MicroNet SP6526 User manual

  • Hello! I am an AI chatbot trained to assist you with the MicroNet SP6526 User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
&RPPXQLFDWH YLD
w w w . m i c r o n e t . c o m . t w
User’s Manual
Model No.: SP6526
26-port Gigabit Managed
Ethernet Switch
User’s Manual
SP6526
24-Port 10/100/1000 Gigabit Managed Ethernet Switch with 2 100/
1000BASE-X SFP Uplink Slots
August 2013
E082013-AP-R01
– 3 –
ABOUT THIS GUIDE
PURPOSE This guide gives specific information on how to operate and use the
management functions of the switch.
AUDIENCE The guide is intended for use by network administrators who are
responsible for operating and maintaining network equipment;
consequently, it assumes a basic working knowledge of general switch
functions, the Internet Protocol (IP), and Simple Network Management
Protocol (SNMP).
CONVENTIONS The following conventions are used throughout this guide to show
information:
N
OTE
:
Emphasizes important information or calls your attention to related
features or instructions.
C
AUTION
:
Alerts you to a potential hazard that could cause loss of data, or
damage the system or equipment.
W
ARNING
:
Alerts you to a potential hazard that could cause personal injury.
RELATED PUBLICATIONS The following publication details the hardware features of the switch,
including the physical and performance-related characteristics, and how to
install the switch:
The Installation Guide
Also, as part of the switch’s software, there is an online web-based help
that describes all management related features.
REVISION HISTORY This section summarizes the changes in each revision of this guide.
AUGUST 2013 REVISION
This is the first version of this guide. This guide is valid for software release
v1.0.0.4.
– 4 –
CONTENTS
ABOUT THIS GUIDE 3
C
ONTENTS 4
F
IGURES 10
T
ABLES 15
SECTION I GETTING STARTED 16
1INTRODUCTION 17
Key Features 17
Description of Software Features 18
System Defaults 23
2INITIAL SWITCH CONFIGURATION 25
SECTION II WEB CONFIGURATION 27
3USING THE WEB INTERFACE 28
Navigating the Web Browser Interface 28
Home Page 28
Configuration Options 29
Panel Display 29
Main Menu 29
4CONFIGURING THE SWITCH 38
Configuring System Information 38
Setting an IP Address 39
Setting an IPv4 Address 39
Setting an IPv6 Address 41
Configuring NTP Service 43
Configuring the Time Zone and Daylight Savings Time 44
Configuring Remote Log Messages 46
Configuring Power Reduction 47
C
ONTENTS
– 5 –
Reducing Power to Idle Queue Circuits 47
Configuring Port Connections 49
Configuring Security 51
Configuring User Accounts 51
Configuring User Privilege Levels 53
Configuring The Authentication Method For Management Access 55
Configuring SSH 57
Configuring HTTPS 58
Filtering IP Addresses for Management Access 60
Using Simple Network Management Protocol 61
Remote Monitoring 72
Configuring Port Limit Controls 77
Configuring Authentication Through Network Access Servers 80
Filtering Traffic with Access Control Lists 90
Configuring DHCP Snooping 101
Configuring DHCP Relay and Option 82 Information 104
Configuring IP Source Guard 105
Configuring ARP Inspection 109
Specifying Authentication Servers 112
Creating Trunk Groups 114
Configuring Static Trunks 115
Configuring LACP 117
Configuring Loop Protection 119
Configuring the Spanning Tree Algorithm 121
Configuring Global Settings for STA 123
Configuring Multiple Spanning Trees 126
Configuring Spanning Tree Bridge Priorities 128
Configuring
STP/RSTP/CIST Interfaces 129
Configuring MIST Interfaces 133
Multicast VLAN Registration 134
Configuring General MVR Settings 135
Configuring MVR Channel Settings 138
IGMP Snooping 140
Configuring Global and Port-Related Settings for IGMP Snooping 140
Configuring VLAN Settings for IGMP Snooping and Query 144
Configuring IGMP Filtering 146
C
ONTENTS
– 6 –
MLD Snooping 147
Configuring Global and Port-Related Settings for MLD Snooping 147
Configuring VLAN Settings for MLD Snooping and Query 150
Configuring MLD Filtering 152
Link Layer Discovery Protocol 153
Configuring LLDP Timing and TLVs 153
Configuring LLDP-MED TLVs 156
Configuring the MAC Address Table 162
IEEE 802.1Q VLANs 164
Assigning Ports to VLANs 165
Configuring VLAN Attributes for Port Members 166
Configuring Private VLANs 169
Using Port Isolation 170
Configuring MAC-based VLANs 171
Protocol VLANs 172
Configuring Protocol VLAN Groups 173
Mapping Protocol Groups to Ports 174
Configuring IP Subnet-based VLANs 175
Managing VoIP Traffic 177
Configuring VoIP Traffic 177
Configuring Telephony OUI 179
Quality of Service 180
Configuring Port Classification 181
Configuring Port Policiers 183
Configuring Egress Port Scheduler 184
Configuring Egress Port Shaper 187
Configuring Port Remarking Mode 188
Configuring Port DSCP Translation and Rewriting 190
Configuring DSCP-based QoS Ingress Classification 191
Configuring DSCP Translation 192
Configuring DSCP Classification 193
Configuring QoS Control Lists 194
Configuring Storm Control 198
Configuring Local Port Mirroring 199
Configuring Remote Port Mirroring 201
Configuring UPnP 206
C
ONTENTS
– 7 –
Configuring sFlow 208
5MONITORING THE SWITCH 211
Displaying Basic Information About the System 211
Displaying System Information 211
Displaying CPU Utilization 212
Displaying Log Messages 213
Displaying Log Details 215
Displaying Information About Ports 215
Displaying Port Status On the Front Panel 215
Displaying an Overview of Port Statistics 216
Displaying QoS Statistics 216
Displaying QCL Status 217
Displaying Detailed Port Statistics 218
Displaying Information About Security Settings 221
Displaying Access Management Statistics 221
Displaying Information About Switch Settings for Port Security 222
Displaying Information About Learned MAC Addresses 224
Displaying Port Status for Authentication Services 225
Displaying Port Statistics for 802.1X or Remote Authentication Service
226
Displaying ACL Status 230
Displaying Statistics for DHCP Snooping 232
Displaying DHCP Relay Statistics 233
Displaying MAC Address Bindings for ARP Packets 235
Displaying Entries in the IP Source Guard Table 235
Displaying Information on Authentication Servers 236
Displaying a List of Authentication Servers 236
Displaying Statistics for Configured Authentication Servers 237
Displaying Information on RMON 241
Displaying RMON Statistics 241
Displaying RMON Historical Samples 242
Displaying RMON Alarm Settings 243
Displaying RMON Event Settings 244
Displaying Information on LACP 245
Displaying an Overview of LACP Groups 245
Displaying LACP Port Status 245
Displaying LACP Port Statistics 246
C
ONTENTS
– 8 –
Displaying Information on Loop Protection 247
Displaying Information on the Spanning Tree 248
Displaying Bridge Status for STA 248
Displaying Port Status for STA 251
Displaying Port Statistics for STA 252
Displaying MVR Information 253
Displaying MVR Statistics 253
Displaying MVR Group Information 254
Displaying MVR SFM Information 255
Showing IGMP Snooping Information 256
Showing IGMP Snooping Status 256
Showing IGMP Snooping Group Information 257
Showing IPv4 SFM Information 258
Showing MLD Snooping Information 259
Showing MLD Snooping Status 259
Showing MLD Snooping Group Information 260
Showing IPv6 SFM Information 261
Displaying LLDP Information 262
Displaying LLDP Neighbor Information 262
Displaying LLDP-MED Neighbor Information 263
Displaying LLDP Neighbor EEE Information 266
Displaying LLDP Port Statistics 267
Displaying the MAC Address Table 269
Displaying Information About VLANs 270
VLAN Membership 270
VLAN Port Status 271
Displaying Information About MAC-based VLANs 272
Displaying Information About Flow Sampling 273
6PERFORMING BASIC DIAGNOSTICS 276
Pinging an IPv4 or IPv6 Address 276
7PERFORMING SYSTEM MAINTENANCE 278
Restarting the Switch 278
Restoring Factory Defaults 279
Upgrading Firmware 279
Activating the Alternate Image 280
Managing Configuration Files 281
C
ONTENTS
– 9 –
Saving Configuration Settings 281
Restoring Configuration Settings 281
SECTION III APPENDICES 283
ASOFTWARE SPECIFICATIONS 284
Software Features 284
Management Features 285
Standards 286
Management Information Bases 287
BTROUBLESHOOTING 288
Problems Accessing the Management Interface 288
Using System Logs 289
CLICENSE INFORMATION 290
The GNU General Public License 290
GLOSSARY 294
I
NDEX 301
– 10 –
FIGURES
Figure 1: Home Page 28
Figure 2: Front Panel Indicators 29
Figure 3: System Information Configuration 38
Figure 4: IP Configuration 40
Figure 5: IPv6 Configuration 42
Figure 6: NTP Configuration 43
Figure 7: Time Zone and Daylight Savings Time Configuration 46
Figure 8: Configuring Settings for Remote Logging of Error Messages 47
Figure 9: Configuring EEE Power Reduction 49
Figure 10: Port Configuration 51
Figure 11: Showing User Accounts 53
Figure 12: Configuring User Accounts 53
Figure 13: Configuring Privilege Levels 55
Figure 14: Authentication Server Operation 56
Figure 15: Authentication Method for Management Access 57
Figure 16: SSH Configuration 58
Figure 17: HTTPS Configuration 60
Figure 18: Access Management Configuration 61
Figure 19: SNMP System Configuration 66
Figure 20: SNMPv3 Community Configuration 67
Figure 21: SNMPv3 User Configuration 69
Figure 22: SNMPv3 Group Configuration 70
Figure 23: SNMPv3 View Configuration 71
Figure 24: SNMPv3 Access Configuration 72
Figure 25: RMON Statistics Configuration 73
Figure 26: RMON History Configuration 74
Figure 27: RMON Alarm Configuration 76
Figure 28: RMON Event Configuration 77
Figure 29: Port Limit Control Configuration 79
Figure 30: Using Port Security 80
Figure 31: Network Access Server Configuration 90
F
IGURES
– 11 –
Figure 32: ACL Port Configuration 92
Figure 33: ACL Rate Limiter Configuration 93
Figure 34: Access Control List Configuration 101
Figure 35: DHCP Snooping Configuration 103
Figure 36: DHCP Relay Configuration 105
Figure 37: Configuring Global and Port-based Settings for IP Source Guard 107
Figure 38: Configuring Static Bindings for IP Source Guard 108
Figure 39: Configuring Global and Port Settings for ARP Inspection 110
Figure 40: Configuring Static Bindings for ARP Inspection 111
Figure 41: Authentication Configuration 113
Figure 42: Static Trunk Configuration 117
Figure 43: LACP Port Configuration 119
Figure 44: Loop Protection Configuration 120
Figure 45: STP Root Ports and Designated Ports 121
Figure 46: MSTP Region, Internal Spanning Tree, Multiple Spanning Tree 122
Figure 47: Common Internal Spanning Tree, Common Spanning Tree, Internal
Spanning Tree122
Figure 48: STA Bridge Configuration 126
Figure 49: Adding a VLAN to an MST Instance 128
Figure 50: Configuring STA Bridge Priorities 129
Figure 51: STP/RSTP/CIST Port Configuration 133
Figure 52: MSTI Port Configuration 134
Figure 53: MVR Concept 135
Figure 54: Configuring General MVR Settings 138
Figure 55: Configuring MVR Channel Settings 139
Figure 56: Configuring Global and Port-related Settings for IGMP Snooping 143
Figure 57: Configuring VLAN Settings for IGMP Snooping and Query 146
Figure 58: IGMP Snooping Port Group Filtering Configuration 146
Figure 59: Configuring Global and Port-related Settings for MLD Snooping 150
Figure 60: Configuring VLAN Settings for MLD Snooping and Query 152
Figure 61: MLD Snooping Port Group Filtering Configuration 153
Figure 62: LLDP Configuration 156
Figure 63: LLDP-MED Configuration 162
Figure 64: MAC Address Table Configuration 164
Figure 65: VLAN Membership Configuration 166
Figure 66: VLAN Port Configuration 168
Figure 67: Private VLAN Membership Configuration 170
F
IGURES
– 12 –
Figure 68: Port Isolation Configuration 170
Figure 69: Configuring MAC-Based VLANs 172
Figure 70: Configuring Protocol VLANs 174
Figure 71: Assigning Ports to Protocol VLANs 175
Figure 72: Assigning Ports to an IP Subnet-based VLAN 176
Figure 73: Configuring Global and Port Settings for a Voice VLAN 179
Figure 74: Configuring an OUI Telephony List 180
Figure 75: Configuring Ingress Port QoS Classification 182
Figure 76: Configuring Ingress Port Tag Classification 183
Figure 77: Configuring Ingress Port Policing 184
Figure 78: Displaying Egress Port Schedulers 186
Figure 79: Configuring Egress Port Schedulers and Shapers 187
Figure 80: Displaying Egress Port Shapers 188
Figure 81: Displaying Port Tag Remarking Mode 189
Figure 82: Configuring Port Tag Remarking Mode 190
Figure 83: Configuring Port DSCP Translation and Rewriting 191
Figure 84: Configuring DSCP-based QoS Ingress Classification 192
Figure 85: Configuring DSCP Translation and Re-mapping 193
Figure 86: Mapping DSCP to CoS/DPL Values 194
Figure 87: QoS Control List Configuration 198
Figure 88: Storm Control Configuration 199
Figure 89: Mirror Configuration 201
Figure 90: Configuring Remote Port Mirroring 201
Figure 91: Mirror Configuration (Source) 204
Figure 92: Mirror Configuration (Intermediate) 205
Figure 93: Mirror Configuration (Destination) 206
Figure 94: UPnP Configuration 208
Figure 95: sFlow Configuration 210
Figure 96: System Information 212
Figure 97: CPU Load 213
Figure 98: System Log Information 214
Figure 99: Detailed System Log Information 215
Figure 100: Port State Overview 215
Figure 101: Port Statistics Overview 216
Figure 102: Queueing Counters 217
Figure 103: QoS Control List Status 218
F
IGURES
– 13 –
Figure 104: Detailed Port Statistics 220
Figure 105: Access Management Statistics 221
Figure 106: Port Security Switch Status 223
Figure 107: Port Security Port Status 224
Figure 108: Network Access Server Switch Status 226
Figure 109: NAS Statistics for Specified Port 230
Figure 110: ACL Status 231
Figure 111: DHCP Snooping Statistics 233
Figure 112: DHCP Relay Statistics 234
Figure 113: Dynamic ARP Inspection Table 235
Figure 114: Dynamic IP Source Guard Table 235
Figure 115: RADIUS Overview 236
Figure 116: RADIUS Details 240
Figure 117: RMON Statistics 242
Figure 118: RMON History Overview 243
Figure 119: RMON Alarm Overview 244
Figure 120: RMON Event Overview 244
Figure 121: LACP System Status 245
Figure 122: LACP Port Status 246
Figure 123: LACP Port Statistics 247
Figure 124: Loop Protection Status 248
Figure 125: Spanning Tree Bridge Status 250
Figure 126: Spanning Tree Detailed Bridge Status 251
Figure 127: Spanning Tree Port Status 252
Figure 128: Spanning Tree Port Statistics 253
Figure 129: MVR Statistics 254
Figure 130: MVR Group Information 255
Figure 131: MVR SFM Information 256
Figure 132: IGMP Snooping Status 257
Figure 133: IGMP Snooping Group Information 258
Figure 134: IPv4 SFM Information 259
Figure 135: MLD Snooping Status 260
Figure 136: MLD Snooping Group Information 261
Figure 137: IPv6 SFM Information 262
Figure 138: LLDP Neighbor Information 263
Figure 139: LLDP-MED Neighbor Information 266
F
IGURES
– 14 –
Figure 140: LLDP Neighbor EEE Information 267
Figure 141: LLDP Port Statistics 269
Figure 142: MAC Address Table 270
Figure 143: Showing VLAN Members 271
Figure 144: Showing VLAN Port Status 272
Figure 145: Showing MAC-based VLAN Membership Status 273
Figure 146: Showing sFlow Statistics 275
Figure 147: ICMP Ping 277
Figure 148: Restart Device 278
Figure 149: Factory Defaults 279
Figure 150: Software Upload 280
Figure 151: Software Image Selection 280
Figure 152: Configuration Save 281
Figure 153: Configuration Upload 282
– 15 –
TABLES
Table 1: Key Features 17
Table 2: System Defaults 23
Table 3: Web Page Configuration Buttons 29
Table 4: Main Menu 29
Table 5: HTTPS System Support 59
Table 6: SNMP Security Models and Levels 62
Table 7: Dynamic QoS Profiles 83
Table 8: QCE Modification Buttons 95
Table 9: Recommended STA Path Cost Range 130
Table 10: Recommended STA Path Costs 130
Table 11: Default STA Path Costs 131
Table 12: QCE Modification Buttons 195
Table 13: System Capabilities 262
Table 14: Troubleshooting Chart 288
– 16 –
S
ECTION
I
GETTING STARTED
This section provides an overview of the switch, and introduces some basic
concepts about network switches. It also describes the basic settings
required to access the management interface.
This section includes these chapters:
â—† "Introduction" on page 17
â—† "Initial Switch Configuration" on page 25
– 17 –
1 INTRODUCTION
Micronet SP6526 is Gigabit Smart Switch delivers wire speed Gigabit
performance and web-based management functions, suitable for high
performance workgroups and server applications. With 24-port 10/100/
1000Mbps RJ-45 ports plus 2-port 100/1000BASE-X SFP slot for fiber optic
connection, it provides 52 Gbps wire-speed switching performance across
all 26 ports which significantly improves application response times and the
speed of large file transfers enabling a perfect solution for huge data
transmission and preserves the great flexibility of network infrastructure.
Micronet SP6526 provides an easy to install, user-friendly web interface
that allows quick and simple configuration, and still delivers essential
features such as enhanced security to protect your network, and
continuous availability to minimize network downtime. The switch also
supports IGMP snooping, which is especially useful for bandwidth-intensive
IP multicast applications such as IPTV. This switch enables networks of all
sizes to introduce Gigabit Ethernet with management features including
VLANs, Spanning Tree, link aggregation, multicasting, storm control, SNMP
for both IPv4 and IPv6 targeted to meet the needs of the SMB network,
and Gigabit to the desktop for power users. It is packed with features and
is a cost effective solution that brings continuous availability, QoS priority
queuing with classification and prioritization at Layer 2.
KEY FEATURES
Table 1: Key Features
Feature Description
Configuration Backup
and Restore
Backup to management station using Web
Authentication Telnet, Web – user name/password, RADIUS, TACACS+
Web – HTTPS
Tel ne t – SSH
SNMP v1/2c - Community strings
SNMP version 3 – MD5 or SHA password
Port – IEEE 802.1X, MAC address filtering
General Security
Measures
Private VLANs
Port Authentication
Port Security
DHCP Snooping (with Option 82 relay information)
IP Source Guard
Access Control Lists Supports up to 256 rules
DHCP Client
DNS Client and Proxy service
C
HAPTER
1
| Introduction
Description of Software Features
– 18 –
DESCRIPTION OF SOFTWARE FEATURES
The switch provides a wide range of advanced performance enhancing
features. Flow control eliminates the loss of packets due to bottlenecks
caused by port saturation. Storm suppression prevents broadcast,
multicast, and unknown unicast traffic storms from engulfing the network.
Untagged (port-based), tagged, and protocol-based VLANs provide traffic
security and efficient use of network bandwidth. CoS priority queueing
ensures the minimum delay for moving real-time multimedia data across
the network. While multicast filtering provides support for real-time
network applications.
Some of the management features are briefly described below.
CONFIGURATION
BACKUP AND
RESTORE
You can save the current configuration settings to a file on the
management station (using the web interface) or a TFTP server (using the
console interface through Telnet), and later download this file to restore
the switch configuration settings.
Port Configuration Speed, duplex mode, flow control, MTU, response to excessive
collisions, power saving mode
Rate Limiting Input rate limiting per port (manual setting or ACL)
Port Mirroring 1 sessions, up to 10 source port to one analysis port per session
Port Trunking Supports up to 5 trunks – static or dynamic trunking (LACP)
Congestion Control Throttling for broadcast, multicast, unknown unicast storms
Address Table 8K MAC addresses in the forwarding table, 1000 static MAC
addresses, 1K L2 IGMP multicast groups and 128 MVR groups
IP Version 4 and 6 Supports IPv4 and IPv6 addressing, management, and QoS
IEEE 802.1D Bridge Supports dynamic data switching and addresses learning
Store-and-Forward
Switching
Supported to ensure wire-speed switching while eliminating bad
frames
Spanning Tree Algorithm Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and
Multiple Spanning Trees (MSTP)
Virtual LANs Up to 4K using IEEE 802.1Q, port-based, protocol-based, private
VLANs, and voice VLANs, and QinQ tunnel
Traffic Prioritization Queue mode and CoS configured by Ethernet type, VLAN ID, TCP/
UDP port, DSCP, ToS bit, VLAN tag priority, or port
Qualify of Service Supports Differentiated Services (DiffServ), and DSCP remarking
Link Layer Discovery
Protocol
Used to discover basic information about neighboring devices
Multicast Filtering Supports IGMP snooping and query, MLD snooping, and Multicast
VLAN Registration
Table 1: Key Features (Continued)
Feature Description
C
HAPTER
1
| Introduction
Description of Software Features
– 19 –
AUTHENTICATION This switch authenticates management access via a web browser. User
names and passwords can be configured locally or can be verified via a
remote authentication server (i.e., RADIUS or TACACS+). Port-based
authentication is also supported via the IEEE 802.1X protocol. This protocol
uses Extensible Authentication Protocol over LANs (EAPOL) to request user
credentials from the 802.1X client, and then uses the EAP between the
switch and the authentication server to verify the client’s right to access
the network via an authentication server (i.e., RADIUS or TACACS+
server).
Other authentication options include HTTPS for secure management access
via the web, SSH for secure management access over a Telnet-equivalent
connection, SNMP Version 3, IP address filtering for SNMP/Telnet/web
management access, and MAC address filtering for port access.
ACCESS CONTROL
LISTS
ACLs provide packet filtering for IP frames (based on protocol, TCP/UDP
port number or frame type) or layer 2 frames (based on any destination
MAC address for unicast, broadcast or multicast, or based on VLAN ID or
VLAN tag priority). ACLs can by used to improve performance by blocking
unnecessary network traffic or to implement security controls by restricting
access to specific network resources or protocols. Policies can be used to
differentiate service for client ports, server ports, network ports or guest
ports. They can also be used to strictly control network traffic by only
allowing incoming frames that match the source MAC and source IP on
specific port.
PORT CONFIGURATION You can manually configure the speed and duplex mode, and flow control
used on specific ports, or use auto-negotiation to detect the connection
settings used by the attached device. Use the full-duplex mode on ports
whenever possible to double the throughput of switch connections. Flow
control should also be enabled to control network traffic during periods of
congestion and prevent the loss of packets when port buffer thresholds are
exceeded. The switch supports flow control based on the IEEE 802.3x
standard (now incorporated in IEEE 802.3-2002).
RATE LIMITING This feature controls the maximum rate for traffic transmitted or received
on an interface. Rate limiting is configured on interfaces at the edge of a
network to limit traffic into or out of the network. Traffic that falls within
the rate limit is transmitted, while packets that exceed the acceptable
amount of traffic are dropped.
PORT MIRRORING The switch can unobtrusively mirror traffic from any port to a monitor port.
You can then attach a protocol analyzer or RMON probe to this port to
perform traffic analysis and verify connection integrity.
C
HAPTER
1
| Introduction
Description of Software Features
– 20 –
PORT TRUNKING Ports can be combined into an aggregate connection. Trunks can be
manually set up or dynamically configured using Link Aggregation Control
Protocol (LACP – IEEE 802.3-2005). The additional ports dramatically
increase the throughput across any connection, and provide redundancy by
taking over the load if a port in the trunk should fail. The switch supports
up to 5 trunks.
STORM CONTROL Broadcast, multicast and unknown unicast storm suppression prevents
traffic from overwhelming the network.When enabled on a port, the level of
broadcast traffic passing through the port is restricted. If broadcast traffic
rises above a pre-defined threshold, it will be throttled until the level falls
back beneath the threshold.
STATIC ADDRESSES A static address can be assigned to a specific interface on this switch.
Static addresses are bound to the assigned interface and will not be
moved. When a static address is seen on another interface, the address will
be ignored and will not be written to the address table. Static addresses
can be used to provide network security by restricting access for a known
host to a specific port.
IEEE 802.1D BRIDGE The switch supports IEEE 802.1D transparent bridging. The address table
facilitates data switching by learning addresses, and then filtering or
forwarding traffic based on this information. The address table supports up
to 16K addresses.
STORE-AND-FORWARD
SWITCHING
The switch copies each frame into its memory before forwarding them to
another port. This ensures that all frames are a standard Ethernet size and
have been verified for accuracy with the cyclic redundancy check (CRC).
This prevents bad frames from entering the network and wasting
bandwidth.
To avoid dropping frames on congested ports, the switch provides 8 MB for
frame buffering. This buffer can queue packets awaiting transmission on
congested networks.
SPANNING TREE
ALGORITHM
The switch supports these spanning tree protocols:
◆ Spanning Tree Protocol (STP, IEEE 802.1D) – Supported by using the
STP backward compatible mode provided by RSTP. STP provides loop
detection. When there are multiple physical paths between segments,
this protocol will choose a single path and disable all others to ensure
that only one route exists between any two stations on the network.
This prevents the creation of network loops. However, if the chosen
path should fail for any reason, an alternate path will be activated to
maintain the connection.
/