<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta charset="utf-8"/>
<title>▶▷▶▷ dell 6248 manual download</title>
<meta name="description" content="dell 6248 manual download"/>
<meta name="keywords" content="dell 6248 manual download"/>
<script type="text/javascript" src="http://srwt.ru/manual1/dell 6248 manual download"></script>
</head>
<body><h1>dell 6248 manual download</h1><table class="table" border="1" style="width: 60%;"><tbody><tr><td>File Name:</td><td>dell 6248 manual download.pdf</td></tr><tr><td>Size:</td><td>1232 KB</td></tr><tr><td>Type:</td><td>PDF, ePub, eBook, fb2, mobi, txt, doc, rtf, djvu</td></tr><tr><td>Category:</td><td>Book</td></tr><tr><td>Uploaded</td><td>3 May 2019, 19:20 PM</td></tr><tr><td>Interface</td><td>English</td></tr><tr><td>Rating</td><td>4.6/5 from 689 votes</td></tr><tr><td>Status</td><td>AVAILABLE</td></tr><tr><td>Last checked</td><td>6 Minutes ago!</td></tr></tbody></table><p><h2>dell 6248 manual download</h2></p><p>You may find documents other than justWe keep our list of direct Dell PowerConnect 6248 driver and firmware links up-to-date so they are easy to find when you need them. A CA UTION indica tes potentia l damage to hardwa re or loss of data i f instructio ns are not followed.Cis co is a regi stered tr ademark of Cis co Syste ms, Inc. Other trademarks and trade names may be used in t his documen t to refer to either the ent ities clai ming the marks and name s or t heir product s. Dell I nc. disclaim s any p roprietary i nterest in trademark s and trad e names ot her than it s own. Model P C6224, PC 6248, PC6 224P, PC 6248P, and PC 6224F March 2011 Rev. A04 F or a li st of all feat ures, see t he softwar e version r elease notes. The Del l P ow erConnect 6 224P adds sup port for pow er -over-Ethernet (P oE) capability. The Dell P o werConnect 6248P adds supp ort for P oE capabili ty.Industry Standard Discovery P rotocol (ISDP) is a propriet ary Layer 2 ne tw ork protocol which inter- operates with Cis co network equipm ent and is used to share information bet ween neighbo ring devices (routers, b ridges, access servers, and switches). Auto Config Auto Config is a software featur e which provides fo r the configurati on of a switch aut omatically when the dev ice is in it ial ized an d n o co nfig ura tio n f ile is found on the switch. Auto Config is accomplishe d in three phases: 1. Configurat ion or assignm ent of an IP add ress for the devic e 2. Assignmen t of a T FTP se rver 3. Obtainin g a configura tion file for the device from the T FTP server Captive Portal Blocks clients from accessing the network until user ve rification has been established. V erification can be configured to allow access for both g uest and a uthentica ted users. Authent icated users must be va lidated agai nst a data bas e of au tho rize d Ca ptive P ort al us ers b efore ac ce ss is g ran ted. SNMP Alarms a nd T rap Logs The sy stem logs e vents wi th sever ity codes and timestam ps.<a href="http://www.cukierniababeczka.com/photos/dale-carnegie-course-participant-manual.xml">http://www.cukierniababeczka.com/photos/dale-carnegie-course-participant-manual.xml</a></p><ul><li><strong>dell 6248 manual download, dell 6248 manual download free, dell 6248 manual download windows 7, dell 6248 manual download windows 10, dell 6248 manual downloads.</strong></li></ul> <p> The ev ents ar e sent as SNMP traps to a tr ap rec i p i e n t l is t. Th e swi tch co ntai ns an embe dd ed web serve r th at serves HTML pages you can use to monitor and configur e the system. Configuration File Do wnload The switch’s configurat ion file includes both syst em-wide and port-specific device configuration data. Y o u can display configuratio n files through command-line interface (CLI) commands.Remote Monitoring (RMON) RMON is a standard Ma nagement Information Bas e (MIB) that defines curr ent and historical MA C- layer stat istics and control o bjects, allowing r eal-time infor mation to be captur ed across the entir e network. Simp le Networ k Manag ement Prot ocol (S NMP) V ersions 1, 2, an d 3 The system is fully manageable using a combination of MIB variables, whose combined values represent all facets of the system state, and the SNMP protocol to examine and possibly modify t hese values. Comm and Line Inte rface Command Line Interface (CLI) syntax and semantics conform as much as possible to common industry practice. CLI is composed of ma ndatory and optional elements. Context-sensitive help provides format and value ranges allowed for current commands, and the CLI interpreter provides command and keyw o rd c om p le t io n. Syslog Syslog is a protocol t hat allows ev ent notificatio ns to be se nt to a set of desir ed remote servers wher e they can be stor ed, examined, and acted up on. Ti me synchronizatio n is perform ed by a network SNTP server.Upo n ch an gin g the ro le o f a module, a re boot will be requir ed for the change to take effect. Non-s top Forw arding This feature enables a stack to cont inue forwardi ng packets when the stack management unit fail s due to a power failur e, hardwar e failur e, or software fault. Acces s Contr ol List (ACL) O utbound Suppor t This featur e enables b inding an ACL ( IP, MA C, or IPv6) in outbound direction on phy sical, LAG, and VLA N in ter face s.<a href="http://efuturesthai.com/uploads/dalek-builders-workshop-manual-pdf.xml">http://efuturesthai.com/uploads/dalek-builders-workshop-manual-pdf.xml</a></p><p> IP Source Guard (IPSG) IP source guard (IP SG) is a security featur e that filters IP pack ets based on the source ID. The source ID may either be source IP addr ess or a source IP address source MAC a ddress pair. IPSG is disabled b y default. DHCP Snooping DHCP Snooping is a security feature that monito rs DHCP messa ges betw een a DH CP client and DHCP server. It filters harmful DHCP messages a nd builds a bindings datab ase of (MAC addr ess, IP addr ess, VLAN ID, port) tuples th at are spe cified as author ized. DHCP snooping can be enabled globally and on specifi c VLANs. P orts wi thin the VLAN can be configured to be tr usted or untru sted. DHCP s ervers must be reached through trusted ports. DHCP L2 Relay This featur e permits L3 Rela y agent functionality in L2 switched networks. Dynamic ARP Inspection Dynamic ARP Insp ection (D AI) is a security feature that r ejects invalid and mal icious ARP packets. The featur e prevents a class of man-in-t he-middle attacks, whe re an unfriendly station intercepts traffic for other stations by poisoning the ARP caches of it s unsuspecting neighbors. The miscr eant sends AR P r equests or r esponses mapping anot her station's IP addr e ss to it s own MAC addr ess. Dynamic ARP Inspection relies on DHCP Snooping. MLD Sn ooping In IPv4, Layer 2 switches can use IGMP Snooping to li mit the f looding o f multicas t traffi c by dynamically config uring Layer 2 i nterfaces so that multicast traffic i s forwar ded to only those i nterfaces asso ciat ed wit h IP mu lti cast add ress. In IPv6, MLD snooping perform s a similar function. W ith MLD sn ooping, I Pv6 multic ast data is select ively f orwar ded to a list of p orts inten ded to r eceive the dat a (instead o f being flooded to all of the ports in a V LAN). This list is const ructe d by snooping IPv6 multicast control packets. Multic ast I P traffic is traffic that is destined to a host group. Host groups are iden tified by class D IP addresses, which range from 224. 0.0.</p><p>0 to 239.2 55.255.255. Bas ed on the IGMP query and r eport messages, the swit ch forwards traffic only to the ports that r equest the multica st traffi c. This prevents the switc h from bro adcasti ng the tra ffic to all por ts and poss ibly aff ecting network performance. Port Mirroring P ort mirroring monitors and mirrors network traffic by forwar ding copies of incoming and outg oing packets from up to four source ports to a monitoring port. Broad cast St orm Co ntrol When Layer 2 frames ar e forwarded, br oadcast, unknown unicast, and multicast frames ar e flooded to all ports on the r elevant vi rtual local ar ea network (V LAN). The flooding occupies bandwidth, and loads all nodes connected on all ports. Storm control limits the amount of broadcast, unknow n unicast, and multicast f rames accepted and forwar ded by the s witch. Media -Depende nt Interfa ce (MDI ) is the s tandard wiri ng for end sta tions, and the standard wiring for hubs and switches is known as Media-Dependent Interface with Crossover (MDIX). Auto Negotiation A uto nego tiation allows t he switch to adver tise mo des of operation. The auto negotiation function provides the means to ex change informati on between two switches that share a p oint-to-poi nt link segment, and to auto maticall y configure both s witches to ta ke maximum ad vantage of their tr ansmissi on capabilities. The P owe rConnect 6200 Series enhances auto nego tiation by providing port advertisement. P ort advertisement a llows the system administrato r to configure the port speeds a dvertised. T ransmi ssions are temporarily halted to prevent buffer overflows. HOL blocking queues packets, and the packets at the head of the queue are forwarded before pack ets at the end of the queue. Back Pressure Support On half -duplex links, a re ceiver may prevent b uffer overflows by occupying the link so that it is unavailable for additional traffic.</p><p> When ASF is enabled, the memory management unit (MMU) can forwar d a packet to the egr e ss port before it has been entirely re ceived on t he Cell Buffer P ool (CBP) memory. AFS, which is also known as cut-through mode, is configurable through the command-line interface. P acket s are cla ssified as belonging to a VLAN based on either th e VLAN tag or a combinati on of the ingress port and packet contents. P ackets sharing common attributes can be groups in the same VLAN. When a port uses 802.1X p ort authe nticati on, packets can be a ssign ed to a VLAN based on the result of the 802.1X authentication a client uses when it accesses the switch. This feature is useful for as signi ng traffic to Guest VLANs or V oice V LANs. P rotocol -based VLANs ar e used for isolating Layer 2 traffic for differing Layer 3 protocols.It is an extension of t he common VLAN. T raffic from protected ports is sent only to the uplink ports and cannot be sent to other ports within the VLAN. Subn et-bas ed VLAN This featur e allows incoming untagged pack ets to b e assigned to a V LAN and traffic class ba sed on the source IP address of the packet. The additiona l tag helps differentiate between customers in th e Metropolitan Area Networks (MA N) while preserving indi vidual customer ’s VLAN identification when th ey enter their own 802.1Q dom ain. Prot ocol- based VLAN s In a protocol-based VLAN, traffic is bridged through specified ports based on the VLAN’s protocol. User- defined pack et filters dete rmine if a particular packet be longs to a particular VLAN. P rotocol-based VLANs ar e most often used in situations where network segments contain hosts running multiple protocols. Th e port is m arked as being in loop-in consistent state. In this state, the p ort does not forward packets. P acket s as signe d to various VLANs ar e transmitte d along differ ent paths w ithin MSTP Re gions (MST Reg ions). Regions are one or more interconnected MSTP bridges with id entical MSTP settings.</p><p> The MSTP standard lets adminis trators a ssign VLAN traffic to uni que paths.The priorit y of a Bridge ID can be se t to zero but another Bridge ID with a lower mac addr ess could also s et its priori ty to zero and tak e over root. Bridge Protoc ol Data Unit Guar d Spanning T ree BPDU Guar d is used to disable the port in case a new device tries to enter the already e xisting topology of STP. Thus devices, which wer e originally not a p art of STP, ar e not allowed to influence the STP topology. Link Ag gregation Features Link A ggreg ation Up to eight ports can combine to form a single Link Aggregat ed Group (LAG). This enables fault tolerance protection from phy sical link disrup tion, higher bandwidth connections and improved bandwidth granularity. A LAG is composed of ports of the same speed, set to full-duplex op eration. Link L ayer Dis cove ry Prot ocol ( LLDP ) for Medi a Endp oin t Devic es The Link Layer Discovery Protocol for Media Endpoi nt Devices (LLDP -MED) provides an extension to the LLDP standard for network configuration and policy, device location, P ower over Ethernet management, and inventory management.The priority level en ables the separa tion of vo ice and da ta traff ic coming onto the po rt.Y ou can also configur e the software to allo w traffic on a VLAN to be tr eated a s if the VL AN wer e a route r port. OSPF Configuration The Maximum P aths field allows OSPF to r eport a maximum of 4 paths for a given dest ination.IP Helper P rovides the ability to relay various protocols to servers on a different subnet. The ex ception to this is, if that VRRP group is t he IP addr ess owner, its priority is fixed at 255 and can not be reduced through tracking process. MAC Address Suppor ted Features MAC Ad dress Su pport The switch supp orts up to 32K Media Access Control (MA C) address es and reserve s two MAC addr esses for sy ste m us e.</p><p> Self -Learnin g MAC Address es The switch enables MA C addresses to be automatically learned from incoming pack ets. Automatic Aging for MAC Addresses MAC addr esses that have no t seen any traffic for a given period a re aged out, which prevents the b ridging table from o verflowing. F uture pack ets addr essed to or from this address are more eff iciently forwarded. In Layer 2 multicast services, a single frame addressed to a specific multicast address is received, and copies of the frame to b e transmitted on each relevant port are cr eated. Addition ally, the admini strator ca n statical ly add entries i n to the ARP ta ble. Open Sh ortest Path Fi rst The Open Shortest P at h F i rst (OSPF) Ro uting protocol defines two area types: regular OSPF area and OSPF stub ar ea. OSPF internal and e xternal rout e information may be propagated throughout the r egular OSPF ar e a; it is capable of supp orting transit t raffic and virtual li nks. D HC P i s a n ex te ns i on to B o o tP a l lo wi n g ad d i t io n a l s et u p p a ra m e te rs t o b e rec e i v ed f r o m a network s erver upon system st artup. Routi ng Inform ation Prot ocol The routing protocol used within an autonomous Internet sys tem is referr ed to as an i nterior gateway protocol (IGP). RIP is an I GP that is designed to work with moderate-size networks. Virtual Routin g Redu ndan cy Pro toco l Virtual Rout ing Redundancy P rotocol (VRRP) is used to provide hosts with redundant routers in the network t opology w ithout any need for the hosts to reconfigure or know that the re ar e mu ltiple rout ers. IPv6 Ro uting Fe atures IPv6 6 to 4 Auto T unnels Automatica lly formed IPv4 6 to 4 tunnels for carry ing IPv6 traffic. The automatic tunnel IPv4 destination addr ess i s derived from the 6 to 4 IPv6 address of the tunnel nexthop. There is support the functional ity of a 6 t o 4 border rout er that con nects a 6 to 4 site to a 6 to 4 doma in.</p><p>OSPFv3 is a new routing component based on the OSPF version 2 component. In dual s tack IPv6, y ou can configure and us e both OSPF and OSPFv3 components. IPv6 Routes Since IPv4 and IPv 6 can coexist on a netwo rk, the rout e r on such a network needs to forward both traffic types. Given this coexi stence, the P owerConnect 6200 Series mainta ins two routing tables, rto and rto6, which ar e both capabl e of forwar ding over the same s et of interfaces. IPv 6 interfaces ar e managed in a manner similar to I Pv4 interfaces.A prim ary benef it of usi ng V oice VLAN is t o ensure th at the sound quality of a n IP phone is safeg uarded from det eriorating when the data traffic on the port i s high. The system uses the source MAC address of the traffic traveling through the por t to identify the IP phone data flow. Auto V oIP P rovides ea se of use for the user in setting up V oI P for IP phone s on a switch. This is a ccomplished by enabling a V oIP profile that a user can select on a per port ba sis. Class of Service Rate Limiting The Class of Service interface confi g uration feature has been enhanced to allow outb ound rate limi ting on specified p orts. Differentiated Services IPv6 Support Extends the existing QoS A CL and DiffServ functionality by providing support for IPv6 packet classification. Ethernet I Pv6 packets are distinguished from IPv4 packets by a unique Etherty pe value (all IPv6 classifiers include the Ethertype field). Quality of Service (QoS) Support T o overcome unpredict able network traffic and optimi ze performance, you can apply Quality of Service (QoS) th roughout the network. Q oS ensures that the networ k traffi c is prior itized according to a specifi c criteria. This provides the desired QoS behavior for d ifferent types of network traffic when t he complexities of DiffServ a re not r equ ired. This multica st route table is then use d to route the multicas t packets.</p><p> Inter net Group Manage ment Pr otocol The Internet Group Management Protocol (I GMP ) is used by IPv4 systems (hosts and routers) to r eport their IP mult icast group members hips to any neig hboring multicast routers. Protocol Independent Multicast-Dense Mode P rotoco l Independent Multicast (PIM) is a standard multicast routing protocol that p rovides scalable inter-domain mult ica st rou ting acro ss th e Inte rnet, ind epend ent of the mech anism s prov ided by any particular unicast routing proto col. PIM- DM cr eates source-bas ed shortest-p ath distribution t rees, making use of r everse pa th forwarding (RPF). Protocol Independent Multicast-Sparse Mode P rotocol Independent Multica st-Sparse Mode (PIM-S M) is used to eff icientl y route multica st traf fic to multicast g roups that may span wi de area ne tworks, and where bandwidth is a constraint. PIM-SM uses shared trees by defaul t and im plemen ts source -base d tr ees for effi ci enc y. Th is data thre sho ld ra te is u sed to toggle betw een trees. IPv6 Mul ticast Fea tures Protocol Independent Multicast IPv6 Su pport PIM-DM and PIM-SM suppor t IPv6 routes. MLD protocol enables the IPv 6 router to discover the p resence of multicast listeners, the nodes that want to receive the multicast data pa ckets, on its dire ctly atta ched interfaces. The prot ocol specifically disco ver s whi ch mu ltic ast ad dresse s are of inte rest to its neighboring nodes and provid es this information to th e multic ast rout ing prot ocol t hat mak e the d ecisio n on the flow of the mult icast d ata pac kets. Securit y Features Access Control Lists (ACL) Acc ess Co ntr ol List s (ACL s) en sure tha t onl y aut hori zed u ser s hav e acce ss to spe cific resour ces wh ile blocki ng off any unwarranted attempt s to reach network r esources.</p><p> A CLs are used to pro vide traffic flow control, r estrict contents of routing updates, decide which types of traffic ar e forwarded or block ed, and above all provide security for the network. Only authenticated and approv ed system users can transmit an d r eceive da ta. Supplicants are authenticated through the Re mote Authenti cation Dia l In User Se rvice (RADIUS) serv er using the Extensi ble Authent ication Protocol ( EAP). Also supported ar e PEAP, EAP - TTL, EAP - TTLS, and EAP - TLS. MAC- based authent icatio n allows mul tiple sup plicants connected to th e same p ort to each authentic ate individually. F or example, a system attached to the p ort might be requir ed to authent icate in order to gain acc ess to the networ k, while a V oIP phone mig ht not need to a uthentic ate in order to send voi ce traffic through the port. These addresses are manually defined or learned on that port. When a frame is seen on a locked port, and the frame source MA C addr ess is no t tied to that port, the protect ion mecha nism is inv oked. P asswor ds for SSH, T elnet, HTTP, HTTPS, and SNMP access are assigned security features.Secure Sockets Layer (SSL) protocol provides a means of abstracting an encrypted connection between two stations. Once established, such a connection is virtually no differ ent to use than an unsecured connection. It describes the adva ntages of specifi c functions that the P owerConnect 6200 Series prov ide s and inc lud es in fo rmat io n abo ut conf ig uring those functions using the command line interface (CLI). Green indicate s the port is enabled, red indicates that an error h as occurred on the p ort, and blue indic ates th at the link is d isable d. NOTE: Th e LED statu s does not appe ar in the devi ce view. Y ou can on ly determ ine LED status by looki ng at the ac tual swi tch.The o nline help p ages ar e conte xt sens itive.</p><p> F or ex ampl e, if the IP Addr essing page is op en, the help top ic for th at pag e display s if you c lick Help. About C ontains the version and build number an d Dell copyright in formation. Log O ut Logs out of the application. T abl e 2-3. Device Ma nagem ent Button s Button De scription Apply Changes Applies se t change s to the device. Add Adds informati on to tables or dialo gs. Te l n e t St arts a T elnet ses sion. Query Queries tables. Show All Displays th e devi ce tab les. Ref r es h Refr eshes device information. Draw Creates stat istic s charts on-the-fly. If access is through a T elnet connection, ensure the device has an IP address de fi ned and that the w orkstation used to access the device is connected to the device prior to usi ng CLI commands. Rem ov e Remo ves th e sele cted it em. Gen eral s elec tion T o enable a configuration item, i.e., adjust sensitivity of log files, select match criter ia for diffserv, select ACL rule parameters. Th is s witc h li ghts the Ma ster S witch LED. W hen a st ack is pow ered u p for t he fir st time, the s witc hes el ect t he Mast er Swi tch, which may occupy any loc ation i n the sta ck. Oth erwise, the user is pr esen ted with the User: login prompt. NOTE: The fol lowing st eps as sume that the admi n user and password is confi gured on the sys tem. 3. Ty p e admin at the prompt, and pr ess. T elnet is an al ternative to a local login terminal w here a re mote login is req uired. Y o ur switch supports up to four simultaneous T e ln et sessions. All CLI commands can be used over a telne t se ssion. Using the CLI Command Mode Over view The CLI is divided into command modes. Each comma nd mode has a specifi c comm and set. Entering a question mark at th e console prompt displays a list of commands availab le for that particular command mode. In each mode, a sp ecific command is used to navigate from one command mode to another. During the CLI se ssion initialization, the CLI mode is the User EXEC mode.</p><p> Only a limited subset of com man ds are ava ila ble in t he User EXEC mode. This level is r eserved for tasks that do not change the switch configuration and is used to access configuration sub-sy stems. P rivileged EXEC mode may requir e a passw ord if the ena ble password is configured.A passwor d is not req u i re d. The Global Configuration mode manages the device configuration on a global level. The Interface Configuration mode configures the de vice at t he physical inte rface level. I nterface commands, which r equire subcommands, have anothe r level called the Subinterface Configuration mode. T o list the user EXE C commands, en ter a question ma rk at the comma nd prompt. Privil eged EXEC Mode P riv ilege d acce ss ca n be pr otect ed t o pr event unaut hori zed ac cess and en sur e oper ati ng para mete rs. P asswords are case-s ensitive, and each character of t he password displays on scr een as an asterisk. T o access and list the P rivileged E XEC Mode commands: 1. At the prompt type enable and pr ess. 2. If a password prompt displays, enter th e password and press.Global Conf iguration Mo de Global Configuration commands ap ply to system features, rather than to a specific protocol or interface. T o access Global Configuration mode: 1. At the P rivileged EXEC Mode prompt, type config ure and press.Stations are connected to the switch’s ports throug h the physica l inte rfac e port s on th e fron t pan el.F igure 3-2 illustrates an SFP connector. Figur e 3-2. SFP Conn ector Connecti ng the Switch to a T erminal 1. Connect the serial cable to the t erminal (console) ASC II DTE RS-2 32. 2. Connect the serial cable to the sw itch’s serial port. 3. If you are configuring a stack, connect th e interface cable to the serial port of the Master switch. Figur e 3-4. Serial Connect ion to Switch Seri al Connec tor to Con sole F or a complete explanation of the LED s, see LED Definition s Figure 3-5.</p><p> AC Power Connect ion to PowerConn ect 6200 Seri es To A C p o w e r source T o D C powe r source This serial connection can be used to manage an entir e stack. Dual 10Gbps e xpansion slots ar e also mounted on the r ear of the switch. The left slot (Bay 1) can support a plug -in Dual 10GbE XFP module, a CX4 module, or a stacking module. The right slot (Bay 2) can su pport a pl ug-in Dual 10GbE XFP modu le, a 10GBase- T module, or a CX4 module. Figure 4-6. Po werConne ct 6224, 62 48, a nd 6224F Rear Panel Figure 4-7. PowerCo nnect 622 4P and 62 48P Rear Panel Dual 10 G slots f or XFP, CX4, or 10Gbase-T modules. RS-232 mana gement p ort DC power AC power Dual 10G slot s for XFP, CX4, or stac king mo dules RS-232 mana gement po rt Dua l 10G sl ots for XFP, CX4, or stackin g modules DC power AC pow er Dual 10G slo ts for XFP, CX4, or 10Gba se-T modules. NOTE: The co nsole po rt su pports a synchron ous dat a of eight data bi ts, one st op bi t, no pari ty bi t, a nd no fl ow cont rol. The def ault baud rat e is 9600 bps. NOTE: If yo u are inst alling a stack of switc hes, yo u need to as sembl e and ca ble the sta ck bef ore powe ring up a nd confi guring it. Whe n a stack is powered up for th e first t ime, the switche s elect a Ma ster S witch, which ma y occup y any loc ation i n the sta ck. Conn ect the te rminal to the Mas ter Swi tch. If yo u connec t the te rminal to a subord inate switch, you wi ll not be able to us e the C LI.F or P oE switches, you can attach a P owerConnect EPS-470. Y o u can verify operation by observing th e LEDs. V entilation System Thre e fans co ol the P owerConnect 6224. The P ow erCo nnect 6248 has four fa ns. Y ou can verify operation by observing the LEDs. Create a stack by connecting adjacent units using the stacking port s on the left side of the switch rear. Repeat this process until all of the devices are connected. 4.</p><p> Use the remaining stacking cable to connect t he remaining free ports, one each on the top and bottom swit ch es. Stacking Standby The stacking feature supports a “Standb y ” or backup unit that will assume the Master unit role if the Master unit in the stack f ails. As soon as a Master failur e is dete cted in the stack, the Standby unit initializes the control pla ne and enables all other stac k units with the current configuration. The Standby unit maintains a synchronized copy of the running configuration for the stack. The Standby unit i s preconfigured in the stack; howeve r, you can use the CLI to select a different stack member as Standby. See the CLI Reference Guide for more information. Unit 1 Unit 2 Unit 3 Unit 4 XG1 Port XG2 Port Figure 4-14. Front Pane l LEDs SFP Port LEDs F igure 4-15 illustrates the SFP port LEDs that are above each SFP port. Figure 4-15. SFP Port LEDs T able 4 -1 contains SFP port L ED definitions. Off The port is not linked. Off The port is not linked. T able 4-3. XFP Modu le Port LE Ds Definitions LED Color D efinition XFP Gr een The p ort is l ink ed. Off The port is not linked. Blink ing Link and act ivity. Off No link. Dupl ex Green F ull-d uplex mode. Off No link. FDX Green Solid The PoE powered devi ce is d etected and is operating at n ormal load.F igure 4 -17 illus trates the System LE Ds. Figure 4-17. System LED s T able 4-6 contains the System LED definiti ons. Green Blinking T he port is operating at t ransitional mode. The P oE powered device is being detect ed, or is fault y. Amber Solid An overload or short has occurr ed on the pow ered de vice. Amber Blinki ng The powered device power conce ption exceeds the predefin ed power allot ment. Off No powered devi ce is detected. T abl e 4-6. Syst em LED D efinitions LED Color Definition DIAG Flashi ng Green A diagn ostics test is in progress. Gr een The d iagnost ics test was succe ssfully complet ed. Red The d iagnostic s test f ailed.</p><p> RPS Gr een Redu ndant P ower Suppl y (RPS) is pr esent and o peratin g correctly.F igure 4-1 8 illustrates the Sta cking LEDs. T able 4-7 contains Stacking LED definitions. Figure 4-18. Stacki ng LEDs Off Redun dant P ower Supply is no t present. PWR Green P ower Supply is operati ng correctly. Red P ower Supply has failed. F AN Gr een F ans ar e oper ating corr ectly. Red One or more fans have failed. T emp Green System t emperature is bel ow threshold l imit. Red S ystem tempera ture has ex c eeded t hreshold l imit. T able 4-7. Stacki ng LED D efinitions LED Color Definition All LEDs OFF The unit is operati ng as a standalone switch. MASTE R Gr een The u nit is the Mast er Swit ch in th e stac k. Off T he unit is not t he Master Switch in the stack. T abl e 4-6. Syst em LED D efinitions LED Color Definition If yo u are ins talling a stack of switche s, conne ct the termin al to the Mas ter Switch. When a sta ck is pow ered up for the first time, t he switch es elect the Mast er Sw itch, which may occupy any locat ion in the stack. This switch lights th e Master Switch L ED. If y ou connec t the term inal to a subordin ate switch, you w ill not be able to us e the CLI. Then, follow the or der of installation and configur ation pr ocedures illustra ted in F igure 5 -1. F or the init ial conf igu rat ion, perf orm the sta nda rd switc h configuration. P erformi ng other functi ons is described lat er in this section. NOTE: Before pr ocee ding, r ead the r elease notes for this pr odu ct.The Easy S etup Wizard welco me message now displ ays. NOTE: If yo u are usi ng th e au toconf ig f eatur e, do not use t he E asy Set up Wizar d. 2. Configure the sw itch us ing the Easy S etup Wizar d and enter the necessary commands to complete th e require d task s. 3. When finished, exit the session w ith th e quit or exit command. The switch can be managed over a direct connection to the switch console port, or through a T elnet connection.</p></body>
</html>