MSCBSC 移動通信論壇
搜索
登錄注冊
網(wǎng)絡優(yōu)化工程師招聘專欄 4G/LTE通信工程師最新職位列表 通信實習生/應屆生招聘職位

  • 閱讀:1846
  • 回復:0
ESB20-A (version3.5)10/100 Mbit Ethernet Switch
windrainweiyu
入門會員



 發(fā)短消息    關注Ta 

積分 10
帖子 2
威望 11159 個
禮品券 0 個
專家指數(shù) 0
注冊 2011-1-4
專業(yè)方向  gsm
回答問題數(shù) 0
回答被采納數(shù) 0
回答采納率 0%
 
發(fā)表于 2012-01-13 16:27:07  只看樓主 
【資料名稱】:ESB20-A 10/100 Mbit Ethernet Switch

【資料作者】:nokia

【資料日期】:2004

【資料語言】:英文

【資料格式】:PDF

【資料目錄和簡介】:

PREFACE..................................................................................................................................................A
CONVENTIONS USED IN THIS GUIDE ........................................................................................A
ACRONYMS USED IN THIS GUIDE.............................................................................................. B
SUMMARY OF VERSION 3.5.0 FEATURES ................................................................................. C
1.INTRODUCTION..............................................................................................................................1
SWITCH OVERVIEW........................................................................................................................1
SPECIFICATIONS..............................................................................................................................1
2.GETTING STARTED .......................................................................................................................4
OVERVIEW........................................................................................................................................4
UNPACKING......................................................................................................................................4
FRONT PANEL ..................................................................................................................................4
USING THE CLI TO CONFIGURE THE SWITCH..........................................................................5
PLANNING THE CONFIGURATION ..............................................................................................7
BASIC CLI OPERATING CONVENTIONS .....................................................................................7
SPECIAL KEYS..................................................................................................................................7
CLI MODES........................................................................................................................................8
MESSAGES ........................................................................................................................................9
GETTING SYSTEM HELP ..............................................................................................................10
USING THE LIST COMMAND.......................................................................................................10
COMMAND HISTORY....................................................................................................................10
USING TELNET...............................................................................................................................10
CONFIGURING THE DEVICE'S IP PARAMETERS.....................................................................11
GENERAL COMMANDS ................................................................................................................12
VIEW MODE AND PRIVILEGED MODE .....................................................................................12
CONFIGURE MODE........................................................................................................................15
3.CONFIGURING A TELNET CONNECTION .............................................................................18
INTRODUCTION.............................................................................................................................18
CONFIGURING A TELNET SESSION...........................................................................................18
SWITCHING BETWEEN SESSIONS..............................................................................................22
4.USER PRIVILEGE LEVELS .........................................................................................................23
INTRODUCTION.............................................................................................................................23
SUPPORTED STANDARDS, MIBS AND RFCS............................................................................25
DEFAULT USER PRIVILEGE LEVELS CONFIGURATION.......................................................25
CONFIGURING AND DISPLAYING USER PRIVILEGES...........................................................25
5.ETHERNET INTERFACE CONFIGURATION..........................................................................28
CONFIGURING AND DISPLAYING PHYSICAL INTERFACE SETTINGS ..............................28
6.PORT SECURITY...........................................................................................................................39
INTRODUCTION.............................................................................................................................39
CONFIGURING AND DISPLAYING PORT SECURITY SETTINGS ..........................................39
7.LINK AGGREGATION GROUPS (LAGS) ..................................................................................43
INTRODUCTION.............................................................................................................................43
FEATURE OVERVIEW...................................................................................................................44
SUPPORTED STANDARDS, MIBS AND RFCS............................................................................46
PREREQUISITES .............................................................................................................................47

DEFAULT LINK AGGREGATION CONFIGURATION...............................................................47
CONFIGURING AND DISPLAYING LAGS..................................................................................48
CONFIGURATION EXAMPLES.....................................................................................................53
8.TRAFFIC MONITORING..............................................................................................................62
INTRODUCTION.............................................................................................................................62
THE TRAFFIC MONITORING CLI COMMANDS........................................................................62
9.RESILIENT LINK...........................................................................................................................65
INTRODUCTION.............................................................................................................................65
CONFIGURING AND DISPLAYING A RESILIENT LINK..........................................................65
10.SNMP SERVER CONFIGURATION............................................................................................73
INTRODUCTION.............................................................................................................................73
CONFIGURING AND DISPLAYING THE SNMP SERVER SETTINGS.....................................73
11.FORWARDING DATABASE (FDB) .............................................................................................95
INTRODUCTION.............................................................................................................................95
MAC-TABLE ENTRY TYPES.........................................................................................................95
HOW ENTRIES ARE ADDED TO THE FDB.................................................................................96
CONFIGURING AND DISPLAYING FDB SETTINGS.................................................................96
DESCRIPTION OF COMMANDS...................................................................................................96
12.SPANNING TREE PROTOCOL (STP).......................................................................................101
INTRODUCTION...........................................................................................................................101
CONFIGURING AND DEBUGGING STP....................................................................................101
DISPLAYING PORT SPANNING-TREE TOPOLOGY SETTINGS............................................108
13.RAPID SPANNING TREE PROTOCOL (RSTP) ......................................................................110
INTRODUCTION...........................................................................................................................110
SELECTION OF THE ROOT BRIDGE AND ROOT PORT.........................................................111
SELECTION OF THE DESIGNATED BRIDGE AND DESIGNATED PORT............................111
CHANGING PORT STATES .........................................................................................................112
CONFIGURING AND DEBUGGING RSTP .................................................................................113
DISPLAYING PORT RAPID-SPANNING-TREE TOPOLOGY SETTINGS...............................123
14.MULTIPLE SPANNING TREE PROTOCOL (MSTP).............................................................126
INTRODUCTION...........................................................................................................................126
FEATURE OVERVIEW.................................................................................................................127
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................134
PREREQUISITES ...........................................................................................................................134
DEFAULT MSTP CONFIGURATION..........................................................................................135
CONFIGURING AND DISPLAYING MSTP................................................................................136
CONFIGURATION EXAMPLES...................................................................................................159
15.GARP MULTICAST REGISTRATION PROTOCOL (GMRP) ..............................................172
INTRODUCTION...........................................................................................................................172
FEATURE OVERVIEW.................................................................................................................172
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................173
PREREQUISITES ...........................................................................................................................173
DEFAULT GMRP CONFIGURATION.........................................................................................173
CONFIGURING AND DISPLAYING GMRP ...............................................................................174
RELATED COMMANDS...............................................................................................................175
16.GARP VLAN REGISTRATION PROTOCOL (GVRP)............................................................176
INTRODUCTION...........................................................................................................................176
CONFIGURING AND DISPLAYING GVRP SETTINGS............................................................176
17.VIRTUAL LANS (VLANS)...........................................................................................................180
INTRODUCTION...........................................................................................................................180

BENEFITS OF USING VLANS .....................................................................................................180
VLAN TYPES.................................................................................................................................180
USES OF TAGGED VLANS..........................................................................................................181
ASSIGNING A VLAN TAG...........................................................................................................182
DESCRIPTION OF COMMANDS.................................................................................................183
18.QUALITY OF SERVICE (QOS) ..................................................................................................197
INTRODUCTION...........................................................................................................................197
DESCRIPTION OF COMMANDS.................................................................................................198
ASSIGNING QOS RULES TO TRAFFIC......................................................................................199
19.DHCP CLIENT ..............................................................................................................................204
DHCP OVERVIEW........................................................................................................................204
THE ESB20-A STARTUP PROCESS ............................................................................................205
THE DHCP NEGOTIATION PROCESS........................................................................................208
CONFIGURING THE DHCP CLIENT ..........................................................................................209
CONFIGURATION EXAMPLE.....................................................................................................211
20.IGMP SNOOPING.........................................................................................................................213
INTRODUCTION...........................................................................................................................213
JOINING A MULTICAST GROUP ...............................................................................................213
LEAVING A MULTICAST GROUP .............................................................................................213
IMMEDIATE-LEAVE PROCESSING...........................................................................................214
IGMP SNOOPING COMMANDS..................................................................................................214
21.MULTICAST VLAN REGISTRATION (MVR) ........................................................................225
INTRODUCTION...........................................................................................................................225
DESCRIPTION OF COMMANDS.................................................................................................226
22.TRANSPARENT LAN SERVICES (TLS)...................................................................................235
FEATURE OVERVIEW.................................................................................................................235
DESCRIPTION OF COMMANDS.................................................................................................236
23.SOFTWARE UPGRADE AND REBOOT OPTIONS................................................................240
UPGRADE AND REBOOT OPTIONS OVERVIEW....................................................................240
DESCRIPTION OF COMMANDS.................................................................................................240
24.FILE SYSTEM FOR CONFIGURATION SCRIPT FILES ......................................................249
INTRODUCTION...........................................................................................................................249
SCRIPT-FILE COMMANDS..........................................................................................................249
25.STATUS MONITORING, STATISTICS AND GENERAL COMMANDS.............................256
OVERVIEW....................................................................................................................................256
DESCRIPTION OF COMMANDS.................................................................................................257
26.REMOTE MONITORING............................................................................................................270
INTRODUCTION...........................................................................................................................270
FEATURE OVERVIEW.................................................................................................................270
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................271
STATISTICS MONITORING ........................................................................................................272
RMON ALARMS............................................................................................................................273
27.LOGGING SYSTEM TRAP MESSAGES TO THE NVRAM..................................................278
INTRODUCTION...........................................................................................................................278
CONFIGURING THE TRAP LEVEL FOR STORED SYSTEM MESSAGES.............................278
CONFIGURING THE MESSAGE FORMAT................................................................................278
NVRAM SYSTEM-TRAP LOGGING COMMANDS...................................................................279
28.NVRAM CONFIGURATION HISTORY....................................................................................282
INTRODUCTION...........................................................................................................................282
HISTORY LOG FORMAT AND GENERATION.........................................................................282
CONFIGURING HISTORY SETTINGS........................................................................................282
DISPLAYING THE CONFIGURATION HISTORY.....................................................................283
29.NTP CLIENT DESCRIPTION.....................................................................................................286
INTRODUCTION...........................................................................................................................286
THE NTP TIMESERVER COMMANDS.......................................................................................286
WHY USE NTP PROTOCOL ? ......................................................................................................287
CONFIGURING AND DISPLAYING NTP SERVER SETTINGS...............................................287
MD5 AUTHENTICATION.............................................................................................................289
RUNNING THE NTP SERVER .....................................................................................................290
EXAMPLES ....................................................................................................................................291
CONFIGURATION EXAMPLE.....................................................................................................291
CONFIGURING DAYLIGHT SAVING TIME (DST) ..................................................................292
30.REMOTE AUTHENTICATION DIAL-IN USER SERVICE (RADIUS) ................................295
INTRODUCTION...........................................................................................................................295
BINOS RADIUS FEATURES ........................................................................................................295
DESCRIPTION OF COMMANDS.................................................................................................296
USING RADIUS TO CONFIGURE LOGIN AUTHENTICATION..............................................298
A RADIUS CONFIGURATION EXAMPLE.................................................................................299
31.SECURE SHELL (SSH) ................................................................................................................301
INTRODUCTION...........................................................................................................................301
SOME SECURITY CONSIDERATIONS ......................................................................................301
COMMANDS FOR MANAGING THE SSH SERVER. ................................................................302
SUPPORTED CLIENTS.................................................................................................................303
SUPPORTED STANDARDS..........................................................................................................303
32.BIST (BUILT-IN SELF TEST) .....................................................................................................304
OVERVIEW....................................................................................................................................304
STARTUP EXECUTION OF BIST................................................................................................304
BIST STATUS INDICATION........................................................................................................305
BIST COMMANDS ........................................................................................................................305
33.DNS RESOLVER...........................................................................................................................308
INTRODUCTION...........................................................................................................................308
FEATURE OVERVIEW.................................................................................................................308
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................309
DEFAULT DNS RESOLVER CONFIGURATION.......................................................................310
CONFIGURING AND DISPLAYING DNS RESOLVER.............................................................310
CONFIGURATION EXAMPLE.....................................................................................................311
RELATED COMMANDS...............................................................................................................311
APPENDIX: BOOT LOADER COMMANDS........................................................................................ I
OVERVIEW.........................................................................................................................................I
COMMANDS SUMMARY.................................................................................................................I

查看積分策略說明
附件下載列表:
2012-1-13 16:27:07  下載次數(shù): 1
Nokia ESA24(3.5).pdf (2.19 MB)
掃碼關注5G通信官方公眾號,免費領取以下5G精品資料
  • 1、回復“YD5GAI”免費領取《中國移動:5G網(wǎng)絡AI應用典型場景技術解決方案白皮書
  • 2、回復“5G6G”免費領取《5G_6G毫米波測試技術白皮書-2022_03-21
  • 3、回復“YD6G”免費領取《中國移動:6G至簡無線接入網(wǎng)白皮書
  • 4、回復“LTBPS”免費領取《《中國聯(lián)通5G終端白皮書》
  • 5、回復“ZGDX”免費領取《中國電信5G NTN技術白皮書
  • 6、回復“TXSB”免費領取《通信設備安裝工程施工工藝圖解
  • 7、回復“YDSL”免費領取《中國移動算力并網(wǎng)白皮書
  • 8、回復“5GX3”免費領取《 R16 23501-g60 5G的系統(tǒng)架構1
  • 對本帖內(nèi)容的看法? 我要點評


    作者的更多帖子
     
    [充值威望,立即自動到帳] [VIP貴賓權限+威望套餐] 另有大量優(yōu)惠贈送活動,請光臨充值中心
    充值擁有大量的威望和最高的下載權限,下載站內(nèi)資料無憂

    快速回復主題    
    標題
    內(nèi)容
     上傳資料請點左側【添加附件】

    (勾選中文件為要刪除文件)


    當前時區(qū) GMT+8, 現(xiàn)在時間是 2025-02-21 04:51:32
    渝ICP備11001752號  Copyright @ 2006-2016 mscbsc.com  本站統(tǒng)一服務郵箱:mscbsc@163.com

    Processed in 0.623427 second(s), 16 queries , Gzip enabled
    TOP
    清除 Cookies - 聯(lián)系我們 - 移動通信網(wǎng) - 移動通信論壇 - 通信招聘網(wǎng) - Archiver