SMC Networks TigerSwitch SMC6709FL2 Management Manual

SMC Networks TigerSwitch SMC6709FL2 Management Manual

Tigerswitch 10/100 9-port fast ethernet switch
Hide thumbs Also See for TigerSwitch SMC6709FL2:
Table of Contents

Advertisement

TigerSwitch 10/100
9-Port Fast Ethernet Switch
8 10BASE-T/100BASE-TX ports, 1 100BASE-FX
MMF port
1.8 Gbps aggregate bandwidth
Spanning Tree Protocol
Port mirroring for non-intrusive analysis
QoS support with two priority queues
Full support for VLANs with GVRP
IP multicasting with IGMP snooping
Security filtering based on MAC addresses
Manageable via console, Web, SNMP/RMON

Management Guide

SMC6709FL2

Advertisement

Table of Contents
loading

Summary of Contents for SMC Networks TigerSwitch SMC6709FL2

  • Page 1: Management Guide

    TigerSwitch 10/100 9-Port Fast Ethernet Switch 8 10BASE-T/100BASE-TX ports, 1 100BASE-FX MMF port 1.8 Gbps aggregate bandwidth Spanning Tree Protocol Port mirroring for non-intrusive analysis QoS support with two priority queues Full support for VLANs with GVRP IP multicasting with IGMP snooping...
  • Page 3 TigerSwitch 10/100 Management Guide From SMC’s Tiger line of feature-rich workgroup LAN solutions 38 Tesla Irvine, CA 92618 Phone: (949) 679-8000 February 2004...
  • Page 4 Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC.
  • Page 5: Table Of Contents

    Connecting to the Switch ........
  • Page 6 ONTENTS Aggregator Information ......3-18 State Activity ........3-20 Forwarding and Filtering .
  • Page 7 Reboot Switch Menu ........
  • Page 8 Switch Features ........
  • Page 9: Introduction

    This switch provides a broad range of features for switching. It includes a management agent that allows you to configure the features listed in this manual. The default configuration can be used for most of the features provided by this switch. However, there are many options that you should configure to maximize the switch’s performance for your particular...
  • Page 10: Description Of Software Features

    VLANs – This switch supports up to 128 VLANs. A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network. By segmenting your network into VLANs, you can: •...
  • Page 11 The switch supports four trunks, with up to eight up-link ports per trunk. Broadcast Suppression – Broadcast suppression prevents broadcast traffic from overwhelming the network.
  • Page 12: System Defaults

    VLAN to ensure that it does not interfere with normal network traffic and to guarantee real-time delivery by setting the required priority level for the designated VLAN. The switch uses IGMP Snooping and Query to manage multicast group registration.
  • Page 13 - Acceptable frame types GVRP Class of Service Weighted Round Robin Broadcast Status Storm Protection Note: To reset the switch defaults, use the Reset System command (page 3-45). YSTEM Default Enabled (Defaults: All values based on IEEE 802.1D) 300 seconds...
  • Page 14 NTRODUCTION...
  • Page 15: Initial Configuration

    Web-based interface. A PC may also be connected directly to the switch for configuration and monitoring via the console menu. Note: The IP address for this switch is unassigned by default. To change this address, see “Setting an IP Address” on page 2-5.
  • Page 16: Required Connections

    • Display system information and statistics Required Connections The switch provides an RS-232 serial port that enables a connection to a PC or terminal for monitoring and configuring the switch. A null-modem console cable is provided with the switch. Attach a VT100-compatible terminal, or a PC running a terminal emulation program to the switch.
  • Page 17: Remote Connections

    The onboard configuration program can be accessed using Telnet from any computer attached to the network. The switch can also be managed by any computer using a Web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above), or from a network computer using...
  • Page 18: Basic Configuration

    A user name or password can consist of up to 15 alphanumeric characters and are not case sensitive. To prevent unauthorized access to the switch, set the user name and password as follows: 1.
  • Page 19: Setting An Ip Address

    You must establish IP address information for the switch to obtain management access through the network. You can manually assign an IP address to the switch. You may also need to specify a default gateway that resides between this device and management stations that exist on another network segment.
  • Page 20 (The IP addresses shown below are merely examples.) actions-> Tab=Next Item BackSpace=Previous Item Quit=Previous menu Enter=Select Item 3. Navigate back to the Main Menu, go to Reboot Switch menu, select the “Restart” command, and press <Enter>. Tiger Switch 10/100 6709FL2 : IP Configuration...
  • Page 21: Enabling Snmp Management Access

    The switch can be configured to accept management commands from Simple Network Management Protocol (SNMP) applications such as SMC’s EliteView. You also can configure the switch to generate SNMP traps. When SNMP management stations send requests to the switch (either to return information or to set a parameter), the switch provides the requested data or sets the specified parameter.
  • Page 22 5. Press <Ctrl-A> to return to the action bar at the bottom of the screen. Select <Save> and press any key to continue. (The community string shown below is an example.) Tiger Switch 10/100 6709FL2 : Add SNMP Community =========================== actions->...
  • Page 23: Configuring The Switch

    Web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above.) Note: You can also use the console menu to manage the switch over a serial connection to the console port or via Telnet. For more information on using the console menu, refer to Chapter 4, “Console Interface.”...
  • Page 24: Navigating The Web Browser Interface

    “admin.” Home Page When your Web browser connects with the switch’s Web agent, the home page is displayed as shown below. The interface displays the Main Menu on the left side of the screen and the selected menu on the right side. The Main Menu links are used to navigate to other menus, and display configuration parameters and statistics.
  • Page 25: Configuration Options

    Panel Display The Web agent displays an image of the switch’s ports, indicating whether each link is up or down. Clicking on the image of a port opens the Port Configuration page as described on page 3-12.
  • Page 26: Main Menu

    ONFIGURING THE WITCH Main Menu Using the onboard Web agent, you can define system parameters, manage and control the switch, or monitor network conditions. The following table briefly describes the selections available from this program. Menu Home Port Status Port Statistics...
  • Page 27 Configures community strings Sets trap management stations Assigns a user name and password Downloads a new code image Restores configuration settings Backs up configuration settings Resets switch to the default configuration Reboots the switch Page 3-27 3-28 3-29 3-32...
  • Page 28: Basic System Information

    Command Usage • Aging Time – The switch stores the addresses of known devices. This information is used to route traffic directly between the inbound and outbound ports. The addresses are learned by monitoring traffic, and stored in the dynamic address table.
  • Page 29 (Range: 300-765 seconds; Default: 300 seconds) • Max bridge transmit delay bound control – Limits the time packets can be queued in the switch. If enabled, packets queued beyond the specified time will be dropped. (Range: OFF, 1, 2, 4 seconds;...
  • Page 30: Class Of Service Configuration

    • QoS Policy (High Priority Levels) – The default priority levels are assigned according to recommendations in the IEEE 802.1p standard. However, you can map the priority levels to the switch’s output queues in any way that benefits application traffic for your own network.
  • Page 31: Console Port Settings

    ONSOLE ETTINGS bound for low-priority packets if required, select the priority tags that will be processed by the high-priority queue, and then click Apply. Console Port Settings If you have access to the Web interface, but are having problems connecting to the console port, you can display the current connection parameters via the Console Information page, and adjust the settings for the PC or terminal connected to this port.
  • Page 32: Port Configuration

    ONFIGURING THE WITCH Port Configuration Displaying Connection Status Use the Port Status page to display the current connection status, including link state, auto-negotiation, speed/duplex mode, and flow control. Notes: 1. To set the port status, use the Port Control page as described under “Configuring Interface Connections”...
  • Page 33: Configuring Interface Connections

    • Flow Control – Allows manual selection of flow control. Flow control can eliminate frame loss by “blocking” traffic from end stations or segments connected directly to the switch when its buffers fill. When enabled, back pressure is used for half-duplex operation and IEEE 802.3x for full-duplex operation.
  • Page 34: Showing Port Statistics

    Group MIB, Ethernet-like MIB, and RMOM MIB. These statistics display errors on the traffic passing through each port. This information can be used to identify potential problems with the switch (such as a faulty port or unusually heavy loading). All values displayed have been accumulated since the last system reboot, and are shown as counts per second.
  • Page 35: Trunk Configuration

    Trunk Configuration The switch supports both static trunking and dynamic Link Aggregation Control Protocol (LACP). You can create multiple links between devices that work as one virtual, aggregate link. A port trunk offers a dramatic increase in bandwidth for network segments where bottlenecks exist, as well as providing a fault-tolerant link between two devices.
  • Page 36: Configuring Static Trunks

    ONFIGURING THE WITCH • The ports at both ends of a trunk must be configured in an identical manner, including communication mode (i.e., speed, duplex mode and flow control), VLAN assignments, and CoS settings. • All the ports in a trunk have to be treated as a whole when moved from/ to, added or deleted from a VLAN.
  • Page 37 RUNK ONFIGURATION Web – Click Administrator=>Trunking=>Aggregator Setting. Select the group ID and click the Get button to display the settings for the specified group. Set LACP to “Disable.” Use the Add and Remove buttons to assign port members, and then click Apply. Click Administrator=>Trunking=>Aggregator Information to display currently configured static trunks and group members.
  • Page 38: Configuring Dynamic Trunks

    LACP. • If the target switch has also enabled LACP on the connected ports, and port members at one or both ends of the link are set to actively initiate a link, the trunk will be activated automatically.
  • Page 39: Aggregator Setting

    Aggregator Setting Field Attributes • System Priority – A value used to select the device that initiates an LACP trunk. The device with the lowest value has the highest priority and will be selected as the active LACP partner. • Group ID – Specifies the LACP trunk group. •...
  • Page 40: Aggregator Information

    A trunk can only be formed if the devices at both ends of a link use the same key. A key is automatically generated by the switch when configuring a trunk.
  • Page 41 RUNK ONFIGURATION Web – Click Administrator=>Trunking=>Aggregator Information to display currently configured trunks and group members. 3-19...
  • Page 42: State Activity

    ONFIGURING THE WITCH State Activity Set the port members to actively or passively initiate an LACP trunk. Field Attributes • Port – Lists all ports that can be configured as LACP trunk members. • LACP State Activity – When set to Active, a port can automatically initiate a trunk if an LACP partner is detected at the other end of the link.
  • Page 43: Forwarding And Filtering

    • Port Security – Disables address learning for the specified port. Valid addresses must be learned during a initial training period or statically configured. • MAC Filtering – Filters specified addresses from the switch or from a specific VLAN. Configuring Multicast Filtering Multicasting is used to support real-time applications such as video conferencing or streaming audio.
  • Page 44 You can enable IGMP Snooping and Query via the Switch Settings menu, and display information about multicast traffic being forwarded by the switch via the Filtering Database menu as shown below.
  • Page 45 ORWARDING AND ILTERING Click Administrator=>Filtering Database=>IGMP Snooping. 3-23...
  • Page 46: Setting Static Addresses

    WITCH Setting Static Addresses A static address can be assigned to a specific interface on this switch. Traffic sent from devices listed in the static address table will only be accepted on the specified interface. If any packets with a source address listed in this table enter another interface, they will be dropped.
  • Page 47: Configuring Port Security

    ORWARDING AND ILTERING Configuring Port Security If you enable port security, the switch will stop learning new addresses on the specified port. Only incoming traffic with source addresses already stored in the dynamic address table will be accepted. The MAC addresses already in the address table will be retained and will not age out.
  • Page 48: Configuring Address Filtering

    ONFIGURING THE WITCH Configuring Address Filtering You can drop traffic from unwanted stations based on the source MAC address (and associated VLAN if tagged VLANs are enabled). Field Attributes • MAC Address – Source MAC address. • Vlan ID – ID of configured VLAN (1-4094). This option is only available if IEEE 802.1Q tagged VLANs are enabled (page 3-29).
  • Page 49: Vlan Configuration

    IP addresses or IP subnets. VLANs provide a high level of network security since traffic must pass through a Layer 3 switch to reach a different VLAN. This switch supports the following VLAN features: •...
  • Page 50: Port-Based Vlans

    A group of network users assigned to a VLAN form a broadcast domain that is separate from other VLANs configured on the switch. Packets are forwarded only between ports that are designated for the same VLAN. Port-based VLANs can be used to manually isolate user groups or subnets.
  • Page 51: Tag-Based Vlans

    VLAN tagging. VLAN Classification – When the switch receives a frame, it classifies the frame in one of two ways. If the frame is untagged, the switch assigns the frame to an associated VLAN (based on the PVID of the receiving port).
  • Page 52 IEEE 802.1Q VLAN protocol, it can be configured to broadcast a message to your network indicating the VLAN groups it wants to join. When this switch receives these messages, it will automatically place the receiving port in the specified VLANs and forward the message to all other ports.
  • Page 53: Creating Tagged Vlans

    VLAN C ONFIGURATION Creating Tagged VLANs Web – Click Administrator=>Switch Settings=>Advanced. Set VLAN Operation Mode to 802.1Q with or without GVRP, then click Apply. Click Administrator=>VLAN Configuration=>Basic. Click Add to create a group. Enter the VLAN Name (1-15 characters) and Group ID (2-4094).
  • Page 54: Configuring The Pvid And Ingress Filters

    GVRP or STP. • Ingress Filtering 2 – Sets the port to drop untagged frames. If only tagged frames are accepted, the switch will only accept frames if the frame tag matches a VLAN to which this port has been assigned.
  • Page 55 VLAN C ONFIGURATION Web – Click Administrator=>VLAN Configuration=>Port VID. Set the PVID and Ingress Filtering rules, then click Apply. 3-33...
  • Page 56: Spanning Tree Protocol Configuration

    Enabling STP To configure STP, first enable the protocol as shown below. Web – Click Administrator=>Switch Settings=>Advanced. Enable STP Protocol, and click Apply. Configuring Global STP Settings Global settings apply to the entire switch.
  • Page 57 information (provided in the last configuration message) becomes the designated port for the attached LAN. If it is a root port, a new root port is selected from among the device ports attached to the network. - Default: 20 - Minimum: The higher of 6 or [2 x (Hello Time + 1)] - Maximum: The lower of 40 or [2 x (Forward Delay - 1)] •...
  • Page 58: Displaying Information About The Root Bridge

    • Root Path Cost – The path cost from the root port on this switch to the root device. • Root Port – The number of the port on this switch that is closest to the root. This switch communicates with the root device through this port.
  • Page 59 • Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the Spanning Tree.
  • Page 60: Displaying Port Status For Stp

    ONFIGURING THE WITCH Displaying Port Status for STP You can display the current STP settings and state for each port. Field Attributes • Port State – Displays the current state of this port in the Spanning Tree: - Disabled - No link has been established on this port. Otherwise, the port has been disabled by the user or has failed diagnostics.
  • Page 61: Port Mirroring

    Port Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner.
  • Page 62: Simple Network Management Protocol

    Access rights to the onboard agent are controlled by community strings. To communicate with the switch, the management station must first submit a valid community string for authentication. The options for configuring community strings and related trap functions are described in the following sections.
  • Page 63: Specifying Trap Managers

    Add. Specifying Trap Managers You can specify up to five management stations that will receive authentication failure messages and other trap messages from the switch. Field Attributes • IP Address – IP address of trap manager.
  • Page 64: User Authentication

    ONFIGURING THE WITCH User Authentication The administrator has write access for parameters governing the onboard agent. You should therefore assign a password as soon as possible, and store it in a safe place. (If your password is lost, reload the system firmware as described in Appendix B.) The default administrator name is “admin”...
  • Page 65: Firmware And Configuration Settings

    Firmware and Configuration Settings Downloading System Software from a Server You can download firmware from a TFTP server. Field Attributes • TFTP Server IP Address – The IP address of a TFTP server. • Destination File Name – The file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names is 25 characters.
  • Page 66: Saving Or Restoring Configuration Settings

    WITCH Saving or Restoring Configuration Settings You can upload/download configuration settings to/from a TFTP server. The configuration file can be later downloaded to restore the switch’s settings. Field Attributes • TFTP Server IP Address – The IP address of a TFTP server.
  • Page 67: Resetting The System

    Note: When restarting the system, it always runs the Power-On Self-Test. Rebooting the System Web – Click Reboot. Click the Reboot button to restart the switch. Note: When restarting the system, it always runs the Power-On Self-Test. ESETTING THE...
  • Page 68 ONFIGURING THE WITCH 3-46...
  • Page 69: Console Interface

    This chapter provides a basic description of the console menus. For a more detailed description about specific features, please refer to the appropriate section in Chapter 3, Configuring the Switch. Log-in Screen Once a direct connection to the serial port or a Telnet connection is established, the log-in screen for the onboard configuration program appears as shown below.
  • Page 70: Main Menu

    Main Menu With the system configuration program you can define system parameters, manage and control the switch and all its ports, or monitor network conditions. The screen below of the Main Menu and the following table briefly describe the selections available from this program.
  • Page 71 The system configuration program is illustrated by the following menu map, and described in the table on the next page. Status and Counters Port Status Port Counters System Information Switch Static Configuration Administration Configuration Port/Trunk Configuration Port Mirroring Configuration VLAN Configuration Priority Configuration...
  • Page 72 ONSOLE NTERFACE Menu Status and Counters Port Status Port Counters System Information Switch Static Configuration Administration Configuration Device Information IP Configuration Change Username Change Password Port/Trunk Configuration Port Mirroring Configuration VLAN Configuration VLAN Configure Create a VLAN Group Edit/Delete a...
  • Page 73 GVRP Configures dynamic trunks; displays status Configures dynamic trunks Actively or passively configures a trunk Shows trunks and associated ports, and detailed information for dynamic links Reboots the switch, or resets to defaults Page 4-30 4-32 4-33 4-35...
  • Page 74: Status And Counters Menu

    ONSOLE NTERFACE Status and Counters Menu Use the Status and Counters menu to display port status, port statistics, and system information. Tiger Switch 10/100 6709FL2 : Status and Counters =========================== Tab=Next Item Menu Port Status Port Counters System Information Port Status...
  • Page 75: Displaying Connection Status

    • Status – Indicates if the link is Up or Down. • Mode – Shows the port speed and duplex mode. • Flow Control – Indicates the type of flow control in use. Console – Click Status and Counters=>Port Status. Tiger Switch 10/100 6709FL2 : Port Status =========================== Port Type...
  • Page 76: Showing Port Statistics

    Group MIB, Ethernet-like MIB, and RMOM MIB. These statistics display errors on the traffic passing through each port. This information can be used to identify potential problems with the switch (such as a faulty port or unusually heavy loading). All values displayed have been accumulated since the last system reboot, and are shown as counts per second.
  • Page 77: Displaying System Information

    Field Attributes • System Description – Switch model number. • MAC Address – The physical layer address for this switch. • Firmware Version – Version number of runtime code. • Hardware Version – Hardware version of the main board.
  • Page 78: Switch Static Configuration Menu

    ONSOLE NTERFACE Switch Static Configuration Menu Use the Switch Static Configuration menu to configure the items listed in the following table. Tiger Switch 10/100 6709FL2 : Switch Configuration =========================== Tab=Next Item Menu Administration Configuration Port/Trunk Configuration Port Mirroring Configuration VLAN Configuration...
  • Page 79: Administration Configuration Menu

    Menu MAC Address Configuration Misc Configuration Administration Configuration Menu Use the Administration Configuration menu to configure device information, the switch’s IP address, and user name and password. Tiger Switch 10/100 6709FL2 : Device Configuration =========================== Tab=Next Item Menu Device Information...
  • Page 80: Configuring Device Information

    Use the Device Information page to identify the system by providing a descriptive name, location, and other information. Field Attributes • Device Name – Name assigned to the switch system. • Device Content – Lists the supported ports or other information. • Device Location – Specifies the system location.
  • Page 81: Configuring The Ip Address

    Use the IP Configuration page to configure the switch’s IP parameters. Field Attributes • IP Address – IP address of the switch. Valid IP addresses consist of four numbers, 0 and 255, separated by periods. Anything outside this format will not be accepted by the configuration program.
  • Page 82: Configuring The User Name

    The default administrator name is “admin.” Note that the user name and password control access to both the Web interface and the console menu. Console – Click Switch Static Configuration=>Administration Configuration=> Change Username. Set a new user name, and save it. Tiger Switch 10/100 6709FL2 : UserName Configuration. =========================== actions-> <Edit>...
  • Page 83: Configuring The Password

    Console – Click Switch Static Configuration=>Administration Configuration=> Change Password. Enter the old password, enter the new password, confirm it by entering it again. Press the <Enter> key to save it. Tiger Switch 10/100 6709FL2 : Password Configuration =========================== password changed successfully!press any key to return! Esc=Previous menu Note: Maximum string length is 8 alphanumeric characters.
  • Page 84: Configuring Interface Connections

    • Flow Control – Allows automatic or manual selection of flow control. Flow control can eliminate frame loss by “blocking” traffic from end stations or segments connected directly to the switch when its buffers fill. When enabled, back pressure is used for half-duplex operation and IEEE 802.3x for full-duplex operation.
  • Page 85 Console – Click Switch Static Configuration=>Port/Trunk Configuration. Modify the required interface settings, and save your settings. Tiger Switch 10/100 6709FL2 : Port Configuration =========================== Port Type Enabled ---------------------------------------------------------------------------- 10/100TX 10/100TX 10/100TX 10/100TX 10/100TX 10/100TX 10/100TX 10/100TX 100FX actions-> <Quit> Configure the port group status.
  • Page 86: Configuring Port Mirroring

    ONSOLE NTERFACE Configuring Port Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner.
  • Page 87 Console – Click Switch Static Configuration=>Port Mirroring Configuration. Enable monitoring, specify the monitoring (or analysis) port, the monitor ports and traffic types to mirror, then save your settings. Tiger Switch 10/100 6709FL2 : Port Monitoring Configuration =========================== Monitoring enable :YES...
  • Page 88: Vlan Configuration Menu

    NTERFACE VLAN Configuration Menu Use the VLAN Configuration menu to specify the VLAN type used on this switch, configure VLAN groups, or set the default VLAN identifier and ingress filtering for each port. Tiger Switch 10/100 6709FL2 : VLAN Configuration =========================== Configure the VLAN PVID and Ingress Rule.
  • Page 89: Configuring Port-Based Vlans

    Use the VLAN Configuration menu to create port-based VLANs. Console – Click Switch Static Configuration=>VLAN Configuration=> VLAN Configure. Set VLAN Mode to “PortBased,” and save this setting. Tiger Switch 10/100 6709FL2 : VLAN Support Configuraton ============================ VLAN Mode :PortBased actions->...
  • Page 90 ONSOLE NTERFACE VLAN Name: [TPS Port ------------------------ actions-> <Quit> Tab=Next Item BackSpace=Previous Item 4-22 Add a VLAN Group -------------------------- Grp ID: [2 Member Member Member Member <Edit> <Save> Select the Action menu. Quit=Previous Menu ](1~4094) Enter=Select Item...
  • Page 91: Configuring Tag-Based Vlans

    GVRP or STP. • Ingress Filter 2 (Untagged Pkt) – Sets the port to drop untagged frames. If only tagged frames are accepted, the switch will only accept frames if the frame tag matches a VLAN to which this port has been assigned.
  • Page 92 Console – Click Switch Static Configuration=>VLAN Configuration=> VLAN Configure. Set VLAN Mode to “802.1Q” or “802.1QwithGVRP.” Set the PVID and Ingress Filtering rules, and save your settings. Tiger Switch 10/100 6709FL2 : VLAN Support Configuraton =========================== VLAN Mode :802.1Q Port ------------------------------------------------------- actions->...
  • Page 93 VLAN Name: [TPS Protocol VLAN : Port ------------------------ actions-> <Quit> Select the Action menu. Tab=Next Item BackSpace=Previous Item WITCH TATIC Add a VLAN Group -------------------------- ] VLAN ID: [2 None Member Tagged UnTagged UnTagged <Edit> <Save> Quit=Previous Menu ONFIGURATION ](1~4094) Enter=Select Item 4-25...
  • Page 94: Configuring Queue Priorities

    Use the Priority Configuration page to specify which data packets have greater precedence when traffic is buffered in the switch due to congestion. This switch has two priority queues for each port. Data packets in a port’s high-priority queue is transmitted before those in the lower-priority queue.
  • Page 95 Console – Click Switch Static Configuration=>Priority Configuration. Assign frames tagged with priority 0-7 to the low or high priority queue. Set the method of servicing the priority queues, and save your settings. Tiger Switch 10/100 6709FL2 : Priority Configuration ===========================...
  • Page 96: Mac Address Configuration Menu

    Static addresses remain in the switch’s address table, regardless of whether the device is physically connected to the switch. This saves the switch from having to re-learn a device’s MAC address when the disconnected or powered-off device becomes active on the network again.
  • Page 97 Configuration=>Static MAC Address. Click <Add> to open the Add Static MAC Address page. Specify the MAC address, port number, and VLAN ID, then save your settings. Tiger Switch 10/100 6709FL2 : Add Static MAC Address =========================== Mac Address :0030299434DE Port num Vlan ID actions->...
  • Page 98: Configuring Address Filtering

    ONSOLE NTERFACE Tiger Switch 10/100 6709FL2 : Static MAC Address Configuration =========================== Mac Address Port num ------------------------------- 0030299434DE actions-> <Add> Tab=Next Item BackSpace=Previous Item Configuring Address Filtering Use the Filtering MAC Address page to drop traffic from unwanted stations based on the source MAC address (and associated VLAN if tagged VLANs are enabled).
  • Page 99 Tiger Switch 10/100 6709FL2 : Add Filter MAC Address =========================== Mac Address :00E0299434DE Vlan ID actions-> <Edit> Save successfully!Press any key to return! Tab=Next Item BackSpace=Previous Item After you configure a new address, it will be displayed on the Filter MAC Address Configuration page as shown below.
  • Page 100: Miscellaneous Configuration Menu

    ONSOLE NTERFACE Miscellaneous Configuration Menu Use the Misc Configuration menu to configure the features listed in the following table. Tiger Switch 10/100 6709FL2 : Misc Configuration =========================== Tab=Next Item Menu Port Security MAC Age Interval Broadcast Storm Filtering Sets the threshold above which broadcast...
  • Page 101: Configuring Port Security

    Configuring Port Security Use the Port Security page to lock the address table for specified ports. If you enable port security, the switch will stop learning new addresses on the specified port. Only incoming traffic with source addresses already stored in the dynamic address table will be accepted.
  • Page 102 ONSOLE NTERFACE Tiger Switch 10/100 6709FL2 : The Configuration of Port Security =========================== Port (disable for MAC Learning) ------------------------------- actions-> <Quit> Tab=Next Item BackSpace=Previous Item 4-34 Enable Security Disable Disable Disable Disable enable Disable Disable Disable Disable <Edit> <Save> Select the Action menu.
  • Page 103: Configuring Address Aging

    Configuring Address Aging Use the MAC Age Interval page to set the address aging time. The switch stores the addresses of known devices. This information is used to route traffic directly between the inbound and outbound ports. The addresses are learned by monitoring traffic and stored in the dynamic address table.
  • Page 104: Configuring Broadcast Storm Control

    (Range: NO, 5, 10, 15, 20, 25%; Default: NO) Console – Click Switch Static Configuration=>Misc Configuration=> Broadcast Storm Filtering. Specify the broadcast storm filter threshold, and save your settings. Tiger Switch 10/100 6709FL2 : Broadcast Storm Filter Mode =========================== actions-> <Edit>...
  • Page 105: Configuring The Transmit Delay Bound

    Console – Click Switch Static Configuration=>Misc Configuration=> Max bridge transmit delay bound. Specify the maximum transmit delay bound for the overall delay permitted within the switch, enable or disable the delay bound for the low-priority queue and set a value for this bound, then save your settings.
  • Page 106 ONSOLE NTERFACE Tiger Switch 10/100 6709FL2 :Configure Max Bridge Transmit Delay Bound ============================ actions-> <Edit> Tab=Next Item BackSpace=Previous Item 4-38 Max bridge transmit delay bound :OFF Enable Delay Bound :Disabled Max Delay Time :0 <Save> Select the action menu. Quit=Previous Menu <Quit>...
  • Page 107: Protocol Related Configuration Menu

    Protocol Related Configuration Menu Use the Protocol Related Configuration menu to configure the items listed in the following table. Tiger Switch 10/100 6709FL2 : Protocol Related Configuration =========================== Tab=Next Item BackSpace=Previous Item Menu SNMP GVRP LACP ROTOCOL SNMP GVRP LACP Previous Menu Configure the Spanning Tree Protocol.
  • Page 108: Spanning Tree Protocol Menu

    The backup links automatically take over when a primary link goes down. Tiger Switch 10/100 6709FL2 : Spanning Tree Protocol =========================== Tab=Next Item...
  • Page 109: Enabling Stp

    • Priority – Bridge priority for the root device. • MAC Address – MAC address of the root device. • Root Path Cost – The path cost from the root port on this switch to the root device. • Root Port – The number of the port on this switch that is closest to the root.
  • Page 110 ONSOLE NTERFACE port. If there is no root port, then this switch has been accepted as the root device of the Spanning Tree network. • Maximum Age – The maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure.
  • Page 111: Configuring Global Stp Settings

    Configuring Global STP Settings Use the System Configuration page to configure global settings for STP which apply to the entire switch. Field Attributes • Priority – Bridge priority is used in selecting the root device, root port, and designated port. The device with the highest priority becomes the STA root device.
  • Page 112 - Minimum: The higher of 4 or [(Max. Message Age / 2) + 1] - Maximum: 30 Console – Click Protocol Related Configuration=>STP=>System Configuration. Modify the required attributes, and save your settings Tiger Switch 10/100 6709FL2 : STP System Configuration =========================== Root Bridge Information ------------------------...
  • Page 113: Configuring Port Stp Settings

    • Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the Spanning Tree.
  • Page 114 ONSOLE NTERFACE Console – Click Protocol Related Configuration=>STP=>Perport Configuration. Modify the required attributes, and save your settings Tiger Switch 10/100 6709FL2 : STP Port Configuration =========================== Port PortState ------------------------------------------------------------ Disabled Forwarding Disabled Disabled Disabled Disabled Disabled Disabled Disabled actions-> <Quit>...
  • Page 115: Simple Network Management Protocol Menu

    Simple Network Management Protocol Menu Use the SNMP menu to configure basic information and management access settings for the Simple Network Management Protocol. The switch includes an onboard agent that continuously monitors the status of its hardware, as well as the traffic passing through its ports, based on the SNMP.
  • Page 116: Configuring System Information

    Use the System Options page to identify the system by providing a descriptive name, location, and contact information. Field Attributes • System Name – Name assigned to the switch system. • System Location – Specifies the system location. • System Contact – Administrator responsible for the system.
  • Page 117: Setting Community Access Strings

    Strings. Click <Add> to open the SNMP Community Configuration page. Enter a new string in the text box and select the access rights, then save your settings. Tiger Switch 10/100 6709FL2 : Add SNMP Community =========================== Community Name :private Write Access actions->...
  • Page 118: Specifying Trap Managers

    Console – Click Protocol Related Configuration=>SNMP=>Trap Managers. Click <Add> to open the Add SNMP Trap Manager page. Fill in the IP address and community string for a trap manager, then save your settings. Tiger Switch 10/100 6709FL2 : Add SNMP Trap Manager =========================== actions-> <Edit>...
  • Page 119: Gvrp Configuration

    Use the GVRP page to enable automatic VLAN registration, and to support VLANs which extend beyond the local switch. (Default: Disabled) Note: GVRP will also be enabled if the VLAN Mode selection under the VLAN Configure screen is set to “802.1QwithGVRP.”...
  • Page 120: Link Access Control Protocol Menu

    LACP. • If the target switch has also enabled LACP on the connected ports, and port members at one or both ends of the link are set to actively initiate a link, the trunk will be activated automatically.
  • Page 121: Configuring The Aggregator Setting

    Menu State Activity LACP Status Configuring the Aggregator Setting First use the Port Configuration page to create trunk groups (page 4-16), and then use the Aggregator Setting page to enable LACP and specify the maximum number of active ports. Field Attributes •...
  • Page 122 ONSOLE NTERFACE Tiger Switch 10/100 6709FL2 : LACP Group Configuration =========================== actions-> <Edit> Tab=Next Item BackSpace=Previous Item 4-54 Group LACP LACP Work Port Num ------------------------------------------ Trk1. Enabled <Save> Select the action menu. Quit=Previous Menu <Quit> Enter=Select Item...
  • Page 123: Setting The State Activity

    Console – Click Protocol Related Configuration=>LACP=>State Activity. Specify the ports which can actively initiate an LACP trunk, and save your settings. Tiger Switch 10/100 6709FL2 : LACP Port State Active Configuration =========================== actions-> <Edit>...
  • Page 124: Displaying Aggregator Information

    A trunk can only be formed if the devices at both ends of a link use the same key. A key is automatically generated by the switch when configuring a trunk.
  • Page 125 Console – Click Protocol Related Configuration=>LACP=>LACP Status to display currently configured trunks and group members. Tiger Switch 10/100 6709FL2 : LACP Group Status =========================== Group Key : 1 Port_No actions-> <Quit> Tab=Next Item BackSpace=Previous Item Click <Next Page> to display multiple trunk groups.
  • Page 126: Reboot Switch Menu

    Menu Default Restart Notes: 1. When resetting the switch to factory defaults (i.e., using the Default option), it will prompt you with a message to verify whether or not you want to continue. 2. When rebooting the switch (i.e., using the Restart option), the system will be rebooted immediately;...
  • Page 127: Software Specifications

    PPENDIX OFTWARE PECIFICATIONS Switch Features Spanning Tree Protocol Flow Control Full Duplex: IEEE 802.3x Half Duplex: Back pressure Broadcast Storm Suppression Traffic throttled above a critical threshold VLAN Support Up to 128 groups; port-based or with 802.1Q VLAN tagging, GVRP for automatic VLAN learning,...
  • Page 128: Management Features

    OFTWARE PECIFICATIONS Management Features In-Band Management Telnet, Web-based HTTP, or SNMP manager Out-of-Band Management RS-232 DB-9 console port Software Loading TFTP in-band or XModem out-of-band MIB Support MIB II (RFC 1213), Bridge MIB (RFC 1493), Ethernet-Like MIB (RFC 1643), IGMP (RFC 1112), SNMP (RFC 1157), RMON MIB (RFC 1757), MIB 2 (RFC 1213), ARP (RFC 826) RMON Support Groups 1, 2, 3, 9 (Statistics, History, Alarm, Event)
  • Page 129 4. From the terminal emulation program, select the file you want to download, set the protocol to XModem, and then start downloading. (Note that the download file should be an SMC6709FL2 binary file from SMC; otherwise the agent will not accept it.) PPENDIX Restart the system.
  • Page 130: Upgrading Firmware

    Change the baud rate back to 9600 bps. When using Windows HyperTerminal, disconnect 6. Then press Enter to open the Log-on screen. For details on managing the switch, refer to the appropriate chapters in this manual. , set the baud rate, and reconnect...
  • Page 131: Troubleshooting

    VT100 compatible, 8 data bits, 1 stop bit, no parity, and 9600 bps. • Check that the null-modem serial cable conforms to the pin-out connections provided in the Installation Guide. • Contact your distributor or SMC technical support for assistance. PPENDIX...
  • Page 132 ROUBLESHOOTING...
  • Page 133: Glossary

    A workstation, server, or other device that does not act as a network interconnection. Full Duplex Transmission method that allows the switch and attached device to transmit and receive concurrently, effectively doubling the bandwidth of that link. GARP VLAN Registration Protocol (GVRP)
  • Page 134: Group Attribute Registration Protocol

    LOSSARY Group Attribute Registration Protocol See Generic Attribute Registration Protocol. IEEE 802.1D Specifies a general method for the operation of MAC bridges, including the Spanning Tree Protocol. IEEE 802.1Q VLAN Tagging—Defines Ethernet frame tags which carry VLAN information. It allows switches to assign endstations to different virtual LANs, and defines a standard way for VLANs to communicate across switched networks.
  • Page 135: Ip Multicast Filtering

    In-Band Management Management of the network from a station attached directly to the network. IP Multicast Filtering A process whereby this switch can pass multicast traffic along to participating hosts. Local Area Network (LAN) A group of interconnected computer and support devices.
  • Page 136: Port Trunk

    LOSSARY Out-of-Band Management Management of the network from a station not attached to the network. Port Mirroring A method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON probe. This allows data on the target port to be studied unobtrusively.
  • Page 137 Trivial File Transfer Protocol (TFTP) A TCP/IP protocol commonly used for software downloads. Virtual LAN (VLAN) A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network. A VLAN serves as a logical workgroup with no physical barriers, and allows users to share information and resources as though located on the same LAN.
  • Page 138 LOSSARY Glossary-6...
  • Page 139: Index

    Web browser 2-1 console connecting 2-2 displaying port settings 3-9 default settings, system 1-4 delay bound 3-8 4-37 downloading software 3-43 features management A-2 switch A-1 firmware displaying version 3-6 downloading 3-43 upgrading 3-43 4-28 4-33 4-35 GVRP 3-30 4-36 hardware version, displaying 3-6 IEEE 802.1D 1-2...
  • Page 140 NDEX multicast filtering, configuring 3-21 password, setting 2-4 3-42 port security 3-25 4-33 ports, configuring 3-10 priority queue 3-8 4-26 problems, troubleshooting C-1 quality of service 3-8 4-26 rebooting the system 3-45 restarting the system 3-45 SNMP 2-1 3-40 4-47 community string 2-7 enabling traps 3-41 4-50...
  • Page 142 Russia: PRC: Taiwan: Asia Pacific: Korea: Japan: Australia: India: If you are looking for further contact information, please visit www.smc.com or www.smc-europe.com. 38 Tesla Irvine, CA 92618 Phone: (949) 679-8000 (800) SMC-4-YOU; 34-93-477-4935; 44 (0) 118 974 8700; 33 (0) 41 38 32 32;...

This manual is also suitable for:

6709fl2 int

Table of Contents