User Guide
Page 4
...Perspective Default VLAN Obtaining a VLAN Perspective Creating a New VLAN Adding New Switch Ports Deleting a VLAN ID Viewing VLAN Activities Searching for MAC Addresses Obtaining ...for ARP Table Entries Deleting Static ARP Table Entries Routing Table Adding Router Table Entries Deleting Router Table Entries Searching for Router Table Entries ProConnect II® Series 28 29 30 30 30 31 32 34 35 36... 36 36 37 37 38 39 40 41 42 43 43 44 45 46 47 48 49 49 51 51 52 53 54 55 Layer 2 Management 4-Port Gigabit Ethernet Switch...
...Perspective Default VLAN Obtaining a VLAN Perspective Creating a New VLAN Adding New Switch Ports Deleting a VLAN ID Viewing VLAN Activities Searching for MAC Addresses Obtaining ...for ARP Table Entries Deleting Static ARP Table Entries Routing Table Adding Router Table Entries Deleting Router Table Entries Searching for Router Table Entries ProConnect II® Series 28 29 30 30 30 31 32 34 35 36... 36 36 37 37 38 39 40 41 42 43 43 44 45 46 47 48 49 49 51 51 52 53 54 55 Layer 2 Management 4-Port Gigabit Ethernet Switch...
User Guide
Page 8
...the System This option lets you are fastened firmly in place. 4. This option has the same download requirements as a printer, server, workstation or router. 4. The Switch will remain solid Green. Power On Self Test When you need to one end of a standard network cable to reset the... suitable screws (not provided). The installation is complete. ProConnect II® Series Desk Top or Shelf Mounting the Switch 1. Connect one of the 10/100/1000 RJ-45 ports on the opposite side of the Switch. 3. Repeat steps 2 and 3 to the switch and the other mounting bracket on the front of the...
...the System This option lets you are fastened firmly in place. 4. This option has the same download requirements as a printer, server, workstation or router. 4. The Switch will remain solid Green. Power On Self Test When you need to one end of a standard network cable to reset the... suitable screws (not provided). The installation is complete. ProConnect II® Series Desk Top or Shelf Mounting the Switch 1. Connect one of the 10/100/1000 RJ-45 ports on the opposite side of the Switch. 3. Repeat steps 2 and 3 to the switch and the other mounting bracket on the front of the...
User Guide
Page 31
... via SNMP. Select Default Gateway or Static Route, then press Enter. The address consists of hops needed between the switch and the destination network. ROUTING TABLE ProConnect II® Series If you select Routing Table from the Routing table. • Search for entries in the following columns.... Proceed to be filtered. 52 Layer 2 Management 4-Port Gigabit Ethernet Switch Protocol Indicates one of the other than one of the router at the next hop. VLAN Type The VLAN within which the switch can route packets. From the Routing Table screen, you finish, press Enter...
... via SNMP. Select Default Gateway or Static Route, then press Enter. The address consists of hops needed between the switch and the destination network. ROUTING TABLE ProConnect II® Series If you select Routing Table from the Routing table. • Search for entries in the following columns.... Proceed to be filtered. 52 Layer 2 Management 4-Port Gigabit Ethernet Switch Protocol Indicates one of the other than one of the router at the next hop. VLAN Type The VLAN within which the switch can route packets. From the Routing Table screen, you finish, press Enter...
User Guide
Page 61
... of the network. After the user sends the authenticator the identification message, the authenticator forwards the user's identification message to an access point or wireless router, also called the authenticator. It establishes a framework that uses twisted wire pairs. 100BaseTX - Adapter - Architecture - A TCP/IP protocol used for ... identification request back to figure out a host's Ethernet address (MAC address/node ID) from its security. Crimping Your Own Network Cables ProConnect II® Series 112 Layer 2 Management 4-Port Gigabit Ethernet Switch Glossary 10BaseT -
... of the network. After the user sends the authenticator the identification message, the authenticator forwards the user's identification message to an access point or wireless router, also called the authenticator. It establishes a framework that uses twisted wire pairs. 100BaseTX - Adapter - Architecture - A TCP/IP protocol used for ... identification request back to figure out a host's Ethernet address (MAC address/node ID) from its security. Crimping Your Own Network Cables ProConnect II® Series 112 Layer 2 Management 4-Port Gigabit Ethernet Switch Glossary 10BaseT -
User Guide
Page 64
...- Ethernet - Fast Ethernet - Fingering requires entering the full user@domain address. 118 Layer 2 Management 4-Port Gigabit Ethernet Switch Firewall - Gateway - ProConnect II® Series Dynamic Routing - FHSS (Frequency Hopping Spread Spectrum) - Because of its own private data resources and for...route based on . Basically, a firewall, working closely with different, incompatible communications protocols. 119 It can adjust for a router to be performed by typing commands at a network gateway server, that is used by entering the URL preceded with the ...
...- Ethernet - Fast Ethernet - Fingering requires entering the full user@domain address. 118 Layer 2 Management 4-Port Gigabit Ethernet Switch Firewall - Gateway - ProConnect II® Series Dynamic Routing - FHSS (Frequency Hopping Spread Spectrum) - Because of its own private data resources and for...route based on . Basically, a firewall, working closely with different, incompatible communications protocols. 119 It can adjust for a router to be performed by typing commands at a network gateway server, that is used by entering the URL preceded with the ...
User Guide
Page 65
...Internet Protocol) - IP Multicast Filtering - IPSec (Internet Protocol Security) - Tunnel mode is a 32-binary digit number that identifies each other network. ProConnect II® Series Half Duplex - HTTP (HyperText Transport Protocol) - Hub - In-Band Management - In the most widely installed level of journals, has... method or protocol by sending another on the World Wide Web. A process whereby the switch can respond by which data is sent from one of the routers is required) and sends it wants to receive transmissions addresses to implement secure exchange of ...
...Internet Protocol) - IP Multicast Filtering - IPSec (Internet Protocol Security) - Tunnel mode is a 32-binary digit number that identifies each other network. ProConnect II® Series Half Duplex - HTTP (HyperText Transport Protocol) - Hub - In-Band Management - In the most widely installed level of journals, has... method or protocol by sending another on the World Wide Web. A process whereby the switch can respond by which data is sent from one of the routers is required) and sends it wants to receive transmissions addresses to implement secure exchange of ...
User Guide
Page 66
... where the packet can be studied. Port Mirroring - Port mirroring, also known as a switch or router. A wide variety of a single processor or server within an office building). A network junction or connection point, typically a computer or work station. Packet Filtering - ProConnect II® Series LAN (Local Area Network) - Mbps (Megabits per second; To connect a MDIX...
... where the packet can be studied. Port Mirroring - Port mirroring, also known as a switch or router. A wide variety of a single processor or server within an office building). A network junction or connection point, typically a computer or work station. Packet Filtering - ProConnect II® Series LAN (Local Area Network) - Mbps (Megabits per second; To connect a MDIX...
User Guide
Page 67
...interleaves bytes or groups of bytes across multiple drives, so more than just its neighboring routers. Storage - A connector similar to a telephone connector that are known and trusted from ...smallest hop count between source and destination. A widely used to oversee the network. ProConnect II® Series RAID improves performance by the recipient computer and are taking place only...when required. Forwarding data in a network is part of ports. 2. Switch - 1. A data switch connects computing devices to host computers, allowing a large number of devices to process the ...
...interleaves bytes or groups of bytes across multiple drives, so more than just its neighboring routers. Storage - A connector similar to a telephone connector that are known and trusted from ...smallest hop count between source and destination. A widely used to oversee the network. ProConnect II® Series RAID improves performance by the recipient computer and are taking place only...when required. Forwarding data in a network is part of ports. 2. Switch - 1. A data switch connects computing devices to host computers, allowing a large number of devices to process the ...
User Guide
Page 68
...Switch Upgrade - TCP/IP defines a suite or group of how the devices on the network are twisted around each other. Throughput - Upload - To transmit a file over the network. VLAN (Virtual LAN) - Telnet - A network's topology is known as if they were physically connected to another in a given time period. ProConnect II...of receipt to the sender of data (called packets) that a message is the most common network devices include hubs, switches, routers, and gateways. Unshielded twisted pair is divided into for efficient delivery over a network. Twisted pair is the ordinary ...
...Switch Upgrade - TCP/IP defines a suite or group of how the devices on the network are twisted around each other. Throughput - Upload - To transmit a file over the network. VLAN (Virtual LAN) - Telnet - A network's topology is known as if they were physically connected to another in a given time period. ProConnect II...of receipt to the sender of data (called packets) that a message is the most common network devices include hubs, switches, routers, and gateways. Unshielded twisted pair is divided into for efficient delivery over a network. Twisted pair is the ordinary ...