SGS-6341-Series User Manual
Table Of Contents
- Chapter 1 INTRODUCTION
- Chapter 2 INSTALLATION
- Chapter 3 Switch Management
- Chapter 4 Basic Switch Configuration
- Chapter 5 File System Operations
- Chapter 6 Cluster Configuration
- Chapter 7 Port Configuration
- Chapter 8 Port Isolation Function Configuration
- Chapter 9 Port Loopback Detection Function Configuration
- Chapter 10 ULDP Function Configuration
- Chapter 11 LLDP Function Operation Configuration
- Chapter 12 Port Channel Configuration
- Chapter 13 MTU Configuration
- Chapter 14 EFM OAM Configuration
- Chapter 15 PORT SECURITY
- Chapter 16 DDM Configuration
- Chapter 17 LLDP-MED
- Chapter 18 bpdu-tunnel Configuration
- Chapter 19 EEE Energy-saving Configuration
- Chapter 20 VLAN Configuration
- Chapter 21 MAC Table Configuration
- Chapter 22 MSTP Configuration
- Chapter 23 QoS Configuration
- Chapter 24 Flow-based Redirection
- Chapter 25 Flexible Q-in-Q Configuration
- Chapter 26 Layer 3 Management Configuration
- Chapter 27 ARP Scanning Prevention Function Configuration
- Chapter 28 Prevent ARP Spoofing Configuration
- Chapter 29 ARP GUARD Configuration
- Chapter 30 Gratuitous ARP Configuration
- Chapter 31 DHCP Configuration
- Chapter 32 DHCPv6 Configuration
- Chapter 33 DHCP Option 82 Configuration
- Chapter 34 DHCP Option 60 and option 43
- Chapter 35 DHCPv6 Options 37, 38
- Chapter 36 DHCP Snooping Configuration
- Chapter 37 DHCP Snooping Option 82 Configuration
- Chapter 38 IPv4 Multicast Protocol
- Chapter 39 IPv6 Multicast Protocol
- Chapter 40 Multicast VLAN
- Chapter 41 ACL Configuration
- Chapter 42 802.1x Configuration
- 42.1 Introduction to 802.1x
- 42.2 802.1x Configuration Task List
- 42.3 802.1x Application Example
- 42.4 802.1x Troubleshooting
- Chapter 43 The Number Limitation Function of MAC and IP in Port, VLAN Configuration
- Chapter 44 Operational Configuration of AM Function
- Chapter 45 Security Feature Configuration
- 45.1 Introduction to Security Feature
- 45.2 Security Feature Configuration
- 45.2.1 Prevent IP Spoofing Function Configuration Task Sequence
- 45.2.2 Prevent TCP Unauthorized Label Attack Function Configuration Task Sequence
- 45.2.3 Anti Port Cheat Function Configuration Task Sequence
- 45.2.4 Prevent TCP Fragment Attack Function Configuration Task Sequence
- 45.2.5 Prevent ICMP Fragment Attack Function Configuration Task Sequence
- 45.3 Security Feature Example
- Chapter 46 TACACS+ Configuration
- Chapter 47 RADIUS Configuration
- Chapter 48 SSL Configuration
- Chapter 49 IPv6 Security RA Configuration
- Chapter 50 MAB Configuration
- Chapter 51 PPPoE Intermediate Agent Configuration
- Chapter 52 Web Portal Configuration
- Chapter 53 VLAN-ACL Configuration
- Chapter 54 SAVI Configuration
- Chapter 55 MRPP Configuration
- Chapter 56 ULPP Configuration
- Chapter 57 ULSM Configuration
- Chapter 58 Mirror Configuration
- Chapter 59 sFlow Configuration
- Chapter 60 RSPAN Configuration
- Chapter 61 ERSPAN
- Chapter 62 SNTP Configuration
- Chapter 63 NTP Function Configuration
- Chapter 64 Summer Time Configuration
- Chapter 65 DNSv4/v6 Configuration
- Chapter 66 Monitor and Debug
- Chapter 67 Reload Switch after Specified Time
- Chapter 68 Debugging and Diagnosis for Packets Received and Sent by CPU
- Chapter 69 Dying Gasp Configuration
- Chapter 70 PoE Configuration
16-52
3. Compatibility verification
Compatibility verification is used to analyze whether the environment of the module accords
the data manual or it is compatible with the corresponding standard, because the module
capability is able to be ensured only in the compatible environment. Sometimes, environment
parameters exceed the data manual or the corresponding standard, it will make the falling of
the module capability that result in the transmission error.
Environment is not compatible with the module are as below:
(1)Voltage exceeds the set range
(2)Rx power is overload or is under the sensitivity of the transceiver
(3)Temperature exceeds the range of the running temperature
SGS-6341-20S4C4X doesn’t support DDM function.
16.1.2 DDM Function
DDM descriptions are shown in the following:
1. Show the monitoring information of the transceiver
Administrator is able to know the current working state of the transceiver and find some
potential problems through checking the real-time parameters (including TX power, RX power,
Temperature, Voltage, Bias current) and querying the monitoring information (such as warning,
alarm, real-time state and threshold, and so on). Besides, checking the fault information of the
fiber module helps administrator to fast locate the link fault and saves the restored time.
2. Threshold defined by the user
For real-time parameters (TX power, RX power, Temperature, Voltage, Bias current), there are
fixed thresholds. Because the user’s environments are difference, the users is able to define
the threshold (including high alarm, low alarm, high warn, low warn) to flexibly monitor the
working state of the transceiver and find the fault directly.
The thresholds configured by the user and the manufacturer can be shown at the same time.
When the threshold defined by the user is irrational, it will prompt the user and automatically
process alarm or warning according to the default threshold. (the user is able to restore all
thresholds to the default thresholds or restore a threshold to the default threshold)
Threshold rationality: high/low warn should be between high alarm and low alarm and high
threshold should be higher than low threshold, namely, high alarm>= high warn>= low warn>=
low alarm.
User’s Manual of SGS-6341 series