N Ports: Node port node ports; nodes connection points; terminal of Fibre Channel communication
F Port: Fabric port Fibre Port; A switched connection port, the "intermediate port" of two n-Po
STP determines each switch port (specified port: DP; root port: RP; Blocked port: AP)Judgment steps:1. Election of the root switch:Judging object: Select one of all switches running the STP protocol;Judging by: The switch selects
The first two days of the engine room a Cisco2960 of the port often down, at that time let the engine room restart switch also useless, later let change a mouth on the recovery, but over a period of time the port will be down, on-line check may be due to the port-security of the Cisco
Are you worried about the port mode of the switch? below, I will walk into the switch with you and hold the switch port mode completely. I will use an article with a picture and truth to make you no longer confused.
Yigu Switch
1.
(the computer is turned off) the port status of the computer and the switch is still up, but the MAC address under query for this port is empty .Preliminary suspicion causes:Wake-on-lan (computer shutdown, network card is still working)Wake-on-lan, known as WOL, is a power management feature that allows a device to wake the operating system from standby or Hiber
The switch is an important connection "hub" in the LAN, once its working status is unexpected, then all the computers connected to the switch have to "suffer", light is the phenomenon of slow surfing the internet, serious words simply can not go online, for this choice of superior performance, quality of the switch to form some important network, is very critical
In the switched Ethernet environment, the communication between the two workstations is not heard by the third party. In some cases, we may need to do such listening, such as protocol analysis, traffic analysis, intrusion detection. For this we can set the span (switchedportanalyzer Switch Port Analyzer) feature of the Cisco switch, or the early "
Switch Port Security Summary
The most common understanding of port security is based on the MAC address to do the control and management of network traffic, such as MAC address and specific port binding, limit the number of specific ports through the MAC address, or in the specific
three-layer switch port, meaning that the limit is three layer switch port uplink and downlink traffic control, similarly, if the three-layer switch port is not connected to the PC, but a two-layer
Note: Each interface supports only one policy, and one policy can be used for multiple interfaces. Therefore, the download rate limit for the network segment under the port should be defined in the same policy
1. Start QoS on the switch
Switch (config) #mls QoS//Start QoS on the switch
2. Define Access Control List
H3C access switches, such as E126, configure Port bindings, restrict access to authorized users only, configure the following steps:
1, into the interface configuration mode
int e 1/0/24
2. Am User-bindi Port Binding commandBind MAC address and IP address am user-bind mac-addr mac-addressThe AM user-bind command is used to bind the user's MAC address and IP address to the specified port.Undo am User-bind
of the cable to the network cable at one end of the computer, and then test the switch-side network cable with the receiving end, find the end of the signal-connected indicator, set the number tube, and insert the switch in the corresponding position, And make a record, complete a set of network cable matching work, and then the next set of network cable matching work. This approach is appropriate for a sm
Mirror Port configurationMost switches support mirroring technology, which allows for easy troubleshooting of the switch. We call it "mirroring" or "Spanning". Mirroring is the copying of traffic from one port on the switch to the other (mirror port) for monitoring.CISCO3550
allow multiple vlan message not tagged, but trunk Span style= "font-family: ' The song Body '; > Port is allowed only with itself pvid same as vlan The message is not labeled when it is sent;
when Hybrid Port is not tagged VLAN , untagged VLAN only one time, function with Access The same as the port; Hybrid
Mirror Port simply, the flow of one (several) port (source port) of the switch is completely copied, from another port (destination port), so that the network administrator from the destination
A lot of friends are asking Huawei about the image of the switch. Through my existing data and documents, the various models of the switch mirroring methods are summarized. So that friends can easily check! Before the configuration, the basic concept of port mirroring is still a certain understanding!
First, the concept of po
The port of the core switch is mainly a fiber type, but the price of the switch fibre port is very expensive and requires special attention from the user, while the fibre port of the switch is not stacked and can only be used for
How to Use H3C Huawei switches: about port and VLAN technology, this article describes QoS, VLAN technology, and switch port speed limit, port configuration, etc, the author gives a comprehensive introduction to all the relevant knowledge about how to use H3C Huawei switches.
H3C Huawei
packet .. when the vlan id is different from the default vlan id, you can use the command port hybrid vlan-id-list {tagged | untagged} to configure whether the port carries a Tag. Note: local Hybrid port or Trunk Port The default vlan id of the port must be the same as the
Generally, the simplest and most common way to achieve isolation between switch ports is to divide VLAN (Virtual LAN ). However, in specific applications, it is often hoped that some valns can communicate with each other flexibly after port isolation. Generally, L2 switches need to be isolated, and then VLAN mutual access is achieved on the uplinked L3 switches or routers.
In fact, only layer-2 switches can
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.