Introduction
1-4
1
Spanning Tree Algorithm
– The switch supports these spanning tree protocols:
Spanning Tree Protocol (STP, IEEE 802.1D) – This protocol provides loop detection.
When there are multiple physical paths between segments, this protocol will choose
a single path and disable all others to ensure that only one route exists between any
two stations on the network. This prevents the creation of network loops. However, if
the chosen path should fail for any reason, an alternate path will be activated to
maintain the connection.
Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) – This protocol reduces the
convergence time for network topology changes to about 3 to 5 seconds, compared
to 30 seconds or more for the older IEEE 802.1D STP standard. It is intended as a
complete replacement for STP, but can still interoperate with switches running the
older standard by automatically reconfiguring ports to STP-compliant mode if they
detect STP protocol messages from attached devices.
Multiple Spanning Tree Protocol (MSTP, IEEE 802.1s) – This protocol is a direct
extension of RSTP. It can provide an independent spanning tree for different VLANs.
It simplifies network management, provides for even faster convergence than RSTP
by limiting the size of each region, and prevents VLAN members from being
segmented from the rest of the group (as sometimes occurs with IEEE 802.1D STP).
Virtual LANs
– The switch supports up to 256 VLANs. A Virtual LAN is a collection
of network nodes that share the same collision domain regardless of their physical
location or connection point in the network. The switch supports tagged VLANs
based on the IEEE 802.1Q standard. Members of VLAN groups can be dynamically
learned via GVRP, or ports can be manually assigned to a specific set of VLANs.
This allows the switch to restrict traffic to the VLAN groups to which a user has been
assigned. By segmenting your network into VLANs, you can:
• Eliminate broadcast storms which severely degrade performance in a flat network.
• Simplify network management for node changes/moves by remotely configuring
VLAN membership for any port, rather than having to manually change the network
connection.
• Provide data security by restricting all traffic to the originating VLAN.
• Use private VLANs to restrict traffic to pass only between data ports and the uplink
ports, thereby isolating adjacent ports within the same VLAN, and allowing you to
limit the total number of VLANs that need to be configured.
• Use protocol VLANs to restrict traffic to specified interfaces based on protocol type.
IEEE 802.1Q Tunneling (QinQ)
– This feature is designed for service providers
carrying traffic for multiple customers across their networks. QinQ tunneling is used
to maintain customer-specific VLAN and Layer 2 protocol configurations even when
different customers use the same internal VLAN IDs. This is accomplished by
inserting Service Provider VLAN (SPVLAN) tags into the customer’s frames when
they enter the service provider’s network, and then stripping the tags when the
frames leave the network.
Содержание Direk Tronik 24/48-Port
Страница 2: ......
Страница 4: ...ES4524D ES4548D F0 0 0 4 E112006 CS R01 149100030400A...
Страница 22: ...xxii Tables...
Страница 26: ...xxvi Figures...
Страница 28: ...Getting Started...
Страница 50: ...Initial Configuration 2 14 2...
Страница 52: ...Switch Management Configuring Domain Name Service 29 1 Switch Clustering 30 1...
Страница 68: ...Basic System Settings 4 8 4...
Страница 118: ...Simple Network Management Protocol 11 18 11...
Страница 142: ...Configuring 802 1X Port Authentication 14 8 14...
Страница 154: ...Access Control Lists 15 12 15...
Страница 232: ...Configuring Protocol Based VLANs 25 4 25...
Страница 252: ...Quality of Service 27 8 27...
Страница 282: ...Using the Command Line Interface 31 10 31...
Страница 290: ...General Commands 33 6 33...
Страница 300: ...System Management Commands 34 10 34...
Страница 308: ...File Management Commands 35 8 35...
Страница 326: ...Event Logging Commands 37 8 37...
Страница 336: ...Time Commands 39 6 39...
Страница 406: ...Access Control List Commands 44 18 44...
Страница 418: ...Interface Commands 45 12 45...
Страница 432: ...Broadcast Storm Control Commands 47 2 47...
Страница 436: ...Rate Limit Commands 49 2 49...
Страница 478: ...VLAN Commands 52 18 52...
Страница 508: ...Quality of Service Commands 56 10 56...
Страница 518: ...Multicast Filtering Commands 57 10 57...
Страница 532: ...IPv4 Interface Commands 59 6 59...
Страница 560: ...IPv6 Interface Commands 60 28 60...
Страница 566: ...Switch Cluster Commands 61 6 61...
Страница 568: ...Appendices...
Страница 572: ...Software Specifications A 4 A TACACS Authentication Client MIB TCP MIB RFC 2012 Trap RFC 1215 UDP MIB RFC 2013...
Страница 582: ...Glossary Glossary 8...
Страница 587: ......
Страница 588: ...ES4524D ES4548D E112006 CS R01 149100030400A...