NEC INTELLIGENT L2 SWITCH N8406-022A User Manual

Page 3

Advertising
background image

Accessing the switch 3


Contents

Accessing the switch

Introduction............................................................................................................................................................. 6

Additional references.............................................................................................................................................. 6

Typographical conventions..................................................................................................................................... 6

Management Network ............................................................................................................................................ 7

Connecting through the console port ................................................................................................................ 7

Connecting through Telnet................................................................................................................................ 7

Connecting through Secure Shell ..................................................................................................................... 7

Using the command line interfaces ........................................................................................................................ 8

Configuring an IP interface................................................................................................................................ 8

Using the Browser-based Interface ........................................................................................................................ 9

Using Simple Network Management Protocol ........................................................................................................ 9

SNMP v1.0 ........................................................................................................................................................ 9

SNMP v3.0 ...................................................................................................................................................... 10

Default configuration ....................................................................................................................................... 10

User configuration ........................................................................................................................................... 10

View based configurations .............................................................................................................................. 11

Configuring SNMP trap hosts.......................................................................................................................... 12

Secure access to the switch ................................................................................................................................. 14

Setting allowable source IP address ranges ................................................................................................... 14

RADIUS authentication and authorization....................................................................................................... 14

TACACS+ authentication ................................................................................................................................ 18

Secure Shell and Secure Copy ....................................................................................................................... 23

User access control .............................................................................................................................................. 27

Setting up user IDs.......................................................................................................................................... 27

Ports and trunking

Introduction........................................................................................................................................................... 28

Ports on the switch ............................................................................................................................................... 28

Port trunk groups .................................................................................................................................................. 28

Statistical load distribution............................................................................................................................... 29

Built-in fault tolerance...................................................................................................................................... 29

Before you configure trunks.................................................................................................................................. 29

Trunk group configuration rules............................................................................................................................ 29

Port trunking example........................................................................................................................................... 30

Configuring trunk groups (AOS CLI example)................................................................................................. 31

Configuring trunk groups (BBI example) ......................................................................................................... 32

Configurable Trunk Hash algorithm...................................................................................................................... 34

Link Aggregation Control Protocol........................................................................................................................ 35

Configuring LACP ........................................................................................................................................... 36

VLANs

Introduction........................................................................................................................................................... 37

Overview............................................................................................................................................................... 37

VLANs and port VLAN ID numbers ...................................................................................................................... 37

VLAN numbers................................................................................................................................................ 37

PVID numbers................................................................................................................................................. 37

Viewing and configuring PVIDs....................................................................................................................... 38

VLAN tagging ....................................................................................................................................................... 38

VLANs and IP interfaces ...................................................................................................................................... 41

VLAN topologies and design considerations ........................................................................................................ 41

VLAN configuration rules ................................................................................................................................ 41

Multiple VLANS with tagging ................................................................................................................................ 42

Configuring the example network.................................................................................................................... 43

FDB static entries ................................................................................................................................................. 48

Trunking support for FDB static entries........................................................................................................... 48

Configuring a static FDB entry ........................................................................................................................ 48

Spanning Tree Protocol

Introduction........................................................................................................................................................... 49

Overview............................................................................................................................................................... 49

Advertising