Community Strings (for SNMP version 1 and 2c clients) 2-6
Trap Receivers 2-7
Configuring Access for SNMP Version 3 Clients 2-8
Saving Configuration Settings 2-8
Managing System Files 2-9
Chapter 3: Configuring the Switch 3-1
Using the Web Interface 3-1
Navigating the Web Browser Interface 3-2
Home Page 3-2
Configuration Options 3-3
Panel Display 3-3
Main Menu 3-4
Basic Configuration 3-10
Displaying System Information 3-10
Displaying Switch Hardware/Software Versions 3-11
Displaying Bridge Extension Capabilities 3-13
Setting the Switch’s IP Address 3-14
Manual Configuration 3-15
Using DHCP/BOOTP 3-16
DHCP Relay and Option 82 Information 3-17
Managing Firmware 3-19
Downloading System Software from a Server 3-20
i
Contents
Saving or Restoring Configuration Settings 3-22
Downloading Configuration Settings from a Server 3-23
Console Port Settings 3-24
Telnet Settings 3-26
Configuring Event Logging 3-28
System Log Configuration 3-28
Remote Log Configuration 3-30
Displaying Log Messages 3-31
Sending Simple Mail Transfer Protocol Alerts 3-32
Resetting the System 3-34
Setting the System Clock 3-35
Configuring SNTP 3-35
Configuring NTP 3-36
Setting the Time Zone 3-38
Simple Network Management Protocol 3-38
Enabling the SNMP Agent 3-40
Setting Community Access Strings 3-40
Specifying Trap Managers and Trap Types 3-41
Configuring SNMPv3 Management Access 3-43
Setting a Local Engine ID 3-44
Specifying a Remote Engine ID 3-44
Configuring SNMPv3 Users 3-45
Configuring Remote SNMPv3 Users 3-47
Configuring SNMPv3 Groups 3-49
Setting SNMPv3 Views 3-53
Replacing the Default Secure-site Certificate 3-60
Configuring the Secure Shell 3-61
Generating the Host Key Pair 3-63
Configuring the SSH Server 3-65
Configuring Port Security 3-66
Configuring 802.1X Port Authentication 3-68
Displaying 802.1X Global Settings 3-69
Configuring 802.1X Global Settings 3-70
Configuring Port Settings for 802.1X 3-70
Displaying 802.1X Statistics 3-73
MAC Address Authentication 3-74
Configuring the MAC Authentication Reauthentication Time 3-75
Configuring MAC Authentication for Ports 3-76
Displaying Secure MAC Address Information 3-77
Configuring MAC Address Filters 3-79
Filtering Addresses for Management Access 3-80
ii
Contents
Access Control Lists 3-82
Configuring Access Control Lists 3-82
Setting the ACL Name and Type 3-83
Configuring a Standard IP ACL 3-84
Configuring an Extended IP ACL 3-85
Configuring a MAC ACL 3-87
Binding a Port to an Access Control List 3-88
Port Configuration 3-89
Displaying Connection Status 3-89
Configuring Interface Connections 3-91
Creating Trunk Groups 3-93
Statically Configuring a Trunk 3-94
Enabling LACP on Selected Ports 3-95
Configuring LACP Parameters 3-97
Displaying LACP Port Counters 3-99
Displaying LACP Settings and Status for the Local Side 3-101
Displaying LACP Settings and Status for the Remote Side 3-103
Setting Broadcast Storm Thresholds 3-105
Configuring Port Mirroring 3-106
Configuring Rate Limits 3-107
Rate Limit Granularity 3-107
Rate Limit Configuration 3-108
Showing Port Statistics 3-109
Address Table Settings 3-114
Setting Static Addresses 3-114
Displaying the Address Table 3-115
Changing the Aging Time 3-117
Spanning Tree Algorithm Configuration 3-117
Displaying Global Settings 3-119
Configuring Global Settings 3-123
Displaying Interface Settings 3-127
Configuring Interface Settings 3-130
Configuring Multiple Spanning Trees 3-132
Displaying Interface Settings for MSTP 3-136
Configuring Interface Settings for MSTP 3-137
VLAN Configuration 3-139
IEEE 802.1Q VLANs 3-139
Enabling or Disabling GVRP (Global Setting) 3-142
Displaying Basic VLAN Information 3-142
Displaying Current VLANs 3-143
Creating VLANs 3-145
Adding Static Members to VLANs (VLAN Index) 3-147
Adding Static Members to VLANs (Port Index) 3-148
Configuring VLAN Behavior for Interfaces 3-150
Private VLANs 3-152
Setting the Default Priority for Interfaces 3-158
Mapping CoS Values to Egress Queues 3-160
Selecting the Queue Mode 3-162
Setting the Service Weight for Traffic Classes 3-163
Layer 3/4 Priority Settings 3-164
Mapping Layer 3/4 Priorities to CoS Values 3-164
Selecting IP Precedence/DSCP Priority 3-164
Mapping IP Precedence 3-165
Mapping DSCP Priority 3-166
Mapping IP Port Priority 3-168
Mapping CoS Values to ACLs 3-169
Multicast Filtering 3-170
Layer 2 IGMP (Snooping and Query) 3-171
Configuring IGMP Snooping and Query Parameters 3-171
Enabling IGMP Immediate Leave 3-173
Displaying Interfaces Attached to a Multicast Router 3-174
Specifying Static Interfaces for a Multicast Router 3-175
Displaying Port Members of Multicast Services 3-176
Assigning Ports to Multicast Services 3-177
IGMP Filtering and Throttling 3-178
Enabling IGMP Filtering and Throttling 3-178
Configuring IGMP Filter Profiles 3-179
Configuring IGMP Filtering and Throttling for Interfaces 3-181
Multicast VLAN Registration 3-183
Configuring Global MVR Settings 3-184
Displaying MVR Interface Status 3-185
Displaying Port Members of Multicast Groups 3-186
Configuring MVR Interface Status 3-187
Assigning Static Multicast Groups to Interfaces 3-188
Configuring Domain Name Service 3-189
Configuring General DNS Service Parameters 3-189
Configuring Static DNS Host to Address Entries 3-192
Displaying the DNS Cache 3-193
Switch Clustering 3-194
Cluster Configuration 3-194
Cluster Member Configuration 3-195
Cluster Member Information 3-196
Cluster Candidate Information 3-197
iv
Contents
Chapter 4: Command Line Interface 4-1
Using the Command Line Interface 4-1
Accessing the CLI 4-1
Console Connection 4-1
Telnet Connection 4-1
Entering Commands 4-3
Keywords and Arguments 4-3
Minimum Abbreviation 4-3
Command Completion 4-3
Getting Help on Commands 4-3
Showing Commands 4-4
Partial Keyword Lookup 4-5
Negating the Effect of Commands 4-5
Using Command History 4-5
Understanding Command Modes 4-5
Exec Commands 4-6
Configuration Commands 4-7
Command Line Processing 4-8
Command Groups 4-9
Line Commands 4-11
line 4-11
login 4-12
password 4-13
timeout login response 4-14
exec-timeout 4-14
password-thresh 4-15
silent-time 4-16
databits 4-16
parity 4-17
speed 4-18
stopbits 4-18
disconnect 4-19
show line 4-19
General Commands 4-20
enable 4-20
disable 4-21
configure 4-22
show history 4-22
reload 4-23
end 4-23
exit 4-24
quit 4-24
System Management Commands 4-25
Device Designation Commands 4-25
v
Contents
prompt 4-25
hostname 4-26
User Access Commands 4-26
username 4-27
enable password 4-28
IP Filter Commands 4-29
management 4-29
show management 4-30
Web Server Commands 4-31
ip http port 4-31
ip http server 4-31
ip http secure-server 4-32
ip http secure-port 4-33
Telnet Server Commands 4-34
ip telnet port 4-34
ip telnet server 4-34
Secure Shell Commands 4-35
ip ssh server 4-37
ip ssh timeout 4-38
ip ssh authentication-retries 4-38
ip ssh server-key size 4-39
delete public-key 4-39
ip ssh crypto host-key generate 4-40
ip ssh crypto zeroize 4-40
ip ssh save host-key 4-41
show ip ssh 4-41
show ssh 4-42
show public-key 4-43
Event Logging Commands 4-44
logging on 4-44
logging history 4-45
logging host 4-46
logging facility 4-46
logging trap 4-47
clear logging 4-47
show logging 4-48
show log 4-49
access-list ip 4-103
permit, deny (Standard ACL) 4-104
permit, deny (Extended ACL) 4-105
show ip access-list 4-107
ip access-group 4-107
show ip access-group 4-108
map access-list ip 4-108
show map access-list ip 4-109
MAC ACLs 4-110
access-list mac 4-110
permit, deny (MAC ACL) 4-111
show mac access-list 4-112
mac access-group 4-112
show mac access-group 4-113
map access-list mac 4-113
show map access-list mac 4-114
ACL Information 4-115
show access-list 4-115
show access-group 4-115
SNMP Commands 4-116
viii
Contents
snmp-server 4-117
show snmp 4-117
snmp-server community 4-118
snmp-server contact 4-119
snmp-server location 4-119
snmp-server host 4-120
snmp-server enable traps 4-122
snmp-server engine-id 4-123
show snmp engine-id 4-124
snmp-server view 4-125
show snmp view 4-126
snmp-server group 4-126
show snmp group 4-127
snmp-server user 4-128
show snmp user 4-130
Interface Commands 4-131
interface 4-131
description 4-132
speed-duplex 4-132
negotiation 4-133
capabilities 4-134
flowcontrol 4-135
shutdown 4-136
switchport broadcast packet-rate 4-137
clear counters 4-137
show interfaces status 4-138
show interfaces counters 4-139
show interfaces switchport 4-140
Mirror Port Commands 4-142
port monitor 4-142
show port monitor 4-143
Rate Limit Commands 4-144
rate-limit 4-144
rate-limit granularity 4-145
show rate-limit 4-145
bridge-ext gvrp 4-194
show bridge-ext 4-195
switchport gvrp 4-195
show gvrp configuration 4-196
garp timer 4-196
show garp timer 4-197
Priority Commands 4-198
Priority Commands (Layer 2) 4-198
queue mode 4-199
switchport priority default 4-199
queue bandwidth 4-200
queue cos-map 4-201
show queue mode 4-202
show queue bandwidth 4-202
show queue cos-map 4-203
Priority Commands (Layer 3 and 4) 4-204
map ip port (Global Configuration) 4-204
map ip port (Interface Configuration) 4-205
map ip precedence (Global Configuration) 4-205
map ip precedence (Interface Configuration) 4-206
map ip dscp (Global Configuration) 4-207
map ip dscp (Interface Configuration) 4-207
show map ip port 4-208
show map ip precedence 4-209
show map ip dscp 4-210
Multicast Filtering Commands 4-211
IGMP Snooping Commands 4-212
ip igmp snooping 4-212
ip igmp snooping vlan static 4-212
ip igmp snooping version 4-213
ip igmp snooping immediate-leave 4-213
show ip igmp snooping 4-214
show mac-address-table multicast 4-215
IGMP Query Commands (Layer 2) 4-216
ip igmp snooping querier 4-216
ip igmp snooping query-count 4-216
ip igmp snooping query-interval 4-217
xi
Contents
ip igmp snooping query-max-response-time 4-218
ip igmp snooping router-port-expire-time 4-218
Static Multicast Routing Commands 4-219
ip igmp snooping vlan mrouter 4-219
show ip igmp snooping mrouter 4-220
IGMP Filtering and Throttling Commands 4-221
ip igmp filter (Global Configuration) 4-221
ip igmp profile 4-222
permit, deny 4-223
range 4-223
ip igmp filter (Interface Configuration) 4-224
ip igmp max-groups 4-224
ip igmp max-groups action 4-225
show ip igmp filter 4-226
show ip igmp profile 4-226
show ip igmp throttle interface 4-227
ip host 4-233
clear host 4-234
ip domain-name 4-234
ip domain-list 4-235
ip name-server 4-236
ip domain-lookup 4-237
show hosts 4-238
show dns 4-239
show dns cache 4-239
clear dns cache 4-240
DHCP Commands 4-241
ip dhcp relay information option 4-241
ip dhcp relay information policy 4-242
ip dhcp relay server 4-242
show ip dhcp-relay 4-243
IP Interface Commands 4-244
ip address 4-244
ip default-gateway 4-245
ip dhcp restart 4-246
show ip interface 4-246
show ip redirects 4-247
ping 4-247
Switch Cluster Commands 4-249
cluster 4-249
xii
Contents
cluster commander 4-250
cluster ip-pool 4-250
cluster member 4-251
rcommand 4-252
show cluster 4-252
show cluster members 4-253
show cluster candidates 4-253
Appendix A: Software Specifications A-1
Software Features A-1
Management Features A-2
Standards A-2
Management Information Bases A-3
Appendix B: Troubleshooting B-1
Problems Accessing the Management Interface B-1
Using System Logs B-2
Figure 3-1Home Page 3-2
Figure 3-2Panel Display 3-3
Figure 3-3System Information 3-10
Figure 3-4Displaying Switch Information 3-12
Figure 3-5Bridge Extension Configuration 3-13
Figure 3-6Manual IP Configuration 3-15
Figure 3-7IP Configuration using DHCP 3-16
Figure 3-8DHCP Relay Option 82 Configuration 3-18
Figure 3-9Operation Code Image File Transfer 3-20
Figure 3-10 Select Start-Up Operation File 3-20
Figure 3-11 Deleting Files 3-21
Figure 3-12 Copy Configuration Settings 3-23
Figure 3-13 Setting the Startup Configuration Settings 3-23
Figure 3-14 Console Port Settings 3-25
Figure 3-15 Enabling Telnet 3-27
Figure 3-16 System Logs 3-29
Figure 3-17 Remote Logs 3-30
Figure 3-18 Displaying Logs 3-31
Figure 3-19 Enabling and Configuring SMTP Alerts 3-33
Figure 3-20 Resetting the System 3-34
Figure 3-21 SNTP Configuration 3-35
Figure 3-22 NTP Client Configuration 3-37
Figure 3-23 Setting the System Clock 3-38
Figure 3-24 Enabling the SNMP Agent 3-40
Figure 3-25 Configuring SNMP Community Strings 3-41
Figure 3-26 Configuring SNMP Trap Managers 3-43
Figure 3-27 Setting the SNMPv3 Engine ID 3-44
Figure 3-28 Setting an Engine ID 3-45
Figure 3-29 Configuring SNMPv3 Users 3-46
Figure 3-30 Configuring Remote SNMPv3 Users 3-48
Figure 3-31 Configuring SNMPv3 Groups 3-52
Figure 3-32 Configuring SNMPv3 Views 3-53
Figure 3-33 Access Levels 3-55
Figure 3-34 Authentication Settings 3-58
Figure 3-35 HTTPS Settings 3-60
Figure 3-36 SSH Host-Key Settings 3-64
Figure 3-37 SSH Server Settings 3-65
Figure 3-38 Configuring Port Security 3-67
Figure 3-39 802.1X Global Information 3-69
Figure 3-40 802.1X Configuration 3-70
Figure 3-41 802.1X Port Configuration 3-71
Figure 3-42 Displaying 802.1X Port Statistics 3-74
xix
Figures
Figure 3-43 Network Access Configuration 3-76
Figure 3-44 Network Access Port Configuration 3-77
Figure 3-45 Network Access MAC Address Information 3-78
Figure 3-46 Network Access MAC Filter Configuration 3-79
Figure 3-47Creating a Web IP Filter List 3-81
Figure 3-48 Selecting ACL Type 3-83
Figure 3-49 ACL Configuration - Standard IP 3-84
Figure 3-50 ACL Configuration - Extended IP 3-86
Figure 3-51 ACL Configuration - MAC 3-87
Figure 3-52 Binding a Port to an ACL 3-88
Figure 3-53 Displaying Port/Trunk Information 3-90
Figure 3-54 Port/Trunk Configuration 3-92
Figure 3-55 Configuring Port Trunks 3-94
Figure 3-56 LACP Configuration 3-96
Figure 3-57 LACP - Aggregation Port 3-98
Figure 3-58 LACP - Port Counters Information 3-100
Figure 3-59LACP - Port Internal Information 3-102
Figure 3-60 LACP - Port Neighbors Information 3-103
Figure 3-61 Port Broadcast Control 3-105
Figure 3-62 Mirror Port Configuration 3-107
Figure 3-63Rate Limit Granularity Configuration 3-108
Figure 3-64 Output Rate Limit Port Configuration 3-109
Figure 3-65Port Statistics 3-113
Figure 3-66Static Addresses 3-115
Figure 3-67 Dynamic Addresses 3-116
Figure 3-68 Address Aging 3-117
Figure 3-69 STA Information 3-121
Figure 3-70 STA Global Configuration 3-126
Figure 3-71 STA Port Information 3-129
Figure 3-72 STA Port Configuration 3-132
Figure 3-73 MSTP VLAN Configuration 3-134
Figure 3-74 MSTP Port Information 3-136
Figure 3-75 MSTP Port Configuration 3-138
Figure 3-76 GLobally Enabling GVRP 3-142
Figure 3-77 VLAN Basic Information 3-142
Figure 3-78 VLAN Current Table 3-144
Figure 3-79 VLAN Static List - Creating VLANs 3-146
Figure 3-80 VLAN Static Table - Adding Static Members 3-148
Figure 3-81 VLAN Static Membership by Port 3-149
Figure 3-82 VLAN Port Configuration 3-151
Figure 3-83 Private VLAN Information 3-153
Figure 3-84 Private VLAN Configuration 3-154
Figure 3-85 Private VLAN Association 3-155
Figure 3-86 Private VLAN Port Information 3-156
Figure 3-87 Private VLAN Port Configuration 3-157
xx
Figures
Figure 3-88 Port Priority Configuration 3-159
Figure 3-89 Traffic Classes 3-161
Figure 3-90 Queue Mode 3-162
Figure 3-91 Configuring Queue Scheduling 3-163
Figure 3-92 IP Precedence/DSCP Priority Status 3-164
Figure 3-93 Mapping IP Precedence Priority Values 3-165
Figure 3-94 Mapping IP DSCP Priority Values 3-167
Figure 3-95 IP Port Priority Status 3-168
Figure 3-96 IP Port Priority 3-168
Figure 3-97 ACL CoS Priority 3-170
Figure 3-98 IGMP Configuration 3-172
Figure 3-99 IGMP Immediate Leave 3-173
Figure 3-100 Displaying Multicast Router Port Information 3-174
Figure 3-101 Static Multicast Router Port Configuration 3-175
Figure 3-102 IP Multicast Registration Table 3-176
Figure 3-103 IGMP Member Port Table 3-177
Figure 3-104 Enabling IGMP Filtering and Throttling 3-179
Figure 3-105 IGMP Profile Configuration 3-180
Figure 3-106 IGMP Filter and Throttling Port Configuration 3-182
Figure 3-107 MVR Global Configuration 3-184
Figure 3-108 MVR Port Information 3-185
Figure 3-109 MVR Group IP Information 3-186
Figure 3-110 MVR Port Configuration 3-188
Figure 3-111 MVR Group Member Configuration 3-189
Figure 3-112 DNS General Configuration 3-191
Figure 3-113 DNS Static Host Table 3-192
Figure 3-114 DNS Cache 3-193
Figure 3-115 Cluster Configuration 3-195
Figure 3-116 Cluster Member Configuration 3-196
Figure 3-117 Cluster Member Information 3-196
Figure 3-118 Cluster Candidate Information 3-197
xxi
Figures
xxii
Chapter 1: Introduction
This switch provides a broad range of features for Layer 2 switching. It includes a
management agent that allows you to configure the features listed in this manual.
The default configuration can be used for most of the features provided by this
switch. However, there are many options that you should configure to maximize the
switch’s performance for your particular network environment.
Key Features
Table 1-1 Key Features
FeatureDescription
Configuration Backup
and Restore
AuthenticationConsole, Telnet, web – User name / password, RADIUS, TACACS+
Access Control ListsSupports up to 88 IP or MAC ACLs
DHCP ClientSupported
Port ConfigurationSpeed, duplex mode and flow control
Rate LimitingInput and output rate limiting per port
Port MirroringOne port mirrored to a single analysis port
Port TrunkingSupports up to 4 trunks using either static or dynamic trunking (LACP)
Broadcast Storm
Control
Static AddressUp to 8K MAC addresses in the forwarding table
IEEE 802.1D BridgeSupports dynamic data switching and addresses learning
Store-and-Forward
Switching
Spanning Tree Protocol Supports standard STP and Rapid Spanning Tree Protocol (RSTP)
Virtual LANsUp to 255 using IEEE 802.1Q, port-based, or private VLANs
Traffic PrioritizationDefault port priority, traffic class map, queue scheduling, IP Precedence or
Multicast FilteringSupports IGMP snooping and query
Backup to TFTP server
Web – HTTPS; Telnet – SSH
SNMP – Community strings
Port – IEEE 802.1X, MAC address filtering
Supported
Supported to ensure wire-speed switching while eliminating bad frames
Differentiated Services Code Point (DSCP), and TCP/UDP Port
1-1
Introduction
1
Description of Software Features
The switch provides a wide range of advanced performance enhancing features.
Flow control eliminates the loss of packets due to bottlenecks caused by port
saturation. Broadcast storm suppression prevents broadcast traffic storms from
engulfing the network. Port-based and protocol-based VLANs, plus support for
automatic GVRP VLAN registration provide traffic security and efficient use of
network bandwidth. CoS priority queueing ensures the minimum delay for moving
real-time multimedia data across the network. While multicast filtering provides
support for real-time network applications. Some of the management features are
briefly described below.
Configuration Backup and Restore – You can save the current configuration
settings to a file on a TFTP server, and later download this file to restore the switch
configuration settings.
Authentication – This switch authenticates management access via the console
port, Telnet or web browser. User names and passwords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or TACACS+).
Port-based authentication is also supported via the IEEE 802.1X protocol. This
protocol uses the Extensible Authentication Protocol over LANs (EAPOL) to request
user credentials from the 802.1X client, and then verifies the client’s right to access
the network via an authentication server.
Other authentication options include HTTPS for secure management access via the
web, SSH for secure management access over a Telnet-equivalent connection, IP
address filtering for SNMP/web/Telnet management access, and MAC address
filtering for port access.
Access Control Lists – ACLs provide packet filtering for IP frames (based on
address, protocol, TCP/UDP port number or TCP control code) or any frames
(based on MAC address or Ethernet type). ACLs can be used to improve
performance by blocking unnecessary network traffic or to implement security
controls by restricting access to specific network resources or protocols.
Port Configuration – You can manually configure the speed, duplex mode, and
flow control used on specific ports, or use auto-negotiation to detect the connection
settings used by the attached device. Use the full-duplex mode on ports whenever
possible to double the throughput of switch connections. Flow control should also be
enabled to control network traffic during periods of congestion and prevent the loss
of packets when port buffer thresholds are exceeded. The switch supports flow
control based on the IEEE 802.3x standard.
Rate Limiting – This feature controls the maximum rate for traffic transmitted or
received on an interface. Rate limiting is configured on interfaces at the edge of a
network to limit traffic into or out of the network. Traffic that falls within the rate limit is
transmitted, while packets that exceed the acceptable amount of traffic are dropped.
1-2
Description of Software Features
Port Mirroring – The switch can unobtrusively mirror traffic from any port to a
monitor port. You can then attach a protocol analyzer or RMON probe to this port to
perform traffic analysis and verify connection integrity.
Port Trunking – Ports can be combined into an aggregate connection. Trunks can
be manually set up or dynamically configured using IEEE 802.3ad Link Aggregation
Control Protocol (LACP). The additional ports dramatically increase the throughput
across any connection, and provide redundancy by taking over the load if a port in
the trunk should fail. The switch supports up to four trunks.
Broadcast Storm Control – Broadcast suppression prevents broadcast traffic from
overwhelming the network. When enabled on a port, the level of broadcast traffic
passing through the port is restricted. If broadcast traffic rises above a pre-defined
threshold, it will be throttled until the level falls back beneath the threshold.
Static Addresses – A static address can be assigned to a specific interface on this
switch. Static addresses are bound to the assigned interface and will not be moved.
When a static address is seen on another interface, the address will be ignored and
will not be written to the address table. Static addresses can be used to provide
network security by restricting access for a known host to a specific port.
IEEE 802.1D Bridge – The switch supports IEEE 802.1D transparent bridging. The
address table facilitates data switching by learning addresses, and then filtering or
forwarding traffic based on this information. The address table supports up to 8K
addresses.
Store-and-Forward Switching – The switch copies each frame into its memory
before forwarding them to another port. This ensures that all frames are a standard
Ethernet size and have been verified for accuracy with the cyclic redundancy check
(CRC). This prevents bad frames from entering the network and wasting bandwidth.
To avoid dropping frames on congested ports, the switch provides 8 MB for frame
buffering. This buffer can queue packets awaiting transmission on congested
networks.
Spanning Tree Algorithm – The switch supports these spanning tree protocols:
Spanning Tree Protocol (STP, IEEE 802.1D) – This protocol provides loop detection
and recovery by allowing two or more redundant connections to be created between
a pair of LAN segments. When there are multiple physical paths between segments,
this protocol will choose a single path and disable all others to ensure that only one
route exists between any two stations on the network. This prevents the creation of
network loops. However, if the chosen path should fail for any reason, an alternate
path will be activated to maintain the connection.
Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) – This protocol reduces the
convergence time for network topology changes to 3 to 5 seconds, compared to 30
seconds or more for the older IEEE 802.1D STP standard. It is intended as a
complete replacement for STP, but can still interoperate with switches running the
older standard by automatically reconfiguring ports to STP-compliant mode if they
detect STP protocol messages from attached devices.
1
1-3
Introduction
1
Virtual LANs – The switch supports up to 255 VLANs. A Virtual LAN is a collection
of network nodes that share the same collision domain regardless of their physical
location or connection point in the network. The switch supports tagged VLANs
based on the IEEE 802.1Q standard. Members of VLAN groups can be dynamically
learned via GVRP, or ports can be manually assigned to a specific set of VLANs.
This allows the switch to restrict traffic to the VLAN groups to which a user has been
assigned. By segmenting your network into VLANs, you can:
• Eliminate broadcast storms which severely degrade performance in a flat network.
• Simplify network management for node changes/moves by remotely configuring
VLAN membership for any port, rather than having to manually change the network
connection.
• Provide data security by restricting all traffic to the originating VLAN.
• Use private VLANs to restrict traffic to pass only between data ports and the uplink
ports, thereby isolating adjacent ports within the same VLAN, and allowing you to
limit the total number of VLANs that need to be configured.
Traffic Prioritization – This switch prioritizes each packet based on the required
level of service, using four priority queues with strict or Weighted Round Robin
Queuing. It uses IEEE 802.1p and 802.1Q tags to prioritize incoming traffic based on
input from the end-station application. These functions can
independent priorities for delay-sensitive data and best-effort data.
This switch also supports several common methods of prioritizing layer 3/4 traffic to
meet application requirements. Traffic can be prioritized based on the priority bits in
the IP frame’s Type of Service (ToS) octet or the number of the TCP/UDP port.
When these services are enabled, the priorities are mapped to a Class of Service
value by the switch, and the traffic then sent to the corresponding output queue.
Multicast Filtering – Specific multicast traffic can be assigned to its own VLAN to
ensure that it does not interfere with normal network traffic and to guarantee
real-time delivery by setting the required priority level for the designated VLAN. The
switch uses IGMP Snooping and Query to manage multicast group registration.
be used to provide
1-4
Loading...
+ 482 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.