IBM NH2025-10 Switch User Manual


 
iii
Virtual Networking..................................................................................................................45
Important Considerations ................................................................................................. 46
Viewing the VLAN Mode................................................................................................... 46
Setting the VLAN Mode .................................................................................................... 46
Inter-Switch VLAN or ISVLAN...............................................................................................47
Tag Field Format...............................................................................................................47
Principles of ISVLAN ........................................................................................................ 47
Viewing the ISVLAN Mode................................................................................................47
Setting a Tagged Port ........................................................................................................ 47
Removing a Tagged Port.................................................................................................... 48
Server Port ........................................................................................................................48
Creating a Server Port ....................................................................................................... 48
Removing a Server Port .....................................................................................................49
VLAN................................................................................................................................. 49
Creating a VLAN ............................................................................................................... 49
Viewing VLAN Configuration............................................................................................ 49
Deleting a VLAN................................................................................................................ 50
VLAN Management........................................................................................................... 51
Viewing the Management Tag ........................................................................................... 51
Modifying the Management Tag........................................................................................ 51
Deleting the Management from a VLAN............................................................................ 51
Creating a VLAN with Port Management ......................................................................... 52
VLAN, Server-port, Example of Configuration .................................................................52
Physical configuration schema .......................................................................................... 52
VLAN Server Port Configuration:...................................................................................... 52
VLAN Configuration .........................................................................................................53
Payroll VLAN Configuration:............................................................................................ 53
Finance VLAN Configuration:...........................................................................................53
Checking the Configuration:.............................................................................................. 53
Utilities Commands .................................................................................................................54
Ping Commands................................................................................................................. 54
Port mirroring ...................................................................................................................54
Setting the Monitoring Port............................................................................................... 55
Monitoring with: monitor .................................................................................................. 55
Saving the Configuration ..................................................................................................55
Stopping Monitoring.......................................................................................................... 55
Viewing the NVRAM Configuration ..................................................................................56
Erasing the NVRAM configuration ...................................................................................56
Frame Generator............................................................................................................... 56
Setting the Frame Generator ............................................................................................. 56
Starting the Frame Generation.......................................................................................... 56
Stopping the Frame Generation......................................................................................... 57
SNMP.......................................................................................................................................57
NBase-Xyplex SNMP Support...........................................................................................57
SNMP basic configuration.................................................................................................57
SNMP Community String Commands ..............................................................................58
Viewing the Community String .........................................................................................58
Setting the Read or Write Community...............................................................................58
SNMP Traps......................................................................................................................59
Setting Authentication Traps ............................................................................................59