S
PANNING
T
REE
A
LGORITHM
The switch supports these spanning tree protocols:
Spanning Tree Protocol (STP, IEEE 802.1D) – Supported by using
the STP backward compatible mode provided by RSTP. STP
provides loop detection. When there are multiple physical paths
between segments, this protocol will choose a single path and
disable all others to ensure that only one route exists between
any two stations on the network. This prevents the creation of
network loops. However, if the chosen path should fail for any
reason, an alternate path will be activated to maintain the
connection.
Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) – This
protocol reduces the convergence time for network topology
changes, for the older IEEE
802.1D STP standard. It is intended
as a complete replacement for STP, but can still interoperate with
switches running the older standard by automatically
reconfiguring ports to STP-compliant mode if they detect STP
protocol messages from attached devices.
V
IRTUAL
L
ANS
(V
LANS
)
The switch supports up to 4K VLANs. The VLAN is a collection of
network nodes that share the same collision domain regardless of
their physical location or connection point in the network. The
switch supports the IEEE 802.1Q tagged VLANs standard. Members
of VLAN groups can be dynamically learned via GVRP, or ports can
be manually assigned to a specific set of VLANs. By segmenting
your network into VLANs, you can:
Eliminate broadcast storms which severely degrade
performance in a flat network.
Provide data security by restricting all traffic to the originating
VLAN.
Use private VLANs to restrict traffic to pass only between data
ports and the uplink ports, thereby isolating adjacent ports
within the same VLAN, and allowing you to limit the total
number of VLANs that need to be configured.
I
P
-M
AC
-P
ORT
B
INDING
The IP network layer uses a four-byte address. The Ethernet link
layer uses a six-byte MAC address. Binding these two address
types together allows the transmission of data between the layers.
The primary purpose of IP-MAC binding is to restrict the access to
a switch to a number of authorized users. Only the authorized
client can access the Switch‘s port by checking the pair of IP-MAC
Addresses and port number with the pre-configured database. If
an unauthorized user tries to access an IP-MAC binding enabled
port, the system will block the access by dropping its packet.
Содержание LGS-2816C-RPS
Страница 4: ...Revision History Release Date Revision 5 17 01 10 2010 B1...
Страница 5: ...CONTENTS...
Страница 56: ...74 CHAPTER 4 Configuring the Switch Configuring Power Saving the manufacturer...
Страница 69: ......
Страница 117: ...Figure 4 50 Access Control List Configuration...
Страница 146: ...164 CHAPTER 4 Configuring the Switch Configure SNMP Port Port identity of switch Port Number 1 24...
Страница 154: ...172 CHAPTER 4 Configuring the Switch Configure SNMP designated port of the root bridge...
Страница 162: ...180 CHAPTER 4 Configuring the Switch Configure SNMP...
Страница 196: ...346 CHAPTER 8 Commands of CLI Alarm Commandsof CLI...
Страница 199: ...346 CHAPTER 8 Commands of CLI Alarm Commandsof CLI...
Страница 207: ...3 Click Upload Figure 110 Display Firmware Upgrade Screen...
Страница 241: ...349 Interfaces Evolution MIB RFC 2863 IP MIB RFC 2011...