beautypg.com

Configuration, 1 management access overview – Planet Technology WGSW-48040 User Manual

Page 24

background image

User’s Manual of WGSW-24020/WGSW-48040

-24-

3. CONFIGURATION

This chapter explains the methods that you can use to configure management access to the Switch. It describes the types of

management applications and the communication and management protocols that deliver data between your management

device (work-station or personal computer) and the system. It also contains information about port connection options.

This chapter covers the following topics:

ƒ

Management

Access

Overview

ƒ

Key

Concepts

ƒ

Key Guidelines for Implementation

ƒ

Administration

Console

Access

ƒ

Web

Management

Access

ƒ

SNMP

Access

ƒ

Standards, Protocols, and Related Reading

3.1 Management Access Overview

The Switch gives you the flexibility to access and manage the Switch using any or all of the following methods:

ƒ

An administration console

ƒ

Web browser interface

ƒ

An external SNMP-based network management application

The administration console and Web browser interface support are embedded in the Switch software and are available for

immediate use. Each of these management methods has their own advantages. Table 3-1 compares the three management

methods.

Method

Advantages

Disadvantages

Console

No IP address or subnet needed.

Text-based.

Telnet functionality and HyperTerminal built

into Windows 95/98/NT/2000/ME/XP

operating systems.

Secure.

Must be near switch or use dial-up connection.

Not convenient for remote users.

Modem connection may prove to be unreliable or slow.

Web

Browser

Ideal for configuring the switch remotely.

Compatible with all popular browsers.

Can be accessed from any location.

Most visually appealing.

Security can be compromised (hackers need only know the IP

address and subnet mask).

May encounter lag times on poor connections.

SNMP

Agent

Communicates with switch functions at the

MIB level.

Based on open standards.

Requires SNMP manager software.

Least visually appealing of all three methods.

Some settings require calculations.

Security can be compromised (hackers need only know the

community name).

Table 3-1

Management Methods Comparison

This manual is related to the following products: