◆ Optional blades include 10BASE-T/100BASE-TX, 100BASE-FX,
1000BASE-SX/LX, 10/100/1000BASE-T, GBIC
◆ 12 slots available for media expansion
◆ 24 Gbps switch fabric for non-blocking switching performance
◆ Security features to prevent intruder access and ensure a safe network
environment
◆ Full support for IEEE 802.1Q VLANs with GVRP
◆ QoS support for IEEE 802.1p priority
◆ IGMP and DVMRP multicast support
◆ Optional redundant power, fan, and switch fabric failover support
◆ Manageable via console, web, SNMP/RMON
◆ Supports CIDR, multinetting
Software Configuraton Guide
SMC9712G
TigerChassis 10/100/1000
Key Information Guide
From SMC’s Tiger line of feature-rich workgroup LAN solutions
38 Tesla
Irvine, CA 92618
Phone: (949) 679-8000
February 2002
Pub. # 150200009100A R01
Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is
assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its
use. No license is granted by implication or otherwise under any patent or patent rights of SMC. SMC reserves the right to
change specifications at any time without notice.
SMC is a registered trademark; and TigerChassis is a trademarks of SMC Networks, Inc. Other product and company names are trademarks
or registered trademarks of their respective holders.
L
IMITED
Limited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship
and materials, under normal use and service, for the applicable warranty term. All SMC products carry a standard 90-day
limited warranty from the date of purchase from SMC or its Authorized Reseller. SMC may, at its own discretion, repair or
replace any product not operating as warranted with a similar or functionally equivalent product, during the applicable
warranty term. SMC will endeavor to repair or replace any product returned under warranty within 30 days of receipt of the
product.
The standard limited warranty can be upgraded to a Limited Lifetime* warranty by registering new products within 30 days
of purchase from SMC or its Authorized Reseller. Registration can be accomplished via the enclosed product registration
card or online via the SMC web site. Failure to register will not affect the standard limited warranty. The Limited Lifetime
warranty covers a product during the Life of that Product, which is defined as the period of time during which the product is
an “Active” SMC product. A product is considered to be “Active” while it is listed on the current SMC price list. As new
technologies emerge, older technologies become obsolete and SMC will, at its discretion, replace an older product in its
product line with one that incorporates these newer technologies. At that point, the obsolete product is discontinued and is
no longer an “Active” SMC product. A list of discontinued products with their respective dates of discontinuance can be
found at:
All products that are replaced become the property of SMC. Replacement products may be either new or reconditioned. Any
replaced or repaired product carries either a 30-day limited warranty or the remainder of the initial warranty, whichever is
longer. SMC is not responsible for any custom software or firmware, configuration information, or memory data of
Customer contained in, stored on, or integrated with any products returned to SMC pursuant to any warranty. Products
returned to SMC should have any customer-installed accessory or add-on components, such as expansion modules, removed
prior to returning the product for replacement. SMC is not responsible for these items if they are returned with the product.
Customers must contact SMC for a Return Material Authorization number prior to returning any product to SMC. Proof of
purchase may be required. Any product returned to SMC without a valid Return Material Authorization (RMA) number
clearly marked on the outside of the package will be returned to customers at customer’s expense. For warranty claims within
North America, please call our toll-free customer support number at (800) 762-4968. Customers are responsible for all
shipping charges from their facility to SMC. SMC is responsible for return shipping charges from SMC to customer.
WARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE,
CUSTOMER’S SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT OF THE PRODUCT IN QUESTION, AT
SMC’S OPTION. THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF
ALL OTHER WARRANTIES OR CONDITIONS, EXPRESS OR IMPLIED, EITHER IN FACT OR BY OPERATION
OF LAW, STATUTORY OR OTHERWISE, INCLUDING WARRANTIES OR CONDITIONS OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. SMC NEITHER ASSUMES NOR
AUTHORIZES ANY OTHER PERSON TO ASSUME FOR IT ANY OTHER LIABILITY IN CONNECTION WITH
THE SALE, INSTALLATION, MAINTENANCE OR USE OF ITS PRODUCTS. SMC SHALL NOT BE LIABLE
UNDER THIS WARRANTY IF ITS TESTING AND EXAMINATION DISCLOSE THE ALLEGED DEFECT IN
THE PRODUCT DOES NOT EXIST OR WAS CAUSED BY CUSTOMER’S OR ANY THIRD PERSON’S MISUSE,
NEGLECT, IMPROPER INSTALLATION OR TESTING, UNAUTHORIZED ATTEMPTS TO REPAIR, OR ANY
OTHER CAUSE BEYOND THE RANGE OF THE INTENDED USE, OR BY ACCIDENT, FIRE, LIGHTNING, OR
OTHER HAZARD.
LIMITATION OF LIABILITY: IN NO EVENT, WHETHER BASED IN CONTRACT OR TORT (INCLUDING
NEGLIGENCE), SHALL SMC BE LIABLE FOR INCIDENTAL, CONSEQUENTIAL, INDIRECT, SPECIAL, OR
PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE, LOSS OF BUSINESS, OR OTHER
FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE, INSTALLATION,
W
ARRANTY
i
L
IMITED WARRANTY
MAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF SMC OR
ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES OR THE LIMITATION OF
INCIDENTAL OR CONSEQUENTIAL DAMAGES FOR CONSUMER PRODUCTS, SO THE ABOVE LIMITATIONS
AND EXCLUSIONS MAY NOT APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS,
WHICH MAY VARY FROM STATE TO STATE. NOTHING IN THIS WARRANTY SHALL BE TAKEN TO AFFECT
YOUR STATUTORY RIGHTS.
* SMC will provide warranty service for one year following discontinuance from the active SMC price list. Under the limited
lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date
of purchase.
SMC Networks, Inc.
38 Tesla
Irvine, CA 92618
ii
CONTENTS
ABOUT THIS GUIDE
Audience15
Scope of this Guide15
Using This Book15
What is Management Software?21
Summary of Software Features22
Software Features Explained23
Duplex Modes23
Flow Control23
Traffic Prioritization23
Security24
Aggregate Links24
Broadcast Storm Control25
Virtual LANs25
Spanning Tree Protocol25
IGMP Snooping25
ARP and Proxy ARP26
Routing Protocols26
RMON26
Roving Analysis 26
Management27
Default Settings28
2PREPARINGFOR SYSTEM MANAGEMENT
Methods of Managing a Switch30
Web Interface Management30
Accessing the Web Interface31
CLI Management32
Accessing the CLI32
Accessing the CLI through the Console Port32
Accessing the CLI Over the Network via Direct Telnet33
Accessing the CLI Over the Network via Indirect Telnet33
SNMP-Based Network Management33
Connecting to the System35
Quick Configuration Reference35
Saving Configuration Values35
Initial Access35
Logging into the System36
Terminating a Connection36
Configuring User Names, Passwords and Community Strings36
Configuring User Logins37
Determining IP Information38
Which IP Addresses to Use in Your Network38
Subnet Masks38
Default Gateway Router39
Configuring IP Settings39
Manual Configuration39
Automatic Configuration40
Configuring Access for SNMP Management40
Using the Web Interface41
Browser and Platform Requirements41
Color Recommendations41
Browser Support41
Embedded Web Management Applications42
Interface Description42
Device View Tab43
Using Configuration Wizards44
Using the Device Image45
Help View Tab46
Using the Administration Console47
Administration Console Menus47
Using Menus to Perform Tasks48
Selecting Menu Options48
Navigating Through the Menus49
Entering a Command String49
Entering Abbreviated Commands49
Recommendations for Entering Commands49
Understanding the Values Presented50
Including Values in Command Strings50
Keystroke Functions50
3SYSTEM MANAGEMENT FEATURES
Basic Configuration Procedure52
Configure the Management Module52
Configure Each Interface Module52
Related Standards and Protocols142
Tagging Types142
VLAN IDs143
Independent VLAN Learning143
Terminology143
Key Guidelines for Implementation144
Design Guidelines144
Procedural Guidelines144
General Guidelines144
Port-based VLANs145
The Default VLAN145
Modifying the Default VLAN145
Trunking and the Default VLAN146
User-Configured Port-based VLANs147
Important Considerations147
Example 1: A Single VLAN Configuration148
Example 2: Two VLANs with Untagged Ports149
Example 3: VLANs with Tagged Ports150
Rules of VLAN Operation152
Ingress Rules152
Egress Rules154
Standard Bridging Rules for Outgoing Frames154
Tag Status Rules154
Examples of Flooding and Forwarding Decisions154
Example 1: Flooding Decisions for VLANs154
Example 2: VLAN Exception Flooding155
Modifying and Removing VLANs155
Configuring VLANs156
bridge vlan summary156
bridge vlan detail157
bridge vlan create158
bridge vlan modify addPort159
bridge vlan modify removePort160
bridge vlan modify name160
bridge vlan delete161
Standards, Protocols, and Related Reading161
8MULTICAST FILTERING
IP Multicast Overview164
Unicast Model164
Broadcast Model164
Multicast Model164
Benefits of IP Multicast164
How a Network Supports IP Multicast165
IP Multicast Routing165
Supporting Protocols in Your Switch165
IP Multicast Filtering166
Supporting Protocols in Your Switch166
Key Concepts167
Traffic Movement167
IP Multicast Groups167
Source-Group Pairs167
Multicast Addresses167
Registered Groups167
Reserved MAC Addresses168
How IGMP Supports IP Multicast169
Electing the Querier169
Query Messages169
Host Messages169
Response to Queries169
Join Message169
Leave-Group Messages169
Role of IGMP in IP Multicast Filtering170
Key Guidelines for Implementation170
Configuration Procedure170
Impact of IEEE 802.1Q on Multicasts170
Configuring IGMP Snooping171
bridge multicastFilter routerPort removePort174
Standards, Protocols, and Related Reading174
9PRIORITY QUEUEING
Overview176
Key Concepts177
Basic Elements of the Standard177
Format of Prioritized Packets177
Queues and Priority Levels178
QoS in Your System178
QoS Architecture178
Important Considerations179
Handling Tagged and Untagged Packets179
Configuring QoS180
trafficManagement qos modify180
bridge port defaultPriority181
Standards, Protocols, and Related Reading181
10IP ROUTING
Routing Overview184
Routing in a Subnetworked Environment185
Integrating Bridging and Routing186
Bridging and Routing Models186
SMC Bridging and Routing187
IP Routing Overview189
Features and Benefits189
Key Concepts190
Multiple IP Interfaces per VLAN190
Media Access Control (MAC) Address190
Network-Layer Address190
IP Addresses191
VLAN-based Routing200
Key Guidelines for Implementing IP Routing200
Configure Trunks (Optional)200
Configure IP VLANs200
Establish IP Interfaces201
Interface Parameters201
Important Consideration201
Defining an IP Interface201
Administering IP Routing202
Configuring IP Interfaces203
protocol ip interface summary203
protocol ip interface create205
protocol ip interface modify206
protocol ip interface delete207
Configuring Static Routes208
protocol ip route summary208
protocol ip route add209
protocol ip route findRoute210
Important Considerations210
protocol ip route remove211
protocol ip route flush211
protocol ip route default212
protocol ip route noDefault212
Address Resolution Protocol (ARP)213
Configuring the ARP Cache215
protocol ip arp display215
protocol ip arp static216
protocol ip arp remove217
protocol ip arp flush217
protocol ip arp flushDynamic218
protocol ip arp flushFFT218
protocol ip arp age219
protocol ip arp statistics220
ARP Proxy221
Example221
protocol ip interface arpproxy222
Internet Control Message Protocol (ICMP)223
ICMP Redirect224
Important Considerations224
Routing Information Protocol (RIP)225
Basic RIP Parameters225
Router Mode225
Cost225
Update Time226
Send and Receive Modes226
Poison Reverse226
Advertisement Address227
RIP-1 Versus RIP-2227
Important Considerations227
Configuring RIP228
protocol ip rip summary228
protocol ip rip mode229
protocol ip rip cost229
Options229
protocol ip rip sendMode230
protocol ip rip receiveMode231
protocol ip rip updateTime231
protocol ip rip poisonReverse232
protocol ip rip authenticationMode233
protocol ip rip statistics234
protocol ip rip neighbors234
Domain Name System (DNS)235
Important Considerations235
Standards, Protocols, and Related Reading236
Requests For Comments (RFCs)236
Standards Organizations236
11OSPF ROUTING
OSPF Overview238
Features238
Benefits239
Key Concepts241
Autonomous Systems241
Areas241
Neighbors and Adjacency241
Router Types241
Router IDs242
Protocol Packets242
How OSPF Routing Works243
Starting Up243
Finding Neighbors243
Establishing Adjacencies243
Electing the Backup Designated Router243
Electing the Designated Router243
Calculating Shortest Path Trees244
Routing Packets244
Key Guidelines for Implementing OSPF245
Autonomous System Boundary Routers246
Configuring an ASBR246
Areas247
Types of Areas247
Area Border Routers249
Routing Databases249
Configuring Route Summarization in ABRs249
Important Considerations250
OSPF Interfaces251
Mode252
Priority252
Using Priority to Select a Designated Router252
Area ID253
Cost253
Specifying Cost Metrics for Preferred Paths253
Delay254
Hello Interval254
Retransmit Interval254
Dead Interval255
Password255
Statistics255
Important Considerations255
Link State Databases257
Router Link State Advertisements257
Network Link State Advertisements258
Summary Link State Advertisements258
External Link State Advertisements259
Important Considerations260
Neighbors260
Neighbor Information260
Static Neighbors262
Important Considerations262
Router IDs263
Important Considerations263
Stub Default Metrics264
Important Considerations264
Virtual Links265
Important Considerations266
OSPF Statistics266
Configuring OSPF267
protocol ip ospf areas display267
protocol ip ospf areas defineArea267
protocol ip ospf areas modifyArea268
protocol ip ospf areas removeArea268
protocol ip ospf areas addRange268
protocol ip ospf areas modifyRange269
protocol ip ospf areas removeRange269
protocol ip ospf interface summary270
protocol ip ospf interface detail271
protocol ip ospf interface statistics272
protocol ip ospf interface mode274
protocol ip ospf interface priority275
protocol ip ospf interface areaID275
protocol ip ospf interface cost276
protocol ip ospf interface delay276
protocol ip ospf interface hello277
protocol ip ospf interface retransmit277
protocol ip ospf interface dead278
protocol ip ospf interface password278
protocol ip ospf linkStateData databaseSummary279
protocol ip ospf linkStateData router279
protocol ip ospf linkStateData network281
protocol ip ospf linkStateData summary282
protocol ip ospf linkStateData external283
protocol ip ospf neighbors display284
protocol ip ospf neighbors add285
protocol ip ospf neighbors remove285
protocol ip ospf routerID286
protocol ip ospf stubDefaultMetric display287
protocol ip ospf stubDefaultMetric define287
protocol ip ospf stubDefaultMetric remove288
protocol ip ospf virtualLinks summary288
protocol ip ospf virtualLinks detail289
protocol ip ospf virtualLinks statistics291
protocol ip ospf virtualLinks define294
protocol ip ospf virtualLinks remove294
protocol ip ospf virtualLinks areaID295
protocol ip ospf virtualLinks router295
protocol ip ospf virtualLinks delay296
protocol ip ospf virtualLinks hello296
protocol ip ospf virtualLinks retransmit297
protocol ip ospf virtualLinks dead297
protocol ip ospf virtualLinks password298
protocol ip ospf statistics298
Web Management and Internet Explorer309
Improving Device View Download Speed310
Web Management and Netscape Navigator311
Additional Resources for Solving Problems311
INDEX
ABOUT THIS GUIDE
This SMC9712G Software Configuration Guide provides information that you
need to understand and use features of the SMC9712G after you install it and
attach it to your network. This guide describes the commands used to configure
and manage switching modules installed in the SMC9712G chassis. All commands
are processed by the Management Module via a menu-driven command line
interface or Web browser interface. These interfaces are also called the
Administration Console and Web Management, respectively.
Before you start configuring the Switch:
■ Install your switch chassis and modular components. See the SMC9712G
Installation and Maintenance Guide for installation procedures, cabling
information, and environmental information.
■ Read Chapter 1 of this guide, which lists the default settings for each feature.
■ Read Chapter 2 of this guide, which provides an overview of the configuration
process.
AudienceThis guide is intended for the network administrator who is responsible for
configuring, using, and managing the SMC9712G. It assumes a working
knowledge of local area network (LAN) operations and familiarity with
communications protocols that are used on interconnected LANs.
Scope of this GuideThe information in this guide pertains to Release 1.1 software.
The SMC9712G Network Management Module (NMM) is pre-loaded with
software at the factory. However, the software that was loaded on the module
that you received may be an earlier release. Connect to the module and use the
system summary command to determine what release is loaded. Go to the SMC
Web site
http://www.smc.com/index.cfm?action=tech_support_drivers_downloads) to
(
download the latest software.
Using This BookThis guide contains information for every command for the SMC9712G. It
includes specific information about command syntax, field descriptions, default
values, and the possible range of values. Some command descriptions include a
section called “Important Considerations” that contains additional information to
be aware of when using the command. It also contains instructional material
about feature concepts and guidelines for using the features. Where appropriate,
examples are provided to help you understand the commands.
16ABOUT THIS GUIDE
Finding InformationUse this chart to help you find information about specific tasks:
If you are looking for information aboutTurn to
The purpose of this book
Sending feedback on this book
Description of software features
List of default settings for all features
Web Management interface
Command Line Interface
Connecting to the system
Administration Console menus
Configuring parameters, such as password, IP address, community string
Entering full and abbreviated commands
Basic configuration sequence
Description of key management features
Resetting the system and restoring system defaults
How to use Remote Monitoring (RMON)
Configuring SNMP settings, including trap reporting
Administering Ethernet port options such as setting the port speed and
duplex mode
Displaying statistics for Ethernet ports
Increasing point-to-point bandwidth and resiliency by trunking multiple
ports together into one logical port
Displaying the summary bridge configuration
Configuring bridging options such as the aging interval, and bridge-wide
STP
Configuring STP options on individual bridge ports
Listing, adding, or removing information from the address table
Creating and administering virtual LANs (VLANs)Chapter 7:
Filtering IP multicast packets using the Internet Group Management
Protocol (IGMP) function called snooping
Identifying ports attached to multicast routers
Controlling traffic flows with Quality of Service (QoS) by setting the
number of priority queues, as well as setting the default priority for
untagged frames
Configuring IP interfaces and IP protocol parameters, including ARP, RIP,
and CIDR
About This Guide
Chapter 1:
Default Software
Configuration
Chapter 2:
Preparing for
System
Management
Chapter 3:
System
Management
Features
Chapter 4:
Ethernet Ports
Chapter 5:
Link Aggregation
Chapter 6:
Bridging
Virtual LANs
Chapter 8:
Multicast Filtering
Chapter 9:
Priority Queueing
Chapter 10:
IP Routing
Command Information17
If you are looking for information aboutTurn to
Technical supportAppendix A:
Technical Support
Troubleshooting and improving the performance of Netscape and
Internet Explorer browsers.
Chapter C:
Troubleshooting
Web Management
Displaying all supported MIBs Appendix B:
Management
Information Base
(MIB)
Locating information on tasks and topics quicklyIndex
Command InformationEach software command has its own description in this guide. Each command
description begins at the top of a page. A command description begins with these
items:
■ The complete text of a command
■ A short description of the purpose of the command
■ The command description continues with one or more of the following
sections:
■Valid Minimum Abbreviation — This section lists the shortest number of
characters that you can type to issue the command.
■Important Considerations — These usage notes identify potential issues
or requirements.
■Options — If the command begins a configuration process or other
procedure, this section presents each prompt that you see, its description,
the possible values that you can enter, and the default value.
■Fields — If the command prompts the Switch to display information, this
section lists the display parameters and their definitions.
■Procedure — Numbered steps walk you through complex commands.
■Example — Examples show the interactive display when it provides
additional useful information.
18ABOUT THIS GUIDE
ConventionsTable 1 and Table 2 list conventions that are used throughout this guide.
Table 1 Notice Icons
IconNotice TypeDescription
Information noteInformation that describes important features or instructions
CautionInformation that alerts you to potential loss of data or potential
damage to an application, system, or device
WarningInformation that alerts you to potential personal injury
Table 2 Text Conventions
ConventionDescription
Screen displays This typeface represents information as it appears on the screen.
CommandsThe word “command” means that you type the command exactly as
The words “enter”
and “type”
Keyboard key names If you must press two or more keys simultaneously, the key names are
Words in italicsItalics are used to:
shown in the text and then press Return or Enter. Commands appear in
bold. Example:
To remove an IP interface, enter the following command:
protocol ip interface delete
This guide always gives the full form of a command in uppercase and
lowercase letters. However, you can abbreviate commands by entering
only enough characters to differentiate each command. Commands are
not case sensitive.
When you see the word “enter” in this guide, you must type
something, and then press Return or Enter. Do not press Return or
Enter when an instruction simply says “type.”
linked with a plus sign (+). Example:
Press Ctrl+Alt+Del
■ Emphasize a point.
■ Denote a new term at the place where it is defined in the text.
■ Identify menu names, menu commands, and software button
names. Examples:
From the Help menu, select Contents.
Click OK.
Switch SMC9712G Documentation19
Switch SMC9712G
Documentation
The SMC9712G documentation set is comprised of several different titles.
Documents are available in two formats:
■ Paper Documents — All SMC9712G documents (software and hardware
guides), except for release notes (which you must download from the SMC
Web site) are shipped with your chassis.
■ World Wide Web — All user guides and release notes are available in Adobe
Acrobat Reader PDF format from the SMC Web site at:
http://www.smc.com/
You can order an additional printed copy of the SMC9712G Installation and
Maintenance Guide as well as the SMC9712G Software Configuration Guide (as a
packaged set) .
SMC9712G Release Notes are not shipped in paper form. You must download all
release notes from the SMC Web site.
20ABOUT THIS GUIDE
1
DEFAULT SOFTWARE CONFIGURATION
This chapter contains introductory information about the SMC9712G
management software and how it can be used in your network. It covers the
following topics:
■ What is Management Software?
■ Summary of Software Features
■ Software Features Explained
■ Default Settings
What is Management
Software?
Your Network Management Module (NMM) contains software that allows you to
change and monitor the way the Switch works. It also includes Network that
allows the Switch to forward traffic between ports on different interface modules.
You do not need to configure the management software to get the Switch
working. It will operate properly at Layer 2 using the default settings. However,
you will need to use the management software to improve the efficiency of the
Switch and thereby improve the overall performance of your network. Please refer
to Chapter 2 “Preparing for System Management” for information on how to
access the management software.
22CHAPTER 1: DEFAULT SOFTWARE CONFIGURATION
Summary of Software
Features
Table 3 describes the software features that are supported by the SMC9712G
Network Management Module.
Table 3 Software features
FeatureDescription
No. of MAC Addresses
Supported
No. of IP Interfaces
Supported
No. of Static Routes
Supported
Forwarding ModesStore and forward
Duplex ModesHalf and full duplex on all RJ-45 ports,
Flow ControlSupported on all ports,
Traffic PrioritizationSupports up to four priorities based on IEEE 802.1p
Port SecuritySupported on all ports by limiting access to known nodes
Aggregate LinksSupport for 12 Aggregate Links
Broadcast Storm ControlSupported
Virtual LANs (VLANs)Support for up to 256 VLANs using the IEEE 802.1Q
Spanning Tree ProtocolSupported
Multicast FilteringIGMP Snooping supported
ARP and Proxy ARPSupported
RIPSupported
RMONFour groups supported: Statistics, History, Alarms, Events
Roving AnalysisSupported
Management Web interface, command line interface, and SNMP
Up to 32,000
Up to 128
Up to 100
full duplex on all fiber optic ports
back pressure at half duplex and IEEE 802.3x at full duplex
standard
supported
Software Features
Explained
Duplex ModesThe RJ-45 ports on your Switch can be set to half duplex or full duplex. The fiber
Software Features Explained23
ports on your switch are fixed at full duplex The duplex modes operate as
described below:
■ Half duplex — Allows packets to be transmitted and received, but not
simultaneously.
■ Full duplex — Allows packets to be transmitted and received simultaneously
and, in effect, doubles the potential throughput of a link. In addition, full
duplex supports longer runs of fiber optic cable.
To communicate effectively, both ends of a link must use the same duplex mode. If
the link uses an auto-negotiating connection, this is done automatically. If the link
uses a connection that is not auto-negotiating, both ends must be set to half
duplex or full duplex manually.
For more information about setting the duplex mode of a port, see
“physicalInterface ethernet portMode” on page 90.
Flow ControlAll the ports on your Switch support flow control, which is a congestion control
mechanism. Congestion is caused by one or more devices sending traffic to an
already overloaded port on the Switch. Flow control prevents packet loss and
inhibits the devices from generating more packets until the period of congestion
ends.
Flow control is implemented in two ways:
■ Back pressure for ports operating in half duplex.
■ IEEE 802.3x standard for ports operating in full duplex.
For information about enabling flow control on a port, see “physicalInterface
ethernet flowControl” on page 91.
Traffic PrioritizationYour Switch supports IEEE 802.1p traffic prioritization, which allows data that has
been assigned a high priority to be forwarded through the Switch without being
obstructed by other data. The system works by using the multiple traffic queues
that are present in the hardware of the Switch — high priority traffic is forwarded
on a different queue from other traffic, and it is always given preference over
other traffic.
Traffic prioritization can be useful for critical applications that require a high
Quality of Service from the network. This could include:
■ Financial applications — Accounts departments that need immediate access
to large files and spreadsheets at the end of the month.
■ CAD/CAM design applications — Design departments that need priority
connections to server farms and other devices for transferring large files.
■ Converged network applications — Organizations with a converged
network (that is, a network that uses the same infrastructure for voice data and
traditional data) that require high quality voice data transmission at all times.
24CHAPTER 1: DEFAULT SOFTWARE CONFIGURATION
If you use IEEE 802.1p traffic prioritization, we recommend that all relevant ports
on your Switch are placed in one or more Virtual LANs (VLANs) using 802.1Q
tagging. For a brief explanation of VLANs, see “Virtual LANs”on page 25. For
more information, see Chapter 7 “Virtual LANs.”
SecurityEach port on your Switch can be configured with security features that guard
against unauthorized users connecting devices to your network.
When security mode is set to Continually Learn on a port, it enters Address
Learning Mode. In this mode, the Switch:
■ Removes all the MAC (Ethernet) addresses stored for the port in the Switch
Database.
■ Continually learns the address of packets it receives on the port, overwriting
old addresses if the address budget is exceeded.
■ The address cannot be learned on another port until the address is overwritten,
security is disabled, or the address is manually removed from the database.
When port security mode is set to Auto Learn, it enters Address Learning Mode. In
this mode, the Switch:
■ Removes all the MAC (Ethernet) addresses stored for the port in the Switch
Database.
■ Learns the address of packets it receives on the port until the address budget is
reached.
■ The address is defined as a permanent entry.
■ The address cannot be learned on another port until security is disabled or the
address is manually removed from the database.
■ No other address can be learned until security is disabled or the address is
manually removed from the database.
When port security mode is set to Auto Learn and to Disconnect Unauthorized
Device, then once the address budget is filled:
■ The port is disabled if a different address is seen on the port.
Up to 896 addresses may be learned by the entire system. If security is enabled for
a port, then you must provide the budget (or maximum number of addresses to be
learned) for each port. For information, see “security network access portSecurity”
on page 61.
Aggregate LinksYour Switch can support 12 aggregate links — connections that allow devices to
communicate using up to four links in parallel. Port trunks provide two benefits:
■ They can potentially double, triple or quadruple the bandwidth of a
connection.
■ They can provide redundancy — if one link is broken, the other links share the
traffic for that link.
An aggregate link can only be created if the ports at both ends of each link are
configured as aggregate links.
For more information, see Chapter 5 “Link Aggregation.”
Loading...
+ 296 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.