Stackable Fast Ethernet Switch◆ 24 10BASE-T/100BASE-TX RJ-45 ports◆ Auto MDI/MDI-X support on all ports◆ Optional 100BASE-FX or 1000BASE-X modules◆
viContentsHow the Switch Lists Trunk Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-27Outbound Traffic Distribution Across Trunked
6-8Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug
6-9Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Port TrunkingPort Sta
6-10Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Port Connection
6-11Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Fault Tolerance: I
6-12Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Table 6-4. Trun
6-13Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Table 6-5. General O
6-14Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Spanning Tree P
6-15Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Menu: Viewing and Co
6-16Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and switch automati
6-17Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and 8. Connect the trunk
viiContentsWeb: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . 7-34Building IP Masks . . . . . . . . . . . . . . . .
6-18Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and The show trunk
6-19Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Figure 6-9. Example
6-20Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and You can configu
6-21Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Enabling a Dynamic L
6-22Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Removing Ports
6-23Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Trunk Group Operatio
6-24Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Default Port Op
6-25Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and LACP Notes and Restr
6-26Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Half-Duplex and
6-27Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Depending on the c
viiiContentsUsing the Menu Interface To View Stack Status And Configure Stacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6-28Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and and sends traff
7-1Using Passwords, Port Security, and Authorized IP 7Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Acces
7-2Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port
7-3Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing Password SecurityUsing Passwords, Port Secur
7-4Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port
7-5Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing Password SecurityUsing Passwords, Port Secur
7-6Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port
7-7Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pass
7-8Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsing
7-9Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pass
ixContentsEffect of VLANs on Other Switch Features . . . . . . . . . . . . . . . . . . . . . 9-71Spanning Tree Protocol Operation with VLANs . . .
7-10Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin
7-11Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas
7-12Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin
7-13Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas
7-14Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin
7-15Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas
7-16Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin
7-17Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas
7-18Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin
7-19Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas
xContentsMenu Access To Status and Counters . . . . . . . . . . . . . . . . . . . . . . . . . 10-3General System Information . . . . . . . . . . .
7-20Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin
7-21Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas
7-22Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin
7-23Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas
7-24Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin
7-25Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas
7-26Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin
7-27Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas
7-28Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,
7-29Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port
xiContentsUsing the Event Log To Identify Problem Sources . . . . . . . . . . . . . 11-10Menu: Entering and Navigating in the Event Log . . . . . .
7-30Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,
7-31Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port
7-32Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,
7-33Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port
7-34Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,
7-35Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port
7-36Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,
7-37Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port
7-38Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,
8-1Monitoring and Managing the Switch8Configuring for Network Management ApplicationsYou can manage the switch via SNMP from a network management stat
xiiContentsC Switch Memory and ConfigurationOverview of Configuration File Management . . . . . . . . . . . . . . . . . . C-1Using the CLI To Impl
8-2Configuring for Network Management ApplicationsSNMP Management FeaturesMonitoring and Managing the SwitchSNMP Management FeaturesSNMP management fe
8-3Configuring for Network Management ApplicationsConfiguring for SNMP Access to the SwitchMonitoring and Managing the SwitchThe switch SNMP agent als
8-4Configuring for Network Management ApplicationsConfiguring for SNMP Access to the SwitchMonitoring and Managing the SwitchCaution Deleting the comm
8-5Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchSNMP Communities SNMP Community FeaturesUse SNMP c
8-6Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchFigure 8-1. The SNMP Communities Screen (Default
8-7Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchCLI: Viewing and Configuring Community NamesCommun
8-8Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchSMC TigerSwitch 10/100# show snmp-server publicCon
8-9Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchTrap Receivers and Authenti
8-10Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchCLI: Configuring and Displ
8-11Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchConfiguring Trap Receivers
1-1Selecting a Management Interface1Selecting a Management InterfaceThis chapter describes the following: Management interfaces for the SMC6624M swit
8-12Configuring for Network Management ApplicationsAdvanced Management: RMON SupportMonitoring and Managing the SwitchAdvanced Management: RMON Suppor
9-1Configuring Advanced Features9Configuring Advanced FeaturesThis chapter describes the following features and how to configure them with the switch’
9-2Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesStack ManagementStacking FeaturesStack Management (termed stacking)
9-3Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features Simplify management of small workgroups or wiring closets while scaling
9-4Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesComponents of Stack ManagementTable 9-1. Stacking DefinitionsFigure
9-5Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-2. Example of Stacking with One Commander Controlling Access to
9-6Configuring Advanced Features Stack ManagementConfiguring Advanced Features There is no limit on the number of stacks in the same IP subnet (b
9-7Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesNote In the default stack configuration, the Candidate Auto Join paramete
9-8Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesOverview of Configuring and Bringing Up a StackThis process assumes
9-9Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesTable 9-3. Stacking Configuration GuideThe easiest way to automatically c
1-2Selecting a Management InterfaceAdvantages of Using the Menu InterfaceSelecting a Management InterfaceAdvantages of Using the Menu InterfaceFigure
9-10Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesGeneral Steps for Creating a StackThis section describes the genera
9-11Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. For automatically or manually pulling Candidate switches into a stack
9-12Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing the Menu Interface To View Stack Status And Configure Stackin
9-13Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-6. The Default Stack Configuration Screen4. Move the cursor to
9-14Configuring Advanced Features Stack ManagementConfiguring Advanced Features• No (the default) prevents automatic joining of Candidates that ha
9-15Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesTable 9-4.Candidate Configuration Options in the Menu InterfaceUsing the
9-16Configuring Advanced Features Stack ManagementConfiguring Advanced Features4. Do one of the following:• To disable stacking on the Candidate,
9-17Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the Commander’s Menu To Manually Add a Candidate to a Stack. In t
9-18Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-10. Example of Candidate List in Stack Management Screen3
9-19Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-11. Example of Stack Management Screen After New Member AddedU
1-3Selecting a Management InterfaceAdvantages of Using the CLISelecting a Management InterfaceAdvantages of Using the CLIFigure 1-2. Example of The Co
9-20Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-12. Example of How the Stacking Status (All) Screen Helps
9-21Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features8. Do one of the following:• If the stack containing the Member you are
9-22Configuring Advanced Features Stack ManagementConfiguring Advanced Features4. Stack ManagementYou will then see the Stack Management screen:Fi
9-23Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the Commander To Access Member Switches for Configuration Changes
9-24Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-17. The eXecute Command Displays the Console Main Menu fo
9-25Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. Press [B] (for Back) to return to the Stacking Menu.4. To display Sta
9-26Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing Any Stacked Switch To View the Status for All Switches with S
9-27Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-19. Example of the Commander’s Stacking Status ScreenViewing M
9-28Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-20. Example of a Member’s Stacking Status ScreenViewing C
9-29Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To View Stack Status and Configure StackingThe CLI enables
1-4Selecting a Management InterfaceAdvantages of Using the Web Browser InterfaceSelecting a Management InterfaceAdvantages of Using the Web Browser In
9-30Configuring Advanced Features Stack ManagementConfiguring Advanced Features[no] stack member <switch-num> mac-address <mac-addr> [
9-31Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To View Stack StatusYou can list the stack status for an i
9-32Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesViewing the Status of all Stack-Enabled Switches Discovered in the
9-33Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To Configure a Commander SwitchYou can configure any stack
9-34Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-26. Example of the Commander’s Show Stack Screen with Onl
9-35Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-27. Example of Using a Member’s CLI To Convert the Member to t
9-36Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing the Commander’s CLI To Manually Add a Candidate to the Stack.
9-37Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFor example, if the switch named “DEFAULT_CONFIG” in the above listing d
9-38Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing a Candidate CLI To Manually “Push” the Candidate Into a Stack
9-39Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesSyntax: stack member <switch-number> mac-address <mac-add
2-1Using the Menu Interface2Using the Menu InterfaceThis chapter describes the following features: Overview of the Menu Interface (page 4-1) Startin
9-40Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesSyntax: no stack name <stack name> stack join <mac-add
9-41Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesSyntax: [no] stack member <switch-num> mac-address <mac-addr&
9-42Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-35. Example of How To Identify the Commander’s MAC Addres
9-43Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-36. Example of a Stack Showing Switch Number (SN) AssignmentsT
9-44Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesSNMP Community Operation in a StackCommunity MembershipIn the defau
9-45Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesNote that in the above example (figure 9-37) you cannot use the public c
9-46Configuring Advanced Features Stack ManagementConfiguring Advanced Features Stacking uses only the primary VLAN on each switch in a stack. T
9-47Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. Click on [Apply Changes] to save any configuration changes for the i
9-48Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs) VLAN F
9-49Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced Featuressaved by not allowing packets to flood out all por
2-2Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceMenu Interaction with Other Interfaces. A configuration change
9-50Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-40. Example of Overlapping VLANs Us
9-51Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-42. Example of Tagged and Untagged VLAN
9-52Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesDHCP or Bootp on different VLANs do not resul
9-53Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-43. Comparing Per-Port VLAN Options With
9-54Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesGeneral Steps for Using VLANs1. Plan your VLA
9-55Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesMenu: Configuring VLAN ParametersIn the factory de
9-56Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced Features To select another primary VLAN, select the
9-57Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesAdding or Editing VLAN NamesUse this procedure to
9-58Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-47. Example of VLAN Names Screen wi
9-59Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-48. Example of VLAN Port Assignment Scre
2-3Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceHow To Start a Menu Interface SessionIn its factory default confi
9-60Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-49. Example of VLAN Assignments for
9-61Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN Commands Used in this SectionDisplaying the S
9-62Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesDisplaying the Configuration for a Particular
9-63Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesChanging the Number of VLANs Allowed on the Switch
9-64Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesCreating a New Static VLANChanging the VLAN C
9-65Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesConverting a Dynamic VLAN to a Static VLAN. If GV
9-66Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced Featuresoperation. Note that Auto is the defaultper-p
9-67Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesTo configure static VLAN port parameters, you will
9-68Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-54. Example of Tagged and Untagged
9-69Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesNote Each 802.1Q-compliant VLAN must have its own
2-4Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceFigure 2-1. The Main Menu with Manager PrivilegesFor a descriptio
9-70Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-56. Example of Networked 802.1Q-Com
9-71Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesTo summarize:Effect of VLANs on Other Switch Featu
9-72Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN MAC AddressesThe switch has one unique M
9-73Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN Restrictions A port must be a member of at l
9-74Configuring Advanced Features GVRPConfiguring Advanced FeaturesGVRPGVRP—GARP VLAN Registration Protocol—is an application of the Generic Attri
9-75Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesNote There must be one common VLAN (that is, one common VID) connecting all of the G
9-76Configuring Advanced Features GVRPConfiguring Advanced FeaturesNote that if a static VLAN is configured on at least one port of a switch, and
9-77Configuring Advanced FeaturesGVRPConfiguring Advanced Features If the switch already has a static VLAN assignment with the same VID as in the adv
9-78Configuring Advanced Features GVRPConfiguring Advanced FeaturesTable 9-8. Options for Handling “Unknown VLAN” Advertisements:The CLI show gvrp
9-79Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesPer-Port Options for Dynamic VLAN Advertising and JoiningInitiating Advertisements.
2-5Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceFigure 2-2. An Asterisk Indicates a Configuration Change Requirin
9-80Configuring Advanced Features GVRPConfiguring Advanced FeaturesAs the above table indicates, when you enable GVRP, a port that has a Tagged or
9-81Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesPlanning for GVRP OperationThese steps outline the procedure for setting up dynamic
9-82Configuring Advanced Features GVRPConfiguring Advanced Features2. Switch Configuration . . .8. VLAN Menu . . . 1. VLAN SupportFigure 9-60. Th
9-83Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesCLI: Viewing and Configuring GVRPGVRP Commands Used in This SectionDisplaying the Sw
9-84Configuring Advanced Features GVRPConfiguring Advanced FeaturesEnabling and Disabling GVRP on the Switch. This command enables GVRP on the sw
9-85Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesDisplaying the Static and Dynamic VLANs Active on the Switch. The show vlans comman
9-86Configuring Advanced Features GVRPConfiguring Advanced FeaturesConverting a Dynamic VLAN to a Static VLAN. If a port on the switch has joined
9-87Configuring Advanced FeaturesGVRPConfiguring Advanced Features By receiving advertisements from other devices running GVRP, the switch learns of
9-88Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesMultimedia Traffic Control with
9-89Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesEnabling IGMP allows the ports to det
2-6Using the Menu InterfaceMain Menu FeaturesUsing the Menu InterfaceMain Menu Features Figure 2-3. The Main Menu View with Manager PrivilegesThe Main
9-90Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Features• Blocked: Causes the switch to
9-91Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesViewing the Current IGMP Configuratio
9-92Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesFigure 9-66. Example Listing of
9-93Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesConfiguring Per-Port IGMP Packet Cont
9-94Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesSMC TigerSwitch 10/100(vlan 1)#
9-95Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Featuresto or from the same source(s) is term
9-96Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Features Switch 2 is recognizing IGMP t
9-97Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesFigure 9-68. Isolating IP Multicast
9-98Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesNote: IP Multicast Filters. IP
9-99Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesSpanning Tree Protocol (STP)STP FeaturesThe switch uses the
2-7Using the Menu InterfaceMain Menu FeaturesUsing the Menu Interface Command Line (CLI): Selects the Command Line Interface at the same level (Manag
9-100Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesSTP Fast Mode for Overcoming Server Access Failures.
9-101Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced Features)Figure 9-69. Example of the STP Configuration Screen4. If
9-102Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesCLI: Configuring STPSTP Commands Used in This SectionV
9-103Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesEnabling or Disabling STP. Enabling STP implements the spa
9-104Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesYou can also include one or more of the STP per-port p
9-105Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesFor example, the following enables STP (if it is not alread
9-106Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesFigure 9-71. Example of Redundant Paths Between Two N
9-107Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesCaution The Fast Mode configuration should be used only on
9-108Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesFigure 9-72. Example of Using a Trunked Link with STP
10-1Monitoring and Analyzing Switch Operation10Monitoring and Analyzing Switch OperationThe SMC6624M switch has several built-in tools for monitoring,
2-8Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceScreen Structure and NavigationMenu interface screens include these
10-2Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationStatus and Counters DataThis section des
10-3Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access To Status and Counters Begin
10-4Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationGeneral System InformationMenu AccessFro
10-5Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationSwitch Management Address InformationMen
10-6Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationPort StatusThe web browser interface and
10-7Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationViewing Port and Trunk Group StatisticsT
10-8Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access to Port and Trunk Statistics
10-9Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationCLI Access To Port and Trunk Group Stati
10-10Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationViewing the Switch’s MAC Address Tables
10-11Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access to the MAC Address Views an
2-9Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceTable 4-1. How To Navigate in the Menu Interface Task: Actions:Execu
10-12Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch Operation2. Type the MAC address you want to loc
10-13Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationEnter MAC address: _2. Type the MAC add
10-14Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationSpanning Tree Protocol (STP) Informatio
10-15Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationFigure 10-11.Example of STP Port Inform
10-16Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationInternet Group Management Protocol (IGM
10-17Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationVLAN InformationThe switch uses the CLI
10-18Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationListing the VLAN ID (VID) and Status fo
10-19Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationWeb Browser Interface Status Informatio
10-20Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationPort Monitoring Features Port Monitorin
10-21Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationMenu: Configuring Port MonitoringThis p
6 HughesIrvine, CA 92618Phone: (949) 707-2400TigerSwitch 10/100Management GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsJuly 2001P
2-10Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceTo get Help on individual parameter descriptions. In most screens
10-22Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-17. How To Select a Monitorin
10-23Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch Operationiv. Press [Enter], then press [S] (for
10-24Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-19.Example of Monitored Port
10-25Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-21.Examples of Removing Ports
10-26Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch Operation
11-1Troubleshooting11TroubleshootingThis chapter addresses performance-related network problems that can be caused by topology, switch configuration,
11-2TroubleshootingTroubleshooting ApproachesTroubleshootingTroubleshooting ApproachesUse these approaches to diagnose switch problems: Check the swi
11-3TroubleshootingBrowser or Console Access ProblemsTroubleshootingBrowser or Console Access ProblemsCannot access the web browser interface: Acces
11-4TroubleshootingBrowser or Console Access ProblemsTroubleshootingCannot Telnet into the switch console from a station on the network: Telnet acce
11-5TroubleshootingUnusual Network ActivityTroubleshootingUnusual Network ActivityNetwork activity that exceeds accepted norms may indicate a hardware
2-11Using the Menu InterfaceRebooting the SwitchUsing the Menu InterfaceRebooting the SwitchRebooting the switch from the menu interface Terminates a
11-6TroubleshootingUnusual Network ActivityTroubleshootingIP addresses that will expire after a limited duration. One solution is to configure “reserv
11-7TroubleshootingUnusual Network ActivityTroubleshootingProblems Related to Spanning-Tree Protocol (STP)Caution If you enable STP, it is recommended
11-8TroubleshootingUnusual Network ActivityTroubleshootingVLAN-Related ProblemsMonitor Port. When using the monitor port in a multiple VLAN environ-m
11-9TroubleshootingUnusual Network ActivityTroubleshooting1. If VLAN_1 (VID=1) is configured as “Untagged” on port 3 on switch “X”, then it must also
11-10TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingUsing the Event Log To Identify Problem SourcesThe Event Log records
11-11TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingTable 11-1. Event Log System ModulesMenu: Entering and Navigating in
11-12TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingThe log status line at the bottom of the display identifies where in
11-13TroubleshootingDiagnostic ToolsTroubleshootingDiagnostic ToolsDiagnostic FeaturesPing and Link TestsThe Ping test and the Link test are point-to-
11-14TroubleshootingDiagnostic ToolsTroubleshootingWeb: Executing Ping or Link TestsFigure 11-12.Link and Ping Test Screen on the Web Browser Interfac
11-15TroubleshootingDiagnostic ToolsTroubleshootingNumber of Packets to Send is the number of times you want the switch to attempt to test a connectio
2-12Using the Menu InterfaceRebooting the SwitchUsing the Menu InterfaceRebooting To Activate Configuration Changes. Configuration changes for most p
11-16TroubleshootingDiagnostic ToolsTroubleshootingLink Tests. You can issue single or multiple link tests with varying repititions and timeout perio
11-17TroubleshootingDiagnostic ToolsTroubleshootingDisplaying the Configuration FileThe complete switch configuration is contained in a file that you
11-18TroubleshootingDiagnostic ToolsTroubleshootingCLI Administrative and Troubleshooting CommandsThese commands provide information or perform action
11-19TroubleshootingRestoring the Factory-Default ConfigurationTroubleshootingRestoring the Factory-Default ConfigurationAs part of your troubleshooti
11-20TroubleshootingRestoring the Factory-Default ConfigurationTroubleshooting
A-1Transferring an Operating System or Startup ATransferring an Operating System or Startup Configuration FileYou can download new switch software (op
A-2Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Using
A-3Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Menu:
A-4Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup A “pr
A-5Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup 2. En
2-13Using the Menu InterfaceMenu Features ListUsing the Menu InterfaceMenu Features ListStatus and Counters• General System Information• Switch Manage
A-6Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Using
A-7Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup For e
A-8Transferring an Operating System or Startup Configuration FileTroubleshooting TFTP DownloadsTransferring an Operating System or Startup Troubleshoo
A-9Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup Anoth
A-10Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup TFTP:
A-11Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup Xmodem
A-12Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup
B-1MAC Address ManagementBMAC Address ManagementThe switch assigns MAC addresses in these areas: For management functions:• One Base MAC address assi
B-2MAC Address ManagementDetermining MAC AddressesMAC Address ManagementMenu: Viewing the Switch’s MAC AddressesThe Management Address Information scr
B-3MAC Address ManagementDetermining MAC AddressesMAC Address ManagementCLI: Viewing the Port and VLAN MAC Addresses The MAC address assigned to each
2-14Using the Menu InterfaceWhere To Go From HereUsing the Menu InterfaceWhere To Go From HereThis chapter provides an overview of the menu interface
B-4MAC Address ManagementDetermining MAC AddressesMAC Address Management
C-1Switch Memory and ConfigurationCSwitch Memory and ConfigurationThis appendix describes the following: How switch memory manages configuration chan
C-2Switch Memory and ConfigurationOverview of Configuration File ManagementSwitch Memory and Configuration Startup-config File: Exists in flash (non-
C-3Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and ConfigurationThe above command disables port 5 in
C-4Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and Configuration2. Use the appropriate show commands
C-5Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and ConfigurationIf you use the CLI to change a parame
C-6Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and ConfigurationHow To Re
C-7Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and ConfigurationNote The
C-8Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configurationface, the
C-9Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configuration(To acces
3-1Using the Command Line Interface (CLI)3Using the Command Line Interface (CLI)The CLI is a text-based command interface for configuring and monitori
C-10Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configuration
D-1Daylight Savings TimeDDaylight Savings TimeThe SMC6624M switch provides a way to automatically adjust the system clock for Daylight Savings Time (D
D-2Daylight Savings TimeDaylight Savings TimeFigure D-1. Menu Interface with “User-Defined” Daylight Time Rule OptionBefore configuring a “User define
Index – 1IndexNumerics802.1Q VLAN standard … 9-99802.3u auto negotiation standard … 6-2Aaccessmanager … 8-5operator … 8-5access levels, authorized IP
2 – IndexIndexquick … 2-7restoring factory defaults … 11-19saving from menu interface … 2-9serial link … 5-15SNMP … 8-3, 8-5spanning tree … 9-99spanni
Index – 3IndexGGARPSee GVRPgateway … 5-2, 5-4gateway (IP) address … 5-3, 5-5GVRPadvertisement … 9-75, 9-87advertisement, defined … 9-74advertisement,
4 – IndexIndexconfiguration … 5-2DHCP/Bootp … 5-2duplicate address … 11-5duplicate address, DHCP network … 11-5effect when address not used … 5-9gatew
Index – 5Indexmulticast groupSee IGMPmultimediaSee IGMPmultiple VLAN … 8-1multi-port bridge … 5-1Nnavigation, console interface … 2-8 –2-9navigation,
6 – IndexIndexoperating notes … 7-26overview … 7-7port trunk restriction … 6-10prior to … 7-27proxy web server … 7-27trunk restriction … 6-14port trun
Index – 7Indexauthorized IP managers … 7-28per port … 7-7security violationsnotices of … 7-20Self Test LEDbehavior during factory default reset … 11-1
3-2Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)When you use the CLI to make a configuration change, the s
8 – IndexIndextraffic analysis … 8-1traffic monitoring … 8-1, 8-4traffic, monitoring … 10-20traffic, port … 10-7transceiver, fiber-optic … 6-3transcei
Index – 9Indexprimary, CLI command … 9-61, 9-63primary, select in menu … 9-56primary, web configure … 9-66primary, with DHCP … 9-54reboot required … 2
10 – IndexIndex
6 HughesIrvine, CA 92618Phone: (949) 707-2400FOR TECHNICAL SUPPORT, CALL:From U.S.A. and Canada (24 hours, 7 days a week)(800) SMC-4-YOU; (949) 707-24
3-3Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Caution SMC strongly recommends that you configure a Manag
3-4Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Manager Privileges Manager privileges give you three addit
3-5Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI) SMC TigerSwitch 10/100(vlan-10)#Changing Interfa
Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, n
3-6Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)How To Move Between LevelsMoving Between the CLI and the M
3-7Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)For example, if you use the CLI to set a Manager password,
3-8Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Typing ? at the Manager level produces this listing:Figure
3-9Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)As mentioned above, if you type part of a command word and
3-10Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Thus, if you wanted to create a port trunk group using po
3-11Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-7. Example of Context-Sensitive Command-List Hel
3-12Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-9. Example of Help for a Specific Instance of a
3-13Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-10. Context-Specific Commands Affecting Port Con
3-14Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)VLAN Context. Includes VLAN-specific commands that apply
3-15Using the Command Line Interface (CLI)CLI Control and EditingUsing the Command Line Interface (CLI)CLI Control and EditingKeystrokes Function[Ctrl
iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un
3-16Using the Command Line Interface (CLI)CLI Control and EditingUsing the Command Line Interface (CLI)
4-1Using the Web Browser Interface4Using the Web Browser InterfaceThe web browser interface built into the switch lets you easily access the switch fr
4-2Using the Web Browser InterfaceGeneral FeaturesUsing the Web Browser InterfaceGeneral FeaturesThe SMC6624M switch includes these web browser interf
4-3Using the Web Browser InterfaceWeb Browser Interface RequirementsUsing the Web Browser Interface Web Browser Interface RequirementsYou can use equi
4-4Using the Web Browser InterfaceStarting a Web Browser Interface Session with the SwitchUsing the Web Browser InterfaceStarting a Web Browser Interf
4-5Using the Web Browser InterfaceStarting a Web Browser Interface Session with the SwitchUsing the Web Browser InterfaceFigure 4-1. Example of Status
4-6Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceTasks for Your First Web Browser In
4-7Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceThis window is the launching point
4-8Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceTo set the passwords:1. Access the
4-9Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser Interface Entering the operator password gi
LIMITED WARRANTYiiMAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF SMC OR ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF
4-10Using the Web Browser InterfaceSupport/Mgmt URL FeatureUsing the Web Browser InterfaceSupport/Mgmt URL FeatureThe Support/Mgmt URL window enables
4-11Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceStatus Reporting FeaturesBrowser elements covered in this s
4-12Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceThe Port Utilization and Status DisplaysThe Port Utilizatio
4-13Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser Interface Maximum Activity Indicator: As the bars in the graph area
4-14Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfacePort StatusFigure 4-10. The Port Status Indicators and Lege
4-15Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceThe Alert LogThe web browser interface Alert Log, shown in
4-16Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceAlert TypesThe following table lists the types of alerts th
4-17Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceNote When troubleshooting the sources of alerts, it may be
4-18Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceTable 4-3. Status Indicator Key System Name. The name you
5-1Configuring IP Addressing, Interface Access, and 5Configuring IP Addressing, Interface Access, and System InformationThis chapter describes the swi
iiiContentsContents1 Selecting a Management InterfaceUnderstanding Management Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Advant
5-2Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and IP Configu
5-3Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Timep Operation
5-4Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and The IP a
5-5Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and To Configure IP
5-6Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and 6. If you
5-7Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Viewing the Cur
5-8Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Configure
5-9Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and In the CLI, you
5-10Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Table 5-1
5-11Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and 1. DHCP/Bootp
ivContentsCLI Control and Editing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-154 Using the Web Browser InterfaceGe
5-12Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Bootp Ope
5-13Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Note The above
5-14Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Globally
5-15Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad
5-16Configuring IP Addressing, Interface Access, and System Information Interface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring
5-17Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad
5-18Configuring IP Addressing, Interface Access, and System Information Interface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring
5-19Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad
5-20Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and System
5-21Configuring IP Addressing, Interface Access, and System InformationSystem InformationConfiguring IP Addressing, Interface Access, and Daylight Tim
vContentsWeb: Configuring IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9How IP Addressing Affects Switch Operation .
5-22Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and CLI: Vi
5-23Configuring IP Addressing, Interface Access, and System InformationSystem InformationConfiguring IP Addressing, Interface Access, and Figure 5-10.
5-24Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and Configu
6-1Optimizing Port Usage Through Traffic Control and 6Optimizing Port Usage Through Traffic Control and Port TrunkingOverviewThis chapter includes: C
6-2Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug
6-3Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra
6-4Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug
6-5Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra
6-6Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug
6-7Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra
Kommentare zu diesen Handbüchern