EasyManua.ls Logo

SMC Networks TigerSwitch SMC6128L2 User Manual

SMC Networks TigerSwitch SMC6128L2
606 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #102 background imageLoading...
Page #102 background image
C
ONFIGURING
THE
S
WITCH
3-48
Access Mode – Specifies the access rights for the community string:
- Read-Only – Authorized management stations are only able to
retrieve MIB objects.
- Read/Write – Authorized management stations are able to both
retrieve and modify MIB objects.
Web – Click SNMP, Configuration. Add new community strings as
required, select the access rights from the Access Mode drop-down list,
then click Add.
Figure 3-24 Configuring SNMP Community Strings
CLI – The following example adds the string “spiderman” with read/write
access.
Console(config)#snmp-server community spiderman rw 4-127
Console(config)#

Table of Contents

Other manuals for SMC Networks TigerSwitch SMC6128L2

Questions and Answers:

SMC Networks TigerSwitch SMC6128L2 Specifications

General IconGeneral
ModelSMC6128L2
Port Speed10/100/1000 Mbps
Switching Capacity56 Gbps
MAC Address Table Size8K
Jumbo Frame SupportYes
ManageableYes
Power SupplyInternal
Power Consumption30 W
Weight2.5 kg
TypeSwitch
Jumbo Frame Support Size9216 bytes
Forwarding Rate41.7 Mpps

Summary

Introduction

Key Features

Lists the main features of the switch, including authentication, port configuration, and support for various protocols.

Initial Configuration

Connecting to the Switch

Explains how to establish a connection to the switch via console port or Telnet for initial setup.

Setting an IP Address

Details configuring the switch's IP address, subnet mask, and default gateway for network management access.

Configuring the Switch

Using the Web Interface

Introduces the web-based agent for configuring switch parameters, monitoring ports, and viewing statistics.

Configuring the Secure Shell

Guides on using SSH as a secure replacement for Telnet for remote management access and authentication.

Access Control Lists

Details creating ACLs for packet filtering based on IP/MAC addresses, protocols, and ports for security.

VLAN Configuration

Explains VLANs for organizing network nodes into separate broadcast domains, enhancing security and efficiency.

Command Line Interface (CLI)

Troubleshooting

Related product manuals