Configuration Guide Vol. 1


Preface

<Introduction Configuration>

<>Applicable products and software versions

This manual is intended for AX2630S. It also describes the features supported by the software OS-L2N Ver.2.3 and optional licenses.

Before you operate the equipment, carefully read the manual and make sure that you understand all instructions and cautionary notes. After reading the manual, keep it in a convenient place for easy reference.

<>Corrections to this manual

Corrections to this manual might be contained in the Release Notes and Manual Corrections that come with the software.

Intended readers

This manual is intended for system administrators who wish to configure and operate a network system that uses the Switch.

Readers must have an understanding of the following:

<>URL of this documentation

You can view this manual on our website at:

https://www.alaxala.com/

<>Reading sequence of the manuals

The following shows the manuals you need to consult according to your requirements determined from the following workflow for installing, setting up, and starting regular operation of the Switch.

[Figure Data]

Abbreviations used in the manual

AC          Alternating Current
ACK         ACKnowledge
AES         Advanced Encryption Standard
ANSI        American National Standards Institute
ARP         Address Resolution Protocol
bit/s       bits per second (can also appear as bps)
BPDU        Bridge Protocol Data Unit
CA          Certificate Authority
CBC         Cipher Block Chaining
CC          Continuity Check
CFM         Connectivity Fault Management
CIST        Common and Internal Spanning Tree
CRC         Cyclic Redundancy Check
CSMA/CD     Carrier Sense Multiple Access with Collision Detection
CST         Common Spanning Tree
DA          Destination Address
DC          Direct Current
DES         Data Encryption Standard
DHCP        Dynamic Host Configuration Protocol
DNS         Domain Name System
DRR         Deficit Round Robin
DSA         Digital Signature Algorithm
DSAP        Destination Service Access Point
DSCP        Differentiated Services Code Point
DSS         Digital Signature Standard
E-Mail      Electronic Mail
EAP         Extensible Authentication Protocol
EAPOL       EAP Over LAN
ECDHE       Elliptic Curve Diffie-Hellman key exchange, Ephemeral
ECDSA       Elliptic Curve Digital Signature Algorithm
EEE         Energy Efficient Ethernet
FAN         Fan Unit
FCS         Frame Check Sequence
FDB         Filtering DataBase
FQDN        Fully Qualified Domain Name
GCM         Galois/Counter Mode
GSRP        Gigabit Switch Redundancy Protocol
HMAC        Keyed-Hashing for Message Authentication
HTTP        Hypertext Transfer Protocol
HTTPS       Hypertext Transfer Protocol Secure
IANA        Internet Assigned Numbers Authority
ICMP        Internet Control Message Protocol
ICMPv6      Internet Control Message Protocol version 6
ID          Identifier
IEEE        Institute of Electrical and Electronics Engineers, Inc.
IETF        the Internet Engineering Task Force
IGMP        Internet Group Management Protocol
IP          Internet Protocol
IPv4        Internet Protocol version 4
IPv6        Internet Protocol version 6
ISP         Internet Service Provider
IST         Internal Spanning Tree
L2LD        Layer 2 Loop Detection
LAN         Local Area Network
LED         Light Emitting Diode
LLC         Logical Link Control
LLDP        Link Layer Discovery Protocol
MA          Maintenance Association
MAC         Media Access Control
MC          Memory Card
MD5         Message Digest 5
MDI         Medium Dependent Interface
MDI-X       Medium Dependent Interface crossover
MEP         Maintenance association End Point
MIB         Management Information Base
MIP         Maintenance domain Intermediate Point
MLD         Multicast Listener Discovery
MSTI        Multiple Spanning Tree Instance
MSTP        Multiple Spanning Tree Protocol
MTU         Maximum Transmission Unit
NAK         Not AcKnowledge  
NAS         Network Access Server
NDP         Neighbor Discovery Protocol
NTP         Network Time Protocol
OAM         Operations,Administration,and Maintenance
OUI         Organizationally Unique Identifier
packet/s    packets per second (can also appear as pps)
PAD         PADding
PAE         Port Access Entity
PC          Personal Computer
PDU         Protocol Data Unit
PGP         Pretty Good Privacy
PID         Protocol IDentifier
PIM         Protocol Independent Multicast
PoE         Power over Ethernet
PQ          Priority Queueing
PS          Power Supply
QoS         Quality of Service
RA          Router Advertisement
RADIUS      Remote Authentication Dial In User Service
RDI         Remote Defect Indication
REJ         REJect 
RFC         Request For Comments
RMON        Remote Network Monitoring MIB
RQ          ReQuest
RSA         Rivest, Shamir, Adleman
RSTP        Rapid Spanning Tree Protocol
SA          Source Address
SFD         Start Frame Delimiter
SFP         Small Form factor Pluggable
SFP+        enhanced Small Form-factor Pluggable
SHA         Secure Hash Algorithm
SMTP        Simple Mail Transfer Protocol
SNAP        Sub-Network Access Protocol
SNMP        Simple Network Management Protocol
SSAP        Source Service Access Point
SSH         Secure Shell
SSL         Secure Socket Layer
STP         Spanning Tree Protocol
TACACS+     Terminal Access Controller Access Control System Plus
TCP/IP      Transmission Control Protocol/Internet Protocol
TLS         Transport Layer Security
TLV         Type, Length, and Value
TOS         Type Of Service
TPID        Tag Protocol Identifier
TTL         Time To Live
UDLD        Uni-Directional Link Detection
UDP         User Datagram Protocol
USB         Universal Serial Bus
VLAN        Virtual LAN
WAN         Wide Area Network
WWW         World-Wide Web

<>Conventions: KB, MB, GB, and TB

This manual uses the following conventions: 1 KB (kilobyte) is 1024 bytes, 1 MB (megabyte) is 10242 bytes, 1 GB (gigabyte) is 10243 bytes, 1 TB (terabyte) is 10244 bytes.