搜索
登錄
注冊
網(wǎng)絡優(yōu)化工程師招聘專欄
4G/LTE通信工程師最新職位列表
通信實習生/應屆生招聘職位
MSCBSC 移動通信論壇
»
通信設備廠商技術區(qū)
»
諾基亞技術資料區(qū)
» ESB20-A (version3.5)10/100 Mbit Ethernet Switch
討論帖
資料帖
投票帖
懸賞帖
閱讀:
1846
回復:
0
關注樓主
ESB20-A (version3.5)10/100 Mbit Ethernet Switch
windrainweiyu
入門會員
發(fā)短消息
關注Ta
積分 10
帖子 2
威望 11159 個
禮品券 0 個
專家指數(shù) 0
注冊 2011-1-4
專業(yè)方向 gsm
回答問題數(shù)
0
回答被采納數(shù)
0
回答采納率
0%
#1
大
中
小
使用道具
發(fā)表于 2012-01-13 16:27:07
只看樓主
【資料名稱】:ESB20-A 10/100 Mbit Ethernet Switch
【資料作者】:nokia
【資料日期】:2004
【資料語言】:英文
【資料格式】:PDF
【資料目錄和簡介】:
PREFACE..................................................................................................................................................A
CONVENTIONS USED IN THIS GUIDE ........................................................................................A
ACRONYMS USED IN THIS GUIDE.............................................................................................. B
SUMMARY OF VERSION 3.5.0 FEATURES ................................................................................. C
1.INTRODUCTION..............................................................................................................................1
SWITCH OVERVIEW........................................................................................................................1
SPECIFICATIONS..............................................................................................................................1
2.GETTING STARTED .......................................................................................................................4
OVERVIEW........................................................................................................................................4
UNPACKING......................................................................................................................................4
FRONT PANEL ..................................................................................................................................4
USING THE CLI TO CONFIGURE THE SWITCH..........................................................................5
PLANNING THE CONFIGURATION ..............................................................................................7
BASIC CLI OPERATING CONVENTIONS .....................................................................................7
SPECIAL KEYS..................................................................................................................................7
CLI MODES........................................................................................................................................8
MESSAGES ........................................................................................................................................9
GETTING SYSTEM HELP ..............................................................................................................10
USING THE LIST COMMAND.......................................................................................................10
COMMAND HISTORY....................................................................................................................10
USING TELNET...............................................................................................................................10
CONFIGURING THE DEVICE'S IP PARAMETERS.....................................................................11
GENERAL COMMANDS ................................................................................................................12
VIEW MODE AND PRIVILEGED MODE .....................................................................................12
CONFIGURE MODE........................................................................................................................15
3.CONFIGURING A TELNET CONNECTION .............................................................................18
INTRODUCTION.............................................................................................................................18
CONFIGURING A TELNET SESSION...........................................................................................18
SWITCHING BETWEEN SESSIONS..............................................................................................22
4.USER PRIVILEGE LEVELS .........................................................................................................23
INTRODUCTION.............................................................................................................................23
SUPPORTED STANDARDS, MIBS AND RFCS............................................................................25
DEFAULT USER PRIVILEGE LEVELS CONFIGURATION.......................................................25
CONFIGURING AND DISPLAYING USER PRIVILEGES...........................................................25
5.ETHERNET INTERFACE CONFIGURATION..........................................................................28
CONFIGURING AND DISPLAYING PHYSICAL INTERFACE SETTINGS ..............................28
6.PORT SECURITY...........................................................................................................................39
INTRODUCTION.............................................................................................................................39
CONFIGURING AND DISPLAYING PORT SECURITY SETTINGS ..........................................39
7.LINK AGGREGATION GROUPS (LAGS) ..................................................................................43
INTRODUCTION.............................................................................................................................43
FEATURE OVERVIEW...................................................................................................................44
SUPPORTED STANDARDS, MIBS AND RFCS............................................................................46
PREREQUISITES .............................................................................................................................47
DEFAULT LINK AGGREGATION CONFIGURATION...............................................................47
CONFIGURING AND DISPLAYING LAGS..................................................................................48
CONFIGURATION EXAMPLES.....................................................................................................53
8.TRAFFIC MONITORING..............................................................................................................62
INTRODUCTION.............................................................................................................................62
THE TRAFFIC MONITORING CLI COMMANDS........................................................................62
9.RESILIENT LINK...........................................................................................................................65
INTRODUCTION.............................................................................................................................65
CONFIGURING AND DISPLAYING A RESILIENT LINK..........................................................65
10.SNMP SERVER CONFIGURATION............................................................................................73
INTRODUCTION.............................................................................................................................73
CONFIGURING AND DISPLAYING THE SNMP SERVER SETTINGS.....................................73
11.FORWARDING DATABASE (FDB) .............................................................................................95
INTRODUCTION.............................................................................................................................95
MAC-TABLE ENTRY TYPES.........................................................................................................95
HOW ENTRIES ARE ADDED TO THE FDB.................................................................................96
CONFIGURING AND DISPLAYING FDB SETTINGS.................................................................96
DESCRIPTION OF COMMANDS...................................................................................................96
12.SPANNING TREE PROTOCOL (STP).......................................................................................101
INTRODUCTION...........................................................................................................................101
CONFIGURING AND DEBUGGING STP....................................................................................101
DISPLAYING PORT SPANNING-TREE TOPOLOGY SETTINGS............................................108
13.RAPID SPANNING TREE PROTOCOL (RSTP) ......................................................................110
INTRODUCTION...........................................................................................................................110
SELECTION OF THE ROOT BRIDGE AND ROOT PORT.........................................................111
SELECTION OF THE DESIGNATED BRIDGE AND DESIGNATED PORT............................111
CHANGING PORT STATES .........................................................................................................112
CONFIGURING AND DEBUGGING RSTP .................................................................................113
DISPLAYING PORT RAPID-SPANNING-TREE TOPOLOGY SETTINGS...............................123
14.MULTIPLE SPANNING TREE PROTOCOL (MSTP).............................................................126
INTRODUCTION...........................................................................................................................126
FEATURE OVERVIEW.................................................................................................................127
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................134
PREREQUISITES ...........................................................................................................................134
DEFAULT MSTP CONFIGURATION..........................................................................................135
CONFIGURING AND DISPLAYING MSTP................................................................................136
CONFIGURATION EXAMPLES...................................................................................................159
15.GARP MULTICAST REGISTRATION PROTOCOL (GMRP) ..............................................172
INTRODUCTION...........................................................................................................................172
FEATURE OVERVIEW.................................................................................................................172
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................173
PREREQUISITES ...........................................................................................................................173
DEFAULT GMRP CONFIGURATION.........................................................................................173
CONFIGURING AND DISPLAYING GMRP ...............................................................................174
RELATED COMMANDS...............................................................................................................175
16.GARP VLAN REGISTRATION PROTOCOL (GVRP)............................................................176
INTRODUCTION...........................................................................................................................176
CONFIGURING AND DISPLAYING GVRP SETTINGS............................................................176
17.VIRTUAL LANS (VLANS)...........................................................................................................180
INTRODUCTION...........................................................................................................................180
BENEFITS OF USING VLANS .....................................................................................................180
VLAN TYPES.................................................................................................................................180
USES OF TAGGED VLANS..........................................................................................................181
ASSIGNING A VLAN TAG...........................................................................................................182
DESCRIPTION OF COMMANDS.................................................................................................183
18.QUALITY OF SERVICE (QOS) ..................................................................................................197
INTRODUCTION...........................................................................................................................197
DESCRIPTION OF COMMANDS.................................................................................................198
ASSIGNING QOS RULES TO TRAFFIC......................................................................................199
19.DHCP CLIENT ..............................................................................................................................204
DHCP OVERVIEW........................................................................................................................204
THE ESB20-A STARTUP PROCESS ............................................................................................205
THE DHCP NEGOTIATION PROCESS........................................................................................208
CONFIGURING THE DHCP CLIENT ..........................................................................................209
CONFIGURATION EXAMPLE.....................................................................................................211
20.IGMP SNOOPING.........................................................................................................................213
INTRODUCTION...........................................................................................................................213
JOINING A MULTICAST GROUP ...............................................................................................213
LEAVING A MULTICAST GROUP .............................................................................................213
IMMEDIATE-LEAVE PROCESSING...........................................................................................214
IGMP SNOOPING COMMANDS..................................................................................................214
21.MULTICAST VLAN REGISTRATION (MVR) ........................................................................225
INTRODUCTION...........................................................................................................................225
DESCRIPTION OF COMMANDS.................................................................................................226
22.TRANSPARENT LAN SERVICES (TLS)...................................................................................235
FEATURE OVERVIEW.................................................................................................................235
DESCRIPTION OF COMMANDS.................................................................................................236
23.SOFTWARE UPGRADE AND REBOOT OPTIONS................................................................240
UPGRADE AND REBOOT OPTIONS OVERVIEW....................................................................240
DESCRIPTION OF COMMANDS.................................................................................................240
24.FILE SYSTEM FOR CONFIGURATION SCRIPT FILES ......................................................249
INTRODUCTION...........................................................................................................................249
SCRIPT-FILE COMMANDS..........................................................................................................249
25.STATUS MONITORING, STATISTICS AND GENERAL COMMANDS.............................256
OVERVIEW....................................................................................................................................256
DESCRIPTION OF COMMANDS.................................................................................................257
26.REMOTE MONITORING............................................................................................................270
INTRODUCTION...........................................................................................................................270
FEATURE OVERVIEW.................................................................................................................270
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................271
STATISTICS MONITORING ........................................................................................................272
RMON ALARMS............................................................................................................................273
27.LOGGING SYSTEM TRAP MESSAGES TO THE NVRAM..................................................278
INTRODUCTION...........................................................................................................................278
CONFIGURING THE TRAP LEVEL FOR STORED SYSTEM MESSAGES.............................278
CONFIGURING THE MESSAGE FORMAT................................................................................278
NVRAM SYSTEM-TRAP LOGGING COMMANDS...................................................................279
28.NVRAM CONFIGURATION HISTORY....................................................................................282
INTRODUCTION...........................................................................................................................282
HISTORY LOG FORMAT AND GENERATION.........................................................................282
CONFIGURING HISTORY SETTINGS........................................................................................282
DISPLAYING THE CONFIGURATION HISTORY.....................................................................283
29.NTP CLIENT DESCRIPTION.....................................................................................................286
INTRODUCTION...........................................................................................................................286
THE NTP TIMESERVER COMMANDS.......................................................................................286
WHY USE NTP PROTOCOL ? ......................................................................................................287
CONFIGURING AND DISPLAYING NTP SERVER SETTINGS...............................................287
MD5 AUTHENTICATION.............................................................................................................289
RUNNING THE NTP SERVER .....................................................................................................290
EXAMPLES ....................................................................................................................................291
CONFIGURATION EXAMPLE.....................................................................................................291
CONFIGURING DAYLIGHT SAVING TIME (DST) ..................................................................292
30.REMOTE AUTHENTICATION DIAL-IN USER SERVICE (RADIUS) ................................295
INTRODUCTION...........................................................................................................................295
BINOS RADIUS FEATURES ........................................................................................................295
DESCRIPTION OF COMMANDS.................................................................................................296
USING RADIUS TO CONFIGURE LOGIN AUTHENTICATION..............................................298
A RADIUS CONFIGURATION EXAMPLE.................................................................................299
31.SECURE SHELL (SSH) ................................................................................................................301
INTRODUCTION...........................................................................................................................301
SOME SECURITY CONSIDERATIONS ......................................................................................301
COMMANDS FOR MANAGING THE SSH SERVER. ................................................................302
SUPPORTED CLIENTS.................................................................................................................303
SUPPORTED STANDARDS..........................................................................................................303
32.BIST (BUILT-IN SELF TEST) .....................................................................................................304
OVERVIEW....................................................................................................................................304
STARTUP EXECUTION OF BIST................................................................................................304
BIST STATUS INDICATION........................................................................................................305
BIST COMMANDS ........................................................................................................................305
33.DNS RESOLVER...........................................................................................................................308
INTRODUCTION...........................................................................................................................308
FEATURE OVERVIEW.................................................................................................................308
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................309
DEFAULT DNS RESOLVER CONFIGURATION.......................................................................310
CONFIGURING AND DISPLAYING DNS RESOLVER.............................................................310
CONFIGURATION EXAMPLE.....................................................................................................311
RELATED COMMANDS...............................................................................................................311
APPENDIX: BOOT LOADER COMMANDS........................................................................................ I
OVERVIEW.........................................................................................................................................I
COMMANDS SUMMARY.................................................................................................................I
附件下載列表:
2012-1-13 16:27:07 下載次數(shù): 1
Nokia ESA24(3.5).pdf
(2.19 MB)
掃碼關注5G通信官方公眾號,免費領取以下5G精品資料
1、回復“
YD5GAI
”免費領取《
中國移動:5G網(wǎng)絡AI應用典型場景技術解決方案白皮書
》
2、回復“
5G6G
”免費領取《
5G_6G毫米波測試技術白皮書-2022_03-21
》
3、回復“
YD6G
”免費領取《
中國移動:6G至簡無線接入網(wǎng)白皮書
》
4、回復“
LTBPS
”免費領取《
《中國聯(lián)通5G終端白皮書》
》
5、回復“
ZGDX
”免費領取《
中國電信5G NTN技術白皮書
》
6、回復“
TXSB
”免費領取《
通信設備安裝工程施工工藝圖解
》
7、回復“
YDSL
”免費領取《
中國移動算力并網(wǎng)白皮書
》
8、回復“
5GX3
”免費領取《
R16 23501-g60 5G的系統(tǒng)架構1
》
對本帖內(nèi)容的看法?
我要點評
作者的更多帖子
chinese VAD
2012-05-23
[
充值威望,立即自動到帳
] [
VIP貴賓權限+威望套餐
] 另有大量優(yōu)惠贈送活動,請光臨充值中心
充值擁有大量的威望和最高的下載權限,下載站內(nèi)資料無憂
討論帖
資料帖
投票帖
懸賞帖
快速回復主題
標題
內(nèi)容
上傳資料請點左側【添加附件】
(勾選中文件為要刪除文件)
Nokia ESA24(3.5).pdf
您即將訪問其它網(wǎng)站
關閉
您即將訪問的地址是其它網(wǎng)站的內(nèi)容,MSCBSC將不再對其安全性和可靠性負責,請自行判斷是否繼續(xù)前往
繼續(xù)訪問
取消訪問,關閉
當前時區(qū) GMT+8, 現(xiàn)在時間是 2025-02-21 04:51:32
渝ICP備11001752號
Copyright @ 2006-2016 mscbsc.com
本站統(tǒng)一服務郵箱:mscbsc@163.com
Processed in 0.623427 second(s), 16 queries , Gzip enabled
TOP
清除 Cookies
-
聯(lián)系我們
-
移動通信網(wǎng)
-
移動通信論壇
-
通信招聘網(wǎng)
-
Archiver