NEC INTELLIGENT L2 SWITCH N8406-022A User Manual
Page 3
![background image](/manuals/191455/3/background.png)
Accessing the switch 3
Contents
Accessing the switch
Introduction............................................................................................................................................................. 6
Additional references.............................................................................................................................................. 6
Typographical conventions..................................................................................................................................... 6
Management Network ............................................................................................................................................ 7
Connecting through the console port ................................................................................................................ 7
Connecting through Telnet................................................................................................................................ 7
Connecting through Secure Shell ..................................................................................................................... 7
Using the command line interfaces ........................................................................................................................ 8
Configuring an IP interface................................................................................................................................ 8
Using the Browser-based Interface ........................................................................................................................ 9
Using Simple Network Management Protocol ........................................................................................................ 9
SNMP v1.0 ........................................................................................................................................................ 9
SNMP v3.0 ...................................................................................................................................................... 10
Default configuration ....................................................................................................................................... 10
User configuration ........................................................................................................................................... 10
View based configurations .............................................................................................................................. 11
Configuring SNMP trap hosts.......................................................................................................................... 12
Secure access to the switch ................................................................................................................................. 14
Setting allowable source IP address ranges ................................................................................................... 14
RADIUS authentication and authorization....................................................................................................... 14
TACACS+ authentication ................................................................................................................................ 18
Secure Shell and Secure Copy ....................................................................................................................... 23
User access control .............................................................................................................................................. 27
Setting up user IDs.......................................................................................................................................... 27
Ports and trunking
Introduction........................................................................................................................................................... 28
Ports on the switch ............................................................................................................................................... 28
Port trunk groups .................................................................................................................................................. 28
Statistical load distribution............................................................................................................................... 29
Built-in fault tolerance...................................................................................................................................... 29
Before you configure trunks.................................................................................................................................. 29
Trunk group configuration rules............................................................................................................................ 29
Port trunking example........................................................................................................................................... 30
Configuring trunk groups (AOS CLI example)................................................................................................. 31
Configuring trunk groups (BBI example) ......................................................................................................... 32
Configurable Trunk Hash algorithm...................................................................................................................... 34
Link Aggregation Control Protocol........................................................................................................................ 35
Configuring LACP ........................................................................................................................................... 36
VLANs
Introduction........................................................................................................................................................... 37
Overview............................................................................................................................................................... 37
VLANs and port VLAN ID numbers ...................................................................................................................... 37
VLAN numbers................................................................................................................................................ 37
PVID numbers................................................................................................................................................. 37
Viewing and configuring PVIDs....................................................................................................................... 38
VLAN tagging ....................................................................................................................................................... 38
VLANs and IP interfaces ...................................................................................................................................... 41
VLAN topologies and design considerations ........................................................................................................ 41
VLAN configuration rules ................................................................................................................................ 41
Multiple VLANS with tagging ................................................................................................................................ 42
Configuring the example network.................................................................................................................... 43
FDB static entries ................................................................................................................................................. 48
Trunking support for FDB static entries........................................................................................................... 48
Configuring a static FDB entry ........................................................................................................................ 48
Spanning Tree Protocol
Introduction........................................................................................................................................................... 49
Overview............................................................................................................................................................... 49