Table of Contents
Chapter 1
Introduction ...............................................................................................1-1
Overview .............................................................................................................................. 1-2
Package Checklist................................................................................................................. 1-2
Software Features ................................................................................................................. 1-2
Chapter 2
Getting Started ..........................................................................................2-1
Serial Console Configuration (115200, None, 8, 1, VT100) ................................................ 2-2
Configuration by Telnet Console.......................................................................................... 2-4
Configuration by Web Browser ............................................................................................ 2-7
Disabling Telnet and Browser Access .................................................................................. 2-8
Chapter 3
Featured Functions ...................................................................................3-1
Configuring Basic Settings................................................................................................... 3-2
System Identification................................................................................................. 3-2
Password ................................................................................................................... 3-3
Accessible IP............................................................................................................. 3-4
Port ............................................................................................................................ 3-5
Network..................................................................................................................... 3-6
Time .......................................................................................................................... 3-8
Daylight Saving Time ............................................................................................... 3-8
System File Update—By Remote TFTP ................................................................... 3-9
System File Update—By Local Import/Export ....................................................... 3-11
Factory Default........................................................................................................ 3-11
Using Port Trunking ........................................................................................................... 3-12
The Port Trunking Concept..................................................................................... 3-12
Configuring Port Trunking...................................................................................... 3-13
Configuring SNMP............................................................................................................. 3-14
SNMP Read/Write Settings..................................................................................... 3-15
Trap Settings ........................................................................................................... 3-16
Private MIB information ......................................................................................... 3-17
Using Communication Redundancy................................................................................... 3-17
The Turbo Ring Concept......................................................................................... 3-18
Configuring Turbo Ring and Turbo Ring V2.......................................................... 3-22
The STP/RSTP Concept.......................................................................................... 3-27
Configuring STP/RSTP........................................................................................... 3-32
Using Traffic Prioritization................................................................................................. 3-34
The Traffic Prioritization Concept .......................................................................... 3-34
Configuring Traffic Prioritization ........................................................................... 3-37
Using Virtual LAN ............................................................................................................. 3-39
The Virtual LAN (VLAN) Concept ........................................................................ 3-39
Sample Applications of VLANs using PT-7728 ..................................................... 3-41
Configuring Virtual LAN........................................................................................ 3-43
Using Multicast Filtering.................................................................................................... 3-44
The Concept of Multicast Filtering ......................................................................... 3-44
Configuring IGMP Snooping .................................................................................. 3-47
Add Static Multicast MAC...................................................................................... 3-49
Configuring GMRP ................................................................................................. 3-50
GMRP Table ........................................................................................................... 3-50
Using Bandwidth Management .......................................................................................... 3-50