MicroNet SP6526 User manual

Category
Software
Type
User manual
&RPPXQLFDWH YLD
w w w . m i c r o n e t . c o m . t w
User’s Manual
Model No.: SP6526
26-port Gigabit Managed
Ethernet Switch
User’s Manual
SP6526
24-Port 10/100/1000 Gigabit Managed Ethernet Switch with 2 100/
1000BASE-X SFP Uplink Slots
August 2013
E082013-AP-R01
– 3 –
ABOUT THIS GUIDE
PURPOSE This guide gives specific information on how to operate and use the
management functions of the switch.
AUDIENCE The guide is intended for use by network administrators who are
responsible for operating and maintaining network equipment;
consequently, it assumes a basic working knowledge of general switch
functions, the Internet Protocol (IP), and Simple Network Management
Protocol (SNMP).
CONVENTIONS The following conventions are used throughout this guide to show
information:
N
OTE
:
Emphasizes important information or calls your attention to related
features or instructions.
C
AUTION
:
Alerts you to a potential hazard that could cause loss of data, or
damage the system or equipment.
W
ARNING
:
Alerts you to a potential hazard that could cause personal injury.
RELATED PUBLICATIONS The following publication details the hardware features of the switch,
including the physical and performance-related characteristics, and how to
install the switch:
The Installation Guide
Also, as part of the switch’s software, there is an online web-based help
that describes all management related features.
REVISION HISTORY This section summarizes the changes in each revision of this guide.
AUGUST 2013 REVISION
This is the first version of this guide. This guide is valid for software release
v1.0.0.4.
– 4 –
CONTENTS
ABOUT THIS GUIDE 3
C
ONTENTS 4
F
IGURES 10
T
ABLES 15
SECTION I GETTING STARTED 16
1INTRODUCTION 17
Key Features 17
Description of Software Features 18
System Defaults 23
2INITIAL SWITCH CONFIGURATION 25
SECTION II WEB CONFIGURATION 27
3USING THE WEB INTERFACE 28
Navigating the Web Browser Interface 28
Home Page 28
Configuration Options 29
Panel Display 29
Main Menu 29
4CONFIGURING THE SWITCH 38
Configuring System Information 38
Setting an IP Address 39
Setting an IPv4 Address 39
Setting an IPv6 Address 41
Configuring NTP Service 43
Configuring the Time Zone and Daylight Savings Time 44
Configuring Remote Log Messages 46
Configuring Power Reduction 47
C
ONTENTS
– 5 –
Reducing Power to Idle Queue Circuits 47
Configuring Port Connections 49
Configuring Security 51
Configuring User Accounts 51
Configuring User Privilege Levels 53
Configuring The Authentication Method For Management Access 55
Configuring SSH 57
Configuring HTTPS 58
Filtering IP Addresses for Management Access 60
Using Simple Network Management Protocol 61
Remote Monitoring 72
Configuring Port Limit Controls 77
Configuring Authentication Through Network Access Servers 80
Filtering Traffic with Access Control Lists 90
Configuring DHCP Snooping 101
Configuring DHCP Relay and Option 82 Information 104
Configuring IP Source Guard 105
Configuring ARP Inspection 109
Specifying Authentication Servers 112
Creating Trunk Groups 114
Configuring Static Trunks 115
Configuring LACP 117
Configuring Loop Protection 119
Configuring the Spanning Tree Algorithm 121
Configuring Global Settings for STA 123
Configuring Multiple Spanning Trees 126
Configuring Spanning Tree Bridge Priorities 128
Configuring
STP/RSTP/CIST Interfaces 129
Configuring MIST Interfaces 133
Multicast VLAN Registration 134
Configuring General MVR Settings 135
Configuring MVR Channel Settings 138
IGMP Snooping 140
Configuring Global and Port-Related Settings for IGMP Snooping 140
Configuring VLAN Settings for IGMP Snooping and Query 144
Configuring IGMP Filtering 146
C
ONTENTS
– 6 –
MLD Snooping 147
Configuring Global and Port-Related Settings for MLD Snooping 147
Configuring VLAN Settings for MLD Snooping and Query 150
Configuring MLD Filtering 152
Link Layer Discovery Protocol 153
Configuring LLDP Timing and TLVs 153
Configuring LLDP-MED TLVs 156
Configuring the MAC Address Table 162
IEEE 802.1Q VLANs 164
Assigning Ports to VLANs 165
Configuring VLAN Attributes for Port Members 166
Configuring Private VLANs 169
Using Port Isolation 170
Configuring MAC-based VLANs 171
Protocol VLANs 172
Configuring Protocol VLAN Groups 173
Mapping Protocol Groups to Ports 174
Configuring IP Subnet-based VLANs 175
Managing VoIP Traffic 177
Configuring VoIP Traffic 177
Configuring Telephony OUI 179
Quality of Service 180
Configuring Port Classification 181
Configuring Port Policiers 183
Configuring Egress Port Scheduler 184
Configuring Egress Port Shaper 187
Configuring Port Remarking Mode 188
Configuring Port DSCP Translation and Rewriting 190
Configuring DSCP-based QoS Ingress Classification 191
Configuring DSCP Translation 192
Configuring DSCP Classification 193
Configuring QoS Control Lists 194
Configuring Storm Control 198
Configuring Local Port Mirroring 199
Configuring Remote Port Mirroring 201
Configuring UPnP 206
C
ONTENTS
– 7 –
Configuring sFlow 208
5MONITORING THE SWITCH 211
Displaying Basic Information About the System 211
Displaying System Information 211
Displaying CPU Utilization 212
Displaying Log Messages 213
Displaying Log Details 215
Displaying Information About Ports 215
Displaying Port Status On the Front Panel 215
Displaying an Overview of Port Statistics 216
Displaying QoS Statistics 216
Displaying QCL Status 217
Displaying Detailed Port Statistics 218
Displaying Information About Security Settings 221
Displaying Access Management Statistics 221
Displaying Information About Switch Settings for Port Security 222
Displaying Information About Learned MAC Addresses 224
Displaying Port Status for Authentication Services 225
Displaying Port Statistics for 802.1X or Remote Authentication Service
226
Displaying ACL Status 230
Displaying Statistics for DHCP Snooping 232
Displaying DHCP Relay Statistics 233
Displaying MAC Address Bindings for ARP Packets 235
Displaying Entries in the IP Source Guard Table 235
Displaying Information on Authentication Servers 236
Displaying a List of Authentication Servers 236
Displaying Statistics for Configured Authentication Servers 237
Displaying Information on RMON 241
Displaying RMON Statistics 241
Displaying RMON Historical Samples 242
Displaying RMON Alarm Settings 243
Displaying RMON Event Settings 244
Displaying Information on LACP 245
Displaying an Overview of LACP Groups 245
Displaying LACP Port Status 245
Displaying LACP Port Statistics 246
C
ONTENTS
– 8 –
Displaying Information on Loop Protection 247
Displaying Information on the Spanning Tree 248
Displaying Bridge Status for STA 248
Displaying Port Status for STA 251
Displaying Port Statistics for STA 252
Displaying MVR Information 253
Displaying MVR Statistics 253
Displaying MVR Group Information 254
Displaying MVR SFM Information 255
Showing IGMP Snooping Information 256
Showing IGMP Snooping Status 256
Showing IGMP Snooping Group Information 257
Showing IPv4 SFM Information 258
Showing MLD Snooping Information 259
Showing MLD Snooping Status 259
Showing MLD Snooping Group Information 260
Showing IPv6 SFM Information 261
Displaying LLDP Information 262
Displaying LLDP Neighbor Information 262
Displaying LLDP-MED Neighbor Information 263
Displaying LLDP Neighbor EEE Information 266
Displaying LLDP Port Statistics 267
Displaying the MAC Address Table 269
Displaying Information About VLANs 270
VLAN Membership 270
VLAN Port Status 271
Displaying Information About MAC-based VLANs 272
Displaying Information About Flow Sampling 273
6PERFORMING BASIC DIAGNOSTICS 276
Pinging an IPv4 or IPv6 Address 276
7PERFORMING SYSTEM MAINTENANCE 278
Restarting the Switch 278
Restoring Factory Defaults 279
Upgrading Firmware 279
Activating the Alternate Image 280
Managing Configuration Files 281
C
ONTENTS
– 9 –
Saving Configuration Settings 281
Restoring Configuration Settings 281
SECTION III APPENDICES 283
ASOFTWARE SPECIFICATIONS 284
Software Features 284
Management Features 285
Standards 286
Management Information Bases 287
BTROUBLESHOOTING 288
Problems Accessing the Management Interface 288
Using System Logs 289
CLICENSE INFORMATION 290
The GNU General Public License 290
GLOSSARY 294
I
NDEX 301
– 10 –
FIGURES
Figure 1: Home Page 28
Figure 2: Front Panel Indicators 29
Figure 3: System Information Configuration 38
Figure 4: IP Configuration 40
Figure 5: IPv6 Configuration 42
Figure 6: NTP Configuration 43
Figure 7: Time Zone and Daylight Savings Time Configuration 46
Figure 8: Configuring Settings for Remote Logging of Error Messages 47
Figure 9: Configuring EEE Power Reduction 49
Figure 10: Port Configuration 51
Figure 11: Showing User Accounts 53
Figure 12: Configuring User Accounts 53
Figure 13: Configuring Privilege Levels 55
Figure 14: Authentication Server Operation 56
Figure 15: Authentication Method for Management Access 57
Figure 16: SSH Configuration 58
Figure 17: HTTPS Configuration 60
Figure 18: Access Management Configuration 61
Figure 19: SNMP System Configuration 66
Figure 20: SNMPv3 Community Configuration 67
Figure 21: SNMPv3 User Configuration 69
Figure 22: SNMPv3 Group Configuration 70
Figure 23: SNMPv3 View Configuration 71
Figure 24: SNMPv3 Access Configuration 72
Figure 25: RMON Statistics Configuration 73
Figure 26: RMON History Configuration 74
Figure 27: RMON Alarm Configuration 76
Figure 28: RMON Event Configuration 77
Figure 29: Port Limit Control Configuration 79
Figure 30: Using Port Security 80
Figure 31: Network Access Server Configuration 90
F
IGURES
– 11 –
Figure 32: ACL Port Configuration 92
Figure 33: ACL Rate Limiter Configuration 93
Figure 34: Access Control List Configuration 101
Figure 35: DHCP Snooping Configuration 103
Figure 36: DHCP Relay Configuration 105
Figure 37: Configuring Global and Port-based Settings for IP Source Guard 107
Figure 38: Configuring Static Bindings for IP Source Guard 108
Figure 39: Configuring Global and Port Settings for ARP Inspection 110
Figure 40: Configuring Static Bindings for ARP Inspection 111
Figure 41: Authentication Configuration 113
Figure 42: Static Trunk Configuration 117
Figure 43: LACP Port Configuration 119
Figure 44: Loop Protection Configuration 120
Figure 45: STP Root Ports and Designated Ports 121
Figure 46: MSTP Region, Internal Spanning Tree, Multiple Spanning Tree 122
Figure 47: Common Internal Spanning Tree, Common Spanning Tree, Internal
Spanning Tree122
Figure 48: STA Bridge Configuration 126
Figure 49: Adding a VLAN to an MST Instance 128
Figure 50: Configuring STA Bridge Priorities 129
Figure 51: STP/RSTP/CIST Port Configuration 133
Figure 52: MSTI Port Configuration 134
Figure 53: MVR Concept 135
Figure 54: Configuring General MVR Settings 138
Figure 55: Configuring MVR Channel Settings 139
Figure 56: Configuring Global and Port-related Settings for IGMP Snooping 143
Figure 57: Configuring VLAN Settings for IGMP Snooping and Query 146
Figure 58: IGMP Snooping Port Group Filtering Configuration 146
Figure 59: Configuring Global and Port-related Settings for MLD Snooping 150
Figure 60: Configuring VLAN Settings for MLD Snooping and Query 152
Figure 61: MLD Snooping Port Group Filtering Configuration 153
Figure 62: LLDP Configuration 156
Figure 63: LLDP-MED Configuration 162
Figure 64: MAC Address Table Configuration 164
Figure 65: VLAN Membership Configuration 166
Figure 66: VLAN Port Configuration 168
Figure 67: Private VLAN Membership Configuration 170
F
IGURES
– 12 –
Figure 68: Port Isolation Configuration 170
Figure 69: Configuring MAC-Based VLANs 172
Figure 70: Configuring Protocol VLANs 174
Figure 71: Assigning Ports to Protocol VLANs 175
Figure 72: Assigning Ports to an IP Subnet-based VLAN 176
Figure 73: Configuring Global and Port Settings for a Voice VLAN 179
Figure 74: Configuring an OUI Telephony List 180
Figure 75: Configuring Ingress Port QoS Classification 182
Figure 76: Configuring Ingress Port Tag Classification 183
Figure 77: Configuring Ingress Port Policing 184
Figure 78: Displaying Egress Port Schedulers 186
Figure 79: Configuring Egress Port Schedulers and Shapers 187
Figure 80: Displaying Egress Port Shapers 188
Figure 81: Displaying Port Tag Remarking Mode 189
Figure 82: Configuring Port Tag Remarking Mode 190
Figure 83: Configuring Port DSCP Translation and Rewriting 191
Figure 84: Configuring DSCP-based QoS Ingress Classification 192
Figure 85: Configuring DSCP Translation and Re-mapping 193
Figure 86: Mapping DSCP to CoS/DPL Values 194
Figure 87: QoS Control List Configuration 198
Figure 88: Storm Control Configuration 199
Figure 89: Mirror Configuration 201
Figure 90: Configuring Remote Port Mirroring 201
Figure 91: Mirror Configuration (Source) 204
Figure 92: Mirror Configuration (Intermediate) 205
Figure 93: Mirror Configuration (Destination) 206
Figure 94: UPnP Configuration 208
Figure 95: sFlow Configuration 210
Figure 96: System Information 212
Figure 97: CPU Load 213
Figure 98: System Log Information 214
Figure 99: Detailed System Log Information 215
Figure 100: Port State Overview 215
Figure 101: Port Statistics Overview 216
Figure 102: Queueing Counters 217
Figure 103: QoS Control List Status 218
F
IGURES
– 13 –
Figure 104: Detailed Port Statistics 220
Figure 105: Access Management Statistics 221
Figure 106: Port Security Switch Status 223
Figure 107: Port Security Port Status 224
Figure 108: Network Access Server Switch Status 226
Figure 109: NAS Statistics for Specified Port 230
Figure 110: ACL Status 231
Figure 111: DHCP Snooping Statistics 233
Figure 112: DHCP Relay Statistics 234
Figure 113: Dynamic ARP Inspection Table 235
Figure 114: Dynamic IP Source Guard Table 235
Figure 115: RADIUS Overview 236
Figure 116: RADIUS Details 240
Figure 117: RMON Statistics 242
Figure 118: RMON History Overview 243
Figure 119: RMON Alarm Overview 244
Figure 120: RMON Event Overview 244
Figure 121: LACP System Status 245
Figure 122: LACP Port Status 246
Figure 123: LACP Port Statistics 247
Figure 124: Loop Protection Status 248
Figure 125: Spanning Tree Bridge Status 250
Figure 126: Spanning Tree Detailed Bridge Status 251
Figure 127: Spanning Tree Port Status 252
Figure 128: Spanning Tree Port Statistics 253
Figure 129: MVR Statistics 254
Figure 130: MVR Group Information 255
Figure 131: MVR SFM Information 256
Figure 132: IGMP Snooping Status 257
Figure 133: IGMP Snooping Group Information 258
Figure 134: IPv4 SFM Information 259
Figure 135: MLD Snooping Status 260
Figure 136: MLD Snooping Group Information 261
Figure 137: IPv6 SFM Information 262
Figure 138: LLDP Neighbor Information 263
Figure 139: LLDP-MED Neighbor Information 266
F
IGURES
– 14 –
Figure 140: LLDP Neighbor EEE Information 267
Figure 141: LLDP Port Statistics 269
Figure 142: MAC Address Table 270
Figure 143: Showing VLAN Members 271
Figure 144: Showing VLAN Port Status 272
Figure 145: Showing MAC-based VLAN Membership Status 273
Figure 146: Showing sFlow Statistics 275
Figure 147: ICMP Ping 277
Figure 148: Restart Device 278
Figure 149: Factory Defaults 279
Figure 150: Software Upload 280
Figure 151: Software Image Selection 280
Figure 152: Configuration Save 281
Figure 153: Configuration Upload 282
– 15 –
TABLES
Table 1: Key Features 17
Table 2: System Defaults 23
Table 3: Web Page Configuration Buttons 29
Table 4: Main Menu 29
Table 5: HTTPS System Support 59
Table 6: SNMP Security Models and Levels 62
Table 7: Dynamic QoS Profiles 83
Table 8: QCE Modification Buttons 95
Table 9: Recommended STA Path Cost Range 130
Table 10: Recommended STA Path Costs 130
Table 11: Default STA Path Costs 131
Table 12: QCE Modification Buttons 195
Table 13: System Capabilities 262
Table 14: Troubleshooting Chart 288
– 16 –
S
ECTION
I
GETTING STARTED
This section provides an overview of the switch, and introduces some basic
concepts about network switches. It also describes the basic settings
required to access the management interface.
This section includes these chapters:
â—† "Introduction" on page 17
â—† "Initial Switch Configuration" on page 25
– 17 –
1 INTRODUCTION
Micronet SP6526 is Gigabit Smart Switch delivers wire speed Gigabit
performance and web-based management functions, suitable for high
performance workgroups and server applications. With 24-port 10/100/
1000Mbps RJ-45 ports plus 2-port 100/1000BASE-X SFP slot for fiber optic
connection, it provides 52 Gbps wire-speed switching performance across
all 26 ports which significantly improves application response times and the
speed of large file transfers enabling a perfect solution for huge data
transmission and preserves the great flexibility of network infrastructure.
Micronet SP6526 provides an easy to install, user-friendly web interface
that allows quick and simple configuration, and still delivers essential
features such as enhanced security to protect your network, and
continuous availability to minimize network downtime. The switch also
supports IGMP snooping, which is especially useful for bandwidth-intensive
IP multicast applications such as IPTV. This switch enables networks of all
sizes to introduce Gigabit Ethernet with management features including
VLANs, Spanning Tree, link aggregation, multicasting, storm control, SNMP
for both IPv4 and IPv6 targeted to meet the needs of the SMB network,
and Gigabit to the desktop for power users. It is packed with features and
is a cost effective solution that brings continuous availability, QoS priority
queuing with classification and prioritization at Layer 2.
KEY FEATURES
Table 1: Key Features
Feature Description
Configuration Backup
and Restore
Backup to management station using Web
Authentication Telnet, Web – user name/password, RADIUS, TACACS+
Web – HTTPS
Tel ne t – SSH
SNMP v1/2c - Community strings
SNMP version 3 – MD5 or SHA password
Port – IEEE 802.1X, MAC address filtering
General Security
Measures
Private VLANs
Port Authentication
Port Security
DHCP Snooping (with Option 82 relay information)
IP Source Guard
Access Control Lists Supports up to 256 rules
DHCP Client
DNS Client and Proxy service
C
HAPTER
1
| Introduction
Description of Software Features
– 18 –
DESCRIPTION OF SOFTWARE FEATURES
The switch provides a wide range of advanced performance enhancing
features. Flow control eliminates the loss of packets due to bottlenecks
caused by port saturation. Storm suppression prevents broadcast,
multicast, and unknown unicast traffic storms from engulfing the network.
Untagged (port-based), tagged, and protocol-based VLANs provide traffic
security and efficient use of network bandwidth. CoS priority queueing
ensures the minimum delay for moving real-time multimedia data across
the network. While multicast filtering provides support for real-time
network applications.
Some of the management features are briefly described below.
CONFIGURATION
BACKUP AND
RESTORE
You can save the current configuration settings to a file on the
management station (using the web interface) or a TFTP server (using the
console interface through Telnet), and later download this file to restore
the switch configuration settings.
Port Configuration Speed, duplex mode, flow control, MTU, response to excessive
collisions, power saving mode
Rate Limiting Input rate limiting per port (manual setting or ACL)
Port Mirroring 1 sessions, up to 10 source port to one analysis port per session
Port Trunking Supports up to 5 trunks – static or dynamic trunking (LACP)
Congestion Control Throttling for broadcast, multicast, unknown unicast storms
Address Table 8K MAC addresses in the forwarding table, 1000 static MAC
addresses, 1K L2 IGMP multicast groups and 128 MVR groups
IP Version 4 and 6 Supports IPv4 and IPv6 addressing, management, and QoS
IEEE 802.1D Bridge Supports dynamic data switching and addresses learning
Store-and-Forward
Switching
Supported to ensure wire-speed switching while eliminating bad
frames
Spanning Tree Algorithm Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and
Multiple Spanning Trees (MSTP)
Virtual LANs Up to 4K using IEEE 802.1Q, port-based, protocol-based, private
VLANs, and voice VLANs, and QinQ tunnel
Traffic Prioritization Queue mode and CoS configured by Ethernet type, VLAN ID, TCP/
UDP port, DSCP, ToS bit, VLAN tag priority, or port
Qualify of Service Supports Differentiated Services (DiffServ), and DSCP remarking
Link Layer Discovery
Protocol
Used to discover basic information about neighboring devices
Multicast Filtering Supports IGMP snooping and query, MLD snooping, and Multicast
VLAN Registration
Table 1: Key Features (Continued)
Feature Description
C
HAPTER
1
| Introduction
Description of Software Features
– 19 –
AUTHENTICATION This switch authenticates management access via a web browser. User
names and passwords can be configured locally or can be verified via a
remote authentication server (i.e., RADIUS or TACACS+). Port-based
authentication is also supported via the IEEE 802.1X protocol. This protocol
uses Extensible Authentication Protocol over LANs (EAPOL) to request user
credentials from the 802.1X client, and then uses the EAP between the
switch and the authentication server to verify the client’s right to access
the network via an authentication server (i.e., RADIUS or TACACS+
server).
Other authentication options include HTTPS for secure management access
via the web, SSH for secure management access over a Telnet-equivalent
connection, SNMP Version 3, IP address filtering for SNMP/Telnet/web
management access, and MAC address filtering for port access.
ACCESS CONTROL
LISTS
ACLs provide packet filtering for IP frames (based on protocol, TCP/UDP
port number or frame type) or layer 2 frames (based on any destination
MAC address for unicast, broadcast or multicast, or based on VLAN ID or
VLAN tag priority). ACLs can by used to improve performance by blocking
unnecessary network traffic or to implement security controls by restricting
access to specific network resources or protocols. Policies can be used to
differentiate service for client ports, server ports, network ports or guest
ports. They can also be used to strictly control network traffic by only
allowing incoming frames that match the source MAC and source IP on
specific port.
PORT CONFIGURATION You can manually configure the speed and duplex mode, and flow control
used on specific ports, or use auto-negotiation to detect the connection
settings used by the attached device. Use the full-duplex mode on ports
whenever possible to double the throughput of switch connections. Flow
control should also be enabled to control network traffic during periods of
congestion and prevent the loss of packets when port buffer thresholds are
exceeded. The switch supports flow control based on the IEEE 802.3x
standard (now incorporated in IEEE 802.3-2002).
RATE LIMITING This feature controls the maximum rate for traffic transmitted or received
on an interface. Rate limiting is configured on interfaces at the edge of a
network to limit traffic into or out of the network. Traffic that falls within
the rate limit is transmitted, while packets that exceed the acceptable
amount of traffic are dropped.
PORT MIRRORING The switch can unobtrusively mirror traffic from any port to a monitor port.
You can then attach a protocol analyzer or RMON probe to this port to
perform traffic analysis and verify connection integrity.
C
HAPTER
1
| Introduction
Description of Software Features
– 20 –
PORT TRUNKING Ports can be combined into an aggregate connection. Trunks can be
manually set up or dynamically configured using Link Aggregation Control
Protocol (LACP – IEEE 802.3-2005). The additional ports dramatically
increase the throughput across any connection, and provide redundancy by
taking over the load if a port in the trunk should fail. The switch supports
up to 5 trunks.
STORM CONTROL Broadcast, multicast and unknown unicast storm suppression prevents
traffic from overwhelming the network.When enabled on a port, the level of
broadcast traffic passing through the port is restricted. If broadcast traffic
rises above a pre-defined threshold, it will be throttled until the level falls
back beneath the threshold.
STATIC ADDRESSES A static address can be assigned to a specific interface on this switch.
Static addresses are bound to the assigned interface and will not be
moved. When a static address is seen on another interface, the address will
be ignored and will not be written to the address table. Static addresses
can be used to provide network security by restricting access for a known
host to a specific port.
IEEE 802.1D BRIDGE The switch supports IEEE 802.1D transparent bridging. The address table
facilitates data switching by learning addresses, and then filtering or
forwarding traffic based on this information. The address table supports up
to 16K addresses.
STORE-AND-FORWARD
SWITCHING
The switch copies each frame into its memory before forwarding them to
another port. This ensures that all frames are a standard Ethernet size and
have been verified for accuracy with the cyclic redundancy check (CRC).
This prevents bad frames from entering the network and wasting
bandwidth.
To avoid dropping frames on congested ports, the switch provides 8 MB for
frame buffering. This buffer can queue packets awaiting transmission on
congested networks.
SPANNING TREE
ALGORITHM
The switch supports these spanning tree protocols:
◆ Spanning Tree Protocol (STP, IEEE 802.1D) – Supported by using the
STP backward compatible mode provided by RSTP. STP provides loop
detection. When there are multiple physical paths between segments,
this protocol will choose a single path and disable all others to ensure
that only one route exists between any two stations on the network.
This prevents the creation of network loops. However, if the chosen
path should fail for any reason, an alternate path will be activated to
maintain the connection.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305

MicroNet SP6526 User manual

Category
Software
Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI