Configure Your Switch

Total Page:16

File Type:pdf, Size:1020Kb

Configure Your Switch TRENDnet User’s Guide Table of Contents Contents SYSTEM REQUIREMENTS .............................................................................................................114 INSTALLATION...............................................................................................................................114 PRODUCT OVERVIEW .......................................................................................................2 USING THE UTILITY ......................................................................................................................115 DISCOVERY LIST............................................................................................................................116 FEATURES............................................................................................................................................ 2 DEVICE SETTING ...........................................................................................................................117 FRONT VIEW ....................................................................................................................................... 3 MAIN MENU OPTIONS .................................................................................................................118 NDICATORS LED I ............................................................................................................................... 3 REAR VIEW ......................................................................................................................................... 5 TECHNICAL SPECIFICATIONS ................................................................................... 120 PACKAGE CONTENTS ......................................................................................................................... 5 TROUBLESHOOTING .................................................................................................... 122 SWITCH INSTALLATION ...................................................................................................5 APPENDIX ........................................................................................................................ 123 DESKTOP HARDWARE INSTALLATION............................................................................................ 5 HOW TO FIND YOUR IP ADDRESS? .............................................................................................123 RACK MOUNT HARDWARE INSTALLATION.................................................................................... 6 HOW TO FIND YOUR MAC ADDRESS? ........................................................................................131 BASIC INSTALLATION ........................................................................................................................ 6 CONNECT ADDITIONAL DEVICES TO YOUR SWITCH ....................................................................... 8 REGULATIONS ................................................................................................................ 132 CONFIGURE YOUR SWITCH .............................................................................................9 FEDERAL COMMUNICATION COMMISSION INTERFERENCE STATEMENT..................................132 ROHS..............................................................................................................................................132 ACCESS YOUR SWITCH MANAGEMENT PAGE .................................................................................. 9 EUROPE – EU DECLARATION OF CONFORMITY .......................................................................133 SWITCH INFO ...................................................................................................................................... 9 SYSTEM ............................................................................................................................................. 11 LIMITED WARRANTY .................................................................................................. 134 PHYSICAL INTERFACE..................................................................................................................... 24 BRIDGE.............................................................................................................................................. 27 SNMP ............................................................................................................................................... 62 ACCESS CONTROL CONFIG ............................................................................................................. 71 RMON .............................................................................................................................................. 77 VOICE VLAN ................................................................................................................................... 83 SECURITY.......................................................................................................................................... 87 DESTINATION MAC FILTER .......................................................................................................... 92 POWER OVER ETHERNET CONFIGURATION ................................................................................ 94 DHCP SNOOPING............................................................................................................................ 96 LLDP (LINK-LAYER DISCOVERY PROTOCOL) ........................................................................ 100 STATISTIC ...................................................................................................................................... 103 SWITCH MAINTENANCE .............................................................................................................. 105 SAVE SETTINGS TO FLASH .......................................................................................................... 113 WEB SMART SWITCH MANAGEMENT UTILITY .................................................. 114 © Copyright 2015 TRENDnet. All Rights Reserved. 1 TRENDnet User’s Guide Table of Contents Product Overview Hardware Design Provides 24 x Gigabit PoE+ ports (Ports 1-24 802.3at), 24 x Gigabit ports (Ports 25-48), 4 x shared SFP slots (shared with ports 45-48), a PoE Power budget of 370 Watts, and includes rackmount brackets. Smart Fan Smart fan saves energy by varying fan speed and use based on cooling needs. IPv6 Ready This switch supports IPv6 configuration and IPv6 neighbor discovery. Traffic Management A broad range of network configurations are supported by: 802.3ad link aggregation, Asymmetric VLAN, 802.1Q VLAN, Voice VLAN, Private VLAN, Bandwidth Controls, GVRP, IGMP v1-v3, 802.1p Class of Service (CoS), Spanning Tree (STP, RSTP, and MSTP), and QoS queue scheduling. TPE-4840WS Troubleshooting Real time traffic comparison charts, error group charts, and a convenient cable diagnostic test aid in rapid troubleshooting. Features Access Controls TRENDnet’s 48-Port Gigabit Web Smart PoE+ Switch, model TPE-4840WS, Features such as ACL, SSL, MAC/port filtering, Denial of Service controls, offers 24 x Gigabit PoE+ ports (Ports 1-24 802.3at), 24 x Gigabit ports (Ports 802.1X, TACACS+, and RADIUS are compatible with layered network 25-48), 4 x shared SFP slots (shared with ports 45-48), and a PoE Power access controls. budget of 370 Watts. This IPv6 ready switch offers advanced traffic management, troubleshooting, access control, energy saving GREENnet, Monitoring and monitoring features at a reduced cost. RMON, SNMP, SNMP Trap, and Port Mirroring support administrator monitoring solutions. © Copyright 2015 TRENDnet. All Rights Reserved. 2 TRENDnet User’s Guide Table of Contents Front View LED Indicators System LED Reset Button Green The TPE-4840WS is powered on and working properly. Red The TPE-4840WS had system failure. Off The TPE-4840WS is not powered. PoE Max LED Red When the total PoE output power achieve max power budget (370W). Off TPE-4840WS has spared power for new PoE PD (power devices). PoE+ Ports Gigabit Ports SFP Share System LED Ports Indicators Interfaces Reset Button Press and hold this button for 10 seconds and release to reset the switch to factory defaults. PoE+ Gigabit Connect 802.3at (PoE+, 30W Max.), 802.3af (PoE, Ethernet Ports 15.4W Max.) or regular non PoE network devices. (1-24) Gigabit Connect 802.3af (PoE, 15.4W Max.) or regular non Ethernet Ports PoE network devices. (25-48) Connect network devices and can be used for uplink or downlink connections. Ports 45 to 48 SFP slots are shared with SFP slots 45F, 46F, 47F and 48F (45F-48F) and will be disabled when SFP slots (45F, 46F, 47F and 48F) are in used. Supports optional 100 or 1000BASE-SX/LX mini- GBIC modules. © Copyright 2015 TRENDnet. All Rights Reserved. 3 TRENDnet User’s Guide Table of Contents Link/ACT LED (per port) Shared SFP Slots (45F, 46F, 47F and 48F) Green On The respective port is successfully connected to an Solid The port is inserted mini-GBIC Gigabit module and gigabit Ethernet network on 1000Mbps Green link is established. Green The port is transmitting or receiving data on the Blink Traffic is passing through this SPF port with gigabit link. Blinking Ethernet network on 1000Mbps in Amber On The respective port is successfully connected to an Green Ethernet network on 10/100Mbps Solid The port is inserted mini-GBIC 100Mbps module and 100M Amber The port is transmitting or receiving
Recommended publications
  • AT-GS950/16 Gigabit Ethernet Switch
    AT-GS950/16 Gigabit Ethernet Switch AT-GS950/16 Web Interface User Guide AT-S114 Version 1.1.0 [1.00.021] 613-001857 Rev A Copyright © 2013 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied Telesis, Inc. Allied Telesis and the Allied Telesis logo are trademarks of Allied Telesis, Incorporated. All other product names, company names, logos or other designations mentioned herein are trademarks or registered trademarks of their respective owners. Allied Telesis, Inc. reserves the right to make changes in specifications and other information contained in this document without prior written notice. The information provided herein is subject to change without notice. In no event shall Allied Telesis, Inc. be liable for any incidental, special, indirect, or consequential damages whatsoever, including but not limited to lost profits, arising out of or related to this manual or the information contained herein, even if Allied Telesis, Inc. has been advised of, known, or should have known, the possibility of such damages. Contents List of Figures ................................................................................................................................................ 11 List of Tables ................................................................................................................................................. 15 Preface ...........................................................................................................................................................
    [Show full text]
  • Vlans Feature Overview and Configuration Guide
    TechnicalTTechnicalechnical GuideGuidGuidee Virtual LANs (VLANs) Feature Overview and Configuration Guide VLAN Introduction This guide describes Virtual LANs (VLANs), VLAN features and configuration on the switch. It begins with a description of what a VLAN is, its evolution and purpose, and also provides the meaning of some common VLAN terminology. This is followed with a detailed look at VLAN implementation. Port-based VLAN membership is the most common way to split a network into sets of virtual LANs. We look at how this is achieved using the VLAN tagging. The use of double-tagging (or VLAN stacking) to tunnel VLANs across Layer 2 networks is described, and an example is provided for the configuration of VLAN stacking. Next we discuss private VLANs and the communication rules that limit what is possible between devices operating within the VLAN. AlliedWare Plus™ has two private VLAN solutions: private VLANs for ports in Access Mode private VLANs for ports in Trunked Mode Configuration examples are provided for both of these solutions. Then, we look at combining private VLANs with other features, such as: EPSR, ARP, LLDP, GVRP, Link aggregation, and management servers. The guide ends with a section on configuring protocol based VLANs and then describes how data counters are used to count both the number of received frames or the number of received bytes (octets) belonging to a particular VLAN. C613-22001-00 x REV C alliedtelesis.com Products and software version that apply to this guide This guide applies to all AlliedWare Plus™ products, running version 5.4.4 or later. However, not all features in this guide are supported on all products.
    [Show full text]
  • Configuring Vlans, Spanning Tree, and Multi-Link Trunking on Avaya Ethernet Routing Switch 4900 and 5900 Series
    Configuring VLANs, Spanning Tree, and Multi-Link Trunking on Avaya Ethernet Routing Switch 4900 and 5900 Series Release 7.4 NN47211-502 Issue 06.01 April 2017 © 2014-2017, Avaya Inc. IF YOU DO NOT WISH TO ACCEPT THESE TERMS OF USE, YOU All Rights Reserved. MUST NOT ACCESS OR USE THE HOSTED SERVICE OR AUTHORIZE ANYONE TO ACCESS OR USE THE HOSTED Notice SERVICE. While reasonable efforts have been made to ensure that the Licenses information in this document is complete and accurate at the time of printing, Avaya assumes no liability for any errors. Avaya reserves THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA the right to make changes and corrections to the information in this WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO, document without the obligation to notify any person or organization UNDER THE LINK “AVAYA SOFTWARE LICENSE TERMS (Avaya of such changes. Products)” OR SUCH SUCCESSOR SITE AS DESIGNATED BY AVAYA, ARE APPLICABLE TO ANYONE WHO DOWNLOADS, Documentation disclaimer USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED “Documentation” means information published in varying mediums FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AVAYA which may include product information, operating instructions and CHANNEL PARTNER (AS APPLICABLE) UNDER A COMMERCIAL performance specifications that are generally made available to users AGREEMENT WITH AVAYA OR AN AVAYA CHANNEL PARTNER. of products. Documentation does not include marketing materials. UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING, Avaya shall not be responsible for any modifications, additions, or AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE deletions to the original published version of Documentation unless WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN such modifications, additions, or deletions were performed by or on AVAYA AFFILIATE OR AN AVAYA CHANNEL PARTNER; AVAYA the express behalf of Avaya.
    [Show full text]
  • Implementasi Private Virtual Local Area Network Menggunakan Mikrotik Routerboard
    1 IMPLEMENTASI PRIVATE VIRTUAL LOCAL AREA NETWORK MENGGUNAKAN MIKROTIK ROUTERBOARD TUGAS AKHIR OLEH : RANKA ARDEPA 09030581620013 PROGRAM STUDI TEKNIK KOMPUTER JURUSAN SISTEM KOMPUTER FAKULTAS ILMU KOMPUTER UNIVERSITAS SRIWIJAYA 2019 2 IMPLEMENTASI PRIVATE VIRTUAL LOCAL AREA NETWORK MENGGUNAKAN MIKROTIK ROUTERBOARD TUGAS AKHIR Diajukan Untuk Melengkapi Salah Satu Syarat Memperoleh Gelar Ahli Madya Komputer OLEH : RANKA ARDEPA 09030581620013 PROGRAM STUDI TEKNIK KOMPUTER JURUSAN SISTEM KOMPUTER FAKULTAS ILMU KOMPUTER UNIVERSITAS SRIWIJAYA 2019 3 4 5 6 MOTTO DAN PERSEMBAHAN Motto : "Setiap orang mempunyai cara dan jalananya masing-masing dalam mencapai kesuksesanya.” Kupersembahkan Kepada : Allah SWT. yang memberikan nikmat iman, kesehatan, kekuatan dan kesabaran. Kedua orang tua saya tercinta (Sandi Arapat dan Eka Wati) terima kasih untuk seluruh kasih sayang, doa, dukungan dan segala hal yang telah engkau lakukan terhadap saya. I love you so much. Kedua pembimbing saya (Ahmad Heryanto, M.T.) dan (Rido Zulfahmi, M.T.) yang telah banyak membantu dan membimbing saya dalam penyelesaian Tugas Akhir. Terima kasih. Sahabat – sahabat saya yang selalu mendoakan dan memberikan semangat untuk tetap berusaha. Seluruh teman seperjuangan Teknik Komputer 2016 yang sudah berbagi moment suka dan duka selama 3 tahun. Almamaterku. 7 KATA PENGANTAR Alhamdulillah puji syukur penulis panjatkan kehadirat Allah SWT. Karena atas rahmat dan hidayah-Nya penulis dapat menyelesaikan Tugas Akhir dengan baik. Tugas Akhir ini berjudul " IMPLEMENTASI PRIVATE VIRTUAL LOCAL AREA NETWORK MENGGUNAKAN MIKROTIK ROUTERBOARD ". Tugas Akhir ini merupakan salah satu syarat untuk menyelesaikan masa studi pada program Diploma Komputer Universitas sriwijaya. Tidak lupa, kita junjung tinggi kemuliaan dan kesejahtaraan kepada Nabi Muhammad SAW. dan keluarganya. Dalam penulisan laporan ini, penulis menyadari, bahwa tanpa adanya bimbingan, bantuan, dorongan, dan petunjuk serta dukungan dari semua pihak tidak mungkin laporan ini dapat terselesaikan.
    [Show full text]
  • Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide
    Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-20920-02 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Private VLAN and Cisco UCS Configuration Prior to 2.2(2C)
    Contents Introduction Prerequisites Requirements Components Used Background Information Theory PVLAN Implementation in UCS Goal Configure Network Diagrams PVLAN on vSwitch: Isolated PVLAN with Promiscuous Port on an Upstream Device Configuration in UCS Configuration of Upstream Devices Troubleshooting Isolated PVLAN on N1K with Promiscuous Port on an Upstream Device Configuration in UCS Configuration of Upstream Devices Configuration of N1K Troubleshooting Isolated PVLAN on N1K with Promiscuous Port on the N1K Uplink Port-Profile Configuration in UCS Configuration of Upstream Devices Configuration of N1K Troubleshooting Community PVLAN on N1K with Promiscuous Port on the N1K Uplink Port-Profile Troubleshooting Isolated PVLAN and Community PVLAN on VMware DVS Promiscuous Port on the DVS Verify Troubleshoot Introduction This document describes private VLAN (PVLAN) support in the Cisco Unified Computing System (UCS), a feature introduced in Release 1.4 of the Cisco UCS Manager (UCSM). It also details the features, the caveats, and the configuration when PVLANs are used in a UCS environment. THIS DOCUMENT IS FOR USE WITH UCSM VERSION 2.2(2C) AND EARLIER VERSIONS. In versions later than Version 2.2(2C), changes have been made to UCSM and ESXi DVS is supported. There are also changes in how tagging works for the PVLAN NIC. Prerequisites Requirements Cisco recommends that you have knowledge of these topics: ● UCS ● Cisco Nexus 1000 V (N1K) ● VMware ● Layer 2 (L2) switching Components Used This document is not restricted to specific software and hardware versions. The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration.
    [Show full text]
  • Configuring Private Vlans
    CHAPTER18 Configuring Private VLANs This chapter describes how to configure private VLANs in Cisco IOS Software Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Software Releases 12.2SX Command References at this URL: http://www.cisco.com/en/US/docs/ios/mcl/122sx_mcl.html This chapter consists of these sections: • Understanding Private VLANs, page 18-1 • Private VLAN Configuration Guidelines and Restrictions, page 18-6 • Configuring Private VLANs, page 18-11 • Monitoring Private VLANs, page 18-17 Understanding Private VLANs These sections describe how private VLANs work: • Private VLAN Domains, page 18-2 • Private VLAN Ports, page 18-3 • Primary, Isolated, and Community VLANs, page 18-3 • Private VLAN Port Isolation, page 18-4 • IP Addressing Scheme with Private VLANs, page 18-4 • Private VLANs Across Multiple Switches, page 18-5 • Private VLAN Interaction with Other Features, page 18-5 Cisco IOS Software Configuration Guide, Release 12.2(33)SXH and Later Releases OL-13013-02 18-1 Chapter 18 Configuring Private VLANs Understanding Private VLANs Private VLAN Domains The private VLAN feature addresses two problems that service providers encounter when using VLANs: • The switch supports up to 4096 VLANs. If a service provider assigns one VLAN per customer, the number of customers that service provider can support is limited. • To enable IP routing, each VLAN is assigned a subnet address space or a block of addresses, which can result in wasting the unused IP addresses and creating IP address management problems. Using private VLANs solves the scalability problem and provides IP address management benefits for service providers and Layer 2 security for customers.
    [Show full text]
  • 5517 M. Foschiano Category: Informational Cisco Systems ISSN: 2070-1721 February 2010
    Independent Submission S. HomChaudhuri Request for Comments: 5517 M. Foschiano Category: Informational Cisco Systems ISSN: 2070-1721 February 2010 Cisco Systems' Private VLANs: Scalable Security in a Multi-Client Environment Abstract This document describes a mechanism to achieve device isolation through the application of special Layer 2 forwarding constraints. Such a mechanism allows end devices to share the same IP subnet while being Layer 2 isolated, which in turn allows network designers to employ larger subnets and so reduce the address management overhead. Some of the numerous deployment scenarios of the aforementioned mechanism (which range from data center designs to Ethernet-to-the- home-basement networks) are mentioned in the following text to exemplify the mechanism's possible usages; however, this document is not intended to cover all such deployment scenarios nor delve into their details. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This is a contribution to the RFC Series, independently of any other RFC stream. The RFC Editor has chosen to publish this document at its discretion and makes no statement about its value for implementation or deployment. Documents approved for publication by the RFC Editor are not a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc5517. HomChaudhuri & Foschiano Informational [Page 1] RFC 5517 Private VLANs February 2010 Copyright Notice Copyright (c) 2010 IETF Trust and the persons identified as the document authors.
    [Show full text]
  • Hacking Layer 2: Fun with Ethernet Switches Sean Convery, Cisco Systems [email protected]
    Hacking Layer 2: Fun with Ethernet Switches Sean Convery, Cisco Systems [email protected] l2-security-bh.ppt © 2002, Cisco Systems, Inc. All rights reserved. 1 Agenda ¥ Layer 2 Attack Landscape ¥ Specific Attacks and Countermeasures (Cisco and @Stake Testing)Ñhttp://www.atstake.com MAC Attacks VLAN ÒHoppingÓ Attacks ARP Attacks Spanning Tree Attacks Layer 2 Port Authentication Other Attacks ¥ Summary and Case Study l2-security-bh.ppt © 2002, Cisco Systems, Inc. All rights reserved. 2 Caveats ¥ All attacks and mitigation techniques assume a switched Ethernet network running IP If shared Ethernet access is used (WLAN, Hub, etc.) most of these attacks get much easier If you arenÕt using Ethernet as your L2 protocol, some of these attacks may not work, but you may be vulnerable to different ones J ¥ Attacks in the ÒtheoreticalÓ category can move to the practical in a matter of days ¥ All testing was done on Cisco equipment, Ethernet switch attack resilience varies widely from vendor to vendor ¥ This is not a comprehensive talk on configuring Ethernet switches for security; the focus is on L2 attacks and their mitigation l2-security-bh.ppt © 2002, Cisco Systems, Inc. All rights reserved. 3 Why Worry about Layer 2 Security? OSI Was Built to Allow Different Layers to Work without Knowledge of Each Other Host A Host B Application Stream Application Application Presentation Presentation Session Session Transport Protocols/Ports Transport Network IPIP AddressesAddresses Network MAC Addresses Data Link Data Link Physical Links Physical Physical l2-security-bh.ppt
    [Show full text]
  • Virtual LAN Security Best Practices
    Application Note Virtual LAN Security Best Practices Independent security research firm @stake [9] recently conducted a Security Review [1] of the virtual LAN (VLAN) technology on the Cisco Catalyst 2950, Catalyst 3550, Catalyst 4500, and Catalyst 6500 series switches. Although no intrinsic security weaknesses emerged from this review, it has been pointed out that an improper or inadequate switch configuration can be the source of undesired behavior and possible security breaches. Over the past years, Cisco Systems has been If a user does not want one of his or her advocating best-practices guidelines for devices to be tampered with, physical access secure network configuration in several to the device must be strictly controlled. documents. The SAFE Blueprint [2] or the Furthermore, it is important for any Best Practices for Catalyst 4500, 5000, and network administrator to use all the proven 6500 Series Switches [3] are examples of security tools available on Cisco platforms: such documents. However, there has been from the very basic configuration of system no single document that collects all of the passwords, the use of IP permit filters, and VLAN-related best practices for easier login banners, all the way to more advanced perusal by customers and field engineers. tools such as RADIUS, TACACS+, The purpose of this paper is to present in a Kerberos, SSH, SNMPv3, IDS, and so forth. comprehensive way all of the (More details are provided in [3].) recommendations that Cisco engineers have Only after all the basic security components accumulated to aid with the proper are in place, is it possible to turn attention configuration of VLANs on Cisco switches.
    [Show full text]
  • Quick Setup Guide
    QUICK SETUP GUIDE Luxul L2/L3 Managed Switches XMS-2624P, XMS-5248P, XMS-7048P AMS-1208P, AMS-2616P, AMS-2624P, AMS-4424P AMS-2600 Quick Installation Quick System Setup IP Configuration and Routing PoE VLANs Private VLANs Spanning Tree CONTENTS INTRODUCTION .......................................................... 1 QUICK INSTALLATION .................................................... 2 Rack Installation ................................................................................. 2 Ethernet and Power Connections .................................................................. 2 Network Cabling ................................................................................. 2 IP Addressing .................................................................................... 2 Getting Connected ............................................................................... 3 Logging In ....................................................................................... 3 MANAGED SWITCH BASICS ................................................ 4 QUICK SETUP: SYSTEM .................................................... 5 System ........................................................................ 5 Information. 5 IP ............................................................................................... 6 NTP ............................................................................................. 8 Time ............................................................................................ 9 Log ............................................................................................
    [Show full text]
  • Vlans and Trunks
    Expert Reference Series of White Papers VLANs and Trunks 1-800-COURSES www.globalknowledge.com VLANs and Trunks Alan Thomas, CCNA, CCSI, Global Knowledge Instructor Introduction Virtual Local Area Networks (VLANs) provide several benefits to enterprise networks. VLANs provide a measure of flexibility, improve user mobility, ease the application of security measures, and increase the overall efficiency of the network. Trunks also provide benefits, specifically the ability to reduce the number of physical connections needed between switches in order to support multiple VLANs. This paper describes VLANs and trunks. It includes an overview of Ethernet-based computer networks, which includes definitions of several terms. This paper also includes technical details about VLANs and trunks, along with design options at a basic to intermediate level. Recommendations and commands are included throughout. Overview The Open Systems Interconnect (OSI) communications model is a seven-layer reference model that describes the functions necessary for two endpoints to communicate. The 2nd Layer of the OSI model is called the Data Link Layer. Its functions are to format data for transmission on the physical media and to define how devices access the physical media (twisted pair copper, fiber optic, or wireless). Ethernet is the Layer 2 protocol used for devices that connect to a Local Area Network (LAN). Ethernet defines how data is formatted for transmission by creating frames. Figure 1 shows a sample Ethernet frame. Figure 1---Ethernet Frame When data is transmitted along the media, the data is just a series of bits. Ethernet defines how the sending and receiving device will interpret those bits.
    [Show full text]