SMC Networks 6709GL2 INT Management Manual

Tigerswitch 10/100 9-port fast ethernet switch
Table of Contents

Advertisement

Quick Links

TigerSwitch 10/100
9-Port Fast Ethernet Switch
8 10BASE-T/100BASE-TX ports, 1 1000BASE-LX
MMF port
1.8 Gbps aggregate bandwidth
Spanning Tree Protocol
Port mirroring for non-intrusive analysis
QoS support with two priority queues
Full support for VLANs with GVRP
IP multicasting with IGMP snooping
Security filtering based on MAC addresses
Manageable via console, Web, SNMP/RMON

Management Guide

SMC6709GL2

Advertisement

Table of Contents
loading

Summary of Contents for SMC Networks 6709GL2 INT

  • Page 1: Management Guide

    TigerSwitch 10/100 9-Port Fast Ethernet Switch 8 10BASE-T/100BASE-TX ports, 1 1000BASE-LX MMF port 1.8 Gbps aggregate bandwidth Spanning Tree Protocol Port mirroring for non-intrusive analysis QoS support with two priority queues Full support for VLANs with GVRP IP multicasting with IGMP snooping Security filtering based on MAC addresses Manageable via console, Web, SNMP/RMON Management Guide...
  • Page 3 TigerSwitch 10/100 Management Guide From SMC’s Tiger line of feature-rich workgroup LAN solutions 38 Tesla Irvine, CA 92618 March 2004 Phone: (949) 679-8000...
  • Page 4 Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC.
  • Page 5: Table Of Contents

    ONTENTS Introduction ......1-1 Key Features ..........1-1 Description of Software Features .
  • Page 6 ONTENTS Aggregator Information ......3-18 State Activity ........3-20 Forwarding and Filtering .
  • Page 7 ONTENTS Switch Static Configuration Menu ......4-10 Administration Configuration Menu ..... 4-11 Configuring Device Information .
  • Page 8 ONTENTS Software Specifications ....A-1 Switch Features ..........A-1 Management Features .
  • Page 9: Introduction

    HAPTER NTRODUCTION This switch provides a broad range of features for switching. It includes a management agent that allows you to configure the features listed in this manual. The default configuration can be used for most of the features provided by this switch. However, there are many options that you should configure to maximize the switch’s performance for your particular network environment.
  • Page 10: Description Of Software Features

    NTRODUCTION Description of Software Features IEEE 802.1D Bridge – The switch supports IEEE 802.1D transparent bridging. The address table facilitates data switching by learning addresses, and then filtering or forwarding traffic based on this information. The address table supports up to 8K addresses. Store-and-Forward Switching –...
  • Page 11 ESCRIPTION OF OFTWARE EATURES • Simplify network management for node changes/moves by remotely configuring VLAN membership for any port, rather than having to manually change the network connection. • Provide data security by restricting all traffic to the originating VLAN. Port Mirroring –...
  • Page 12: System Defaults

    NTRODUCTION Multicast Filtering – Specific multicast traffic can be assigned to its own VLAN to ensure that it does not interfere with normal network traffic and to guarantee real-time delivery by setting the required priority level for the designated VLAN. The switch uses IGMP Snooping and Query to manage multicast group registration.
  • Page 13 YSTEM EFAULTS Function Parameter Default Spanning Tree Status Enabled Protocol (Defaults: All values based on IEEE 802.1D) Address Table Aging Time 300 seconds Forwarding and Filtering Static addresses: none Filter addresses: none Multicast IGMP Snooping Disabled Filtering IGMP Query Auto-negotiation Virtual LANs VLAN Status Disabled...
  • Page 14 NTRODUCTION...
  • Page 15: Initial Configuration

    HAPTER NITIAL ONFIGURATION Connecting to the Switch Configuration Options The switch includes a built-in network management agent. The agent offers a variety of management options, including SNMP, RMON, and a Web-based interface. A PC may also be connected directly to the switch for configuration and monitoring via the console menu.
  • Page 16: Required Connections

    NITIAL ONFIGURATION • Configure SNMP parameters • Enable/disable any Ethernet port • Set the speed/duplex mode for any port • Configure up to 128 IEEE 802.1Q VLANs • Enable GVRP automatic VLAN registration • Configure IGMP multicast filtering • Upload and download system firmware via TFTP •...
  • Page 17: Remote Connections

    ONNECTING TO THE WITCH • Select the appropriate serial port (COM port 1 or COM port 2). • Set the data rate to 9600 baud. • Set the data format to 8 data bits, 1 stop bit, and no parity. •...
  • Page 18: Basic Configuration

    NITIAL ONFIGURATION Basic Configuration Console Connection Access to the console menu is controlled by a user name and password. The default setting is “admin” for both the user name and password. To log into the console menu, perform these steps: 1.
  • Page 19: Setting An Ip Address

    ASIC ONFIGURATION 4. Select “Change Password” and press <Enter>. • Type the old password and press <Enter>. • Type the new password and press <Enter>. • Then re-enter the new password for verification, press <Enter>. Setting an IP Address You must establish IP address information for the switch to obtain management access through the network.
  • Page 20 NITIAL ONFIGURATION To assign an IP address to the switch, complete the following steps: 1. Navigate from the Main Menu to – Switch Static Configuration, Administration Configuration, and then IP Configuration. 2. Select <Edit>, type in the IP Address, Subnet Mask, and Gateway. Press <Enter>...
  • Page 21: Enabling Snmp Management Access

    The switch can be configured to accept management commands from Simple Network Management Protocol (SNMP) applications such as SMC’s EliteView. You also can configure the switch to generate SNMP traps. When SNMP management stations send requests to the switch (either to return information or to set a parameter), the switch provides the requested data or sets the specified parameter.
  • Page 22 NITIAL ONFIGURATION 4. Use the scroll-bar to toggle the Write Access Field to “Restricted” or “Unrestricted.” 5. Press <Ctrl-A> to return to the action bar at the bottom of the screen. Select <Save> and press any key to continue. (The community string shown below is an example.) Tiger Switch 10/100 6709GL2 : Add SNMP Community ===========================...
  • Page 23: Configuring The Switch

    HAPTER ONFIGURING THE WITCH Using the Web Interface This switch provides an embedded HTTP Web agent. Using a Web browser you can configure the switch and view statistics to monitor network activity. The Web agent can be accessed by any computer on the network using a standard Web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above.) Note: You can also use the console menu to manage the switch over a...
  • Page 24: Navigating The Web Browser Interface

    ONFIGURING THE WITCH Navigating the Web Browser Interface To access the Web-browser interface you must first enter a user name and password. The administrator has Read/Write access to all configuration parameters and statistics. The default user name and password for the administrator is “admin.”...
  • Page 25: Configuration Options

    ANEL ISPLAY Configuration Options Configurable parameters have a dialog box or a drop-down list. Once a configuration change has been made on a page, be sure to click on the “Apply” button to confirm the new setting. The following table summarizes the Web page configuration buttons.
  • Page 26: Main Menu

    ONFIGURING THE WITCH Main Menu Using the onboard Web agent, you can define system parameters, manage and control the switch, or monitor network conditions. The following table briefly describes the selections available from this program. Menu Description Page Home Main Menu Port Status Displays port connection status 3-10...
  • Page 27 Menu Description Page VLAN Configuration 3-27 Basic Configures VLAN groups, including name, 3-28 identifier, and if limited to a specific protocol 3-29 Port VID Sets port VID and ingress filters 3-32 Spanning Tree Configures global bridge and port settings 3-34 for STP;...
  • Page 28: Basic System Information

    ONFIGURING THE WITCH Basic System Information Use the Switch Settings page to display basic information on the switch, including hardware/firmware version numbers for the main board and management software. Field Attributes • Description – Switch model number. • MAC Address – The physical layer address for this switch. •...
  • Page 29 LOBAL WITCH ETTINGS • Broadcast Storm Control – Broadcast storms may occur when a device on your network is malfunctioning, or if application programs are not well designed or properly configured. If there is too much broadcast traffic on your network, performance can be severely degraded or everything can come to a complete halt.
  • Page 30: Class Of Service Configuration

    ONFIGURING THE WITCH Class of Service Configuration Class of Service (CoS) allows you to specify which data packets have greater precedence when traffic is buffered in the switch due to congestion. This switch supports CoS with two priority queues for each port.
  • Page 31: Console Port Settings

    ONSOLE ETTINGS bound for low-priority packets if required, select the priority tags that will be processed by the high-priority queue, and then click Apply. Console Port Settings If you have access to the Web interface, but are having problems connecting to the console port, you can display the current connection parameters via the Console Information page, and adjust the settings for the PC or terminal connected to this port.
  • Page 32: Port Configuration

    ONFIGURING THE WITCH Port Configuration Displaying Connection Status Use the Port Status page to display the current connection status, including link state, auto-negotiation, speed/duplex mode, and flow control. Notes: 1. To set the port status, use the Port Control page as described under “Configuring Interface Connections”...
  • Page 33: Configuring Interface Connections

    ONFIGURATION Configuring Interface Connections Use the Port Controls pages to enable/disable an interface, set auto-negotiation, or manually set the speed and duplex mode, and flow control parameters. Field Attributes • State – Allows you to manually disable an interface. You can disable an interface due to abnormal behavior (e.g., excessive collisions), and then reenable it after the problem has been resolved.
  • Page 34: Showing Port Statistics

    ONFIGURING THE WITCH Showing Port Statistics You can display standard statistics on network traffic from the Interfaces Group MIB, Ethernet-like MIB, and RMOM MIB. These statistics display errors on the traffic passing through each port. This information can be used to identify potential problems with the switch (such as a faulty port or unusually heavy loading).
  • Page 35: Trunk Configuration

    RUNK ONFIGURATION Web – Click Port Statistics. You can use the Reset button at the bottom of the page to update the screen. Trunk Configuration The switch supports both static trunking and dynamic Link Aggregation Control Protocol (LACP). You can create multiple links between devices that work as one virtual, aggregate link.
  • Page 36: Configuring Static Trunks

    ONFIGURING THE WITCH • The ports at both ends of a trunk must be configured in an identical manner, including communication mode (i.e., speed, duplex mode and flow control), VLAN assignments, and CoS settings. • All the ports in a trunk have to be treated as a whole when moved from/ to, added or deleted from a VLAN.
  • Page 37 RUNK ONFIGURATION Web – Click Administrator=>Trunking=>Aggregator Setting. Select the group ID and click the Get button to display the settings for the specified group. Set LACP to “Disable.” Use the Add and Remove buttons to assign port members, and then click Apply. Click Administrator=>Trunking=>Aggregator Information to display currently configured static trunks and group members.
  • Page 38: Configuring Dynamic Trunks

    ONFIGURING THE WITCH Configuring Dynamic Trunks Ports configured for LACP can automatically negotiate a trunked link with LACP-configured ports on another device. Command Usage • To avoid creating a loop in the network, be sure you enable LACP before connecting the ports; also disconnect the ports before disabling LACP. •...
  • Page 39: Aggregator Setting

    RUNK ONFIGURATION Aggregator Setting Field Attributes • System Priority – A value used to select the device that initiates an LACP trunk. The device with the lowest value has the highest priority and will be selected as the active LACP partner. •...
  • Page 40: Aggregator Information

    ONFIGURING THE WITCH Aggregator Information Field Attributes Static Trunks • Group Key – Displays static trunks. • Port No – The port members assigned to the trunk. Dynamic Trunks • Actor – The device that initiated the trunk. • Partner – The device that responded to a link initialization request. •...
  • Page 41 RUNK ONFIGURATION Web – Click Administrator=>Trunking=>Aggregator Information to display currently configured trunks and group members. 3-19...
  • Page 42: State Activity

    ONFIGURING THE WITCH State Activity Set the port members to actively or passively initiate an LACP trunk. Field Attributes • Port – Lists all ports that can be configured as LACP trunk members. • LACP State Activity – When set to Active, a port can automatically initiate a trunk if an LACP partner is detected at the other end of the link.
  • Page 43: Forwarding And Filtering

    ORWARDING AND ILTERING Forwarding and Filtering This switch supports the following types of traffic filtering: • Multicast Filtering – This switch can forward multicast traffic to host devices that request to join a multicast service, and filter multicast traffic for all other ports which do not require multicast services. •...
  • Page 44 ONFIGURING THE WITCH The purpose of multicast filtering is to optimize a switched network’s performance, so multicast packets will only be forwarded to those ports containing multicast group hosts or multicast routers/switches, instead of flooding traffic to all ports in the subnet. You can enable IGMP Snooping and Query via the Switch Settings menu, and display information about multicast traffic being forwarded by the switch via the Filtering Database menu as shown below.
  • Page 45 ORWARDING AND ILTERING Click Administrator=>Filtering Database=>IGMP Snooping. 3-23...
  • Page 46: Setting Static Addresses

    ONFIGURING THE WITCH Setting Static Addresses A static address can be assigned to a specific interface on this switch. Traffic sent from devices listed in the static address table will only be accepted on the specified interface. If any packets with a source address listed in this table enter another interface, they will be dropped.
  • Page 47: Configuring Port Security

    ORWARDING AND ILTERING Configuring Port Security If you enable port security, the switch will stop learning new addresses on the specified port. Only incoming traffic with source addresses already stored in the dynamic address table will be accepted. The MAC addresses already in the address table will be retained and will not age out.
  • Page 48: Configuring Address Filtering

    ONFIGURING THE WITCH Configuring Address Filtering You can drop traffic from unwanted stations based on the source MAC address (and associated VLAN if tagged VLANs are enabled). Field Attributes • MAC Address – Source MAC address. • Vlan ID – ID of configured VLAN (1-4094). This option is only available if IEEE 802.1Q tagged VLANs are enabled (page 3-29).
  • Page 49: Vlan Configuration

    VLAN C ONFIGURATION VLAN Configuration Overview In large networks, routers are used to isolate broadcast traffic for each subnet into separate domains. This switch provides a similar service by using VLANs to organize any group of network nodes into separate broadcast domains.
  • Page 50: Port-Based Vlans

    ONFIGURING THE WITCH Port-based VLANs Port-based VLANs are typically used to reduce broadcast traffic and to increase security. A group of network users assigned to a VLAN form a broadcast domain that is separate from other VLANs configured on the switch.
  • Page 51: Tag-Based Vlans

    VLAN C ONFIGURATION Tag-based VLANs An IEEE 802.1Q VLAN is a group of ports located anywhere in the network, but communicate as though they belong to the same physical segment by using frame tags to indicate VLAN membership. Tagged VLANs can help to simplify network management by allowing you to move devices to a new VLAN without having to change any physical connections.
  • Page 52 ONFIGURING THE WITCH not overlap, but still need to communicate, you can connect them by using a Layer-3 router or switch. Protocol VLANs – This switch also supports VLANs based on specific protocol types, such as IPX and AppleTalk. When a protocol is bound to a VLAN, the switch will only forward packets carrying the specified protocol tag.
  • Page 53: Creating Tagged Vlans

    VLAN C ONFIGURATION Creating Tagged VLANs Web – Click Administrator=>Switch Settings=>Advanced. Set VLAN Operation Mode to 802.1Q with or without GVRP, then click Apply. Click Administrator=>VLAN Configuration=>Basic. Click Add to create a group. Enter the VLAN Name (1-15 characters) and Group ID (2-4094). Select a protocol type if you want to create a protocol based VLAN.
  • Page 54: Configuring The Pvid And Ingress Filters

    ONFIGURING THE WITCH Set each port to transmit tagged or untagged frames, then click Apply. Configuring the PVID and Ingress Filters You also need to configure the default port VLAN ID (PVID), ingress filtering, and acceptable frame types. Field Attributes •...
  • Page 55 VLAN C ONFIGURATION Web – Click Administrator=>VLAN Configuration=>Port VID. Set the PVID and Ingress Filtering rules, then click Apply. 3-33...
  • Page 56: Spanning Tree Protocol Configuration

    ONFIGURING THE WITCH Spanning Tree Protocol Configuration The Spanning Tree Protocol (STP) detects and disables network loops and provides backup links between switches, bridges, and routers to ensure that only one route exists between any two stations on the network. The backup links automatically take over when a primary link goes down.
  • Page 57 PANNING ROTOCOL ONFIGURATION information (provided in the last configuration message) becomes the designated port for the attached LAN. If it is a root port, a new root port is selected from among the device ports attached to the network. - Default: 20 - Minimum: The higher of 6 or [2 x (Hello Time + 1)] - Maximum: The lower of 40 or [2 x (Forward Delay - 1)] •...
  • Page 58: Displaying Information About The Root Bridge

    ONFIGURING THE WITCH Displaying Information About the Root Bridge The root bridge of the spanning tree is selected whenever the network is reconfigured. The root bridge is uniquely identified in the spanning tree by its priority and MAC address. The maximum age, hello time, and forward delay currently used by all bridges in the spanning tree are set to those values configured on the root bridge.
  • Page 59 PANNING ROTOCOL ONFIGURATION Field Attributes • Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the Spanning Tree.
  • Page 60: Displaying Port Status For Stp

    ONFIGURING THE WITCH Displaying Port Status for STP You can display the current STP settings and state for each port. Field Attributes • Port State – Displays the current state of this port in the Spanning Tree: - Disabled - No link has been established on this port. Otherwise, the port has been disabled by the user or has failed diagnostics.
  • Page 61: Port Mirroring

    IRRORING Port Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner.
  • Page 62: Simple Network Management Protocol

    ONFIGURING THE WITCH Simple Network Management Protocol The switch includes an onboard agent that continuously monitors the status of its hardware, as well as the traffic passing through its ports, based on the Simple Network Management Protocol (SNMP). A network management station can access this information using software.
  • Page 63: Specifying Trap Managers

    IMPLE ETWORK ANAGEMENT ROTOCOL Field Attributes • Community String – A community string acts as a password and permits access to the SNMP protocol. • RO – Specifies read-only access. Authorized management stations are only able to retrieve MIB objects. •...
  • Page 64: User Authentication

    ONFIGURING THE WITCH User Authentication The administrator has write access for parameters governing the onboard agent. You should therefore assign a password as soon as possible, and store it in a safe place. (If your password is lost, reload the system firmware as described in Appendix B.) The default administrator name is “admin”...
  • Page 65: Firmware And Configuration Settings

    IRMWARE AND ONFIGURATION ETTINGS Firmware and Configuration Settings Downloading System Software from a Server You can download firmware from a TFTP server. Field Attributes • TFTP Server IP Address – The IP address of a TFTP server. • Destination File Name – The file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names is 25 characters.
  • Page 66: Saving Or Restoring Configuration Settings

    ONFIGURING THE WITCH Saving or Restoring Configuration Settings You can upload/download configuration settings to/from a TFTP server. The configuration file can be later downloaded to restore the switch’s settings. Field Attributes • TFTP Server IP Address – The IP address of a TFTP server. •...
  • Page 67: Resetting The System

    ESETTING THE YSTEM Resetting the System Web – Click Reset System. Click the Reset button to restore the default configuration settings. Note: When restarting the system, it always runs the Power-On Self-Test. Rebooting the System Web – Click Reboot. Click the Reboot button to restart the switch. Note: When restarting the system, it always runs the Power-On Self-Test.
  • Page 68 ONFIGURING THE WITCH 3-46...
  • Page 69: Console Interface

    HAPTER ONSOLE NTERFACE This chapter provides a basic description of the console menus. For a more detailed description about specific features, please refer to the appropriate section in Chapter 3, Configuring the Switch. Log-in Screen Once a direct connection to the serial port or a Telnet connection is established, the log-in screen for the onboard configuration program appears as shown below.
  • Page 70: Main Menu

    ONSOLE NTERFACE Main Menu With the system configuration program you can define system parameters, manage and control the switch and all its ports, or monitor network conditions. The screen below of the Main Menu and the following table briefly describe the selections available from this program. Notes: 1.
  • Page 71 The system configuration program is illustrated by the following menu map, and described in the table on the next page. Status and Counters Device Information Port Status IP Configuration Port Counters Change Username System Information Change Password VLAN Configure Switch Static Configuration Create a VLAN Group Edit/Delete a VLAN Group Administration Configuration...
  • Page 72 ONSOLE NTERFACE Menu Description Page Status and Counters Displays connection status and statistics Port Status Displays port connection status Port Counters Lists Ethernet statistics System Information Shows system model number, MAC address, hardware version, and firmware version Switch Static 4-10 Configuration Administration Configures device information, IP address,...
  • Page 73 Menu Description Page Filtering MAC Filters specified addresses 4-30 Address Misc Configuration 4-32 Port Security Enables and disables address learning 4-33 MAC Age Interval Sets the address aging time 4-35 Broadcast Storm Sets the threshold above which broadcast 4-36 Filtering traffic will be filtered Max bridge transmit Sets the maximum overall queue delay, and...
  • Page 74: Status And Counters Menu

    ONSOLE NTERFACE Status and Counters Menu Use the Status and Counters menu to display port status, port statistics, and system information. Tiger Switch 10/100 6709GL2 : Status and Counters =========================== Port Status Port Counters System Information Main Menu Displays current status of all the switch ports. Tab=Next Item BackSpace=Previous Item Enter=Select Item...
  • Page 75: Displaying Connection Status

    TATUS AND OUNTERS Displaying Connection Status Use the Port Status page to display the current connection status, including link state, auto-negotiation, speed/duplex mode, and flow control. Field Attributes • Type – Shows port type as: - 10/100TX 10BASE-T / 100BASE-TX - 1000LX: 1000BASE-LX •...
  • Page 76: Showing Port Statistics

    ONSOLE NTERFACE Showing Port Statistics You can display standard statistics on network traffic from the Interfaces Group MIB, Ethernet-like MIB, and RMOM MIB. These statistics display errors on the traffic passing through each port. This information can be used to identify potential problems with the switch (such as a faulty port or unusually heavy loading).
  • Page 77: Displaying System Information

    TATUS AND OUNTERS Displaying System Information Use the System Information page to display basic information on the switch, including hardware/firmware version numbers for the main board and management software. Field Attributes • System Description – Switch model number. • MAC Address – The physical layer address for this switch. •...
  • Page 78: Switch Static Configuration Menu

    ONSOLE NTERFACE Switch Static Configuration Menu Use the Switch Static Configuration menu to configure the items listed in the following table. Tiger Switch 10/100 6709GL2 : Switch Configuration =========================== Administration Configuration Port/Trunk Configuration Port Mirroring Configuration VLAN Configuration Priority Configuration MAC Address Configuration Misc Configuration Main Menu...
  • Page 79: Administration Configuration Menu

    WITCH TATIC ONFIGURATION Menu Description Page MAC Address Configures static addresses and address 4-28 Configuration filtering Misc Configuration Configures port security, address aging, 4-32 broadcast storm control, and maximum queue delay Administration Configuration Menu Use the Administration Configuration menu to configure device information, the switch’s IP address, and user name and password.
  • Page 80: Configuring Device Information

    ONSOLE NTERFACE Configuring Device Information Use the Device Information page to identify the system by providing a descriptive name, location, and other information. Field Attributes • Device Name – Name assigned to the switch system. • Device Content – Lists the supported ports or other information. •...
  • Page 81: Configuring The Ip Address

    WITCH TATIC ONFIGURATION Configuring the IP Address Use the IP Configuration page to configure the switch’s IP parameters. Field Attributes • IP Address – IP address of the switch. Valid IP addresses consist of four numbers, 0 and 255, separated by periods. Anything outside this format will not be accepted by the configuration program.
  • Page 82: Configuring The User Name

    ONSOLE NTERFACE Configuring the User Name Use the Change Username page to change the user name used to authenticate management access. The default administrator name is “admin.” Note that the user name and password control access to both the Web interface and the console menu. Console –...
  • Page 83: Configuring The Password

    WITCH TATIC ONFIGURATION Configuring the Password Use the Change Password page to change the password used to authenticate management access. The default administrator password is “admin.” Note that the user name and password control access to both the Web interface and the console menu.
  • Page 84: Configuring Interface Connections

    ONSOLE NTERFACE Configuring Interface Connections Use the Port/Trunk Configuration page to enable/disable an interface, set auto-negotiation, or manually set the speed and duplex mode, and flow control parameters. Field Attributes • Type – Shows port type (page 4-7). • Enabled – Allows you to manually disable an interface. You can disable an interface due to abnormal behavior (e.g., excessive collisions), and then reenable it after the problem has been resolved.
  • Page 85 WITCH TATIC ONFIGURATION Console – Click Switch Static Configuration=>Port/Trunk Configuration. Modify the required interface settings, and save your settings. Tiger Switch 10/100 6709GL2 : Port Configuration =========================== Port Type Enabled Auto Speed/Duplex Flow Group Negotiate Config Control ---------------------------------------------------------------------------- 10/100TX Enabled 100 Full 10/100TX Enabled...
  • Page 86: Configuring Port Mirroring

    ONSOLE NTERFACE Configuring Port Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner.
  • Page 87 WITCH TATIC ONFIGURATION Field Attributes • Monitoring enable – Enables/disables port mirroring. • Monitoring Port – The port that mirrors traffic from the source port. • Monitored Ports – The ports whose traffic will be monitored. • Type – Shows port type (page 4-7). •...
  • Page 88: Vlan Configuration Menu

    ONSOLE NTERFACE VLAN Configuration Menu Use the VLAN Configuration menu to specify the VLAN type used on this switch, configure VLAN groups, or set the default VLAN identifier and ingress filtering for each port. Tiger Switch 10/100 6709GL2 : VLAN Configuration =========================== VLAN Configure Create a VLAN Group...
  • Page 89: Configuring Port-Based Vlans

    WITCH TATIC ONFIGURATION Configuring Port-based VLANs Use the VLAN Configuration menu to create port-based VLANs. Console – Click Switch Static Configuration=>VLAN Configuration=> VLAN Configure. Set VLAN Mode to “PortBased,” and save this setting. Tiger Switch 10/100 6709GL2 : VLAN Support Configuraton ============================ VLAN Mode :PortBased actions->...
  • Page 90 ONSOLE NTERFACE Add a VLAN Group -------------------------- VLAN Name: [TPS Grp ID: [2 ](1~4094) Port Member ------------------------ Member Member Member actions-> <Quit> <Edit> <Save> Select the Action menu. Tab=Next Item BackSpace=Previous Item Quit=Previous Menu Enter=Select Item 4-22...
  • Page 91: Configuring Tag-Based Vlans

    WITCH TATIC ONFIGURATION Configuring Tag-based VLANs Use the VLAN Configuration menu to create tag-based VLANs. Field Attributes When the VLAN mode is set “802.1Q” or “802.1QwithGVRP” (on the VLAN Configure page), the following attributes are displayed. • PVID – VLAN ID assigned to untagged frames received on the port. (Default: 1) •...
  • Page 92 ONSOLE NTERFACE Console – Click Switch Static Configuration=>VLAN Configuration=> VLAN Configure. Set VLAN Mode to “802.1Q” or “802.1QwithGVRP.” Set the PVID and Ingress Filtering rules, and save your settings. Tiger Switch 10/100 6709GL2 : VLAN Support Configuraton =========================== VLAN Mode :802.1Q IngressFilter1 IngressFilter2 Port...
  • Page 93 WITCH TATIC ONFIGURATION Add a VLAN Group -------------------------- VLAN Name: [TPS ] VLAN ID: [2 ](1~4094) Protocol VLAN : None Port Member ------------------------ Tagged UnTagged UnTagged actions-> <Quit> <Edit> <Save> Select the Action menu. Tab=Next Item BackSpace=Previous Item Quit=Previous Menu Enter=Select Item 4-25...
  • Page 94: Configuring Queue Priorities

    ONSOLE NTERFACE Configuring Queue Priorities Use the Priority Configuration page to specify which data packets have greater precedence when traffic is buffered in the switch due to congestion. This switch has two priority queues for each port. Data packets in a port’s high-priority queue is transmitted before those in the lower-priority queue.
  • Page 95 WITCH TATIC ONFIGURATION Console – Click Switch Static Configuration=>Priority Configuration. Assign frames tagged with priority 0-7 to the low or high priority queue. Set the method of servicing the priority queues, and save your settings. Tiger Switch 10/100 6709GL2 : Priority Configuration =========================== Priority 0 : Low...
  • Page 96: Mac Address Configuration Menu

    ONSOLE NTERFACE MAC Address Configuration Menu Use the MAC Address Configuration menu to statically bind MAC addresses to a specific port or to filter MAC addresses from the system. Tiger Switch 10/100 6709GL2 : MAC Address Configuration =========================== Static MAC Address Filtering MAC Address Previous Menu Return to main menu.
  • Page 97 WITCH TATIC ONFIGURATION Field Attributes • MAC Address – Physical address of a device mapped to this interface. • Port Num – Port associated with the device assigned a static address. • Vlan ID – ID of configured VLAN (1-4094). This option is only available if IEEE 802.1Q tagged VLANs are enabled (page 4-23).
  • Page 98: Configuring Address Filtering

    ONSOLE NTERFACE Tiger Switch 10/100 6709GL2 : Static MAC Address Configuration =========================== Mac Address Port num Vlan ID Mac Address Port num Vlan ID ------------------------------- ------------------------------- 0030299434DE actions-> <Add> <Edit> <Delete> <Save> <Quit> Add/Edit/Delete static MAC addresses. Tab=Next Item BackSpace=Previous Item Quit=Previous Menu Enter=Select Item Configuring Address Filtering...
  • Page 99 WITCH TATIC ONFIGURATION Tiger Switch 10/100 6709GL2 : Add Filter MAC Address =========================== Mac Address :00E0299434DE Vlan ID actions-> <Edit> <Save> <Quit> Save successfully!Press any key to return! Tab=Next Item BackSpace=Previous Item Quit=Previous Menu Enter=Select Item After you configure a new address, it will be displayed on the Filter MAC Address Configuration page as shown below.
  • Page 100: Miscellaneous Configuration Menu

    ONSOLE NTERFACE Miscellaneous Configuration Menu Use the Misc Configuration menu to configure the features listed in the following table. Tiger Switch 10/100 6709GL2 : Misc Configuration =========================== Port Security MAC Age Interval Broadcast Storm Filtering Bridge Transmit Delay Bound Previous Menu Configurate the port security.
  • Page 101: Configuring Port Security

    WITCH TATIC ONFIGURATION Configuring Port Security Use the Port Security page to lock the address table for specified ports. If you enable port security, the switch will stop learning new addresses on the specified port. Only incoming traffic with source addresses already stored in the dynamic address table will be accepted.
  • Page 102 ONSOLE NTERFACE Tiger Switch 10/100 6709GL2 : The Configuration of Port Security =========================== Port Enable Security (disable for MAC Learning) ------------------------------- Disable Disable Disable Disable enable Disable Disable Disable Disable actions-> <Quit> <Edit> <Save> Select the Action menu. Tab=Next Item BackSpace=Previous Item Quit=Previous Menu Enter=Select Item...
  • Page 103: Configuring Address Aging

    WITCH TATIC ONFIGURATION Configuring Address Aging Use the MAC Age Interval page to set the address aging time. The switch stores the addresses of known devices. This information is used to route traffic directly between the inbound and outbound ports. The addresses are learned by monitoring traffic and stored in the dynamic address table.
  • Page 104: Configuring Broadcast Storm Control

    ONSOLE NTERFACE Configuring Broadcast Storm Control Use the Broadcast Storm Filtering page to set the broadcast threshold. Broadcast storms may occur when a device on your network is malfunctioning, or if application programs are not well designed or properly configured. If there is too much broadcast traffic on your network, performance can be severely degraded or everything can come to a complete halt.
  • Page 105: Configuring The Transmit Delay Bound

    WITCH TATIC ONFIGURATION Configuring the Transmit Delay Bound Use the “Max bridge transmit delay bound” page to set the maximum queuing delay. Field Attributes • Max bridge transmit delay bound – Limits the time packets can be queued in switch. If enabled, packets queued beyond the specified time will be dropped.
  • Page 106 ONSOLE NTERFACE Tiger Switch 10/100 6709GL2 :Configure Max Bridge Transmit Delay Bound ============================ Max bridge transmit delay bound :OFF Enable Delay Bound :Disabled Max Delay Time :0 actions-> <Edit> <Save> <Quit> Select the action menu. Tab=Next Item BackSpace=Previous Item Quit=Previous Menu Enter=Select Item 4-38...
  • Page 107: Protocol Related Configuration Menu

    ROTOCOL ELATED ONFIGURATION Protocol Related Configuration Menu Use the Protocol Related Configuration menu to configure the items listed in the following table. Tiger Switch 10/100 6709GL2 : Protocol Related Configuration =========================== SNMP GVRP LACP Previous Menu Configure the Spanning Tree Protocol. Tab=Next Item BackSpace=Previous Item Enter=Select Item...
  • Page 108: Spanning Tree Protocol Menu

    ONSOLE NTERFACE Spanning Tree Protocol Menu Use the STP menu to configure the Spanning Tree Protocol. STP detects and disables network loops and provides backup links between switches, bridges, and routers to ensure that only one route exists between any two stations on the network.
  • Page 109: Enabling Stp

    ROTOCOL ELATED ONFIGURATION Enabling STP To configure STP, first enable it using the STP Enable/Disable page. Console – Click Protocol Related Configuration=>STP=>STP Enable/ Disable. Enable the STP Protocol, and save your settings. Tiger Switch 10/100 6709GL2 : STP Enabled/Disabled Configuration =========================== STP :Enabled actions->...
  • Page 110 ONSOLE NTERFACE port. If there is no root port, then this switch has been accepted as the root device of the Spanning Tree network. • Maximum Age – The maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure.
  • Page 111: Configuring Global Stp Settings

    ROTOCOL ELATED ONFIGURATION Configuring Global STP Settings Use the System Configuration page to configure global settings for STP which apply to the entire switch. Field Attributes • Priority – Bridge priority is used in selecting the root device, root port, and designated port.
  • Page 112 ONSOLE NTERFACE • Forward Delay Time – The maximum time (in seconds) the root device will wait before changing states (i.e., listening to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to a blocking state;...
  • Page 113: Configuring Port Stp Settings

    ROTOCOL ELATED ONFIGURATION Configuring Port STP Settings Use the Perport Configuration page to set STA attributes for specific ports, including port priority and path cost. You can use a different priority or path cost for ports of the same media type to indicate the preferred path.
  • Page 114 ONSOLE NTERFACE Console – Click Protocol Related Configuration=>STP=>Perport Configuration. Modify the required attributes, and save your settings Tiger Switch 10/100 6709GL2 : STP Port Configuration =========================== Port PortState PathCost Priority ------------------------------------------------------------ Disabled Forwarding Disabled Disabled Disabled Disabled Disabled Disabled Disabled actions->...
  • Page 115: Simple Network Management Protocol Menu

    ROTOCOL ELATED ONFIGURATION Simple Network Management Protocol Menu Use the SNMP menu to configure basic information and management access settings for the Simple Network Management Protocol. The switch includes an onboard agent that continuously monitors the status of its hardware, as well as the traffic passing through its ports, based on the SNMP.
  • Page 116: Configuring System Information

    ONSOLE NTERFACE Configuring System Information Use the System Options page to identify the system by providing a descriptive name, location, and contact information. Field Attributes • System Name – Name assigned to the switch system. • System Location – Specifies the system location. •...
  • Page 117: Setting Community Access Strings

    ROTOCOL ELATED ONFIGURATION Setting Community Access Strings You can use the Community Strings page to configure up to five community strings authorized for management access. For security reasons, you should consider removing the default strings. Field Attributes • Community Name – A community string acts as a password and permits access to the SNMP protocol.
  • Page 118: Specifying Trap Managers

    ONSOLE NTERFACE Specifying Trap Managers You can use the Trap Managers page to specify up to five management stations that will receive authentication failure messages and other trap messages from the switch. Field Attributes • IP – IP address of trap manager. •...
  • Page 119: Gvrp Configuration

    ROTOCOL ELATED ONFIGURATION GVRP Configuration GARP VLAN Registration Protocol (GVRP) defines a method for switches to exchange VLAN information in order to register VLAN members on ports across the network. VLANs are dynamically configured based on join messages issued by host devices and propagated throughout the network.
  • Page 120: Link Access Control Protocol Menu

    ONSOLE NTERFACE Link Access Control Protocol Menu Use the LACP menu to configure dynamic trunking whereby the switch will automatically negotiate a trunked link with LACP-configured ports on another device. Command Usage • To avoid creating a loop in the network, be sure you enable LACP before connecting the ports;...
  • Page 121: Configuring The Aggregator Setting

    ROTOCOL ELATED ONFIGURATION Menu Description Page State Activity Actively or passively configures a trunk 4-55 LACP Status Shows trunks and associated ports, and 4-56 detailed information for dynamic links Configuring the Aggregator Setting First use the Port Configuration page to create trunk groups (page 4-16), and then use the Aggregator Setting page to enable LACP and specify the maximum number of active ports.
  • Page 122 ONSOLE NTERFACE Tiger Switch 10/100 6709GL2 : LACP Group Configuration =========================== Group LACP LACP Work Port Num ------------------------------------------ Trk1. Enabled actions-> <Edit> <Save> <Quit> Select the action menu. Tab=Next Item BackSpace=Previous Item Quit=Previous Menu Enter=Select Item 4-54...
  • Page 123: Setting The State Activity

    ROTOCOL ELATED ONFIGURATION Setting the State Activity Use the State Activity page to set the port members to actively or passively initiate an LACP trunk. Field Attributes • Port – Lists all ports that can be configured as LACP trunk members. •...
  • Page 124: Displaying Aggregator Information

    ONSOLE NTERFACE Displaying Aggregator Information Use the LACP Status page to show trunks and associated ports, and to display detailed information for dynamic links. Field Attributes Static Trunks • Group Key – Displays static trunks. • Port No – The port members assigned to the trunk. Dynamic Trunks •...
  • Page 125 ROTOCOL ELATED ONFIGURATION Console – Click Protocol Related Configuration=>LACP=>LACP Status to display currently configured trunks and group members. Tiger Switch 10/100 6709GL2 : LACP Group Status =========================== Static Trunking Group Group Key : 1 Port_No : 4 5 actions-> <Quit> <Previous Page>...
  • Page 126: Reboot Switch Menu

    ONSOLE NTERFACE Reboot Switch Menu Use the Reboot Switch menu to restore the factory default configuration settings and reboot the switch. Tiger Switch 10/100 6709GL2 : Restart Configuration =========================== Default Restart Previous Menu Recovering to default. Tab=Next Item BackSpace=Previous Item Enter=Select Item Menu Description...
  • Page 127: Software Specifications

    PPENDIX OFTWARE PECIFICATIONS Switch Features Spanning Tree Protocol Flow Control Full Duplex: IEEE 802.3x Half Duplex: Back pressure Broadcast Storm Suppression Traffic throttled above a critical threshold VLAN Support Up to 128 groups; port-based or with 802.1Q VLAN tagging, GVRP for automatic VLAN learning, Multicast Filtering IGMP Snooping and Query Quality of Service...
  • Page 128: Management Features

    OFTWARE PECIFICATIONS Management Features In-Band Management Telnet, Web-based HTTP, or SNMP manager Out-of-Band Management RS-232 DB-9 console port Software Loading TFTP in-band or XModem out-of-band MIB Support MIB II (RFC 1213), Bridge MIB (RFC 1493), Ethernet-Like MIB (RFC 1643), IGMP (RFC 1112), SNMP (RFC 1157), RMON MIB (RFC 1757), MIB 2 (RFC 1213), ARP (RFC 826) RMON Support Groups 1, 2, 3, 9 (Statistics, History, Alarm, Event)
  • Page 129 4. From the terminal emulation program, select the file you want to download, set the protocol to XModem, and then start downloading. (Note that the download file should be an SMC6709GL2 binary file from SMC; otherwise the agent will not accept it.)
  • Page 130: Upgrading Firmware

    PGRADING IRMWARE 5. After the file has been downloaded, the console screen will display information similar to that shown below. $$$ Download IMAGE ..O.K !!! $$$ Update firmware ........................................................$$$ Update firmware ..O.K !!! $$$ Note: console baudrate of new image is 9600bps.. $$$ Reboot ..
  • Page 131: Troubleshooting

    9600 bps. program via a serial port connection • Check that the null-modem serial cable conforms to the pin-out connections provided in the Installation Guide. Forgot or lost the • Contact your distributor or SMC technical support for password assistance.
  • Page 132 ROUBLESHOOTING...
  • Page 133: Glossary

    LOSSARY Auto-negotiation Signalling method allowing each node to select its optimum operational mode (e.g., 10 Mbps or 100 Mbps and half or full duplex) based on the capabilities of the node to which it is connected. BOOTP Boot protocol used to load the operating system for devices connected to the network.
  • Page 134: Group Attribute Registration Protocol

    LOSSARY Group Attribute Registration Protocol See Generic Attribute Registration Protocol. IEEE 802.1D Specifies a general method for the operation of MAC bridges, including the Spanning Tree Protocol. IEEE 802.1Q VLAN Tagging—Defines Ethernet frame tags which carry VLAN information. It allows switches to assign endstations to different virtual LANs, and defines a standard way for VLANs to communicate across switched networks.
  • Page 135: Ip Multicast Filtering

    LOSSARY Internet Group Management Protocol (IGMP) A protocol through which hosts can register with their local router for multicast services. If there is more than one multicast router on a given subnetwork, one of the routers is made the “querier” and assumes responsibility for keeping track of group membership.
  • Page 136: Port Trunk

    LOSSARY Out-of-Band Management Management of the network from a station not attached to the network. Port Mirroring A method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON probe. This allows data on the target port to be studied unobtrusively.
  • Page 137 LOSSARY Trivial File Transfer Protocol (TFTP) A TCP/IP protocol commonly used for software downloads. Virtual LAN (VLAN) A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network. A VLAN serves as a logical workgroup with no physical barriers, and allows users to share information and resources as though located on the same LAN.
  • Page 138 LOSSARY Glossary-6...
  • Page 139: Index

    NDEX firmware displaying version 3-6 address downloading 3-43 aging 3-6 4-35 upgrading 3-43 filtering 3-26 4-30 table 3-6 3-24 3-25 4-28 4-33 4-35 aging time 3-6 4-35 GVRP 3-30 4-51 broadcast storm control 3-7 4-36 hardware version, displaying 3-6 Class of Service configuring 3-8 IEEE 802.1D 1-2 queue mapping 3-8...
  • Page 140 NDEX multicast filtering, configuring 3-21 system software downloading from server 3-43 system, information 3-40 password, setting 2-4 3-42 4-15 port security 3-25 4-33 ports, configuring 3-10 transmit delay bound 3-6 4-37 priority queue 3-8 4-26 trap manager 3-41 4-50 problems, troubleshooting C-1 troubleshooting C-1 trunk dynamic 3-16...
  • Page 142 Japan: 81-3-5645-5715; Fax 81-3-5645-5716 Australia: 61-2-8875-7887; Fax 61-2-8875-7777 India: 91-22-8204437; Fax 91-22-8204443 If you are looking for further contact information, please visit www.smc.com or www.smc-europe.com. Model Number: SMC6709GL2 38 Tesla Irvine, CA 92618 Revision Number: F3.10 E032004-R01 Phone: (949) 679-8000...

This manual is also suitable for:

Tigerswitch smc6709gl2

Table of Contents