Netgear GSM712 사용자 설명서
700 Series Managed Switch User’s Guide for Software v2.1
2-2
Switch Management Overview
SM-10004-02
Table 2-1.
Comparing Switch Management Methods
For a more detailed discussion of the Administration Console, see chapter 3. For a more detailed
discussion of the Web Browser Interface, see chapter 4.
discussion of the Web Browser Interface, see chapter 4.
Protocols
Your NETGEAR 700 Series Managed Switch supports the following protocols:
•
Virtual terminal protocols, such as Telnet
•
SNMP
Management Method
Advantages
Disadvantages
Administration
console
console
• Out-of-band access via direct cable
connection means network bottlenecks,
crashes, and downtime do not slow or
prevent access
crashes, and downtime do not slow or
prevent access
• No IP address or subnet needed
• Menu or CLI based
• Hyper Terminal access to full functionality
• Menu or CLI based
• Hyper Terminal access to full functionality
(Hyper Terminal are built into Microsoft
Windows 95/98/NT/2000 operating
systems)
Windows 95/98/NT/2000 operating
systems)
• Secure – make sure the switch is installed in a
secure area.
• Must be near switch or use dial-up
connection
• Not convenient for remote users
• Not graphical
• Not graphical
Web browser
or Telnet
• Can be accessed from any location via the
switch’s IP address
• Ideal for configuring the switch remotely
• Compatible with Internet Explorer and
• Compatible with Internet Explorer and
Netscape Navigator Web browsers
• Familiar browser interface
• Graphical data available
• Most visually appealing
• Menu or CLI interfaces available
• Graphical data available
• Most visually appealing
• Menu or CLI interfaces available
• Security can be compromised (hackers
can attack if they know IP address)
• May encounter lag times on poor
connections
• Displaying graphical objects over a
browser interface may slow navigation
SNMP Agent
• Communicates with switch functions at the
Management Information Base (MIB) level
• Based on open standards
• Requires SNMP manager software
• Least visually appealing of all three
• Least visually appealing of all three
methods
• Limited amount of information
available
• Some settings require calculations
• Security can be compromised (hackers
• Security can be compromised (hackers
need only know the community name)