
viii
Contents
6. Optimizing Port Usage Through Traffic Control and
Port Trunking
Chapter Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2
Viewing Port Status and Configuring Port Parameters . . . . . . . . . . . 6-2
Menu: Viewing Port Status and Configuring Port Parameters . . . . . . 6-5
CLI: Viewing Port Status and Configuring Port Parameters . . . . . . . . 6-6
Web: Viewing Port Status and Configuring Port Parameters . . . . . . . 6-9
Port Trunking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10
Switch 2512 and 2524 Port Trunk Features and Operation . . . . . . . . 6-11
Trunk Configuration Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-12
Menu: Viewing and Configuring a Static Trunk Group . . . . . . . . . . . . 6-16
Check the Event Log (page 11-11) to verify that the trunked
ports are operating properly. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-18
CLI: Viewing and Configuring a Static or Dynamic Port Trunk Group . .
6-18
Using the CLI To View Port Trunks . . . . . . . . . . . . . . . . . . . . . . . . 6-18
Using the CLI To Configure a Static or Dynamic Trunk Group . 6-20
Web: Viewing Existing Port Trunk Groups . . . . . . . . . . . . . . . . . . . . . 6-23
Trunk Group Operation Using LACP . . . . . . . . . . . . . . . . . . . . . . . . . . 6-24
Default Port Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-25
LACP Notes and Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-26
Trunk Group Operation Using the “Trunk” Option . . . . . . . . . . . . . . . 6-27
Trunk Operation Using the “FEC” Option . . . . . . . . . . . . . . . . . . . . . . 6-27
How the Switch Lists Trunk Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-28
Outbound Traffic Distribution Across Trunked Links . . . . . . . . . . . . 6-28
7: Using Passwords, Port Security, and Authorized IP
Managers To Protect Against Unauthorized Access
Chapter Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Using Password Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4
Menu: Setting Manager and Operator passwords . . . . . . . . . . . . . . . . . 7-5
CLI: Setting Manager and Operator Passwords . . . . . . . . . . . . . . . . . . . 7-7
Web: Configuring User Names and Passwords . . . . . . . . . . . . . . . . . . . 7-8