User Manual
Table Of Contents
- S350 Series 8-Port Gigabit Ethernet Smart Switch
- Contents
- 1 Get Started
- Available Publications
- Switch Management and Discovery Overview
- Options to Change the Default IP Address of the Switch
- Discover or Change the Switch IP Address
- About the User Interfaces
- Access the Local Browser Interface
- Change the Language of the Local Browser Interface
- Use the Device View of the Local Browser Interface
- Interface Naming Conventions
- Configure Interface Settings
- Context-Sensitive Help and Access to the Support WebSite
- Access the User Guide Online
- Register Your Product
- 2 Configure System Information
- 3 Configure Switching
- Configure the Port Settings and Maximum Frame Size
- Configure Link Aggregation Groups
- Configure VLANs
- Configure a Voice VLAN
- Configure Auto-VoIP
- Configure Spanning Tree Protocol
- Configure Multicast
- View and Search the MFDB Table
- View the MFDB Statistics
- Configure the Auto-Video Multicast Settings
- About IGMP Snooping
- Configure IGMP Snooping
- Configure IGMP Snooping for Interfaces
- View, Search, or Clear the IGMP Snooping Table
- Configure IGMP Snooping for VLANs
- Modify IGMP Snooping Settings for a VLAN
- Disable IGMP Snooping on a VLAN
- Configure a Multicast Router Interface
- Configure a Multicast Router VLAN
- IGMP Snooping Querier Overview
- Configure an IGMP Snooping Querier
- Configure an IGMP Snooping Querier for VLANs
- Display IGMP Snooping Querier for VLAN Status
- View, Search, and Manage the MAC Address Table
- Configure Layer 2 Loop Protection
- 4 Configure Quality of Service
- 5 Manage Device Security
- Configure the Management Security Settings
- Configure Management Access
- Configure Port Authentication
- Set Up Traffic Control
- Configure Access Control Lists
- Use the ACL Wizard to Create a Simple ACL
- Configure a Basic MAC ACL
- Configure MAC ACL Rules
- Configure MAC Bindings
- View or Delete MAC ACL Bindings in the MAC Binding Table
- Configure a Basic or Extended IP ACL
- Configure Rules for a Basic IP ACL
- Configure Rules for an Extended IP ACL
- Configure IP ACL Interface Bindings
- View or Delete IP ACL Bindings in the IP ACL Binding Table
- Configure VLAN ACL Bindings
- 6 Monitor the System
- 7 Maintenance
- A Configuration Examples
- B Specifications and Default Settings
S350 Series 8-Port Gigabit Ethernet Smart Switch Models GS308T and GS310TP
Configuration Examples User Manual347
If you do not specify a root bridge and all switches are assigned the same bridge priority
value, the switch with the lowest MAC address is elected as the root bridge (see
Configure and View the CST Settings on page 135).
5. On the CST Port Configuration page, select ports 1/0/1–1/0/8 and select Enable from the
STP Status menu (see
Configure and View the CST Port Settings on page 137).
6. Click the Apply button.
7. Select ports 1/0/1–1/0/5 (edge ports), and select Enable from the Fast Link menu.
Since the edge ports are not at risk for network loops, ports with Fast Link enabled
transition directly to the forwarding state.
8. Click the Apply button.
You can use the CST Port Status page to view spanning tree information about each
port.
9. On the MST Configuration page, create a MST instances with the following settings:
• MST ID. 1
• Priority. Use the default (32768)
• VLAN ID. 300
For more information, see
View Rapid STP Information on page 141.
10. Click the Add button.
11. Create a second MST instance with the following settings
• MST ID. 2
• Priority. 49152
• VLAN ID. 500
12. Click the Add button.
In this example, assume that Switch 1 became the root bridge for the MST instance 1, and
Switch 2 became the root bridge for MST instance 2. Switch 3 supports hosts in the sales
department (ports 1/0/1, 1/0/2, and 1/0/3) and in the HR department (ports 1/0/4 and 1/0/5).
Switches 1 and 2 also include hosts in the sales and HR departments.
The hosts connected
from Switch 2 use VLAN 500, MST instance 2 to communicate with the hosts on Switch 3
directly
. Likewise, hosts of Switch 1 use VLAN 300, MST instance 1 to communicate with the
hosts on Switch 3 directly.
The hosts use different instances of MSTP to effectively use the links across the switch. The
same concept can be extended to other switches and more instances of MSTP
.










