Contents

6.Optimizing Port Usage Through Traffic Control and Port Trunking

Chapter Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2

Viewing Port Status and Configuring Port Parameters . . . . . . . . . . . 6-2Menu: Viewing Port Status and Configuring Port Parameters . . . . . . 6-5 CLI: Viewing Port Status and Configuring Port Parameters . . . . . . . . 6-6 Web: Viewing Port Status and Configuring Port Parameters . . . . . . . 6-9

Port Trunking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10

Switch 2512 and 2524 Port Trunk Features and Operation . . . . . . . . 6-11

Trunk Configuration Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-12

Menu: Viewing and Configuring a Static Trunk Group . . . . . . . . . . . . 6-16 Check the Event Log (page 11-11) to verify that the trunked

ports are operating properly. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-18

CLI: Viewing and Configuring a Static or Dynamic Port Trunk Group . . 6-18

Using the CLI To View Port Trunks . . . . . . . . . . . . . . . . . . . . . . . . 6-18 Using the CLI To Configure a Static or Dynamic Trunk Group . 6-20

Web: Viewing Existing Port Trunk Groups . . . . . . . . . . . . . . . . . . . . . 6-23

Trunk Group Operation Using LACP . . . . . . . . . . . . . . . . . . . . . . . . . . 6-24

Default Port Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-25

LACP Notes and Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-26

Trunk Group Operation Using the “Trunk” Option . . . . . . . . . . . . . . . 6-27

Trunk Operation Using the “FEC” Option . . . . . . . . . . . . . . . . . . . . . . 6-27

How the Switch Lists Trunk Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-28

Outbound Traffic Distribution Across Trunked Links . . . . . . . . . . . . 6-28

7:Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access

Chapter Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3

Using Password Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4 Menu: Setting Manager and Operator passwords . . . . . . . . . . . . . . . . . 7-5 CLI: Setting Manager and Operator Passwords . . . . . . . . . . . . . . . . . . . 7-7 Web: Configuring User Names and Passwords . . . . . . . . . . . . . . . . . . . 7-8

viii