Solved

Super Micro SSE-G48 Switch

Posted on 2013-05-09
2
410 Views
Last Modified: 2013-05-11
we plan to buy a SSE-G48 L3 device , We are friendly to use Cisco devices and we are new on this product ?
Is there any body use it here , i want to know if it is easy to use CLI of this device ?
Is it so different from cisco ios and cli commands ?
Does any body know if there is a config converter  ?

If s.b use this device please tell me what is the commands for this cisco commands on super micro i want to see the basic differences

Arp xx.xx.xx.xx yyyy.yyyy.yyyy arpa
ip route xx.xx.xx.xx 255.255.255.255 null0
ip access-list extended INBOUND
1 deny tcp host  zz.zz.zz.zz any eq 80

Open in new window

0
Comment
Question by:3XLcom
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 17

Accepted Solution

by:
surbabu140977 earned 500 total points
ID: 39155182
You will get all the gui and cli command reference manuals(in pdf) below. Just download whichever you want to. GUI should be a bit easier.

http://www.supermicro.com/products/accessories/networking/sse-g48-tg4.cfm

Best,
0
 

Author Closing Comment

by:3XLcom
ID: 39158134
thnx
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is a guide to configure bridging on Cisco Routers.  This is something I never knew was possible until after making a few phone calls to Cisco.  Using bridging saved our company money by not requiring us to purchase a new switch.  Bridgi…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question