COMMANDO Solider IE2000 Series Industrial Ethernet, Managed Switches are fully managed, PoE+ Gigabit Ethernet switch with network resiliency and high availability, delivering robust performance and intelligent switching for growing networks
Read MoreIn User EXEC mode, user only allows to do a few actions. Most of commands are only available in privileged EXEC mode. Use “enable” command to enter the privileged mode to do more actions on switch
Read MoreDifferent access methods are allowed to bind different login authentication lists. Use “login authentication” command to bind the list to specific line (console, telnet, ssh).
Read MoreUse the show acl utilization command to show the usage of PIE of ASIC. When an ACL bind to interface, it needs ASIC resource to help to filter packet. An ASIC has limited resource
Read MoreUse “authentication guest-vlan” command to enable the port setting of guest VLAN. Use the “no” form of this command to disable guest VLAN.
Read MoreIE2000 Series Switches Diagnostics offer proactive diagnostics and real-time alerts and provides higher network availability and increased operational efficiency
Read MoreThe example shows how to set DHCP VLAN Interface Group setting for Management VLAN . You can verify settings by the following show run command.
Read MoreThe following example shows the global DoS protection configuration. Switch# show dos
Read MoreThe example shows how to set interface gi1 to validate “src-mac”,“dst-mac” and “ip”,“allow zeros”. You can verify settings by the following show ip arp inspection interface command
Read MoreThis command will display the ports configuration info. none [interfaces IF_PORTS] Display all ports configuration Display Specifies posts configuration
Read MoreUse the ip igmp snooping version command to change IGMP support version. Only basic mode is supported in v3. When change version from v3 to v2, all querier version will update to version 2.You can verify settings by the show ip igmp snooping command
Read MoreIP Source Guard is a security feature that restricts IP traffic on untrusted Layer 2 ports by filtering traffic based on the DHCP snooping binding database or manually configured IP source bindings
Read MoreUse “show lag” command to show current LAG load balance algorithm and members active/inactive status. Switch# show lag
Read MoreAn Access Control List (ACL) is a set of rules that is usually used to filter network traffic. ACLs can be configured on network devices with packet filtering compatibilities, such as routers and firewalls
Read MoreIn IPv4, Layer 2 switches can use IGMP snooping to limit the flooding of multicast traffic by dynamically configuring Layer 2 interfaces so that multicast traffic is forwarded to only those interfaces associated with IP multicast address
Read MoreThe following example specifies that set mvr static group test. The configure must configure mvr receiver port firstly.(eg. mvr port type) Switch(config)# mvr vlan
Read MoreWhen a port is in error-disabled state, it is effectively shut down and no traffic is sent or received on that port. The ErrDisable feature is implemented to handle critical situations where the switch detected excessive or late collisions on a port, port duplex misconfiguration
Read MorePort Security helps secure the network by preventing unknown devices from forwarding packets. When a link goes down, all dynamically locked addresses are freed. The port security feature offers the following benefits
Read MoreProtocol-based VLAN processes traffic based on protocol. You can use a protocol-based VLAN to define filtering criteria for untagged packets. If you do not change the port configuration or configure a protocol-based VLAN, switch assigns untagged packets to VLAN 1
Read More