EasyManua.ls Logo

QTech QSW-2800 series User Manual

QTech QSW-2800 series
415 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #119 background imageLoading...
Page #119 background image
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
105
2. Set or delete VLAN name
3. Assigning Switch ports for VLAN
4. Set the Switch Port Type
5. Set Trunk port
6. Set Access port
Command
Explanation
VLAN Mode
name <vlan-name>
no name
Set or delete VLAN name.
Command
Explanation
VLAN Mode
switchport interface <interface-list>
no switchport interface <interface-list>
Assign Switch ports to VLAN.
Command
Explanation
Port Mode
switchport mode {trunk | access |
hybrid}
Set the current port as Trunk, Access or Hybrid
port.
Command
Explanation
Port Mode
switchport trunk allowed vlan {WORD |
all | add WORD | except WORD | remove
WORD}
no switchport trunk allowed vlan
Set/delete VLAN allowed to be crossed by
Trunk. The “no” command restores the default
setting.
switchport trunk native vlan <vlan-id>
no switchport trunk native vlan
Set/delete PVID for Trunk port.
Command
Explanation
Port Mode
switchport access vlan <vlan-id>
no switchport access vlan
Add the current port to the specified VLAN.
The “no” command restores the default setting.

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the QTech QSW-2800 series and is the answer not in the manual?

QTech QSW-2800 series Specifications

General IconGeneral
ModelQSW-2800 series
CategorySwitch
TypeManaged
L3 FeaturesStatic Routing, RIP, OSPF, VRRP
Switching Capacity128Gbps
MAC Address Table16K
Jumbo Frame9K
L2 FeaturesVLAN, Port Mirroring
ManagementWeb, CLI, SNMP
Ports24 x 10/100/1000Base-T, 4 x 10G SFP+
Power SupplyAC 100-240V
Power Consumption30W
Humidity10% to 90% non-condensing
Dimensions440mm x 220mm x 44mm

Summary

Chapter 1 SWITCH MANAGEMENT

1.1 MANAGEMENT OPTIONS

Discusses the switch management options: in-band and out-of-band.

1.2 CLI INTERFACE

Introduces the Command Line Interface, its modes, syntax, and help functions.

Chapter 2 BASIC SWITCH CONFIGURATION

2.1 BASIC CONFIGURATION

Covers commands for entering/exiting admin mode, interface mode, and basic switch settings.

2.3 CONFIGURE SWITCH IP ADDRESSES

Explains IP address configuration methods: Manual, BOOTP, and DHCP.

Chapter 3 CLUSTER CONFIGURATION

3.1 Introduction to cluster network management

Introduces cluster network management concepts and features.

Chapter 4 PORT CONFIGURATION

4.1 Introduction to Port

Introduces port types and their configuration capabilities like speed and duplex.

4.2 Network Port Configuration Task List

Lists the tasks involved in configuring network ports, including combo mode and naming.

Chapter 5 PORT ISOLATION FUNCTION CONFIGURATION

5.1 Introduction to Port Isolation Function

Explains port isolation as an independent function to isolate port traffic within a VLAN.

5.2 Task Sequence of Port Isolation

Outlines the steps for configuring port isolation, including creating groups and adding ports.

Chapter 12 PORT SECURITY

12.1 Introduction to PORT SECURITY

Introduces port security as a MAC address-based mechanism for network access control.

12.2 PORT SECURITY Configuration Task List

Details the basic configuration steps for port security, including MAC addresses and violation modes.

Chapter 16 VLAN CONFIGURATION

16.1 VLAN CONFIGURATION

Introduces VLAN concepts, IEEE 802.1Q, and configuration task lists.

Chapter 17 MAC TABLE CONFIGURATION

17.1 Introduction to MAC Table

Explains the MAC table, static vs. dynamic addresses, and operations.

Chapter 19 QoS CONFIGURATION

19.1 Introduction to QoS

Introduces Quality of Service concepts, terms, and implementation.

Chapter 37 ACL CONFIGURATION

37.1 Introduction to ACL

Explains Access Control Lists for network traffic filtering and security.

Chapter 38 802.1X CONFIGURATION

38.1 Introduction to 802.1x

Introduces 802.1x for port-based network access control and authentication.

Chapter 41 SECURITY FEATURE CONFIGURATION

41.1 Introduction to Security Feature

Introduces security features like DoS protection, IP spoofing, and TCP attacks.

Chapter 42 TACACS+ CONFIGURATION

42.1 Introduction to TACACS+

Introduces TACACS+ as a terminal access controller for network access control.

Chapter 44 SSL CONFIGURATION

44.1 Introduction to SSL

Explains the Secure Socket Layer protocol for secure communication and its basic elements.

Chapter 59 MONITOR AND DEBUG

59.1 Ping

Explains the Ping command for checking network accessibility and basic connectivity.

59.3 Traceroute

Describes the Traceroute command for testing network paths and diagnosing failures.

59.5 Show

Introduces the 'show' command for displaying system, port, and protocol operational information.

59.6 Debug

Explains the use of debug commands for troubleshooting and diagnosing protocol issues.

Related product manuals