Implementation Guide
Page 6
... Control List Rules Work 77 Port Security 78 What is Network Login? 78 How Network Login Works 79 Important Considerations 80 What is Switch Management Login? 81 Benefits of RADIUS Authentication 82 How RADIUS Authentication Works 82 Important Considerations 83 What is RADIUS? 83 A CONFIGURATION RULES... Rules for Fast Ethernet 86 Configuration Rules with Full Duplex 87 B NETWORK CONFIGURATION EXAMPLES Simple Network Configuration Examples 90 Desktop Switch Example 90 C IP ADDRESSING IP Addresses 91 Simple Overview 91 Advanced Overview 92 Subnets and Subnet Masks 94 Default Gateways 96
... Control List Rules Work 77 Port Security 78 What is Network Login? 78 How Network Login Works 79 Important Considerations 80 What is Switch Management Login? 81 Benefits of RADIUS Authentication 82 How RADIUS Authentication Works 82 Important Considerations 83 What is RADIUS? 83 A CONFIGURATION RULES... Rules for Fast Ethernet 86 Configuration Rules with Full Duplex 87 B NETWORK CONFIGURATION EXAMPLES Simple Network Configuration Examples 90 Desktop Switch Example 90 C IP ADDRESSING IP Addresses 91 Simple Overview 91 Advanced Overview 92 Subnets and Subnet Masks 94 Default Gateways 96
Implementation Guide
Page 72
... be accessible from the server. Therefore the way your Switch. The Switch attempts to set to the process outlined. You can manually input the IP information (IP address, subnet mask, and default gateway). The way a DHCP server responds is set up again. You can switch to manual IP configuration at any other options configured in the DHCP server...
... be accessible from the server. Therefore the way your Switch. The Switch attempts to set to the process outlined. You can manually input the IP information (IP address, subnet mask, and default gateway). The way a DHCP server responds is set up again. You can switch to manual IP configuration at any other options configured in the DHCP server...
Implementation Guide
Page 75
...://xxx.xxx.xxx.xxx/ where xxx.xxx.xxx.xxx is the IP address of your Switch. If you adminster your switch remotely or over an insecure network, the Switch can encrypt all HTTP traffic to securely browse your Switch by a Certifying Authority your browser may warn you that certificate has...be visible in the data. Securing Access to the Web Interface Your Switch supports HTTPS, allowing secure access to the Management Interface Reference Guide supplied in your network. This is the default certificate for the Switch. For detailed descriptions of the Web interface operations and the Command Line...
...://xxx.xxx.xxx.xxx/ where xxx.xxx.xxx.xxx is the IP address of your Switch. If you adminster your switch remotely or over an insecure network, the Switch can encrypt all HTTP traffic to securely browse your Switch by a Certifying Authority your browser may warn you that certificate has...be visible in the data. Securing Access to the Web Interface Your Switch supports HTTPS, allowing secure access to the Management Interface Reference Guide supplied in your network. This is the default certificate for the Switch. For detailed descriptions of the Web interface operations and the Command Line...
Implementation Guide
Page 77
... traffic is found ; The access list rules are applied to the appropriate VLAN depending on IP addressing. When a match is forwarded at wire speed using layer 3 destination IP addresses and VLANs. By default, if no access list has been defined for this VLAN. Access Control Lists are applied ...limit access to proprietary information within the network. If a match is found , the path the packet takes is determined by the destination IP address and a mask. meaning the packet falls under the current operating system. If a match is found in the access list the appropriate action...
... traffic is found ; The access list rules are applied to the appropriate VLAN depending on IP addressing. When a match is forwarded at wire speed using layer 3 destination IP addresses and VLANs. By default, if no access list has been defined for this VLAN. Access Control Lists are applied ...limit access to proprietary information within the network. If a match is found , the path the packet takes is determined by the destination IP address and a mask. meaning the packet falls under the current operating system. If a match is found in the access list the appropriate action...
Implementation Guide
Page 91
The topics covered are: ■ IP Addresses ■ Subnets and Subnet Masks ■ Default Gateways IP addressing is . ■ Advanced Overview - The IP address can be assigned to your network must have the format n.n.n.n where n is divided into two parts: ■ The first ...the host part, ('100.8' in depth explanation of what an IP address is a vast topic and there are structured. Gives a more about IP addressing. Gives a brief overview of IP addresses and the way they are white papers on your Switch to enable you wish to learn more in the example) identifies...
The topics covered are: ■ IP Addresses ■ Subnets and Subnet Masks ■ Default Gateways IP addressing is . ■ Advanced Overview - The IP address can be assigned to your network must have the format n.n.n.n where n is divided into two parts: ■ The first ...the host part, ('100.8' in depth explanation of what an IP address is a vast topic and there are structured. Gives a more about IP addressing. Gives a brief overview of IP addresses and the way they are white papers on your Switch to enable you wish to learn more in the example) identifies...
Implementation Guide
Page 96
...as the source device. An alternative name for the Switch, enter the IP address of the default gateway on your network which is located. This hop-by-hop process continues until the IP packets reach the remote destination. If no default gateway exists on the local subnet in a different ... your network, enter the IP address 0.0.0.0 or leave the field blank. Default Gateways A gateway is a device on the path to the remote destination, and sends the packets to that is not directly attached to a gateway which the Switch is used to forward IP packets to multiple segments. ...
...as the source device. An alternative name for the Switch, enter the IP address of the default gateway on your network which is located. This hop-by-hop process continues until the IP packets reach the remote destination. If no default gateway exists on the local subnet in a different ... your network, enter the IP address 0.0.0.0 or leave the field blank. Default Gateways A gateway is a device on the path to the remote destination, and sends the packets to that is not directly attached to a gateway which the Switch is used to forward IP packets to multiple segments. ...
Implementation Guide
Page 107
...CoS configuring traffic 52 creating profiles 53 How traffic is processed to provide CoS 52 service levels 53 INDEX 107 traffic classification 53 D default gateway 96 Default VLAN 65 Designated Bridge 44 Designated Bridge Port 44 E event notification 20 Events (RMON group) 60, 61 extended network prefix 95 ... 61 I IEEE Std 802.1Q-1998 65 IEEE Std 802.3-2002 flow control 17, 24 IGMP multicast filtering 36 Internet addresses 91 InterNIC 92 IP (Internet Protocol) addresses 92 IP address 72, 91 classes of 93 defined 92 derivation 92 division of network and host 92 example 94 obtaining 92 subnet mask...
...CoS configuring traffic 52 creating profiles 53 How traffic is processed to provide CoS 52 service levels 53 INDEX 107 traffic classification 53 D default gateway 96 Default VLAN 65 Designated Bridge 44 Designated Bridge Port 44 E event notification 20 Events (RMON group) 60, 61 extended network prefix 95 ... 61 I IEEE Std 802.1Q-1998 65 IEEE Std 802.3-2002 flow control 17, 24 IGMP multicast filtering 36 Internet addresses 91 InterNIC 92 IP (Internet Protocol) addresses 92 IP address 72, 91 classes of 93 defined 92 derivation 92 division of network and host 92 example 94 obtaining 92 subnet mask...
Implementation Guide
Page 108
See Switch Database security network 75 segment, maximum length 86 Spanning Tree Protocol, see STP 40 Statistics (RMON group) 60, 61 STP 40 avoiding the subdivision of VLANs 48 Bridge Identifier 43 Bridge Protocol Data Units 43 default port costs 43 default priority 43 Designated Bridge 44 Designated...security 75 network configuration examples 90 network login 78 non-aging learned SDB entries 50 O obtaining registered IP address 92 P path costs. See port costs permanent SDB entries 50 port costs, default 43 port security 21, 75, 78 port trunks example 29 priority in STP 43 priority levels ...
See Switch Database security network 75 segment, maximum length 86 Spanning Tree Protocol, see STP 40 Statistics (RMON group) 60, 61 STP 40 avoiding the subdivision of VLANs 48 Bridge Identifier 43 Bridge Protocol Data Units 43 default port costs 43 default priority 43 Designated Bridge 44 Designated...security 75 network configuration examples 90 network login 78 non-aging learned SDB entries 50 O obtaining registered IP address 92 P path costs. See port costs permanent SDB entries 50 port costs, default 43 port security 21, 75, 78 port trunks example 29 priority in STP 43 priority levels ...