EasyManua.ls Logo

QTech QSW-2800 series User Manual

QTech QSW-2800 series
415 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #158 background imageLoading...
Page #158 background image
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
144
9. Configure the FLUSH mode once topology changes
18.3 MSTP Example
The following is a typical MSTP application example:
Typical MSTP Application Scenario
Command
Explanation
Global Mode
spanning-tree tcflush {enable| disable| protect}
no spanning-tree tcflush
Enable: the spanning-tree flush once the
topology changes.
Disable: the spanning tree don’t flush
when the topology changes.
Protect: the spanning-tree flush not more
than one time every ten seconds.
The no command restores to default
setting, enable flush once the topology
changes.
Port Mode
spanning-tree tcflush {enable| disable| protect}
no spanning-tree tcflush
Configure the port flush mode.
The no command restores to use the
global configured flush mode.
Switch2
Switch3
Switch4
1
1
2
2
3
5
4
2
3
1
6
7
5
4
6
7
x
x
x
x
x
Switch1

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the QTech QSW-2800 series and is the answer not in the manual?

QTech QSW-2800 series Specifications

General IconGeneral
ModelQSW-2800 series
CategorySwitch
TypeManaged
L3 FeaturesStatic Routing, RIP, OSPF, VRRP
Switching Capacity128Gbps
MAC Address Table16K
Jumbo Frame9K
L2 FeaturesVLAN, Port Mirroring
ManagementWeb, CLI, SNMP
Ports24 x 10/100/1000Base-T, 4 x 10G SFP+
Power SupplyAC 100-240V
Power Consumption30W
Humidity10% to 90% non-condensing
Dimensions440mm x 220mm x 44mm

Summary

Chapter 1 SWITCH MANAGEMENT

1.1 MANAGEMENT OPTIONS

Discusses the switch management options: in-band and out-of-band.

1.2 CLI INTERFACE

Introduces the Command Line Interface, its modes, syntax, and help functions.

Chapter 2 BASIC SWITCH CONFIGURATION

2.1 BASIC CONFIGURATION

Covers commands for entering/exiting admin mode, interface mode, and basic switch settings.

2.3 CONFIGURE SWITCH IP ADDRESSES

Explains IP address configuration methods: Manual, BOOTP, and DHCP.

Chapter 3 CLUSTER CONFIGURATION

3.1 Introduction to cluster network management

Introduces cluster network management concepts and features.

Chapter 4 PORT CONFIGURATION

4.1 Introduction to Port

Introduces port types and their configuration capabilities like speed and duplex.

4.2 Network Port Configuration Task List

Lists the tasks involved in configuring network ports, including combo mode and naming.

Chapter 5 PORT ISOLATION FUNCTION CONFIGURATION

5.1 Introduction to Port Isolation Function

Explains port isolation as an independent function to isolate port traffic within a VLAN.

5.2 Task Sequence of Port Isolation

Outlines the steps for configuring port isolation, including creating groups and adding ports.

Chapter 12 PORT SECURITY

12.1 Introduction to PORT SECURITY

Introduces port security as a MAC address-based mechanism for network access control.

12.2 PORT SECURITY Configuration Task List

Details the basic configuration steps for port security, including MAC addresses and violation modes.

Chapter 16 VLAN CONFIGURATION

16.1 VLAN CONFIGURATION

Introduces VLAN concepts, IEEE 802.1Q, and configuration task lists.

Chapter 17 MAC TABLE CONFIGURATION

17.1 Introduction to MAC Table

Explains the MAC table, static vs. dynamic addresses, and operations.

Chapter 19 QoS CONFIGURATION

19.1 Introduction to QoS

Introduces Quality of Service concepts, terms, and implementation.

Chapter 37 ACL CONFIGURATION

37.1 Introduction to ACL

Explains Access Control Lists for network traffic filtering and security.

Chapter 38 802.1X CONFIGURATION

38.1 Introduction to 802.1x

Introduces 802.1x for port-based network access control and authentication.

Chapter 41 SECURITY FEATURE CONFIGURATION

41.1 Introduction to Security Feature

Introduces security features like DoS protection, IP spoofing, and TCP attacks.

Chapter 42 TACACS+ CONFIGURATION

42.1 Introduction to TACACS+

Introduces TACACS+ as a terminal access controller for network access control.

Chapter 44 SSL CONFIGURATION

44.1 Introduction to SSL

Explains the Secure Socket Layer protocol for secure communication and its basic elements.

Chapter 59 MONITOR AND DEBUG

59.1 Ping

Explains the Ping command for checking network accessibility and basic connectivity.

59.3 Traceroute

Describes the Traceroute command for testing network paths and diagnosing failures.

59.5 Show

Introduces the 'show' command for displaying system, port, and protocol operational information.

59.6 Debug

Explains the use of debug commands for troubleshooting and diagnosing protocol issues.

Related product manuals