Table of Contents
1. Introduction...................................................................................................................................... 1-1
Overview...........................................................................................................................................1-2
Package Checklist...............................................................................................................................1-2
Software Features ..............................................................................................................................1-2
2. Getting Started................................................................................................................................ 2-1
Serial Console Configuration (115200, None, 8, 1, VT100).......................................................................2-2
Configuration by Telnet Console ...........................................................................................................2-4
Configuration by Web Browser .............................................................................................................2-6
Disabling Telnet and Browser Access.....................................................................................................2-8
3. Featured Functions ........................................................................................................................... 3-1
Configuring Basic Settings ...................................................................................................................3-2
System Identification...................................................................................................................3-2
Password ...................................................................................................................................3-2
Accessible IP...............................................................................................................................3-3
Port...........................................................................................................................................3-4
Network.....................................................................................................................................3-5
Time..........................................................................................................................................3-7
Daylight Saving Time...................................................................................................................3-8
IEEE 1588 PTP............................................................................................................................3-9
System File Update—By Remote TFTP..........................................................................................3-10
System File Update—By Local Import/Export ................................................................................3-11
System File Update—By Backup Media.........................................................................................3-12
Restart.....................................................................................................................................3-12
Factory Default .........................................................................................................................3-13
Using Port Trunking ..........................................................................................................................3-13
The Port Trunking Concept .........................................................................................................3-13
Configuring Port Trunking...........................................................................................................3-14
Configuring SNMP.............................................................................................................................3-15
SNMP Read/Write Settings..........................................................................................................3-16
Trap Settings............................................................................................................................3-17
Private MIB information..............................................................................................................3-18
Using Communication Redundancy .....................................................................................................3-18
The Turbo Ring Concept.............................................................................................................3-19
Configuring Turbo Ring and Turbo Ring V2 ...................................................................................3-22
The Turbo Chain Concept ...........................................................................................................3-26
Configuring “Turbo Chain” ..........................................................................................................3-27
The STP/RSTP Concept ..............................................................................................................3-29
Configuring STP/RSTP................................................................................................................3-34
Using Traffic Prioritization..................................................................................................................3-36
The Traffic Prioritization Concept.................................................................................................3-36
Configuring Traffic Prioritization ..................................................................................................3-38
Using Virtual LAN..............................................................................................................................3-40
The Virtual LAN (VLAN) Concept..................................................................................................3-40
Sample Applications of VLANs using IKS-6726 ..............................................................................3-42
Configuring Virtual LAN..............................................................................................................3-43
Using Multicast Filtering.....................................................................................................................3-45
The Concept of Multicast Filtering................................................................................................3-45
Configuring IGMP Snooping ........................................................................................................3-48
Add Static Multicast MAC............................................................................................................3-50
Configuring GMRP .....................................................................................................................3-51
GMRP Table..............................................................................................................................3-51
Using Bandwidth Management............................................................................................................3-51
Configuring Bandwidth Management ...................................................................................................3-52
Broadcast Storm Protection ........................................................................................................3-52
Traffic Rate Limiting Settings......................................................................................................3-52
Using Port Access Control ..................................................................................................................3-53
Configuring Static Port Lock........................................................................................................3-54
Configuring IEEE 802.1X ............................................................................................................3-54
Using Auto Warning ..........................................................................................................................3-57
Configuring Email Warning .........................................................................................................3-57
Event Type...............................................................................................................................3-58
Email Setup..............................................................................................................................3-59
Configuring Relay Warning .........................................................................................................3-60
Event Setup..............................................................................................................................3-60
Warning List .............................................................................................................................3-61
Using Line-Swap-Fast-Recovery..........................................................................................................3-61
Configuring Line-Swap Fast Recovery ..........................................................................................3-61