Configuration, 1 management access overview – Planet Technology WGSW-48040 User Manual
Page 24
User’s Manual of WGSW-24020/WGSW-48040
-24-
3. CONFIGURATION
This chapter explains the methods that you can use to configure management access to the Switch. It describes the types of
management applications and the communication and management protocols that deliver data between your management
device (work-station or personal computer) and the system. It also contains information about port connection options.
This chapter covers the following topics:
Management
Access
Overview
Key
Concepts
Key Guidelines for Implementation
Administration
Console
Access
Web
Management
Access
SNMP
Access
Standards, Protocols, and Related Reading
3.1 Management Access Overview
The Switch gives you the flexibility to access and manage the Switch using any or all of the following methods:
An administration console
Web browser interface
An external SNMP-based network management application
The administration console and Web browser interface support are embedded in the Switch software and are available for
immediate use. Each of these management methods has their own advantages. Table 3-1 compares the three management
methods.
Method
Advantages
Disadvantages
Console
‧
No IP address or subnet needed.
‧
Text-based.
‧
Telnet functionality and HyperTerminal built
into Windows 95/98/NT/2000/ME/XP
operating systems.
‧
Secure.
‧
Must be near switch or use dial-up connection.
‧
Not convenient for remote users.
‧
Modem connection may prove to be unreliable or slow.
Web
Browser
‧
Ideal for configuring the switch remotely.
‧
Compatible with all popular browsers.
‧
Can be accessed from any location.
‧
Most visually appealing.
‧
Security can be compromised (hackers need only know the IP
address and subnet mask).
‧
May encounter lag times on poor connections.
SNMP
Agent
‧
Communicates with switch functions at the
MIB level.
‧
Based on open standards.
‧
Requires SNMP manager software.
‧
Least visually appealing of all three methods.
‧
Some settings require calculations.
‧
Security can be compromised (hackers need only know the
community name).
Table 3-1
Management Methods Comparison