iii
Virtual Networking..................................................................................................................45
Important Considerations .................................................................................................46
Viewing the VLAN Mode................................................................................................... 46
Setting the VLAN Mode ....................................................................................................46
Inter-Switch VLAN or ISVLAN...............................................................................................47
Tag Field Format............................................................................................................... 47
Principles of ISVLAN ........................................................................................................47
Viewing the ISVLAN Mode................................................................................................ 47
Setting a Tagged Port........................................................................................................ 47
Removing a Tagged Port....................................................................................................48
Server Port ........................................................................................................................48
Creating a Server Port....................................................................................................... 48
Removing a Server Port..................................................................................................... 49
VLAN................................................................................................................................. 49
Creating a VLAN............................................................................................................... 49
Viewing VLAN Configuration............................................................................................49
Deleting a VLAN................................................................................................................50
VLAN Management...........................................................................................................51
Viewing the Management Tag........................................................................................... 51
Modifying the Management Tag........................................................................................ 51
Deleting the Management from a VLAN............................................................................51
Creating a VLAN with Port Management .........................................................................52
VLAN, Server-port, Example of Configuration................................................................. 52
Physical configuration schema.......................................................................................... 52
VLAN Server Port Configuration:......................................................................................52
VLAN Configuration .........................................................................................................53
Payroll VLAN Configuration:............................................................................................ 53
Finance VLAN Configuration:........................................................................................... 53
Checking the Configuration:.............................................................................................. 53
Utilities Commands................................................................................................................. 54
Ping Commands.................................................................................................................54
Port mirroring ...................................................................................................................54
Setting the Monitoring Port............................................................................................... 55
Monitoring with: monitor ..................................................................................................55
Saving the Configuration ..................................................................................................55
Stopping Monitoring..........................................................................................................55
Viewing the NVRAM Configuration.................................................................................. 56
Erasing the NVRAM configuration ...................................................................................56
Frame Generator............................................................................................................... 56
Setting the Frame Generator .............................................................................................56
Starting the Frame Generation..........................................................................................56
Stopping the Frame Generation.........................................................................................57
SNMP.......................................................................................................................................57
NBase-Xyplex SNMP Support........................................................................................... 57
SNMP basic configuration................................................................................................. 57
SNMP Community String Commands.............................................................................. 58
Viewing the Community String......................................................................................... 58
Setting the Read or Write Community............................................................................... 58
SNMP Traps...................................................................................................................... 59
Setting Authentication Traps ............................................................................................59