Preface
- <Introduction Configuration>
<>Applicable products and software versions
This manual is intended for AX2630S. It also describes the features supported by the software OS-L2N Ver.2.3 and optional licenses.
Before you operate the equipment, carefully read the manual and make sure that you understand all instructions and cautionary notes. After reading the manual, keep it in a convenient place for easy reference.
<>Corrections to this manual
Corrections to this manual might be contained in the Release Notes and Manual Corrections that come with the software.
Intended readers
This manual is intended for system administrators who wish to configure and operate a network system that uses the Switch.
Readers must have an understanding of the following:
-
The basics of network system management
<>URL of this documentation
You can view this manual on our website at:
https://www.alaxala.com/
<>Reading sequence of the manuals
The following shows the manuals you need to consult according to your requirements determined from the following workflow for installing, setting up, and starting regular operation of the Switch.
Abbreviations used in the manual
AC Alternating Current ACK ACKnowledge AES Advanced Encryption Standard ANSI American National Standards Institute ARP Address Resolution Protocol bit/s bits per second (can also appear as bps) BPDU Bridge Protocol Data Unit CA Certificate Authority CBC Cipher Block Chaining CC Continuity Check CFM Connectivity Fault Management CIST Common and Internal Spanning Tree CRC Cyclic Redundancy Check CSMA/CD Carrier Sense Multiple Access with Collision Detection CST Common Spanning Tree DA Destination Address DC Direct Current DES Data Encryption Standard DHCP Dynamic Host Configuration Protocol DNS Domain Name System DRR Deficit Round Robin DSA Digital Signature Algorithm DSAP Destination Service Access Point DSCP Differentiated Services Code Point DSS Digital Signature Standard E-Mail Electronic Mail EAP Extensible Authentication Protocol EAPOL EAP Over LAN ECDHE Elliptic Curve Diffie-Hellman key exchange, Ephemeral ECDSA Elliptic Curve Digital Signature Algorithm EEE Energy Efficient Ethernet FAN Fan Unit FCS Frame Check Sequence FDB Filtering DataBase FQDN Fully Qualified Domain Name GCM Galois/Counter Mode GSRP Gigabit Switch Redundancy Protocol HMAC Keyed-Hashing for Message Authentication HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secure IANA Internet Assigned Numbers Authority ICMP Internet Control Message Protocol ICMPv6 Internet Control Message Protocol version 6 ID Identifier IEEE Institute of Electrical and Electronics Engineers, Inc. IETF the Internet Engineering Task Force IGMP Internet Group Management Protocol IP Internet Protocol IPv4 Internet Protocol version 4 IPv6 Internet Protocol version 6 ISP Internet Service Provider IST Internal Spanning Tree L2LD Layer 2 Loop Detection LAN Local Area Network LED Light Emitting Diode LLC Logical Link Control LLDP Link Layer Discovery Protocol MA Maintenance Association MAC Media Access Control MC Memory Card MD5 Message Digest 5 MDI Medium Dependent Interface MDI-X Medium Dependent Interface crossover MEP Maintenance association End Point MIB Management Information Base MIP Maintenance domain Intermediate Point MLD Multicast Listener Discovery MSTI Multiple Spanning Tree Instance MSTP Multiple Spanning Tree Protocol MTU Maximum Transmission Unit NAK Not AcKnowledge NAS Network Access Server NDP Neighbor Discovery Protocol NTP Network Time Protocol OAM Operations,Administration,and Maintenance OUI Organizationally Unique Identifier packet/s packets per second (can also appear as pps) PAD PADding PAE Port Access Entity PC Personal Computer PDU Protocol Data Unit PGP Pretty Good Privacy PID Protocol IDentifier PIM Protocol Independent Multicast PoE Power over Ethernet PQ Priority Queueing PS Power Supply QoS Quality of Service RA Router Advertisement RADIUS Remote Authentication Dial In User Service RDI Remote Defect Indication REJ REJect RFC Request For Comments RMON Remote Network Monitoring MIB RQ ReQuest RSA Rivest, Shamir, Adleman RSTP Rapid Spanning Tree Protocol SA Source Address SFD Start Frame Delimiter SFP Small Form factor Pluggable SFP+ enhanced Small Form-factor Pluggable SHA Secure Hash Algorithm SMTP Simple Mail Transfer Protocol SNAP Sub-Network Access Protocol SNMP Simple Network Management Protocol SSAP Source Service Access Point SSH Secure Shell SSL Secure Socket Layer STP Spanning Tree Protocol TACACS+ Terminal Access Controller Access Control System Plus TCP/IP Transmission Control Protocol/Internet Protocol TLS Transport Layer Security TLV Type, Length, and Value TOS Type Of Service TPID Tag Protocol Identifier TTL Time To Live UDLD Uni-Directional Link Detection UDP User Datagram Protocol USB Universal Serial Bus VLAN Virtual LAN WAN Wide Area Network WWW World-Wide Web
<>Conventions: KB, MB, GB, and TB
This manual uses the following conventions: 1 KB (kilobyte) is 1024 bytes, 1 MB (megabyte) is 10242 bytes, 1 GB (gigabyte) is 10243 bytes, 1 TB (terabyte) is 10244 bytes.