A SERVICE OF

logo

C-27
Troubleshooting
Using the Event Log for Troubleshooting Switch Problems
igmp Internet Group Management Protocol: Reduces unnecessary
bandwidth usage for multicast traffic transmitted from
multimedia applications on a per-port basis.
Multicast and Routing Guide
ip IP addressing: Configures the switch with an IP address and
subnet mask to communicate on the network and support
remote management access; configures multiple IP
addresses on a VLAN; enables IP routing on the switch.
Management and Configuration Guide
Multicast and Routing Guide
ipaddrmgr IP Address Manager: Programs IP routing information in
switch hardware.
Multicast and Routing Guide
ipx Novell Netware protocol filtering: On the basis of protocol
type, the switch can forward or drop traffic to a specific set of
destination ports on the switch.
Access Security Guide
kms Key Management System: Configures and maintains security
information (keys) for all routing protocols, including a timing
mechanism for activating and deactivating an individual
protocol.
Access Security Guide
lacp LACP trunks: The switch can either automatically establish an
802.3ad-compliant trunk group or provide a manually
configured, static LACP trunk.
Management and Configuration Guide
ldbal Load balancing in LACP port trunks or 802.1s Multiple
Spanning Tree protocol (MSTP) that uses VLANs in a network
to improve network resource utilization and maintain a loop-
free environment.
Load-balancing messages also include switch meshing
events. The Switch Meshing feature provides redundant links,
improved bandwidth use, and support for different port types
and speeds.
Management and Configuration Guide
Advanced Traffic Management Guide
lldp Link-Layer Discovery Protocol: Supports transmitting LLDP
packets to neighbor devices and reading LLDP packets
received from neighbor devices, enabling a switch to
advertise itself to adjacent devices and to learn about
adjacent LLDP devices.
Management and Configuration Guide
loop_protect Loop protection: Detects the formation of loops when an
unmanaged device on the network drops spanning tree
packets, and provides protection by transmitting loop protocol
packets out ports on which loop protection has been enabled.
Advanced Traffic Management Guide
macauth Web and MAC authentication: Port-based security employed
on the network edge to protect private networks and the
switch itself from unauthorized access using one of the
following interfaces:
Web page login to authenticate users for access to the
network
RADIUS server that uses a device’s MAC address for
authentication
Access Security Guide
System
Module
Description
Documented in ProCurve Hardware/
Software guide