Edge-Core ECS4610-26T Instalační příručka

Procházejte online nebo si stáhněte Instalační příručka pro Síťové přepínače Edge-Core ECS4610-26T. SMC ECS4610-26T network switch Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 142
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Gigabit Smart Switch

Management Guidewww.edge-core.comECS4310-26T26-PortGigabit Smart Switch

Strany 2

CONTENTS– 10 –802.1X Global Settings 110802.1X Port Settings 11121 GENERAL SECURITY SETTINGS 113IP Filter Security 113Storm Control Setting 114P

Strany 3 - ANAGEMENT

CHAPTER 16 | Bandwidth Control– 100 –Figure 34: Bandwidth Control

Strany 4

– 101 –17 JUMBO FRAMEThe switch provides more efficient throughput for large sequential data transfers by supporting jumbo frames up to 9216 bytes.

Strany 5 - ABOUT THIS GUIDE

CHAPTER 17 | Jumbo Frame– 102 –

Strany 6

– 103 –18 MANAGEMENT ACCESS FILTERYou can create a list of up to eight IP addresses or IP address groups that are allowed management access to the s

Strany 7 - CONTENTS

CHAPTER 18 | Management Access Filter– 104 –Figure 36: Management Access Filter

Strany 8

– 105 –19 MAC ADDRESS SECURITYThis chapter includes the following sections for configuring MAC address security:◆ “MAC Forwarding Table” on page 105

Strany 9

CHAPTER 19 | MAC Address SecurityStatic MAC Addresses– 106 –WEB INTERFACETo display the MAC address forwarding table, click Security, MAC Address,

Strany 10 - SECTION III APPENDICES 125

CHAPTER 19 | MAC Address SecurityMAC Address Filtering– 107 –Figure 38: Static MAC SettingMAC ADDRESS FILTERINGThe MAC Filtering pages are used t

Strany 11 - – 11 –

CHAPTER 19 | MAC Address SecurityMAC Address Filtering– 108 –WEB INTERFACETo configure MAC Address Filtering:1. Click Security, MAC Address, MAC A

Strany 12 - – 12 –

– 109 –20 802.1X SECURITYThis chapter includes the following sections for configuring 802.1X security:◆ “Configuring 802.1X Authentication” on page

Strany 13 - – 13 –

– 11 –FIGURESFigure 1: Login Page 24Figure 2: Web Interface Home Page 24Figure 3: IP Settings Page 25Figure 4: User Accounts Page 26Figure 5: Home P

Strany 14 - – 14 –

CHAPTER 20 | 802.1X Security802.1X Global Settings– 110 –◆ RADIUS authentication must be enabled on the switch and the IP address of the RADIUS se

Strany 15 - GETTING STARTED

CHAPTER 20 | 802.1X Security802.1X Port Settings– 111 –WEB INTERFACETo configure 802.1X global settings:1. Click Security, 802.1X, 802.1X Setting.

Strany 16 -

CHAPTER 20 | 802.1X Security802.1X Port Settings– 112 – Force-Authorized – Forces the port to grant access to all clients, either dot1x-aware or o

Strany 17 - 1 INTRODUCTION

– 113 –21 GENERAL SECURITY SETTINGSThis chapter includes the following sections for other general security settings:◆ “IP Filter Security” on page 1

Strany 18 -

CHAPTER 21 | General Security SettingsStorm Control Setting– 114 –WEB INTERFACETo configure IP Filter settings:1. Click Security, IP Filter Settin

Strany 19

CHAPTER 21 | General Security SettingsStorm Control Setting– 115 –You can also protect your network from excess multicast or unknown multicast/uni

Strany 20

CHAPTER 21 | General Security SettingsPort Isolation– 116 –PORT ISOLATIONPort Isolation provides port-based security and isolation of local ports.

Strany 21 - Table 2: System Defaults

CHAPTER 21 | General Security SettingsDefence Engine– 117 –DEFENCE ENGINEDefence Engine is a advanced feature that can prevent switch’s CPU from b

Strany 22

CHAPTER 21 | General Security SettingsDefence Engine– 118 –

Strany 23 - INITIAL SWITCH CONFIGURATION

– 119 –22 PORT STATISTICSYou can display standard statistics on network traffic passing through each port. This information can be used to identify

Strany 24 - Figure 1: Login Page

FIGURES– 12 –Figure 32: Port Mirroring 96Figure 33: Port Security 98Figure 34: Bandwidth Control 100Figure 35: Jumbo Frame Setting 101Figure 36: Man

Strany 25 - Figure 3: IP Settings Page

CHAPTER 22 | Port Statistics– 120 –WEB INTERFACETo display port statistics, click Monitoring, Port Statistics.Figure 46: Port Statistics

Strany 26 - Figure 4: User Accounts Page

– 121 –23 MANAGEMENT TOOLSThis chapter includes the following sections for management tools:◆ “HTTP Upgrade” on page 121◆ “Restoring Factory Default

Strany 27 - Changing a PC’s IP Address

CHAPTER 23 | Management ToolsRestoring Factory Defaults– 122 –CAUTION: Do not reset or power off the switch during the upgrade process or the swit

Strany 28

CHAPTER 23 | Management ToolsResetting the Switch– 123 –RESETTING THE SWITCHUse the Reboot page to restart the switch.WEB INTERFACETo restart the

Strany 29 - WEB CONFIGURATION

CHAPTER 23 | Management ToolsResetting the Switch– 124 –

Strany 30 -

– 125 –SECTION IIIAPPENDICESThis section provides additional information and includes these items:◆ "Software Specifications" on page 127◆

Strany 31 - 3 USING THE WEB INTERFACE

SECTION | Appendices– 126 –

Strany 32 - Figure 5: Home Page

– 127 –A SOFTWARE SPECIFICATIONSSOFTWARE FEATURESAUTHENTICATION Local, RADIUS, Port (802.1X), HTTPS, Port Security, IP FilterPORT CONFIGURATION 100

Strany 33 - Table 4: Main Menu

APPENDIX A | Software SpecificationsManagement Features– 128 –MULTICAST FILTERING IGMP SnoopingADDITIONAL FEATURES DHCP ClientLLDP (Link Layer Dis

Strany 34

APPENDIX A | Software SpecificationsManagement Information Bases– 129 –MANAGEMENT INFORMATION BASESBridge MIB (RFC 1493)Differentiated Services MI

Strany 35

– 13 –TABLESTable 1: Key Features 17Table 2: System Defaults 21Table 3: Web Page Configuration Buttons 32Table 4: Main Menu 33Table 5: Recommend

Strany 36

APPENDIX A | Software SpecificationsManagement Information Bases– 130 –

Strany 37 - 4 SYSTEM SETTINGS

– 131 –B TROUBLESHOOTINGPROBLEMS ACCESSING THE MANAGEMENT INTERFACE Table 11: Troubleshooting ChartSymptom ActionCannot connect using a web browser

Strany 38 - Figure 7: System Information

APPENDIX B | TroubleshootingProblems Accessing the Management Interface– 132 –

Strany 39 - Figure 8: System Password

– 133 –GLOSSARYACL Access Control List. ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for c

Strany 40 - Setting an IP Address

GLOSSARY – 134 –DSCP Differentiated Services Code Point Service. DSCP uses a six-bit tag to provide for up to 64 different forwarding behaviors. Bas

Strany 41

GLOSSARY– 135 –IEEE 802.1Q VLAN Tagging—Defines Ethernet frame tags which carry VLAN information. It allows switches to assign endstations to differ

Strany 42

GLOSSARY – 136 –IP MULTICAST FILTERING A process whereby this switch can pass multicast traffic along to participating hosts.IP PRECEDENCE The Type

Strany 43

GLOSSARY– 137 –NTP Network Time Protocol provides the mechanisms to synchronize time across the network. The time servers operate in a hierarchical-

Strany 44

GLOSSARY – 138 –SSH Secure Shell is a secure replacement for remote access functions, including Telnet. SSH can authenticate users with a cryptograp

Strany 45 - 5 PORT SETTINGS

– 139 –INDEXNUMERICS802.1Q tunnelmode selection 63802.1Xport authentication 109BBPDU 72Ccommunity string 92Ddefault settings, system 21Eed

Strany 46 -

TABLES– 14 –

Strany 47

INDEX– 140 –STAedge port 75, 76global settings, displaying 72interface settings 75link type 76path cost 71, 73, 75port priority 76standa

Strany 49 - 6 LINK AGGREGATION

ECS4310-26TE072010-CS-R01149100000083A

Strany 50 - Creating Trunk Groups

– 15 –SECTION IGETTING STARTEDThis section provides an overview of the switch, and introduces some basic concepts about network switches. It also de

Strany 51

SECTION | Getting Started– 16 –

Strany 52 - CONFIGURING TRUNK SETTINGS

– 17 –1 INTRODUCTIONThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to configur

Strany 53 - Configuring Trunk Settings

CHAPTER 1 | IntroductionDescription of Software Features– 18 –DESCRIPTION OF SOFTWARE FEATURESThe switch provides a wide range of advanced perform

Strany 54 - Configuring LACP

CHAPTER 1 | IntroductionDescription of Software Features– 19 –PORT TRUNKING Ports can be combined into an aggregate connection. Trunks can be manu

Strany 56

CHAPTER 1 | IntroductionDescription of Software Features– 20 –◆ Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) – This protocol reduces the conve

Strany 57 - 7 CREATING VLANS

CHAPTER 1 | IntroductionSystem Defaults– 21 –SYSTEM DEFAULTSThe following table lists some of the basic system defaults.Table 2: System Defaults F

Strany 58 - Assigning Ports to VLANs

CHAPTER 1 | IntroductionSystem Defaults– 22 –

Strany 59

– 23 –2 INITIAL SWITCH CONFIGURATIONThis chapter includes information on connecting to the switch and basic configuration procedures.The switch incl

Strany 60

CHAPTER 2 | Initial Switch ConfigurationConnecting to the Switch– 24 –you are unfamiliar with this process, see “Changing a PC’s IP Address” on pa

Strany 61 - 8 VLAN STACKING

CHAPTER 2 | Initial Switch ConfigurationConnecting to the Switch– 25 –6. From the menu, click on System, then IP Settings. On the IP Address Setti

Strany 62 - VLAN Stacking Table

CHAPTER 2 | Initial Switch ConfigurationConnecting to the Switch– 26 –Figure 4: User Accounts Page2. In the New Username field, define an adminis

Strany 63 - VLAN Stacking Settings

CHAPTER 2 | Initial Switch ConfigurationChanging a PC’s IP Address– 27 –CHANGING A PC’S IP ADDRESSTo change the IP address of a Windows 2000 PC:1.

Strany 64

CHAPTER 2 | Initial Switch ConfigurationChanging a PC’s IP Address– 28 –

Strany 65 - 9 IGMP SNOOPING

– 29 –SECTION IIWEB CONFIGURATIONThis section describes the basic switch features, along with a detailed description of how to configure each featur

Strany 66 - Multicast Entry Table

MANAGEMENT GUIDEECS4310-26T GIGABIT SMART SWITCHwith 24 10/100/1000BASE-T (RJ-45) Ports,and 2 Gigabit SFP SlotsECS4310-26TE072010-CS-R01149100000083A

Strany 67 - IGMP Snooping Setting

SECTION | Web Configuration– 30 –◆ "General Security Settings" on page 113◆ "Port Statistics" on page 119◆ "Management T

Strany 68

– 31 –3 USING THE WEB INTERFACEThe switch provides an embedded HTTP web agent. Using a web browser you can configure the switch and view statistics

Strany 69

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 32 –NAVIGATING THE WEB BROWSER INTERFACETo access the web-browser interfa

Strany 70

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 33 –NOTE: To ensure proper screen refresh, be sure that Internet Explorer

Strany 71 - 10 SPANNING TREE

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 34 –VLAN StackingS-VLAN Table Sets QinQ settings for the switch 62S-VLAN

Strany 72 -

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 35 –Port Isolation Limits traffic to and from specified ports 116Defence

Strany 73

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 36 –

Strany 74

– 37 –4 SYSTEM SETTINGSThis chapter describes some basic system settings on the switch. It includes the following sections:◆ “Displaying System Info

Strany 75 - CONFIGURING STP PORT SETTINGS

CHAPTER 4 | System SettingsDisplaying System Information– 38 –WEB INTERFACETo view System Information in the web interface, click System, then Inf

Strany 76 - Configuring STP Port Settings

CHAPTER 4 | System SettingsSetting a User Account– 39 –SETTING A USER ACCOUNTThe administrator has read/write access for all parameters governing

Strany 78 - Figure 23: STP Port Setting

CHAPTER 4 | System SettingsSetting an IP Address– 40 –SETTING AN IP ADDRESS This section describes how to configure an IP interface for management

Strany 79 - 11 QUALITY OF SERVICE

CHAPTER 4 | System SettingsSetting an IP Address– 41 –WEB INTERFACETo configure static IPv4 address settings:1. Click System, then IP Setting.2. S

Strany 80 - Port-Based Priority

CHAPTER 4 | System SettingsSetting an IP Address– 42 –interface identifier (i.e., the physical MAC address). You can manually configure a link-loc

Strany 81 - DSCP-Based Priority

CHAPTER 4 | System SettingsSetting an IP Address– 43 –WEB INTERFACETo configure IPv6 & Time in the web interface:1. Click Configuration, Syste

Strany 82 - Priority-to-Queue Mapping

CHAPTER 4 | System SettingsSetting an IP Address– 44 –

Strany 83 - Table 9: CoS Priority Levels

– 45 –5 PORT SETTINGSThe Port Configuration page includes configuration options for enabling auto-negotiation or manually setting the speed and dupl

Strany 84 - Packet Scheduling

CHAPTER 5 | Port Settings– 46 –NOTE: Avoid using flow control on a port connected to a hub unless it is actually required to solve a problem. Othe

Strany 85 - Figure 27: Packet Scheduling

CHAPTER 5 | Port Settings– 47 –Figure 11: Port Configuration

Strany 86

CHAPTER 5 | Port Settings– 48 –

Strany 87 - LINK LAYER DISCOVERY PROTOCOL

– 49 –6 LINK AGGREGATIONYou can create multiple links between devices that work as one virtual, aggregate link. A port trunk offers a dramatic incre

Strany 88 - Figure 28: LLDP Settings

– 5 –ABOUT THIS GUIDEPURPOSE This guide gives specific information on how to operate and use the management functions of the switch.AUDIENCE The gui

Strany 89 - LLDP Neighbors

CHAPTER 6 | Link AggregationCreating Trunk Groups– 50 –◆ When configuring static trunks on switches of different types, they must be compatible wi

Strany 90 - Figure 29: LLDP Neighbors

CHAPTER 6 | Link AggregationCreating Trunk Groups– 51 –Current Configured Trunk Groups◆ Group ID – Displays the trunk identifier.◆ Type – Displays

Strany 91 - 13 SNMP SETTINGS

CHAPTER 6 | Link AggregationConfiguring Trunk Settings– 52 –CONFIGURING TRUNK SETTINGSWhen incoming data frames are forwarded through the switch t

Strany 92 -

CHAPTER 6 | Link AggregationConfiguring Trunk Settings– 53 – Dest. IP – All traffic with the same source and destination IP address is output on t

Strany 93 - Figure 30: SNMP Settings

CHAPTER 6 | Link AggregationConfiguring LACP– 54 –CONFIGURING LACPUse the LACP Settings page to enable LACP on the switch and configure the system

Strany 94

CHAPTER 6 | Link AggregationConfiguring LACP– 55 –Current LACP Port Configuration◆ Port – Port identifier. (Range: 1-26)◆ LACP – Indicates ports t

Strany 95 - 14 PORT MIRRORING

CHAPTER 6 | Link AggregationConfiguring LACP– 56 –

Strany 96 - Figure 32: Port Mirroring

– 57 –7 CREATING VLANSThis chapter includes the following sections for configuring VLANs:◆ “IEEE 802.1Q VLANs” on page 57◆ “Assigning Ports to VLANs

Strany 97 - 15 PORT SECURITY

CHAPTER 7 | Creating VLANsAssigning Ports to VLANs– 58 –ASSIGNING PORTS TO VLANSBefore enabling VLANs for the switch, you must first assign each p

Strany 98 - Figure 33: Port Security

CHAPTER 7 | Creating VLANsAssigning Ports to VLANs– 59 –WEB INTERFACETo configure IEEE 802.1Q VLAN groups:1. Click Configuration, VLAN, Static VLA

Strany 99 - 16 BANDWIDTH CONTROL

ABOUT THIS GUIDE– 6 –

Strany 100 - Figure 34: Bandwidth Control

CHAPTER 7 | Creating VLANsConfiguring VLAN Attributes for Port Members– 60 –CONFIGURING VLAN ATTRIBUTES FOR PORT MEMBERSYou can configure VLAN att

Strany 101 - 17 JUMBO FRAME

– 61 –8 VLAN STACKINGThis chapter includes the following sections for configuring VLAN Stacking:◆ “Configuring IEEE 802.1Q Tunneling” on page 61◆ “V

Strany 102 -

CHAPTER 8 | VLAN StackingVLAN Stacking Table– 62 –When a double-tagged packet enters another trunk port in an intermediate or core switch in the s

Strany 103 - 18 MANAGEMENT ACCESS FILTER

CHAPTER 8 | VLAN StackingVLAN Stacking Settings– 63 –Figure 17: VLAN Stacking TableVLAN STACKING SETTINGSAfter configuring port members for stack

Strany 104 -

CHAPTER 8 | VLAN StackingVLAN Stacking Settings– 64 –the ethertype field, as they would be with a standard 802.1Q trunk. Frames arriving on the po

Strany 105 - 19 MAC ADDRESS SECURITY

– 65 –9 IGMP SNOOPINGThis chapter includes the following sections for configuring IGMP Snooping:◆ “IGMP Snooping Introduction” on page 65◆ “Multicas

Strany 106 - Static MAC Addresses

CHAPTER 9 | IGMP SnoopingMulticast Entry Table– 66 –MULTICAST ENTRY TABLEThe IGMP Multicast Router Information table displays the current multicas

Strany 107 - MAC ADDRESS FILTERING

CHAPTER 9 | IGMP SnoopingIGMP Snooping Setting– 67 –WEB INTERFACETo display multicast group and router port information, click Configuration, IGMP

Strany 108 - MAC Address Filtering

CHAPTER 9 | IGMP SnoopingIGMP Snooping Setting– 68 –◆ IGMP Fast-Leave - Immediately deletes a member port of a multicast service if a leave packet

Strany 109 - 20 802.1X SECURITY

CHAPTER 9 | IGMP SnoopingIGMP Snooping Setting– 69 –Figure 20: IGMP Snooping Global SettingsIGMP VLAN SETTING The following parameters are displa

Strany 110 - 802.1X Global Settings

– 7 –CONTENTSABOUT THIS GUIDE 5CONTENTS 7FIGURES 11TABLES 13SECTION I GETTING STARTED 151INTRODUCTION 17Key Features 17Description of Software Feat

Strany 111 - Figure 40: 802.1X Setting

CHAPTER 9 | IGMP SnoopingIGMP Snooping Setting– 70 –Figure 21: IGMP Snooping VLAN Settings

Strany 112 - WEB INTERFACE

– 71 –10 SPANNING TREEThis chapter includes the following sections for configuring Spanning Tree:◆ “Configuring the Spanning Tree Protocol” on page

Strany 113 - 21 GENERAL SECURITY SETTINGS

CHAPTER 10 | Spanning TreeConfiguring STP Global Settings– 72 –Once a stable network topology has been established, all bridges listen for Hello B

Strany 114 - Figure 42: IP Filter Setting

CHAPTER 10 | Spanning TreeConfiguring STP Global Settings– 73 –◆ Maximum Age — The maximum time (in seconds) a device can wait without receiving a

Strany 115

CHAPTER 10 | Spanning TreeConfiguring STP Global Settings– 74 –network. (References to “ports” in this section means “interfaces,” which includes

Strany 116 - Port Isolation

CHAPTER 10 | Spanning TreeConfiguring STP Port Settings– 75 –CONFIGURING STP PORT SETTINGSUse the STP Port Setting page to configure Spanning Tree

Strany 117 - Defence Engine

CHAPTER 10 | Spanning TreeConfiguring STP Port Settings– 76 – ◆ Priority — Defines the priority used for this port in the Spanning Tree Protocol.

Strany 118

CHAPTER 10 | Spanning TreeConfiguring STP Port Settings– 77 – Discarding — Port receives STP configuration messages, but does not forward packets.

Strany 119 - 22 PORT STATISTICS

CHAPTER 10 | Spanning TreeConfiguring STP Port Settings– 78 –◆ Edge — The Edge setting for the port: Config — The administrator configured Edge se

Strany 120 - Figure 46: Port Statistics

– 79 –11 QUALITY OF SERVICEThis chapter includes the following sections for configuring Quality of Service (QoS):◆ “QoS Introduction” on page 79◆ “P

Strany 121 - 23 MANAGEMENT TOOLS

CONTENTS– 8 –Changing a PC’s IP Address 27SECTION II WEB CONFIGURATION 293USING THE WEB INTERFACE 31Connecting to the Web Interface 31Navigating t

Strany 122 - Figure 47: Software Upgrade

CHAPTER 11 | Quality of ServicePort-Based Priority– 80 –PORT-BASED PRIORITYYou can specify the default port priority for each port on the switch,

Strany 123 - Figure 49: Reboot Switch

CHAPTER 11 | Quality of ServiceDSCP-Based Priority– 81 –Figure 24: Port-Based Priority SettingDSCP-BASED PRIORITYThe Differentiated Services Code

Strany 124

CHAPTER 11 | Quality of ServicePriority-to-Queue Mapping– 82 –WEB INTERFACETo configure port-level DSCP remarking:1. Click Configuration, QoS, DSC

Strany 125 - APPENDICES

CHAPTER 11 | Quality of ServicePriority-to-Queue Mapping– 83 –PARAMETERS◆ Priority — CoS value. (Range: 0-7, where 7 is the highest priority)◆ Que

Strany 126 -

CHAPTER 11 | Quality of ServicePacket Scheduling– 84 –Figure 26: Priority-to-Queue MappingPACKET SCHEDULINGYou can set the switch to service the

Strany 127 - A SOFTWARE SPECIFICATIONS

CHAPTER 11 | Quality of ServicePacket Scheduling– 85 –percentage of service time the switch services each queue before moving on to the next queue

Strany 128 - Management Features

CHAPTER 11 | Quality of ServicePacket Scheduling– 86 –

Strany 129 - Management Information Bases

– 87 –12 LINK LAYER DISCOVERY PROTOCOLThis chapter includes the following sections for configuring Link Layer Discovery Protocol (LLDP):◆ “Configuri

Strany 130

CHAPTER 12 | Link Layer Discovery ProtocolConfiguring LLDP– 88 –◆ Port — Port identifier. (Range: 1-26)◆ State — Enables LLDP message transmit and

Strany 131 - B TROUBLESHOOTING

CHAPTER 12 | Link Layer Discovery ProtocolLLDP Neighbors– 89 –LLDP NEIGHBORSUse the LLDP Neighbors page to display information about devices conne

Strany 132 -

CONTENTS– 9 –Multicast Entry Table 66IGMP Snooping Setting 67IGMP Global Setting 67IGMP VLAN Setting 6910 SPANNING TREE 71Configuring the Spanni

Strany 133 - GLOSSARY

CHAPTER 12 | Link Layer Discovery ProtocolLLDP Neighbors– 90 –WEB INTERFACETo display LLDP neighbors, click Configuration, LLDP, LLDP Neighbors. U

Strany 134 - – 134 –

– 91 –13 SNMP SETTINGSThis chapter includes the following sections for configuring Simple Network Management Protocol (SNMP):◆ “Simple Network Manag

Strany 135 - – 135 –

CHAPTER 13 | SNMP SettingsSetting SNMP System and Community Strings– 92 –SETTING SNMP SYSTEM AND COMMUNITY STRINGS To manage the switch through SN

Strany 136 - – 136 –

CHAPTER 13 | SNMP SettingsSpecifying SNMP Trap Receivers– 93 –6. Click Apply.Figure 30: SNMP SettingsSPECIFYING SNMP TRAP RECEIVERS Traps indicat

Strany 137 - DIUS is a logon

CHAPTER 13 | SNMP SettingsSpecifying SNMP Trap Receivers– 94 –2. Specify the IP address of management station that will receive SNMP trap messages

Strany 138 - – 138 –

– 95 –14 PORT MIRRORINGYou can mirror traffic from one or more source ports to a target port for real-time analysis. You can then attach a logic ana

Strany 139 - – 139 –

CHAPTER 14 | Port Mirroring– 96 –Figure 32: Port Mirroring

Strany 140 - – 140 –

– 97 –15 PORT SECURITYPort security is a feature that allows you to configure a switch port with a maximum number of device MAC addresses that are a

Strany 141

CHAPTER 15 | Port Security– 98 –WEB INTERFACETo configure port security:1. Click Configuration, Port Security.2. Select the ports to configure.3.

Strany 142 - 149100000083A

– 99 –16 BANDWIDTH CONTROLThis function allows the network manager to control the maximum rate for traffic received on a port or transmitted from a

Komentáře k této Příručce

Žádné komentáře