TigerSwitch 10/100 9-Port Fast Ethernet Switch 8 10BASE-T/100BASE-TX ports, 1 100BASE-FX MMF port 1.8 Gbps aggregate bandwidth Spanning Tree Protocol Port mirroring for non-intrusive analysis QoS support with two priority queues Full support for VLANs with GVRP IP multicasting with IGMP snooping...
Page 3
TigerSwitch 10/100 Management Guide From SMC’s Tiger line of feature-rich workgroup LAN solutions 38 Tesla Irvine, CA 92618 Phone: (949) 679-8000 February 2004...
Page 4
Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC.
This switch provides a broad range of features for switching. It includes a management agent that allows you to configure the features listed in this manual. The default configuration can be used for most of the features provided by this switch. However, there are many options that you should configure to maximize the switch’s performance for your particular...
VLANs – This switch supports up to 128 VLANs. A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network. By segmenting your network into VLANs, you can: •...
Page 11
The switch supports four trunks, with up to eight up-link ports per trunk. Broadcast Suppression – Broadcast suppression prevents broadcast traffic from overwhelming the network.
VLAN to ensure that it does not interfere with normal network traffic and to guarantee real-time delivery by setting the required priority level for the designated VLAN. The switch uses IGMP Snooping and Query to manage multicast group registration.
Page 13
- Acceptable frame types GVRP Class of Service Weighted Round Robin Broadcast Status Storm Protection Note: To reset the switch defaults, use the Reset System command (page 3-45). YSTEM Default Enabled (Defaults: All values based on IEEE 802.1D) 300 seconds...
Web-based interface. A PC may also be connected directly to the switch for configuration and monitoring via the console menu. Note: The IP address for this switch is unassigned by default. To change this address, see “Setting an IP Address” on page 2-5.
• Display system information and statistics Required Connections The switch provides an RS-232 serial port that enables a connection to a PC or terminal for monitoring and configuring the switch. A null-modem console cable is provided with the switch. Attach a VT100-compatible terminal, or a PC running a terminal emulation program to the switch.
The onboard configuration program can be accessed using Telnet from any computer attached to the network. The switch can also be managed by any computer using a Web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above), or from a network computer using...
A user name or password can consist of up to 15 alphanumeric characters and are not case sensitive. To prevent unauthorized access to the switch, set the user name and password as follows: 1.
You must establish IP address information for the switch to obtain management access through the network. You can manually assign an IP address to the switch. You may also need to specify a default gateway that resides between this device and management stations that exist on another network segment.
Page 20
(The IP addresses shown below are merely examples.) actions-> Tab=Next Item BackSpace=Previous Item Quit=Previous menu Enter=Select Item 3. Navigate back to the Main Menu, go to Reboot Switch menu, select the “Restart” command, and press <Enter>. Tiger Switch 10/100 6709FL2 : IP Configuration...
The switch can be configured to accept management commands from Simple Network Management Protocol (SNMP) applications such as SMC’s EliteView. You also can configure the switch to generate SNMP traps. When SNMP management stations send requests to the switch (either to return information or to set a parameter), the switch provides the requested data or sets the specified parameter.
Page 22
5. Press <Ctrl-A> to return to the action bar at the bottom of the screen. Select <Save> and press any key to continue. (The community string shown below is an example.) Tiger Switch 10/100 6709FL2 : Add SNMP Community =========================== actions->...
Web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above.) Note: You can also use the console menu to manage the switch over a serial connection to the console port or via Telnet. For more information on using the console menu, refer to Chapter 4, “Console Interface.”...
“admin.” Home Page When your Web browser connects with the switch’s Web agent, the home page is displayed as shown below. The interface displays the Main Menu on the left side of the screen and the selected menu on the right side. The Main Menu links are used to navigate to other menus, and display configuration parameters and statistics.
Panel Display The Web agent displays an image of the switch’s ports, indicating whether each link is up or down. Clicking on the image of a port opens the Port Configuration page as described on page 3-12.
ONFIGURING THE WITCH Main Menu Using the onboard Web agent, you can define system parameters, manage and control the switch, or monitor network conditions. The following table briefly describes the selections available from this program. Menu Home Port Status Port Statistics...
Page 27
Configures community strings Sets trap management stations Assigns a user name and password Downloads a new code image Restores configuration settings Backs up configuration settings Resets switch to the default configuration Reboots the switch Page 3-27 3-28 3-29 3-32...
Command Usage • Aging Time – The switch stores the addresses of known devices. This information is used to route traffic directly between the inbound and outbound ports. The addresses are learned by monitoring traffic, and stored in the dynamic address table.
Page 29
(Range: 300-765 seconds; Default: 300 seconds) • Max bridge transmit delay bound control – Limits the time packets can be queued in the switch. If enabled, packets queued beyond the specified time will be dropped. (Range: OFF, 1, 2, 4 seconds;...
• QoS Policy (High Priority Levels) – The default priority levels are assigned according to recommendations in the IEEE 802.1p standard. However, you can map the priority levels to the switch’s output queues in any way that benefits application traffic for your own network.
ONSOLE ETTINGS bound for low-priority packets if required, select the priority tags that will be processed by the high-priority queue, and then click Apply. Console Port Settings If you have access to the Web interface, but are having problems connecting to the console port, you can display the current connection parameters via the Console Information page, and adjust the settings for the PC or terminal connected to this port.
ONFIGURING THE WITCH Port Configuration Displaying Connection Status Use the Port Status page to display the current connection status, including link state, auto-negotiation, speed/duplex mode, and flow control. Notes: 1. To set the port status, use the Port Control page as described under “Configuring Interface Connections”...
• Flow Control – Allows manual selection of flow control. Flow control can eliminate frame loss by “blocking” traffic from end stations or segments connected directly to the switch when its buffers fill. When enabled, back pressure is used for half-duplex operation and IEEE 802.3x for full-duplex operation.
Group MIB, Ethernet-like MIB, and RMOM MIB. These statistics display errors on the traffic passing through each port. This information can be used to identify potential problems with the switch (such as a faulty port or unusually heavy loading). All values displayed have been accumulated since the last system reboot, and are shown as counts per second.
Trunk Configuration The switch supports both static trunking and dynamic Link Aggregation Control Protocol (LACP). You can create multiple links between devices that work as one virtual, aggregate link. A port trunk offers a dramatic increase in bandwidth for network segments where bottlenecks exist, as well as providing a fault-tolerant link between two devices.
ONFIGURING THE WITCH • The ports at both ends of a trunk must be configured in an identical manner, including communication mode (i.e., speed, duplex mode and flow control), VLAN assignments, and CoS settings. • All the ports in a trunk have to be treated as a whole when moved from/ to, added or deleted from a VLAN.
Page 37
RUNK ONFIGURATION Web – Click Administrator=>Trunking=>Aggregator Setting. Select the group ID and click the Get button to display the settings for the specified group. Set LACP to “Disable.” Use the Add and Remove buttons to assign port members, and then click Apply. Click Administrator=>Trunking=>Aggregator Information to display currently configured static trunks and group members.
LACP. • If the target switch has also enabled LACP on the connected ports, and port members at one or both ends of the link are set to actively initiate a link, the trunk will be activated automatically.
Aggregator Setting Field Attributes • System Priority – A value used to select the device that initiates an LACP trunk. The device with the lowest value has the highest priority and will be selected as the active LACP partner. • Group ID – Specifies the LACP trunk group. •...
A trunk can only be formed if the devices at both ends of a link use the same key. A key is automatically generated by the switch when configuring a trunk.
Page 41
RUNK ONFIGURATION Web – Click Administrator=>Trunking=>Aggregator Information to display currently configured trunks and group members. 3-19...
ONFIGURING THE WITCH State Activity Set the port members to actively or passively initiate an LACP trunk. Field Attributes • Port – Lists all ports that can be configured as LACP trunk members. • LACP State Activity – When set to Active, a port can automatically initiate a trunk if an LACP partner is detected at the other end of the link.
• Port Security – Disables address learning for the specified port. Valid addresses must be learned during a initial training period or statically configured. • MAC Filtering – Filters specified addresses from the switch or from a specific VLAN. Configuring Multicast Filtering Multicasting is used to support real-time applications such as video conferencing or streaming audio.
Page 44
You can enable IGMP Snooping and Query via the Switch Settings menu, and display information about multicast traffic being forwarded by the switch via the Filtering Database menu as shown below.
Page 45
ORWARDING AND ILTERING Click Administrator=>Filtering Database=>IGMP Snooping. 3-23...
WITCH Setting Static Addresses A static address can be assigned to a specific interface on this switch. Traffic sent from devices listed in the static address table will only be accepted on the specified interface. If any packets with a source address listed in this table enter another interface, they will be dropped.
ORWARDING AND ILTERING Configuring Port Security If you enable port security, the switch will stop learning new addresses on the specified port. Only incoming traffic with source addresses already stored in the dynamic address table will be accepted. The MAC addresses already in the address table will be retained and will not age out.
ONFIGURING THE WITCH Configuring Address Filtering You can drop traffic from unwanted stations based on the source MAC address (and associated VLAN if tagged VLANs are enabled). Field Attributes • MAC Address – Source MAC address. • Vlan ID – ID of configured VLAN (1-4094). This option is only available if IEEE 802.1Q tagged VLANs are enabled (page 3-29).
IP addresses or IP subnets. VLANs provide a high level of network security since traffic must pass through a Layer 3 switch to reach a different VLAN. This switch supports the following VLAN features: •...
A group of network users assigned to a VLAN form a broadcast domain that is separate from other VLANs configured on the switch. Packets are forwarded only between ports that are designated for the same VLAN. Port-based VLANs can be used to manually isolate user groups or subnets.
VLAN tagging. VLAN Classification – When the switch receives a frame, it classifies the frame in one of two ways. If the frame is untagged, the switch assigns the frame to an associated VLAN (based on the PVID of the receiving port).
Page 52
IEEE 802.1Q VLAN protocol, it can be configured to broadcast a message to your network indicating the VLAN groups it wants to join. When this switch receives these messages, it will automatically place the receiving port in the specified VLANs and forward the message to all other ports.
VLAN C ONFIGURATION Creating Tagged VLANs Web – Click Administrator=>Switch Settings=>Advanced. Set VLAN Operation Mode to 802.1Q with or without GVRP, then click Apply. Click Administrator=>VLAN Configuration=>Basic. Click Add to create a group. Enter the VLAN Name (1-15 characters) and Group ID (2-4094).
GVRP or STP. • Ingress Filtering 2 – Sets the port to drop untagged frames. If only tagged frames are accepted, the switch will only accept frames if the frame tag matches a VLAN to which this port has been assigned.
Page 55
VLAN C ONFIGURATION Web – Click Administrator=>VLAN Configuration=>Port VID. Set the PVID and Ingress Filtering rules, then click Apply. 3-33...
Enabling STP To configure STP, first enable the protocol as shown below. Web – Click Administrator=>Switch Settings=>Advanced. Enable STP Protocol, and click Apply. Configuring Global STP Settings Global settings apply to the entire switch.
Page 57
information (provided in the last configuration message) becomes the designated port for the attached LAN. If it is a root port, a new root port is selected from among the device ports attached to the network. - Default: 20 - Minimum: The higher of 6 or [2 x (Hello Time + 1)] - Maximum: The lower of 40 or [2 x (Forward Delay - 1)] •...
• Root Path Cost – The path cost from the root port on this switch to the root device. • Root Port – The number of the port on this switch that is closest to the root. This switch communicates with the root device through this port.
Page 59
• Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the Spanning Tree.
ONFIGURING THE WITCH Displaying Port Status for STP You can display the current STP settings and state for each port. Field Attributes • Port State – Displays the current state of this port in the Spanning Tree: - Disabled - No link has been established on this port. Otherwise, the port has been disabled by the user or has failed diagnostics.
Port Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner.
Access rights to the onboard agent are controlled by community strings. To communicate with the switch, the management station must first submit a valid community string for authentication. The options for configuring community strings and related trap functions are described in the following sections.
Add. Specifying Trap Managers You can specify up to five management stations that will receive authentication failure messages and other trap messages from the switch. Field Attributes • IP Address – IP address of trap manager.
ONFIGURING THE WITCH User Authentication The administrator has write access for parameters governing the onboard agent. You should therefore assign a password as soon as possible, and store it in a safe place. (If your password is lost, reload the system firmware as described in Appendix B.) The default administrator name is “admin”...
Firmware and Configuration Settings Downloading System Software from a Server You can download firmware from a TFTP server. Field Attributes • TFTP Server IP Address – The IP address of a TFTP server. • Destination File Name – The file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names is 25 characters.
WITCH Saving or Restoring Configuration Settings You can upload/download configuration settings to/from a TFTP server. The configuration file can be later downloaded to restore the switch’s settings. Field Attributes • TFTP Server IP Address – The IP address of a TFTP server.
Note: When restarting the system, it always runs the Power-On Self-Test. Rebooting the System Web – Click Reboot. Click the Reboot button to restart the switch. Note: When restarting the system, it always runs the Power-On Self-Test. ESETTING THE...
This chapter provides a basic description of the console menus. For a more detailed description about specific features, please refer to the appropriate section in Chapter 3, Configuring the Switch. Log-in Screen Once a direct connection to the serial port or a Telnet connection is established, the log-in screen for the onboard configuration program appears as shown below.
Main Menu With the system configuration program you can define system parameters, manage and control the switch and all its ports, or monitor network conditions. The screen below of the Main Menu and the following table briefly describe the selections available from this program.
Page 71
The system configuration program is illustrated by the following menu map, and described in the table on the next page. Status and Counters Port Status Port Counters System Information Switch Static Configuration Administration Configuration Port/Trunk Configuration Port Mirroring Configuration VLAN Configuration Priority Configuration...
Page 72
ONSOLE NTERFACE Menu Status and Counters Port Status Port Counters System Information Switch Static Configuration Administration Configuration Device Information IP Configuration Change Username Change Password Port/Trunk Configuration Port Mirroring Configuration VLAN Configuration VLAN Configure Create a VLAN Group Edit/Delete a...
Page 73
GVRP Configures dynamic trunks; displays status Configures dynamic trunks Actively or passively configures a trunk Shows trunks and associated ports, and detailed information for dynamic links Reboots the switch, or resets to defaults Page 4-30 4-32 4-33 4-35...
ONSOLE NTERFACE Status and Counters Menu Use the Status and Counters menu to display port status, port statistics, and system information. Tiger Switch 10/100 6709FL2 : Status and Counters =========================== Tab=Next Item Menu Port Status Port Counters System Information Port Status...
• Status – Indicates if the link is Up or Down. • Mode – Shows the port speed and duplex mode. • Flow Control – Indicates the type of flow control in use. Console – Click Status and Counters=>Port Status. Tiger Switch 10/100 6709FL2 : Port Status =========================== Port Type...
Group MIB, Ethernet-like MIB, and RMOM MIB. These statistics display errors on the traffic passing through each port. This information can be used to identify potential problems with the switch (such as a faulty port or unusually heavy loading). All values displayed have been accumulated since the last system reboot, and are shown as counts per second.
Field Attributes • System Description – Switch model number. • MAC Address – The physical layer address for this switch. • Firmware Version – Version number of runtime code. • Hardware Version – Hardware version of the main board.
ONSOLE NTERFACE Switch Static Configuration Menu Use the Switch Static Configuration menu to configure the items listed in the following table. Tiger Switch 10/100 6709FL2 : Switch Configuration =========================== Tab=Next Item Menu Administration Configuration Port/Trunk Configuration Port Mirroring Configuration VLAN Configuration...
Menu MAC Address Configuration Misc Configuration Administration Configuration Menu Use the Administration Configuration menu to configure device information, the switch’s IP address, and user name and password. Tiger Switch 10/100 6709FL2 : Device Configuration =========================== Tab=Next Item Menu Device Information...
Use the Device Information page to identify the system by providing a descriptive name, location, and other information. Field Attributes • Device Name – Name assigned to the switch system. • Device Content – Lists the supported ports or other information. • Device Location – Specifies the system location.
Use the IP Configuration page to configure the switch’s IP parameters. Field Attributes • IP Address – IP address of the switch. Valid IP addresses consist of four numbers, 0 and 255, separated by periods. Anything outside this format will not be accepted by the configuration program.
The default administrator name is “admin.” Note that the user name and password control access to both the Web interface and the console menu. Console – Click Switch Static Configuration=>Administration Configuration=> Change Username. Set a new user name, and save it. Tiger Switch 10/100 6709FL2 : UserName Configuration. =========================== actions-> <Edit>...
Console – Click Switch Static Configuration=>Administration Configuration=> Change Password. Enter the old password, enter the new password, confirm it by entering it again. Press the <Enter> key to save it. Tiger Switch 10/100 6709FL2 : Password Configuration =========================== password changed successfully!press any key to return! Esc=Previous menu Note: Maximum string length is 8 alphanumeric characters.
• Flow Control – Allows automatic or manual selection of flow control. Flow control can eliminate frame loss by “blocking” traffic from end stations or segments connected directly to the switch when its buffers fill. When enabled, back pressure is used for half-duplex operation and IEEE 802.3x for full-duplex operation.
Page 85
Console – Click Switch Static Configuration=>Port/Trunk Configuration. Modify the required interface settings, and save your settings. Tiger Switch 10/100 6709FL2 : Port Configuration =========================== Port Type Enabled ---------------------------------------------------------------------------- 10/100TX 10/100TX 10/100TX 10/100TX 10/100TX 10/100TX 10/100TX 10/100TX 100FX actions-> <Quit> Configure the port group status.
ONSOLE NTERFACE Configuring Port Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner.
Page 87
Console – Click Switch Static Configuration=>Port Mirroring Configuration. Enable monitoring, specify the monitoring (or analysis) port, the monitor ports and traffic types to mirror, then save your settings. Tiger Switch 10/100 6709FL2 : Port Monitoring Configuration =========================== Monitoring enable :YES...
NTERFACE VLAN Configuration Menu Use the VLAN Configuration menu to specify the VLAN type used on this switch, configure VLAN groups, or set the default VLAN identifier and ingress filtering for each port. Tiger Switch 10/100 6709FL2 : VLAN Configuration =========================== Configure the VLAN PVID and Ingress Rule.
Use the VLAN Configuration menu to create port-based VLANs. Console – Click Switch Static Configuration=>VLAN Configuration=> VLAN Configure. Set VLAN Mode to “PortBased,” and save this setting. Tiger Switch 10/100 6709FL2 : VLAN Support Configuraton ============================ VLAN Mode :PortBased actions->...
Page 90
ONSOLE NTERFACE VLAN Name: [TPS Port ------------------------ actions-> <Quit> Tab=Next Item BackSpace=Previous Item 4-22 Add a VLAN Group -------------------------- Grp ID: [2 Member Member Member Member <Edit> <Save> Select the Action menu. Quit=Previous Menu ](1~4094) Enter=Select Item...
GVRP or STP. • Ingress Filter 2 (Untagged Pkt) – Sets the port to drop untagged frames. If only tagged frames are accepted, the switch will only accept frames if the frame tag matches a VLAN to which this port has been assigned.
Page 92
Console – Click Switch Static Configuration=>VLAN Configuration=> VLAN Configure. Set VLAN Mode to “802.1Q” or “802.1QwithGVRP.” Set the PVID and Ingress Filtering rules, and save your settings. Tiger Switch 10/100 6709FL2 : VLAN Support Configuraton =========================== VLAN Mode :802.1Q Port ------------------------------------------------------- actions->...
Page 93
VLAN Name: [TPS Protocol VLAN : Port ------------------------ actions-> <Quit> Select the Action menu. Tab=Next Item BackSpace=Previous Item WITCH TATIC Add a VLAN Group -------------------------- ] VLAN ID: [2 None Member Tagged UnTagged UnTagged <Edit> <Save> Quit=Previous Menu ONFIGURATION ](1~4094) Enter=Select Item 4-25...
Use the Priority Configuration page to specify which data packets have greater precedence when traffic is buffered in the switch due to congestion. This switch has two priority queues for each port. Data packets in a port’s high-priority queue is transmitted before those in the lower-priority queue.
Page 95
Console – Click Switch Static Configuration=>Priority Configuration. Assign frames tagged with priority 0-7 to the low or high priority queue. Set the method of servicing the priority queues, and save your settings. Tiger Switch 10/100 6709FL2 : Priority Configuration ===========================...
Static addresses remain in the switch’s address table, regardless of whether the device is physically connected to the switch. This saves the switch from having to re-learn a device’s MAC address when the disconnected or powered-off device becomes active on the network again.
Page 97
Configuration=>Static MAC Address. Click <Add> to open the Add Static MAC Address page. Specify the MAC address, port number, and VLAN ID, then save your settings. Tiger Switch 10/100 6709FL2 : Add Static MAC Address =========================== Mac Address :0030299434DE Port num Vlan ID actions->...
ONSOLE NTERFACE Tiger Switch 10/100 6709FL2 : Static MAC Address Configuration =========================== Mac Address Port num ------------------------------- 0030299434DE actions-> <Add> Tab=Next Item BackSpace=Previous Item Configuring Address Filtering Use the Filtering MAC Address page to drop traffic from unwanted stations based on the source MAC address (and associated VLAN if tagged VLANs are enabled).
Page 99
Tiger Switch 10/100 6709FL2 : Add Filter MAC Address =========================== Mac Address :00E0299434DE Vlan ID actions-> <Edit> Save successfully!Press any key to return! Tab=Next Item BackSpace=Previous Item After you configure a new address, it will be displayed on the Filter MAC Address Configuration page as shown below.
ONSOLE NTERFACE Miscellaneous Configuration Menu Use the Misc Configuration menu to configure the features listed in the following table. Tiger Switch 10/100 6709FL2 : Misc Configuration =========================== Tab=Next Item Menu Port Security MAC Age Interval Broadcast Storm Filtering Sets the threshold above which broadcast...
Configuring Port Security Use the Port Security page to lock the address table for specified ports. If you enable port security, the switch will stop learning new addresses on the specified port. Only incoming traffic with source addresses already stored in the dynamic address table will be accepted.
Page 102
ONSOLE NTERFACE Tiger Switch 10/100 6709FL2 : The Configuration of Port Security =========================== Port (disable for MAC Learning) ------------------------------- actions-> <Quit> Tab=Next Item BackSpace=Previous Item 4-34 Enable Security Disable Disable Disable Disable enable Disable Disable Disable Disable <Edit> <Save> Select the Action menu.
Configuring Address Aging Use the MAC Age Interval page to set the address aging time. The switch stores the addresses of known devices. This information is used to route traffic directly between the inbound and outbound ports. The addresses are learned by monitoring traffic and stored in the dynamic address table.
Console – Click Switch Static Configuration=>Misc Configuration=> Max bridge transmit delay bound. Specify the maximum transmit delay bound for the overall delay permitted within the switch, enable or disable the delay bound for the low-priority queue and set a value for this bound, then save your settings.
Page 106
ONSOLE NTERFACE Tiger Switch 10/100 6709FL2 :Configure Max Bridge Transmit Delay Bound ============================ actions-> <Edit> Tab=Next Item BackSpace=Previous Item 4-38 Max bridge transmit delay bound :OFF Enable Delay Bound :Disabled Max Delay Time :0 <Save> Select the action menu. Quit=Previous Menu <Quit>...
Protocol Related Configuration Menu Use the Protocol Related Configuration menu to configure the items listed in the following table. Tiger Switch 10/100 6709FL2 : Protocol Related Configuration =========================== Tab=Next Item BackSpace=Previous Item Menu SNMP GVRP LACP ROTOCOL SNMP GVRP LACP Previous Menu Configure the Spanning Tree Protocol.
The backup links automatically take over when a primary link goes down. Tiger Switch 10/100 6709FL2 : Spanning Tree Protocol =========================== Tab=Next Item...
• Priority – Bridge priority for the root device. • MAC Address – MAC address of the root device. • Root Path Cost – The path cost from the root port on this switch to the root device. • Root Port – The number of the port on this switch that is closest to the root.
Page 110
ONSOLE NTERFACE port. If there is no root port, then this switch has been accepted as the root device of the Spanning Tree network. • Maximum Age – The maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure.
Configuring Global STP Settings Use the System Configuration page to configure global settings for STP which apply to the entire switch. Field Attributes • Priority – Bridge priority is used in selecting the root device, root port, and designated port. The device with the highest priority becomes the STA root device.
Page 112
- Minimum: The higher of 4 or [(Max. Message Age / 2) + 1] - Maximum: 30 Console – Click Protocol Related Configuration=>STP=>System Configuration. Modify the required attributes, and save your settings Tiger Switch 10/100 6709FL2 : STP System Configuration =========================== Root Bridge Information ------------------------...
• Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the Spanning Tree.
Page 114
ONSOLE NTERFACE Console – Click Protocol Related Configuration=>STP=>Perport Configuration. Modify the required attributes, and save your settings Tiger Switch 10/100 6709FL2 : STP Port Configuration =========================== Port PortState ------------------------------------------------------------ Disabled Forwarding Disabled Disabled Disabled Disabled Disabled Disabled Disabled actions-> <Quit>...
Simple Network Management Protocol Menu Use the SNMP menu to configure basic information and management access settings for the Simple Network Management Protocol. The switch includes an onboard agent that continuously monitors the status of its hardware, as well as the traffic passing through its ports, based on the SNMP.
Use the System Options page to identify the system by providing a descriptive name, location, and contact information. Field Attributes • System Name – Name assigned to the switch system. • System Location – Specifies the system location. • System Contact – Administrator responsible for the system.
Strings. Click <Add> to open the SNMP Community Configuration page. Enter a new string in the text box and select the access rights, then save your settings. Tiger Switch 10/100 6709FL2 : Add SNMP Community =========================== Community Name :private Write Access actions->...
Console – Click Protocol Related Configuration=>SNMP=>Trap Managers. Click <Add> to open the Add SNMP Trap Manager page. Fill in the IP address and community string for a trap manager, then save your settings. Tiger Switch 10/100 6709FL2 : Add SNMP Trap Manager =========================== actions-> <Edit>...
Use the GVRP page to enable automatic VLAN registration, and to support VLANs which extend beyond the local switch. (Default: Disabled) Note: GVRP will also be enabled if the VLAN Mode selection under the VLAN Configure screen is set to “802.1QwithGVRP.”...
LACP. • If the target switch has also enabled LACP on the connected ports, and port members at one or both ends of the link are set to actively initiate a link, the trunk will be activated automatically.
Menu State Activity LACP Status Configuring the Aggregator Setting First use the Port Configuration page to create trunk groups (page 4-16), and then use the Aggregator Setting page to enable LACP and specify the maximum number of active ports. Field Attributes •...
Page 122
ONSOLE NTERFACE Tiger Switch 10/100 6709FL2 : LACP Group Configuration =========================== actions-> <Edit> Tab=Next Item BackSpace=Previous Item 4-54 Group LACP LACP Work Port Num ------------------------------------------ Trk1. Enabled <Save> Select the action menu. Quit=Previous Menu <Quit> Enter=Select Item...
Console – Click Protocol Related Configuration=>LACP=>State Activity. Specify the ports which can actively initiate an LACP trunk, and save your settings. Tiger Switch 10/100 6709FL2 : LACP Port State Active Configuration =========================== actions-> <Edit>...
A trunk can only be formed if the devices at both ends of a link use the same key. A key is automatically generated by the switch when configuring a trunk.
Page 125
Console – Click Protocol Related Configuration=>LACP=>LACP Status to display currently configured trunks and group members. Tiger Switch 10/100 6709FL2 : LACP Group Status =========================== Group Key : 1 Port_No actions-> <Quit> Tab=Next Item BackSpace=Previous Item Click <Next Page> to display multiple trunk groups.
Menu Default Restart Notes: 1. When resetting the switch to factory defaults (i.e., using the Default option), it will prompt you with a message to verify whether or not you want to continue. 2. When rebooting the switch (i.e., using the Restart option), the system will be rebooted immediately;...
PPENDIX OFTWARE PECIFICATIONS Switch Features Spanning Tree Protocol Flow Control Full Duplex: IEEE 802.3x Half Duplex: Back pressure Broadcast Storm Suppression Traffic throttled above a critical threshold VLAN Support Up to 128 groups; port-based or with 802.1Q VLAN tagging, GVRP for automatic VLAN learning,...
OFTWARE PECIFICATIONS Management Features In-Band Management Telnet, Web-based HTTP, or SNMP manager Out-of-Band Management RS-232 DB-9 console port Software Loading TFTP in-band or XModem out-of-band MIB Support MIB II (RFC 1213), Bridge MIB (RFC 1493), Ethernet-Like MIB (RFC 1643), IGMP (RFC 1112), SNMP (RFC 1157), RMON MIB (RFC 1757), MIB 2 (RFC 1213), ARP (RFC 826) RMON Support Groups 1, 2, 3, 9 (Statistics, History, Alarm, Event)
Page 129
4. From the terminal emulation program, select the file you want to download, set the protocol to XModem, and then start downloading. (Note that the download file should be an SMC6709FL2 binary file from SMC; otherwise the agent will not accept it.) PPENDIX Restart the system.
Change the baud rate back to 9600 bps. When using Windows HyperTerminal, disconnect 6. Then press Enter to open the Log-on screen. For details on managing the switch, refer to the appropriate chapters in this manual. , set the baud rate, and reconnect...
VT100 compatible, 8 data bits, 1 stop bit, no parity, and 9600 bps. • Check that the null-modem serial cable conforms to the pin-out connections provided in the Installation Guide. • Contact your distributor or SMC technical support for assistance. PPENDIX...
A workstation, server, or other device that does not act as a network interconnection. Full Duplex Transmission method that allows the switch and attached device to transmit and receive concurrently, effectively doubling the bandwidth of that link. GARP VLAN Registration Protocol (GVRP)
LOSSARY Group Attribute Registration Protocol See Generic Attribute Registration Protocol. IEEE 802.1D Specifies a general method for the operation of MAC bridges, including the Spanning Tree Protocol. IEEE 802.1Q VLAN Tagging—Defines Ethernet frame tags which carry VLAN information. It allows switches to assign endstations to different virtual LANs, and defines a standard way for VLANs to communicate across switched networks.
In-Band Management Management of the network from a station attached directly to the network. IP Multicast Filtering A process whereby this switch can pass multicast traffic along to participating hosts. Local Area Network (LAN) A group of interconnected computer and support devices.
LOSSARY Out-of-Band Management Management of the network from a station not attached to the network. Port Mirroring A method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON probe. This allows data on the target port to be studied unobtrusively.
Page 137
Trivial File Transfer Protocol (TFTP) A TCP/IP protocol commonly used for software downloads. Virtual LAN (VLAN) A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network. A VLAN serves as a logical workgroup with no physical barriers, and allows users to share information and resources as though located on the same LAN.