Edge-Core ECS4610-26T Guide d'installation

Naviguer en ligne ou télécharger Guide d'installation pour Commutateurs de réseau Edge-Core ECS4610-26T. SMC ECS4610-26T network switch Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 142
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - Gigabit Smart Switch

Management Guidewww.edge-core.comECS4310-26T26-PortGigabit Smart Switch

Page 2

CONTENTS– 10 –802.1X Global Settings 110802.1X Port Settings 11121 GENERAL SECURITY SETTINGS 113IP Filter Security 113Storm Control Setting 114P

Page 3 - ANAGEMENT

CHAPTER 16 | Bandwidth Control– 100 –Figure 34: Bandwidth Control

Page 4

– 101 –17 JUMBO FRAMEThe switch provides more efficient throughput for large sequential data transfers by supporting jumbo frames up to 9216 bytes.

Page 5 - ABOUT THIS GUIDE

CHAPTER 17 | Jumbo Frame– 102 –

Page 6

– 103 –18 MANAGEMENT ACCESS FILTERYou can create a list of up to eight IP addresses or IP address groups that are allowed management access to the s

Page 7 - CONTENTS

CHAPTER 18 | Management Access Filter– 104 –Figure 36: Management Access Filter

Page 8

– 105 –19 MAC ADDRESS SECURITYThis chapter includes the following sections for configuring MAC address security:◆ “MAC Forwarding Table” on page 105

Page 9

CHAPTER 19 | MAC Address SecurityStatic MAC Addresses– 106 –WEB INTERFACETo display the MAC address forwarding table, click Security, MAC Address,

Page 10 - SECTION III APPENDICES 125

CHAPTER 19 | MAC Address SecurityMAC Address Filtering– 107 –Figure 38: Static MAC SettingMAC ADDRESS FILTERINGThe MAC Filtering pages are used t

Page 11 - – 11 –

CHAPTER 19 | MAC Address SecurityMAC Address Filtering– 108 –WEB INTERFACETo configure MAC Address Filtering:1. Click Security, MAC Address, MAC A

Page 12 - – 12 –

– 109 –20 802.1X SECURITYThis chapter includes the following sections for configuring 802.1X security:◆ “Configuring 802.1X Authentication” on page

Page 13 - – 13 –

– 11 –FIGURESFigure 1: Login Page 24Figure 2: Web Interface Home Page 24Figure 3: IP Settings Page 25Figure 4: User Accounts Page 26Figure 5: Home P

Page 14 - – 14 –

CHAPTER 20 | 802.1X Security802.1X Global Settings– 110 –◆ RADIUS authentication must be enabled on the switch and the IP address of the RADIUS se

Page 15 - GETTING STARTED

CHAPTER 20 | 802.1X Security802.1X Port Settings– 111 –WEB INTERFACETo configure 802.1X global settings:1. Click Security, 802.1X, 802.1X Setting.

Page 16 -

CHAPTER 20 | 802.1X Security802.1X Port Settings– 112 – Force-Authorized – Forces the port to grant access to all clients, either dot1x-aware or o

Page 17 - 1 INTRODUCTION

– 113 –21 GENERAL SECURITY SETTINGSThis chapter includes the following sections for other general security settings:◆ “IP Filter Security” on page 1

Page 18 -

CHAPTER 21 | General Security SettingsStorm Control Setting– 114 –WEB INTERFACETo configure IP Filter settings:1. Click Security, IP Filter Settin

Page 19

CHAPTER 21 | General Security SettingsStorm Control Setting– 115 –You can also protect your network from excess multicast or unknown multicast/uni

Page 20

CHAPTER 21 | General Security SettingsPort Isolation– 116 –PORT ISOLATIONPort Isolation provides port-based security and isolation of local ports.

Page 21 - Table 2: System Defaults

CHAPTER 21 | General Security SettingsDefence Engine– 117 –DEFENCE ENGINEDefence Engine is a advanced feature that can prevent switch’s CPU from b

Page 22

CHAPTER 21 | General Security SettingsDefence Engine– 118 –

Page 23 - INITIAL SWITCH CONFIGURATION

– 119 –22 PORT STATISTICSYou can display standard statistics on network traffic passing through each port. This information can be used to identify

Page 24 - Figure 1: Login Page

FIGURES– 12 –Figure 32: Port Mirroring 96Figure 33: Port Security 98Figure 34: Bandwidth Control 100Figure 35: Jumbo Frame Setting 101Figure 36: Man

Page 25 - Figure 3: IP Settings Page

CHAPTER 22 | Port Statistics– 120 –WEB INTERFACETo display port statistics, click Monitoring, Port Statistics.Figure 46: Port Statistics

Page 26 - Figure 4: User Accounts Page

– 121 –23 MANAGEMENT TOOLSThis chapter includes the following sections for management tools:◆ “HTTP Upgrade” on page 121◆ “Restoring Factory Default

Page 27 - Changing a PC’s IP Address

CHAPTER 23 | Management ToolsRestoring Factory Defaults– 122 –CAUTION: Do not reset or power off the switch during the upgrade process or the swit

Page 28

CHAPTER 23 | Management ToolsResetting the Switch– 123 –RESETTING THE SWITCHUse the Reboot page to restart the switch.WEB INTERFACETo restart the

Page 29 - WEB CONFIGURATION

CHAPTER 23 | Management ToolsResetting the Switch– 124 –

Page 30 -

– 125 –SECTION IIIAPPENDICESThis section provides additional information and includes these items:◆ "Software Specifications" on page 127◆

Page 31 - 3 USING THE WEB INTERFACE

SECTION | Appendices– 126 –

Page 32 - Figure 5: Home Page

– 127 –A SOFTWARE SPECIFICATIONSSOFTWARE FEATURESAUTHENTICATION Local, RADIUS, Port (802.1X), HTTPS, Port Security, IP FilterPORT CONFIGURATION 100

Page 33 - Table 4: Main Menu

APPENDIX A | Software SpecificationsManagement Features– 128 –MULTICAST FILTERING IGMP SnoopingADDITIONAL FEATURES DHCP ClientLLDP (Link Layer Dis

Page 34

APPENDIX A | Software SpecificationsManagement Information Bases– 129 –MANAGEMENT INFORMATION BASESBridge MIB (RFC 1493)Differentiated Services MI

Page 35

– 13 –TABLESTable 1: Key Features 17Table 2: System Defaults 21Table 3: Web Page Configuration Buttons 32Table 4: Main Menu 33Table 5: Recommend

Page 36

APPENDIX A | Software SpecificationsManagement Information Bases– 130 –

Page 37 - 4 SYSTEM SETTINGS

– 131 –B TROUBLESHOOTINGPROBLEMS ACCESSING THE MANAGEMENT INTERFACE Table 11: Troubleshooting ChartSymptom ActionCannot connect using a web browser

Page 38 - Figure 7: System Information

APPENDIX B | TroubleshootingProblems Accessing the Management Interface– 132 –

Page 39 - Figure 8: System Password

– 133 –GLOSSARYACL Access Control List. ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for c

Page 40 - Setting an IP Address

GLOSSARY – 134 –DSCP Differentiated Services Code Point Service. DSCP uses a six-bit tag to provide for up to 64 different forwarding behaviors. Bas

Page 41

GLOSSARY– 135 –IEEE 802.1Q VLAN Tagging—Defines Ethernet frame tags which carry VLAN information. It allows switches to assign endstations to differ

Page 42

GLOSSARY – 136 –IP MULTICAST FILTERING A process whereby this switch can pass multicast traffic along to participating hosts.IP PRECEDENCE The Type

Page 43

GLOSSARY– 137 –NTP Network Time Protocol provides the mechanisms to synchronize time across the network. The time servers operate in a hierarchical-

Page 44

GLOSSARY – 138 –SSH Secure Shell is a secure replacement for remote access functions, including Telnet. SSH can authenticate users with a cryptograp

Page 45 - 5 PORT SETTINGS

– 139 –INDEXNUMERICS802.1Q tunnelmode selection 63802.1Xport authentication 109BBPDU 72Ccommunity string 92Ddefault settings, system 21Eed

Page 46 -

TABLES– 14 –

Page 47

INDEX– 140 –STAedge port 75, 76global settings, displaying 72interface settings 75link type 76path cost 71, 73, 75port priority 76standa

Page 49 - 6 LINK AGGREGATION

ECS4310-26TE072010-CS-R01149100000083A

Page 50 - Creating Trunk Groups

– 15 –SECTION IGETTING STARTEDThis section provides an overview of the switch, and introduces some basic concepts about network switches. It also de

Page 51

SECTION | Getting Started– 16 –

Page 52 - CONFIGURING TRUNK SETTINGS

– 17 –1 INTRODUCTIONThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to configur

Page 53 - Configuring Trunk Settings

CHAPTER 1 | IntroductionDescription of Software Features– 18 –DESCRIPTION OF SOFTWARE FEATURESThe switch provides a wide range of advanced perform

Page 54 - Configuring LACP

CHAPTER 1 | IntroductionDescription of Software Features– 19 –PORT TRUNKING Ports can be combined into an aggregate connection. Trunks can be manu

Page 56

CHAPTER 1 | IntroductionDescription of Software Features– 20 –◆ Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) – This protocol reduces the conve

Page 57 - 7 CREATING VLANS

CHAPTER 1 | IntroductionSystem Defaults– 21 –SYSTEM DEFAULTSThe following table lists some of the basic system defaults.Table 2: System Defaults F

Page 58 - Assigning Ports to VLANs

CHAPTER 1 | IntroductionSystem Defaults– 22 –

Page 59

– 23 –2 INITIAL SWITCH CONFIGURATIONThis chapter includes information on connecting to the switch and basic configuration procedures.The switch incl

Page 60

CHAPTER 2 | Initial Switch ConfigurationConnecting to the Switch– 24 –you are unfamiliar with this process, see “Changing a PC’s IP Address” on pa

Page 61 - 8 VLAN STACKING

CHAPTER 2 | Initial Switch ConfigurationConnecting to the Switch– 25 –6. From the menu, click on System, then IP Settings. On the IP Address Setti

Page 62 - VLAN Stacking Table

CHAPTER 2 | Initial Switch ConfigurationConnecting to the Switch– 26 –Figure 4: User Accounts Page2. In the New Username field, define an adminis

Page 63 - VLAN Stacking Settings

CHAPTER 2 | Initial Switch ConfigurationChanging a PC’s IP Address– 27 –CHANGING A PC’S IP ADDRESSTo change the IP address of a Windows 2000 PC:1.

Page 64

CHAPTER 2 | Initial Switch ConfigurationChanging a PC’s IP Address– 28 –

Page 65 - 9 IGMP SNOOPING

– 29 –SECTION IIWEB CONFIGURATIONThis section describes the basic switch features, along with a detailed description of how to configure each featur

Page 66 - Multicast Entry Table

MANAGEMENT GUIDEECS4310-26T GIGABIT SMART SWITCHwith 24 10/100/1000BASE-T (RJ-45) Ports,and 2 Gigabit SFP SlotsECS4310-26TE072010-CS-R01149100000083A

Page 67 - IGMP Snooping Setting

SECTION | Web Configuration– 30 –◆ "General Security Settings" on page 113◆ "Port Statistics" on page 119◆ "Management T

Page 68

– 31 –3 USING THE WEB INTERFACEThe switch provides an embedded HTTP web agent. Using a web browser you can configure the switch and view statistics

Page 69

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 32 –NAVIGATING THE WEB BROWSER INTERFACETo access the web-browser interfa

Page 70

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 33 –NOTE: To ensure proper screen refresh, be sure that Internet Explorer

Page 71 - 10 SPANNING TREE

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 34 –VLAN StackingS-VLAN Table Sets QinQ settings for the switch 62S-VLAN

Page 72 -

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 35 –Port Isolation Limits traffic to and from specified ports 116Defence

Page 73

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 36 –

Page 74

– 37 –4 SYSTEM SETTINGSThis chapter describes some basic system settings on the switch. It includes the following sections:◆ “Displaying System Info

Page 75 - CONFIGURING STP PORT SETTINGS

CHAPTER 4 | System SettingsDisplaying System Information– 38 –WEB INTERFACETo view System Information in the web interface, click System, then Inf

Page 76 - Configuring STP Port Settings

CHAPTER 4 | System SettingsSetting a User Account– 39 –SETTING A USER ACCOUNTThe administrator has read/write access for all parameters governing

Page 78 - Figure 23: STP Port Setting

CHAPTER 4 | System SettingsSetting an IP Address– 40 –SETTING AN IP ADDRESS This section describes how to configure an IP interface for management

Page 79 - 11 QUALITY OF SERVICE

CHAPTER 4 | System SettingsSetting an IP Address– 41 –WEB INTERFACETo configure static IPv4 address settings:1. Click System, then IP Setting.2. S

Page 80 - Port-Based Priority

CHAPTER 4 | System SettingsSetting an IP Address– 42 –interface identifier (i.e., the physical MAC address). You can manually configure a link-loc

Page 81 - DSCP-Based Priority

CHAPTER 4 | System SettingsSetting an IP Address– 43 –WEB INTERFACETo configure IPv6 & Time in the web interface:1. Click Configuration, Syste

Page 82 - Priority-to-Queue Mapping

CHAPTER 4 | System SettingsSetting an IP Address– 44 –

Page 83 - Table 9: CoS Priority Levels

– 45 –5 PORT SETTINGSThe Port Configuration page includes configuration options for enabling auto-negotiation or manually setting the speed and dupl

Page 84 - Packet Scheduling

CHAPTER 5 | Port Settings– 46 –NOTE: Avoid using flow control on a port connected to a hub unless it is actually required to solve a problem. Othe

Page 85 - Figure 27: Packet Scheduling

CHAPTER 5 | Port Settings– 47 –Figure 11: Port Configuration

Page 86

CHAPTER 5 | Port Settings– 48 –

Page 87 - LINK LAYER DISCOVERY PROTOCOL

– 49 –6 LINK AGGREGATIONYou can create multiple links between devices that work as one virtual, aggregate link. A port trunk offers a dramatic incre

Page 88 - Figure 28: LLDP Settings

– 5 –ABOUT THIS GUIDEPURPOSE This guide gives specific information on how to operate and use the management functions of the switch.AUDIENCE The gui

Page 89 - LLDP Neighbors

CHAPTER 6 | Link AggregationCreating Trunk Groups– 50 –◆ When configuring static trunks on switches of different types, they must be compatible wi

Page 90 - Figure 29: LLDP Neighbors

CHAPTER 6 | Link AggregationCreating Trunk Groups– 51 –Current Configured Trunk Groups◆ Group ID – Displays the trunk identifier.◆ Type – Displays

Page 91 - 13 SNMP SETTINGS

CHAPTER 6 | Link AggregationConfiguring Trunk Settings– 52 –CONFIGURING TRUNK SETTINGSWhen incoming data frames are forwarded through the switch t

Page 92 -

CHAPTER 6 | Link AggregationConfiguring Trunk Settings– 53 – Dest. IP – All traffic with the same source and destination IP address is output on t

Page 93 - Figure 30: SNMP Settings

CHAPTER 6 | Link AggregationConfiguring LACP– 54 –CONFIGURING LACPUse the LACP Settings page to enable LACP on the switch and configure the system

Page 94

CHAPTER 6 | Link AggregationConfiguring LACP– 55 –Current LACP Port Configuration◆ Port – Port identifier. (Range: 1-26)◆ LACP – Indicates ports t

Page 95 - 14 PORT MIRRORING

CHAPTER 6 | Link AggregationConfiguring LACP– 56 –

Page 96 - Figure 32: Port Mirroring

– 57 –7 CREATING VLANSThis chapter includes the following sections for configuring VLANs:◆ “IEEE 802.1Q VLANs” on page 57◆ “Assigning Ports to VLANs

Page 97 - 15 PORT SECURITY

CHAPTER 7 | Creating VLANsAssigning Ports to VLANs– 58 –ASSIGNING PORTS TO VLANSBefore enabling VLANs for the switch, you must first assign each p

Page 98 - Figure 33: Port Security

CHAPTER 7 | Creating VLANsAssigning Ports to VLANs– 59 –WEB INTERFACETo configure IEEE 802.1Q VLAN groups:1. Click Configuration, VLAN, Static VLA

Page 99 - 16 BANDWIDTH CONTROL

ABOUT THIS GUIDE– 6 –

Page 100 - Figure 34: Bandwidth Control

CHAPTER 7 | Creating VLANsConfiguring VLAN Attributes for Port Members– 60 –CONFIGURING VLAN ATTRIBUTES FOR PORT MEMBERSYou can configure VLAN att

Page 101 - 17 JUMBO FRAME

– 61 –8 VLAN STACKINGThis chapter includes the following sections for configuring VLAN Stacking:◆ “Configuring IEEE 802.1Q Tunneling” on page 61◆ “V

Page 102 -

CHAPTER 8 | VLAN StackingVLAN Stacking Table– 62 –When a double-tagged packet enters another trunk port in an intermediate or core switch in the s

Page 103 - 18 MANAGEMENT ACCESS FILTER

CHAPTER 8 | VLAN StackingVLAN Stacking Settings– 63 –Figure 17: VLAN Stacking TableVLAN STACKING SETTINGSAfter configuring port members for stack

Page 104 -

CHAPTER 8 | VLAN StackingVLAN Stacking Settings– 64 –the ethertype field, as they would be with a standard 802.1Q trunk. Frames arriving on the po

Page 105 - 19 MAC ADDRESS SECURITY

– 65 –9 IGMP SNOOPINGThis chapter includes the following sections for configuring IGMP Snooping:◆ “IGMP Snooping Introduction” on page 65◆ “Multicas

Page 106 - Static MAC Addresses

CHAPTER 9 | IGMP SnoopingMulticast Entry Table– 66 –MULTICAST ENTRY TABLEThe IGMP Multicast Router Information table displays the current multicas

Page 107 - MAC ADDRESS FILTERING

CHAPTER 9 | IGMP SnoopingIGMP Snooping Setting– 67 –WEB INTERFACETo display multicast group and router port information, click Configuration, IGMP

Page 108 - MAC Address Filtering

CHAPTER 9 | IGMP SnoopingIGMP Snooping Setting– 68 –◆ IGMP Fast-Leave - Immediately deletes a member port of a multicast service if a leave packet

Page 109 - 20 802.1X SECURITY

CHAPTER 9 | IGMP SnoopingIGMP Snooping Setting– 69 –Figure 20: IGMP Snooping Global SettingsIGMP VLAN SETTING The following parameters are displa

Page 110 - 802.1X Global Settings

– 7 –CONTENTSABOUT THIS GUIDE 5CONTENTS 7FIGURES 11TABLES 13SECTION I GETTING STARTED 151INTRODUCTION 17Key Features 17Description of Software Feat

Page 111 - Figure 40: 802.1X Setting

CHAPTER 9 | IGMP SnoopingIGMP Snooping Setting– 70 –Figure 21: IGMP Snooping VLAN Settings

Page 112 - WEB INTERFACE

– 71 –10 SPANNING TREEThis chapter includes the following sections for configuring Spanning Tree:◆ “Configuring the Spanning Tree Protocol” on page

Page 113 - 21 GENERAL SECURITY SETTINGS

CHAPTER 10 | Spanning TreeConfiguring STP Global Settings– 72 –Once a stable network topology has been established, all bridges listen for Hello B

Page 114 - Figure 42: IP Filter Setting

CHAPTER 10 | Spanning TreeConfiguring STP Global Settings– 73 –◆ Maximum Age — The maximum time (in seconds) a device can wait without receiving a

Page 115

CHAPTER 10 | Spanning TreeConfiguring STP Global Settings– 74 –network. (References to “ports” in this section means “interfaces,” which includes

Page 116 - Port Isolation

CHAPTER 10 | Spanning TreeConfiguring STP Port Settings– 75 –CONFIGURING STP PORT SETTINGSUse the STP Port Setting page to configure Spanning Tree

Page 117 - Defence Engine

CHAPTER 10 | Spanning TreeConfiguring STP Port Settings– 76 – ◆ Priority — Defines the priority used for this port in the Spanning Tree Protocol.

Page 118

CHAPTER 10 | Spanning TreeConfiguring STP Port Settings– 77 – Discarding — Port receives STP configuration messages, but does not forward packets.

Page 119 - 22 PORT STATISTICS

CHAPTER 10 | Spanning TreeConfiguring STP Port Settings– 78 –◆ Edge — The Edge setting for the port: Config — The administrator configured Edge se

Page 120 - Figure 46: Port Statistics

– 79 –11 QUALITY OF SERVICEThis chapter includes the following sections for configuring Quality of Service (QoS):◆ “QoS Introduction” on page 79◆ “P

Page 121 - 23 MANAGEMENT TOOLS

CONTENTS– 8 –Changing a PC’s IP Address 27SECTION II WEB CONFIGURATION 293USING THE WEB INTERFACE 31Connecting to the Web Interface 31Navigating t

Page 122 - Figure 47: Software Upgrade

CHAPTER 11 | Quality of ServicePort-Based Priority– 80 –PORT-BASED PRIORITYYou can specify the default port priority for each port on the switch,

Page 123 - Figure 49: Reboot Switch

CHAPTER 11 | Quality of ServiceDSCP-Based Priority– 81 –Figure 24: Port-Based Priority SettingDSCP-BASED PRIORITYThe Differentiated Services Code

Page 124

CHAPTER 11 | Quality of ServicePriority-to-Queue Mapping– 82 –WEB INTERFACETo configure port-level DSCP remarking:1. Click Configuration, QoS, DSC

Page 125 - APPENDICES

CHAPTER 11 | Quality of ServicePriority-to-Queue Mapping– 83 –PARAMETERS◆ Priority — CoS value. (Range: 0-7, where 7 is the highest priority)◆ Que

Page 126 -

CHAPTER 11 | Quality of ServicePacket Scheduling– 84 –Figure 26: Priority-to-Queue MappingPACKET SCHEDULINGYou can set the switch to service the

Page 127 - A SOFTWARE SPECIFICATIONS

CHAPTER 11 | Quality of ServicePacket Scheduling– 85 –percentage of service time the switch services each queue before moving on to the next queue

Page 128 - Management Features

CHAPTER 11 | Quality of ServicePacket Scheduling– 86 –

Page 129 - Management Information Bases

– 87 –12 LINK LAYER DISCOVERY PROTOCOLThis chapter includes the following sections for configuring Link Layer Discovery Protocol (LLDP):◆ “Configuri

Page 130

CHAPTER 12 | Link Layer Discovery ProtocolConfiguring LLDP– 88 –◆ Port — Port identifier. (Range: 1-26)◆ State — Enables LLDP message transmit and

Page 131 - B TROUBLESHOOTING

CHAPTER 12 | Link Layer Discovery ProtocolLLDP Neighbors– 89 –LLDP NEIGHBORSUse the LLDP Neighbors page to display information about devices conne

Page 132 -

CONTENTS– 9 –Multicast Entry Table 66IGMP Snooping Setting 67IGMP Global Setting 67IGMP VLAN Setting 6910 SPANNING TREE 71Configuring the Spanni

Page 133 - GLOSSARY

CHAPTER 12 | Link Layer Discovery ProtocolLLDP Neighbors– 90 –WEB INTERFACETo display LLDP neighbors, click Configuration, LLDP, LLDP Neighbors. U

Page 134 - – 134 –

– 91 –13 SNMP SETTINGSThis chapter includes the following sections for configuring Simple Network Management Protocol (SNMP):◆ “Simple Network Manag

Page 135 - – 135 –

CHAPTER 13 | SNMP SettingsSetting SNMP System and Community Strings– 92 –SETTING SNMP SYSTEM AND COMMUNITY STRINGS To manage the switch through SN

Page 136 - – 136 –

CHAPTER 13 | SNMP SettingsSpecifying SNMP Trap Receivers– 93 –6. Click Apply.Figure 30: SNMP SettingsSPECIFYING SNMP TRAP RECEIVERS Traps indicat

Page 137 - DIUS is a logon

CHAPTER 13 | SNMP SettingsSpecifying SNMP Trap Receivers– 94 –2. Specify the IP address of management station that will receive SNMP trap messages

Page 138 - – 138 –

– 95 –14 PORT MIRRORINGYou can mirror traffic from one or more source ports to a target port for real-time analysis. You can then attach a logic ana

Page 139 - – 139 –

CHAPTER 14 | Port Mirroring– 96 –Figure 32: Port Mirroring

Page 140 - – 140 –

– 97 –15 PORT SECURITYPort security is a feature that allows you to configure a switch port with a maximum number of device MAC addresses that are a

Page 141

CHAPTER 15 | Port Security– 98 –WEB INTERFACETo configure port security:1. Click Configuration, Port Security.2. Select the ports to configure.3.

Page 142 - 149100000083A

– 99 –16 BANDWIDTH CONTROLThis function allows the network manager to control the maximum rate for traffic received on a port or transmitted from a

Commentaires sur ces manuels

Pas de commentaire