Installation guide

WATERS NETWORK SYSTEMS™ ProSwitch
®
- 2600M, User’s Manual, 02/07 Page 7
treats additional cables as one connection between them. Traffic looping will not occur
between these cables and switches will be more stable with a bigger bandwidth between
them.
The 2600M supports the trunking function.
Enable trunk function.
Assign ports to a trunk. For example, assign Port 1, 2, 3 for Trunk 1.
Redundant Application
The trunk connection supports redundant function. If a trunk cable is broken, the traffic
going through that cable will be transferred to another trunk cable automatically. For
example, if a user on Port 6 is assigned to Port 1 in a Trunk and the Port 1 connection
breaks, Port 2 will take over the traffic for Port 6 automatically.
Spanning Tree Protocol
Spanning tree is a protocol used to prevent network loops. If a network loop occurs, it will
cause switches in the network to become unstable because the traffic will begin to loop in
the network. If a network loop occurs, the spanning tree protocol will block one connection
in the loop automatically.
Note: If a network connection is changed, there will be a 30 second delay. Because there
could be more than one switch in the network, you can configure this function to work for
your network.
Port Mirror
This switch operates in store-and-forward algorithm, so it is not possible to monitor network
traffic from another connection port. But the port mirror function could copy packets from a
monitored port to another port for network monitoring. This switch also provides DA/SA
filtering function for monitoring the traffic to/from a user.
QoS
QoS provides a configuration to set priorities for packets. For real-time network traffic (like
video or audio), a higher priority is required. With the definition of packet priority, there
could be eight levels of priority (from 0 to 7). The 2600M provides four priority level queues
on each port. It can be configured for port-based or 802.1p tag-based. You can define the
mapping (0 to 7) to the four priority queues.
Static MAC ID in ARL table
The switch learns the MAC address from user’s packets and keeps these MAD addresses
in the ARL table for store-and-forward table lookup operation. These MAC addresses will
be deleted from ARL table after some time if users do not send packets to the switch. This
operation is called aging and the time is called aging time. It is normally five minutes, but
you can change the time. If you want to keep MAC addresses in the ARL table for a port,
you can assign MAC addresses to the ARL table. These MAC IDs are called static MAC
addresses.
The 2600M supports static MAC address assignments. The static MAC address
assignment limits the MAC addresses than can be used or rejected on the assigned port
when using the port security function. For example, assigning the MAC address “00-00-01-
11-22-33” to Port 5 will keep this MAC ID alive on Port 5 but will also limit this MAC address
to work on Port 5 only or reject it from Port 5. It depends on the port security mode setting.