User Manual
Table Of Contents
- Contents
- Figures
- Preface
- Section I
- Basic Operations
- Chapter 1
- Starting a Web Browser Management Session
- Chapter 2
- Basic Switch Parameters
- Chapter 3
- Enhanced Stacking
- Chapter 4
- SNMPv1 and SNMPv2c Community Strings
- Chapter 5
- Port Parameters
- Chapter 6
- MAC Address Table
- Chapter 7
- Static Port Trunks
- Chapter 8
- Port Mirroring
- Section II
- Advanced Operations
- Chapter 9
- File System
- Chapter 10
- File Downloads and Uploads
- Chapter 11
- Event Log and Syslog Servers
- Chapter 12
- Classifiers
- Chapter 13
- Access Control Lists
- Chapter 14
- Quality of Service
- Chapter 15
- Class of Service
- Chapter 16
- IGMP Snooping
- Chapter 17
- Denial of Service Defense
- Chapter 18
- Power Over Ethernet
- Section III
- SNMPv3 Operations
- Chapter 19
- SNMPv3
- Enabling the SNMP Protocol
- Configuring the SNMPv3 User Table
- Configuring the SNMPv3 View Table
- Configuring the SNMPv3 Access Table
- Configuring the SNMPv3 SecurityToGroup Table
- Configuring the SNMPv3 Notify Table
- Configuring the SNMPv3 Target Address Table
- Configuring the SNMPv3 Target Parameters Table
- Configuring the SNMPv3 Community Table
- Displaying SNMPv3 Tables
- Section IV
- Spanning Tree Protocols
- Chapter 20
- Spanning Tree, Rapid Spanning Tree, and Multiple Spanning Tree Protocols
- Section V
- Virtual LANs
- Chapter 21
- Port-based and Tagged Virtual LANs
- Chapter 22
- GARP VLAN Registration Protocol
- Chapter 23
- Protected Ports VLANs
- Section VI
- Port Security
- Chapter 24
- MAC Address-based Port Security
- Chapter 25
- 802.1x Port-based Network Access Control
- Section VII
- Management Security
- Chapter 26
- Encryption Keys, PKI, and SSL
- Chapter 27
- Secure Shell Protocol
- Chapter 28
- TACACS+ and RADIUS Authentication Protocols
- Chapter 29
- Management Access Control List
- Index
Contents
4
Chapter 5: Port Parameters .......................................................................................................................... 71
Configuring Port Parameters ............................................................................................................................72
Displaying Port Status and Statistics ................................................................................................................78
Chapter 6: MAC Address Table .................................................................................................................... 83
Displaying the MAC Address Table .................................................................................................................. 84
Adding Static Unicast and Multicast MAC Addresses.......................................................................................87
Deleting Unicast and Multicast MAC Addresses...............................................................................................89
Deleting All Dynamic Unicast and Multicast MAC Addresses........................................................................... 90
Changing the Aging Time ................................................................................................................................. 91
Chapter 7: Static Port Trunks .......................................................................................................................93
Creating a Static Port Trunk.............................................................................................................................. 94
Modifying a Static Port Trunk ............................................................................................................................97
Deleting a Static Port Trunk ..............................................................................................................................99
Displaying the Static Port Trunks....................................................................................................................100
Chapter 8: Port Mirroring ............................................................................................................................101
Creating a Port Mirror .....................................................................................................................................102
Modifying or Disabling a Port Mirror................................................................................................................105
Deleting a Port Mirror ......................................................................................................................................106
Displaying the Port Mirror ...............................................................................................................................107
Section II: Advanced Operations ...........................................................................109
Chapter 9: File System ................................................................................................................................111
Viewing System Files and Changing the Active Configuration File.................................................................112
Chapter 10: File Downloads and Uploads .................................................................................................115
Downloading a File .........................................................................................................................................116
Uploading a File ..............................................................................................................................................119
Chapter 11: Event Log and Syslog Servers ............................................................................................... 121
Managing the Event Log .................................................................................................................................122
Enabling or Disabling the Event Log ........................................................................................................ 122
Displaying the Event Log..........................................................................................................................124
Modifying the Event Log Full Action .........................................................................................................127
Saving the Event Log ............................................................................................................................... 128
Clearing the Event Log .............................................................................................................................128
Managing Syslog Server Definitions ...............................................................................................................129
Creating a Syslog Server Definition..........................................................................................................130
Modifying a Syslog Server Definition........................................................................................................134
Deleting a Syslog Server Definition ..........................................................................................................134
Viewing a Syslog Server Definition........................................................................................................... 135
Chapter 12: Classifiers ................................................................................................................................137
Creating a Classifier........................................................................................................................................138
Modifying a Classifier ...................................................................................................................................... 144
Deleting a Classifier ........................................................................................................................................ 145
Displaying the Classifiers ................................................................................................................................ 146
Chapter 13: Access Control Lists ..............................................................................................................147
Creating an Access Control List......................................................................................................................148
Modifying an Access Control List ....................................................................................................................151
Deleting an Access Control List ......................................................................................................................153
Displaying the Access Control Lists................................................................................................................154