Table of Contents
Chapter 1 Introduction ...............................................................................................1-1
Overview.............................................................................................................................. 1-2
Package Checklist.................................................................................................................1-2
Software Features................................................................................................................. 1-2
Chapter 2 Getting Started ..........................................................................................2-1
Serial Console Configuration (115200, None, 8, 1, VT100)................................................ 2-2
Configuration by Telnet Console..........................................................................................2-4
Configuration by Web Browser............................................................................................ 2-7
Disabling Telnet and Browser Access.................................................................................. 2-8
Chapter 3 Featured Functions...................................................................................3-1
Configuring Basic Settings................................................................................................... 3-2
System Identification.................................................................................................3-2
Password................................................................................................................... 3-3
Accessible IP............................................................................................................. 3-4
Port............................................................................................................................3-5
Network.....................................................................................................................3-6
Time.......................................................................................................................... 3-8
Daylight Saving Time............................................................................................... 3-8
System File Update—By Remote TFTP................................................................... 3-9
System File Update—By Local Import/Export....................................................... 3-11
Factory Default........................................................................................................3-11
Using Port Trunking........................................................................................................... 3-12
The Port Trunking Concept..................................................................................... 3-12
Configuring Port Trunking...................................................................................... 3-13
Configuring SNMP............................................................................................................. 3-14
SNMP Read/Write Settings.....................................................................................3-15
Trap Settings........................................................................................................... 3-16
Private MIB information......................................................................................... 3-17
Using Communication Redundancy................................................................................... 3-17
The Turbo Ring Concept......................................................................................... 3-18
Configuring Turbo Ring and Turbo Ring V2.......................................................... 3-22
The STP/RSTP Concept.......................................................................................... 3-27
Configuring STP/RSTP........................................................................................... 3-32
Using Traffic Prioritization.................................................................................................3-34
The Traffic Prioritization Concept.......................................................................... 3-34
Configuring Traffic Prioritization........................................................................... 3-37
Using Virtual LAN............................................................................................................. 3-39
The Virtual LAN (VLAN) Concept........................................................................ 3-39
Sample Applications of VLANs using PT-7728..................................................... 3-41
Configuring Virtual LAN........................................................................................ 3-43
Using Multicast Filtering.................................................................................................... 3-44
The Concept of Multicast Filtering......................................................................... 3-44
Configuring IGMP Snooping.................................................................................. 3-47
Add Static Multicast MAC...................................................................................... 3-49
Configuring GMRP................................................................................................. 3-50
GMRP Table........................................................................................................... 3-50
Using Bandwidth Management.......................................................................................... 3-50