Smc-networks SMC TigerStack II SMC6624M Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Accessoires pour ordinateurs Smc-networks SMC TigerStack II SMC6624M. SMC Networks SMC TigerStack II SMC6624M User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 364
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
Stackable Fast Ethernet Switch
24 10BASE-T/100BASE-TX RJ-45 ports
Auto MDI/MDI-X support on all ports
Optional 100BASE-FX or 1000BASE-X modules
Optional stack module for linking up to 16 units
8.8 Gbps of aggregate switch bandwidth
LACP and FEC port trunking support
Port mirroring for non-intrusive analysis
Port security
Full support for IEEE 802.1Q VLANs with GVRP
IP Multicasting with IGMP Snooping
Manageable via console, Web, SNMP/RMON
TigerSwitch 10/100
Management Guide
SMC6624M
Vue de la page 0
1 2 3 4 5 6 ... 363 364

Résumé du contenu

Page 1 - TigerSwitch 10/100

Stackable Fast Ethernet Switch◆ 24 10BASE-T/100BASE-TX RJ-45 ports◆ Auto MDI/MDI-X support on all ports◆ Optional 100BASE-FX or 1000BASE-X modules◆

Page 2

viContentsHow the Switch Lists Trunk Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-27Outbound Traffic Distribution Across Trunked

Page 3 - Management Guide

6-8Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Page 4 - Trademarks:

6-9Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Port TrunkingPort Sta

Page 5

6-10Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Port Connection

Page 6

6-11Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Fault Tolerance: I

Page 7

6-12Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Table 6-4. Trun

Page 8 - Information

6-13Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Table 6-5. General O

Page 9 - Trunking

6-14Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Spanning Tree P

Page 10 - Contents

6-15Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Menu: Viewing and Co

Page 11

6-16Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and switch automati

Page 12

6-17Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and 8. Connect the trunk

Page 13

viiContentsWeb: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . 7-34Building IP Masks . . . . . . . . . . . . . . . .

Page 14 - 11 Troubleshooting

6-18Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and The show trunk

Page 15 - B MAC Address Management

6-19Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Figure 6-9. Example

Page 16 - D Daylight Savings Time

6-20Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and You can configu

Page 17 - Interface

6-21Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Enabling a Dynamic L

Page 18

6-22Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Removing Ports

Page 19 - Advantages of Using the CLI

6-23Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Trunk Group Operatio

Page 20

6-24Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Default Port Op

Page 21 - Using the Menu Interface

6-25Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and LACP Notes and Restr

Page 22 - Command Line (CLI) option.)

6-26Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and Half-Duplex and

Page 23

6-27Optimizing Port Usage Through Traffic Control and Port TrunkingPort TrunkingOptimizing Port Usage Through Traffic Control and Depending on the c

Page 24

viiiContentsUsing the Menu Interface To View Stack Status And Configure Stacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 25

6-28Optimizing Port Usage Through Traffic Control and Port Trunking Port TrunkingOptimizing Port Usage Through Traffic Control and and sends traff

Page 26 - Main Menu Features

7-1Using Passwords, Port Security, and Authorized IP 7Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Acces

Page 27

7-2Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port

Page 28

7-3Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing Password SecurityUsing Passwords, Port Secur

Page 29

7-4Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port

Page 30

7-5Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing Password SecurityUsing Passwords, Port Secur

Page 31 - Rebooting the Switch

7-6Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using Password SecurityUsing Passwords, Port

Page 32

7-7Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pass

Page 33 - Menu Features List

7-8Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsing

Page 34 - Where To Go From Here

7-9Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pass

Page 35 - Using the CLI

ixContentsEffect of VLANs on Other Switch Features . . . . . . . . . . . . . . . . . . . . . 9-71Spanning Tree Protocol Operation with VLANs . . .

Page 36 - Privilege Levels at Logon

7-10Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Page 37 - Privilege Level Operation

7-11Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Page 38 - Manager Privileges

7-12Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Page 39 - Interface (CLI)

7-13Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Page 40 - How To Move Between Levels

7-14Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Page 41 - ? symbol lists the

7-15Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Page 42 - Using the CLI

7-16Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Page 43 - Command Option Displays

7-17Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Page 44 - Displaying CLI “Help”

7-18Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Page 45

7-19Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Page 46 - Configuration Modes

xContentsMenu Access To Status and Counters . . . . . . . . . . . . . . . . . . . . . . . . . 10-3General System Information . . . . . . . . . . .

Page 47

7-20Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Page 48

7-21Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Page 49 - CLI Control and Editing

7-22Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Page 50

7-23Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Page 51 - Using the Web Browser

7-24Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Page 52 - General Features

7-25Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Page 53

7-26Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port SecurityUsin

Page 54 - Session with the Switch

7-27Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessConfiguring and Monitoring Port SecurityUsing Pas

Page 55

7-28Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Page 56 - Interface Session

7-29Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Page 57

xiContentsUsing the Event Log To Identify Problem Sources . . . . . . . . . . . . . 11-10Menu: Entering and Navigating in the Event Log . . . . . .

Page 58 - Using the Passwords

7-30Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Page 59 - If You Lose a Password

7-31Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Page 60 - Support/Mgmt URL Feature

7-32Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Page 61 - Status Reporting Features

7-33Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Page 62 - Port Utilization

7-34Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Page 63

7-35Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Page 64

7-36Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Page 65 - The Alert Log

7-37Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized AccessUsing IP Authorized ManagersUsing Passwords, Port

Page 66 - Alert Types

7-38Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Using IP Authorized ManagersUsing Passwords,

Page 67 - The Status Bar

8-1Monitoring and Managing the Switch8Configuring for Network Management ApplicationsYou can manage the switch via SNMP from a network management stat

Page 68

xiiContentsC Switch Memory and ConfigurationOverview of Configuration File Management . . . . . . . . . . . . . . . . . . C-1Using the CLI To Impl

Page 69 - Interface Access, and

8-2Configuring for Network Management ApplicationsSNMP Management FeaturesMonitoring and Managing the SwitchSNMP Management FeaturesSNMP management fe

Page 70 - IP Configuration

8-3Configuring for Network Management ApplicationsConfiguring for SNMP Access to the SwitchMonitoring and Managing the SwitchThe switch SNMP agent als

Page 71 - Just Want a Quick Start?

8-4Configuring for Network Management ApplicationsConfiguring for SNMP Access to the SwitchMonitoring and Managing the SwitchCaution Deleting the comm

Page 72 - (TTL), and Timep

8-5Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchSNMP Communities SNMP Community FeaturesUse SNMP c

Page 73

8-6Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchFigure 8-1. The SNMP Communities Screen (Default

Page 74

8-7Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchCLI: Viewing and Configuring Community NamesCommun

Page 75

8-8Configuring for Network Management ApplicationsSNMP CommunitiesMonitoring and Managing the SwitchSMC TigerSwitch 10/100# show snmp-server publicCon

Page 76

8-9Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchTrap Receivers and Authenti

Page 77

8-10Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchCLI: Configuring and Displ

Page 78 - DHCP/Bootp Operation

8-11Configuring for Network Management ApplicationsTrap Receivers and Authentication TrapsMonitoring and Managing the SwitchConfiguring Trap Receivers

Page 79

1-1Selecting a Management Interface1Selecting a Management InterfaceThis chapter describes the following: Management interfaces for the SMC6624M swit

Page 80

8-12Configuring for Network Management ApplicationsAdvanced Management: RMON SupportMonitoring and Managing the SwitchAdvanced Management: RMON Suppor

Page 81

9-1Configuring Advanced Features9Configuring Advanced FeaturesThis chapter describes the following features and how to configure them with the switch’

Page 82

9-2Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesStack ManagementStacking FeaturesStack Management (termed stacking)

Page 83 - Web, and Inbound Telnet

9-3Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features Simplify management of small workgroups or wiring closets while scaling

Page 84 - Interface Access

9-4Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesComponents of Stack ManagementTable 9-1. Stacking DefinitionsFigure

Page 85

9-5Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-2. Example of Stacking with One Commander Controlling Access to

Page 86 - ■ Critical log events

9-6Configuring Advanced Features Stack ManagementConfiguring Advanced Features There is no limit on the number of stacks in the same IP subnet (b

Page 87

9-7Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesNote In the default stack configuration, the Candidate Auto Join paramete

Page 88 - System Information

9-8Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesOverview of Configuring and Bringing Up a StackThis process assumes

Page 89

9-9Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesTable 9-3. Stacking Configuration GuideThe easiest way to automatically c

Page 90

1-2Selecting a Management InterfaceAdvantages of Using the Menu InterfaceSelecting a Management InterfaceAdvantages of Using the Menu InterfaceFigure

Page 91

9-10Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesGeneral Steps for Creating a StackThis section describes the genera

Page 92

9-11Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. For automatically or manually pulling Candidate switches into a stack

Page 93 - Control and Port Trunking

9-12Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing the Menu Interface To View Stack Status And Configure Stackin

Page 94

9-13Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-6. The Default Stack Configuration Screen4. Move the cursor to

Page 95

9-14Configuring Advanced Features Stack ManagementConfiguring Advanced Features• No (the default) prevents automatic joining of Candidates that ha

Page 96

9-15Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesTable 9-4.Candidate Configuration Options in the Menu InterfaceUsing the

Page 97

9-16Configuring Advanced Features Stack ManagementConfiguring Advanced Features4. Do one of the following:• To disable stacking on the Candidate,

Page 98

9-17Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the Commander’s Menu To Manually Add a Candidate to a Stack. In t

Page 99

9-18Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-10. Example of Candidate List in Stack Management Screen3

Page 100 - Parameters

9-19Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-11. Example of Stack Management Screen After New Member AddedU

Page 101 - Port Trunking

1-3Selecting a Management InterfaceAdvantages of Using the CLISelecting a Management InterfaceAdvantages of Using the CLIFigure 1-2. Example of The Co

Page 102

9-20Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-12. Example of How the Stacking Status (All) Screen Helps

Page 103 - Trunk Configuration Methods

9-21Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features8. Do one of the following:• If the stack containing the Member you are

Page 104 - Through Traffic Control and

9-22Configuring Advanced Features Stack ManagementConfiguring Advanced Features4. Stack ManagementYou will then see the Stack Management screen:Fi

Page 105

9-23Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the Commander To Access Member Switches for Configuration Changes

Page 106

9-24Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-17. The eXecute Command Displays the Console Main Menu fo

Page 107

9-25Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. Press [B] (for Back) to return to the Stacking Menu.4. To display Sta

Page 108

9-26Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing Any Stacked Switch To View the Status for All Switches with S

Page 109 - Trunk Group

9-27Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-19. Example of the Commander’s Stacking Status ScreenViewing M

Page 110

9-28Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-20. Example of a Member’s Stacking Status ScreenViewing C

Page 111

9-29Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To View Stack Status and Configure StackingThe CLI enables

Page 113

1-4Selecting a Management InterfaceAdvantages of Using the Web Browser InterfaceSelecting a Management InterfaceAdvantages of Using the Web Browser In

Page 114

9-30Configuring Advanced Features Stack ManagementConfiguring Advanced Features[no] stack member <switch-num> mac-address <mac-addr> [

Page 115

9-31Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To View Stack StatusYou can list the stack status for an i

Page 116 - Default Port Operation

9-32Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesViewing the Status of all Stack-Enabled Switches Discovered in the

Page 117 - LACP Notes and Restrictions

9-33Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesUsing the CLI To Configure a Commander SwitchYou can configure any stack

Page 118 - technol

9-34Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-26. Example of the Commander’s Show Stack Screen with Onl

Page 119

9-35Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-27. Example of Using a Member’s CLI To Convert the Member to t

Page 120

9-36Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing the Commander’s CLI To Manually Add a Candidate to the Stack.

Page 121 - Security, and Authorized IP

9-37Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFor example, if the switch named “DEFAULT_CONFIG” in the above listing d

Page 122 - Using Password Security

9-38Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesUsing a Candidate CLI To Manually “Push” the Candidate Into a Stack

Page 123

9-39Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesSyntax: stack member <switch-number> mac-address <mac-add

Page 124

2-1Using the Menu Interface2Using the Menu InterfaceThis chapter describes the following features: Overview of the Menu Interface (page 4-1) Startin

Page 125

9-40Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesSyntax: no stack name <stack name> stack join <mac-add

Page 126 - Security tab

9-41Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesSyntax: [no] stack member <switch-num> mac-address <mac-addr&

Page 127 - Security

9-42Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesFigure 9-35. Example of How To Identify the Commander’s MAC Addres

Page 128 - Blocking Unauthorized Traffic

9-43Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesFigure 9-36. Example of a Stack Showing Switch Number (SN) AssignmentsT

Page 129 - Planning Port Security

9-44Configuring Advanced Features Stack ManagementConfiguring Advanced FeaturesSNMP Community Operation in a StackCommunity MembershipIn the defau

Page 130

9-45Configuring Advanced FeaturesStack ManagementConfiguring Advanced FeaturesNote that in the above example (figure 9-37) you cannot use the public c

Page 131

9-46Configuring Advanced Features Stack ManagementConfiguring Advanced Features Stacking uses only the primary VLAN on each switch in a stack. T

Page 132

9-47Configuring Advanced FeaturesStack ManagementConfiguring Advanced Features3. Click on [Apply Changes] to save any configuration changes for the i

Page 133

9-48Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs) VLAN F

Page 134

9-49Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced Featuressaved by not allowing packets to flood out all por

Page 135

2-2Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceMenu Interaction with Other Interfaces. A configuration change

Page 136

9-50Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-40. Example of Overlapping VLANs Us

Page 137

9-51Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-42. Example of Tagged and Untagged VLAN

Page 138

9-52Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesDHCP or Bootp on different VLANs do not resul

Page 139

9-53Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-43. Comparing Per-Port VLAN Options With

Page 140 - Notice of Security Violations

9-54Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesGeneral Steps for Using VLANs1. Plan your VLA

Page 141

9-55Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesMenu: Configuring VLAN ParametersIn the factory de

Page 142 - Resetting Alert Flags

9-56Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced Features To select another primary VLAN, select the

Page 143

9-57Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesAdding or Editing VLAN NamesUse this procedure to

Page 144

9-58Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-47. Example of VLAN Names Screen wi

Page 145

9-59Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-48. Example of VLAN Port Assignment Scre

Page 146

2-3Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceHow To Start a Menu Interface SessionIn its factory default confi

Page 147

9-60Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-49. Example of VLAN Assignments for

Page 148 - Using IP Authorized Managers

9-61Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN Commands Used in this SectionDisplaying the S

Page 149 - Access Levels

9-62Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesDisplaying the Configuration for a Particular

Page 150 - Overview of IP Mask Operation

9-63Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesChanging the Number of VLANs Allowed on the Switch

Page 151 - Managers

9-64Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesCreating a New Static VLANChanging the VLAN C

Page 152

9-65Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesConverting a Dynamic VLAN to a Static VLAN. If GV

Page 153

9-66Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced Featuresoperation. Note that Auto is the defaultper-p

Page 154 - Building IP Masks

9-67Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesTo configure static VLAN port parameters, you will

Page 155

9-68Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-54. Example of Tagged and Untagged

Page 156

9-69Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesNote Each 802.1Q-compliant VLAN must have its own

Page 157

2-4Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceFigure 2-1. The Main Menu with Manager PrivilegesFor a descriptio

Page 158

9-70Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesFigure 9-56. Example of Networked 802.1Q-Com

Page 159 - Applications

9-71Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesTo summarize:Effect of VLANs on Other Switch Featu

Page 160 - SNMP Management Features

9-72Configuring Advanced Features Port-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN MAC AddressesThe switch has one unique M

Page 161 - Monitoring and Managing

9-73Configuring Advanced FeaturesPort-Based Virtual LANs (Static VLANs)Configuring Advanced FeaturesVLAN Restrictions A port must be a member of at l

Page 162

9-74Configuring Advanced Features GVRPConfiguring Advanced FeaturesGVRPGVRP—GARP VLAN Registration Protocol—is an application of the Generic Attri

Page 163 - SNMP Communities

9-75Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesNote There must be one common VLAN (that is, one common VID) connecting all of the G

Page 164

9-76Configuring Advanced Features GVRPConfiguring Advanced FeaturesNote that if a static VLAN is configured on at least one port of a switch, and

Page 165

9-77Configuring Advanced FeaturesGVRPConfiguring Advanced Features If the switch already has a static VLAN assignment with the same VID as in the adv

Page 166

9-78Configuring Advanced Features GVRPConfiguring Advanced FeaturesTable 9-8. Options for Handling “Unknown VLAN” Advertisements:The CLI show gvrp

Page 167

9-79Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesPer-Port Options for Dynamic VLAN Advertising and JoiningInitiating Advertisements.

Page 168

2-5Using the Menu InterfaceStarting and Ending a Menu SessionUsing the Menu InterfaceFigure 2-2. An Asterisk Indicates a Configuration Change Requirin

Page 169 - Configuring Trap Receivers

9-80Configuring Advanced Features GVRPConfiguring Advanced FeaturesAs the above table indicates, when you enable GVRP, a port that has a Tagged or

Page 170

9-81Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesPlanning for GVRP OperationThese steps outline the procedure for setting up dynamic

Page 171 - Configuring Advanced Features

9-82Configuring Advanced Features GVRPConfiguring Advanced Features2. Switch Configuration . . .8. VLAN Menu . . . 1. VLAN SupportFigure 9-60. Th

Page 172 - Stack Management

9-83Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesCLI: Viewing and Configuring GVRPGVRP Commands Used in This SectionDisplaying the Sw

Page 173 - Features

9-84Configuring Advanced Features GVRPConfiguring Advanced FeaturesEnabling and Disabling GVRP on the Switch. This command enables GVRP on the sw

Page 174 - General Stacking Operation

9-85Configuring Advanced FeaturesGVRPConfiguring Advanced FeaturesDisplaying the Static and Dynamic VLANs Active on the Switch. The show vlans comman

Page 175 - Operating Rules for Stacking

9-86Configuring Advanced Features GVRPConfiguring Advanced FeaturesConverting a Dynamic VLAN to a Static VLAN. If a port on the switch has joined

Page 176 - Specific Rules

9-87Configuring Advanced FeaturesGVRPConfiguring Advanced Features By receiving advertisements from other devices running GVRP, the switch learns of

Page 177

9-88Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesMultimedia Traffic Control with

Page 178

9-89Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesEnabling IGMP allows the ports to det

Page 179

2-6Using the Menu InterfaceMain Menu FeaturesUsing the Menu InterfaceMain Menu Features Figure 2-3. The Main Menu View with Manager PrivilegesThe Main

Page 180

9-90Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Features• Blocked: Causes the switch to

Page 181

9-91Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesViewing the Current IGMP Configuratio

Page 182 - Configure Stacking

9-92Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesFigure 9-66. Example Listing of

Page 183

9-93Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesConfiguring Per-Port IGMP Packet Cont

Page 184

9-94Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesSMC TigerSwitch 10/100(vlan 1)#

Page 185

9-95Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Featuresto or from the same source(s) is term

Page 186 - – To change

9-96Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced Features Switch 2 is recognizing IGMP t

Page 187

9-97Configuring Advanced FeaturesMultimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesFigure 9-68. Isolating IP Multicast

Page 188 - Save) to

9-98Configuring Advanced Features Multimedia Traffic Control with IP Multicast (IGMP)Configuring Advanced FeaturesNote: IP Multicast Filters. IP

Page 189

9-99Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesSpanning Tree Protocol (STP)STP FeaturesThe switch uses the

Page 190 - 4. Stack Management

2-7Using the Menu InterfaceMain Menu FeaturesUsing the Menu Interface Command Line (CLI): Selects the Command Line Interface at the same level (Manag

Page 191

9-100Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesSTP Fast Mode for Overcoming Server Access Failures.

Page 192

9-101Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced Features)Figure 9-69. Example of the STP Configuration Screen4. If

Page 193

9-102Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesCLI: Configuring STPSTP Commands Used in This SectionV

Page 194

9-103Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesEnabling or Disabling STP. Enabling STP implements the spa

Page 195 - Monitoring Stack Status

9-104Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesYou can also include one or more of the STP per-port p

Page 196 - For status descriptions

9-105Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesFor example, the following enables STP (if it is not alread

Page 197

9-106Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesFigure 9-71. Example of Redundant Paths Between Two N

Page 198 - 9. Stacking

9-107Configuring Advanced FeaturesSpanning Tree Protocol (STP)Configuring Advanced FeaturesCaution The Fast Mode configuration should be used only on

Page 199 - Stacking

9-108Configuring Advanced Features Spanning Tree Protocol (STP)Configuring Advanced FeaturesFigure 9-72. Example of Using a Trunked Link with STP

Page 200

10-1Monitoring and Analyzing Switch Operation10Monitoring and Analyzing Switch OperationThe SMC6624M switch has several built-in tools for monitoring,

Page 201

2-8Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceScreen Structure and NavigationMenu interface screens include these

Page 202

10-2Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationStatus and Counters DataThis section des

Page 203

10-3Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access To Status and Counters Begin

Page 204

10-4Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationGeneral System InformationMenu AccessFro

Page 205

10-5Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationSwitch Management Address InformationMen

Page 206 - listing

10-6Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationPort StatusThe web browser interface and

Page 207

10-7Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationViewing Port and Trunk Group StatisticsT

Page 208 - Stack Commander

10-8Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access to Port and Trunk Statistics

Page 209

10-9Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationCLI Access To Port and Trunk Group Stati

Page 210 - Auto Join parameter

10-10Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationViewing the Switch’s MAC Address Tables

Page 211

10-11Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationMenu Access to the MAC Address Views an

Page 212 - 1 - 15)

2-9Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceTable 4-1. How To Navigate in the Menu Interface Task: Actions:Execu

Page 213

10-12Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch Operation2. Type the MAC address you want to loc

Page 214

10-13Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationEnter MAC address: _2. Type the MAC add

Page 215 - Transmission Interval

10-14Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationSpanning Tree Protocol (STP) Informatio

Page 216

10-15Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationFigure 10-11.Example of STP Port Inform

Page 217 - Status Messages

10-16Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationInternet Group Management Protocol (IGM

Page 218

10-17Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationVLAN InformationThe switch uses the CLI

Page 219

10-18Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationListing the VLAN ID (VID) and Status fo

Page 220 - SMC6624M

10-19Monitoring and Analyzing Switch OperationStatus and Counters DataMonitoring and Analyzing Switch OperationWeb Browser Interface Status Informatio

Page 221 - Overview of Using VLANs

10-20Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationPort Monitoring Features Port Monitorin

Page 222

10-21Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationMenu: Configuring Port MonitoringThis p

Page 223

6 HughesIrvine, CA 92618Phone: (949) 707-2400TigerSwitch 10/100Management GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsJuly 2001P

Page 224 - Notes on Using VLANs

2-10Using the Menu InterfaceScreen Structure and NavigationUsing the Menu InterfaceTo get Help on individual parameter descriptions. In most screens

Page 225

10-22Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-17. How To Select a Monitorin

Page 226 - VLANs setting

10-23Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch Operationiv. Press [Enter], then press [S] (for

Page 227 - Adding or Editing VLAN Names

10-24Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-19.Example of Monitored Port

Page 228 - VLAN and ID

10-25Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch OperationFigure 10-21.Examples of Removing Ports

Page 229

10-26Monitoring and Analyzing Switch OperationPort Monitoring FeaturesMonitoring and Analyzing Switch Operation

Page 230

11-1Troubleshooting11TroubleshootingThis chapter addresses performance-related network problems that can be caused by topology, switch configuration,

Page 231

11-2TroubleshootingTroubleshooting ApproachesTroubleshootingTroubleshooting ApproachesUse these approaches to diagnose switch problems: Check the swi

Page 232

11-3TroubleshootingBrowser or Console Access ProblemsTroubleshootingBrowser or Console Access ProblemsCannot access the web browser interface: Acces

Page 233

11-4TroubleshootingBrowser or Console Access ProblemsTroubleshootingCannot Telnet into the switch console from a station on the network: Telnet acce

Page 234 - Showing the result

11-5TroubleshootingUnusual Network ActivityTroubleshootingUnusual Network ActivityNetwork activity that exceeds accepted norms may indicate a hardware

Page 235

2-11Using the Menu InterfaceRebooting the SwitchUsing the Menu InterfaceRebooting the SwitchRebooting the switch from the menu interface Terminates a

Page 236 - ■ Select a new Primary VLAN

11-6TroubleshootingUnusual Network ActivityTroubleshootingIP addresses that will expire after a limited duration. One solution is to configure “reserv

Page 237 - VLAN Tagging Information

11-7TroubleshootingUnusual Network ActivityTroubleshootingProblems Related to Spanning-Tree Protocol (STP)Caution If you enable STP, it is recommended

Page 238 - ■ In switch Y:

11-8TroubleshootingUnusual Network ActivityTroubleshootingVLAN-Related ProblemsMonitor Port. When using the monitor port in a multiple VLAN environ-m

Page 239

11-9TroubleshootingUnusual Network ActivityTroubleshooting1. If VLAN_1 (VID=1) is configured as “Untagged” on port 3 on switch “X”, then it must also

Page 240

11-10TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingUsing the Event Log To Identify Problem SourcesThe Event Log records

Page 241 - IP Interfaces

11-11TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingTable 11-1. Event Log System ModulesMenu: Entering and Navigating in

Page 242 - Port Monitoring

11-12TroubleshootingUsing the Event Log To Identify Problem SourcesTroubleshootingThe log status line at the bottom of the display identifies where in

Page 243 - VLAN Restrictions

11-13TroubleshootingDiagnostic ToolsTroubleshootingDiagnostic ToolsDiagnostic FeaturesPing and Link TestsThe Ping test and the Link test are point-to-

Page 244

11-14TroubleshootingDiagnostic ToolsTroubleshootingWeb: Executing Ping or Link TestsFigure 11-12.Link and Ping Test Screen on the Web Browser Interfac

Page 245 - General Operation

11-15TroubleshootingDiagnostic ToolsTroubleshootingNumber of Packets to Send is the number of times you want the switch to attempt to test a connectio

Page 246

2-12Using the Menu InterfaceRebooting the SwitchUsing the Menu InterfaceRebooting To Activate Configuration Changes. Configuration changes for most p

Page 247

11-16TroubleshootingDiagnostic ToolsTroubleshootingLink Tests. You can issue single or multiple link tests with varying repititions and timeout perio

Page 248 - Default:

11-17TroubleshootingDiagnostic ToolsTroubleshootingDisplaying the Configuration FileThe complete switch configuration is contained in a file that you

Page 249

11-18TroubleshootingDiagnostic ToolsTroubleshootingCLI Administrative and Troubleshooting CommandsThese commands provide information or perform action

Page 250 - GVRP and VLAN Access Control

11-19TroubleshootingRestoring the Factory-Default ConfigurationTroubleshootingRestoring the Factory-Default ConfigurationAs part of your troubleshooti

Page 251 - Configuring GVRP On a Switch

11-20TroubleshootingRestoring the Factory-Default ConfigurationTroubleshooting

Page 252

A-1Transferring an Operating System or Startup ATransferring an Operating System or Startup Configuration FileYou can download new switch software (op

Page 253

A-2Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Using

Page 254

A-3Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Menu:

Page 255

A-4Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup A “pr

Page 256 - GVRP Operating Notes

A-5Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup 2. En

Page 257

2-13Using the Menu InterfaceMenu Features ListUsing the Menu InterfaceMenu Features ListStatus and Counters• General System Information• Switch Manage

Page 258 - Multicast (IGMP)

A-6Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup Using

Page 259

A-7Transferring an Operating System or Startup Configuration FileDownloading an Operating System (OS)Transferring an Operating System or Startup For e

Page 260

A-8Transferring an Operating System or Startup Configuration FileTroubleshooting TFTP DownloadsTransferring an Operating System or Startup Troubleshoo

Page 261

A-9Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup Anoth

Page 262

A-10Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup TFTP:

Page 263

A-11Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup Xmodem

Page 264 - How IGMP Operates

A-12Transferring an Operating System or Startup Configuration FileTransferring Switch ConfigurationsTransferring an Operating System or Startup

Page 265 - Role of the Switch

B-1MAC Address ManagementBMAC Address ManagementThe switch assigns MAC addresses in these areas: For management functions:• One Base MAC address assi

Page 266

B-2MAC Address ManagementDetermining MAC AddressesMAC Address ManagementMenu: Viewing the Switch’s MAC AddressesThe Management Address Information scr

Page 267

B-3MAC Address ManagementDetermining MAC AddressesMAC Address ManagementCLI: Viewing the Port and VLAN MAC Addresses The MAC address assigned to each

Page 268

2-14Using the Menu InterfaceWhere To Go From HereUsing the Menu InterfaceWhere To Go From HereThis chapter provides an overview of the menu interface

Page 269 - Spanning Tree Protocol (STP)

B-4MAC Address ManagementDetermining MAC AddressesMAC Address Management

Page 270 - Menu: Configuring STP

C-1Switch Memory and ConfigurationCSwitch Memory and ConfigurationThis appendix describes the following: How switch memory manages configuration chan

Page 271

C-2Switch Memory and ConfigurationOverview of Configuration File ManagementSwitch Memory and Configuration Startup-config File: Exists in flash (non-

Page 272 - CLI: Configuring STP

C-3Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and ConfigurationThe above command disables port 5 in

Page 273

C-4Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and Configuration2. Use the appropriate show commands

Page 274

C-5Switch Memory and ConfigurationUsing the CLI To Implement Configuration ChangesSwitch Memory and ConfigurationIf you use the CLI to change a parame

Page 275 - How STP Operates

C-6Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and ConfigurationHow To Re

Page 276 - STP Fast Mode

C-7Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and ConfigurationNote The

Page 277

C-8Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configurationface, the

Page 278

C-9Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configuration(To acces

Page 279 - Switch Operation

3-1Using the Command Line Interface (CLI)3Using the Command Line Interface (CLI)The CLI is a text-based command interface for configuring and monitori

Page 280 - Status and Counters Data

C-10Switch Memory and ConfigurationUsing the Menu and Web Browser Interfaces To Implement Configuration ChangesSwitch Memory and Configuration

Page 281

D-1Daylight Savings TimeDDaylight Savings TimeThe SMC6624M switch provides a way to automatically adjust the system clock for Daylight Savings Time (D

Page 282 - General System Information

D-2Daylight Savings TimeDaylight Savings TimeFigure D-1. Menu Interface with “User-Defined” Daylight Time Rule OptionBefore configuring a “User define

Page 283 - CLI Access

Index – 1IndexNumerics802.1Q VLAN standard … 9-99802.3u auto negotiation standard … 6-2Aaccessmanager … 8-5operator … 8-5access levels, authorized IP

Page 284 - Port Status

2 – IndexIndexquick … 2-7restoring factory defaults … 11-19saving from menu interface … 2-9serial link … 5-15SNMP … 8-3, 8-5spanning tree … 9-99spanni

Page 285

Index – 3IndexGGARPSee GVRPgateway … 5-2, 5-4gateway (IP) address … 5-3, 5-5GVRPadvertisement … 9-75, 9-87advertisement, defined … 9-74advertisement,

Page 286

4 – IndexIndexconfiguration … 5-2DHCP/Bootp … 5-2duplicate address … 11-5duplicate address, DHCP network … 11-5effect when address not used … 5-9gatew

Page 287

Index – 5Indexmulticast groupSee IGMPmultimediaSee IGMPmultiple VLAN … 8-1multi-port bridge … 5-1Nnavigation, console interface … 2-8 –2-9navigation,

Page 288

6 – IndexIndexoperating notes … 7-26overview … 7-7port trunk restriction … 6-10prior to … 7-27proxy web server … 7-27trunk restriction … 6-14port trun

Page 289

Index – 7Indexauthorized IP managers … 7-28per port … 7-7security violationsnotices of … 7-20Self Test LEDbehavior during factory default reset … 11-1

Page 290

3-2Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)When you use the CLI to make a configuration change, the s

Page 291

8 – IndexIndextraffic analysis … 8-1traffic monitoring … 8-1, 8-4traffic, monitoring … 10-20traffic, port … 10-7transceiver, fiber-optic … 6-3transcei

Page 292 - Menu Access to STP Data

Index – 9Indexprimary, CLI command … 9-61, 9-63primary, select in menu … 9-56primary, web configure … 9-66primary, with DHCP … 9-54reboot required … 2

Page 295 - VLAN Information

6 HughesIrvine, CA 92618Phone: (949) 707-2400FOR TECHNICAL SUPPORT, CALL:From U.S.A. and Canada (24 hours, 7 days a week)(800) SMC-4-YOU; (949) 707-24

Page 296

3-3Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Caution SMC strongly recommends that you configure a Manag

Page 297

3-4Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Manager Privileges Manager privileges give you three addit

Page 298 - Port Monitoring Features

3-5Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI) SMC TigerSwitch 10/100(vlan-10)#Changing Interfa

Page 299

Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, n

Page 300

3-6Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)How To Move Between LevelsMoving Between the CLI and the M

Page 301

3-7Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)For example, if you use the CLI to set a Manager password,

Page 302

3-8Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Typing ? at the Manager level produces this listing:Figure

Page 303

3-9Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)As mentioned above, if you type part of a command word and

Page 304

3-10Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Thus, if you wanted to create a port trunk group using po

Page 305 - Troubleshooting

3-11Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-7. Example of Context-Sensitive Command-List Hel

Page 306 - Troubleshooting Approaches

3-12Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-9. Example of Help for a Specific Instance of a

Page 307

3-13Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)Figure 3-10. Context-Specific Commands Affecting Port Con

Page 308

3-14Using the Command Line Interface (CLI)Using the CLIUsing the Command Line Interface (CLI)VLAN Context. Includes VLAN-specific commands that apply

Page 309 - Unusual Network Activity

3-15Using the Command Line Interface (CLI)CLI Control and EditingUsing the Command Line Interface (CLI)CLI Control and EditingKeystrokes Function[Ctrl

Page 310 - IGMP-Related Problems

iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Page 311 - Timep or Gateway Problems

3-16Using the Command Line Interface (CLI)CLI Control and EditingUsing the Command Line Interface (CLI)

Page 312 - VLAN-Related Problems

4-1Using the Web Browser Interface4Using the Web Browser InterfaceThe web browser interface built into the switch lets you easily access the switch fr

Page 313

4-2Using the Web Browser InterfaceGeneral FeaturesUsing the Web Browser InterfaceGeneral FeaturesThe SMC6624M switch includes these web browser interf

Page 314

4-3Using the Web Browser InterfaceWeb Browser Interface RequirementsUsing the Web Browser Interface Web Browser Interface RequirementsYou can use equi

Page 315

4-4Using the Web Browser InterfaceStarting a Web Browser Interface Session with the SwitchUsing the Web Browser InterfaceStarting a Web Browser Interf

Page 316 - ■ All events recorded

4-5Using the Web Browser InterfaceStarting a Web Browser Interface Session with the SwitchUsing the Web Browser InterfaceFigure 4-1. Example of Status

Page 317 - Diagnostic Tools

4-6Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceTasks for Your First Web Browser In

Page 318

4-7Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceThis window is the launching point

Page 319 - CLI: Ping or Link Tests

4-8Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser InterfaceTo set the passwords:1. Access the

Page 320

4-9Using the Web Browser InterfaceTasks for Your First Web Browser Interface SessionUsing the Web Browser Interface Entering the operator password gi

Page 321

LIMITED WARRANTYiiMAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF SMC OR ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF

Page 322

4-10Using the Web Browser InterfaceSupport/Mgmt URL FeatureUsing the Web Browser InterfaceSupport/Mgmt URL FeatureThe Support/Mgmt URL window enables

Page 323 - Configuration

4-11Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceStatus Reporting FeaturesBrowser elements covered in this s

Page 324

4-12Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceThe Port Utilization and Status DisplaysThe Port Utilizatio

Page 325

4-13Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser Interface Maximum Activity Indicator: As the bars in the graph area

Page 326

4-14Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfacePort StatusFigure 4-10. The Port Status Indicators and Lege

Page 327 - System or Startup

4-15Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceThe Alert LogThe web browser interface Alert Log, shown in

Page 328 - Switch-to-Switch Download

4-16Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceAlert TypesThe following table lists the types of alerts th

Page 329

4-17Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceNote When troubleshooting the sources of alerts, it may be

Page 330 - Menu: Xmodem Download

4-18Using the Web Browser InterfaceStatus Reporting FeaturesUsing the Web Browser InterfaceTable 4-3. Status Indicator Key System Name. The name you

Page 331

5-1Configuring IP Addressing, Interface Access, and 5Configuring IP Addressing, Interface Access, and System InformationThis chapter describes the swi

Page 332 - Message Indicating

iiiContentsContents1 Selecting a Management InterfaceUnderstanding Management Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Advant

Page 333

5-2Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and IP Configu

Page 334

5-3Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Timep Operation

Page 335

5-4Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and The IP a

Page 336

5-5Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and To Configure IP

Page 337 - MAC Address Management

5-6Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and 6. If you

Page 338 - Determining MAC Addresses

5-7Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Viewing the Cur

Page 339

5-8Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Configure

Page 340

5-9Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and In the CLI, you

Page 341 - Management

5-10Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Table 5-1

Page 342

5-11Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and 1. DHCP/Bootp

Page 343 - Configuration Changes

ivContentsCLI Control and Editing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-154 Using the Web Browser InterfaceGe

Page 344

5-12Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Bootp Ope

Page 345 - Switch Memory and

5-13Configuring IP Addressing, Interface Access, and System InformationIP ConfigurationConfiguring IP Addressing, Interface Access, and Note The above

Page 346

5-14Configuring IP Addressing, Interface Access, and System Information IP ConfigurationConfiguring IP Addressing, Interface Access, and Globally

Page 347

5-15Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad

Page 348 - VLANs to support

5-16Configuring IP Addressing, Interface Access, and System Information Interface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring

Page 349

5-17Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad

Page 350

5-18Configuring IP Addressing, Interface Access, and System Information Interface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring

Page 351 - Daylight Savings Time

5-19Configuring IP Addressing, Interface Access, and System InformationInterface Access: Console/Serial Link, Web, and Inbound TelnetConfiguring IP Ad

Page 352

5-20Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and System

Page 353 - Numerics

5-21Configuring IP Addressing, Interface Access, and System InformationSystem InformationConfiguring IP Addressing, Interface Access, and Daylight Tim

Page 354 - 2 – Index

vContentsWeb: Configuring IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9How IP Addressing Affects Switch Operation .

Page 355 - Index – 3

5-22Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and CLI: Vi

Page 356 - 4 – Index

5-23Configuring IP Addressing, Interface Access, and System InformationSystem InformationConfiguring IP Addressing, Interface Access, and Figure 5-10.

Page 357 - Index – 5

5-24Configuring IP Addressing, Interface Access, and System Information System InformationConfiguring IP Addressing, Interface Access, and Configu

Page 358 - 6 – Index

6-1Optimizing Port Usage Through Traffic Control and 6Optimizing Port Usage Through Traffic Control and Port TrunkingOverviewThis chapter includes: C

Page 359 - Index – 7

6-2Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Page 360 - 8 – Index

6-3Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra

Page 361 - Index – 9

6-4Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Page 362 - 10 – Index

6-5Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra

Page 363

6-6Optimizing Port Usage Through Traffic Control and Port Trunking Viewing Port Status and Configuring Port ParametersOptimizing Port Usage Throug

Page 364

6-7Optimizing Port Usage Through Traffic Control and Port TrunkingViewing Port Status and Configuring Port ParametersOptimizing Port Usage Through Tra

Commentaires sur ces manuels

Pas de commentaire