Smc-networks SMC TigerStack II SMC6624M Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Počítačové příslušenství Smc-networks SMC TigerStack II SMC6624M. SMC Networks SMC TigerStack II SMC6624M User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 364
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
Stackable Fast Ethernet Switch
24 10BASE-T/100BASE-TX RJ-45 ports
Auto MDI/MDI-X support on all ports
Optional 100BASE-FX or 1000BASE-X modules
Optional stack module for linking up to 16 units
8.8 Gbps of aggregate switch bandwidth
LACP and FEC port trunking support
Port mirroring for non-intrusive analysis
Port security
Full support for IEEE 802.1Q VLANs with GVRP
IP Multicasting with IGMP Snooping
Manageable via console, Web, SNMP/RMON
TigerSwitch 10/100
Management Guide
SMC6624M
Zobrazit stránku 0
1 2 3 4 5 6 ... 363 364

Shrnutí obsahu

Strany 1 - TigerSwitch 10/100

Stackable Fast Ethernet Switch◆ 24 10BASE-T/100BASE-TX RJ-45 ports◆ Auto MDI/MDI-X support on all ports◆ Optional 100BASE-FX or 1000BASE-X modules◆

Strany 2

viContentsHow the Switch Lists Trunk Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-27Outbound Traffic Distribution Across Trunked

Strany 3 - Management Guide

6-8Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Strany 4 - Trademarks:

6-9Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Port TrunkingPort Sta

Strany 5

6-10Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Port Connection

Strany 6

6-11Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Fault Tolerance: I

Strany 7

6-12Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Table 6-4. Trun

Strany 8 - Information

6-13Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Table 6-5. General O

Strany 9 - Trunking

6-14Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Spanning Tree P

Strany 10 - Contents

6-15Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Menu: Viewing and Co

Strany 11

6-16Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and switch automati

Strany 12

6-17Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and 8. Connect the trunk

Strany 13

viiContentsWeb: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . 7-34Building IP Masks . . . . . . . . . . . . . . . .

Strany 14 - 11 Troubleshooting

6-18Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and The show trunk

Strany 15 - B MAC Address Management

6-19Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Figure 6-9. Example

Strany 16 - D Daylight Savings Time

6-20Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and You can configu

Strany 17 - Interface

6-21Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Enabling a Dynamic L

Strany 18

6-22Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Removing Ports

Strany 19 - Advantages of Using the CLI

6-23Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Trunk Group Operatio

Strany 20

6-24Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Default Port Op

Strany 21 - Using the Menu Interface

6-25Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and LACP Notes and Restr

Strany 22 - Command Line (CLI) option.)

6-26Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Half-Duplex and

Strany 23

6-27Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Depending on the c

Strany 24

viiiContentsUsing the Menu Interface To View Stack Status And Configure Stacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 25

6-28Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and and sends traff

Strany 26 - Main Menu Features

7-1Using Passwords, Port Security, and Authorized IP 7Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Acces

Strany 27

7-2Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port

Strany 28

7-3Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing Password SecurityUsing Passwords, Port Secur

Strany 29

7-4Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port

Strany 30

7-5Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing Password SecurityUsing Passwords, Port Secur

Strany 31 - Rebooting the Switch

7-6Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port

Strany 32

7-7Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pass

Strany 33 - Menu Features List

7-8Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsing

Strany 34 - Where To Go From Here

7-9Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pass

Strany 35 - Using the CLI

ixContentsEffect of VLANs on Other Switch Features . . . . . . . . . . . . . . . . . . . . . 9-71Spanning Tree Protocol Operation with VLANs . . .

Strany 36 - Privilege Levels at Logon

7-10Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strany 37 - Privilege Level Operation

7-11Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strany 38 - Manager Privileges

7-12Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strany 39 - Interface (CLI)

7-13Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strany 40 - How To Move Between Levels

7-14Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strany 41 - ? symbol lists the

7-15Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strany 42 - Using the CLI

7-16Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strany 43 - Command Option Displays

7-17Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strany 44 - Displaying CLI “Help”

7-18Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strany 45

7-19Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strany 46 - Configuration Modes

xContentsMenu Access To Status and Counters . . . . . . . . . . . . . . . . . . . . . . . . . 10-3General System Information . . . . . . . . . . .

Strany 47

7-20Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strany 48

7-21Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strany 49 - CLI Control and Editing

7-22Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strany 50

7-23Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strany 51 - Using the Web Browser

7-24Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strany 52 - General Features

7-25Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strany 53

7-26Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Strany 54 - Session with the Switch

7-27Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Strany 55

7-28Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Strany 56 - Interface Session

7-29Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Strany 57

xiContentsUsing the Event Log To Identify Problem Sources . . . . . . . . . . . . . 11-10Menu: Entering and Navigating in the Event Log . . . . . .

Strany 58 - Using the Passwords

7-30Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Strany 59 - If You Lose a Password

7-31Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Strany 60 - Support/Mgmt URL Feature

7-32Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Strany 61 - Status Reporting Features

7-33Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Strany 62 - Port Utilization

7-34Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Strany 63

7-35Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Strany 64

7-36Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Strany 65 - The Alert Log

7-37Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Strany 66 - Alert Types

7-38Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Strany 67 - The Status Bar

8-1Monitoring and Managing the Switch8Configuring for Network Management ApplicationsYou can manage the switch via SNMP from a network management stat

Strany 68

xiiContentsC Switch Memory and ConfigurationOverview of Configuration File Management . . . . . . . . . . . . . . . . . . C-1Using the CLI To Impl

Strany 69 - Interface Access, and

8-2Configuring for Network Management ApplicationsSNMP Management FeaturesMonitoring and Managing the SwitchSNMP Management FeaturesSNMP management fe

Strany 70 - IP Configuration

8-3Configuring for Network Management ApplicationsConfiguring for SNMP Access to the SwitchMonitoring and Managing the SwitchThe switch SNMP agent als

Strany 71 - Just Want a Quick Start?

8-4Configuring for Network Management ApplicationsConfiguring for SNMP Access to the SwitchMonitoring and Managing the SwitchCaution Deleting the comm

Strany 72 - (TTL), and Timep

8-5Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchSNMP Communities SNMP Community FeaturesUse SNMP c

Strany 73

8-6Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchFigure 8-1. The SNMP Communities Screen (Default

Strany 74

8-7Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchCLI: Viewing and Configuring Community NamesCommun

Strany 75

8-8Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchSMC TigerSwitch 10/100# show snmp-server publicCon

Strany 76

8-9Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchTrap Receivers and Authenti

Strany 77

8-10Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchCLI: Configuring and Displ

Strany 78 - DHCP/Bootp Operation

8-11Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchConfiguring Trap Receivers

Strany 79

1-1Selecting a Management Interface1Selecting a Management InterfaceThis chapter describes the following: Management interfaces for the SMC6624M swit

Strany 80

8-12Configuring for Network Management ApplicationsAdvanced Management: RMON SupportMonitoring and Managing the SwitchAdvanced Management: RMON Suppor

Strany 81

9-1Configuring Advanced Features9Configuring Advanced FeaturesThis chapter describes the following features and how to configure them with the switch’

Strany 82

9-2Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesStack ManagementStacking FeaturesStack Management (termed stacking)

Strany 83 - Web, and Inbound Telnet

9-3Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features Simplify management of small workgroups or wiring closets while scaling

Strany 84 - Interface Access

9-4Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesComponents of Stack ManagementTable 9-1. Stacking DefinitionsFigure

Strany 85

9-5Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-2. Example of Stacking with One Commander Controlling Access to

Strany 86 - ■ Critical log events

9-6Configuring Advanced Features Stack ManagementConfiguring Advanced Features There is no limit on the number of stacks in the same IP subnet (b

Strany 87

9-7Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesNote In the default stack configuration, the Candidate Auto Join paramete

Strany 88 - System Information

9-8Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesOverview of Configuring and Bringing Up a StackThis process assumes

Strany 89

9-9Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesTable 9-3. Stacking Configuration GuideThe easiest way to automatically c

Strany 90

1-2Selecting a Management InterfaceAdvantages of Using the Menu InterfaceSelecting a Management InterfaceAdvantages of Using the Menu InterfaceFigure

Strany 91

9-10Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesGeneral Steps for Creating a StackThis section describes the genera

Strany 92

9-11Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. For automatically or manually pulling Candidate switches into a stack

Strany 93 - Control and Port Trunking

9-12Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing the Menu Interface To View Stack Status And Configure Stackin

Strany 94

9-13Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-6. The Default Stack Configuration Screen4. Move the cursor to

Strany 95

9-14Configuring Advanced Features Stack ManagementConfiguring Advanced Features• No (the default) prevents automatic joining of Candidates that ha

Strany 96

9-15Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesTable 9-4.Candidate Configuration Options in the Menu InterfaceUsing the

Strany 97

9-16Configuring Advanced Features Stack ManagementConfiguring Advanced Features4. Do one of the following:• To disable stacking on the Candidate,

Strany 98

9-17Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the Commander’s Menu To Manually Add a Candidate to a Stack. In t

Strany 99

9-18Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-10. Example of Candidate List in Stack Management Screen3

Strany 100 - Parameters

9-19Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-11. Example of Stack Management Screen After New Member AddedU

Strany 101 - Port Trunking

1-3Selecting a Management InterfaceAdvantages of Using the CLISelecting a Management InterfaceAdvantages of Using the CLIFigure 1-2. Example of The Co

Strany 102

9-20Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-12. Example of How the Stacking Status (All) Screen Helps

Strany 103 - Trunk Configuration Methods

9-21Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features8. Do one of the following:• If the stack containing the Member you are

Strany 104 - Through Traffic Control and

9-22Configuring Advanced Features Stack ManagementConfiguring Advanced Features4. Stack ManagementYou will then see the Stack Management screen:Fi

Strany 105

9-23Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the Commander To Access Member Switches for Configuration Changes

Strany 106

9-24Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-17. The eXecute Command Displays the Console Main Menu fo

Strany 107

9-25Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. Press [B] (for Back) to return to the Stacking Menu.4. To display Sta

Strany 108

9-26Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing Any Stacked Switch To View the Status for All Switches with S

Strany 109 - Trunk Group

9-27Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-19. Example of the Commander’s Stacking Status ScreenViewing M

Strany 110

9-28Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-20. Example of a Member’s Stacking Status ScreenViewing C

Strany 111

9-29Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To View Stack Status and Configure StackingThe CLI enables

Strany 113

1-4Selecting a Management InterfaceAdvantages of Using the Web Browser InterfaceSelecting a Management InterfaceAdvantages of Using the Web Browser In

Strany 114

9-30Configuring Advanced Features Stack ManagementConfiguring Advanced Features[no] stack member <switch-num> mac-address <mac-addr> [

Strany 115

9-31Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To View Stack StatusYou can list the stack status for an i

Strany 116 - Default Port Operation

9-32Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesViewing the Status of all Stack-Enabled Switches Discovered in the

Strany 117 - LACP Notes and Restrictions

9-33Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To Configure a Commander SwitchYou can configure any stack

Strany 118 - technol

9-34Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-26. Example of the Commander’s Show Stack Screen with Onl

Strany 119

9-35Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-27. Example of Using a Member’s CLI To Convert the Member to t

Strany 120

9-36Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing the Commander’s CLI To Manually Add a Candidate to the Stack.

Strany 121 - Security, and Authorized IP

9-37Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFor example, if the switch named “DEFAULT_CONFIG” in the above listing d

Strany 122 - Using Password Security

9-38Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing a Candidate CLI To Manually “Push” the Candidate Into a Stack

Strany 123

9-39Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesSyntax: stack member <switch-number> mac-address <mac-add

Strany 124

2-1Using the Menu Interface2Using the Menu InterfaceThis chapter describes the following features: Overview of the Menu Interface (page 4-1) Startin

Strany 125

9-40Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesSyntax: no stack name <stack name> stack join <mac-add

Strany 126 - Security tab

9-41Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesSyntax: [no] stack member <switch-num> mac-address <mac-addr&

Strany 127 - Security

9-42Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-35. Example of How To Identify the Commander’s MAC Addres

Strany 128 - Blocking Unauthorized Traffic

9-43Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-36. Example of a Stack Showing Switch Number (SN) AssignmentsT

Strany 129 - Planning Port Security

9-44Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesSNMP Community Operation in a StackCommunity MembershipIn the defau

Strany 130

9-45Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesNote that in the above example (figure 9-37) you cannot use the public c

Strany 131

9-46Configuring Advanced Features Stack ManagementConfiguring Advanced Features Stacking uses only the primary VLAN on each switch in a stack. T

Strany 132

9-47Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. Click on [Apply Changes] to save any configuration changes for the i

Strany 133

9-48Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs) VLAN F

Strany 134

9-49Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced Featuressaved by not allowing packets to flood out all por

Strany 135

2-2Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceMenu Interaction with Other Interfaces. A configuration change

Strany 136

9-50Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-40. Example of Overlapping VLANs Us

Strany 137

9-51Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-42. Example of Tagged and Untagged VLAN

Strany 138

9-52Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesDHCP or Bootp on different VLANs do not resul

Strany 139

9-53Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-43. Comparing Per-Port VLAN Options With

Strany 140 - Notice of Security Violations

9-54Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesGeneral Steps for Using VLANs1. Plan your VLA

Strany 141

9-55Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesMenu: Configuring VLAN ParametersIn the factory de

Strany 142 - Resetting Alert Flags

9-56Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced Features To select another primary VLAN, select the

Strany 143

9-57Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesAdding or Editing VLAN NamesUse this procedure to

Strany 144

9-58Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-47. Example of VLAN Names Screen wi

Strany 145

9-59Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-48. Example of VLAN Port Assignment Scre

Strany 146

2-3Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceHow To Start a Menu Interface SessionIn its factory default confi

Strany 147

9-60Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-49. Example of VLAN Assignments for

Strany 148 - Using IP Authorized Managers

9-61Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN Commands Used in this SectionDisplaying the S

Strany 149 - Access Levels

9-62Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesDisplaying the Configuration for a Particular

Strany 150 - Overview of IP Mask Operation

9-63Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesChanging the Number of VLANs Allowed on the Switch

Strany 151 - Managers

9-64Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesCreating a New Static VLANChanging the VLAN C

Strany 152

9-65Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesConverting a Dynamic VLAN to a Static VLAN. If GV

Strany 153

9-66Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced Featuresoperation. Note that Auto is the defaultper-p

Strany 154 - Building IP Masks

9-67Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesTo configure static VLAN port parameters, you will

Strany 155

9-68Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-54. Example of Tagged and Untagged

Strany 156

9-69Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesNote Each 802.1Q-compliant VLAN must have its own

Strany 157

2-4Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceFigure 2-1. The Main Menu with Manager PrivilegesFor a descriptio

Strany 158

9-70Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-56. Example of Networked 802.1Q-Com

Strany 159 - Applications

9-71Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesTo summarize:Effect of VLANs on Other Switch Featu

Strany 160 - SNMP Management Features

9-72Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN MAC AddressesThe switch has one unique M

Strany 161 - Monitoring and Managing

9-73Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN Restrictions A port must be a member of at l

Strany 162

9-74Configuring Advanced Features GVRPConfiguring Advanced FeaturesGVRPGVRP—GARP VLAN Registration Protocol—is an application of the Generic Attri

Strany 163 - SNMP Communities

9-75Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesNote There must be one common VLAN (that is, one common VID) connecting all of the G

Strany 164

9-76Configuring Advanced Features GVRPConfiguring Advanced FeaturesNote that if a static VLAN is configured on at least one port of a switch, and

Strany 165

9-77Configuring Advanced FeaturesGVRPConfiguring Advanced Features If the switch already has a static VLAN assignment with the same VID as in the adv

Strany 166

9-78Configuring Advanced Features GVRPConfiguring Advanced FeaturesTable 9-8. Options for Handling “Unknown VLAN” Advertisements:The CLI show gvrp

Strany 167

9-79Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesPer-Port Options for Dynamic VLAN Advertising and JoiningInitiating Advertisements.

Strany 168

2-5Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceFigure 2-2. An Asterisk Indicates a Configuration Change Requirin

Strany 169 - Configuring Trap Receivers

9-80Configuring Advanced Features GVRPConfiguring Advanced FeaturesAs the above table indicates, when you enable GVRP, a port that has a Tagged or

Strany 170

9-81Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesPlanning for GVRP OperationThese steps outline the procedure for setting up dynamic

Strany 171 - Configuring Advanced Features

9-82Configuring Advanced Features GVRPConfiguring Advanced Features2. Switch Configuration . . .8. VLAN Menu . . . 1. VLAN SupportFigure 9-60. Th

Strany 172 - Stack Management

9-83Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesCLI: Viewing and Configuring GVRPGVRP Commands Used in This SectionDisplaying the Sw

Strany 173 - Features

9-84Configuring Advanced Features GVRPConfiguring Advanced FeaturesEnabling and Disabling GVRP on the Switch. This command enables GVRP on the sw

Strany 174 - General Stacking Operation

9-85Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesDisplaying the Static and Dynamic VLANs Active on the Switch. The show vlans comman

Strany 175 - Operating Rules for Stacking

9-86Configuring Advanced Features GVRPConfiguring Advanced FeaturesConverting a Dynamic VLAN to a Static VLAN. If a port on the switch has joined

Strany 176 - Specific Rules

9-87Configuring Advanced FeaturesGVRPConfiguring Advanced Features By receiving advertisements from other devices running GVRP, the switch learns of

Strany 177

9-88Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesMultimedia Traffic Control with

Strany 178

9-89Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesEnabling IGMP allows the ports to det

Strany 179

2-6Using the Menu InterfaceMain Menu FeaturesUsing the Menu InterfaceMain Menu Features Figure 2-3. The Main Menu View with Manager PrivilegesThe Main

Strany 180

9-90Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Features• Blocked: Causes the switch to

Strany 181

9-91Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesViewing the Current IGMP Configuratio

Strany 182 - Configure Stacking

9-92Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesFigure 9-66. Example Listing of

Strany 183

9-93Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesConfiguring Per-Port IGMP Packet Cont

Strany 184

9-94Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesSMC TigerSwitch 10/100(vlan 1)#

Strany 185

9-95Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Featuresto or from the same source(s) is term

Strany 186 - – To change

9-96Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Features Switch 2 is recognizing IGMP t

Strany 187

9-97Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesFigure 9-68. Isolating IP Multicast

Strany 188 - Save) to

9-98Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesNote: IP Multicast Filters. IP

Strany 189

9-99Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesSpanning Tree Protocol (STP)STP FeaturesThe switch uses the

Strany 190 - 4. Stack Management

2-7Using the Menu InterfaceMain Menu FeaturesUsing the Menu Interface Command Line (CLI): Selects the Command Line Interface at the same level (Manag

Strany 191

9-100Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesSTP Fast Mode for Overcoming Server Access Failures.

Strany 192

9-101Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced Features)Figure 9-69. Example of the STP Configuration Screen4. If

Strany 193

9-102Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesCLI: Configuring STPSTP Commands Used in This SectionV

Strany 194

9-103Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesEnabling or Disabling STP. Enabling STP implements the spa

Strany 195 - Monitoring Stack Status

9-104Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesYou can also include one or more of the STP per-port p

Strany 196 - For status descriptions

9-105Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesFor example, the following enables STP (if it is not alread

Strany 197

9-106Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesFigure 9-71. Example of Redundant Paths Between Two N

Strany 198 - 9. Stacking

9-107Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesCaution The Fast Mode configuration should be used only on

Strany 199 - Stacking

9-108Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesFigure 9-72. Example of Using a Trunked Link with STP

Strany 200

10-1Monitoring and Analyzing Switch Operation10Monitoring and Analyzing Switch OperationThe SMC6624M switch has several built-in tools for monitoring,

Strany 201

2-8Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceScreen Structure and NavigationMenu interface screens include these

Strany 202

10-2Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationStatus and Counters DataThis section des

Strany 203

10-3Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access To Status and Counters Begin

Strany 204

10-4Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationGeneral System InformationMenu AccessFro

Strany 205

10-5Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationSwitch Management Address InformationMen

Strany 206 - listing

10-6Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationPort StatusThe web browser interface and

Strany 207

10-7Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationViewing Port and Trunk Group StatisticsT

Strany 208 - Stack Commander

10-8Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access to Port and Trunk Statistics

Strany 209

10-9Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationCLI Access To Port and Trunk Group Stati

Strany 210 - Auto Join parameter

10-10Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationViewing the Switch’s MAC Address Tables

Strany 211

10-11Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access to the MAC Address Views an

Strany 212 - 1 - 15)

2-9Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceTable 4-1. How To Navigate in the Menu Interface Task: Actions:Execu

Strany 213

10-12Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch Operation2. Type the MAC address you want to loc

Strany 214

10-13Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationEnter MAC address: _2. Type the MAC add

Strany 215 - Transmission Interval

10-14Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationSpanning Tree Protocol (STP) Informatio

Strany 216

10-15Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationFigure 10-11.Example of STP Port Inform

Strany 217 - Status Messages

10-16Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationInternet Group Management Protocol (IGM

Strany 218

10-17Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationVLAN InformationThe switch uses the CLI

Strany 219

10-18Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationListing the VLAN ID (VID) and Status fo

Strany 220 - SMC6624M

10-19Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationWeb Browser Interface Status Informatio

Strany 221 - Overview of Using VLANs

10-20Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationPort Monitoring Features Port Monitorin

Strany 222

10-21Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationMenu: Configuring Port MonitoringThis p

Strany 223

6 HughesIrvine, CA 92618Phone: (949) 707-2400TigerSwitch 10/100Management GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsJuly 2001P

Strany 224 - Notes on Using VLANs

2-10Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceTo get Help on individual parameter descriptions. In most screens

Strany 225

10-22Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-17. How To Select a Monitorin

Strany 226 - VLANs setting

10-23Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch Operationiv. Press [Enter], then press [S] (for

Strany 227 - Adding or Editing VLAN Names

10-24Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-19.Example of Monitored Port

Strany 228 - VLAN and ID

10-25Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-21.Examples of Removing Ports

Strany 229

10-26Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch Operation

Strany 230

11-1Troubleshooting11TroubleshootingThis chapter addresses performance-related network problems that can be caused by topology, switch configuration,

Strany 231

11-2TroubleshootingTroubleshooting ApproachesTroubleshootingTroubleshooting ApproachesUse these approaches to diagnose switch problems: Check the swi

Strany 232

11-3TroubleshootingBrowser or Console Access ProblemsTroubleshootingBrowser or Console Access ProblemsCannot access the web browser interface: Acces

Strany 233

11-4TroubleshootingBrowser or Console Access ProblemsTroubleshootingCannot Telnet into the switch console from a station on the network: Telnet acce

Strany 234 - Showing the result

11-5TroubleshootingUnusual Network ActivityTroubleshootingUnusual Network ActivityNetwork activity that exceeds accepted norms may indicate a hardware

Strany 235

2-11Using the Menu InterfaceRebooting the SwitchUsing the Menu InterfaceRebooting the SwitchRebooting the switch from the menu interface Terminates a

Strany 236 - ■ Select a new Primary VLAN

11-6TroubleshootingUnusual Network ActivityTroubleshootingIP addresses that will expire after a limited duration. One solution is to configure “reserv

Strany 237 - VLAN Tagging Information

11-7TroubleshootingUnusual Network ActivityTroubleshootingProblems Related to Spanning-Tree Protocol (STP)Caution If you enable STP, it is recommended

Strany 238 - ■ In switch Y:

11-8TroubleshootingUnusual Network ActivityTroubleshootingVLAN-Related ProblemsMonitor Port. When using the monitor port in a multiple VLAN environ-m

Strany 239

11-9TroubleshootingUnusual Network ActivityTroubleshooting1. If VLAN_1 (VID=1) is configured as “Untagged” on port 3 on switch “X”, then it must also

Strany 240

11-10TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingUsing the Event Log To Identify Problem SourcesThe Event Log records

Strany 241 - IP Interfaces

11-11TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingTable 11-1. Event Log System ModulesMenu: Entering and Navigating in

Strany 242 - Port Monitoring

11-12TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingThe log status line at the bottom of the display identifies where in

Strany 243 - VLAN Restrictions

11-13TroubleshootingDiagnostic ToolsTroubleshootingDiagnostic ToolsDiagnostic FeaturesPing and Link TestsThe Ping test and the Link test are point-to-

Strany 244

11-14TroubleshootingDiagnostic ToolsTroubleshootingWeb: Executing Ping or Link TestsFigure 11-12.Link and Ping Test Screen on the Web Browser Interfac

Strany 245 - General Operation

11-15TroubleshootingDiagnostic ToolsTroubleshootingNumber of Packets to Send is the number of times you want the switch to attempt to test a connectio

Strany 246

2-12Using the Menu InterfaceRebooting the SwitchUsing the Menu InterfaceRebooting To Activate Configuration Changes. Configuration changes for most p

Strany 247

11-16TroubleshootingDiagnostic ToolsTroubleshootingLink Tests. You can issue single or multiple link tests with varying repititions and timeout perio

Strany 248 - Default:

11-17TroubleshootingDiagnostic ToolsTroubleshootingDisplaying the Configuration FileThe complete switch configuration is contained in a file that you

Strany 249

11-18TroubleshootingDiagnostic ToolsTroubleshootingCLI Administrative and Troubleshooting CommandsThese commands provide information or perform action

Strany 250 - GVRP and VLAN Access Control

11-19TroubleshootingRestoring the Factory-Default ConfigurationTroubleshootingRestoring the Factory-Default ConfigurationAs part of your troubleshooti

Strany 251 - Configuring GVRP On a Switch

11-20TroubleshootingRestoring the Factory-Default ConfigurationTroubleshooting

Strany 252

A-1Transferring an Operating System or Startup ATransferring an Operating System or Startup Configuration FileYou can download new switch software (op

Strany 253

A-2Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Using

Strany 254

A-3Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Menu:

Strany 255

A-4Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup A “pr

Strany 256 - GVRP Operating Notes

A-5Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup 2. En

Strany 257

2-13Using the Menu InterfaceMenu Features ListUsing the Menu InterfaceMenu Features ListStatus and Counters• General System Information• Switch Manage

Strany 258 - Multicast (IGMP)

A-6Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Using

Strany 259

A-7Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup For e

Strany 260

A-8Transferring an Operating System or Startup Configuration FileTroubleshooting TFTP DownloadsTransferring an Operating System or Startup Troubleshoo

Strany 261

A-9Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup Anoth

Strany 262

A-10Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup TFTP:

Strany 263

A-11Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup Xmodem

Strany 264 - How IGMP Operates

A-12Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup

Strany 265 - Role of the Switch

B-1MAC Address ManagementBMAC Address ManagementThe switch assigns MAC addresses in these areas: For management functions:• One Base MAC address assi

Strany 266

B-2MAC Address ManagementDetermining MAC AddressesMAC Address ManagementMenu: Viewing the Switch’s MAC AddressesThe Management Address Information scr

Strany 267

B-3MAC Address ManagementDetermining MAC AddressesMAC Address ManagementCLI: Viewing the Port and VLAN MAC Addresses The MAC address assigned to each

Strany 268

2-14Using the Menu InterfaceWhere To Go From HereUsing the Menu InterfaceWhere To Go From HereThis chapter provides an overview of the menu interface

Strany 269 - Spanning Tree Protocol (STP)

B-4MAC Address ManagementDetermining MAC AddressesMAC Address Management

Strany 270 - Menu: Configuring STP

C-1Switch Memory and ConfigurationCSwitch Memory and ConfigurationThis appendix describes the following: How switch memory manages configuration chan

Strany 271

C-2Switch Memory and ConfigurationOverview of Configuration File ManagementSwitch Memory and Configuration Startup-config File: Exists in flash (non-

Strany 272 - CLI: Configuring STP

C-3Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and ConfigurationThe above command disables port 5 in

Strany 273

C-4Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and Configuration2. Use the appropriate show commands

Strany 274

C-5Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and ConfigurationIf you use the CLI to change a parame

Strany 275 - How STP Operates

C-6Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and ConfigurationHow To Re

Strany 276 - STP Fast Mode

C-7Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and ConfigurationNote The

Strany 277

C-8Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configurationface, the

Strany 278

C-9Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configuration(To acces

Strany 279 - Switch Operation

3-1Using the Command Line Interface (CLI)3Using the Command Line Interface (CLI)The CLI is a text-based command interface for configuring and monitori

Strany 280 - Status and Counters Data

C-10Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configuration

Strany 281

D-1Daylight Savings TimeDDaylight Savings TimeThe SMC6624M switch provides a way to automatically adjust the system clock for Daylight Savings Time (D

Strany 282 - General System Information

D-2Daylight Savings TimeDaylight Savings TimeFigure D-1. Menu Interface with “User-Defined” Daylight Time Rule OptionBefore configuring a “User define

Strany 283 - CLI Access

Index – 1IndexNumerics802.1Q VLAN standard … 9-99802.3u auto negotiation standard … 6-2Aaccessmanager … 8-5operator … 8-5access levels, authorized IP

Strany 284 - Port Status

2 – IndexIndexquick … 2-7restoring factory defaults … 11-19saving from menu interface … 2-9serial link … 5-15SNMP … 8-3, 8-5spanning tree … 9-99spanni

Strany 285

Index – 3IndexGGARPSee GVRPgateway … 5-2, 5-4gateway (IP) address … 5-3, 5-5GVRPadvertisement … 9-75, 9-87advertisement, defined … 9-74advertisement,

Strany 286

4 – IndexIndexconfiguration … 5-2DHCP/Bootp … 5-2duplicate address … 11-5duplicate address, DHCP network … 11-5effect when address not used … 5-9gatew

Strany 287

Index – 5Indexmulticast groupSee IGMPmultimediaSee IGMPmultiple VLAN … 8-1multi-port bridge … 5-1Nnavigation, console interface … 2-8 –2-9navigation,

Strany 288

6 – IndexIndexoperating notes … 7-26overview … 7-7port trunk restriction … 6-10prior to … 7-27proxy web server … 7-27trunk restriction … 6-14port trun

Strany 289

Index – 7Indexauthorized IP managers … 7-28per port … 7-7security violationsnotices of … 7-20Self Test LEDbehavior during factory default reset … 11-1

Strany 290

3-2Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)When you use the CLI to make a configuration change, the s

Strany 291

8 – IndexIndextraffic analysis … 8-1traffic monitoring … 8-1, 8-4traffic, monitoring … 10-20traffic, port … 10-7transceiver, fiber-optic … 6-3transcei

Strany 292 - Menu Access to STP Data

Index – 9Indexprimary, CLI command … 9-61, 9-63primary, select in menu … 9-56primary, web configure … 9-66primary, with DHCP … 9-54reboot required … 2

Strany 295 - VLAN Information

6 HughesIrvine, CA 92618Phone: (949) 707-2400FOR TECHNICAL SUPPORT, CALL:From U.S.A. and Canada (24 hours, 7 days a week)(800) SMC-4-YOU; (949) 707-24

Strany 296

3-3Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Caution SMC strongly recommends that you configure a Manag

Strany 297

3-4Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Manager Privileges Manager privileges give you three addit

Strany 298 - Port Monitoring Features

3-5Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI) SMC TigerSwitch 10/100(vlan-10)#Changing Interfa

Strany 299

Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, n

Strany 300

3-6Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)How To Move Between LevelsMoving Between the CLI and the M

Strany 301

3-7Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)For example, if you use the CLI to set a Manager password,

Strany 302

3-8Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Typing ? at the Manager level produces this listing:Figure

Strany 303

3-9Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)As mentioned above, if you type part of a command word and

Strany 304

3-10Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Thus, if you wanted to create a port trunk group using po

Strany 305 - Troubleshooting

3-11Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-7. Example of Context-Sensitive Command-List Hel

Strany 306 - Troubleshooting Approaches

3-12Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-9. Example of Help for a Specific Instance of a

Strany 307

3-13Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-10. Context-Specific Commands Affecting Port Con

Strany 308

3-14Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)VLAN Context. Includes VLAN-specific commands that apply

Strany 309 - Unusual Network Activity

3-15Using the Command Line Interface (CLI)CLI Control and EditingUsing the Command Line Interface (CLI)CLI Control and EditingKeystrokes Function[Ctrl

Strany 310 - IGMP-Related Problems

iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Strany 311 - Timep or Gateway Problems

3-16Using the Command Line Interface (CLI)CLI Control and EditingUsing the Command Line Interface (CLI)

Strany 312 - VLAN-Related Problems

4-1Using the Web Browser Interface4Using the Web Browser InterfaceThe web browser interface built into the switch lets you easily access the switch fr

Strany 313

4-2Using the Web Browser InterfaceGeneral FeaturesUsing the Web Browser InterfaceGeneral FeaturesThe SMC6624M switch includes these web browser interf

Strany 314

4-3Using the Web Browser InterfaceWeb Browser Interface RequirementsUsing the Web Browser Interface Web Browser Interface RequirementsYou can use equi

Strany 315

4-4Using the Web Browser InterfaceStarting a Web Browser Interface Session with the SwitchUsing the Web Browser InterfaceStarting a Web Browser Interf

Strany 316 - ■ All events recorded

4-5Using the Web Browser InterfaceStarting a Web Browser Interface Session with the SwitchUsing the Web Browser InterfaceFigure 4-1. Example of Status

Strany 317 - Diagnostic Tools

4-6Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceTasks for Your First Web Browser In

Strany 318

4-7Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceThis window is the launching point

Strany 319 - CLI: Ping or Link Tests

4-8Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceTo set the passwords:1. Access the

Strany 320

4-9Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser Interface Entering the operator password gi

Strany 321

LIMITED WARRANTYiiMAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF SMC OR ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF

Strany 322

4-10Using the Web Browser InterfaceSupport/Mgmt URL FeatureUsing the Web Browser InterfaceSupport/Mgmt URL FeatureThe Support/Mgmt URL window enables

Strany 323 - Configuration

4-11Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceStatus Reporting FeaturesBrowser elements covered in this s

Strany 324

4-12Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceThe Port Utilization and Status DisplaysThe Port Utilizatio

Strany 325

4-13Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser Interface Maximum Activity Indicator: As the bars in the graph area

Strany 326

4-14Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfacePort StatusFigure 4-10. The Port Status Indicators and Lege

Strany 327 - System or Startup

4-15Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceThe Alert LogThe web browser interface Alert Log, shown in

Strany 328 - Switch-to-Switch Download

4-16Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceAlert TypesThe following table lists the types of alerts th

Strany 329

4-17Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceNote When troubleshooting the sources of alerts, it may be

Strany 330 - Menu: Xmodem Download

4-18Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceTable 4-3. Status Indicator Key System Name. The name you

Strany 331

5-1Configuring IP Addressing, Interface Access, and 5Configuring IP Addressing, Interface Access, and System InformationThis chapter describes the swi

Strany 332 - Message Indicating

iiiContentsContents1 Selecting a Management InterfaceUnderstanding Management Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Advant

Strany 333

5-2Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and IP Configu

Strany 334

5-3Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Timep Operation

Strany 335

5-4Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and The IP a

Strany 336

5-5Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and To Configure IP

Strany 337 - MAC Address Management

5-6Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and 6. If you

Strany 338 - Determining MAC Addresses

5-7Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Viewing the Cur

Strany 339

5-8Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Configure

Strany 340

5-9Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and In the CLI, you

Strany 341 - Management

5-10Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Table 5-1

Strany 342

5-11Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and 1. DHCP/Bootp

Strany 343 - Configuration Changes

ivContentsCLI Control and Editing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-154 Using the Web Browser InterfaceGe

Strany 344

5-12Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Bootp Ope

Strany 345 - Switch Memory and

5-13Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Note The above

Strany 346

5-14Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Globally

Strany 347

5-15Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad

Strany 348 - VLANs to support

5-16Configuring IP Addressing, Interface Access, and System Information Interface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring

Strany 349

5-17Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad

Strany 350

5-18Configuring IP Addressing, Interface Access, and System Information Interface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring

Strany 351 - Daylight Savings Time

5-19Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad

Strany 352

5-20Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and System

Strany 353 - Numerics

5-21Configuring IP Addressing, Interface Access, and System InformationSystem InformationConfiguring IP Addressing, Interface Access, and Daylight Tim

Strany 354 - 2 – Index

vContentsWeb: Configuring IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9How IP Addressing Affects Switch Operation .

Strany 355 - Index – 3

5-22Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and CLI: Vi

Strany 356 - 4 – Index

5-23Configuring IP Addressing, Interface Access, and System InformationSystem InformationConfiguring IP Addressing, Interface Access, and Figure 5-10.

Strany 357 - Index – 5

5-24Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and Configu

Strany 358 - 6 – Index

6-1Optimizing Port Usage Through Traffic Control and 6Optimizing Port Usage Through Traffic Control and Port TrunkingOverviewThis chapter includes: C

Strany 359 - Index – 7

6-2Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Strany 360 - 8 – Index

6-3Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra

Strany 361 - Index – 9

6-4Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Strany 362 - 10 – Index

6-5Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra

Strany 363

6-6Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Strany 364

6-7Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra

Komentáře k této Příručce

Žádné komentáře