Community Strings (for SNMP version 1 and 2c clients) 2-6
Trap Receivers 2-7
Configuring Access for SNMP Version 3 Clients 2-8
Saving Configuration Settings 2-8
Managing System Files 2-9
Chapter 3: Configuring the Switch 3-1
Using the Web Interface 3-1
Navigating the Web Browser Interface 3-2
Home Page 3-2
Configuration Options 3-3
Panel Display 3-3
Main Menu 3-4
Basic Configuration 3-9
Displaying System Information 3-9
Displaying Switch Hardware/Software Versions 3-10
Displaying Bridge Extension Capabilities 3-12
Setting the Switch’s IP Address 3-13
Manual Configuration 3-14
Using DHCP/BOOTP 3-15
Configuring Support for Jumbo Frames 3-16
Managing Firmware 3-17
Downloading System Software from a Server 3-18
v
Contents
Saving or Restoring Configuration Settings 3-20
Downloading Configuration Settings from a Server 3-21
Console Port Settings 3-22
Telnet Settings 3-24
Configuring Event Logging 3-26
System Log Configuration 3-26
Remote Log Configuration 3-27
Displaying Log Messages 3-29
Sending Simple Mail Transfer Protocol Alerts 3-29
Resetting the System 3-31
Setting the System Clock 3-32
Configuring SNTP 3-32
Setting the Time Zone 3-33
Simple Network Management Protocol 3-34
Enabling the SNMP Agent 3-35
Setting Community Access Strings 3-36
Specifying Trap Managers and Trap Types 3-37
Configuring SNMPv3 Management Access 3-39
Replacing the Default Secure-site Certificate 3-56
Configuring the Secure Shell 3-57
Generating the Host Key Pair 3-58
Configuring the SSH Server 3-60
Configuring Port Security 3-62
Configuring 802.1X Port Authentication 3-64
Displaying 802.1X Global Settings 3-65
Configuring 802.1X Global Settings 3-66
Configuring Port Settings for 802.1X 3-66
Displaying 802.1X Statistics 3-69
Filtering IP Addresses for Management Access 3-71
Access Control Lists 3-73
Configuring Access Control Lists 3-73
Setting the ACL Name and Type 3-74
Configuring a Standard IP ACL 3-74
Configuring an Extended IP ACL 3-75
Configuring a MAC ACL 3-78
vi
Contents
Configuring ACL Masks 3-80
Specifying the Mask Type 3-80
Configuring an IP ACL Mask 3-81
Configuring a MAC ACL Mask 3-83
Binding a Port to an Access Control List 3-84
Port Configuration 3-85
Displaying Connection Status 3-85
Configuring Interface Connections 3-88
Creating Trunk Groups 3-90
Statically Configuring a Trunk 3-91
Enabling LACP on Selected Ports 3-92
Configuring LACP Parameters 3-94
Displaying LACP Port Counters 3-97
Displaying LACP Settings and Status for the Local Side 3-98
Displaying LACP Settings and Status for the Remote Side 3-100
Setting Broadcast Storm Thresholds 3-101
Configuring Port Mirroring 3-103
Configuring Rate Limits 3-104
Showing Port Statistics 3-105
Address Table Settings 3-109
Setting Static Addresses 3-109
Displaying the Address Table 3-110
Changing the Aging Time 3-112
Spanning Tree Algorithm Configuration 3-112
Displaying Global Settings 3-113
Configuring Global Settings 3-116
Displaying Interface Settings 3-120
Configuring Interface Settings 3-123
Configuring Multiple Spanning Trees 3-125
Displaying Interface Settings for MSTP 3-129
Configuring Interface Settings for MSTP 3-130
VLAN Configuration 3-132
IEEE 802.1Q VLANs 3-132
Enabling or Disabling GVRP (Global Setting) 3-135
Displaying Basic VLAN Information 3-135
Displaying Current VLANs 3-136
Creating VLANs 3-137
Adding Static Members to VLANs (VLAN Index) 3-138
Adding Static Members to VLANs (Port Index) 3-140
Configuring VLAN Behavior for Interfaces 3-141
Configuring Private VLANs 3-143
Enabling Private VLANs 3-143
Configuring Uplink and Downlink Ports 3-144
Configuring Protocol-Based VLANs 3-144
Configuring Protocol Groups 3-145
vii
Contents
Mapping Protocols to VLANs 3-146
Class of Service Configuration 3-147
Layer 2 Queue Settings 3-147
Setting the Default Priority for Interfaces 3-147
Mapping CoS Values to Egress Queues 3-149
Selecting the Queue Mode 3-151
Setting the Service Weight for Traffic Classes 3-151
Layer 3/4 Priority Settings 3-153
Mapping Layer 3/4 Priorities to CoS Values 3-153
Selecting IP Precedence/DSCP Priority 3-153
Mapping IP Precedence 3-154
Mapping DSCP Priority 3-155
Mapping IP Port Priority 3-157
Mapping CoS Values to ACLs 3-158
Multicast Filtering 3-159
IGMP Protocol 3-160
Layer 2 IGMP (Snooping and Query) 3-160
Configuring IGMP Snooping and Query Parameters 3-161
Displaying Interfaces Attached to a Multicast Router 3-163
Specifying Static Interfaces for a Multicast Router 3-164
Displaying Port Members of Multicast Services 3-165
Assigning Ports to Multicast Services 3-166
Configuring Domain Name Service 3-167
Configuring General DNS Service Parameters 3-167
Configuring Static DNS Host to Address Entries 3-169
Displaying the DNS Cache 3-171
Chapter 4: Command Line Interface 4-1
Using the Command Line Interface 4-1
Accessing the CLI 4-1
Console Connection 4-1
Telnet Connection 4-1
Entering Commands 4-3
Keywords and Arguments 4-3
Minimum Abbreviation 4-3
Command Completion 4-3
Getting Help on Commands 4-3
Showing Commands 4-4
Partial Keyword Lookup 4-5
Negating the Effect of Commands 4-5
Using Command History 4-5
Understanding Command Modes 4-5
Exec Commands 4-6
Configuration Commands 4-6
viii
Contents
Command Line Processing 4-7
Command Groups 4-8
Line Commands 4-9
line 4-10
login 4-11
password 4-12
timeout login response 4-12
exec-timeout 4-13
password-thresh 4-14
silent-time 4-14
databits 4-15
parity 4-16
speed 4-16
stopbits 4-17
disconnect 4-17
show line 4-18
General Commands 4-19
enable 4-19
disable 4-20
configure 4-20
show history 4-21
reload 4-21
end 4-22
exit 4-22
quit 4-23
System Management Commands 4-23
Device Designation Commands 4-24
prompt 4-24
hostname 4-24
User Access Commands 4-25
username 4-25
enable password 4-26
IP Filter Commands 4-27
management 4-27
show management 4-28
Web Server Commands 4-29
ip http port 4-29
ip http server 4-29
ip http secure-server 4-30
ip http secure-port 4-31
Telnet Server Commands 4-32
ip telnet server 4-32
Secure Shell Commands 4-32
ip ssh server 4-35
ip ssh timeout 4-35
ix
Contents
ip ssh authentication-retries 4-36
ip ssh server-key size 4-36
delete public-key 4-37
ip ssh crypto host-key generate 4-37
ip ssh crypto zeroize 4-38
ip ssh save host-key 4-39
show ip ssh 4-39
show ssh 4-39
show public-key 4-40
Event Logging Commands 4-41
logging on 4-42
logging history 4-42
logging host 4-43
logging facility 4-44
logging trap 4-44
clear log 4-45
show logging 4-46
show log 4-47
access-list ip 4-88
access-list ip extended fragment-auto-mask 4-89
permit, deny (Standard ACL) 4-89
permit, deny (Extended ACL) 4-90
show ip access-list 4-92
access-list ip mask-precedence 4-92
mask (IP ACL) 4-93
show access-list ip mask-precedence 4-96
ip access-group 4-97
show ip access-group 4-97
map access-list ip 4-98
xi
Contents
show map access-list ip 4-98
match access-list ip 4-99
show marking 4-100
MAC ACLs 4-100
access-list mac 4-101
permit, deny (MAC ACL) 4-102
show mac access-list 4-103
access-list mac mask-precedence 4-104
mask (MAC ACL) 4-104
show access-list mac mask-precedence 4-106
mac access-group 4-107
show mac access-group 4-107
map access-list mac 4-108
show map access-list mac 4-108
match access-list mac 4-109
ACL Information 4-110
show access-list 4-110
show access-group 4-110
SNMP Commands 4-111
snmp-server 4-111
show snmp 4-112
snmp-server community 4-113
snmp-server contact 4-113
snmp-server location 4-114
snmp-server host 4-114
snmp-server enable traps 4-116
snmp-server engine-id 4-117
show snmp engine-id 4-118
snmp-server view 4-119
show snmp view 4-120
snmp-server group 4-120
show snmp group 4-121
snmp-server user 4-122
show snmp user 4-124
Interface Commands 4-125
interface 4-125
description 4-126
speed-duplex 4-126
negotiation 4-127
capabilities 4-128
shutdown 4-129
switchport broadcast packet-rate 4-129
clear counters 4-130
show interfaces status 4-130
show interfaces counters 4-131
protocol-vlan protocol-group (Configuring Groups) 4-179
protocol-vlan protocol-group (Configuring Interfaces) 4-179
show protocol-vlan protocol-group 4-180
show interfaces protocol-vlan protocol-group 4-181
GVRP and Bridge Extension Commands 4-181
bridge-ext gvrp 4-182
show bridge-ext 4-182
switchport gvrp 4-183
show gvrp configuration 4-183
garp timer 4-184
show garp timer 4-185
Priority Commands 4-185
Priority Commands (Layer 2) 4-186
queue mode 4-186
switchport priority default 4-187
queue bandwidth 4-188
queue cos-map 4-188
show queue mode 4-189
show queue bandwidth 4-190
show queue cos-map 4-190
Priority Commands (Layer 3 and 4) 4-191
map ip port (Global Configuration) 4-191
map ip port (Interface Configuration) 4-191
map ip precedence (Global Configuration) 4-192
map ip precedence (Interface Configuration) 4-193
map ip dscp (Global Configuration) 4-193
xiv
Contents
map ip dscp (Interface Configuration) 4-194
show map ip port 4-195
show map ip precedence 4-196
show map ip dscp 4-196
Multicast Filtering Commands 4-197
IGMP Snooping Commands 4-198
ip igmp snooping 4-198
ip igmp snooping vlan static 4-198
ip igmp snooping version 4-199
show ip igmp snooping 4-199
show mac-address-table multicast 4-200
IGMP Query Commands (Layer 2) 4-201
ip igmp snooping querier 4-201
ip igmp snooping query-count 4-201
ip igmp snooping query-interval 4-202
ip igmp snooping query-max-response-time 4-202
ip igmp snooping router-port-expire-time 4-203
Static Multicast Routing Commands 4-204
ip igmp snooping vlan mrouter 4-204
show ip igmp snooping mrouter 4-205
IP Interface Commands 4-205
Basic IP Configuration 4-205
ip address 4-206
ip default-gateway 4-207
ip dhcp restart 4-207
show ip interface 4-208
show ip redirects 4-208
ping 4-209
DNS Commands 4-210
ip host 4-210
clear host 4-211
ip domain-name 4-211
ip domain-list 4-212
ip name-server 4-213
ip domain-lookup 4-214
show hosts 4-215
show dns 4-215
show dns cache 4-216
clear dns cache 4-216
xv
Contents
Appendix A: Software Specifications A-1
Software Features A-1
Management Features A-2
Standards A-2
Management Information Bases A-3
Appendix B: Troubleshooting B-1
Problems Accessing the Management Interface B-1
Using System Logs B-2
Figure 3-1Home Page 3-2
Figure 3-2Front Panel Indicators 3-3
Figure 3-3System Information 3-9
Figure 3-4Switch Information 3-11
Figure 3-5Displaying Bridge Extension Configuration 3-12
Figure 3-6IP Interface Configuration - Manual 3-14
Figure 3-7Default Gateway 3-14
Figure 3-8IP Interface Configuration - DHCP 3-15
Figure 3-9Configuring Support for Jumbo Frames 3-16
Figure 3-10Copy Firmware 3-18
Figure 3-11Setting the Startup Code 3-18
Figure 3-12Deleting Files 3-19
Figure 3-13Downloading Configuration Settings for Start-Up 3-21
Figure 3-14Setting the Startup Configuration Settings 3-21
Figure 3-15Configuring the Console Port 3-23
Figure 3-16Configuring the Telnet Interface 3-25
Figure 3-17System Logs 3-27
Figure 3-18Remote Logs 3-28
Figure 3-19Displaying Logs 3-29
Figure 3-20Enabling and Configuring SMTP Alerts 3-30
Figure 3-21Resetting the System 3-31
Figure 3-22SNTP Configuration 3-32
Figure 3-23Clock Time Zone 3-33
Figure 3-24Enabling the SNMP Agent 3-35
Figure 3-25Configuring SNMP Community Strings 3-36
Figure 3-26Configuring SNMP Trap Managers 3-39
Figure 3-27Setting the SNMPv3 Engine ID 3-40
Figure 3-28Setting an Engine ID 3-41
Figure 3-29Configuring SNMPv3 Users 3-42
Figure 3-30Configuring Remote SNMPv3 Users 3-44
Figure 3-31Configuring SNMPv3 Groups 3-48
Figure 3-32Configuring SNMPv3 Views 3-49
Figure 3-33User Accounts 3-51
Figure 3-34Authentication Server Settings 3-54
Figure 3-35HTTPS Settings 3-56
Figure 3-36SSH Host-Key Settings 3-59
Figure 3-37SSH Server Settings 3-61
Figure 3-38Port Security 3-63
Figure 3-39802.1X Global Information 3-65
Figure 3-40802.1X Global Configuration 3-66
Figure 3-41802.1X Port Configuration 3-67
xxi
Figures
Figure 3-42802.1X Port Statistics 3-70
Figure 3-43IP Filter 3-72
Figure 3-44Selecting ACL Type 3-74
Figure 3-45ACL Configuration - Standard IP 3-75
Figure 3-46ACL Configuration - Extended IP 3-77
Figure 3-47ACL Configuration - MAC 3-79
Figure 3-48Selecting ACL Mask Types 3-80
Figure 3-49ACL Mask Configuration - IP 3-82
Figure 3-50ACL Mask Configuration - MAC 3-83
Figure 3-51ACL Port Binding 3-85
Figure 3-52Port - Port Information 3-86
Figure 3-53Port - Port Configuration 3-89
Figure 3-54Static Trunk Configuration 3-91
Figure 3-55LACP Trunk Configuration 3-93
Figure 3-56LACP - Aggregation Port 3-95
Figure 3-57LACP - Port Counters Information 3-97
Figure 3-58LACP - Port Internal Information 3-99
Figure 3-59LACP - Port Neighbors Information 3-100
Figure 3-60Port Broadcast Control 3-102
Figure 3-61Mirror Port Configuration 3-103
Figure 3-62Rate Limit Configuration 3-104
Figure 3-63Port Statistics 3-108
Figure 3-64Static Addresses 3-110
Figure 3-65Dynamic Addresses 3-111
Figure 3-66Address Aging 3-112
Figure 3-67STA Information 3-115
Figure 3-68STA Global Configuration 3-119
Figure 3-69STA Port Information 3-122
Figure 3-70STA Port Configuration 3-125
Figure 3-71MSTP VLAN Configuration 3-127
Figure 3-72MSTP Port Information 3-129
Figure 3-73MSTP Port Configuration 3-131
Figure 3-74Globally Enabling GVRP 3-135
Figure 3-75VLAN Basic Information 3-135
Figure 3-76VLAN Current Table 3-136
Figure 3-77VLAN Static List - Creating VLANs 3-138
Figure 3-78VLAN Static Table - Adding Static Members 3-139
Figure 3-79VLAN Static Membership by Port 3-140
Figure 3-80VLAN Port Configuration 3-142
Figure 3-81Private VLAN Status 3-143
Figure 3-82Private VLAN Link Status 3-144
Figure 3-83Protocol VLAN Configuration 3-145
Figure 3-84Protocol VLAN Port Configuration 3-146
Figure 3-85Default Port Priority 3-148
Figure 3-86Traffic Classes 3-150
xxii
Figures
Figure 3-87Queue Mode 3-151
Figure 3-88Queue Scheduling 3-152
Figure 3-89IP Precedence/DSCP Priority Status 3-153
Figure 3-90IP Precedence Priority 3-154
Figure 3-91IP DSCP Priority 3-156
Figure 3-92IP Port Priority Status 3-157
Figure 3-93IP Port Priority 3-157
Figure 3-94ACL CoS Priority 3-159
Figure 3-95IGMP Configuration 3-162
Figure 3-96Multicast Router Port Information 3-163
Figure 3-97Static Multicast Router Port Configuration 3-164
Figure 3-98Displaying Port Members of Multicast Services 3-165
Figure 3-99Specifying Multicast Port Membership 3-166
Figure 3-100 DNS General Configuration 3-168
Figure 3-101 DNS Static Host Table 3-170
Figure 3-102 DNS Cache 3-171
xxiii
Figures
xxiv
Chapter 1: Introduction
This switch provides a broad range of features for Layer 2 switching. It includes a
management agent that allows you to configure the features listed in this manual.
The default configuration can be used for most of the features provided by this
switch. However, there are many options that you should configure to maximize the
switch’s performance for your particular network environment.
Key Features
Table 1-1 Key Features
FeatureDescription
Configuration Backup
and Restore
AuthenticationConsole, Telnet, web – User name / password, RADIUS, TACACS+
Access Control ListsSupports up to 32 IP or MAC ACLs
DHCP ClientSupported
DNS Client and proxy service
Port ConfigurationSpeed and duplex mode
Rate LimitingInput and output rate limiting per port
Port MirroringOne or more ports mirrored to single analysis port
Port TrunkingSupports up to 4 trunks using either static or dynamic trunking (LACP)
Broadcast Storm
Control
Address TableUp to 16K MAC addresses in forwarding table
IEEE 802.1D BridgeSupports dynamic data switching and addresses learning
Store-and-Forward
Switching
Spanning Tree
Algorithm
Virtual LANsUp to 255 using IEEE 802.1Q, port-based, protocol-based, or private VLANs
Traffic PrioritizationDefault port priority, traffic class map, queue scheduling, IP Precedence, or
Multicast FilteringSupports IGMP snooping and query
Backup to TFTP server
Web – SSL/HTTPS; Telnet – SSH
SNMP v1/2c - Community strings
SNMP version 3 – MD5 or SHA password
Port – IEEE 802.1X, MAC address filtering
Supported
Supported to ensure wire-speed switching while eliminating bad frames
Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and Multiple
Spanning Trees (MSTP)
Differentiated Services Code Point (DSCP), and TCP/UDP Port
1-1
Introduction
1
Description of Software Features
The switch provides a wide range of advanced performance enhancing features.
Broadcast storm suppression prevents broadcast traffic storms from engulfing the
network. Untagged (port-based), tagged, and protocol-based VLANs, plus support
for automatic GVRP VLAN registration provide traffic security and efficient use of
network bandwidth. CoS priority queueing ensures the minimum delay for moving
real-time multimedia data across the network. While multicast filtering provides
support for real-time network applications. Some of the management features are
briefly described below.
Configuration Backup and Restore – You can save the current configuration
settings to a file on a TFTP server, and later download this file to restore the switch
configuration settings.
Authentication – This switch authenticates management access via the console
port, Telnet or web browser. User names and passwords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or TACACS+).
Port-based authentication is also supported via the IEEE 802.1X protocol. This
protocol uses Extensible Authentication Protocol over LANs (EAPOL) to request
user credentials from the 802.1X client, and then uses the EAP between the switch
and the authentication server to verify the client’s right to access the network via an
authentication server (i.e., RADIUS server).
Other authentication options include HTTPS for secure management access via the
web, SSH for secure management access over a Telnet-equivalent connection,
SNMP Version 3, IP address filtering for SNMP/web/Telnet management access,
and MAC address filtering for port access.
Access Control Lists – ACLs provide packet filtering for IP frames (based on
address, protocol, TCP/UDP port number or TCP control code) or any frames
(based on MAC address or Ethernet type). ACLs can by used to improve
performance by blocking unnecessary network traffic or to implement security
controls by restricting access to specific network resources or protocols.
Rate Limiting – This feature controls the maximum rate for traffic transmitted or
received on an interface. Rate limiting is configured on interfaces at the edge of a
network to limit traffic into or out of the network. Traffic that falls within the rate limit is
transmitted, while packets that exceed the acceptable amount of traffic are dropped.
Port Mirroring – The switch can unobtrusively mirror traffic from any port to a
monitor port. You can then attach a protocol analyzer or RMON probe to this port to
perform traffic analysis and verify connection integrity.
Port Trunking – Ports can be combined into an aggregate connection. Trunks can
be manually set up or dynamically configured using IEEE 802.3-2002 (formerly
IEEE 802.3ad) Link Aggregation Control Protocol (LACP). The additional ports
dramatically increase the throughput across any connection, and provide
redundancy by taking over the load if a port in the trunk should fail. The switch
supports up to 4 trunks.
1-2
Description of Software Features
Broadcast Storm Control – Broadcast suppression prevents broadcast traffic from
overwhelming the network. When enabled on a port, the level of broadcast traffic
passing through the port is restricted. If broadcast traffic rises above a pre-defined
threshold, it will be throttled until the level falls back beneath the threshold.
Static Addresses – A static address can be assigned to a specific interface on this
switch. Static addresses are bound to the assigned interface and will not be moved.
When a static address is seen on another interface, the address will be ignored and
will not be written to the address table. Static addresses can be used to provide
network security by restricting access for a known host to a specific port.
IEEE 802.1D Bridge – The switch supports IEEE 802.1D transparent bridging. The
address table facilitates data switching by learning addresses, and then filtering or
forwarding traffic based on this information. The address table supports up to 16K
addresses.
Store-and-Forward Switching – The switch copies each frame into its memory
before forwarding them to another port. This ensures that all frames are a standard
Ethernet size and have been verified for accuracy with the cyclic redundancy check
(CRC). This prevents bad frames from entering the network and wasting bandwidth.
To avoid dropping frames on congested ports, the switch provides 256 KB for frame
buffering. This buffer can queue packets awaiting transmission on congested
networks.
Spanning Tree Algorithm – The switch supports these spanning tree protocols:
Spanning Tree Protocol (STP, IEEE 802.1D) – This protocol provides loop detection
and recovery by allowing two or more redundant connections to be created between
a pair of LAN segments. When there are multiple physical paths between segments,
this protocol will choose a single path and disable all others to ensure that only one
route exists between any two stations on the network. This prevents the creation of
network loops. However, if the chosen path should fail for any reason, an alternate
path will be activated to maintain the connection.
Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) – This protocol reduces the
convergence time for network topology changes to about 3 to 5 seconds, compared
to 30 seconds or more for the older IEEE 802.1D STP standard. It is intended as a
complete replacement for STP, but can still interoperate with switches running the
older standard by automatically reconfiguring ports to STP-compliant mode if they
detect STP protocol messages from attached devices.
Multiple Spanning Tree Protocol (MSTP, IEEE 802.1s) – This protocol is a direct
extension of RSTP. It can provide an independent spanning tree for different VLANs.
It simplifies network management, provides for even faster convergence than RSTP
by limiting the size of each region, and prevents VLAN members from being
segmented from the rest of the group (as sometimes occurs with IEEE 802.1D STP).
Virtual LANs – The switch supports up to 255 VLANs. A Virtual LAN is a collection
of network nodes that share the same collision domain regardless of their physical
location or connection point in the network. The switch supports tagged VLANs
based on the IEEE 802.1Q standard. Members of VLAN groups can be dynamically
1
1-3
Introduction
1
learned via GVRP, or ports can be manually assigned to a specific set of VLANs.
This allows the switch to restrict traffic to the VLAN groups to which a user has been
assigned. By segmenting your network into VLANs, you can:
• Eliminate broadcast storms which severely degrade performance in a flat network.
• Simplify network management for node changes/moves by remotely configuring
VLAN membership for any port, rather than having to manually change the network
connection.
• Provide data security by restricting all traffic to the originating VLAN.
• Use private VLANs to restrict traffic to pass only between data ports and the uplink
ports, thereby isolating adjacent ports within the same VLAN, and allowing you to
limit the total number of VLANs that need to be configured.
• Use protocol VLANs to restrict traffic to specified interfaces based on protocol type.
Traffic Prioritization – This switch prioritizes each packet based on the required
level of service, using eight priority queues with strict or Weighted Round Robin
Queuing. It uses IEEE 802.1p and 802.1Q tags to prioritize incoming traffic based on
input from the end-station application. These functions can
independent priorities for delay-sensitive data and best-effort data.
This switch also supports several common methods of prioritizing layer 3/4 traffic to
meet application requirements. Traffic can be prioritized based on the priority bits in
the IP frame’s Type of Service (ToS) octet or the number of the TCP/UDP port.
When these services are enabled, the priorities are mapped to a Class of Service
value by the switch, and the traffic then sent to the corresponding output queue.
Multicast Filtering – Specific multicast traffic can be assigned to its own VLAN to
ensure that it does not interfere with normal network traffic and to guarantee
real-time delivery by setting the required priority level for the designated VLAN. The
switch uses IGMP Snooping and Query to manage multicast group registration.
be used to provide
System Defaults
The switch’s system defaults are provided in the configuration file
“Factory_Default_Config.cfg.” To reset the switch defaults, this file should be set as
the startup configuration file (page 3-21).
The following table lists some of the basic system defaults.