9032785 Configuring & Monitoring the Switch 59
Configuring Port Mirroring
You can mirror the traffic being switched on any port for the purposes of
network traffic analysis and connection assurance. When Port Mirroring
is enabled, one port in each group of eight becomes a monitor port for any
one of the other ports within the group. The two por ts must be operating
at the same speed.
To configure port mirroring, do the following:
1. Select Switch Configuration Menu from the Main Menu.
2. Turn the switch port mirroring operation on or off by toggling the Port
Mirroring Enable option (pressing g).
3. Select Mirrored Port for the port to be mirrored (traffic information
source) and enter the number of the port. Press [Enter].
5. Select Transmit Data Mirror Enable to mirror the data bei ng
transmitted out the mirrored port to the mirroring port. Alternatively,
select Receive Data Mirror Enable to mirror the data being received
on the mirrored port to the mirroring port. Only one of these
parameters can be enabled at a given time.
6. Connect a traffic analyzer or RMON probe to the mirroring port.
Downloading a Software Upgrade
You can upgrade the operational software in the ELS100-24TX M switch
without physically opening the switch or being in the same location. The
software storage sector in the flash memory of the switch is
reprogrammable, allowing you to easily download software feature
enhancements and problem fixes to the switch from a local or remote
location.
Software can be downloaded to the switch in two ways:
Via the serial port. This procedure is an out-of-band operation that
copies the software through the serial port to the switch. This
operation takes approximately 10 minutes and requires minimal
configuration.
Via TFTP download. This procedure uses a TFTP server connected
to the network and downloads the software using the TFTP protocol.
A TFTP download is much faster than a serial download, requiring
only a few seconds, and can be used to upgrade an ELS100-24TXM
switch that is not physically proximate. The disadvantage is that this
method requires a TFTP server and additional setup.