Smc-networks SMC TigerStack II SMC6624M Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Computerzubehör Smc-networks SMC TigerStack II SMC6624M herunter. SMC Networks SMC TigerStack II SMC6624M User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 364
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
Stackable Fast Ethernet Switch
24 10BASE-T/100BASE-TX RJ-45 ports
Auto MDI/MDI-X support on all ports
Optional 100BASE-FX or 1000BASE-X modules
Optional stack module for linking up to 16 units
8.8 Gbps of aggregate switch bandwidth
LACP and FEC port trunking support
Port mirroring for non-intrusive analysis
Port security
Full support for IEEE 802.1Q VLANs with GVRP
IP Multicasting with IGMP Snooping
Manageable via console, Web, SNMP/RMON
TigerSwitch 10/100
Management Guide
SMC6624M
Seitenansicht 0
1 2 3 4 5 6 ... 363 364

Inhaltsverzeichnis

Seite 1 - TigerSwitch 10/100

Stackable Fast Ethernet Switch◆ 24 10BASE-T/100BASE-TX RJ-45 ports◆ Auto MDI/MDI-X support on all ports◆ Optional 100BASE-FX or 1000BASE-X modules◆

Seite 2

viContentsHow the Switch Lists Trunk Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-27Outbound Traffic Distribution Across Trunked

Seite 3 - Management Guide

6-8Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Seite 4 - Trademarks:

6-9Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Port TrunkingPort Sta

Seite 5

6-10Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Port Connection

Seite 6

6-11Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Fault Tolerance: I

Seite 7

6-12Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Table 6-4. Trun

Seite 8 - Information

6-13Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Table 6-5. General O

Seite 9 - Trunking

6-14Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Spanning Tree P

Seite 10 - Contents

6-15Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Menu: Viewing and Co

Seite 11

6-16Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and switch automati

Seite 12

6-17Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and 8. Connect the trunk

Seite 13

viiContentsWeb: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . 7-34Building IP Masks . . . . . . . . . . . . . . . .

Seite 14 - 11 Troubleshooting

6-18Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and The show trunk

Seite 15 - B MAC Address Management

6-19Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Figure 6-9. Example

Seite 16 - D Daylight Savings Time

6-20Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and You can configu

Seite 17 - Interface

6-21Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Enabling a Dynamic L

Seite 18

6-22Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Removing Ports

Seite 19 - Advantages of Using the CLI

6-23Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Trunk Group Operatio

Seite 20

6-24Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Default Port Op

Seite 21 - Using the Menu Interface

6-25Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and LACP Notes and Restr

Seite 22 - Command Line (CLI) option.)

6-26Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Half-Duplex and

Seite 23

6-27Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Depending on the c

Seite 24

viiiContentsUsing the Menu Interface To View Stack Status And Configure Stacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 25

6-28Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and and sends traff

Seite 26 - Main Menu Features

7-1Using Passwords, Port Security, and Authorized IP 7Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Acces

Seite 27

7-2Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port

Seite 28

7-3Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing Password SecurityUsing Passwords, Port Secur

Seite 29

7-4Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port

Seite 30

7-5Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing Password SecurityUsing Passwords, Port Secur

Seite 31 - Rebooting the Switch

7-6Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port

Seite 32

7-7Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pass

Seite 33 - Menu Features List

7-8Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsing

Seite 34 - Where To Go From Here

7-9Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pass

Seite 35 - Using the CLI

ixContentsEffect of VLANs on Other Switch Features . . . . . . . . . . . . . . . . . . . . . 9-71Spanning Tree Protocol Operation with VLANs . . .

Seite 36 - Privilege Levels at Logon

7-10Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Seite 37 - Privilege Level Operation

7-11Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Seite 38 - Manager Privileges

7-12Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Seite 39 - Interface (CLI)

7-13Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Seite 40 - How To Move Between Levels

7-14Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Seite 41 - ? symbol lists the

7-15Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Seite 42 - Using the CLI

7-16Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Seite 43 - Command Option Displays

7-17Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Seite 44 - Displaying CLI “Help”

7-18Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Seite 45

7-19Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Seite 46 - Configuration Modes

xContentsMenu Access To Status and Counters . . . . . . . . . . . . . . . . . . . . . . . . . 10-3General System Information . . . . . . . . . . .

Seite 47

7-20Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Seite 48

7-21Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Seite 49 - CLI Control and Editing

7-22Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Seite 50

7-23Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Seite 51 - Using the Web Browser

7-24Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Seite 52 - General Features

7-25Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Seite 53

7-26Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Seite 54 - Session with the Switch

7-27Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Seite 55

7-28Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Seite 56 - Interface Session

7-29Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Seite 57

xiContentsUsing the Event Log To Identify Problem Sources . . . . . . . . . . . . . 11-10Menu: Entering and Navigating in the Event Log . . . . . .

Seite 58 - Using the Passwords

7-30Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Seite 59 - If You Lose a Password

7-31Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Seite 60 - Support/Mgmt URL Feature

7-32Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Seite 61 - Status Reporting Features

7-33Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Seite 62 - Port Utilization

7-34Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Seite 63

7-35Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Seite 64

7-36Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Seite 65 - The Alert Log

7-37Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Seite 66 - Alert Types

7-38Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Seite 67 - The Status Bar

8-1Monitoring and Managing the Switch8Configuring for Network Management ApplicationsYou can manage the switch via SNMP from a network management stat

Seite 68

xiiContentsC Switch Memory and ConfigurationOverview of Configuration File Management . . . . . . . . . . . . . . . . . . C-1Using the CLI To Impl

Seite 69 - Interface Access, and

8-2Configuring for Network Management ApplicationsSNMP Management FeaturesMonitoring and Managing the SwitchSNMP Management FeaturesSNMP management fe

Seite 70 - IP Configuration

8-3Configuring for Network Management ApplicationsConfiguring for SNMP Access to the SwitchMonitoring and Managing the SwitchThe switch SNMP agent als

Seite 71 - Just Want a Quick Start?

8-4Configuring for Network Management ApplicationsConfiguring for SNMP Access to the SwitchMonitoring and Managing the SwitchCaution Deleting the comm

Seite 72 - (TTL), and Timep

8-5Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchSNMP Communities SNMP Community FeaturesUse SNMP c

Seite 73

8-6Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchFigure 8-1. The SNMP Communities Screen (Default

Seite 74

8-7Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchCLI: Viewing and Configuring Community NamesCommun

Seite 75

8-8Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchSMC TigerSwitch 10/100# show snmp-server publicCon

Seite 76

8-9Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchTrap Receivers and Authenti

Seite 77

8-10Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchCLI: Configuring and Displ

Seite 78 - DHCP/Bootp Operation

8-11Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchConfiguring Trap Receivers

Seite 79

1-1Selecting a Management Interface1Selecting a Management InterfaceThis chapter describes the following: Management interfaces for the SMC6624M swit

Seite 80

8-12Configuring for Network Management ApplicationsAdvanced Management: RMON SupportMonitoring and Managing the SwitchAdvanced Management: RMON Suppor

Seite 81

9-1Configuring Advanced Features9Configuring Advanced FeaturesThis chapter describes the following features and how to configure them with the switch’

Seite 82

9-2Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesStack ManagementStacking FeaturesStack Management (termed stacking)

Seite 83 - Web, and Inbound Telnet

9-3Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features Simplify management of small workgroups or wiring closets while scaling

Seite 84 - Interface Access

9-4Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesComponents of Stack ManagementTable 9-1. Stacking DefinitionsFigure

Seite 85

9-5Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-2. Example of Stacking with One Commander Controlling Access to

Seite 86 - ■ Critical log events

9-6Configuring Advanced Features Stack ManagementConfiguring Advanced Features There is no limit on the number of stacks in the same IP subnet (b

Seite 87

9-7Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesNote In the default stack configuration, the Candidate Auto Join paramete

Seite 88 - System Information

9-8Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesOverview of Configuring and Bringing Up a StackThis process assumes

Seite 89

9-9Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesTable 9-3. Stacking Configuration GuideThe easiest way to automatically c

Seite 90

1-2Selecting a Management InterfaceAdvantages of Using the Menu InterfaceSelecting a Management InterfaceAdvantages of Using the Menu InterfaceFigure

Seite 91

9-10Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesGeneral Steps for Creating a StackThis section describes the genera

Seite 92

9-11Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. For automatically or manually pulling Candidate switches into a stack

Seite 93 - Control and Port Trunking

9-12Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing the Menu Interface To View Stack Status And Configure Stackin

Seite 94

9-13Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-6. The Default Stack Configuration Screen4. Move the cursor to

Seite 95

9-14Configuring Advanced Features Stack ManagementConfiguring Advanced Features• No (the default) prevents automatic joining of Candidates that ha

Seite 96

9-15Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesTable 9-4.Candidate Configuration Options in the Menu InterfaceUsing the

Seite 97

9-16Configuring Advanced Features Stack ManagementConfiguring Advanced Features4. Do one of the following:• To disable stacking on the Candidate,

Seite 98

9-17Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the Commander’s Menu To Manually Add a Candidate to a Stack. In t

Seite 99

9-18Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-10. Example of Candidate List in Stack Management Screen3

Seite 100 - Parameters

9-19Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-11. Example of Stack Management Screen After New Member AddedU

Seite 101 - Port Trunking

1-3Selecting a Management InterfaceAdvantages of Using the CLISelecting a Management InterfaceAdvantages of Using the CLIFigure 1-2. Example of The Co

Seite 102

9-20Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-12. Example of How the Stacking Status (All) Screen Helps

Seite 103 - Trunk Configuration Methods

9-21Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features8. Do one of the following:• If the stack containing the Member you are

Seite 104 - Through Traffic Control and

9-22Configuring Advanced Features Stack ManagementConfiguring Advanced Features4. Stack ManagementYou will then see the Stack Management screen:Fi

Seite 105

9-23Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the Commander To Access Member Switches for Configuration Changes

Seite 106

9-24Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-17. The eXecute Command Displays the Console Main Menu fo

Seite 107

9-25Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. Press [B] (for Back) to return to the Stacking Menu.4. To display Sta

Seite 108

9-26Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing Any Stacked Switch To View the Status for All Switches with S

Seite 109 - Trunk Group

9-27Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-19. Example of the Commander’s Stacking Status ScreenViewing M

Seite 110

9-28Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-20. Example of a Member’s Stacking Status ScreenViewing C

Seite 111

9-29Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To View Stack Status and Configure StackingThe CLI enables

Seite 113

1-4Selecting a Management InterfaceAdvantages of Using the Web Browser InterfaceSelecting a Management InterfaceAdvantages of Using the Web Browser In

Seite 114

9-30Configuring Advanced Features Stack ManagementConfiguring Advanced Features[no] stack member <switch-num> mac-address <mac-addr> [

Seite 115

9-31Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To View Stack StatusYou can list the stack status for an i

Seite 116 - Default Port Operation

9-32Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesViewing the Status of all Stack-Enabled Switches Discovered in the

Seite 117 - LACP Notes and Restrictions

9-33Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To Configure a Commander SwitchYou can configure any stack

Seite 118 - technol

9-34Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-26. Example of the Commander’s Show Stack Screen with Onl

Seite 119

9-35Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-27. Example of Using a Member’s CLI To Convert the Member to t

Seite 120

9-36Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing the Commander’s CLI To Manually Add a Candidate to the Stack.

Seite 121 - Security, and Authorized IP

9-37Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFor example, if the switch named “DEFAULT_CONFIG” in the above listing d

Seite 122 - Using Password Security

9-38Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing a Candidate CLI To Manually “Push” the Candidate Into a Stack

Seite 123

9-39Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesSyntax: stack member <switch-number> mac-address <mac-add

Seite 124

2-1Using the Menu Interface2Using the Menu InterfaceThis chapter describes the following features: Overview of the Menu Interface (page 4-1) Startin

Seite 125

9-40Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesSyntax: no stack name <stack name> stack join <mac-add

Seite 126 - Security tab

9-41Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesSyntax: [no] stack member <switch-num> mac-address <mac-addr&

Seite 127 - Security

9-42Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-35. Example of How To Identify the Commander’s MAC Addres

Seite 128 - Blocking Unauthorized Traffic

9-43Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-36. Example of a Stack Showing Switch Number (SN) AssignmentsT

Seite 129 - Planning Port Security

9-44Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesSNMP Community Operation in a StackCommunity MembershipIn the defau

Seite 130

9-45Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesNote that in the above example (figure 9-37) you cannot use the public c

Seite 131

9-46Configuring Advanced Features Stack ManagementConfiguring Advanced Features Stacking uses only the primary VLAN on each switch in a stack. T

Seite 132

9-47Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. Click on [Apply Changes] to save any configuration changes for the i

Seite 133

9-48Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs) VLAN F

Seite 134

9-49Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced Featuressaved by not allowing packets to flood out all por

Seite 135

2-2Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceMenu Interaction with Other Interfaces. A configuration change

Seite 136

9-50Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-40. Example of Overlapping VLANs Us

Seite 137

9-51Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-42. Example of Tagged and Untagged VLAN

Seite 138

9-52Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesDHCP or Bootp on different VLANs do not resul

Seite 139

9-53Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-43. Comparing Per-Port VLAN Options With

Seite 140 - Notice of Security Violations

9-54Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesGeneral Steps for Using VLANs1. Plan your VLA

Seite 141

9-55Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesMenu: Configuring VLAN ParametersIn the factory de

Seite 142 - Resetting Alert Flags

9-56Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced Features To select another primary VLAN, select the

Seite 143

9-57Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesAdding or Editing VLAN NamesUse this procedure to

Seite 144

9-58Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-47. Example of VLAN Names Screen wi

Seite 145

9-59Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-48. Example of VLAN Port Assignment Scre

Seite 146

2-3Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceHow To Start a Menu Interface SessionIn its factory default confi

Seite 147

9-60Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-49. Example of VLAN Assignments for

Seite 148 - Using IP Authorized Managers

9-61Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN Commands Used in this SectionDisplaying the S

Seite 149 - Access Levels

9-62Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesDisplaying the Configuration for a Particular

Seite 150 - Overview of IP Mask Operation

9-63Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesChanging the Number of VLANs Allowed on the Switch

Seite 151 - Managers

9-64Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesCreating a New Static VLANChanging the VLAN C

Seite 152

9-65Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesConverting a Dynamic VLAN to a Static VLAN. If GV

Seite 153

9-66Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced Featuresoperation. Note that Auto is the defaultper-p

Seite 154 - Building IP Masks

9-67Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesTo configure static VLAN port parameters, you will

Seite 155

9-68Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-54. Example of Tagged and Untagged

Seite 156

9-69Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesNote Each 802.1Q-compliant VLAN must have its own

Seite 157

2-4Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceFigure 2-1. The Main Menu with Manager PrivilegesFor a descriptio

Seite 158

9-70Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-56. Example of Networked 802.1Q-Com

Seite 159 - Applications

9-71Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesTo summarize:Effect of VLANs on Other Switch Featu

Seite 160 - SNMP Management Features

9-72Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN MAC AddressesThe switch has one unique M

Seite 161 - Monitoring and Managing

9-73Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN Restrictions A port must be a member of at l

Seite 162

9-74Configuring Advanced Features GVRPConfiguring Advanced FeaturesGVRPGVRP—GARP VLAN Registration Protocol—is an application of the Generic Attri

Seite 163 - SNMP Communities

9-75Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesNote There must be one common VLAN (that is, one common VID) connecting all of the G

Seite 164

9-76Configuring Advanced Features GVRPConfiguring Advanced FeaturesNote that if a static VLAN is configured on at least one port of a switch, and

Seite 165

9-77Configuring Advanced FeaturesGVRPConfiguring Advanced Features If the switch already has a static VLAN assignment with the same VID as in the adv

Seite 166

9-78Configuring Advanced Features GVRPConfiguring Advanced FeaturesTable 9-8. Options for Handling “Unknown VLAN” Advertisements:The CLI show gvrp

Seite 167

9-79Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesPer-Port Options for Dynamic VLAN Advertising and JoiningInitiating Advertisements.

Seite 168

2-5Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceFigure 2-2. An Asterisk Indicates a Configuration Change Requirin

Seite 169 - Configuring Trap Receivers

9-80Configuring Advanced Features GVRPConfiguring Advanced FeaturesAs the above table indicates, when you enable GVRP, a port that has a Tagged or

Seite 170

9-81Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesPlanning for GVRP OperationThese steps outline the procedure for setting up dynamic

Seite 171 - Configuring Advanced Features

9-82Configuring Advanced Features GVRPConfiguring Advanced Features2. Switch Configuration . . .8. VLAN Menu . . . 1. VLAN SupportFigure 9-60. Th

Seite 172 - Stack Management

9-83Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesCLI: Viewing and Configuring GVRPGVRP Commands Used in This SectionDisplaying the Sw

Seite 173 - Features

9-84Configuring Advanced Features GVRPConfiguring Advanced FeaturesEnabling and Disabling GVRP on the Switch. This command enables GVRP on the sw

Seite 174 - General Stacking Operation

9-85Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesDisplaying the Static and Dynamic VLANs Active on the Switch. The show vlans comman

Seite 175 - Operating Rules for Stacking

9-86Configuring Advanced Features GVRPConfiguring Advanced FeaturesConverting a Dynamic VLAN to a Static VLAN. If a port on the switch has joined

Seite 176 - Specific Rules

9-87Configuring Advanced FeaturesGVRPConfiguring Advanced Features By receiving advertisements from other devices running GVRP, the switch learns of

Seite 177

9-88Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesMultimedia Traffic Control with

Seite 178

9-89Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesEnabling IGMP allows the ports to det

Seite 179

2-6Using the Menu InterfaceMain Menu FeaturesUsing the Menu InterfaceMain Menu Features Figure 2-3. The Main Menu View with Manager PrivilegesThe Main

Seite 180

9-90Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Features• Blocked: Causes the switch to

Seite 181

9-91Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesViewing the Current IGMP Configuratio

Seite 182 - Configure Stacking

9-92Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesFigure 9-66. Example Listing of

Seite 183

9-93Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesConfiguring Per-Port IGMP Packet Cont

Seite 184

9-94Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesSMC TigerSwitch 10/100(vlan 1)#

Seite 185

9-95Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Featuresto or from the same source(s) is term

Seite 186 - – To change

9-96Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Features Switch 2 is recognizing IGMP t

Seite 187

9-97Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesFigure 9-68. Isolating IP Multicast

Seite 188 - Save) to

9-98Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesNote: IP Multicast Filters. IP

Seite 189

9-99Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesSpanning Tree Protocol (STP)STP FeaturesThe switch uses the

Seite 190 - 4. Stack Management

2-7Using the Menu InterfaceMain Menu FeaturesUsing the Menu Interface Command Line (CLI): Selects the Command Line Interface at the same level (Manag

Seite 191

9-100Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesSTP Fast Mode for Overcoming Server Access Failures.

Seite 192

9-101Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced Features)Figure 9-69. Example of the STP Configuration Screen4. If

Seite 193

9-102Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesCLI: Configuring STPSTP Commands Used in This SectionV

Seite 194

9-103Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesEnabling or Disabling STP. Enabling STP implements the spa

Seite 195 - Monitoring Stack Status

9-104Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesYou can also include one or more of the STP per-port p

Seite 196 - For status descriptions

9-105Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesFor example, the following enables STP (if it is not alread

Seite 197

9-106Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesFigure 9-71. Example of Redundant Paths Between Two N

Seite 198 - 9. Stacking

9-107Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesCaution The Fast Mode configuration should be used only on

Seite 199 - Stacking

9-108Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesFigure 9-72. Example of Using a Trunked Link with STP

Seite 200

10-1Monitoring and Analyzing Switch Operation10Monitoring and Analyzing Switch OperationThe SMC6624M switch has several built-in tools for monitoring,

Seite 201

2-8Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceScreen Structure and NavigationMenu interface screens include these

Seite 202

10-2Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationStatus and Counters DataThis section des

Seite 203

10-3Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access To Status and Counters Begin

Seite 204

10-4Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationGeneral System InformationMenu AccessFro

Seite 205

10-5Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationSwitch Management Address InformationMen

Seite 206 - listing

10-6Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationPort StatusThe web browser interface and

Seite 207

10-7Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationViewing Port and Trunk Group StatisticsT

Seite 208 - Stack Commander

10-8Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access to Port and Trunk Statistics

Seite 209

10-9Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationCLI Access To Port and Trunk Group Stati

Seite 210 - Auto Join parameter

10-10Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationViewing the Switch’s MAC Address Tables

Seite 211

10-11Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access to the MAC Address Views an

Seite 212 - 1 - 15)

2-9Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceTable 4-1. How To Navigate in the Menu Interface Task: Actions:Execu

Seite 213

10-12Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch Operation2. Type the MAC address you want to loc

Seite 214

10-13Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationEnter MAC address: _2. Type the MAC add

Seite 215 - Transmission Interval

10-14Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationSpanning Tree Protocol (STP) Informatio

Seite 216

10-15Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationFigure 10-11.Example of STP Port Inform

Seite 217 - Status Messages

10-16Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationInternet Group Management Protocol (IGM

Seite 218

10-17Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationVLAN InformationThe switch uses the CLI

Seite 219

10-18Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationListing the VLAN ID (VID) and Status fo

Seite 220 - SMC6624M

10-19Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationWeb Browser Interface Status Informatio

Seite 221 - Overview of Using VLANs

10-20Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationPort Monitoring Features Port Monitorin

Seite 222

10-21Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationMenu: Configuring Port MonitoringThis p

Seite 223

6 HughesIrvine, CA 92618Phone: (949) 707-2400TigerSwitch 10/100Management GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsJuly 2001P

Seite 224 - Notes on Using VLANs

2-10Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceTo get Help on individual parameter descriptions. In most screens

Seite 225

10-22Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-17. How To Select a Monitorin

Seite 226 - VLANs setting

10-23Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch Operationiv. Press [Enter], then press [S] (for

Seite 227 - Adding or Editing VLAN Names

10-24Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-19.Example of Monitored Port

Seite 228 - VLAN and ID

10-25Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-21.Examples of Removing Ports

Seite 229

10-26Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch Operation

Seite 230

11-1Troubleshooting11TroubleshootingThis chapter addresses performance-related network problems that can be caused by topology, switch configuration,

Seite 231

11-2TroubleshootingTroubleshooting ApproachesTroubleshootingTroubleshooting ApproachesUse these approaches to diagnose switch problems: Check the swi

Seite 232

11-3TroubleshootingBrowser or Console Access ProblemsTroubleshootingBrowser or Console Access ProblemsCannot access the web browser interface: Acces

Seite 233

11-4TroubleshootingBrowser or Console Access ProblemsTroubleshootingCannot Telnet into the switch console from a station on the network: Telnet acce

Seite 234 - Showing the result

11-5TroubleshootingUnusual Network ActivityTroubleshootingUnusual Network ActivityNetwork activity that exceeds accepted norms may indicate a hardware

Seite 235

2-11Using the Menu InterfaceRebooting the SwitchUsing the Menu InterfaceRebooting the SwitchRebooting the switch from the menu interface Terminates a

Seite 236 - ■ Select a new Primary VLAN

11-6TroubleshootingUnusual Network ActivityTroubleshootingIP addresses that will expire after a limited duration. One solution is to configure “reserv

Seite 237 - VLAN Tagging Information

11-7TroubleshootingUnusual Network ActivityTroubleshootingProblems Related to Spanning-Tree Protocol (STP)Caution If you enable STP, it is recommended

Seite 238 - ■ In switch Y:

11-8TroubleshootingUnusual Network ActivityTroubleshootingVLAN-Related ProblemsMonitor Port. When using the monitor port in a multiple VLAN environ-m

Seite 239

11-9TroubleshootingUnusual Network ActivityTroubleshooting1. If VLAN_1 (VID=1) is configured as “Untagged” on port 3 on switch “X”, then it must also

Seite 240

11-10TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingUsing the Event Log To Identify Problem SourcesThe Event Log records

Seite 241 - IP Interfaces

11-11TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingTable 11-1. Event Log System ModulesMenu: Entering and Navigating in

Seite 242 - Port Monitoring

11-12TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingThe log status line at the bottom of the display identifies where in

Seite 243 - VLAN Restrictions

11-13TroubleshootingDiagnostic ToolsTroubleshootingDiagnostic ToolsDiagnostic FeaturesPing and Link TestsThe Ping test and the Link test are point-to-

Seite 244

11-14TroubleshootingDiagnostic ToolsTroubleshootingWeb: Executing Ping or Link TestsFigure 11-12.Link and Ping Test Screen on the Web Browser Interfac

Seite 245 - General Operation

11-15TroubleshootingDiagnostic ToolsTroubleshootingNumber of Packets to Send is the number of times you want the switch to attempt to test a connectio

Seite 246

2-12Using the Menu InterfaceRebooting the SwitchUsing the Menu InterfaceRebooting To Activate Configuration Changes. Configuration changes for most p

Seite 247

11-16TroubleshootingDiagnostic ToolsTroubleshootingLink Tests. You can issue single or multiple link tests with varying repititions and timeout perio

Seite 248 - Default:

11-17TroubleshootingDiagnostic ToolsTroubleshootingDisplaying the Configuration FileThe complete switch configuration is contained in a file that you

Seite 249

11-18TroubleshootingDiagnostic ToolsTroubleshootingCLI Administrative and Troubleshooting CommandsThese commands provide information or perform action

Seite 250 - GVRP and VLAN Access Control

11-19TroubleshootingRestoring the Factory-Default ConfigurationTroubleshootingRestoring the Factory-Default ConfigurationAs part of your troubleshooti

Seite 251 - Configuring GVRP On a Switch

11-20TroubleshootingRestoring the Factory-Default ConfigurationTroubleshooting

Seite 252

A-1Transferring an Operating System or Startup ATransferring an Operating System or Startup Configuration FileYou can download new switch software (op

Seite 253

A-2Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Using

Seite 254

A-3Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Menu:

Seite 255

A-4Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup A “pr

Seite 256 - GVRP Operating Notes

A-5Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup 2. En

Seite 257

2-13Using the Menu InterfaceMenu Features ListUsing the Menu InterfaceMenu Features ListStatus and Counters• General System Information• Switch Manage

Seite 258 - Multicast (IGMP)

A-6Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Using

Seite 259

A-7Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup For e

Seite 260

A-8Transferring an Operating System or Startup Configuration FileTroubleshooting TFTP DownloadsTransferring an Operating System or Startup Troubleshoo

Seite 261

A-9Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup Anoth

Seite 262

A-10Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup TFTP:

Seite 263

A-11Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup Xmodem

Seite 264 - How IGMP Operates

A-12Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup

Seite 265 - Role of the Switch

B-1MAC Address ManagementBMAC Address ManagementThe switch assigns MAC addresses in these areas: For management functions:• One Base MAC address assi

Seite 266

B-2MAC Address ManagementDetermining MAC AddressesMAC Address ManagementMenu: Viewing the Switch’s MAC AddressesThe Management Address Information scr

Seite 267

B-3MAC Address ManagementDetermining MAC AddressesMAC Address ManagementCLI: Viewing the Port and VLAN MAC Addresses The MAC address assigned to each

Seite 268

2-14Using the Menu InterfaceWhere To Go From HereUsing the Menu InterfaceWhere To Go From HereThis chapter provides an overview of the menu interface

Seite 269 - Spanning Tree Protocol (STP)

B-4MAC Address ManagementDetermining MAC AddressesMAC Address Management

Seite 270 - Menu: Configuring STP

C-1Switch Memory and ConfigurationCSwitch Memory and ConfigurationThis appendix describes the following: How switch memory manages configuration chan

Seite 271

C-2Switch Memory and ConfigurationOverview of Configuration File ManagementSwitch Memory and Configuration Startup-config File: Exists in flash (non-

Seite 272 - CLI: Configuring STP

C-3Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and ConfigurationThe above command disables port 5 in

Seite 273

C-4Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and Configuration2. Use the appropriate show commands

Seite 274

C-5Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and ConfigurationIf you use the CLI to change a parame

Seite 275 - How STP Operates

C-6Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and ConfigurationHow To Re

Seite 276 - STP Fast Mode

C-7Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and ConfigurationNote The

Seite 277

C-8Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configurationface, the

Seite 278

C-9Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configuration(To acces

Seite 279 - Switch Operation

3-1Using the Command Line Interface (CLI)3Using the Command Line Interface (CLI)The CLI is a text-based command interface for configuring and monitori

Seite 280 - Status and Counters Data

C-10Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configuration

Seite 281

D-1Daylight Savings TimeDDaylight Savings TimeThe SMC6624M switch provides a way to automatically adjust the system clock for Daylight Savings Time (D

Seite 282 - General System Information

D-2Daylight Savings TimeDaylight Savings TimeFigure D-1. Menu Interface with “User-Defined” Daylight Time Rule OptionBefore configuring a “User define

Seite 283 - CLI Access

Index – 1IndexNumerics802.1Q VLAN standard … 9-99802.3u auto negotiation standard … 6-2Aaccessmanager … 8-5operator … 8-5access levels, authorized IP

Seite 284 - Port Status

2 – IndexIndexquick … 2-7restoring factory defaults … 11-19saving from menu interface … 2-9serial link … 5-15SNMP … 8-3, 8-5spanning tree … 9-99spanni

Seite 285

Index – 3IndexGGARPSee GVRPgateway … 5-2, 5-4gateway (IP) address … 5-3, 5-5GVRPadvertisement … 9-75, 9-87advertisement, defined … 9-74advertisement,

Seite 286

4 – IndexIndexconfiguration … 5-2DHCP/Bootp … 5-2duplicate address … 11-5duplicate address, DHCP network … 11-5effect when address not used … 5-9gatew

Seite 287

Index – 5Indexmulticast groupSee IGMPmultimediaSee IGMPmultiple VLAN … 8-1multi-port bridge … 5-1Nnavigation, console interface … 2-8 –2-9navigation,

Seite 288

6 – IndexIndexoperating notes … 7-26overview … 7-7port trunk restriction … 6-10prior to … 7-27proxy web server … 7-27trunk restriction … 6-14port trun

Seite 289

Index – 7Indexauthorized IP managers … 7-28per port … 7-7security violationsnotices of … 7-20Self Test LEDbehavior during factory default reset … 11-1

Seite 290

3-2Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)When you use the CLI to make a configuration change, the s

Seite 291

8 – IndexIndextraffic analysis … 8-1traffic monitoring … 8-1, 8-4traffic, monitoring … 10-20traffic, port … 10-7transceiver, fiber-optic … 6-3transcei

Seite 292 - Menu Access to STP Data

Index – 9Indexprimary, CLI command … 9-61, 9-63primary, select in menu … 9-56primary, web configure … 9-66primary, with DHCP … 9-54reboot required … 2

Seite 295 - VLAN Information

6 HughesIrvine, CA 92618Phone: (949) 707-2400FOR TECHNICAL SUPPORT, CALL:From U.S.A. and Canada (24 hours, 7 days a week)(800) SMC-4-YOU; (949) 707-24

Seite 296

3-3Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Caution SMC strongly recommends that you configure a Manag

Seite 297

3-4Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Manager Privileges Manager privileges give you three addit

Seite 298 - Port Monitoring Features

3-5Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI) SMC TigerSwitch 10/100(vlan-10)#Changing Interfa

Seite 299

Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, n

Seite 300

3-6Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)How To Move Between LevelsMoving Between the CLI and the M

Seite 301

3-7Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)For example, if you use the CLI to set a Manager password,

Seite 302

3-8Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Typing ? at the Manager level produces this listing:Figure

Seite 303

3-9Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)As mentioned above, if you type part of a command word and

Seite 304

3-10Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Thus, if you wanted to create a port trunk group using po

Seite 305 - Troubleshooting

3-11Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-7. Example of Context-Sensitive Command-List Hel

Seite 306 - Troubleshooting Approaches

3-12Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-9. Example of Help for a Specific Instance of a

Seite 307

3-13Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-10. Context-Specific Commands Affecting Port Con

Seite 308

3-14Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)VLAN Context. Includes VLAN-specific commands that apply

Seite 309 - Unusual Network Activity

3-15Using the Command Line Interface (CLI)CLI Control and EditingUsing the Command Line Interface (CLI)CLI Control and EditingKeystrokes Function[Ctrl

Seite 310 - IGMP-Related Problems

iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Seite 311 - Timep or Gateway Problems

3-16Using the Command Line Interface (CLI)CLI Control and EditingUsing the Command Line Interface (CLI)

Seite 312 - VLAN-Related Problems

4-1Using the Web Browser Interface4Using the Web Browser InterfaceThe web browser interface built into the switch lets you easily access the switch fr

Seite 313

4-2Using the Web Browser InterfaceGeneral FeaturesUsing the Web Browser InterfaceGeneral FeaturesThe SMC6624M switch includes these web browser interf

Seite 314

4-3Using the Web Browser InterfaceWeb Browser Interface RequirementsUsing the Web Browser Interface Web Browser Interface RequirementsYou can use equi

Seite 315

4-4Using the Web Browser InterfaceStarting a Web Browser Interface Session with the SwitchUsing the Web Browser InterfaceStarting a Web Browser Interf

Seite 316 - ■ All events recorded

4-5Using the Web Browser InterfaceStarting a Web Browser Interface Session with the SwitchUsing the Web Browser InterfaceFigure 4-1. Example of Status

Seite 317 - Diagnostic Tools

4-6Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceTasks for Your First Web Browser In

Seite 318

4-7Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceThis window is the launching point

Seite 319 - CLI: Ping or Link Tests

4-8Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceTo set the passwords:1. Access the

Seite 320

4-9Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser Interface Entering the operator password gi

Seite 321

LIMITED WARRANTYiiMAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF SMC OR ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF

Seite 322

4-10Using the Web Browser InterfaceSupport/Mgmt URL FeatureUsing the Web Browser InterfaceSupport/Mgmt URL FeatureThe Support/Mgmt URL window enables

Seite 323 - Configuration

4-11Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceStatus Reporting FeaturesBrowser elements covered in this s

Seite 324

4-12Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceThe Port Utilization and Status DisplaysThe Port Utilizatio

Seite 325

4-13Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser Interface Maximum Activity Indicator: As the bars in the graph area

Seite 326

4-14Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfacePort StatusFigure 4-10. The Port Status Indicators and Lege

Seite 327 - System or Startup

4-15Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceThe Alert LogThe web browser interface Alert Log, shown in

Seite 328 - Switch-to-Switch Download

4-16Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceAlert TypesThe following table lists the types of alerts th

Seite 329

4-17Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceNote When troubleshooting the sources of alerts, it may be

Seite 330 - Menu: Xmodem Download

4-18Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceTable 4-3. Status Indicator Key System Name. The name you

Seite 331

5-1Configuring IP Addressing, Interface Access, and 5Configuring IP Addressing, Interface Access, and System InformationThis chapter describes the swi

Seite 332 - Message Indicating

iiiContentsContents1 Selecting a Management InterfaceUnderstanding Management Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Advant

Seite 333

5-2Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and IP Configu

Seite 334

5-3Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Timep Operation

Seite 335

5-4Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and The IP a

Seite 336

5-5Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and To Configure IP

Seite 337 - MAC Address Management

5-6Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and 6. If you

Seite 338 - Determining MAC Addresses

5-7Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Viewing the Cur

Seite 339

5-8Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Configure

Seite 340

5-9Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and In the CLI, you

Seite 341 - Management

5-10Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Table 5-1

Seite 342

5-11Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and 1. DHCP/Bootp

Seite 343 - Configuration Changes

ivContentsCLI Control and Editing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-154 Using the Web Browser InterfaceGe

Seite 344

5-12Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Bootp Ope

Seite 345 - Switch Memory and

5-13Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Note The above

Seite 346

5-14Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Globally

Seite 347

5-15Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad

Seite 348 - VLANs to support

5-16Configuring IP Addressing, Interface Access, and System Information Interface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring

Seite 349

5-17Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad

Seite 350

5-18Configuring IP Addressing, Interface Access, and System Information Interface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring

Seite 351 - Daylight Savings Time

5-19Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad

Seite 352

5-20Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and System

Seite 353 - Numerics

5-21Configuring IP Addressing, Interface Access, and System InformationSystem InformationConfiguring IP Addressing, Interface Access, and Daylight Tim

Seite 354 - 2 – Index

vContentsWeb: Configuring IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9How IP Addressing Affects Switch Operation .

Seite 355 - Index – 3

5-22Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and CLI: Vi

Seite 356 - 4 – Index

5-23Configuring IP Addressing, Interface Access, and System InformationSystem InformationConfiguring IP Addressing, Interface Access, and Figure 5-10.

Seite 357 - Index – 5

5-24Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and Configu

Seite 358 - 6 – Index

6-1Optimizing Port Usage Through Traffic Control and 6Optimizing Port Usage Through Traffic Control and Port TrunkingOverviewThis chapter includes: C

Seite 359 - Index – 7

6-2Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Seite 360 - 8 – Index

6-3Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra

Seite 361 - Index – 9

6-4Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Seite 362 - 10 – Index

6-5Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra

Seite 363

6-6Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Seite 364

6-7Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra

Kommentare zu diesen Handbüchern

Keine Kommentare