Instruction/ maintenance manual of the product SMC6624M SMC Networks
Go to page of 364
Stackable F ast Ether net Switch ◆ 24 10B ASE-T/ 100B ASE-T X RJ-45 ports ◆ Auto MDI/M DI-X suppo rt on all ports ◆ Optional 10 0B ASE-FX or 1000B ASE-X modul es ◆ Optional stack m odule for linki ng up to 16 units ◆ 8.
.
6 Hughes Irvine, CA 9261 8 Phone: (9 49) 707-24 00 T igerSwitch 10/100 Manag ement Guide From SMC’ s T iger line of feature-rich w orkgroup LAN solutions July 2 001 Pub.
Infor ma tion fur nished by SMC Networks , Inc. (SMC) is believed to be accu rate and relia ble. Ho wever , no responsibi lity is assumed by SMC for its us e, nor for any infringemen ts of paten ts or other rights of third par ties which may result from its use.
i L IMITED W ARRANTY Limited W arranty Statement: SMC Networks , Inc. (“SMC”) warrants its pr oducts to be free from defects in workmanship and materia ls, under nor mal use and ser vice, for the applicabl e war ranty ter m.
L IMIT ED W AR RANTY ii MAINTE NAN CE, USE, P ERFOR MANCE , F AILUR E, OR INTERRUPTI ON OF ITS PRODUCTS, EVEN I F SMC O R ITS A UTHORIZED RESELLER HAS BEEN ADV ISED OF THE POSSIBILI TY OF SUCH D AMA GES .
iii Conten ts Contents 1 Select ing a Ma nageme nt Inte rface Understand ing Management Interfac es . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Advantag es of Using the Menu Interface . . . . . . . . . . . . . . . . . . . . . . . . 1-2 Advan tages of U sing t he CLI .
iv Conte nts CLI Co ntrol and E diting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-15 4 Using the We b Brow ser Interf ace General F eatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
v Conten ts Web: Configuring IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9 How IP Addressing Aff ects Switch Operation . . . . . . . . . . . . . . . . . . . . 5-9 DHCP/Bootp Operation . . . . . . . . . . . . . . . . .
vi Conte nts How the Switch Lists Trunk Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-27 Outbound Traffic Distribution Across Trunked Links . . . . . . . . . . . . 6-27 7 Using Passwords, Port Security, and Authorized IP Manage rs To Protect Ag ainst Unaut horized Acce ss Using Password Security .
vii Conten ts Web: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . 7-34 Building IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-34 Config uring On e Station P er Auth orized Manager I P Entry .
viii Conte nts Usin g the Menu I nterf ace To View S tack Stat us An d Conf igure Stacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-12 Usin g the Menu In terf ace To View a nd Co nfig ure a Co mmande r Switch .
ix Conten ts Effect of V LANs on Other Switch Features . . . . . . . . . . . . . . . . . . . . . 9-71 Spanning Tree Protocol Operat ion with VLANs . . . . . . . . . . . . . 9-71 IP Interfa ces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
x Conte nts Menu Access To Status and Counters . . . . . . . . . . . . . . . . . . . . . . . . . 10-3 General System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4 Menu Access . . . . . . . . . . . . . . . . . . . .
xi Conten ts Using the Eve nt Log To Id entify Pr oblem Sour ces . . . . . . . . . . . . . 11-1 0 Menu: Entering and Navigat ing in the Event Log . . . . . . . . . . . . . . . 11-11 CLI: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xii Conte nts C Swi tch Memo ry an d Conf igura tion Overview o f Configurat ion File Man agement . . . . . . . . . . . . . . . . . . C-1 Using the CL I To Impl ement Co nfig uration Ch anges . . . . . . . . . . . C-3 Using the Men u and W eb Brow ser Inte rfaces To I mplement Configura tion Changes .
1-1 Sele cting a Ma nagemen t Interface 1 Selecting a Management Interface This chapte r describes the follow ing: ■ Manage men t inte rfaces for th e SMC6 624M switch ■ Advant ages of using each .
1-2 Selec ting a Ma nagem ent I nterfa ce Advant ages of Using the Menu I nterfa ce Sele cting a Ma nagement Int erfa ce Advantages of Using the Menu Interface Figure 1-1.
1-3 Sele cting a M anage ment I nte rface Advan tage s of Usin g the CLI Sele cting a Ma nagemen t Interface Advantages of Using the CLI Figure 1-2. Exampl e of The Comma nd Prompt ■ Provides a ccess to the co mplete set of the switch con figuration, pe rfor- mance, and di agno stic features .
1-4 Selec ting a Ma nagem ent I nterfa ce Advant ages of Using the We b Browse r Inte rface Sele cting a Ma nagement Int erfa ce Advantages of Using the W eb Browser Interface Figure 1-3.
2-1 Using the Menu Interface 2 Using the Menu Interface This chap ter de scribes the fo llowing fea tures: ■ Over view of th e Menu In terf ace (pag e 4-1) ■ Starti ng and en ding a M enu session .
2-2 Using the Menu Inte rface Star ting and Endi ng a Menu Sessi on Usin g the Me nu Int erfa ce Menu I nterac tio n with Othe r Inter face s. ■ A con figurati on chang e made thr ough any swi tch i nterfac e over writes earli er ch anges made th rough any othe r inte rface .
2-3 Using the Me nu In ter face Start ing an d Ending a Men u Sessi on Using the Menu Interface How T o Start a Menu Interfa ce Session In its fac tory defau lt config uration, the switch con sole starts with the CLI prompt. T o use the menu int erfac e with Mana ger privile ges, go to the Ma nager level pr ompt and en ter the me nu co mmand.
2-4 Using the Menu Inte rface Star ting and Endi ng a Menu Sessi on Usin g the Me nu Int erfa ce Figure 2-1. The Ma in Menu with Man ager Privil eges For a descrip tion of Main Men u features, see “Main Men u Feature s” on page 2-6.
2-5 Using the Me nu In ter face Start ing an d Ending a Men u Sessi on Using the Menu Interface Figure 2-2. An Asterisk In dicates a Config uration Change R equirin g a Reb oot 1.
2-6 Using the Menu Inte rface Main Me nu Featu res Usin g the Me nu Int erfa ce Main Menu Features Figure 2-3. T he M ain Menu View with Manager P rivileges The Main Menu g ives you acce ss to these M.
2-7 Using the Me nu In ter face Main M enu Feat ures Using the Menu Interface ■ Command Li ne (CLI): Select s the C ommand Line I n terfac e at the same level (M anage r or Opera tor) th at you are accessi ng in the Me nu interf ace. (See ch apte r 3, “Us ing the Comma nd Line Interfa ce (C LI).
2-8 Using the Menu Inte rface Scre en Struc tur e and Navig atio n Usin g the Me nu Int erfa ce Screen Structure and Nav igation Menu i nterface screens incl ude the se three elements: ■ Param ete r.
2-9 Using the Me nu In ter face Scre en Struc tur e and Navig atio n Using the Menu Interface T ab le 4-1. How T o Navigate in the Menu In terface T ask: Ac tions: Execu te an act ion from th e “Act.
2-10 Using the Menu Inte rface Scre en Struc tur e and Navig atio n Usin g the Me nu Int erfa ce T o get H elp on indi vidual par ameter descri ptions . In most scr eens there is a Help option in the Actions line. Wh enever an y of th e items in th e Actions line is highligh ted, pre ss [H], and a sepa rate he lp scree n is displa yed.
2-1 1 Using the Me nu In ter face Reboot ing the S witch Using the Menu Interface Rebooting the Switch Reboot ing the swit ch from the menu inte rface ■ T erminates all c urrent session s and perf o.
2-12 Using the Menu Inte rface Reboot ing the Swit ch Usin g the Me nu Int erfa ce Rebooting T o Activate Configu ration Changes. Configuration c hanges for most par ameters bec ome effec tive as soon a s you sav e them. Ho wever , you mu st rebo ot th e swit ch in order t o imp lemen t a ch ange in the Max imum VLA Ns to s uppor t par ameter .
2-1 3 Using the Me nu In ter face Menu F eatu res Li st Using the Menu Interface Menu Features List Sta tus and Co unte rs • Gener al System Informat ion • Switch Ma nageme nt Addre ss Inform atio.
2-14 Using the Menu Inte rface Where To Go From He re Usin g the Me nu Int erfa ce Where T o Go From Here This c hapter provid es a n overvi ew of the m enu int erfac e and how to use it. The follo wing table indicates w here to tu rn for deta iled infor mation on h ow to use the indi vidual featur es availab le thr ough t he menu interf ace.
3-1 Us ing th e Co mmand Line Interf ace (CLI) 3 Using the Command Line Interface (CLI) The CL I is a text - based comman d interf ace fo r configu ring and moni tori ng the switch.
3-2 Using th e Command Line Interfa ce (CLI) Using the CLI Usin g the Command Line Interf ace (CLI) When you use the C LI to m ake a conf igurat ion ch ange, t he switch w rites the change to the Run ning-Config file in volatile me mory . This allows you to test your configu ration c hang es be fore ma king them perman ent.
3-3 Using t he Co mmand Line Inte rface (CLI) Usin g the CLI Us ing th e Co mmand Line Interf ace (CLI) Caut ion SMC stro ngly re comm ends tha t you c onfigur e a Manager passwo rd.
3-4 Using th e Command Line Interfa ce (CLI) Using the CLI Usin g the Command Line Interf ace (CLI) Manager Privileges Manag er privi leges give y ou thre e ad ditional leve ls of acce ss: Manage r , Glo bal Configura tion, and Cont ext Confi guration.
3-5 Using t he Co mmand Line Inte rface (CLI) Usin g the CLI Us ing th e Co mmand Line Interf ace (CLI) SMC TigerSwitch 10/100(vlan-10)# Changin g Interfac es. If yo u change from the CLI to the menu interface, or the reverse, yo u will remain at the same priv ilege level.
3-6 Using th e Command Line Interfa ce (CLI) Using the CLI Usin g the Command Line Interf ace (CLI) How T o Move Between Levels Movin g Be tween t he CL I and the Menu Inter face . When moving between int erfaces, the switch retains th e current priv ilege level (Ma nager or Opera tor) .
3-7 Using t he Co mmand Line Inte rface (CLI) Usin g the CLI Us ing th e Co mmand Line Interf ace (CLI) For example , if you use the CLI to set a Manage r password, an d then later use the Se tup scree n (in the me nu interfa ce) to se t a di fferent Manager password , then the f irst password will be rep laced by the se cond one .
3-8 Using th e Command Line Interfa ce (CLI) Using the CLI Usin g the Command Line Interf ace (CLI) T yping ? at the Manager leve l produces this li sting: Figure 3-4. Example of the Manager -Level Command Listing When - - MORE - - appears, there are mo re comman ds in the lis ting.
3-9 Using t he Co mmand Line Inte rface (CLI) Usin g the CLI Us ing th e Co mmand Line Interf ace (CLI) As mention ed above, if you t ype part of a co mmand wor d and press [T ab], the CLI com pletes .
3-10 Using th e Command Line Interfa ce (CLI) Using the CLI Usin g the Command Line Interf ace (CLI) Thus, if you w anted to cre ate a port trunk group using ports 5 - 8, the a bove conven tions show .
3-11 Using t he Co mmand Line Inte rface (CLI) Usin g the CLI Us ing th e Co mmand Line Interf ace (CLI) Figure 3-7. Example of Conte xt-Sensitive C ommand-List Hel p Displaying He lp for an Indi vidual Command.
3-12 Using th e Command Line Interfa ce (CLI) Using the CLI Usin g the Command Line Interf ace (CLI) Figure 3-9. Example o f Help f or a S pecific Instance of a Command Note that if you try to list the help for an indi vidual co mmand from a privil ege level th at doe s not incl ude that command, th e switch returns an error message.
3-13 Using t he Co mmand Line Inte rface (CLI) Usin g the CLI Us ing th e Co mmand Line Interf ace (CLI) Figure 3-10. Context-Sp ecific Co mmands Affec ting Port Co ntext SMC TigerSwitch 10/100(eth-5-.
3-14 Using th e Command Line Interfa ce (CLI) Using the CLI Usin g the Command Line Interf ace (CLI) VLAN Contex t. Includes VLAN- speci fic co mmands that apply only t o the selected VLAN, plu s Manage r and Oper ator com mands. The pro mpt for thi s mode incl udes the VLA N ID of the selec ted VL AN.
3-15 Using t he Co mmand Line Inte rface (CLI) CLI C ontro l and Ed iti ng Us ing th e Co mmand Line Interf ace (CLI) CLI Control and Editing Key st rokes Function [Ctrl] [A] Jumps to the firs t chara cter of the command l ine. [Ctrl] [B] or [< ] Moves the cu rsor ba ck one ch aract er .
3-16 Using th e Command Line Interfa ce (CLI) CLI Contr ol and Editing Usin g the Command Line Interf ace (CLI).
4-1 Using t he Web Browser Interface 4 Using the W eb Browser Interface The web browser int erface built into t he switch lets you easily access the switch from a browser -based PC on y our netwo rk.
4-2 Using th e Web Brows er Interfa ce Gener al Featu res Using the Web Browser Interface General Features The SM C6624M s witch in cludes these web b rowser in terface features: Switch Configu ration.
4-3 Using the We b Brows er Int erface Web Br owser In terf ace Re quire men ts Using t he Web Browser Interface W eb Browser Interface Requirement s Y ou can use equip ment me eting th e follow ing requir ement s to access the web browser interfac e on yo ur intran et.
4-4 Using th e Web Brows er Interfa ce Start ing a W eb Br owser Interfac e Sess ion wi th the Switch Using the Web Browser Interface Starting a W eb Browser Interface Session with the Switch Y ou can.
4-5 Using the We b Brows er Int erface Starting a We b Browse r Interface Se ssion with the Switc h Using t he Web Browser Interface Figure 4-1. Example of Status Ov erview Scre en Note The a bove scre en appe ars somewhat different i f the swi tch is config ured as a stack C ommander .
4-6 Using th e Web Brows er Interfa ce Tasks for Your Fi rst Web Browser Interf ace Sessio n Using the Web Browser Interface T asks for Y our First W eb Browser Interface Session The first ti me you a.
4-7 Using the We b Brows er Int erface Task s for You r First Web Br owser In terf ace Sessi on Using t he Web Browser Interface This wind ow is the launc hing point for the ba sic config uratio n you need to perform t o set web browse r interfa ce password s to maintain security .
4-8 Using th e Web Brows er Interfa ce Tasks for Your Fi rst Web Browser Interf ace Sessio n Using the Web Browser Interface T o set the passwords: 1. Acc ess the Device Pa sswords scree n by one of t.
4-9 Using the We b Brows er Int erface Task s for You r First Web Br owser In terf ace Sessi on Using t he Web Browser Interface ■ Enteri ng t he oper ator p assword g ives y ou read and limited write capabi l- ities.
4-10 Using th e Web Brows er Interfa ce Suppo rt/Mgmt URL Featur e Using the Web Browser Interface Support/Mgmt URL Featu re The Suppo rt/Mgmt U RL window en ables you to cha nge the W or ld W ide W eb Universal Re source Lo cator ( URL) for a support inf ormati on site for yo ur switch.
4-1 1 Using the We b Brows er Int erface Status R eport ing Fe ature s Using t he Web Browser Interface Status Reporting Features Brows er el ement s cov ered in thi s sect ion i nclude : ■ The Over.
4-12 Using th e Web Brows er Interfa ce Stat us Repo rtin g Featur es Using the Web Browser Interface The Port Utilization and Status Displa ys The Port Utili zation and Status display s show an overv iew of the st atus of the switch and the amount of ne twork activ ity on each p ort.
4-1 3 Using the We b Brows er Int erface Status R eport ing Fe ature s Using t he Web Browser Interface ■ Maximum Ac tivity Ind icator: As the bars i n the gr aph ar ea c hange height to refl ect th.
4-14 Using th e Web Brows er Interfa ce Stat us Repo rtin g Featur es Using the Web Browser Interface Port Sta tus Figure 4-10. T he Po rt Statu s Indic ators an d Legend The Port Stat us indicator s show a symbol f or each port t hat indicate s the general st atus of the por t.
4-1 5 Using the We b Brows er Int erface Status R eport ing Fe ature s Using t he Web Browser Interface The Alert Log The web brow ser inte rface Ale rt Log, shown in the lower ha lf of the sc reen, shows a list of network occurrences, or alerts , th at were dete cted by th e switch .
4-16 Using th e Web Brows er Interfa ce Stat us Repo rtin g Featur es Using the Web Browser Interface Alert T ypes The follo wing table lists the t ypes of al erts that ca n be gener ated. T able 4-2. Al ert St rings an d Descript ions Alert Stri ng Alert Descrip tion First T ime Install Importan t insta llation in formation fo r your switch.
4-1 7 Using the We b Brows er Int erface Status R eport ing Fe ature s Using t he Web Browser Interface Note When troubleshoo ting the sourc es of alerts, it ma y be helpfu l to check th e switch’ s P ort Status an d Port C ounter wind ows an d the Event Lo g in the consol e interfa ce.
4-18 Using th e Web Brows er Interfa ce Stat us Repo rtin g Featur es Using the Web Browser Interface T able 4-3. Stat us Indicator K ey ■ System Nam e. The name you have configure d for the sw itch b y using Identit y screen, sy stem name command, or the sw itch console Sy stem Information screen.
5-1 Configuring IP Addressing , Inte rf ace A cce ss, and 5 Configuri ng IP Addressing, Interface Access, and System Information This chapter describ es the switch conf iguration features availa ble in the menu interfac e, CLI an d web browse r interfa ce.
5-2 Config uring IP Addressin g, Interfac e Acces s, and Sy stem In formation IP Confi gurat ion Config uring IP Ad dressing, Interfa ce Access, and IP Configuration IP Configur ation Featur es IP Ad dress and Su bnet Mas k. Configu ring the swit ch with an IP address expands your ab ility to manage the switch and use its features .
5-3 Configurin g IP Address ing, Interf ace Access , and System Inf ormation IP Configu ratio n Configuring IP Addressing , Inte rf ace A cce ss, and T imep Operat ion. Use this op tional par amete r if you want the swit ch to get its time inform ation from anothe r device opera ting as a T imep server .
5-4 Config uring IP Addressin g, Interfac e Acces s, and Sy stem In formation IP Confi gurat ion Config uring IP Ad dressing, Interfa ce Access, and ■ The IP addressin g used in th e switch shoul d be compati ble with your network. Tha t is, the IP add ress must be unique and the su bnet mask must be appro priat e for th e IP netw ork.
5-5 Configurin g IP Address ing, Interf ace Access , and System Inf ormation IP Configu ratio n Configuring IP Addressing , Inte rf ace A cce ss, and T o Con figure IP Addressing .
5-6 Config uring IP Addressin g, Interfac e Acces s, and Sy stem In formation IP Confi gurat ion Config uring IP Ad dressing, Interfa ce Access, and 6. I f you sel ecte d Manu al , press [T ab] or [v] , a nd additiona l fields will be displayed for ente ring the IP address for the T imep server .
5-7 Configurin g IP Address ing, Interf ace Access , and System Inf ormation IP Configu ratio n Configuring IP Addressing , Inte rf ace A cce ss, and V iewing the Cu rrent IP Configurati on. The fo llowing c ommand displays the IP addres sin g for ea ch VLAN config ured in th e swit ch.
5-8 Config uring IP Addressin g, Interfac e Acces s, and Sy stem In formation IP Confi gurat ion Config uring IP Ad dressing, Interfa ce Access, and Conf igure an IP Addre ss an d Sub net Ma sk. T he foll owing co mmand includes both t he IP address a nd the subnet m ask.
5-9 Configurin g IP Address ing, Interf ace Access , and System Inf ormation IP Configu ratio n Configuring IP Addressing , Inte rf ace A cce ss, and In the C LI, you can execute t his comman d only from the glo bal conf igurati on level. The TTL range is 2 - 255 seconds.
5-10 Config uring IP Addressin g, Interfac e Acces s, and Sy stem In formation IP Confi gurat ion Config uring IP Ad dressing, Interfa ce Access, and T ab le 5-1. Features A vailabl e With and Without IP Addressing on the Switch DHCP/Bootp Op eration Overview .
5-11 Configurin g IP Address ing, Interf ace Access , and System Inf ormation IP Configu ratio n Configuring IP Addressing , Inte rf ace A cce ss, and 1. DHC P/Boot p request s are a utomat ically br oadcast on the loca l netwo rk. (The switch sends one type of request to which eit her a DHCP or Bo otp server c an re spond.
5-12 Config uring IP Addressin g, Interfac e Acces s, and Sy stem In formation IP Confi gurat ion Config uring IP Ad dressing, Interfa ce Access, and Bootp O perati on. When a Bootp server rec eives a requ est it se arches its Bootp da tabase for a record ent ry that matc hes the MA C address in th e Bootp request from th e switch.
5-13 Configurin g IP Address ing, Interf ace Access , and System Inf ormation IP Configu ratio n Configuring IP Addressing , Inte rf ace A cce ss, and Note The above B ootp table entry is a sample th at will work for the SMC6624M when the a ppropria te addresse s and file n ames are used .
5-14 Config uring IP Addressin g, Interfac e Acces s, and Sy stem In formation IP Confi gurat ion Config uring IP Ad dressing, Interfa ce Access, and Globally A ssigned IP Network Addr esses If you in.
5-15 Configurin g IP Address ing, Interf ace Access , and System Inf ormation Inte rfac e Acce ss: C onso le/Se rial Li nk, Web, and In boun d Telnet Configuring IP Addressing , Inte rf ace A cce ss, .
5-16 Config uring IP Addressin g, Interfac e Acces s, and Sy stem In formation Inter face Ac cess: Console /Seria l Li nk, We b, and Inboun d Teln et Config uring IP Ad dressing, Interfa ce Access, an.
5-17 Configurin g IP Address ing, Interf ace Access , and System Inf ormation Inte rfac e Acce ss: C onso le/Se rial Li nk, Web, and In boun d Telnet Configuring IP Addressing , Inte rf ace A cce ss, and CLI: Modifying the Interface Access Interface Access Commands Used in This Section Listing t he Current Co nsole/Serial Link Co nfiguration.
5-18 Config uring IP Addressin g, Interfac e Acces s, and Sy stem In formation Inter face Ac cess: Console /Seria l Li nk, We b, and Inboun d Teln et Config uring IP Ad dressing, Interfa ce Access, and Recon figure Web Browser Acc ess. In t he de fault conf iguratio n, we b brows er acce ss is en abl ed.
5-19 Configurin g IP Address ing, Interf ace Access , and System Inf ormation Inte rfac e Acce ss: C onso le/Se rial Li nk, Web, and In boun d Telnet Configuring IP Addressing , Inte rf ace A cce ss, and Figure 5-6.
5-20 Config uring IP Addressin g, Interfac e Acces s, and Sy stem In formation System In formation Config uring IP Ad dressing, Interfa ce Access, and System Information Sy stem Informat ion Features Config uring system informat ion is option al, but recom mended.
5-21 Configurin g IP Address ing, Interf ace Access , and System Inf ormation System Infor matio n Configuring IP Addressing , Inte rf ace A cce ss, and Daylight T ime Rule: Specifie s the d aylight sa vings t ime rul e to a pply for yo ur locat ion. The de fault is None .
5-22 Config uring IP Addressin g, Interfac e Acces s, and Sy stem In formation System In formation Config uring IP Ad dressing, Interfa ce Access, and CLI: V iewing and Con figurin g System Infor matio n Sy stem Informat ion Comman ds Used in This Se ction Listing th e Curr ent Syst em Infor mation .
5-23 Configurin g IP Address ing, Interf ace Access , and System Inf ormation System Infor matio n Configuring IP Addressing , Inte rf ace A cce ss, and Figure 5-10. Sy stem Informa tion Listing After Execu ting the Preceding Co mmands Recon figure t he Age In terva l for Lea rned MA C Addr esses.
5-24 Config uring IP Addressin g, Interfac e Acces s, and Sy stem In formation System In formation Config uring IP Ad dressing, Interfa ce Access, and Configure the T ime and Date. The swit ch use s th e time co mm and to con- figure bot h the time of day an d the date.
6-1 Optimizing Port Usage Throug h Traffic Control and 6 Optimizing Port Usage Through T raffic Contro l and P ort T r unking Overview This chap ter incl udes: ■ Config uring p orts, inclu ding m od.
6-2 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king View ing Port Stat us a nd C onfig uri ng Por t Pa rame ters Optimizing Port Usage Throug h Traffic Control and T able 6-1.
6-3 Optimizing P ort Usag e Thro ugh Tra ffic Cont rol and Po rt Trunk ing Viewin g Port St atus and Conf iguring Port Parame ters Optimizing Port Usage Throug h Traffic Control and 100/1000Ba se-T ports: • Aut o (defa ult) : Senses sp eed an d nego tiate s with the por t at the ot her end o f the li nk for po rt ope ratio n (MDI-X o r MDI).
6-4 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king View ing Port Stat us a nd C onfig uri ng Por t Pa rame ters Optimizing Port Usage Throug h Traffic Control and Menu: Viewi.
6-5 Optimizing P ort Usag e Thro ugh Tra ffic Cont rol and Po rt Trunk ing Viewin g Port St atus and Conf iguring Port Parame ters Optimizing Port Usage Throug h Traffic Control and Figure 6-12. Example of Port /T runk Settings wi th a T runk Group Confi gured 2.
6-6 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king View ing Port Stat us a nd C onfig uri ng Por t Pa rame ters Optimizing Port Usage Throug h Traffic Control and Synta x: sh.
6-7 Optimizing P ort Usag e Thro ugh Tra ffic Cont rol and Po rt Trunk ing Viewin g Port St atus and Conf iguring Port Parame ters Optimizing Port Usage Throug h Traffic Control and Using the CLI T o Configure Ports. Y ou can c onfig ure one or more of t he following po rt parame ters.
6-8 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king View ing Port Stat us a nd C onfig uri ng Por t Pa rame ters Optimizing Port Usage Throug h Traffic Control and W eb: Viewing Por t Status and Configuring Por t Parameters In the w eb brow ser int erface: 1.
6-9 Optimizing P ort Usag e Thro ugh Tra ffic Cont rol and Po rt Trunk ing Port Tr unking Optimizing Port Usage Throug h Traffic Control and Port T ru nking Port Status an d Con figur ation Feat ure s.
6-10 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king Port Tr unki ng Optimizing Port Usage Throug h Traffic Control and Port Conne ctions and Co nfiguration: All port trunk li.
6-11 Optimizing P ort Usag e Thro ugh Tra ffic Cont rol and Po rt Trunk ing Port Tr unking Optimizing Port Usage Throug h Traffic Control and Fault T olerance: If a link in a po rt trunk fails, the switch redistri butes traffic or iginally de stined for tha t link t o the rema ining link s in the trun k.
6-12 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king Port Tr unki ng Optimizing Port Usage Throug h Traffic Control and T able 6-4. T runk Configur ation Prot ocols Prot ocol T runki ng Op tions LACP (802.3a d) Provide s dynamic a nd sta tic LACP trun king o ptions .
6-13 Optimizing P ort Usag e Thro ugh Tra ffic Cont rol and Po rt Trunk ing Port Tr unking Optimizing Port Usage Throug h Traffic Control and T able 6-5. General Operat ing Rul es for Por t T runks Media: All por ts on both ends o f a trun k grou p must have the sa me me dia t ype an d mode (spee d and d uplex).
6-14 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king Port Tr unki ng Optimizing Port Usage Throug h Traffic Control and Spanni ng T r ee Pr otoco l (STP ): STP operate s as a global setti ng on th e switch (one ins tance of STP per sw itch).
6-15 Optimizing P ort Usag e Thro ugh Tra ffic Cont rol and Po rt Trunk ing Port Tr unking Optimizing Port Usage Throug h Traffic Control and Menu: V iewing and Configur ing a Static T runk Group Importa nt Config ure port tru nking before you conn ect th e trunked lin ks to ano ther switch, routing switch, or serve r .
6-16 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king Port Tr unki ng Optimizing Port Usage Throug h Traffic Control and switch a utomaticall y adjusts B roadcast Limit settings to be th e same for all ports in a trunk.) T o verify these sett ings, see “Vi ewing Port Status and Configuring Port Para meters” on pa ge 6-1.
6-17 Optimizing P ort Usag e Thro ugh Tra ffic Cont rol and Po rt Trunk ing Port Tr unking Optimizing Port Usage Throug h Traffic Control and 8. Co nnect the trunked ports on the switch to the co rresp onding port s on the oppo site device . If you prev iously disable d any of the trunked ports on the switch, e nable th em no w .
6-18 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king Port Tr unki ng Optimizing Port Usage Throug h Traffic Control and The show trunk comman d in this exampl e does not incl ude a port lis t. As a result, the listin g shows sta tic trunk group inf ormation f or all switch ports.
6-19 Optimizing P ort Usag e Thro ugh Tra ffic Cont rol and Po rt Trunk ing Port Tr unking Optimizing Port Usage Throug h Traffic Control and Figure 6-9.
6-20 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king Port Tr unki ng Optimizing Port Usage Throug h Traffic Control and Y ou can configure trunk g roup types as follows: Note The following e xamples sh ow how to crea te differe nt types of trunk groups.
6-21 Optimizing P ort Usag e Thro ugh Tra ffic Cont rol and Po rt Trunk ing Port Tr unking Optimizing Port Usage Throug h Traffic Control and Enabling a Dynamic LACP T runk Group . In the def ault port c onfigura- tion, all ports on t he switch a re set to LACP p assive.
6-22 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king Port Tr unki ng Optimizing Port Usage Throug h Traffic Control and Removing Po rts from a Dynamic LA CP T runk Group. T o remove a po rt from dyna mic LAC P trunk o peratio n, you must turn o ff LACP on the po rt.
6-23 Optimizing P ort Usag e Thro ugh Tra ffic Cont rol and Po rt Trunk ing Port Tr unking Optimizing Port Usage Throug h Traffic Control and T runk Group Operation Using LACP The switc h can a utomat ically conf igure a dynamic LACP tru nk gr oup or you can man ually co nfigu re a stat ic LACP trunk gr oup.
6-24 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king Port Tr unki ng Optimizing Port Usage Throug h Traffic Control and Default Port Operation In the defa ult conf iguration, a ll ports are co nfigure d for passive LACP .
6-25 Optimizing P ort Usag e Thro ugh Tra ffic Cont rol and Po rt Trunk ing Port Tr unking Optimizing Port Usage Throug h Traffic Control and LACP Notes and Restriction s Changin g T runking Methods.
6-26 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king Port Tr unki ng Optimizing Port Usage Throug h Traffic Control and Half-Duplex and/or Different Port Sp eeds Not Al lowed in L ACP T runks. The ports on bo th sides of a trunk mu st be configur ed fo r the same speed and for full-d uplex (FDx).
6-27 Optimizing P ort Usag e Thro ugh Tra ffic Cont rol and Po rt Trunk ing Port Tr unking Optimizing Port Usage Throug h Traffic Control and ■ Dependin g on the capa bilities of the device on t he other e nd of the tru nk, negoti ate th e forward ing me chanis m on the trunk to the no n-prot ocol option.
6-28 Optimizi n g Por t Usag e Throu gh Traf fic Control an d Po rt Trun king Port Tr unki ng Optimizing Port Usage Throug h Traffic Control and and sends t raffic from the same sourc e addre ss to a diffe rent destin ation address t hrough a d ifferent link , depen ding on the rot ation of pa th assign - ments among the links in the trunk.
7-1 Using Passwords, Port Securi ty, an d Author ized I P 7 Using Passwords, Port Security , and Authorized IP Managers T o Protect Against Unauthorized Access ■ Manag er and O perator password s (p.
7-2 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Using Pa ssword Securit y Using Passwords, Port Security, and Autho rized IP Using Password Security Passwor d Fe atures Console a ccess incl udes both t he menu in terfac e and the CLI.
7-3 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Using Pa ssword Secu rity Using Passwords, Port Securi ty, an d Author ized I P If you set a Mana ger passwor d, you may a lso want to configure the Inactivity T ime parame ter (s ee page 5-15).
7-4 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Using Pa ssword Securit y Using Passwords, Port Security, and Autho rized IP Figure 7-1. The Set Password Screen 2. T o set a new password: a.
7-5 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Using Pa ssword Secu rity Using Passwords, Port Securi ty, an d Author ized I P T o.
7-6 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Using Pa ssword Securit y Using Passwords, Port Security, and Autho rized IP W eb: Configuring User Names and Pas swords In the web brow ser interfa ce you can ente r both user name s and password s.
7-7 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Confi guring and Mon ito ring Po rt Sec uri ty Using Passwords, Port Securi ty, an .
7-8 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Confi gur ing an d Monito rin g Port Securi ty Using Passwords, Port Security, and Aut.
7-9 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Confi guring and Mon ito ring Po rt Sec uri ty Using Passwords, Port Securi ty, an d Author ized I P Figure 7-3.
7-10 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Confi gur ing an d Monito rin g Port Securi ty Using Passwords, Port Security, and Autho rized IP b. Which d evices (MA C ad dresses) a re aut horized on each port (u p to 8 per port )? c.
7-11 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Confi guring and Mon ito ring Po rt Sec uri ty Using Passwords, Port Securi ty, an.
7-12 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Confi gur ing an d Monito rin g Port Securi ty Using Passwords, Port Security, and Autho rized IP T able 7-1.
7-13 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Confi guring and Mon ito ring Po rt Sec uri ty Using Passwords, Port Securi ty, an.
7-14 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Confi gur ing an d Monito rin g Port Securi ty Using Passwords, Port Security, and Au.
7-15 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Confi guring and Mon ito ring Po rt Sec uri ty Using Passwords, Port Securi ty, an d Author ized I P Figure 7-5.
7-16 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Confi gur ing an d Monito rin g Port Securi ty Using Passwords, Port Security, and Autho rized IP Specifyin g Autho rized Devic es and In trusion R esponses.
7-17 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Confi guring and Mon ito ring Po rt Sec uri ty Using Passwords, Port Securi ty, an.
7-18 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Confi gur ing an d Monito rin g Port Securi ty Using Passwords, Port Security, and Autho rized IP simu ltane ousl y incr eas e th e limi t and add th e MAC addre ss wi th a singl e comm and.
7-19 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Confi guring and Mon ito ring Po rt Sec uri ty Using Passwords, Port Securi ty, an d Author ized I P Note Y ou can reduce the address limi t belo w the num ber of cu rrently author ized addresse s on a por t.
7-20 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Confi gur ing an d Monito rin g Port Securi ty Using Passwords, Port Security, and Autho rized IP W eb: Displaying and Configurin g Port Securi ty Features 1.
7-21 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Confi guring and Mon ito ring Po rt Sec uri ty Using Passwords, Port Securi ty, an.
7-22 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Confi gur ing an d Monito rin g Port Securi ty Using Passwords, Port Security, and Au.
7-23 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Confi guring and Mon ito ring Po rt Sec uri ty Using Passwords, Port Securi ty, an d Author ized I P The ab ove exam ple show s two int rusions for port 3 a nd one intrusion f or port 1.
7-24 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Confi gur ing an d Monito rin g Port Securi ty Using Passwords, Port Security, and Autho rized IP Synta x: show in terfac e List Intrus ion Alert stat us.
7-25 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Confi guring and Mon ito ring Po rt Sec uri ty Using Passwords, Port Securi ty, an d Author ized I P full and ne w intrusion s are subsequen tly added.
7-26 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Confi gur ing an d Monito rin g Port Securi ty Using Passwords, Port Security, and Autho rized IP Figure 7-12.
7-27 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Confi guring and Mon ito ring Po rt Sec uri ty Using Passwords, Port Securi ty, an d Author ized I P ■ Enter you r PC or workst ation MAC address in t he port’ s Authori zed Addresses list.
7-28 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Using I P Auth oriz ed Mana gers Using Passwords, Port Security, and Autho rized IP U.
7-29 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Usin g IP Aut horiz ed M ana gers Using Passwords, Port Securi ty, an d Author ize.
7-30 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Using I P Auth oriz ed Mana gers Using Passwords, Port Security, and Autho rized IP Overview of IP Mask Operation The defau lt IP Mask is 255.
7-31 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Usin g IP Aut horiz ed M ana gers Using Passwords, Port Securi ty, an d Author ized I P Menu: V iewing and Configur ing IP Authorized Managers From the c onsole Main Menu, selec t: 2.
7-32 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Using I P Auth oriz ed Mana gers Using Passwords, Port Security, and Autho rized IP Editing o r Deleting an Aut horized Manager Entry .
7-33 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Usin g IP Aut horiz ed M ana gers Using Passwords, Port Securi ty, an d Author ize.
7-34 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Using I P Auth oriz ed Mana gers Using Passwords, Port Security, and Autho rized IP The fol lowing co mmand r eplaces th e exist ing ma sk and access level for IP address 10 .
7-35 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Usin g IP Aut horiz ed M ana gers Using Passwords, Port Securi ty, an d Author ized I P T ab le 7-2.
7-36 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Using I P Auth oriz ed Mana gers Using Passwords, Port Security, and Autho rized IP T ab le 7-3. Analy sis of IP Mask for Multiple-Statio n Entries Figure 7-16.
7-37 Usin g Pa ssword s, Port Se cur ity, an d Aut horiz ed IP Manage rs To Prote ct Agai nst Un autho riz ed Acces s Usin g IP Aut horiz ed M ana gers Using Passwords, Port Securi ty, an d Author ize.
7-38 Using Pass words, Port Se curi ty, and Autho rized IP Man agers To P rote ct Ag ains t Una uth orized Ac cess Using I P Auth oriz ed Mana gers Using Passwords, Port Security, and Autho rized IP.
8-1 Monit oring a nd Ma naging the Switc h 8 Configuri ng for Network Management Applications Y ou can manage the switch via SNMP fro m a networ k manage ment stat ion. For this purpose, SM C recom mends EliteView — an easy-to-in stall and u se network ma nageme nt applicat ion that runs on yo ur W i ndows NT - or W indows 2000- base d PC .
8-2 Config uring for Ne twork M anagement Ap plicatio ns SNMP Ma nagemen t Featu res Monit oring a nd Mana ging the Switc h SNMP Management Features SNMP ma nagement f eatures on the switch inclu de: .
8-3 Confi guri ng for Net work Ma nagem ent A pplic ation s Conf igur ing for SNMP Acces s to th e Swit ch Monit oring a nd Ma naging the Switc h The s witch SNM P age nt al so us es ce rtai n varia bles that are i nclud ed in an SMC propr ietary MI B file yo u can add to t he SNMP dat abase in your network manag ement tool.
8-4 Config uring for Ne twork M anagement Ap plicatio ns Config uring for S NMP Ac cess to the Switc h Monit oring a nd Mana ging the Switc h Caut ion Deletin g the communi ty named “public” disa bles many net work mana gement functions (suc h as auto-discov ery, traffic monitoring, SN MP trap gener ation, and thre shold setting ).
8-5 Confi guri ng for Net work Ma nagem ent A pplic ation s SNMP Communities Monit oring a nd Ma naging the Switc h SNMP Communities SNMP Com muni ty Feat ures Use SNMP communities to restrict access to the switch by SNMP management stations by adding , editing, or de leting SNMP communit ies.
8-6 Config uring for Ne twork M anagement Ap plicatio ns SNMP Communities Monit oring a nd Mana ging the Switc h Figur e 8-1. Th e SNMP Com munit ies Sc reen (D efaul t V alues ) 2.
8-7 Confi guri ng for Net work Ma nagem ent A pplic ation s SNMP Communities Monit oring a nd Ma naging the Switc h CLI: V iewing and Con figurin g Commun ity Names Community Name Commands U sed in T his Section Listing Current Co mmunity Names and V alues Listing Co mmunity Names.
8-8 Config uring for Ne twork M anagement Ap plicatio ns SNMP Communities Monit oring a nd Mana ging the Switc h SMC TigerSwitch 10/100# show snmp-server public Configuring Identity In formation This com mand en ables you to ent er conta ct-per son and locati on data t o help identify the switc h.
8-9 Confi guri ng for Net work Ma nagem ent A pplic ation s Trap Re ceive rs and Au the nticat ion Traps Monit oring a nd Ma naging the Switc h T rap Receivers and Authentication T raps T rap Feature s A trap receiver is a manage ment stat ion de sign ated by the s witc h to receiv e SNMP traps sent from the switch .
8-10 Config uring for Ne twork M anagement Ap plicatio ns Trap Re ceiv ers an d Authe ntica tion Traps Monit oring a nd Mana ging the Switc h CLI: Configur ing and Displaying T rap Receive rs T rap Re.
8-11 Confi guri ng for Net work Ma nagem ent A pplic ation s Trap Re ceive rs and Au the nticat ion Traps Monit oring a nd Ma naging the Switc h Configurin g T rap Receivers This co mmand spec ifies t.
8-12 Config uring for Ne twork M anagement Ap plicatio ns Advanc ed Mana gemen t: RMO N Suppo rt Monit oring a nd Mana ging the Switc h Advanced Management: RMON Support The switch sup ports RMON (Re mote Monito ring) on a ll connected ne twork segments.
9-1 Configu ring Advanc ed Features 9 Configuring Advanc ed Features This chapt er describ es the foll owing features and how to con figure th em with the switch’ s built-in inte rfaces: ■ Stack Management (Page 9-2): Use your network to stac k switches without the need f or any speciali zed cabling.
9-2 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Stack Management Stac king Featu res Stack Mana gement (termed stacking ) enab les you to use a single IP ad dress and stan dard net work cablin g to mana ge a gr oup of up to 16 SMC6624M switches in the same IP subnet ( broadcast domain).
9-3 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features ■ Simplify ma nagement of small workg roups or w iring closets whi le scaling y our networ k to handl e incr eased bandwidth deman d.
9-4 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Components of Stack Managemen t T able 9-1. St acking De finitions Figure 9-1.
9-5 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Figure 9-2. Example of Stacking with One Commander Controlling Access to Wiring Closet Switches Interfac e Option s. Y o u can config ure sta cking throug h the switch’ s menu interfac e, CLI, or the web browse r interfa ce.
9-6 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features ■ Ther e is no limi t on the num ber of stac ks in the same IP s ubnet (broadc ast domain), how ever a switch can belong to on ly one stack. ■ If multiple V LANs are conf igured, stac king uses on ly the prima ry VLAN on any switch.
9-7 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Note In the default sta ck configu ration, t he Candid ate Aut o Jo in para meter is enab led, but th e Comm ande r Auto Grab param eter is di sabled .
9-8 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Overview of Configur ing and Bringin g Up a Stack This process assumes that: ■ All sw itc hes y ou w ant t o in clu de i n a stac k ar e conn ect ed to the sam e subnet (b roadca st domain) .
9-9 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features T able 9-3. St acking Config uration G uide The easiest way to auto matically create a stac k is to : 1. Configure a switch as a Commander . 2. Configure I P addressing and a stack name on the Commander .
9-10 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features General Steps f or Creat ing a Sta ck This section describe s the general st ack creati on process. For the detail ed config uration p rocesses, see pa ges 9-12 t hrough 9- 36 for t he menu int erface and page s 9-29 t hrough 9-4 1 for t he CLI.
9-11 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features 3. For automatically or manually pulling Candidate switches into a stack, you can leave such sw itches in their def ault stacki ng configuration.
9-12 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Using the Menu Interface T o View Stack Status A nd Configure Stacki ng Using the Menu Interface T o View and Configure a Commander Switch 1. Configure an I P address and subnet mask on the Commander switch.
9-13 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Figure 9-6. The Defau lt Stack C onfiguratio n Screen 4. Move the cursor to the Stack State field by pressing [E] (for E dit ). Then use the Space bar to select the Commander option.
9-14 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features • No (the defau lt) preven ts automat ic joining o f Candidates that have the ir Auto J oin set to Ye s .
9-15 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features T ab le 9-4.Candidate Configuration Options in the Me nu Interface Using the Men u T o “Push ” a Switch I nto a Stack , Modify the Switch’ s Configura tion, or Disable Stacking on the Switch.
9-16 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features 4. Do one of the foll owing: • T o disab le stacki ng on the Ca ndidat e, use the Space bar to select the Disabled o ption, then go to step 5.
9-17 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Using the Co mmander’ s Menu T o Manually Ad d a Candidate to a Stack . In t he defaul t configur ation, you must manua lly add stac k Member s from the Candidate pool.
9-18 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Figure 9-10. Example of Candida te List in Stack Man agement S creen 3. Either accept the displayed switch number or enter another availabl e number . (The range is 0 - 15, with 0 reserved for the Commander .
9-19 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Figure 9-11. Example of Stac k Managemen t Screen Aft er New Member Adde d Using the C ommander’ s Menu T o Move a Member From On e Stack to Anot her .
9-20 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Figure 9-12. Example of How the Sta cking Status ( All) Screen Hel ps Y ou Find Member MAC Addresses 3.
9-21 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features 8. Do one of the foll owing: • If the stack conta ining t he Mem ber you are m oving has a M ana ger password, pr ess the dow narro w key to se lect th e Cand idate Password field, the n type the password.
9-22 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features 4. St ack Ma nageme nt Y ou will then see the Stac k Managemen t screen: Figure 9-13. Example of Stac k Managemen t Screen wit h Stack Memb ers Listed 2. Use the downarrow key to select the Member yo u want to remove from the stack.
9-23 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Using the Commander T o Access Member Switches for Configuration Changes and Monitor ing T raffic After a Cand.
9-24 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Figur e 9-1 7. The eX ecu te Com mand Displ ay s the Cons ole Ma in Men u for th e Selec ted Stack Mem ber 2.
9-25 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features 3. Press [B] (for B ac k ) to ret urn to the St acking Menu. 4. T o displ ay Stack Co nfigura tion menu for t he switch yo u are mo ving , select 3. Stack Conf iguration 5.
9-26 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Using Any Stacke d Switc h T o V iew th e Stat us for Al l Switc hes wi th Stacking Enabled. This procedure displays the gen eral status of all swit ches in the IP sub net ( bro adca st doma in) that ha ve st ackin g ena bled.
9-27 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Figure 9-19. Example of the Co mmander’ s Stacking S tatus Screen V iewing Member St atus. Thi s procedure di splays the Member’ s stacking informati on plus the C ommande r’ s status, I P address, and M AC address.
9-28 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Figure 9-20. Example of a Member’ s Stac king Status Sc reen V iewi ng Candid ate St atus . This procedu re displays th e Candida te’ s stackin g configur ation.
9-29 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Using the CLI T o V iew Stack Status an d Configure Stacking The CL I enab les you to do a ll of the st acking t asks ava ilable thro ugh the menu interfa ce.) T a ble 9- 6.
9-30 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features [no] stac k member <switch- num> mac-ad dress <ma c-add r> [passw ord <p asswo rd-str> ] Comma nder: Ad ds a Candida te to stac k membersh ip. “No” form remov es a Member from stac k membersh ip.
9-31 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Using the CLI T o V i ew Stack Status Y ou can list the stack st atus for an in dividual sw itch an d for other sw itches that have been discovered in the sa me subnet.
9-32 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features V iewing the S tatus o f all Stack-Ena bled Switche s Discov ered in the IP Subne t. The next example list s all the stack-c onfigur ed switches di scover ed in t he IP su bnet.
9-33 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Using the CLI T o Configure a Commander Switch Y ou can conf igure any sta cking-e nabled sw itch to b e a C ommande r as l ong as the int ended stac k name doe s not alre ady exist on the bro adcast doma in.
9-34 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Figure 9-26. Exa mple of the Commande r’ s Show Stac k Screen with Onl y the Comma nde r Disc over ed Using a Member’ s CLI to Co nvert the Member to the Commander of a New Stack.
9-35 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Figure 9-27. Example of Using a Mem ber’ s CLI T o Convert the Member t o the Comma nder of a New Stac k Add.
9-36 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Using the Co mmander’ s CLI T o Manually Ad d a Candida te to the Stack . T o manual ly add a candidat e, you will use: ■ A switch num ber ( SN ) to assign to th e new membe r .
9-37 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features For example, if th e switch named “DE F AUL T_CONFIG” in the ab ove listing did not have a Ma nager passwo.
9-38 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Using a Candida te CLI T o Manua lly “Push” the Ca ndidate Int o a Stack .
9-39 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Synta x: stack memb er < swit ch-nu mber > m ac-ad dress < mac- addr > [p assword < password -str >] In the dest ination Commande r , use show stack all t o find t he M AC address of the Mem ber you want to pull into the destinat ion stack.
9-40 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Synta x: no stack name <s tack na me > stack join <mac-address> If you don’t know t he MAC addr ess of the destinat ion Co mmander , you can use show st ack all to i den tify it .
9-41 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Synta x: [no] stack member < switch-nu m > mac-addr ess < m ac-addr > Use show stack view to li st the stack M embers.
9-42 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features Figure 9-35. Example of How T o Identify the Commander’ s MAC Address from a Member S witch Y ou would then .
9-43 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Figure 9-36. Exa mple of a Stac k Showi ng Swit ch Number (SN) Ass i gnmen ts T o access the “N orth Sea” .
9-44 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features SNMP Community Operation i n a Stack Comm unit y Memb ersh ip In the defa ult stacking co nfigurat ion, when a.
9-45 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features Note that in t he above example (figure 9-37) y ou canno t use the publi c comm unity th rough the Co mmand er to acces s any o f the Me mber sw itc hes.
9-46 Config uring Ad vance d Feat ures Stack Ma nage ment Confi guring Adva nced Features ■ Stacki ng uses only the primary VLAN on ea ch switch in a stack. ■ The p rimar y VLA N c an be t agged or un tagge d as need ed in the stacking pat h from switch to swit ch.
9-47 Conf iguring A dvanc ed Fea tures Stack Ma nagem ent Configu ring Advanc ed Features 3. Click on [Apply Chan ges] to sa ve any con figurati on ch anges for t he individual sw itch. 4. If the sw itch is a Command er , use the [Sta ck Clos eup] and [S tack Man - agemen t] buttons fo r view ing and using st ack featur es.
9-48 Config uring Ad vance d Feat ures Port -Based Vir tual LA Ns (St atic V LANs ) Confi guring Adva nced Features Port-Based V irtual LANs (Static VLANs) VLAN Fe ature s A VLAN is a group of ports design ated by the switch as belong ing to the same broadca st domain .
9-49 Conf iguring A dvanc ed Fea tures Port-Based Vi rtual LANs (Static VLANs) Configu ring Advanc ed Features saved by not allowing packet s to flood o ut all ports. An externa l route r is required to ena ble separate VLANs on a swit ch to commun icate with each other .
9-50 Config uring Ad vance d Feat ures Port -Based Vir tual LA Ns (St atic V LANs ) Confi guring Adva nced Features Figur e 9-4 0. Examp le of Ov erl appi ng VLA Ns Usi ng th e Same Server Similarly , using 8 02.1Q-compli ant switche s, you can con nect mult iple VLANs through a sin gle switch-to-switch li nk.
9-51 Conf iguring A dvanc ed Fea tures Port-Based Vi rtual LANs (Static VLANs) Configu ring Advanc ed Features Figure 9-42. Exa mple of T agged and Untagge d VLAN T echnolo gy in the Same Network For .
9-52 Config uring Ad vance d Feat ures Port -Based Vir tual LA Ns (St atic V LANs ) Confi guring Adva nced Features DHCP or Bootp on differen t VLANs do n ot result in conflic ting c onfigurat ion valu es fo r t he swi tch . The primary V L A N i s th e V L A N t he s w i t ch us e s t o ru n and m anag e the se feat ures and da ta.
9-53 Conf iguring A dvanc ed Fea tures Port-Based Vi rtual LANs (Static VLANs) Configu ring Advanc ed Features Figure 9-43. Comparing P er -Port VLAN Op tions With a nd Without GVRP T able 9-7.
9-54 Config uring Ad vance d Feat ures Port -Based Vir tual LA Ns (St atic V LANs ) Confi guring Adva nced Features Gene ral Steps for Us ing VL ANs 1. Plan your VLA N strateg y and create a m ap of the logical top ology that w ill result fro m config uring VLA Ns.
9-55 Conf iguring A dvanc ed Fea tures Port-Based Vi rtual LANs (Static VLANs) Configu ring Advanc ed Features Menu: Configuring VLAN Parameters In the fact ory def ault state, VLA N support is enabled . Also, all por ts on t he switch belong to the defaul t VLAN (DEF A UL T _VLAN) and are in the sam e broadcas t/multica st domain .
9-56 Config uring Ad vance d Feat ures Port -Based Vir tual LA Ns (St atic V LANs ) Confi guring Adva nced Features ■ T o select anothe r primary VLAN, sele ct the Prima ry VLAN fi eld and use the space bar to select f rom the existi ng options.
9-57 Conf iguring A dvanc ed Fea tures Port-Based Vi rtual LANs (Static VLANs) Configu ring Advanc ed Features Adding or Editing VLAN Names Use this proc edure to add a n ew VLA N or to e dit the na me of an e xisting VLA N. 1. F rom th e M ain M enu s elec t: 2.
9-58 Config uring Ad vance d Feat ures Port -Based Vir tual LA Ns (St atic V LANs ) Confi guring Adva nced Features Figure 9-47. Example of VLAN Names Sc reen with a New VLA N Added 6.
9-59 Conf iguring A dvanc ed Fea tures Port-Based Vi rtual LANs (Static VLANs) Configu ring Advanc ed Features Figure 9-48. Example of VLAN Port Assign ment Scree n 2. T o ch ange a port ’ s V LAN as signme nt( s): a. Press [E] (for E dit ). b. Use the arrow keys to se lect a VLA N ass ign ment yo u wa nt to chan ge.
9-60 Config uring Ad vance d Feat ures Port -Based Vir tual LA Ns (St atic V LANs ) Confi guring Adva nced Features Figure 9-49. Example of VLAN Assignments f or Specific Ports For info rmat ion on V LAN ta gs (“Un tagge d” an d “T a gged” ), ref er to “VLAN T a gging I nforma tion” on pa ge 9-67 .
9-61 Conf iguring A dvanc ed Fea tures Port-Based Vi rtual LANs (Static VLANs) Configu ring Advanc ed Features VLAN Comman ds Used in this Sectio n Displaying th e Switch’ s VLAN Configurati on. The next comman d lists the V LANs cu rrently runni ng in the switch , with V ID, VL AN name , and V LAN status.
9-62 Config uring Ad vance d Feat ures Port -Based Vir tual LA Ns (St atic V LANs ) Confi guring Adva nced Features Displaying t he Configurati on for a Par ticular VLA N . This co mmand uses the VID to identify and di splay the data for a spec ific static or dynamic VLAN.
9-63 Conf iguring A dvanc ed Fea tures Port-Based Vi rtual LANs (Static VLANs) Configu ring Advanc ed Features Changing t he Number of VLANs Allo wed on the S witch. B y default , the swi tch allows a maximum of 8 VLANs. Y ou can speci fy any value f rom 1 to 30.
9-64 Config uring Ad vance d Feat ures Port -Based Vir tual LA Ns (St atic V LANs ) Confi guring Adva nced Features Creatin g a New St atic VL AN Changin g the VL AN Context Level.
9-65 Conf iguring A dvanc ed Fea tures Port-Based Vi rtual LANs (Static VLANs) Configu ring Advanc ed Features Converting a Dynamic VLA N to a Static V LAN. If GVRP is runnin g on the switc h and a port dynamic ally joins a V LAN, you c an use the next command t o conv ert the dy namic VLAN to a static VLAN.
9-66 Config uring Ad vance d Feat ures Port -Based Vir tual LA Ns (St atic V LANs ) Confi guring Adva nced Features operati on. Note that Auto is the default per -port setting fo r a static VL AN if GVRP is runin g on the swit ch. (For infor mati on on dyna mic VLAN and GV RP oper ation, see “GVR P” on page 9-74 .
9-67 Conf iguring A dvanc ed Fea tures Port-Based Vi rtual LANs (Static VLANs) Configu ring Advanc ed Features T o configure static VLAN po rt parame ters, you will need t o use the menu interfac e (availa ble by T elnet fr om the web browser inte rface) or the CLI.
9-68 Config uring Ad vance d Feat ures Port -Based Vir tual LA Ns (St atic V LANs ) Confi guring Adva nced Features Figure 9-54. Exa mple of T agged and Untagged V LAN Port Assignments ■ In switch X: • VLANs assigned to ports X1 - X6 can all be unta gged beca use ther e is only one V LAN assignme nt per port .
9-69 Conf iguring A dvanc ed Fea tures Port-Based Vi rtual LANs (Static VLANs) Configu ring Advanc ed Features Note Each 802.1Q-complia nt VLAN must ha ve its own uniqu e VID numbe r , and that VLAN must be given the same VID in every device in w hich it is configured.
9-70 Config uring Ad vance d Feat ures Port -Based Vir tual LA Ns (St atic V LANs ) Confi guring Adva nced Features Figure 9-56. Exa mple of Networke d 802.1Q-Com pliant D e vices wi th Mul tiple VLANs on Some Ports The VLANs assigned to ports X3 , X4, Y2, Y3, and Y4 can all be untag ged because th ere is only one VLAN assigned p er port.
9-71 Conf iguring A dvanc ed Fea tures Port-Based Vi rtual LANs (Static VLANs) Configu ring Advanc ed Features To s u m m a r i z e : Effect of VLANs on Other Switch Fe atures Spanning T ree Protocol Operation with VL ANs Because the SMC662 4M switch fo llows the 802.
9-72 Config uring Ad vance d Feat ures Port -Based Vir tual LA Ns (St atic V LANs ) Confi guring Adva nced Features VLAN MAC Ad dresses The swi tch ha s one uni que MAC a ddress for each of its VLAN inter faces. Y ou can send an 802. 2 test packet to this MAC address to ver ify connecti vity to the switch.
9-73 Conf iguring A dvanc ed Fea tures Port-Based Vi rtual LANs (Static VLANs) Configu ring Advanc ed Features VLAN Restricti ons ■ A port must be a membe r of at least one VLA N. In the factory defaul t config uration, all po rts are a ssigned to the defaul t VLAN (DEF AUL T_VLAN; VI D = 1).
9-74 Config uring Ad vance d Feat ures GVRP Confi guring Adva nced Features GVRP GVRP— GARP VLAN Re gistra tion Protoc ol—is an application of the Generi c Attribut e Registra tion Pro tocol—GA RP . GVR P is defined in the IEEE 80 2.1Q stand ard, an d GA RP is de fine d in the IEEE 802.
9-75 Conf iguring A dvanc ed Fea tures GVRP Configu ring Advanc ed Features Note There must be one common V LAN (tha t is, one c ommon VID) conne cting a ll of th e GVR P-aw are de vice s in t he netw ork to carr y GVR P pac kets .
9-76 Config uring Ad vance d Feat ures GVRP Confi guring Adva nced Features Note that if a static VLAN is con figured on at leas t one port of a switch, and that p ort has es tablished a link wit h anothe r devic e, then all ot her port s of that switch will send a dvertisement s for th at VLAN.
9-77 Conf iguring A dvanc ed Fea tures GVRP Configu ring Advanc ed Features ■ If the switch alr eady has a static VLAN assi gnment with the sam e VID as in the adve rtise ment , and the po rt is conf igure d to Auto for that VLAN, then the port will dynamica lly join the VL AN and begin m oving that VLAN’ s tra ffic.
9-78 Config uring Ad vance d Feat ures GVRP Confi guring Adva nced Features T ab le 9-8. Option s for Handling “Unknown VLAN” Advertisements: The CLI show gvrp command and the menu interf ace VLA N Suppor t screen show a switch’ s curr ent GVRP con figuratio n, including the Unknown VLAN settings.
9-79 Conf iguring A dvanc ed Fea tures GVRP Configu ring Advanc ed Features Per -Port Options for Dynamic VLAN Advertising an d Joining Initiating Advert isements. As desc ribe d in t he pr eced ing s ecti on, t o enable dynamic join s, GVRP must be enabl ed and a port must be configured to Learn (th e defaul t).
9-80 Config uring Ad vance d Feat ures GVRP Confi guring Adva nced Features As th e abo ve tab le indica tes, w hen y ou en ab le GV RP , a port tha t has a T a gged or Untagged st atic VLAN ha s the option f or both gene rating ad vertise ments and dynamic ally joining o ther VLANs.
9-81 Conf iguring A dvanc ed Fea tures GVRP Configu ring Advanc ed Features Planning for G VRP Oper ation These step s outlin e the pro cedure for setting up dy namic V LANs for a seg- ment. 1. D eterm ine the VL AN t opolog y you wa nt fo r eac h segm ent (b road cas t domai n) on your ne twork .
9-82 Config uring Ad vance d Feat ures GVRP Confi guring Adva nced Features 2. Switch Con figuratio n . . . 8. VLAN Menu . . . 1. VLAN Suppor t Figure 9-60. The VLAN Support Scree n (Defau lt Configu ration) 2. Do the followin g to enable GVRP an d display t he Unknown VLAN fiel ds: a.
9-83 Conf iguring A dvanc ed Fea tures GVRP Configu ring Advanc ed Features CLI: Vi ewing and Confi guring GVRP GVRP Comman ds Used in Th is Section Displaying th e Switch’ s Current GVRP Configur ation.
9-84 Config uring Ad vance d Feat ures GVRP Confi guring Adva nced Features Enabling an d Disabling GVRP on th e Switch. This comman d enables GVRP on th e swit ch.
9-85 Conf iguring A dvanc ed Fea tures GVRP Configu ring Advanc ed Features Displaying th e Static and Dynamic VLANs Activ e on the Switch. Th e show vlans command lists all VLANs present in the switch.
9-86 Config uring Ad vance d Feat ures GVRP Confi guring Adva nced Features Converting a Dynamic VLA N to a Static V LAN. If a port on the switch has joined a dy namic VLAN , you can use the followi n.
9-87 Conf iguring A dvanc ed Fea tures GVRP Configu ring Advanc ed Features ■ By recei ving a dvertis ements from other d evices ru nning GV RP , the switch learns o f static VLANs o n thos e othe r devic es and dynam ically (automa t- icall y) cre at es tag ged VLANs on th e lin ks to th e adv ert ising devic es .
9-88 Config uring Ad vance d Feat ures Multime dia Traffic Contro l with IP Multicas t (IGMP) Confi guring Adva nced Features Multimedia T raffic Control with IP Multicast (IGMP) IGMP Feat ures In a n.
9-89 Conf iguring A dvanc ed Fea tures Multime dia Traffi c Control with IP Multicas t (IGMP) Configu ring Advanc ed Features Enab ling IG MP al low s the po rts to det ect I GMP q uerie s an d report p acke ts and mana ge IP multic ast traffic t hrough th e switch.
9-90 Config uring Ad vance d Feat ures Multime dia Traffic Contro l with IP Multicas t (IGMP) Confi guring Adva nced Features • Bloc ked: Causes the switch to drop all IGMP transmissions received from a specif ic port and t o block all ou tgoing IP Mu lticas t packe ts for that por t.
9-91 Conf iguring A dvanc ed Fea tures Multime dia Traffi c Control with IP Multicas t (IGMP) Configu ring Advanc ed Features V iewing the Current IG MP Configur ation. This com ma nd l is ts the IGM P config uration for all VLANs c onfigur ed on the swit ch or for a specific VLA N.
9-92 Config uring Ad vance d Feat ures Multime dia Traffic Contro l with IP Multicas t (IGMP) Confi guring Adva nced Features Figure 9-66. Example Listing of IGMP Configura tion for A Specific VLAN Enabling or Disabling IGMP on a VLAN.
9-93 Conf iguring A dvanc ed Fea tures Multime dia Traffi c Control with IP Multicas t (IGMP) Configu ring Advanc ed Features Configuring Per -Port IGMP Packet Control. Use this co mmand in the VLAN con text to speci fy how each po rt should ha ndle IGMP traffic.
9-94 Config uring Ad vance d Feat ures Multime dia Traffic Contro l with IP Multicas t (IGMP) Confi guring Adva nced Features SMC TigerSwitch 10/100(vlan 1)# no ip igmp high-priority- forward Returns I GMP traffic to “normal ” priori ty .
9-95 Conf iguring A dvanc ed Fea tures Multime dia Traffi c Control with IP Multicas t (IGMP) Configu ring Advanc ed Features to or from the sam e source(s) is termed a multicast group , and all de vices in the gr oup use th e sam e multicast group a ddress.
9-96 Config uring Ad vance d Feat ures Multime dia Traffic Contro l with IP Multicas t (IGMP) Confi guring Adva nced Features ■ Switch 2 is recognizin g IGMP traffic and learns t hat PC 4 is in the IP multicas t group rec eiving m ulticast data from the video se rver (P C X).
9-97 Conf iguring A dvanc ed Fea tures Multime dia Traffi c Control with IP Multicas t (IGMP) Configu ring Advanc ed Features Figure 9-68. Isolatin g IP Mu lticast T raffic in a N etwork ■ In the ab.
9-98 Config uring Ad vance d Feat ures Multime dia Traffic Contro l with IP Multicas t (IGMP) Confi guring Adva nced Features Note: IP Mult ica st Fil ters.
9-99 Conf iguring A dvanc ed Fea tures Span ning Tr ee Prot ocol (STP) Configu ring Advanc ed Features Spanning T ree Protoco l (STP) STP Fe atu res The switch use s the IEEE 802.1D Spann ing T ree Protocol (S TP), when enab led, to en sure tha t only one path at a time is ac tive be twee n any two n odes on the netwo rk.
9-10 0 Config uring Ad vance d Feat ures Span ning T ree Proto col (ST P) Confi guring Adva nced Features STP Fast M ode for Ove rcoming S erver Acce ss Failures. If an end node is config ured to aut omatica lly access a server , the duratio n of the STP startu p sequence can result in a “s erver a ccess failu re”.
9-10 1 Conf iguring A dvanc ed Fea tures Span ning Tr ee Prot ocol (STP) Configu ring Advanc ed Features ) Figure 9-69. Example of the ST P Confi gurati on Screen 4. If the r emaining S TP parameter se ttings are adequate f or your netwo rk, go to step 8.
9-10 2 Config uring Ad vance d Feat ures Span ning T ree Proto col (ST P) Confi guring Adva nced Features CLI: Confi guring STP STP Co mmands Use d in This Section V iewing the Cu rrent STP C onfigurati on.
9-10 3 Conf iguring A dvanc ed Fea tures Span ning Tr ee Prot ocol (STP) Configu ring Advanc ed Features Enabling or Disabling STP . Enabl ing ST P impleme nts the sp anning-tre e protocol f or all physica l ports on th e switch, reg ardless of w hether multip le VLANs are configur ed.
9-10 4 Config uring Ad vance d Feat ures Span ning T ree Proto col (ST P) Confi guring Adva nced Features Y ou can also incl ude one or m ore of the S TP per -po rt parame ters in this comm and. See “R econ figuring Per -P ort ST P Operat ion on the Switch ” on pag e 9-10 4.
9-10 5 Conf iguring A dvanc ed Fea tures Span ning Tr ee Prot ocol (STP) Configu ring Advanc ed Features For exam ple, th e follo wing ena bles STP (if it is not al ready e nabled) a n d configure s p.
9-10 6 Config uring Ad vance d Feat ures Span ning T ree Proto col (ST P) Confi guring Adva nced Features Figure 9-71. Example of Redundan t Paths Between T wo Nodes STP Fa st Mode For standa rd STP o.
9-10 7 Conf iguring A dvanc ed Fea tures Span ning Tr ee Prot ocol (STP) Configu ring Advanc ed Features Caut ion The Fast Mode configuratio n should be used only on switc h ports connec ted to end nod es.
9-10 8 Config uring Ad vance d Feat ures Span ning T ree Proto col (ST P) Confi guring Adva nced Features Figure 9-72. Example of Using a T runked Lin k with STP and VLANs For more inf ormati on, refer to “Spanning T ree Protoc ol Operat ion with VLANs” on page 9- 71.
10-1 Monitor ing and Analyz ing Switch Opera tion 10 Monitoring and Analyzing Switch Operation The SMC662 4M switch has several built-in too ls for monitoring, a nalyzing, and troubles hooting swit ch.
10- 2 Monit oring and An alyzin g Sw itc h Op erat ion Stat us and Co unter s Data Monitor ing and Anal yzing Switch Opera tion Status and Counter s Data This sectio n descri bes the sta tus and co unters sc reen s availab le throug h the switch consol e interf ace and/or the w eb browser in terface.
10-3 Monit oring an d Ana lyzing Switch Op eration Status an d Counter s Data Monitor ing and Analyz ing Switch Opera tion Menu Access T o Status and Counters Beginni ng at the Ma in Menu, displ ay the Sta tus and Co unters me nu by select - ing: 1. Stat us and C ounters Figure 10-1.
10- 4 Monit oring and An alyzin g Sw itc h Op erat ion Stat us and Co unter s Data Monitor ing and Anal yzing Switch Opera tion Genera l System Inf ormati on Menu Access From the c onsole Main Menu, selec t: 1. Stat us and C ounters 1. General Sy stem Information Figur e 10 -2.
10-5 Monit oring an d Ana lyzing Switch Op eration Status an d Counter s Data Monitor ing and Analyz ing Switch Opera tion Switch Management Address Informatio n Menu Access Fro m the Mai n Menu , se lect: 1 Statu s and Counters . . . 2. Switch Manage ment Address Information Figure 10-3.
10- 6 Monit oring and An alyzin g Sw itc h Op erat ion Stat us and Co unter s Data Monitor ing and Anal yzing Switch Opera tion Port Status The web br owser int erfac e and th e console in terfa ce show the same p ort status data. Menu: Displaying Port Status Fro m the Mai n Menu , se lect: 1.
10-7 Monit oring an d Ana lyzing Switch Op eration Status an d Counter s Data Monitor ing and Analyz ing Switch Opera tion V iewing Port and T runk Group Statistics These feat ures enab le you to dete rmine the traffic pa tterns for ea ch port sin ce the last re boot or reset of the switc h.
10- 8 Monit oring and An alyzin g Sw itc h Op erat ion Stat us and Co unter s Data Monitor ing and Anal yzing Switch Opera tion Menu Access to Port and T runk Statistics T o access this screen from the Main Menu, select: 1. Stat us and C ounters . . .
10-9 Monit oring an d Ana lyzing Switch Op eration Status an d Counter s Data Monitor ing and Analyz ing Switch Opera tion CLI Access T o Port and T runk Group Statistics T o Display t he Port Count er Summary Repor t. Th is comma nd provi des an over view of por t activ ity fo r all ports on the s witch.
10- 10 Monit oring and An alyzin g Sw itc h Op erat ion Stat us and Co unter s Data Monitor ing and Anal yzing Switch Opera tion V iewing the Switch’ s MAC Addre ss T ables These fe atures hel p you.
10- 11 Monit oring an d Ana lyzing Switch Op eration Status an d Counter s Data Monitor ing and Analyz ing Switch Opera tion Menu Access to the MAC Addr ess Views and Searches Switch-L evel MA C-Addre ss V ie wing and S earchi ng.
10- 12 Monit oring and An alyzin g Sw itc h Op erat ion Stat us and Co unter s Data Monitor ing and Anal yzing Switch Opera tion 2. T ype the MAC add ress you w ant to loc ate and p ress [Ente r]. The ad dress and port nu mber are high lighted if found.
10- 13 Monit oring an d Ana lyzing Switch Op eration Status an d Counter s Data Monitor ing and Analyz ing Switch Opera tion Enter MAC address: _ 2. T ype the MAC add ress you w ant to loc ate and p ress [Ente r]. The ad dress is highlighted if found.
10- 14 Monit oring and An alyzin g Sw itc h Op erat ion Stat us and Co unter s Data Monitor ing and Anal yzing Switch Opera tion Spanning T ree Protoco l (STP) Information Menu Access to STP Data Fro m the Mai n Menu , se lect: 1. Stat us and C ounters .
10- 15 Monit oring an d Ana lyzing Switch Op eration Status an d Counter s Data Monitor ing and Analyz ing Switch Opera tion Figure 10-11. Example of STP Po rt Informat ion CLI Access to STP Data This option lists the STP conf iguratio n, root data, and pe r -port data (cost, priorit y , stat e, and design ated brid ge).
10- 16 Monit oring and An alyzin g Sw itc h Op erat ion Stat us and Co unter s Data Monitor ing and Anal yzing Switch Opera tion Internet Group Ma nagement Protocol (IGMP) Status The switch use s the CLI to display the followin g IGMP status on a per -VLAN basis: For exam ple, su ppose t hat show ip igmp listed an IGMP gr oup addre ss of 224.
10- 17 Monit oring an d Ana lyzing Switch Op eration Status an d Counter s Data Monitor ing and Analyz ing Switch Opera tion VLAN Information The switch uses the CLI to display the following VLAN stat.
10- 18 Monit oring and An alyzin g Sw itc h Op erat ion Stat us and Co unter s Data Monitor ing and Anal yzing Switch Opera tion Listing th e VLAN ID ( VID) an d Status fo r Spec ific Port s. Figure 10-14. Example of VLAN Listing for Specific Ports Listing Ind ividual VL AN St atus.
10- 19 Monit oring an d Ana lyzing Switch Op eration Status an d Counter s Data Monitor ing and Analyz ing Switch Opera tion W eb Browser Interface Stat us Information The “h ome” scre en for the web b rowser inter face is th e Statu s Overv iew screen, as shown be low .
10- 20 Monit oring and An alyzin g Sw itc h Op erat ion Port Mon itoring Fea tures Monitor ing and Anal yzing Switch Opera tion Port Monitoring Features Port Mo nitori ng Features Y ou can design ate a po rt for m onitor ing tra ffic of one or more o ther por ts or of a single VLAN configu red on the switc h.
10- 21 Monit oring an d Ana lyzing Switch Op eration Port M onitor ing F eatur es Monitor ing and Analyz ing Switch Opera tion Menu: Configuring Port Monitoring This proced ure descr ibes co nfigurin g the switch f or monito ring when mon i- toring is disabled .
10- 22 Monit oring and An alyzin g Sw itc h Op erat ion Port Mon itoring Fea tures Monitor ing and Anal yzing Switch Opera tion Figure 10-17. How T o Select a Monitoring Port 5. Use the Space ba r to select t he port to use f or monitori ng, the n press the downarrow key to select t he Monitor par ameter .
10- 23 Monit oring an d Ana lyzing Switch Op eration Port M onitor ing F eatur es Monitor ing and Analyz ing Switch Opera tion iv . Press [Ente r], then press [S] (for Save ) to sa ve you r changes and exit fro m the scre en. Figure 10-18.Exa mple of Selecting a VLAN to Monitor 7.
10- 24 Monit oring and An alyzin g Sw itc h Op erat ion Port Mon itoring Fea tures Monitor ing and Anal yzing Switch Opera tion Figure 10-19.Exa mple of Monitored Port Listing Configuring the Monitor Port. This co mmand assign s or remo ves a mon- itoring port, and m ust be ex ecute d from th e global conf igurati on level.
10- 25 Monit oring an d Ana lyzing Switch Op eration Port M onitor ing F eatur es Monitor ing and Analyz ing Switch Opera tion Figure 10-21. Examples of Remo ving Ports and VLANs as Mo nitoring Source s W eb: Configuring Port Monitori ng T o enab le port monit oring: 1.
10- 26 Monit oring and An alyzin g Sw itc h Op erat ion Port Mon itoring Fea tures Monitor ing and Anal yzing Switch Opera tion.
11-1 Troubl eshooting 11 T roubleshoo ting This chapte r addresse s perfor mance- relat ed networ k pro blems that can be caused by top ology , switch config uration , and the e ffects of other devic es or their config uration s on switch operatio n.
11- 2 Trou blesh ooting Troub lesho oting App roach es Troubl eshooting T rou bleshooti ng Approaches Use th ese appr oaches t o diagnose switch pr oblems: ■ Check the switch LEDs f or indicatio ns .
11-3 Trou blesh ooting Brow ser or Co nsole A ccess P roble ms Troubl eshooting Browser or Console Access Problems Cannot a ccess the we b browser interfa ce: ■ Access ma y be disabled by the Web Agent Enabl ed paramete r in the switc h console. Ch eck the setting on t his parame ter by selec ting: 2.
11- 4 Trou blesh ooting Brows er or Cons ole Acce ss Prob lems Troubl eshooting Cannot T elne t into the switch consol e from a station on the netwo rk: ■ T elnet ac cess may be di sabled by the Inbound T elnet Enabled parame ter in the System Informa tion screen of the menu interfac e: 2.
11-5 Trou blesh ooting Unus ual Net work Activi ty Troubl eshooting Unusual Networ k Activity Network acti vity that exc eeds acce pted norms ma y indicate a hardware problem w ith one or mo re of the networ k compo nents, possibly including the switch.
11- 6 Trou blesh ooting Unusua l Netw ork Ac tivit y Troubl eshooting IP addresses that will exp ire after a limit ed duration. One sol ution is to configure “reservat ions” in the DHCP server for specific I P addresses to be assigned to devices having specific MAC addresses.
11-7 Trou blesh ooting Unus ual Net work Activi ty Troubl eshooting Problems Relat ed to Sp anning-T ree Protocol (STP) Caut ion If you en able ST P , it is reco mmended that you l eave the r emainde r of the STP paramet er settings at th eir defaul t values u ntil you ha ve had an opp ortunit y to evalua te STP pe rforma nce in your network.
11- 8 Trou blesh ooting Unusua l Netw ork Ac tivit y Troubl eshooting VLAN-Related Prob lems Monitor Po rt. When using the monitor po rt in a multip le VLAN environ - ment, it can be useful to know how broa dcast, mul ticast, and un icast tra ffic is tagg ed.
11-9 Trou blesh ooting Unus ual Net work Activi ty Troubl eshooting 1. If VLA N_1 (VID=1 ) is configur ed as “Un tagged” on po rt 3 on switch “X”, then it must also be con figured as “U ntagg ed” on port 7 o n switch “Y” . Make sure tha t the VLAN ID (VID) is th e same on both switches.
11- 10 Trou blesh ooting Using t he Even t Log T o Iden tify Probl em Sou rces Troubl eshooting Using the Event Log T o Identify Problem Sources The Event Log recor ds operating events as single-line en tries listed in chrono - logical order , and serv es as a tool fo r isolating prob lems.
11- 11 Trou blesh ooting Using the Event Log To Identify Problem So urces Troubl eshooting T able 11-1. Event Log Sy stem Modules Menu: Entering and Navigating in the Event Log Fro m the Mai n Menu , se lect Event Log .
11- 12 Trou blesh ooting Using t he Even t Log T o Iden tify Probl em Sou rces Troubl eshooting The log status line at the bo ttom of the d isplay id entifies whe re in the sequen ce of event messag es the display is cu rrently po sitioned.
11- 13 Trou blesh ooting Diagno sti c Tools Troubl eshooting Diagnostic T ools Diagnostic Feature s Ping and Link T ests The Ping te st and the Link test are point -to-point t ests between yo ur switch and anot her IEEE 8 02.3-co mplian t device o n your net work.
11- 14 Trou blesh ooting Diagno stic T ools Troubl eshooting W eb: Executing Ping or Link T ests Figure 11-12. Link and Ping T est Screen on the W eb Browser Interface Successes indi cates the number of Ping or Link pa ckets that su ccessfull y compl eted th e m ost re cent te st.
11- 15 Trou blesh ooting Diagno sti c Tools Troubl eshooting Numb er of Pac kets t o Send i s the n umb er of times y ou wa nt the s wit ch to attempt to test a con nection. T imeout i n Secon ds is th e nu mber of s ec ond s to a llo w pe r at temp t to te st a connect ion befor e determi ning th at the curr ent atte mpt has fail ed.
11- 16 Trou blesh ooting Diagno stic T ools Troubl eshooting Link T ests. Y ou ca n issue single or m ultiple link test s with varying repititi ons and time out perio ds.
11- 17 Trou blesh ooting Diagno sti c Tools Troubl eshooting Displaying th e Configuratio n File The complet e switch config uration is contained in a file that yo u can browse from ei ther the w eb browser in terface or the CLI. It may be us eful in som e troubles hooting sce narios to view the switch c onfigurat ion.
11- 18 Trou blesh ooting Diagno stic T ools Troubl eshooting CLI Administ rative and T roubleshooti ng Commands These comm ands pr ovide inf ormatio n or perfo rm actions t hat you may find helpful in tr oublesh ooting op erating pr oblems wit h the switch.
11- 19 Trou blesh ooting Restor ing t he Factory- Defa ult C onfig ura tion Troubl eshooting Restoring the Factory-Default Configuration As part of your troublesh ooting pr ocess, it may be come nece ssary to retur n the switch configur ation to th e factory defa ult settings.
11- 20 Trou blesh ooting Restor ing t he Factor y-De fault Con figur atio n Troubl eshooting.
A-1 Transfe rring an Operatin g Syste m or St artu p A T ransferri ng an Operating System or Startup Configurat ion Fil e Y ou can downloa d new switch soft ware (oper ating system— OS) and uploa d or downloa d switch conf iguration files.
A-2 Transf errin g an Op eratin g Sys tem or Sta rtu p Config urat ion Fi le Downl oading an Op eratin g System (OS) Transfer ring an Operatin g System or Sta rtup Using TF TP T o Download the OS Fi le from a Se rver This proced ure assu mes that: ■ An OS file for the switch has been stored on a TF TP server accessible to the switch .
A-3 Transf errin g an Op eratin g Sys tem or Sta rtu p Config urat ion Fi le Downlo ading an Ope rating System (OS) Transfe rring an Operatin g Syste m or St artu p Menu: TF TP Download from a S erver 1. In th e console Main Menu, selec t Dow nloa d O S to di spla y th is scr een : Figure A-1.
A-4 Transf errin g an Op eratin g Sys tem or Sta rtu p Config urat ion Fi le Downl oading an Op eratin g System (OS) Transfer ring an Operatin g System or Sta rtup A “prog ress” bar i ndicates the progre ss of the dow nload.
A-5 Transf errin g an Op eratin g Sys tem or Sta rtu p Config urat ion Fi le Downlo ading an Ope rating System (OS) Transfe rring an Operatin g Syste m or St artu p 2.
A-6 Transf errin g an Op eratin g Sys tem or Sta rtu p Config urat ion Fi le Downl oading an Op eratin g System (OS) Transfer ring an Operatin g System or Sta rtup Using Xmodem to D ownload the OS Fi le From a PC This proced ure assu mes that: ■ The switc h is connec ted via the Consol e RS-232 port o n a PC opera ting as a term inal.
A-7 Transf errin g an Op eratin g Sys tem or Sta rtu p Config urat ion Fi le Downlo ading an Ope rating System (OS) Transfe rring an Operatin g Syste m or St artu p For examp le, to downloa d an OS file named F_01_0 3.swi from a PC: 1. Ex ecut e th e f ollo wing com mand in t he CLI : 2.
A-8 Transf errin g an Op eratin g Sys tem or Sta rtu p Config urat ion Fi le Trou blesh ootin g TFTP Dow nload s Transfer ring an Operatin g System or Sta rtup T rou blesho oting TF TP Downloads If a TF TP download fails, the Down load OS screen indi cates the failure.
A-9 Transf errin g an Op eratin g Sys tem or Sta rtu p Config urat ion Fi le Tran sferri ng S witch Con figurat ion s Transfe rring an Operatin g Syste m or St artu p ■ Anothe r console session (t h.
A-10 Transf errin g an Op eratin g Sys tem or Sta rtu p Config urat ion Fi le Tran sferr ing Sw itch Co nfigur ations Transfer ring an Operatin g System or Sta rtup TF TP: Copyi ng a Configur ation to a Rem ote Ho st.
A-11 Transf errin g an Op eratin g Sys tem or Sta rtu p Config urat ion Fi le Tran sferri ng S witch Con figurat ion s Transfe rring an Operatin g Syste m or St artu p Xmodem: Co pyin g a Conf igurat ion fro m a Serial ly Co nnected PC or Unix W orkstation.
A-12 Transf errin g an Op eratin g Sys tem or Sta rtu p Config urat ion Fi le Tran sferr ing Sw itch Co nfigur ations Transfer ring an Operatin g System or Sta rtup.
B-1 MAC Address Ma nagemen t B MAC Address Management The switch assigns MAC addresses in these area s: ■ For managem ent func tions: • One Ba se MAC addre ss ass ign ed to th e defa ult VL AN (VI.
B-2 MAC Ad dress Ma nagem ent Determin ing MAC Addre sses MAC Address Man agement Menu: Viewing the Swi tch’ s MAC Addresse s The Management Address Inf ormation screen lists the MAC addresses for: ■ Base switch (default VLA N; VID = 1) ■ Any add itional VLANs co nfigur ed on th e switch.
B-3 MAC Ad dress M anag ement Determin ing MAC Add resses MAC Address Ma nagemen t CLI: Vi ewing t he Por t and VLA N MAC Addr esses The M AC ad dress assi gn ed to e ach s witc h por t is u sed i nter nall y by su ch featu res a s Fl ow Con trol a n d th e Span ning T ree Prot ocol.
B-4 MAC Ad dress Ma nagem ent Determin ing MAC Addre sses MAC Address Man agement.
C-1 Switch M emory and Conf igurat ion C Switch Memory and Conf iguration This appendi x describe s the foll owing: ■ How switch memory ma nages config uration changes ■ How t he CLI imp lemen ts .
C-2 Switc h Memory an d Con figur atio n Overvi ew o f Con figurat ion F ile Mana gement Switch Me mory and Configura tion ■ Startup-co nfig File: Exists in flash (non-v olatile) me mory and is used to preser ve the m ost recent ly-saved conf igurat ion as th e “perman ent” config uration.
C-3 Switc h Memor y and C onfig urati on Using the CL I To Im pleme nt Co nfigur atio n Chan ges Switch M emory and Conf igurat ion The above c omman d dis ables por t 5 i n the r unni ng-co nfig file , but not in t he startup-c onfig file. Por t 5 remains disabl ed only until the switch re boots.
C-4 Switc h Memory an d Con figur atio n Using the CL I To Impl ement Conf igurat ion Ch anges Switch Me mory and Configura tion 2. Use the appropr iate show co mman ds to verif y th at you ha ve c orrec tly made the de sired change s.
C-5 Switc h Memor y and C onfig urati on Using the CL I To Im pleme nt Co nfigur atio n Chan ges Switch M emory and Conf igurat ion If you use the CL I to chang e a parame ter settin g, and then e xec.
C-6 Switc h Memory an d Con figur atio n Using t he Men u and We b Brow ser In terf aces To Imple ment Config urati on Cha nges Switch Me mory and Configura tion How T o Reset the startup -config and running-conf ig Files to the Factory D efault C onfigurati on.
C-7 Switc h Memor y and C onfig urati on Using the Men u and W eb Brows er Int erfac es To Im pleme nt Co nfigur atio n Chan ges Switch M emory and Conf igurat ion Note The only exc eption to this op .
C-8 Switc h Memory an d Con figur atio n Using t he Men u and We b Brow ser In terf aces To Imple ment Config urati on Cha nges Switch Me mory and Configura tion face, th e switch disc ards the config uration change s made while us ing the CL I.
C-9 Switc h Memor y and C onfig urati on Using the Men u and W eb Brows er Int erfac es To Im pleme nt Co nfigur atio n Chan ges Switch M emory and Conf igurat ion (T o access these pa rameters, go t o the Main me nu and select 2. Switch Conf igurat ion , then 8.
C-10 Switc h Memory an d Con figur atio n Using t he Men u and We b Brow ser In terf aces To Imple ment Config urati on Cha nges Switch Me mory and Configura tion.
D-1 Daylight Savings Time D Daylig ht Savi ngs T ime The S MC66 24M swit ch pr ovid es a w ay to auto mat ically ad just th e sy stem clock fo r Daylight Sa vings Time (DST) chang es.
D-2 Daylig ht Savi ngs Time Daylight Savings Time Figure D-1. Menu Interface with “Use r -Defined” Daylight T ime Rule Option Before c onfiguring a “User defined” Daylight T ime Rule, it is impo rtant to understand how the switch treats the entries.
Inde x – 1 Index Numerics 802.1Q V LAN sta ndard … 9- 99 802.3u auto neg otiati on sta ndard … 6- 2 A access mana ger … 8-5 ope rato r … 8-5 access le vels, authorized IP manage rs … 7-29 .
2 – In dex Index quick … 2 -7 restori ng fac tor y defau lts … 1 1-19 savi ng from men u in terf ace … 2-9 serial lin k … 5-15 SNMP … 8- 3, 8 -5 spanning tre e … 9-99 span ning t ree pr .
Inde x – 3 Index G GARP See GV RP gatewa y … 5-2, 5- 4 gatewa y (IP) ad dress … 5- 3, 5-5 GVRP advert isemen t … 9-75, 9-87 advert isemen t, d efined … 9 -74 adverti semen t, resp onses to .
4 – In dex Index configu ration … 5-2 DHCP/Bootp … 5-2 dupli cate addr ess … 11-5 dupli cate addr ess, DHCP ne twork … 11-5 effect when add ress not u sed … 5- 9 gatewa y … 5-2 gatewa y .
Inde x – 5 Index mult icas t grou p See IGMP multimedia See IGMP multiple VL AN … 8-1 multi-po rt bridge … 5-1 N navig ati on, co nsol e int erfa ce … 2-8 – 2-9 navig ati on, eve nt lo g ….
6 – In dex Index oper atin g notes … 7- 26 overvi ew … 7-7 port trunk r estri ction … 6- 10 prio r to … 7- 27 prox y web se rver … 7- 27 tru nk rest ricti on … 6- 14 port tru nk … 6-9 .
Inde x – 7 Index authorized IP m anagers … 7- 28 per po rt … 7 -7 securi ty viol ations noti ces of … 7- 20 Sel f Te st L ED beh avior duri ng fac tory def ault r eset … 11 -1 9 serial num b.
8 – In dex Index traffic analysis … 8-1 traffic monito ring … 8-1, 8 -4 traffic, moni toring … 10-20 traffic, port … 1 0-7 transc eiver, f iber-o ptic … 6-3 transc eiver, spe ed ch ange .
Inde x – 9 Index prima ry, CLI com mand … 9-61, 9-63 primar y, select in menu … 9-56 prima ry, web co nfigure … 9-66 prim ary, w ith DHCP … 9-5 4 reboot requir ed … 2-7 restrictions … 9-.
10 – Inde x Index.
.
6 H ughes Irvine , CA 92618 Phone: (949) 70 7-2400 FOR TECHNICAL SUPPORT , CALL: From U.S.A. and Cana da (24 ho urs, 7 days a week ) (800) SM C-4-YOU; (94 9) 707-24 00; (949) 707 -2460 ( Fax) From E urope (8: 00 AM - 5: 30 PM UK Gre enwic h Mean Time) 44 (0) 1188 74 8740 ; 44 (0) 1189 74874 1 (Fax) INTERNET E-mail addresses: techsupport @smc.
An important point after buying a device SMC Networks SMC6624M (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought SMC Networks SMC6624M yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data SMC Networks SMC6624M - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, SMC Networks SMC6624M you will learn all the available features of the product, as well as information on its operation. The information that you get SMC Networks SMC6624M will certainly help you make a decision on the purchase.
If you already are a holder of SMC Networks SMC6624M, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime SMC Networks SMC6624M.
However, one of the most important roles played by the user manual is to help in solving problems with SMC Networks SMC6624M. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device SMC Networks SMC6624M along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center