User Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web Page
- 4.2 System
- 4.3 Port Management
- 4.4 Link Aggregation
- 4.5 VLAN
- 4.5.1 VLAN Overview
- 4.5.2 IEEE 802.1Q VLAN
- 4.5.3 Management VLAN
- 4.5.4 Create VLAN
- 4.5.5 Interface Settings
- 4.5.6 Port to VLAN
- 4.5.7 Port VLAN Membership
- 4.5.8 Protocol VLAN Group Setting
- 4.5.9 Protocol VLAN Port Setting
- 4.5.10 GVRP Setting
- 4.5.11 GVRP Port Setting
- 4.5.12 GVRP VLAN
- 4.5.13 GVRP Statistics
- 4.5.14 VLAN setting example:
- 4.6 Spanning Tree Protocol
- 4.7 Multicast
- 4.8 Quality of Service
- 4.9 Security
- 4.10 ACL
- 4.11 MAC Address Table
- 4.12 LLDP
- 4.13 Diagnostics
- 4.14 RMON
- 4.15 Power over Ethernet
- 4.16 Maintenance
- 5. SWITCH OPERATION
- 6. TROUBLESHOOTING
- APPENDIX A
- EC Declaration of Conformity
User’s Manual of LRP-822CS/LRP-1622CS
38
3.2 Management Access Overview
and manage it using any or all of the following methods:
An administration console
The administration console and Web browser interface support are embedded in the LRP Managed Switch software and are
available for immediate use. Each of these management methods has their own advantages. Table 3-1 compares the three
management methods.
The LRP Managed Switch gives you the flexibility to access
Web browser interface
An external SNMP-based network management application
Method Advantages Disadvantages
Console
No IP address or subnet needed
HyperTerminal
T/2000/ME/XP operating
Secure
Must be near the switch or use dial-up
connection
Not convenient for remote users
Modem connection may prove to be unreliable
or slow
Text-based
Telnet functionality and
built into Windows
95/98/N
systems
Web Browser
Ideal fo
Comp
r configuring the switch remotely
atible with all popular browsers
Security can be compromised (hackers need
only know the IP address and subnet mask)
Can be accessed from any location
Most visually appealing
May encounter lag times on poor connections
SNMP Agent
Communicates with switch functions at Requires SN
the MIB level
Based on open standards Some settings require calc
MP manager software
Least visually appealing of all three methods
ulations
Security can be compromised (hackers only
unity name) need to know the comm
Table 3-1 Comparison of Management Methods