![SMC Networks 7724M/VSW - annexe 1 Manual Download Page 25](http://html1.mh-extra.com/html/smc-networks/7724m-vsw-annexe-1/7724m-vsw-annexe-1_manual_1299754025.webp)
CLI
Management Guide
TigerAccess™ EE
24
SMC7824M/VSW
VLAN in the network, traditional STP works. However in more than one VLAN network,
STP cannot work per VLAN. To avoid this problem, the switch supports multiple spanning
tree protocol (MSTP) IEEE 802.1s.
Trunking & Link Aggregation Control Protocol (LACP)
The switch aggregates several physical interfaces into one logical port (aggregate port).
Port trunk aggregates interfaces with the standard of same speed, same duplex mode,
and same VLAN ID.
The switch supports link aggregation control protocol (LACP), complying with IEEE
802.3ad, which aggregates multiple links of equipments to use more enlarged bandwidth.
System Management based on CLI
It is easy for users who administer system by using telnet or console port to configure the
functions for system operating through CLI. CLI is easy to configure the needed functions
after looking for available commands by help menu different with UNIX.
Broadcast Storm Control
Broadcast storm control is, when too much of broadcast packets are being transmitted to
network, a situation of network timeout because the packets occupy most of transmit ca-
pacity. switch supports broadcast and multicast storm control, which disuses flooding
packet, that exceed the limit during the time configured by user.
Outband Management Interface
The switch can connect to equipments at remote place by assigning IP address to MGMT
interface. Since MGMT interface is operated regardless of status of service port, it is still
possible to configure and manage equipment at remote place.
RADIUS and
The switch supports client authentication protocol, that is RADIUS (Remote Authentica-
tion Dial-In User Service) and (Terminal Access Controller Access Control Sys-
tem Plus). Not only user IP and password registered in switch but also authentication
through RADIUS server and server are required to access. So security of sys-
tem and network management is strengthened.
Secure Shell (SSH)
Network security is getting more important because the access network has been gener-
alized among numerous users. Secure shell (SSH) is a network protocol that allows es-
tablishing a secure channel between a local and a remote computer. It uses public-key
cryptography to authenticate the remote computer and to allow the remote computer to
authenticate the user.
Summary of Contents for 7724M/VSW - annexe 1
Page 1: ......
Page 385: ...CLI Management Guide TigerAccess EE 384 SMC7824M VSW ...
Page 387: ......