FS S3150-8T2FP PoE+ Series Switches 8-Port Gigabit Ethernet User Guide
- June 3, 2024
- FS
Table of Contents
FS S3150-8T2FP PoE+ Series Switches 8-Port Gigabit Ethernet
System Management Configuration
File Management Configuration
Managing the File System
The filename in flash is no more than 20 characters and filenames are case
insensitive.
Commands for the File System
The boldfaces in all commands are keywords. Others are parameters. The content
in the square brakcet “[ ]” is optional.
Command | Purpose |
---|
format
|
Formats the file system and delete all data.
dir [filename]
| Displays files and directory names. The file name in the symbol“[]” means to display files starting with several letters. The file is displayed in the following format:
Index number file name
delete filename
|
Deletes a file. The system will prompt if the file does not exist.
md dirname
| Creates a directory.
rd dirname
|
Deletes a directory. The system will prompt if the directory is not existed.
more filename
| Displays the content of a file. If the file content cannot be displayed by one page,
it will be displayed by pages.
cd
|
Changes the path of the current file system.
pwd
|
Displays the current path.
Starting Up from a File Manually
monitor#boot flash
The command is to start a switch software in the flash, which may contain
multiple switch softwares.
Description
Parameters | Description |
---|
Flash
| ****
A file name stored in the flash memory
local_filename
| ****
File name, the user must enter the file name
Example
monitor#boot flash switch.bin
Updating Software
User can use this command to download switch system software locally or
remotely to obtain version update or the custom-made function version (like
data encryption and so on).
There are two ways of software update in monitor mode.
Through TFTP protocol
monitor#copy tftp flash: [ip_addr] The command is to copy file from the tftp
server to the flash in the system. After you enter the command, the system
will prompt you to enter the remote server name and the remote filename.
Description
Parameters or Keywords | Description |
---|
flash
| ****
The memory device is flash memory.
ip_addr
| ****
Means the IP address of the TFTP server. If this parameter is not designated, you are prompted to enter the IP address after the copy command is run.
Example
The following example shows a main.bin file is read from the server, written
into the switch and changed into the name switch. Bin.
monitor#copy tftp flash
Prompt:Source file name[]?main.bin
Prompt:Remote-server ip address[]?192.168.20.1
Prompt:Destination file name[main.bin]?switch.bin
please wait …
##################################################################################################################################################################################################################################################################################################################################################################################
TFTP:successfully receive 3377 blocks ,1728902 bytes
monitor#
Updating Configuration
The switch configuration is saved as a file, the filename is startup-config.
You can use commands similar to software update to update the configuration.
1. Through TFTP protocol
monitor#copy tftp flash startup-config
Using ftp to Perform the Update of Software and Configuration
switch #copy ftp {flash|cf} [ip_addr|option] Use ftp to perform the update of
software and configuration in formal program management. Use the copy command
to download a file from ftp server to switch, also to upload a file from file
system of the switch to ftp server. After you enter the command, the system
will prompt you to enter the remote server name and remote filename.
copy{ftp:[[[//login-name:[login-
password]@]location]/directory]/filename}|{flash<:filename>|cf<:filename>}
{{flash<:filename>|cf<:filename>}|ftp:[[[//login-name: [login-
password]@]location] /directory]/filename}
Description
Parameters | Description |
---|
login-name
| Username of the ftp server If this parameter is not designated,
you are prompted to enter the IP address after the copy command is run.
- login-password Password of the ftp server If this parameter is not designated, you are prompted to enter the IP address after the copy command is run.
- nchecksize The size of the file is not checked on the server.
- blksize Size of the data transmission block (Default value: 512)
- ip_addr IP address of the ftp server If this parameter is not designated, you are prompted to enter the IP address after the copy command is run.
- active Means to connect the ftp server in active mode.
- passive Means to connect the ftp server in passive mode.
- type Set the data transmission mode (ascii or binary)
Example
The following example shows a main.bin file is read from the server, written
into the switch and changed into the name switch. Bin. switch#copy ftp flash
Prompt: ftp user name[anonymous]? login-nam
Prompt:ftp user password[anonymous]? login-password
Prompt:Source file name[]?main.bin
Prompt:Remote-server ip address[]?192.168.20.1
Prompt:Destination file name[main.bin]?switch.bin
Or
switch#copy ftp://login-nam:login-password@192.168.20.1/main.bin
flash:switch.bin
#######################################################################################################################################
FTP: successfully receive 3377 blocks ,1728902 bytes
config#
Note:
- When the ftp server is out of service, the wait time is long. If this problem is caused by the tcp timeout time (the default value is 75s), you can configure the global command ip tcp synwait-time to modify the tcp connection time. However, it is not recommended to use it.
- When you use ftp in some networking conditions, the rate of data transmission might be relatively slow. You can properly adjust the size of the transmission block to obtain the best effect. The default size is 512 characters, which guarantee a relatively high operation rate in most of the networks.
Basic System Management Configuration
Configuring Ethernet IP Address
monitor#ip address
This command is to configure the IP address of the Ethernet. The default IP
address is 192.168.0.1, and the network mask is 255.255.255.0.
Description
Parameters | Description |
---|
ip_addr
| ****
IP address of the Ethernet
net_mask
| ****
Mask of the Ethernet
Example
monitor#ip address 192.168.1.1 255.255.255.0
Setting the Default Route.
monitor#ip route default
This command is used to configure the default route. You can configure only
one default route.
Description
Parameters | Description |
---|
ip_addr
| ****
IP address of the gateway
Example
monitor#ip route default 192.168.1.1
Using ping to Test Network Connection State
monitor#ping
This command is to test network connection state.
Description
Parameters | Description |
---|
ip_address
| ****
Stands for the destination IP address
Example
monitor#ping 192.168.20.100
PING 192.168.20.100: 56 data bytes
64 bytes from 192.168.20.100: icmp_seq=0. time=0. ms 64 bytes from
192.168.20.100: icmp_seq=1. time=0. ms 64 bytes from 192.168.20.100:
icmp_seq=2. time=0. ms 64 bytes from 192.168.20.100: icmp_seq=3. time=0. ms
—-192.168.20.100 PING Statistics—-
4 packets transmitted, 4 packets received, 0% packet loss round-trip (ms)
min/avg/max = 0/0/0
Terminal Configuration
VTY Configuration Overview
The system uses the line command to configure terminal parameters. Through the
command, you can configure the width and height that the terminal displays.
Configuration Tasks
The system has four types of lines: console, aid, asynchronous and virtual
terminal. Different systems have different numbers of lines of these types.
Refer to the following software and hardware configuration guide for the
proper configuration.
Line Type | Interface | Description | Numbering |
---|
CON(CTY)
|
Console
|
To log in to the system for configuration.
|
0
VTY
|
Virtual and asynchronous
|
To connect Telnet, X.25 PAD, HTTP and Rlogin of synchronous ports (such as Ethernet and serial port) on the system
|
32 numbers
starting from 0
Relation Ship between Line and Interface
Relationship between synchronous interface and VTY line
The virtual terminal line provides a synchronous interface to access to the
system. When you connect to the system through VTY line, you actually connect
to a virtual port on an interface. For each synchronous interface, there can
be many virtual ports.
For example, if several Telnets are connecting to an interface (Ethernet or
serial interface).
You need to do the following steps for the VTY configuration:
(1) (1) Log in to the line configuration mode.
(2) (2) Configure the terminal parameters.
For VTY configuration, refer to the Part “VTY configuration example”.
Monitor and Maintenance
Run show line to check the VTY configuration.
VTY Configuration Example
It shows how to cancel the limit of the line number per screen for all VTYs
without more prompt: Switch_config# line vty 0 31
Switch_config_line# length 0
SSH Configuration Commands
SSH Overview
SSH Server
SSH client can provide a secure and encrypted communication link throughSSH
server and other devices. This connection has the same functions as those of
Telnet. SSH server supports the following encryption algorithms: des, 3des and
blowfish.
SSH Client
SSH client runs on the basis of the SSH protocol, providing authentication and
encryption. Due to the application of authentication and encryption,SSH client
allows to establish secure communication in unsecure network environment
between communication devices or between other devices that supportSSH server.
SSH client supports the following encryption algorithms: des, 3des and
blowfish.
Attribute Realization
SSH server and SSH client support SSH 1.5. Both of them only support the shell
application.
Configuration Tasks
Configuring the Authentication Method List
SSH server adopts the login authentication mode. SSH server uses the default
authentication method list by default.
In global configuration mode, the following command can be used to configure
the authentication method list.
Command | Purpose |
---|
ip sshd auth-method STRING
| Configure the authentication method list. The length of the authentication method’s name is no more than 20 characters.
Configuring Access List
In order to control SSH server to access other devices, you can configure ACL
for SSH server.
In global configuration mode, the following command can be used to configure
the timeout time.
Command | Purpose |
---|
ip sshd access-class STRING
| Configure ACL. The length of the access list’s name is no more than 19 characters.
Configuring the Authentication Timeout Time
After SSH client connects SSH server successfully, the SSH server will close
the connection if the authentication cannot be passed during the configured
time.
In global configuration mode, the following command can be used to configure
the authentication timeout.
Command | Purpose |
---|
ip sshd timeout <60-65535>
|
Configure the authentication timeout time.
Configuring the Authentication Retry Times
If the times for failed authentications exceed the maximum times, SSH server
will not allow you to retry authentication and the system enters the silent
period. The maximum times for retrying authentication is 6 by default.
In global configuration mode, the following command can be used to configure
the authentication retry times.
Command | Purpose |
---|
ip sshd auth-retries <0-65535>
|
Configure the authentication retry times.
Configuring the Login Silence Period
The system enters in the silent period when the authentication retry times
exceed the threshold. The silence period is 60s by default. In global
configuration mode, the following command can be used to configure the silence
period.
Command | Purpose |
---|
ip sshd silence-period <0-3600>
|
Configuring the login silence period
Enabling SFTP
The SFTP function refers to the secure file transmission system based on SSH,
of which the authentication procedure and data transmission are encrypted.
Though it has low transmission efficiency, network security is highly
improved.
SftpFUNCTIONis disabled by default. Run following command to enable
sftpFUNCTIONin global configuration mode.
Command | Purpose |
---|
ip sshd sftp
|
Enable sftp function.
Enabling Encryption Key Saving Function
Enable ssh server and the initial encryption key needs to be calculated. The
process may take one to two minutes. When enabling the encryption key saving
function, the initial encryption key is saved in the flash. When enabling ssh
server in a second time, the encryption key will be read first.
sftp function is disabled by default.USE THE FOLLOWING COMMANDto enable
sftpFUNCTION IN GLOBAL CONFIGURATION MODE:
Command | Purpose |
---|
ip sshd save
|
Enable encryption key saving function.
Enabling SSH Server
SSH server is disabled by default. WhenSSH server is enabled, a RSA key pair
will be generated and then listens the connection request from SSH client. The
whole process probably requires one or two minutes.
The following command can be used in global configuration mode to enableSSH
server:
Command | Purpose |
---|
ip sshd enable
|
Enable SSH server. The digit of the password is 1024.
Configuration Example of SSH Server
The following configuration allows the host whose IP is 192.168.20.40 to
access SSH server, while the local user database will be used to authenticate
the user.
ACL
ip access-list standard ssh-acl
permit 192.168.20.40
Global Configuration
aaa authentication login ssh-auth local ip sshd auth-method ssh-auth
ip sshd access-class ssh-acl
ip sshd enable
References
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>