Structure of This Guide
Chapter
system power and PoE parameters on devices that offer Power over Ethernet.
Chapter
supported by the device.
Chapter
how to enable or disable switch ports and configure switch port settings, including port speed,
duplex mode, auto‐negotiation, flow control, port mirroring, link aggegation and broadcast
suppression.
Chapter
rights, target addresses, and notification parameters.
Chapter
parameters for the device, including bridge priority, hello time, maximum aging time and forward
delay; and how to review and set Spanning Tree port parameters, including port priority and path
costs. Configuring the SpanGuard and Loop Protect functions is also described.
Chapter
of operation for each port, establish VLAN forwarding (egress) lists, route frames according to
VLAN ID, display the current ports and port types associated with a VLAN and protocol, create a
secure management VLAN, and configure ports on the device as GVRP‐aware ports.
Chapter
roles or profiles based on business‐specific use of network services; how to permit or deny access
to specific services by creating and assigning classification rules which map user profiles to frame
filtering policies; how to classify frames to a VLAN or Class of Service (CoS); and how to assign or
unassign ports to policy profiles so that only ports activated for a profile will be allowed to
transmit frames accordingly.
Chapter
and configure a rate limit for a given port and list of priorities.
Chapter
Protocol (IGMP) settings for multicast filtering.
Chapter
manage general switch settings, how to monitor network events and status,and how to configure
SNTP and node aliases.
Chapter
which provides comprehensive network fault diagnosis, planning, and performance tuning
information and allows for interoperability between SNMP management stations and monitoring
agents.
Chapter
parameters, how to review and configure DHCP address pools, and how to display DHCP server
information.
Chapter
DHCP snooping, which monitors DHCP messages between a DHCP client and DHCP server to
filter harmful DHCP messages and to build a database of authorized address bindings, and
Dynamic ARP inspection, which uses the bindings database created by the DHCP snooping
feature to reject invalid and malicious ARP packets.
Chapter
Chapter
to configure IP interface settings, how to review and configure the routing ARP table, how to
review and configure routing broadcasts, how to configure PIM, and how to configure IP routes.
xxxiv About This Guide
5, Configuring System Power and PoE, describes the commands used to review and set
6, Discovery Protocol Configuration provides how to configure discovery protocols
7, Port Configuration, describes how to review and configure console port settings, and
8, SNMP Configuration, describes how to configure SNMP users and user groups, access
9, Spanning Tree Configuration, describes how to review and set Spanning Tree bridge
10, 802.1Q VLAN Configuration, describes how to create static VLANs, select the mode
11, Policy Classification Configuration, describes how to create, change or remove user
12, Port Priority Configuration, describes how to set the transmit priority of each port
13, IGMP Configuration, describes how to configure Internet Group Management
14, Logging and Network Management, describes how to configure Syslog, how to
15, RMON Configuration, describes how to use RMON (Remote Network Monitoring),
16, DHCP Server Configuration, describes how to review and configure DHCP server
17, DHCP Snooping and Dynamic ARP Inspection, describes two security features:
18, Preparing for Router Mode, provides information about router modes.
19, IP Configuration, describes how to enable IP routing for router mode operation, how
Need help?
Do you have a question about the SECURESTACK C3 and is the answer not in the manual?
Questions and answers