
information exists and
does not match the
interface on which the
message was received, the
packet is filtered.
Otherwise the packet is
forwarded to trusted
interfaces only, and the
entry is removed from
database.
Forward to trusted
interfaces only
DHCPRELEASE Same as
DHCPDECLINE.
Same as
DHCPDECLINE.
DHCPINFORM Forward to trusted
interfaces only.
Forward to trusted
interfaces only.
DHCPLEASEQUERY Filtered. Forward.
Table 19-1. DHCP Packet Handling when DHCP Snooping is Enabled (Continued)
Packet Type Arriving from Untrusted
Ingress Interface
Arriving from Trusted
Ingress InterfaceDell PowerConnect 55xx Systems User Guide 575
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
As shown in Table 19-1, the DHCP Snooping Binding database is updated by
interception of DHCPACK, DHCPDECLINE and DHCPRELEASE packets,
and is stored in non-volatile memory.
Even if a port is down, its entries are not deleted.
NOTE: Only DHCP requests on untrusted ports are maintained in the Binding
database.
Limitations
The following limitations apply:
• Enabling DHCP snooping uses TCAM resources.
• The switch writes changes to the binding database only when the switch
system clock is synchronized with SNTP.
• The switch does not update the Binding database when a station moves to
another interface.
Global Parameters
Use the Global Parameters page to:
• Enable/disable DHCP snooping globally.
• Determine whether to forward or filter DHCP packets received from
untrusted interfaces, whose source MAC address and the DHCP client
MAC address do not match.
• Determine whether to forward or filter DHCP packets, received from
untrusted interfaces, with option-82 information.
• Set Binding database update interval.576 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To configure DHCP snooping on the device:
1 Click Switching > DHCP Snooping > Global Parameters in the tree view
to display the Global Parameters page.
Figure 19-1. Global Parameters
2 Enable/disable DHCP snooping on the device in the DHCP Snooping
Status field.
3 If DHCP snooping is enabled, enter the fields:
– Option 82 Passthrough — Enable/disable whether to forward (enable)
or filter (disable) DHCP packets, received from untrusted interfaces,
with option-82 information.
– Verify MAC Address — Enable/disable MAC addresses verification.
This determines whether to forward (enable) or filter (disable) DHCP
packets received from untrusted interfaces, whose source MAC
address and the DHCP client MAC address do not match.
– Save Binding Database to File — Enable/disable saving the DHCP
snooping database to flash memory.
– Save Binding Database Internal(600-86400) — Enter how often, in
seconds, the Binding database is updated.
Configuring DHCP Snooping Global Parameters Using CLI CommandsDell PowerConnect 55xx Systems User Guide 577
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following table summarizes the CLI commands for configuring DHCP
snooping global parameters.
Table 19-2. DHCP Snooping Global Parameters CLI Commands
CLI Command Description
ip dhcp snooping
no ip dhcp snooping
Globally enables DHCP snooping.
Use the no form of this command to
return to the default setting.
ip dhcp snooping information
option allowed-untrusted
no ip dhcp snooping information
option allowed-untrusted
Allows a device to accept DHCP
packets with option-82 information
from an untrusted port.
Use the no form of this command to
return to the default setting.
ip dhcp snooping verify
no ip dhcp snooping verify
Configures the switch to verify on an
untrusted port that the source MAC
address in a DHCP packet matches the
client hardware address.
Use the no form of this command to
configure the switch to not verify the
MAC addresses.
ip dhcp snooping database
no ip dhcp snooping database
Configures the DHCP snooping
binding file.
Use the no form of this command to
delete the binding file.
ip dhcp snooping database
update-freq seconds
no ip dhcp snooping database
update-freq
Configures the update frequency of
the DHCP snooping binding file.
Use the no form of this command to
return to default.
show ip dhcp snooping
[[gigabitethernet|tengigabiteth
ernet] port-number|port-channel
LAG-number]
Displays the DHCP snooping
configuration.578 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of some of the CLI commands:
console(config)# ip dhcp snooping
console(config)# ip dhcp snooping information option
allowed-untrusted
console(config)# ip dhcp snooping verify
console(config)# ip dhcp snooping database
console(config)# ip dhcp snooping database frequency 1200
console# show ip dhcp snooping
DHCP snooping is enabled
DHCP snooping database: enabled
Option 82 on untrusted port is allowed
Verification of hwaddr field is enabled
DHCP snooping file update frequency is configured to: 1200
seconds
Interface Trusted
--------- ----------
gi2/0/1 yes
gi2/0/2 yesDell PowerConnect 55xx Systems User Guide 579
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
VLAN Settings
To separate ports in a VLAN, enable DHCP snooping on it.
Before you enable DHCP snooping on a VLAN, you must globally enable
DHCP snooping on the device.
When DHCP snooping is disabled for a VLAN, the Binding entries that were
collected for that VLAN are removed from the Binding database.
To enable/disable DHCP snooping on a VLAN:
1 Click Switching > DHCP Snooping > VLAN Settings in the tree view to
display the VLAN Settings page.
Figure 19-2. VLAN Settings
The list of existing VLANs are displayed in the VLAN ID list.
2 Click Add to move the VLANs, for which you want to enable DHCP
snooping, from the VLAN ID list to the Enabled VLANs list. To remove a
VLAN, click Remove to move it from the Enabled VLANs list to the
VLAN ID list.580 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring DHCP Snooping on VLANs Using CLI Commands
The following table summarizes the CLI commands for configuring DHCP
snooping on VLANs .
The following is an example of some of the CLI commands:
Table 19-3. DHCP Snooping on VLANs CLI Commands
CLI Command Description
ip dhcp snooping vlan vlan-id
no ip dhcp snooping vlan-id
Enables DHCP snooping on a VLAN.
Use the no form of this command to
disable DHCP snooping on a VLAN.
console(config)# ip dhcp snooping vlan 1Dell PowerConnect 55xx Systems User Guide 581
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Trusted Interfaces
To define a trusted interface:
1 Click Switching > DHCP Snooping > Trusted Interface in the tree view
to display the Trusted Interface: Summary page.
Figure 19-3. Trusted Interfaces: Summary
A list of the interfaces is displayed.
2 To change the trust status of an interface, click Edit, and enter the fields:
– Interface — Select a unit and port or LAG.
– Trust Status — Enable/disable DHCP Snooping Trust mode on the
selected port or LAG. 582 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring DHCP Snooping Trusted Interfaces Using CLI Commands
The following table summarizes the CLI commands for configuring DHCP
snooping trusted interfaces.
The following is an example of some of the CLI commands:
Snooping Binding Database
Entries in the DHCP Snooping Binding database consist of pairs of MAC/IP
addresses.
In addition to the entries added by DHCP snooping, entries to the Snooping
Binding database can be manually added or deleted. These entries are added
to the Snooping Binding database and Snooping Binding file, if it exists, but
they are not added to the configuration files.
A manually-added entry can be either dynamic or a static. When configuring
a dynamic entry, an expiration date must be assigned.
The refresh time (in seconds) of the binding table is added in the Global
Parameters pages.
Table 19-4. DHCP Snooping Trusted Interfaces CLI Commands
CLI Command Description
ip dhcp snooping trust
no ip dhcp snooping
trust
Configures an interface as trusted for DHCP
snooping purposes.
Use the no form of this command to return to the
default setting.
console(config)# interface gi1/0/5
console(config-if)# ip dhcp snooping trustDell PowerConnect 55xx Systems User Guide 583
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To query and add IP addresses to the Binding database:
1 Click Switching > DHCP Snooping > Binding Database in the tree view
to display the Binding Database: Summary page.
Figure 19-4. Binding Database
A list of the database entries is displayed.
2 To query the database, enter query criteria and click Query. Database
entries matching the query are displayed.
3 To add a entry, click Add, and enter the fields:
– Type — Select the entry type. The possible options are:
• Static —IP address was statically configured.
• Dynamic —IP address was dynamically configured.
– MAC Address — Enter the MAC address to be recorded in the entry. 584 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– VLAN ID — Select the VLAN ID to which the IP address is
associated in the entry.
– IP Address — Enter the IP address to be recorded in the entry.
– Interface — Select the unit and port or LAG to be recorded in the
entry.
– Lease Time — If the entry is dynamic, enter the amount of time that
the entry will be active in the DHCP Database. If there is no Lease
Time, check Infinite.
Configuring DHCP Snooping Binding Database Using CLI Commands
The following table summarizes the CLI commands for configuring the
DHCP Snooping Binding database.
Table 19-5. DHCP Snooping Binding Database CLI Commands
CLI Command Description
ip dhcp snooping database
no ip dhcp snooping database
Enables the DHCP Snooping
binding database file.
Use the no form of this command
to delete the DHCP Snooping
binding database file.
ip dhcp snooping database updatefreq seconds
no ip dhcp snooping database
update-freq
Enables the DHCP Snooping
binding database file.
Use the no form of this command
to delete the DHCP Snooping
binding database file.
ip dhcp snooping binding macaddress vlan-id ip-address
[gigabitethernet|tengigabitethern
et] port-number|port-channel LAGnumber] expiry {seconds|infinite}
no ip dhcp snooping binding macaddress vlan-id
Configures the DHCP snooping
binding database and adds
binding entries to the database.
Use the no form of this command
to delete entries from the binding
database.
clear ip dhcp snooping database Clears the DHCP binding
database.Dell PowerConnect 55xx Systems User Guide 585
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of some of the CLI commands:
show ip dhcp snooping binding
[mac-address mac-address] [ipaddress ip-address] [vlan vlanid][[gigabitethernet|tengigabitet
hernet] port-number|port-channel
LAG-number]]
Displays the DHCP snooping
binding database and
configuration information for all
interfaces or some interfaces on a
switch.
console(config)# ip dhcp snooping database
console(config)# ip dhcp snooping update-freq 3600
console# show ip dhcp snooping binding
Update frequency: 3600
Total number of binding: 2
MAC Address IP Address Lease
(sec)
Type VLAN Interface
----------- ---------- ------ -------- ----- ----------
0060.704C.73FF 10.1.8.1 7983 snooping 3 gi1/0/21
0060.704C.7BC1 10.1.8.2 92332 snooping (s)3 gi1/0/22
Table 19-5. DHCP Snooping Binding Database CLI Commands (Continued)
CLI Command Description586 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCP Relay
This section describes DHCP relay.
It contains the following topics:
• DHCP Relay Overview
• Option 82
• Global Settings
• Interface Settings
DHCP Relay Overview
The device can act as a DHCP Relay agent that listens for DHCP messages,
and relays them between DHCP servers and clients, which reside in different
VLANs or IP subnets.
This functionality is intended to be used when the client ingress VLAN is
different than the VLAN on which DHCP servers are connected.
The switch can relay DHCP messages received from its IPv4 interfaces to one
or more configured DHCP servers. The switch puts the IPv4 address into the
message giaddr before relaying it to the servers. It uses the switch’s IPv4
address of the interface where the message is received. The switch uses the
giaddr from the response to determine how to forward the response back to
the DHCP client.
DHCP Relay must be enabled globally and per VLAN. Dell PowerConnect 55xx Systems User Guide 587
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Option 82 Overview
The relay agent information option (Option 82) in the DHCP protocol
enables a DHCP relay agent to send additional client information when
requesting an IP address. Option 82 specifies the relaying switch's MAC
address, the port identifier, and the VLAN that forwarded the packet.
Both DHCP snooping and DHCP relay can insert option 82 into traversing
packets.
DHCP snooping with option 82 insertion provides transparent Layer 2 relay
agent functionality when the DHCP server is on the same VLAN as the
clients.
Limitations
The following limitations exist for DHCP Relay:
• It is not supported on IPv6.
• It is not relayed to servers on the client’s VLAN.
• Packets that have option-82 information, added by other devices, are
discarded.
• It does not support Option 82 on non-VLAN interfaces.
• It can be enabled only on a VLAN/Port/LAG that has an IP address defined
on it.588 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Option 82
To enable Option82 insertion:
1 Click Switching > DHCP Relay > Option 82 in the tree view to display
the Option 82 page.
Figure 19-5. Option 82
2 Enable/disable Option 82 insertion.Dell PowerConnect 55xx Systems User Guide 589
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Option 82 Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the Option 82 page.
The following is an example of the CLI command:
Global Settings
To set the DHCP Relay global settings:
1 Click Switching > DHCP Relay > Global Settings in the tree view to
display the Global Settings: Summary page.
Figure 19-6. Global Settings: Summary
The currently-define DHCP servers are displayed.
2 Enable/disable DHCP relay.
Table 19-6. CLI Option 82 Commands
CLI Command Description
ip dhcp information option
no ip dhcp information option
Enables DHCP option-82 data insertion.
Use the no form of this command to
disable DHCP option-82 data insertion.
console(config)# ip dhcp information option590 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 To add a DHCP server, click Add.
4 Enter the IP address of the DHCP server in the DHCP Server IP Address
field.
Defining Global Parameters Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the Global Settings pages.
The following is an example of the CLI commands:
Table 19-7. Global Parameters CLI Commands
CLI Command Description
ip dhcp relay enable
no ip dhcp relay enable
Enables DHCP relay features on the
device.
Use the no form of this command to
disable the DHCP relay agent.
ip dhcp relay address ipaddress
no ip dhcp relay address [ipaddress]
Defines the DHCP servers available for
the DHCP relay.
Use the no form of this command to
remove servers from the list.
show ip dhcp relay Displays the server addresses on the
DHCP relay.
console(config-if)# ip dhcp relay enable
console(config)# ip dhcp relay address 176.16.1.1
console(config)# do show ip dhcp relay
DHCP relay is Enabled
Option 82 is Disabled
Maximum number of supported VLANs without IP Address is 0
DHCP relay is not configured on any port.
DHCP relay is not configured on any VLAN.
Servers: 176.16.1.1
console(config)#Dell PowerConnect 55xx Systems User Guide 591
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Interface Settings
. NOTE: For DHCP Relay to function on an interface, it also must be activated
globally in the Global Settings page.
To enable DHCP relay on a port, LAG, or VLAN:
1 Click Switching > DHCP Relay > Interface Settings in the tree view to
display the Interface Settings: Summary page.
Figure 19-7. Interface Settings: Summary
The currently-define DHCP interfaces are displayed.
2 To enable DHCP relay on an interface, click Add.
3 Select the interface.592 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Interface Settings Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the Interface Settings pages.
The following is an example of the CLI commands that enable DHCP Relay
on VLAN 2, assign it an IP address and show the DHCP Relay status:
Interface Settings Parameters CLI Commands
CLI Command Description
ip dhcp relay enable
no ip dhcp relay enable
Enables the DHCP relay features on the
interface (in Interface Configuration
mode).
Use the no form of this command to
disable the DHCP relay agent feature on
the interface.
ip dhcp relay address ipaddress
no ip dhcp relay address
Defines a DHCP servers available for
DHCP relay.
Use the no form of this command to
remove servers from the list.
console(config)# interface vlan 2
console(config-if)# ip dhcp relay enable
console(config)# ip dhcp relay address 176.16.1.1
console> show ip dhcp relay
DHCP relay is Enabled
Option 82 is Disabled
Maximum number of supported VLANs without IP Address is 0
DHCP relay is not configured on any port.
DHCP relay is not configured on any vlan.
No servers configuredDell PowerConnect 55xx Systems User Guide 593
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY594 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
20
iSCSI Optimization
This section describes iSCSI optimization.
It contains the following topics:
• Optimizing iSCSI Overview
• Global Parameters
• iSCSI Targets
• iSCSI Sessions
• Configuring iSCSI Using CLIDell PowerConnect 55xx Systems User Guide 595
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Optimizing iSCSI Overview
The Internet Small Computer System Interface (iSCSI) is an IP-based
storage networking standard for linking data storage facilities. By carrying
SCSI commands over IP networks, iSCSI is used to facilitate data transfers
over intranets, and to manage storage over long distances.
iSCSI can be used to transmit data over local area networks (LANs), wide area
networks (WANs), or the Internet, and can enable location-independent data
storage and retrieval.
Unlike traditional Fiber channels, which requires special-purpose cabling,
iSCSI can be run over long distances, using existing network infrastructure.
The protocol enables clients (called initiators) to send SCSI commands
(CDBs) to SCSI storage devices (targets) on remote servers. This enables
organizations to consolidate storage into data center storage arrays, while
providing hosts (such as database and web servers) with the illusion of
locally-attached disks.
The targets listen on a well-known TCP port (or any other TCP port that has
been explicitly specified) for incoming connections. The login process is
started when the initiator establishes a TCP connection to the desired target,
through the TCP port that was explicitly specified.
The group of iSCSI TCP connections that link an initiator with a target is
called an iSCSI session.
When you connect an EqualLogic device to the switch, and iSCSI
optimization is enabled, the switch automatically recognizes the port to
which the EqualLogic equipment is connected to, and configures the STP
Mode to RSTP to support fast network convergence.
Optimizing iSCSI
iSCSI optimization provides the following features:
• Ability to assign a specific QoS profile to the iSCSI flows
• Display of iSCSI session details (connections, initiator, target, and so on)
• Identification of (self-discovered) iSCSI sessions
• Identification of iSCSI session termination
• Identification of non-active iSCSI sessions596 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Limitations
The following limitations exist:
• All iSCSI connections receive the relevant QoS, regardless of whether they
are being monitored or not. If, for example, a feature was disabled for some
period and was enabled again, it is possible that there are iSCSI TCP
connections that were established during this period of time. These cannot
be monitored, because all relevant information was already passed at the
beginning of the session. But these unidentified sessions will still be
assigned to iSCSI QoS.
• The maximum number of iSCSI TCP connections, which is also the
default setting, is 1K. This can be changed after reset.
• The number of iSCSI connections affects other system features.
iSCSI-aware, DHCP Snooping, and ACL rules all use the TCAM system
resource. If the number of iSCSI connections has been increased, the
other application rules (DHCP Snooping or ACL) can be removed after
reset.
• If the target uses redirect messages upon the initiator request, and, as a
result, the initiator opens a connection to a different target, the new target
must be configured as part of the general configuration.
• Only iSCSI flows to targets that use the iSCSI well-known port or other
explicit user-defined configuration are assigned QoS.
• The aging configuration works for each connection. The mechanism
checks connection activities in a group of 28 TCP iSCSI connections,
within the aging time. In the worst case, when the maximum number of
1K TCP connections are monitored and are not terminated gracefully, the
mechanism causes inaccuracy, namely, the last 28 TCP iSCSI connections
are aged out after (1K/28)*aging-time.
• In general, the greater the number of ungracefully terminated iSCSI TCP
connections, the greater the inaccuracy is. Not all iSCSI TCP connections
are monitored for aging at the same time. Sessions, whose associated TCP
connections are not being currently monitored, will show unchanged aging
time.
• Encryption (Ipsec) must not be applied on iSCSI traffic, otherwise a QoS
profile will not be assigned to iSCSI.
• iSCSI optimization does not work with IP fragmented frames.Dell PowerConnect 55xx Systems User Guide 597
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Each session supports at most four TCP connections. If a new TCP
connection of an already opened iSCSI session arrives, and there are
already four TCP connections, the new connection replaces the oldest one,
within this specific iSCSI session.
• A short flow interruption, caused by STP topology change or
administrative port-down action, might cause the TCP connection to
reinitiate without closing the iSCSI session. If the actual iSCSI session
used only one TCP connection, the reinitiated one will be added to the
monitoring table, for an aging-time period. After that, it is removed from
the list.598 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Global Parameters
Use the Global Parameters page to enable iSCSI and to set iSCSI QoS frame
priority. You may also enable Remark to change the DSCP or CoS user
priority field in the packet. In the QoS Properties pages, you can then set the
queuing to strict priority or WRR, and map the CoS or DSCP to the desired
queue in the CoS to Queue or DSCP to Queue pages.
To enable iSCSI and set its QoS parameters:
1 Click System > iSCSI Optimization > Global Parameters in the tree
view to display the Global Parameters page.
Figure 20-1. Global Parameters
2 Enter the fields:
– iSCSI Status — Enable/disable iSCSI optimization.
– iSCSI COS Status — Enable/disable the Class of Service profile to
apply to iSCSI flows.
– Classification — Select whether the priority of iSCSI packets is
determined by CoS or DSCP. Check the classification, and select the
desired value.
– Remark — Enable/disable whether iSCSI frames will be remarked
with the CoS or DSCP value.Dell PowerConnect 55xx Systems User Guide 599
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– iSCSI Aging Time — Enter how long the device will wait, after the
last received frame of an iSCSI session, before deleting the session
from the list.
Enabling iSCSI automatically enables Jumbo frames and enables Flow
Control on all interfaces. Jumbo frames are only enabled after copying the
Running configuration to the Startup configuration and resetting the device
(the Flow Control changes are effective immediately).
Defining iSCSI Global Parameters Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the iSCSI Global Parameters pages.
Table 20-1. iSCSI Global Parameters CLI Commands
CLI Command Description
iscsi enable
no iscsi enable
Enables iSCSI awareness.
Use the no form of the command to
disable iSCSI awareness.
iscsi cos {vpt vpt|dscp dscp}
[remark]
no iscsi cos
Sets the quality of service profile that will
be applied to iSCSI flows.
Use the no form of the command to
return to default.
iscsi aging time minutes
no iscsi aging time
Sets the aging time for iSCSI sessions.
Use the no form of the command to
cancel aging.
show iscsi Displays iSCSI settings.600 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# iscsi enable
console(config)# iscsi cos dscp 31
console(config)# iscsi aging time 10
console# show iscsi
Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678
--------------------------------------------------------
Session 1:
---------
Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12.
storage:sys1.xyz
Time started: 23-Jul-2002 10:04:50
Time for aging out: 10 min
ISID: 11
Initiator Initiator Target Target
IP Address TCP Port IP Address IP port
---------- --------- ---------- -------
172.16.1.3 49154 172.16.1.20 30001 Dell PowerConnect 55xx Systems User Guide 601
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
iSCSI Targets
To add an iSCSI target:
1 Click System > iSCSI Optimization > iSCSI Targets in the tree view to
display the iSCSI Targets: Summary page.
Figure 20-2. iSCSI Targets: Summary
The currently-defined targets are displayed.
2 To add a new target, click Add.
3 Enter the fields:
– TCP Port — TCP port used by the target for iSCSI communications.
– IP Address — IP address of the target. The IP address 0.0.0.0 is any IP
address.
– Target Name (0-223 characters) — Name of the target.602 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining iSCSI Targets Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the iSCSI Targets Table.
The following is an example of the CLI commands:
Table 20-2. iSCSI Targets Table CLI Commands
CLI Command Description
iscsi target port tcp-port-1
[tcp-port-2… tcp-port-8]
[address ip-address] [name
target-name]
no iscsi target port tcpport-1 [tcp-port-2… tcp-port-
8] [address ip-address]
Configures iSCSI port/s, target address
and name.
Use the no form of this command to
delete an iSCSI target.
show iscsi sessions Show the current iSCSI targets and
sessions.
console(config)# iscsi target port 30001 address
176.16.1.1 name iqn.1993-11.com.disk
vendor:diskarrays.sn.45678.tape:sys1.xyzDell PowerConnect 55xx Systems User Guide 603
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
iSCSI Sessions
To display information about iSCSI communications to various targets:
1 Click System > iSCSI Optimization > iSCSI Sessions in the tree view to
display the iSCSI Sessions page.
Figure 20-3. iSCSI Sessions
2 Select a target and click Details. The following is displayed:
– Target Name — The name of the target.
– Initiator Name — The name of the initiator.
– ISID — The iSCSI session ID.
– Session Life Time — The amount of time that has passed since the
first frame of the session.
– Aging Time — The time left until the session ages out and is
removed.604 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Initiators/Targets — The IP address and TCP port used by each
initiator and target in the session is displayed.
Displaying iSCSI Sessions Using CLI Commands
The following table summarizes the CLI commands for displaying iSCSI
sessions.
The following is an example of the CLI commands:
Table 20-3. iSCSI CLI Commands
CLI Command Description
show iscsi sessions
[detailed]
Displays iSCSI sessions
console(config)# show iscsi sessions
Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678
-------------------------------------------------------------
Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12
ISID: 11
Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10
ISID: 222
--------------------------------------------------------------
Target: iqn.103-1.com.storage-vendor:sn.43338.storage.tape:sys1.xyz
--------------------------------------------------------------
Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12
ISID: 44
Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10
ISID: 65
--------------------------------------------------------------
console# show iscsi sessions detailed
Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678
--------------------------------------------------------------
Session 1:
---------
Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12.storage:sys1.xyz
UP Time: 02:10:45 (DD:HH:MM)
Time for aging out: 10 min
ISID: 11
Initiator IP Address Initiator TCP Port Target IP Address Target IP Port
-------------------- ----------------- ---------------- -------------
172.16.1.3 49154 172.16.1.20 3001
172.16.1.3 49154 172.16.1.20 3001
1172.16.1.3 49154 172.16.1.20 3001
30001Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10
Status: Active
UP Time: 00:04:50 (DD:HH:MM)
Time for aging out: 2 min
ISID: 22Dell PowerConnect 55xx Systems User Guide 605
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring iSCSI Using CLI
The following is a sample procedure to configure the iSCSI feature using CLI:
Table 20-4. Sample CLI Script to Configure iSCSI
CLI Command Description
iscsi enable Enable iSCSI.
iscsi cos vpt 2 remark Set iSCSI flow to use VPT 2 (Layer 2
CoS). This VPT value replaces the
original VPT in the packet.
show iscsi sessions Verify that iSCSI is enabled and that the
iSCSI flows are displayed. Template Last Updated - 2/7/2007Dell PowerConnect 55xx Systems User Guide 606
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
21
Statistics/RMON
This section describes many of the statistics available on the device. The only
exception is the QoS statistics described in "Quality of Service" on page 650.
It contains the following topics:
• Table Views
• RMON Components
• ChartsDell PowerConnect 55xx Systems User Guide 607
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Table Views
This section displays statistics in table form.
It contains the following topics:
• Denied ACEs Counters
• Utilization Summary
• Counter Summary
• Interface Statistics
• Etherlike Statistics
• GVRP Statistics
• EAP Statistics608 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Denied ACEs Counters
The Denied ACEs counters contain the number of packets that were dropped
(denied) because they did not meet ACL criteria expressed in some ACE.
To display the denied ACE counters:
1 Click Statistics/RMON > Table Views > Denied ACEs Counters in the
tree view to display the Denied ACEs Counters page.
Figure 21-1. Denied ACEs Counters
The global number of dropped packets is displayed along with the number
of dropped packets on each interface.
2 To clear the counters, select either a stack unit and port or LAG. All
ports/LAGs in the unit are displayed.
3 Mark the counters to be cleared and click Clear Counters.
4 To clear all counters, click Clear All Counters. Dell PowerConnect 55xx Systems User Guide 609
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Viewing Denied ACE Counters Statistics Using the CLI Commands
The following table contains the CLI commands for viewing denied ACE
counters statistics.
The following is an example of the CLI commands:
Table 21-1. Denied ACE Counters CLI Commands
CLI Command Description
show interfaces access-lists
counters
[gigabitethernet|tengigabite
thernet] port-number|portchannel LAG-number]
Displays Access List counters.
console# show interfaces access-lists counters
Interface Denied ACE hits
--------- -------------
gi1/0/1 55
gi1/0/2 33
gi1/0/3 32610 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Utilization Summary
Use the Utilization Summary page to display interface utilization. This page
is refreshed periodically to minimize impact on performance. Display may be
disrupted during this period.
To display interface utilization statistics:
1 Click Statistics/RMON > Table Views > Utilization Summary in the tree
view to display the Utilization Summary page.
Figure 21-2. Utilization Summary
2 Select a unit and port/LAG.
The following fields are displayed:
– Port/LAG — The port/LAG number.
– Interface Status — The status of the interface: Up, Down or Not
Present when no port is attached to the LAG.
– % Interface Utilization — Network interface utilization percentage,
based on the duplex mode of the interface. The range of this reading is
from 0 to 200%. The maximum reading of 200% for a full duplex
connection indicates that 100% of bandwidth of incoming and
outgoing connections is used by the traffic travelling through the
interface. The maximum reading for a half duplex connection is 100%.Dell PowerConnect 55xx Systems User Guide 611
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– % Unicast Received — Percentage of Unicast packets received on the
interface.
– % Non Unicast Packets Received — Percentage of non-Unicast
packets received on the interface.
– % Error Packets Received — Percentage of packets with errors
received on the interface.
3 Select one of the Refresh Rate options to specify how frequently the
statistics should be refreshed.
The CPU utilization chart is displayed.612 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Counter Summary
To display the number of received and transmitted packets on ports, as
numeric figures and not percentages:
1 Click Statistics/RMON > Table Views > Counter Summary in the tree
view to display the Counter Summary page.
Figure 21-3. Counter Summary
Counters for the selected units or LAG are displayed.
2 Select a port/LAG.
The following fields are displayed:
– Port/LAG — The interface number.
– Interface Status — Status of the interface: Up or Down.
– Received Unicast Packets — Number of received Unicast packets on
the interface.Dell PowerConnect 55xx Systems User Guide 613
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Transmitted Unicast Packets — Number of transmitted Unicast
packets from the interface.
– Received Non Unicast Packets — Number of received non-Unicast
packets on the interface.
– Transmitted Non Unicast Packets — Number of transmitted nonUnicast packets from the interface.
– Received Errors — Number of received packets with errors on the
interface.
3 Select one of the Refresh Rate options to specify how frequently the
counters should be refreshed.614 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Interface Statistics
To display the number of received and transmitted packets on an interface:
1 Click Statistics/RMON > Table Views > Interface Statistics in the tree
view to display the Interface Statistics page.
Figure 21-4. Interface Statistics
2 Select a port/LAG.
3 Select one of the Refresh Rate options to specify how frequently the
counters should be refreshed.
The following fields are displayed:
Receive Statistics
– Total Bytes (Octets) — Amount of octets received on the selected
interface.Dell PowerConnect 55xx Systems User Guide 615
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Unicast Packets — Number of Unicast packets received on the
selected interface.
– Multicast Packets — Number of Multicast packets received on the
selected interface.
– Broadcast Packets — Number of Broadcast packets received on the
selected interface.
– Packets with Errors — Number of errors packets received on the
selected interface.
Transmit Statistics
– Total Bytes (Octets) — Number of octets transmitted from the
selected interface.
– Unicast Packets — Number of Unicast packets transmitted from the
selected interface.
– Multicast Packets — Number of Multicast packets transmitted from
the selected interface.
– Broadcast Packets — Number of Broadcast packets transmitted from
the selected interface.
4 Click Reset All Counters to clear these counters.616 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Etherlike Statistics
To display interface error statistics:
1 Click Statistics/RMON > Table Views > Etherlike Statistics in the tree
view to display the Etherlike Statistics page.
Figure 21-5. Etherlike Statistics
2 Select a port/LAG.
The following fields are displayed:
– Frame Check Sequence (FCS) Errors — Number of frames received
that are an integral number of octets in length but do not pass the
FCS check.
– Single Collision Frames — Number of frames that are involved in a
single collision, and are subsequently transmitted successfully.
– Late Collisions — Number of collisions detected after the first 512
bits of data.Dell PowerConnect 55xx Systems User Guide 617
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Excessive Collisions — Number of frames for which transmission fails
due to excessive collisions.
– Internal MAC Transmit Errors — Number of frames for which
reception fails due to an internal MAC sublayer receive error.
– Oversize Packets — Number of frames received that exceed the
maximum permitted frame size.
– Received Pause Frames — Number of MAC Control frames received
with a PAUSE operation code.
– Transmitted Pause Frames — Number of MAC Control frames
transmitted on this interface with a PAUSE operation code.
3 Select one of the Refresh Rate options to clears the statistics for the
selected interface.
Viewing Interface Statistics Using the CLI Commands
The following table contains the CLI commands for viewing utilization,
counters and interface statistics.
Table 21-2. Interface Statistics CLI Commands
CLI Command Description
show interfaces counters
[[gigabitethernet|tengigabit
ethernet] port-number|portchannel LAG-number]
Displays traffic seen by the physical
interface.618 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI command for all ports:
The following is an example of the CLI command for a single port:
console# show interfaces counters
Port InUcastPkts InMcastPkts InBcastPkts InOctets
------- ------------ ----------- ----------- --------
gi2/0/1 0 0 0 0
gi2/0/2 0 0 0 0
gi2/0/3 0 0 0 0
gi2/0/4 0 0 0 0
gi2/0/5 0 0 0 0
Port OutUcastPkts OutMcastPkts OutBcastPkts OutOctets
--------- ------------ ------------ ------------ ------------
gi2/0/1 0 0 0 0
gi2/0/2 0 0 0 0
gi2/0/3 0 0 0 0
gi2/0/4 0 0 0 0
console# show interfaces counters gi1/0/1
Port InUcastPkts InMcastPkts InBcastPkts InOctets
-------- ------------- ------------ ------------ ------------
gi1/0/1 0 0 0 0
Port OutUcastPkts OutMcastPkts OutBcastPkts OutOctets
-------- ----------- ------------ ------------ ------------
gi1/0/1 0 0 0 0
Alignment Errors: 0
FCS Errors: 0
Single Collision Frames: 0
Multiple Collision Frames: 0
SQE Test Errors: 0
Deferred Transmissions: 0
Late Collisions: 0
Excessive Collisions: 0
Carrier Sense Errors: 0
Oversize Packets: 0
Internal MAC Rx Errors: 0
Symbol Errors: 0
Received Pause Frames: 0Dell PowerConnect 55xx Systems User Guide 619
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
GVRP Statistics
To display device GVRP statistics:
1 Click Statistics/RMON > Table Views > GVRP Statistics in the tree view
to display the GVRP Statistics page.
Figure 21-6. GVRP Statistics
2 Select a port/LAG.
The number of received and transmitted packets in the following counters
is displayed:
GVRP Statistics Table
– Join Empty — The number of GVRP Join Empty packets.
– Empty — The number of GVRP empty packets.
– Leave Empty — The number of GVRP Leave Empty packets.
– Join In — The number of GVRP Join In packets.620 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Leave In — The number of GVRP Leave In packets.
– Leave All — The number of GVRP Leave All packets.
GVRP Error Statistics
– Invalid Protocol ID — The number of GVRP Invalid Protocol ID
errors.
– Invalid Attribute Type — The number of GVRP Invalid Attribute ID
errors.
– Invalid Attribute Value — The number of GVRP Invalid Attribute
Value errors.
– Invalid Attribute Length — The number of GVRP Invalid Attribute
Length errors.
– Invalid Event — The number of GVRP Invalid Events errors.
3 Select one of the Refresh Rate options to specify how frequently the
statistics should be refreshed.
Viewing GVRP Statistics Using the CLI Commands
The following table contains the CLI commands for viewing GVRP statistics.
Table 21-3. GVRP Statistics CLI Commands
CLI Command Description
show gvrp statistics
[[gigabitethernet|tengigabitethernet
] interface|port-channel LAG-number]
Displays GVRP statistics.
show gvrp error-statistics
[[gigabitethernet|tengigabitethernet
] interface|port-channel LAG-number]
Displays GVRP error
statistics.Dell PowerConnect 55xx Systems User Guide 621
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console# show gvrp statistics
GVRP Statistics:
----------------
Legend:
rJE : Join Empty Received rJIn: Join In Received
rEmp : Empty Received rLIn: Leave In Received
rLE : Leave Empty Received rLA : Leave All Received
sJE : Join Empty Sent sJIn: Join In Sent
sEmp : Empty Sent sLIn: Leave In Sent
sLE : Leave Empty Sent sLA : Leave All Sent
Port rJE rJIn rEmp rLIn rLE rLA sJE sJIn sEmp sLIn sLE sLA
----- ----- ----- ----- ----- ----- ----- ---- ----- ---- --- ---- ---622 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
EAP Statistics
For information about EAP, see "Dot1x Authentication" on page 132.
To display EAP statistics:
1 Click Statistics/RMON > Table Views > EAP Statistics in the tree view
to display the EAP Statistics page.
Figure 21-7. EAP Statistics
2 Select a port/LAG.
The following fields are displayed:
– Frames Received — The number of valid EAPOL frames received on
the port.
– Frames Transmitted — The number of EAPOL frames transmitted
via the port.Dell PowerConnect 55xx Systems User Guide 623
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Start Frames Receive — The number of EAPOL Start frames received
on the port.
– Log off Frames Receive — The number of EAPOL Logoff frames
received on the port.
– Respond ID Frames Receive — The number of EAP Resp/ID frames
received on the port.
– Respond Frames Receive — The number of valid EAP Response
frames received on the port.
– Request ID Frames Transmit — The number of EAP Req/ID frames
transmitted via the port.
– Request Frames Transmitted — The number of EAP Request frames
transmitted via the port.
– Invalid Frames Receive — The number of unrecognized EAPOL
frames received on this port.
– Length Error Frames Receive — The number of EAPOL frames with
an invalid Packet Body Length received on this port.
– Last Frame Version — The protocol version number attached to the
most recently received EAPOL frame.
– Last Frame Source — The source MAC address attached to the most
recently received EAPOL frame.
3 Select one of the Refresh Rate options to specify how frequently the
statistics should be refreshed.
Viewing EAP Statistics Using the CLI Commands
The following table summarizes the CLI commands for viewing EAP
statistics.
Table 21-4. EAP Statistics CLI Commands
CLI Command Description
show dot1x statistics Displays 802.1X statistics for the
specified interface.624 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console# show dot1x statistics gi1/0/1
EapolFramesRx: 11
EapolFramesTx: 12
EapolStartFramesRx: 1
EapolLogoffFramesRx: 1
EapolRespIdFramesRx: 3
EapolRespFramesRx: 6
EapolReqIdFramesTx: 3
EapolReqFramesTx: 6
InvalidEapolFramesRx: 0
EapLengthErrorFramesRx: 0
LastEapolFrameVersion: 1
LastEapolFrameSource: 0008.3b79.8787Dell PowerConnect 55xx Systems User Guide 625
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
RMON Components
This section describes Remote Monitoring (RMON), which enables network
managers to display network information from a remote location.
It contains the following topics:
• Statistics
• History Control
• History Table
• Events Control
• Events Log
• Alarms626 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Statistics
To display device utilization statistics and errors that occurred on the device:
1 Click Statistics/RMON > RMON > Statistics in the tree view to display
the Statistics page.
Figure 21-8. Statistics
2 Select a port/LAG.
The following fields are displayed:
– Received Bytes (Octets) — Number of bytes received on the selected
interface.
– Received Packets — Number of packets received on the selected
interface.
– Broadcast Packets Received — Number of good Broadcast packets
received on the interface since the device was last refreshed. This
number does not include Multicast packets. Dell PowerConnect 55xx Systems User Guide 627
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Multicast Packets Received — Number of good Multicast packets
received on the interface, since the device was last refreshed.
– CRC&Align Errors — Number of packets received with a length
(excluding framing bits, but including FCS octets) of between 64 and
1518 octets, inclusive, but with either a bad Frame Check Sequence
(FCS) with an integral number of octets (FCS Error) or a bad FCS
with a non-integral number of octets (Alignment Error).
– Undersize Packets — Number of packets received, less than 64 octets
long (excluding framing bits, but including FCS octets), and
otherwise well formed.
– Oversize Packets — Number of packets received, longer than 1518
octets (excluding framing bits, but including FCS octets), and
otherwise well formed.
– Fragments — Number of packets received, less than 64 octets in
length (excluding framing bits but including FCS octets), which has
either a bad Frame Check Sequence (FCS) with an integral number of
octets (FCS Error), or a bad FCS with a non-integral number of octets
(Alignment Error).
– Jabbers — Number of packets received, longer than 1518 octets
(excluding framing bits, but including FCS octets), and having either
a bad Frame Check Sequence (FCS) with an integral number of
octets (FCS Error), or a bad FCS with a non-integral number of octets
(Alignment Error).
– Collisions — Number of collisions received on the interface, since the
device was last refreshed.
– Frames of 64 Bytes — Number of 64-byte frames received on the
interface, since the device was last refreshed.
– Frames of 65 to 127 Bytes — Number of 65-127-byte frames received
on the interface, since the device was last refreshed.
– Frames of 128 to 255 Bytes — Number of 128-255-byte frames
received on the interface, since the device was last refreshed.
– Frames of 256 to 511 Bytes — Number of 256-511-byte frames
received on the interface, since the device was last refreshed.
– Frames of 512 to 1023 Bytes — Number of 512-1023-byte frames
received on the interface, since the device was last refreshed.628 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Frames of 1024 to Max Octets — Number of 1024-Max Octet frames
received on the interface, since the device was last refreshed.
3 Select one of the Refresh Rate options to specify how frequently the
statistics should be refreshed.
Configuring RMON Statistics Using the CLI Commands
The following table contains the CLI commands for viewing and enabling
RMON statistics.
The following is an example of the CLI commands:
Table 21-5. Configuring RMON Statistics Using CLI Command
CLI Command Description
show rmon statistics
{[gigabitethernet|tengigabiteth
ernet] interface|port-channel
LAG-number]
Displays RMON Ethernet statistics.
console# show rmon statistics gi1/0/1
Port te1/0/1
Dropped: 0
Octets: 0 Packets: 0
Broadcast: 0 Multicast: 0
CRC Align Errors: 0 Collisions: 0
Undersize Pkts: 0 Oversize Pkts: 0
Fragments: 0 Jabbers: 0
64 Octets: 0 65 to 127 Octets: 1
128 to 255 Octets: 1 256 to 511 Octets: 1
512 to 1023 Octets: 0 1024 to max Octets: 0Dell PowerConnect 55xx Systems User Guide 629
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
History Control
To display the requested RMON history group statistics or request a new
sample of interface statistics:
1 Click Statistics/RMON > RMON > History Control in the tree view to
display the History Control: Summary page.
Figure 21-9. History Control: Summary
Previously-defined samples are displayed.
2 To add a new entry, click Add. The New History Entry number, which
uniquely identifies the sample, is displayed.
3 Enter the fields for the entry:
– Source Interface — Sampled Ethernet interface.
– Owner (0-20 characters) — RMON station or user that configured the
entry.630 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Max No. of Samples to Keep (1-50) — Number of samples to be
saved.
– Sampling Interval (1-3600) — The time interval in seconds between
samples.
Configuring RMON History Control Using the CLI Commands
The following table contains the CLI commands for configuring RMON
history control.
The following is an example of the CLI commands:
Table 21-6. RMON History Control CLI Commands
CLI Command Description
rmon collection stats index
[owner ownername|bucket
bucket-number] [interval
seconds]
no rmon collection stats index
Enables and configures RMON on an
interface.
Use the no form of this command to
remove a specified RMON history
group of statistics.
show rmon collection history
[[gigabitethernet|tengigabitet
hernet] interface|port-channel
LAG-number]
Displays RMON collection history
statistics.
console(config)# interface gi1/0/8
console(config-if)# rmon collection stats 1 interval
2400Dell PowerConnect 55xx Systems User Guide 631
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
History Table
The History Table page displays interface-specific statistical network
samplings. Each table entry represents the counter values compiled during a
single sample.
To display RMON statistics for a specified sample:
1 Click Statistics/RMONRMONHistory Table in the tree view to
display the History Table page.
Figure 21-10. History Table
2 Select a History Entry No.
The following fields are displayed:
– Owner — RMON station or user that requested the RMON
information.
– Sample No. — Number of the specific sample the information in the
table reflects.632 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Drop Events — Number of dropped packets due to lack of network
resources during the sampling interval. This may not represent the
exact number of dropped packets, but rather the number of times
dropped packets were detected.
– Received Bytes (Octets) — Number of data octets, including bad
packets, received on the network.
– Received Packets — Number of packets received during the sampling
interval.
– Broadcast Packets — Number of good Broadcast packets received
during the sampling interval.
– Multicast Packets — Number of good Multicast packets received
during the sampling interval.
– CRC Align Errors — Number of packets received during the sampling
session, with a length of between 64-1632 octets, who had a bad
Check Sequence (FCS) with an integral number of octets, or a bad
FCS with a non-integral number.
– Undersize Packets — Number of packets, having less than 64 octets,
received during the sampling session.
– Oversize Packets — Number of packets having more than 1632 octets,
received during the sampling session.
– Fragments — Number of packets, having less than 64 octets and
having a FCS, received during the sampling session.
– Jabbers — Number of packets, having more than 1632 octets and who
had an FCS, received during the sampling session.
– Collisions — Estimated number of packet collision that occurred
during the sampling session. Collisions are detected when repeater
port detects two or more stations transmitting simultaneously.
– Utilization — Estimated main physical layer network usage on an
interface during the session sampling. The value is stated in
hundredths of a percent.Dell PowerConnect 55xx Systems User Guide 633
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Viewing the RMON History Table Using the CLI Commands
The following table contains the CLI commands for viewing the RMON
history table.
The following is an example of a CLI command:
Table 21-7. RMON History Table CLI Commands
CLI Command Description
show rmon history index
{throughput|errors|other
} [period seconds]
Displays RMON Ethernet statistics history.
console# show rmon history 1 throughput
Sample Set: 1
Interface: 1/0/1
Requested samples: 50
Owner: CLI
Interval: 1800
Granted samples: 50
Maximum table size: 500
Time
--------------------
Jan 18 2005 21:57:00
Octets
---------
303595962
Packets
--------
357568
Broadcast
---------
3289
Multicast
----------
7287
Util
--------
19%634 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Events Control
Events are actions that are performed when an alarm is generated (alarms are
defined in the Alarms page).
An event can be any combination of logs/traps. If the action includes logging,
then the events are logged in the Events Log page.
To define an RMON event:
1 Click Statistics/RMON > RMON > Events Control in the tree view to
display the Events Control: Summary page.
Figure 21-11. Events Control: Summary
The currently-defined events are displayed. Along with the fields described
in the Events Control: Add page, the following field is displayed for the
events:
– Time — The time that the event occurred.
2 To define a new event, click Add.Dell PowerConnect 55xx Systems User Guide 635
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 Enter the fields:
– Event Entry — Displays a new event number.
– Community — Enter the community to which the event belongs or
keep the default community.
– Description — Enter the event description.
– Type — Select the event action. The possible options are:
• None — No action is taken.
• Log — When an alarm occurs, a log entry is recorded.
• Trap — When an alarm occurs, a trap is generated.
• Log and Trap — When an alarm occurs, a log entry is recorded
and a trap is generated.
– Owner — Enter the event owner.
Defining RMON Events Using the CLI Commands
The following table contains the CLI commands for defining RMON events.
Table 21-8. RMON Event Definition CLI Commands
CLI Command Description
rmon event index
{none|log|trap|log-trap}
[community text]
[description text] [owner
name]
no rmon event index
Configures an event.
Use the no form of this command to
remove an event.
show rmon events Displays RMON event table.636 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# rmon event 1 log
console(config)# exit
console# show rmon events
Index Description Type Community Owner Last Time
Sent
----- ----------- ------ --------- ----- -----------
1 Errors Log Default
Community
CLI Jan 18 2002
23:58:17
2 High
Broadcast
LogTrap
Router Manager Jan 18 2002
23:59:48Dell PowerConnect 55xx Systems User Guide 637
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Events Log
The Events log displays the log of events that occurred. An event is logged
when the type of the event is Log or Log and Trap. The action in the event is
performed when the event is bound to an alarm (see the Alarms page) and
the conditions of the alarm have occurred.
To display the events log:
• Click Statistics/RMON > RMON > Events Log in the tree view to
display the Events Control page.
Figure 21-12. Events Control
The following fields are displayed:
– Event — The event identifier.
– Log No. — The log number.
– Log Time — Time when the log entry was entered. 638 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Description — Description of the log entry.
Viewing Device Events Using the CLI Commands
The following table contains the CLI commands for viewing device events.
The following is an example of the CLI commands:
Alarms
RMON alarms provide a mechanism for setting thresholds and sampling
intervals to generate exception events on a counter or any other SNMP object
counter maintained by the agent.
Both the rising and falling thresholds must be configured in the alarm. After a
rising threshold is crossed, another rising event is not generated until the
companion falling threshold is crossed. After a falling alarm is issued, the next
Table 21-9. Device Event Viewing CLI Commands
CLI Command Description
show rmon log [event] Displays the RMON logging table.
console(config)# rmon event 1 log
console> show rmon log
Maximum table size: 500
Event Description Time
----- --------------- --------------
1 Errors Jan 18 2002 23:58:17
2 High Broadcast Jan 18 2002 23:59:48Dell PowerConnect 55xx Systems User Guide 639
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
alarm is issued when a rising threshold is crossed. One or more alarms are
bound to an event. The event indicates the action to be taken when the alarm
occurs.
To add an RMON alarm:
1 Click Statistics/RMON > RMON > Alarms in the tree view to display
the Alarms: Summary page.
Figure 21-13. Alarms: Summary
The currently-defined alarms are displayed.
2 To add a new alarm, click Add and enter the fields:
– Alarm Entry — Displays a new alarm entry.
– Interface — Select the interface for which RMON statistics are
displayed.
– Counter Name — Select the selected MIB variable. 640 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Sample Type — Select the sampling method for the selected variable
and comparing the value against the thresholds. The possible options
are:
• Delta — Subtracts the last sampled value from the current value.
The difference in the values is compared to the threshold.
• Absolute — Compares the values directly with the thresholds at
the end of the sampling interval.
– Rising Threshold (0–2147483647) — Enter the rising counter value
that triggers the rising event alarm.
– Rising Event — Select one of the previously-defined events.
– Falling Threshold (0–2147483647) — Enter the falling counter value
that triggers the falling event alarm.
– Falling Event — Select one of the previously-defined events.
– Startup Alarm — Select the trigger that activates the alarm. The
possible options are:
• Rising Alarm — A rising counter value triggers the alarm
• Falling Alarm — A falling counter value triggers the alarm.
• Rising and Falling — Both rising and falling counter values
trigger the alarm.
– Interval (1–2147483647) — Enter the alarm interval time in seconds.
This is the interval in seconds over which the data is sampled and
compared with the rising and falling thresholds.
– Owner — Enter the name of the user or network management system
that receives the alarm.Dell PowerConnect 55xx Systems User Guide 641
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Device Alarms Using the CLI Commands
The following table contains the CLI commands for defining device alarms.
Table 21-10. Device Alarm CLI Commands
CLI Command Description
rmon alarm index
MIB_Object_ID interval
rthreshold fthreshold
revent fevent [type type]
[startup direction] [owner
name]
no rmon alarm index
Configures RMON alarm conditions.
Use the no form of this command to
remove an alarm.
show rmon alarm-table Displays summary of the alarm table.
show rmon alarm number Displays the RMON alarm
configuration.642 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# rmon alarm 1000
1.3.6.1.2.1.2.2.1.10.1 360000 1000000 1000000 10 20
console# show rmon alarm-table
Index
-----
123
OID
----------------------
1.3.6.1.2.1.2.2.1.10.1
1.3.6.1.2.1.2.2.1.10.1
1.3.6.1.2.1.2.2.1.10.9
Owner
-------
CLI
Manager
CLIDell PowerConnect 55xx Systems User Guide 643
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Charts
This section describes how to display statistics as charts.
It contains the following topics:
• Ports
• LAGs
• CPU Utilization
Ports
To display port statistics in chart format:
1 Click Statistics/RMON > Charts > Ports in the tree view to display the
Ports page.
Figure 21-14. Ports
2 Select the unit ID of a unit in the stack for which you want to display
statistics.644 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 Check the type of statistics to be displayed:
– Interface Statistics — Select the interface statistics to display.
– Etherlike Statistics — Select the frame error statistics to display.
– RMON Statistics — Select the RMON statistics to display.
– GVRP Statistics — Select the GVRP statistics type to display.
– Refresh Rate — Select the amount of time that passes before the
statistics are refreshed.
4 To draw a chart for the selected statistics, click Draw. The chart for the
selected statistic is displayed on the page.Dell PowerConnect 55xx Systems User Guide 645
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Viewing Port Statistics Using the CLI Commands
The CLI commands for viewing port statistics are the same CLI commands
described above. The Ports page simply shows the same statistics in chart
form.
LAGs
To display LAG statistics in chart format:
1 Click Statistics/RMON > Charts > LAGs in the tree view to display the
LAGs page.
Figure 21-15. LAGs
2 Check the type of statistics to be displayed:
– Interface Statistics — Select the interface statistics to display.
– Etherlike Statistics — Select the frame error statistics to display.
– RMON Statistics — Select the RMON statistics to display.646 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– GVRP Statistics — Select the GVRP statistics type to display.
– Refresh Rate — Select the amount of time that passes before the
statistics are refreshed.
3 To draw a chart for the selected statistics, click Draw. The chart for the
selected statistic is displayed on the page.
Viewing LAG Statistics Using the CLI Commands
The following table contains the CLI commands for viewing LAG statistics.
Table 21-11. LAG Statistic CLI Commands
CLI Command Description
show interfaces counters
[[gigabitethernet|tengigabitet
hernet] interface|port-channel
LAG-number]
Displays traffic seen by the physical
interface.
show rmon statistics
{[gigabitethernet|tengigabitet
hernet] interface|port-channel
LAG-number}
Displays RMON Ethernet
statistics.
show gvrp statistics
{[gigabitethernet|tengigabitet
hernet] interface|port-channel
LAG-number}
Displays GVRP statistics.
show gvrp-error statistics
{[gigabitethernet|tengigabitet
hernet] interface|port-channel
LAG-number}
Displays GVRP error statistics.Dell PowerConnect 55xx Systems User Guide 647
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console# show rmon statistics gi1/0/1
Port gi1/0/1
Dropped: 0
Octets: 0 Packets: 0
Broadcast: 0 Multicast: 0
CRC Align Errors: 0 Collisions: 0
Undersize Pkts: 0 Oversize Pkts: 0
Fragments: 0 Jabbers: 0
64 Octets: 0 65 to 127 Octets: 1
128 to 255 Octets: 1 256 to 511 Octets: 1
512 to 1023 Octets: 0 1024 to max Octets: 0648 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
CPU Utilization
Use the CPU Utilization page to display the system’s CPU utilization and
percentage of CPU resources consumed by each unit in the stack. Each unit
in the stack is assigned a color on the graph.
To display CPU utilization in chart format:
1 Click Statistics/RMON > Charts > CPU Utilization in the tree view to
display the CPU Utilization page.
Figure 21-16. CPU Utilization
2 Select the Refresh Rate to specify how frequently the statistics should be
refreshed.
3 The CPU utilization chart is displayed. Dell PowerConnect 55xx Systems User Guide 649
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Viewing CPU Utilization Using CLI Commands
The following table summarizes the CLI commands for viewing CPU
utilization.
The following is an example of the CLI commands:
Table 21-12. CPU Utilization CLI Commands
CLI Command Description
show cpu utilization Displays CPU utilization.
console# show cpu utilization
CPU utilization service is on.
CPU utilization
--------------------------
five seconds: 5%; one minute: 3%; five minutes: 3%Template Last Updated - 2/7/2007Dell PowerConnect 55xx Systems User Guide 650
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
22
Quality of Service
This section provides information for configuring Quality of Service (QoS).
It contains the following topics:
• QoS Features and Components
• General
• QoS Basic Mode
• QoS Advanced Mode
• QoS StatisticsDell PowerConnect 55xx Systems User Guide 651
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QoS Features and Components
The QoS feature is used to optimize network performance. It provides
classification of incoming traffic into traffic classes, based on one or more
attributes, including:
– Device configuration
– Ingress interface
– Packet contents
QoS includes the following features:
• Traffic Classification — Classifies each incoming packet, as belonging to
a specific traffic flow, based on the packet contents and/or interface. The
classification is done by an ACL (Access Control List), and only traffic
that meets the ACL criteria is subject to classification.
• Assignment to Hardware Queues — Assigns incoming packets to
forwarding queues. Packets are sent to a particular queue for handling as a
function of the traffic class to which they belong.
• Other Traffic Class-Handling Attribute — Applies QoS mechanisms to
various classes, including bandwidth management.
QoS Modes
A single QoS mode is selected and applies to all interfaces in the system. The
modes are:
• Basic Mode — Class of Service (CoS).
– Traffic is divided into classes that determine how it is treated. All
traffic in a class is treated with the same QoS action. The QoS action
for the class of traffic determines the egress queue on the egress port,
based on the indicated QoS value in the incoming frame.
The QoS value in the incoming frame is:
• Layer 2 Packets — VLAN Priority Tag (VPT) 802.1p value
• Layer 3 IPv4 Frames — Differentiated Service Code Point
(DSCP) value
• Layer 3 IPv6 Frames —Traffic Class (TC) value
When operating in Basic mode, the switch trusts this
externally-assigned QoS value. 652 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
This is the default QoS mode.
• Advanced Mode — Per-flow Quality of Service (QoS).
In Advanced mode, a per-flow QoS consists of a class map and a policer:
– A class map defines the kind of traffic in a flow, and contains one or
more ACLs. Packets that match the ACLs belong to the flow.
– A policer applies the configured QoS to a flow. The QoS configuration
of a flow may consist of the egress queue, the DSCP or CoS value, and
actions on out-of-profile (excess) traffic.
• Disable Mode (QoS is not enabled)
In this mode, all traffic is mapped to a single best-effort queue, so that no
type of traffic is prioritized over another.
Only a single mode can be active at a time. When the system is configured to
work in QoS Advanced mode, settings for QoS Basic mode are not active and
vice versa.
When the QoS mode is changed, the following occurs:
• When changing from Advanced mode to any other mode, policy profile
definitions and class maps are deleted. ACLs, which are bonded directly to
interfaces, remain bonded.
• When changing from Basic mode to Advanced mode, the QoS Trust mode
configuration in Basic mode is not retained.
• When disabling QoS, the shaper and queue setting (WRR/SP bandwidth
settings) are reset to default values.
All other user configurations remain intact.Dell PowerConnect 55xx Systems User Guide 653
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
General
This section contains the following topics:
• QoS Mode
• QoS Properties
• Queue
• Mapping to Queue
• Bandwidth
• TCP Congestion Avoidance
QoS Mode
To enable/disable the QoS mode:
1 Click Quality of Service > General >QoS Mode in the tree view to
display the QoS Mode page.
Figure 22-1. QoS Mode
2 Select the QoS Mode. The possible options are:
– Basic — QoS is enabled in Basic mode on the switch654 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Advanced — QoS is enabled in Advanced mode on the switch.
– Disable — QoS is not enabled on the switch.
Setting QoS Mode Using CLI Commands
The following table summarizes the CLI commands for setting the QoS
mode.
The following is an example of the CLI commands:
Table 22-1. QoS Mode CLI Commands
CLI Command Description
qos [basic|advanced]
no qos
Enables QoS on the device.
Use the no form of this command to disable QoS
on the device
show qos Displays the QoS mode.
console(config)# qos basicDell PowerConnect 55xx Systems User Guide 655
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QoS Properties
To set the default CoS value on incoming, untagged packets:
1 Click Quality of Service > General > QoS Properties in the tree view to
display the QoS Properties: Summary page.
Figure 22-2. QoS Properties: Summary
The default CoS values for all interfaces on the selected unit are displayed.
2 To modify the CoS value for an interface, click Edit, and enter the fields:
– Interface — Select a port or LAG if required.
– Set Default CoS — Enter the default CoS tag value for untagged
packets.656 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring QoS Properties Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the QoS Properties: Summary page.
The following is an example of the CLI command:
Queue
The switch supports eight queues for each interface. Queue number eight is
the highest priority queue. Queue number one is the lowest priority queue.
Traffic Limitation Methods
There are two ways of determining how traffic in queues is handled, Strict
Priority and Weighted Round Robin (WRR):
• Strict Priority — Egress traffic from the highest-priority queue is
transmitted first. Traffic from the lower queues is processed only after the
highest queue has been transmitted, thus providing the highest level of
priority of traffic to the lowest-numbered queue.
• Weighted Round Robin (WRR) — In WRR mode, the number of packets
sent from the queue is proportional to the weight of the queue (the higher
the weight, the more frames are sent). For example, if all eight queues are
WRR and the default weights are used, queue 1 receives 1/15 of the
bandwidth (assuming all queues are saturated and there is congestion),
queue 2 receives 2/15, queue 3 receives 4/15, and queue 8 receives 8/15 of
the bandwidth. The type of WRR algorithm used in the device is not the
standard Deficit WRR (DWRR), but rather Shaped Deficit WRR
(SDWRR).
Table 22-2. QoS Properties CLI Commands
CLI Command Description
qos cos default-cos
no qos cos
Defines the default CoS value of a port.
Use the no form of this command to restore the
default configuration.
console(config)# interface gi1/0/15
console(config-if)# qos cos 3Dell PowerConnect 55xx Systems User Guide 657
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Combination of WRR and Strict Priority
The priority for handling traffic can be selected for each queue. When the
queuing mode is Weighted Round Robin for all queues, queues are serviced
according to their weights. If all queues are assigned strict priority, queues are
serviced according to that order.
The following is true if some queues are assigned strict priority and others are
assigned WRR:
• If one queue is assigned strict priority, all higher queues are also assigned
strict priority. Conversely, if a queue is assigned a WRR weight, all lower
queues must also have a WRR weight assigned to them.
• In the above case, traffic for the strict priority queues is always sent before
traffic from the WRR queues. Traffic from the WRR queues is forwarded
only after the strict priority queues have been emptied. The relative
portion from each WRR queue depends on its weight.658 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To select the priority method and enter WRR weights:
1 Click Quality of Service > General > Queue in the tree view to display
the Queue page.
Figure 22-3. Queue
The queues are displayed.
2 Enter the parameters for the queues:
– Strict Priority — Check to indicate that traffic scheduling for the
selected queue, and all higher queues, is based strictly on the queue
priority.
– WRR — Check to indicate that traffic scheduling for the selected
queue is based on WRR. The time period is divided between the
WRR queues that are not empty, meaning they have descriptors to
egress. This happens only if strict priority queues are empty. Dell PowerConnect 55xx Systems User Guide 659
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Scheduling WRR Weight — If WRR is selected, enter the WRR
weight assigned to the queue.
– % of WRR Bandwidth — Displays the amount of bandwidth assigned
to the queue. These values represent the percent of the WRR weight.
Configuring Queue Settings Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the Queue page.
The following is an example of the CLI commands:
Mapping to Queue
This section provides information for mapping DSCP and CoS values to
service queues, and contains the following topics:
• CoS to Queue
• DSCP to Queue
Table 22-3. Queue Setting CLI Commands
CLI Command Description
priority-queue out num-ofqueues number-of-queues
no priority-queue out numof-queues
Configures the number of expedite
queues.
Use the no form of this command to
restore the default configuration.
wrr-queue bandwidth weight1
weight2 ... weight_n
no wrr-queue bandwidth
Assigns WRR weights to egress queues.
Use the no form of this command to
restore the default configuration.
console(config)# priority-queue out num-of-queues 2
console(config-if)# wrr-queue bandwidth 6 6 6 6 6 6660 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
CoS to Queue
The CoS to Queue page maps CoS priorities to an egress queue, meaning
that the egress queues of the incoming packets is based on the CoS priority in
their VLAN Tags. For incoming, untagged packets, the CoS priority is the
default CoS priority assigned to ingress ports.
By changing CoS to Queue mapping, Queue schedule method, and
bandwidth allocation, it is possible to achieve the desired quality of services in
a network.
The CoS to Queue mapping is applicable only if one of the following exists:
• The switch is in QoS Basic mode, and CoS is the trusted mode.
• The switch is in QoS Advanced mode, and the packets belong to flows that
are CoS trusted.Dell PowerConnect 55xx Systems User Guide 661
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To map CoS values to egress queues:
1 Click Quality of Service > General > CoS to Queue in the tree view to
display the CoS to Queue page.
Figure 22-4. CoS to Queue
The CoS/queue mappings are displayed.
2 Enter the fields:
– Class of Service — The CoS priority tag values, where zero is the
lowest priority and 7 is the highest priority.
– Queue — The queue to which the CoS priority is mapped. 662 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Mapping CoS Priorities to Queues Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the CoS to Queue page .
The following is an example of the CLI commands:
DSCP to Queue
The DSCP to Queue mapping determines the egress queues of the incoming
IP packets, based on their DSCP values. The original VPT (VLAN Priority
Tag) of the packet is unchanged.
By changing the DSCP to Queue mapping, the Queue schedule method, and
bandwidth allocation, it is possible to achieve improved quality of service in a
network.
The DSCP to Queue mapping is applicable to IP packets when:
• The switch is in Basic mode and DSCP is the trusted mode
• The switch is in Advanced mode and the packets belongs to flows that are
DSCP trusted
Non-IP packets are always classified to the best-effort queue.
Table 22-4. CoS to Queue CLI Commands
CLI Command Description
wrr-queue cos-map queue-id
cos1 ... cos8
no wrr-queue cos-map [queueid]
Maps CoS values to the egress queues.
Use the no form of this command to
restore the default configuration.
console(config)# wrr-queue cos-map 4 7Dell PowerConnect 55xx Systems User Guide 663
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To map DSCP to queues:
1 Click Quality of Service > General > DSCP to Queue in the tree view to
display the DSCP to Queue page.
Figure 22-5. DSCP to Queue
The DSCP values in the incoming packet and its associated queues are
displayed.
2 Enter the fields:
– DSCP In — The values of the DSCP field in the incoming packet.
– Queue — The queue to which packets with the specific DSCP value is
assigned. The values are 1-8, where 1 is the lowest value, and 8 is the
highest.664 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Mapping DSCP Values to Queues Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the DSCP to Queue page.
The following is an example of the CLI command:
Bandwidth
The amount of traffic that can be received and transmitted on an interface
can be limited by the following:
• Ingress Rate Limit — Number of bits per second that can be received
from the ingress interface. Excess bandwidth above this limit is discarded.
• Egress Shaping Rates is defined by the following:
– Committed Information Rate (CIR) sets the average maximum
amount of data allowed to be sent on the egress interface, measured in
bits per second
– Committed Burst Shape (CBS) sets the maximum burst of data that
is allowed to be sent, even though it is above the CIR. This is defined
in number of bytes of data.
Table 22-5. DSCP to Queue CLI Commands
CLI Command Description
qos map dscp-queue dscp-list to
queue-id
no qos map dscp-queue [dscplist]
Modifies the DSCP to queue
mapping.
Use the no form of this command to
restore the default configuration.
console(config)# qos map dscp-queue 33 40 41 to 1Dell PowerConnect 55xx Systems User Guide 665
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To configure bandwidth limitation:
1 Click Quality of Service > General > Bandwidth in the tree view to
display the Bandwidth: Summary page.
Figure 22-6. Bandwidth: Summary
The ingress and egress rates are displayed for all ports on the selected unit.
2 To set interface parameters, click Edit.
3 Select an interface, and enter the fields:
– Enable Ingress Rate Limit — Enable/disable ingress traffic limit for
the interface. If this field is selected, enter the Ingress Rate Limit.
– Ingress Rate Limit — Enter the ingress traffic limit for the interface.666 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Egress Shaping Rate — Enable/disable egress traffic limitation. If this
field is selected, enter the following fields.
– Committed Information Rate (CIR) — Enter the average maximum
amount of data allowed to be sent on the egress interface, measured in
bits per second.
– Committed Burst Size (CBS) — Enter the maximum burst of data
that is allowed to be sent on the egress interface, even though it is
above the CIR. This is defined in number of bytes of data.
Configuring Bandwidth Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the Bandwidth pages.
The following is an example of the CLI commands:
Table 22-6. Bandwidth CLI Commands
CLI Command Description
traffic-shape committed-rate
[committed-burst]
no traffic-shape
Sets shaper on egress port.
Use no form in order to disable
the shaper.
rate-limit committed-rate-kbps
[burst committed-burst-byte]
no rate-limit
Limits the rate of the incoming
traffic.
Use the no form to disable rate
limit.
console(config)# interface gi1/0/5
console(config-if)# traffic-shape 124000 9600
console(config-if)# rate-limit 150000Dell PowerConnect 55xx Systems User Guide 667
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
TCP Congestion Avoidance
Use the TCP Congestion Avoidance page to activate a congestion avoidance
algorithm. The algorithm breaks up or prevents TCP global synchronization
in a congested node, where the congestion is due to various sources sending
packets with the same byte count.
To configure TCP congestion avoidance:
1 Click Quality of Service > General > TCP Congestion Avoidance in the
tree view to display the TCP Congestion Avoidance page.
NOTE: TCP Congestion Avoidance increases network reliability, but it also
increases network traffic. Continue only if you are sure it will improve overall
network performance. For this change to be effective you must save the
configuration and reboot the device.
Figure 22-7. TCP Congestion Avoidance
2 Check TCP Congestion Avoidance to enable the algorithm.668 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring TCP Congestion Avoidance Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the TCP Congestion Avoidance page.
The following is an example of the CLI commands:
Table 22-7. TCP Congestion Avoidance CLI Commands
CLI Command Description
qos wrr-queue wrtd
no qos wrr-queue wrtd
Enables Weighted Random Tail Drop (WRTD).
Use the no form of this command to disable
WRTD.
console(config)# qos wrr-queue wrtd
This setting will take effect only after copying running
configuration to startup configuration and resetting the
device.Dell PowerConnect 55xx Systems User Guide 669
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QoS Basic Mode
This section describes QoS Basic mode.
It contains the following topics:
• Basic Mode Overview
• Workflow to Configure Basic Mode
• Global Settings
• DSCP Rewrite
• Interface Settings
Basic Mode Overview
In QoS Basic mode, a specific domain in the network can be defined as
trusted. Within that domain, packets are marked with CoS priority and/or
DSCP values, to signal the type of service they require. Nodes within the
domain use these fields to assign the packet to a specific output queue. The
initial packet classification and marking of these fields is done in the ingress
of the trusted domain.
Workflow to Configure Basic Mode
To configure Basic QoS mode, perform the following:
1 Select Basic mode for the system in the QoS Mode page.
2 Select the trust-behavior in the Global Settings page.
3 If there is any port that, as an exception, should not trust the incoming
CoS mark, disable the QoS state on that port in the Interface Settings
pages.
If a port is disabled without trusted mode, all its ingress packets are
forwarded in best effort. It is recommended that you disable the trusted
mode at the ports where the CoS and/or DSCP values in the incoming
packets are not trustworthy. Otherwise, performance in the network might
be negatively affected.
4 If you selected DSCP Rewrite in the Global Settings page, set the DSCP
in/out values in the DSCP Rewrite page.670 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Global Settings
Use the Global Settings page to enable Trust on all interfaces on the switch.
This configuration is only active when the QoS mode is Basic. Packets
entering a QoS domain are classified at the edge of the QoS domain.
For more information on setting Trust mode on an interface, see "Interface
Settings" on page 674.
To define Trust configuration:
1 Click Quality of Service > QoS Basic Mode > Global Settings in the tree
view to display the Global Settings page.
Figure 22-8. Global SettingsDell PowerConnect 55xx Systems User Guide 671
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Enter the fields:
– Trust Mode — Enable/disable Trust mode.
• CoS — Traffic is mapped to queues, based on the VPT field in the
VLAN tag, or based on the per-port default CoS value (if there is
no VLAN tag on the incoming packet). The mapping of the VPT
to queue can be configured in the CoS to Queue page.
• DSCP — All IP traffic is mapped to queues, based on the DSCP
field in the IP header. The mapping of the DSCP to queue is
configured in the DSCP to Queue page.
– Always Rewrite DSCP — Check to always rewrite the DSCP values in
the incoming packets with the new values set in the DSCP to Queue
page. When this field is enabled, the switch uses the new DSCP
values to select the egress queue.
Assigning Global Settings Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the Global Settings page.
The following is an example of the CLI commands:
Table 22-8. Global Settings CLI Commands
CLI Command Description
qos trust {cos|dscp}
no qos trust
Configures the system to either the
CoS or DSCP trust state.
Use the no form of this command to
return to the default configuration.
qos dscp-mutation
no qos dscp-mutation
Applies the DSCP Mutation map to
system DSCP trusted ports.
Use the no form of this command to
restore the trusted port with no
DSCP mutation.
console(config)# qos trust dscp
console(config)# qos dscp-mutation672 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DSCP Rewrite
Use the DSCP Rewrite page to rewrite the DSCP tags for incoming traffic,
when different DSCP values are used in the incoming and outgoing domains.
Changing the DSCP value used in one domain to the DSCP value used in the
other domain preserves the priority of traffic used in the first domain.
As an example, assume that there are three levels of service: Silver, Gold, and
Platinum. The DSCP incoming values used to mark these levels are 10, 20,
and 30 respectively. If this traffic is forwarded to another service provider that
has the same three levels of service, but uses DSCP values 16, 24, and 48, the
values set in the DSCP Rewrite page are used to change the incoming values
to the outgoing values.
These settings are active globally when the system is in QoS Basic mode.Dell PowerConnect 55xx Systems User Guide 673
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To map DSCP In values to DSCP Out values:
1 Click Quality of Service > QoS Basic Mode > DSCP Rewrite in the tree
view to display the DSCP Rewrite page.
Figure 22-9. DSCP Rewrite674 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 For each DSCP In value (DSCP value of the incoming packet) that needs
to be rewritten to an alternative value, set a DSCP Out value.
Assigning DSCP Rewrite Values Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the DSCP Rewrite page.
The following is an example of the CLI commands:
Interface Settings
QoS Trust mode can be configured on each port of the switch, as follows:
• QoS Trust State Disabled on an Interface — All inbound traffic on the
port is mapped to the best effort queue and no classification/prioritization
takes place.
• QoS Trust State Enabled on an Interface — Port prioritized traffic on
ingress is based on the system- wide configured trusted mode, which is
either CoS Trusted mode or DSCP Trusted mode.
Table 22-9. DSCP Rewrite CLI Commands
CLI Command Description
qos map dscp-mutation indscp to out-dscp
no qos map dscp-mutation
[in-dscp]
Configures the DSCP to DSCP Mutation
table.
Use the no form of this command to restore
the default configuration.
console(config)# qos map dscp-mutation 1 2 4 5 6 to 63Dell PowerConnect 55xx Systems User Guide 675
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define QoS Trust for an interface:
1 Click Quality of Service > QoS Basic Mode > Interface Settings in the
tree view to display the Interface Settings: Summary page.
Figure 22-10. Interface Settings: Summary
Trust mode is displayed for each interface on the selected unit.
2 To change the QoS trust state for an interface, click Edit, and select an
interface on a unit.
3 Enable/disable the QoS Trust State.676 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Assigning Interface Settings Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the Interface Settings page.
The following is an example of the CLI commands:
Configuring QoS Basic Mode Using CLI Commands
The following is a sample script configuring QoS Basic mode.
Table 22-10. Interface Settings CLI Commands
CLI Command Description
qos trust
no qos trust
Enables each port trust state while the
system is in the basic QoS mode.
Use the no form of this command to
disable the trust state on each port.
show qos interface[buffers |
queueing | policers | shapers
| rate-limit] [interface-id]]
Displays QoS information on the
interface.
console(config)# interface gi1/0/15
console(config-if)# qos trust
Table 22-11. Sample CLI Script to Configure QoS Basic Mode
CLI Command Description
console#configure
console(config)# qos basic
Enable QoS in Basic mode.
console(config)#mac access-list
extended MAC1
Define an ACL named
"MAC1"
console(config-mac-a1)#deny
00:00:00:00:00:11 00:00:00:00:00:ff
any
MAC1 discards all traffic with
source MAC
00:00:00:00:00:XX addresses.
console(config-mac-a1)# permit any
any
MAC1 permits all other
traffic.
console(config-mac-a1)#exit Exit ACL mode.Dell PowerConnect 55xx Systems User Guide 677
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
console(config)#interface gi1/0/1 Enter Interface mode on port
gi1/0/1.
console(config-if)#service-acl input
mac1
Bind MAC1 to port gi1/0/1.
Table 22-11. Sample CLI Script to Configure QoS Basic Mode (Continued)
CLI Command Description678 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QoS Advanced Mode
This section describes QoS Advanced mode.
It contains the following topics:
• Advanced Mode Overview
• Workflow to Configure Advanced QoS Mode
• DSCP Mapping
• Class Mapping
• QoS Policers
• Policy Binding
Advanced Mode Overview
In Advanced mode, the switch uses policies to support per-flow QoS. A policy
and its components have the following characteristics and relationships:
• A policy contains one or more class maps.
• A class map defines a flow with one or more associated ACLs. Packets that
match the ACL rules (ACEs) in a class map with Permit (forward) action,
belong to the same flow, and are subject to the same quality of service
action. A policy can contain one or more flows, each with a user-defined
QoS action.
• The QoS of a class map (flow) may be enforced by the associated policer.
There are two type of policers, as described in "Defining Class Mapping
Using CLI Commands" on page 684.
• Per-flow QoS actions are applied to flows by binding the policy maps to the
desired ports. A policy map and its class maps can be bound to one or more
ports, but each port is bound with, at the most, one policy map.
The following points should be considered:
• An ACL can be configured to one or more class maps, regardless of
policies.
• A class map can belong to only one policy map.
• When a class map, using a single policer, is bound to multiple ports, each
port has its own instance of the policer. Each instance applies the QoS
actions on the class map (flow) at a port independent of each other.Dell PowerConnect 55xx Systems User Guide 679
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• If you bind a policy map to more than one port and one of its classes
contains a single policer, all policy map rules will be multiplied per port
(using up more TCAM resources).
• An aggregate policer applies the QoS to all of its flows in aggregation,
regardless of policies and ports.
Advanced QoS settings consist of the following elements:
• Rules — All frames matching a single group of rules are considered to be a
flow.
• Actions — To be applied to frames in each flow that match the rules.
– Policers — See "Single Policers" on page 689
– Aggregate Policers — "Aggregate Policers" on page 687
– Trust —"Interface Settings" on page 674, "Policy Class Maps" on
page 692
– Set DSCP/CoS — "Policy Class Maps" on page 692
– Set Queue — "DSCP Mapping" on page 680
• Binding — Combination of rules and actions that are bound to one or
more interfaces.
Workflow to Configure Advanced QoS Mode
To configure Advanced QoS mode, perform the following:
1 Select Advanced mode for the system in the QoS Mode page.
2 If external DSCP values are different from those used on incoming
packets, map the external values to internal values in the DSCP Rewrite
page.
3 Create ACLs, as described in "Network Security" on page 97.
4 When ACLs are defined, create class maps and associate the ACLs with
them in the Class Mapping pages.
5 Create a policy map in the Policy Class Maps pages, and associate the
policy map with one or more class maps. Specify the QoS action, if needed,
for example by assigning a policer to a class map, when you associate the
class map to the policy.680 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
a Single Policer — Create a policy that associates a class map with a
single policer in the Policy Table pages and the Class Mapping pages.
Within the policy, define the single policer.
b Aggregate Policer — Create a QoS action for each flow. This action
sends all matching frames to the same policer (aggregate policer),
defined in the Aggregate Policer pages. Create a policy that associates
a class map with the aggregate policer in the Policy Table pages.
6 Bind the policy to an interface in the Policy Binding pages.
DSCP Mapping
When a policer is assigned to a class map (flow), you can specify the action to
take when the amount of traffic in the flow(s) exceeds the QoS-specified
limits. The portion of the traffic that causes the flow to exceed its QoS limit
is referred to as out-of-profile packets.
If the exceed action is Remark DSCP (as opposed to Drop), the switch
rewrites the original DSCP value of the out-of-profile IP packets to a new
value, based on the values entered in the DSCP Mapping page. The switch
uses the new values to assign resources and egress queues to these packets.
The switch physically replaces the original DSCP value in the out-of-profile
packets with the new DSCP value.
To use the Remark DSCP exceed action, set the DSCP Out value in the
DSCP Mapping page. Otherwise the action is null, because the DSCP value
in the packet is rewritten to the original DSCP value, set by factory default.Dell PowerConnect 55xx Systems User Guide 681
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To set new DSCP values:
1 Click Quality of Service > QoS Advanced Mode > DSCP Mapping to
display the DSCP Mapping page.
Figure 22-11. DSCP Mapping
2 If the Exceed Action is Out-of-Profile (in the Policy Class Maps page) or
Remark DSCP (in the Aggregate Policy page), the DSCP In values are
rewritten with the DSCP Out values. Set the DSCP Out values as
required.682 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring DSCP Mapping Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the DSCP Mapping page.
The following is an example of the CLI commands:
Class Mapping
A Class Map defines a traffic flow associated with ACL(s). A MAC-based
ACL, IP-based ACL, and an IPv6-based ACL can be combined into a class
map. Class maps are configured to match packet criteria on a match-all or
match-any basis. They are matched to packets on a first-fit basis, meaning
that the action associated with the first-matched class map is the action
performed by the system. Packets that match the same class map belong to
the same flow.
There are two possible types of matching:
• match-all — Traffic matches class map if it matches IP/IPV6 and MAC
ACLs
• match-any — Traffic matches class map if it matches at least one of the
ACLs
If a more complex set of rules is needed, several class maps can be grouped
into a super-group called a policy (see "Defining Class Mapping Using CLI
Commands" on page 684).
Table 22-12. DSCP Mapping CLI Commands
CLI Command Description
qos map policed-dscp dscp-list
to dscp-mark-down
no qos map policed-dscp [dscplist]
Configures the policed-DSCP map for
remarking purposes.
Use the no form of this command to
restore the default configuration.
console(config)# qos map policed-dscp 3 to 43Dell PowerConnect 55xx Systems User Guide 683
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define a class map:
1 Click Quality of Service > QoS Advanced Mode > Class Mapping to
display the Class Mapping: Summary page.
Figure 22-12. Class Mapping: Summary
The previously-defined class maps are displayed.
2 To add a class map, click Add.
A new class map is added by selecting one or two ACLs and assigning them
a class map name. If a class map has two ACLs, specify that a frame must
match both ACLs, or that it must match either one or both of the ACLs
selected.
3 Enter the parameters.
– Class Map Name — Enter the name of a new class map.684 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Match ACL Type — Enter the criteria that a packet must match in
order to belong to the flow defined by the class map. The possible
options are:
• IP — A packet must match either of the IP-based ACLs in the
class map.
• MAC — A packet must match the MAC-based ACL in the class
map.
• IP and MAC — A packet must match the IP-based ACL and the
MAC-based ACL in the class map (match-all).
• IP or MAC — A packet must match either the IP-based ACL or
the MAC-based ACL in the class map (match-any).
– IPACL — Select the IPv4-based ACL or the IPv6-based ACL for the
class map.
– MAC ACL — Select the MAC-based ACL for the class map.
– Preferred ACL — Select whether packets are first matched to an
IP-based ACL or a MAC-based ACL.
Defining Class Mapping Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Class Mapping pages.
Table 22-13. Class Mapping CLI Commands
CLI Command Description
class class-map-name [accessgroup acl-name]
no class class-map-name
Defines a traffic classification and
enters the Policy-map Class
Configuration mode.
Use the no form of this command to
detach a class map from the policy
map.
class-map class-map-name
[match-all|match-any]
no class-map class-map-name
Creates or modifies a class map and
enters the Class-map Configuration
mode.
Use the no form of this command to
delete a class map.Dell PowerConnect 55xx Systems User Guide 685
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
QoS Policers
This section describes QoS policers.
It contains the following topics:
• QoS Policers Overview
• Aggregate Policers
• Single Policers
match access-group acl-name
no match access-group acl-name
Defines the match criteria for
classifying traffic.
Use the no form of this command to
delete the match criteria.
show class-map [class-map-name] Displays information about the class
map.
console(config)# qos advanced
console(config)# class-map class1 match-all
console(config-cmap)# match access-group enterprise
console(config-cmap)# do show class-map class1
Class Map matchAll class1
Match access-group enterprise
Table 22-13. Class Mapping CLI Commands (Continued)
CLI Command Description686 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QoS Policers Overview
The rate of traffic that matches a pre-defined set of rules can be measured,
and limits, such as limiting the rate of file-transfer traffic that is allowed on a
port, can be enforced.
This is done by using the ACLs in the class map(s) to match the desired
pattern of traffic, and by using a policer to apply QoS on the matching traffic.
A policer is configured with a QoS specification. There are two kinds of
policers:
• Single Policer — A single policer applies the QoS to a single class map,
and to a single flow, based on the policer's QoS specification. When a class
map, using a single policer, is bound to multiple ports, each port has its
own instance of the single policer; each applying the QoS on the class map
(flow) at ports that are otherwise independent of each other. A single
policer is created in the Policy Table and Policy Class Maps pages.
• Aggregate Policer — An aggregate policer applies QoS to one or more class
maps, and to one or more flows. An aggregation policer can support class
maps from various policies. An aggregate policer applies QoS to all its
flow(s) in aggregation, regardless of policies and ports. An aggregate policer
is created in the Aggregate Policer pages.
An aggregate policer is defined if the policer is to be shared with more than
one class.
Each policer is defined with its own QoS specification, and is composed of a
combination of the following parameters:
• Committed Information Rate (CIR) — A maximum allowed rate of
traffic, measured in Kbps.
• Committed Burst Size (CBS) — An amount of traffic, measured in bytes,
which is allowed to pass as a temporary burst, even if it is above the
defined maximum rate.
• Exceed Action — An action to be applied to frames that are over the limits
(called out-of-profile traffic). These frames can be forwarded as is,
dropped, or forwarded, after rewriting their DSCP value with a value that
marks them as lower-priority frames for all subsequent handling within the
device.
A policer is assigned to a class map when a class map is added to a policy.Dell PowerConnect 55xx Systems User Guide 687
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Aggregate Policers
To define an aggregate policer:
1 Click Quality of Service > QoS Advanced Mode > Aggregate Policer to
display the Aggregate Policer: Summary page.
Figure 22-13. Aggregate Policer: Summary
The existing aggregate policers are displayed.
2 To add an aggregate policer, click Add, and enter the fields.
– Aggregate Policer Name — Enter the name of the Aggregate Policer.
– Committed Information Rate (CIR) — Enter the maximum
bandwidth allowed in bits per second. See the description of this field
in "Bandwidth" on page 664.
– Committed Burst Size (CBS) — Enter the maximum burst size
(even if it goes beyond the CIR) in bytes. See the description of this in
the "Bandwidth" on page 664.688 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Exceed Action — Select the action to be performed on incoming
packets that exceed the CIR. The possible options are:
• None — No action is performed on packets exceeding the defined
CIR value.
• Drop — Packets exceeding the defined CIR value are dropped.
• Remark DSCP — The DSCP values of packets exceeding the
defined CIR value are rewritten to a value entered in the DSCP
Mapping pages.
Defining Aggregate Policers Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Aggregate Policer pages.
The following is an example of the CLI commands:
Table 22-14. Aggregate Policer CLI Commands
CLI Command Description
qos aggregate-policer
aggregate-policer-name
committed-rate-kbps excessburst-byte[exceed-action
{drop|policed-dscp-transmit}]
no qos aggregate-policer
aggregate-policer-name
Defines the policer parameters that can
be applied to multiple traffic classes
within the same policy map.
Use the no form of this command to
remove an existing aggregate policer.
console(config)# qos aggregate-policer policer1 124000
9600 exceed-action dropDell PowerConnect 55xx Systems User Guide 689
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Single Policers
Defining Aggregate Policers Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Aggregate Policer pages.
The following is an example of the CLI commands:
Single policers are created by:
1 Create a policy in the Police Table pages
2 Configure the policy in the Policy Class Maps pages. Here the policy class
can be designated as containing a single policer, or it can be designated as
containing Aggregate policers.
Policy Table
A policy can consist of one of the following:
• One or more class maps of ACLs that define the traffic flows in the policy.
• One or more aggregate policers that apply the QoS to the traffic flows in
the policy.
Table 22-15. Aggregate Policer CLI Commands
CLI Command Description
qos aggregate-policer
aggregate-policer-name
committed-rate-kbps excessburst-byte[exceed-action
{drop|policed-dscp-transmit}]
no qos aggregate-policer
aggregate-policer-name
Defines the policer parameters that can
be applied to multiple traffic classes
within the same policy map.
Use the no form of this command to
remove an existing aggregate policer.
console(config)# qos aggregate-policer policer1 124000
9600 exceed-action drop690 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Only those policies that are bound to an interface are active (see the Policy
Binding pages).
After a policy has been added, class maps can be added in the Policy Table
pages.
To create a QoS policy:
1 Click Quality of Service > QoS Advanced Mode > Policy Table to
display the Policy Table: Summary page.
Figure 22-14. Policy Table: Summary
The previously-defined policies are displayed.
2 To create a policy, click Add.
3 Enter the name of the new policy in the Policy Name field.
4 Add class maps to the new policy in the Policy Class Maps page.Dell PowerConnect 55xx Systems User Guide 691
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Policies Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Policy Table page.
The following is an example of the CLI commands:
Table 22-16. Policy Table CLI Commands
CLI Command Description
policy-map policy-map-name
no policy-map policy-mapname
Creates a policy map and enters the Policymap Configuration mode.
Use the no form of this command to
delete a policy map.
console(config)# policy-map policy1692 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Policy Class Maps
One or more class maps can be added to a policy. A class map defines the type
of packets that are considered to belong to the same traffic flow.
To add a class map to a policy:
1 Click Quality of Service > QoS Advanced Mode > Policy Class Maps to
display the Policy Class Maps: Summary page.
Figure 22-15. Policy Class Maps: Summary
2 Select a policy in the Policy Name field. The class maps in that policy are
displayed.
3 To add a class map, click Add.
4 Enter the parameters.
– Policy Name — Select the policy to which the class map is being
added.Dell PowerConnect 55xx Systems User Guide 693
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Class Map Name — Select an existing class map to be associated with
the policy. Class maps are created in the Class Mapping pages.
– Action Type — Select the action regarding the ingress CoS and/or
DSCP value of all the matching packets.
• None — Ignore the ingress CoS and/or DSCP value. The
matching packets are sent as best effort.
• Trust CoS, DSCP — If this option is selected, the switch will
trust the CoS or DSCP value of the matching packet. If a packet
is an IP packet, the switch will put the packet in the egress queue,
based on its DSCP value and the DSCP to Queue mapping.
Otherwise, the egress queue of the packet is based on the packet's
CoS value and the CoS to Queue mapping.
• Set — See the description of this field below.
– Set — If this option is selected, enter a New Value, which determines
the egress queue of the matching packets:
• DSCP — If DSCP is selected, the new DSCP value and the
DSCP to Queue mapping determines the egress queue of the
matching packets.
• Queue — If Queue is selected, the new value is the egress queue
number for all matching packets.
• CoS — If CoS is selected, the CoS priority value and the CoS to
Queue mapping determines the egress queue of the matching
packets.
– Police Type — Available in Layer 2 Mode only. Select the policer type
for the policy. The possible options are:
• None — No policy is used.
• Single — The policer for the policy is a single policer.
• Aggregate — The policer for the policy is an aggregate policer.
– Aggregate Policer — Available in Layer 2 Mode only. If Police Type is
Aggregate, select a previously-defined aggregate policer.
If Police Type is Single, enter the following QoS parameters:
– Ingress Committed Information Rate (CIR) (Range: 100 - 1000000)
— Enter the CIR in Kbps. See its description in the Bandwidth pages.694 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Ingress Committed Burst Size (CBS) (Range: 3000 - 16769020) —
Enter the CBS in bytes. See its description in the Bandwidth pages.
– Exceed Action — Select the action assigned to incoming packets
exceeding the CIR. The possible options are:
• None — No action.
• Drop — Packets exceeding the defined CIR value are dropped.
• Out-of-Profile DSCP — Packets, exceeding the defined CIR, are
forwarded with a new DSCP, derived from the DSCP Mapping
pages.
Defining Policy Class Maps Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Policy Class Maps pages.
Table 22-17. Policy Class Maps CLI Commands
CLI Command Description
class class-map-name [accessgroup acl-name]
no class class-map-name
Defines a traffic classification and
enters the Policy-map Class
Configuration mode.
Use the no form of this command to
detach a class map from the policy
map.
trust [cos-dscp]
no trust
Configures the trust state, which
selects the value that QoS uses as the
source of the internal DSCP value.
Use the no form of this command to
return to the default trust state.
set {dscp new-dscp|queue queueid|cos new-cos}
no set
Sets new values in the IP packet.
Use the no form of this command to
return to the default values.
police committed-rate-kbps
committed-burst-byte [exceedaction {drop|policed-dscptransmit}]
no police
Defines the policer for classified traffic.
Use the no form of this command to
remove a policer.Dell PowerConnect 55xx Systems User Guide 695
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
qos aggregate-policer
aggregate-policer-name
committed-rate-kbps excessburst-byte [exceed-action
{drop|policed-dscp-transmit}]
no qos aggregate-policer
aggregate-policer-name
Defines the policer parameters that
can be applied to multiple traffic
classes.
Use the no form of this command to
remove an existing aggregate policer.
show policy-map [policy-mapname]
Displays all policy maps or a specific
policy map.
console(config)# policy-map policy1
console(config-pmap)# class class1 access-group enterprise
console(config-pmap)# trust cos-dscp
console(config-pmap)# set dscp 56
console(config-pmap)# class class1
console(config-pmap-c)# police 124000 9600 exceed-action
drop
console(config)# qos aggregate-policer policer1 124000
9600 exceed-action drop
Table 22-17. Policy Class Maps CLI Commands (Continued)
CLI Command Description696 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Policy Binding
After policies are created, they must be bound to interfaces (ports or
LAGs).When a policy is bound to a specific interface, it becomes active on it
(subject to time range restrictions). Only one policy can be active on a single
interface, but a single policy can be bound to more than one interface.
When a policy is bound to an interface, it filters and applies QoS to ingress
traffic that belongs to the flows defined in the policy. The policy does not
apply to traffic egress to the same port.
To edit a policy, it must first be removed (unbound) from all those ports to
which it is bound.
To define policy binding:
1 Click Quality of Service > QoS Advanced Mode > Policy Binding to
display the Policy Binding: Summary page.
Figure 22-16. Policy Binding: SummaryDell PowerConnect 55xx Systems User Guide 697
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Previously-defined policy bindings are displayed.
2 To bind a policy to an interface, click Add.
3 Select the interface assigned to the policy.
4 Select the Policy Name to be activated on the interface.
Defining Policy Binding Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Policy Binding pages.
The following is an example of the CLI commands:
Table 22-18. Policy Binding CLI Commands
CLI Command Description
service-policy input
policy-map-name
no service-policy
input
Applies a policy map to the input of a particular
interface.
Use the no form of this command to detach a
policy map from an interface.
console(config-if)# service-policy input policy1698 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QoS Statistics
This section describes how to view and manage QoS statistics.
It contains the following topics:
• Policer Statistics
• Aggregated Policer
• Queues StatisticsDell PowerConnect 55xx Systems User Guide 699
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Policer Statistics
A Single Policer is bound to a class map from a single policy. An Aggregate
Policer is bound to one or more class maps from one or more policies.
Use the Policer Statistics pages to view the number of in-profile and out-ofprofile packets received from an interface that meet the conditions defined in
the class map of a policy.
To view policer statistics:
1 Click Quality of Service QoS Statistics Policer Statistics to display the
Policer Statistics: Summary page.
Figure 22-17. Policer Statistics: Summary
The following statistics for the previously-defined counters are displayed:
– Interface — Statistics are displayed for this interface.
– Policy— Statistics are displayed for this policy.700 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Class Map — Statistics are displayed for this class map.
– In-Profile Bytes — Number of in-profile bytes received.
– Out-of-Profile Bytes — Number of out-of-profile bytes received.
2 Click Add to add a new counter that applies to another policy-class map.
3 Enter the fields:
– Interface — Select the interface for which the counter is defined.
– Policy - Class Map Name — Select a policy class map pair.
Defining Policer Statistics Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Policer Statistics pages.
The following is an example of the CLI commands:
Table 22-19. Policer Statistics CLI Commands
CLI Command Description
qos statistics policer policymap-name class-map-name
no qos statistics policer
policy-map-name class-map-name
Enables counting in-profile and out-ofprofile bytes vis-a-vis a policer.
Use the no form of this command to
disable counting.
clear qos statistics Clears the statistics
show qos statistics Displays the statistics
console(config-if)# qos statistics policer policy1 class1 Dell PowerConnect 55xx Systems User Guide 701
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Aggregated Policer
To view aggregated policer statistics:
1 Click Quality of Service QoS Statistics Aggregate Policer to display
the Aggregate Policer: Summary page.
Figure 22-18. Aggregate Policer: Summary
The following statistics for the previously-defined counters are displayed:
– Aggregate Policer Name — Policer on which statistics are based.
– In-Profile Bytes — Number of in-profile packets that were received.
– Out-of-Profile Bytes — Number of out-of-profile packets that were
received.
2 To add a new counter that applies to another aggregate policer, click Add. 702 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 Select an aggregate policer in the Aggregate Policer Name field.
Defining Aggregate Policer Statistics Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Aggregate Policer Statistics pages.
The following is an example of the CLI commands:
Queues Statistics
Queue statistics include statistics of forwarded and dropped packets, based
on interface, queue, and drop precedence. Lowest drop precedence has the
lowest probability of being dropped.
Table 22-20. Aggregate Policer Statistics CLI Commands
CLI Command Description
qos statistics aggregate-policer
aggregate-policer-name
no qos statistics aggregatepolicer aggregate-policer-name
Enables counting in-profile and
out-of-profile bytes vis-a-vis an
aggregate policer.
Use the no form of this command
to disable counting.
clear qos statistics Clears the statistics
show qos statistics Displays the statistics
console (config)# qos statistics aggregate-policer policer1 Dell PowerConnect 55xx Systems User Guide 703
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To view Queue Statistics:
1 Click Quality of Service QoS Statistics Queues Statistics to display
the Queues Statistics: Summary.
Figure 22-19. Queues Statistics: Summary
The statistics for previously-defined counters are displayed.
– Counter Set —Number of counter.
– Port —Number of port.
– Queue —Number of queue.
– Total Packets —Number of packets forwarded or tail dropped.
– Tail Drop Packets —Percentage of packets that were tail dropped.704 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 To add a new counter, click Add, and enter the fields:
– Counter Set—Select the counter set. The possible options are:
• Set 1 — Displays the statistics that contains all interfaces and
queues with a high DP (Drop Precedence).
• Set 2 — Displays the statistics that contains all interfaces and
queues with a low DP.
– Interface — Select the unit/interface for which Queue statistics are
displayed.
– Queue — Select the queue on which packets were forwarded or tail
dropped.
Defining QoS Statistics Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the QoS Statistics pages.
The following is an example of the CLI commands:
Table 22-21. QoS Statistics CLI Commands
CLI Command Description
qos statistics queues set-number
{queue|all} {dp|all}
{[gigabitethernet|tengigabitethe
rnet]port-number|all}
no qos statistics queues setnumber
Enables QoS statistics for output
queues.
Use the no form of this command to
disable QoS statistics for output
queues.
clear qos statistics Clears the statistics
show qos statistics Displays the statistics
console(config)# qos statistics queues 1 all all allDell PowerConnect 55xx Systems User Guide 705
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Glossary
Figure 23-20. This glossary contains key technical words of interest.
A
Access Mode
Specifies the method by which user access is granted to the system.
Access Profiles
Allows network managers to define profiles and rules for accessing the switch
module. Access to management functions can be limited to user groups,
which are defined by the following criteria:
• Ingress interfaces
• Source IP address or Source IP subnets
ACL
Access Control List. Allow network managers to define classification actions
and rules for specific ingress ports.
Aggregated VLAN
Groups several VLANs into a single aggregated VLAN. Aggregating VLANs
enables routers to respond to ARP requests for nodes located on different subVLANs belonging to the same Super VLAN. Routers respond with their MAC
address.
ARP
Address Resolution Protocol. A protocol that converts IP addresses into
physical addresses.
ASIC
Application Specific Integrated Circuit. A custom chip designed for a specific
application.
Asset Tag
Specifies the user-defined switch module reference.
A BCDE F GHI L MNOP Q
RSTUVW706 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Authentication Profiles
Sets of rules which that enables login to and authentication of users and
applications.
Auto-negotiation
Allows 10/100 Mpbs or 10/100/1000 Mbps Ethernet ports to establish for the
following features:
• Duplex/Half Duplex mode
• Flow Control
• Speed
B
Back Pressure
A mechanism used with Half Duplex mode that enables a port not to receive
a message.
Backplane
The main BUS that carries information in the switch module.
Backup Configuration Files
Contains a backup copy of the switch module configuration. The Backup file
changes when the Running Configuration file or the Startup Configuration
file is copied to the Backup file.
Bandwidth
Bandwidth specifies the amount of data that can be transmitted in a fixed
amount of time. For digital switch modules, bandwidth is defined in Bits per
Second (bps) or Bytes per Second.
Bandwidth Assignments
The amount of bandwidth assigned to a specific application, user, or
interface.
Baud
The number of signaling elements transmitted each second.
Best Effort
Traffic is assigned to the lowest priority queue, and packet delivery is not
guaranteed.Dell PowerConnect 55xx Systems User Guide 707
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Boot Version
The boot version.
BootP
Bootstrap Protocol. Enables a workstation to discover its IP address, an IP
address of a BootP server on a network, or a configuration file loaded into the
boot of a switch module.
BPDU
Bridge Protocol Data Unit. Provide bridging information in a message format.
BPDUs are sent across switch module information with in Spanning Tree
configuration. BPDU packets contain information on ports, addresses,
priorities, and forwarding costs.
Bridge
A device that connect two networks. Bridges are hardware specific, however
they are protocol independent. Bridges operate at Layer 1 and Layer 2 levels.
Broadcast Domain
device sets that receive Broadcast frames originating from any device within a
designated set. Routers bind Broadcast domains, because routers do not
forward Broadcast frames.
Broadcasting
A method of transmitting packets to all ports on a network.
Broadcast Storm
An excessive amount of Broadcast messages simultaneously transmitted
across a network by a single port. Forwarded message responses are heaped
onto the network, overloading network resources or causing the network to
time out.
For more information about Broadcast storms, see "LACP Parameters" on
page 511.
C
CDB
Configuration Data Base. A file containing a device’s configuration
information.708 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Class of Service
Class of Service (CoS). Class of Service is the 802.1p priority scheme. CoS
provides a method for tagging packets with priority information. A CoS value
between 0-7 is added to the Layer II header of packets, where zero is the
lowest priority and seven is the highest.
A overlapping transmission of two or more packets that collide. The data
transmitted cannot be used, and the session is restarted.
CLI
Command Line Interface. A set of line commands used to configure the
system. For more information on using the CLI, see Using the CLI.
Communities
Specifies a group of users which retains the same system access rights.
CPU
Central Processing Unit. The part of a computer that processes information.
CPUs are composed of a control unit and an ALU.
D
DHCP Client
A device using DHCP to obtain configuration parameters, such as a network
address.
DHCP Snooping
DHCP Snooping expands network security by providing firewall security
between untrusted interfaces and DHCP servers.
DSCP
DiffServe Code Point (DSCP). DSCP provides a method of tagging IP
packets with QoS priority information.
Domain
A group of computers and devices on a network that are grouped with
common rules and procedures.
Duplex Mode
Permits simultaneous transmissions and reception of data. There are two
different types of duplex mode:Dell PowerConnect 55xx Systems User Guide 709
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Full Duplex Mode — Permits for bisynchronous communication, for
example, a telephone. Two parties can transmit information at the same
time.
• Half Duplex Mode — Permits asynchronous communication, for
example, a walkie-talkie. Only one party can transmit information at a
time.
Dynamic VLAN Assignment (DVA)
• Allows automatic assignment of users to VLANs during the RADIUS
server authentication. When a user is authenticated by the RADIUS
server, the user is automatically joined to the VLAN configured on the
RADIUS server.
E
Egress Ports
Ports from which network traffic is transmitted.
End System
An end user device on a network.
Ethernet
Ethernet is standardized as per IEEE 802.3. Ethernet is the most common
implemented LAN standard. Supports data transfer rates of Mpbs, where 10,
100 or 1000 Mbps is supported.
EWS
Embedded Web Server. Provides device management via a standard web
browser. Embedded Web Servers are used in addition to or in place of a CLI
or NMS.
F
FFT
Fast Forward Table. Provides information about forwarding routes. If a packet
arrives to a device with a known route, the packet is forwarded via a route
listed in the FFT. If there is not a known route, the CPU forwards the packet
and updates the FFT.710 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
FIFO
First In First Out. A queuing process where the first packet in the queue is the
first packet out of the queue.
Flapping
Flapping occurs when an interfaces state is constantly changing. For example,
an STP port constantly changes from listening to learning to forwarding. This
may cause traffic loss.
Flow Control
Enables lower speed devices to communicate with higher speed devices, that
is, that the higher speed device refrains from sending packets.
Fragment
Ethernet packets smaller than 576 bits.
Frame
Packets containing the header and trailer information required by the physical
medium.
G
GARP
General Attributes Registration Protocol. Registers client stations into a
Multicast domain.
Gigabit Ethernet
Gigabit Ethernet transmits at 1000 Mbps, and is compatible with existing
10/100 Mbps Ethernet standards.
GVRP
GARP VLAN Registration Protocol. Registers client stations into a VLANs.
H
HOL
Head of Line. Packets are queued. Packets at the head of the queue are
forwarded before packets at the end of the line.Dell PowerConnect 55xx Systems User Guide 711
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Host
A computer that acts as a source of information or services to other
computers.
HTTP
HyperText Transport Protocol. Transmits HTML documents between servers
and clients on the internet.
I
IC
Integrated Circuit. Integrated Circuits are small electronic devices composed
from semiconductor material.
ICMP
Internet Control Message Protocol. Allows gateway or destination host to
communicate with a source host, for example, to report a processing error.
IEEE
Institute of Electrical and Electronics Engineers. An Engineering
organization that develops communications and networking standards.
IEEE 802.1d
Used in the Spanning Tree Protocol, IEEE 802.1d supports MAC bridging to
avoid network loops.
IEEE 802.1p
Prioritizes network traffic at the data-link/MAC sublayer.
IEEE 802.1Q
Defines the operation of VLAN Bridges that permit the definition, operation,
and administration of VLANs within Bridged LAN infrastructures.
IGMP Snooping
IGMP Snooping examines IGMP frame contents, when they are forwarded by
the device from work stations to an upstream Multicast router. From the
frame, the device identifies work stations configured for Multicast sessions,
and which Multicast routers are sending Multicast frames.712 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Image File
System images are saved in two Flash sectors called images (Image 1 and
Image 2). The active image stores the active copy; while the other image
stores a second copy.
Ingress Port
Ports on which network traffic is received.
IP
Internet Protocol. Specifies the format of packets and there addressing
method. IP addresses packets and forwards the packets to the correct port.
IP Address
Internet Protocol Address. A unique address assigned to a network device
with two or more interconnected LANs or WANs.
IP Version 6 (IPv6)
A version of IP addressing with longer addresses than the traditional IPv4.
IPv6 addresses are 128 bits long, whereas IPv4 addresses are 32 bits; allowing a
much larger address space.
ISATAP
Intra-Site Automatic Tunnel Addressing Protocol .
ISATAP is an automatic overlay tunneling mechanism that uses the
underlying IPv4 network as a non-Broadcast/multicast access link layer for
IPv6. ISATAP is designed for transporting IPv6 packets within a site where a
native IPv6 infrastructure is not yet available.
L
LAG
Link Aggregated Group. Aggregates ports or VLANs into a single virtual port
or VLAN.
For more information on LAGs, see Defining LAG Membership.
LAN
Local Area Networks. A network contained within a single room, building,
campus or other limited geographical area.Dell PowerConnect 55xx Systems User Guide 713
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Layer 2
Data Link Layer or MAC Layer. Contains the physical address of a client or
server station. Layer 2 processing is faster than Layer 3 processing because
there is less information to process.
Layer 3
Establishes a connections and ensures that all data arrives to their
destination. Packets inspected at the Layer 3 level are analyzed and
forwarding decisions, based on their applications.
LLDP-MED
Link Layer Discovery Protocol - Media Endpoint Discovery. LLDP allows
network managers to troubleshoot and enhance network management by
discovering and maintaining network topologies over multi-vendor
environments. MED increases network flexibility by allowing different IP
systems to co-exist on a single network LLDP.
Load Balancing
Enables the even distribution of data or processing packets across available
network resources. For example, load balancing may distribute the incoming
packets evenly to all servers, or redirect the packets to the next available
server.
M
MAC Address
Media Access Control Address. The MAC Address is a hardware specific
address that identifies each network node.
MAC Address Learning
MAC Address Learning characterizes a learning bridge, in which the packet’s
source MAC address is recorded. Packets destined for that address are
forwarded only to the bridge interface on which that address is located.
Packets addressed to unknown addresses are forwarded to every bridge
interface. MAC Address Learning minimizes traffic on the attached LANs.
MAC Layer
A sub-layer of the Data Link Control (DTL) layer.714 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Mask
A filter that includes or excludes certain values, for example parts of an IP
address.
For example, Unit 2 is inserted in the first minute of a ten-minute cycle, and
Unit 1 is inserted in fifth minute of the same cycle, the units are considered
the same age.
MD5
Message Digest 5. An algorithm that produces a 128-bit hash. MD5 is a
variation of MD4, and increases MD4 security. MD5 verifies the integrity of
the communication, authenticates the origin of the communication.
MDI
Media Dependent Interface. A cable used for end stations.
MDIX
Media Dependent Interface with Crossover (MDIX). A cable used for hubs
and switches.
MIB
Management Information Base. MIBs contain information describing specific
aspects of network components.
Multicast
Transmits copies of a single packet to multiple ports.
N
NA
Neighbor Advertisement.
ND
Neighbor Discovery.
NS
Neighbor Solicitation.
NMS
Network Management System. An interface that provides a method of
managing a system.Dell PowerConnect 55xx Systems User Guide 715
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Node
A network connection endpoint or a common junction for multiple network
lines. Nodes include:
• Processors
• Controllers
• Workstations
O
OID
Organizationally Unique Identifiers. Identifiers associated with a Voice
VLAN.
OUI
Object Identifier. Used by SNMP to identify managed objects. In the SNMP
Manager/Agent network management paradigm, each managed object must
have an OID to identify it.
P
Packets
Blocks of information for transmission in packet switched systems.
PDU
Protocol Data Unit. A data unit specified in a layer protocol consisting of
protocol control information and layer user data.
PING
Packet Internet Groper. Verifies if a specific IP address is available. A packet is
sent to another IP address and waits for a reply.
Port
Physical ports provide connecting components that allow microprocessors to
communicate with peripheral equipment.
Port Mirroring
Monitors and mirrors network traffic by forwarding copies of incoming and
outgoing packets from one port to a monitoring port.
For more information on port mirroring, see Defining Port Mirroring Sessions.716 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Protocol
A set of rules that governs how devices exchange information across networks.
PVE
Protocol VLAN Edge. A port can be defined as a Private VLAN Edge (PVE)
port of an uplink port, so that it will be isolated from other ports within the
same VLAN.
Q
QoS
Quality of Service. QoS allows network managers to decide how and what
network traffic is forwarded according to priorities, application types, and
source and destination addresses.
Query
Extracts information from a database and presents the information for use.
R
RA
RADIUS Advertisement.
RD
RADIUS Discovery.
RS
Router Solicitation.
RADIUS
Remote Authentication Dial-In User Service. A method for authenticating
system users, and tracking connection time.
RMON
Remote Monitoring. Provides network information to be collected from a
single workstation.
RouterDell PowerConnect 55xx Systems User Guide 717
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
A device that connects to separate networks. Routers forward packets
between two or more networks. Routers operate at a Layer 3 level.
RSTP
Rapid Spanning Tree Protocol. Detects and uses network topologies that
allow a faster convergence of the spanning tree, without creating forwarding
loops.
Running Configuration File
Contains all startup configuration file commands, as well as all commands
entered during the current session. After the switch module is powered down
or rebooted, all commands stored in the Running Configuration file are lost.
S
Segmentation
Divides LANs into separate LAN segments for bridging. Segmentation
eliminates LAN bandwidth limitations.
Server
A central computer that provides services to other computers on a network.
Services may include file storage and access to applications.
SNMP
Simple Network Management Protocol. Manages LANs. SNMP based
software communicates with network devices with embedded SNMP agents.
SNMP agents gather network activity and device status information, and send
the information back to a workstation.
SNTP
Simple Network Time Protocol. SNTP assures accurate network switch clock
time synchronization up to the millisecond.
SoC
System on a Chip. An ASIC that contains an entire system. For example, a
telecom SoC application can contain a microprocessor, digital signal
processor, RAM, and ROM.718 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Spanning Tree Protocol
Prevents loops in network traffic. The Spanning Tree Protocol (STP) provides
tree topography for any arrangement of bridges. STP provides one path
between end stations on a network, eliminating loops.
SSH
Secure Shell. Permits logging to another computer over a network, execute
commands on a remote machine, and move files from one machine to
another. Secure Shell provides strong authentication and secure
communications methods over insecure channels.
Startup Configuration
Retains the exact switch module configuration when the switch module is
powered down or rebooted.
Subnet
Sub-network. Subnets are portions of a network that share a common address
component. On TCP/IP networks, devices that share a prefix are part of the
same subnet. For example, all devices with a prefix of 157.100.100.100 are
part of the same subnet.
Subnet Mask
Used to mask all or part of an IP address used in a subnet address.
Switch
Filters and forwards packets between LAN segments. Switches support any
packet protocol type.
T
TCP/IP
Transmissions Control Protocol. Enables two hosts to communicate and
exchange data streams. TCP guarantees packet delivery, and guarantees
packets are transmitted and received in the order their sent.
Telnet
Terminal Emulation Protocol. Enables system users to log in and use
resources on remote networks. Dell PowerConnect 55xx Systems User Guide 719
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
TFTP
Trivial File Transfer Protocol. Uses User Data Protocol (UDP) without
security features to transfer files.
Trap
A message sent by the SNMP that indicates that system event has occurred.
Trunking
Link Aggregation. Optimizes port usage by linking a group of ports together
to form a single trunk (aggregated groups).
U
UDP
User Data Protocol. Transmits packets but does not guarantee their delivery.
Unicast
A form of routing that transmits one packet to one user.
V
VLAN
Virtual Local Area Networks. Logical subgroups with a Local Area Network
(LAN) created via software rather than defining a hardware solution.
VoIP
Voice over IP.
W
WAN
Wide Area Networks. Networks that cover a large geographical area.
Wildcard Mask
Specifies which IP address bits are used, and which bits are ignored. A wild
switch module mask of 255.255.255.255 indicates that no bit is important. A
wildcard of 0.0.0.0 indicates that all the bits are important. 720
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Index
Numerics
24/48 G Ports 37
802.1ab (LLDP-MED) 28
802.1d 22
802.1Q 476, 482
A
AC unit 44
Acceptable Frame Type 471
Access Control Lists 31
Access mode 329
Access ports 469
Access Profile Rules (ACEs) 262
Access profiles 261, 272
Accessing the device through the
CLI 71
ACE, IPv4 110
ACL binding 123
ACL, IPv4 109
ACL, IPv6 118
ACLs 31, 103
Active users 275
Address pool 301
Address Resolution Protocol 249,
706
Address Tables 422
Administrator Buttons 91
Advanced QoS 25
Advanced Switch Configuration 67
Aggregate Policer 686, 701
Aggregated VLAN 706
Alarms 638
Anycast 178, 183
Apply&Save 91
ARP 249, 251, 706
ARP inspection 31
ARP, dynamic inspection 560
ARP, dynamic inspection list 564
ARP, dynamic inspection list
entries 566
ARP, global settings 562
ARP, trusted interfaces 570
ARP, VLAN settings 568
Asset 156
Assignment to hardware queues
651
Authentication methods 134
Authentication profiles 269721
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Auto update, configuration/image
file 338
Automatic aging for MAC
addresses 19
Auto-Negotiation 18
B
Back panel 39, 44
Back Pressure 17, 386
Bandwidth 664
Boot Image Download 85
Booting the Switch 60
BootP 24, 708
BootP and DHCP Clients 24
BPDU 438, 456, 708
BPDU Guard 23
BPDU Handling 438
Bridge Multicast Forward All 525
Bridge Multicast Groups 521
Bridge Protocol Data Unit 708
Broadcast 179, 183
Broadcast Storm Control 20
Buttons 38
C
Cables testing 256
CBC 315
Cipher Block-Chaining 315
Class Mapping 682
Class of Service 709
Classic lock 98
Classic STP 435
CLI 27, 68, 71, 261
CLI macro 31
Clock Source 181
Command Line Interface 27
Command Mode Overview 68
Configuration file 354
Configuration file download 352
Configuration using the Setup
Wizard 61
Configuration Work Flow 58
Configuring Login Banners 78
Configuring the Stack 61
Configuring the Switch 57
Connecting the Switch to the
Terminal 59
Console 269, 272
Console access 291
Copying files 361
CoS 709
CoS 802.1p support 24
CoS to Queue 660
Counter Summary 612
CPU Utilization 648722
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
D
Daylight Savings Times 170
Default domain names 245
Default Gateway, IPv6 226
Defining device information 156
Denied ACEs Counters 608
Device representation 89
Device structure 36
DHCP 572
DHCP client 24, 297
DHCP limitations 575
DHCP Relay 586
DHCP Relay, global settings 589
DHCP Relay, limitations 587
DHCP Relay, Option 82 Overview
587
DHCP server 32, 297, 299
DHCP server properties 298
DHCP server, retreiving an IP
address 72
DHCP Snooping 31, 573
DHCP, global parameters 575
DHCP, trusted interfaces 581
DHCP, VLAN settings 579
DiffServe Code Point 709
DNS 28, 242
Domain 709
Domain Name System 28, 242
Dot1x 29
Dot1x Authentication 132
Download, boot image 85
Download, system image 83
Download, TFTP 353
Download, USB/HTTP 351
Downloading software 80, 337
DSCP 709
DSCP Mapping 680
DSCP Rewrite 671
DST Times 170
Duplex mode 709
DVA 134, 710
Dynamic ACL
Assignment/Dynamic Policy
Assignment (DACL/DPA) 31
Dynamic Addresses 427
Dynamic addresses 428
Dynamic Policy/ACL Assignment
134
Dynamic VLAN Assignment 141
Dynamic VLAN Assignment
(DVA) 134, 710
E
E-911 541
EAP 29, 132
EAP Statistics 622723
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Egress ports 710
Egress Shaping Rates 664
Emergency Call Service 541
Enable 282
Enable passwords 281
End System 710
Erase FLASH File 81
Etherlike Statistics 616
Ethernet 710
Events 634
Events log 637
EWS 710
Excluded addresses 306
Excluding addresses 307
Extensible Authentication
Protocol 29, 132
F
Fans 160
Fast Forward Table 710
Fast link 23, 442, 447
FFT 710
FIFO 711
File information 365
Filtering 477, 483, 517
Filtering L2 Multicast Packets 517
Firmware download 352
First In First Out 711
Flapping 711
Flow Control 386, 711
Flow Control Support (IEEE
802.3X) 17
Flow Monitoring (sflow) 26
Forwarding L2 Multicast Packets
517
Fragment 711
Frame 711
Frame Flow 468
Front Panel 37
Full 802.1Q VLAN Tagging
Compliance 21
G
GARP 430, 433, 711
GARP timers 432
GARP VLAN Registration Protocol
21, 711
General Ports 470
General Switch Information 156
Generic Attributes Registration
Protocol 711
Giga Port LEDs 42
Gigabit Ethernet 711
Global Configuration Mode 69
Green Ethernet 17724
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Green Ethernet Configuration 390
Guest VLAN 22
GVRP 620, 711
GVRP parameters 490
GVRP statistics 619
GVRP Support 21
H
Hardware description 35
Hardware version 370
Hash 181
HDMI port LEDs 43
HDMI ports 37
Head of Line Blocking Prevention
17
Help 91
HMAC-SHA-96 326
HOL 17, 711
Host 712
Host name mapping 247
HTTP 261, 269, 286, 712
HTTP password, configuring 77
HTTPS 261, 264, 269, 286
HyperText Transport Protocol 712
I
IC 712
ICMP 712
Icons 91
Identifying a switch via LED 33
IEEE 712
IEEE 802.1d 712
IEEE 802.1p 712
IEEE 802.1Q 21, 712
IEEE 802.1s Multiple Spanning
Tree 23
IEEE 802.1w Rapid Spanning Tree
23
IGMP 518
IGMP Snooping 20, 527, 712
Image file 713
Image files, active 360
Information Buttons 91
Ingress port 713
Ingress Rate Limit 664
Interface Configuration Mode 70
Interface Statistics 614
IP 713
IP address from a BOOTP Server
73
IP Addressing 209
IP Version 6 (IPv6) Support 16
IPv4 Interfaces 210
IPv6 Default Gateway 226
IPv6 Interfaces 221725
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IPv6 Neighbors 235
IPv6 Routes Table 239
IPv6-based ACL 117
ISATAP 229
iSCSI 595
iSCSI Sessions 603, 605
iSCSI Targets 601
iSCSI, global parameters 598
iSCSI, limitations 596
iSCSI, optimization 32, 594
J
Jumbo Frames 388
L
LACP parameters 511
LAG configuration 409
LAG membership 514
LAG statistics 645
LAGs 24, 508, 525, 713
LAGs Settings 481
LAN 713
Layer 2 714
Layer 2 Features 20
Layer 2 Switching 517
Layer 3 714
LED Definitions 40
LEDs 38, 42
LEDs on Front Panel 38
Light Emitting Diodes 40
Limited dynamic lock 98
Line passwords 279
Link Aggregated Group 713
Link aggregation 24, 508, 510
Link Aggregation and LACP 24
Link Control Protocol (LCP)
packets 399, 451
Link Layer Discovery Protocol -
Media Endpoint Discovery 714
Link/Duplex/Activity LEDs 42
LLDP 540
LLDP MED Port Settings 552
LLDP Media Endpoint Discovery
541
LLDP Port Settings 546
LLDP properties 542
LLDP-MED 28, 541, 714
Load Balancing 714
Loading Software into Stack
Members 54
Local User Database 277
Location LED 373
Locked ports 29, 100, 105, 108,
110, 115, 118, 121, 124, 126,
130, 580, 582, 584726
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Log file in Flash 202
Logging Global Parameters 196
Logging Severity Level - Alert 196
Logging Severity Level - Critical
196
Logging Severity Level - Debug
196
Logging Severity Level -
Emergency 196
Logging Severity Level - Error 196
Logging Severity Level -
Informational 196
Logging Severity Level - Notice
196
Logging Severity Level - Warning
196
Login Banners 78
Login History 203
Logs 195
Loops 435
M
MAC Address Capacity Support 18
MAC address learning 714
MAC addresses 98, 714
MAC addresses, supported
features 18
MAC Layer 714
MAC Multicast Support 19
Mac-based ACE 106
Mac-based ACL 104
Management Access Lists 262
Management Access Methods 272
Management Information Base
314, 715
Management IP Address Conflict
Notification 26
Management methods 264
Management security 261
Managing configuration files on
the stack 54
Manual Time Setting 169
Mask 715
MD5 181, 715
MDI 406, 715
MDI/MDIX 18, 385
MDIX 406, 715
MED Network Policy 549
Media Endpoint Discovery 549
Message Digest 5 181, 715
MIB 314, 715
Monitoring users 146
MPS 44
MST Properties 456
MSTP 23, 455
MSTP Instance Settings 460
MSTP Interface Settings 462727
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Multicast 516, 525
Multicast TV VLAN 22
Multicast TV VLAN Mapping 537
Multicast TV VLAN Membership
535
Multiple STP (MSTP) 435
N
ND 715
Neighbor Advertisement 715
Neighbor Discovery. 715
Neighbor Solicitation 715
Neighbors 557
Neighbors, IPv6 235
Network Control Protocols 399,
451
Network Management System 715
Network pool 303
NMS 715
NS 715
O
Object ID 315
OID 315
Optical transciever diagnostics 258
Option 82 587
OUI 504
P
Packets 716
Password configuration 75
Password management 30, 286
Password recovery 82
Passwords 88, 282
Path Cost 438
PDU 716
PING 716
PoE 16, 162
Policer Statistics 699
Policers 685
Policy Binding 696
Policy Table 689
Port 716
Port Configuration 403
Port default settings 386
Port LEDs 40, 42
Port mirroring 20, 417, 716
Port modes 469
Port profile 31
Port representation 89
Port security 98
Port settings 475
Port-based Authentication 132
Port-based Authentication
(Dot1x) 29728
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port-based Virtual LANs (VLANs)
21
Ports 37, 89, 384, 645
Ports, statistics 643
Power over Ethernet 16
Power supplies 44
Print 91
Private VLAN 22, 494
Privileged EXEC Mode 68
Proprietary Protocol Filtering 32,
125
Protected Port Configuration 395
Protected ports 32, 394
Protected ports, restrictions 394
Protocol 717
Protocol Group 484, 485
Protocol Ports 488
Protocol VLAN Edge 717
PVE 717
PVID 475, 482
Q
QinQ 469
QoS 24, 656, 717
QoS Advanced mode 676
QoS Basic mode 670
QoS Modes 653
QoS Properties 655
QoS, Advanced Mode, Workflow
679
QoS, Aggregate Policer 686
QoS, assignment to hardware
queues 651
QoS, Bandwidth 664
QoS, Basic mode 669
QoS, Basic Mode, Workflow 669
QoS, Class Mapping 682
QoS, DSCP Mapping 680
QoS, DSCP Rewrite 671
QoS, DSCP to Queue 662
QoS, Mapping to Queue 659
QoS, Policer Statistics 699
QoS, Policers 684
QoS, Policy Binding 696
QoS, Policy Class Maps 692
QoS, Policy Table 689
QoS, Queues 656
QoS, Single Policer 686
QoS, Statistics 697
QoS, Traffic Classification 651
QoS, Trust Mode 674
Quality of Service 650, 653, 717
R
RA 717
RADIUS 271, 291, 717729
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
RADIUS Advertisement 717
RADIUS client 29
RADIUS discovery 717
RADIUS server 291
RAM Log 200
Rapid Spanning Tree 450
Rapid Spanning Tree Protocol 450,
718
Rapid STP 435, 452, 464
RD 717
Rebooting the Stack 54
Refresh 92
Registered Multicast Group 517
Remote Authentication Dial-In
User Service 29, 717
Remote Authorization Dial-In
User Service 291
Remote Log Server 206
Remote Monitoring 27, 717
Reset button 38
Retrieving an IP Address 72
RMON 625, 628, 629, 717
RMON Statistics 625, 626
Router Solicitation 717
Routes Table, IPv6 239
RS 717
RS-232 Console Port 37
RSTP 23, 450, 718
Rules 262
Running Configuration File 337,
718
S
Secure Shell 291
Secure Telnet (SSH) 261, 272
Security Features 29
Security Management 75
Segmentation 718
Selecting the Master and Master
Backup Units 51
Self-Learning MAC Addresses 19
Server 718
Set Terminal Baud-Rate 82
Setup Wizard 61
sFlow 375
sFlow interface 380
sFlow receiver 377
sFlow statistics 382
SFP 44
SFP LEDs 44
Simple Network Management
Protocol 718
Simple Network Time Protocol 28,
178
Single Policer 686
SMMP groups 322730
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNMP 261, 264, 286, 314, 718
SNMP access rights 315
SNMP communities 327
SNMP global parameters 316
SNMP logs 25
SNMP Model OIDs 316
SNMP notification filters 330
SNMP notification recipients 333
SNMP users 324
SNMP Versions 1, 2, and 3 26
SNMP views 319
SNTP 28, 178
SNTP Authentication 184
SNTP Global Settings 183
SNTP Servers 187
Software Download 83
Software version 370
Spanning Tree Protocol 22, 435,
719
SPF LEDs 40, 42
SSH 30, 264, 269, 286, 719
SSH password, configuring 77
SSL 29
Stack ID LED 44
Stack management 46, 367
Stack Menu 82
Stack Support 16
Stacking 46
Stacking failover topology 49
Stacking, adding a unit to the stack
50
Stacking, assigning unit IDs 50
Stacking, automatic assignment of
unit IDs 50
Starting the Application 88
Startup Configuration 337, 719
Startup file 337
Startup Menu 80
Static addresses 424, 425
Static hosts 308, 310
Statistics 606
Statistics, alarms 638
Statistics, Counter Summary 612
Statistics, CPU Utilization 648
Statistics, Denied ACEs Counters
608
Statistics, EAP 622
Statistics, Etherlike 616
Statistics, events control 634
Statistics, events log 637
Statistics, GVRP 619
Statistics, history control 629
Statistics, history table 631
Statistics, Interface Statistics 614
Statistics, LAGs 645
Statistics, ports 643731
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Statistics, QoS 698
Statistics, Utilization Summary
610
Storm control 414
STP 22, 444
STP BPDU Guard 23
STP mode 437
STP port settings 442
STP, bridge settings 438
STP, classic 437
STP, designated roots 439
STP, LAG settings 447
Subnet 719
Subnet Mask 719
Switch 719
Switching from the Master to the
Backup Master 53
SYSLOG 195
System Image Download 83
System LEDs 40
T
Table Views 607
TACACS+ 30, 271, 282
TCP Congestion Avoidance 25,
666
TCP/IP 719
TDR technology 256
Telnet 261, 264, 269, 272, 280, 286,
291, 719
Telnet Connection 71
Telnet password, configuring 76
Terminal Access Controller Access
Control System 282
Terminal Connection 72
TFTP 27, 720
Time Domain Reflectometry 256
Time range 127
Time range, absolute 128
Time range, recurring 129
Time synchronization 169
Traffic Classification 651
Traffic limitation methods 656
Traffic limitation, combination of
WRR and Strict Priority 657
Traffic limitation, Strict Priority
656
Traffic limitation, Weighted
Round Robin (WRR) 656
Trap 720
Tree view 88
Trivial File Transfer Protocol 720
Trunk Ports 469
Trunking 720
Tunnel, ISATAP 229732
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
U
UDP 720
UDP relay 253
Unauthenticated VLAN and Guest
VLANs 135
Understanding the interface 88
Unicast 178, 183
Unit ID 367
Unit identification 373
Unregistered Multicast Group 517
Uploading files 355
Uploading files, TFTP 357
Uploading files, USB/HTTP 356
USB File Transfer Protocol 27
USB port 38
User Data Protocol 720
User Security Model 314
Using Dell OpenManage Switch
Administrator 87
Using the CLI 68
USM 314
Utilization Summary 610
V
Ventilation System 40
Versions, hardware/software 370
Virtual Local Area Networks 720
VLAN 21, 466, 472, 473, 525, 720
VLAN frame flow 468
VLAN membership 472
VLAN settings, DHCP 579
VLAN Support 21
VLAN to MSTP Instance 458
VLAN, ARP settings 568
VLAN, LAG settings 481
VLAN, port settings 475
VLAN, private 494
VLAN, special cases 468
VLAN, voice 498
VLAN-aware MAC-based
Switching 19
Voice VLAN 21, 498
Voice VLAN OUI 504
VoIP 720
W
Warm standby 52
Web access 291
Web management system icons 91
Web-Based Management 26
Weighted Round Robin (WRR)
656733
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
X
XG Ports 37734
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLYDell PowerConnect 55xx Systems User Guide 735
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
25
Revision History
Rev Date Description
A7 Mar. 11, 2013 Made the following corrections:
• Added comment that GVRP is only operational on ports
in general mode.
A6 Sept. 3, 2012 Made the following corrections:
• Added Power Limit field in "Power over Ethernet" on
page 162
• Corrected number of ports that can be mirrored to 4
• Corrected number of OUIs from 128 to 16.
• Corrected parameters to show power inline command.
• Added description of when traps are generated in "Power
over Ethernet" on page 162.
A5 May 1, 2012 Added "Auto-Update/Configuration Feature" on page 338
A4 April 4, 2012 Made the following corrections:
• Put a the note (of the recommendation of using HDMI
cable version to 1.4 for stacking) more clearly.
• Fixed RDP description
A4 April 2, 2012 Following corrections made:
• Add description regarding the Egress ACL feature
• Enter comments regarding the PVLAN feature.
• Fixed RDP abbreviation to Reliable Data Protocol in
ACL section.
• Add the recommendation of using HDMI cable version
to 1.4 for stacking
A3 Jan 31, 2012 Corrected command in private VLAN CLI command.
A2 Sept 21, 2011 Entered comment that enabling iSCSI also enables flow
control on all interfaces.www.dell.com|support.dell.com
Printed in the U.S.A.
Dell PowerConnect
5500 Series
Getting Started Guide
Regulatory Models: PowerConnect 5524, 5524P, 5548, 5548P
ContaxGS.book Page 1 Friday, August 20, 2010 1:53 PMNotes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you
make better use of your system.
CAUTION: A CAUTION indicates potential damage to
hardware or loss of data if instructions are not followed.
WARNING: A WARNING indicates a potential for property
damage, personal injury, or death.
____________________
Information in this document is subject to change without notice.
© 2010 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written
permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell, the DELL logo, Inspiron, Dell Precision,
Dimension, OptiPlex, Latitude, PowerEdge, PowerVault, PowerApp, Dell
OpenManage and the YOURS IS HERE logo are trademarks of Dell Inc.; Intel,
Pentium, and Celeron are registered trademarks of Intel Corporation in the U.S.
and other countries; Microsoft, Windows, Windows Server, MS-DOS and
Windows Vista are either trademarks or registered trademarks of Microsoft
Corporation in the United States and/or other countries.
Other trademarks and trade names may be used in this document to refer to either
the entities claiming the marks and names or their products. Dell Inc. disclaims
any proprietary interest in trademarks and trade names other than its own.
Regulatory Models: PowerConnect 5524, 5524P, 5548, 5548P
September 2010 P/N JN2W1 A01
ContaxGS.book Page 2 Friday, August 20, 2010 1:53 PMContents 3
Contents
1 Installation . . . . . . . . . . . . . . . . . . . . . . . . 5
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . 5
Site Preparation . . . . . . . . . . . . . . . . . . . . . . 5
Unpacking . . . . . . . . . . . . . . . . . . . . . . . . . 6
Package Contents . . . . . . . . . . . . . . . . . . 6
Unpacking the Switch . . . . . . . . . . . . . . . . 6
Installing the Switch. . . . . . . . . . . . . . . . . . . . 7
Installing in a Rack . . . . . . . . . . . . . . . . . . 7
Installing on a Flat Surface . . . . . . . . . . . . . . 8
Connecting the Switch to Power Supplies . . . . . . . . 8
2 Stacking. . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . 9
Stacking Switches. . . . . . . . . . . . . . . . . . . . . 9
Unit ID Assignment . . . . . . . . . . . . . . . . . . . 11
Automatic Assignment . . . . . . . . . . . . . . . 11
Manual Assignment . . . . . . . . . . . . . . . . 12
ContaxGS.book Page 3 Friday, August 20, 2010 1:53 PM4 Contents
3 Configuring the Switch . . . . . . . . . . . . . 13
Configuration Work Flow . . . . . . . . . . . . . . . . 13
Connecting the Switch to the Terminal . . . . . . . . . 14
Booting the Switch. . . . . . . . . . . . . . . . . . . . 15
Configuring the Stack . . . . . . . . . . . . . . . . . . 16
Configuration Using the Setup Wizard . . . . . . . . . 16
ContaxGS.book Page 4 Friday, August 20, 2010 1:53 PMGetting Started Guide 5
Installation
Overview
This guide describes how to install and run the PowerConnect 5500 series
switches. For more information, see the Dell PowerConnect 5500 Series User
Guide, available on your Documentation CD, or check the Dell Support
website at support.dell.com/manuals for the latest updates on documentation
and software.
In this document, the word "switch" refers to either a single switch or a group
of stacked switches.
For a complete description of the PowerConnect 5500 series switch, see the
Dell PowerConnect 5500 Series User Guide, available on your Documentation
CD.
NOTE: Even though the graphics in this guide show the Dell PowerConnect 5524P
device, the instructions are the same for all models.
Site Preparation
PowerConnect 5500 series switches can be mounted in a standard 48.26-cm
(19-inch) equipment rack or placed on a tabletop. Before installing the unit,
verify that the chosen location for installation meets the following site
requirements:
• Power —
– The unit is installed near an easily accessible 100-240 VAC, 50-60 Hz
outlet.
– If a Redundant Power Supply (RPS) or a Modular Power Supply
(MPS) is being used, check that it is easily accessible.
• Clearance — There is adequate frontal clearance for operator access.
Allow clearance for cabling, power connections, and ventilation.
ContaxGS.book Page 5 Friday, August 20, 2010 1:53 PM6 Installation
• Cabling — The cabling is routed to avoid sources of electrical noise, such
as radio transmitters, broadcast amplifiers, power lines, and fluorescent
lighting fixtures.
• Ambient Requirements — The ambient unit operating temperature range
is 0 to 45ºC (32 to 113ºF) at a relative humidity of 10% to 90%, noncondensing.
Unpacking
Package Contents
While unpacking the switch, ensure that the following items are included:
• Switch
• AC power cable
• RS-232 cable with a male 8-pin RJ-45 connector
• Self-adhesive rubber pads
• Rack-mount kit for rack installation
• Documentation CD
Unpacking the Switch
NOTE: Before unpacking the switch, inspect the package and immediately report
any evidence of damage.
To unpack the switch:
1 Place the box on a clean flat surface.
2 Open the box or remove the box top.
3 Carefully remove the switch from the box and place it on a secure and
clean surface.
4 Remove all packing material.
5 Inspect the switch and accessories for damage. Report any damage
immediately to the dealer.
ContaxGS.book Page 6 Friday, August 20, 2010 1:53 PMInstallation 7
Installing the Switch
The PowerConnect 5500 Series switches can be:
• Installed on a rack
• Placed on a flat surface
Installing in a Rack
CAUTION: Disconnect all cables from the unit before mounting the switch in a
rack or cabinet.
CAUTION: When mounting multiple switches into a rack, mount the switches
from the bottom up.
To install the switch in a rack:
1 Place the supplied rack-mounting bracket on one side of the switch,
ensuring that the mounting holes on the switch line up to the mounting
holes on the rack-mounting bracket.
Figure 1-1 illustrates where to mount the brackets.
Figure 1-1. Bracket Installation for Rack Mounting
2 Insert the supplied screws into the rack-mounting holes and tighten with a
screwdriver.
ContaxGS.book Page 7 Friday, August 20, 2010 1:53 PM8 Installation
3 Repeat the process for the rack-mounting bracket on the other side of the
switch.
4 Insert the unit into the 48.26-cm (19-inch) rack, ensuring that the
rack-mounting holes on the switch line up to the mounting holes on the
rack.
5 Secure the unit to the rack with the rack screws (not provided). Fasten the
lower pair of screws before the upper pair of screws. Ensure that the
ventilation holes are not obstructed.
Installing on a Flat Surface
Install the switch on a flat surface if it is not installed on a rack. The surface
must be able to support the weight of the switch and the switch cables.
To install the switch on a flat surface:
1 Attach the self-adhesive rubber pads on each marked location on the
bottom of the chassis.
2 Set the switch on a flat surface, leaving 5.08 cm (2 inches) on each side
and 12.7 cm (5 inches) at the back.
3 Ensure that the switch has proper ventilation.
Connecting the Switch to Power Supplies
Each switch in the stack must be connected to an AC power supply.
The power connectors are positioned on the back panel. Connecting a
Redundant Power Supply (RPS) or Modular Power Supply (MPS) is optional,
but recommended. The RPS or MPS connector is on the back panel of the
switch. The RPS is used for non-PoE switches and MPS is used for PoE
switches.
Figure 1-2. Back-Panel Power Connector
RPS or MPS A/C Power Supply
ContaxGS.book Page 8 Friday, August 20, 2010 1:53 PMGetting Started Guide 9
Stacking
Overview
Each switch is a member in a stack, although the stack may consist of only a
single switch. Up to eight switches are supported per stack.
All stacks must have a Master unit, and may have a Master Backup unit. All
other switches are connected to the stack as members (slaves).
Stacking Switches
PowerConnect 5500 series switches use two HDMI 10G ports for stacking.
To connect the switches in the stack:
1 Insert one end of an HDMI cable into the left-hand HDMI port on the
switch at the top of the stack and the other end into the right-hand HDMI
port of the switch immediately below it.
2 Repeat this process until all switches are connected.
3 (Optional) Connect the left-hand HDMI port of the switch at the bottom
of the stack to the right-hand HDMI port of the switch at the top of the
stack. This step provides increased bandwidth and redundancy.
ContaxGS.book Page 9 Friday, August 20, 2010 1:53 PM10 Stacking
Figure 2-1 shows this process.
Figure 2-1. Stacking Cable Diagram
HDMI Ports
Front Panel
HDMI Ports
Front Panel
HDMI Ports
Front Panel
Front Panel
HDMI Ports
ContaxGS.book Page 10 Friday, August 20, 2010 1:53 PMStacking 11
Unit ID Assignment
Each switch in the stack has a unique unit ID that defines the unit’s position
and function in the stack.
Figure 2-2 describes the stacking LEDs on the front panel of the switch.
Figure 2-2. Stacking LEDs on Front Panel
The Unit ID of each switch can be either automatically assigned or manually
assigned, as described below.
Automatic Assignment
When you power-up the stack, each switch is assigned a unique Unit ID. This
is displayed on the front panel of the switch, as shown in Figure 2-2.
The switch that is assigned Unit ID 1 is the Master unit, by default. The
switch that is assigned Unit ID 2 is the Master Backup unit.
Unit ID Master
ContaxGS.book Page 11 Friday, August 20, 2010 1:53 PM12 Stacking
Manual Assignment
To assign unit IDs to the switches in the stack, do the following for each
switch in the stack:
1 Connect the switch to the terminal, as described in "Connecting the
Switch to the Terminal".
2 Turn on the switch to begin auto boot and press Return or Esc to abort and
enter the Start Up menu.
3 Select Stack menu to open the Stack Menu.
4 Select Set unit stack id. Enter either a Unit ID or 0. 0 indicates that the
unit ID will be assigned automatically.
NOTE: The entire stack should be installed, as shown in Figure 2-1, before powering
up the switches.
For more information on stacking, see the Dell PowerConnect 5500 Series User
Guide on the Documentation CD.
Startup Menu
[1]Download Software
[2]Erase Flash File
[3]Password Recovery Procedure
[4]Set Terminal Baud-Rate
[5]Stack menu
[6]Back
[1]Show unit stack id
[2]Set unit stack id
[3]Back
ContaxGS.book Page 12 Friday, August 20, 2010 1:53 PMGetting Started Guide 13
Configuring the Switch
This section describes the configuration that must be performed after the
switch is installed and connected to power supplies. Additional advanced
functions are described in the Dell PowerConnect 5500 Series User Guide on
the Documentation CD.
NOTE: Before proceeding further, read the release notes for this product. You can
download the release notes from the Dell Support website at support.dell.com.
NOTE: We recommend that you obtain the most recent revision of the user
documentation from the Dell Support website at support.dell.com.
Configuration Work Flow
To configure the switches:
1 For each switch in the stack:
a Connect it to a terminal, as described in the "Connecting the Switch
to the Terminal".
b Boot the switch, as described in the "Booting the Switch".
c Assign a unit ID to the switch, as described in "Unit ID Assignment".
2 Connect the units in the stack to each other, as described in "Configuring
the Stack".
3 Connect the Master unit to the terminal, reboot the unit and the Setup
Wizard is run automatically, as described in "Configuration Using the
Setup Wizard".
4 Respond to the Setup Wizard prompts.
5 Continue managing the switch, either through the console or Telnet, using
the CLI or the web GUI, as described in the Dell PowerConnect 5500 Series
User Guide.
ContaxGS.book Page 13 Friday, August 20, 2010 1:53 PM14 Configuring the Switch
Connecting the Switch to the Terminal
The switch is configured and monitored through a terminal desktop system
that runs terminal emulation software. The switch connects to the terminal
through the console port.
To connect the switch to a terminal:
1 Connect an RS-232 cable to a VT100-compatible terminal or the serial
connector of a desktop system running terminal emulation software.
2 Connect the RS-232 cable to the switch console port on the front panel of
the switch (see Figure 3-1) using an 8-pin RJ-45 male connector.
Figure 3-1. Front-Panel Console Port
3 Set the terminal emulation software as follows:
a Select the appropriate serial port to connect to the switch.
b Set the data rate to 9600 baud.
c Set the data format to 8 data bits, 1 stop bit, and no parity.
d Set Flow Control to none.
e Select VT100 for Emulation mode within your communication
software.
f Select Terminal keys for Function, Arrow, and Ctrl keys. Ensure that
the setting is for Terminal keys (not Windows keys).
NOTE: You can connect a console to the console port on any unit in the stack, but
stack management is performed only from the stack master (Unit ID 1 or 2).
Console Port
ContaxGS.book Page 14 Friday, August 20, 2010 1:53 PMConfiguring the Switch 15
Booting the Switch
After the local terminal is connected, turn on power. The switch then goes
through power-on self-test (POST). POST runs every time the switch is
started and checks hardware components, to determine if the switch is
operational before completely booting. If the system detects a critical
problem, the boot process stops. If POST passes successfully, a valid
executable image is loaded into RAM. POST messages are displayed on the
terminal and indicate test success or failure.
The boot process runs for approximately 40-45seconds.
When the boot process completes, the following LEDs are lit, as shown in
Figure 3-2:
• Power
• Status
• Fan (should be green)
• RPS (if it is being used)
Figure 3-2. Initial LEDs
Power Status
Fan
RPS
ContaxGS.book Page 15 Friday, August 20, 2010 1:53 PM16 Configuring the Switch
Configuring the Stack
The switch is always considered to be a stack of switches even if the stack only
contains a single switch. If there is more than one switch in the stack, each
switch must be configured individually. See "Unit ID Assignment" for
instructions on how to configure the stack.
Configuration Using the Setup Wizard
The Setup Wizard guides you through the initial switch configuration to get
the system up and running as quickly as possible. Note that you can skip the
Setup Wizard and configure the switch manually through the CLI.
The Setup Wizard configures the following fields:
• SNMP Community String and SNMP Management System IP address
(optional)
• Username and password
• Management switch IP address
• IP subnet mask
• Default gateway IP address
NOTE: The Setup Wizard assumes the following:
• The PowerConnect switch was never configured before and is in the same
state as when you received it.
• The PowerConnect switch booted successfully.
• The console connection is established and the console prompt is displayed on
the screen of a VT100 terminal switch.
Connect the Master unit to a terminal. You can identify the Master unit by
the illuminated Master LED on the front panel of the switch (see Figure 2-2).
To configure the system using the Setup Wizard:
1 Obtain the following information from the network administrator:
• SNMP Community String and SNMP Management System IP
address (optional)
• Username and password
ContaxGS.book Page 16 Friday, August 20, 2010 1:53 PMConfiguring the Switch 17
• The IP address to be assigned to the VLAN 1 interface through which
the switch is to be managed (by default, every external and internal
port is a member of the VLAN 1)
• The IP subnet mask for the network
• The default gateway (next hop router) IP address for configuring the
default route
2 Boot the Master unit. The system automatically prompts you to use the
Setup Wizard.
The Setup Wizard displays the following information:
Welcome to Dell Easy Setup Wizard
The Setup Wizard guides you through the initial
switch configuration and gets you up and running
easily and quickly. You can skip the Setup Wizard
and enter CLI mode to manually configure the
switch. The system will prompt you with a default
answer; by pressing Enter, you accept the default
value.
You must respond to the next question to run the
Setup Wizard within 60 seconds, otherwise the
system will continue with normal operation using
the default system configuration.
Would you like to enter the Setup Wizard (you must
answer this question within 60 seconds)? (Y/N)
3 Enter [Y] to run the wizard. If you enter [N] or if you do not respond
within 60 seconds, the Setup Wizard automatically exits and the CLI
console prompt appears.
If you enter [Y] the wizard provides interactive guidance through the
initial switch configuration.
The following information is displayed:
You can exit the Setup Wizard at any time by
entering [ctrl+Z].
The system is not set up for SNMP management by
default.
ContaxGS.book Page 17 Friday, August 20, 2010 1:53 PM18 Configuring the Switch
To manage the switch using SNMP (required for Dell
Network Manager) you can:
• Setup the initial SNMP version 2 account now.
• Return later and set up the SNMP version account.
For more information on setting up a SNMP version
2 account, see the user documentation.
Would you like to set up the SNMP management
interface now? [Y/N]
4 Enter [N] to skip to Step 7 or enter [Y] to continue the Setup Wizard. If
you enter [Y] the following information is displayed:
To set up the SNMP management account you must
specify the management system IP address and the
"community string" or password that the particular
management system uses to access the switch. The
wizard automatically assigns the highest access
level [Privilege Level 15] to this account.
You can use Dell Network Manager or other
management interfaces to change this setting later
and to add additional management system later. For
more information on adding management systems, see
the user documentation.
To add a management station:
Please enter the SNMP community string to be used:
5 Enter the SNMP community string. You can use the default name "public"
Please enter the IP address of the Management
System (A.B.C.D) or wildcard (0.0.0.0) to manage
from any Management Station:[0.0.0.0].
6 Enter the SNMP Management System IP.
ContaxGS.book Page 18 Friday, August 20, 2010 1:53 PMConfiguring the Switch 19
7 Set up user account privilege level, as follows:
The following information is displayed:
Now we need to set up your initial privilege
(Level 15) user account. This account is used to
login to the CLI and Web interface. You may set up
other accounts and change privilege levels later.
For more information on setting up user accounts
and changing privilege levels, see the user
documentation.
To set up a user account:
Enter the user name:
Please enter the user password:
Please reenter the user password:
8 Enter the following:
• User name, for example "admin"
• Password and password confirmation.
9 Press Enter.
The following information is displayed:
Next, an IP address is setup. The IP address is
defined on the default VLAN (VLAN #1). This is the
IP address you use to access the Telnet, Web
interface, or SNMP interface for the switch.
To set up an IP address:
Please enter the IP address of the device
(A.B.C.D):
Please enter the IP subnet mask (A.B.C.D or nn):
10 Enter the management IP address and IP subnet mask, for example
192.168.2.100 as the IP address and 255.255.255.0 as the IP subnet mask.
ContaxGS.book Page 19 Friday, August 20, 2010 1:53 PM20 Configuring the Switch
11 Press Enter.
The following information is displayed:
Finally, set up the default gateway.
Please enter the IP address of the gateway from
which this network is reachable
(e.g. 192.168.2.1).Default gateway
(A.B.C.D):[0.0.0.0]
12 Enter the default gateway.
13 Press Enter. The following is displayed (example):
This is the configuration information that has
been collected:
SNMP Interface = "Dell Network
Manager"@192.168.2.10
User Account setup = admin
Password = **********
Management IP address = 192.168.2.100
255.255.255.0
Default Gateway = 192.168.2.1
The following information is displayed:
If the information is correct, please select (Y)
to save the configuration and copy to the start-up
configuration file. If the information is
incorrect, select (N) to discard configuration and
restart the wizard: [Y/N]
ContaxGS.book Page 20 Friday, August 20, 2010 1:53 PM
www.dell.com | support.dell.com
Dell™ Inspiron™ 640M/ E1405
Manuel du propriétaire
Modèle PP19LRemarques, avis et précautions
REMARQUE : Une REMARQUE fournit des informations importantes qui vous aident à mieux utiliser votre ordinateur.
AVIS : Un AVIS vous avertit d’un risque de dommage matériel ou de perte de données et vous indique comment éviter le
problème.
PRÉCAUTION : Une PRÉCAUTION indique un risque potentiel d'endommagement du matériel, de blessure corporelle
ou de mort.
Abréviations et sigles
Pour la liste complète des abréviations et des sigles, reportez-vous à la section « Glossaire » à la page 171.
Si vous avez acheté un ordinateur Dell™ Série n, les références du présent document concernant les systèmes
d'application Microsoft® Windows® ne sont pas applicables.
____________________
Les informations de ce document sont sujettes à modification sans préavis.
© 2006–2007 Dell Inc. Tous droits réservés.
La reproduction de ce document, de quelque manière que ce soit, sans l'autorisation écrite de Dell Inc. est strictement interdite.
Marques utilisées dans ce document : Dell, le logo DELL, Inspiron, Dell Precision, Dimension, OptiPlex, Latitude, PowerEdge, PowerConnect,
PowerVault, PowerApp, Dell TravelLite, ExpressCharge, Dell Media Experience et Strike Zone sont des marques de Dell Inc. ; Intel et Pentium
sont des marques déposées d'Intel Corporation ; Microsoft, Outlook et Windows sont des marques déposées de Microsoft Corporation ; Bluetooth
est une marque déposée appartenant à Bluetooth SIG, Inc. et est utilisée par Dell sous licence ; IBM est une marque déposée d'International
Business Machines Corporation ; EMC est une marque déposée d'EMC Corporation ; ENERGY STAR est une marque déposée de l'agence
américaine de protection de l'environnement (U.S. Environmental Protection Agency).
D'autres marques et noms commerciaux peuvent être utilisés dans ce document pour faire référence aux entités se réclamant de ces marques
et de ces noms ou à leurs produits. Dell Inc. rejette tout intérêt propriétaire dans les marques et les noms commerciaux autres que les siens.
Modèle PP19L
Mars 2007 Réf. XF808 Rév. A02Table des matières 3
Table des matières
Recherche d'informations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1 Présentation de votre ordinateur. . . . . . . . . . . . . . . . . . . 15
Vue frontale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Vue du côté gauche . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Vue du côté droit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Vue arrière . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Vue de dessous. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2 Configuration de votre ordinateur . . . . . . . . . . . . . . . . . . 25
Connexion à Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Configuration de votre connexion Internet. . . . . . . . . . . . . . . . . 25
Transfert d'informations vers un nouvel ordinateur. . . . . . . . . . . . . . . 26
Exécution de l'Assistant Transfert de fichiers et de paramètres avec
le CD Operating System. . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Exécution de l'Assistant Transfert de fichiers et de paramètres sans le
CD Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Configuration d'une imprimante. . . . . . . . . . . . . . . . . . . . . . . . . 28
Câble de l'imprimante. . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Connexion d'une imprimante USB . . . . . . . . . . . . . . . . . . . . . 29
Périphériques de protection contre les surtensions électriques. . . . . . . . 30
Parasurtenseurs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Filtres de ligne . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Onduleurs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3 Utilisation de l'écran . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Réglage de la luminosité . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Basculement de l'image vidéo . . . . . . . . . . . . . . . . . . . . . . . . . 31
Réglage de la résolution d'affichage et du taux de rafraîchissement . . . . . 314 Table des matières
4 Utilisation du clavier et de la tablette tactile. . . . . . . . . . . 33
Pavé numérique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Combinaisons de touches . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Fonctions système . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Batterie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Plateau du lecteur de CD ou DVD . . . . . . . . . . . . . . . . . . . . . 34
Fonctions d'affichage. . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Radios (notamment le réseau sans fil et une carte interne dotée de la
technologie sans fil Bluetooth®) . . . . . . . . . . . . . . . . . . . . . . 34
Gestion de l'alimentation . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Fonctions des haut-parleurs . . . . . . . . . . . . . . . . . . . . . . . . 35
Fonctions de la touche du logo Microsoft® Windows® . . . . . . . . . . 35
Tablette tactile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Personnalisation de la tablette tactile . . . . . . . . . . . . . . . . . . . 36
5 Utilisation d'une batterie . . . . . . . . . . . . . . . . . . . . . . . . 37
Performances de la batterie . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Vérification de la charge de la batterie . . . . . . . . . . . . . . . . . . . . . 38
Jauge de batterie Dell™ QuickSet . . . . . . . . . . . . . . . . . . . . . 38
Microsoft® Windows® Jauge . . . . . . . . . . . . . . . . . . . . . . . 38
Indicateur de charge . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Alerte de batterie faible. . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Préservation de l'alimentation par batterie. . . . . . . . . . . . . . . . . . . 39
Modes d'économie d'énergie . . . . . . . . . . . . . . . . . . . . . . . 40
Configuration des paramètres de gestion de l'alimentation . . . . . . . . 41
Chargement de la batterie . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Remplacement de la batterie . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Stockage de la batterie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
6 Utilisation de CD, de DVD et d'autres supports
multimédias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Lecture CD ou DVD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43Table des matières 5
Réglage du volume. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Réglage de l'image. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Microsoft® Windows® XP . . . . . . . . . . . . . . . . . . . . . . . . . 46
Utilisation de Dell Media Experience™ et de Dell MediaDirect™. . . . . . . 46
Si l'ordinateur est allumé ou en mode Veille . . . . . . . . . . . . . . . . 46
Si l'ordinateur est éteint ou en mode Mise en veille prolongée . . . . . . 46
Aide de Dell MediaDirect et Dell Media Experience. . . . . . . . . . . . 47
Utilisation du CD Repair Utility (Utilitaire de réparation) de Dell
MediaDirect™ ou du CD Reinstallation (Réinstallation) de Dell
MediaDirect. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Réparation de Dell MediaDirect . . . . . . . . . . . . . . . . . . . . . . 48
Réinstallation de Dell MediaDirect . . . . . . . . . . . . . . . . . . . . . 48
Connexion de votre ordinateur à un périphérique téléviseur ou audio . . . . 50
S-vidéo et audio standard . . . . . . . . . . . . . . . . . . . . . . . . . 51
S-vidéo et audio numérique S/PDIF . . . . . . . . . . . . . . . . . . . . 53
Vidéo composite et audio standard. . . . . . . . . . . . . . . . . . . . . 55
Vidéo composite et audio numérique S/PDIF. . . . . . . . . . . . . . . . 56
Vidéo composante et audio standard . . . . . . . . . . . . . . . . . . . 58
Vidéo composante et audio numérique S/PDIF . . . . . . . . . . . . . . 60
Configuration de la lecture de DVD via le casque . . . . . . . . . . . . . 62
Activation des paramètres d'écran d'un téléviseur . . . . . . . . . . . . 63
7 Utilisation de cartes ExpressCard . . . . . . . . . . . . . . . . . . 65
Types de carte ExpressCard . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Caches pour carte ExpressCard . . . . . . . . . . . . . . . . . . . . . . . . . 65
Installation d'une carte ExpressCard . . . . . . . . . . . . . . . . . . . . . . 65
Retrait d'une carte ExpressCard ou d'un cache. . . . . . . . . . . . . . . . . 67
Types de carte mémoire multimédia. . . . . . . . . . . . . . . . . . . . . . . 68
Caches de carte mémoire multimédia. . . . . . . . . . . . . . . . . . . . . . 68
Installation d'une carte mémoire multimédia. . . . . . . . . . . . . . . . . . 69
Retrait d'une carte mémoire multimédia ou d'un cache . . . . . . . . . . . . 706 Table des matières
8 Configuration d'un réseau . . . . . . . . . . . . . . . . . . . . . . . 71
Connexion physique à un réseau ou à un modem large bande . . . . . . . . . 71
Assistant Configuration réseau . . . . . . . . . . . . . . . . . . . . . . . . . 71
Réseau local sans fil (WLAN) . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Éléments requis pour établir une connexion WLAN . . . . . . . . . . . . 72
Contrôle de votre carte réseau sans fil. . . . . . . . . . . . . . . . . . . 72
Configuration d'un nouveau WLAN. . . . . . . . . . . . . . . . . . . . . 73
Connexion à un réseau local sans fil . . . . . . . . . . . . . . . . . . . . 74
Activation/désactivation de la carte réseau sans fil . . . . . . . . . . . . 75
Surveillance de l'état des connexions réseau sans fil via
Dell™ QuickSet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Réseau étendu large bande mobile ou sans fil (WWAN) . . . . . . . . . . . . 76
Éléments requis pour établir une connexion avec un réseau large
bande mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Connexion à un réseau large bande mobile . . . . . . . . . . . . . . . . 77
Réseau Bluetooth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Configuration de votre connexion Bluetooth. . . . . . . . . . . . . . . . 77
Connexion à un réseau Bluetooth . . . . . . . . . . . . . . . . . . . . . 77
9 Sécurisation de votre ordinateur. . . . . . . . . . . . . . . . . . . 79
Verrou du câble de sécurité . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Mots de passe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Logiciel de suivi informatique. . . . . . . . . . . . . . . . . . . . . . . . . . 80
En cas de perte ou de vol de votre ordinateur. . . . . . . . . . . . . . . . . . 80
10 Dépannage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Service Dell Technical Update . . . . . . . . . . . . . . . . . . . . . . . . . 81
Dell Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Quand utiliser Dell Diagnostics. . . . . . . . . . . . . . . . . . . . . . . 81
Démarrage de Dell Diagnostics à partir du disque dur. . . . . . . . . . . 81
Démarrage de Dell Diagnostics à partir du CD Drivers and Utilities . . . . 82
Menu principal de Dell Diagnostics . . . . . . . . . . . . . . . . . . . . 83Table des matières 7
Utilitaire de support de Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Accès à l'utilitaire de support de Dell . . . . . . . . . . . . . . . . . . . 84
Clic sur l'icône de support de Dell . . . . . . . . . . . . . . . . . . . . . 84
Double-clic sur l'icône de support de Dell . . . . . . . . . . . . . . . . . 84
Problèmes de lecteur . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Problèmes de lecteur de CD et de DVD . . . . . . . . . . . . . . . . . . 85
Si vous ne parvenez pas à éjecter le plateau du lecteur de CD, de
CD-RW, de DVD ou de DVD+RW . . . . . . . . . . . . . . . . . . . . . . 85
Si vous entendez un bruit grinçant ou un raclement inhabituel . . . . . . 86
Problèmes liés au disque dur. . . . . . . . . . . . . . . . . . . . . . . . 86
Problèmes liés à la messagerie électronique, au modem ou à Internet . . . . 86
Messages d'erreur. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Problèmes liés à la carte ExpressCard . . . . . . . . . . . . . . . . . . . . . 92
Problèmes liés au périphérique IEEE 1394 . . . . . . . . . . . . . . . . . . . 92
Problèmes liés au clavier . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Problèmes liés au clavier externe . . . . . . . . . . . . . . . . . . . . . 93
Caractères imprévus . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Blocages et problèmes logiciels . . . . . . . . . . . . . . . . . . . . . . . . 94
L'ordinateur ne démarre pas . . . . . . . . . . . . . . . . . . . . . . . . 94
L'ordinateur ne répond plus . . . . . . . . . . . . . . . . . . . . . . . . 94
Un programme ne répond plus ou se bloque régulièrement. . . . . . . . 94
Un programme est conçu pour un système d'exploitation
Microsoft® Windows® antérieur. . . . . . . . . . . . . . . . . . . . . . 94
Un écran bleu uni apparaît . . . . . . . . . . . . . . . . . . . . . . . . . 94
Problèmes Dell MediaDirect . . . . . . . . . . . . . . . . . . . . . . . . 95
Autres problèmes logiciels . . . . . . . . . . . . . . . . . . . . . . . . . 95
Problèmes liés à la mémoire . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Problèmes liés au réseau . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Problèmes d'alimentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Problèmes d'imprimante. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Problèmes liés au scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Problèmes de son et de haut-parleurs. . . . . . . . . . . . . . . . . . . . . . 99
Aucun son ne sort des haut-parleurs intégrés . . . . . . . . . . . . . . . 99
Aucun son ne sort des haut-parleurs externes . . . . . . . . . . . . . . 99
Aucun son émis par le casque . . . . . . . . . . . . . . . . . . . . . . 1008 Table des matières
Problèmes liés à la tablette tactile ou à la souris . . . . . . . . . . . . . . 100
Problèmes vidéo et d'affichage . . . . . . . . . . . . . . . . . . . . . . . . 100
Si l'écran est vide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Si l'écran est difficile à lire . . . . . . . . . . . . . . . . . . . . . . . . 101
Si seule une partie de l'écran est lisible . . . . . . . . . . . . . . . . . 101
Pilotes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Qu'est-ce qu'un pilote ? . . . . . . . . . . . . . . . . . . . . . . . . . 102
Identification des pilotes . . . . . . . . . . . . . . . . . . . . . . . . . 102
Réinstallation des pilotes et utilitaires . . . . . . . . . . . . . . . . . . 102
Résolution des incompatibilités logicielles et matérielles. . . . . . . . . . 104
Restauration du système d'exploitation. . . . . . . . . . . . . . . . . . . . 105
Utilisation de la fonction Restauration du système de Microsoft
Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Utilisation de Dell PC Restore de Symantec . . . . . . . . . . . . . . . 107
Utilisation du CD Operating system. . . . . . . . . . . . . . . . . . . . 108
11 Ajout et remplacement de pièces . . . . . . . . . . . . . . . . . 111
Avant de commencer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Outils recommandés . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Mise hors tension de l'ordinateur . . . . . . . . . . . . . . . . . . . . 111
Avant d'intervenir à l'intérieur de votre ordinateur . . . . . . . . . . . 112
Disque dur . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Retour de votre disque dur à Dell. . . . . . . . . . . . . . . . . . . . . 115
Lecteurs optiques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
À propos de la vis de fixation de périphérique . . . . . . . . . . . . . . 116
Retrait et installation des lecteurs optiques . . . . . . . . . . . . . . . 116
Mémoire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Installation d'un module de mémoire dans le connecteur DIMM B . . . 118
Installation d'un module de mémoire dans le connecteur DIMM A . . . 120
Modem (en option). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Carte Mini . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Cache de la charnière . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Retrait du cache de la charnière . . . . . . . . . . . . . . . . . . . . . 127
Remise en place du cache de la charnière. . . . . . . . . . . . . . . . 129Table des matières 9
Clavier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Retrait du clavier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Remise en place du clavier. . . . . . . . . . . . . . . . . . . . . . . . 130
Carte interne dotée de la technologie sans fil Bluetooth® . . . . . . . . . . 130
Pile bouton . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Retrait de la pile bouton . . . . . . . . . . . . . . . . . . . . . . . . . 132
Remise en place de la pile bouton . . . . . . . . . . . . . . . . . . . . 132
12 Fonctions Dell™ QuickSet . . . . . . . . . . . . . . . . . . . . . . 133
13 Voyager avec votre ordinateur . . . . . . . . . . . . . . . . . . . 135
Identification de l'ordinateur . . . . . . . . . . . . . . . . . . . . . . . . . 135
Emballage de l'ordinateur . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Conseils de voyage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Transport aérien . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
14 Contacter Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
15 Caractéristiques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
16 Annexe. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Utilisation du programme de configuration du système . . . . . . . . . . . 165
Affichage de l'écran de configuration du système. . . . . . . . . . . . 165
Programme de configuration du système . . . . . . . . . . . . . . . . 165
Options fréquemment utilisées . . . . . . . . . . . . . . . . . . . . . . 166
Nettoyage de votre ordinateur. . . . . . . . . . . . . . . . . . . . . . . . . 167
Ordinateur, clavier et écran. . . . . . . . . . . . . . . . . . . . . . . . 167
Tablette tactile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Lecteur de disquette . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
CD et DVD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16810 Table des matières
Règle de support technique de Dell (États-Unis uniquement) . . . . . . . . 168
Définition des logiciels et des périphériques installés par Dell . . . . . 169
Définition des logiciels et des périphériques tiers . . . . . . . . . . . . 169
Réglementation FCC (États-Unis uniquement) . . . . . . . . . . . . . . . . 169
Classe B de la FCC . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Caractéristiques Macrovision. . . . . . . . . . . . . . . . . . . . . . . . . 170
Glossaire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183Recherche d'informations 11
Recherche d'informations
REMARQUE : Il se peut que certaines fonctionnalités et certains supports soient en option et ne soient pas livrés
avec votre ordinateur. Certaines fonctionnalités ne sont pas nécessairement disponibles dans tous les pays.
REMARQUE : Il est possible que des informations supplémentaires soient fournies avec votre ordinateur.
Que recherchez-vous ? Cherchez ici
• Programme de diagnostic pour mon ordinateur
• Pilotes pour mon ordinateur
• La documentation concernant mon appareil
• NSS (Notebook System Software)
CD Drivers and Utilities (également appelé ResourceCD)
REMARQUE : Il se peut que le CD Drivers and Utilities soit
en option et qu'il ne soit pas livré avec tous les ordinateurs.
La documentation et les pilotes sont déjà installés sur
l'ordinateur. Vous pouvez utiliser le CD pour réinstaller les
pilotes (reportez-vous à la section « Réinstallation des
pilotes et utilitaires » à la page 102) ou pour exécuter Dell
Diagnostics (reportez-vous à la section « Dell Diagnostics »
à la page 81).
Des fichiers « Lisez-moi »
peuvent être inclus sur
votre CD ; ces fichiers
fournissent des
informations sur les
modifications techniques
de dernière minute
apportées à votre système
ou des informations de
référence destinées aux
techniciens ou aux
utilisateurs expérimentés.
REMARQUE : Les dernières mises à jour des pilotes et de la
documentation se trouvent à l'adresse support.dell.com.
• Informations sur les garanties
• Termes et Conditions (États-Unis uniquement)
• Consignes de sécurité
• Informations sur les réglementations
• Informations relatives à l'ergonomie
• Contrat de licence pour utilisateur final
Guide d'information sur le produit Dell™12 Recherche d'informations
• Comment configurer mon ordinateur Schéma de configuration
• Numéro de service et code de service express
• Étiquette de licence Microsoft Windows
Numéro de service et licence Microsoft® Windows®
Ces étiquettes sont situées sur la base de votre ordinateur.
• Utilisez le numéro de service pour identifier votre
ordinateur lorsque vous accédez au site Web
support.dell.com ou lorsque vous appelez le service de
support technique.
• Entrez le code de
service express pour
orienter votre appel
lorsque vous contactez
le service de support
technique.
Que recherchez-vous ? Cherchez iciRecherche d'informations 13
• Solutions — Conseils et astuces de dépannage, articles
de techniciens, cours en ligne et questions fréquemment
posées
• Forum clients — Discussion en ligne avec d'autres
clients Dell
• Mises à niveau — Informations sur les mises à niveau
des composants, comme la mémoire, l'unité de disque
dur et le système d'exploitation
• Service clientèle — Coordonnées, appels de service et
état des commandes, garantie et informations sur les
réparations
• Service et support — État des appels de service et
historique du support, contrat de service, discussions en
ligne avec le support technique
• Référence — Documentation de l'ordinateur, détails sur
la configuration de l'ordinateur, caractéristiques de
produit et livres blancs
• Téléchargements — Pilotes, correctifs et mises à jour
logicielles agréés
• Notebook Logiciel système (NSS)— Si vous réinstallez
le système d'exploitation de l'ordinateur, vous devez
également réinstaller l'utilitaire NSS. NSS fournit des
mises à jour essentielles pour le système d'exploitation et
la prise en charge des lecteurs de disquette USB Dell™
de 3,5 pouces, des processeurs Intel® Pentium® M, des
lecteurs optiques et des périphériques USB. NSS est
requis pour le bon fonctionnement de votre ordinateur
Dell. Ce logiciel détecte automatiquement votre
ordinateur et son système d'exploitation, et installe les
mises à jour appropriées à votre configuration.
Site Web de support de Dell — support.dell.com
REMARQUE : Sélectionnez votre région pour afficher le site
de support approprié.
REMARQUE : Les représentants des grandes entreprises,
du gouvernement et du domaine de l'éducation peuvent
également utiliser le site Web de support personnalisé
Premier de Dell à l'adresse premier.support.dell.com.
Pour télécharger NSS (Notebook System Software) :
1 Allez à l'adresse support.dell.com et cliquez sur
Téléchargements.
2 Saisissez votre numéro de service ou le modèle de
l'appareil.
3 Dans le menu déroulant Télécharger une catégorie,
cliquez sur All (Toutes).
4 Sélectionnez le système d'exploitation et la langue du
système d'exploitation de votre ordinateur, puis cliquez
sur Soumettre.
5 Sous Select a Device (Sélectionner un périphérique),
rendez-vous à System and Configuration Utilities
(Utilitaires de système et de configuration), puis cliquez
sur Dell NSS(Notebook System Software).
• Mises à niveau logicielles et astuces de dépannage —
Questions fréquemment posées, sujets d'actualité et
état général de votre environnement informatique
Utilitaire de support de Dell
L'utilitaire de support de Dell est un système de mise à
niveau et de notification automatique installé sur votre
ordinateur. Il permet de réaliser des balayages en temps réel
de l'état de votre environnement informatique et des mises
à jour logicielles et fournit des informations de support
automatique appropriées. Accédez à l'utilitaire de support
de Dell à l'aide de l'icône située dans la barre des
tâches. Pour plus d'informations, reportez-vous à la section
« Utilitaire de support de Dell » à la page 84.
Que recherchez-vous ? Cherchez ici14 Recherche d'informations
• Comment utiliser Windows XP
• Comment utiliser des programmes et des fichiers
• Comment personnaliser mon bureau
Centre d'aide et de support de Windows
1 Cliquez sur le bouton Démarrer, puis sur Aide et support.
2Tapez un mot ou une expression qui décrit votre
problème, puis cliquez sur l'icône en forme de flèche.
3 Cliquez sur la rubrique qui décrit votre problème.
4 Suivez les instructions qui s'affichent à l'écran.
• Informations sur l'activité réseau, l'Assistant Gestion de
l'alimentation, les touches de raccourci et les éléments
contrôlés par Dell QuickSet
Aide Dell QuickSet
Pour afficher l'aide Dell QuickSet, cliquez avec le bouton
droit de la souris sur l'icône , dans la barre des tâches
de Microsoft® Windows®.
Pour plus d'informations sur Dell QuickSet, reportez-vous
à la section « Fonctions Dell™ QuickSet » à la page 133.
• Comment réinstaller mon système d'exploitation CD Operating System
REMARQUE : Il se peut que le CD Operating System soit en
option et qu'il ne soit pas livré avec certains ordinateurs.
Le système d'exploitation
est déjà installé sur votre
ordinateur. Pour réinstaller
le système d'exploitation,
utilisez le CD Operating
System. Reportez-vous à la
section « Utilisation du
CD Operating system » à
la page 108. Une fois le
système d'exploitation
réinstallé, utilisez le CD
Drivers and Utilities (ResourceCD) pour réinstaller les
pilotes des périphériques accompagnant votre ordinateur.
REMARQUE : La couleur de votre CD dépend du système
d'exploitation que vous avez commandé.
Que recherchez-vous ? Cherchez iciPrésentation de votre ordinateur 15
Présentation de votre ordinateur
Vue frontale
1 loquet de fermeture de l'écran 2 écran 3 bouton d'alimentation
4 voyants d'état de l'appareil 5 tablette tactile 6 boutons de commande
multimédia
7 haut-parleurs 8 boutons de la tablette tactile 9 clavier
10 voyants d'état du clavier et du
sans fil
11 loquets de l'écran (2)
1
9
2
5
8
3
7
10 4
6
1116 Présentation de votre ordinateur
LOQUET D E FERMETURE D E L'ÉCRAN — Faites glisser et maintenez ce loquet pour déverrouiller les dispositifs de
fermeture et ouvrir l'écran.
ÉCRAN — Pour plus d'informations sur l'écran, reportez-vous à la section « Utilisation de l'écran » à la page 31.
BOUTON D'ALIMENTATION — Appuyez sur le bouton d'alimentation pour mettre l'ordinateur sous tension ou
quitter le mode d'économie d'énergie.
AVIS : Afin d'éviter de perdre des données, éteignez l'ordinateur à l'aide du menu Démarrer plutôt qu'en appuyant
sur le bouton d'alimentation.
VOYANTS D'ÉTAT D E L'APPAREIL
Si l'ordinateur est branché à une prise secteur, le voyant fonctionne comme suit :
• Vert fixe : la batterie est en cours de charge.
• Vert clignotant : la batterie est presque complètement chargée.
Si l'ordinateur fonctionne sur batterie, le voyant fonctionne comme suit :
• Éteint : la batterie est suffisamment chargée (ou l'ordinateur est éteint).
• Orange clignotant : le niveau de charge de la batterie est faible.
• Orange fixe : le niveau de charge de la batterie est critique.
S'allume lorsque vous mettez l'ordinateur sous tension et clignote lorsque l'ordinateur est en
mode d'économie d'énergie.
S'allume lorsque l'ordinateur lit ou écrit des données.
AVIS : Pour éviter de perdre des données, n'éteignez jamais l'ordinateur lorsque le voyant
clignote.
Reste allumé ou clignote pour indiquer l'état de charge de la batterie.Présentation de votre ordinateur 17
TABLETTE TACTILE — Assure les mêmes fonctions que la souris.
BOUTONS D E COMMANDE MULTIMÉDIA — Contrôlent la lecture des CD, DVD et lecteurs multimédia.
HAUT-PARLEURS — Pour régler le volume des haut-parleurs intégrés, appuyez sur les boutons de commande
multimédia ou les raccourcis clavier du volume des haut-parleurs. Pour plus d'informations, reportez-vous à la
section « Fonctions des haut-parleurs » à la page 35.
BOUTONS D E L A TABLETTE TACTILE — La tablette tactile et ses boutons offrent les mêmes fonctionnalités que la
souris.
CLAVIER — Le clavier comporte un pavé numérique et la touche du logo Microsoft Windows. Pour plus
d'informations sur les raccourcis clavier pris en charge, reportez-vous à la section « Combinaisons de touches » à la
page 34.
Met le son en sourdine.
Diminue le son.
Augmente le son.
Lecture ou pause.
Revient à la plage précédente.
Passe à la plage suivante.
Arrêt.
Lancement de Dell MediaDirect ou Microsoft® Windows® Media Center
Edition. Reportez-vous à la section « Utilisation de Dell Media Experience™ et de
Dell MediaDirect™ » à la page 46.18 Présentation de votre ordinateur
VOYANTS D'ÉTAT D U CLAVIER E T D U SANS FIL
Les voyants verts situés au-dessus du clavier indiquent ce qui suit :
LOQUETS D E L'ÉCRAN — Permettent de maintenir l'écran fermé.
S'allume lorsque le pavé numérique est activé.
S'allume lorsque la fonction Majuscules est activée.
S'allume lorsque la fonction Arrêt défil est activée.
S'allume lorsque le réseau sans fil est activé. Pour activer ou
désactiver le réseau sans fil, appuyez sur .
S'allume lorsqu'une carte dotée de la technologie sans fil
Bluetooth® est activée.
REMARQUE : La carte dotée de la technologie sans fil
Bluetooth est une fonctionnalité optionnelle, le voyant ne
s'allume donc que lorsque vous avez commandé la carte avec
votre ordinateur. Pour des informations supplémentaires,
reportez-vous à la documentation livrée avec votre carte.
Pour désactiver uniquement la fonctionnalité de
technologie sans fil Bluetooth, cliquez avec le bouton droit
de la souris sur l'icône de la zone de notification et
sélectionnez Désactiver radio Bluetooth.
Pour activer ou désactiver rapidement tous les périphériques
sans fil, appuyez sur .
9
APrésentation de votre ordinateur 19
Vue du côté gauche
PRÉCAUTION : Ne bloquez pas les entrées d'air de l'ordinateur et n'insérez pas d'objets dedans ; évitez
également toute accumulation de poussière. Ne placez pas l'ordinateur dans un environnement peu aéré, tel
qu'une mallette fermée, lorsque celui-ci fonctionne. Le manque de ventilation risquerait de causer un incendie
ou d'endommager l'ordinateur.
AVIS : Avant d'acheter un dispositif antivol, assurez-vous qu'il correspond au type d'emplacement pour câble de
sécurité de votre ordinateur.
EMPLACEMENT POUR CÂBLE D E SÉCURITÉ — Permet de rattacher à l'ordinateur un dispositif antivol disponible
dans le commerce. Pour plus d'informations, reportez-vous aux instructions fournies avec l'appareil.
ENTRÉE D'AIR — L'ordinateur utilise des ventilateurs pour garantir la circulation de l'air à travers les entrées d'air et
éviter tout risque de surchauffe.
1 emplacement pour câble
de sécurité
2 entrée d'air 3 connecteur de sortie TV S-vidéo
4 connecteur IEEE 1394 5 connecteur microphone 6 connecteur de casque
7 lecteur de carte mémoire
multimédia 5 en 1
8 logement de carte ExpressCard
1 2 6 3 45 7 820 Présentation de votre ordinateur
CONNECTEUR D E SORTIE TV S-VIDÉO
CONNECTEUR IEEE 1394 — Permet de relier des périphériques qui prennent en charge des vitesses de transfert
ultra rapides IEEE 1394, par exemple des caméras vidéo numériques.
CONNECTEURS AUDIO
LECTEUR D E CARTE MÉMOIRE MULTIMÉDIA 5 EN 1— Moyen pratique et rapide de visualiser et de partager des
photos numériques, de la musique et des vidéos stockées sur une carte mémoire. Le lecteur de carte mémoire
multimédia 5 en 1 lit les cartes mémoire multimédia numériques suivantes :
• Carte Secure Digital (SD)/SDIO
• MultiMediaCard (MMC)
• Memory Stick
• Memory Stick PRO
• Carte xD-Picture
LOGEMENT D E CARTE EXPRESSCARD — Prend en charge une carte ExpressCard. Votre ordinateur est livré avec un
cache en plastique dans le logement. Pour plus d'informations, reportez-vous à la section « Utilisation de cartes
ExpressCard » à la page 65.
REMARQUE : Le logement de carte ExpressCard ne prend PAS en charge les cartes PC.
Permet de relier l'ordinateur à un téléviseur. Permet également de relier des
périphériques audio numériques à l'aide d'un câble d'adaptateur audio
numérique/TV.
Raccordez un microphone au connecteur .
Raccordez un casque ou des haut-parleurs au
connecteur .Présentation de votre ordinateur 21
Vue du côté droit
BAIE D E LECTEUR OPTIQUE — Vous pouvez installer des périphériques, tels qu'un lecteur de DVD ou un autre
lecteur optique dans la baie de lecteur optique. Pour plus d'informations, reportez-vous à la section « Lecteurs
optiques » à la page 116.
BOUTON D'ÉJECTION D U PLATEAU D U LECTEUR OPTIQUE — Appuyez sur ce bouton pour éjecter un CD ou un
DVD du lecteur optique.
CONNECTEURS USB
CONNECTEUR MODEM (RJ-11)
AVIS : Le connecteur réseau est légèrement plus grand que le connecteur modem. Pour éviter d'endommager
l'ordinateur, ne connectez pas de ligne téléphonique au connecteur réseau.
1 baie de lecteur optique 2 bouton d'éjection du plateau
du lecteur optique
3 connecteurs USB (2)
4 connecteur modem (RJ-11) 5 connecteur réseau (RJ-45) 6 connecteur vidéo
Permettent de connecter des périphériques USB, tels qu'une souris, un clavier ou
une imprimante. Vous pouvez également relier le lecteur de disquette optionnel
directement à un connecteur USB à l'aide du câble pour lecteur de disquette
optionnel.
Pour utiliser le modem interne, connectez la ligne téléphonique au connecteur
modem.
Pour plus d'informations sur l'utilisation du modem, reportez-vous à la
documentation en ligne correspondante fournie avec votre ordinateur.
1 2 6 3 4522 Présentation de votre ordinateur
CONNECTEUR RÉSEAU (RJ-45)
CONNECTEUR VIDÉO
Vue arrière
CONNECTEURS USB
CONNECTEUR D'ADAPTATEUR SECTEUR — Sert à relier l'adaptateur secteur à l'ordinateur. Cet adaptateur convertit
l'alimentation CA en alimentation CC qui est celle requise par l'ordinateur. Vous pouvez connecter
l'adaptateur secteur à votre ordinateur, que ce dernier soit allumé ou éteint.
Permet de relier l'ordinateur à un réseau. Les voyants vert et jaune situés près du
connecteur indiquent l'activité de communication filaire.
Pour plus d'informations sur l'utilisation de la carte réseau, consultez la
documentation en ligne de la carte réseau fournie avec votre ordinateur.
Permet de relier un moniteur externe compatible VGA.
1 connecteurs USB (2) 2 connecteur d'adaptateur secteur
Permettent de connecter des périphériques USB, tels qu'une souris, un clavier ou
une imprimante. Vous pouvez également relier le lecteur de disquette optionnel
directement à un connecteur USB à l'aide du câble pour lecteur de disquette
optionnel.
1 2Présentation de votre ordinateur 23
PRÉCAUTION : L'adaptateur secteur fonctionne avec les tensions secteur disponibles dans le monde entier.
Cependant, les connecteurs et les rampes d'alimentation varient selon les pays. L'utilisation d'un câble non
compatible ou le branchement incorrect du câble sur la rampe d'alimentation ou la prise secteur peut provoquer
un incendie ou endommager l'équipement.
AVIS : Lorsque vous déconnectez l'adaptateur secteur de l'ordinateur, tenez le connecteur du câble de
l'adaptateur, pas le câble lui-même, et tirez dessus fermement mais sans forcer, afin d'éviter de l'endommager.
Vue de dessous
BATTERIE — Quand une batterie est installée, vous pouvez utiliser l'ordinateur sans le brancher au secteur. Pour
plus d'informations, reportez-vous à la section « Utilisation d'une batterie » à la page 37.
CACHE D U MODULE D E MÉMOIRE — Recouvre le compartiment des modules de mémoire. Pour de plus amples
informations, reportez-vous à la page 117.
LOQUET D E FERMETURE D E L A BAIE D E BATTERIE — Permet de retirer la batterie de la baie de batterie. Reportezvous à la section « Remplacement de la batterie » à la page 41.
1 batterie 2 cache du module de
mémoire
3 loquet de fermeture de la baie de
batterie
4 aération du ventilateur 5 cache du processeur et du
module thermique
6 cache du modem/de la carte/
du dispositif sans fil
7 vis de verrouillage du
lecteur optique
8 unité de disque dur 9 indicateur de charge de la batterie
6
5
7
1 3 2 4
8
924 Présentation de votre ordinateur
VENTILATEUR — L'ordinateur utilise un ventilateur pour garantir la circulation de l'air à travers les entrées d'air et
éviter tout risque de surchauffe.
CACHE D U PROCESSEUR E T D U MODULE THERMIQUE — Masque le processeur et le module thermique.
CACHE D U MODEM/D E LA CARTE MINI/D U DISPOSITIF SANS FIL — Recouvre le compartiment qui contient le
modem, la carte Mini et la carte interne dotée de la technologie sans fil Bluetooth. Pour de plus amples informations,
reportez-vous à la page 123.
VIS D E VERROUILLAGE D U LECTEUR OPTIQUE — Sert à fixer le lecteur optique dans la baie du lecteur optique. Pour
plus d'informations, reportez-vous à la section « Lecteurs optiques » à la page 116.
DISQUE DUR — Stocke les logiciels et les données. Pour plus d'informations, reportez-vous aux sections « Disque
dur » à la page 113 et « Problèmes liés au disque dur » à la page 86. La taille de votre disque dur affichée dans
l'Explorateur Windows est la capacité du lecteur avant l'installation de tout système d'exploitation ou tous
programmes.
INDICATEUR D E CHARGE D E L A BATTERIE — Donne des informations sur le niveau de charge de la batterie.
Reportez-vous à la section « Vérification de la charge de la batterie » à la page 38.Configuration de votre ordinateur 25
Configuration de votre ordinateur
Connexion à Internet
REMARQUE : Les fournisseurs d'accès Internet (FAI) et leurs offres varient selon les pays.
Pour vous connecter à Internet, vous devez disposer d'un modem ou d'une connexion réseau et d'un
fournisseur d'accès Internet (FAI). Votre fournisseur d'accès Internet vous proposera une ou
plusieurs des options de connexion Internet suivantes :
• Connexions d'accès à distance qui offrent un accès à Internet par l'intermédiaire d'une ligne
téléphonique. Ces connexions sont beaucoup plus lentes que les connexions DSL ou modem par
câble.
• Connexions DSL qui offrent un accès à Internet à haute vitesse par l'intermédiaire d'une ligne
téléphonique existante. Avec une connexion DSL, vous pouvez accéder à Internet et utiliser votre
téléphone sur la même ligne simultanément.
• Connexions modem par câble qui offrent un accès à Internet à haute vitesse par l'intermédiaire de
la ligne TV câblée locale.
Si vous utilisez une connexion d'accès à distance, connectez une ligne téléphonique au connecteur
du modem sur votre ordinateur et à la prise téléphonique murale avant de configurer la connexion
Internet. Si vous utilisez une connexion DSL ou modem par câble, contactez votre fournisseur
d'accès Internet pour obtenir les instructions de configuration.
Configuration de votre connexion Internet
Pour configurer une connexion Internet à l'aide du raccourci de bureau d'un fournisseur d'accès
Internet fourni :
1 Enregistrez et fermez tous les fichiers et quittez tous les programmes.
2 Double-cliquez sur l'icône d'un fournisseur d'accès Internet sur le bureau Microsoft® Windows®.
3 Pour effectuer la configuration, suivez les instructions qui s'affichent à l'écran.
Si aucune icône de fournisseur d'accès Internet n'apparaît sur votre bureau ou si vous souhaitez
configurer une connexion Internet avec un autre fournisseur d'accès Internet :
1 Enregistrez et fermez tous les fichiers et quittez tous les programmes.
2 Cliquez sur le bouton Démarrer, puis sur Internet Explorer.
L'Assistant Nouvelle connexion s'affiche.
3 Cliquez sur Connecter à Internet.
4 Dans la fenêtre suivante, cliquez sur l'option appropriée :
• Si vous ne disposez pas de fournisseur d'accès Internet et souhaitez en sélectionner un,
cliquez sur Choisir dans une liste de fournisseurs de services Internet.26 Configuration de votre ordinateur
• Si vous avez déjà reçu les informations de configuration de votre fournisseur de services Internet,
mais pas le CD de configuration, cliquez sur Configurer ma connexion manuellement.
• Si vous disposez d'un CD, cliquez sur Utiliser le CD fourni par mon fournisseur de services
Internet.
5 Cliquez sur Suivant.
Si vous sélectionnez Configurer ma connexion manuellement, passez à l'étape 6. Sinon, suivez les
instructions qui s'affichent à l'écran pour terminer la configuration.
REMARQUE : Si vous ne savez pas quel type de connexion sélectionner, contactez votre fournisseur d'accès
Internet.
6 Cliquez sur l'option appropriée sous Comment souhaitez-vous vous connecter à Internet ?, puis
cliquez sur Suivant.
7 Utilisez les informations fournies par votre fournisseur d'accès Internet pour terminer la configuration.
Si vous rencontrez des problèmes de connexion à Internet, reportez-vous à la section « Problèmes liés à la
messagerie électronique, au modem ou à Internet » à la page 86. Si vous ne pouvez pas vous connecter à
Internet alors que vous l'avez déjà fait auparavant, il est possible que le fournisseur d'accès Internet
subisse une interruption de services. Contactez-le pour vérifier l'état des services ou essayez de vous
connecter ultérieurement.
Transfert d'informations vers un nouvel ordinateur
Le système d'exploitation Microsoft® Windows® XP inclut un Assistant Transfert de fichiers et de
paramètres qui permet de déplacer des données d'un ordinateur à un autre. Vous pouvez transférer des
données telles que :
• Messages e-mail
• Paramètres de la barre d'outils
• Tailles de fenêtre
• Signets Internet
Vous pouvez transférer les données vers le nouvel ordinateur en utilisant une connexion réseau, ou les
stocker sur un support amovible, comme un CD inscriptible ou une disquette.
REMARQUE : Pour des instructions sur la configuration d'une connexion à câble directe entre deux ordinateurs,
reportez-vous à la base de connaissances de Microsoft Article nº 305621, intitulé How to Set Up a Direct Cable
Connection Between Two Computers in Windows XP (Comment configurer une connexion à câble directe entre
deux ordinateurs sous Windows XP). Ces informations peuvent ne pas être disponibles dans certains pays.
Pour transférer des informations vers un nouvel ordinateur, vous devez lancer l'Assistant Transfert de
fichiers et de paramètres. Pour ce faire, utilisez le CD Operating System en option ou créez un disque
Assistant à l'aide de l'utilitaire Assistant Transfert de fichiers et de paramètres.
Exécution de l'Assistant Transfert de fichiers et de paramètres avec le CD Operating System
REMARQUE : Le CD Operating system est requis. Toutefois, ce CD est en option et n'est pas obligatoirement
expédié avec tous les ordinateurs.Configuration de votre ordinateur 27
Pour ouvrir l'Assistant Transfert de fichiers et de paramètres :
1 Cliquez sur le bouton Démarrer, pointez sur Tous les programmes→ Accessoires→ Outils système,
puis cliquez sur Assistant Transfert de fichiers et de paramètres.
2 Lorsque l'écran de bienvenue de l'Assistant Transfert de fichiers et de paramètres s'affiche, cliquez sur
Suivant.
3 Dans l'écran De quel ordinateur s'agit-il ?, cliquez sur Nouvel ordinateur, puis sur Suivant.
4 Dans l'écran Avez-vous un CD-ROM de Windows XP ?, cliquez sur J'utiliserai l'Assistant du
CD-ROM de Windows XP, puis sur Suivant.
5 Lorsque l'écran Allez maintenant à votre ancien ordinateur s'affiche, allez à l'ancien ordinateur ou
ordinateur source. Ne cliquez pas sur Suivant à ce moment.
Pour copier les données à partir de l'ancien ordinateur :
1 Sur l'ancien ordinateur, insérez le CD Operating System de Windows XP.
2 Dans l'écran Bienvenue dans Microsoft Windows XP, cliquez sur Effectuer des tâches supplémentaires.
3 Sous Que voulez-vous faire ?, cliquez sur Transférer des fichiers et des paramètres.
4 Dans l'écran de bienvenue de l'Assistant Transfert de fichiers et de paramètres, cliquez sur Suivant.
5 Dans l'écran De quel ordinateur s'agit-il ?, cliquez sur Ancien ordinateur, puis sur Suivant.
6 Dans l'écran Sélectionnez une méthode de transfert, cliquez sur la méthode de transfert de votre choix.
7 Dans l'écran Que voulez-vous transférer ?, sélectionnez les éléments à transférer, puis cliquez sur
Suivant.
Une fois les informations copiées, l'écran Fin de la phase de collecte des données apparaît.
8 Cliquez sur Terminer.
Pour transférer les données vers le nouvel ordinateur :
1 Dans l'écran Allez maintenant à votre ancien ordinateur sur le nouvel ordinateur, cliquez sur Suivant.
2 Dans l'écran Où sont les fichiers et les paramètres ?, sélectionnez la méthode de transfert de vos
paramètres et fichiers, puis cliquez sur Suivant.
L'Assistant lit les paramètres et fichiers recueillis, puis les applique à votre nouvel ordinateur.
Lorsque tous les paramètres et fichiers ont été appliqués, l'écran Terminé s'affiche.
3 Cliquez sur Terminé et redémarrez le nouvel ordinateur.
Exécution de l'Assistant Transfert de fichiers et de paramètres sans le CD Operating System
Pour exécuter l'Assistant Transfert de fichiers et de paramètres sans le CD Operating system en option,
vous devez créer un disque Assistant qui va permettre la création d'un fichier d'image de sauvegarde pour
supports amovibles.
Pour créer un disque Assistant, servez-vous de votre nouvel ordinateur doté de Windows XP et suivez les
étapes suivantes :
1 Cliquez sur le bouton Démarrer, pointez sur Tous les programmes→ Accessoires→ Outils système,
puis cliquez sur Assistant Transfert de fichiers et de paramètres.
2 Lorsque l'écran de bienvenue de l'Assistant Transfert de fichiers et de paramètres s'affiche, cliquez sur
Suivant.
3 Dans l'écran De quel ordinateur s'agit-il ?, cliquez sur Nouvel ordinateur, puis sur Suivant.28 Configuration de votre ordinateur
4 Dans l'écran Avez-vous un CD-ROM de Windows XP ?, cliquez sur Je souhaite créer un disque
Assistant dans le lecteur suivant : , puis cliquez sur Suivant.
5 Insérez le support amovible, tel qu'une disquette ou un CD, puis cliquez sur OK.
6 Lorsque la création du disque est terminée et que le message Allez maintenant à votre ancien
ordinateur apparaît, ne cliquez pas sur Suivant.
7 Allez à votre ancien ordinateur.
Pour copier les données à partir de l'ancien ordinateur :
1 Insérez le disque Assistant sur l'ancien ordinateur.
2 Cliquez sur le bouton Démarrer, puis sur Exécuter.
3 Dans le champ Ouvrir de la fenêtre Exécuter, recherchez le chemin fastwiz (pour le support amovible
approprié) et cliquez sur OK.
4 Dans l'écran de bienvenue de l'Assistant Transfert de fichiers et de paramètres, cliquez sur Suivant.
5 Dans l'écran De quel ordinateur s'agit-il ?, cliquez sur Ancien ordinateur, puis sur Suivant.
6 Dans l'écran Sélectionnez une méthode de transfert, cliquez sur la méthode de transfert de votre choix.
7 Dans l'écran Que voulez-vous transférer ?, sélectionnez les éléments à transférer, puis cliquez sur
Suivant.
Une fois les informations copiées, l'écran Fin de la phase de collecte des données apparaît.
8 Cliquez sur Terminer.
Pour transférer les données vers le nouvel ordinateur :
1 Dans l'écran Allez maintenant à votre ancien ordinateur sur le nouvel ordinateur, cliquez sur Suivant.
2 Dans l'écran Où sont les fichiers et les paramètres ?, sélectionnez la méthode de transfert de vos
paramètres et fichiers, puis cliquez sur Suivant. Suivez les instructions qui s'affichent à l'écran.
L'Assistant lit les paramètres et fichiers recueillis, puis les applique à votre nouvel ordinateur.
Lorsque tous les paramètres et fichiers ont été appliqués, l'écran Terminé s'affiche.
3 Cliquez sur Terminé et redémarrez le nouvel ordinateur.
REMARQUE : Pour plus d'informations sur cette procédure, rendez-vous sur le site Web dell.support.com pour
accéder au document nº PA1089586 (How Do I Transfer Files From My Old Computer to My New Dell Computer
Using the Microsoft® Windows® XP Operating System CD? [Comment transférer des fichiers à partir de mon
ancien ordinateur vers mon nouvel ordinateur Dell™ à l'aide du CD Operating System Microsoft® Windows®XP]).
REMARQUE : Certains pays peuvent ne pas avoir accès au document de la base de connaissances Dell.
Configuration d'une imprimante
AVIS : Effectuez la configuration du système d'exploitation avant de connecter une imprimante à l'ordinateur.
Reportez-vous à la documentation fournie avec l'imprimante pour obtenir des informations sur la
configuration, notamment :
• Obtenir et installer les pilotes mis à jour.
• Connecter l'imprimante à l'ordinateur.
• Charger le papier et installer la cartouche de toner ou d'encre.Configuration de votre ordinateur 29
Consultez le Manuel du propriétaire de l'imprimante pour obtenir une assistance technique ou
contactez le fabricant de l'imprimante.
Câble de l'imprimante
L'imprimante se connecte à l'ordinateur avec un câble USB ou un câble parallèle. Il est possible que
l'imprimante soit livrée sans câble. Par conséquent, si vous achetez un câble séparément, assurez-vous
qu'il est compatible avec votre imprimante et votre ordinateur. Si vous avez acheté un câble
d'imprimante en même temps que l'ordinateur, il est possible qu'il vous soit livré avec ce dernier.
Connexion d'une imprimante USB
REMARQUE : Vous pouvez connecter des périphériques USB pendant que l'ordinateur est sous tension.
1 Effectuez la configuration du système d'exploitation, si vous ne l'avez pas déjà fait.
2 Raccordez le câble USB de l'imprimante aux connecteurs USB de l'ordinateur et de l'imprimante. Les
connecteurs USB ne s'insèrent que dans un seul sens.
3 Allumez l'imprimante, puis l'ordinateur. Si la fenêtre Assistant Ajout de matériel apparaît, cliquez sur
Annuler.
4 Le cas échéant, installez le pilote d'imprimante. Consultez la documentation de l'imprimante.
1 connecteur USB de l'ordinateur 2 câble USB de l'imprimante 3 connecteur sur l'imprimante
2
1
330 Configuration de votre ordinateur
Périphériques de protection contre les surtensions électriques
Plusieurs périphériques peuvent vous protéger contre les fluctuations de la tension et les pannes
d'alimentation :
• Parasurtenseurs
• Filtres de ligne
• Onduleurs
Parasurtenseurs
Les parasurtenseurs et les rampes d'alimentation équipées d'une protection contre la surtension
réduisent les risques d'endommagement de votre ordinateur provoqués par les pointes de tension
pouvant survenir au cours d'un orage électrique ou suite à une coupure de courant. Certains fabricants
offrent également une garantie contre certains types de dégâts. Lisez attentivement la garantie du
parasurtenseur que vous achetez. Un protecteur doté d'une valeur nominale en joules plus élevée offre
une meilleure protection. Comparez les valeurs nominales, en joules, afin de déterminer l'efficacité
relative des différents dispositifs.
AVIS : La plupart des parasurtenseurs ne protègent pas contre les fluctuations de tension ou les coupures de
courant. Lorsqu'un orage est proche, débranchez la ligne téléphonique de la prise murale et déconnectez votre
ordinateur de la prise de courant.
De nombreux parasurtenseurs sont équipés d'une prise téléphonique pour assurer la protection du
modem. Consultez la documentation du parasurtenseur pour obtenir des instructions sur la connexion
du modem.
AVIS : Certains parasurtenseurs n'offrent pas de protection pour les cartes réseau. Déconnectez le câble de
réseau de la prise réseau murale pendant les orages.
Filtres de ligne
AVIS : Les filtres de ligne n'offrent pas de protection contre les coupures de courant.
Ils sont conçus pour maintenir la tension CA à un niveau relativement constant.
Onduleurs
AVIS : Une baisse de tension pendant l'enregistrement des données sur le disque dur peut provoquer une perte de
données ou la corruption du fichier.
REMARQUE : Pour optimiser le temps de fonctionnement de la batterie, connectez uniquement votre ordinateur à
un onduleur. Connectez les autres périphériques, tels que l'imprimante, à une rampe d'alimentation différente
équipée d'un parasurtenseur.
Les onduleurs protègent contre les fluctuations de tension et les coupures de courant. Ils incluent une
batterie qui alimente temporairement les périphériques connectés lorsque l'alimentation secteur est
coupée. La batterie se charge lorsque l'alimentation secteur est disponible. Consultez la documentation
fournie par le fabricant de l'onduleur afin d'obtenir des informations sur la durée de fonctionnement de
la batterie et vous assurer que le dispositif est approuvé par Underwriters Laboratories (UL).Utilisation de l'écran 31
Utilisation de l'écran
Réglage de la luminosité
Lorsque l'ordinateur Dell™ fonctionne avec une batterie, vous pouvez économiser de l'énergie en
réglant le paramètre de luminosité au minimum acceptable à l'aide de et la flèche haut ou
bas du clavier.
REMARQUE : Les combinaisons de touches pour la luminosité n'ont des répercussions que sur l'affichage
de l'ordinateur portable ; elles n'ont aucune répercussion sur les moniteurs ou les projecteurs que vous
connectez au portable ou à la station d'accueil. Si l'ordinateur est connecté à un moniteur externe et que vous
essayez de modifier le niveau de luminosité, il se peut que l'indicateur de luminosité s'affiche, mais le niveau
de luminosité du périphérique externe ne change pas dans tous les cas.
Appuyez sur les touches suivantes pour régler la luminosité de l'écran :
• Appuyez sur et sur la flèche haut pour augmenter la luminosité de l'écran intégré
uniquement (pas sur un moniteur externe).
• Appuyez sur et sur la flèche bas pour réduire la luminosité sur l'écran intégré uniquement
(pas sur un moniteur externe).
Basculement de l'image vidéo
Lorsque vous démarrez un ordinateur auquel un périphérique externe (tel qu'un moniteur externe
ou un projecteur) est connecté et que ce périphérique est sous tension, l'image peut s'afficher sur
l'écran intégré ou sur le périphérique externe.
Appuyez sur pour basculer entre les options d'affichage suivantes pour l'image vidéo :
écran seul, périphérique externe seul ou écran et périphérique externe simultanément.
Réglage de la résolution d'affichage et du taux de
rafraîchissement
Pour qu'un programme s'affiche à une résolution spécifique, le contrôleur vidéo et l'écran doivent
prendre tous deux en charge le programme sélectionné et les pilotes vidéo requis doivent être
installés.
Avant de modifier un paramètre d'affichage par défaut, prenez note du paramètre d'origine et
gardez-le pour référence ultérieure.32 Utilisation de l'écran
Si vous sélectionnez une résolution ou une palette de couleurs plus élevée que celle prise en charge par
l'écran, les paramètres se règlent automatiquement sur la configuration prise en charge la plus proche.
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Sous Choisissez une catégorie, cliquez sur Apparence et thèmes.
3 Sous Choisissez une tâche…, cliquez sur la zone à modifier, ou sous ou une icône du Panneau de
configuration, cliquez sur Affichage.
4 Essayez différents paramètres de Qualité couleur et Résolution d'écran.
REMARQUE : Lorsque vous augmentez la résolution de l'écran, les icônes et le texte apparaissent plus petits.Utilisation du clavier et de la tablette tactile 33
Utilisation du clavier et de la tablette tactile
Pavé numérique
Le pavé numérique fonctionne comme celui d'un clavier externe. Chaque touche du pavé
numérique a plusieurs fonctions. Les chiffres et les symboles du pavé numérique figurent en bleu à
droite de ces touches. Pour taper un chiffre ou un symbole, appuyez sur et sur la touche
désirée après activation du pavé.
• Pour activer le pavé numérique, appuyez sur . Le voyant indique que le pavé
numérique est activé.
• Pour désactiver le pavé numérique, appuyez de nouveau sur .
1 pavé numérique
1
934 Utilisation du clavier et de la tablette tactile
Combinaisons de touches
Fonctions système
Batterie
Plateau du lecteur de CD ou DVD
Fonctions d'affichage
Radios (notamment le réseau sans fil et une carte interne dotée de la technologie sans
fil Bluetooth®)
Ouvre la fenêtre Gestionnaire des tâches.
Affiche la jauge de batterie Dell™ QuickSet. Cette
fonctionnalité n'est pas prise en charge par Dell
MediaDirect. Pour plus d'informations, reportez-vous à la
section « Jauge de batterie Dell™ QuickSet » à la
page 38.
Éjecte le plateau du lecteur (si Dell QuickSet est
installé). Cette fonctionnalité n'est pas prise en charge
par Dell MediaDirect. Pour plus d'informations sur
QuickSet, reportez-vous à la section « Fonctions Dell™
QuickSet » à la page 133.
Bascule l'image vidéo vers l'option d'affichage suivante.
Les options comprennent l'écran intégré, un moniteur
externe et les deux écrans simultanément.
et la touche flèche
haut
Augmente la luminosité sur l'écran intégré uniquement
(non pas sur un moniteur externe).
et la touche flèche
bas
Diminue la luminosité sur l'écran intégré uniquement
(non pas sur un moniteur externe).
Active et désactive les radios, notamment le réseau sans
fil et la carte dotée de la technologie sans fil Bluetooth.Utilisation du clavier et de la tablette tactile 35
Gestion de l'alimentation
Fonctions des haut-parleurs
Fonctions de la touche du logo Microsoft® Windows®
Pour régler les options du clavier, telles que la vitesse de répétition des caractères, ouvrez le panneau de
configuration, cliquez sur Imprimantes et autres périphériques, puis sur Clavier. Pour plus
d'informations sur le panneau de configuration, contactez le Centre d'aide et de support de Windows.
Pour accéder au Centre d'aide et de support, reportez-vous à la page 14.
Active un mode d'économie d'énergie. Vous pouvez
reprogrammer ce raccourci clavier pour activer un autre
mode d'économie d'énergie sous l'onglet Avancé de la
fenêtre Propriétés des options d'alimentation. Reportezvous à la section « Modes d'économie d'énergie » à la
page 40.
Augmente le volume des haut-parleurs intégrés et des hautparleurs externes, si des haut-parleurs externes sont branchés.
Diminue le volume des haut-parleurs intégrés et des hautparleurs externes, si des haut-parleurs externes sont branchés.
Active et désactive les haut-parleurs intégrés et les hautparleurs externes, si des haut-parleurs externes sont branchés.
Touche du logo Windows et Réduit toutes les fenêtres ouvertes.
Touche du logo Windows et
Agrandit toutes les fenêtres.
Touche du logo Windows et Exécute l'Explorateur Windows. Cela ouvre la même
fenêtre que lorsque vous double-cliquez sur Poste de
travail sur le bureau.
Touche du logo Windows et Ouvre la boîte de dialogue Exécuter.
Touche du logo Windows et Ouvre la boîte de dialogue Search Results (Résultats
de la recherche).
Touche du logo Windows et
Ouvre la boîte de dialogue Search Results-Computer
(Résultats de la recherche - Ordinateur)
(si l'ordinateur est connecté à un réseau).
Touche du logo Windows et
Ouvre la boîte de dialogue System Properties
(Propriétés système).36 Utilisation du clavier et de la tablette tactile
Tablette tactile
La tablette tactile détecte la pression et le mouvement de vos doigts pour vous permettre de déplacer le
curseur à l'écran. Utilisez la tablette tactile et ses boutons de la même façon que vous utilisez la souris.
• Posez et déplacez votre doigt sur la surface de la tablette tactile pour déplacer le curseur.
• Pour sélectionner un objet, appuyez délicatement une fois sur la surface de la tablette tactile ou
appuyez avec le pouce sur le bouton gauche de la tablette tactile.
• Pour sélectionner et déplacer (ou faire glisser) un objet, placez le curseur sur l'objet et tapez deux fois
sur la tablette. Laissez votre doigt sur la tablette tactile la deuxième fois et déplacez l'objet sélectionné
en faisant glisser votre doigt sur la surface.
• Pour double-cliquer sur un objet, placez le curseur sur l'objet et appuyez doucement deux fois sur la
tablette tactile ou appuyez deux fois sur le bouton gauche à l'aide de votre pouce.
Personnalisation de la tablette tactile
Vous pouvez désactiver la tablette tactile ou régler ses paramètres à l'aide de la fenêtre de propriétés
Mouse Properties (Souris).
1 Ouvrez le Panneau de configuration, cliquez sur Imprimantes et autres périphériques, puis cliquez sur
Souris. Pour plus d'informations sur le panneau de configuration, contactez le Centre d'aide et de
support de Windows. Pour accéder au Centre d'aide et de support, reportez-vous à la page 14.
2 Dans la fenêtre de propriétés Mouse Properties (Souris), cliquez sur l'onglet Tablette tactile pour
régler les paramètres de la tablette tactile.
3 Cliquez sur OK pour enregistrer les paramètres et fermer la fenêtre.
1 tablette tactile
1Utilisation d'une batterie 37
Utilisation d'une batterie
Performances de la batterie
REMARQUE : Pour obtenir des informations sur la garantie Dell de votre ordinateur, reportez-vous au Guide
d'information sur le produit ou au document de garantie livré avec votre ordinateur.
Pour un fonctionnement optimal et afin de préserver les paramètres du BIOS, laissez la batterie
principale installée en permanence dans votre ordinateur portable Dell™. Votre ordinateur est livré
avec une batterie, installée dans la baie.
REMARQUE : Lors de la première utilisation de votre ordinateur, la batterie n'étant pas obligatoirement
complètement chargée, utilisez l'adaptateur secteur pour raccorder votre nouvel ordinateur à une prise
secteur. Pour de meilleurs résultats, utilisez l'adaptateur secteur tant que la batterie n'est pas complètement
chargée. Pour afficher le niveau de charge de la batterie, accédez au Panneau de configuration, cliquez sur
Options d'alimentation, puis cliquez sur l'onglet Jauge d'alimentation.
REMARQUE : L'autonomie de la batterie (la période durant laquelle la batterie reste chargée) diminue avec
le temps. Selon la fréquence d'utilisation et les conditions de fonctionnement de la batterie, il est possible que
vous deviez en acheter une autre au cours de la durée de vie de votre ordinateur.
L'autonomie de la batterie varie en fonction des conditions de fonctionnement. Cette durée est
considérablement réduite par l'exécution de certaines opérations, notamment, sans que cela soit
limitatif :
• Utilisation des lecteurs optiques
• Utilisation de périphériques de communications sans fil, de cartes ExpressCard, de cartes
mémoire multimédia ou de périphériques USB
• Utilisation de paramètres élevés d'affichage et de luminosité, d'économiseurs d'écran en 3D ou
d'autres programmes gourmands en ressources, tels que des jeux en 3D
• Fonctionnement de l'ordinateur en mode de performances optimales (reportez-vous à la section
« Configuration des paramètres de gestion de l'alimentation » à la page 41).
REMARQUE : Il est recommandé de connecter l'ordinateur à une prise électrique lorsque vous gravez un CD
ou DVD.
Vous pouvez vérifier le niveau de charge de la batterie (reportez-vous à la section « Vérification de la
charge de la batterie » à la page 38) avant d'insérer la batterie dans l'ordinateur. Vous pouvez
également définir des options de gestion de l'alimentation afin que l'ordinateur vous alerte lorsque le
niveau de charge de la batterie est faible. Pour des informations sur l'accès à Quickset ou à la fenêtre
Propriétés des options d'alimentation, reportez-vous à la section « Configuration des paramètres de
gestion de l'alimentation » à la page 41.38 Utilisation d'une batterie
PRÉCAUTION : L'utilisation d'une batterie non compatible peut accroître le risque d'incendie ou d'explosion.
Ne remplacez la batterie que par une batterie compatible achetée auprès de Dell. La batterie est conçue pour
fonctionner avec votre ordinateur Dell. N'utilisez pas la batterie d'un autre ordinateur.
PRÉCAUTION : Ne jetez pas les batteries avec les ordures ménagères. Lorsque votre batterie ne tient plus sa
charge, contactez votre service municipal de traitement des déchets pour savoir comment vous en débarrasser.
Reportez-vous à la section « Mise au rebut de la batterie » du Guide d'information sur le produit.
PRÉCAUTION : Une utilisation inadéquate de la batterie peut augmenter le risque d'incendie ou de brûlure
chimique. Prenez soin de ne pas la percer, l'incinérer, la démonter ou l'exposer à une température supérieure à
65 °C (149 °F). Conservez la batterie hors de portée des enfants. Manipulez les batteries endommagées ou percées
avec d'extrêmes précautions. Les batteries endommagées peuvent fuir et causer des dommages personnels ou
matériels.
Vérification de la charge de la batterie
La jauge de batterie Dell QuickSet, la fenêtre de jauge de Microsoft® Windows®, l'icône , la jauge
de charge et la jauge d'état de la batterie, ainsi que l'alerte de batterie faible fournissent des informations
sur le niveau de charge de la batterie.
Jauge de batterie Dell™ QuickSet
Si Dell QuickSet est installé, appuyez sur pour afficher la jauge de batterie QuickSet. La
fenêtre Jauge de batterie affiche l'état, le niveau de charge et la durée nécessaire pour le chargement
complet de la batterie de votre ordinateur. Pour des informations sur QuickSet, cliquez avec le bouton
droit de la souris sur l'icône de la barre des tâches, puis cliquez sur Aide.
Microsoft® Windows® Jauge
La jauge de Windows indique la charge de batterie restante. Pour consulter la jauge, double-cliquez sur
l'icône de la barre des tâches. Pour plus d'informations sur la jauge d'alimentation, reportez-vous à la
section « Configuration des paramètres de gestion de l'alimentation » à la page 41.
Si l'ordinateur est relié à une prise secteur, l'icône apparaît.
Indicateur de charge
En appuyant une fois sur le bouton d'état de l'indicateur de charge de la batterie ou en appuyant et en
maintenant enfoncé ce bouton, vous pouvez vérifier les éléments suivants :
• Le niveau de charge de la batterie (appuyez et relâchez le bouton d'état)
• L'état de fonctionnement de la batterie (appuyez et maintenez enfoncé le bouton d'état)
L'autonomie de la batterie est déterminée en grande partie par le nombre de charges qu'elle reçoit. Après
des centaines de cycles de charge et de décharge, la capacité de charge des batteries diminue et l'état des
batteries se dégrade. C'est pourquoi, une batterie peut afficher l'état « chargé » tout en maintenant un
niveau de charge réduit (état). Utilisation d'une batterie 39
Vérification du niveau de charge de la batterie
Pour vérifier le niveau de charge de la batterie, appuyez sur le bouton d'état, situé sur l'indicateur de
charge de la batterie, et relâchez-le pour allumer les voyants de niveau de charge. Chaque voyant
représente environ 20 pour cent de la charge totale de la batterie. S'il reste, par exemple, 80 pour cent de
la charge de la batterie, quatre des voyants sont allumés. Si aucun voyant n'est allumé, la batterie est
complètement déchargée.
Vérification de l'état de fonctionnement de la batterie
REMARQUE : Vous pouvez vérifier l'état de fonctionnement de la batterie de l'une des deux manières suivantes :
en utilisant l'indicateur de charge de la batterie comme décrit ci-dessous ou en utilisant la jauge de batterie de Dell
QuickSet. Pour des informations sur QuickSet, cliquez avec le bouton droit de la souris sur l'icône de la barre
des tâches, puis cliquez sur Aide.
Pour vérifier l'état de fonctionnement de la batterie à l'aide de l'indicateur de charge, appuyez sur le
bouton d'état de l'indicateur de charge de la batterie et maintenez-le enfoncé pendant au moins
3 secondes. Si aucun voyant ne s'allume, la batterie est en bon état et elle dispose encore de plus de
80 pour cent de sa capacité de charge d'origine. Chaque voyant représente une dégradation
incrémentielle. Si cinq voyants s'allument, la batterie dispose de moins de 60 pour cent de sa capacité de
charge et vous devez envisager son remplacement. Pour plus d'informations sur l'autonomie de la
batterie, reportez-vous à la section « Caractéristiques » à la page 157.
Alerte de batterie faible
AVIS : Pour éviter de perdre ou de corrompre des données, enregistrez votre travail juste après l'apparition de
l'alerte de batterie faible, puis branchez l'ordinateur sur une prise murale. Si la batterie est complètement
déchargée, l'ordinateur passe automatiquement en mode Mise en veille prolongée.
Par défaut, une fenêtre contextuelle vous avertit lorsque la batterie est déchargée à environ 90 pour cent.
Vous pouvez modifier les paramètres des alertes relatives à la batterie. Pour des informations sur l'accès à
Quickset ou à la fenêtre Propriétés des options d'alimentation, reportez-vous à la section
« Configuration des paramètres de gestion de l'alimentation » à la page 41.
Préservation de l'alimentation par batterie
Procédez comme suit pour économiser l'alimentation de la batterie :
• Connectez l'ordinateur à une prise secteur aussi souvent que possible car la durée de vie de la batterie
est largement déterminée par le nombre d'utilisations et de recharges.
• Mettez l'ordinateur en mode Veille ou en mode Mise en veille prolongée lorsque vous le laissez allumé
sans l'utiliser pendant de longs laps de temps. Pour plus d'informations sur les modes Veille et Mise en
veille prolongée, reportez-vous à la section « Modes d'économie d'énergie » à la page 40.
• Vous pouvez sélectionner des options à l'aide de l'Assistant Gestion de l'alimentation afin d'optimiser
l'utilisation de l'énergie de votre ordinateur. Vous pouvez également configurer ces options pour changer
lorsque vous appuyez sur le bouton d'alimentation, fermez l'écran ou appuyez sur <Échap>.
Reportez-vous à la section « Configuration des paramètres de gestion de l'alimentation » à la page 41
pour plus d'informations sur l'utilisation de l'Assistant Gestion de l'alimentation.
REMARQUE : Reportez-vous à la section « Performances de la batterie » à la page 37 pour plus d'informations sur
la préservation de l'alimentation par batterie.40 Utilisation d'une batterie
Modes d'économie d'énergie
Mode Veille
Le mode Veille permet d'économiser l'énergie en désactivant l'affichage et le disque dur au terme d'une
période d'inactivité prédéterminée (délai d'attente). Lorsque l'ordinateur quitte le mode Veille, il
retourne à son état précédent.
AVIS : Si l'alimentation secteur ou sur batterie est coupée alors que l'ordinateur est en mode Veille, vous risquez
de perdre des données.
Pour passer en mode Veille :
• Cliquez sur le bouton Démarrer, sur Arrêter l'ordinateur, puis sur Veille.
ou
• Selon les options de gestion de l'alimentation configurées sous l'onglet Avancé (reportez-vous à la
section « Configuration des paramètres de gestion de l'alimentation » à la page 41) de la fenêtre
Propriétés des Options d'alimentation, utilisez l'une des méthodes suivantes :
– Appuyez sur le bouton d'alimentation.
– Fermez l'écran.
– Appuyez sur <Échap>.
En fonction de la configuration des options de l'onglet Avancé, appuyez sur le bouton d'alimentation
électrique ou ouvrez l'écran pour quitter le mode Veille. Vous ne pouvez pas quitter le mode Veille au
moyen d'une touche ou de la tablette tactile.
Mode Mise en veille prolongée
Le mode Mise en veille prolongée économise l'énergie en copiant les données système dans une zone
réservée du disque dur avant d'éteindre complètement l'ordinateur. Lorsque l'ordinateur quitte le mode
Mise en veille prolongée, il retourne à son état précédent.
AVIS : Vous ne pouvez ni retirer des périphériques ni déconnecter votre ordinateur de la station d'accueil lorsqu'il
est en mode Mise en veille prolongée.
Votre ordinateur passe en mode Mise en veille prolongée quand le niveau de charge de la batterie devient
insuffisant.
Pour passer en mode Mise en veille prolongée manuellement :
• Cliquez sur le bouton Démarrer, puis sur Arrêter l'ordinateur, appuyez sur et maintenez la
touche enfoncée, puis cliquez sur Mise en veille prolongée.
ou
• Selon les options de gestion de l'alimentation configurées dans l'onglet Avancé de la fenêtre Propriétés
des options d'alimentation, utilisez l'une des méthodes suivantes pour passer en mode Mise en veille
prolongée :
– Appuyez sur le bouton d'alimentation.
– Fermez l'écran.
– Appuyez sur .Utilisation d'une batterie 41
REMARQUE : Certaines cartes ExpressCard peuvent ne pas fonctionner correctement lorsque l'ordinateur sort du
mode Mise en veille prolongée. Retirez et réinsérez la carte (reportez-vous à la section « Retrait d'une carte
ExpressCard ou d'un cache » à la page 67) ou redémarrez tout simplement l'ordinateur.
Pour quitter le mode Mise en veille prolongée, appuyez sur le bouton d'alimentation. L'ordinateur peut
mettre quelques instants à quitter le mode Mise en veille prolongée. Vous ne pouvez pas quitter le mode
Mise en veille prolongée au moyen d'une touche ou de la tablette tactile. Pour plus d'informations sur le
mode Mise en veille prolongée, consultez la documentation livrée avec votre système d'exploitation.
Configuration des paramètres de gestion de l'alimentation
Vous pouvez utiliser l'Assistant Gestion de l'alimentation de QuickSet ou les propriétés des options
d'alimentation de Windows pour configurer les paramètres de gestion de l'alimentation sur votre
ordinateur.
• Pour accéder à l'Assistant Gestion de l'alimentation QuickSet, double-cliquez sur l'icône dans la
barre des tâches. Pour plus d'informations sur QuickSet, cliquez sur le bouton Aide dans l'Assistant
Gestion de l'alimentation.
• Pour accéder à la fenêtre Propriétés des options d'alimentation, cliquez sur le bouton Démarrer→
Panneau de configuration→ Performances et maintenance→ Options d'alimentation. Pour des
informations sur les champs de la fenêtre Propriétés des options d'alimentation, cliquez sur l'icône
Point d'interrogation dans la barre de titre, puis sur la zone sur laquelle vous souhaitez obtenir des
informations.
Chargement de la batterie
REMARQUE : Avec Dell™ ExpressCharge™, l'adaptateur secteur charge une batterie complètement déchargée
en 1 heure si l'ordinateur est éteint. La durée de chargement est plus longue lorsque l'ordinateur est sous tension.
Vous pouvez laisser la batterie dans l'ordinateur aussi longtemps que vous le souhaitez. Les circuits internes de la
batterie préviennent toute surcharge.
Lorsque vous branchez l'ordinateur sur une prise secteur ou que vous installez une batterie pendant que
l'ordinateur est branché sur une prise secteur, l'ordinateur vérifie le niveau de charge et la température de
la batterie. Au besoin, l'adaptateur secteur charge alors la batterie et maintient le niveau de charge.
Si la batterie est chaude parce qu'elle se trouvait dans l'ordinateur ou en raison de la température
extérieure, il est probable qu'elle ne se charge pas lorsque vous branchez l'ordinateur sur une prise
secteur.
Si le voyant clignote alternativement vert et orange, la batterie est trop chaude pour être chargée.
Débranchez l'ordinateur de la prise secteur et laissez refroidir l'ordinateur et la batterie jusqu'à ce qu'ils
atteignent la température ambiante. Branchez alors l'ordinateur sur une prise secteur et continuez à
charger la batterie.
Pour plus d'informations sur la résolution des problèmes liés à la batterie, reportez-vous à la section
« Problèmes d'alimentation » à la page 97.
Remplacement de la batterie
PRÉCAUTION : Avant d'exécuter ces procédures, éteignez votre ordinateur, débranchez l'adaptateur secteur de
la prise secteur et de l'ordinateur, débranchez le modem de la prise murale et de l'ordinateur et retirez les autres
câbles externes de l'ordinateur.42 Utilisation d'une batterie
AVIS : Vous devez retirer tous les câbles externes de l'ordinateur pour éviter d'endommager les connecteurs.
PRÉCAUTION : L'utilisation d'une batterie non compatible peut accroître le risque d'incendie ou d'explosion.
Ne remplacez la batterie que par une batterie compatible achetée auprès de Dell. La batterie est conçue pour
fonctionner avec votre ordinateur Dell™, n'utilisez pas la batterie d'un autre ordinateur.
AVIS : Si vous décidez de remplacer la batterie alors que l'ordinateur est en veille, vous disposez d'une minute
pour effectuer cette opération. Passé ce délai, l'ordinateur s'éteint et toutes les données non enregistrées sont
définitivement perdues.
Pour retirer la batterie :
1 Si l'ordinateur est connecté à une station d'accueil, déconnectez-le. Pour obtenir des instructions,
consultez la documentation qui accompagne la station d'accueil.
2 Assurez-vous que l'ordinateur est éteint ou en mode de gestion de l'alimentation.
3 Faites glisser en le maintenant le loquet de fermeture de la baie de la batterie, situé sous l'ordinateur,
puis retirez la batterie de la baie.
Pour remettre en place la batterie, suivez la procédure de retrait dans l'ordre inverse.
Stockage de la batterie
Retirez la batterie de l'ordinateur lorsque vous rangez ce dernier pendant une période prolongée. Sinon,
la batterie finira par se décharger. Après une longue période de stockage, rechargez complètement la
batterie avant de l'utiliser (reportez-vous à la section « Chargement de la batterie » à la page 41).
1 batterie 2 loquet de fermeture de la baie de batterie
2
1Utilisation de CD, de DVD et d'autres supports multimédias 43
Utilisation de CD, de DVD et d'autres supports
multimédias
Lecture CD ou DVD
AVIS : N'exercez pas de pression vers le bas sur le plateau du lecteur de CD ou de DVD lorsque vous l'ouvrez
ou le fermez. Laissez le plateau fermé lorsque vous n'utilisez pas le lecteur.
AVIS : Ne déplacez pas l'ordinateur lors de la lecture de CD ou de DVD.
1 Appuyez sur le bouton d'éjection qui se trouve sur le devant du lecteur.
2 Tirez sur le plateau.
3 Placez le disque, étiquette vers le haut, au centre du plateau et enclenchez-le sur l'axe.
REMARQUE : Si vous utilisez un module expédié avec un autre ordinateur, installez les pilotes et les logiciels
nécessaires à la lecture de DVD ou à l'écriture de données. Pour plus d'informations, reportez-vous au CD
Drivers and Utilities (le CD Drivers and Utilities est en option et n'est pas obligatoirement disponible pour votre
ordinateur ou dans certains pays).
4 Poussez le plateau du lecteur pour le refermer.44 Utilisation de CD, de DVD et d'autres supports multimédias
Pour formater les CD afin de stocker des données, créer des CD de musique ou copier des CD, reportezvous au logiciel du CD livré avec votre ordinateur.
REMARQUE : Assurez-vous d'être en règle avec les lois relatives aux droits d'auteur lorsque vous créez des CD.
Les lecteurs de CD sont dotés des boutons essentiels suivants :
Les lecteurs de DVD sont dotés des boutons essentiels suivants :
Pour plus d'informations sur la lecture de CD ou DVD, cliquez sur Aide sur le lecteur de CD ou DVD (si
disponible).
Lecture.
Marche arrière dans la plage en cours.
Pause.
Marche avant dans la plage en cours.
Arrêt.
Revenir à la plage précédente.
Éjecter.
Passer à la plage suivante.
Arrêt.
Redémarrer le chapitre en cours.
Lecture.
Avance rapide.
Pause.
Retour rapide.
Avancer d'une trame en mode Pause.
Passer au titre ou au chapitre suivant.
Lecture continue du titre ou du chapitre en cours.
Revenir au titre ou au chapitre précédent.
Éjecter.Utilisation de CD, de DVD et d'autres supports multimédias 45
Réglage du volume
REMARQUE : Lorsque les haut-parleurs sont mis en sourdine, vous ne pouvez pas entendre le son du CD ou
du DVD.
1 Cliquez sur le bouton Démarrer, pointez sur Tous les programmes (ou Programmes)→ Accessoires→
Divertissement (ou Multimédia), puis cliquez sur Contrôle du volume.
2 Dans la fenêtre Contrôle du volume, cliquez et faites glisser la barre située dans la colonne Contrôle
du volume, puis déplacez-la vers le haut ou le bas pour augmenter ou diminuer le volume.
Pour plus d'informations sur les options de contrôle du volume, cliquez sur Aide dans la fenêtre Contrôle
du volume.
L'indicateur de volume affiche le niveau du volume actuel, même lorsque le son est mis en sourdine, sur
votre ordinateur. Vous pouvez cliquer sur l'icône dans la barre des tâches et sélectionner ou
désélectionner Disable On Screen Volume Meter (Désactiver l'indicateur de volume à l'écran) ou
appuyer sur les boutons de contrôle du volume pour activer ou désactiver l'indicateur de volume à
l'écran.
Lorsque l'indicateur est activé, réglez le volume à l'aide des boutons de contrôle du volume ou en
appuyant sur les touches suivantes :
• Appuyez sur pour augmenter le volume.
• Appuyez sur pour réduire le volume.
• Appuyez sur pour mettre le volume en sourdine.
Pour plus d'informations sur QuickSet, cliquez avec le bouton droit de la souris sur l'icône dans la
barre des tâches, puis cliquez sur Aide.
Réglage de l'image
Si un message d'erreur vous informe que la résolution et la profondeur de couleur en cours utilisent trop
de mémoire et empêchent la lecture du DVD, réglez les propriétés d'affichage.
1 icône du volume 2 indicateur de volume 3 icône de mise en sourdine
1
3
246 Utilisation de CD, de DVD et d'autres supports multimédias
Microsoft® Windows® XP
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Sous Choisissez une catégorie, cliquez sur Apparence et thèmes.
3 Sous Choisir une tâche..., cliquez sur Change the screen resolution (Modifier la résolution de l'écran).
4 Dans la fenêtre Propriétés de l'affichage, cliquez sur la barre de Résolution de l'écran et faites-la glisser
pour définir la résolution à 1024 sur 768 pixels.
5 Cliquez sur le menu déroulant sous Qualité couleur, puis cliquez sur Moyenne 16 bits.
6 Cliquer sur OK.
Utilisation de Dell Media Experience™ et de Dell MediaDirect™
REMARQUE : Dell MediaDirect™ est en option et peut ne pas être fourni avec votre ordinateur.
REMARQUE : Dell QuickSet est requis pour le bon fonctionnement de Dell MediaDirect. La modification ou la
désactivation des paramètres par défaut de QuickSet peuvent limiter les fonctionnalités de Dell MediaDirect. Pour
plus d'informations sur Dell QuickSet, reportez-vous à la section « Fonctions Dell™ QuickSet » à la page 133.
Appuyez sur le bouton Dell MediaDirect, situé à l'avant de l'ordinateur, pour lancer Dell Media
Experience ou Dell MediaDirect.
Si l'ordinateur est allumé ou en mode Veille
Si vous appuyez sur le bouton Dell MediaDirect tandis que l'ordinateur est sous tension ou en mode
Veille, Windows XP Media Center Manager ou Dell Media Experience s'exécute, en fonction de la
configuration de votre système.
Si l'ordinateur est éteint ou en mode Mise en veille prolongée
Lorsque votre ordinateur est hors tension ou en mode Mise en veille prolongée, vous pouvez appuyer sur
le bouton Dell MediaDirect pour le démarrer et lancer automatiquement l'application Dell MediaDirect.
1 bouton Dell MediaDirect
1Utilisation de CD, de DVD et d'autres supports multimédias 47
REMARQUE : Vous ne pouvez pas réinstaller la fonction Dell Media Experience ou Dell MediaDirect si vous
reformatez involontairement le disque dur. Le logiciel d'installation est requis pour réinstaller ces applications
multimédia. Contactez Dell pour obtenir une assistance. Reportez-vous à la section « Contacter Dell » à la
page 137.
Aide de Dell MediaDirect et Dell Media Experience
L'application multimédia de Dell sur votre ordinateur contient des informations d'aide. Lorsque vous
lancez l'application multimédia, cliquez sur l'icône du bureau pour obtenir une aide supplémentaire.
Utilisation du CD Repair Utility (Utilitaire de réparation) de Dell MediaDirect™ ou du CD
Reinstallation (Réinstallation) de Dell MediaDirect
CD Repair Utility (Utilitaire de réparation)
REMARQUE : L'utilitaire de réparation peut être enregistré sur le CD Drivers and Utilities plutôt que sur le CD
Repair Utility, ou bien il peut être téléchargé.
Utilisez le CD Repair Utility pour réparer Dell MediaDirect lorsque :
• Votre ordinateur est encore équipé de son disque dur d'origine, mais que :
– Dell MediaDirect ne fonctionne par correctement.
– Dell MediaDirect ne s'exécute pas lorsque vous appuyez sur le bouton Dell MediaDirect.
– Vous devez réinstaller le système d'exploitation Microsoft® Windows®.
• Vous recevez ce kit avec un nouvel ordinateur et vous souhaitez modifier la façon dont votre disque dur
est partitionné.
AVIS : Ne modifiez la façon dont votre disque dur est partitionné que si vous êtes sûr de ce que vous faites.
Pour plus d'informations sur l'utilitaire de réparation, reportez-vous à la section « Réparation de Dell
MediaDirect ».
1 bouton Dell MediaDirect
148 Utilisation de CD, de DVD et d'autres supports multimédias
CD Reinstallation (Réinstallation)
Utilisez le CD Reinstallation pour réinstaller Dell MediaDirect lorsque vous souhaitez remplacer votre
disque dur existant par un nouveau lecteur à l'aide de ce kit. Pour plus d'informations, reportez-vous à la
section « Réinstallation du logiciel Dell MediaDirect ».
Réparation de Dell MediaDirect
REMARQUE : Reportez-vous à la section « CD Repair Utility (Utilitaire de réparation) » pour savoir si vous devez
plutôt réparer Dell MediaDirect au lieu de le réinstaller. Si vous utilisez le CD Repair Utility alors que vous devriez
réinstaller Dell MediaDirect, il se peut que le processus ne se termine pas correctement.
REMARQUE : L'utilitaire de réparation peut être enregistré sur le CD Drivers and Utilities plutôt que sur le CD
Repair Utility, ou bien il peut être téléchargé.
Pour réparer Dell MediaDirect sur votre disque dur :
1 Insérez le CD Repair Utility (ou le CD Drivers and Utilities, le cas échéant) dans le lecteur optique et
redémarrez votre ordinateur.
2 Appuyez sur la touche dès l'apparition du logo Dell pour entrer dans le menu d'amorçage.
3 Appuyez sur la flèche vers le bas pour mettre en surbrillance le premier CD de la liste.
4 Appuyez sur pour démarrer à partir du CD.
REMARQUE : Si vous utilisez le CD Drivers and Utilities, tapez après avoir démarré à partir du CD.
5 À l'invite, tapez la commande cd \MD2 et appuyez sur .
6 Saisissez Repair (réparer) et appuyez sur .
L'utilitaire de réparation de Dell MediaDirect s'ouvre. Pour lancer l'utilitaire pour réparer Dell
MediaDirect :
1 Utilisez les touches de direction pour sélectionner OK et appuyez sur .
2 Lorsque le message Terminé apparaît, retirez le CD du lecteur et appuyez sur le bouton
d'alimentation pour éteindre l'ordinateur.
Vous pouvez maintenant utiliser le bouton Dell MediaDirect de votre ordinateur pour lancer Dell
MediaDirect.
Réinstallation de Dell MediaDirect
REMARQUE : Reportez-vous à la section « CD Reinstallation (Réinstallation) » pour savoir si vous devez plutôt
réinstaller Dell MediaDirect au lieu de le réparer. Si vous utilisez le CD Reinstallation alors que vous devriez réparer
Dell MediaDirect, il se peut que le processus ne se termine pas correctement.
Pour pouvoir réinstaller le logiciel Dell MediaDirect, vous devez préparer votre disque dur. Après avoir
remplacé le disque, suivez les instructions décrites à la section « Préparation du disque dur pour la
réinstallation de Dell MediaDirect » lorsque vous installez le système d'exploitation Windows XP.
Une fois votre disque dur prêt, vous pouvez réinstaller les pilotes matériels et les logiciels (consultez les
Guides de réinstallation de Dell à l'adresse support.dell.com). Ensuite, suivez les instructions décrites à
la section « Réinstallation du logiciel Dell MediaDirect ».Utilisation de CD, de DVD et d'autres supports multimédias 49
Préparation du disque dur pour la réinstallation de Dell MediaDirect
Lorsque vous installez le système d'exploitation Windows XP, vous devez partitionner le disque dur et
réserver 1308 Mo d'espace non partitionné pour Dell MediaDirect.
REMARQUE : Vous pouvez créer trois partitions maximum, en plus de l'espace non partitionné réservé à Dell
MediaDirect.
Pour créer une partition sur votre disque dur :
1 Appuyez sur la touche pour accepter le contrat de licence lors de l'installation de Windows XP.
2 Sur la fenêtre de configuration des partitions, utilisez les touches de direction pour sélectionner
l'espace non partitionné.
3 Tapez C pour créer une nouvelle partition à l'aide de l'espace non partitionné.
REMARQUE : Pour créer suffisamment d'espace sur votre disque dur pour la partition de Dell MediaDirect, vous
devez calculer la taille de la partition en méga-octets (Mo), en soustrayant 1308 à la quantité d'espace disponible
en Mo sur le disque dur.
4 Entrez la taille désirée en Mo pour la nouvelle partition et appuyez sur .
5 Utilisez les touches de direction pour sélectionner la partition créée et appuyez sur .
6 Sélectionnez Formater la partition en utilisant le système de fichiers NTFS (Rapide) et appuyez sur
.
7 Consultez le guide d'installation de Windows XP pour terminer l'installation de Windows XP. Lorsque
toutes les étapes de l'installation de Windows XP sont passées et que le bureau apparaît, vous pouvez
réinstaller le logiciel Dell MediaDirect.
Réinstallation du logiciel Dell MediaDirect
REMARQUE : Reportez-vous à la section « CD Reinstallation (Réinstallation) » pour savoir si vous devez plutôt
réinstaller Dell MediaDirect au lieu de le réparer.Si vous utilisez le CD Reinstallation alors que vous devriez réparer
Dell MediaDirect, il se peut que le processus ne se termine pas correctement.
REMARQUE : Suivez les instructions décrites à la section « Préparation du disque dur pour la réinstallation de
Dell MediaDirect » avant de réinstaller le logiciel Dell MediaDirect. Si vous ne le faites pas, vous recevrez un
message d'erreur lors de la réinstallation du logiciel. Si vous recevez un message d'erreur, réinstallez Windows XP
ou procurez-vous un utilitaire qui vous permettra de partitionner un disque dur à partition unique avec un système
d'exploitation déjà installé dessus.
Pour réinstaller le logiciel Dell MediaDirect :
1 Insérez le CD Reinstallation dans le lecteur optique.
La fenêtre Dell MediaDirect™ s'ouvre.
2 Appuyez sur pour réinstaller Dell MediaDirect.
Un message indiquant la fin du processus de réinstallation apparaît.
3 Retirez le CD Reinstallation du lecteur optique et appuyez sur pour fermer la fenêtre de
réinstallation.
4 Arrêtez l'ordinateur à l'aide du menu Démarrer.
5 Utilisez le bouton Dell MediaDirect de votre ordinateur pour lancer Dell MediaDirect et terminer le
processus de réinstallation.50 Utilisation de CD, de DVD et d'autres supports multimédias
Connexion de votre ordinateur à un périphérique téléviseur ou
audio
REMARQUE : Votre ordinateur n'est pas livré avec tous les câbles audio et vidéo nécessaires pour le relier à un
téléviseur ou à un autre périphérique audio. Il est possible d'acheter des câbles et des câbles d'adaptateur
TV/audio numérique auprès de Dell.
Votre ordinateur est doté d'un connecteur de sortie TV S-vidéo qui vous permet de raccorder l'ordinateur
à un téléviseur par un câble S-vidéo standard, un câble d'adaptateur vidéo composite ou un câble
d'adaptateur vidéo composante (disponible auprès de Dell).
1 connecteur de sortie TV S-vidéo 2 connecteur S-vidéo
1 connecteur de sortie TV S-vidéo 2 adaptateur vidéo composite 3 connecteur audio numérique
S/PDIF
4 connecteur de sortie vidéo composite 5 connecteur S-vidéo
1 connecteur de sortie TV S-vidéo 2 adaptateur vidéo composante 3 connecteur audio numérique
S/PDIF
4 connecteur de sortie vidéo
composante Pr (rouge)
5 connecteur de sortie vidéo
composante Pb (bleu)
6 connecteur de sortie vidéo
composante Y (vert)
1 2
5
4
3
1 2
5
4
3
1 2
6Utilisation de CD, de DVD et d'autres supports multimédias 51
Votre téléviseur est doté d'un connecteur d'entrée S-vidéo, d'un connecteur d'entrée vidéo composite ou
d'un connecteur d'entrée vidéo composante. En fonction du type de connecteur disponible sur votre
téléviseur, vous pouvez utiliser un câble S-vidéo, vidéo composite ou vidéo composante disponible dans
le commerce pour relier l'ordinateur au téléviseur.
Il est recommandé de connecter les câbles vidéo et audio à l'ordinateur selon l'une des combinaisons
suivantes.
REMARQUE : Reportez-vous aux schémas situés au début de chaque sous-section pour déterminer la méthode
de connexion la plus appropriée.
• S-vidéo et audio standard
• Vidéo composante et audio standard
• Audio standard et sortie vidéo composante
Lorsque vous avez terminé de connecter les câbles vidéo et audio entre l'ordinateur et le téléviseur, vous
devez activer votre ordinateur pour qu'il fonctionne avec le téléviseur. Reportez-vous à la section
« Activation des paramètres d'écran d'un téléviseur » à la page 63 pour vérifier que l'ordinateur reconnaît
le téléviseur et fonctionne correctement avec celui-ci. En outre, si vous utilisez l'audio numérique
S/PDIF, reportez-vous à la section « Activation de l'audio numérique S/PDIF » à la page 62.
S-vidéo et audio standard
1 connecteur audio 2 connecteur de sortie TV S-vidéo
1
252 Utilisation de CD, de DVD et d'autres supports multimédias
1 Éteignez l'ordinateur et le téléviseur et/ou le périphérique audio que vous souhaitez connecter.
REMARQUE : Vous pouvez brancher un câble S-vidéo directement sur le connecteur de sortie TV S-vidéo situé
sur l'ordinateur (sans passer par le câble d'adaptateur audio numérique/TV) si votre téléviseur ou périphérique
audio prend en charge la technologie S-vidéo mais pas l'audio numérique S/PDIF.
2 Branchez une extrémité du câble S-vidéo dans le connecteur de sortie S-vidéo de l'ordinateur.
3 Reliez l'autre extrémité du câble S-vidéo au connecteur d'entrée S-vidéo.
4 Branchez l'extrémité à un seul connecteur du câble audio dans la prise casque de l'ordinateur.
5 Branchez les deux connecteurs RCA situés à l'autre extrémité du câble audio dans les connecteurs
d'entrée audio situés sur le téléviseur ou sur un autre périphérique audio.
6 Allumez le téléviseur et tous les périphériques audio connectés (le cas échéant), puis l'ordinateur.
7 Reportez-vous à la section « Activation des paramètres d'écran d'un téléviseur » à la page 63 pour
vérifier que l'ordinateur reconnaît le téléviseur et fonctionne correctement avec celui-ci.
1 câble S-vidéo standard 2 câble audio standard
1
2Utilisation de CD, de DVD et d'autres supports multimédias 53
S-vidéo et audio numérique S/PDIF
1 Éteignez l'ordinateur et le téléviseur et/ou le périphérique audio que vous souhaitez connecter.
2 Connectez l'adaptateur vidéo composite au connecteur de sortie TV S-vidéo situé sur l'ordinateur.
1 connecteur de sortie TV S-vidéo 2 adaptateur vidéo composite
1 adaptateur vidéo composite 2 câble S-vidéo 3 câble audio numérique S/PDIF
1 2
1
2
354 Utilisation de CD, de DVD et d'autres supports multimédias
3 Branchez une extrémité du câble S-vidéo dans le connecteur de sortie S-vidéo de l'adaptateur vidéo
composite.
4 Reliez l'autre extrémité du câble S-vidéo au connecteur d'entrée S-vidéo situé sur le téléviseur.
5 Reliez une extrémité du câble audio numérique S/PDIF au connecteur audio numérique sur le câble
d'adaptateur vidéo composite.
6 Branchez l'autre extrémité du câble audio numérique S/PDIF sur le connecteur d'entrée audio situé
sur le téléviseur ou le périphérique audio.
7 Allumez le téléviseur et tous les périphériques audio connectés (le cas échéant), puis l'ordinateur.
8 Reportez-vous à la section « Activation des paramètres d'écran d'un téléviseur » à la page 63 pour
vérifier que l'ordinateur reconnaît le téléviseur et fonctionne correctement avec celui-ci.
1 adaptateur vidéo composite 2 câble S-vidéo
1 adaptateur vidéo composite 2 câble audio numérique S/PDIF
1 2
1 2Utilisation de CD, de DVD et d'autres supports multimédias 55
Vidéo composite et audio standard
1 Éteignez l'ordinateur et le téléviseur et/ou le périphérique audio que vous souhaitez connecter.
2 Connectez l'adaptateur vidéo composite au connecteur de sortie TV S-vidéo situé sur l'ordinateur.
3 Branchez une extrémité du câble vidéo composite sur le connecteur de sortie vidéo composite situé sur
l'adaptateur vidéo composite.
1 connecteur d'entrée audio 2 connecteur de sortie TV S-vidéo 3 adaptateur vidéo composite
1 adaptateur vidéo composite 2 câble vidéo composite 3 câble audio standard
2
1
3
1
2
356 Utilisation de CD, de DVD et d'autres supports multimédias
4 Reliez l'autre extrémité du câble vidéo composite au connecteur d'entrée vidéo composite du
téléviseur.
5 Branchez l'extrémité à un seul connecteur du câble audio dans la prise casque de l'ordinateur.
6 Branchez les deux connecteurs RCA situés à l'autre extrémité du câble audio dans les connecteurs
d'entrée audio situés sur le téléviseur ou sur un autre périphérique audio.
7 Allumez le téléviseur et tous les périphériques audio connectés (le cas échéant), puis l'ordinateur.
8 Reportez-vous à la section « Activation des paramètres d'écran d'un téléviseur » à la page 63 pour
vérifier que l'ordinateur reconnaît le téléviseur et fonctionne correctement avec celui-ci.
Vidéo composite et audio numérique S/PDIF
1 adaptateur vidéo composite 2 câble vidéo composite
1 connecteur de sortie TV S-vidéo 2 adaptateur vidéo composite
2
1
1 2Utilisation de CD, de DVD et d'autres supports multimédias 57
1 Éteignez l'ordinateur et le téléviseur et/ou le périphérique audio que vous souhaitez connecter.
2 Connectez l'adaptateur vidéo composite au connecteur de sortie TV S-vidéo situé sur l'ordinateur.
3 Branchez une extrémité du câble vidéo composite dans le connecteur d'entrée vidéo composite situé
sur l'adaptateur vidéo composite.
4 Reliez l'autre extrémité du câble vidéo composite au connecteur d'entrée vidéo composite du
téléviseur.
5 Reliez une extrémité du câble audio numérique S/PDIF au connecteur audio S/PDIF sur l'adaptateur
vidéo composite.
1 adaptateur vidéo composite 2 câble vidéo composite 3 câble audio standard
1 adaptateur vidéo composite 2 câble vidéo composite
1 adaptateur vidéo composite 2 câble audio numérique S/PDIF
1
2
3
2
1
1 258 Utilisation de CD, de DVD et d'autres supports multimédias
6 Branchez l'autre extrémité du câble audio numérique sur le connecteur d'entrée S/PDIF situé sur le
téléviseur ou l'autre périphérique audio.
7 Allumez le téléviseur et tous les périphériques audio connectés (le cas échéant), puis l'ordinateur.
8 Reportez-vous à la section « Activation des paramètres d'écran d'un téléviseur » à la page 63 pour
vérifier que l'ordinateur reconnaît le téléviseur et fonctionne correctement avec celui-ci.
Vidéo composante et audio standard
1 connecteur de sortie TV S-vidéo 2 adaptateur vidéo composante
1 adaptateur vidéo composante 2 câble vidéo composante 3 câble audio standard
1 2
1
2
3Utilisation de CD, de DVD et d'autres supports multimédias 59
1 Éteignez l'ordinateur et le téléviseur et/ou le périphérique audio que vous souhaitez connecter.
2 Connectez l'adaptateur vidéo composante au connecteur de sortie TV S-vidéo situé sur l'ordinateur.
3 Branchez les trois extrémités du câble vidéo composante sur les connecteurs de sortie vidéo
composante situés sur l'adaptateur vidéo composante. Veillez à ce que les couleurs rouge, verte et bleu
du câble correspondent aux ports d'adaptateur appropriés.
4 Branchez les trois connecteurs de l'autre extrémité du câble vidéo composante sur les connecteurs
d'entrée vidéo composante situés sur le téléviseur. Veillez à ce que les couleurs rouge, verte et bleu du
câble correspondent aux connecteurs d'entrée du téléviseur.
5 Branchez l'extrémité à un seul connecteur du câble audio dans la prise casque de l'ordinateur.
6 Branchez les deux connecteurs RCA situés à l'autre extrémité du câble audio dans les connecteurs
d'entrée audio situés sur le téléviseur ou le périphérique audio.
7 Allumez le téléviseur et tous les périphériques audio connectés (le cas échéant), puis l'ordinateur.
8 Reportez-vous à la section « Activation des paramètres d'écran d'un téléviseur » à la page 63 pour
vérifier que l'ordinateur reconnaît le téléviseur et fonctionne correctement avec celui-ci.
1 adaptateur vidéo composante 2 câble vidéo composante
1 260 Utilisation de CD, de DVD et d'autres supports multimédias
Vidéo composante et audio numérique S/PDIF
1 connecteur de sortie TV S-vidéo 2 adaptateur vidéo composante
1 adaptateur vidéo composante 2 câble vidéo composante 3 câble audio standard
1 2
1
2
3Utilisation de CD, de DVD et d'autres supports multimédias 61
1 Éteignez l'ordinateur et le téléviseur et/ou le périphérique audio que vous souhaitez connecter.
2 Connectez l'adaptateur vidéo composante au connecteur de sortie TV S-vidéo situé sur l'ordinateur.
3 Branchez les trois extrémités du câble vidéo composante sur les connecteurs de sortie vidéo
composante situés sur l'adaptateur vidéo composante. Veillez à ce que les couleurs rouge, verte et bleu
du câble correspondent aux ports d'adaptateur appropriés.
4 Branchez les trois connecteurs de l'autre extrémité du câble vidéo composante sur les connecteurs
d'entrée vidéo composante situés sur le téléviseur. Veillez à ce que les couleurs rouge, verte et bleu du
câble correspondent aux connecteurs d'entrée du téléviseur.
5 Reliez une extrémité du câble audio numérique S/PDIF au connecteur audio S/PDIF situé sur
l'adaptateur vidéo composante.
6 Branchez l'autre extrémité du câble audio numérique sur le connecteur d'entrée S/PDIF situé sur le
téléviseur ou l'autre périphérique audio.
7 Allumez le téléviseur et tous les périphériques audio connectés (le cas échéant), puis l'ordinateur.
8 Reportez-vous à la section « Activation des paramètres d'écran d'un téléviseur » à la page 63 pour
vérifier que l'ordinateur reconnaît le téléviseur et fonctionne correctement avec celui-ci.
1 adaptateur vidéo composante 2 connecteurs de sortie vidéo
composante
3 câble vidéo composante
1 adaptateur vidéo composante 2 câble audio numérique S/PDIF
1 3
2
2
162 Utilisation de CD, de DVD et d'autres supports multimédias
Activation de l'audio numérique S/PDIF
REMARQUE : Votre logiciel de DVD peut se présenter différemment. Reportez-vous aux instructions fournies avec
votre logiciel de DVD.
Si votre ordinateur dispose d'un lecteur de DVD, vous pouvez activer le son numérique pour la lecture
des DVD.
1 Cliquez sur Démarrer, pointez sur Tousles programmes, puis sélectionnez l'application de DVD.
2 Insérez un DVD dans le lecteur de DVD.
Si la lecture du DVD démarre, cliquez sur le bouton d'arrêt.
3 Cliquez sur l'option Paramètres.
4 Cliquez sur l'option DVD.
5 Cliquez sur l'icône DVD Audio Setting (Paramétrage audio du DVD).
6 Cliquez sur les flèches en regard du paramètre Configuration des haut-parleurs pour faire défiler les
options et sélectionner l'option SPDIF.
7 Cliquez une première fois sur le bouton Précédent, puis une seconde fois pour revenir à l'écran du
menu principal.
Activation de S/PDIF dans le pilote audio Windows
1 Double-cliquez sur l'icône représentant un haut-parleur dans la zone de notification de Windows.
2 Cliquez sur le menu Options, puis sur Contrôles avancés.
3 Cliquez sur Avancé.
4 Cliquez sur Interface S/PDIF.
5 Cliquez sur Fermer.
6 Cliquer sur OK.
Configuration de la lecture de DVD via le casque
Si votre ordinateur dispose d'un lecteur de DVD, vous pouvez activer le son numérique pour la lecture
des DVD.
REMARQUE : Votre logiciel de DVD peut se présenter différemment. Reportez-vous aux instructions fournies avec
votre logiciel de DVD.
1 Cliquez sur Démarrer, pointez sur Tous les programmes, puis sélectionnez le programme de DVD.
2 Insérez un DVD dans le lecteur de DVD.
Si la lecture du DVD démarre, cliquez sur le bouton d'arrêt.
3 Cliquez sur l'option Paramètres.
4 Cliquez sur l'option DVD.
5 Cliquez sur l'icône DVD Audio Setting (Paramétrage audio du DVD).
6 Cliquez sur les flèches en regard du paramètre Configuration des haut-parleurs pour faire défiler les
options et sélectionner l'option Casque.Utilisation de CD, de DVD et d'autres supports multimédias 63
7 Cliquez sur les flèches en regard du paramètre Audio listening mode (Mode d'écoute audio) pour faire
défiler les options et sélectionner l'option CL Headphone (Casque CL).
8 Cliquez sur les flèches en regard de l'option Dynamic range compression (Compression de la plage
dynamique) pour sélectionner l'option la plus adaptée.
9 Cliquez une première fois sur le bouton Précédent, puis une seconde fois pour revenir à l'écran du
menu principal.
Activation des paramètres d'écran d'un téléviseur
Contrôleur vidéo
REMARQUE : Pour vous assurer que les options d'affichage apparaissent correctement, connectez le téléviseur à
votre ordinateur avant d'activer les paramètres d'affichage.
1 Cliquez sur le bouton Démarrer, pointez sur Paramètres, puis cliquez sur Panneau de configuration.
2 Double-cliquez sur Affichage, puis cliquez sur l'onglet Paramètres.
3 Cliquez sur Avancé.
4 Cliquez sur l'onglet de votre carte vidéo.
REMARQUE : Pour déterminer le type de carte vidéo installée sur votre ordinateur, consultez le Centre d'aide et de
support de Windows. Pour accéder au Centre d'aide et de support, cliquez sur Démarrer→Aide et support. Sous
Choisissez une tâche, cliquez sur Utiliser les outils pour afficher des informations sur votre ordinateur et
diagnostiquer les problèmes. Sous Informations sur le poste de travail, sélectionnez Matériel.
5 Dans la section des périphériques d'affichage, sélectionnez l'option appropriée en fonction de
l'utilisation d'un affichage simple ou multiple tout en vous assurant que les paramètres d'affichage sont
corrects pour votre sélection.64 Utilisation de CD, de DVD et d'autres supports multimédiasUtilisation de cartes ExpressCard 65
Utilisation de cartes ExpressCard
Types de carte ExpressCard
Pour plus d'informations sur les cartes ExpressCard prises en charge, reportez-vous à la section
« Caractéristiques » à la page 157.
REMARQUE : Une carte ExpressCard n'est pas un périphérique amorçable.
Caches pour carte ExpressCard
Votre ordinateur est livré avec un cache en plastique dans le logement de carte ExpressCard. Les
caches protègent les logements non utilisés contre la poussière et les particules en suspens.
Conservez le cache pour l'utiliser lorsqu'il n'y a pas de carte installée dans le logement. Les caches
provenant d'autres ordinateurs ne sont pas adaptés à votre ordinateur. Pour retirer le cache, reportezvous à la section « Retrait d'une carte ExpressCard ou d'un cache » à la page 67.
Installation d'une carte ExpressCard
Vous pouvez installer une carte ExpressCard pendant que l'ordinateur fonctionne. Celui-ci détecte
automatiquement la carte.
Les cartes ExpressCard sont généralement marquées d'un symbole (un triangle ou une flèche, par
exemple) ou portent une étiquette pour indiquer l'extrémité à insérer dans le logement. Les cartes
sont conçues pour éviter une mauvaise insertion. Si l'orientation de la carte n'est pas claire, consultez
la documentation livrée avec la carte.
REMARQUE : Le logement de carte ExpressCard ne prend PAS en charge les cartes PC. Reportez-vous à
l'illustration ci-dessous pour déterminer quelles sont les cartes prises en charge.66 Utilisation de cartes ExpressCard
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Pour installer une ExpressCard :
1 Tenez la carte face vers le haut. Le loquet devra peut-être être en position ouverte avant l'insertion de
la carte.
2 Faites glisser la carte dans le logement jusqu'à ce qu'elle soit complètement engagée dans le
connecteur.
Si vous sentez une trop grande résistance, ne forcez pas. Vérifiez l'orientation de la carte, puis faites
une nouvelle tentative.
1 types de carte pris en charge (cartes Express) 2 type de carte non pris en charge (PCMCIA)
1 2Utilisation de cartes ExpressCard 67
L'ordinateur reconnaît la plupart des cartes ExpressCard et charge automatiquement le pilote de
périphérique approprié. Si le programme de configuration vous demande de charger les pilotes du
fabricant, utilisez la disquette ou le CD accompagnant la carte ExpressCard.
Retrait d'une carte ExpressCard ou d'un cache
AVIS : Utilisez l'utilitaire de configuration de carte ExpressCard (cliquez sur l'icône de la barre des tâches)
pour sélectionner et désactiver une carte avant de la retirer de l'ordinateur. Si vous ne désactivez pas la carte à
l'aide de l'utilitaire de configuration, vous risquez de perdre des données.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Appuyez sur le loquet et retirez la carte ou le cache. Vous devrez appuyer à deux reprises sur certains
loquets : une fois pour faire ressortir le loquet et une deuxième fois pour faire sortir la carte.
Conservez le cache afin de l'utiliser à chaque fois qu'un logement d'ExpressCard est vide. Les caches
protègent les logements non utilisés contre la poussière et les particules en suspens.
1 carte ExpressCard
168 Utilisation de cartes ExpressCard
Types de carte mémoire multimédia
Le lecteur de carte mémoire multimédia 5 en 1 constitue un moyen pratique et rapide de visualiser et de
partager des photos numériques, de la musique et des vidéos stockées sur une carte mémoire.
REMARQUE : Une carte mémoire multimédia n'est pas un périphérique amorçable.
Le lecteur de carte mémoire multimédia 5 en 1 lit les cartes mémoire multimédia suivantes :
• Carte Secure Digital (SD)/SDIO
• MultiMediaCard (MMC)
• Memory Stick
• Memory Stick PRO
• Carte xD-Picture
Caches de carte mémoire multimédia
Votre ordinateur est livré avec un cache en plastique installé dans le logement de la carte mémoire
multimédia 5 en 1. Les caches protègent les logements non utilisés contre la poussière et les particules en
suspens. Conservez le cache pour l'utiliser lorsqu'il n'y a pas de carte installée dans le logement. Les
caches provenant d'autres ordinateurs ne sont pas adaptés à votre ordinateur.
Pour retirer le cache, reportez-vous à la section « Retrait d'une carte ExpressCard ou d'un cache » à la
page 67.
1 bouton d'éjection 2 carte ExpressCard
1
2Utilisation de cartes ExpressCard 69
Installation d'une carte mémoire multimédia
Vous pouvez installer une carte mémoire multimédia dans l'ordinateur alors qu'il fonctionne. Celui-ci
détecte automatiquement la carte.
Les cartes mémoire multimédia sont généralement marquées d'un symbole (un triangle ou une flèche,
par exemple) ou d'une étiquette pour indiquer l'extrémité à insérer dans le logement. Les cartes sont
conçues pour éviter une mauvaise insertion. Si l'orientation de la carte n'est pas claire, consultez la
documentation livrée avec la carte.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Pour installer une carte mémoire multimédia :
1 Tenez la carte face vers le haut.
2 Faites glisser la carte dans le logement jusqu'à ce qu'elle soit complètement engagée dans le
connecteur.
Si vous sentez une trop grande résistance, ne forcez pas. Vérifiez l'orientation de la carte, puis faites
une nouvelle tentative.
L'ordinateur reconnaît la carte mémoire multimédia et charge automatiquement le pilote de
périphérique adapté. Si le programme de configuration vous indique de charger les pilotes du fabricant,
utilisez le CD accompagnant la carte mémoire multimédia, le cas échéant.
1 logement de carte mémoire multimédia 5 en 1 2 carte mémoire multimédia
1
270 Utilisation de cartes ExpressCard
Retrait d'une carte mémoire multimédia ou d'un cache
AVIS : Utilisez l'utilitaire de configuration de carte mémoire multimédia (cliquez sur l'icône de la barre des
tâches) pour sélectionner et désactiver une carte avant de la retirer de l'ordinateur. Si vous ne désactivez pas la
carte à l'aide de l'utilitaire de configuration, vous risquez de perdre des données.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Appuyez sur la carte pour libérer et retirer la carte ou le cache.
Conservez le cache pour l'utiliser lorsque aucune carte mémoire multimédia n'est installée dans le
logement. Les caches protègent les logements non utilisés contre la poussière et les particules en suspens. Configuration d'un réseau 71
Configuration d'un réseau
Connexion physique à un réseau ou à un modem large bande
Pour connecter l'ordinateur à un réseau sans fil, une carte réseau doit être installée et un câble de
réseau connecté à l'ordinateur.
Pour connecter un câble de réseau :
1 Branchez le câble de réseau au connecteur de la carte réseau, situé sur le côté droit de votre
ordinateur.
REMARQUE : Insérez le connecteur du câble jusqu'à ce qu'il s'enclenche et tirez doucement sur le câble
pour vous assurer qu'il est correctement fixé.
2 Connectez l'autre extrémité du câble de réseau à un périphérique de connexion réseau ou à une
prise murale de réseau.
REMARQUE : Ne connectez pas de câble de réseau à une prise téléphonique murale.
Assistant Configuration réseau
L'Assistant Configuration réseau du système d'exploitation Microsoft® Windows® XP vous guide
dans la procédure de partage des fichiers, des imprimantes ou d'une connexion Internet entre
ordinateurs présents au sein d'un réseau domestique ou d'une petite entreprise.
1 Cliquez sur le bouton Démarrer, pointez sur Programmes→ Accessoires→ Communications, puis
cliquez sur Assistant Configuration réseau.
2 Dans l'écran d'accueil, cliquez sur Suivant.72 Configuration d'un réseau
3 Cliquez sur Liste de vérification pour la création d'un réseau.
REMARQUE : Sélectionner la méthode de connexion Cet ordinateur se connecte directement à l'Internet active le
pare-feu intégré fourni avec le Service Pack 2 (SP2) de Windows XP.
4 Exécutez la liste de vérification.
5 Revenez à l'Assistant Configuration réseau et suivez les instructions qui s'affichent.
Réseau local sans fil (WLAN)
Un WLAN est une série d'ordinateurs interconnectés qui communiquent entre eux par ondes aériennes
plutôt que par le biais d'un câble réseau relié à chaque ordinateur. Dans un WLAN, un périphérique de
radiocommunications appelé point d'accès ou routeur sans fil connecte des ordinateurs réseau et offre un
accès réseau. Le point d'accès ou le routeur sans fil et la carte réseau sans fil située dans l'ordinateur
communiquent en diffusant des données par ondes hertziennes depuis leurs antennes.
Éléments requis pour établir une connexion WLAN
Pour configurer un WLAN, vous avez besoin des éléments suivants :
• L'accès Internet haut débit (large bande) (comme un câble ou une connexion DSL)
• Un modem large bande qui est connecté et en état de marche
• Un routeur sans fil ou un point d'accès
• Une carte réseau sans fil par ordinateur à connecter au WLAN
• Un câble de réseau avec le connecteur (RJ-45) réseau
Contrôle de votre carte réseau sans fil
En fonction de votre sélection lors de l'achat de votre ordinateur, celui-ci a diverses configurations. Pour
confirmer que votre ordinateur est équipé d'une carte réseau sans fil et pour connaître le type de cette
carte, utilisez l'une des méthodes suivantes :
• Bouton Démarrer et option Connexions
• La confirmation de votre commande
Bouton Démarrer et option Connexions
1 Cliquez sur le bouton Démarrer.
2 Pointez sur Connexions, puis cliquez sur Afficher toutes les connexions.
Si Connexion réseau sans fil n'apparaît pas sous Réseau local ou Internet à haute vitesse, il est possible
que vous n'ayez pas de carte réseau sans fil.Configuration d'un réseau 73
Si Connexion réseau sans fil apparaît, vous disposez d'une carte réseau sans fil. Pour afficher des
informations détaillées sur la carte réseau sans fil :
1 Cliquez avec le bouton droit de la souris sur Connexion réseau sans fil.
2 Cliquez sur Propriétés. La fenêtre Propriétés de la connexion réseau sans fil apparaît. Le nom et le
numéro de modèle de la carte réseau sans fil sont répertoriés dans l'onglet Général.
REMARQUE : Si votre ordinateur est configuré sur l'option de menu Démarrer classique, vous pouvez afficher les
connexions réseau en cliquant sur le bouton Démarrer, en pointant sur Paramètres et en sélectionnant Connexions
réseau. Si Connexion réseau sans fil n'apparaît pas, il est possible que vous n'ayez pas de carte réseau sans fil.
Confirmation de commande
La confirmation de commande que vous avez reçue à la commande de votre ordinateur énumère le
matériel et les logiciels fournis avec celui-ci.
Configuration d'un nouveau WLAN
Connexion d'un routeur sans fil et d'un modem large bande
1 Contactez votre fournisseur d'accès Internet (FAI) pour obtenir des informations précises sur les
exigences relatives à la connexion de votre modem large bande.
2 Assurez-vous d'avoir un accès Internet câblé par le biais de votre modem large bande avant d'essayer de
configurer une connexion Internet sans fil. Reportez-vous à la section « Connexion physique à un
réseau ou à un modem large bande » à la page 71.
3 Installez les logiciels requis pour votre routeur sans fil. Un CD d'installation peut vous avoir été fourni
avec votre routeur sans fil. Ce type de CD contient généralement des informations sur l'installation et
le dépannage. Installez le logiciel requis conformément aux instructions du fabricant.
4 Arrêtez votre ordinateur et tout autre ordinateur fonctionnant sans fil à proximité par le biais du menu
Démarrer.
5 Débranchez le câble d'alimentation de votre modem large bande de la prise secteur.
6 Débranchez le câble réseau de l'ordinateur et du modem.
REMARQUE : Patientez au moins 5 minutes, une fois votre modem large bande déconnecté avant de continuer de
configurer le réseau.
7 Débranchez le câble d'adaptateur CA de votre routeur sans fil, afin d'avoir l'assurance que le routeur
n'est plus alimenté.
8 Branchez un câble réseau sur le connecteur réseau (RJ-45) du modem large bande non alimenté.
9 Connectez l'autre extrémité du câble sur le connecteur réseau (RJ-45) Internet du routeur sans fil non
alimenté.
10 Veillez à ce qu'aucun autre câble réseau ou USB (hormis le câble réseau reliant le modem et le routeur
sans fil) n'est relié au modem large bande.
REMARQUE : Redémarrez les périphériques sans fil dans l'ordre décrit ci-dessous pour empêcher toute
défaillance de connexion potentielle.74 Configuration d'un réseau
11 Mettez uniquement le modem large bande sous tension et attendez au moins 2 minutes qu'il se
stabilise. Au bout de 2 minutes, passez à l'étape 12.
12 Mettez le routeur sans fil sous tension et attendez au moins 2 minutes qu'il se stabilise. Au bout de
2 minutes, passez à l'étape 13.
13 Démarrez l'ordinateur et attendez que la procédure d'amorçage soit terminée.
14 Consultez la documentation accompagnant le routeur sans fil pour exécuter les actions suivantes et
configurer le routeur sans fil :
• Établissez la communication entre votre ordinateur et votre routeur sans fil.
• Configurez votre routeur sans fil pour communiquer avec votre routeur large bande.
• Recherchez le nom de diffusion du routeur sans fil. Il est également fait référence à ce nom sous
les termes techniques Identifiant d'ensemble de service (SSID) ou nom du réseau.
15 Au besoin, configurez votre carte réseau sans fil pour la connecter au réseau sans fil. Reportez-vous à la
section « Connexion à un réseau local sans fil » à la page 74.
Connexion à un réseau local sans fil
REMARQUE : Avant de vous connecter à un WLAN, vérifiez que vous avez observé les instructions figurant dans
la section « Réseau local sans fil (WLAN) » à la page 72.
REMARQUE : Les instructions de mise en réseau suivantes ne s'appliquent pas aux cartes internes dotées de la
technologie sans fil Bluetooth® ni aux réseaux large bande mobile.
Cette section présente des procédures générales concernant la connexion via une technologie sans fil.
Les noms spécifiques du réseau et les détails de configuration sont variables. Reportez-vous à la section
« Réseau local sans fil (WLAN) » à la page 72 pour plus d'informations sur la manière de préparer la
connexion d'un ordinateur à un réseau WLAN.
Votre carte réseau sans fil nécessite un logiciel et des pilotes spécifiques pour la connexion à un réseau.
Le logiciel est déjà installé.
REMARQUE : S'il a été supprimé ou endommagé, suivez les instructions fournies dans la documentation
utilisateur de votre carte réseau sans fil. Vérifiez le type de carte réseau sans fil installée sur votre ordinateur, puis
recherchez son nom sur le site Web de support de Dell à l'adresse suivante : support.dell.com. Pour plus
d'informations sur le type de carte réseau sans fil installée sur votre ordinateur, reportez-vous à la section
« Contrôle de votre carte réseau sans fil » à la page 72.
Détermination du Gestionnaire de périphérique réseau sans fil
En fonction du logiciel installé sur votre ordinateur, différents utilitaires de configuration sans fil peuvent
gérer vos périphériques réseau :
• L'utilitaire de configuration de votre carte réseau sans fil
• Le système d'exploitation de Windows XPConfiguration d'un réseau 75
Pour déterminer l'utilitaire de configuration sans fil qui gère votre carte réseau sans fil :
1 Cliquez sur le bouton Démarrer, pointez sur Paramètres, puis cliquez sur Panneau de configuration.
2 Double-cliquez sur Connexions réseau.
3 Cliquez avec le bouton droit de la souris sur l'icône Connexion réseau sans fil, puis cliquez sur
Afficher les réseaux sans fil disponibles.
Si la fenêtre Choisir un réseau sans fil indique Windows ne peut pas configurer cette connexion,
l'utilisation de configuration de la carte réseau sans fil gère la carte réseau sans fil.
Si la fenêtre Choisir un réseau sans fil indique Cliquer sur un élément de la liste ci-dessous pour se
connecter à un réseau sans fil dans la zone ou obtenir plus d'informations, le système d'exploitation
Windows XP gère la carte réseau sans fil.
Pour des informations spécifiques sur l'utilitaire de configuration sans fil installé sur votre ordinateur,
reportez-vous à votre document de réseau sans fil dans le Centre d'aide et de support Windows.
Pour accéder au Centre d'aide et de support :
1 Cliquez sur le bouton Démarrer, puis sur Aide et support.
2 Sous Choisir une rubrique d'aide, cliquez sur Guides d'utilisation du système de Dell.
3 Sous Guides des périphériques, sélectionnez la documentation de votre carte réseau sans fil.
Fin de la connexion au réseau WLAN
Lorsque vous mettez votre ordinateur sous tension et qu'un réseau est détecté dans la zone pour laquelle
votre ordinateur n'est pas configuré, un message contextuel apparaît à côté de l'icône communications
sans fil de la barre d'état système (située dans le coin inférieur droit du bureau Windows).
Suivez les instructions données dans toute invite d'utilitaire apparaissant à l'écran.
Lorsque l'ordinateur est configuré pour le réseau sans fil que vous avez sélectionné, un autre message
contextuel indique que l'ordinateur est connecté au réseau.
Lorsque vous vous connectez ultérieurement à votre ordinateur dans la zone du réseau sans fil que vous
avez sélectionné, le même message contextuel vous indique qu'une connexion au réseau sans fil est
établie.
REMARQUE : Si vous sélectionnez un réseau sécurisé, vous devez saisir une clé WEP ou WPA à l'invite. Les
paramètres de sécurité du réseau sont uniques à votre réseau. Dell ne peut pas vous fournir ces informations.
REMARQUE : La connexion au réseau peut prendre 1 minute.
Activation/désactivation de la carte réseau sans fil
REMARQUE : Si vous ne parvenez pas à vous connecter à un réseau sans fil, vérifiez que vous disposez de tous
les éléments pour créer un réseau WLAN (reportez-vous à la section « Éléments requis pour établir une connexion
WLAN » à la page 72), puis vérifiez que votre carte réseau sans fil est bien activée en appuyant sur .
Vous pouvez activer/désactiver la fonction de mise en réseau sans fil de votre ordinateur en appuyant sur
la combinaison de touches . Si la fonction de mise en réseau sans fil est activée, appuyez sur
pour la désactiver. Si la fonction de mise en réseau sans fil est désactivée, appuyez sur
pour l'activer.76 Configuration d'un réseau
Surveillance de l'état des connexions réseau sans fil via Dell™ QuickSet
Le voyant d'activité sans fil permet de facilement surveiller l'état des périphériques sans fil de votre
ordinateur. Cliquez avec le bouton droit de la souris sur l'icône Dell QuickSet de la barre des tâches pour
sélectionner ou désélectionner Indicateur d'activité sans fil pour activer ou désactiver cet indicateur.
Le voyant d'activité sans fil indique si les périphériques sans fil de votre ordinateur sont activés ou
désactivés. Lorsque vous activez ou désactivez la fonction de mise en réseau sans fil, l'indicateur
d'activité sans fil change pour afficher l'état en cours.
Pour plus d'informations sur l'indicateur d'activité sans fil, consultez le fichier d'aide sur Dell QuickSet.
Pour obtenir des informations sur QuickSet et savoir comment accéder au fichier d'aide sur Dell
QuickSet, reportez-vous à la section « Fonctions Dell™ QuickSet » à la page 133.
Réseau étendu large bande mobile ou sans fil (WWAN)
De même qu'un WLAN, un réseau large bande mobile (ou WWAN) regroupe des ordinateurs
interconnectés qui communiquent entre eux par le biais d'une technologie sans fil. Cependant, un
réseau large bande mobile utilise la technologie cellulaire. Par conséquent, l'accès Internet est disponible
dans les mêmes régions que le service cellulaire. Votre ordinateur peut conserver une connexion réseau
large bande mobile indépendamment de sa localisation physique tant que l'ordinateur reste dans une
zone couverte par votre prestataire de service cellulaire.
Éléments requis pour établir une connexion avec un réseau large bande mobile
REMARQUE : Selon votre ordinateur, vous pouvez vous connecter à un réseau large bande mobile au moyen
d'une carte ExpressCard ou Mini large bande mobile mais pas les deux.
Pour configurer une connexion réseau large bande mobile, vous devez disposer des éléments suivants :
• Une carte ExpressCard ou Mini large bande mobile (selon la configuration de votre ordinateur)
Pour des instructions sur l'utilisation des cartes ExpressCard, reportez-vous à la section « Utilisation de
cartes ExpressCard » à la page 65.
• L'utilitaire Dell Mobile Broadband Card Utility (préinstallé sur votre ordinateur si vous achetez la carte
en même temps que l'ordinateur ou disponible sur le CD accompagnant la carte achetée séparément).
Si l'utilitaire est corrompu ou supprimé de votre ordinateur, reportez-vous au guide d'utilisation de
l'utilitaire Dell Mobile Broadband Card Utility pour obtenir des instructions. Le guide d'utilisation est
accessible via le Centre d'aide et de support de Windows (ou le CD accompagnant la carte achetée
séparément). Pour accéder au Centre d'aide et de support, reportez-vous à la section « Centre d'aide et
de support de Windows » à la page 14.Configuration d'un réseau 77
Connexion à un réseau large bande mobile
REMARQUE : Ces instructions ne s'appliquent qu'aux cartes ExpressCard ou Mini large bande mobile. Elles ne
s'appliquent pas aux cartes internes dotées de la technologie sans fil Bluetooth® ni aux cartes Mini WLAN.
REMARQUE : Avant de vous connecter à Internet, vous devez activer le service large bande mobile auprès de
votre fournisseur de services cellulaires. Pour des instructions et d'autres informations sur l'utilisation de
l'utilitaire Dell Mobile Broadband Card Utility, reportez-vous au guide de l'utilisateur disponible dans le Centre
d'aide et de support de Windows. Pour accéder au Centre d'aide et de support, reportez-vous à la section « Centre
d'aide et de support de Windows » à la page 14. Le guide d'utilisation est également disponible sur le site Web de
support de Dell à l'adresse support.dell.com et sur le CD fourni avec votre carte large bande mobile si vous avez
acheté la carte séparément de l'ordinateur.
À l'aide de l'utilitaire Dell Mobile Broadband Card Utility, créez et gérez une connexion réseau large
bande mobile à Internet :
1 Cliquez sur l'icône de l'utilitaire Dell Mobile Broadband Card Utility, , dans la barre des tâches
de Windows pour exécuter l'utilitaire.
2 Cliquez sur Connecter.
REMARQUE : Le bouton Connecter se transforme en bouton Déconnecter.
3 Suivez les instructions à l'écran pour gérer la connexion réseau à l'aide de cet utilitaire.
Réseau Bluetooth
Configuration de votre connexion Bluetooth
Les systèmes, équipés de la technologie Bluetooth, afficheront l'icône Bluetooth dans la barre d'état
système. Si vous disposez de la technologie Bluetooth, double-cliquez sur l'icône Bluetooth. Selon le
logiciel Bluetooth installé sur votre ordinateur, vous pouvez être amené à effectuer plusieurs opérations
pour terminer la configuration. Le logiciel Bluetooth vous guidera dans la procédure. Cette procédure
prendra environ 5 minutes. Une fois la procédure effectuée, votre système peut établir et utiliser des
connexions Bluetooth. Si, après avoir double-cliqué sur l'icône Bluetooth, le logiciel Bluetooth ne vous
invite pas à effectuer une série d'opérations, votre système Bluetooth est déjà complètement configuré et
prêt à être utilisé.
Connexion à un réseau Bluetooth
Les systèmes, équipés d'une carte interne Bluetooth, peuvent se connecter à d'autres périphériques
Bluetooth, tels que des claviers et des souris, des casques stéréo, des appareils photos, des assistants
numériques personnels (PDA) et des imprimantes. Il suffit d'effectuer quelques opérations, qui restent
simples, pour établir une connexion au périphérique. Ces opérations varient selon le logiciel Bluetooth
installé sur votre ordinateur. Pour des informations détaillées sur l'établissement de connexions
Bluetooth, ouvrez votre logiciel Bluetooth en double-cliquant sur l'icône Bluetooth dans la barre d'état
système. Sélectionnez Aide dans le menu principal pour une description détaillée de l'utilisation de votre
carte de mise en réseau interne.78 Configuration d'un réseauSécurisation de votre ordinateur 79
Sécurisation de votre ordinateur
Verrou du câble de sécurité
REMARQUE : Votre ordinateur n'est pas livré avec un verrou de câble de sécurité.
Un verrou de câble de sécurité est un dispositif antivol disponible dans le commerce. Pour utiliser le
verrou, fixez-le à l'emplacement pour câble de sécurité de votre ordinateur Dell™. Pour plus
d'informations, reportez-vous aux instructions fournies avec le dispositif.
AVIS : Avant d'acheter un dispositif antivol, vérifiez qu'il est compatible avec l'emplacement pour câble de
sécurité de votre ordinateur.
Mots de passe
Les mots de passe évitent tout accès non autorisé à votre ordinateur. Dès que vous démarrez votre
ordinateur, vous devez affecter un mot de passe principal à l'invite. Si aucun mot de passe n'est entré
dans les deux minutes qui suivent, l'ordinateur revient à l'état de fonctionnement précédent.
En cas d'utilisation de mots de passe, respectez les consignes suivantes :
• Choisissez un mot de passe dont vous vous souviendrez mais qui ne soit pas facile à deviner. Par
exemple, n'utilisez pas les noms des membres de votre famille ni les noms de vos animaux
familiers dans vos mots de passe.
• Évitez de noter votre mot de passe sur un papier. Si vous notez vos mots de passe sur un papier,
assurez-vous qu'il sont stockés dans un lieu sûr.80 Sécurisation de votre ordinateur
• Ne partagez pas votre mot de passe avec quelqu'un.
• Assurez-vous que personne ne vous regarde lorsque vous saisissez votre mot de passe.
AVIS : Les mots de passe affectent un haut niveau de sécurité aux données de votre ordinateur ou de votre disque
dur. Cependant, votre système n'est pas à l'abri de personnes mal intentionnées. Si vous souhaitez un plus haut
niveau de sécurité, utilisez d'autres formes de protection, comme les cartes à puce, les programmes de cryptage
de données ou les cartes PC (ou Mini) dotées de fonctions de cryptage.
Pour ajouter ou modifier des mots de passe, allez dans Panneau de configuration, puis Comptes
d'utilisateurs.
Si vous avez oublié l'un de vos mots de passe, contactez Dell (reportez-vous à la section « Contacter
Dell » à la page 137). Pour votre protection, l'équipe du support technique de Dell vous demandera de
prouver votre identité pour que seules les personnes autorisées puissent utiliser votre ordinateur.
Logiciel de suivi informatique
Un logiciel de suivi informatique peut vous permettre de localiser votre ordinateur s'il est perdu ou volé.
Le logiciel est disponible en option et peut être acquis lors de l'achat de votre ordinateur Dell™. Vous
pouvez également contacter votre commercial Dell pour plus d'informations sur cette fonction de
sécurité.
REMARQUE : Il se peut que le logiciel de suivi ne soit pas disponible dans tous les pays.
REMARQUE : Si vous disposez de ce logiciel, vous devez contacter l'entreprise en charge du service de suivi pour
signaler la disparition de votre ordinateur en cas de perte ou de vol de ce dernier.
En cas de perte ou de vol de votre ordinateur
• Appelez les autorités compétentes pour signaler la perte ou le vol. Incluez le numéro de service dans
votre description de l'ordinateur. Demandez à ce qu'un numéro soit affecté à cette affaire et relevez ce
numéro avec le nom, l'adresse et le numéro de téléphone du bureau de police. Si possible, obtenez le
nom de l'agent chargé de l'affaire.
REMARQUE : Si vous savez où a eu lieu le vol ou la perte de l'ordinateur, contactez les autorités compétentes de
la région. Si vous ne connaissez pas cet endroit, appelez un bureau de police de votre lieu de résidence.
• Si l'ordinateur appartient à une société, avertissez le bureau de sécurité de la société.
• Contactez le service clientèle de Dell pour signaler la perte de l'ordinateur. Fournissez le numéro de
service de l'ordinateur, le numéro de dossier et le nom, l'adresse et le numéro de téléphone du bureau
de police auquel vous avez signalé le vol. Si possible, donnez le nom de l'agent chargé de l'affaire.
Le représentant du service clientèle de Dell enregistrera votre rapport sous le numéro de service de
l'ordinateur et enregistrera l'ordinateur comme manquant ou volé. Si quelqu'un appelle Dell pour obtenir
de l'assistance technique et donne votre numéro de service, l'ordinateur sera automatiquement identifié
comme le vôtre. Le représentant essaiera d'obtenir le numéro de téléphone et l'adresse de son
correspondant. Dell contactera ensuite les autorités compétentes auxquelles vous avez signalé la perte de
votre ordinateur.Dépannage 81
Dépannage
Service Dell Technical Update
Le service Dell Technical Update fournit une notification proactive par courrier électronique des
mises à jour matérielles et logicielles pour votre ordinateur. Ce service est gratuit. En outre, vous
pouvez personnaliser son contenu, son format et la fréquence à laquelle vous recevez des
notifications.
Pour vous abonner au service Dell Technical Update, visitez le site Web suivant :
support.dell.com/technicalupdate.
Dell Diagnostics
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les
consignes de sécurité du Guide d'information sur le produit.
Quand utiliser Dell Diagnostics
Si des problèmes surviennent lors de l'utilisation de votre ordinateur, effectuez les vérifications
indiquées dans la section « Blocages et problèmes logiciels » à la page 94 et exécutez Dell
Diagnostics avant de contacter Dell pour obtenir une assistance technique.
AVIS : Dell Diagnostics ne fonctionne qu'avec les ordinateurs Dell.
REMARQUE : Le CD Drivers and Utilities est en option et n'est pas obligatoirement expédié avec votre
ordinateur.
Démarrez Dell Diagnostics à partir de votre disque dur ou du CD Drivers and Utilities (également
appelé ResourceCD).
Démarrage de Dell Diagnostics à partir du disque dur
Dell Diagnostics se trouve dans une partition cachée (utilitaire de diagnostics) de votre disque dur.
REMARQUE : Si aucune image ne s'affiche, contactez Dell. Reportez-vous à la section « Contacter Dell » à la
page 137.
1 Éteignez l'ordinateur.
2 Connectez l'ordinateur à une prise secteur.82 Dépannage
3 Il existe deux manières de lancer Diagnostics :
a Allumez l'ordinateur. Lorsque le logo DELL™ apparaît, appuyez immédiatement sur .
Sélectionnez Diagnostics à partir du menu de démarrage et appuyez sur .
REMARQUE : Si vous attendez trop longtemps et que le logo du système d'exploitation apparaît, patientez
jusqu'à ce que le bureau de Microsoft® Windows® s'affiche. Éteignez alors votre ordinateur et faites une
nouvelle tentative.
b Appuyez sur la touche et maintenez-la enfoncée lors de la mise sous tension du système.
REMARQUE : Si un message indique qu'aucune partition de diagnostic n'a été trouvée, exécutez Dell
Diagnostics à partir du CD Drivers and Utilities.
L'ordinateur lance l'évaluation du système de préamorçage avec une série de diagnostics intégrés qui
effectue un test préalable de la carte système, du clavier, du disque dur et de l'écran.
• Répondez à toutes les questions qui s'affichent pendant l'évaluation.
• Si une défaillance de composant est détectée, l'ordinateur s'arrête et émet un signal sonore. Pour
arrêter l'évaluation et redémarrer l'ordinateur, appuyez sur ; pour passer au test suivant,
appuyez sur ; pour retester le composant défectueux, appuyez sur .
• Si des défaillances sont détectées lors de l'évaluation de préamorçage du système, notez les codes
d'erreur et contactez Dell.
Si l'évaluation de préamorçage du système se déroule sans problème, vous recevez le message
Booting Dell Diagnostic Utility Partition. Press any key to continue
(Amorçage de la partition de l'utilitaire Dell Diagnostics. Appuyez sur une touche pour continuer).
4 Appuyez sur une touche pour démarrer Dell Diagnostics à partir de la partition de diagnostics du
disque dur.
Démarrage de Dell Diagnostics à partir du CD Drivers and Utilities
1 Insérez le CD Drivers and Utilities.
2 Arrêtez, puis redémarrez l'ordinateur.
Lorsque le logo DELL apparaît, appuyez immédiatement sur .
Si vous attendez trop longtemps et que le logo Windows apparaît, attendez encore jusqu'à ce que le
bureau Windows s'affiche. Éteignez alors votre ordinateur et faites une nouvelle tentative.
REMARQUE : Les étapes suivantes modifient la séquence d'amorçage pour une seule exécution. Au
démarrage suivant, l'ordinateur démarre en fonction des périphériques définis dans le programme de
configuration du système.
3 Lorsque la liste des périphériques d'amorçage s'affiche, sélectionnez Lecteur de CD/DVD/CD-RW et
appuyez sur .
4 Sélectionnez l'option Boot from CD-ROM (Amorcer à partir du CD-ROM) dans le menu qui
s'affiche, puis appuyez sur .
5 Tapez 1 pour démarrer le menu du CD ResourceCD, puis appuyez sur pour continuer.
6 Sélectionnez Run Dell 32-bit Diagnostics (Exécuter Dell Diagnostics 32 bits) dans la liste numérotée.
Si plusieurs versions sont répertoriées, sélectionnez la version appropriée à votre ordinateur.
7 Lorsque le menu principal de Dell Diagnostics s'affiche, sélectionnez le test à effectuer.Dépannage 83
Menu principal de Dell Diagnostics
1 Une fois Dell Diagnostics chargé et lorsque l'écran du menu principal s'affiche, cliquez sur le bouton
de l'option que vous souhaitez.
2 Si un problème survient pendant un test, un message indiquant le code d'erreur et une description du
problème s'affiche. Notez le code d'erreur et la description du problème et suivez les instructions à
l'écran.
Si vous ne pouvez pas résoudre le problème, contactez Dell.
REMARQUE : Le numéro de service de votre ordinateur est situé en haut de chaque écran de test. Lorsque
vous contacterez le support technique de Dell, ce numéro de service vous sera demandé.
3 Si vous exécutez un test à partir de l'option Test personnalisé ou Arborescence des symptômes, cliquez
sur l'onglet approprié décrit dans le tableau suivant pour obtenir plus d'informations.
Option Fonction
Express Test (Test
rapide)
Exécute un test rapide des périphériques. Ce test dure
généralement entre 10 et 20 minutes et n'exige pas d'action de
votre part. Effectuez tout d'abord un Test rapide pour trouver le
problème plus rapidement.
Extended Test (Test
approfondi)
Exécute un test approfondi des périphériques. En règle générale,
ce test prend une heure ou plus et nécessite que vous répondiez
régulièrement à des questions.
Custom Test (Test
personnalisé)
Teste un périphérique spécifique. Vous pouvez personnaliser les
tests à exécuter.
Symptom Tree
(Arborescence des
symptômes)
Répertorie les symptômes couramment rencontrés et permet de
sélectionner un test en fonction du symptôme du problème.
Onglet Fonction
Results (Résultats) Affiche les résultats du test et les conditions d'erreur rencontrées.
Errors (Erreurs) Affiche les conditions d'erreur rencontrées, les codes d'erreur et la
description du problème.
Help (Aide) Décrit le test et peut indiquer les conditions requises pour exécuter
le test.
Configuration
(Configuration)
Affiche la configuration matérielle du périphérique sélectionné.
Dell Diagnostics obtient les informations de configuration de tous
les périphériques à partir du programme de configuration du
système, de la mémoire et de divers tests internes, et les affiche dans
la liste des périphériques située dans le volet gauche de l'écran. La
liste des périphériques risque de ne pas afficher les noms de tous les
composants installés sur votre ordinateur ou de tous les
périphériques reliés à celui-ci.
Parameters (Paramètres) Vous permet de personnaliser le test en modifiant ses paramètres.84 Dépannage
4 Une fois les tests effectués, si vous exécutez Dell Diagnostics à partir du CD Drivers and Utilities,
retirez le CD.
5 Une fois les tests terminés, fermez l'écran de test pour revenir à l'écran de menu principal. Pour quitter
Dell Diagnostics et redémarrer l'ordinateur, fermez l'écran de menu principal.
Utilitaire de support de Dell
L'utilitaire de support de Dell est installé sur votre ordinateur et accessible en cliquant sur l'icône de
support de Dell dans la barre des tâches ou à partir du bouton Démarrer. Cet utilitaire vous permet
d'exécuter les actions suivantes : obtenir des informations de support automatique, effectuer des mises à
jour et des balayages de votre environnement informatique pour en vérifier l'état.
Accès à l'utilitaire de support de Dell
Accédez à l'utilitaire de support de Dell à partir de l'icône de support de Dell dans la barre des tâches ou
à partir du menu Démarrer.
Si l'icône de support de Dell n'apparaît pas dans la barre des tâches, procédez comme suit :
1 Cliquez sur le bouton Démarrer, puis pointez sur Tous les programmes.
2 Cliquez sur Support de Dell, puis pointez sur Paramètres du support de Dell.
3 Assurez-vous que l'option Afficher l'icône dans la barre des tâches est sélectionnée.
REMARQUE : Si l'utilitaire de support de Dell n'est pas disponible depuis le menu Démarrer, accédez au site
support.dell.com et téléchargez le logiciel.
L'utilitaire de support de Dell est personnalisé pour votre environnement informatique.
L'icône de support de Dell figurant dans la barre des tâches offre un fonctionnement différent lorsque
vous cliquez, double-cliquez ou cliquez dessus avec le bouton droit.
Clic sur l'icône de support de Dell
Cliquez ou cliquez avec le bouton droit de la souris sur l'icône pour exécuter les tâches suivantes :
• Vérifier votre environnement informatique
• Afficher les paramètres de l'utilitaire de support de Dell
• Accéder au fichier d'aide de l'utilitaire de support de Dell
• Afficher les questions les plus fréquemment posées
• En savoir plus sur l'utilitaire de support de Dell
• Désactiver l'utilitaire de support de Dell
Double-clic sur l'icône de support de Dell
Double-cliquez sur l'icône pour contrôler manuellement votre environnement informatique,
afficher les questions fréquemment posées, accéder aux fichiers d'aide de l'utilitaire de support de Dell et
afficher les paramètres de support de Dell.
Pour plus d'informations sur l'utilitaire de support de Dell, cliquez sur le point d'interrogation (?)situé
en haut de l'écran Dell Support (Support de Dell).Dépannage 85
Problèmes de lecteur
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
VÉRIFIEZ QUE MICROSOFT® WINDOWS® RECONNAÎT L E LECTEUR — Cliquez sur le bouton Démarrer, puis
sur Poste de travail. Si le lecteur de disquette, de CD ou de DVD ne figure pas dans la liste, effectuez un
balayage complet avec votre logiciel antivirus à la recherche de virus pour les supprimer. Les virus
empêchent parfois Windows de reconnaître le lecteur.
TESTEZ L E LECTEUR —
• Insérez une autre disquette, un autre CD ou un autre DVD pour éliminer la possibilité que le premier
support soit défectueux.
• Insérez une disquette d'amorçage et redémarrez l'ordinateur.
NETTOYEZ L E LECTEUR O U L E DISQUE — Reportez-vous à la section « Nettoyage de votre ordinateur » à la
page 167.
ASSUREZ-VOUS QUE L E CD EST CORRECTEMENT POSITIONNÉ SUR L'AXE
VÉRIFIEZ LES CONNEXIONS DES CÂBLES
VÉRIFIEZ LES INCOMPATIBILITÉS MATÉRIELLES — Reportez-vous à la section « Résolution des
incompatibilités logicielles et matérielles » à la page 104.
EXÉCUTEZ DELL DIAGNOSTICS — Reportez-vous à la section « Dell Diagnostics » à la page 81.
Problèmes de lecteur de CD et de DVD
REMARQUE : Il peut arriver que le lecteur de CD ou de DVD haute vitesse vibre et produise du bruit. Cela ne
signifie en aucun cas que le lecteur ou le CD/DVD est défectueux.
REMARQUE : En raison des différentes régions du monde entier et des différents formats de disque, certains
titres DVD ne fonctionnent pas dans certains lecteurs DVD.
Problèmes d'écriture sur un lecteur de CD/DVD-RW
FERMEZ TOUS LES PROGRAMMES — Le lecteur de CD/DVD-RW doit recevoir un flux régulier de données
lors de l'écriture. Si ce flux est interrompu, une erreur se produit. Fermez tous les programmes avant de
lancer l'écriture sur le CD/DVD-RW.
DÉSACTIVEZ L E MODE VEILLE DANS WINDOWS AVANT D E LANCER L'ÉCRITURE SUR UN CD/DVD-RW —
Reportez-vous à la section « Modes d'économie d'énergie » à la page 40 pour des informations
supplémentaires sur le mode Veille.
RÉDUISEZ LA VITESSE D E GRAVURE — Consultez les fichiers d'aide de votre logiciel de création de CD ou
de DVD.
Si vous ne parvenez pas à éjecter le plateau du lecteur de CD, de CD-RW, de DVD ou de DVD+RW
1 Vérifiez que l'ordinateur est éteint.
2 Redressez un trombone et insérez l'une de ses extrémités dans le trou d'éjection situé à l'avant du
lecteur ; poussez ensuite fermement jusqu'à ce que le plateau soit partiellement éjecté.
3 Retirez le plateau avec précaution jusqu'à ce qu'il s'arrête.86 Dépannage
Si vous entendez un bruit grinçant ou un raclement inhabituel
• Assurez-vous que ce son n'est pas émis par un programme en cours d'exécution.
• Assurez-vous que le disque est correctement inséré.
Problèmes liés au disque dur
LAISSEZ L'ORDINATEUR REFROIDIR AVANT D E L'ALLUMER — Un disque dur trop chaud peut empêcher le
fonctionnement du système d'exploitation. Laissez l'ordinateur s'acclimater à la température ambiante
avant de l'allumer.
LANCEZ LA COMMANDE CHECK DISK (VÉRIFIER DISQUE) —
1 Cliquez sur le bouton Démarrer, puis sur Poste de travail.
2 Avec le bouton droit, cliquez sur Disque local C:.
3 Cliquez sur Propriétés.
4 Cliquez sur l'onglet Outils.
5 Sous Détection d'erreurs, cliquez sur Vérifier maintenant.
6 Cliquez sur Rechercher et tenter une récupération des secteurs défectueux.
7 Cliquez sur Démarrer.
Problèmes liés à la messagerie électronique, au modem ou à
Internet
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
REMARQUE : Connectez le modem uniquement à une prise téléphonique analogique. Le modem ne fonctionne
pas s'il est connecté à un réseau téléphonique numérique.
VÉRIFIEZ LES PARAMÈTRES D E SÉCURITÉ D E MICROSOFT OUTLOOK® EXPRESS — Si vous n'arrivez pas à
ouvrir les pièces jointes à vos messages électroniques :
1 Dans Outlook Express, cliquez sur Outils, sur Options, puis sur Sécurité.
2 Cliquez sur Interdire les pièces jointes pour supprimer la coche.
VÉRIFIEZ L A CONNEXION D E L A LIGNE TÉLÉPHONIQUE
VÉRIFIEZ L A PRISE TÉLÉPHONIQUE
CONNECTEZ L E MODEM DIRECTEMENT À LA PRISE TÉLÉPHONIQUE MURALE
UTILISEZ UNE LIGNE TÉLÉPHONIQUE DIFFÉRENTE
• Assurez-vous que la ligne téléphonique est connectée à la prise jack du modem. (La prise jack
comporte une étiquette verte ou bien une icône en forme de connecteur apparaît à côté de cette prise.)
• Insérez le connecteur de ligne téléphonique dans le modem jusqu'à ce que vous entendiez un déclic.
• Déconnectez la ligne téléphonique du modem et connectez-la à un téléphone. Attendez la tonalité.
• Si d'autres appareils téléphoniques partagent cette ligne, par exemple un répondeur téléphonique, un
télécopieur, un parasurtenseur ou un séparateur de ligne, contournez-les et connectez le modem
directement à la prise jack téléphonique murale. Si vous utilisez une ligne qui mesure au moins 3 m
(10 pieds), essayez une ligne plus courte.Dépannage 87
EXÉCUTEZ LES DIAGNOSTICS ASSISTANT D U MODEM — Cliquez sur le bouton Démarrer, pointez sur Tous
les programmes, puis cliquez sur Assistant du modem. Suivez les instructions qui s'affichent à l'écran
pour identifier et résoudre les problèmes de modem. (L'Assistant du modem n'est pas disponible sur
certains ordinateurs.)
VÉRIFIEZ QUE L E MODEM COMMUNIQUE AVEC WINDOWS —
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Cliquez sur Imprimantes et autres périphériques.
3 Cliquez sur Options de modem et de téléphonie.
4 Cliquez sur l'onglet Modems.
5 Cliquez sur le port COM de votre modem.
6 Cliquez sur Propriétés, sur l'onglet Diagnostics, puis sur Interroger le modem pour vérifier que le
modem communique avec Windows.
Si toutes les commandes reçoivent des réponses, le modem fonctionne correctement.
VÉRIFIEZ QUE VOUS ÊTES CONNECTÉ À INTERNET — Assurez-vous que vous êtes bien abonné auprès d'un
fournisseur d'accès Internet. Une fois le programme de messagerie électronique Outlook Express ouvert,
cliquez sur Fichier. Si la case Travailler hors connexion est cochée, décochez-la, puis connectez-vous à
Internet. Pour obtenir de l'aide, contactez votre fournisseur d'accès Internet.
ANALYSEZ L'ORDINATEUR À L A RECHERCHE D E LOGICIELS ESPIONS — Si vous observez un ralentissement des
performances de votre ordinateur, si des fenêtres publicitaires s'affichent fréquemment sur votre écran ou
si vous avez des problèmes pour vous connecter sur Internet, votre ordinateur est peut-être infecté par un
logiciel espion. Utilisez un programme antivirus qui inclut une protection contre les logiciels espions
(une mise à niveau de votre programme sera peut-être nécessaire) afin d'analyser votre ordinateur et de
supprimer les logiciels espions. Pour plus d'informations, allez sur le site support.dell.com et lancez une
recherche à l'aide du mot-clé spyware (espion).
Messages d'erreur
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Si le message n'est pas répertorié, consultez la documentation du système d'exploitation ou du
programme qui s'exécutait lorsque le message s'est affiché.
AUXILIARY DEVICE FAILURE (ÉCHEC D'UN PÉRIPHÉRIQUE AUXILIAIRE) — La tablette tactile, la manette ou la
souris externe présente peut-être une défaillance. Dans le cas d'une souris externe, vérifiez la connexion
du câble. Activez l'option Dispositif de pointage dans le programme de configuration du système. Si le
problème persiste, contactez Dell. Reportez-vous à la section « Contacter Dell » à la page 137.
BA D COMMAND O R FILE NAME (COMMANDE O U NOM D E FICHIER INCORRECT) — Vérifiez que vous avez bien
orthographié la commande, mis des espaces à bon escient et utilisé le chemin d'accès correct.
CACHE DISABLED DUE T O FAILURE (CACHE DÉSACTIVÉ EN RAISON D'UNE PANNE) — Le cache interne
principal du microprocesseur présente un dysfonctionnement. Contactez Dell. Reportez-vous à la
section « Contacter Dell » à la page 137.
CD DRIVE CONTROLLER FAILURE (ÉCHEC D U CONTRÔLEUR D U LECTEUR D E CD) — Le lecteur de CD ne répond
pas aux commandes de l'ordinateur. Reportez-vous à la section « Problèmes de lecteur » à la page 85.88 Dépannage
DATA ERROR (ERREUR D E DONNÉES) — Le disque dur ne peut pas lire les données. Reportez-vous à la
section « Problèmes de lecteur » à la page 85.
DECREASING AVAILABLE MEMORY (MÉMOIRE DISPONIBLE RÉDUITE) — Un ou plusieurs modules de mémoire
peuvent être défaillants ou mal fixés. Réinstallez les modules de mémoire et remplacez-les au besoin.
Reportez-vous à la section « Lecteurs optiques » à la page 116.
DISK C: FAILED INITIALIZATION (ÉCHEC D E L'INITIALISATION D U DISQUE C:) — L'initialisation du disque dur
a échoué. Exécutez le groupe de tests des unités de disque dur dans Dell Diagnostics. Reportez-vous à la
section « Dell Diagnostics » à la page 81.
DRIVE NOT READY (LE LECTEUR N'EST PAS PRÊT) — Le fonctionnement requiert la présence d'un disque
dur dans la baie pour pouvoir continuer. Installez une unité de disque dur dans la baie d'unité de disque
dur. Reportez-vous à la section « Disque dur » à la page 113.
ERROR READING PCMCIA CARD (ERREUR LORS D E LA LECTURE D E LA CARTE PCMCIA) — L'ordinateur ne
peut pas identifier la carte ExpressCard. Remettez la carte en place ou essayez une autre carte. Reportezvous à la section « Utilisation de cartes ExpressCard » à la page 65.
EXTENDED MEMORY SIZE HAS CHANGED (LA TAILLE D E LA MÉMOIRE ÉTENDUE A CHANGÉ) — La quantité de
mémoire enregistrée dans la mémoire vive rémanente (NVRAM) ne correspond pas à la mémoire
installée sur l'ordinateur. Redémarrez l'ordinateur. Si l'erreur apparaît de nouveau, contactez Dell.
Reportez-vous à la section « Contacter Dell » à la page 137.
TH E FILE BEING COPIED I S TOO LARGE FOR THE DESTINATION DRIVE (LE FICHIER EN COURS D E COPIE EST TROP
VOLUMINEUX POUR L E LECTEUR D E DESTINATION) — Le fichier que vous essayez de copier est trop
volumineux pour le disque ou le disque est plein. Essayez de copier le fichier sur un autre disque ou
utilisez un disque de capacité plus élevée.
A FILENAME CANNOT CONTAIN ANY O F THE FOLLOWING CHARACTERS: (UN NOM D E FICHIER N E PEUT CONTENIR
AUCUN DES CARACTÈRES SUIVANTS :) \ / : * ? " < > | — N'utilisez pas ces caractères lorsque vous
nommez un fichier.
GATE A20 FAILURE (ÉCHEC D E L A PORTE A20) — Un module de mémoire est peut-être mal fixé.
Réinstallez les modules de mémoire et remplacez-les au besoin. Reportez-vous à la section « Lecteurs
optiques » à la page 116.
GENERAL FAILURE (ERREUR GÉNÉRALE) — Le système d'exploitation ne peut pas exécuter la commande.
Ce message est généralement suivi d'informations spécifiques—par exemple, Printer out of
paper (L'imprimante manque de papier). Effectuez l'action corrective appropriée.
HARD-DISK DRIVE CONFIGURATION ERROR (ERREUR D E CONFIGURATION D E L'UNITÉ D E DISQUE DUR) —
L'ordinateur ne peut pas identifier le type d'unité. Éteignez l'ordinateur, retirez le disque dur (reportezvous à la section « Disque dur » à la page 113) et amorcez l'ordinateur depuis un CD. Éteignez ensuite
l'ordinateur, réinstallez l'unité de disque dur et redémarrez. Exécutez les tests Hard-Disk Drive (Lecteur
de disque dur) de Dell Diagnostics (reportez-vous à la section « Dell Diagnostics » à la page 81).
HARD-DISK DRIVE CONTROLLER FAILURE 0 (ÉCHEC D U CONTRÔLEUR D E DISQUE DUR 0) — L'unité de disque
dur ne répond pas aux commandes de l'ordinateur. Éteignez l'ordinateur, retirez le disque dur (reportezvous à la section « Disque dur » à la page 113) et amorcez l'ordinateur depuis un CD. Éteignez ensuite
l'ordinateur, réinstallez l'unité de disque dur et redémarrez. Si le problème persiste, faites une tentative
avec une autre unité. Exécutez les tests Hard-Disk Drive (Lecteur de disque dur) de Dell Diagnostics
(reportez-vous à la section « Dell Diagnostics » à la page 81).Dépannage 89
HARD-DISK DRIVE FAILURE (ÉCHEC D E L'UNITÉ D E DISQUE DUR) — L'unité de disque dur ne répond pas aux
commandes de l'ordinateur. Éteignez l'ordinateur, retirez le disque dur (reportez-vous à la section
« Disque dur » à la page 113) et amorcez l'ordinateur depuis un CD. Éteignez ensuite l'ordinateur,
réinstallez l'unité de disque dur et redémarrez. Si le problème persiste, faites une tentative avec une autre
unité. Exécutez les tests Hard-Disk Drive (Lecteur de disque dur) de Dell Diagnostics (reportez-vous à la
section « Dell Diagnostics » à la page 81).
HARD-DISK DRIVE READ FAILURE (ÉCHEC D E LECTURE D E L'UNITÉ D E DISQUE DUR) — L'unité de disque dur
est peut-être défectueuse. Éteignez l'ordinateur, retirez le disque dur (reportez-vous à la section « Disque
dur » à la page 113) et amorcez l'ordinateur à partir d'un CD. Éteignez ensuite l'ordinateur, réinstallez
l'unité de disque dur et redémarrez. Si le problème persiste, faites une tentative avec une autre unité.
Exécutez les tests Hard-Disk Drive (Lecteur de disque dur) de Dell Diagnostics (reportez-vous à la
section « Dell Diagnostics » à la page 81).
INSERT BOOTABLE MEDIA (INTRODUISEZ UN SUPPORT AMORÇABLE) — Le système d'exploitation tente de
s'amorcer sur un CD non amorçable. Introduisez un CD amorçable.
INVALID CONFIGURATION INFORMATION-PLEASE RUN SYSTEM SETUP PROGRAM (INFORMATIONS D E
CONFIGURATION NON VALIDES, EXÉCUTEZ L E PROGRAMME D E CONFIGURATION D U SYSTÈME) — Les
informations de configuration du système ne correspondent pas à la configuration matérielle. C'est après
l'installation d'un module de mémoire que ce message est le plus susceptible d'apparaître. Corrigez les
options appropriées dans le programme de configuration du système (reportez-vous à la section
« Utilisation du programme de configuration du système » à la page 165).
KEYBOARD CLOCK LINE FAILURE (ÉCHEC D E LA LIGNE D E L'HORLOGE CLAVIER) — Pour les claviers externes,
vérifiez la connexion du câble. Exécutez le test Keyboard Controller(Contrôleur du clavier) de Dell
Diagnostics (reportez-vous à la section « Dell Diagnostics » à la page 81).
KEYBOARD CONTROLLER FAILURE (ÉCHEC D U CONTRÔLEUR D U CLAVIER) — Pour les claviers externes, vérifiez
la connexion du câble. Redémarrez l'ordinateur et évitez de toucher le clavier ou la souris durant la
procédure d'amorçage. Exécutez le test Keyboard Controller (Contrôleur du clavier) de Dell Diagnostics
(reportez-vous à la section « Dell Diagnostics » à la page 81).
KEYBOARD DATA LINE FAILURE (ÉCHEC D E LA LIGNE D E DONNÉES D U CLAVIER) — Pour les claviers externes,
vérifiez la connexion du câble. Exécutez le test Keyboard Controller (Contrôleur du clavier) de Dell
Diagnostics (reportez-vous à la section « Dell Diagnostics » à la page 81).
KEYBOARD STUCK KEY FAILURE (TOUCHE D U CLAVIER BLOQUÉE) — Pour les pavés numériques et les claviers
externes, vérifiez la connexion du câble. Redémarrez l'ordinateur et évitez de toucher le clavier ou les
touches durant la procédure d'amorçage. Exécutez le test Stuck Key (Touche du clavier bloquée) de Dell
Diagnostics (reportez-vous à la section « Dell Diagnostics » à la page 81).
LICENSED CONTENT I S NOT ACCESSIBLE IN MEDIADIRECT (LE CONTENU SOUS LICENCE N'EST PAS ACCESSIBLE
DANS MEDIADIRECT) — Dell MediaDirect ne peut pas vérifier les restrictions Digital Rights Management
(DRM - Gestion des droits numériques) sur le fichier, le fichier ne peut par conséquent pas être lu.
Reportez-vous à la section « Problèmes Dell MediaDirect » à la page 95.
MEMORY ADDRESS LINE FAILURE A T ADDRESS, READ VALUE EXPECTING VALUE (ÉCHEC D E LA LIGNE D'ADRESSE
MÉMOIRE À CETTE ADRESSE, VALEUR LUE VALEUR ATTENDUE) — Un module de mémoire est peut-être
défectueux ou mal fixé. Réinstallez les modules de mémoire et remplacez-les au besoin (reportez-vous à
la section « Lecteurs optiques » à la page 116).90 Dépannage
MEMORY ALLOCATION ERROR (ERREUR D'ALLOCATION D E MÉMOIRE) — Le logiciel que vous voulez utiliser
est en conflit avec le système d'exploitation ou un autre programme ou utilitaire. Éteignez l'ordinateur,
patientez 30 secondes, puis redémarrez-le. Essayez d’utiliser le programme de nouveau. Si le message
d'erreur réapparaît, consultez la documentation du logiciel.
MEMORY DATA LINE FAILURE A T ADDRESS, READ VALUE EXPECTING VALUE (ÉCHEC D E L A LIGNE D E DONNÉES À
CETTE ADRESSE, VALEUR LUE VALEUR ATTENDUE) — Un module de mémoire est peut-être défectueux ou
mal fixé. Réinstallez les modules de mémoire et remplacez-les au besoin (reportez-vous à la section
« Lecteurs optiques » à la page 116).
MEMORY DOUBLE WORD LOGIC FAILURE A T ADDRESS, READ VALUE EXPECTING VALUE (ÉCHEC D E L A LOGIQUE
DOUBLE MOT À CETTE ADRESSE, VALEUR LUE VALEUR ATTENDUE) — Un module de mémoire est peut-être
défectueux ou mal fixé. Réinstallez les modules de mémoire et remplacez-les au besoin (reportez-vous à
la section « Lecteurs optiques » à la page 116).
MEMORY ODD/EVEN LOGIC FAILURE A T ADDRESS, READ VALUE EXPECTING VALUE (ÉCHEC D E L A LOGIQUE
PAIR/IMPAIR À CETTE ADRESSE, VALEUR LUE VALEUR ATTENDUE) — Un module de mémoire est peut-être
défectueux ou mal fixé. Réinstallez les modules de mémoire et remplacez-les au besoin (reportez-vous à
la section « Lecteurs optiques » à la page 116).
MEMORY WRITE/READ FAILURE A T ADDRESS, READ VALUE EXPECTING VALUE (ÉCHEC D E LECTURE/ÉCRITURE À
CETTE ADRESSE, VALEUR LUE VALEUR ATTENDUE) — Un module de mémoire est peut-être défectueux ou
mal fixé. Réinstallez les modules de mémoire et remplacez-les au besoin (reportez-vous à la section
« Lecteurs optiques » à la page 116).
NO BOOT DEVICE AVAILABLE (AUCUN PÉRIPHÉRIQUE D'AMORÇAGE N'EST DISPONIBLE) — L'ordinateur ne
peut pas trouver le disque dur. Si l'unité de disque dur est votre périphérique d'amorçage, assurez-vous
qu'elle est installée, bien en place et partitionnée comme périphérique d'amorçage.
NO BOOT SECTOR ON HARD DRIVE (AUCUN SECTEUR D'AMORÇAGE SUR L'UNITÉ D E DISQUE DUR) — Le
système d'exploitation est peut-être endommagé. Contactez Dell. Reportez-vous à la section « Contacter
Dell » à la page 137.
NO TIMER TICK INTERRUPT (AUCUNE INTERRUPTION D E TIC D'HORLOGE) — Une puce de la carte système
présente peut-être un dysfonctionnement. Exécutez les tests System Set (Ensemble du système) de Dell
Diagnostics (reportez-vous à la section « Dell Diagnostics » à la page 81).
NO T ENOUGH MEMORY O R RESOURCES. EXIT SOME PROGRAMS AND TRY AGAIN (MÉMOIRE O U RESSOURCES
INSUFFISANTES. FERMEZ DES PROGRAMMES E T RÉESSAYEZ) — Trop d'applications sont ouvertes. Fermez
toutes les fenêtres et ouvrez le programme de votre choix.
OPERATING SYSTEM NOT FOUND (SYSTÈME D'EXPLOITATION INTROUVABLE) — Réinstallez le disque dur
(reportez-vous à la section « Disque dur » à la page 113). Si le problème persiste, contactez Dell.
Reportez-vous à la section « Contacter Dell » à la page 137.
OPTIONAL ROM BAD CHECKSUM (MAUVAIS TOTAL D E CONTRÔLE D E LA ROM FACULTATIVE) — La mémoire
ROM optionnelle présente peut-être un dysfonctionnement. Contactez Dell. Reportez-vous à la section
« Contacter Dell » à la page 137.
A REQUIRED .DLL FILE WAS NOT FOUND (UN FICHIER .DLL REQUIS EST INTROUVABLE) — Il manque un
fichier essentiel au programme que vous essayez d'ouvrir. Supprimez, puis réinstallez le programme.
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Cliquez sur Ajout/Suppression de programmes.
3 Sélectionnez le programme à supprimer.Dépannage 91
4 Cliquez sur Supprimer ou Modifier/Supprimer et suivez les invites.
5 Reportez-vous à la documentation du programme pour obtenir les instructions d'installation.
SECTOR NOT FOUND (SECTEUR INTROUVABLE) — Le système d'exploitation ne parvient pas à trouver un
secteur sur le disque dur. Votre disque dur contient probablement un secteur défectueux ou une table
d'allocation de fichiers (FAT) endommagée. Exécutez l'utilitaire de vérification des erreurs Windows
pour vérifier la structure des fichiers du disque dur. Pour obtenir des instructions, reportez-vous au
Centre d'aide et de support de Windows. Pour accéder au Centre d'aide et de support, reportez-vous à la
section « Centre d'aide et de support de Windows » à la page 14. Si un grand nombre de secteurs sont
défectueux, sauvegardez les données (si vous le pouvez), puis reformatez le disque dur.
SEEK ERROR (ERREUR D E RECHERCHE) — Le système d'exploitation ne parvient pas à trouver une piste
particulière sur le disque dur.
SHUTDOWN FAILURE (ÉCHEC D E L'ARRÊT) — Une puce de la carte système présente peut-être un
dysfonctionnement. Exécutez les tests System Set (Ensemble du système) de Dell Diagnostics (reportezvous à la page 81).
TIME-O F-DAY CLOCK LOST POWER (PERTE D'ALIMENTATION D E L'HORLOGE MACHINE) — Les paramètres de
configuration du système sont corrompus. Branchez votre ordinateur sur une prise secteur pour charger
la batterie. Si le problème persiste, essayez de restaurer les données en accédant au programme de
configuration du système. Puis quittez immédiatement le programme. Reportez-vous à la section
« Utilisation du programme de configuration du système » à la page 165. Si le message réapparaît,
contactez Dell. Reportez-vous à la section « Contacter Dell » à la page 137.
TIME-O F-DAY CLOCK STOPPED (ARRÊT D E L'HORLOGE MACHINE) — La batterie de réserve qui alimente les
paramètres de configuration du système nécessite peut-être d'être rechargée. Branchez votre ordinateur
sur une prise secteur pour charger la batterie. Si le problème persiste, contactez Dell. Reportez-vous à la
section « Contacter Dell » à la page 137.
TIME-O F-DAY NOT SET-PLEASE RUN THE SYSTEM SETUP PROGRAM (L'HEURE N'EST PAS CONFIGURÉE, EXÉCUTEZ
L E PROGRAMME D E CONFIGURATION D U SYSTÈME) — L'heure ou la date du programme de configuration du
système ne correspond pas à l'horloge du système. Corrigez les paramètres des options Date et Heure.
Reportez-vous à la section « Utilisation du programme de configuration du système » à la page 165.
TIMER CHIP COUNTER 2 FAILED (ÉCHEC D U COMPTEUR 2 D E LA PUCE D'HORLOGE) — Une puce de la carte
système présente peut-être un dysfonctionnement. Exécutez le groupe de tests System Set (Ensemble
du système) de Dell Diagnostics. Reportez-vous à la section « Dell Diagnostics » à la page 81.
UNEXPECTED INTERRUPT IN PROTECTED MODE (INTERRUPTION INATTENDUE EN MODE PROTÉGÉ) — Le
contrôleur du clavier présente peut-être un dysfonctionnement ou un module de mémoire est mal fixé.
Exécutez les tests System Memory (Mémoire système) et Keyboard Controller (Contrôleur de clavier) de
Dell Diagnostics. Reportez-vous à la section « Dell Diagnostics » à la page 81.
X:\ I S NOT ACCESSIBLE. TH E DEVICE I S NOT READY (X:\ N'EST PAS ACCESSIBLE. LE PÉRIPHÉRIQUE N'EST PAS
PRÊT) — Insérez une disquette dans le lecteur et réessayez.
WARNING: BATTERY I S CRITICALLY LOW (AVERTISSEMENT : LE NIVEAU D E CHARGE D E LA BATTERIE EST
CRITIQUE) — La batterie est pratiquement déchargée. Remplacez la batterie ou branchez l'ordinateur sur
une prise secteur. Sinon, activez le mode Mise en veille prolongée ou éteignez l'ordinateur.92 Dépannage
Problèmes liés à la carte ExpressCard
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
REMARQUE : Le logement de carte ExpressCard ne prend pas en charge les cartes PC.
VÉRIFIEZ L A CARTE EXPRESSCARD — Assurez-vous que la carte ExpressCard est correctement insérée dans
le connecteur.
VÉRIFIEZ QUE L A CARTE EST RECONNUE PAR WINDOWS — Double-cliquez sur l'icône Safely Remove
Hardware (Supprimer le périphérique en toute sécurité) dans la barre des tâches Windows. Assurez-vous
que la carte est répertoriée.
SI VOUS RENCONTREZ DES PROBLÈMES AVEC UNE CARTE EXPRESSCARD FOURNIE PAR DELL — Contactez
Dell. Reportez-vous à la section « Contacter Dell » à la page 137.
SI VOUS RENCONTREZ DES PROBLÈMES AVEC UNE CARTE EXPRESSCARD NON FOURNIE PAR DELL — Contactez
le fabricant de la carte ExpressCard.
Problèmes liés au périphérique IEEE 1394
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
ASSUREZ-VOUS QUE L E PÉRIPHÉRIQUE IEEE 1394 EST RECONNU PAR WINDOWS —
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Cliquez sur Imprimantes et autres périphériques.
Si votre périphérique IEEE 1394 est répertorié, Windows le reconnaît.
SI VOUS RENCONTREZ DES PROBLÈMES AVEC UN PÉRIPHÉRIQUE IEEE 1394 FOURNI PAR DELL — Contactez
Dell ou le fabricant du périphérique IEEE 1394. Reportez-vous à la section « Contacter Dell » à la
page 137.
SI VOUS RENCONTREZ DES PROBLÈMES AVEC UN PÉRIPHÉRIQUE IEEE 1394 NON FOURNI PAR DELL —
Contactez Dell ou le fabricant du périphérique IEEE 1394. Reportez-vous à la section « Contacter Dell »
à la page 137.
ASSUREZ-VOUS QUE L E PÉRIPHÉRIQUE IEEE 1394 EST CORRECTEMENT INSÉRÉ DANS L E CONNECTEUR.
Problèmes liés au clavier
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
REMARQUE : Utilisez le clavier intégré lorsque vous exécutez Dell Diagnostics ou le programme de configuration
du système. Lorsque vous connectez un clavier externe, le clavier intégré reste entièrement opérationnel.Dépannage 93
Problèmes liés au clavier externe
REMARQUE : Lorsque vous connectez un clavier externe, le clavier intégré reste entièrement opérationnel.
VÉRIFIEZ L E CÂBLE D U CLAVIER — Éteignez l'ordinateur. Déconnectez le câble du clavier, assurez-vous
qu'il n'est pas endommagé et reconnectez-le fermement.
Si vous utilisez un câble d'extension pour clavier, déconnectez-le et branchez le clavier directement à
l'ordinateur.
VÉRIFIEZ L E CLAVIER EXTERNE —
1 Éteignez l'ordinateur, patientez une minute, puis rallumez-le.
2 Vérifiez que les voyants des touches Verr num, Verr maj et Arrêt défil du clavier clignotent pendant le
processus d'amorçage.
3 Sur le bureau Windows, cliquez sur le bouton Démarrer, pointez sur Tous les programmes→
Accessoires, puis cliquez sur Bloc-notes.
4 Entrez quelques caractères à l'aide du clavier externe et vérifiez qu'ils s'affichent correctement.
Si vous ne parvenez pas à effectuer ces vérifications, votre clavier externe est probablement
défectueux.
POUR VOUS ASSURER QUE L E PROBLÈME VIENT BIEN D U CLAVIER EXTERNE, VÉRIFIEZ L E CLAVIER INTÉGRÉ —
1 Éteignez l'ordinateur.
2 Déconnectez le clavier externe.
3 Allumez l'ordinateur.
4 Sur le bureau Windows, cliquez sur le bouton Démarrer, pointez sur Tous les programmes→
Accessoires, puis cliquez sur Bloc-notes.
5 Entrez quelques caractères à l'aide du clavier interne et vérifiez qu'ils s'affichent correctement.
Si les caractères s'affichent maintenant tandis qu'ils ne s'affichaient pas avec le clavier externe, ce
dernier est probablement défectueux. Contactez Dell. Reportez-vous à la section « Contacter Dell » à
la page 137.
EXÉCUTEZ LES TESTS D E DIAGNOSTIC D U CLAVIER — Exécutez les tests PC-AT Compatible Keyboards
(Claviers compatibles PC-AT) dans Dell Diagnostics.Reportez-vous à la section « Dell Diagnostics » à la
page 81. Si les tests indiquent que le clavier externe est défectueux, contactez Dell. Reportez-vous à la
section « Contacter Dell » à la page 137.
Caractères imprévus
DÉSACTIVEZ L E PAVÉ NUMÉRIQUE — Appuyez sur pour désactiver le pavé numérique s'il
affiche des chiffres au lieu de lettres. Assurez-vous que le voyant de verrouillage numérique n'est pas
allumé.94 Dépannage
Blocages et problèmes logiciels
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
L'ordinateur ne démarre pas
ASSUREZ-VOUS QUE L'ADAPTATEUR SECTEUR EST SOLIDEMENT BRANCHÉ SUR L'ORDINATEUR E T SUR L A PRISE
SECTEUR
L'ordinateur ne répond plus
AVIS : Vous pouvez perdre des données si vous n'arrivez pas à arrêter correctement le système d'exploitation.
ÉTEIGNEZ L'ORDINATEUR — Si vous n'obtenez aucune réponse lorsque vous appuyez sur une touche du
clavier ou lorsque vous déplacez la souris, appuyez sur le bouton d'alimentation et maintenez-le enfoncé
pendant au moins 8 à 10 secondes jusqu'à ce que l'ordinateur s'éteigne. Redémarrez l'ordinateur.
Un programme ne répond plus ou se bloque régulièrement
FIN D U PROGRAMME —
1 Appuyez simultanément sur <Échap>.
2 Cliquez sur l'onglet Applications, puis sélectionnez le programme qui ne répond plus.
3 Cliquez sur Fin de tâche.
REMARQUE : Le programme chkdsk peut s'exécuter lorsque vous redémarrez l'ordinateur. Suivez les instructions
qui s'affichent à l'écran.
CONSULTEZ L A DOCUMENTATION D U LOGICIEL — Si nécessaire, supprimez, puis réinstallez le programme.
La documentation, la disquette ou le CD qui accompagne tout logiciel inclut généralement des
instructions d'installation.
Un programme est conçu pour un système d'exploitation Microsoft® Windows® antérieur
EXÉCUTEZ L'ASSISTANT COMPATIBILITÉ DES PROGRAMMES — L'Assistant Compatibilité des programmes
configure un programme pour qu'il fonctionne dans un environnement proche des environnements des
systèmes d'exploitation non Windows XP.
1 Cliquez sur le bouton Démarrer, pointez sur Tous les programmes→ Accessoires, puis cliquez sur
Assistant Compatibilité des programmes.
2 Dans l'écran d'accueil, cliquez sur Suivant.
3 Suivez les instructions qui s'affichent à l'écran.
Un écran bleu uni apparaît
ÉTEIGNEZ L'ORDINATEUR — Si vous n'obtenez aucune réponse lorsque vous appuyez sur une touche du
clavier ou lorsque vous déplacez la souris, appuyez sur le bouton d'alimentation et maintenez-le enfoncé
pendant au moins 8 à 10 secondes jusqu'à ce que l'ordinateur s'éteigne. Redémarrez l'ordinateur. Dépannage 95
Problèmes Dell MediaDirect
POUR PLUS D'INFORMATIONS, REPORTEZ-VOUS A U FICHIER D'AIDE DELL MEDIADIRECT — Cliquez sur l'icône
en forme de point d'interrogation en bas de l'écran Dell MediaDirect pour accéder à l'aide.
POUR LIRE DES FILMS AVEC DELL MEDIADIRECT, VOUS DEVEZ AVOIR UN LECTEUR D E DVD E T L E LOGICIEL DELL
DVD PLAYER — Si vous avez acheté un ordinateur équipé d'un lecteur de DVD, ce logiciel doit déjà être
installé.
PROBLÈMES LIÉS À LA QUALITÉ VIDÉO — Désactivez l'option Use Hardware Acceleration (Utiliser
l'accélération matérielle). Cette fonctionnalité utilise le traitement spécial dans certains graphiques pour
réduire les exigences du processeur lors de la lecture de DVD et de certains types de fichiers vidéo.
IMPOSSIBILITÉ D E LIRE CERTAINS FICHIERS MÉDIA — Étant donné que Dell MediaDirect offre un accès aux
fichiers média hors de l'environnement du système d'exploitation Windows XP, l'accès au contenu sous
licence est restreint. Le contenu sous licence est du contenu numérique auquel s'applique Digital Rights
Management (DRM). L'environnement Dell MediaDirect ne peut pas vérifier les restrictions DRM, les
fichiers sous licence ne peuvent par conséquent pas être lus. Les fichiers musicaux et vidéo sous licence
sont indiqués par une icône verrou. Vous pouvez accéder aux fichiers sous licence dans l'environnement
du système d'exploitation Windows XP.
RÉGLAGE DES PARAMÈTRES D E COULEUR POUR LES FILMS CONTENANT DES SCÈNES TROP SOMBRES O U TROP
CLAIRES — Cliquez sur EagleVision pour utiliser une technologie d'amélioration vidéo qui détecte le
contenu vidéo et règle la luminosité/le contraste/la saturation de manière dynamique.
AVIS : Vous ne pouvez pas réinstaller la fonctionnalité Dell MediaDirect si vous reformatez volontairement le
disque dur. Contactez Dell pour obtenir une assistance. Reportez-vous à la section « Contacter Dell » à la page 137.
Autres problèmes logiciels
CONSULTEZ L A DOCUMENTATION D U LOGICIEL O U CONTACTEZ L E FABRICANT POUR OBTENIR DES INFORMATIONS
D E DÉPANNAGE —
• Assurez-vous que le programme est compatible avec le système d'exploitation installé sur votre
ordinateur.
• Assurez-vous que l'ordinateur est conforme aux exigences matérielles requises pour que le logiciel
fonctionne. Consultez la documentation du logiciel pour de plus amples informations.
• Assurez-vous que le programme est correctement installé et configuré.
• Assurez-vous que les pilotes de périphérique n'entrent pas en conflit avec le programme.
• Le cas échéant, supprimez, puis réinstallez le programme.
SAUVEGARDEZ IMMÉDIATEMENT VOS FICHIERS
UTILISEZ UN PROGRAMME D E RECHERCHE DES VIRUS POUR VÉRIFIER L E DISQUE DUR, LES DISQUETTES O U LES CD
ENREGISTREZ E T QUITTEZ TOUS LES PROGRAMMES E T LES FICHIERS OUVERTS, PUIS ÉTEIGNEZ L'ORDINATEUR VIA
L E MENU Démarrer96 Dépannage
ANALYSEZ L'ORDINATEUR À L A RECHERCHE D E LOGICIELS ESPIONS — Si vous observez un ralentissement des
performances de votre ordinateur, si des fenêtres publicitaires s'affichent fréquemment sur votre écran ou
si vous avez des problèmes pour vous connecter sur Internet, votre ordinateur est peut-être infecté par un
logiciel espion. Utilisez un programme antivirus qui inclut une protection contre les logiciels espions
(une mise à niveau de votre programme sera peut-être nécessaire) afin d'analyser votre ordinateur et de
supprimer les logiciels espions. Pour plus d'informations, allez sur le site support.dell.com et lancez une
recherche à l'aide du mot-clé spyware (espion).
EXÉCUTEZ DELL DIAGNOSTICS — Si tous les tests s'exécutent correctement, la condition d'erreur est liée à
un problème logiciel. Reportez-vous à la section « Dell Diagnostics » à la page 81.
Problèmes liés à la mémoire
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
SI L E MESSAGE D E MÉMOIRE INSUFFISANTE S'AFFICHE —
• Enregistrez et fermez tous les fichiers ouverts et quittez tous les programmes en cours d'exécution que
vous n'utilisez pas pour voir si cela permet de résoudre le problème.
• Consultez la documentation du logiciel pour prendre connaissance des besoins en mémoire minimaux.
Le cas échéant, ajoutez de la mémoire. Reportez-vous à la section « Lecteurs optiques » à la page 116.
• Réinsérez les modules de mémoire pour vous assurer que l'ordinateur communique bien avec la
mémoire. Reportez-vous à la section « Lecteurs optiques » à la page 116.
• Exécutez Dell Diagnostics. Reportez-vous à la section « Dell Diagnostics » à la page 81.
SI VOUS RENCONTREZ D'AUTRES PROBLÈMES D E MÉMOIRE —
• Réinstallez les modules de mémoire pour vous assurer que votre ordinateur communique correctement
avec la mémoire (reportez-vous à la section « Lecteurs optiques » à la page 116).
• Veillez à bien suivre les consignes d'installation de la mémoire. Reportez-vous à la section « Lecteurs
optiques » à la page 116.
• Exécutez Dell Diagnostics. Reportez-vous à la section « Dell Diagnostics » à la page 81.
Problèmes liés au réseau
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
VÉRIFIEZ L E CONNECTEUR D U CÂBLE RÉSEAU — Vérifiez que le câble de réseau est bien inséré dans le
connecteur de réseau situé sur le côté de l'ordinateur et le port ou périphérique réseau.
VÉRIFIEZ LES VOYANTS D U RÉSEAU SUR L E CONNECTEUR RÉSEAU — Si aucun voyant ne s'allume, cela
signifie qu'il n'y a pas de communication avec le réseau. Remplacez le câble de réseau.
REDÉMARREZ L'ORDINATEUR E T RECONNECTEZ-VOUS A U RÉSEAU
VÉRIFIEZ LES PARAMÈTRES D U RÉSEAU — Contactez l'administrateur de réseau pour qu'il vérifie vos
paramètres et le fonctionnement du réseau.Dépannage 97
Problèmes d'alimentation
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
VÉRIFIEZ L E VOYANT D'ALIMENTATION — Lorsque le voyant d'alimentation est allumé ou lorsqu'il clignote,
l'ordinateur est sous tension. Si le voyant clignote, l'ordinateur est en mode Veille—appuyez sur le
bouton d'alimentation pour quitter le mode Veille. Si le voyant est éteint, appuyez sur le bouton
d'alimentation pour allumer l'ordinateur.
REMARQUE : Pour plus d'informations sur le mode Veille, reportez-vous à la section « Modes d'économie
d'énergie » à la page 40.
CHARGEZ LA BATTERIE — Il se peut que la batterie soit déchargée.
1 Réinstallez la batterie.
2 Utilisez l'adaptateur secteur pour connecter votre ordinateur à une prise secteur.
3 Allumez l'ordinateur.
REMARQUE : L'autonomie de la batterie (la période durant laquelle la batterie reste chargée) diminue avec le
temps. Selon la fréquence d'utilisation et les conditions de fonctionnement de la batterie, vous devrez peut-être en
acheter une autre au cours de la durée de vie de votre ordinateur.
VÉRIFIEZ L E VOYANT D'ÉTAT D E LA BATTERIE — Si le voyant d'état de la batterie clignote en orange ou est
orange et fixe, la batterie est peu chargée ou complètement déchargée. Connectez l'ordinateur à une
prise secteur.
Si le voyant d'état de la batterie clignote alternativement en vert et orange, la batterie est trop chaude
pour lancer le processus de recharge. Éteignez l'ordinateur, déconnectez-le de la prise secteur, ainsi que la
batterie, pour qu'ils reviennent à la température ambiante.
Si le voyant d'état de la batterie est vert et clignote rapidement, il se peut que la batterie soit
défectueuse. Contactez Dell. Reportez-vous à la section « Contacter Dell » à la page 137.
VÉRIFIEZ L A TEMPÉRATURE D E LA BATTERIE — Si la température de la batterie est inférieure à 0 °C (32 °F),
l'ordinateur ne démarrera pas.
TESTEZ L A PRISE SECTEUR — Assurez-vous que la prise secteur fonctionne en la testant à l'aide d'un autre
appareil, une lampe par exemple.
VÉRIFIEZ L'ADAPTATEUR SECTEUR — Vérifiez les connexions du câble de l'adaptateur secteur. Si
l'adaptateur secteur est muni d'un voyant, assurez-vous que ce dernier est allumé.
CONNECTEZ L'ORDINATEUR DIRECTEMENT À UNE PRISE SECTEUR — Contournez les parasurtenseurs, les
rampes d'alimentation et les rallonges de câble pour vérifier que l'ordinateur est sous tension.
ÉLIMINEZ LES SOURCES POTENTIELLES D'INTERFÉRENCES — Éteignez les ventilateurs, les lampes
fluorescentes ou halogènes ou tout autre appareil se trouvant à proximité.
RÉGLEZ LES PROPRIÉTÉS D E L'ALIMENTATION — Reportez-vous à la section « Modes d'économie d'énergie »
à la page 40.
REMETTEZ EN PLACE LES MODULES D E MÉMOIRE — Si le voyant d'alimentation de l'ordinateur est allumé
mais que l'écran reste vide, réinstallez les modules de mémoire (reportez-vous à la section « Lecteurs
optiques » à la page 116).98 Dépannage
Problèmes d'imprimante
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
REMARQUE : Si vous avez besoin d'une assistance technique pour votre imprimante, contactez le fabricant.
VÉRIFIEZ QUE L'IMPRIMANTE EST ALLUMÉE
VÉRIFIEZ LES CONNEXIONS DES CÂBLES D E L'IMPRIMANTE —
• Consultez la documentation de l'imprimante pour obtenir des informations sur la connexion des
câbles.
• Assurez-vous que les câbles de l'imprimante sont solidement connectés à l'imprimante et à l'ordinateur.
TESTEZ L A PRISE SECTEUR — Assurez-vous que la prise secteur fonctionne en la testant à l'aide d'un autre
appareil, une lampe par exemple.
VÉRIFIEZ QUE L'IMPRIMANTE EST RECONNUE PAR WINDOWS —
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration et ensuite sur Imprimantes et
autres périphériques.
2 Cliquez sur Afficher les imprimantes ou les télécopieurs installés.
Si l'imprimante apparaît dans la liste, cliquez avec le bouton droit sur l'icône la représentant.
3 Cliquez sur Propriétés, puis sur l'onglet Ports. Pour une imprimante parallèle, assurez-vous que le port
d'impression est défini sur LPT1 (Port de l'imprimante). Pour une imprimante USB, assurez-vous que
le port d'impression est défini sur USB.
RÉINSTALLATION D U PILOTE D E L'IMPRIMANTE — Reportez-vous à la documentation de l'imprimante pour
obtenir des instructions.
Problèmes liés au scanner
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
REMARQUE : Si vous avez besoin d'une assistance technique pour votre scanner, contactez le fabricant du
scanner.
CONSULTEZ L A DOCUMENTATION D E L'IMPRIMANTE — Reportez-vous à la documentation de l'imprimante
pour obtenir des informations de configuration et de dépannage.
CONSULTEZ L A DOCUMENTATION D U SCANNER — Reportez-vous à la documentation du scanner pour
obtenir des informations de configuration et de dépannage.
DÉVERROUILLEZ L E SCANNER — Vérifiez que votre scanner est déverrouillé s'il comporte un bouton ou une
languette de verrouillage.
REDÉMARREZ L'ORDINATEUR E T RÉESSAYEZ
VÉRIFIEZ LES CONNEXIONS DES CÂBLES —
• Consultez la documentation du scanner pour obtenir des informations sur la connexion des câbles.
• Assurez-vous que les câbles du scanner sont solidement connectés au scanner et à l'ordinateur.Dépannage 99
VÉRIFIEZ QUE L E SCANNER EST RECONNU PAR MICROSOFT WINDOWS —
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration et ensuite sur Imprimantes et
autres périphériques.
2 Cliquez sur Scanners et appareils-photo.
Si votre scanner est répertorié, Windows le reconnaît.
RÉINSTALLEZ L E PILOTE D U SCANNER — Consultez la documentation du scanner pour obtenir des
instructions.
Problèmes de son et de haut-parleurs
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Aucun son ne sort des haut-parleurs intégrés
RÉGLEZ L E CONTRÔLE D E VOLUME D E WINDOWS — Double-cliquez sur l'icône en forme de haut-parleur,
dans le coin inférieur droit de l'écran. Assurez-vous d'avoir monté le volume et que le son n'est pas mis en
sourdine. Réglez le volume, les aigus ou les basses pour supprimer toute distorsion.
RÉGLEZ L E VOLUME À L'AIDE DES RACCOURCIS CLAVIER — Pour désactiver (mettre en sourdine) les hautparleurs intégrés, appuyez sur .
RÉINSTALLEZ L E PILOTE AUDIO — Reportez-vous à la section « Réinstallation des pilotes et utilitaires » à la
page 102.
Aucun son ne sort des haut-parleurs externes
ASSUREZ-VOUS QUE L E CAISSON D E BASSE E T LES HAUT-PARLEURS SONT SOUS TENSION — Reportez-vous au
schéma d'installation fourni avec les haut-parleurs. Si vos haut-parleurs sont dotés de commandes du
volume, réglez le volume, les basses ou les aigus pour éliminer les distorsions.
RÉGLEZ L E VOLUME D E WINDOWS — Cliquez ou double-cliquez sur l'icône haut-parleur dans le coin
inférieur droit de l'écran. Assurez-vous d'avoir monté le volume et que le son n'est pas mis en sourdine.
DÉCONNECTEZ L E CASQUE D U CONNECTEUR D E CASQUE — Le son des haut-parleurs est automatiquement
désactivé lorsque le casque est connecté au connecteur de casque du panneau avant de l'ordinateur.
TESTEZ L A PRISE SECTEUR — Assurez-vous que la prise secteur fonctionne en la testant à l'aide d'un autre
appareil, une lampe par exemple.
ÉLIMINEZ LES SOURCES POTENTIELLES D'INTERFÉRENCES — Éteignez les ventilateurs, tubes au néon ou
lampes halogènes proches afin de vérifier s'ils produisent des interférences.
RÉINSTALLEZ L E PILOTE AUDIO — Reportez-vous à la section « Réinstallation des pilotes et utilitaires » à la
page 102.
EXÉCUTEZ DELL DIAGNOSTICS — Reportez-vous à la section « Dell Diagnostics » à la page 81.
REMARQUE : Le réglage du volume de certains lecteurs MP3 annule l'effet du paramètre de volume de Windows.
Si vous avez écouté des chansons au format MP3, assurez-vous que vous n'avez pas baissé ou augmenté le
volume.100 Dépannage
Aucun son émis par le casque
VÉRIFIEZ L A CONNEXION DES CÂBLES D U CASQUE — Assurez-vous que le câble du casque est solidement
connecté au connecteur de casque (reportez-vous à la section « connecteurs audio » à la page 20).
RÉGLEZ L E CONTRÔLE D E VOLUME D E WINDOWS — Cliquez ou double-cliquez sur l'icône haut-parleur dans
le coin inférieur droit de l'écran. Assurez-vous d'avoir monté le volume et que le son n'est pas mis en
sourdine.
Problèmes liés à la tablette tactile ou à la souris
VÉRIFIEZ LES PARAMÈTRES D E LA TABLETTE TACTILE —
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration et ensuite sur Imprimantes et
autres périphériques.
2 Cliquez sur Souris.
3 Réglez les paramètres.
VÉRIFIEZ L E CÂBLE D E LA SOURIS — Éteignez l'ordinateur. Déconnectez le câble de la souris, vérifiez s'il
n'est pas endommagé et reconnectez-le fermement.
Si vous utilisez un câble d'extension pour la souris, déconnectez-le et branchez la souris directement à
l'ordinateur.
POUR VOUS ASSURER QUE L E PROBLÈME VIENT D E LA SOURIS, TESTEZ L A TABLETTE TACTILE —
1 Éteignez l'ordinateur.
2 Déconnectez la souris.
3 Allumez l'ordinateur.
4 Lorsque le bureauWindows apparaît, utilisez la tablette tactile pour déplacer le curseur, sélectionner
une icône et l'ouvrir.
Si la tablette tactile fonctionne correctement, la souris est probablement défectueuse.
RÉINSTALLEZ L E PILOTE D E L A TABLETTE TACTILE — Reportez-vous à la section « Réinstallation des pilotes
et utilitaires » à la page 102.
Problèmes vidéo et d'affichage
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Si l'écran est vide
REMARQUE : Si vous utilisez un programme qui exige une résolution supérieure à celle dont vous disposez, Dell
vous conseille de brancher un écran externe à votre ordinateur.
VÉRIFIEZ L A BATTERIE — Si vous utilisez une batterie pour alimenter l'ordinateur, la batterie peut être
déchargée. Branchez l'ordinateur sur une prise secteur à l'aide de l'adaptateur secteur, puis allumez
l'ordinateur.Dépannage 101
TESTEZ L A PRISE SECTEUR — Assurez-vous que la prise secteur fonctionne en la testant à l'aide d'un autre
appareil, une lampe par exemple.
VÉRIFIEZ L'ADAPTATEUR SECTEUR — Vérifiez les connexions du câble de l'adaptateur secteur. Si
l'adaptateur secteur est muni d'un voyant, assurez-vous que ce dernier est allumé.
CONNECTEZ L'ORDINATEUR DIRECTEMENT À UNE PRISE SECTEUR — Contournez les parasurtenseurs, les
rampes d'alimentation et les rallonges de câble pour vérifier que l'ordinateur est sous tension.
RÉGLEZ LES PROPRIÉTÉS D E L'ALIMENTATION — Lancez une recherche à l'aide du mot-clé veille dans le
Centre d'aide et de support de Windows. Pour accéder au Centre d'aide et de support, reportez-vous à la
section « Centre d'aide et de support de Windows » à la page 14.
BASCULEZ L'IMAGE VIDÉO — Si votre ordinateur est connecté à un moniteur externe, appuyez sur
pour basculer l'affichage de l'image vidéo vers l'écran.
Si l'écran est difficile à lire
RÉGLEZ L A LUMINOSITÉ — Appuyez sur et sur la touche fléchée vers le haut ou vers le bas.
ÉLOIGNEZ L E CAISSON D E BASSE EXTERNE D E L'ORDINATEUR O U D E L'ÉCRAN — Si vos haut-parleurs externes
comportent un caisson de basse, vérifiez que ce dernier se trouve à au moins 60 cm (2 pieds) de
l'ordinateur ou du moniteur externe.
ÉLIMINEZ LES SOURCES POTENTIELLES D'INTERFÉRENCES — Éteignez les ventilateurs, les lampes
fluorescentes ou halogènes ou tout autre appareil se trouvant à proximité.
ORIENTEZ L'ORDINATEUR DANS UNE DIRECTION DIFFÉRENTE — Éliminez les reflets du soleil pouvant altérer
la qualité de l'image.
RÉGLEZ LES PARAMÈTRES D'AFFICHAGE D E WINDOWS —
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Cliquez sur Apparence et thèmes.
3 Cliquez sur la zone que vous souhaitez modifier ou cliquez sur l'icône Affichage.
4 Essayez différents paramètres de Qualité couleur et Résolution d'écran.
VOIR «MESSAGES D'ERREUR » — Si un message d'erreur apparaît, reportez-vous à la section « Messages
d'erreur » à la page 87.
Si seule une partie de l'écran est lisible
CONNECTEZ UN MONITEUR EXTERNE —
1 Éteignez votre ordinateur et connectez un moniteur externe à ce dernier.
2 Allumez l'ordinateur et le moniteur, puis réglez la luminosité et le contraste.
Si le moniteur externe fonctionne correctement, le moniteur ou le contrôleur vidéo de l'ordinateur peut
être défectueux. Contactez Dell. Reportez-vous à la section « Contacter Dell » à la page 137.102 Dépannage
Pilotes
Qu'est-ce qu'un pilote ?
Un pilote est un programme qui contrôle un périphérique, une imprimante, une souris ou un clavier par
exemple. Tous les périphériques nécessitent un pilote.
Un pilote sert d'interprète entre le périphérique et tout autre programme qui l'utilise. Chaque
périphérique dispose de son propre jeu de commandes spécialisées que seul son pilote reconnaît.
Lorsque Dell livre l'ordinateur, les pilotes requis sont déjà installés—aucune installation ou configuration
supplémentaire n'est nécessaire.
AVIS : Le CD Drivers and Utilities peut contenir des pilotes pour des systèmes d'exploitation qui ne sont pas
installés sur votre ordinateur. Assurez-vous que vous installez les logiciels appropriés à votre système
d'exploitation.
De nombreux pilotes, tels que le pilote du clavier, sont fournis avec le système d'exploitation Microsoft®
Windows®. Vous devez installer des pilotes si vous :
• Mettez à jour votre système d'exploitation ;
• Réinstallez votre système d'exploitation ;
• Connectez ou installez un nouveau périphérique.
Identification des pilotes
Si vous rencontrez des difficultés avec un périphérique, identifiez le pilote à l'origine du problème et
mettez-le à niveau si nécessaire.
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Sous Choisissez une catégorie, cliquez sur Performances et maintenance.
3 Cliquez sur Système.
4 Dans la fenêtre Propriétés système, cliquez sur l'onglet Matériel.
5 Cliquez sur Gestionnaire de périphériques.
6 Faites défiler la liste pour rechercher des périphériques comportant un point d'exclamation (un cercle
jaune et un [!]) sur l'icône du périphérique.
Lorsqu'un point d'exclamation se trouve à côté du nom du périphérique, vous devez réinstaller le
pilote ou en installer un nouveau. Reportez-vous à la section « Réinstallation des pilotes et utilitaires »
à la page 102.
Réinstallation des pilotes et utilitaires
AVIS : Le site Web de support de Dell à l'adresse support.dell.com et le CD Drivers and Utilities fournissent les
pilotes appropriés pour les ordinateurs Dell™. Si vous installez des pilotes que vous avez obtenus par d'autres
moyens, votre ordinateur risque de ne pas fonctionner correctement.
REMARQUE : Le CD Drivers and Utilities est en option et n'est pas obligatoirement expédié avec votre ordinateur.Dépannage 103
Utilisation de la fonction Device Driver Rollback (Restauration des pilotes de périphériques) de Windows XP
Si un problème apparaît sur votre ordinateur après avoir installé ou mis à jour le pilote, utilisez la
fonction Restauration des pilotes de périphériques de Windows XP pour remplacer le pilote par la
version précédemment installée.
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Sous Choisissez une catégorie, cliquez sur Performances et maintenance.
3 Cliquez sur Système.
4 Dans la fenêtre Propriétés système, cliquez sur l'onglet Matériel.
5 Cliquez sur Gestionnaire de périphériques.
6 Cliquez avec le bouton droit sur le périphérique pour lequel le nouveau pilote a été installé et cliquez
sur Propriétés.
7 Cliquez sur l'onglet Pilotes.
8 Cliquez sur Restauration des pilotes.
Si le problème persiste, utilisez la fonction Restauration du système pour retourner à un état de
fonctionnement de votre système d'exploitation antérieur à l'installation du nouveau pilote de
périphérique.
Utilisation du CD Drivers and Utilities
REMARQUE : Le CD Drivers and Utilities est en option et n'est pas obligatoirement expédié avec votre ordinateur.
Si l'utilisation de la fonctionRestauration des pilotes de périphériques (reportez-vous à la section
« Utilisation de la fonction Device Driver Rollback (Restauration des pilotes de périphériques) de
Windows XP » à la page 103) ou de Restauration du système ne résout pas le problème, réinstallez le
pilote à partir du CD Drivers and Utilities.
1 Enregistrez et fermez tous les fichiers et quittez tous les programmes.
2 Insérez le CD Drivers and Utilities.
Dans la plupart des cas, le CD démarre automatiquement. Dans le cas contraire, lancez l'Explorateur
Windows, cliquez sur le répertoire du lecteur de CD pour afficher le contenu du CD, puis doublecliquez sur le fichier autorcd.exe. La première fois que vous exécutez le CD, il se peut qu'il vous invite
à installer des fichiers de configuration. Cliquez sur OK et suivez les instructions qui s'affichent pour
continuer.
3 Dans le menu déroulant Langue de la barre d'outils, sélectionnez une langue pour le pilote ou
l'utilitaire (si disponible). Un écran d'accueil s'affiche.
4 Cliquez sur Suivant.
Le CD analyse automatiquement votre matériel et détecte les pilotes et les utilitaires employés par
votre ordinateur.
5 Une fois l'analyse du matériel terminée, vous pouvez détecter d'autres pilotes et utilitaires. Sous
Critères de recherche, sélectionnez les catégories appropriées dans les menus déroulants Modèle de
système, Système d'exploitation et Rubrique.
Un ou plusieurs liens apparaissent pour le pilote et l'utilitaire particuliers utilisés par votre ordinateur.104 Dépannage
6 Cliquez sur le lien d'un pilote ou d'un utilitaire spécifique afin d'afficher les informations
correspondantes.
7 Cliquez sur le bouton Installer (s'il est disponible) pour lancer l'installation du pilote ou de l'utilitaire.
À l'écran d'accueil, suivez les invites pour terminer l'installation.
Si vous ne trouvez pas de bouton Installer, l'installation automatique n'est pas possible. Pour obtenir
des instructions d'installation, reportez-vous aux instructions appropriées dans les sous-sections
suivantes ou cliquez sur le bouton Extraire, suivez les instructions d'extraction et lisez le fichier Lisezmoi.
S'il vous est demandé de trouver les fichiers de pilote, cliquez sur le répertoire du CD dans la fenêtre
d'information sur le pilote pour afficher les fichiers associés à ce pilote.
Réinstallation manuelle des pilotes
1 Une fois les fichiers de pilote extraits vers votre disque dur, tel que décrit dans la section précédente,
cliquez sur le bouton Démarrer, puis cliquez avec le bouton droit de la souris sur Poste de travail.
2 Cliquez sur Propriétés.
3 Cliquez sur l'onglet Matériel, puis sur Gestionnaire de périphériques.
4 Double-cliquez sur le type de périphérique pour lequel vous installez le pilote (par exemple, Modems
ou périphériques infrarouges).
5 Double-cliquez sur le nom du périphérique pour lequel vous installez le pilote.
6 Cliquez sur l'onglet Pilote, puis sur Mettre à jour le pilote.
7 Cliquez sur Installer à partir d'une liste ou d'un emplacement spécifié (utilisateurs expérimentés),
puis sur Suivant.
8 Cliquez sur Parcourir et placez-vous à l'endroit où vous avez précédemment copié les fichiers de pilote.
9 Lorsque le nom du pilote approprié apparaît, cliquez sur Suivant.
10 Cliquez sur Terminer et redémarrez l'ordinateur.
Résolution des incompatibilités logicielles et matérielles
Si un périphérique n'est pas détecté pendant la configuration du système d'exploitation ou est détecté
mais n'est pas configuré correctement, utilisez le Dépanneur des conflits matériels pour résoudre cette
incompatibilité.
Pour démarrer le Dépanneur des conflits matériels :
1 Cliquez sur le bouton Démarrer, puis sur Aide et Support.
2 Entrez dépanneur des conflits matériels dans le champ Rechercher, puis cliquez sur la
flèche pour lancer la recherche.
3 Cliquez sur Dépanneur de conflits matériels dans la liste Résultats de la recherche.
4 Dans la liste Dépanneur de conflits matériels, cliquez sur Je dois résoudre un conflit matériel sur
mon ordinateur, puis sur Suivant.Dépannage 105
Restauration du système d'exploitation
Plusieurs méthodes de restauration du système d'exploitation sont disponibles :
• La fonction Restauration du système de Microsoft® Windows® XP ramène votre ordinateur à un état
de fonctionnement antérieur, sans affecter les fichiers de données. Commencez par utiliser la fonction
Restauration du système pour restaurer votre système d'exploitation et préserver vos fichiers de
données.
• L'utilitaire Dell PC Restore de Symantec restaure votre disque dur à l'état de fonctionnement dans
lequel il était lorsque vous avez acheté l'ordinateur. Dell PC Restore supprime de façon permanente
toutes les données qui figurent sur le disque dur et supprime toutes les applications installées après
réception de l'ordinateur. N'utilisez PC Restore que si la restauration du système n'a pas résolu le
problème rencontré par votre système d'exploitation.
• Si un CD Operating system vous a été livré avec votre ordinateur, vous pouvez l'utiliser pour restaurer
votre système d'exploitation. Toutefois, l'utilisation de ce CD entraîne la suppression de toutes les
données présentes sur le disque dur. N'utilisez ce CD que si la restauration du système n'a pas permis
de résoudre le problème rencontré par votre système d'exploitation.
Utilisation de la fonction Restauration du système de MicrosoftWindows XP
Le système d'exploitation Microsoft Windows XP comporte la fonction Restauration du système, qui
vous permet de restaurer l'ordinateur à un état antérieur (sans affecter les fichiers de données) si les
modifications apportées au matériel, aux logiciels ou aux paramètres du système empêchent l'ordinateur
de fonctionner correctement. Consultez le Centre d'aide et de support Windows pour plus
d'informations sur l'utilisation de la fonction Restauration du système. Pour accéder au Centre d'aide et
de support, reportez-vous à la section « Centre d'aide et de support de Windows » à la page 14.
AVIS : Sauvegardez régulièrement vos fichiers de données. La fonction Restauration du système ne contrôle pas
vos fichiers de données et ne permet pas de les récupérer.
REMARQUE : Les procédures présentées dans ce document concernent l'affichage par défaut de Windows. Par
conséquent, elles risquent de ne pas fonctionner si votre ordinateur Dell™ est réglé sur le mode d'affichage
classique de Windows.
Création d'un point de restauration
1 Cliquez sur le bouton Démarrer, puis sur Aide et support.
2 Cliquez sur la tâche Restauration du système.
3 Suivez les instructions qui s'affichent à l'écran.
Restauration de l'ordinateur à un état antérieur
Si des problèmes surviennent après l'installation d'un pilote de périphérique, utilisez la fonction
Restauration des pilotes de périphériques (reportez-vous à la section « Utilisation de la fonction Device
Driver Rollback (Restauration des pilotes de périphériques) de Windows XP » à la page 103) pour
résoudre le problème. Si le problème persiste, utilisez la fonction Restauration du système.
AVIS : Avant de restaurer l'ordinateur à un état antérieur, enregistrez et fermez tous les fichiers ouverts et quittez
tous les programmes en cours d'exécution. Ne modifiez, n'ouvrez ou ne supprimez en aucun cas des fichiers ou
des programmes tant que la restauration du système n'est pas terminée.106 Dépannage
1 Cliquez sur le bouton Démarrer, pointez sur Tous les programmes→ Accessoires→ Outils système,
puis cliquez sur Restauration du système.
2 Assurez-vous que l'option Restaurer mon ordinateur à un état antérieur est sélectionnée, puis cliquez
sur Suivant.
3 Cliquez sur une date du calendrier à laquelle vous souhaitez restaurer votre ordinateur.
L'écran Sélectionner un point de restauration affiche un calendrier vous permettant de sélectionner
des points de restauration. Toutes les dates du calendrier comportant des points de restauration
apparaissent en gras.
4 Sélectionnez un point de restauration, puis cliquez sur Suivant.
Si une date du calendrier contient un seul point de restauration, ce dernier est sélectionné
automatiquement. Si plusieurs points de restauration sont disponibles, cliquez sur celui que vous
souhaitez utiliser.
5 Cliquez sur Suivant.
L'écran Restauration terminée s'affiche une fois que la collecte des données par la fonction
Restauration du système est terminée. L'ordinateur redémarre.
6 Une fois l'ordinateur redémarré, cliquez sur OK.
Pour changer de point de restauration, répétez les étapes précédentes en utilisant un autre point de
restauration ou annulez la restauration.
Annulation de la dernière restauration du système
AVIS : Avant d'annuler la dernière restauration du système, enregistrez et fermez tous les fichiers ouverts et
quittez tous les programmes en cours d'exécution. Ne modifiez, n'ouvrez ou ne supprimez en aucun cas des
fichiers ou des programmes tant que la restauration du système n'est pas terminée.
1 Cliquez sur le bouton Démarrer, pointez sur Tous les programmes→ Accessoires→ Outils système,
puis cliquez sur Restauration du système.
2 Cliquez sur Undo my last restoration (Annuler ma dernière restauration), puis sur Suivant.
Activation de la fonctionnalité Restauration du système
Si vous réinstallez Windows XP avec moins de 200 Mo d'espace disponible sur le disque dur, la fonction
Restauration du système est automatiquement désactivée. Pour vérifier si la fonction Restauration du
système est activée :
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Cliquez sur Performances et maintenance.
3 Cliquez sur Système.
4 Cliquez sur l'onglet Restauration du système.
5 Assurez-vous que l'option Désactiver la Restauration du système est bien désactivée.Dépannage 107
Utilisation de Dell PC Restore de Symantec
AVIS : Dell PC Restore supprime définitivement toutes les données qui figurent sur le disque dur et supprime
toutes les applications et tous les pilotes installés après que vous avez reçu l'ordinateur. Si possible, sauvegardez
toutes les données avant de lancer PC Restore. N'utilisez PC Restore que si la restauration du système n'a pas
résolu le problème rencontré par votre système d'exploitation.
REMARQUE : Dell PC Restore de Symantec n'est pas obligatoirement disponible dans certains pays ou sur
certains ordinateurs.
N'utilisez Dell PC Restore de Symantec qu'en dernier ressort pour restaurer votre système d'exploitation.
PC Restore restaure votre disque dur à l'état de fonctionnement dans lequel il était lorsque vous avez
acheté l'ordinateur. Tous les programmes ou fichiers ajoutés depuis que vous avez reçu votre ordinateur,
notamment les fichiers de données, sont définitivement supprimés du disque dur. Les documents,
feuilles de calcul, messages électroniques, photos numériques et fichiers de musique constituent les
fichiers de données. Si possible, sauvegardez toutes les données avant de lancer PC Restore.
Pour utiliser PC Restore :
1 Allumez l'ordinateur.
Au cours du processus d'amorçage, une barre bleue portant la mention www.dell.com apparaît dans la
partie supérieure de l'écran.
2 Dès que cette barre bleue s'affiche, appuyez sur .
Si vous n'appuyez pas sur à temps, laissez l'ordinateur finir de démarrer, puis
redémarrez-le de nouveau.
AVIS : Si vous ne voulez pas poursuivre l'utilisation de PC Restore, cliquez sur Redémarrer à l'étape suivante.
3 Dans l'écran qui apparaît ensuite, cliquez sur Restaurer.
4 Dans l'écran suivant, cliquez sur Confirmer.
La restauration prend de 6 à 10 minutes environ.
5 Lorsque vous y êtes invité, cliquez sur Terminer pour redémarrer l'ordinateur.
REMARQUE : N'éteignez pas manuellement l'ordinateur. Cliquez sur Terminer et laissez l'ordinateur
terminer le redémarrage.
6 Lorsque vous y êtes invité, cliquez sur Oui.
L'ordinateur redémarre. Étant donné que l'ordinateur est restauré à son état de fonctionnement
d'origine, les écrans qui apparaissent, tels que le Contrat de licence pour utilisateur final sont
identiques à ceux qui s'étaient affichés au premier démarrage de l'ordinateur.
7 Cliquez sur Suivant.
L'écran Restauration du système apparaît et l'ordinateur redémarre.
8 Une fois l'ordinateur redémarré, cliquez sur OK.108 Dépannage
Suppression de Dell PC Restore
AVIS : La suppression de Dell PC Restore du disque dur supprime de manière permanente l'utilitaire PC Restore de
votre ordinateur. Une fois Dell PC Restore supprimé, vous ne pourrez plus l'utiliser pour restaurer le système
d'exploitation de votre ordinateur.
REMARQUE : Dell PC Restore de Symantec n'est pas obligatoirement disponible dans certains pays ou sur
certains ordinateurs.
L'utilitaire Dell PC Restore restaure votre disque dur à l'état de fonctionnement dans lequel il était
lorsque vous avez acheté l'ordinateur. Nous vous recommandons de ne pas supprimer PC Restore de
votre ordinateur, même s'il se révèle nécessaire de libérer de l'espace sur le disque dur. Une fois PC
Restore supprimé du disque dur, il est impossible de le rappeler et vous ne pourrez jamais utiliser PC
Restore pour restaurer le système d'exploitation de votre ordinateur à son état de fonctionnement
d'origine.
Pour supprimer PC Restore :
1 Connectez-vous à l'ordinateur en tant qu'administrateur local.
2 Dans l'Explorateur Windows, rendez-vous à l'adresse c:\dell\utilities\DSR.
3 Double-cliquez sur le nom de fichier DSRIRRemv2.exe.
REMARQUE : Si vous ne vous êtes pas connecté en tant qu'administrateur local, le message qui s'affiche
vous invite à le faire. Cliquez sur Quitter et connectez-vous en tant qu'administrateur local.
REMARQUE : Si la partition de PC Restore n'existe pas sur le disque dur de votre ordinateur, un message
indiquant qu'elle n'a pas été trouvée apparaît. Cliquez sur Quitter; il n'existe aucune partition à supprimer.
4 Cliquez sur OK pour supprimer la partition PC Restore sur le disque dur.
5 Lorsqu'un message de confirmation s'affiche, cliquez sur Oui.
La partition PC Restore est supprimée et l'espace disque ainsi libéré est ajouté à l'espace disque
disponible sur le disque dur.
6 Cliquez avec le bouton droit sur Disque local (C) dans l'Explorateur Windows, cliquez sur Propriétés,
puis vérifiez que l'espace disque supplémentaire est disponible tel qu'indiqué par la valeur plus élevée
sous Espace libre.
7 Cliquez sur Terminer pour fermer la fenêtre PC Restore Removal (Retrait de PC Restore).
8 Redémarrez l'ordinateur.
Utilisation du CD Operating system
Avant de commencer
Si vous souhaitez réinstaller le système d'exploitation Windows XP pour corriger un problème avec un
nouveau pilote, utilisez tout d'abord la fonction Restauration des pilotes de périphériques (reportez-vous
à la section « Utilisation de la fonction Device Driver Rollback (Restauration des pilotes de
périphériques) de Windows XP » à la page 103). Si la Restauration des pilotes de périphériques ne résout
pas le problème, utilisez Restauration du système pour ramener l'ordinateur à l'état de fonctionnement
précédant l'installation du pilote. Reportez-vous à la section « Utilisation de la fonction Restauration du
système de Microsoft Windows XP » à la page 105.Dépannage 109
Pour réinstaller Windows XP, vous devez disposer des éléments suivants :
• CD Système d'exploitation
• Dell™ CD Drivers and Utilities
REMARQUE : Le CD Drivers and Utilities contient les pilotes installés à l'assemblage de l'ordinateur. Utilisez le CD
Drivers and Utilities pour charger les pilotes requis. Selon la région dans laquelle vous avez commandé votre
ordinateur et selon que vous avez demandé ou non les CD, le CD Drivers and Utilities et le CD Operating System ne
sont pas forcément livrés avec l'ordinateur.
Réinstallation de Windows XP
Pour réinstaller Windows XP, suivez toutes les étapes des sections ci-après, dans l'ordre indiqué.
Le processus de réinstallation peut prendre de 1 à 2 heures. Après avoir réinstallé le système
d'exploitation, vous devez également réinstaller les pilotes de périphériques, le programme antivirus et
d'autres logiciels.
AVIS : Le CD Operating System fournit des options de réinstallation du système Windows XP. Ces options peuvent
remplacer des fichiers installés et avoir des répercussions sur les programmes installés sur votre disque dur. Par
conséquent, ne réinstallez pas votre Windows XP à moins qu'un membre de l'équipe du support technique de Dell
ne vous le demande.
AVIS : Pour éviter des conflits avec Windows XP, vous devez désactiver tout logiciel de protection antivirus
installé sur l'ordinateur avant de réinstaller le système d'exploitation. Pour plus d'informations, consultez la
documentation qui accompagne le logiciel.
1 Enregistrez et fermez tout fichier ouvert et quittez tous les programmes d'application en cours
d'utilisation.
2 Insérez le CD Operating system. Cliquez sur Quitter si le message Installer Windows XP
apparaît.
3 Redémarrez l'ordinateur.
4 Appuyez sur dès l'apparition du logo DELL™.
Si le logo du système d'exploitation apparaît, patientez jusqu'à l'affichage du bureau Windows,
éteignez de nouveau l'ordinateur et faites une nouvelle tentative.
5 Utilisez les touches de direction pour sélectionner l'option CD-ROM, puis appuyez sur .
6 Appuyez sur une touche lorsque le message Appuyez sur une touche pour démarrer
depuis le CD-ROM apparaît à l'écran.
7 Lorsque l'écran Configuration de Windows XP apparaît, appuyez sur .
8 Respectez les instructions pour terminer la réinstallation.
9 Une fois la réinstallation terminée, réinstallez les pilotes et les applications, le cas échéant. Reportezvous à la section « Réinstallation des pilotes et utilitaires » à la page 102.110 DépannageAjout et remplacement de pièces 111
Ajout et remplacement de pièces
Avant de commencer
Ce chapitre fournit les instructions de retrait et d'installation des composants de votre ordinateur. À
moins d'indication contraire, les conditions suivantes doivent exister préalablement à chaque
procédure :
• Vous avez effectué les étapes des sections « Mise hors tension de l'ordinateur » (reportez-vous à
cette page) et « Avant d'intervenir à l'intérieur de votre ordinateur » (reportez-vous à la page 112).
• Vous avez lu les consignes de sécurité qui figurent dans le Guide d'information sur le produit
Dell™.
• Pour remplacer un composant ou pour l'installer, s'il a été acheté séparément, effectuez la
procédure de retrait en ordre inverse.
Outils recommandés
Les procédures mentionnées dans ce document nécessitent les outils suivants :
• un petit tournevis à lame plate
• un tournevis cruciforme
• une petite pointe en plastique
• la mise à jour Flash BIOS (visitez le site Web d'assistance technique de Dell à l'adresse
support.dell.com)
Mise hors tension de l'ordinateur
AVIS : Pour éviter de perdre des données, enregistrez tous les fichiers ouverts, fermez-les et quittez toutes
les applications avant de procéder à l'arrêt du système.
1 Arrêtez le système d'exploitation :
a Enregistrez et fermez tous les fichiers ouverts, quittez tous les programmes, cliquez sur le
bouton Démarrer, puis sur Arrêter l'ordinateur.
b Dans la fenêtre Arrêter l'ordinateur, cliquez sur Arrêter/Éteindre.
L'ordinateur s'éteint une fois le système d'exploitation arrêté.
2 Assurez-vous que l'ordinateur et les périphériques connectés sont éteints. Si votre ordinateur et les
périphériques qui y sont connectés ne se sont pas éteints automatiquement lorsque vous avez
éteint votre ordinateur, appuyez sur le bouton d'alimentation et maintenez-le enfoncé pendant
4 secondes.112 Ajout et remplacement de pièces
Avant d'intervenir à l'intérieur de votre ordinateur
Respectez les consignes de sécurité suivantes pour vous aider à protéger votre ordinateur contre les
dommages éventuels et pour garantir votre sécurité personnelle.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
PRÉCAUTION : Manipulez les composants et les cartes avec précaution. Ne touchez pas les pièces ou les
contacts d'une carte. Tenez une carte par les bords ou par la languette de montage métallique. Tenez les pièces,
telles qu'un processeur, par les bords et non par les broches.
AVIS : Seul un technicien d'entretien qualifié doit effectuer les réparations sur votre ordinateur. Les dommages
causés par une personne non autorisée par Dell ne sont pas couverts par votre garantie.
AVIS : Lorsque vous débranchez un câble, tirez sur le connecteur ou sur la boucle prévue, mais jamais sur le câble
lui-même. Certains câbles sont munis d'un connecteur à languettes de verrouillage ; si vous déconnectez ce type
de câble, appuyez sur les languettes de verrouillage vers l'intérieur avant de déconnecter le câble. Quand vous
séparez les connecteurs en tirant dessus, veillez à les maintenir alignés pour ne pas plier de broches de
connecteur. De même, lorsque vous connectez un câble, assurez-vous que les deux connecteurs sont bien
orientés et alignés.
AVIS : Avant de commencer à travailler sur l'ordinateur, suivez les étapes suivantes pour éviter de l'endommager.
1 Assurez-vous que la surface de travail est plane et propre afin d'éviter de rayer le capot de l'ordinateur.
2 Éteignez l'ordinateur. Reportez-vous à la section « Mise hors tension de l'ordinateur » à la page 111.
AVIS : Pour déconnecter un câble de réseau, débranchez d'abord le câble de votre ordinateur, puis de la prise
réseau murale.
3 Débranchez également de l'ordinateur tous les câbles de téléphone ou de réseau.
AVIS : Pour éviter d'endommager la carte système, veillez à retirer la batterie principale avant de réparer
l'ordinateur.
4 Déconnectez l'ordinateur et tous les périphériques qui y sont reliés de leur prise secteur.
5 Retirez la batterie.
Faites glisser et maintenez le loquet de fermeture de la baie de batterie, situé en dessous de
l'ordinateur, puis retirez la batterie de la baie.Ajout et remplacement de pièces 113
6 Retirez le lecteur optique, le cas échéant, de la baie de lecteur optique. Reportez-vous à la section
« Lecteurs optiques » à la page 116.
7 Appuyez sur le bouton d'alimentation pour mettre à la terre la carte système.
8 Retirez les cartes ExpressCard du logement correspondant. Reportez-vous à la section « Retrait d'une
carte ExpressCard ou d'un cache » à la page 67.
9 Retirez les cartes mémoire multimédia du lecteur 5 en 1 correspondant. Reportez-vous à la section
« Caches de carte mémoire multimédia » à la page 68.
10 Fermez l'écran, retournez l'ordinateur et placez-le sur une surface plane.
Disque dur
PRÉCAUTION : Si vous enlevez le disque dur lorsqu'il est chaud, ne touchez pas l'habitacle en métal du
disque dur.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
AVIS : Pour éviter toute perte de données, éteignez votre ordinateur (reportez-vous à la page 111) avant de retirer
le disque dur. Ne retirez jamais l'unité de disque dur lorsque l'ordinateur est allumé, en mode Veille ou en mode
Mise en veille prolongée.
AVIS : Les disques durs sont très fragiles ; même un léger choc peut les endommager.
REMARQUE : Dell ne garantit ni la compatibilité ni la prise en charge des unités de disque dur provenant de
sources autres que Dell.
REMARQUE : Si vous installez un disque dur provenant d'une source autre que Dell, vous devez installer un
système d'exploitation, des pilotes et des utilitaires sur le nouveau disque dur.
1 batterie 2 loquet de fermeture de la baie de batterie
2
1114 Ajout et remplacement de pièces
Pour remettre l'unité de disque dur dans la baie d'unité :
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Retournez l'ordinateur et desserrez les deux vis imperdables du cache du disque dur.
AVIS : Lorsque le disque dur n'est pas dans l'ordinateur, placez-le dans son emballage protecteur antistatique.
Reportez-vous à la section « Protection contre les décharges électrostatiques » du Guide d'information sur le
produit.
3 Soulevez le capot et mettez-le de côté.
4 Utilisez votre doigt pour faire glisser le disque dur vers les trous de vis, puis la languette de retrait pour
soulever le disque dur vers le haut et le retirer de l'ordinateur.
1 vis (2)
1Ajout et remplacement de pièces 115
5 Enlevez le nouveau disque de son emballage.
Conservez cet emballage d'origine pour l'utiliser à nouveau lors du stockage ou de l'expédition du
disque dur.
AVIS : Faites glisser le disque dans son logement en exerçant une pression ferme et uniforme. Si vous exercez une
pression trop forte sur le disque pour le mettre en place, vous risquez d'endommager le connecteur.
6 Installez le nouveau disque dur dans la baie, puis faites-le glisser dans le connecteur dans la direction
opposée à celle des trous de vis jusqu'à ce qu'il soit bien en place.
7 Remettez le cache et les vis en place.
8 Installez le système d'exploitation de votre ordinateur. Reportez-vous à la section « Restauration du
système d'exploitation » à la page 105.
9 Installez les pilotes et utilitaires de votre ordinateur. Reportez-vous à la section « Réinstallation des
pilotes et utilitaires » à la page 102.
Retour de votre disque dur à Dell
Pour retourner votre ancien disque dur à Dell, placez-le dans son emballage d'origine ou dans un
emballage similaire. Faute de quoi il risque d'être endommagé en transit.
1 languette de retrait 2 unité de disque dur
2
1116 Ajout et remplacement de pièces
Lecteurs optiques
À propos de la vis de fixation de périphérique
REMARQUE : Vous n'avez pas besoin d'installer la vis de fixation de périphérique à moins que vous vouliez
sécuriser le module afin qu'on ne puisse pas facilement le retirer.
Votre ordinateur Dell™ est livré avec un lecteur optique, installé dans la baie modulaire, et avec une vis
de fixation de périphérique. Celle-ci n'est pas nécessairement installée sur le lecteur optique, elle peut
être dans un sachet séparé. Lorsque vous installez le module dans la baie, vous pouvez aussi installer la
vis de fixation de périphérique afin qu'on ne puisse pas facilement le retirer.
Retrait et installation des lecteurs optiques
AVIS : Pour éviter d'endommager les lecteurs, rangez-les dans un endroit sec et sûr lorsqu'ils ne sont pas installés
dans l'ordinateur. Évitez d'exercer une pression quelconque ou de placer des objets lourds sur ces derniers.
1 L'ordinateur étant sous tension, double-cliquez sur l'icône Supprimer le périphérique en toute sécurité
sur la barre des tâches, cliquez sur le périphérique que vous souhaitez éjecter, puis sur Stop (Arrêter).
2 Fermez votre écran et retournez l'ordinateur.
3 Utilisez un tournevis cruciforme pour retirer la vis de fixation de périphérique qui se trouve sous
l'ordinateur.
4 Insérez un tournevis cruciforme dans le trou de vis afin de pousser le lecteur hors de la baie modulaire.
1 emballage en polystyrène 2 unité de disque dur
2
1Ajout et remplacement de pièces 117
5 Sortez le lecteur de la baie modulaire.
6 Poussez le nouveau lecteur dans la baie modulaire jusqu'au déclic.
7 Remettez en place la vis de fixation de périphérique.
8 Retournez l'ordinateur à l'endroit et ouvrez l'écran.
9 Le système d'exploitation reconnaît automatiquement le lecteur. Le cas échéant, entrez votre mot de
passe pour déverrouiller votre ordinateur.
Mémoire
Vous pouvez augmenter la mémoire de votre ordinateur en installant des modules de mémoire sur la
carte système. Pour plus d'informations sur la mémoire prise en charge par votre ordinateur, reportezvous à la section « Caractéristiques » à la page 157. Installez uniquement des modules conçus
spécifiquement pour votre ordinateur.
REMARQUE : Cet ordinateur prend en charge les modules de mémoire 533 MHz et 667 MHz. En cas d'installation
d'un autre module de mémoire, vous devez vous assurer que les deux DIMM sont cadencés à 667 MHz. Si l'un est
cadencé à 533 MHz et l'autre à 667 MHz, l'ordinateur fonctionnera uniquement à la vitesse de 533 MHz et pas à la
vitesse mémoire maximale de 667 MHz.
REMARQUE : Les modules de mémoire achetés chez Dell sont couverts par la garantie de votre ordinateur.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.118 Ajout et remplacement de pièces
L'ordinateur possède deux connecteurs de module de mémoire, « DIMM A » et « DIMM B ». DIMM A
(situé sous le clavier) renferme le module de mémoire principal configuré par l'usine. Si vous n'avez pas
commandé de mémoire supplémentaire, le connecteur DIMM B (situé en dessous de l'ordinateur sous le
cache du module de mémoire) est vide. Généralement, si vous ajoutez de la mémoire, vous devez
installer un module de mémoire dans le connecteur DIMM B. Si vous voulez mettre la mémoire à
niveau, vous devrez peut-être installer la mémoire dans les deux connecteurs DIMM A et B, en fonction
de l'étendue de la mise à niveau.
Installation d'un module de mémoire dans le connecteur DIMM B
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Raccordez-vous à la masse en touchant l'un des connecteurs en métal à l'arrière de l'ordinateur.
REMARQUE : Si vous quittez les lieux, remettez-vous à la terre au moment où vous revenez vers l'ordinateur.
3 Retournez l'ordinateur, desserrez les vis imperdables du cache du compartiment des modules de
mémoire, puis retirez le cache.
AVIS : Pour éviter d'endommager le connecteur du module de mémoire, n'utilisez pas d'outil pour écarter les clips
de fixation du module de mémoire.
4 Si vous remplacez un module de mémoire, retirez le module existant :
a Du bout des doigts, écartez avec précaution les clips de fixation situés à chaque extrémité du
connecteur du module de mémoire jusqu'à ce que le module sorte.
b Retirez le module du connecteur.
1 vis (2) 2 cache du module de mémoire
1
2Ajout et remplacement de pièces 119
AVIS : Si vous devez installer des modules de mémoire dans deux connecteurs, installez un module de mémoire
dans le connecteur « DIMM A » avant d'en installer un dans le connecteur « DIMM B ». Insérez les modules de
mémoire suivant un angle de 45 degrés pour éviter d'endommager le connecteur.
REMARQUE : Si le module de mémoire n'est pas installé correctement, l'ordinateur ne démarre pas. Aucun
message d'erreur ne vous avertit de cet échec.
5 Raccordez-vous à la masse et installez le nouveau module de mémoire :
a Alignez l'encoche du bord du module sur la languette située dans l'emplacement du connecteur.
b Faites glisser fermement le module dans l'emplacement en suivant un angle de 45 degrés, puis
faites-le pivoter vers le bas jusqu'à ce que vous entendiez un déclic. S'il ne s'enclenche pas, retirez
le module et réinstallez-le.
1 module de mémoire 2 clips de fixation
(2 par connecteur)
1
2120 Ajout et remplacement de pièces
6 Replacez le cache du module de mémoire et serrez les vis.
AVIS : Si vous rencontrez des difficultés pour fermer le cache, retirez le module et réinstallez-le. Ne forcez pas la
fermeture du cache, car vous risqueriez d'endommager l'ordinateur.
7 Insérez la batterie dans sa baie ou connectez l'adaptateur secteur à votre ordinateur et à une prise
secteur.
8 Réinstallez le disque dur. Reportez-vous à la section « Disque dur » à la page 113.
9 Allumez l'ordinateur.
Au démarrage, l'ordinateur détecte la mémoire supplémentaire et met automatiquement à jour les
informations de configuration du système.
Pour vérifier la quantité de mémoire installée, cliquez sur le bouton Démarrer, sur Aide et support, puis
sur Informations sur l'ordinateur.
Installation d'un module de mémoire dans le connecteur DIMM A
Le connecteur de module de mémoire étiqueté « DIMM A » est situé sous le clavier.
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Raccordez-vous à la masse en touchant l'un des connecteurs en métal à l'arrière de l'ordinateur.
REMARQUE : Si vous quittez les lieux, remettez-vous à la terre au moment où vous revenez vers l'ordinateur.
1 languette dans le logement du connecteur
1Ajout et remplacement de pièces 121
3 Retirez le cache de la charnière. Reportez-vous à la section « Cache de la charnière » à la page 127.
REMARQUE : Assurez-vous de retirer les deux vis de la baie de batterie lors du retrait des charnières.
4 Retirez le clavier. Reportez-vous à la section « Clavier » à la page 129.
AVIS : Pour éviter d'endommager le connecteur du module de mémoire, n'utilisez pas d'outil pour écarter les
clips de fixation du module de mémoire.
5 Si vous remplacez un module de mémoire, retirez le module existant :
a Du bout des doigts, écartez avec précaution les clips de fixation situés à chaque extrémité du
connecteur du module de mémoire jusqu'à ce que le module sorte.
b Retirez le module du connecteur.
AVIS : Si vous devez installer des modules de mémoire dans deux connecteurs, installez un module de mémoire
dans le connecteur « DIMM A » avant d'en installer un dans le connecteur « DIMM B ». Insérez les modules de
mémoire suivant un angle de 45 degrés pour éviter d'endommager le connecteur.
REMARQUE : Si le module de mémoire n'est pas installé correctement, l'ordinateur ne démarre pas. Aucun
message d'erreur ne vous avertit de cet échec.
6 Raccordez-vous à la masse et installez le nouveau module de mémoire :
a Alignez l'encoche du bord du module sur la languette située dans l'emplacement du connecteur.
b Faites glisser fermement le module dans l'emplacement en suivant un angle de 45 degrés, puis
faites-le pivoter vers le bas jusqu'à ce que vous entendiez un déclic. S'il ne s'enclenche pas, retirez
le module et réinstallez-le.
1 module de mémoire 2 clips de fixation
(2 par connecteur)
1
2122 Ajout et remplacement de pièces
7 Remettez le clavier en place. Reportez-vous à la section « Clavier » à la page 129.
8 Remettez en place le cache de la charnière. Reportez-vous à la section « Cache de la charnière » à la
page 127.
REMARQUE : Assurez-vous de remettre les deux vis dans la baie de batterie lors de la réinstallation des
charnières.
9 Insérez la batterie dans sa baie ou connectez l'adaptateur secteur à votre ordinateur et à une prise
secteur.
10 Réinstallez le disque dur. Reportez-vous à la section « Disque dur » à la page 113.
11 Allumez l'ordinateur.
Au démarrage, l'ordinateur détecte la mémoire supplémentaire et met automatiquement à jour les
informations de configuration du système.
Pour vérifier la quantité de mémoire installée, cliquez sur le bouton Démarrer, sur Aide et support, puis
sur Informations sur l'ordinateur.
1 languette dans le logement du connecteur
1Ajout et remplacement de pièces 123
Modem (en option)
Si vous avez commandé le modem en option en même temps que votre ordinateur, le modem est déjà
installé.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Retournez l'ordinateur et desserrez les vis imperdables du cache du modem/de la carte Mini/du sans fil,
puis retirez le cache.
3 Retirez le modem installé :
a Retirez la vis permettant de fixer le modem sur la carte système et mettez-la de côté.
b Soulevez la languette de retrait afin de retirer le modem du connecteur, sur la carte système, puis
déconnectez le câble du modem.
1 cache du modem/de la carte Mini/du sans fil
1124 Ajout et remplacement de pièces
4 Installez le modem de remplacement :
a Connectez le câble du modem au modem.
AVIS : Les connecteurs sont prévus pour une insertion correcte. Si vous sentez une résistance, vérifiez les
connecteurs et réalignez la carte.
b Alignez le modem sur les trous des vis et appuyez sur le modem pour l'insérer dans le connecteur
de la carte système.
c Remettez en place la vis qui fixe le modem à la carte système.
5 Remettez en place le cache du modem/de la carte Mini/du sans fil.
1 vis 2 câble du modem 3 modem
4 languette de retrait 5 connecteur de carte système
4
5
1
2
3Ajout et remplacement de pièces 125
Carte Mini
Si vous avez commandé une carte Mini avec votre ordinateur, la carte est déjà installée.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Si aucune carte Mini n'est installée, passez à l'étape 3. Si vous remplacez une carte Mini, retirez la carte
existante :
a Débranchez les câbles d'antenne de la carte Mini.
b Retirez la carte Mini en poussant les clips de fixation métalliques vers l'arrière de l'ordinateur
jusqu'à ce que la carte soit doucement éjectée.
c Retirez la carte Mini de son connecteur.
1 câbles d'antenne (2)
1126 Ajout et remplacement de pièces
AVIS : Les connecteurs disposent de codes de couleur pour garantir leur bonne insertion. Si vous sentez une
résistance, vérifiez les connecteurs et réalignez la carte.
3 Installez la carte Mini de remplacement :
AVIS : Pour éviter d'endommager la carte Mini, vérifiez que les câbles d'antenne ne sont pas sous la carte lorsque
vous la mettez en place.
a Alignez la carte Mini sur le connecteur suivant un angle de 45 degrés et enfoncez-la dans le
connecteur jusqu'à ce que vous entendiez un clic.
AVIS : Pour éviter d'endommager la carte Mini, ne placez jamais de câbles au-dessous de la carte.
b Raccordez les câbles d'antenne aux connecteurs d'antenne de la carte Mini en faisant correspondre
la couleur du câble avec la couleur du triangle au-dessus du connecteur. Raccordez le câble
d'antenne principal (blanc) au connecteur d'antenne avec le triangle blanc. Raccordez le câble
d'antenne auxiliaire (noir) au connecteur d'antenne avec le triangle noir.
REMARQUE : Si votre ordinateur dispose d'un câble gris, raccordez celui-ci au connecteur avec le triangle gris, si
ce connecteur est disponible sur votre carte.
1 languettes de fixation en métal (2) 2 carte Mini
2
1Ajout et remplacement de pièces 127
Cache de la charnière
Retrait du cache de la charnière
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
AVIS : Pour éviter une décharge électrostatique, raccordez-vous à la masse à l'aide d'un bracelet antistatique ou
en touchant périodiquement une surface métallique non peinte (par exemple un connecteur sur le panneau arrière
de l'ordinateur).
AVIS : Pour éviter d'endommager la carte système, vous devez retirer la batterie principale avant d'intervenir à
l'intérieur de l'ordinateur.
AVIS : Le cache de la charnière est fragile et peut être endommagé s'il est forcé. Faites plus particulièrement
attention au cours du retrait du cache de la charnière.
1 Suivez les procédures de la section « Avant de commencer » à la page 111.
2 Retirez la batterie (reportez-vous à la section « Remplacement de la batterie » à la page 41).
3 Retirez les deux vis de la baie de batterie.
1 câbles d'antenne (2)
1128 Ajout et remplacement de pièces
4 Remettez l'ordinateur à l'endroit et ouvrez entièrement l'écran (180 degrés) afin qu'il repose sur votre
surface de travail.
AVIS : Pour éviter d'endommager le cache de la charnière, ne soulevez pas le cache des deux côtés
simultanément.
5 Insérez une pointe en plastique dans l'encoche pour soulever le cache de la charnière du côté droit.
6 Faites glisser le cache de la charnière de droite à gauche, vers le haut et retirez-le.
1 vis (2)
1 cache de la charnière 2 encoche
1
1
2Ajout et remplacement de pièces 129
Remise en place du cache de la charnière
1 Mettez le coin gauche du cache en place.
2 Appuyez de gauche à droite sur le cache jusqu'à ce qu'il s'enclenche.
3 Fermez l'écran et retournez l'ordinateur.
4 Remettez en place les deux vis dans la baie de batterie.
5 Remettez la batterie en place (reportez-vous à la section « Remplacement de la batterie » à la page 41).
Clavier
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
AVIS : Pour éviter une décharge électrostatique, raccordez-vous à la masse à l'aide d'un bracelet antistatique ou
en touchant périodiquement une surface métallique non peinte (par exemple un connecteur sur le panneau arrière
de l'ordinateur).
AVIS : Pour éviter d'endommager la carte système, vous devez retirer la batterie principale avant d'intervenir à
l'intérieur de l'ordinateur.
Retrait du clavier
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Retirez le cache de la charnière. Reportez-vous à la section « Cache de la charnière » à la page 127.
AVIS : Les touches du clavier sont fragiles, se déboîtent facilement et sont difficiles à remettre en place. Faites
plus particulièrement attention au cours du retrait et de la manipulation du clavier.
3 Soulevez le clavier et maintenez-le soulevé et légèrement vers l'avant pour pouvoir accéder au
connecteur du clavier.
4 Tirez sur le levier du connecteur de la carte système pour déconnecter le câble du clavier de la carte
système.130 Ajout et remplacement de pièces
Remise en place du clavier
AVIS : Pour éviter de rayer le repose-mains lors de la remise en place du clavier, attachez les six languettes
situées à l'avant du clavier dans le repose-mains, puis fixez le clavier.
1 Connectez le câble du clavier à la carte système.
2 Sécurisez le câble du clavier et le levier sur le connecteur de la carte système.
3 Placez les six languettes situées à l'avant du clavier dans le repose-mains.
Carte interne dotée de la technologie sans fil Bluetooth®
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
AVIS : Pour éviter une décharge électrostatique, raccordez-vous à la masse à l'aide d'un bracelet antistatique ou
en touchant périodiquement une surface métallique non peinte (par exemple un connecteur sur le panneau arrière
de l'ordinateur).
AVIS : Pour éviter d'endommager la carte système, vous devez retirer la batterie principale avant d'intervenir à
l'intérieur de l'ordinateur.
1 clavier 2 câble du clavier 3 levier du connecteur de la carte système
4 languettes (6)
4
1
3
2Ajout et remplacement de pièces 131
La carte dotée de la technologie sans fil Bluetooth est déjà installée sur votre système si vous l'avez
commandée avec votre ordinateur.
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Desserrez les vis captives du cache du modem/de la carte Mini/du sans fil, puis retirez le cache.
3 Retirez la vis de fixation du porte-carte.
4 Tirez le porte-carte hors du compartiment afin de pouvoir déconnecter la carte de son câble et la retirer
de l'ordinateur.
5 Pour remettre la carte en place, connectez la carte au câble.
6 Puis, insérez-la avec précaution dans le porte-carte et introduisez ce dernier dans le compartiment.
7 Remettez la vis de fixation du porte-carte en place.
1 vis 2 porte-carte 3 carte
4 connecteur de carte
1
4 3
2132 Ajout et remplacement de pièces
Pile bouton
Retrait de la pile bouton
PRÉCAUTION : Avant d'effectuer les procédures suivantes, consultez et respectez les consignes de sécurité du
Guide d'information sur le produit.
AVIS : Pour éviter une décharge électrostatique, raccordez-vous à la masse à l'aide d'un bracelet antistatique ou
en touchant régulièrement une surface métallique non peinte (par exemple, le panneau arrière de l'ordinateur).
AVIS : Pour éviter d'endommager la carte système, vous devez retirer la batterie principale avant d'intervenir à
l'intérieur de l'ordinateur.
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Retirez le cache de la charnière (reportez-vous à la page 127).
3 Retirez le clavier (reportez-vous à la page 129).
4 À l'aide d'une pointe en plastique, soulevez la pile afin de l'extraire de la carte système.
Remise en place de la pile bouton
Lorsque vous remettez la pile bouton en place, insérez-la dans le support circulaire avec le côté positif
vers le haut, et enfoncez-la doucement jusqu'à ce qu'elle soit bien en place.
1 pile bouton
1Fonctions Dell™ QuickSet 133
Fonctions Dell™ QuickSet
REMARQUE : Cette fonction peut ne pas être disponible sur votre ordinateur.
Dell™ QuickSet vous permet de configurer et d'afficher facilement les paramètres suivants :
• Connectivité réseau
• Gestion de l'alimentation
• Écran
• Informations système
En fonction de ce que vous souhaitez faire dans Dell™ QuickSet, vous pouvez lancer cette
application en cliquant, en double-cliquant ou en cliquant avec le bouton droit de la souris sur l'icône
QuickSet, , dans la barre des tâches de Microsoft® Windows®. La barre des tâches se trouve
dans le coin inférieur droit de votre écran.
Pour plus d'informations sur QuickSet, cliquez avec le bouton droit de la souris sur l'icône QuickSet
et sélectionnez Aide.134 Fonctions Dell™ QuickSetVoyager avec votre ordinateur 135
Voyager avec votre ordinateur
Identification de l'ordinateur
• Attachez une étiquette avec votre nom ou votre carte de visite à votre ordinateur.
• Notez votre numéro de service et gardez-le en lieu sûr, dans un endroit autre que près de
l'ordinateur ou de la sacoche de transport.
• Utilisez votre numéro de service si vous devez reporter la perte ou le vol de votre ordinateur à la
police et à Dell.
• Créez un fichier sur le bureau Microsoft® Windows® et nommez-le si_trouvé. Placez dans ce
fichier des informations, telles que vos nom, adresse et numéro de téléphone.
• Contactez votre compagnie de carte de crédit et demandez-lui si elle offre des étiquettes avec
identification codée.
Emballage de l'ordinateur
• Retirez tous les périphériques externes connectés à l'ordinateur et stockez-les en lieu sûr.
Débranchez tous les câbles reliés aux cartes PC installées et retirez les cartes PC étendues
(« Utilisation de cartes ExpressCard » à la page 65).
• Pour alléger l'ordinateur autant que possible, remplacez les périphériques installés dans la baie
modulaire par le module de voyage Dell TravelLite™.
• Chargez complètement la batterie principale et toutes les batteries de secours que vous pensez
emporter.
• Éteignez l'ordinateur.
• Débranchez l'adaptateur secteur.
AVIS : Lorsque vous fermez l'écran, les objets laissés sur le clavier ou le repose-mains risquent
d'endommager l'écran.
• Retirez tous objets du clavier et du repose-mains, comme les trombones, les stylos et les papiers,
puis fermez l'écran.
• Utilisez la sacoche de transport Dell™ (en option) pour emballer l'ordinateur et ses accessoires en
toute sécurité.
• Évitez d'emballer l'ordinateur avec des articles tels que crème à raser, eau de Cologne, parfum ou
nourriture.136 Voyager avec votre ordinateur
AVIS : Si l'ordinateur a été exposé à des températures extrêmes, laissez-le s'acclimater pendant une heure à la
température ambiante avant de l'allumer.
• Protégez l'ordinateur, les batteries et le disque dur contre des risques tels que les températures
extrêmes, la surexposition à la lumière, la saleté, la poussière ou les liquides.
• Calez bien l'ordinateur afin d'éviter qu'il ne se déplace dans le coffre de votre voiture ou dans un
compartiment à bagages situé en hauteur.
Conseils de voyage
AVIS : Pour éviter de perdre des données, ne déplacez pas l'ordinateur lorsque vous utilisez le lecteur optique.
AVIS : N'enregistrez pas votre ordinateur avec vos bagages.
• Pensez à désactiver l'activité réseau sans fil sur votre ordinateur afin d'optimiser l'autonomie de la
batterie. Pour désactiver l'activité sans fil, appuyez sur .
• Pensez à modifier vos options de gestion de l'alimentation (reportez-vous à la section « Configuration
des paramètres de gestion de l'alimentation » à la page 41) afin d'optimiser l'autonomie de la batterie.
• Si vous voyagez à l'étranger, emmenez une preuve de propriété ou de votre droit à utiliser l'ordinateur
s'il appartient à votre société pour accélérer le passage de la douane. Cherchez des informations auprès
des autorités douanières des pays que vous pensez visiter et envisagez d'acquérir un carnet
international (appelé également passeport de marchandises) auprès de votre gouvernement.
• Renseignez-vous sur le type de prises secteur utilisées dans les pays où vous vous rendez et munissezvous des adaptateurs appropriés.
• Les détenteurs de cartes de crédit doivent se renseigner auprès de leur compagnie de crédit au sujet de
l'assistance en cas d'urgence à l'étranger proposée aux utilisateurs d'ordinateurs portables.
Transport aérien
AVIS : Ne faites jamais passer votre ordinateur dans un détecteur de métal. Vous pouvez faire passer l'ordinateur
dans un détecteur à rayons X ou le faire inspecter manuellement.
• Assurez-vous d'avoir une batterie chargée sous la main au cas où l'on vous demanderait d'allumer
l'ordinateur.
• Avant de pénétrer dans l'avion, assurez-vous que l'utilisation d'un ordinateur est permise. Certaines
compagnies aériennes interdisent l'usage d'appareils électroniques pendant le vol. Toutes les
compagnies aériennes interdisent l'usage de tels dispositifs pendant les phases de décollage et
d'atterrissage.Contacter Dell 137
Contacter Dell
Vous pouvez contacter Dell par voie électronique, par l'intermédiaire des sites Web suivants :
• www.dell.com
• support.dell.com (support)
Pour les adresses Internet de votre pays, recherchez la section appropriée du pays dans le tableau cidessous.
REMARQUE : Les numéros verts sont valables dans le pays pour lequel ils sont renseignés.
REMARQUE : Dans certains pays, le support spécifique aux ordinateurs Dell XPS™ est disponible via un
numéro de téléphone différent, répertorié pour les pays participants. Si vous ne trouvez pas de numéro de
téléphone répertorié spécifique aux ordinateurs XPS, contactez le service de support de Dell, au numéro
indiqué, et l'on fera suivre votre appel de manière appropriée.
Si vous devez contacter Dell, utilisez les adresses électroniques, les numéros de téléphone et les
indicatifs fournis dans le tableau ci-dessous. Si vous avez besoin d'assistance pour connaître les
indicatifs à utiliser, contactez un opérateur local ou international.
REMARQUE : Les coordonnées fournies étaient correctes au jour d'impression de ce document et sont
sujettes à modification sans préavis.
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts
Afrique du Sud (Johannesburg)
Indicatif international :
09/091
Indicatif national : 27
Indicatif de la ville : 11
Site Web : support.euro.dell.com
E-mail : dell_za_support@dell.com
File d'attente Gold 011 709 7713
Support technique 011 709 7710
Service clientèle 011 709 7707
Ventes 011 709 7700
Fax 011 706 0495
Standard 011 709 7700138 Contacter Dell
Allemagne (Francfort)
Indicatif international : 00
Indicatif national : 49
Indicatif de la ville : 69
Site Web : support.euro.dell.com
E-mail : tech_support_central_europe@dell.com
Support technique pour XPS 069 9792 7222
Support technique pour tous les autres ordinateurs
Dell
069 9792-7200
Service clientèle pour le grand public et les PME 0180-5-224400
Service clientèle segment International 069 9792-7320
Service clientèle comptes privilégiés 069 9792-7320
Service clientèle grands comptes 069 9792-7320
Service clientèle comptes publics 069 9792-7320
Standard 069 9792-7000
Amérique Latine Support technique clients (Austin, Texas, ÉtatsUnis)
512 728-4093
Service clientèle (Austin, Texas, États-Unis) 512 728-3619
Fax (Support technique et Service clientèle)
(Austin, Texas, États-Unis)
512 728-3883
Ventes (Austin, Texas, États-Unis) 512 728-4397
Fax pour les ventes (Austin, Texas, États-Unis) 512 728-4600
ou 512 728-3772
Anguilla Site Web : www.dell.com.ai
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 800-335-0031
Antigua-et-Barbuda Site Web : www.dell.com.ag
E-mail : la-techsupport@dell.com
Support technique général 1-800-805-5924
Antilles Néerlandaises E-mail : la-techsupport@dell.com
Support technique général 001-800-882-1519
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 139
Argentine (Buenos Aires)
Indicatif international : 00
Indicatif national : 54
Indicatif de la ville : 11
Site Web : www.dell.com.ar
E-mail : la-techsupport@dell.com
E-mail pour ordinateurs de bureau et portables :
la-techsupport@dell.com
E-mail pour serveurs et produits de stockage
EMC® :
la_enterprise@dell.com
Service clientèle numéro vert : 0-800-444-0730
Support technique numéro vert : 0-800-444-0733
Services de support technique numéro vert : 0-800-444-0724
Ventes 0-810-444-3355
Aruba Site Web : www.dell.com.aw
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 800-1578
Australie (Sydney)
Indicatif international : 0011
Indicatif national : 61
Indicatif de la ville : 2
Site Web : support.ap.dell.com
E-mail : support.ap.dell.com/contactus
Support technique général 13DELL-133355
Autriche (Vienne)
Indicatif international : 900
Indicatif national : 43
Indicatif de la ville : 1
Site Web : support.euro.dell.com
E-mail : tech_support_central_europe@dell.com
Ventes aux grand public et PME 0820 240 530 00
Fax pour le grand public et les PME 0820 240 530 49
Service clientèle pour le grand public et les PME 0820 240 530 14
Service clientèle Comptes privilégiés/Entreprises 0820 240 530 16
Support technique de XPS 0820 240 530 81
Support aux grand public et PME pour tous les
autres ordinateurs Dell
0820 240 530 17
Support Comptes privilégiés/Entreprises 0820 240 530 17
Standard 0820 240 530 00
Bahamas Site Web : www.dell.com.bs
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-866-278-6818
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts140 Contacter Dell
Belgique (Bruxelles)
Indicatif international : 00
Indicatif national : 32
Indicatif de la ville : 2
Site Web : support.euro.dell.com
Support technique pour XPS 02 481 92 96
Support technique pour tous les autres ordinateurs
Dell
02 481 92 88
Télécopieur pour support technique 02 481 92 95
Service clientèle 02 713 15 65
Ventes aux grandes entreprises 02 481 91 00
Fax 02 481 92 99
Standard 02 481 91 00
Bermudes Site Web : www.dell.com/bm
E-mail : la-techsupport@dell.com
Support technique général 1-877-890-0751
Bolivie Site Web : www.dell.com/bo
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 800-10-0238
Brésil
Indicatif international : 00
Indicatif national : 55
Indicatif de la ville : 51
Site Web : www.dell.com/br
E-mail : la-techsupport@dell.com
Support clients, support technique 0800 90 3355
Fax du support technique 51 3481 5470
Fax du Service clientèle 51 3481 5480
Ventes 0800 90 3390
Brunei
Indicatif national : 673
Support technique (Penang, Malaisie) 604 633 4966
Service clientèle (Penang, Malaisie) 604 633 4888
Ventes aux particuliers (Penang, Malaisie) 604 633 4955
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 141
Canada (North York, Ontario)
Indicatif international : 011
État des commandes en ligne : www.dell.ca/ostatus
AutoTech (Support matériel et garantie
automatisé)
numéro vert : 1-800-247-9362
Service clientèle (grand public et PME) numéro vert : 1-800-847-4096
Service clientèle (grands comptes et
gouvernement)
numéro vert : 1-800-326-9463
Service clientèle (imprimantes, projecteurs,
téléviseurs, ordinateurs de poche, jukebox
numériques et ordinateurs sans fil)
numéro vert : 1-800-847-4096
Support garantie de matériel (ventes au grand
public/PME)
numéro vert : 1-800-906-3355
Support garantie de matériel (grands comptes et
gouvernement)
numéro vert : 1-800-387-5757
Support garantie de matériel (imprimantes,
projecteurs, téléviseurs, ordinateurs de poche,
jukebox numériques et ordinateurs sans fil)
1-877-335-5767
Ventes aux grand public et PME numéro vert : 1-800-387-5752
Ventes (grands comptes et gouvernement) numéro vert : 1-800-387-5755
Vente de pièces et Vente de service étendu 1866 440 3355
Chili (Santiago)
Indicatif national : 56
Indicatif de la ville : 2
Site Web : www.dell.com/cl
E-mail : la-techsupport@dell.com
Ventes et support clients numéro vert : 1230-020-4823
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts142 Contacter Dell
Chine (Xiamen)
Indicatif national : 86
Indicatif de la ville : 592
Site Web du Support technique :
support.dell.com.cn
E-mail (Support technique) :
cn_support@dell.com
E-mail du Service clientèle :
customer_cn@dell.com
Fax du support technique 592 818 1350
Support technique (Dell™ Dimension™ et
Inspiron)
numéro vert : 800 858 2968
Support technique (OptiPlex™, Latitude™ et Dell
Precision™)
numéro vert : 800 858 0950
Support technique (serveurs et stockage) numéro vert : 800 858 0960
Support technique (projecteurs, PDA,
commutateurs, routeurs, etc.)
numéro vert : 800 858 2920
Support technique (imprimantes) numéro vert : 800 858 2311
Service clientèle numéro vert : 800 858 2060
Fax du Service clientèle 592 818 1308
Grand public et PME numéro vert : 800 858 2222
Division des comptes privilégiés numéro vert : 800 858 2557
Comptes grandes entreprises - GCP numéro vert : 800 858 2055
Comptes clés des grandes entreprises numéro vert : 800 858 2628
Comptes grandes entreprises - Nord numéro vert : 800 858 2999
Comptes grandes entreprises Administration et
éducation - Nord
numéro vert : 800 858 2955
Comptes grandes entreprises - Est numéro vert : 800 858 2020
Comptes grandes entreprises Administration et
éducation - Est
numéro vert : 800 858 2669
Équipe File d'attente des comptes grandes
entreprises
numéro vert : 800 858 2572
Comptes grandes entreprises - Sud numéro vert : 800 858 2355
Comptes grandes entreprises - Ouest numéro vert : 800 858 2811
Comptes grandes entreprises Pièces détachées numéro vert : 800 858 2621
Colombie Site Web : www.dell.com/cl
E-mail : la-techsupport@dell.com
Support technique général 01-800-915-4755
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 143
Corée (Séoul)
Indicatif international : 001
Indicatif national : 82
Indicatif de la ville : 2
E-mail : krsupport@dell.com
Support technique numéro vert : 080-200-3800
Support (Dimension, PDA, Électronique et
accessoires)
numéro vert : 080-200-3801
Ventes numéro vert : 080-200-3600
Fax 2194-6202
Standard 2194-6000
Costa Rica Site Web : www.dell.com/cr
E-mail : la-techsupport@dell.com
Support technique général 0800-012-0231
Danemark (Copenhague)
Indicatif international : 00
Indicatif national : 45
Site Web : support.euro.dell.com
Support technique pour XPS 7010 0074
Support technique pour tous les autres ordinateurs
Dell
7023 0182
Service clientèle (relations) 7023 0184
Service clientèle pour le grand public et les PME 3287 5505
Standard (relations) 3287 1200
Standard Fax (relations) 3287 1201
Standard (grand public et PME) 3287 5000
Fax (grand public et PME) 3287 5001
Dominique Site Web : www.dell.com/dm
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-866-278-6821
Équateur Site Web : www.dell.com/ec
E-mail : la-techsupport@dell.com
Support technique général (appel de Quito) numéro vert :
999-119-877-655-3355
Support technique général (appel de Guayaquil) numéro vert :
1800-999-119-877-655-3355
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts144 Contacter Dell
Espagne (Madrid)
Indicatif international : 00
Indicatif national : 34
Indicatif de la ville : 91
Site Web : support.euro.dell.com
Grand public et PME
Support technique 902 100 130
Service clientèle 902 118 540
Ventes 902 118 541
Standard 902 118 541
Fax 902 118 539
Grandes entreprises
Support technique 902 100 130
Service clientèle 902 115 236
Standard 91 722 92 00
Fax 91 722 95 83
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 145
États-Unis (Austin, Texas)
Indicatif international : 011
Indicatif national : 1
Service d'état des commandes automatisé numéro vert : 1-800-433-9014
AutoTech (ordinateurs portables et de bureau) numéro vert : 1-800-247-9362
Support matériel et garantie (téléviseurs,
imprimantes et projecteurs Dell) pour la clientèle
relationnelle
numéro vert : 1-877-459-7298
Support des produits SPS destinés aux clients
américains
numéro vert : 1-800-232-8544
Support consommateur (Activités à domicile et
activités professionnelles à domicile) pour tous les
autres produits Dell
numéro vert : 1-800-624-9896
Service clientèle numéro vert : 1-800-624-9897
Clients du programme d'achats par les employés
(EPP)
numéro vert : 1-800-695-8133
Site Web des services financiers :
www.dellfinancialservices.com
Services financiers (leasing/prêts) numéro vert : 1-877-577-3355
Services financiers (Comptes privilégiés Dell
[DPA])
numéro vert : 1-800-283-2210
Secteur privé
Support et Service clientèle numéro vert : 1-800-456-3355
Clients du programme d'achats par les employés
(EPP)
numéro vert : 1-800-695-8133
Support pour imprimantes, projecteurs, PDA et
lecteurs MP3
numéro vert : 1-877-459-7298
Public (gouvernement, enseignement et services de la santé)
Support et Service clientèle numéro vert : 1-800-456-3355
Clients du programme d'achats par les employés
(EPP)
numéro vert : 1-800-695-8133
Ventes Dell numéro vert : 1-800-289-3355
ou numéro vert : 1-800-879-3355
Points de vente Dell (ordinateurs Dell recyclés) numéro vert : 1-888-798-7561
Ventes de logiciels et de périphériques numéro vert : 1-800-671-3355
Ventes de pièces au détail numéro vert : 1-800-357-3355
Service étendu et ventes sous garantie numéro vert : 1-800-247-4618
Fax numéro vert : 1-800-727-8320
Services Dell pour les sourds, les malentendants ou
les personnes ayant des problèmes d'élocution
numéro vert : 1-877-DELLTTY
(1-877-335-5889)
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts146 Contacter Dell
Finlande (Helsinki)
Indicatif international : 990
Indicatif national : 358
Indicatif de la ville : 9
Site Web : support.euro.dell.com
E-mail : fi_support@dell.com
Support technique 0207 533 555
Service clientèle 0207 533 538
Standard 0207 533 533
Ventes (moins de 500 employés) 0207 533 540
Fax 0207 533 530
Ventes (plus de 500 employés) 0207 533 533
Fax 0207 533 530
France (Paris) (Montpellier)
Indicatif international : 00
Indicatif national : 33
Indicatifs de la ville : (1) (4)
Site Web : support.euro.dell.com
Grand public et PME
Support technique pour XPS 0825 387 129
Support technique pour tous les autres ordinateurs
Dell
0825 387 270
Service clientèle 0825 823 833
Standard 0825 004 700
Standard (appels extérieurs à la France) 04 99 75 40 00
Ventes 0825 004 700
Fax 0825 004 701
Fax (appels extérieurs à la France) 04 99 75 40 01
Grandes entreprises
Support technique 0825 004 719
Service clientèle 0825 338 339
Standard 01 55 94 71 00
Ventes 01 55 94 71 00
Fax 01 55 94 71 01
Grèce
Indicatif international : 00
Indicatif national : 30
Site Web : support.euro.dell.com
Support technique 00800-44 14 95 18
Support technique Gold Service 00800-44 14 00 83
Standard 2108129810
Standard Gold Service 2108129811
Ventes 2108129800
Fax 2108129812
Grenade E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-866-540-3355
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 147
Guatemala E-mail : la-techsupport@dell.com
Support technique général 1-800-999-0136
Guyane E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-877-270-4609
Hong Kong
Indicatif international : 001
Indicatif national : 852
Site Web : support.ap.dell.com
E-mail (Support technique) :
HK_support@Dell.com
Support technique (Dimension et Inspiron) 2969 3188
Support technique (OptiPlex, Latitude et Dell
Precision)
2969 3191
Support technique (PowerApp™, PowerEdge™,
PowerConnect™ et PowerVault™)
2969 3196
Service clientèle 3416 0910
Comptes grandes entreprises 3416 0907
Programmes clients internationaux 3416 0908
Division des moyennes entreprises 3416 0912
Division du grand public et des PME 2969 3105
Îles Caïmans E-mail : la-techsupport@dell.com
Support technique général 1-877-262-5415
Îles Turks et Caicos Site Web : www.dell.com/tc
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-877-441-4735
Îles Vierges Britanniques Support technique général numéro vert : 1-866-278-6820
Îles Vierges (États-Unis) E-mail : la-techsupport@dell.com
Support technique général 1-877-702-4288
Inde E-mail : india_support_desktop@dell.com
india_support_notebook@dell.com
india_support_Server@dell.com
Support technique 1600338045
et 1600448046
Ventes (Comptes grandes entreprises) 1600 33 8044
Ventes (Grand public et PME) 1600 33 8046
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts148 Contacter Dell
Irlande (Cherrywood)
Indicatif international : 00
Indicatif national : 353
Indicatif de la ville : 1
Site Web : support.euro.dell.com
E-mail : dell_direct_support@dell.com
Ventes
Ventes pour l'Irlande 01 204 4444
Dell Outlet 1850 200 778
Support de commande en ligne 1850 200 778
Service clientèle
Service clientèle pour les particuliers 01 204 4014
Service clientèle pour les petites entreprises 01 204 4014
Service clientèle pour les entreprises 1850 200 982
Support technique
Support technique spécifique aux ordinateurs XPS 1850 200 722
Support technique pour tous les autres ordinateurs
Dell
1850 543 543
Généralités
Fax des relations ventes 01 204 0103
Standard 01 204 4444
Service clientèle pour le Royaume-Uni (interne au
Royaume-Uni uniquement)
0870 906 0010
Service clientèle pour les entreprises (interne au
Royaume-Uni uniquement)
0870 907 4499
Ventes pour le Royaume-Uni (interne au RoyaumeUni uniquement)
0870 907 4000
Italie (Milan)
Indicatif international : 00
Indicatif national : 39
Indicatif de la ville : 02
Site Web : support.euro.dell.com
Grand public et PME
Support technique 02 577 826 90
Service clientèle 02 696 821 14
Fax 02 696 821 13
Standard 02 696 821 12
Grandes entreprises
Support technique 02 577 826 90
Service clientèle 02 577 825 55
Fax 02 575 035 30
Standard 02 577 821
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 149
Jamaïque E-mail : la-techsupport@dell.com
Support technique général (appel à partir de la
Jamaïque uniquement)
1-800-440-9205
Japon (Kawasaki)
Indicatif international : 001
Indicatif national : 81
Indicatif de la ville : 44
Site Web : support.jp.dell.com
Support technique (serveurs) numéro vert : 0120-198-498
Support technique à l'extérieur du Japon (serveurs) 81-44-556-4162
Support technique (Dimension et Inspiron) numéro vert : 0120-198-226
Support technique à l'extérieur du Japon
(Dimension et Inspiron)
81-44-520-1435
Support technique (Dell Precision, OptiPlex et
Latitude)
numéro vert : 0120-198-433
Support technique à l'extérieur du Japon (Dell
Precision, OptiPlex et Latitude)
81-44-556-3894
Support technique (PDA, projecteurs,
imprimantes, routeurs)
numéro vert : 0120-981-690
Support technique en dehors du Japon (PDA,
projecteurs, imprimantes, routeurs)
81-44-556-3468
Service Faxbox 044-556-3490
Service de commandes automatisé 24 heures sur 24 044-556-3801
Service clientèle 044-556-4240
Division Ventes aux entreprises (jusqu'à 400
employés)
044-556-1465
Division Ventes aux Comptes privilégiés (plus de
400 employés)
044-556-3433
Ventes secteur public (agences gouvernementales,
établissements d'enseignement et institutions
médicales)
044-556-5963
Segment International - Japon 044-556-3469
Utilisateur individuel 044-556-1760
Standard 044-556-4300
La Barbade Site Web : www.dell.com/bb
E-mail : la-techsupport@dell.com
Support technique général 1-800-534-3142
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts150 Contacter Dell
Luxembourg
Indicatif international : 00
Indicatif national : 352
Site Web : support.euro.dell.com
Support technique 342 08 08 075
Ventes aux grand public et PME +32 (0)2 713 15 96
Ventes aux grandes entreprises 26 25 77 81
Service clientèle +32 (0)2 481 91 19
Fax 26 25 77 82
Macao
Indicatif national : 853
Support technique numéro vert : 0800 105
Service clientèle (Xiamen, Chine) 34 160 910
Ventes aux particuliers (Xiamen, Chine) 29 693 115
Malaisie (Penang)
Indicatif international : 00
Indicatif national : 60
Indicatif de la ville : 4
Site Web : support.ap.dell.com
Support technique (Dell Precision, OptiPlex et
Latitude)
numéro vert : 1 800 880 193
Support technique (Dimension, Inspiron et
Électronique et accessoires)
numéro vert : 1 800 881 306
Support technique (PowerApp, PowerEdge,
PowerConnect et PowerVault)
numéro vert : 1800 881 386
Service clientèle numéro vert : 1800 881 306
(option 6)
Ventes aux particuliers numéro vert : 1 800 888 202
Ventes aux grandes entreprises numéro vert : 1 800 888 213
Mexique
Indicatif international : 00
Indicatif national : 52
E-mail : la-techsupport@dell.com
Support technique clients 001-877-384-8979
ou 001-877-269-3383
Ventes 50-81-8800
ou 01-800-888-3355
Service clientèle 001-877-384-8979
ou 001-877-269-3383
Groupe principal 50-81-8800
ou 01-800-888-3355
Montserrat E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-866-278-6822
Nicaragua E-mail : la-techsupport@dell.com
Support technique général 001-800-220-1377
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 151
Norvège (Lysaker)
Indicatif international : 00
Indicatif national : 47
Site Web : support.euro.dell.com
Support technique pour XPS 815 35 043
Support technique pour tous les autres ordinateurs
Dell
671 16882
Suivi clientèle 671 17575
Service clientèle pour le grand public et les PME 23162298
Standard 671 16800
Standard Fax 671 16865
Nouvelle-Zélande
Indicatif international : 00
Indicatif national : 64
Site Web : support.ap.dell.com
E-mail : support.ap.dell.com/contactus
Support technique général 0800 441 567
Panama E-mail : la-techsupport@dell.com
Support technique général 011-800-507-1264
Pays-Bas (Amsterdam)
Indicatif international : 00
Indicatif national : 31
Indicatif de la ville : 20
Site Web : support.euro.dell.com
Support technique pour XPS 020 674 45 94
Support technique pour tous les autres ordinateurs
Dell
020 674 45 00
Fax du support technique 020 674 47 66
Service clientèle pour le grand public et les PME 020 674 42 00
Suivi clientèle 020 674 4325
Ventes aux grand public et PME 020 674 55 00
Relations ventes 020 674 50 00
Fax des ventes aux grand public et PME 020 674 47 75
Fax des relations ventes 020 674 47 50
Standard 020 674 50 00
Fax du standard 020 674 47 50
Pays du Pacifique et du Sud-est
Asiatique
Support technique, service clientèle et ventes
(Penang, Malaisie)
604 633 4810
Pérou E-mail : la-techsupport@dell.com
Support technique général 0800-50-669
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts152 Contacter Dell
Pologne (Varsovie)
Indicatif international : 011
Indicatif national : 48
Indicatif de la ville : 22
Site Web : support.euro.dell.com
E-mail : pl_support_tech@dell.com
Service clientèle (téléphone) 57 95 700
Service clientèle 57 95 999
Ventes 57 95 999
Service clientèle (Fax) 57 95 806
Réception (Fax) 57 95 998
Standard 57 95 999
Portugal
Indicatif international : 00
Indicatif national : 351
Site Web : support.euro.dell.com
Support technique 707200149
Service clientèle 800 300 413
Ventes 800 300 410 ou 800 300 411 ou
800 300 412 ou 21 422 07 10
Fax 21 424 01 12
Porto Rico E-mail : la-techsupport@dell.com
Support technique général 1-877-537-3355
République Dominicaine Site Web : www.dell.com/do
E-mail : la-techsupport@dell.com
Support technique général 1-800-156-1588
République Tchèque (Prague)
Indicatif international : 00
Indicatif national : 420
Site Web : support.euro.dell.com
E-mail : czech_dell@dell.com
Support technique 22537 2727
Service clientèle 22537 2707
Fax 22537 2714
Télécopieur pour support technique 22537 2728
Standard 22537 2711
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 153
Royaume-Uni (Bracknell)
Indicatif international : 00
Indicatif national : 44
Indicatif de la ville : 1344
Site Web : support.euro.dell.com
E-mail : dell_direct_support@dell.com
Site Web du Service clientèle :
support.euro.dell.com/uk/en/ECare/form/home.asp
Ventes
Ventes aux grand public et PME 0870 907 4000
Ventes aux grandes entreprises/secteur public 01344 860 456
Service clientèle
Service clientèle pour le grand public et les PME 0870 906 0010
Service clientèle pour les entreprises 01344 373 185
Service clientèle pour les comptes privilégiés
(500–5000 employés)
0870 906 0010
Service clientèle Comptes internationaux 01344 373 186
Service clientèle Gouvernement central 01344 373 193
Service clientèle Administration locale et
Enseignement
01344 373 199
Service clientèle (Santé) 01344 373 194
Support technique
Support technique spécifique aux ordinateurs XPS 0870 366 4180
Support technique (Entreprises/Comptes
privilégiés/Division Comptes privilégiés [plus de
1000 employés])
0870 908 0500
Support technique pour tous les autres produits 0870 353 0800
Généralités
Fax pour le grand public et les PME 0870 907 4006
Salvador Site Web : www.dell.com/ec
E-mail : la-techsupport@dell.com
Support technique général 800-6132
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts154 Contacter Dell
Singapour (Singapour)
Indicatif international : 005
Indicatif national : 65
REMARQUE : Les numéros de téléphone mentionnés
ici doivent être utilisés depuis Singapour ou la
Malaisie uniquement.
Site Web : support.ap.dell.com
Support technique (Dimension, Inspiron et
Électronique et accessoires)
numéro vert : 1 800 394 7430
Support technique (OptiPlex, Latitude et Dell
Precision)
numéro vert : 1 800 394 7488
Support technique (PowerApp, PowerEdge,
PowerConnect et PowerVault)
numéro vert : 1 800 394 7478
Service clientèle numéro vert : 1 800 394 7430
(option 6)
Ventes aux particuliers numéro vert : 1 800 394 7412
Ventes aux grandes entreprises numéro vert : 1 800 394 7419
Slovaquie (Prague)
Indicatif international : 00
Indicatif national : 421
Site Web : support.euro.dell.com
E-mail : czech_dell@dell.com
Support technique 02 5441 5727
Service clientèle 420 22537 2707
Fax 02 5441 8328
Fax du Support technique 02 5441 8328
Standard (Ventes) 02 5441 7585
St- Kitts-et-Nevis Site Web : www.dell.com/kn
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-866-540-3355
St- Lucie Site Web : www.dell.com/lc
E-mail : la-techsupport@dell.com
Support technique général 1-800-882-1521
St- Vincent-et-les Grenadines Site Web : www.dell.com/vc
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-877-441-4740
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 155
Suède (Upplands Vasby)
Indicatif international : 00
Indicatif national : 46
Indicatif de la ville : 8
Site Web : support.euro.dell.com
Support technique pour XPS 0771 340 340
Support technique pour tous les autres ordinateurs
Dell
08 590 05 199
Suivi clientèle 08 590 05 642
Service clientèle pour le grand public et les PME 08 587 70 527
Support du programme d'achats par les employés
(EPP, Employee Purchase Program)
020 140 14 44
Fax du support technique 08 590 05 594
Ventes 08 590 05 185
Suisse (Genève)
Indicatif international : 00
Indicatif national : 41
Indicatif de la ville : 22
Site Web : support.euro.dell.com
E-mail : Tech_support_central_Europe@dell.com
Support technique pour XPS 0848 33 88 57
Support technique (grand public et PME) pour
tous les autres produits Dell
0844 811 411
Support technique (entreprises) 0844 822 844
Service clientèle (grand public et PME) 0848 802 202
Service clientèle (entreprises) 0848 821 721
Fax 022 799 01 90
Standard 022 799 01 01
Taïwan
Indicatif international : 002
Indicatif national : 886
Site Web : support.ap.dell.com
E-mail : ap_support@dell.com
Support technique (OptiPlex, Latitude, Inspiron,
Dimension et Électronique et accessoires)
numéro vert : 00801 86 1011
Support technique (PowerApp, PowerEdge,
PowerConnect et PowerVault)
numéro vert : 00801 60 1256
Service clientèle numéro vert : 00801 60 1250
(option 5)
Ventes aux particuliers numéro vert : 00801 65 1228
Ventes aux grandes entreprises numéro vert : 00801 651 227
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts156 Contacter Dell
Thaïlande
Indicatif international : 001
Indicatif national : 66
Site Web : support.ap.dell.com
Support technique (OptiPlex, Latitude et Dell
Precision)
numéro vert : 1800 0060 07
Support technique (PowerApp, PowerEdge,
PowerConnect et PowerVault)
numéro vert : 1800 0600 09
Service clientèle numéro vert : 1800 006 007
(option 7)
Ventes aux grandes entreprises numéro vert : 1800 006 009
Ventes aux particuliers numéro vert : 1800 006 006
Trinité/Tobago Site Web : www.dell.com/tt
E-mail : la-techsupport@dell.com
Support technique général 1-800-805-8035
Uruguay Site Web : www.dell.com/uy
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 000-413-598-2521
Venezuela Site Web : www.dell.com/ve
E-mail : la-techsupport@dell.com
Support technique général 0800-100-4752
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsCaractéristiques 157
Caractéristiques
Processeur
Type de processeur Processeur Intel® Core™ Solo ou processeur
Intel® Core™ Duo
Mémoire cache L1 I-cache de 32 Ko x2
D-cache de 32 Ko x2
Mémoire cache L2 2 Mo
Fréquence du bus externe (bus
frontal)
533 MHz et 667 MHz
Informations sur le système
Jeu de puces du système Mobile Intel 945 GM Express
Largeur du bus de données 64 bits
Largeur du bus de la mémoire DRAM Bus bicanal (2) 64 bits
Largeur du bus d'adresses du
processeur
32 bits
Flash EPROM 1 Mo
Bus graphique Interne
Bus PCI 32 bits
Carte ExpressCard
REMARQUE : Le logement de carte ExpressCard est conçu uniquement pour les
cartes ExpressCard. Il ne prend PAS en charge les cartes PC.
Contrôleur de la carte ExpressCard Intel ICH7M
Connecteur de la carte ExpressCard Un logement ExpressCard (54 mm)
Cartes prises en charge Carte ExpressCard/34 (34 mm) et
carte ExpressCard/54 (54 mm)
1,5 et 3,3 V
Taille du connecteur de la carte
ExpressCard
28 broches158 Caractéristiques
Lecteur de carte multimédia 5 en 1
Contrôleur de la carte mémoire
multimédia 5 en 1
Ricoh R5C832
Connecteur de la carte mémoire
multimédia 5 en 1
Connecteur de la carte combinée 5 en 1
Cartes prises en charge MS
MS Pro
SD/SDIO
MMC
xD
CF type I/II et IBM® Microdrive via une
carte ExpressCard
Taille du connecteur de la carte
mémoire multimédia 5 en 1
36,8 x 29,3 x 4,75 mm
Mémoire
Connecteur du module de mémoire Deux connecteurs SODIMM
Capacités du module de mémoire 256 Mo, 512 Mo, 1 Go et 2 Go
Type de mémoire DDR2 SODIMM 1,8 V
Mémoire minimale 256 Mo
Mémoire maximale 2 Go
Ports et connecteurs
Audio Connecteur de microphone, connecteur de
casque/haut-parleurs stéréo
IEEE 1394a Connecteur série à 4 broches
Carte Mini Un emplacement de carte Mini type IIIA
Modem Port RJ-11
Carte réseau Port RJ-45
Connecteur de sortie TV S-vidéo Connecteur mini-DIN à 7 broches
(adaptateur S-vidéo/composite)
USB Quatre connecteurs à 4 broches conformes à
la norme USB 2.0
Vidéo Connecteur à 15 trousCaractéristiques 159
Communications
Modem :
Type v.92 56K MDC
Contrôleur Softmodem
Interface Bus HDA interne
Carte réseau LAN Ethernet 10/100 sur la carte système
Sans fil Prise en charge des cartes Mini internes
Wi-Fi et de la technologie sans fil
Bluetooth®
Vidéo
Type de vidéo : Carte intégrée
Contrôleur vidéo Intel® GMA950
Mémoire vidéo Jusqu'à 224 Mo partagés si la mémoire totale
de l'ordinateur est de 512 Mo minimum,
jusqu'à 128 Mo partagés si la mémoire totale
de l'ordinateur est de 256 Mo
Interface LCD LVDS
Prise en charge TV NTSC/PAL
Audio
Type d'audio Bus HDA (High Definition Audio)
Contrôleur audio Sigmatel STAC9200
Conversion stéréo 24 bits (analogique-numérique et
numérique-analogique)
Interfaces :
Interne Bus HDA
Externe Connecteur de microphone (entrée),
connecteur de casque/de haut-parleurs
stéréo
Haut-parleur Deux haut-parleurs 4 ohms
Amplificateur de haut-parleur interne Canal de 1 W en 4 ohms
Contrôle du volume Raccourcis clavier, menus de programme,
boutons de commande multimédia160 Caractéristiques
Écran
Type (matrice active TFT) 14,1 pouces WXGA et
14,1 pouces WXGA+
Dimensions :
Hauteur 206 mm (8,11 pouces)
Largeur 320 mm (12,59 pouces)
Diagonale 357,74 mm (14,1 pouces)
Résolutions maximales :
WXGA
WXGA+
1280 sur 800 avec 262 144 couleurs
1440 sur 900 avec 262 144 couleurs
Taux de rafraîchissement 60 Hz
Angle de fonctionnement 0° (fermé) à 180 °
Angles de visualisation :
Horizontal ±40 ° (WXGA) en général
Vertical +15°/–30 ° (WXGA)
Taille du pixel :
WXGA
WXGA+
0,237 mm
0,211 mm
Boutons de réglage Possibilité de réglage de la luminosité à l'aide
de raccourcis clavier
Clavier
Nombre de touches 87 (États-Unis et Canada) ; 88 (Europe) ;
91 (Japon)
Disposition QWERTY/AZERTY/Kanji
Tablette tactile
Résolution X/Y (mode
Tablette graphique) 240 cpi
Taille :
Largeur Zone sensible de 73 mm (2,9 pouces)
Hauteur Rectangle de 42,9 mm (1,7 pouce)Caractéristiques 161
Batterie
Type lithium ion « intelligente » 6 cellules
lithium ion « intelligente » 9 cellules
Dimensions :
Profondeur 49 mm (1,93 pouce) (6 cellules)
60,1 mm (2,37 pouces) (9 cellules)
Hauteur 24 mm (0,94 pouce)
Largeur 206,8 mm (8,14 pouces)
Poids 0,32 kg (0,7 livres) (6 cellules)
0,48 kg (1,06 livres) (9 cellules)
Tension 11,1 VCC
Durée approximative de la charge :
Ordinateur éteint 2 heures (6 cellules)
3 heures (9 cellules)
Durée de fonctionnement L'autonomie de la batterie varie en fonction
de l'utilisation et peut être considérablement
réduite en cas d'utilisation intensive.
Reportez-vous à la section « Problèmes
d'alimentation » à la page 97.
Pour plus d'informations sur la durée de vie
de la batterie, reportez-vous à la section
« Utilisation d'une batterie » à la page 37.
Durée de service approximative 500 cycles de décharge/charge
Plage de températures :
Fonctionnement 0 ° à 35 °C (32 ° à 95 °F)
Stockage –40 ° à 65 °C (–40 ° à 149 °F)
Pile bouton CR-2032162 Caractéristiques
Adaptateur secteur
Tension d'entrée 90 à 264 VCA
Courant d'entrée (maximal) 1,5 A
Fréquence d'entrée 47 à 63 Hz
Courant de sortie 4,34 A (maximum à impulsion 4 secondes) ;
3,34 A (continu)
Alimentation de sortie 65 W
Tension de sortie nominale 19,5 +/–1,0 VCC
Dimensions :
Hauteur 28,2 mm (1,11 pouce)
Largeur 57,9 mm (2,28 pouces)
Profondeur 137,2 mm (5,4 pouces)
Poids (avec les câbles) 0,4 kg (0,9 livre)
Plage de températures :
Fonctionnement 0 ° à 35 °C (32 ° à 95 °F)
Stockage –40 ° à 65 °C (–40 ° à 149 °F)
Caractéristiques physiques
Hauteur 38,6 mm (1,52 pouce)
Largeur 330 mm (12,99 pouces)
Profondeur 243 mm (9,56 pouces)
Poids (avec batterie 6 cellules, lecteur
combiné CD-RW/DVD et disque dur
de 40 Go) :
Configurable jusqu'à moins de 2,5 kg (5,5 livres)Caractéristiques 163
Environnement de fonctionnement
Plage de températures :
Fonctionnement 0 ° à 35 °C (32 ° à 95 °F)
Stockage –40 ° à 65 °C (–40 ° à 149 °F)
Humidité relative (maximale) :
Fonctionnement 10 à 90 % (sans condensation)
Stockage 5 à 95 % (sans condensation)
Vibration maximale (avec un spectre
de vibration aléatoire simulant
l'environnement utilisateur) :
Fonctionnement 0,66 GRMS
Stockage 1,3 GRMS
Chocs maximaux (mesurés avec le
disque dur en état de marche et une
demi-impulsion sinusoïdale de 2 ms
en fonctionnement. Également
mesurés avec le disque dur en
position de repos et une
demi-impulsion de 2 ms en
stockage) :
Fonctionnement 142 G
Stockage 163 G
Altitude (maximale) :
Fonctionnement –15,2 à 3048 m (–50 à 10 000 pieds)
Stockage –15,2 à 10 668 m (–50 à 35 000 pieds)164 CaractéristiquesAnnexe 165
Annexe
Utilisation du programme de configuration du système
REMARQUE : Il se peut que votre système d'exploitation configure automatiquement la plupart des options
disponibles dans le programme de configuration ; les options que vous avez configurées à l'aide de ce
programme sont alors ignorées. Seule exception, l'option External Hot Key (Touche rapide externe), que vous
pouvez désactiver ou activer via le programme de configuration du système uniquement. Pour plus
d'informations sur la configuration des fonctions de votre système d'exploitation, reportez-vous au Centre
d'aide et de support Windows. Pour accéder au Centre d'aide et de support, reportez-vous à la page 14.
Les écrans de configuration du système affichent les informations sur la configuration courante et
les paramètres de votre ordinateur, par exemple :
• Configuration du système
• Paramètres de configuration de base des périphériques
• Paramètres de sécurité du système et mot de passe de disque dur
• Paramètres de gestion de l'alimentation
• Paramètres de configuration d'amorçage (démarrage) et d'affichage
• Paramètres de la station d'accueil
• Paramètres de contrôle sans fil
AVIS : Ne modifiez les paramètres du programme de configuration du système que si vous êtes un utilisateur
expérimenté en informatique ou si vous êtes assisté par un représentant du support technique de Dell.
Certaines modifications risquent de provoquer un mauvais fonctionnement de l'ordinateur.
Affichage de l'écran de configuration du système
1 Mettez votre ordinateur sous tension (ou redémarrez-le).
2 Lorsque le logo DELL™ apparaît, appuyez immédiatement sur . Si vous attendez trop
longtemps et que le logo Windows apparaît, attendez encore jusqu'à ce que le bureau Windows
s'affiche. Ensuite, arrêtez votre ordinateur et faites une nouvelle tentative.
Programme de configuration du système
L'écran de configuration du système se compose de trois fenêtres d'information. La fenêtre de
gauche contient une hiérarchie développable des catégories de contrôle. Si vous sélectionnez
(mettez en surbrillance) une catégorie (comme Système, Périphériques intégrés ou Vidéo) et que
vous appuyez sur , vous pouvez afficher ou masquer les sous-catégories connexes. La
fenêtre de droite contient des informations sur la catégorie ou sous-catégorie sélectionnée dans la
fenêtre de gauche. 166 Annexe
La fenêtre du bas vous indique comment contrôler les fonctions des touches du programme de
configuration du système. Utilisez ces touches pour sélectionner une catégorie, modifier les paramètres,
ou quitter le programme de configuration du système.
Options fréquemment utilisées
Certaines options nécessitent le redémarrage de l'ordinateur pour que les nouveaux paramètres entrent
en vigueur.
Modification de la séquence d'amorçage
La séquence d'amorçage, ou ordre de démarrage, indique à l'ordinateur où chercher pour trouver le logiciel
requis pour démarrer le système d'exploitation. Vous pouvez contrôler la séquence d'amorçage et
activer/désactiver les périphériques à l'aide de la page Ordre d'amorçage du programme de configuration
du système.
REMARQUE : Pour modifier la séquence d'amorçage sur une base ponctuelle, reportez-vous à la section
« Exécution d'un amorçage ponctuel » à la page 167.
Cette page affiche la liste générale des périphériques amorçables pouvant être installés sur l'ordinateur,
notamment les suivants :
• Lecteur de disquette
• Unité de disque dur interne
• Périphérique de stockage USB
• Lecteur de CD/DVD/CD-RW
• Disque dur de la baie modulaire
REMARQUE : Seuls sont amorçables les périphériques précédés d'un numéro.
Pendant la procédure d'amorçage, l'ordinateur commence par le début de la liste, puis analyse chacun des
périphériques activés à la recherche des fichiers de démarrage du système d'exploitation. Lorsque les
fichiers ont été trouvés, l'ordinateur arrête la recherche et fait démarrer le système d'exploitation.
Pour définir les périphériques d'amorçage, sélectionnez (mettez en surbrillance) un périphérique en
appuyant sur les touches fléchées haut ou bas, puis activez ou désactivez le périphérique ou modifiez son
ordre dans la liste.
• Pour activer ou désactiver un périphérique, sélectionnez-le et appuyez sur la barre d'espacement. Les
éléments activés sont précédés d'un numéro ; ceux qui ne le sont pas ne sont pas précédés d'un
numéro.
• Pour modifier l'ordre d'un périphérique dans la liste, sélectionnez-le et appuyez sur (h) ou
(b) pour déplacer le périphérique vers le haut ou le bas.
Les modifications que vous apportez à la séquence d'amorçage sont prises en compte dès que vous les
enregistrez et que vous quittez le programme de configuration du système.Annexe 167
Exécution d'un amorçage ponctuel
Vous pouvez définir une séquence d'amorçage ponctuelle sans devoir passer par le programme de
configuration du système. (Vous pouvez également utiliser cette procédure pour initialiser Dell
Diagnostics sur la partition de l'utilitaire de diagnostics de votre disque dur.)
1 Arrêtez l'ordinateur à l'aide du menu Démarrer.
2 Connectez l'ordinateur à une prise secteur.
3 Allumez l'ordinateur. Lorsque le logo DELL apparaît, appuyez immédiatement sur . Si vous
attendez trop longtemps et que le logo Windows apparaît, attendez encore jusqu'à ce que le bureau
Windows s'affiche. Éteignez alors votre ordinateur et faites une nouvelle tentative.
4 Lorsque la liste des périphériques d'amorçage apparaît, sélectionnez celui que vous voulez utiliser pour
l'amorçage, puis appuyez sur .
L'ordinateur démarre à partir du périphérique sélectionné.
Au prochain redémarrage de l'ordinateur, l'ordre d'amorçage précédent sera restauré.
Nettoyage de votre ordinateur
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Ordinateur, clavier et écran
PRÉCAUTION : Débranchez l'ordinateur de la prise électrique avant de le nettoyer. Retirez toute batterie
installée. Nettoyez votre ordinateur avec un chiffon doux humecté d'eau. N'utilisez pas de liquide ni d'aérosol
nettoyants, ceux-ci peuvent contenir des substances inflammables.
• Utilisez une bouteille d'air comprimé pour retirer la poussière entre les touches du clavier, ainsi que les
dépôts de poussière sur l'écran.
AVIS : Pour éviter d'endommager l'ordinateur ou l'écran, ne vaporisez pas de liquide de nettoyage directement sur
l'écran. Utilisez uniquement les produits conçus particulièrement pour le nettoyage d'écrans et suivez les
instructions fournies avec le produit.
• Utilisez un chiffon doux, non pelucheux, humecté d'eau ou un nettoyant d'écran. N'utilisez pas
d'alcool ni de nettoyant à base d'ammoniac. Essuyez l'écran doucement du centre vers les bords jusqu'à
ce qu'il soit propre et exempt de traces de doigt. Veillez à ne pas trop appuyer sur l'écran.
• Humectez un chiffon doux, non pelucheux, d'eau et essuyez l'ordinateur et le clavier. Veillez à ne pas
laisser l'eau du chiffon s'infiltrer entre la tablette tactile et le repose-mains qui l'entoure.
Tablette tactile
1 Arrêtez l'ordinateur et mettez-le hors tension. Reportez-vous à la section « Mise hors tension de
l'ordinateur » à la page 111.
2 Débranchez les périphériques de l'ordinateur et des prises secteur.168 Annexe
3 Retirez toute batterie installée. Reportez-vous à la section « Utilisation d'une batterie » à la page 37.
4 Humectez un chiffon doux, non pelucheux, d'eau et passez-le doucement sur la surface de la tablette
tactile. Veillez à ne pas laisser l'eau du chiffon s'infiltrer entre la tablette tactile et le repose-mains qui
l'entoure.
Lecteur de disquette
AVIS : N'essayez pas de nettoyer les têtes de lecture avec une tige de nettoyage. Vous risqueriez de déranger
accidentellement l'alignement des têtes et d'empêcher le fonctionnement du lecteur.
Nettoyez le lecteur de disquette à l'aide d'une trousse de nettoyage que vous trouverez dans le
commerce. Ces trousses comportent des disquettes prétraitées qui permettent d'enlever les dépôts
accumulés au cours d'une utilisation normale.
CD et DVD
AVIS : Utilisez toujours de l'air comprimé pour nettoyer la lentille du lecteur et suivez les instructions fournies avec
l'air comprimé. Ne touchez jamais la lentille qui se trouve à l'intérieur du lecteur.
Si vous avez des problèmes pendant la lecture de vos CD ou DVD (des sauts pendant la lecture par
exemple), nettoyez les disques.
1 Tenez le disque par son bord extérieur. Vous pouvez également toucher le bord intérieur de l'orifice
central.
AVIS : Pour éviter d'abîmer la surface, n'essuyez pas le disque par mouvement circulaire.
2 Avec un chiffon doux et non pelucheux, nettoyez doucement la partie inférieure du disque (côté sans
étiquette) en suivant une ligne droite depuis le centre jusqu'au bord extérieur.
Si la poussière ne part pas, utilisez de l'eau ou une solution diluée d'eau et de savon doux. Certains
produits vendus dans le commerce nettoient les disques et les protègent contre la poussière, les
empreintes et les rayures. Les produits de nettoyage pour CD peuvent également être utilisés sur les
DVD sans aucun risque.
Règle de support technique de Dell (États-Unis uniquement)
Le support technique fourni par les techniciens nécessite la coopération et la participation du client dans
le processus de dépannage et permet de restaurer le système d'exploitation, les logiciels et les pilotes
matériels à leur configuration par défaut telle que livrée par Dell ; il permet en outre de vérifier le
fonctionnement approprié de l'ordinateur et de tout le matériel installé par Dell. En plus du support
technique par nos techniciens, vous disposez d'une aide en ligne à l'adresse support.dell.com. Des
options payantes de support technique complémentaire sont également disponibles.Annexe 169
Dell offre un support technique limité pour l'ordinateur et tous les logiciels et périphériques1
installés
par Dell. Le support technique pour les logiciels et les périphériques tiers est assuré par le fabricant luimême, y compris le support pour tout logiciel ou périphérique acheté et/ou installé par le biais de Dell
Software & Peripherals, Readyware et Custom Factory Integration2
.
1
Les services de réparation sont fournis selon les termes et les conditions stipulés par votre garantie limitée et par tout
contrat de service de support optionnel acheté avec l'ordinateur.
2
Tous les composants Dell standard inclus dans un projet d'intégration personnalisée en usine (Custom Factory
Integration - CFI) sont couverts par la garantie limitée standard de Dell applicable à votre ordinateur. Toutefois, Dell
propose un programme de remplacement des pièces pour couvrir tous les composants non standard ou de sociétés
tierces intégrés via CFI pendant la durée du contrat de service de l’ordinateur.
Définition des logiciels et des périphériques installés par Dell
Les logiciels installés par Dell englobent le système d'exploitation et certains logiciels installés sur
l'ordinateur pendant le processus de fabrication (Microsoft® Office, Norton Antivirus et ainsi de suite).
L'expression « périphériques installés par Dell » recouvre toute carte d'extension interne, ou baie
modulaire de marque Dell ou encore tous les accessoires ExpressCard. Sont inclus également les produits
de marque Dell suivants : moniteurs, claviers, souris, haut-parleurs, microphones pour modems à
fonction téléphonique, stations d'accueil et réplicateurs de port, produits réseau et le câblage associé.
Définition des logiciels et des périphériques tiers
Les logiciels et périphériques tiers incluent tout périphérique, accessoire ou logiciel vendu par Dell mais
qui ne porte pas la marque Dell (imprimantes, scanners et appareils photo, jeux et ainsi de suite). Le
support technique pour tout logiciel ou périphérique tiers est fourni par le fabricant du produit en
question.
Réglementation FCC (États-Unis uniquement)
Classe B de la FCC
Cet équipement crée, utilise et peut émettre de l'énergie de fréquence radio et peut, s'il n'est pas installé
et utilisé conformément aux instructions du guide du fabricant, être la cause de perturbations des
réceptions radio et télévision. Cet équipement a été testé et déclaré conforme aux limites des appareils
numériques de classe B définies à l'alinéa 15 du règlement de la FCC.
Ce périphérique est conforme à l'alinéa 15 du règlement de la FCC. Son fonctionnement est soumis aux
deux conditions suivantes :
• Cet appareil ne doit pas émettre d'interférences nuisibles.
• Cet appareil doit accepter toutes les interférences qu'il reçoit, y compris celles qui peuvent perturber
son fonctionnement.
AVIS : Les réglementations de la FCC prévoient que les changements ou modifications non explicitement
approuvés par Dell Inc. peuvent annuler vos droits à utiliser cet équipement. 170 Annexe
Ces limites ont été conçues pour fournir une protection raisonnable contre les interférences nuisibles
dans un milieu résidentiel. Cependant, la possibilité d'interférence d'une installation particulière n'est
pas entièrement exclue. Si cet équipement crée effectivement des interférences nuisibles avec la
réception radio et télévision, ce qui peut être déterminé en allumant et en éteignant l'équipement, vous
êtes encouragé à essayer de corriger les interférences en prenant une ou plusieurs des mesures suivantes :
• Changer l'orientation de l'antenne de réception.
• Repositionner le système en fonction du récepteur.
• Éloigner le système du récepteur.
• Brancher le système sur une autre prise, pour faire en sorte que le système et le récepteur se trouvent
sur différents circuits de dérivation.
Si nécessaire, consultez un représentant de Dell Inc. ou un technicien radio/télévision expérimenté pour
des suggestions supplémentaires.
Les informations suivantes sont fournies sur le ou les appareil(s) couvert(s) dans ce document
conformément aux réglementations de la FCC :
Caractéristiques Macrovision
Ce produit intègre une technologie de protection des droits d'auteur qui est protégée par des brevets
américains et d'autres droits de propriété intellectuelle. L'utilisation de cette technologie de protection
des droits d'auteur est soumise à l'autorisation de Macrovision ; elle est destinée exclusivement à une
utilisation domestique et à des opérations limitées de visualisation, sauf autorisation particulière de
Macrovision. L'ingénierie inverse et le désassemblage sont interdits.
Nom du produit : Dell™ Inspiron™ 640M/ E1405
Numéro de modèle : PP19L
Nom de la société : Dell Inc.
Worldwide Regulatory Compliance & Environmental Affairs
One Dell Way
Round Rock, TX 78682 USA
512-338-4400Glossaire 171
Glossaire
Les termes répertoriés dans ce glossaire ne sont
fournis qu'à titre informatif et ne décrivent pas
obligatoirement les fonctions incluses avec votre
ordinateur particulier.
A
ACPI — Advanced Configuration and Power Interface —
Spécification de gestion de l'alimentation qui permet aux
systèmes d'exploitation Microsoft® Windows® de placer
l'ordinateur en mode Veille ou Mise en veille prolongée
afin de conserver l'énergie électrique attribuée à chaque
périphérique connecté à l'ordinateur.
adressage de mémoire — Processus permettant à
l'ordinateur d'attribuer des adresses mémoire à des
emplacements physiques au démarrage. Les périphériques
et les logiciels peuvent ensuite déterminer les
informations auxquelles le microprocesseur peut accéder.
adresse E/S — Adresse RAM associée à un périphérique
spécifique (un connecteur série, un connecteur parallèle
ou une baie d'extension) et qui permet au
microprocesseur de communiquer avec ce périphérique.
adresse mémoire — Emplacement spécifique où les
données sont stockées temporairement dans la mémoire
RAM.
AGP — Accelerated Graphics Port — Port graphique
dédié allouant de la mémoire système à utiliser pour les
tâches liées à la vidéo. Le port AGP permet d'obtenir une
image vidéo de haute qualité avec des couleurs fidèles
grâce à une interface très rapide entre le circuit vidéo et la
mémoire de l'ordinateur.
ALS — Capteur d'éclairage ambiant.
APR — Advanced Port Replicator — Station d'accueil qui
permet d'utiliser aisément un moniteur externe, un
clavier, une souris ou d'autres périphériques avec
l'ordinateur portable.
arrêt — Processus consistant à fermer les fenêtres et les
programmes, à quitter le système d'exploitation et à
éteindre l'ordinateur. Vous pouvez perdre des données si
vous éteignez l'ordinateur sans effectuer la procédure
d'arrêt.
ASF — Alert Standards Format — Standard permettant
de définir un mécanisme pour signaler les alertes
matérielles et logicielles à une console de gestion. La
norme ASF est conçue pour être indépendante des platesformes et des systèmes d'exploitation.
autonomie de la batterie — Nombre de minutes ou
d'heures durant lesquelles la batterie d'un ordinateur
portable peut alimenter l'ordinateur.
B
baie modulaire — Logement qui prend en charge des
périphériques, tels qu'un lecteur optique, une seconde
batterie ou un module TravelLite™ de Dell.
barre d'état système — La barre d'état système du bureau
Windows contient des icônes permettant d'accéder
rapidement aux programmes et aux fonctions de
l'ordinateur, notamment à l'horloge, au contrôle du
volume et à l'état de l'imprimante. Appelée également
Zone de notification.
batterie — Source d'énergie interne rechargeable qui
permet d'alimenter des ordinateurs portables lorsqu'ils ne
sont pas raccordés à un adaptateur secteur et une prise
secteur.
BIOS — Basic Input/Output System — Programme (ou
utilitaire) qui joue le rôle d'interface entre le matériel
informatique et le système d'exploitation. Ne modifiez les
paramètres de ce programme que si vous connaissez avec
exactitude les effets de chacun d'eux sur l'ordinateur.
Appelé également programme de configuration du système.
bit — L'unité de donnée la plus petite pouvant être
interprétée par l'ordinateur.172 Glossaire
bps — Bits per second (bits par seconde) — Unité
standard de mesure de la vitesse de transmission de
données.
BTU — British Thermal Unit (unité thermique
britannique) — Mesure de sortie de chaleur.
bus — Passerelle pour les communications entre les
composants de votre ordinateur.
bus local — Bus de données permettant une transmission
rapide des données entre les périphériques et le
microprocesseur.
C
C — Celsius — Système de mesure des températures où
0 ° est le point de congélation et 100 ° le point d'ébullition
de l'eau.
CA— Courant alternatif — Forme d'électricité qui
alimente votre ordinateur lorsque vous branchez le câble
d'alimentation de l'adaptateur secteur sur une prise
électrique.
capteur infrarouge — Port permettant de transférer des
données entre l'ordinateur et des périphériques
compatibles infrarouge sans utiliser de connexion câblée.
carnet — Document international des douanes qui
facilite les importations temporaires dans les pays
étrangers. Appelé également passeport de marchandises.
carte à puce — Carte qui incorpore un microprocesseur et
une puce mémoire. Les cartes à puce permettent
d'identifier un utilisateur sur des ordinateurs équipés de
telles cartes.
carte d'extension — Carte installée dans un logement
d'extension sur la carte système de certains ordinateurs et
qui permet d'augmenter les capacités de l'ordinateur. Il
peut s'agir d'une carte vidéo, modem ou son.
carte ExpressCard — Carte d'E/S amovible conforme à la
norme PCMCIA. Les cartes modem et les cartes réseau
sont des cartes ExpressCard courantes. Les cartes
ExpressCard prennent en charge les standards PCI
Express et USB 2.0.
carte PC — Carte d'E/S amovible conforme à la norme
PCMCIA. Les cartes modem et les cartes réseau sont des
cartes PC courantes.
carte PC étendue — Carte PC qui dépasse du logement
de carte PC lorsqu'elle est installée.
carte réseau — Puce qui offre des fonctions réseau. Un
ordinateur peut comprendre une carte réseau sur sa carte
système ou il peut contenir une carte PC sur laquelle se
trouve un adaptateur intégré. Une carte réseau est aussi
appelée NIC (Network Interface Controller [contrôleur
d'interface réseau]).
carte système — Carte à circuit imprimé principale de
votre ordinateur. Appelée également carte mère.
CD — Compact Disc — Support de stockage optique,
souvent utilisé pour les logiciels et les programmes audio.
CD amorçable — CD pouvant être utilisé pour démarrer
votre ordinateur. Au cas où votre disque dur serait
endommagé ou votre ordinateur infecté par un virus,
assurez-vous d'avoir toujours à disposition un CD ou une
disquette amorçable. Le CD Drivers and Utilities ou
ResourceCD est un CD amorçable.
CD-R — CD Recordable — Version enregistrable d'un
CD. Des données ne peuvent être enregistrées qu'une
seule fois sur un CD enregistrable. Une fois enregistrées,
les données ne peuvent être ni effacées ni écrasées.
CD-RW — CD ReWritable — Version réinscriptible d'un
CD. Vous pouvez enregistrer des données sur un CD-RW,
puis les effacer et les réécrire.
COA — Certificate of Authenticity (certificat
d'authenticité) — Code alphanumérique Windows inscrit
sur une étiquette sur votre ordinateur. Appelé également
Product Key (Clé de produit) ou Product ID
(Identification produit).
code de service express — Code numérique inscrit sur
une étiquette sur votre ordinateur Dell™. Utilisez le code
de service express lorsque vous contactez Dell pour
obtenir une assistance technique. Le code de service
express n'est pas nécessairement disponible dans tous les
pays.
combinaison de touches — Commande nécessitant une
pression simultanée sur plusieurs touches.
connecteur DIN — Connecteur rond à 6 broches
conforme aux normes DIN (Deutsche Industrie-Norm),
généralement utilisé pour connecter des connecteurs de
câbles de souris ou de clavier PS/2.Glossaire 173
connecteur parallèle — Port d'E/S souvent utilisé pour
connecter une imprimante parallèle à l'ordinateur. Appelé
également port LPT.
connecteur série — Port d'E/S souvent utilisé pour
connecter des périphériques comme des organiseurs ou
des appareils photo numériques sur votre ordinateur.
contrôleur — Puce qui contrôle le transfert de données
entre le microprocesseur et la mémoire ou entre le
microprocesseur et les périphériques.
contrôleur vidéo — Circuits de la carte vidéo ou de la
carte système (sur les ordinateurs dotés d'un contrôleur
vidéo intégré) qui fournissent, en association avec l'écran
ou un moniteur externe, les fonctions vidéo, de votre
ordinateur.
CRIMM — Continuity Rambus In-line Memory
Module — Module ne disposant pas de puces de
mémoire, utilisé pour remplir les emplacements RIMM
inutilisés.
curseur — Marqueur sur l'écran qui indique
l'emplacement de la prochaine action du clavier, de la
tablette tactile ou de la souris. Il s'agit généralement d'une
ligne clignotante, d'un caractère de soulignement ou
d'une petite flèche.
D
disquette — Type de support de stockage
électromagnétique. Également appelé disquette floppy ou
disque floppy.
disquette amorçable — Disquette pouvant être utilisée
pour démarrer votre ordinateur. Au cas où votre disque
dur serait endommagé ou votre ordinateur infecté par un
virus, assurez-vous d'avoir toujours à disposition un CD
ou une disquette amorçable.
dissipateur de chaleur — Plaque en métal sur certains
microprocesseurs qui permet de dissiper la chaleur.
DMA — Direct Memory Access (accès direct à la
mémoire) — Canal permettant à certains types de
transferts de données entre la mémoire RAM et un
périphérique d'éviter de passer par le microprocesseur.
DMTF — Distributed Management Task Force —
Consortium de compagnies représentant des fournisseurs
de matériel et de logiciel développant des normes de
gestion pour les environnements réseau, Internet, de
bureau et d'entreprise distribués.
domaine — Groupe d'ordinateurs, de programmes et de
périphériques sur un réseau administrés en tant qu'unité
avec des règles et des procédures communes afin d'être
utilisés par un groupe d'utilisateurs donné. Les utilisateurs
doivent se connecter au domaine pour avoir accès aux
ressources.
dossier — Terme utilisé pour décrire l'espace sur une
disquette ou un disque dur sur lequel des fichiers sont
organisés et regroupés. Les fichiers d'un dossier peuvent
être affichés et classés de différentes façons, par exemple
par ordre alphabétique, par date ou par taille.
DRAM — Dynamic Random Access Memory (mémoire
dynamique à accès aléatoire) — Mémoire qui stocke des
informations dans les circuits intégrés contenant des
condensateurs.
DSL — Digital Subscriber Line — Technologie offrant
une connexion Internet constante et à haute vitesse par
l'intermédiaire d'une ligne téléphonique analogique.
durée de vie d'une batterie — Nombre d'années durant
lesquelles la batterie d'un ordinateur portable peut être
rechargée.
DVD — digital versatile disc (disque polyvalent
numérique) — Disque à grande capacité généralement
utilisé pour stocker des films. Les lecteurs de DVD lisent
également la plupart des CD.
DVD-R — DVD recordable (DVD enregistrable) —
Version enregistrable d'un DVD. Des données ne peuvent
être enregistrées qu'une seule fois sur un DVD
enregistrable. Une fois enregistrées, les données ne
peuvent être ni effacées ni écrasées.
DVD+RW — DVD réinscriptible — Version
réinscriptible d'un DVD. Vous pouvez enregistrer des
données sur un DVD+RW, puis les effacer et les réécrire.
(La technologie DVD+RW diffère de la technologie
DVD-RW.)
DVI — digital video interface (interface vidéo
numérique) — Norme de transmission numérique entre
un ordinateur et un écran vidéo numérique.174 Glossaire
E
ECC — Error Checking and Correction (code de
vérification et de correction d'erreur) — Type de mémoire
qui inclut des circuits spéciaux pour tester l'exactitude des
données lorsqu'elles passent par la mémoire.
ECP — Extended Capabilities Port — Connecteur
parallèle permettant de transmettre des données de
manière bidirectionnelle. Similaire à EPP, le port ECP
utilise l'accès direct à la mémoire pour transférer des
données et améliore généralement les performances.
éditeur de texte — Programme utilisé pour créer et
modifier les fichiers contenant uniquement du texte ; par
exemple, le Bloc-notes de Windows utilise un éditeur de
texte. En général, les éditeurs de texte n'offrent pas les
fonctions de renvoi à la ligne automatique ou de mise en
forme (option permettant de souligner, de changer les
polices, etc.).
EIDE — Enhanced Integrated Device Electronics
(électronique de périphérique intégré améliorée) —
Version améliorée de l'interface IDE pour les disques durs
et les lecteurs de CD.
EMI — Electromagnetic Interference (interférence
électromagnétique) — Interférences électriques causées
par radiation électromagnétique.
emplacement d'extension — Connecteur de la carte
système (sur certains ordinateurs) dans lequel vous
insérez une carte d'extension pour la connecter au bus
système.
ENERGY STAR® — Exigences de l'agence EPA
(Environmental Protection Agency) permettant de
diminuer la consommation globale d'électricité.
EPP — Enhanced Parallel Port — Connecteur parallèle
permettant de transmettre des données de manière
bidirectionnelle.
E/S — Entrée/Sortie — Opération ou périphérique
entrant et extrayant des données de votre ordinateur. Les
claviers et les imprimantes sont des périphériques d'E/S.
ESD — ElectroStatic Discharge (décharge
électrostatique) — Brève décharge d'électricité statique.
Ce type de décharge peut endommager les circuits
intégrés du matériel informatique et de communication.
F
Fahrenheit — Système de mesure des températures où
32 ° correspond au point de congélation et 212 ° au point
d'ébullition de l'eau.
FCC — Federal Communications Commission
(Commission fédérale des communications, aux ÉtatsUnis) — Bureau américain responsable de l'application de
réglementations relatives aux communications qui évalue
la quantité de radiations pouvant être émise par les
ordinateurs et autres équipements électroniques.
fichier d'aide — Fichier qui contient des descriptions ou
des instructions relatives à un produit. Certains fichiers
d'aide sont associés à un programme particulier, par
exemple Aide de Microsoft Word. D'autres fichiers d'aide
fonctionnent comme sources de référence autonomes. Les
fichiers d'aide portent généralement l'extension .hlp ou
.chm.
fichier « Lisez-moi » — Fichier texte livré avec un logiciel
ou du matériel. En général, les fichiers « Lisez-moi »
fournissent des informations sur l'installation et décrivent
les améliorations ou corrections apportées au produit qui
n'ont pas encore été documentées.
formatage — Processus qui prépare un disque pour le
stockage des fichiers. Lorsqu'un lecteur ou disque est
formaté, les informations existantes sur ce lecteur ou
disque sont perdues.
FSB — Front Side Bus (bus frontal) — Canal de données
et interface physique entre le microprocesseur et la
mémoire RAM.
FTP — File Transfer Protocol (protocole de transfert de
fichiers) — Protocole Internet standard utilisé pour
échanger des fichiers entre des ordinateurs connectés à
Internet.
G
G — Gravité — Mesure de poids et de force.
GHz — Gigahertz — Unité de mesure de fréquence égale
à un milliard de Hz ou à mille MHz. La vitesse des
microprocesseurs, des bus et des interfaces des
ordinateurs est généralement mesurée en GHz.Glossaire 175
Go — Giga-octet — Unité de stockage de données égale à
1024 Mo (1 073 741 824 octets). Ce terme est souvent
arrondi à 1 000 000 000 octets lorsqu'il fait référence à la
capacité de stockage d'un disque dur.
GUI — Graphical User Interface (interface graphique
utilisateur) — Logiciel interagissant avec l'utilisateur à
l'aide de menus, de fenêtres et d'icônes. La plupart des
programmes fonctionnant avec les systèmes d'exploitation
Microsoft Windows ont des interfaces graphiques
utilisateur.
H
unité de disque dur — Lecteur permettant de lire et
d'écrire des données sur un disque dur. Les termes lecteur
de disque dur et disque dur sont souvent utilisés
indifféremment.
mode Mise en veille prolongée — Mode de gestion de
l'alimentation électrique qui enregistre le contenu de la
mémoire dans un espace réservé du disque dur, puis arrête
l'ordinateur. Quand vous redémarrez l'ordinateur, les
informations de la mémoire qui ont été enregistrées sur le
disque dur sont automatiquement restaurées.
HTML — Hypertext Markup Language — Ensemble de
codes insérés dans une page Web afin de s'afficher dans
un navigateur Internet.
HTTP — Hypertext Transfer Protocol — Protocole
d'échange de fichiers entre des ordinateurs connectés à
Internet.
Hz — Hertz — Unité de mesure de fréquence égale à 1
cycle par seconde. La vitesse de fonctionnement des
ordinateurs et des périphériques électroniques est souvent
mesurée en kilohertz (kHz), mégahertz (MHz), gigahertz
(GHz) ou térahertz (THz).
I
IC — circuit intégré — Semi-conducteur ou puce sur
lesquels sont fabriqués des milliers ou des millions de
minuscules composants électroniques destinés aux
équipements informatiques, audio et vidéo.
IDE — Integrated Drive Electronics (électronique d'unité
intégrée) — Interface pour les périphériques de stockage
en masse dans laquelle le contrôleur est intégré à l'unité
de disque dur ou au lecteur de CD.
IEEE 1394 — Institute of Electrical and Electronics
Engineers, Inc. — Bus série à hautes performances utilisé
pour connecter des périphériques compatibles IEEE 1394
tels que les appareils numériques et les lecteurs DVD à
l'ordinateur.
intégré — Fait généralement référence aux composants
physiquement situés sur la carte système de l'ordinateur.
Synonyme d'incorporé.
IrDA — Infrared Data Association — Organisme en
charge de la création de normes internationales pour les
communications infrarouge.
IRQ — Interrupt Request (requête d'interruption) —
Passerelle électronique associée à un périphérique
spécifique et qui permet à ce dernier de communiquer
avec le microprocesseur. Une IRQ doit être attribuée à
chaque périphérique. Bien que deux périphériques
puissent partager la même affectation d'IRQ, ils ne
peuvent pas fonctionner simultanément.
ISP — Internet service provider (fournisseur d'accès
Internet) — Société qui vous permet d'accéder à son
serveur hôte afin de vous connecter directement à
Internet, d'envoyer et de recevoir des messages
électroniques et d'accéder à des sites Web. Le fournisseur
d'accès Internet (FAI) vous attribue un progiciel, un nom
d'utilisateur et des numéros de téléphone d'accès contre
un paiement.
K
Kb — Kilobit — Unité de données égale à 1024 bits.
Mesure de la capacité des circuits intégrés de mémoire.
kHz — Kilohertz — Unité de mesure de fréquence égale à
1000 Hz.
Ko — Kilo-octet — Unité de données égale à 1024 octets
mais souvent considérée comme étant égale à 1000 octets.
L
LAN — Local Area Network (réseau local) — Réseau
informatique couvrant une petite zone. Un réseau local
est généralement limité à un seul bâtiment ou à plusieurs
bâtiments avoisinants. Un LAN peut être connecté à un
autre réseau local sur n'importe quelle distance par des
lignes téléphoniques et des ondes radioélectriques pour
constituer un réseau étendu (WAN, Wide Area Network).176 Glossaire
LCD — Liquid Crystal Display (affichage à cristaux
liquides) — Technologie utilisée pour les écrans plats et
ceux des ordinateurs portables.
lecteur de CD — Lecteur utilisant la technologie optique
pour lire des données sur des CD.
lecteur de CD (CD player) — Logiciel utilisé pour lire les
CD musicaux. Le lecteur de CD affiche une fenêtre
comprenant des boutons qui permettent de lire un CD.
lecteur de CD-RW — Lecteur qui peut lire les CD et
écrire sur des disques réinscriptibles (CD-RW) et des
disques enregistrables (CD-R). On peut écrire plusieurs
fois sur des CD-RW, tandis que les CD-R ne permettent
qu'une seule inscription.
lecteur de CD-RW/DVD — Lecteur, parfois appelé
lecteur combiné, permettant de lire des CD et des DVD,
ainsi que d'écrire sur des disques réinscriptibles (CD-RW)
et des disques enregistrables (CD-R). On peut écrire
plusieurs fois sur des CD-RW, tandis que les CD-R ne
permettent qu'une seule inscription.
lecteur de disquette — Lecteur permettant de lire et
d'écrire sur des disquettes.
lecteur de DVD — Lecteur utilisant la technologie
optique pour lire des données sur les DVD et CD.
lecteur de DVD (DVD player) — Logiciel permettant de
visionner des films DVD. Le lecteur de DVD affiche une
fenêtre comprenant des boutons qui permettent de
visionner un film.
lecteur de DVD+RW — Lecteur permettant de lire les
DVD et la plupart des supports CD et d'écrire sur des
disques DVD+RW (DVD réinscriptibles).
lecteur optique — Lecteur qui utilise la technologie
optique pour lire ou écrire des données sur des CD, des
DVD ou des DVD+RW. Les lecteurs de CD, de DVD, de
CD-RW et les lecteurs combinés de CD-RW/DVD sont
des exemples de lecteurs optiques.
lecteur Zip — Lecteur de disquette à grande capacité
développé par Iomega Corporation qui utilise des
disquettes amovibles de 3,5 pouces appelées disquettes
Zip. Les disquettes Zip sont légèrement plus grandes que
les disquettes normales, à peu près deux fois plus épaisses
et peuvent contenir jusqu'à 100 Mo de données.
lecture seule — Données et/ou fichiers que vous pouvez
afficher, mais pas modifier ou supprimer. Un fichier peut
être en lecture seule si :
• Il se trouve sur une disquette physiquement protégée
en écriture, un CD ou un DVD.
• Il est situé sur un réseau dans un répertoire sur lequel
l'administrateur système n'a affecté des droits qu'à
certains individus.
LED — Light-Emitting Diode (diode
électroluminescente) — Composant électronique
émettant de la lumière pour indiquer l'état de l'ordinateur.
logiciel — Tout élément pouvant être stocké sous forme
électronique, comme des programmes ou des fichiers
informatiques.
logiciel antivirus — Programme spécialement conçu pour
identifier, isoler et/ou supprimer des virus de votre
ordinateur.
LPT — Line Print Terminal — Désignation d'une
connexion parallèle à une imprimante ou à un autre
périphérique parallèle.
M
Mb — Mégabit — Mesure de la capacité de la puce de
mémoire égale à 1024 Ko.
Mb/s — Mégabits par seconde — 1 million de bits par
seconde. Cette mesure est en règle générale utilisée pour
les vitesses de transmission des réseaux et des modems.
mémoire — Zone de stockage de données temporaire
dans l'ordinateur. Dans la mesure où les données en
mémoire ne sont pas permanentes, il vous est
recommandé d'enregistrer fréquemment vos fichiers
lorsque vous travaillez ainsi qu'avant d'éteindre
l'ordinateur. Un ordinateur peut avoir plusieurs formes de
mémoire : la mémoire RAM, la mémoire ROM et la
mémoire vidéo. Le terme mémoire est souvent synonyme
de mémoire RAM.
mémoire cache — Mécanisme de stockage à grande
vitesse spécifique. Il peut s'agir d'une section réservée de
la mémoire principale ou d'un périphérique de stockage
rapide indépendant. La mémoire cache permet
d'améliorer l'efficacité de nombreuses opérations du
microprocesseur.
mémoire cache L1 — Mémoire cache principale se Glossaire 177
trouvant dans le microprocesseur.
mémoire cache L2 — Mémoire cache secondaire pouvant
être externe au microprocesseur ou intégrée à
l'architecture de celui-ci.
mémoire vidéo — Mémoire composée de puces mémoire
dédiées aux fonctions vidéo. La mémoire vidéo est en
général plus rapide que la mémoire système. La quantité
de mémoire vidéo installée a principalement des effets sur
le nombre de couleurs qu'un programme peut afficher.
MHz — Mégahertz — Mesure de fréquence égale à
1 million de cycles par seconde. La vitesse des
microprocesseurs, des bus et des interfaces d'ordinateurs
est généralement mesurée en MHz.
microprocesseur — Puce d'ordinateur qui interprète et
exécute les instructions des programmes. Le
microprocesseur est parfois appelé processeur ou unité
centrale (UC).
Mo — Méga-octet — Unité de stockage de données égale
à 1 048 576 octets. 1 Mo est égal à 1024 Ko. Lorsque l'on
fait référence à la capacité de stockage d'un disque dur, le
terme est souvent arrondi à 1 000 000 octets.
mode de bureau étendu — Paramètre d'affichage
permettant d'utiliser un second moniteur. Appelé
également mode Double affichage.
mode Double affichage — Paramètre d'affichage qui
permet d'utiliser un second moniteur. Appelé également
mode de bureau étendu.
mode graphique — Mode vidéo qui peut être défini par le
nombre de pixels horizontaux x, le nombre de pixels
verticaux y et le nombre de couleurs z. Les modes
graphiques peuvent afficher un nombre illimité de formes
et de polices.
mode Veille — Mode d'économie d'énergie qui arrête
toutes les opérations inutiles de l'ordinateur pour
économiser de l'énergie.
mode vidéo — Mode qui décrit la façon dont le texte et
les graphiques sont affichés sur un moniteur. Les logiciels
à affichage graphique, tels que les systèmes d'exploitation
Windows, s'affichent en modes vidéo définis par le
nombre de pixels horizontaux x, le nombre de pixels
verticaux y et le nombre de couleurs z. Les logiciels à base
de caractères, comme les éditeurs de texte, s'affichent en
modes vidéo qui se définissent par le nombre de colonnes
x et par le nombre de rangées y.
module de mémoire — Petite carte à circuits imprimés,
contenant des puces de mémoire, qui se connecte à la
carte système.
module de voyage — Périphérique en plastique conçu
pour être inséré dans la baie modulaire de l'ordinateur
portable pour réduire le poids de ce dernier.
modem — Dispositif permettant à votre ordinateur de
communiquer avec d'autres ordinateurs par
l'intermédiaire de lignes téléphoniques analogiques. Il
existe trois types de modems : externe, carte PC et
interne. Généralement, vous utilisez un modem pour vous
connecter à Internet et échanger des messages
électroniques.
moniteur — Périphérique haute résolution ayant
l'apparence d'un téléviseur et affichant les données et les
images créées par l'ordinateur.
Mo/s — Méga-octets par seconde — 1 million d'octets par
seconde. Cette mesure est souvent utilisée pour les taux
de transfert de données.
ms — milliseconde — Mesure de temps égale à un
millième de seconde. Le temps d'accès des périphériques
de stockage est souvent mesuré en ms.
N
NIC — Voir carte réseau.
ns — nanoseconde — Mesure de temps égale à un
milliardième de seconde.
numéro de service — Étiquette de code-barres apposée
sur l'ordinateur permettant d'identifier ce dernier lorsque
vous accédez au support de Dell à l'adresse
support.dell.com ou lorsque vous appelez le service
clientèle ou le support technique de Dell.
NVRAM — Nonvolatile Random Access Memory
(mémoire rémanente à accès direct) — Type de mémoire
qui conserve des données lors de la mise hors tension de
l'ordinateur ou en cas de coupure d'alimentation
électrique. La mémoire NVRAM permet de conserver les
informations de configuration, comme la date, l'heure et
d'autres options de configuration du système que vous
pouvez définir.178 Glossaire
O
octet — Unité de stockage de données de base utilisée par
votre ordinateur. Un octet équivaut généralement à 8 bits.
onduleur — UPS, Uninterruptible Power Supply —
Source d'alimentation de secours utilisée lorsque
l'alimentation électrique est coupée ou descend à un
niveau de tension inacceptable. Un onduleur permet à
l'ordinateur de fonctionner pendant un temps limité en
cas de panne d'électricité. Les onduleurs sont en général
équipés d'un parasurtenseur et peuvent également offrir
des régulations de tension. Les petits systèmes UPS
proposent une alimentation par batterie de quelques
minutes pour vous permettre d'éteindre l'ordinateur
correctement.
P
Panneau de configuration — Utilitaire Windows
permettant de modifier les paramètres du système
d'exploitation et du matériel : les paramètres d'affichage,
par exemple.
papier peint — Motif ou image d'arrière-plan du bureau
Windows. Vous pouvez changer de papier peint en
utilisant le panneau de configuration Windows. Vous
pouvez également numériser votre photo préférée et en
faire un papier peint.
parasurtenseur — Dispositif qui empêche les sautes de
tension, pouvant survenir au cours d'orages, par exemple,
de pénétrer dans l'ordinateur par l'intermédiaire de la prise
secteur. Les parasurtenseurs ne protègent pas de la foudre
ou des baisses de tension qui se produisent lorsque la
tension descend à plus de 20 pour cent au-dessous du
niveau normal de tension de ligne à courant alternatif.
Les connexions réseau ne peuvent pas être protégées par
les parasurtenseurs. Vous devez toujours déconnecter le
câble de réseau du connecteur réseau pendant les orages.
partition — Zone de stockage physique sur un disque dur
affectée à une ou plusieurs zones de stockage logique
appelées unités logiques. Chaque partition peut contenir
plusieurs lecteurs logiques.
PCI — Peripheral Component Interconnect — Bus local
prenant en charge les chemins de données de 32 et
64 octets et fournissant un chemin de données haute
vitesse entre le microprocesseur et les périphériques
(vidéo, lecteur, réseau).
PCI Express — Type d'interface PCI qui accélère le taux
de transfert des données entre le processeur et ses
périphériques. Avec PCI Express, le taux de transfert des
données se situe entre 250 Mo/s et 4 Go/s. Si le jeu de
puces PCI Express et le périphérique tournent à des
vitesses différentes, ils fonctionnent à la vitesse la plus
basse.
PCMCIA — Personal Computer Memory Card
International Association — Organisme chargé d'établir
des normes pour les cartes PC.
périphérique — Matériel, tel qu'un lecteur de disque, une
imprimante ou un clavier, installé sur votre ordinateur ou
connecté à celui-ci.
pilote — Logiciel permettant au système d'exploitation
de contrôler un périphérique comme une imprimante. La
plupart des périphériques ne fonctionnent pas
correctement si le pilote approprié n'est pas installé sur
l'ordinateur.
pilote de périphérique — Voir pilote.
PIN — Personal Identification Number — Séquence de
nombres et/ou de lettres utilisée pour restreindre les accès
non autorisés aux réseaux informatiques ainsi qu'à
d'autres systèmes sécurisés.
PIO — Programmed Input/Output (Entrée/Sortie
programmée) — Méthode de transfert des données entre
deux périphériques utilisant le microprocesseur comme
partie du chemin de données.
pixel — Point unique sur un écran. Les pixels sont
disposés en rangs et en colonnes pour créer une image.
Une résolution vidéo, par exemple 800 sur 600, s'exprime
en nombre de pixels en largeur sur le nombre de pixels en
hauteur.
Plug-and-Play — Possibilité pour l'ordinateur de
configurer automatiquement les périphériques. La norme
Plug-and-Play permet d'installer et de configurer
automatiquement un périphérique et assure la
compatibilité avec le matériel existant si le BIOS, le
système d'exploitation et tous les périphériques sont
compatibles Plug-and-Play.
POST — Power-On Self-Test (autotest de démarrage) —
Programmes de diagnostic, chargés automatiquement par
le BIOS, qui effectuent des tests de base sur la plupart des
composants de l'ordinateur, comme la mémoire, les unités
de disque dur, etc. Si aucun problème n'est détecté au
cours de l'autotest de démarrage, l'ordinateur continue
son démarrage.Glossaire 179
programme — Logiciel permettant de traiter des données,
comme un tableur, un traitement de texte, une base de
données ou un jeu. Vous devez disposer d'un système
d'exploitation pour exécuter des programmes.
programme de configuration — Programme utilisé pour
installer et configurer le matériel et le logiciel. Le
programme setup.exe ou install.exe est généralement livré
avec la plupart des progiciels Windows. Il ne faut pas
confondre programme de configuration et programme de
configuration du système.
programme de configuration du système — Utilitaire qui
joue le rôle d'interface entre le matériel informatique et le
système d'exploitation. Le programme de configuration du
système vous permet de configurer les options
sélectionnables par l'utilisateur dans le BIOS, comme la
date et l'heure ou le mot de passe système. Ne modifiez les
paramètres de ce programme que si vous connaissez avec
exactitude les effets de chacun des paramètres sur
l'ordinateur.
protection en écriture — Fichiers ou supports ne pouvant
pas être modifiés. Utilisez la protection en écriture lorsque
vous voulez empêcher la modification ou la destruction
des données. Pour protéger contre l'écriture une disquette
de 3,5 pouces, faites glisser la languette de protection en
écriture en position ouverte.
PS/2 — Personal System/2 — Type de connecteur
permettant de relier un clavier, une souris ou un pavé
numérique compatible PS/2.
PXE — Pre-boot execution Environment — Norme WfM
(Wired for Management) permettant à des ordinateurs en
réseau sans système d'exploitation d'être configurés et
démarrés à distance.
R
raccourci —Icône permettant d'accéder rapidement à un
programme, fichier, dossier ou lecteur fréquemment
utilisé. En double-cliquant sur un raccourci placé sur
votre bureau Windows, vous pouvez ouvrir le dossier ou le
fichier correspondant sans avoir à le rechercher au
préalable. Les raccourcis ne modifient pas l'emplacement
des fichiers. Si vous supprimez un raccourci, le fichier
original n'est pas affecté. Vous pouvez également
renommer un raccourci.
RAID — Ensemble redondant de disques
indépendants — Méthode assurant la redondance des
données. Parmi les implémentations courantes de RAID :
RAID 0, RAID 1, RAID 5, RAID 10 et RAID 50.
RAM — Random-Access Memory — Zone principale de
stockage temporaire pour les instructions et les données
des programmes. Toute information stockée dans la RAM
est définitivement perdue lorsque vous éteignez
l'ordinateur.
résolution — Netteté et clarté d'une image produite par
une imprimante ou affichée sur un moniteur. Plus la
résolution est élevée, plus l'image est nette.
résolution vidéo — Voir résolution.
RFI — Radio Frequency Interference (interférence de
fréquence radio) — Interférence générée à des fréquences
radio caractéristiques, entre 10 kHz et 100 000 MHz. Les
fréquences radio se trouvent à l'extrémité inférieure du
spectre de fréquences électromagnétiques et sont plus
susceptibles de présenter des perturbations que les
radiations de plus haute fréquence, telles que les
infrarouges et la lumière.
ROM — Read-Only Memory (mémoire morte) —
Mémoire qui stocke des données et programmes que
l'ordinateur ne peut pas supprimer ou dans laquelle il ne
peut pas écrire. À la différence de la mémoire RAM, la
mémoire ROM conserve son contenu même après l'arrêt
de l'ordinateur. Certains programmes essentiels au
fonctionnement de l'ordinateur se trouvent dans la
mémoire morte.
RPM — Revolutions Per Minute (tours par minute) —
Mesure le nombre de rotations effectuées par minute. La
vitesse des disques durs est souvent mesurée en RPM.
RTC — Real Time Clock (horloge temps réel) — Horloge
alimentée par pile, située sur la carte système, qui
conserve la date et l'heure après l'arrêt de l'ordinateur.
RTCRST — Real Time Clock Reset — Cavalier sur la
carte système de certains ordinateurs pouvant souvent
être utilisé pour résoudre les problèmes.
S
sauvegarde — Copie d'un programme ou d'un fichier de
données sur une disquette, un CD ou un disque dur. Il est
prudent de sauvegarder régulièrement les fichiers de
données de votre disque dur.180 Glossaire
ScanDisk — Utilitaire Microsoft qui recherche les erreurs
présentes dans les fichiers et les dossiers, ainsi que sur la
surface du disque dur. ScanDisk s'exécute souvent lorsque
vous redémarrez l'ordinateur après un blocage.
SDRAM — Synchronous Dynamic Random-Access
Memory — Type de mémoire vive dynamique (DRAM)
synchronisée avec la vitesse d'horloge optimale du
microprocesseur.
SDRAM DDR — SDRAM à double débit de données —
Type de SDRAM doublant les cycles de données en rafale
et améliorant les performances du système.
SDRAM DDR2 — SDRAM à double débit de
données 2 — Type de SDRAM DDR qui utilise une pré-
extraction de 4 bits et d'autres modifications
architecturales pour passer la vitesse de la mémoire à plus
de 400 MHz.
segmentation des données — Technique de répartition
des données sur plusieurs lecteurs de disque. La
segmentation des données peut accélérer les opérations de
récupération des données sur les disques. Les ordinateurs
utilisant la segmentation des données permettent
généralement à l'utilisateur de sélectionner la taille des
unités de données ou la taille des segments.
séquence d'amorçage — Précise l'ordre des périphériques
à partir desquels l'ordinateur tente de s'amorcer.
station d'accueil — Voir APR.
SIM — Module d'identité d'abonné. Une carte SIM
contient une micropuce qui crypte les transmissions
vocales et de données. Les cartes SIM peuvent être
utilisées avec des téléphones ou des ordinateurs portables.
sortie TV S-vidéo — Connecteur permettant de relier des
périphériques audio numériques ou un téléviseur à
l'ordinateur.
souris — Dispositif de pointage qui contrôle le
mouvement du curseur à l'écran. Il suffit de faire glisser la
souris sur une surface plane et rigide pour déplacer le
pointeur ou le curseur à l'écran.
S/PDIF — Sony/Philips Digital Interface — Format de
fichier de transfert audio permettant de transférer des
données audio entre deux fichiers sans conversion
préalable au format analogique, ce qui pourrait dégrader
la qualité du fichier.
Strike Zone™ — Zone renforcée de la base de la plateforme qui offre une protection au disque dur en servant
d'amortisseur en cas de choc résonnant ou de chute de
l'ordinateur (allumé ou éteint).
SVGA — Super-Video Graphics Array — Norme utilisée
pour les cartes et les contrôleurs vidéo. Les résolutions
SVGA types sont de 800 sur 600 et 1024 sur 768.
Le nombre de couleurs et la résolution affichés par un
programme dépendent des capacités du moniteur, du
contrôleur vidéo et de ses pilotes, ainsi que de la quantité
de mémoire vidéo installée dans l'ordinateur.
SXGA — Super-extended Graphics Array — Norme
utilisée pour les cartes et les contrôleurs vidéo qui prend
en charge les résolutions allant jusqu'à 1280 sur 1024.
SXGA+ — Super-extended Graphics Array plus —
Norme utilisée pour les cartes et les contrôleurs vidéo qui
prend en charge les résolutions allant jusqu'à 1400 sur
1050.
T
TAPI — Telephony Application Programming
Interface — Permet aux programmes Microsoft Windows
de fonctionner avec de nombreux périphériques de
téléphonie (voix, données, télécopie et vidéo).
taux de rafraîchissement — Fréquence, mesurée en Hz, à
laquelle les lignes horizontales de l'écran sont rechargées
(on parle parfois aussi de fréquence verticale). Plus le taux
de rafraîchissement est élevé, moins le scintillement vidéo
est perceptible à l'œil nu.
Technologie sans fil Bluetooth® — Norme technologique
sans fil pour les périphériques de mise en réseau de courte
portée (9 m [29 pieds]) permettant aux périphériques
activés de se reconnaître automatiquement.
U
UMA — allocation de mémoire unifiée — Mémoire
système allouée de manière dynamique à la mémoire
vidéo.Glossaire 181
USB — Universal Serial Bus — Interface matérielle pour
les périphériques lents comme un clavier, une souris, une
manette de jeu, un scanner, un jeu de haut-parleurs, une
imprimante, des périphériques large bande (DSL et
modems par câble), des périphériques d'imagerie ou de
stockage compatibles USB. Les périphériques sont
branchés directement à un support à 4 broches de votre
ordinateur, ou à un concentrateur à plusieurs ports qui se
raccorde à votre ordinateur. Les périphériques USB
peuvent être connectés et déconnectés lorsque
l'ordinateur est sous tension et peuvent également être
connectés en guirlande.
UTP — Unshielded Twisted Pair (paire torsadée non
blindée) — Type de câble utilisé dans la plupart des
réseaux téléphoniques et dans certains réseaux
informatiques. Les paires de câbles non blindés sont
torsadées afin de les protéger contre les interférences
électromagnétiques et sont utilisées à la place des câbles
comportant une gaine métallique autour de chaque paire
de fils.
UXGA — Ultra-extended Graphics Array — Norme
utilisée pour les cartes et les contrôleurs vidéo qui prend
en charge les résolutions allant jusqu'à 1600 sur 1200.
V
V — Volt — Unité de mesure de la puissance électrique
ou de la force électromotrice. Un V est mesuré sur une
résistance de 1 ohm lorsqu'elle est traversée par un
courant de 1 ampère.
virus — Programme conçu pour nuire ou détruire les
données stockées sur votre ordinateur. Un virus se déplace
d'un ordinateur à un autre par l'intermédiaire d'une
disquette infectée, d'un logiciel téléchargé à partir
d'Internet ou de pièces jointes à des messages
électroniques. Lorsque vous démarrez un programme
infecté, le virus intégré démarre lui aussi.
Un type courant de virus est le virus d'amorçage, qui est
stocké dans les secteurs d'amorçage d'une disquette. Si
vous laissez la disquette dans le lecteur lorsque vous
éteignez puis rallumez l'ordinateur, celui-ci est infecté lors
de la lecture des secteurs d'amorçage de la disquette, à la
recherche du système d'exploitation. Si l'ordinateur est
infecté, le virus d'amorçage peut se reproduire sur toutes
les disquettes lues ou écrites sur cet ordinateur jusqu'à son
éradication.
vitesse de bus — Vitesse, en MHz, qui indique la rapidité
avec laquelle un bus peut transférer des informations.
vitesse d'horloge — Vitesse, en MHz, qui indique la
rapidité avec laquelle les composants de l'ordinateur
connectés au bus système fonctionnent.
W
W — Watt — Mesure du courant électrique. Un watt est
1 ampère de courant dont le débit est de 1 volt.
Wh — Wattheure — Unité de mesure utilisée
couramment pour indiquer la capacité approximative
d'une batterie. Par exemple, une batterie de 66 Wh peut
fournir 66 W de courant pendant 1 heure ou 33 W
pendant 2 heures.
WLAN — réseau local sans fil. Ensemble d'ordinateurs
interconnectés qui communiquent entre eux par les ondes
aériennes et qui utilisent des points d'accès ou des
routeurs pour fournir un accès Internet.
WWAN — réseau étendu sans fil. Réseau de données haut
débit sans fil utilisant la technologie cellulaire et couvrant
une zone géographique plus grande que celle couverte par
le WLAN.
WXGA — wide-aspect extended graphics array — Norme
utilisée pour les cartes et les contrôleurs vidéo qui prend
en charge les résolutions allant jusqu'à 1280 sur 800.
X
XGA — Extended Graphics Array —Norme utilisée pour
les cartes et les contrôleurs vidéo qui prend en charge les
résolutions allant jusqu'à 1024 sur 768.182 Glossaire
Z
ZIF — Zero Insertion Force — Type de connecteur ou de
support permettant l'installation ou le retrait d'une puce
sans forcer sur la puce ou le support.
Zip — Format courant de compression des données. Les
fichiers compressés au format Zip sont appelés fichiers
Zip et portent en général l'extension .zip. Un type spécial
de fichier zippé/compressé est un fichier à extraction
automatique, dont l'extension est .exe. Pour décompresser
un fichier à extraction automatique, double-cliquez
dessus.
zone de notification — Voir barre d'état système.Index 183
Index
A
Aide QuickSet, 14
alimentation
filtres de ligne, 30
mode Mise en veille
prolongée, 40
mode Veille, 40
modes de gestion de
l'alimentation, 38
parasurtenseurs, 30
périphériques de
protection, 30
problèmes, 97
UPS, 30
alimentation sans
interruption. Voir UPS
Assistant Transfert de fichiers
et de paramètres, 26
assistants
Assistant Compatibilité des
programmes, 94
Assistant Transfert de fichiers
et de paramètres, 26
audio numérique S/PDIF
activation, 62
audio. Voir son
B
baie modulaire
permutation des
périphériques, 116
vis de fixation de
périphérique, 116
barre des tâches
icône QuickSet, 133
barres d'outils
réglage de la taille, 133
batterie
chargement, 41
description, 23
indicateur de charge, 38
jauge, 38
performances, 37
préservation de
l'alimentation, 39
retrait, 41
stockage, 42
vérification de la charge, 38
bouton d'éjection du plateau
du lecteur optique
description, 21
boutons de commande
multimédia
bouton Dell MediaDirect, 46
description, 17
lecture/pause/Dell
MediaDirect, 17
C
cache de la charnière
retrait, 127
cache du modem
description, 24
cache du module de
mémoire, 23
caches
ExpressCard, 65
retrait, 67, 70
caractéristiques, 157
carnet, 136
carte dotée de la technologie
sans fil Bluetooth
installation, 130
voyant d'état de l'appareil, 18
cartes ExpressCard
caches, 67
installation, 65
retrait, 67
cartes mémoire multimédia
caches, 70
installation, 69
logements, 68
retrait, 70
technologie CardBus, 68
types, 68
casque Dolby,
configuration, 62184 Index
184 Index
CD
lecture, 43
système d'exploitation, 14
CD Drivers and Utilities, 103
CD Operating System, 14
CD ResourceCD
Dell Diagnostics, 81, 84
Centre d'aide et de
support, 14
clavier
description, 17
pavé numérique, 33
problèmes, 92
raccourcis, 34
retrait, 129
conflits
incompatibilités logicielles et
matérielles, 104
conflits de requête
d'interruption, 104
connecteur de sortie TV Svidéo
description, 20
connecteur IEEE 1394
description, 20
problèmes, 92
connecteur modem
description, 21
connecteur réseau
description, 22
connecteur vidéo
description, 22
connecteurs audio, 20
connecteurs USB
description, 21-22
connexion
périphérique audio, 50
réseau large bande mobile, 76
téléviseur, 50
WLAN, 72
connexion Internet
à propos de, 25
configuration, 25
options, 25
consignes de sécurité, 11
contrat de licence pour
utilisateur final, 11
D
Dell
contacter, 137, 170
politique de support, 169
site de support, 13
Dell Diagnostics
à propos de, 81, 84
démarrage à partir du disque
dur, 81
Démarrage de Dell Diagnostics
à partir du CD Drivers and
Utilities, 82
Dell MediaDirect, 17
à propos de, 46
problèmes, 95
dépannage
Centre d'aide et de support, 14
conflits, 104
Dell Diagnostics, 81, 84
Dépanneur des conflits
matériels, 104
problèmes de clavier
externe, 92
restauration de l'état de
fonctionnement précédent
de l'ordinateur, 105
Dépanneur des conflits
matériels, 104
diagnostics
Dell, 81, 84
disque dur
description, 24
problèmes, 86
remplacement, 113
retour à Dell, 115
documentation
contrat de licence pour
utilisateur final, 11
en ligne, 13
ergonomie, 11
garantie, 11
guide d'information sur le
produit, 11
réglementaire, 11
sécurité, 11
DVD
lecture, 43
E
écran
basculement de l'image
vidéo, 31
description, 16
réglage de la luminosité, 31
réglage de la taille des barres
d'outils, 133Index 185
réglage de la taille des
icônes, 133
résolution, 31
écran. Reportez-vous à
moniteur
emplacement pour câble de
sécurité
description, 19
étiquette Microsoft
Windows, 12
étiquettes
Microsoft Windows, 12
numéro de service, 12
ExpressCard
caches, 65
étendue, 65
logements, 65
technologie CardBus, 65
types, 65
F
fichier d'aide
Centre d'aide et de support de
Windows, 14
fixation
vis de fixation de
périphérique, 116
G
gestion de l'alimentation
préservation de l'alimentation
par batterie, 39
QuickSet, 133
réglage des paramètres, 133
guide d'information sur le
produit, 11
H
haut-parleur
problèmes, 99
volume, 99
haut-parleurs
description, 17
I
icônes
réglage de la taille, 133
imprimante
câble, 29
configuration, 28
connexion, 28
problèmes, 98
USB, 29
informations
réglementaires, 11
informations relatives à
l'ergonomie, 11
informations sur la
garantie, 11
L
large bande mobile (WWAN)
connexions réseau, 76
lecteur de carte mémoire
multimédia 5 en 1, 68
lecteur de CD
problèmes, 85
lecteur de CD-RW
problèmes, 85
lecteur de disquette
branchement sur un
connecteur USB, 21-22
lecteur de DVD
problèmes, 85
lecteur optique
description, 21
lecteurs
problèmes, 85
Voir disque dur
lecture de CD, 43
lecture de DVD, 43
log, 104
logement de carte
ExpressCard
description, 20
logiciel
problèmes, 95
logiciel de suivi
protection de votre
ordinateur, 80
logiciel espion, 87, 96
logiciels
problèmes, 94
loquet de fermeture de la baie
de batterie, 23
loquet de l'écran, 18
luminosité
réglage, 31186 Index
186 Index
M
matériel
conflits, 104
Dell Diagnostics, 81, 84
mémoire
ajout, 118, 120
installation, 117
retrait, 118, 121
messages
erreur, 87
messages d'erreur, 87
mode Mise en veille
prolongée, 40
mode Veille
à propos de, 40
modem
installation, 123
moniteur
basculement de l'image
vidéo, 31
problèmes, 100
mots de passe
à propos de, 79
oubli, 80
N
nettoyage
tablette tactile, 167
numéro de service, 12
O
ordinateur
blocage, 94
blocages, 94
caractéristiques, 157
faibles performances, 87, 96
ne répond plus, 94
protection, 80
restauration de l'état de
fonctionnement
précédent, 105
ordinateur perdu, 80
ordinateur volé, 80
P
pavé
numérique, 33
PC Restore, 107
périphérique audio
activation, 62
connexion, 50
pilotes
à propos de, 102
identification, 102
réinstallation, 102
problème
scanner, 98
problèmes
alimentation, 97
blocage de l'ordinateur, 94
blocages, 94
blocages de l'ordinateur, 94
blocages répétés de
l'ordinateur, 94
clavier, 92
compatibilité des programmes
et de Windows, 94
conditions du voyant
d'alimentation, 97
connecteur IEEE 1394, 92
Dell Diagnostics, 81, 84
Dell MediaDirect, 95
disque dur, 86
écran bleu, 94
faibles performances de
l'ordinateur, 87, 96
haut-parleurs, 99
imprimante, 98
l'ordinateur ne répond plus, 94
lecteur de CD, 85
lecteur de CD-RW, 85
lecteur de DVD, 85
lecteurs, 85
logiciel, 94-95
logiciel espion, 87, 96
logiciels, 94
messages d'erreur, 87
non démarrage de
l'ordinateur, 94
réseau, 96
restauration de l'état précédent
du système
d'exploitation, 105
support technique, 169
vidéo et moniteur, 100
programme de configuration
du système
affichage, 165
écrans, 165
options fréquemment
utilisées, 166
protection de votre
ordinateur, 79Index 187
Q
QuickSet, 34, 46, 133
R
RAM. Voir mémoire
réinstallation
Windows XP, 105
réseau
problèmes, 96
QuickSet, 133
résolution
réglage, 31
Restauration du système, 105
restauration du système, 105
S
sans fil
marche/arrêt, 133
scanner
problèmes, 98
séquence d'amorçage, 166
site Web de support, 13
Site Web Premier Support de
Dell, 11
son
problèmes, 99
volume, 99
support
contacter Dell, 137, 170
politique, 169
support technique
politique, 169
système d'exploitation
CD, 14
réinstallation, 14
réinstallation de Windows
XP, 105
T
tablette tactile
description, 17
nettoyage, 167
personnalisation, 36
technologie CardBus
cartes mémoire
multimédia, 68
ExpressCard, 65
téléviseur
connexion, 50
transfert d'informations vers
un nouvel ordinateur, 26
U
UPS, 30
V
ventilateur
description, 19, 24
Vérifier disque, 86
vidéo
problèmes, 100
vis de fixation de
périphérique
à propos de, 116
volume
réglage, 99
voyager avec l'ordinateur
avion, 136
conseils, 136
emballage, 135
étiquette d'identification, 135
voyant d'alimentation
conditions, 97
voyants d'état de l'appareil, 16
voyants d'état du clavier
description, 18
W
Windows XP
Assistant Compatibilité des
programmes, 94
Assistant Transfert de fichiers
et de paramètres, 26
Centre d'aide et de support, 14
Dépanneur des conflits
matériels, 104
mode Mise en veille
prolongée, 40
mode Veille, 40
réinstallation, 14, 105
Restauration des pilotes de
périphériques, 103
Restauration du système, 105
restauration du système, 105
WLAN, 71188 Index
188 Index
Dellt Tower UPS
500W, 1000W, and 1920/1500W
Getting Started With
Your System
Démarrage avec votre système
Erste Schritte Mit Ihrem System
Начало работы c вашей системой
Inicio de su sistema
系统使用 入门指南
系統使用 入門指南
사용자의 시스템 시작하기
はじめに システムについて
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.comDellt Tower UPS
500W, 1000W, and 1920/1500W
Getting Started
With Your System
Démarrage avec votre système
Erste Schritte Mit Ihrem System
Начало работы c вашей системой
Inicio de su sistema
系统使用 入门指南
系統使用 入門指南
사용자의 시스템 시작하기
はじめに システムについて
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.comNotes and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your software.
CAUTION: A CAUTION indicates a potentially hazardous situation which, if not avoided, may result in minor or
moderate injury or in property damage incidents.
WARNING: A WARNING indicates a potentially hazardous situation which, if not avoided, could result in death or
injury.
DANGER: A DANGER indicates an imminently hazardous situation which, if not avoided, will result in death or
serious injury.
DANGER: Observe the following instruction to help prevent an imminently hazardous situation which, if not
avoided, will result in death or serious injury:
S This UPS contains LETHAL VOLTAGES. All repairs and service should be performed by
AUTHORIZED SERVICE PERSONNEL ONLY. There are NO USER SERVICEABLE PARTS
inside the UPS.
Information in this document is subject to change without notice.
E 2009 Dell Inc. All rights reserved.
Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell and the DELL logo are trademarks of Dell Inc.; Phillipsis a registered trademark of Phillips Screw
Company.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their
products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
July 2009System Features |
1
System Features
Providing outstanding performance and reliability, the UPS's unique benefits include:
S Buck and Boost voltage regulation that ensures regulated voltage to your load by correcting voltage
fluctuations.
S Start-on-battery capability for powering up the UPS even if utility power is not available.
S Extended runtime with an optional External Battery Module (EBM) for 1000–1920W UPS
models.
S Two standard communication ports (USB and DB-9 serial port).
S Optional Dell Network Management Card with enhanced communication capabilities for
increased power protection and control.
S Network transient protector that guards your network communications equipment from surges.
S Advanced power management with the Dell UPS Management Software for graceful shutdowns
and power monitoring.
S Sequential shutdown and load management through separate receptacle groups called load
segments.
S Firmware that is easily upgradable without a service call.
S Backed by worldwide agency approvals.2 |
Finding Information
Finding Information
CAUTION: The Safety, Environmental, and Regulatory Information document provides important safety and
regulatory information.
What are You Looking For? Find It Here
S The user's guide for my UPS
S The user's guide for the Dell Network Management
Card
S Dell UPS Management Software
NOTE:Documentation and software updates can be
found at support.dell.com.
Dell UPS Disc
S Specifications
S How to configure UPS settings
S How to troubleshoot and solve problems
Dell UPS User's Guide
The user's guide is available on the Dell UPS disc and
on support.dell.com.
S Safety instructions
S Regulatory information
S Recycling information
Safety, Environmental, and Regulatory Information
S Warranty information
S Terms and Conditions (U.S. only)
S End User License Agreement
Dell Warranty and Support Information
S Support information Dell Support Website — support.dell.com
NOTE: Select your region or business segment to view
the appropriate support site.Installation and Startup |
3
Installation and Startup
CAUTION: Before performing the procedures in this document, read and follow the safety instructions and
important regulatory information in your Safety, Environmental, and Regulatory Information document.
CAUTION: The cabinet is heavy [500W: 11.6 kg (25.6 lb); 1000W: 18.3 kg (40.3 lb); 1920/1500W: 30.5 kg (67.2 lb)].
Use caution to unpack and move the cabinet.
This section describes the steps to set up your system for the first time.
Unpacking the System
1 Unpack your system and identify each item.
2 Discard or recycle the packaging in a responsible manner, or store it for future use.4 |
Installation and Startup
Identifying the UPS
This section shows a front and rear panel of the Dell Tower UPS. Refer to the Dell Line-Interactive
Tower UPS 500W, 1000W, and 1920/1500W User's Guide for all rear panel details.
Cover Latch
Cover Latch
LCD Panel
Scroll Button (Up or Back)
Select Button
Scroll Button (Down or Forward)
Figure 1. The Dell Tower UPS
Communication Port
Six 5-15 Receptacles
(Load Segment 1)
Network Transient
Protector
USB Port
UPS Communication Bay
On/Off Button
IEC-C14 Input
Connector
Two 5-15 Receptacles
(Load Segment 2)
EBM Connector
Figure 2. UPS Rear Panel (1000W, 120V Rear Panel)Installation and Startup |
5
Removing the UPS Front Cover
3 Remove the UPS front cover.
Push the two cover latches to release the front cover and pull up.
Removing the Battery Cover
4 Unscrew the thumbscrew on the the metal battery cover and lift up to remove the cover.6 |
Installation and Startup
Connecting the Internal Battery Connector
5 Connect the internal battery connector.
6 Replace the metal battery cover.
Torque the screw to 0.7 Nm (6.2 lb in).
7 Replace the UPS front cover.Installation and Startup |
7
Connecting the Equipment
9
Connect equipment to UPS
Connect communication cable from
computer to UPS (optional)
8
8 If you plan to use Dell UPS Management Software, connect your computer to the USB port or
RS-232 port using the supplied cable.
9 Plug the equipment to be protected into the UPS output receptacles, but do not turn on the
protected equipment.
NOTE: Verify that the total equipment ratings do not exceed the UPS capacity to prevent an overload alarm.8 |
Installation and Startup
Connecting the Power Cord
10 Verify that the power input to the UPS has adequate upstream overcurrent protection:
Table 1. Minimum Upstream Circuit Breaker Rating
UPS Output Power 120V 208V 230V
500W 15A — 15A
1000W 15A — 15A
1500W (at 100V)
1920W
20A — 15A
11 Plug the UPS power cord into a power outlet.
NOTE: For 1920/1500W models. There are two power cords in the box, one with BSMI and PSE certified
markings that can be used in Taiwan and Japan, another cord is for regions other than Taiwan and Japan.Installation and Startup |
9
Starting the UPS
12 Press the button on the UPS rear panel.
Completing the Startup
13 Verify that the Normal icon appears on the UPS status summary screen, indicating that the
UPS is operating normally and any loads are powered.
14 On the UPS status summary screen, press the button to check for active alarms or notices.
Resolve any active alarms before continuing. See “Troubleshooting” in the Dell Line-Interactive
Tower UPS 500W, 1000W, and 1920/1500W User's Guide.
If there are no active alarms, a “No Active Alarms” message appears.
15 To change other factory-set defaults, see “Operation” in the Dell Line-Interactive Tower UPS
500W, 1000W, and 1920/1500W User's Guide.10 |
Installation and StartupOnduleur Tour Dellt
500 W, 1000 W et 1920/1500 W
Démarrage
avec votre système
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.comRemarques et avertissements
REMARQUE : Une REMARQUE indique des informations importantes qui vous aident à mieux utiliser votre logiciel.
DANGER : Un DANGER indique une situation dangereuse imminente qui, si elle n'est pas évitée, provoquera la
mort ou une blessure grave.
AVERTISSEMENT : Un AVERTISSEMENT indique une situation dangereuse potentielle qui, si elle n'est pas évitée,
pourrait provoquer la mort ou une blessure.
ATTENTION : Une ATTENTION indique une situation dangereuse potentielle qui, si elle n'est pas évitée, peut
provoquer une blessure mineure ou légère ou des dommages matériels.
DANGER : Respectez les instructions suivantes pour aider à empêcher une situation dangereuse imminente qui, si
elle n'est pas évitée, peut provoquer la mort ou des blessures graves :
S Cet onduleur contient desTENSIONS MORTELLES. Toutes les réparations et tous
les entretiens devront être effectués UNIQUEMENT PAR UN PERSONNEL
D’ENTRETIEN AGRÉÉ. Aucune pièce à l’intérieur de cet onduleur NE PEUT
ÊTRE ENTRETENUE PAR L’UTILISATEUR.
Les informations dans ce document sont soumises à modifications sans préavis.
E 2009 Dell Inc. Tous droits réservés.
La reproduction de quelque manière que ce soit sans autorisation écrite de Dell Inc. est strictement interdite.
Marques commerciales utilisées dans ce texte : Dell et le logo DELL sont des marques commerciales de Dell Inc. ; Phillips est une marque
déposée de Phillips Screw Company.
D’autres marques commerciales et noms commerciaux peuvent être utilisés dans ce document pour se référer à des entités revendiquant les
marques et les noms ou leurs produits. Dell Inc. rejette tout intérêt propriétaire dans les marques commerciales et les noms commerciaux ne
lui appartenant pas.
Julliet 2009Caractéristiques du système |
13
Caractéristiques du système
Offrant une fiabilité et des performances remarquables, les avantages uniques de l'onduleur
comprennent :
S La régulation de tension Buck and Boost qui assure une tension régulée à votre charge en
corrigeant les fluctuations de tension.
S La capacité de démarrage-sur-batterie pour alimenter l'onduleur même si le courant du secteur
n'est pas disponible.
S Temps d'exécution prolongé avec un Module de batterie externe (EBM) en option pour les
modèles d'onduleur 1000–1920 W.
S Deux ports de communication standards (port série DB-9 et USB).
S Carte de gestion de réseau Dell optionnelle avec capacités de communication améliorées pour une
protection et un contrôle accrus de l'alimentation électrique.
S Protecteur de réseau contre les phénomènes transitoires qui protège votre équipement de
communication réseau contre les surtensions.
S Gestion avancée de l'alimentation électrique avec le Logiciel de gestion d'onduleur Dell pour des
coupures progressives et une surveillance de l'alimentation.
S Arrêt séquentiel et gestion de charge par des groupes de prises séparés appelés « segments de
charge ».
S Micrologiciel qui peut être facilement mis à niveau sans appeler le service technique.
S Soutenu par des approbations d'organismes dans le monde entier.14 |
Trouver des informations
Trouver des informations
ATTENTION! Le document Informations sur la sécurité, l'environnement et la réglementation fournit des
informations importantes sur la sécurité et la réglementation.
Adresses complètes sur CD ROM, téléphone, Fax, emails, nom du dirigeant, etc. Exports illimités ! CLIQUEZ ICI