57
6.17 Aggregation - Configuration
Port trunking is the combination of several ports or network cables to expand the
connection speed beyond the limits of any one single port or network cable. Link
Aggregation Control Protocol (LACP), which is a protocol running on layer 2, provides
a standardized means in accordance with IEEE 802.3ad to bundle several physical
ports together to form a single logical channel. All the ports within the logical channel
or so-called logical aggregator work at the same connection speed and LACP
operation requires full-duplex mode.
Содержание IPES-2208CA
Страница 28: ...20 LC connector to the transceiver...
Страница 31: ...23 The illustration below shows an example of power over Ethernet application...
Страница 40: ...32...
Страница 46: ...38 IP Addressing interface...
Страница 49: ...41 SNMP Agent Configuration interface...
Страница 57: ...49...
Страница 59: ...51 Port Control interface 6 13 Port Status It will show you the status of port configuration setting...
Страница 61: ...53 Port Statistics interfac...
Страница 67: ...59 Port Trunk Aggregator Setting interface four ports are added to the left field with LACP enabled...
Страница 68: ...60 6 17 2Aggregator Status You can check the setting of Port aggregation in Status...
Страница 73: ...65 RSTP Port Configuration interface...
Страница 76: ...68 field and click Delete to remove it...
Страница 78: ...70 6 22 1 LLDP Neighbors It will show you the information about Port Neighbor via LLDP protocol...
Страница 80: ...72 6 23 1 Dynamic MAC table You can monitor the learning status of MAC address table in this function...
Страница 84: ...76 6 24 2Switch Status You can see the status of VLAN setting in this function...
Страница 89: ...81 highest priority Click Apply to have the configuration take effect...
Страница 100: ...92 6 26 3 3 Port Status You can monitor the port Authorized state in this function...
Страница 101: ...93 6 26 4 MAC Filtering You can block the un authorized MAC by switch in this function...
Страница 102: ...94 6 26 5 Port Security You can block the un authorized MAC by oer port in this function...
Страница 111: ...103 Straight through cables schematic Cross over cables schematic...