Instruction/ maintenance manual of the product EX2500 Juniper
Go to page of 102
Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-200 0 www.juniper.net Part Number: 530-029705-01, Revision 2 Juniper Networks EX2500 Ethernet Switch Configuration Guide Release 3.
ii Juniper Networks, the Juniper Netw orks logo, JUNOS, NetScreen, ScreenOS, and Steel-Belted Radius are reg istered trademarks of J unip er Networks, Inc. in the United States and other coun tries. JUNO Se is a trademark of J uniper Networ ks, Inc.
Table of Contents iii Table of Contents About This Guide xi Objectives ............... ............. ............. ................ ............. ............. ................ .... xi Audience . ............. ................ ............. ......
iv Table of Contents EX2500 Ethernet Switch Configuration Guide TACACS+ Authen tication ........... ............. ................ ............. ............. ...... 14 How TACACS+ Authentication Wo rks .............. ............. ...............
Table of Contents Table of Contents v PVRST Configu ration Guidelines ....... ............. ............. ................ ............. 38 Configuring PV RST .................. ............. ............ ................. ............ .......... 38 Multiple Spa nning Tre e Protocol .
vi Table of Contents EX2500 Ethernet Switch Configuration Guide History MIB Object ID ................. ............. ................ ............. ............. ...... 67 Configuring RMON History ...... ................ ............. ...........
List of Figures vii List of Figures Figure 1: Default VL AN Settings ............. ............. ................ ............. ............. 24 Figure 2: Port-Based VLAN Assign ment .............. ................ ............. ............. 25 Figure 3: 802.
viii List of Figures EX2500 Ethernet Switch Configuration Guide.
List of Tables ix List of Tables Table 1: Notice Icons ............ ............. ................ ............. ............. ............. ... xii Table 2: EX2500 Tex t and Synta x Conventions ................. ............. ............. xii Table 3: EX2500 Ethern et Switch Do cumentation .
x List of Tables EX2500 Ethernet Switch Configuration Guide.
Objectives xi About This Guide This preface provides the fo llowing guidelines for using the Junip er Networks EX2500 Ethern et Switch Config uration Guide : Objectives on page xi Audience.
EX2500 Ethernet Switch Configuration Guide xii Documentation Conventions Documentation Conventions Table 1 describe s the notic e icons used i n this manual. Table 2 describes the EX2500 text and synt ax conventions. Table 1: Notice Icons Icon Meaning Description Informational note Indica tes important features or instructions.
List of Technical Publications xiii About This Guide List of Technical Publications Table 3 lists the docum entation supp or ting the EX2500 Ethernet Switch. All documentation for EX Series Ethernet S witches is available at http://www.juniper.n et/techpubs/ .
EX2500 Ethernet Switch Configuration Guide xiv Requesting Technical Support Self-Help Online Tools and Resources For quick and easy problem resolution, th e Ju niper N etworks online sel f-service portal—the Customer Suppo rt Center (C SC)—provide s the fo llow ing features: Find CSC offerings: http://www.
EX2500 Ethernet Switch Applications 1 Part 1 EX2500 Ethernet Switch Applications This configuration guide will help y ou p lan, implement, and administer EX2500 software. Where possible, each chapte r provides featur e overviews, usage examples, and configuration instructions.
EX2500 Ethernet Switch Configuration Guide 2 EX2500 Ethernet Switch Applications.
Configuring the Management Interface 3 Chapter 1 Accessing the Switch The EX2500 software provides a means fo r accessing, co nfiguring, and viewing information and statistics abou t the EX 2500 E thernet Sw it ch.
EX2500 Ethernet Switch Configuration Guide 4 Dynamic Host Configuration Protocol 3. Configure the management IP address, subnet mask, and default gateway. ex2500(config)# interface ip-mgmt addr ess 10.10.10.2 ex2500(config)# interface ip-mgmt ne tmask 255.
Using Telnet 5 Chapter 1: Accessing the Switch DHCP is an extension of another netw or k IP management p rotocol, Boot strap Protocol (BOOTP), with an additiona l capability of being able to allocate reusable network addresses and configuration para meters for client operation.
EX2500 Ethernet Switch Configuration Guide 6 Using the EX2500 Web Device Manager By default, EX2500 Web Devi ce Manager access is enabled on the switch. Configuring EX2500 Web Devi ce Manager Access via HTTP By default, EX2500 Web Device Manag er access via HTTP is enabled .
Using SNMP 7 Chapter 1: Accessing the Switch The EX2500 Web Device Manag er is organized at a high level as fo llows: Context tabs —These tabs allow you to select the type of ac tion you w ish to perform. The Con figure tab provides access to the configuration elements for th e entire switch.
EX2500 Ethernet Switch Configuration Guide 8 Using SNMP SNMPv3 SNMPv3 is an enhanced version of the Simple Network Manag ement Protocol, approved by the Internet Eng ineering Steering Group in March, 2002.
Using SNMP 9 Chapter 1: Accessing the Switch 2. Configure a user acce ss group, along with the views the group may access. U se the access table to configure the grou p’s access level. Because the read view, write view, and notify view are all set to iso , the user type has access to all private and publ ic MIBs.
EX2500 Ethernet Switch Configuration Guide 10 Securing Access to the Switch SNMPv3 Trap Host Configuration To configure a user for SNMPv3 t raps, you can choose to send t he traps with b oth privacy and authentication, with authen tication o nly, or without privacy or authenticatio n.
Securing Access to the Switch 11 Chapter 1: Accessing the Switch RADIUS Authenticat ion and Authorization The EX2500 switch supports the RADIUS (Remote Authentication Dial-in User Service) method to authenticate and authorize remote administrators for managing the switch.
EX2500 Ethernet Switch Configuration Guide 12 Securing Access to the Switch 3. If desired, you may change the defaul t UDP port number used to listen to RADIUS. The well-known port for RADIUS is 1812. ex2500(config)# radius-server port <UDP port number> 4.
Securing Access to the Switch 13 Chapter 1: Accessing the Switch Switch User Accounts The user accounts listed in Table 4 can be defined in the RADI US server dictiona ry file.
EX2500 Ethernet Switch Configuration Guide 14 Securing Access to the Switch TACACS+ Authentication The EX2500 switch supports auth entication and authorization with ne tworks using the TACACS+ protocol.
Securing Access to the Switch 15 Chapter 1: Accessing the Switch The default mappi ng between TACACS+ autho rization levels and EX2500 management access levels is show n in Table 6.
EX2500 Ethernet Switch Configuration Guide 16 Securing Access to the Switch Command Authorization and Logging When TACACS+ Command Authorizatio n is enabled, EX2500 configuration commands are sent to the TACACS+ server for au thorization.
Securing Access to the Switch 17 Chapter 1: Accessing the Switch Secure Shell Secure Shell (SSH) uses secure tunnels to encrypt and secure messages between a remote administrator and the switch. Telnet does not provide this lev el of security. The Telnet method of managing an EX250 0 switch does not provide a secure connection.
EX2500 Ethernet Switch Configuration Guide 18 Securing Access to the Switch When the SSH server is fi rst enabled and applied, the switch automaticall y generates the RSA host and se rver keys, which are stored in the Flash m emory.
Securing Access to the Switch 19 Chapter 1: Accessing the Switch Considerations for Configuring End User Accounts A maximum of 10 user IDs are supported on the switch. The EX2500 switch support s end user support for console , Telnet, EX2500 Web Device Manager, and SSHv1 or SSHv2 access to the switch.
EX2500 Ethernet Switch Configuration Guide 20 Securing Access to the Switch Listing Current Users The following command displays defined user accounts and whether or not eac h user is currently logge d in to the sw itch.
VLAN Overview 21 Chapter 2 VLANs This chapter describes network design and to pology considerations for using Vir t ua l Lo ca l Ar e a Ne t wo rk s (V L AN s) .
EX2500 Ethernet Switch Configuration Guide 22 VLANs and Port VLAN ID Number s VLANs and Port VLAN ID Numbers VLAN Numbers The EX2500 switch supports up to 1024 VLANs per swit ch. Even though the maximum number of VLANs supported at any given time is 1024, each can be identified with any nu mber betwe en 1 and 40 94.
VLAN Tagging 23 Chapter 2: VLANs VLAN Tagging EX2500 software supports 80 2.1Q VLAN tagging, providing standards-based VLAN support for Ethe rnet systems. Tagging places the VLAN identifier in the frame heade r of a packet, allowing each port to belong to multiple VLANs.
EX2500 Ethernet Switch Configuration Guide 24 VLAN Tagging Figure 1: Default VLAN Settings When a VLAN is configured, ports are added as members of the VLAN, and the ports are d efined as eith er tagged or untagged (see Figure 2 through F igure 5).
VLAN Tagging 25 Chapter 2: VLANs Figure 2: Port-Based VLAN Assignment As shown in Figure 3, the untagged packe t is marked (tagged) as it leaves the switch through port 5, wh ich is configured as a tagged member of VLAN 2.
EX2500 Ethernet Switch Configuration Guide 26 VLAN Topologies and Design Considerations As shown in Figure 5, the tagge d packet remains unchanged a s it leaves the switch through port 5, wh ich is configured as a tag ged member of VLAN 2.
VLAN Topologies and Design Considerations 27 Chapter 2: VLANs All ports that are involved in po rt mi rroring must hav e memberships in the same VLANs. If a port is configured for port mirroring, the port’s VLAN membership cannot be ch anged.
EX2500 Ethernet Switch Configuration Guide 28 VLAN Topologies and Design Considerations Use the following procedu re to configure the sample network shown in Figure 6. 1. Enable VLAN tagging on serve r po rts that support multiple VLANs. ex2500(config)# interface port 5 ex2500(config-if)# tagging ex2500(config-if)# exit 2.
Private VLANs 29 Chapter 2: VLANs Private VLANs Private VLANs provide Layer 2 isol atio n between the ports within the same broadcast domain. Private VL ANs can control traffic within a VLAN domain, and provide port-based security for host serv ers.
EX2500 Ethernet Switch Configuration Guide 30 Private VLANs Private VLAN Configuration Guidelines The following guidelines a pply wh en configuring priva te VLANs: The default VLAN 1 cannot be a private VLAN. The management VLAN 4095 cannot be a private V LAN.
Spanning Tree Overview 31 Chapter 3 Spanning Tree Protocol When multiple paths exist on a network, Spanning Tree Protocol configures the network so that a switch uses only the most effic ient path.
EX2500 Ethernet Switch Configuration Guide 32 Spanning Tree Overview The relationship between port, trunk groups , VLANs, and spanning trees is shown in Table 9. Bridge Protocol Data Units (BPDUs) To create a spanning tree, the switch generates a co nfiguration Bridge Protocol Data Unit (BPDU), which it then forwards ou t of its ports.
Spanning Tree Overview 33 Chapter 3: Spanning Tree Protocol Port Pri ority The port priority helps determine which bridge port becomes the root or designated port. The case for the root port is when 2 switches are connected using a minimum of two links wi th the same pa th -cost.
EX2500 Ethernet Switch Configuration Guide 34 Spanning Tree Overview Each STG must hav e a VLAN assigned to it before it becomes fun ctional. You cannot configure other STG settings until the VLAN is assigned. If the STG VLAN is unassigned, other configuration sett ings are cleared.
Rapid Spanning Tree Protocol 35 Chapter 3: Spanning Tree Protocol When you re move a port from a VL AN th at belongs to an S TG, that port is removed from the STG. However, i f that port belongs to an other VL AN in the same STG, the port remains in the STG.
EX2500 Ethernet Switch Configuration Guide 36 Rapid Spanning Tree Protocol Port Type and Link Type Spanning tree configuration i ncludes the following parame ters to support RSTP and MSTP: edge port and link ty pe. Edge Port A port that does not connec t to a bridge is called a n edge port .
Per VLAN Rapid Spanning Tree 37 Chapter 3: Spanning Tree Protocol Per VLAN Rapid Spanning Tree Per VLAN Rapid S panning Tree Plus Protocol (PVRST+ ) enhances the RSTP protocol by addi ng the ability to have multiple Spanni ng Tree Groups ( STGs). PVRST+ is based on IEEE 80 2.
EX2500 Ethernet Switch Configuration Guide 38 Per VLAN Rapid Spanning Tree In Figure 8, VLAN 1 and VLAN 2 belong to different Spanning Tre e Groups. The two instances of Span ning Tree separat e th e topo logy without fo rming a loo p. Both VLANs can forward pac kets between the swi tches without losing connectivity.
Multiple Spanning Tree Protocol 39 Chapter 3: Spanning Tree Protocol Multiple Spanning Tree Protocol Multiple Spanning Tr ee Protocol (MSTP) ex tends Rapid Spanning Tree Pro tocol through multiple Spanning Tree Groups, u s ing multiple VLANs in each STG.
EX2500 Ethernet Switch Configuration Guide 40 Multiple Spanning Tree Protocol Figure 9 shows how multiple spanning trees can provi de redundancy witho ut wasting any uplink ports. In this example, the server ports are split between two separate VLANs.
Fast Uplink Convergence 41 Chapter 3: Spanning Tree Protocol Add server ports 1 and 2 to VLAN 1. Add up link ports 19 and port 20 to VLAN 1. ex2500(config)# vlan 1 ex2500(config-vlan)# enable ex25.
EX2500 Ethernet Switch Configuration Guide 42 Fast Uplink Convergence Configuration Guidelines When you enable Fast Uplink Converge nce, the EX2500 switch automa tically makes the following config uration changes: Sets the bridge priority to 61440 so that it doe s not become the root swi tch.
Trunking Overview 43 Chapter 4 Ports and Trunking Trunk groups can provide su per-bandwid th, multi-link connections betwee n switches or other trunk-capable device s. A trunk group is a group of ports that act together, combining their ba ndwidth to create a single, larger virtu al link.
EX2500 Ethernet Switch Configuration Guide 44 Trunking Overview Each packet’s particular MAC or IP addres s information results in se lecting one line in the trunk group for data transmission . The more da ta streams are feeding the trunk lines, the more ev enly traffic i s distribute d.
Port Trunking Configuration Example 45 Chapter 4: Ports and Trunking You cannot change the VLAN m embership for a trunk group’s member port. You can change the VLAN member ship of the trunk group. When an active port is configured in a tru nk, the port becomes a trunk member when you enable the trunk.
EX2500 Ethernet Switch Configuration Guide 46 Port Trunking Configuration Example 1. Follow these steps on the EX2500 switch: a. Define a trunk group. ex2500(config)# portchannel 3 memb er 2,9, 16 ex2500(config)# portchannel 3 ena ble b. Verify the configuration.
Configurable Trunk Hash Algorithm 47 Chapter 4: Ports and Trunking Configurable Trunk Hash Algorithm This feature allows you to configure parameters for the trunk hash algorithm , instead of using the default v alues. Use the IP Trunk Hash commands to conf igure new default behavior fo r Layer 2 traffic and Layer 3 traffic.
EX2500 Ethernet Switch Configuration Guide 48 Link Aggregation Control Protocol A port’s Link Aggregation Id entifier (LAG ID) determi nes how the port can be aggregated.
Link Aggregation Control Protocol 49 Chapter 4: Ports and Trunking When the system is initialized, a ll ports by default are in LACP off mode and are assigned unique admin keys. To make a group of po rts aggregatable, you assign them all the same admin k ey.
EX2500 Ethernet Switch Configuration Guide 50 Link Aggregation Control Protocol We recommend that you use the default long ti meout to red uce LAPDU processing. If the CPU utilization rate of your sw itch remains at 100% for periods of 90 seconds or more, consider using static tru nks inst ead of LACP.
QoS Overview 51 Chapter 5 Quality of Service Quality of Service features allow you to allocate ne twork resources to mission-critical applications at the expense of applications that are less sensitive to such factors as time delays or network co nge stion.
EX2500 Ethernet Switch Configuration Guide 52 Using ACL Filters Figure 11: QoS Model The basic QoS model works as follow s: Classify traffic: Read the DSCP value. Read the 802.1p priority valu e. Match ACL fil ter parameters. Perform actions: Permit packets.
Using ACL Filters 53 Chapter 5: Quality of Service Each ACL contains rules that define the ma tching criteria for da ta packets. The ACL checks each packet against its rules, to dete rmine if there is a ma tch. If the pa cket matches the ACL’s rules, th e ACL performs its configured actio n: either permit or deny the packet.
EX2500 Ethernet Switch Configuration Guide 54 Using ACL Filters IP Extended ACLs The switch supports up to 128 IP ACLs (standard and extende d), numbered from 128 through 254.
Using ACL Filters 55 Chapter 5: Quality of Service Understanding ACL Priority Each ACL has a unique priority value, based on its number . The lower the ACL number, the higher the priority, so ACL 1 has the highest priority. The priority value is used to decide whic h ACL rule to apply when a packet matches one or more ACLs.
EX2500 Ethernet Switch Configuration Guide 56 Using ACL Filters Assigning ACLs to a Port Once you configu re an ACL, you must a ssign the ACL to a port. Each port can accept multiple ACLs. Note that higher-pri ority ACLs are considered first, and thei r action takes precedence over lower- priority ACLs.
Using ACL Filters 57 Chapter 5: Quality of Service 3. Verify the configuration. ex2500# show access-li sts 1 Standard IP Acces s List 1 ------------ ---------- ------ Source IP a ddress : 0.0.0 .0 Source IP a ddress mas k : 0.0.0 .0 Destination IP addres s : 100.
EX2500 Ethernet Switch Configuration Guide 58 Using ACL Filters ACL Example 4—Blocking Al l Except Certain Packets Use this configuration to block all traf fic except traffic of certain types. HTTP/HTTPS , DHCP, and ARP p ackets are perm itted on the port.
Using Storm Control Filters 59 Chapter 5: Quality of Service Using Storm Control Filters The EX2500 switch provides filters that can limit the number of the following packet types transmitted by s.
EX2500 Ethernet Switch Configuration Guide 60 Using DSCP Values to Provide QoS Using DSCP Values to Provide QoS The switch uses the Differen tiated Services (Di ffServ) architecture to provide QoS functions. DiffServ is de scribed in IETF RFCs 2474 and 2475 .
Using DSCP Values to Provide QoS 61 Chapter 5: Quality of Service Per Hop Behavior The DSCP value determines the Per Hop Be havior ( PHB) of each packet.
EX2500 Ethernet Switch Configuration Guide 62 Using DSCP Values to Provide QoS QoS Levels Table 16 shows the default servi ce levels provide d by the switch, listed from highest to lowest importa nce. DSCP Mapping The switch can use the DSCP value of ingress packets to set the COS queue.
Using 802.1p Priority to Provide QoS 63 Chapter 5: Quality of Service Using 802.1p Priority to Provide QoS The EX2500 switch provides Quality o f Service (QoS ) functions ba sed on the priority bits in a packet’s VLAN hea der. ( The priority bits are defined by th e 802.
EX2500 Ethernet Switch Configuration Guide 64 Queuing and Scheduling Queuing and Scheduling The EX2500 switch has eight outp ut Class of Service (COS) qu eues per port, into which each packet is placed. Each pack et’s 802.1p priori ty determines its COS queue.
RMON Overview 65 Chapter 6 Remote Monitoring Remote Monitoring (RMON) allows network devices to exchange netw ork monitoring data. The following topic s are discussed in this chapter: RMON Ove.
EX2500 Ethernet Switch Configuration Guide 66 RMON Group 1—Statistics RMON Group 1—Statistics The switch supports collection of Ethernet statistics as outlined in the RMON statistics MIB, in reference to etherSta tsTable . You c an configure RMON statistics on a per- port basis.
RMON Group 2—History 67 Chapter 6: Remote Monitoring RMON Group 2—History The RMON History Group allows you to sample and archive Ethernet statistics for a specific interface during a specific time interval. Histo ry sampling is done per port.
EX2500 Ethernet Switch Configuration Guide 68 RMON Group 3—Alarms 3. View RMON history for the p ort. ex2500(confi g)# show rmon hist ory RMON is enab led Index I FOID Interval Rbnum Gbnum ------ --- ------- -------- ----- ----- 1 ifEn try.
RMON Group 9—Events 69 Chapter 6: Remote Monitoring RMON Group 9—Events The RMON Event Group allow s you to defi ne events that are triggere d by alarms. An event can be a log me ssage, an SNMP trap, or both. When an alarm is generated, it triggers a correspo nding event notification.
EX2500 Ethernet Switch Configuration Guide 70 RMON Group 9—Events.
IGMP Snooping 71 Chapter 7 IGMP Internet Group Management Protoco l (IGMP) is used by IP Multicast routers to learn about the existence of host group members on their directly attached subnet (see RFC 2236).
EX2500 Ethernet Switch Configuration Guide 72 FastLeave The client-server path is set up as follo ws: 1. An IP Mul ticast rout er (Mrouter ) sends Membership Queries to the switch, which forwards them to all ports in a give n VLAN.
IGMPv3 Snooping 73 Chapter 7: IGMP IGMPv3 Snooping IGMPv3 includes new mem bership report me ssages to ex tend IGMP fu nctionality . The switch provides snooping capability for all types o f IGMP version 3 (IGMPv3) Membership Reports. IGMPv3 supports Source-Specific Multicast (S SM).
EX2500 Ethernet Switch Configuration Guide 74 Static Multicast Router 4. Enable IGMPv3 Snooping (optional). ex2500(config)# ip igmp snoop igmp v3 enable 5. View dynamic IGMP information. ex2500# show ip igmp group s Note: Local groups (22 4.0.0.x) are not sn ooped/relaye d and will not appea r.
High Availability Overview 75 Chapter 8 High Availability Through Uplink Failure Detection This chapter describes how to use Uplink Failu re Detectio n (UFD) to ensu re that network resources remain availa ble if one switch is remov ed for service.
EX2500 Ethernet Switch Configuration Guide 76 Failure Detection Pair Figure 14: Uplink Failure Detection Example Failure Detection Pair To use UFD, you mu st configure a Failu re Detection Pair and then turn UFD on.
UFD Configuration Example 77 Chapter 8: High Availability Through Uplink Failure Detect ion Ports that are already members of a trunk group are not allow ed to be assigned to an LtM. A port cannot be added to a trunk gro u p if it already belongs to an LtM.
EX2500 Ethernet Switch Configuration Guide 78 Monitoring UFD.
Appendixes 79 Part 2 Appendixes “Monitoring Ports with Port Mirroring” on page 81 disc usses th e main tool fo r troubleshooting your switch—monitoring ports.
EX2500 Ethernet Switch Configuration Guide 80 Appendixes.
Port Mirroring Overview 81 Appendix A Monitoring Ports with Port Mirroring This appendix explains port mirroring to help you monitor ports and troubleshoot common problems on the EX2500 switch.
EX2500 Ethernet Switch Configuration Guide 82 Configuring Port Mirroring As shown in Figure 15, port 2 is acting as a monitor port, receiv ing mirrored traffic from three other switch ports: ingress traffic from port 4, egress traffic from port 7, and both ingress and egress traffic fro m port 10 .
Indexes 83 Part 3 Indexes Index on pa ge 85.
EX2500 Ethernet Switch Configuration Guide 84 Indexes.
Index 85 Index Numerics 802.1p priority fo r QoS .................... .............. .............. 63 802.1Q VLAN tagging .................. .............. .............. ..... 23 A Access Control Lists. See ACLs. accessing the switch management interface .
86 Index EX2500 Ethernet Switch Configuration Guide H help, requesting .................... .............. .............. ............ xi ii high availability, overview .................... .............. .......... 75 history, RMON ..............
Index 87 Index Q QoS 802.1p priority ...... .............. .............. .............. ........ 63 ACLs ............. ........... .............. .............. .............. ........ 52 COS queuing and scheduling .............. .............. .
88 Index EX2500 Ethernet Switch Configuration Guide U UDP ................. ............... ........... .............. .............. .......... 54 UFD ............ ........... .............. .............. .............. .............. .. 75 configuration .
An important point after buying a device Juniper EX2500 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought Juniper EX2500 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data Juniper EX2500 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, Juniper EX2500 you will learn all the available features of the product, as well as information on its operation. The information that you get Juniper EX2500 will certainly help you make a decision on the purchase.
If you already are a holder of Juniper EX2500, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime Juniper EX2500.
However, one of the most important roles played by the user manual is to help in solving problems with Juniper EX2500. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device Juniper EX2500 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center