EasyManua.ls Logo

SMC Networks TigerSwitch SMC6128L2 User Manual

SMC Networks TigerSwitch SMC6128L2
606 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #187 background imageLoading...
Page #187 background image
P
ORT
C
ONFIGURATION
3-133
Command Usage
• Input and output rate limits can be enabled or disabled for individual
interfaces.
Command Attribute
• Port/Trunk – Display the port number.
• Input/Output Rate Limit Status– Enables or disables the rate limit
(Default: Enabled)
• Input/Output Rate Limit Level - Sets the rate limit level.
Web - Click Port, Rate Limit, Input/Output Port/Trunk Configuration.
Enable the Rate Limit Status for the required interfaces, set the Rate Limit
Level, and click Apply.
Figure 3-59. Configuring Input Port Rate Limiting
CLI - This example sets the rate limit for input traffic passing through
port 3.
Console(config)#interface ethernet 1/3 4-144
Console(config-if)#rate-limit input 25 4-160
Console(config-if)#

Table of Contents

Other manuals for SMC Networks TigerSwitch SMC6128L2

Questions and Answers:

SMC Networks TigerSwitch SMC6128L2 Specifications

General IconGeneral
ModelSMC6128L2
Port Speed10/100/1000 Mbps
Switching Capacity56 Gbps
MAC Address Table Size8K
Jumbo Frame SupportYes
ManageableYes
Power SupplyInternal
Power Consumption30 W
Weight2.5 kg
TypeSwitch
Jumbo Frame Support Size9216 bytes
Forwarding Rate41.7 Mpps

Summary

Introduction

Key Features

Lists the main features of the switch, including authentication, port configuration, and support for various protocols.

Initial Configuration

Connecting to the Switch

Explains how to establish a connection to the switch via console port or Telnet for initial setup.

Setting an IP Address

Details configuring the switch's IP address, subnet mask, and default gateway for network management access.

Configuring the Switch

Using the Web Interface

Introduces the web-based agent for configuring switch parameters, monitoring ports, and viewing statistics.

Configuring the Secure Shell

Guides on using SSH as a secure replacement for Telnet for remote management access and authentication.

Access Control Lists

Details creating ACLs for packet filtering based on IP/MAC addresses, protocols, and ports for security.

VLAN Configuration

Explains VLANs for organizing network nodes into separate broadcast domains, enhancing security and efficiency.

Command Line Interface (CLI)

Troubleshooting

Related product manuals