Smc-networks SMC TigerStack II SMC6624M Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Akcesoria komputerowe Smc-networks SMC TigerStack II SMC6624M. SMC Networks SMC TigerStack II SMC6624M User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 0
Stackable Fast Ethernet Switch
24 10BASE-T/100BASE-TX RJ-45 ports
Auto MDI/MDI-X support on all ports
Optional 100BASE-FX or 1000BASE-X modules
Optional stack module for linking up to 16 units
8.8 Gbps of aggregate switch bandwidth
LACP and FEC port trunking support
Port mirroring for non-intrusive analysis
Port security
Full support for IEEE 802.1Q VLANs with GVRP
IP Multicasting with IGMP Snooping
Manageable via console, Web, SNMP/RMON
TigerSwitch 10/100
Management Guide
SMC6624M
Przeglądanie stron 0
1 2 3 4 5 6 ... 363 364

Podsumowanie treści

Strona 1 - TigerSwitch 10/100

Stackable Fast Ethernet Switch◆ 24 10BASE-T/100BASE-TX RJ-45 ports◆ Auto MDI/MDI-X support on all ports◆ Optional 100BASE-FX or 1000BASE-X modules◆

Strona 2

viContentsHow the Switch Lists Trunk Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-27Outbound Traffic Distribution Across Trunked

Strona 3 - Management Guide

6-8Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Strona 4 - Trademarks:

6-9Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Port TrunkingPort Sta

Strona 5

6-10Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Port Connection

Strona 6

6-11Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Fault Tolerance: I

Strona 7

6-12Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Table 6-4. Trun

Strona 8 - Information

6-13Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Table 6-5. General O

Strona 9 - Trunking

6-14Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Spanning Tree P

Strona 10 - Contents

6-15Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Menu: Viewing and Co

Strona 11

6-16Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and switch automati

Strona 12

6-17Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and 8. Connect the trunk

Strona 13

viiContentsWeb: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . 7-34Building IP Masks . . . . . . . . . . . . . . . .

Strona 14 - 11 Troubleshooting

6-18Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and The show trunk

Strona 15 - B MAC Address Management

6-19Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Figure 6-9. Example

Strona 16 - D Daylight Savings Time

6-20Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and You can configu

Strona 17 - Interface

6-21Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Enabling a Dynamic L

Strona 18

6-22Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Removing Ports

Strona 19 - Advantages of Using the CLI

6-23Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Trunk Group Operatio

Strona 20

6-24Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Default Port Op

Strona 21 - Using the Menu Interface

6-25Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and LACP Notes and Restr

Strona 22 - Command Line (CLI) option.)

6-26Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Half-Duplex and

Strona 23

6-27Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Depending on the c

Strona 24

viiiContentsUsing the Menu Interface To View Stack Status And Configure Stacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 25

6-28Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and and sends traff

Strona 26 - Main Menu Features

7-1Using Passwords, Port Security, and Authorized IP 7Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Acces

Strona 27

7-2Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port

Strona 28

7-3Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing Password SecurityUsing Passwords, Port Secur

Strona 29

7-4Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port

Strona 30

7-5Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing Password SecurityUsing Passwords, Port Secur

Strona 31 - Rebooting the Switch

7-6Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port

Strona 32

7-7Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pass

Strona 33 - Menu Features List

7-8Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsing

Strona 34 - Where To Go From Here

7-9Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pass

Strona 35 - Using the CLI

ixContentsEffect of VLANs on Other Switch Features . . . . . . . . . . . . . . . . . . . . . 9-71Spanning Tree Protocol Operation with VLANs . . .

Strona 36 - Privilege Levels at Logon

7-10Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strona 37 - Privilege Level Operation

7-11Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strona 38 - Manager Privileges

7-12Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strona 39 - Interface (CLI)

7-13Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strona 40 - How To Move Between Levels

7-14Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strona 41 - ? symbol lists the

7-15Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strona 42 - Using the CLI

7-16Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strona 43 - Command Option Displays

7-17Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strona 44 - Displaying CLI “Help”

7-18Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strona 45

7-19Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strona 46 - Configuration Modes

xContentsMenu Access To Status and Counters . . . . . . . . . . . . . . . . . . . . . . . . . 10-3General System Information . . . . . . . . . . .

Strona 47

7-20Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strona 48

7-21Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strona 49 - CLI Control and Editing

7-22Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strona 50

7-23Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strona 51 - Using the Web Browser

7-24Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strona 52 - General Features

7-25Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strona 53

7-26Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strona 54 - Session with the Switch

7-27Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strona 55

7-28Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Strona 56 - Interface Session

7-29Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Strona 57

xiContentsUsing the Event Log To Identify Problem Sources . . . . . . . . . . . . . 11-10Menu: Entering and Navigating in the Event Log . . . . . .

Strona 58 - Using the Passwords

7-30Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Strona 59 - If You Lose a Password

7-31Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Strona 60 - Support/Mgmt URL Feature

7-32Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Strona 61 - Status Reporting Features

7-33Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Strona 62 - Port Utilization

7-34Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Strona 63

7-35Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Strona 64

7-36Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Strona 65 - The Alert Log

7-37Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Strona 66 - Alert Types

7-38Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Strona 67 - The Status Bar

8-1Monitoring and Managing the Switch8Configuring for Network Management ApplicationsYou can manage the switch via SNMP from a network management stat

Strona 68

xiiContentsC Switch Memory and ConfigurationOverview of Configuration File Management . . . . . . . . . . . . . . . . . . C-1Using the CLI To Impl

Strona 69 - Interface Access, and

8-2Configuring for Network Management ApplicationsSNMP Management FeaturesMonitoring and Managing the SwitchSNMP Management FeaturesSNMP management fe

Strona 70 - IP Configuration

8-3Configuring for Network Management ApplicationsConfiguring for SNMP Access to the SwitchMonitoring and Managing the SwitchThe switch SNMP agent als

Strona 71 - Just Want a Quick Start?

8-4Configuring for Network Management ApplicationsConfiguring for SNMP Access to the SwitchMonitoring and Managing the SwitchCaution Deleting the comm

Strona 72 - (TTL), and Timep

8-5Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchSNMP Communities SNMP Community FeaturesUse SNMP c

Strona 73

8-6Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchFigure 8-1. The SNMP Communities Screen (Default

Strona 74

8-7Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchCLI: Viewing and Configuring Community NamesCommun

Strona 75

8-8Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchSMC TigerSwitch 10/100# show snmp-server publicCon

Strona 76

8-9Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchTrap Receivers and Authenti

Strona 77

8-10Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchCLI: Configuring and Displ

Strona 78 - DHCP/Bootp Operation

8-11Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchConfiguring Trap Receivers

Strona 79

1-1Selecting a Management Interface1Selecting a Management InterfaceThis chapter describes the following: Management interfaces for the SMC6624M swit

Strona 80

8-12Configuring for Network Management ApplicationsAdvanced Management: RMON SupportMonitoring and Managing the SwitchAdvanced Management: RMON Suppor

Strona 81

9-1Configuring Advanced Features9Configuring Advanced FeaturesThis chapter describes the following features and how to configure them with the switch’

Strona 82

9-2Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesStack ManagementStacking FeaturesStack Management (termed stacking)

Strona 83 - Web, and Inbound Telnet

9-3Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features Simplify management of small workgroups or wiring closets while scaling

Strona 84 - Interface Access

9-4Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesComponents of Stack ManagementTable 9-1. Stacking DefinitionsFigure

Strona 85

9-5Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-2. Example of Stacking with One Commander Controlling Access to

Strona 86 - ■ Critical log events

9-6Configuring Advanced Features Stack ManagementConfiguring Advanced Features There is no limit on the number of stacks in the same IP subnet (b

Strona 87

9-7Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesNote In the default stack configuration, the Candidate Auto Join paramete

Strona 88 - System Information

9-8Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesOverview of Configuring and Bringing Up a StackThis process assumes

Strona 89

9-9Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesTable 9-3. Stacking Configuration GuideThe easiest way to automatically c

Strona 90

1-2Selecting a Management InterfaceAdvantages of Using the Menu InterfaceSelecting a Management InterfaceAdvantages of Using the Menu InterfaceFigure

Strona 91

9-10Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesGeneral Steps for Creating a StackThis section describes the genera

Strona 92

9-11Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. For automatically or manually pulling Candidate switches into a stack

Strona 93 - Control and Port Trunking

9-12Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing the Menu Interface To View Stack Status And Configure Stackin

Strona 94

9-13Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-6. The Default Stack Configuration Screen4. Move the cursor to

Strona 95

9-14Configuring Advanced Features Stack ManagementConfiguring Advanced Features• No (the default) prevents automatic joining of Candidates that ha

Strona 96

9-15Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesTable 9-4.Candidate Configuration Options in the Menu InterfaceUsing the

Strona 97

9-16Configuring Advanced Features Stack ManagementConfiguring Advanced Features4. Do one of the following:• To disable stacking on the Candidate,

Strona 98

9-17Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the Commander’s Menu To Manually Add a Candidate to a Stack. In t

Strona 99

9-18Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-10. Example of Candidate List in Stack Management Screen3

Strona 100 - Parameters

9-19Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-11. Example of Stack Management Screen After New Member AddedU

Strona 101 - Port Trunking

1-3Selecting a Management InterfaceAdvantages of Using the CLISelecting a Management InterfaceAdvantages of Using the CLIFigure 1-2. Example of The Co

Strona 102

9-20Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-12. Example of How the Stacking Status (All) Screen Helps

Strona 103 - Trunk Configuration Methods

9-21Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features8. Do one of the following:• If the stack containing the Member you are

Strona 104 - Through Traffic Control and

9-22Configuring Advanced Features Stack ManagementConfiguring Advanced Features4. Stack ManagementYou will then see the Stack Management screen:Fi

Strona 105

9-23Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the Commander To Access Member Switches for Configuration Changes

Strona 106

9-24Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-17. The eXecute Command Displays the Console Main Menu fo

Strona 107

9-25Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. Press [B] (for Back) to return to the Stacking Menu.4. To display Sta

Strona 108

9-26Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing Any Stacked Switch To View the Status for All Switches with S

Strona 109 - Trunk Group

9-27Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-19. Example of the Commander’s Stacking Status ScreenViewing M

Strona 110

9-28Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-20. Example of a Member’s Stacking Status ScreenViewing C

Strona 111

9-29Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To View Stack Status and Configure StackingThe CLI enables

Strona 113

1-4Selecting a Management InterfaceAdvantages of Using the Web Browser InterfaceSelecting a Management InterfaceAdvantages of Using the Web Browser In

Strona 114

9-30Configuring Advanced Features Stack ManagementConfiguring Advanced Features[no] stack member <switch-num> mac-address <mac-addr> [

Strona 115

9-31Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To View Stack StatusYou can list the stack status for an i

Strona 116 - Default Port Operation

9-32Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesViewing the Status of all Stack-Enabled Switches Discovered in the

Strona 117 - LACP Notes and Restrictions

9-33Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To Configure a Commander SwitchYou can configure any stack

Strona 118 - technol

9-34Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-26. Example of the Commander’s Show Stack Screen with Onl

Strona 119

9-35Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-27. Example of Using a Member’s CLI To Convert the Member to t

Strona 120

9-36Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing the Commander’s CLI To Manually Add a Candidate to the Stack.

Strona 121 - Security, and Authorized IP

9-37Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFor example, if the switch named “DEFAULT_CONFIG” in the above listing d

Strona 122 - Using Password Security

9-38Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing a Candidate CLI To Manually “Push” the Candidate Into a Stack

Strona 123

9-39Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesSyntax: stack member <switch-number> mac-address <mac-add

Strona 124

2-1Using the Menu Interface2Using the Menu InterfaceThis chapter describes the following features: Overview of the Menu Interface (page 4-1) Startin

Strona 125

9-40Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesSyntax: no stack name <stack name> stack join <mac-add

Strona 126 - Security tab

9-41Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesSyntax: [no] stack member <switch-num> mac-address <mac-addr&

Strona 127 - Security

9-42Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-35. Example of How To Identify the Commander’s MAC Addres

Strona 128 - Blocking Unauthorized Traffic

9-43Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-36. Example of a Stack Showing Switch Number (SN) AssignmentsT

Strona 129 - Planning Port Security

9-44Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesSNMP Community Operation in a StackCommunity MembershipIn the defau

Strona 130

9-45Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesNote that in the above example (figure 9-37) you cannot use the public c

Strona 131

9-46Configuring Advanced Features Stack ManagementConfiguring Advanced Features Stacking uses only the primary VLAN on each switch in a stack. T

Strona 132

9-47Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. Click on [Apply Changes] to save any configuration changes for the i

Strona 133

9-48Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs) VLAN F

Strona 134

9-49Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced Featuressaved by not allowing packets to flood out all por

Strona 135

2-2Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceMenu Interaction with Other Interfaces. A configuration change

Strona 136

9-50Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-40. Example of Overlapping VLANs Us

Strona 137

9-51Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-42. Example of Tagged and Untagged VLAN

Strona 138

9-52Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesDHCP or Bootp on different VLANs do not resul

Strona 139

9-53Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-43. Comparing Per-Port VLAN Options With

Strona 140 - Notice of Security Violations

9-54Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesGeneral Steps for Using VLANs1. Plan your VLA

Strona 141

9-55Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesMenu: Configuring VLAN ParametersIn the factory de

Strona 142 - Resetting Alert Flags

9-56Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced Features To select another primary VLAN, select the

Strona 143

9-57Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesAdding or Editing VLAN NamesUse this procedure to

Strona 144

9-58Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-47. Example of VLAN Names Screen wi

Strona 145

9-59Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-48. Example of VLAN Port Assignment Scre

Strona 146

2-3Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceHow To Start a Menu Interface SessionIn its factory default confi

Strona 147

9-60Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-49. Example of VLAN Assignments for

Strona 148 - Using IP Authorized Managers

9-61Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN Commands Used in this SectionDisplaying the S

Strona 149 - Access Levels

9-62Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesDisplaying the Configuration for a Particular

Strona 150 - Overview of IP Mask Operation

9-63Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesChanging the Number of VLANs Allowed on the Switch

Strona 151 - Managers

9-64Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesCreating a New Static VLANChanging the VLAN C

Strona 152

9-65Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesConverting a Dynamic VLAN to a Static VLAN. If GV

Strona 153

9-66Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced Featuresoperation. Note that Auto is the defaultper-p

Strona 154 - Building IP Masks

9-67Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesTo configure static VLAN port parameters, you will

Strona 155

9-68Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-54. Example of Tagged and Untagged

Strona 156

9-69Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesNote Each 802.1Q-compliant VLAN must have its own

Strona 157

2-4Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceFigure 2-1. The Main Menu with Manager PrivilegesFor a descriptio

Strona 158

9-70Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-56. Example of Networked 802.1Q-Com

Strona 159 - Applications

9-71Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesTo summarize:Effect of VLANs on Other Switch Featu

Strona 160 - SNMP Management Features

9-72Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN MAC AddressesThe switch has one unique M

Strona 161 - Monitoring and Managing

9-73Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN Restrictions A port must be a member of at l

Strona 162

9-74Configuring Advanced Features GVRPConfiguring Advanced FeaturesGVRPGVRP—GARP VLAN Registration Protocol—is an application of the Generic Attri

Strona 163 - SNMP Communities

9-75Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesNote There must be one common VLAN (that is, one common VID) connecting all of the G

Strona 164

9-76Configuring Advanced Features GVRPConfiguring Advanced FeaturesNote that if a static VLAN is configured on at least one port of a switch, and

Strona 165

9-77Configuring Advanced FeaturesGVRPConfiguring Advanced Features If the switch already has a static VLAN assignment with the same VID as in the adv

Strona 166

9-78Configuring Advanced Features GVRPConfiguring Advanced FeaturesTable 9-8. Options for Handling “Unknown VLAN” Advertisements:The CLI show gvrp

Strona 167

9-79Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesPer-Port Options for Dynamic VLAN Advertising and JoiningInitiating Advertisements.

Strona 168

2-5Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceFigure 2-2. An Asterisk Indicates a Configuration Change Requirin

Strona 169 - Configuring Trap Receivers

9-80Configuring Advanced Features GVRPConfiguring Advanced FeaturesAs the above table indicates, when you enable GVRP, a port that has a Tagged or

Strona 170

9-81Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesPlanning for GVRP OperationThese steps outline the procedure for setting up dynamic

Strona 171 - Configuring Advanced Features

9-82Configuring Advanced Features GVRPConfiguring Advanced Features2. Switch Configuration . . .8. VLAN Menu . . . 1. VLAN SupportFigure 9-60. Th

Strona 172 - Stack Management

9-83Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesCLI: Viewing and Configuring GVRPGVRP Commands Used in This SectionDisplaying the Sw

Strona 173 - Features

9-84Configuring Advanced Features GVRPConfiguring Advanced FeaturesEnabling and Disabling GVRP on the Switch. This command enables GVRP on the sw

Strona 174 - General Stacking Operation

9-85Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesDisplaying the Static and Dynamic VLANs Active on the Switch. The show vlans comman

Strona 175 - Operating Rules for Stacking

9-86Configuring Advanced Features GVRPConfiguring Advanced FeaturesConverting a Dynamic VLAN to a Static VLAN. If a port on the switch has joined

Strona 176 - Specific Rules

9-87Configuring Advanced FeaturesGVRPConfiguring Advanced Features By receiving advertisements from other devices running GVRP, the switch learns of

Strona 177

9-88Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesMultimedia Traffic Control with

Strona 178

9-89Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesEnabling IGMP allows the ports to det

Strona 179

2-6Using the Menu InterfaceMain Menu FeaturesUsing the Menu InterfaceMain Menu Features Figure 2-3. The Main Menu View with Manager PrivilegesThe Main

Strona 180

9-90Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Features• Blocked: Causes the switch to

Strona 181

9-91Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesViewing the Current IGMP Configuratio

Strona 182 - Configure Stacking

9-92Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesFigure 9-66. Example Listing of

Strona 183

9-93Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesConfiguring Per-Port IGMP Packet Cont

Strona 184

9-94Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesSMC TigerSwitch 10/100(vlan 1)#

Strona 185

9-95Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Featuresto or from the same source(s) is term

Strona 186 - – To change

9-96Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Features Switch 2 is recognizing IGMP t

Strona 187

9-97Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesFigure 9-68. Isolating IP Multicast

Strona 188 - Save) to

9-98Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesNote: IP Multicast Filters. IP

Strona 189

9-99Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesSpanning Tree Protocol (STP)STP FeaturesThe switch uses the

Strona 190 - 4. Stack Management

2-7Using the Menu InterfaceMain Menu FeaturesUsing the Menu Interface Command Line (CLI): Selects the Command Line Interface at the same level (Manag

Strona 191

9-100Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesSTP Fast Mode for Overcoming Server Access Failures.

Strona 192

9-101Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced Features)Figure 9-69. Example of the STP Configuration Screen4. If

Strona 193

9-102Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesCLI: Configuring STPSTP Commands Used in This SectionV

Strona 194

9-103Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesEnabling or Disabling STP. Enabling STP implements the spa

Strona 195 - Monitoring Stack Status

9-104Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesYou can also include one or more of the STP per-port p

Strona 196 - For status descriptions

9-105Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesFor example, the following enables STP (if it is not alread

Strona 197

9-106Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesFigure 9-71. Example of Redundant Paths Between Two N

Strona 198 - 9. Stacking

9-107Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesCaution The Fast Mode configuration should be used only on

Strona 199 - Stacking

9-108Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesFigure 9-72. Example of Using a Trunked Link with STP

Strona 200

10-1Monitoring and Analyzing Switch Operation10Monitoring and Analyzing Switch OperationThe SMC6624M switch has several built-in tools for monitoring,

Strona 201

2-8Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceScreen Structure and NavigationMenu interface screens include these

Strona 202

10-2Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationStatus and Counters DataThis section des

Strona 203

10-3Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access To Status and Counters Begin

Strona 204

10-4Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationGeneral System InformationMenu AccessFro

Strona 205

10-5Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationSwitch Management Address InformationMen

Strona 206 - listing

10-6Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationPort StatusThe web browser interface and

Strona 207

10-7Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationViewing Port and Trunk Group StatisticsT

Strona 208 - Stack Commander

10-8Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access to Port and Trunk Statistics

Strona 209

10-9Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationCLI Access To Port and Trunk Group Stati

Strona 210 - Auto Join parameter

10-10Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationViewing the Switch’s MAC Address Tables

Strona 211

10-11Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access to the MAC Address Views an

Strona 212 - 1 - 15)

2-9Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceTable 4-1. How To Navigate in the Menu Interface Task: Actions:Execu

Strona 213

10-12Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch Operation2. Type the MAC address you want to loc

Strona 214

10-13Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationEnter MAC address: _2. Type the MAC add

Strona 215 - Transmission Interval

10-14Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationSpanning Tree Protocol (STP) Informatio

Strona 216

10-15Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationFigure 10-11.Example of STP Port Inform

Strona 217 - Status Messages

10-16Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationInternet Group Management Protocol (IGM

Strona 218

10-17Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationVLAN InformationThe switch uses the CLI

Strona 219

10-18Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationListing the VLAN ID (VID) and Status fo

Strona 220 - SMC6624M

10-19Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationWeb Browser Interface Status Informatio

Strona 221 - Overview of Using VLANs

10-20Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationPort Monitoring Features Port Monitorin

Strona 222

10-21Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationMenu: Configuring Port MonitoringThis p

Strona 223

6 HughesIrvine, CA 92618Phone: (949) 707-2400TigerSwitch 10/100Management GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsJuly 2001P

Strona 224 - Notes on Using VLANs

2-10Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceTo get Help on individual parameter descriptions. In most screens

Strona 225

10-22Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-17. How To Select a Monitorin

Strona 226 - VLANs setting

10-23Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch Operationiv. Press [Enter], then press [S] (for

Strona 227 - Adding or Editing VLAN Names

10-24Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-19.Example of Monitored Port

Strona 228 - VLAN and ID

10-25Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-21.Examples of Removing Ports

Strona 229

10-26Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch Operation

Strona 230

11-1Troubleshooting11TroubleshootingThis chapter addresses performance-related network problems that can be caused by topology, switch configuration,

Strona 231

11-2TroubleshootingTroubleshooting ApproachesTroubleshootingTroubleshooting ApproachesUse these approaches to diagnose switch problems: Check the swi

Strona 232

11-3TroubleshootingBrowser or Console Access ProblemsTroubleshootingBrowser or Console Access ProblemsCannot access the web browser interface: Acces

Strona 233

11-4TroubleshootingBrowser or Console Access ProblemsTroubleshootingCannot Telnet into the switch console from a station on the network: Telnet acce

Strona 234 - Showing the result

11-5TroubleshootingUnusual Network ActivityTroubleshootingUnusual Network ActivityNetwork activity that exceeds accepted norms may indicate a hardware

Strona 235

2-11Using the Menu InterfaceRebooting the SwitchUsing the Menu InterfaceRebooting the SwitchRebooting the switch from the menu interface Terminates a

Strona 236 - ■ Select a new Primary VLAN

11-6TroubleshootingUnusual Network ActivityTroubleshootingIP addresses that will expire after a limited duration. One solution is to configure “reserv

Strona 237 - VLAN Tagging Information

11-7TroubleshootingUnusual Network ActivityTroubleshootingProblems Related to Spanning-Tree Protocol (STP)Caution If you enable STP, it is recommended

Strona 238 - ■ In switch Y:

11-8TroubleshootingUnusual Network ActivityTroubleshootingVLAN-Related ProblemsMonitor Port. When using the monitor port in a multiple VLAN environ-m

Strona 239

11-9TroubleshootingUnusual Network ActivityTroubleshooting1. If VLAN_1 (VID=1) is configured as “Untagged” on port 3 on switch “X”, then it must also

Strona 240

11-10TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingUsing the Event Log To Identify Problem SourcesThe Event Log records

Strona 241 - IP Interfaces

11-11TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingTable 11-1. Event Log System ModulesMenu: Entering and Navigating in

Strona 242 - Port Monitoring

11-12TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingThe log status line at the bottom of the display identifies where in

Strona 243 - VLAN Restrictions

11-13TroubleshootingDiagnostic ToolsTroubleshootingDiagnostic ToolsDiagnostic FeaturesPing and Link TestsThe Ping test and the Link test are point-to-

Strona 244

11-14TroubleshootingDiagnostic ToolsTroubleshootingWeb: Executing Ping or Link TestsFigure 11-12.Link and Ping Test Screen on the Web Browser Interfac

Strona 245 - General Operation

11-15TroubleshootingDiagnostic ToolsTroubleshootingNumber of Packets to Send is the number of times you want the switch to attempt to test a connectio

Strona 246

2-12Using the Menu InterfaceRebooting the SwitchUsing the Menu InterfaceRebooting To Activate Configuration Changes. Configuration changes for most p

Strona 247

11-16TroubleshootingDiagnostic ToolsTroubleshootingLink Tests. You can issue single or multiple link tests with varying repititions and timeout perio

Strona 248 - Default:

11-17TroubleshootingDiagnostic ToolsTroubleshootingDisplaying the Configuration FileThe complete switch configuration is contained in a file that you

Strona 249

11-18TroubleshootingDiagnostic ToolsTroubleshootingCLI Administrative and Troubleshooting CommandsThese commands provide information or perform action

Strona 250 - GVRP and VLAN Access Control

11-19TroubleshootingRestoring the Factory-Default ConfigurationTroubleshootingRestoring the Factory-Default ConfigurationAs part of your troubleshooti

Strona 251 - Configuring GVRP On a Switch

11-20TroubleshootingRestoring the Factory-Default ConfigurationTroubleshooting

Strona 252

A-1Transferring an Operating System or Startup ATransferring an Operating System or Startup Configuration FileYou can download new switch software (op

Strona 253

A-2Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Using

Strona 254

A-3Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Menu:

Strona 255

A-4Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup A “pr

Strona 256 - GVRP Operating Notes

A-5Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup 2. En

Strona 257

2-13Using the Menu InterfaceMenu Features ListUsing the Menu InterfaceMenu Features ListStatus and Counters• General System Information• Switch Manage

Strona 258 - Multicast (IGMP)

A-6Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Using

Strona 259

A-7Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup For e

Strona 260

A-8Transferring an Operating System or Startup Configuration FileTroubleshooting TFTP DownloadsTransferring an Operating System or Startup Troubleshoo

Strona 261

A-9Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup Anoth

Strona 262

A-10Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup TFTP:

Strona 263

A-11Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup Xmodem

Strona 264 - How IGMP Operates

A-12Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup

Strona 265 - Role of the Switch

B-1MAC Address ManagementBMAC Address ManagementThe switch assigns MAC addresses in these areas: For management functions:• One Base MAC address assi

Strona 266

B-2MAC Address ManagementDetermining MAC AddressesMAC Address ManagementMenu: Viewing the Switch’s MAC AddressesThe Management Address Information scr

Strona 267

B-3MAC Address ManagementDetermining MAC AddressesMAC Address ManagementCLI: Viewing the Port and VLAN MAC Addresses The MAC address assigned to each

Strona 268

2-14Using the Menu InterfaceWhere To Go From HereUsing the Menu InterfaceWhere To Go From HereThis chapter provides an overview of the menu interface

Strona 269 - Spanning Tree Protocol (STP)

B-4MAC Address ManagementDetermining MAC AddressesMAC Address Management

Strona 270 - Menu: Configuring STP

C-1Switch Memory and ConfigurationCSwitch Memory and ConfigurationThis appendix describes the following: How switch memory manages configuration chan

Strona 271

C-2Switch Memory and ConfigurationOverview of Configuration File ManagementSwitch Memory and Configuration Startup-config File: Exists in flash (non-

Strona 272 - CLI: Configuring STP

C-3Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and ConfigurationThe above command disables port 5 in

Strona 273

C-4Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and Configuration2. Use the appropriate show commands

Strona 274

C-5Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and ConfigurationIf you use the CLI to change a parame

Strona 275 - How STP Operates

C-6Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and ConfigurationHow To Re

Strona 276 - STP Fast Mode

C-7Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and ConfigurationNote The

Strona 277

C-8Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configurationface, the

Strona 278

C-9Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configuration(To acces

Strona 279 - Switch Operation

3-1Using the Command Line Interface (CLI)3Using the Command Line Interface (CLI)The CLI is a text-based command interface for configuring and monitori

Strona 280 - Status and Counters Data

C-10Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configuration

Strona 281

D-1Daylight Savings TimeDDaylight Savings TimeThe SMC6624M switch provides a way to automatically adjust the system clock for Daylight Savings Time (D

Strona 282 - General System Information

D-2Daylight Savings TimeDaylight Savings TimeFigure D-1. Menu Interface with “User-Defined” Daylight Time Rule OptionBefore configuring a “User define

Strona 283 - CLI Access

Index – 1IndexNumerics802.1Q VLAN standard … 9-99802.3u auto negotiation standard … 6-2Aaccessmanager … 8-5operator … 8-5access levels, authorized IP

Strona 284 - Port Status

2 – IndexIndexquick … 2-7restoring factory defaults … 11-19saving from menu interface … 2-9serial link … 5-15SNMP … 8-3, 8-5spanning tree … 9-99spanni

Strona 285

Index – 3IndexGGARPSee GVRPgateway … 5-2, 5-4gateway (IP) address … 5-3, 5-5GVRPadvertisement … 9-75, 9-87advertisement, defined … 9-74advertisement,

Strona 286

4 – IndexIndexconfiguration … 5-2DHCP/Bootp … 5-2duplicate address … 11-5duplicate address, DHCP network … 11-5effect when address not used … 5-9gatew

Strona 287

Index – 5Indexmulticast groupSee IGMPmultimediaSee IGMPmultiple VLAN … 8-1multi-port bridge … 5-1Nnavigation, console interface … 2-8 –2-9navigation,

Strona 288

6 – IndexIndexoperating notes … 7-26overview … 7-7port trunk restriction … 6-10prior to … 7-27proxy web server … 7-27trunk restriction … 6-14port trun

Strona 289

Index – 7Indexauthorized IP managers … 7-28per port … 7-7security violationsnotices of … 7-20Self Test LEDbehavior during factory default reset … 11-1

Strona 290

3-2Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)When you use the CLI to make a configuration change, the s

Strona 291

8 – IndexIndextraffic analysis … 8-1traffic monitoring … 8-1, 8-4traffic, monitoring … 10-20traffic, port … 10-7transceiver, fiber-optic … 6-3transcei

Strona 292 - Menu Access to STP Data

Index – 9Indexprimary, CLI command … 9-61, 9-63primary, select in menu … 9-56primary, web configure … 9-66primary, with DHCP … 9-54reboot required … 2

Strona 295 - VLAN Information

6 HughesIrvine, CA 92618Phone: (949) 707-2400FOR TECHNICAL SUPPORT, CALL:From U.S.A. and Canada (24 hours, 7 days a week)(800) SMC-4-YOU; (949) 707-24

Strona 296

3-3Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Caution SMC strongly recommends that you configure a Manag

Strona 297

3-4Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Manager Privileges Manager privileges give you three addit

Strona 298 - Port Monitoring Features

3-5Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI) SMC TigerSwitch 10/100(vlan-10)#Changing Interfa

Strona 299

Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, n

Strona 300

3-6Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)How To Move Between LevelsMoving Between the CLI and the M

Strona 301

3-7Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)For example, if you use the CLI to set a Manager password,

Strona 302

3-8Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Typing ? at the Manager level produces this listing:Figure

Strona 303

3-9Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)As mentioned above, if you type part of a command word and

Strona 304

3-10Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Thus, if you wanted to create a port trunk group using po

Strona 305 - Troubleshooting

3-11Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-7. Example of Context-Sensitive Command-List Hel

Strona 306 - Troubleshooting Approaches

3-12Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-9. Example of Help for a Specific Instance of a

Strona 307

3-13Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-10. Context-Specific Commands Affecting Port Con

Strona 308

3-14Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)VLAN Context. Includes VLAN-specific commands that apply

Strona 309 - Unusual Network Activity

3-15Using the Command Line Interface (CLI)CLI Control and EditingUsing the Command Line Interface (CLI)CLI Control and EditingKeystrokes Function[Ctrl

Strona 310 - IGMP-Related Problems

iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Strona 311 - Timep or Gateway Problems

3-16Using the Command Line Interface (CLI)CLI Control and EditingUsing the Command Line Interface (CLI)

Strona 312 - VLAN-Related Problems

4-1Using the Web Browser Interface4Using the Web Browser InterfaceThe web browser interface built into the switch lets you easily access the switch fr

Strona 313

4-2Using the Web Browser InterfaceGeneral FeaturesUsing the Web Browser InterfaceGeneral FeaturesThe SMC6624M switch includes these web browser interf

Strona 314

4-3Using the Web Browser InterfaceWeb Browser Interface RequirementsUsing the Web Browser Interface Web Browser Interface RequirementsYou can use equi

Strona 315

4-4Using the Web Browser InterfaceStarting a Web Browser Interface Session with the SwitchUsing the Web Browser InterfaceStarting a Web Browser Interf

Strona 316 - ■ All events recorded

4-5Using the Web Browser InterfaceStarting a Web Browser Interface Session with the SwitchUsing the Web Browser InterfaceFigure 4-1. Example of Status

Strona 317 - Diagnostic Tools

4-6Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceTasks for Your First Web Browser In

Strona 318

4-7Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceThis window is the launching point

Strona 319 - CLI: Ping or Link Tests

4-8Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceTo set the passwords:1. Access the

Strona 320

4-9Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser Interface Entering the operator password gi

Strona 321

LIMITED WARRANTYiiMAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF SMC OR ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF

Strona 322

4-10Using the Web Browser InterfaceSupport/Mgmt URL FeatureUsing the Web Browser InterfaceSupport/Mgmt URL FeatureThe Support/Mgmt URL window enables

Strona 323 - Configuration

4-11Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceStatus Reporting FeaturesBrowser elements covered in this s

Strona 324

4-12Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceThe Port Utilization and Status DisplaysThe Port Utilizatio

Strona 325

4-13Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser Interface Maximum Activity Indicator: As the bars in the graph area

Strona 326

4-14Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfacePort StatusFigure 4-10. The Port Status Indicators and Lege

Strona 327 - System or Startup

4-15Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceThe Alert LogThe web browser interface Alert Log, shown in

Strona 328 - Switch-to-Switch Download

4-16Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceAlert TypesThe following table lists the types of alerts th

Strona 329

4-17Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceNote When troubleshooting the sources of alerts, it may be

Strona 330 - Menu: Xmodem Download

4-18Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceTable 4-3. Status Indicator Key System Name. The name you

Strona 331

5-1Configuring IP Addressing, Interface Access, and 5Configuring IP Addressing, Interface Access, and System InformationThis chapter describes the swi

Strona 332 - Message Indicating

iiiContentsContents1 Selecting a Management InterfaceUnderstanding Management Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Advant

Strona 333

5-2Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and IP Configu

Strona 334

5-3Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Timep Operation

Strona 335

5-4Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and The IP a

Strona 336

5-5Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and To Configure IP

Strona 337 - MAC Address Management

5-6Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and 6. If you

Strona 338 - Determining MAC Addresses

5-7Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Viewing the Cur

Strona 339

5-8Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Configure

Strona 340

5-9Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and In the CLI, you

Strona 341 - Management

5-10Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Table 5-1

Strona 342

5-11Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and 1. DHCP/Bootp

Strona 343 - Configuration Changes

ivContentsCLI Control and Editing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-154 Using the Web Browser InterfaceGe

Strona 344

5-12Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Bootp Ope

Strona 345 - Switch Memory and

5-13Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Note The above

Strona 346

5-14Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Globally

Strona 347

5-15Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad

Strona 348 - VLANs to support

5-16Configuring IP Addressing, Interface Access, and System Information Interface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring

Strona 349

5-17Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad

Strona 350

5-18Configuring IP Addressing, Interface Access, and System Information Interface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring

Strona 351 - Daylight Savings Time

5-19Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad

Strona 352

5-20Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and System

Strona 353 - Numerics

5-21Configuring IP Addressing, Interface Access, and System InformationSystem InformationConfiguring IP Addressing, Interface Access, and Daylight Tim

Strona 354 - 2 – Index

vContentsWeb: Configuring IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9How IP Addressing Affects Switch Operation .

Strona 355 - Index – 3

5-22Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and CLI: Vi

Strona 356 - 4 – Index

5-23Configuring IP Addressing, Interface Access, and System InformationSystem InformationConfiguring IP Addressing, Interface Access, and Figure 5-10.

Strona 357 - Index – 5

5-24Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and Configu

Strona 358 - 6 – Index

6-1Optimizing Port Usage Through Traffic Control and 6Optimizing Port Usage Through Traffic Control and Port TrunkingOverviewThis chapter includes: C

Strona 359 - Index – 7

6-2Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Strona 360 - 8 – Index

6-3Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra

Strona 361 - Index – 9

6-4Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Strona 362 - 10 – Index

6-5Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra

Strona 363

6-6Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Strona 364

6-7Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra

Komentarze do niniejszej Instrukcji

Brak uwag