High Density Workgroup Switch Installation and User Guide

iii
Virtual Networking..................................................................................................................45
Important Considerations ................................................................................................. 46
Viewing the VLAN Mode...................................................................................................46
Setting the VLAN Mode .................................................................................................... 46
Inter-Switch VLAN or ISVLAN...............................................................................................47
Tag Field Format............................................................................................................... 47
Principles of ISVLAN ........................................................................................................ 47
Viewing the ISVLAN Mode................................................................................................ 47
Setting a Tagged Port........................................................................................................47
Removing a Tagged Port.................................................................................................... 48
Server Port ........................................................................................................................48
Creating a Server Port.......................................................................................................48
Removing a Server Port ..................................................................................................... 49
VLAN.................................................................................................................................49
Creating a VLAN...............................................................................................................49
Viewing VLAN Configuration............................................................................................49
Deleting a VLAN................................................................................................................50
VLAN Management...........................................................................................................51
Viewing the Management Tag ...........................................................................................51
Modifying the Management Tag........................................................................................51
Deleting the Management from a VLAN............................................................................ 51
Creating a VLAN with Port Management .........................................................................52
VLAN, Server-port, Example of Configuration ................................................................. 52
Physical configuration schema ..........................................................................................52
VLAN Server Port Configuration:......................................................................................52
VLAN Configuration .........................................................................................................53
Payroll VLAN Configuration:............................................................................................ 53
Finance VLAN Configuration:........................................................................................... 53
Checking the Configuration:.............................................................................................. 53
Utilities Commands.................................................................................................................54
Ping Commands.................................................................................................................54
Port mirroring ...................................................................................................................54
Setting the Monitoring Port............................................................................................... 55
Monitoring with: monitor ..................................................................................................55
Saving the Configuration ..................................................................................................55
Stopping Monitoring.......................................................................................................... 55
Viewing the NVRAM Configuration ..................................................................................56
Erasing the NVRAM configuration ...................................................................................56
Frame Generator............................................................................................................... 56
Setting the Frame Generator ............................................................................................. 56
Starting the Frame Generation.......................................................................................... 56
Stopping the Frame Generation......................................................................................... 57
SNMP.......................................................................................................................................57
NBase-Xyplex SNMP Support........................................................................................... 57
SNMP basic configuration.................................................................................................57
SNMP Community String Commands .............................................................................. 58
Viewing the Community String .........................................................................................58
Setting the Read or Write Community...............................................................................58
SNMP Traps......................................................................................................................59
Setting Authentication Traps ............................................................................................59